!! History Commons Alert, Exciting News

Context of 'August 1960-February 1963: CIA Plans to Poison Cuban Leaders'

This is a scalable context timeline. It contains events related to the event August 1960-February 1963: CIA Plans to Poison Cuban Leaders. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 3 (221 events)
previous | 1, 2, 3 | next

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

The CIA’s Technical Services Division (TSD) considers plans to undermine Fidel Castro’s charismatic appeal by sabotaging his speeches. At one point, there is discussion of spraying Castro’s broadcasting studio with a hallucinogenic chemical. The plan is taken of the shelf because the chemical is deemed unreliable. During this period, the TSD laces a box of cigars with a chemical that would produce temporary disorientation, hoping that he will smoke one of the cigars before giving a speech. In another instance, the TSD comes up with a scheme to dust Castro’s shoes with thallium salts during a trip outside of Cuba. The salts would cause his beard to fall out. The plan is abandoned when Castro cancels the trip. [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, Technical Services Division (TSD)

Timeline Tags: US-Cuba (1959-2005)

The CIA offers to pay a Cuban $10,000 to arrange a fatal accident involving Fidel Castro’s brother, Raul. After the Cuban leaves to meet with Raul, the CIA instructs the local case officer in Havana to abort the operation. The Cuban later says he did not have an opportunity to set up an accident. [US Congress, 12/18/1975]

Entity Tags: Raul Castro

Timeline Tags: US-Cuba (1959-2005)

The CIA plans an operation to poison Fidel Castro, as well as his brother Raul and Che Chevarra, with pills containing botulinum toxin. The plan drags on for more than two years, but is ultimately aborted. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Entity Tags: Technical Services Division (TSD), Robert E. Maheu, William Harvey, Sheffield Edwards, Richard Bissell, Raul Castro, James O ‘Connell, Ché Guevara, Fidel Castro

Timeline Tags: US-Cuba (1959-2005)

The CIA works with a high-level Cuban official, codenamed “AM/LASH,” on a plan to assassinate Fidel Castro and overthrow his government. In June 1965, the CIA ends its contact with AM/LASH and his associates, citing security concerns. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Timeline Tags: US-Cuba (1959-2005)

The CIA’s Task Force W devises two plans to assassinate Fidel Castro. The first one, involving an exploding sea shell that would be placed where Castro regularly dives, is dismissed by the CIA’s Technical Services Division (TSD) as impractical. In the second plan, James Donovan (who has been negotiating with Castro for the release of prisoners taken during the Bay of Pigs operation) would present Castro with a contaminated diving suit. TSD decides to give the plan a try. It purchases a diving suit and laces its breathing apparatus with tubercule bacillus. The suit itself is dusted with a fungus that is known to cause a chronic skin disease. But the suit never leaves the laboratory. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Entity Tags: Technical Services Division (TSD), James Donovan, Fidel Castro

Timeline Tags: US-Cuba (1959-2005)

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]

Entity Tags: Malcolm Little, Central Intelligence Agency, Church Committee, Lew Allen, National Security Agency, Martin Luther King, Jr., Office of Security Services, Joan Baez

Timeline Tags: Civil Liberties

President Nixon meets with FBI Director J. Edgar Hoover, CIA Director Richard Helms, and the heads of the NSA and DIA to discuss a proposed new domestic intelligence system. His presentation is prepared by young White House aide Tom Charles Huston (derisively called “Secret Agent X-5” behind his back by some White House officials). The plan is based on the assumption that, as Nixon says, “hundreds, perhaps thousands, of Americans—mostly under 30—are determined to destroy our society.” Nixon complains that the various US intelligence agencies spend as much time battling with one another over turf and influence as they do working to locate threats to national security both inside and outside of the country. The agencies need to prove the assumed connections between the antiwar demonstrators and Communists. The group in Nixon’s office will now be called the “Interagency Committee on Intelligence,” Nixon orders, with Hoover chairing the new ad hoc group, and demands an immediate “threat assessment” about domestic enemies to his administration. Huston will be the White House liaison. Historian Richard Reeves will later write: “The elevation of Huston, a fourth-level White House aide, into the company of Hoover and Helms was a calculated insult. Nixon was convinced that both the FBI and the CIA had failed to find the links he was sure bound domestic troubles and foreign communism. But bringing them to the White House was also part of a larger Nixon plan. He was determined to exert presidential control over the parts of the government he cared most about—the agencies dealing with foreign policy, military matters, intelligence, law, criminal justice, and general order.” [Reeves, 2001, pp. 229-230]

Entity Tags: Richard Reeves, Tom Charles Huston, Central Intelligence Agency, Defense Intelligence Agency, Federal Bureau of Investigation, J. Edgar Hoover, Richard M. Nixon, Richard Helms, National Security Agency

Timeline Tags: Civil Liberties, Nixon and Watergate

President Nixon approves the “Huston Plan” for greatly expanding domestic intelligence-gathering by the FBI, CIA and other agencies. Four days later he rescinds his approval. [Washington Post, 2008] Nixon aide Tom Charles Huston comes up with the plan, which involves authorizing the CIA, FBI, NSA, and military intelligence agencies to escalate their electronic surveillance of “domestic security threats” in the face of supposed threats from Communist-led youth agitators and antiwar groups (see June 5, 1970). The plan would also authorize the surreptitious reading of private mail, lift restrictions against surreptitious entries or break-ins to gather information, plant informants on college campuses, and create a new, White House-based “Interagency Group on Domestic Intelligence and Internal Security.” Huston’s Top Secret memo warns that parts of the plan are “clearly illegal.” Nixon approves the plan, but rejects one element—that he personally authorize any break-ins. Nixon orders that all information and operations to be undertaken under the new plan be channeled through his chief of staff, H. R. Haldeman, with Nixon deliberately being left out of the loop. The first operations to be undertaken are using the Internal Revenue Service to harass left-wing think tanks and charitable organizations such as the Brookings Institution and the Ford Foundation. Huston writes that “[m]aking sensitive political inquiries at the IRS is about as safe a procedure as trusting a whore,” since the administration has no “reliable political friends at IRS.” He adds, “We won’t be in control of the government and in a position of effective leverage until such time as we have complete and total control of the top three slots of the IRS.” Huston suggests breaking into the Brookings Institute to find “the classified material which they have stashed over there,” adding: “There are a number of ways we could handle this. There are risks in all of them, of course; but there are also risks in allowing a government-in-exile to grow increasingly arrogant and powerful as each day goes by.” [Reeves, 2001, pp. 235-236] In 2007, author James Reston Jr. will call the Huston plan “arguably the most anti-democratic document in American history… a blueprint to undermine the fundamental right of dissent and free speech in America.” [Reston, 2007, pp. 102]

Entity Tags: US Department of Defense, National Security Agency, Richard M. Nixon, Brookings Institution, Central Intelligence Agency, Federal Bureau of Investigation, Ford Foundation, Internal Revenue Service, Tom Charles Huston, James Reston, Jr

Timeline Tags: Civil Liberties, Nixon and Watergate

July 26-27, 1970: Nixon Rejects Huston Plan

After President Nixon approves of the so-called “Huston Plan” to implement a sweeping new domestic intelligence and internal security apparatus (see July 14, 1970), FBI director J. Edgar Hoover brings the plan’s author, White House aide Tom Charles Huston (see June 5, 1970), into his office and vents his disapproval. The “old ways” of unfettered wiretaps, political infiltration, and calculated break-ins and burglaries are “too dangerous,” he tells Huston. When, not if, the operations are revealed to the public, they will open up scrutiny of US law enforcement and intelligence agencies, and possibly reveal other, past illegal domestic surveillance operations that would embarrass the government. Hoover says he will not share FBI intelligence with other agencies, and will not authorize any illegal activities without President Nixon’s personal, written approval. The next day, Nixon orders all copies of the decision memo collected, and withdraws his support for the plan. [Reeves, 2001, pp. 236-237] W. Mark Felt, the deputy director of the FBI, later calls Huston “a kind of White House gauleiter over the intelligence community.” Washington Post reporter Bob Woodward will note that the definition of “gauleiter” is, according to Webster’s Dictionary, “the leader or chief officoal of a political district under Nazi control.” [Woodward, 2005, pp. 33-34]

Entity Tags: W. Mark Felt, Tom Charles Huston, J. Edgar Hoover, Federal Bureau of Investigation, Central Intelligence Agency, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

The US Supreme Court, in what becomes informally known as the “Keith case,” upholds, 8-0, an appellate court ruling that strikes down warrantless surveillance of domestic groups for national security purposes. The Department of Justice had wiretapped, without court warrants, several defendants charged with destruction of government property; those wiretaps provided key evidence against the defendants. Attorney General John Mitchell refused to disclose the source of the evidence pursuant to the “national security” exception to the Omnibus Crime Control and Safe Streets Act of 1968. The courts disagreed, and the government appealed the decision to the Supreme Court, which upheld the lower courts’ rulings against the government in a unanimous verdict. The Court held that the wiretaps were an unconstitutional violation of the Fourth Amendment, establishing the judicial precedent that warrants must be obtained before the government can wiretap a US citizen. [US Supreme Court, 6/19/1972; Bernstein and Woodward, 1974, pp. 258-259] Critics of the Nixon administration have long argued that its so-called “Mitchell Doctrine” of warrantlessly wiretapping “subversives” has been misused to spy on anyone whom Nixon officials believe may be political enemies. [Bernstein and Woodward, 1974, pp. 258-259] As a result of the Supreme Court’s decision, Congress passes the Foreign Intelligence Surveillance Act. [John Conyers, 5/14/2003]
Opinion of Justice Powell - Writing for the Court, Justice Lewis Powell observes: “History abundantly documents the tendency of Government—however benevolent and benign its motives—to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the government attempts to act under so vague a concept as the power to protect ‘domestic security.’ Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent.” [US Supreme Court, 6/19/1972]
Justice Department Wiretapped Reporters, Government Officials - In February 1973, the media will report that, under the policy, the Justice Department had wiretapped both reporters and Nixon officials themselves who were suspected of leaking information to the press (see May 1969 and July 26-27, 1970), and that some of the information gleaned from those wiretaps was given to “Plumbers” E. Howard Hunt and G. Gordon Liddy for their own political espionage operations. [Bernstein and Woodward, 1974, pp. 258-259]
Conyers Hails Decision 30 Years Later - In 2003, Representative John Conyers (D-MI) will say on the floor of the House: “Prior to 1970, every modern president had claimed ‘inherent Executive power’ to conduct electronic surveillance in ‘national security’ cases without the judicial warrant required in criminal cases by the Fourth Amendment to the Constitution. Then Attorney General John Mitchell, on behalf of President Richard Nixon sought to wiretap several alleged ‘domestic’ terrorists without warrants, on the ground that it was a national security matter. Judge [Damon] Keith rejected this claim of the Sovereign’s inherent power to avoid the safeguard of the Fourth Amendment. He ordered the government to produce the wiretap transcripts. When the Attorney General appealed to the US Supreme Court, the Court unanimously affirmed Judge Keith. The Keith decision not only marked a watershed in civil liberties protection for Americans. It also led directly to the current statutory restriction on the government’s electronic snooping in national security cases.” [John Conyers, 5/14/2003]

Entity Tags: Lewis Powell, US Supreme Court, John Mitchell, E. Howard Hunt, US Department of Justice, G. Gordon Liddy, ’Plumbers’, Damon Keith, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

CIA Counterintelligence Director James Angleton.CIA Counterintelligence Director James Angleton. [Source: CI Centre.com]CIA Director James Schlesinger orders an internal review of CIA surveillance operations against US citizens. The review finds dozens of instances of illegal CIA surveillance operations against US citizens dating back to the 1950s, including break-ins, wiretaps, and the surreptitious opening of personal mail. The earlier surveillance operations were not directly targeted at US citizens, but against “suspected foreign intelligence agents operating in the United States.” Schlesinger is disturbed to find that the CIA is currently mounting illegal surveillance operations against antiwar protesters, civil rights organizations, and political “enemies” of the Nixon administration. In the 1960s and early 1970s, CIA agents photographed participants in antiwar rallies and other demonstrations. The CIA also created a network of informants who were tasked to penetrate antiwar and civil rights groups and report back on their findings. At least one antiwar Congressman was placed under surveillance, and other members of Congress were included in the agency’s dossier of “dissident Americans.” As yet, neither Schlesinger nor his successor, current CIA Director William Colby, will be able to learn whether or not Schlesinger’s predecessor, Richard Helms, was asked by Nixon officials to perform such illegal surveillance, though both Schlesinger and Colby disapproved of the operations once they learned of them. Colby will privately inform the heads of the House and Senate Intelligence Committees of the domestic spying engaged in by his agency. The domestic spying program was headed by James Angleton, who is still serving as the CIA’s head of counterintelligence operations, one of the most powerful and secretive bureaus inside the agency. It is Angleton’s job to maintain the CIA’s “sources and methods of intelligence,” including the prevention of foreign “moles” from penetrating the CIA. But to use counterintelligence as a justification for the domestic spying program is wrong, several sources with first-hand knowledge of the program will say in 1974. “Look, that’s how it started,” says one. “They were looking for evidence of foreign involvement in the antiwar movement. But that’s not how it ended up. This just grew and mushroomed internally.” The source continues, speaking hypothetically: “Maybe they began with a check on [Jane] Fonda. They began to check on her friends. They’d see her at an antiwar rally and take photographs. I think this was going on even before the Huston plan” (see July 26-27, 1970 and December 21, 1974). “This wasn’t a series of isolated events. It was highly coordinated. People were targeted, information was collected on them, and it was all put on [computer] tape, just like the agency does with information about KGB agents. Every one of these acts was blatantly illegal.” Schlesinger begins a round of reforms in the CIA, a program continued by Colby. [New York Times, 12/22/1974 pdf file]

Entity Tags: William Colby, Senate Intelligence Committee, Richard Helms, James Angleton, Jane Fonda, Nixon administration, Central Intelligence Agency, James R. Schlesinger, House Intelligence Committee

Timeline Tags: Civil Liberties

Former CIA director Richard Helms.Former CIA director Richard Helms. [Source: Search.com]Former CIA director Richard Helms indirectly confirms the involvement of the Nixon administration in his agency’s illegal domestic surveillance operations during his testimony before the Senate Watergate investigative committee. Helms tells the committee that he was told by Nixon’s Foreign Intelligence Advisory Board that the CIA could “make a contribution” in domestic intelligence operations. “I pointed out to them very quickly that it could not, there was no way,” Helms testifies. “But this was a matter that kept coming up in the context of feelers: Isn’t there somebody else who can take on these things if the FBI isn’t doing them as well as they should, as there are no other facilities?” (FBI director J. Edgar Hoover’s opposition to the idea of spying on US citizens for Nixon’s political purposes is well documented.) CIA officials say that, despite Helms’s testimony, Helms began the domestic spying program as asked, in the beginning to investigate beliefs that the antiwar movement was permeated by foreign intelligence agents in 1969 and 1970. “It started as a foreign intelligence operation and it bureaucratically grew,” one source says in 1974. “That’s really the answer.” The CIA “simply began using the same techniques for foreigners against new targets here.” The source will say James Angleton, the CIA’s director of counterintelligence (see 1973), began recruiting double agents inside the antiwar and civil rights organizations, and sending in “ringers” to penetrate the groups and report back to the CIA. “It was like a little FBI operation.” Angleton reportedly believes that both the protest groups and the US media are riddled with Soviet intelligence agents, and acts accordingly to keep those groups and organizations under constant watch. One source will say Angleton has a “spook mentality.” Another source will say that Angleton’s counterintelligence bureau is “an independent power in the CIA. Even people in the agency aren’t allowed to deal directly with the CI [counterintelligence] people. Once you’re in it, you’re in it for life.” [New York Times, 12/22/1974 pdf file]

Entity Tags: Senate Watergate Investigative Committee, Richard Helms, J. Edgar Hoover, James Angleton, Issuetsdeah

Timeline Tags: Civil Liberties, Nixon and Watergate

President Ford announces the selection of former New York governor Nelson Rockefeller, a moderately liberal Republican, as his vice president. Ford gives Richard Nixon a courtesy call to inform him of the selection before making the public announcement. Nixon seems “very pleased,” Ford will later write. “He said Nelson’s name and experience in foreign policy would help me internationally, and that he was fully qualified to be president should something happen to me. The extreme right wing, he continued, would be very upset, but I shouldn’t worry because I couldn’t please them anyway.” Ford then telephones George H.W. Bush, who is bitterly disappointed at being passed over. To make the public announcement, Ford enters the Oval Office with Rockefeller at his side. Ford characterizes the decision to select Rockefeller as “a tough call for a tough job.” Rockefeller must be confirmed by the Senate, but no one expects any difficulties on that score. Rockefeller does cause a stir by confirming that Ford has “every intention” of running for president in 1976, though Rockefeller will not confirm that he will also be on the ticket. Most Republicans outside of the hard-core right applaud Rockefeller’s selection. House Minority Leader John Rhodes (R-AZ), a longtime Ford ally, chides the extremists: “I can’t believe conservative Republicans feel broadening the base of the party is a bad thing—unless they want to keep on losing and keep being a minority—and I just can’t subscribe to that way of thinking.” The mainstream media approves of Rockefeller as well, with CBS’s Eric Sevareid calling the new Ford-Rockefeller administration a triumph of “common sense.” He goes on to say the two are so popular that Democrats, “more deeply divided than the Republicans,” may find themselves in for a “long stretch in the political wilderness.… They thought they could run against Nixon for the next twenty [years]. But as things stand now they can’t run against Nixon even this year.” [Werth, 2006, pp. 138-143]

Entity Tags: Richard M. Nixon, Gerald Rudolph Ford, Jr, Eric Sevareid, George Herbert Walker Bush, John Rhodes, Nelson Rockefeller

Timeline Tags: Nixon and Watergate

Ronald Reagan and Gerald Ford at a Los Angeles hotel, October 1974.Ronald Reagan and Gerald Ford at a Los Angeles hotel, October 1974. [Source: David Hume Kennerly / Vanity Fair]The Republican governor of California, Ronald Reagan, has until now been undecided whether to run for president in 1976 against Ford. But Nelson Rockefeller’s nomination as vice president (see August 20, 1974) galvanizes Reagan and his team. Conservative Republicans begin gathering under Reagan’s banner to oppose what they see as an unacceptably left-leaning 1976 ticket of Ford and Rockefeller. Reagan is not universally popular in the GOP: Richard Nixon thought him “strange” and not “pleasant to be around.” For his part, Reagan has until now staunchly supported Nixon throughout the Watergate debacle, but has begun exhorting young conservatives to forget Nixon and embrace conservative ideology. At a Maryland fund-raising party, Reagan tells the crowd that the Ford administration must reassert what he calls the “mandate of 1972,” when Nixon trounced Democratic presidential candidate George McGovern in the most lopsided victory in modern US history. By re-electing Nixon so overwhelmingly, Reagan says, “voters rejected an invitation to Utopia and reaffirmed the basic values from which our system was built. They voted for fiscal responsibility and individual determination of their own destinies.… They repudiated the idea that government should grow bigger and bigger, that we should embrace more costly programs to alleviate human misery—programs that somehow never succeed no matter how much money is spent on them. The mandate of 1972 was a matter of the people vs. big government. The people, I believe, have given the government a mandate which they expect to be enforced.” [Werth, 2006, pp. 180-181]

Entity Tags: Richard M. Nixon, Ronald Reagan, Gerald Rudolph Ford, Jr, Ford administration, George S. McGovern, Nelson Rockefeller

Timeline Tags: Nixon and Watergate

Dick Cheney and Donald Rumsfeld speaking to reporters, 1975.Dick Cheney and Donald Rumsfeld speaking to reporters, 1975. [Source: Gaylinkcontent (.com)]President Ford asks Donald Rumsfeld to replace the outgoing Alexander Haig at the White House (see September 16-Late September, 1974). Rumsfeld has long been Haig’s choice to replace him (see August 14, 1974). Ford does not want to give Rumsfeld the official title of “chief of staff,” and instead wants Rumsfeld as “staff coordinator.” The difference is academic. Ford wants the aggressive, bureaucratically savvy Rumsfeld to help him regain control over a White House that is, in the words of author Barry Werth, “riven with disunity, disorganization, and bad blood.” Rumsfeld agrees, and names former Wyoming Congressman Dick Cheney as his deputy (who makes himself valuable by initially doing the lowest forms of bureaucratic scutwork). Rumsfeld and Cheney will eventually wield almost Nixonian power in Ford’s White House, successfully blocking the “in-house liberal,” Vice President Rockefeller, from exerting any real influence, and hobbling Henry Kissinger’s almost-limitless influence.
Blocking of Rockefeller and Kissinger for Ideological and Political Reasons - Rumsfeld begins his in-house assault in classic fashion: trying to cause tension between Kissinger and White House officials by snitching on Kissinger to any White House official who will listen. Kissinger eventually tells Ford: “Don’t listen to [Rumsfeld], Mr. President. He’s running for president in 1980.” Rumsfeld and Cheney do their best to open the White House to hardline defense hawks and the even more hardline neoconservatives led by Senator Henry “Scoop” Jackson (D-WA) and Jackson’s aide, Richard Perle. (Though Rumsfeld and Cheney are not considered neoconservatives in a strict sense, their aims are almost identical—see June 4-5, 1974). Kissinger’s efforts to win a negotiated peace between Israel and Palestine in the Middle East are held in contempt by Rumsfeld, Cheney, and the neoconservatives; using Ford’s press secretary Ron Nessen as a conduit, Rumsfeld and Cheney leak information about the negotiations to the press, helping to cripple the entire peace process. Rumsfeld and Cheney have larger personal plans as well: they want to secure the White House for Rumsfeld, perhaps as early as 1976, but certainly by 1980. One of their methods of winning support is to undercut Kissinger as much as possible; they believe they can win support among the GOP’s right wing by thwarting Kissinger’s “realpolitik” foreign policy stratagems.
Rumsfeld as 'Wizard of Oz' - According to the chief of Ford’s Economic Policy Board, William Seidman, Rumsfeld’s bureaucratic machinations remind him of the Wizard of Oz: “He thought he was invisible behind the curtain as he worked the levers, but in reality everyone could see what he was doing.” Rumsfeld and Cheney will make their most open grasp for power in orchestrating the “Halloween Massacre” (see November 4, 1975 and After). [Werth, 2006, pp. 336-337; Unger, 2007, pp. 49-52]

Entity Tags: William Seidman, Ron Nessen, Richard Perle, Barry Werth, Gerald Rudolph Ford, Jr, Donald Rumsfeld, Richard (“Dick”) Cheney, Henry (“Scoop”) Jackson, Henry A. Kissinger, Nelson Rockefeller, Alexander M. Haig, Jr.

Timeline Tags: Nixon and Watergate

Nelson Rockefeller is sworn in as vice president (see August 20, 1974). [Rockefeller Family Archives, 6/7/2007]
Bad Blood and Confirmation Difficulties - Rockefeller has trouble even before taking office. Branded as a liberal by many in the Republican Party, and winning as many enemies as friends with his outsized ego and gladhanding demeanor, Rockefeller garnered swift and obdurate resistance particularly from the right wing both outside the White House (see August 24, 1974) and in (see September 21, 1974 and After). During the Senate’s confirmation hearings, many Democrats and some Republicans relished forcing Rockefeller, one of the wealthiest men in the country, to open his finances to public scrutiny. Even President Ford privately expresses his astonishment. “Can you imagine?” he asked during the hearings. “Nelson lost $30 million in one year and it didn’t make any difference.” When it was revealed that Rockefeller had given huge personal contributions to lawmakers and government officials—including Secretary of State Henry Kissinger—in the form of “loans” that never needed repaying, the Senate hearings became even more inquisitorial. The hearings dragged on for months until Ford personally intervened, telling House and Senate leaders that it was “in the national interest that you confirm Rockefeller, and I’m asking you to move as soon as possible.” [US Senate, 7/7/2007]
Cheney Wanted Reagan - Deputy Chief of Staff Dick Cheney, far more conservative than either Ford or Rockefeller, opposes Rockefeller’s influence from the start, and works with his boss, Chief of Staff Donald Rumsfeld, to minimize Rockefeller’s influence. In 1986, Cheney will say that Ford “should have thought of Ronald Reagan as vice president in the summer of 1974, if you are talking strictly in political terms.” [Dubose and Bernstein, 2006, pp. 38]
Domestic Squabbles - Both Ford and Rockefeller want the new vice president to be what Ford calls “a full partner” in his administration, particularly on domestic issues. Ford appoints him to chair the Domestic Council, but behind the scenes, Rockefeller’s implacable enemy, Rumsfeld, who sees Rockefeller as a “New Deal” economic liberal, blocks his influence at every term, both from personal and ideological dislike and from a desire to keep power in the White House to himself and his small, close-knit aides. (Cheney, ever attentive to indirect manipulations, inflames Rumsfeld’s dislike of Rockefeller even further by suggesting to his nakedly ambitious boss that if Rockefeller was too successful in implementing domestic policy, he would be perceived as “the man responsible for drafting the agenda of 1976,” thus limiting Rumsfeld’s chances of being named vice president in Ford’s re-election campaign (see November 4, 1975 and After). When Rockefeller tries to implement Ford’s suggested policy that domestic policymakers report to Ford through Rockefeller, Rumsfeld interferes. When Rockefeller names one of his trusted assistants, James Cannon, to head the Domestic Council, Rumsfeld slashes the Council’s budget almost to zero. When Rockefeller proposes a $100 billion Energy Independence Authority, with the aim to reduce and perhaps even end the nation’s dependency on foreign energy sources, Rumsfeld joins Ford’s economic and environmental advisers to block its creation. When Rockefeller proposes an idea for the president to Rumsfeld, Rumsfeld hands it off to Cheney, who ensures that it dies a quiet, untraceable bureaucratic death.
Rockefeller Neutralized - Cheney later recalls that Rockefeller “came to a point where he was absolutely convinced that Don Rumsfeld and myself were out to scuttle whatever new initiatives he could come up with.” Rumsfeld and other Ford staffers ensure that Rockefeller is not involved in key policy meetings; when Ford proposes large cuts in federal taxes and spending, Rockefeller complains, “This is the most important move the president has made, and I wasn’t even consulted.” Asked what he is allowed to do as vice president, Rockefeller answers: “I go to funerals. I go to earthquakes.” He says, only half sardonically, that redesigning the vice-presidential seal is “the most important thing I’ve done.” [Dubose and Bernstein, 2006, pp. 38-39; US Senate, 7/7/2007]
Following in Rockefeller's Footsteps - Ironically, when Cheney becomes vice president in 2001, he uses what Rockefeller intended to do as a model for his own, extremely powerful vice presidency. James Cannon, who came into the Ford administration with Rockefeller, will marvel in 2006, “Cheney is now doing what he and Rumsfeld blocked Rockefeller from doing—influencing policy.” [Dubose and Bernstein, 2006, pp. 39-40]

Entity Tags: Ronald Reagan, Nelson Rockefeller, Richard (“Dick”) Cheney, Ford administration, Donald Rumsfeld, Gerald Rudolph Ford, Jr, Henry A. Kissinger, James Cannon

Timeline Tags: Nixon and Watergate

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Vice President Nelson Rockefeller (see December 19, 1974 and After) is instrumental in keeping Senate Democrats from finding out too much about the intelligence community’s excesses. When the New York Times reveals the existence of a decades-old illegal domestic surveillance program run by the CIA (see December 21, 1974), President Ford heads off calls from Democrats to investigate the program by appointing the “Rockefeller Commission” to investigate in the Democrats’ stead. Senate Democrats, unimpressed with the idea, create the Church Committee to investigate the intelligence community (see April, 1976). Rockefeller is adept at keeping critical documents out of the hands of the Church Committee and the press. When Senator Frank Church asks for materials from the White House, he is told that the Rockefeller Commission has them; when he asks Rockefeller for the papers, he is told that he cannot have them because only the president can authorize access. One Church aide later calls Rockefeller “absolutely brilliant” in denying them access in a friendly manner. “He winked and smiled and said, ‘Gee, I want to help you but, of course I can’t—not until we’ve finished our work and the president approves it,’” the aide recalls. Senator John Tower (R-TX), the vice chairman of the committee, will later reflect, “We were very skillfully finessed.” But even Rockefeller, who has his own history of involvement with the CIA, is taken aback at the excesses of the CIA, particularly its history of assassinating foreign leaders. Rockefeller will eventually turn that information over to the Church Committee, giving that body some of the most explosive evidence as yet made public against the agency. [US Senate, 7/7/2007]

Entity Tags: John Tower, Church Committee, Nelson Rockefeller, Central Intelligence Agency, Frank Church, Gerald Rudolph Ford, Jr, ’Rockefeller Commission’

Timeline Tags: Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” [Dubose and Bernstein, 2006, pp. 34-35]

Entity Tags: Seymour Hersh, US Department of Defense, Ford administration, Edward Levi, Donald Rumsfeld, Church Committee, Richard (“Dick”) Cheney, Philip Buchan, New York Times, Gerald Rudolph Ford, Jr

Timeline Tags: Civil Liberties

President Ford fires a number of Nixon holdovers and replaces them with “my guys… my own team,” both to show his independence and to prepare for a bruising 1976 primary battle with Ronald Reagan. The wholesale firings and reshufflings are dubbed the “Halloween Massacre.” Donald Rumsfeld becomes secretary of defense, replacing James Schlesinger (see November 4, 1975). George H. W. Bush replaces William Colby as director of the CIA. Henry Kissinger remains secretary of state, but his position as national security adviser is given to Brent Scowcroft. Dick Cheney, Rumsfeld’s deputy chief of staff, moves up to become the youngest chief of staff in White House history. Perhaps the most controversial decision is to replace Nelson Rockefeller as Ford’s vice-presidential candidate for the 1976 elections. Ford’s shake-up is widely viewed as his cave-in to Republican Party hardliners. He flounders in his defense of his new staffers: for example, when Senator Barry Goldwater (R-AZ) asks him why he thinks Rumsfeld is qualified to run the Pentagon, Ford replies, “He was a pilot in the Korean War.” The ultimate winner in the shake-up is Rumsfeld, who instigated the moves from behind the scenes and gains the most from them. Rumsfeld quickly wins a reputation in Washington as a political opportunist, gunning for the vice presidency in 1976 and willing to do whatever is necessary to get it. Rockefeller tells Ford: “Rumsfeld wants to be president of the United States. He has given George Bush the deep six by putting him in the CIA, he has gotten me out.… He was third on your [vice-presidential] list (see August 16-17, 1974) and now he has gotten rid of two of us.… You are not going to be able to put him on the [ticket] because he is defense secretary, but he is not going to want anybody who can possibly be elected with you on that ticket.… I have to say I have a serious question about his loyalty to you.” Later, Ford will write of his sharp regret in pushing Rockefeller off the ticket: “I was angry at myself for showing cowardice in not saying to the ultraconservatives: It’s going to be Ford and Rockefeller, whatever the consequences.” [Werth, 2006, pp. 340-341] “It was the biggest political mistake of my life,” Ford later says. “And it was one of the few cowardly things I did in my life.” [US Senate, 7/7/2007]

Entity Tags: Ronald Reagan, William Colby, Richard (“Dick”) Cheney, James R. Schlesinger, Barry Goldwater, Donald Rumsfeld, Brent Scowcroft, George Herbert Walker Bush, Gerald Rudolph Ford, Jr, Henry A. Kissinger, Nelson Rockefeller

Timeline Tags: Nixon and Watergate

The Senate Select Committee to Study Governmental Operations releases its report, “Alleged Assassination Plots Involving Foreign Leaders,” which finds “concrete evidence of at least eight plots involving the CIA to assassinate Fidel Castro from 1960 to 1965.” [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, US Congress

Timeline Tags: US-Cuba (1959-2005)

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]

Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News

Timeline Tags: Civil Liberties

President Ford issues Executive Order 11905, which limits the power of the CIA, the NSA, and military intelligence to engage in surveillance of US citizens. Perhaps its most well-known provision is a total ban on “political assassinations” by US government personnel. [Gerald R. Ford, 2/18/1976; Roberts, 2008, pp. 38] The provision is sparked by the Church Commission’s finding (see April, 1976) that assassination is “unacceptable in our society,” and a political embarassment, especially botched attempts such as the CIA’s efforts to kill Cuba’s Fidel Castro. [Grant J. Lilly, 4/6/2006]

Entity Tags: Church Commission, Gerald Rudolph Ford, Jr, National Security Agency, Central Intelligence Agency

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Advertisement for Nixon/Frost interviews.Advertisement for Nixon/Frost interviews. [Source: Bamboo Trading (.com)]Former President Richard Nixon, generally acknowledged as having bested his interviewer David Frost in the first rounds of interviews (see April 6, 1977), now defends his support for the infamous Huston Plan, admitted by the plan’s author himself to be illegal in its breathtaking contempt for civil liberties and the rule of Constitutional law. Former Watergate prosecutor Philip Lacovara had told Frost’s aide James Reston Jr. that it was surprising Huston was not taken out and shot. Reston will write acidly: “Not only was Tom Charles Huston not taken out and shot, the plan was calmly considered and signed by Nixon, and was in force for a week, until J. Edgar Hoover objected on territorial rather than philosophical grounds (see July 26-27, 1970). Only then was approval rescinded (although many felt it remained in effect under the code name COINTELPRO).” Reston will write that, during this interview, Nixon paints a picture of an America engulfed in armed insurrection, a portrait so convincing that the Huston Plan actually seems a rational response. Frost fails to press the point that the antiwar protests were largely nonviolent and not a threat to national security. [Reston, 2007, pp. 102-105] Frost does ask that if this was indeed so vital to national security, why not ask Congress to make such acts legal? “In theory,” Nixon replies, “this would be perfect, but in practice, it won’t work.” It would merely alert the targeted dissenters and raise a public outcry. [Time, 5/30/1977] This part of the interview sessions will be aired on May 19, 1977. [Landmark Cases, 8/28/2007]

Entity Tags: David Frost, Philip Lacovara, J. Edgar Hoover, Tom Charles Huston, Richard M. Nixon, James Reston, Jr

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

H. R. Haldeman’s “The Ends of Power.”H. R. Haldeman’s “The Ends of Power.” [Source: Amazon (.com)]Former Nixon aide H. R. Haldeman, in his autobiography The Ends of Power, advances his own insider theory of the genesis of the Watergate burglaries (see July 26-27, 1970). Haldeman, currently serving a one-year prison sentence for perjuring himself during his testimony about the Watergate cover-up, became so angered while watching David Frost interview former President Nixon, and particularly Nixon’s attempts to pin the blame for Watergate on Haldeman and fellow aide John Ehrlichman (see April 15, 1977), that he decided to write the book to tell his version of events. Some of his assertions:
Nixon, Colson Behind 'Plumbers;' Watergate Burglary 'Deliberately Sabotaged' - He writes that he believes then-President Nixon ordered the operation that resulted in the burglaries and surveillance of the Democratic National Committee (DNC) headquarters because he and Charles Colson, the aide who supervised the so-called “Plumbers” (see Late June-July 1971), were both “infuriated with [DNC chairman Lawrence] O’Brien’s success in using the ITT case against them” (see February 22, 1972). Colson, whom Haldeman paints as Nixon’s “hit man” who was the guiding spirit behind the “Plumbers,” then recruited another White House aide, E. Howard Hunt, who brought in yet another aide, G. Gordon Liddy. Haldeman goes into a more interesting level of speculation: “I believe the Democratic high command knew the break-in was going to take place, and let it happen. They may even have planted the plainclothesman who arrested the burglars. I believe that the CIA monitored the Watergate burglars throughout. And that the overwhelming evidence leads to the conclusion that the break-in was deliberately sabotaged.” O’Brien calls Haldeman’s version of events “a crock.” As for Haldeman’s insinuations that the CIA might have been involved with the burglaries, former CIA director Richard Helms says, “The agency had nothing to do with the Watergate break-in.” Time magazine’s review of the book says that Haldeman is more believable when he moves from unverifiable speculation into provable fact. One such example is his delineation of the conspiracy to cover up the burglaries and the related actions and incidents. Haldeman writes that the cover-up was not a “conspiracy” in the legal sense, but was “organic,” growing “one step at a time” to limit political damage to the president.
Story of Kennedy Ordering Vietnamese Assassination Actually True - He suggests that the evidence Hunt falsified that tried to blame former president John F. Kennedy of having then-South Vietnamese President Ngo Dinh Diem assassination (see Mid-September 1971) may have pointed to the actual truth of that incident, hinting that Kennedy may have ordered the assassination after all.
US Headed Off Two Potentially Catastrophic Nuclear Incidents with USSR, China - He also writes of a previously unsuspected incident where Nixon and other US officials convinced the Soviets not to attack Chinese nuclear sites. And Haldeman tells of a September 1970 incident where the US managed to head off a second Cuban Missile Crisis. Both stories of US intervention with the Soviets are strongly denied by both of Nixon’s Secretaries of State, Henry Kissinger, and William Rogers.
Duality of Nixon's Nature - Haldeman says that while Nixon carried “greatness in him,” and showed strong “intelligence, analytical ability, judgment, shrewdness, courage, decisiveness and strength,” he was plagued by equally powerful flaws. Haldeman writes that Nixon had a “dirty, mean, base side” and “a terrible temper,” and describes him as “coldly calculating, devious, craftily manipulative… the weirdest man ever to live in the White House.” For himself, Haldeman claims to have always tried to give “active encouragement” to the “good” side of Nixon and treat the “bad” side with “benign neglect.” He often ignored Nixon’s “petty, vindictive” orders, such as giving mass lie detector tests to employees of the State Department as a means of finding security leaks. He writes that while he regrets not challenging Nixon more “frontally” to counter the president’s darker impulses, he notes that other Nixon aides who had done so quickly lost influence in the Oval Office. Colson, on the other hand, rose to a high level of influence by appealing to Nixon’s darker nature. Between the two, Haldeman writes, the criminal conspiracy of Watergate was created. (Colson disputes Haldeman’s depiction of his character as well as the events of the conspiracy.) Haldeman himself never intended to do anything illegal, denies any knowledge of the “Gemstone” conspiracy proposal (see January 29, 1972), and denies ordering his aide Gordon Strachan to destroy evidence (see June 18-19, 1972).
Reconstructing the 18 1/2 Minute Gap - Haldeman also reconstructs the conversation between himself and Nixon that was erased from the White House tapes (see June 23, 1972 and July 13-16, 1973). Time notes that Haldeman reconstructs the conversation seemingly to legally camouflage his own actions and knowledge, “possibly to preclude further legal charges against him…” According to Haldeman’s reconstruction, Nixon said, “I know one thing. I can’t stand an FBI interrogation of Colson… Colson can talk about the president, if he cracks. You know I was on Colson’s tail for months to nail Larry O’Brien on the [Howard] Hughes deal (see April 30 - May 1, 1973; O’Brien had worked for Hughes, and Nixon was sure O’Brien had been involved in illegalities). Colson told me he was going to get the information I wanted one way or the other. And that was O’Brien’s office they were bugging, wasn’t it? And who’s behind it? Colson’s boy Hunt. Christ. Colson called [deputy campaign chief Jeb Magruder] and got the whole operation started. Right from the g_ddamn White House… I just hope the FBI doesn’t check the office log and put it together with that Hunt and Liddy meeting in Colson’s office.” Time writes, “If the quotes are accurate, Nixon is not only divulging his own culpability in initiating the bugging but is also expressing a clear intent to keep the FBI from learning about it. Thus the seeds of an obstruction of justice have been planted even before the celebrated June 23 ‘smoking gun’ conversation, which ultimately triggered Nixon’s resignation from office.” Haldeman says he isn’t sure who erased the tape, but he believes it was Nixon himself. Nixon intended to erase all the damning evidence from the recordings, but since he was, Haldeman writes, “the least dexterous man I have ever known,” he quickly realized that “it would take him ten years” to erase everything.
'Smoking Gun' Allegations - Haldeman also makes what Time calls “spectacular… but unverified” allegations concerning the June 23, 1972 “smoking gun” conversations (see June 23, 1972). The focus of that day’s discussion was how the White House could persuade the CIA to head off the FBI’s investigation of the Watergate burglary. The tape proved that Nixon had indeed attempted to block the criminal investigation into Watergate, and feared that the money found on the burglars would be traced back to his own re-election campaign committee. Haldeman writes that he was confused when Nixon told him to tell the CIA, “Look, the problem is that this will open up the whole Bay of Pigs thing again.” When Haldeman asked Helms to intercede with the FBI, and passed along Nixon’s warning that “the Bay of Pigs may be blown,” Helms’s reaction, Haldeman writes, was electric. “Turmoil in the room, Helms gripping the arms of his chair, leaning forward and shouting, ‘The Bay of Pigs had nothing to do with this. I have no concern about the Bay of Pigs.’” Haldeman writes, “I was absolutely shocked by Helms‘[s] violent reaction. Again I wondered, what was such dynamite in the Bay of Pigs story?” Haldeman comes to believe that the term “Bay of Pigs” was a reference to the CIA’s secret attempts to assassinate Cuban dictator Fidel Castro. The CIA had withheld this info from the Warren Commission, the body that investigated the assassination of President Kennedy, and Haldeman implies that Nixon was using the “Bay of Pigs thing” as some sort of blackmail threat over the CIA. Haldeman also hints, very vaguely, that Nixon, when he was vice president under Dwight D. Eisenhower, was a chief instigator of the actual Bay of Pigs invasion. (Time notes that while Vice President Nixon probably knew about the plans, “he certainly had not been their author.”)
Other Tidbits - Haldeman writes that Nixon’s taping system was created to ensure that anyone who misrepresented what Nixon and others said in the Oval Office could be proven wrong, and that Nixon had Kissinger particularly in mind. Nixon kept the tapes because at first he didn’t believe he could be forced to give them up, and later thought he could use them to discredit former White House counsel John Dean. He says Nixon was wrong in asserting that he ordered Haldeman to get rid of the tapes. Haldeman believes the notorious “deep background” source for Washington Post reporters Carl Bernstein and Bob Woodward was actually Fred Fielding, Dean’s White House deputy. Interestingly, Haldeman apparently discovered the real identity of “Deep Throat” in 1972 to be senior FBI official W. Mark Felt (see October 19, 1972). It is unclear why Haldeman now writes that Fielding, not Felt, was the Post source.
Not a Reliable Source - Time notes that Haldeman’s book is far from being a reliable source of information, characterizing it as “badly flawed, frustratingly vague and curiously defensive,” and notes that “[m]any key sections were promptly denied; others are clearly erroneous.” Time concludes, “Despite the claim that his aim was finally to ‘tell the truth’ about the scandal, his book is too self-protective for that.” And it is clear that Haldeman, though he writes how the cover-up was “morally and legally the wrong thing to do—so it should have failed,” has little problem being part of such a criminal conspiracy. The biggest problem with Watergate was not that it was illegal, he writes, but that it was handled badly. He writes, “There is absolutely no doubt in my mind today that if I were back at the starting point, faced with the decision of whether to join up, even knowing what the ultimate outcome would be, I would unhesitatingly do it.” [Time, 2/27/1978; Spartacus Schoolnet, 8/2007]

Entity Tags: Fred F. Fielding, William P. Rogers, E. Howard Hunt, Democratic National Committee, David Frost, Charles Colson, W. Mark Felt, Bob Woodward, Carl Bernstein, US Department of State, Lawrence O’Brien, Richard Helms, John Dean, Jeb S. Magruder, Howard Hughes, Henry A. Kissinger, Gordon Strachan, Dwight Eisenhower, Richard M. Nixon, H.R. Haldeman, John F. Kennedy

Timeline Tags: Nixon and Watergate

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

About 500 Iranian students take over the American Embassy in Tehran and hold 52 Americans hostage for 444 days. The Mujahedeen-e Khalq (MEK) is one of the groups that supports the take-over. [US Department of State, 4/30/2003; PBS, 1/15/2006]

Entity Tags: People’s Mujahedin of Iran

Timeline Tags: US confrontation with Iran, Iran-Contra Affair

Incoming presidential chief of staff James Baker asks a former chief of staff, Dick Cheney (see November 4, 1975 and After), for advice on handling the job. Baker takes four pages of handwritten notes covering his conversation with Cheney. Most of the notes cover mundane topics such as personnel and managing the president’s schedule. But Cheney offers at least one piece of policy advice. According to Baker’s notes: “Pres. seriously weakened in recent yrs. Restore power & auth [authority] to Exec Branch—Need strong ldr’ship. Get rid of War Powers Act—restore independent rights.” Baker notes Cheney’s emphasis of this last idea by marking it with two double lines and six asterisks, and a note in the margin, “Central theme we ought to push.” [Savage, 2007, pp. 43]

Entity Tags: Richard (“Dick”) Cheney, James A. Baker

Timeline Tags: Civil Liberties

Donald Rumsfeld and Dick Cheney, along with then-President Gerald Ford, April 28, 1975.Donald Rumsfeld and Dick Cheney, along with then-President Gerald Ford, April 28, 1975. [Source: David Hume Kennerly / Gerald R. Ford Library] (click image to enlarge)Throughout the 1980s, Dick Cheney and Donald Rumsfeld are key players in one of the most highly classified programs of the Reagan administration. Presently, Cheney is working as a Republican congressman, while Rumsfeld is head of the pharmaceutical company G. D. Searle. At least once per year, they both leave their day jobs for periods of three or four days. They head to Andrews Air Force Base, near Washington, DC, and along with 40 to 60 federal officials and one member of the Reagan Cabinet are taken to a remote location within the US, such as an underground bunker. While they are gone, none of their work colleagues, or even their wives, knows where they are. They are participating in detailed planning exercises for keeping government running during and after a nuclear war with the Soviet Union.
Unconstitutional 'Continuity of Government' - This highly secret “Continuity of Government” (COG) program is known as Project 908. The idea is that if the US were under a nuclear attack, three teams would be sent from Washington to separate locations around the US to prepare to take leadership of the country. If somehow one team was located and hit with a nuclear weapon, the second or third team could take its place. Each of the three teams includes representatives from the State Department, Defense Department, CIA, and various domestic-policy agencies. The program is run by a new government agency called the National Program Office. Based in the Washington area, it has a budget of hundreds of million dollars a year, which grows to $1 billion per year by the end of Reagan’s first term in office. Within the National Security Council, the “action officer” involved in the COG program is Oliver North, who is a key figure in the mid-1980s Iran-Contra scandal. Reagan’s Vice President, George H. W. Bush, also supervises some of the program’s efforts. As well as Cheney and Rumsfeld, other known figures involved in the COG exercises include Kenneth Duberstein, who serves for a time as President Reagan’s chief of staff, and future CIA Director James Woolsey. Another regular participant is Richard Clarke, who on 9/11 will be the White House chief of counterterrorism (see (1984-2004)). The program, though, is extraconstitutional, as it establishes a process for designating a new US president that is nowhere authorized in the US Constitution or federal law. After George H. W. Bush is elected president in 1988 and the effective end of the Soviet Union in 1989, the exercises continue. They will go on after Bill Clinton is elected president, but will then be based around the threat posed by terrorists, rather than the Soviet Union (see 1992-2000). According to journalist James Mann, the participation of Rumsfeld and Cheney in these exercises demonstrates a broader truth about them: “Over three decades, from the Ford administration onward, even when they were out of the executive branch of government, they were never too far away; they stayed in touch with its defense, military, and intelligence officials and were regularly called upon by those officials. Cheney and Rumsfeld were, in a sense, a part of the permanent, though hidden, national security apparatus of the United States.” [Mann, 2004, pp. 138-145; Atlantic Monthly, 3/2004; Washington Post, 4/7/2004; Cockburn, 2007, pp. 85]
No Role for Congress - According to one participant, “One of the awkward questions we faced was whether to reconstitute Congress after a nuclear attack. It was decided that no, it would be easier to operate without them.” Thus the decision is made to abandon the Constitutional framework of the nation’s government if this plan is ever activated. [Dubose and Bernstein, 2006, pp. 198]
Reactivated after 9/11 - The plan they rehearse for in the COG exercises will be activated, supposedly for the first time, in the hours during and after the 9/11 attacks (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). [Washington Post, 3/1/2002] Mann subsequently comments, “The program is of particular interest today because it helps to explain the thinking and behavior of the second Bush Administration in the hours, days, and months after the terrorist attacks on September 11, 2001.” [Atlantic Monthly, 3/2004]

Entity Tags: Richard A. Clarke, Richard (“Dick”) Cheney, Oliver North, National Program Office, James Woolsey, Kenneth Duberstein, Donald Rumsfeld, George Herbert Walker Bush

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

According to former Reagan Justice Department official Terry Eastland, writing in his 1992 book Energy in the Executive, the process of selecting Antonin Scalia as a Supreme Court Justice begins now, well before anyone knows there will be a vacancy for him. Attorney General Edwin Meese asks his assistant attorney general, William Bradford Reynolds, to advise him in preparing a nominee, “just in case.” Reynolds assembles a team of Justice Department officials, who examine about twenty possible choices, mostly federal judges, focusing primarily on conservative judicial philosophy. Two individuals stand out: Robert Bork and Scalia. Eastland writes, “Neither was ranked over the other; both were regarded as the best available, most well-qualified exponents of Reagan’s judicial philosophy.” Both are seen as powerful and influential legal figures. When Chief Justice Warren Burger announces his decision to retire from the bench, Reynolds advises Meese to choose Justice William Rehnquist to replace Burger as Chief Justice (see September 26, 1986), and to choose either Bork or Scalia to replace Rehnquist. Reagan makes the final decision: Scalia. [Dean, 2007, pp. 133]

Entity Tags: Robert Bork, Edwin Meese, William Rehnquist, Antonin Scalia, Terry Eastland, US Department of Justice, William Bradford Reynolds

Timeline Tags: Civil Liberties

Antonin Scalia.Antonin Scalia. [Source: Oyez.org]Appeals court judge Antonin Scalia is sworn in as an Associate Justice of the US Supreme Court. [Legal Information Institute, 7/30/2007] Although Scalia is an ardent social conservative, with strongly negative views on such issues as abortion and homosexual rights, Scalia and Reagan administration officials both have consistently refused to answer questions about his positions on these issues, as President Reagan did at his June announcement of Scalia’s nomination. [Ronald Reagan Presidential Library, 6/17/1986] Scalia’s nomination is, in the words of Justice Department official Terry Eastland, “no better example of how a president should work in an institutional sense in choosing a nominee….” Eastland advocates the practice of a president seeking a judiciary nominee who has the proper “judicial philosophy.” A president can “influence the direction of the courts through his appointments” because “the judiciary has become more significant in our politics,” meaning Republican politics. [Dean, 2007, pp. 132] Scalia is the product of a careful search by Attorney General Edwin Meese and a team of Justice Department officials who wanted to find the nominee who would most closely mirror Reagan’s judicial and political philosophy (see 1985-1986).

Entity Tags: Ronald Reagan, Edwin Meese, Antonin Scalia, Terry Eastland, US Department of Justice

Timeline Tags: Civil Liberties

Representative Dick Cheney (R-WY) publishes an essay for the neoconservative American Enterprise Institute (AEI), apparently written either by his Iran-Contra commission colleague Michael Malbin or by Cheney and Malbin together, but printed under Cheney’s name. The essay is titled “Congressional Overreaching in Foreign Policy,” and covers what he terms “congressional aggrandizement” of presidential powers.
Congress Has No Place in Determining, Implementing US Foreign Policy - Cheney’s essay bluntly states his belief that Congress has no business interfering in the president’s power to determine and implement the nation’s foreign policy; in general, the essay indicates Cheney’s disdain for the legislative branch of which he has been a member. He writes, in part: “Broadly speaking, the Congress was intended to be a collective, deliberative body. When working at its best, it would slow down decisions, improve their substantive content, subject them to compromise, and help build a consensus behind general rules before they were to be applied to the citizenry. The presidency, in contrast, was designed as a one-person office to ensure that it would be ready for action. Its major characteristics… were to be ‘decision, activity, secrecy, and dispatch.‘… [T]he legislative branch is ill equipped to handle many of the foreign policy tasks it has been taking upon itself lately.” He writes that while Congress may take upon itself powers to launch military actions or respond to an attack, it is by nature so slow and deliberative, and its members so focused on getting reelected, that it cannot adequately wield those powers: “[T]he real world effect often turns out… not to be a transfer of power from the president to Congress, but a denial of power to the government as a whole.” The only power Congress should have in involving itself in foreign policy, Cheney argues, is whether or not to fund presidential initiatives. “[T]he nation should not be paralyzed by Congress’s indecision,” he writes. [PBS Frontline, 6/20/2006; Savage, 2007, pp. 59-61]
Cheney Selected as Secretary of Defense - Shortly after the essay is published, President George H.W. Bush names Cheney as his secretary of defense. Cheney was scheduled to give a talk based on the essay at AEI, but cancels it and goes to Washington to begin preparing for confirmation hearings in the Senate. Reporter Charlie Savage will note that the essay may have caused Cheney some difficulties in his confirmation hearings had it had a larger audience. [Savage, 2007, pp. 61]
Former White House Counsel: Cheney's Proposals Unconstitutional, Unwise - In 2007, former Nixon White House counsel John Dean will write of the essay: “Cheney seems to be oblivious to the fact that the type of government he advocates is not, in fact, the government our Constitution provides.… His argument also assumes that a more agile, energetic, and fast-acting chief executive is the better system, but history does not support that contention. Presidential leadership has consistently shown itself less wise and less prudent than the slower but more deliberative nature of the system that we have. It was Congress that forced presidents out of no-win wars like Vietnam. The reason the nation’s Founders empowered Congress was because they wisely realized that a president—like heads of governments throughout history—was prone to fighting wars for his own glory, without seeming able to easily bring those wars to an end.” [Dean, 2007, pp. 88-89]

Entity Tags: Joint House-Senate Iran-Contra Committee, John Dean, American Enterprise Institute, Michael Malbin, George Herbert Walker Bush, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties, Iran-Contra Affair

When Supreme Court Justice Thurgood Marshall, the first and only African-American to serve on the Court, announces his retirement, the Bush administration is ready with a far more conservative replacement. President Bush himself is already under fire for previously naming a moderate, David Souter, to the Court, and Bush is determined to give his conservative base someone they can back. Although Bush had wanted to nominate an appropriately conservative Hispanic, his eventual nomination is Clarence Thomas, who is completing his first year as a judge on the DC Court of Appeals. Thomas has two qualifications that Bush officials want: like Marshall, he is African-American; unlike Marshall, he is as conservative a jurist as Antonin Scalia (see September 26, 1986) or Robert Bork (see July 1-October 23, 1987). Two of former President Reagan’s closest legal advisers, C. Boyden Gray and Lee Liberman (a co-founder of the conservative Federalist Society), privately call Thomas “the black Bork.” Bush calls Thomas “the most qualified man in the country” for the position. [New York Times, 7/2/1991; Dean, 2007, pp. 146-153] During the July 2 press conference to announce Thomas’s nomination, Bush says: “I don’t feel he’s a quota. I expressed my respect for the ground that Mr. Justice Marshall plowed, but I don’t feel there should be a black seat on the Court or an ethnic seat on the Court.” For his part, Thomas extols his upbringing as a desperately poor child in Georgia, crediting his grandmother and the nuns who taught him in Catholic schools as particular influences on his life and values. Republican senator Orrin Hatch says that opposing Thomas will be difficult: “Anybody who takes him on in the area of civil rights is taking on the grandson of a sharecropper.” [New York Times, 7/2/1991] However, the non-partisan American Bar Association’s recommendation panel splits on whether Thomas is qualified or not, the first time since 1969 the ABA has failed to unanimously recommend a nominee. Twelve panelists find Thomas “qualified,” two find him “not qualified,” and none find him “well qualified.” One senior Congressional aide calls the assessment of Thomas “the equivalent of middling.” [New York Times, 8/28/1991; Dean, 2007, pp. 146-153] In 2007, former Nixon White House counsel John Dean will write, “For the president to send a nominee to the Supreme Court with anything less than a uniformly well-qualified rating is irresponsible, but such decisions have become part of the politicization of the judiciary.” Thomas, himself a beneficiary of the nation’s affirmative action programs, opposes them, once calling them “social engineering;” he has no interest in civil rights legislation, instead insisting that the Constitution should be “color-blind” and the courts should stay out of such matters. Civil rights, women’s rights, and environmental groups are, in Dean’s words, “terrified” of Thomas’s nomination. To overcome these obstacles, the Bush administration decides on a strategy Dean calls “crude but effective… us[ing] Thomas’s color as a wedge with the civil rights community, because he would pick up some blacks’ support notwithstanding his dismal record in protecting their civil rights. [New York Times, 7/2/1991; Dean, 2007, pp. 146-153] The nomination of an African-American quells some of the planned resistance to a conservative nominee promised by a number of civil rights organizations. [New York Times, 7/2/1991] Three months later, Thomas will be named to the court after a bitterly contentious brace of confirmation hearings (see October 13, 1991).

Entity Tags: Orrin Hatch, US Supreme Court, Lee Liberman, Robert Bork, John Dean, Thurgood Marshall, David Souter, American Bar Association, Bush administration (41), Antonin Scalia, George Herbert Walker Bush, Clayland Boyden Gray, Clarence Thomas

Timeline Tags: Civil Liberties

David Addington, a personal aide to Defense Secretary Dick Cheney, is forced to take part in Senate confirmation hearings for his appointment as chief counsel for the Defense Department. Addington, a Cheney protege and a fierce advocate for the ever-widening power of the executive branch, has gained a reputation for effective, if arrogant, conflicts with the Pentagon’s uniformed leadership and for tightly controlling what information enters and leaves Cheney’s office. Colonel Lawrence Wilkerson, an aide to Joint Chiefs chairman General Colin Powell, will later characterize Addington as an intense bureaucratic infighter bent on concentrating power in Cheney’s office. “Addington was a nut,” Wilkerson will recall. “That was how everybody summed it up. A brilliant nut perhaps, but a nut nevertheless.” The Senate hearing becomes a platform for Democratic senators to attack Cheney’s anti-Congressional policies (see Early 1991 and March 1992). In his turn, Addington calmly denies that he or Cheney have ever exhibited any intention to defy Congress on any issue. “How many ways are there around evading the will of Congress?” storms Senator Carl Levin (D-MI). “How many different legal theories do you have?” Addington answers, “I do not have any, Senator.” Addington is only confirmed after promising that the Pentagon will restore the independence of military lawyers (see March 1992) and begin funding the V-22 Osprey (see Early 1991). [Savage, 2007, pp. 63]

Entity Tags: David S. Addington, Carl Levin, Lawrence Wilkerson, Colin Powell, US Department of Defense, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

The Communications Assistance for Law Enforcement Act (CALEA) takes effect. CALEA obliges telecommunications providers such as AT&T to give law enforcement agencies and US intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks. In more recent years, the law will be expanded to give law enforcement and intelligence agencies similar abilities to monitor Internet usage by US citizens. [Federal Communications Commission, 2/21/2007]

Entity Tags: Communications Assistance for Law Enforcement Act (CALEA), AT&T

Timeline Tags: Civil Liberties

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Timeline Tags: Civil Liberties

According to counterterrorism expert Rohan Gunaratna, US intelligence monitoring al-Qaeda communications learn that al-Qaeda is canceling an attack on Western targets in Singapore. On April 18, 1996, 108 Lebanese civilians seeking refuge at a UN camp in Qana, Lebanon, are killed by mortars fired by Israeli forces. Bin Laden “was keen not to dissipate what he envisaged as widespread revulsion against Israel’s action and hence called off the strike in Southeast Asia. Al-Qaeda’s team in question was very determined to go ahead, having spent years preparing the attack, and according to the intercepts it proved difficult for Osama to convince it otherwise.” Gunaratna claims the US learned this through the NSA’s Echelon satellite network (see Before September 11, 2001) “and other technical monitoring of their communications traffic.” [Gunaratna, 2003, pp. 133-134] If true, this case supports other evidence that the US was successfully monitoring bin Laden’s communications from an early date (see Early 1990s) and that al-Qaeda’s Southeast Asia operations were penetrated years before an important al-Qaeda summit in Malaysia discussing the 9/11 plot (see January 5-8, 2000).

Entity Tags: Echelon, Al-Qaeda, Osama bin Laden, National Security Agency

Timeline Tags: Complete 911 Timeline

Former Defense Secretary Dick Cheney, speaking at an awards ceremony for the Gerald R. Ford Foundation, tells listeners that he intends to do whatever he can to “restore” the power of the presidency. If he ever returns to Washington, he says he will roll back what he calls “unwise” limits on the presidency imposed after the Vietnam War and Watergate. “I clearly do believe, and have spoken directly about the importance of a strong president,” he says. “I think there have been times in the past, oftentimes in response to events such as Watergate or the war in Vietnam, where Congress has begun to encroach upon the powers and responsibilities of the president: that it was important to try to go back and restore that balance.” [Savage, 2007, pp. 9]

Entity Tags: Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

Omar Nasiri, who informs on al-Qaeda for the British intelligence service MI6 and the French service Direction Générale de la Sécurité Extérieure (DSGE), makes contact with al-Qaeda logistics manager Abu Zubaida using a telephone bugged by MI6. Nasiri met Abu Zubaida in Pakistan (see Mid 1995-Spring 1996). Usually, when Nasiri calls the number, he talks to one of Abu Zubaida’s associates, but sometimes he talks to Abu Zubaida himself. The phone is used to relay messages between Abu Zubaida in Pakistan and al-Qaeda representatives in London, in particular leading imam Abu Qatada. The French will apparently make great use of this information (see October 1998 and After). [Nasiri, 2006, pp. 270-1, 273, 281]

Entity Tags: Direction Générale de la Sécurité Extérieure, Abu Zubaida, UK Secret Intelligence Service (MI6), Abu Qatada, Omar Nasiri

Timeline Tags: Complete 911 Timeline

A lieutenant general meets with Qwest CEO Joe Nacchio and Dean Wandry, who heads Qwest’s government business unit. According to documents filed in 2006 by Nacchio concerning his trial on insider trading charges (see October 12, 2007), the general “told Mr. Wandry that he ran the largest telecom operation in the world, he had looked at Qwest’s network, and he wanted to use it for government purposes.” The general in question could be NSA Director Kenneth Minihan, who will be replaced in 1999 by another lieutenant general, Michael Hayden, but neither Minihan nor Hayden will comment on the allegation. Many former intelligence officials will say that it is likely Minihan who met with Nacchio and Wandry. Nacchio’s court documents indicate that he and Wandry agree to work with the general. Nacchio is not allowed to announce the contract publicly, but according to the court documents, he “understood at the time this was the beginning of a relationship which had enormous potential for future work. This proves increasingly true as time went on.” By 1999 Qwest is working extensively with the NSA. Minihan is particularly concerned about the potential of “cyberwarfare” by foreign governments, terrorist organizations, drug cartels, and organized crime, a prospect which he felt the NSA is unprepared. He particularly worries about Russia and China; in June 1998, he will testify are training personnel in potential cyber-attacks. “These opportunists, enabled by the explosion of technology and the availability of inexpensive, secure means of communication, pose a significant threat to the interests of the United States and its allies,” Minihan will state. In 2007, a former senior NSA official will say that the agency felt those groups knew US privacy laws all too well and were capable of using those laws against the NSA and other intelligence agencies. He will say, “There was such a nuanced understanding of how to tie us in knots and use American law against us, that there were certainly pockets of people saying, ‘We’ve got to be assertive; we’ve got to be more aggressive on this.’” Hayden, Minihan’s successor, will be particularly willing to push agency operations to the edge of legality. After 9/11, Hayden will say, “We’re pretty aggressive within the law. As a professional, I’m troubled if I’m not using the full authority allowed by law.” [National Journal, 11/2/2007] The NSA will approach Qwest will a similar offer in the months before 9/11 (see February 2001).

Entity Tags: Michael Hayden, Dean Wandry, Kenneth Minihan, National Security Agency, Joe Nacchio, Qwest

Timeline Tags: Civil Liberties

Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right).Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right). [Source: Associated Press]Two US embassies in Africa are bombed within minutes of each other. At 10:35 a.m., local time, a suicide car bomb attack in Nairobi, Kenya, kills 213 people, including 12 US nationals, and injures more than 4,500. Mohamed al-Owhali and someone known only as Azzam are the suicide bombers, but al-Owhali runs away at the last minute and survives. Four minutes later, a suicide car bomb attack in Dar es Salaam, Tanzania, kills 11 and injures 85. Hamden Khalif Allah Awad is the suicide bomber there. The attacks will be blamed on al-Qaeda. [PBS Frontline, 2001; United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001] The Tanzania death toll is low because, remarkably, the attack takes place on a national holiday so the US embassy there is closed. [Miller, Stone, and Mitchell, 2002, pp. 195] The attack shows al-Qaeda has a capability for simultaneous attacks. The Tanzania bombing appears to have been a late addition, as one of the arrested bombers will allegedly tell US agents that it was added to the plot only about 10 days in advance. [United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001] A third attack against the US embassy in Uganda does not take place due to a last-minute delay (see August 7, 1998). [Associated Press, 9/25/1998] August 7, 1998, is the eighth anniversary of the arrival of US troops in Saudi Arabia and some people will speculate that this is the reason for the date of the bombings. [Gunaratna, 2003, pp. 46] In the 2002 book The Cell, reporters John Miller, Michael Stone, and Chris Mitchell will write: “What has become clear with time is that facets of the East Africa plot had been known beforehand to the FBI, the CIA, the State Department, and to Israeli and Kenyan intelligence services.… [N]o one can seriously argue that the horrors of August 7, 1998, couldn’t have been prevented.” They will also comment, “Inexplicable as the intelligence failure was, more baffling still was that al-Qaeda correctly presumed that a major attack could be carried out by a cell that US agents had already uncovered.” [Miller, Stone, and Mitchell, 2002, pp. 195, 206] After 9/11, it will come to light that three of the alleged hijackers, Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi, had some involvement in the bombings (see October 4, 2001, Late 1999, and 1993-1999) and that the US intelligence community was aware of this involvement by late 1999 (see December 15-31, 1999), if not before.

Entity Tags: Salem Alhazmi, Nawaf Alhazmi, Mohamed al-Owhali, Hamden Khalif Allah Awad, Khalid Almihdhar, Al-Qaeda, Azzam

Timeline Tags: Complete 911 Timeline

Counterterrorism expert Rohan Gunaratna will later write that after the US embassy bombings (see 10:35-10:39 a.m., August 7, 1998), surveillance of al-Qaeda is stepped up around the world. “One intelligence officer attached to the French embassy in Islamabad, [Pakistan], urged his counterparts in foreign missions in Pakistan to detail the recipients of phone calls made by… al-Qaeda leader Abu Zubaida, then living in Peshawar, to individuals in their various countries.” As a result, “several governments [launch] investigations of their own.” [Gunaratna, 2003, pp. 245] A close associate of Zubaida in Peshawar at this time is Khalil Deek, who is actually a mole for the Jordanian government (see 1998-December 11, 1999). One such investigation is launched by the Philippine government on October 16, 1998, after being asked by French intelligence to gather intelligence on people in the Philippines in contact with Zubaida. Code named CoPlan Pink Poppy, the investigation reveals connections between al-Qaeda and the Moro Islamic Liberation Front (MILF), a Philippine militant group. On December 16, 1999, Abdesselem Boulanouar and Zoheir Djalili, two French Algerians belonging to the Algerian al-Qaeda affiliate the Salafist Group for Call and Combat (GSPC), are arrested due to information learned from monitoring Zubaida’s calls to the Philippines. Boulanouar is arrested at an airport carrying a terrorist training manual he admitted writing for the MILF. Both men also are arrested carrying explosive devices. French intelligence says Boulanouar had ties to Ahmed Ressam (see December 14, 1999), and like Ressam, may have been planning to carry out attacks at the turn of the millennium. He will be deported to France and imprisoned on terrorism related charges. CoPlan Pink Poppy will be canceled in 2000 for lack of funds. [Gulf News, 3/14/2000; Ressa, 2003, pp. 132-133; Gunaratna, 2003, pp. 245] However, while details are murky, it appears other governments continue to monitor Zubaida’s calls. Around the same time as the Philippines arrests, one militant in Jordan is even arrested while still in the middle of a phone call to Zubaida (see November 30, 1999). US intelligence will remain intensely focused on Zubaida before 9/11 (see Late March-Early April 2001 and May 30, 2001), and just days before 9/11 the NSA will monitor calls Zubaida is making to the US (see Early September 2001). It appears his calls will continue to be monitored after 9/11 as well (see October 8, 2001).

Entity Tags: Khalil Deek, Zoheir Djalili, Moro Islamic Liberation Front, Direction Générale de la Sécurité Extérieure, Abdesselem Boulanouar, Philippines, Abu Zubaida, Al-Qaeda, Ahmed Ressam, Salafist Group for Preaching and Combat

Timeline Tags: Complete 911 Timeline

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

The FBI misses a chance to learn about Zacarias Moussaoui after a raid in Dublin, Ireland. On December 14, 1999, Ahmed Ressam was arrested trying to smuggle explosives into the US (see December 14, 1999). On December 21, Irish police arrest Hamid Aich and several other North African immigrants living in Dublin. [New York Times, 1/22/2000] During the arrests, police seize a large amount of documents relating to citizenship applications, identities, credit cards, and airplane tickets. A diagram of an electrical switch that could be used for a bomb is found that is identical to a diagram found in Ressam’s apartment in Vancouver, Canada. [Irish Times, 7/31/2002] The suspects are released about a day later, but, “Within days, authorities in Ireland and the United States began to realize that they might have missed a chance to learn more about a terrorist network.” [New York Times, 1/22/2000] It is discovered that Aich lived with Ressam in Montreal, and then later lived with him in Vancouver. Investigators conclude there has been an al-Qaeda cell in Dublin since the early 1990s, when the charity Mercy International opened an office there (this charity has several known al-Qaeda connections by this time (see 1988-Spring 1995 and Late 1996-August 20, 1998) and also an alleged CIA connection (see 1989 and After)). The cell is mainly involved in providing travel and identity documents for other cells committing violent acts. Investigators also connect Aich to the Islamic Jihad. But the US and Canada do not seek Aich’s extradition, and instead have the Irish police keep him under surveillance. He will escape from Ireland shortly before 9/11 (see June 3, 2001-July 24, 2001). [New York Times, 1/22/2000; Irish Times, 7/31/2002] Apparently, many of the documents seized in the raid will only be closely examined after 9/11. Documents will show that in 1999 and 2000, Mustafa Ahmed al-Hawsawi, a top al-Qaeda financier, worked with the Dublin cell to finance Moussaoui’s international travel. Aich made travel arrangements and possibly provided fake identification for Moussaoui. [Fox News, 7/30/2002; Irish Times, 7/31/2002] Presumably, had these links been discovered after the 1999 raid instead of after 9/11, events could have gone very differently when Moussaoui was arrested in the US in August 2001 (see August 16, 2001).

Entity Tags: Zacarias Moussaoui, Al-Qaeda, Mercy International, Islamic Jihad, Hamid Aich, Ahmed Ressam, Federal Bureau of Investigation, Mustafa Ahmed al-Hawsawi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

Damage to the USS Cole, shown in dry dock.Damage to the USS Cole, shown in dry dock. [Source: US Navy]9/11 hijacker Khalid Almihdhar is in Yemen when the USS Cole is attacked in Aden harbor there (see October 12, 2000), and is reported to have had a role in the bombing. Almihdhar leaves shortly after the attack, together with al-Qaeda operative Khallad bin Attash. [McDermott, 2005, pp. 209] Bin Attash is quickly identified as one of the masterminds of the operation (see Late October-Late November 2000). Almihdhar will subsequently be accused of participating in the operation by the prime ministers of Yemen and Britain (see Early October 2001 and October 4, 2001). The Yemeni militant group Islamic Army of Aden takes credit for the bombing, and a friend of Almihdhar in San Diego will later say that Almihdhar told him he was a member of that group (see Early 2000). The Cole attack was a repeat of a failed attempt to bomb the USS The Sullivans (see January 3, 2000), of which Almihdhar had foreknowledge (see Late 1999). Almihdhar, who trained with the Cole bombers (see Late 1999) and attended an apparent planning session for the operation (see January 5-8, 2000), may also be involved in a later ship-bombing operation in Singapore (see June 2001). Ramzi bin al-Shibh, a close associate of the hijackers, also leaves Yemen around this time and is also suspected of involvement in the bombing (see October 10-21, 2000).

Entity Tags: Islamic Army of Aden, Khalid Almihdhar, Khallad bin Attash

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). [Truthout (.org), 1/17/2006] In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. [New York Times, 12/16/2007]

Entity Tags: Bush administration (43), National Security Agency

Timeline Tags: Civil Liberties

Atta’s immigration record for his arrival on January 10, 2001, after alteration in early May.Atta’s immigration record for his arrival on January 10, 2001, after alteration in early May. [Source: 9/11 Commission]The Miami Herald will report: “INS documents, matched against an FBI alert given to German police, show two men named Mohamed Atta [arrive] in Miami on January 10, each offering different destination addresses to INS agents, one in Nokomis, near Venice, the other at a Coral Springs condo. He (they?) is admitted, despite having overstayed his previous visa by a month. The double entry could be a paperwork error, or confusion over a visa extension. It could be Atta arrived in Miami, flew to another country like the Bahamas, and returned the same day. Or it could be that two men somehow cleared immigration with the same name using the same passport number.” [Miami Herald, 9/22/2001] Officials will later call this a bureaucratic snafu, and insist that only one Atta entered the US on this date. [Associated Press, 10/28/2001] In addition, while Atta arrives on a tourist visa, he tells immigration inspectors that he is taking flying lessons in the US, which requires an M-1 student visa. [Washington Post, 10/28/2001] The fact that he had overstayed his visa by over a month on a previous visit also does not cause a problem. [Los Angeles Times, 9/27/2001] The INS will later defend its decision, but “immigration experts outside the agency dispute the INS position vigorously.” For instance, Stephen Yale-Loehr, co-author of a 20-volume treatise on immigration law, will assert: “They just don’t want to tell you they blew it. They should just admit they made a mistake.” [Washington Post, 10/28/2001]

Entity Tags: Federal Bureau of Investigation, Mohamed Atta, Stephen Yale-Loehr

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Marwan Alshehhi.Marwan Alshehhi. [Source: FBI]Future 9/11 hijacker Marwan Alshehhi is able to reenter the US without trouble, after a brief, mysterious trip to Morocco (see January 11-18, 2001), despite having overstayed his previous visa by about five weeks. [Los Angeles Times, 9/27/2001; US Department of Justice, 5/20/2002]

Entity Tags: Marwan Alshehhi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

According to reporter and author Charlie Savage, the White House staff quickly coalesces into two camps: “Bush People[,] mostly personal friends of the new president who shared his inexperience in Washington,” which includes President Bush’s top legal counsels, Alberto Gonzales and Harriet Miers, both corporate lawyers in Texas before joining Bush in Washington. The second group is “Cheney People—allies from [Vice-President Dick] Cheney’s earlier stints in the federal government (see May 25, 1975, November 18, 1980, 1981-1992, 1989, and June 1996) who were deeply versed in Washington-level issues, a familiarity that would allow their views to dominate internal meetings. These included [Defense Secretary Donald] Rumsfeld and other cabinet secretaries, key deputies throughout the administration, and David Addington, Cheney’s longtime aide who would become a chief architect of the administration’s legal strategy in the war on terrorism” (see July 1, 1992 and (After 10:00 a.m.) September 11, 2001). Savage will observe, “Given the stark contrast in experience between Cheney and Bush, it was immediately clear to observers of all political stripes that Cheney would possess far more power than had any prior vice president.”
'Unprecedented' Influence - Cheney will certainly have “unprecedented” influence, according to neoconservative publisher William Kristol, who himself had served as former Vice President Dan Quayle’s chief of staff. “The question to ask about Cheney,” Kristol will write, is “will he be happy to be a very trusted executor of Bush’s policies—a confidant and counselor who suggests personnel and perhaps works on legislative strategy, but who really doesn’t try to change Bush’s mind about anything? Or will he actually, substantively try to shape administration policy in a few areas, in a way that it wouldn’t otherwise be going?”
Expanding the Power of the Presidency - Cheney will quickly answer that question, Savage will write, by attempting to “expand the power of the presidency.” Savage will continue: “He wanted to reduce the authority of Congress and the courts and to expand the ability of the commander in chief and his top advisers to govern with maximum flexibility and minimum oversight. He hoped to enlarge a zone of secrecy around the executive branch, to reduce the power of Congress to restrict presidential action, to undermine limits imposed by international treaties, to nominate judges who favored a stronger presidency, and to impose greater White House control over the permanent workings of government. And Cheney’s vision of expanded executive power was not limited to his and Bush’s own tenure in office. Rather, Cheney wanted to permanently alter the constitutional balance of American government, establishing powers that future presidents would be able to wield as well.” [Savage, 2007, pp. 7-9] Larry Wilkerson, the chief of staff for Secretary of State Colin Powell, will say after leaving the administration: “We used to say about both [Defense Secretary Donald Rumsfeld’s office] and the vice president’s office that they were going to win nine out of 10 battles, because they were ruthless, because they have a strategy, because they never, never deviate from that strategy. They make a decision, and they make it in secret, and they make it in a different way than the rest of the bureaucracy makes it, and then suddenly, foist it on the government—and the rest of the government is all confused.” [Unger, 2007, pp. 299]
Signing Statements to Reshape Legislation, Expand Presidential Power - To that end, Cheney ensures that all legislation is routed through his office for review before it reaches Bush’s desk. Addington goes through every bill for any new provisions that conceivably might infringe on the president’s power as Addington interprets it, and drafts signing statements for Bush to sign. In 2006, White House counsel Bradford Berenson will reflect: “Signing statements unite two of Addington’s passions. One is executive power. And the other is the inner alleyways of bureaucratic combat. It’s a way to advance executive power through those inner alleyways.… So he’s a vigorous advocate of signing statements and including important objections in signing statements. Most lawyers in the White House regard the bill review process as a tedious but necessary bureaucratic aspect of the job. Addington regarded it with relish. He would dive into a 200-page bill like it was a four-course meal.” It will not be long before White House and Justice Department lawyers begin vetting legislation themselves, with Addington’s views in mind. “You didn’t want to miss something,” says a then-lawyer in the White House. [Savage, 2007, pp. 236]

Entity Tags: David S. Addington, Bradford Berenson, Alberto R. Gonzales, Charlie Savage, William Kristol, Richard (“Dick”) Cheney, Donald Rumsfeld, Bush administration (43), Harriet E. Miers, George W. Bush, Lawrence Wilkerson

Timeline Tags: Civil Liberties

The National Security Agency seeks the assistance of global telecommunications corporation AT&T to help it set up a domestic call monitoring site to eavesdrop on US citizens’ phone communications, according to court papers filed in June 2006 as part of a lawsuit against AT&T (see October 2001). The NSA is expressly forbidden from spying on US citizens within US borders unless authorized by the Foreign Surveillance Intelligence Court (FISC) (see 1978). When the NSA program, which wiretaps phone and email communications often without court warrants, becomes public knowledge well over four years later (see December 15, 2005), President Bush, NSA Director Michael Hayden, and other White House and government officials will assert that the program was set up in response to the September 11, 2001 terrorist attacks. If the claims made in the lawsuit are accurate, these assertions are provably false. “The Bush administration asserted this became necessary after 9/11,” lawyer Carl Mayer will claim in 2006. “This undermines that assertion.” Unbeknownst to most Americans, the NSA is operating a secret “data mining” operation that, by 2006, will have compiled phone records and contact information on millions of domestic phone and email communications. The NSA project is code-named “Project Groundbreaker,” and is ostensibly an above-board attempt announced in June 2000 to have AT&T and other firms help modernize its technological capabilities. The project originally seeks to have AT&T build a network operations center that duplicates AT&T’s facility in Bedminster, New Jersey; this plan will be altered when the NSA decides it will be better served by acquiring the monitoring technology itself. The agency is seeking bids for a project to “modernize and improve its information technology infrastructure,” including the privatization of its “non-mission related” systems support. [TechWeb, 6/13/2000; Bloomberg, 6/30/2006] Groundbreaker’s privatization project is expected to provide up to $5 billion in government contracts to various private firms such as AT&T, Computer Sciences Corporation, and OAO Corporation, [Computerworld, 12/4/2000; Government Executive, 9/1/2001] and up to 750 NSA employees will become private contractors. Hayden, who has aggressively instituted a corporate management protocol to enhance productivity and has brought in numerous senior managers and agency executives from private defense firms, is a strong proponent of privatizing and outsourcing much of the NSA’s technological operations, and in 2001 will say that he wants the agency to focus on its primary task of breaking codes and conducting surveillance. Hayden does not admit that Groundbreaker is part of a larger NSA domestic surveillance program, [Government Executive, 9/1/2001] and publicly, NSA officials say that the project is limited to administrative and logistics functions. [Computerworld, 12/4/2000] The covert data mining portion of the project is code-named “Pioneer.” A former, unnamed employee of the NSA, [Bloomberg, 6/30/2006] and a former AT&T technician, Mark Klein, will provide the key information about Groundbreaker (see Late 2002, July 7, 2009 and December 15-31, 2005). Klein will say in 2006 that he saw the NSA construct a clandestine area within its switching center in San Francisco, and saw NSA technicians shunt fiber optic cable carrying Internet traffic into that area, which contains a large data bank and secret data mining hardware (see April 6, 2006). Klein will say he knew that the NSA built other such facilities in other switching locations. He will go on to say that the NSA did not work with just AT&T traffic; when AT&T’s network connected with other networks, the agency acquired access to that traffic as well. [Democracy Now!, 5/12/2006] The information about AT&T and the NSA will become public knowledge after the 2006 filing of a lawsuit against AT&T and other telecommunications firms (see May 12, 2006 and June 26, 2006).

Entity Tags: Mark Klein, Michael Hayden, George W. Bush, Foreign Intelligence Surveillance Court, Bush administration (43), Carl Mayer, Computer Sciences Corporation, AT&T, National Security Agency, OAO Corporation

Timeline Tags: Civil Liberties

After entering the US, Zacarias Moussaoui engages in activities that appear to mirror those of the 9/11 hijackers. Both Moussaoui and the hijackers do the following:
bullet Take flight training (see February 23-June 2001 and July 6-December 19, 2000);
bullet Physically import large amounts of cash (see October 2000-February 2001 and January 15, 2000-August 2001);
bullet Purchase knives with short blades that can be carried onto airliners (see August 16, 2001 and July 8-August 30, 2001);
bullet Take fitness training (see August 16, 2001 and May 6-September 6, 2001);
bullet Obtain several identification documents (see April 12-September 7, 2001 and August 1-2, 2001); and
bullet Purchase flight deck videos from the same shop (see November 5, 2000-June 20, 2001).
In addition, Moussaoui is supported by some of the same al-Qaeda operatives as the 9/11 hijackers: Ramzi bin al-Shibh (see July 29, 2001-August 3, 2001 and June 13-September 25, 2000) and Yazid Sufaat (see September-October 2000 and January 5-8, 2000). At Moussaoui’s trial, the prosecution will cite these parallel activities in its argument that Moussaoui was connected to 9/11, rather than some follow-up plot. There is also one reported meeting between Moussaoui and two of the lead hijackers before 9/11 (see August 1, 2001), but this will not be mentioned at the trial (see March 6-May 4, 2006). [US District Court for the Eastern District of Virginia, Alexandria Division, 3/9/2006]

Entity Tags: Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Timeline Tags: Civil Liberties

A CIA informer who is aware of Zacarias Moussaoui’s connection to terrorism and met him in Azerbaijan in 1997 (see 1997) shares some information on him with the CIA. However, the informer is not aware of Moussaoui’s real name and knows him under an alias, “Abu Khalid al-Francia.” An intelligence official will indicate in 2002 that the source reports on Moussaoui under this name. However, CIA director George Tenet, writing in 2007, will say that the informer only reports on Moussaoui as “al Francia.” One of Moussaoui’s known aliases in 2001 is Abu Khalid al-Sahrawi, similar to the name the source knows him under, but when Moussaoui is arrested in the US (see August 16, 2001) the CIA apparently does not realize that Abu Khalid al-Francia is Moussaoui. [MSNBC, 12/11/2001; Associated Press, 6/4/2002; Tenet, 2007, pp. 201]

Entity Tags: Central Intelligence Agency, Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing.One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing. [Source: Matt Crypto / Public domain]The BBC reports on advances in electronic surveillance. The US’s global surveillance program, Echelon, has become particularly effective in monitoring mobile phones, recording millions of calls simultaneously and checking them against a powerful search engine designed to pick out key words that might represent a security threat. Laser microphones can pick up conversations from up to a kilometer away by monitoring window vibrations. If a bug is attached to a computer keyboard, it is possible to monitor exactly what is being keyed in, because every key on a computer has a unique sound when depressed. [BBC, 4/4/2001] Furthermore, a BBC report on a European Union committee investigation into Echelon one month later notes that the surveillance network can sift through up to 90 percent of all Internet traffic, as well as monitor phone conversations, mobile phone calls, fax transmissions, net browsing history, satellite transmissions and so on. Even encryption may not help much. The BBC suggests that “it is likely that the intelligence agencies can crack open most commercially available encryption software.” [BBC, 5/29/2001]

Entity Tags: Echelon, British Broadcasting Corporation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

9/11 hijacker Satam Al Suqami becomes an illegal overstay on this day. He entered the US on April 23 (see April 23-June 29, 2001) and was allowed to stay for 30 days, so, according to the 9/11 Commission, his permission to remain in the US expires on this day. He remains in illegal status until 9/11. [9/11 Commission, 8/21/2004, pp. 8, 21, 23 pdf file] Hijackers Mohamed Atta and Marwan Alshehhi also overstayed their visas at times (see January 10, 2001 and January 18, 2001). At least one more of the hijackers, Khalid Almihdhar, lied on his visa application form, meaning he was in the US illegally (see August 29, 2001).

Entity Tags: Satam Al Suqami

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A warrant is issued for the arrest of Mohamed Atta in the state of Florida. On April 26, Atta had been stopped in a random inspection near Fort Lauderdale, Florida, and given a citation for having no driver’s license (see April 26, 2001). He failed to show up for his May 28 court hearing, resulting in the arrest warrant. After this, Atta will fly all over the US using his real name, and even flies to Spain and back in July (see July 8-19, 2001), but is never stopped or questioned. The police apparently never try to find him. [Wall Street Journal, 10/16/2001; Australian Broadcasting Corporation, 11/12/2001] Atta will be stopped for speeding in July, but apparently his arrest warrant will not have been added to the police database by then (see July 5, 2001). Three other future 9/11 hijackers are also stopped for speeding in the US (see April 1, 2001, August 1, 2001, and September 9, 2001). Curiously, on the day of 9/11, a woman claiming to be Atta’s wife will go to a Florida courthouse and attempt to clear this from Atta’s record, but Atta does not have a wife (see September 11, 2001).

Entity Tags: Mohamed Atta

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In July 2001, NSA director Michael Hayden tells a reporter that the NSA does not monitor any US citizens without court warrants from the Foreign Intelligence Surveillance Court (FISC). “We don’t do anything willy-nilly,” Hayden says. “We’re a foreign intelligence agency. We try to collect information that is of value to American decision-makers, to protect American values, America—and American lives. To suggest that we’re out there, on our own, renegade, pulling in random communications, is—is simply wrong. So everything we do is for a targeted foreign intelligence purpose. With regard to the—the question of industrial espionage, no. Period. Dot. We don’t do that.” When asked how Americans could verify that, Hayden says that they should simply trust the NSA to police and monitor itself, along with oversight from the White House and from Congress. However, it will later come to light that the NSA began illegally monitoring US citizens from the start of the Bush administration (see Spring 2001). A former NSA official will later dispute Hayden’s account. “What do you expect him to say?” the official says. “He’s got to deny it. I agree. We weren’t targeting specific people, which is what the President’s executive order does. However, we did keep tabs on some Americans we caught if there was an interest [by the White House.] That’s not legal. And I am very upset that I played a part in it.” [Truthout (.org), 1/17/2006] Hayden also denies persistent allegations from European government officials that the agency has engaged in economic espionage to help American companies against European competitors (see April 4, 2001). In March 2001, the American Civil Liberties Union’s Barry Steinhardt says that “since there is no real check on [the NSA], there is no way to know” if they are following the law. Steinhardt says that Congress is the only real check on possible NSA abuses, but it has consistently failed to exercise any sort of aggressive oversight on the agency. [CNN, 3/31/2001]

Entity Tags: National Security Agency, Barry Steinhardt, Michael Hayden, American Civil Liberties Union

Timeline Tags: Civil Liberties

On July 5, 2001, counterterrorism “tsar” Richard Clarke gave a dramatic briefing to representatives from several domestic agencies on the urgent al-Qaeda threat (see July 5, 2001). However, the warnings given generally are not passed on by the attendees back to their respective agencies. The domestic agencies were not questioned about how they planned to address the threat and were not told what was expected of them. According to the 9/11 Commission, attendees later “report that they were told not to disseminate the threat information they received at the meeting. They interpreted this direction to mean that although they could brief their superiors, they could not send out advisories to the field.” One National Security Council official has a different recollection of what happened, recalling that attendees were asked to take the information back to their agencies and “do what you can” with it, subject to classification and distribution restrictions. But, for whatever reason, none of the involved agencies post internal warnings based on the meeting, except for Customs which puts out a general warning based entirely on publicly known historical facts. [9/11 Commission, 7/24/2004, pp. 258, 264] The FAA issues general and routine threat advisories that don’t reflect the level of urgency expressed by Clarke and others (see January-August 2001). FAA Administrator Jane Garvey later claims she was unaware of a heightened threat level, but in 2005 it will be revealed that about half of the FAA’s daily briefings during this time period referred to bin Laden or al-Qaeda (see April 1, 2001-September 10, 2001). [New York Times, 4/18/2004] Clarke said rhetorically in the meeting that he wants to know if a sparrow has fallen from a tree. A senior FBI official attended the meeting and promised a redoubling of the FBI’s efforts. However, just five days after Clarke’s meeting, FBI agent Ken Williams sends off his memo speculating that al-Qaeda may be training operatives as pilots in the US (see July 10, 2001), yet the FBI fails to share this information with Clarke or any other agency. [Washington Post, 5/17/2002; Clarke, 2004, pp. 236-37] The FBI will also fail to tell Clarke about the arrest of Zacarias Moussaoui (see August 16, 2001), or what they know about Nawaf Alhazmi and Khalid Almihdhar (see August 23, 2001).

Entity Tags: Federal Bureau of Investigation, Federal Aviation Administration, Zacarias Moussaoui, US Customs Service, Nawaf Alhazmi, Al-Qaeda, Counterterrorism and Security Group, George J. Tenet, Condoleezza Rice, Andrew Card, Ken Williams, Richard A. Clarke, Khalid Almihdhar, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Chechen rebel leader Ibn Khattab promises some “very big news” to his fighters and this statement is communicated to the CIA. The CIA then forwards the warning to National Security Adviser Condoleezza Rice together with several similar pieces of intelligence, saying it is evidence that an al-Qaeda attack is imminent (see July 10, 2001). [Tenet, 2007, pp. 151] The FBI is already aware that Ibn Khattab and Osama bin Laden, who have a long relationship (see 1986-March 19, 2002), may be planning a joint attack against US interests (see Before April 13, 2001). One of the operatives, Zacarias Moussaoui, will be arrested a month later (see August 16, 2001), but a search warrant for his belongings will not be granted (see August 16, 2001, August 22, 2001 and August 28, 2001).

Entity Tags: Ibn Khattab, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Djamel Beghal.
Djamel Beghal. [Source: Public domain]High-level al-Qaeda operative Djamel Beghal is arrested in Dubai on his way back from Afghanistan. Earlier in the month the CIA sent friendly intelligence agencies a list of al-Qaeda agents they wanted to be immediately apprehended, and Beghal was on the list (see July 3, 2001).
Information Obtained - Beghal quickly starts to talk, and tells French investigators about a plot to attack the American embassy in Paris. Crucially, he provides new details about the international-operations role of top al-Qaeda deputy Abu Zubaida, whom he had been with a short time before. [New York Times, 12/28/2001; Time, 8/12/2002] One European official says Beghal talks about “very important figures in the al-Qaeda structure, right up to bin Laden’s inner circle. [He] mention[s] names, responsibilities and functions—people we weren’t even aware of before. This is important stuff.” [Time, 11/12/2001] One French official says of Beghal’s interrogations, “We shared everything we knew with the Americans.” [Time, 5/19/2002]
Link to 9/11 - The New York Times later will report, “Enough time and work could have led investigators from Mr. Beghal to an address in Hamburg where Mohamed Atta and his cohorts had developed and planned the Sept. 11 attacks.” Beghal had frequently associated with Zacarias Moussaoui. However, although Moussaoui is arrested (see August 16, 2001) around the same time that Beghal is revealing the names and details of all his fellow operatives, Beghal is apparently not asked about Moussaoui. [New York Times, 12/28/2001; Time, 8/12/2002]
Timing of Arrest - Most media accounts place the arrest on July 28. However, in a 2007 book CIA Director George Tenet will say he received a briefing about the arrest on July 24. [Tenet, 2007, pp. 156-157]

Entity Tags: Djamel Beghal, Al-Qaeda, Mohamed Atta, George J. Tenet, Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

At some time in August 2001, Zacarias Moussaoui calls Naamen Meziche, who is an apparent member of the al-Qaeda cell in Hamburg, Germany, with a few of the future 9/11 hijackers. Moussaoui is in the US and will be arrested and imprisoned on August 16 (see August 16, 2001). Although it is not specified in news reports, presumably Moussaoui makes the call before his arrest, while he still is able to make calls. Meziche’s phone number is written on a piece of paper among Moussaoui’s belongings. FBI officials will not be allowed to search Moussaoui’s possessions until after 9/11. Presumably, if they had been able to, the call and phone number could have helped point investigators to the Hamburg cell and hijackers. Meziche is the son-in-law of Mohammed Fazazi, the radical imam of the Al-Quds mosque in Hamburg, Germany, regularly attended by three of the 9/11 hijackers (see 1993-Late 2001). He is also said to be a friend of hijacker Mohamed Atta. Meziche’s role in the Hamburg cell will only emerge after he is killed in a US drone strike in Pakistan in 2010 (see October 5, 2010). [Wall Street Journal, 10/16/2010] Before 9/11, German investigators are monitoring some members of the Hamburg cell (see for instance November 1, 1998-February 2001). Had that investigation widened to include Meziche, the call from Moussaoui could have been detected and changed the investigation of Moussaoui in the US.

Entity Tags: Mohamed Atta, Zacarias Moussaoui, Mohammed Fazazi, Naamen Meziche

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Hugh Sims (left) and Tim Nelson (right).Hugh Sims (left) and Tim Nelson (right). [Source: Flysouth and Andy King / Associated Press]Flight engineer Tim Nelson and pilot Hugh Sims, who work at the Pan Am International Flight School where Zacarias Moussaoui trains to fly a Boeing 747-400, are immediately suspicious of Moussaoui, and their suspicions continue to grow after his arrival because:
bullet He sends unusual emails that are signed “zuluman tangotango” and laced with grammatical errors, even though he says he is a British businessman; [CNN, 3/2/2006] His e-mails also include abnormal comments such as, “E[mail] is not secure;” [Newsweek, 10/1/2001]
bullet He pays most of his $8,300 fee in hundred dollar bills. This makes Nelson suspicious, because he thinks cash is hard to track; [New York Times, 2/8/2002; Star-Tribune (Minneapolis), 4/24/2005; CNN, 3/2/2006]
bullet He is alone, whereas most trainees arrive in groups; [Star-Tribune (Minneapolis), 4/24/2005]
bullet He says he wants to fly a 747 not because he plans to be a pilot, but as an “ego boosting thing.” However, within hours of his arrival, it is clear he is “not some affluent joyrider,” as he is shabbily dressed; [New York Times, 2/8/2002; New York Times, 10/18/2002; Star-Tribune (Minneapolis), 4/24/2005]
bullet In addition, it is unusual that he has no aviation background, very little experience, and no pilot’s license. All other pilots at the center, even “vanity pilots”—wealthy individuals who just want the thrill of flying a large jet—have many times more flying hours than Moussaoui and are all licensed; [US Congress, 10/17/2002; Star-Tribune (Minneapolis), 4/24/2005; Rake, 5/2005]
bullet He has flown for 57 hours at flight school in Oklahoma, but not yet flown solo, which is unusual. The school’s manager of pilot training, Alan McHale, will later comment, “My worst student was a grandma, and I got her to solo after 21 hours;” [Star-Tribune (Minneapolis), 4/24/2005]
bullet He is not just buying a one-period joyride, but a whole course; [Star-Tribune (Minneapolis), 4/24/2005]
bullet He seems determined to pack a large amount of training in a short period for no apparent reason; [New York Times, 2/8/2002]
bullet He is “extremely” interested in the operation of the plane’s doors and control panel. [US Congress, 10/17/2002] He also is very keen to learn the protocol for communicating with the flight tower, despite claiming to have no plans to become an actual pilot; [New York Times, 2/8/2002]
bullet He talks to some Syrian airline pilots training at the facility, and the pilots tell Nelson that Moussaoui is fluent in Arabic. Nelson, who is already worried Moussaoui might be up to no good, thinks, “One more red flag;” [Star-Tribune (Minneapolis), 4/24/2005; CNN, 3/2/2006]
bullet The school’s accountant complains that Moussaoui’s payment is a couple of hundred dollars short, but that he does not have a credit card with him, even though he says he is an international businessman; [Star-Tribune (Minneapolis), 4/24/2005] and
Nelson thinks back to an incident in Japan when the captain was stabbed to death and the killer then flew the plane for 45 minutes before the co-captain regained control. He is concerned Moussaoui might perform a suicide hijacking, “Here’s the problem: You’ve got an aircraft that weighs upwards of 900,000 pounds fully loaded and carries between 50,000 and 57,000 gallons of jet fuel. If you fly it at 350 knots [about 400 miles per hour] into a heavily populated area, you’re going to kill a boatload of people.” After talking to instructor Clancy Prevost, who is also suspicious of Moussaoui (see August 13-15, 2001), both Sims and Nelson independently decide to call the FBI and Moussaoui is arrested soon after the calls are made (see August 16, 2001). [Star-Tribune (Minneapolis), 4/24/2005]

Entity Tags: Tim Nelson, Zacarias Moussaoui, Alan McHale, Hugh Sims

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Pan Am International Flight School.Pan Am International Flight School. [Source: FBI] (click image to enlarge)Although some staff at the Pan Am International Flight School became a little suspicious of Zacarias Moussaoui before he arrived (see August 11-15, 2001), within two days of his arrival at the school, Moussaoui’s behaviour makes his assigned instructor Clancy Prevost highly suspicious. This is because:
bullet Moussaoui has only flown for under 60 hours, whereas the second least experienced student Prevost ever had had 10 times as many hours. This lack of experience means Moussaoui does not really understand the instruction; [US District Court for the Eastern District of Virginia, Alexandria Division, 3/9/2006]
bullet When Moussaoui is asked what his goal is, he tells Prevost he wants to fly a 747 from London to New York, the same goal he gave in his original e-mail to the flight school. [Rake, 5/2005] This raises fears he has plans to hijack such a flight; [US Congress, 10/17/2002]
bullet When Prevost relates a story about a charter flight in the Middle East where getting the doors open was a problem, the story causes Prevost to ask Moussaoui whether he is a Muslim and Moussaoui replies in a strange tone, “I am nothing.” This makes Prevost worry so much that he ends the session, goes back to his motel, and calls the flight school to express his reservations about Moussaoui. He talks to his manager in the morning and says, “We’ll care [about having trained Moussaoui] when there’s a hijacking and he knows how to throw the switches and put them in the right position and all the lawsuits start coming in when they figure out we taught him how to do this”;
bullet Prevost then goes into a supervisors’ meeting and recommends calling the FBI, but becomes even more upset when he is told Moussaoui paid for his training in $100 bills.
As Moussaoui does not learn much during the day, Prevost invites him to observe a simulator session that evening, which Moussaoui does with interest. The following day Prevost meets the FBI, which has now been alerted by the school, and shares his feeling it would be a good idea to do a background check on Moussaoui. The FBI subsequently arrests Moussaoui (see August 16, 2001). [US District Court for the Eastern District of Virginia, Alexandria Division, 3/9/2006] Some claims later made about Moussaoui in the media may be inaccurate:
bullet He is said to mostly practice flying in the air, not taking off or landing. [Star-Tribune (Minneapolis), 12/21/2001; New York Times, 2/8/2002; Slate, 5/21/2002; New York Times, 5/22/2002] However, he is arrested after ground instruction and never flies the simulator, so it is unclear how this could happen. [US District Court for the Eastern District of Virginia, Alexandria Division, 3/9/2006] 9/11 Congressional Inquiry staff director Eleanor Hill will also later say that the reports saying he only wanted to pilot a plane in the air are untrue. [US Congress, 9/24/2002] In addition, the 9/11 Commission will comment, “Contrary to popular belief, Moussaoui did not say he was not interested in learning how to take off or land”; [9/11 Commission, 4/13/2004]
bullet It will be reported that he appears not to understand French, despite being from France, and does not specify the Middle Eastern country he says he comes from. [Star-Tribune (Minneapolis), 12/21/2001; Washington Post, 1/2/2002] However, at the trial Prevost will recall that Moussaoui spoke good French and that Moussaoui told him he had both French and Moroccan passports. [US District Court for the Eastern District of Virginia, Alexandria Division, 3/9/2006]
Prevost will later receive a controversial $5 million reward from the US Department of State’s Reward for Justice program. [Newsweek, 1/30/2008]

Entity Tags: Clancy Prevost, Federal Bureau of Investigation, Zacarias Moussaoui, Pan Am International Flight School

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Two apparent associates of the al-Qaeda cell in Hamburg, Germany, Ismail Bin Murabit (a.k.a. Ismail Ben Mrabete) and Labed Ahmed (a.k.a. Ahmed Taleb), purchase tickets to fly to Pakistan on September 3, 2001. They will be joined on that flight by cell member Said Bahaji (see September 3-5, 2001). All three will disappear into Afghanistan thereafter. It is later discovered that Ahmed had been in e-mail contact with al-Qaeda leader Abu Zubaida. [Chicago Tribune, 2/25/2003] Note that these purchases occur one day before Zacarias Moussaoui’s arrest in Minnesota, suggesting the date for the 9/11 attacks was set before his arrest (see August 16, 2001).

Entity Tags: Said Bahaji, Ismail Bin Murabit, Abu Zubaida, Labed Ahmed

Timeline Tags: Complete 911 Timeline

After Zacarias Moussaoui is arrested (see August 16, 2001), the FBI’s Minneapolis field office becomes very concerned that he may be part of a larger operation involving hijacked aircraft and that he represents a real threat to US national security. One of the agents, Harry Samit, will later say that he and his colleagues are “obsessed” with Moussaoui. Samit sends over 70 communications warning about Moussaoui to the following:
bullet The Hezbollah, bin Laden, and Radical Fundamentalist Units at FBI headquarters (see August 20-September 11, 2001);
bullet Another FBI field office (see August 23, 2001);
bullet The CIA (see August 24, 2001);
bullet The FBI’s offices in Paris and London;
bullet The FAA;
bullet The Secret Service;
bullet The Immigration and Naturalization Service; and
bullet Another intelligence agency (possibly the National Security Agency).
While some of these bodies are responsive (see August 22, 2001 and August 24, 2001), Samit and his colleagues in Minnesota are forced to engage in a running battle with the Radical Fundamentalist Unit (RFU) at FBI headquarters, which obstructs their attempts to obtain a warrant to search Moussaoui’s belongings. Samit will later accuse the RFU of “criminal negligence” because they were trying to “run out the clock” to deport Moussaoui, instead of prosecuting him. [US Department of Justice, 11/2004, pp. 101-221 pdf file; USA Today, 3/9/2006; Washington Post, 3/21/2006]

Entity Tags: FBI Minnesota field office, Radical Fundamentalist Unit, FBI Headquarters, Harry Samit, Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

August 16, 2001: Zacarias Moussaoui Arrested

Zacarias Moussaoui after his arrest.Zacarias Moussaoui after his arrest. [Source: FBI]After being warned that Zacarias Moussaoui has raised suspicions at flight school (see August 11-15, 2001 and August 13-15, 2001), the FBI learns they can arrest him because he is in the US illegally. Four agents, Harry Samit, John Weess, Dave Rapp (all FBI) and Steve Nordmann (INS), drive to the Residence Inn, where Moussaoui and his associate Hussein al-Attas are staying. At the hotel Samit speaks on the phone to Joe Manarang from FBI headquarters; Manarang appeals for them to take the “cautious route” and not arrest Moussaoui. However, Samit refuses, as he has already notified the hotel clerk of their interest. Moussaoui is arrested around 4:00 p.m. on an immigration violation. At first Moussaoui shows the agents some documents, but then he becomes upset at missing his flight training. The FBI confiscates his belongings, including a computer laptop, but Moussaoui refuses permission for the belongings to be searched. A search of Moussaoui’s person yields a dagger with a two-inch blade, and another knife with a three-inch blade belonging to Moussoaui is found in the car. He also has boxing gloves and shin guards, and the arresting agents note he has prepared “through physical training for violent confrontation.” Al-Attas allows the agents to search his belongings and they believe al-Attas is in the US legally, so he is not arrested. However, al-Attas tells the FBI that Moussaoui is a radical religious Muslim and later makes several statements indicating Moussaoui may be a terrorist (see August 16, 2001). [MSNBC, 12/11/2001; US Congress, 10/17/2002; US District Court for the Eastern District of Virginia, Alexandria Division, 3/9/2006; Minneapolis Star Tribune, 6/4/2006] Al-Attas is arrested the next day (see August 17, 2001).

Entity Tags: John Weess, Zacarias Moussaoui, Steve Nordmann, Joe Manarang, Harry Samit, David Rapp, FBI Minnesota field office, Hussein al-Attas

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Zacarias Moussaoui’s roommate, Hussein Al-Attas, reports to the Immigration and Naturalization Service and is arrested when he admits he has worked despite only having a student visa. Al-Attas was with Moussaoui when he was arrested and was questioned the previous day (see August 10-11, 2001, August 16, 2001, and August 16, 2001). Al-Attas also says that Moussaoui follows the teachings of a sheikh, but that Moussaoui has not told him which sheikh because he does not think al-Attas would approve. When asked if the sheikh is Osama bin Laden, al-Attas says he does not think so and only remembers Moussaoui making one reference to bin Laden, when he appeared on television. [US Department of Justice, 11/2004, pp. 77-9 pdf file]

Entity Tags: Hussein al-Attas, US Immigration and Naturalization Service

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In an interview with Al Jazeera journalist Yosri Fouda in 2002 (see April, June, or August 2002), would-be hijacker Ramzi bin al-Shibh will claim that, roughly around this day, he receives a coded chat room message about the 9/11 plot from future hijacker Mohamed Atta in the US. Fouda will later co-write a book, and in it he will allege that bin al-Shibh gave him a computer disc containing the exact message. The message, as translated by Fouda, reads:
bullet “The first semester commences in three weeks. There are no changes. All is well. There are good signs and encouraging ideas. Two high schools and two universities. Everything is going according to plan. This summer will surely be hot. I want to talk to you about some details. Nineteen certificates for private education and four exams. Regards to the Professor. Goodbye.”
Fouda will claim that the message is in code, and that bin al-Shibh discussed with him what the real meaning was. In his book, Fouda says the real meaning is this:
bullet “The zero hour is going to be in three weeks’ time. There are no changes. All is well. The brothers have been seeing encouraging visions and dreams. The Twin Towers, the Pentagon, and Capitol Hill. Everything is going according to plan. This summer will surely be hot. I want to talk to you about some details. Nineteen hijackers and four targets. Regards to Khalid Shaikh Mohammed or Osama bin Laden [Fouda isn’t sure which one is the ‘Professor’]. I will call you nearer the time.”
Bin al-Shibh also tells Fouda that “This summer will surely be hot” is a reference to the damage the attacks will cause. [Guardian, 9/9/2002; Fouda and Fielding, 2003, pp. 138-139, 146]
When Were the Exact Date and Targets Chosen? - Future hijacker Hani Hanjour makes surveillance test flights near the Pentagon and World Trade Center around this time, suggesting the targets for the 9/11 attacks have now been confirmed (see July 20, 2001 and Mid-August 2001). [CBS News, 10/9/2002] The FBI will later notice spikes in cell phone use between the hijackers just after the arrest of Zacarias Moussaoui and just before the hijackers begin to buy tickets for the flights they will hijack. [New York Times, 9/10/2002] CIA Director George Tenet will hint that Moussaoui’s arrest a few days earlier (on August 15 (see August 16, 2001)) may be connected to when the date of the attacks is picked. [US Congress, 6/18/2002] On the other hand, some terrorists appear to have made plans to flee Germany in advance of the 9/11 attacks on August 14, one day before Moussaoui’s arrest (see August 14, 2001).

Entity Tags: Hani Hanjour, George J. Tenet, Yosri Fouda, Mohamed Atta, Federal Bureau of Investigation, Ramzi bin al-Shibh

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Dave Frasca of the FBI’s Radical Fundamentalist Unit (RFU) denies a request from the Minneapolis FBI field office to seek a criminal warrant to search the belongings of Zacarias Moussaoui, who was arrested on August 15 as part of an intelligence investigation (see August 16, 2001 and August 16, 2001). Minneapolis agents believe they had uncovered sufficient evidence that Moussaoui is involved in a criminal conspiracy, and want to obtain a criminal search warrant instead of a warrant under the Foreign Intelligence Surveillance Act (FISA). But because they originally opened an intelligence investigation, they cannot go directly to the local US attorney’s office for the warrant. In order to begin a parallel criminal investigation, they must first obtain permission from the Office of Intelligence Policy and Review (OIPR) so they can pass the information over the “wall.” [US District Court for the Eastern District of Virginia, Alexandria Division, 3/9/2006] Harry Samit, a Minneapolis FBI agent on the Moussaoui case, calls Dave Frasca, the head of the Radical Fundamentalist Unit (RFU) at FBI headquarters, to discuss the request. Samit tells Frasca that they have already completed the paperwork for a criminal investigation, but, according to Samit, Frasca says, “You will not open it, you will not open a criminal case.” Frasca says that argument for probable cause in seeking a criminal warrant is “shaky” and notes that if they fail to obtain a criminal warrant, they will be unable to obtain a warrant under FISA. Samit, who has only been with the FBI since 1999, defers to his superior, and writes on the paperwork, “Not opened per instructions of Dave Frasca.” Samit then tells his Chief Division Counsel, Coleen Rowley, about the conversation, and she also advises him that it would be better to apply for a warrant under FISA. When the Justice Department’s Office of Inspector General (OIG) interviews Frasca after 9/11, he will claim he never spoke to Samit about this matter, and that the conversation was with Chris Briese, one of Samit’s superiors. However, Briese will deny this and the OIG will conclude that the conversation was between Samit and Frasca. [US Department of Justice, 11/2004, pp. 128-132 pdf file; US Department of Justice, 3/1/2006 pdf file] To get a FISA search warrant for Moussaoui’s belongings the FBI must now show there is probable cause to believe Moussaoui is an agent of a foreign power. [US District Court for the Eastern District of Virginia, Alexandria Division, 3/9/2006] A criminal warrant to search Moussaoui’s belongings will be granted only after the 9/11 attacks (see September 11, 2001).

Entity Tags: David Frasca, Coleen Rowley, Harry Samit, FBI Headquarters, Zacarias Moussaoui, Radical Fundamentalist Unit, FBI Minnesota field office

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Dave Frasca, head of the FBI’s Radical Fundamentalism Unit (RFU), and Michael Rolince, the assistant director in charge of the FBI’s International Terrorism Operations Section (ITOS), have at least two brief conversations about the Zacarias Moussaoui case. Moussaoui, suspected of having ties to Islamic militants, was arrested in mid-August (see August 16, 2001). Though it is not known what Frasca and Rolince talk about, it is possible their discussions concern complaints from the Minneapolis field office about how RFU is handling the case (see August 27, 2001). According to the 9/11 Commission, there is no evidence that this discussion ever reaches Assistant Director for Counterterrorism Dale Watson or Acting FBI Director Thomas Pickard. If this is true, the FBI’s handling of the case is remarkably different than the approach taken in the CIA, where Director George Tenet is briefed repeatedly on the matter (see August 23, 2001). [9/11 Commission, 7/24/2004, pp. 275; Associated Press, 3/21/2006] A warning that Osama bin Laden and Chechen rebel leader Ibn Khattab were planning a joint operation against the US was sent to Rolince earlier in the year (see Before April 13, 2001) and the FBI is aware that Moussaoui had recruited for the Chechen rebels (see August 22, 2001). Rolince will be involved in preparations for Moussaoui’s deportation to France shortly before 9/11 (see (August 30-September 10, 2001)).

Entity Tags: FBI Minnesota field office, Michael Rolince, David Frasca, FBI Headquarters, Radical Fundamentalist Unit

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Although the FBI is aware that 9/11 hijacker Khalid Almihdhar lied in an application for a visa on which he entered the US the previous month (see July 4, 2001), it does not fully realize that this means his entry into the US was illegal. If the FBI realized this, it would be able to open a criminal investigation to locate Almihdhar, instead of an intelligence investigation. The New York office, which conducts the search for him, would have preferred a criminal investigation, as more agents could have worked on it, possibly allowing the office to locate Almihdhar before and stop 9/11. The Justice Department’s Office of Inspector General will remark after 9/11: “Thus, there was a clear basis to charge Almihdhar criminally with false statements or visa fraud. Significantly, this information had been provided to the FBI without the restrictive caveats placed on NSA reports and other intelligence information. As a result, if Almihdhar had been found, he could have been arrested and charged with a criminal violation based on the false statements on his visa application. However, the FBI did not seem to notice this when deciding whether to use criminal or intelligence resources to locate Almihdhar.” Almihdhar’s passport also lacks an expiry date and he is a terrorist posing as a tourist (see July 4, 2001). [US Department of Justice, 11/2004, pp. 351 pdf file]

Entity Tags: Usama bin Laden Unit (FBI), Khalid Almihdhar, Dina Corsi, Steve Bongardt, FBI New York Field Office, FBI Headquarters

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

An Echelon station in Menwith Hill, Britain.An Echelon station in Menwith Hill, Britain. [Source: BBC]By the 1980s, a high-tech global electronic surveillance network shared between the US, Britain, Canada, Australia, and New Zealand is gathering intelligence all over the world. The BBC describes Echelon’s power as “astounding,” and elaborates: “Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. They are looking for evidence of international crime, like terrorism.” [BBC, 11/3/1999] One major focus for Echelon before 9/11 is al-Qaeda. For instance, one account mentions Echelon intercepting al-Qaeda communications in Southeast Asia in 1996 (see Before September 11, 2001). A staff member of the National Security Council who regularly attends briefings on bin Laden states, “We are probably tapped into every hotel room in Pakistan. We can listen in to just about every phone call in Afghanistan.” However, he and other critics will claim one reason why US intelligence failed to stop terrorism before 9/11 was because there was too much of a focus on electronic intelligence gathering and not enough focus on human interpretation of that vast data collection. [Toronto Star, 2/2/2002]

Entity Tags: United Kingdom, United States, Osama bin Laden, Echelon, National Security Council, Canada, Australia, Al-Qaeda, New Zealand

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

All the alleged 9/11 hijackers reportedly check in at the airports from where they board Flights 11, 175, 77, and 93. [9/11 Commission, 7/24/2004, pp. 1-4; 9/11 Commission, 8/26/2004, pp. 27, 89, 93] Since 1998, the FAA has required air carriers to implement a program called the Computer Assisted Passenger Prescreening System (CAPPS). This identifies those passengers who might be a security risk, based upon suspicious behavior such as buying one-way tickets or paying with cash. CAPPS also randomly assigns some passengers to receive additional security scrutiny. If a particular passenger has been designated as a “selectee,” this information is transmitted to the airport’s check-in counter, where a code is printed on their boarding pass. At the airport’s security checkpoints, selectees are subjected to additional security measures. [US News and World Report, 4/1/2002; 9/11 Commission, 1/27/2004; US Congress, 3/17/2004; 9/11 Commission, 8/26/2004, pp. 2, 85] Their baggage is to be screened for explosives or held off the plane until they have boarded. Supposedly, the thinking behind this is that someone smuggling a bomb onto a plane won’t get onto that same flight. According to the 9/11 Commission, nine of the 19 hijackers are flagged by the CAPPS system before boarding Flights 11, 175, 77, and 93. [Washington Post, 1/28/2004; 9/11 Commission, 7/24/2004, pp. 84; United States of America v. Zacarias Moussaoui, a/k/a Shaqil, a/k/a Abu Khalid al Sahrawi, Defendant, 3/6/2006] In addition, Mohamed Atta was selected when he checked in at the airport in Portland, for his earlier connecting flight to Boston (see 5:33 a.m.-5:40 a.m. September 11, 2001). All of the hijackers subsequently pass through security checkpoints before boarding their flights. [9/11 Commission, 7/24/2004, pp. 1-4]

Entity Tags: Federal Aviation Administration, Computer Assisted Passenger Prescreening System

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

David Addington.David Addington. [Source: David Bohrer / White House]According to an in-depth examination by the Washington Post, within hours of the 9/11 attacks, Vice President Dick Cheney begins working to secure additional powers for the White House. Cheney had plans in place to begin acquiring these powers for the executive branch before the attacks, but had not begun to execute them.
Gathering the Team - David Addington, Cheney’s general counsel and legal adviser, had been walking home after having to leave the now-evacuated Eisenhower Executive Office Building. He receives a message from the White House telling him to turn around, because the vice president needs him. After Addington joins Cheney in the Presidential Emergency Operations Center (PEOC) below the East Wing of the White House, the pair reportedly begin “contemplating the founding question of the legal revolution to come: What extraordinary powers will the president need for his response?” Later in the day, Addington connects by secure video with Timothy Flanigan, the deputy White House counsel, who is in the White House Situation Room. John Yoo, the deputy chief of the Office of Legal Counsel, is also patched in from the Justice Department’s command center. White House counsel Alberto Gonzales joins them later. This forms the core legal team that Cheney will oversee after the terrorist attacks. Associate White House counsel Bradford Berenson will later recall: “Addington, Flanigan and Gonzales were really a triumvirate. [Yoo] was a supporting player.” Addington dominates the group. Gonzales is there primarily because of his relationship with President Bush. He is not, Yoo will later recall, “a law-of-war expert and [doesn’t] have very developed views.” Along with these allies, Cheney will provide what the Washington Post calls “the rationale and political muscle to drive far-reaching legal changes through the White House, the Justice Department, and the Pentagon,” which will free the president to fight the war on terror, “as he saw fit.”
Drafting the AUMF - The team begins drafting the document that will become the Authorization to Use Military Force (AUMF—see October 10, 2002) passed by Congress for the assault on Afghanistan. In the words of the group, the president is authorized “to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States.”
Extraordinarily Broad Language - The language is extraordinarily broad; Yoo will later explain that they chose such sweeping language because “this war was so different, you can’t predict what might come up.” The AUMF draft is the first of numerous attempts to secure broad powers for the presidency, most justified by the 9/11 attacks. The Washington Post will later report, “In fact, the triumvirate knew very well what would come next: the interception—without a warrant—of communications to and from the United States” (see September 25, 2001). [CNN, 9/11/2001; CNN, 9/12/2001; Unger, 2007, pp. 220-221; Washington Post, 6/24/2007]

Entity Tags: Richard (“Dick”) Cheney, John C. Yoo, Timothy E. Flanigan, Craig Unger, Bradford Berenson, David S. Addington, Alberto R. Gonzales

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Shortly after the 9/11 attacks, the NSA expands surveillance operations, relying on its own authorities; some sources indicate this includes a massive domestic data mining and call tracking program, and some contend that it is illegal. In a 2006 public briefing, NSA Director Michael Hayden will say, “In the days after 9/11, NSA was using its authorities and its judgment to appropriately respond to the most catastrophic attack on the homeland in the history of the nation.” Following an October 1 briefing by Hayden to the House Intelligence Committee, Representative Nancy Pelosi (D-CA) will write to Hayden on October 11, saying, “[Y]ou indicated that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance” (see October 11, 2001). Some evidence indicates NSA domestic surveillance began even before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Nancy Pelosi, 1/6/2006; Michael Hayden, 1/23/2006]
No Connection to Bush-Authorized Warrantless Domestic Call Monitoring - In his 2006 remarks, Hayden will clearly distinguish between the expansion he initiates under his own authorities, and the warrantless monitoring of calls with one end outside the US authorized later by President Bush (see October 4, 2001), saying, “[E]xcept that they involved NSA, these [Hayden-authorized] programs were not related… to the authorization that the president has recently spoken about.” [Michael Hayden, 1/23/2006]
'Stellar Wind' Is Name of Hayden-Authorized Program - In 2012 interviews, former NSA official William Binney will indicate that “Stellar Wind” is the name of the surveillance program initiated by Hayden. [Wired News, 2/15/2012; Democracy Now!, 4/20/2012] Some sources will refer to the Bush-authorized eavesdropping as being part of the Stellar Wind program. [Newsweek, 12/22/2008]
Differing Views on Authority for Surveillance - In his 2006 briefing, Hayden will say the Fourth Amendment only protects Americans against “unreasonable search and seizure,” and that 9/11 changed what was to be considered “reasonable.” Specifically, if communications are believed to have “[i]nherent foreign intelligence value,” interception of these communications is reasonable. In addition to referring to Hayden’s “view of [his] authorities” as “expansive,” Pelosi’s letter will give another indication that the NSA’s new standard is significantly broader than it was previously, stating, “You indicated that you were treating as a matter of first impression, [redacted] being of foreign intelligence interest.” Hayden will publicly clarify in 2006 that the authority for the NSA’s operational expansion exists under an Executive Order issued by President Reagan, saying, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” And, he will say, “I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities” (see October 1, 2001). In her October 11 letter, Pelosi will also write of having concerns about the program that haven’t been resolved due to restrictions on information-sharing with Congress imposed by Bush (see October 11, 2001). Binney, who pioneered the development of certain NSA data mining and surveillance technologies, will come to believe that what the NSA is doing is unconstitutional; he will first take his concerns to Congress (see Before October 31, 2001) and then resign on October 31 (see October 31, 2001). [Nancy Pelosi, 1/6/2006; Michael Hayden, 1/23/2006]
Surveillance Involves Domestic Communications - In his 2006 remarks, Hayden will not say the NSA is only targeting foreign communications under his post-9/11 authorization. Rather, the context of his remarks will indicate he is referring to domestic communications. More specifically, Hayden will state: “If the US person information isn’t relevant, the data is suppressed. It’s a technical term we use; we call it ‘minimized.’ The individual is not even mentioned. Or if he or she is, he or she is referred to as ‘US Person Number One’ or ‘US Person Number Two.’ Now, inherent intelligence value. If the US person is actually the named terrorist, well, that could be a different matter.” Hayden will also reveal that information is being passed to the FBI, an investigative agency with a primarily domestic jurisdiction, saying, “[A]s another part of our adjustment, we also turned on the spigot of NSA reporting to FBI in, frankly, an unprecedented way.” [Michael Hayden, 1/23/2006] One of Pelosi’s statements in her letter to Hayden may indicate an aspect of the domestic component: “You indicated that you were treating as a matter of first impression, [redacted] being of foreign intelligence interest,” she will write. [Nancy Pelosi, 1/6/2006] In a 2011 interview with Jane Mayer published in the New Yorker, Binney will say the NSA was obtaining “billing records on US citizens” and “putting pen registers [call logs] on everyone in the country.” [New Yorker, 5/23/2011] And in a 2012 Wired article, NSA expert James Bamford will write that Binney “explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore. If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law. Instead it chose to put the wiretapping rooms at key junction points throughout the country—large, windowless buildings known as switches—thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US.” Binney’s account is supported by other sources (see October 2001). [Wired News, 2/15/2012]
Surveillance Program Is Massive - Bamford, citing Binney, will write: “Stellar Wind… included not just eavesdropping on domestic phone calls but the inspection of domestic email. At the outset the program recorded 320 million calls a day, he says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” It is unclear exactly when this level of surveillance began. According to whistleblower AT&T employee Mark Klein, construction of secret rooms splitting communications traffic does not begin until Fall 2002 (see Fall 2002). Bamford will write that Binney says, “[T]he taps in the secret rooms dotting the country are actually powered by highly sophisticated software programs that conduct ‘deep packet inspection,’ examining Internet traffic as it passes through the 10-gigabit-per-second cables at the speed of light.” [Wired News, 2/15/2012] Also, Binney’s remark to Jane Mayer that the NSA was “putting pen registers on everyone in the country” indicates the broad scope of the program. [New Yorker, 5/23/2011]

Entity Tags: Religious Society of Friends (Quakers), US Department of Justice, National Security Agency, George W. Bush, Michael Hayden, Al-Qaeda, Foreign Intelligence Surveillance Court, House Intelligence Committee, Nancy Pelosi, Ronald Reagan

Timeline Tags: Civil Liberties

NSA director Michael Hayden addresses the NSA in a global videoconference, saying that the NSA, like other government agencies, will have to do more to protect the country from further terrorist attacks. The challenge, he says, is to balance Americans’ security with civil liberties, “to keep America free by making Americans feel safe again.” Hayden will say in a 2006 speech reflecting on that videoconference (see January 23, 2006) that US citizens operate under misconceptions about the NSA’s capabilities—that while citizens believe the NSA has a global electronic surveillance network that can, and does, spy on citizens willy-nilly, in reality the NSA is understaffed and unprepared to handle the technological advances of the last decade. Hayden will say that with more extensive domestic surveillance of US citizens and foreign visitors, the NSA could have caught some of the 9/11 hijackers before they were able to put their plan into motion. The standards by which US citizens and foreign visitors are monitored must change, Hayden believes.
Expansion of NSA Surveillance Powers - Using Ronald Reagan’s 1981 executive order 12333 (see December 4, 1981), Hayden expands the NSA’s domestic surveillance practices to eavesdrop, sometimes without court approval, on selected international calls made by US citizens. Though Hayden’s expansion of NSA surveillance is not directly authorized by President Bush, and is not the same program as authorized by Bush’s secret executive order of 2002 (see Early 2002), Hayden will later say that this expansion is based on the intelligence community’s assessment “of a serious and continuing threat to the homeland.” Hayden’s program is reviewed and approved by lawyers at the NSA, the Justice Department, and the White House, as well as Attorney General John Ashcroft. [Michael Hayden, 1/23/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, US Department of Justice, National Security Agency, John Ashcroft, George W. Bush, Bush administration (43), Ronald Reagan, Michael Hayden

Timeline Tags: Civil Liberties

A self-styled White House “war council” begins meeting shortly after the 9/11 attacks, to discuss the administration’s response to the attacks and the methods it will use (see (After 10:00 a.m.) September 11, 2001). The ad hoc group is composed of White House counsel Alberto Gonzales, Justice Department lawyer John Yoo, Pentagon chief counsel William J. Haynes, and the chief aide to Vice President Dick Cheney, David Addington. According to Jack Goldsmith, who will become head of the Justice Department’s Office of Legal Counsel (OLC) in 2003 (see October 6, 2003), the four believe that the administration’s biggest obstacle to responding properly to the 9/11 attacks is the body of domestic and international law that arose in the 1970s to constrain the president’s powers after the criminal excesses of Richard Nixon’s White House. Chief among these restraints is the Foreign Intelligence Surveillance Act (FISA) of 1978 (see 1978). Though Addington tends to dominate the meetings with his imposing physical presence and aggressive personality, Yoo is particularly useful to the group; the head of the OLC, Jay Bybee (whom Goldsmith will replace) has little experience with national security issues, and delegates much of the responsibility for that subject to Yoo, even giving him the authority to draft opinions that are binding on the entire executive branch. Yoo agrees wholeheartedly with Addington, Gonzales, and Cheney about the need for vastly broadened presidential powers. According to Goldsmith, Yoo is seen as a “godsend” for the White House because he is eager to draft legal opinions that would protect Bush and his senior officials from any possible war crimes charges. However, Yoo’s direct access to Gonzales angers Attorney General John Ashcroft, who feels that the “war council” is usurping legal and policy decision-making powers that are legally his own. [New York Times Magazine, 9/9/2007] In 2009, Goldsmith will say, “[I]it was almost as if they [Cheney and Addington] were interested in expanding executive power for its own sake.” [Vanity Fair, 2/2009]

Entity Tags: Richard (“Dick”) Cheney, William J. Haynes, Richard M. Nixon, Office of Legal Counsel (DOJ), Jay S. Bybee, Jack Goldsmith, John C. Yoo, Bush administration (43), Foreign Intelligence Surveillance Act, Alberto R. Gonzales, David S. Addington

Timeline Tags: Civil Liberties

John Yoo, a deputy assistant attorney general in the Department of Justice (DOJ) Office of Legal Counsel (OLC), issues a legal opinion that says the US can conduct electronic surveillance against its citizens without probable cause or warrants. According to the memo, the opinion was drafted in response to questions about whether it would be constitutional to amend the Foreign Intelligence Surveillance Act (FISA) to state that searches may be approved when foreign intelligence collection is “a purpose” of the search, rather than “the purpose.” Yoo finds this would be constitutional, but goes further. He asserts that FISA is potentially in conflict with the Constitution, stating, “FISA itself is not required by the Constitution, nor is it necessarily the case that its current standards match exactly to Fourth Amendment standards.” Citing Vernonia School Dist. 47J v. Acton, in which the Supreme Court found that warrantless searches of students were permissible, Yoo argues that “reasonableness” and “special needs” are also the standards according to which warrantless monitoring of the private communications of US persons is permissible. According to Yoo, the Fourth Amendment requirement for probable cause and warrants prior to conducting a search pertain primarily to criminal investigations, and in any case cannot be construed to restrict presidential responsibility and authority concerning national security. Yoo further argues that in the context of the post-9/11 world, with the threat posed by terrorism and the military nature of the fight against terrorism, warrantless monitoring of communications is reasonable. Some information indicates the NSA began a broad program involving domestic surveillance prior to the 9/11 attacks, which contradicts the claim that the program began after, and in response to, the attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [US Department of Justice, 9/25/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Inspectors General, 7/10/2009]
Yoo Memo Used to Support Legality of Warrantless Surveillance - Yoo’s memo will be cited to justify the legality of the warrantless domestic surveillance program authorized by President Bush in October 2001 (see October 4, 2001). NSA Director General Michael Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general.” The various post-9/11 NSA surveillance activities authorized by Bush will come to be referred to as the President’s Surveillance Program (PSP), and the first memo directly supporting the program’s legality will be issued by Yoo on November 2, 2001, after the program has been initiated (see November 2, 2001). Many constitutional authorities will reject Yoo’s legal rationale. [Michael Hayden, 1/23/2006]
Yoo Memo Kept Secret from Bush Officials Who Might Object - According to a report by Barton Gellman and Jo Becker in the Washington Post, the memo’s “authors kept it secret from officials who were likely to object,” including ranking White House national security counsel John Bellinger, who reports to National Security Adviser Condoleezza Rice. Bellinger’s deputy, Bryan Cunningham, will tell the Post that Bellinger would have recommended having the program vetted by the Foreign Intelligence Surveillance Court, which oversees surveillance under FISA. Gellman and Becker quote a “senior government lawyer” as saying that Vice President Dick Cheney’s attorney, David Addington, had “open contempt” for Bellinger, and write that “more than once he accused Bellinger, to his face, of selling out presidential authority for good ‘public relations’ or bureaucratic consensus.” [Washington Post, 6/24/2007]

Entity Tags: US Department of Justice, John Bellinger, National Security Agency, Bryan Cunningham, Condoleezza Rice, David S. Addington, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Office of Legal Counsel (DOJ), John C. Yoo, George W. Bush, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

According to author Ronald Kessler’s November 2007 book The Terrorist Watch, the NSA’s domestic surveillance program begins around two weeks after the 9/11 attacks, when President Bush meets with NSA director Michael Hayden and other NSA officials in the Oval Office. According to chief of staff Andrew Card, in attendance, Bush asks, “What tools do we need to fight the war on terror?” Hayden suggests revamping NSA guidelines to allow the agency to wiretap domestic phone calls and intercept e-mails to and from terror suspects if one end of the communication is overseas. Kessler gives the following rather lurid example: “Thus, if [Osama] bin Laden were calling the US to order the detonation of a nuclear device, and the person he called began making overseas calls, NSA could listen in to those calls as well as to bin Laden’s original call.” Kessler is a chief correspondent for the extremist conservative Web site NewsMax; his assertion is disputed by evidence suggesting that the domestic surveillance program began well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Kessler, 2007, pp. 130]

Entity Tags: National Security Agency, Andrew Card, Michael Hayden, Ronald Kessler, George W. Bush

Timeline Tags: Civil Liberties

Former AT&T employee Mark Klein.Former AT&T employee Mark Klein. [Source: PBS]The National Security Agency, as part of its huge, covert, and possibly illegal wiretapping program directed at US citizens (see Spring 2001 and After September 11, 2001), begins collecting telephone records of tens of millions of Americans, using data provided by telecommunications firms such as AT&T, Verizon, and BellSouth (see February 5, 2006). The media will not report on this database until May 2006 (see May 11, 2006). The program collects information on US citizens not suspected of any crime or any terrorist connections. Although informed sources say the NSA is not listening to or recording actual conversations, the agency is using the data to analyze calling patterns in an effort to detect terrorist activity. “It’s the largest database ever assembled in the world,” says one anonymous source. The NSA intends “to create a database of every call ever made.” As a result, the NSA has detailed records of the phone activities of tens of millions of US citizens, from local calls to family and friends to international calls. The three telecommunications companies are working with the NSA in part under the Communications Assistance Act for Law Enforcement (CALEA) (see January 1, 1995 and June 13, 2006) and in part under contract to the agency.
Surveillance Much More Extensive Than Acknowledged - The wiretapping program, which features electronic surveillance of US citizens without court warrants or judicial oversight, is far more extensive than anything the White House or the NSA has ever publicly acknowledged. President Bush will repeatedly insist that the NSA focuses exclusively on monitoring international calls where one of the call participants is a known terrorist suspect or has a connection to terrorist groups (see December 17, 2005 and May 11, 2006), and he and other officials always insist that domestic calls are not monitored. This will be proven false. The NSA has become expert at “data mining,” sifting through reams of information in search of patterns. The warrantless wiretapping database is one source of information for the NSA’s data mining. As long as the NSA does not collect “personal identifiers”—names, Social Security numbers, street addresses, and the like—such data mining is legal. But the actual efficacy of the wiretapping program in learning about terrorists and possibly preventing terrorist attacks is unclear at best. And many wonder if the NSA is not repeating its activities from the 1950s and 1960s, when it conducted “Operation Shamrock” (see 1945-1975), a 20-year program of warrantless wiretaps of international phone calls at the behest of the CIA and other intelligence agencies. Operation Shamrock, among other things, led to the 1978 passage of the Foreign Intelligence Surveillance Act (see 1978). [USA Today, 5/11/2006] In May 2006, former NSA director Bobby Ray Inman will say, “[T]his activity is not authorized” (see May 12, 2006). [Democracy Now!, 5/12/2006]
Secret Data Mining Center - In May 2006, retired AT&T technician Mark Klein, a 22-year veteran of the firm, will file a court affidavit saying that he saw the firm construct a secret data-mining center in its San Francisco switching center that would let the NSA monitor domestic and international communications (see January 2003). And former AT&T workers say that, as early as 2002, AT&T has maintained a secret area in its Bridgeton, Missouri, facility that is likely being used for NSA surveillance (see Late 2002-Early 2003).
Domestic Surveillance Possibly Began Before 9/11 - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, Verizon Communications, Mark Klein, George W. Bush, AT&T, BellSouth, Central Intelligence Agency, Communications Assistance for Law Enforcement Act (CALEA), Foreign Intelligence Surveillance Act, Qwest, National Security Agency

Timeline Tags: Civil Liberties

President Bush issues a directive authorizing the National Security Agency (NSA) to operate a warrantless domestic surveillance program. Author/journalist Jane Mayer will report in 2011, “[O]n October 4, 2001, Bush authorized the policy, and it became operational by October 6th,” and, “[t]he new policy, which lawyers in the Justice Department justified by citing President Bush’s executive authority as commander in chief, contravened a century of constitutional case law.” Mayer will interview NSA whistleblower Thomas Drake for her article and quote him as saying that, following the October 4 directive, “strange things were happening. Equipment was being moved. People were coming to me and saying, ‘We’re now targeting our own country!’” Bush’s directive is based on a legal opinion drafted by Department of Justice Office of Legal Counsel Deputy Attorney General John Yoo (see September 25, 2001). [New Yorker, 5/23/2011]
Conflicting Information regarding Date of First Authorization - The existence of the NSA’s domestic surveillance program will first be made public in December 2005, following reporting by the New York Times that will cite “[n]early a dozen current and former officials” (see December 15, 2005). The Times article will state that in 2002, “[m]onths after the Sept. 11 attacks,” Bush signed an executive order authorizing the NSA to monitor domestic phone calls, including those of US citizens and permanent residents, if one end of the call was outside the country. The Times article also mentions an NSA “‘special collection program’ [that] began soon after the Sept. 11 attacks, as it looked for new tools to attack terrorism.” The difference between the October 4, 2001 directive and the 2002 executive order referred to by the Times is unclear. [New York Times, 12/16/2005]
Other Sources for October Directive - Other sources, including Bush, NSA Director General Michael Hayden, and the inspectors general of five separate agencies, will later refer to a presidential order having been given in “October,” or “weeks” after the 9/11 attacks, and say that, subsequent to this order, international calls of US persons are targeted for content-monitoring. Following the publication of the Times article, Bush will say in a December 17, 2005 radio address: “In the weeks following the terrorist attacks on our nation, I authorized the National Security Agency, consistent with US law and the Constitution, to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations. Before we intercept these communications, the government must have information that establishes a clear link to these terrorist networks” (see December 17, 2005). This presidential authorization was based on a legal opinion drafted by Department of Justice Office of Legal Counsel attorney John Yoo (see October 18, 2001). [WhiteHouse(.gov), 12/17/2005] Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001,” which is when he “gathered key members of the NSA workforce… [and] introduced [the NSA’s] new operational authority to them.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general,” and that “the three most senior and experienced lawyers in NSA… supported the lawfulness of this program.” [Michael Hayden, 1/23/2006] In a July 10, 2009 jointly-issued report, the inspectors general of the Department of Defense, Department of Justice, CIA, NSA, and Office of the Director of National Intelligence will refer to the “President’s Surveillance Program” (PSP) and “the program’s inception in October 2001.” The report will say: “One of the activities authorized as part of the PSP was the interception of the content of communications into and out of the United States where there was a reasonable basis to conclude that one party to the communication was a member of al-Qaeda or related terrorist organizations.… The attorney general subsequently publicly acknowledged the fact that other intelligence activities were also authorized under the same presidential authorization, but the details of those activities remain classified.” [Inspectors General, 7/10/2009] Citing “a senior administration official,” the Washington Post will report on January 4, 2006: “The secret NSA program… was authorized in October 2001.… The president and senior aides have publicly discussed various aspects of the program, but neither the White House, the NSA, nor the office of the director of national intelligence would say what day the president authorized it.” [Washington Post, 1/4/2006]

Entity Tags: US Department of Justice, Thomas Drake, US Department of Defense, Office of Legal Counsel (DOJ), Office of the Director of National Intelligence, Michael Hayden, National Security Agency, George W. Bush, Central Intelligence Agency, John C. Yoo, Jane Mayer

Timeline Tags: Civil Liberties

Bensayah Belkacem at Guantanamo.Bensayah Belkacem at Guantanamo. [Source: US Defense Department]US intelligence intercepts numerous phone calls between Abu Zubaida and other al-Qaeda leaders and Bensayah Belkacem, an operative living in Bosnia. The New York Times will later report that shortly after 9/11, “American intelligence agencies, working closely with the government of neighboring Croatia, listened in as Mr. Belkacem and others discussed plans for attacks.” One US official says, “He was apparently on the phone constantly to Afghanistan, with Zubaida and others. There were dozens of calls to Afghanistan.” Belkacem, an Algerian, had moved to Bosnia to fight in the early 1990s war there, then obtained Bosnian citizenship and settled in Zenica, working for an Islamic charity. [New York Times, 1/23/2002] On October 8, 2001, Bosnian police detain Belkacem. While searching his home, they find a piece of note listing the name “Abu Zubeida” and Zubaida’s phone number. [Washington Post, 8/21/2006] It is later revealed that Belkacem made 70 calls to Zubaida between 9/11 and his arrest and more calls before then. He had repeatedly sought a visa to leave Bosnia for Germany just before 9/11. Phone transcripts show Zubaida and Belkacem discussed procuring passports. [Time, 11/12/2001] A US official will later claim that it was believed Zubaida was in Afghanistan with bin Laden at the time of Belkacem’s arrest. [New York Times, 1/23/2002] It has not been explained why this knowledge was not used to capture or kill Zubaida and/or bin Laden. It appears that Western intelligence agencies had been monitoring Zubaida’s calls as far back as 1996 (see (Mid-1996) and October 1998 and After). Belkacem and five of his associates will be renditioned to Guantanamo Bay prison in 2002 and remain imprisoned there (see January 18, 2002).

Entity Tags: Abu Zubaida, Bensayah Belkacem, US intelligence

Timeline Tags: Complete 911 Timeline

Nancy Pelosi.Nancy Pelosi. [Source: US Congress]House Minority Leader Nancy Pelosi (D-CA) writes to NSA Director Michael Hayden questioning the nature and extent of the apparently illegal warrantless wiretapping of US citizens by the agency. Pelosi and other members of the House Intelligence Committee were briefed on October 1, 2001, by Hayden, whose agency began conducting surveillance against US citizens after the 9/11 attacks (see After September 11, 2001). Pelosi will release the letter on January 6, 2006, three weeks after the New York Times revealed that the NSA had been conducting electronic surveillance of US citizens without warrants since at least 2002 (see December 15, 2005.) Pelosi’s office will also release Hayden’s response, but almost the entire letter from Hayden is redacted.
Letter to Hayden - Pelosi writes in part, “[Y]ou indicated [in the briefing] that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance under the Foreign Intelligence Surveillance Act and related statutes, orders, regulations, and guidelines.… For several reasons, including what I consider to be an overly broad interpretation of President Bush’s directive of October 5 on sharing with Congress ‘classified or sensitive law enforcement information’ it has not been possible to get answers to my questions. Without those answers, the concerns I have about what you said on the First can not be resolved, and I wanted to bring them to your attention directly. You indicated that you were treating as a matter of first impression, [redacted ] being of foreign intelligence interest. As a result, you were forwarding the intercepts, and any information [redacted ] without first receiving a request for that identifying information to the Federal Bureau of Investigation. Although I may be persuaded by the strength of your analysis [redacted ] I believe you have a much more difficult case to make [redacted ] Therefore, I am concerned whether, and to what extent, the National Security Agency has received specific presidential authorization for the operations you are conducting. Until I understand better the legal analysis regarding the sufficiency of the authority which underlies your decision on the appropriate way to proceed on this matter, I will continue to be concerned.” The only portion of Hayden’s October 18 reply regarding Pelosi’s concerns that has not been redacted reads, “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” In January 2006, an NSA official will say that Pelosi’s concerns were adequately addressed in Hayden’s reply, and in a private briefing shortly thereafter. [Washington Post, 1/4/2006; Nancy Pelosi, 1/6/2006]
Pelosi Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). Pelosi is apparently unaware of any of this.

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi

Timeline Tags: Civil Liberties

NSA Director Michael Hayden responds to an October 11 letter from Representative Nancy Pelosi (see October 11, 2001), expressing concerns about the NSA’s post-9/11 surveillance expansion (see After September 11, 2001) that Hayden outlined for the House Intelligence Committee on October 1 (see October 1, 2001), and asking whether the president authorized it. The substance of Hayden’s October 18 reply will be redacted, except for this statement: “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” [Nancy Pelosi, 1/6/2006] A January 4, 2006 report in the Washington Post will cite “intelligence official close to Hayden” as saying that “[Hayden’s] appearance on Oct. 1, 2001, before the House committee had been to discuss Executive Order 12333, and not the new NSA program,” and that “Pelosi’s concerns had been answered in writing and again several weeks later during a private briefing.” [Washington Post, 1/4/2006] In a January 23, 2006 public briefing, Hayden will say, “September 2001, I asked to update the Congress on what NSA had been doing, and I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities,” and, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” [Michael Hayden, 1/23/2006]
Nature of Hayden's EO 12333 Surveillance Program - The full scope of Hayden’s surveillance program is unclear, but some sources indicate it includes the wholesale collection and data-mining of phone records provided by telecom companies and placement of pen registers (call trackers) on domestic phone numbers (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, October 2001), and October 31, 2001). Some sources indicate the NSA began large-scale domestic surveillance activities prior to the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi, National Security Agency

Timeline Tags: Civil Liberties

John Yoo, a deputy assistant attorney general in the Justice Department’s Office of Legal Counsel, and OLC special counsel Robert Delahunty issue a joint memo to White House counsel Alberto Gonzales. The memo claims that President Bush has sweeping extraconstitutional powers to order military strikes inside the US if he says the strikes are against suspected terrorist targets. In the days following the 9/11 attacks, Gonzales asked if Bush could legally order the military to combat potential terrorist activity within the US. The memo is first revealed to exist seven years later (see April 2, 2008) after future OLC head Steven Bradbury acknowledges its existence to the American Civil Liberties Union; it will be released two months after the Bush administration leaves the White House (see March 2, 2009). [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009]
Granting Extraordinary, Extraconstitutional Authority to Order Military Actions inside US - Yoo and Delahunty’s memo goes far past the stationing of troops to keep watch at airports and around sensitive locations. Instead, the memo says that Bush can order the military to conduct “raids on terrorist cells” inside the US, and even to seize property. “The law has recognized that force (including deadly force) may be legitimately used in self-defense,” they write. In 2009, Reuters will write, “The US military could have kicked in doors to raid a suspected terrorist cell in the United States without a warrant” under the findings of the OLC memo. “We do not think that a military commander carrying out a raid on a terrorist cell would be required to demonstrate probable cause or to obtain a warrant,” Yoo and Delahunty write. [US Department of Justice, 10/23/2001 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009] The memo reasons that since 9/11, US soil can be legally construed as being a battlefield, and Congress has no power to restrict the president’s authority to confront enemy tactics on a battlefield. [Savage, 2007, pp. 131]
No Constitutional or Other Legal Protections - “[H]owever well suited the warrant and probable cause requirements may be as applied to criminal investigations or to other law enforcement activities, they are unsuited to the demands of wartime and the military necessity to successfully prosecute a war against an enemy. [Rather,] the Fourth Amendment does not apply to domestic military operations designed to deter and prevent foreign terrorist attacks.” Any objections based on the Fourth Amendment’s ban on unreasonable search and seizures would be invalid since whatever possible infringement on privacy would be trumped by the need to protect the nation from injury by deadly force. The president is “free from the constraints of the Fourth Amendment.” The Posse Comitatus Act, which bars the military from operating inside the US for law enforcement purposes, is also moot, the memo says, because the troops would be acting in a national security function, not as law enforcement. [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009; Ars Technica, 3/2/2009] There are virtually no restrictions on the president’s ability to use the military because, Yoo and Delahunty write, the nation is in a “state of armed conflict.” The scale of violence, they argue, is unprecedented and “legal and constitutional rules” governing law enforcement, even Constitutional restrictions, no longer apply. The US military can be used for “targeting and destroying” hijacked airplanes, they write, or “attacking civilian targets, such as apartment buildings, offices, or ships where suspected terrorists were thought to be.” The memo says, “Military action might encompass making arrests, seizing documents or other property, searching persons or places or keeping them under surveillance, intercepting electronic or wireless communications, setting up roadblocks, interviewing witnesses, or searching for suspects.” [Newsweek, 3/2/2009] Yoo writes that the Justice Department’s criminal division “concurs in our conclusion” that federal criminal laws do not apply to the military during wartime. The criminal division is headed by Michael Chertoff, who will become head of the Department of Homeland Security. [Washington Post, 4/4/2008]
Sweeping Away Constitutional Rights - Civil litigator Glenn Greenwald will later note that the memo gives legal authorization for President Bush to deploy the US military within US borders, to turn it against foreign nationals and US citizens alike, and to render the Constitution’s limits on power irrelevant and non-functional. Greenwald will write, “It was nothing less than an explicit decree that, when it comes to presidential power, the Bill of Rights was suspended, even on US soil and as applied to US citizens.”
Justifying Military Surveillance - Greenwald will note that the memo also justifies the administration’s program of military surveillance against US citizens: “[I]t wasn’t only a decree that existed in theory; this secret proclamation that the Fourth Amendment was inapplicable to what the document calls ‘domestic military operations’ was, among other things, the basis on which Bush ordered the NSA, an arm of the US military, to turn inwards and begin spying—in secret and with no oversight—on the electronic communications (telephone calls and emails) of US citizens on US soil” (see December 15, 2005 and Spring 2004). “If this isn’t the unadorned face of warped authoritarian extremism,” Greenwald will ask, “what is?” [Salon, 3/3/2009] If the president decides to use the military’s spy agency to collect “battlefield intelligence” on US soil, no law enacted by Congress can regulate how he goes about collecting that information, including requiring him to get judicial warrants under the Foreign Intelligence Surveillance Act (FISA). In 2007, Yoo will say in an interview: “I think there’s a law greater than FISA, which is the Constitution, and part of the Constitution is the president’s commander in chief power. Congress can’t take away the president’s powers in running war.” [Savage, 2007, pp. 131; PBS Frontline, 5/15/2007] Cheney and Addington will push the NSA to monitor all calls and e-mails, including those beginning and ending on US soil, but the NSA will balk. Domestic eavesdropping without warrants “could be done and should be done,” Cheney and Addington argue, but the NSA’s lawyers are fearful of the legal repercussions that might follow once their illegal eavesdropping is exposed, with or without the Justice Department’s authorization. The NSA and the White House eventually reach a compromise where the agency will monitor communications going in and out of the US, but will continue to seek warrants for purely domestic communications (see Spring 2001, After September 11, 2001, and October 2001). [Savage, 2007, pp. 131]
Military Use Considered - In 2009, a former Bush administration lawyer will tell a reporter that the memo “gave rise to the Justice Department discussing with the Defense Department whether the military could be used to arrest people and detain people inside the United States. That was considered but rejected on at least one occasion.” The lawyer will not give any indication of when this will happen, or to whom. Under the proposal, the suspects would be held by the military as “enemy combatants.” The proposal will be opposed by the Justice Department’s criminal division and other government lawyers and will ultimately be rejected; instead, the suspects will be arrested under criminal statutes. [Los Angeles Times, 3/3/2009]

Entity Tags: Steven Bradbury, US Department of Homeland Security, US Department of Defense, Robert J. Delahunty, Office of Legal Counsel (DOJ), Bush administration (43), Michael Chertoff, Alberto R. Gonzales, National Security Agency, American Civil Liberties Union, Glenn Greenwald, George W. Bush, US Department of Justice, John C. Yoo

Timeline Tags: Civil Liberties

Vice President Dick Cheney summons the chairmen and ranking members of the Senate and House Intelligence Committees to the White House for a classified briefing on the secret NSA warrantless wiretapping program (see Early 2002). Cheney makes it clear to the lawmakers that he is merely informing them about the program, and not seeking their approval. [Washington Post, 12/18/2005] Officials later say that under any of the previous presidents, such a meeting of this import would involve the president. But the four lawmakers are hustled away from the Oval Office. Instead, “[w]e met in the vice president’s office,” Bob Graham (D-FL), the chairman of the Senate Intelligence Committee, later recalls. President Bush has already told Graham that “the vice president should be your point of contact in the White House.” Cheney, according to the president, “has the portfolio for intelligence activities.” [Washington Post, 6/24/2007] The leaders are briefed by Cheney, CIA Director George Tenet, and NSA Director Michael Hayden. The Congressional leaders will later mostly refuse to comment publicly about what they do and do not learn about the program, even after it is revealed to the public (see December 15, 2005). In 2003, when Senator John D. Rockefeller ascends to the Democratic leadership of the Senate committee, and is himself briefed on the program, he will write to Cheney expressing his concerns over it (see July 17, 2003). [New York Times, 12/15/2005]
'No Discussion about Expanding' NSA Wiretapping - In December 2005, after the program is revealed to the public, one of the Congressmen present at the briefings, Graham, the then-chairman of the Senate Intelligence Committee, will discuss his knowledge of the program. In contradiction to the characterizations of Bush and other White House officials, Graham will say that he recalls “no discussion about expanding [NSA eavesdropping] to include conversations of US citizens or conversations that originated or ended in the United States,” and knew nothing of Bush’s intention to ignore the Foreign Intelligence Surveillance Court (also known as the FISA court). “I came out of the room with the full sense that we were dealing with a change in technology but not policy,” Graham will recall, using new methodologies to intercept overseas calls that passed through US switches. He thought that NSA eavesdropping would continue to be limited to “calls that initiated outside the United States, had a destination outside the United States but that transferred through a US-based communications system.” Instead, Graham will say, it now seems that Bush decided to go “beyond foreign communications to using this as a pretext for listening to US citizens’ communications. There was no discussion of anything like that in the meeting with Cheney.” A senior intelligence official, who refuses to reveal his identity but says he is speaking with the permission of the White House, will accuse Graham of “misremembering the briefings,” which he will call “very, very comprehensive.” The official will refuse to discuss the briefings in any but the most general terms, but will say they were intended “to make sure the Hill knows this program in its entirety, in order to never, ever be faced with the circumstance that someone says, ‘I was briefed on this but I had no idea that—’ and you can fill in the rest.” Graham will characterize the official’s description as saying: “[W]e held a briefing to say that nothing is different.… Why would we have a meeting in the vice president’s office to talk about a change and then tell the members of Congress there is no change?” House Minority Leader Nancy Pelosi (D-CA), who was also present at the meeting as the ranking Democrat on the House Intelligence Committee, will say the briefing described “President Bush’s decision to provide authority to the National Security Agency to conduct unspecified activities.” She will note that she “expressed my strong concerns” but did not go into detail. [Washington Post, 12/18/2005]
Lawmakers Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). In the briefing, Cheney informs the lawmakers of none of this.

Entity Tags: Richard (“Dick”) Cheney, Senate Intelligence Committee, Nancy Pelosi, John D. Rockefeller, House Intelligence Committee, Daniel Robert (“Bob”) Graham, George J. Tenet, George W. Bush, Michael Hayden, National Security Agency

Timeline Tags: Civil Liberties

A senior NSA official, having learned of the NSA’s post-9/11 domestic surveillance program and believing it to be illegal, takes his concerns to a staff member of the House Intelligence Committee. In a 2012 interview for Democracy Now!, William Binney, a former NSA technical director who served in the NSA for 36 years, will say that some of his staff had been recruited to work on the new program and told him of some of the things that were being done, which he believed were illegal. Binney will tell co-host Juan Gonzalez: “I immediately went to the Intelligence Committee, because… the intelligence committees were formed to have oversight over the intelligence community to make sure they didn’t monitor US citizens.… And the member of the staff that I went to went to Porter Goss, who was chairman of that committee at the time, and he referred her to General Hayden for any further. When it was the job of that committee to do the oversight on all this domestic spying, they weren’t doing it.” Soon after this, Binney retires from the NSA, due to his belief the NSA is violating the Constitution (see October 31, 2001). [Democracy Now!, 4/20/2012]

Entity Tags: Jane Mayer, House Intelligence Committee, William Binney, Michael Hayden, National Security Agency

Timeline Tags: Civil Liberties

Concerned that NSA post-9/11 surveillance operations violated the US Constitution, a senior NSA official reports on the program to House Intelligence Committee staff (see Before October 31, 2001), then retires. William Binney, a crypto-mathematician, had served in the NSA for 36 years. In 1997 he was made technical director of the World Geopolitical and Military Analysis Reporting Group, a 6000-employee unit that focused on signals intelligence (SIGINT) reporting and analysis. In the last part of his NSA career, Binney focused on dealing with the NSA’s problem of information overload, co-founding the Signals Intelligence Automation Research Center (SARC) and leading a 20-member team to develop a data-mining and analysis program called ThinThread. This program made it possible to “correlate data from financial transactions, travel records, Web searches, GPS equipment, and any other ‘attributes’ that an analyst might find useful,” and “could chart relationships among people in real time.” Unlike the NSA’s existing centralized data processing systems, ThinThread was able to identify useful or useless data as it was collected, reducing the overload problem. However, though it targeted foreign communications, ThinThread also intercepted those of Americans, and “continued documenting signals when a trail crossed into the US.” Binney incorporated measures to protect privacy, but NSA lawyers still considered the program too invasive, according to a 2011 article by Jane Mayer based on interviews with Binney and another NSA whistleblower, Thomas Drake. In 1999, NSA Director General Michael Hayden decided to fund a rival program, Trailblazer, which would be developed by defense contractors (see Late 1999). Trailblazer will be abandoned in 2006 as unworkable, after costing $1.2 billion (see January 2006). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012] In 2002, three NSA whistleblowers—Edward Loomis, J. Kirk Wiebe, and Binney—will ask the Pentagon to investigate the NSA for wasting “millions and millions of dollars” on Trailblazer. [Nation, 3/26/2013]
Post-9/11 NSA Surveillance Expansion - Binney will tell Mayer that, after the 9/11 attacks, his people began coming to him, saying things like: “They’re getting billing records on US citizens! They’re putting pen registers [call logs] on everyone in the country!” James Bamford will interview Binney in 2012 and write, “At the outset the program recorded 320 million calls a day, [Binney] says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” Binney has not been personally “read in” to this domestic surveillance program, but some members of his SARC team have, as their knowledge of ThinThread code was needed to set it up. Binney became convinced elements of ThinThread were being used, but without privacy protections, meaning US persons could be targeted. Soon after learning these things, Binney takes his concerns to the House Intelligence Committee (see Before October 31, 2001), and retires on October 31. He will tell Mayer, “I couldn’t be an accessory to subverting the Constitution.” Other sources support Binney’s account of this NSA data-mining and monitoring program (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, and October 2001). However, the claim that NSA domestic surveillance was initiated only after, and in response to, 9/11 is contradicted by information indicating that domestic monitoring programs and activities were established and conducted prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012]
ThinThread 'Would Likely Have Prevented 9/11' - Despite ThinThread’s capacity to collect actionable intelligence, Hayden vetoed the idea of deploying the system three weeks before 9/11, in August 2001. According to the Loomis, Wiebe, and Binney, this decision “left the NSA without a system to analyze the trillions of bits of foreign SIGINT flowing over the Internet at warp speed, as ThinThread could do.” During the summer of 2001, when “the system was blinking red,” according to CIA Director George Tenet, the NSA “failed to detect critical phone and e-mail communications that could have tipped US intelligence to al-Qaeda’s plans to attack.” [Nation, 3/26/2013]

Entity Tags: Edward Loomis, World Geopolitical and Military Analysis Reporting Group, J. Kirk Wiebe, William Binney, Thomas Drake, House Intelligence Committee, James Bamford, Trailblazer, Jane Mayer, National Security Agency, Signals Intelligence Automation Research Center, Michael Hayden, Thinthread

Timeline Tags: Civil Liberties

John Yoo, the Justice Department’s (DOJ) Office of Legal Counsel (OLC) deputy assistant attorney general, sends a classified memo to Attorney General John Ashcroft justifying warrantless surveillance of US persons. The National Security Agency (NSA)‘s domestic surveillance authorized by President Bush (see October 4, 2001, Early 2002, and December 15, 2005) will come to be publicly referred to as the President’s Surveillance Program (PSP). This is not the first Yoo memo supporting warrantless surveillance (see September 25, 2001), but a 2009 report on the PSP jointly issued by the inspectors general (IGs) of the Department of Defense (DOD), DOJ, CIA, National Security Agency (NSA), and Office of the Director of National Intelligence (ODNI) will refer to it as “[t]he first OLC opinion directly supporting the legality of the PSP.” The IGs’ report will quote from and comment on the memo, noting that “deficiencies in Yoo’s memorandum identified by his successors in the Office of Legal Counsel and the Office of the Deputy Attorney General later became critical to DOJ’s decision to reassess the legality of the program in 2003.” According to the IGs’ report, Yoo asserts that warrantless surveillance is constitutional as long as it is “reasonable” under the Fourth Amendment, which only protects against “unreasonable searches and siezures.” On this point, the IGs’ report will note that Yoo’s successors were troubled by his failure to discuss the Supreme Court’s decision in Youngstown Sheet & Tube Co. v. Sawyer (1952), which found the president’s wartime authority to be limited. His memo does acknowledge that the Foreign Intelligence Surveillance Act (FISA) “purports to be the exclusive statutory means for conducting electronic surveillance for foreign intelligence,” but asserts that it is only a “safe harbor for electronic surveillance” because it cannot “restrict the president’s ability to engage in warrantless searches that protect the national security.” Yoo also writes that Congress has not “made a clear statement in FISA that it sought to restrict presidential authority to conduct warrantless searches in the national security area.” The IGs’ report will state that Yoo’s successors considered this problematic because Yoo has omitted discussion of the fact that FISA explicitly authorizes the president to conduct warrantless surveillance during the first 15 days following a declaration of war by Congress, which they considered an expression of Congress’s intent to restrict warrantless surveillance to a limited period of time and specific circumstances. The IGs’ report will also state that Yoo’s memo discusses “the legal rationale for Other Intelligence Activities authorized as part of the PSP,” and that Yoo concludes, “[W]e do not believe that Congress may restrict the president’s inherent constitutional powers, which allow him to gather intelligence necessary to defend the nation from direct attack.” The IGs’ report will say that “Yoo’s discussion of some of the Other Intelligence Activities did not accurately describe the scope of these activities,” and that Yoo’s successors considered his discussion of these other activities to be “insufficient and presenting a serious impediment to recertification of the program as to form and legality.” [Inspectors General, 7/10/2009, pp. pp. 11-13]
Memo's Existence Revealed by ACLU Lawsuit - On December 15, 2005, the New York Times will report that Bush authorized an NSA warrantless domestic surveillance program after the 9/11 attacks (see December 15, 2005). The American Civil Liberties Union (ACLU) will request records pertaining to the program under the Freedom of Information Act (FOIA) and then sue the Justice Department for the release of records. The existence of Yoo’s November 2 memo will first be revealed in an October 19, 2007 deposition filed by then head of the OLC Steven Bradbury in response to the ACLU lawsuit, which says that it “[concerns] the legality of certain communications intelligence activities.” After the 2009 release of the IGs’ report the ACLU will notify the court and the government will agree to reprocess four OLC memos, including Yoo’s November 2 memo. This memo and a May 6, 2004 memo by Yoo’s OLC successor Jack Goldsmith that disputes many of Yoo’s conclusions will be released in heavily redacted form on March 18, 2011. [ACLU.org, 2/7/2006; United States District Court of DC, 10/19/2007; American Civil Liberties Union, 3/19/2011]
Constitutional Experts Dispute Yoo's Legal Rationale - Numerous authorities on the law will question or reject the legal bases for warrantless domestic surveillance. In 2003, Yoo will leave the OLC. Goldsmith will begin a review of the PSP, after which he will conclude it is probably illegal in some respects and protest, within the executive branch, its continuation (see Late 2003-Early 2004 and December 2003-June 2004). Following the public disclosure of its existence, a January 5, 2006 report by the Congressional Research Service will find it to be of dubious legality (see January 5, 2006). On January 19, 2006, the DOJ will issue a 42-page white paper laying out the legal bases for the program (see January 19, 2006). These bases will be reviewed and rejected by 14 constitutional scholars and former government officials in a joint letter to Congress on February 2, 2006. [al [PDF], 2/2/2006 pdf file] The American Bar Association will adopt a resolution on February 13, 2006 that rejects DOJ’s arguments and calls on Congress to investigate the program. [Delegates, 2/13/2006 pdf file] On August 17, 2006, in the case ACLU v. NSA, US district judge Anna Diggs Taylor will reject the government’s invocation of the “state secrets privilege” and its argument that plaintiffs’ lack standing due to their being unable to prove they were surveilled, and will rule that warrantless surveillance is in violation of “the separation of powers doctrine, the Administrative Procedures Act, the First and Fourth Amendments to the United States Constitution, the FISA, and Title III” (see August 17, 2006). Taylor’s ruling will be overturned on appeal, on the grounds that the plaintiffs lack standing as they cannot prove that surveillance has occurred. In another case, Al Haramain v. Barack Obama, the government will make the same arguments, but US district judge Vaughn Walker will reject these and conclude in 2010 that illegal surveillance occurred (see March 31, 2010). [Al-Haramain v. Obama, 3/31/2010]

Entity Tags: Steven Bradbury, Vaughn Walker, Ronald Dworkin, George W. Bush, John C. Yoo, American Bar Association, Office of Legal Counsel (DOJ), American Civil Liberties Union, John Ashcroft, Anna Diggs Taylor, US Department of Justice

Timeline Tags: Civil Liberties

The National Security Agency begins sending data—consisting of telephone numbers, e-mail addresses, and names—to the FBI that was obtained through surveillance of international communications originating within the US (see After September 11, 2001 and October 2001). The NSA sends so much data, in fact, that hundreds of agents are needed to investigate the thousands of tips per month that the data is generating. However, virtually all of this information leads to dead ends and/or innocent people. FBI officials repeatedly complain that the unfiltered information is bogging down the bureau: according to over a dozen current and former law enforcement and counterterrorism officials, the flood of tips provide them and their colleagues with very few real leads against terrorism suspect. Instead, the NSA data diverts agents from more productive work. Some FBI officials view the NSA data as pointless and likely illegal intrusions on citizens’ privacy. Initially, FBI director Robert Mueller asks senior administration officials “whether the program had a proper legal foundation,” but eventually defers to Justice Department legal opinions. One former FBI agent will later recall, “We’d chase a number, find it’s a schoolteacher with no indication they’ve ever been involved in international terrorism—case closed. After you get a thousand numbers and not one is turning up anything, you get some frustration.” A former senior prosecutor will add, “It affected the FBI in the sense that they had to devote so many resources to tracking every single one of these leads, and, in my experience, they were all dry leads. A trained investigator never would have devoted the resources to take those leads to the next level, but after 9/11, you had to.” Former NSA director Bobby Ray Inman says that the problem between the FBI and the NSA may stem in part from their very different approaches. Signals intelligence, the technical term for the NSA’s communications intercepts, rarely produces “the complete information you’re going to get from a document or a witness” in a traditional FBI investigation, he says. And many FBI officials are uncomfortable with the NSA’s domestic operations, since by law the NSA is precluded from operating inside US borders except under very specific circumstances. [New York Times, 1/17/2006]

Entity Tags: Federal Bureau of Investigation, National Security Agency, Bobby Ray Inman, Robert S. Mueller III

Timeline Tags: Complete 911 Timeline, Civil Liberties

Sometime in early 2002, President Bush signs a secret executive order authorizing the National Security Agency (NSA) to wiretap phone conversations and read e-mails to and from US citizens. The order extends an operation set into motion at least as early as October 2001 to begin wiretapping US citizens’ phones in a response to the 9/11 attacks. When the program is revealed by the US media in late 2005 (see December 15, 2005), Bush and his officials will say the program is completely legal, though it ignores the requirements of the Foreign Intelligence Surveillance Act (FISA) that requires the government to obtain court-issued warrants to mount surveillance against US citizens. They will insist that only those suspected of having ties to al-Qaeda are monitored, and only when those individuals make or receive international communications. [New York Times, 12/15/2005; Washington Post, 12/22/2005; Newsweek, 12/22/2008] Bush’s order authorizes the NSA to monitor international telephone conversations and international e-mails of hundreds, and perhaps thousands, of US citizens without court warrants, in an effort to track what officials call “dirty numbers” linked to al-Qaeda. When the program is finally revealed by the New York Times over three years later (see December 15, 2005), officials will say that the NSA still seeks warrants to monitor domestic communications. But there is little evidence of this (see, for example, Spring 2001). The presidential order is a radical shift in US surveillance and intelligence-gathering policies, and a major realignment for the NSA, which is mandated to only conduct surveillance abroad. Some officials believe that the NSA’s domestic eavesdropping crosses constitutional limits on legal searches. “This is really a sea change,” a former senior official who specializes in national security law will say in December 2005. “It’s almost a mainstay of this country that the NSA only does foreign searches.” [New York Times, 12/15/2005] Some sources indicate that NSA domestic surveillance activities, such as data-mining, the use of information concerning US persons intercepted in foreign call monitoring, and possibly direct surveillance of US persons, took place prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: George W. Bush, Al-Qaeda, Foreign Intelligence Surveillance Court, National Security Agency

Timeline Tags: Civil Liberties


This partial image from a Total Information Awareness slide presentation shows types of data that will be collected. Note that
even “gait” - the way one walks, will be analyzed.
This partial image from a Total Information Awareness slide presentation shows types of data that will be collected. Note that even “gait” - the way one walks, will be analyzed. [Source: DARPA]The US military internally announces the creation of a new global data collection system called Total Information Awareness. The existence of this program is not reported until August 2002 [Wired News, 8/7/2002] , and not widely known until November 2002 (see November 9, 2002). Interestingly, the early accounts of this program suggest its budget is a “significant amount” of $96 million [Federal Computer Week, 10/17/2002] , and not the $10 million later reported. [Guardian, 11/23/2002] It is also reported that “parts” of the program “are already operational” whereas later it is said to be only in the conceptual stages of development. [Federal Computer Week, 10/17/2002]

Entity Tags: Total Information Awareness, US Department of Defense

Timeline Tags: Civil Liberties

Page 1 of 3 (221 events)
previous | 1, 2, 3 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike