!! History Commons Alert, Exciting News

Follow Us!

We are planning some big changes! Please follow us to stay updated and be part of our community.

Twitter Facebook

US Civil Liberties

Freedoms and Responsibilities

Project: US Civil Liberties
Open-Content project managed by Paul, KJF, mtuck, paxvector

add event | references

Page 2 of 9 (878 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9 | next

The Reagan administration prepares a reserve emergency bill to amend the 1950 Defense Resources Act. The legislation, which would be presented to Congress in the event of a crisis, would suspend the Constitution and give the president and the Federal Emergency Management Agency (FEMA) unprecedented powers to combat a disaster. Nationally syndicated columnist Jack Anderson comments, “Since FEMA’s draft legislation is a standby proposal, it will not be offered to Congress ahead of time—when it could be thoroughly debated—but only in the event of a national emergency, when Congress would supposedly be panicked into voting for a dictatorship.” The bill covers a range of emergencies, including nuclear war, natural disasters, financial crises, and civil disturbances. It would grant the government the authority to ration goods and resources, take control of the nation’s manufacturing base, and require all citizens to work in “activities essential to the national health, safety, or interest.” The bill would outlaw striking by workers, and those refusing to work or caught lying about the availability of manpower would be heavily fined or thrown in jail. It would grant the government the authority to seize real estate and personal property considered “necessary for the national defense purpose.” Datamation magazine says the plans would lead to a military takeover of the computer industry. The bill would give the government “unlimited powers to seize computers and plants of high-technology industries and would establish an Office of Censorship to control telecommunications leaving the United States, making it a crime for companies to use secret codes.” [Ledger (Lakeland FL), 9/25/1984; Evening Independent, 10/17/1984]

Entity Tags: Federal Emergency Management Agency, Reagan administration, Office of Censorship

Category Tags: Freedom of Speech / Religion, Impositions on Rights and Freedoms, Media Freedoms, Privacy, Continuity of Government

The Supreme Court, in the case of Federal Election Commission v. NCPAC, rules that political action committees (PACs) can spend more than the $1,000 mandated by federal law (see February 7, 1972, 1974, and May 11, 1976). The Democratic Party and the FEC argued that large expenditures by the National Conservative Political Action Committee (NCPAC) in 1975 violated the Federal Election Campaign Act (FECA), which caps spending by independent political action committees in support of a publicly funded presidential candidate at $1,000. The Court rules 7-2 in favor of NCPAC, finding that the relevant section of FECA encroaches on the organization’s right to free speech (see January 30, 1976). Justice William Rehnquist writes the majority opinion, joined by fellow conservatives Chief Justice Warren Burger, Sandra Day O’Connor, and Lewis Powell, and liberals Harry Blackmun, John Paul Stevens, and William Brennan. Justices Byron White and Thurgood Marshall dissent from the majority. [Oyez (.org), 2012; Moneyocracy, 2/2012]

Entity Tags: Federal Election Commission, William Brennan, William Rehnquist, Byron White, Federal Election Campaign Act of 1972, US Supreme Court, Warren Burger, Sandra Day O’Connor, Harry Blackmun, John Paul Stevens, Thurgood Marshall, National Conservative Political Action Committee, Democratic Party, Lewis Powell

Category Tags: Freedom of Speech / Religion, Campaign Finance, Court Procedures and Verdicts

The FBI Administrative Index, known as ADEX for short (see Late 1971-1985), is transferred to the Federal Emergency Management Agency (FEMA). The index contains the names and background information of approximately 12,000 individuals considered to be potential threats in times of crisis. Citizens on the list are to be closely monitored and/or detained in the event of a national emergency. Documents later obtained by the Austin American-Statesman will reveal an internal struggle between FBI Director William Webster, who recommends the FBI maintain control of the list, and Attorney General Edwin Meese, who, along with Reagan adviser Robert McFarlane, demands the list be handed over to FEMA. The list ultimately ends up under the control of FEMA. [Texas Observer, 5/15/1987]

Entity Tags: Federal Bureau of Investigation, Federal Emergency Management Agency

Category Tags: Impositions on Rights and Freedoms, Detainments in US

1986: Leaker Prosecuted for Espionage

Samuel Loring Morison is prosecuted by the Justice Department for providing classified pictures of a Soviet nuclear-powered aircraft carrier to Jane’s Defense magazine. Morison, a naval intelligence analyst specializing in Soviet amphibious and mine-laying vessels, works part time for Jane’s, and has been warned about potential conflicts of interest. Part of Morison’s motives for passing classified information to the magazine is his belief that the US citizenry, if they knew about the carrier, would demand to “increase the defense budget.” Even though the Justice Department itself acknowledges that Morison did nothing to threaten national security, it successfully prosecutes him under the 1917 Espionage Act. Morison will serve a two-year prison sentence.
Commentary - Former Nixon White House aide John Dean will write in 2004 that if the same standard used to prosecute Morison were to be more widely applied, “several presidents and secretaries of state could have been prosecuted for information in their memoirs.” Before Morison, no one had ever been prosecuted for publishing leaked information. In Dean’s view, Morison is prosecuted under a standard more appropriate to Britain’s Official Secrets Act, not any applicable US law, and is a victim of the worst kind of selective law enforcement. Thirty-four amicus curiae briefs will be filed on Morison’s behalf, from a host of newspapers, television news networks, and news media trade and professional associations.
Pardon - In 1998, Senator Daniel Moynihan (D-NY) will call Morison’s conviction an “anomaly,” the only one of its kind in 81 years, and ask President Clinton to pardon Morison. He will write, “What is remarkable is not the crime, but that [Morison] is the only one convicted of an activity which has become a routine aspect of government life: leaking information to the press in order to bring pressure to bear on a policy question.” Clinton will grant the pardon in 2001. [Daniel Patrick Moynihan, 9/29/1998; Research Foundation of the University of Texas A&M, 1/21/2003; Dean, 2004, pp. 66-67, 221]

Entity Tags: William Jefferson (“Bill”) Clinton, Official Secrets Act, John Dean, Daniel Patrick Moynihan, Espionage Act, Jane’s Defense, Samuel Loring Morison, US Department of Justice

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Classification, Media Involvement and Responses

US Representative Henry B. Gonzalez (D-TX) claims the Federal Emergency Management Agency (FEMA) is prepared to detain 400,000 Central Americans residing in the United States in the event of an emergency. According to the Texas Observer, Gonzalez says reliable intelligence sources have informed him that the plan, if implemented, would also include a certain number of US citizens, noting that the agency maintains a list of “subversive” individuals to be monitored and/or apprehended in the event of a national emergency, a possible reference to the FBI’s Administration Index (see 1985). [Texas Observer, 5/15/1987; Miami Herald, 7/5/1987]

Entity Tags: Henry Gonzalez, Federal Bureau of Investigation, Federal Emergency Management Agency

Category Tags: Impositions on Rights and Freedoms, Detainments in US, Continuity of Government, Database Programs

Campaigning on behalf of conservative Republican candidates in an attempt to have the GOP retain control of the Senate, Ronald Reagan goes on a campaign tour of the South, where he alludes to Republicans’ plans for exerting control of the nation’s court system. Typical of Reagan’s stump speech is the following one he delivers on behalf of embattled Republican incumbent James Broyhill: “Since I’ve been appointing federal judges to be approved by people like Jim Broyhill in the Republican Senate, the federal judiciary has become tougher, much tougher, on criminals. Criminals are going to jail more often and receiving longer sentences. Over and over the Democratic leadership has tried in the Senate to torpedo our choices for judges. And that’s where Jim Broyhill can make all the difference. Without him and the Republican majority in the Senate, we’ll find liberals like Joe Biden and a certain fellow from Massachusetts deciding who our judges are. And I’ll bet you’ll agree; I’d rather have a Judiciary Committee headed by Strom Thurmond than one run by Joe Biden or Ted Kennedy.” Broyhill will be defeated, and Democrats will regain control of the Senate in spite of Reagan’s efforts, in large part because of Southern blacks offended by such speeches. The new Democratic leadership, responding to the voters, will help block the racially questionable Robert Bork’s nomination to the Supreme Court (see July 1-October 23, 1987). [Dean, 2007, pp. 140]

Entity Tags: Joseph Biden, Edward M. (“Ted”) Kennedy, Ronald Reagan, James Broyhill, Strom Thurmond, Senate Judiciary Committee

Category Tags: Impositions on Rights and Freedoms

The Supreme Court rules in Federal Election Commission v. Massachusetts Citizens for Life that an anti-abortion organization can print flyers promoting “pro-life” candidates in the weeks before an election, and that the portion of the Federal Election Campaign Act (FECA—see February 7, 1972, 1974, and May 11, 1976) that bars distribution of such materials to the general public restricts free speech. In September 1978, the Massachusetts Citizens For Life (MCFL) spent almost $10,000 printing flyers captioned “Everything You Need to Vote Pro-Life,” which included information about specific federal and state candidates’ positions on abortion rights, along with exhortations to “vote pro-life” and “No pro-life candidate can win in November without your vote in September.” The Federal Election Commission (FEC) ruled that MCFL’s expenditures violated FECA’s ban on corporate spending in connection with federal elections. A Massachusetts district court ruled against the FEC, finding that the flyer distribution “was uninvited by any candidate and uncoordinated with any campaign” and the flyers fell under the “newspaper exemption” of the law. Moreover, the court found, FECA’s restrictions infringed on MCFL’s freedom of speech (see January 30, 1976 and April 26, 1978). An appeals court reversed much of the district court’s decision, but agreed that the named provision of FECA violated MCFL’s free speech rights. The FEC appealed to the Supreme Court. By a 5-4 vote, the Court affirms that FECA’s prohibition on corporate expenditures is unconstitutional as applied to independent expenditures made by a narrowly defined type of nonprofit corporation such as MCFL. The Court writes that few organizations will be impacted by its decision. The majority opinion is written by Justice William Brennan, a Court liberal, and joined by liberal Thurgood Marshall and conservatives Lewis Powell, Antonin Scalia, and (in part) by Sandra Day O’Connor. Court conservatives William Rehnquist and Byron White, joined by liberals Harry Blackmun and John Paul Stevens, dissent with the majority, saying that the majority ruling gives “a vague and barely adumbrated exception [to the law] certain to result in confusion and costly litigation.” [Federal Election Commission, 2011; Moneyocracy, 2/2012]

Entity Tags: Federal Election Commission, William Rehnquist, Antonin Scalia, Federal Election Campaign Act of 1972, US Supreme Court, William Brennan, Sandra Day O’Connor, Harry Blackmun, John Paul Stevens, Thurgood Marshall, Massachusetts Citizens for Life, Byron White, Lewis Powell

Category Tags: Freedom of Speech / Religion, Campaign Finance, Court Procedures and Verdicts

Justice William Brennan.Justice William Brennan. [Source: University of Pennsylvania]Supreme Court Justice William Brennan, an Eisenhower appointee, writes that the behavior of the US during war is predictable: “After each perceived security crisis ended, the United States has remorsefully realized that the abrogation of civil liberties was unnecessary. But it has proven unable to prevent itself from repeating the error when the next crisis came along.” [Dean, 2004, pp. 195]

Entity Tags: William Brennan

Category Tags: Impositions on Rights and Freedoms

Representatives of the Federal Emergency Management Agency (FEMA), the Army Corps of Engineers, and a Maryland-based company, Brogan Associates Incorporated, approach Fred Westerman, a retired 20-year Army intelligence veteran and current head of the government-contracted security firm Security Evaluations Incorporated. Westerman recently reported irregularities within the highly secretive Continuity of Government program against the wishes of his superiors (see 1986-1987). The group comes to Westerman’s offices and allegedly orders him to hand over important corporate files. Westerman will later allege that FEMA security operations specialist Robert Lorenz and Army Corps of Engineers officer Gerald Boggs order him to hand over corporate documents, communications, records, invoices, and checkbooks to Brogan Associates president Arthur Hutchins. Boggs allegedly notifies Westerman that refusal will result in termination of his company’s contract with the government, while Lorenz reportedly threatens to put Westerman’s company out of business. Westerman refuses to turn over the records, and, according to Westerman, FEMA will burglarize his offices in search of the files (see Late 1987). Systems Evaluations’ contract with the government will be canceled shortly thereafter (see December 1987). Westerman will file a lawsuit against the government (see November 1988), but it will be frozen when the Justice Department opens an investigation of him (see November 1988) and will later be sealed after an in-depth report highlighting Westerman’s case is published by a major magazine (see August 8, 1989). Westerman will lose another contract, along with his security clearances, in 1990 (see 1990), and by November 1991, he will be unemployable, several hundred thousand dollars in debt, and unable to gain any restitution from the government (see November 1991). [Associated Press, 9/11/1989]

Entity Tags: Fred Westerman, Brogan Associates Incorporated, Federal Emergency Management Agency, Robert Lorenz, Systems Evaluations Incorporated, US Army Corps of Engineers, Gerald Boggs

Category Tags: Privacy, Continuity of Government

Strom Thurmond.Strom Thurmond. [Source: US Government]Former Lockheed software manager Margaret Newsham, who worked at the Menwith Hill facility of the NSA’s Echelon satellite surveillance operation in 1979, says she heard a real-time phone intercept of conversations involving senator Strom Thurmond (R-SC). She was shocked, she recalls, because she thought only foreign communications were being monitored. Newsham, who was fired from Lockheed after she filed a whistleblower lawsuit alleging fraud and waste, tells the chairman of the House Intelligence Committee, Louis Stokes (D-OH), of the overheard conversations. In July, Capital Hill staffers will leak the story to the Cleveland Plain Dealer. Thurmond says he doesn’t believe Newsham’s story, but his office admits that it has previously received reports that Thurmond had been a target of NSA surveillance. Thurmond will decline to press for an investigation, and the reason for the surveillance has never been revealed. [CBS News, 2/27/2000; Patrick S. Poole, 8/15/2000]

Entity Tags: Strom Thurmond, National Security Agency, House Intelligence Committee, Louis Stokes, Echelon, Cleveland Plain Dealer, Lockheed Martin Corporation, Margaret Newsham

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

Erwin Griswold.Erwin Griswold. [Source: US Department of Justice]Former Solicitor General Erwin Griswold, who represented the United States before the Supreme Court in the landmark Pentagon Papers case in 1971 (see March 1971 and June 30, 1971), now writes that he saw nothing in those documents that threatened national security. In 1971, without ever actually reading the documents, Griswold argued that their publication constituted a “grave and immediate danger to the security of the United States.” Griswold writes in a Washington Post op-ed that he relied on the judgment of “three high officials, one each from the Defense Department, the State Department and the National Security Agency” to explain to him why the documents posed such a threat. (In 2006, then-White House counsel John Dean will write that Griswold “did not insist on knowing what was actually contained in the Pentagon Papers, and he never found out, even as he insisted on the importance of their continued secrecy.”) In 1971, Griswold told the Court: “I haven’t the slightest doubt myself that the material which has already been published and the publication of the other materials affects American lives and is a thoroughly serious matter. I think to say that it can only be enjoined if there will be a war tomorrow morning, when there is a war now going on, is much too narrow.” Griswold now writes: “I have never seen any trace of a threat to the national security from the publication [of the documents]. Indeed, I have never seen it even suggested that there was such an actual threat.… It quickly becomes apparent to any person who has considerable experience with classified material that there is massive overclassification and that the principal concern of the classifiers is not with national security, but rather with governmental embarrassment of one sort or another.” [Washington Post, 2/15/1989; FindLaw, 6/16/2006; Siegel, 2008, pp. 200]

Entity Tags: US Department of Defense, Erwin Griswold, John Dean, US Department of State, National Security Agency, US Supreme Court

Timeline Tags: Nixon and Watergate

Category Tags: Impositions on Rights and Freedoms, Government Classification

As part of its ongoing battle against drug trafficking, the US routinely monitors the phone records of thousands of US citizens and others inside the country who make phone calls to Latin America. The NSA works with the Drug Enforcement Agency in collecting phone records that show patterns of calls between the US, Latin America, and other drug-producing regions. The program is significantly expanded after George W. Bush takes office in 2001. Government officials will say in 2007 that the phone conversations themselves are not monitored, but the NSA and DEA use phone numbers and e-mail addresses to analyze possible links between US citizens and foreign nationals. The program is approved by Justice Department officials in both the Bush and Clinton administrations, and does not require court approval to demand communications records. In 2004, one US telecommunications firm, who is not identified, will refuse to turn over its phone records to the government (see 2004). [New York Times, 12/16/2007] The Bush administration will repeatedly claim that the government did not begin monitoring US citizens until after the attacks of September 11, 2001. However, this NSA/DEA program proves otherwise.

Entity Tags: National Security Agency, Drug Enforcement Administration, George W. Bush, Clinton administration, US Department of Justice, Bush administration (41)

Category Tags: Impositions on Rights and Freedoms, Privacy, Government Acting in Secret, Government Classification, Other Surveillance

A lawsuit against the FBI’s investigation of a sixth-grade boy and his school project to create an “encyclopedia of the world” is stopped when an appeals court rules that the agency is shielded by the “state secrets” privilege (see March 9, 1953). Unable to secure information from the FBI as to why it investigated him, the child had therefore “failed to sustain his burden of proof [and] the cause of action was properly dismissed.” [Siegel, 2008, pp. 197]

Entity Tags: Federal Bureau of Investigation

Category Tags: Freedom of Speech / Religion, Court Procedures and Verdicts, Government Acting in Secret, State Secrets

The Supreme Court, in the case of Austin v. Michigan Chamber of Commerce, rules that the Michigan Chamber of Commerce (MCC) cannot run newspaper advertisements in support of a candidate for the state legislature because the MCC is subject to the Michigan Campaign Finance Act, which prohibits corporations from using treasury money to support or oppose candidates running for state offices. The Court finds that corporations can use money only from funds specifically designated for political purposes. The MCC holds a political fund separate from its other monies, but wanted to use money from its general fund to buy political advertising, and sued for the right to do so. The case explored whether a Michigan law prohibiting such political expenditures is constitutional. The Court agrees 7-2 that it is constitutional. Justices Antonin Scalia and Anthony Kennedy dissent, arguing that the government should not require such “segregated” funds, but should allow corporations and other such entities to spend their money on political activities without such restraints. [Public Resource (.org), 1990; Casebriefs, 2012; Moneyocracy, 2/2012] The 2010 Citizens United ruling (see January 21, 2010) will overturn this decision, with Scalia and Kennedy voting in the majority, and Kennedy writing the majority opinion.

Entity Tags: Michigan Chamber of Commerce, Anthony Kennedy, Michigan Campaign Finance Act, US Supreme Court, Antonin Scalia

Category Tags: Campaign Finance, Impositions on Rights and Freedoms, Court Procedures and Verdicts

The Department of Defense updates its civil disturbance response plan, codenamed Operation Garden Plot. The program was originally established in the 1960s (see Winter 1967-1968). The Pentagon utilizes lessons learned from the recent deployment of Marines and Army infantry troops in Los Angeles (see May 1-May 6, 1992). Marines called into Los Angeles had not been trained for domestic disturbances. An Army official reportedly says the military will now “provide standard riot duty training for all combat forces that could be called into the nation’s cities.” National Guard troops will also get “refresher training on riot control as part of their regular weekend training and two weeks of active duty.” [San Antonio Express-News, 5/17/1992]

Entity Tags: US Marine Corps, US Department of Defense

Category Tags: Impositions on Rights and Freedoms

After two days of widespread rioting in the city of Los Angeles, Mayor Tom Bradley and Governor Pete Wilson ask the White House for military assistance to supplement the California National Guard. President George H. W. Bush deploys 2,500 soldiers of the Army’s 7th Infantry Division from Fort Ord and 1,500 Marines from Camp Pendleton. Bush also federalizes approximately 8,000 National Guard troops. All three groups are placed under the command of Major General Marvin L. Covault as part of a decades-old Pentagon program codenamed Operation Garden Plot (see Winter 1967-1968). Combat troops, equipped with M-16 rifles, flak jackets, helmets, and riot batons, are the first to enter a US city since 1972. Marines take up positions in Compton and Long Beach; Army troops are sent to patrol the streets of Watts; and National Guard soldiers are deployed throughout the area. In a television address, Bush says the military will “use whatever force is necessary to restore order.” Bush announces he is sending into Los Angeles an additional 1,000 federal law enforcement officials, “including FBI SWAT teams and riot control units of the US Marshals Service, the Border Patrol, and other agencies.” According to the Washington Post, a Marine unit is on standby at Camp Pendleton “with light armored vehicles, eight-wheeled, 14-ton armored personnel carriers armed with 25mm cannon.” The troops in Los Angeles are ordered to return fire only when fired upon. Although few conflicts arise between soldiers and rioters, members of the National Guard shoot and kill a motorist that allegedly tries to run them down. Bush’s decision to activate the military will later be criticized for being unnecessary and coming after the majority of the violence had already ended. The riots will lead the military to increase military training for Operation Garden Plot in the coming months (see Spring 1992). [Washington Post, 5/2/1992; New York Times, 5/3/1992; Los Angeles Times, 5/10/1992; Reuters, 5/11/1992; San Antonio Express-News, 5/17/1992]

Entity Tags: George Herbert Walker Bush, Federal Bureau of Investigation, US Department of Defense, US Border Patrol, Tom Bradley, Pete Wilson, US Marine Corps, California National Guard

Category Tags: Impositions on Rights and Freedoms

President Clinton signs into law the Brady Handgun Violence Prevention Act, sometimes called the “Brady Bill,” which imposes a waiting period for handgun purchases. Many gun enthusiasts are infuriated by the new law. The Southern Poverty Law Center will later observe that the “Brady Bill” and a 1994 ban on some assault weapons (see September 13, 1994) help spark the nascent militia movement. [Southern Poverty Law Center, 6/2001; US Government Info, 2010]

Entity Tags: Brady Handgun Violence Prevention Act, William Jefferson (“Bill”) Clinton, Southern Poverty Law Center

Timeline Tags: US Domestic Terrorism

Category Tags: Gun Rights, Impositions on Rights and Freedoms

Some of the assault weapons banned under the 1994 crime bill.Some of the assault weapons banned under the 1994 crime bill. [Source: Senator Dianne Feinstein]Congress authorizes the passage of the 1994 Omnibus Crime Bill, later named “The Violent Crime Control and Law Enforcement Act,” which among other elements outlaws 19 separate types of assault weapons. The original bill, HR 4092, passed the House of Representatives in April on a 285-141 vote. The House bill provides $28 billion in spending for police hiring and training, prison construction, and crime prevention; expands the death penalty to cover an array of federal crimes; introduces the federal “three strikes” provision that automatically incarcerates three-time felons for lengthy jail terms; includes the Racial Justice Act that allows defendants to challenge death-penalty sentences on a racial basis; and bans the sale or transfer of handguns to juveniles without parental consent. A separate House vote in May approved the ban on the sale of assault weapons by a narrow 216-214 vote, and the entire package went to the Senate for reconciliation with that body’s own crime bill. A later version of the bill increased spending to $30 billion, shifted more funds to police training and less to prison construction, and dropped the Racial Justice Act along with funding for a crime prevention center in Texas. On August 25, the Senate thwarted efforts by Republicans to reopen debate on the bill, and the bill passed on a final vote of 61-38. President Clinton signs the bill into law on September 13. Within days of its passage, Congressional Republicans will announce their intention to revamp the bill as part of their “Contract with America,” charging that it fails to address the “broken” criminal justice system that fails “to hold criminals accountable” for their actions. Many Republicans will base their intention to revamp the bill on their opposition to the assault weapons ban. [McCollum, 1994; Time, 9/5/1994]

Entity Tags: US Congress, William Jefferson (“Bill”) Clinton, 1994 Violent Crime Control and Law Enforcement Act

Timeline Tags: US Domestic Terrorism

Category Tags: Gun Rights, Impositions on Rights and Freedoms

The Communications Assistance for Law Enforcement Act (CALEA) takes effect. CALEA obliges telecommunications providers such as AT&T to give law enforcement agencies and US intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks. In more recent years, the law will be expanded to give law enforcement and intelligence agencies similar abilities to monitor Internet usage by US citizens. [Federal Communications Commission, 2/21/2007]

Entity Tags: Communications Assistance for Law Enforcement Act (CALEA), AT&T

Category Tags: Other Legal Changes, Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, NSA Wiretapping / Stellar Wind, Other Surveillance

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Category Tags: Other Legal Changes, Privacy, Other Surveillance

Concerns that terrorists may obtain a nuclear, chemical, or biological weapon inspire the Clinton administration to assign new counterterrorism responsibilities within the federal government. After at least a year of interagency planning, President Clinton signs classified Presidential Decision Directive 39, US Policy on Counterterrorism. According to author Steve Coll, the directive is the “first official recognition by any American president” of the threat posed by terrorists using weapons of mass destruction. [Coll, 2004, pp. 318] “The acquisition of weapons of mass destruction by a terrorist group, through theft or manufacture, is unacceptable,” the directive declares. “There is no higher priority than preventing the acquisition of this capability or removing this capability from terrorist groups potentially opposed to the US.” PDD-39 is never fully disclosed to the public, but parts of it will be declassified in February 1997. The directive assigns specific counterterrorism responsibilities to the attorney general, the directors of the CIA and FBI, and the secretaries of state, defense, transportation, treasury, and energy. PDD-39 also assigns “Consequence Management” responsibilities to the Federal Emergency Management Agency (FEMA). When PDD-39 is partially declassified, a paragraph reaffirming a controversial detention policy is inadvertently disclosed. The paragraph, which is marked ”(S)” for secret, claims terrorism suspects may be detained by the US anywhere in world without the consent of the home country. “If we do not receive adequate cooperation from a state that harbors a terrorist whose extradition we are seeking, we shall take appropriate measures to induce cooperation,” the directive states. “Return of suspects by force may be effected without the cooperation of the host government, consistent with the procedures outlined in NSD-77, which shall remain in effect.” National Security Directive 77, or NSD-77, was signed by President George H. W. Bush and is entirely classified. [Presidential Decision Directive 39, 6/21/1995; White House, 6/21/1995; Associated Press, 2/5/1997; Federation of American Scientists, 9/26/2002; 9/11 Commission, 3/24/2004]

Entity Tags: George Herbert Walker Bush, William Jefferson (“Bill”) Clinton, Clinton administration

Category Tags: Impositions on Rights and Freedoms, Detainments Outside US, Gov't Violations of Prisoner Rights, Continuity of Government, Government Acting in Secret

InfraGard logo.InfraGard logo. [Source: Progressive.org]Twenty-three thousand executives and employees of various private firms work with the FBI and the Department of Homeland Security. The group, called InfraGard, receives secret warnings of terrorist threats well in advance of public notification, and sometimes before elected officials. In return, InfraGard provides information to the government. InfraGard is a quiet quasi-governmental entity which wields an unknown, but extensive, amount of power and influence. Michael Hershman, the chairman of the advisory board of the InfraGard National Members Alliance (INMA) and the CEO of an international consulting firm, calls InfraGard “a child of the FBI.” The organization started in Cleveland in 1996, when business members cooperated with the FBI to investigate cyber-threats. The FBI then “cloned it,” according to Phyllis Schneck, chairman of the board of directors of the INMA. Schneck is one of the biggest proponents of InfraGard. As of February 2008, 86 chapters of InfraGard exist in each of the 50 states, operating under the supervision of local FBI agents. “We are the owners, operators, and experts of our critical infrastructure, from the CEO of a large company in agriculture or high finance to the guy who turns the valve at the water utility,” says Schneck. According to the InfraGard website, “At its most basic level, InfraGard is a partnership between the Federal Bureau of Investigation and the private sector. InfraGard chapters are geographically linked with FBI Field Office territories.” After the 9/11 attacks, InfraGard experiences explosive growth—from 1,700 members in November 2001 to 23,682 members in January 2008. 350 members of the Fortune 500 have members in InfraGard. Prospective members are sponsored by existing members, then vetted by the FBI. The organization accepts members from agriculture, banking and finance, and chemical industry, defense, energy, food, information and telecommunications, law enforcement, public health, and transportation industries.
Controlled Exposure - InfraGard’s inner workings are not available to the general public; its communications with the FBI and DHS are not accessible through the Freedom of Information Act under the “trade secrets” exemption. And InfraGard carefully controls its exposure and contact with the media. According to the InfraGard website: “The interests of InfraGard must be protected whenever presented to non-InfraGard members. During interviews with members of the press, controlling the image of InfraGard being presented can be difficult. Proper preparation for the interview will minimize the risk of embarrassment.… The InfraGard leadership and the local FBI representative should review the submitted questions, agree on the predilection of the answers, and identify the appropriate interviewee.… Tailor answers to the expected audience.… Questions concerning sensitive information should be avoided.”
Advance Warning from the FBI - InfraGard members receive quick alerts on any potential terrorist threat or a possible disruption of US infrastructure. Its website boasts that its members can “[g]ain access to an FBI secure communication network complete with VPN encrypted website, webmail, listservs, message boards, and much more.” Hershman says members receive “almost daily updates” on threats “emanating from both domestic sources and overseas.” Schneck adds, “We get very easy access to secure information that only goes to InfraGard members. People are happy to be in the know.” Shortly after the 9/11 attacks, an InfraGard member passed along an FBI warning about a potential threat to California’s bridges to then-Governor Gray Davis, who had not yet heard anything from the FBI (see November 1, 2001). In return, InfraGard members cooperate with FBI and DHS operations. Schneck says: “InfraGard members have contributed to about 100 FBI cases. What InfraGard brings you is reach into the regional and local communities. We are a 22,000-member vetted body of subject-matter experts that reaches across seventeen matrixes. All the different stovepipes can connect with InfraGard.” The relationships between the FBI and InfraGard members are key, she says. “If you had to call 1-800-FBI, you probably wouldn’t bother,” she says. “But if you knew Joe from a local meeting you had with him over a donut, you might call them. Either to give or to get. We want everyone to have a little black book.” InfraGard members have phone numbers for DHS, the FBI, and to report cyber-threats. InfraGard members who call in “will be listened to,” she says; “your call [will] go through when others will not.” The American Civil Liberties Union, who has warned about the potential dangers of Infragard to constitutional liberties (see August 2004), retorts, “The FBI should not be creating a privileged class of Americans who get special treatment. There’s no ‘business class’ in law enforcement. If there’s information the FBI can share with 22,000 corporate bigwigs, why don’t they just share it with the public? That’s who their real ‘special relationship’ is supposed to be with. Secrecy is not a party favor to be given out to friends.… This bears a disturbing resemblance to the FBI’s handing out ‘goodies’ to corporations in return for folding them into its domestic surveillance machinery.”
Preparing for Emergencies, Martial Law - InfraGard members are “very much looped into our readiness capability,” says a DHS spokeswoman. Not only does DHS “provide speakers” and do “joint presentations” with the FBI, but “[w]e also train alongside them, and they have participated in readiness exercises.” InfraGard members are involved with the Bush administration’s “National Continuity Policy,” which mandates that DHS coordinate with “private sector owners and operators of critical infrastructure, as appropriate, in order to provide for the delivery of essential services during an emergency.” InfraGard members participate in “national emergency preparation drills,” Schneck says, sometimes by the hundreds. InfraGard members are drilling in preparation for martial law, members say. One business owner recently attended a meeting conducted by FBI and DHS officials. He recalls, “The meeting started off innocuously enough, with the speakers talking about corporate espionage. From there, it just progressed. All of a sudden we were knee deep in what was expected of us when martial law is declared. We were expected to share all our resources, but in return we’d be given specific benefits.” In the event of martial law being declared, Infragard members will have the ability to travel in restricted areas and to evacuate citizens. But they will have other abilities and duties as well. InfraGard members, says the business owner, will be authorized to “shoot to kill” if necessary to maintain order and “protect our portion of the infrastructure. [I]f we had to use deadly force to protect it, we couldn’t be prosecuted.… We were assured that if we were forced to kill someone to protect our infrastructure, there would be no repercussions. It gave me goose bumps. It chilled me to the bone.” Other InfraGard members deny that they have ever been told such; Schneck says InfraGard members will have no civil patrol or law enforcement responsibilities. The FBI calls such assertions “ridiculous.” But the business owner’s story has been corroborated by other InfraGard members. “There have been discussions like that, that I’ve heard of and participated in,” says Christine Moerke, an InfraGard member from Wisconsin. [InfraGard, 2008; Progressive, 2/7/2008]

Entity Tags: Michael Hershman, US Department of Homeland Security, Christine Moerke, Bush administration (43), American Civil Liberties Union, Federal Bureau of Investigation, InfraGard National Members Alliance, Gray Davis, Phyllis Schneck, InfraGard

Category Tags: Impositions on Rights and Freedoms, Continuity of Government, Other Surveillance

John Yoo, the general counsel for the Senate Judiciary Committee and a former clerk for Supreme Court Justice Clarence Thomas, writes a book-length article for the California Law Review. Yoo’s article argues that under the Constitution, the president has far greater powers during wartime than is generally recognized. Basically, Yoo writes, Congress can only do two things to restrain a wartime president: restrict spending and impeach the president. The federal courts have no power over the president whatsoever. [Dubose and Bernstein, 2006, pp. xx]

Entity Tags: Senate Judiciary Committee, Clarence Thomas, John C. Yoo

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Government Acting in Secret, Government Classification, Other Surveillance

April 25, 1996: New Anti-Terrorism Law Passed

President Clinton signs the Antiterrorism and Effective Death Penalty Act, which the New York Times calls “broad legislation that provides new tools and penalties for federal law-enforcement officials to use in fighting terrorism.” The Clinton administration proposed the bill in the aftermath of the Oklahoma City terrorist bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995). In many ways, the original bill will be mirrored by the USA Patriot Act six years later (see October 26, 2001). Civil libertarians on both the left and right opposed the legislation. Political analyst Michael Freeman called the proposal one of the “worst assaults on civil liberties in decades,” and the Houston Chronicle called it a “frightening” and “grievous” assault on domestic freedoms. Many Republicans opposed the bill, and forced a compromise that removed increased wiretap authority and lower standards for lawsuits against sellers of guns used in crimes. CNN called the version that finally passed the Republican-controlled Congress a “watered-down version of the White House’s proposal. The Clinton administration has been critical of the bill, calling it too weak. The original House bill, passed last month, had deleted many of the Senate’s anti-terrorism provisions because of lawmakers’ concerns about increasing federal law enforcement powers. Some of those provisions were restored in the compromise bill.” [CNN, 4/18/1996; New York Times, 4/25/1996; Roberts, 2008, pp. 35] An unusual coalition of gun rights groups such as the National Rifle Association (NRA) and civil liberties groups such as the American Civil Liberties Union (ACLU) led the opposition to the law. [New York Times, 4/17/1996] By the time Congress passed the bill, it had been, in the words of FBI Director Louis Freeh, “stripped… of just about every meaningful provision.” [Roberts, 2008, pp. 35] The law makes it illegal in the US to provide “material support” to any organization banned by the State Department. [Guardian, 9/10/2001]

Entity Tags: William Jefferson (“Bill”) Clinton, Louis J. Freeh, National Rifle Association, American Civil Liberties Union, Clinton administration, Michael Freeman, USA Patriot Act, US Congress

Timeline Tags: Complete 911 Timeline, US Domestic Terrorism

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Patriot Act, Gun Rights

August 21, 1996: War Crimes Act Becomes Law

The War Crimes Act (HR 3680) becomes Public Law No: 104-192. It prohibits Americans—top officials and soldiers alike—from committing “grave breaches” of the Geneva Conventions. It states: “Whoever, whether inside or outside the United States, commits a grave breach of the Geneva Conventions,” provided that the perpetrator or the victim is a member of the US military or a national of the US, “shall be fined under this title or imprisoned for life or any term of years, or both, and if death results to the victim, shall also be subject to the penalty of death.” [Newsweek, 11/5/2001]

Entity Tags: Geneva Conventions, War Crimes Act

Timeline Tags: Torture of US Captives

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Gov't Violations of Prisoner Rights

The Communications Assistance for Law Enforcement Act (CALEA) forces broadband Internet service providers such as Vonage to retrofit their networks for government surveillance purposes. The prime beneficiary of that retrofitting is the FBI’s cutting-edge electronic surveillance system known as DCSNet (see 1997-August 2007 and After), which can now monitor those networks. DCSNet also seems capable of handling other cutting-edge technologies such as push-to-talk, peer-to-peer telephony systems such as Skype, caller-ID spoofing, and phone-number portability. [Wired News, 8/29/2007]

Entity Tags: Digital Collection System, Communications Assistance for Law Enforcement Act (CALEA), Skype, Federal Bureau of Investigation, Vonage

Category Tags: Privacy, Impositions on Rights and Freedoms, Other Legal Changes, Government Acting in Secret, Government Classification, Other Surveillance

Some time after he is appointed CIA Director (see July 11, 1997), but before 9/11, George Tenet negotiates a series of agreements with telecommunications and financial institutions “to get access to certain telephone, Internet, and financial records related to ‘black’ intelligence operations.” The arrangements are made personally by the companies’ CEOs and Tenet, who plays “the patriot card” to get the information. The arrangement involves the CIA’s National Resources Division, which has at least a dozen offices in the US. The Division’s main aim is to recruit people in the US to spy abroad. However, in this case the Division makes arrangements so that other intelligence agencies, such as the NSA, can access the information and records the CEOs agree to provide. [Woodward, 2006, pp. 323-5] There is a history of co-operation between the CIA’s National Resources Division and the NSA. For example, Monte Overacre, a CIA officer assigned to the Division’s San Diego office in the early 1990s, said that he worked with the NSA there, obtaining information about foreign telecommunications programs and passing it on to the Technology Management Office, a joint venture between the two agencies. [Mother Jones, 1/1998] One US official will say that the arrangements only give the CIA access to the companies’ passive databanks. However, reporter Bob Woodward will say that the programme raises “serious civil liberties questions and also demonstrate[d] that the laws had not kept pace with the technology.” [Woodward, 2006, pp. 324-5] There will be an interagency argument about the program after 9/11 (see (2003 and After)).

Entity Tags: Monte Overacre, National Security Agency, Central Intelligence Agency, CIA Technology Management Office, Bob Woodward, George J. Tenet, CIA National Resources Division

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Category Tags: Other Legal Changes, Privacy, Government Acting in Secret, Government Classification, Database Programs

Disbarred lawyer and convicted Watergate figure Charles Colson (see June 1974), now the head of the Christian Prison Fellowship ministry, writes that “the Constitution does not give the Supreme Court final say on constitutional questions.” Colson, a traditional social conservative, makes this startling claim in an op-ed about the recent Boerne v. Flores decision of the Court, in which the Court struck down the Religious Freedom Restoration Act (RFRA) as an unconstitutional encroachment on the fundamental concept of the separation of church and state. Colson writes that the decision has “precipitat[ed] what may be the greatest constitutional crisis of our age.” Colson, a supporter of the RFRA, says the striking down of the act makes “religious liberties… once again vulnerable.” The overarching question Colson raises is whether the Supreme Court is the final judicial arbiter of the Constitution. Colson gives a blunt answer: “Contrary to what most Americans think, the Constitution does not give the Supreme Court final say on constitutional questions. And the Founders resisted the idea.” Colson cites the landmark 1803 case of Marbury v. Madison, in which the Court, he says, took up the power of judicial review, then gives three examples of presidents defying Court orders. However, fellow convicted Watergate figure John Dean, a former White House counsel, refutes Colson’s arguments. In 2006, Dean will write that “Colson, like [televangelist Pat] Robertson and others on the religious right, is seeking, in effect, to nullify Supreme Court decisions of which he does not approve.” Dean will note that although Colson has long since lost his license to practice law, he is considered a scholar of some importance by his conservative contemporaries, and therefore has some influence.
'Marbury' and Judicial Review - Dean notes that Colson’s interpretation of the bedrock Marbury case is wrong. Judicial review by federal courts of Congressional legislation was a long-established principle by the time the Court issued its ruling. Even before the Constitutional Conventions, state courts had routinely overturned state legislative acts. The assumption of most during the debates over the contents of the Constitution was that federal courts, and most specifically the Supreme Court, would have similar power over federal legislation.
Thomas Jefferson and the Alien Imposition Act - Colson writes that “Thomas Jefferson refused to execute the Alien Imposition Act.” Colson is wrong: there was never such an act. Dean writes, “If Colson is referring to the infamous Alien and Sedition Act of 1798, it had nothing to do with a court order, and the example is therefore very misleading.” Jefferson’s predecessor, John Adams, enforced the law, which Jefferson considered unconstitutional. Jefferson pardoned those convicted of sedition under the statute when he gained the presidency. He never “refused to execute” it because it expired the day before he was inaugurated, March 4, 1801.
Andrew Jackson and the Bank of the United States - Colson writes that Andrew Jackson “spurned a Court order in a banking case.” Again, as Dean notes, the citation is misleading. Dean believes Colson is referring to Jackson’s 1832 veto of a bill to recharter the Bank of the United States. The Court had not issued an opinion on the rechartering of a federal bank, so Jackson did not defy a Court order.
Abraham Lincoln and the 'Dred Scott' Decision - Colson concludes his historical argument by saying that Abraham Lincoln “rejected the Dred Scott decision. Lincoln even asked Congress to overrule the Court—which it did, passing a law that reversed Dred Scott (1862).” Dean calls Colson’s argument “a stunning summation, not to mention distortion, of history.” The infamous 1857 Dred Scott v. Sanford decision found that slaves were neither citizens nor persons under the Constitution, that Congress could not prohibit slavery in the territories, and that the Declaration of Independence’s statement that “all men are created equal” applied only to white men. Lincoln argued passionately against the decision during his 1858 debates with his Senate opponent, Stephen Douglas, and swore that he would seek to reverse the decision. But, as Dean will note, “Seeking reversal is not defiance of the law.” Lincoln did defy the Court in 1861 by suspending the writ of habeas corpus, and explained his unprecedented action to Congress by arguing that he did so to save the Union from dissolution. Dred Scott was overturned, not by Congressional legislation, but by the Thirteenth and Fourteenth Amendments to the Bill of Rights.
The Danger Inherent in Colson's Arguments - Dean will note: “Colson’s baseless arguments are unfortunately typical of those that authoritarian conservatives insist on making, using facts that are irrelevant or misleading, if not demonstrably wrong. The self-righteousness of authoritarians [such as] Colson and Pat Robertson… has become so pronounced that at times it seems as if they believe themselves actually to be speaking ex cathedra [a sardonic reference to the infallibility of the Pope]. Their contention that the president of the United States is not bound by rulings of the Supreme Court, or, for that matter, by the laws of Congress, when these rulings or laws relate to the functions of the presidency, has gained increasing currency with authoritarian conservatives, both leaders and followers.” Such acceptance “is truly frightening in its implications.” [Christianity Today, 10/6/1997; Dean, 2006, pp. 111-115; Catholic Encyclopedia, 2008]

Entity Tags: Charles Colson, Andrew Jackson, Abraham Lincoln, Thomas Jefferson, Religious Freedom Restoration Act, Pat Robertson, US Supreme Court, John Dean

Category Tags: Impositions on Rights and Freedoms, Court Procedures and Verdicts, Expansion of Presidential Power

Princess Diana at a mine field in Angola in 1997.Princess Diana at a mine field in Angola in 1997. [Source: Tim Graham / Corbis]The NSA admits that US intelligence agencies possess 1,056 pages of classified information regarding Britain’s Princess Diana. British tabloids portray the documents as rife with salacious information on Diana’s “most intimate love secrets” about her relationship with Egyptian billionaire Dodi al-Fayed, but the actual documentation may not be so lurid. The NSA recently denied a Freedom of Information request from the Internet news service APB Online about information it has collected on Diana, who died in a tragic car accident in 1997. (It is unclear whether US intelligence has any unreleased information about the circumstances of Diana’s death. [APB Online, 11/30/1998; Washington Post, 12/12/1998] The NSA has denied monitoring Diana on the night of her death, an allegation raised by The Observer in 2006.) [MSNBC, 12/11/2006] In the two-page letter denying the request, the NSA admits to possessing a “Diana file,” but refuses to divulge what is in that file. A US intelligence official says the information is made up of conversations between other people who mentioned Diana; the references to Diana in those intercepted conversations are “incidental.” The official says Diana was never a particular target of the NSA’s Echelon surveillance program. However, the NSA has classified 124 pages of the “Diana documents” as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security.” According to a recent report by the European Parliament, the NSA routinely monitors virtually “all e-mail, telephone and fax communications… within Europe” (see July 11, 2001). Intelligence expert Steven Aftergood of the Federation of American Scientists says “the US and our allies promiscuously collect electronic communications around the world. Whether the descriptions of Echelon are accurate or not, that much is definitely true.” Some believe that lurid snippets of information leaked to the British press regarding Diana’s affair with Fayed, and her ambivalent relationship with Prince Charles, may have come from Echelon wiretaps and surveillance. Another FAS scientist, John Pike, says the NSA and other US intelligence agencies may have been monitoring Diana to protect her from terrorist attacks. Pike says it is also possible she may have been monitored because of her involvement in banning land mines, a position opposed by the Pentagon. [APB Online, 11/30/1998; Washington Post, 12/12/1998] Former NSA official Wayne Madsen will say in 2000, “[W]hen NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?” [CBS News, 2/27/2000] In August 1999, the NSA will deny another Freedom of Information request about its “Diana file” from the British newspaper The Guardian. [Guardian, 8/6/1999]

Entity Tags: Steven Aftergood, Prince Charles, The Guardian, John Pike, Dodi al-Fayed, Echelon, Federation of American Scientists (FAS), National Security Agency, Princess Diana

Category Tags: Impositions on Rights and Freedoms, Privacy, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

Phil Zimmerman, the creator of the highly regarded “Pretty Good Privacy” (PGP) protocols, sounds an alarm about the 1994 Communications Assistance for Law Enforcement Act (CALEA), which mandated that telephone providers aid government wiretapping “by installing remote wiretap ports onto their digital switches so that the switch traffic would be available for snooping by law enforcement. After CALEA passed (see January 1, 1995), the FBI no longer had to go on-site with wiretapping equipment in order to tap a line—they could monitor and digitally process voice communications from the comfort of the home office.…CALEA opened up a huge can of worms….” Zimmerman writes, “A year after the CALEA passed, the FBI disclosed plans to require the phone companies to build into their infrastructure the capacity to simultaneously wiretap 1 percent of all phone calls in all major US cities. This would represent more than a thousandfold increase over previous levels in the number of phones that could be wiretapped. In previous years, there were only about a thousand court-ordered wiretaps in the United States per year, at the federal, state, and local levels combined. It’s hard to see how the government could even employ enough judges to sign enough wiretap orders to wiretap 1 percent of all our phone calls, much less hire enough federal agents to sit and listen to all that traffic in real time. The only plausible way of processing that amount of traffic is a massive Orwellian application of automated voice recognition technology to sift through it all, searching for interesting keywords or searching for a particular speaker’s voice. If the government doesn’t find the target in the first 1 percent sample, the wiretaps can be shifted over to a different 1 percent until the target is found, or until everyone’s phone line has been checked for subversive traffic. The FBI said they need this capacity to plan for the future. This plan sparked such outrage that it was defeated in Congress. But the mere fact that the FBI even asked for these broad powers is revealing of their agenda.” [Ars Technica, 12/20/2005]

Entity Tags: Communications Assistance for Law Enforcement Act (CALEA), Federal Bureau of Investigation, Phil Zimmerman

Category Tags: Other Legal Changes, Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Other Surveillance

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Category Tags: Impositions on Rights and Freedoms, Privacy, Government Acting in Secret, Government Classification, Database Programs

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

The NSA’s Echelon satellite surveillance system has eavesdropped on numerous public figures, human rights organizations, charities, and even the Vatican, former British intelligence officials admit (see February 27, 2000). The NSA, which shares information with Britain, Canada, Australia, and New Zealand, has eavesdropped on, among others, Princess Diana (see November 30, 1998), Mark Thatcher (the son of former British prime minister Margaret Thatcher), the Pope, Mother Teresa, Amnesty International, Christian Aid, and others. It is unclear exactly when the NSA performed its surveillance operations, and what information it collected. The officials choose to speak out after the European Parliament announces it will open an inquiry into Echelon’s operations (see July 11, 2001). Former NSA official Wayne Madsen says, “Anybody who is politically active will eventually end up on the NSA’s radar screen.” The NSA routinely monitors charities and human rights organizations operating overseas because they often have access to information about regimes opposed to Western interests. Madsen believes the NSA spied on Diana because of her human rights work; he says that “undisclosed material held in US government files on Princess Diana was collected because of her work with the international campaign to ban landmines.” Mark Thatcher was monitored in the 1980s because of his work on the huge al-Yamamah arms contract being negotiated between Britain and Saudi Arabia. The NSA also monitored conversations by officials of the Panavia consortium, which builds the Tornado fighter plane. British Aerospace is a major partner in the consortium. “I just think of Echelon as a great vacuum cleaner in the sky which sucks everything up,” says former Canadian intelligence officer Mike Frost. “We just get to look at the goodies.” Former US computer software manager Margaret Newsham, who worked during the 1980s at the Menwith Hill listening station in Yorkshire, says, “I was aware that massive security violations were taking place. If these systems were for combating drugs or terrorism, that would be fine. But not for use in spying on individuals.” Newsham recalls being shocked when she overheard conversations by then-US senator Strom Thurmond (see April, 1988). “It was evident American constitutional laws had been broken,” she says. [London Times, 2/27/2000]

Entity Tags: Strom Thurmond, Wayne Madsen, Panavia, Princess Diana, Mother Teresa, Christian Aid, British Aerospace, Amnesty International, Echelon, European Parliament, Margaret Newsham, Margaret Thatcher, National Security Agency, Mark Thatcher, Mike Frost

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

A confidential Federal Emergency Management Agency (FEMA) document obtained by Wired news says the US Army is prepared to deploy combat troops in US cities in response to disruptions ranging from civil disobedience to a nuclear attack. The 75-page operations manual, created by FEMA in preparation for the Republican National Convention in Philadelphia, stresses the importance of preparing for “nuclear, biological, chemical, and civil disturbance events, as well as potential weather-related disaster events.” The document, according to Wired, “says that the US First Army will, if necessary, execute Operation Garden Plot to quell any serious civil disturbances.” Operation Garden Plot was first developed in the late 1960s to deal with potential protests and urban riots (see Winter 1967-1968). According to Wired, the current terrorism plans for the convention include “flying giant C-5 Galaxy cargo planes loaded with military gear into Willow Grove Naval Air Station, about 25 miles outside the city, and assembling troops at three National Guard armories near the downtown protest areas.” The FEMA document states, “The potential occurrence of an event that would reflect negatively on Philadelphia, the Commonwealth of Pennsylvania, or the United States demands that every effort to preclude such an event be taken.” FEMA has a similar plan for the upcoming Democratic National Convention. [Wired News, 8/1/2000]

Entity Tags: Federal Emergency Management Agency, US First Army, US Department of Defense

Category Tags: Impositions on Rights and Freedoms, Continuity of Government

Thousands of African-American voters in Florida are illegally denied their right to vote, as is proven in many instances by subsequent investigations. Adora Obi Nweze, the president of the Florida State Conference of the NAACP, is told by election officials she cannot vote because she has already cast an absentee ballot, even though she has cast no such ballot. Cathy Jackson, a Broward County voter since 1996, was told falsely that she was not on the rolls and could not vote; she sees a white woman cast an “affidavit ballot” and asks if she can do the same, but is denied. Donnise DeSouza of Miami is told, falsely, that she is not on the voting rolls and is moved to the “problem line”; when the polls close, she is sent home without voting. Another voter, Lavonna Lewis, is in line to vote when the polls close. Though the law says that voters already in line can vote even after the polls close, she is sent home. She will later say she saw election officials allow a white male voter to get in line after the polls had closed.
US Representative Fights to Cast Vote - US Representative Corrine Brown (D-FL) is followed into her poll by a television crew. Officials there tell her that her ballot has been sent to Washington and therefore she cannot vote in Florida. Brown spends two and a half hours in the polling place before finally being allowed to vote. Brown later notes that she helped register thousands of African-American college students in the months prior to the election. “We put them on buses,” she will recall, “took them down to the supervisor’s office. Had them register. When it came time to vote, they were not on the rolls!” Many African-American voters like Wallace McDonald of Hillsborough County are denied their vote because they are told, falsely, that they are convicted felons whose right to vote has been stripped. The NAACP offices are inundated with telephone calls all day from voters complaining that their right to vote is being denied.
'Painful, Dehumanizing, Demoralizing' - Donna Brazile, campaign manager for the Gore campaign whose sister was illegally asked for three forms of identification in Seminole County before being allowed to vote, later says: “What happened that day—I can’t even put it in words anymore. It was the most painful, dehumanizing, demoralizing thing I’ve ever experienced in my years of organizing.” Hearings in early 2001 held by the US Commission on Civil Rights will record more than 30 hours of testimony from over 100 witnesses as to a wide array of racially based disenfranchisement. The commission will find that the election probably violated the Voting Rights Act of 1965, but Attorney General John Ashcroft will ignore the report.
Gadsden County - One exemplar of systematic disenfranchisement is seen in Gadsden County, one of Florida’s poorest counties, with 57 percent of its voters African-American. Its elections are supervised by white conservative Denny Hutchinson. Hutchinson refuses to take action to increase registration, put in more polling places, and other actions designed to increase voter turnout. Gadsden County Commissioner Ed Dixon later recalls: “He never advocated for any increased precincts, even though some of our people had to drive 30 miles to get to a poll. In the only county that’s a majority African-American, you want a decreased turnout.” After the votes have been tallied, Hutchinson’s deputy, African-American Shirley Green Knight, notices that over 2,000 ballots (out of 14,727 cast) are not included in the registered count. The reason? Gadsden uses a so-called “optiscan” balloting device, which allows voters to “bubble in” ovals with a pencil; these “bubbles” are scanned and the votes they indicate are tallied. Optiscan ballots are prone to register “overvotes,” essentially when the ballot indicates votes for two separate candidates in the same race. Overvotes are not machine-tallied. The machines have a sorting switch that when set to “on” causes the machine to record overvotes or “undervotes” (no vote recorded) in a separate category for later review and possible inclusion. Knight will learn that Hutchinson had insisted the machines’ switches be set to “off,” which rejects the overvotes without counting them at all. “I have no idea why he would do that,” Knight later says. When she learns of the problem, she asks Hutchinson to run the ballots through again with the sorting switch on, but he refuses. He is later overruled by the Gadsden canvassing board. When the ballots are run through a second time, the results are startlingly different. Gadsden uses a variant of the so-called “caterpillar ballot,” which lists candidates’ names in two columns. George W. Bush, Al Gore, and six other presidential candidates are listed in one column. The second column lists two more candidates, Monica Moorehead and Howard Phillips, and a blank for a “Write-In Candidate.” Hundreds of voters apparently believe that the second column is for an entirely different race, and vote not only for Bush or Gore, but for Moorehead or Phillips. And some voters vote for Gore and, to ensure clarity, write “Gore” in the write-in box. (Some, thoroughly confused by directions telling them to “Vote for ONE” and “Vote for Group,” bubble in all 10 presidential candidates and write “Gore” in the box.) None of these votes are originally counted. More sophisticated optiscan machines would refuse to accept the ballot, prompting the voter to correct the error. But Gadsden uses a cheaper machine that allows the error to go through unbeknownst to the voter. When Gadsden performs its machine recount, Gore will receive 153 additional votes from the erroneous optiscan. These will be included in the state’s final tally. However, over 2,000 of the “overvote” ballots will not be counted. Two-thirds of those ballots have Gore as their selection.
Duval County - Similar problems plague voters in Duval County. Duval, a large Democratic stronghold because of its inclusion of Jacksonville, is 29 percent African-American. Twenty-one thousand votes are thrown out as “overvotes.” Part of the problem is a sample-ballot insert placed in the newspaper by elections supervisor John Stafford, giving erroneous instructions as to how to complete the Duval ballot; any voter who follows these instructions does not have their votes tallied, though corrected instructions are posted in some Duval precincts. In the critical 72-hour period after the votes are complete, Gore campaign staffer Mike Langton will spend hours with Stafford, a white Republican, attempting to address the situation. Stafford lies to Langton and tells him Duval has “only a few” overvotes. It is not until after the deadline to ask for a machine recount has passed that Langton learns of the 21,000 uncounted votes. Nearly half of these are from four heavily African-American precincts that usually vote 90 percent Democratic. In theory, nearly 10,000 votes for Gore from Duval County will go untallied.
'Felons' and 'Purge Lists' - Florida law disenfranchises citizens convicted of many felonies (see June 24, 1974). In this election, thousands of Florida voters, mostly African-American males, lose their vote when they appear at their precinct and are told they cannot vote because they are felons, even though they are not. One is Willie Steen, a military veteran who loses his vote in Hillsborough County. “The poll worker looked at the computer and said that there was something about me being a felon,” Steen later recalls. “I’ve never been arrested before in my life,” he recalls telling the poll worker. The worker refuses to listen, and orders Steen to leave the line. Steen later learns that the felony he supposedly committed was done between 1991 and 1993, when he was stationed in the Persian Gulf. Tampa youth leader Willie Dixon and Tallahasse pastor Willie Whiting are also denied their votes through improper classification as felons, as do thousands of other voters. Investigative journalist Greg Palast later learns that the felon-disenfranchisement is widespread and systematic. He will publish a story exposing the scheme during the Florida recounts—in a London newspaper. No US newspaper will consider it. Palast later says: “Stories of black people losing rights is passe, it’s not discussed, no one cares. A black person accused of being a felon is always guilty.” Palast and other investigators learn that Republican legislators have in recent years upgraded a number of selected crimes from misdemeanors to felonies, apparently in order to “purge” the voting rolls of African-Americans. State Senator Frederica Wilson is one of many who believe the new classifications are “aimed at African-American people.” Black lawmakers have been unsuccessful in attempting to repeal the felon-disenfranchisement laws. After a 1997 election, where some 105 felons were found to have voted and analysis showed that 71 percent of Florida felons were registered Democrats, the Florida state government allocated $4 million to “purge” felons off the voting rolls. The government turned the task over to a private firm, Database Technologies (DBT) of Boca Raton (which later merged with the firm ChoicePoint). When the first purge lists from DBT began appearing in 1998, county elections officials were worried. Ion Sancho, the elections supervisor for Leon County, will recall: “We were sent this purge list in August of 1998. We started sending letters and contacting voters, [saying] that we had evidence that they were potential felons and that they contact us or they were going to be removed from the rolls. Boy, did that cause a firestorm.” One of the “felons” was Sancho’s close friend Rick Johnson, a civil rights attorney. “Very few felons are members of the Florida bar,” Sancho will note. In early 2000, Sancho asked Emmett “Bucky” Mitchell, a lawyer for the Florida Division of Elections, why so many “false positives”—innocent people—were on DBT’s list. Mitchell told Sancho that the problem was DBT’s, not Florida’s, and the firm had been told to handle the problem. Instead, according to ChoicePoint marketing official James Lee, Florida relaxed the criteria for its purge list, and tens of thousands of voters who had names roughly similar to those of actual felons were added to the list. Why? Lee will say, “Because after the first year they weren’t getting enough names.” Willie D. Whiting, a law-abiding pastor, is denied the vote because Willie J. Whiting is a felon. Willie Steen is denied his vote because Willie O’Steen is a convicted felon. Mitchell told a DBT project manager that it was up to elections officials like Sancho to find and correct the misidentifications. The lists even include actual felons whose right to vote had been restored by previous Florida administrations during amnesty programs. The initial database for the purge lists is comprised of people arrested for felonies, not convicted—thusly many citizens never convicted of a crime are now on the purge list. Others are incorrectly listed as felons when they were convicted of misdemeanors. A May 2000 “corrected” list stunned county elections officials. Linda Howell, election supervisor of Madison County, found her own name on the list. Monroe County supervisor Harry Sawyer found his father on the list, along with one of his employees and the husband of another. None of those people were felons. Some counties, such as Broward, Duval, Madison, and Palm Beach chose not to use the lists at all; Sancho meticulously checked his list of 697 names and ended up retaining only 33. Most supervisors use the lists without question. A thousand Bay County voters are denied their vote; 7,000 Miami-Dade voters lose theirs. It is unknown how many of these are actual felons and how many are law-abiding, legitimate voters. A 2001 class-action lawsuit brought by the NAACP and African-American voters will charge DBT and Florida Secretary of State Katherine Harris with deliberately attempting to disenfranchise black voters. It will be settled out of court, with Florida agreeing to provisions that nominally settle the problem (see Late August 2002), but a 2004 article by Vanity Fair will note that by 2004, Florida’s government has implemented none of the corrective procedures mandated by the settlement. Subsequent investigations will show that the “felons” on the various purge lists are disproportionately Democratic voters and disproportionately African-American. [Tapper, 3/2001; Vanity Fair, 10/2004]
2001 Investigation Proves Widespread Disenfranchisement - A 2001 investigation by the progressive newsmagazine The Nation will show a widespread and systematic program of voter disenfranchisement in effect in Florida during the 2000 elections (see April 24, 2001).

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). [Truthout (.org), 1/17/2006] In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. [New York Times, 12/16/2007]

Entity Tags: Bush administration (43), National Security Agency

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, NSA Wiretapping / Stellar Wind

According to a 2006 lawsuit against three major US telecommunications firms that alleges the companies illegally cooperated with the NSA’s warrantless surveillance program (see May 12, 2006), NSA officials meet with AT&T officials to discuss that firm’s participation. (Days later, NSA officials will also meet with officials from Qwest, who refuse to cooperate—see February 27, 2001). The officials discuss replicating an AT&T network center in Bedminster, New Jersey, to give the agency access to all the global phone and e-mail traffic that runs through it. According to an AT&T engineer’s court statements, the NSA officials want to “listen in” with unfettered access to communications that they believe may have intelligence value, as well as the ability to store those communications for later review. There is no discussion of limiting the monitoring to international communications, the engineer says: “At some point, I started feeling something isn’t right.” Two other AT&T employees will contradict the engineer’s claims, saying that the NSA merely wanted to upgrade its own internal communications. The lawsuit’s legal counsel, Bruce Afran and Carl Mayer, will say that internal AT&T documents can verify the engineer’s account. Mayer will say that the engineer sees “decisive evidence that within two weeks of taking office, the Bush administration was planning a comprehensive effort of spying on Americans’ phone usage.” [New York Times, 12/16/2007]

Entity Tags: Bruce Afran, AT&T, Carl Mayer, National Security Agency, Qwest

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, Database Programs, NSA Wiretapping / Stellar Wind

The NSA asks Qwest, a major US telecommunications firm and a cutting-edge provider of high-tech wireless and Internet connectivity, to reveal information about its customers and their phone calls. Qwest’s CEO, Joe Nacchio, refuses after meeting with NSA officials and deciding that the program is illegal without court orders (see February 27, 2001). The NSA refuses to seek court authorization for its wiretaps and electronic surveillance. The NSA will renew its request from Qwest after the 9/11 attacks, and will also ask the firm to help it track suspected terrorists. Other telecommunications firms such as Verizon, AT&T, and BellSouth, will comply with the NSA’s requests (see February 2001 and Beyond).
Fears of a 'Digital Pearl Harbor' - According to a former White House official, the NSA’s primary purpose before 9/11 is to watch for computer hackers and foreign-government agents trying to hack into the government’s computer information systems, particularly those within the Defense Department. Government officials fear a “digital Pearl Harbor” if hackers were ever to seize control of those systems or other key US infrastructures. The former official will say in 2007 that the NSA’s proposal to Qwest is, “Can you build a private version of Echelon and tell us what you see?” Echelon is the NSA’s enormous signals intelligence (SIGINT) network used by the agency and its counterparts in Australia, Canada, New Zealand, and Britain. Qwest is constructing a high-speed network for phone and Internet traffic, and the NSA wants Qwest to keep records of its customers’ transactions for it. The NSA, another source will say, wants to analyze call, e-mail, and other transmissions’ traffic patters for signs of suspicious activity. The White House official will say that telecom firms such as Qwest “have an enormous amount of intelligence-gathering” capability. They don’t have to target individual customers to “look for wacky behavior,” or “groups communicating with each other in strange patterns.” Such information could augment intelligence that the NSA and other agencies were gathering from other sources, and enable the NSA to collect the information it wants without violating laws prohibiting it and other intelligence agencies from directly gathering data on US citizens.
Ill Will from NSA - Nacchio’s refusal to go along with the NSA’s request garners it some ill will among the US intelligence community, the former White House official will say. Nacchio will contend that because of his refusal, the NSA denied Qwest a lucrative government contract. A former high-level intelligence official will add that other telecom companies had little problem agreeing to the NSA’s requests. Nacchio believes that the NSA’s request is illegal under the Telecommunications Act without court orders; the former White House official will acknowledge that it might violate the 1986 Electronic Communications Privacy Act. After 9/11, that law will be amended by the USA Patriot Act to give the government more room to monitor US citizens.
Qwest, Other Telecom Firms Cooperative with Other Agencies - Qwest is apparently less reluctant to share other information with the Pentagon. Qwest began sharing its technology and information as far back as 1997 (see 1997). In May 2001, Commerce Secretary Don Evans will tell the Senate Appropriations Committee that his department helped persuade Qwest to “share proprietory information with the Defense Department to evaluate the vulnerability of its network.” Qwest, which serves the Rocky Mountain and West Coast regions of the country, covers the areas that house some of the military’s most important command-and-control facilities, including the US Strategic Command. In the 1990s, Qwest began actively pursuing contracts with the Defense Department to build more modern, private, secure networks for defense and intelligence agencies. [National Journal, 11/2/2007]
Meetings with Bush Officials - In court documents filed in 2006 to challenge his prosecution for insider trading and, in heavily redacted form, released to the public in 2007, Nacchio will indicate that telecom executives met frequently with Bush administration officials before 9/11, including Deputy Defense Secretary Paul Wolfowitz, National Security Adviser Condoleezza Rice, NSA Director Michael Hayden, and counterterrorism “tsar” Richard Clarke. Many telecom firms are working closely with the government to develop highly classified operations, including joint networks to which the government will have unfettered access. The future director of national intelligence, Mike McConnell, works with telecom firms to expand the cooperation between the telecom industry and the federal government. [Salon, 10/15/2007]

Entity Tags: Condoleezza Rice, US Department of Defense, Bush administration (43), Verizon Communications, AT&T, US Department of Commerce, Senate Appropriations Committee, US Strategic Command, BellSouth, Donald L. Evans, Echelon, Richard A. Clarke, Qwest, Mike McConnell, National Security Agency, Joe Nacchio, Paul Wolfowitz

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

Verizon gives the NSA access from within its facilities.Verizon gives the NSA access from within its facilities. [Source: ReallyNews.com]AT&T, Verizon, and BellSouth all cooperate with the NSA in monitoring US citizens’ phone and Internet communications (see October 2001). Qwest, however, refuses to cooperate (see February 27, 2001). Qwest officials are unsure that it is legal to hand over customer information to the government without court warrants. The firm’s refusal to participate in the program leaves a gaping hole in the NSA’s database, with the NSA only getting partial coverage of US citizens in the West and Northwest. Until recently, AT&T and other phone companies have routinely insisted on court warrants before turning over call data to government agencies, protocols growing out of the historical concerns of the Bell Telephone system for customer service and privacy. Gene Kimmelman of the Consumers Union will say in 2006 that such insistence on court warrants was a bedrock principle of the Bell systems. “No court order, no customer information—period.” he says. “That’s how it was for decades.” The Bell system was also concerned with following the law, specifically the Communications Act of 1934, which prohibits telephone companies from giving out such information without court orders. President Bush and other government officials will later say that his 2002 executive order allowing the NSA to wiretap American phones without warrants (see Early 2002) gives the telephone companies legal cover, but many legal experts and civil liberties groups disagree. After 9/11, the NSA approaches the four companies with offers to pay for US citizens’ call histories and for updates, which would allow the agency to track citizens’ phone habits. Three of the four agree to the NSA proposal, but again Qwest does not. An AT&T spokesman will say in May 2006, “We do not comment on matters of national security, except to say that we only assist law enforcement and government agencies charged with protecting national security in strict accordance with the law.” BellSouth will say that the company “does not provide any confidential customer information to the NSA or any governmental agency without proper legal authority.” Verizon will add that the company acts “in full compliance with the law and we are committed to safeguarding our customers’ privacy.” Neither AT&T nor Qwest will comment at all. [USA Today, 5/11/2006] The NSA asks Qwest to install monitoring equipment on its “Class 5” switching facilities, which monitor the most localized calls as well as some international traffic. The NSA claims it will only single out foreigners on Qwest’s network. In 2006, a government official will say that the CEO of Qwest, Joe Nacchio, misunderstood what the agency was asking. [New York Times, 12/16/2007]
Qwest Refuses to Cooperate - In 2006, sources will recall that at the time of the NSA requests, Nacchio is so disturbed by the idea of the NSA wiretapping phones without warrants, and is so unsure of what information would be collected and how it might be used, that he decides the company will not cooperate. The NSA tells Qwest and the other companies that not only would it compile and maintain data on US citizens’ phone habits, but it may well share that information with other US government agencies, including the CIA, the Drug Enforcement Administration, and the FBI. Indeed, the NSA shares what it calls “product” with other intelligence agencies, and perhaps with other governmental agencies. After Nacchio decides not to comply with the NSA’s request, the agency begins pressuring the firm, accusing it of threatening national security and implying that Qwest might not be eligible for future governmental contracts. When Qwest asks the NSA to take its proposal to the FISA Court (FISC), the agency refuses, making Qwest that much more dubious about the NSA operation, especially when NSA lawyers say they won’t take the proposal to FISC because that court “might not agree with them.” The NSA also refuses to ask for authorization from the attorney general’s office. Nacchio will leave Qwest under fire for allegedly misleading shareholders about the company’s financial prospects, but his successor, Richard Notebaert, continues to refuse to cooperate with the NSA. [USA Today, 5/11/2006; USA Today, 5/11/2006] Interestingly, by 2004 the Federal Communications Commission will list Qwest and Verizon as essentially the same company. [Federal Communications Commission, 12/10/2004]
Other Firms Deny Participation - In May 2006, after USA Today reports on the telecom firms’ participation in the surveillance (see May 11, 2006), both Verizon and BellSouth will deny providing the NSA with data on their customers, though they have previously acknowledged their cooperation (see February 5, 2006). A BellSouth spokesman will say, somewhat ingenuously, “We’re not aware of any database that NSA has, so we’re not aware of our customer information being there at all.” And Verizon conspicuously fails to mention possible data from MCI, the long-distance provider it has recently bought. Senator Patrick Leahy (D-VT) will say of the various companies’ participations, “The thing that concerns me is some [companies] said yes and some said no” when asked to participate. “If the government really thought this was legal and necessary, why let some say yes and some say no? It’s either legal and necessary, or it’s not.” [USA Today, 5/16/2006]

Entity Tags: Patrick J. Leahy, Qwest, Richard Notebaert, Verizon Communications, National Security Agency, USA Today, George W. Bush, Joe Nacchio, Foreign Intelligence Surveillance Court, BellSouth, Central Intelligence Agency, AT&T, Consumers Union, Federal Bureau of Investigation, Drug Enforcement Administration, Gene Kimmelman, Federal Communications Commission

Category Tags: Impositions on Rights and Freedoms, Privacy, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

The National Security Agency seeks the assistance of global telecommunications corporation AT&T to help it set up a domestic call monitoring site to eavesdrop on US citizens’ phone communications, according to court papers filed in June 2006 as part of a lawsuit against AT&T (see October 2001). The NSA is expressly forbidden from spying on US citizens within US borders unless authorized by the Foreign Surveillance Intelligence Court (FISC) (see 1978). When the NSA program, which wiretaps phone and email communications often without court warrants, becomes public knowledge well over four years later (see December 15, 2005), President Bush, NSA Director Michael Hayden, and other White House and government officials will assert that the program was set up in response to the September 11, 2001 terrorist attacks. If the claims made in the lawsuit are accurate, these assertions are provably false. “The Bush administration asserted this became necessary after 9/11,” lawyer Carl Mayer will claim in 2006. “This undermines that assertion.” Unbeknownst to most Americans, the NSA is operating a secret “data mining” operation that, by 2006, will have compiled phone records and contact information on millions of domestic phone and email communications. The NSA project is code-named “Project Groundbreaker,” and is ostensibly an above-board attempt announced in June 2000 to have AT&T and other firms help modernize its technological capabilities. The project originally seeks to have AT&T build a network operations center that duplicates AT&T’s facility in Bedminster, New Jersey; this plan will be altered when the NSA decides it will be better served by acquiring the monitoring technology itself. The agency is seeking bids for a project to “modernize and improve its information technology infrastructure,” including the privatization of its “non-mission related” systems support. [TechWeb, 6/13/2000; Bloomberg, 6/30/2006] Groundbreaker’s privatization project is expected to provide up to $5 billion in government contracts to various private firms such as AT&T, Computer Sciences Corporation, and OAO Corporation, [Computerworld, 12/4/2000; Government Executive, 9/1/2001] and up to 750 NSA employees will become private contractors. Hayden, who has aggressively instituted a corporate management protocol to enhance productivity and has brought in numerous senior managers and agency executives from private defense firms, is a strong proponent of privatizing and outsourcing much of the NSA’s technological operations, and in 2001 will say that he wants the agency to focus on its primary task of breaking codes and conducting surveillance. Hayden does not admit that Groundbreaker is part of a larger NSA domestic surveillance program, [Government Executive, 9/1/2001] and publicly, NSA officials say that the project is limited to administrative and logistics functions. [Computerworld, 12/4/2000] The covert data mining portion of the project is code-named “Pioneer.” A former, unnamed employee of the NSA, [Bloomberg, 6/30/2006] and a former AT&T technician, Mark Klein, will provide the key information about Groundbreaker (see Late 2002, July 7, 2009 and December 15-31, 2005). Klein will say in 2006 that he saw the NSA construct a clandestine area within its switching center in San Francisco, and saw NSA technicians shunt fiber optic cable carrying Internet traffic into that area, which contains a large data bank and secret data mining hardware (see April 6, 2006). Klein will say he knew that the NSA built other such facilities in other switching locations. He will go on to say that the NSA did not work with just AT&T traffic; when AT&T’s network connected with other networks, the agency acquired access to that traffic as well. [Democracy Now!, 5/12/2006] The information about AT&T and the NSA will become public knowledge after the 2006 filing of a lawsuit against AT&T and other telecommunications firms (see May 12, 2006 and June 26, 2006).

Entity Tags: Mark Klein, Michael Hayden, George W. Bush, Foreign Intelligence Surveillance Court, Bush administration (43), Carl Mayer, Computer Sciences Corporation, AT&T, National Security Agency, OAO Corporation

Category Tags: Impositions on Rights and Freedoms, Privacy, Government Acting in Secret, Government Classification, Database Programs, NSA Wiretapping / Stellar Wind

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, NSA Wiretapping / Stellar Wind

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, NSA Wiretapping / Stellar Wind

According to a Gallup poll, 52 percent of Americans believe the federal government is “so large and powerful that it poses an immediate threat to the rights and freedoms of ordinary citizens.” [Roberts, 2008, pp. 35]

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power

Glyn Ford.Glyn Ford. [Source: British Labour Party]The European Parliament releases its final report on its findings about the secretive US surveillance program known as Echelon. The report, two years in the making, exhaustively details many of Echelon’s surveillance capabilities, and lists many of Echelon’s surveillance stations around the world. One of the more interesting sections of the report concerns its apparent use on behalf of US corporations. According to the report, Echelon—operated by the NSA as a highly classified surveillance program ostensibly for tracking terrorist threats and activities by nations hostile to the West—is also being used for corporate and industrial espionage, with information from the program being turned over to US corporations for their financial advantage. The report gives several instances of Echelon’s use by corporations. One is the use of Echelon to “lift… all the faxes and phone calls” between the European aircraft manufacturer Airbus and Saudi Arabian Airlines; that information was used by two American companies, Boeing and McDonnell Douglas, to outflank Airbus and win a $6 billion contract. The report also alleges that the French company Thomson-CSF lost a $1.3 billion satellite deal to Raytheon the same way. Glyn Ford, the MP who commissioned the report, says he doesn’t have a problem with Echelon itself, but in the way it is being used. “Now, you know, if we’re catching the bad guys, we’re completely in favor of that… What we’re concerned about is that some of the good guys in my constituency don’t have jobs because US corporations got an inside track on—on some global deal.” [Washington Post, 11/14/1999; CBS News, 2/27/2000; BBC, 7/6/2000; European Parliament, 7/11/2001] In 1977, the US government began providing Echelon-based intelligence to US corporations (see 1977). In April 2001, New Zealand journalist Nicky Hager testified about Echelon’s use by US allies for corporate and economic purposes (see April 2001), and former CIA director James Woolsey confirmed that US surveillance programs were used to benefit US corporations (see March 2000).

Entity Tags: US Department of Commerce, Thomson-CSF, Saudi Arabian Airlines, Glyn Ford, McDonnell Douglas, Central Intelligence Agency, Boeing Company, Echelon, Airbus, European Parliament, National Security Agency

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind, Other Surveillance

Dan Burton.Dan Burton. [Source: US House of Representatives]Dan Burton (R-IN), the chairman of the House Government Reform Committee, releases edited transcripts of taped White House conversations between then-President Bill Clinton and Israel’s then-prime minister, Ehud Barak (see Late August, 2001). President Bush’s counsel Alberto Gonzales decided to break with decades of tradition in releasing private conversations between a former president and a head of state, and gave Burton the tapes as part of Burton’s investigation into Clinton’s last-minute pardon of Marc Rich, a commodities trader who had fled the US ahead of tax evasion and fraud charges. Burton and other conservatives have charged that Clinton pardoned Rich at the behest of Rich’s wife Denise, a Clinton presidential library contributor, possibly in return for the contributions, or even sexual favors. However, the tapes indicate that one reason Clinton pardoned Rich was a request made by Barak. On December 11, 2000, Barak said to Clinton, “One last remark. There is an American Jewish businessman living in Switzerland and makes a lot of philanthropic contributions to Israeli institutions and activities and education.” Rich had “violated certain rules of the game in the United States,” Barak said, and wanted Clinton to consider pardoning him. Clinton replied, “I know about that case because I know his ex-wife. If your ex-wife wants to help you, that’s good.” Barak asked Clinton again on January 8, 2001, when Clinton called Rich’s case “bizarre” and said, “It’s best that we not say much about that.” In a third conversation, which took place just days before Clinton left office, Clinton said that such a pardon has “almost no precedent in American history,” and told Barak that he was pondering whether or not to allow Rich to return to the US if pardoned. [New York Times, 8/21/2001; Salon, 2/7/2002; Dean, 2004, pp. 85-86] Clinton, angered by the selective editing of the transcripts in an apparent effort to mischaracterize the Rich pardon, will request that all of the relevant portions of the transcripts be released; the White House will refuse and classify the rest of the transcripts (see Late August, 2001).

Entity Tags: House Committee on Government Reform, Bush administration (43), Alberto R. Gonzales, Dan Burton, Ehud Barak, Marc Rich, William Jefferson (“Bill”) Clinton, Denise Rich

Category Tags: Expansion of Presidential Power, Impositions on Rights and Freedoms, Government Classification

Marc Rich.Marc Rich. [Source: Huffington Post]Former president Bill Clinton reacts angrily to edited transcripts of private conversations with former Israeli prime minister Ehud Barak, in which Barak requested that Clinton pardon fugitive American financier Marc Rich (see August 21, 2001 and Early September, 2001). The transcripts were edited and released to the public by House Government Reform Committee chairman Dan Burton (R-IN) as part of his investigation into whether Clinton acted improperly in pardoning Rich. After reading the transcripts, Clinton thinks that Burton has selectively edited them, and giving a false impression of the nature and content of the conversations between himself and Barak. Clinton asks the White House, which had provided Burton with copies of the tapes of the conversations, to release all of the relevant portions of the transcripts, which he says will portray the conversations in a different light. But the White House refuses, saying the remaining portions of the transcripts are now classified. [Dean, 2004, pp. 85-86]
'Hating Bill Clinton' - The classification of the documents is quite sudden. Earlier in the month, a White House spokesperson said that the release of the Clinton-Barak transcripts was nothing more than part of their efforts to make more information available to Congress. “The excerpts were not classified,” the spokesperson said. “The decision to make the documents available was entirely consistent with past practice. You don’t just slap Top Secret on a whole document.” However, some observers dispute this. “Given the secrecy that the Bush-Cheney administration has pursued, it’s inconceivable that they would turn this information over if it affected President Bush,” says Phil Schiliro, the Democratic staff director for the House Government Reform Committee, which is trying in vain to secure information from the White House about the Cheney Energy Task Force. Lynne Weil, the press secretary for the Senate Foreign Relations Committee, calls the sudden decision to classify the previously unclassified transcripts “highly unusual.” She adds, “People who have worked for the Foreign Relations Committee for years can’t recall the last time such a thing happened.” The National Security Archives’s Tom Blanton welcomed the original disclosure of the conversations, but says it came not from a sudden desire for transparency from the Bush administration, but from a desire to smear Clinton. The Bush administration passionately believes in secrecy, a belief rooted in its collective ideology, says Blanton. When asked why that same ideological concern didn’t extend to the Clinton-Barak transcripts, Blanton replies that the question ignores “a rather more focused version of that ideology that’s about hating Bill Clinton.”
Violation of Procedure - Typically, the Bush administration turns down requests such as Burton’s for private presidential conversations. However, White House counsel Alberto Gonzales decided to turn them over. At that point, Clinton could have attempted to block the release of the transcripts by invoking executive privilege, a move that may have cast him in a poor light politically. But the events as carried out by Burton and the White House—breaking with precedent to release potentially embarrassing transcripts, edit those transcripts to make their contents appear more damning than they actually are, then retroactively classify the remainder of the transcripts—is highly unusual. [Salon, 2/7/2002; Dean, 2004, pp. 85-86]

Entity Tags: Energy Task Force, Ehud Barak, Bush administration (43), Alberto R. Gonzales, William Jefferson (“Bill”) Clinton, Tom Blanton, National Security Archives, Phil Schiliro, Senate Foreign Relations Committee, Marc Rich, House Committee on Government Reform, Lynne Weil, Dan Burton

Category Tags: Expansion of Presidential Power, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification

Patrick Philbin.Patrick Philbin. [Source: Daylife (.com)]Patrick Philbin joins the Justice Department’s Office of Legal Counsel (OLC). Philbin is an old friend and colleague of the OLC’s John Yoo; both graduated from Yale and both clerked for Judge Laurence Silberman and Supreme Court Justice Clarence Thomas. Philbin has no experience in the legalities surrounding national security issues; he spent the 1990s working for a corporate law firm helping telecommunications companies sue the Federal Communications Commission. Philbin joins the OLC with the expectation of working solely with administrative law. But after the 9/11 attacks, he will be asked to help Yoo handle the unexpected raft of national security issues. His first real work in the area of national security will be his finding (see November 6, 2001) that the president has untrammeled power to order the establishment of military commissions (see Late October 2001 and November 13, 2001). [Savage, 2007, pp. 136]

Entity Tags: John C. Yoo, US Department of Justice, Patrick F. Philbin, Office of Legal Counsel (DOJ)

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power

The FBI dramatically escalates its warrantless wiretaps of US citizens, most without the proper paperwork or oversight. The public will not learn of the FBI wiretapping program until October 2005, when classified documents will be made available to the Electronic Privacy Information Center (EPIC), an advocacy group that will sue the Justice Department for records relating to the Patriot Act. According to those documents, which are heavily redacted, the FBI conducts clandestine surveillance on some US residents for 18 months and even longer. The FBI will also internally investigate at least 287 violations of its use of secret surveillance against US citizens. One target will be kept under surveillance for over five years, including a 15-month stretch where the FBI fails to notify Justice Department lawyers after the subject moves from New York to Detroit. According to an FBI investigation, that delay is a violation of department guidelines and will prevent the department “from exercising its responsibility for oversight and approval of an ongoing foreign counterintelligence investigation of a US person.” Other cases involve agents obtaining e-mails after warrants expire, seizing bank records without authorization, and conducting improper “unconsented physical search(es).” EPIC’s general counsel, David Sobel, will say in October 2005 that the classified documents indicate possible misconduct by the FBI in counterintelligence investigations, and highlight the need for greater congressional oversight of clandestine surveillance within the United States. “We’re seeing what might be the tip of the iceberg at the FBI and across the intelligence community,” Sobel will say. “It indicates that the existing mechanisms do not appear adequate to prevent abuses or to ensure the public that abuses that are identified are treated seriously and remedied.” The FBI will counter by insisting that all of the infractions are minor, mostly what it calls administrative errors, and that any information obtained improperly is quarantined and eventually destroyed. One senior FBI official will say, “Every investigator wants to make sure that their investigation is handled appropriately, because they’re not going to be allowed to keep information that they didn’t have the proper authority to obtain. But that is a relatively uncommon occurrence. The vast majority of the potential [violations] reported have to do with administrative timelines and time frames for renewing orders.” Catherine Lotrionte, the counsel for the President’s Foreign Intelligence Advisory Board, which is tasked with overseeing the FBI’s domestic surveillance operations, will refuse to disclose any details of any of the FBI violations, saying most of its work is classified and covered by executive privilege. The surveillance operations are conducted under the aegis of the Foreign Intelligence Surveillance Act (see 1978), whose threshold for such surveillance is lower than for criminal warrants. In 2004 alone, over 1,700 new cases will be opened by the secret Foreign Intelligence Surveillance Court. [Washington Post, 10/24/2005] Though Bush officials eventually admit to beginning surveillance of US citizens after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Foreign Intelligence Advisory Board, Federal Bureau of Investigation, Catherine Lotrionte, Electronic Privacy Information Center, David Sobel, US Department of Justice, Foreign Intelligence Surveillance Court

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, Other Surveillance

According to columnist and defense expert William M. Arkin, the Bush administration updates the civil disturbance plan known as Operation Garden Plot. This military plan was first established in the late 1960s to deal with anti-war protests and urban riots (see Winter 1967-1968). Arkin reports: “The Army’s ‘Operation Garden Plot,’ a plan formulated in the 1960s for dealing with large civil disturbances, has been dusted off and updated to focus mostly on military intervention in response to a domestic event involving weapons of mass destruction.… Special Operations Command, and more specifically the super-secret Delta Force, now have a role in thwarting and responding to domestic terrorist incidents.” [Los Angeles Times, 5/26/2002]

Entity Tags: US Special Operations Command, 1st Special Forces Operational Detachment--Delta, Bush administration (43), US Department of Defense

Category Tags: Impositions on Rights and Freedoms, Government Acting in Secret

After the 9/11 attacks, the Bush administration seizes the new opportunities to expand the power of the presidency that present themselves as part of the government’s response to the attacks (see (After 10:00 a.m.) September 11, 2001). The Bush-Cheney legal team, largely driven by Vice President Dick Cheney and his staff (see January 21, 2001), aggressively pushes for new opportunities to expand executive branch authorities.
'Bravado,' 'Close-Minded Group of Like-Minded People' - A senior White House official later tells author and reporter Charlie Savage of the “pervasive post-9/11 sense of masculine bravado and one-upmanship when it came to executive power.” In Savage’s words, and quoting the official, “a ‘closed group of like-minded people’ were almost in competition with one another, he said, to see who could offer the farthest-reaching claims of what a president could do. In contrast, those government lawyers who were perceived as less passionate about presidential power were derided as ‘soft’ and were often simply cut out of the process” (see also September 25, 2001).
Suspicion of Oversight - “The lawyers for the administration felt a tremendous amount of time pressure, and there was a lot of secrecy,” the official will say. “These things were being done in small groups. There was a great deal of suspicion of the people who normally act as a check inside the executive branch, such as the State Department, which had the reputation of being less aggressive on executive power. This process of faster, smaller groups fed on itself and built a dynamic of trying to show who was tougher on executive power.”
Addington and Yoo: Outsized Influence - While nominally the leaders of the White House legal team are Attorney General John Ashcroft and White House counsel Alberto Gonzales, neither has as much influence as lawyers and staffers ostensibly of lower rank than themselves. Ashcroft is a vociferous supporter of the administration’s anti-terrorism policies, but is not a member of Bush’s inner circle and sometimes disagrees with the White House’s legal moves. Neither Ashcroft nor Gonzales have prior experience dealing with the legal issues surrounding executive power and national security. Two of the driving forces behind the White House’s push for more presidential power are Cheney’s chief counsel, David Addington, and an obscure deputy in the Office of Legal Counsel (OLC), John Yoo. Because of a dispute between Ashcroft and the Bush inner circle over who should lead the OLC, there is no official chief of the OLC until November 2002, leaving Yoo and his fellows free to be as aggressive as they like on expanding presidential power and handling the war on terrorism. When the OLC chief, law professor Jay Bybee, finally arrives, he, like Ashcroft and Gonzales, finds himself hampered by his lack of knowledge of the law as it pertains to national security. Savage will later write, “When he finally started work, Bybee let deputies continue to spearhead the review of matters related to the war on terrorism.” Yoo is only a deputy assistant attorney general, but he has “signing power”—the ability to make his opinion legally binding—and is rarely reviewed by his peers because much of his work is classified. [Savage, 2007, pp. 76-78] As for Addington, Lawrence Wilkerson, the chief of staff for Secretary of State Colin Powell, will later say that he was the leader of the small but highly influential group of lawyers “who had these incredible theories and would stand behind their principles [Cheney, Bush, and others], whispering in their ears about these theories, telling them they have these powers, that the Constitution backs these powers, that these powers are ‘inherent’ and blessed by God and if they are not exercised, the nation will fall. He’d never crack a smile. His intensity and emotions and passion for these theories are extraordinary.” [Savage, 2007, pp. 84]

Entity Tags: US Department of State, Lawrence Wilkerson, Alberto R. Gonzales, Bush administration (43), Charlie Savage, David S. Addington, Jay S. Bybee, Richard (“Dick”) Cheney, John C. Yoo, John Ashcroft

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Government Acting in Secret

Congress explicitly refuses to grant the Bush administration the authority to conduct warrantless wiretaps and surveillance operations against US citizens in its resolution authorizing the use of military force (AUMF) against terrorists (see September 14-18, 2001). Tom Daschle (D-SD), the Senate Majority Leader, will write in December 2005 (after his ouster from Congress in November 2004) that the White House and the Justice Department will claim, falsely, that the AUMF grants the right for the NSA to conduct such a program (see Early 2002 and December 15, 2005). Instead, Daschle will write, the NSA merely usurps the authority, with the president’s approval, to conduct such an extralegal surveillance program (see December 21-22, 2005). [Washington Post, 12/22/2005]
Administration Efforts to Rewrite AUMF - In an op-ed for the Washington Post, Daschle will observe that the AUMF authorizes Bush “to use all necessary and appropriate force against those nations, organizations or persons” who “planned, authorized, committed or aided” the 9/11 attacks. But, Daschle will write, “Literally minutes before the Senate cast its vote, the administration sought to add the words ‘in the United States and’ after ‘appropriate force’ in the agreed-upon text. This last-minute change would have given the president broad authority to exercise expansive powers not just overseas—where we all understood he wanted authority to act—but right here in the United States, potentially against American citizens. I could see no justification for Congress to accede to this extraordinary request for additional authority. I refused.”
No Vote for Domestic Surveillance - Daschle will also write that the White House attempted to add draft language to the AUMF resolution that would give the administration new and sweeping authority to use force to “deter and pre-empt any future acts of terrorism or aggression against the United States,” even against nations and organizations not responsible for the 9/11 attacks. Bush officials such as Vice President Dick Cheney will claim that the AUMF “granted authority by the Congress to use all means necessary to take on the terrorists, and that’s what we’ve done.” But Daschle will write that Cheney is mistaken. “As Senate majority leader at the time, I helped negotiate that law with the White House counsel’s office over two harried days. I can state categorically that the subject of warrantless wiretaps of American citizens never came up. I did not and never would have supported giving authority to the president for such wiretaps. I am also confident that the 98 senators who voted in favor of authorization of force against al-Qaeda did not believe that they were also voting for warrantless domestic surveillance.” On September 12, six days before the September 18 AUMF vote, Bush officials demand that Congress authorize the use of military force to, in their words, “deter and pre-empt any future acts of terrorism or aggression against the United States.” But Congress refuses, feeling that the request is “too broad and ill defined.” Instead, on September 14, Congress choses to use language that authorizes Bush to use “all necessary and appropriate force against those nations, organizations or persons [the president] determines planned, authorized, committed or aided” the 9/11 attacks. Daschle later writes, “With this language, Congress denied the president the more expansive authority he sought and insisted that his authority be used specifically against Osama bin Laden and al-Qaeda.… The shock and rage we all felt in the hours after the attack were still fresh. America was reeling from the first attack on our soil since Pearl Harbor. We suspected thousands had been killed, and many who worked in the World Trade Center and the Pentagon were not yet accounted for. Even so, a strong bipartisan majority could not agree to the administration’s request for an unprecedented grant of authority.” Instead, Daschle will write, the administration simply takes the authority anyway, and will argue in hindsight that the AUMF actually gives the administration the right to wiretap US citizens. However, Daschle will write, “at the time, the administration clearly felt they [didn’t have the authority] or it wouldn’t have tried to insert the additional language.”
Breeding 'Fear and Suspicion' - He concludes, “[T]here are right and wrong ways to defeat terrorists, and that is a distinction this administration has never seemed to accept. Instead of employing tactics that preserve Americans’ freedoms and inspire the faith and confidence of the American people, the White House seems to have chosen methods that can only breed fear and suspicion. If the stories in the media over the past week are accurate [detailing the breadth and apparent illegality of the NSA program], the president has exercised authority that I do not believe is granted to him in the Constitution, and that I know is not granted to him in the law that I helped negotiate with his counsel and that Congress approved in the days after Sept. 11. For that reason, the president should explain the specific legal justification for his authorization of these actions, Congress should fully investigate these actions and the president’s justification for them, and the administration should cooperate fully with that investigation. In the meantime, if the president believes the current legal architecture of our country is insufficient for the fight against terrorism, he should propose changes to our laws in the light of day. That is how a great democracy operates. And that is how this great democracy will defeat terrorism.” [Washington Post, 12/23/2005]

Entity Tags: National Security Agency, Al-Qaeda, Bush administration (43), Washington Post, Tom Daschle, US Department of Justice, Osama bin Laden, Authorization to Use Military Force (AUMF), Richard (“Dick”) Cheney

Category Tags: Other Legal Changes, Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

Shortly after the 9/11 attacks, the NSA expands surveillance operations, relying on its own authorities; some sources indicate this includes a massive domestic data mining and call tracking program, and some contend that it is illegal. In a 2006 public briefing, NSA Director Michael Hayden will say, “In the days after 9/11, NSA was using its authorities and its judgment to appropriately respond to the most catastrophic attack on the homeland in the history of the nation.” Following an October 1 briefing by Hayden to the House Intelligence Committee, Representative Nancy Pelosi (D-CA) will write to Hayden on October 11, saying, “[Y]ou indicated that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance” (see October 11, 2001). Some evidence indicates NSA domestic surveillance began even before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Nancy Pelosi, 1/6/2006; Michael Hayden, 1/23/2006]
No Connection to Bush-Authorized Warrantless Domestic Call Monitoring - In his 2006 remarks, Hayden will clearly distinguish between the expansion he initiates under his own authorities, and the warrantless monitoring of calls with one end outside the US authorized later by President Bush (see October 4, 2001), saying, “[E]xcept that they involved NSA, these [Hayden-authorized] programs were not related… to the authorization that the president has recently spoken about.” [Michael Hayden, 1/23/2006]
'Stellar Wind' Is Name of Hayden-Authorized Program - In 2012 interviews, former NSA official William Binney will indicate that “Stellar Wind” is the name of the surveillance program initiated by Hayden. [Wired News, 2/15/2012; Democracy Now!, 4/20/2012] Some sources will refer to the Bush-authorized eavesdropping as being part of the Stellar Wind program. [Newsweek, 12/22/2008]
Differing Views on Authority for Surveillance - In his 2006 briefing, Hayden will say the Fourth Amendment only protects Americans against “unreasonable search and seizure,” and that 9/11 changed what was to be considered “reasonable.” Specifically, if communications are believed to have “[i]nherent foreign intelligence value,” interception of these communications is reasonable. In addition to referring to Hayden’s “view of [his] authorities” as “expansive,” Pelosi’s letter will give another indication that the NSA’s new standard is significantly broader than it was previously, stating, “You indicated that you were treating as a matter of first impression, [redacted] being of foreign intelligence interest.” Hayden will publicly clarify in 2006 that the authority for the NSA’s operational expansion exists under an Executive Order issued by President Reagan, saying, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” And, he will say, “I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities” (see October 1, 2001). In her October 11 letter, Pelosi will also write of having concerns about the program that haven’t been resolved due to restrictions on information-sharing with Congress imposed by Bush (see October 11, 2001). Binney, who pioneered the development of certain NSA data mining and surveillance technologies, will come to believe that what the NSA is doing is unconstitutional; he will first take his concerns to Congress (see Before October 31, 2001) and then resign on October 31 (see October 31, 2001). [Nancy Pelosi, 1/6/2006; Michael Hayden, 1/23/2006]
Surveillance Involves Domestic Communications - In his 2006 remarks, Hayden will not say the NSA is only targeting foreign communications under his post-9/11 authorization. Rather, the context of his remarks will indicate he is referring to domestic communications. More specifically, Hayden will state: “If the US person information isn’t relevant, the data is suppressed. It’s a technical term we use; we call it ‘minimized.’ The individual is not even mentioned. Or if he or she is, he or she is referred to as ‘US Person Number One’ or ‘US Person Number Two.’ Now, inherent intelligence value. If the US person is actually the named terrorist, well, that could be a different matter.” Hayden will also reveal that information is being passed to the FBI, an investigative agency with a primarily domestic jurisdiction, saying, “[A]s another part of our adjustment, we also turned on the spigot of NSA reporting to FBI in, frankly, an unprecedented way.” [Michael Hayden, 1/23/2006] One of Pelosi’s statements in her letter to Hayden may indicate an aspect of the domestic component: “You indicated that you were treating as a matter of first impression, [redacted] being of foreign intelligence interest,” she will write. [Nancy Pelosi, 1/6/2006] In a 2011 interview with Jane Mayer published in the New Yorker, Binney will say the NSA was obtaining “billing records on US citizens” and “putting pen registers [call logs] on everyone in the country.” [New Yorker, 5/23/2011] And in a 2012 Wired article, NSA expert James Bamford will write that Binney “explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore. If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law. Instead it chose to put the wiretapping rooms at key junction points throughout the country—large, windowless buildings known as switches—thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US.” Binney’s account is supported by other sources (see October 2001). [Wired News, 2/15/2012]
Surveillance Program Is Massive - Bamford, citing Binney, will write: “Stellar Wind… included not just eavesdropping on domestic phone calls but the inspection of domestic email. At the outset the program recorded 320 million calls a day, he says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” It is unclear exactly when this level of surveillance began. According to whistleblower AT&T employee Mark Klein, construction of secret rooms splitting communications traffic does not begin until Fall 2002 (see Fall 2002). Bamford will write that Binney says, “[T]he taps in the secret rooms dotting the country are actually powered by highly sophisticated software programs that conduct ‘deep packet inspection,’ examining Internet traffic as it passes through the 10-gigabit-per-second cables at the speed of light.” [Wired News, 2/15/2012] Also, Binney’s remark to Jane Mayer that the NSA was “putting pen registers on everyone in the country” indicates the broad scope of the program. [New Yorker, 5/23/2011]

Entity Tags: Religious Society of Friends (Quakers), US Department of Justice, National Security Agency, George W. Bush, Michael Hayden, Al-Qaeda, Foreign Intelligence Surveillance Court, House Intelligence Committee, Nancy Pelosi, Ronald Reagan

Category Tags: Impositions on Rights and Freedoms, Privacy, Government Acting in Secret, Government Classification, Database Programs, NSA Wiretapping / Stellar Wind

An illustration of the NIMD dataflow.An illustration of the NIMD dataflow. [Source: LibertyThink.com] (click image to enlarge)Shortly after the 9/11 attacks, the NSA awards $64 million in research contracts for a program called Novel Intelligence from Massive Data (NIMD). [New York Times, 5/21/2003; National Journal, 1/20/2006] NIMD is one of several cutting-edge data mining technologies that not only has the capability of finding keywords among millions of electronically monitored communications, but can find hidden relationships among data points, and even critique the thinking and biases of a particular analyst and suggest alternative hypotheses differing from the human analysts’ conclusion. Like other data-mining technologies, the NSA will steadfastly refuse to discuss whether NIMD is used to analyze data from domestic surveillance operations. NIMD is designed as an preliminary sort program, to keep human analysts from becoming overwhelmed by raw data. In essence, NIMD is an early-warning system. “NIMD funds research to…help analysts deal with information-overload, detect early indicators of strategic surprise, and avoid analytic errors,” according to the “Call for 2005 Challenge Workshop Proposals” released by the Advanced Research and Development Activity (ARDA). ARDA was founded in 1998 to create, design, and field new technologies for US intelligence agencies, particularly the NSA. A selected few Congressional lawmakers (see January 18, 2006) were informed that the warrantless surveillance program authorized by President George W. Bush (see Early 2002) was designed to be an early-warning system for possible terrorist attacks or plans. Assistant Attorney General William Moschella will inform the top Democrats and Republicans on the House and Senate Intelligence committees in December 2002 that the “president determined that it was necessary following September 11 to create an early-warning detection system” to prevent more attacks. He will justify the use of programs such as NIMD by claiming, as NSA director Michael Hayden and other administration officials have repeatedly claimed, that the Foreign Intelligence Surveillance Act (FISA), which allows the government to obtain warrants to conduct domestic eavesdropping or wiretapping, “could not have provided the speed and agility required for the early-warning detection system.” Many experts outside of the Bush administration feel that NIMD and other programs do not have to operate outside of the Foreign Intelligence Surveillance Act (FISA) because of limitations in the law, but because of the fact that the programs cannot meet the law’s minimum requirements for surveillance. FISA requires that any such surveillance must have a probable cause that the target is a terrorist. NIMD has no such threshold. Steven Aftergood, an expert on intelligence and government secrecy with the Federation of American Scientists, will say in 2006, “Logistically speaking, the early-warning approach may involve a significant increase in the number of surveillance actions. It may be that neither the Justice Department nor the [Foreign Intelligence Surveillance Court, which approves wiretapping warrants] is prepared to prepare and process several thousand additional FISA applications per year, beyond the 1,700 or so approved in 2004.” [National Journal, 1/20/2006] Some experts will later express the opinion that NIMD is the controversial Total Information Awareness program in a slightly different form (see February 2003 and September 2002).

NSA director Michael Hayden addresses the NSA in a global videoconference, saying that the NSA, like other government agencies, will have to do more to protect the country from further terrorist attacks. The challenge, he says, is to balance Americans’ security with civil liberties, “to keep America free by making Americans feel safe again.” Hayden will say in a 2006 speech reflecting on that videoconference (see January 23, 2006) that US citizens operate under misconceptions about the NSA’s capabilities—that while citizens believe the NSA has a global electronic surveillance network that can, and does, spy on citizens willy-nilly, in reality the NSA is understaffed and unprepared to handle the technological advances of the last decade. Hayden will say that with more extensive domestic surveillance of US citizens and foreign visitors, the NSA could have caught some of the 9/11 hijackers before they were able to put their plan into motion. The standards by which US citizens and foreign visitors are monitored must change, Hayden believes.
Expansion of NSA Surveillance Powers - Using Ronald Reagan’s 1981 executive order 12333 (see December 4, 1981), Hayden expands the NSA’s domestic surveillance practices to eavesdrop, sometimes without court approval, on selected international calls made by US citizens. Though Hayden’s expansion of NSA surveillance is not directly authorized by President Bush, and is not the same program as authorized by Bush’s secret executive order of 2002 (see Early 2002), Hayden will later say that this expansion is based on the intelligence community’s assessment “of a serious and continuing threat to the homeland.” Hayden’s program is reviewed and approved by lawyers at the NSA, the Justice Department, and the White House, as well as Attorney General John Ashcroft. [Michael Hayden, 1/23/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, US Department of Justice, National Security Agency, John Ashcroft, George W. Bush, Bush administration (43), Ronald Reagan, Michael Hayden

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

A self-styled White House “war council” begins meeting shortly after the 9/11 attacks, to discuss the administration’s response to the attacks and the methods it will use (see (After 10:00 a.m.) September 11, 2001). The ad hoc group is composed of White House counsel Alberto Gonzales, Justice Department lawyer John Yoo, Pentagon chief counsel William J. Haynes, and the chief aide to Vice President Dick Cheney, David Addington. According to Jack Goldsmith, who will become head of the Justice Department’s Office of Legal Counsel (OLC) in 2003 (see October 6, 2003), the four believe that the administration’s biggest obstacle to responding properly to the 9/11 attacks is the body of domestic and international law that arose in the 1970s to constrain the president’s powers after the criminal excesses of Richard Nixon’s White House. Chief among these restraints is the Foreign Intelligence Surveillance Act (FISA) of 1978 (see 1978). Though Addington tends to dominate the meetings with his imposing physical presence and aggressive personality, Yoo is particularly useful to the group; the head of the OLC, Jay Bybee (whom Goldsmith will replace) has little experience with national security issues, and delegates much of the responsibility for that subject to Yoo, even giving him the authority to draft opinions that are binding on the entire executive branch. Yoo agrees wholeheartedly with Addington, Gonzales, and Cheney about the need for vastly broadened presidential powers. According to Goldsmith, Yoo is seen as a “godsend” for the White House because he is eager to draft legal opinions that would protect Bush and his senior officials from any possible war crimes charges. However, Yoo’s direct access to Gonzales angers Attorney General John Ashcroft, who feels that the “war council” is usurping legal and policy decision-making powers that are legally his own. [New York Times Magazine, 9/9/2007] In 2009, Goldsmith will say, “[I]it was almost as if they [Cheney and Addington] were interested in expanding executive power for its own sake.” [Vanity Fair, 2/2009]

Entity Tags: Richard (“Dick”) Cheney, William J. Haynes, Richard M. Nixon, Office of Legal Counsel (DOJ), Jay S. Bybee, Jack Goldsmith, John C. Yoo, Bush administration (43), Foreign Intelligence Surveillance Act, Alberto R. Gonzales, David S. Addington

Category Tags: Impositions on Rights and Freedoms, Government Acting in Secret, Other Surveillance

In a television interview, Vice President Cheney is asked how the US will respond to the 9/11 attacks. He first replies that there will be a military response. But he adds an oblique comment indicating the secrecy in which he and the administration intend to operate after the 9/11 attacks: “We also have to work, though, sort of the dark side, if you will. We’ve got to spend time in the shadows in the intelligence world. A lot of what needs to be done here will have to be done quietly, without any discussion, using sources and methods that are available to our intelligence agencies, if we’re going to be successful. That’s the world these folks operate in, and so it’s going to be vital for us to use any means at our disposal, basically, to achieve our objective.” [Meet the Press, 9/16/2001; Unger, 2007, pp. 221] In 2006, former CIA official Gary Schroen will be asked about Cheney’s comment, and he replies: “My impression at the time was that the administration was trying to send a message, and certainly CIA leadership was trying to send a message, that the gloves were off. I think what [Cheney] was probably saying was, we’re going to do things like assassination operations; we were going to go into places and not try to capture these guys, but just kill them, and that… there would be a lot of people who would object to those kind of tactics.” [PBS Frontline, 1/20/2006] In 2007, author and reporter Charlie Savage will write, “Many interpreted Cheney’s vague remarks to have been a reference to brutal interrogation techniques.” [Savage, 2007, pp. 154]

Entity Tags: Charlie Savage, Gary C. Schroen, Richard (“Dick”) Cheney

Timeline Tags: Torture of US Captives, Complete 911 Timeline

Category Tags: Impositions on Rights and Freedoms, Government Acting in Secret, Gov't Violations of Prisoner Rights

The Justice Department publishes an interim regulation allowing non-citizens suspected of terrorism to be detained without charge for 48 hours or “an additional reasonable period of time” in the event of an “emergency or other extraordinary circumstance.” [New York Times, 9/19/2001] The new rule is used to hold hundreds indefinitely until the Patriot Act passes in October (see October 26, 2001), providing more solid grounds to hold non-citizens without charge.

Entity Tags: US Department of Justice

Category Tags: Detainments in US, Gov't Violations of Prisoner Rights, Citizenship Rights


Tom Ridge.
Tom Ridge. [Source: US State Department]President Bush announces the new cabinet-level Office of Homeland Security, to be led by Pennsylvania Governor Tom Ridge. [Associated Press, 8/19/2002] Accepting the post, Ridge says, “Liberty is the most precious gift we offer our citizens.” Responding to this comment, the Village Voice opines, “Could Tom Ridge have said anything scarier or more telling as he accepted the post of homeland security czar? Trying to strike the bell of liberty, he sounds its death knell, depicting government not as the agent of the people’s will, but as an imperious power with the authority to give us our democratic freedoms. Which means, of course, that it can also take them away.” [Village Voice, 9/11/2002] In November 2002, Ridge will become secretary of a new Homeland Security Department (see November 25, 2002).

Entity Tags: US Department of Homeland Security, Tom Ridge, George W. Bush

Timeline Tags: Complete 911 Timeline

Category Tags: Other Legal Changes, Impositions on Rights and Freedoms

In a memo, responding to a request from Deputy White House Counsel Timothy E. Flanigan, Justice Department lawyer John C. Yoo provides legal advice on “the legality of the use of military force to prevent or deter terrorist activity inside the United States.” He addresses the question of how the Fourth Amendment to the US Constitution applies to the use of “deadly force” by the military “in a manner that endangered the lives of United States citizens.” The Fourth Amendment requires the government to have some objective suspicion of criminal activity before it can infringe on an individual’s liberties, such as the right to privacy or the freedom of movement. Yoo writes that in light of highly destructive terrorist attacks, “the government may be justified in taking measures which in less troubled conditions could be seen as infringements of individual liberties.” If the president determines the threat of terrorism high enough to deploy the military inside US territory, then, Yoo writes, “we think that the Fourth Amendment should be no more relevant than it would be in cases of invasion or insurrection.” [New York Times, 10/24/2004] A month later, the Justice Department will issue a similar memo (see October 23, 2001).

Entity Tags: John C. Yoo, Timothy E. Flanigan, US Department of Justice

Timeline Tags: Torture of US Captives

Category Tags: Impositions on Rights and Freedoms, Gov't Violations of Prisoner Rights

Michael Creppy, the chief US immigration judge—actually an executive branch official in the Justice Department, the title of “judge” notwithstanding—orders that all deportation hearings be closed to the public, the press, and even family members. Creppy also prohibits immigration court administrators from listing the detainees’ names or cases on public dockets. The reason is not because there is reason to believe any particular detainee is a suspected terrorist. Instead, the administration asserts, national security demands blanket secrecy because terrorist cells might read about the deportation hearings in the press, piece together bits and pieces of information, and in doing so deduce valuable information about the government’s investigation into the 9/11 attacks and terrorism in general. In 2007, author Charlie Savage will write: “Thus, the public would just have to trust that the government had arrested and deported the right people, even though their names were kept a secret and the decision to expel them from the country was made behind closed doors. By invoking the chance that the enemy might detect a pattern in otherwise harmless information, the government would be justified in withholding everything. The implication of its theory was that the public had no right to know anything, no matter how innocuous, because any tidbit of trivial information could potentially be stitched together with other minor bits of information to conceivably provide some useful insight for terrorists.” In separate proceedings, the Detroit Free Press and several New Jersey media organizations will challenge the Justice Department’s decision in court (see August 26, 2002 and October 2, 2002). [Savage, 2007, pp. 94]

Entity Tags: Charlie Savage, US Department of Justice, Michael Creppy

Category Tags: Impositions on Rights and Freedoms, Court Procedures and Verdicts, Detainments in US, Government Acting in Secret

Less than two weeks after 9/11, White House counsel Alberto Gonzales sets up an interagency group to design a strategy for prosecuting terrorists, and specifically asks it to suggest military commissions as one viable option for prosecution of suspected terrorists.
Membership - The initial participants include Gonzales; White House lawyer Timothy Flanigan; Pentagon general counsel William Haynes; the vice president’s chief counsel, David Addington; National Security Council lawyer John Bellinger; and State Department lawyer Pierre-Richard Prosper, a former career prosecutor who now serves as State’s ambassador at large for war crimes issues and who will head the group.
Various Options - The group spends a month in a windowless conference room at State, bringing in experts from around the government, including military lawyers and Justice Department lawyers. The Justice Department advocates regular trials in civilian courts, such as the trials of the 1993 World Trade Center bombers (see February 26, 1993). However, many in the group object, noting that terrorist trials in regular courthouses on US soil pose security risks. The military lawyers propose courts-martial, which can take place anywhere in the world and would have military protection. A third option, military commissions, would offer the security of courts-martial without the established rules of evidence and procedure courts-martial have; setting up such a system might offer more flexibility in trying suspected terrorists, but many in the group wonder if President Bush would require Congressional authorization. Prosper will later recall, “We were going to go after the people responsible for the attacks, and the operating assumption was that we would capture a significant number of al-Qaeda operatives.” In addition to the use of military commissions, the group begins to work out three other options: ordinary criminal trials, military courts-martial, and tribunals with a mixed membership of civilians and military personnel. The option of a criminal trial by an ordinary federal court is quickly brushed aside for logistical reasons, according to Prosper. “The towers were still smoking, literally. I remember asking: Can the federal courts in New York handle this? It wasn’t a legal question so much as it was logistical. You had 300 al-Qaeda members, potentially. And did we want to put the judges and juries in harm’s way?” Despite the interagency group’s willingness to study the option of military commissions, lawyers at the White House, according to reporter Tim Golden, grow impatient with the group. Some of its members are seen to have “cold feet.” [New York Times, 10/24/2004; Savage, 2007, pp. 135]
Parallel Process at White House - Unbeknownst to Prosper’s group, the White House is crafting its own version of military commissions or tribunals (see Late October 2001). When President Bush issues his executive order creating military tribunals (see November 13, 2001), Prosper and his group will first learn about it by watching the nightly news. [Savage, 2007, pp. 138]

Entity Tags: US Department of Justice, US Department of State, William J. Haynes, Timothy E. Flanigan, Pierre-Richard Prosper, John Bellinger, Beth Nolan, Alberto R. Gonzales, Scott McClellan, Jay S. Bybee, John Ashcroft, David S. Addington

Timeline Tags: Torture of US Captives

Category Tags: Impositions on Rights and Freedoms, Court Procedures and Verdicts, Expansion of Presidential Power, Gov't Violations of Prisoner Rights

John Yoo, a deputy assistant attorney general in the Department of Justice (DOJ) Office of Legal Counsel (OLC), issues a legal opinion that says the US can conduct electronic surveillance against its citizens without probable cause or warrants. According to the memo, the opinion was drafted in response to questions about whether it would be constitutional to amend the Foreign Intelligence Surveillance Act (FISA) to state that searches may be approved when foreign intelligence collection is “a purpose” of the search, rather than “the purpose.” Yoo finds this would be constitutional, but goes further. He asserts that FISA is potentially in conflict with the Constitution, stating, “FISA itself is not required by the Constitution, nor is it necessarily the case that its current standards match exactly to Fourth Amendment standards.” Citing Vernonia School Dist. 47J v. Acton, in which the Supreme Court found that warrantless searches of students were permissible, Yoo argues that “reasonableness” and “special needs” are also the standards according to which warrantless monitoring of the private communications of US persons is permissible. According to Yoo, the Fourth Amendment requirement for probable cause and warrants prior to conducting a search pertain primarily to criminal investigations, and in any case cannot be construed to restrict presidential responsibility and authority concerning national security. Yoo further argues that in the context of the post-9/11 world, with the threat posed by terrorism and the military nature of the fight against terrorism, warrantless monitoring of communications is reasonable. Some information indicates the NSA began a broad program involving domestic surveillance prior to the 9/11 attacks, which contradicts the claim that the program began after, and in response to, the attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [US Department of Justice, 9/25/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Inspectors General, 7/10/2009]
Yoo Memo Used to Support Legality of Warrantless Surveillance - Yoo’s memo will be cited to justify the legality of the warrantless domestic surveillance program authorized by President Bush in October 2001 (see October 4, 2001). NSA Director General Michael Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general.” The various post-9/11 NSA surveillance activities authorized by Bush will come to be referred to as the President’s Surveillance Program (PSP), and the first memo directly supporting the program’s legality will be issued by Yoo on November 2, 2001, after the program has been initiated (see November 2, 2001). Many constitutional authorities will reject Yoo’s legal rationale. [Michael Hayden, 1/23/2006]
Yoo Memo Kept Secret from Bush Officials Who Might Object - According to a report by Barton Gellman and Jo Becker in the Washington Post, the memo’s “authors kept it secret from officials who were likely to object,” including ranking White House national security counsel John Bellinger, who reports to National Security Adviser Condoleezza Rice. Bellinger’s deputy, Bryan Cunningham, will tell the Post that Bellinger would have recommended having the program vetted by the Foreign Intelligence Surveillance Court, which oversees surveillance under FISA. Gellman and Becker quote a “senior government lawyer” as saying that Vice President Dick Cheney’s attorney, David Addington, had “open contempt” for Bellinger, and write that “more than once he accused Bellinger, to his face, of selling out presidential authority for good ‘public relations’ or bureaucratic consensus.” [Washington Post, 6/24/2007]

Entity Tags: US Department of Justice, John Bellinger, National Security Agency, Bryan Cunningham, Condoleezza Rice, David S. Addington, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Office of Legal Counsel (DOJ), John C. Yoo, George W. Bush, Richard (“Dick”) Cheney

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind, Other Surveillance

Bill Maher.Bill Maher. [Source: HBO publicity photo]White House Press Secretary Ari Fleischer warns, “There are reminders to all Americans that they need to watch what they say, watch what they do.” [Associated Press, 9/26/2001] Fleischer was responding to comments made by Bill Maher, the host of the discussion/comedy show Politically Incorrect. Maher said the hijackers were not cowards but that it was cowardly for the US to launch cruise missiles on targets thousands of miles away. [New York Times, 9/28/2001] Many advertisers and affiliate stations pull their support of the show in response. [Washington Post, 9/29/2001] ABC cancels Maher’s show at the end of its season because of the controversy. [Toronto Star, 6/26/2002] Several journalists are fired around the same time for criticizing Bush. Fleischer’s comments and the general chill on free speech are widely criticized by major newspapers (for instance, [New York Times, 9/29/2001; Washington Post, 9/29/2001; Dallas Morning News, 10/4/2001] ).

Entity Tags: Bill Maher, Ari Fleischer

Category Tags: Freedom of Speech / Religion, Media Involvement and Responses

Bradford Berenson.Bradford Berenson. [Source: PBS]In the weeks following 9/11, government lawyers begin to formulate a legal response to the newly perceived threat of terrorism. Four related issues are at hand: forceful prevention, detention, prosecution, and interrogation. What degree of force can the government employ to prevent acts of terrorism or apprehend suspected terrorists? How and where can it best detain terrorists if captured? How can it best bring them to trial? And how can it best obtain information from them on terrorist organizations and plots? These questions are handled in a new atmosphere that is more tolerant towards flexible interpretations of the law. Bradford Berenson, an associate White House counsel at this time, later recalls: “Legally, the watchword became ‘forward-leaning’ by which everybody meant: ‘We want to be aggressive. We want to take risks.’” [New York Times, 10/24/2004] This attitude is seemingly in line with the president’s thinking. Counterterrorism “tsar” Richard Clarke will later recall President Bush saying, “I don’t care what the international lawyers say. We are going to kick some ass” (see (9:00 p.m.-10:00 p.m.) September 11, 2001). [Clarke, 2004, pp. 23-24] At the center of legal reconstruction work are Alberto R. Gonzales, the White House counsel, his deputy Timothy E. Flanigan, and David S. Addington, legal counsel to Vice President Cheney. [New York Times, 12/19/2004] They will find a helpful hand in the Justice Department’s Office of Legal Counsel (OLC), most notably its head, Assistant Attorney General Jay S. Bybee [Los Angeles Times, 6/10/2004] and his deputies John C. Yoo [New York Times, 8/15/2004] and Patrick F. Philbin. Most of the top government lawyers dwell in fairly conservative circles, with many being a member of the Federalist Society, a conservative legal fraternity. Some have clerked for conservative Supreme Court Justices Antonin Scalia and Clarence Thomas, whose ruling effectively lead to the presidency being awarded to George W. Bush after the 2000 presidential election. [New York Times, 10/24/2004] Others worked for Judge Lawrence H. Silberman, who set up secret contacts with the Iranian government under President Reagan leading to the Iran-Contra scandal, and who advised on pursuing allegations of sexual misconduct by President Clinton. [Inter Press Service, 2/6/2004]

Entity Tags: Patrick F. Philbin, Richard A. Clarke, John C. Yoo, Joan Claybrook, Alberto R. Gonzales, Bradford Berenson, Jay S. Bybee, Alan M. Dershowitz, Rena Steinzor

Timeline Tags: Torture of US Captives

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Gov't Violations of Prisoner Rights

According to author Ronald Kessler’s November 2007 book The Terrorist Watch, the NSA’s domestic surveillance program begins around two weeks after the 9/11 attacks, when President Bush meets with NSA director Michael Hayden and other NSA officials in the Oval Office. According to chief of staff Andrew Card, in attendance, Bush asks, “What tools do we need to fight the war on terror?” Hayden suggests revamping NSA guidelines to allow the agency to wiretap domestic phone calls and intercept e-mails to and from terror suspects if one end of the communication is overseas. Kessler gives the following rather lurid example: “Thus, if [Osama] bin Laden were calling the US to order the detonation of a nuclear device, and the person he called began making overseas calls, NSA could listen in to those calls as well as to bin Laden’s original call.” Kessler is a chief correspondent for the extremist conservative Web site NewsMax; his assertion is disputed by evidence suggesting that the domestic surveillance program began well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Kessler, 2007, pp. 130]

Entity Tags: National Security Agency, Andrew Card, Michael Hayden, Ronald Kessler, George W. Bush

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, NSA Wiretapping / Stellar Wind

Former AT&T employee Mark Klein.Former AT&T employee Mark Klein. [Source: PBS]The National Security Agency, as part of its huge, covert, and possibly illegal wiretapping program directed at US citizens (see Spring 2001 and After September 11, 2001), begins collecting telephone records of tens of millions of Americans, using data provided by telecommunications firms such as AT&T, Verizon, and BellSouth (see February 5, 2006). The media will not report on this database until May 2006 (see May 11, 2006). The program collects information on US citizens not suspected of any crime or any terrorist connections. Although informed sources say the NSA is not listening to or recording actual conversations, the agency is using the data to analyze calling patterns in an effort to detect terrorist activity. “It’s the largest database ever assembled in the world,” says one anonymous source. The NSA intends “to create a database of every call ever made.” As a result, the NSA has detailed records of the phone activities of tens of millions of US citizens, from local calls to family and friends to international calls. The three telecommunications companies are working with the NSA in part under the Communications Assistance Act for Law Enforcement (CALEA) (see January 1, 1995 and June 13, 2006) and in part under contract to the agency.
Surveillance Much More Extensive Than Acknowledged - The wiretapping program, which features electronic surveillance of US citizens without court warrants or judicial oversight, is far more extensive than anything the White House or the NSA has ever publicly acknowledged. President Bush will repeatedly insist that the NSA focuses exclusively on monitoring international calls where one of the call participants is a known terrorist suspect or has a connection to terrorist groups (see December 17, 2005 and May 11, 2006), and he and other officials always insist that domestic calls are not monitored. This will be proven false. The NSA has become expert at “data mining,” sifting through reams of information in search of patterns. The warrantless wiretapping database is one source of information for the NSA’s data mining. As long as the NSA does not collect “personal identifiers”—names, Social Security numbers, street addresses, and the like—such data mining is legal. But the actual efficacy of the wiretapping program in learning about terrorists and possibly preventing terrorist attacks is unclear at best. And many wonder if the NSA is not repeating its activities from the 1950s and 1960s, when it conducted “Operation Shamrock” (see 1945-1975), a 20-year program of warrantless wiretaps of international phone calls at the behest of the CIA and other intelligence agencies. Operation Shamrock, among other things, led to the 1978 passage of the Foreign Intelligence Surveillance Act (see 1978). [USA Today, 5/11/2006] In May 2006, former NSA director Bobby Ray Inman will say, “[T]his activity is not authorized” (see May 12, 2006). [Democracy Now!, 5/12/2006]
Secret Data Mining Center - In May 2006, retired AT&T technician Mark Klein, a 22-year veteran of the firm, will file a court affidavit saying that he saw the firm construct a secret data-mining center in its San Francisco switching center that would let the NSA monitor domestic and international communications (see January 2003). And former AT&T workers say that, as early as 2002, AT&T has maintained a secret area in its Bridgeton, Missouri, facility that is likely being used for NSA surveillance (see Late 2002-Early 2003).
Domestic Surveillance Possibly Began Before 9/11 - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, Verizon Communications, Mark Klein, George W. Bush, AT&T, BellSouth, Central Intelligence Agency, Communications Assistance for Law Enforcement Act (CALEA), Foreign Intelligence Surveillance Act, Qwest, National Security Agency

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

NSA Director Michael Hayden briefs the House Intelligence Committee on the NSA’s efforts to combat terrorism. Though the NSA is already working on a domestic wiretapping program to spy, without warrants, on US citizens (see Early 2002), Hayden does not mention the program to the committee members, but merely discusses the ramifications of President Reagan’s Executive Order 12333 (see December 4, 1981 and September 13, 2001) on NSA functions. He does not mention that Reagan’s executive order forbids warrantless surveillance of US citizens “unless the Attorney General has determined in each case that there is probable cause to believe that the technique is directed against a foreign power or an agent of a foreign power.” On October 11, committee member Nancy Pelosi (D-CA) will write to Hayden expressing her concerns about the warrantless nature of the NSA wiretaps (see October 11, 2001). [Washington Post, 1/4/2006]

Entity Tags: National Security Agency, House Intelligence Committee, Michael Hayden, Nancy Pelosi, Terrorist Surveillance Program, Ronald Reagan

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

The Justice Department’s John Yoo, an official in the Office of Legal Counsel (OLC), issues a secret opinion regarding legal statutes governing the use of certain interrogation techniques. The opinion will not be made public; its existence will not be revealed until October 18, 2007, when future OLC head Steven Bradbury will note its existence as part of an American Civil Liberties Union (ACLU) lawsuit. [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: US Department of Justice, American Civil Liberties Union, John C. Yoo, Office of Legal Counsel (DOJ), Steven Bradbury

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

President Bush issues a directive authorizing the National Security Agency (NSA) to operate a warrantless domestic surveillance program. Author/journalist Jane Mayer will report in 2011, “[O]n October 4, 2001, Bush authorized the policy, and it became operational by October 6th,” and, “[t]he new policy, which lawyers in the Justice Department justified by citing President Bush’s executive authority as commander in chief, contravened a century of constitutional case law.” Mayer will interview NSA whistleblower Thomas Drake for her article and quote him as saying that, following the October 4 directive, “strange things were happening. Equipment was being moved. People were coming to me and saying, ‘We’re now targeting our own country!’” Bush’s directive is based on a legal opinion drafted by Department of Justice Office of Legal Counsel Deputy Attorney General John Yoo (see September 25, 2001). [New Yorker, 5/23/2011]
Conflicting Information regarding Date of First Authorization - The existence of the NSA’s domestic surveillance program will first be made public in December 2005, following reporting by the New York Times that will cite “[n]early a dozen current and former officials” (see December 15, 2005). The Times article will state that in 2002, “[m]onths after the Sept. 11 attacks,” Bush signed an executive order authorizing the NSA to monitor domestic phone calls, including those of US citizens and permanent residents, if one end of the call was outside the country. The Times article also mentions an NSA “‘special collection program’ [that] began soon after the Sept. 11 attacks, as it looked for new tools to attack terrorism.” The difference between the October 4, 2001 directive and the 2002 executive order referred to by the Times is unclear. [New York Times, 12/16/2005]
Other Sources for October Directive - Other sources, including Bush, NSA Director General Michael Hayden, and the inspectors general of five separate agencies, will later refer to a presidential order having been given in “October,” or “weeks” after the 9/11 attacks, and say that, subsequent to this order, international calls of US persons are targeted for content-monitoring. Following the publication of the Times article, Bush will say in a December 17, 2005 radio address: “In the weeks following the terrorist attacks on our nation, I authorized the National Security Agency, consistent with US law and the Constitution, to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations. Before we intercept these communications, the government must have information that establishes a clear link to these terrorist networks” (see December 17, 2005). This presidential authorization was based on a legal opinion drafted by Department of Justice Office of Legal Counsel attorney John Yoo (see October 18, 2001). [WhiteHouse(.gov), 12/17/2005] Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001,” which is when he “gathered key members of the NSA workforce… [and] introduced [the NSA’s] new operational authority to them.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general,” and that “the three most senior and experienced lawyers in NSA… supported the lawfulness of this program.” [Michael Hayden, 1/23/2006] In a July 10, 2009 jointly-issued report, the inspectors general of the Department of Defense, Department of Justice, CIA, NSA, and Office of the Director of National Intelligence will refer to the “President’s Surveillance Program” (PSP) and “the program’s inception in October 2001.” The report will say: “One of the activities authorized as part of the PSP was the interception of the content of communications into and out of the United States where there was a reasonable basis to conclude that one party to the communication was a member of al-Qaeda or related terrorist organizations.… The attorney general subsequently publicly acknowledged the fact that other intelligence activities were also authorized under the same presidential authorization, but the details of those activities remain classified.” [Inspectors General, 7/10/2009] Citing “a senior administration official,” the Washington Post will report on January 4, 2006: “The secret NSA program… was authorized in October 2001.… The president and senior aides have publicly discussed various aspects of the program, but neither the White House, the NSA, nor the office of the director of national intelligence would say what day the president authorized it.” [Washington Post, 1/4/2006]

Entity Tags: US Department of Justice, Thomas Drake, US Department of Defense, Office of Legal Counsel (DOJ), Office of the Director of National Intelligence, Michael Hayden, National Security Agency, George W. Bush, Central Intelligence Agency, John C. Yoo, Jane Mayer

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

In a memo to the Secretaries of State, Treasury, and Defense, and to the Attorney General, the Director of Central Intelligence, and the Director of the FBI, President Bush mandates that they strictly control and oversee information from their departments disclosed to members of Congress. In order to “protect military operational security, intelligence sources and methods, and sensitive law enforcement investigations,” Bush orders, “your departments should adhere to the following procedures when providing briefings to the Congress relating to the information we have or the actions we plan to take: (i) Only you or officers expressly designated by you may brief Members of Congress regarding classified or sensitive law enforcement information; and (ii) The only Members of Congress whom you or your expressly designated officers may brief regarding classified or sensitive law enforcement information are the Speaker of the House, the House Minority Leader, the Senate Majority and Minority Leaders, and the Chairs and Ranking Members of the Intelligence Committees in the House and Senate.” [George W. Bush, 10/5/2001] In 2006, the Congressional Research Service (CRS) will conclude that the Bush administration is in violation of the law by refusing to inform any other members of Congress aside from the so-called “Gang of Eight” about the NSA warrantless wiretapping program (see January 18, 2006).

Entity Tags: “Gang of Eight”, Senate Intelligence Committee, George W. Bush

Category Tags: Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, Other Surveillance

Nancy Pelosi.Nancy Pelosi. [Source: US Congress]House Minority Leader Nancy Pelosi (D-CA) writes to NSA Director Michael Hayden questioning the nature and extent of the apparently illegal warrantless wiretapping of US citizens by the agency. Pelosi and other members of the House Intelligence Committee were briefed on October 1, 2001, by Hayden, whose agency began conducting surveillance against US citizens after the 9/11 attacks (see After September 11, 2001). Pelosi will release the letter on January 6, 2006, three weeks after the New York Times revealed that the NSA had been conducting electronic surveillance of US citizens without warrants since at least 2002 (see December 15, 2005.) Pelosi’s office will also release Hayden’s response, but almost the entire letter from Hayden is redacted.
Letter to Hayden - Pelosi writes in part, “[Y]ou indicated [in the briefing] that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance under the Foreign Intelligence Surveillance Act and related statutes, orders, regulations, and guidelines.… For several reasons, including what I consider to be an overly broad interpretation of President Bush’s directive of October 5 on sharing with Congress ‘classified or sensitive law enforcement information’ it has not been possible to get answers to my questions. Without those answers, the concerns I have about what you said on the First can not be resolved, and I wanted to bring them to your attention directly. You indicated that you were treating as a matter of first impression, [redacted ] being of foreign intelligence interest. As a result, you were forwarding the intercepts, and any information [redacted ] without first receiving a request for that identifying information to the Federal Bureau of Investigation. Although I may be persuaded by the strength of your analysis [redacted ] I believe you have a much more difficult case to make [redacted ] Therefore, I am concerned whether, and to what extent, the National Security Agency has received specific presidential authorization for the operations you are conducting. Until I understand better the legal analysis regarding the sufficiency of the authority which underlies your decision on the appropriate way to proceed on this matter, I will continue to be concerned.” The only portion of Hayden’s October 18 reply regarding Pelosi’s concerns that has not been redacted reads, “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” In January 2006, an NSA official will say that Pelosi’s concerns were adequately addressed in Hayden’s reply, and in a private briefing shortly thereafter. [Washington Post, 1/4/2006; Nancy Pelosi, 1/6/2006]
Pelosi Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). Pelosi is apparently unaware of any of this.

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

Attorney General John Ashcroft encourages federal agencies to deny requests for information under the Freedom of Information Act (FOIA). In a memo to all government departments and agencies, he states, “When you carefully consider FOIA requests and decide to withhold records, in whole or in part, you can be assured that the Department of Justice will defend your decisions.” This is a dramatic shift from the Clinton administration, which instructed federal officials to grant all information requests, using a “presumption of disclosure,” unless there was “foreseeable harm” in doing so. [Washington Post, 12/2/2002; Savage, 2007, pp. 96] The New York Times notes that while the new policy was announced after 9/11, “it had been planned well before the attacks.” [New York Times, 1/3/2003] In 2007, author Charlie Savage will write that Ashcroft turns the Clinton policy of foreseeable harm “on its head.” He will write: “Reviving a Reagan-era policy aimed at undermining the Freedom of Information Act, Ashcroft instructed the government to reject FOIA requests if it was at all possible to do so, under any legal reason for withholding documents—even if the information sought was harmless. And he promised to back up any decision to reject a FOIA request in court. The Ashcroft policy quickly discouraged the release of information to the public because few people were willing to go to the trouble and expense of an inevitable lawsuit.” [Savage, 2007, pp. 96]

Entity Tags: Charlie Savage, Bush administration (43), Freedom of Information Act, John Ashcroft

Category Tags: Impositions on Rights and Freedoms, Media Freedoms, Expansion of Presidential Power, Government Classification

Mohamed Kamel Bellahouel is arrested and held for five months after investigators discover he worked at a restaurant where Mohamed Atta and Marwan Alshehhi sometimes ate lunch in South Florida. In a sworn statement, Michael Rolince, head of the FBI’s International Terrorism Operations Section, says, “It is likely that Bellahouel would have waited on both Atta and Alshehhi since Bellahouel had worked at the restaurant for 10 months, and both Atta and Alshehhi were frequent patrons during shifts that Bellahouel worked.” Rolince also alleges Bellahouel may have waited on a third hijacker, Saeed Alghamdi, and says that a cinema employee claims Bellahouel saw a film with a fourth hijacker, Ahmed Alnami. However, Bellahouel, who denies going to the cinema with Alnami, has trouble gaining access to the evidence used against him. His attorney comments, “They won’t call it secret evidence and they won’t call it classified, but they won’t give it to you, either.” He is held in prison without bond and without charge from October 15, 2001 to March 1, 2002. After he is released, US authorities attempt to deport him, as he entered the US as a student, but then dropped out of college and started work, marrying a US citizen in June 2001. His attorney says the problem is that he is a Muslim. “If he were a Catholic coming from Venezuela or Colombia, they would have let him adjust his immigration status.” Bellahouel sues the government over his incarceration, but the case is shrouded in secrecy and the press only learns the case is ongoing due to a court error. [Miami Daily Business Review, 3/14/2003] For example, a journalist, who does not event know Bellahouel’s name, attempts to attend a hearing in March 2003. But the court is closed. After some effort, the reporter finally finds the name in the electronic docket. When he tells a court official Bellahouel’s name is on the docket, the official replies, “Is it? We’ll have to fix that, too,” and the name disappears. [Reporters Committee for Freedom of the Press, 12/2004] In February 2004 the Supreme Court declines an appeal from Bellahouel to have an open hearing, and media organizations are prevented from accessing sealed court proceedings. [New York Times, 1/5/2004; CNN, 2/23/2004]

Entity Tags: Marwan Alshehhi, Michael Rolince, Ahmed Alnami, Mohamed Kamel Bellahouel, Saeed Alghamdi, Mohamed Atta

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Category Tags: Detainments in US, Impositions on Rights and Freedoms, Expansion of Presidential Power, Gov't Violations of Prisoner Rights

NSA Director Michael Hayden responds to an October 11 letter from Representative Nancy Pelosi (see October 11, 2001), expressing concerns about the NSA’s post-9/11 surveillance expansion (see After September 11, 2001) that Hayden outlined for the House Intelligence Committee on October 1 (see October 1, 2001), and asking whether the president authorized it. The substance of Hayden’s October 18 reply will be redacted, except for this statement: “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” [Nancy Pelosi, 1/6/2006] A January 4, 2006 report in the Washington Post will cite “intelligence official close to Hayden” as saying that “[Hayden’s] appearance on Oct. 1, 2001, before the House committee had been to discuss Executive Order 12333, and not the new NSA program,” and that “Pelosi’s concerns had been answered in writing and again several weeks later during a private briefing.” [Washington Post, 1/4/2006] In a January 23, 2006 public briefing, Hayden will say, “September 2001, I asked to update the Congress on what NSA had been doing, and I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities,” and, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” [Michael Hayden, 1/23/2006]
Nature of Hayden's EO 12333 Surveillance Program - The full scope of Hayden’s surveillance program is unclear, but some sources indicate it includes the wholesale collection and data-mining of phone records provided by telecom companies and placement of pen registers (call trackers) on domestic phone numbers (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, October 2001), and October 31, 2001). Some sources indicate the NSA began large-scale domestic surveillance activities prior to the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi, National Security Agency

Category Tags: Impositions on Rights and Freedoms, Privacy, NSA Wiretapping / Stellar Wind, Other Surveillance

Mohammed Azmath, left, and Syed Gul Mohammad Shah/ Ayub Ali  Khan, right.Mohammed Azmath, left, and Syed Gul Mohammad Shah/ Ayub Ali Khan, right. [Source: Associated Press]The New York Times reports that, although 830 people have been arrested in the 9/11 terrorism investigation (a number that eventually exceeds between 1,200 and 2,000 (see November 5, 2001), there is no evidence that anyone now in custody was a conspirator in the 9/11 attacks. Furthermore, “none of the nearly 100 people still being sought by the [FBI] is seen as a major suspect.” Of all the people arrested, only four, Zacarias Moussaoui, Ayub Ali Khan, Mohammed Azmath, and Nabil al-Marabh, are likely connected to al-Qaeda. [New York Times, 10/21/2001] Three of those are later cleared of ties to al-Qaeda. After being kept in solitary confinement for more than eight months without seeing a judge or being assigned a lawyer, al-Marabh pleads guilty to the minor charge of entering the United States illegally (see September 3, 2002) and is deported to Syria (see January 2004). There is considerable evidence al-Marabh did have ties to al-Qaeda and even the 9/11 plot (see September 2000; January 2001-Summer 2001; January 2001-Summer 2001; Spring 2001; Early September 2001). [Washington Post, 6/12/2002; Canadian Broadcasting Corporation, 8/27/2002] On September 12, 2002, after a year in solitary confinement and four months before he was able to contact a lawyer, Mohammed Azmath pleads guilty to one count of credit card fraud, and is released with time served. Ayub Ali Khan, whose real name is apparently Syed Gul Mohammad Shah, is given a longer sentence for credit card fraud, but is released and deported by the end of 2002. [Village Voice, 9/25/2002; New York Times, 12/31/2002] By December 2002, only 6 are known to still be in custody, and none have been charged with any terrorist acts (see December 11, 2002). On September 24, 2001, Newsweek reported that “the FBI has privately estimated that more than 1,000 individuals—most of them foreign nationals—with suspected terrorist ties are currently living in the United States.” [Newsweek, 10/1/2001]

Entity Tags: Nabil al-Marabh, Al-Qaeda, Mohammed Azmath, Syed Gul Mohammad Shah, Zacarias Moussaoui, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Category Tags: Detainments in US, Impositions on Rights and Freedoms, Expansion of Presidential Power, Gov't Violations of Prisoner Rights

The Justice Department’s John Yoo and Robert Delahunty issue a memo to White House counsel Alberto Gonzales claiming President Bush has sweeping powers in wartime that essentially void large portions of the Constitution. The memo, which says that Bush can order military operations inside the US (see October 23, 2001), also says that Bush can suspend First Amendment freedoms: “First Amendment speech and press rights may also be subordinated to the overriding need to wage war successfully.” It adds that “the current campaign against terrorism may require even broader exercises of federal power domestically.” [American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009]

Entity Tags: John C. Yoo, George W. Bush, Robert J. Delahunty, US Department of Justice, Alberto R. Gonzales

Category Tags: Impositions on Rights and Freedoms, Media Freedoms, Expansion of Presidential Power, Other Legal Changes, Government Acting in Secret, Government Classification

John Yoo, a deputy assistant attorney general in the Justice Department’s Office of Legal Counsel, and OLC special counsel Robert Delahunty issue a joint memo to White House counsel Alberto Gonzales. The memo claims that President Bush has sweeping extraconstitutional powers to order military strikes inside the US if he says the strikes are against suspected terrorist targets. In the days following the 9/11 attacks, Gonzales asked if Bush could legally order the military to combat potential terrorist activity within the US. The memo is first revealed to exist seven years later (see April 2, 2008) after future OLC head Steven Bradbury acknowledges its existence to the American Civil Liberties Union; it will be released two months after the Bush administration leaves the White House (see March 2, 2009). [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009]
Granting Extraordinary, Extraconstitutional Authority to Order Military Actions inside US - Yoo and Delahunty’s memo goes far past the stationing of troops to keep watch at airports and around sensitive locations. Instead, the memo says that Bush can order the military to conduct “raids on terrorist cells” inside the US, and even to seize property. “The law has recognized that force (including deadly force) may be legitimately used in self-defense,” they write. In 2009, Reuters will write, “The US military could have kicked in doors to raid a suspected terrorist cell in the United States without a warrant” under the findings of the OLC memo. “We do not think that a military commander carrying out a raid on a terrorist cell would be required to demonstrate probable cause or to obtain a warrant,” Yoo and Delahunty write. [US Department of Justice, 10/23/2001 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009] The memo reasons that since 9/11, US soil can be legally construed as being a battlefield, and Congress has no power to restrict the president’s authority to confront enemy tactics on a battlefield. [Savage, 2007, pp. 131]
No Constitutional or Other Legal Protections - “[H]owever well suited the warrant and probable cause requirements may be as applied to criminal investigations or to other law enforcement activities, they are unsuited to the demands of wartime and the military necessity to successfully prosecute a war against an enemy. [Rather,] the Fourth Amendment does not apply to domestic military operations designed to deter and prevent foreign terrorist attacks.” Any objections based on the Fourth Amendment’s ban on unreasonable search and seizures would be invalid since whatever possible infringement on privacy would be trumped by the need to protect the nation from injury by deadly force. The president is “free from the constraints of the Fourth Amendment.” The Posse Comitatus Act, which bars the military from operating inside the US for law enforcement purposes, is also moot, the memo says, because the troops would be acting in a national security function, not as law enforcement. [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009; Ars Technica, 3/2/2009] There are virtually no restrictions on the president’s ability to use the military because, Yoo and Delahunty write, the nation is in a “state of armed conflict.” The scale of violence, they argue, is unprecedented and “legal and constitutional rules” governing law enforcement, even Constitutional restrictions, no longer apply. The US military can be used for “targeting and destroying” hijacked airplanes, they write, or “attacking civilian targets, such as apartment buildings, offices, or ships where suspected terrorists were thought to be.” The memo says, “Military action might encompass making arrests, seizing documents or other property, searching persons or places or keeping them under surveillance, intercepting electronic or wireless communications, setting up roadblocks, interviewing witnesses, or searching for suspects.” [Newsweek, 3/2/2009] Yoo writes that the Justice Department’s criminal division “concurs in our conclusion” that federal criminal laws do not apply to the military during wartime. The criminal division is headed by Michael Chertoff, who will become head of the Department of Homeland Security. [Washington Post, 4/4/2008]
Sweeping Away Constitutional Rights - Civil litigator Glenn Greenwald will later note that the memo gives legal authorization for President Bush to deploy the US military within US borders, to turn it against foreign nationals and US citizens alike, and to render the Constitution’s limits on power irrelevant and non-functional. Greenwald will write, “It was nothing less than an explicit decree that, when it comes to presidential power, the Bill of Rights was suspended, even on US soil and as applied to US citizens.”
Justifying Military Surveillance - Greenwald will note that the memo also justifies the administration’s program of military surveillance against US citizens: “[I]t wasn’t only a decree that existed in theory; this secret proclamation that the Fourth Amendment was inapplicable to what the document calls ‘domestic military operations’ was, among other things, the basis on which Bush ordered the NSA, an arm of the US military, to turn inwards and begin spying—in secret and with no oversight—on the electronic communications (telephone calls and emails) of US citizens on US soil” (see December 15, 2005 and Spring 2004). “If this isn’t the unadorned face of warped authoritarian extremism,” Greenwald will ask, “what is?” [Salon, 3/3/2009] If the president decides to use the military’s spy agency to collect “battlefield intelligence” on US soil, no law enacted by Congress can regulate how he goes about collecting that information, including requiring him to get judicial warrants under the Foreign Intelligence Surveillance Act (FISA). In 2007, Yoo will say in an interview: “I think there’s a law greater than FISA, which is the Constitution, and part of the Constitution is the president’s commander in chief power. Congress can’t take away the president’s powers in running war.” [Savage, 2007, pp. 131; PBS Frontline, 5/15/2007] Cheney and Addington will push the NSA to monitor all calls and e-mails, including those beginning and ending on US soil, but the NSA will balk. Domestic eavesdropping without warrants “could be done and should be done,” Cheney and Addington argue, but the NSA’s lawyers are fearful of the legal repercussions that might follow once their illegal eavesdropping is exposed, with or without the Justice Department’s authorization. The NSA and the White House eventually reach a compromise where the agency will monitor communications going in and out of the US, but will continue to seek warrants for purely domestic communications (see Spring 2001, After September 11, 2001, and October 2001). [Savage, 2007, pp. 131]
Military Use Considered - In 2009, a former Bush administration lawyer will tell a reporter that the memo “gave rise to the Justice Department discussing with the Defense Department whether the military could be used to arrest people and detain people inside the United States. That was considered but rejected on at least one occasion.” The lawyer will not give any indication of when this will happen, or to whom. Under the proposal, the suspects would be held by the military as “enemy combatants.” The proposal will be opposed by the Justice Department’s criminal division and other government lawyers and will ultimately be rejected; instead, the suspects will be arrested under criminal statutes. [Los Angeles Times, 3/3/2009]

Entity Tags: Steven Bradbury, US Department of Homeland Security, US Department of Defense, Robert J. Delahunty, Office of Legal Counsel (DOJ), Bush administration (43), Michael Chertoff, Alberto R. Gonzales, National Security Agency, American Civil Liberties Union, Glenn Greenwald, George W. Bush, US Department of Justice, John C. Yoo

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Government Acting in Secret, Government Classification

The House of Representatives passes the final version of the Patriot Act and other previously unpopular Bush administration projects: Alaska oil drilling, $25 billion in tax cuts for corporations, taps into Social Security funds, and cuts in education. [CNN, 10/25/2001] Republican Congressman Ron Paul states: “It’s my understanding the bill wasn’t printed before the vote—at least I couldn’t get it. They played all kinds of games, kept the House in session all night, and it was a very complicated bill. Maybe a handful of staffers actually read it, but the bill definitely was not available to members before the vote.” It is later found that only two copies of the bill were made available in the hours before its passage, and most House members admit they voted for the act without actually reading it first. [Insight, 11/9/2001] Two days later, the Senate will pass the final version of the Patriot Act. Anthrax targets Senators Tom Daschle and Patrick Leahy (see October 15, 2001) now support the bill. President Bush signs it into law the same day (see October 26, 2001). [Fox News, 10/26/2001]

Entity Tags: Tom Daschle, Patrick J. Leahy, Ron Paul

Timeline Tags: 2001 Anthrax Attacks

Category Tags: Patriot Act, Taxation

Vice President Dick Cheney summons the chairmen and ranking members of the Senate and House Intelligence Committees to the White House for a classified briefing on the secret NSA warrantless wiretapping program (see Early 2002). Cheney makes it clear to the lawmakers that he is merely informing them about the program, and not seeking their approval. [Washington Post, 12/18/2005] Officials later say that under any of the previous presidents, such a meeting of this import would involve the president. But the four lawmakers are hustled away from the Oval Office. Instead, “[w]e met in the vice president’s office,” Bob Graham (D-FL), the chairman of the Senate Intelligence Committee, later recalls. President Bush has already told Graham that “the vice president should be your point of contact in the White House.” Cheney, according to the president, “has the portfolio for intelligence activities.” [Washington Post, 6/24/2007] The leaders are briefed by Cheney, CIA Director George Tenet, and NSA Director Michael Hayden. The Congressional leaders will later mostly refuse to comment publicly about what they do and do not learn about the program, even after it is revealed to the public (see December 15, 2005). In 2003, when Senator John D. Rockefeller ascends to the Democratic leadership of the Senate committee, and is himself briefed on the program, he will write to Cheney expressing his concerns over it (see July 17, 2003). [New York Times, 12/15/2005]
'No Discussion about Expanding' NSA Wiretapping - In December 2005, after the program is revealed to the public, one of the Congressmen present at the briefings, Graham, the then-chairman of the Senate Intelligence Committee, will discuss his knowledge of the program. In contradiction to the characterizations of Bush and other White House officials, Graham will say that he recalls “no discussion about expanding [NSA eavesdropping] to include conversations of US citizens or conversations that originated or ended in the United States,” and knew nothing of Bush’s intention to ignore the Foreign Intelligence Surveillance Court (also known as the FISA court). “I came out of the room with the full sense that we were dealing with a change in technology but not policy,” Graham will recall, using new methodologies to intercept overseas calls that passed through US switches. He thought that NSA eavesdropping would continue to be limited to “calls that initiated outside the United States, had a destination outside the United States but that transferred through a US-based communications system.” Instead, Graham will say, it now seems that Bush decided to go “beyond foreign communications to using this as a pretext for listening to US citizens’ communications. There was no discussion of anything like that in the meeting with Cheney.” A senior intelligence official, who refuses to reveal his identity but says he is speaking with the permission of the White House, will accuse Graham of “misremembering the briefings,” which he will call “very, very comprehensive.” The official will refuse to discuss the briefings in any but the most general terms, but will say they were intended “to make sure the Hill knows this program in its entirety, in order to never, ever be faced with the circumstance that someone says, ‘I was briefed on this but I had no idea that—’ and you can fill in the rest.” Graham will characterize the official’s description as saying: “[W]e held a briefing to say that nothing is different.… Why would we have a meeting in the vice president’s office to talk about a change and then tell the members of Congress there is no change?” House Minority Leader Nancy Pelosi (D-CA), who was also present at the meeting as the ranking Democrat on the House Intelligence Committee, will say the briefing described “President Bush’s decision to provide authority to the National Security Agency to conduct unspecified activities.” She will note that she “expressed my strong concerns” but did not go into detail. [Washington Post, 12/18/2005]
Lawmakers Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). In the briefing, Cheney informs the lawmakers of none of this.

Entity Tags: Richard (“Dick”) Cheney, Senate Intelligence Committee, Nancy Pelosi, John D. Rockefeller, House Intelligence Committee, Daniel Robert (“Bob”) Graham, George J. Tenet, George W. Bush, Michael Hayden, National Security Agency

Category Tags: Privacy, Impositions on Rights and Freedoms, NSA Wiretapping / Stellar Wind

October 26, 2001: USA Patriot Act Becomes Law

President Bush signs the Patriot Act into law.President Bush signs the Patriot Act into law. [Source: White House]President Bush signs the USA Patriot Act (see October 2, 2001) into law. The act’s provisions include:
bullet 1) Non-citizens can be detained and deported if they provide “assistance” for lawful activities of any group the government chooses to call a terrorist organization. Under this provision the secretary of state can designate any group that has ever engaged in violent activity as a terrorist organization. Representative Patsy Mink (D-HI) notes that in theory supporters of Greenpeace could now be convicted for supporting terrorism. [San Francisco Chronicle, 11/12/2001]
bullet 2) Immigrants can be detained indefinitely, even if they are found not to have any links to terrorism. They can be detained indefinitely for immigration violations or if the attorney general decides their activities pose a danger to national security. They need never be given a trial or even a hearing on their status. [San Francisco Chronicle, 9/8/2002]
bullet 3) Internet service providers can be ordered to reveal the websites and e-mail addresses that a suspect has communicated to or visited. The FBI need only inform a judge that the information is relevant to an investigation. [Village Voice, 11/26/2001; San Francisco Chronicle, 9/8/2002]
bullet 4) The act “lays the foundation for a domestic intelligence-gathering system of unprecedented scale and technological prowess.” [Washington Post, 11/4/2001] It allows the government to access confidential credit reports, school records, and other records, without consent or notification. [San Francisco Chronicle, 9/8/2002] All of this information can now be given to the CIA, in violation of the CIA’s mandate prohibiting it from spying within the US. [Village Voice, 11/26/2001]
bullet 5) Financial institutions are encouraged to disclose possible violations of law or “suspicious activities” by any client. The institution is prohibited from notifying the person involved that it made such a report. The term “suspicious” is not defined, so it is up to the financial institutions to determine when to send such a report.
bullet 6) Federal agents can easily obtain warrants to review a library patron’s reading and computer habits (see January 2002). [Village Voice, 2/22/2002] Section 215 allows the FBI to ask the Foreign Intelligence Surveillance Court (FISC) for an order to obtain documents relating to counterterrorism investigations without meeting the usual standard of legal “probable cause” that a crime may have been committed. Senator Russ Feingold (D-WI—see October 9, 2001) says that Section 215 can allow the FBI to “go on a fishing expedition and collect information on virtually anyone.” Librarians will make Section 215 the centerpiece of their objections to the Patriot Act, arguing that the government can now “sweep up vast amounts of information about people who are not suspected of a crime.” In 2005, one librarian will say, “It reminds me of the Red Scare of the 1950s.” However, some FBI officials find it easier to use provisions of Section 505, which expands the usage of so-called “national security letters” (see November 28, 2001). [Roberts, 2008, pp. 39-40]
bullet 7) The government can refuse to reveal how evidence is collected against a suspected terrorist defendant. [Tampa Tribune, 4/6/2003]
Passes with No Public Debate - The law passes without public debate. [Village Voice, 11/9/2001; Village Voice, 11/26/2001] Even though it ultimately took six weeks to pass the law, there were no hearings or congressional debates. [Salon, 3/24/2003] Congressman Barney Frank (D-MA) says: “This was the least democratic process for debating questions fundamental to democracy I have ever seen. A bill drafted by a handful of people in secret, subject to no committee process, comes before us immune from amendment” (see October 2-4, 2001 and October 24, 2001). [Village Voice, 11/9/2001] Only 66 congresspeople, and one senator, Feingold, vote against it. Few in Congress are able to read summaries, let alone the fine print, before voting on it. [Los Angeles Times, 10/30/2001] Feingold says, “The new law goes into a lot of areas that have nothing to do with terrorism and have a lot to do with the government and the FBI having a wish list of things they want to do.” [Village Voice, 11/9/2001] Supporters of the act point out that some of its provisions will expire in four years, but in fact most provisions will not expire. [Chicago Tribune, 11/1/2001]
Mounting Opposition - One year later, criticism of the law will grow. [San Francisco Chronicle, 9/8/2002] Dozens of cities will later pass resolutions criticizing the Patriot Act (see January 12, 2003).

Entity Tags: George W. Bush, USA Patriot Act, Foreign Intelligence Surveillance Court, US Congress, Patsy Mink, Russell D. Feingold, Barney Frank

Timeline Tags: Complete 911 Timeline

Category Tags: Patriot Act, Citizenship Rights

A senior NSA official, having learned of the NSA’s post-9/11 domestic surveillance program and believing it to be illegal, takes his concerns to a staff member of the House Intelligence Committee. In a 2012 interview for Democracy Now!, William Binney, a former NSA technical director who served in the NSA for 36 years, will say that some of his staff had been recruited to work on the new program and told him of some of the things that were being done, which he believed were illegal. Binney will tell co-host Juan Gonzalez: “I immediately went to the Intelligence Committee, because… the intelligence committees were formed to have oversight over the intelligence community to make sure they didn’t monitor US citizens.… And the member of the staff that I went to went to Porter Goss, who was chairman of that committee at the time, and he referred her to General Hayden for any further. When it was the job of that committee to do the oversight on all this domestic spying, they weren’t doing it.” Soon after this, Binney retires from the NSA, due to his belief the NSA is violating the Constitution (see October 31, 2001). [Democracy Now!, 4/20/2012]

Entity Tags: Jane Mayer, House Intelligence Committee, William Binney, Michael Hayden, National Security Agency

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Database Programs, NSA Wiretapping / Stellar Wind

White House lawyers have become impatient with the interagency group’s (see Shortly Before September 23, 2001) less than full endorsement of the use of military commissions to try suspected terrorists. By late October, Timothy E. Flanigan takes the task of designing a strategy for prosecuting terrorists away from the group and proceeds to focus on military commissions as the only preferable option. The White House lawyers now work more in secret, excluding many agencies and most of the government’s experts in military and international law, but together with the lawyers of the Office of Legal Counsel (OLC), with the intention of drafting a presidential military order. [New York Times, 10/24/2004] There is a remarkable secrecy surrounding the drafting process (see November 11-13, 2001). Both Attorney General John D. Ashcroft and his deputy, Larry D. Thompson, are closely consulted. But the head of the Justice Department’s Criminal Division, Michael Chertoff is kept out of the loop. Secretary of Defense Donald H. Rumsfeld is informed through his general counsel, William J. Haynes. Other Pentagon experts, however, are excluded. [New York Times, 10/24/2004] When the order is signed (see November 13, 2001), many express surprise. “That came like a bolt from the blue,” a former Pentagon official says. “Neither I nor anyone I knew had any insight, any advance knowledge, or any opportunity to comment on the president’s military order.” [Guardian, 6/9/2004] “I can’t tell you how compartmented things were,” retired Rear Adm. Donald J. Guter, the Navy’s Judge Advocate General, later recalls. “This was a closed administration.” [New York Times, 10/24/2004]

Entity Tags: Larry D. Thompson, John Ashcroft, Michael Chertoff, Donald J. Guter, Donald Rumsfeld, William J. Haynes

Timeline Tags: Torture of US Captives

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Detainments in US, Gov't Violations of Prisoner Rights

Concerned that NSA post-9/11 surveillance operations violated the US Constitution, a senior NSA official reports on the program to House Intelligence Committee staff (see Before October 31, 2001), then retires. William Binney, a crypto-mathematician, had served in the NSA for 36 years. In 1997 he was made technical director of the World Geopolitical and Military Analysis Reporting Group, a 6000-employee unit that focused on signals intelligence (SIGINT) reporting and analysis. In the last part of his NSA career, Binney focused on dealing with the NSA’s problem of information overload, co-founding the Signals Intelligence Automation Research Center (SARC) and leading a 20-member team to develop a data-mining and analysis program called ThinThread. This program made it possible to “correlate data from financial transactions, travel records, Web searches, GPS equipment, and any other ‘attributes’ that an analyst might find useful,” and “could chart relationships among people in real time.” Unlike the NSA’s existing centralized data processing systems, ThinThread was able to identify useful or useless data as it was collected, reducing the overload problem. However, though it targeted foreign communications, ThinThread also intercepted those of Americans, and “continued documenting signals when a trail crossed into the US.” Binney incorporated measures to protect privacy, but NSA lawyers still considered the program too invasive, according to a 2011 article by Jane Mayer based on interviews with Binney and another NSA whistleblower, Thomas Drake. In 1999, NSA Director General Michael Hayden decided to fund a rival program, Trailblazer, which would be developed by defense contractors (see Late 1999). Trailblazer will be abandoned in 2006 as unworkable, after costing $1.2 billion (see January 2006). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012]
Post-9/11 NSA Surveillance Expansion - Binney will tell Mayer that, after the 9/11 attacks, his people began coming to him, saying things like: “They’re getting billing records on US citizens! They’re putting pen registers [call logs] on everyone in the country!” James Bamford will interview Binney in 2012 and write, “At the outset the program recorded 320 million calls a day, [Binney] says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” Binney has not been personally “read in” to this domestic surveillance program, but some members of his SARC team have, as their knowledge of ThinThread code was needed to set it up. Binney became convinced elements of ThinThread were being used, but without privacy protections, meaning US persons could be targeted. Soon after learning these things, Binney takes his concerns to the House Intelligence Committee (see Before October 31, 2001), and retires on October 31. He will tell Mayer, “I couldn’t be an accessory to subverting the Constitution.” Other sources support Binney’s account of this NSA data-mining and monitoring program (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, and October 2001). However, the claim that NSA domestic surveillance was initiated only after, and in response to, 9/11 is contradicted by information indicating that domestic monitoring programs and activities were established and conducted prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012]

Entity Tags: William Binney, World Geopolitical and Military Analysis Reporting Group, Thinthread, Signals Intelligence Automation Research Center, House Intelligence Committee, James Bamford, Jane Mayer, Michael Hayden, National Security Agency, Thomas Drake, Trailblazer

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Government Acting in Secret, Database Programs, NSA Wiretapping / Stellar Wind

George W. Bush signs Executive Order 13233 which limits public access to papers of all presidents since 1980. A 1978 law provided for the release of presidential papers 12 years after the president leaves office, so Ronald Reagan’s papers would have been released next year. Reagan issued an order in 1989 that called for disclosure of most of his official papers 12 years after he left office but under the new executive order the papers can be kept secret even if the president in question wants them released. President Bush’s father was vice president during the Reagan administration. [Seattle Post-Intelligencer, 11/8/2001] The Guardian notes that now Bush’s “personal papers detailing the decision-making process in the current war on terrorism could remain secret in perpetuity.” [Guardian, 11/2/2001] In March 2001, Bush signed a temporary order delaying the release of these papers for 90 days, and then signed for another 90 day delay before signing this order making the change permanent (see January 20, 2001). [New York Times, 1/3/2003]
'Executive Fiat' - Bush’s executive order radically reforms the PRA and unilaterally imposes limitations never contemplated by Congress. Bush is, according to former Nixon White House counsel John Dean, “in essence… repealing an act of Congress and imposing a new law by executive fiat.” If not overturned by Congress or lawsuits, the executive order mandates the following, according to Dean:
bullet Former presidents can keep their papers sealed indefinitely.
bullet Vice presidents have the power to invoke executive privilege, an authority limited to the president since 1969.
bullet The burden shifts from a presumption to release presidential documents unless good cause exists to keep them sealed, to the opposite, where an applicant must show good cause why a set of documents should be unsealed.
bullet Any request to release a former president’s papers must be approved by both the former president and the current incumbent. Either one’s objection keeps the papers sealed.
bullet “Representatives of former presidents” may invoke executive privilege after a former president’s death. Dean will write, “Although there is no constitutional basis whatsoever for this, under Bush’s order such a right can be passed from generation to generation, to friends, anyone.”
Tom Connors of the Society of American Archivists will say, “What seems to be coming out of the [Bush-Cheney] administration is the idea that public information is a dangerous thing.” Historian Hugh Davis Graham, who will, before his death, take part in a lawsuit to overturn the order, will observe, “George W. Bush has a fetish for secrecy. And unless this executive order is overturned, it will be a victory for secrecy in government—a victory so total that it would make [former president Richard] Nixon jealous in his grave.” Dean will add, “Bush and Cheney assumed office planning to take total and absolute control of executive branch information. The truth will be what they say it is. They will decide what the public should know and when, if ever.” [Dean, 2004, pp. 89-92]

Entity Tags: Society of American Archivists, Bush administration (43), Tom Connors, George Herbert Walker Bush, Ronald Reagan, George W. Bush, John Dean, Hugh Davis Graham

Category Tags: Expansion of Presidential Power, Other Legal Changes, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification

The FBI alerts InfraGard members (see 1996-2008) of a potential terrorist threat to bridges in California. Officials of Enron are also notified. However, the FBI does not immediately notify California governor Gray Davis, who learns of the threat from his brother, Barry Davis, an employee of the financial firm Morgan Stanley. Davis’s press secretary, Steve Maviglio, later recalls: “[Governor Davis] said his brother talked to him before the FBI. And the governor got a lot of grief for releasing the information. In his defense, he said, ‘I was on the phone with my brother, who is an investment banker. And if he knows, why shouldn’t the public know?‘… You’d think an elected official would be the first to know, not the last.” [Progressive, 2/7/2008]

Entity Tags: Enron Corporation, Barry Davis, Steve Maviglio, InfraGard, Gray Davis, Federal Bureau of Investigation

Category Tags: Privacy, Impositions on Rights and Freedoms, Other Surveillance

John Yoo, the Justice Department’s (DOJ) Office of Legal Counsel (OLC) deputy assistant attorney general, sends a classified memo to Attorney General John Ashcroft justifying warrantless surveillance of US persons. The National Security Agency (NSA)‘s domestic surveillance authorized by President Bush (see October 4, 2001, Early 2002, and December 15, 2005) will come to be publicly referred to as the President’s Surveillance Program (PSP). This is not the first Yoo memo supporting warrantless surveillance (see September 25, 2001), but a 2009 report on the PSP jointly issued by the inspectors general (IGs) of the Department of Defense (DOD), DOJ, CIA, National Security Agency (NSA), and Office of the Director of National Intelligence (ODNI) will refer to it as “[t]he first OLC opinion directly supporting the legality of the PSP.” The IGs’ report will quote from and comment on the memo, noting that “deficiencies in Yoo’s memorandum identified by his successors in the Office of Legal Counsel and the Office of the Deputy Attorney General later became critical to DOJ’s decision to reassess the legality of the program in 2003.” According to the IGs’ report, Yoo asserts that warrantless surveillance is constitutional as long as it is “reasonable” under the Fourth Amendment, which only protects against “unreasonable searches and siezures.” On this point, the IGs’ report will note that Yoo’s successors were troubled by his failure to discuss the Supreme Court’s decision in Youngstown Sheet & Tube Co. v. Sawyer (1952), which found the president’s wartime authority to be limited. His memo does acknowledge that the Foreign Intelligence Surveillance Act (FISA) “purports to be the exclusive statutory means for conducting electronic surveillance for foreign intelligence,” but asserts that it is only a “safe harbor for electronic surveillance” because it cannot “restrict the president’s ability to engage in warrantless searches that protect the national security.” Yoo also writes that Congress has not “made a clear statement in FISA that it sought to restrict presidential authority to conduct warrantless searches in the national security area.” The IGs’ report will state that Yoo’s successors considered this problematic because Yoo has omitted discussion of the fact that FISA explicitly authorizes the president to conduct warrantless surveillance during the first 15 days following a declaration of war by Congress, which they considered an expression of Congress’s intent to restrict warrantless surveillance to a limited period of time and specific circumstances. The IGs’ report will also state that Yoo’s memo discusses “the legal rationale for Other Intelligence Activities authorized as part of the PSP,” and that Yoo concludes, “[W]e do not believe that Congress may restrict the president’s inherent constitutional powers, which allow him to gather intelligence necessary to defend the nation from direct attack.” The IGs’ report will say that “Yoo’s discussion of some of the Other Intelligence Activities did not accurately describe the scope of these activities,” and that Yoo’s successors considered his discussion of these other activities to be “insufficient and presenting a serious impediment to recertification of the program as to form and legality.” [Inspectors General, 7/10/2009, pp. pp. 11-13]
Memo's Existence Revealed by ACLU Lawsuit - On December 15, 2005, the New York Times will report that Bush authorized an NSA warrantless domestic surveillance program after the 9/11 attacks (see December 15, 2005). The American Civil Liberties Union (ACLU) will request records pertaining to the program under the Freedom of Information Act (FOIA) and then sue the Justice Department for the release of records. The existence of Yoo’s November 2 memo will first be revealed in an October 19, 2007 deposition filed by then head of the OLC Steven Bradbury in response to the ACLU lawsuit, which says that it “[concerns] the legality of certain communications intelligence activities.” After the 2009 release of the IGs’ report the ACLU will notify the court and the government will agree to reprocess four OLC memos, including Yoo’s November 2 memo. This memo and a May 6, 2004 memo by Yoo’s OLC successor Jack Goldsmith that disputes many of Yoo’s conclusions will be released in heavily redacted form on March 18, 2011. [ACLU.org, 2/7/2006; United States District Court of DC, 10/19/2007; American Civil Liberties Union, 3/19/2011]
Constitutional Experts Dispute Yoo's Legal Rationale - Numerous authorities on the law will question or reject the legal bases for warrantless domestic surveillance. In 2003, Yoo will leave the OLC. Goldsmith will begin a review of the PSP, after which he will conclude it is probably illegal in some respects and protest, within the executive branch, its continuation (see Late 2003-Early 2004 and December 2003-June 2004). Following the public disclosure of its existence, a January 5, 2006 report by the Congressional Research Service will find it to be of dubious legality (see January 5, 2006). On January 19, 2006, the DOJ will issue a 42-page white paper laying out the legal bases for the program (see January 19, 2006). These bases will be reviewed and rejected by 14 constitutional scholars and former government officials in a joint letter to Congress on February 2, 2006. [al [PDF], 2/2/2006 pdf file] The American Bar Association will adopt a resolution on February 13, 2006 that rejects DOJ’s arguments and calls on Congress to investigate the program. [Delegates, 2/13/2006 pdf file] On August 17, 2006, in the case ACLU v. NSA, US district judge Anna Diggs Taylor will reject the government’s invocation of the “state secrets privilege” and its argument that plaintiffs’ lack standing due to their being unable to prove they were surveilled, and will rule that warrantless surveillance is in violation of “the separation of powers doctrine, the Administrative Procedures Act, the First and Fourth Amendments to the United States Constitution, the FISA, and Title III” (see August 17, 2006). Taylor’s ruling will be overturned on appeal, on the grounds that the plaintiffs lack standing as they cannot prove that surveillance has occurred. In another case, Al Haramain v. Barack Obama, the government will make the same arguments, but US district judge Vaughn Walker will reject these and conclude in 2010 that illegal surveillance occurred (see March 31, 2010). [Al-Haramain v. Obama, 3/31/2010]

Entity Tags: Steven Bradbury, Vaughn Walker, Ronald Dworkin, George W. Bush, John C. Yoo, American Bar Association, Office of Legal Counsel (DOJ), American Civil Liberties Union, John Ashcroft, Anna Diggs Taylor, US Department of Justice

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

John Yoo, a lawyer with the Justice Department’s Office of Legal Counsel (OLC), writes a legal opinion that claims the attorney general, under Executive Order 12333 (see December 4, 1981), can grant the deputy attorney general the legal authority to approve the use of surveillance techniques for which a warrant would be required for law enforcement purposes. [US Department of Justice, 11/5/2001; American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: Office of Legal Counsel (DOJ), US Department of Justice, John C. Yoo

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Other Surveillance

Patrick Philbin, an attorney with the Justice Department’s Office of Legal Counsel, writes a lengthy and detailed memo arguing that the president may establish so-called “military commissions” for the trial and disposition of terror suspects without involvement in the US criminal justice system. Furthermore, Philbin opines, the president may do so without the approval or even the knowledge of Congress. [US Department of Justice, 11/6/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file] Philbin’s central argument is that 9/11 was an act of war, not a crime, and therefore the attacks triggered the president’s full array of war powers, including the inherent authority to create military commissions. Philbin cites a 1942 case where then-President Roosevelt created a military commission to try eight Nazi saboteurs captured inside the US during the first year of America’s involvement in World War II (see 1942); even though the Supreme Court backed Roosevelt, he felt unsure of the legality of such commissions, and did not use them in later trials of captured saboteurs. Since World War II, the laws of war have undergone drastic revisions, with Congress enacting the Uniform Code of Military Justice (UCMJ), which said that if military commissions were ever to be used again, they should use, as much as is practical, the same procedures and defendant rights as are found in military courts-martial. The Senate had also ratified the 1949 Geneva Conventions, which granted all wartime prisoners the right to a fair trial. Philbin’s memo ignores everything except the 1942 military commissions, and argues that if the president has the inherent and exclusive right to set up military commissions, as the Supreme Court had found, then Congress has no authority to restrict that right. [Savage, 2007, pp. 136-137]

Entity Tags: Office of Legal Counsel (DOJ), Geneva Conventions, George W. Bush, Patrick F. Philbin, US Department of Justice

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

Attorney General John Ashcroft announces that the Justice Department is now on what he calls a “wartime footing.” The agency is revamping its priorities to refocus its efforts on battling terrorism. According to Ashcroft, a plan, which he intends to submit to Congress, mandates a reorganization of the Justice Department, as well as component agencies such as the FBI and the Immigration and Naturalization Service (INS), both of which will be overhauled to take a more aggressive stance in the effort to ward off terrorism. The plan will take five years to fully implement. Ashcroft is reticent about the details of the plans, but some proposals include:
bullet Allowing federal prison authorities to eavesdrop on prisoners conferring with their attorneys, effectively voiding the attorney-client privilege, if those prisoners are considered to be a threat to national security;
bullet Redirecting 10 percent of the Justice Department’s budget, or about $2.5 billion, to counterterrorism efforts;
bullet Restructuring the INS to focus on identifying, deporting, and prosecuting illegal aliens, with a special focus on potential terrorists.
The eavesdropping privilege causes an immediate stir among civil libertarians and Constitutional scholars. Justice Department spokeswoman Mindy Tucker notes that the order has already been published in the Federal Register and is, essentially, the law. Information gathered by authorities during such eavesdropping sessions would not be used in criminal prosecutions of the suspects, Tucker promises. “The team that listens is not involved in the criminal proceedings,” she says. “There’s a firewall there.” Senator Patrick Leahy (D-VT), chairman of the Senate Judiciary Committee, says he agrees with the general idea of refocusing the agency on terrorism, but suggests Ashcroft’s plan be reviewed by an existing commission that is now examining the FBI’s counterintelligence operations. That commission is headed by former FBI Director William Webster. Leahy’s fellow senator, Charles Grassley (R-IA), says: “As with any reorganization, the devil will be in the details. I hope for new accountability measures, not just structural changes.” Ashcroft says: “Defending our nation and defending the citizens of America against terrorist attacks is now our first and overriding priority. To fulfill this mission, we are devoting all the resources necessary to eliminate terrorist networks, to prevent terrorist attacks, and to bring to justice all those who kill Americans in the name of murderous ideologies.” [New York Times, 11/3/2001; Rich, 2006, pp. 35] “It is amazing to me that Ashcroft is essentially trying to dismantle the bureau,” says a former FBI executive director. “They don’t know their history and they are not listening to people who do.” [Harper's, 12/4/2001]

Entity Tags: Federal Bureau of Investigation, Mindy Tucker, John Ashcroft, US Immigration and Naturalization Service, Patrick J. Leahy, Charles Grassley, US Department of Justice, William H. Webster

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Surveillance, Gov't Violations of Prisoner Rights

William J. Haynes.William J. Haynes. [Source: US Defense Department]William J. Haynes, Defense Secretary Donald Rumsfeld’s general counsel, shows a draft of a presidential order establishing military commissions to Colonel Lawrence J. Morris, a judge advocate general (JAG) attorney with strong experience in military justice and the laws of war. Morris heads a Pentagon legal team that has so far been excluded from the discussion on how suspected terrorists should be prosecuted. Col. Morris is given just 30 minutes to read the draft but is not allowed to keep a copy or even take notes. The next day, the Army’s Judge Advocate General, Major General Thomas J. Romig, hastily convenes a meeting of Pentagon lawyers to prepare suggestions for improvement, with an eye on bringing the order closer to existing military legal standards. The final order, however, includes none of the lawyer’s recommendations. “They hadn’t changed a thing,” a military official will later recall. [New York Times, 10/24/2004; Savage, 2007, pp. 138]

Entity Tags: Lawrence J. Morris, William J. Haynes

Timeline Tags: Torture of US Captives

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Gov't Violations of Prisoner Rights

The Army’s Judge Advocate General, Major General Thomas J. Romig, hastily meets with JAG lawyers Colonel Lawrence Morris and Brigadier General Scott Black to prepare suggestions for improving a draft presidential order establishing military commissions (see Late October 2001 and November 9, 2001), with an eye on bringing the order closer to existing military legal standards. The order is modeled on a single World War II military commission (see 1942), and ignores the body of relevant law that came after that commission, including the Uniform Code of Military Justice and the Geneva Conventions (see November 6, 2001). In their view, the Bush administration seems determined to ignore 60 years of law and go back to a rough system of justice that, Romig will later say, “was going to be perceived as unfair because it was unnecessarily archaic.” The three work through the Veterans’ Day weekend on a number of suggestions that would bring the order closer to existing military legal standards. The final order, however, will include none of the lawyer’s recommendations. “They hadn’t changed a thing,” a military official will later recall. [New York Times, 10/24/2004; Savage, 2007, pp. 137-138]

Entity Tags: Thomas J. Romig, Lawrence J. Morris, Scott Black, Bush administration (43)

Timeline Tags: Torture of US Captives

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Gov't Violations of Prisoner Rights

Vice President Cheney leads a meeting at the White House to put the finishing touches on a draft presidential order establishing military commissions (see Late October 2001 and November 9, 2001). The meeting includes Attorney General John Ashcroft, Defense Department chief counsel William J. Haynes, and several White House lawyers, but leaves out senior officials of the State Department and the National Security Council. Cheney has decided to tell neither National Security Adviser Condoleezza Rice nor Secretary of State Colin Powell about the order until it has already been signed. Cheney has also told no one in the interagency working group ostensibly formulating the administration’s approach to prosecuting terrorists (see Shortly Before September 23, 2001). Ashcroft angrily dissents from Cheney’s plan to give the White House sole authority over the commissions, and invokes his authority as the nation’s top law enforcement official to demand that the Justice Department be given a say in the decision. Cheney overrules Ashcroft’s objections. He will discuss the draft with President Bush over lunch a few days later (see November 11-13, 2001). [New York Times, 10/24/2004; Savage, 2007, pp. 138]

Entity Tags: William J. Haynes, Colin Powell, George W. Bush, John Ashcroft, Condoleezza Rice, Richard (“Dick”) Cheney

Timeline Tags: Torture of US Captives

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Detainments in US, Gov't Violations of Prisoner Rights, Government Acting in Secret

At a private lunch meeting, Vice President Cheney presents President Bush with a four-page memo, written in strict secrecy by lawyer John Yoo of the Justice Department’s Office of Legal Counsel (see November 6-10, 2001), and a draft executive order that establishes military commissions for the trial of suspected terrorists (see November 10, 2001). The legal brief mandates that foreign terrorism suspects held in US custody have no access to any courts whatsoever, civil, criminal, military, domestic, or foreign. They can be detained indefinitely without charges. If they are to be tried, they can be tried in closed “military commissions.” [White House, 11/13/2001; Savage, 2007, pp. 138; Washington Post, 6/24/2007]
Military Commissions Suitable to 'Unitary Executive' Agenda - According to author Craig Unger, military commissions are a key element of Cheney’s drive towards a “unitary executive,” the accretion of governmental powers to the presidency at the expense of the legislative and judicial branches. Federal trials for terror suspects would put them under all the legal procedures provided under the US judicial system, an unacceptable alternative. Military courts-martial would give them the rights granted by the Geneva Conventions. Military commissions, however, are essentially tribunals operating outside of both civilian and military law. Defendants have few rights. Secret evidence can be admitted without being disclosed to the defendants. Hearsay and coerced testimony are admissible. Prisoners can be held indefinitely. [Unger, 2007, pp. 221-222]
No Bureaucratic Footprints - After Bush peruses the memo and the draft order, Cheney takes them back with him to his office. After leaving Bush, Cheney takes extraordinary steps to ensure that no evidence of his involvement remains. The order passes from Cheney to his chief counsel David Addington, and then to associate White House counsel Bradford Berenson. At Berenson, the provenance of the order breaks, as no one tells him of its origin. Berenson rushes the order to deputy staff secretary Stuart Bowen with instructions to prepare it for signature immediately, without advance distribution to Bush’s top advisers. Bowen objects, saying that he had handled thousands of presidential documents without ever sidestepping the strict procedures governing coordination and review. Bowen relents only after being subjected to what he will later recall as “rapid, urgent persuasion” that Bush is standing by to sign and that the order is too sensitive to delay. Berenson will later say he understood that “someone had briefed” Bush “and gone over it” already. “I don’t know who that was.” When it is returned to Bush’s office later in the day, Bush signs it immediately (see November 13, 2001). Virtually no one else has seen the text of the memo. The Cheney/Yoo proposal has become a military order from the commander in chief.
Dodging Proper Channels - The government has had an interagency working group, headed by Pierre Prosper, the ambassador at large for war crimes, working on the same question (see Shortly Before September 23, 2001). But Cheney and Addington have refused to have any contact with Prosper’s group; one of Cheney’s team later says, “The interagency [group] was just constipated.” Cheney leapfrogged over Prosper’s group with their own proposal, performing an adroit bureaucratic move that puts their proposal in place without any oversight whatsoever, and cutting Prosper’s group entirely out of the process. When the news of the order is broadcast on CNN, Secretary of State Colin Powell demands, “What the hell just happened?” An angry Condoleezza Rice, the president’s national security adviser, sends an aide to find out. Virtually no one, even witnesses to the presidential signing, know that Cheney promulgated the order. In 2007, Washington Post reporters Barton Gellman and Jo Becker will call the episode “a defining moment in Cheney’s tenure” as vice president. Cheney has little Constitutional power, but his deft behind-the-scenes manuevering and skilled bureaucratic gamesmanship enable him to pull off coups like this one, often leaving even the highest White House officials none the wiser. “[H]e has found a ready patron in George W. Bush for edge-of-the-envelope views on executive supremacy that previous presidents did not assert,” the reporters write. [White House, 11/13/2001; Unger, 2007, pp. 221-222; Washington Post, 6/24/2007]
Quiet Contravening of US Law - Six years later, Unger will observe that few inside or outside Washington realize that Cheney has, within a matter of days, contravened and discarded two centuries of American law. He has given the president, in the words of former Justice Department lawyer Bruce Fein, “the functions of judge, jury, and prosecutor in the trial of war crimes [and] the authority to detain American citizens as enemy combatants indefinitely… a frightening power indistinguishable from King Louis XIV’s execrated lettres de cachet that occasioned the storming of the Bastille.” [Unger, 2007, pp. 223-224]

Entity Tags: Stuart W. Bowen, Office of Legal Counsel (DOJ), Richard (“Dick”) Cheney, US Department of Justice, John C. Yoo, David S. Addington, George W. Bush, Barton Gellman, Bradford Berenson, Jo Becker, Bruce Fein, Condoleezza Rice, Craig Unger, Colin Powell, Pierre-Richard Prosper

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Detainments in US, Gov't Violations of Prisoner Rights, Government Acting in Secret

President Bush’s order to establish military tribunals, or commissions, to try suspected terrorists (see November 13, 2001) is defended by Vice President Cheney, who tells reporters that the suspects subjected to such tribunals “don’t deserve to be treated as prisoners of war. They don’t deserve the same guarantees and safeguards we use for an American citizen.” Law professor Douglas Kmiec agrees. “This is the answer for what we’re dealing with: unlawful belligerents who do not come within our constitutional structure,” he says. “The president’s order is not extraordinary when one places it in the context of historic military campaigns.” Civil libertarians and administration critics disagree. Representative John Conyers (D-MI) says military commissions are based on the “thinnest legal precedents” and would “antagonize our allies and alienate the many legal immigrants in this country.” Law professor Anne-Marie Slaughter notes: “President Bush has said this is a war to bring terrorists to justice. So the real question is, what’s justice? That requires a fair trial and proof beyond a reasonable doubt, and that is not the aim of a military tribunal.” A better option, she says, would be convening an international war crimes tribunal. And law professor Joshua Rosenkranz says: “There is a natural temptation to hunker down whenever we are in crisis. But there is a danger that this hysteria-driven effort to protect to ourselves is weakening the foundations of our democracy.” [USA Today, 11/15/2001]

Entity Tags: Richard (“Dick”) Cheney, Anne-Marie Slaughter, Douglas Kmiec, Joshua Rosenkranz, John Conyers, George W. Bush

Category Tags: Impositions on Rights and Freedoms, Gov't Violations of Prisoner Rights

Scorching criticism of President Bush’s Executive Order (see November 13, 2001) comes from the Center for National Security Studies, which says it “violates separation of powers as the creation of military commissions has not been authorized by the Congress and is outside the president’s constitutional powers.” The order is also an “unconstitutional attempt to suspend the writ of habeas corpus.” [Center for National Security Studies, 11/19/2001] Law professor Kathleen Clark similarly states: “These military tribunals are troubling in many respects, particularly in their denial of basic due process protection for defendants. But even apart from this question of civil liberties, this presidential order is unconstitutional because the president lacks the authority under the constitution and statutory law to create this kind of court.” [Center for Democracy and Technology, 11/19/2001]

Entity Tags: Kathleen Clark, Center for National Security Studies

Timeline Tags: Torture of US Captives

Category Tags: Impositions on Rights and Freedoms, Detainments in US, Expansion of Presidential Power, Gov't Violations of Prisoner Rights

Justice Department lawyer John Yoo, an official with the Office of Legal Counsel (OLC), issues a classified memo to White House counsel Alberto Gonzales. The contents of the memo will remain secret, but its existence will be revealed in a June 2007 deposition filed in the course of an American Civil Liberties Union (ACLU) lawsuit. The memo is known to cover the War Crimes Act, the Hague Convention, the Geneva Conventions, the federal criminal code, and detainee treatment. [American Civil Liberties Union [PDF], 1/28/2009 pdf file] It is co-authored by OLC special counsel Robert Delahunty. [ProPublica, 4/16/2009]

Entity Tags: Robert J. Delahunty, American Civil Liberties Union, Office of Legal Counsel (DOJ), John C. Yoo, US Department of Justice

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

The newly adopted USA Patriot Act (see October 26, 2001) allows FBI field offices to issue, without court orders, so-called “national security letters,” or NSLs, that require recipients—telecommunications firms, employers, libraries, anyone—to provide detailed information on their clients, employees, and patrons. The FBI’s Office of General Counsel warns each field office of the potential for abuse inherent in such powerful and relatively unrestricted instruments, writing in part: “NSLs are powerful investigative tools in that they can compel the production of substantial amounts of relevant information. However, they must be used judiciously.… In deciding whether or not to re-authorize the broadened authority, Congress certainly will examine the manner in which the FBI exercised it. Executive Order 12333 and the FCIG [Attorney General Guidelines for FBI Foreign Intelligence Collection and Counterintelligence Investigations] require that the FB[I] accomplish its investigations through the ‘least intrusive’ means. Supervisors should keep this in mind when deciding whether or not a particular use of NSL authority is appropriate. The greater availability of NSLs does not mean that they should be used in every case.” This warning not to overuse NSLs is not always heeded (see February 2005 and Before Mid-March, 2007). [Wired News, 7/10/2007]

Entity Tags: Federal Bureau of Investigation, Office of General Counsel (FBI), USA Patriot Act

Category Tags: Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, National Security Letters

Former FBI director William Webster and eight former FBI officials publicly criticize Attorney General John Ashcroft’s post-9/11 policies (see Spring 2001, September 12, 2001, October 9, 2001, October 11, 2001, and November 9, 2001). The criticisms come less over Ashcroft’s civil liberties abrogations and more because Ashcroft’s policies violate law-enforcement common sense. By capturing suspected low-level terrorists in public sweeps, the Justice Department and the FBI lose the ability to track those suspects to their superiors in their organizations and groups. (None of the 900 or so suspects rounded up in the Ashcroft sweeps will be charged with any 9/11-related crimes—see October 20, 2001 and November 5, 2001.) [Rich, 2006, pp. 35-36] Webster says that long-term surveillance and undercover operations are much more effective than mass arrests. [Harper's, 12/4/2001] The former FBI officials also ridicule Ashcroft’s idea of interviewing 5,000 Middle Eastern men (none of whom will ever be convicted of a terrorism-related crime). Kenneth Walton, who founded the FBI’s first Joint Terrorism Task Force, says: “It’s the Perry Mason school of law enforcement, where you put them in there and they confess. Well, it just doesn’t work that way. You say, ‘Tell me everything you know,’ and they give you the recipe to Mom’s chicken soup.… It is ridiculous.” Most of those “invited” to interview never showed up, the officials note, and those who did merely answered “yes” or “no” to rote questions. [Time, 11/29/2001; Rich, 2006, pp. 35-36] Many local police officers are reluctant to participate in Ashcroft’s public sweeps. Eugene, Oregon police spokeswoman Pam Alejandere tells reporters, “Give us some legitimate reason to talk to the people—other than that they’re from the Middle East—and we’ll be glad to.” [Time, 11/29/2001]

Entity Tags: William H. Webster, John Ashcroft, Pam Alejandere, Kenneth Walton, Federal Bureau of Investigation

Category Tags: Impositions on Rights and Freedoms, Detainments in US, Other Surveillance, Gov't Violations of Prisoner Rights

Attorney General Ashcroft says, “To those who pit Americans against immigrants, citizens against non-citizens, to those who scare peace-loving people with phantoms of lost liberty, my message is this: Your tactics only aid terrorists for they erode our national unity and diminish our resolve. They give ammunition to America’s enemies and pause to America’s friends. They encourage people of good will to remain silent in the face of evil.” [CNN, 12/7/2001]

Entity Tags: John Ashcroft

Category Tags: Impositions on Rights and Freedoms, Gov't Violations of Prisoner Rights

It is reported that in the wake of 9/11, Attorney General John Ashcroft has prevented the FBI from investigating gun-purchase records to discover if any of the hundreds arrested or suspected since 9/11 had bought any guns. The White House supports him, saying they have no intention of changing the law to clarify the FBI’s ability to search gun-purchase records. [CNN, 12/6/2001; New York Times, 12/6/2001] A spokesman for The International Association of Chiefs of Police, the largest group of law enforcement executives in the US, says, “This is absurd and unconscionable. The decision has no rational basis in public safety. It sounds to me like it was made for narrow political reasons based on a right-to-bear-arms mentality.” [New York Times, 12/6/2001] There were reports that the 9/11 hijackers on at least Flight 11 and Flight 93 used guns in the hijacking (see (8:20 a.m.) September 11, 2001 and 9:27 a.m. September 11, 2001).

Entity Tags: John Ashcroft, Federal Bureau of Investigation, International Association of Chiefs of Police

Timeline Tags: Complete 911 Timeline

Category Tags: Other Legal Changes, Privacy

Page 2 of 9 (878 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike