!! History Commons Alert, Exciting News

Context of 'August 2, 2005: Someone Pays Iraqi Newspaper $1500 to Publish Pro-American Story'

This is a scalable context timeline. It contains events related to the event August 2, 2005: Someone Pays Iraqi Newspaper $1500 to Publish Pro-American Story. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 3 (273 events)
previous | 1, 2, 3 | next

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Interviewer David Frost has a difficult time with his subject, former President Richard Nixon, in the day’s early questioning (see April 6, 1977). Frost attempts to recoup with a line of questioning suggested by his adviser James Reston, Jr., one used in the trial of former Nixon aide John Ehrlichman (see January 1, 1975). Were there no limits to what a president can do, even if the president wants to do something plainly illegal? he asks. Could he do anything despite the law? Burglary? Forgery? Even murder? “If the president does it, that means it’s not illegal,” Nixon retorts. “Never had his imperialism been so baldly stated,” Reston will later reflect. Frost asks if the dividing line between, for example, a police burglary and the murder of an antiwar protester is only the president’s judgment? Nixon agrees, and adds: “There’s nothing specific that the Constitution contemplates in that respect. I haven’t read every word, every jot and every tittle, but I do know this: That it has been, however, argued that as far as a president is concerned, that in war time, a president does have certain extraordinary powers which would make acts that would otherwise be unlawful, lawful if undertaken for the purpose of preserving the nation and the Constitution, which is essential for the rights we’re all talking about.” [Time, 5/30/1977; Reston, 2007, pp. 102-105; Landmark Cases, 8/28/2007]

Entity Tags: Richard M. Nixon, David Frost, James Reston, Jr, John Ehrlichman

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

Ahmed Chalabi, the charismatic, MIT-educated head of Jordan’s Petra Bank, flees to London before charges can be filed against him in regards to the collapse of his bank (see August 2, 1989 and April 9, 1992). Unworried about the Jordanian charges, Chalabi, whose formerly wealthy family fled Iraq in 1958, establishes a loose grouping of Iraqi exiles called the Iraqi National Congress, with the aim of overthrowing Iraqi dictator Saddam Hussein. Chalabi has already forged ties with some US neoconservatives like Albert Wohlstetter and Richard Perle. Now he begins cultivating ties with other influential neoconservatives such as Paul Wolfowitz, James Woolsey, Douglas Feith, and Perle’s protege, David Wurmser. Chalabi makes the rounds of the symposia and conferences, and wins new allies in pro-Israeli think tanks such as the Jewish Institute for National Security Affairs (JINSA) and the Washington Institute for Near East Policy (WINEP). Chalabi’s appeal to the neoconservatives is directly linked to his support for Israel as a regional power. The new Iraq he will build, he promises, will have strong relations with Israel. He even declares his intention to rebuild the oil pipeline from Kirkuk to Haifa, which has been inoperative since the 1940s. The neoconservatives ignore his close ties with the Iranian Shi’ite theocracy, as well as the Petra Bank’s funding of the Lebanese Shi’ite militia Amal. Instead, the neoconservatives view Chalabi as a potential savior of the Middle East. Patrick Clawson of WINEP says, “He could be Iraq’s national leader.” [Unger, 2007, pp. 123-125]

Entity Tags: Jewish Institute for National Security Affairs, Albert Wohlstetter, Ahmed Chalabi, David Wurmser, Douglas Feith, Iraqi National Congress, Paul Wolfowitz, James Woolsey, Saddam Hussein, Washington Institute for Near East Policy, Patrick Clawson

Timeline Tags: Neoconservative Influence

A National Security Agency (NSA) linguist runs afoul of his superiors after he and other linguists submit a report concluding that Islamist terrorists are planning attacks on America. The analyst, who insists on remaining anonymous and is nicknamed “J” by press reports, is fluent in an unusual number of languages. His and his colleagues’ study of Arabic language messages, and the flow of money to terrorist organizations from Saudi Arabia, lead them to believe that Saudi extremists are plotting an attack. J will recall in January 2006: “You could see, this was the pure rhetoric of Osama bin Laden and his group, the exact same group, and we had an early indication.… All of us in the group had this view of a burgeoning threat, and suddenly we were all trotted off to the office of security. Then came the call to report for a battery of psychological tests.” J will issue further warnings of potential terrorist strikes, this time involving hijackers, passenger planes, and US buildings, in May 2001 (see May 2001). In 2006, other current and former NSA officials will claim that the NSA routinely uses unfavorable psychological evaluations to retaliate against whistleblowers and those employees who come into conflict with superiors (see January 25-26, 2006). [Cybercast News Service, 1/25/2006]

Entity Tags: “J”, National Security Agency

Timeline Tags: Complete 911 Timeline

After founding the Iraqi National Congress (INC), Ahmed Chalabi approaches the CIA for help in overthrowing Saddam Hussein. The agency, hoping Chalabi can provide useful intelligence, gives the organization millions of dollars to set up a “forgery shop” inside an abandoned schoolhouse in the Kurdish town of Salahuddin. The INC promptly sets about creating phony mockups of Iraqi newspapers filled with stories of Hussein’s abuses. “It was something like a spy novel,” CIA agent Robert Baer will later recall. “It was a room where people were scanning Iraqi intelligence documents into computers, and doing disinformation. There was a whole wing of it that he did forgeries in.… He was forging back then, in order to bring down Saddam.” Carla Bonini, an Italian reporter, will later recall: “When I visited [Chalabi] in London, he told me, ‘You can have anything you want.’ It was like a shopping mall for intelligence.” Bonini quickly learns that Chalabi’s information, although often sensational, is virtually useless. None of it can be independently confirmed, and most of it turns out to be fabrications. One of the documents fabricated by the INC is a copy of a purported letter to Chalabi from President Clinton’s National Security Council. The letter requests Chalabi’s help in a plot to assassinate Saddam Hussein. Baer believes Chalabi’s intent is to trick the Iranians into believing that the Americans will kill Hussein, thus inspiring them into joining a plot against the dictator. According to Francis Brooke, a Rendon Group employee working with the INC, Chalabi did not create the forged letter. “That would be illegal,” he says. [New Yorker, 6/7/2004; Unger, 2007, pp. 125]

Entity Tags: Iraqi National Congress, Francis Brooke, Robert Baer, Ahmed Chalabi, Carla Bonini, Rendon Group

Timeline Tags: Events Leading to Iraq Invasion

Farouk Hijazi.Farouk Hijazi. [Source: CNN]In 2006, a bipartisan Senate report will conclude that only one meeting between representatives of al-Qaeda and Saddam Hussein’s Iraq government took place prior to the Iraq war in 2003. “Debriefings and captured regime documents show that the Intelligence Community accurately assessed that Iraqi intelligence officer Farouq Hijazi met with bin Laden in 1995 in Sudan. Debriefings of Hijazi indicate that, prior to the meeting, Saddam directed Hijazi to “only listen” and not negotiate or promise anything to bin Laden. At the meeting, bin Laden requested an office in Iraq, military training for his followers, Chinese sea mines, and the broadcast of speeches from an anti-Saudi cleric,” Sheikh Salman al-Awdah. Hussein immediately rejected most of the requests, but considered broadcasting the speeches. However, it is unknown if he actually did. Hijazi files a negative report to his superiors, telling them that bin Laden was hostile and insisted on the Islamicization of Iraq, which is not in line with Hussein’s secular rule. Soon after filing the report, Hijazi is told by his superiors that he should not try to meet bin Laden again. [US Senate and Intelligence Committee, 9/8/2006, pp. 71-73 pdf file] Beginning in 1999, a number of news stories will allege a meeting between Hijazi and bin Laden, but will incorrectly claim the meeting took place in 1998 (see Late December 1998). The Boston Globe will later report, “[I]ntelligence agencies tracked contacts between Iraqi agents and al-Qaeda agents in the ‘90s in Sudan and Afghanistan, where bin Laden is believed to have met with Farouk Hijazi, head of Iraqi intelligence. But current and former intelligence specialists caution that such meetings occur just as often between enemies as friends. Spies frequently make contact with rogue groups to size up their intentions, gauge their strength, or try to infiltrate their ranks, they said.” [Boston Globe, 8/3/2003] Hijazi, head of the Iraqi Intelligence Service for a time, will be taken into custody by US forces in April 2003 and will make a deal to reactivate his intelligence network to benefit the US occupation. [New Yorker, 12/8/2003]

Entity Tags: Iraqi Intelligence Service, Osama bin Laden, Farouk Hijazi

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion

The CIA—concerned about Chalabi’s contacts with Iran and convinced that he is not capable of delivering on his promises—severs its ties with him and the Iraqi National Congress. [ABC, 2/7/1998; New Yorker, 6/7/2004; Christian Science Monitor, 6/15/2004] Former CIA base chief Robert Baer recalls in 2006 that “[t]he quality” of the INC’s intelligence “was very bad. There was a feeling that Chalabi was prepping defectors. We had no systematic way to vet the information, but it was obvious most of it was cooked.” [Mother Jones, 4/2006]

Entity Tags: Central Intelligence Agency, Ahmed Chalabi, Iraqi National Congress

Timeline Tags: Events Leading to Iraq Invasion

A lieutenant general meets with Qwest CEO Joe Nacchio and Dean Wandry, who heads Qwest’s government business unit. According to documents filed in 2006 by Nacchio concerning his trial on insider trading charges (see October 12, 2007), the general “told Mr. Wandry that he ran the largest telecom operation in the world, he had looked at Qwest’s network, and he wanted to use it for government purposes.” The general in question could be NSA Director Kenneth Minihan, who will be replaced in 1999 by another lieutenant general, Michael Hayden, but neither Minihan nor Hayden will comment on the allegation. Many former intelligence officials will say that it is likely Minihan who met with Nacchio and Wandry. Nacchio’s court documents indicate that he and Wandry agree to work with the general. Nacchio is not allowed to announce the contract publicly, but according to the court documents, he “understood at the time this was the beginning of a relationship which had enormous potential for future work. This proves increasingly true as time went on.” By 1999 Qwest is working extensively with the NSA. Minihan is particularly concerned about the potential of “cyberwarfare” by foreign governments, terrorist organizations, drug cartels, and organized crime, a prospect which he felt the NSA is unprepared. He particularly worries about Russia and China; in June 1998, he will testify are training personnel in potential cyber-attacks. “These opportunists, enabled by the explosion of technology and the availability of inexpensive, secure means of communication, pose a significant threat to the interests of the United States and its allies,” Minihan will state. In 2007, a former senior NSA official will say that the agency felt those groups knew US privacy laws all too well and were capable of using those laws against the NSA and other intelligence agencies. He will say, “There was such a nuanced understanding of how to tie us in knots and use American law against us, that there were certainly pockets of people saying, ‘We’ve got to be assertive; we’ve got to be more aggressive on this.’” Hayden, Minihan’s successor, will be particularly willing to push agency operations to the edge of legality. After 9/11, Hayden will say, “We’re pretty aggressive within the law. As a professional, I’m troubled if I’m not using the full authority allowed by law.” [National Journal, 11/2/2007] The NSA will approach Qwest will a similar offer in the months before 9/11 (see February 2001).

Entity Tags: Michael Hayden, Dean Wandry, Kenneth Minihan, National Security Agency, Joe Nacchio, Qwest

Timeline Tags: Civil Liberties

In 2006, a bipartisan Senate report will conclude that al-Qaeda leader Mahfouz Walad Al-Walid (a.k.a. Abu Hafs the Mauritanian) travels to Iraq this year in an attempt to meet with Saddam Hussein. This is according to debriefings and documentation found after the 2003 Iraq war. But Hussein refuses to meet him and directs that he should leave Iraq because he could cause a problem for the country. Different documents suggest Al-Walid travels in March or June, or makes two trips. He will make a similar attempt to meet with Hussein in 2002, and will be similarly rebuffed (see 2002). The Senate report will conclude that, despite many alleged meetings, these two attempted meetings by Al-Walid and an actual meeting between bin Laden and an Iraqi agent in 1995 (see Early 1995) were the only attempted contacts between the Iraqi government and al-Qaeda before the Iraq war. [US Senate and Intelligence Committee, 9/8/2006, pp. 73-75 pdf file]

Entity Tags: Saddam Hussein, Mahfouz Walad Al-Walid

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion

Gary Schmitt.Gary Schmitt. [Source: Think Progress (.org)]Prominent neoconservative Abram Shulsky, who worked under former Senator Henry “Scoop” Jackson (see Early 1970s), joins fellow neoconservative Gary Schmitt, the founder of the Project for the New American Century (PNAC - see January 26, 1998), in penning an essay called “Leo Strauss and the World of Intelligence.” Both are Strauss proteges, having studied under him at the University of Chicago. Strauss is considered an intellectual guiding light for neoconservative philosophy. Strauss, as Shulsky and Schmitt write, believed that all intelligence work essentially boils down to deception and counterdeception, as much with the governments and citizenry an intelligence agency ostensibly serves as with an enemy government or organization. Strauss viewed intelligence as a means for policymakers to attain and justify policy goals, not to describe the realities of the world. Intelligence is “the art of deception,” Strauss taught. Shulsky will go on to implement Strauss’s views in his work with the Office of Special Plans (see September 2002). [Middle East Policy Council, 6/2004]

Entity Tags: Henry (“Scoop”) Jackson, Gary Schmitt, University of Chicago, Abram Shulsky, Leo Strauss, Office of Special Plans, Project for the New American Century

Timeline Tags: Neoconservative Influence

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

US intelligence learns from the Australian Secret Intelligence Service (ASIS) that Iraq has made arrangements to purchase tubes, made of 7075-T6 aluminum, from China through Garry Cordukes, the director of the Australian company International Aluminum Supply. The company is associated with Kam Kiu Propriety Limited, a subsidiary of the Chinese company that will manufacture the aluminum tubes. Concerned that the tubes may be related to Iraqi efforts to reconstitute its nuclear weapons program, an Australian intelligence agent contacts Cordukes to obtain a sample of the tubes for examination. A CIA agent, Joe T., is said to have played a significant part in this discovery. [Washington Post, 8/10/2003; Australian Broadcasting Corporation, 10/27/2003 Sources: Unnamed US intelligence, US administration, and/or UN inspectors]

Entity Tags: Australian Secret Intelligence Service, Joe Turner, Garry Cordukes, International Aluminum Supply

Timeline Tags: Events Leading to Iraq Invasion

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

A set of documents is forged implicating Iraq in an attempt to purchase 500 tons of uranium oxide, also known as “yellowcake,” from Niger. [Agence France-Presse, 7/19/2003; Reuters, 7/19/2003; New Yorker, 10/27/2003; Talking Points Memo, 10/31/2003; La Repubblica (Rome), 10/24/2005] It is possible that official stamps and letterhead stolen from the Niger embassy in Rome (see January 2, 2001) are used to fabricate the documents, though a subsequent police investigation suggests that the break-in may have been staged to provide a cover story for the origins of the documents. [Isikoff and Corn, 2006, pp. 88] Material gleaned from real Italian intelligence (SISMI) documents dating back to the 1980s concerning Iraq’s yellowcake purchases from Niger during that period are also incorporated into the set of forged documents. [La Repubblica (Rome), 10/24/2005; San Francisco Chronicle, 10/30/2005] But it is unclear who exactly is responsible for the forgeries. In August 2004, the Financial Times will report that according to Rocco Martino, the Italian information peddler who later tries to sell the documents, the documents are fabricated by SISMI, which passes them on to Martino through embassy employee Laura Montini, a paid SISMI asset. [Financial Times, 8/2/2004] In October 2005, the Italian newspaper La Repubblica will suggest the forgery is done by Montini and fellow embassy employee Zakaria Yaou Maiga under the guidance of Martino and Antonio Nucera, the deputy chief of the SISMI center in Viale Pasteur in Rome. [La Repubblica (Rome), 10/24/2005] In 2006, an official investigation will add support to this account, concluding that Montini and Maiga, motivated by money, were indeed the forgers of the documents. [Sunday Times (London), 4/9/2006] SISMI director Nicolo Pollari will later acknowledge that Martino had worked as a SISMI agent in the past, but deny any SISMI involvement in the Iraq-Niger affair. “[Nucera] offered [Martino] the use of an intelligence asset [Montini]—no big deal, you understand—one who was still on the books but inactive—to give a hand to Martino,” Pollari will explain. Author Craig Unger will observe that the issue is, if Pollari is to be believed, just one friend helping another friend by loaning him an intelligence asset to help disseminate forged documents. Martino has a different explanation: “SISMI wanted me to pass on the documents, but they didn’t want anyone to know they had been involved.” The information is quite contradictory. The Italian newspaper La Repubblica will call Martino “a failed carabiniere and dishonest spy,” and a “double-dealer” who “plays every side of the fence.” But Unger will later note that assets like him are valuable precisely because they lack credibility. “If there were a deep-cover unit of SISMI, it would make sense to hire someone like Rocco,” says former DIA analyst Patrick Lang. “His flakiness gives SISMI plausible deniability. That’s standard tradecraft for the agencies.” Until Martino stops talking to journalists in 2005, he will insist he believed the documents were authentic (see Summer 2004). “I sell information, I admit,” he will tell a London reporter. “But I only sell good information.” [Unger, 2007, pp. 236]

Entity Tags: Rocco Martino, Nicolo Pollari, Laura Montini, La Repubblica, Zakaria Yaou Maiga, Antonio Nucera, Craig Unger, SISMI, Patrick Lang

Timeline Tags: Niger Uranium and Plame Outing

The US intelligence community—most notably the intelligence gatherers working in the Pentagon offices under Douglas Feith (see September 2002) —bases several of its intelligence assessments concerning Iraq on information offered by the Iraqi National Congress (INC) and by Iraqi defectors provided by the INC, despite warnings from the State Department and some CIA analysts that the lobbying group cannot be trusted. [New Yorker, 5/12/2003; Salon, 7/16/2003; Guardian, 7/17/2003; Inter Press Service, 8/7/2003; Independent, 9/30/2003; Mother Jones, 1/2004 Sources: Greg Thielmann, Unnamed administration official] The INC’s primary intelligence organization is its Information Collection Program (ICP), which conducts about 20 percent of all US intelligence’s verbal debriefings of Iraqi prisoners, insurgents, and defectors. [Bamford, 2004, pp. 336-337] Some of the INC’s intelligence on Iraq is reportedly funneled directly to the office of Vice President Dick Cheney by Francis Brooke, the DC lobbyist for the group. [Newsweek, 12/15/2003 Sources: Memo, Francis Brooke] Brooke will later acknowedge that the information provided by the INC was driven by an agenda. “I told them [the INC], as their campaign manager, ‘Go get me a terrorist and some WMD, because that’s what the Bush administration is interested in.’” [Vanity Fair, 5/2004, pp. 230] Brooke had previously worked for the Rendon Group, “a shadowy CIA-connected public-relations firm.” [Mother Jones, 1/2004]

Entity Tags: Douglas Feith, Richard (“Dick”) Cheney, Francis Brooke, Frank Gaffney, Office of Special Plans

Timeline Tags: Events Leading to Iraq Invasion

The National Security Agency seeks the assistance of global telecommunications corporation AT&T to help it set up a domestic call monitoring site to eavesdrop on US citizens’ phone communications, according to court papers filed in June 2006 as part of a lawsuit against AT&T (see October 2001). The NSA is expressly forbidden from spying on US citizens within US borders unless authorized by the Foreign Surveillance Intelligence Court (FISC) (see 1978). When the NSA program, which wiretaps phone and email communications often without court warrants, becomes public knowledge well over four years later (see December 15, 2005), President Bush, NSA Director Michael Hayden, and other White House and government officials will assert that the program was set up in response to the September 11, 2001 terrorist attacks. If the claims made in the lawsuit are accurate, these assertions are provably false. “The Bush administration asserted this became necessary after 9/11,” lawyer Carl Mayer will claim in 2006. “This undermines that assertion.” Unbeknownst to most Americans, the NSA is operating a secret “data mining” operation that, by 2006, will have compiled phone records and contact information on millions of domestic phone and email communications. The NSA project is code-named “Project Groundbreaker,” and is ostensibly an above-board attempt announced in June 2000 to have AT&T and other firms help modernize its technological capabilities. The project originally seeks to have AT&T build a network operations center that duplicates AT&T’s facility in Bedminster, New Jersey; this plan will be altered when the NSA decides it will be better served by acquiring the monitoring technology itself. The agency is seeking bids for a project to “modernize and improve its information technology infrastructure,” including the privatization of its “non-mission related” systems support. [TechWeb, 6/13/2000; Bloomberg, 6/30/2006] Groundbreaker’s privatization project is expected to provide up to $5 billion in government contracts to various private firms such as AT&T, Computer Sciences Corporation, and OAO Corporation, [Computerworld, 12/4/2000; Government Executive, 9/1/2001] and up to 750 NSA employees will become private contractors. Hayden, who has aggressively instituted a corporate management protocol to enhance productivity and has brought in numerous senior managers and agency executives from private defense firms, is a strong proponent of privatizing and outsourcing much of the NSA’s technological operations, and in 2001 will say that he wants the agency to focus on its primary task of breaking codes and conducting surveillance. Hayden does not admit that Groundbreaker is part of a larger NSA domestic surveillance program, [Government Executive, 9/1/2001] and publicly, NSA officials say that the project is limited to administrative and logistics functions. [Computerworld, 12/4/2000] The covert data mining portion of the project is code-named “Pioneer.” A former, unnamed employee of the NSA, [Bloomberg, 6/30/2006] and a former AT&T technician, Mark Klein, will provide the key information about Groundbreaker (see Late 2002, July 7, 2009 and December 15-31, 2005). Klein will say in 2006 that he saw the NSA construct a clandestine area within its switching center in San Francisco, and saw NSA technicians shunt fiber optic cable carrying Internet traffic into that area, which contains a large data bank and secret data mining hardware (see April 6, 2006). Klein will say he knew that the NSA built other such facilities in other switching locations. He will go on to say that the NSA did not work with just AT&T traffic; when AT&T’s network connected with other networks, the agency acquired access to that traffic as well. [Democracy Now!, 5/12/2006] The information about AT&T and the NSA will become public knowledge after the 2006 filing of a lawsuit against AT&T and other telecommunications firms (see May 12, 2006 and June 26, 2006).

Entity Tags: Mark Klein, Michael Hayden, George W. Bush, Foreign Intelligence Surveillance Court, Bush administration (43), Carl Mayer, Computer Sciences Corporation, AT&T, National Security Agency, OAO Corporation

Timeline Tags: Civil Liberties

CIA map showing alleged Iraqi WMD sites.CIA map showing alleged Iraqi WMD sites. [Source: CIA] (click image to enlarge)CIA director George Tenet testifies to Congress that Iraq possesses no weapons of mass destruction and poses no threat to the United State. He says, “We do not have any direct evidence that Iraq has used the period since [Operation] Desert Fox to reconstitute its WMD programs, although given its past behavior, this type of activity must be regarded as likely.… We assess that since the suspension of [UN] inspections in December of 1998, Baghdad has had the capability to reinitiate both its [chemical and biological weapons] programs… without an inspection monitoring program, however, it is more difficult to determine if Iraq has done so.” He continues, “Moreover, the automated video monitoring systems installed by the UN at known and suspect WMD facilities in Iraq are still not operating. Having lost this on-the-ground access, it is more difficult for the UN or the US to accurately assess the current state of Iraq’s WMD programs.” Rumsfeld also discusses al-Qaeda, calling it "the most immediate and serious threat" to US interests (see February 7, 2001). [Scoop, 6/27/2003]

Entity Tags: Central Intelligence Agency, George J. Tenet, Al-Qaeda

Timeline Tags: Events Leading to Iraq Invasion

Secretary of Defense Donald Rumsfeld says in an interview, "Iraq is probably not a nuclear threat at the present time." [Scoop, 6/27/2003]

Entity Tags: Donald Rumsfeld

Timeline Tags: Events Leading to Iraq Invasion

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Timeline Tags: Civil Liberties

Photo of Iraqi aluminum tube, misidentified as a component for a nuclear reactor.Photo of Iraqi aluminum tube, misidentified as a component for a nuclear reactor. [Source: CIA]The CIA writes at least 15 reports (only seven of which have been identified; see, e.g., June 20, 2001, June 30, 2001, September 2004-September 2006, November 24, 2001, December 15, 2001, June 14, 2001, April 10, 2001) about Iraq’s interest in purchasing 7075-T6 aluminum tubes. Several of the assessments are distributed only to high-level policy makers, including President Bush, and are not sent to other intelligence agencies for peer review. According to a Senate Select Committee on Intelligence investigation, all the assessments rely on the same evidence and they all fail to note that the opinions of leading centrifuge experts at the Energy Department conflict with the CIA’s view. [US Congress, 7/7/2004, pp. 59; New York Times, 10/3/2004]

Entity Tags: Central Intelligence Agency, George W. Bush, US Department of Energy

Timeline Tags: Events Leading to Iraq Invasion

One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing.One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing. [Source: Matt Crypto / Public domain]The BBC reports on advances in electronic surveillance. The US’s global surveillance program, Echelon, has become particularly effective in monitoring mobile phones, recording millions of calls simultaneously and checking them against a powerful search engine designed to pick out key words that might represent a security threat. Laser microphones can pick up conversations from up to a kilometer away by monitoring window vibrations. If a bug is attached to a computer keyboard, it is possible to monitor exactly what is being keyed in, because every key on a computer has a unique sound when depressed. [BBC, 4/4/2001] Furthermore, a BBC report on a European Union committee investigation into Echelon one month later notes that the surveillance network can sift through up to 90 percent of all Internet traffic, as well as monitor phone conversations, mobile phone calls, fax transmissions, net browsing history, satellite transmissions and so on. Even encryption may not help much. The BBC suggests that “it is likely that the intelligence agencies can crack open most commercially available encryption software.” [BBC, 5/29/2001]

Entity Tags: Echelon, British Broadcasting Corporation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

An informant for the BIS, the Czech intelligence agency, reportedly sees Iraqi diplomat Ahmed Khalil Ibrahim Samir al-Ani meeting in a restaurant outside Prague with an Arab man in his 20s. This draws concern from the intelligence community because the informant suggests the person is “a visiting ‘student’ from Hamburg—and… potentially dangerous.” [New York Times, 11/19/2003 Sources: Jan Kavan] The young man is never positively identified or seen again. Fearing that al-Ani may have been attempting to recruit the young man for a mission to blow-up Radio Free Europe headquarters, the diplomat is told to leave the country on April 18. [New York Times, 10/27/2001; United Press International, 10/20/2002; New York Times, 11/19/2003 Sources: Unnamed US officials, Jan Kavan] Information about the incident is passed on to US intelligence. After the 9/11 attacks and after it is reported on the news that Atta had likely visited Prague, the BIS informant will say the young man at the restaurant was Atta. (see September 14, 2001) This information leads hawks to come up with the so-called “Prague Connection” theory, which will hold that 9/11 plotter Mohomed Atta flew to Prague on April 8, met with al-Ani to discuss the planning and financing of the 9/11 attacks, and returned to the US on either April 9 or 10. [New York Times, 10/27/2001; United Press International, 10/20/2002; New York Times, 11/19/2003 Sources: Unnamed US officials, Unnamed BIS informant, Jan Kavan] The theory will be widely discounted by October 2002. [New York Times, 10/21/2002 Sources: Unnamed US officials, Unnamed BIS informant]

Entity Tags: Mohamed Atta, Radio Free Europe, Ahmed Khalil Ibrahim Samir al-Ani, Jabir Salim

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion

A classified intelligence report, based primarily on the work of junior CIA analyst Joe T., concludes that the 7075-T6 aluminum tubes sought by Iraq from China (see 2000) “have little use other than for a uranium enrichment program.” But the report also notes that “using aluminum tubes in a centrifuge effort would be inefficient and a step backward from the specialty steel machines Iraq was poised to mass produce at the onset of the Gulf War.” The report is passed on to the White House. [US Congress, 7/7/2004; New York Times, 10/3/2004]

Entity Tags: Bush administration (43), Central Intelligence Agency, Joe Turner

Timeline Tags: Events Leading to Iraq Invasion

US officials in the Department of Energy (DOE) respond to an intelligence report released the previous day (see April 10, 2001) which contended that the aluminum tubes sought by Iraq (see July 2001) are destined for use as centrifuge rotors in a uranium enrichment program. The Energy Department argues that the tubes are too narrow, too heavy, and too long to be used in a gas centrifuge. Furthermore, “the tubes’ specifications suggest a centrifuge design quite different from any Iraq is known to have.” The officials also note that there is no evidence that Iraq is seeking to acquire other materials that would be needed to construct a centrifuge. And if the Iraqis intend to use the tubes for uranium enrichment, the officials ask, why are they making no effort to conceal their interest in acquiring the tubes? “[T]he manner in which the procurement is being handled (multiple procurement agents, quotes obtained from multiple suppliers in diverse locations, and price haggling) seems to better match our expectations for a conventional Iraqi military buy than a major purchase for a clandestine weapons-of-mass destruction program,” the report notes. [US Congress, 7/7/2004; New York Times, 10/3/2004] The DOE therefore concludes that “while the gas centrifuge application cannot be ruled out, we assess that the procurement activity more likely supports a different application, such as conventional ordnance production.” The agency considers it more plausible that the tubes are meant to serve as rocket casings. Notwithstanding, the DOE concedes that it has “not identified an Iraq-specific, military, or other noncentrifuge application that precisely matches the tube specifications.” [US Congress, 7/7/2004] The DOE will identify a possible specific conventional military application for the tubes the following month (see May 9, 2001).

Entity Tags: US Department of Energy

Timeline Tags: Events Leading to Iraq Invasion

A National Security (NSA) linguist who only allows himself to be identified to the media as “J” warns his superiors at the agency that terrorists may be planning to hijack passenger planes to ram into buildings, and that security measures need to be implemented to prevent this. Instead, J is ordered to undergo psychiatric evaluation. (J was given similar treatment in another instance eight years before; see September 11, 1993). J will later claim that NSA officials dismissed his warnings, and instead labeled him as “obsessed” with the idea of a “kamikaze” threat because of time he had spent in Japan. In 2006, J will say that any time his analysis countered conventional wisdom, he was ordered to undergo psychiatric evaluations. He will eventually develop an irregular heartbeat due to the stress of anticipating further retaliatory, potentially career-damaging psychological evaluations. “I believe it was retaliation, but how do you prove that?” he will ask. J will spend his last decade at NSA with no promotion or raise, and will say that another linguist left the agency during that time out of disgust with what was happening. “Who was going to listen to us? Who could do anything anyway?” he asks in 2006. In 2006, other current and former NSA officials will claim that the NSA routinely uses unfavorable psychological evaluations to retaliate against whistleblowers and those employees who come into conflict with superiors (see January 25-26, 2006). [Cybercast News Service, 1/26/2006] It is not clear whether J’s warnings are related to the 33 other warnings picked up by NSA analysts during this same time period (see May-July 2001.)

Entity Tags: National Security Agency, “J”

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A British Intelligence paper reports that Iraq has been seeking aluminum tubes from Switzerland of the same precise specifications as the tubes Iraq recently ordered from China (see 2000). The report suggests the tubes are “probably for the Iraqi Air Force.” [United Kingdom, 7/14/2004 pdf file]

Entity Tags: UK Secret Intelligence Service (MI6)

Timeline Tags: Events Leading to Iraq Invasion

The CIA produces a Senior Publish When Ready (SPWR) report stating that the aluminum tubes being imported by Iraq from China are “controlled items under the Nuclear Suppliers Group and Chinese export laws, are suitable for uranium enrichment gas centrifuge rotors and, while less likely, could be used as rocket bodies for multiple rocket launchers (MLRs).” The CIA does not explain in this assessment why it believes the tubes are more likely to be used for centrifuge rotors than for rocket bodies. [US Congress, 7/7/2004]

Entity Tags: Central Intelligence Agency

Timeline Tags: Events Leading to Iraq Invasion

The CIA issues a classified report, titled “Iraq’s Current Nuclear Capabilities,” noting that the aluminum tubes being imported by Iraq from China (see 2000 and Early Summer 2001) could possibly be intended for use in non-nuclear applications. [The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (aka 'Robb-Silberman Commission'), 3/31/2005]

Entity Tags: Central Intelligence Agency

Timeline Tags: Events Leading to Iraq Invasion

The CIA publishes a classified Senior Publish When Ready report which notes that Iraq will likely claim that the aluminum tubes it is importing from China are intended for conventional or civilian use. The report acknowledges that such claims “cannot be discounted,” but adds that the tubes’ specifications “far exceed any known conventional weapons application, including rocket motor casings for 81mm” multiple rocket launchers. [The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (aka 'Robb-Silberman Commission'), 3/31/2005]

Entity Tags: Central Intelligence Agency

Timeline Tags: Events Leading to Iraq Invasion

Following leads from the Australian Secret Intelligence Service (ASIS) (see 2000), a team of CIA agents and Jordanian secret police confiscate a shipment of 3,000 7075-T6 aluminum tubes in Jordan. The tubes were purchased by a Jordanian front company, AT&C, on behalf of Iraq. [Washington Post, 8/10/2003; Australian Broadcasting Corporation, 10/27/2003] It is later learned that Iraq’s supply of rocket body casing tubes is depleted at about this time (see January 9, 2003) and that “[t]housands of warheads, motors and fins [are]… crated at the assembly lines [in Iraq], awaiting the arrival of tubes.” [Washington Post, 8/10/2003 Sources: Unnamed US intelligence, US administration, and/or UN inspectors]

Entity Tags: Jordan, Central Intelligence Agency

Timeline Tags: Events Leading to Iraq Invasion

All the alleged 9/11 hijackers reportedly check in at the airports from where they board Flights 11, 175, 77, and 93. [9/11 Commission, 7/24/2004, pp. 1-4; 9/11 Commission, 8/26/2004, pp. 27, 89, 93] Since 1998, the FAA has required air carriers to implement a program called the Computer Assisted Passenger Prescreening System (CAPPS). This identifies those passengers who might be a security risk, based upon suspicious behavior such as buying one-way tickets or paying with cash. CAPPS also randomly assigns some passengers to receive additional security scrutiny. If a particular passenger has been designated as a “selectee,” this information is transmitted to the airport’s check-in counter, where a code is printed on their boarding pass. At the airport’s security checkpoints, selectees are subjected to additional security measures. [US News and World Report, 4/1/2002; 9/11 Commission, 1/27/2004; US Congress, 3/17/2004; 9/11 Commission, 8/26/2004, pp. 2, 85] Their baggage is to be screened for explosives or held off the plane until they have boarded. Supposedly, the thinking behind this is that someone smuggling a bomb onto a plane won’t get onto that same flight. According to the 9/11 Commission, nine of the 19 hijackers are flagged by the CAPPS system before boarding Flights 11, 175, 77, and 93. [Washington Post, 1/28/2004; 9/11 Commission, 7/24/2004, pp. 84; United States of America v. Zacarias Moussaoui, a/k/a Shaqil, a/k/a Abu Khalid al Sahrawi, Defendant, 3/6/2006] In addition, Mohamed Atta was selected when he checked in at the airport in Portland, for his earlier connecting flight to Boston (see 5:33 a.m.-5:40 a.m. September 11, 2001). All of the hijackers subsequently pass through security checkpoints before boarding their flights. [9/11 Commission, 7/24/2004, pp. 1-4]

Entity Tags: Federal Aviation Administration, Computer Assisted Passenger Prescreening System

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Two sections from Rumsfeld’s notes, dictated to Stephen Cambone.Two sections from Rumsfeld’s notes, dictated to Stephen Cambone. [Source: Defense Department]Defense Secretary Rumsfeld aide Stephen Cambone is taking notes on behalf of Rumsfeld in the National Military Command Center. These notes will be leaked to the media nearly a year later. According to the notes, although Rumsfeld has already been given information indicating the 9/11 attacks were done by al-Qaeda (see 12:05 p.m. September 11, 2001) and he has been given no evidence so far indicating any Iraqi involvement, he is more interested in blaming the attacks on Iraq. According to his aide’s notes, Rumsfeld wants the “best info fast. Judge whether good enough hit S.H. [Saddam Hussein] at same time. Not only UBL [Osama bin Laden].… Need to move swiftly.… Go massive. Sweep it all up. Things related and not.” [CBS News, 9/4/2002; Bamford, 2004, pp. 285] In a 2004 book, author James Moore will write, “Unless Rumsfeld had an inspired moment while the rest of the nation was in shock, the notes are irrefutable proof that the Bush administration had designs on Iraq and Hussein well before the president raised his hand to take the oath of office.” [Moore, 3/15/2004, pp. 18]

Entity Tags: Stephen A. Cambone, Osama bin Laden, Saddam Hussein, Central Intelligence Agency, National Military Command Center, Donald Rumsfeld, Al-Qaeda

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion

The FBI dramatically escalates its warrantless wiretaps of US citizens, most without the proper paperwork or oversight. The public will not learn of the FBI wiretapping program until October 2005, when classified documents will be made available to the Electronic Privacy Information Center (EPIC), an advocacy group that will sue the Justice Department for records relating to the Patriot Act. According to those documents, which are heavily redacted, the FBI conducts clandestine surveillance on some US residents for 18 months and even longer. The FBI will also internally investigate at least 287 violations of its use of secret surveillance against US citizens. One target will be kept under surveillance for over five years, including a 15-month stretch where the FBI fails to notify Justice Department lawyers after the subject moves from New York to Detroit. According to an FBI investigation, that delay is a violation of department guidelines and will prevent the department “from exercising its responsibility for oversight and approval of an ongoing foreign counterintelligence investigation of a US person.” Other cases involve agents obtaining e-mails after warrants expire, seizing bank records without authorization, and conducting improper “unconsented physical search(es).” EPIC’s general counsel, David Sobel, will say in October 2005 that the classified documents indicate possible misconduct by the FBI in counterintelligence investigations, and highlight the need for greater congressional oversight of clandestine surveillance within the United States. “We’re seeing what might be the tip of the iceberg at the FBI and across the intelligence community,” Sobel will say. “It indicates that the existing mechanisms do not appear adequate to prevent abuses or to ensure the public that abuses that are identified are treated seriously and remedied.” The FBI will counter by insisting that all of the infractions are minor, mostly what it calls administrative errors, and that any information obtained improperly is quarantined and eventually destroyed. One senior FBI official will say, “Every investigator wants to make sure that their investigation is handled appropriately, because they’re not going to be allowed to keep information that they didn’t have the proper authority to obtain. But that is a relatively uncommon occurrence. The vast majority of the potential [violations] reported have to do with administrative timelines and time frames for renewing orders.” Catherine Lotrionte, the counsel for the President’s Foreign Intelligence Advisory Board, which is tasked with overseeing the FBI’s domestic surveillance operations, will refuse to disclose any details of any of the FBI violations, saying most of its work is classified and covered by executive privilege. The surveillance operations are conducted under the aegis of the Foreign Intelligence Surveillance Act (see 1978), whose threshold for such surveillance is lower than for criminal warrants. In 2004 alone, over 1,700 new cases will be opened by the secret Foreign Intelligence Surveillance Court. [Washington Post, 10/24/2005] Though Bush officials eventually admit to beginning surveillance of US citizens after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Issuetsdeah, Federal Bureau of Investigation, Catherine Lotrionte, Electronic Privacy Information Center, David Sobel, US Department of Justice, Foreign Intelligence Surveillance Court

Timeline Tags: Civil Liberties

NSA director Michael Hayden addresses the NSA in a global videoconference, saying that the NSA, like other government agencies, will have to do more to protect the country from further terrorist attacks. The challenge, he says, is to balance Americans’ security with civil liberties, “to keep America free by making Americans feel safe again.” Hayden will say in a 2006 speech reflecting on that videoconference (see January 23, 2006) that US citizens operate under misconceptions about the NSA’s capabilities—that while citizens believe the NSA has a global electronic surveillance network that can, and does, spy on citizens willy-nilly, in reality the NSA is understaffed and unprepared to handle the technological advances of the last decade. Hayden will say that with more extensive domestic surveillance of US citizens and foreign visitors, the NSA could have caught some of the 9/11 hijackers before they were able to put their plan into motion. The standards by which US citizens and foreign visitors are monitored must change, Hayden believes.
Expansion of NSA Surveillance Powers - Using Ronald Reagan’s 1981 executive order 12333 (see December 4, 1981), Hayden expands the NSA’s domestic surveillance practices to eavesdrop, sometimes without court approval, on selected international calls made by US citizens. Though Hayden’s expansion of NSA surveillance is not directly authorized by President Bush, and is not the same program as authorized by Bush’s secret executive order of 2002 (see Early 2002), Hayden will later say that this expansion is based on the intelligence community’s assessment “of a serious and continuing threat to the homeland.” Hayden’s program is reviewed and approved by lawyers at the NSA, the Justice Department, and the White House, as well as Attorney General John Ashcroft. [Michael Hayden, 1/23/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, US Department of Justice, National Security Agency, John Ashcroft, George W. Bush, Bush administration (43), Ronald Reagan, Michael Hayden

Timeline Tags: Civil Liberties

The US Congress adopts a joint resolution, the Authorization for Use of Military Force (AUMF), that determines that “the president is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons.” Congress also states that the “grave acts of violence” committed on the US “continue to pose an unusual and extraordinary threat to [its] national security and foreign policy.” [US Congress, 9/14/2001] President Bush signs the resolution into law on September 18. [White House, 9/18/2001] The passage of the AUMF served another purpose: to extend presidential power. While the Defense Department and the Joint Chiefs of Staff intended the AUMF to define the conflict in narrow terms, and authorize the US to move militarily against al-Qaeda and its confederates, and the Taliban, Vice President Dick Cheney and his chief of staff, David Addington, had a larger goal. Attorney Scott Horton, who has written two major studies on interrogation of terrorism suspects for the New York City Bar Association, says in 2005 that Cheney and Addington “really wanted [the AUMF defined more broadly], because it provided the trigger for this radical redefinition of presidential power.” Addington helped draft a Justice Department opinion in late 2001, written by lawyer John Yoo (see Late September 2001), that asserted Congress cannot “place any limits on the president’s determinations as to any terrorist threat, the amount of military force to be used in response, or the method, timing, and nature of the response.” [US News and World Report, 5/21/2006]

Entity Tags: US Department of Defense, Taliban, Scott Horton, Joint Chiefs of Staff, Richard (“Dick”) Cheney, David S. Addington, George W. Bush, John C. Yoo, Al-Qaeda, Authorization to Use Military Force (AUMF)

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

A self-styled White House “war council” begins meeting shortly after the 9/11 attacks, to discuss the administration’s response to the attacks and the methods it will use (see (After 10:00 a.m.) September 11, 2001). The ad hoc group is composed of White House counsel Alberto Gonzales, Justice Department lawyer John Yoo, Pentagon chief counsel William J. Haynes, and the chief aide to Vice President Dick Cheney, David Addington. According to Jack Goldsmith, who will become head of the Justice Department’s Office of Legal Counsel (OLC) in 2003 (see October 6, 2003), the four believe that the administration’s biggest obstacle to responding properly to the 9/11 attacks is the body of domestic and international law that arose in the 1970s to constrain the president’s powers after the criminal excesses of Richard Nixon’s White House. Chief among these restraints is the Foreign Intelligence Surveillance Act (FISA) of 1978 (see 1978). Though Addington tends to dominate the meetings with his imposing physical presence and aggressive personality, Yoo is particularly useful to the group; the head of the OLC, Jay Bybee (whom Goldsmith will replace) has little experience with national security issues, and delegates much of the responsibility for that subject to Yoo, even giving him the authority to draft opinions that are binding on the entire executive branch. Yoo agrees wholeheartedly with Addington, Gonzales, and Cheney about the need for vastly broadened presidential powers. According to Goldsmith, Yoo is seen as a “godsend” for the White House because he is eager to draft legal opinions that would protect Bush and his senior officials from any possible war crimes charges. However, Yoo’s direct access to Gonzales angers Attorney General John Ashcroft, who feels that the “war council” is usurping legal and policy decision-making powers that are legally his own. [New York Times Magazine, 9/9/2007] In 2009, Goldsmith will say, “[I]it was almost as if they [Cheney and Addington] were interested in expanding executive power for its own sake.” [Vanity Fair, 2/2009]

Entity Tags: Richard (“Dick”) Cheney, William J. Haynes, Richard M. Nixon, Office of Legal Counsel (DOJ), Jay S. Bybee, Jack Goldsmith, John C. Yoo, Bush administration (43), Foreign Intelligence Surveillance Act, Alberto R. Gonzales, David S. Addington

Timeline Tags: Civil Liberties

Former CIA Director James Woolsey makes a secret trip to Europe to find evidence that could link the Iraqi government to various terrorist attacks. Deputy Defense Secretary Paul Wolfowitz funds and supports his trip. He visits Wales in a fruitless search for evidence to link Iraq to the 1993 World Trade Center bombing (see Late September 2001). But he also looks for evidence tying Iraq to 9/11 and the anthrax attacks once they become publicly known in early October (see October 5-November 21, 2001). The Village Voice will later report, “Woolsey was also asked to make contact with Iraqi exiles and others who might be able to beef up the case that hijacker Mohamed Atta was working with Iraqi intelligence to plan the September 11 attacks, as well as the subsequent anthrax mailings.” [Village Voice, 11/21/2001] In late October, the Iraqi National Congress (INC), the exile group opposed to Saddam Hussein, says it recently held meetings in London with him. [Daily Telegraph, 10/26/2001] Woolsey is a prominent neoconservative and already has extensive links with the INC (see 2000). It is unknown exactly what Woolsey does in Europe, but his trip has an apparent effect on the media. In addition to numerous articles about Atta’s alleged Prague visit, some articles appear attempting to tie Atta and the Iraqi government to the anthrax attacks as well. For instance, on October 14, 2001, The Observer will report, “According to sources in the Bush administration, investigators are talking to Egyptian authorities who say members of the al-Qaeda network, detained and interrogated in Cairo, had obtained phials of anthrax in the Czech Republic.” [Observer, 10/14/2001] And in late October, the London Times will not only report that Atta was given a vial of anthrax in Prague, but that he met with Iraqi agents numerous times all over Europe (see October 27, 2001). But no hard evidence will emerge supporting any of these allegations pushed by Woolsey.

Entity Tags: Mohamed Atta, Iraqi National Congress, Saddam Hussein, James Woolsey, Paul Wolfowitz

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion, Neoconservative Influence, 2001 Anthrax Attacks

On September 12, 2001, President Bush spoke to counterterrorism “tsar” Richard Clarke and told him to look into possible Iraqi links to the 9/11 attacks (see September 12, 2001). Clarke works with CIA and FBI experts to make a report on the issue. [Vanity Fair, 5/2004, pp. 238] On September 18, Clarke sends a memo to National Security Adviser Condoleezza Rice entitled, “Survey of Intelligence Information on Any Iraq Involvement in the September 11 Attacks.” It passes along a few foreign intelligence reports, including a report just coming out of the Czech Republic alleging that hijacker Mohamed Atta met an Iraqi agent in Prague in April 2001. But it concludes there is no compelling case that Iraq had planned the 9/11 attacks. It further points out that allegations of any ties between al-Qaeda and the Iraqi government are weak, especially since bin Laden resents the secular nature of Saddam Hussein’s government. [9/11 Commission, 7/24/2004, pp. 335, 559] Clarke will later claim that the first draft of his memo was returned by National Security Adviser Rice or her deputy Stephen Hadley because it did not find any link between Iraq and al-Qaeda. He says, “It got bounced and sent back, saying ‘Wrong answer…. Do it again.’” Rice and Hadley will later deny that they asked to have the memo redone for this reason. Clarke does not know if Bush ever sees his report. “I don’t think he sees memos that he doesn’t-wouldn’t like the answer.” [Vanity Fair, 5/2004, pp. 238; 9/11 Commission, 7/24/2004, pp. 559]

Entity Tags: Richard A. Clarke, George W. Bush, Condoleezza Rice, Stephen J. Hadley

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion

In a briefing with CIA Director George Tenet, President Bush tells Tenet, “I want to know about links between Saddam [Hussein] and al-Qaeda. The Vice President knows some things that might be helpful.” He then turns to Cheney, who is participating in the meeting through a secure video link. Unusual for a vice president, Cheney’s office has nearly a dozen national security staffers. Cheney tells Tenet that one of them has picked up a report that hijacker Mohamed Atta met with an Iraqi agent in Prague. This had already been reported in the press the day before (see September 18, 2001), but apparently Cheney has information about it that the CIA does not. Tenet promises to get to the bottom of it right away. [Suskind, 2006, pp. 22-23] Two days later, Tenet will tell Bush that the report “just doesn’t add up” (see September 21, 2001).

Entity Tags: George W. Bush, George J. Tenet, Richard (“Dick”) Cheney, Mohamed Atta

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion

During President Bush’s presidential daily briefing (PDB), Bush is informed that the US intelligence community has found no evidence linking Saddam Hussein’s regime in Iraq to the 9/11 attacks, nor any evidence of links between Hussein and al-Qaeda. The briefing has been prepared at the request of Bush, who is said to be eager to learn of any possible connection between Iraq and al-Qaeda. Yet during the briefing, he is told that the few believable reports of contact between the two were in fact attempts by Hussein to monitor the group, which he considered a threat to his secular regime. Analysts believe that at one point Hussein considered infiltrating al-Qaeda with Iraqi nationals or Iraqi intelligence operatives, so as to learn more about its inner workings. A former US administration official later will state, “What the president was told on September 21 was consistent with everything he has been told since—that the evidence [linking Iraq to 9/11] was just not there.” The existence of the September 21 PDB will not be disclosed to the Senate Intelligence Committee until the summer of 2004, while the committee will be investigating whether the Bush administration misrepresented intelligence information in the period leading up to the March 2003 invasion of Iraq. As of the end of 2005, the Bush administration will still refuse to turn over the briefing, even on a classified basis, and will say nothing more about it other than the fact that it exists. [National Journal, 11/22/2005; MSNBC, 11/22/2005; Agence France-Presse, 11/23/2005; Unger, 2007, pp. 217] According to journalist Ron Suskind, during the meeting, CIA Director George Tenet tells Bush about the alleged meeting hijacker Mohamed Atta had with an Iraqi agent in Prague, which has been reported in the media in recent days (see September 18, 2001). However, Tenet says: “Our Prague office is skeptical about the report. It just doesn’t add up.” He points out that credit card and phone records place Atta in Virginia during the time in question. [Suskind, 2006, pp. 23]

Entity Tags: Mohamed Atta, George W. Bush, Saddam Hussein, Bush administration (43), Al-Qaeda, George J. Tenet

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion, 9/11 Timeline

John Yoo, a deputy assistant attorney general in the Department of Justice (DOJ) Office of Legal Counsel (OLC), issues a legal opinion that says the US can conduct electronic surveillance against its citizens without probable cause or warrants. According to the memo, the opinion was drafted in response to questions about whether it would be constitutional to amend the Foreign Intelligence Surveillance Act (FISA) to state that searches may be approved when foreign intelligence collection is “a purpose” of the search, rather than “the purpose.” Yoo finds this would be constitutional, but goes further. He asserts that FISA is potentially in conflict with the Constitution, stating, “FISA itself is not required by the Constitution, nor is it necessarily the case that its current standards match exactly to Fourth Amendment standards.” Citing Vernonia School Dist. 47J v. Acton, in which the Supreme Court found that warrantless searches of students were permissible, Yoo argues that “reasonableness” and “special needs” are also the standards according to which warrantless monitoring of the private communications of US persons is permissible. According to Yoo, the Fourth Amendment requirement for probable cause and warrants prior to conducting a search pertain primarily to criminal investigations, and in any case cannot be construed to restrict presidential responsibility and authority concerning national security. Yoo further argues that in the context of the post-9/11 world, with the threat posed by terrorism and the military nature of the fight against terrorism, warrantless monitoring of communications is reasonable. Some information indicates the NSA began a broad program involving domestic surveillance prior to the 9/11 attacks, which contradicts the claim that the program began after, and in response to, the attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [US Department of Justice, 9/25/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Inspectors General, 7/10/2009]
Yoo Memo Used to Support Legality of Warrantless Surveillance - Yoo’s memo will be cited to justify the legality of the warrantless domestic surveillance program authorized by President Bush in October 2001 (see October 4, 2001). NSA Director General Michael Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general.” The various post-9/11 NSA surveillance activities authorized by Bush will come to be referred to as the President’s Surveillance Program (PSP), and the first memo directly supporting the program’s legality will be issued by Yoo on November 2, 2001, after the program has been initiated (see November 2, 2001). Many constitutional authorities will reject Yoo’s legal rationale. [Michael Hayden, 1/23/2006]
Yoo Memo Kept Secret from Bush Officials Who Might Object - According to a report by Barton Gellman and Jo Becker in the Washington Post, the memo’s “authors kept it secret from officials who were likely to object,” including ranking White House national security counsel John Bellinger, who reports to National Security Adviser Condoleezza Rice. Bellinger’s deputy, Bryan Cunningham, will tell the Post that Bellinger would have recommended having the program vetted by the Foreign Intelligence Surveillance Court, which oversees surveillance under FISA. Gellman and Becker quote a “senior government lawyer” as saying that Vice President Dick Cheney’s attorney, David Addington, had “open contempt” for Bellinger, and write that “more than once he accused Bellinger, to his face, of selling out presidential authority for good ‘public relations’ or bureaucratic consensus.” [Washington Post, 6/24/2007]

Entity Tags: US Department of Justice, John Bellinger, National Security Agency, Bryan Cunningham, Condoleezza Rice, David S. Addington, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Office of Legal Counsel (DOJ), John C. Yoo, George W. Bush, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

According to author Ronald Kessler’s November 2007 book The Terrorist Watch, the NSA’s domestic surveillance program begins around two weeks after the 9/11 attacks, when President Bush meets with NSA director Michael Hayden and other NSA officials in the Oval Office. According to chief of staff Andrew Card, in attendance, Bush asks, “What tools do we need to fight the war on terror?” Hayden suggests revamping NSA guidelines to allow the agency to wiretap domestic phone calls and intercept e-mails to and from terror suspects if one end of the communication is overseas. Kessler gives the following rather lurid example: “Thus, if [Osama] bin Laden were calling the US to order the detonation of a nuclear device, and the person he called began making overseas calls, NSA could listen in to those calls as well as to bin Laden’s original call.” Kessler is a chief correspondent for the extremist conservative Web site NewsMax; his assertion is disputed by evidence suggesting that the domestic surveillance program began well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Kessler, 2007, pp. 130]

Entity Tags: National Security Agency, Andrew Card, Michael Hayden, Ronald Kessler, George W. Bush

Timeline Tags: Civil Liberties

Former AT&T employee Mark Klein.Former AT&T employee Mark Klein. [Source: PBS]The National Security Agency, as part of its huge, covert, and possibly illegal wiretapping program directed at US citizens (see Spring 2001 and After September 11, 2001), begins collecting telephone records of tens of millions of Americans, using data provided by telecommunications firms such as AT&T, Verizon, and BellSouth (see February 5, 2006). The media will not report on this database until May 2006 (see May 11, 2006). The program collects information on US citizens not suspected of any crime or any terrorist connections. Although informed sources say the NSA is not listening to or recording actual conversations, the agency is using the data to analyze calling patterns in an effort to detect terrorist activity. “It’s the largest database ever assembled in the world,” says one anonymous source. The NSA intends “to create a database of every call ever made.” As a result, the NSA has detailed records of the phone activities of tens of millions of US citizens, from local calls to family and friends to international calls. The three telecommunications companies are working with the NSA in part under the Communications Assistance Act for Law Enforcement (CALEA) (see January 1, 1995 and June 13, 2006) and in part under contract to the agency.
Surveillance Much More Extensive Than Acknowledged - The wiretapping program, which features electronic surveillance of US citizens without court warrants or judicial oversight, is far more extensive than anything the White House or the NSA has ever publicly acknowledged. President Bush will repeatedly insist that the NSA focuses exclusively on monitoring international calls where one of the call participants is a known terrorist suspect or has a connection to terrorist groups (see December 17, 2005 and May 11, 2006), and he and other officials always insist that domestic calls are not monitored. This will be proven false. The NSA has become expert at “data mining,” sifting through reams of information in search of patterns. The warrantless wiretapping database is one source of information for the NSA’s data mining. As long as the NSA does not collect “personal identifiers”—names, Social Security numbers, street addresses, and the like—such data mining is legal. But the actual efficacy of the wiretapping program in learning about terrorists and possibly preventing terrorist attacks is unclear at best. And many wonder if the NSA is not repeating its activities from the 1950s and 1960s, when it conducted “Operation Shamrock” (see 1945-1975), a 20-year program of warrantless wiretaps of international phone calls at the behest of the CIA and other intelligence agencies. Operation Shamrock, among other things, led to the 1978 passage of the Foreign Intelligence Surveillance Act (see 1978). [USA Today, 5/11/2006] In May 2006, former NSA director Bobby Ray Inman will say, “[T]his activity is not authorized” (see May 12, 2006). [Democracy Now!, 5/12/2006]
Secret Data Mining Center - In May 2006, retired AT&T technician Mark Klein, a 22-year veteran of the firm, will file a court affidavit saying that he saw the firm construct a secret data-mining center in its San Francisco switching center that would let the NSA monitor domestic and international communications (see January 2003). And former AT&T workers say that, as early as 2002, AT&T has maintained a secret area in its Bridgeton, Missouri, facility that is likely being used for NSA surveillance (see Late 2002-Early 2003).
Domestic Surveillance Possibly Began Before 9/11 - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, Verizon Communications, Mark Klein, George W. Bush, AT&T, BellSouth, Central Intelligence Agency, Communications Assistance for Law Enforcement Act (CALEA), Foreign Intelligence Surveillance Act, Qwest, National Security Agency

Timeline Tags: Civil Liberties

President Bush issues a directive authorizing the National Security Agency (NSA) to operate a warrantless domestic surveillance program. Author/journalist Jane Mayer will report in 2011, “[O]n October 4, 2001, Bush authorized the policy, and it became operational by October 6th,” and, “[t]he new policy, which lawyers in the Justice Department justified by citing President Bush’s executive authority as commander in chief, contravened a century of constitutional case law.” Mayer will interview NSA whistleblower Thomas Drake for her article and quote him as saying that, following the October 4 directive, “strange things were happening. Equipment was being moved. People were coming to me and saying, ‘We’re now targeting our own country!’” Bush’s directive is based on a legal opinion drafted by Department of Justice Office of Legal Counsel Deputy Attorney General John Yoo (see September 25, 2001). [New Yorker, 5/23/2011]
Conflicting Information regarding Date of First Authorization - The existence of the NSA’s domestic surveillance program will first be made public in December 2005, following reporting by the New York Times that will cite “[n]early a dozen current and former officials” (see December 15, 2005). The Times article will state that in 2002, “[m]onths after the Sept. 11 attacks,” Bush signed an executive order authorizing the NSA to monitor domestic phone calls, including those of US citizens and permanent residents, if one end of the call was outside the country. The Times article also mentions an NSA “‘special collection program’ [that] began soon after the Sept. 11 attacks, as it looked for new tools to attack terrorism.” The difference between the October 4, 2001 directive and the 2002 executive order referred to by the Times is unclear. [New York Times, 12/16/2005]
Other Sources for October Directive - Other sources, including Bush, NSA Director General Michael Hayden, and the inspectors general of five separate agencies, will later refer to a presidential order having been given in “October,” or “weeks” after the 9/11 attacks, and say that, subsequent to this order, international calls of US persons are targeted for content-monitoring. Following the publication of the Times article, Bush will say in a December 17, 2005 radio address: “In the weeks following the terrorist attacks on our nation, I authorized the National Security Agency, consistent with US law and the Constitution, to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations. Before we intercept these communications, the government must have information that establishes a clear link to these terrorist networks” (see December 17, 2005). This presidential authorization was based on a legal opinion drafted by Department of Justice Office of Legal Counsel attorney John Yoo (see October 18, 2001). [WhiteHouse(.gov), 12/17/2005] Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001,” which is when he “gathered key members of the NSA workforce… [and] introduced [the NSA’s] new operational authority to them.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general,” and that “the three most senior and experienced lawyers in NSA… supported the lawfulness of this program.” [Michael Hayden, 1/23/2006] In a July 10, 2009 jointly-issued report, the inspectors general of the Department of Defense, Department of Justice, CIA, NSA, and Office of the Director of National Intelligence will refer to the “President’s Surveillance Program” (PSP) and “the program’s inception in October 2001.” The report will say: “One of the activities authorized as part of the PSP was the interception of the content of communications into and out of the United States where there was a reasonable basis to conclude that one party to the communication was a member of al-Qaeda or related terrorist organizations.… The attorney general subsequently publicly acknowledged the fact that other intelligence activities were also authorized under the same presidential authorization, but the details of those activities remain classified.” [Inspectors General, 7/10/2009] Citing “a senior administration official,” the Washington Post will report on January 4, 2006: “The secret NSA program… was authorized in October 2001.… The president and senior aides have publicly discussed various aspects of the program, but neither the White House, the NSA, nor the office of the director of national intelligence would say what day the president authorized it.” [Washington Post, 1/4/2006]

Entity Tags: US Department of Justice, Thomas Drake, US Department of Defense, Office of Legal Counsel (DOJ), Office of the Director of National Intelligence, Michael Hayden, National Security Agency, George W. Bush, Central Intelligence Agency, John C. Yoo, Jane Mayer

Timeline Tags: Civil Liberties

Nancy Pelosi.Nancy Pelosi. [Source: US Congress]House Minority Leader Nancy Pelosi (D-CA) writes to NSA Director Michael Hayden questioning the nature and extent of the apparently illegal warrantless wiretapping of US citizens by the agency. Pelosi and other members of the House Intelligence Committee were briefed on October 1, 2001, by Hayden, whose agency began conducting surveillance against US citizens after the 9/11 attacks (see After September 11, 2001). Pelosi will release the letter on January 6, 2006, three weeks after the New York Times revealed that the NSA had been conducting electronic surveillance of US citizens without warrants since at least 2002 (see December 15, 2005.) Pelosi’s office will also release Hayden’s response, but almost the entire letter from Hayden is redacted.
Letter to Hayden - Pelosi writes in part, “[Y]ou indicated [in the briefing] that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance under the Foreign Intelligence Surveillance Act and related statutes, orders, regulations, and guidelines.… For several reasons, including what I consider to be an overly broad interpretation of President Bush’s directive of October 5 on sharing with Congress ‘classified or sensitive law enforcement information’ it has not been possible to get answers to my questions. Without those answers, the concerns I have about what you said on the First can not be resolved, and I wanted to bring them to your attention directly. You indicated that you were treating as a matter of first impression, [redacted ] being of foreign intelligence interest. As a result, you were forwarding the intercepts, and any information [redacted ] without first receiving a request for that identifying information to the Federal Bureau of Investigation. Although I may be persuaded by the strength of your analysis [redacted ] I believe you have a much more difficult case to make [redacted ] Therefore, I am concerned whether, and to what extent, the National Security Agency has received specific presidential authorization for the operations you are conducting. Until I understand better the legal analysis regarding the sufficiency of the authority which underlies your decision on the appropriate way to proceed on this matter, I will continue to be concerned.” The only portion of Hayden’s October 18 reply regarding Pelosi’s concerns that has not been redacted reads, “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” In January 2006, an NSA official will say that Pelosi’s concerns were adequately addressed in Hayden’s reply, and in a private briefing shortly thereafter. [Washington Post, 1/4/2006; Nancy Pelosi, 1/6/2006]
Pelosi Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). Pelosi is apparently unaware of any of this.

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi

Timeline Tags: Civil Liberties

Italy’s military intelligence service (SISMI) provides Jeff Castelli, the CIA station chief in Rome, with papers documenting an alleged uranium deal between Iraq and Niger. Castelli, who is not permitted to duplicate the papers, writes a summary of them and sends the report to Langley. [New Yorker, 10/27/2003; Knight Ridder, 11/4/2005; La Repubblica (Rome), 11/11/2005]
The allegations - The report includes four allegations:
bullet The report states that Iraq first communicated its interest in purchasing uranium from Niger at least as early as 1999. [US Congress, 7/7/2004] As blogger ERiposte will conclude through his analysis at TheLeftCoaster.Org [ERiposte, 10/31/2005] , none of the documents that are later provided to the US as the basis for this allegation include actual proof of uranium negotiations in 1999. Two of the source documents for this allegation do mention a 1999 visit by Wissam Al-Zahawi to Niger; however, no evidence has ever surfaced suggesting that there were any discussions about uranium during that visit (see February 1999). The first document (possibly authentic) is a letter, dated February 1, 1999, from the Niger embassy in Rome to Adamou Chekou, the Minister of Foreign Affairs in Niger, announcing Zahawie’s trip. It does not mention uranium. (Note that the SISMI report does not mention Al-Zahawi’s trip, it only states that uranium negotiations between the two countries began by at least 1999.) The second document is a letter dated July 30, 1999 from the Niger Ministry of Foreign Affairs to his ambassador in Rome requesting that he contact Zahawie, concerning an agreement signed June 28, 2000 to sell uranium to Iraq. The letter is an obvious forgery because it refers to an event that it describes as taking place 11 months later. [Unknown, n.d.; La Repubblica (Rome), 7/16/2003]
bullet The SISMI report states that in “late 2000,” the State Court of Niger approved an agreement with Iraq whereby Niger would sell Iraq a large quantity of uranium. This allegation appears to be based on a forged document titled “Annex 1,” which was possibly an annex to the alleged uranium agreement. It is evident that this document was forged because it says that the state court “met in the chamber of the council in the palace… on Wednesday, July 7, 2000.” But July 7, 2000 was, in fact, a Friday, not a Wednesday. One of SISMI’s reports to the US, possibly this one, actually reproduces this error. [Unknown, n.d.; La Repubblica (Rome), 7/16/2003; ERiposte, 10/31/2005]
bullet According to the report, Nigerien President Mamadou Tandja approved the agreement and communicated this decision to Iraqi President Saddam Hussein. The source for this is apparently a forged letter from the president of Niger to Saddam Hussein, in which the president refers to his authority under the country’s obsolete 1966 constitution. At the time the letter was presumed to have been written, the constitution in effect would have been that of December 26, 1992, which was subsequently revised by national referendum on May 12, 1996 and again by referendum on July 18, 1999. [Unknown, n.d.; Reuters, 3/26/2003; La Repubblica (Rome), 7/16/2003; US Department of State, 9/2005]
bullet The report also alleges that in October 2000, Nigerien Minister of Foreign Affairs Nassirou Sabo informed one of his ambassadors in Europe that Niger had agreed to provide several tons of uranium to Iraq. [Unknown, n.d.; La Repubblica (Rome), 7/16/2003] This is seemingly based on a forged letter that accompanied the alleged uranium sales agreement. The letter, dated October 10, 2000, is stamped as being received in Rome on September 28, 2000—nearly two weeks before the letter was presumably written. Furthermore, there is a problem with the signature. Unlike what is reported in the SISMI papers provided to the CIA, the actual letter is signed by Allele Elhadj Habibou, who left office in 1989. This indicates that someone must have corrected this information, replacing the name of Allele Elhadj Habibou with that of Nassirou Sabo (the minister in October 2000), before the letter was included in this report. [ERiposte, 10/31/2005]
Distribution within US Intelligence Community - After receiving the report from its Rome station, the CIA distributes it to other US intelligence agencies. According to a later Senate investigation, the “CIA, Defense Intelligence Agency (DIA), and Department of Energy (DOE) analysts considered the reporting to be ‘possible’ while the Department of State’s Bureau of Intelligence and Research (INR) regarded the report as ‘highly suspect,’ primarily because INR analysts did not believe that Niger would be likely to engage in such a transaction and did not believe Niger would be able to transfer uranium to Iraq because a French consortium maintained control of the Nigerien uranium industry.” [US Congress, 7/7/2004] Sources later interviewed by New Yorker’s Seymour Hersh portray US intelligence analysts’ assessment of the report in slightly harsher terms, saying that they “dismissed [it] as amateurish and unsubstantiated.” [New Yorker, 10/27/2003] “I can fully believe that SISMI would put out a piece of intelligence like that,” a CIA consultant later tells Hersh, “but why anybody would put credibility in it is beyond me.” [New Yorker, 5/17/2004, pp. 227] Langley asks for further clarification from Rome and receives a response three days later (see October 18, 2001). [La Repubblica (Rome), 11/11/2005]
Repeated Dissemination - The documents and reports based on the documents are sent to the CIA at least three separate times. They are also sent to the White House, the US embassy in Rome, British and French intelligence, and Italian journalist Elisabetta Burba of the news magazine Panorama. Each recipient in turn shares the documents, or their contents, with others, creating what author Craig Unger later calls “an echo chamber that gives the illusion that several independent sources had corroborated an Iraq-Niger uranium deal.” [Unger, 2007, pp. 237]

Entity Tags: Bureau of Intelligence and Research, Central Intelligence Agency, Craig Unger, Defense Intelligence Agency, Mamadou Tandja, SISMI, Elisabetta Burba, Nassirou Sabo, Wissam al-Zahawie, Saddam Hussein, Jeff Castelli, US Department of Energy

Timeline Tags: Niger Uranium and Plame Outing

NSA Director Michael Hayden responds to an October 11 letter from Representative Nancy Pelosi (see October 11, 2001), expressing concerns about the NSA’s post-9/11 surveillance expansion (see After September 11, 2001) that Hayden outlined for the House Intelligence Committee on October 1 (see October 1, 2001), and asking whether the president authorized it. The substance of Hayden’s October 18 reply will be redacted, except for this statement: “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” [Nancy Pelosi, 1/6/2006] A January 4, 2006 report in the Washington Post will cite “intelligence official close to Hayden” as saying that “[Hayden’s] appearance on Oct. 1, 2001, before the House committee had been to discuss Executive Order 12333, and not the new NSA program,” and that “Pelosi’s concerns had been answered in writing and again several weeks later during a private briefing.” [Washington Post, 1/4/2006] In a January 23, 2006 public briefing, Hayden will say, “September 2001, I asked to update the Congress on what NSA had been doing, and I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities,” and, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” [Michael Hayden, 1/23/2006]
Nature of Hayden's EO 12333 Surveillance Program - The full scope of Hayden’s surveillance program is unclear, but some sources indicate it includes the wholesale collection and data-mining of phone records provided by telecom companies and placement of pen registers (call trackers) on domestic phone numbers (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, October 2001), and October 31, 2001). Some sources indicate the NSA began large-scale domestic surveillance activities prior to the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi, National Security Agency

Timeline Tags: Civil Liberties

Vice President Dick Cheney summons the chairmen and ranking members of the Senate and House Intelligence Committees to the White House for a classified briefing on the secret NSA warrantless wiretapping program (see Early 2002). Cheney makes it clear to the lawmakers that he is merely informing them about the program, and not seeking their approval. [Washington Post, 12/18/2005] Officials later say that under any of the previous presidents, such a meeting of this import would involve the president. But the four lawmakers are hustled away from the Oval Office. Instead, “[w]e met in the vice president’s office,” Bob Graham (D-FL), the chairman of the Senate Intelligence Committee, later recalls. President Bush has already told Graham that “the vice president should be your point of contact in the White House.” Cheney, according to the president, “has the portfolio for intelligence activities.” [Washington Post, 6/24/2007] The leaders are briefed by Cheney, CIA Director George Tenet, and NSA Director Michael Hayden. The Congressional leaders will later mostly refuse to comment publicly about what they do and do not learn about the program, even after it is revealed to the public (see December 15, 2005). In 2003, when Senator John D. Rockefeller ascends to the Democratic leadership of the Senate committee, and is himself briefed on the program, he will write to Cheney expressing his concerns over it (see July 17, 2003). [New York Times, 12/15/2005]
'No Discussion about Expanding' NSA Wiretapping - In December 2005, after the program is revealed to the public, one of the Congressmen present at the briefings, Graham, the then-chairman of the Senate Intelligence Committee, will discuss his knowledge of the program. In contradiction to the characterizations of Bush and other White House officials, Graham will say that he recalls “no discussion about expanding [NSA eavesdropping] to include conversations of US citizens or conversations that originated or ended in the United States,” and knew nothing of Bush’s intention to ignore the Foreign Intelligence Surveillance Court (also known as the FISA court). “I came out of the room with the full sense that we were dealing with a change in technology but not policy,” Graham will recall, using new methodologies to intercept overseas calls that passed through US switches. He thought that NSA eavesdropping would continue to be limited to “calls that initiated outside the United States, had a destination outside the United States but that transferred through a US-based communications system.” Instead, Graham will say, it now seems that Bush decided to go “beyond foreign communications to using this as a pretext for listening to US citizens’ communications. There was no discussion of anything like that in the meeting with Cheney.” A senior intelligence official, who refuses to reveal his identity but says he is speaking with the permission of the White House, will accuse Graham of “misremembering the briefings,” which he will call “very, very comprehensive.” The official will refuse to discuss the briefings in any but the most general terms, but will say they were intended “to make sure the Hill knows this program in its entirety, in order to never, ever be faced with the circumstance that someone says, ‘I was briefed on this but I had no idea that—’ and you can fill in the rest.” Graham will characterize the official’s description as saying: “[W]e held a briefing to say that nothing is different.… Why would we have a meeting in the vice president’s office to talk about a change and then tell the members of Congress there is no change?” House Minority Leader Nancy Pelosi (D-CA), who was also present at the meeting as the ranking Democrat on the House Intelligence Committee, will say the briefing described “President Bush’s decision to provide authority to the National Security Agency to conduct unspecified activities.” She will note that she “expressed my strong concerns” but did not go into detail. [Washington Post, 12/18/2005]
Lawmakers Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). In the briefing, Cheney informs the lawmakers of none of this.

Entity Tags: Richard (“Dick”) Cheney, Senate Intelligence Committee, Nancy Pelosi, John D. Rockefeller, House Intelligence Committee, Daniel Robert (“Bob”) Graham, George J. Tenet, George W. Bush, Michael Hayden, National Security Agency

Timeline Tags: Civil Liberties

October 26, 2001: USA Patriot Act Becomes Law

President Bush signs the Patriot Act into law.President Bush signs the Patriot Act into law. [Source: White House]President Bush signs the USA Patriot Act (see October 2, 2001) into law. The act’s provisions include:
bullet 1) Non-citizens can be detained and deported if they provide “assistance” for lawful activities of any group the government chooses to call a terrorist organization. Under this provision the secretary of state can designate any group that has ever engaged in violent activity as a terrorist organization. Representative Patsy Mink (D-HI) notes that in theory supporters of Greenpeace could now be convicted for supporting terrorism. [San Francisco Chronicle, 11/12/2001]
bullet 2) Immigrants can be detained indefinitely, even if they are found not to have any links to terrorism. They can be detained indefinitely for immigration violations or if the attorney general decides their activities pose a danger to national security. They need never be given a trial or even a hearing on their status. [San Francisco Chronicle, 9/8/2002]
bullet 3) Internet service providers can be ordered to reveal the websites and e-mail addresses that a suspect has communicated to or visited. The FBI need only inform a judge that the information is relevant to an investigation. [Village Voice, 11/26/2001; San Francisco Chronicle, 9/8/2002]
bullet 4) The act “lays the foundation for a domestic intelligence-gathering system of unprecedented scale and technological prowess.” [Washington Post, 11/4/2001] It allows the government to access confidential credit reports, school records, and other records, without consent or notification. [San Francisco Chronicle, 9/8/2002] All of this information can now be given to the CIA, in violation of the CIA’s mandate prohibiting it from spying within the US. [Village Voice, 11/26/2001]
bullet 5) Financial institutions are encouraged to disclose possible violations of law or “suspicious activities” by any client. The institution is prohibited from notifying the person involved that it made such a report. The term “suspicious” is not defined, so it is up to the financial institutions to determine when to send such a report.
bullet 6) Federal agents can easily obtain warrants to review a library patron’s reading and computer habits (see January 2002). [Village Voice, 2/22/2002] Section 215 allows the FBI to ask the Foreign Intelligence Surveillance Court (FISC) for an order to obtain documents relating to counterterrorism investigations without meeting the usual standard of legal “probable cause” that a crime may have been committed. Senator Russ Feingold (D-WI—see October 9, 2001) says that Section 215 can allow the FBI to “go on a fishing expedition and collect information on virtually anyone.” Librarians will make Section 215 the centerpiece of their objections to the Patriot Act, arguing that the government can now “sweep up vast amounts of information about people who are not suspected of a crime.” In 2005, one librarian will say, “It reminds me of the Red Scare of the 1950s.” However, some FBI officials find it easier to use provisions of Section 505, which expands the usage of so-called “national security letters” (see November 28, 2001). [Roberts, 2008, pp. 39-40]
bullet 7) The government can refuse to reveal how evidence is collected against a suspected terrorist defendant. [Tampa Tribune, 4/6/2003]
Passes with No Public Debate - The law passes without public debate. [Village Voice, 11/9/2001; Village Voice, 11/26/2001] Even though it ultimately took six weeks to pass the law, there were no hearings or congressional debates. [Salon, 3/24/2003] Congressman Barney Frank (D-MA) says: “This was the least democratic process for debating questions fundamental to democracy I have ever seen. A bill drafted by a handful of people in secret, subject to no committee process, comes before us immune from amendment” (see October 2-4, 2001 and October 24, 2001). [Village Voice, 11/9/2001] Only 66 congresspeople, and one senator, Feingold, vote against it. Few in Congress are able to read summaries, let alone the fine print, before voting on it. [Los Angeles Times, 10/30/2001] Feingold says, “The new law goes into a lot of areas that have nothing to do with terrorism and have a lot to do with the government and the FBI having a wish list of things they want to do.” [Village Voice, 11/9/2001] Supporters of the act point out that some of its provisions will expire in four years, but in fact most provisions will not expire. [Chicago Tribune, 11/1/2001]
Mounting Opposition - One year later, criticism of the law will grow. [San Francisco Chronicle, 9/8/2002] Dozens of cities will later pass resolutions criticizing the Patriot Act (see January 12, 2003).

Entity Tags: George W. Bush, USA Patriot Act, Foreign Intelligence Surveillance Court, US Congress, Patsy Mink, Russell D. Feingold, Barney Frank

Timeline Tags: Complete 911 Timeline, Civil Liberties

A London Times article by Daniel McGrory claims that not only did Mohamed Atta meet with an Iraqi agent in Prague, but that “a special FBI team” is studying “a report from Prague that anthrax spores were given to Atta” during the meeting. Furthermore, “Saddam’s agents were spotted at various times this year with Atta in Germany, Spain, Italy and the Czech Republic,” and that Atta met with the agent in Prague at least four times. Additionally, an Iraqi intelligence agent in Rome was seen with Atta in Prague and Hamburg and then disappeared shortly before the 9/11 attacks. The article also alleges numerous meetings between Iraqi agents and Osama bin Laden, as well as a meeting between al-Qaeda second-in command Ayman Zawahiri and Iraqi Vice-President Taha Yasin Ramadan. Furthermore, al-Qaeda operatives were supposedly given advanced weapons training in Iraq supervised by Saddam Hussein’s son Uday Hussein. The article mentions no sources at all for these stunning allegations, except to refer to some other recent articles in a couple of cases. However, the article does mention former CIA Director James Woolsey, and it seems probable that Woolsey is a force behind the article, since he is in London at the time attempting to find evidence supporting the Prague meeting and Iraqi involvement in the anthrax attacks (see Mid-September-October 2001). [London Times, 10/27/2001] This article represents the height of the propaganda effort attempting to link al-Qaeda and the Iraqi government together. Many of the allegations in the article are never mentioned in any other newspaper article, and all of them will eventually be debunked.

Entity Tags: Ayman al-Zawahiri, Mohamed Atta, Osama bin Laden, Taha Yasin Ramadan, Uday Hussein

Timeline Tags: Events Leading to Iraq Invasion, 2001 Anthrax Attacks

Concerned that NSA post-9/11 surveillance operations violated the US Constitution, a senior NSA official reports on the program to House Intelligence Committee staff (see Before October 31, 2001), then retires. William Binney, a crypto-mathematician, had served in the NSA for 36 years. In 1997 he was made technical director of the World Geopolitical and Military Analysis Reporting Group, a 6000-employee unit that focused on signals intelligence (SIGINT) reporting and analysis. In the last part of his NSA career, Binney focused on dealing with the NSA’s problem of information overload, co-founding the Signals Intelligence Automation Research Center (SARC) and leading a 20-member team to develop a data-mining and analysis program called ThinThread. This program made it possible to “correlate data from financial transactions, travel records, Web searches, GPS equipment, and any other ‘attributes’ that an analyst might find useful,” and “could chart relationships among people in real time.” Unlike the NSA’s existing centralized data processing systems, ThinThread was able to identify useful or useless data as it was collected, reducing the overload problem. However, though it targeted foreign communications, ThinThread also intercepted those of Americans, and “continued documenting signals when a trail crossed into the US.” Binney incorporated measures to protect privacy, but NSA lawyers still considered the program too invasive, according to a 2011 article by Jane Mayer based on interviews with Binney and another NSA whistleblower, Thomas Drake. In 1999, NSA Director General Michael Hayden decided to fund a rival program, Trailblazer, which would be developed by defense contractors (see Late 1999). Trailblazer will be abandoned in 2006 as unworkable, after costing $1.2 billion (see January 2006). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012] In 2002, three NSA whistleblowers—Edward Loomis, J. Kirk Wiebe, and Binney—will ask the Pentagon to investigate the NSA for wasting “millions and millions of dollars” on Trailblazer. [Nation, 3/26/2013]
Post-9/11 NSA Surveillance Expansion - Binney will tell Mayer that, after the 9/11 attacks, his people began coming to him, saying things like: “They’re getting billing records on US citizens! They’re putting pen registers [call logs] on everyone in the country!” James Bamford will interview Binney in 2012 and write, “At the outset the program recorded 320 million calls a day, [Binney] says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” Binney has not been personally “read in” to this domestic surveillance program, but some members of his SARC team have, as their knowledge of ThinThread code was needed to set it up. Binney became convinced elements of ThinThread were being used, but without privacy protections, meaning US persons could be targeted. Soon after learning these things, Binney takes his concerns to the House Intelligence Committee (see Before October 31, 2001), and retires on October 31. He will tell Mayer, “I couldn’t be an accessory to subverting the Constitution.” Other sources support Binney’s account of this NSA data-mining and monitoring program (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, and October 2001). However, the claim that NSA domestic surveillance was initiated only after, and in response to, 9/11 is contradicted by information indicating that domestic monitoring programs and activities were established and conducted prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012]
ThinThread 'Would Likely Have Prevented 9/11' - Despite ThinThread’s capacity to collect actionable intelligence, Hayden vetoed the idea of deploying the system three weeks before 9/11, in August 2001. According to the Loomis, Wiebe, and Binney, this decision “left the NSA without a system to analyze the trillions of bits of foreign SIGINT flowing over the Internet at warp speed, as ThinThread could do.” During the summer of 2001, when “the system was blinking red,” according to CIA Director George Tenet, the NSA “failed to detect critical phone and e-mail communications that could have tipped US intelligence to al-Qaeda’s plans to attack.” [Nation, 3/26/2013]

Entity Tags: Edward Loomis, World Geopolitical and Military Analysis Reporting Group, J. Kirk Wiebe, William Binney, Thomas Drake, House Intelligence Committee, James Bamford, Trailblazer, Jane Mayer, National Security Agency, Signals Intelligence Automation Research Center, Michael Hayden, Thinthread

Timeline Tags: Civil Liberties

Abu Zeinab al-Qurairy, posing as Jamal al-Ghurairy for Frontline.Abu Zeinab al-Qurairy, posing as Jamal al-Ghurairy for Frontline. [Source: PBS]An Iraqi defector identifying himself as Jamal al-Ghurairy, a former lieutenant general in Saddam Hussein’s intelligence corps, the Mukhabarat, tells two US reporters that he has witnessed foreign Islamic militants training to hijack airplanes at an alleged Iraqi terrorist training camp at Salman Pak, near Baghdad. Al-Ghurairy also claims to know of a secret compound at Salman Pak where Iraqi scientists, led by a German, are producing biological weapons. Al-Ghurairy is lying both about his experiences and even his identity, though the reporters, New York Times war correspondent Chris Hedges and PBS’s Christopher Buchanan, do not know this. The meeting between al-Ghurairy and the reporters, which takes place on November 6, 2001, in a luxury suite in a Beirut hotel, was arranged by Ahmed Chalabi’s Iraqi National Congress (INC). Buchanan later recalls knowing little about al-Ghurairy, except that “[h]is life might be in danger. I didn’t know much else.” Hedges recalls the former general’s “fierce” appearance and “military bearing.… He looked the part.” Al-Ghurairy is accompanied by several other people, including the INC’s political liaison, Nabeel Musawi. “They were slick and well organized,” Buchanan recalls. Hedges confirms al-Ghurairy’s credibility with the US embassy in Turkey, where he is told that CIA and FBI agents had recently debriefed him. The interview is excerpted for an upcoming PBS Frontline episode, along with another interview with an INC-provided defector, former Iraqi sergeant Sabah Khodada, who echoes al-Ghurairy’s tale. While the excerpt of al-Ghurairy’s interview is relatively short, the interview itself takes over an hour. Al-Ghurairy does not allow his face to be shown on camera.
Times Reports Defectors' Tale - Two days later, on November 8, Hedges publishes a story about al-Ghurairy in the New York Times Times. The Frontline episode airs that same evening. [New York Times, 11/8/2001; Mother Jones, 4/2006] Hedges does not identify al-Ghurairy by name, but reports that he, Khodada, and a third unnamed Iraqi sergeant claim to have “worked for several years at a secret Iraqi government camp that had trained Islamic terrorists in rotations of five or six months since 1995. They said the training at the camp, south of Baghdad, was aimed at carrying out attacks against neighboring countries and possibly Europe and the United States.” Whether the militants being trained are linked to al-Qaeda or Osama bin Laden, the defectors cannot be sure, nor do they know of any specific attacks carried out by the militants. Hedges writes that the interviews were “set up by an Iraqi group that seeks the overthrow of… Hussein.” He quotes al-Ghurairy as saying, “There is a lot we do not know. We were forbidden to speak about our activities among each other, even off duty. But over the years, you see and hear things. These Islamic radicals were a scruffy lot. They needed a lot of training, especially physical training. But from speaking with them, it was clear they came from a variety of countries, including Saudi Arabia, Yemen, Algeria, Egypt, and Morocco. We were training these people to attack installations important to the United States. The Gulf War never ended for Saddam Hussein. He is at war with the United States. We were repeatedly told this.” He uses Khodada’s statements as support for al-Ghurairy’s, identifies Khodada by name, and says that Khodada “immigrated to Texas” in May 2001 “after working as an instructor for eight years at Salman Pak…” He quotes the sergeant as saying, “We could see them train around the fuselage. We could see them practice taking over the plane.” Al-Ghurairy adds that the militants were trained to take over a plane without using weapons. Hedges reports that Richard Sperzel, the former chief of the UN biological weapons inspection teams in Iraq, says that the Iraqis always claimed Salman Pak was an anti-terror training camp for Iraqi special forces. However, Sperzel says, “[M]any of us had our own private suspicions. We had nothing specific as evidence.” The US officials who debriefed al-Ghurairy, Hedges reports, do not believe that the Salman Pak training has any links to the 9/11 hijackings. Hedges asks about one of the militants, a clean-shaven Egyptian. “No, he was not Mohamed Atta.” Atta led the 9/11 hijackers. Hedges notes that stories such as this one will likely prompt “an intense debate in Washington over whether to extend the war against Osama bin Laden and the Taliban government of Afghanistan to include Iraq.” [New York Times, 11/8/2001; Columbia Journalism Review, 7/1/2004]
Heavy Press Coverage - The US media immediately reacts, with op-eds running in major newspapers throughout the country and cable-news pundits bringing the story to their audiences. National security adviser Condoleezza Rice says of the story, “I think it surprises no one that Saddam Hussein is engaged in all kinds of activities that are destabilizing.” The White House will use al-Ghurairy’s claims in its background paper, “Decade of Deception and Defiance,” prepared for President’s Bush September 12, 2002 speech to the UN General Assembly (see September 12, 2002). Though the tale lacks specifics, it helps bolster the White House’s attempts to link Saddam Hussein to the 9/11 hijackers, and helps promote Iraq as a legitimate target in the administration’s war on terror. (Five years later, the reporters involved in the story admit they were duped—see April 2006.)
Complete Fiction - The story, as it turns out, is, in the later words of Mother Jones reporter Jack Fairweather, “an elaborate scam.” Not only did US agents in Turkey dismiss the purported lieutenant general’s claims out of hand—a fact they did not pass on to Hedges—but the man who speaks with Hedges and Buchanan is not even Jamal al-Ghurairy. The man they interviewed is actually a former Iraqi sergeant living in Turkey under the pseudonym Abu Zainab. (His real name is later ascertained to be Abu Zeinab al-Qurairy, and is a former Iraqi general and senior officer in the Mukhabarat.) The real al-Ghurairy has never left Iraq. In 2006, he will be interviewed by Fairweather, and will confirm that he was not the man interviewed in 2001 (see October 2005). [Columbia Journalism Review, 7/1/2004; Mother Jones, 4/2006] Hedges and Buchanan were not the first reporters to be approached for the story. The INC’s Francis Brooke tried to interest Newsweek’s Michael Isikoff in interviewing Khodada to discuss Salman Pak. Isikoff will recall in 2004 that “he didn’t know what to make of the whole thing or have any way to evaluate the story so I didn’t write about it.” [Columbia Journalism Review, 7/1/2004]
"The Perfect Hoax" - The interview was set up by Chalabi, the leader of the INC, and former CBS producer Lowell Bergman. Bergman had interviewed Khodada previously, but was unable to journey to Beirut, so he and Chalabi briefed Hedges in London before sending him to meet with the defector. Chalabi and Bergman have a long relationship; Chalabi has been a source for Bergman since 1991. The CIA withdrew funding from the group in 1996 (see January 1996) due to its poor intelligence and attempts at deception. For years, the INC combed the large Iraqi exile communities in Damascus and Amman for those who would trade information—real or fabricated—in return for the INC’s assistance in obtaining asylum to the West. Helping run that network was Mohammed al-Zubaidi, who after 9/11 began actively coaching defectors, according to an ex-INC official involved in the INC’s media operations (see December 17, 2001 and July 9, 2004). The ex-INC official, Adnan Ihsan Saeed al-Haideri, did everything from help defectors brush up and polish their stories, to concocting scripts that defectors with little or no knowledge could recite: “They learned the words, and then we handed them over to the American agencies and journalists.” After 9/11, the INC wanted to come up with a big story that would fix the public perception of Saddam Hussein’s involvement in the 9/11 attacks. Al-Zubaidi was given the task. He came up with al-Ghurairy. He chose Zainab for his knowledge of the Iraqi military, brought him to Beirut, paid him, and began prepping him. In the process, al-Zainab made himself known to American and Turkish intelligence officials as al-Ghurairy. “It was the perfect hoax,” al-Haideri will recall in 2006. “The man was a born liar and knew enough about the military to get by, whilst Saddam’s regime could hardly produce the real Ghurairy without revealing at least some of the truth of the story.” Al-Haideri will say that the reality of the Salman Pak story was much as the Iraqis claimed—Iraqi special forces were trained in hostage and hijack scenarios. Al-Zubaidi, who in 2004 will admit to his propaganda activities, calls Al-Zainab “an opportunist, cheap and manipulative. He has poetic interests and has a vivid imagination in making up stories.” [Mother Jones, 4/2006]
Stories Strain Credulity - Knight Ridder reporter Jonathan Landay later says of al-Qurairy, “As you track their stories, they become ever more fantastic, and they’re the same people who are telling these stories, until you get to the most fantastic tales of all, which appeared in Vanity Fair magazine.” Perhaps al-Qurairy’s most fabulous story is that of a training exercise to blow up a full-size mockup of a US destroyer in a lake in central Iraq. Landay adds, “Or, jumping into pits of fouled water and having to kill a dog with your bare teeth. I mean, and this was coming from people, who are appearing in all of these stories, and sometimes their rank would change.… And, you’re saying, ‘Wait a minute. There’s something wrong here, because in this story he was a major, but in this story the guy’s a colonel. And, in this story this was his function, but now he says in this story he was doing something else.’” Landay’s bureau chief, John Walcott, says of al-Qurairy, “What he did was reasonably clever but fairly obvious, which is he gave the same stuff to some reporters that, for one reason or another, he felt would simply report it. And then he gave the same stuff to people in the Vice President’s office [Dick Cheney] and in the Secretary of Defense’s office [Donald Rumsfeld]. And so, if the reporter called the Department of Defense or the Vice President’s office to check, they would’ve said, ‘Oh, I think that’s… you can go with that. We have that, too.’ So, you create the appearance, or Chalabi created the appearance, that there were two sources, and that the information had been independently confirmed, when, in fact, there was only one source. And it hadn’t been confirmed by anybody.” Landay adds, “[L]et’s not forget how close these people were to this administration, which raises the question, was there coordination? I can’t tell you that there was, but it sure looked like it.” [PBS, 4/25/2007]
No Evidence Found - On April 6, 2003, US forces will overrun the Salman Pak facility. They will find nothing to indicate that the base was ever used to train terrorists (see April 6, 2003).

Entity Tags: Osama bin Laden, Richard (“Dick”) Cheney, Richard Sperzel, Newsweek, Saddam Hussein, Taliban, New York Times, Sabah Khodada, Washington Post, United Nations, Vanity Fair, Nabeel Musawi, Public Broadcasting System, Mother Jones, Ahmed Chalabi, Adnan Ihsan Saeed al-Haideri, Abu Zeinab al-Qurairy, Chris Hedges, Al-Qaeda, CBS News, Bush administration (43), Central Intelligence Agency, Mukhabarat, Donald Rumsfeld, Condoleezza Rice, Francis Brooke, Lowell Bergman, Michael Isikoff, Mohammed al-Zubaidi, Jonathan Landay, John Walcott, Jamal al-Ghurairy, Jack Fairweather, Federal Bureau of Investigation, Christopher Buchanan, Iraqi National Congress

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion, Domestic Propaganda

The State Department’s Bureau of Intelligence and Research (INR) says in a report, according to INR official Greg Thielmann, that “there is no persuasive evidence that the Iraqi nuclear program is being reconstituted.” [New Yorker, 10/27/2003 Sources: Greg Thielmann]

Entity Tags: Bureau of Intelligence and Research

Timeline Tags: Events Leading to Iraq Invasion

The US Embassy in Niamey, Niger’s capital, disseminates a cable summarizing a recent meeting between the US ambassador and the director general of Niger’s French-led mining consortium. The director general reportedly explained that “there was no possibility” that the government of Niger could have diverted any of the 3,000 tons of uranium produced by the consortium’s two mines. [US Congress, 7/7/2004]

Timeline Tags: Niger Uranium and Plame Outing

The CIA reports in a classified Senior Executive Memorandum, titled “What We Knew About Iraq’s Centrifuge-Based Uranium Enrichment Program Before and After the Gulf War,” that while there are “divergent views” about the intended use of the aluminum tubes imported by Iraq (see July 2001), the interagency consensus is that the tubes could be used for centrifuge enrichment. [The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (aka 'Robb-Silberman Commission'), 3/31/2005]

Entity Tags: Central Intelligence Agency

Timeline Tags: Events Leading to Iraq Invasion

Assistant Secretary of Defense Peter Rodham, who works in Undersecretary of Defense Douglas Feith’s office, asks Deputy Defense Secretary Paul Wolfowitz to “[o]btain approval of creation of a Team B” (see Early 1976) which “[t]hrough independent analysis and evaluation… would determine what is known about al-Qaeda’s worldwide terror network, its suppliers, and relationship to states and other international terrorist organizations.” The 1976 Team B exercise was a deeply flawed effort by conservatives and neoconservatives to second-guess the US intelligence community’s findings about Soviet military and intelligence capabilities (see November 1976). Feith studied under Team B leader Richard Pipes at Harvard, and shares his fundamental distaste and mistrust of US intelligence capabilities. Feith and Wolfowitz believe that “Team B” showed just how limited and misguided the CIA’s intelligence reporting could be, and think that the same “Team B” approach could provide heretofore-unrevealed information about Islamist terrorism. Feith sets about producing a report “proving” a sinister relationship between al-Qaeda and Iraq (see July 25, 2002), while Wolfowitz begins work on what will become the Office of Special Plans (see September 2002). [Scoblic, 2008, pp. 218-220]

Entity Tags: Paul Wolfowitz, ’Team B’, Al-Qaeda, Central Intelligence Agency, Douglas Feith, Office of Special Plans, US Department of Defense, Richard Pipes, Peter Rodham

Timeline Tags: Complete 911 Timeline, US International Relations, Neoconservative Influence

Manucher Ghorbanifar.Manucher Ghorbanifar. [Source: Ted Thai / Getty Images]The Bush administration sends two defense officials, Harold Rhode and Larry Franklin, to meet with Iranians in Rome in response to an Iranian government offer to provide information relevant to the war on terrorism. The offer had been backchanneled by the Iranians to the White House through Manucher Ghorbanifar, an Iranian arms trader and a central person in the Iran-Contra affair, who contacted another Iran-Contra figure, Michael Ledeen of the American Enterprise Institute. Ledeen passed the information on to his friends in the Defense Department who then relayed the offer to Deputy National Security Adviser Stephen Hadley. Hadley, who expressed no reservations about the proposed meeting, informed CIA Director George Tenet and Deputy Secretary of State Richard L. Armitage. According to officials interviewed by the New York Times, the United States Embassy in Rome was not notified of the planned meeting as required by standard interagency procedures. Neither the US embassy nor the CIA station chief in Rome learns of the three-day meeting until after it happens (see December 12, 2001). When they do catch wind of the meeting, they notify CIA and State Department headquarters in Washington which complain to the administration about how the meetings were arranged. [Newsday, 8/9/2003; Washington Post, 8/9/2003; New York Times, 12/7/2003] In addition to Ghorbanifar, Ledeen, Franklin, and Rhode, the meeting is attended by Nicolo Pollari, head of SISMI, and Antonio Martino, Italy’s minister of defense. [Washington Monthly, 9/2004]
Destabilizing the Iraqi Government - According to the Boston Globe, either at this meeting, a similar one in June (see June 2002), or both, Ledeen and Ghorbanifar discuss ways to destabilize the Iranian government, possibly using the Mujahedeen-e Khalq (MEK), a US-designated terrorist group, as a US proxy. [Boston Globe, 8/31/2004] The meetings are suspected of being an attempt by what investigative reporters Joshua Micah Marshall, Laura Rozen, and Paul Gastris will later call “a rogue faction at the Pentagon… trying to work outside normal US foreign policy channels to advance a ‘regime-change’ agenda.” The fact that MEK members attend the meetings adds weight to the claim. [Unger, 2007, pp. 234-235]
Italian Intelligence on Iraq-Niger Allegations - Additionally, according to an unnamed SISMI source, Pollari speaks with Ledeen about intelligence his agency has collected (see October 15, 2001) suggesting that Iraq made a deal with Niger to purchase several tons of uranium. SISMI already sent a report to Washington on the matter in mid-October (see October 15, 2001). Reportedly, Pollari has also approached CIA Station Chief Jeff Castelli about the report, but Castelli has since indicated he is not interested in the information. [La Repubblica (Rome), 10/25/2005]

Entity Tags: Manucher Ghorbanifar, People’s Mujahedin of Iran, Paul Gastris, Stephen J. Hadley, Michael Ledeen, Larry Franklin, Nicolo Pollari, Harold Rhode, Joshua Micah Marshall, Laura Rozen, George J. Tenet, Antonio Martino

Timeline Tags: US confrontation with Iran, Events Leading to Iraq Invasion, Iran-Contra Affair, Neoconservative Influence, Niger Uranium and Plame Outing

According to a later report by the Senate Intelligence Committee, Pentagon officials conceal potentially life-saving intelligence gleaned from Iranian agents. The report will find that in 2001, the officials, Larry Franklin and Harold Rhode, fail to pass along information gained from Iranian agents to US intelligence agencies, including reports that Iran has sent “hit squads” to Afghanistan to kill Americans. The findings will be based on information from highly unreliable sources: Iranian arms merchant Manucher Ghorbanifar and former Pentagon official Michael Ledeen, both of whom have often provided false or questionable information gathered from questionable sources (see April 3, 2005). In a series of meetings authorized by then-Deputy National Security Adviser Stephen Hadley (see December 9, 2001, December 12, 2001, June 2002, July 2002, and June 2003), two Pentagon officials, including one who reported to then-Undersecretary of Defense for Policy Douglas Feith (see September 2002), meet with Ghorbanifar, Ledeen, and other Iranians. Hadley does not fully brief CIA Director George Tenet and Deputy Secretary of State Richard Armitage about the meetings. The head of the DIA is briefed on the meeting but is not authorized to keep a written summary of it or to discuss it on the orders of then-Deputy Defense Secretary Paul Wolfowitz. For his part, Ledeen will say he twice briefed the US ambassador to Italy about the meetings. “Any time the CIA wanted to find out what was going on all they had to do was ask,” he will say. Though the report will admit that the sources of the intelligence are unreliable, it will still criticize the Pentagon for failing to allow what it calls “potentially useful and actionable intelligence” to be shared with intelligence agencies. [Associated Press, 6/5/2008; Senate Intelligence Committee, 6/5/2008 pdf file]

Entity Tags: US Department of Defense, George J. Tenet, Douglas Feith, Manucher Ghorbanifar, Stephen J. Hadley, Michael Ledeen, Richard Armitage, Paul Wolfowitz, Senate Intelligence Committee

Timeline Tags: US confrontation with Iran

The CIA issues a Senior Executive Memorandum, titled “The Iraqi Threat,” stating, “[W]e believe a shipment of…tubes…[are] destined for use in Iraqi gas centrifuges.” [The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (aka 'Robb-Silberman Commission'), 3/31/2005]

Entity Tags: Central Intelligence Agency

Timeline Tags: Events Leading to Iraq Invasion

Sometime in early 2002, President Bush signs a secret executive order authorizing the National Security Agency (NSA) to wiretap phone conversations and read e-mails to and from US citizens. The order extends an operation set into motion at least as early as October 2001 to begin wiretapping US citizens’ phones in a response to the 9/11 attacks. When the program is revealed by the US media in late 2005 (see December 15, 2005), Bush and his officials will say the program is completely legal, though it ignores the requirements of the Foreign Intelligence Surveillance Act (FISA) that requires the government to obtain court-issued warrants to mount surveillance against US citizens. They will insist that only those suspected of having ties to al-Qaeda are monitored, and only when those individuals make or receive international communications. [New York Times, 12/15/2005; Washington Post, 12/22/2005; Newsweek, 12/22/2008] Bush’s order authorizes the NSA to monitor international telephone conversations and international e-mails of hundreds, and perhaps thousands, of US citizens without court warrants, in an effort to track what officials call “dirty numbers” linked to al-Qaeda. When the program is finally revealed by the New York Times over three years later (see December 15, 2005), officials will say that the NSA still seeks warrants to monitor domestic communications. But there is little evidence of this (see, for example, Spring 2001). The presidential order is a radical shift in US surveillance and intelligence-gathering policies, and a major realignment for the NSA, which is mandated to only conduct surveillance abroad. Some officials believe that the NSA’s domestic eavesdropping crosses constitutional limits on legal searches. “This is really a sea change,” a former senior official who specializes in national security law will say in December 2005. “It’s almost a mainstay of this country that the NSA only does foreign searches.” [New York Times, 12/15/2005] Some sources indicate that NSA domestic surveillance activities, such as data-mining, the use of information concerning US persons intercepted in foreign call monitoring, and possibly direct surveillance of US persons, took place prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: George W. Bush, Al-Qaeda, Foreign Intelligence Surveillance Court, National Security Agency

Timeline Tags: Civil Liberties

Vice Admiral John Poindexter testifying before Congress in the Iran Contra hearings in 1987.Vice Admiral John Poindexter testifying before Congress in the Iran Contra hearings in 1987. [Source: Associated Press]Vice Admiral John Poindexter begins running a shadowy new government agency called the Information Awareness Office. [New York Times, 2/13/2002; Federal Computer Week, 10/17/2002] Poindexter, formerly President Reagan’s National Security Adviser, is known for his five felony convictions of lying to Congress, destroying documents, and obstructing Congress in its investigation of his role in the mid-1980s Iran-Contra affair. Later his convictions were overturned on a technicality. [Los Angeles Times, 11/17/2002] Far from apologizing, Poindexter said it was his duty to lie to Congress. [Newsday, 12/1/2002] The New York Times notes that his new agency “is developing technologies to give federal officials instant access to vast new surveillance and information-analysis systems.” The new office is part of DARPA, the Defense Advanced Research Projects Agency. Poindexter was also known for his controversial role in shifting control of computer security to the military in the 1980s. Says Marc Rotenberg, former counsel for the Senate Judiciary Committee, “It took three administrations and both political parties over a decade to correct those mistakes.” [New York Times, 2/13/2002] Surprisingly, Poindexter’s appointment is little noticed until later in 2002 when the Total Information Awareness program is revealed (see March 2002; November 9, 2002). Incidentally, several others involved in the Iran-Contra affair also find jobs in the Bush Administration, including Elliott Abrams, John Negroponte, and Otto Reich. [Observer, 12/8/2002]

Entity Tags: Total Information Awareness, Defense Advanced Research Projects Agency, John Poindexter

Timeline Tags: Civil Liberties, Iran-Contra Affair

The CIA Directorate of Operations issues a second intelligence report from SISMI, Italy’s military intelligence service, on Iraq’s alleged agreement with Niger to purchase 500 tons of uranium annually. This report provides details that were not included in Italy’s October 15 report (see October 15, 2001), including a “verbatim text” of the accord. (It is not clear what the source is for the “verbatim text”. [ERiposte, 3/6/2006] ) According to the report, the purported agreement was signed by Iraqi and Niger officials during meetings held July 5-6, 2000. [US Congress, 7/7/2004; Knight Ridder, 11/4/2005] The SISMI report also draws attention to a 1999 trip to Niger made by Wissam al-Zahawie (see February 1999), Iraq’s former ambassador to the Vatican, and alleges that its mission was to discuss the future purchase of uranium. This is the first report from SISMI that names al-Zahawie and refers directly to his 1999 trip. (SISMI’s previous report had only stated that negotiations had begun by at least 1999.) This report, as well as the previous report, is based on the forged Niger documents. [New Yorker, 10/27/2003; US Congress, 7/7/2004; ERiposte, 11/3/2005] Analysts at the CIA and the DIA are more impressed with the detail and substance of this second report, but analysts at the Department of State’s Bureau of Intelligence and Research (INR) remain skeptical of the report’s allegations noting that it was unlikely that Niger would sell uranium to Iraq because the Nigeriens would have considered the risk of being caught too great. An INR analyst asks the CIA if the source of the report would submit to a polygraph. A CIA analyst who also asks about the source is told by the DO that the source is “very credible.” [US Congress, 7/7/2004]

Entity Tags: Central Intelligence Agency, Bureau of Intelligence and Research, Defense Intelligence Agency

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

Unnamed US intelligence officials tell the New York Times that the CIA has no evidence that Saddam Hussein’s government has participated in any militant operations against the United States in nearly a decade. The agency also believes that Saddam Hussein has not provided chemical or biological weapons to al-Qaeda or other militant Islamic organizations. [New York Times, 2/6/2002 Sources: Unnamed US Intelligence Officials]

Entity Tags: Saddam Hussein

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion

After several meetings with Mohammad Harith (see February 11, 2002) —an Iraqi defector provided by the Iraqi National Congress—a Defense Intelligence Agency debriefer determines that the defector’s information on Iraq’s presumed arsenal of banned weapons seems “accurate, but much of it [appears] embellished.” Defense Intelligence Agency analysts also determine that the defected Iraqi has been “coached by the Iraqi National Congress.” Harith claims that he was a major in an Iraqi intelligence unit charged with concealing illicit weapons and that Iraq has developed mobile biological weapons labs. [Knight Ridder, 7/16/2004]

Entity Tags: Mohammad Harith, Iraqi National Congress

Timeline Tags: Events Leading to Iraq Invasion

Joseph Wilson.Joseph Wilson. [Source: public domain]The CIA sends Joseph C. Wilson, a retired US diplomat, to Niger to investigate claims that Iraq had sought to purchase uranium from that country (see February 13, 2002). The CIA pays Wilson’s expenses for the trip, but does not pay him in any other respect. The identity of the party who requests the mission is later disputed. While Wilson will claim the trip was requested directly by Dick Cheney’s office, other sources will indicate that the CIA had decided (see February 19, 2002) that a delegation to Niger was needed in order to investigate questions raised by one of Dick Cheney’s aides (see (February 13, 2002)). [New York Times, 5/6/2003; Washington Post, 6/12/2003 pdf file; Independent, 6/29/2003; New York Times, 7/6/2003; US Congress, 7/7/2004]
Reason behind Request - Former CIA analyst Melvin Goodman will later note that “Wilson was asked to go to Niger for one specific purpose. It was the CIA’s idea to get Cheney off their backs. Cheney would not get off their backs about the yellowcake documents. They couldn’t get Cheney to stop pressing the issue. He insisted that was the proof of reconstitution of [Iraq’s nuclear] program.” [Dubose and Bernstein, 2006, pp. 214]
Normal Skepticism - Wilson goes into the situation with a healthy dose of skepticism. “My skepticism was the same as it would have been with any unverified intelligence report, because there is a lot of stuff that comes over the transom every day,” he will recall in 2006. Wilson knows nothing of the influence of the Pentagon neoconservatives (see July 8, 1996, January 26, 1998, July 1998, September 2000, Late December 2000 and Early January 2001, Shortly after January 20, 2001, and Shortly After September 11, 2001) or the growing rift in the intelligence community over the reports: “I was aware that the neocons had a growing role in government and that they were interested in Iraq,” he will recall. “But the administration had not articulated a policy at this stage.” He is not given a copy of the Niger documents before leaving for Africa, nor is he told of their history. “To the best of my knowledge, the documents were not in the possession of the [CIA] at the time I was briefed,” he will recall. “The discussion was whether or not this report could be accurate. During this discussion, everyone who knew something shared stuff about how the uranium business worked, and I laid out what I knew about the government in Niger, what information they could provide.” With this rather sketchy preparation, Wilson leaves for Niger. [Unger, 2007, pp. 240; Wilson, 2007, pp. 113] Wilson’s wife, senior CIA case officer Valerie Plame Wilson, will later write, “He figured that if the vice president had asked a serious and legitimate question, it deserved a serious answer and he would try to help find it.” [Wilson, 2007, pp. 111]
No Trouble Finding Information - Wilson, who knows the Nigerien government and many of its officials, has little trouble finding the information he needs in the following week. In 2006, he will recall: “Niger has a simplistic government structure. Both the minister of mines and the prime minister had gone through the mines. The French were managing partners of the international consortium [which handles Niger’s uranium]. The French mining company actually had its hands on the project. Nobody else in the consortium had operators on the ground.” Wilson also personally knows Wissam al-Zahawie, Iraq’s ambassador to the Vatican who supposedly negotiated the uranium deal with Niger (see February 1999). Wilson will later observe: “Wissam al-Zahawie was a world-class opera singer, and he went to the Vatican as his last post so he could be near the great European opera houses in Rome. He was not in the Ba’athist inner circle. He was not in Saddam [Hussein]‘s tribe. The idea that he would be entrusted with the super-secret mission to buy 500 tons of uranium from Niger is out of the question.” [Unger, 2007, pp. 240-241] Wilson meets with, among other officials, Niger’s former minister of mines, Mai Manga. As later reported by the Senate Intelligence Committee (see July 9, 2004), Manga tells Wilson “there were no sales outside of International Atomic Energy Agency (IAEA) channels since the mid-1980s,” and he “knew of no contracts signed between Niger and any rogue states for the sale of uranium.” Manga says a “French mining consortium controls Nigerien uranium mining and keeps the uranium very tightly controlled from the time it is mined until the time it is loaded onto ships in Benin for transport overseas,” and, “it would be difficult, if not impossible, to arrange a special shipment of uranium to a pariah state given these controls.” [CounterPunch, 11/9/2005]
Meeting with US Ambassador - Wilson arrives in Niger on February 26, two days after Marine General Carlton W. Fulford Jr.‘s meeting (see February 24, 2002) with Nigerien officials. Wilson first meets with US Ambassador to Niger Barbro Owens-Kirkpatrick, a veteran Foreign Service official, whom Wilson will later describe as “crisp” and well-informed. Over tea in the US Embassy offices in Niamey, Niger’s capital, Owens-Kirkpatrick tells Wilson that she has already concluded that the allegations of uranium sales to Iraq are unfounded. “She had already debunked them in her reports to Washington,” Wilson will later recall. “She said, yeah, she knew a lot about this particular report. She thought she had debunked it—and, oh, by the way, a four-star Marine Corps general had been down there as well—Carlton Fulford. And he had left satisfied there was nothing to report.” [Wilson, 2004, pp. 20-22]
Details of Alleged Uranium Production - Niger extracts uranium from two mines, both located in remote locations in the Sahara Desert. It takes well over a day to drive from the mines to Niamey. The mines are owned by a consortium of foreign companies and the Nigerien government, and managed by a French mining company, COGEMA. Because of a recent upswing in the production of Canadian uranium, Niger’s uranium is mined at a net loss, and its only customers are consortium members. Wilson will later write, “[T]he Nigerien government has sold no uranium outside the consortium for two decades.” If Iraq had bought 500 tons of uranium, as the story is told, that would have represented a 40 percent production increase. “There is no doubt,” Wilson will later write, “that such a significant shift from historic production schedules would have been absolutely impossible to hide from the other partners, and most certainly from the managing partner, COGEMA. Everyone involved would have known about it.” Any Nigerien government decision to produce such an amount of uranium would have involved numerous government officials and many well-documented meetings. Because the transaction would have been to a foreign country, Niger’s Foreign Ministry would also have been involved in the decision. To sell Iraq uranium during that time would have been a violation of international law and of UN sanctions against Iraq, a weighty decision that would have ultimately been made by the president of Niger in conjuction with the foreign minister and the minister of mines. Such a decision would have been published in the Nigerien equivalent of the Federal Register and would have dramatic tax and revenue implications. The unexpected huge infusion of cash from the sale would have had a strong impact on the Nigerien economy, and would have been much anticipated and talked about throughout the Nigerien business community. [Wilson, 2004, pp. 22-25]
Off-the-Books Production Virtually Impossible - It is conceivable that such an enormous operation could have been conducted entirely “off the books,” Wilson will write, but virtually impossible to pull off. True, a military junta was in power at the time of the alleged sale, one that felt no responsibility or accountability to the Nigerien people. But even a secret transaction would have been impossible to conceal. Such a transaction would have involved thousands of barrels of clandestinely shipped uranium, extensive and complex adjustments to shipping schedules, and other ramifications. “It simply could not have happened without a great many people knowing about it, and secrets widely known do not remain hidden for long. And again, COGEMA, as the managing partner, would have had to know and be complicit.” Add to that Niger’s dependence on US foreign economic aid and its unwillingness to threaten the loss of that aid by secretly shipping uranium to a country that the US considers a dangerous rogue nation. All told, Wilson concludes, the possibility of such a clandestine operation is remote in the extreme. [Wilson, 2004; Wilson, 2004]
1999 Meeting with Iraqi Official - While speaking with a US Embassy official, Wilson learns about a 1999 meeting between the embassy official and an Iraqi representative in Algiers, perhaps in concert with a similar meeting between Iraqi officials and Niger’s prime minister (see June 1999). [Wilson, 2004, pp. 27-28]
Confirmation that Allegations are Unrealistic - After spending several days talking with current government officials, former government officials, and people associated with the country’s uranium business, Wilson concludes the rumors are completely false. He will later call the allegations “bogus and unrealistic.” [Washington Post, 6/12/2003 pdf file; Knight Ridder, 6/13/2003; Independent, 6/29/2003; New York Times, 7/6/2003; CBS News, 7/11/2003; Vanity Fair, 1/2004; Wilson, 2004, pp. 20-28, 424; Vanity Fair, 5/2004, pp. 282; Wilson, 2007, pp. 113]

Entity Tags: Barbro Owens-Kirkpatrick, Wissam al-Zahawie, Carlton W. Fulford, COGEMA, Mai Manga, Valerie Plame Wilson, Muhammad Saeed al-Sahhaf, Melvin A. Goodman, Central Intelligence Agency, Richard (“Dick”) Cheney, Joseph C. Wilson

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

While former ambassador Joseph Wilson is still in Africa learning about the supposed Iraq-Niger uranium deal (see February 21, 2002-March 4, 2002), Douglas Rohn, an analyst for the State Department’s Bureau of Intelligence and Research (INR), writes an intelligence assessment, titled “Niger: Sale of Uranium to Iraq Is Unlikely,” that disputes recent Italian intelligence reports (see October 15, 2001 and February 5, 2002) suggesting that Iraq attempted to purchase uranium from Niger. The assessment reiterates INR’s view that France controls the uranium industry and “would take action to block a sale of the kind alleged in a CIA report of questionable credibility from a foreign government service.” It adds that though “some officials may have conspired for individual gain to arrange a uranium sale,” Nigerien President Mamadou Tandja’s government would have been unlikely to risk relations with the US and other key aid donors. And it cites the logistical difficulties of a secret transaction requiring “25 hard-to-conceal 10-ton trailers” that would have had to travel 1,000 miles and cross one international border before reaching the sea. “A whole lot of things told us that the report was bogus,” Greg Thielmann, a high-ranking INR official, will later explain to Time magazine. “This wasn’t highly contested. There weren’t strong advocates on the other side. It was done, shot down.” The assessment, drafted in response to interest from the vice president’s office (see (February 13, 2002)), is sent to the White House Situation Room and Secretary of State Colin Powell. [Time, 7/21/2003; US Congress, 7/7/2004, pp. 59; Isikoff and Corn, 2006, pp. 96-97; Unger, 2007, pp. 241]

Entity Tags: Mamadou Tandja, US Department of State, Joseph C. Wilson, Douglas Rohn, Bureau of Intelligence and Research, Greg Thielmann, Colin Powell

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

The Office of Africa Analysis in the State Department’s Bureau of Intelligence and Research (INR) argues in a memo that the alleged uranium deal between Iraq and Niger is “unlikely” for a number of reasons. It notes that France—which jointly owns the country’s only two uranium mines and is dependent on them for forty percent of its uranium—“unequivocally controls the overall operation” and would not permit such a transaction to take place. “There are managers and engineers at every point in the mining, milling, and transportation process,” the memo says. Even if Niger did manage to obtain 500 tons of uranium from the mines, transporting it to Iraq (in two phases, as specified in the orginal forged documents) would have required “25 hard-to-conceal 10-ton tractor-trailers” journeying 1,000 miles to the sea and crossing at least one international border. “Moving such a quantity secretly over such a distance would be very difficult,” the memo notes. Furthermore, Niger officials would have deemed such an arrangement too risky because they “understand the value of good relations with the US and other aid donors.” “A payoff from Iraq of $50 million or even $100 million would not make up for what would be lost if the donor community turned off the taps to Niger.” [US Department of State, 3/4/2002 pdf file] The memo is distributed at senior levels by the office of Secretary of State Colin L. Powell and by the Defense Intelligence Agency. [New York Times, 1/18/2006] (Note the similarity between this memo and the one INR released three days earlier (see March 1, 2002). It is not clear how they are related or if indeed they are actually the same)

Entity Tags: Defense Intelligence Agency, Bureau of Intelligence and Research

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

Britain’s Joint Intelligence Committee (JIC) notes in a report that the International Atomic Energy Agency has looked into the CIA’s claims (see April 10, 2001, June 20, 2001, June 30, 2001, November 24, 2001, and December 15, 2001) about the aluminum tubes sought by Iraq and has concluded that they could, “with some modifications… be suitable for use in centrifuges.” But the JIC report also adds that the British “have no definitive intelligence that the aluminum was destined for a nuclear program.” [United Kingdom, 7/14/2004 pdf file]

Entity Tags: Joint Intelligence Committee

Timeline Tags: Events Leading to Iraq Invasion

Peter Ricketts, the British Foreign Office’s political director, offers advice to Foreign Secretary Jack Straw who is to provide Tony Blair with a note (see March 25, 2002) before he sets off for a planned meeting with Bush in Texas. In the memo, Ricketts recommends that Blair back the Bush policy on regime change, in a broad sense, because it would allow the British to exert some influence on the exact shape of the administration’s policy. “In the process, he can bring home to Bush some of the realities which will be less evident from Washington,” he says. “He can help Bush make good decisions by telling him things his own machine probably isn’t.” But he acknowledges that the British, in backing US plans against Iraq, may have a difficult time convincing Parliament and the British public to support the use of military force against Iraq because of scant evidence supporting Washington’s allegations against Iraq. “The truth is that what has changed is not the pace of Saddam Hussein’s WMD programs, but our tolerance of them post-11 September.” He adds that the “figures” being used in a dossier on Iraq that Downing Street is drafting needs more work in order for it to be “consistent with those of the US.” He explains: “[E]ven the best survey of Iraq’s WMD programs will not show much advance in recent years on the nuclear, missile, or chemical weapons/biological weapons fronts: the programs are extremely worrying but have not, as far as we know, been stepped up.” He also says the US has little evidence to support its other allegation. “US scrambling to establish a link between Iraq and al-Qaeda is so far frankly unconvincing,” he says. [United Kingdom, 3/22/2002 pdf file; Daily Telegraph, 3/21/2005; Guardian, 4/21/2005; Los Angeles Times, 6/15/2005]

Entity Tags: Peter Ricketts, Tony Blair, Jack Straw

Timeline Tags: Events Leading to Iraq Invasion

When al-Qaeda logistics manager Abu Zubaida is arrested in late March 2002 (see March 28, 2002), his computer is searched. According to the Washington Post: “When agents found Zubaida’s laptop computer, a senior law enforcement source said, they discovered that the vast majority of people he had been communicating with were being monitored under FISA warrants or international spying efforts. ‘Finally, we got some comfort’ that surveillance efforts were working, said a government official familiar with Zubaida’s arrest.” The fact some of his contacts are monitored under FISA warrants indicates that they are in the US, as FISA warrants are only used for US targets (see 1978). The monitoring of Abu Zubaida’s communications began in the mid-1990s, at the latest (see (Mid-1996) and October 1998 and After), and continued after 9/11 (see October 8, 2001). [Washington Post, 2/9/2006] Some will later suggest that Zubaida may have had mental problems (see Shortly After March 28, 2002), but this apparently did not stop him from being a key al-Qaeda contact point. FBI agent Dan Coleman, an expert on al-Qaeda, will later say that the FBI “all knew he was crazy, and they knew he was always on the damn phone.” [Washington Post, 12/18/2007] Vincent Cannistraro, former head of the CIA’s Counter Terrorism Center, says of Zubaida shortly after Zubaida’s capture, “He was the guy that had the direct contact with prominent al-Qaeda cell leaders abroad, and he knew where they all were. He would have been the guy co-ordinating new attacks.” [Observer, 4/7/2002]

Entity Tags: Dan Coleman, Vincent Cannistraro, Abu Zubaida

Timeline Tags: Complete 911 Timeline

In part due to pressure from Vice President Cheney, the CIA sends a cable to France’s intelligence agency, the Direction Generale de la Securite Exterieure (DGSE), communicating concerns about intelligence suggesting that Iraq is attempting to purchase uranium from Niger. (Another cable had been sent the year before (see Summer 2001).) Specifically, the CIA says it is concerned about an alleged agreement between Iraq and Niger on the sale of 500 tons of uranium that was signed by Nigerian officials. (In an interview with the Los Angeles Times, DGSE official Alain Chouet will note that the details of this agreement matched those of the forged documents.) [Los Angeles Times, 12/11/2005; Unger, 2007, pp. 241] Niger is a former French colony, and the French keep a tight rein on Niger’s uranium production. Hence, the CIA turns to French intelligence to vet the claim of Nigerien uranium going to Iraq. “The French were managing partners of the international consortium in Niger,” former US ambassador Joseph Wilson will later say. “The French did the actual mining and shipping of [uranium].” [Unger, 2007, pp. 208-209] The CIA asks for an immediate answer about the authenticity of the information. [La Repubblica (Rome), 12/1/2005] In response, the DGSE sends its head of security intelligence, Chouet, to look into the uranium deal. The initial information Chouet receives from the CIA is vague, he will later recall, except for one striking detail: Iraq’s ambassador to the Vatican, Wissam al-Zahawie, made an unusual trip to four African countries in 1999, including Niger. CIA analysts fear the trip may have been a prelude to the uranium deal. But Chouet soon learns that the al-Zawahie trip (see February 1999) had not been secret, as the CIA avers, but had been well covered by, among other news outlets, the local Nigerien press. In addition, French, British, and US intelligence had received routine reports on al-Zawahie’s visits. Chouet, head of a 700-person intelligence unit specializing in weapons proliferation and terrorism, sends an undercover team of five or six men to Niger to check on the security of Niger’s uranium. The investigation produces no evidence that al-Zawahie had even discussed uranium with the Nigeriens. [La Repubblica (Rome), 12/1/2005; Los Angeles Times, 12/11/2005; Unger, 2007, pp. 208-209] Chouet will later recall, “[O]nce back, they told me a very simple thing: ‘the American information on uranium is all bullsh_t.’” [La Repubblica (Rome), 12/1/2005] The French summarize the results of their investigation in a series of formal cables they send to CIA offices in Langley and Paris. Chouet will later tell the Times that they communicated their doubts about the claims in no uncertain terms. “We told the Americans, ‘Bullshi_t. It doesn’t make any sense.’” [La Repubblica (Rome), 12/1/2005; Los Angeles Times, 12/11/2005] Choeut’s formal reports to the CIA use less coarse language, but he later describes them as candid. “We had the feeling we had been heard,” he will recall. [Unger, 2007, pp. 241] The DGSE considers the issue closed. [Unger, 2007, pp. 208-209]

Entity Tags: Richard (“Dick”) Cheney, Joseph C. Wilson, Central Intelligence Agency, Alain Chouet, Direction Générale de la Sécurité Extérieure, Wissam al-Zahawie

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

Dr. Sawsan Alhaddad is one of about 30 Iraqi-Americans who have agreed to participate in a CIA intelligence gathering operation (see 2002). Her brother, Saad Tawfiq, is known by the CIA to have been a key figure in Saddam Hussein’s clandestine nuclear weapons program. The CIA has asked Alhaddad to return to Iraq and ask her brother if he would be willing to defect to the US. If he does not want to leave, she is to ask him several questions about Iraq’s supposed nuclear weapons program. She goes to Iraq in early September. A few days into her visit she begins asking him questions about Iraq’s nuclear weapons program. How close is Iraq to developing nuclear weapons? What process is it using for isotope separation? And, what are the names of the scientists who are working on the program? Tawfiq is surprised the CIA appears to actually believe that Iraq has a nuclear weapons program. He tells her the program ended in 1991. As James Risen reports in his book State of War: “We don’t have the resources to make anything anymore, he told her. We don’t even have enough spare parts for our conventional military. We can’t even shoot down an airplane. We don’t have anything left. If the sanctions are ever lifted, then Saddam is certain to restart the programs. But there is nothing now.” When Sawsan returns to the US, she tells her CIA debriefers everything her brother had told her. But the agents conclude that her brother must have been lying. All of the other Iraqi-Americans who traveled to Baghdad seeking information on behalf of the CIA return with the exact same answer—Iraq has no nuclear, chemical, or biological weapons programs. [Risen, 2006, pp. 183-184]

Entity Tags: Sawsan Alhaddad, Central Intelligence Agency, Saad Tawfiq

Timeline Tags: Events Leading to Iraq Invasion

Veteran AT&T technician Mark Klein (see July 7, 2009) is startled when he receives an email informing him and his colleagues that a representative from the National Security Agency (NSA) will soon arrive to conduct “some kind of business.” Klein works at the Geary Street facility in San Francisco, helping provide Internet, VoIP (voice over Internet Protocol), and data transport between the US and the Far East. Klein and his supervisor, Don Henry, soon learn that one of their colleagues, one of AT&T’s senior “field support specialists” whom Klein will only identify as “Ski,” is to be interviewed by the NSA for a security clearance. Ski is slated to begin working in an NSA-operated “secure facility” at AT&T’s Folsom Street facility in San Francisco. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 22-25] Klein later says of the NSA visit: “That struck me as a little odd to begin with, because I remember from back in the ‘70s, the NSA is not supposed to be doing domestic spying, so what were they doing in an AT&T company office? It struck me as odd, but I didn’t know anything more about it, so I just let it lie and waited for the guy to come.” Klein will later describe the NSA representative as “closemouthed and unsmiling, and he did his business.” Klein decides that the NSA visit was a one-time affair, and he thinks no more of it for the time being. [PBS Frontline, 5/15/2007]

Entity Tags: Mark Klein, AT&T, “Ski” (AT&T field support specialist), Don Henry, National Security Agency

Timeline Tags: Civil Liberties

Entifadh Qanbar, a lobbyist for the Iraqi National Congress (INC), sends a memo to the staff of the Senate Appropriations Committee, in which he provides information about a State Department-funded intelligence program, known as the “information-collection program,” run by the INC (see September 2004-September 2006). Qanbar, who says he is the overall manager of the group, states in the memo that under the program, “defectors, reports and raw intelligence are cultivated and analyzed,” and “the results are reported through the INC newspaper (Al Mutamar), the Arabic and Western media and to appropriate governmental, nongovernmental and international agencies.” Information is also passed on to William Luti, who will later run the Office of Special Plans (see September 2002), and John Hannah, a senior national-security aide on Cheney’s staff, who Qunbar describes as the “principal point of contact.” [Newsweek, 12/15/2003; New York Times, 2/12/2004 Sources: Memo] The memo provides a description of some of the people involved in the group and their activities. It says that the analytical group includes five analysts with a background in Iraq’s military, Iraq’s intelligence services and human rights. One person, a consultant, monitors the Iraqi government’s alleged efforts to develop banned weapons. The five analysts process information and write reports, which are sent to Al Mutamar, the INC’s newspaper, as well as the US government and many mainstream news organizations. Qanbar says that the information-collection program issued 30 reports between August 2001 and June 2002, which were sent to Al Mutamar. (Al Mutamar is only available inside Iraq on the Internet; the effectiveness of other government-funded projects to disseminate propaganda inside Iraq could not be proven, and may not have ever existed.) According to the memo, the group published 28 private reports in collaboration with the INC’s headquarters in London. The memo reveals that between October 2001 and May 2002, information provided by the INC was cited in 108 articles published by a variety of English-language news publications, including the New York Times, the Washington Post, Time, Newsweek, the New Yorker, CNN, Fox News, and several others. [New York Times, 2/12/2004; New Yorker, 6/7/2004; Columbia Journalism Review, 7/1/2004] New York Daily News reporter Helen Kennedy will say in 2004, “The INC’s agenda was to get us into a war.” Kennedy’s name appears on Qanbar’s list. “The really damaging stories all came from those guys, not the CIA. They did a really sophisticated job of getting it out there.” Bob Drogin of the Los Angeles Times will say, “I think something that hasn’t gotten a lot of attention is how [the INC] used the British press to plant a lot of this stuff, some of it pretty outlandish.” British journalist Jamie Dettmer points the finger the other way. “I’ve been utterly appalled by the lack of skepticism about this entire Iraq project and the war on terrorism” in the press. When Dettmer learns that his name is on the list, he shouts, “Complete bollocks!” Other journalists on the list will refuse to admit that they were duped by the INC, even though some of their stories contain extensive interviews and dramatic claims from INC sources that were later disproven. Qanbar will say, “We did not provide information. We provided defectors. We take no position on them. It’s up to you reporters to decide if they are credible or not.” [Columbia Journalism Review, 7/1/2004]

Entity Tags: Iraqi National Congress, Richard (“Dick”) Cheney, Entifadh Qanbar, Memo

Timeline Tags: Events Leading to Iraq Invasion, Domestic Propaganda

Rocco Martino, an Italian information peddler, attempts to sell a collection of mostly forged documents (though it is not clear precisely what documents these are) to the Direction Generale de la Securite Exterieure (DGSE), France’s intelligence agency for $100,000. (According to Martino, he has been selling documents to the French since 1999 (see June or July 1999).) The documents suggest that Niger agreed to sell uranium to Iraq in 2000. [Los Angeles Times, 2/17/2004; La Repubblica (Rome), 10/24/2005; Knight Ridder, 10/25/2005; Sunday Times (London), 11/6/2005] The French insist on reviewing the documents before there is any exchange of money. [La Repubblica (Rome), 12/1/2005] In a matter of days, French intelligence determines the documents are not authentic. [Los Angeles Times, 12/11/2005] SISMI, Italy’s military intelligence service, is reportedly aware of Martino’s dealing with the French, and may have actually arranged them. [La Repubblica (Rome), 10/24/2005]

Entity Tags: Direction Générale de la Sécurité Extérieure, Rocco Martino, SISMI, Antonio Nucera

Timeline Tags: Niger Uranium and Plame Outing

The International Atomic Energy Agency sends the US a report reiterating its previous conclusion (see July 2001) regarding the intended use of the aluminum tubes that Iraq attempted to import in July 2001 (see 2000). The IAEA believes that while the tubes could be modified for use as rotors in a gas centrifuge system, the tubes are not directly suited to that use. [United Kingdom, 7/14/2004 pdf file]

Entity Tags: Central Intelligence Agency, International Atomic Energy Agency

Timeline Tags: Events Leading to Iraq Invasion

White House chief of staff Andrew Card forms the White House Iraq Group, or WHIG, which aims to “educate the public” about the alleged threat from Iraq. WHIG is formed concurrently with the Office of Special Plans (see September 2002). A senior official involved with the group will later describe it as “an internal working group, like many formed for priority issues, to make sure each part of the White House was fulfilling its responsibilities.” [Washington Post, 8/10/2003] According to White House deputy press secretary Scott McClellan, the WHIG is “set up in the summer of 2002 to coordinate the marketing of the [Iraq] war,” and will continue “as a strategic communications group after the invasion had toppled Saddam [Hussein]‘s regime.” McClellan, who will become a full-fledged member of the WHIG after rising to the position of senior press secretary, will write: “Some critics have suggested that sinister plans were discussed at the WHIG meetings to deliberately mislead the public. Not so. There were plenty of discussions about how to set the agenda and influence the narrative, but there was no conspiracy to intentionally deceive. Instead, there were straightforward discussions of communications strategies and messaging grounded in the familiar tactics of the permanent campaign.” [McClellan, 2008, pp. 142] Author Craig Unger will sum up the WHIG’s purpose up more bluntly: “to sell the war.” Members of the group include White House political advisers Karl Rove, Karen Hughes, Mary Matalin, James R. Wilkinson, and Nicholas E. Calio, and policy advisers led by National Security Adviser Condoleezza Rice, her deputy Stephen Hadley, and Vice President Dick Cheney’s chief of staff, Lewis “Scooter” Libby. They meet weekly in the White House Situation Room. A “strategic communications” task force under the WHIG is charged with planning speeches and writing position papers. [Washington Post, 8/10/2003; Unger, 2007, pp. 241]
Marketing Fear, Idea of Invasion as Reasonable - After Labor Day 2002—and after suitable test marketing—the group launches a full-fledged media marketing campaign. The images and storyline are simple and visceral: imminent biological or chemical attack, threats of nuclear holocaust, Saddam Hussein as a psychopathic dictator who can only be stopped by American military force. A key element of the narrative is forged documents “proving” Iraq sought uranium from Niger (see Between Late 2000 and September 11, 2001, October 15, 2001, October 18, 2001, November 20, 2001, February 5, 2002, March 1, 2002, Late April or Early May 2002-June 2002, and Late June 2002). One of the main objectives is to swing the dialogue ever farther to the right, creating the assumption in the public mind that war with Iraq is a thoughtful, moderate, well-reasoned position, and delegitimizing any opposition. To that end, Cheney stakes out the “moderate” position, with statements like “many of us are convinced that Saddam will acquire nuclear weapons fairly soon” (see August 26, 2002), and neoconservatives such as Michael Ledeen pushing the extremes ever rightward with calls to invade not only Iraq, but Iran, Syria, and Saudi Arabia (see September 20, 2001, August 6, 2002, and September 4, 2002). The real push is delayed until the second week of September. As Card reminds the group, “From a marketing point of view, you don’t introduce new products in August” (see September 6, 2002). The first anniversary of the 9/11 attacks is a perfect opportunity to launch the new campaign (see September 8, 2002). [Unger, 2007, pp. 250-251] Wilkinson, the group’s communications director, is tasked with preparing one of the group’s first public releases, a white paper that will describe the “grave and gathering danger” of Iraq’s “reconstituted” nuclear weapons program. Wilkinson will claim that Iraq “sought uranium oxide, an essential ingredient in the enrichment process, from Africa.” [CounterPunch, 11/9/2005]
'Push[ing] the Envelope' - According to an intelligence source interviewed by the New York Daily News in October 2005, the group, on “a number of occasions,” will attempt “to push the envelope on things.… The [CIA] would say, ‘We just don’t have the intelligence to substantiate that.’” [New York Daily News, 10/19/2005] In 2003, three unnamed officials will tell a Washington Post reporter that the group “wanted gripping images and stories not available in the hedged and austere language of intelligence,” what author and reporter Charlie Savage will call “a stark display of the political benefits that come with the power to control information.” [Savage, 2007, pp. 357] In 2008, McClellan will write of “the heightened rhetoric on Iraq, including unequivocal statements that made things sound more certain than was known.” [McClellan, 2008, pp. 137]
Using Friendly Media Outlets - An important part of the WHIG strategy is to feed their messages to friendly journalists, such as New York Times reporter Judith Miller. James Bamford, in his book A Pretext for War, will write: “First OSP [Office of Special Plans] supplies false or exaggerated intelligence; then members of the WHIG leak it to friendly reporters, complete with prepackaged vivid imagery; finally, when the story breaks, senior officials point to it as proof and parrot the unnamed quotes they or their colleagues previously supplied.” [Bamford, 2004, pp. 325]

Entity Tags: Stephen J. Hadley, Scott McClellan, Saddam Hussein, Nicholas E. Calio, White House Iraq Group, Lewis (“Scooter”) Libby, Condoleezza Rice, Mary Matalin, Andrew Card, Craig Unger, James Bamford, Charlie Savage, Karen Hughes, James R. Wilkinson, Karl C. Rove

Timeline Tags: Events Leading to Iraq Invasion, Domestic Propaganda, Niger Uranium and Plame Outing

William Luti.William Luti. [Source: Helene C. Stikkel / Defense Department]Undersecretary of Defense for Policy Douglas J. Feith and Deputy Secretary of Defense Paul Wolfowitz, both staunch neoconservatives, rename the Northern Gulf Affairs Office on the Pentagon’s fourth floor (in the seventh corridor of D Ring) the “Office of Special Plans” (OSP) and increase its four-person staff to sixteen. [Knight Ridder, 8/16/2002; Los Angeles Times, 11/24/2002; New Yorker, 5/12/2003; Inter Press Service, 8/7/2003; Tom Paine (.com), 8/27/2003; American Conservative, 12/1/2003; Mother Jones, 1/2004] William Luti, a former navy officer and ex-aide to Vice President Cheney, is put in charge of the day-to-day operations [Guardian, 7/17/2003; Mother Jones, 1/2004] , apparently at the behest of Cheney. Luti was, according to former Defense Intelligence Agency official Patrick Lang, a member of Cheney’s “shadow National Security Council.” [Middle East Policy Council, 6/2004]
Transforming NESA - Luti worked for the Near East and South Asian Affairs desk (NESA) at the Pentagon since mid-2001. Lang later describes NESA as having been “a Pentagon backwater, responsible primarily for arranging bilateral meetings with military counterparts” from various nations. Before the Afghanistan war, NESA worked closely with the Defense Intelligence Agency’s Defense Intelligence Officer (DIO) for the Near East, South Asia, and Counterterrorism. During Luti’s first months at NESA, the DIO was Bruce Hardcastle. The Pentagon dismantled the entire DIO system, partly because of friction between Luti and Hardcastle (see Early 2002). Lang will write, “The roots of the friction between Hardcastle and Luti were straightforward: Hardcastle brought with him the combined wisdom of the professional military intelligence community. The community had serious doubts about the lethality of the threat from Saddam Hussein, the terrorism links and the status of the Iraqi WMD programs. Luti could not accept this. He knew what he wanted: to bring down Saddam Hussein. Hardcastle could not accept the very idea of allowing a desired outcome to shape the results of analysis.” Luti transforms NESA into what Lang will call “a ‘de facto’ arm of the vice president’s office,” and in the process shuts Hardcastle out of NESA (and later OSP) intelligence briefings. Luti does not report to either Feith or Donald Rumsfeld, as his chain of command delineates, but to Cheney’s chief of staff, Lewis “Scooter” Libby. OSP staffer Karen Kwiatkowski later recalls being “shocked” to learn that Luti reports to Libby and not to his putative Pentagon superiors. She will say, “In one of the first staff meetings that I attended there, Bill Luti said, ‘Well, did you get that thing over to Scooter? Scooter wants this, and somebody’s got to get it over to him, and get that up to him right away.’ After the meeting, I asked one of my co-workers, who’d been there longer, ‘Who is this Scooter?’ I was told, ‘That’s Scooter Libby over at the OVP (Office of the Vice President). He’s the Vice President’s chief of staff.’ Later I came to understand that Cheney had put Luti there.” Under Luti, NESA becomes a virtual adjunct to the OSP. [Inter Press Service, 8/7/2003; Mother Jones, 1/2004; Middle East Policy Council, 6/2004]
Strong Neoconservative Influence - The Office of Special Plans is staffed with a tight group of like-minded neoconservative ideologues, who are known advocates of regime change in Iraq. Notably, the staffers have little background in intelligence or Iraqi history and culture. [Salon, 7/16/2003; Inter Press Service, 8/7/2003; American Conservative, 12/1/2003; Mother Jones, 1/2004] Some of the people associated with this office were earlier involved with the Counter Terrorism Evaluation Group, also known as the “Wurmser-Maloof” project (see Shortly After September 11, 2001). They hire “scores of temporary ‘consultants‘… including like-minded lawyers, congressional staffers, and policy wonks from the numerous right-wing think-tanks in the US capital.” Neoconservative ideologues, like Richard Perle, Michael Ledeen, and Newt Gingrich, are afforded direct input into the Office of Special Plans. [Guardian, 7/17/2003; Mother Jones, 1/2004; Vanity Fair, 7/2006, pp. 150] Kwiatkowski later says she saw Ledeen going “in and out of there (OSP) all the time.” [Vanity Fair, 7/2006, pp. 150]
Planning for Post-Saddam Iraq - The official business of Special Plans is to help plan for post-Saddam Iraq. The office’s staff members presumably “develop defense policies aimed at building an international coalition, prepare the secretary of defense and his top deputies for interagency meetings, coordinate troop-deployment orders, craft policies for dealing with prisoners of war and illegal combatants, postwar assistance and reconstruction policy planning, postwar governance, Iraqi oil infrastructure policy, postwar Iraqi property disputes, war crimes and atrocities, war-plan review and, in their spare time, prepare congressional testimony for their principals.” [Insight, 12/2/2003]
Covert Source of 'Alternative' Intelligence - But according to numerous well-placed sources, the office becomes a source for many of the administration’s prewar allegations against Iraq. It is accused of exaggerating, politicizing, and misrepresenting intelligence, which is “stovepiped” to top administration officials who use the intelligence in their policy decisions on Iraq. [Knight Ridder, 8/16/2002; Los Angeles Times, 11/24/2002; New Yorker, 5/12/2003; Inter Press Service, 8/7/2003; Tom Paine (.com), 8/27/2003; American Conservative, 12/1/2003; Mother Jones, 1/2004; Daily Telegraph, 7/11/2004; CNN, 7/11/2004]
'Top Secret' - There are very few news reports in the American mainstream media that report on the office. In fact, the office is reportedly Top Secret. [Bamford, 2004, pp. 308] “We were instructed at a staff meeting that this office was not to be discussed or explained,” Kwiatkowski will later say, “and if people in the Joint Staff, among others, asked, we were to offer no comment.” [American Conservative, 12/1/2003]
Part of a 'Separate Government,' Powell Feels - Colin Powell is said to have felt that Cheney and the neoconservatives in this “Gestapo” office had established what was essentially a separate government. [Washington Post, 4/17/2004] Powell’s former chief of staff, Larry Wilkerson, is even more blunt. “When I say ‘secret cabal,’ I mean ‘secret cabal,’ he says of the White House officials behind the OSP. He compares Cheney, Rumsfeld, and the neoconservatives to the Jacobins, the radical zealots who plunged 18th-century France into the Reign of Terror. “I see them as messianic advocates of American power from one end of the globe, much as the Jacobins in France were messianic advocates of the French Revolution. I don’t care whether utopians are Vladimir Lenin on a sealed train to Moscow or Paul Wolfowitz. You’re never going to bring utopia, and you’re going to hurt a lot of people in the process.” [Unger, 2007, pp. 299-300] Among the claims critics find most troubling about the office are:
Heavy Reliance on Intelligence from Exiles and Defectors - The office relies heavily on accounts from Iraqi exiles and defectors associated with Ahmed Chalabi’s Iraqi National Congress (INC), long considered suspect by other US intelligence agencies. [New Yorker, 5/12/2003; Salon, 7/16/2003; Guardian, 7/17/2003; Inter Press Service, 8/7/2003; Independent, 9/30/2003; Mother Jones, 1/2004] One defector in particular, code-named “Curveball,” provides as much as 98 percent of the intelligence on Iraq’s alleged arsenal of biological weapons. [CNN, 7/11/2004] Much of the information provided by the INC’s sources consists of “misleading and often faked intelligence reports,” which often flow to Special Plans and NESA directly, “sometimes through Defense Intelligence Agency debriefings of Iraqi defectors via the Defense Human Intelligence Service and sometimes through the INC’s own US-funded Intelligence Collection Program, which was overseen by the Pentagon.” [Mother Jones, 1/2004] According to Kwiatkowski, the movement of intelligence from the INC to the Office of Special Plans is facilitated by a Colonel Bruner, a former military aide to Gingrich. [Newsweek, 12/15/2003; Mother Jones, 1/2004; Salon, 3/10/2004] Bruner “was Chalabi’s handler,” Kwiatkowski will tell Mother Jones. “He would arrange meetings with Chalabi and Chalabi’s folks.” [Mother Jones, 1/2004] Kwiatkowski also finds that OSP personnel, along with DIA and CIA officials, are taking part in the debriefing of INC informants. She will recall confronting one DIA officer, John Trigilio, about the practice: “I argued with [Tregilio] after the president’s Cincinnati speech (see October 5, 2002 and October 6, 2002). I told him that the president had made a number of statements that were just not supported by the intelligence. He said that the president’s statements are supported by intelligence, and he would finally say, ‘We have sources that you don’t have.’ I took it to mean the sources that Chalabi was bringing in for debriefing… Trigilio told me he participated in a number of debriefs, conducted in hotels downtown, or wherever, of people that Chalabi brought in. These debriefs had Trigilio from OSP, but also CIA and DIA participated… If [the information] sounded good, it would go straight to the OVP or elsewhere. I don’t put it out of possibility that the information would go straight to the media because of the (media’s) close relationship with some of the neoconservatives. So this information would make it straight out into the knowledge base without waiting for intelligence [analysts] to come by with their qualifications and reservations.” [Middle East Policy Council, 6/2004]
Cherry-Picked Intelligence - The Office of Special Plans purposefully ignores intelligence that undermines the case for war while exaggerating any leads that support it. “It wasn’t intelligence—it was propaganda,” Kwiatkowski will later explain. “They’d take a little bit of intelligence, cherry-pick it, make it sound much more exciting, usually by taking it out of context, often by juxtaposition of two pieces of information that don’t belong together.” [New York Times, 10/24/2002; New Yorker, 5/12/2003; Salon, 7/16/2003; Guardian, 7/17/2003; Inter Press Service, 8/7/2003; Independent, 9/30/2003; Mother Jones, 1/2004] “At the OSP, what they were doing was looking at all the intelligence they could find on WMD. That was the focal point, picking bits and pieces that were the most inflammatory, removing any context that might have been provided in the original intelligence report, that would have caused you to have some pause in believing it or reflected doubts that the intelligence community had, so if the intelligence community had doubts, those would be left out… They would take items that had occurred many years ago, and put them in the present tense, make it seem like they occurred not many years ago… But they would not talk about the dates; they would say things like, ‘He has continued since that time’ and ‘He could do it tomorrow,’ which of course, wasn’t true… The other thing they would do would be to take unrelated events that were reported in totally unrelated ways and make connections that the intelligence community had not made. This was primarily in discussing Iraq’s activities and how they might be related to al-Qaeda or other terrorist groups that might be against us, or against Israel… These kinds of links would be made. They would be made casually, and they would be made in a calculated way to form an image that is definitely not the image that anyone reading the original reports would have. The summaries that we would see from Intelligence did not match the kinds of things that OSP was putting out. So that is what I call propaganda development. It goes beyond the manipulation of intelligence to propaganda development.” [Middle East Policy Council, 6/2004]
No Intelligence Oversight - The OSP bypasses established oversight procedures by sending its intelligence assessments directly to the White House and National Security Council without having them first vetted by a review process involving other US intelligence agencies. [New Yorker, 5/12/2003; Salon, 7/16/2003; Guardian, 7/17/2003; Mother Jones, 1/2004] The people at Special Plans are so successful at bypassing conventional procedures, in part, because their neoconservative colleagues hold key positions in several other agencies and offices. Their contacts in other agencies include: John Bolton, undersecretary of state for arms control and international security; Bolton’s adviser, David Wurmser, a former research fellow on the Middle East at the American Enterprise Institute, who was just recently working in a secret Pentagon planning unit at Douglas Feith’s office (see Shortly After September 11, 2001); Elizabeth Cheney, deputy assistant secretary of state for Near East Affairs; Stephen Hadley, the deputy national security adviser; Elliott Abrams, the National Security Council’s top Middle East aide; and Richard Perle, Newt Gingrich, James Woolsey and Kenneth Adelman of the Defense Policy Board. The office provides very little information about its work to other US intelligence offices. [Salon, 7/16/2003; Guardian, 7/17/2003; Inter Press Service, 8/7/2003]
'Stealth Organization' - Greg Thielmann, the former director of the Strategic, Proliferation and Military Affairs Office at the State Department’s Intelligence Bureau, later says of the OSP: “It was a stealth organization. They didn’t play in the intelligence community proceedings that our office participated in. When the intelligence community met as a community, there was no OSP represented in these sessions. Because, if they had done that, they would have had to subject their views to peer review. Why do that when you can send stuff right in to the vice president?” [Middle East Policy Council, 6/2004; Unger, 2007, pp. 299] Lang will say in January 2004 that what happened was fundamentally different from anything that had happened under previous presidents. Cheney’s staff and allies “behaved as though they had seized control of the government in a ‘silent coup,’” The result, according to Lang, is “a highly corrupted system of intelligence and policymaking, one twisted to serve specific group goals, ends, and beliefs held to the point of religious faith.” [Unger, 2007, pp. 301]
Pressuring Intelligence Analysts - Retired Marine Lieutenant Colonel Dale Davis, who headed the International Programs Department at the Virginia Military Institute until March 2004, and an expert on Middle East affairs, later says he believes intelligence analysts at the CIA and other agencies were pressured indirectly. Davis will say, “By creating the OSP [Office of Special Plans], Cheney was able to say, ‘Hey, look at what we’re getting out of OSP. How come you guys aren’t doing as well? What is your response to what this alternative analysis that we’re receiving from the Pentagon says?’ That’s how you do it. You pressure people indirectly.” Vincent Cannistraro, a former senior counterterrorism official with the CIA, will agree: “Over a long period of time, there was a subtle process of pressure and intimidation until people started giving them what was wanted… When the Senate Intelligence Committee interviewed, under oath, over 100 analysts, not one of them said, ‘I changed my assessment because of pressure.‘… The environment was conditioned in such a way that the analyst subtly leaned toward the conceits of the policymakers… The intelligence community was vulnerable to the aggressiveness of neoconservative policymakers, particularly at the Pentagon and at the VP’s office. As one analyst said to me, ‘You can’t fight something with nothing, and those people had something. Whether it was right or wrong, fraudulent or specious, it almost didn’t make any difference, because the policymakers believed it already, and if you didn’t have hard countervailing evidence to persuade them, then you were at a loss.’” [Middle East Policy Council, 6/2004]
Strong Pro-Israel, Anti-Arab Biases - Lastly, the people involved in Special Plans openly exhibit strong pro-Israel and anti-Arab bias. The problem, note critics, is that the analysis of intelligence is supposed to be apolitical and untainted by ideological viewpoints. [American Conservative, 12/1/2003] According to a CIA intelligence official and four members of the Senate’s Intelligence Committee, Special Plans is the group responsible for the claim Bush will make in his 2003 State of the Union address that Iraq had attempted to procure uranium from an African country (see 9:01 pm January 28, 2003). [Nation, 6/19/2003; Information Clearing House, 7/16/2003]
Personal Grudges against Intelligence Community - The OSP reflects the personal grudges and ill will of many in the Office of the Vice President against the intelligence community, in part because of the CIA’s refusal to give much weight to the claims of Chalabi and the INC. “This had been a fight for such a long period of time, where people were so dug in,” a friend of one of Vice President Cheney’s senior staffers will later reflect. A colleague of the senior staff later says, “They so believed that the CIA were wrong, they were like, ‘We want to show these f_ckers that they are wrong.’” [New Republic, 11/20/2003]
Propaganda - Kwiatkowski will later recall that the OSP generated a large amount of what she terms propaganda, in the form of “talking points” used in briefings and in press conferences. “With the talking points, many of the propagandistic bullets that were given to use in papers for our superiors to inform them—internal propaganda—many of those same phrases and assumptions and tones, I saw in Vice President Cheney’s speeches and the president’s speeches,” she will say. “So I got the impression that those talking points were not just for us, but were the core of an overall agenda for a disciplined product, beyond the Pentagon. Over at the vice president’s office and the [neoconservative news magazine] Weekly Standard, the media, and the neoconservative talking heads and that kind of thing, all on the same sheet of music.” Kwiatkowski identifies Abram Shulsky, a neoconservative academic and recent Pentagon hire, as the source of many of these talking points. [Middle East Policy Council, 6/2004]
Denials, Counter-Accusations after Public Learns of OSP - After the existence of the Office of Special Plans is revealed to the public, the Pentagon will deny that it served as a direct conduit to the White House for misleading intelligence, instead claiming that its activities had been limited to postwar plans for Iraq. [New Yorker, 5/12/2003] And a December 2003 opinion piece published in Insight magazine will call the allegations surrounding the Office of Special Plans the work of conspiracy theorists. [Insight, 12/2/2003]

Entity Tags: Colonel Bruner, Colin Powell, Abram Shulsky, Craig Unger, Office of the Vice President, David Wurmser, Elizabeth (“Liz”) Cheney, Dale Davis, Douglas Feith, Donald Rumsfeld, James Woolsey, John Trigilio, Office of Special Plans, Kenneth Adelman, Stephen J. Hadley, Vincent Cannistraro, Lawrence Wilkerson, Karen Kwiatkowski, Richard Perle, Paul Wolfowitz, Richard (“Dick”) Cheney, Newt Gingrich, Patrick Lang, Greg Thielmann, Elliott Abrams

Timeline Tags: Events Leading to Iraq Invasion, Neoconservative Influence, Domestic Propaganda

Vice President Cheney, widely acknowledged as a master bureaucrat, uses a variety of bureaucratic strategies to craft his own foreign policy strategies, including the promotion the Office of Special Plans (OSP—see September 2002), simultaneously undercutting and marginalizing the CIA. Many senior intelligence officials have no idea that the OSP even exists. “I didn’t know about its existence,” Greg Thielmann, the director of the State Department’s in-house intelligence agency, the Bureau of Intelligence and Research (INR), will say.
Strategic Placement of Personal, Ideological Allies - Another Cheney strategy is personal placement. He moves his special adviser, neoconservative William Luti, into the OSP. Another influential neoconservative, Abram Shulsky, soon joins Luti there. A longtime associate of both Cheney and Defense Secretary Donald Rumsfeld, Stephen Cambone, becomes a special assistant to Rumsfeld (see Early 2001). Cheney now has his allies at the highest levels of the Pentagon. In Cheney’s office, chief of staff Lewis “Scooter” Libby serves as his liaison with the Pentagon. His chief counsel, David Addington, oversees Cheney’s aggressive and obsessively secretive legal staff. In the National Security Council (NSC), Stephen Hadley, Condoleezza Rice’s deputy, keeps a close eye on Rice in case she shows signs of falling back in with her old mentor, Brent Scowcroft (see August 1998). John Bolton and David Wurmser keep tabs on Colin Powell at the State Department. Cheney has John Yoo (see (After 10:00 a.m.) September 11, 2001) at the Justice Department. Not only does Cheney have highly placed loyalists in the State, Defense, and Justice Department, and in the NSC, he has vital allies in the Republican leadership in Congress.
Managing the Oval Office - Cheney handles the Oval Office himself. A Pentagon official who works closely with Cheney will later observe that President Bush handles the executive branch much as he handled the Texas Rangers baseball team: ignoring much of the daily functions, leaving most policy decisions to others and serving as a “corporate master of ceremonies, attending to the morale of the management team and focusing on narrow issues… that interested him.” Cheney becomes, in author Craig Unger’s words, “the sole framer of key issues for Bush,” the single conduit through which information reaches the president. Cheney, the Pentagon official will later say, “rendered the policy planning, development and implementation functions of the interagency system essentially irrelevant. He has, in matters he has deemed important, governed. As a matter of protocol, good manners, and constitutional deference, he has obtained the requisite ‘check-mark’ of the president, often during one-on-one meetings after a Potemkin ‘interagency process’ had run its often inconclusive course.” [Unger, 2007, pp. 249-250]

Entity Tags: Condoleezza Rice, Stephen A. Cambone, Stephen J. Hadley, Texas Rangers, William Luti, Brent Scowcroft, Abram Shulsky, Central Intelligence Agency, Office of Special Plans, Richard (“Dick”) Cheney, Lewis (“Scooter”) Libby, David Wurmser, David S. Addington, Craig Unger, National Security Council, John R. Bolton, Greg Thielmann, John C. Yoo, Bureau of Intelligence and Research, George W. Bush, Donald Rumsfeld

Timeline Tags: US International Relations

Condoleezza Rice appears on CNN to discuss the alleged threat posed to the US by Saddam Hussein. She insists that Iraq is intent on developing a nuclear weapon. “We do know that he is actively pursuing a nuclear weapon. We do know that there have been shipments going into Iran, for instance—into Iraq, for instance, of aluminum tubes that really are only suited to—high-quality aluminum tools that are only really suited for nuclear weapons programs, centrifuge programs. We know that he has the infrastructure, nuclear scientists to make a nuclear weapon. And we know that when the inspectors assessed this after the Gulf War, he was far, far closer to a crude nuclear device than anybody thought, maybe six months from a crude nuclear device. The problem here is that there will always be some uncertainty about how quickly he can acquire nuclear weapons. But we don’t what the smoking gun to be a mushroom cloud.” [CNN, 9/8/2002; CNN, 9/8/2002; New York Times, 7/20/2003; US House Committee on Government Reform, 3/16/2004] In his 2006 book The One Percent Doctrine, author Ron Suskind writes, “The statement sent off shock waves. Rice was criticized for fear-mongering, for suggesting that there was evidence that Hussein might have such a weapon. Arguments about proof, though, were missing the point—Rice’s roundabout argument was that the United States should act whether or not it found a “smoking gun.” She was showing an edge of the actual US policy: the severing of fact-based analysis from forceful response; acting on any inkling was now appropriate—to be safe, to be sure, to get an opponent before he can develop capability, so others know to not even start down that path.” [Suskind, 2006, pp. 170]

Entity Tags: White House Iraq Group, Ron Suskind, Condoleezza Rice

Timeline Tags: Events Leading to Iraq Invasion, Domestic Propaganda

Nicolo Pollari, chief of SISMI, Italy’s military intelligence service, meets briefly with US National Security Council officials. [Il Foglio (Milan), 10/28/2005] Present at the meeting are National Security Adviser Condoleezza Rice; her deputy, Stephen Hadley; and other US and Italian officials. [La Repubblica (Rome), 10/25/2005; American Prospect, 10/25/2005; La Repubblica (Rome), 10/26/2005; Los Angeles Times, 10/28/2005; AGI online, 10/29/2005]
Mysterious 'Courtesy Call' - Pollari can presumably set the record straight on the question of whether Iraq is trying to purchase aluminum tubes for manufacturing rockets or for use in building muclear weapons (see Between April 2001 and September 2002, April 11, 2001, July 25, 2002, September 24, 2002, October 1, 2002, Between December 2002 and January 2003, January 11, 2003, and March 7, 2003)—the aluminum tubes in question are exactly the same as the Italians use in their Medusa air-to-ground missile systems (see December 2002). Apparently Iraq is trying to reproduce “obsolete” missile systems dating back to when Italy and Iraq engaged in military trade. Pollari could also discuss the documents alleging that Iraq and Niger entered into a secret uranium deal (see Between Late 2000 and September 11, 2001), a set of documents originally promulgated by SISMI and now thoroughly discredited (see February 5, 2003). But apparently Pollari discusses none of this with White House officials. Hadley, who hosts the meeting with Pollari, will refuse to say what they discuss, except to label Pollari’s visit “just a courtesy call,” and will add, “Nobody participating in that meeting or asked about that meeting has any recollection of a discussion of natural uranium, or any recollection of any documents passed.”
Meeting with Hadley, Not Tenet, Significant - Author Craig Unger will write in 2007 that the real significance of the meeting is that Pollari meets with Hadley (widely considered an ally of Vice President Dick Cheney), and not with Pollari’s counterpart, CIA Director George Tenet. Former CIA officer Philip Giraldi later says, “It is completely out of protocol for the head of a foreign intelligence service to circumvent the CIA. It is uniquely unusual.” Of the Iraq-Niger documents, Giraldi will say, “In spite of lots of people having seen the documents, and having said they were not right, they went around them.” Former CIA and State Department analyst Melvin Goodman will concur. “To me there is no benign interpretation of” the Pollari-Hadley meeting, Goodman will say. “At the highest level it was known that the documents were forgeries. Stephen Hadley knew it. Condi Rice [Hadley’s supervisor] knew it. Everyone at the highest level knew.” Neoconservative columnist, author, and former Italian intelligence asset Michael Ledeen, who has close ties with both Pollari and Hadley and may have played a part in producing the Iraq-Niger forgeries (see December 9, 2001). will deny setting up the meeting. And a former CIA official speaking on Tenet’s behalf will say that Tenet has no information to suggest that Pollari or elements of SISMI were trying to circumvent the CIA and go directly to the White House. [Unger, 2007, pp. 258-259] (In 2006, history professor Gary Leupp will write that Ledeen is the informal liaison between SISMI and the Office of Special Plans—see September 2002). [CounterPunch, 11/9/2005]
Downplaying Significance of Meeting - The Bush administration later insists the meeting was of little importance. Frederick Jones, a National Security Council spokesman, describes the meeting as a courtesy call of 15 minutes or less. He also says, “No one present at that meeting has any recollection of yellowcake [uranium oxide] being discussed or documents being provided.” [New York Times, 10/28/2005]
Meeting Remains Secret until 2005 - This meeting is not reported until 2005, when Italy’s La Repubblica reports that a meeting—arranged through a backchannel by Gianni Castellaneta, the Italian prime minister’s diplomatic advisor—took place between Pollari and Hadley on this date. The report is refuted by Italy which insists it was actually a short meeting between Pollari and Rice. Italy says that although Hadley was present, he was really not part of the meeting. [AGI online, 10/29/2005] It is not clear from the reporting, however, if the meeting acknowledged by Italy and Washington, is in fact the same meeting reported by La Repubblica.

Entity Tags: Michael Ledeen, Craig Unger, George J. Tenet, Gianni Castellaneta, Condoleezza Rice, Richard (“Dick”) Cheney, Bush administration (43), Central Intelligence Agency, Stephen J. Hadley, Nicolo Pollari, Philip Giraldi, SISMI

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

The White House publishes a 26-page government white paper titled, “A Decade of Deception and Defiance,” which seeks to demonstrate that Saddam Hussein represents a serious and imminent threat to the United States. The report, written by White House Iraq Group member James Wilkinson, relies primarily on public sources, including reports that have been published by human rights groups and the State Department, as well as various newspaper articles, including two by the New York Times. [Isikoff and Corn, 2006, pp. 48] Section 5 of the report deals with “Saddam Hussein’s support for international terrorism,” though it makes no attempt to tie Hussein’s government to al-Qaeda or Osama bin Laden. It lists six points linking Saddam Hussein to terrorist activities, some dating as far back as the ‘70s. One of the points criticizes Iraq for its ties to the Mujahadeen-e Khalq Organization (MKO), an obscure militant Iranian dissident group whose main office is in Baghdad. The report says: “Iraq shelters terrorist groups including the Mujahedin-e-Khalq Organization (MKO), which has used terrorist violence against Iran and in the 1970s was responsible for killing several US military personnel and US civilians.” The paper notes that the US State Department classified MKO as a “foreign terrorist organization” in 1997, “accusing the Baghdad-based group of a long series of bombings, guerilla cross-border raids and targeted assassinations of Iranian leaders.” [Newsweek, 9/26/2002 Sources: Richard Durbin] The administration is quickly ridiculed for making the claim when, two weeks later, Newsweek reports that MKO’s front organization, the National Council of Resistance of Iran, has a small office in the National Press Building in Washington, DC. It is also reported that only two years beforehand this very group had been supported by then-Senator John Ashcroft and more than 200 other members of Congress. On several issues the senator and his colleagues had expressed solidarity with MKO at the behest of their Iranian-American constituencies. [Newsweek, 9/26/2002] Another allegation included in the paper states that Iraqi defector Adnan Ihsan Saeed al-Haideri, a civil engineer, “had visited twenty secret facilities for chemical, biological, and nuclear weapons.” According to the White House dossier, Haideri “supported his claims with stacks of Iraqi government contracts, complete with technical specifications.” Ten months earlier, the CIA had debriefed Haideri in Bangkok and concluded from the results of a polygraph that Haideri account was a complete fabrication (see December 17, 2001). [Executive Office of the President, 9/12/2002 pdf file]

Entity Tags: White House Iraq Group, Adnan Ihsan Saeed al-Haideri, Osama bin Laden, US Congress, John Ashcroft, James R. Wilkinson, Saddam Hussein

Timeline Tags: Events Leading to Iraq Invasion, Domestic Propaganda

In response to Tony Snow’s probing on Fox News Sunday as to whether or not President Bush was convinced there were links between Saddam Hussein and Osama bin Laden, National Security Adviser Condoleezza Rice is circumspect until she’s pressed. “He clearly has links to terrorism…—Links to terrorism [that] would include al-Qaeda….” [Fox News, 9/15/2002; Islam Online, 9/15/2002; CNN, 9/26/2002; US House Committee on Government Reform, 3/16/2004]

Entity Tags: Tony Snow, George W. Bush, Condoleezza Rice, Al-Qaeda, Osama bin Laden, Saddam Hussein

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion

Two days before the CIA is to issue an assessment (see August 2002) on Iraq’s supposed links to militant Islamic groups, Defense Department officials working in the Office of Special Plans (OSP) deliver a briefing in the White House to several top officials, including I. Lewis Libby, Vice President Dick Cheney’s chief of staff, and Deputy National Security Adviser Stephen Hadley. The briefing is entitled “Assessing the Relationship between Iraq and al-Qaeda,” and is an updated version of a briefing presented in July 2002 (see July 25, 2002). The OSP, working under Undersecretary of Defense for Policy Douglas J. Feith, is aggressively promoting any evidence it can find to support a decision to invade Iraq (see September 2002).
bullet The briefing claims that the relationship between Iraq and al-Qaeda is “mature” and “symbiotic,” and marked by shared interests.
bullet It lists cooperation in 10 categories, or “multiple areas of cooperation,” including training, financing, and logistics. [Savage, 2007, pp. 292; New York Times, 4/6/2007; Washington Post, 4/6/2007]
bullet An alleged 2001 meeting in Prague between an Iraqi spy and 9/11 hijacker Mohamed Atta is listed as one of eight “Known Iraq-Al-Qaeda Contacts.” It claims that there is a “known contact” between Atta and the Iraqi intelligence agency, a claim already rejected by the CIA. [Savage, 2007, pp. 293; Washington Post, 4/6/2007]
bullet The briefing claims that “Fragmentary reporting points to possible Iraqi involvement not only in 9/11 but also in previous al-Qaeda attacks.” [Washington Post, 4/6/2007]
bullet It includes a slide criticizing the rest of the US intelligence community, which says there are “fundamental problems” with CIA intelligence gathering methods. It claims other intelligence agencies assume “that secularists and Islamists will not cooperate, even when they have common interests,” and there is a “consistent underestimation of importance that would be attached by Iraq and al-Qaeda to hiding a relationship.” [Daily Telegraph, 7/11/2004; Newsweek, 7/19/2004; Savage, 2007, pp. 293; Washington Post, 4/6/2007]
Around the same time, the briefing is also presented with slight variations to Defense Secretary Donald Rumsfeld and CIA Director George Tenet. The slide criticizing other intelligence agencies is excluded when a version of the briefing is given to Tenet. A later report by the Defense Department’s Office of Inspector General will conclude the briefing was entirely incorrect and deliberately ignored intelligence by the CIA, DIA, and other intelligence agencies that contradicted its conclusions (see February 9, 2007). [Washington Post, 4/6/2007] The CIA has already found the majority of the information in the presentation either completely false or largely unsupported by reliable evidence. [Savage, 2007, pp. 293]
Unusual Briefing - This briefing, delivered at the same time the White House is pressing Congress to authorize the upcoming war with Iraq (see October 11, 2002), is, in the words of author and reporter Charlie Savage, “highly unusual.” Usually, high-level administration officials making national security decisions rely on information vetted by top-flight analysts at the CIA, in order to ensure the information is as accurate and politically neutral as possible. No CIA analyst has ever found a meaningful link between Hussein and al-Qaeda; the few reports of such claims were seen as highly dubious. But Cheney and his supporters consider the CIA slow, pedantic, and incompetent, and believe Feith’s OSP can provide better—or at least more amenable—intelligence. Savage will write: “In Feith’s shop and elsewhere in the executive branch, neoconservative political appointees stitched together raw intelligence reports, often of dubious credibility, without any vetting or analysis by professional intelligence specialists. The officials cherry-picked the files for reports that supported the notion that Iraq had an active [WMD] program and that it was working hand-in-hand with al-Qaeda, ‘stovepiping’ such reports to top decision makers (and leaking them to the press) while discounting any skepticism mounted by the professionals.” [Savage, 2007, pp. 292]
Dismantling Intelligence Filtering System in Favor of Politically Controlled Intelligence Provisions - What the presentation accomplishes, according to former CIA intelligence analyst Kenneth Pollock, is to support a conclusion already drawn—the need to get rid of Saddam Hussein—by using slanted, altered, and sometimes entirely fabricated “intelligence.” The White House proceeded to “dismantle the existing filtering process that for 50 years had been preventing the policymakers from getting bad information.” Savage goes one step farther. He will write that the presentation is part of a larger White House strategy to alter the balance of power between the presidency and a key element of the bureaucracy. By setting up a politically controlled alternative intelligence filtering system, he will write, “the administration succeeded in diminishing the power of the CIA’s information bureaucracy to check the White House’s desired course of action.” [Savage, 2007, pp. 294]

Entity Tags: Office of Special Plans, Stephen J. Hadley, Richard (“Dick”) Cheney, Kenneth Pollock, Lewis (“Scooter”) Libby, Douglas Feith, Charlie Savage, George J. Tenet, Donald Rumsfeld

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion

British Prime Minister Tony Blair gives a speech to Parliament concurrent with the just-released dossier on Iraqi WMD (see September 24, 2002). Blair combines fact—such as Iraq’s lengthy defiance and deception of UN weapons inspections since the 1991 Gulf War, the possible existence of tons of chemical and biological weapons material left unaccounted for in 1998, and the attempts by Iraq to subvert the UN’s Food for Oil program—with speculation that Saddam Hussein’s “chemical, biological, and nuclear weapons program is not an historic leftover from 1998.… His WMD program is active, detailed, and growing. The policy of containment is not working. The WMD program is not shut down. It is up and running.”
Unverified Claims - Blair calls the dossier “extensive, detailed, and authoritative,” and says that according to intelligence data used to compile it: “Iraq has chemical and biological weapons.… Saddam has continued to produce them… he has existing and active military plans for the use of chemical and biological weapons, which could be activated within 45 minutes, including against his own Shi’a population, and … he is actively trying to acquire nuclear weapons capability.” Only the “45-minute” strike capability is not sourced from the dossier (see September 28, 2002). Blair makes a number of patently false allegations about Iraq’s nuclear weapons, including the disputed aluminum tubes claim (see Between April 2001 and September 2002, April 11, 2001, July 25, 2002, September 24, 2002, October 1, 2002, Between December 2002 and January 2003, January 11, 2003, and March 7, 2003) and the tale about Iraq attempting to purchase uranium from Niger (see Between Late 2000 and September 11, 2001, October 15, 2001, October 18, 2001, November 20, 2001, February 5, 2002, March 1, 2002, Late April or Early May 2002-June 2002, and Late June 2002). “[W]e know Saddam has been trying to buy significant quantities of uranium from Africa, though we do not know whether he has been successful,” Blair says. He tells the assembled lawmakers: “There will be some who dismiss all this. Intelligence is not always right. For some of this material there may be innocent explanations. There will be others who say, rightly, that, for example, on present going, it could be several years before he acquires a usable nuclear weapon. Though, if he were able to purchase fissile materiel illegally, it would only be a year or two. But let me put it at its simplest: on this 11-year history; with this man, Saddam; with this accumulated, detailed intelligence available; with what we know and what we can reasonably speculate: would the world be wise to leave the present situation undisturbed; to say, despite 14 separate UN demands on this issue, all of which Saddam is in breach of, we should do nothing; to conclude that we should trust not to the good faith of the UN weapons inspectors but to the good faith of the current Iraqi regime?”
Regime Change - After all of this buildup, Blair says that he is not necessarily calling for military action against Iraq, but “the case for ensuring Iraqi disarmament… is overwhelming.” He then makes the case for regime change, citing the need for a new leader “who can bring Iraq back into the international community where it belongs, not languishing as a pariah. Someone who can make the country rich and successful, not impoverished by Saddam’s personal greed. Someone who can lead a government more representative of the country as a whole, while maintaining absolutely Iraq’s territorial integrity. We have no quarrel with the Iraqi people. Liberated from Saddam, they could make Iraq prosperous and a force for good in the Middle East. So the ending of regime would be the cause of regret for no one other than Saddam.” Blair says, “our purpose is disarmament,” not military action, but it is hard to conceive how the regime change he advocates could be effected without military action. [10 Downing Street, 9/24/2002] Two years later, Blair will admit that the claim is erroneous (see October 13, 2004).

Entity Tags: Tony Blair, Saddam Hussein

Timeline Tags: Niger Uranium and Plame Outing

The Times of London uses the recently released intelligence “dossier” from British intelligence (see September 24, 2002) to report that Iraqi dictator Saddam Hussein has sent agents into Africa to find uranium for Iraqi nuclear weapons. The Times does not inform its readers that many British journalists were shown evidence contradicting the British intelligence claims (see September 24, 2002). It focuses on the dossier’s claim that Iraqi “agents” have secretly visited several African countries in search of uranium. Thirteen African nations produce uranium to one extent or another. A Whitehall source tells The Times that while Hussein may have attempted to find African uranium, those alleged efforts were unsuccessful. “If Iraq had succeeded in buying uranium from Africa, the dossier would have said so,” the source says. The Times reports that Iraq attempted to purchase uranium from, among other sources, the Democratic Republic of Congo, though at least part of that nation’s uranium mines are currently under the control of troops from Zimbabwe. The dossier does not specify any other countries that may have been contacted by Iraq. The Times also repeats the dossier’s claim that Iraq has biological and chemical weapons that can be launched against targets in as little as 45 minutes (see Late May 2003, August 16, 2003, December 7, 2003, January 27, 2004, and October 13, 2004), that Iraq is developing missiles with ranges of 600 miles (see January 9, 2003, January 16, 2003, February 27, 2003, March 7, 2003, and June 2004), and that Hussein may have given his son Qusay the power to order the use of those weapons. It also reports that the dossier specifically downplays suspected links between Iraq and radical Islamist groups such as al-Qaeda. Hussein has little sympathy for Islamist fundamentalists, The Times reports. [London Times, 9/25/2002]

Entity Tags: Saddam Hussein, London Times, UK Secret Intelligence Service (MI6)

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

In his weekly radio address, President Bush tells the nation: “The Iraqi regime possesses biological and chemical weapons, is rebuilding the facilities to make more, and, according to the British government, could launch a biological or chemical attack in as little as 45 minutes after the order is given. The regime has long-standing and continuing ties to terrorist groups, and there are al-Qaeda terrorists inside Iraq. This regime is seeking a nuclear bomb, and with fissile material could build one within a year.” Many Americans are shocked and frightened by Bush’s flat litany of assertions. What they do not know is that none of them are true. The CIA had reluctantly agreed to produce a National Intelligence Estimate (NIE) on Iraq less than three weeks before (see September 5, 2002); the result is an NIE packed with half-truths, exaggerations, and outright lies (see October 1, 2002). None of Bush’s statements are supported by hard intelligence, and all will later be disproven. [White House, 9/28/2002; Center for Public Integrity, 1/23/2008] In 2007, author Craig Unger will write that the conflict seems to have gotten personal with Bush. “There’s no doubt [Saddam Hussein’s] hatred is mainly directed against us,” Bush says during the address. “There’s no doubt he can’t stand us. After all, this is a guy that tried to kill my dad at one time.” [Unger, 2007, pp. 264]

Entity Tags: Central Intelligence Agency, Al-Qaeda, Saddam Hussein, George W. Bush

Timeline Tags: Events Leading to Iraq Invasion

UNSCOM photo of an Iraqi unmanned aerial vehicle.UNSCOM photo of an Iraqi unmanned aerial vehicle. [Source: CIA]The National Intelligence Council, a board of senior analysts that prepares reports on crucial national security issues, completes a National Intelligence Estimate (NIE) on Iraq. The purpose of an NIE is to provide policy-makers with an intelligence assessment that includes all available information on a specific issue so they can make sound policy decisions. The formal document is supposed to be the result of a collaborative effort of the entire intelligence community and is supposed to be untainted by political interests. The decision to produce the assessment on Iraq followed criticisms that the administration had already made a decision to invade Iraq without having thoroughly reviewed all available intelligence on Iraq. Congress wanted the NIE completed prior to voting on a bill authorizing the president to use force against Iraq (see September 5, 2002). NIEs such as this usually take months to prepare, however this document took a mere three weeks. The person in charge of preparing the document was weapons expert Robert Walpole. According to the Independent of London, Walpole has a track record of tailoring his work to support the biases of his superiors. “In 1998, he had come up with an estimate of the missile capabilities of various rogue states that managed to sound considerably more alarming than a previous CIA estimate issued three years earlier,” the newspaper later reports. “On that occasion, he was acting at the behest of a congressional commission anxious to make the case for a missile defense system; the commission chairman was none other than Donald Rumsfeld….” [Independent, 11/3/2003; New York Times, 10/3/2004]
Summary of NIE Conclusions - The NIE says there are potentially links between Iraq and al-Qaeda, but uses cautionary language and acknowledges that its sources—Iraqi defectors and captured al-Qaeda members—have provided conflicting reports. The sections dealing with weapons of mass destruction are also filled with caveats and nuanced statements. In the second paragraph of its “key judgment” section, the NIE states that US intelligence lacks “specific information” on Iraq’s alleged arsenal of weapons of mass destruction. And while the NIE says that Iraq probably has chemical and biological weapons, it also says that US intelligence analysts believe that Saddam Hussein would only launch an attack against the US if he felt a US invasion were inevitable. It also concludes that Saddam would only provide terrorists with chemical or biological agents for use against the United States as a last resort in order to “exact vengeance by taking a large number of victims with him.” [Central Intelligence Agency, 10/1/2002; Washington Post, 6/22/2003; Agence France-Presse, 11/30/2003]
Reconstituted nuclear weapons programs - According to the NIE, “most” of the US’ six intelligence agencies believe there is “compelling evidence that Saddam [Hussein] is reconstituting a uranium enrichment effort for Baghdad’s nuclear weapons program.” The one agency that disagrees with this conclusion is the State Department’s Bureau of Intelligence and Research (INR), which says in its dissenting opinion: “The activities we have detected do not, however, add up to a compelling case that Iraq is currently pursuing what INR would consider to be an integrated and comprehensive approach to acquire nuclear weapons. Iraq may be doing so, but INR considers the available evidence inadequate to support such a judgment. Lacking persuasive evidence that Baghdad has launched a coherent effort to reconstitute its nuclear weapons programs, INR is unwilling to… project a timeline for the completion of activities it does not now see happening.” It is later learned that nuclear scientists in the Department of Energy’s in-house intelligence office were also opposed to the NIE’s conclusion and wanted to endorse the State’s alternative view. However, the person representing the DOE, Thomas Ryder, silenced them and inexplicably voted to support the position that Iraq had reconstituted its nuclear weapons program (see Late September 2002). The DOE’s vote was seen as critical, since the department’s assessment was supposed to represent the views of the government’s nuclear experts. [Central Intelligence Agency, 10/1/2002; Washington Post, 7/19/2003; Knight Ridder, 2/10/2004; Knight Ridder, 2/10/2004]
Iraqi attempts to obtain uranium from Africa - According to the NIE, Iraq is “vigorously trying” to obtain uranium and “reportedly” is working on a deal to purchase “up to 500 tons” of uranium from Niger. It reads: “A foreign government service reported that as of early 2001, Niger planned to send several tons of ‘pure uranium’ (probably yellowcake) to Iraq. As of early 2001, Niger and Iraq reportedly were still working out arrangements for this deal, which could be for up to 500 tons of yellowcake. We do not know the status of this arrangement. Reports indicate Iraq also has sought uranium ore from Somalia and possibly the Democratic Republic of the Congo.” But the alternative view—endorsed by the State Department’s Bureau of Intelligence and Research (INR)—says that it is doubtful Iraq is trying to procure uranium from Africa. ”(T)he claims of Iraqi pursuit of natural uranium in Africa are, in INR’s assessment, highly dubious,” it reads. [Central Intelligence Agency, 10/1/2002; Washington Post, 7/19/2003]
Iraqi attempts to obtain aluminum tubes - The NIE says that most “agencies believe that Saddam’s personal interest in and Iraq’s aggressive attempts to obtain high-strength aluminum tubes for centrifuge rotors—as well as Iraq’s attempts to acquire magnets, high-speed balancing machines, and machine tools—provide compelling evidence that Saddam is reconstituting a uranium enrichment effort for Baghdad’s nuclear weapons program.” To support its analysis of the tubes, it includes a chart which compares the dimensions of the aluminum tubes sought by Iraq with those that would be needed for a “Zippe-type” centrifuge. The chart’s comparison of the tubes makes it appear that the tubes are similar. But the NIE neglects to say that the aluminum tubes are an exact match with those used in Iraq’s 81-millimeter rocket. The estimate also claims that the tubes are not suitable for rockets. The assertion ignores the fact that similar tubes are used in rockets from several countries, including the United States. [US Congress, 7/7/2004, pp. 84; New York Times, 10/3/2004] It does note however that the 900 mm tubes ordered by Iraq would have to have been cut in half to make two 400 mm rotors, and that the tubes would have needed other modifications as well in order to be used in centrifuge rotors. [The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (aka 'Robb-Silberman Commission'), 3/31/2005] The NIE’s conclusion about the tubes is challenged by two US intelligence agencies, the DOE’s in house intelligence agency, and the State Department’s Bureau of Intelligence and Research. In its dissenting opinion, the DOE says, “It is well established in open sources that bare aluminum is resistant to UF6 and anodization is unnecessary for corrosion resistance, either for the aluminum rotors or for the thousands of feet of aluminum piping in a centrifuge facility. Instead, anodization would likely introduce uncertainties into the design that would need to be resolved before a centrifuge could be operated.” The DOE’s dissenting opinion—written mainly by nuclear physicist William Domke at the Energy Department’s Lawrence Livermore National Laboratory and nuclear physicist Jeffrey Bedell at the Los Alamos National Laboratory—also notes that anodization is a standard practice in missile construction for environmental protection. The Energy Department’s centrifuge physicists suggested more than a year before that the tubes were meant to serve as casings for conventional rockets (see May 9, 2001), but CIA analysts held fast to their theory. [Washington Post, 7/19/2003; USA Today, 7/31/2003; Washington Post, 10/26/2003; US Congress, 7/7/2004, pp. 59] Years later a DOE intelligence analyst will tell two journalists, “[The DOE’s nuclear scientists] are the most boring people. Their whole lives revolve around nuclear technology. They can talk about gas centrifuges until you want to jump out of a window. And maybe once every ten years or longer there comes along an important question about gas centrifuges. That’s when you should really listen to these guys. If they say an aluminum tube is not for a gas centrifuge, it’s like a fish talking about water.” [Isikoff and Corn, 2006, pp. 40] The State Department’s Bureau of Intelligence and Research, similarly writes in its dissenting footnote: “In INR’s view Iraq’s efforts to acquire aluminum tubes is central to the argument that Baghdad is reconstituting its nuclear weapons program, but INR is not persuaded that the tubes in question are intended for use as centrifuge rotors. INR accepts the judgment of technical experts at the US Department of Energy (DOE) who have concluded that the tubes Iraq seeks to acquire are poorly suited for use in gas centrifuges to be used for uranium enrichment and finds unpersuasive the arguments advanced by others to make the case that they are intended for that purpose. INR considers it far more likely that the tubes are intended for another purpose, most likely the production of artillery rockets. The very large quantities being sought, the way the tubes were tested by the Iraqis, and the atypical lack of attention to operational security in the procurement efforts are among the factors, in addition to the DOE assessment, that lead INR to conclude that the tubes are not intended for use in Iraq’s nuclear weapon program.” [Washington Post, 7/19/2003; USA Today, 7/31/2003]
Chemical and Biological Weapons - On the question of chemical and biological weapons, the NIE says: “We judge Iraq has some lethal and incapacitating BW agents and is capable of quickly producing and weaponizing a variety of such agents, including anthrax, for delivery by bombs, missiles, aerial sprayers, and covert operatives.” But the document also highlights the belief that it is unlikely that Iraq has any intention to use these against the US. “… Baghdad for now appears to be drawing a line short of conducting terrorist attacks with conventional or CBW [Chemical/Biological Weapons] against the United States, fearing that exposure of Iraqi involvement would provide Washington with a stronger case for making war.” Iraq would probably only use such weapons against the United States if it “feared an attack that threatened the survival of the regime were imminent or unavoidable, or possibly for revenge.” [Central Intelligence Agency, 10/1/2002]
Unmanned Aerial Vehicles - Citing defectors and exiles, the NIE states that Iraq possesses unmanned aerial vehicles (UAVs) which can be used to deploy biological and chemical weapons. But the document includes a dissenting opinion by the Air Force’s National Air and Space Intelligence Center. The center, which controls most of the US military’s UAV fleet, says there is little evidence that Iraq’s drones are related to the country’s suspected biological weapons program. Current intelligence suggests that the drones are not capable of carrying much more than a camera and a video recorder. The Air Force believes that Iraq’s unmanned aerial vehicles (UAVs) are for reconnaissance, like its counterparts in the US. The dissenting opinion reads: “… The Director, Intelligence, Surveillance and Reconnaissance, US Air Force, does not agree that Iraq is developing UAVs primarily intended to be delivery platforms for chemical and biological warfare (CBW) agents. The small size of Iraq’s new UAV strongly suggests a primary role of reconnaissance, although CBW delivery is an inherent capability.” [Associated Press, 8/24/2003; Washington Post, 9/26/2003; Knight Ridder, 2/10/2004] Bob Boyd, director of the Air Force Intelligence Analysis Agency, will tell reporters in August 2003 that his department thought the allegation in the NIE “was a little odd,” noting that Air Force assessments “all along” had said that reconnaissance, not weapons delivery, was the purpose of Iraq’s drones. “Everything we discovered strengthened our conviction that the UAVs were to be used for reconnaissance,” he will explain. “What we were thinking was: Why would you purposefully design a vehicle to be an inefficient delivery means? Wouldn’t it make more sense that they were purposefully designing it to be a decent reconnaissance UAV?” [Associated Press, 8/24/2003; Washington Post, 9/26/2003] The NIE also says that Iraq is attempting to obtain commercially available route-planning software that contains topographic data of the United States. According to the NIE, this data could facilitate targeting of US sites. But Air Force analysts were not convinced by the argument, noting that this sort of information could easily be retrieved from the Internet and other highly accessible sources. “We saw nothing sinister about the inclusion of the US maps in route-planning software,” Boyd will tell reporters. [Washington Post, 9/26/2003] Analysts at the Pentagon’s Missile Defense Agency are said to back the Air Force’s National Air and Space Intelligence Center’s position. [Associated Press, 8/24/2003]
Appendices - Most of the caveats and dissents in the NIE are relegated to a variety of appendices at the end of the document. [Unger, 2007, pp. 266]
Aftermath - After the completion of the National Intelligence Estimate, the Bush administration will continue to make allegations concerning Iraq’s weapons capabilities and ties to militant Islamic groups, but will include none of the qualifications and nuances that are present in the classified NIE. After excerpts from the classified version of the NIE are published in the press in July of 2003 (see 3:09 p.m. July 11, 2003), administration officials will claim that neither Bush, Rice, nor other top officials were informed about the alternative views expressed by the DOE, INR, and the Air Force intelligence agency. They will also assert that the dissenting views did not significantly undermine the overall conclusion of the NIE that Iraq was continuing its banned weapons program despite UN resolutions. [Washington Post, 7/19/2003; New York Times, 7/19/2003; Washington Post, 7/27/2003] But this claim is later disputed in an article by the Washington Post, which reports: “One person who has worked with Rice describes as ‘inconceivable’ the claims that she was not more actively involved. Indeed, subsequent to the July 18 briefing, another senior administration official said Rice had been briefed immediately on the NIE—including the doubts about Iraq’s nuclear program—and had ‘skimmed’ the document. The official said that within a couple of weeks, Rice ‘read it all.’” [Washington Post, 7/27/2003] The official’s account, will in fact be confirmed by Rice herself, who reportedly tells Gwen Ifill at the National Association of Black Journalists Convention in Dallas on August 7, 2003: “I did read everything that the CIA produced for the president on weapons of mass destruction. I read the National Intelligence Estimate cover to cover a couple of times. I read the reports; I was briefed on the reports. This is—after 20 years, as somebody who has read a lot of intelligence reports—this is one of the strongest cases about weapons of mass destruction that I had ever read.” [Daily Howler, 8/11/2003]
Conclusions 'Overstated' - George Bush is also provided with a summary of the NIE’s dissenting views. According to the Robb-Silberman report, released in early 2005, the president’s summary of the NIE notes that “INR and DOE believe that the tubes more likely are intended for conventional weapon uses.” [The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (aka 'Robb-Silberman Commission'), 3/31/2005] Additionally, senior CIA analyst Stuart Cohen, the acting chairman of the National Intelligence Council at this time, who helped write the document, will tell the Agence France-Presse, “Any reader would have had to read only as far as the second paragraph of the Key Judgments to know that as we said, ‘we lacked specific information on many key aspects of Iraq’s WMD program.’” The Key Judgments section is also where INR’s detailed dissent on the aluminum tubes allegation was located. [Agence France-Presse, 11/30/2003] A Senate Intelligence Committee investigation will determine in July 2004 that “most of the major key judgments in the Intelligence Community’s October 2002 National Intelligence Estimate (NIE), Iraq’s Continuing Programs for Weapons of Mass Destruction, either overstated, or were not supported by, the underlying intelligence reporting.” [US Congress, 7/7/2004, pp. 59] And in 2006, one of the report’s authors, CIA senior analyst Paul Pillar, will admit the NIE had been written with the intent of “strengthen[ing] the case of going to war with the American public.” [PBS Frontline, 6/20/2006]
NIE 'Distorted' Due to Political Pressures, Author Claims - In 2007, author Craig Unger will write, “At the time, to virtually everyone in Congress, the NIE was still sacrosanct. It was still the last word in American intelligence. Yet it had been distorted thanks to political pressures from the neocons and the White House. If one took it seriously, the Niger documents were real. Curveball had credibility. And the aluminum tubes were part of Saddam’s nuclear program. Only one conclusion could be drawn: Saddam Hussein post an extraordinarily grave threat.” [Unger, 2007, pp. 266]

Entity Tags: Bob Boyd, Condoleezza Rice, Bureau of Intelligence and Research, Paul R. Pillar, US Congress, Jeffrey Bedell, Stuart Cohen, George W. Bush

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

The Associated Press reports that Islamist militant leader Abu Musab al-Zarqawi “was in Baghdad about two months ago, and US officials suspect his presence was known to the government of Iraqi President Saddam Hussein, a defense official said…” This anonymous US official also calls al-Zarqawi among al-Qaeda’s top two dozen leaders. The article notes that “some US officials… contend the United States has no solid evidence of Iraq and al-Qaeda working together to conduct terrorist operations.” [Associated Press, 10/2/2002] But despite this caveat, just five days later, in a public speech President Bush mentions “one very senior al-Qaeda leader who received medical treatment in Baghdad this year, and who has been associated with planning for chemical and biological attacks” (see October 7, 2002). This is a reference to al-Zarqawi, and is said to be based on communications intercepts. But the same day as the speech, Knight Ridder Newspapers reports that according to US intelligence officials, “The intercepts provide no evidence that [al-Zarqawi] was working with the Iraqi regime or that he was working on a terrorist operation while he was in Iraq.” [Knight Ridder, 10/7/2002; US President, 10/14/2002] After the US invades Iraq in March 2003, evidence of this Baghdad connection will start to be questioned. Reports that al-Zarqawi was there to have a leg amputated will later be debunked (see January 26, 2003). In June 2003, Newsweek will report, “Bush Administration officials also have acknowledged that their information about al-Zarqawi’s stay in Baghdad is sketchy at best.” [Newsweek, 6/25/2003] Whether al-Zarqawi stayed in Baghdad and if the Hussein government was aware of his movements remains unclear.

Entity Tags: George W. Bush, Abu Musab al-Zarqawi

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion

Preparing for a major speech by President Bush on Iraq (see October 7, 2002), the National Security Council has sent the sixth draft of the speech to the CIA for vetting. It includes a line saying that Iraq “has been caught attempting to purchase up to 500 metric tons of uranium oxide from Africa—an essential ingredient in the enrichment process.” It is essentially the same language turned down by the CIA for an earlier speech (see September 11, 2002). In response, the CIA’s associate deputy director for intelligence [ADDI] sends a four-page memo to Bush administration officials, including Bush’s Deputy National Security Adviser, Stephen J. Hadley, and the chief speechwriter, Michael Gerson, expressing doubt over claims that Iraq had attempted to obtain uranium from Niger. On page three of the memo, the ADDI advises removing the allegation from the draft of Bush’s upcoming speech in Cincinnati. “[R]emove the sentence because the amount is in dispute and it is debatable whether it can be acquired from the source. We told Congress that the Brits have exaggerated this issue (see September 24, 2002). Finally, the Iraqis already have 550 metric tons of uranium oxide in their inventory.” [Washington Post, 7/23/2003; Unger, 2007, pp. 261-262] Despite the warning, the White House refuses to make substantial changes. Draft seven of the speech, completed later in the day (see October 6, 2002), contains the passage, “[T]he regime has been caught attempting to purchase substantial amounts of uranium oxide from sources in Africa.” [US Congress, 7/7/2004] Hadley will later claim in July 2003 that he did not brief his boss, Condoleezza Rice, on the memo. [Washington Post, 7/27/2003]

Entity Tags: Stephen J. Hadley, Condoleezza Rice, Michael Gerson, Bush administration (43), Central Intelligence Agency

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

The CIA’s associate deputy director for intelligence (ADDI) receives draft seven of President Bush’s upcoming speech in Cincinnati and sees that the speechwriters have failed to remove the passage on Iraq’s alleged attempt to purchase uranium from Niger, as the CIA had advised the day before (see October 5, 2002). The revised passage reads in part, “the regime has been caught attempting to purchase a substantial amount of uranium oxide from sources in Africa.” The ADDI contacts Director of Central Intelligence George Tenet and tells him that the “president should not be a fact witness on this issue” because the agency’s analysts consider the reporting “weak” and say it is based solely on one source. Tenet then personally calls White House officials, including Deputy National Security Adviser Stephen Hadley, with the CIA’s concerns. The allegation is finally removed from the speech. Later in the day, to press its point even further, the CIA faxes another memo, summarizing its position on the Africa-uranium claim. The memo states: “[M]ore on why we recommend removing the sentence about procuring uranium oxide from Africa: Three points (1) The evidence is weak. One of the two mines cited by the source as the location of the uranium oxide is flooded. The other mine cited by the source is under the control of the French authorities. (2) The procurement is not particularly significant to Iraq’s nuclear ambitions because the Iraqis already have a large stock of uranium oxide in their inventory. And (3) we have shared points one and two with Congress, telling them that the Africa story is overblown and telling them this is one of the two issues where we differed with the British.” [Washington Post, 7/13/2003; Washington Post, 7/23/2003; US Congress, 7/7/2004; Unger, 2007, pp. 261-262] The memo’s recipients include National Security Adviser Condoleezza Rice and her deputy, Hadley. [Washington Post, 7/23/2003] Bush will not use the reference in his speech—although he does repeat the “smoking gun/mushroom cloud” trope (see September 4, 2002)—but the administration’s neoconservatives, such as Hadley, are not through with the issue. They will continue trying to insert the language into other speeches (see Mid-January 2003 and 9:01 pm January 28, 2003). Larry Wilkerson, the chief of staff for Secretary of State Colin Powell, will later say: “That was their favorite technique. Stick that baby in there 47 times and on the 47th time it would stay. I’m serious. It was interesting to watch them do this. At every level of the decision-making process you had to have your axe out, ready to chop their fingers off. Sooner or later you would miss one and it would get in there.” [Unger, 2007, pp. 261-262]

Entity Tags: Lawrence Wilkerson, Central Intelligence Agency, Condoleezza Rice, George J. Tenet, Stephen J. Hadley

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

CIA Director George Tenet sends a letter to Senator Bob Graham (D-FL), the chairman of the Senate Intelligence Committee. In the letter, Tenet acknowledges declassifying some “material available to further the Senate’s forthcoming open debate on a joint resolution concerning Iraq” (see October 7, 2002). Tenet says that the declassified information supports the following contentions:
bullet “Our understanding of the relationship between Iraq and al-Qaeda is evolving and is based on sources of varying reliability. Some of the information we have received comes from detainees, including some of high rank.”
bullet “We have solid reporting of senior level contacts between Iraq and al-Qaeda going back a decade.”
bullet “Credible information indicates that Iraq and al-Qaeda have discussed safe haven and reciprocal nonaggression.”
bullet “Since Operation Enduring Freedom (see October 7, 2001), we have solid evidence of the presence in Iraq of al-Qaeda members, including some that have been in Baghdad.”
bullet “We have credible reporting that al-Qaeda leaders sought contacts in Iraq who could help them acquire WMD capabilities. The reporting also stated that Iraq has provided training to al-Qaeda members in the areas of poisons and gases and making conventional bombs.”
bullet “Iraq’s increasing support to extremist Palestinians coupled with growing indications of a relationship with al-Qaeda, suggest that Baghdad’s links to terrorists will increase, even absent US military action.” [Senate Intelligence Committee, 10/7/2002; New York Times, 10/9/2002]
In 2007, former CIA analyst Valerie Plame Wilson will write that in the weeks and months preceding the invasion of Iraq, “Congress, just like the general public, was being bombarded with dreadful scenarios of what would happen if the perceived imminent threat from Iraq was not stopped in its tracks.” Plame Wilson will note that little strong evidence exists in CIA analyses to support Tenet’s contentions. [Wilson, 2007, pp. 121]

Entity Tags: Daniel Robert (“Bob”) Graham, George J. Tenet, Central Intelligence Agency, Valerie Plame Wilson, Al-Qaeda, Senate Intelligence Committee

Timeline Tags: Events Leading to Iraq Invasion

Italian freelance information peddler and former SISMI agent Rocco Martino, surprised at the tremendous media coverage his documents alleging an Iraq-Niger uranium deal are receiving (see September 24, 2002,March 2000, Late June 2002, and Summer 2004), approaches Elisabetta Burba, a journalist for a Milan news magazine, Panorama. Martino and Burba have worked together in the past; she considers him to be a reliable source. Panorama is edited by Carlo Rossella, a close political ally of conservative Prime Minister Silvio Berlusconi (see October 16, 2001). Berlusconi is a close ally of the Bush administration, and is actively working with the US to promote the war with Iraq. One of Panorama’s foreign contributors is American neoconservative Michael Ledeen (see December 9, 2001). These are all considerations which may have influenced Martino’s decision to contact Burba rather than a journalist with another news outlet. He tells her that he has some documents (see March 2000) that might interest her. [Talking Points Memo, 10/31/2003; Financial Times, 8/2/2004; Unger, 2007, pp. 259-261; Washington Post, 4/3/2007]
'Let's Make This War Start' - They meet at a restaurant in Rome. Martino tells Burba that he has documents proving that Iraq made a deal to purchase hundreds of tons of uranium from Niger. “Let’s make this war start,” he says. “This is a megagalactica situation.” [Isikoff and Corn, 2006, pp. 147]
The 'Italian Letter' - Perhaps the most interesting document is a letter from Nigerien President Mamadou Tandja to Iraqi dictator Saddam Hussein, giving his formal approval for a deal for Niger to sell 500 tons of uranium a year to Iraq. Washington Post reporter Peter Eisner will later write, “This was the smoking gun in the package, claiming to show the formal approval of Niger’s president to supply Iraq with a commodity that would in all likelihood only be used for a nuclear weapons program: Iraq had no nuclear power plants.” The letter is written in all capital letters, like an old telex, is dated July 27, 2000, and bears what Eisner describes as “an odd shield on the top, a shining sun surrounded by a horned animal head, a star, and a bird.” It is marked “Confidential and Urgent.” The letter reads in part, “500 tons of pure uranium per year will be delivered in two phases.” It bears a seal reading “The Office of the President of the Republic of Niger.” Written over the seal is a barely legible signature, apparently from Tandja. [Washington Post, 4/3/2007]
Cash on Corroboration - Martino hands over copies of the documents, totaling some 22 pages, mostly in French, and offers to sell Burba the originals. Skeptical but interested, Burba agrees to pay Martino 10,000 euros—about $12,500—for the documents if they can be corroborated by independent authorities. When Burba informs Rossella of the deal later in the day, he proposes sending her to Africa to investigate the claim (see October 16, 2002 and After), and insists she give copies of Martino’s documents to the US embassy. “I think the Americans are very interested in this problem of unconventional weapons,” he tells her. [Agence France-Presse, 7/19/2003; Reuters, 7/19/2003; New Yorker, 10/27/2003; Talking Points Memo, 10/31/2003; Unger, 2007, pp. 259-261; Washington Post, 4/3/2007]

Entity Tags: Peter Eisner, Panorama, Rocco Martino, Michael Ledeen, Bush administration (43), Elisabetta Burba, Mamadou Tandja, Saddam Hussein, Carlo Rossella, Silvio Berlusconi

Timeline Tags: Niger Uranium and Plame Outing

Page 1 of 3 (273 events)
previous | 1, 2, 3 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike