!! History Commons Alert, Exciting News

Context of 'Between 10:00-11:00 am August 29, 2005: White House Reports on President’s FEMA Briefing, Other Activities Today'

This is a scalable context timeline. It contains events related to the event Between 10:00-11:00 am August 29, 2005: White House Reports on President’s FEMA Briefing, Other Activities Today. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 9 (820 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9 | next

The German Reich Ministry of Justice issues a secret memo following a meeting of several Justice Ministry lawyers and public prosecutors with senior Gestapo officers. The participants discuss the fact that Germany has been on a war footing for years, and the leaders’ worry that the citizenry is riddled with sleeper cells of subversives. The solution: detaining and torturing subversives. It is unclear whether torture will be used to terrorize other subversives, to extract information, or produce confessions. German law enforcement officials are balky at applying “more rigorous interrogation” techniques. Though some judges seem unmoved by defendants appearing in court with obvious marks of torture upon their bodies, the law enforcement officers are bureaucrats in a system that has always respected the rule of law and the Hitler government was originally elected on a law-and-order platform. The memo is the product of the top officials in the Gestapo and Justice Ministry, and lays out detailed instructions as to when torture techniques can be applied, the specific equipment used in such interrogations, and how many times particular techniques could be used on certain categories of detainees. Perhaps most importantly, the memo promises immunity from prosecution to any German interrogator who follows the rules as laid down in the memo.
Specific Instructions - It reads in part: “At present, we thus have a situation which cannot continue: a deficient sense of what is right on the part of judicial officers; an undignified position for police officers, who try to help matters by foolish denials [that torture has taken place in court proceedings].… [I]nterrogations of this kind [torture] may be undertaken in cases where charges involve the immediate interests of the state.… chiefly treason and high treason. Representatives of the Gestapo expressed the opinion that a more rigorous interrogation could also be considered in cases of Jehovah’s Witnesses, explosives, and sabotage.… As a general principle, in more rigorous interrogations only blows with a club on the buttocks are permissible, up to 25 such blows. The number is to be determined in advance by the Gestapo.… Beginning with the tenth blow, a physician must be present. A standard club will be designated, to eliminate all irregularities.” Gestapo Headquarters in Berlin must give permission for more “rigorous interrogation[s],” the memo continues.
Drawing Parallels to Bush Administration Torture - The memo will be the subject of a 2009 article by Shayana Kadidal, the senior managing attorney of the Guantanamo project at the Center for Constitutional Rights. Kadidal will draw parallels between the Nazi torture authorization and similar legal justifications issued by the American government after the 9/11 attacks (see March 2, 2009 and April 21, 2009). Kadidal will write: “I realize that, as a matter of principle, there is a strong bias against making Nazi analogies to any events happening in our modern world.… But here we have: (1) a system set up to allow torture on certain specific individual detainees, (2) specifying standardized equipment for the torture (apparently down to the exact length of the club to be used), along with physician participation to ensure survival of the victim for the more several applications, (3) requiring prior approval of the use of torture from the central authorities in the justice department and intelligence agency in the capital, so as to ensure that (6) the local field officers actually carrying out the abuse are immune from prosecution.” [Huffington Post, 4/21/2009]

Entity Tags: Gestapo, Shayana Kadidal, German Reich Ministry of Justice

Timeline Tags: Torture of US Captives

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

A B-29 bomber similar to the one that crashed in Georgia.A B-29 bomber similar to the one that crashed in Georgia. [Source: Global Security (.org)]A test flight for the Air Force’s Project Banshee, located at Robins Air Force Base in Georgia, is set for 8:30 a.m. Banshee is an attempt begun in 1946 to develop and deploy a long-range missile ahead of both the Soviet Union and rival US military branches. The airplane used in the test flight crashes less than an hour into its flight, killing 9 of the 13 aboard.
Maintenance Problems - The plane assigned for the flight is a B-29 Stratofortress, a bomber made famous by its delivery of the atomic bombs to Hiroshima and Nagasaki at the end of World War II. B-29s are notoriously difficult to fly and maintain: their four wing-mounted engines almost routinely overheat and catch fire, causing engine shutdowns, sudden drops in altitude, and, often, crashes. The engines’ eighteen cylinders lack sufficient airflow to keep them cool, and the overheating often causes the crankcases, made of light but highly flammable magnesium, to burst into flames. Like so many of its brethren, the plane has suffered its share of maintenance issues, and is flying without numerous recommended maintenance and repair tasks being performed. Just five days before, it had been designated “red cross”—grounded and unfit for service. It was allowed to fly through an “exceptional release” signed by the squadron commander.
Crew Difficulties - The flight is moved back to the afternoon after some crew members fail to show up on time, and to allow last-minute repairs to be made. By takeoff, the flight crew is assembled: Captain Ralph Erwin; co-pilot Herbert W. Moore; flight engineer Earl Murrhee; First Lieutenant Lawrence Pence, Jr, the navigator; Sergeant Walter Peny, the left scanner; Sergeant Jack York, the right scanner; Sergeant Melvin Walker, the radio operator; and Sergeant Derwood Irvin, manning the bombsight and autopilot. The crew is joined by civilian engineers assigned to Banshee: Al Palya and Robert Reynolds from RCA, William Brauner and Eugene Mechler from the Franklin Institute, and Richard Cox from the Air Force’s Air Materiel Command. In violation of standard procedure, none of the crew or the civilians are briefed on emergency procedures, though Murrhee will later say that the crew were all familiar with the procedures; he is not so sure about the civilians, though he knows Palya and Reynolds have flown numerous test flights before. In another violation of Air Force regulations, none of the flight crew have worked together before. As author Barry Siegel will note in 2008, “The pilot, copilot, and engineer had never shared the same cockpit before.”
Engine Fire and Crash - Less than an hour into the flight, one engine catches fire and two others lose power, due to a combination of maintenance failures and pilot errors. The civilians have some difficulty getting into their parachutes as Erwin and Moore attempt to regain control of the aircraft. Four of the crew and civilians manage to parachute from the plane, but most remain on board as the airplane spirals into the ground on the edge of the Okefenokee Swamp, near Waycross, Georgia. Crew members Moore, Murrhee, and Peny survive, as does a single civilian, Mechler. Four others either jump at too low an altitude or die when their chutes foul the airplane; the other five never manage to leave the plane and die on impact.
Widows File Suit - Several of the civilians’ widows will file suit against the US Air Force, asserting that their husbands died because of Air Force negligence (see June 21, 1949). Their lawsuit will eventually become US v. Reynolds, a landmark Supreme Court case and the underpinning for the government’s claims of state secrets privilege (see March 9, 1953). [Siegel, 2008, pp. 3, 14-17, 33-49]

Entity Tags: Derwood Irvin, Barry Siegel, US Department of the Air Force, Walter Peny, William Brauner, Air Materiel Command, Richard Cox, Ralph Erwin, Robert Reynolds, Al Palya, Radio Corporation of America, Eugene Mechler, Earl Murrhee, Franklin Institute, Project Banshee, Melvin Walker, Lawrence Pence, Jr, Herbert W. Moore, Jr, Jack York

Timeline Tags: Civil Liberties

A three-judge federal appeals court unanimously rejects the government’s claim of unfettered executive privilege and secrecy in regards to classified documents (see October 19, 1951). In an opinion written by Judge Albert Maris, the court finds that the government’s claim that the judiciary can never compel the executive branch to turn over classified documents to be without legal merit. The plaintiffs in the case, three widows who lost their husbands in the crash of a B-29 bomber carrying classified materials (see June 21, 1949), had a compelling need for the documents in question, the downed B-29 accident reports, to further their case, Maris writes (see October 12, 1950).
No Legal Basis for Claim of Privilege - Maris goes further than the parameters of the single lawsuit, writing: “[W]e regard the recognition of such a sweeping privilege… as contrary to a sound public policy. The present cases themselves indicate the breadth of the claim of immunity from disclosure which one government department head has already made. It is but a small step to assert a privilege against any disclosure of records merely because they might prove embarrassing to government officials. Indeed, it requires no great flight of imagination to realize that if the government’s contentions in these cases were affirmed, the privilege against disclosure might gradually be enlarged… until as is the case in some nations today, it embraced the whole range of government activities.… We need to recall in this connection the words of [Revolution-era jurist] Edward Livingston: ‘No nation ever yet found any inconvenience from too close an inspection into the conduct of its officers, but many have been brought to ruin, and reduced to slavery, by suffering gradual imposition and abuses, which were imperceptible, only because the means of publicity had not been secured.’” He also quotes Revolutionary War figure Patrick Henry, who said, “[T]o cover with the veil of secrecy the common routine of business is an abomination in the eyes of every intelligent man and every friend to his country.”
Rejecting Claim of 'State Secrets' - Maris is even less respectful of the government’s claim of a “state secrets” privilege. He notes that the government did not make that claim until well into the lawsuit proceedings (see October 19, 1951), indicating that it was a “fallback” argument used after the original government arguments had failed. Maris is also troubled, as author Barry Siegel later writes, in the government’s “assertion of unilateral executive power, free from judicial review, to decide what qualified as secret.” The lower court judge’s ruling that he alone should be given the documents for review adequately protected the government’s security interests, Maris writes: “[But] the government contends that it is within the sole province of the secretary of the Air Force to determine whether any privileged material is contained in the documents and that his determination of this question must be accepted by the district court without any independent consideration.… We cannot accede to this proposition. On the contrary, we are satisfied that a claim of privilege against disclosing evidence… involves a justiciable question, traditionally within the competence of the courts.… To hold that the head of an executive department of the government in a [law]suit to which the United States is a party may conclusively determine the government’s claim of privilege is to abdicate the judicial function to infringe the independent province of the judiciary as laid down by the Constitution.”
Fundamental Principle of Checks and Balances - Maris continues: “The government of the United States is one of checks and balances. One of the principal checks is furnished by the independent judiciary which the Constitution established. Neither the executive nor the legislative branch of the government may constitutionally encroach upon the field which the Constitution has reserved for the judiciary.… Nor is there any danger to the public interest in submitting the question of privilege to the decision of the courts. The judges of the United States are public officers whose responsibilities under the Constitution is just as great as that of the heads of the executive departments.”
Government Appeal - The Justice Department will appeal the ruling to the US Supreme Court (see March 1952 and March 9, 1953). [Siegel, 2008, pp. 153-156]

Entity Tags: Albert Maris, US Department of Justice, Barry Siegel, US Supreme Court

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Lawyers make their opening arguments before the Supreme Court in the case of US v Reynolds, the lawsuit that finds the government had no overarching right to unilaterally refuse to deliver classified documents in the course of a wrongful death lawsuit against the government (see December 11, 1951). The government has appealed the appellate court ruling to the Supreme Court (see March 1952). Because four of the nine justices had voted not to hear the case—in essence to let the appellate court ruling stand—the defense is cautiously optimistic about the Court’s decision.
Judiciary Has No Right to Interfere with Powers of the Executive, Government Argues - Acting Solicitor General Robert Stern tells the Court that the appellate judges’ decision, written by Judge Albert Maris, “is an unwarranted interference with the powers of the executive,” and that the decision forced the government to choose “whether to disclose public documents contrary to the public interest [or] to suffer the public treasury to be penalized” (a reference to the decision to award the plaintiffs monetary damages—see October 12, 1950). The judiciary “lack[s] power to compel disclosure by means of a direct demand [as well as] by the indirect method of an order against the United States, resulting in judgment when compliance is not forthcoming.”
Executive Has No Right to Unilaterally Withhold Information, Defense Counters - Stern’s arguments are countered by those of the plaintiffs’ lawyer, Charles Biddle, who writes, “We could rest our case with confidence on the clear opinion of Judge Maris,” but continues by arguing that if the government asserts a claim of executive privilege on the basis of national security, it must make the documents available to the Court for adjudication, or at least provide enough information for the Court to judge whether the documents present in fact a threat to national security if disclosed. This is particularly true, Biddle argues, “where there is no showing that the documents in question contain any military secret” (Biddle is unaware that the documents’ classification status had been reduced two years before—see September 14, 1950). “The basic question here is whether those in charge of the various departments of the government may refuse to produce documents properly demanded… in a case where the government is a party (see June 21, 1949), simply because the officials themselves think it would be better to keep them secret, and this without the Courts having any power to question the propriety of such decision.… In other words, say the officials, we will tell you only what we think it is in the public interest that you should know. And furthermore, we may withhold information not only about military or diplomatic secrets, but we may also suppress documents which concern merely the operation of the particular department if we believe it would be best, for purposes of efficiency or morale, that no one outside of the department, not even the Court, should see them.”
No Basis for Claims of Military Secrets - Biddle argues that because of responses he has received to his demands over the course of this lawsuit, he is relatively sure there are no military secrets contained within them. “[T]he proof is to the contrary,” he says, and goes on to say that had the Air Force disclosed from the outset that the plane crash, the fatal accident that sparked the original lawsuit (see October 6, 1948), was probably caused by pilot error and not by random chance, the plaintiffs may have never needed to ask for the disclosure of the documents in question, the accident reports on the crash (see October 18, 1948). “The secretary [of the Air Force]‘s formal claim of privilege said that the plane at the time was engaged in a secret mission and that it carried confidential equipment,” Biddle says, “but nowhere was it asserted that either had anything to do with the accident. The whole purpose of the demand by the respondents was for the purpose of finding out what caused the accident.… They were not in the least interested in the secret mission or equipment.” [Siegel, 2008, pp. 165-170]

Entity Tags: US Supreme Court, Albert Maris, Robert Stern, US Department of the Air Force, Charles Biddle

Timeline Tags: Civil Liberties

In their regular Saturday conference, the nine Supreme Court justices discuss the issues and arguments surrounding US v Reynolds (see October 21, 1952). According to the notes from the discussion, Chief Justice Fred Vinson, a strong advocate for expansive executive powers (see March 1952), says the case “boils down to Executive Branch determine privilege.” Other notes by Justice William O. Douglas suggest that Vinson isn’t convinced that the US must “be forced to pay for exercising its privilege” (see October 12, 1950). A straw vote taken at the end of the discussion shows five justices in favor of the government’s position to unilaterally withhold classified documents—overturning the appellate court decision (see December 11, 1951), and four in favor of allowing the decision to stand. [Siegel, 2008, pp. 171]

Entity Tags: Fred Vinson, US Supreme Court, William O. Douglas

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]

Entity Tags: Malcolm Little, Central Intelligence Agency, Church Committee, Lew Allen, National Security Agency, Martin Luther King, Jr., Office of Security Services, Joan Baez

Timeline Tags: Civil Liberties

The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). [Federation of American Scientists, 7/17/1997]

Entity Tags: National Security Agency, Echelon, Rhyolite, Chalet, Government Communications Headquarters, Owen Lewis, Canyon

Timeline Tags: Civil Liberties

After the New York Times verifies the phone calls to Nixon campaign provocateur Donald Segretti from Watergate burglar E. Howard Hunt (see October 12-15, 1972), it publishes an analysis of the White House’s attacks on the media (see October 16-November, 1972). The analysis, written by Robert Semple, Jr, says in part: “The essence of the administration’s recent counterattack to the charges that some of President Nixon’s created or at least condoned a network of political espionage and disruption has been to denounce the newspapers that print them without explicitly discussing them. Behind the strategy lie two assumptions that tell much about the administration’s perceptions of the voters and newspapers that serve them. Judging by recent interviews with Mr. Nixon’s aides, these assumptions seem to be widely shared in his inner circle. First, at the moment, the White House feels, the alleged conspiracy is perceived by most of the public as a distant and even amateurish intrigue far removed from the Oval Office, and thus a denial or even discussion of the charges by the White House would give those charges undeserved visibility and currency. The second is that the public—softened up by three years of speeches from Vice President Agnew—has less than total confidence that what it reads and hears—particularly in the so-called Eastern Establishment media—is true and undistorted by political prejudice. Hence the recent administration attacks on the Washington Post, which has been giving the corruption allegations front-page treatment…. Repeated requests to senior White House aides to get the full story, as they see it, have gone unanswered.… ‘Do you know why we’re not uptight about the press and the espionage business?’ one White House aide… asked rhetorically the other day. ‘Because we believe that the public believes that the Eastern press really is what Agnew said it was—elitist, anti-Nixon and ultimately pro-McGovern.” [Bernstein and Woodward, 1974, pp. 169]

Entity Tags: New York Times, Donald Segretti, E. Howard Hunt, Spiro T. Agnew, Nixon administration, Richard M. Nixon, Robert Semple, Jr

Timeline Tags: Nixon and Watergate

Senate Watergate counsel Samuel Dash tells reporters that, following the extraordinary letter from convicted Watergate burglar James McCord that alleged perjury and enforced silence in the trial of the burglars (see March 19-23, 1973), he has twice interviewed McCord. McCord has “named names” and begun “supplying a full and honest account” of the Watergate operation. He refuses to give details, but promises that McCord will soon testify in public Senate hearings. Shortly after the press conference, the Los Angeles Times reports that McCord named White House counsel John Dean and Nixon campaign deputy director Jeb Magruder as two of the Nixon officials involved in planning the Watergate surveillance operation. Dean has not been named as being involved in the Watergate planning until now. The White House denies Dean’s involvement; significantly, its statement does not mention Magruder—the Nixon administration has cut him loose. Three Capitol Hill sources confirm the story; one Republican politician anonymously tells the Post that McCord’s allegations are “convincing, disturbing, and supported by some documentation.” Dean’s lawyer learns of a planned follow-up story by the Washington Post and threatens to sue the Post if it prints the allegations; Post editor Howard Simons orders that the story be published, including the threat from Dean’s lawyer. [Bernstein and Woodward, 1974, pp. 276-277]

Entity Tags: Washington Post, Howard Simons, James McCord, Jeb S. Magruder, Nixon administration, Samuel Dash, John Dean

Timeline Tags: Nixon and Watergate

Comedian Bill Cosby, one of many on Nixon’s enemies list.Comedian Bill Cosby, one of many on Nixon’s enemies list. [Source: Quixoticals]Former White House counsel John Dean, continuing his testimony before the Senate Watergate Committee (see June 25-29, 1973), provides a sheaf of documents to the committee. Among those is the “Opponents List and Political Enemies Project,” informally called President Nixon’s “enemies list.” The list is actually a set of documents “several inches thick” of names and information about Nixon’s political enemies. It was compiled by a number of administration officials, including Dean, White House aides Charles Colson, Gordon Strachan, and Lyn Nofziger, beginning in 1971. One of the documents from August 16, 1971, has Dean suggesting ways in which “we can use the available federal machinery to screw our political enemies.” Methods proposed included administration manipulation of “grant availability, federal contracts, litigation, prosecution, etc.” The Dean memo was given to then-chief of staff H. R. Haldeman and top White House aide John Ehrlichman for approval. Though Dean testifies that he does not know if the plan was set into motion, subsequent documents submitted to the committee indicate that it was indeed implemented. A condensed list of 20 “White House enemies” was produced by Colson’s office; a larger list included ten Democratic senators, all 12 black House members, over 50 news and television reporters, prominent businessmen, labor leaders, and entertainers, and contributors to the 1972 presidential campaign of Democratic senator Edmund Muskie. The condensed list includes, in priority order:
bullet “1. Arnold M. Picker, United Artists Corp., NY. Top Muskie fund raiser. Success here could be both debilitating and very embarrassing to the Muskie machine. If effort looks promising, both Ruth and David Picker should be programmed and then a follow through with United Artists.”
bullet “2. Alexander E. Barkan, national director of AFL-CIO’s committee on Political Education, Washington D.C.: Without a doubt the most powerful political force programmed against us in 1968 ($10 million, 4.6 million votes, 115 million pamphlets, 176,000 workers—all programmed by Barkan’s COPE—so says Teddy White in The Making of the President 1968). We can expect the same effort this time.”
bullet “3. Ed Guthman, managing editor, Los Angeles Times: Guthman, former Kennedy aide, was a highly sophisticated hatchetman against us in ‘68. It is obvious he is the prime mover behind the current Key Biscayne effort. It is time to give him the message.”
bullet “4. Maxwell Dane, Doyle, Dane and Bernbach, NY: The top Democratic advertising firm—they destroyed Goldwater in ‘64. They should be hit hard starting with Dane.”
bullet “5. Charles Dyson, Dyson-Kissner Corp., NY: Dyson and [Democratic National Committee chairman] Larry O’Brien were close business associates after ‘68. Dyson has huge business holdings and is presently deeply involved in the Businessmen’s Educational Fund which bankrolls a national radio network of five-minute programs—anti-Nixon in character.”
bullet “6. Howard Stein, Dreyfus Corp., NY: Heaviest contributor to [Democratic presidential candidate Eugene] McCarthy in ‘68. If McCarthy goes, will do the same in ‘72. If not, Lindsay or McGovern will receive the funds.”
bullet “7. [US Representative] Allard Lowenstein, Long Island, NY: Guiding force behind the 18-year-old ‘Dump Nixon’ vote campaign.”
bullet “8. Morton Halperin, leading executive at Common Cause: A scandal would be most helpful here.”
bullet “9. Leonard Woodcock, UAW, Detroit, Mich.: No comments necessary.”
bullet “10. S. Sterling Munro Jr., Sen. [Henry Jackson’s aide, Silver Spring, Md: We should give him a try. Positive results would stick a pin in Jackson’s white hat.”
bullet “11. Bernard T. Feld, president, Council for a Livable World: Heavy far left funding. They will program an ‘all court press’ against us in ‘72.”
bullet “12. Sidney Davidoff, New York City, [New York City Mayor John V.] Lindsay’s top personal aide: a first class SOB, wheeler-dealer and suspected bagman. Positive results would really shake the Lindsay camp and Lindsay’s plans to capture youth vote. Davidoff in charge.”
bullet “13. John Conyers, congressman, Detroit: Coming on fast. Emerging as a leading black anti-Nixon spokesman. Has known weakness for white females.”
bullet “14. Samuel M. Lambert, president, National Education Association: Has taken us on vis-a-vis federal aid to parochial schools—a ‘72 issue.” [Facts on File, 6/2003] Committee chairman Sam Ervin (D-NC) is clearly outraged by the list, and particularly by Lambert’s inclusion. He says, “Here is a man listed among the opponents whose only offense is that he believed in the First Amendment and shared Thomas Jefferson’s conviction, as expressed in the Virginia Statute for Religious Freedom, that to compel a man to make contributions of money for the dissemination of religious opinions he disbelieves is sinful and tyrannical. Isn’t that true?” Dean replies, “I cannot disagree with the chairman at all.” [Time, 7/9/1973]
bullet “15. Stewart Rawlings Mott, Mott Associates, NY: Nothing but big money for radic-lib candidates.”
bullet “16. Ronald Dellums, congressman, Calif: Had extensive [Edward M. Kennedy] EMK-Tunney support in his election bid. Success might help in California next year.”
bullet “17. Daniel Schorr, Columbia Broadcasting System, Washington: A real media enemy.”
bullet “18. S. Harrison Dogole, Philadelphia, Pa: President of Globe Security Systems—fourth largest private detective agency in US. Heavy Humphrey [former presidential candidate Hubert Humphrey] contributor. Could program his agency against us.”
bullet “19. [Actor] Paul Newman, Calif: Radic-lib causes. Heavy McCarthy involvement ‘68. Used effectively in nation wide TV commercials. ‘72 involvement certain.”
bullet “20. Mary McGrory, Washington columnist: Daily hate Nixon articles.”
Another “master list” of political enemies prepared by Colson’s office includes Democratic senators Birch Bayh, J. W. Fulbright, Fred R. Harris, Harold Hughes, Edward M. Kennedy, George McGovern, Walter Mondale, Edmund Muskie, Gaylord Nelson, and William Proxmire; House representatives Bella Abzug, William R. Anderson, John Brademas, Father Robert F. Drinan, Robert Kastenmeier, Wright Patman; African-American representatives Shirley Chisholm, William Clay, George Collins, John Conyers, Ronald Dellums, Charles Diggs, Augustus Hawkins, Ralph Metcalfe, Robert N.C. Nix, Parren Mitchell, Charles Rangel, Louis Stokes; and several other politicians, including Lindsay, McCarthy, and George Wallace, the governor of Alabama (see May 15, 1972). The list also includes an array of liberal, civil rights and antiwar organizations, including the Black Panthers, the Brookings Institution, Common Cause, the Farmers Union, the National Economic Council, the National Education Association, the National Welfare Rights Organization, the Southern Christian Leadership Convention; a variety of labor organizations; many reporters, columnists, and other news figures; a short list of celebrities including Bill Cosby, Jane Fonda, Dick Gregory, Steve McQueen, Joe Namath, Gregory Peck, Tony Randall, and Barbra Streisand; and a huge list of businessmen and academics. The documents provide suggestions for avenues of attack against individual listees, including using “income tax discrepancies,” allegations of Communist connections, and other information. [Facts on File, 6/2003] In 1999, Schorr will joke that being on Nixon’s enemies list “changed my life a great deal. It increased my lecture fee, got me invited to lots of very nice dinners. It was so wonderful that one of my colleagues that I will not mention, but a very important man at CBS, said, ‘Why you, Schorr? Why couldn’t it have been me on the enemies list?’” [CNN, 3/27/1999] Schorr does not mention that he was the subject of an FBI investigation because of his listing. [Spartacus Schoolnet, 8/2007]

Entity Tags: Paul Newman, National Welfare Rights Organization, Ralph Metcalfe, Parren Mitchell, Robert F Drinan, National Economic Council, Richard M. Nixon, Morton H. Halperin, Louis Stokes, Mary McGrory, John V. Lindsay, Lawrence O’Brien, Maxwell Dane, Leonard Woodcock, Robert Kastenmeier, Lyn Nofziger, Los Angeles Times, Robert N.C. Nix, Sam Ervin, S. Harrison Dogole, United Auto Workers, Walter Mondale, Tony Randall, William Clay, William R. Anderson, Wright Patman, William Proxmire, Ron Dellums, Stewart Rawlings Mott, Southern Christian Leadership Convention, S. Sterling Munro Jr, John Ehrlichman, Steve McQueen, Samuel M Lambert, Shirley Chisholm, Sidney Davidoff, Senate Watergate Investigative Committee, John Dean, National Education Association, John Brademas, CBS News, Charles Colson, Charles Diggs, Charles Dyson, Charles Rangel, Brookings Institution, Council for a Livable World, Common Cause, Black Panthers, Birch Bayh, Bill Cosby, Allard Lowenstein, Alexander E. Barkan, AFL-CIO, Daniel Schorr, Arnold M. Picker, John Conyers, Augustus Hawkins, Bernard T. Feld, Bella Abzug, Dick Gregory, Barbra Streisand, Edmund Muskie, H.R. Haldeman, Harold Hughes, Gregory Peck, Henry (“Scoop”) Jackson, Jane Fonda, J. William Fulbright, Howard Stein, Gordon Strachan, George S. McGovern, Joe Namath, Edward M. (“Ted”) Kennedy, Eugene McCarthy, Fred R Harris, Gaylord Nelson, George C. Wallace, Hubert H. Humphrey, George Collins, Ed Guthman

Timeline Tags: Nixon and Watergate

Former Nixon White House aide Charles Colson, later described by reporter David Plotz as “Richard Nixon’s hard man, the ‘evil genius’ of an evil administration,” is sentenced to jail after pleading guilty (see March 7, 1974) to taking part in the plan to break into Daniel Ellsberg’s psychiatrist’s office (see September 9, 1971) and interfering with Ellsberg’s trial (see June 28, 1971). Colson also, according to Watergate historian Stanley Kutler, tried to hire Teamster thugs to beat up antiwar demonstrators, and plotted to either raid or firebomb the Brookings Institution (see June 8-9, 1973). Colson will serve seven months in jail (see September 3, 1974). [Slate, 3/10/2000] Colson tells the court: “I shall be cooperating with the prosecutor, but that is not to say that the prosecutor has bargained for my testimony, that there is any quid pro quo: there was not. I reached my own conclusion that I have a duty to tell everything I know about these important issues, and a major reason for my plea was to free me to do so.” Colson’s testimony against Richard Nixon is damning, as he tells the court Nixon had “on numerous occasions urged me to disseminate damaging information about Daniel Ellsberg.” Vice President Ford defends Nixon, saying, “There’s a big difference between telling Chuck Colson to smear Ellsberg and ordering—or allegedly ordering—a break-in.” Colson will later become a born-again Christian evangelist, and found an influential prison ministry. [Slate, 3/10/2000; Werth, 2006, pp. 273-274]

Entity Tags: Brookings Institution, David Plotz, Stanley Kutler, Richard M. Nixon, Daniel Ellsberg, Gerald Rudolph Ford, Jr, Charles Colson, Nixon administration

Timeline Tags: Nixon and Watergate

Cover for ‘All the President’s Men.’Cover for ‘All the President’s Men.’ [Source: Amazon (.com)]Washington Post reporters Carl Bernstein and Bob Woodward publish the book All the President’s Men, documenting their 26-month coverage of the Watergate scandal. The Post will win a Pulitzer Prize for its Watergate reporting and the book will be made into an Oscar-winning film of the same name. Between the book and the film, All the President’s Men will become the touchstone for defining the complex, multilayered Watergate conspiracy. [Washington Post, 1996]

Entity Tags: Washington Post, Carl Bernstein, Bob Woodward

Timeline Tags: Nixon and Watergate

The House Judiciary Committee adopts the first Article of Impeachment by a vote of 27-11. All the Democrats, and six Republicans, vote for impeachment. The Article charges President Richard Nixon with obstructing the investigation of the Watergate break-in (see 2:30 a.m.June 17, 1972). [Brian J. Henchey, 6/7/2007; Gerald R. Ford Library and Museum, 7/3/2007]

Entity Tags: Richard M. Nixon, House Judiciary Committee

Timeline Tags: Nixon and Watergate

The House Judiciary Committee adopts the second Article of Impeachment (see July 27, 1974) against President Nixon. This one charges Nixon with misuse of power and violation of his oath of office. [Gerald R. Ford Library and Museum, 7/3/2007] Twenty-one Democrats and six Republicans vote for the second Article. [Brian J. Henchey, 6/7/2007]

Entity Tags: House Judiciary Committee, Richard M. Nixon

Timeline Tags: Nixon and Watergate

The House Judiciary Committee adopts the third Article of Impeachment (see July 27, 1974 and July 29, 1974). The third Article charges President Nixon with failure to comply with House subpoenas. [Gerald R. Ford Library and Museum, 7/3/2007] Twenty Democrats and two Republicans vote for the second Article. [Brian J. Henchey, 6/7/2007] After voting for the third article, committee chairman Peter Rodino (D-NJ) goes to a back room, calls his wife, and weeps. He tells her, “I hope we’ve done the right thing.” [Los Angeles Times, 5/8/2005]

Entity Tags: Peter Rodino, Richard M. Nixon, House Judiciary Committee

Timeline Tags: Nixon and Watergate

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]

Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

About 500 Iranian students take over the American Embassy in Tehran and hold 52 Americans hostage for 444 days. The Mujahedeen-e Khalq (MEK) is one of the groups that supports the take-over. [US Department of State, 4/30/2003; PBS, 1/15/2006]

Entity Tags: People’s Mujahedin of Iran

Timeline Tags: US confrontation with Iran, Iran-Contra Affair

Michael Barnes.Michael Barnes. [Source: Covington and Burling]Representative Michael Barnes (D-MD) is targeted by the NSA’s Echelon satellite surveillance program on orders from Reagan administration officials. Barnes, an outspoken opponent of Reagan’s Central American policies, had phone conversations with Nicaraguan officials intercepted and recorded, including one conversation between Barnes and the foreign minister of Nicaragua. Barnes learns of the surveillance after White House officials, apparently attempting to discredit Barnes, leaks transcripts of the taped conversations to reporters. CIA director William Casey shows Barnes a Nicaraguan embassy cable reporting a meeting between embassy staff and one of Barnes’s aides; Casey demands that Barnes fire the aide. Barnes refuses, noting that the aide had visited the embassy on legitimate business concerning international affairs. Barnes will say in 1995, “I was aware that NSA monitored international calls, that it was a standard part of intelligence gathering. But to use it for domestic political purposes is absolutely outrageous and probably illegal.” Former senator Dennis DeConcini (R-AZ) says he worries about the NSA spying on US citizens: “It has always worried me. What if that is used on American citizens? It is chilling. Are they listening to my private conversations on my telephone?” [Patrick S. Poole, 8/15/2000]

Entity Tags: Michael D. Barnes, Reagan administration, William Casey, National Security Agency, Dennis DeConcini, Echelon

Timeline Tags: Civil Liberties

A federal court rules that because of the government’s “state secrets” privilege (see March 9, 1953), a civilian plaintiff suing the US Navy over a contractual agreement cannot even access “non-privileged,” or unclassified, information from the Navy because to do so might “threaten disclosure” of material that goes against “the overriding interest of the United States… preservation of its state secrets privilege precludes any further attempt to pursue litigation.” [Siegel, 2008, pp. 196-197]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

President Ronald Reagan issues Executive Order 12333, which directs the US intelligence community to provide foreign intelligence data to the White House. The order reads in part, “[A]gencies are not authorized to use such techniques as electronic surveillance, unconsented physical searches, mail surveillance, physical surveillance, or monitoring devices unless they are in accordance with procedures established by the head of the agency concerned and approved by the Attorney General.” It establishes rules of conduct for the intelligence agencies, and mandates a certain level of Congressional oversight. [Executive Order 12333 -- United States intelligence activities, 4/5/2007] It also establishes the basis for what are later called “National Security Letters.” These NSLs, originally envisioned for use to compile information in hunts for foreign criminals and suspected terrorists, will later be used by the administration of George W. Bush to order US booksellers, librarians, employers, Internet providers, and others to turn over records and information they compile on US citizens, with strict adjuncts against allowing those targeted for surveillance to know about the NSLs and with virtually no government oversight (see October 25, 2005). [Washington Post, 11/6/2005] It does not, as some have later asserted, directly prohibit the assassination of targeted foreign subjects—i.e. terrorist suspects and even foreign leaders—though it does restrict the use of assassination by US government operatives to certain very restricted circumstances centered around critical aspects of national security. [Parks, 11/2/1989 pdf file]

Entity Tags: Ronald Reagan, George W. Bush, National Security Letters, Bush administration (43)

Timeline Tags: Civil Liberties

In the second of two rulings in the case of Halkin v Helms, the judiciary comes down squarely on the side of the US government against charges of illegal surveillance and wiretapping leveled against American anti-war protesters. The district and appellate courts uphold the federal government’s “state secrets” claim as codified in US v Reynolds (see March 9, 1953), thereby denying the plaintiffs the right to see government information that they claim would prove their case. The DC Court of Appeals writes that the federal courts do not have any constitutional role as “continuing monitors of the wisdom and soundness of Executive action,” and instead the courts “should accord utmost deference to executive assertions of privilege on grounds of military or diplomatic secrets… courts need only be satisfied that there is a reasonable danger” that military secrets might be exposed. [Siegel, 2008, pp. 196-196]

Timeline Tags: Civil Liberties

Margaret Thatcher.Margaret Thatcher. [Source: UK Parliament]British prime minister Margaret Thatcher, displeased with two of her ministers for challenging her on unidentified policy matters, requests that they be placed under electronic surveillance. Because it is illegal for British intelligence to monitor its own citizens, the operation is handed over to the CSE, Canada’s national security agency. [Daily Iowan, 1/19/2006; Janczewski and Colarik, 2007, pp. 454] According to former CSE spy Mike Frost, who will publicly discuss the matter in 2000, Thatcher “had two ministers that she said ‘…weren’t onside.’” Thatcher, says Frost, “wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers.” Why CSE and not British intelligence? Because for the British to monitor their own government members would be illegal—so instead, they farm out such activities to their allies. “The British Parliament now have total deniability,” Frost says. “They didn’t do anything. They know nothing about it. Of course they didn’t do anything; we did it for them.” Frost will say there is no way to pin any blame or criminal charges on anyone in the British government. “The British Parliament now has total deniability,” Frost says. “They didn’t do anything… we did it for them.” [ZDNet, 2/25/2000; CBS News, 2/27/2000]

Entity Tags: Communications Security Establishment, Mike Frost, Government Communications Headquarters, Margaret Thatcher

Timeline Tags: Civil Liberties

Richard Clarke, who will be the counterterrorism “tsar” on 9/11, regularly participates in a series of highly secret “Continuity of Government” (COG) exercises. [Washington Post, 4/7/2004] Throughout the 1980s, the COG exercises rehearse how to keep the federal government running during and after a nuclear war with the Soviet Union (see 1981-1992). After the fall of the Soviet Union, the exercises continue, but based instead around a possible terrorist attack on the United States (see 1992-2000). [Atlantic Monthly, 3/2004] In 2004, Clarke will reveal that he has participated regularly in these exercises over the previous 20 years. He recalls that he had “gone off into caves in mountains in remote locations and spent days on end in miserable conditions, pretending that the rest of the world had blown up, and going through the questions, going through the drill.” He adds: “Everyone there play acts that it’s really happened. You can’t go outside because of the radioactivity. You can’t use the phones because they’re not connected to anything.” He also describes the COG plan requiring coded communications, saying: “There’s an elaborate system for the people in this network, first of all, to verify each other’s identity. That person on the other end has a certain password and information that they have to pass for us to believe that they’re who they say they are.” [Washington Post, 4/7/2004; ABC News, 4/25/2004] Clarke was a senior analyst at the State Department since 1979, and rises to prominence during the Reagan administration when he becomes deputy assistant secretary of state for intelligence. [Washington Post, 3/13/2003; BBC, 3/22/2004] After being a member of the National Security Council since 1992, in 1998 he is appointed as counterterrorism “tsar” (see May 22, 1998). [9/11 Commission, 3/24/2004 pdf file; New York Review of Books, 5/13/2004; Independent, 6/14/2004] According to journalist James Mann, the COG program is of particular interest because it helps explain the thinking and behavior of the Bush administration “in the hours, days, and months after the terrorist attacks on September 11, 2001.” [Atlantic Monthly, 3/2004] On the morning of 9/11, Clarke is in fact responsible for activating the COG plan, the first time it is ever implemented (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). [Clarke, 2004, pp. 8; ABC News, 4/25/2004] Also participating in the COG exercises, at least throughout at 1980s, are Dick Cheney and Donald Rumsfeld, who on 9/11 are the vice president and secretary of defense, respectively. [Atlantic Monthly, 3/2004]

Entity Tags: Richard A. Clarke

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The DC Court of Appeals rejects a claim by civilian plaintiffs to force the government to disclose classified information as part of a lawsuit, citing the “state secrets” privilege (see March 9, 1953). Furthermore, the court broadens the definition of “state secrets” to include “disclosure of intelligence-gathering methods or capabilities and disruption of diplomatic relations.” [Siegel, 2008, pp. 197]

Timeline Tags: Civil Liberties

Valerie Plame, the 22-year old daughter of a military family that followed its Air Force father around the globe during her childhood, joins the CIA. She is one of only 250 or so recruits accepted in the elite Career Trainee Program, a relatively new program installed by CIA Director William Casey and future director Robert Gates. These recruits receive intensive training in everything from academics, government and political structures, and paramilitary operations. Plame is one of the first women accepted in the program. She acquits herself very well in training, winning the respect of her fellow recruits. Classmate Larry Johnson, who will himself go on to a long career in the agency, will later recall of the young woman he knows only as “Val P.”: “She didn’t try to pretend to be something that she was not. She didn’t shoot her mouth off. Looking back, for her age, how so damn young she was, she was remarkably mature, and very serious. It was clear she wanted to be taken seriously.” Only three recruits from the “survivors” of the original class of 250 will go on to work as NOCs—nonofficial covered officers. Plame will be one of those three. [Wilson, 2007, pp. 315-317]

Entity Tags: Central Intelligence Agency, Valerie Plame Wilson, Larry C. Johnson

Timeline Tags: Niger Uranium and Plame Outing

Strom Thurmond.Strom Thurmond. [Source: US Government]Former Lockheed software manager Margaret Newsham, who worked at the Menwith Hill facility of the NSA’s Echelon satellite surveillance operation in 1979, says she heard a real-time phone intercept of conversations involving senator Strom Thurmond (R-SC). She was shocked, she recalls, because she thought only foreign communications were being monitored. Newsham, who was fired from Lockheed after she filed a whistleblower lawsuit alleging fraud and waste, tells the chairman of the House Intelligence Committee, Louis Stokes (D-OH), of the overheard conversations. In July, Capital Hill staffers will leak the story to the Cleveland Plain Dealer. Thurmond says he doesn’t believe Newsham’s story, but his office admits that it has previously received reports that Thurmond had been a target of NSA surveillance. Thurmond will decline to press for an investigation, and the reason for the surveillance has never been revealed. [CBS News, 2/27/2000; Patrick S. Poole, 8/15/2000]

Entity Tags: Strom Thurmond, National Security Agency, House Intelligence Committee, Louis Stokes, Echelon, Cleveland Plain Dealer, Lockheed Martin Corporation, Margaret Newsham

Timeline Tags: Civil Liberties

Veteran diplomat Joseph Wilson arrives in Baghdad to assume the post of Deputy Chief of Mission (DCM) under US Ambassador April Glaspie. Wilson has extensive experience throughout sub-Saharan and Central Africa, as well as brief stints on the staffs of Senator Al Gore (D-TN) and Representative Tom Foley (D-WA). Wilson will later write that he and his colleagues share the belief that Iraq is ruled by “a shockingly brutal regime… an ugly totalitarian dictatorship” and its leader, Saddam Hussein, a “sociopath.” For the next three years, Wilson and his colleagues will send harsh reports of Hussein’s systematic violations of the human rights of his subjects to Washington.
Walking a Fine Line between Isolation and Appeasement - Still, most of the embassy staff, including Wilson and Glaspie, are not advocates of totally isolating Hussein with extreme economic and diplomatic sanctions. Wilson will write, “Isolating a regime often results in isolating ourselves, and we then lose any leverage we might have to influence outcomes. On the other hand, when dictators are treated like any other leaders, it’s often interpreted by them as a free pass to continue in their autocratic ways, while critics label it as appeasement.… The merits of ideologically driven diplomacy versus a more pragmatic approach have been a recurring theme of foreign policy debates throughout the history of international relations and America’s own domestic policies.”
'Tread Lightly' - Wilson will note that “Iraq’s Arab neighbors unanimously urged us to tread lightly. They argued that after almost a decade of a grinding war with Iran, Saddam had learned his lesson and that his natural radicalism would now be tempered by the harsh experience.… [I]t was better to tie him to relationships that would be hard for him to jettison than to leave him free to make trouble with no encumbrances. Engaging with him at least kept him in our sights.” Iraq had behaved monstrously during its war with Iran, and had offended the world with its chemical attacks on its own citizens (see August 25, 1988) and its Iranian enemies (see October 1988). But it had emerged from the war as a powerful regional player both militarily and economically. The Bush administration is torn between trying to moderate Hussein’s behavior and treating him as an incorrigible, irredeemable enemy of civilization. And Washington wants Iraq as a balancing force against Iran, which is awash in virulently anti-American sentiment (a sentiment returned in full by many American lawmakers and government officials). No other country in the Gulf region will tolerate the presence of US forces as a counterbalance to Iran. So, as Wilson will write, “All of Iraq’s neighbors continued to argue for a softer approach; and since they clearly had at least as much at stake as we did, the Bush administration was willing to follow their lead.” [Wilson, 2004, pp. 78-79, 451]

Entity Tags: Joseph C. Wilson, Saddam Hussein, April Glaspie

Timeline Tags: Events Leading to Iraq Invasion

Valerie Plame, a young CIA case officer (see Fall 1985), begins her first tour of foreign duty in Athens, Greece. She will remain there for three years, functioning out of the US Embassy under diplomatic cover as, primarily, a recruiter of foreign nationals to serve as CIA assets. Athens is a beautiful but dangerous assignment, with the radical leftist group known as “November 17” having killed a number of US officials over the past years, including CIA station chief Richard Welch in 1975. Plame’s station chief, Doug Smith, will remember her as an ambitious agent who worked hard: “It’s rare that someone on a first tour does a really wonderful job. She did well.” Her deputy station chief, who only allows himself to be identified as “Jim,” will add that he has “a very high opinion of Valerie” and the caliber of her work. [Wilson, 2007, pp. 319-321]

Entity Tags: Doug Smith, Central Intelligence Agency, Valerie Plame Wilson, “Jim” (CIA case officer)

Timeline Tags: Niger Uranium and Plame Outing

A lawsuit against the FBI’s investigation of a sixth-grade boy and his school project to create an “encyclopedia of the world” is stopped when an appeals court rules that the agency is shielded by the “state secrets” privilege (see March 9, 1953). Unable to secure information from the FBI as to why it investigated him, the child had therefore “failed to sustain his burden of proof [and] the cause of action was properly dismissed.” [Siegel, 2008, pp. 197]

Entity Tags: Federal Bureau of Investigation

Timeline Tags: Civil Liberties

Joseph Wilson and Saddam Hussein, during their August 6 meeting.Joseph Wilson and Saddam Hussein, during their August 6 meeting. [Source: Joseph Wilson / New York Times]Deputy Chief of Mission Joseph Wilson, the ranking US diplomat in Baghdad (see July 31, 1990 and August 1-2, 1990), is admitted to an unexpected and impromptu meeting with Saddam Hussein. Wilson, determined not to let Hussein get the better of him in front of the Iraqi photographers present at the meeting, refuses to do anything that could be construed as bowing to Hussein (an effect Hussein is known to strive to create with his “guests”) and is careful not to laugh for fear a picture could be taken out of context by Iraqi propagandists. As Wilson will later recall, “It dawned on me that the last thing in the world that I wanted to be beamed around the world was a picture of me yukking it up with Saddam Hussein.” Hussein proposes a solution to the Iraq-Kuwait conflict, involving the US giving its blessing to Iraq’s annexation of Kuwait (see August 2-4, 1990) and in return promising to provide cheap oil to the US from Iraqi and Kuwaiti oil fields. He also promises not to strike against Saudi Arabia unless that country allows itself to be used as a launching pad for a strike against Iraq. If the US reacts militarily to the invasion, Hussein says, then the US will be responsible for the “spilling of the blood of ten thousand soldiers in the Arabian desert.” Wilson will later write, “There it was then, the carrot of cheap oil coupled with the stick of dead American soldiers.” Wilson, in turn, presses for Hussein to allow foreign citizens in general, and American citizens in particular, to leave Iraq immediately (see August 4, 1990). Hussein asks if such a request indicates that the US is planning to launch its own military response; Wilson responds that he knows nothing of any such plans, but that he intends “to be here so long as there is a role for diplomats to play in resolving this situation peacefully.” The meeting adjourns with nothing being agreed upon; Wilson has no power to negotiate on behalf of the US, Wilson does not trust Hussein to keep any such bargains, and most importantly, the US has not shown any indication of any willingness to allow Hussein to stay in Kuwait. [Vanity Fair, 1/2004; Wilson, 2004, pp. 118-123]

Entity Tags: Saddam Hussein, Joseph C. Wilson

Timeline Tags: Events Leading to Iraq Invasion

As tensions escalate between the US and Iraq, Iraqi officials circulate a note to all the embassies in Baghdad, directing them to register all of the civilians in their care with the authorities. Failure to comply can result in execution, the note implies. Such registration can only be done in person at Iraqi governmental offices; Deputy Chief of Mission Joseph Wilson, the ranking US diplomat in Baghdad, knows that bringing American citizens in for registration may well result in those Americans being taken hostage. He is housing some 60 Americans at the ambassador’s residence for their protection. He will later write: “It was clearly a way for the Iraqis to replenish their stock of hostages. The choice, theoretically, was either to turn over Americans or to defy the note and risk execution.” Instead of making the choice, Wilson uses the order to publicly defy the Iraqis. He schedules a press conference and has a Marine make him a hangman’s noose. Wearing the noose, he tells reporters that if Saddam Hussein “wants to execute me for keeping Americans from being taken hostage, I will bring my own f_cking rope.” The press conference, like all of the embassy press conferences, is off the record, but journalists release the story anyway. A garbled, erroneous version from a French news outlet has the Iraqis planning to hang Wilson by sundown. Iraqi Foreign Minister Tariq Aziz, angered and embarrassed by the press coverage, attempts to dress down Wilson that evening, but Wilson refuses to back down. Instead, the Iraqis withdraw the request. Soon after, President Bush sends Wilson a cable lauding his courage and his outspokeness (see November 29, 1990). [Wilson, 2004, pp. 153-154; Unger, 2007, pp. 311] Conservative columnist Robert Novak co-writes a piece about Wilson that says, “He shows the stuff of heroism.” Novak will later reveal the covert CIA status of Wilson’s wife, Valerie Plame Wilson, as an act of political retaliation (see July 14, 2003). [Wilson, 2004, pp. 153-154]

Entity Tags: Tariq Aziz, Joseph C. Wilson, Robert Novak, Saddam Hussein, George Herbert Walker Bush

Timeline Tags: Events Leading to Iraq Invasion, US-Iraq 1980s

Deputy Chief of Mission Joseph Wilson, the ranking US diplomat in Iraq, and his remaining colleagues in the beleaguered US Embassy in Baghdad decide to use the Thanksgiving holiday as a chance to remind the US that Iraq is still holding some 120 Americans as hostages (see August 17-23, 1990). He has proposed to his superiors in Washington that he make a high-profile visit to the Iraqi Foreign Ministry to demand the release of the hostages, to be followed by an on-the-record press conference. Journalists would then join Wilson for Thanksgiving dinner at his home in Baghdad. He was told, “Nobody is going to tell you not to do it, but with the president traveling to Saudi Arabia to have Thanksgiving with the troops, the White House press office is concerned that you might step on the president’s story. That said, if you insist, feel free to go ahead. Just so you are aware of the concerns here.” Wilson and his colleagues decided to go through with the program. During dinner, CNN correspondent Richard Roth appears at Wilson’s home to announce that Iraqi officials have brought a contingent of American hostages to Baghdad for an on-camera Thanksgiving dinner. Does Wilson have a reaction? Roth asks. Wilson does indeed, and launches into a tirade, calling Iraq’s government “sadistic” for “parad[ing] hostages before the cameras as a propaganda tool while denying them access to their country’s embassy or consular officials.” Roth airs Wilson’s remarks on CNN. It is this impromptu condemnation of the Iraqi government, along with Wilson’s open defiance of Iraqi officials days before (see September 20, 1990), that prompts President Bush to send a laudatory letter to Wilson praising his courage and patriotism. (Wilson will give a copy of Bush’s cable to Roth, telling the reporter that he deserves the president’s praise as much as Wilson does.) [Wilson, 2004, pp. 160-161]

Entity Tags: Richard Roth, George Herbert Walker Bush, Joseph C. Wilson

Timeline Tags: Events Leading to Iraq Invasion

President Bush sends US Acting Ambassador to Iraq Joseph Wilson a telegram lauding his heroism in standing up to Saddam Hussein (see September 20, 1990). Bush writes in part: “It is relatively easy to speak out from the safety and comfort of Washington; what you are doing day in and day out under the most trying conditions is truly inspiring. Keep fighting the good fight; you and your stalwart colleagues are always in our thoughts and prayers.” [Wilson, 2004, pp. 154]

Entity Tags: Saddam Hussein, George Herbert Walker Bush, Joseph C. Wilson

Timeline Tags: Events Leading to Iraq Invasion, US-Iraq 1980s

The ranking US diplomat in Baghdad, Joseph Wilson, has a breakthrough in his relentless efforts to win the freedom of the 120 or so American hostages being held by Iraq (see August 17-23, 1990). Wilson meets an Arab journalist who has considerable influence in the Gulf region. He tells her that President Bush has already concluded, in his opinion, that the loss of the hostages as a result of an American invasion would be lamentable but not enough to deter military action against Iraq. Therefore, Saddam Hussein is “deluding himself” if he thinks the hostages will prevent the US from launching an attack against Iraqi forces in Kuwait. The other side of the coin, he tells the journalist, is that if something untoward does happen to the hostages, “American anger might be such that the president would be forced to go to war to avenge that mistreatment.” It is wholly to Hussein’s benefit to release the hostages, Wilson argues. Ten days after that lunch, Wilson receives the minutes from a meeting between Algerian Foreign Minister Sid Ahmed Ghozali and the US Ambassador to Algeria, Chris Ross, in which Ghozali echoes Wilson’s message almost verbatim. Wilson later writes, “I was certain that my contact had been speaking to other Arab leaders, and I saw that the thesis was gaining some traction. It would soon get back to Saddam from Arab interlocutors. It did not matter how many times I told the Iraqis the risks they ran—they expected me to say it. But when a fellow Arab said the same thing, it would have far greater impact.” [Wilson, 2004, pp. 164-165]

Entity Tags: Sid Ahmed Ghozali, Chris Ross, George Herbert Walker Bush, Joseph C. Wilson, Saddam Hussein

Timeline Tags: Events Leading to Iraq Invasion

President George H. W. Bush signs a covert “lethal finding” authorizing the CIA to spend a hundred million dollars to “create the conditions for removal of Saddam Hussein from power.” [New Yorker, 6/7/2004] The CIA forms the Iraqi Opposition Group within its Directorate of Operations to implement this policy. [Ritter, 2005, pp. 128] Awash in cash, the agency hires the Rendon Group to influence global political opinion on matters related to Iraq. According to Francis Brooke, an employee of the company who’s paid $22,000 per month, the Rendon Group’s contract with the CIA provides it with a ten percent “management fee” on top of whatever money it spends. “We tried to burn through $40 million a year,” Brooke will tell the New Yorker. “It was a very nice job.” The work involves planting false stories in the foreign press. The company begins supplying British journalists with misinformation which then shows up in the London press. In some cases, these stories are later picked up by the American press, in violation of laws prohibiting domestic propaganda. “It was amazing how well it worked. It was like magic,” Brooke later recalls. Another one of the company’s tasks is to help the CIA create a viable and unified opposition movement against Saddam Hussein (see June 1992). This brings the Rendon Group and Francis Brooke into contact with Iraqi exile Ahmed Chalabi (see After May 1991). The CIA will soon help Chalabi and Rendon create the Iraqi National Congress (INC) to further the goal of toppling Hussein. [New Yorker, 6/7/2004] Author and intelligence expert James Bamford will later say, “Chalabi was a creature of American propaganda to a large degree. It was an American company, the Rendon Group, that—working secretly with the CIA—basically created his organization, the Iraqi National Congress. And put Chalabi in charge basically.… From the very beginning Chalabi was paid a lot of money from the US taxpayers. The CIA paid him originally about 350,000 dollars a month, to Chalabi and his organization.” [PBS, 4/25/2007]

Entity Tags: Saddam Hussein, Rendon Group, Iraqi Opposition Group, James Bamford, George Herbert Walker Bush, Francis Brooke, Central Intelligence Agency, Ahmed Chalabi, Iraqi National Congress

Timeline Tags: Events Leading to Iraq Invasion, Domestic Propaganda

A US appellate court refuses to find a number of military contractors liable in the death of Earl Patton Ryals, who died with 36 of his fellow crewmen in the Iraqi attack on the USS Stark (see May 17, 1987 and After). Ryals’s estate claims that he and his fellows died in part because of negligence on the part of the contractors who designed, manufactured, tested, and marketed the weapons system on board the Stark, including the Phalanx anti-missile system. In turning down the estate’s claim, the court cites the government’s “state secrets” privilege (see March 9, 1953), saying that the facts of the issue could not be resolved without examining classified Navy documents. And even without this reason, the court rules, Ryals’s estate cannot see the documents because the case presents “a political question” about military decision-making that is not subject to judicial review. [Zuckerbraun v. General Dynamics Corp., 6/13/1991; Siegel, 2008, pp. 197-198] A year later, a similar case will be dismissed on the grounds that a trial might conceivably reveal “state secrets” (see September 16, 1992).

Entity Tags: Earl Patton Ryals, US Department of the Navy

Timeline Tags: Civil Liberties

Former Assistant Secretary of State Elliott Abrams, facing multiple counts of lying under oath to Congress about, among other things, his knowledge of the US government’s involvement in the resupply operation to the Nicaraguan Contras (see October 10-15, 1986), his knowledge of the role played by former CIA agent Felix Rodriguez in the resupply (see December 17, 1986), and his knowledge of third-party funding of the Nicaraguan Contras (see November 25, 1986), agrees to plead guilty to two misdemeanor charges of withholding evidence from Congress. Abrams agrees to the plea after being confronted with reams of evidence about his duplicity by investigators for special prosecutor Lawrence Walsh as well as from testimony elicited during the House-Senate investigation of 1987 (see July 7-10, 1987) and the guilty plea and subsequent testimony of former CIA agent Alan Fiers (see July 17, 1991). Abrams pleads guilty to two counts of withholding information from Congress, to unlawfully withholding information from the Senate Foreign Relations Committee and the House Intelligence Committee, and admits lying when he claimed that he knew nothing of former National Security Council official Oliver North’s illegal diversion of government funds to the Contras (see December 6, 1985, April 4, 1986, and November 25-28, 1986). Abrams says that he lied because he believed “that disclosure of Lt. Col. [Oliver] North’s activities in the resupply of the Contras would jeopardize final enactment” of a $100 million appropriation pending in Congress at the time of his testimony, a request that was narrowly defeated (see March 1986). Abrams also admits to soliciting $10 million in aid for the Contras from the Sultan of Brunei (see June 11, 1986). [Final Report of the Independent Counsel for Iran/Contra Matters: Chapter 25: United States v. Elliott Abrams: November 1986, 8/4/1993]

Entity Tags: Elliott Abrams, Alan Fiers, Contras, Felix Rodriguez, House Intelligence Committee, Senate Foreign Relations Committee, Lawrence E. Walsh

Timeline Tags: Iran-Contra Affair

During the 1980s, Dick Cheney and Donald Rumsfeld were regular participants in top-secret exercises, designed to test a program called Continuity of Government (COG) that would keep the federal government functioning during and after a nuclear war with the Soviet Union (see 1981-1992). Despite the fall of the Berlin Wall and the collapse of the Soviet Union, the COG exercises continue into the 1990s, being budgeted still at over $200 million per year.
Exercises Prepare for Terrorist Attacks - Now, terrorists replace the Soviet Union as the imagined threat in the exercises. The terrorism envisaged is almost always state-sponsored, with the imagined terrorists acting on behalf of a government. According to journalist James Mann, the COG exercises are abandoned fairly early in the Clinton era, as the scenario is considered farfetched and outdated. However another journalist, Andrew Cockburn, suggests they continue for longer.
Exercise Participants Are Republican Hawks - Cockburn adds that, while the “shadow government” created in the exercises had previously been drawn from across the political spectrum, now the players are almost exclusively Republican hawks. A former Pentagon official with direct knowledge of the program will later say: “It was one way for these people to stay in touch. They’d meet, do the exercise, but also sit around and castigate the Clinton administration in the most extreme way. You could say this was a secret government-in-waiting. The Clinton administration was extraordinarily inattentive, [they had] no idea what was going on.” [Atlantic Monthly, 3/2004; Cockburn, 2007, pp. 88]
Richard Clarke Participates - A regular participant in these COG exercises is Richard Clarke, who on 9/11 will be the White House chief of counterterrorism (see (1984-2004)). [Washington Post, 4/7/2004; ABC News, 4/25/2004] Although he will later come to prominence for his criticisms of the administration of President George W. Bush, some who have known him will say they consider Clarke to be hawkish and conservative (see May 22, 1998). [Boston Globe, 3/29/2004; US News and World Report, 4/5/2004] The Continuity of Government plan will be activated, supposedly for the first time, in the hours during and after the 9/11 attacks (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). [Washington Post, 3/1/2002]

Entity Tags: Clinton administration, Andrew Cockburn, Richard A. Clarke, Donald Rumsfeld, Richard (“Dick”) Cheney, James Mann, US Department of Defense

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Fall 1992 - 1996: Plame Becomes CIA ‘NOC’

Valerie Plame, a young CIA case officer working in the Europe Division at the agency’s Directorate of Operations following a tour in Greece (see Fall 1985 and Fall 1989), decides on a risky career move—becoming a NOC, or Nonofficial Covered Officer. As reporter Laura Rozen will later explain: “Becoming a NOC would require Plame to erase all visible connections to the US government, while, with the help of the agency’s Office of Central Cover, developing and inhabiting a plausible new private sector career and professional identity that would serve as useful cover for her to meet and develop potential sources of intelligence value to the agency without revealing herself as an agent of the US government. It also meant giving up the protection of diplomatic status should her covert activities be discovered.” “A NOC has no overt affiliation with the US government,” Plame will later write. “If he was caught, the United States would deny any connection.” The CIA accepts her as a NOC candidate, and in order to distance herself from her former association with her former “cover” career as a junior State Department officer in Athens, Plame begins pursuing double graduate degrees in international affairs and European studies. She studies at both the London School of Economics and at the College of Europe in Bruges, Belgium, where the entire curriculum is taught in French. By 1996 she is ensconced in an apartment in Brussels, where she begins a “career” as an energy executive and secret NOC. She has a far wider range of potential contacts within the corporate world as an apparent private citizen, and her new assignment introduces her to the world of weapons proliferation, WMD, counternarcotics, economic intelligence, technological developments, and counterterrorism. [Wilson, 2007, pp. 332-333]

Entity Tags: Laura Rozen, College of Europe, US Department of State, Central Intelligence Agency, Valerie Plame Wilson, London School of Economics

Timeline Tags: A. Q. Khan's Nuclear Network, Niger Uranium and Plame Outing

A federal appeals court upholds the dismissal of a lawsuit filed on behalf of 23 Navy sailors killed in the attack on the USS Stark (see May 17, 1987 and After) against a number of defense contractors. A similar lawsuit on behalf of one of the sailors killed in the attack was dismissed a year before (see June 13, 1991). This time the plaintiffs file over 2,500 pages of unclassified documentary evidence supporting their claims that the contractors were negligent in their design and implementation of the weapons systems aboard the Stark. The appeals court finds that regardless of the amount of evidence entered, to allow the trial would be to potentially infringe on the US government’s “state secrets” privilege (see March 9, 1953). “[N]o amount of effort could safeguard the privileged information,” the court rules. The court adds that “classified and unclassified information cannot always be separated, and therefore courts must restrict access not only to classified material, but to “those pieces of evidence” that “press so closely upon highly sensitive material that they create a hgh risk of inadvertent or indirect disclosures.” [Siegel, 2008, pp. 198]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

The outgoing President Bush pardons six former Reagan officials for any crimes they may have committed as part of their involvement in the Iran-Contra affair. One of the six, former Defense Secretary Caspar Weinberger, was slated to go on trial in January 1993 on charges that he lied to Congress about his knowledge of arms sales to Iran and funding from other countries for the Nicaraguan Contras (see July 24, 1992). Weinberger’s case was expected to reveal details of then-Vice President Bush’s involvement in the affair. Bush has refused to turn over a 1986 campaign diary he kept that may contain evidence of his involvement. Special prosecutor Lawrence Walsh says of the pardons, “[T]he Iran-Contra cover-up, which has continued for more than six years, has now been completed.” The pardons “undermine… the principle that no man is above the law. It demonstrates that powerful people with powerful allies can commit serious crimes in high office—deliberately abusing the public trust without consequence.” Walsh says that he believes Bush may have pardoned Weinberger to conceal his own complicity and possibly criminal actions in Iran-Contra. Bush also pardons former National Security Adviser Robert McFarlane and former Assistant Secretary of State Elliott Abrams, both of whom have already pled guilty to misdemeanor charges of withholding information from Congress. Bush also pardons Clair George, the former head of the CIA’s clandestine services, convicted earlier in December of two felony charges of perjury and misleading Congress. Finally, he pardons two other CIA officials, Duane Clarridge, who is awaiting trial, and Alan Fiers, who pled guilty to withholding information from Congress, and who testified against George. For his part, Bush says he is merely trying to “put bitterness behind us” in pardoning the six, many of whom he said have already paid a heavy price for their involvement. Senator George Mitchell (D-ME) is sharply critical of the pardons, saying, “If members of the executive branch lie to the Congress, obstruct justice and otherwise break the law, how can policy differences be fairly and legally resolved in a democracy?” [New York Times, 12/25/1992]

Entity Tags: Robert C. McFarlane, Caspar Weinberger, Alan Fiers, Clair George, Lawrence E. Walsh, Contras, George Herbert Walker Bush, Duane Clarridge, Elliott Abrams, George Mitchell

Timeline Tags: Iran-Contra Affair

The “Blind Sheikh,” Sheikh Omar Abdul-Rahman, is arrested in Brooklyn after a long stand off. The “Landmarks” plot was rolled up on June 24, 1993, and many of Abdul-Rahman’s close associates were arrested on that day (see June 24, 1993). But Abdul-Rahman moved to the Abu Bakr mosque and stayed there. His presence in a mosque and the many supporters that gathered to surround it makes his arrest difficult. But after long negotiations, on July 3, 1993, he is arrested on immigration charges and taken to prison. [New York Times, 7/3/1993] He will later be charged with a role in the “Landmarks” plot and eventually sentenced to life in prison. [New York Times, 1/18/1996]

Entity Tags: Abu Bakr Mosque, Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline

The Communications Assistance for Law Enforcement Act (CALEA) takes effect. CALEA obliges telecommunications providers such as AT&T to give law enforcement agencies and US intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks. In more recent years, the law will be expanded to give law enforcement and intelligence agencies similar abilities to monitor Internet usage by US citizens. [Federal Communications Commission, 2/21/2007]

Entity Tags: Communications Assistance for Law Enforcement Act (CALEA), AT&T

Timeline Tags: Civil Liberties

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Timeline Tags: Civil Liberties

Sheila E. Witnall, the secretary of the Air Force, declassifies all Air Force accident reports prior to January 25, 1956. The declassification includes the 1948 crash of the B-29 bomber that killed nine of 13 crew members during a secret “Project Banshee” mission (see October 6, 1948). The formerly classified reports had been at the heart of the case of US v Reynolds (see March 9, 1953) that sparked the so-called “state secrets” privilege. Four years after the declassification, the daughter of one of the slain civilians on board, Judy Palya Loether, finds the accident report on the Internet; the discovery spurs her to begin looking into the circumstances of her father’s death, and ultimately will result in a second lawsuit being filed on behalf of the families of the slain crewmen (see February 26, 2003). [Siegel, 2008, pp. 205-208]

Entity Tags: Project Banshee, Sheila E. Witnall, Judy Palya Loether, US Department of the Air Force

Timeline Tags: Civil Liberties

Law professor John Yoo writes a lengthy essay for the California Law Review entitled “The Continuation of Politics by Other Means: The Original Understanding of War Powers,” in which he argues that the Founding Fathers intended to empower presidents to launch wars without Congressional permission. Yoo has clerked for conservative judge Laurence Silberman and equally conservative Supreme Court Justice Clarence Thomas, and served for a year as counsel to then-Senate Judiciary Committee Chairman Orrin Hatch (R-UT). He has become a regular speaker at Federalist Society events, the informal but influential group of conservative lawyers, judges, and legal scholars who will come to have so much influence in the Bush administration. You argues that for generations, Constitutional scholars have misread the Constitution: the Founders actually supported, not repudiated, the British model of executive power that gave the king the sole power of declaring war and committing forces to battle. The Constitution’s granting of the legislature—Congress—the power to “declare war” is merely, Yoo writes, a reference to the ceremonial role of deciding whether to proclaim the existence of a conflict as a diplomatic detail. The Founders always intended the executive branch to actually declare and commence war, he writes. Most other Constitutional scholars will dismiss Yoo’s arguments, citing notes from the Constitutional Convention that show the Founders clearly intended Congress, not the president, to decide whether to commit the country to war. One of those Founders, James Madison, wrote in 1795 that giving a president the unilateral ability to declare war “would have struck, not only at the fabric of the Constitution, but at the foundation of all well organized and well checked governments. The separation of the power of declaring war from that of conducting it, is wisely contrived to exclude the danger of its being declared for the sake of its being conducted.” [Savage, 2007, pp. 80-81] Yoo will go on to join the Bush administration’s Office of Legal Counsel, and write numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002).

Entity Tags: Federalist Society, John C. Yoo

Timeline Tags: Civil Liberties

According to counterterrorism expert Rohan Gunaratna, US intelligence monitoring al-Qaeda communications learn that al-Qaeda is canceling an attack on Western targets in Singapore. On April 18, 1996, 108 Lebanese civilians seeking refuge at a UN camp in Qana, Lebanon, are killed by mortars fired by Israeli forces. Bin Laden “was keen not to dissipate what he envisaged as widespread revulsion against Israel’s action and hence called off the strike in Southeast Asia. Al-Qaeda’s team in question was very determined to go ahead, having spent years preparing the attack, and according to the intercepts it proved difficult for Osama to convince it otherwise.” Gunaratna claims the US learned this through the NSA’s Echelon satellite network (see Before September 11, 2001) “and other technical monitoring of their communications traffic.” [Gunaratna, 2003, pp. 133-134] If true, this case supports other evidence that the US was successfully monitoring bin Laden’s communications from an early date (see Early 1990s) and that al-Qaeda’s Southeast Asia operations were penetrated years before an important al-Qaeda summit in Malaysia discussing the 9/11 plot (see January 5-8, 2000).

Entity Tags: Echelon, Al-Qaeda, Osama bin Laden, National Security Agency

Timeline Tags: Complete 911 Timeline

Richard Perle.Richard Perle. [Source: Public domain]The Institute for Advanced Strategic and Political Studies, an Israeli think tank, publishes a paper titled “A Clean Break: A New Strategy for Securing the Realm.” [Washington Times, 10/7/2002; Chicago Sun-Times, 3/6/2003] The paper, whose lead author is neoconservative Richard Perle, is meant to advise the new, right-wing Israeli Prime Minister Benjamin Netanyahu. Other authors include:
bullet influential neoconservative academic and former Bush adviser Richard Perle, primarily responsible for the content of the paper;
bullet Meyrav Wurmser, the future director of the neoconservative Hudson Institute’s Center for Middle East Policy;
bullet her husband David Wurmser, the future chief adviser for Middle East policy for future vice-president Dick Cheney;
bullet neoconservative Douglas Feith, who will be the prime architect of the Iraq war;
bullet and a number of lesser-known neoconservatives, including James Colbert, Charles Fairbanks, Jr., Jeffrey T. Bergner, Jonathan Torop, and Robert Loewenberg.
Rebuilding Zionism by Abandoning Past Policies - It advocates making a complete break with past policies by adopting a strategy “based on an entirely new intellectual foundation, one that restores strategic initiative and provides the nation the room to engage every possible energy on rebuilding Zionism.…” [Guardian, 9/3/2002]
Aggressive, Militant Israeli Policy towards Arab Neighbors - Much along the lines of an earlier paper by Israeli Oded Yinon (see February 1982), the document urges the Israelis to aggressively seek the downfall of their Arab neighbors—especially Syria and Iraq—by exploiting the inherent tensions within and among the Arab States. The first step is to be the removal of Saddam Hussein in Iraq. A war with Iraq will destabilize the entire Middle East, allowing governments in Syria, Iran, Lebanon, and other countries to be replaced. “Israel will not only contain its foes; it will transcend them,” the paper says. [Perle, 7/8/1996; Guardian, 9/3/2002; Carnegie Endowment for International Peace, 3/19/2003] Iraq is first on the list of nations to be transformed. Saddam Hussein must be overthrown, the authors say. But Iraq has long served as a counterweight to the Shi’ite theocracy of Iran; with the two at loggerheads, neither could pose as serious a threat to Israel as it could if not opposed by the other. To counter this, Perle and his co-authors propose restoring the Hashemites (an ancient Arab dynasty; King Faisal I of Iraq was a Hashemite) to power. Instead of the largely Shi’ite Iraqis aligning themselves with their fellow Shi’a in Iran after Hussein’s overthrow, the Hashemite government would align itself with the pro-Western Jordan, long a Hashemite regime. Unfortunately, the authors propose no plan to actually make such an extraordinary regime succession happen, nor do they seem concerned with some Iraqi Shi’ites’ alignment with Islamist terrorists or with many Shi’ites’ close ties to Iran. [Unger, 2007, pp. 145-148]
Abandoning Oslo Accords, Militant Palestinian Policy - Other suggestions for Israel include abandoning the Oslo Accords, developing a foreign policy based on a traditional balance of power strategy, reserving its right to invade the West Bank and Gaza Strip as part of a strategy of “self-defense,” abandoning any notion of “land for peace,” reestablishing a policy of preemptive strikes, forging closer ties to the US while taking steps towards self-reliance, and seeking an alternative to Yasser Arafat as leader of the PLO. [Perle, 7/8/1996]
'Seeds of a New Vision' - All these questions need not be answered right away, according to co-author Meyrav Wurmser. The document is “the beginning of thought,” she says, “… the seeds of a new vision.”
Similar to American Christian Right's Vision - According to author Craig Unger, the ideology of “ACB” is, in essence, a secularized version of the theology of the American Christian Right. Christian Zionists insist that Jews were ordained by God to reclaim the Biblican land of Judea and Samaria in the West Bank; the paper asserts that claim as well. The paper echoes Christian fundamentalists by demanding “the unconditional acceptance of Arabs of our rights, especially in their territorial dimension.” Perle and his fellow neoconservatives want to push the boundaries even further: the Bible can be interpreted to countenance Jewish dominion over all or parts of Egypt, Syria, Lebanon, Jordan, Iraq, and even Saudi Arabia. Thusly, the authors claim that Israel and the US, by waging war against Iraq, Syria, and Lebanon, would reshape the “strategic environment” in the Middle East and greatly expand Israel’s influence in the region.
Influence in Upcoming Bush Administration - Perle will later become chairman of President Bush’s influential Defense Policy Board and will be instrumental is moving Bush’s US policy toward war with Iraq after the 9/11 attacks, as will Feith and the Wurmsers. [Unger, 2007, pp. 145-148]

Entity Tags: Richard Perle, Robert Loewenberg, Meyrav Wurmser, Jonathan Torop, Richard V. Allen, James Colbert, Charles Fairbanks, Jr., Benjamin Netanyahu, David Wurmser, Institute for Advanced Strategic and Political Studies, Jeffrey T. Bergner, Douglas Feith

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion, US International Relations, Neoconservative Influence

A lieutenant general meets with Qwest CEO Joe Nacchio and Dean Wandry, who heads Qwest’s government business unit. According to documents filed in 2006 by Nacchio concerning his trial on insider trading charges (see October 12, 2007), the general “told Mr. Wandry that he ran the largest telecom operation in the world, he had looked at Qwest’s network, and he wanted to use it for government purposes.” The general in question could be NSA Director Kenneth Minihan, who will be replaced in 1999 by another lieutenant general, Michael Hayden, but neither Minihan nor Hayden will comment on the allegation. Many former intelligence officials will say that it is likely Minihan who met with Nacchio and Wandry. Nacchio’s court documents indicate that he and Wandry agree to work with the general. Nacchio is not allowed to announce the contract publicly, but according to the court documents, he “understood at the time this was the beginning of a relationship which had enormous potential for future work. This proves increasingly true as time went on.” By 1999 Qwest is working extensively with the NSA. Minihan is particularly concerned about the potential of “cyberwarfare” by foreign governments, terrorist organizations, drug cartels, and organized crime, a prospect which he felt the NSA is unprepared. He particularly worries about Russia and China; in June 1998, he will testify are training personnel in potential cyber-attacks. “These opportunists, enabled by the explosion of technology and the availability of inexpensive, secure means of communication, pose a significant threat to the interests of the United States and its allies,” Minihan will state. In 2007, a former senior NSA official will say that the agency felt those groups knew US privacy laws all too well and were capable of using those laws against the NSA and other intelligence agencies. He will say, “There was such a nuanced understanding of how to tie us in knots and use American law against us, that there were certainly pockets of people saying, ‘We’ve got to be assertive; we’ve got to be more aggressive on this.’” Hayden, Minihan’s successor, will be particularly willing to push agency operations to the edge of legality. After 9/11, Hayden will say, “We’re pretty aggressive within the law. As a professional, I’m troubled if I’m not using the full authority allowed by law.” [National Journal, 11/2/2007] The NSA will approach Qwest will a similar offer in the months before 9/11 (see February 2001).

Entity Tags: Michael Hayden, Dean Wandry, Kenneth Minihan, National Security Agency, Joe Nacchio, Qwest

Timeline Tags: Civil Liberties

Former US ambassador Joe Wilson and CIA officer Valerie Plame meet for the first time at a reception held at the Turkish ambassador’s residence. Wilson is a political adviser to the Commander in Chief of the US Armed Forces in Europe. Plame describes herself as an “energy executive living in Brussels.” Wilson and Plame will marry a year later and will become involved in the “Plame Affair,” when Plame’s affiliation with the CIA is disclosed in the media (see July 14, 2003). After her marriage, Plame will generally be referred to by the name Plame Wilson. Wilson, who is accompanied by General James Jamerson, is there to receive an award from the American-Turkish Council. The reason for Plame’s presence there is not known. [Wilson, 2004, pp. 239-242, 273] However, the American-Turkish Council will later be said to be involved in the smuggling of nuclear weapons material to Turkey and other countries (see Late 1990s-Early 2001 and Mid-Late 1990s), and Plame’s job at the CIA is in its non-proliferation section (see Late February 1999), so she may be there for operational reasons. [Sunday Times (London), 1/6/2008; Sunday Times (London), 1/27/2008]

Entity Tags: James Jamerson, American-Turkish Council, Valerie Plame Wilson, Joseph C. Wilson

Timeline Tags: A. Q. Khan's Nuclear Network, Niger Uranium and Plame Outing

An FBI investigation finds that Turkish nationals are involved in efforts to bribe members of Congress, both Republican and Democrat. Targets of the FBI’s investigation include individuals at Chicago’s Turkish Consulate and the American-Turkish Consulate, as well as members of the American-Turkish Council (ATC) and the Assembly of Turkish American Associations (ATAA). Wiretaps obtained by investigators also contain what appears to be references to large scale drug shipments and other crimes. In 1999 some FBI investigators call for the appointment of a special prosecutor to continue the investigation. But after the Bush administration comes to office, higher-ups in the Department of State pressure the bureau to shift the attention of its investigation away from elected politicians and instead focus on appointed officials. [Anti-War (.com), 8/15/2005; Vanity Fair, 9/2005]

Entity Tags: US Department of State, US Congress, Turkish Consulate of Chicago, Federal Bureau of Investigation, American-Turkish Consulate, American-Turkish Council, Assembly of Turkish American Associations

Timeline Tags: Complete 911 Timeline

PNAC logo.PNAC logo. [Source: Project for the New American Century]The Project for the New American Century (PNAC), an influential neoconservative think tank, publishes a letter to President Clinton urging war against Iraq and the removal of Saddam Hussein because he is a “hazard” to “a significant portion of the world’s supply of oil.” In a foretaste of what eventually happens, the letter calls for the US to go to war alone, attacks the United Nations, and says the US should not be “crippled by a misguided insistence on unanimity in the UN Security Council.” The letter is signed by many who will later lead the 2003 Iraq war. 10 of the 18 signatories later join the Bush Administration, including Defense Secretary Donald Rumsfeld, Assistant Defense Secretary Paul Wolfowitz, Deputy Secretaries of State Richard Armitage and Robert Zoellick, Undersecretaries of State John Bolton and Paula Dobriansky, presidential adviser for the Middle East Elliott Abrams, Defense Policy Board chairman Richard Perle, and George W. Bush’s special Iraq envoy Zalmay Khalilzad. Other signatories include William Bennett, Jeffrey Bergner, Francis Fukuyama, Robert Kagan, William Kristol, Peter Rodman, William Schneider, Vin Weber, and James Woolsey. [Project for the New American Century, 1/26/1998; Sunday Herald (Glasgow), 3/16/2003; Unger, 2007, pp. 158] Clinton does heavily bomb Iraq in late 1998, but the bombing doesn’t last long and its long term effect is the break off of United Nations weapons inspections. [New York Times, 3/23/2003] The PNAC neoconservatives do not seriously expect Clinton to attack Iraq in any meaningful sense, author Craig Unger will observe in 2007. Instead, they are positioning themselves for the future. “This was a key moment,” one State Department official will recall. “The neocons were maneuvering to put this issue in play and box Clinton in. Now, they could draw a dichotomy. They could argue to their next candidate, ‘Clinton was weak. You must be strong.’” [Unger, 2007, pp. 158]

Entity Tags: Robert B. Zoellick, Vin Weber, William Kristol, William Jefferson (“Bill”) Clinton, Zalmay M. Khalilzad, William Schneider Jr., Richard Perle, William J. Bennett, Richard Armitage, Robert Kagan, Paula J. Dobriansky, Donald Rumsfeld, Craig Unger, Peter Rodman, Elliott Abrams, John R. Bolton, James Woolsey, Francis Fukuyama, Jeffrey T. Bergner, Paul Wolfowitz

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion, Neoconservative Influence

President Clinton creates the new post of National Coordinator for Security, Infrastructure, Protection, and Counterterrorism. He names Richard Clarke for the job, and due to the length of the title, Clarke soon becomes known as the counterterrorism “tsar.” [New York Times, 5/23/1998; Washington Post, 4/2/2000] This position is outlined in a new presidential directive on counterterrorism, Presidential Decision Directive 62 (PDD-62), which also outlines goals of fighting terrorism and attempts to strengthen interagency coordination of counterterrorism efforts. [9/11 Commission, 3/24/2004] Clarke, who had been working on terrorism issues since the start of the Clinton administration, has more symbolic than actual power in the new position. For instance, he only has a staff of 12, compared to a staff of hundreds for the drug “tsar,” and by law he is not allowed to order law enforcement agents, soldiers, or spies to do anything. He does not have any control over budgets. But he is allowed to sit on Cabinet level meetings that involve terrorism. [Clarke, 2004, pp. 170; 9/11 Commission, 7/24/2004, pp. 101] Clarke has a long record of prior government service, beginning in 1973 as a nuclear weapons analyst in the Office of the Secretary of Defense. [CBS News, 3/30/2004] He came to prominence in the Reagan administration as the deputy assistant secretary of state for intelligence from 1985 to 1989. Having left the State Department in 1992, he has spent the past six years on the National Security Council staff. [Washington Post, 3/13/2003; BBC, 3/22/2004; Associated Press, 3/27/2004] After 9/11 Clarke will become well known for his criticisms of the George W. Bush administration (see March 21, 2004 and March 24, 2004), but some who know him consider him to be politically conservative. [Boston Globe, 3/29/2004] According to the Washington Post, many within the Clinton administration view Clarke as a hawk. [Washington Post, 3/23/2004] Robert Gelbard, who worked with him at the State Department in the early 1990s, says he is “no liberal. He is very hawkish.” [US News and World Report, 4/5/2004] Vince Cannistraro, a former CIA official who worked with Clarke in the 1980s, says, “You can’t accuse him of being passive or too liberal on foreign policy.” [Washington Post, 3/23/2004] At the time of the 2000 election he will be a registered Republican, and he votes that year for John McCain in the Republican presidential primary. [New York Times, 3/23/2004; Salon, 3/24/2004; Time, 4/5/2004] Larry DiCara, the former president of the Boston City Council who knew Clarke when he was younger, later recalls: “He was fiercely conservative at a time when just about everyone in Boston was a Democrat.… I’m amazed he worked for [President] Clinton.” Clarke, however, will later praise Clinton, and in an interview in 2002 will describe himself as “not a partisan figure.” [Boston Globe, 3/29/2004]

Entity Tags: Vincent Cannistraro, Larry DiCara, Robert Gelbard, Richard A. Clarke, William Jefferson (“Bill”) Clinton

Timeline Tags: Complete 911 Timeline

The “Team B” intelligence analysis exercise of 1975, which so disastrously overestimated the Soviet threat (see November 1976), returns in the form of the “Rumsfeld Commission,” which issues its report this month. Conservative commentators and former participants have called for a second “Team B”-style competitive intelligence analysis ever since the fall of the Berlin Wall (see 1990, 1994, and 1996). The “Commission to Assess the Ballistic Missile Threat to the United States” (see July 15, 1998), led by former Defense Secretary Donald Rumsfeld, is packed with conservative and neoconservative hardliners much as the original Team B cadre was; it includes some former Team B members such as former Pentagon official Paul Wolfowitz. Like the original Team B, the Rumsfeld Commission challenges CIA estimates of foreign military threats; like the original Team B, the Rumsfeld Commission wildly overestimates the impending threat from countries such as Iran and North Korea, both of which it judges will be capable of striking the US with nuclear weapons in five years or perhaps less. The original Team B findings impelled thirty years of full-bore military spending by the US to counter a Soviet threat that was fading, not growing; the Rumsfeld Commission’s equally alarmist findings impels a new push for spending on the so-called “Star Wars” ballistic missile defense system (see March 23, 1983). Conservative activist Phyllis Schlafly will observe that the Rumsfeld Commission’s report “provided Congress with enough talking points to win the argument [on missile defense] both in the strategic arena and in the 20-second soundbite television debates.” Former State Department intelligence analyst Greg Thielmann will later observe, “time has proven Rumsfeld’s predictions dead wrong.” Author and professor Gordon R. Mitchell will write that the second “Team B” exercise shows “that by 1998, Rumsfeld and Wolfowitz had honed the art of intelligence manipulation through use of competitive intelligence analysis. Retrospective assessments revealing serious flaws in the Team B work products came long after political officials had already converted the alarmist reports into political support for favored military policies.” [Quarterly Journal of Speech, 5/2006 pdf file]

Entity Tags: Strategic Defense Initiative, ’Team B’, Central Intelligence Agency, Commission to Assess the Ballistic Missile Threat to the United States, Donald Rumsfeld, Gordon R. Mitchell, Phyllis Schlafly, Paul Wolfowitz, Greg Thielmann

Timeline Tags: Neoconservative Influence

Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right).Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right). [Source: Associated Press]Two US embassies in Africa are bombed within minutes of each other. At 10:35 a.m., local time, a suicide car bomb attack in Nairobi, Kenya, kills 213 people, including 12 US nationals, and injures more than 4,500. Mohamed al-Owhali and someone known only as Azzam are the suicide bombers, but al-Owhali runs away at the last minute and survives. Four minutes later, a suicide car bomb attack in Dar es Salaam, Tanzania, kills 11 and injures 85. Hamden Khalif Allah Awad is the suicide bomber there. The attacks will be blamed on al-Qaeda. [PBS Frontline, 2001; United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001] The Tanzania death toll is low because, remarkably, the attack takes place on a national holiday so the US embassy there is closed. [Miller, Stone, and Mitchell, 2002, pp. 195] The attack shows al-Qaeda has a capability for simultaneous attacks. The Tanzania bombing appears to have been a late addition, as one of the arrested bombers will allegedly tell US agents that it was added to the plot only about 10 days in advance. [United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001] A third attack against the US embassy in Uganda does not take place due to a last-minute delay (see August 7, 1998). [Associated Press, 9/25/1998] August 7, 1998, is the eighth anniversary of the arrival of US troops in Saudi Arabia and some people will speculate that this is the reason for the date of the bombings. [Gunaratna, 2003, pp. 46] In the 2002 book The Cell, reporters John Miller, Michael Stone, and Chris Mitchell will write: “What has become clear with time is that facets of the East Africa plot had been known beforehand to the FBI, the CIA, the State Department, and to Israeli and Kenyan intelligence services.… [N]o one can seriously argue that the horrors of August 7, 1998, couldn’t have been prevented.” They will also comment, “Inexplicable as the intelligence failure was, more baffling still was that al-Qaeda correctly presumed that a major attack could be carried out by a cell that US agents had already uncovered.” [Miller, Stone, and Mitchell, 2002, pp. 195, 206] After 9/11, it will come to light that three of the alleged hijackers, Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi, had some involvement in the bombings (see October 4, 2001, Late 1999, and 1993-1999) and that the US intelligence community was aware of this involvement by late 1999 (see December 15-31, 1999), if not before.

Entity Tags: Salem Alhazmi, Nawaf Alhazmi, Mohamed al-Owhali, Hamden Khalif Allah Awad, Khalid Almihdhar, Al-Qaeda, Azzam

Timeline Tags: Complete 911 Timeline

El Shifa Plant in Sudan.El Shifa Plant in Sudan. [Source: US government]The US fires 66 missiles at six al-Qaeda training camps in Afghanistan and 13 missiles at a pharmaceutical factory in Khartoum, Sudan, in retaliation for the US embassy bombings. [Washington Post, 10/3/2001] The US insists the attacks are aimed at terrorists “not supported by any state,” despite obvious evidence to the contrary. The Sudanese Al Shifa factory is hit in the middle of the night when it is unoccupied. Intelligence will later suggest that the factory had no links to bin Laden (see September 23, 1998). Between six and 30 people are killed in the Afghanistan attacks. But no important al-Qaeda figures die. [Observer, 8/23/1998; New Yorker, 1/24/2000; Wright, 2006, pp. 285] At least one of the missiles accidentally landed inside Pakistan and Pakistan may have been able to build their own cruise missile from examining the remains. There are additional reports that bin Laden was able to sell unexploded missiles to China for more than $10 million. [Wright, 2006, pp. 285] President Clinton is soon widely accused of using the missile strike to distract the US public from a personal sex scandal (see August 17-Late August 1998).

Entity Tags: Al-Qaeda, Clinton administration

Timeline Tags: Complete 911 Timeline

President Clinton issues Presidential Decision Directive 67 (PDD-67), which updates the US Continuity of Government (COG) program in line with the emerging threat posed by terrorists. [Clarke, 2004, pp. 166-167 and 170; Washington Post, 6/4/2006] PDD-67, “Enduring Constitutional Government and Continuity of Government Operations,” requires agencies to plan for governmental continuity if the US is hit by a major terrorist attack. [Knight Ridder, 11/17/1999; Federation of American Scientists, 12/12/2000] The directive is classified and there is no White House fact sheet summarizing its contents. [Federation of American Scientists, 12/12/2000; US Congress. House. Committee on Government Reform, 4/22/2004] But according to Energy Department documents, the new COG plan “could be triggered by an event worse than what’s expected from the Y2K problem and comparable to the 1995 Oklahoma City bombing.” [Knight Ridder, 11/17/1999] According to the Washington Post, the result of PDD-67 will be that “every single government department and agency [is] directed to see to it that they could resume critical functions within 12 hours of a warning, and keep their operations running at emergency facilities for up to 30 days.” [Washington Post, 6/4/2006] The directive puts the Federal Emergency Management Agency (FEMA)—which is responsible for planning for and responding to disasters—in charge of the COG program. [US Congress. House. Committee on Government Reform, 4/28/2005, pp. 4 pdf file] Within FEMA, the Office of National Security Affairs will specifically be responsible for COG activities. [Larson and Peters, 2001, pp. 103] FEMA’s responsibilities will include providing guidance for agencies to develop their continuity plans (see July 26, 1999), and the coordination of interagency exercises. [US Congress. House. Committee on Government Reform, 4/28/2005, pp. 4 pdf file] Richard Clarke, who has now been appointed counterterrorism “tsar” (see May 22, 1998), drafted PDD-67 earlier in the year (see Early 1998). [Clarke, 2004, pp. 166-167] The COG plan will be activated for the first time on the morning of 9/11 (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). [ABC News, 4/25/2004]

Entity Tags: William Jefferson (“Bill”) Clinton

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Princess Diana at a mine field in Angola in 1997.Princess Diana at a mine field in Angola in 1997. [Source: Tim Graham / Corbis]The NSA admits that US intelligence agencies possess 1,056 pages of classified information regarding Britain’s Princess Diana. British tabloids portray the documents as rife with salacious information on Diana’s “most intimate love secrets” about her relationship with Egyptian billionaire Dodi al-Fayed, but the actual documentation may not be so lurid. The NSA recently denied a Freedom of Information request from the Internet news service APB Online about information it has collected on Diana, who died in a tragic car accident in 1997. (It is unclear whether US intelligence has any unreleased information about the circumstances of Diana’s death. [APB Online, 11/30/1998; Washington Post, 12/12/1998] The NSA has denied monitoring Diana on the night of her death, an allegation raised by The Observer in 2006.) [MSNBC, 12/11/2006] In the two-page letter denying the request, the NSA admits to possessing a “Diana file,” but refuses to divulge what is in that file. A US intelligence official says the information is made up of conversations between other people who mentioned Diana; the references to Diana in those intercepted conversations are “incidental.” The official says Diana was never a particular target of the NSA’s Echelon surveillance program. However, the NSA has classified 124 pages of the “Diana documents” as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security.” According to a recent report by the European Parliament, the NSA routinely monitors virtually “all e-mail, telephone and fax communications… within Europe” (see July 11, 2001). Intelligence expert Steven Aftergood of the Federation of American Scientists says “the US and our allies promiscuously collect electronic communications around the world. Whether the descriptions of Echelon are accurate or not, that much is definitely true.” Some believe that lurid snippets of information leaked to the British press regarding Diana’s affair with Fayed, and her ambivalent relationship with Prince Charles, may have come from Echelon wiretaps and surveillance. Another FAS scientist, John Pike, says the NSA and other US intelligence agencies may have been monitoring Diana to protect her from terrorist attacks. Pike says it is also possible she may have been monitored because of her involvement in banning land mines, a position opposed by the Pentagon. [APB Online, 11/30/1998; Washington Post, 12/12/1998] Former NSA official Wayne Madsen will say in 2000, “[W]hen NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?” [CBS News, 2/27/2000] In August 1999, the NSA will deny another Freedom of Information request about its “Diana file” from the British newspaper The Guardian. [Guardian, 8/6/1999]

Entity Tags: Steven Aftergood, Prince Charles, The Guardian, John Pike, Dodi al-Fayed, Echelon, Federation of American Scientists (FAS), National Security Agency, Princess Diana

Timeline Tags: Civil Liberties

Richard Barlow, a former intelligence analyst who was repeatedly fired for correctly claiming that Pakistan had a nuclear weapons program (see 1981-1982, August 1987-1988 and August 4, 1989), is awarded a total of $1 million by President Bill Clinton in compensation for the treatment he received. However, Barlow does not receive the money, as the settlement has to be ratified by Congress. When it runs into procedural problems, it is moved to the Court of Federal Claims to be reviewed. After Clinton is replaced by George W. Bush, CIA Director George Tenet and NSA Director Michael Hayden assert the government’s “state secrets privilege” (see March 9, 1953) over Barlow’s entire legal claim, causing it to collapse due to lack of evidence. [Guardian, 10/13/2007]

Entity Tags: William Jefferson (“Bill”) Clinton, Richard Barlow, National Security Agency, Michael Hayden, Court of Federal Claims, Central Intelligence Agency, George J. Tenet

Timeline Tags: A. Q. Khan's Nuclear Network

Wissam al-Zahawie, Iraq’s ambassador to the Vatican, sets off on a trip to several African countries as part of an effort to convince African heads of state to visit Iraq. Saddam Hussein hopes that these visits will help break the embargo on flights to Iraq and undermine the UN sanctions regime. Zahawie’s first stop is Niger, where he meets with the country’s President Ibrahim Bare Mainassara for one hour. Mainassara promises that he will visit Baghdad the following April. (He is assasinated before he has an opportunity to do this.) [Sunday Herald (Glasgow), 7/13/2003; Independent, 8/10/2003; Time, 10/2/2003; New Yorker, 10/27/2003] In early 2002, the Italian military intelligence service, SISMI, will allege in a report (see February 5, 2002) sent to the US that the motive behind the visit is to discuss the future purchase of uranium oxide, also known as “yellowcake” (see October 15, 2001). [New Yorker, 10/27/2003] However, no one at this time suggests that the trip’s motives have anything to do with acquiring uranium. Zahawie’s trip is reported in the local newspaper as well as by a French news agency. The US and British governments are aware of the trip and show no concern about Niger, which is actively seeking economic assistance from the United States. [New Yorker, 10/27/2003] In 2003, al-Zawahie will tell British reporters: “My only mission was to meet the president of Niger and invite him to visit Iraq. The invitation and the situation in Iraq resulting from the genocidal UN sanctions were all we talked about. I had no other instructions, and certainly none concerning the purchase of uranium.” [Independent, 8/10/2003]

Entity Tags: Wissam al-Zahawie, Ibrahim Bare Mainassara

Timeline Tags: Niger Uranium and Plame Outing

Yellowcake.Yellowcake. [Source: CBC]Pakistani nuclear scientist A. Q. Khan takes a trip to West Africa. Ostensibly, he is going to oversee the construction of the Hendrina Khan Hotel in Timbuktu, Mali, which he bought the year before and is named after his wife, but it is believed that is just a cover for nuclear-related business. He spends several days in Khartoum, Sudan, where he is spotted touring the al-Shifa factory, bombed by the US the year before in response to al-Qaeda bombings in Africa (see August 20, 1998). In 2006, intelligence sources in India and Israel will claim that Khan actually partly owns the factory. Khan then travels to N’Djamena, the capital of Chad, Timbuktu in Mali, and Niamey, the capital of Niger. Niger has considerable uranium deposits and had been a major supplier of yellowcake uranium to Pakistan in the 1970s. Khan returns to Sudan, where he meets with the Sudanese president, and then returns to Pakistan. He is accompanied by his top nuclear aides and a number of Pakistani generals, and all expenses on the trip are paid for by the Pakistani government.
CIA Investigates Khan Trip - CIA undercover agent Valerie Plame Wilson learns about the trip, and the CIA is so concerned that it launches an investigation, especially to find out if Khan could be buying yellowcake from Niger. Plame Wilson’s husband Joseph Wilson, a former National Security Council official and US ambassador to the nearby country of Gabon who has close ties to important politicians in Niger, and who who has just set up a private consulting firm with a focus on advising clients who want to do business in Africa, is approached by officials from the CIA’s National Resources Division (NR) to visit Niger. The agency asks Wilson, who already has a business trip planned to West Africa, to find out what he can about Khan’s trip.
Illicit Uranium Sales Highly Unlikely - Wilson concludes that illicit uranium sales are very unlikely since the French government tightly controls Niger’s uranium mines and uranium sales. However, Khan’s trip does raise concern that he could be working with Osama bin Laden, because of his interest in the al-Shifa factory in Sudan, and because of intelligence that the hotel he owns in Timbuktu was paid for by bin Laden as part of a cooperative deal between them. The CIA writes and distributes a report on the trip. (In 2004, the Senate Intelligence Committee will erroneously conclude that the CIA did not distribute the Wilson-Niger report—see July 9, 2004.) Wilson will keep this trip secret, even refusing to mention it in his 2004 memoir The Politics of Truth, presumably because he signed a confidentiality agreement with the CIA. In 2002, he will return to Niger to investigate if Saddam Hussein could be buying uranium in Niger (see February 21, 2002-March 4, 2002). That will lead to the eventual outing of his wife Plame Wilson’s status as a CIA agent. [Levy and Scott-Clark, 2007, pp. 283-285, 516; Wilson, 2007, pp. 358-360]

Entity Tags: Valerie Plame Wilson, Abdul Qadeer Khan, Osama bin Laden, Joseph C. Wilson

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network, Niger Uranium and Plame Outing

Valerie Plame Wilson, a covert CIA agent (see Fall 1992 - 1996) posing as an energy executive, lists “Brewster-Jennings & Assoc.” as her employer when making a $1,000 donation to the presidential campaign of Al Gore (D-TN). “Brewster Jennings” will later be revealed to be a CIA front company (see October 3, 2003). [FactCheck (.org), 7/22/2005; Chicago Tribune, 3/11/2006]

Entity Tags: Valerie Plame Wilson, Central Intelligence Agency, Brewster Jennings

Timeline Tags: Niger Uranium and Plame Outing

Former President George H. W. Bush, a former director of the CIA, speaks at the dedication ceremony of the new intelligence center bearing his name. In the course of his speech, Bush says: “We need more human intelligence. That means we need more protection for the methods we use to gather intelligence and more protection for our sources, particularly our human sources, people that are risking their lives for their country.… I have nothing but contempt and anger for those who betray the trust by exposing the name of our sources. They are, in my view, the most insidious, of traitors.” [Central Intelligence Agency, 4/26/1999] These remarks will later be unearthed in conjunction with the White House’s leaking of the identity of covert CIA agent Valerie Plame Wilson (see June 23, 2003, July 7, 2003, 8:30 a.m. July 8, 2003, July 8, 2003, 11:00 a.m. July 11, 2003, Late Afternoon, July 12, 2003, and Before July 14, 2003), and the publication of her name and status by conservative columnist Robert Novak (see July 14, 2003).

Entity Tags: George Herbert Walker Bush, Bush administration (43), Robert Novak, Central Intelligence Agency, Valerie Plame Wilson

Timeline Tags: Niger Uranium and Plame Outing

A businessman reportedly approaches Nigerien Prime Minister Ibrahim Mayaki and insists that he meet with an Iraqi delegation to discuss “expanding commercial relations” between Niger and Iraq. Mayaki reportedly interprets “expanding commercial relations” to mean that Iraq is interested in discussing uranium sales. According to Mayaki, he does meet the delegation but avoids discussion of trade issues because of UN sanctions on the country. They reportedly never discuss what the businessman had meant when he said Iraq was interested in “expanding commercial relations.” [US Congress, 7/7/2004] A US embassy official later tells former ambassador Joseph Wilson, who himself will visit Niger to determine the facts behind American concerns that Iraq is attempting to secure Nigerien uranium (see Fall 1999), that Mayaki is extremely wary of dealing with Iraq, and keeps the conversations on very general levels. The Iraqi may have wanted to discuss uranium, the embassy official later recalls, but nothing is ever said on the subject. Wilson later learns from the official that Mayaki speaks to the Iraqi information minister, Muhammad Saeed al-Sahhaf, disparagingly called “Baghdad Bob” by the Americans. At the time, Wilson is not aware of the Iraqi’s identity, so he does not include the name in his report to the CIA. [Wilson, 2004, pp. 27-28] Alan Foley, the director of the CIA’s Nonproliferation Center (see February 5, 2003), will later tell a reporter that an item in Wilson’s report (see March 4-5, 2002) leads him to believe that there may be some truth to the Iraq-Niger allegations. Writing about Foley’s assertion in 2004, Wilson says he believes that Foley is referring to the 1999 conversation between the embassy official and al-Sahhaf. Wilson will ask, “Could it be that we went to war over a conversation in which the word ‘uranium’ was not spoken at all?” The Nigerien official later tells Wilson that he wondered if al-Sahhaf might have intended to ask about a possible uranium deal in subsequent conversations. “Was that the smoking gun that could supposedly have become a mushroom cloud?” Wilson will ask. “And so is it possible that, because of that non-conversation, [thousands of] Americans have been killed, and [billions] of national treasure spent?” [Wilson, 2004, pp. 424]

Entity Tags: Muhammad Saeed al-Sahhaf, Joseph C. Wilson, Ibrahim Mayaki, Alan Foley

Timeline Tags: Niger Uranium and Plame Outing

Former ambassador Joseph Wilson, who has spent much of his political career representing the US in West Africa, visits Niger at the behest of the CIA to investigate what a Senate investigation (see July 9, 2004) will later call “uranium-related matters.” Wilson is chosen in part because his wife, covert CIA official Valerie Plame Wilson, suggested that since he was going to Niger on business in the near future, he “might be willing to use his contacts in the region” to obtain information. The CIA is interested in a meeting between Niger’s former prime minister, Ibrahim Mayaki, and a delegation from Iraq to discuss “expanding commercial relations” between the two nations. Wilson will later say that the subject of uranium never comes up in a meeting he has with Mayaki (see May 2, 2004). However, CIA analysts will interpret Wilson’s information to mean that Mayaki “interpreted ‘expanding commercial relations’ to mean that the [Iraqi] delegation wanted to discuss uranium yellowcake sales.” The CIA will believe that Wilson’s report bolsters its own suspicions that Iraq is attempting to buy yellowcake uranium from Niger. An intelligence officer will later report that Mayaki indicated that the Iraqis had expressed an interest in buying uranium from Niger. [FactCheck (.org), 7/26/2004; FactCheck (.org), 7/22/2005]

Entity Tags: Ibrahim Mayaki, Central Intelligence Agency, Valerie Plame Wilson, Joseph C. Wilson

Timeline Tags: Niger Uranium and Plame Outing

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

On January 6, 2000, the CIA station in Malaysia begins passing details from the Malaysian government’s surveillance of the al-Qaeda summit in Kuala Lumpur, Malaysia, to the CIA Counterterrorist Center (CTC) (see January 5-8, 2000 and January 5-8, 2000 and Shortly After). Cofer Black, head of the CTC, orders that he be continually informed about the meeting. CIA Director George Tenet is frequently informed as well. They are given continual updates until the meeting ends on January 8. [Stern, 8/13/2003] National Security Adviser Sandy Berger, FBI Director Louis Freeh, and other top officials are briefed, but apparently President Clinton is not. [Bamford, 2004, pp. 225-26] However, it appears that the CIA deliberately and repeatedly fails to tell the FBI that one attendee, future 9/11 hijacker Khalid Almihdhar, has an active visa to visit the US (see Mid-July 2004, January 6, 2000, and January 5-6, 2000). No evidence will be presented suggesting anyone else outside the CIA is told this crucial fact either. The Malaysia summit ends on January 8. [9/11 Commission, 7/24/2004, pp. 237] Officially, the CIA will later claim to have lost future hijackers Alhazmi and Almihdhar as they left the meeting (see January 8, 2000). However, Almihdhar will later report back to al-Qaeda that he thought he was followed to the US (see Mid-July 2000). It will not be reported whether any of the other attendees are monitored after leaving the meeting.

Entity Tags: Sandy Berger, Nawaf Alhazmi, William Jefferson (“Bill”) Clinton, Khalid Almihdhar, Counterterrorist Center, George J. Tenet, Central Intelligence Agency, Cofer Black, Louis J. Freeh

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The al-Qaeda summit in Malaysia (see January 5-8, 2000) ends and the participants leave. Hijackers Nawaf Alhazmi and Khalid Almihdhar fly to Bangkok, Thailand, with al-Qaeda leader Khallad bin Attash (see January 8, 2000). Other attendees depart to other locales. There have been no media reports that any of the others were followed by intelligence agents. [Associated Press, 9/20/2002; US Congress, 7/24/2003, pp. 131 pdf file] Before the summit started the CIA knew one attendee was named Khalid Almihdhar and that another had the first name Nawaf. At the end of the summit the CIA appears to have learned little more, and still does not know Nawaf’s last name is Alhazmi. Around this time, on January 7 and 10, the CIA searches for their names in their databases but get no hits. Yet they don’t ask for a search of the much larger NSA databases, which had vital information on them (see Early 1999). CIA headquarters asks the NSA to put Almihdhar on their watch list so they can pass on more information about him (see Mid-January 2000). However, neither Alhazmi nor Almihdhar are placed on the State Department’s watch list, which would actually prevent them from coming to the US. [9/11 Commission, 1/26/2004] The CIA still fails to tell the FBI that Almihdhar has a valid US visa, and in fact seems to go out of their way not to tell the FBI about it (see 9:30 a.m. - 4:00 p.m. January 5, 2000, January 6, 2000, Mid-July 2004, and January 5-6, 2000). [US Congress, 7/24/2003, pp. 131 pdf file; Stern, 8/13/2003]

Entity Tags: Central Intelligence Agency, Khalid Almihdhar, Al-Qaeda, Nawaf Alhazmi, Khallad bin Attash

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Judy Palya Loether.Judy Palya Loether. [Source: SecrecyFilm (.com)]Judy Palya Loether, the daughter of a civilian engineer killed in a 1948 plane crash while on a secret government mission (see October 6, 1948), reads over the voluminous reports of the accident that claimed her father’s life. The reports, now declassified (see January 1996), had been at the heart of a landmark lawsuit that gave judicial recognition to the government’s “state secrets” privilege (see March 9, 1953). Loether is shocked to find that the reports contain nothing that could be construed as military or tactical secrets of any kind, though for decades the government has insisted that they could not be revealed, even to a judge (see October 18, 1948, July 26, 1950, August 7-8, 1950, September 21, 1950, and October 19, 1951). What they do contain is a compendium of witness statements and expert findings that indicate a number of mistakes and errors led to the crash. Loether begins contacting the families of the widows who had filed the original lawsuit against the government (seeJune 21, 1949) to share her findings. [Siegel, 2008, pp. 210-211] Loether is confused and angered over the contents of the reports, and the government’s response to the lawsuit. She cannot understand why the government pressed so hard to keep the reports classified, knowing that they contained no sensitive information about the secret missile program, and is particularly troubled by the fact that at least two senior government officials signed affidavits affirming the reports’ inclusion of such information while knowing that the reports contained nothing of the sort. She wonders if government officials had perhaps decided to lie about the reports in order to establish some sort of state secrets privilege. In September 2002, lawyers Wilson Brown and Jeff Almeida, retained by Loether and others who lost family members in the crash, come to the same conclusion. As Almeida will say to Brown: “I’ve read this report. There’s nothing in there.” [Siegel, 2008, pp. 219] As time goes on, Loether and her colleagues files a second lawsuit seeking to overturn the first Supreme Court verdict (see February 26, 2003).

Entity Tags: Wilson Brown, Jeff Almeida, Judy Palya Loether

Timeline Tags: Civil Liberties

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

John Yoo, an associate law professor at the University of California at Berkeley, makes a presentation at a Cato Institute seminar on executive power. Yoo, who will go on to become one of the Bush administration’s primary advocates of unchecked executive power (see March 1996), accuses the Clinton administration of upending the Constitution to give the executive branch unwarranted authority (see March 24 - Mid-June, 1999). “[T]he Clinton administration has undermined the balance of powers that exist in foreign affairs, and [they] have undermined principles of democratic accountability that executive branches have agreed upon well to the Nixon administration,” he says. Regarding the Clinton administration’s stretched interpretation of the Anti-Ballistic Missile Treaty (see June 2000), Yoo says that the Clinton “legal arguments are so outrageous, they’re so incredible, that they actually show, I think, a disrespect for the idea of law, by showing how utterly manipulatible it is.” [Savage, 2007, pp. 67]

Entity Tags: Bush administration (43), John C. Yoo, Nixon administration, Clinton administration

Timeline Tags: Civil Liberties

People involved in the 2000 PNAC report (from top left): Vice
President Cheney, Florida Governor Jeb Bush, Defense Secretary Rumsfeld,
Deputy Defense Secretary Paul Wolfowitz, Cheney Chief of Staff I. Lewis
Libby, Undersecretary of State John Bolton, Undersecretary of Defense Dov
Zakheim, and author Eliot Cohen.
People involved in the 2000 PNAC report (from top left): Vice President Cheney, Florida Governor Jeb Bush, Defense Secretary Rumsfeld, Deputy Defense Secretary Paul Wolfowitz, Cheney Chief of Staff I. Lewis Libby, Undersecretary of State John Bolton, Undersecretary of Defense Dov Zakheim, and author Eliot Cohen. [Source: Public domain]The neoconservative think tank Project for the New American Century writes a “blueprint” for the “creation of a ‘global Pax Americana’” (see June 3, 1997). The document, titled Rebuilding America’s Defenses: Strategies, Forces and Resources for a New Century, was written for the George W. Bush team even before the 2000 presidential election. It was written for future Vice President Cheney, future Defense Secretary Rumsfeld, future Deputy Defense Secretary Paul Wolfowitz, Florida Governor and Bush’s brother Jeb Bush, and Cheney’s future chief of staff Lewis Libby. [Project for the New American Century, 9/2000, pp. iv and 51 pdf file]
Plans to Overthrow Iraqi Government - The report calls itself a “blueprint for maintaining global US preeminence, precluding the rise of a great power rival, and shaping the international security order in line with American principles and interests.” The plan shows that the Bush team intends to take military control of Persian Gulf oil whether or not Saddam Hussein was in power and should retain control of the region even if there is no threat. It says: “The United States has for decades sought to play a more permanent role in Gulf regional security. While the unresolved conflict with Iraq provides the immediate justification, the need for a substantial American force presence in the Gulf transcends the issue of the regime of Saddam Hussein.” The report calls for the control of space through a new “US Space Forces,” the political control of the internet, the subversion of any growth in political power of even close allies, and advocates “regime change” in China, North Korea, Libya, Syria, Iran and other countries. It also mentions that “advanced forms of biological warfare that can ‘target’ specific genotypes may transform biological warfare from the realm of terror to a politically useful tool” (see February 7, 2003). [Project for the New American Century, 9/2000 pdf file; Sunday Herald (Glasgow), 9/7/2002]
Greater Need for US Role in Persian Gulf - PNAC states further: “The United States has for decades sought to play a more permanent role in Gulf regional security. While the unresolved conflict with Iraq provides the immediate justification, the need for a substantial American force presence in the Gulf transcends the issue of the regime of Saddam Hussein.”
'US Space Forces,' Control of Internet, Subversion of Allies - PNAC calls for the control of space through a new “US Space Forces,” the political control of the Internet, and the subversion of any growth in political power of even close allies, and advocates “regime change” in China, North Korea, Libya, Syria, Iran, and other countries.
Bioweapons Targeting Specific Genotypes 'Useful' - It also mentions that “advanced forms of biological warfare that can ‘target” specific genotypes may transform biological warfare from the realm of terror to a politically useful tool.”
'A New Pearl Harbor' - However, PNAC complains that thes changes are likely to take a long time, “absent some catastrophic and catalyzing event—like a new Pearl Harbor.” [Los Angeles Times, 1/12/2003]
Bush Will Claim a 'Humble' Foreign Policy Stance - One month later during a presidential debate with Al Gore, Bush will assert that he wants a “humble” foreign policy in the Middle East and says he is against toppling Saddam Hussein in Iraq because it smacks of “nation building” (see October 11, 2000). Around the same time, Cheney will similarly defend Bush’s position of maintaining President Clinton’s policy not to attack Iraq, asserting that the US should not act as though “we were an imperialist power, willy-nilly moving into capitals in that part of the world, taking down governments.” [Washington Post, 1/12/2002] Author Craig Unger will later comment, “Only a few people who had read the papers put forth by the Project for a New American Century might have guessed a far more radical policy had been developed.” [Salon, 3/15/2004] A British member of Parliament will later say of the PNAC report, “This is a blueprint for US world domination—a new world order of their making. These are the thought processes of fantasist Americans who want to control the world.” [Sunday Herald (Glasgow), 9/7/2002] Both PNAC and its strategy plan for Bush are almost virtually ignored by the media until a few weeks before the start of the Iraq war (see February-March 20, 2003).

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). [Truthout (.org), 1/17/2006] In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. [New York Times, 12/16/2007]

Entity Tags: Bush administration (43), National Security Agency

Timeline Tags: Civil Liberties

The Bush team moves into Washington. Neoconservative Zalmay Khalilzad heads the Pentagon transition team, and he ensures that plenty of his friends and colleagues move into the civilian offices of the Defense Department. Four of the most influential advocates for the US overthrow of Iraq’s Saddam Hussein—Elliott Abrams, Douglas Feith, Richard Perle, and Abram Shulsky—are waiting to learn where they will serve in the department. But Vice President Cheney is still concerned with ensuring the placement of his own colleagues and cronies who will help him build what many will call the “imperial presidency.” Secretary of State Colin Powell, Cheney’s ideological rival, is working to install his friend and colleague Richard Armitage as deputy secretary of defense. For Cheney, Armitage would be a calamity—although Armitage is sufficiently hardline and in line with conservative foreign policy aims, he is far too centrist for Cheney and the neoconservatives. The neoconservative magazine the Weekly Standard alerts the faithful to the potential problem with an article entitled “The Long Arm of Colin Powell: Will the Next Secretary of State Also Run the Pentagon?” Powell does not get his wish; Armitage eventually becomes deputy secretary of state. Abrams will join the National Security Council; Khalilzad, Feith, and Shulksy will join the Defense Department; and Perle will head the Defense Policy Board, an independent group that advises the Pentagon. [Weekly Standard, 12/25/2000 pdf file; Unger, 2007, pp. 115, 191-192, 204, 249]

Entity Tags: Elliott Abrams, Colin Powell, Bush administration (43), Abram Shulsky, Douglas Feith, Richard (“Dick”) Cheney, Richard Armitage, US Department of Defense, Richard Perle, Weekly Standard, Zalmay M. Khalilzad, Saddam Hussein

Timeline Tags: Neoconservative Influence

Future 9/11 Commission Executive Director Philip Zelikow is not offered a job in the Bush administration, and returns to the Miller Center of Public Affairs at the University of Virginia to teach. Zelikow had worked on the transition team (see January 3, 2001), and thought he would receive an important position in the new administration. He told his friends he thought he was in line for the position of deputy national security adviser to Condoleezza Rice, with whom he had written a book in the mid-1990s (see 1995). Most people in the Bush administration admire his ability, but find him hard to work with. White House Chief of Staff Andrew Card will even describe Zelikow as a “bully” historian. Author Philip Shenon will later comment that Zelikow is “perplexed that his talents had not been recognized by the people who handed out the best jobs in the Bush administration.” After returning to university, Zelikow will lobby the White House to make the university where he works the official repository of its oral history. His point of contact at the White House is political adviser Karl Rove. [Shenon, 2008, pp. 42-44]

Entity Tags: Andrew Card, Karl C. Rove, Philip Shenon, Philip Zelikow

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Condoleezza Rice and Philip Zelikow.Condoleezza Rice and Philip Zelikow. [Source: Public domain]National Security Adviser Rice decides this day to retain Richard Clarke, counterterrorism “tsar” for the Clinton administration, and his staff. However, she downgrades his official position as National Coordinator for Counterterrorism. While he is still known as the counterterrorism “tsar,” he has less power and now reports to deputy secretaries instead of attending Cabinet-level meetings. He no longer is able to send memos directly to the president, or easily interact with Cabinet-level officials. [Clarke, 2004, pp. 227-30; Guardian, 3/25/2004] Clarke will not be able to meet with President Bush even a single time before 9/11 to discuss al-Qaeda (see January 25, 2001-September 10, 2001). In 2004, Rice will reveal that the person she tasks with considering changes to Clarke and his staff is Philip Zelikow, the future Executive Director of the 9/11 Commission. Zelikow recuses himself from those parts of the 9/11 Commission’s investigation directly relating to his role in this and other matters. However, 9/11 victims’ relatives are not satisfied. For instance, one relative says, “Zelikow has conflicts. I’m not sure that his recusal is sufficient. His fingerprints are all over that decision [to demote Clarke].” [United Press International, 4/9/2004]

Entity Tags: Philip Zelikow, Richard A. Clarke, Condoleezza Rice

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Shortly after George W. Bush is inaugurated, “[k]ey personnel, long-time civilian professionals” at the Pentagon’s Near East South Asia (NESA) desk are moved or replaced with people from neoconservative think tanks. [American Conservative, 12/1/2003; Mother Jones, 1/2004] Joe McMillan, the Office Director, is moved to a new location outside of the Pentagon, which according to Karen Kwiatkowski, who works at the NESA desk, is odd because “the whole reason for the Office Director being a permanent civilian (occasionally military) professional is to help bring the new appointee up to speed, ensure office continuity, and act as a resource relating to regional histories and policies.” [American Conservative, 12/1/2003; Mother Jones, 1/2004; Salon, 3/10/2004] Larry Hanauer, who has long been at the Israel-Syria-Lebanon desk and who is known to be “even-handed with Israel,” is replaced by David Schenker of the Washington Institute. [American Conservative, 12/1/2003; Mother Jones, 1/2004] Other veteran NESA employees who are banished include James Russell, who has served as the country director for Saudi Arabia, Kuwait and the United Arab Emirates, and Marybeth McDevitt, the country director for Egypt. [Mother Jones, 1/2004]

Entity Tags: Marybeth McDevitt, David Schenker, Larry Hanauer, James Russell, Karen Kwiatkowski, Joe McMillan

Timeline Tags: Events Leading to Iraq Invasion, Neoconservative Influence

Counterterrorism “tsar” Richard Clarke submits a comprehensive plan to deal with al-Qaeda within days of President Bush’s inauguration (see January 25, 2001). He wants to meet with Bush directly to discuss it with him, but he is unable to do so before 9/11. Clarke will later recall, “I asked for a meeting with the president several times beginning, in fact, before [National Security Adviser] Rice even took office in the transition briefing. I said I have given this briefing to the vice president, I’ve given it to the secretary of state, I’ve given it now to you, I would like to give it to the president. And what I was told was I could brief the president on terrorism after the policy development process had been completed.” He does have one meeting with Bush before 9/11, but only to discuss cyber security because Clarke is planning to quit his current job to focus on that issue instead (see June 2001). When asked why he didn’t bring up al-Qaeda at that meeting, Clarke will reply, “Because I had been told by Dr. Rice and her deputy that this was a briefing on countering the cyber threats and not on al-Qaeda and that I would have my opportunity on al-Qaeda if I just held on, eventually they would get to it, probably in September.” [ABC News, 4/8/2004] The Bush administration had downgraded Clarke’s position in early January 2001 and he was no longer able to send memos directly to the president as he could during the Clinton administration (see January 3, 2001).

Entity Tags: Richard A. Clarke, George W. Bush, Condoleezza Rice

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Just after assuming the presidency, George W. Bush tells reporters, “We’re going to have a frank dialogue about a lot of issues, and I’m going to start by reminding that we know the difference between the executive branch and the legislative branch, but I do believe the president and the vice president can play a part, a strong part, in helping advance an American agenda.” [Congress Daily, 6/29/2007]

Entity Tags: George W. Bush, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

The NSA asks Qwest, a major US telecommunications firm and a cutting-edge provider of high-tech wireless and Internet connectivity, to reveal information about its customers and their phone calls. Qwest’s CEO, Joe Nacchio, refuses after meeting with NSA officials and deciding that the program is illegal without court orders (see February 27, 2001). The NSA refuses to seek court authorization for its wiretaps and electronic surveillance. The NSA will renew its request from Qwest after the 9/11 attacks, and will also ask the firm to help it track suspected terrorists. Other telecommunications firms such as Verizon, AT&T, and BellSouth, will comply with the NSA’s requests (see February 2001 and Beyond).
Fears of a 'Digital Pearl Harbor' - According to a former White House official, the NSA’s primary purpose before 9/11 is to watch for computer hackers and foreign-government agents trying to hack into the government’s computer information systems, particularly those within the Defense Department. Government officials fear a “digital Pearl Harbor” if hackers were ever to seize control of those systems or other key US infrastructures. The former official will say in 2007 that the NSA’s proposal to Qwest is, “Can you build a private version of Echelon and tell us what you see?” Echelon is the NSA’s enormous signals intelligence (SIGINT) network used by the agency and its counterparts in Australia, Canada, New Zealand, and Britain. Qwest is constructing a high-speed network for phone and Internet traffic, and the NSA wants Qwest to keep records of its customers’ transactions for it. The NSA, another source will say, wants to analyze call, e-mail, and other transmissions’ traffic patters for signs of suspicious activity. The White House official will say that telecom firms such as Qwest “have an enormous amount of intelligence-gathering” capability. They don’t have to target individual customers to “look for wacky behavior,” or “groups communicating with each other in strange patterns.” Such information could augment intelligence that the NSA and other agencies were gathering from other sources, and enable the NSA to collect the information it wants without violating laws prohibiting it and other intelligence agencies from directly gathering data on US citizens.
Ill Will from NSA - Nacchio’s refusal to go along with the NSA’s request garners it some ill will among the US intelligence community, the former White House official will say. Nacchio will contend that because of his refusal, the NSA denied Qwest a lucrative government contract. A former high-level intelligence official will add that other telecom companies had little problem agreeing to the NSA’s requests. Nacchio believes that the NSA’s request is illegal under the Telecommunications Act without court orders; the former White House official will acknowledge that it might violate the 1986 Electronic Communications Privacy Act. After 9/11, that law will be amended by the USA Patriot Act to give the government more room to monitor US citizens.
Qwest, Other Telecom Firms Cooperative with Other Agencies - Qwest is apparently less reluctant to share other information with the Pentagon. Qwest began sharing its technology and information as far back as 1997 (see 1997). In May 2001, Commerce Secretary Don Evans will tell the Senate Appropriations Committee that his department helped persuade Qwest to “share proprietory information with the Defense Department to evaluate the vulnerability of its network.” Qwest, which serves the Rocky Mountain and West Coast regions of the country, covers the areas that house some of the military’s most important command-and-control facilities, including the US Strategic Command. In the 1990s, Qwest began actively pursuing contracts with the Defense Department to build more modern, private, secure networks for defense and intelligence agencies. [National Journal, 11/2/2007]
Meetings with Bush Officials - In court documents filed in 2006 to challenge his prosecution for insider trading and, in heavily redacted form, released to the public in 2007, Nacchio will indicate that telecom executives met frequently with Bush administration officials before 9/11, including Deputy Defense Secretary Paul Wolfowitz, National Security Adviser Condoleezza Rice, NSA Director Michael Hayden, and counterterrorism “tsar” Richard Clarke. Many telecom firms are working closely with the government to develop highly classified operations, including joint networks to which the government will have unfettered access. The future director of national intelligence, Mike McConnell, works with telecom firms to expand the cooperation between the telecom industry and the federal government. [Salon, 10/15/2007]

Entity Tags: Condoleezza Rice, US Department of Defense, Bush administration (43), Verizon Communications, AT&T, US Department of Commerce, Senate Appropriations Committee, US Strategic Command, BellSouth, Donald L. Evans, Echelon, Richard A. Clarke, Qwest, Mike McConnell, National Security Agency, Joe Nacchio, Paul Wolfowitz

Timeline Tags: Civil Liberties

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Timeline Tags: Civil Liberties

Nicky Hager.Nicky Hager. [Source: Rotorua District Council]New Zealand journalist Nicky Hager appears before a European Parliament investigative committee to testify about the US’s satellite surveillance program, Echelon (see July 11, 2001). Hager has discovered information about Echelon’s use by the New Zealand equivalent of the NSA, the Government Communication Security Bureau (GCSB). In researching Echelon’s use by the USA, Canada, Britain, Australia, and New Zealand, Hager learned of the extent of the system’s “capability to monitor the whole of governments, regional and international organizations, non-government organizations, companies and individuals throughout Europe.” Although Hager warns the committee not to focus exclusively on Echelon’s use for corporate benefits, he gives several examples of such uses in the South Pacific, including monitoring “deals to do with Japan… collecting intelligence on meat sales, which is very important for New Zealand… intelligence to do with oil prices… [and] a particularly large Japanese development project in the South Pacific where there was potential for New Zealand companies to win contracts. In other words, there were both macro-level and micro-level economic intelligence being collected.” Corporate executives routinely received such information, Hager testifies, and tells about “the fantastic amount of intelligence that was arriving, for example, monitoring international trade meetings.… From my sources, they said that whenever there was a GATT meeting or another major international meeting, there were hundreds of reports of the monitoring of the different delegations which were arriving in New Zealand and being shared between [British]/USA partners, and I have absolutely no doubt about that, because I have talked to people who saw it coming from the NSA.” [European Parliament, 4/24/2001]

Entity Tags: Government Communication Security Bureau, Echelon, National Security Agency, Nicky Hager, European Parliament

Timeline Tags: Civil Liberties

One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing.One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing. [Source: Matt Crypto / Public domain]The BBC reports on advances in electronic surveillance. The US’s global surveillance program, Echelon, has become particularly effective in monitoring mobile phones, recording millions of calls simultaneously and checking them against a powerful search engine designed to pick out key words that might represent a security threat. Laser microphones can pick up conversations from up to a kilometer away by monitoring window vibrations. If a bug is attached to a computer keyboard, it is possible to monitor exactly what is being keyed in, because every key on a computer has a unique sound when depressed. [BBC, 4/4/2001] Furthermore, a BBC report on a European Union committee investigation into Echelon one month later notes that the surveillance network can sift through up to 90 percent of all Internet traffic, as well as monitor phone conversations, mobile phone calls, fax transmissions, net browsing history, satellite transmissions and so on. Even encryption may not help much. The BBC suggests that “it is likely that the intelligence agencies can crack open most commercially available encryption software.” [BBC, 5/29/2001]

Entity Tags: Echelon, British Broadcasting Corporation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

The Energy Department reports that the 7075-T6 aluminum tubes being sought by Iraq from China (see July 2001) have the same specifications as tubes previously used by Iraq to produce conventional rocket motor casings. The report also notes that Iraq had 160,000 tubes on hand in 1989 and only 66,737 in 1996 (see 1996). The findings are published in the department’s classified Daily Intelligence Highlight, which is posted on an intranet network accessible by members of the intelligence community and the White House. [US Congress, 7/7/2004; New York Times, 10/3/2004]

Entity Tags: US Department of Energy

Timeline Tags: Events Leading to Iraq Invasion

Counterterrorism “tsar” Richard Clarke asks for a transfer to start a new national program on cyber security. His request is granted, and he is to change jobs in early October 2001 (which he does, see October 9, 2001). He makes the change despite the 9/11 attacks. He claims that he tells National Security Adviser Rice and her deputy Steve Hadley, “Perhaps I have become too close to the terrorism issue. I have worked it for ten years and to me it seems like a very important issue, but maybe I’m becoming like Captain Ahab with bin Laden as the White Whale. Maybe you need someone less obsessive about it.” [White House, 10/9/2001; Clarke, 2004, pp. 25-26] He later claims, “My view was that this administration, while it listened to me, either didn’t believe me that there was an urgent problem or was unprepared to act as though there were an urgent problem. And I thought, if the administration doesn’t believe its national coordinator for counterterrorism when he says there’s an urgent problem, and if it’s unprepared to act as though there’s an urgent problem, then probably I should get another job.” [New York Times, 3/24/2004]

Entity Tags: Stephen J. Hadley, Richard A. Clarke, Osama bin Laden, Condoleezza Rice

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In July 2001, NSA director Michael Hayden tells a reporter that the NSA does not monitor any US citizens without court warrants from the Foreign Intelligence Surveillance Court (FISC). “We don’t do anything willy-nilly,” Hayden says. “We’re a foreign intelligence agency. We try to collect information that is of value to American decision-makers, to protect American values, America—and American lives. To suggest that we’re out there, on our own, renegade, pulling in random communications, is—is simply wrong. So everything we do is for a targeted foreign intelligence purpose. With regard to the—the question of industrial espionage, no. Period. Dot. We don’t do that.” When asked how Americans could verify that, Hayden says that they should simply trust the NSA to police and monitor itself, along with oversight from the White House and from Congress. However, it will later come to light that the NSA began illegally monitoring US citizens from the start of the Bush administration (see Spring 2001). A former NSA official will later dispute Hayden’s account. “What do you expect him to say?” the official says. “He’s got to deny it. I agree. We weren’t targeting specific people, which is what the President’s executive order does. However, we did keep tabs on some Americans we caught if there was an interest [by the White House.] That’s not legal. And I am very upset that I played a part in it.” [Truthout (.org), 1/17/2006] Hayden also denies persistent allegations from European government officials that the agency has engaged in economic espionage to help American companies against European competitors (see April 4, 2001). In March 2001, the American Civil Liberties Union’s Barry Steinhardt says that “since there is no real check on [the NSA], there is no way to know” if they are following the law. Steinhardt says that Congress is the only real check on possible NSA abuses, but it has consistently failed to exercise any sort of aggressive oversight on the agency. [CNN, 3/31/2001]

Entity Tags: National Security Agency, Barry Steinhardt, Michael Hayden, American Civil Liberties Union

Timeline Tags: Civil Liberties

Glyn Ford.Glyn Ford. [Source: British Labour Party]The European Parliament releases its final report on its findings about the secretive US surveillance program known as Echelon. The report, two years in the making, exhaustively details many of Echelon’s surveillance capabilities, and lists many of Echelon’s surveillance stations around the world. One of the more interesting sections of the report concerns its apparent use on behalf of US corporations. According to the report, Echelon—operated by the NSA as a highly classified surveillance program ostensibly for tracking terrorist threats and activities by nations hostile to the West—is also being used for corporate and industrial espionage, with information from the program being turned over to US corporations for their financial advantage. The report gives several instances of Echelon’s use by corporations. One is the use of Echelon to “lift… all the faxes and phone calls” between the European aircraft manufacturer Airbus and Saudi Arabian Airlines; that information was used by two American companies, Boeing and McDonnell Douglas, to outflank Airbus and win a $6 billion contract. The report also alleges that the French company Thomson-CSF lost a $1.3 billion satellite deal to Raytheon the same way. Glyn Ford, the MP who commissioned the report, says he doesn’t have a problem with Echelon itself, but in the way it is being used. “Now, you know, if we’re catching the bad guys, we’re completely in favor of that… What we’re concerned about is that some of the good guys in my constituency don’t have jobs because US corporations got an inside track on—on some global deal.” [Washington Post, 11/14/1999; CBS News, 2/27/2000; BBC, 7/6/2000; European Parliament, 7/11/2001] In 1977, the US government began providing Echelon-based intelligence to US corporations (see 1977). In April 2001, New Zealand journalist Nicky Hager testified about Echelon’s use by US allies for corporate and economic purposes (see April 2001), and former CIA director James Woolsey confirmed that US surveillance programs were used to benefit US corporations (see March 2000).

Entity Tags: US Department of Commerce, Thomson-CSF, Saudi Arabian Airlines, Glyn Ford, McDonnell Douglas, Central Intelligence Agency, Boeing Company, Echelon, Airbus, European Parliament, National Security Agency

Timeline Tags: Civil Liberties

President Bush at his Crawford, Texas, ranch on August 6, 2001. Advisors wait with classified briefings.President Bush at his Crawford, Texas, ranch on August 6, 2001. Advisors wait with classified briefings. [Source: White House]President Bush receives a classified presidential daily briefing (PDB) at his Crawford, Texas ranch indicating that Osama bin Laden might be planning to hijack commercial airliners. The PDB provided to him is entitled, “Bin Laden Determined to Strike in US.” The entire briefing focuses on the possibility of terrorist attacks inside the US. [New York Times, 5/15/2002; Newsweek, 5/27/2002] The analysts who drafted the briefing will say that they drafted it on the CIA’s initiative (see July 13, 2004), whereas in 2004 Bush will state that he requested a briefing on the topic due to threats relating to a conference in Genoa, Italy, in July 2001, where Western intelligence agencies believed Osama bin Laden was involved in a plot to crash an airplane into a building to kill Bush and other leaders (see April 13, 2004). The analysts will later explain that they saw it as an opportunity to convey that the threat of an al-Qaeda attack in the US was both current and serious. [9/11 Commission, 7/24/2004, pp. 260] The existence of this briefing is kept secret, until it is leaked in May 2002, causing a storm of controversy (see May 15, 2002). While National Security Adviser Condoleezza Rice will claim the memo is only one and a half pages long, other accounts state it is 11 1/2 pages instead of the usual two or three. [New York Times, 5/15/2002; Newsweek, 5/27/2002; Die Zeit (Hamburg), 10/1/2002] A page and a half of the contents will be released on April 10, 2004; this reportedly is the full content of the briefing. [Washington Post, 4/10/2004] The briefing, as released, states as follows (note that the spelling of certain words are corrected and links have been added):
bullet Clandestine, foreign government, and media reports indicate bin Laden since 1997 has wanted to conduct terrorist attacks in the US (see December 1, 1998). Bin Laden implied in US television interviews in 1997 and 1998 that his followers would follow the example of World Trade Center bomber Ramzi Yousef and “bring the fighting to America” (see May 26, 1998).
bullet After US missile strikes on his base in Afghanistan in 1998, bin Laden told followers he wanted to retaliate in Washington, according to a -REDACTED-service (see December 21, 1998).
bullet An Egyptian Islamic Jihad (EIJ) operative told -REDACTED- service at the same time that bin Laden was planning to exploit the operative’s access to the US to mount a terrorist strike.
bullet The millennium plotting in Canada in 1999 may have been part of bin Laden’s first serious attempt to implement a terrorist strike in the US. Convicted plotter Ahmed Ressam has told the FBI that he conceived the idea to attack Los Angeles International Airport himself (see December 14, 1999), but that bin Laden lieutenant Abu Zubaida encouraged him and helped facilitate the operation. Ressam also said that in 1998 Abu Zubaida was planning his own US attack (see Late March-Early April 2001 and May 30, 2001).
bullet Ressam says bin Laden was aware of the Los Angeles operation.
bullet Although bin Laden has not succeeded, his attacks against the US Embassies in Kenya and Tanzania in 1998 (see 10:35-10:39 a.m., August 7, 1998) demonstrate that he prepares operations years in advance and is not deterred by setbacks. Bin Laden associates surveyed our embassies in Nairobi and Dar es Salaam as early as 1993 (see Late 1993-Late 1994), and some members of the Nairobi cell planning the bombings were arrested and deported in 1997.
bullet Al-Qaeda members—including some who are US citizens—have resided in or traveled to the US for years, and the group apparently maintains a support structure that could aid attacks (see January 25, 2001). Two al-Qaeda members found guilty in the conspiracy to bomb our embassies in East Africa were US citizens (see September 15, 1998), and a senior EIJ member lived in California in the mid-1990s (see November 1989 and September 10, 1998).
bullet A clandestine source said in 1998 that a bin Laden cell in New York was recruiting Muslim-American youth for attacks (see October-November 1998).
bullet “We have not been able to corroborate some of the more sensational threat reporting, such as that from a [REDACTED] service in 1998 saying that bin Laden wanted to hijack a US aircraft to gain the release of ‘Blind Sheikh’ Omar Abdul-Rahman and other US-held extremists” (see 1998, December 4, 1998, and May 23, 2001). [9/11 Commission, 7/24/2004, pp. 223] According to the Washington Post, this information came from a British service. [Washington Post, 5/18/2002]
bullet Nevertheless, FBI information since that time indicates patterns of suspicious activity in this country consistent with preparations for hijackings or other types of attacks, including recent surveillance of federal buildings in New York (see May 30, 2001).
bullet The FBI is conducting approximately 70 full-field investigations throughout the US that it considers bin Laden-related (see August 6, 2001). CIA and the FBI are investigating a call to our embassy in the UAE in May saying that a group or bin Laden supporters was in the US planning attacks with explosives (see May 16-17, 2001). [9/11 Commission, 7/24/2004, pp. 223]
In retrospect, the briefing is remarkable for the many warnings that apparently are not included (see for instance, from the summer of 2001 prior to August alone: May 2001, June 2001, June 12, 2001, June 19, 2001, Late Summer 2001, July 2001, July 16, 2001, Late July 2001, Late July 2001, Summer 2001, June 30-July 1, 2001, July 10, 2001, and Early August 2001). According to one account, after the PDB has been given to him, Bush tells the CIA briefer, “You’ve covered your ass now” (see August 6, 2001). Incredibly, the New York Times later reports that after being given the briefing, Bush “[breaks] off from work early and [spends] most of the day fishing.” [New York Times, 5/25/2002] In 2002 and again in 2004, National Security Adviser Rice will incorrectly claim under oath that the briefing only contained historical information from 1998 and before (see May 16, 2002 and April 8, 2004).

Entity Tags: George W. Bush, Islamic Jihad, Omar Abdul-Rahman, Federal Bureau of Investigation, Los Angeles International Airport, Condoleezza Rice, Abu Zubaida, Al-Qaeda, World Trade Center, Central Intelligence Agency, 9/11 Commission, Ahmed Ressam, Ramzi Yousef, Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

White House counterterrorism chief Richard Clarke sends a memo to National Security Adviser Condoleezza Rice in which he warns that hundreds of Americans could die in an attack by al-Qaeda and complains that the Bush administration is not doing enough to combat the threat posed by the terrorist network. [9/11 Commission, 3/24/2004; Washington Post, 3/25/2004] The National Security Council’s principals committee—a group of senior officials who advise the president on issues of national security policy—is set to meet today to discuss al-Qaeda. Before the meeting takes place, Clarke sends a memo to Rice in which he criticizes US counterterrorism efforts.
Al-Qaeda Could Kill 'Hundreds of Americans' - The “real question” before the members of the principals committee, Clarke writes in the memo, is, “[A]re we serious about dealing with the al-Qaeda threat?” He suggests: “Decision makers should imagine themselves on a future day when the [White House Counterterrorism Security Group] has not succeeded in stopping al-Qaeda attacks and hundreds of Americans lay dead in several countries, including the US. What would those decision makers wish that they had done earlier?” “That future day could happen at any time,” he adds.
Clarke Complains about the Lack of Response to the USS Cole Bombing - Clarke criticizes the US military for failing to respond to the attack on the USS Cole in Yemen, in October 2000 (see October 12, 2000). “Many in al-Qaeda and the Taliban may have drawn the wrong lesson from the Cole: that they can kill Americans without there being a US response, without there being a price,” he writes. He states that he cannot understand “why we continue to allow the existence of large-scale al-Qaeda bases where we know people are being trained to kill Americans.”
Clarke Warns of a Possible 'Big Attack, with Lots of Casualties' - Clarke complains that without adequate funding: “You are left with a modest effort to swat flies, to try to prevent specific al-Qaeda attacks by using [intelligence] to detect them, and friendly governments’ police and intelligence officers to stop them. You are left waiting for the big attack, with lots of casualties, after which some major US retaliation will be in order.” [9/11 Commission, 7/24/2004, pp. 212-213]
Rice Later Says Memo Is 'Not a Warning about September 11th' - Rice will later say of Clarke’s memo: “It would not be appropriate or correct to characterize what Dick [Clarke] wrote to me on September 4th as a warning of an impending attack. What he was doing was, I think, trying to buck me up so that when I went into this principals meeting, I was sufficiently on guard against the kind of bureaucratic inertia that he had fought all of his life.” The memo, she will say, “was a warning to me not to get dragged down by the bureaucracy, not a warning about September 11th.” [9/11 Commission, 4/8/2004] The principals committee’s meeting today is the committee’s first meeting on al-Qaeda issues. [9/11 Commission, 3/24/2004; 9/11 Commission, 7/24/2004, pp. 212] Clarke had “urgently” called for such a meeting back in January this year (see January 25, 2001). [Clarke, 2004, pp. 237]

Entity Tags: Richard A. Clarke, Condoleezza Rice, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

An Echelon station in Menwith Hill, Britain.An Echelon station in Menwith Hill, Britain. [Source: BBC]By the 1980s, a high-tech global electronic surveillance network shared between the US, Britain, Canada, Australia, and New Zealand is gathering intelligence all over the world. The BBC describes Echelon’s power as “astounding,” and elaborates: “Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. They are looking for evidence of international crime, like terrorism.” [BBC, 11/3/1999] One major focus for Echelon before 9/11 is al-Qaeda. For instance, one account mentions Echelon intercepting al-Qaeda communications in Southeast Asia in 1996 (see Before September 11, 2001). A staff member of the National Security Council who regularly attends briefings on bin Laden states, “We are probably tapped into every hotel room in Pakistan. We can listen in to just about every phone call in Afghanistan.” However, he and other critics will claim one reason why US intelligence failed to stop terrorism before 9/11 was because there was too much of a focus on electronic intelligence gathering and not enough focus on human interpretation of that vast data collection. [Toronto Star, 2/2/2002]

Entity Tags: United Kingdom, United States, Osama bin Laden, Echelon, National Security Council, Canada, Australia, Al-Qaeda, New Zealand

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

National Security Adviser Rice is scheduled to deliver a speech claiming to address “the threats and problems of today and the day after, not the world of yesterday.” The speech is never given due to the 9/11 attacks earlier in the day, but the text is later leaked to the media. The Washington Post calls the speech “telling Insight into the administration’s thinking” because it promotes missile defense and contains no mention of al-Qaeda, bin Laden, or Islamic extremist groups. The only mention of terrorism is in the context of the danger of rogue nations such as Iraq. In fact, there are almost no public mentions of bin Laden or al-Qaeda by Bush or other top Bush administration officials before 9/11, and the focus instead is on missile defense. [Washington Post, 4/1/2004; Washington Post, 4/1/2004]

Entity Tags: Osama bin Laden, Central Intelligence Agency, Al-Qaeda, Bush administration (43), Condoleezza Rice

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Page 1 of 9 (820 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike