!! History Commons Alert, Exciting News

Context of 'March 12, 2007: Cheney Says Efforts to End Iraq War Undermine Troops, Embolden Terrorists'

This is a scalable context timeline. It contains events related to the event March 12, 2007: Cheney Says Efforts to End Iraq War Undermine Troops, Embolden Terrorists. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 7 (693 events)
previous | 1, 2, 3, 4, 5, 6, 7 | next

After the failure of the US federal government under the Articles of Confederation, the men working to shape the new American government—later termed the “Founders”—determine that the new government must have a president with power equal to that of Congress and the Supreme Court. The federal government itself has far more power under the new Constitution than it had under the Articles, but many Founders worry that the government will have, or take upon itself, the power to constrain or even destroy individual rights and freedoms. The government, therefore, will have strict limitations on its functions, and will be divided into three co-equal branches. Debate over whether the new government should have a single president or an executive council rages, but eventually the Founders decide that a single president could best act decisively in times of crisis. However, Congress has the strength to curtail presidential power via legislation and oversight. One of the Founders’ most crucial decisions is to give Congress, not the president, the power to declare war and commit military troops to battle. Congress must also authorize any military actions that fall short of actual war, the creation and maintenance of armies, and exercise control over how the president can call on the armed forces in emergencies. Finally, the Founders, all too aware that until the English Revolution of 1688, the King of England could use his “prerogative powers” to dispense with a law that he felt unnecessary, move to ensure that the US president cannot use a similar usurpation of power to override Congressional legislation, writing in the Constitution that the president must “take care that the laws be faithfully executed.” In 2007, reporter Charlie Savage, drawing on James Madison’s Federalist Papers, will write: “Knowing that it was inevitable that from time to time foolish, corrupt, or shortsighted individuals would win positions of responsibility in the government, the Founders came up with a system that would limit anyone’s ability to become a tyrant or to otherwise wreck the country. And over the next century and a half, the system worked as the Founders had designed it to work.” [Savage, 2007, pp. 14-16]

Entity Tags: James Madison, Charlie Savage

Timeline Tags: Civil Liberties

American Liberty League logo.American Liberty League logo. [Source: David Pietrusza]Prominent Democrats and Republicans join together to form the American Liberty League (ALL). The organization, according to the founders, exists “to combat radicalism, preserve property rights, uphold and preserve the Constitution.” ALL spokesman Jouett Shouse says ALL will fight to preserve “traditional American political values.” According to the Encyclopedia of the Great Depression, ALL was organized by “disgruntled business conservatives, Wall Street financiers, right-wing opponents of Franklin D. Roosevelt’s New Deal, and defeated rivals within Roosevelt’s Democratic Party.” ALL is financed by, among others, industrialists Pierre, Irenee, and Lammot du Pont; former Democratic Party chairman John J. Raskob; financier E.F. Hutton; and executive Sewell Avery of the department store chain Montgomery Ward. Most of the politicians in the organization are Republicans, but these are joined by anti-Roosevelt Democrats such as Alfred E. Smith, who ran for president in 1928. Many ALL members were once part of the Association against the Prohibition Amendment, which fought to re-legalize the US liquor industry. ALL unsuccessfully fights to block federal regulations and additional taxes on business, the creation of public power utilities, pro-labor barganing rights, agricultural production controls and subsidies, New Deal relief and public jobs programs, the Works Progress Administration (WPA), Social Security, and other Roosevelt-era programs and initiatives. According to the Encyclopedia, “critics effectively lampooned league members as champions of privilege, ungrateful critics of an administration that had saved capitalism, and vindictive and selfish individuals seeking revenge on a president for betraying his social class.” ALL works diligently, but unsuccessfully, to unseat Roosevelt in 1936, backing Republican contender Alfred M. Landon. After Landon loses in a landslide to Roosevelt, the organization fades in prominence. The Encyclopedia concludes that ALL’s “legacy of fund-raising tactics, ideology-driven issues research and public education, and coordination with partisan legislative and electoral campaigns foreshadowed today’s political action committees and independent-expenditure organizations.” [New York Times, 8/23/1934; Encyclopedia of the Great Depression, 1/1/2004] In 2003, columnist Ralph De Toledano will write, “The Liberty League was laughed out of existence by New Yorker cartoonists, who depicted its members looking out over Fifth Avenue and snorting that doomsday was here and Josef Stalin lurked in the bushes.” [Insight, 9/2/2003] In 2010, writer Kevin Drum will compare the American Liberty League to the tea party movement (see September 2010). [Mother Jones, 9/2010]

Entity Tags: Franklin Delano Roosevelt, E.F. Hutton, Alfred M. Landon, Alfred E. Smith, Works Progress Administration, Sewell Avery, Pierre du Pont, American Liberty League, Jouett Shouse, John J. Raskob, Irenee du Pont, Kevin Drum, Lammot du Pont, Ralph De Toledano

Timeline Tags: Domestic Propaganda

The German Reich Ministry of Justice issues a secret memo following a meeting of several Justice Ministry lawyers and public prosecutors with senior Gestapo officers. The participants discuss the fact that Germany has been on a war footing for years, and the leaders’ worry that the citizenry is riddled with sleeper cells of subversives. The solution: detaining and torturing subversives. It is unclear whether torture will be used to terrorize other subversives, to extract information, or produce confessions. German law enforcement officials are balky at applying “more rigorous interrogation” techniques. Though some judges seem unmoved by defendants appearing in court with obvious marks of torture upon their bodies, the law enforcement officers are bureaucrats in a system that has always respected the rule of law and the Hitler government was originally elected on a law-and-order platform. The memo is the product of the top officials in the Gestapo and Justice Ministry, and lays out detailed instructions as to when torture techniques can be applied, the specific equipment used in such interrogations, and how many times particular techniques could be used on certain categories of detainees. Perhaps most importantly, the memo promises immunity from prosecution to any German interrogator who follows the rules as laid down in the memo.
Specific Instructions - It reads in part: “At present, we thus have a situation which cannot continue: a deficient sense of what is right on the part of judicial officers; an undignified position for police officers, who try to help matters by foolish denials [that torture has taken place in court proceedings].… [I]nterrogations of this kind [torture] may be undertaken in cases where charges involve the immediate interests of the state.… chiefly treason and high treason. Representatives of the Gestapo expressed the opinion that a more rigorous interrogation could also be considered in cases of Jehovah’s Witnesses, explosives, and sabotage.… As a general principle, in more rigorous interrogations only blows with a club on the buttocks are permissible, up to 25 such blows. The number is to be determined in advance by the Gestapo.… Beginning with the tenth blow, a physician must be present. A standard club will be designated, to eliminate all irregularities.” Gestapo Headquarters in Berlin must give permission for more “rigorous interrogation[s],” the memo continues.
Drawing Parallels to Bush Administration Torture - The memo will be the subject of a 2009 article by Shayana Kadidal, the senior managing attorney of the Guantanamo project at the Center for Constitutional Rights. Kadidal will draw parallels between the Nazi torture authorization and similar legal justifications issued by the American government after the 9/11 attacks (see March 2, 2009 and April 21, 2009). Kadidal will write: “I realize that, as a matter of principle, there is a strong bias against making Nazi analogies to any events happening in our modern world.… But here we have: (1) a system set up to allow torture on certain specific individual detainees, (2) specifying standardized equipment for the torture (apparently down to the exact length of the club to be used), along with physician participation to ensure survival of the victim for the more several applications, (3) requiring prior approval of the use of torture from the central authorities in the justice department and intelligence agency in the capital, so as to ensure that (6) the local field officers actually carrying out the abuse are immune from prosecution.” [Huffington Post, 4/21/2009]

Entity Tags: Gestapo, Shayana Kadidal, German Reich Ministry of Justice

Timeline Tags: Torture of US Captives

Koch Industries logo.Koch Industries logo. [Source: Koch Industries / Wikipedia]Oil magnate Fred Koch co-founds Wood River Oil and Refining Company, later renamed Koch Industries. The firm will grow to become one of the largest energy conglomerates in the US, and Koch will become an influential backer of right-wing politics. Koch is a virulent anti-Communist who will be one of the first members of the John Birch Society (JBS—see March 10, 1961 and December 2011), a far-right organization that reflects his hatred of Communism (he believes both the Republican and Democratic parties are irretrievably infilitrated by Communists) and opposes almost every aspect of governance in general. Koch will write glowingly of Italian dictator Benito Mussolini’s murderous suppression of Communists during World War II. Both Koch and the JBS have little use for minorities; of African-Americans, Koch will write, “The colored man looms large in the Communist plan to take over America,” and he will say that government welfare programs were designed to attract large numbers of blacks to the cities, where they would foment “a vicious race war.” In 1963, using language that reporter Jane Mayer will later say “prefigures the Tea Party’s talk of a secret socialist plot,” Koch will warn that Communists would “infiltrate the highest offices of government in the US until the president is a Communist, unknown to the rest of us.” Koch’s two sons, David and Charles, will have their father’s political views deeply ingrained into them (see August 30, 2010). In 2007, David Koch will tell a reporter: “He was constantly speaking to us children about what was wrong with government.… It’s something I grew up with—a fundamental point of view that big government was bad, and imposition of government controls on our lives and economic fortunes was not good.” Gus diZerega, once a close friend of Charles’s, will later say that the brothers transfer their father’s hatred of Communism to the US government, which they will come to view as a tyranny. DiZerega will write that the Kochs, like many other hard-right conservatives, redefine “socialism” as almost any form of government which taxes citizens and regulates businesses. [New Yorker, 8/30/2010]

Entity Tags: Jane Mayer, Fred Koch, Koch Industries, David Koch, Gus diZerega, John Birch Society, Charles Koch

Timeline Tags: Domestic Propaganda

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

A B-29 bomber similar to the one that crashed in Georgia.A B-29 bomber similar to the one that crashed in Georgia. [Source: Global Security (.org)]A test flight for the Air Force’s Project Banshee, located at Robins Air Force Base in Georgia, is set for 8:30 a.m. Banshee is an attempt begun in 1946 to develop and deploy a long-range missile ahead of both the Soviet Union and rival US military branches. The airplane used in the test flight crashes less than an hour into its flight, killing 9 of the 13 aboard.
Maintenance Problems - The plane assigned for the flight is a B-29 Stratofortress, a bomber made famous by its delivery of the atomic bombs to Hiroshima and Nagasaki at the end of World War II. B-29s are notoriously difficult to fly and maintain: their four wing-mounted engines almost routinely overheat and catch fire, causing engine shutdowns, sudden drops in altitude, and, often, crashes. The engines’ eighteen cylinders lack sufficient airflow to keep them cool, and the overheating often causes the crankcases, made of light but highly flammable magnesium, to burst into flames. Like so many of its brethren, the plane has suffered its share of maintenance issues, and is flying without numerous recommended maintenance and repair tasks being performed. Just five days before, it had been designated “red cross”—grounded and unfit for service. It was allowed to fly through an “exceptional release” signed by the squadron commander.
Crew Difficulties - The flight is moved back to the afternoon after some crew members fail to show up on time, and to allow last-minute repairs to be made. By takeoff, the flight crew is assembled: Captain Ralph Erwin; co-pilot Herbert W. Moore; flight engineer Earl Murrhee; First Lieutenant Lawrence Pence, Jr, the navigator; Sergeant Walter Peny, the left scanner; Sergeant Jack York, the right scanner; Sergeant Melvin Walker, the radio operator; and Sergeant Derwood Irvin, manning the bombsight and autopilot. The crew is joined by civilian engineers assigned to Banshee: Al Palya and Robert Reynolds from RCA, William Brauner and Eugene Mechler from the Franklin Institute, and Richard Cox from the Air Force’s Air Materiel Command. In violation of standard procedure, none of the crew or the civilians are briefed on emergency procedures, though Murrhee will later say that the crew were all familiar with the procedures; he is not so sure about the civilians, though he knows Palya and Reynolds have flown numerous test flights before. In another violation of Air Force regulations, none of the flight crew have worked together before. As author Barry Siegel will note in 2008, “The pilot, copilot, and engineer had never shared the same cockpit before.”
Engine Fire and Crash - Less than an hour into the flight, one engine catches fire and two others lose power, due to a combination of maintenance failures and pilot errors. The civilians have some difficulty getting into their parachutes as Erwin and Moore attempt to regain control of the aircraft. Four of the crew and civilians manage to parachute from the plane, but most remain on board as the airplane spirals into the ground on the edge of the Okefenokee Swamp, near Waycross, Georgia. Crew members Moore, Murrhee, and Peny survive, as does a single civilian, Mechler. Four others either jump at too low an altitude or die when their chutes foul the airplane; the other five never manage to leave the plane and die on impact.
Widows File Suit - Several of the civilians’ widows will file suit against the US Air Force, asserting that their husbands died because of Air Force negligence (see June 21, 1949). Their lawsuit will eventually become US v. Reynolds, a landmark Supreme Court case and the underpinning for the government’s claims of state secrets privilege (see March 9, 1953). [Siegel, 2008, pp. 3, 14-17, 33-49]

Entity Tags: Derwood Irvin, Barry Siegel, US Department of the Air Force, Walter Peny, William Brauner, Air Materiel Command, Richard Cox, Ralph Erwin, Robert Reynolds, Al Palya, Radio Corporation of America, Eugene Mechler, Earl Murrhee, Franklin Institute, Project Banshee, Melvin Walker, Lawrence Pence, Jr, Herbert W. Moore, Jr, Jack York

Timeline Tags: Civil Liberties

A three-judge federal appeals court unanimously rejects the government’s claim of unfettered executive privilege and secrecy in regards to classified documents (see October 19, 1951). In an opinion written by Judge Albert Maris, the court finds that the government’s claim that the judiciary can never compel the executive branch to turn over classified documents to be without legal merit. The plaintiffs in the case, three widows who lost their husbands in the crash of a B-29 bomber carrying classified materials (see June 21, 1949), had a compelling need for the documents in question, the downed B-29 accident reports, to further their case, Maris writes (see October 12, 1950).
No Legal Basis for Claim of Privilege - Maris goes further than the parameters of the single lawsuit, writing: “[W]e regard the recognition of such a sweeping privilege… as contrary to a sound public policy. The present cases themselves indicate the breadth of the claim of immunity from disclosure which one government department head has already made. It is but a small step to assert a privilege against any disclosure of records merely because they might prove embarrassing to government officials. Indeed, it requires no great flight of imagination to realize that if the government’s contentions in these cases were affirmed, the privilege against disclosure might gradually be enlarged… until as is the case in some nations today, it embraced the whole range of government activities.… We need to recall in this connection the words of [Revolution-era jurist] Edward Livingston: ‘No nation ever yet found any inconvenience from too close an inspection into the conduct of its officers, but many have been brought to ruin, and reduced to slavery, by suffering gradual imposition and abuses, which were imperceptible, only because the means of publicity had not been secured.’” He also quotes Revolutionary War figure Patrick Henry, who said, “[T]o cover with the veil of secrecy the common routine of business is an abomination in the eyes of every intelligent man and every friend to his country.”
Rejecting Claim of 'State Secrets' - Maris is even less respectful of the government’s claim of a “state secrets” privilege. He notes that the government did not make that claim until well into the lawsuit proceedings (see October 19, 1951), indicating that it was a “fallback” argument used after the original government arguments had failed. Maris is also troubled, as author Barry Siegel later writes, in the government’s “assertion of unilateral executive power, free from judicial review, to decide what qualified as secret.” The lower court judge’s ruling that he alone should be given the documents for review adequately protected the government’s security interests, Maris writes: “[But] the government contends that it is within the sole province of the secretary of the Air Force to determine whether any privileged material is contained in the documents and that his determination of this question must be accepted by the district court without any independent consideration.… We cannot accede to this proposition. On the contrary, we are satisfied that a claim of privilege against disclosing evidence… involves a justiciable question, traditionally within the competence of the courts.… To hold that the head of an executive department of the government in a [law]suit to which the United States is a party may conclusively determine the government’s claim of privilege is to abdicate the judicial function to infringe the independent province of the judiciary as laid down by the Constitution.”
Fundamental Principle of Checks and Balances - Maris continues: “The government of the United States is one of checks and balances. One of the principal checks is furnished by the independent judiciary which the Constitution established. Neither the executive nor the legislative branch of the government may constitutionally encroach upon the field which the Constitution has reserved for the judiciary.… Nor is there any danger to the public interest in submitting the question of privilege to the decision of the courts. The judges of the United States are public officers whose responsibilities under the Constitution is just as great as that of the heads of the executive departments.”
Government Appeal - The Justice Department will appeal the ruling to the US Supreme Court (see March 1952 and March 9, 1953). [Siegel, 2008, pp. 153-156]

Entity Tags: Albert Maris, US Department of Justice, Barry Siegel, US Supreme Court

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Lawyers make their opening arguments before the Supreme Court in the case of US v Reynolds, the lawsuit that finds the government had no overarching right to unilaterally refuse to deliver classified documents in the course of a wrongful death lawsuit against the government (see December 11, 1951). The government has appealed the appellate court ruling to the Supreme Court (see March 1952). Because four of the nine justices had voted not to hear the case—in essence to let the appellate court ruling stand—the defense is cautiously optimistic about the Court’s decision.
Judiciary Has No Right to Interfere with Powers of the Executive, Government Argues - Acting Solicitor General Robert Stern tells the Court that the appellate judges’ decision, written by Judge Albert Maris, “is an unwarranted interference with the powers of the executive,” and that the decision forced the government to choose “whether to disclose public documents contrary to the public interest [or] to suffer the public treasury to be penalized” (a reference to the decision to award the plaintiffs monetary damages—see October 12, 1950). The judiciary “lack[s] power to compel disclosure by means of a direct demand [as well as] by the indirect method of an order against the United States, resulting in judgment when compliance is not forthcoming.”
Executive Has No Right to Unilaterally Withhold Information, Defense Counters - Stern’s arguments are countered by those of the plaintiffs’ lawyer, Charles Biddle, who writes, “We could rest our case with confidence on the clear opinion of Judge Maris,” but continues by arguing that if the government asserts a claim of executive privilege on the basis of national security, it must make the documents available to the Court for adjudication, or at least provide enough information for the Court to judge whether the documents present in fact a threat to national security if disclosed. This is particularly true, Biddle argues, “where there is no showing that the documents in question contain any military secret” (Biddle is unaware that the documents’ classification status had been reduced two years before—see September 14, 1950). “The basic question here is whether those in charge of the various departments of the government may refuse to produce documents properly demanded… in a case where the government is a party (see June 21, 1949), simply because the officials themselves think it would be better to keep them secret, and this without the Courts having any power to question the propriety of such decision.… In other words, say the officials, we will tell you only what we think it is in the public interest that you should know. And furthermore, we may withhold information not only about military or diplomatic secrets, but we may also suppress documents which concern merely the operation of the particular department if we believe it would be best, for purposes of efficiency or morale, that no one outside of the department, not even the Court, should see them.”
No Basis for Claims of Military Secrets - Biddle argues that because of responses he has received to his demands over the course of this lawsuit, he is relatively sure there are no military secrets contained within them. “[T]he proof is to the contrary,” he says, and goes on to say that had the Air Force disclosed from the outset that the plane crash, the fatal accident that sparked the original lawsuit (see October 6, 1948), was probably caused by pilot error and not by random chance, the plaintiffs may have never needed to ask for the disclosure of the documents in question, the accident reports on the crash (see October 18, 1948). “The secretary [of the Air Force]‘s formal claim of privilege said that the plane at the time was engaged in a secret mission and that it carried confidential equipment,” Biddle says, “but nowhere was it asserted that either had anything to do with the accident. The whole purpose of the demand by the respondents was for the purpose of finding out what caused the accident.… They were not in the least interested in the secret mission or equipment.” [Siegel, 2008, pp. 165-170]

Entity Tags: US Supreme Court, Albert Maris, Robert Stern, US Department of the Air Force, Charles Biddle

Timeline Tags: Civil Liberties

In their regular Saturday conference, the nine Supreme Court justices discuss the issues and arguments surrounding US v Reynolds (see October 21, 1952). According to the notes from the discussion, Chief Justice Fred Vinson, a strong advocate for expansive executive powers (see March 1952), says the case “boils down to Executive Branch determine privilege.” Other notes by Justice William O. Douglas suggest that Vinson isn’t convinced that the US must “be forced to pay for exercising its privilege” (see October 12, 1950). A straw vote taken at the end of the discussion shows five justices in favor of the government’s position to unilaterally withhold classified documents—overturning the appellate court decision (see December 11, 1951), and four in favor of allowing the decision to stand. [Siegel, 2008, pp. 171]

Entity Tags: Fred Vinson, US Supreme Court, William O. Douglas

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

One of a number of semi-official ‘Christian Identity’ logos.One of a number of semi-official ‘Christian Identity’ logos. [Source: KingIdentity (.com)]The “Christian Identity” theology, formerly a fairly benign expression of what is known as “British-Israelism” or “Anglo-Israelism,” begins to spread throughout the US and Canada, particularly on the west coasts of these nations. This belief holds that white Americans and Canadians are the real descendants of the Biblical tribes of Israel. In 2003, author Nicole Nichols, an expert on far-right racist and religious groups in America, will define the concept of “Christian Identity” as practiced by many white supremacist and separatist groups. Christian Identity is not an organization, she will write, but an ideology that many organizations have adopted in some form or fashion. Christian Identity “elevates white supremacy and separatism to a Godly ideal,” she will write, calling it “the ideological fuel that fires much of the activity of the racist far right.” According to Christian Identity theology, Jews are neither the “true Israelites” nor the true “chosen people” of God; instead, Christian Identity proponents claim, Jews are descended from an Asiatic people known as the Khazars, who settled near the Black Sea during the Middle Ages. [Nicole Nichols, 2003; Anti-Defamation League, 2005; Ontario Consultants on Religious Tolerance, 5/30/2006] In 2005, the Ontario Consultants on Religious Tolerance will write, “Followers tend to be involved in political movements opposing gun control, equal rights to gays and lesbians, and militia movements,” and quote Michael Barkun, an expert on radical-right groups, as saying, “This virulent racist and anti-Semitic theology… is prevalent among many right-wing extremist groups and has been called the ‘glue’ of the racist right.” [Ontario Consultants on Religious Tolerance, 5/30/2006]
Beginnings; 'The Protocols of the Elders of Zion' - In the 1920s, William J. Cameron, editor of the Dearborn Independent weekly newspaper, popularized the anti-Semitic hoax manuscript called “The Protocols of the Elders of Zion,” which purported to detail the “secret teachings” of Judaism, including the planned takeover of the world’s governments, the subjugation of non-Semitic races, and the bizarre, cannibalistic rituals supposedly practiced by Jews. [Anti-Defamation League, 2005]
Wesley Swift and 'Mud People' - In the 1940s, a former Methodist minister, Wesley Swift, started his own church, later known as the Church of Jesus Christ Christian. Swift had deep ties to a number of radical right-wing groups including the Ku Klux Klan; Swift and his associates set the stage for the mutation of the Christian Identity into a loosely organized set of virulently anti-Semitic, racist belief systems that will come to be grouped together under the “Christian Identity” rubric. Swift himself taught that only the white race was created in the form of God, while Asian and African races were created from the “beasts of the fields,” and thusly are subhuman creations. In Swift’s version of Genesis, Eve, the wife of the first “true” man Adam, was seduced by The Serpent, who masqeueraded as a white man. Eve bore a son, Cain, who is the actual father of the Jewish people. This reinterpretation, sometimes called the “two-seed” or “seedliner” theory, supports the Christian Identity propensity to demonize Jews, whom Swift and others labeled the “spawn of Satan.” Today’s white Europeans and their American and Canadian descendants, Swift taught, are descended from the “true son” of Adam and Eve, Abel, and are the actual “chosen people” of God. Some Christian Identity adherents go even farther, claiming that subhuman “pre-Adamic” races existed and “spawned” the non-white races of the world, which they label “mud people.” [Nicole Nichols, 2003; Anti-Defamation League, 2005]
Permeates Racist, Far-Right Groups - By the 1960s, a new group of Christian Identity leaders emerges to spread the Identity theology through the radical, racist right in America and Canada, popularizing the once-obscure ideology. Most prominent among them are three disciples of Swift: James K. Warner, William Potter Gale, and Richard Butler. Warner, who will move to Louisiana and play a leading role in the fight against civil rights, founds the Christian Defense League and the New Christian Crusade Church. Gale, an early leader of the Christian Defense League and its paramilitary arm, the California Rangers, goes on to found the Posse Comitatus (see 1969), the group that will help bring about the sovereign citizen movement. Gale will later found the Committee of the States and serve as the “chief of staff” of its “unorganized militia.” Butler moves Swift’s Church of Jesus Christ Christian to Idaho and recasts it as the neo-Nazi group Aryan Nations (see Early 1970s). Under the leadership of Butler, Gale, Warner, and others, Christian Identity soon permeates most of the major far-right movements, including the Klan and a racist “skinhead” organization known as the Hammerskins. It also penetrates many extreme anti-government activist groups. The Anti-Defamation League will write, “The resurgence of right-wing extremism in the 1990s following the Ruby Ridge (see August 31, 1992) and Waco standoffs (see April 19, 1993) further spread Identity beliefs.” [Anti-Defamation League, 2005] Nichols will write: “Christian Identity enclaves provide a trail of safe havens for movement activists, stretching from Hayden Lake in northern Idaho (the Aryan Nations stronghold) to Elohim City on the Oklahoma/Arkansas border (see 1973 and After). Many white supremacists on the run from federal authorities have found shelter and support from Christian Identity followers.” Some organizations such as the Montana Militia are headed by Identity adherents, but do not as a group promote the theology. [Nicole Nichols, 2003; Anti-Defamation League, 2005]
Bringing Forth the Apocalypse - Many Christian Identity adherents believe that the Biblical Apocalypse—the end of the world as it is currently known and the final ascendancy of select Christians over all others—is coming soon. Unlike some Christians, Identity adherents do not generally believe in the “rapture,” or the ascendancy of “saved” Christians to Heaven before the Apocalypse ensues; instead, Identity followers believe Jesus Christ will return to Earth only after the time of the “Tribulation,” a great battle between good and evil, which will set the stage for the return of Christ and the final transformation of the world. Identity followers believe it is their duty to prepare for the Apocalypse, and some believe it is their duty to help bring it about. They tend to cast the Apocalypse in racial terms—whites vs. nonwhites. Identity adherents believe that worldly institutions will collapse during the “end times,” and therefore tend to distrust such institutions, making Identity theology appealing to anti-government ideologies of groups such as militia, “Patriot,” and sovereign citizens groups. [Anti-Defamation League, 2005]
21st Century Identity - In the 21st century, Christian Identity groups are strongest in the Pacific Northwest of America and Canada, and the US Midwest, though Identity churches can be found throughout the US and in other parts of Canada. Identity churches also exist in, among other nations, Ireland, Great Britain, Australia, and South Africa (see June 25, 2003). The Anti-Defamation League will write: “Yet while spread far it is also spread thin. Estimates of the total number of believers in North America vary from a low of 25,000 to a high of 50,000; the true number is probably closer to the low end of the scale. Given this relatively small following, its extensive penetration of the far right is all the more remarkable.” [Anti-Defamation League, 2005]
Identity Violence - Identity adherents commit a number of violent acts, often against government and/or financial institutions, in an outsized proportion to their small numbers. In 1983, Identity adherent Gordon Kahl kills two US Marshals who attempt to arrest him on a parole violation, and kills an Arkansas sheriff before finally being gunned down by authorities (see February 13, 1983 and After). The white supremacist terrorist group The Order (see Late September 1983) contains a number of Identity members, including David Tate, who kills a Missouri Highway Patrol officer while attempting to flee to an Identity survivalist compound (see April 15, 1985). During the 1980s, small Identity groups such as The New Order (or The Order II) and the Arizona Patriots commit bombings and armored car robberies. After the Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995), Identity minister Willie Ray Lampley attempts a number of bombings (see November 9, 1995). In 1996, the Montana Freeman, led by Identity members, “stands off” federal authorities for 81 days (see March 25, 1996). Between 1996 and 1998, Eric Robert Rudolph, who has connections to Identity ministers such as Nord Davis and Dan Gayman, bombs an Atlanta gay bar (see February 21, 1997), several abortion clinics (see October 14, 1998), and the Atlanta Summer Olympics (see July 27, 1996 and After). In 1999, Identity member and former Aryan Nations security guard Buford Furrow goes on a shooting spree at a Jewish community center in Los Angeles (see August 10, 1999). [Anti-Defamation League, 2005]

