!! History Commons Alert, Exciting News

Context of '(1:45 pm) August 29, 2005: President Declares Major Disaster in Louisiana and Mississippi'

This is a scalable context timeline. It contains events related to the event (1:45 pm) August 29, 2005: President Declares Major Disaster in Louisiana and Mississippi. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 7 (661 events)
previous | 1, 2, 3, 4, 5, 6, 7 | next

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

After the New York Times verifies the phone calls to Nixon campaign provocateur Donald Segretti from Watergate burglar E. Howard Hunt (see October 12-15, 1972), it publishes an analysis of the White House’s attacks on the media (see October 16-November, 1972). The analysis, written by Robert Semple, Jr, says in part: “The essence of the administration’s recent counterattack to the charges that some of President Nixon’s created or at least condoned a network of political espionage and disruption has been to denounce the newspapers that print them without explicitly discussing them. Behind the strategy lie two assumptions that tell much about the administration’s perceptions of the voters and newspapers that serve them. Judging by recent interviews with Mr. Nixon’s aides, these assumptions seem to be widely shared in his inner circle. First, at the moment, the White House feels, the alleged conspiracy is perceived by most of the public as a distant and even amateurish intrigue far removed from the Oval Office, and thus a denial or even discussion of the charges by the White House would give those charges undeserved visibility and currency. The second is that the public—softened up by three years of speeches from Vice President Agnew—has less than total confidence that what it reads and hears—particularly in the so-called Eastern Establishment media—is true and undistorted by political prejudice. Hence the recent administration attacks on the Washington Post, which has been giving the corruption allegations front-page treatment…. Repeated requests to senior White House aides to get the full story, as they see it, have gone unanswered.… ‘Do you know why we’re not uptight about the press and the espionage business?’ one White House aide… asked rhetorically the other day. ‘Because we believe that the public believes that the Eastern press really is what Agnew said it was—elitist, anti-Nixon and ultimately pro-McGovern.” [Bernstein and Woodward, 1974, pp. 169]

Entity Tags: New York Times, Donald Segretti, E. Howard Hunt, Spiro T. Agnew, Nixon administration, Richard M. Nixon, Robert Semple, Jr

Timeline Tags: Nixon and Watergate

Senate Watergate counsel Samuel Dash tells reporters that, following the extraordinary letter from convicted Watergate burglar James McCord that alleged perjury and enforced silence in the trial of the burglars (see March 19-23, 1973), he has twice interviewed McCord. McCord has “named names” and begun “supplying a full and honest account” of the Watergate operation. He refuses to give details, but promises that McCord will soon testify in public Senate hearings. Shortly after the press conference, the Los Angeles Times reports that McCord named White House counsel John Dean and Nixon campaign deputy director Jeb Magruder as two of the Nixon officials involved in planning the Watergate surveillance operation. Dean has not been named as being involved in the Watergate planning until now. The White House denies Dean’s involvement; significantly, its statement does not mention Magruder—the Nixon administration has cut him loose. Three Capitol Hill sources confirm the story; one Republican politician anonymously tells the Post that McCord’s allegations are “convincing, disturbing, and supported by some documentation.” Dean’s lawyer learns of a planned follow-up story by the Washington Post and threatens to sue the Post if it prints the allegations; Post editor Howard Simons orders that the story be published, including the threat from Dean’s lawyer. [Bernstein and Woodward, 1974, pp. 276-277]

Entity Tags: Washington Post, Howard Simons, James McCord, Jeb S. Magruder, Nixon administration, Samuel Dash, John Dean

Timeline Tags: Nixon and Watergate

Comedian Bill Cosby, one of many on Nixon’s enemies list.Comedian Bill Cosby, one of many on Nixon’s enemies list. [Source: Quixoticals]Former White House counsel John Dean, continuing his testimony before the Senate Watergate Committee (see June 25-29, 1973), provides a sheaf of documents to the committee. Among those is the “Opponents List and Political Enemies Project,” informally called President Nixon’s “enemies list.” The list is actually a set of documents “several inches thick” of names and information about Nixon’s political enemies. It was compiled by a number of administration officials, including Dean, White House aides Charles Colson, Gordon Strachan, and Lyn Nofziger, beginning in 1971. One of the documents from August 16, 1971, has Dean suggesting ways in which “we can use the available federal machinery to screw our political enemies.” Methods proposed included administration manipulation of “grant availability, federal contracts, litigation, prosecution, etc.” The Dean memo was given to then-chief of staff H. R. Haldeman and top White House aide John Ehrlichman for approval. Though Dean testifies that he does not know if the plan was set into motion, subsequent documents submitted to the committee indicate that it was indeed implemented. A condensed list of 20 “White House enemies” was produced by Colson’s office; a larger list included ten Democratic senators, all 12 black House members, over 50 news and television reporters, prominent businessmen, labor leaders, and entertainers, and contributors to the 1972 presidential campaign of Democratic senator Edmund Muskie. The condensed list includes, in priority order:
bullet “1. Arnold M. Picker, United Artists Corp., NY. Top Muskie fund raiser. Success here could be both debilitating and very embarrassing to the Muskie machine. If effort looks promising, both Ruth and David Picker should be programmed and then a follow through with United Artists.”
bullet “2. Alexander E. Barkan, national director of AFL-CIO’s committee on Political Education, Washington D.C.: Without a doubt the most powerful political force programmed against us in 1968 ($10 million, 4.6 million votes, 115 million pamphlets, 176,000 workers—all programmed by Barkan’s COPE—so says Teddy White in The Making of the President 1968). We can expect the same effort this time.”
bullet “3. Ed Guthman, managing editor, Los Angeles Times: Guthman, former Kennedy aide, was a highly sophisticated hatchetman against us in ‘68. It is obvious he is the prime mover behind the current Key Biscayne effort. It is time to give him the message.”
bullet “4. Maxwell Dane, Doyle, Dane and Bernbach, NY: The top Democratic advertising firm—they destroyed Goldwater in ‘64. They should be hit hard starting with Dane.”
bullet “5. Charles Dyson, Dyson-Kissner Corp., NY: Dyson and [Democratic National Committee chairman] Larry O’Brien were close business associates after ‘68. Dyson has huge business holdings and is presently deeply involved in the Businessmen’s Educational Fund which bankrolls a national radio network of five-minute programs—anti-Nixon in character.”
bullet “6. Howard Stein, Dreyfus Corp., NY: Heaviest contributor to [Democratic presidential candidate Eugene] McCarthy in ‘68. If McCarthy goes, will do the same in ‘72. If not, Lindsay or McGovern will receive the funds.”
bullet “7. [US Representative] Allard Lowenstein, Long Island, NY: Guiding force behind the 18-year-old ‘Dump Nixon’ vote campaign.”
bullet “8. Morton Halperin, leading executive at Common Cause: A scandal would be most helpful here.”
bullet “9. Leonard Woodcock, UAW, Detroit, Mich.: No comments necessary.”
bullet “10. S. Sterling Munro Jr., Sen. [Henry Jackson’s aide, Silver Spring, Md: We should give him a try. Positive results would stick a pin in Jackson’s white hat.”
bullet “11. Bernard T. Feld, president, Council for a Livable World: Heavy far left funding. They will program an ‘all court press’ against us in ‘72.”
bullet “12. Sidney Davidoff, New York City, [New York City Mayor John V.] Lindsay’s top personal aide: a first class SOB, wheeler-dealer and suspected bagman. Positive results would really shake the Lindsay camp and Lindsay’s plans to capture youth vote. Davidoff in charge.”
bullet “13. John Conyers, congressman, Detroit: Coming on fast. Emerging as a leading black anti-Nixon spokesman. Has known weakness for white females.”
bullet “14. Samuel M. Lambert, president, National Education Association: Has taken us on vis-a-vis federal aid to parochial schools—a ‘72 issue.” [Facts on File, 6/2003] Committee chairman Sam Ervin (D-NC) is clearly outraged by the list, and particularly by Lambert’s inclusion. He says, “Here is a man listed among the opponents whose only offense is that he believed in the First Amendment and shared Thomas Jefferson’s conviction, as expressed in the Virginia Statute for Religious Freedom, that to compel a man to make contributions of money for the dissemination of religious opinions he disbelieves is sinful and tyrannical. Isn’t that true?” Dean replies, “I cannot disagree with the chairman at all.” [Time, 7/9/1973]
bullet “15. Stewart Rawlings Mott, Mott Associates, NY: Nothing but big money for radic-lib candidates.”
bullet “16. Ronald Dellums, congressman, Calif: Had extensive [Edward M. Kennedy] EMK-Tunney support in his election bid. Success might help in California next year.”
bullet “17. Daniel Schorr, Columbia Broadcasting System, Washington: A real media enemy.”
bullet “18. S. Harrison Dogole, Philadelphia, Pa: President of Globe Security Systems—fourth largest private detective agency in US. Heavy Humphrey [former presidential candidate Hubert Humphrey] contributor. Could program his agency against us.”
bullet “19. [Actor] Paul Newman, Calif: Radic-lib causes. Heavy McCarthy involvement ‘68. Used effectively in nation wide TV commercials. ‘72 involvement certain.”
bullet “20. Mary McGrory, Washington columnist: Daily hate Nixon articles.”
Another “master list” of political enemies prepared by Colson’s office includes Democratic senators Birch Bayh, J. W. Fulbright, Fred R. Harris, Harold Hughes, Edward M. Kennedy, George McGovern, Walter Mondale, Edmund Muskie, Gaylord Nelson, and William Proxmire; House representatives Bella Abzug, William R. Anderson, John Brademas, Father Robert F. Drinan, Robert Kastenmeier, Wright Patman; African-American representatives Shirley Chisholm, William Clay, George Collins, John Conyers, Ronald Dellums, Charles Diggs, Augustus Hawkins, Ralph Metcalfe, Robert N.C. Nix, Parren Mitchell, Charles Rangel, Louis Stokes; and several other politicians, including Lindsay, McCarthy, and George Wallace, the governor of Alabama (see May 15, 1972). The list also includes an array of liberal, civil rights and antiwar organizations, including the Black Panthers, the Brookings Institution, Common Cause, the Farmers Union, the National Economic Council, the National Education Association, the National Welfare Rights Organization, the Southern Christian Leadership Convention; a variety of labor organizations; many reporters, columnists, and other news figures; a short list of celebrities including Bill Cosby, Jane Fonda, Dick Gregory, Steve McQueen, Joe Namath, Gregory Peck, Tony Randall, and Barbra Streisand; and a huge list of businessmen and academics. The documents provide suggestions for avenues of attack against individual listees, including using “income tax discrepancies,” allegations of Communist connections, and other information. [Facts on File, 6/2003] In 1999, Schorr will joke that being on Nixon’s enemies list “changed my life a great deal. It increased my lecture fee, got me invited to lots of very nice dinners. It was so wonderful that one of my colleagues that I will not mention, but a very important man at CBS, said, ‘Why you, Schorr? Why couldn’t it have been me on the enemies list?’” [CNN, 3/27/1999] Schorr does not mention that he was the subject of an FBI investigation because of his listing. [Spartacus Schoolnet, 8/2007]

Entity Tags: Paul Newman, National Welfare Rights Organization, Ralph Metcalfe, Parren Mitchell, Robert F Drinan, National Economic Council, Richard M. Nixon, Morton H. Halperin, Louis Stokes, Mary McGrory, John V. Lindsay, Lawrence O’Brien, Maxwell Dane, Leonard Woodcock, Robert Kastenmeier, Lyn Nofziger, Los Angeles Times, Robert N.C. Nix, Sam Ervin, S. Harrison Dogole, United Auto Workers, Walter Mondale, Tony Randall, William Clay, William R. Anderson, Wright Patman, William Proxmire, Ron Dellums, Stewart Rawlings Mott, Southern Christian Leadership Convention, S. Sterling Munro Jr, John Ehrlichman, Steve McQueen, Samuel M Lambert, Shirley Chisholm, Sidney Davidoff, Senate Watergate Investigative Committee, John Dean, National Education Association, John Brademas, CBS News, Charles Colson, Charles Diggs, Charles Dyson, Charles Rangel, Brookings Institution, Council for a Livable World, Common Cause, Black Panthers, Birch Bayh, Bill Cosby, Allard Lowenstein, Alexander E. Barkan, AFL-CIO, Daniel Schorr, Arnold M. Picker, John Conyers, Augustus Hawkins, Bernard T. Feld, Bella Abzug, Dick Gregory, Barbra Streisand, Edmund Muskie, H.R. Haldeman, Harold Hughes, Gregory Peck, Henry (“Scoop”) Jackson, Jane Fonda, J. William Fulbright, Howard Stein, Gordon Strachan, George S. McGovern, Joe Namath, Edward M. (“Ted”) Kennedy, Eugene McCarthy, Fred R Harris, Gaylord Nelson, George C. Wallace, Hubert H. Humphrey, George Collins, Ed Guthman

Timeline Tags: Nixon and Watergate

Former Nixon White House aide Charles Colson, later described by reporter David Plotz as “Richard Nixon’s hard man, the ‘evil genius’ of an evil administration,” is sentenced to jail after pleading guilty (see March 7, 1974) to taking part in the plan to break into Daniel Ellsberg’s psychiatrist’s office (see September 9, 1971) and interfering with Ellsberg’s trial (see June 28, 1971). Colson also, according to Watergate historian Stanley Kutler, tried to hire Teamster thugs to beat up antiwar demonstrators, and plotted to either raid or firebomb the Brookings Institution (see June 8-9, 1973). Colson will serve seven months in jail (see September 3, 1974). [Slate, 3/10/2000] Colson tells the court: “I shall be cooperating with the prosecutor, but that is not to say that the prosecutor has bargained for my testimony, that there is any quid pro quo: there was not. I reached my own conclusion that I have a duty to tell everything I know about these important issues, and a major reason for my plea was to free me to do so.” Colson’s testimony against Richard Nixon is damning, as he tells the court Nixon had “on numerous occasions urged me to disseminate damaging information about Daniel Ellsberg.” Vice President Ford defends Nixon, saying, “There’s a big difference between telling Chuck Colson to smear Ellsberg and ordering—or allegedly ordering—a break-in.” Colson will later become a born-again Christian evangelist, and found an influential prison ministry. [Slate, 3/10/2000; Werth, 2006, pp. 273-274]

Entity Tags: Brookings Institution, David Plotz, Stanley Kutler, Richard M. Nixon, Daniel Ellsberg, Gerald Rudolph Ford, Jr, Charles Colson, Nixon administration

Timeline Tags: Nixon and Watergate

Cover for ‘All the President’s Men.’Cover for ‘All the President’s Men.’ [Source: Amazon (.com)]Washington Post reporters Carl Bernstein and Bob Woodward publish the book All the President’s Men, documenting their 26-month coverage of the Watergate scandal. The Post will win a Pulitzer Prize for its Watergate reporting and the book will be made into an Oscar-winning film of the same name. Between the book and the film, All the President’s Men will become the touchstone for defining the complex, multilayered Watergate conspiracy. [Washington Post, 1996]

Entity Tags: Washington Post, Carl Bernstein, Bob Woodward

Timeline Tags: Nixon and Watergate

The House Judiciary Committee adopts the first Article of Impeachment by a vote of 27-11. All the Democrats, and six Republicans, vote for impeachment. The Article charges President Richard Nixon with obstructing the investigation of the Watergate break-in (see 2:30 a.m.June 17, 1972). [Brian J. Henchey, 6/7/2007; Gerald R. Ford Library and Museum, 7/3/2007]

Entity Tags: Richard M. Nixon, House Judiciary Committee

Timeline Tags: Nixon and Watergate

The House Judiciary Committee adopts the second Article of Impeachment (see July 27, 1974) against President Nixon. This one charges Nixon with misuse of power and violation of his oath of office. [Gerald R. Ford Library and Museum, 7/3/2007] Twenty-one Democrats and six Republicans vote for the second Article. [Brian J. Henchey, 6/7/2007]

Entity Tags: House Judiciary Committee, Richard M. Nixon

Timeline Tags: Nixon and Watergate

The House Judiciary Committee adopts the third Article of Impeachment (see July 27, 1974 and July 29, 1974). The third Article charges President Nixon with failure to comply with House subpoenas. [Gerald R. Ford Library and Museum, 7/3/2007] Twenty Democrats and two Republicans vote for the second Article. [Brian J. Henchey, 6/7/2007] After voting for the third article, committee chairman Peter Rodino (D-NJ) goes to a back room, calls his wife, and weeps. He tells her, “I hope we’ve done the right thing.” [Los Angeles Times, 5/8/2005]

Entity Tags: Peter Rodino, Richard M. Nixon, House Judiciary Committee

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

President Ronald Reagan issues Executive Order 12333, which directs the US intelligence community to provide foreign intelligence data to the White House. The order reads in part, “[A]gencies are not authorized to use such techniques as electronic surveillance, unconsented physical searches, mail surveillance, physical surveillance, or monitoring devices unless they are in accordance with procedures established by the head of the agency concerned and approved by the Attorney General.” It establishes rules of conduct for the intelligence agencies, and mandates a certain level of Congressional oversight. [Executive Order 12333 -- United States intelligence activities, 4/5/2007] It also establishes the basis for what are later called “National Security Letters.” These NSLs, originally envisioned for use to compile information in hunts for foreign criminals and suspected terrorists, will later be used by the administration of George W. Bush to order US booksellers, librarians, employers, Internet providers, and others to turn over records and information they compile on US citizens, with strict adjuncts against allowing those targeted for surveillance to know about the NSLs and with virtually no government oversight (see October 25, 2005). [Washington Post, 11/6/2005] It does not, as some have later asserted, directly prohibit the assassination of targeted foreign subjects—i.e. terrorist suspects and even foreign leaders—though it does restrict the use of assassination by US government operatives to certain very restricted circumstances centered around critical aspects of national security. [Parks, 11/2/1989 pdf file]

Entity Tags: Ronald Reagan, George W. Bush, National Security Letters, Bush administration (43)

Timeline Tags: Civil Liberties

Valerie Plame, the 22-year old daughter of a military family that followed its Air Force father around the globe during her childhood, joins the CIA. She is one of only 250 or so recruits accepted in the elite Career Trainee Program, a relatively new program installed by CIA Director William Casey and future director Robert Gates. These recruits receive intensive training in everything from academics, government and political structures, and paramilitary operations. Plame is one of the first women accepted in the program. She acquits herself very well in training, winning the respect of her fellow recruits. Classmate Larry Johnson, who will himself go on to a long career in the agency, will later recall of the young woman he knows only as “Val P.”: “She didn’t try to pretend to be something that she was not. She didn’t shoot her mouth off. Looking back, for her age, how so damn young she was, she was remarkably mature, and very serious. It was clear she wanted to be taken seriously.” Only three recruits from the “survivors” of the original class of 250 will go on to work as NOCs—nonofficial covered officers. Plame will be one of those three. [Wilson, 2007, pp. 315-317]

Entity Tags: Central Intelligence Agency, Valerie Plame Wilson, Larry C. Johnson

Timeline Tags: Niger Uranium and Plame Outing

Veteran diplomat Joseph Wilson arrives in Baghdad to assume the post of Deputy Chief of Mission (DCM) under US Ambassador April Glaspie. Wilson has extensive experience throughout sub-Saharan and Central Africa, as well as brief stints on the staffs of Senator Al Gore (D-TN) and Representative Tom Foley (D-WA). Wilson will later write that he and his colleagues share the belief that Iraq is ruled by “a shockingly brutal regime… an ugly totalitarian dictatorship” and its leader, Saddam Hussein, a “sociopath.” For the next three years, Wilson and his colleagues will send harsh reports of Hussein’s systematic violations of the human rights of his subjects to Washington.
Walking a Fine Line between Isolation and Appeasement - Still, most of the embassy staff, including Wilson and Glaspie, are not advocates of totally isolating Hussein with extreme economic and diplomatic sanctions. Wilson will write, “Isolating a regime often results in isolating ourselves, and we then lose any leverage we might have to influence outcomes. On the other hand, when dictators are treated like any other leaders, it’s often interpreted by them as a free pass to continue in their autocratic ways, while critics label it as appeasement.… The merits of ideologically driven diplomacy versus a more pragmatic approach have been a recurring theme of foreign policy debates throughout the history of international relations and America’s own domestic policies.”
'Tread Lightly' - Wilson will note that “Iraq’s Arab neighbors unanimously urged us to tread lightly. They argued that after almost a decade of a grinding war with Iran, Saddam had learned his lesson and that his natural radicalism would now be tempered by the harsh experience.… [I]t was better to tie him to relationships that would be hard for him to jettison than to leave him free to make trouble with no encumbrances. Engaging with him at least kept him in our sights.” Iraq had behaved monstrously during its war with Iran, and had offended the world with its chemical attacks on its own citizens (see August 25, 1988) and its Iranian enemies (see October 1988). But it had emerged from the war as a powerful regional player both militarily and economically. The Bush administration is torn between trying to moderate Hussein’s behavior and treating him as an incorrigible, irredeemable enemy of civilization. And Washington wants Iraq as a balancing force against Iran, which is awash in virulently anti-American sentiment (a sentiment returned in full by many American lawmakers and government officials). No other country in the Gulf region will tolerate the presence of US forces as a counterbalance to Iran. So, as Wilson will write, “All of Iraq’s neighbors continued to argue for a softer approach; and since they clearly had at least as much at stake as we did, the Bush administration was willing to follow their lead.” [Wilson, 2004, pp. 78-79, 451]

Entity Tags: Joseph C. Wilson, Saddam Hussein, April Glaspie

Timeline Tags: Events Leading to Iraq Invasion

Valerie Plame, a young CIA case officer (see Fall 1985), begins her first tour of foreign duty in Athens, Greece. She will remain there for three years, functioning out of the US Embassy under diplomatic cover as, primarily, a recruiter of foreign nationals to serve as CIA assets. Athens is a beautiful but dangerous assignment, with the radical leftist group known as “November 17” having killed a number of US officials over the past years, including CIA station chief Richard Welch in 1975. Plame’s station chief, Doug Smith, will remember her as an ambitious agent who worked hard: “It’s rare that someone on a first tour does a really wonderful job. She did well.” Her deputy station chief, who only allows himself to be identified as “Jim,” will add that he has “a very high opinion of Valerie” and the caliber of her work. [Wilson, 2007, pp. 319-321]

Entity Tags: Doug Smith, Central Intelligence Agency, Valerie Plame Wilson, “Jim” (CIA case officer)

Timeline Tags: Niger Uranium and Plame Outing

Joseph Wilson and Saddam Hussein, during their August 6 meeting.Joseph Wilson and Saddam Hussein, during their August 6 meeting. [Source: Joseph Wilson / New York Times]Deputy Chief of Mission Joseph Wilson, the ranking US diplomat in Baghdad (see July 31, 1990 and August 1-2, 1990), is admitted to an unexpected and impromptu meeting with Saddam Hussein. Wilson, determined not to let Hussein get the better of him in front of the Iraqi photographers present at the meeting, refuses to do anything that could be construed as bowing to Hussein (an effect Hussein is known to strive to create with his “guests”) and is careful not to laugh for fear a picture could be taken out of context by Iraqi propagandists. As Wilson will later recall, “It dawned on me that the last thing in the world that I wanted to be beamed around the world was a picture of me yukking it up with Saddam Hussein.” Hussein proposes a solution to the Iraq-Kuwait conflict, involving the US giving its blessing to Iraq’s annexation of Kuwait (see August 2-4, 1990) and in return promising to provide cheap oil to the US from Iraqi and Kuwaiti oil fields. He also promises not to strike against Saudi Arabia unless that country allows itself to be used as a launching pad for a strike against Iraq. If the US reacts militarily to the invasion, Hussein says, then the US will be responsible for the “spilling of the blood of ten thousand soldiers in the Arabian desert.” Wilson will later write, “There it was then, the carrot of cheap oil coupled with the stick of dead American soldiers.” Wilson, in turn, presses for Hussein to allow foreign citizens in general, and American citizens in particular, to leave Iraq immediately (see August 4, 1990). Hussein asks if such a request indicates that the US is planning to launch its own military response; Wilson responds that he knows nothing of any such plans, but that he intends “to be here so long as there is a role for diplomats to play in resolving this situation peacefully.” The meeting adjourns with nothing being agreed upon; Wilson has no power to negotiate on behalf of the US, Wilson does not trust Hussein to keep any such bargains, and most importantly, the US has not shown any indication of any willingness to allow Hussein to stay in Kuwait. [Vanity Fair, 1/2004; Wilson, 2004, pp. 118-123]

Entity Tags: Saddam Hussein, Joseph C. Wilson

Timeline Tags: Events Leading to Iraq Invasion

As tensions escalate between the US and Iraq, Iraqi officials circulate a note to all the embassies in Baghdad, directing them to register all of the civilians in their care with the authorities. Failure to comply can result in execution, the note implies. Such registration can only be done in person at Iraqi governmental offices; Deputy Chief of Mission Joseph Wilson, the ranking US diplomat in Baghdad, knows that bringing American citizens in for registration may well result in those Americans being taken hostage. He is housing some 60 Americans at the ambassador’s residence for their protection. He will later write: “It was clearly a way for the Iraqis to replenish their stock of hostages. The choice, theoretically, was either to turn over Americans or to defy the note and risk execution.” Instead of making the choice, Wilson uses the order to publicly defy the Iraqis. He schedules a press conference and has a Marine make him a hangman’s noose. Wearing the noose, he tells reporters that if Saddam Hussein “wants to execute me for keeping Americans from being taken hostage, I will bring my own f_cking rope.” The press conference, like all of the embassy press conferences, is off the record, but journalists release the story anyway. A garbled, erroneous version from a French news outlet has the Iraqis planning to hang Wilson by sundown. Iraqi Foreign Minister Tariq Aziz, angered and embarrassed by the press coverage, attempts to dress down Wilson that evening, but Wilson refuses to back down. Instead, the Iraqis withdraw the request. Soon after, President Bush sends Wilson a cable lauding his courage and his outspokeness (see November 29, 1990). [Wilson, 2004, pp. 153-154; Unger, 2007, pp. 311] Conservative columnist Robert Novak co-writes a piece about Wilson that says, “He shows the stuff of heroism.” Novak will later reveal the covert CIA status of Wilson’s wife, Valerie Plame Wilson, as an act of political retaliation (see July 14, 2003). [Wilson, 2004, pp. 153-154]

Entity Tags: Tariq Aziz, Joseph C. Wilson, Robert Novak, Saddam Hussein, George Herbert Walker Bush

Timeline Tags: Events Leading to Iraq Invasion, US-Iraq 1980s

Deputy Chief of Mission Joseph Wilson, the ranking US diplomat in Iraq, and his remaining colleagues in the beleaguered US Embassy in Baghdad decide to use the Thanksgiving holiday as a chance to remind the US that Iraq is still holding some 120 Americans as hostages (see August 17-23, 1990). He has proposed to his superiors in Washington that he make a high-profile visit to the Iraqi Foreign Ministry to demand the release of the hostages, to be followed by an on-the-record press conference. Journalists would then join Wilson for Thanksgiving dinner at his home in Baghdad. He was told, “Nobody is going to tell you not to do it, but with the president traveling to Saudi Arabia to have Thanksgiving with the troops, the White House press office is concerned that you might step on the president’s story. That said, if you insist, feel free to go ahead. Just so you are aware of the concerns here.” Wilson and his colleagues decided to go through with the program. During dinner, CNN correspondent Richard Roth appears at Wilson’s home to announce that Iraqi officials have brought a contingent of American hostages to Baghdad for an on-camera Thanksgiving dinner. Does Wilson have a reaction? Roth asks. Wilson does indeed, and launches into a tirade, calling Iraq’s government “sadistic” for “parad[ing] hostages before the cameras as a propaganda tool while denying them access to their country’s embassy or consular officials.” Roth airs Wilson’s remarks on CNN. It is this impromptu condemnation of the Iraqi government, along with Wilson’s open defiance of Iraqi officials days before (see September 20, 1990), that prompts President Bush to send a laudatory letter to Wilson praising his courage and patriotism. (Wilson will give a copy of Bush’s cable to Roth, telling the reporter that he deserves the president’s praise as much as Wilson does.) [Wilson, 2004, pp. 160-161]

Entity Tags: Richard Roth, George Herbert Walker Bush, Joseph C. Wilson

Timeline Tags: Events Leading to Iraq Invasion

President Bush sends US Acting Ambassador to Iraq Joseph Wilson a telegram lauding his heroism in standing up to Saddam Hussein (see September 20, 1990). Bush writes in part: “It is relatively easy to speak out from the safety and comfort of Washington; what you are doing day in and day out under the most trying conditions is truly inspiring. Keep fighting the good fight; you and your stalwart colleagues are always in our thoughts and prayers.” [Wilson, 2004, pp. 154]

Entity Tags: Saddam Hussein, George Herbert Walker Bush, Joseph C. Wilson

Timeline Tags: Events Leading to Iraq Invasion, US-Iraq 1980s

The ranking US diplomat in Baghdad, Joseph Wilson, has a breakthrough in his relentless efforts to win the freedom of the 120 or so American hostages being held by Iraq (see August 17-23, 1990). Wilson meets an Arab journalist who has considerable influence in the Gulf region. He tells her that President Bush has already concluded, in his opinion, that the loss of the hostages as a result of an American invasion would be lamentable but not enough to deter military action against Iraq. Therefore, Saddam Hussein is “deluding himself” if he thinks the hostages will prevent the US from launching an attack against Iraqi forces in Kuwait. The other side of the coin, he tells the journalist, is that if something untoward does happen to the hostages, “American anger might be such that the president would be forced to go to war to avenge that mistreatment.” It is wholly to Hussein’s benefit to release the hostages, Wilson argues. Ten days after that lunch, Wilson receives the minutes from a meeting between Algerian Foreign Minister Sid Ahmed Ghozali and the US Ambassador to Algeria, Chris Ross, in which Ghozali echoes Wilson’s message almost verbatim. Wilson later writes, “I was certain that my contact had been speaking to other Arab leaders, and I saw that the thesis was gaining some traction. It would soon get back to Saddam from Arab interlocutors. It did not matter how many times I told the Iraqis the risks they ran—they expected me to say it. But when a fellow Arab said the same thing, it would have far greater impact.” [Wilson, 2004, pp. 164-165]

Entity Tags: Sid Ahmed Ghozali, Chris Ross, George Herbert Walker Bush, Joseph C. Wilson, Saddam Hussein

Timeline Tags: Events Leading to Iraq Invasion

President George H. W. Bush signs a covert “lethal finding” authorizing the CIA to spend a hundred million dollars to “create the conditions for removal of Saddam Hussein from power.” [New Yorker, 6/7/2004] The CIA forms the Iraqi Opposition Group within its Directorate of Operations to implement this policy. [Ritter, 2005, pp. 128] Awash in cash, the agency hires the Rendon Group to influence global political opinion on matters related to Iraq. According to Francis Brooke, an employee of the company who’s paid $22,000 per month, the Rendon Group’s contract with the CIA provides it with a ten percent “management fee” on top of whatever money it spends. “We tried to burn through $40 million a year,” Brooke will tell the New Yorker. “It was a very nice job.” The work involves planting false stories in the foreign press. The company begins supplying British journalists with misinformation which then shows up in the London press. In some cases, these stories are later picked up by the American press, in violation of laws prohibiting domestic propaganda. “It was amazing how well it worked. It was like magic,” Brooke later recalls. Another one of the company’s tasks is to help the CIA create a viable and unified opposition movement against Saddam Hussein (see June 1992). This brings the Rendon Group and Francis Brooke into contact with Iraqi exile Ahmed Chalabi (see After May 1991). The CIA will soon help Chalabi and Rendon create the Iraqi National Congress (INC) to further the goal of toppling Hussein. [New Yorker, 6/7/2004] Author and intelligence expert James Bamford will later say, “Chalabi was a creature of American propaganda to a large degree. It was an American company, the Rendon Group, that—working secretly with the CIA—basically created his organization, the Iraqi National Congress. And put Chalabi in charge basically.… From the very beginning Chalabi was paid a lot of money from the US taxpayers. The CIA paid him originally about 350,000 dollars a month, to Chalabi and his organization.” [PBS, 4/25/2007]

Entity Tags: Saddam Hussein, Rendon Group, Iraqi Opposition Group, James Bamford, George Herbert Walker Bush, Francis Brooke, Central Intelligence Agency, Ahmed Chalabi, Iraqi National Congress

Timeline Tags: Events Leading to Iraq Invasion, Domestic Propaganda

Former Assistant Secretary of State Elliott Abrams, facing multiple counts of lying under oath to Congress about, among other things, his knowledge of the US government’s involvement in the resupply operation to the Nicaraguan Contras (see October 10-15, 1986), his knowledge of the role played by former CIA agent Felix Rodriguez in the resupply (see December 17, 1986), and his knowledge of third-party funding of the Nicaraguan Contras (see November 25, 1986), agrees to plead guilty to two misdemeanor charges of withholding evidence from Congress. Abrams agrees to the plea after being confronted with reams of evidence about his duplicity by investigators for special prosecutor Lawrence Walsh as well as from testimony elicited during the House-Senate investigation of 1987 (see July 7-10, 1987) and the guilty plea and subsequent testimony of former CIA agent Alan Fiers (see July 17, 1991). Abrams pleads guilty to two counts of withholding information from Congress, to unlawfully withholding information from the Senate Foreign Relations Committee and the House Intelligence Committee, and admits lying when he claimed that he knew nothing of former National Security Council official Oliver North’s illegal diversion of government funds to the Contras (see December 6, 1985, April 4, 1986, and November 25-28, 1986). Abrams says that he lied because he believed “that disclosure of Lt. Col. [Oliver] North’s activities in the resupply of the Contras would jeopardize final enactment” of a $100 million appropriation pending in Congress at the time of his testimony, a request that was narrowly defeated (see March 1986). Abrams also admits to soliciting $10 million in aid for the Contras from the Sultan of Brunei (see June 11, 1986). [Final Report of the Independent Counsel for Iran/Contra Matters: Chapter 25: United States v. Elliott Abrams: November 1986, 8/4/1993]

Entity Tags: Elliott Abrams, Alan Fiers, Contras, Felix Rodriguez, House Intelligence Committee, Senate Foreign Relations Committee, Lawrence E. Walsh

Timeline Tags: Iran-Contra Affair

Fall 1992 - 1996: Plame Becomes CIA ‘NOC’

Valerie Plame, a young CIA case officer working in the Europe Division at the agency’s Directorate of Operations following a tour in Greece (see Fall 1985 and Fall 1989), decides on a risky career move—becoming a NOC, or Nonofficial Covered Officer. As reporter Laura Rozen will later explain: “Becoming a NOC would require Plame to erase all visible connections to the US government, while, with the help of the agency’s Office of Central Cover, developing and inhabiting a plausible new private sector career and professional identity that would serve as useful cover for her to meet and develop potential sources of intelligence value to the agency without revealing herself as an agent of the US government. It also meant giving up the protection of diplomatic status should her covert activities be discovered.” “A NOC has no overt affiliation with the US government,” Plame will later write. “If he was caught, the United States would deny any connection.” The CIA accepts her as a NOC candidate, and in order to distance herself from her former association with her former “cover” career as a junior State Department officer in Athens, Plame begins pursuing double graduate degrees in international affairs and European studies. She studies at both the London School of Economics and at the College of Europe in Bruges, Belgium, where the entire curriculum is taught in French. By 1996 she is ensconced in an apartment in Brussels, where she begins a “career” as an energy executive and secret NOC. She has a far wider range of potential contacts within the corporate world as an apparent private citizen, and her new assignment introduces her to the world of weapons proliferation, WMD, counternarcotics, economic intelligence, technological developments, and counterterrorism. [Wilson, 2007, pp. 332-333]

Entity Tags: Laura Rozen, College of Europe, US Department of State, Central Intelligence Agency, Valerie Plame Wilson, London School of Economics

Timeline Tags: A. Q. Khan's Nuclear Network, Niger Uranium and Plame Outing

The outgoing President Bush pardons six former Reagan officials for any crimes they may have committed as part of their involvement in the Iran-Contra affair. One of the six, former Defense Secretary Caspar Weinberger, was slated to go on trial in January 1993 on charges that he lied to Congress about his knowledge of arms sales to Iran and funding from other countries for the Nicaraguan Contras (see July 24, 1992). Weinberger’s case was expected to reveal details of then-Vice President Bush’s involvement in the affair. Bush has refused to turn over a 1986 campaign diary he kept that may contain evidence of his involvement. Special prosecutor Lawrence Walsh says of the pardons, “[T]he Iran-Contra cover-up, which has continued for more than six years, has now been completed.” The pardons “undermine… the principle that no man is above the law. It demonstrates that powerful people with powerful allies can commit serious crimes in high office—deliberately abusing the public trust without consequence.” Walsh says that he believes Bush may have pardoned Weinberger to conceal his own complicity and possibly criminal actions in Iran-Contra. Bush also pardons former National Security Adviser Robert McFarlane and former Assistant Secretary of State Elliott Abrams, both of whom have already pled guilty to misdemeanor charges of withholding information from Congress. Bush also pardons Clair George, the former head of the CIA’s clandestine services, convicted earlier in December of two felony charges of perjury and misleading Congress. Finally, he pardons two other CIA officials, Duane Clarridge, who is awaiting trial, and Alan Fiers, who pled guilty to withholding information from Congress, and who testified against George. For his part, Bush says he is merely trying to “put bitterness behind us” in pardoning the six, many of whom he said have already paid a heavy price for their involvement. Senator George Mitchell (D-ME) is sharply critical of the pardons, saying, “If members of the executive branch lie to the Congress, obstruct justice and otherwise break the law, how can policy differences be fairly and legally resolved in a democracy?” [New York Times, 12/25/1992]

Entity Tags: Robert C. McFarlane, Caspar Weinberger, Alan Fiers, Clair George, Lawrence E. Walsh, Contras, George Herbert Walker Bush, Duane Clarridge, Elliott Abrams, George Mitchell

Timeline Tags: Iran-Contra Affair

The “Blind Sheikh,” Sheikh Omar Abdul-Rahman, is arrested in Brooklyn after a long stand off. The “Landmarks” plot was rolled up on June 24, 1993, and many of Abdul-Rahman’s close associates were arrested on that day (see June 24, 1993). But Abdul-Rahman moved to the Abu Bakr mosque and stayed there. His presence in a mosque and the many supporters that gathered to surround it makes his arrest difficult. But after long negotiations, on July 3, 1993, he is arrested on immigration charges and taken to prison. [New York Times, 7/3/1993] He will later be charged with a role in the “Landmarks” plot and eventually sentenced to life in prison. [New York Times, 1/18/1996]

Entity Tags: Abu Bakr Mosque, Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline

The Communications Assistance for Law Enforcement Act (CALEA) takes effect. CALEA obliges telecommunications providers such as AT&T to give law enforcement agencies and US intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks. In more recent years, the law will be expanded to give law enforcement and intelligence agencies similar abilities to monitor Internet usage by US citizens. [Federal Communications Commission, 2/21/2007]

Entity Tags: Communications Assistance for Law Enforcement Act (CALEA), AT&T

Timeline Tags: Civil Liberties

A Pakistani-based proliferation network centered around nuclear scientist A. Q. Khan and the ISI intelligence agency begins to use Turkish fronts to acquire technology in the US. This move is made because it is thought Turks are less likely to attract suspicion than Pakistanis. At one point the operation is headed by ISI Director Lt. Gen. Mahmood Ahmed. According to FBI whistleblower Sibel Edmonds, intercepted communications show Mahmood and his colleagues stationed in Washington are in constant contact with attachés at the Turkish embassy. Edmonds will also say that venues such as the American Turkish Council (ATC), a Washington-based lobby group, are used for handovers, and packages containing nuclear secrets are then delivered by Turkish operatives, using their cover as members of the diplomatic and military community, to contacts at the Pakistani embassy in Washington. Edmonds will also allege: “Certain greedy Turkish operators would make copies of the material and look around for buyers. They had agents who would find potential buyers.” [Sunday Times (London), 1/6/2008]

Entity Tags: Pakistan Directorate for Inter-Services Intelligence, American-Turkish Council, Mahmood Ahmed, Sibel Edmonds

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network

Law professor John Yoo writes a lengthy essay for the California Law Review entitled “The Continuation of Politics by Other Means: The Original Understanding of War Powers,” in which he argues that the Founding Fathers intended to empower presidents to launch wars without Congressional permission. Yoo has clerked for conservative judge Laurence Silberman and equally conservative Supreme Court Justice Clarence Thomas, and served for a year as counsel to then-Senate Judiciary Committee Chairman Orrin Hatch (R-UT). He has become a regular speaker at Federalist Society events, the informal but influential group of conservative lawyers, judges, and legal scholars who will come to have so much influence in the Bush administration. You argues that for generations, Constitutional scholars have misread the Constitution: the Founders actually supported, not repudiated, the British model of executive power that gave the king the sole power of declaring war and committing forces to battle. The Constitution’s granting of the legislature—Congress—the power to “declare war” is merely, Yoo writes, a reference to the ceremonial role of deciding whether to proclaim the existence of a conflict as a diplomatic detail. The Founders always intended the executive branch to actually declare and commence war, he writes. Most other Constitutional scholars will dismiss Yoo’s arguments, citing notes from the Constitutional Convention that show the Founders clearly intended Congress, not the president, to decide whether to commit the country to war. One of those Founders, James Madison, wrote in 1795 that giving a president the unilateral ability to declare war “would have struck, not only at the fabric of the Constitution, but at the foundation of all well organized and well checked governments. The separation of the power of declaring war from that of conducting it, is wisely contrived to exclude the danger of its being declared for the sake of its being conducted.” [Savage, 2007, pp. 80-81] Yoo will go on to join the Bush administration’s Office of Legal Counsel, and write numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002).

Entity Tags: Federalist Society, John C. Yoo

Timeline Tags: Civil Liberties

Richard Perle.Richard Perle. [Source: Public domain]The Institute for Advanced Strategic and Political Studies, an Israeli think tank, publishes a paper titled “A Clean Break: A New Strategy for Securing the Realm.” [Washington Times, 10/7/2002; Chicago Sun-Times, 3/6/2003] The paper, whose lead author is neoconservative Richard Perle, is meant to advise the new, right-wing Israeli Prime Minister Benjamin Netanyahu. Other authors include:
bullet influential neoconservative academic and former Bush adviser Richard Perle, primarily responsible for the content of the paper;
bullet Meyrav Wurmser, the future director of the neoconservative Hudson Institute’s Center for Middle East Policy;
bullet her husband David Wurmser, the future chief adviser for Middle East policy for future vice-president Dick Cheney;
bullet neoconservative Douglas Feith, who will be the prime architect of the Iraq war;
bullet and a number of lesser-known neoconservatives, including James Colbert, Charles Fairbanks, Jr., Jeffrey T. Bergner, Jonathan Torop, and Robert Loewenberg.
Rebuilding Zionism by Abandoning Past Policies - It advocates making a complete break with past policies by adopting a strategy “based on an entirely new intellectual foundation, one that restores strategic initiative and provides the nation the room to engage every possible energy on rebuilding Zionism.…” [Guardian, 9/3/2002]
Aggressive, Militant Israeli Policy towards Arab Neighbors - Much along the lines of an earlier paper by Israeli Oded Yinon (see February 1982), the document urges the Israelis to aggressively seek the downfall of their Arab neighbors—especially Syria and Iraq—by exploiting the inherent tensions within and among the Arab States. The first step is to be the removal of Saddam Hussein in Iraq. A war with Iraq will destabilize the entire Middle East, allowing governments in Syria, Iran, Lebanon, and other countries to be replaced. “Israel will not only contain its foes; it will transcend them,” the paper says. [Perle, 7/8/1996; Guardian, 9/3/2002; Carnegie Endowment for International Peace, 3/19/2003] Iraq is first on the list of nations to be transformed. Saddam Hussein must be overthrown, the authors say. But Iraq has long served as a counterweight to the Shi’ite theocracy of Iran; with the two at loggerheads, neither could pose as serious a threat to Israel as it could if not opposed by the other. To counter this, Perle and his co-authors propose restoring the Hashemites (an ancient Arab dynasty; King Faisal I of Iraq was a Hashemite) to power. Instead of the largely Shi’ite Iraqis aligning themselves with their fellow Shi’a in Iran after Hussein’s overthrow, the Hashemite government would align itself with the pro-Western Jordan, long a Hashemite regime. Unfortunately, the authors propose no plan to actually make such an extraordinary regime succession happen, nor do they seem concerned with some Iraqi Shi’ites’ alignment with Islamist terrorists or with many Shi’ites’ close ties to Iran. [Unger, 2007, pp. 145-148]
Abandoning Oslo Accords, Militant Palestinian Policy - Other suggestions for Israel include abandoning the Oslo Accords, developing a foreign policy based on a traditional balance of power strategy, reserving its right to invade the West Bank and Gaza Strip as part of a strategy of “self-defense,” abandoning any notion of “land for peace,” reestablishing a policy of preemptive strikes, forging closer ties to the US while taking steps towards self-reliance, and seeking an alternative to Yasser Arafat as leader of the PLO. [Perle, 7/8/1996]
'Seeds of a New Vision' - All these questions need not be answered right away, according to co-author Meyrav Wurmser. The document is “the beginning of thought,” she says, “… the seeds of a new vision.”
Similar to American Christian Right's Vision - According to author Craig Unger, the ideology of “ACB” is, in essence, a secularized version of the theology of the American Christian Right. Christian Zionists insist that Jews were ordained by God to reclaim the Biblican land of Judea and Samaria in the West Bank; the paper asserts that claim as well. The paper echoes Christian fundamentalists by demanding “the unconditional acceptance of Arabs of our rights, especially in their territorial dimension.” Perle and his fellow neoconservatives want to push the boundaries even further: the Bible can be interpreted to countenance Jewish dominion over all or parts of Egypt, Syria, Lebanon, Jordan, Iraq, and even Saudi Arabia. Thusly, the authors claim that Israel and the US, by waging war against Iraq, Syria, and Lebanon, would reshape the “strategic environment” in the Middle East and greatly expand Israel’s influence in the region.
Influence in Upcoming Bush Administration - Perle will later become chairman of President Bush’s influential Defense Policy Board and will be instrumental is moving Bush’s US policy toward war with Iraq after the 9/11 attacks, as will Feith and the Wurmsers. [Unger, 2007, pp. 145-148]

Entity Tags: Richard Perle, Robert Loewenberg, Meyrav Wurmser, Jonathan Torop, Richard V. Allen, James Colbert, Charles Fairbanks, Jr., Benjamin Netanyahu, David Wurmser, Institute for Advanced Strategic and Political Studies, Jeffrey T. Bergner, Douglas Feith

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion, US International Relations, Neoconservative Influence

A lieutenant general meets with Qwest CEO Joe Nacchio and Dean Wandry, who heads Qwest’s government business unit. According to documents filed in 2006 by Nacchio concerning his trial on insider trading charges (see October 12, 2007), the general “told Mr. Wandry that he ran the largest telecom operation in the world, he had looked at Qwest’s network, and he wanted to use it for government purposes.” The general in question could be NSA Director Kenneth Minihan, who will be replaced in 1999 by another lieutenant general, Michael Hayden, but neither Minihan nor Hayden will comment on the allegation. Many former intelligence officials will say that it is likely Minihan who met with Nacchio and Wandry. Nacchio’s court documents indicate that he and Wandry agree to work with the general. Nacchio is not allowed to announce the contract publicly, but according to the court documents, he “understood at the time this was the beginning of a relationship which had enormous potential for future work. This proves increasingly true as time went on.” By 1999 Qwest is working extensively with the NSA. Minihan is particularly concerned about the potential of “cyberwarfare” by foreign governments, terrorist organizations, drug cartels, and organized crime, a prospect which he felt the NSA is unprepared. He particularly worries about Russia and China; in June 1998, he will testify are training personnel in potential cyber-attacks. “These opportunists, enabled by the explosion of technology and the availability of inexpensive, secure means of communication, pose a significant threat to the interests of the United States and its allies,” Minihan will state. In 2007, a former senior NSA official will say that the agency felt those groups knew US privacy laws all too well and were capable of using those laws against the NSA and other intelligence agencies. He will say, “There was such a nuanced understanding of how to tie us in knots and use American law against us, that there were certainly pockets of people saying, ‘We’ve got to be assertive; we’ve got to be more aggressive on this.’” Hayden, Minihan’s successor, will be particularly willing to push agency operations to the edge of legality. After 9/11, Hayden will say, “We’re pretty aggressive within the law. As a professional, I’m troubled if I’m not using the full authority allowed by law.” [National Journal, 11/2/2007] The NSA will approach Qwest will a similar offer in the months before 9/11 (see February 2001).

Entity Tags: Michael Hayden, Dean Wandry, Kenneth Minihan, National Security Agency, Joe Nacchio, Qwest

Timeline Tags: Civil Liberties

Former US ambassador Joe Wilson and CIA officer Valerie Plame meet for the first time at a reception held at the Turkish ambassador’s residence. Wilson is a political adviser to the Commander in Chief of the US Armed Forces in Europe. Plame describes herself as an “energy executive living in Brussels.” Wilson and Plame will marry a year later and will become involved in the “Plame Affair,” when Plame’s affiliation with the CIA is disclosed in the media (see July 14, 2003). After her marriage, Plame will generally be referred to by the name Plame Wilson. Wilson, who is accompanied by General James Jamerson, is there to receive an award from the American-Turkish Council. The reason for Plame’s presence there is not known. [Wilson, 2004, pp. 239-242, 273] However, the American-Turkish Council will later be said to be involved in the smuggling of nuclear weapons material to Turkey and other countries (see Late 1990s-Early 2001 and Mid-Late 1990s), and Plame’s job at the CIA is in its non-proliferation section (see Late February 1999), so she may be there for operational reasons. [Sunday Times (London), 1/6/2008; Sunday Times (London), 1/27/2008]

Entity Tags: James Jamerson, American-Turkish Council, Valerie Plame Wilson, Joseph C. Wilson

Timeline Tags: A. Q. Khan's Nuclear Network, Niger Uranium and Plame Outing

An FBI investigation finds that Turkish nationals are involved in efforts to bribe members of Congress, both Republican and Democrat. Targets of the FBI’s investigation include individuals at Chicago’s Turkish Consulate and the American-Turkish Consulate, as well as members of the American-Turkish Council (ATC) and the Assembly of Turkish American Associations (ATAA). Wiretaps obtained by investigators also contain what appears to be references to large scale drug shipments and other crimes. In 1999 some FBI investigators call for the appointment of a special prosecutor to continue the investigation. But after the Bush administration comes to office, higher-ups in the Department of State pressure the bureau to shift the attention of its investigation away from elected politicians and instead focus on appointed officials. [Anti-War (.com), 8/15/2005; Vanity Fair, 9/2005]

Entity Tags: US Department of State, US Congress, Turkish Consulate of Chicago, Federal Bureau of Investigation, American-Turkish Consulate, American-Turkish Council, Assembly of Turkish American Associations

Timeline Tags: Complete 911 Timeline

PNAC logo.PNAC logo. [Source: Project for the New American Century]The Project for the New American Century (PNAC), an influential neoconservative think tank, publishes a letter to President Clinton urging war against Iraq and the removal of Saddam Hussein because he is a “hazard” to “a significant portion of the world’s supply of oil.” In a foretaste of what eventually happens, the letter calls for the US to go to war alone, attacks the United Nations, and says the US should not be “crippled by a misguided insistence on unanimity in the UN Security Council.” The letter is signed by many who will later lead the 2003 Iraq war. 10 of the 18 signatories later join the Bush Administration, including Defense Secretary Donald Rumsfeld, Assistant Defense Secretary Paul Wolfowitz, Deputy Secretaries of State Richard Armitage and Robert Zoellick, Undersecretaries of State John Bolton and Paula Dobriansky, presidential adviser for the Middle East Elliott Abrams, Defense Policy Board chairman Richard Perle, and George W. Bush’s special Iraq envoy Zalmay Khalilzad. Other signatories include William Bennett, Jeffrey Bergner, Francis Fukuyama, Robert Kagan, William Kristol, Peter Rodman, William Schneider, Vin Weber, and James Woolsey. [Project for the New American Century, 1/26/1998; Sunday Herald (Glasgow), 3/16/2003; Unger, 2007, pp. 158] Clinton does heavily bomb Iraq in late 1998, but the bombing doesn’t last long and its long term effect is the break off of United Nations weapons inspections. [New York Times, 3/23/2003] The PNAC neoconservatives do not seriously expect Clinton to attack Iraq in any meaningful sense, author Craig Unger will observe in 2007. Instead, they are positioning themselves for the future. “This was a key moment,” one State Department official will recall. “The neocons were maneuvering to put this issue in play and box Clinton in. Now, they could draw a dichotomy. They could argue to their next candidate, ‘Clinton was weak. You must be strong.’” [Unger, 2007, pp. 158]

Entity Tags: Robert B. Zoellick, Vin Weber, William Kristol, William Jefferson (“Bill”) Clinton, Zalmay M. Khalilzad, William Schneider Jr., Richard Perle, William J. Bennett, Richard Armitage, Robert Kagan, Paula J. Dobriansky, Donald Rumsfeld, Craig Unger, Peter Rodman, Elliott Abrams, John R. Bolton, James Woolsey, Francis Fukuyama, Jeffrey T. Bergner, Paul Wolfowitz

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion, Neoconservative Influence

President Clinton creates the new post of National Coordinator for Security, Infrastructure, Protection, and Counterterrorism. He names Richard Clarke for the job, and due to the length of the title, Clarke soon becomes known as the counterterrorism “tsar.” [New York Times, 5/23/1998; Washington Post, 4/2/2000] This position is outlined in a new presidential directive on counterterrorism, Presidential Decision Directive 62 (PDD-62), which also outlines goals of fighting terrorism and attempts to strengthen interagency coordination of counterterrorism efforts. [9/11 Commission, 3/24/2004] Clarke, who had been working on terrorism issues since the start of the Clinton administration, has more symbolic than actual power in the new position. For instance, he only has a staff of 12, compared to a staff of hundreds for the drug “tsar,” and by law he is not allowed to order law enforcement agents, soldiers, or spies to do anything. He does not have any control over budgets. But he is allowed to sit on Cabinet level meetings that involve terrorism. [Clarke, 2004, pp. 170; 9/11 Commission, 7/24/2004, pp. 101] Clarke has a long record of prior government service, beginning in 1973 as a nuclear weapons analyst in the Office of the Secretary of Defense. [CBS News, 3/30/2004] He came to prominence in the Reagan administration as the deputy assistant secretary of state for intelligence from 1985 to 1989. Having left the State Department in 1992, he has spent the past six years on the National Security Council staff. [Washington Post, 3/13/2003; BBC, 3/22/2004; Associated Press, 3/27/2004] After 9/11 Clarke will become well known for his criticisms of the George W. Bush administration (see March 21, 2004 and March 24, 2004), but some who know him consider him to be politically conservative. [Boston Globe, 3/29/2004] According to the Washington Post, many within the Clinton administration view Clarke as a hawk. [Washington Post, 3/23/2004] Robert Gelbard, who worked with him at the State Department in the early 1990s, says he is “no liberal. He is very hawkish.” [US News and World Report, 4/5/2004] Vince Cannistraro, a former CIA official who worked with Clarke in the 1980s, says, “You can’t accuse him of being passive or too liberal on foreign policy.” [Washington Post, 3/23/2004] At the time of the 2000 election he will be a registered Republican, and he votes that year for John McCain in the Republican presidential primary. [New York Times, 3/23/2004; Salon, 3/24/2004; Time, 4/5/2004] Larry DiCara, the former president of the Boston City Council who knew Clarke when he was younger, later recalls: “He was fiercely conservative at a time when just about everyone in Boston was a Democrat.… I’m amazed he worked for [President] Clinton.” Clarke, however, will later praise Clinton, and in an interview in 2002 will describe himself as “not a partisan figure.” [Boston Globe, 3/29/2004]

Entity Tags: Vincent Cannistraro, Larry DiCara, Robert Gelbard, Richard A. Clarke, William Jefferson (“Bill”) Clinton

Timeline Tags: Complete 911 Timeline

The “Team B” intelligence analysis exercise of 1975, which so disastrously overestimated the Soviet threat (see November 1976), returns in the form of the “Rumsfeld Commission,” which issues its report this month. Conservative commentators and former participants have called for a second “Team B”-style competitive intelligence analysis ever since the fall of the Berlin Wall (see 1990, 1994, and 1996). The “Commission to Assess the Ballistic Missile Threat to the United States” (see July 15, 1998), led by former Defense Secretary Donald Rumsfeld, is packed with conservative and neoconservative hardliners much as the original Team B cadre was; it includes some former Team B members such as former Pentagon official Paul Wolfowitz. Like the original Team B, the Rumsfeld Commission challenges CIA estimates of foreign military threats; like the original Team B, the Rumsfeld Commission wildly overestimates the impending threat from countries such as Iran and North Korea, both of which it judges will be capable of striking the US with nuclear weapons in five years or perhaps less. The original Team B findings impelled thirty years of full-bore military spending by the US to counter a Soviet threat that was fading, not growing; the Rumsfeld Commission’s equally alarmist findings impels a new push for spending on the so-called “Star Wars” ballistic missile defense system (see March 23, 1983). Conservative activist Phyllis Schlafly will observe that the Rumsfeld Commission’s report “provided Congress with enough talking points to win the argument [on missile defense] both in the strategic arena and in the 20-second soundbite television debates.” Former State Department intelligence analyst Greg Thielmann will later observe, “time has proven Rumsfeld’s predictions dead wrong.” Author and professor Gordon R. Mitchell will write that the second “Team B” exercise shows “that by 1998, Rumsfeld and Wolfowitz had honed the art of intelligence manipulation through use of competitive intelligence analysis. Retrospective assessments revealing serious flaws in the Team B work products came long after political officials had already converted the alarmist reports into political support for favored military policies.” [Quarterly Journal of Speech, 5/2006 pdf file]

Entity Tags: Strategic Defense Initiative, ’Team B’, Central Intelligence Agency, Commission to Assess the Ballistic Missile Threat to the United States, Donald Rumsfeld, Gordon R. Mitchell, Phyllis Schlafly, Paul Wolfowitz, Greg Thielmann

Timeline Tags: Neoconservative Influence

El Shifa Plant in Sudan.El Shifa Plant in Sudan. [Source: US government]The US fires 66 missiles at six al-Qaeda training camps in Afghanistan and 13 missiles at a pharmaceutical factory in Khartoum, Sudan, in retaliation for the US embassy bombings. [Washington Post, 10/3/2001] The US insists the attacks are aimed at terrorists “not supported by any state,” despite obvious evidence to the contrary. The Sudanese Al Shifa factory is hit in the middle of the night when it is unoccupied. Intelligence will later suggest that the factory had no links to bin Laden (see September 23, 1998). Between six and 30 people are killed in the Afghanistan attacks. But no important al-Qaeda figures die. [Observer, 8/23/1998; New Yorker, 1/24/2000; Wright, 2006, pp. 285] At least one of the missiles accidentally landed inside Pakistan and Pakistan may have been able to build their own cruise missile from examining the remains. There are additional reports that bin Laden was able to sell unexploded missiles to China for more than $10 million. [Wright, 2006, pp. 285] President Clinton is soon widely accused of using the missile strike to distract the US public from a personal sex scandal (see August 17-Late August 1998).

Entity Tags: Al-Qaeda, Clinton administration

Timeline Tags: Complete 911 Timeline

Wissam al-Zahawie, Iraq’s ambassador to the Vatican, sets off on a trip to several African countries as part of an effort to convince African heads of state to visit Iraq. Saddam Hussein hopes that these visits will help break the embargo on flights to Iraq and undermine the UN sanctions regime. Zahawie’s first stop is Niger, where he meets with the country’s President Ibrahim Bare Mainassara for one hour. Mainassara promises that he will visit Baghdad the following April. (He is assasinated before he has an opportunity to do this.) [Sunday Herald (Glasgow), 7/13/2003; Independent, 8/10/2003; Time, 10/2/2003; New Yorker, 10/27/2003] In early 2002, the Italian military intelligence service, SISMI, will allege in a report (see February 5, 2002) sent to the US that the motive behind the visit is to discuss the future purchase of uranium oxide, also known as “yellowcake” (see October 15, 2001). [New Yorker, 10/27/2003] However, no one at this time suggests that the trip’s motives have anything to do with acquiring uranium. Zahawie’s trip is reported in the local newspaper as well as by a French news agency. The US and British governments are aware of the trip and show no concern about Niger, which is actively seeking economic assistance from the United States. [New Yorker, 10/27/2003] In 2003, al-Zawahie will tell British reporters: “My only mission was to meet the president of Niger and invite him to visit Iraq. The invitation and the situation in Iraq resulting from the genocidal UN sanctions were all we talked about. I had no other instructions, and certainly none concerning the purchase of uranium.” [Independent, 8/10/2003]

Entity Tags: Wissam al-Zahawie, Ibrahim Bare Mainassara

Timeline Tags: Niger Uranium and Plame Outing

Yellowcake.Yellowcake. [Source: CBC]Pakistani nuclear scientist A. Q. Khan takes a trip to West Africa. Ostensibly, he is going to oversee the construction of the Hendrina Khan Hotel in Timbuktu, Mali, which he bought the year before and is named after his wife, but it is believed that is just a cover for nuclear-related business. He spends several days in Khartoum, Sudan, where he is spotted touring the al-Shifa factory, bombed by the US the year before in response to al-Qaeda bombings in Africa (see August 20, 1998). In 2006, intelligence sources in India and Israel will claim that Khan actually partly owns the factory. Khan then travels to N’Djamena, the capital of Chad, Timbuktu in Mali, and Niamey, the capital of Niger. Niger has considerable uranium deposits and had been a major supplier of yellowcake uranium to Pakistan in the 1970s. Khan returns to Sudan, where he meets with the Sudanese president, and then returns to Pakistan. He is accompanied by his top nuclear aides and a number of Pakistani generals, and all expenses on the trip are paid for by the Pakistani government.
CIA Investigates Khan Trip - CIA undercover agent Valerie Plame Wilson learns about the trip, and the CIA is so concerned that it launches an investigation, especially to find out if Khan could be buying yellowcake from Niger. Plame Wilson’s husband Joseph Wilson, a former National Security Council official and US ambassador to the nearby country of Gabon who has close ties to important politicians in Niger, and who who has just set up a private consulting firm with a focus on advising clients who want to do business in Africa, is approached by officials from the CIA’s National Resources Division (NR) to visit Niger. The agency asks Wilson, who already has a business trip planned to West Africa, to find out what he can about Khan’s trip.
Illicit Uranium Sales Highly Unlikely - Wilson concludes that illicit uranium sales are very unlikely since the French government tightly controls Niger’s uranium mines and uranium sales. However, Khan’s trip does raise concern that he could be working with Osama bin Laden, because of his interest in the al-Shifa factory in Sudan, and because of intelligence that the hotel he owns in Timbuktu was paid for by bin Laden as part of a cooperative deal between them. The CIA writes and distributes a report on the trip. (In 2004, the Senate Intelligence Committee will erroneously conclude that the CIA did not distribute the Wilson-Niger report—see July 9, 2004.) Wilson will keep this trip secret, even refusing to mention it in his 2004 memoir The Politics of Truth, presumably because he signed a confidentiality agreement with the CIA. In 2002, he will return to Niger to investigate if Saddam Hussein could be buying uranium in Niger (see February 21, 2002-March 4, 2002). That will lead to the eventual outing of his wife Plame Wilson’s status as a CIA agent. [Levy and Scott-Clark, 2007, pp. 283-285, 516; Wilson, 2007, pp. 358-360]

Entity Tags: Valerie Plame Wilson, Abdul Qadeer Khan, Osama bin Laden, Joseph C. Wilson

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network, Niger Uranium and Plame Outing

Valerie Plame Wilson, a covert CIA agent (see Fall 1992 - 1996) posing as an energy executive, lists “Brewster-Jennings & Assoc.” as her employer when making a $1,000 donation to the presidential campaign of Al Gore (D-TN). “Brewster Jennings” will later be revealed to be a CIA front company (see October 3, 2003). [FactCheck (.org), 7/22/2005; Chicago Tribune, 3/11/2006]

Entity Tags: Valerie Plame Wilson, Central Intelligence Agency, Brewster Jennings

Timeline Tags: Niger Uranium and Plame Outing

Former President George H. W. Bush, a former director of the CIA, speaks at the dedication ceremony of the new intelligence center bearing his name. In the course of his speech, Bush says: “We need more human intelligence. That means we need more protection for the methods we use to gather intelligence and more protection for our sources, particularly our human sources, people that are risking their lives for their country.… I have nothing but contempt and anger for those who betray the trust by exposing the name of our sources. They are, in my view, the most insidious, of traitors.” [Central Intelligence Agency, 4/26/1999] These remarks will later be unearthed in conjunction with the White House’s leaking of the identity of covert CIA agent Valerie Plame Wilson (see June 23, 2003, July 7, 2003, 8:30 a.m. July 8, 2003, July 8, 2003, 11:00 a.m. July 11, 2003, Late Afternoon, July 12, 2003, and Before July 14, 2003), and the publication of her name and status by conservative columnist Robert Novak (see July 14, 2003).

Entity Tags: George Herbert Walker Bush, Bush administration (43), Robert Novak, Central Intelligence Agency, Valerie Plame Wilson

Timeline Tags: Niger Uranium and Plame Outing

A businessman reportedly approaches Nigerien Prime Minister Ibrahim Mayaki and insists that he meet with an Iraqi delegation to discuss “expanding commercial relations” between Niger and Iraq. Mayaki reportedly interprets “expanding commercial relations” to mean that Iraq is interested in discussing uranium sales. According to Mayaki, he does meet the delegation but avoids discussion of trade issues because of UN sanctions on the country. They reportedly never discuss what the businessman had meant when he said Iraq was interested in “expanding commercial relations.” [US Congress, 7/7/2004] A US embassy official later tells former ambassador Joseph Wilson, who himself will visit Niger to determine the facts behind American concerns that Iraq is attempting to secure Nigerien uranium (see Fall 1999), that Mayaki is extremely wary of dealing with Iraq, and keeps the conversations on very general levels. The Iraqi may have wanted to discuss uranium, the embassy official later recalls, but nothing is ever said on the subject. Wilson later learns from the official that Mayaki speaks to the Iraqi information minister, Muhammad Saeed al-Sahhaf, disparagingly called “Baghdad Bob” by the Americans. At the time, Wilson is not aware of the Iraqi’s identity, so he does not include the name in his report to the CIA. [Wilson, 2004, pp. 27-28] Alan Foley, the director of the CIA’s Nonproliferation Center (see February 5, 2003), will later tell a reporter that an item in Wilson’s report (see March 4-5, 2002) leads him to believe that there may be some truth to the Iraq-Niger allegations. Writing about Foley’s assertion in 2004, Wilson says he believes that Foley is referring to the 1999 conversation between the embassy official and al-Sahhaf. Wilson will ask, “Could it be that we went to war over a conversation in which the word ‘uranium’ was not spoken at all?” The Nigerien official later tells Wilson that he wondered if al-Sahhaf might have intended to ask about a possible uranium deal in subsequent conversations. “Was that the smoking gun that could supposedly have become a mushroom cloud?” Wilson will ask. “And so is it possible that, because of that non-conversation, [thousands of] Americans have been killed, and [billions] of national treasure spent?” [Wilson, 2004, pp. 424]

Entity Tags: Muhammad Saeed al-Sahhaf, Joseph C. Wilson, Ibrahim Mayaki, Alan Foley

Timeline Tags: Niger Uranium and Plame Outing

Former ambassador Joseph Wilson, who has spent much of his political career representing the US in West Africa, visits Niger at the behest of the CIA to investigate what a Senate investigation (see July 9, 2004) will later call “uranium-related matters.” Wilson is chosen in part because his wife, covert CIA official Valerie Plame Wilson, suggested that since he was going to Niger on business in the near future, he “might be willing to use his contacts in the region” to obtain information. The CIA is interested in a meeting between Niger’s former prime minister, Ibrahim Mayaki, and a delegation from Iraq to discuss “expanding commercial relations” between the two nations. Wilson will later say that the subject of uranium never comes up in a meeting he has with Mayaki (see May 2, 2004). However, CIA analysts will interpret Wilson’s information to mean that Mayaki “interpreted ‘expanding commercial relations’ to mean that the [Iraqi] delegation wanted to discuss uranium yellowcake sales.” The CIA will believe that Wilson’s report bolsters its own suspicions that Iraq is attempting to buy yellowcake uranium from Niger. An intelligence officer will later report that Mayaki indicated that the Iraqis had expressed an interest in buying uranium from Niger. [FactCheck (.org), 7/26/2004; FactCheck (.org), 7/22/2005]

Entity Tags: Ibrahim Mayaki, Central Intelligence Agency, Valerie Plame Wilson, Joseph C. Wilson

Timeline Tags: Niger Uranium and Plame Outing

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

People involved in the 2000 PNAC report (from top left): Vice
President Cheney, Florida Governor Jeb Bush, Defense Secretary Rumsfeld,
Deputy Defense Secretary Paul Wolfowitz, Cheney Chief of Staff I. Lewis
Libby, Undersecretary of State John Bolton, Undersecretary of Defense Dov
Zakheim, and author Eliot Cohen.
People involved in the 2000 PNAC report (from top left): Vice President Cheney, Florida Governor Jeb Bush, Defense Secretary Rumsfeld, Deputy Defense Secretary Paul Wolfowitz, Cheney Chief of Staff I. Lewis Libby, Undersecretary of State John Bolton, Undersecretary of Defense Dov Zakheim, and author Eliot Cohen. [Source: Public domain]The neoconservative think tank Project for the New American Century writes a “blueprint” for the “creation of a ‘global Pax Americana’” (see June 3, 1997). The document, titled Rebuilding America’s Defenses: Strategies, Forces and Resources for a New Century, was written for the George W. Bush team even before the 2000 presidential election. It was written for future Vice President Cheney, future Defense Secretary Rumsfeld, future Deputy Defense Secretary Paul Wolfowitz, Florida Governor and Bush’s brother Jeb Bush, and Cheney’s future chief of staff Lewis Libby. [Project for the New American Century, 9/2000, pp. iv and 51 pdf file]
Plans to Overthrow Iraqi Government - The report calls itself a “blueprint for maintaining global US preeminence, precluding the rise of a great power rival, and shaping the international security order in line with American principles and interests.” The plan shows that the Bush team intends to take military control of Persian Gulf oil whether or not Saddam Hussein was in power and should retain control of the region even if there is no threat. It says: “The United States has for decades sought to play a more permanent role in Gulf regional security. While the unresolved conflict with Iraq provides the immediate justification, the need for a substantial American force presence in the Gulf transcends the issue of the regime of Saddam Hussein.” The report calls for the control of space through a new “US Space Forces,” the political control of the internet, the subversion of any growth in political power of even close allies, and advocates “regime change” in China, North Korea, Libya, Syria, Iran and other countries. It also mentions that “advanced forms of biological warfare that can ‘target’ specific genotypes may transform biological warfare from the realm of terror to a politically useful tool” (see February 7, 2003). [Project for the New American Century, 9/2000 pdf file; Sunday Herald (Glasgow), 9/7/2002]
Greater Need for US Role in Persian Gulf - PNAC states further: “The United States has for decades sought to play a more permanent role in Gulf regional security. While the unresolved conflict with Iraq provides the immediate justification, the need for a substantial American force presence in the Gulf transcends the issue of the regime of Saddam Hussein.”
'US Space Forces,' Control of Internet, Subversion of Allies - PNAC calls for the control of space through a new “US Space Forces,” the political control of the Internet, and the subversion of any growth in political power of even close allies, and advocates “regime change” in China, North Korea, Libya, Syria, Iran, and other countries.
Bioweapons Targeting Specific Genotypes 'Useful' - It also mentions that “advanced forms of biological warfare that can ‘target” specific genotypes may transform biological warfare from the realm of terror to a politically useful tool.”
'A New Pearl Harbor' - However, PNAC complains that thes changes are likely to take a long time, “absent some catastrophic and catalyzing event—like a new Pearl Harbor.” [Los Angeles Times, 1/12/2003]
Bush Will Claim a 'Humble' Foreign Policy Stance - One month later during a presidential debate with Al Gore, Bush will assert that he wants a “humble” foreign policy in the Middle East and says he is against toppling Saddam Hussein in Iraq because it smacks of “nation building” (see October 11, 2000). Around the same time, Cheney will similarly defend Bush’s position of maintaining President Clinton’s policy not to attack Iraq, asserting that the US should not act as though “we were an imperialist power, willy-nilly moving into capitals in that part of the world, taking down governments.” [Washington Post, 1/12/2002] Author Craig Unger will later comment, “Only a few people who had read the papers put forth by the Project for a New American Century might have guessed a far more radical policy had been developed.” [Salon, 3/15/2004] A British member of Parliament will later say of the PNAC report, “This is a blueprint for US world domination—a new world order of their making. These are the thought processes of fantasist Americans who want to control the world.” [Sunday Herald (Glasgow), 9/7/2002] Both PNAC and its strategy plan for Bush are almost virtually ignored by the media until a few weeks before the start of the Iraq war (see February-March 20, 2003).

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). [Truthout (.org), 1/17/2006] In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. [New York Times, 12/16/2007]

Entity Tags: Bush administration (43), National Security Agency

Timeline Tags: Civil Liberties

The Bush team moves into Washington. Neoconservative Zalmay Khalilzad heads the Pentagon transition team, and he ensures that plenty of his friends and colleagues move into the civilian offices of the Defense Department. Four of the most influential advocates for the US overthrow of Iraq’s Saddam Hussein—Elliott Abrams, Douglas Feith, Richard Perle, and Abram Shulsky—are waiting to learn where they will serve in the department. But Vice President Cheney is still concerned with ensuring the placement of his own colleagues and cronies who will help him build what many will call the “imperial presidency.” Secretary of State Colin Powell, Cheney’s ideological rival, is working to install his friend and colleague Richard Armitage as deputy secretary of defense. For Cheney, Armitage would be a calamity—although Armitage is sufficiently hardline and in line with conservative foreign policy aims, he is far too centrist for Cheney and the neoconservatives. The neoconservative magazine the Weekly Standard alerts the faithful to the potential problem with an article entitled “The Long Arm of Colin Powell: Will the Next Secretary of State Also Run the Pentagon?” Powell does not get his wish; Armitage eventually becomes deputy secretary of state. Abrams will join the National Security Council; Khalilzad, Feith, and Shulksy will join the Defense Department; and Perle will head the Defense Policy Board, an independent group that advises the Pentagon. [Weekly Standard, 12/25/2000 pdf file; Unger, 2007, pp. 115, 191-192, 204, 249]

Entity Tags: Elliott Abrams, Colin Powell, Bush administration (43), Abram Shulsky, Douglas Feith, Richard (“Dick”) Cheney, Richard Armitage, US Department of Defense, Richard Perle, Weekly Standard, Zalmay M. Khalilzad, Saddam Hussein

Timeline Tags: Neoconservative Influence

Future 9/11 Commission Executive Director Philip Zelikow is not offered a job in the Bush administration, and returns to the Miller Center of Public Affairs at the University of Virginia to teach. Zelikow had worked on the transition team (see January 3, 2001), and thought he would receive an important position in the new administration. He told his friends he thought he was in line for the position of deputy national security adviser to Condoleezza Rice, with whom he had written a book in the mid-1990s (see 1995). Most people in the Bush administration admire his ability, but find him hard to work with. White House Chief of Staff Andrew Card will even describe Zelikow as a “bully” historian. Author Philip Shenon will later comment that Zelikow is “perplexed that his talents had not been recognized by the people who handed out the best jobs in the Bush administration.” After returning to university, Zelikow will lobby the White House to make the university where he works the official repository of its oral history. His point of contact at the White House is political adviser Karl Rove. [Shenon, 2008, pp. 42-44]

Entity Tags: Andrew Card, Karl C. Rove, Philip Shenon, Philip Zelikow

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Condoleezza Rice and Philip Zelikow.Condoleezza Rice and Philip Zelikow. [Source: Public domain]National Security Adviser Rice decides this day to retain Richard Clarke, counterterrorism “tsar” for the Clinton administration, and his staff. However, she downgrades his official position as National Coordinator for Counterterrorism. While he is still known as the counterterrorism “tsar,” he has less power and now reports to deputy secretaries instead of attending Cabinet-level meetings. He no longer is able to send memos directly to the president, or easily interact with Cabinet-level officials. [Clarke, 2004, pp. 227-30; Guardian, 3/25/2004] Clarke will not be able to meet with President Bush even a single time before 9/11 to discuss al-Qaeda (see January 25, 2001-September 10, 2001). In 2004, Rice will reveal that the person she tasks with considering changes to Clarke and his staff is Philip Zelikow, the future Executive Director of the 9/11 Commission. Zelikow recuses himself from those parts of the 9/11 Commission’s investigation directly relating to his role in this and other matters. However, 9/11 victims’ relatives are not satisfied. For instance, one relative says, “Zelikow has conflicts. I’m not sure that his recusal is sufficient. His fingerprints are all over that decision [to demote Clarke].” [United Press International, 4/9/2004]

Entity Tags: Philip Zelikow, Richard A. Clarke, Condoleezza Rice

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Shortly after George W. Bush is inaugurated, “[k]ey personnel, long-time civilian professionals” at the Pentagon’s Near East South Asia (NESA) desk are moved or replaced with people from neoconservative think tanks. [American Conservative, 12/1/2003; Mother Jones, 1/2004] Joe McMillan, the Office Director, is moved to a new location outside of the Pentagon, which according to Karen Kwiatkowski, who works at the NESA desk, is odd because “the whole reason for the Office Director being a permanent civilian (occasionally military) professional is to help bring the new appointee up to speed, ensure office continuity, and act as a resource relating to regional histories and policies.” [American Conservative, 12/1/2003; Mother Jones, 1/2004; Salon, 3/10/2004] Larry Hanauer, who has long been at the Israel-Syria-Lebanon desk and who is known to be “even-handed with Israel,” is replaced by David Schenker of the Washington Institute. [American Conservative, 12/1/2003; Mother Jones, 1/2004] Other veteran NESA employees who are banished include James Russell, who has served as the country director for Saudi Arabia, Kuwait and the United Arab Emirates, and Marybeth McDevitt, the country director for Egypt. [Mother Jones, 1/2004]

Entity Tags: Marybeth McDevitt, David Schenker, Larry Hanauer, James Russell, Karen Kwiatkowski, Joe McMillan

Timeline Tags: Events Leading to Iraq Invasion, Neoconservative Influence

Counterterrorism “tsar” Richard Clarke submits a comprehensive plan to deal with al-Qaeda within days of President Bush’s inauguration (see January 25, 2001). He wants to meet with Bush directly to discuss it with him, but he is unable to do so before 9/11. Clarke will later recall, “I asked for a meeting with the president several times beginning, in fact, before [National Security Adviser] Rice even took office in the transition briefing. I said I have given this briefing to the vice president, I’ve given it to the secretary of state, I’ve given it now to you, I would like to give it to the president. And what I was told was I could brief the president on terrorism after the policy development process had been completed.” He does have one meeting with Bush before 9/11, but only to discuss cyber security because Clarke is planning to quit his current job to focus on that issue instead (see June 2001). When asked why he didn’t bring up al-Qaeda at that meeting, Clarke will reply, “Because I had been told by Dr. Rice and her deputy that this was a briefing on countering the cyber threats and not on al-Qaeda and that I would have my opportunity on al-Qaeda if I just held on, eventually they would get to it, probably in September.” [ABC News, 4/8/2004] The Bush administration had downgraded Clarke’s position in early January 2001 and he was no longer able to send memos directly to the president as he could during the Clinton administration (see January 3, 2001).

Entity Tags: Richard A. Clarke, George W. Bush, Condoleezza Rice

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Just after assuming the presidency, George W. Bush tells reporters, “We’re going to have a frank dialogue about a lot of issues, and I’m going to start by reminding that we know the difference between the executive branch and the legislative branch, but I do believe the president and the vice president can play a part, a strong part, in helping advance an American agenda.” [Congress Daily, 6/29/2007]

Entity Tags: George W. Bush, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

The NSA asks Qwest, a major US telecommunications firm and a cutting-edge provider of high-tech wireless and Internet connectivity, to reveal information about its customers and their phone calls. Qwest’s CEO, Joe Nacchio, refuses after meeting with NSA officials and deciding that the program is illegal without court orders (see February 27, 2001). The NSA refuses to seek court authorization for its wiretaps and electronic surveillance. The NSA will renew its request from Qwest after the 9/11 attacks, and will also ask the firm to help it track suspected terrorists. Other telecommunications firms such as Verizon, AT&T, and BellSouth, will comply with the NSA’s requests (see February 2001 and Beyond).
Fears of a 'Digital Pearl Harbor' - According to a former White House official, the NSA’s primary purpose before 9/11 is to watch for computer hackers and foreign-government agents trying to hack into the government’s computer information systems, particularly those within the Defense Department. Government officials fear a “digital Pearl Harbor” if hackers were ever to seize control of those systems or other key US infrastructures. The former official will say in 2007 that the NSA’s proposal to Qwest is, “Can you build a private version of Echelon and tell us what you see?” Echelon is the NSA’s enormous signals intelligence (SIGINT) network used by the agency and its counterparts in Australia, Canada, New Zealand, and Britain. Qwest is constructing a high-speed network for phone and Internet traffic, and the NSA wants Qwest to keep records of its customers’ transactions for it. The NSA, another source will say, wants to analyze call, e-mail, and other transmissions’ traffic patters for signs of suspicious activity. The White House official will say that telecom firms such as Qwest “have an enormous amount of intelligence-gathering” capability. They don’t have to target individual customers to “look for wacky behavior,” or “groups communicating with each other in strange patterns.” Such information could augment intelligence that the NSA and other agencies were gathering from other sources, and enable the NSA to collect the information it wants without violating laws prohibiting it and other intelligence agencies from directly gathering data on US citizens.
Ill Will from NSA - Nacchio’s refusal to go along with the NSA’s request garners it some ill will among the US intelligence community, the former White House official will say. Nacchio will contend that because of his refusal, the NSA denied Qwest a lucrative government contract. A former high-level intelligence official will add that other telecom companies had little problem agreeing to the NSA’s requests. Nacchio believes that the NSA’s request is illegal under the Telecommunications Act without court orders; the former White House official will acknowledge that it might violate the 1986 Electronic Communications Privacy Act. After 9/11, that law will be amended by the USA Patriot Act to give the government more room to monitor US citizens.
Qwest, Other Telecom Firms Cooperative with Other Agencies - Qwest is apparently less reluctant to share other information with the Pentagon. Qwest began sharing its technology and information as far back as 1997 (see 1997). In May 2001, Commerce Secretary Don Evans will tell the Senate Appropriations Committee that his department helped persuade Qwest to “share proprietory information with the Defense Department to evaluate the vulnerability of its network.” Qwest, which serves the Rocky Mountain and West Coast regions of the country, covers the areas that house some of the military’s most important command-and-control facilities, including the US Strategic Command. In the 1990s, Qwest began actively pursuing contracts with the Defense Department to build more modern, private, secure networks for defense and intelligence agencies. [National Journal, 11/2/2007]
Meetings with Bush Officials - In court documents filed in 2006 to challenge his prosecution for insider trading and, in heavily redacted form, released to the public in 2007, Nacchio will indicate that telecom executives met frequently with Bush administration officials before 9/11, including Deputy Defense Secretary Paul Wolfowitz, National Security Adviser Condoleezza Rice, NSA Director Michael Hayden, and counterterrorism “tsar” Richard Clarke. Many telecom firms are working closely with the government to develop highly classified operations, including joint networks to which the government will have unfettered access. The future director of national intelligence, Mike McConnell, works with telecom firms to expand the cooperation between the telecom industry and the federal government. [Salon, 10/15/2007]

Entity Tags: Condoleezza Rice, US Department of Defense, Bush administration (43), Verizon Communications, AT&T, US Department of Commerce, Senate Appropriations Committee, US Strategic Command, BellSouth, Donald L. Evans, Echelon, Richard A. Clarke, Qwest, Mike McConnell, National Security Agency, Joe Nacchio, Paul Wolfowitz

Timeline Tags: Civil Liberties

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Timeline Tags: Civil Liberties

CIA case officer Valerie Plame Wilson (see 1997), returning to duty from maternity leave and now going by her married name, is one of two officers assigned to the Iraq desk of the counterproliferation division (CPD). Plame Wilson’s job involves extensive covert operational responsibility. She supervises and coordinates NOCs (nonofficial covered officers) in several areas of the globe, helping plan and execute operations to recruit Iraqi nationals as CIA assets, focusing on graduate students, scientists, and businessmen, hoping to find information about Iraq’s secretive quest for unconventional weapons parts and technologies. Shortly after the 9/11 attacks, Plame Wilson is made the chief of operations of the Iraq branch of CPD. That branch is renamed the “Joint Task Force on Iraq,” or JTFI. [Wilson, 2007, pp. 365-366]

Entity Tags: Counterproliferation Division, Joint Task Force on Iraq, Central Intelligence Agency, Valerie Plame Wilson

Timeline Tags: Niger Uranium and Plame Outing

One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing.One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing. [Source: Matt Crypto / Public domain]The BBC reports on advances in electronic surveillance. The US’s global surveillance program, Echelon, has become particularly effective in monitoring mobile phones, recording millions of calls simultaneously and checking them against a powerful search engine designed to pick out key words that might represent a security threat. Laser microphones can pick up conversations from up to a kilometer away by monitoring window vibrations. If a bug is attached to a computer keyboard, it is possible to monitor exactly what is being keyed in, because every key on a computer has a unique sound when depressed. [BBC, 4/4/2001] Furthermore, a BBC report on a European Union committee investigation into Echelon one month later notes that the surveillance network can sift through up to 90 percent of all Internet traffic, as well as monitor phone conversations, mobile phone calls, fax transmissions, net browsing history, satellite transmissions and so on. Even encryption may not help much. The BBC suggests that “it is likely that the intelligence agencies can crack open most commercially available encryption software.” [BBC, 5/29/2001]

Entity Tags: Echelon, British Broadcasting Corporation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

The Energy Department reports that the 7075-T6 aluminum tubes being sought by Iraq from China (see July 2001) have the same specifications as tubes previously used by Iraq to produce conventional rocket motor casings. The report also notes that Iraq had 160,000 tubes on hand in 1989 and only 66,737 in 1996 (see 1996). The findings are published in the department’s classified Daily Intelligence Highlight, which is posted on an intranet network accessible by members of the intelligence community and the White House. [US Congress, 7/7/2004; New York Times, 10/3/2004]

Entity Tags: US Department of Energy

Timeline Tags: Events Leading to Iraq Invasion

An unnamed high-ranking State Department official is said to receive a $15,000 bribe around this time in connection with assistance he provides to a nuclear smuggling ring run by Pakistani scientist A. Q. Khan (see (1997-2002) and Summer-Autumn 2001), according to FBI translator Sibel Edmonds. Edmonds will later leave the FBI, becoming a whistleblower, and will say she knows this based on telephone conversations she translated. [Sunday Times (London), 1/27/2008] According to an intercepted phone call, the package is to be dropped off at an agreed location by someone in the Turkish diplomatic community who is working for the network. [Sunday Times (London), 1/6/2008] The high-ranking State Department official who is not named by the Sunday Times is said to be Marc Grossman by both Larisa Alexandrovna of Raw Story and former CIA officer Philip Giraldi, writing in the American Conservative. [Raw Story, 1/20/2008; American Conservative, 1/28/2008]

Entity Tags: Marc Grossman, Larisa Alexandrovna, US Department of State, Federal Bureau of Investigation, Philip Giraldi, Sibel Edmonds

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network

In July 2001, NSA director Michael Hayden tells a reporter that the NSA does not monitor any US citizens without court warrants from the Foreign Intelligence Surveillance Court (FISC). “We don’t do anything willy-nilly,” Hayden says. “We’re a foreign intelligence agency. We try to collect information that is of value to American decision-makers, to protect American values, America—and American lives. To suggest that we’re out there, on our own, renegade, pulling in random communications, is—is simply wrong. So everything we do is for a targeted foreign intelligence purpose. With regard to the—the question of industrial espionage, no. Period. Dot. We don’t do that.” When asked how Americans could verify that, Hayden says that they should simply trust the NSA to police and monitor itself, along with oversight from the White House and from Congress. However, it will later come to light that the NSA began illegally monitoring US citizens from the start of the Bush administration (see Spring 2001). A former NSA official will later dispute Hayden’s account. “What do you expect him to say?” the official says. “He’s got to deny it. I agree. We weren’t targeting specific people, which is what the President’s executive order does. However, we did keep tabs on some Americans we caught if there was an interest [by the White House.] That’s not legal. And I am very upset that I played a part in it.” [Truthout (.org), 1/17/2006] Hayden also denies persistent allegations from European government officials that the agency has engaged in economic espionage to help American companies against European competitors (see April 4, 2001). In March 2001, the American Civil Liberties Union’s Barry Steinhardt says that “since there is no real check on [the NSA], there is no way to know” if they are following the law. Steinhardt says that Congress is the only real check on possible NSA abuses, but it has consistently failed to exercise any sort of aggressive oversight on the agency. [CNN, 3/31/2001]

Entity Tags: National Security Agency, Barry Steinhardt, Michael Hayden, American Civil Liberties Union

Timeline Tags: Civil Liberties

An Echelon station in Menwith Hill, Britain.An Echelon station in Menwith Hill, Britain. [Source: BBC]By the 1980s, a high-tech global electronic surveillance network shared between the US, Britain, Canada, Australia, and New Zealand is gathering intelligence all over the world. The BBC describes Echelon’s power as “astounding,” and elaborates: “Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. They are looking for evidence of international crime, like terrorism.” [BBC, 11/3/1999] One major focus for Echelon before 9/11 is al-Qaeda. For instance, one account mentions Echelon intercepting al-Qaeda communications in Southeast Asia in 1996 (see Before September 11, 2001). A staff member of the National Security Council who regularly attends briefings on bin Laden states, “We are probably tapped into every hotel room in Pakistan. We can listen in to just about every phone call in Afghanistan.” However, he and other critics will claim one reason why US intelligence failed to stop terrorism before 9/11 was because there was too much of a focus on electronic intelligence gathering and not enough focus on human interpretation of that vast data collection. [Toronto Star, 2/2/2002]

Entity Tags: United Kingdom, United States, Osama bin Laden, Echelon, National Security Council, Canada, Australia, Al-Qaeda, New Zealand

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Shortly after the 9/11 attacks, the NSA expands surveillance operations, relying on its own authorities; some sources indicate this includes a massive domestic data mining and call tracking program, and some contend that it is illegal. In a 2006 public briefing, NSA Director Michael Hayden will say, “In the days after 9/11, NSA was using its authorities and its judgment to appropriately respond to the most catastrophic attack on the homeland in the history of the nation.” Following an October 1 briefing by Hayden to the House Intelligence Committee, Representative Nancy Pelosi (D-CA) will write to Hayden on October 11, saying, “[Y]ou indicated that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance” (see October 11, 2001). Some evidence indicates NSA domestic surveillance began even before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Nancy Pelosi, 1/6/2006; Michael Hayden, 1/23/2006]
No Connection to Bush-Authorized Warrantless Domestic Call Monitoring - In his 2006 remarks, Hayden will clearly distinguish between the expansion he initiates under his own authorities, and the warrantless monitoring of calls with one end outside the US authorized later by President Bush (see October 4, 2001), saying, “[E]xcept that they involved NSA, these [Hayden-authorized] programs were not related… to the authorization that the president has recently spoken about.” [Michael Hayden, 1/23/2006]
'Stellar Wind' Is Name of Hayden-Authorized Program - In 2012 interviews, former NSA official William Binney will indicate that “Stellar Wind” is the name of the surveillance program initiated by Hayden. [Wired News, 2/15/2012; Democracy Now!, 4/20/2012] Some sources will refer to the Bush-authorized eavesdropping as being part of the Stellar Wind program. [Newsweek, 12/22/2008]
Differing Views on Authority for Surveillance - In his 2006 briefing, Hayden will say the Fourth Amendment only protects Americans against “unreasonable search and seizure,” and that 9/11 changed what was to be considered “reasonable.” Specifically, if communications are believed to have “[i]nherent foreign intelligence value,” interception of these communications is reasonable. In addition to referring to Hayden’s “view of [his] authorities” as “expansive,” Pelosi’s letter will give another indication that the NSA’s new standard is significantly broader than it was previously, stating, “You indicated that you were treating as a matter of first impression, [redacted] being of foreign intelligence interest.” Hayden will publicly clarify in 2006 that the authority for the NSA’s operational expansion exists under an Executive Order issued by President Reagan, saying, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” And, he will say, “I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities” (see October 1, 2001). In her October 11 letter, Pelosi will also write of having concerns about the program that haven’t been resolved due to restrictions on information-sharing with Congress imposed by Bush (see October 11, 2001). Binney, who pioneered the development of certain NSA data mining and surveillance technologies, will come to believe that what the NSA is doing is unconstitutional; he will first take his concerns to Congress (see Before October 31, 2001) and then resign on October 31 (see October 31, 2001). [Nancy Pelosi, 1/6/2006; Michael Hayden, 1/23/2006]
Surveillance Involves Domestic Communications - In his 2006 remarks, Hayden will not say the NSA is only targeting foreign communications under his post-9/11 authorization. Rather, the context of his remarks will indicate he is referring to domestic communications. More specifically, Hayden will state: “If the US person information isn’t relevant, the data is suppressed. It’s a technical term we use; we call it ‘minimized.’ The individual is not even mentioned. Or if he or she is, he or she is referred to as ‘US Person Number One’ or ‘US Person Number Two.’ Now, inherent intelligence value. If the US person is actually the named terrorist, well, that could be a different matter.” Hayden will also reveal that information is being passed to the FBI, an investigative agency with a primarily domestic jurisdiction, saying, “[A]s another part of our adjustment, we also turned on the spigot of NSA reporting to FBI in, frankly, an unprecedented way.” [Michael Hayden, 1/23/2006] One of Pelosi’s statements in her letter to Hayden may indicate an aspect of the domestic component: “You indicated that you were treating as a matter of first impression, [redacted] being of foreign intelligence interest,” she will write. [Nancy Pelosi, 1/6/2006] In a 2011 interview with Jane Mayer published in the New Yorker, Binney will say the NSA was obtaining “billing records on US citizens” and “putting pen registers [call logs] on everyone in the country.” [New Yorker, 5/23/2011] And in a 2012 Wired article, NSA expert James Bamford will write that Binney “explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore. If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law. Instead it chose to put the wiretapping rooms at key junction points throughout the country—large, windowless buildings known as switches—thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US.” Binney’s account is supported by other sources (see October 2001). [Wired News, 2/15/2012]
Surveillance Program Is Massive - Bamford, citing Binney, will write: “Stellar Wind… included not just eavesdropping on domestic phone calls but the inspection of domestic email. At the outset the program recorded 320 million calls a day, he says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” It is unclear exactly when this level of surveillance began. According to whistleblower AT&T employee Mark Klein, construction of secret rooms splitting communications traffic does not begin until Fall 2002 (see Fall 2002). Bamford will write that Binney says, “[T]he taps in the secret rooms dotting the country are actually powered by highly sophisticated software programs that conduct ‘deep packet inspection,’ examining Internet traffic as it passes through the 10-gigabit-per-second cables at the speed of light.” [Wired News, 2/15/2012] Also, Binney’s remark to Jane Mayer that the NSA was “putting pen registers on everyone in the country” indicates the broad scope of the program. [New Yorker, 5/23/2011]

Entity Tags: Religious Society of Friends (Quakers), US Department of Justice, National Security Agency, George W. Bush, Michael Hayden, Al-Qaeda, Foreign Intelligence Surveillance Court, House Intelligence Committee, Nancy Pelosi, Ronald Reagan

Timeline Tags: Civil Liberties

NSA director Michael Hayden addresses the NSA in a global videoconference, saying that the NSA, like other government agencies, will have to do more to protect the country from further terrorist attacks. The challenge, he says, is to balance Americans’ security with civil liberties, “to keep America free by making Americans feel safe again.” Hayden will say in a 2006 speech reflecting on that videoconference (see January 23, 2006) that US citizens operate under misconceptions about the NSA’s capabilities—that while citizens believe the NSA has a global electronic surveillance network that can, and does, spy on citizens willy-nilly, in reality the NSA is understaffed and unprepared to handle the technological advances of the last decade. Hayden will say that with more extensive domestic surveillance of US citizens and foreign visitors, the NSA could have caught some of the 9/11 hijackers before they were able to put their plan into motion. The standards by which US citizens and foreign visitors are monitored must change, Hayden believes.
Expansion of NSA Surveillance Powers - Using Ronald Reagan’s 1981 executive order 12333 (see December 4, 1981), Hayden expands the NSA’s domestic surveillance practices to eavesdrop, sometimes without court approval, on selected international calls made by US citizens. Though Hayden’s expansion of NSA surveillance is not directly authorized by President Bush, and is not the same program as authorized by Bush’s secret executive order of 2002 (see Early 2002), Hayden will later say that this expansion is based on the intelligence community’s assessment “of a serious and continuing threat to the homeland.” Hayden’s program is reviewed and approved by lawyers at the NSA, the Justice Department, and the White House, as well as Attorney General John Ashcroft. [Michael Hayden, 1/23/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, US Department of Justice, National Security Agency, John Ashcroft, George W. Bush, Bush administration (43), Ronald Reagan, Michael Hayden

Timeline Tags: Civil Liberties

The US Congress adopts a joint resolution, the Authorization for Use of Military Force (AUMF), that determines that “the president is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons.” Congress also states that the “grave acts of violence” committed on the US “continue to pose an unusual and extraordinary threat to [its] national security and foreign policy.” [US Congress, 9/14/2001] President Bush signs the resolution into law on September 18. [White House, 9/18/2001] The passage of the AUMF served another purpose: to extend presidential power. While the Defense Department and the Joint Chiefs of Staff intended the AUMF to define the conflict in narrow terms, and authorize the US to move militarily against al-Qaeda and its confederates, and the Taliban, Vice President Dick Cheney and his chief of staff, David Addington, had a larger goal. Attorney Scott Horton, who has written two major studies on interrogation of terrorism suspects for the New York City Bar Association, says in 2005 that Cheney and Addington “really wanted [the AUMF defined more broadly], because it provided the trigger for this radical redefinition of presidential power.” Addington helped draft a Justice Department opinion in late 2001, written by lawyer John Yoo (see Late September 2001), that asserted Congress cannot “place any limits on the president’s determinations as to any terrorist threat, the amount of military force to be used in response, or the method, timing, and nature of the response.” [US News and World Report, 5/21/2006]

Entity Tags: US Department of Defense, Taliban, Scott Horton, Joint Chiefs of Staff, Richard (“Dick”) Cheney, David S. Addington, George W. Bush, John C. Yoo, Al-Qaeda, Authorization to Use Military Force (AUMF)

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Neoconservative author, ad hoc White House foreign policy adviser, and one-time intelligence asset Michael Ledeen, one of the loudest voices for US military expansionism throughout the Middle East (see February 19, 1998 and October 29, 2001), writes that the US must use Iraq as the first battle of a much larger war.
Must Expand Mission to Destroy Governments, Not Merely Terror Organizations - In his book The War Against the Terror Masters: Why It Happened. Where We Are Now. How We’ll Win, Ledeen writes that the US must destroy the governments of the nations that he claims sponsor Islamist terrorism. “First and foremost, we must bring down the terror regimes, beginning with the Big Three: Iran, Iraq, and Syria,” Ledeen writes. “And then we have to come to grips with Saudi Arabia.… Once the tyrants in Iran, Iraq, Syria, and Saudi Arabia have been brought down, we will remain engaged.… We have to ensure the fulfillment of the democratic revolution.… Stability is an unworthy American mission, and a misleading concept to boot. We do not want stability in Iran, Iraq, Syria, Lebanon, and even Saudi Arabia; we want things to change. The real issue is not whether, but how to destabilize.”
US a Force for 'Creative Destruction' - The US’s current mission of battling Islamist terror is “unworthy” of such a militarily powerful nation, Ledeen asserts, and defines its true “historic mission:” “Creative destruction is our middle name, both within our society and abroad. We tear down the old order every day, from business to science, literature, art, architecture, and cinema to politics and the law. Our enemies have always hated this whirlwind of energy and creativity which menaces their traditions (whatever they may be) and shames them for their inability to keep pace.… [W]e must destroy them to advance our historic mission.” The US must be “imperious, ruthless, and relentless,” he continues, until there has been “total surrender” by the Muslim world. “We must keep our fangs bared, we must remind them daily that we Americans are in a rage, and we will not rest until we have avenged our deed, we will not be sated until we have had the blood of every miserable little tyrant in the Middle East, until every leader of every cell of the terror network is dead or locked securely away, and every last drooling anti-Semitic and anti-American mullah, imam, sheikh, and ayatollah is either singing the praises of the United States of America, or pumping gasoline for a dime a gallon on an American military base near the Arctic Circle.”
Buchanan: Ledeen's Statement Not Truly Conservative - Conservative author and commentator Pat Buchanan will write in 2003, “Passages like this owe more to Leon Trotsky than to Robert Taft and betray a Jacobin streak in neoconservatism that cannot be reconciled with any concept of true conservatism.” [American Conservative, 3/24/2003; Unger, 2007, pp. 231-232]

Entity Tags: Bush administration (43), Michael Ledeen

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion, Neoconservative Influence

John Yoo, a deputy assistant attorney general in the Department of Justice (DOJ) Office of Legal Counsel (OLC), issues a legal opinion that says the US can conduct electronic surveillance against its citizens without probable cause or warrants. According to the memo, the opinion was drafted in response to questions about whether it would be constitutional to amend the Foreign Intelligence Surveillance Act (FISA) to state that searches may be approved when foreign intelligence collection is “a purpose” of the search, rather than “the purpose.” Yoo finds this would be constitutional, but goes further. He asserts that FISA is potentially in conflict with the Constitution, stating, “FISA itself is not required by the Constitution, nor is it necessarily the case that its current standards match exactly to Fourth Amendment standards.” Citing Vernonia School Dist. 47J v. Acton, in which the Supreme Court found that warrantless searches of students were permissible, Yoo argues that “reasonableness” and “special needs” are also the standards according to which warrantless monitoring of the private communications of US persons is permissible. According to Yoo, the Fourth Amendment requirement for probable cause and warrants prior to conducting a search pertain primarily to criminal investigations, and in any case cannot be construed to restrict presidential responsibility and authority concerning national security. Yoo further argues that in the context of the post-9/11 world, with the threat posed by terrorism and the military nature of the fight against terrorism, warrantless monitoring of communications is reasonable. Some information indicates the NSA began a broad program involving domestic surveillance prior to the 9/11 attacks, which contradicts the claim that the program began after, and in response to, the attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [US Department of Justice, 9/25/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Inspectors General, 7/10/2009]
Yoo Memo Used to Support Legality of Warrantless Surveillance - Yoo’s memo will be cited to justify the legality of the warrantless domestic surveillance program authorized by President Bush in October 2001 (see October 4, 2001). NSA Director General Michael Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general.” The various post-9/11 NSA surveillance activities authorized by Bush will come to be referred to as the President’s Surveillance Program (PSP), and the first memo directly supporting the program’s legality will be issued by Yoo on November 2, 2001, after the program has been initiated (see November 2, 2001). Many constitutional authorities will reject Yoo’s legal rationale. [Michael Hayden, 1/23/2006]
Yoo Memo Kept Secret from Bush Officials Who Might Object - According to a report by Barton Gellman and Jo Becker in the Washington Post, the memo’s “authors kept it secret from officials who were likely to object,” including ranking White House national security counsel John Bellinger, who reports to National Security Adviser Condoleezza Rice. Bellinger’s deputy, Bryan Cunningham, will tell the Post that Bellinger would have recommended having the program vetted by the Foreign Intelligence Surveillance Court, which oversees surveillance under FISA. Gellman and Becker quote a “senior government lawyer” as saying that Vice President Dick Cheney’s attorney, David Addington, had “open contempt” for Bellinger, and write that “more than once he accused Bellinger, to his face, of selling out presidential authority for good ‘public relations’ or bureaucratic consensus.” [Washington Post, 6/24/2007]

Entity Tags: US Department of Justice, John Bellinger, National Security Agency, Bryan Cunningham, Condoleezza Rice, David S. Addington, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Office of Legal Counsel (DOJ), John C. Yoo, George W. Bush, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

According to author Ronald Kessler’s November 2007 book The Terrorist Watch, the NSA’s domestic surveillance program begins around two weeks after the 9/11 attacks, when President Bush meets with NSA director Michael Hayden and other NSA officials in the Oval Office. According to chief of staff Andrew Card, in attendance, Bush asks, “What tools do we need to fight the war on terror?” Hayden suggests revamping NSA guidelines to allow the agency to wiretap domestic phone calls and intercept e-mails to and from terror suspects if one end of the communication is overseas. Kessler gives the following rather lurid example: “Thus, if [Osama] bin Laden were calling the US to order the detonation of a nuclear device, and the person he called began making overseas calls, NSA could listen in to those calls as well as to bin Laden’s original call.” Kessler is a chief correspondent for the extremist conservative Web site NewsMax; his assertion is disputed by evidence suggesting that the domestic surveillance program began well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Kessler, 2007, pp. 130]

Entity Tags: National Security Agency, Andrew Card, Michael Hayden, Ronald Kessler, George W. Bush

Timeline Tags: Civil Liberties

Former AT&T employee Mark Klein.Former AT&T employee Mark Klein. [Source: PBS]The National Security Agency, as part of its huge, covert, and possibly illegal wiretapping program directed at US citizens (see Spring 2001 and After September 11, 2001), begins collecting telephone records of tens of millions of Americans, using data provided by telecommunications firms such as AT&T, Verizon, and BellSouth (see February 5, 2006). The media will not report on this database until May 2006 (see May 11, 2006). The program collects information on US citizens not suspected of any crime or any terrorist connections. Although informed sources say the NSA is not listening to or recording actual conversations, the agency is using the data to analyze calling patterns in an effort to detect terrorist activity. “It’s the largest database ever assembled in the world,” says one anonymous source. The NSA intends “to create a database of every call ever made.” As a result, the NSA has detailed records of the phone activities of tens of millions of US citizens, from local calls to family and friends to international calls. The three telecommunications companies are working with the NSA in part under the Communications Assistance Act for Law Enforcement (CALEA) (see January 1, 1995 and June 13, 2006) and in part under contract to the agency.
Surveillance Much More Extensive Than Acknowledged - The wiretapping program, which features electronic surveillance of US citizens without court warrants or judicial oversight, is far more extensive than anything the White House or the NSA has ever publicly acknowledged. President Bush will repeatedly insist that the NSA focuses exclusively on monitoring international calls where one of the call participants is a known terrorist suspect or has a connection to terrorist groups (see December 17, 2005 and May 11, 2006), and he and other officials always insist that domestic calls are not monitored. This will be proven false. The NSA has become expert at “data mining,” sifting through reams of information in search of patterns. The warrantless wiretapping database is one source of information for the NSA’s data mining. As long as the NSA does not collect “personal identifiers”—names, Social Security numbers, street addresses, and the like—such data mining is legal. But the actual efficacy of the wiretapping program in learning about terrorists and possibly preventing terrorist attacks is unclear at best. And many wonder if the NSA is not repeating its activities from the 1950s and 1960s, when it conducted “Operation Shamrock” (see 1945-1975), a 20-year program of warrantless wiretaps of international phone calls at the behest of the CIA and other intelligence agencies. Operation Shamrock, among other things, led to the 1978 passage of the Foreign Intelligence Surveillance Act (see 1978). [USA Today, 5/11/2006] In May 2006, former NSA director Bobby Ray Inman will say, “[T]his activity is not authorized” (see May 12, 2006). [Democracy Now!, 5/12/2006]
Secret Data Mining Center - In May 2006, retired AT&T technician Mark Klein, a 22-year veteran of the firm, will file a court affidavit saying that he saw the firm construct a secret data-mining center in its San Francisco switching center that would let the NSA monitor domestic and international communications (see January 2003). And former AT&T workers say that, as early as 2002, AT&T has maintained a secret area in its Bridgeton, Missouri, facility that is likely being used for NSA surveillance (see Late 2002-Early 2003).
Domestic Surveillance Possibly Began Before 9/11 - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, Verizon Communications, Mark Klein, George W. Bush, AT&T, BellSouth, Central Intelligence Agency, Communications Assistance for Law Enforcement Act (CALEA), Foreign Intelligence Surveillance Act, Qwest, National Security Agency

Timeline Tags: Civil Liberties

President Bush issues a directive authorizing the National Security Agency (NSA) to operate a warrantless domestic surveillance program. Author/journalist Jane Mayer will report in 2011, “[O]n October 4, 2001, Bush authorized the policy, and it became operational by October 6th,” and, “[t]he new policy, which lawyers in the Justice Department justified by citing President Bush’s executive authority as commander in chief, contravened a century of constitutional case law.” Mayer will interview NSA whistleblower Thomas Drake for her article and quote him as saying that, following the October 4 directive, “strange things were happening. Equipment was being moved. People were coming to me and saying, ‘We’re now targeting our own country!’” Bush’s directive is based on a legal opinion drafted by Department of Justice Office of Legal Counsel Deputy Attorney General John Yoo (see September 25, 2001). [New Yorker, 5/23/2011]
Conflicting Information regarding Date of First Authorization - The existence of the NSA’s domestic surveillance program will first be made public in December 2005, following reporting by the New York Times that will cite “[n]early a dozen current and former officials” (see December 15, 2005). The Times article will state that in 2002, “[m]onths after the Sept. 11 attacks,” Bush signed an executive order authorizing the NSA to monitor domestic phone calls, including those of US citizens and permanent residents, if one end of the call was outside the country. The Times article also mentions an NSA “‘special collection program’ [that] began soon after the Sept. 11 attacks, as it looked for new tools to attack terrorism.” The difference between the October 4, 2001 directive and the 2002 executive order referred to by the Times is unclear. [New York Times, 12/16/2005]
Other Sources for October Directive - Other sources, including Bush, NSA Director General Michael Hayden, and the inspectors general of five separate agencies, will later refer to a presidential order having been given in “October,” or “weeks” after the 9/11 attacks, and say that, subsequent to this order, international calls of US persons are targeted for content-monitoring. Following the publication of the Times article, Bush will say in a December 17, 2005 radio address: “In the weeks following the terrorist attacks on our nation, I authorized the National Security Agency, consistent with US law and the Constitution, to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations. Before we intercept these communications, the government must have information that establishes a clear link to these terrorist networks” (see December 17, 2005). This presidential authorization was based on a legal opinion drafted by Department of Justice Office of Legal Counsel attorney John Yoo (see October 18, 2001). [WhiteHouse(.gov), 12/17/2005] Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001,” which is when he “gathered key members of the NSA workforce… [and] introduced [the NSA’s] new operational authority to them.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general,” and that “the three most senior and experienced lawyers in NSA… supported the lawfulness of this program.” [Michael Hayden, 1/23/2006] In a July 10, 2009 jointly-issued report, the inspectors general of the Department of Defense, Department of Justice, CIA, NSA, and Office of the Director of National Intelligence will refer to the “President’s Surveillance Program” (PSP) and “the program’s inception in October 2001.” The report will say: “One of the activities authorized as part of the PSP was the interception of the content of communications into and out of the United States where there was a reasonable basis to conclude that one party to the communication was a member of al-Qaeda or related terrorist organizations.… The attorney general subsequently publicly acknowledged the fact that other intelligence activities were also authorized under the same presidential authorization, but the details of those activities remain classified.” [Inspectors General, 7/10/2009] Citing “a senior administration official,” the Washington Post will report on January 4, 2006: “The secret NSA program… was authorized in October 2001.… The president and senior aides have publicly discussed various aspects of the program, but neither the White House, the NSA, nor the office of the director of national intelligence would say what day the president authorized it.” [Washington Post, 1/4/2006]

Entity Tags: US Department of Justice, Thomas Drake, US Department of Defense, Office of Legal Counsel (DOJ), Office of the Director of National Intelligence, Michael Hayden, National Security Agency, George W. Bush, Central Intelligence Agency, John C. Yoo, Jane Mayer

Timeline Tags: Civil Liberties

Nancy Pelosi.Nancy Pelosi. [Source: US Congress]House Minority Leader Nancy Pelosi (D-CA) writes to NSA Director Michael Hayden questioning the nature and extent of the apparently illegal warrantless wiretapping of US citizens by the agency. Pelosi and other members of the House Intelligence Committee were briefed on October 1, 2001, by Hayden, whose agency began conducting surveillance against US citizens after the 9/11 attacks (see After September 11, 2001). Pelosi will release the letter on January 6, 2006, three weeks after the New York Times revealed that the NSA had been conducting electronic surveillance of US citizens without warrants since at least 2002 (see December 15, 2005.) Pelosi’s office will also release Hayden’s response, but almost the entire letter from Hayden is redacted.
Letter to Hayden - Pelosi writes in part, “[Y]ou indicated [in the briefing] that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance under the Foreign Intelligence Surveillance Act and related statutes, orders, regulations, and guidelines.… For several reasons, including what I consider to be an overly broad interpretation of President Bush’s directive of October 5 on sharing with Congress ‘classified or sensitive law enforcement information’ it has not been possible to get answers to my questions. Without those answers, the concerns I have about what you said on the First can not be resolved, and I wanted to bring them to your attention directly. You indicated that you were treating as a matter of first impression, [redacted ] being of foreign intelligence interest. As a result, you were forwarding the intercepts, and any information [redacted ] without first receiving a request for that identifying information to the Federal Bureau of Investigation. Although I may be persuaded by the strength of your analysis [redacted ] I believe you have a much more difficult case to make [redacted ] Therefore, I am concerned whether, and to what extent, the National Security Agency has received specific presidential authorization for the operations you are conducting. Until I understand better the legal analysis regarding the sufficiency of the authority which underlies your decision on the appropriate way to proceed on this matter, I will continue to be concerned.” The only portion of Hayden’s October 18 reply regarding Pelosi’s concerns that has not been redacted reads, “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” In January 2006, an NSA official will say that Pelosi’s concerns were adequately addressed in Hayden’s reply, and in a private briefing shortly thereafter. [Washington Post, 1/4/2006; Nancy Pelosi, 1/6/2006]
Pelosi Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). Pelosi is apparently unaware of any of this.

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi

Timeline Tags: Civil Liberties

Italy’s military intelligence service (SISMI) provides Jeff Castelli, the CIA station chief in Rome, with papers documenting an alleged uranium deal between Iraq and Niger. Castelli, who is not permitted to duplicate the papers, writes a summary of them and sends the report to Langley. [New Yorker, 10/27/2003; Knight Ridder, 11/4/2005; La Repubblica (Rome), 11/11/2005]
The allegations - The report includes four allegations:
bullet The report states that Iraq first communicated its interest in purchasing uranium from Niger at least as early as 1999. [US Congress, 7/7/2004] As blogger ERiposte will conclude through his analysis at TheLeftCoaster.Org [ERiposte, 10/31/2005] , none of the documents that are later provided to the US as the basis for this allegation include actual proof of uranium negotiations in 1999. Two of the source documents for this allegation do mention a 1999 visit by Wissam Al-Zahawi to Niger; however, no evidence has ever surfaced suggesting that there were any discussions about uranium during that visit (see February 1999). The first document (possibly authentic) is a letter, dated February 1, 1999, from the Niger embassy in Rome to Adamou Chekou, the Minister of Foreign Affairs in Niger, announcing Zahawie’s trip. It does not mention uranium. (Note that the SISMI report does not mention Al-Zahawi’s trip, it only states that uranium negotiations between the two countries began by at least 1999.) The second document is a letter dated July 30, 1999 from the Niger Ministry of Foreign Affairs to his ambassador in Rome requesting that he contact Zahawie, concerning an agreement signed June 28, 2000 to sell uranium to Iraq. The letter is an obvious forgery because it refers to an event that it describes as taking place 11 months later. [Unknown, n.d.; La Repubblica (Rome), 7/16/2003]
bullet The SISMI report states that in “late 2000,” the State Court of Niger approved an agreement with Iraq whereby Niger would sell Iraq a large quantity of uranium. This allegation appears to be based on a forged document titled “Annex 1,” which was possibly an annex to the alleged uranium agreement. It is evident that this document was forged because it says that the state court “met in the chamber of the council in the palace… on Wednesday, July 7, 2000.” But July 7, 2000 was, in fact, a Friday, not a Wednesday. One of SISMI’s reports to the US, possibly this one, actually reproduces this error. [Unknown, n.d.; La Repubblica (Rome), 7/16/2003; ERiposte, 10/31/2005]
bullet According to the report, Nigerien President Mamadou Tandja approved the agreement and communicated this decision to Iraqi President Saddam Hussein. The source for this is apparently a forged letter from the president of Niger to Saddam Hussein, in which the president refers to his authority under the country’s obsolete 1966 constitution. At the time the letter was presumed to have been written, the constitution in effect would have been that of December 26, 1992, which was subsequently revised by national referendum on May 12, 1996 and again by referendum on July 18, 1999. [Unknown, n.d.; Reuters, 3/26/2003; La Repubblica (Rome), 7/16/2003; US Department of State, 9/2005]
bullet The report also alleges that in October 2000, Nigerien Minister of Foreign Affairs Nassirou Sabo informed one of his ambassadors in Europe that Niger had agreed to provide several tons of uranium to Iraq. [Unknown, n.d.; La Repubblica (Rome), 7/16/2003] This is seemingly based on a forged letter that accompanied the alleged uranium sales agreement. The letter, dated October 10, 2000, is stamped as being received in Rome on September 28, 2000—nearly two weeks before the letter was presumably written. Furthermore, there is a problem with the signature. Unlike what is reported in the SISMI papers provided to the CIA, the actual letter is signed by Allele Elhadj Habibou, who left office in 1989. This indicates that someone must have corrected this information, replacing the name of Allele Elhadj Habibou with that of Nassirou Sabo (the minister in October 2000), before the letter was included in this report. [ERiposte, 10/31/2005]
Distribution within US Intelligence Community - After receiving the report from its Rome station, the CIA distributes it to other US intelligence agencies. According to a later Senate investigation, the “CIA, Defense Intelligence Agency (DIA), and Department of Energy (DOE) analysts considered the reporting to be ‘possible’ while the Department of State’s Bureau of Intelligence and Research (INR) regarded the report as ‘highly suspect,’ primarily because INR analysts did not believe that Niger would be likely to engage in such a transaction and did not believe Niger would be able to transfer uranium to Iraq because a French consortium maintained control of the Nigerien uranium industry.” [US Congress, 7/7/2004] Sources later interviewed by New Yorker’s Seymour Hersh portray US intelligence analysts’ assessment of the report in slightly harsher terms, saying that they “dismissed [it] as amateurish and unsubstantiated.” [New Yorker, 10/27/2003] “I can fully believe that SISMI would put out a piece of intelligence like that,” a CIA consultant later tells Hersh, “but why anybody would put credibility in it is beyond me.” [New Yorker, 5/17/2004, pp. 227] Langley asks for further clarification from Rome and receives a response three days later (see October 18, 2001). [La Repubblica (Rome), 11/11/2005]
Repeated Dissemination - The documents and reports based on the documents are sent to the CIA at least three separate times. They are also sent to the White House, the US embassy in Rome, British and French intelligence, and Italian journalist Elisabetta Burba of the news magazine Panorama. Each recipient in turn shares the documents, or their contents, with others, creating what author Craig Unger later calls “an echo chamber that gives the illusion that several independent sources had corroborated an Iraq-Niger uranium deal.” [Unger, 2007, pp. 237]

Entity Tags: Bureau of Intelligence and Research, Central Intelligence Agency, Craig Unger, Defense Intelligence Agency, Mamadou Tandja, SISMI, Elisabetta Burba, Nassirou Sabo, Wissam al-Zahawie, Saddam Hussein, Jeff Castelli, US Department of Energy

Timeline Tags: Niger Uranium and Plame Outing

Following a number of meetings in Rome and London between SISMI, Italy’s military intelligence, and the British MI6 [Bamford, 2004, pp. 303-304] , SISMI provides the British with an intelligence report on Iraq’s alleged efforts to obtain uranium from Niger. The report—delivered by freelance SISMI agent Rocco Martino to the Vauxhall Cross headquarters of Britain’s MI6 in south London—is reportedly based on the collection of mostly forged documents put together in Italy (see Between Late 2000 and September 11, 2001). MI6 will include this information in a report it sends to Washington saying only that it was obtained from a “reliable source.” Washington treats the report as an independent confirmation of the Italian report (see October 15, 2001). [La Repubblica (Rome), 10/24/2005; La Repubblica (Rome), 10/25/2005; San Francisco Chronicle, 10/30/2005; Independent, 11/6/2005; Unger, 2007, pp. 228-229]

Entity Tags: UK Secret Intelligence Service (MI6), SISMI, Rocco Martino

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

NSA Director Michael Hayden responds to an October 11 letter from Representative Nancy Pelosi (see October 11, 2001), expressing concerns about the NSA’s post-9/11 surveillance expansion (see After September 11, 2001) that Hayden outlined for the House Intelligence Committee on October 1 (see October 1, 2001), and asking whether the president authorized it. The substance of Hayden’s October 18 reply will be redacted, except for this statement: “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” [Nancy Pelosi, 1/6/2006] A January 4, 2006 report in the Washington Post will cite “intelligence official close to Hayden” as saying that “[Hayden’s] appearance on Oct. 1, 2001, before the House committee had been to discuss Executive Order 12333, and not the new NSA program,” and that “Pelosi’s concerns had been answered in writing and again several weeks later during a private briefing.” [Washington Post, 1/4/2006] In a January 23, 2006 public briefing, Hayden will say, “September 2001, I asked to update the Congress on what NSA had been doing, and I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities,” and, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” [Michael Hayden, 1/23/2006]
Nature of Hayden's EO 12333 Surveillance Program - The full scope of Hayden’s surveillance program is unclear, but some sources indicate it includes the wholesale collection and data-mining of phone records provided by telecom companies and placement of pen registers (call trackers) on domestic phone numbers (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, October 2001), and October 31, 2001). Some sources indicate the NSA began large-scale domestic surveillance activities prior to the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi, National Security Agency

Timeline Tags: Civil Liberties

John Yoo, a deputy assistant attorney general in the Justice Department’s Office of Legal Counsel, and OLC special counsel Robert Delahunty issue a joint memo to White House counsel Alberto Gonzales. The memo claims that President Bush has sweeping extraconstitutional powers to order military strikes inside the US if he says the strikes are against suspected terrorist targets. In the days following the 9/11 attacks, Gonzales asked if Bush could legally order the military to combat potential terrorist activity within the US. The memo is first revealed to exist seven years later (see April 2, 2008) after future OLC head Steven Bradbury acknowledges its existence to the American Civil Liberties Union; it will be released two months after the Bush administration leaves the White House (see March 2, 2009). [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009]
Granting Extraordinary, Extraconstitutional Authority to Order Military Actions inside US - Yoo and Delahunty’s memo goes far past the stationing of troops to keep watch at airports and around sensitive locations. Instead, the memo says that Bush can order the military to conduct “raids on terrorist cells” inside the US, and even to seize property. “The law has recognized that force (including deadly force) may be legitimately used in self-defense,” they write. In 2009, Reuters will write, “The US military could have kicked in doors to raid a suspected terrorist cell in the United States without a warrant” under the findings of the OLC memo. “We do not think that a military commander carrying out a raid on a terrorist cell would be required to demonstrate probable cause or to obtain a warrant,” Yoo and Delahunty write. [US Department of Justice, 10/23/2001 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009] The memo reasons that since 9/11, US soil can be legally construed as being a battlefield, and Congress has no power to restrict the president’s authority to confront enemy tactics on a battlefield. [Savage, 2007, pp. 131]
No Constitutional or Other Legal Protections - “[H]owever well suited the warrant and probable cause requirements may be as applied to criminal investigations or to other law enforcement activities, they are unsuited to the demands of wartime and the military necessity to successfully prosecute a war against an enemy. [Rather,] the Fourth Amendment does not apply to domestic military operations designed to deter and prevent foreign terrorist attacks.” Any objections based on the Fourth Amendment’s ban on unreasonable search and seizures would be invalid since whatever possible infringement on privacy would be trumped by the need to protect the nation from injury by deadly force. The president is “free from the constraints of the Fourth Amendment.” The Posse Comitatus Act, which bars the military from operating inside the US for law enforcement purposes, is also moot, the memo says, because the troops would be acting in a national security function, not as law enforcement. [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009; Ars Technica, 3/2/2009] There are virtually no restrictions on the president’s ability to use the military because, Yoo and Delahunty write, the nation is in a “state of armed conflict.” The scale of violence, they argue, is unprecedented and “legal and constitutional rules” governing law enforcement, even Constitutional restrictions, no longer apply. The US military can be used for “targeting and destroying” hijacked airplanes, they write, or “attacking civilian targets, such as apartment buildings, offices, or ships where suspected terrorists were thought to be.” The memo says, “Military action might encompass making arrests, seizing documents or other property, searching persons or places or keeping them under surveillance, intercepting electronic or wireless communications, setting up roadblocks, interviewing witnesses, or searching for suspects.” [Newsweek, 3/2/2009] Yoo writes that the Justice Department’s criminal division “concurs in our conclusion” that federal criminal laws do not apply to the military during wartime. The criminal division is headed by Michael Chertoff, who will become head of the Department of Homeland Security. [Washington Post, 4/4/2008]
Sweeping Away Constitutional Rights - Civil litigator Glenn Greenwald will later note that the memo gives legal authorization for President Bush to deploy the US military within US borders, to turn it against foreign nationals and US citizens alike, and to render the Constitution’s limits on power irrelevant and non-functional. Greenwald will write, “It was nothing less than an explicit decree that, when it comes to presidential power, the Bill of Rights was suspended, even on US soil and as applied to US citizens.”
Justifying Military Surveillance - Greenwald will note that the memo also justifies the administration’s program of military surveillance against US citizens: “[I]t wasn’t only a decree that existed in theory; this secret proclamation that the Fourth Amendment was inapplicable to what the document calls ‘domestic military operations’ was, among other things, the basis on which Bush ordered the NSA, an arm of the US military, to turn inwards and begin spying—in secret and with no oversight—on the electronic communications (telephone calls and emails) of US citizens on US soil” (see December 15, 2005 and Spring 2004). “If this isn’t the unadorned face of warped authoritarian extremism,” Greenwald will ask, “what is?” [Salon, 3/3/2009] If the president decides to use the military’s spy agency to collect “battlefield intelligence” on US soil, no law enacted by Congress can regulate how he goes about collecting that information, including requiring him to get judicial warrants under the Foreign Intelligence Surveillance Act (FISA). In 2007, Yoo will say in an interview: “I think there’s a law greater than FISA, which is the Constitution, and part of the Constitution is the president’s commander in chief power. Congress can’t take away the president’s powers in running war.” [Savage, 2007, pp. 131; PBS Frontline, 5/15/2007] Cheney and Addington will push the NSA to monitor all calls and e-mails, including those beginning and ending on US soil, but the NSA will balk. Domestic eavesdropping without warrants “could be done and should be done,” Cheney and Addington argue, but the NSA’s lawyers are fearful of the legal repercussions that might follow once their illegal eavesdropping is exposed, with or without the Justice Department’s authorization. The NSA and the White House eventually reach a compromise where the agency will monitor communications going in and out of the US, but will continue to seek warrants for purely domestic communications (see Spring 2001, After September 11, 2001, and October 2001). [Savage, 2007, pp. 131]
Military Use Considered - In 2009, a former Bush administration lawyer will tell a reporter that the memo “gave rise to the Justice Department discussing with the Defense Department whether the military could be used to arrest people and detain people inside the United States. That was considered but rejected on at least one occasion.” The lawyer will not give any indication of when this will happen, or to whom. Under the proposal, the suspects would be held by the military as “enemy combatants.” The proposal will be opposed by the Justice Department’s criminal division and other government lawyers and will ultimately be rejected; instead, the suspects will be arrested under criminal statutes. [Los Angeles Times, 3/3/2009]

Entity Tags: Steven Bradbury, US Department of Homeland Security, US Department of Defense, Robert J. Delahunty, Office of Legal Counsel (DOJ), Bush administration (43), Michael Chertoff, Alberto R. Gonzales, National Security Agency, American Civil Liberties Union, Glenn Greenwald, George W. Bush, US Department of Justice, John C. Yoo

Timeline Tags: Civil Liberties

Patrick J. Fitzgerald is confirmed as US Attorney for the Northern District of Illinois, centering in Chicago. Senator Peter Fitzgerald (R-IL—no relation to Patrick Fitzgerald) nominated Fitzgerald for the position because he felt Fitzgerald, a native New Yorker and veteran prosecutor with no ties to Chicago, would be less likely to become corrupted by what he thought to be the “Chicago Democrat machine.” Fitzgerald had come highly recommended by, among others, Louis Freeh, then the director of the FBI. White House political chief Karl Rove later says that he did not oppose Fitzgerald’s nomination, though he was somewhat disturbed by Senator Fitzgerald’s insistence on the nomination. Rove will recall: “Senator Fitzgerald’s attitude was: ‘I’m not going to submit multiple names. I will take only one name, and this is all that is going to be acceptable.’ And we asked him to submit multiple names, and we also asked him to think about people from within the districts. Our predilection was to have people from within the district selected. We thought it, you know, encouraged a civic-minded attitude among lawyers. It made certain that you had some fresh blood that would flow in. If you pick people from outside the district, they tend to be career prosecutors. And Senator Fitzgerald was particularly unimpressed by this. He said that, in Chicago, the politics in Chicago were such that no US Attorney from Chicago could exist without being subverted by the political influence peddlers in Chicago, that they would be bought off by the big law firms and the Chicago Democrat machine. And so he was going to only provide us one name for each, the Northern District and the Southern District. Following my very effective telephone conversation with him, he responded by going out and announcing to the press that the president was nominating his two names from the Northern and Southern Districts.” Rove will say that he did not oppose Fitzgerald’s nomination, and it would not have been proper for him to do so: “That wasn’t mine—once that conversation was over, it wasn’t mine to have an opinion. I believe the president has a right to appoint. And that means that senators have, by tradition, the right to recommend. But they are usurping a presidential right when they go out and name the nominee before the president has even had a chance to evaluate multiple names and settle on who he wants and do the necessary staff work to arrive at it. Fortunately, Senator Fitzgerald recommended two good names, and both of them worked out. But it was an unusual process that involved, in my opinion, a congressional usurpation of a presidential power.” Senator Fitzgerald will later say that Rove told him the selection of Patrick Fitzgerald “ticked off the [Illinois Republican] base,” a statement Rove will call “inaccurate.… I chalk it up to an overactive imagination.” Rove will go on to imply, without directly saying, that US Attorney Fitzgerald prosecutes Governor George Ryan (R-IL) as something of a political favor to Senator Fitzgerald, as the governor and the senator are political rivals within the Illinois Republican Party. Experienced in prosecuting high-profile terrorism cases (see January 1996), Fitzgerald will go on to chair the terrorism subcommittee of the Attorney General’s Advisory Committee (AGAC) and later become special counsel for the Lewis Libby leak investigation (see December 30, 2003). [The American Lawyer, 12/11/2008; US House of Representatives, Committee on the Judiciary, 7/7/2009 pdf file]

Entity Tags: Patrick J. Fitzgerald, George Ryan, Louis J. Freeh, Peter Fitzgerald, Karl C. Rove

Timeline Tags: Civil Liberties

Vice President Dick Cheney summons the chairmen and ranking members of the Senate and House Intelligence Committees to the White House for a classified briefing on the secret NSA warrantless wiretapping program (see Early 2002). Cheney makes it clear to the lawmakers that he is merely informing them about the program, and not seeking their approval. [Washington Post, 12/18/2005] Officials later say that under any of the previous presidents, such a meeting of this import would involve the president. But the four lawmakers are hustled away from the Oval Office. Instead, “[w]e met in the vice president’s office,” Bob Graham (D-FL), the chairman of the Senate Intelligence Committee, later recalls. President Bush has already told Graham that “the vice president should be your point of contact in the White House.” Cheney, according to the president, “has the portfolio for intelligence activities.” [Washington Post, 6/24/2007] The leaders are briefed by Cheney, CIA Director George Tenet, and NSA Director Michael Hayden. The Congressional leaders will later mostly refuse to comment publicly about what they do and do not learn about the program, even after it is revealed to the public (see December 15, 2005). In 2003, when Senator John D. Rockefeller ascends to the Democratic leadership of the Senate committee, and is himself briefed on the program, he will write to Cheney expressing his concerns over it (see July 17, 2003). [New York Times, 12/15/2005]
'No Discussion about Expanding' NSA Wiretapping - In December 2005, after the program is revealed to the public, one of the Congressmen present at the briefings, Graham, the then-chairman of the Senate Intelligence Committee, will discuss his knowledge of the program. In contradiction to the characterizations of Bush and other White House officials, Graham will say that he recalls “no discussion about expanding [NSA eavesdropping] to include conversations of US citizens or conversations that originated or ended in the United States,” and knew nothing of Bush’s intention to ignore the Foreign Intelligence Surveillance Court (also known as the FISA court). “I came out of the room with the full sense that we were dealing with a change in technology but not policy,” Graham will recall, using new methodologies to intercept overseas calls that passed through US switches. He thought that NSA eavesdropping would continue to be limited to “calls that initiated outside the United States, had a destination outside the United States but that transferred through a US-based communications system.” Instead, Graham will say, it now seems that Bush decided to go “beyond foreign communications to using this as a pretext for listening to US citizens’ communications. There was no discussion of anything like that in the meeting with Cheney.” A senior intelligence official, who refuses to reveal his identity but says he is speaking with the permission of the White House, will accuse Graham of “misremembering the briefings,” which he will call “very, very comprehensive.” The official will refuse to discuss the briefings in any but the most general terms, but will say they were intended “to make sure the Hill knows this program in its entirety, in order to never, ever be faced with the circumstance that someone says, ‘I was briefed on this but I had no idea that—’ and you can fill in the rest.” Graham will characterize the official’s description as saying: “[W]e held a briefing to say that nothing is different.… Why would we have a meeting in the vice president’s office to talk about a change and then tell the members of Congress there is no change?” House Minority Leader Nancy Pelosi (D-CA), who was also present at the meeting as the ranking Democrat on the House Intelligence Committee, will say the briefing described “President Bush’s decision to provide authority to the National Security Agency to conduct unspecified activities.” She will note that she “expressed my strong concerns” but did not go into detail. [Washington Post, 12/18/2005]
Lawmakers Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). In the briefing, Cheney informs the lawmakers of none of this.

Entity Tags: Richard (“Dick”) Cheney, Senate Intelligence Committee, Nancy Pelosi, John D. Rockefeller, House Intelligence Committee, Daniel Robert (“Bob”) Graham, George J. Tenet, George W. Bush, Michael Hayden, National Security Agency

Timeline Tags: Civil Liberties

A senior NSA official, having learned of the NSA’s post-9/11 domestic surveillance program and believing it to be illegal, takes his concerns to a staff member of the House Intelligence Committee. In a 2012 interview for Democracy Now!, William Binney, a former NSA technical director who served in the NSA for 36 years, will say that some of his staff had been recruited to work on the new program and told him of some of the things that were being done, which he believed were illegal. Binney will tell co-host Juan Gonzalez: “I immediately went to the Intelligence Committee, because… the intelligence committees were formed to have oversight over the intelligence community to make sure they didn’t monitor US citizens.… And the member of the staff that I went to went to Porter Goss, who was chairman of that committee at the time, and he referred her to General Hayden for any further. When it was the job of that committee to do the oversight on all this domestic spying, they weren’t doing it.” Soon after this, Binney retires from the NSA, due to his belief the NSA is violating the Constitution (see October 31, 2001). [Democracy Now!, 4/20/2012]

Entity Tags: Jane Mayer, House Intelligence Committee, William Binney, Michael Hayden, National Security Agency

Timeline Tags: Civil Liberties

Concerned that NSA post-9/11 surveillance operations violated the US Constitution, a senior NSA official reports on the program to House Intelligence Committee staff (see Before October 31, 2001), then retires. William Binney, a crypto-mathematician, had served in the NSA for 36 years. In 1997 he was made technical director of the World Geopolitical and Military Analysis Reporting Group, a 6000-employee unit that focused on signals intelligence (SIGINT) reporting and analysis. In the last part of his NSA career, Binney focused on dealing with the NSA’s problem of information overload, co-founding the Signals Intelligence Automation Research Center (SARC) and leading a 20-member team to develop a data-mining and analysis program called ThinThread. This program made it possible to “correlate data from financial transactions, travel records, Web searches, GPS equipment, and any other ‘attributes’ that an analyst might find useful,” and “could chart relationships among people in real time.” Unlike the NSA’s existing centralized data processing systems, ThinThread was able to identify useful or useless data as it was collected, reducing the overload problem. However, though it targeted foreign communications, ThinThread also intercepted those of Americans, and “continued documenting signals when a trail crossed into the US.” Binney incorporated measures to protect privacy, but NSA lawyers still considered the program too invasive, according to a 2011 article by Jane Mayer based on interviews with Binney and another NSA whistleblower, Thomas Drake. In 1999, NSA Director General Michael Hayden decided to fund a rival program, Trailblazer, which would be developed by defense contractors (see Late 1999). Trailblazer will be abandoned in 2006 as unworkable, after costing $1.2 billion (see January 2006). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012] In 2002, three NSA whistleblowers—Edward Loomis, J. Kirk Wiebe, and Binney—will ask the Pentagon to investigate the NSA for wasting “millions and millions of dollars” on Trailblazer. [Nation, 3/26/2013]
Post-9/11 NSA Surveillance Expansion - Binney will tell Mayer that, after the 9/11 attacks, his people began coming to him, saying things like: “They’re getting billing records on US citizens! They’re putting pen registers [call logs] on everyone in the country!” James Bamford will interview Binney in 2012 and write, “At the outset the program recorded 320 million calls a day, [Binney] says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” Binney has not been personally “read in” to this domestic surveillance program, but some members of his SARC team have, as their knowledge of ThinThread code was needed to set it up. Binney became convinced elements of ThinThread were being used, but without privacy protections, meaning US persons could be targeted. Soon after learning these things, Binney takes his concerns to the House Intelligence Committee (see Before October 31, 2001), and retires on October 31. He will tell Mayer, “I couldn’t be an accessory to subverting the Constitution.” Other sources support Binney’s account of this NSA data-mining and monitoring program (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, and October 2001). However, the claim that NSA domestic surveillance was initiated only after, and in response to, 9/11 is contradicted by information indicating that domestic monitoring programs and activities were established and conducted prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012]
ThinThread 'Would Likely Have Prevented 9/11' - Despite ThinThread’s capacity to collect actionable intelligence, Hayden vetoed the idea of deploying the system three weeks before 9/11, in August 2001. According to the Loomis, Wiebe, and Binney, this decision “left the NSA without a system to analyze the trillions of bits of foreign SIGINT flowing over the Internet at warp speed, as ThinThread could do.” During the summer of 2001, when “the system was blinking red,” according to CIA Director George Tenet, the NSA “failed to detect critical phone and e-mail communications that could have tipped US intelligence to al-Qaeda’s plans to attack.” [Nation, 3/26/2013]

Entity Tags: Edward Loomis, World Geopolitical and Military Analysis Reporting Group, J. Kirk Wiebe, William Binney, Thomas Drake, House Intelligence Committee, James Bamford, Trailblazer, Jane Mayer, National Security Agency, Signals Intelligence Automation Research Center, Michael Hayden, Thinthread

Timeline Tags: Civil Liberties

According to a September 2002 USA Today article, the decision to invade Iraq is made at this time. Significantly, the decision is made independent of normal policy-making procedures—a National Intelligence Estimate (NIE) on Iraq was not requested, members of Congress were not consulted, and the concerns of senior military officers and intelligence analysts were ignored. Explaining why the White House did not request a NIE on Iraq, an unnamed US intelligence official explains it didn’t want to detail the uncertainties regarding the threat Iraq allegedly poses to the US. A senior administration official says the White House did not believe an NIE would be helpful. However in September 2002, an NIE will finally be requested as a result of pressure from Congress. The classified version of the document will include many qualified and nuanced statements, but the shorter, unclassified version, which is given to Congress, will not include these uncertainties (see October 1, 2002). [USA Today, 9/10/2002 Sources: officials at the White House, State Department, Pentagon, intelligence agencies, Congress and elsewhere]

Entity Tags: George W. Bush, US Congress

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion

John Yoo, the Justice Department’s (DOJ) Office of Legal Counsel (OLC) deputy assistant attorney general, sends a classified memo to Attorney General John Ashcroft justifying warrantless surveillance of US persons. The National Security Agency (NSA)‘s domestic surveillance authorized by President Bush (see October 4, 2001, Early 2002, and December 15, 2005) will come to be publicly referred to as the President’s Surveillance Program (PSP). This is not the first Yoo memo supporting warrantless surveillance (see September 25, 2001), but a 2009 report on the PSP jointly issued by the inspectors general (IGs) of the Department of Defense (DOD), DOJ, CIA, National Security Agency (NSA), and Office of the Director of National Intelligence (ODNI) will refer to it as “[t]he first OLC opinion directly supporting the legality of the PSP.” The IGs’ report will quote from and comment on the memo, noting that “deficiencies in Yoo’s memorandum identified by his successors in the Office of Legal Counsel and the Office of the Deputy Attorney General later became critical to DOJ’s decision to reassess the legality of the program in 2003.” According to the IGs’ report, Yoo asserts that warrantless surveillance is constitutional as long as it is “reasonable” under the Fourth Amendment, which only protects against “unreasonable searches and siezures.” On this point, the IGs’ report will note that Yoo’s successors were troubled by his failure to discuss the Supreme Court’s decision in Youngstown Sheet & Tube Co. v. Sawyer (1952), which found the president’s wartime authority to be limited. His memo does acknowledge that the Foreign Intelligence Surveillance Act (FISA) “purports to be the exclusive statutory means for conducting electronic surveillance for foreign intelligence,” but asserts that it is only a “safe harbor for electronic surveillance” because it cannot “restrict the president’s ability to engage in warrantless searches that protect the national security.” Yoo also writes that Congress has not “made a clear statement in FISA that it sought to restrict presidential authority to conduct warrantless searches in the national security area.” The IGs’ report will state that Yoo’s successors considered this problematic because Yoo has omitted discussion of the fact that FISA explicitly authorizes the president to conduct warrantless surveillance during the first 15 days following a declaration of war by Congress, which they considered an expression of Congress’s intent to restrict warrantless surveillance to a limited period of time and specific circumstances. The IGs’ report will also state that Yoo’s memo discusses “the legal rationale for Other Intelligence Activities authorized as part of the PSP,” and that Yoo concludes, “[W]e do not believe that Congress may restrict the president’s inherent constitutional powers, which allow him to gather intelligence necessary to defend the nation from direct attack.” The IGs’ report will say that “Yoo’s discussion of some of the Other Intelligence Activities did not accurately describe the scope of these activities,” and that Yoo’s successors considered his discussion of these other activities to be “insufficient and presenting a serious impediment to recertification of the program as to form and legality.” [Inspectors General, 7/10/2009, pp. pp. 11-13]
Memo's Existence Revealed by ACLU Lawsuit - On December 15, 2005, the New York Times will report that Bush authorized an NSA warrantless domestic surveillance program after the 9/11 attacks (see December 15, 2005). The American Civil Liberties Union (ACLU) will request records pertaining to the program under the Freedom of Information Act (FOIA) and then sue the Justice Department for the release of records. The existence of Yoo’s November 2 memo will first be revealed in an October 19, 2007 deposition filed by then head of the OLC Steven Bradbury in response to the ACLU lawsuit, which says that it “[concerns] the legality of certain communications intelligence activities.” After the 2009 release of the IGs’ report the ACLU will notify the court and the government will agree to reprocess four OLC memos, including Yoo’s November 2 memo. This memo and a May 6, 2004 memo by Yoo’s OLC successor Jack Goldsmith that disputes many of Yoo’s conclusions will be released in heavily redacted form on March 18, 2011. [ACLU.org, 2/7/2006; United States District Court of DC, 10/19/2007; American Civil Liberties Union, 3/19/2011]
Constitutional Experts Dispute Yoo's Legal Rationale - Numerous authorities on the law will question or reject the legal bases for warrantless domestic surveillance. In 2003, Yoo will leave the OLC. Goldsmith will begin a review of the PSP, after which he will conclude it is probably illegal in some respects and protest, within the executive branch, its continuation (see Late 2003-Early 2004 and December 2003-June 2004). Following the public disclosure of its existence, a January 5, 2006 report by the Congressional Research Service will find it to be of dubious legality (see January 5, 2006). On January 19, 2006, the DOJ will issue a 42-page white paper laying out the legal bases for the program (see January 19, 2006). These bases will be reviewed and rejected by 14 constitutional scholars and former government officials in a joint letter to Congress on February 2, 2006. [al [PDF], 2/2/2006 pdf file] The American Bar Association will adopt a resolution on February 13, 2006 that rejects DOJ’s arguments and calls on Congress to investigate the program. [Delegates, 2/13/2006 pdf file] On August 17, 2006, in the case ACLU v. NSA, US district judge Anna Diggs Taylor will reject the government’s invocation of the “state secrets privilege” and its argument that plaintiffs’ lack standing due to their being unable to prove they were surveilled, and will rule that warrantless surveillance is in violation of “the separation of powers doctrine, the Administrative Procedures Act, the First and Fourth Amendments to the United States Constitution, the FISA, and Title III” (see August 17, 2006). Taylor’s ruling will be overturned on appeal, on the grounds that the plaintiffs lack standing as they cannot prove that surveillance has occurred. In another case, Al Haramain v. Barack Obama, the government will make the same arguments, but US district judge Vaughn Walker will reject these and conclude in 2010 that illegal surveillance occurred (see March 31, 2010). [Al-Haramain v. Obama, 3/31/2010]

Entity Tags: Steven Bradbury, Vaughn Walker, Ronald Dworkin, George W. Bush, John C. Yoo, American Bar Association, Office of Legal Counsel (DOJ), American Civil Liberties Union, John Ashcroft, Anna Diggs Taylor, US Department of Justice

Timeline Tags: Civil Liberties

The US Embassy in Niamey, Niger’s capital, disseminates a cable summarizing a recent meeting between the US ambassador and the director general of Niger’s French-led mining consortium. The director general reportedly explained that “there was no possibility” that the government of Niger could have diverted any of the 3,000 tons of uranium produced by the consortium’s two mines. [US Congress, 7/7/2004]

Timeline Tags: Niger Uranium and Plame Outing

The National Security Agency begins sending data—consisting of telephone numbers, e-mail addresses, and names—to the FBI that was obtained through surveillance of international communications originating within the US (see After September 11, 2001 and October 2001). The NSA sends so much data, in fact, that hundreds of agents are needed to investigate the thousands of tips per month that the data is generating. However, virtually all of this information leads to dead ends and/or innocent people. FBI officials repeatedly complain that the unfiltered information is bogging down the bureau: according to over a dozen current and former law enforcement and counterterrorism officials, the flood of tips provide them and their colleagues with very few real leads against terrorism suspect. Instead, the NSA data diverts agents from more productive work. Some FBI officials view the NSA data as pointless and likely illegal intrusions on citizens’ privacy. Initially, FBI director Robert Mueller asks senior administration officials “whether the program had a proper legal foundation,” but eventually defers to Justice Department legal opinions. One former FBI agent will later recall, “We’d chase a number, find it’s a schoolteacher with no indication they’ve ever been involved in international terrorism—case closed. After you get a thousand numbers and not one is turning up anything, you get some frustration.” A former senior prosecutor will add, “It affected the FBI in the sense that they had to devote so many resources to tracking every single one of these leads, and, in my experience, they were all dry leads. A trained investigator never would have devoted the resources to take those leads to the next level, but after 9/11, you had to.” Former NSA director Bobby Ray Inman says that the problem between the FBI and the NSA may stem in part from their very different approaches. Signals intelligence, the technical term for the NSA’s communications intercepts, rarely produces “the complete information you’re going to get from a document or a witness” in a traditional FBI investigation, he says. And many FBI officials are uncomfortable with the NSA’s domestic operations, since by law the NSA is precluded from operating inside US borders except under very specific circumstances. [New York Times, 1/17/2006]

Entity Tags: Federal Bureau of Investigation, National Security Agency, Bobby Ray Inman, Robert S. Mueller III

Timeline Tags: Complete 911 Timeline, Civil Liberties

After fleeing Iraq, Adnan Ihsan Saeed al-Haideri, 43, defects to the US. Before he is debriefed by the CIA, he spends several days in a Bangkok hotel room being coached by Zaab Sethna, the spokesman of the Iraqi National Congress, on what he should tell his debriefer. On December 17, he meets with a CIA official who questions him. Strapped to a polygraph machine [Rolling Stone, 11/17/2005] , al-Haideri proceeds to tell the agent he is a civil engineer who helped hide Iraq’s illicit weapons in subterranean wells, private villas, and even beneath the Saddam Hussein Hospital. After reviewing the polygraph, which was requested by the Defense Intelligence Agency, the intelligence debriefer concludes that Haideri made the entire story up. [New Yorker, 6/7/2004; Rolling Stone, 11/17/2005]

Entity Tags: Zaab Sethna, Adnan Ihsan Saeed al-Haideri, Central Intelligence Agency, Defense Intelligence Agency

Timeline Tags: Events Leading to Iraq Invasion

Zaab Sethna of the Iraqi National Congress (INC) arranges for Iraqi defector Adnan Ihsan Saeed al-Haideri to be interviewed by Judith Miller of the New York Times. Miller, who has known Chalabi for about eight years (see May 1, 2003), immediately flies out to Bangkok for the interview. Her story is published on December 20, just three days after Haideri told his story to a CIA agent who subjected him to a polygraph and determined Haideri’s story was a complete fabrication (see December 17, 2001). Miller’s front-page article, titled “An Iraqi defector tells of work on at least 20 hidden weapons sites,” reports: “An Iraqi defector who described himself as a civil engineer, said he personally worked on renovations of secret facilities for biological, chemical and nuclear weapons in underground wells, private villas and under the Saddam Hussein Hospital in Baghdad as recently as a year ago.” If verified, Miller notes, “his allegations would provide ammunition to officials within the Bush administration who have been arguing that Mr. Hussein should be driven from power partly because of his unwillingness to stop making weapons of mass destruction, despite his pledges to do so.” Sethna also contacts freelance journalist Paul Moran. Moran is a former employee of the INC and has been employed for years by the Rendon Group, a firm specializing in “perception management” and which helped develop the INC (see May 1991). Moran’s on-camera interview with Haideri is broadcast worldwide by the Australian Broadcasting Corp. [New York Times, 12/20/2001; SBS Dateline, 7/23/2003; New York Review of Books, 2/26/2004; Rolling Stone, 11/17/2005] Reporter Jonathan Landay will later say that he and others were skeptical from the outset: “There were some red flags that the New York Times story threw out immediately, which caught our eye, immediately. The first was the idea that a Kurd—the enemy of Saddam—had been allowed into his most top secret military facilities. I don’t think so. That was, for me, the biggest red flag. And there were others, like the idea that Saddam Hussein would put a biological weapons facility under his residence. I mean, would you put a biological weapons lab under your living room? I don’t think so.” Landay’s partner Warren Strobel will add, “The first rule of being an intelligence agent, or a journalist, and they’re really not that different, is you’re skeptical of defectors, because they have a reason to exaggerate. They want to increase their value to you. They probably want something from you. Doesn’t mean they’re lying, but you should be—journalists are supposed to be skeptical, right? And I’m afraid the New York Times reporter in that case and a lot of other reporters were just not skeptical of what these defectors were saying. Nor was the administration…” [PBS, 4/25/2007]

Entity Tags: Zaab Sethna, Warren Strobel, Jonathan Landay, Judith Miller, Paul Moran, Adnan Ihsan Saeed al-Haideri, Ahmed Chalabi, Saddam Hussein

Timeline Tags: Events Leading to Iraq Invasion

Sometime in early 2002, President Bush signs a secret executive order authorizing the National Security Agency (NSA) to wiretap phone conversations and read e-mails to and from US citizens. The order extends an operation set into motion at least as early as October 2001 to begin wiretapping US citizens’ phones in a response to the 9/11 attacks. When the program is revealed by the US media in late 2005 (see December 15, 2005), Bush and his officials will say the program is completely legal, though it ignores the requirements of the Foreign Intelligence Surveillance Act (FISA) that requires the government to obtain court-issued warrants to mount surveillance against US citizens. They will insist that only those suspected of having ties to al-Qaeda are monitored, and only when those individuals make or receive international communications. [New York Times, 12/15/2005; Washington Post, 12/22/2005; Newsweek, 12/22/2008] Bush’s order authorizes the NSA to monitor international telephone conversations and international e-mails of hundreds, and perhaps thousands, of US citizens without court warrants, in an effort to track what officials call “dirty numbers” linked to al-Qaeda. When the program is finally revealed by the New York Times over three years later (see December 15, 2005), officials will say that the NSA still seeks warrants to monitor domestic communications. But there is little evidence of this (see, for example, Spring 2001). The presidential order is a radical shift in US surveillance and intelligence-gathering policies, and a major realignment for the NSA, which is mandated to only conduct surveillance abroad. Some officials believe that the NSA’s domestic eavesdropping crosses constitutional limits on legal searches. “This is really a sea change,” a former senior official who specializes in national security law will say in December 2005. “It’s almost a mainstay of this country that the NSA only does foreign searches.” [New York Times, 12/15/2005] Some sources indicate that NSA domestic surveillance activities, such as data-mining, the use of information concerning US persons intercepted in foreign call monitoring, and possibly direct surveillance of US persons, took place prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: George W. Bush, Al-Qaeda, Foreign Intelligence Surveillance Court, National Security Agency

Timeline Tags: Civil Liberties

The CIA Directorate of Operations issues a second intelligence report from SISMI, Italy’s military intelligence service, on Iraq’s alleged agreement with Niger to purchase 500 tons of uranium annually. This report provides details that were not included in Italy’s October 15 report (see October 15, 2001), including a “verbatim text” of the accord. (It is not clear what the source is for the “verbatim text”. [ERiposte, 3/6/2006] ) According to the report, the purported agreement was signed by Iraqi and Niger officials during meetings held July 5-6, 2000. [US Congress, 7/7/2004; Knight Ridder, 11/4/2005] The SISMI report also draws attention to a 1999 trip to Niger made by Wissam al-Zahawie (see February 1999), Iraq’s former ambassador to the Vatican, and alleges that its mission was to discuss the future purchase of uranium. This is the first report from SISMI that names al-Zahawie and refers directly to his 1999 trip. (SISMI’s previous report had only stated that negotiations had begun by at least 1999.) This report, as well as the previous report, is based on the forged Niger documents. [New Yorker, 10/27/2003; US Congress, 7/7/2004; ERiposte, 11/3/2005] Analysts at the CIA and the DIA are more impressed with the detail and substance of this second report, but analysts at the Department of State’s Bureau of Intelligence and Research (INR) remain skeptical of the report’s allegations noting that it was unlikely that Niger would sell uranium to Iraq because the Nigeriens would have considered the risk of being caught too great. An INR analyst asks the CIA if the source of the report would submit to a polygraph. A CIA analyst who also asks about the source is told by the DO that the source is “very credible.” [US Congress, 7/7/2004]

Entity Tags: Central Intelligence Agency, Bureau of Intelligence and Research, Defense Intelligence Agency

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

The Defense Intelligence Agency (DIA) issues “a finished intelligence product” summarizing the February 5, 2002 SISMI report (see February 5, 2002). The report, entitled “Niamey Signed an Agreement to Sell 500 Tons of Uranium a Year to Baghdad,” states as irrefutable fact that Iraq intends to buy weapons-grade uranium from Niger (see Between Late 2000 and September 11, 2001, October 15, 2001, October 18, 2001, November 20, 2001, February 5, 2002, March 1, 2002, Late April or Early May 2002-June 2002, and Late June 2002). It concludes, “Iraq probably is searching abroad for natural uranium to assist in its nuclear weapons program.” It does not comment on the credibility of the sourcing. The report is sent directly to Vice President Dick Cheney. Within hours, Cheney directs the CIA (see February 5, 2002) to investigate the claims. According to the Senate Intelligence Committee’s 2004 report on Iraqi WMD (see July 9, 2004), CIA and DIA analysts find the subsequent reports more informative and believable than the first, more sketchy reports (see February 5, 2002). The CIA’s Directorate of Operations tells one agency analyst that the report comes from a “very credible source.” Analysts with the State Department’s Bureau of Intelligence and Research (INR) continue to find the reports unconvincing. [US Congress, 7/7/2004; Unger, 2007, pp. 239] Former CIA analyst Ray McGovern will later describe Cheney’s receipt of this document as “odd.” “[I]n more than two years of briefing then-Vice President George H. W. Bush every other morning, not once did he ask a question about a DIA report or even indicate that he had read one,” McGovern will note. “That this particular report was given to Cheney almost certainly reflects the widespread practice of ‘cherry picking’ intelligence.” [AfterDowningStreet (.org), 7/25/2005]

Entity Tags: Defense Intelligence Agency, Ray McGovern, Richard (“Dick”) Cheney

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

Valerie Plame Wilson.Valerie Plame Wilson. [Source: PEP]In response to questions from Vice President Dick Cheney (see (February 13, 2002)), CIA operative Valerie Plame Wilson and officials from the CIA’s DO counterproliferation division (CPD) meet to discuss what the agency should do to determine the validity of recent Italian intelligence reports (see October 15, 2001 and February 5, 2002) alleging that Iraq had sought to purchase uranium from Niger. During the meeting, Plame Wilson suggests sending her husband, Joseph Wilson, an Africa expert and former US diplomat, to Niger to investigate the reports. [US Congress, 7/7/2004] The meeting is chronicled in an internal agency memo obtained by the Wall Street Journal in October 2003. [Wall Street Journal, 10/17/2003] Intelligence officials subsequently will not deny that Plame Wilson was involved in the decision to send Wilson to Niger, but will say she was not “responsible” for the decision. [Wall Street Journal, 10/17/2003]
CIA Alerted to Cheney's Concerns - In her 2007 book Fair Game, Plame Wilson recalls that shortly after Cheney’s initial questions, a young officer rushes into her CPD office and tells her “someone from the vice president’s office” just called the officer on her secure telephone line. The caller, apparently a member of Cheney’s staff, wants information about an intelligence report that the Italian government has passed to the US, alleging that in 1999 Iraq attempted to buy yellowcake uranium from Niger. Cheney is, according to the staffer, “interested and want[s] more information.” Plame Wilson will write, “If the report was true at all, I knew that it would be damning evidence indeed that Iraq was seeking to restart its nuclear program.”
'Nonplussed' at White House Contact - “I was momentarily nonplussed that someone from the vice president’s office had reached down into the junior working levels of the agency to discuss or find an answer to an intelligence report,” she will write. “In my experience, I had never known that to happen. There were strict protocols and procedures for funneling intelligence to policy makers or fielding their questions. Whole offices within the agency were set up and devoted to doing just that. A call to a random desk officer might get the policy maker a quick answer in the heat of the moment, but it was also a recipe for trouble. Handing a senior policy maker ‘raw’ intelligence that had not been properly vetted, placed into context, or appropriately caveated by intelligence professionals usually led to misinterpretation—at a minimum.” She adds that at the time, she is “not aware of the unprecedented number of visits the vice president had made to our headquarters to meet with analysts and look for any available evidence to support the Iraq WMD claims the administration was beginning to make.… I was still blissfully ignorant of any special visits or pressure from the administration vis-a-vis Iraq. I just wanted to get some answers.”
Decision to Ask Wilson Originates with Records Officer, Not Plame Wilson - Plame Wilson tables her concerns about the unusual contact, and begins pondering how best to find answers to Cheney’s questions. The “first and most obvious choice,” she will write, “would be to contact our [REDACTED] office in Niger and ask them to investigate these allegations using local sources available on the ground.” But the budget cuts of the mid-1990s had forced the closing of numerous CIA offices in Africa, including its station in Niamey, Niger. Plame Wilson will recall, “A midlevel reports officer who had joined the discussion in the hallway enthusiastically suggested, ‘What about talking to Joe about it?’” The reports officer is referring to Plame Wilson’s husband, former ambassador Joseph Wilson. “He knew of Joe’s history and role in the first Gulf War (see September 5, 1988 and After and September 20, 1990), his extensive experience in Africa, and also that in 1999 the CIA had sent Joe on a sensitive mission to Africa on uranium issues. Of course, none of us imagined the firestorm this sincere suggestion would ignite. At the moment, the only thought that flashed through my mind was that if Joe were out of the country for an extended period of time I would be left to wrestle two squirmy toddlers into bed each evening.… So I was far from keen on the idea, but we needed to respond to the vice president’s office with something other than a lame and obviously unacceptable, ‘We don’t know, sorry.’” Plame Wilson and the reports officer make the suggestion to send Wilson to Niger; her supervisor decides to meet with Wilson “and the appropriate agency and State [Department] officials.” At her supervisor’s behest, Plame Wilson sends an e-mail to her division chief (whom she will only identify as “Scott”), informing him of the decision and noting that “my husband has good relations with both the PM [prime minister] and the former minister of mines (not to mention lots of French contacts), both of whom could possibly shed some light on this sort of activity.” Plame Wilson will write that her words are intended to “gently remind [her division chief] of Joe’s credentials to support why my boss thought he should come into headquarters in the first place.” She will note: “Months later, those words would be ripped out of that e-mail and cited as proof that I had recommended Joe for the trip (see February 13, 2002). But at the time, I simply hit the ‘send’ button and moved on to the other tasks that were demanding my attention.” That night, Plame Wilson broaches the subject of going to Niger with her husband; he agrees to meet with her superiors at the CPD. [US Congress, 7/7/2004; Wilson, 2007, pp. 108-110]
Cheney Later Denies Knowledge of Iraq-Niger Claims - During the investigation of the Plame Wilson leak (see September 26, 2003), Cheney will repeatedly deny any knowledge that the CIA was following up on his request for more information. This is a lie. Among other refutations, the Senate Intelligence Committee will report in 2004 that he was told on February 14 that CIA officers were working with clandestine sources to find out the truth behind the Niger allegations (see July 9, 2004). [Wilson, 2007, pp. 368]

Entity Tags: Joseph C. Wilson, Central Intelligence Agency, Counterproliferation Division, Valerie Plame Wilson, Richard (“Dick”) Cheney

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

Joseph Wilson and Valerie Plame Wilson.Joseph Wilson and Valerie Plame Wilson. [Source: Haraz N. Ghanbari / Associated Press]Officials in the CIA’s Directorate of Operations (DO) Counterproliferation Division (CPD) decide to send former ambassador Joseph Wilson to Niger to investigate allegations that Iraq sought to procure uranium from that country. Wilson’s wife, Valerie Plame Wilson, a senior CPD officer (see April 2001 and After), relays the request to him explaining that “there’s this crazy report” asserting that Iraq made a deal with Niger on the sale of a large quantity of uranium. [US Congress, 7/7/2004] Shortly afterwards, she sends an overseas cable requesting concurrence with the agency’s decision to send her husband to Niger (see February 13, 2002). She writes, “[B]oth State and [the Department of Defense] have requested additional clarification and indeed, the vice president’s office just asked for background information” (see (February 13, 2002)). [US Congress, 7/7/2004]

Entity Tags: Counterproliferation Division, Central Intelligence Agency, Joseph C. Wilson, Valerie Plame Wilson

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

The CIA’s Directorate of Operations (DO) Counterproliferation Division (CPD) holds a meeting with former ambassador Joseph Wilson, intelligence analysts from both the CIA and State Department’s Bureau of Intelligence and Research (INR), and several individuals from the DO’s Africa and CPD divisions. The purpose of the meeting is to discuss the merits of sending Wilson to Niger. Wilson is introduced by his wife Valerie Plame Wilson, who heads CPD’s Joint Task Force on Iraq (JTFI). [US Congress, 7/7/2004, pp. 59; Isikoff and Corn, 2006, pp. 94-95]
Wife Does Not Participate in Meeting - In her 2007 book Fair Game, Plame Wilson will write that she brings her husband into the briefing room, introduces him to the “10 or so participants,” and “[a]fter a minute or so, I went back to my desk to attend to what seemed like a hundred other operational crises. When the meeting broke, Joe poked his head in my office to say that the group had asked him to consider going to Niger to discuss the report.” [Wilson, 2007, pp. 111]
Wilson's Qualifications - Wilson will later describe himself as “the insider increasing [the CIA analysts’] store of information, supplying that perspective missing from their raw data. I had served as a junior diplomatic officer in Niger in the mid-1970s, a period that happened to coincide with the growth in the uranium business there. We had followed this issue closely from the American Embassy in Niamey, Niger’s capital, just as my staff and I had when I was ambassador to Gabon, another uranium-producing country, from 1992 to 1995. When I worked on the National Security Council in the Clinton administration two years later, among my areas of responsibility was the African uranium industry. Rarely did conversations with Africans from uranium-producing countries fail to touch on the subject. Niger, where I had traveled frequently over the years, was always of particular interest.” [Wilson, 2004, pp. 8]
Details Shared with Wilson - In the meeting, Wilson learns of a report that purports to document a memorandum of sale from Niger to Iraq, and that the report had aroused the interest of Vice President Dick Cheney (see (February 13, 2002)). Cheney’s office has tasked the CIA to determine the truth or falsity of the report. The report is lacking in key details. Wilson’s knowledge of the region, particularly of the government and private interests involved in mining and distributing uranium, will be particularly helpful. Wilson later writes, “The Nigeriens were the same people I had dealt with during and after my time at the National Security Council, people I knew well.” The former minister of mines, the man responsible for oversight of the industry at the time of the alleged sales, is a friend of his.
Skepticism among Participants about Report - Wilson will later describe himself as “skeptical, as prudent consumers of intelligence always are about raw information.” He will note that much of this kind of intelligence is classified as “rumint,” or rumors passing as fact, and is usually “no more reliable than Bigfoot sightings. Rumint is a necessary and unfortunate reality in a world where many people will tell you what they think you want to hear, as opposed to simple facts.” [Wilson, 2004, pp. 14-15] Notes taken by INR analyst Douglas Rohn, as well as e-mails from other participants, indicate that INR expresses skepticism that the alleged uranium contract could have taken place. Rohn, who served as deputy chief of mission in Niger during the ‘90s, writes that it would have been very difficult to conceal such a large shipment of yellowcake because “the French appear to have control of the uranium mining, milling and transport process, and would seem to have little interest in selling uranium to the Iraqis.” INR also says that the embassy in Niger has good contacts and is thus in a position to get to the truth on the matter, and therefore believes the proposed trip to Niger would be redundant. Others attending the meeting argue that the trip would probably not resolve the matter because the Nigeriens would be unlikely to admit to a uranium sales agreement with Iraq. An e-mail from a WINPAC analyst to CPD following the meeting notes, “[I]t appears that the results from this source will be suspect at best, and not believable under most scenarios.” CPD nonetheless concludes that sending Wilson would be worth a try. [US Congress, 7/7/2004, pp. 59; Isikoff and Corn, 2006, pp. 94-95]
Open and Public Visit - Wilson is willing, but points out that he is not a spy, but a former diplomat with no experience with clandestine work. He will be recognized in Niger. Therefore, there can be no expectation of any covert or clandestine actions on his part; everything he does will be open and above board. He also insists on obtaining the approval of both the State Department and the US Ambassador to Niger, Barbro Owens-Kirkpatrick, before entering the country. He expects no payment for his visit, but will accept reimbursement for expenses. The others in the meeting agree. The rest of the two-hour meeting is spent considering and plotting out various scenarios, based on who he might see and what he might learn during his visit. [Wilson, 2004, pp. 16-17] “I went through what I knew about… uranium,” Wilson later recalls. “I went through what I knew about the personalities.… People chimed in, and I answered them as best I could. It was a kind of free-for-all, and at the end they sort of asked, ‘Well, would you be able to clear your schedule and go out there if we wanted?’ and I said, ‘Sure.’” [Vanity Fair, 1/2004]

Entity Tags: Douglas Rohn, Counterproliferation Division, Joseph C. Wilson, Valerie Plame Wilson, US Embassy in Niger, Bureau of Intelligence and Research

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

Joseph Wilson.Joseph Wilson. [Source: public domain]The CIA sends Joseph C. Wilson, a retired US diplomat, to Niger to investigate claims that Iraq had sought to purchase uranium from that country (see February 13, 2002). The CIA pays Wilson’s expenses for the trip, but does not pay him in any other respect. The identity of the party who requests the mission is later disputed. While Wilson will claim the trip was requested directly by Dick Cheney’s office, other sources will indicate that the CIA had decided (see February 19, 2002) that a delegation to Niger was needed in order to investigate questions raised by one of Dick Cheney’s aides (see (February 13, 2002)). [New York Times, 5/6/2003; Washington Post, 6/12/2003 pdf file; Independent, 6/29/2003; New York Times, 7/6/2003; US Congress, 7/7/2004]
Reason behind Request - Former CIA analyst Melvin Goodman will later note that “Wilson was asked to go to Niger for one specific purpose. It was the CIA’s idea to get Cheney off their backs. Cheney would not get off their backs about the yellowcake documents. They couldn’t get Cheney to stop pressing the issue. He insisted that was the proof of reconstitution of [Iraq’s nuclear] program.” [Dubose and Bernstein, 2006, pp. 214]
Normal Skepticism - Wilson goes into the situation with a healthy dose of skepticism. “My skepticism was the same as it would have been with any unverified intelligence report, because there is a lot of stuff that comes over the transom every day,” he will recall in 2006. Wilson knows nothing of the influence of the Pentagon neoconservatives (see July 8, 1996, January 26, 1998, July 1998, September 2000, Late December 2000 and Early January 2001, Shortly after January 20, 2001, and Shortly After September 11, 2001) or the growing rift in the intelligence community over the reports: “I was aware that the neocons had a growing role in government and that they were interested in Iraq,” he will recall. “But the administration had not articulated a policy at this stage.” He is not given a copy of the Niger documents before leaving for Africa, nor is he told of their history. “To the best of my knowledge, the documents were not in the possession of the [CIA] at the time I was briefed,” he will recall. “The discussion was whether or not this report could be accurate. During this discussion, everyone who knew something shared stuff about how the uranium business worked, and I laid out what I knew about the government in Niger, what information they could provide.” With this rather sketchy preparation, Wilson leaves for Niger. [Unger, 2007, pp. 240; Wilson, 2007, pp. 113] Wilson’s wife, senior CIA case officer Valerie Plame Wilson, will later write, “He figured that if the vice president had asked a serious and legitimate question, it deserved a serious answer and he would try to help find it.” [Wilson, 2007, pp. 111]
No Trouble Finding Information - Wilson, who knows the Nigerien government and many of its officials, has little trouble finding the information he needs in the following week. In 2006, he will recall: “Niger has a simplistic government structure. Both the minister of mines and the prime minister had gone through the mines. The French were managing partners of the international consortium [which handles Niger’s uranium]. The French mining company actually had its hands on the project. Nobody else in the consortium had operators on the ground.” Wilson also personally knows Wissam al-Zahawie, Iraq’s ambassador to the Vatican who supposedly negotiated the uranium deal with Niger (see February 1999). Wilson will later observe: “Wissam al-Zahawie was a world-class opera singer, and he went to the Vatican as his last post so he could be near the great European opera houses in Rome. He was not in the Ba’athist inner circle. He was not in Saddam [Hussein]‘s tribe. The idea that he would be entrusted with the super-secret mission to buy 500 tons of uranium from Niger is out of the question.” [Unger, 2007, pp. 240-241] Wilson meets with, among other officials, Niger’s former minister of mines, Mai Manga. As later reported by the Senate Intelligence Committee (see July 9, 2004), Manga tells Wilson “there were no sales outside of International Atomic Energy Agency (IAEA) channels since the mid-1980s,” and he “knew of no contracts signed between Niger and any rogue states for the sale of uranium.” Manga says a “French mining consortium controls Nigerien uranium mining and keeps the uranium very tightly controlled from the time it is mined until the time it is loaded onto ships in Benin for transport overseas,” and, “it would be difficult, if not impossible, to arrange a special shipment of uranium to a pariah state given these controls.” [CounterPunch, 11/9/2005]
Meeting with US Ambassador - Wilson arrives in Niger on February 26, two days after Marine General Carlton W. Fulford Jr.‘s meeting (see February 24, 2002) with Nigerien officials. Wilson first meets with US Ambassador to Niger Barbro Owens-Kirkpatrick, a veteran Foreign Service official, whom Wilson will later describe as “crisp” and well-informed. Over tea in the US Embassy offices in Niamey, Niger’s capital, Owens-Kirkpatrick tells Wilson that she has already concluded that the allegations of uranium sales to Iraq are unfounded. “She had already debunked them in her reports to Washington,” Wilson will later recall. “She said, yeah, she knew a lot about this particular report. She thought she had debunked it—and, oh, by the way, a four-star Marine Corps general had been down there as well—Carlton Fulford. And he had left satisfied there was nothing to report.” [Wilson, 2004, pp. 20-22]
Details of Alleged Uranium Production - Niger extracts uranium from two mines, both located in remote locations in the Sahara Desert. It takes well over a day to drive from the mines to Niamey. The mines are owned by a consortium of foreign companies and the Nigerien government, and managed by a French mining company, COGEMA. Because of a recent upswing in the production of Canadian uranium, Niger’s uranium is mined at a net loss, and its only customers are consortium members. Wilson will later write, “[T]he Nigerien government has sold no uranium outside the consortium for two decades.” If Iraq had bought 500 tons of uranium, as the story is told, that would have represented a 40 percent production increase. “There is no doubt,” Wilson will later write, “that such a significant shift from historic production schedules would have been absolutely impossible to hide from the other partners, and most certainly from the managing partner, COGEMA. Everyone involved would have known about it.” Any Nigerien government decision to produce such an amount of uranium would have involved numerous government officials and many well-documented meetings. Because the transaction would have been to a foreign country, Niger’s Foreign Ministry would also have been involved in the decision. To sell Iraq uranium during that time would have been a violation of international law and of UN sanctions against Iraq, a weighty decision that would have ultimately been made by the president of Niger in conjuction with the foreign minister and the minister of mines. Such a decision would have been published in the Nigerien equivalent of the Federal Register and would have dramatic tax and revenue implications. The unexpected huge infusion of cash from the sale would have had a strong impact on the Nigerien economy, and would have been much anticipated and talked about throughout the Nigerien business community. [Wilson, 2004, pp. 22-25]
Off-the-Books Production Virtually Impossible - It is conceivable that such an enormous operation could have been conducted entirely “off the books,” Wilson will write, but virtually impossible to pull off. True, a military junta was in power at the time of the alleged sale, one that felt no responsibility or accountability to the Nigerien people. But even a secret transaction would have been impossible to conceal. Such a transaction would have involved thousands of barrels of clandestinely shipped uranium, extensive and complex adjustments to shipping schedules, and other ramifications. “It simply could not have happened without a great many people knowing about it, and secrets widely known do not remain hidden for long. And again, COGEMA, as the managing partner, would have had to know and be complicit.” Add to that Niger’s dependence on US foreign economic aid and its unwillingness to threaten the loss of that aid by secretly shipping uranium to a country that the US considers a dangerous rogue nation. All told, Wilson concludes, the possibility of such a clandestine operation is remote in the extreme. [Wilson, 2004; Wilson, 2004]
1999 Meeting with Iraqi Official - While speaking with a US Embassy official, Wilson learns about a 1999 meeting between the embassy official and an Iraqi representative in Algiers, perhaps in concert with a similar meeting between Iraqi officials and Niger’s prime minister (see June 1999). [Wilson, 2004, pp. 27-28]
Confirmation that Allegations are Unrealistic - After spending several days talking with current government officials, former government officials, and people associated with the country’s uranium business, Wilson concludes the rumors are completely false. He will later call the allegations “bogus and unrealistic.” [Washington Post, 6/12/2003 pdf file; Knight Ridder, 6/13/2003; Independent, 6/29/2003; New York Times, 7/6/2003; CBS News, 7/11/2003; Vanity Fair, 1/2004; Wilson, 2004, pp. 20-28, 424; Vanity Fair, 5/2004, pp. 282; Wilson, 2007, pp. 113]

Entity Tags: Barbro Owens-Kirkpatrick, Wissam al-Zahawie, Carlton W. Fulford, COGEMA, Mai Manga, Valerie Plame Wilson, Muhammad Saeed al-Sahhaf, Melvin A. Goodman, Central Intelligence Agency, Richard (“Dick”) Cheney, Joseph C. Wilson

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

Carlton W. Fulford Jr.Carlton W. Fulford Jr. [Source: US Marine Corps]Marine General Carlton W. Fulford Jr., deputy commander of the US European Command, arrives in Niger on a scheduled refueling stop. At the request of US Ambassador to Niger Barbro Owens-Kirkpatrick, Fulford joins the ambassador at a meeting with Niger’s President Mamadou Tandja and Foreign Minister Aichatou Mindaoudou. He explains the importance of keeping Niger’s ore deposits secure. At the meeting, President Tandja assures the ambassador and General Fulford that Niger is determined to keep its uranium “in safe hands.” [Washington Post, 7/15/2003; Voice of America, 7/15/2003; Vanity Fair, 5/2004, pp. 282; US Congress, 7/7/2004] After the meeting, Fulford concludes that Niger’s uranium is securely under the control of a French consortium and that there is little risk that the material will end up in the wrong hands. These findings are passed on to General Joseph Ralston who provides them to General Richard B. Myers, chairman of the Joint Chiefs of Staff. [Washington Post, 7/15/2003; Voice of America, 7/15/2003; Vanity Fair, 5/2004, pp. 282] The Pentagon will later say that Defense Secretary Donald Rumsfeld was not informed about the trip or its conclusions. [Voice of America, 7/15/2003]

Entity Tags: Mamadou Tandja, Joseph Ralston, Barbro Owens-Kirkpatrick, Richard B. Myers, Aichatou Mindaoudou, Carlton W. Fulford, US Department of Defense

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

Vice President Dick Cheney’s office refuses to disclose information about trips taken by its employees that are paid for by private financiers. The rationale is that since the Office of the Vice President (OVP) is not strictly part of the executive branch (see 2003), it need not disclose the information under the laws applying to that branch of the federal government. From this time forward, Cheney’s office repeatedly responds to inquiries by the Office of Government Ethics with letters stating “that it is not obligated to file such disclosure forms for travel funded by non-federal sources,” Kate Sheppard and Bob Williams of the Center for Public Integrity will write in 2005. “The letters were signed by then-Counsel to the Vice President David Addington…. Addington writes that the Office of the Vice President is not classified as an agency of the executive branch and is therefore not required to issue reports on travel, lodging and related expenses funded by non-federal sources.” Judicial Watch’s Tom Fitton will say that Cheney and his staff believe “the vice president is a constitutional office that is not subject to the laws that others in the executive branch are.” [Center for Public Integrity, 11/16/2005]

Entity Tags: David S. Addington, Bob Williams, Center for Public Integrity, Judicial Watch, Kate Sheppard, Tom Filton, Office of the Vice President, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

A few days after the State Department determines that the reported secret uranium deal between Iraq and Niger is “unlikely” (see March 1, 2002), former ambassador Joseph Wilson returns from his fact-finding trip to Niger (see February 21, 2002-March 4, 2002). Wilson tells CIA officials that he found no evidence to show that any such deal ever took place. [Unger, 2007, pp. 241] Wilson’s wife, senior CIA case officer Valerie Plame Wilson, will later write that the debriefing actually begins shortly after Wilson’s arrival in the US, with “two clean-cut CIA officers, one of whom was the reports officer who had suggested sending Joe to Niger in the first place” (see February 13, 2002), arriving at the Wilson home, “clearly eager to debrief Joe so they could immediately write up an intelligence report on his trip.” Plame Wilson deliberately absents herself from the debriefing taking place in her living room, though she joins her husband and the two CIA officers for a late dinner of takeout Chinese food, where they discuss general subjects. [Wilson, 2004, pp. 29; Wilson, 2007, pp. 112] Based on Wilson’s information, the CIA’s Directorate of Operations (DO)‘s case officer writes a draft intelligence report and sends it to the DO reports officer, who adds additional relevant information from his notes. [US Congress, 7/7/2004] The report will be distributed by March 8, 2002 (see March 8, 2002). [Wilson, 2007, pp. 370]

Entity Tags: Valerie Plame Wilson, Joseph C. Wilson, Central Intelligence Agency

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

In response to a request from Vice President Dick Cheney for an update on the Niger uranium issue made a few days earlier, CIA WINPAC analysts provide an analytic update to Cheney’s intelligence briefer stating that the government of Niger has said it is making all efforts to ensure that its uranium will be used for only peaceful purposes. The update says the foreign government service (Italian military intelligence agency, SISMI) that provided the original report “was unable to provide new information, but continues to assess that its source is reliable.” The update also notes that the CIA would “be debriefing a source [Joseph Wilson] who may have information related to the alleged sale on March 5 (see March 4-5, 2002).” [US Congress, 7/7/2004]

Entity Tags: Central Intelligence Agency, Richard (“Dick”) Cheney

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

Senior CIA case officer Valerie Plame Wilson (see April 2001 and After), whose husband, former ambassador Joseph Wilson, has recently returned from a trip to Africa to find out the facts behind the allegation that Iraq had attempted to buy uranium from Niger (see February 13, 2002), receives a copy of the final intelligence report written about her husband’s trip (see March 4-5, 2002). In her 2007 book Fair Game, Plame Wilson says she receives the report “as a simple courtesy [from] the reports officer” who had suggested Wilson journey to Niger and investigate the allegations. Plame Wilson will recall the report as being “a couple of pages long and fairly straightforward, in the typical bland style of such reports.” She reads the report, makes “no changes,” and gives it back to the reports officer. [Wilson, 2007, pp. 113]

Entity Tags: Central Intelligence Agency, Valerie Plame Wilson

Timeline Tags: Niger Uranium and Plame Outing

The CIA sends a one-and-a-half-page cable to the White House, the FBI, the Justice Department, the Joint Chiefs of Staff, and the Defense Intelligence Agency, with news that a CIA source sent to Niger has failed to find any evidence to back claims that Iraq sought uranium from that country (see February 21, 2002-March 4, 2002). The cable contains an initial report of the source’s findings in Niger. [Knight Ridder, 6/12/2003; ABC News, 6/12/2003; Knight Ridder, 6/13/2003; Washington Post, 6/13/2003; BBC, 7/8/2003; BBC, 7/8/2003; US Congress, 7/7/2004] The agency rates the quality of the information in the report as “good,” with a rating of 3 out of 5. [CounterPunch, 11/9/2005]
Caveats and Denials - The report does not name the CIA source or indicate that the person is a former ambassador. Instead it describes the source as “a contact with excellent access who does not have an established reporting record” and notes that the Nigeriens with whom he spoke “knew their remarks could reach the US government and may have intended to influence as well as inform.” A later Senate report on the US’s pre-war intelligence on Iraq will state: “The intelligence report indicated that former Nigerien Prime Minister Ibrahim Mayaki was unaware of any contracts that had been signed between Niger and any rogue states for the sale of yellowcake while he was prime minister (1997-1999) or foreign minister (1996-1997). Mayaki said that if there had been any such contract during his tenure, he would have been aware of it.” Mayaki, according to the report, also acknowledged a June 1999 visit (see June 1999) by a businessman who arranged a meeting between Mayaki and an Iraqi delegation to discuss “expanding commercial relations” between Niger and Iraq. The intelligence report says that Mayaki interpreted “expanding commercial relations” to mean that the delegation wanted to discuss purchasing uranium. The meeting did take place, but according to the report, “Mayaki let the matter drop due to UN sanctions on Iraq.” The intelligence report also says that Niger’s former Minister for Energy and Mines, Mai Manga, told Wilson that there have been no sales outside of International Atomic Energy Agency (IAEA) channels since the mid-1980s. Mai Manga is also reported to have described how the French mining consortium controls Nigerien uranium mining and keeps the uranium very tightly controlled from the time it is mined until the time it is loaded onto ships in Benin for transportation overseas. Manga said he believed it would be difficult, if not impossible, to arrange a special clandestine shipment of uranium to a country like Iraq. [US Congress, 7/7/2004]
White House: Report Left Out Details, Considered Unimportant - Bush administration officials will say in June 2003 that the report left out important details, such as the trip’s conclusions. And consequently, the Washington Post will report in June 2003, “It was not considered unusual or very important and not passed on to Condoleezza Rice, the president’s national security adviser, or other senior White House officials.” [Washington Post, 6/12/2003 pdf file; Washington Post, 6/13/2003; Knight Ridder, 6/13/2003]
CIA Source Doubts White House Claims - But the CIA source who made the journey, former ambassador Joseph Wilson, will find this explanation hard to believe. “Though I did not file a written report [he provided an oral briefing (see March 4-5, 2002)], there should be at least four documents in United States government archives confirming my mission,” he will later explain. “The documents should include the ambassador’s report of my debriefing in Niamey, a separate report written by the embassy staff, a CIA report summing up my trip, and a specific answer from the agency to the office of the vice president (this may have been delivered orally). While I have not seen any of these reports, I have spent enough time in government to know that this is standard operating procedure.” [New York Times, 7/6/2003]
Senior CIA Case Officer Backs Up Source - In 2007, Wilson’s wife, senior CIA case officer Valerie Plame Wilson, will write of the report (see March 4-5, 2002) that if standard protocol has been followed, the report is distributed to “all the government departments that have intelligence components, such as the State Department’s Bureau of Intelligence and Research (INR), the National Security Agency (NSA), the Pentagon, and the overseas military commands. All of us had every reason to believe that their finished report would indeed be sent to the vice president’s office as part of the established protocol.” According to Plame Wilson, who read the report when it was completed (see (March 6, 2002)), much of the report focuses on “Niger’s strict, private, and government controls on mining consortia to ensure that no yellowcake went missing between the uranium mines and the marketplace.” She will write in 2007 that her husband’s report “corroborated and reinforced what was already known.” Both she and her husband assume that the allegations are sufficiently disproven and will not be heard of again. [Wilson, 2007, pp. 112-114]
Little New Information - According to intelligence analysts later interviewed by Congressional investigators, the intelligence community does not believe the trip has contributed any significant information to what is already known about the issue, aside from the details of the 1999 Iraqi delegation. [US Congress, 7/7/2004]

Entity Tags: Condoleezza Rice, Federal Bureau of Investigation, Ibrahim Mayaki, Defense Intelligence Agency, Central Intelligence Agency, US Department of Justice, Mai Manga, Bush administration (43), Valerie Plame Wilson, Joint Chiefs of Staff, Joseph C. Wilson

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

Two weeks after the CIA informed the White House and other departments that evidence of an Iraqi attempt to purchase Nigerien uranium is scanty (see March 8, 2002), Vice President Dick Cheney appears on CNN to assert the opposite: that Iraq is actively pursuing nuclear weapons. Cheney says that Iraq “has chemical weapons… has biological weapons… [and is] pursuing nuclear weapons.” [CNN, 3/24/2002]

Entity Tags: Richard (“Dick”) Cheney

Timeline Tags: Niger Uranium and Plame Outing

In part due to pressure from Vice President Cheney, the CIA sends a cable to France’s intelligence agency, the Direction Generale de la Securite Exterieure (DGSE), communicating concerns about intelligence suggesting that Iraq is attempting to purchase uranium from Niger. (Another cable had been sent the year before (see Summer 2001).) Specifically, the CIA says it is concerned about an alleged agreement between Iraq and Niger on the sale of 500 tons of uranium that was signed by Nigerian officials. (In an interview with the Los Angeles Times, DGSE official Alain Chouet will note that the details of this agreement matched those of the forged documents.) [Los Angeles Times, 12/11/2005; Unger, 2007, pp. 241] Niger is a former French colony, and the French keep a tight rein on Niger’s uranium production. Hence, the CIA turns to French intelligence to vet the claim of Nigerien uranium going to Iraq. “The French were managing partners of the international consortium in Niger,” former US ambassador Joseph Wilson will later say. “The French did the actual mining and shipping of [uranium].” [Unger, 2007, pp. 208-209] The CIA asks for an immediate answer about the authenticity of the information. [La Repubblica (Rome), 12/1/2005] In response, the DGSE sends its head of security intelligence, Chouet, to look into the uranium deal. The initial information Chouet receives from the CIA is vague, he will later recall, except for one striking detail: Iraq’s ambassador to the Vatican, Wissam al-Zahawie, made an unusual trip to four African countries in 1999, including Niger. CIA analysts fear the trip may have been a prelude to the uranium deal. But Chouet soon learns that the al-Zawahie trip (see February 1999) had not been secret, as the CIA avers, but had been well covered by, among other news outlets, the local Nigerien press. In addition, French, British, and US intelligence had received routine reports on al-Zawahie’s visits. Chouet, head of a 700-person intelligence unit specializing in weapons proliferation and terrorism, sends an undercover team of five or six men to Niger to check on the security of Niger’s uranium. The investigation produces no evidence that al-Zawahie had even discussed uranium with the Nigeriens. [La Repubblica (Rome), 12/1/2005; Los Angeles Times, 12/11/2005; Unger, 2007, pp. 208-209] Chouet will later recall, “[O]nce back, they told me a very simple thing: ‘the American information on uranium is all bullsh_t.’” [La Repubblica (Rome), 12/1/2005] The French summarize the results of their investigation in a series of formal cables they send to CIA offices in Langley and Paris. Chouet will later tell the Times that they communicated their doubts about the claims in no uncertain terms. “We told the Americans, ‘Bullshi_t. It doesn’t make any sense.’” [La Repubblica (Rome), 12/1/2005; Los Angeles Times, 12/11/2005] Choeut’s formal reports to the CIA use less coarse language, but he later describes them as candid. “We had the feeling we had been heard,” he will recall. [Unger, 2007, pp. 241] The DGSE considers the issue closed. [Unger, 2007, pp. 208-209]

Entity Tags: Richard (“Dick”) Cheney, Joseph C. Wilson, Central Intelligence Agency, Alain Chouet, Direction Générale de la Sécurité Extérieure, Wissam al-Zahawie

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

Page 1 of 7 (661 events)
previous | 1, 2, 3, 4, 5, 6, 7 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike