Profile: National Security Agency (NSA)
National Security Agency (NSA) was a participant or observer in the following events:
The New York Times agrees to a White House request to withhold publication of a potential “bombshell” story: an in-depth article revealing an enormous, and possibly illegal, warrantless wiretapping program executed by the NSA at President Bush’s behest after the 9/11 attacks. The Times will publish the story almost a year later (see December 15, 2005). In August 2006, the Times’s public editor, Byron Calame, will confirm the delay, and note that he has been “increasingly intrigued” by the various descriptions of the delay by Times editor Bill Keller (see December 16, 2005) and others. Keller will tell Calame that, contrary to some statements he and others have made, the story was originally scheduled to be published just days before the November 2004 presidential election. “The climactic discussion about whether to publish was right on the eve of the election,” Keller will say, though he will refuse to explain why he makes the final decision to hold the story. However, he will say that at this time he is not sure the story’s sources are reliable enough to warrant its publication before a close election. [New York Times, 8/13/2006]
The National Security Agency calls for proposals in regard to a new electronic surveillance program, the Advanced Capabilities for Intelligence Analysis (ACIA). Like its cousin, the Novel Intelligence from Massive Data (NIMD) project (see After September 11, 2001), ACIA will use a huge electronic database of information on US citizens and foreign nationals to track potential terrorists and terror plots. Like NIMD, ACIA will look for ways “to construct and use plausible futures in order to provide additional, novel interpretations for today’s collection” of intelligence information, according to the call for proposals. [National Journal, 1/20/2006]
Judge Colleen Kollar-Kotelly, the presiding judge over the Foreign Intelligence Surveillance Court (FISC), warns the Justice Department that if it does not stop using evidence collected with warrantless wiretaps to obtain warrants to continue surveillance, her court will be more reluctant to grant warrants for surveillance. Kollar-Kotelly has complained about this before (see 2004). Though both Kollar-Kotelly and her predecessor, Judge Royce Lambeth, express concerns to senior officials that Bush’s warrantless wiretapping program is inherently unconstitutional, neither judge feels that they have the authority to rule on the president’s power to order such surveillance. Instead, they work to preserve the integrity of the FISA process. Eventually, the judges reach a compromise with government lawyers: any case using evidence from warrantless wiretaps that is to be presented to the judges for FISA warrants to continue monitoring the same suspects will be “tagged,” and that evidence will not be used to obtain warrants. Those cases, numbering less than ten a year, are to be presented only to the presiding judge. Lambeth and Kollar-Kotelly both feel that the process will work primarily because of the trust they have developed in James Baker, the Justice Department’s liaison to FISC. Part of the problem stems from contradictory statements and claims from the administration; after the wiretapping program began (see After September 11, 2001, NSA chief Michael Hayden and then-Attorney General John Ashcroft made it clear in private meetings with the judges that President Bush wanted to gain all possible information on any potential terrorist attacks, and that such information-gathering must by necessity go beyond the FISA court’s probable-cause requirement. But more recent assertions by Hayden and Ashcroft’s successor, Alberto Gonzales (see December 19, 2005, claiming that NSA analysts do not listen to domestic calls unless they already have some evidence that one of the parties to the call has links to terrorism, contradict earlier administration claims to the judges. Kollar-Kotelly suspects that the entire truth of the matter is not being presented to her and the FISC. Her suspicions are validated when her court is, in spite of administration reassurances, again presented with warrant applications based on illegally obtained evidence (see Late 2005). [Washington Post, 2/9/2006]
Robert Mueller, the director of the FBI, answers the following question during testimony before the Senate: Barbara Mikulski (D-MD) asks Mueller and Attorney General Alberto Gonzales, “Can the National Security Agency, the great electronic snooper, spy on the American people?” Mueller replies, “I would say generally, they are not allowed to spy or to gather information on American citizens.” [New York Times, 12/15/2005]
The FBI and Justice Department quietly open an investigation into whether Representative Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee, improperly colluded with the American Israel Public Affairs Committee (AIPAC) to win reappointment as the committee’s ranking member. The investigation is not revealed to the public until October 2006 (see October 20, 2006). The investigation centers on allegations that Harman and AIPAC arranged for wealthy supporters to lobby House Minority Leader Nancy Pelosi (D-CA) on Harman’s behalf. The case is an outgrowth of a probe that has already led to the felony conviction of former DIA official Larry Franklin, who pled guilty to giving classified information to two AIPAC lobbyists (see October 5, 2005), and the lobbyists, Steve Rosen and Keith Weissman, who still face charges of passing that information on to Israel (see April 13, 1999-2004). The investigation has now expanded to determine if Harman’s campaign to persuade Pelosi to reappoint her to the committee may have involved AIPAC, and whether Harman promised to return the favor by using her influence to persuade the Justice Department to ease up on the AIPAC lobbyists. Reporter Timothy Burger will write: “If that happened, it might be construed as an illegal quid pro quo, depending on the context of the situation. But the sources caution that there has been no decision to charge anyone and that it is unclear whether Harman and AIPAC acted on the idea.” Both Harman and Pelosi are outspoken supporters of Israel, and have praised AIPAC for its efforts to further cement ties between Israel and the US. However, Congressional sources will say that Pelosi is furious at attempts by major donors to lobby on behalf of Harman. The LA Weekly reported in May that Harman “had some major contributors call Pelosi to impress upon her the importance of keeping Jane in place. According to these members, this tactic, too, hasn’t endeared Harman to Pelosi.” Another powerful figure has lobbied for Harman: entertainment industry billionaire Haim Saban, who made his fortune through the Mighty Morphin Power Rangers children’s entertainment franchise. It is unclear whether Saban had any contact with AIPAC, and if his efforts to lobby on Harman’s behalf were part of a larger, more orchestrated plan. [Time, 10/20/2006] When the story becomes public in October 2006, Harman will deny any improper or illegal conduct (see October 20, 2006). The investigation will eventually be dropped, supposedly for “lack of evidence.” In April 2009, evidence will surface that the NSA wiretapped Harman discussing a quid pro quo with a suspected Israeli agent, and that the investigation was not dropped because of lack of evidence, but because of the intervention of Attorney General Alberto Gonzales (see October 2005, Late 2005, and April 19, 2009). [Congressional Quarterly, 4/19/2009]
Entity Tags: Nancy Pelosi, Haim Saban, Federal Bureau of Investigation, American Israel Public Affairs Committee, Alberto R. Gonzales, House Intelligence Committee, Jane Harman, Steve Rosen, Timothy Burger, US Department of Justice, Keith Weissman, National Security Agency, Larry Franklin
Timeline Tags: Civil Liberties
On the heels of a speech by President Bush that stated the US government was obtaining court authorizations for each of its domestic surveillance activities (see June 9, 2005), the White House releases a “fact sheet” making the government’s case for its compliance with the law and the efficacy of its actions in “safeguarding our homeland.” The sheet claims: “The judicial branch has a strong oversight role in the application of the Patriot Act. Law enforcement officers must seek a federal judge’s permission to wiretap a foreign terrorist’s phone, track his calls, or search his property. These strict standards are fully consistent with the Constitution. Congress also oversees the application of the Patriot Act, and in more than three years there has not been a single verified abuse.” [White House, 6/9/2005] Bush made almost identical claims a year before (see April 19-20, 2004). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48]
In a Columbus, Ohio, speech praising the USA Patriot Act (see October 26, 2001), President Bush claims that when US government agencies wiretap anyone’s phones or email communications, they do so with a court order. Bush says: “Before the Patriot Act, agents could use wiretaps to investigate a person committing mail fraud, but not to investigate a foreign terrorist. The Patriot Act corrected all these pointless double standards—and America is safer as a result. One tool that has been especially important to law enforcement is called a roving wiretap. Roving wiretaps allow investigators to follow suspects who frequently change their means of communications. These wiretaps must be approved by a judge, and they have been used for years to catch drug dealers and other criminals. Yet, before the Patriot Act, agents investigating terrorists had to get a separate authorization for each phone they wanted to tap. That means terrorists could elude law enforcement by simply purchasing a new cell phone. The Patriot Act fixed the problem by allowing terrorism investigators to use the same wiretaps that were already being using against drug kingpins and mob bosses. The theory here is straightforward: If we have good tools to fight street crime and fraud, law enforcement should have the same tools to fight terrorism.” [White House, 6/9/2005] Bush made almost identical claims a year ago (see April 19-20, 2004). The same day as Bush makes his speech, the White House issues a fact sheet making the same claims (see June 9, 2005). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48]
Steven Bradbury. [Source: Mark Wilson / Getty Images]Steven Bradbury is nominated by President Bush to head the Justice Department’s Office of Legal Counsel (OLC). He will continue in that position on an acting basis into 2008, even though Congressional Democrats refuse to confirm him for the job, and even though his continuation in the post violates the Vacancies Reform Act, which precludes non-confirmed appointees for holding their positions for over 210 days (see October 16, 2007). [Washington Times, 9/20/2007; New York Times, 10/4/2007; TPM Muckraker, 10/19/2007] Bradbury takes over from Jack Goldsmith, who resigned the position under fire (see June 17, 2004).
Arm of the White House - Bradbury has a long history of supporting the White House’s agenda of expansive executive power. He came to the Justice Department after clerking with Supreme Court Justice Clarence Thomas and mentoring under former Whitewater special counsel Kenneth Starr. [New York Times, 10/4/2007] A co-founder of the Federalist Society [International Herald Tribune, 10/15/2007] , he is as staunchly conservative as any Bush appointee, but unlike some of the more outspoken of his colleagues, he comes across as low-key, pragmatic, and non-confrontational. As a Justice Department lawyer, Bradbury proved himself in line with the neoconservative views of Vice President Dick Cheney and Cheney’s chief of staff, David Addington. Former State Department senior official Philip Zelikow recalls Bradbury as being “fundamentally sympathetic to what the White House and the CIA wanted to do.” Bradbury was brought in to the OLC in part to rein in that office, which under its previous head Jack Goldsmith became the hub of the internal opposition to Bush’s policies of “enhanced interrogation” and domestic surveillance (see Late 2003-2005). In 2005, Bradbury signs two secret Justice Department memos giving broad authorization and legal justification for the CIA’s torture of terrorist suspects (see February 2005 and Late 2005),. Bradbury works closely with then-White House counsel and current attorney general Alberto Gonzales to bring the Justice Department back into line with White House demands. Conservative legal scholar Douglas Kmiec, who headed the OLC under former presidents Reagan and George H. W. Bush, says he believes the intense pressures from the current administration’s campaign against terrorism has warped the OLC’s proper role. “The office was designed to insulate against any need to be an advocate,” Kmiec says. Now the OLC has “lost its ability to say no.… The approach changed dramatically with opinions on the war on terror. The office became an advocate for the president’s policies.”
Probation - Bradbury was first considered for the job after Gonzales, newly confirmed as attorney general, rejected the idea of promoting Daniel Levin, the acting head of the OLC after Goldsmith’s departure. Gonzales considered Levin unsuitable for the job because of his independence and support for Goldsmith’s dissents. Instead, Gonzales chose Bradbury for the job. But the White House was uncertain of Bradbury’s reliability, and so placed him on a sort of “internal trial,” monitored by Gonzales’s replacement at the White House, Harriet Miers. Miers judged Bradbury’s loyalty to the president and his willingness to work with Gonzales in justifying White House policy decisions. Bradbury reportedly understands that his “probation” is intended for him to show just how compliant and supportive he is of the White House, and he soon wins the confidence of the White House by completely aligning himself with Addington. [New York Times, 10/4/2007]
'Sordid criminal conspiracy' - Harper’s Magazine commentator and lawyer Scott Horton will write in November 2007 that it is obvious “Bradbury was picked for one reason: to provide continuing OLC cover for the torture conspirators.… The Justice Department’s strategy has been to cloak Bradbury’s torture memoranda in secrecy classifications and then to lie aggressively about their very existence.… This episode demonstrates once more the intimate interrelationship between the policies of torture, secrecy, and the right to lie to the public and the courts in the interests of shielding the Bush administration from public embarrassment. And once more the Justice Department is enlisted not in the enforcement of the law, but rather in a sordid criminal conspiracy.” [Harper's, 11/7/2007]
Entity Tags: Kenneth Starr, Richard (“Dick”) Cheney, National Security Agency, Philip Zelikow, US Department of Justice, Steven Bradbury, Scott Horton, Vacancies Reform Act, James B. Comey Jr., Jack Goldsmith, Office of Legal Counsel (DOJ), Harper’s Magazine, Clarence Thomas, Central Intelligence Agency, Bush administration (43), Daniel Levin, Alberto R. Gonzales, Harriet E. Miers, Geneva Conventions, Douglas Kmiec, David S. Addington, George Herbert Walker Bush
Timeline Tags: Civil Liberties
It will later be reported that Haroon Rashid Aswat, the possible mastermind of the 7/7 London bombings (see July 7, 2005), talks on the phone about 20 times with two of the suicide bombers involved in the attack in the days before the bombings (see Late June-July 7, 2005). The Sunday Times will later note, “It is likely that the American National Security Agency—which has a powerful eavesdropping network—was monitoring the calls.” British investigators will not deny the phone calls took place, but will “caution that the calls may have been made to a phone linked to Aswat, rather than the man himself.” [Sunday Times (London), 7/31/2005] A book about the Mossad by Gordon Thomas will later claim that the Mossad learns by the early afternoon of the day of the 7/7 bombings that the CIA has a “strong supposition” Aswat made a number of calls to the bombers in the days before the bombings. [Thomas, 2007, pp. 519] This would support the theory that the NSA was tracking the calls. US intelligence had discovered Aswat’s location several weeks before the bombings, but then supposedly lost track of him again (see Early June 2005). If these calls were tracked, it is not clear why action was not taken against the bombers.
Representative Jane Harman (D-CA) is recorded telling a suspected Israeli agent that she would intervene with the Justice Department to try to get charges against two Israeli lobbyists reduced. In return, the Israeli agent promises to help Harman secure the chairmanship of the House Intelligence Committee. The Israeli agent will remain unidentified; the two lobbyists, Steve Rosen and Keith Weissman, are charged with espionage after they allegedly passed along classified information to the American Israel Public Affairs Committee (AIPAC—see April 13, 1999-2004). The conversation between Harman and the Israeli agent is recorded on an wiretap, reportedly by the NSA, mounted as part of a federal investigation into AIPAC’s potential espionage operations against the US (see October 5, 2005). According to transcripts of the wiretapped conversation, Harman agrees to “waddle into” the AIPAC case “if you think it’ll make a difference.” The Israeli agent asks Harman if she could speak with Attorney General Alberto Gonzales on Rosen’s and Weissman’s behalf. Harman replies that Gonzales might not cooperate, because he “just follows White House orders,” but other officials might be more pliable. In return, the Israeli agent promises to contact House Minority Leader Nancy Pelosi (D-CA) and attempt to persuade her to name Harman as chairwoman of the Intelligence Committee if the Democrats win control of the House in the November 2006 elections. Harman tells the agent, “This conversation doesn’t exist,” and hangs up. The contents of the conversation will later be confirmed by three separate sources, including two former senior national security officials. [Congressional Quarterly, 4/19/2009] Reporter Marc Ambinder will later write that Harman’s conversation may have been recorded by the FBI, and not the NSA, as part of the its investigation into Rosen and Weissman. [Atlantic Monthly, 4/20/2009]
Arthur Sulzberger. [Source: New York Times]George W. Bush summons New York Times publisher Arthur Sulzberger and Times editor Bill Keller to the Oval Office to try to dissuade them from running a landmark story revealing the NSA’s illegal wiretapping program (see December 15, 2005) that he authorized in 2002 (see Early 2002). In the meeeting, Bush warns Sulzberger and Keller that “there’ll be blood on your hands” if another terrorist attack were to occur, obviously implying that to reveal the nature of the program would invite terrorist strikes. Bush is unsuccessful in his attempt to quash the story. [Newsweek, 12/21/2005; Newsweek, 12/22/2008]
In his weekly radio address, President Bush claims that the US always obtains court warrants before launching electronic surveillance efforts. “The Patriot Act is helping America defeat our enemies while safeguarding civil liberties for all our people,” he says. “The judicial branch has a strong oversight role in the application of the Patriot Act. Under the act, law enforcement officers need a federal judge’s permission to wiretap a foreign terrorist’s phone or search his property. Congress also oversees our use of the Patriot Act. Attorney General Gonzales delivers regular reports on the Patriot Act to the House and the Senate.” [White House, 12/10/2005] Bush has made similar claims in the recent past (see April 19-20, 2004, June 9, 2005, and April 19-20, 2004). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48]
New York Times headline from article revealing NSA surveillance. [Source: CBS News]The New York Times reveals that after the 9/11 attacks, President Bush granted the National Security Agency (NSA) secret authorization to eavesdrop on Americans and others inside the US without going through the Foreign Intelligence Surveillance Act (FISA) court to obtain legal warrants (see Early 2002. The administration justifies its actions by claiming such eavesdropping, which includes wiretapping phones and reading e-mails, is necessary to find evidence of terrorist activities, and says the nation needs the program after the 9/11 attacks exposed deficiencies in the US intelligence community’s information gathering process, and because of what they characterize as the “handcuffing” of US intelligence agencies by restrictive laws. The Times has had the article for over a year; the White House prevailed on the Times not to publish its findings for that time, arguing that publication would jeopardize continuing investigations and warn potential terrorists that they were under scrutiny. Many believe that the White House wanted to delay the publication of the article until well after the 2004 presidential elections. The Times delayed publication for over a year, and agreed to suppress some information that administration officials say could be useful to terrorists. (Less than two weeks before the article is published, Bush tries to convince the Times not to print the article at all: see December 6, 2005.) Two days after the Times publishes its article, Bush will acknowledge the order, and accuse the Times of jeopardizing national security (see December 17, 2005). The NSA program eavesdrops without warrants on up to 500 people in the US at any given time, officials say; the overall numbers have likely reached into the thousands. Overseas, up to 7,000 people suspected of terrorist ties are being monitored. Officials point to the discovery of a plot by Ohio trucker and naturalized US citizen and alleged al-Qaeda supporter Iyman Faris to bring down the Brooklyn Bridge with blowtorches as evidence of the program’s efficacy. They also cite the disruption of an al-Qaeda plot to detonate fertilizer bombs outside of British pubs and train stations by the program. But, officials say, most people targeted by the NSA for warrantless wiretapping have never been charged with a crime, and many are targeted because of questionable evidence and groundless suspicion. Many raise an outcry against the program, including members of Congress, civil liberties groups, immigrant rights groups, and others who insist that the program undermines fundamental Constitutional protections of US citizens’ civil liberties and rights to privacy. Several other government programs to spy on Americans have been challenged, including the Federal Bureau of Investigation (FBI)‘s surveillance of US citizens’ library and Internet usage, the monitoring of peaceful antiwar protests, and the proposed use of public and private databases to hunt for terrorist links. In 2004, the Supreme Court overturned the administration’s claim that so-called “enemy detainees” were not entitled to judicial review of their indefinite detentions. Several senior officials say that when the warrantless wiretapping program began, it operated with few controls and almost no oversight outside of the NSA itself. The agency is not required to seek the approval of the Justice Department or anyone else outside the FISA court for its surveillance operations. Some NSA officials wanted nothing to do with a program they felt was patently illegal, according to a former senior Bush administration official. Internal concerns about the program prompted the Bush administration to briefly suspend the program while Justice Department officials audited it and eventually provided some guidelines for its operations. A complaint from Judge Colleen Kollar-Kotelly, the federal judge who oversees the FISA Court, helped spur the suspension, according to officials. Kollar-Kotelly questioned whether information obtained under the program was being improperly used as the basis for FISA wiretap warrant requests from the Justice Department. Some government lawyers say that the Justice Department may have deliberately misled Kollar-Kotelly and the FISA court about the program in order to keep the program under wraps. The judge insisted to Justice Department officials that any material gathered under the program not be used in seeking wiretap warrants from her court. The question also arose in the Faris case, when senior Justice Department officials worried that evidence obtained by warrantless wiretapping by the NSA of Faris could be used in court without having to lie to the court about its origins. [New York Times, 12/15/2005]
Retired AT&T technician Mark Klein (see July 7, 2009 and May 2004) is gladdened to see the New York Times’s reports on the Bush administration’s warrantless wiretapping program (see December 15, 2005 and December 24, 2005). Klein has known since 2002 that the National Security Agency (NSA) has been using AT&T facilities to illegally eavesdrop on American citizens’ telephone and Internet communications (see Late 2002, January 2003, October 2003, Fall 2003, Late 2003, Late 2003, and January 16, 2004). He has considered going public with his knowledge, but has so far refrained because, he will later explain, “[t]he atmosphere was still kind of scary.” He will later say of the Times report, “They seemed to be talking mainly about phone calls, but anyway, it was revealed that there was an illegal spying program going on, and I thought, ‘Ah, this would probably blow the whole thing,’ and I thought it would all come out, and I don’t need to do anything.” However, Klein is horrified to see the government’s response. He will say: “[W]hat came out was the government turned around and went on the offensive against anybody who would dare to criticize them.… They’re issuing threats: Anyone who has a security clearance and spills any beans here is in for prosecution. That was deliberately said by them several times on TV to intimidate anybody in, say, the NSA who knew the truth, intimidate them so they would not come forward. So that silenced anybody in the intelligence community” (see December 17, 2005, December 19, 2005, December 21, 2005, December 30, 2005, and January 25-26, 2006). In his 2009 book Wiring Up the Big Brother Machine… and Fighting It, Klein will write that the Justice Department’s December 2005 investigation into the leak of classified information that led to the Times reports (see December 30, 2005) “was obviously intended to silence Congress, the media, and any potential whistleblowers inside the NSA who might have been tempted to come forward. The administration was manipulating the secrecy oath which people had taken to get security clearances, turning it into a weapon to silence anyone who had knowledge of wrongdoing.” Klein decides that he must come forward. He never received a security clearance, so he cannot be threatened with legal action over violating such clearance. He will explain: “All I had and still have are some company documents and some knowledge of some illicit NSA installation at AT&T’s network. And if anybody—say, Congress—was willing to follow the trail, I can give them all the names they want, and they can go up the hierarchy of AT&T all the way up to Dave Dorman, who was the president back then, and they can go even higher, and they can find out who is responsible for this, and they can ask them under oath and subpoena what the heck is going on here, if they had the will to do it.” Klein later admits to some hesitation and trepidation at undertaking such an effort, and will cite the “McCarthyite” atmosphere he says the government has created in which “dissidents become the target of a lynch mob searching for ‘terrorists.’” But, he will write, he believes the Times stories are “a political indication of a shift at the top of government, a split of some kind which could provide an opening.… Maybe they would publish my material, I thought, and that would provide some protection.” By December 31, Klein writes a preface to his memo from almost two years before (see January 16, 2004 and December 31, 2005). [PBS Frontline, 5/15/2007; Klein, 2009, pp. 52-53]
A number of senators from both political parties lash out at President Bush’s acknowledgment that he reauthorized the NSA’s warrantless wiretapping program over thirty times since its inception in late 2001 (see December 17, 2005). Senator Russ Feingold (D-WI) says that such warrantless wiretapping is outside of the law. “He’s trying to claim somehow that the authorization for the Afghanistan attack after 9/11 permitted this, and that’s just absurd,” Feingold says. “There’s not a single senator or member of Congress who thought we were authorizing wiretaps.… If he needs a wiretap, the authority is already there—the [Foreign] Intelligence Surveillance Act (FISA). They can ask for a warrant to do that, and even if there’s an emergency situation, they can go for 72 hours as long as they give notice at the end of 72 hours.” Senator Arlen Specter (R-PA) says the behavior of the White House and NSA “can’t be condoned.” Specter, the chairman of the Senate Judiciary Committee, says his committee will immediately begin investigating the matter. Senator Charles Schumer (D-NY) says the report swayed his decision on the reauthorization of the USA Patriot Act. “Today’s revelation that the government listened in on thousands of phone conversations without getting a warrant is shocking and has greatly influenced my vote,” he says. [CNN, 12/16/2005]
President Bush acknowledges that he issued a 2002 executive order authorizing the National Security Agency (NSA) to wiretap US citizens’ phones and e-mails without proper warrants, and accuses the New York Times of jeopardizing national security by publishing its December 15 article (see Early 2002 and December 15, 2005). Bush says he was within the law to issue such an order, which many feel shatters fundamental Constitutional guarantees of liberty and privacy, but accuses the Times of breaking the law by publishing the article. Bush tells listeners during his weekly radio address that the executive order is “fully consistent” with his “constitutional responsibilities and authorities.” But, he continues, “Yesterday the existence of this secret program was revealed in media reports, after being improperly provided to news organizations. As a result, our enemies have learned information they should not have, and the unauthorized disclosure of this effort damages our national security and puts our citizens at risk.” He admits allowing the NSA to “to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations” in a program designed to “detect and prevent terrorist attacks.” Under the law, the NSA must obtain warrants from the Foreign Intelligence Surveillance Act (FISA) Court, but after Bush’s executive order, it was no longer required to do so. Bush justifies the order by citing the example of two 9/11 hijackers, Khalid Almihdhar and Nawaf Alhazmi, who, he says, “communicated while they were in the United States to other members of al-Qaeda who were overseas, but we didn’t know they were here until it was too late.” Because of the unconstitutional wiretapping program, it is “more likely that killers like these 9/11 hijackers will be identified and located in time, and the activities conducted under this authorization have helped detect and prevent possible terrorist attacks in the United States and abroad.” Bush also admits to reauthorizing the program “more than thirty times,” and adds, “I intend to do so for as long as our nation faces a continuing threat from al-Qaeda and related groups.” [CNN, 12/16/2005] Bush fails to address the likelihood that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).
After an NSA program to intercept telephone calls where one party is in the US and the other party is abroad is revealed (see December 15, 2005), President George Bush defends the program in a radio address. He justifies the program by implying that, if it had been in place before 9/11, it may have prevented the attacks: “As the 9/11 Commission pointed out, it was clear that terrorists inside the United States were communicating with terrorists abroad before the September the 11th attacks, and the commission criticized our nation’s inability to uncover links between terrorists here at home and terrorists abroad. Two of the terrorist hijackers who flew a jet into the Pentagon, Nawaf Alhazmi and Khalid Almihdhar, communicated while they were in the United States to other members of al-Qaeda who were overseas. But we didn’t know they were here until it was too late.” There are conflicting accounts of the circumstances of the hijackers’ calls and the NSA actually intercepted them, so it is unclear why they were not exploited to prevent the attacks (see Early 2000-Summer 2001, (Spring 2000), Summer 2002-Summer 2004, and March 15, 2004 and After). [WhiteHouse(.gov), 12/17/2005; US President, 12/26/2005 ] It is unclear which statements of the 9/11 Commission the president thinks he is referring to. The Commission’s final report touches on the NSA intercepts of the hijackers’ calls from the US in two places; in one it says: “[T]he NSA was supposed to let the FBI know of any indication of crime, espionage, or ‘terrorist enterprise’ so that the FBI could obtain the appropriate warrant. Later in this story, we will learn that while the NSA had the technical capability to report on communications with suspected terrorist facilities in the Middle East, the NSA did not seek FISA Court warrants to collect communications between individuals in the United States and foreign countries, because it believed that this was an FBI role,” (note: we do not actually learn this later in the 9/11 Commission report, this is the only mention). The second passage refers to Almihdhar’s time in San Diego and does not actually mention that the NSA intercepted the relevant calls, “Almihdhar’s mind seems to have been with his family in Yemen, as evidenced by calls he made from the apartment telephone.” [9/11 Commission, 7/24/2004, pp. 87-8, 222]
After the NSA’s warrantless wiretapping program is revealed (see Early 2002 and December 15, 2005), some commentators criticize the program. Americans have fundamental Constitutional protections that are enforceable in court whether their conversations are domestic or international, says law scholar Geoffrey Stone. Stone says that President Bush’s emphasis that NSA wiretapping only takes place on US calls to overseas phones or overseas e-mails “is no different, as far as the law is concerned, from saying we only do it on Tuesdays.” Former FBI national security law chief Michael Woods, who served in the position when Bush signed the NSA directive, calls the program “very dangerous.” Though Woods says the program was justifiable in the immediate aftermath of 9/11, “[By now] we ought to be past the time of emergency responses. We ought to have more considered views now…. We have time to debate a legal regime and what’s appropriate.” [Washington Post, 12/18/2005] Kate Martin, director of the Center for National Security Studies, says the secret order may amount to Bush authorizing criminal activity in direct violation of FISA. “This is as shocking a revelation as we have ever seen from the Bush administration,” she says. “It is, I believe, the first time a president has authorized government agencies to violate a specific criminal prohibition and eavesdrop on Americans.” The American Civil Liberties Union’s Caroline Frederickson says of the program, “It’s clear that the administration has been very willing to sacrifice civil liberties in its effort to exercise its authority on terrorism, to the extent that it authorizes criminal activity.” [Washington Post, 12/16/2005]
Attorney General Alberto Gonzales and NSA chief Lieutenant General Michael Hayden conduct their own “briefing” on the recently revealed NSA wiretapping program (see December 15, 2005) with the White House press corps. Gonzales and Hayden make the following points:
Gonzales says that he will not discuss the internal workings of the still-classified program, only what he calls its “legal underpinnings.”
He claims that the program, which he calls “the most classified program that exists in the United States government,” is legal because President Bush authorized it, and says that the idea that “the United States is somehow spying on American citizens” is wrong: it is “[v]ery, very important to understand that one party to the communication has to be outside the United States.”
He says that for the NSA to eavesdrop on a US citizen’s telephone or e-mail communications, “we have to have a reasonable basis to conclude that one party to the communication is a member of al-Qaeda, affiliated with al-Qaeda, or a member of an organization affiliated with al-Qaeda, or working in support of al-Qaeda.” The wiretapping program is an essential part of the administration’s war against terror, he says.
He goes on to claim that “the authorization to use force, which was passed by the Congress in the days following September 11th, constitutes” legal grounds for “this kind of signals intelligence.” [White House, 12/19/2005] The White House signed Congress’s Authorization to Use Military Force (AUMF) into law on September 18, 2001 (see September 14-18, 2001. [White House, 9/18/2001]
Hayden Claims Supreme Court Backing - While he admits that the Congressional authorization to use force against international terrorism does not specifically mention any kind of electronic surveillance, he refers the listeners to the Supreme Court case concerning alleged US terrorist Yaser Esam Hamdi (see June 28, 2004), in which the Court ruled that Hamdi had the legal right to challenge his detention. “[T]he United States government took the position that Congress had authorized that detention in the authorization to use force, even though the authorization to use force never mentions the word ‘detention.’ And the Supreme Court, a plurality written by Justice O’Connor agreed. She said, it was clear and unmistakable that the Congress had authorized the detention of an American citizen captured on the battlefield as an enemy combatant for the remainder—the duration of the hostilities. So even though the authorization to use force did not mention the word, ‘detention,’ she felt that detention of enemy soldiers captured on the battlefield was a fundamental incident of waging war, and therefore, had been authorized by Congress when they used the words, ‘authorize the President to use all necessary and appropriate force.’ For the same reason, we believe signals intelligence is even more a fundamental incident of war, and we believe has been authorized by the Congress. And even though signals intelligence is not mentioned in the authorization to use force, we believe that the Court would apply the same reasoning to recognize the authorization by Congress to engage in this kind of electronic surveillance.”
Bush 'Very Concerned' With Protecting Civil Liberties - Gonzales insists, Bush “is very concerned about the protection of civil liberties, and that’s why we’ve got strict parameters, strict guidelines in place out at NSA to ensure that the program is operating in a way that is consistent with the President’s directives.” He adds, “[W]e feel comfortable that this surveillance is consistent with requirements of the Fourth Amendment. The touchstone of the Fourth Amendment is reasonableness, and the Supreme Court has long held that there are exceptions to the warrant requirement in—when special needs outside the law enforcement arena. And we think that that standard has been met here.”
Wiretapping Essential in Catching Terrorists - Hayden reiterates how important the wiretapping is to catching terrorists and stopping potential attacks against US targets, though he and Gonzales both refuse to say what, if any, terrorist plots or what terror suspects might have been captured through the NSA wiretapping program. Hayden does say, “This program has been successful in detecting and preventing attacks inside the United States.…I can say unequivocally, all right, that we have got information through this program that would not otherwise have been available,” though he refuses to cite specifics. He admits that there have been some errors in surveilling innocent US citizens, though he refuses to give any details, and says those errors were quickly corrected.
Administration Not Required to Go Through FISA - Gonzales, who is the main speaker in the briefing, reiterates that while the administration continues to seek warrants from the Foreign Intelligence Surveillance (FISA) court, “we are not legally required to do, in this particular case, because the law requires that we—FISA requires that we get a court order, unless authorized by a statute, and we believe that authorization has occurred.” He justifies the administration’s refusal to use the FISA court for obtaining warrants by insisting that NSA officials “tell me that we don’t have the speed and the agility that we need, in all circumstances, to deal with this new kind of enemy. You have to remember that FISA was passed by the Congress in 1978. There have been tremendous advances in technology… since then.” Hayden adds, “I don’t think anyone could claim that FISA was envisaged as a tool to cover armed enemy combatants in preparation for attacks inside the United States. And that’s what this authorization under the President is designed to help us do.”
'Balancing' of Civil Liberties, National Security - Hayden says the warrantless wiretapping program is part of “a balancing between security and liberty,” a more “aggressive” operation “than would be traditionally available under FISA. It is also less intrusive. It deals only with international calls. It is generally for far shorter periods of time. And it is not designed to collect reams of intelligence, but to detect and warn and prevent about attacks. And, therefore, that’s where we’ve decided to draw that balance between security and liberty.”
Media Leaks Damaging to National Security - Gonzales refuses to talk about when any members of Congress were briefed on the program or what they were told, but he does imply that there will be some sort of leak investigation as to how the New York Times found out about the program: “[T]his is really hurting national security, this has really hurt our country, and we are concerned that a very valuable tool has been compromised. As to whether or not there will be a leak investigation, we’ll just have to wait and see.”
No Evidence of Compromised National Security - When asked whether he can cite any evidence that the revelation of the program’s existence has actually compromised anything—“Don’t you assume that the other side thinks we’re listening to them? I mean, come on,” one reporter says—Gonzales responds, rather confusingly, “I think the existence of this program, the confirmation of the—I mean, the fact that this program exists, in my judgment, has compromised national security, as the President indicated on Saturday.”
Easier to Sidestep FISA Instead of Seek Congressional Approval - He does admit that the administration decided to sidestep the FISA court entirely instead of attempt to work with Congress to rewrite the FISA statutes because “we were advised that that would be difficult, if not impossible” to amend the law to the White House’s satisfaction. Gonzales says those who are concerned about the program being excessively intrusive or a threat to American civil liberties simply “don’t understand the specifics of the program, they don’t understand the strict safeguards within the program.… Part of the reason for this press brief today is to have you help us educate the American people and the American Congress about what we’re doing and the legal basis for what we’re doing.” He adds that any legal experts who believe the program is illegal are basing their judgments “on very limited information.”
Tough Questioning - One reporter asks an unusually tough series of questions to Gonzales: “Do you think the government has the right to break the law?”, to which Gonzales replies, “Absolutely not. I don’t believe anyone is above the law.” The reporter then says, “You have stretched this resolution for war into giving you carte blanche to do anything you want to do,” to which Gonzales replies cryptically, “Well, one might make that same argument in connection with detention of American citizens, which is far more intrusive than listening into a conversation.” The reporter insists, “You’re never supposed to spy on Americans,” and Gonzales deflects the responsibility for the decision back onto the Supreme Court.
Administration Will Tell Nation What It Needs to Know - Gonzales says the administration has no intention of releasing any of the classified legal opinions underpinning the program, and this press briefing is one of the methods by which the administration will “educat[e] the American people…and the Congress” to give them what they need to know about the program. [White House, 12/19/2005]
During a press conference, President Bush is asked if he will order an investigation into the leak that revealed the NSA’s domestic surveillance program (see December 15, 2005). Bush says he has not directly ordered an investigation, presuming the Justice Department is handling the matter, but he calls the leak “a shameful act for someone to disclose this very important program in a time of war.” And he implies that the leak, and the New York Times’s decision to print the resulting article, is treason: “The fact that we’re discussing this program is helping the enemy.… But it is a shameful act by somebody who has got secrets of the United States government and feels like they need to disclose them publicly.” When asked why he “skip[ped] the basic safeguards of asking courts for permission for the intercepts,” he answers: “[R]ight after September the 11th, I knew we were fighting a different kind of war. And so I asked people in my administration to analyze how best for me and our government to do the job people expect us to do, which is to detect and prevent a possible attack. That’s what the American people want. We looked at the possible scenarios. And the people responsible for helping us protect and defend came forth with the current program, because it enables us to move faster and quicker. And that’s important. We’ve got to be fast on our feet, quick to detect and prevent. We use FISA still—you’re referring to the FISA court in your question—of course, we use FISAs. But FISA is for long-term monitoring. What is needed in order to protect the American people is the ability to move quickly to detect. Now, having suggested this idea, I then, obviously, went to the question, is it legal to do so? I am—I swore to uphold the laws. Do I have the legal authority to do this? And the answer is, absolutely.… [T]he legal authority is derived from the Constitution, as well as the authorization of force by the United States Congress” (see September 14-18, 2001). A reporter asks why “has your administration not sought to get changes in the law instead of bypassing it, as some of your critics have said?” Bush responds by reiterating the point that the program is “limited in nature to those that are known al-Qaeda ties and/or affiliates.” He then reiterates another point: he believes he has the authority to bypass the law. He “share[s] the same concerns” about civil liberties that members of Congress have expressed (see December 16, 2005).” However, his reassurances that domestic calls are not being monitored are not absolute. “[I]f you’re calling from Houston to [Los Angeles], that call is not monitored. And if there was ever any need to monitor, there would be a process to do that.” He is asked: “You say you have an obligation to protect us. Then why not monitor those calls between Houston and LA? If the threat is so great, and you use the same logic, why not monitor those calls? Americans thought they weren’t being spied on in calls overseas—why not within the country, if the threat is so great?” Bush replies: “We will, under current law, if we have to. We will monitor those calls. And that’s why there is a FISA law. We will apply for the right to do so. And there’s a difference—let me finish—there is a difference between detecting so we can prevent, and monitoring. And it’s important to know the distinction between the two.” He concludes, “I just want to assure the American people that, one, I’ve got the authority to do this; two, it is a necessary part of my job to protect you; and, three, we’re guarding your civil liberties.” [White House, 12/19/2005]
DARPA logo. [Source: Duke University]The computer and technology experts at Ars Technica, a well-regarded Web publication which describes itself as focusing on “the art of technology,” speculate on the technology behind the NSA warrantless wiretapping program recently revealed to the public (see December 15, 2005). The Ars Technica experts believe that Senator Jay Rockefeller (D-WV)‘s 2003 comparison between the program and the Total Information Awareness (TIA) project (see March 2002) is the most apt. They believe that the NSA wiretapping program may be built upon the foundation of a shadowy, highly classified surveillance program called Echelon. They write, “This system’s purpose would be to monitor communications and detect would-be terrorists and plots before they happen… This project is not interested in funding ‘evolutionary’ changes in technology, e.g., bit-step improvements to current data mining and storage techniques. Rather, the amount of data that the directors are anticipating (petabytes!) would require massive leaps in technology (and perhaps also some massive leaps in surveillance laws).” [Ars Technica, 12/20/2005; Ars Technica, 2007] Data storage measured in petabytes is a colossal capacity; a petabyte is 1,024 terabytes, and a single terabyte is 1,024 gigabytes, the usual measurement for hard drive capacity. [TechTerms, 2007] The Ars Technica experts continue, “According to DARPA, such data collection ‘increases information coverage by an order of magnitude,’ and ultimately ‘requires keeping track of individuals and understanding how they fit into models.’” They go on to note that the NSA wiretapping program was instituted shortly after the TIA project was quashed by Congress, and say they believe the NSA program is an extension and an outgrowth of TIA. They note that “the FBI requested the legal authorization to do very high-volume monitoring of digital calls” in 1995, that there is “no way for the judicial system to approve warrants for the number of calls that the FBI wanted to monitor,” and that the FBI “could never hire enough humans to be able to monitor that many calls simultaneously, which means that they’d have to use voice recognition technology to look for ‘hits’ that they could then follow up on with human wiretaps.” The Ars Technica experts believe the NSA is using “some kind of high-volume, automated voice recognition and pattern matching system,” employing a form of “smart filtering” that would weed through perhaps hundreds of thousands of computer-monitored calls and turning a fraction of those calls over to human analysts for evaluation: “[Y]es, this kind of real-time voice recognition, crude semantic parsing and pattern matching is doable with today’s technology, especially when you have a budget like the NSA.” In a follow-up, Ars Technica technology specialist and self-described conservative and “privacy nazi” Jon Stokes writes of his own concerns over the program, noting that the program is too wide-reaching and too blunt to actually catch many real terrorists, and that the program is a tremendous intrusion into Americans’ fundamental privacy: “The problem is not that such large-scale industrial fishing invariably catches a few dolphins along with the tuna, but that between 99.999 and 100 percent of what you’re going to get is dolphin.” Stokes also warns that such an intrusive surveillance program will not only violate privacy rights, but be quite ineffective: “As the TSA, with its strip-searching of people’s elderly grandparents, abundantly proves every holiday season, blunt instruments and scorched earth tactics are of dubious value in catching genuine bad actors. In fact, blunt instruments and wide nets are the easiest for professional bad guys to evade. All you need to beat such surveillance tools is patience and know-how.…Blunt instruments like airport facial recognition software and random subway bag searches produce much more noise than they do signal, and any engineer or computer scientist worth his or her salt will tell you that an intelligent, targeted, low-tech approach beats a brute-force high-tech approach every time. There is no high-tech substitute for human intelligence gathering. In fact…an overload of crudely processed information is actually more likely to lead an analyst astray than it is to produce any useful insight.…In the end, brute force security techniques are not only corrosive to democratic values but they’re also bad for national security. They waste massive resources that could be spent more effectively elsewhere, and they give governments and countries a false sense of security that a savvy enemy can exploit to devastating effect.…[I]t’s not just enough to have sound intelligence; you also need political leaders who have the wisdom to use that intelligence appropriately.” [Ars Technica, 12/20/2005]
Judge James Robertson. [Source: US Courts.gov]US District Judge James Robertson resigns from the Foreign Intelligence Surveillance Court (FISC), a special, secret court set up to oversee government surveillance operations. Robertson refuses to comment on his resignation from FISC, but two of Robertson’s associates say that Robertson’s resignation stems from his deep concerns that the NSA’s warrantless domestic wiretapping program (see Early 2002) is not legal, and has tainted the work of the court. Robertson, formerly one of ten “revolving” members of FISC who periodically rotate in and out of duty on the court, continues to serve as a Washington, DC district judge. Colleagues of Robertson say that he is concerned that information gained from the warrantless surveillance under Bush’s program subsequently could have been used to obtain warrants under the FISA program, a practice specifically prohibited by the court. Robertson, a Clinton appointee selected for FISC by Chief Justice William Rehnquist, has also been critical of the Bush administration’s treatment of detainees at the Guantanamo Bay prison camp, and recently issued a decision that sidetracked Bush’s use of military tribunals for some Guantanamo detainees (see November 8, 2004). Even though Robertson was hand-picked for FISC by the deeply conservative Rehnquist, who expressly selected judges who took an expansive view of wiretapping and other surveillance programs, [Associated Press, 12/21/2005] some conservative critics such as Jim Kouri, a vice-president of the National Association of Chiefs of Police, call Robertson a “left-leaning, liberal” “Clintonista” jurist with ties to “ultra-liberal” civil rights associations and a desire for media attention (though Robertson has refused to speak to the press about his resignation). Critics also demand that less attention be directed at the NSA wiretapping program and more on finding out who leaked the information that led to the New York Times’s recent revelatory articles on the program (see Early 2002). GOP strategist Mike Baker says in response to Robertson’s resignation, “Only the Democrats make confirmations and appointments of people by Republican President [sic] a question of ideology. The news media try to portray [Robertson] as non-partisan. He’s as liberal as they come and as partisan as they come.” [Men's News, 12/23/2005] Presiding judge Colleen Kollar-Kotelly is arranging for a classified briefing of all the remaining FISC judges on the wiretapping program, partly in order to bring any doubts harbored by other justices into the open. Sources say Kollar-Kotelly expects top NSA and Justice Department officials to outline the program for the judges. No one on FISC except for Kollar-Kotelly and her predecessor, Judge Royce Lambeth, have ever been briefed on the program. If the judges are not satisfied with the information provided in this briefing, they could take action, which could include anything from demanding proof from the Justice Department that previous wiretaps were not tainted, could refuse to issue warrants based on secretly-obtained evidence, or, conceivably, could disband the entire court, especially in light of Bush’s recent suggestions that he has the power to bypass the court if he so desires. [Washington Post, 12/22/2005]
Jonathan Alter. [Source: Publicity photo via Greater Talent Network]Reporter and political pundit Jonathan Alter writes that President Bush’s attempt to kill the New York Times domestic wiretapping story (see December 15, 2005 and December 6, 2005), which the Times delayed for over a year at the White House’s request, is not an attempt to protect national security, as Bush will say in his response to the article (see December 17, 2005), but “because he knew that it would reveal him as a law-breaker.” Alter continues, “He insists he had ‘legal authority derived from the Constitution and Congressional resolution authorizing force.’ But the Constitution explicitly requires the president to obey the law. And the post-9/11 congressional resolution authorizing ‘all necessary force’ in fighting terrorism was made in clear reference to military intervention. It did not scrap the Constitution and allow the president to do whatever he pleased in any area in the name of fighting terrorism.” Alter is puzzled that Bush felt the need for the program when the 1978 Foreign Intelligence Surveillance Act (see 1978) “allows the government to eavesdrop on its own, then retroactively justify it to the court, essentially obtaining a warrant after the fact.” Alter says that only four of “tens of thousands” of FISA requests have ever been rejected, and, “There was no indication the existing system was slow—as the president seemed to claim in his press conference—or in any way required extra-constitutional action.” He concludes: “[Bush] knew publication would cause him great embarrassment and trouble for the rest of his presidency. It was for that reason—and less out of genuine concern about national security—that George W. Bush tried so hard to kill the New York Times story. …We’re seeing clearly now that Bush thought 9/11 gave him license to act like a dictator, or in his own mind, no doubt, like Abraham Lincoln during the Civil War.” [Newsweek, 12/21/2005]
Reporter Arlene Getz equates President Bush’s attempt at controlling the media exposure of the warrantless wiretapping program (see December 15, 2005 and December 6, 2005) to similar media manipulation programs undertaken by the white apartheid regime in South Africa during the 1980s, and the acceptance of the controlled media by some South African citizens. Getz, who reported extensively on South Africa’s government, writes: “For anyone who has lived under an authoritarian regime, phone tapping—or at least the threat of it—is always a given. But US citizens have always been lucky enough to believe themselves protected from such government intrusion. So why have they reacted so insipidly to yet another post-9/11 erosion of US civil liberties?” She extends the comparison: “While Bush uses the rhetoric of ‘evildoers’ and the ‘global war on terror,’ Pretoria talked of ‘total onslaught.’ This was the catchphrase of P. W. Botha, South Africa’s head of state from 1978 to 1989.…Botha liked to tell South Africans that the country was under ‘total onslaught’ from forces both within and without, and that this global assault was his rationale for allowing opponents to be jailed, beaten or killed. Likewise, the Bush administration has adopted the argument that anything is justified in the name of national security.” [Newsweek, 12/21/2005]
Former Senate Majority Leader Tom Daschle (D-SD) writes that Congress explicitly rejected several attempts by the Bush administration to provide him with war-making authority and the authority to wiretap and monitor US citizens “in the United States” when it approved the September 18, 2001 authorization to use military force (AUMF) against terrorists (see September 14-18, 2001). Instead, the Bush administration merely usurped that authority and launched—or expanded (see Spring 2001)—its warrantless wiretapping program, conducted by the NSA. Since then, the Bush administration and the Justice Department have both repeatedly asserted that the AUMF gave them the right to conduct the wiretapping program, an assertion that Daschle says is flatly wrong. On December 21, the Justice Department admitted in a letter that the October 2001 presidential order authorizing warrantless eavesdropping on US citizens did not comply with “the ‘procedures’ of” the law that has regulated domestic espionage since 1978, known as the Foreign Intelligence Surveillance Act (FISA). FISA established a secret intelligence court and made it a criminal offense to conduct electronic surveillance without a warrant from that court, “except as authorized by statute.” However, the letter, signed by Assistant Attorney General William Moschella, argues that the AUMF gave the administration the authority to conduct the program. [Washington Post, 12/22/2005] The letter continues the argument that Congress gave President Bush the implict authority to create an exception to FISA’s warrant requirements, though the AUMF resolution did not mention surveillance and made no reference to the president’s intelligence-gathering authority. The Bush administration kept the program secret until it was revealed by the New York Times on December 15, 2005. Moschella argues that secret intelligence-gathering, even against US citizens, is “a fundamental incident to the use of military force” and that its absence from the resolution “cannot be read to exclude this long-recognized and essential authority to conduct communications intelligence targeted at the enemy.” Such eavesdropping, he argued, must by necessity include conversations in which one party is in the United States. [William Moschella, 12/22/2005 ] Daschle, one of the primary authors of the resolution, says that Moschella and the Bush administration are wrong in their assertions: “I did not and never would have supported giving authority to the president for such wiretaps. I am also confident that the 98 senators who voted in favor of authorization of force against al-Qaeda did not believe that they were also voting for warrantless domestic surveillance” (see September 12-18, 2001). [Washington Post, 12/23/2005]
Entity Tags: National Security Agency, Bush administration (43), Authorization to Use Military Force (AUMF), Al-Qaeda, Foreign Intelligence Surveillance Act, George W. Bush, Osama bin Laden, US Department of Justice, Foreign Intelligence Surveillance Court, New York Times, William E. Moschella, Richard (“Dick”) Cheney, Tom Daschle
Timeline Tags: Civil Liberties
Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” [New York Times, 12/24/2005]
Entity Tags: US Department of Defense, US Department of Justice, Total Information Awareness, New York Times, US Department of Homeland Security, Computer Assisted Passenger Prescreening System, Bush administration (43), Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, George W. Bush, National Security Agency, Phil Karn
Timeline Tags: Civil Liberties
Suzanne Spaulding, a former counsel for the CIA, the Senate and House intelligence commission, and executive director of the National Terrorism Commission from 1999 through 2000, writes an op-ed criticizing the Bush administration for its domestic surveillance program. She writes that the three main sources of oversight and restraint on Bush’s unfettered efforts to monitor US citizens—Congress, the judiciary, and the American people—have failed to halt what she calls “this extraordinary exercise of presidential power.” Spaulding, who will testify along similar lines before the Senate over a year later (see April 11, 2007), writes, “Ironically, if it is ultimately determined that this domestic surveillance program reflects the exercise of unchecked power in contravention of law, it will wind up weakening the presidency. Once again, we will confront the challenge of restoring Americans’ faith in the rule of law and our system of checks and balances.” The pretense of oversight by the administration, in providing limited and perhaps misleading briefings on the program only to the so-called “Gang of Eight” Congressional leaders, is superficial and ineffective, she writes; the entire process “effectively eliminates the possibility of any careful oversight.” She notes that because of the severe restrictions both in the information doled out to these Congressional leaders, and their strict prohibition on discussing the information with anyone else, even other intelligence panel members, “[i]t is virtually impossible for individual members of Congress, particularly members of the minority party, to take any effective action if they have concerns about what they have heard in one of these briefings. It is not realistic to expect them, working alone, to sort through complex legal issues, conduct the kind of factual investigation required for true oversight and develop an appropriate legislative response.” Congressional oversight is key to retaining the trust of the US citizenry, she writes, and adds that that particular principle was well understood at the CIA while she was there. Oversight “is vital for a secret agency operating in a democracy. True oversight helps clarify the authority under which intelligence professionals operate. And when risky operations are revealed, it is important to have members of Congress reassure the public that they have been overseeing the operation. The briefings reportedly provided on the National Security Agency (NSA) surveillance program reflect, instead, a ‘check the box’ mentality—allowing administration officials to claim that they had informed Congress without having really achieved the objectives of oversight.” While those few members of Congress are given little real information, the judiciary, particularly the Foreign Intelligence Surveillance Court (FISC), is cut out of the process entirely. “Instead of going to a judge on the secret court that was specifically established to authorize foreign intelligence surveillance inside the United States, we are told that an NSA shift supervisor was able to sign off on the warrantless surveillance of Americans,” she writes. “That’s neither a check nor a balance. The primary duty of the NSA shift supervisor, who essentially works for the president, is to collect intelligence. The task of the judge is to ensure that the legal standards set out in the 1978 Foreign Intelligence Surveillance Act (FISA) have been met. Which one has stronger independence to say no, if no needs to be said? The objectives of the surveillance program, as described in news reports, seem laudable. The government should be running to ground the contacts listed in a suspected terrorist’s cell phone, for example. What is troubling is that this domestic spying is being done in apparent contravention of FISA, for reasons that still are not clear.” In her piece she takes issue with the Bush administration’s insistence that its surveillance program is legal and necessary. She makes the following case:
Specious Arguments to Duck FISA Court - The argument that the FISA Court is too slow to respond to immediate needs for domestic surveillance is specious, she says. “FISA anticipates situations in which speed is essential. It allows the government to start eavesdropping without a court order and to keep it going for a maximum of three days. And while the FISA application process is often burdensome in routine cases, it can also move with remarkable speed when necessary, with applications written and approved in just a few hours.” Instead, she says that the Bush administration must have dodged FISC because their wiretaps didn’t meet FISA standards of probable cause. Since FISC is staffed by judges hand-picked by conservative then-Supreme Court Chief Justice William Rehnquist, “who presumably felt that they had the right temperament and expertise to understand the national security imperatives as well as the need to protect civil liberties,” and since FISC has granted all but four of the more than 5,645 requests for wiretaps and surveillance made by the administration since 2001, to argue that FISC is unresponsive is simply wrong-headed. And, she notes, if the administration felt that FISA’s standards were too strict, it could have moved to amend the law to allow more leniency in obtaining such warrants. It has not done so since the passage of the 2001 Patriot Act. She writes, “The administration reportedly did not think it could get an amendment without exposing details of the program. But this is not the first time the intelligence community has needed a change in the law to allow it to undertake sensitive intelligence activities that could not be disclosed. In the past, Congress and the administration have worked together to find a way to accomplish what was needed. It was never previously considered an option to simply decide that finding a legislative solution was too hard and that the executive branch could just ignore the law rather than fix it.”
No Justification for Keeping Program Secret - In addition, the administration has consistently failed to make a case for keeping the domestic wiretapping policy secret for four years. US-designated terrorist groups already know that the government listens to their cell phone conversations whenever possible, and they are well aware of the various publicly known programs to search through millions of electronic communications, such as the NSA’s Echelon program (see April 4, 2001). “So what do the terrorists learn from a general public discussion about the legal authority being relied upon to target their conversations?” she asks. “Presumably very little. What does the American public lose by not having the public discussion? We lose the opportunity to hold our elected leaders accountable for what they do on our behalf.”
Assertions that Program Authorized by Congress Fallacious - The argument advanced by Attorney General Alberto Gonzales that says the program does not violate the law because Congress’s post-9/11 authorization of force against terrorists gives the administration the right to circumvent FISA is equally specious, she argues. “FISA does provide for criminal penalties if surveillance is conducted under color of law ‘except as authorized by statute.’ This is a reference to either FISA or the criminal wiretap statute. A resolution, such as the Use of Force resolution, does not provide statutory authority. Moreover, FISA specifically provides for warrantless surveillance for up to 15 days after a declaration of war. Why would Congress include that provision if a mere Use of Force resolution could render FISA inapplicable? The law clearly states that the criminal wiretap statute and FISA are ‘the exclusive means by which electronic surveillance…and the interception of domestic wire, oral, and electronic communications may be conducted.’ If these authorities are exclusive, there is no other legal authority that can authorize warrantless surveillance. Courts generally will not view such a clear statutory statement as having been overruled by a later congressional action unless there is an equally clear indication that Congress intended to do that.” Therefore, by any legal standard, the administration’s program is, apparently, illegal.
No Inherent Presidential Authority - The ultimate argument by Bush officials, that the president has some sort of inherent authority as commander-in-chief to authorize illegal wiretaps, is the same groundless legal argument recently used to justify the use of torture by US intelligence and law enforcement agents (see December 28, 2001). That argument was withdrawn, Spaulding notes, after it became publicly known. While the courts have not specifically ruled on this particular argument, Spaulding notes that the Supreme Court refused to recognize then-President Harry Truman’s attempt to seize control of the nation’s steel mills to avert a possible strike during the Korean War. The Supreme Court ruled “that the president’s inherent authority is at its weakest in areas where Congress has already legislated. It ruled that to find inherent presidential authority when Congress has explicitly withheld that authority—as it has in FISA—‘is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between president and Congress.’” She notes that in 2004, the Supreme Court rejected the argument for unchecked presidential power in the Hamdi case (see June 28, 2004), with Justice Sandra Day O’Connor writing for the court, “We have long since made clear that a state of war is not a blank check for the president when it comes to the rights of the Nation’s citizens. …Whatever power the United States Constitution envisions for the Executive in its exchanges with… enemy organizations in times of conflict, it most assuredly envisions a role for all three branches when individual liberties are at stake.” Spaulding concludes, “The rule of law and our system of checks and balances are not a source of weakness or a luxury of peace. As O’Connor reminded us in Hamdi, ‘It is during our most challenging and uncertain moments…that we must preserve our commitment at home to the principles for which we fight abroad.’” [Washington Post, 12/25/2005]
Entity Tags: Sandra Day O’Connor, William Rehnquist, USA Patriot Act, Suzanne Spaulding, National Security Agency, US Supreme Court, Harry S. Truman, Alberto R. Gonzales, “Gang of Eight”, National Commission on Terrorism, Central Intelligence Agency, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Echelon, Bush administration (43)
Timeline Tags: Civil Liberties
The Justice Department opens an investigation into the leak of classified information about the Bush domestic surveillance program. The investigation focuses on disclosures to the New York Times about the secret warrantless wiretapping program conducted by the National Security Agency since shortly after the 9/11 attacks (see Early 2002). The White House claims that the Justice Department initiated the investigation on its own after receiving a request from the NSA, and that it was not even informed of the investigation until the decision had already been made. But White House spokesman Trent Duffy hails the investigation, and implicitly accuses the Times of aiding and abetting terrorists by printing its stories. “The leaking of classified information is a serious issue,” Duffy says. “The fact is that al-Qaeda’s playbook is not printed on Page One, and when America’s is, it has serious ramifications.” [Associated Press, 12/30/2005] President Bush fuels the attack on the Times when he says, “The fact that we’re discussing this program is helping the enemy.” [New York Times, 12/30/2005] Many outside of the administration have accused the wiretapping program, which functions without external oversight or court warrants, of being illegal, and Bush of breaking the law by authorizing it. Administration officials insist that Bush has the power to make such a decision, both under the Constitution’s war powers provision and under the post-9/11 Congressional authorization to use military force against terrorism, even though, as former Senate Majority Leader Tom Daschle recalls, Congress explicitly refused to give Bush the authority to take military action inside the US itself (see December 21-22, 2005). And, in a recent letter to the chairs of the House and Senate Intelligence Committees, the White House claimed that the nation’s security needs outweigh the needs of the citizenry to be secure from secret government surveillance. [Associated Press, 12/30/2005] Others disagree. The American Civil Liberties Union’s Anthony Romero says, “President Bush broke the law and lied to the American people when he unilaterally authorized secret wiretaps of US citizens. But rather than focus on this constitutional crisis, Attorney General [Alberto] Gonzales is cracking down on critics of his friend and boss. Our nation is strengthened, not weakened, by those whistle-blowers who are courageous enough to speak out on violations of the law.” And Marc Rotenberg, the executive director of the Electronic Privacy Information Center, says the NSA should be the focus of an investigation to determine if it broke federal surveillance laws. Tom Devine of the Government Accountability Project suggests a middle course. His group does not object to a limited investigation into the leak of classified information, but, he says, if the administration does “a blanket witch hunt, which I fear, it would trample all over good government laws” designed to protect government workers who expose wrongdoing. “The whole reason we have whistle-blower laws is so that government workers can act as the public’s eyes and ears to expose illegality or abuse of power.” [New York Times, 12/30/2005] Ultimately, this leak investigation may not achieve much, according to law professor Carl Tobias. “It doesn’t seem to me that this leak investigation will take on the importance of the Plame case,” Tobias says. “The bigger story here is still the one about domestic spying and whether the president intends, as he said, to continue doing it.” [Washington Post, 12/31/2005]
Entity Tags: Anthony D. Romero, Tom Devine, Trent Duffy, American Civil Liberties Union, Al-Qaeda, Tom Daschle, Senate Intelligence Committee, US Department of Justice, National Security Agency, Carl Tobias, Electronic Privacy Information Center, Alberto R. Gonzales, New York Times, Government Accountability Project, George W. Bush, Marc Rotenberg, House Intelligence Committee
Timeline Tags: Civil Liberties
Retired AT&T technician Mark Klein (see July 7, 2009 and May 2004), angered by the Bush administration’s counterattack against government and media members who have helped to expose its warrantless wiretapping operation (see December 15-31, 2005), decides to go public with a memo he wrote about his own knowledge of the collusion between AT&T and the National Security Agency (NSA) in eavesdropping on American citizens’ communications (see January 16, 2004). He updates the memo with a brief preface, selects eight pages of the 121 pages of AT&T documentation he possesses which he believes gives a good overview of the NSA’s surveillance equipment installation, and includes the two photographs he has taken of the NSA’s “secret room” at the AT&T facility in San Francisco and the Internet research he has done on the Narus STA 6400 equipment the NSA is using to sort the communications being captured and recorded (see Late 2003). Instead of entrusting his newly refurbished memo to the Internet, he uses the PGP (Pretty Good Privacy) security protocol for anticipated dissemination, burns the data onto a CD, and begins searching online for civil liberties groups that might be interested in his work. [Wired News, 5/17/2006; Klein, 2009, pp. 53-55]
The National Security Agency’s ‘Trailblazer’ program (see Late 1999), envisioned in 1999 as an overarching state-of-the-art data-mining system capable of sorting through millions of telephone and Internet communications and pluck out items relevant to national security and counterterrorism, is an abject failure, according to multiple sources and reports. The program has soaked up six years of effort and $1.2 billion in taxpayer dollars, with nothing to show except some schematic drawings and a few isolated technological and analytical gadgets, and little hope of much future progress. Matthew Aid, who has advised three federal commissions and panels investigating the 9/11 attacks, says that Trailblazer is “the biggest boondoggle going on now in the intelligence community.” Part of the problem is that over its six years of development, Trailblazer has passed through three separate NSA divisions, each with its own priorities and design goals. Its overseers have failed to exert the proper authority to clearly define the program’s goals and keep the project on track. In 2003, the NSA’s inspector general found that the program suffered from “inadequate management and oversight” of private contractors and overpayment for the work that was done. The lead private contractor for the project, Science Applications International Corporation (SAIC), has not provided the technical and managerial expertise necessary to create the system. While the Bush administration has touted the NSA wiretapping program (see December 15, 2005) as vital to protecting the nation from terrorism, it allows the agency to mismanage Trailblazer, in essence allowing the agency to go increasingly “deaf” as millions of items of unimportant information overwhelm the agency’s ability to sort out key bits of information, according to a government official. A Congressional investigation of intelligence failures surrounding the 9/11 attacks found that the NSA did not sift out “potentially vital” information that could have predicted or even prevented the attacks—a lapse that Trailblazer was intended to correct. Aid says that the problem is akin to searching for a needle in a haystack that doubles in size every few months. Intelligence experts say that the problem with Trailblazer is like deciding whether to keep a piece of mail or throw it out based only on what is on the outside of the envelope. Approximately 95% of the information gathered by the NSA is discarded without ever being translated from its original binary form; the remaining 5% is turned into plain text for human analysts to survey. Trailblazer was designed to sort through this information to identify patterns, keywords, and links to other data. The program would, in theory, translate all of the information into plain text or voice data, analyze the results to identify items of interest, store the results in an easily searchable database, and forward selected items to the appropriate analysts for follow-up. But after six years of work, there will still be no consensus among agency managers and experts as how to create a system to do this. Interestingly, another, less grandiose program, code-named Thinthread, appeared promising—a 2004 Pentagon report found that Thinthread could work better and be put to use more quickly than Trailblazer—but NSA managers disagreed with the Pentagon report and canceled Thinthread. Instead, Hayden pushed the agency to get Trailblazer up and running after the 9/11 attacks, cutting into time needed for review and corrections. Internal and external warnings that the program was going off-course were ignored; because of its secrecy and technological sophistication, neither Congress nor the NSA was able to effectively monitor the progress of the program’s development. And the agency lost track of much of the $1.2 billion that was allocated by Congress for the program. NSA Inspector General Joel Brenner blames the waste and inefficiency on “inadequate management and oversight.” As of 2006, the Government Accountability Office, the investigative arm of Congress, has not investigated Trailblazer simply because no one in Congress had asked it to. Because of the impact of the 9/11 attacks, and the war in Iraq, Congress has never seriously considered cutting back or reviewing any programs such as Trailblazer that might provide information on further terrorist attacks. [Baltimore Sun, 1/29/2006]
Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee, tells President Bush that his administration’s practice of only briefing a select few Congressional leaders on highly classified programs violates the National Security Act of 1947. Harman is referring to Bush’s practice of briefing the so-called “Gang of Eight,” comprised of the Speaker and Minority Leader of the House, the Majority and Minority Leaders of the Senate, and the chairmen and ranking members of the House and Senate Intelligence Committees, about the National Security Agency’s warrantless wiretapping program. Harman, a member of the Gang of Eight since 2003, says that she has found, she writes, “that the practice of briefing only certain Members of the intelligence committees violates the specific requirements of the National Security Act of 1947. The National Security Act requires that ‘The President shall ensure that the congressional intelligence committees are kept fully and currently informed of the intelligence activities of the United States….‘…The Act makes clear that the requirement to keep the committees informed may not be evaded on the grounds that ‘providing the information to the congressional intelligence committees would constitute the unauthorized disclosure of classified information.’” Harman notes that the one exception to the president’s duty to keep all committee members informed, covert action that entails “extraordinary circumstances affecting vital interests of the United States” and thereby limits notification to the Gang of Eight, applies only “to covert actions, not intelligence collection activities.” Harman adds, “For all intelligence activities that are not covert actions, the Executive Branch’s duty is clear: the ‘heads of all…entities involved in intelligence activities shall…keep the congressional intelligence committees fully and currently informed of all intelligence activities.” Harman says that merely briefing the Gang of Eight does not provide “effective oversight,” especially in light of the restrictions on the lawmakers: “Members of the Gang of Eight cannot take notes, seek the advice of their counsel, or even discuss the issues raised with their committee colleagues.… As you know, both congressional intelligence committees are select committees, formed of Members who hold the highest security clearances and have a proven ability to safeguard classified information.” Harman concludes, “In my view, failure to provide briefings to the full congressional intelligence committees is a continuing violation of the National Security Act.” [US House of Representatives, 1/4/2006] Two weeks later, the Congressional Research Service will issue a report on the requirements of the Act agreeing with Harman’s conclusion (see January 18, 2006).
President Bush’s rationale for authorizing warrantless surveillance against US citizens is of questionable legality and “may represent an exercise of presidential power at its lowest ebb,” according to a Congressional analysis. The Congressional Research Service (CRS), the independent and nonpartisan research bureau of the legislature, answers the question raised around the nation since the revelation of the secret program by the New York Times (see Early 2002): did Bush break the law when he ordered the National Security Agency to eavesdrop on US citizens without court orders or judicial oversight? The CRS report does not give a definitive yes or no answer to that question, but finds Bush’s legal rationale dubious at best. That rationale “does not seem to be as well-grounded” as administration lawyers have claimed, and the report finds that, despite assertions to the contrary by Bush and administration officials, Congress did not authorize warrantless wiretaps when it gave the executive branch the authority to wage war against al-Qaeda in the days after the 9/11 attacks. Unsurprisingly, Bush administration officials criticize the report. But some Republicans and Democrats find the report’s conclusions persuasive, and hold up the report as further evidence that Bush overextended his authority by authorizing the wiretaps. For instance, Republican Thomas Kean, the former chairman of the 9/11 commission (see January 27, 2003, says he doubts the program’s legality. Kean, who has not spoken publicly about the program until now, says the 9/11 commission was never told about the program, and he strongly doubts its legality. “We live by a system of checks and balances, and I think we ought to continue to live by a system of checks and balances,” Kean says. [Congressional Research Service, 1/5/2006 ; New York Times, 1/6/2006]
Fourteen law professors and former federal officials send a letter criticizing the Justice Department’s recent legal arguments supporting the legality of the secret NSA surveillance program (see December 19, 2005 and December 21-22, 2005). The letter is signed by law professors Curtis A. Bradley, a former State Department legal advisor; David Cole; Walter Dellinger, a former acting solicitor general and assistant attorney general; Ronald Dworkin; Richard Epstein; Harold Koh, a former assistant secretary of state and a former Justice Department official; Philip B. Heymann, a former deputy attorney general; Martin Lederman, a former Justice Department official; Beth Nolan, a former presidential counsel and a former Justice Department official; William S. Sessions, the former director of the FBI; Geoffrey R. Stone; Kathleen M. Sullivan; Laurence H. Tribe; and William Van Alstyne, a former Justice Department attorney. The letter is couched in legal language, but clearly states that the signees consider the NSA surveillance program entirely illegal: “[T]he program appears on its face to violate existing law.” The signees consider and reject the Justice Department’s argument that Congress “implicitly authorized the NSA program when it enacted the Authorization for Use of Military Force (AUMF) against al-Qaeda” in 2001 (see September 14-18, 2001), writing: “[T]he AUMF cannot reasonably be construed to implicitly authorize warrantless electronic surveillance in the United States during wartime, where Congress has expressly and specifically addressed that precise question in FISA and limited any such warrantless surveillance to the first 15 days of war.” The signees also reject the Justice Department’s argument that the president’s “inherent constitutional authority as commander in chief to collect ‘signals intelligence’” is not prohibited by FISA. The signees conclude that the Justice Department has failed “to offer a plausible legal defense of the NSA domestic spying program. If the administration felt that FISA was insufficient, the proper course was to seek legislative amendment, as it did with other aspects of FISA in the Patriot Act, and as Congress expressly contemplated when it enacted the wartime wiretap provision in FISA. One of the crucial features of a constitutional democracy is that it is always open to the president—or anyone else—to seek to change the law. But it is also beyond dispute that, in such a democracy, the president cannot simply violate criminal laws behind closed doors because he deems them obsolete or impracticable.” [Marty Lederman, 1/9/2006; Center for Democracy and Technology, 1/9/2006 ]
Entity Tags: Harold Koh, William S. Sessions, William Van Alstyne, Curtis Bradley, Beth Nolan, Geoffrey Stone, US Department of Justice, Walter Dellinger, Richard Epstein, Martin (“Marty”) Lederman, Laurence Tribe, Kathleen M. Sullivan, Ronald Dworkin, National Security Agency, Philip Heymann, David D. Cole
Timeline Tags: Civil Liberties
Russell Tice. [Source: ABC News]Former National Security Agency (NSA) official Russell Tice says that many of the wiretapping operations he once helped run were illegal. “I specialized in what’s called special access programs,” Tice tells ABC News. “We called them ‘black world’ programs and operations.” Tice is ready to testify before Congress about what he calls the illegal wrongdoings that are part of the Defense Department and the NSA’s wiretapping programs enacted after the 9/11 attacks. Many of these programs were targeted at innocent US citizens. “The mentality was we need to get these guys, and we’re going to do whatever it takes to get them,” he says. The technology used to track and sort through every domestic and international telephone center is impressive. “If you picked the word ‘jihad’ out of a conversation, the technology exists that you focus in on that conversation, and you pull it out of the system for processing.” Intelligence analysts use the information to develop graphs that resemble spiderwebs linking one suspect’s phone number to hundreds or even thousands more. While the president has admitted giving orders that allowed the NSA to eavesdrop on a small number of Americans without warrants, Tice says says the number of Americans subject to eavesdropping by the NSA could be in the millions if the full range of secret NSA programs is used. “That would mean for most Americans that if they conducted, or you know, placed an overseas communication, more than likely they were sucked into that vacuum.” Tice has been subjected to what appears to be bureaucratic punishment for his willingness to blow the whistle on the nation’s warrantless wiretapping programs; last year the NSA revoked his security clearance based on what it calls "psychological concerns," and later fired him. Tice says that is the way the NSA often deals with employees it considers troublemakers and whistleblowers (see January 25-26, 2006). [ABC News, 1/10/2006; ABC, 1/10/2006]
Al Gore speaks to the Liberty Coalition and the American Constitution Society. [Source: American Constitution Society]Former Vice President Al Gore delivers a long, impassioned speech on civil liberties and constitutional issues to the Liberty Coalition and the American Constitution Society. Gore joins former Representative Bob Barr (R-GA) in speaking out against the Bush administration’s infringement on American civil liberties. Gore and Barr have what Gore calls a “shared concern that America’s Constitution is in grave danger.”
Patently Illegal Domestic Surveillance - Gore’s speech is sparked by recent revelations that the NSA has been spying on American citizens for years (see December 15, 2005), and in response, the administration “has brazenly declared that it has the unilateral right to continue without regard to the established law enacted by Congress precisely to prevent such abuses.” As the Foreign Intelligence and Surveillance Act (FISA) is perfectly sufficient, there was no need for the Bush administration to circumvent that law. “At present, we still have much to learn about the NSA’s domestic surveillance,” Gore says. “What we do know about this pervasive wiretapping virtually compels the conclusion that the president of the United States has been breaking the law, repeatedly and insistently. A president who breaks the law is a threat to the very structure of our government.” Gore says he agrees with Bush on the threat of terrorism, but disagrees that the US has to “break the law or sacrifice our system of government” to protect itself, as this will make it “weaker and more vulnerable.” In addition, he says, “once violated, the rule of law is itself in danger,” and, “Unless stopped, lawlessness grows, the greater the power of the executive grows, the more difficult it becomes for the other branches to perform their constitutional roles.” It is patently obvious that the Bush administration has broken the law in conducting and approving its warrantless wiretaps, Gore says, regardless of what arguments and defenses administration officials may put forth (see September 12-18, 2001 and Early 2002). So, Gore says, “When President Bush failed to convince Congress to give him the power he wanted when this measure was passed, he secretly assumed that power anyway, as if Congressional authorization was a useless bother. But as [Supreme Court] Justice [Felix] Frankfurter once wrote, ‘To find authority so explicitly withheld is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between the president and the Congress.‘… And the disrespect embodied in these apparent mass violations of the law is part of a larger pattern of seeming indifference to the Constitution that is deeply troubling to millions of Americans in both political parties.”
Illegal Seizure of American Citizens - Gore notes that Bush has declared that he has “a heretofore unrecognized inherent power to seize and imprison any American citizen that he alone determines to be a threat to our nation, and that notwithstanding his American citizenship that person in prison has no right to talk with a lawyer, even if he wants to argue that the president or his appointees have made a mistake and imprisoned the wrong person” (see November 13, 2001 and March 5, 2002). He says: “The president claims that he can imprison that American citizen—any American citizen he chooses—indefinitely, for the rest of his life, without even an arrest warrant, without notifying them of what charges have been filed against them, without even informing their families that they have been imprisoned.” Gore then says: “No such right exists in the America that you and I know and love. It is foreign to our Constitution. It must be rejected.”
Specious Authority to Torture - Neither does the executive branch have the right to authorize torture, Gore says. After citing horrific examples from Guantanamo and Abu Ghraib, he calls it “a shameful exercise of power that overturns a set of principles that you’re nation has observed since General George Washington first enunciated them during our Revolutionary War. They have been observed by every president since then until now. They violate the Geneva Conventions, the International Convention Against Torture, and our own laws against torture.”
Unlawful Kidnapping of Foreign Citizens - The president has no right to have foreign citizens kidnapped from their homes and brought to the US for interrogation and imprisonment, or worse, delivered to other nations for harsh interrogations and torture, says Gore. The closest allies of the US have been shocked by such claims.
No Restraint in the Constitution? - Gore asks whether the president really has such powers under the Constitution and, if so, “are there any acts that can on their face be prohibited?” He quotes the dean of Yale’s law school, Harold Koh, who said, “If the president has commander in chief power to commit torture, he has the power to commit genocide, to sanction slavery, to promote apartheid, to license summary execution.” Gore is “deeply troubl[ed]” that “our normal American safeguards have thus far failed to contain this unprecedented expansion of executive power.” He cites the numerous usage of “signing statements” by Bush that signal his intent “not to comply” with particular legislation (see December 30, 2005). When the Supreme Court struck down Bush’s indefinite detention of “enemy combatants” (see June 28, 2004), “the president then engaged in legal maneuvers designed to prevent the court from providing any meaningful content to the rights of the citizens affected.”
Historical Cycles - Since the founding of America, Gore says, the country has abrogated its citizens’ rights in one circumstance or another, and cites numerous examples. But those abrogations were always rectified to some degree in a repeated cycle of what he calls “excess and regret.” Gore is worried that the country may not be in such a cycle now. Instead, he says, the US may be on a path to permanent, state-sanctioned authoritarianism, with the constitutional safeguards American citizens have come to expect eroded and undermined to the point of irretrievability. Gore specifically cites the administration’s support for the so-called “unitary executive” theory of government, which he says “ought to be more accurately described as the unilateral executive.” That theory “threatens to expand the president’s powers until the contours of the Constitution that the framers actually gave us become obliterated beyond all recognition.”
Stark Authoritarianism - Why are Bush and his top officials doing this? Gore says that “[t]he common denominator seems to be based on an instinct to intimidate and control. The same pattern has characterized the effort to silence dissenting views within the executive branch, to censor information that may be inconsistent with its stated ideological goals, and to demand conformity from all executive branch employees.” Gore continues: “Intellectually, it is possible to carry on this process for an indefinite time. The only check on it is that, sooner or later, a false belief bumps up against solid reality, usually on a battlefield. Two thousand two hundred American soldiers have lost their lives as this false belief bumped into a solid reality.”
Gutting Congress - Though serious damage has been done to the judicial branch, Gore acknowledges, “the most serious damage in our constitutional framework has been to the legislative branch. The sharp decline of Congressional power and autonomy in recent years has been almost as shocking as the efforts by the executive to attain this massive expansion of its power.… [T]he legislative branch of government as a whole, under its current leadership, now operates as if it were entirely subservient to the executive branch.… [T]he whole process is largely controlled by the incumbent president and his political organization” (see February 1, 2004). Gore says each member of Congress, Republican and Democrat, must “uphold your oath of office and defend the Constitution. Stop going along to get along. Start acting like the independent and co-equal branch of American government that you are supposed to be under the Constitution of our country.”
We the People - The American people still, for the moment, have the power to enforce the Constitution, Gore says, quoting former President Dwight Eisenhower, who said, “Any who act as if freedom’s defenses are to be found in suppression and suspicion and fear confess a doctrine that is alien to America.” Gore continues: “Fear drives out reason. Fear suppresses the politics of discourse and opens the door to the politics of destruction.… The founders of our country faced dire threats. If they failed in their endeavors, they would have been hung as traitors. The very existence of our country was at risk. Yet in the teeth of those dangers, they insisted on establishing the full Bill of Rights. Is our Congress today in more danger than were their predecessors when the British army was marching on the Capitol? Is the world more dangerous than when we faced an ideological enemy with tens of thousands of nuclear missiles ready to be launched on a moment’s notice to completely annihilate the country?” [Congressional Quarterly, 1/16/2006; American Constitutional Society, 1/16/2006]
Entity Tags: National Security Agency, Liberty Coalition, US Supreme Court, Harold Koh, George W. Bush, Albert Arnold (“Al”) Gore, Jr., American Constitution Society, Bush administration (43), Convention Against Torture, Felix Frankfurter, George Washington, Geneva Conventions, Foreign Intelligence Surveillance Act, Robert “Bob” Barr
Timeline Tags: Civil Liberties
The Congressional Research Service (CRS) finds that the Bush administration broke the law when it refused to provide timely and complete briefings to the appropriate members of Congress on the National Security Agency’s domestic wiretapping program. The CRS’s legal analysis concludes that the administration’s limited briefings are “inconsistent with the law.” The CRS performed the analysis at the request of Representative Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee and a member of the so-called “Gang of Eight,” the eight members of Congress that Bush allows to receive limited information on the NSA program. Harman, who calls the CRS report “a solid piece of work,” wrote to Bush on January 4, 2006, to inform him that she believes the information should be provided to all the members of the House and Senate Intelligence Committees. The briefings, which are intentionally limited in scope, are provided only to eight members of Congress: the Speaker of the House, the House Minority Leader, the Senate Majority and Minority Leaders, and the ranking members of the House and Senate Intelligence Committees. Harman says that an upcoming briefing, scheduled for February 6, should include all members of the intelligence committees. The briefings on the NSA program are held through the office of Vice President Dick Cheney. Though Harman is in agreement with the CRS that the briefings are legally inadequate, House Intelligence Committee chairman Peter Hoekstra (R-MI) has said he believes the briefings are adequate for Congressional oversight.
The CRS finding is based on the requirements of the 1947 National Security Act, that mandates that all of the members of the House and Senate Intelligence Committees be “fully and currently informed” of intelligence activities. The Act says that “covert actions” can only be revealed to the “Gang of Eight,” but, the CRS finds, since the NSA’s domestic surveillance program does not appear to be covert, limiting the briefings to just eight members of Congress “would appear to be inconsistent with the law.” The memo gives several options for the administration to bring itself into compliance with the law, noting, for example, that “[t]he executive branch may assert that the mere discussion of the NSA program generally could expose certain intelligence sources and methods to disclosure.” [New York Times, 1/18/2006; Washington Post, 1/19/2006]
A memo from the nonpartisan Congressional Research Service (CRS) finds that President Bush appears to be in violation of the National Security Act of 1947 in his practice of briefing only select members of Congress on the National Security Agency’s warrantless wiretapping program. Bush has provided only limited briefings to the so-called “Gang of Eight,” the four Congressional leaders and the four ranking members of the House and Senate Intelligence Committees. But the 1947 law requires the US intelligence community to brief the full membership of both committees on the program. The memo is the result of a request by Representative Jane Harman (D-CA), who wrote Bush a letter saying that she believes he is required under the Act to brief both committees, and not just the Gang of Eight (see January 4, 2006). The White House claims that it has briefed Congressional leaders about the program over a dozen times, but refuses to provide details; the Congressional members so briefed are forbidden by law to discuss the content or nature of those classified briefings, even with their own staff members. “We believe that Congress was appropriately briefed,” says White House spokeswoman Dana Perino. The CRS agrees with Harman that the single exception to such full briefings under the law, covert actions taken under extraordinary threats to national security, is not applicable in this instance. Unless the White House contends the program is a covert action, the memo says, “limiting congressional notification of the NSA program to the Gang of Eight…would appear to be inconsistent with the law.” [US House of Representatives, 1/4/2006; Congressional Research Service, 1/18/2006 ; Washington Post, 1/19/2006] The day after the CRS memo is released, Senate Democrats John D. Rockefeller (D-WV) and Harry Reid (D-NV), along with House Minority Leader Nancy Pelosi (D-CA) and Harman, the ranking member of the House Intelligence Committee, write to Vice President Dick Cheney demanding that the full committees be briefed on such intelligence matters in the future. [Washington Post, 1/20/2006] On February 9, Bush will allow Attorney General Alberto Gonzales and former NSA chief Michael Hayden to brief the full House Intelligence Committee on the program (see February 8-17, 2006).
Entity Tags: Jane Harman, John D. Rockefeller, National Security Agency, National Security Act, Richard (“Dick”) Cheney, Michael Hayden, House Intelligence Committee, George W. Bush, Dana Perino, “Gang of Eight”, Alberto R. Gonzales, Harry Reid, Congressional Research Service, Bush administration (43)
Timeline Tags: Civil Liberties
James Risen. [Source: Publicity photo]The New York Times published reporter James Risen’s December account of NSA domestic wiretapping (see December 15, 2005) without having seen the manuscript of his book on the subject, the media learns. Many observers on the right, most notably Matt Drudge, have accused Risen, who wrote the article with fellow Times reporter Eric Lichtblau, and the Times of printing the article to coincide with the publication of Risen’s book State of War. On the left, critics have blasted the Times for sitting on the story for a year in apparent deference to the Bush administration. The truth is somewhere in the middle, according to numerous informed sources. While the Times did sit on the piece for a year in part because Bush officials did not want the story to run (see December 6, 2005), when Times editors finally approved its publication, they were unsure whether or not Risen’s book manuscript contained the wiretapping story. The editors did not see the manuscript until December 27, a week before it appeared on the shelves. One of the first reviewers of the book, author and national security expert James Bamford, writes, “Among the unanswered questions concerning the domestic spying story is why, if Mr. Risen and The Times had first come upon the explosive information a year earlier, the paper waited until just a few weeks before the release of the book to inform its readers.” It seems that part of the reason is the long, internal disagreement between Risen and the Times over ownership of the book’s contents; internal sources at the Times say that without Risen’s book being published, it is likely that the editors would not have published the article as soon as they did. [New York Observer, 1/19/2006]
The Justice Department (DOJ) issues a 42-page “white paper” detailing its arguments that the National Security Agency’s warrantless wiretapping program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006) is legal. The DOJ reiterates two previous arguments (see December 19, 2005 and December 21-22, 2005)—that Congress implicitly authorized the program in 2001 when it authorized the Bush administration to begin military actions against al-Qaeda (see September 14-18, 2001), and that the president has the authority as commander in chief to conduct such a program—even though these arguments have been thoroughly refuted (see January 9, 2006) and overridden by the Supreme Court’s recent Hamdan v. Rumsfeld ruling (see December 15, 2005 and July 8, 2006). In its paper, the DOJ declares that if necessary, it will attack the legality of the Foreign Intelligence Surveillance Act (FISA) in order to stop that law from “imped[ing]” the president’s power to order domestic surveillance. In essence, according to columnist and civil liberties lawyer Glenn Greenwald, the DOJ is asserting that the president’s powers are limitless as long as he or she declares a given action necessary to battle terrorism. “Because the president has determined that the NSA activities are necessary to the defense of the United States from a subsequent terrorist attack in the armed conflict with al-Qaeda, FISA would impermissibly interfere with the president’s most solemn constitutional obligation—to defend the United States against foreign attack,” the DOJ claims. Neither Congress nor the court system has the right to limit or even review the president’s powers, according to the DOJ. Greenwald calls the DOJ’s argument “a naked theory of limitless presidential power.” In fact, Greenwald argues, the DOJ is asserting that FISA itself is unconstitutional, because no law can in any way limit the president’s power to conduct foreign policy or protect the nation’s security. The document is part of a larger Bush administration defense of the USA Patriot Act, and part of the administration’s push to convince Congress to reauthorize that legislation. Attorney General Alberto Gonzales sends the document to Congress. Justice Department official Steven Bradbury says, “When it comes to responding to external threats to the country… the government would like to have a single executive who could act nimbly and agilely.” [US Department of Justice, 1/19/2006 ; Glenn Greenwald, 1/20/2006; Washington Post, 1/20/2006]
Dubious Legality - The program has already been found to be of questionable legality by two reports recently released by the nonpartisan Congressional Research Service (see January 5, 2006 and January 18, 2006). And author James Bamford, a US intelligence expert who has written extensively about the NSA, says that the Justice Department’s arguments are specious in light of Congress’s clear intent in its 1978 passage of FISA to block warrantless wiretapping, and its demonstrated lack of intent to allow any such operations within US borders in the October 2001 legislation. “You could review the entire legislative history in the authorization to use military force and I guarantee you won’t find one word about electronic surveillance,” he says. “If you review the legislative history of FISA, you will find Attorney General Griffin Bell testifying before the intelligence committee saying this was specifically passed to prevent a president from claiming inherent presidential powers to do this again.” [Washington Post, 1/20/2006]
Self-Contradictory Justifications - In 2007, author and reporter Charlie Savage will write of the “shaky foundation” supporting the administration’s “two-pronged attacks on critics of the wiretapping program and the Patriot Act,” which some officials have claimed authorizes the program. “Beneath the simplistic rhetoric, the administration’s position was self-contradicting,” Savage will write. If Bush has the inherent presidential authority to order warrantless wiretapping, then he needs no authorization from the Patriot Act or any other legislation. But if Congress is endangering the nation by delaying in reauthorizing the Patriot Act and thusly not rendering the program legal, then the wiretapping program is illegal after all. The memo attempts to “paper… over” this problem by claiming that, while Bush has the inherent authority to do whatever he feels is necessary to protect the country, the Patriot Act’s extra police powers are still necessary in “contexts unrelated to terrorism.” Savage will write, “In other words, the administration’s own position, hidden in the fine print, was that the Patriot Act was superfluous and irrelevant to the war on terrorism—a somewhat absurd stance made necessary by their desire to say the wiretapping program was legal.” [Savage, 2007, pp. 315]
Failure to Address Probable Beginning of Program Before Attacks - The Justice Department says nothing about the program apparently beginning well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).
Entity Tags: National Security Agency, James Bamford, Steven Bradbury, US Department of Justice, Griffin Bell, Senate Judiciary Committee, Glenn Greenwald, Foreign Intelligence Surveillance Act, Alberto R. Gonzales, Arlen Specter, George W. Bush, Congressional Research Service, Charlie Savage
Timeline Tags: Civil Liberties
In a public speech, former National Security Agency chief Michael Hayden claims that everything the NSA does is with authorization from the White House, specifically the warrantless wiretapping program that spies on US citizens (see Early 2002). “I didn’t craft the authorization,” he says. “I am responding to a lawful order.” Hayden claims that while the NSA continues to use court warrants from the Foreign Intelligence Surveillance Court (FISC), technological advances and terrorist threats have made the law that created and supports FISC, the Foreign Intelligence Surveillance Act of 1978 (see 1978), obsolete. Therefore, the NSA has carried out domestic surveillance operations with or without FISC warrants. Hayden says the warrantless surveillance operations are “operationally more relevant, operationally more effective” than anything FISA can handle. Hayden repeatedly denies, in the face of reams of evidence collected by journalists and others to the contrary, that the NSA is spying on domestic antiwar groups and religious organizations like the Quakers who publicly advocate nonviolence and peace. [Michael Hayden, 1/23/2006]
Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), already having contacted a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), contacts Los Angeles Times reporter Joseph Menn about his story. Klein has a packet of evidence showing AT&T’s collusion with the National Security Agency (NSA) in that agency’s surveillance of American citizens. Menn is enthusiastic, and Klein provides him with the full packet of documents he has secured from AT&T, the first time he has shown these documents to anyone (see December 31, 2005). Klein is sure Menn is preparing a “blockbuster” story centering on his evidence and observations. [Klein, 2009, pp. 57]
Current and former National Security Agency (NSA) employees say that the agency often retaliates against whistleblowers by labeling them “delusional,” “paranoid,” or “psychotic.” They say such labeling protects powerful superiors who might be incriminated by potentially criminal evidence provided by such whistleblowers, and helps to keep employees in line through fear and intimidation. One NSA whistleblower, former intelligence analyst Russell Tice, is currently the victim of such agency allegations. Tice, along with three other former analysts, Diane Ring, Thomas Reinbold, and another analyst who wishes to remain anonymous, make the allegations of unfounded psychological labeling by the agency; their allegations are corroborated by a current NSA officer who also wishes to remain anonymous. [Cybercast News Service, 1/25/2006]
Identifying a Potential Spy - Tice, a former signals intelligence (SIGINT) officer, is the first NSA whistleblower to capture the media’s attention, when in 2004, the Pentagon investigated possible NSA retaliation against him. In 2001, Tice reported that a co-worker at the Pentagon’s Defense Intelligence Agency (DIA) was possibly engaged in espionage for China, possibly connected to California Republican official and Chinese double agent Katrina Leung. [Democracy Now!, 1/3/2006; Cybercast News Service, 1/25/2006] Tice says, “I saw all the classic signs” in the DIA employee. After transferring to the NSA in November 2002, he reported his concerns again, this time adding criticisms of incompetence for the FBI, who in Tice’s view failed to properly investigate his allegations. Instead, Tice was ordered by NSA Security to undergo psychiatric evaluation. He was labeled “paranoid” and “psychotic” by NSA forensic psychologist Dr. John Michael Schmidt; Tice lost his top-secret security clearance as a result. [Cybercast News Service, 1/25/2006]
Fired - He was fired from the NSA in 2005 after spending his last years at the agency pumping gas and working in an agency warehouse. “I reported my suspicion and got blown off,” he says. “I pushed the issue and that ticked them off, the fact that I questioned their almighty wisdom.” [Cox News Service, 5/5/2005] Tice again made news on January 10, 2006 (see January 10, 2006), when he admitted to being a source for the New York Times’s article about a secret NSA electronic surveillance program against American citizens, a program carried out in the name of combating terrrorism. [ABC News, 1/10/2006]
No Evidence of Mental Instability - As for Tice’s own psychological evaluation by Schmidt, according to three other clinical psychologists, there is “no evidence” of either of the disorders in Tice’s mental makeup. And another NSA psychologist pronounced Tice mentally sound in 2002, though having a “somewhat rigid approach to situations.” Tice is described by five retired NSA and intelligence officials as “congenial,” “enthusiastic,” and “a scholar of high intellectual rigor [with] sound judgment [and] unparalleled professionalism.” Tice says of the NSA’s attempts to smear whistleblowers with apparently baseless psychological allegations, “This nonsense has to stop. It’s like Soviet-era torture. These people are vicious and sadistic. They’re destroying the lives of good people, and defrauding the public of good analysts and linguists.” But it has been effective in cowing others who were, in Tice’s words, “too afraid or ashamed to come forward.” [Cybercast News Service, 1/25/2006]
Further Allegations - Another former analyst, now employed by another federal agency and who only allows himself to be identified as “J,” describes similar targeting by the NSA. J is fluent in an unusually high number of languages, and is described by former colleagues as “brilliant” and possessed of “amazing” critical skills. “I believe the abuse is very widespread,” J says. “The targeted person suddenly is described as ‘not being a team player,’ as ‘disgruntled,’ and then they’re accused of all sorts of bizarre things. Soon they’re sent to the psych people.” J himself was targeted in September 1993 (see September 11, 1993) when he and other analysts concluded that the United States was being targeted by Islamic terrorists, and then again in early 2001 after predicting a terrorist attack using planes as weapons (see May 2001).
NSA Like the 'Gestapo' - A third whistleblower, a current NSA officer who refuses to be identified, confirms the allegations and says that baseless psychiatric allegations as a form of retaliation are “commonplace” at the agency. He says, “A lot of people who work there are going through the same thing. People live in fear here. They run it like some kind of Gestapo.” Those identified as “problems” are “yelled at, badgered and abused.…These are really good people, who start to be labeled crazy, but they’re telling the truth.” The official adds that the NSA often plants false evidence in personnel files as part of the intimidation campaign. Tice says the NSA maintains what he calls a “dirt database” of inconsequential but potentially embarrassing information on employees, gathered during routine clearance investigations and used as a form of leverage. The current officer says that an “underground network” has developed to discuss these issues. “It’s like the Nazis have taken over,” he says. [Cybercast News Service, 1/25/2006]
Personal Vendettas - Diane Ring is another former NSA official targeted by her superiors. Unlike Tice, a self-described conservative who believes President Bush should be impeached over the NSA’s illegal wiretapping program, Ring is a Bush supporter who believes the surveillance program is entirely proper. Ring, a former NSA computer scientist, says she was ordered to undergo psychiatric evaluations after coming into conflict with a colonel at the Pentagon. Ring is not a whistleblower per se like the others, but says she was targeted for retaliation because of a personal vendetta against her. The colonel “blew up” at Ring after she missed a meeting and explained that her branch chief had her working on a classified program that took priority over the meeting. Ring also was evaluated by Dr. Schmidt. When she complained about the apparent retaliation, her security clearance was, like Tice’s, revoked, and she was “red-badged,” or put on restricted access within the NSA offices. Ring says she received an excellent job evaluation just three months prior to the actions taken against her. She says her colleagues at the time were told not to talk to her, and she was restricted to working in a room filled with other red-badgers. She thinks she was isolated as part of an intentional campaign to force her to leave the agency. “They had these red-badgers spread out all over the place.” she recalls. “Some were sent to pump gas in the motor pool and chauffeur people around. In our room, some people brought sleeping bags in and slept all day long. Others read. I would think that would incense the taxpaying public.” Schmidt eventually reported that another doctor diagnosed Ring with a “personality disorder,” but Ring has a July 21, 2005 letter from that doctor, Lawrence Breslau, which reads in part, “On mental status examination including cognitive assessment she performs extremely well.” In the letter, Breslau says he never made such a diagnosis. She, like others in her position, went to the NSA Employee Assistance Service (EAS) for confidential counseling, but the current NSA officer says that though those sessions are supposed to be confidential, NSA officials can and do obtain “confidential” sessions for retaliatory purposes. “Their goal is to freak you out, to get inside your mind,” that officer says. Rice claims that NSA General Counsel Paul Caminos lied about her case before a judge, denying that he had sent an internal e-mail forbidding anyone from supporting Ring. Ring says she was “floored” by Caminos’s actions: “I served in Bosnia. We had mines going off all around us, all day long. That was nothing compared to this.” She is currently working on clearing her name with the NSA’s new director, Lieutenant General Keith Alexander. Ring believes that the problem at NSA involves a small number of people, “The whole lot of them is corrupt though. There is zero integrity in the process. And zero accountability.”
'Psychiatric Abuse' 'Very Widespread' - Like his fellow whistleblowers, former NSA officer Thomas Reinbold says the practice of “psychiatric abuse” inside the NSA is “very widespread.” Reinbold, who recelved 26 commendations and awards during his career at the NSA, including a medal for the intelligence he provided during the 1991 Gulf War, says, “They call it ‘doing a mental’ on someone.” Such practices have a “chilling effect” on other potential whistleblowers: “They fear for their careers because they fear someone will write up bad [psychological] fitness reports on them.” Reinhold was labeled “paranoid” and “delusional” by Schmidt after he complained to an inspector general on February 25, 1994, that the federal government was guilty of contract tampering; Schmidt’s evaluation contradicts a psychological evaluation he conducted on Reinbold eight months before that found he was mentally sound. At the time, Reinbold worked as a contracting officer representative for the Naval Security Group (NAVSECGRU) in Virginia. Reinbold had his high-level security clearance revoked, and was escorted off the grounds by armed security officers. Reinbold says NSA officials fabricated evidence in his personnel file to force him out; that evidence included allegations that he was a danger to himself and others, and that he had said “if [he] was going down, [he] would take everyone with him.” In September 1995, an administrative hearing found that the revocation of Reinbold’s security clearance was unjustified and recommended restoring his clearance, but did not allow the damaging information to be removed from his personnel file. He later sued the agency, and then retired because of diabetes. “I gave 29 years of my life to the intelligence community,” he recalls. “They couldn’t get me out the door fast enough. There are very good people, getting screwed and going through hell.”
Helping Those Who Come After - Some of the whistleblowers hope to gain the assistance of politicians to help their cases. But Tice is less optimistic. “Our time is over,” Tice says he told Ring. “But we can make a difference for those who come behind us.” The five whistleblowers have the support of the whistleblower advocacy group Integrity International. Its founder and director, Dr. Don Soeken, himself a whistleblower while he was with the US Public Health Service in the 1970s, says, “When this retaliation first starts, there’s a tendency by bosses to use code words like ‘delusional,’ ‘paranoid’ and ‘disgruntled’. Then they use psychiatric exams to destroy them. They kill the messenger and hope the PR spin will be bought by the public.” Tom Devine of the Government Accountability Project says that “psychiatric retaliation” is a knee-jerk reaction against whistleblowers: “It’s a classic way to implement the first rule of retaliation: shift the spotlight from the message to the messenger. We call it the ‘Smokescreen Syndrome.’” Superiors investigate and smear the whistleblower for anything from financial irregularities to family problems, sexual practices, bad driving records, or even failure to return library books, Devine says. “It’s a form of abuse of power.” The Whistleblower Protection Act was written to protect those like Tice, Ring, Reinbold, and Soeken, but, says Beth Daly of the Project on Government Oversight (POGO), the act has serious flaws. “You have to go through the inspector general or the director of the CIA to let them know if you’re going to Congress and what you’re going to disclose,” she says. “And inspector generals are notorious for revealing who whistleblowers are.”
Entity Tags: Paul Caminos, Project for Government Oversight, Naval Security Group, Russell Tice, Tom Devine, Thomas Reinbold, National Security Agency, US Public Health Service, Keith Alexander, Lawrence Breslau, Diane Ring, Defense Intelligence Agency, Beth Daly, Don Soeken, House National Security Subcommittee, Government Accountability Project, John Michael Schmidt, Integrity International, “J”
Timeline Tags: Civil Liberties
Washington Post reporter William Arkin reveals that the National Security Agency (NSA) is “building a new warning hub and data warehouse” in Aurora, Colorado, just outside of Denver, on the grounds of Buckley Air Force Base. The agency is transferring many key personnel from its Fort Meade, Maryland, headquarters to Aurora. Arkin calls the new NSA facility, named the Aerospace Data Facility (ADF), “massive,” and says he believes it is the hub of the NSA’s data mining operation (see January 16, 2004). According to Government Executive magazine, the NSA’s new data storage facility “will be able to hold the electronic equivalent of the Library of Congress every two days.” While the NSA explains that the new facility is a cost-cutting measure and part of the agency’s post-9/11 decentralization—“This strategy better aligns support to national decision makers and combatant commanders,” an NSA spokesman tells one reporter—Arkin says that the “NSA is aligning its growing domestic eavesdropping operations—what the administration calls ‘terrorist warning’ in its current PR campaign—with military homeland defense organizations, as well as the CIA’s new domestic operations [in] Colorado.… Colorado is now the American epicenter for national domestic spying.” Arkin notes that previous news reports have said that the CIA is planning to move much of its domestic National Resources Division to Aurora as well. He also notes that Colorado is the home of the US military’s Northern Command (NORTHCOM), the military arm responsible for homeland defense. The move also allows the NSA to better coordinate its efforts with private contractors such as Lockheed Martin, Northrup Grumman Mission Systems, and Raytheon, all of which have presences in Colorado. Arkin names all three firms as partners with the NSA in building the ADF. Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Over months and years, the database would be huge, ready for data mining whenever the government wants to go after someone.” [Washington Post, 1/31/2006; Klein, 2009, pp. 40-41]
Electronic Frontier Foundation logo. [Source: Flickr.com]The Electronic Frontier Foundation (EFF), a civil liberties and privacy-advocacy organization, files a lawsuit against telecommunications giant AT&T for allegedly violating the law and the privacy of its citizens by cooperating with the National Security Agency in the NSA’s construction of what the EFF calls a “massive, illegal program to wiretap and data-mine Americans’ communications.” EFF lawyer Kevin Bankston says: “Our goal is to go after the people who are making the government’s illegal surveillance possible. They could not do what they are doing without the help of companies like AT&T. We want to make it clear to AT&T that it is not in their legal or economic interests to violate the law whenever the president asks them to.”
Unprecedented Access to Communications System - EFF alleges that as part of the NSA’s domestic spying program, AT&T has allowed the NSA direct access to the phone and Internet communications passing over its network, and has given the government “unfettered access to its over 300 terabyte ‘Daytona’ database of caller information—one of the largest databases in the world.” One of AT&T’s databases, nicknamed “Hawkeye,” contains 312 terabytes of data detailing nearly every telephone communication on AT&T’s domestic network since 2001, the lawsuit alleges. The suit goes on to claim that AT&T allowed the NSA to use the company’s powerful Daytona database management software to quickly search this and other communication databases. AT&T, the suit claims, is in violation of the First and Fourth Amendments, federal wiretapping statutes, telecommunications laws, and the Electronic Communications Privacy Act. The suit requests fines up to $22,000 for each AT&T customer, and punitive fines—damages that could potentially reach into the billions of dollars. The EFF lawsuit is one of over 30 lawsuits filed for similar reasons (see June 26, 2006). The lawsuit will survive a number of initial legal challenges by the Justice Department and AT&T, including AT&T’s contention that “whatever we did, the government told us to do” and therefore it should be immune from such lawsuits, and the Justice Department’s invocation of “national security” and the possibility of the revelation of “state secrets” (see March 9, 1953). EFF retorts, “In this country we follow the law, we don’t just follow orders.” Bankston tells a reporter, “If state secrecy can prevent us from preserving the rights of millions upon millions of people, then there is a profound problem with the law.”
Suit Alleges Criminal Actions, Does Not Challenge Government's Right to Wiretap - The lawsuit does not challenge the government’s right to electronically monitor legitimate terrorism suspects, nor does it challenge the judicial right to issue warrants for such surveillance. Rather, EFF writes: “Wiretaps on terrorists are allowed under the law, and this lawsuit is not challenging the wiretap laws. We have sued AT&T for breaking those laws—the telecommunications giant gave the government access to its communications switches and its huge databases of information on millions of ordinary Americans. These are AT&T customers who have not even been accused of affiliations with terrorists. Americans can be both safe and free: if the government truly believes it has cause to wiretap a suspect, it can order AT&T to provide information under FISA [the Foreign Intelligence Surveillance Act]—for up to 72 hours before going to the court. But AT&T has no business providing direct access to the communications of millions of ordinary Americans, without the checks and balances of Congress or the courts.” [Electronic Frontier Foundation, 1/31/2006; Wired News, 1/31/2006]
Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group and a reporter to expose the collusion of AT&T and the National Security Agency in pushing the government’s illegal surveillance program (see Early January 2006 and January 23, 2006 and After), searches out appropriate legal counsel. He secures the services of two former assistant US attorneys in San Francisco, Miles Ehrlich and Ismail “Izzy” Ramsey. Ehrlich and Ramsey offer their services pro bono after hearing Klein’s story and examining his evidence (see December 31, 2005). [Klein, 2009, pp. 57]
Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group and a reporter to expose the collusion of AT&T and the National Security Agency in pushing the government’s illegal surveillance program (see Early January 2006 and January 23, 2006 and After), contacts the office of Senator Dianne Feinstein (D-CA) at the advice of Electronic Frontier Foundation lawyer Kevin Bankston. Klein talks to Feinstein’s chief attorney in Washington, DC, Steven Cash. Klein will later write: “I instinctively recoiled at the thought of trying to approach her as my memory of her record told me she was no friend of civil liberties, though she plays one on TV. My instinct was not wrong.” After an initial discussion with Cash, Klein emails him his packet of documentation (see December 31, 2005). On the afternoon of February 3, Cash calls Klein and says he is very interested in his story, though Feinstein’s staff rates the probability of the NSA performing illegal acts at somewhere around “50-50,” according to Klein. Cash promises to get back in touch with Klein on February 6, but fails to do so. Neither Klein nor his attorneys (see Early January 2006) are able to talk to anyone on Feinstein’s staff from here on. Klein later writes: “The silent message was unmistakable: the senator did not want to sully her political skirts by having contact with a whistleblower. And this was a foretaste of her behavior and voting for the next two and a half years. At every turn, she was there pushing for immunity for the telecom companies in the Senate Intelligence and Judiciary Committees; peddling her toothless restatement of the ‘exclusive means’ clause of FISA [the Foreign Intelligence Surveillance Act—see 1978] as a substitute for any confrontation with the president over ongoing illegal NSA spying; ushering former NSA Director Michael Hayden through his nomination for CIA director; and backing Michael Mukasey as a clone replacement for the resigning Attorney General [Alberto] Gonzales. Moreover, this ultimately turned out to be the attitude of virtually the entire Democratic Party leadership, not to mention the Republicans.” Klein will explain that FISA’s “exclusive means” clause states that FISA should be the “exclusive means” for the federal government to conduct surveillance. Congress’s duty under the law was, Klein will state, to enforce the law against President Bush, “who openly flouted the law.” Instead, Klein will claim, Feinstein uses the “exclusive means” clause to protect the Bush administration and the telecom firms. [Klein, 2009, pp. 57-60]
The Justice Department’s Office of Professional Responsibility (OPR) opens an internal investigation into the department’s role in approving the Bush administration’s domestic warrantless wiretapping program. OPR counsel Marshall Jarrett informs Representative Maurice Hinchey (D-NY) of the investigation into the program, initiated after the 9/11 attacks by the National Security Agency and authorized via a secret executive order from President Bush shortly thereafter (see Early 2002). Jarrett writes that the OPR probe will include “whether such activities are permissible under existing law.” Justice Department spokeswoman Tasia Scolinos says the inquiry will be quite limited: “They will not be making a determination on the lawfulness of the NSA program but rather will determine whether the department lawyers complied with their professional obligations in connection with that program.” Scolinos calls the OPR probe “routine.” Hinchey says he welcomes the probe, which may determine “how President Bush went about creating this Big Brother program.” [Washington Post, 2/16/2006] The OPR inquiry is derailed after the NSA, with Bush’s authorization, refuses to give routine security clearances to OPR lawyers that would allow them to examine the relevant documents (see May 9, 2006).
Seven telecommunications executives confirm to the press that large telecommunications companies such as AT&T, MCI, and Sprint have cooperated with the National Security Agency’s domestic warrantless wiretapping program. Those firms, along with BellSouth, previously denied they had cooperated with the NSA (see October 2001). In typical domestic investigations, telecom companies require court warrants before mounting any surveillance operations, but this has not been the case with the NSA program. Apparently, the companies decided to assist the NSA in tracking international telephone and Internet communications to and from US citizens and routed through “switches” which handle millions of communications, both domestic and international, every day. The telecom firms in question have undergone several mergers and reorganizations—BellSouth, another firm accused of cooperating with the NSA, is now part of AT&T, MCI (formerly WorldCom) was recently acquired by Verizon, and Sprint has merged with Nextel. The companies comply with the NSA requests for information once the NSA determines that there is a “reasonable basis” for believing that the communications may have a connection with militant Islamic organizations such as al-Qaeda. The firms do not require court warrants, but rather implement the monitoring on nothing more than oral requests from senior NSA officials. [USA Today, 2/5/2006]
A Washington Post article repeats assertions by the National Security Agency (NSA) and the Bush administration that even if the NSA is automatically intercepting and storing millions of domestic phone calls and emails (see January 16, 2004), such computerized surveillance does not legally “count” unless it is examined—i.e. read or listened to—by human analysts. As the Post reports, NSA rules state that “‘acquisition’ of content does not take place until a conversation is interrupted and processed ‘into an intelligible form intended for human inspection.’” The Post article says that “nearly all” of the intercepted “overseas” communications from American citizens have been “dismissed” by intelligence officers who found nothing of interest in them. The Post observes: “Fewer than 10 US citizens or residents a year, according to an authoritative account, have aroused enough suspicion during warrantless eavesdropping to justify interception of their domestic calls, as well. That step still requires a warrant from a federal judge, for which the government must supply evidence of probable cause.” And, according to the Post’s “knowledgeable sources,” no more than 5,000 Americans have had their conversations recorded or their emails examined by intelligence analysts. According to Bush administration officials, the Post reports, “[s]urveillance takes place in several stages… the earliest by machine. Computer-controlled systems collect and sift basic information about hundreds of thousands of faxes, emails, and telephone calls into and out of the United States before selecting the ones for scrutiny by human eyes and ears. Successive stages of filtering grow more intrusive as artificial intelligence systems rank voice and data traffic in order of likeliest interest to human analysts. But intelligence officers, who test the computer judgments by listening initially to brief fragments of conversation, ‘wash out’ most of the leads within days or weeks.” People who have helped develop the computer analysis technology say that “it is a triumph for artificial intelligence if a fraction of one percent of the computer-flagged conversations guide human analysts to meaningful leads.”
Controversy over Legality, Usefulness of Surveillance - National security lawyers say that the high proportion of false leads and innocent bystanders being wiretapped contravenes the “reasonable” search provisions of the Fourth Amendment. One government official says the success rate should be closer to 50 percent—one out of every two persons surveilled—and not less than one percent. “Those who devised the surveillance plan, the official says, “knew they could never meet that standard—that’s why they didn’t go through” the court that supervises the Foreign Intelligence Surveillance Act, or FISA. Bush officials refuse to say whether the NSA is discarding the more than 99 percent of communications that it intercepts and deems useless for further analysis. Jeff Jonas, an IBM scientist who invented a data-mining system now in use by both private and governmental entities, says that the kind of pattern-matching data analysis used by the NSA in its surveillance program is neither useful nor accurate. Those analysis techniques that “look at people’s behavior to predict terrorist intent,” he says, “are so far from reaching the level of accuracy that’s necessary that I see them as nothing but civil liberty infringement engines.” Psychology professor James W. Pennebaker disagrees. “Frankly, we’ll probably be wrong 99 percent of the time,” he says, “but one percent is far better than one in 100 million times if you were just guessing at random. And this is where the culture has to make some decisions.” [Washington Post, 2/5/2006]
Former AT&T Technician: AT&T, NSA Violating Fourth Amendment - Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004) will later take a different view of the issue. In 2009, he will write: “[T]he illegal act happens at the point of seizure by the government, i.e. the splitter—not later, whether or not a medium is involved (see January 16, 2004). That is the whole part of the Fourth Amendment, which demands the government get a warrant to show ‘probable cause’ for seizing things, whatever the government does with it afterwards. What they do later is unknown, and at any rate, their word on anything has proven to be an exercise in prevarication.” [Klein, 2009, pp. 48-49]
The White House twice convinces Congressional leaders to derail or water down upcoming Congressional hearings into its warrantless wiretapping program, dodging potentially embarrassing public revelations about its surveillance of US citizens. Some observers praise the Bush administration for accepting more Congressional oversight, but some lawmakers feel the concessions made by the White House in return for Congress’s back down from full hearings mean little. Privately, some Republicans say that the White House came far closer to suffering large public setbacks than is generally known, and that President Bush must be more forthcoming about the warrantless wiretapping program if he wants to retain the good will of Congress. On February 8, a day before the House Intelligence Committee is to begin its hearings on the program, some lawmakers are complaining that the administration is trying to dodge any real discussion of the program; two days before, Attorney General Alberto Gonzales had defended the program without providing any details, and the White House intended to send Gonzales and former NSA head Michael Hayden to the hearings to give the same limited briefing. Instead, the White House agrees to have Gonzales and Hayden provide more details about the program’s “procedural aspects,” the first time a full Congressional committee has received a briefing about the program (see January 4, 2006 and January 18, 2006). Many committee members are placated by the briefing. In return, committee leaders agree to stymie Democrats’ attempts to hold more expansive hearings into the program. On February 17, the Senate Intelligence Committee deals with a motion by ranking Democrat Jay Rockefeller (D-WV) to open a broad inquiry into the program. But White House chief of staff Andrew Card has, two days before, spoken with committee member Olympia Snowe (R-ME). Snowe had expressed her own concerns about the program’s legality, and its infringement on constitutional civil liberties, and she is, according to Senate sources briefed on the call, “taken aback” by Card’s intransigence about restricting Congressional oversight of the program. Snowe and fellow senator Chuck Hagel (R-NE), another Republican who has voiced his own doubts about the program, speak with committee chairman Pat Roberts (R-KS). Roberts thinks he has the votes to defeat Rockefeller’s motion, but he learns Snowe and Hagel will support it, thus ensuring its passage. Thus informed, Roberts blocks passage of the motion by arranging a party-line vote to adjourn the committee until March 9, a move that infuriates Rockefeller. “The White House has applied heavy pressure in recent weeks to prevent the committee from doing its job,” he says after the adjournment. Both Hagel and Snowe deny folding under administration pressure. The White House is supportive of a proposal by Senator Mike DeWine (R-OH) that would exempt the NSA program from FISA, while providing for limited congressional oversight. [Washington Post, 2/19/2006]
Entity Tags: Olympia Snowe, Senate Intelligence Committee, Pat Roberts, Mike DeWine, National Security Agency, John D. Rockefeller, Bush administration (43), Andrew Card, Alberto R. Gonzales, Michael Hayden, House Intelligence Committee, Chuck Hagel, George W. Bush
Timeline Tags: Civil Liberties
Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), has contacted Los Angeles Times reporter Joseph Menn about publishing an article expising AT&T’s collusion with the National Security Agency (NSA) to illegally conduct surveillance against American citizens (see January 23, 2006 and After). Klein believed Menn was enthusiastic about exposing AT&T and the NSA in his newspaper. Instead, Klein is shocked to hear from Menn that the Times’s “top guy” is preparing to meet with Director of National Intelligence John Negroponte to discuss any such publication. “I nearly fell down in shock,” Klein will later write. “[T]hey were actually negotiating with the government on whether to publish!” Menn describes himself to Klein as “demoralized,” and says the chances of getting the story published are “grim.” In his seven years at the Times, Menn tells Klein, he has never seen a story “spiked” for “nefarious reasons,” implying that the reason behind the story’s non-publication are “nefarious.” Klein is also dismayed that the Times has now revealed his existence as a whistleblower to Negroponte, and by extension to the US intelligence apparatus. Two days ago, Klein began emailing a New York Times reporter, James Risen, the co-author of a 2005 expose about the NSA’s surveillance program (see December 15, 2005). After hearing from Menn, Klein emails Risen to inform him of the Los Angeles Times’s decision to “consult” with Negroponte, and also of the lack of interest he has received from Senator Dianne Feinstein’s office (see February 1-6, 2006). Risen calls in fellow reporter Eric Lichtblau, his co-author on the 2005 story, and the two begin working on their own story. Klein remains worried about his personal and professional safety, since, as he will write, “[t]he government was on to me, but I did not yet have a published article and the protection that comes with publicity. I had visions, perhaps paranoid in hindsight, of being disappeared in the night, like [nuclear industry whistleblower] Karen Silkwood.” The Los Angeles Times story will drag on until March 29, when Menn will inform Klein that it is officially dead, blocked by Times editor Dean Baquet. Klein will later learn that Baquet had not only been in contact with Negroponte, but with NSA Director Michael Hayden. In 2007, Baquet will tell ABC News reporters that “government pressure played no part in my decision not to run with the story,” and will say that he and managing editor Doug Frantz decided “we did not have a story, that we could not figure out what was going on” with Klein’s documentation (see March 26, 2007). Klein will call Baquet’s explanation an “absurd and flimsy excuse,” and will say it is obvious that the Los Angeles Times “capitulated to government pressure.” [PBS Frontline, 5/15/2007; Klein, 2009, pp. 59-62]
Entity Tags: James Risen, Dean Baquet, AT&T, Dianne Feinstein, Eric Lichtblau, Joseph Menn, Michael Hayden, John Negroponte, Douglas Frantz, National Security Agency, Los Angeles Times, Mark Klein
Timeline Tags: Civil Liberties
The US interagency National Counterterrorism Center (NCTC) maintains a watch list of 325,000 names of international terrorism suspects, a number that has more than quadrupled since the the list was created in 2003 by merging other watch lists together. NCTC officials estimate that, due to aliases, some 200,000 individuals are represented on the list. The main US watch list at the time of 9/11 had 60,000 names on it (see December 11, 1999). An administration official says, “The vast majority are non-US persons and do not live in the US.” However, officials refuse to state how many on the list are US citizens and how many names on the list were obtained through the controversial wiretapping program run by the National Security Agency (NSA). Civil liberties and privacy advocates claim that the scale of the list heightens their concerns that watch lists include the names of large numbers of innocent people. Attorney General Alberto Gonzales tells the Senate Judiciary Committee that he cannot discuss specifics but says, “Information is collected, information is retained, and information disseminated in a way to protect the privacy interests of all Americans.” A September 2003 presidential directive instructs agencies to supply data for the list only about people who are “known or appropriately suspected to be… engaged in conduct constituting, in preparation for, in aid of, or related to terrorism.” Marc Rotenberg, executive director of the Electronic Privacy Information Center, says the scope of the NCTC list highlights the “false positive” problem, in which innocent people have been stopped from flying because their names are wrongly included or are similar to suspects’ names. “If there are that many people on the list, a lot of them probably shouldn’t be there. But how are they ever going to get off?” [Washington Post, 2/15/2006] Numerous problems with the list will be found in 2006 (see March 2006).
Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), is concerned that the New York Times will not publish a story featuring his allegations and evidence against AT&T and the National Security Agency (NSA). Klein was “outed” by Los Angeles Times editor Dean Baquet to the US intelligence apparatus after Klein approached a Los Angeles Times reporter about his story, and Klein is concerned that he lacks the protection that publicity would afford him (see February 11, 2006 and After). New York Times reporters James Risen and Eric Lichtblau fail to contact Klein for weeks during this time period, leaving Klein to wonder if the New York Times, like the Los Angeles Times before it, will fail to publish his story. Klein emails Risen and Lichtblau his full set of AT&T documents proving his allegations in mid-February (see December 31, 2005). Meanwhile, he sends emails containing selected documents to a number of Congressional members. Only one, House Representative Pete Stark (D-CA), responds, promising that he will present Klein’s information to the House Judiciary Committee, but, as Klein will write, “I never heard anything from the Judiciary Committee, or any other committee for that matter.” [PBS Frontline, 5/15/2007; Klein, 2009, pp. 63]
Entity Tags: James Risen, Dean Baquet, AT&T, Eric Lichtblau, House Judiciary Committee, Los Angeles Times, Mark Klein, New York Times, National Security Agency, Fortney Hillman (“Pete”) Stark, Jr
Timeline Tags: Civil Liberties
Electronic Frontier Foundation (EFF) lawyer Kevin Bankston asks AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) to submit a legal declaration as to his knowledge of AT&T’s collusion with the National Security Agency (NSA) in its illegal domestic wiretapping program. Klein is working with the EFF in that organization’s lawsuit against AT&T (see Early January 2006 and January 31, 2006). Five days later, Klein submits his evidence of AT&T’s actions (see December 31, 2005) to Bankston to be used in the lawsuit. Klein will work with his lawyers to craft the declaration, and will have it in final form by late March. [Klein, 2009, pp. 63-64]
The Al Haramain Islamic Foundation, a now-defunct Saudi Arabian charitable organization that once operated in Oregon, sues the Bush administration [Associated Press, 2/28/2006] over what it calls illegal surveillance of its telephone and e-mail communications by the National Security Agency, the so-called Terrorist Surveillance Program. The lawsuit may provide the first direct evidence of US residents and citizens being spied upon by the Bush administration’s secret eavesdropping program, according to the lawsuit (see December 15, 2005). According to a source familiar with the case, the NSA monitored telephone conversations between Al Haramain’s director, then in Saudi Arabia, and two US citizens working as lawyers for the organization and operating out of Washington, DC. The lawsuit alleges that the NSA violated the Foreign Intelligence Surveillance Act (see 1978), the US citizens’ Fourth Amendment rights, and the attorney-client privilege. FISA experts say that while they are unfamiliar with the specifics of this lawsuit, they question whether a FISA judge would have allowed surveillance of conversations between US lawyers and their client under the circumstances described in the lawsuit. Other lawsuits have been filed against the Bush administration over suspicions of illegal government wiretapping, but this is the first lawsuit to present classified government documents as evidence to support its contentions. The lawsuit alleges that the NSA illegally intercepted communications between Al Haramain officer Suliman al-Buthe in Saudi Arabia, and its lawyers Wendell Belew and Asim Ghafoor in Washington. One of its most effective pieces of evidence is a document accidentally turned over to the group by the Treasury Department, dated May 24, 2004, that shows the NSA did indeed monitor conversations between Al Haramain officials and lawyers. When Al Haramain officials received the document in late May, 2004, they gave a copy to the Washington Post, whose editors and lawyers decided, under threat of government prosecution, to return the document to the government rather than report on it (see Late May, 2004). [Washington Post, 3/2/2006; Washington Post, 3/3/2006] Lawyer Thomas Nelson, who represents Al Haramain and Belew, later recalls he didn’t realize what the organization had until he read the New York Times’s December 2005 story of the NSA’s secret wiretapping program (see December 15, 2005). “I got up in the morning and read the story, and I thought, ‘My god, we had a log of a wiretap and it may or may not have been the NSA and on further reflection it was NSA,’” Nelson will recall. “So we decided to file a lawsuit.” Nelson and other lawyers were able to retrieve one of the remaining copies of the document, most likely from Saudi Arabia, and turned it over to the court as part of their lawsuit. [Wired News, 3/5/2007]
Al Haramain Designated a Terrorist Organization - In February 2004, the Treasury Department froze the organization’s US financial assets pending an investigation, and in September 2004, designated it a terrorist organization, citing ties to al-Qaeda and alleging financial ties between Al Haramain and the 1998 bombings of two US embassies in Africa (see 10:35-10:39 a.m., August 7, 1998). The organization was disbanded by the Saudi Arabian government in June 2004 and folded into an “umbrella” private Saudi charitable organization, the Saudi National Commission for Relief and Charity Work Abroad (see March 2002-September 2004). In February 2005, the organization was indicted for conspiring to funnel money to Islamist fighters in Chechnya. The charges were later dropped. [US Treasury Department, 9/9/2004; Washington Post, 3/2/2006] The United Nations has banned the organization, saying it has ties to the Taliban. [United Nations, 7/27/2007]
Challenging Designation - In its lawsuit, Al Haramain is also demanding that its designation as a terrorist organization be reversed. It says it can prove that its financial support for Chechen Muslims was entirely humanitarian, with no connections to terrorism or violence, and that the Treasury Department has never provided any evidence for its claims that Al Haramain is linked to al-Qaeda or has funded terrorist activities. [Associated Press, 8/6/2007] The lawsuit also asks for $1 million in damages, and the unfreezing of Al Haramain’s US assets. [Associated Press, 8/5/2007]
Administration Seeks to Have Lawsuit Dismissed - The Bush administration will seek to have the lawsuit thrown out on grounds of national security and executive privilege (see Late 2006-July 2007, Mid-2007).
Entity Tags: Wendell Belew, Suliman al-Buthe, Taliban, Washington Post, United Nations, Saudi National Commission for Relief and Charity Work Abroad, US Department of the Treasury, National Security Agency, Thomas Nelson, Foreign Intelligence Surveillance Act, Al Haramain Islamic Foundation, Al-Qaeda, Al Haramain Islamic Foundation (Oregon branch), Foreign Intelligence Surveillance Court, Asim Ghafoor, Bush administration (43)
Timeline Tags: Civil Liberties
Bruce Fein, a former deputy attorney general in the Reagan administration, testifies before the Senate Judiciary Committee on the subject of the president’s wartime authority and the illegal wiretapping of American citizens (see December 15, 2005). “This is a defining moment in the constitutional history of the United States,” Fein tells the committee. “The theory invoked by the president to justify eavesdropping by the NSA in contradiction to FISA (see April 30, 1986 and October 23, 2001) would equally justify mail openings, burglaries, torture, or internment camps, all in the name of gathering foreign intelligence. Unless rebuked it will lie around like a loaded weapon, ready to be used by any incumbent who claims an urgent need.” In 2007, author and reporter Charlie Savage will write concerning Fein’s statement: “[A] president had secretly claimed the power to ignore a law, and then he had acted on that power. In so doing, the Bush-Cheney administration unleashed imperial power. Even if they had not personally abused their power, there was no guarantee that future presidents would show the same restraint. Moreover, there was no difference in principle between the warrant law [FISA] and any other law that regulates how the president can carry out his national security responsibilities. By demonstrating that a president can set aside a statute or treaty at will, the administration had set a precedent that future presidents, liberal and conservative alike, would be able to cite when they, too, wanted to violate a legal restriction on their power.” [Savage, 2007, pp. 133-134]
President Bush signs the USA Patriot Improvement and Reauthorization Act of 2005 into law. The bill, which extends and modifies the original USA Patriot Act (see October 26, 2001), was driven through Congress primarily by the Republican majorities in both Houses. However, Senator Dianne Feinstein (D-CA) cosponsored the Senate bill, numerous Democrats in both Houses voted with the Republicans in favor of the bill, and the final bill sailed through the Senate by an 89-10 vote on March 2. [GovTrack, 3/9/2006; Library of Congress, 3/9/2006] In the signing ceremony, Bush calls the Reauthorization Act “a really important piece of legislation… that’s vital to win the war on terror and to protect the American people.” He repeatedly evokes the 9/11 attacks as a reason why the new law is needed. [Government Printing Office, 3/9/2006]
Provisions for Oversight Added - One of the reasons why the reauthorization bill received such support from Congressional moderates on both sides of the aisle is because Congress added numerous provisions for judicial and Congressional oversight of how government and law enforcement agencies conduct investigations, especially against US citizens. Representative Butch Otter (R-ID) said in 2004 that Congress came “a long way in two years, and we’ve really brought an awareness to the Patriot Act and its overreaches that we gave to law enforcement.” He adds, “We’ve also quieted any idea of Patriot II, even though they snuck some of Patriot II in on the intelligence bill” (see February 7, 2003). [Associated Press, 1/23/2004]
Opposition From Both Sides - Liberal and conservative organizations joined together in unprecedented cooperation to oppose several key provisions of the original reauthorization and expansion of the Patriot Act, including easing of restrictions on government and law enforcement agencies in obtaining financial records of individuals and businesses, “sneak-and-peek” searches without court warrants or the target’s knowledge, and its “overbroad” definition of the term “terrorist.” Additionally, lawmakers in Congress insisted on expiration dates for the various surveillance and wiretapping methodologies employed by the FBI and other law enforcement agencies (see Early 2002). [Associated Press, 5/23/2005] The final bill mandates that anyone subpoenaed for information regarding terrorist investigations has the right to challenge the requirement that they not reveal anything about the subpoena, those recipients will not be required to tell the FBI the name of their lawyer, and libraries that are not Internet service providers will not be subject to demands from “national security letters” for information about their patrons. Many of the bill’s provisions will expire in four years. [Christian Science Monitor, 3/3/2006]
Reauthorizing Original Provisions - The bill does reauthorize many expiring provisions of the original Patriot Act, including one that allows federal officials to obtain “tangible items,” such as business records from libraries and bookstores, in connection with foreign intelligence and international terrorism investigations. Port security provisions are strengthened, and restrictions on the sale of over-the-counter cold and allergy medicine that can be used in the illegal manufacture of methamphetamine are imposed, forcing individuals to register their purchases of such medicines and limiting the amounts they can buy. [CBS News, 3/9/2006]
Bush Signing Statement Says He Will Ignore Oversight Mandates - But when he signs the bill into law, Bush also issues a signing statement that says he has no intention of obeying mandates that enjoin the White House and the Justice Department to inform Congress about how the FBI is using its new powers under the bill. Bush writes that he is not bound to tell Congress how the new Patriot Act powers are being used, and in spite of what the law requires, he can and will withhold information if he decides that such disclosure may “impair foreign relations, national security, the deliberative process of the executive, or the performance of the executive’s constitutional duties.” [Statement on Signing the USA PATRIOT Improvement and Reauthorization Act, 3/9/2006; Boston Globe, 3/24/2006] Senator Patrick Leahy (D-VT) says that Bush’s assertion that he can ignore provisions of the law as he pleases, under the so-called “unitary executive” theory, are “nothing short of a radical effort to manipulate the constitutional separation of powers and evade accountability and responsibility for following the law.” Law professor David Golove says the statement is illustrative of the Bush administration’s “mind-bogglingly expansive conception” of executive power, and its low regard for legislative power. [Boston Globe, 3/24/2006] Author and legal expert Jennifer Van Bergen warns of Bush using this signing statement to avoid accountability about the NSA’s warrantless wiretapping program, writing: “[I]t is becoming clearer every day that Bush has no qualms about violating either international laws and obligations or domestic laws. The recent revelations about the secret NSA domestic surveillance program revealed Bush flagrantly violating the Foreign Intelligence Surveillance Act which was specifically enacted to prevent unchecked executive branch surveillance. … His signing statements, thus, are nothing short of an attempt to change the very face of our government and our country.” [Institute for Public Accuracy, 3/27/2006]
Request to Rescind Signing Statement - In late March, Democratic House members Jane Harman and John Conyers will write to Attorney General Alberto Gonzales requesting that the administration rescind the signing statement, writing: “As you know, ‘signing statements’ do not have the force of law. Legislation passed by both Houses and signed by the president does. As Article 1, Section 7, of the Constitution states: ‘Every bill which shall have passed the House of Representatives and the Senate, shall, before it become a Law, be presented to the President of the United States; If he approve he shall sign it, but if not he shall return it.’” Bush and Gonzales will ignore the request. [US House of Representatives, 3/29/2006]
Entity Tags: US Department of Justice, Domestic Security Enhancement Act of 2003, David Golove, Alberto R. Gonzales, Butch Otter, Dianne Feinstein, Patrick J. Leahy, USA Patriot Act, John Conyers, Federal Bureau of Investigation, National Security Agency, Foreign Intelligence Surveillance Act, Jennifer Van Bergen, Jane Harman, George W. Bush
Timeline Tags: Civil Liberties
Expert witness J. Scott Marcus, in an analysis submitted on behalf of the Electronic Frontier Foundation’s lawsuit against AT&T (see January 31, 2006), notes that if the NSA had wanted to intercept only international electronic communications in its surveillance operations facilited by AT&T (see January 16, 2004), it would have placed “splitters” only at entry points such as ocean cable-head stations rather than in AT&T offices (see October 2003) in locations such as Atlanta and San Francisco (see Late 2003), where they would inevitably pick up huge amounts of domestic communications. Marcus, a former AT&T employee who held a top secret clearance when he was a consultant for the Federal Communications Commission (FCC), writes: “The majority of international IP [Internet Protocol] traffic enters the United States at a limited number of locations, many of them in the areas of northern Virginia, Silicon Valley, New York, and (for Latin America) south Florida. This deployment, however, is neither modest nor limited, and it apparently involves considerably more locations that would be required to catch the majority of international traffic.” (Emphasis in original.) Marcus continues: “I conclude that the designers of the SG3 Configuration (see Late 2003) made no attempt, in terms of the location or position of the fiber split, to exclude data sources primarily comprised of domestic data.… Once the data has been diverted, there is nothing in the data that reliably and unambiguously distinguishes whether the destination is domestic or foreign.” Marcus estimates that the NSA has 15 to 20 sites in AT&T facilities around the country, and says, “a substantial fraction, probably well over half, of AT&T’s purely domestic traffic was diverted.” Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Though Marcus refrained from drawing the obvious conclusion, the facts strongly suggest that this entire apparatus was designed for domestic spying.” (Emphasis in original). [Klein, 2009, pp. 49-50, 71] Klein will also write that Marcus’s expertise “was at a much higher level than mine.” Klein will later write that he is pleased that Marcus’s statement validates and supports his own documentation and conclusions. [Klein, 2009, pp. 71]
The Justice Department demands that it be allowed to review evidence obtained by the Electronic Frontier Foundation (EFF) from retired AT&T technician Mark Klein (see February 23-28, 2006). The EFF is preparing to submit the evidence under regular court seal to presiding Judge Vaughn Walker. Neither the Justice Department nor any other government agency is a named defendant in the EFF’s lawsuit against AT&T for its allegedly illegal behavior in working with the National Security Agency (NSA) to conduct warrantless surveillance against American citizens (see January 31, 2006). Even so, lawyers from the Justice Department say they want to see if Klein’s documentation contains classified information (it does not—see Late 2003), and if so, they intend to place Klein’s documentation into a “sensitive compartmented information facility,” which would mean it would not be kept at the courthouse but in the possession of government agents at a secure location. Such classification would make the legal proceedings more difficult for both Judge Walker and the EFF lawyers. However, the request piques the interest of the national media, and reporters begin “flooding” Klein and the EFF with requests for information and interviews. [Klein, 2009, pp. 65-66] Ironically, two news outlets, the Los Angeles Times and New York Times, have all but shunned Klein before now (see February 11, 2006 and After and Mid-February - Late March, 2006). On April 4, after perusing the documents, the government lawyers return them to Walker with approval from senior Justice Department lawyer Anthony J. Coppolino to file them under ordinary court seal. Klein will later write that Coppolino’s acquiescence will undermine the government’s later efforts to have the lawsuit dismissed under the “state secrets” provision (see Late May, 2006). [Klein, 2009, pp. 66] In June 2007, the online technical news site Wired News will publish the documents after they are released by the Electronic Frontier Foundation (see June 13, 2007) under the headline “AT&T ‘Spy Room’ Documents Unsealed; You’ve Already Seen Them.” Wired previously published them in May 2006 (see May 17, 2006), and PBS’s Frontline also published them as part of a televised documentary on Klein and the eavesdropping program. [Wired News, 6/13/2007]
Retired AT&T technician and incipient whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) issues his first press release, summarizing his knowledge of AT&T’s complicity with the National Security Agency (NSA) in that agency’s illegal domestic wiretapping program (see December 31, 2005). Klein has given documentation supporting his claims to the Electronic Frontier Foundation (EFF) in support of that organization’s lawsuit against AT&T (see January 31, 2006). Klein’s press release tells of the NSA’s “secret room” in AT&T’s Folsom Street, San Francisco, facility (see January 2003) and reveals for the first time the NSA’s use of the Narus STA 6400 to comb through the wiretapped data (see January 16, 2004). The release reads in part: “Based on my understanding of the connections and equipment at issue, it appears the NSA is capable of conducting what amounts to vacuum-cleaner surveillance of all the data crossing the Internet—whether that be people’s email, Web surfing, or any other data. Given the public debate about the constitutionality of the Bush administration’s spying on US citizens without obtaining a FISA warrant (see December 18, 2005, December 20, 2005, December 21, 2005, December 21, 2005, December 25, 2005, January 5, 2006, January 10, 2006, January 18, 2006, January 18, 2006, and January 31, 2006), I think it is critical that this information be brought out into the open, and that the American people be told the truth about the extent of the administration’s warrantless surveillance practices, particularly as it relates to the Internet. Despite what we are hearing (see December 19, 2005, December 19, 2005, December 21-22, 2005, and January 19, 2006), and considering the public track record of this administration (see December 24, 2005, Early 2006, January 23, 2006, January 25-26, 2006, and February 2, 2006), I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” Klein issues the press release in part to give himself some publicity, and the protection from government harassment such publicity might entail (see February 11, 2006 and After). [Wired News, 4/7/2006; Wired News, 4/7/2006; Klein, 2009, pp. 66-67]
The New York Times publishes its first report on the allegations by former AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), who is providing evidence and documentation to the Electronic Frontier Foundation (EFF) for that organization’s lawsuit against AT&T (see December 31, 2005 and January 31, 2006). The three-paragraph squib, buried deep in the pages of the “A” section, says that AT&T “cooperated with the National Security Agency in 2003 to install equipment capable of ‘vacuum-cleaner surveillance’ of email messages and other Internet traffic.” The report is based in part on a recent press release issued by Klein (see April 6, 2006), and notes the EFF lawsuit in passing. It admits that Klein has provided some of the documentation to the press, if not to the Times itself (see Mid-February - Late March, 2006), but simply writes that Klein’s documents “describe a room at the AT&T Internet and telephone hub in San Francisco that contained a piece of equipment that could sift through large volumes of Internet traffic.” Klein later calls the brevity and incompleteness of the report “puzzling,” and will say, “Their only purpose seemed to be to signal the government that I had ‘provided’ the New York Times with the documents, while minimizing the story for everyone else.” Klein will speculate, “It looked like some kind of backroom brawl was going on, but the public could not know the details.” [New York Times, 4/7/2006; Klein, 2009, pp. 70] A week later, the Times will publish a more in-depth article (see April 12, 2006).
The New York Times does a more in-depth report on the allegations advanced by former AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), who is providing evidence and documentation to the Electronic Frontier Foundation (EFF) for that organization’s lawsuit against AT&T (see December 31, 2005 and January 31, 2006). The Times published a far briefer report five days earlier (see April 7, 2006). The article provides a brief synopsis of Klein’s allegations—that AT&T worked with the National Security Agency (NSA) to illegally monitor and record millions of Americans’ telephone and Internet communications and thus illegally invaded its customers’ privacy. It also notes, as did the first article, that Klein had provided some of his documentation “to reporters,” though neither article admits that the Times received the documents months beforehand (see Mid-February - Late March, 2006). The new information in the article is the conclusion of “four independent telecommunications and computer security experts” who examined Klein’s documents “at the request of The New York Times.” According to the four experts, the documents “describe equipment capable of monitoring a large quantity of email messages, Internet phone calls, and other Internet traffic. The equipment… was able to select messages that could be identified by keywords, Internet or email addresses, or country of origin and divert copies to another location for further analysis.” All four experts agreed that the documents proved “AT&T had an agreement with the federal government to systematically gather information flowing on the Internet through the company’s network. The gathering of such information, known as data mining, involves the use of sophisticated computer programs to detect patterns or glean useful intelligence from masses of information.” Brian Reid, the director of engineering at the Internet Systems Consortium, says of the AT&T/NSA project: “This took expert planning and hundreds of millions of dollars to build. This is the correct way to do high volume Internet snooping.” An expert who refuses to be named says the documents are “consistent” with Bush administration claims that the NSA only monitored foreign communications and communications between foreign and US locations, in part because of the location of the monitoring sites. (An expert witness, former AT&T and FCC employee J. Scott Marcus, has given testimony for EFF that flatly contradicts this expert’s assertions—see March 29, 2006). The article notes the Justice Department’s objections to Klein’s documents being filed with the court in the EFF lawsuit, and notes that the department withdrew its objections (see Late March - April 4, 2006). It also notes AT&T’s request for the court to order the EFF to return the documents because they are, the firm claimed, “proprietary” (see April 6-8, 2006). AT&T spokesman Walt Sharp says of Klein and the EFF lawsuit: “AT&T does follow all laws with respect to assistance offered to government agencies. However, we are not in a position to comment on matters of national security.” NSA spokesman Don Weber makes a similar statement: “It would be irresponsible of us to discuss actual or alleged operational issues as it would give those wishing to do harm to the United States the ability to adjust and potentially inflict harm.” [New York Times, 4/12/2006] Klein will write of the story, “Finally it was out there in a major newspaper, though I noticed that the New York Times did not show any images of the actual documents, and never called me back for an in-depth followup story.” [Klein, 2009, pp. 71]
Entity Tags: J. Scott Marcus, Brian Reid, AT&T, Bush administration (43), Electronic Frontier Foundation, National Security Agency, Walter Sharp, Mark Klein, Don Weber, New York Times, US Department of Justice
Timeline Tags: Civil Liberties
The New York Times prints a brief editorial in response to its article about AT&T whistleblower Mark Klein and his allegations that the company is colluding with the NSA to illegally wiretap Americans’ communications and compromise their privacy (see April 12, 2006). The editorial recommends: “If AT&T is violating its customers’ privacy rights, it should come clean and stop immediately.… AT&T has a reason to worry if it is participating in illegal domestic spying. In the age of unfettered communication, no company should want to get a reputation for allowing the government to listen in on its customers’ phone calls, read their e-mail, and monitor their Web activity without the requisite legal showing.” [New York Times, 4/17/2006]
The Justice Department announces that it is invoking the “state secrets” clause to prevent a lawsuit by the Electronic Frontier Foundation (EFF) against AT&T from going forward (see March 9, 1953 and January 31, 2006). The EFF is suing AT&T for compromising its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s domestic surveillance program. The government alleges that the lawsuit would reveal “state secrets” critical to “national security” if it continues. The Justice Department makes its initial filing in mid-May (see May 13, 2006). [US District Court, Northern District of California, 4/28/2006 ; Klein, 2009, pp. 71]
President Bush personally intervenes in a Justice Department attempt to investigate the NSA’s domestic surveillance program (see May 9, 2006), refusing to grant the Justice Department’s investigators routine security clearances so they can proceed with the investigation. Bush’s intervention is later admitted by Attorney General Alberto Gonzales in testimony before the Senate Judiciary Committee on July 18, 2006. Bush’s action to block the granting of clearances to the Justice Department’s Office of Professional Responsibility (OPR) is unprecedented, and astonishes many legal experts. As a result of his decision, the OPR has no choice but to drop the investigation (see May 9, 2006). The OPR investigation would not have determined whether the surveillance program was illegal or unconstitutional; rather, the office would have investigated “allegations of misconduct involving department attorneys that relate to the exercise of their authority to investigate, litigate, or provide legal advice,” according to the office’s policies and procedures. [Associated Press, 5/11/2006; USA Today, 7/18/2006; Washington Post, 7/19/2006; National Journal, 3/15/2007]
Stopping Gonzales from Being Investigated - The press later learns that had the probe gone forward, Gonzales himself would have been a prime target of inquiry. It is unclear if Bush knows the OPR investigation would have focused on Gonzales. The probe would have focused on Gonzales’s role in authorizing the eavesdropping program while he was White House counsel, as well as his subsequent oversight of the program as attorney general. Before Bush shuts down the probe, OPR investigators were preparing to question two crucial witnesses—Jack Goldsmith, the former chief of the Justice Department’s Office of Legal Counsel, and James A. Baker, the counsel for the department’s Office of Intelligence Policy and Review. Both Goldsmith and Baker had raised questions about the propriety and legality of numerous aspects of the wiretapping program. The OPR would have also examined documents detailing Gonzales’s participation in the program. [National Journal, 3/15/2007]
OPR Chief Counsel Protests Decision - Upon Gonzales’s admission of Bush’s action, OPR chief counsel H. Marshall Jarrett responds: “Since its creation some 31 years ago, OPR has conducted many highly sensitive investigations involving executive branch programs and has obtained access to information classified at the highest levels. In all those years, OPR has never been prevented from initiating or pursuing an investigation.” Jarrett notes in other memos that clearances had previously been granted to lawyers and agents from the Justice Department and the FBI who were assigned to investigate the original leak of the NSA program’s existence to the media. He also writes that numerous other investigators and officials, including members of Congress and the members of a federal civil liberties board, had been granted access to or been briefed on the program. On March 21, he will write to Gonzales’s deputy, “In contrast, our repeated requests for access to classified information about the NSA program have not been granted.” Gonzales will defend the president’s decicion by saying, in a letter to Judiciary Committee Chairman Arlen Specter (R-PA), that Bush “decided that protecting the secrecy and security of the program requires that a strict limit be placed on the number of persons granted access to information about the program for non-operational reasons. Every additional security clearance that is granted for the [program] increases the risk that national security might be compromised.” In other words, granting the OPR investigators routine security clearances, as has been done countless times in the last three decades as well as in the instances noted by Jarrett, would have jeopardized national security, according to Gonzales’s reasoning. [Associated Press, 5/11/2006; USA Today, 7/18/2006; Washington Post, 7/19/2006] “It is very difficult to understand why OPR was not given clearance so they could conduct their investigation,” Specter will say. “Many other lawyers in the Department of Justice had clearance.” [Boston Globe, 7/19/2006]
OPR Investigators Seeking Information Already in Justice Department's Possession - The questions surrounding the refusal to grant security clearances deepen when it is learned that the OPR investigators were only seeking information and documents relating to the NSA’s surveillance program that were already in the Justice Department’s possession, according to two senior government officials. The only classified information that OPR investigators were seeking was what had already been given to former Attorney General John Ashcroft, Gonzales, and other department attorneys in their original approval and advice on the program, the two senior government officials say. OPR’s request was limited to documents such as internal Justice Department communications and legal opinions, and didn’t extend to secrets that are the sole domain of other agencies. [National Journal, 5/29/2006]
OPR No; Private Citizens Yes - Jarrett will also note in his March 21 letter that, while Bush refused security clearances to OPR investigators, five “private individuals” who serve on Bush’s “Privacy and Civil Liberties Oversight Board have been briefed on the NSA program and have been granted authorization to receive the clearances in question.” Private citizens, especially those who serve only part-time on governmental panels, have traditionally been considered higher security risks than full-time government employees, who can lose their jobs or even be prosecuted for leaking to the press. Jarrett says that in contrast to the private individuals on Bush’s advisory board, OPR’s “repeated requests for access to classified information about the NSA have not been granted. As a result, this office, which is charged with monitoring the integrity of the department’s attorneys and with ensuring that the highest standards of professional ethics are maintained, has been precluded from performing its duties.” Michael Shaheen, who headed the OPR from its inception until 1997, will say that his staff “never, ever was denied a clearance” and that OPR under his leadership had conducted numerous investigations involving the activities of various attorneys general. “No attorney general has ever said no to me,” Shaheen says. [National Journal, 7/18/2006]
Inquiry Opened - The Justice Department’s inspector general, Glenn Fine, will open a preliminary inquiry into how the FBI has used the NSA’s surveillance data, which has often been obtained without judicial warrants and is considered by many legal experts to be illegal. Representative Maurice Hinchey (D-NY), who led the Congressional calls for an investigation of the NSA, says Bush’s decision is an example of “an administration that thinks it doesn’t have to follow the law.” [Washington Post, 7/19/2006] “We can’t have a president acting in a dictatorial fashion,” he says. [USA Today, 7/18/2006]
'Abusing' Their Offices? - Bruce Fein, a Republican constitutional lawyer who served in Ronald Reagan’s Justice Department, compares Gonzales unfavorably to Elliot Richardson, who resigned in 1973 rather than obey then-President Nixon’s order to fire Watergate special prosecutor Archibald Cox. “If he was like Elliot Richardson, he’d say, ‘Mr. President, I quit,’” Fein observes. [Think Progress, 7/18/2006; Washington Post, 7/19/2006] In 2007, law professor and legal ethics expert Charles Wolfram will say that if Gonzales did not inform the president that he might be a target of the OPR investigation, then he ill-served Bush and abused “the discretion of his office” for his own benefit. However, Wolfram will continue, if Gonzales did inform Bush that the probe might harm Gonzales, then “both [men] are abusing the discretion of their offices.” [National Journal, 3/15/2007]
Defending Bush's Decision - Bush officials dismiss the attempted investigation, and the criticisms by Fein, Hinchey, and others, as politically motivated. White House press secretary Tony Snow says the NSA wiretapping program is adequately supervised by internal oversight procedures, including periodic reviews by Gonzales. [Think Progress, 7/18/2006; Washington Post, 7/19/2006] “The Office of Professional Responsibility was not the proper venue for conducting that,” Snow says. He adds that Bush’s denial of the security clearances is warranted because “in the case of a highly classified program, you need to keep the number of people to it tight for reasons of national security, and that was what he did.” [National Journal, 3/15/2007]
Entity Tags: Maurice Hinchey, John Ashcroft, James Baker, Michael Shaheen, US Department of Justice, Office of Professional Responsibility, National Security Agency, Ronald Reagan, Jack Goldsmith, H. Marshall Jarrett, Elliot Richardson, George W. Bush, Alberto R. Gonzales, Archibald Cox, Glenn Fine, Arlen Specter, Charles Wolfram, Bruce Fein, Federal Bureau of Investigation, Senate Judiciary Committee, Tony Snow
Timeline Tags: Civil Liberties
President George Bush issues a memo granting the Director of National Intelligence (DNI) the authority to authorize a corporation to conceal any of its activities related to national security under United States Code 15 USC 78m(b)(3)(A). [US Code Title 15,78m; George W. Bush, 5/5/2006] The memo follows recent allegations that telecommunications firms AT&T, BellSouth, and Verizon have all provided records of US citizens’ telephone communications to the National Security Agency as part of the NSA’s warrantless surveillance program (see October 2001 and February 5, 2006). Almost two months later, Representative Jan Schakowsky (D-IL) learns of the memo and demands an explanation from DNI John Negroponte. Schakowsky will write in part: “I am concerned about this new authority because under it, the DNI does not need to seek any permission from the president or Congress to issue such directives and there is minimal oversight once the directive is given. In fact, it is my understanding that since the DNI is only required to report on directives ‘active’ on the annual October 1st reporting date, the DNI could in fact cover up all directives by having them expire on September 30th of the reporting year. I believe that such expansive authority coupled with lax oversight could lead to the misuse of the power, the over-issuing of directives, and the hiding of activities that could be unconstitutional and violations of citizens’ civil liberties. For instance, I believe that such directives could have been issued to the major telecommunications firms concerning the sharing of phone call records with the National Security Agency without citizens’ knowledge or consent.” Schakowsky asks if there was “a particular corporate activity that the DNI or another believed warranted such protection from disclosure and liability,” how many such directives his office has issued since he was granted such authority, whether any such directives were retroactive, how it is determined that “national security” matters are at stake and who makes such determinations, and whether directives telecommunications firms provide citizens’ phone records without their knowledge or consent are being “covered up.” Negroponte’s reply to Schakowsky, if any, is not known. [Jan Schakowsky, 6/27/2006]
Maurice Hinchey. [Source: Washington Post]A Justice Department investigation into the National Security Agency’s warrantless wiretapping program ends before it begins, because the NSA will not grant Justice Department lawyers routine security clearances. The investigation had been opened in February 2006 (see February 2, 2006) when Representative Maurice Hinchey (D-NY) asked the Justice Department’s Office of Professional Responsibility (OPR) to investigate the NSA’s warrantless surveillance of US citizens (see After September 11, 2001). Without security clearances, investigators could not examine NSA lawyers’ role in the program. OPR counsel H. Marshall Jarrett writes in a letter to Hinchey: “We have been unable to make any meaningful progress in our investigation because OPR has been denied security clearances for access to information about the NSA program. Without these clearances, we cannot investigate this matter and therefore have closed our investigation.” Jarrett and his office have made routine requests for security clearances since January, to no avail. The OPR’s investigation would have focused strictly on whether Justice Department lawyers violated ethical rules, and would not have examined the entire NSA program. Hinchey says, “This administration thinks they can just violate any law they want, and they’ve created a culture of fear to try to get away with that.” [Associated Press, 5/11/2006] Hinchey writes to Jarrett, regarding the failure to grant clearances: “We are perplexed and cannot make sense of your denial of these security clearances. Our request did not ask OPR to give us the intricate details of the NSA program; we understand that such a request would not even be within OPR’s jurisdiction. There appear to be no reasonable grounds for blocking this investigation. Not only does your denial of their request for a security clearance not make sense, it is unprecedented.” Hinchey will try, and fail, to get a bill through the Republican-controlled House Judiciary Committee to force the White House, Justice Department, and Defense Department to turn over to Congress all documents related to the closure of the OPR probe. He will write in a letter to President Bush, “If the NSA program is justified and legal, as you yourself have indicated, then there is no reason to prevent this investigation from continuing.” [US House of Representatives, 7/18/2006] In June 2006, it will be revealed that Bush personally made the decision not to grant the OPR investigators security clearances (see Late April 2006).
President Bush reiterates claims that the NSA wiretapping program specifically targets only suspected al-Qaeda members and sympathizers and does not target domestic communications without court authorizations. “[T]he privacy of ordinary Americans is fiercely protected in all our activities,” Bush asserts. “We’re not mining or trolling through the personal lives of millions of innocent Americans.” Serious questions have been raised about the accuracy of these assertions (see October 2001, December 18, 2005, and May 12, 2006). [Democracy Now!, 5/12/2006]
USA Today headline. [Source: CBS News]USA Today reports that “[t]he National Security Agency (NSA) has been secretly collecting the phone call records of tens of millions of Americans, using data provided by the nation’s three biggest telecommunications providers, AT&T, Verizon, and BellSouth,” according to “people with direct knowledge of the arrangement.” None of the sources would allow USA Today to identify them by name, job, or affiliation. The USA Today story claims that the NSA program “does not involve the NSA listening to or recording conversations,” but does use “the data to analyze calling patterns in an effort to detect terrorist activity,” according to their sources. One source says that the NSA program is compiling “the largest database ever assembled in the world,” with the goal of creating “a database of every call ever made” within US borders. President Bush has said that the NSA program is focused exclusively on international calls, and for the calls to be recorded, “one end of the communication must be outside the United States.” However, this is now shown not to be the case (see January 16, 2004). A US intelligence official says that the NSA program is not recording the actual phone calls themselves, but is collecting what he calls “external” data about the communications to allow the agency to emply “social network analysis” for insight into how terrorist networks are connected with one another. Another large telecommunications company, Qwest, has refused to help the NSA eavesdrop on customer calls (see February 2001, February 2001 and Beyond, and February 27, 2001). USA Today’s sources say that the NSA eavesdropping program began after the 9/11 attacks, a claim that is not bolstered by the facts (see 1997, February 27, 2000, February 27, 2000, December 2000, February 2001, February 2001, February 2001 and Beyond, February 2001, Spring 2001, April 2001, April 4, 2001, July 2001, Before September 11, 2001, and Early 2002). The sources say that the three companies agreed to provide “call-detail records,” lists of their customers’ calling histories, and updates, which would allow the agency to track citizens’ calling habits. In return, the sources say, the NSA offered to pay the firms for their cooperation. After the three firms agreed to help the agency, USA Today writes, “the NSA’s domestic program began in earnest” (see After September 11, 2001, After September 11, 2001, October 2001, September 2002, and Spring 2004). NSA spokesman Don Weber says the agency is operating strictly “within the law,” but otherwise refuses to comment. Former US prosecutor Paul Butler says that the Foreign Intelligence Surveillance Act (FISA), which governs surveillance operations by US intelligence agencies, “does not prohibit the government from doing data mining” (see 1978). White House press spokesman Dana Perino says, “There is no domestic surveillance without court approval,” and all surveillance activities undertaken by government agencies “are lawful, necessary, and required for the pursuit of al-Qaeda and affiliated terrorists.” All government-sponsored intelligence activities “are carefully reviewed and monitored,” she adds, and says that “all appropriate members of Congress have been briefed on the intelligence efforts of the United States” (see October 11, 2001 and October 25, 2001 and November 14, 2001). Don Weber, a senior spokesman for the NSA, refuses to discuss the agency’s operations, saying: “Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues; therefore, we have no information to provide. However, it is important to note that NSA takes its legal responsibilities seriously and operates within the law.” All three firms released similar comments saying that they would not discuss “matters of national security,” but were complying with the law in their alleged cooperation with the NSA. The Electronic Frontier Foundation (EFF) is suing AT&T for what it calls its complicity in the NSA’s “illegal” domestic surveillance program (see January 31, 2006). [USA Today, 5/11/2006]
Entity Tags: Verizon Communications, USA Today, Qwest, Paul Butler, Foreign Intelligence Surveillance Act, Jane Harman, AT&T, BellSouth, National Security Agency, Dana Perino, Don Weber
Timeline Tags: Civil Liberties
Former NSA Director Michael Hayden, testifying as part of his nomination hearings to head the CIA, denies that the NSA has engaged in illegal surveillance operations against US citizens, after allegations by former Qwest CEO Joe Nacchio that he met with NSA officials well before the 9/11 attacks and discussed such a surveillance program. Nacchio refused to cooperate with the NSA, and he says that his telecommunications firm suffered retaliation as a result of his refusal (see February 27, 2001). Other telecom firms such as BellSouth, AT&T, and Verizon did cooperate (see February 2001 and Beyond). Court documents show that Nacchio balked at cooperating with the NSA after learning that the agency wanted Qwest’s phone records of the firm’s customers, but had no warrants or approval from the Foreign Intelligence Surveillance Court, which oversees all US intelligence agencies’ surveillance operations.
Denial - Hayden denies that the NSA has broken the law, and that it has complied with its oversight responsibilities. “Everything that the agency has done has been lawful,” he says. “It’s been briefed to the appropriate members of Congress. The only purpose of the agency’s activities is to preserve the security and the liberty of the American people. And I think we’ve done that.” Nacchio says the NSA continued to make similar requests of Qwest until he left the firm in June 2002. The court documents are part of Nacchio’s trial on numerous counts of insider trading.
Political Reaction - The White House and Senate Republicans are generally supportive of Hayden while Senate Democrats have mixed feelings. One who questions Hayden’s credibility is Ron Wyden (D-OR) of the Senate Intelligence Committee, who says, “The American people have got to know that when the person who heads the CIA makes a statement that they are getting the full picture.” In contrast, Kit Bond (R-MO), a member of the select panel allowed access to classified information on the warrantless surveillance program, says, “The president’s program uses information collected from phone companies,” but only the telephone number called and the caller’s number. Conversations, says Bond, are not recorded. President Bush says that the NSA wiretapping program is not “mining or trolling through the personal lives of millions of innocent Americans.”
Scope of Program - A senior government official given permission to speak anonymously about the program says that while the NSA has access to records of almost all domestic phone calls, the records are used solely to trace regular contacts of “known bad guys.” The NSA needs access to the entirety of citizens’ phone communications, the official says, but it isn’t “interested in the vast majority of them.” [Associated Press, 5/12/2006; New York Times, 5/12/2006; CBS News, 5/12/2006]
Entity Tags: National Security Agency, Senate Intelligence Committee, Michael Hayden, Verizon Communications, Ron Wyden, Qwest, George W. Bush, Foreign Intelligence Surveillance Court, AT&T, Bush administration (43), BellSouth, Joe Nacchio, Christopher (“Kit”) Bond, Central Intelligence Agency
Timeline Tags: Civil Liberties
Bobby Ray Inman. [Source: DefenseTech.org]Former NSA director Bobby Ray Inman says that the secret NSA program to wiretap US citizens’ phone and e-mail conversations without court warrants (see After September 11, 2001) “is not authorized.” President Bush authorized the secret wiretapping over four years ago (see Early 2002), a program only revealed at the end of 2005 (see December 15, 2005). Since the program was revealed, it has created tremendous controversy over its possible illegality and its encroachment on fundamental American civil liberties. Bush and other White House officials have repeatedly asserted that the program is legal, mainly because Bush and his officials assert that the president has the authority to implement such a program (see December 15, 2005); Bush also insists, as recently as the day before Inman’s statement, that the program is only being used to spy on terrorists and the privacy of US citizens is being “fiercely protected,” a statement that does not jibe with the facts. [Democracy Now!, 5/12/2006]
Two public interest lawyers sue Verizon Communications for $5 billion, claiming the telecommunications firm violated privacy laws by giving the phone records of its customers to the NSA for that agency’s secret, warrantless domestic surveillance program. Lawyers Bruce Afran and Carl Mayer are asking that Verizon stop turning over its records to the NSA without either a court order or the consent of the customer. Afran says of the NSA program, “This is the largest and most vast intrusion of civil liberties we’ve ever seen in the United States.” [CBS News, 5/12/2006] Days later, AT&T and BellSouth are added to the lawsuit. [CNN, 5/17/2006]
Verizon Helped Build an NSA Database? - The day before, the press reports that the NSA has built a database of millions of domestic phone records since shortly after the 9/11 attacks, using records from Verizon, BellSouth, and AT&T (see May 11, 2006). Former Qwest CEO Joe Nacchio, whose firm refused to cooperate with the NSA, says that he was approached months before the attacks to help set up such a program (see February 27, 2001). The NSA has the power, under President Bush’s interpretation of his wartime authority, to have the agency eavesdrop on international calls made to or from the US, but cannot legally eavesdrop on internal calls unless it has a court order. The lawsuit claims that the telecoms violated the Constitution and the Telecommunications Act by giving its records to the government without court authorization. The lawsuit seeks $1,000 for each violation of the Telecommunications Act, or $5 billion if the case is certified as a class-action suit. The lawyers are seeking documents detailing the origins of the NSA program, as well as Bush’s own role in authorizing the program. “Federal law prohibits the phone companies from giving records to the government without a warrant,” says Afran. “There was no warrant, nor was there any attempt to get warrants, which is in violation of the constitution and the Telecommunications Act.” [CBS News, 5/12/2006; CNET News, 5/15/2006] Afran says, “One of the purposes of this case is to, quite frankly, hold the threat of financial destruction over the heads of the phone companies to make them abandon this policy of cooperating with warrantless searches by the government.” [National Public Radio, 5/17/2006] The lawsuit alleges that Verizon constructed a dedicated fiber optic line from New Jersey to a large military base in Quantico, Virginia, that allowed government officials to gain access to all communications flowing through the carrier’s operations center. A former consultant who worked on internal security will later say he had tried numerous times to install safeguards on the line to prevent hacking on the system, as he was doing for other lines at the operations center, but he was prevented from doing so by a senior security official. One of the allegations against Verizon in the lawsuit is made by Philadelphia resident Norman LeBoon, who says after he read of the alleged surveillance of US citizens, he began asking Verizon if his landline communications were being shared. LeBoon says he eventually spoke with “Ellen” in Verizon customer service, who told him, “I can tell you, Mr. LeBoon, that your records have been shared with the government, but that’s between you and me.… They [Verizon] are going to deny it because of national security. The government is denying it and we have to deny it, too. Around here we are saying that Verizon has ‘plausible deniability.’” [Truthdig, 8/9/2007]
AT&T Grants Unlimited Access? - The lawsuit claims that in February 2001, days before Qwest was approached, NSA officials met with AT&T officials to discuss replicating an AT&t network center to give the agency access to all the global phone and e-mail traffic that ran through it (see February 2001).
Earlier Reporting Made Key Error - Earlier reporting of the NSA’s cooperation with the telecoms got a key detail wrong, says telecom analyst Scott Cleland: “What I think people got wrong with the original reporting, was that this was local phone companies tracking local phone calls. What is clear now is they were tracking long distance calls.” [National Public Radio, 5/17/2006]
The Justice Department files a brief with the US District Court of Northern California asking that the Electronic Frontier Foundation (EFF)‘s lawsuit against AT&T (see January 31, 2006) be dismissed on the grounds that it would breach “state secrets” vital to “national security.” The Justice Department publicly announced its intentions of asking that the lawsuit be dismissed on those grounds two weeks ago (see April 28, 2006). EFF is suing AT&T for compromising its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s domestic surveillance program. The lawsuit is Hepting, et al v. AT&T, often shortened in the media to Hepting v. AT&T. The government submits a number of secret documents to Judge Vaughn Walker as evidence, along with a heavily redacted document submitted for public perusal. Other documents include affidavits from the Director of National Intelligence, John Negroponte, and the head of the NSA, Lieutenant General Keith Alexander. Some observers believe that Walker, a conservative appointed to the bench by President George H.W. Bush, will quickly comply with the government’s request. However, as AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009), who is working with EFF on the lawsuit (see Early January 2006), will later write, Vaughn is independent-minded and possessed of a “strong libertarian bent,” and will not be so prone to do the government’s bidding as some believe. [Klein, 2009, pp. 72-73] Walker’s first hearing on the brief will be held four days later (see May 17, 2006).
Ira Winkler. [Source: Canadian Broadcasting Corporation]Former NSA analyst Ira Winkler, author of the 2005 book Spies Among Us, writes of his disgust with the NSA’s domestic surveillance program, saying that because it is warrantless, it is illegal. He argues the program violates both the NSA’s rules of engagement and its long-term missions.
Warrantless Surveillance is Illegal - Securing warrants under the Foreign Intelligence Surveillance Act is easily done, Winkler says: “FISA blocks no legitimate acquisition of knowledge. It doesn’t even slow the process down.” The problem, Winkler says, is that the program is so large that securing FISA warrants for every communication the NSA monitors “would [take] an army of lawyers to get all the warrants they’d need to be in compliance with FISA.” However: “[T]he law is the law. No president has the right to pick and choose which laws they find convenient to follow.” President Bush could have asked Congress to amend the FISA laws: “After all, after 9/11 Congress passed a wide variety of laws (without, for the most part, reading them) that were supposed to prevent another attack. They could have easily slipped something modifying FISA into all of that legislation. They did not, though recent revelations about this administration’s use of signing statements may indicate that they simply didn’t want to raise the possibility of questions.” Merely ignoring FISA “is illegal,” Winkler writes.
Weakens National Security - Another issue is national security. Not obtaining warrants actually weakens natural security, he argues, “since the process of obtaining the warrants has an effect on quality control.” For example: “To date, FBI agents have been sent out to do thousands of investigations based on this warrantless wiretapping. None of those investigations turned up a legitimate lead. I have spoken to about a dozen agents, and they all roll their eyes and indicate disgust with the man-years of wasted effort being put into physically examining NSA ‘leads.’ This scattershot attempt at data mining drags FBI agents away from real investigations, while destroying the NSA’s credibility in the eyes of law enforcement and the public in general. That loss of credibility makes the NSA the agency that cried wolf—and after so many false leads, should they provide something useful, the data will be looked at skeptically and perhaps given lower priority by law enforcement than it would otherwise have been given.” Winkler says the NSA’s claim that it does not retain any personal information is ludicrous. “Frankly, you have to be a complete moron to believe that,” he writes. “It is trivial to narrow down access to a phone number to just a few members of a household, if not in fact to exactly one person.”
Extortion - And the warrantless surveillance is not the only illegal action taken by the government. If the government did threaten one telecom firm, Qwest, for not cooperating (see February 2001), “[t]hat’s extortion—another crime.” Winkler writes that both Congress and the American people must demand answers, or the White House and the NSA will continue to usurp our freedom under the cloak of protecting freedoms.
Arguments For Program are Specious - Winkler says the arguments for the program that he hears are groundless. He hears three main threads:
“I have nothing to worry about so I don’t care if they investigate me.” Winkler points out that plenty of people have been investigated and incarcerated in the US and abroad without doing anything wrong: “I believe that Saddam Hussein would cheerfully agree with the tired allegation that if you did nothing wrong, you shouldn’t mind the government looking at your calls. I think Lenin, Stalin, Hitler and the Chinese government would also agree with that line of thought. Is this the company we consent to keep in the name of safety?”
“[W]e need to do everything we can to protect ourselves.” Protecting ourselves, Winkler argues, means letting law enforcement work to protect US citizens against real, ongoing crimes. The government is “watching for dragons while very real snakes multiply freely in our midst.”
“[T]he NSA isn’t listening to the content of the calls, so there’s no harm.” Aside from the fact that Winkler believes the NSA is lying about not listening to the calls themselves, he says: “[The NSA] doesn’t need to hear your chatter to invade your privacy. By simply tying numbers together—an intelligence discipline of traffic analysis—I assure you I can put together a portrait of your life. I’ll know your friends, your hobbies, where your children go to school, if you’re having an affair, whether you plan to take a trip and even when you’re awake or asleep. Give me a list of whom you’re calling and I can tell most of the critical things I need to know about you.” The NSA is made up of mostly “good and honest people,” but it has “more than its share of bitter, vindictive mid- and senior-level bureaucrats. I would not trust my personal information with these people, since I have personally seen them use internal information against their enemies.” Winkler reminds his readers that the Bush administration deliberately outed CIA agent Valerie Plame Wilson because her husband dared debunk an administration claim about Iraq (see November 20, 2007), and tried to undermine the credibility of former counterterrorism chief Richard Clarke when he spoke out against the administration (see March 24, 2004). The NSA could easily provide the administration with damaging information about other administration enemies.
'Against Everything I Was Taught' - “NSA domestic spying is against everything I was ever taught working at the NSA,” Winkler writes. “I might be more for it if there was any credible evidence that this somehow provides useful information that couldn’t otherwise be had. However, the domestic spying program has gotten so massive that the well-established process of getting a warrant cannot be followed—and quantity most certainly doesn’t translate to quality. Quite the opposite.” The terrorists number in the hundreds, Winkler writes, but “the NSA is collecting data on hundreds of millions of people who are clearly not the enemy. These numbers speak for themselves.” [Computerworld, 5/16/2006]
Entity Tags: Qwest, George W. Bush, Foreign Intelligence Surveillance Act, Federal Bureau of Investigation, Ira Winkler, National Security Agency, Valerie Plame Wilson, Saddam Hussein, Richard A. Clarke, Vladimir Lenin, Josef Stalin
Timeline Tags: Civil Liberties
Wired News, the online technical news site, publishes a copy of AT&T whistleblower Mark Klein’s unclassified memo written in 2004 (see January 16, 2004). Klein has joined the Electronic Frontier Foundation (EFF) in its lawsuit against AT&T. Klein has evidence that AT&T colluded with the National Security Agency (NSA) to illegally wiretap Americans’ domestic telephone and Internet communications. [Wired News, 5/17/2006]
Judge Vaughn Walker of the US District Court of Northern California holds a hearing on the government’s request to have the Electronic Frontier Foundation (EFF)‘s lawsuit against AT&T dismissed (see May 13, 2006). The Justice Department says the lawsuit must be dismissed on the grounds that it would breach “state secrets” vital to “national security” if allowed to go forward. EFF is suing AT&T for compromising its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s domestic surveillance program (see January 31, 2006). AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009), who is working with EFF on the lawsuit (see Early January 2006), attends the hearing along with a small phalanx of lawyers; a woman slips a piece of paper into his hand containing her name and the telephone number for CBS News’s 60 Minutes. The AT&T lawyers are furious at Klein because an online news site, Wired News, just published his 2005 memo containing evidence against AT&T that the firm wants suppressed (see May 17, 2006). Klein will later write that he has no knowledge of how Wired News received the document, though the AT&T lawyers believe he supplied it to Wired News, and he will say he is pleased at the publication. (Wired News will later explain why it chose to publish the document—see May 22, 2006.) In the hearing, Walker refuses to order Klein to return the documents to AT&T, noting that Klein is not a plaintiff in the case and therefore Walker lacks the judicial authority to make such an order. Walker advises AT&T if it wants the documents back, it will have to sue Klein for their return. EFF lawyer Cindy Cohn challenges the government’s claim that the lawsuit should be dismissed on “state secrets” grounds, arguing that “this can be litigated without reference to any state secrets.… The question is whether the information has been acquired by AT&T in order to give it to the government and whether it’s been divulged to the government and what the government does with that information afterward, which I think could implicate state secrets, is completely irrelevant, or not necessary for us to pursue this case.” The motion to dismiss is not decided in this hearing. [Klein, 2009, pp. 73-78]
Wired News logo. [Source: Delve Networks]Evan Hansen, the editor in chief of Wired News, an online technical news site, explains why the site published a set of documents from AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009). Klein is working with the Electronic Frontier Foundation (EFF) in that organization’s lawsuit against AT&T for invading its customers’ privacy by taking part in the National Security Agency’s warrantless domestic wiretap operation (see January 31, 2006). The presiding judge, Vaughn Walker, has denied requests from the EFF and a number of news organizations to unseal the documents and make them public. For its part, AT&T wants the documents to remain sealed, claiming they are proprietary and that it would suffer harm if they were disclosed (see April 6-8, 2006). Hansen and the Wired News senior staff disagree. “In addition,” Hansen writes, “we believe the public’s right to know the full facts in this case outweighs AT&T’s claims to secrecy.” Hansen erroneously says that the documents seem “to be excerpted from material that was later filed in the lawsuit under seal,” though “we can’t be entirely sure, because the protective order prevents us from comparing the two sets of documents.” Klein later writes that the Wired News staff “confused my 2004 memo (see January 16, 2004) with my court-sealed legal declaration” (see February 23-28, 2006); even so, Klein will write, “it was true that all of the AT&T documents were still under court seal.” Hansen says Wired News reporter Ryan Singel received the Klein documents from “an anonymous source close to the litigation.” Hansen also writes: “We are filing a motion to intervene in the case in order to request that the court unseal the evidence, joining other news and civil rights organizations that have already done so, including the EFF, the San Francisco Chronicle, the Los Angeles Times, the San Jose Mercury News, the Associated Press, and Bloomberg. Before publishing these documents we showed them to independent security experts, who agreed they pose no significant danger to AT&T. For example, they do not reveal information that hackers might use to easily attack the company’s systems.” Hansen writes that Wired’s publication of the documents does not violate Walker’s gag order concerning the documents’ publication, as the order specifically bars the EFF and its representatives—and no one else—from publishing or discussing them. “The court explicitly rejected AT&T’s motion to include Klein in the gag order and declined AT&T’s request to force the EFF to return the documents,” he notes (see May 17, 2006). [Wired News, 5/22/2006; Klein, 2009, pp. 75]
AT&T lawyers accidentally release sensitive information in their defense of a lawsuit accusing AT&T and two other telecommunications firms of illegally cooperating with an NSA wiretapping program (see January 31, 2006). They release a 25-page legal brief, heavily redacted with thick black lines intended to obscure portions of three pages, in PDF (Portable Data File) format. But some software programs can read the text. The redacted information offers alternative reasons why AT&T has a secret room in its downtown San Francisco switching center designed to monitor Internet and telephone traffic (see February 2001). The Electronic Frontier Foundation, who filed the lawsuit, says the room is used by the NSA surveillance program. The redacted sections argue that the room could be used for “legitimate Internet monitoring systems, such as those used to detect viruses and stop hackers.” Another argument reads, “Although the plaintiffs ominously refer to the equipment as the ‘Surveillance Configuration,’ the same physical equipment could be utilized exclusively for other surveillance in full compliance with” the Foreign Intelligence Surveillance Act (FISA). The court filing is not classified, and no information relating to the actual operations of the NSA’s surveillance program is disclosed. [US District Court, Northern District of California, San Francisco Division, 5/24/2006 ; US District Court, Northern District of California, San Francisco Division, 5/24/2006; CNET News, 5/26/2006]
George Terwilliger, a former deputy attorney general under George H. W. Bush, argues that the current Bush administration’s controversial data mining program (see Late 1999 and After September 11, 2001) is not illegal. Terwilliger tells the conservative National Review, “I think it’s fair to say that the statutes contemplate the transfer of this generic type of data much more on a case-by-case rather than a wholesale basis,” meaning that the law calls for a court order only in cases when the government is making a targeted request for information. But, he adds, “I don’t see anything in the statute that forbids such a wholesale turnover.” Terwilliger’s argument echoes the arguments of the Bush Justice Department, which argues that the data mining program—part of the NSA’s “Stellar Wind” surveillance program (see Spring 2004 and December 15, 2005)—does not technically constitute “electronic surveillance” under the law. Both the Fourth Amendment and the Foreign Intelligence Surveillance Act, as interpreted by the courts, define such actions as “electronic surveillance,” according to a number of legal experts, including law professor Orin Kerr. And, Ars Technica reporter Julian Sanchez notes in 2009, “the Stored Communications Act explicitly makes it a crime to ‘knowingly divulge a record or other information pertaining to a subscriber to or customer of such service… to any governmental entity.’” Sanchez will call Terwilliger’s argument “very strange,” but will note that Terwilliger is the attorney for then-Attorney General Alberto Gonzales and “a prominent defender of the administration’s surveillance policies.” Sanchez will conclude that while the argument “might pass for clever in a high school debate round… [i]t would be deeply unsettling if it [passes] for anything more in the halls of power.” [National Review, 6/5/2006; Ars Technica, 12/16/2008]
In a follow-up hearing, Judge Vaughn Walker of the US District Court of Northern California hears arguments by AT&T and the Justice Department as to whether he should dismiss a lawsuit against AT&T by the Electronic Frontier Foundation (EFF—see January 31, 2006). The EFF argues that AT&T violated its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s allegedly illegal domestic wiretapping project. The government asserts that the lawsuit would jeopardize “state secrets” if permitted to go forward (see May 22, 2006). In today’s hearing, Justice Department lawyer Peter Keisler admits to Walker that the documents presented on behalf of the EFF by AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) and others are not classified. “None of the documents they (EFF) have submitted… implicate any privileged [classified] matters,” Keisler tells Walker. The judge says, “Including the Klein documents.” Keisler agrees, saying: “We have not asserted any privilege over the information that is in the Klein and Marcus (see March 29, 2006) documents.… Mr. Klein and Marcus never had access to any of the relevant classified information here, and with all respect to them, through no fault or failure of their own, they don’t know anything.” Klein will later write that Keisler’s admission is a crippling blow to the government’s assertion that the EFF documentation would compromise national security if made public or submitted in open court. [Klein, 2009, pp. 77]
Lawyers file court documents alleging that the National Security Agency (NSA) worked with AT&T to set up a domestic wiretapping site seven months before the 9/11 attacks. The papers are filed as part of a lawsuit, McMurray v. Verizon Communications, which cites as plaintiffs AT&T, Verizon, and BellSouth customers whose privacy was allegedly violated by the NSA warrantless wiretapping program (see May 12, 2006); it also alleges that the firms, along with the NSA and President Bush, violated the Telecommunications Act of 1934 and the US Constitution. AT&T, Verizon, and BellSouth have been accused of working with the NSA to set up domestic call monitoring sites (see October 2001). Evidence that the NSA set up domestic surveillance operations at least seven months before the 9/11 attacks is at the core of the lawsuit (see Spring 2001). The suit is similar to one filed against AT&T by the Electronic Frontier Foundation (EFF—see January 31, 2006) and other such lawsuits. A lawyer for the plaintiffs in McMurray, Carl Mayer, says: “The Bush administration asserted this [the warrantless wiretapping program] became necessary after 9/11. This undermines that assertion.” AT&T spokesman Dave Pacholczyk responds, “The US Department of Justice has stated that AT&T may neither confirm nor deny AT&T’s participation in the alleged NSA program because doing so would cause ‘exceptionally grave harm to national security’ and would violate both civil and criminal statutes.” Verizon has denied being asked by the NSA for its customer phone records, and has refused to confirm or deny “whether it has any relationship to the classified NSA program.” BellSouth spokesman Jeff Battcher says: “We never turned over any records to the NSA. We’ve been clear all along that they’ve never contacted us. Nobody in our company has ever had any contact with the NSA.” The NSA domestic wiretapping program is known as “Pioneer Groundbreaker,” a part of the larger “Project Groundbreaker” (see February 2001). According to Mayer and his fellow lawyer Bruce Afran, an unnamed former employee of AT&T provided them with information about NSA’s approach to AT&T. (That former employee will later be revealed as retired technician Mark Klein—see Late 2002, July 7, 2009, December 15-31, 2005, and April 6, 2006). The lawsuit is on a temporary hiatus while a judicial panel rules on a government request to assign all of the telecommunications lawsuits to a single judge. [Bloomberg, 6/30/2006]
Entity Tags: Verizon Wireless, US Department of Justice, National Security Agency, George W. Bush, Jeff Battcher, Bruce Afran, BellSouth, AT&T, Mark Klein, Carl Mayer, Electronic Frontier Foundation, Dave Pacholczyk
Timeline Tags: Civil Liberties
Civil liberties lawyer and columnist Glenn Greenwald states that the recent Supreme Court ruling in Hamdan v. Rumsfeld (see June 30, 2006), finding that the Bush administration’s Guantanamo Bay military commissions violate both federal law and the Geneva Conventions, also proves that the NSA’s warrantless wiretapping program is illegal (see December 15, 2005). “To arrive at its decision,” Greenwald writes, “the Court emphatically rejected the administration’s radical theories of executive power, and in doing so, rendered entirely discredited the administration’s only defenses for eavesdropping on Americans without the warrants required by law. Actual compliance with the Court’s ruling, then, compels the administration to immediately cease eavesdropping on Americans in violation of FISA,” the Foreign Intelligence Surveillance Act (see 1978). “If the administration continues these programs now, then they are openly defying the Court and the law with a brazeness and contempt for the rule of law that would be unprecedented even for them.” Greenwald notes that FISA prohibits any surveillance of American citizens without judicial approval and oversight. The Bush administration has already admitted to conducting just such surveillance (see December 17, 2005 and December 21, 2005), and President Bush has even stated his intention to expand the program (see December 19, 2005). The Justice Department and a number of administration officials have attempted to claim the NSA surveillance program is both legal and necessary (see December 19, 2005, December 19, 2005, December 21-22, 2005, and Early 2006); Greenwald writes that the Hamdan decision “decimated” those claims, a conclusion shared by a number of legal experts (see January 9, 2006). Moreover, he writes, there is no remaining excuse for Democratic senators not to endorse Senator Russ Feingold’s resolution to censure Bush for violating FISA (see March 12, 2006 and After). The argument advanced by, among others, Senator Barack Obama (D-IL), that Bush believed he was complying with the law because his lawyers told him he was in compliance, is no longer relevant in light of Hamdan, Greenwald argues. “[T]here is no longer any good faith basis left for violating FISA. Ongoing warrantless eavesdropping can only be ordered by the president with a deliberate intent to break the law. After Hamdan, there are no more excuses left for the president to violate FISA, and there is therefore no more excuse left for Democratic senators to refuse to take a stand with Sen. Feingold against the administration’s lawbreaking.” Bush has two clear choices, Greenwald writes: either to comply with FISA or openly defy the Supreme Court. “If we are a country that continues to operate under the rule of law, compliance with the Supreme Court’s ruling compels the immediate cessation of the president’s warrantless eavesdropping program, as well as what are undoubtedly the other, still-secret programs prohibited by law but which have been justified by these same now-rejected theories of unlimited executive power. Put simply, after Hamdan, there are no more excuses left for the president’s refusal to comply with the law.” [Crooks and Liars, 7/8/2006]
Judge Vaughn Walker of the US District Court of Northern California rejects a request by the Justice Department to dismiss a lawsuit by the Electronic Frontier Foundation (EFF—see January 31, 2006) against AT&T. The EFF argues that AT&T violated its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s allegedly illegal domestic wiretapping project. The government has asserted that the lawsuit would jeopardize “state secrets” if permitted to go forward (see May 22, 2006 and June 23, 2006). According to AT&T whistleblower Mark Klein, working with the EFF in the lawsuit, Walker “ridicule[s]” the government’s request for dismissal on state secrets grounds, finding that “[t]he government has opened the door for judicial inquiry by publicly confirming and denying material information about its monitoring of communications content.… AT&T and the government have for all practical purposes already disclosed that AT&T assists the government in monitoring communication content. [T]he government has publicly admitted the existence of a ‘terrorist surveillance program’ (see After September 11, 2001, After September 11, 2001, October 2001, and September 2002).… Considering the ubiquity of AT&T telecommunications services, it is unclear whether this program could even exist without AT&T’s acquiescence and cooperation.” EFF had given Walker the ammunition for his finding by providing him with a raft of media stories about AT&T’s involvement in the NSA surveillance program, as well as media coverage of Klein’s assertions (see April 12, 2006 and May 17, 2006). “The very subject matter of this action is hardly a secret” any longer, Walker finds (see May 24, 2006). “[D]ismissing this case at the outset would sacrifice liberty for no apparent enhancement of security.” Walker also rejects a separate motion to dismiss by AT&T, which had argued that its relationship with the government made it immune from prosecution. Marc Rotenberg of the Electronic Privacy Information Center (EPIC) says: “This cases arises against the backdrop of the accountability of the government as it pursues its surveillance program. This is a significant victory for the principle of government accountability.” AT&T spokesman Walt Sharp refuses to give a direct comment about the ruling, but says that AT&T has always protected its customers’ privacy (see February 2001 and Beyond, February 2001, and Late 2002-Early 2003). The government will obtain a stay of Walker’s ruling while it files an appeal, preventing the EFF documents from being publicly disseminated. [New York Times, 7/21/2006; Klein, 2009, pp. 78-79]
Federal district court judge Anna Diggs Taylor rules that the NSA’s warrantless wiretapping program (see Early 2002) is unconstitutional and orders it ended. She amends her ruling to allow the program to continue while the Justice Department appeals her decision. The decision is a result of a lawsuit filed by the American Civil Liberties Union (ACLU) and other civil liberties groups. Taylor rules that the NSA program violates US citizens’ rights to privacy and free speech, the Constitutional separation of powers among the three branches of government, and the Foreign Intelligence Surveillance Act (see 1978). Taylor writes: “It was never the intent of the framers to give the president such unfettered control, particularly where his actions blatantly disregard the parameters clearly enumerated in the Bill of Rights. There are no hereditary Kings in America and no powers not created by the Constitution. So all ‘inherent powers’ must derive from that Constitution.” [Verdict in ACLU et al v. NSA et al, 8/17/2006 ; Washington Post, 8/18/2006] The program “violates the separation of powers doctrine, the Administrative Procedures Act, the First and Fourth amendments to the United States Constitution, the FISA and Title III,” Taylor writes, and adds, “[T]he president of the United States… has undisputedly violated the Fourth in failing to procure judicial orders.” [CNN, 8/17/2006]
Judge Lets One Portion Stand - Taylor rejects one part of the lawsuit that seeks information about the NSA’s data mining program (see October 2001), accepting the government’s argument that to allow that portion of the case to proceed would reveal state secrets (see March 9, 1953). Other lawsuits challenging the program are still pending. Some legal scholars regard Taylor’s decision as poorly reasoned: national security law specialist Bobby Chesney says: “Regardless of what your position is on the merits of the issue, there’s no question that it’s a poorly reasoned decision. The opinion kind of reads like an outline of possible grounds to strike down the program, without analysis to fill it in.” The White House and its Republican supporters quickly attack Taylor, who was appointed to the bench by then-President Jimmy Carter, as a “liberal judge” who is trying to advance the agenda of Congressional Democrats and “weaken national security.” For instance, Senator Mike DeWine (R-OH) says that halting the program “would hamper our ability to foil terrorist plots.” [Washington Post, 8/18/2006]
Democrats, Civil Libertarians Celebrate Ruling - But Democrats defend the ruling. For instance, Senator John Kerry (D-MA) says the ruling provides a much-needed check on the unfettered power of the Bush White House. “[N]o one is above the law,” says Kerry. [Washington Post, 8/18/2006] Lawyers for some of the other cases against the NSA and the Bush administration laud the decision as giving them vital legal backing for their own court proceedings. “We now have a ruling on the books that upholds what we’ve been saying all along: that this wiretapping program violates the Constitution,” says Kevin Bankston, who represents the Electronic Frontier Foundation (EFF) in its class-action case against AT&T for its role in the NSA’s surveillance program (see January 31, 2006). [Washington Post, 8/18/2006] Legal expert and liberal commentator Glenn Greenwald writes that Taylor’s ruling “does not, of course, prohibit eavesdropping on terrorists; it merely prohibits illegal eavesdropping in violation of FISA. Thus, even under the court’s order, the Bush administration is free to continue to do all the eavesdropping on terrorists it wants to do. It just has to cease doing so using its own secretive parameters, and instead do so with the oversight of the FISA court—just as all administrations have done since 1978, just as the law requires, and just as it did very recently when using surveillance with regard to the [British] terror plot. Eavesdropping on terrorists can continue in full force. But it must comply with the law.” Greenwald writes: “[T]he political significance of this decision cannot be denied. The first federal court ever to rule on the administration’s NSA program has ruled that it violates the constitutional rights of Americans in several respects, and that it violates criminal law. And in so holding, the court eloquently and powerfully rejected the Bush administration’s claims of unchecked executive power in the area of national security.” [Salon, 8/17/2006]
White House Refuses to Comply - The Bush administration refuses to comply with Taylor’s ruling, asserting that the program is indeed legal and a “vital tool” in the “war on terrorism.” It will quickly file an appeal, and law professors on both sides of the issue predict that Taylor’s ruling will be overturned. [Savage, 2007, pp. 206]
Lawsuit Ends with White House 'Compromise' - The lawsuit will end when the White House announces a “compromise” between the wiretapping program and FISC (see January 17, 2007).
Entity Tags: John Kerry, Kevin Bankston, Mike DeWine, US Department of Justice, Peter Hoekstra, Glenn Greenwald, National Security Agency, George W. Bush, James Earl “Jimmy” Carter, Jr., Foreign Intelligence Surveillance Act, Alberto R. Gonzales, American Civil Liberties Union, AT&T, Anna Diggs Taylor, Bush administration (43), Bobby Chesney, Foreign Intelligence Surveillance Court, Electronic Frontier Foundation
Timeline Tags: Civil Liberties
Vice President Cheney linked the NSA’s warrantless surveillance program to the case of 9/11 hijackers Khalid Almihdhar and Nawaf Alhazmi. [Source: White House]Vice President Dick Cheney justifies an NSA program for warrantless surveillance of conversations between the US and other countries by referring to communications between 9/11 hijackers Khalid Almihdhar and Nawaf Alhazmi in the US and an al-Qaeda communications hub in Yemen (see Early 2000-Summer 2001). The calls were intercepted by the NSA, but this did not help the US roll up the plot. Echoing remarks previously made by President Bush (see December 17, 2005), Cheney says: “If you’ll recall, the 9/11 Commission focused criticism on the nation’s inability to uncover links between terrorists at home and terrorists overseas [note: the 9/11 Commission’s final report does not actually say this (see December 17, 2005)]. The term that was used is ‘connecting the dots’—and the fact is that one small piece of data might very well make it possible to save thousands of lives. If this program had been in place before 9/11, we might have been able to prevent it because we had two terrorists living in San Diego, contacting terrorist-related numbers overseas.” [Office of the Vice President, 8/25/2006] Before 9/11, the NSA was entitled to pass on information about the calls to the FBI, but did not do so, even though the FBI had specifically asked for information about calls between the communications hub in Yemen and the US (see Late 1998 and (Spring 2000)). Various explanations for this failure are offered after 9/11 (see Summer 2002-Summer 2004 and March 15, 2004 and After).
The Director of National Intelligence, John Negroponte, and NSA Director Keith Alexander try to get a lawsuit dismissed that alleges the NSA illegally wiretapped a Saudi charitable organization (see February 28, 2006). The organization, the Al Haramain Islamic Foundation, is presenting a classified US document as proof of the illegal wiretapping.
Invoking 'State Secrets' Privilege - In late 2006, Negroponte and Alexander tell the presiding judge, US District Judge Garr King, that in order to defend itself, the government would have to disclose “state secrets” (see March 9, 1953) that would expose US anti-terrorism efforts. This same argument will be reiterated in July 2007, when government lawyers say, “Whether plaintiffs were subjected to surveillance is a state secret, and information tending to confirm or deny that fact is privileged.” The judge will hear arguments for and against dismissing the case on August 15, 2007. [Associated Press, 8/5/2007]
Judicial Examination - King, in Portland, Oregon, examined the document for himself, and read classified briefs supplied by the Justice Department. Upon reading the briefs, King met with government lawyers to discuss turning over yet more documents in discovery—a decision unlikely to have been taken had King not believed the evidence did not show that the Al Haramain plaintiffs were, in fact, monitored. And, under FISA, had the surveillance been lawful and court-ordered, King would have been legally constrained to dismiss the lawsuit, since according to that law, plaintiffs can only sue if no warrant was ever issued for the alleged surveillance. “If there was a FISA warrant, the whole case would have crumbled on the first day,” says plaintiff attorney Thomas Nelson, “It’s pretty obvious from the government’s conduct in the case, there was no warrant.”
'Inherent Authority' of President - Justice Department lawyers rely on the argument that the president has the inherent authority to order surveillance of suspected terrorists with or without warrants, and that to judge the president’s decision would reveal national secrets that would alert terrorists to government anti-terrorist actions, thereby mandating that this and other lawsuits be dismissed.
Consolidation of Lawsuits - An August 2006 court ruling ordering that the Al Haramain case be consolidated with 54 other NSA-related lawsuits, under US District Court Judge Vaughn Walker, damaged the government’s argument that it cannot be sued in court. Walker has presided over the year-old class-action lawsuit brought before his court by the Electronic Frontier Foundation against AT&T for the telecom firm’s cooperation with the NSA program (see January 31, 2006); Walker ruled in July 2006 that the case would proceed, against government requests that it be thrown out because of national security requirements. Walker ruled that because the government had already admitted to the existence of the program, the state secrets privilege does not apply. (The Justice Department is appealing Walker’s decision.) As for Al Haramain, its lawyers want that case to be adjudicated separately, because the court has sufficient evidence to decide on the case without waiting for the appellate court decision. Another lawyer for the plaintiffs, Jon Eisenberg, tells Walker in February 2007, “You need only read the statutes to decide, ‘Does the president have the right to do this without a warrant?’” Walker has yet to rule on that request. [Wired News, 3/5/2007]
Entity Tags: Thomas Nelson, Vaughn Walker, National Security Agency, US Department of Justice, Jon Eisenberg, John Negroponte, AT&T, Al Haramain Islamic Foundation (Oregon branch), Garr King, Keith Alexander, Electronic Frontier Foundation
Timeline Tags: Civil Liberties
The US intelligence community begins plumbing the data they have compiled on Iran’s nuclear weapons program in an attempt to shore up the Bush administration’s premature conclusion that Iran is on the verge of producing a nuclear weapon. Instead, their conclusions are that Iran shut down its nuclear weapons program in 2003. In the process, White House aides begin a program of “deep dives,” or special briefings for President Bush to meet with not only his advisers but the actual analysts who study Iranian intelligence data, in an attempt to allow Bush to “get his hands dirty” with real intelligence and not just pre-digested summaries. Bush is dismayed at the lack of solid intelligence on Iran’s nuclear program and asks for more. When the intelligence community does provide more, it finds more and more evidence that Iran had shut down its nuclear weapons program years before. Those conclusions will be released in a National Intelligence Estimate (NIE) a year later (see December 3, 2007).
Troubling Conclusions, White House Spin - Bush and his top officials don’t like the findings; if true, the reports disprove the entirety of the administration’s push to define Iran as an imminent threat to the Middle East. White House officials are initially skeptical, believing that the intelligence community might be a victim of Iranian disinformation. The intelligence agencies create a special “red team” of analysts to thoroughly test and, if possible, discredit the information. They are unable to do so. “They tried to figure out what exactly it would take to perpetrate that kind of deception, how many people would be involved, how they would go about doing it, when it would have been set up and so forth,” says one intelligence official. Analysts “scrubbed and rescrubbed” more than 1,000 pieces of evidence but conclude Iran’s program really had been shut down. Faced with that conclusion, the White House decides to focus on the findings that confirm their suspicions—that Iran did have a secret weapons program that could be restarted again. No one in the White House suggests that Bush tone down his rhetoric or change his policies towards Iran. Director of National Intelligence Mike McConnell decides to keep the new findings secret, the same position adopted by Vice President Cheney (see October 2006 and November 10, 2007). Only the Israelis are told of the new findings; Congress, the US’s European allies, and the UN’s monitoring agency, the International Atomic Energy Agency (IAEA) are told nothing. McConnell will reluctantly change his mind out of a fear of leaks and possible charges of a coverup. That decision may come back to haunt the administration, particularly with the ill-will it will create among the US’s allies. Former State Department nonproliferation official Robert Einhorn says, “The administration is going to pay a price for not allowing allies in on it at an earlier date. The French had carried the administration’s water on this issue and really went out on a limb to get the European Union to adopt tough sanctions. And now the rug has been pulled out from under them.”
New NIE Draft Sparks Controversy - An NIE the year before (see August 2, 2005) had led the US to conclude that Iran was actively working on a nuclear weapons program. Congressional Democrats, not entirely convinced by the NIE’s conclusions and increasingly resistant to Bush’s push for confrontation with Iran, asks for a new NIE. Bush wants the new NIE to confirm his accusations and, in one official’s words, “get more information on Iran so we know what they’re up to.” The 2005 NIE had been based largely on information about Iran’s “Project 1-11,” a program that Iran is apparently pursuing to retrofit a ballistic missile to carry nuclear warheads (see Summer 2004). But no new information on Project 1-11 has been secured in three years, and the administration insists on new confirmations. “They just wouldn’t budge,” one agency official recalls. A new draft is completed in June, provoking heated discussions among agency and administration officials. CIA director Michael Hayden and NSA director Keith Alexander begin directing their agencies to closely monitor Iranians who were involved in their country’s nuclear program. Soon, communications intercepts from key Iranian officials indicate that the program had been mothballed in 2003. Some of the officials discuss their belief that the program may never be restarted.
Evolving NIE - As the draft NIE evolves, McConnell, with the assistance of his deputies Thomas Fingar and Donald Kerr, both national security veterans, lay down ground rules. One official later says that McConnell “quickly got the mantra down: ‘We must make a clear distinction between what we know and don’t know and what we judge to be the case.’” The internal debate over the NIE is sharp and often contentious. McConnell will finally inform Bush of the new conclusions—that Iran stopped its nuclear weapons program in 2003—in August (see December 5, 2007 and December 3-4, 2007). In September, House and Senate intelligence committee members are informed as well. A September draft radically differs from the June version, based in large part on the communications intercepts and the exhaustive analysis on the data possessed by the CIA and NIE. The chief analysts are grilled by Hayden and his deputy Stephen Kappes, but the analyses stand up. Cheney, National Security Adviser Stephen Hadley, and other key officials will be given a preliminary briefing on the new NIE on November 15; Bush, finalizing a Middle East peace conference in which he will try to rally Middle Eastern countries against Iran, is not officially told of the new NIE until November 28. Bush immediately tells Israeli Prime Minister Ehud Olmert (see November 26-28, 2007), and Cheney appraises Israeli Foreign Minister Ehud Barak. Discussions about whether or not to keep the NIE secret lead to McConnell’s decision to make a declassified version public. A top intelligence official says, “We knew it would leak, so honesty required that we get this out ahead, to prevent it from appearing to be cherry picking.” [Washington Post, 12/8/2007]
Entity Tags: Keith Alexander, Ehud Barak, Don Kerr, Central Intelligence Agency, Bush administration (43), Ehud Olmert, International Atomic Energy Agency, Office of the Director of National Intelligence, Richard (“Dick”) Cheney, Robert Einhorn, National Security Agency, Mike McConnell, Michael Hayden, Stephen Kappes, Thomas Fingar, George W. Bush
Timeline Tags: US confrontation with Iran
US intelligence learns al-Qaeda courier Abu Ahmed al-Kuwaiti’s real full name. According to later media reports, his real name is Ibrahim Saeed Ahmed. In late 2005, intelligence analysts concluded Ahmed was very likely working for Osama bin Laden or some other high ranking al-Qaeda leader (see Late 2005). [MSNBC, 5/4/2011; Associated Press, 6/1/2011] An unnamed US official will cryptically say that the crucial intelligence on his real name comes not from Pakistan, but “from a different part of the world.” [CNN, 5/2/2011]
Intel from Ahmed's Family? - Apparently, around 2006, US intelligence somehow learned his real last name (see (2006)). But since “Ahmed” is a common name in many countries, more work was needed to learn the rest of his name. It appears that intelligence comes from learning about his family. The New York Times will later report that after his last name was discovered, analysts “turned to one of their greatest investigative tools—the National Security Agency (NSA) began intercepting telephone calls and e-mail messages between the man’s family and anyone inside Pakistan. From there they got [Ahmed’s] full name.” [New York Times, 5/2/2011]
How Did US Intelligence Know about His Family? - The exact sequence of events of how analysts learn who his family is will not be revealed. But the “al-Kuwaiti” in Ahmed’s “Abu Ahmed al-Kuwaiti” alias obviously refers to Kuwait, and US intelligence learn at some point from other prisoners that Ahmed’s parents had moved to Kuwait (even though he originally was from Pakistan). [Associated Press, 6/1/2011]
Could Ahmed's Father Be Important Al-Qaeda Figure? - It will later be reported that Ahmed’s father was close to bin Laden. This still unnamed father, who lived and worked in Kuwait, allegedly had a trusting relationship with bin Laden going back 30 to 40 years. [Dawn (Karachi), 5/7/2011] Perhaps this is not relevant, but if US intelligence already had some intelligence on Ahmed’s father, this could have narrowed down the search of Pakistani-linked families living in Kuwait.
Real Name Will Lead to Location - It is unclear when, but the NSA eventually starts tracking the phone calls of Ahmed’s relatives in the Persian Gulf to anyone they call in Pakistan. Later, the NSA will be able to figure out Ahmed’s location in Pakistan from one such phone call (see Summer 2009). [Associated Press, 6/1/2011]
Attorney General Alberto Gonzales sends a letter to the Senate Judiciary Committee informing it that the lawsuit against the administration’s warrantless wiretapping program (see August 17, 2006) is moot—the National Security Agency will now operate under the aegis of the Foreign Intelligence Surveillance Court (FISC) in its wiretaps. One of the FISC judges, Gonzales writes, has issued an “innovative” and “complex” order that allows the NSA to continue doing what it had been doing with the overall approval of the court, or at least the approval of the single FISC judge. Gonzales does not go into detail about the judge’s ruling, but the administration intensifies its attack on the lawsuit, asking an appeals court to set the previous ruling aside in light of the new FISC protocol, and even to erase the ruling from judicial history as a matter of “public interest.” The appeals court votes 2-1 to set aside the previous ruling; the majority opinion finds that the state secrets privilege prevents the courts from learning whether the plaintiffs in the case had the standing to sue. [Savage, 2007, pp. 207]
Former Los Angeles Times editor Dean Baquet says his newspaper did not bow to government pressure in choosing not to run a story about allegations by AT&T whistleblower Mark Klein (see July 7, 2009, December 15-31, 2005, and February 11, 2006 and After). In an ABC News report on Klein’s allegations of AT&T’s complicity with the National Security Agency (NSA) to illegally conduct warrantless electronic surveillance against American citizens, Klein says that the Times bowed to government pressure from the then-Director of National Intelligence John Negroponte and the then-Director of the NSA Michael Hayden. Baquet, now the Washington bureau chief of the New York Times, says that while he spoke to both Negroponte and Hayden about the story, “government pressure played no role in my decision not to run the story.” Instead, Baquet says he and managing editor Doug Frantz decided “we did not have a story, that we could not figure out what was going on” based on Klein’s highly technical documents. Baquet says Times reporter Joseph Menn disagreed with his decision, “and was very disappointed.” Klein’s story was published in the New York Times in April 2006 (see April 7, 2006 and April 12, 2006). [ABC News, 3/26/2007] Klein will later write that Baquet’s explanation is an “absurd and flimsy excuse,” and will say it is obvious that the Los Angeles Times “capitulated to government pressure.” [Klein, 2009, pp. 62]
Suzanne Spaulding. [Source: Bipartisan Security Group]Suzanne Spaulding, a national security expert with twenty years of experience in the CIA, on various Congressional oversight committees, and executive director of two separate commissions on terrorism and weapons of mass destruction, testifies before the Senate Judiciary Committee as part of that body’s hearings on the improper use of National Security Letters (NSLs) by the FBI (see October 25, 2005). Spaulding has spoken out before against the NSA’s wiretapping program (see December 25, 2005). She says that the nation’s law enforcement and intelligence agents need “the tools they need to do their job” and “clear guidance on just what it is that we want them to do on our behalf—and how we want them to do it. Clear rules and careful oversight provide essential protections for those on the front lines of our domestic counterterrorism efforts.” However, Spaulding testifies, “it appears both were lacking in the implementation of national security letter authorities.” Spaulding says that Congress should begin a much larger examination of domestic surveillance issues, saying, “The appropriateness of using FISA electronic surveillance to eavesdrop on Americans should be considered in light of other, less intrusive techniques that might be available to establish whether a phone number belongs to a suspected terrorist or the pizza delivery shop. It’s not the ‘all or nothing’ proposition often portrayed in some of the debates.” However, according to recent findings by the Justice Department’s Inspector General, Glenn A. Fine, “there is not sufficient guidance on how to apply that in the NSL context or in conjunction with other available collection techniques.” Therefore, there is a strong “need for a broader examination of domestic intelligence tools.”
Urges Congressional Review - Spaulding urges Congress “to undertake a comprehensive review of all domestic intelligence collection, not just by FBI but also by the other national security agencies engaged in domestic intelligence collection, including the Central Intelligence Agency, the Department of Defense, and the National Security Agency. A Joint Inquiry or Task Force could be established by the Senate leadership, with representation from the most relevant committees (Judiciary, Intelligence, Armed Services, and Homeland Security and Government Affairs), to carefully examine the nature of the threat inside the US and the most effective strategies for countering it. Then Congress, and the American public, can consider whether we have the appropriate institutional and legal framework for implementing those strategies with adequate safeguards and oversight.”
FBI's Expanded Powers Need Review - In addition, she testifies, the FBI’s expanded ability to use NSLs under the Patriot Act must be examined. Currently, the law seems to allow the FBI to use NSLs to obtain evidence pursuant to a FISA warrant, thus allowing “the government to get information about individuals who are not themselves the subject of an investigation”—“parties two or three steps removed from their subjects without determining if these contacts reveal suspicious connections,” Fine reported. Spaulding expands on Fine’s findings: “In fact, the most tenuous of connections would seem to suffice for this NSL standard. For example, it’s not clear why an ‘investigation to protect against international terrorism’ couldn’t justify demanding information about all residents of, say, Dearborn, Michigan [home to a large Arab-American community], so that you could run them through some logarithmic profile to identify ‘suspicious’ individuals. In fact, Congress should examine the facts surrounding the nine NSLs in one investigation that were, according to the IG Report, used to obtain information regarding over 11,000 different phone numbers.”
Data Mining Efforts Should Be Examined - Also, she says, data mining efforts by other law enforcement and intelligence agencies should be carefully examined and addressed: “NSLs should not become a mechanism for gathering vast amounts of information about individuals with no known connection to international terrorism for purposes of data mining.” Spaulding also notes that the Patriot Act allows FBI special agents in charge (SACs) to issue NSLs; instead, she says, only attorneys in the Justice Department’s National Security Division should be able to issue NSLs. Yet another problem Spaulding notes is the FBI’s policy of retention of data gathered on US citizens through NSLs, even when those citizens have no connection to terrorist activities. Spaulding expressed similar concerns in a previous op-ed for the Washington Post (see December 25, 2005). [Senate Judiciary Committee, 4/11/2007]
Microsoft logo. [Source: Your Logo Collection (.com)]The National Security Agency (NSA) reveals plans to build an enormous new data center in San Antonio, Texas, three months after Microsoft announced plans to build a $550 million data center in the same area. [National Security Agency, 4/19/2007] The NSA previously acknowledged building a similar data storage facility in Colorado (see January 30, 2006). Reporter and author James Bamford will later write in his book The Shadow Factory that “[t]he timing of the move was interesting,” because the NSA had leased a building in San Antonio in 2005, but had not done anything further. The NSA only announces plans to move forward with the data center after Microsoft revealed plans to build a 470,000 square foot cloud data center that would handle Internet search data, emails, and instant messages. Bamford will quote Bexar County judge Nelson Wolff’s statement to the San Antonio Express-News, “We told [the NSA] we were going to get Microsoft, and that really opened up their eyes,” and write, “For an agency heavily involved in data harvesting, there were many advantages to having their miners next door to the mother lode of data centers” (see 1997, February 27, 2000, February 2001), Spring 2001, April 4, 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, and December 15, 2005). Microsoft’s operation will be largely automated and employ only 75 people. In contrast, the NSA’s facility is to be the same size, but employ 1,500. Bamford will write that this is “far more than was needed to babysit a warehouse of routers and servers but enough to analyze the data passing across them.” [Data Center Knowledge, 1/19/2007; San Antonio Express-News, 4/18/2007; Bamford, 2008, pp. 317-318] Former senior AT&T technician and warrantless surveillance whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) will reference Bamford’s book and agree that this “suggests a massive data mining operation.” [Klein, 2009, pp. 41]
Bush administration officials tell Senate Intelligence Committee members that they will not promise to continue seeking warrants for surveillance on US citizens, as the administration agreed to do in January 2007. They insist that President Bush has the Constitutional authority to decide whether or not to order the NSA to conduct surveillance without warrants if he desires. The secret wiretapping program was revealed to the public just weeks before the agreement (see December 15, 2005), and immediately drew tremendous outcries of criticism from civil libertarians, from lawmakers from all across the political spectrum, and from much of the public. Since the January agreement, the Foreign Intelligence Surveillance Act (FISA) court has issued warrants for domestic wiretaps after being given evidence showing some kind of probable cause to justify the proposed surveillance. Previously, the wiretapping program had ignored the FISA restrictions. Now Bush officials, most notably the new director of national intelligence, Mike McConnell, are saying that Bush has the authority under Article II of the Constitution to order warrantless wiretaps on US citizens.
Invoking Presidential Authority - In Senate testimony on this day, Russ Feingold (D-WI) asks McConnell if he is willing to promise that the administration will no longer ignore the law and the court when monitoring citizens. McConnell replies, “Sir, the president’s authority under Article II is in the Constitution. So if the president chose to exercise Article II authority, that would be the president’s call.” McConnell is echoing previous arguments made by Bush and other officials, who have said that Bush has the power to order wiretaps without court review, both under the Constitution and under the September 2001 Congressional authorization to use military force against al-Qaeda. McConnell says that the administration is conducting surveillance against Americans only with court warrants, and has no plans “that we are formulating or thinking about currently” to resume domestic wiretapping without warrants. “But I’d just highlight,” he adds, “Article II is Article II, so in a different circumstance, I can’t speak for the president what he might decide.” [New York Times, 5/2/2007] Article II is the section of the Constitution that delineates the powers of the executive branch, and establishes the fundamental “separation of powers” doctrine that governs American democracy. Constitutional expert Steve Mount notes that the “Constitution is deliberately inefficient; the “Separation of Powers devised by the framers of the Constitution was designed to do one primary thing: to prevent the majority from ruling with an iron fist.” [Mount, 1995]
White House Seeking Congressional Authorization - While the administration continues to argue that it has the power to eavesdrop on US citizens without warrants, it also continues to seek Congressional legislation affirming and perhaps expanding that power. The White House justifies that hoped-for legislation by pointing to national security and the war on terrorism, as well as the challenges posed by new communications technologies such as e-mail and wireless communications. White House officials have consistently refused to go into specifics as to what communications gaps they feel need plugging. And they have consistently ignored Congressional requests for information and documents related to the NSA’s domestic spy program, now being called the “Terrorist Surveillance Program” by White House officials and their Republican colleagues. Many Congressional Democrats say they would be reluctant to support any such legislation until they receive the information they have requested. “To this day, we have never been provided the presidential authorization that cleared that program to go or the attorney general-Department of Justice opinions that declared it to be lawful,” says Senator Sheldon Whitehouse (D-RI). “Where’s the transparency as to the presidential authorizations for this closed program? That’s a pretty big ‘we’re not going to tell you’ in this new atmosphere of trust we’re trying to build.” [New York Times, 5/2/2007]
Attorney General Alberto Gonzales comes under fire from members of the Senate Judiciary Committee regarding the National Security Agency’s domestic warrantless wiretapping program (see December 15, 2005. Testimony from the day before by former deputy attorney general James Comey (see May 15, 2007) showed that White House and Justice Department officials were, and still are, deeply divided over the legality and efficacy of the program. But Gonzales has said repeatedly, both under oath before Congress and in other venues, that there is little debate over the NSA surveillance program, and almost all administration officials are unified in support of the program. In February 2006, he told the committee, “There has not been any serious disagreement about the program that the president has confirmed. There have been disagreements about other matters regarding operations, which I cannot get into.” Gonzales’s veracity has come under question before, and many senators are disinclined to believe his new testimony. Committee Democrats point out that Comey’s testimony flatly contradicts Gonzales’s statements from that February session. A letter from Senators Russ Feingold, Charles Schumer, Edward Kennedy, and Richard Durbin asks Gonzales, “In light of Mr. Comey’s testimony yesterday, do you stand by your 2006 Senate and House testimony, or do you wish to revise it?” And some Senate Republicans are now joining Democrats in calling for Gonzales’s removal. Chuck Hagel (R-NE) says, “The American people deserve an attorney general, the chief law enforcement officer of our country, whose honesty and capability are beyond question. Attorney General Gonzales can no longer meet this standard. He has failed this country. He has lost the moral authority to lead.” White House press secretary Tony Snow says of Hagel’s statement, “We disagree, and the president supports the attorney general.” Hagel joins three other Republican senators, John Sununu, Tom Coburn, and presidential candidate John McCain, and House GOP Conference Chairman Adam Putnam, in calling for Gonzales’s firing. Former Senate Intelligence Commitee chairman Pat Roberts (R-KS) says that Gonzales should consider resigning, a stance echoed by fellow Republican senators Arlen Specter and Gordon Smith. [Associated Press, 5/17/2007] Gonzales’s defenders say that his testimony to the committee, while legalistic and narrowly focused, is technically accurate, because the NSA program also involves “data mining” of huge electronic databases containing personal information on millions of US citizens, and that program is not exactly the same as the so-called “Terrorist Surveillance Program,” as the NSA’s wiretapping program is now called by White House officials (see Early 2004). But Feingold disagrees. “I’ve had the opportunity to review the classified matters at issue here, and I believe that his testimony was misleading at best.” [New York Times, 7/29/2007]
Entity Tags: Charles Schumer, Arlen Specter, Terrorist Surveillance Program, Tom Coburn, Tony Snow, US Department of Justice, Adam Putnam, Senate Intelligence Committee, Russell D. Feingold, Senate Judiciary Committee, Pat Roberts, Richard (“Dick”) Durbin, Edward M. (“Ted”) Kennedy, Chuck Hagel, Gordon Smith, John Sununu, John McCain, National Security Agency, Alberto R. Gonzales, James B. Comey Jr.
Timeline Tags: Civil Liberties
The Electronic Frontier Foundation (EFF) publishes a set of three non-classified documents secured from telecommunications giant AT&T by former AT&T technician and current whistleblower Mark Klein. Klein has used the documents to prove his assertions that AT&T colluded with the National Security Agency to illegally eavesdrop on Americans’ telephone and Internet communications (see December 15-31, 2005 and July 7, 2009). The EFF has sued AT&T for violating its customers’ privacy, and Klein and the documents are key elements of its case (see February 23-28, 2006). After years of opposing their public disclosure and attempting to force their return (see April 6-8, 2006), AT&T acquiesced to the documents’ disclosure earlier this week after the EFF threatened to take the corporation to a federal appeals court. The documents were released in part by Wired News over a year ago against AT&T’s wishes (see May 17, 2006), and PBS also made them public as a part of a Frontline documentary. The Justice Department considered classifying the documents, then rejected the idea (see Late March - April 4, 2006). According to EFF’s Cindy Cohn, AT&T agreed to the disclosure of those portions to escape the embarrassment of arguing that documents available on the Internet for more than a year were secret. Wired’s Ryan Singel writes: “There are no surprises in the AT&T documentation… which consist of a subset of the pages already published by Wired News. They include AT&T wiring diagrams, equipment lists, and task orders that appear to show the company tapping into fiber-optic cables at the point where its backbone network connects to other ISPs at a San Francisco switching office. The documents appear to show the company siphoning off the traffic to a room packed with Internet-monitoring gear.” The EFF also releases a formerly sealed, signed declaration by Klein (see February 23-28, 2006) and a written analysis of the documentation by Internet expert J. Scott Marcus (see March 29, 2006). Marcus’s analysis, which had previously remained largely under court-ordered seal, is “the most interesting” of the releases, Singel writes. Marcus said the AT&T technical configuration allowed the NSA to conduct “surveillance and analysis of Internet content on a massive scale, including both overseas and purely domestic traffic,” and found it probable that AT&T had “15 or 20” secret facilities around the country, not just the few facilities of which Klein was aware. AT&T, with the Justice Department, is trying to prevent EFF’s lawsuit from continuing, insisting that such a trial would expose “state secrets” (see April 28, 2006 and May 13, 2006). Judge Vaughn Walker has already considered and dismissed that claim (see July 20, 2006); AT&T and the government hope an appeals court will find in their favor. Cohn tells Singel she hopes the documents will show the public that their case is based in fact and not speculation, and that the government’s claim of a national security risk is overblown: “It really paints them into a corner, how unreasonable their claims of state secrets are. I’m hoping [the document release] demonstrates we are right and know what we are talking about and that we don’t need much more to win our case. We are much closer than people think.” [Wired News, 6/13/2007]
Most of the lawsuits filed against the US government and against a number of private telecommunications firms alleging illegal wiretapping of US citizens and foreign organizations (see January 31, 2006) are hampered by what legal experts call a “Catch 22” process: lawyers for the Justice Department and for the firms that are alleged to have cooperated with the government in wiretapping citizens and organizations argue that the lawsuits have no merits because the plaintiffs cannot prove that they were direct victims of government surveillance. At the same time, the lawyers argue that the government cannot reveal if any individuals were or were not monitored because the “state secrets privilege” (see March 9, 1953) allows it to withhold information if it might damage national security. Lawyer Shayana Kadidal, who is representing the Center for Constitutional Rights in another lawsuit on behalf of Guantanamo Bay detainees, says, “The government’s line is that if you don’t have evidence of actual surveillance, you lose on standing.”
One Lawsuit Has Evidence of Surveillance - But the lawsuit filed by Saudi charitable organization the Al Haramain Islamic Foundation (see February 28, 2006) is different, because the plaintiffs have an actual classified US document that they say proves their allegations. Kadidal says that because of that document, “[T]his is the only one with evidence of actual surveillance” and therefore has a much stronger chance of going forward. The Justice Department will not confirm, or deny, if anyone from Al Haramain was monitored either under the Terrorist Surveillance Program or any other government operation, but plaintiff lawyer Jon Eisenberg tells a judge in July 2007: “We know how many times [my client has] been surveilled. There is nothing left for this court to do except hear oral arguments on the legality of the program.”
Extraordinary Measures to Keep Document 'Secure' - Though the Justice Department has repeatedly argued that the Treasury Department document at the heart of the case is harmless and unrelated to NSA surveillance, it is taking extraordinary measures to keep it secure—it is held under strict government seal and remains classified as top secret. Even the plaintiff’s lawyers are no longer allowed to see the document, and have been forced to file briefs with the court based on their memories of the document. [Wired News, 3/5/2007]
Expert: Government Cannot Stop Case - The government probably does not have enough to derail the Al Haramain case, according to law professor Curtis Bradley. In August 2007, Bradley observes, “The biggest obstacle this litigation has faced is the problem showing someone was actually subjected to surveillance,” but the lawsuit “has a very good chance to proceed farther than the other cases because it’s impossible for the government to erase [the lawyers’] memories of the document.” [Associated Press, 8/5/2007]
Attorney General Alberto Gonzales testifies before the Senate Judiciary Committee concerning his 2004 visit to then-Attorney General John Ashcroft’s hospital room to pressure Ashcroft into signing a recertification of the NSA’s secret domestic wiretapping program (see March 10-12, 2004). Former Deputy Attorney General James Comey has already testified before the same committee (see May 15, 2007) that Gonzales, then White House counsel, and then-chief of staff Andrew Card tried to pressure Ashcroft, then just hours out of emergency surgery, to overrule Comey, who was acting attorney general during Ashcroft’s incapacitation. Gonzales and Card were unsuccessful, and Comey, along with Ashcroft, FBI director Robert Mueller, and others, threatened to resign if the program wasn’t brought into line with the Constitution. But today Gonzales tells a quite different story. Gonzales tells the committee that he and Card only went to Ashcroft because Congress itself wanted the program to continue (see March 10, 2004), and he and Card merely intended to “inform” Ashcroft about Comey’s decision, and not to try to get Ashcroft to overrule Comey. Many of the senators on the committee are amazed at Gonzales’s contention that Congress wanted Comey overruled. And they are equally appalled at Gonzales’s seemingly cavalier explanation that he and Card were not, as Comey has testified, trying to pressure a sick man who “wasn’t fully competent to make that decision” to overrule his deputy in such a critical matter: Gonzales’s contention that “there are no rules” governing such a matter does not carry much weight with the committee. Many senators, including Dianne Feinstein (D-CA), simply do not believe Gonzales’s explanations; she says that to secure Ashcroft’s reversal was “clearly the only reason why you would go see the attorney general in intensive care.” Gonzales replies that he and Card were operating under what he calls “extraordinary circumstances,” in which “we had just been advised by the Congressional leadership, go forward anyway, and we felt it important that the attorney general, general Ashcroft, be advised of those facts.” Only later in the hearing does Sheldon Whitehouse (D-RI) force Gonzales to admit that he was indeed carrying a reauthorization order from the White House, something that he likely would not have had if he were not there to secure Ashcroft’s signature. [TPM Muckraker, 7/24/2007] Committee chairman Patrick Leahy (D-VT) says in his opening statement that Gonzales has “a severe credibility problem,” and continues, “It is time for the attorney general to fully answer these questions and to acknowledge and begin taking responsibility for the acute crisis of leadership that has gripped the department under his watch.” He goes on to note that the Bush administration has squandered the committee’s trust “with a history of civil liberty abuses and cover-ups.” Gonzales garners little trust with his own opening, which states in part, “I will not tolerate any improper politicization of this department. I will continue to make efforts to ensure that my staff and others within the department have the appropriate experience and judgment so that previous mistakes will not be repeated. I have never been one to quit.” [USA Today, 7/24/2007]
'I Don't Trust You' - Arlen Specter (R-PA) is another senator who questions Gonzales’s veracity. “Assuming you’re leveling with us on this occasion,” he says, “…I want to move to the point about how can you get approval from Ashcroft for anything when he’s under sedation and incapacitated—for anything.” Gonzales replies, “Senator, obviously there was concern about General Ashcroft’s condition. And we would not have sought nor did we intend to get any approval from General Ashcroft if in fact he wasn’t fully competent to make that decision. But General—there are no rules governing whether or not General Ashcroft can decide, ‘I’m feeling well enough to make this decision.’” Gonzales adds that the fact that Comey was acting attorney general was essentially irrelevant, as Ashcroft “could always reclaim that. There are no rules.” “While he’s in the hospital under sedation?” Specter asks incredulously. [TPM Muckraker, 7/24/2007] “It seems to me that it is just decimating, Mr. Attorney General, as to both your judgment and your credibility. And the list goes on and on.” [USA Today, 7/24/2007] After Gonzales’s restatement of his version of events, Specter observes tartly, “Not making any progress here. Let me go to another topic.” Gonzales goes on to say that he and Card visited Ashcroft hours after they had informed the so-called “Gang of Eight,” the eight Congressional leaders who are sometimes briefed on the surveillance program, that Comey did not intend to recertify the program as legal, “despite the fact the department had repeatedly approved those activities over a period of over two years. We informed the leadership that Mr. Comey felt the president did not have the authority to authorize these activities, and we were there asking for help, to ask for emergency legislation.” Gonzales claims that the Congressional leaders felt that the program should be reauthorized with or without Comey’s approval, and that since it would be “very, very difficult to obtain legislation without compromising this program…we should look for a way ahead.” Gonzales confirms what Comey has already said, that Ashcroft refused to overrule Comey. “…I just wanted to put in context for this committee and the American people why Mr. Card and I went. It’s because we had an emergency meeting in the White House Situation Room, where the congressional leadership had told us, ‘Continue going forward with this very important intelligence activity.’” Feinstein is also obviously impatient with Gonzales’s testimony, saying, “And I listen to you. And nothing gets answered directly. Everything is obfuscated. You can’t tell me that you went up to see Mr. Comey for any other reason other than to reverse his decision about the terrorist surveillance program. That’s clearly the only reason you would go to see the attorney general in intensive care.” Gonzales says that he and Card were only interested in carrying out the will of the Congressional leadership: “Clearly, if we had been confident and understood the facts and was inclined to do so, yes, we would have asked him to reverse [Comey’s] position.” When Feinstein confronts Gonzales on the contradictions between his own testimony’s and Comey’s, Gonzales retreats, claiming that the events “happened some time ago and people’s recollections are going to differ,” but continues to claim that the prime purpose of the visit was merely to inform Ashcroft of Comey’s resistance to reauthorizing the program. Like some of his fellows, Leahy is reluctant to just come out and call Gonzales a liar, but he interrupts Gonzales’s tortured explanations to ask, “Why not just be fair to the truth? Just be fair to the truth and answer the question.” [TPM Muckraker, 7/24/2007] Leahy, out of patience with Gonzales’s evasions and misstatements, finally says flatly, “I don’t trust you.” [CNN, 7/24/2007]
Whitehouse Grills Gonzales - Whitehouse wants to know if the program “was run with or without the approval of the Department of Justice but without the knowledge and approval of the attorney general of the United States, if that was ever the case.” Gonzales says he believes the program ran with Ashcroft’s approval for two years before the hospital incident: “From the very—from the inception, we believed that we had the approval of the attorney general of the United States for these activities, these particular activities.” It is now that Gonzales admits, under Whitehouse’s questioning, that he indeed “had in my possession a document to reauthorize the program” when he entered Ashcroft’s hospital room. He denies knowing anything about Mueller directing Ashcroft’s security detail not to let him and Card throw Comey out of the hospital room, as Comey previously testified. Whitehouse says, “I mean, when the FBI director considers you so nefarious that FBI agents had to be ordered not to leave you alone with the stricken attorney general, that’s a fairly serious challenge.” Gonzales replies that Mueller may not have known that he was merely following the wishes of the Congressional leadership in going to Ashcroft for reauthorization: “The director, I’m quite confident, did not have that information when he made those statements, if he made those statements.” [TPM Muckraker, 7/24/2007; CNN, 7/24/2007]
'Deceiving This Committee' - Charles Schumer (D-NY), one of Gonzales’s harshest critics, perhaps comes closest to accusing Gonzales of out-and-out lying. Schumer doesn’t believe Gonzales’s repeated assertions that there was little or no dissent among White House and Justice Department officials about the anti-terrorism programs, and what little dissent there is has nothing to do with the domestic surveillance program. “How can you say you haven’t deceived the committee?” Schumer asks. Gonzales not only stands by his claims, but says that the visit to Ashcroft’s hospital bed was not directly related to the NSA program, but merely “about other intelligence activities.” He does not say what those other programs might be. An exasperated Schumer demands, “How can you say you should stay on as attorney general when we go through exercises like this? You want to be attorney general, you should be able to clarify it yourself.” [Associated Press, 7/24/2007] Specter does not believe Gonzales any more than Schumer does; he asks Gonzales tartly, “Mr. Attorney General, do you expect us to believe that?” [CNN, 7/24/2007] In his own questioning, Whitehouse says that he believes Gonzales is intentionally misleading the committee about which program caused dissent among administration officials. Gonzales retorts that he can’t go into detail in a public hearing, but offers to provide senators with more information in private meetings. [Associated Press, 7/24/2007] Gonzales’s supporters will later claim that Gonzales’s characterization of little or no dissent between the White House and the Justice Department is technically accurate, because of differences between the NSA’s warrantless wiretapping program and that agency’s data mining program, but Senate Democrats do not accept that explanation (see Early 2004, May 16, 2007).
Executive Privilege Undermines Congressional Oversight? - Specter asks Gonzales how there can be a constitutional government if the president claims executive privilege when Congress exerts its constitutional authority for oversight. Gonzales refuses to answer directly. “Senator, both the Congress and the president have constitutional authorities,” Gonzales says. “Sometimes they clash. In most cases, accommodations are reached.” “Would you focus on my question for just a minute, please?” Specter retorts. Gonzales then replies, “Senator, I’m not going to answer this question, because it does relate to an ongoing controversy in which I am recused,” eliciting a round of boos from the gallery. [CNN, 7/24/2007]
Mueller Will Contradict Gonzales - Mueller will roundly contradict Gonzales’s testimony, and affirm the accuracy of Comey’s testimony, both in his own testimony before Congress (see July 26, 2007) and in notes the FBI releases to the media (see August 16, 2007).
Impeach Gonzales for Perjury? - The New York Times writes in an op-ed published five days after Gonzales’s testimony, “As far as we can tell, there are three possible explanations for Mr. Gonzales’s talk about a dispute over other—unspecified—intelligence activities. One, he lied to Congress. Two, he used a bureaucratic dodge to mislead lawmakers and the public: the spying program was modified after Mr. Ashcroft refused to endorse it, which made it ‘different’ from the one Mr. Bush has acknowledged. The third is that there was more wiretapping than has been disclosed, perhaps even purely domestic wiretapping, and Mr. Gonzales is helping Mr. Bush cover it up. Democratic lawmakers are asking for a special prosecutor to look into Mr. Gonzales’s words and deeds. Solicitor General Paul Clement has a last chance to show that the Justice Department is still minimally functional by fulfilling that request. If that does not happen, Congress should impeach Mr. Gonzales.” [New York Times, 7/29/2007] A Washington Post editorial from May 2007 was hardly more favorable to Gonzales: “The dramatic details should not obscure the bottom line: the administration’s alarming willingness, championed by, among others, Vice President Cheney and his counsel, David Addington, to ignore its own lawyers. Remember, this was a Justice Department that had embraced an expansive view of the president’s inherent constitutional powers, allowing the administration to dispense with following the Foreign Intelligence Surveillance Act. Justice’s conclusions are supposed to be the final word in the executive branch about what is lawful or not, and the administration has emphasized since the warrantless wiretapping story broke that it was being done under the department’s supervision. Now, it emerges, they were willing to override Justice if need be. That Mr. Gonzales is now in charge of the department he tried to steamroll may be most disturbing of all.” [Washington Post, 5/16/2007]
Entity Tags: Senate Judiciary Committee, Washington Post, Robert S. Mueller III, Arlen Specter, Alberto R. Gonzales, Andrew Card, “Gang of Eight”, Paul Clement, Sheldon Whitehouse, New York Times, Dianne Feinstein, Patrick J. Leahy, Charles Schumer, Federal Bureau of Investigation, David S. Addington, John Ashcroft, National Security Agency, James B. Comey Jr.
Timeline Tags: Civil Liberties
Senator John D. Rockefeller (D-WV) disputes Attorney General Alberto Gonzales’s characterization of the March 10, 2004 Congressional briefing (see March 10, 2004) regarding the NSA’s warrantless wiretapping program (see Early 2002) as about other surveillance programs, and not the NSA program now referred to as the Terrorist Surveillance Program (TSP). Gonzales testified earlier today (see July 24, 2007) that the briefing did not cover the NSA program, but Rockefeller says that it did. Rockefeller was at that meeting, then serving as the ranking Democrat on the Senate Intelligence Committee. Rockefeller confirms that the Congressional leaders at the briefing, known colloquially as the “Gang of Eight,” had no idea about the tremendous dispute over the legality of the wiretapping program. He also says, again in contradiction to Gonzales’s testimony, that they were never asked to draft legislation that would make the wiretapping program legal. As to the topic of discussion, Rockefeller says, “As far as I’m concerned, there’s only one” intelligence program. Rockefeller says at the end of the briefing, most of the lawmakers were still unclear about the nature and extent of the program, nor were they clear as to the White House’s plans for the program. “They were not telling us what was really going on,” Rockefeller says. Asked if he believed that Gonzales had purposely misled the Judiciary Committee today, Rockefeller replies, “I would have to say yes.” [Politico (.com}, 7/24/2007] He calls Gonzales’s testimony “untruthful.” [New York Times, 7/24/2007]
Other Democrats Bolster Rockefeller's Recollections - Other Democrats present at the briefing add their voices to Rockefeller’s. Jane Harman (D-CA), then the ranking member of the House Intelligence Committee, says Gonzales is inaccurate in his characterizations of the briefing, and that the program under discussion could have only been the NSA wiretapping operation. “That doesn’t make any sense to me,” Harman says. The NSA program was “the only program we were ever briefed about.” Harman and Rockefeller both say that this and later briefings about the program were quite limited in scope. “We were briefed on the operational details—period—not the legal underpinnings,” Harman says. [Roll Call, 7/25/2007] Harman adds that Gonzales was apparently being deliberately deceptive in trying to characterize the program as something other than the NSA operation. “The program had different parts, but there was only one program,” she says. Gonzales was, she says, “selectively declassifying information to defend his own conduct,” an action Harman calls improper. [New York Times, 7/24/2007] Harman says that Gonzales should not even have revealed that there had been such a classified briefing, especially revealing such a meeting in order to defend his own contradictory testimonies. “He doesn’t have the authority to do that,” she says. [Roll Call, 7/25/2007]
New documents contradict Attorney General Alberto Gonzales’s recent sworn testimony before the Senate Judiciary Committee, indicating that Gonzales may have committed perjury before the panel.
Lied About Congressional Briefing - In testimony before the committee (see July 24, 2007), Gonzales told senators that a March 10, 2004 emergency briefing with the so-called “Gang of Eight,” comprised of the Republican and Democratic leaders of the two houses of Congress and the ranking members of both houses’ intelligence committees (see March 10, 2004), did not concern the controversial NSA warrantless domestic surveillance program, but instead was about other surveillance programs which he was not at liberty to discuss. But according to a four-page memo from the national intelligence director’s office, that briefing was indeed about the so-called “Terrorist Surveillance Program,” or TSP, as it is now being called by White House officials and some lawmakers. The memo is dated May 17, 2006, and addressed to then-Speaker of the House Dennis Hastert. It details “the classification of the dates, locations, and names of members of Congress who attended briefings on the Terrorist Surveillance Program,” wrote then-Director of National Intelligence John Negroponte. The DNI memo provides further evidence that Gonzales has not been truthful in his dealings with Congress, and gives further impetus to a possible perjury investigation by the Senate. So far, both Gonzales and Justice Department spokesmen have stood by his testimony. The nature of the March 2004 briefing is important because on that date, Gonzales and then-White House chief of staff Andrew Card tried to pressure then-Attorney General John Ashcroft, while Ashcroft was recuperating from emergency surgery in the hospital, to reauthorize the domestic wiretapping program over the objections of acting Attorney General James Comey, who had refused to sign off on the program due to its apparent illegality (see March 10-12, 2004). Comey’s own testimony before the Senate has already strongly contradicted Gonzales’s earlier testimonies and statements (see May 15, 2007). The entire imbroglio illustrates just how far from legality the NSA wiretapping program may be, and the controversy within the Justice Department it has produced. Gonzales flatly denied that the March 2004 briefing was about the NSA program, telling the panel, “The dissent related to other intelligence activities. The dissent was not about the terrorist surveillance program.”
Grilled By Senators - Senator Charles Schumer (D-NY) pressed Gonzales for clarification: “Not the TSP? Come on. If you say it’s about other, that implies not. Now say it or not.” Gonzales replied, “It was not. It was about other intelligence activities.” Today, with the DNI documents in hand, Schumer says, “It seemed clear to just about everyone on the committee that the attorney general was deceiving us when he said the dissent was about other intelligence activities and this memo is even more evidence that helps confirm our suspicions.” Other senators agree that Gonzales is not telling the truth. “There’s a discrepancy here in sworn testimony,” says committee chairman Patrick Leahy (D-VT). “We’re going to have to ask who’s telling the truth, who’s not.” And committee Democrats are not the only ones who find Gonzales’s testimony hard to swallow. Arlen Specter (R-PA) told Gonzales yesterday, “I do not find your testimony credible, candidly.” The “Gang of Eight” members disagree about the content of the March briefing. Democrats Nancy Pelosi, Jay Rockefeller, and Tom Daschle all say Gonzales’s testimony is inaccurate, with Rockefeller calling Gonzales’s testimony “untruthful.” But former House Intelligence chairman Porter Goss and former Senate Majority Leader Bill Frist, both Republicans, refuse to directly dispute Gonzales’s claims. [Associated Press, 7/25/2007]
Mueller Will Contradict Gonzales - Three weeks later, notes from FBI director Robert Mueller, also present at the Ashcroft meeting, further contradict Gonzales’s testimony (see August 16, 2007).
Entity Tags: National Security Agency, Patrick J. Leahy, Tom Daschle, Senate Judiciary Committee, US Department of Justice, Porter J. Goss, Nancy Pelosi, John Ashcroft, John D. Rockefeller, John Negroponte, Andrew Card, Arlen Specter, Bill Frist, Charles Schumer, “Gang of Eight”, James B. Comey Jr., Dennis Hastert, Alberto R. Gonzales
Timeline Tags: Civil Liberties
FBI Director Robert Mueller testifies before the House Judiciary Committee about the NSA’s warrantless wiretapping program (see Early 2002), which many believe to be illegal. Mueller directly contradicts testimony given the day before by Attorney General Alberto Gonzales (see July 24, 2007), where Gonzales claimed that “there has not been any serious disagreement about the program that the president has confirmed.” Mel Watt (D-NC) asks Mueller, “Can you confirm that you had some serious reservations about the warrantless wiretapping program that kind of led up to this?” Mueller replies, “Yes.” Later, Sheila Jackson-Lee (D-TX) asks about the now-notorious visit by Gonzales and then-chief of staff Andrew Card to then-Attorney General John Ashcroft’s hospital room, where they tried to pressure the heavily sedated Ashcroft to reauthorize the program (see March 10-12, 2004). Gonzales testified that he and Card visited Ashcroft to discuss “other intelligence matters,” and not the NSA surveillance program. Jackson-Lee asks, “Did you have an understanding that the conversation was on TSP?” referring to the current moniker of the NSA operation, the “Terrorist Surveillance Program.” Mueller replies, “I had an understanding that the discussion was on an NSA program, yes.” Jackson-Lee says, “I guess we use ‘TSP,’ we use ‘warrantless wiretapping,’ so would I be comfortable in saying that those were the items that were part of the discussion?” Mueller agrees: “The discussion was on a national NSA program that has been much discussed, yes.” [Speaker of the House, 7/26/2007; New York Times, 7/26/2007]
Receive weekly email updates summarizing what contributors have added to the History Commons database
Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.