A Time magazine profile lambasts the racist, anti-Communist John Birch Society (JBS—see December 2011), in what is many Americans’ first exposure to the group. It delineates the organization’s penchant for secrecy, its domination by its “dictatorial” leader, Robert Welch, and its hardline battle against almost every element of the federal government as “agents of Communism.” Forty to 60 percent of the federal government is controlled by Communism, the JBS believes. Time calls the organization “a tiresome, comic-opera joke” that nonetheless has cells in 35 states and an ever-widening influence. In Wichita, Kansas, JBS student members are trained to inform their cell leaders of “Communist” influences they may detect in their classroom lectures, and the offending teacher is berated by parents. A Wichita businessman who wanted to give a donation to the University of Wichita decided not to donate after being hounded by local JBS members, who wanted the university to fire professors and remove selected books from its library. “My business would be wrecked,” the businessman explains, “if those people got on the phone and kept on yelling that I am a Communist because I give money to the school.” Nashville, Tennessee, JBS members organize community members to verbally attack neighbors whom they suspect of Communist affiliations. JBS’s current priority, Time writes, is to bring about the impeachment of Chief Justice Earl Warren. Welch, who obtained his wealth from his brother’s candymaking business, believes that Social Security and the federal income tax are all part of the “creeping socialism” that is taking over the federal government. He retired from the business in 1957 and founded the JBS shortly thereafter, naming it for a US Navy captain killed by Chinese Communist guerrillas after the end of World War II. Welch’s seminal tract, “The Politician,” accuses President Eisenhower and his brother Milton Eisenhower of being Communist plants, and accuses both men of treason against the nation. [Time, 3/10/1961]

Entity Tags: Milton Eisenhower, John Birch Society, Time magazine, Dwight Eisenhower, Robert Welch, Earl Warren

Timeline Tags: Domestic Propaganda

The cover to the AMA album featuring Ronald Reagan.The cover to the AMA album featuring Ronald Reagan. [Source: Larry DeWitt]The American Medical Association (AMA) releases an 11-minute spoken-word album (LP) featuring actor and promising conservative politician Ronald Reagan. Reagan speaks against what he and the AMA call the “socialized medicine” of Medicare, currently being considered in Congress as part of legislation proposed by Democrats Cecil King and Clinton Anderson; many refer to the legislation as the King-Anderson bill. The AMA, along with most Congressional Republicans and a good number of Democrats, has been fighting the idea of government-provided health care since 1945 (see 1962).
Socialism Advancing under Cover of Liberal Policies - Reagan begins by warning that as far back as 1927, American socialists determined to advance their cause “under the name of liberalism.” King-Anderson is a major component of the secret socialist agenda, Reagan says. “One of the traditional methods of imposing statism or socialism on a people has been by way of medicine,” he says. “It’s very easy to disguise a medical program as a humanitarian project.” No real American wants socialized medicine, Reagan says, but Congress is attempting to fool the nation into adopting just such a program. It has already succeeded in imposing a socialist program on the country by creating and implementing Social Security, which was originally envisioned to bring “all people of Social Security age… under a program of compulsory health insurance.” Reagan, following the AMA’s position, says that the current “Eldercare” program, often called “Kerr-Mills” for its Congressional sponsors, is more than enough to cover elderly Americans’ medical needs. (Author Larry DeWitt notes that in 1965, Kerr-Mills will be superseded by Medicaid, the medical program for the poor. He will write, “So Reagan—on behalf of the AMA—was suggesting that the nation should be content with welfare benefits under a Medicaid-type program as the only form of government-provided health care coverage.”) King-Anderson is nothing more than “simply an excuse to bring about what [Democrats and liberals] wanted all the time: socialized medicine,” Reagan says. And once the Medicare proposal of King-Anderson is in place, he argues, the government will begin constructing an entire raft of socialist programs, and that, he says, will lead to the destruction of American democracy. “The doctor begins to lose freedom,” he warns. “First you decide that the doctor can have so many patients. They are equally divided among the various doctors by the government. But then doctors aren’t equally divided geographically. So a doctor decides he wants to practice in one town and the government has to say to him, you can’t live in that town. They already have enough doctors. You have to go someplace else. And from here it’s only a short step to dictating where he will go.… All of us can see what happens once you establish the precedent that the government can determine a man’s working place and his working methods, determine his employment. From here it’s a short step to all the rest of socialism, to determining his pay. And pretty soon your son won’t decide, when he’s in school, where he will go or what he will do for a living. He will wait for the government to tell him where he will go to work and what he will do.” DeWitt will note that this is far more extravagant than any of the Medicare proposals ever advanced by any lawmaker: “It was this more apocalyptic version of Medicare’s potential effects on the practice of medicine that Reagan used to scare his listeners.”
Advocating Letter-Writing Campaign - Reagan tells his listeners that they can head off the incipient socialization of America by engaging in a nationwide letter-writing campaign to flood Congress with their letters opposing King-Anderson. “You and I can do this,” he says. “The only way we can do it is by writing to our congressman even if we believe he’s on our side to begin with. Write to strengthen his hand. Give him the ability to stand before his colleagues in Congress and say, ‘I heard from my constituents and this is what they want.’”
Apocalypse - If the effort fails, if Medicare passes into law, the consequences will be dire beyond imagining, Reagan tells his audience: “And if you don’t do this and if I don’t do it, one of these days you and I are going to spend our sunset years telling our children, and our children’s children, what it once was like in America when men were free.” Reagan is followed up by an unidentified male announcer who reiterates Reagan’s points and gives “a little background on the subject of socialized medicine… that now threatens the free practice of medicine.” Reagan then makes a brief closing statement, promising that if his listeners do not write those letters, “this program I promise you will pass just as surely as the sun will come up tomorrow. And behind it will come other federal programs that will invade every area of freedom as we have known it in this country, until, one day… we will awake to find that we have socialism. And if you don’t do this, and if I don’t do it, one of these days, you and I are going to spend our sunset years telling our children, and our children’s children, what it once was like in America when men were free.” [Larry DeWitt, 9/2004; TPMDC, 8/25/2009]

Entity Tags: Cecil King, Ronald Reagan, American Medical Association, Larry DeWitt, Clinton Anderson, Medicare

Timeline Tags: US Health Care, Domestic Propaganda

W. Cleon Skousen.W. Cleon Skousen. [Source: Skousen2000 (.com)]Author W. Cleon Skousen, a supporter of the John Birch Society (JBS—see December 2011), writes an article attacking the Time profile of the JBS (see March 10, 1961) as being part of an orchestrated Communist attack on the organization. The article came about after the international Communist Party “ordered” the “annihilation” of the JBS, Skousen says. Skousen denies the group’s penchant for secrecy, saying that it was openly set up in 1958 as a network of “study groups” examining the threat of Communism to American society. The organization, he writes, is nothing more than “a study group program with a strong bias in favor of traditional American constitutionalism.” By 1960, the JBS earned the enmity of competing conservative groups, Skousen says, because the organization “had rallied together most of the best informed and hardest working patriots in many cities.” However, he writes, JBS members tend to be part of other conservative movements as well. The JBS worked to defeat a bill, slated to be introduced in January 1961, that would largely defund the House Committee on Un-American Activities “so it could not investigate the Communist Party.” Skousen says that JBS efforts derailed the bill, handing the American Communist Party “an overwhelming defeat.” After the bill was defeated, Skousen says, “a manifesto… from Moscow” ordered the destruction of the JBS, as it posed the primary danger to “Communist progress” in the US. The Time magazine profile of the JBS was part of that effort, Skousen says, after the organization was attacked in the pages of the Daily People’s World, a West Coast publication that Skousen says was “the official Communist newspaper” of that area. Within days, the information in the article was reprinted in Time’s own article, which reached far more people than the People’s World. “[T]he thing which astonished me,” Skousen writes, “was the rapidity with which the transmission belt began to function so that this story was planted in one major news medium after another until finally even some of the more conservative papers had taken up the hue and cry.” Skousen calls the article a Communist plant filled with fabrications and lies. He says that JBS leader Robert Welch’s accusations that President Eisenhower and other pro-American world leaders are Communists were made in “private communication[s] to his friends” and were never part of official JBS principles, and took place well before Welch founded the JBS in 1957; therefore, Skousen writes, to report Welch’s characterizations is to smear the JBS. Skousen also denies any racism or anti-Semitism on the JBS’s part, and uses a sympathetic 1963 report by the California Senate Factfinding Committee to “prove” his claims. The report concluded that Welch and the JBS have “stirred the slumbering spirit of patriotism in thousands of Americans, roused them from lethargy, and changed their apathy into a deep desire to first learn the facts about communism and then implement that knowledge with effective and responsible action.” Skousen concludes that while Americans are free to disagree with JBS principles and actions, any criticism of the organization should be considered potential Communist propaganda designed to smear the organization and reduce its effectiveness. If the criticism does not come from Communists themselves, it plays into Communist hands. As he claims to have been told by “[a] former member of the Communist Party National Committee,” “The Communist leaders look upon the stamping out of the John Birch Society as a matter of life and death for the Party.” [Our Republic, 1963]

Entity Tags: W. Cleon Skousen, Robert Welch, Daily People’s World, Dwight Eisenhower, John Birch Society, Time magazine

Timeline Tags: Domestic Propaganda

Part of a poster distributed by the John Birch Society in Dallas in the days before President Kennedy’s motorcade travels through that city. Kennedy will be assassinated while in the motorcade.Part of a poster distributed by the John Birch Society in Dallas in the days before President Kennedy’s motorcade travels through that city. Kennedy will be assassinated while in the motorcade. [Source: Spartacus Schoolnet (.com)]The John Birch Society (JBS—see March 10, 1961 and December 2011), an anti-Communist organization that embraces racist and white supremacist ideologies, distrubutes posters throughout Dallas accusing President Kennedy of committing treason against the United States. The poster distribution is timed to coincide with Kennedy’s visit to Dallas, where he is scheduled to drive through the city in a motorcade on November 22. Kennedy will be assassinated during that motorcade. The poster, designed to appear as a “Wanted” notice, enumerates the following “charges” against Kennedy:
bullet “Betraying the Constitution (which he swore to uphold). He is turning the sovereignty of the US over to the Communist controlled United Nations. He is betraying our friends (Cuba, Katanga, Portugal) and befriending our enemies (Russia, Yugoslavia, Poland).”
bullet “He has been WRONG on innumerable issues affecting the security of the US (United Nations, Berlin Wall, Missile Removal, Cuba, Wheat deals, Test Ban Treaty, etc.).”
bullet “He has been lax in enforcing the Communist Registration laws.”
bullet “He has given support and encouragement to the Communist-inspired racial riots.”
bullet “He has illegally invaded a sovereign State with federal troops.”
bullet “He has consistently appointed Anti-Christians to Federal office. Upholds the Supreme Court in Anti-Christian rulings. Aliens and known Communists abound in Federal offices.”
bullet “He has been caught in fantastic LIES to the American people (including personal ones like his previous marriage and divorce).” [Spartacus Schoolnet, 2008]

Entity Tags: John F. Kennedy, United Nations, John Birch Society

Timeline Tags: Domestic Propaganda

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]

Entity Tags: Malcolm Little, Central Intelligence Agency, Church Committee, Lew Allen, National Security Agency, Martin Luther King, Jr., Office of Security Services, Joan Baez

Timeline Tags: Civil Liberties

Roger Ailes (left) and Richard Nixon in a 1968 photo.Roger Ailes (left) and Richard Nixon in a 1968 photo. [Source: White House Photo Office / Rolling Stone]Roger Ailes, the media consultant for the Richard Nixon presidential campaign, decides that Nixon should, during a televised town hall, take a staged question from a “good, mean, Wallaceite cab driver.” Ailes is referring to the overtly racist third-party candidacy of Governor George Wallace (D-AL). Ailes suggests “[s]ome guy to sit there and say, ‘Awright, Mac, what about these n_ggers?’” According to Nixonland author Rick Pearlstein, the idea is to have Nixon “abhor the uncivility of the words, while endorsing a ‘moderate’ version of the opinion.” [Pearlstein, 5/2008, pp. 331; Media Matters, 7/22/2011] The suggestion is not used. Ailes will go on to found Fox News (see October 7, 1996).

Entity Tags: Rick Pearlstein, George C. Wallace, Richard M. Nixon, Roger Ailes

Timeline Tags: Nixon and Watergate, Domestic Propaganda, Elections Before 2000

The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). [Federation of American Scientists, 7/17/1997]

Entity Tags: National Security Agency, Echelon, Rhyolite, Chalet, Government Communications Headquarters, Owen Lewis, Canyon

Timeline Tags: Civil Liberties

Roger Ailes, the senior media consultant for the Nixon administration (see 1968), writes, or helps write, a secret memo for President Nixon and fellow Republicans outlining a plan for conservatives to “infiltrate and neutralize” the mainstream American media. The document will not be released until 2011; experts will call it the “intellectual forerunner” to Fox News, which Ailes will launch as a “fair and balanced” news network in 1996 (see October 7, 1996). John Cook, the editor of the online news and commentary magazine Gawker, will call the document the outline of a “nakedly partisan… plot by Ailes and other Nixon aides to circumvent the ‘prejudices of network news’ and deliver ‘pro-administration’ stories to heartland television viewers.” The document is entitled “A Plan for Putting the GOP on TV News.” Ailes, currently the owner of REA Productions and Ailes Communications Inc., works for the Nixon White House as a media consultant; he will serve the same function for President George H.W. Bush during his term. Ailes is a forceful advocate for using television to shape the message of the Nixon administration and of Republican policies in general. He frequently suggests launching elaborately staged events to entice favorable coverage from television reporters, and uses his contacts at the news networks to head off negative publicity. Ailes writes that the Nixon White House should run a partisan, pro-Republican media operation—essentially a self-contained news production organization—out of the White House itself. He complains that the “liberal media” “censors” the news to portray Nixon and his administration in a negative light. Cook will say the plan “reads today like a detailed precis for a Fox News prototype.” The initial idea may have originated with Nixon chief of staff H.R. Haldeman, but if so, Ailes expands and details the plan far beyond Haldeman’s initial seed of an idea. [Roger Ailes, 1970; Gawker, 6/30/2011] In 2011, Rolling Stone journalist Tim Dickinson will write: “This is an astounding find. It underscores Ailes’s early preoccupation with providing the GOP with a way to do an end run around skeptical journalists.” [Rolling Stone, 7/1/2011]
Focus on Television - Ailes insists that any such media plan should focus on television and not print. Americans are “lazy,” he writes, and want their thinking done for them: “Today television news is watched more often than people read newspapers, than people listen to the radio, than people read or gather any other form of communication. The reason: People are lazy. With television you just sit—watch—listen. The thinking is done for you.” Ailes says the Nixon administration should create its own news network “to provide pro-administration, videotape, hard news actualities to the major cities of the United States.” Other television news outlets such as NBC News, ABC News, CBS News, and PBS News, are “the enemy,” he writes, and suggests going around them by creating packaged, edited news stories and interviews directly to local television stations. (Years later, these kinds of “news reports” will be called “video news releases,” or VNRs, and will routinely be used by the George W. Bush administration and others—see March 15, 2004, May 19, 2004, March 2005, and March 13, 2005. They will be outlawed in 2005—see May 2005.) “This is a plan that places news of importance to localities (senators and representatives are newsmakers of importance to their localities) on local television news programs while it is still news. It avoids the censorship, the priorities, and the prejudices of network news selectors and disseminators.” Ailes and his colleagues include detailed cost analyses and production plans for such news releases. In a side note on the document, Ailes writes: “Basically a very good idea. It should be expanded to include other members of the administration such as cabinet involved in activity with regional or local interest. Also could involve GOP governors when in DC. Who would purchase equipment and run operation—White House? RNC [Republican National Committee]? Congressional caucus? Will get some flap about news management.”
Dirty Tricks - Ailes suggests planting “volunteers” within the Wallace campaign, referring to segregationist George Wallace (D-AL), whose third-party candidacy in 1968 almost cost Nixon the presidency. Ailes knows Wallace is planning a 1972 run as well, and is apparently suggesting a “mole” to either gather intelligence, carry out sabotage, or both. (Wallace’s plans for another run will be cut short by an assassination attempt—see May 15, 1972.) Ailes also suggests having his firm film interviews with Democrats who support Nixon’s Vietnam policies, such as Senators John Stennis (D-MS) and John McClellan (D-AR). Though Stennis and McClellan would believe that the interviews were for actual news shows, they would actually be carried out by Ailes operatives and financed by a Nixon campaign front group, the “Tell it to Hanoi Committee.” In June 1970, someone in the Nixon administration scuttles the plan, writing: “[T]he fact that this presentation is White House directed, unbeknownst to the Democrats on the show, presents the possibility of a leak that could severely embarrass the White House and damage significantly its already precarious relationship with the Congress. Should two powerful factors like Stennis and McClellan discover they are dupes for the administration the scandal could damage the White House for a long time to come.”
Volunteers to Head Program - Ailes writes that he wants to head any such “news network,” telling Haldeman: “Bob—if you decide to go ahead we would as a production company like to bid on packaging the entire project. I know what has to be done and we could test the feasibility for 90 days without making a commitment beyond that point.” Haldeman will grant Ailes’s request in November 1970, and will give the project a name: “Capitol News Service.” Haldeman will write: “With regard to the news programming effort as proposed last summer, Ailes feels this is a good idea and that we should be going ahead with it. Haldeman suggested the name ‘Capitol News Service’ and Ailes will probably be doing more work in this area.” Documents fail to show whether the “Capitol News Service” is ever actually implemented. [Roger Ailes, 1970; Gawker, 6/30/2011]
Television News Incorporated - Ailes will be fired from the Nixon administration in 1971; he will go on to start a similar private concern, “Television News Incorporated” (TVN—see 1971-1975), an ideological and practical predecessor to Fox News. Dickinson will write: “More important, [the document] links the plot to create what would become Television News Incorporated—the Ailes-helmed ‘fair and balanced’ mid-1970s precursor to Fox News—to the Nixon White House itself.” [Gawker, 6/30/2011; Rolling Stone, 7/1/2011] A former business colleague of Ailes’s will say in 2011: “Everything Roger wanted to do when he started out in politics, he’s now doing 24/7 with his network [Fox News]. It’s come full circle.” [Rolling Stone, 5/25/2011]

Entity Tags: John Cook, George C. Wallace, Fox News, Bush administration (43), Ailes Communications, H.R. Haldeman, George Herbert Walker Bush, Tim Dickinson, Television News Incorporated, Tell it to Hanoi Committee, REA Productions, John Stennis, John Little McClellan, Nixon administration, Roger Ailes

Timeline Tags: Domestic Propaganda

Roger Ailes, a former media consultant to the Nixon administration (see Summer 1970) who proposed a White House-run “news network” that would promote Republican-generated propaganda over what he calls “liberal” news reporting (see Summer 1970), moves on to try the idea in the private venue. Ailes works with a project called Television News Incorporated (TVN), a propaganda venue funded by right-wing beer magnate Joseph Coors. Conservative activist and Coors confidant Paul Weyrich will later call Ailes “the godfather behind the scenes” of TVN. To cloak the “news” outlet’s far-right slant, Ailes coins the slogan “Fair and Balanced” for TVN. In 2011, Rolling Stone reporter Tim Dickinson will write: “TVN made no sense as a business. The… news service was designed to inject a far-right slant into local news broadcasts by providing news clips that stations could use without credit—and for a fraction of the true costs of production. Once the affiliates got hooked on the discounted clips, its president explained, TVN would ‘gradually, subtly, slowly’ inject ‘our philosophy in the news.’ The network was, in the words of a news director who quit in protest, a ‘propaganda machine.’” Within weeks of TVN’s inception, its staff of professional journalists eventually has enough of the overt propaganda of their employer and begin defying management orders; Coors and TVN’s top management fire 16 staffers and bring in Ailes to run the operation. The operation is never successful, but during his tenure at TVN, Ailes begins plotting the development of a right-wing news network very similar in concept to the as-yet-unborn Fox News. TVN plans to invest millions in satellite distribution that would allow it not only to distribute news clips to other broadcasters, but to provide a full newscast with its own anchors and crew (a model soon used by CNN). Dickinson will write, “For Ailes, it was a way to extend the kind of fake news that he was regularly using as a political strategist.” Ailes tells a Washington Post reporter in 1972: “I know certain techniques, such as a press release that looks like a newscast. So you use it because you want your man to win.” Ailes contracts with Ford administration officials to produce propaganda for the federal government, providing news clips and scripts to the US Information Agency. Ailes insists that the relationship is not a conflict of interest. Unfortunately for Ailes and Coors, TVN collapses in 1975. One of its biggest problems is the recalcitrance of its journalists, who continue to resist taking part in what they see as propaganda operations. Ailes biographer Kerwin Swint will later say, “They were losing money and they weren’t able to control their journalists.” In a 2011 article for the online news and commentary magazine Gawker, John Cook will write: “Though it died in 1975, TVN was obviously an early trial run for the powerhouse Fox News would become. The ideas were the same—to route Republican-friendly stories around the gatekeepers at the network news divisions.” Dickinson will write that one of the lessons Ailes learns from TVN, and will employ at Fox, is to hire journalists who put ideological committment ahead of journalistic ethics—journalists who will “toe the line.” [Rolling Stone, 5/25/2011; Gawker, 6/30/2011] Ailes will go on to found Fox News, using the “fair and balanced” slogan to great effect (see October 7, 1996 and 1995).

Entity Tags: Paul Weyrich, John Cook, Fox News, Ford administration, Joseph Coors, Nixon administration, Television News Incorporated, Tim Dickinson, Roger Ailes, United States Information Agency, Kerwin Swint

Timeline Tags: Domestic Propaganda

Ben Klassen.Ben Klassen. [Source: Creativity Movement (.com)]Former Florida state legislator Benhardt “Ben” Klassen, who served as Florida chair of the 1968 presidential campaign of George Wallace (D-AL), forms the Church of the Creator (COTC) in Lighthouse Point, Florida. Klassen was born in the Ukraine in 1918, and later lived in Mexico and Canada before moving to California as an adult. He is a former elementary school teacher and an inventor, earning a patent for an electric can opener in 1954. He moved to Florida in 1958, where he became a successful real estate agent. He became a Republican representative to the Florida House of Representatives in 1965, where he campaigned against desegregation and the federal government. He is a lifetime member of the far-right John Birch Society (see March 10, 1961 and December 2011), though he has denounced the group as a “smokescreen for the Jews” and accused Wallace of “betraying” his supporters by intentionally courting African-American support. Klassen explains his race-based religion in his church’s 511-page holy book, Nature’s Eternal Religion. Among its “16 commandments”: “It is our sacred goal to populate the lands of this earth with White people exclusively.” Klassen popularizes the war cry “Rahowa,” which stands for RAcial HOly WAr. [Anti-Defamation League, 1993; Southern Poverty Law Center, 9/1999] Members of the COTC, according to Klassen’s writings, see “every issue, whether religious, political, or racial, [a]s viewed through the eyes of the White Man and exclusively from the point of view of the White race as a whole.… We completely reject the Judeo-democratic-Marxist values of today and supplant them with new and basic values, of which race is the foundation.” While most right-wing extremist groups use Christianity to justify their racism, Klassen and the COTC attack Christianity as a “tremendous weapon in the worldwide Jewish drive of race-mixing.” Klassen writes that Jews “concocted” Christianity “for the very purpose of mongrelizing and destroying the White Race.” According to Klassen, Jews are “parasites” who “control and manipulate the finances, the propaganda, the media, and the governments of the world.” [Anti-Defamation League, 7/6/1999] In 2004, author Chip Berlet will write that Klassen’s religion, “Creativity,” claims that whites are destined “to rule the world and thus fulfill the purpose of the universe. To attain this destiny, it is necessary to destroy the enemies and race traitors who prevent this from happening. The primary enemies are Jews, blacks, and other ‘mud people,’ and white race traitors, including most Christians. Klassen credits the influence of Hitler’s Mein Kampf in the development of his views.… What Klassen did was to pick up ideas from the theories of [German philosopher Friedrich] Nietzsche, pantheisim, Odinism, and Celtic paganism as filtered through German Nazi retelling of the Norse heroic warrior myths, to create a religion of Aryanist white supremacy. Discarding the details, he created a form of cosmotheism in which the supreme power is the collective will of the Aryan race. The duty of every member of the Aryan race is to reflect the ideals of the heroic warrior and do battle with the enemies of the race.… Like other forms of fascism, the idea of action is central to the philosophy, as is the celebration of violence and the spilling of blood as part of a rite of passage to full adulthood.” [Chip Berlet, 2004]

Entity Tags: John Birch Society, World Church of the Creator, Benhardt (“Ben”) Klassen, Chip Berlet

Timeline Tags: US Domestic Terrorism

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” [Dubose and Bernstein, 2006, pp. 34-35]

Entity Tags: Seymour Hersh, US Department of Defense, Ford administration, Edward Levi, Donald Rumsfeld, Church Committee, Richard (“Dick”) Cheney, Philip Buchan, New York Times, Gerald Rudolph Ford, Jr

Timeline Tags: Civil Liberties

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]

Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

The US Foreign Intelligence Advisory Board recommended in 1970 that “economic intelligence be considered a function of national security” equal to that of other intelligence. In 1977, the NSA, CIA, and Department of Commerce forms a joint “Office of Intelligence Liaison” (later renamed the “Office of Executive Support”) specifically authorized to handle “foreign intelligence” of interest to the Commerce Department, much of it provided by the NSA. The other countries using Echelon, the NSA’s satellite surveillance program, which include Britain, Canada, Australia, and New Zealand, all operate similar programs. President Bill Clinton will extend this operation in 1993. In 1993, the European company Panavia will be specifically targeted over aircraft sales to the Middle East. In 1994, US companies will be given NSA and CIA intelligence intercepts that help them win contracts in Indonesia. Other information that will be provided by US intelligence to US and allied corporations include information about the emission standards for Japanese automobiles, 1995 trade negotiations over the US importing of Japanese luxury cars, France’s participation in the GATT trade negotiations of 1993, and the 1997 Asian-Pacific Economic Conference. [Science and Technology Assessments Office, 8/15/2000]

Entity Tags: William Jefferson (“Bill”) Clinton, Issuetsdeah, National Security Agency, Office of Executive Support, Panavia

Timeline Tags: Civil Liberties

Interviewer David Frost has a difficult time with his subject, former President Richard Nixon, in the day’s early questioning (see April 6, 1977). Frost attempts to recoup with a line of questioning suggested by his adviser James Reston, Jr., one used in the trial of former Nixon aide John Ehrlichman (see January 1, 1975). Were there no limits to what a president can do, even if the president wants to do something plainly illegal? he asks. Could he do anything despite the law? Burglary? Forgery? Even murder? “If the president does it, that means it’s not illegal,” Nixon retorts. “Never had his imperialism been so baldly stated,” Reston will later reflect. Frost asks if the dividing line between, for example, a police burglary and the murder of an antiwar protester is only the president’s judgment? Nixon agrees, and adds: “There’s nothing specific that the Constitution contemplates in that respect. I haven’t read every word, every jot and every tittle, but I do know this: That it has been, however, argued that as far as a president is concerned, that in war time, a president does have certain extraordinary powers which would make acts that would otherwise be unlawful, lawful if undertaken for the purpose of preserving the nation and the Constitution, which is essential for the rights we’re all talking about.” [Time, 5/30/1977; Reston, 2007, pp. 102-105; Landmark Cases, 8/28/2007]

Entity Tags: Richard M. Nixon, David Frost, James Reston, Jr, John Ehrlichman

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

Oil billionaire David Koch runs for vice president on the Libertarian Party ticket. David and his brother Charles are the primary backers of hard-right libertarian politics in the US (see August 30, 2010); Charles, the dominant brother, is determined to tear government “out at the root,” as he will later be characterized by libertarian Brian Doherty. The brothers have thrown their support behind Libertarian presidential candidate Ed Clark, who is running against Republican Ronald Reagan from the right of the political spectrum. The brothers are frustrated by the legal limits on campaign financing, and they persuade the party to place David on the ticket as vice president, thereby enabling him to spend as much of his personal fortune as he likes. The Libertarian’s presidential campaign slogan is, “The Libertarian Party has only one source of funds: You.” In reality, the Koch brothers’ expenditures of over $2 million is the campaign’s primary source of funding. Clark tells a reporter that the Libertarians are preparing to stage “a very big tea party” because people are “sick to death” of taxes. The Libertarian Party platform calls for the abolition of the FBI and the CIA, as well as of federal regulatory agencies, such as the Securities and Exchange Commission and the Department of Energy. The platform proposes the abolition of Social Security, minimum-wage laws, gun control, and all personal and corporate income taxes; in return, it proposes the legalization of prostitution, recreational drugs, and suicide. Government should be reduced to only one function, the party proclaims: the protection of individual rights. Conservative eminence William F. Buckley Jr. calls the movement “Anarcho-Totalitarianism.” The Clark-Koch ticket receives only one percent of the vote in the November 1980 elections, forcing the Koch brothers to realize that their brand of politics isn’t popular. In response, Charles Koch becomes openly scornful of conventional politics. “It tends to be a nasty, corrupting business,” he says. “I’m interested in advancing libertarian ideas.” Doherty will later write that both Kochs come to view elected politicians as merely “actors playing out a script.” Doherty will quote a longtime confidant of the Kochs as saying that after the 1980 elections, the brothers decide they will “supply the themes and words for the scripts.” In order to alter the direction of America, they had to “influence the areas where policy ideas percolate from: academia and think tanks.” [New Yorker, 8/30/2010]

Entity Tags: Libertarian Party, Brian Doherty, Charles Koch, Ronald Reagan, David Koch, William F. Buckley, Ed Clark

Timeline Tags: Domestic Propaganda

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

About 500 Iranian students take over the American Embassy in Tehran and hold 52 Americans hostage for 444 days. The Mujahedeen-e Khalq (MEK) is one of the groups that supports the take-over. [US Department of State, 4/30/2003; PBS, 1/15/2006]

Entity Tags: People’s Mujahedin of Iran

Timeline Tags: US confrontation with Iran, Iran-Contra Affair

Michael Barnes.Michael Barnes. [Source: Covington and Burling]Representative Michael Barnes (D-MD) is targeted by the NSA’s Echelon satellite surveillance program on orders from Reagan administration officials. Barnes, an outspoken opponent of Reagan’s Central American policies, had phone conversations with Nicaraguan officials intercepted and recorded, including one conversation between Barnes and the foreign minister of Nicaragua. Barnes learns of the surveillance after White House officials, apparently attempting to discredit Barnes, leaks transcripts of the taped conversations to reporters. CIA director William Casey shows Barnes a Nicaraguan embassy cable reporting a meeting between embassy staff and one of Barnes’s aides; Casey demands that Barnes fire the aide. Barnes refuses, noting that the aide had visited the embassy on legitimate business concerning international affairs. Barnes will say in 1995, “I was aware that NSA monitored international calls, that it was a standard part of intelligence gathering. But to use it for domestic political purposes is absolutely outrageous and probably illegal.” Former senator Dennis DeConcini (R-AZ) says he worries about the NSA spying on US citizens: “It has always worried me. What if that is used on American citizens? It is chilling. Are they listening to my private conversations on my telephone?” [Patrick S. Poole, 8/15/2000]

Entity Tags: Michael D. Barnes, Reagan administration, William Casey, National Security Agency, Dennis DeConcini, Echelon

Timeline Tags: Civil Liberties

A federal court rules that because of the government’s “state secrets” privilege (see March 9, 1953), a civilian plaintiff suing the US Navy over a contractual agreement cannot even access “non-privileged,” or unclassified, information from the Navy because to do so might “threaten disclosure” of material that goes against “the overriding interest of the United States… preservation of its state secrets privilege precludes any further attempt to pursue litigation.” [Siegel, 2008, pp. 196-197]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

Lee Atwater.Lee Atwater. [Source: NNDB (.com)]Republican political strategist Lee Atwater, in a discussion with political science professor Alexander Lamis, discusses the Republican strategy of using racism to win elections. Lamis will later quote Atwater in his book Southern Politics in the 1990s. Atwater takes Lamis through the evolution of Republican appeals to racism: “You start out in 1954 by saying, ‘N_gger, n_gger, n_gger.’ By 1968 you can’t say ‘n_gger’—that hurts you. Backfires. So you say stuff like forced busing, states’ rights, and all that stuff. You’re getting so abstract now [that] you’re talking about cutting taxes, and all these things you’re talking about are totally economic things and a byproduct of them is [that] blacks get hurt worse than whites. And subconsciously maybe that is part of it. I’m not saying that. But I’m saying that if it is getting that abstract, and that coded, that we are doing away with the racial problem one way or the other. You follow me—because obviously sitting around saying, ‘We want to cut this,’ is much more abstract than even the busing thing, and a hell of a lot more abstract than ‘N_gger, n_gger.’” Atwater will go on to manage the 1988 presidential campaign of George H. W. Bush, where he will oversee the use of what is considered one of the most overtly racist campaign ads in modern history, the “Willie Horton” ad (see September 21 - October 4, 1988). [New York Times, 10/6/2005]

Entity Tags: Lee Atwater, Alexander Lamis, Republican Party

Timeline Tags: Domestic Propaganda, Elections Before 2000

President Ronald Reagan issues Executive Order 12333, which directs the US intelligence community to provide foreign intelligence data to the White House. The order reads in part, “[A]gencies are not authorized to use such techniques as electronic surveillance, unconsented physical searches, mail surveillance, physical surveillance, or monitoring devices unless they are in accordance with procedures established by the head of the agency concerned and approved by the Attorney General.” It establishes rules of conduct for the intelligence agencies, and mandates a certain level of Congressional oversight. [Executive Order 12333 -- United States intelligence activities, 4/5/2007] It also establishes the basis for what are later called “National Security Letters.” These NSLs, originally envisioned for use to compile information in hunts for foreign criminals and suspected terrorists, will later be used by the administration of George W. Bush to order US booksellers, librarians, employers, Internet providers, and others to turn over records and information they compile on US citizens, with strict adjuncts against allowing those targeted for surveillance to know about the NSLs and with virtually no government oversight (see October 25, 2005). [Washington Post, 11/6/2005] It does not, as some have later asserted, directly prohibit the assassination of targeted foreign subjects—i.e. terrorist suspects and even foreign leaders—though it does restrict the use of assassination by US government operatives to certain very restricted circumstances centered around critical aspects of national security. [Parks, 11/2/1989 pdf file]

Entity Tags: Ronald Reagan, George W. Bush, National Security Letters, Bush administration (43)

Timeline Tags: Civil Liberties

In the second of two rulings in the case of Halkin v Helms, the judiciary comes down squarely on the side of the US government against charges of illegal surveillance and wiretapping leveled against American anti-war protesters. The district and appellate courts uphold the federal government’s “state secrets” claim as codified in US v Reynolds (see March 9, 1953), thereby denying the plaintiffs the right to see government information that they claim would prove their case. The DC Court of Appeals writes that the federal courts do not have any constitutional role as “continuing monitors of the wisdom and soundness of Executive action,” and instead the courts “should accord utmost deference to executive assertions of privilege on grounds of military or diplomatic secrets… courts need only be satisfied that there is a reasonable danger” that military secrets might be exposed. [Siegel, 2008, pp. 196-196]

Timeline Tags: Civil Liberties

Margaret Thatcher.Margaret Thatcher. [Source: UK Parliament]British prime minister Margaret Thatcher, displeased with two of her ministers for challenging her on unidentified policy matters, requests that they be placed under electronic surveillance. Because it is illegal for British intelligence to monitor its own citizens, the operation is handed over to the CSE, Canada’s national security agency. [Daily Iowan, 1/19/2006; Janczewski and Colarik, 2007, pp. 454] According to former CSE spy Mike Frost, who will publicly discuss the matter in 2000, Thatcher “had two ministers that she said ‘…weren’t onside.’” Thatcher, says Frost, “wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers.” Why CSE and not British intelligence? Because for the British to monitor their own government members would be illegal—so instead, they farm out such activities to their allies. “The British Parliament now have total deniability,” Frost says. “They didn’t do anything. They know nothing about it. Of course they didn’t do anything; we did it for them.” Frost will say there is no way to pin any blame or criminal charges on anyone in the British government. “The British Parliament now has total deniability,” Frost says. “They didn’t do anything… we did it for them.” [ZDNet, 2/25/2000; CBS News, 2/27/2000]

Entity Tags: Communications Security Establishment, Mike Frost, Government Communications Headquarters, Margaret Thatcher

Timeline Tags: Civil Liberties

Citizens for a Sound Economy logo.Citizens for a Sound Economy logo. [Source: Greater Houston Pachyderm Club]The billionaire Koch brothers, Charles and David, launch the first of a number of “citizen advocacy” groups they either found or fund, Citizens for a Sound Economy. The Kochs are staunch right-wing libertarians determined to successfully combat government regulation and oversight of businesses, government taxation, and government funding of social programs (see August 30, 2010). Between 1986 and 1993, the brothers will provide $7.9 million to the group, even as it promotes itself as a “grassroots,” “citizen-driven” organization. (Such organizations that call themselves “citizen-based” while actually being founded, operated, and funded by corporate interests are called “astroturf” organizations.) Matt Kibbe, who will go on to head a Koch-funded lobbying organization, FreedomWorks, will later say of Citizens for a Sound Economy that its driving force was to take the Kochs’ “heavy ideas and translate them for mass America.… We read the same literature Obama did about nonviolent revolutions—Saul Alinsky, Gandhi, Martin Luther King. We studied the idea of the Boston Tea Party as an example of nonviolent social change. We learned we needed boots on the ground to sell ideas, not candidates.” One organization participant will say that the brothers are “very controlling, very top down. You can’t build an organization with them. They run it.” By 1993, the organization will become powerful enough to successfully thwart the Clinton administration’s efforts to place a “BTU tax” on energy, and mounts successful “citizen protests” against Democrats, sometimes funnelling millions of Koch monies into the political campaigns of their Republican opponents. [New Yorker, 8/30/2010]

Entity Tags: Clinton administration, Charles Koch, David Koch, Citizens for a Sound Economy, Matt Kibbe, FreedomWorks

Timeline Tags: Domestic Propaganda

The DC Court of Appeals rejects a claim by civilian plaintiffs to force the government to disclose classified information as part of a lawsuit, citing the “state secrets” privilege (see March 9, 1953). Furthermore, the court broadens the definition of “state secrets” to include “disclosure of intelligence-gathering methods or capabilities and disruption of diplomatic relations.” [Siegel, 2008, pp. 197]

Timeline Tags: Civil Liberties

Vice President Bush, planning to leave for Iraq on a secret errand to persuade Saddam Hussein to escalate his bombing of Iranian targets in order to increase pressure on Iran to release American hostages (see July 28-August 3, 1986), is briefed by two top National Security Council aides, Oliver North and Howard Teicher, before leaving for the Middle East. Teicher will later recall: “We told him what the status was, that [US] arms had gone to Iran. We were preparing him for a possible briefing by either [Shimon Peres, the prime minister of Israel] or [Amiram] Nir [Peres’s counterterrorism adviser]. We didn’t want him to discuss it with anyone else, for security reasons. He asked us some questions, but he didn’t express any opinions.” While Bush will repeatedly deny ever discussing the Iranian arms sales with William Casey (see July 23, 1986), a former CIA official will say in 1992 that Casey did brief Bush extensively about the program. “Casey felt Bush had a methodical, orderly manner for the task,” the official will say. “[Casey] had great confidence in him to carry it out. He said he briefed Bush in great detail about the initiative to bomb Iran.” [New Yorker, 11/2/1992]

Entity Tags: Howard Teicher, Amiram Nir, George Herbert Walker Bush, Shimon Peres, Oliver North, William Casey, Saddam Hussein

Timeline Tags: Iran-Contra Affair

Faced with revelations of his possible involvement in the Iran-US arms-for-hostage deals (see November 3, 1986), Vice President George Bush, who has been heavily involved in the deals both with Iran and with its enemy Iraq (see July 23, 1986), denies knowing anything about anything. He tells the press that he knew nothing about any administration officials objecting to selling arms to Iran: “If I had sat there, and heard George Shultz and Cap [Caspar Weinberger] express it strongly, maybe I would have had a stronger view. But when you don’t know something it’s hard to react…. We were not in the loop.” Weinberger, the Secretary of Defense, telephones Shultz, the Secretary of State, and snaps, “He was on the other side [supporting the arms deals with Iran]. It’s on the record! Why did he say that?” Former National Security Council aide Howard Teicher, who was deeply involved in the arms-for-hostage deals with Iran, will say in 1992, “Bush definitely knew almost everything about the Iranian arms-sales initiative. I personally briefed him in great detail many times. Like so many others, he got premature Alzheimer’s after the arms sales became public.” [New Yorker, 11/2/1992]

Entity Tags: Caspar Weinberger, Howard Teicher, George Shultz, George Herbert Walker Bush

Timeline Tags: US confrontation with Iran, Iran-Contra Affair

Dan Rather interviews Vice President Bush, watching him on a monitor. Neither Rather nor the CBS viewers can see Bush’s consultant Roger Ailes off-camera.Dan Rather interviews Vice President Bush, watching him on a monitor. Neither Rather nor the CBS viewers can see Bush’s consultant Roger Ailes off-camera. [Source: Media Research Center]Roger Ailes, a former media consultant to the Nixon administration (see Summer 1970), comes up with a bold plan to help his new client, Vice President George H.W. Bush, who is running for president. Bush is neck-deep in the Iran-Contra scandal (see Before July 28, 1986, August 6, 1987, and December 25, 1992) and, as reporter Tim Dickinson will later write, comes across as “effete” in comparison to his predecessor Ronald Reagan. Ailes decides to use an interview with combative CBS News reporter Dan Rather to bolster his client’s image. Ailes insists that the interview be done live, instead of in the usual format of being recorded and then edited for broadcast. Dickinson will later write, “That not only gave the confrontation the air of a prizefight—it enabled Ailes himself to sit just off-camera in Bush’s office, prompting his candidate with cue cards.” Rather is in the CBS studio in New York and has no idea Ailes is coaching Bush. As planned, Bush begins the interview aggressively, falsely accusing Rather of misleading him by focusing the interview on Iran-Contra. (It is true that CBS had not informed the Bush team that it would air a report on the Iran-Contra investigation as a lead-in to the Bush interview, a scheduling that some in the Bush team see as a “bait-and-switch.”) When Rather begins to press Bush, Ailes flashes a cue card: “walked off the air.” This is a set piece that Bush and Ailes have worked out beforehand, based on an embarrassing incident in Rather’s recent past, when Rather angrily walked off the CBS set after learning that his newscast had been pre-empted by a women’s tennis match. Clenching his fist, Ailes mouths at Bush: “Go! Go! Just kick his ass!” Bush fires his rejoinder: “It’s not fair to judge my whole career by a rehash on Iran. How would you like it if I judged your career by those seven minutes when you walked off the set?” In their 1989 book The Acting President: Ronald Reagan and the Supporting Players Who Helped Him Create the Illusion That Held America Spellbound, CBS host Bob Schieffer and co-author Gary Paul Gates will write: “What people in the bureau and viewers at home could not see was that the response had not been entirely spontaneous. As the interview progressed, the crafty Ailes had stationed himself beside the camera. If Bush seemed to be struggling for a response, Ailes would write out a key word in huge letters on his yellow legal pad and hold it just beneath the camera in Bush’s line of vision. Just before Bush had shouted that it was not fair to judge his career on Iran, Ailes had written out on his legal pad the words.… Three times during the interview, Bush’s answer had come after Ailes had prompted him with key words or phrases scribbled on the legal pad.” Dickinson will later write: “It was the mother of all false equivalencies: the fleeting petulance of a news anchor pitted against the high crimes of a sitting vice president. But it worked as TV.” Ailes’s colleague Roger Stone, who worked with Ailes on the 1968 Nixon campaign, will later say of the interview: “That bite of Bush telling Rather off played over and over and over again. It was a perfect example of [Ailes] understanding the news cycle, the dynamics of the situation, and the power of television.” [Associated Press, 7/6/1989; NewsBusters, 1/25/2008; Rolling Stone, 5/25/2011] After the interview is concluded, Bush leaps to his feet and, with the microphone still live, says: “The b_stard didn’t lay a glove on me.… Tell your g_ddamned network that if they want to talk to me to raise their hands at a press conference. No more Mr. Inside stuff after that.” The unexpected aggression from Bush helps solidify his standing with hardline Republicans. The interview gives more “proof” to those same hardliners that the media is hopelessly liberal, “their” candidates cannot expect to be treated fairly, and that the only way for them to “survive” encounters with mainstream media figures is through aggression and intimidation. [Salon, 1/26/2011] Conservative commentator Rich Noyes will write in 2008 that Bush’s jab at Rather exposed the reporter’s “liberal bias,” though he will fail to inform his readers of Ailes’s off-camera coaching. [NewsBusters, 1/25/2008]

Entity Tags: Rich Noyes, CBS News, Bob Schieffer, Dan Rather, George Herbert Walker Bush, Tim Dickinson, Gary Paul Gates, Roger Stone, Roger Ailes, Ronald Reagan

Timeline Tags: Domestic Propaganda, Elections Before 2000

Strom Thurmond.Strom Thurmond. [Source: US Government]Former Lockheed software manager Margaret Newsham, who worked at the Menwith Hill facility of the NSA’s Echelon satellite surveillance operation in 1979, says she heard a real-time phone intercept of conversations involving senator Strom Thurmond (R-SC). She was shocked, she recalls, because she thought only foreign communications were being monitored. Newsham, who was fired from Lockheed after she filed a whistleblower lawsuit alleging fraud and waste, tells the chairman of the House Intelligence Committee, Louis Stokes (D-OH), of the overheard conversations. In July, Capital Hill staffers will leak the story to the Cleveland Plain Dealer. Thurmond says he doesn’t believe Newsham’s story, but his office admits that it has previously received reports that Thurmond had been a target of NSA surveillance. Thurmond will decline to press for an investigation, and the reason for the surveillance has never been revealed. [CBS News, 2/27/2000; Patrick S. Poole, 8/15/2000]

Entity Tags: Strom Thurmond, National Security Agency, House Intelligence Committee, Louis Stokes, Echelon, Cleveland Plain Dealer, Lockheed Martin Corporation, Margaret Newsham

Timeline Tags: Civil Liberties

The Bush presidential re-election campaign, trailing Democratic challenger Michael Dukakis, the governor of Massachusetts, in the polls, decides on a “two-track” campaign strategy. The strategy is crafted by campaign manager Lee Atwater. The “high road” track will be taken by President Bush and the campaign directly, attacking Dukakis’s record on law enforcement and challenging his reputation as having led Massachusetts into a period of economic growth (the so-called “Massachusetts Miracle”). The “low road,” designed by Atwater to appeal to the most crude racial stereotypes (see 1981), is to be taken by ostensibly “independent” voter outreach organizations. Because of a loophole in campaign finance rules, the Bush campaign could work closely with “outside groups” and funnel money from “independent” organizations to the outside groups, while denying any connections with those groups were they to run objectionable or negative political ads. Atwater wants to avoid a potential backlash among voters, who may turn against the campaign because of their antipathy towards “attack politics.” Atwater and his colleagues determine that the outside groups will use “brass knuckle” tactics to attack Dukakis, and because the ads come from these “independent” organizations, the Bush campaign can distance itself from the groups and even criticize them for being too negative. In 1999, InsidePolitics.org will write: “In so doing, Bush’s presidential effort would train a generation of campaign operatives how to run a negative campaign. Its ‘two-track’ approach would become a model of how to exploit campaign finance laws and use outside groups to deliver hard-hitting messages on behalf of the candidate. Over the course of the following decade, this strategy would become commonplace in American elections.” The idea of “outsourcing” attack ads had been popularized by the 1980 Reagan presidential campaign, which used what it called “independent expenditures” to finance “outside” attacks on its Democratic opponent, President Jimmy Carter. In 1988, “independent” conservative groups spend $13.7 million on the Bush campaign, most of which goes towards attacks on Dukakis. In comparison, progressive and liberal groups spend $2.8 million on behalf of Dukakis—an almost five-to-one discrepancy. Most of the outside money is spent on television advertising. InsidePolitics will write, “Increasingly, candidates were discovering, electoral agendas and voter impressions could be dominated through a clever combination of attack ads and favorable news coverage.” [Inside Politics (.org), 1999] The result of Atwater’s “two-track” strategy is the “Willie Horton” ad, which will become infamous both for its bluntly racist appeal and its effectiveness (see September 21 - October 4, 1988). An earlier “independent” ad attacking Dukakis’s environmental record provides something of a template for the Horton ad campaign. The so-called “Boston Harbor” ad, which depicted garbage floating in the body of water, challenged Dukakis’s positive reputation as a pro-environmental candndate. The ad helped bring Dukakis’s “positives” down, a strong plus for Bush, whose record as an oil-company executive and reputation as a powerful political friend to the oil companies hurts him in comparison with Dukakis. In July 1988, Readers Digest, a magazine known for its quietly conservative slant, publishes a profile of Horton titled “Getting Away With Murder.” The Bush campaign reprints the article and distributes it by the tens of thousands around the country. [Regardie's Magazine, 10/1/1990; Inside Politics (.org), 1999]

Entity Tags: Readers Digest, InsidePolitics (.org), George Herbert Walker Bush, Lee Atwater, National Security Political Action Committee, William (“Willie”) Horton, Michael Dukakis

Timeline Tags: Domestic Propaganda, Elections Before 2000

The image of Willie Horton as shown in the ‘Weekend Pass’ campaign ad.The image of Willie Horton as shown in the ‘Weekend Pass’ campaign ad. [Source: University of Virginia]A political advertisement on behalf of the George H. W. Bush presidential campaign appears, running on televisions around the country between September 21 and October 4, 1988. Called “Weekend Pass,” it depicts convicted murderer William “Willie” Horton, who was granted 10 separate furloughs from prison, and used the time from his last furlough to kidnap and rape a young woman. The advertisement and subsequent media barrage falsely accuses Democratic presidential candidate Michael Dukakis, the governor of Massachusetts, of creating the “furlough program” that led to Horton’s release, and paints Dukakis as “soft on crime.” It will come to be known as one of the most overly racist political advertisements in the history of modern US presidential politics.
Ad Content - The ad begins by comparing the positions of the two candidates on crime. It notes that Bush supports the death penalty for convicted murderers, whereas Dukakis does not. The ad’s voiceover narrator then states, “Dukakis not only opposes the death penalty, he allowed first-degree murderers to have weekend passes from prison,” with the accompanying text “Opposes Death Penalty, Allowed Murderers to Have Weekend Passes” superimposed on a photograph of Dukakis. The narrator then says, “One was Willie Horton, who murdered a boy in a robbery, stabbing him 19 times,” accompanied by a mug shot of Horton. The voiceover continues: “Despite a life sentence, Horton received 10 weekend passes from prison. Horton fled, kidnapped a young couple, stabbing the man and repeatedly raping his girlfriend.” At this point, the ad shows another picture of Horton being arrested while the accompanying text reads, “Kidnapping, Stabbing, Raping.” The ad’s narration concludes: “Weekend prison passes. Dukakis on crime.” The ad is credited to the “National Security Political Action Committee.” [Inside Politics (.org), 1999; Museum of the Moving Image, 2008; University of Virginia, Introduction to American Politics, 11/18/2009]
'Soft on Crime' - The ad is a reflection of the measures the Bush campaign is willing to undertake to defeat the apparently strong Dukakis candidacy. Dukakis is a popular Democratic governor and widely credited with what pundits call the “Massachusetts Miracle,” reversing the downward economic spiral in his state without resorting to hefty tax increases. At the time of the ad, Dukakis enjoys a 17-point lead over Bush in the polls. Bush campaign strategists, led by campaign manager Lee Atwater, have learned from focus groups that conservative Democratic voters, which some call “Reagan Democrats,” are not solid in their support of Dukakis, and are swayed by reports that he vetoed legislation requiring teachers to say the Pledge of Allegiance at the beginning of the school day. They also react negatively when they learn that during Dukakis’s tenure as governor, Horton had been furloughed and subsequently raped a white woman. Atwater and the Bush campaign decide that Dukakis can successfully be attacked as a “liberal” who is “not patriotic” and is “soft on crime.” Atwater, who has a strong record of appealing to racism in key voting groups (see 1981), tells Republican Party officials, “By the time this election is over, Willie Horton will be a household name.” Although Dukakis had vetoed a bill mandating the death penalty for first-degree murder in Massachusetts, he did not institute the furlough program; that was signed into law by Republican governor Francis Sargent in 1972. The ads and the accompanying media blitz successfully avoid telling voters that Sargent, not Dukakis, instituted the furlough program. [Regardie's Magazine, 10/1/1990; Inside Politics (.org), 1999]
Running the Horton Ad - The ad is sponsored by an ostensibly “independent” political organization, the conservative National Security Political Action Committee (NSPAC), headed by former Chairman of the Joint Chief of Staff Thomas Moorer. NSPAC’s daughter organization “Americans for Bush” actually put together the ad, created by marketer Larry McCarthy in close conjunction with Atwater and other Bush campaign aides; Atwater determined months before that the Horton ad should not come directly from the Bush campaign, but from an “independent” group supporting Bush, thus giving the Bush campaign the opportunity to distance itself from the ad, and even criticize it, should voters react negatively towards its message (see June-September 1988). The first version of the ad does not use the menacing mug shot of Horton, which McCarthy later says depicts “every suburban mother’s greatest fear.” McCarthy and Atwater feared that the networks would refuse to run the ad if it appeared controversial. However, the network censors do not object, so McCarthy quickly substitutes a second version of the ad featuring the mug shot. When Democrats and progressive critics of the Bush campaign complain that Bush is running a racist ad, Bush media adviser Roger Ailes says that neither he nor the campaign have any control over what outside groups like “Americans for Bush” put on the airwaves. InsidePolitics will later write, “This gave the Bush camp plausible deniability that helped its candidate avoid public condemnation for racist campaigning.”
Accompanying Newspaper Reports, Bush Campaign Ads - The ad airs for the first time on September 21. On September 22, newspapers around the nation begin publishing articles telling the story of Angie and Clifford Barnes, victimized by Horton while on furlouogh. On October 5, the Bush campaign releases a “sister” television ad, called “Revolving Door.” Scripted by Ailes, the commercial does not mention Horton nor does it show the now-infamous mug shot, but emphasizes the contention that Dukakis is “soft on crime” and has what it calls a “lenient” furlough policy for violent convicts. The central image of the ad is a stream of African-American inmates moving slowly in and out of a revolving gate. The voiceover says that Dukakis had vetoed the death penalty and given furloughs to “first-degree murderers not eligible for parole. While out, many committed other crimes like kidnapping and rape.” At the same time, Clifford Barnes and the sister of the youth murdered by Horton embark on a nationwide speaking tour funded by a pro-Bush independent group known as the Committee for the Presidency. Barnes also appears on a number of television talk shows, including those hosted by Oprah Winfrey and Geraldo Rivera. Barnes and the victim’s sister also appear in two “victim” ads, where Barnes says: “Mike Dukakis and Willie Horton changed our lives forever.… We are worried people don’t know enough about Mike Dukakis.” In 1999, InsidePolitics will write that the media gives the “Revolving Door” ad a “courteous reception,” and focuses more on the two ads’ impact on the election, and the Dukakis campaign’s lack of response, instead of discussing the issues of race and crime as portrayed by the ads. It is not until October 24, less than two weeks before the election, that anyone in the mainstream media airs footage of critics questioning whether the ads are racially inflammatory, but these appearances are few and far between, and are always balanced with appearances by Bush supporters praising the campaign’s media strategy. [Inside Politics (.org), 1999; Inside Politics (.org), 1999; University of Virginia, Introduction to American Politics, 11/18/2009]
Denials - Bush and his vice presidential candidate Dan Quayle will deny that the ads are racist, and will accuse Democrats of trying to use racism to stir up controversy (see October 1988).
Failure to Respond - The Dukakis campaign will make what many political observers later characterize as a major political blunder: it refuses to answer the ads or dispute their content until almost the last days of the campaign, hoping that viewers would instead conclude that the ads are unfair without the Dukakis campaign’s involvement. The ads will be hugely successful in securing the election for Bush (see September-November 1988). [Museum of the Moving Image, 2008]

Entity Tags: Angie Barnes, Clifford Barnes, Committee for the Presidency, Dan Quayle, George Herbert Walker Bush, Americans for Bush, InsidePolitics (.org), Francis Sargent, Michael Dukakis, William (“Willie”) Horton, Lee Atwater, National Security Political Action Committee, Thomas Moorer, Roger Ailes, Larry McCarthy

Timeline Tags: Domestic Propaganda, Elections Before 2000

The “Willie Horton” ad campaign, a pair of ads launched by an “independent” organization on behalf of the Bush re-election campaign and by the Bush campaign itself (see June-September 1988 and September 21 - October 4, 1988), is considered an immediate success by veteran political observers, in spite of what many call its overtly racist appeal. Because the first ad, “Weekend Pass,” was the product of an ostensibly independent organization, the Bush campaign is able to keep a distance between itself and the ad. In the last weeks of the campaign, some polls show that voters blame President Bush and Democrat Michael Dukakis almost equally for the negative tone of the campaign. While the ads only ran a relatively small number of times, news networks run the ads repeatedly, often adding their own analysis while the images of the ads run in the background. According to InsidePolitics, only once does any journalist challenge the “deceptive information from Bush’s crime ads.… By amplifying Bush’s claims, news reporters gave the ads even greater legitimacy than otherwise would have appeared. News accounts quoted election experts who noted that Bush’s tactics were effective and that Dukakis’ failure to respond was disastrous. Because these assessments appeared in the high credibility framework of news broadcasts, they came across as more believable than had they been aired only as paid advertisements.” The “Weekend Pass” and “Revolving Door” ads have a palpable effect on the electorate, energizing voters who cite “law and order” as one of their major concerns for the nation, and driving many of them towards voting for Bush. Less discussed but equally powerful is the racial effect of the ads. Polls show that many white voters feel fearful because of the ads, and feel that Bush, not Dukakis, will make them safer from crime. InsidePolitics notes that the Bush campaign “had picked the perfect racial crime, that of a black felon raping a white woman.” Later research will show that many viewers saw the Horton case as more about race than crime; many subjects exposed to news broadcasts about the Horton case responded in racial terms, with studies finding that the ads “mobilized whites’ racial prejudice, not their worries about crime.” InsidePolitics will write: “Viewers became much more likely to feel negatively about blacks in general after having heard the details of the case. It was an attack strategy that worked well on several different levels for Republicans.” [Inside Politics (.org), 1999; University of Virginia, Introduction to American Politics, 11/18/2009] After the election, a New York Times voter poll will rate the “Revolving Door” ad as the single most influential ad of the campaign. The ad was particularly effective among white women, many of whom said that after watching it during the campaign, they began to view Bush as “stronger on crime” and as the candidate who would keep them “safer.” In 1999, InsidePolitics will write that voters often conflated the two ads, and it is unclear from poll responses whether they differentiated between the independently produced ad and the Bush campaign ad. InsidePolitics also notes the powerful impact of the Horton ad’s clear reference to rape. Dukakis’s campaign manager Susan Estrich will say: “The symbolism was very powerful… you can’t find a stronger metaphor, intended or not, for racial hatred in this country than a black man raping a white woman.… I talked to people afterward.… Women said they couldn’t help it, but it scared the living daylights out of them.” [Inside Politics (.org), 1999]

Entity Tags: Michael Dukakis, William (“Willie”) Horton, George Herbert Walker Bush, Susan Estrich, InsidePolitics (.org)

Timeline Tags: Domestic Propaganda, Elections Before 2000

The “Willie Horton” (a.k.a. “Weekend Pass”) campaign ad, produced by an “independent” political organization on behalf of the Bush re-election campaign (see June-September 1988 and September 21 - October 4, 1988), and the Bush campaign’s accompanying ad, “Revolving Door,” draw accusations from the Democratic challenger, Michael Dukakis, that they are racist in their appeals. President Bush denies the accusations that race has anything to do with the ads, or even that racism exists. He calls the Dukakis accusations “some desperation kind of move,” and says: “There isn’t any racism. It’s absolutely ridiculous.” Dukakis is leveling these accusations, Bush says, because he “is weak on crime and defense and that’s the inescapable truth.” Bush accuses Dukakis of lying about his record, and accuses the Democrat of both racist and sexist behavior, though he gives no details or evidence. Bush’s vice-presidential candidate, Dan Quayle, agrees, and accuses the Dukakis campaign of behaving in a racist manner, saying: “It’s totally absurd and ridiculous. I think it shows just how desperate they really are, to start fanning the flames of racism in this country.” Civil rights leader Jesse Jackson has accused the Bush campaign of trying to incite racial fears through the Horton ad, and Dukakis’s vice-presidential candidate, Lloyd Bentsen, says there seems to be “a racial element” in the Bush campaign’s strategy. In contrast to Bush’s denials, Bush media adviser Roger Ailes jokes with reporters about the ads, saying that the campaign’s only question about the Horton ad was whether to portray Horton “with a knife in his hand or without it,” and accuses Dukakis’s campaign of spreading racism about Hispanics in its own ads. Bush states that he is “fully behind” both the “Weekend Pass” and “Revolving Door” ads. [New York Times, 10/25/1988]

Entity Tags: Lloyd Bentsen, Dan Quayle, George Herbert Walker Bush, Jesse Jackson, William (“Willie”) Horton, Michael Dukakis, Roger Ailes

Timeline Tags: Domestic Propaganda, Elections Before 2000

Two Democratic organizations in Ohio file a complaint with the Federal Election Commission (FEC) in the matter of the now-infamous “Willie Horton” ads used to great effect by the Bush re-election campaign (see June-September 1988 and September 21 - October 4, 1988). The complaint alleges that the ostensibly independent political organization that created and financed the first ad, the National Security Political Action Committee (NSPAC), violated the law on independent expenditures (see May 1990 and After). The complaint uncovers numerous connections between NSPAC and the Bush campaign. However, the FEC refuses to charge the Bush campaign with campaign finance violations. [Inside Politics (.org), 1999]

Entity Tags: National Security Political Action Committee, Federal Election Commission, George Herbert Walker Bush

Timeline Tags: Civil Liberties, Domestic Propaganda, Elections Before 2000

African-American writer Anthony Walton writes for the New York Times Magazine his thoughts on the overtly racist “Willie Horton” ad campaign launched the year before by the Bush re-election campaign (see June-September 1988 and September 21 - October 4, 1988). Walton writes: “George Bush and his henchmen could not have invented Willie Horton. Horton, with his coal-black skin; huge, unkempt Afro, and a glare that would have given Bull Connor or Lester Maddox [infamous white supremacists who abused African-Americans in the 1950s and ‘60s] serious pause, had committed a brutal murder in 1974 and been sentenced to life in prison. Then, granted a weekend furlough from prison, had viciously raped a white woman in front of her fiance, who was also attacked. Willie Horton was the perfect symbol of what happened to innocent whites when liberals (read Democrats) were on the watch, at least in the gospel according to post-Goldwater Republicans. Horton himself, in just a fuzzy mug shot, gave even the stoutest, most open, liberal heart a shiver. Even me. I thought of all the late nights I had ridden in terror on the F and A trains, while living in New York City. I thought Willie Horton must be what the wolf packs I had often heard about, but never seen, must look like. I said to myself, ‘Something has got to be done about these n_ggers.’” Walton recounts several instances where he himself has been the victim of racism, and notes that in many eyes, he and Horton are interchangeable: “If Willie Horton would become just a little middle-class, he would look like me.… [I]n retrospect, I can see that racism has always been with me, even when I was shielded by love or money, or when I chose not to see it. But I saw it in the face of Willie Horton, and I can’t ignore it, because it is my face.” [New York Times Magazine, 8/20/1989]

Entity Tags: William (“Willie”) Horton, Anthony Walton

Timeline Tags: Domestic Propaganda

A lawsuit against the FBI’s investigation of a sixth-grade boy and his school project to create an “encyclopedia of the world” is stopped when an appeals court rules that the agency is shielded by the “state secrets” privilege (see March 9, 1953). Unable to secure information from the FBI as to why it investigated him, the child had therefore “failed to sustain his burden of proof [and] the cause of action was properly dismissed.” [Siegel, 2008, pp. 197]

Entity Tags: Federal Bureau of Investigation

Timeline Tags: Civil Liberties

The Ohio Democratic party and a group called Black Elected Democrats of Ohio file a complaint with the Federal Election Commission (FEC) over the infamous “Willie Horton” campaign ad of 1988 (see September 21 - October 4, 1988), claiming that the “outside” organization that released the ad, the National Security Political Action Committee (NSPAC), violated the law on independent expenditures, and that NSPAC functioned as an arm of the 1988 Bush presidential campaign. According to the complaint, it was legal for NSPAC to expend funds criticizing Democratic presidential candidate Michael Dukakis and supporting President Bush’s election only if the expenditures were independent and uncoordinated between the two organizations. Any spending that was made “in cooperation, consultation, or concert, with, or at the request or suggestion of, a candidate, his authorized political committees, or their agents,” represented an illegal “in-kind contribution” in excess of federal contribution limits. The FEC conducts an investigation into the relationship between NSPAC and the Bush campaign. The investigation uncovers several ties between the two organizations. For example, Larry McCarthy, the NSPAC media consultant who, as a top marketing expert for the NSPAC’s “Americans for Bush” organization, created the Horton ad, worked for top Bush campaign adviser Roger Ailes; McCarthy was a former senior vice president of Ailes Communications, Inc. (ACI), which functioned as the main media consulting firm for the Bush campaign. McCarthy tells investigators he worked at ACI until January 1987, but continued to work with ACI on “a contractual basis” until December 1987, when he began working as Senator Robert Dole (R-KS)‘s media consultant. McCarthy admits to having a number of contacts with Ailes during the Bush-Dukakis campaign, but says some of them were “of a passing social nature,” such as “running into one another in restaurants or at airports.” He denies discussing “anything relative to the Bush presidential campaign, NSPAC, or political matters.” McCarthy’s story is contradicted by Ailes, who tells the FEC that he had talked to McCarthy twice about opportunities to work for the Bush campaign, opportunities Ailes says McCarthy lost by working for NSPAC. The FEC also discovers that another former ACI employee, Jesse Raiford of Raiford Communications, worked on the Horton ad, and while doing so “simultaneously received compensation from NSPAC and the Bush campaign.” Raiford also “expended NSPAC funds for the production of the Willie Horton ad.” Though there is clear evidence of illegal connections and complicity between the Bush campaign and NSPAC, the FEC’s Board of Commissioners deadlock 3-3 on voting whether to bring formal charges against the two organizations. The swing vote, commissioner Thomas Josefiak, says the explanations from Ailes and McCarthy about their lack of substantive contacts during the campaign “were plausible and reasonably consistent.” Josefiak says both were guilty of “bad judgment” and may have acted “foolish[ly],” but did nothing warranting legal action. The FEC also determines that Raiford only “performed technical tasks” for the two organizations, “and played no role in any substantive or strategic decisions made by either organization.” The commissioners conclude that neither organization violated campaign finance law. [Inside Politics (.org), 1999]

Entity Tags: National Security Political Action Committee, Roger Ailes, Raiford Communications, Thomas Josefiak, Michael Dukakis, Jesse Raiford, Ailes Communications, Americans for Bush, Larry McCarthy, George Herbert Walker Bush, Black Elected Democrats of Ohio, Federal Election Commission, Democratic Party of Ohio

Timeline Tags: Civil Liberties, Domestic Propaganda, Elections Before 2000

A Web graphic opposing the ‘New World Order.’A Web graphic opposing the ‘New World Order.’ [Source: Human Symbiose (.org)]In a speech discussing the post-Cold War world, President Bush outlines his vision of a “New World Order.” Bush says: “We stand today at a unique and extraordinary moment. The crisis in the Persian Gulf, as grave as it is, also offers a rare opportunity to move toward an historic period of cooperation. Out of these troubled times, our fifth objective—a new world order—can emerge: a new era—freer from the threat of terror, stronger in the pursuit of justice, and more secure in the quest for peace.” The Southern Poverty Law Center will later write that many people, particularly white supremacists and separatists, take Bush’s phrase “as a slip of the tongue revealing secret plans to create a one-world government.” [Sweet Liberty, 9/11/1990; Southern Poverty Law Center, 6/2001] In 1995, Michigan gun dealer and right-wing activist Frank Kieltyka will describe the “New World Order” to a Buffalo News reporter. According to Kieltyka, the “New World Order” is backed by the US government and led by, among other organizations, the Trilateral Commission and the Council on Foreign Relations (CFR). “We’re moving towards the Communists,” Kieltyka will warn. The belief in this “New World Order” will be emphasized in coming years in the militia movements and by right-wing publications such as The Spotlight, an openly racist, anti-government newsletter. [Stickney, 1996, pp. 157-158]

Entity Tags: Trilateral Commission, George Herbert Walker Bush, Frank Kieltyka, Council on Foreign Relations, Southern Poverty Law Center, The Spotlight

Timeline Tags: US Domestic Terrorism

GOPAC logo.GOPAC logo. [Source: Mullings (.com)]A New York Times editorial derides a recent effort by a conservative political action committee to label political opponents with slanderous epithets. According to the editorial, GOPAC, the GOP Political Action Committee chaired by Representative Newt Gingrich (R-GA), has issued a glossary mailed to Republican state legislative candidates urging them to use the following words to characterize their Democratic opponents: “sick,” “traitors,” “bizarre,” “self-serving,” “shallow,” “corrupt,” “pathetic,” and “shame.” GOPAC later “regretted” including the word “traitors” in that list of characterizations, the editorial reports, but has continued to back the use of the other epithets. The glossary is part of a pamphlet entitled “Language: A Key Mechanism of Control,” and features a letter from Gingrich advising the candidates to step up the personal invective against their opponents because, he writes, vilification works. The Times writes: “Mr. Gingrich’s injunction represents the worst of American political discourse, which reached a low during the dispiriting presidential campaign of 1988 (see September 21 - October 4, 1988). Then, more than ever before, negative argument displaced reasoned discussion about how a nation might best be governed. The sound bite reigned. Attack commercials flourished. The signs this year aren’t any better. Evidence that negative campaigning can come back to sink the sender has had little impact. The races for governor in California and Texas have already seen the same slash and burn. No doubt the proceedings will grow more rabid still as November nears. Negative discourse serves democracy poorly. The temptation to avoid serious debate is already great. It increases as the stakes soar and slander becomes a rewarding, easy option. The issues of the day go untended. The whole affair takes on the character of the gladiator’s art. The GOPAC glossary may herald a descent into even lower levels of discourse. It comes blessed by a politician of some influence—the Republican whip in the House—and it is intended for candidates on the state level, many of them presumably running for the first time. Even though Mr. Gingrich himself may not have seen the list before it was mailed, this is a disturbing document. The nakedness of the GOPAC offering also makes it useful. There must be limits to the negative politics that voters will bear; the bald appeal to invective will certainly probe those limits. For now, it should be said that some adjectives in the glossary aptly describe the glossary itself: shallow, sensationalist, and, yes, shame(ful).” [New York Times, 9/20/1990; Propaganda Critic, 9/29/2002; Propaganda Critic, 9/29/2002] Later in the year, the pamphlet will win the Doublespeak Award from the National Conference of Teachers of English. [Propaganda Critic, 9/29/2002] Gingrich and GOPAC will expand upon the original pamphlet in 1995, after Gingrich becomes speaker of the House (see 1995).

Entity Tags: National Conference of Teachers of English, New York Times, Newt Gingrich, GOP Political Action Committee

Timeline Tags: Domestic Propaganda, Elections Before 2000

A US appellate court refuses to find a number of military contractors liable in the death of Earl Patton Ryals, who died with 36 of his fellow crewmen in the Iraqi attack on the USS Stark (see May 17, 1987 and After). Ryals’s estate claims that he and his fellows died in part because of negligence on the part of the contractors who designed, manufactured, tested, and marketed the weapons system on board the Stark, including the Phalanx anti-missile system. In turning down the estate’s claim, the court cites the government’s “state secrets” privilege (see March 9, 1953), saying that the facts of the issue could not be resolved without examining classified Navy documents. And even without this reason, the court rules, Ryals’s estate cannot see the documents because the case presents “a political question” about military decision-making that is not subject to judicial review. [Zuckerbraun v. General Dynamics Corp., 6/13/1991; Siegel, 2008, pp. 197-198] A year later, a similar case will be dismissed on the grounds that a trial might conceivably reveal “state secrets” (see September 16, 1992).

Entity Tags: Earl Patton Ryals, US Department of the Navy

Timeline Tags: Civil Liberties

White supremacist Timothy McVeigh (see March 24, 1988 - Late 1990 and November 1991 - Summer 1992) closely follows the culminating events of the Ruby Ridge, Idaho, siege (see August 31, 1992). McVeigh is appalled by the government’s conduct, as is his friend Terry Nichols, with whom he is staying (see Summer 1992). [Douglas O. Linder, 2001; CNN, 12/17/2007] McVeigh has been closely following the events at Ruby Ridge since the siege began in April 1992, both in local newspapers and in publications such as the National Rifle Association’s American Hunter and the racist, separatist Spotlight, and will complain that the mainstream media gives only the government’s version of events. He will later recall this as a “defining moment” in his life. [Stickney, 1996, pp. 147-148; PBS Frontline, 1/22/1996] McVeigh will go on to bomb a federal building in Oklahoma City (see 8:35 a.m. - 9:02 a.m. April 19, 1995).

Entity Tags: National Rifle Association, Terry Lynn Nichols, Timothy James McVeigh

Timeline Tags: US Domestic Terrorism

White supremacist Randy Weaver surrenders after an 11-day standoff with federal authorities at his cabin on Ruby Ridge, Idaho. The standoff cost the lives of Weaver’s wife and son, and a US marshal. The incident, according to the Southern Poverty Law Center, will “galvanize… many on the radical right.” [Southern Poverty Law Center, 6/2001]

Entity Tags: Randy Weaver, Southern Poverty Law Center

Timeline Tags: US Domestic Terrorism

A federal appeals court upholds the dismissal of a lawsuit filed on behalf of 23 Navy sailors killed in the attack on the USS Stark (see May 17, 1987 and After) against a number of defense contractors. A similar lawsuit on behalf of one of the sailors killed in the attack was dismissed a year before (see June 13, 1991). This time the plaintiffs file over 2,500 pages of unclassified documentary evidence supporting their claims that the contractors were negligent in their design and implementation of the weapons systems aboard the Stark. The appeals court finds that regardless of the amount of evidence entered, to allow the trial would be to potentially infringe on the US government’s “state secrets” privilege (see March 9, 1953). “[N]o amount of effort could safeguard the privileged information,” the court rules. The court adds that “classified and unclassified information cannot always be separated, and therefore courts must restrict access not only to classified material, but to “those pieces of evidence” that “press so closely upon highly sensitive material that they create a hgh risk of inadvertent or indirect disclosures.” [Siegel, 2008, pp. 198]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

Radio personality Rush Limbaugh hosts his own late-night television show; Roger Ailes, the Republican campaign consultant (see 1968, January 25, 1988, and September 21 - October 4, 1988), is his executive producer. On this show, Limbaugh gives his response to African-American filmmaker Spike Lee’s recommendation that African-American children be allowed to skip school to watch his biographical docudrama Malcolm X: “Spike, if you’re going to do that, let’s complete the education experience. You should tell them that they should loot the theater and then blow it up on their way out.” [Media Matters, 10/27/2009] Ailes will go on to found Fox News (see October 7, 1996).

Entity Tags: Shelton Jackson (“Spike”) Lee, Fox News, Rush Limbaugh, Roger Ailes

Timeline Tags: Domestic Propaganda

The outgoing President Bush pardons six former Reagan officials for any crimes they may have committed as part of their involvement in the Iran-Contra affair. One of the six, former Defense Secretary Caspar Weinberger, was slated to go on trial in January 1993 on charges that he lied to Congress about his knowledge of arms sales to Iran and funding from other countries for the Nicaraguan Contras (see July 24, 1992). Weinberger’s case was expected to reveal details of then-Vice President Bush’s involvement in the affair. Bush has refused to turn over a 1986 campaign diary he kept that may contain evidence of his involvement. Special prosecutor Lawrence Walsh says of the pardons, “[T]he Iran-Contra cover-up, which has continued for more than six years, has now been completed.” The pardons “undermine… the principle that no man is above the law. It demonstrates that powerful people with powerful allies can commit serious crimes in high office—deliberately abusing the public trust without consequence.” Walsh says that he believes Bush may have pardoned Weinberger to conceal his own complicity and possibly criminal actions in Iran-Contra. Bush also pardons former National Security Adviser Robert McFarlane and former Assistant Secretary of State Elliott Abrams, both of whom have already pled guilty to misdemeanor charges of withholding information from Congress. Bush also pardons Clair George, the former head of the CIA’s clandestine services, convicted earlier in December of two felony charges of perjury and misleading Congress. Finally, he pardons two other CIA officials, Duane Clarridge, who is awaiting trial, and Alan Fiers, who pled guilty to withholding information from Congress, and who testified against George. For his part, Bush says he is merely trying to “put bitterness behind us” in pardoning the six, many of whom he said have already paid a heavy price for their involvement. Senator George Mitchell (D-ME) is sharply critical of the pardons, saying, “If members of the executive branch lie to the Congress, obstruct justice and otherwise break the law, how can policy differences be fairly and legally resolved in a democracy?” [New York Times, 12/25/1992]

Entity Tags: Robert C. McFarlane, Caspar Weinberger, Alan Fiers, Clair George, Lawrence E. Walsh, Contras, George Herbert Walker Bush, Duane Clarridge, Elliott Abrams, George Mitchell

Timeline Tags: Iran-Contra Affair

Radio personality Rush Limbaugh hosts his own late-night television show; Roger Ailes, the Republican campaign consultant (see 1968, January 25, 1988, and September 21 - October 4, 1988), is Limbaugh’s executive producer. On this show, Limbaugh notes a recent comment of Senator Strom Thurmond (R-SC), who told a gay solder that his lifestyle was “not normal” and advised the soldier to get psychiatric help. Thurmond, who ran for president in 1948 on an explicitly racist, segregationist third-party platform and who led the “Dixiecrat” exodus of Southern racists out of the Democratic Party (see March 12, 1956 and After), is praised by Limbaugh. The commentator says of Thurmond: “He is not encumbered by trying to be politically correct. He’s not encumbered by all of the—the so-called new niceties and proprieties. He just says it, and if you want to know what America used to be—and a lot of people wish it still were—then you listen to Strom Thurmond.… He got a standing ovation. Now people—people applauded that. People applaud—because—you know, Strom Thurmond can say it because he’s 90 years old and people say: ‘Ah, he’s just an old coot. He’s from the old days,’ and so forth. But that’s what most people think. They just don’t have the guts to say it. That’s why they applaud when somebody does say it that directly and that simply.” [Media Matters, 10/27/2009] Ailes will go on to found Fox News (see October 7, 1996).

Entity Tags: Roger Ailes, Fox News, Strom Thurmond, Rush Limbaugh

Timeline Tags: Domestic Propaganda

A National Security Agency (NSA) linguist runs afoul of his superiors after he and other linguists submit a report concluding that Islamist terrorists are planning attacks on America. The analyst, who insists on remaining anonymous and is nicknamed “J” by press reports, is fluent in an unusual number of languages. His and his colleagues’ study of Arabic language messages, and the flow of money to terrorist organizations from Saudi Arabia, lead them to believe that Saudi extremists are plotting an attack. J will recall in January 2006: “You could see, this was the pure rhetoric of Osama bin Laden and his group, the exact same group, and we had an early indication.… All of us in the group had this view of a burgeoning threat, and suddenly we were all trotted off to the office of security. Then came the call to report for a battery of psychological tests.” J will issue further warnings of potential terrorist strikes, this time involving hijackers, passenger planes, and US buildings, in May 2001 (see May 2001). In 2006, other current and former NSA officials will claim that the NSA routinely uses unfavorable psychological evaluations to retaliate against whistleblowers and those employees who come into conflict with superiors (see January 25-26, 2006). [Cybercast News Service, 1/25/2006]

Entity Tags: “J”, National Security Agency

Timeline Tags: Complete 911 Timeline

April 1994: Michigan Militia Forms

Michigan Militia logo.Michigan Militia logo. [Source: Michigan Militia]The Michigan Militia is formed by gun shop owner Norm Olson and his friend Ray Southwell. The Michigan Militia will grow to be the nation’s largest militia group, with up to 6,000 members. [Southern Poverty Law Center, 6/2001]

Entity Tags: Norman (“Norm”) Olson, Ray Southwell, Michigan Militia

Timeline Tags: US Domestic Terrorism

House Speaker Newt Gingrich (R-GA) expands on his 1990 pamphlet advising Republican candidates for office to characterize their opponents as “sick” “traitors” (see September 20, 1990). His political action committee, GOPAC, in a package given to freshmen House and Senate Republicans, includes a video, “We Are a Majority,” and an accompanying memo written by Gingrich that avows the committee is working to fulfill the requests of candidates across the country, who, according to the memo, have flooded its offices with “plaintive plea[s]” of “I wish I could speak like Newt.” The memo responds: “That takes years of practice. But, we believe that you could have a significant impact on your campaign and the way you communicate if we help a little. That is why we have created this list of words and phrases.” The memo advises candidates to “[r]ead them. Memorize as many as possible. And remember that like any tool, these words will not help if they are not used.” The list is divided into two parts: “Optimistic positive governing words and phrases to help describe your vision for the future of your community” and “Contrasting words to help you clearly define the policies and record of your opponent and the Democratic Party.” [Fairness and Accuracy in Reporting, 2/1995; Information Clearinghouse, 1996] Communications professor Margaret Zulick will later call the package “a rudimentary rhetorical handbook, providing inexperienced political speakers with a lexicon of terms that drive a wedge of distinctions between themselves and members of the opposing party. At the same time it educates them in a common language that will give evidence of their solidarity with the speaker of the House and his goals for the Republican majority.” [Zulick, 2010]
"Optimistic Positive Governing Words - The memo states: “Use the list below to help define your campaign and your vision of public service. These words can help give extra power to your message. In addition, these words help develop the positive side of the contrast you should create with your opponent, giving your community something to vote for!” The words include: activist; building; candid(ly); care(ing); challenge; change; children; choice/choose; citizen; commitment; common sense; compete; confident; conflict; control; courage; crusade; debate; dream; duty; eliminate good time in prison; empower(ment); fair; family; freedom; hard work; help; humane; incentive; initiative; lead; learn; legacy; liberty; light; listen; mobilize; moral; movement; opportunity; passionate; peace; pioneer; precious; premise; preserve; principle(d); pristine; pro- (issue): flag, children, environment, reform; prosperity; protect; proud/pride; provide; reform; rights; share; strength; success; tough; truth; unique; vision; and we/us/our.
Contrasting Words - The memo states: “Often we search hard for words to define our opponents. Sometimes we are hesitant to use contrast. Remember that creating a difference helps you. These are powerful words that can create a clear and easily understood contrast. Apply these to the opponent, their record, proposals, and their party.” The words include: abuse of power; anti- (issue); flag, family, child, jobs; betray; bizarre; bosses; bureaucracy; cheat; coercion; “compassion” is not enough; collapse(ing); consequences; corrupt; corruption; criminal rights; crisis; cynicism; decay; deeper; destroy; destructive; devour; disgrace; endanger; excuses; failure (fail); greed; hypocrisy; ideological; impose; incompetent; insecure; insensitive; intolerant; liberal; lie; limit(s); machine; mandate(s); obsolete; pathetic; patronage; permissive; attitude; pessimistic; punish; (poor…); radical; red tape; self-serving; selfish; sensationalists; shallow; shame; sick; spend(ing); stagnation; status quo; steal; taxes; they/them; threaten; traitors; unionized; urgent(cy); waste; welfare. [Fairness and Accuracy in Reporting, 2/1995; Information Clearinghouse, 1996]

Entity Tags: GOP Political Action Committee, Newt Gingrich, Margaret Zulick

Timeline Tags: Domestic Propaganda

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Timeline Tags: Civil Liberties

Helen Chenoweth in a 1995 photo.Helen Chenoweth in a 1995 photo. [Source: Joe Marquette / Associated Press]Representative Helen Chenoweth (R-ID), in her first two months as a member of the US House of Representatives, accuses the federal government of sending “black helicopters” filled with “armed agency officials” to terrorize Idaho citizens. Chenoweth, who has extensive contacts among area militias and will be characterized as the militia’s “best friend” in Congress (see May 2, 1995), is repeating a canard often used by far-right extremists who believe the UN and the federal government will use “black helicopters” filled with foreign troops to impose tyranny on US citizens. In a press release, Chenoweth says the federal government is violating the Idaho Constitution by using “armed agency officials and helicopters” to enforce the Endangered Species Act and other fish and wildlife regulations. The language of the press release implies that if a federal agent is armed and in Idaho, it is a violation of the Idaho Constitution. Chenoweth orders the government to immediately cease its alleged actions, and in the release, threatens Assistant Agriculture Secretary Jim Lyons by saying, “If it does not, I guarantee you I will be your worst nightmare for at least the next two years.” Chenoweth later tells a reporter, who asks about the black helicopters: “I have never seen them. But enough people in my district have become concerned that I can’t just ignore it. We do have some proof.” Brian Gorman, a spokesman for the National Marine Fisheries Service, says, “All I can say is, we have never had helicopters, have not flown them as part of any endangered-species activity, and we’ve always worked hand in glove with local officials.” [New York Times, 5/2/1995; Sierra Magazine, 5/1996]

Entity Tags: Endangered Species Act, Brian Gorman, Clinton administration, National Marine Fisheries Service, Helen P. Chenoweth, James (“Jim”) Lyons

Timeline Tags: US Domestic Terrorism

Oklahoma Highway Patrolman Charles Hanger.Oklahoma Highway Patrolman Charles Hanger. [Source: The Oklahoman]Timothy McVeigh, who has just detonated a massive fertilizer bomb that has devasted the Murrah Federal Building in Oklahoma City (see 8:35 a.m. - 9:02 a.m. April 19, 1995), gets into his Mercury Marquis getaway car (see April 13, 1995) and flees north out of the city (see 9:02 a.m. and After, April 19, 1995). At 10:17 a.m., while driving north on I-35 outside of Billings, Oklahoma, about 60 miles north of Oklahoma City, McVeigh is stopped for having no license plates on his vehicle by Oklahoma Highway Patrolman Charles Hanger, a trooper nicknamed “The Hangman” for his zeal in pursuing violators. According to later testimony, there is a radio blackout in force because of the bombing, allowing police to keep the airwaves clear. Hanger had been ordered to go to Oklahoma City, but then had those orders countermanded and was told to resume his duties.
Roadside Stop - Hanger stops McVeigh’s car and calls his office on a cellphone to check the car, but forgets to activate his dashboard camera, so no video record of the arrest is made. Hanger later says he was apprehensive because another trooper had been shot on the same highway two weeks earlier. McVeigh, cooperating with Hanger’s directions, exits the vehicle and begins walking towards Hanger, hands empty. “I stopped you because you weren’t displaying a tag,” Hanger says. McVeigh looks at the rear of his car, clearly unaware that he lacks a license plate. He says he has not had the car long and that is why he lacks a plate. Hanger asks to see a bill of sale, and McVeigh tells him the paperwork is still being drawn up. Hanger does not believe this statement, and asks to see McVeigh’s driver’s license. McVeigh reaches into his back pocket and takes out a camouflage-colored billfold. As he does so, Hanger notices a bulge under McVeigh’s windbreaker. Hanger asks McVeigh to pull open his windbreaker. McVeigh says calmly, “I have a gun.” Hanger orders, “Get your hands up and turn around.” McVeigh complies. Hanger puts the muzzle of his gun to the back of McVeigh’s head. He orders McVeigh to walk to the back of his car. “My weapon is loaded,” McVeigh says. “So is mine,” Hanger replies. He then tells McVeigh to place his hands flat on the trunk of the Mercury and spread his legs. McVeigh complies. Hanger removes the pistol from McVeigh’s shoulder holster and tosses it onto the shoulder of the road, well out of McVeigh’s reach. McVeigh tells Hanger he has another ammunition clip on his belt, and Hanger removes this as well. “I also have a knife,” McVeigh says. Hanger removes the blade from a brown leather sheath and throws it to the roadway. “Why the loaded firearm?” Hanger asks. “I have a right to carry it for protection,” McVeigh replies. Hanger handcuffs McVeigh, walks him to his squad car, and puts him in the front passenger seat, belting him in. He then goes back to pick up the gun, the ammunition clip, and the knife. McVeigh, at Hanger’s request, recites the serial number of the Glock. Hanger comments, “Most wouldn’t know the serial number on their weapon,” and McVeigh replies, “I do.”
Arrest and Booking - The dispatcher reports over the radio that Timothy James McVeigh has no outstanding warrants, and there is nothing in the system on the Mercury or on McVeigh’s pistol. Hanger arrests McVeigh for having no vehicle registration, no license plates, and carrying a concealed weapon—a loaded 9mm Glock semiautomatic pistol (see August 16, 1991). According to prosecutors and Hanger’s own recollections, McVeigh is very polite and cooperative with Hanger, answering questions, “yes sir,” and “no sir,” and saying he has served in the military and as a security guard. “No, sir, I did not intend to break your laws,” he tells Hanger. “I just carry the gun for protection.” Hanger later says he interviews McVeigh in the car, but will say: “I didn’t take any notes. It was just friendly chit-chat.” McVeigh tells Hanger that he just bought the car from a Firestone dealership in Junction City. Hanger has his dispatcher call for information on the car. Hanger searches the Mercury, finding nothing of immediate interest, but when he walks back to his car, he notices McVeigh fidgeting in his seat (see April 21, 1995). Hanger asks if McVeigh wants his car towed into town (at his own expense) or left on the road; McVeigh tells him to leave it where it is. Hanger locks the car and drives McVeigh to Perry, Oklahoma. During the trip, McVeigh asks Hanger again and again when he can get his gun back. Sometime around 11:00 a.m., McVeigh is booked and lodged in the county jail in the Noble County Courthouse in Perry. He is given prisoner number 95-057, photographed, and fingerprinted. Except for one brief demand to know when he will go to court, courthouse officials remember McVeigh as polite and soft-spoken. Hanger has no idea who he has caught; he takes his wife to lunch before turning in the gun and ammunition he confiscated from McVeigh. [Washington Post, 4/22/1995; New York Times, 4/22/1995; New York Times, 4/22/1995; PBS Frontline, 1/22/1996; New York Times, 4/29/1997; New York Times, 6/3/1997; Serrano, 1998, pp. 176-180; Douglas O. Linder, 2001; Indianapolis Star, 2003; Fox News, 4/13/2005; University of Missouri-Kansas City School of Law, 2006] McVeigh has a permit to carry the gun, but is in violation of the law because he is carrying it concealed, and because he has another weapon, the knife, also on his person. [New York Times, 4/23/1995] Later, Assistant District Attorney Mark Gibson says that Hanger, suspicious by nature anyway, had trouble with McVeigh’s story. “Particularly with his story that he was always on the road, he just didn’t believe,” Gibson will say. “And when he grabbed his gun and there was no reaction, no shock, that didn’t seem right, either. Neither did his story. Charlie said, ‘If you were in the military, when were you a security guard?’ and he said when he was on vacation. So things didn’t really jibe.” [New York Times, 4/23/1995] McVeigh’s gun is later found to be loaded with at least one Black Talon “cop-killer” bullet capable of penetrating body armor. [New York Times, 4/22/1995; New York Times, 4/22/1995; Serrano, 1998, pp. 177] Pat Livingston, a pawn shop owner in Ogden, Kansas, will recall selling McVeigh’s friend Terry Nichols two Glock semiautomatic pistols in February 1995. He also recalls selling McVeigh a similar Glock in 1991, and a Tec-9 assault pistol in 1993 (see February - July 1994). Livingston later says he remembers McVeigh well: “I knew that name as soon as I saw it on TV. That guy McVeigh, he wrote me a hot check for the Tec-9 in 1993.” [New York Times, 4/23/1995; PBS Frontline, 1/22/1996] Author Richard A. Serrano will later report that the pistol McVeigh is carrying is a .45-caliber Glock military assault pistol, Model 2.1. [Serrano, 1998, pp. 177] Left in McVeigh’s car are a blue baseball cap and a legal-sized envelope, sealed and stuffed with documents and clippings. Some of the documents include an excerpt from the racially inflammatory novel The Turner Diaries (see 1978), quotes from Revolutionary War figures, and newspaer clippings. [New York Times, 4/29/1997]
False Driver's License Leads to Clues - Though he presents a false driver’s license, in the name of “Robert Kling” (see Mid-March, 1995 and April 15, 1995), McVeigh gives his home address as 3616 Van Dyke Street, Decker, Michigan. The address is the farm of James Nichols, the brother of Terry Nichols (see December 22 or 23, 1988). This information leads federal agents to both the Nichols brothers (see 3:15 p.m. and After, April 21-22, 1995) and later to McVeigh himself as a suspect in the bombing. [Washington Post, 4/22/1995; New York Times, 6/3/1997] McVeigh lists James Nichols as his “next of kin.” [New York Times, 4/23/1995] Some versions of events have McVeigh destroying the Kling driver’s license (see 3:00 - 5:00 p.m. April 17, 1995), giving Hanger his real license, and citing the Decker, Michigan, address as an emergency contact. [Serrano, 1998, pp. 178-180] McVeigh empties his pockets at the jail: the contents include $650, four rounds of ammunition, his billfold, keys, yellow coins, a roll of antacids, and a set of earplugs, which will later be tested for explosive residue. [Stickney, 1996, pp. 191; Serrano, 1998, pp. 181]
Oddities - Later, the FBI speculates that the Arizona license plate, bearing the number LZC646, the Mercury once bore fell off sometime between the time McVeigh bought the car and the time Hanger pulled him over. It is also possible, the FBI will say, that McVeigh or his accomplice moved the license plate to another car after the bombing (see April 29, 1995). The license plate was originally registered on February 1, 1995 to a 1983 Pontiac station wagon owned by McVeigh (see January 1 - January 8, 1995), who then gave a mail drop in Kingman, Arizona (see February - July 1994), as his address. Press reports later claim that McVeigh traded the Pontiac and $250 in cash for the Mercury, and put the Pontiac’s license plate on the Mercury (a later press report states that McVeigh may have forgotten to transfer the Pontiac’s license plate to the Mercury—see May 16, 1995). A statement by the Anti-Defamation League (ADL) says the Kingman mail drop address was used by a “T. Tuttle” (see October 12, 1993 - January 1994 and December 1993) in 1993 to advertise a “LAW launcher replica,” which the advertisement said fired “37 mm flares,” for sale in The Spotlight, a publication of the anti-Semitic Liberty Lobby. A LAW is a “light anti-tank weapon.” [New York Times, 4/27/1995]

Entity Tags: Mark Gibson, James Nichols, Charles Hanger, Federal Bureau of Investigation, Timothy James McVeigh, Richard A. Serrano, Pat Livingston, Noble County Courthouse (Perry, Oklahoma), Anti-Defamation League, Terry Lynn Nichols

Timeline Tags: US Domestic Terrorism

Sheila E. Witnall, the secretary of the Air Force, declassifies all Air Force accident reports prior to January 25, 1956. The declassification includes the 1948 crash of the B-29 bomber that killed nine of 13 crew members during a secret “Project Banshee” mission (see October 6, 1948). The formerly classified reports had been at the heart of the case of US v Reynolds (see March 9, 1953) that sparked the so-called “state secrets” privilege. Four years after the declassification, the daughter of one of the slain civilians on board, Judy Palya Loether, finds the accident report on the Internet; the discovery spurs her to begin looking into the circumstances of her father’s death, and ultimately will result in a second lawsuit being filed on behalf of the families of the slain crewmen (see February 26, 2003). [Siegel, 2008, pp. 205-208]

Entity Tags: Project Banshee, Sheila E. Witnall, Judy Palya Loether, US Department of the Air Force

Timeline Tags: Civil Liberties

Law professor John Yoo writes a lengthy essay for the California Law Review entitled “The Continuation of Politics by Other Means: The Original Understanding of War Powers,” in which he argues that the Founding Fathers intended to empower presidents to launch wars without Congressional permission. Yoo has clerked for conservative judge Laurence Silberman and equally conservative Supreme Court Justice Clarence Thomas, and served for a year as counsel to then-Senate Judiciary Committee Chairman Orrin Hatch (R-UT). He has become a regular speaker at Federalist Society events, the informal but influential group of conservative lawyers, judges, and legal scholars who will come to have so much influence in the Bush administration. You argues that for generations, Constitutional scholars have misread the Constitution: the Founders actually supported, not repudiated, the British model of executive power that gave the king the sole power of declaring war and committing forces to battle. The Constitution’s granting of the legislature—Congress—the power to “declare war” is merely, Yoo writes, a reference to the ceremonial role of deciding whether to proclaim the existence of a conflict as a diplomatic detail. The Founders always intended the executive branch to actually declare and commence war, he writes. Most other Constitutional scholars will dismiss Yoo’s arguments, citing notes from the Constitutional Convention that show the Founders clearly intended Congress, not the president, to decide whether to commit the country to war. One of those Founders, James Madison, wrote in 1795 that giving a president the unilateral ability to declare war “would have struck, not only at the fabric of the Constitution, but at the foundation of all well organized and well checked governments. The separation of the power of declaring war from that of conducting it, is wisely contrived to exclude the danger of its being declared for the sake of its being conducted.” [Savage, 2007, pp. 80-81] Yoo will go on to join the Bush administration’s Office of Legal Counsel, and write numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002).

Entity Tags: Federalist Society, John C. Yoo

Timeline Tags: Civil Liberties

The reaction among various militia and anti-government groups to the standoff between the FBI and the Montana Freemen (see March 25, 1996) is mixed. Some militia and “common law” (see Fall 2010) organizations issue statements in favor of the Freemen, warning that the FBI will cause another bloody debacle similar to those experienced at Ruby Ridge, Idaho (see August 31, 1992), and Waco, Texas (see April 19, 1993). Some predict that the Freemen standoff is the first step in a federal clampdown on the “patriot” movement, and call themselves ready for violence and even civil war. Other militia organizations are more cautious. The Tri-States Militia, a loose confederation of several militia organizations (see October 1995 and After), issues a press release criticizing the Freemen and saying they find it “insulting and offensive that people who call themselves members of the patriot community have combined their ‘patriotic’ activities with a clear attempt to defraud banking institutions and individual citizens through the use of phoney [sic] and/or money orders coupled with force and threats.” The Tri-States and other militia groups contrast the Freemen with their own, presumably “constitutional,” militias. (Later it is learned that the FBI had contacted a number of militia groups before they moved against the Freemen, apparently in an attempt to forestall any rash actions on the parts of the militias.)
Montana Militia Reactions - The Montana Militia (sometimes called the Militia of Montana, or MOM—see January 1, 1994) is cautious, perhaps attempting to ascertain where public opinion is before taking a stand. MOM founders John and Randy Trochmann say the group has sent representatives to the scene to “monitor” the situation and talk to Freeman Dale Jacobi, who used to run a business near MOM’s Nixon, Montana, headquarters. The group issues a press release asking other militias to “stand down” and not come to Montana. John Trochmann even says: “I think the FBI has been handling it very patiently. I admire them for their patience. And they’ve had a tremendous amount of pressure from the public (see March 1996 and March 25, 1996), from the local law enforcement (see November 1995), and from their superiors in the FBI and the Justice Department. I think they’re caught between a rock and a hard place, and they’re doing the only thing they can do.” Other MOM members are less cautious. Militiaman Steve McNeil announces that he is leading a militia caravan to Jordan, Montana, in support of the Freemen; he is later arrested at the courtroom where two of the Freemen are being arraigned (see March 26, 1996) for violating his probation. Had McNeil managed to bring an actual caravan, he may have found himself in conflict with a cordon of some 30 local ranchers who have grouped together to stand up to any such militia operations. Local farmer Cecil Weeding later explains: “The militias will just pump more hot air into the Freemen and make it worse. There will be a clash if they get here. This country is sick and tired of that thing up there, and wants to get it over.”
'Operation Certain Venture' - Former MOM leader Norm Olson, perhaps looking for a way to re-enter the limelight after his recent disgrace (see Summer 1996 - June 1997), tells reporters that the FBI is seeking a way to massacre the Freemen with the complicity of the local and national media, and calls on militia organizations to converge on Montana. He even releases his plans for “Operation Certain Venture,” an unarmed convoy of food, mail, and other supplies (including what he calls “women’s necessities”) that he says will help prevent an FBI slaughter. April 19, the day of the Branch Davidian conflagration and the Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995), might be a good day to set forth, Olson suggests. Olson is joined by the Alabama-based Gadsden Minutemen, led by Jeff Randall; Randall issues a plea for “dedicated volunteers,” but notes that “arrest is possible, and the FBI could very well decide to shoot unarmed civilians.” Mike Kemp, founder of the Minutemen, promises “there won’t be another Waco unanswered. They are pushing us to a confrontation. If the shooting starts, it could get very ugly, very quickly.” Kemp says the entire issue is over a few debts, and says the situation can easily be handled in civil court. On CBS’s Face the Nation, Olson says that if Jordan “is going to be the place where the second American revolution finally culminates in war, then it’s good for a battlefield commander to be there to look at the logistics, to look at the needs, and to find out exactly what the situation is on the ground.”
Other Opinions - Lawyer Gerry Spence, who represented Randy Weaver after the Ruby Ridge debacle, compliments the FBI on its restraint. “Patriot” leader James “Bo” Gritz, who helped negotiate Weaver’s surrender, implies that he is available to help negotiate a surrender for the Freemen as well, warning that “the longer these people stay within those walls, the more determined they get,” and even condoning the use of armed force against them if necessary. Samuel Sherwood of Idaho’s United States Militia Association calls the Freemen charlatans and rogues, and tells a reporter: “We’ve told everybody to stay away. These people aren’t what they are purporting to be. They are not the innocent victims of oppression.” Some members of Gritz’s “patriot” commune in Kediah, Idaho, a subgroup calling themselves the “Freemen Patriots,” go against their leader and issue claims of support for the Freemen, adding that the FBI standoff is a trap to capture more “patriots” and claiming that US Special Forces units have already been deployed at the scene. Some of the “Freemen Patriots” announce plans to hold a protest rally in Lewistown, Montana, on April 1 to support the Freemen, and ask all supporters to come sporting white ribbons. “We support the God-given right of our Freemen Brothers at Jordan, Montana, to be heard in a righteous constitutional court of law,” they proclaim. However, on April 1, only a few people actually show up. Lewistown police officer Bob Long describes the scene as “five or six guys out there at a RV park south of town. Right now, there are more newspeople in town than Freemen.” One extremist militia member, Bradley Glover, urges an array of violence to be mounted on behalf of the Freemen, but gets little reaction (see Late March 1996).
Twos and Threes - However, a small number of militia members attempt to visit the compound, usually traveling in groups of two or three. Some are allowed to visit the Freemen, but most are turned away, particularly if they are armed. If they are carrying fuel, groceries, firearms, or ammunition, these supplies are confiscated. Oklahoma militia leader and fugitive Stewart Waterhouse, with another militia member, Barry Nelson, breaks through a roadblock and drives into the ranch to join the Freemen. [Mark Pitcavage, 5/6/1996]

Entity Tags: Stewart Waterhouse, Norman (“Norm”) Olson, Samuel Sherwood, Steve McNeil, Tri-States Militia, Montana Militia, Randy Trochmann, Mike Kemp, Dale Jacobi, Cecil Weeding, Bradley Glover, Bob Long, Barry Nelson, Federal Bureau of Investigation, Montana Freemen, John Trochmann, Gadsden Minutemen, James (“Bo”) Gritz, Jeff Randall, Freemen Patriots, Gerry Spence

Timeline Tags: US Domestic Terrorism

April 25, 1996: New Anti-Terrorism Law Passed

President Clinton signs the Antiterrorism and Effective Death Penalty Act, which the New York Times calls “broad legislation that provides new tools and penalties for federal law-enforcement officials to use in fighting terrorism.” The Clinton administration proposed the bill in the aftermath of the Oklahoma City terrorist bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995). In many ways, the original bill will be mirrored by the USA Patriot Act six years later (see October 26, 2001). Civil libertarians on both the left and right opposed the legislation. Political analyst Michael Freeman called the proposal one of the “worst assaults on civil liberties in decades,” and the Houston Chronicle called it a “frightening” and “grievous” assault on domestic freedoms. Many Republicans opposed the bill, and forced a compromise that removed increased wiretap authority and lower standards for lawsuits against sellers of guns used in crimes. CNN called the version that finally passed the Republican-controlled Congress a “watered-down version of the White House’s proposal. The Clinton administration has been critical of the bill, calling it too weak. The original House bill, passed last month, had deleted many of the Senate’s anti-terrorism provisions because of lawmakers’ concerns about increasing federal law enforcement powers. Some of those provisions were restored in the compromise bill.” [CNN, 4/18/1996; New York Times, 4/25/1996; Roberts, 2008, pp. 35] An unusual coalition of gun rights groups such as the National Rifle Association (NRA) and civil liberties groups such as the American Civil Liberties Union (ACLU) led the opposition to the law. [New York Times, 4/17/1996] By the time Congress passed the bill, it had been, in the words of FBI Director Louis Freeh, “stripped… of just about every meaningful provision.” [Roberts, 2008, pp. 35] The law makes it illegal in the US to provide “material support” to any organization banned by the State Department. [Guardian, 9/10/2001]

Entity Tags: William Jefferson (“Bill”) Clinton, Louis J. Freeh, National Rifle Association, American Civil Liberties Union, Clinton administration, Michael Freeman, USA Patriot Act, US Congress

Timeline Tags: Complete 911 Timeline, Civil Liberties, US Domestic Terrorism

Charles Duke.Charles Duke. [Source: Crooks and Liars]At the FBI’s request, Colorado Republican State Senator Charles Duke, a respected figure in militia circles, arrives in Jordan, Montana, to negotiate with the besieged Montana Freemen (see March 25, 1996). Duke and FBI negotiators spend six days in fruitless negotiations culminating in an argument between Duke and Freemen leader Rodney Skurdal. Duke says only half of those in the compound are real Freemen, with the rest “nothing but criminals trying to escape prosecution.” The Freemen promise to allow Duke and an FBI team to interview everyone in the compound, and to release two young girls among their number, but fail to deliver on either promise. [Chicago Tribune`, 5/24/1996; Billings Gazette, 3/25/2006] Gloria Ward and her two daughters, aged 8 and 10, appear at one negotiating session with their luggage packed as if readying to leave, but instead of exiting the compound, they go back inside when the talks end. [Reuters, 5/20/1996]
Talks End in Angry Shouts; No Support from Militias - Duke is blazingly angry at the Freemen’s refusal to honor their promises. As Skurdal climbs into an automobile to go back to the ranch house, he shouts, “You aren’t enough of a man to come face me, get out of that car!” Afterwards, Duke says: “I told him, ‘I’m going to go out of here and I’m going to tell the American people what you’re doing here. You will not get support from the patriot community, you will not get support from the militia community, and if you die, nobody’s going to avenge you.’” Many in the militia community have similar feelings as Duke’s. Montana Militia leader Randy Trochmann says: “People in contact with them understand now that what they were doing was fraud. With the public, a good percentage of them want the FBI just to leave, put a berm around the house, and let the state police patrol it. And another percentage just want them [the FBI] to go in and finish them off.” [Los Angeles Times, 6/5/1996] Duke adds: “The FBI has now pursued each and every avenue to a peaceful solution. If it should come to a less than peaceful solution, I can tell you for sure the FBI has bent over backwards to avoid it.… One can only conclude the adults inside care only for their safety and care not one whit for the safety of their children, because they’re willing to sacrifice them and use them as a shield (see May 1, 1996). I think it’s unconscionable.” After Duke leaves, the Freemen begin rotating armed foot patrols, something they have not yet done during the duration of the standoff. [Associated Press, 5/21/1996] After leaving the Freemen ranch, Duke says he sees little hope of resolving the standoff by peaceful means. “I realized this is going nowhere,” he says. It is time for the FBI to make the Freemen “feel some pain.” [Chicago Tribune`, 5/24/1996] “This is not a battle for the militias,” Duke later adds. “The Freemen are using the Constitution as a facade to prevent their incarceration for illegal activity.” Militia leader James “Bo” Gritz, who himself attempted to negotiate an end to the standoff (see May 1, 1996), says the standoff is not a cause for any militia groups or their supporters. “There isn’t anyone in the legitimate patriot movement who doesn’t want to see the Freemen out and before the bar of justice,” he says. “The FBI are wrong in their fears.” Gritz is referring to fears that if the FBI moves on the Freemen, the right-wing militia groups will condemn the bureau for its actions, and perhaps launch counterattacks. [New York Times, 5/24/1996]
Fear of Cancer, 'No Brains' Drugs - At least one of the Freemen expresses his fear of being injected with cancer cells and “no brains” drugs if he were to go to jail, and several of the Freemen say they are ready to shoot it out with the FBI. The information comes from audiotapes Duke makes of his conversations with the Freemen; he will publicly air some of the tapes on the June 17, 1996 broadcast of Dateline NBC. Freeman Edwin Clark says: “When [LeRoy Schweitzer, the Freeman in federal custody] went to Missouri (see March 30-31, 1996), a man, a doctor from New York City, come in and told Leroy, he says, ‘You’ll never see the light of day.’ And he says, ‘I’ll guarantee you before you leave here I’m gonna inject you with a, with a deadly ah… dose of cancer.” Clark says that government officials have tried to kill other jailed Freemen: “I know of two of them, one of them at least, he was as healthy as a [expletive] horse when he went in there, and he came back… there was another one, I can’t remember his name, they, they give him a lethal dose of ‘no brains’ when he come back.” [Associated Press, 6/17/1996]

Entity Tags: Montana Freemen, LeRoy Schweitzer, Gloria Ward, Federal Bureau of Investigation, James (“Bo”) Gritz, Edwin Clark, Rodney Owen Skurdal, Randy Trochmann, Charles Duke

Timeline Tags: US Domestic Terrorism

Norm Olson. Olson is wearing an ‘Alaska Citizens’ Militia’ shoulder patch as part of his pseudo-military garb.Norm Olson. Olson is wearing an ‘Alaska Citizens’ Militia’ shoulder patch as part of his pseudo-military garb. [Source: Political Carnival]Former Michigan Militia members Norm Olson and Ray Southwell concoct the idea of holding a “Third Continental Congress” to redress the problems they see plaguing the nation—problems they believe stem primarily from a conspiracy of Jews, liberals, and minorities to repress white Christians. Olson and Southwell were thrown out of the Michigan Militia after Olson told media representatives that the April 1995 Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995) was engineered by the Japanese government in retaliation for the CIA’s supposed involvement in the Tokyo subway gas attack. Southwell envisions the Third Continental Congress, or TCC, to operate as a directing body for all the nation’s various militia groups, working together under the TCC rubric to “reestablish justice in America for all the people, whatever color they may be, or whatever faith system they may observe.” Southwell calls the envisioned dominance of the TCC “God’s will.” Olson says: “My goal is not to plan a revolution, for revolution will come. My goal is not to point fingers, lay blame, or find fault, for few doubt the crimes of the present de facto government. My goal is not to cast support to politicians or to shore up the broken machine that the federal government has become. Rather, my goal is to establish the Republican Provisional Government.” The first official TCC meeting, held in October 1996 in a Kansas City, Missouri, Holiday Inn, only attracts about a dozen delegates due to bad weather, though a few more arrive as the meeting wears on. Attendees include Sarah Lowe, whose husband currently heads the white separatist “Republic of Texas,” and Texas conspiracist James Vallaster. Southwell issues a manifesto calling for a Continental Defense Force, a repackaging of his original Third Continental Congress idea. The next meeting of the TCC occurs in January 1997 in Independence, Missouri, with nothing concrete being determined. Some TCC delegates, impatient with the inaction, decide among themselves to take some sort of decisive action. Several delegates, including Ronald Griesacker (a corrections officer, a well-known figure among militias, and a former Republic of Texas member), Kevin and Terry Hobeck (owners of an Ohio trucking firm), and Dennis and Ardith Fick, decide to form their own Continental Congress, which reportedly meets in Silver Lake, Indiana, in February 1997. One of this splinter group’s first members is Bradley Glover (see October 1995 and After), a Kansas militia member looking for extremist groups with an eye to violence. Other members include Thomas and Kimberly Newman, Michael Dorsett (a tax dodger and “common law” advocate), Merlon “Butch” Lingenfelter Jr. (a Wisconsin dairy farmer whose family believes a vast Jewish conspiracy runs most of Western civilization—see 1986), and, unbeknownst to the other members, several undercover officers of the Missouri State Highway Patrol, who were at the January 1997 TCC meeting and were concerned about the radical statements of some of the splinter group’s members. In April 1997, the splinter members meet in Towanda, Kansas. Glover and Dorsett make increasingly fiery statements, impelling some of the other members to leave. The focus of the meeting turns to the idea of foreign, United Nations-led troops being housed at US military bases, presumably to help the US government crush the “patriot” militia movement and impose martial law. Later that year, Mark Pitcavage of the Anti-Defamation League will write: “Allegations of such troops had been made so often and with such confidence in the patriot community that their presence was taken for granted by many patriots. Radio broadcaster Mark Koernke regularly spoke of hundreds of thousands of UN soldiers hiding in the United States, at military installations, in the national parks, and elsewhere. Indeed, the New World Order (see September 11, 1990) hardly seemed to bother with the effort of hiding them any longer.” The members that remain decide to take action. They determine to develop an arsenal of weapons and military equipment with which to attack government installations that are presumed to house foreign troops. They will hide in safe locations. The Hobecks sell their trucking firm to provide cash for the group, and travel to Colorado to establish a “base” at the Thirty Mile Resort in the Rio Grande National Forest. Others stage reconnaissance missions on military bases, including Holloman Air Force Base at Alamagordo, New Mexico. They station guards during the April and May 1997 meetings in Towanda, and even arm their children, who help patrol Glover’s farm. In June, Glover moves into Dorsett’s home in Arlington, Texas, in preparation for a strike on Fort Hood (see July 4-11, 1997). [Mark Pitcavage, 1997]

Entity Tags: Third Continental Congress, Ronald Griesacker, Sarah Lowe, Terry Hobeck, Thomas Newman, Ray Southwell, Republic of Texas, Missouri State Highway Patrol, James Vallaster, Kevin Hobeck, Dennis Fick, Ardith Fick, Bradley Glover, Kimberly Newman, Michael Dorsett, Merlon (“Butch”) Lingenfelter, Jr., Norman (“Norm”) Olson, Mark Pitcavage, Mark Koernke, Michigan Militia

Timeline Tags: US Domestic Terrorism

Author Brandon M. Stickney, a reporter for the Lockport Union-Sun & Journal in upstate New York, catalogs a number of unproven and sometimes extremist conspiracy theories that have sprouted in the aftermath of the Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995). Stickney includes his findings in his “unauthorized biography” of accused bomber Timothy McVeigh (see 8:35 a.m. - 9:02 a.m. April 19, 1995, July 11-13, 1995, and August 10, 1995), All-American Monster. Among the theories Stickney presents:
bullet The bombing was carried out by the Japanese. This theory was promulgated by Michigan Militia leaders Norm Olson and Ray Southwell (see April 1994), and proved so embarrassing for the two that they resigned their posts.
bullet Both the Oklahoma City bombing and the Branch Davidian tragedy (see April 19, 1993 and April 19, 1993 and After) were engineered by Clinton administration personnel in order to kill two former bodyguards of President Clinton who were preparing to go public with lurid tales of Clinton’s sexual transgressions. Secret Service agent Alan Wicher was killed in Oklahoma, and BATF agent Robert William was killed at Waco. Clinton attended Wicher’s funeral, and William had worked for the BATF in Little Rock while Clinton was governor of Arkansas. Idaho resident Bill Trowbridge told an Associated Press reporter after a militia meeting: “[T]hat makes four different bodyguards killed. Three in Waco, and this one. Sure did benefit Bill Clinton, didn’t it? Check that out.”
bullet The UN participated in the bombing plot. This theory has been promoted by the John Birch Society (see March 10, 1961 and December 2011), the editors of the white-separatist magazine The Spotlight, and other organizations and groups that have warned about a partnership between the UN and the US government to impose tyranny and martial law on American citizens, as part of the imposition of what they call the “New World Order” (see September 11, 1990). Gate Keepers information service representative Pam Beesley told an AP reporter that “this is what the UN does when they go in and overthrow a country. They produce unrest in the country first.”
bullet The bomb was an “electrodynamic gaseous fuel device” impossible for amateurs like McVeigh and his accomplice Terry Nichols to have made. Instead, it must have been made by US officials possessed of “high-level, top-secret” information. This theory came from former FBI agent Ted Gunderson, who makes regular appearances in The Spotlight. According to Gunderson, “John Doe No. 2” (see April 20, 1995, April 21, 1995, April 29, 1995, and June 14, 1995) was “vaporized by design” in the blast, and McVeigh was a “throwaway” or an “expendable asset.”
bullet Two bombs, not one, destroyed the Murrah Federal Building. It is true that two “incidents” were recorded at 9:02 a.m. on April 19, 1995, 11.9 seconds apart, but, according to Oklahoma chief geophysicist James Lawson, the second tremor was not caused by a second bomb, but by the building collapsing (see After 9:02 a.m. April 19, 1995). Lawson told the AP he still gets calls from people demanding to know about the “second explosion.” “A lot of them are anxious to explain to me that our government committed mass murder,” he said. “They are disappointed that I’m not saying it was two blasts.”
Stickney writes that many people have told him flatly that “they know” the government caused the bombing, and writes: “No matter what I told them, or for how long I tried to tell it, they would not change their minds that the government was involved. Distrust in public officials has reached the point of delusion, where Americans create their own explanations they cannot understand. One of the people who spoke with me went so far as to say he’d obtained a photograph of the bombed-out Murrah (ordered through a late-night AM radio show) that ‘proves two bombs were set off. McVeigh was led to Oklahoma by his nose, by the government.’” A video titled Oklahoma City: What Really Happened sells well at gun shows and through militia magazines and Web sites. On the box, it poses the questions: “Was there more than one bomb?” “What happened to John Doe No. 2?” “Was there a Middle Eastern connection?” and “Did some occupants of the building have prior warning?” [Stickney, 1996, pp. 265-267]

Entity Tags: United Nations, Timothy James McVeigh, Ted Gunderson, William Jefferson (“Bill”) Clinton, Ray Southwell, Clinton administration, James Lawson, Brandon M. Stickney, Alan Wicher, Bill Trowbridge, Robert William, Terry Lynn Nichols, Pam Beesley, Norman (“Norm”) Olson, John Birch Society

Timeline Tags: US Domestic Terrorism

Fox News logo.Fox News logo. [Source: Fox News]Fox News begins broadcasting on US cable television. Fox News provides 24-hour news programming alongside the nation’s only other such cable news provider, CNN. Fox executive Roger Ailes, a former campaign adviser for Richard Nixon, Ronald Reagan and George H. W. Bush (see 1968, January 25, 1988, and September 21 - October 4, 1988), envisions Fox News as a conservative “antidote” to what he calls the “liberal bias” of the rest of American news broadcasting. Ailes uses many of the methodologies and characteristics of conservative talk radio, and brings several radio hosts on his channel, including Sean Hannity and Bill O’Reilly, to host television shows. [Jamieson and Cappella, 2008, pp. 47; New York Magazine, 5/22/2011] Referring to Ailes’s campaign experience, veteran Republican consultant Ed Rollins later says: “Because of his political work, he understood there was an audience. He knew there were a couple million conservatives who were a potential audience, and he built Fox to reach them.” [New York Magazine, 5/22/2011]
Ailes Planned for Fox News as Far Back as 1970 - Ailes began envisioning a conservative news provider to counter what he considers the mainstream media’s “liberal bias” as early as 1970, when he became heavily involved with a Nixon administration plan to plant conservative propaganda in news outlets across the nation (see Summer 1970). In 1971, he headed a short-lived private conservative television news network, Television News Incorporated (TVN—see 1971-1975), which foundered in 1975 in part because of its reporters and staffers balking at reporting Ailes-crafted propaganda instead of “straight” news. Ailes told a New York Times reporter in 1991 that he was leaving politics, saying: “I’ve been in politics for 25 years. It’s always been a detour. Now my business has taken a turn back to my entertainment and corporate clients.” But Ailes misinformed the reporter. He continued to work behind the scenes on the 1992 Bush re-election campaign, providing the campaign with attack points against Democratic contender Bill Clinton (D-AR) and earning the nickname “Deep Throat” from Bush aides. Though Ailes did do work in entertainment, helping develop tabloid television programs such as The Maury Povich Show and heading the cable business news network CNBC for three years, Ailes has continued to stay heavily involved in Republican politics ever since. Ailes became involved in the creation of Fox News in early 1996 after he left NBC, which had canceled his show America’s Talking and launched a new cable news network, MSNBC, without asking for Ailes’s involvement. Fox News is owned by News Corporation (sometimes abbreviated NewsCorp), an international media conglomerate owned by conservative billionaire Rupert Murdoch. When NBC allowed Ailes to leave, Jack Welch, the chairman of NBC’s parent company General Electric, said, “We’ll rue the day we let Roger and Rupert team up.” Murdoch has already tried and failed to buy CNN, and has already begun work on crafting news programs with hard-right slants, such as a 60 Minutes-like show that, reporter Tim Dickinson will write, “would feature a weekly attack-and-destroy piece targeting a liberal politician or social program.” Dan Cooper, the managing editor of the pre-launch Fox News, later says, “The idea of a masquerade was already around prior to Roger arriving.” Eric Burns, who will work for ten years as a Fox News media critic before leaving the network, will say in 2011: “There’s your answer right there to whether Fox News is a conventional news network or whether it has an agenda. That’s its original sin.” To get Fox News onto millions of cable boxes at once, Murdoch paid hundreds of millions of dollars to cable providers to air his new network. Murdoch biographer Neil Chenoweth will later write: “Murdoch’s offer shocked the industry. He was prepared to shell out half a billion dollars just to buy a news voice.” Dickinson will write, “Even before it took to the air, Fox News was guaranteed access to a mass audience, bought and paid for.” Ailes praised Murdoch’s “nerve,” saying, “This is capitalism and one of the things that made this country great.” [New York Magazine, 5/22/2011; Rolling Stone, 5/25/2011]
Using Conservative Talk Radio as Template - In 2003, NBC’s Bob Wright will note that Fox News uses conservative talk radio as a template, saying: “[W]hat Fox did was say, ‘Gee, this is a way for us to distinguish ourselves. We’re going to grab this pent-up anger—shouting—that we’re seeing on talk radio and put it onto television.’” CBS News anchor Dan Rather will be more critical, saying that Fox is a reflection of Murdoch’s own conservative political views. “Mr. Murdoch has a business, a huge worldwide conglomerate business,” Rather says. “He finds it to his benefit to have media outlets, press outlets, that serve his business interests. There’s nothing wrong with this. It’s a free country. It’s not an indictable offense. But by any clear analysis the bias is towards his own personal, political, partisan agenda… primarily because it fits his commercial interests.” [New Yorker, 5/26/2003]
Putting Ideology Over Journalistic Ethics, Practices - Ailes, determined not to let journalists with ethical qualms disrupt Fox News as they had his previous attempt at creating a conservative news network (see 1971-1975), brought a hand-picked selection of reporters and staffers with demonstrable conservative ideologies from NBC, including business anchor Neil Cavuto and Steve Doocy, who hosts the morning talk show “Fox and Friends.” Both Cavuto and Doocy are Ailes loyalists who, Dickinson will say, owe their careers to Ailes. Ailes then tapped Brit Hume, a veteran ABC correspondent and outspoken conservative, to host the main evening news show, and former Bush speechwriter Tony Snow as a commentator and host. John Moody, a forcefully conservative ABC News veteran, heads the newsroom. Ailes then went on a purge of Fox News staffers. Joe Peyronnin, who headed the network before Ailes displaced him, later recalls: “There was a litmus test. He was going to figure out who was liberal or conservative when he came in, and try to get rid of the liberals.” Ailes confronted reporters with suspected “liberal bias” with “gotcha” questions such as “Why are you a liberal?” Staffers with mainstream media experience were forced to defend their employment at such venues as CBS News, which he calls the “Communist Broadcast System.” He fired scores of staffers for perceived liberal leanings and replaced them with fiery young ideologues whose inexperience helps Ailes shape the network to his vision. Before the network aired its first production, Ailes had a seminal meeting with Moody. “One of the problems we have to work on here together when we start this network is that most journalists are liberals,” he told Moody. “And we’ve got to fight that.” Reporters and staffers knew from the outset that Fox, despite its insistence on being “fair and balanced” (see 1995), was going to present news with a conservative slant, and if that did not suit them, they would not be at Fox long. A former Fox News anchor later says: “All outward appearances were that it was just like any other newsroom. But you knew that the way to get ahead was to show your color—and that your color was red.” The anchor refers to “red” as associated with “red state,” commonly used on news broadcasts to define states with Republican majorities. Ailes will always insist that while his network’s talk-show hosts, such as O’Reilly, Hannity, and others, are frankly conservative, Fox’s hard-news shows maintain what he calls a “bright, clear line” that separates conservative cant from reported fact. In practice, this is not the case. Before Fox aired its first broadcast, Ailes tasked Moody to keep the newsroom in line. Early each morning, Ailes has a meeting with Moody, often with Hume on speakerphone from the Washington office, where the day’s agenda is crafted. Moody then sends a memo to the staff telling them how to slant the day’s news coverage according to the agenda of those on “the Second Floor,” as Ailes and his vice presidents are known. A former Fox anchor will later say: “There’s a chain of command, and it’s followed. Roger talks to his people, and his people pass the message on down.” After the 2004 presidential election, Bush press secretary Scott McClellan will admit, “We at the White House were getting them talking points.”
Targeting a Niche Demographic - Fox New’s primary viewership defies most demographic wisdom. According to information taken in 2011, it averages 65 years of age (the common “target demographic” for age is the 18-24 bracket), and only 1.38% of its viewers are African-American. Perhaps the most telling statistics are for the Hannity show: 86% describe themselves as pro-business, 84% believe government “does too much,” 78% are “Christian conservatives,” 78% do not support gay rights, 75% are “tea party backers,” 73% support the National Rifle Association, 66% lack college degrees, and 65% are over age 50. A former NewsCorp colleague will say: “He’s got a niche audience and he’s programmed to it beautifully. He feeds them exactly what they want to hear.” Other polls from the same time period consistently show that Fox News viewers are the most misinformed of all news consumers, and one study shows that Fox News viewers become more misinformed the more they watch the network’s programming.
Ailes's Security Concerns Affect Operations, Broadcasting - Ailes is uncomfortable in his office, a second-floor corner suite in the Fox News building at 1211 Avenue of the Americas in Manhattan. His office is too close to the street for his tastes; he believes that gay activists intend to try to harm him, either by attacks from outside the building or through assaults carried out from inside. He also believes that he is a top target for al-Qaeda assassins. Ailes barricades himself behind an enormous mahogany desk, insists on having “bombproof” glass installed in the windows, surrounds himself with heavily-armed bodyguards, and carries a firearm (he has a concealed-carry permit). A monitor on his desk shows him what is transpiring outside his office door; once, when he sees a dark-skinned man wearing what he thought was Muslim garb on the monitor, he will order an immediate lockdown of the entire building, shouting, “This man could be bombing me!” The man will turn out to be a janitor. A source close to Ailes will say, “He has a personal paranoia about people who are Muslim—which is consistent with the ideology of his network.” A large security detail escorts him daily to and from his Garrison, New Jersey home to his Manhattan offices; in Garrison, his house is surrounded by empty homes Ailes has bought to enhance his personal security. According to sources close to Ailes, Fox News’s slant on gay rights and Islamist extremism is colored by Ailes’s fear and hatred of the groups.
'We Work for Fox' - Sean Wilentz, a Princeton historian and Reagan biographer, will say: “Fox News is totalized: It’s an entire network, devoted 24 hours a day to an entire politics, and it’s broadcast as ‘the news.’ That’s why Ailes is a genius. He’s combined opinion and journalism in a wholly new way—one that blurs the distinction between the two.” Dickinson will write: “Fox News stands as the culmination of everything Ailes tried to do for Nixon back in 1968. He has created a vast stage set, designed to resemble an actual news network, that is literally hard-wired into the homes of millions of America’s most conservative voters. GOP candidates then use that forum to communicate directly to their base, bypassing the professional journalists Ailes once denounced as ‘matadors’ who want to ‘tear down the social order’ with their ‘elitist, horse-dung, socialist thinking.’ Ironically, it is Ailes who has built the most formidable propaganda machine ever seen outside of the Communist bloc, pioneering a business model that effectively monetizes conservative politics through its relentless focus on the bottom line.” Former Bush speechwriter David Frum will observe: “Republicans originally thought that Fox worked for us. Now we’re discovering that we work for Fox.” [New York Magazine, 5/22/2011; Rolling Stone, 5/25/2011]

Entity Tags: Eric Burns, Tim Dickinson, Neil Cavuto, Dan Cooper, Steve Doocy, Joe Peyronnin, John Moody, David Frum, Sean Wilentz, News Corporation, Scott McClellan, Jack Welch, Tony Snow, MSNBC, Brit Hume, Television News Incorporated, Ronald Reagan, Roger Ailes, CNN, Fox News, CNBC, George Herbert Walker Bush, Sean Hannity, Neil Chenoweth, Ed Rollins, William Jefferson (“Bill”) Clinton, Bill O’Reilly, Nixon administration, Dan Rather, Bob Wright, Rupert Murdoch

Timeline Tags: Domestic Propaganda

On several occasion between 1996 and 1999, future 9/11 hijacker Hani Hanjour attends flight schools in Arizona (see October 1996-December 1997 and 1998). The 9/11 Commission will later note, “It is clear that when Hanjour lived in Arizona in the 1990s, he associated with several individuals who have been the subject of counterterrorism investigations.” Some of the time, he is accompanied by two friends, Bandar Al Hazmi and Rayed Abdullah. Al Hazmi and Abdullah have been friends with each other in high school in Saudi Arabia, but it is not known if either knew Hanjour before moving to the US. Al Hazmi and Hanjour are roommates for a time. Al Hazmi will finish his training and leave the US for the last time in January 2000 (he apparently will be interviewed overseas in 2004). Abdullah becomes a leader of a Phoenix mosque where he reportedly gives extremist speeches. He will continue to train with Hanjour occasionally through the summer of 2001. The FBI apparently will investigate him in May 2001. He will repeatedly be questioned by authorities after 9/11, then move to Qatar. In 2004, the 9/11 Commission will report that the FBI remains suspicious of Al Hazmi and Abdullah, but neither man is charged with any crime. The 9/11 Commission will also imply that another of Hanjour’s Arizona associates is al-Qaeda operative Ghassan al Sharbi. Al Sharbi will be arrested in Pakistan in March 2002 with al-Qaeda leader Abu Zubaida (see March 28, 2002). He apparently is a target of Ken Williams’s “Phoenix memo”(see July 10, 2001). Another associate of Hanjour’s, Hamed al Sulami, is in telephone contact with a radical Saudi imam who is said to be the spiritual advisor to al-Qaeda leader Abu Zubaida. This imam may have a role in recruiting some of the 9/11 hijackers. Abdulaziz Alomari, for instance, was a student of this imam. It seems that al Sulami is also a target of Williams’s memo. [Washington Post, 9/10/2002; US Congress, 9/26/2002; 9/11 Commission, 7/24/2004, pp. 233, 520-521, 529]

Entity Tags: Rayed Abdullah, Hani Hanjour, Bandar Al Hazmi, Ghassan al Sharbi, Hamed al Sulamis

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Starting in 1997, the FBI constructs a sophisticated surveillance system that can perform near-instantaneous wiretaps on almost any telephone, cell phone, and Internet communications device, according to documents declassified in August 2007. The system is called the Digital Collection System Network, or DCSNet. It connects FBI wiretapping rooms to switches controlled by land-line operators, Internet-telephony companies, and cellular providers. The documents show that DCSNet is, in reporter Ryan Singel’s words, “far more intricately woven into the nation’s telecom infrastructure than observers suspected.” Steven Bellovin, a computer science professor and surveillance expert, calls DCSNet a “comprehensive wiretap system that intercepts wire-line phones, cellular phones, SMS [short message service, a protocol allowing mobile devices to exchange text messages], and push-to-talk systems.” The system is an entire suite of software that together collects, sifts, and stores phone numbers, phone calls, and text messages. The system directly connects FBI wiretapping offices around the country to a sprawling private communications network. DCSNet is composed of three main clients:
bullet The DCS-3000, also called “Red Hook,” handles pen-registers and trap-and-traces, a type of surveillance that collects signaling information but not communications content.
bullet The DCS-6000, or “Digital Storm,” captures and collects the content—the spoken or written communications—of phone calls and text messages.
bullet The most classified system of the three, the DCS-5000, is used for wiretaps targeting spies or terrorists.
Between the three, the system can allow FBI agents to monitor recorded phone calls and messages in real time, create master wiretap files, send digital recordings to translators, track the location of targets in real time using cell-tower information, and stream intercepts to mobile surveillance vans. The entire system is operated through a private, secure and self-contained backbone that is run for the government by Sprint. Singel gives the following example: “The network allows an FBI agent in New York, for example, to remotely set up a wiretap on a cell phone based in Sacramento, California, and immediately learn the phone’s location, then begin receiving conversations, text messages and voicemail pass codes in New York. With a few keystrokes, the agent can route the recordings to language specialists for translation.” Dialed numbers are subjected to data mining, including so-called “link analysis.” The precise number of US phones being monitored and recorded in this way is classified.
Genesis of DCSNet - The system was made possible by the 1994 Communications Assistance for Law Enforcement Act (CALEA) (see January 1, 1995), which mandated that telecom providers must build “backdoors” in US telephone switches to be used by government wiretappers. CALEA also ordered telecom firms to install only switching equipment that met detailed wiretapping standards. Before CALEA, the FBI would bring a wiretap warrant to a particular telecom, and that firm would itself create a tap. Now, the FBI logs in directly to the telecom networks and monitors a surveillance target itself through DCSNet. FBI special agent Anthony DiClemente, chief of the Data Acquisition and Intercept Section of the FBI’s Operational Technology Division, says the DCS was originally intended in 1997 to be a temporary solution, but has grown into a full-featured CALEA-collection software suite. “CALEA revolutionizes how law enforcement gets intercept information,” he says. “Before CALEA, it was a rudimentary system that mimicked Ma Bell.” Now, under CALEA, phone systems and Internet service providers have been forced to allow DCSNet to access almost all of its data (see 1997-August 2007 and After).
Security Breaches - The system is vulnerable to hacking and security breaches (see 2003). [Wired News, 8/29/2007]

Entity Tags: Steven Bellovin, Ryan Singel, Federal Bureau of Investigation, Anthony DiClemente, Operational Technology Division (FBI), Communications Assistance for Law Enforcement Act (CALEA), Digital Collection System, Data Acquisition and Intercept Section (FBI), Sprint/Nextel

Timeline Tags: Civil Liberties

David Bossie.David Bossie. [Source: C-SPAN]David Bossie, an investigator for Representative Dan Burton (R-IN), is fired from his position. Bossie recently leaked transcripts of prison conversations featuring former Clinton administration official Webster Hubbell, who will be convicted of defrauding clients and sentenced to prison in 2004. Bossie fraudulently edited the transcripts to have Hubbell imply that First Lady Hillary Clinton broke the law while the two worked together in an Arkansas law firm. Bossie cut out portions of Hubbell’s conversations exonerating her from any wrongdoing, and sometimes rewrote Hubbell’s words entirely. In response to the controversy, House Speaker Newt Gingrich (R-GA) says of Burton and the House Committee on Oversight and Government Reform, “I’m embarrassed for you, I’m embarrassed for myself, and I’m embarrassed for the [House Republican] conference at the circus that went on at your committee.” (In late April, Burton had called President Clinton a “scumbag,” further embarrassing Gingrich and the Republican leadership.) Bossie came to Burton’s staff from Citizens United (CU), which he joined in 1994 and soon rose to become director of government relations and communications. In 1988, as a member of Floyd Brown’s Presidential Victory Committee (PVC), Bossie helped produce the infamous Willie Horton ad (see September 21 - October 4, 1988). In 1992, as executive director of the PVC, Bossie oversaw the release of a fundraising letter accusing then-presidential candidate Bill Clinton of having an affair with an Arkansas woman, for use in an ad that falsely suggested it was the product of President Bush’s re-election campaign. Then-President Bush accused the PVC of engaging in “filthy campaign tactics,” and his son and campaign aide George W. Bush sent a letter asking donors not to give to the organization. Bossie has encouraged Burton to open an investigation into the suicide of Clinton administration aide Vince Foster (alleging that Foster was murdered as part of some unspecified White House plot, or perhaps an Israeli intelligence “black op”). While an aide to Senator Lauch Faircloth (R-NC), Bossie was found to have tried to intimidate a federal judge during a Whitewater-related investigation. Bossie has earned a reputation as a “Whitewater stalker,” combing Arkansas for “evidence” of crimes by the Clintons, and repeatedly making false and lurid allegations against the president and/or his wife. For a year, Bossie has promised that Burton’s committee would soon produce evidence of Chinese espionage and White House collusion, but any evidence of such a scandal has never been produced. A former lawyer for the Oversight Committee, John Rowley, has called Bossie’s actions “unrelenting self-promoti[on]” and challenged Bossie’s competence. Bossie says his transcripts were accurate (though the tapes of Hubbell’s conversations prove he is wrong), and blames committee Democrats for the controversy. [WorldNetDaily, 5/7/1998; Salon, 5/7/1998; Media Matters, 5/11/2004] WorldNetDaily reporter David Bresnahan writes that according to his sources, Bossie “was either extremely incompetent or was intentionally trying to sabotage” Burton’s investigations into the Clinton administration. Bresnahan also says that Burton allowed Bossie to resign instead of firing him, as other media sources report. [WorldNetDaily, 5/7/1998]

Entity Tags: Floyd Brown, David Bresnahan, Dan Burton, Clinton administration, Citizens United, William Jefferson (“Bill”) Clinton, Webster Hubbell, Presidential Victory Committee, David Bossie, House Committee on Oversight and Government Reform, John Rowley, Hillary Clinton, Newt Gingrich, George W. Bush, Vince Foster

Timeline Tags: Civil Liberties

Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right).Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right). [Source: Associated Press]Two US embassies in Africa are bombed within minutes of each other. At 10:35 a.m., local time, a suicide car bomb attack in Nairobi, Kenya, kills 213 people, including 12 US nationals, and injures more than 4,500. Mohamed al-Owhali and someone known only as Azzam are the suicide bombers, but al-Owhali runs away at the last minute and survives. Four minutes later, a suicide car bomb attack in Dar es Salaam, Tanzania, kills 11 and injures 85. Hamden Khalif Allah Awad is the suicide bomber there. The attacks will be blamed on al-Qaeda. [PBS Frontline, 2001; United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001] The Tanzania death toll is low because, remarkably, the attack takes place on a national holiday so the US embassy there is closed. [Miller, Stone, and Mitchell, 2002, pp. 195] The attack shows al-Qaeda has a capability for simultaneous attacks. The Tanzania bombing appears to have been a late addition, as one of the arrested bombers will allegedly tell US agents that it was added to the plot only about 10 days in advance. [United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001] A third attack against the US embassy in Uganda does not take place due to a last-minute delay (see August 7, 1998). [Associated Press, 9/25/1998] August 7, 1998, is the eighth anniversary of the arrival of US troops in Saudi Arabia and some people will speculate that this is the reason for the date of the bombings. [Gunaratna, 2003, pp. 46] In the 2002 book The Cell, reporters John Miller, Michael Stone, and Chris Mitchell will write: “What has become clear with time is that facets of the East Africa plot had been known beforehand to the FBI, the CIA, the State Department, and to Israeli and Kenyan intelligence services.… [N]o one can seriously argue that the horrors of August 7, 1998, couldn’t have been prevented.” They will also comment, “Inexplicable as the intelligence failure was, more baffling still was that al-Qaeda correctly presumed that a major attack could be carried out by a cell that US agents had already uncovered.” [Miller, Stone, and Mitchell, 2002, pp. 195, 206] After 9/11, it will come to light that three of the alleged hijackers, Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi, had some involvement in the bombings (see October 4, 2001, Late 1999, and 1993-1999) and that the US intelligence community was aware of this involvement by late 1999 (see December 15-31, 1999), if not before.

Entity Tags: Salem Alhazmi, Nawaf Alhazmi, Mohamed al-Owhali, Hamden Khalif Allah Awad, Khalid Almihdhar, Al-Qaeda, Azzam

Timeline Tags: Complete 911 Timeline

Princess Diana at a mine field in Angola in 1997.Princess Diana at a mine field in Angola in 1997. [Source: Tim Graham / Corbis]The NSA admits that US intelligence agencies possess 1,056 pages of classified information regarding Britain’s Princess Diana. British tabloids portray the documents as rife with salacious information on Diana’s “most intimate love secrets” about her relationship with Egyptian billionaire Dodi al-Fayed, but the actual documentation may not be so lurid. The NSA recently denied a Freedom of Information request from the Internet news service APB Online about information it has collected on Diana, who died in a tragic car accident in 1997. (It is unclear whether US intelligence has any unreleased information about the circumstances of Diana’s death. [APB Online, 11/30/1998; Washington Post, 12/12/1998] The NSA has denied monitoring Diana on the night of her death, an allegation raised by The Observer in 2006.) [MSNBC, 12/11/2006] In the two-page letter denying the request, the NSA admits to possessing a “Diana file,” but refuses to divulge what is in that file. A US intelligence official says the information is made up of conversations between other people who mentioned Diana; the references to Diana in those intercepted conversations are “incidental.” The official says Diana was never a particular target of the NSA’s Echelon surveillance program. However, the NSA has classified 124 pages of the “Diana documents” as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security.” According to a recent report by the European Parliament, the NSA routinely monitors virtually “all e-mail, telephone and fax communications… within Europe” (see July 11, 2001). Intelligence expert Steven Aftergood of the Federation of American Scientists says “the US and our allies promiscuously collect electronic communications around the world. Whether the descriptions of Echelon are accurate or not, that much is definitely true.” Some believe that lurid snippets of information leaked to the British press regarding Diana’s affair with Fayed, and her ambivalent relationship with Prince Charles, may have come from Echelon wiretaps and surveillance. Another FAS scientist, John Pike, says the NSA and other US intelligence agencies may have been monitoring Diana to protect her from terrorist attacks. Pike says it is also possible she may have been monitored because of her involvement in banning land mines, a position opposed by the Pentagon. [APB Online, 11/30/1998; Washington Post, 12/12/1998] Former NSA official Wayne Madsen will say in 2000, “[W]hen NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?” [CBS News, 2/27/2000] In August 1999, the NSA will deny another Freedom of Information request about its “Diana file” from the British newspaper The Guardian. [Guardian, 8/6/1999]

Entity Tags: Steven Aftergood, Prince Charles, The Guardian, John Pike, Dodi al-Fayed, Echelon, Federation of American Scientists (FAS), National Security Agency, Princess Diana

Timeline Tags: Civil Liberties

Richard Barlow, a former intelligence analyst who was repeatedly fired for correctly claiming that Pakistan had a nuclear weapons program (see 1981-1982, August 1987-1988 and August 4, 1989), is awarded a total of $1 million by President Bill Clinton in compensation for the treatment he received. However, Barlow does not receive the money, as the settlement has to be ratified by Congress. When it runs into procedural problems, it is moved to the Court of Federal Claims to be reviewed. After Clinton is replaced by George W. Bush, CIA Director George Tenet and NSA Director Michael Hayden assert the government’s “state secrets privilege” (see March 9, 1953) over Barlow’s entire legal claim, causing it to collapse due to lack of evidence. [Guardian, 10/13/2007]

Entity Tags: William Jefferson (“Bill”) Clinton, Richard Barlow, National Security Agency, Michael Hayden, Court of Federal Claims, Central Intelligence Agency, George J. Tenet

Timeline Tags: A. Q. Khan's Nuclear Network

Around 10,000 people attend the “Center for Preparedness Expo” in Denver to prepare for the imminent “Y2K” collapse of society warned of by many white separatists and “Patriot” movement members (see October 20, 1999 and February 4, 1999). The expo has traveled the country, including a stop in Philadelphia in June. Promoter Dan Chittock says the show offers “practical information for the uncertain times we live in,” but Mark Potok of the Southern Poverty Law Center says the expo features what he calls “a queer mix of people interested in organic farming and political extremism.” Visitors can buy anything from radiation detectors, tents, and survival rations to guides on avoiding income taxes and making their own license plates to avoid paying licensing fees for their vehicles. Lectures are offered with such titles as “Trapping Techniques for Self-Reliance and Survival,” “Don’t Get Caught With Your Pantry Down,” and “Save Your Life, Be Your Own Doctor.” Three seminars are about life under martial law. Previous expos have featured speakers such as militia leader Bo Gritz, who has spoken about coming plagues, imminent food shortages, and how President Clinton has sold out America. Stephen O’Leary, a University of Southern California professor who studies beliefs about the millennium, says that the expos have become recruitment centers for anti-government, survivalist militia groups who often hold racist and anti-Semitic views. “It’s not just about preparing for an emergency or disaster,” he says. “What they’re selling is a whole world view—a program for the apocalypse.” Potok, who has attended previous expos, says “it’s not unusual to see booths for the John Birch Society (see March 10, 1961 and December 2011) and the Montana Militia next to a granola salesman.” The radical right, Potok says, is using fears of the upcoming millennium—“Y2K”—to fuel hysteria about what they say is the imminent declaration of martial law by the federal government and the eradication of constitutional liberties. Chittock calls such concerns “nonsense.” Barry Morrison of the Anti-Defamation League says of the expos: “What we’re concerned about is that some people take the position that the government is not to be trusted. Some of these exhibitors… portray people like Jews in an unfavorable light and as having undue control over their lives.” Morrison says anti-Semitic tracts espousing “Christian Identity” ideology (see 1960s and After) have appeared at previous expos. He also says Gritz’s Liberty Lobby is “the most influential anti-Semitic propaganda organization in America today.” He adds: “I’m not saying everyone [at the expos] is an extremist or subscribes to those views, but this is a vehicle that attracts that element. It’s part of the mix.” [Philadelphia Inquirer, 6/11/1999; Southern Poverty Law Center, 6/2001]

Entity Tags: Stephen O’Leary, Montana Militia, Dan Chittock, John Birch Society, Barry Morrison, Mark Potok, James (“Bo”) Gritz

Timeline Tags: US Domestic Terrorism

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

Judy Palya Loether.Judy Palya Loether. [Source: SecrecyFilm (.com)]Judy Palya Loether, the daughter of a civilian engineer killed in a 1948 plane crash while on a secret government mission (see October 6, 1948), reads over the voluminous reports of the accident that claimed her father’s life. The reports, now declassified (see January 1996), had been at the heart of a landmark lawsuit that gave judicial recognition to the government’s “state secrets” privilege (see March 9, 1953). Loether is shocked to find that the reports contain nothing that could be construed as military or tactical secrets of any kind, though for decades the government has insisted that they could not be revealed, even to a judge (see October 18, 1948, July 26, 1950, August 7-8, 1950, September 21, 1950, and October 19, 1951). What they do contain is a compendium of witness statements and expert findings that indicate a number of mistakes and errors led to the crash. Loether begins contacting the families of the widows who had filed the original lawsuit against the government (seeJune 21, 1949) to share her findings. [Siegel, 2008, pp. 210-211] Loether is confused and angered over the contents of the reports, and the government’s response to the lawsuit. She cannot understand why the government pressed so hard to keep the reports classified, knowing that they contained no sensitive information about the secret missile program, and is particularly troubled by the fact that at least two senior government officials signed affidavits affirming the reports’ inclusion of such information while knowing that the reports contained nothing of the sort. She wonders if government officials had perhaps decided to lie about the reports in order to establish some sort of state secrets privilege. In September 2002, lawyers Wilson Brown and Jeff Almeida, retained by Loether and others who lost family members in the crash, come to the same conclusion. As Almeida will say to Brown: “I’ve read this report. There’s nothing in there.” [Siegel, 2008, pp. 219] As time goes on, Loether and her colleagues files a second lawsuit seeking to overturn the first Supreme Court verdict (see February 26, 2003).

Entity Tags: Wilson Brown, Jeff Almeida, Judy Palya Loether

Timeline Tags: Civil Liberties

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

The US routinely denies that its satellite surveillance program, Echelon, provides any information to corporations, noting that the law clearly prevents such transactions. But former CIA director James Woolsey confirms that the US does indeed conduct economic espionage against its European allies, though he does not specifically mention Echelon. Woolsey, a well-known neoconservative, justifies such actions by accusing European companies of using bribery to gain unfair advantages against US corporations. “We have spied on you because you bribe,” he writes in the Wall Street Journal. “[European] products are often more costly, less technically advanced or both, than [their] American competitors’. As a result [they] bribe a lot.” [BBC, 7/6/2000]

Entity Tags: Echelon, Wall Street Journal, James Woolsey

Timeline Tags: Civil Liberties

John Prescott Ellis.John Prescott Ellis. [Source: Bush-Clinton Fraud (.com)]Fox News chairman Roger Ailes (see October 7, 1996), a Republican campaign consultant (see 1968, January 25, 1988, and September 21 - October 4, 1988), chooses an unlikely reporter to anchor Fox’s election night coverage: John Prescott Ellis, a freelance Republican political adviser and the first cousin of George W. Bush (R-TX), the Republican presidential candidate. (Ellis is the son of George Herbert Walker Bush’s sister, Nancy Ellis.) Ellis was originally hired to cover the party primaries. A later study of voting patterns by the University of California will determine that in areas where voters have access to Fox News, the network’s relentless pro-Bush coverage shifts some 200,000 votes from Democrat Al Gore (D-TN) to Bush, but Ailes wants to make sure his network’s coverage is favorable to Bush, and has always had Ellis in mind for the election night anchor position, for which he specifically gives Ellis a 30-day contract. Ellis is very close to Bush’s brother Jeb Bush (R-FL), the sitting governor of Florida (“Jeb” is an acronym for his full name, John Ellis Bush). Ellis recused himself from campaign coverage in a June 1999 Boston Globe column, defending George W. Bush from allegations of cocaine use, calling the Clinton-Gore administration “morally berserk,” and telling his readers, “There is no way for you to know if I am telling you the truth about George W. Bush’s presidential campaign, because in his case, my loyalty goes to him and not to you.” Instead of this posing an ethical dilemma or being seen as a conflict of interest at Fox, Ellis is Ailes’s first and only choice to anchor the network’s election coverage. (Ailes will later tell a February 2001 House committee hearing, “We at Fox News do not discriminate against people because of their family connections”—see February 14, 2001.) [Washington Post, 11/14/2000; Salon, 11/15/2000; Observer, 11/19/2000; Associated Press, 12/11/2000; Buffalo Beat, 12/14/2000; Nation, 11/6/2006; New York Magazine, 5/22/2011] Ellis will pre-emptively call the election for Bush, sparking the Florida recount controversy and helping propel his cousin into the White House (see November 7-8, 2000). In a response to testimony in the same February 2001 House committee hearing, Joan Konner, a journalism professor who will lead a CNN-commissioned independent study of the problems in that network’s election night coverage, will call Ellis’s hiring a substantial breach of journalistic ethics and standards. “If John Ellis had, indeed, made comments stating that his loyalties to the Bush family superceded any commitment he has to his profession or his employer, then I would judge that to be not only a perceived conflict-of-interest but a real conflict-of-interest for a journalist,” she will write in a letter to Representative John Dingell (D-MI). “While that does not disqualify an individual from any position as a journalist, it would, in my judgement, disqualify that person for any decision-making role involving reporting on his relatives during an election. Often friends and relatives are hired by journalism organizations because of their connections to the newsmakers. Their access to sources makes them valuable to the organization. However, the news organization should take every precaution against placing such an individual in an assignment that could result in bias in reporting.” [House of Representatives, Committee on Energy and Commerce, 2/14/2001]

Entity Tags: John Ellis (“Jeb”) Bush, Fox News, Boston Globe, Albert Arnold (“Al”) Gore, Jr., George W. Bush, John Dingell, Roger Ailes, Nancy Ellis, Joan Konner, John Prescott Ellis

Timeline Tags: 2000 Elections, Domestic Propaganda

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). [Truthout (.org), 1/17/2006] In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. [New York Times, 12/16/2007]

Entity Tags: Bush administration (43), National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency seeks the assistance of global telecommunications corporation AT&T to help it set up a domestic call monitoring site to eavesdrop on US citizens’ phone communications, according to court papers filed in June 2006 as part of a lawsuit against AT&T (see October 2001). The NSA is expressly forbidden from spying on US citizens within US borders unless authorized by the Foreign Surveillance Intelligence Court (FISC) (see 1978). When the NSA program, which wiretaps phone and email communications often without court warrants, becomes public knowledge well over four years later (see December 15, 2005), President Bush, NSA Director Michael Hayden, and other White House and government officials will assert that the program was set up in response to the September 11, 2001 terrorist attacks. If the claims made in the lawsuit are accurate, these assertions are provably false. “The Bush administration asserted this became necessary after 9/11,” lawyer Carl Mayer will claim in 2006. “This undermines that assertion.” Unbeknownst to most Americans, the NSA is operating a secret “data mining” operation that, by 2006, will have compiled phone records and contact information on millions of domestic phone and email communications. The NSA project is code-named “Project Groundbreaker,” and is ostensibly an above-board attempt announced in June 2000 to have AT&T and other firms help modernize its technological capabilities. The project originally seeks to have AT&T build a network operations center that duplicates AT&T’s facility in Bedminster, New Jersey; this plan will be altered when the NSA decides it will be better served by acquiring the monitoring technology itself. The agency is seeking bids for a project to “modernize and improve its information technology infrastructure,” including the privatization of its “non-mission related” systems support. [TechWeb, 6/13/2000; Bloomberg, 6/30/2006] Groundbreaker’s privatization project is expected to provide up to $5 billion in government contracts to various private firms such as AT&T, Computer Sciences Corporation, and OAO Corporation, [Computerworld, 12/4/2000; Government Executive, 9/1/2001] and up to 750 NSA employees will become private contractors. Hayden, who has aggressively instituted a corporate management protocol to enhance productivity and has brought in numerous senior managers and agency executives from private defense firms, is a strong proponent of privatizing and outsourcing much of the NSA’s technological operations, and in 2001 will say that he wants the agency to focus on its primary task of breaking codes and conducting surveillance. Hayden does not admit that Groundbreaker is part of a larger NSA domestic surveillance program, [Government Executive, 9/1/2001] and publicly, NSA officials say that the project is limited to administrative and logistics functions. [Computerworld, 12/4/2000] The covert data mining portion of the project is code-named “Pioneer.” A former, unnamed employee of the NSA, [Bloomberg, 6/30/2006] and a former AT&T technician, Mark Klein, will provide the key information about Groundbreaker (see Late 2002, July 7, 2009 and December 15-31, 2005). Klein will say in 2006 that he saw the NSA construct a clandestine area within its switching center in San Francisco, and saw NSA technicians shunt fiber optic cable carrying Internet traffic into that area, which contains a large data bank and secret data mining hardware (see April 6, 2006). Klein will say he knew that the NSA built other such facilities in other switching locations. He will go on to say that the NSA did not work with just AT&T traffic; when AT&T’s network connected with other networks, the agency acquired access to that traffic as well. [Democracy Now!, 5/12/2006] The information about AT&T and the NSA will become public knowledge after the 2006 filing of a lawsuit against AT&T and other telecommunications firms (see May 12, 2006 and June 26, 2006).

Entity Tags: Mark Klein, Michael Hayden, George W. Bush, Foreign Intelligence Surveillance Court, Bush administration (43), Carl Mayer, Computer Sciences Corporation, AT&T, National Security Agency, OAO Corporation

Timeline Tags: Civil Liberties

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Timeline Tags: Civil Liberties

Nicky Hager.Nicky Hager. [Source: Rotorua District Council]New Zealand journalist Nicky Hager appears before a European Parliament investigative committee to testify about the US’s satellite surveillance program, Echelon (see July 11, 2001). Hager has discovered information about Echelon’s use by the New Zealand equivalent of the NSA, the Government Communication Security Bureau (GCSB). In researching Echelon’s use by the USA, Canada, Britain, Australia, and New Zealand, Hager learned of the extent of the system’s “capability to monitor the whole of governments, regional and international organizations, non-government organizations, companies and individuals throughout Europe.” Although Hager warns the committee not to focus exclusively on Echelon’s use for corporate benefits, he gives several examples of such uses in the South Pacific, including monitoring “deals to do with Japan… collecting intelligence on meat sales, which is very important for New Zealand… intelligence to do with oil prices… [and] a particularly large Japanese development project in the South Pacific where there was potential for New Zealand companies to win contracts. In other words, there were both macro-level and micro-level economic intelligence being collected.” Corporate executives routinely received such information, Hager testifies, and tells about “the fantastic amount of intelligence that was arriving, for example, monitoring international trade meetings.… From my sources, they said that whenever there was a GATT meeting or another major international meeting, there were hundreds of reports of the monitoring of the different delegations which were arriving in New Zealand and being shared between [British]/USA partners, and I have absolutely no doubt about that, because I have talked to people who saw it coming from the NSA.” [European Parliament, 4/24/2001]

Entity Tags: Government Communication Security Bureau, Echelon, National Security Agency, Nicky Hager, European Parliament

Timeline Tags: Civil Liberties

One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing.One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing. [Source: Matt Crypto / Public domain]The BBC reports on advances in electronic surveillance. The US’s global surveillance program, Echelon, has become particularly effective in monitoring mobile phones, recording millions of calls simultaneously and checking them against a powerful search engine designed to pick out key words that might represent a security threat. Laser microphones can pick up conversations from up to a kilometer away by monitoring window vibrations. If a bug is attached to a computer keyboard, it is possible to monitor exactly what is being keyed in, because every key on a computer has a unique sound when depressed. [BBC, 4/4/2001] Furthermore, a BBC report on a European Union committee investigation into Echelon one month later notes that the surveillance network can sift through up to 90 percent of all Internet traffic, as well as monitor phone conversations, mobile phone calls, fax transmissions, net browsing history, satellite transmissions and so on. Even encryption may not help much. The BBC suggests that “it is likely that the intelligence agencies can crack open most commercially available encryption software.” [BBC, 5/29/2001]

Entity Tags: Echelon, British Broadcasting Corporation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

A National Security (NSA) linguist who only allows himself to be identified to the media as “J” warns his superiors at the agency that terrorists may be planning to hijack passenger planes to ram into buildings, and that security measures need to be implemented to prevent this. Instead, J is ordered to undergo psychiatric evaluation. (J was given similar treatment in another instance eight years before; see September 11, 1993). J will later claim that NSA officials dismissed his warnings, and instead labeled him as “obsessed” with the idea of a “kamikaze” threat because of time he had spent in Japan. In 2006, J will say that any time his analysis countered conventional wisdom, he was ordered to undergo psychiatric evaluations. He will eventually develop an irregular heartbeat due to the stress of anticipating further retaliatory, potentially career-damaging psychological evaluations. “I believe it was retaliation, but how do you prove that?” he will ask. J will spend his last decade at NSA with no promotion or raise, and will say that another linguist left the agency during that time out of disgust with what was happening. “Who was going to listen to us? Who could do anything anyway?” he asks in 2006. In 2006, other current and former NSA officials will claim that the NSA routinely uses unfavorable psychological evaluations to retaliate against whistleblowers and those employees who come into conflict with superiors (see January 25-26, 2006). [Cybercast News Service, 1/26/2006] It is not clear whether J’s warnings are related to the 33 other warnings picked up by NSA analysts during this same time period (see May-July 2001.)

Entity Tags: National Security Agency, “J”

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In July 2001, NSA director Michael Hayden tells a reporter that the NSA does not monitor any US citizens without court warrants from the Foreign Intelligence Surveillance Court (FISC). “We don’t do anything willy-nilly,” Hayden says. “We’re a foreign intelligence agency. We try to collect information that is of value to American decision-makers, to protect American values, America—and American lives. To suggest that we’re out there, on our own, renegade, pulling in random communications, is—is simply wrong. So everything we do is for a targeted foreign intelligence purpose. With regard to the—the question of industrial espionage, no. Period. Dot. We don’t do that.” When asked how Americans could verify that, Hayden says that they should simply trust the NSA to police and monitor itself, along with oversight from the White House and from Congress. However, it will later come to light that the NSA began illegally monitoring US citizens from the start of the Bush administration (see Spring 2001). A former NSA official will later dispute Hayden’s account. “What do you expect him to say?” the official says. “He’s got to deny it. I agree. We weren’t targeting specific people, which is what the President’s executive order does. However, we did keep tabs on some Americans we caught if there was an interest [by the White House.] That’s not legal. And I am very upset that I played a part in it.” [Truthout (.org), 1/17/2006] Hayden also denies persistent allegations from European government officials that the agency has engaged in economic espionage to help American companies against European competitors (see April 4, 2001). In March 2001, the American Civil Liberties Union’s Barry Steinhardt says that “since there is no real check on [the NSA], there is no way to know” if they are following the law. Steinhardt says that Congress is the only real check on possible NSA abuses, but it has consistently failed to exercise any sort of aggressive oversight on the agency. [CNN, 3/31/2001]

Entity Tags: National Security Agency, Barry Steinhardt, Michael Hayden, American Civil Liberties Union

Timeline Tags: Civil Liberties

FBI agent Ken Williams.FBI agent Ken Williams. [Source: FBI]Phoenix, Arizona, FBI agent Ken Williams sends a memorandum warning about suspicious activities involving a group of Middle Eastern men taking flight training lessons in Arizona. The memo is titled: “Zakaria Mustapha Soubra; IT-OTHER (Islamic Army of the Caucasus),” because it focuses on Zakaria Soubra, a Lebanese flight student in Prescott, Arizona, and his connection with a terror group in Chechnya that has ties to al-Qaeda. It is subtitled: “Osama bin Laden and Al-Muhjiroun supporters attending civil aviation universities/colleges in Arizona.” [Fortune, 5/22/2002; Arizona Republic, 7/24/2003] Williams’ memo is based on an investigation of Sorba that Williams had begun in 2000 (see April 2000), but he had trouble pursuing because of the low priority the Arizona FBI office gave terror investigations (see April 2000-June 2001). Additionally, Williams had been alerted to suspicions about radical militants and aircraft at least three other times (see October 1996; 1998; November 1999-August 2001). In the memo, Williams does the following:
bullet Names nine other suspect students from Pakistan, India, Kenya, Algeria, the United Arab Emirates, and Saudi Arabia. [Die Zeit (Hamburg), 10/1/2002] Hijacker Hani Hanjour, attending flight school in Arizona in early 2001 and probably continuing into the summer of 2001 (see Summer 2001), is not one of the students, but, as explained below, it seems two of the students know him. [US Congress, 7/24/2003, pp. 135 pdf file; Washington Post, 7/25/2003]
bullet Notes that he interviewed some of these students, and heard some of them make hostile comments about the US. Additionally, he noticed that they were suspiciously well informed about security measures at US airports. [Die Zeit (Hamburg), 10/1/2002]
bullet Notes an increasing, “inordinate number of individuals of investigative interest” taking flight lessons in Arizona. [Die Zeit (Hamburg), 10/1/2002; US Congress, 7/24/2003, pp. 135 pdf file]
bullet Suspects that some of the ten people he has investigated are connected to al-Qaeda. [US Congress, 7/24/2003, pp. 135 pdf file] One person on the list, Ghassan al Sharbi, will be arrested in Pakistan in March 2002 with al-Qaeda leader Abu Zubaida (see March 28, 2002). Al Sharbi attended a flight school in Prescott, Arizona. He also apparently attended the training camps in Afghanistan and swore loyalty to bin Laden in the summer of 2001. He apparently knows Hani Hanjour in Arizona (see October 1996-Late April 1999). He also is the roommate of Soubra, the main target of the memo. [Los Angeles Times, 1/24/2003; 9/11 Commission, 7/24/2004, pp. 521]
bullet Discovers that one of them was communicating through an intermediary with Abu Zubaida. This apparently is a reference to Hamed al Sulami, who had been telephoning a Saudi imam known to be Zubaida’s spiritual advisor. Al Sulami is an acquaintance of Hanjour in Arizona (see October 1996-Late April 1999). [Mercury News (San Jose), 5/23/2002; 9/11 Commission, 7/24/2004, pp. 520-521, 529]
bullet Discusses connections between several of the students and a radical group called Al-Muhajiroun. [Mercury News (San Jose), 5/23/2002] This group supported bin Laden, and issued a fatwa, or call to arms, that included airports on a list of acceptable terror targets. [Associated Press, 5/22/2002] Soubra, the main focus of the memo, is a member of Al-Muhajiroun and an outspoken radical. He met with Sheikh Omar Bakri Mohammed, the leader of Al-Muhajiroun in Britain, and started an Arizona chapter of the organization. After 9/11, some US officials will suspect that Soubra has ties to al-Qaeda and other terrorist groups. He will be held two years, then deported to Lebanon in 2004. [Los Angeles Times, 10/28/2001; Los Angeles Times, 1/24/2003; Arizona Republic, 5/2/2004; Arizona Monthly, 11/2004] Though Williams doesn’t include it in his memo, in the summer of 1998, Bakri publicized a fax sent by bin Laden to him that listed al-Qaeda’s four objectives in fighting the US. The first objective was “bring down their airliners.” (see Summer 1998). [Los Angeles Times, 10/28/2001]
bullet Warns of a possible “effort by Osama bin Laden to send students to the US to attend civil aviation universities and colleges” [Fortune, 5/22/2002] , so they can later hijack aircraft. [Die Zeit (Hamburg), 10/1/2002]
bullet Recommends that the “FBI should accumulate a listing of civil aviation universities and colleges around the country. FBI field offices with these types of schools in their area should establish appropriate liaison. FBI [headquarters] should discuss this matter with other elements of the US intelligence community and task the community for any information that supports Phoenix’s suspicions.” [Arizona Republic, 7/24/2003] (The FBI has already done this, but because of poor FBI communications, Williams is not aware of the report.)
bullet Recommends that the FBI ask the State Department to provide visa data on flight school students from Middle Eastern countries, which will facilitate FBI tracking efforts. [New York Times, 5/4/2002]
The memo is addressed to the following FBI Agents:
bullet Dave Frasca, chief of the Radical Fundamentalist Unit (RFU) at FBI headquarters;
bullet Elizabeth Harvey Matson, Mark Connor and Fred Stremmel, Intelligence Operations Specialists in the RFU;
bullet Rod Middleton, acting chief of the Usama bin Laden Unit (UBLU);
bullet Jennifer Maitner, an Intelligence Operations Specialist in the UBLU;
bullet Jack Cloonan, an agent on the New York FBI’s bin Laden unit, the I-49 squad; (see January 1996 and Spring 2000).
bullet Michael S. Butsch, an agent on another New York FBI squad dealing with other Sunni terrorists. [Federal Bureau of Investigation, 7/10/2001 pdf file; US Congress, 7/24/2003, pp. 135 pdf file]
However, the memo is not uploaded into the FBI’s information system until the end of the month and is apparently not received by all these people (see July 27, 2001 and after). Williams also shares some concerns with the CIA (see (July 27, 2001)). [Mercury News (San Jose), 5/23/2002] One anonymous government official who has seen the memo says, “This was as actionable a memo as could have been written by anyone.” [Insight, 5/27/2002] However, the memo is merely marked “routine,” rather than “urgent.” It is generally ignored, not shared with other FBI offices, and the recommendations are not taken. One colleague in New York replies at the time that the memo is “speculative and not very significant.” [Die Zeit (Hamburg), 10/1/2002; US Congress, 7/24/2003, pp. 135 pdf file] Williams is unaware of many FBI investigations and leads that could have given weight to his memo. Authorities later claim that Williams was only pursuing a hunch, but one familiar with classified information says, “This was not a vague hunch. He was doing a case on these guys.” [Mercury News (San Jose), 5/23/2002]

Entity Tags: Jennifer Maitner, Federal Bureau of Investigation, Fred Stremmel, Ghassan al Sharbi, Hani Hanjour, I-49, Jack Cloonan, Elizabeth Matson, Islamic Army of the Caucasus, David Frasca, Michael Butsch, Al-Muhajiroun, Zakaria Mustapha Soubra, Sheikh Omar Bakri Mohammed, Al-Qaeda, Rod Middleton, Osama bin Laden, Radical Fundamentalist Unit, Mark Connor, Ken Williams, Abu Zubaida

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Glyn Ford.Glyn Ford. [Source: British Labour Party]The European Parliament releases its final report on its findings about the secretive US surveillance program known as Echelon. The report, two years in the making, exhaustively details many of Echelon’s surveillance capabilities, and lists many of Echelon’s surveillance stations around the world. One of the more interesting sections of the report concerns its apparent use on behalf of US corporations. According to the report, Echelon—operated by the NSA as a highly classified surveillance program ostensibly for tracking terrorist threats and activities by nations hostile to the West—is also being used for corporate and industrial espionage, with information from the program being turned over to US corporations for their financial advantage. The report gives several instances of Echelon’s use by corporations. One is the use of Echelon to “lift… all the faxes and phone calls” between the European aircraft manufacturer Airbus and Saudi Arabian Airlines; that information was used by two American companies, Boeing and McDonnell Douglas, to outflank Airbus and win a $6 billion contract. The report also alleges that the French company Thomson-CSF lost a $1.3 billion satellite deal to Raytheon the same way. Glyn Ford, the MP who commissioned the report, says he doesn’t have a problem with Echelon itself, but in the way it is being used. “Now, you know, if we’re catching the bad guys, we’re completely in favor of that… What we’re concerned about is that some of the good guys in my constituency don’t have jobs because US corporations got an inside track on—on some global deal.” [Washington Post, 11/14/1999; CBS News, 2/27/2000; BBC, 7/6/2000; European Parliament, 7/11/2001] In 1977, the US government began providing Echelon-based intelligence to US corporations (see 1977). In April 2001, New Zealand journalist Nicky Hager testified about Echelon’s use by US allies for corporate and economic purposes (see April 2001), and former CIA director James Woolsey confirmed that US surveillance programs were used to benefit US corporations (see March 2000).

Entity Tags: US Department of Commerce, Thomson-CSF, Saudi Arabian Airlines, Glyn Ford, McDonnell Douglas, Central Intelligence Agency, Boeing Company, Echelon, Airbus, European Parliament, National Security Agency

Timeline Tags: Civil Liberties

The NSA intercepts “multiple phone calls from Abu Zubaida, bin Laden’s chief of operations, to the United States.” The timing and information contained in these intercepted phone calls has not been disclosed. [ABC News, 2/18/2002] In 2007, author and former CIA officer Robert Baer will comment that “apparently, when Abu Zubaida was captured, telephone records, including calls to the United States, were found in the house he was living in. The calls stopped on September 10, and resumed on September 16 (see September 16, 2001 and After). There’s nothing in the 9/11 Commission report about any of this, and I have no idea whether the leads were run down, the evidence lost or destroyed.” [Time, 12/7/2007] US intelligence had just been warned about a week earlier that Zubaida may be planning an attack on the US (see August 24, 2001). Zubaida’s exact position within al-Qaeda is disputed; he will be captured in 2002 (see March 28, 2002). It appears that a number of Western intelligence agencies were monitoring Zubaida’s calls since at least late 1998 (see October 1998 and After), and continue monitoring his calls in the weeks after 9/11 (see October 8, 2001).

Entity Tags: Robert Baer, Abu Zubaida, National Security Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Ali Saleh Kahlah al-Marri, from Qatar but a legal US resident, arrives in the US with his wife and five children, reportedly to pursue a master’s degree in computer science at Bradley University in Peoria, Illinois. [Peoria Journal Star, 12/19/2001; New York Times, 6/21/2004] Al-Marri appears to have been sent to the US by 9/11 mastermind Khalid Shaikh Mohammed (KSM). During his interrogation, KSM will identify al-Marri as “the point of contact for al-Qaeda operatives arriving in the US for September 11 follow-on operations.” He will describe al-Marri as “the perfect sleeper agent because he has studied in the United States, had no criminal record, and had a family with whom he could travel.” [Newsweek, 6/15/2003] However, there are doubts about the reliability of KSM’s interrogation, which is believed that have been obtained through the use of torture (see June 16, 2004). Al-Marri also lived in Illinois for part of 2000 under a different name. [New York Daily News, 1/11/2003] He is apparently related to Mohamed al-Khatani, who attempted to enter the US in August 2001 to join the 9/11 plot (see July 2002). [New York Times, 6/21/2004] In December 2001, al-Marri will be detained as a material witness to the 9/11 attacks (see December 12, 2001).

Entity Tags: Mohamed al-Khatani, Khalid Shaikh Mohammed, Ali Saleh Kahlah al-Marri

Timeline Tags: Torture of US Captives, Complete 911 Timeline

Page 1 of 7 (693 events)
previous | 1, 2, 3, 4, 5, 6, 7 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike