!! History Commons Alert, Exciting News

Follow Us!

We are planning some big changes! Please follow us to stay updated and be part of our community.

Twitter Facebook

US Civil Liberties

Government Acting in Secret

Project: US Civil Liberties
Open-Content project managed by Paul, KJF, mtuck, paxvector

add event | references

Page 2 of 5 (445 events)
previous | 1, 2, 3, 4, 5 | next

Concerns that terrorists may obtain a nuclear, chemical, or biological weapon inspire the Clinton administration to assign new counterterrorism responsibilities within the federal government. After at least a year of interagency planning, President Clinton signs classified Presidential Decision Directive 39, US Policy on Counterterrorism. According to author Steve Coll, the directive is the “first official recognition by any American president” of the threat posed by terrorists using weapons of mass destruction. [Coll, 2004, pp. 318] “The acquisition of weapons of mass destruction by a terrorist group, through theft or manufacture, is unacceptable,” the directive declares. “There is no higher priority than preventing the acquisition of this capability or removing this capability from terrorist groups potentially opposed to the US.” PDD-39 is never fully disclosed to the public, but parts of it will be declassified in February 1997. The directive assigns specific counterterrorism responsibilities to the attorney general, the directors of the CIA and FBI, and the secretaries of state, defense, transportation, treasury, and energy. PDD-39 also assigns “Consequence Management” responsibilities to the Federal Emergency Management Agency (FEMA). When PDD-39 is partially declassified, a paragraph reaffirming a controversial detention policy is inadvertently disclosed. The paragraph, which is marked ”(S)” for secret, claims terrorism suspects may be detained by the US anywhere in world without the consent of the home country. “If we do not receive adequate cooperation from a state that harbors a terrorist whose extradition we are seeking, we shall take appropriate measures to induce cooperation,” the directive states. “Return of suspects by force may be effected without the cooperation of the host government, consistent with the procedures outlined in NSD-77, which shall remain in effect.” National Security Directive 77, or NSD-77, was signed by President George H. W. Bush and is entirely classified. [Presidential Decision Directive 39, 6/21/1995; White House, 6/21/1995; Associated Press, 2/5/1997; Federation of American Scientists, 9/26/2002; 9/11 Commission, 3/24/2004]

Entity Tags: George Herbert Walker Bush, William Jefferson (“Bill”) Clinton, Clinton administration

Category Tags: Impositions on Rights and Freedoms, Detainments Outside US, Gov't Violations of Prisoner Rights, Continuity of Government, Government Acting in Secret

John Yoo, the general counsel for the Senate Judiciary Committee and a former clerk for Supreme Court Justice Clarence Thomas, writes a book-length article for the California Law Review. Yoo’s article argues that under the Constitution, the president has far greater powers during wartime than is generally recognized. Basically, Yoo writes, Congress can only do two things to restrain a wartime president: restrict spending and impeach the president. The federal courts have no power over the president whatsoever. [Dubose and Bernstein, 2006, pp. xx]

Entity Tags: Senate Judiciary Committee, Clarence Thomas, John C. Yoo

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Government Acting in Secret, Government Classification, Other Surveillance

Starting in 1997, the FBI constructs a sophisticated surveillance system that can perform near-instantaneous wiretaps on almost any telephone, cell phone, and Internet communications device, according to documents declassified in August 2007. The system is called the Digital Collection System Network, or DCSNet. It connects FBI wiretapping rooms to switches controlled by land-line operators, Internet-telephony companies, and cellular providers. The documents show that DCSNet is, in reporter Ryan Singel’s words, “far more intricately woven into the nation’s telecom infrastructure than observers suspected.” Steven Bellovin, a computer science professor and surveillance expert, calls DCSNet a “comprehensive wiretap system that intercepts wire-line phones, cellular phones, SMS [short message service, a protocol allowing mobile devices to exchange text messages], and push-to-talk systems.” The system is an entire suite of software that together collects, sifts, and stores phone numbers, phone calls, and text messages. The system directly connects FBI wiretapping offices around the country to a sprawling private communications network. DCSNet is composed of three main clients:
bullet The DCS-3000, also called “Red Hook,” handles pen-registers and trap-and-traces, a type of surveillance that collects signaling information but not communications content.
bullet The DCS-6000, or “Digital Storm,” captures and collects the content—the spoken or written communications—of phone calls and text messages.
bullet The most classified system of the three, the DCS-5000, is used for wiretaps targeting spies or terrorists.
Between the three, the system can allow FBI agents to monitor recorded phone calls and messages in real time, create master wiretap files, send digital recordings to translators, track the location of targets in real time using cell-tower information, and stream intercepts to mobile surveillance vans. The entire system is operated through a private, secure and self-contained backbone that is run for the government by Sprint. Singel gives the following example: “The network allows an FBI agent in New York, for example, to remotely set up a wiretap on a cell phone based in Sacramento, California, and immediately learn the phone’s location, then begin receiving conversations, text messages and voicemail pass codes in New York. With a few keystrokes, the agent can route the recordings to language specialists for translation.” Dialed numbers are subjected to data mining, including so-called “link analysis.” The precise number of US phones being monitored and recorded in this way is classified.
Genesis of DCSNet - The system was made possible by the 1994 Communications Assistance for Law Enforcement Act (CALEA) (see January 1, 1995), which mandated that telecom providers must build “backdoors” in US telephone switches to be used by government wiretappers. CALEA also ordered telecom firms to install only switching equipment that met detailed wiretapping standards. Before CALEA, the FBI would bring a wiretap warrant to a particular telecom, and that firm would itself create a tap. Now, the FBI logs in directly to the telecom networks and monitors a surveillance target itself through DCSNet. FBI special agent Anthony DiClemente, chief of the Data Acquisition and Intercept Section of the FBI’s Operational Technology Division, says the DCS was originally intended in 1997 to be a temporary solution, but has grown into a full-featured CALEA-collection software suite. “CALEA revolutionizes how law enforcement gets intercept information,” he says. “Before CALEA, it was a rudimentary system that mimicked Ma Bell.” Now, under CALEA, phone systems and Internet service providers have been forced to allow DCSNet to access almost all of its data (see 1997-August 2007 and After).
Security Breaches - The system is vulnerable to hacking and security breaches (see 2003). [Wired News, 8/29/2007]

Entity Tags: Steven Bellovin, Ryan Singel, Federal Bureau of Investigation, Anthony DiClemente, Operational Technology Division (FBI), Communications Assistance for Law Enforcement Act (CALEA), Digital Collection System, Data Acquisition and Intercept Section (FBI), Sprint/Nextel

Category Tags: Government Acting in Secret, Government Classification, Database Programs, Other Surveillance

The Communications Assistance for Law Enforcement Act (CALEA) forces broadband Internet service providers such as Vonage to retrofit their networks for government surveillance purposes. The prime beneficiary of that retrofitting is the FBI’s cutting-edge electronic surveillance system known as DCSNet (see 1997-August 2007 and After), which can now monitor those networks. DCSNet also seems capable of handling other cutting-edge technologies such as push-to-talk, peer-to-peer telephony systems such as Skype, caller-ID spoofing, and phone-number portability. [Wired News, 8/29/2007]

Entity Tags: Digital Collection System, Communications Assistance for Law Enforcement Act (CALEA), Skype, Federal Bureau of Investigation, Vonage

Category Tags: Privacy, Impositions on Rights and Freedoms, Other Legal Changes, Government Acting in Secret, Government Classification, Other Surveillance

Some time after he is appointed CIA Director (see July 11, 1997), but before 9/11, George Tenet negotiates a series of agreements with telecommunications and financial institutions “to get access to certain telephone, Internet, and financial records related to ‘black’ intelligence operations.” The arrangements are made personally by the companies’ CEOs and Tenet, who plays “the patriot card” to get the information. The arrangement involves the CIA’s National Resources Division, which has at least a dozen offices in the US. The Division’s main aim is to recruit people in the US to spy abroad. However, in this case the Division makes arrangements so that other intelligence agencies, such as the NSA, can access the information and records the CEOs agree to provide. [Woodward, 2006, pp. 323-5] There is a history of co-operation between the CIA’s National Resources Division and the NSA. For example, Monte Overacre, a CIA officer assigned to the Division’s San Diego office in the early 1990s, said that he worked with the NSA there, obtaining information about foreign telecommunications programs and passing it on to the Technology Management Office, a joint venture between the two agencies. [Mother Jones, 1/1998] One US official will say that the arrangements only give the CIA access to the companies’ passive databanks. However, reporter Bob Woodward will say that the programme raises “serious civil liberties questions and also demonstrate[d] that the laws had not kept pace with the technology.” [Woodward, 2006, pp. 324-5] There will be an interagency argument about the program after 9/11 (see (2003 and After)).

Entity Tags: Monte Overacre, National Security Agency, Central Intelligence Agency, CIA Technology Management Office, Bob Woodward, George J. Tenet, CIA National Resources Division

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Category Tags: Other Legal Changes, Privacy, Government Acting in Secret, Government Classification, Database Programs

Princess Diana at a mine field in Angola in 1997.Princess Diana at a mine field in Angola in 1997. [Source: Tim Graham / Corbis]The NSA admits that US intelligence agencies possess 1,056 pages of classified information regarding Britain’s Princess Diana. British tabloids portray the documents as rife with salacious information on Diana’s “most intimate love secrets” about her relationship with Egyptian billionaire Dodi al-Fayed, but the actual documentation may not be so lurid. The NSA recently denied a Freedom of Information request from the Internet news service APB Online about information it has collected on Diana, who died in a tragic car accident in 1997. (It is unclear whether US intelligence has any unreleased information about the circumstances of Diana’s death. [APB Online, 11/30/1998; Washington Post, 12/12/1998] The NSA has denied monitoring Diana on the night of her death, an allegation raised by The Observer in 2006.) [MSNBC, 12/11/2006] In the two-page letter denying the request, the NSA admits to possessing a “Diana file,” but refuses to divulge what is in that file. A US intelligence official says the information is made up of conversations between other people who mentioned Diana; the references to Diana in those intercepted conversations are “incidental.” The official says Diana was never a particular target of the NSA’s Echelon surveillance program. However, the NSA has classified 124 pages of the “Diana documents” as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security.” According to a recent report by the European Parliament, the NSA routinely monitors virtually “all e-mail, telephone and fax communications… within Europe” (see July 11, 2001). Intelligence expert Steven Aftergood of the Federation of American Scientists says “the US and our allies promiscuously collect electronic communications around the world. Whether the descriptions of Echelon are accurate or not, that much is definitely true.” Some believe that lurid snippets of information leaked to the British press regarding Diana’s affair with Fayed, and her ambivalent relationship with Prince Charles, may have come from Echelon wiretaps and surveillance. Another FAS scientist, John Pike, says the NSA and other US intelligence agencies may have been monitoring Diana to protect her from terrorist attacks. Pike says it is also possible she may have been monitored because of her involvement in banning land mines, a position opposed by the Pentagon. [APB Online, 11/30/1998; Washington Post, 12/12/1998] Former NSA official Wayne Madsen will say in 2000, “[W]hen NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?” [CBS News, 2/27/2000] In August 1999, the NSA will deny another Freedom of Information request about its “Diana file” from the British newspaper The Guardian. [Guardian, 8/6/1999]

Entity Tags: Steven Aftergood, Prince Charles, The Guardian, John Pike, Dodi al-Fayed, Echelon, Federation of American Scientists (FAS), National Security Agency, Princess Diana

Category Tags: Impositions on Rights and Freedoms, Privacy, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

Phil Zimmerman, the creator of the highly regarded “Pretty Good Privacy” (PGP) protocols, sounds an alarm about the 1994 Communications Assistance for Law Enforcement Act (CALEA), which mandated that telephone providers aid government wiretapping “by installing remote wiretap ports onto their digital switches so that the switch traffic would be available for snooping by law enforcement. After CALEA passed (see January 1, 1995), the FBI no longer had to go on-site with wiretapping equipment in order to tap a line—they could monitor and digitally process voice communications from the comfort of the home office.…CALEA opened up a huge can of worms….” Zimmerman writes, “A year after the CALEA passed, the FBI disclosed plans to require the phone companies to build into their infrastructure the capacity to simultaneously wiretap 1 percent of all phone calls in all major US cities. This would represent more than a thousandfold increase over previous levels in the number of phones that could be wiretapped. In previous years, there were only about a thousand court-ordered wiretaps in the United States per year, at the federal, state, and local levels combined. It’s hard to see how the government could even employ enough judges to sign enough wiretap orders to wiretap 1 percent of all our phone calls, much less hire enough federal agents to sit and listen to all that traffic in real time. The only plausible way of processing that amount of traffic is a massive Orwellian application of automated voice recognition technology to sift through it all, searching for interesting keywords or searching for a particular speaker’s voice. If the government doesn’t find the target in the first 1 percent sample, the wiretaps can be shifted over to a different 1 percent until the target is found, or until everyone’s phone line has been checked for subversive traffic. The FBI said they need this capacity to plan for the future. This plan sparked such outrage that it was defeated in Congress. But the mere fact that the FBI even asked for these broad powers is revealing of their agenda.” [Ars Technica, 12/20/2005]

Entity Tags: Communications Assistance for Law Enforcement Act (CALEA), Federal Bureau of Investigation, Phil Zimmerman

Category Tags: Other Legal Changes, Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Other Surveillance

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Category Tags: Impositions on Rights and Freedoms, Privacy, Government Acting in Secret, Government Classification, Database Programs

The NSA’s Echelon satellite surveillance system has eavesdropped on numerous public figures, human rights organizations, charities, and even the Vatican, former British intelligence officials admit (see February 27, 2000). The NSA, which shares information with Britain, Canada, Australia, and New Zealand, has eavesdropped on, among others, Princess Diana (see November 30, 1998), Mark Thatcher (the son of former British prime minister Margaret Thatcher), the Pope, Mother Teresa, Amnesty International, Christian Aid, and others. It is unclear exactly when the NSA performed its surveillance operations, and what information it collected. The officials choose to speak out after the European Parliament announces it will open an inquiry into Echelon’s operations (see July 11, 2001). Former NSA official Wayne Madsen says, “Anybody who is politically active will eventually end up on the NSA’s radar screen.” The NSA routinely monitors charities and human rights organizations operating overseas because they often have access to information about regimes opposed to Western interests. Madsen believes the NSA spied on Diana because of her human rights work; he says that “undisclosed material held in US government files on Princess Diana was collected because of her work with the international campaign to ban landmines.” Mark Thatcher was monitored in the 1980s because of his work on the huge al-Yamamah arms contract being negotiated between Britain and Saudi Arabia. The NSA also monitored conversations by officials of the Panavia consortium, which builds the Tornado fighter plane. British Aerospace is a major partner in the consortium. “I just think of Echelon as a great vacuum cleaner in the sky which sucks everything up,” says former Canadian intelligence officer Mike Frost. “We just get to look at the goodies.” Former US computer software manager Margaret Newsham, who worked during the 1980s at the Menwith Hill listening station in Yorkshire, says, “I was aware that massive security violations were taking place. If these systems were for combating drugs or terrorism, that would be fine. But not for use in spying on individuals.” Newsham recalls being shocked when she overheard conversations by then-US senator Strom Thurmond (see April, 1988). “It was evident American constitutional laws had been broken,” she says. [London Times, 2/27/2000]

Entity Tags: Strom Thurmond, Wayne Madsen, Panavia, Princess Diana, Mother Teresa, Christian Aid, British Aerospace, Amnesty International, Echelon, European Parliament, Margaret Newsham, Margaret Thatcher, National Security Agency, Mark Thatcher, Mike Frost

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). [Truthout (.org), 1/17/2006] In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. [New York Times, 12/16/2007]

Entity Tags: Bush administration (43), National Security Agency

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, NSA Wiretapping / Stellar Wind

The National Security Agency seeks the assistance of global telecommunications corporation AT&T to help it set up a domestic call monitoring site to eavesdrop on US citizens’ phone communications, according to court papers filed in June 2006 as part of a lawsuit against AT&T (see October 2001). The NSA is expressly forbidden from spying on US citizens within US borders unless authorized by the Foreign Surveillance Intelligence Court (FISC) (see 1978). When the NSA program, which wiretaps phone and email communications often without court warrants, becomes public knowledge well over four years later (see December 15, 2005), President Bush, NSA Director Michael Hayden, and other White House and government officials will assert that the program was set up in response to the September 11, 2001 terrorist attacks. If the claims made in the lawsuit are accurate, these assertions are provably false. “The Bush administration asserted this became necessary after 9/11,” lawyer Carl Mayer will claim in 2006. “This undermines that assertion.” Unbeknownst to most Americans, the NSA is operating a secret “data mining” operation that, by 2006, will have compiled phone records and contact information on millions of domestic phone and email communications. The NSA project is code-named “Project Groundbreaker,” and is ostensibly an above-board attempt announced in June 2000 to have AT&T and other firms help modernize its technological capabilities. The project originally seeks to have AT&T build a network operations center that duplicates AT&T’s facility in Bedminster, New Jersey; this plan will be altered when the NSA decides it will be better served by acquiring the monitoring technology itself. The agency is seeking bids for a project to “modernize and improve its information technology infrastructure,” including the privatization of its “non-mission related” systems support. [TechWeb, 6/13/2000; Bloomberg, 6/30/2006] Groundbreaker’s privatization project is expected to provide up to $5 billion in government contracts to various private firms such as AT&T, Computer Sciences Corporation, and OAO Corporation, [Computerworld, 12/4/2000; Government Executive, 9/1/2001] and up to 750 NSA employees will become private contractors. Hayden, who has aggressively instituted a corporate management protocol to enhance productivity and has brought in numerous senior managers and agency executives from private defense firms, is a strong proponent of privatizing and outsourcing much of the NSA’s technological operations, and in 2001 will say that he wants the agency to focus on its primary task of breaking codes and conducting surveillance. Hayden does not admit that Groundbreaker is part of a larger NSA domestic surveillance program, [Government Executive, 9/1/2001] and publicly, NSA officials say that the project is limited to administrative and logistics functions. [Computerworld, 12/4/2000] The covert data mining portion of the project is code-named “Pioneer.” A former, unnamed employee of the NSA, [Bloomberg, 6/30/2006] and a former AT&T technician, Mark Klein, will provide the key information about Groundbreaker (see Late 2002, July 7, 2009 and December 15-31, 2005). Klein will say in 2006 that he saw the NSA construct a clandestine area within its switching center in San Francisco, and saw NSA technicians shunt fiber optic cable carrying Internet traffic into that area, which contains a large data bank and secret data mining hardware (see April 6, 2006). Klein will say he knew that the NSA built other such facilities in other switching locations. He will go on to say that the NSA did not work with just AT&T traffic; when AT&T’s network connected with other networks, the agency acquired access to that traffic as well. [Democracy Now!, 5/12/2006] The information about AT&T and the NSA will become public knowledge after the 2006 filing of a lawsuit against AT&T and other telecommunications firms (see May 12, 2006 and June 26, 2006).

Entity Tags: Mark Klein, Michael Hayden, George W. Bush, Foreign Intelligence Surveillance Court, Bush administration (43), Carl Mayer, Computer Sciences Corporation, AT&T, National Security Agency, OAO Corporation

Category Tags: Impositions on Rights and Freedoms, Privacy, Government Acting in Secret, Government Classification, Database Programs, NSA Wiretapping / Stellar Wind

The NSA asks Qwest, a major US telecommunications firm and a cutting-edge provider of high-tech wireless and Internet connectivity, to reveal information about its customers and their phone calls. Qwest’s CEO, Joe Nacchio, refuses after meeting with NSA officials and deciding that the program is illegal without court orders (see February 27, 2001). The NSA refuses to seek court authorization for its wiretaps and electronic surveillance. The NSA will renew its request from Qwest after the 9/11 attacks, and will also ask the firm to help it track suspected terrorists. Other telecommunications firms such as Verizon, AT&T, and BellSouth, will comply with the NSA’s requests (see February 2001 and Beyond).
Fears of a 'Digital Pearl Harbor' - According to a former White House official, the NSA’s primary purpose before 9/11 is to watch for computer hackers and foreign-government agents trying to hack into the government’s computer information systems, particularly those within the Defense Department. Government officials fear a “digital Pearl Harbor” if hackers were ever to seize control of those systems or other key US infrastructures. The former official will say in 2007 that the NSA’s proposal to Qwest is, “Can you build a private version of Echelon and tell us what you see?” Echelon is the NSA’s enormous signals intelligence (SIGINT) network used by the agency and its counterparts in Australia, Canada, New Zealand, and Britain. Qwest is constructing a high-speed network for phone and Internet traffic, and the NSA wants Qwest to keep records of its customers’ transactions for it. The NSA, another source will say, wants to analyze call, e-mail, and other transmissions’ traffic patters for signs of suspicious activity. The White House official will say that telecom firms such as Qwest “have an enormous amount of intelligence-gathering” capability. They don’t have to target individual customers to “look for wacky behavior,” or “groups communicating with each other in strange patterns.” Such information could augment intelligence that the NSA and other agencies were gathering from other sources, and enable the NSA to collect the information it wants without violating laws prohibiting it and other intelligence agencies from directly gathering data on US citizens.
Ill Will from NSA - Nacchio’s refusal to go along with the NSA’s request garners it some ill will among the US intelligence community, the former White House official will say. Nacchio will contend that because of his refusal, the NSA denied Qwest a lucrative government contract. A former high-level intelligence official will add that other telecom companies had little problem agreeing to the NSA’s requests. Nacchio believes that the NSA’s request is illegal under the Telecommunications Act without court orders; the former White House official will acknowledge that it might violate the 1986 Electronic Communications Privacy Act. After 9/11, that law will be amended by the USA Patriot Act to give the government more room to monitor US citizens.
Qwest, Other Telecom Firms Cooperative with Other Agencies - Qwest is apparently less reluctant to share other information with the Pentagon. Qwest began sharing its technology and information as far back as 1997 (see 1997). In May 2001, Commerce Secretary Don Evans will tell the Senate Appropriations Committee that his department helped persuade Qwest to “share proprietory information with the Defense Department to evaluate the vulnerability of its network.” Qwest, which serves the Rocky Mountain and West Coast regions of the country, covers the areas that house some of the military’s most important command-and-control facilities, including the US Strategic Command. In the 1990s, Qwest began actively pursuing contracts with the Defense Department to build more modern, private, secure networks for defense and intelligence agencies. [National Journal, 11/2/2007]
Meetings with Bush Officials - In court documents filed in 2006 to challenge his prosecution for insider trading and, in heavily redacted form, released to the public in 2007, Nacchio will indicate that telecom executives met frequently with Bush administration officials before 9/11, including Deputy Defense Secretary Paul Wolfowitz, National Security Adviser Condoleezza Rice, NSA Director Michael Hayden, and counterterrorism “tsar” Richard Clarke. Many telecom firms are working closely with the government to develop highly classified operations, including joint networks to which the government will have unfettered access. The future director of national intelligence, Mike McConnell, works with telecom firms to expand the cooperation between the telecom industry and the federal government. [Salon, 10/15/2007]

Entity Tags: Condoleezza Rice, US Department of Defense, Bush administration (43), Verizon Communications, AT&T, US Department of Commerce, Senate Appropriations Committee, US Strategic Command, BellSouth, Donald L. Evans, Echelon, Richard A. Clarke, Qwest, Mike McConnell, National Security Agency, Joe Nacchio, Paul Wolfowitz

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

According to a 2006 lawsuit against three major US telecommunications firms that alleges the companies illegally cooperated with the NSA’s warrantless surveillance program (see May 12, 2006), NSA officials meet with AT&T officials to discuss that firm’s participation. (Days later, NSA officials will also meet with officials from Qwest, who refuse to cooperate—see February 27, 2001). The officials discuss replicating an AT&T network center in Bedminster, New Jersey, to give the agency access to all the global phone and e-mail traffic that runs through it. According to an AT&T engineer’s court statements, the NSA officials want to “listen in” with unfettered access to communications that they believe may have intelligence value, as well as the ability to store those communications for later review. There is no discussion of limiting the monitoring to international communications, the engineer says: “At some point, I started feeling something isn’t right.” Two other AT&T employees will contradict the engineer’s claims, saying that the NSA merely wanted to upgrade its own internal communications. The lawsuit’s legal counsel, Bruce Afran and Carl Mayer, will say that internal AT&T documents can verify the engineer’s account. Mayer will say that the engineer sees “decisive evidence that within two weeks of taking office, the Bush administration was planning a comprehensive effort of spying on Americans’ phone usage.” [New York Times, 12/16/2007]

Entity Tags: Bruce Afran, AT&T, Carl Mayer, National Security Agency, Qwest

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, Database Programs, NSA Wiretapping / Stellar Wind

Verizon gives the NSA access from within its facilities.Verizon gives the NSA access from within its facilities. [Source: ReallyNews.com]AT&T, Verizon, and BellSouth all cooperate with the NSA in monitoring US citizens’ phone and Internet communications (see October 2001). Qwest, however, refuses to cooperate (see February 27, 2001). Qwest officials are unsure that it is legal to hand over customer information to the government without court warrants. The firm’s refusal to participate in the program leaves a gaping hole in the NSA’s database, with the NSA only getting partial coverage of US citizens in the West and Northwest. Until recently, AT&T and other phone companies have routinely insisted on court warrants before turning over call data to government agencies, protocols growing out of the historical concerns of the Bell Telephone system for customer service and privacy. Gene Kimmelman of the Consumers Union will say in 2006 that such insistence on court warrants was a bedrock principle of the Bell systems. “No court order, no customer information—period.” he says. “That’s how it was for decades.” The Bell system was also concerned with following the law, specifically the Communications Act of 1934, which prohibits telephone companies from giving out such information without court orders. President Bush and other government officials will later say that his 2002 executive order allowing the NSA to wiretap American phones without warrants (see Early 2002) gives the telephone companies legal cover, but many legal experts and civil liberties groups disagree. After 9/11, the NSA approaches the four companies with offers to pay for US citizens’ call histories and for updates, which would allow the agency to track citizens’ phone habits. Three of the four agree to the NSA proposal, but again Qwest does not. An AT&T spokesman will say in May 2006, “We do not comment on matters of national security, except to say that we only assist law enforcement and government agencies charged with protecting national security in strict accordance with the law.” BellSouth will say that the company “does not provide any confidential customer information to the NSA or any governmental agency without proper legal authority.” Verizon will add that the company acts “in full compliance with the law and we are committed to safeguarding our customers’ privacy.” Neither AT&T nor Qwest will comment at all. [USA Today, 5/11/2006] The NSA asks Qwest to install monitoring equipment on its “Class 5” switching facilities, which monitor the most localized calls as well as some international traffic. The NSA claims it will only single out foreigners on Qwest’s network. In 2006, a government official will say that the CEO of Qwest, Joe Nacchio, misunderstood what the agency was asking. [New York Times, 12/16/2007]
Qwest Refuses to Cooperate - In 2006, sources will recall that at the time of the NSA requests, Nacchio is so disturbed by the idea of the NSA wiretapping phones without warrants, and is so unsure of what information would be collected and how it might be used, that he decides the company will not cooperate. The NSA tells Qwest and the other companies that not only would it compile and maintain data on US citizens’ phone habits, but it may well share that information with other US government agencies, including the CIA, the Drug Enforcement Administration, and the FBI. Indeed, the NSA shares what it calls “product” with other intelligence agencies, and perhaps with other governmental agencies. After Nacchio decides not to comply with the NSA’s request, the agency begins pressuring the firm, accusing it of threatening national security and implying that Qwest might not be eligible for future governmental contracts. When Qwest asks the NSA to take its proposal to the FISA Court (FISC), the agency refuses, making Qwest that much more dubious about the NSA operation, especially when NSA lawyers say they won’t take the proposal to FISC because that court “might not agree with them.” The NSA also refuses to ask for authorization from the attorney general’s office. Nacchio will leave Qwest under fire for allegedly misleading shareholders about the company’s financial prospects, but his successor, Richard Notebaert, continues to refuse to cooperate with the NSA. [USA Today, 5/11/2006; USA Today, 5/11/2006] Interestingly, by 2004 the Federal Communications Commission will list Qwest and Verizon as essentially the same company. [Federal Communications Commission, 12/10/2004]
Other Firms Deny Participation - In May 2006, after USA Today reports on the telecom firms’ participation in the surveillance (see May 11, 2006), both Verizon and BellSouth will deny providing the NSA with data on their customers, though they have previously acknowledged their cooperation (see February 5, 2006). A BellSouth spokesman will say, somewhat ingenuously, “We’re not aware of any database that NSA has, so we’re not aware of our customer information being there at all.” And Verizon conspicuously fails to mention possible data from MCI, the long-distance provider it has recently bought. Senator Patrick Leahy (D-VT) will say of the various companies’ participations, “The thing that concerns me is some [companies] said yes and some said no” when asked to participate. “If the government really thought this was legal and necessary, why let some say yes and some say no? It’s either legal and necessary, or it’s not.” [USA Today, 5/16/2006]

Entity Tags: Patrick J. Leahy, Qwest, Richard Notebaert, Verizon Communications, National Security Agency, USA Today, George W. Bush, Joe Nacchio, Foreign Intelligence Surveillance Court, BellSouth, Central Intelligence Agency, AT&T, Consumers Union, Federal Bureau of Investigation, Drug Enforcement Administration, Gene Kimmelman, Federal Communications Commission

Category Tags: Impositions on Rights and Freedoms, Privacy, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, NSA Wiretapping / Stellar Wind

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, NSA Wiretapping / Stellar Wind

Vice President Cheney’s top aide, David Addington, begins attending meetings of the Cheney energy task force, further emphasizing the White House’s refusal to cooperate with the General Accounting Office (GAO—see April 19 - May 4, 2001, May 8, 2001, and May 16 - 17, 2001). White House lawyer Bradford Berenson, the legal liaison on the case, is puzzled by the White House’s refusal to cooperate. Most of the information about the task force has already come out in the media, particularly the fact that almost all of the task force’s meetings have been with fossil fuel and nuclear energy corporate executives. But the White House seems willing to weather the controversy in order to keep withholding information from the GAO. In 2007, author Charlie Savage will write, “The long-term payoff was an opportunity to establish a high principle of presidential power: Communications involving the office of the presidency should be secret, whatever a law passed by Congress and signed by some previous president might say.” Addington further enforces the doctrine during the regular morning meetings at the White House counsel’s office, even though he does not work for senior White House counsel Alberto Gonzales. [Savage, 2007, pp. 90-91]

Entity Tags: Charlie Savage, Bradford Berenson, Bush administration (43), General Accounting Office, National Energy Policy Development Group, Richard (“Dick”) Cheney, David S. Addington

Category Tags: Expansion of Presidential Power, Government Acting in Secret

Glyn Ford.Glyn Ford. [Source: British Labour Party]The European Parliament releases its final report on its findings about the secretive US surveillance program known as Echelon. The report, two years in the making, exhaustively details many of Echelon’s surveillance capabilities, and lists many of Echelon’s surveillance stations around the world. One of the more interesting sections of the report concerns its apparent use on behalf of US corporations. According to the report, Echelon—operated by the NSA as a highly classified surveillance program ostensibly for tracking terrorist threats and activities by nations hostile to the West—is also being used for corporate and industrial espionage, with information from the program being turned over to US corporations for their financial advantage. The report gives several instances of Echelon’s use by corporations. One is the use of Echelon to “lift… all the faxes and phone calls” between the European aircraft manufacturer Airbus and Saudi Arabian Airlines; that information was used by two American companies, Boeing and McDonnell Douglas, to outflank Airbus and win a $6 billion contract. The report also alleges that the French company Thomson-CSF lost a $1.3 billion satellite deal to Raytheon the same way. Glyn Ford, the MP who commissioned the report, says he doesn’t have a problem with Echelon itself, but in the way it is being used. “Now, you know, if we’re catching the bad guys, we’re completely in favor of that… What we’re concerned about is that some of the good guys in my constituency don’t have jobs because US corporations got an inside track on—on some global deal.” [Washington Post, 11/14/1999; CBS News, 2/27/2000; BBC, 7/6/2000; European Parliament, 7/11/2001] In 1977, the US government began providing Echelon-based intelligence to US corporations (see 1977). In April 2001, New Zealand journalist Nicky Hager testified about Echelon’s use by US allies for corporate and economic purposes (see April 2001), and former CIA director James Woolsey confirmed that US surveillance programs were used to benefit US corporations (see March 2000).

Entity Tags: US Department of Commerce, Thomson-CSF, Saudi Arabian Airlines, Glyn Ford, McDonnell Douglas, Central Intelligence Agency, Boeing Company, Echelon, Airbus, European Parliament, National Security Agency

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind, Other Surveillance

Marc Rich.Marc Rich. [Source: Huffington Post]Former president Bill Clinton reacts angrily to edited transcripts of private conversations with former Israeli prime minister Ehud Barak, in which Barak requested that Clinton pardon fugitive American financier Marc Rich (see August 21, 2001 and Early September, 2001). The transcripts were edited and released to the public by House Government Reform Committee chairman Dan Burton (R-IN) as part of his investigation into whether Clinton acted improperly in pardoning Rich. After reading the transcripts, Clinton thinks that Burton has selectively edited them, and giving a false impression of the nature and content of the conversations between himself and Barak. Clinton asks the White House, which had provided Burton with copies of the tapes of the conversations, to release all of the relevant portions of the transcripts, which he says will portray the conversations in a different light. But the White House refuses, saying the remaining portions of the transcripts are now classified. [Dean, 2004, pp. 85-86]
'Hating Bill Clinton' - The classification of the documents is quite sudden. Earlier in the month, a White House spokesperson said that the release of the Clinton-Barak transcripts was nothing more than part of their efforts to make more information available to Congress. “The excerpts were not classified,” the spokesperson said. “The decision to make the documents available was entirely consistent with past practice. You don’t just slap Top Secret on a whole document.” However, some observers dispute this. “Given the secrecy that the Bush-Cheney administration has pursued, it’s inconceivable that they would turn this information over if it affected President Bush,” says Phil Schiliro, the Democratic staff director for the House Government Reform Committee, which is trying in vain to secure information from the White House about the Cheney Energy Task Force. Lynne Weil, the press secretary for the Senate Foreign Relations Committee, calls the sudden decision to classify the previously unclassified transcripts “highly unusual.” She adds, “People who have worked for the Foreign Relations Committee for years can’t recall the last time such a thing happened.” The National Security Archives’s Tom Blanton welcomed the original disclosure of the conversations, but says it came not from a sudden desire for transparency from the Bush administration, but from a desire to smear Clinton. The Bush administration passionately believes in secrecy, a belief rooted in its collective ideology, says Blanton. When asked why that same ideological concern didn’t extend to the Clinton-Barak transcripts, Blanton replies that the question ignores “a rather more focused version of that ideology that’s about hating Bill Clinton.”
Violation of Procedure - Typically, the Bush administration turns down requests such as Burton’s for private presidential conversations. However, White House counsel Alberto Gonzales decided to turn them over. At that point, Clinton could have attempted to block the release of the transcripts by invoking executive privilege, a move that may have cast him in a poor light politically. But the events as carried out by Burton and the White House—breaking with precedent to release potentially embarrassing transcripts, edit those transcripts to make their contents appear more damning than they actually are, then retroactively classify the remainder of the transcripts—is highly unusual. [Salon, 2/7/2002; Dean, 2004, pp. 85-86]

Entity Tags: Energy Task Force, Ehud Barak, Bush administration (43), Alberto R. Gonzales, William Jefferson (“Bill”) Clinton, Tom Blanton, National Security Archives, Phil Schiliro, Senate Foreign Relations Committee, Marc Rich, House Committee on Government Reform, Lynne Weil, Dan Burton

Category Tags: Expansion of Presidential Power, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification

Dan Burton (R-IN), the chairman of the House Government Reform Committee, asks for more than twelve sets of internal Justice Department documents that detail purported fund-raising abuses by the 1996 presidential campaign of Bill Clinton and Al Gore. Burton also wants documents relating to the FBI’s use of mob informants by its Boston office, where evidence indicates that the office literally let the informants get away with murder and suppressed evidence that allowed an innocent man to go to prison. Burton’s request causes a dilemma for the White House. On the one hand, President Bush and Vice President Cheney have given explicit instructions for staffers to resist such calls for information. On the other hand, when Burton had delved into the questions surrounding Clinton’s last-minute pardons, Bush had already given him unprecedented access to Clinton’s private conversations (see August 21, 2001). Burton immediately released edited transcripts of the tapes (see August 21, 2001). The administration ponders whether or not to release the documents, and in the process perhaps further impugn Clinton, or to refuse, preserving their standard of executive privilege. It will eventually come down on the side of secrecy (see December 13, 2001). [Dean, 2004, pp. 85-86]

Entity Tags: William Jefferson (“Bill”) Clinton, Richard (“Dick”) Cheney, US Department of Justice, Ehud Barak, Albert Arnold (“Al”) Gore, Jr., Bush administration (43), Dan Burton, George W. Bush, Federal Bureau of Investigation, House Committee on Government Reform

Category Tags: Expansion of Presidential Power, Government Acting in Secret, Government Classification

David Addington.David Addington. [Source: David Bohrer / White House]According to an in-depth examination by the Washington Post, within hours of the 9/11 attacks, Vice President Dick Cheney begins working to secure additional powers for the White House. Cheney had plans in place to begin acquiring these powers for the executive branch before the attacks, but had not begun to execute them.
Gathering the Team - David Addington, Cheney’s general counsel and legal adviser, had been walking home after having to leave the now-evacuated Eisenhower Executive Office Building. He receives a message from the White House telling him to turn around, because the vice president needs him. After Addington joins Cheney in the Presidential Emergency Operations Center (PEOC) below the East Wing of the White House, the pair reportedly begin “contemplating the founding question of the legal revolution to come: What extraordinary powers will the president need for his response?” Later in the day, Addington connects by secure video with Timothy Flanigan, the deputy White House counsel, who is in the White House Situation Room. John Yoo, the deputy chief of the Office of Legal Counsel, is also patched in from the Justice Department’s command center. White House counsel Alberto Gonzales joins them later. This forms the core legal team that Cheney will oversee after the terrorist attacks. Associate White House counsel Bradford Berenson will later recall: “Addington, Flanigan and Gonzales were really a triumvirate. [Yoo] was a supporting player.” Addington dominates the group. Gonzales is there primarily because of his relationship with President Bush. He is not, Yoo will later recall, “a law-of-war expert and [doesn’t] have very developed views.” Along with these allies, Cheney will provide what the Washington Post calls “the rationale and political muscle to drive far-reaching legal changes through the White House, the Justice Department, and the Pentagon,” which will free the president to fight the war on terror, “as he saw fit.”
Drafting the AUMF - The team begins drafting the document that will become the Authorization to Use Military Force (AUMF—see October 10, 2002) passed by Congress for the assault on Afghanistan. In the words of the group, the president is authorized “to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States.”
Extraordinarily Broad Language - The language is extraordinarily broad; Yoo will later explain that they chose such sweeping language because “this war was so different, you can’t predict what might come up.” The AUMF draft is the first of numerous attempts to secure broad powers for the presidency, most justified by the 9/11 attacks. The Washington Post will later report, “In fact, the triumvirate knew very well what would come next: the interception—without a warrant—of communications to and from the United States” (see September 25, 2001). [CNN, 9/11/2001; CNN, 9/12/2001; Unger, 2007, pp. 220-221; Washington Post, 6/24/2007]

Entity Tags: Richard (“Dick”) Cheney, John C. Yoo, Timothy E. Flanigan, Craig Unger, Bradford Berenson, David S. Addington, Alberto R. Gonzales

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Category Tags: Expansion of Presidential Power, Government Acting in Secret

The emergency operations facility in Mount Weather, Bluemont,  Virginia (the entrance is shown on the left and the interior blast door is shown on the right). This is one of the Continuity of Government bunkers used on 9/11.The emergency operations facility in Mount Weather, Bluemont, Virginia (the entrance is shown on the left and the interior blast door is shown on the right). This is one of the Continuity of Government bunkers used on 9/11. [Source: ABC News] (click image to enlarge)It is later revealed that only hours after the 9/11 attacks, a US “shadow government” is formed. Initially deployed “on the fly,” executive directives on Continuity of Government in the face of a crisis that date back to the Reagan administration are put into effect. Approximately 100 midlevel officials are moved to underground bunkers and stay there 24 hours a day. Presumably among them are a number of FAA managers, members of a designated group of “shadow” managers, who slip away from their usual activities around midday. Officials rotate in and out of the shadow government on a 90-day cycle. While the measure is initially intended only as a temporary precaution, due to further assessment of the risk of terrorism, the White House will decide to make it a permanent feature of “the new reality.” A senior official tells CNN that major factors are the concern that al-Qaeda could have gained access to a crude nuclear device, and the “threat of some form of catastrophic event.” However, this same official will admit that the US has no confirmation, and “no solid evidence,” that al-Qaeda has such a nuclear device, and says that the consensus among top US officials is that the likelihood of this is “quite low.” When the existence of the shadow government is later revealed, some controversy will arise because it includes no Democrats. In fact, top congressional Democrats will remain unaware of it until journalists break the story months later. [CNN, 3/1/2002; Washington Post, 3/1/2002; CBS News, 3/2/2002; Freni, 2003, pp. 75]

Entity Tags: US Congress, United States

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Category Tags: Government Acting in Secret, Continuity of Government

In the months following 9/11, Vice President Dick Cheney spends large portions of his time in what are referred to as “secure and undisclosed” locations. [CNN, 3/1/2002] He is accompanied to these locations by those considered his “essential staff.” This includes his chief of staff, I. Lewis “Scooter” Libby, and Libby’s assistant, Jennifer Mayfield; Cheney’s personal secretary, Debbie Heiden; his personal aide, Brian McCormack; one of his military aides; and either his counsel, David Addington, or his staff secretary, Neil Patel.
Staff Ordered to Maintain Secrecy - Cheney’s personnel are ordered not to mention the vice president’s name or title on the phone; his schedule is to go out only over secure fax or classified e-mail; and all members of his staff must always keep a packed bag ready at the office. According to journalist and author Stephen Hayes, the “secure undisclosed location” the vice president goes to is usually Camp David, the presidential retreat in Maryland, although there are other locations. [Hayes, 2007, pp. 349]
Maintaining the 'Continuity of Government' - Cheney explains to PBS the reasoning behind his going to these locations: “[W]ith the possibility that the White House or the Capitol or other facilities here [in Washington] could be targeted in a terrorist attack… it’s not a good practice for the president and I to spend a lot of time together.… [I]t’s important from the standpoint of our responsibility to maintain the continuity of government to always see to it that nobody—no adversary or enemy would have the capacity of, in effect, decapitating the federal government by taking out the president and the vice president and other senior management, senior leadership.” [PBS, 10/12/2001] Yet, despite the supposed danger, he still goes ahead with a pre-planned pheasant-hunting trip in early November (see (November 4-5, 2001)). Cheney’s time at the “secure and undisclosed” locations is part of “shadow government” procedures that are implemented following the 9/11 attacks (see (2:00 p.m.) September 11, 2001). [CNN, 3/1/2002] In interviews, he never mentions that he had similarly gone away to undisclosed locations on a regular basis throughout the 1980s, during a series of Continuity of Government exercises (see 1981-1992). [Mann, 2004, pp. 138-139 and 296; Atlantic Monthly, 3/2004]

Entity Tags: Neil Patel, Richard (“Dick”) Cheney, Jennifer Mayfield, Debbie Heiden, Lewis (“Scooter”) Libby, Brian McCormack, David S. Addington

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Category Tags: Government Acting in Secret, Continuity of Government

The FBI dramatically escalates its warrantless wiretaps of US citizens, most without the proper paperwork or oversight. The public will not learn of the FBI wiretapping program until October 2005, when classified documents will be made available to the Electronic Privacy Information Center (EPIC), an advocacy group that will sue the Justice Department for records relating to the Patriot Act. According to those documents, which are heavily redacted, the FBI conducts clandestine surveillance on some US residents for 18 months and even longer. The FBI will also internally investigate at least 287 violations of its use of secret surveillance against US citizens. One target will be kept under surveillance for over five years, including a 15-month stretch where the FBI fails to notify Justice Department lawyers after the subject moves from New York to Detroit. According to an FBI investigation, that delay is a violation of department guidelines and will prevent the department “from exercising its responsibility for oversight and approval of an ongoing foreign counterintelligence investigation of a US person.” Other cases involve agents obtaining e-mails after warrants expire, seizing bank records without authorization, and conducting improper “unconsented physical search(es).” EPIC’s general counsel, David Sobel, will say in October 2005 that the classified documents indicate possible misconduct by the FBI in counterintelligence investigations, and highlight the need for greater congressional oversight of clandestine surveillance within the United States. “We’re seeing what might be the tip of the iceberg at the FBI and across the intelligence community,” Sobel will say. “It indicates that the existing mechanisms do not appear adequate to prevent abuses or to ensure the public that abuses that are identified are treated seriously and remedied.” The FBI will counter by insisting that all of the infractions are minor, mostly what it calls administrative errors, and that any information obtained improperly is quarantined and eventually destroyed. One senior FBI official will say, “Every investigator wants to make sure that their investigation is handled appropriately, because they’re not going to be allowed to keep information that they didn’t have the proper authority to obtain. But that is a relatively uncommon occurrence. The vast majority of the potential [violations] reported have to do with administrative timelines and time frames for renewing orders.” Catherine Lotrionte, the counsel for the President’s Foreign Intelligence Advisory Board, which is tasked with overseeing the FBI’s domestic surveillance operations, will refuse to disclose any details of any of the FBI violations, saying most of its work is classified and covered by executive privilege. The surveillance operations are conducted under the aegis of the Foreign Intelligence Surveillance Act (see 1978), whose threshold for such surveillance is lower than for criminal warrants. In 2004 alone, over 1,700 new cases will be opened by the secret Foreign Intelligence Surveillance Court. [Washington Post, 10/24/2005] Though Bush officials eventually admit to beginning surveillance of US citizens after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Foreign Intelligence Advisory Board, Federal Bureau of Investigation, Catherine Lotrionte, Electronic Privacy Information Center, David Sobel, US Department of Justice, Foreign Intelligence Surveillance Court

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, Other Surveillance

After the 9/11 attacks, the Bush administration seizes the new opportunities to expand the power of the presidency that present themselves as part of the government’s response to the attacks (see (After 10:00 a.m.) September 11, 2001). The Bush-Cheney legal team, largely driven by Vice President Dick Cheney and his staff (see January 21, 2001), aggressively pushes for new opportunities to expand executive branch authorities.
'Bravado,' 'Close-Minded Group of Like-Minded People' - A senior White House official later tells author and reporter Charlie Savage of the “pervasive post-9/11 sense of masculine bravado and one-upmanship when it came to executive power.” In Savage’s words, and quoting the official, “a ‘closed group of like-minded people’ were almost in competition with one another, he said, to see who could offer the farthest-reaching claims of what a president could do. In contrast, those government lawyers who were perceived as less passionate about presidential power were derided as ‘soft’ and were often simply cut out of the process” (see also September 25, 2001).
Suspicion of Oversight - “The lawyers for the administration felt a tremendous amount of time pressure, and there was a lot of secrecy,” the official will say. “These things were being done in small groups. There was a great deal of suspicion of the people who normally act as a check inside the executive branch, such as the State Department, which had the reputation of being less aggressive on executive power. This process of faster, smaller groups fed on itself and built a dynamic of trying to show who was tougher on executive power.”
Addington and Yoo: Outsized Influence - While nominally the leaders of the White House legal team are Attorney General John Ashcroft and White House counsel Alberto Gonzales, neither has as much influence as lawyers and staffers ostensibly of lower rank than themselves. Ashcroft is a vociferous supporter of the administration’s anti-terrorism policies, but is not a member of Bush’s inner circle and sometimes disagrees with the White House’s legal moves. Neither Ashcroft nor Gonzales have prior experience dealing with the legal issues surrounding executive power and national security. Two of the driving forces behind the White House’s push for more presidential power are Cheney’s chief counsel, David Addington, and an obscure deputy in the Office of Legal Counsel (OLC), John Yoo. Because of a dispute between Ashcroft and the Bush inner circle over who should lead the OLC, there is no official chief of the OLC until November 2002, leaving Yoo and his fellows free to be as aggressive as they like on expanding presidential power and handling the war on terrorism. When the OLC chief, law professor Jay Bybee, finally arrives, he, like Ashcroft and Gonzales, finds himself hampered by his lack of knowledge of the law as it pertains to national security. Savage will later write, “When he finally started work, Bybee let deputies continue to spearhead the review of matters related to the war on terrorism.” Yoo is only a deputy assistant attorney general, but he has “signing power”—the ability to make his opinion legally binding—and is rarely reviewed by his peers because much of his work is classified. [Savage, 2007, pp. 76-78] As for Addington, Lawrence Wilkerson, the chief of staff for Secretary of State Colin Powell, will later say that he was the leader of the small but highly influential group of lawyers “who had these incredible theories and would stand behind their principles [Cheney, Bush, and others], whispering in their ears about these theories, telling them they have these powers, that the Constitution backs these powers, that these powers are ‘inherent’ and blessed by God and if they are not exercised, the nation will fall. He’d never crack a smile. His intensity and emotions and passion for these theories are extraordinary.” [Savage, 2007, pp. 84]

Entity Tags: US Department of State, Lawrence Wilkerson, Alberto R. Gonzales, Bush administration (43), Charlie Savage, David S. Addington, Jay S. Bybee, Richard (“Dick”) Cheney, John C. Yoo, John Ashcroft

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Government Acting in Secret

According to columnist and defense expert William M. Arkin, the Bush administration updates the civil disturbance plan known as Operation Garden Plot. This military plan was first established in the late 1960s to deal with anti-war protests and urban riots (see Winter 1967-1968). Arkin reports: “The Army’s ‘Operation Garden Plot,’ a plan formulated in the 1960s for dealing with large civil disturbances, has been dusted off and updated to focus mostly on military intervention in response to a domestic event involving weapons of mass destruction.… Special Operations Command, and more specifically the super-secret Delta Force, now have a role in thwarting and responding to domestic terrorist incidents.” [Los Angeles Times, 5/26/2002]

Entity Tags: US Special Operations Command, 1st Special Forces Operational Detachment--Delta, Bush administration (43), US Department of Defense

Category Tags: Impositions on Rights and Freedoms, Government Acting in Secret

Congress explicitly refuses to grant the Bush administration the authority to conduct warrantless wiretaps and surveillance operations against US citizens in its resolution authorizing the use of military force (AUMF) against terrorists (see September 14-18, 2001). Tom Daschle (D-SD), the Senate Majority Leader, will write in December 2005 (after his ouster from Congress in November 2004) that the White House and the Justice Department will claim, falsely, that the AUMF grants the right for the NSA to conduct such a program (see Early 2002 and December 15, 2005). Instead, Daschle will write, the NSA merely usurps the authority, with the president’s approval, to conduct such an extralegal surveillance program (see December 21-22, 2005). [Washington Post, 12/22/2005]
Administration Efforts to Rewrite AUMF - In an op-ed for the Washington Post, Daschle will observe that the AUMF authorizes Bush “to use all necessary and appropriate force against those nations, organizations or persons” who “planned, authorized, committed or aided” the 9/11 attacks. But, Daschle will write, “Literally minutes before the Senate cast its vote, the administration sought to add the words ‘in the United States and’ after ‘appropriate force’ in the agreed-upon text. This last-minute change would have given the president broad authority to exercise expansive powers not just overseas—where we all understood he wanted authority to act—but right here in the United States, potentially against American citizens. I could see no justification for Congress to accede to this extraordinary request for additional authority. I refused.”
No Vote for Domestic Surveillance - Daschle will also write that the White House attempted to add draft language to the AUMF resolution that would give the administration new and sweeping authority to use force to “deter and pre-empt any future acts of terrorism or aggression against the United States,” even against nations and organizations not responsible for the 9/11 attacks. Bush officials such as Vice President Dick Cheney will claim that the AUMF “granted authority by the Congress to use all means necessary to take on the terrorists, and that’s what we’ve done.” But Daschle will write that Cheney is mistaken. “As Senate majority leader at the time, I helped negotiate that law with the White House counsel’s office over two harried days. I can state categorically that the subject of warrantless wiretaps of American citizens never came up. I did not and never would have supported giving authority to the president for such wiretaps. I am also confident that the 98 senators who voted in favor of authorization of force against al-Qaeda did not believe that they were also voting for warrantless domestic surveillance.” On September 12, six days before the September 18 AUMF vote, Bush officials demand that Congress authorize the use of military force to, in their words, “deter and pre-empt any future acts of terrorism or aggression against the United States.” But Congress refuses, feeling that the request is “too broad and ill defined.” Instead, on September 14, Congress choses to use language that authorizes Bush to use “all necessary and appropriate force against those nations, organizations or persons [the president] determines planned, authorized, committed or aided” the 9/11 attacks. Daschle later writes, “With this language, Congress denied the president the more expansive authority he sought and insisted that his authority be used specifically against Osama bin Laden and al-Qaeda.… The shock and rage we all felt in the hours after the attack were still fresh. America was reeling from the first attack on our soil since Pearl Harbor. We suspected thousands had been killed, and many who worked in the World Trade Center and the Pentagon were not yet accounted for. Even so, a strong bipartisan majority could not agree to the administration’s request for an unprecedented grant of authority.” Instead, Daschle will write, the administration simply takes the authority anyway, and will argue in hindsight that the AUMF actually gives the administration the right to wiretap US citizens. However, Daschle will write, “at the time, the administration clearly felt they [didn’t have the authority] or it wouldn’t have tried to insert the additional language.”
Breeding 'Fear and Suspicion' - He concludes, “[T]here are right and wrong ways to defeat terrorists, and that is a distinction this administration has never seemed to accept. Instead of employing tactics that preserve Americans’ freedoms and inspire the faith and confidence of the American people, the White House seems to have chosen methods that can only breed fear and suspicion. If the stories in the media over the past week are accurate [detailing the breadth and apparent illegality of the NSA program], the president has exercised authority that I do not believe is granted to him in the Constitution, and that I know is not granted to him in the law that I helped negotiate with his counsel and that Congress approved in the days after Sept. 11. For that reason, the president should explain the specific legal justification for his authorization of these actions, Congress should fully investigate these actions and the president’s justification for them, and the administration should cooperate fully with that investigation. In the meantime, if the president believes the current legal architecture of our country is insufficient for the fight against terrorism, he should propose changes to our laws in the light of day. That is how a great democracy operates. And that is how this great democracy will defeat terrorism.” [Washington Post, 12/23/2005]

Entity Tags: National Security Agency, Al-Qaeda, Bush administration (43), Washington Post, Tom Daschle, US Department of Justice, Osama bin Laden, Authorization to Use Military Force (AUMF), Richard (“Dick”) Cheney

Category Tags: Other Legal Changes, Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

Shortly after the 9/11 attacks, the NSA expands surveillance operations, relying on its own authorities; some sources indicate this includes a massive domestic data mining and call tracking program, and some contend that it is illegal. In a 2006 public briefing, NSA Director Michael Hayden will say, “In the days after 9/11, NSA was using its authorities and its judgment to appropriately respond to the most catastrophic attack on the homeland in the history of the nation.” Following an October 1 briefing by Hayden to the House Intelligence Committee, Representative Nancy Pelosi (D-CA) will write to Hayden on October 11, saying, “[Y]ou indicated that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance” (see October 11, 2001). Some evidence indicates NSA domestic surveillance began even before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Nancy Pelosi, 1/6/2006; Michael Hayden, 1/23/2006]
No Connection to Bush-Authorized Warrantless Domestic Call Monitoring - In his 2006 remarks, Hayden will clearly distinguish between the expansion he initiates under his own authorities, and the warrantless monitoring of calls with one end outside the US authorized later by President Bush (see October 4, 2001), saying, “[E]xcept that they involved NSA, these [Hayden-authorized] programs were not related… to the authorization that the president has recently spoken about.” [Michael Hayden, 1/23/2006]
'Stellar Wind' Is Name of Hayden-Authorized Program - In 2012 interviews, former NSA official William Binney will indicate that “Stellar Wind” is the name of the surveillance program initiated by Hayden. [Wired News, 2/15/2012; Democracy Now!, 4/20/2012] Some sources will refer to the Bush-authorized eavesdropping as being part of the Stellar Wind program. [Newsweek, 12/22/2008]
Differing Views on Authority for Surveillance - In his 2006 briefing, Hayden will say the Fourth Amendment only protects Americans against “unreasonable search and seizure,” and that 9/11 changed what was to be considered “reasonable.” Specifically, if communications are believed to have “[i]nherent foreign intelligence value,” interception of these communications is reasonable. In addition to referring to Hayden’s “view of [his] authorities” as “expansive,” Pelosi’s letter will give another indication that the NSA’s new standard is significantly broader than it was previously, stating, “You indicated that you were treating as a matter of first impression, [redacted] being of foreign intelligence interest.” Hayden will publicly clarify in 2006 that the authority for the NSA’s operational expansion exists under an Executive Order issued by President Reagan, saying, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” And, he will say, “I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities” (see October 1, 2001). In her October 11 letter, Pelosi will also write of having concerns about the program that haven’t been resolved due to restrictions on information-sharing with Congress imposed by Bush (see October 11, 2001). Binney, who pioneered the development of certain NSA data mining and surveillance technologies, will come to believe that what the NSA is doing is unconstitutional; he will first take his concerns to Congress (see Before October 31, 2001) and then resign on October 31 (see October 31, 2001). [Nancy Pelosi, 1/6/2006; Michael Hayden, 1/23/2006]
Surveillance Involves Domestic Communications - In his 2006 remarks, Hayden will not say the NSA is only targeting foreign communications under his post-9/11 authorization. Rather, the context of his remarks will indicate he is referring to domestic communications. More specifically, Hayden will state: “If the US person information isn’t relevant, the data is suppressed. It’s a technical term we use; we call it ‘minimized.’ The individual is not even mentioned. Or if he or she is, he or she is referred to as ‘US Person Number One’ or ‘US Person Number Two.’ Now, inherent intelligence value. If the US person is actually the named terrorist, well, that could be a different matter.” Hayden will also reveal that information is being passed to the FBI, an investigative agency with a primarily domestic jurisdiction, saying, “[A]s another part of our adjustment, we also turned on the spigot of NSA reporting to FBI in, frankly, an unprecedented way.” [Michael Hayden, 1/23/2006] One of Pelosi’s statements in her letter to Hayden may indicate an aspect of the domestic component: “You indicated that you were treating as a matter of first impression, [redacted] being of foreign intelligence interest,” she will write. [Nancy Pelosi, 1/6/2006] In a 2011 interview with Jane Mayer published in the New Yorker, Binney will say the NSA was obtaining “billing records on US citizens” and “putting pen registers [call logs] on everyone in the country.” [New Yorker, 5/23/2011] And in a 2012 Wired article, NSA expert James Bamford will write that Binney “explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore. If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law. Instead it chose to put the wiretapping rooms at key junction points throughout the country—large, windowless buildings known as switches—thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US.” Binney’s account is supported by other sources (see October 2001). [Wired News, 2/15/2012]
Surveillance Program Is Massive - Bamford, citing Binney, will write: “Stellar Wind… included not just eavesdropping on domestic phone calls but the inspection of domestic email. At the outset the program recorded 320 million calls a day, he says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” It is unclear exactly when this level of surveillance began. According to whistleblower AT&T employee Mark Klein, construction of secret rooms splitting communications traffic does not begin until Fall 2002 (see Fall 2002). Bamford will write that Binney says, “[T]he taps in the secret rooms dotting the country are actually powered by highly sophisticated software programs that conduct ‘deep packet inspection,’ examining Internet traffic as it passes through the 10-gigabit-per-second cables at the speed of light.” [Wired News, 2/15/2012] Also, Binney’s remark to Jane Mayer that the NSA was “putting pen registers on everyone in the country” indicates the broad scope of the program. [New Yorker, 5/23/2011]

Entity Tags: Religious Society of Friends (Quakers), US Department of Justice, National Security Agency, George W. Bush, Michael Hayden, Al-Qaeda, Foreign Intelligence Surveillance Court, House Intelligence Committee, Nancy Pelosi, Ronald Reagan

Category Tags: Impositions on Rights and Freedoms, Privacy, Government Acting in Secret, Government Classification, Database Programs, NSA Wiretapping / Stellar Wind

An illustration of the NIMD dataflow.An illustration of the NIMD dataflow. [Source: LibertyThink.com] (click image to enlarge)Shortly after the 9/11 attacks, the NSA awards $64 million in research contracts for a program called Novel Intelligence from Massive Data (NIMD). [New York Times, 5/21/2003; National Journal, 1/20/2006] NIMD is one of several cutting-edge data mining technologies that not only has the capability of finding keywords among millions of electronically monitored communications, but can find hidden relationships among data points, and even critique the thinking and biases of a particular analyst and suggest alternative hypotheses differing from the human analysts’ conclusion. Like other data-mining technologies, the NSA will steadfastly refuse to discuss whether NIMD is used to analyze data from domestic surveillance operations. NIMD is designed as an preliminary sort program, to keep human analysts from becoming overwhelmed by raw data. In essence, NIMD is an early-warning system. “NIMD funds research to…help analysts deal with information-overload, detect early indicators of strategic surprise, and avoid analytic errors,” according to the “Call for 2005 Challenge Workshop Proposals” released by the Advanced Research and Development Activity (ARDA). ARDA was founded in 1998 to create, design, and field new technologies for US intelligence agencies, particularly the NSA. A selected few Congressional lawmakers (see January 18, 2006) were informed that the warrantless surveillance program authorized by President George W. Bush (see Early 2002) was designed to be an early-warning system for possible terrorist attacks or plans. Assistant Attorney General William Moschella will inform the top Democrats and Republicans on the House and Senate Intelligence committees in December 2002 that the “president determined that it was necessary following September 11 to create an early-warning detection system” to prevent more attacks. He will justify the use of programs such as NIMD by claiming, as NSA director Michael Hayden and other administration officials have repeatedly claimed, that the Foreign Intelligence Surveillance Act (FISA), which allows the government to obtain warrants to conduct domestic eavesdropping or wiretapping, “could not have provided the speed and agility required for the early-warning detection system.” Many experts outside of the Bush administration feel that NIMD and other programs do not have to operate outside of the Foreign Intelligence Surveillance Act (FISA) because of limitations in the law, but because of the fact that the programs cannot meet the law’s minimum requirements for surveillance. FISA requires that any such surveillance must have a probable cause that the target is a terrorist. NIMD has no such threshold. Steven Aftergood, an expert on intelligence and government secrecy with the Federation of American Scientists, will say in 2006, “Logistically speaking, the early-warning approach may involve a significant increase in the number of surveillance actions. It may be that neither the Justice Department nor the [Foreign Intelligence Surveillance Court, which approves wiretapping warrants] is prepared to prepare and process several thousand additional FISA applications per year, beyond the 1,700 or so approved in 2004.” [National Journal, 1/20/2006] Some experts will later express the opinion that NIMD is the controversial Total Information Awareness program in a slightly different form (see February 2003 and September 2002).

NSA director Michael Hayden addresses the NSA in a global videoconference, saying that the NSA, like other government agencies, will have to do more to protect the country from further terrorist attacks. The challenge, he says, is to balance Americans’ security with civil liberties, “to keep America free by making Americans feel safe again.” Hayden will say in a 2006 speech reflecting on that videoconference (see January 23, 2006) that US citizens operate under misconceptions about the NSA’s capabilities—that while citizens believe the NSA has a global electronic surveillance network that can, and does, spy on citizens willy-nilly, in reality the NSA is understaffed and unprepared to handle the technological advances of the last decade. Hayden will say that with more extensive domestic surveillance of US citizens and foreign visitors, the NSA could have caught some of the 9/11 hijackers before they were able to put their plan into motion. The standards by which US citizens and foreign visitors are monitored must change, Hayden believes.
Expansion of NSA Surveillance Powers - Using Ronald Reagan’s 1981 executive order 12333 (see December 4, 1981), Hayden expands the NSA’s domestic surveillance practices to eavesdrop, sometimes without court approval, on selected international calls made by US citizens. Though Hayden’s expansion of NSA surveillance is not directly authorized by President Bush, and is not the same program as authorized by Bush’s secret executive order of 2002 (see Early 2002), Hayden will later say that this expansion is based on the intelligence community’s assessment “of a serious and continuing threat to the homeland.” Hayden’s program is reviewed and approved by lawyers at the NSA, the Justice Department, and the White House, as well as Attorney General John Ashcroft. [Michael Hayden, 1/23/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, US Department of Justice, National Security Agency, John Ashcroft, George W. Bush, Bush administration (43), Ronald Reagan, Michael Hayden

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

A self-styled White House “war council” begins meeting shortly after the 9/11 attacks, to discuss the administration’s response to the attacks and the methods it will use (see (After 10:00 a.m.) September 11, 2001). The ad hoc group is composed of White House counsel Alberto Gonzales, Justice Department lawyer John Yoo, Pentagon chief counsel William J. Haynes, and the chief aide to Vice President Dick Cheney, David Addington. According to Jack Goldsmith, who will become head of the Justice Department’s Office of Legal Counsel (OLC) in 2003 (see October 6, 2003), the four believe that the administration’s biggest obstacle to responding properly to the 9/11 attacks is the body of domestic and international law that arose in the 1970s to constrain the president’s powers after the criminal excesses of Richard Nixon’s White House. Chief among these restraints is the Foreign Intelligence Surveillance Act (FISA) of 1978 (see 1978). Though Addington tends to dominate the meetings with his imposing physical presence and aggressive personality, Yoo is particularly useful to the group; the head of the OLC, Jay Bybee (whom Goldsmith will replace) has little experience with national security issues, and delegates much of the responsibility for that subject to Yoo, even giving him the authority to draft opinions that are binding on the entire executive branch. Yoo agrees wholeheartedly with Addington, Gonzales, and Cheney about the need for vastly broadened presidential powers. According to Goldsmith, Yoo is seen as a “godsend” for the White House because he is eager to draft legal opinions that would protect Bush and his senior officials from any possible war crimes charges. However, Yoo’s direct access to Gonzales angers Attorney General John Ashcroft, who feels that the “war council” is usurping legal and policy decision-making powers that are legally his own. [New York Times Magazine, 9/9/2007] In 2009, Goldsmith will say, “[I]it was almost as if they [Cheney and Addington] were interested in expanding executive power for its own sake.” [Vanity Fair, 2/2009]

Entity Tags: Richard (“Dick”) Cheney, William J. Haynes, Richard M. Nixon, Office of Legal Counsel (DOJ), Jay S. Bybee, Jack Goldsmith, John C. Yoo, Bush administration (43), Foreign Intelligence Surveillance Act, Alberto R. Gonzales, David S. Addington

Category Tags: Impositions on Rights and Freedoms, Government Acting in Secret, Other Surveillance

In a television interview, Vice President Cheney is asked how the US will respond to the 9/11 attacks. He first replies that there will be a military response. But he adds an oblique comment indicating the secrecy in which he and the administration intend to operate after the 9/11 attacks: “We also have to work, though, sort of the dark side, if you will. We’ve got to spend time in the shadows in the intelligence world. A lot of what needs to be done here will have to be done quietly, without any discussion, using sources and methods that are available to our intelligence agencies, if we’re going to be successful. That’s the world these folks operate in, and so it’s going to be vital for us to use any means at our disposal, basically, to achieve our objective.” [Meet the Press, 9/16/2001; Unger, 2007, pp. 221] In 2006, former CIA official Gary Schroen will be asked about Cheney’s comment, and he replies: “My impression at the time was that the administration was trying to send a message, and certainly CIA leadership was trying to send a message, that the gloves were off. I think what [Cheney] was probably saying was, we’re going to do things like assassination operations; we were going to go into places and not try to capture these guys, but just kill them, and that… there would be a lot of people who would object to those kind of tactics.” [PBS Frontline, 1/20/2006] In 2007, author and reporter Charlie Savage will write, “Many interpreted Cheney’s vague remarks to have been a reference to brutal interrogation techniques.” [Savage, 2007, pp. 154]

Entity Tags: Charlie Savage, Gary C. Schroen, Richard (“Dick”) Cheney

Timeline Tags: Torture of US Captives, Complete 911 Timeline

Category Tags: Impositions on Rights and Freedoms, Government Acting in Secret, Gov't Violations of Prisoner Rights

The CIA begins a program to kill or capture al-Qaeda leaders using small teams of its paramilitary forces. [New York Times, 7/14/2009; Washington Post, 8/20/2009] The aim is to take out of circulation members of al-Qaeda and its affiliates who are judged to be plotting attacks against US forces or interests. The program’s establishment follows its proposal by an official at the CIA’s Counterterrorist Center (see Shortly After September 11, 2001) and official approval from the White House (see September 17, 2001). The program, initially run by the Counterterrorist Center, never becomes operational at the agency and no targets are ever proposed for the White House’s approval; although the CIA will both capture and kill several al-Qaeda leaders over the next few years (see, for example, February 29 or March 1, 2003 and December 1, 2005), these successes result from ad hoc operations or other programs. However, the Pentagon will later begin a parallel program that does kill and capture al-Qaeda leaders (see July 22, 2002). Although the CIA’s program is never used, it is, according to CIA spokesman George Little, “much more than a PowerPoint presentation.” [New York Times, 7/14/2009; Washington Post, 8/20/2009] Another official adds: “It’s wrong to think this counterterrorism program was confined to briefing slides or doodles on a cafeteria napkin. It went well beyond that.” [New York Times, 8/20/2009] Top CIA officials are briefed periodically about the program’s progress. [New York Times, 7/14/2009] The program is intended for use in Afghanistan and Iraq, as well as other countries. [New York Times, 7/14/2009; Washington Post, 8/20/2009] Reasons for its non-use include logistical, legal, and diplomatic hurdles. [New York Times, 8/20/2009] There are three versions of the program: an initial one done in house, another one operated by the private military contractor Blackwater (see 2004), and another, possibly after Blackwater leaves the program (see (2005-2006)). The total spending on the program is under $20 million over eight years. [Washington Post, 8/20/2009] There is a US government ban on assassinating people. However, the Bush administration takes the position that killing members of al-Qaeda, a terrorist group that attacked the US and has pledged to attack it again, is no different from killing enemy soldiers in battle, so the CIA is not constrained by the ban. [New York Times, 7/14/2009; New York Times, 8/20/2009]

Entity Tags: George Little, Central Intelligence Agency, Counterterrorist Center

Timeline Tags: Complete 911 Timeline, War in Afghanistan

Category Tags: Expansion of Presidential Power, Other Legal Changes, Government Acting in Secret

Michael Creppy, the chief US immigration judge—actually an executive branch official in the Justice Department, the title of “judge” notwithstanding—orders that all deportation hearings be closed to the public, the press, and even family members. Creppy also prohibits immigration court administrators from listing the detainees’ names or cases on public dockets. The reason is not because there is reason to believe any particular detainee is a suspected terrorist. Instead, the administration asserts, national security demands blanket secrecy because terrorist cells might read about the deportation hearings in the press, piece together bits and pieces of information, and in doing so deduce valuable information about the government’s investigation into the 9/11 attacks and terrorism in general. In 2007, author Charlie Savage will write: “Thus, the public would just have to trust that the government had arrested and deported the right people, even though their names were kept a secret and the decision to expel them from the country was made behind closed doors. By invoking the chance that the enemy might detect a pattern in otherwise harmless information, the government would be justified in withholding everything. The implication of its theory was that the public had no right to know anything, no matter how innocuous, because any tidbit of trivial information could potentially be stitched together with other minor bits of information to conceivably provide some useful insight for terrorists.” In separate proceedings, the Detroit Free Press and several New Jersey media organizations will challenge the Justice Department’s decision in court (see August 26, 2002 and October 2, 2002). [Savage, 2007, pp. 94]

Entity Tags: Charlie Savage, US Department of Justice, Michael Creppy

Category Tags: Impositions on Rights and Freedoms, Court Procedures and Verdicts, Detainments in US, Government Acting in Secret

John Yoo, a deputy assistant attorney general in the Department of Justice (DOJ) Office of Legal Counsel (OLC), issues a legal opinion that says the US can conduct electronic surveillance against its citizens without probable cause or warrants. According to the memo, the opinion was drafted in response to questions about whether it would be constitutional to amend the Foreign Intelligence Surveillance Act (FISA) to state that searches may be approved when foreign intelligence collection is “a purpose” of the search, rather than “the purpose.” Yoo finds this would be constitutional, but goes further. He asserts that FISA is potentially in conflict with the Constitution, stating, “FISA itself is not required by the Constitution, nor is it necessarily the case that its current standards match exactly to Fourth Amendment standards.” Citing Vernonia School Dist. 47J v. Acton, in which the Supreme Court found that warrantless searches of students were permissible, Yoo argues that “reasonableness” and “special needs” are also the standards according to which warrantless monitoring of the private communications of US persons is permissible. According to Yoo, the Fourth Amendment requirement for probable cause and warrants prior to conducting a search pertain primarily to criminal investigations, and in any case cannot be construed to restrict presidential responsibility and authority concerning national security. Yoo further argues that in the context of the post-9/11 world, with the threat posed by terrorism and the military nature of the fight against terrorism, warrantless monitoring of communications is reasonable. Some information indicates the NSA began a broad program involving domestic surveillance prior to the 9/11 attacks, which contradicts the claim that the program began after, and in response to, the attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [US Department of Justice, 9/25/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Inspectors General, 7/10/2009]
Yoo Memo Used to Support Legality of Warrantless Surveillance - Yoo’s memo will be cited to justify the legality of the warrantless domestic surveillance program authorized by President Bush in October 2001 (see October 4, 2001). NSA Director General Michael Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general.” The various post-9/11 NSA surveillance activities authorized by Bush will come to be referred to as the President’s Surveillance Program (PSP), and the first memo directly supporting the program’s legality will be issued by Yoo on November 2, 2001, after the program has been initiated (see November 2, 2001). Many constitutional authorities will reject Yoo’s legal rationale. [Michael Hayden, 1/23/2006]
Yoo Memo Kept Secret from Bush Officials Who Might Object - According to a report by Barton Gellman and Jo Becker in the Washington Post, the memo’s “authors kept it secret from officials who were likely to object,” including ranking White House national security counsel John Bellinger, who reports to National Security Adviser Condoleezza Rice. Bellinger’s deputy, Bryan Cunningham, will tell the Post that Bellinger would have recommended having the program vetted by the Foreign Intelligence Surveillance Court, which oversees surveillance under FISA. Gellman and Becker quote a “senior government lawyer” as saying that Vice President Dick Cheney’s attorney, David Addington, had “open contempt” for Bellinger, and write that “more than once he accused Bellinger, to his face, of selling out presidential authority for good ‘public relations’ or bureaucratic consensus.” [Washington Post, 6/24/2007]

Entity Tags: US Department of Justice, John Bellinger, National Security Agency, Bryan Cunningham, Condoleezza Rice, David S. Addington, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Office of Legal Counsel (DOJ), John C. Yoo, George W. Bush, Richard (“Dick”) Cheney

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind, Other Surveillance

According to author Ronald Kessler’s November 2007 book The Terrorist Watch, the NSA’s domestic surveillance program begins around two weeks after the 9/11 attacks, when President Bush meets with NSA director Michael Hayden and other NSA officials in the Oval Office. According to chief of staff Andrew Card, in attendance, Bush asks, “What tools do we need to fight the war on terror?” Hayden suggests revamping NSA guidelines to allow the agency to wiretap domestic phone calls and intercept e-mails to and from terror suspects if one end of the communication is overseas. Kessler gives the following rather lurid example: “Thus, if [Osama] bin Laden were calling the US to order the detonation of a nuclear device, and the person he called began making overseas calls, NSA could listen in to those calls as well as to bin Laden’s original call.” Kessler is a chief correspondent for the extremist conservative Web site NewsMax; his assertion is disputed by evidence suggesting that the domestic surveillance program began well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Kessler, 2007, pp. 130]

Entity Tags: National Security Agency, Andrew Card, Michael Hayden, Ronald Kessler, George W. Bush

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, NSA Wiretapping / Stellar Wind

Former AT&T employee Mark Klein.Former AT&T employee Mark Klein. [Source: PBS]The National Security Agency, as part of its huge, covert, and possibly illegal wiretapping program directed at US citizens (see Spring 2001 and After September 11, 2001), begins collecting telephone records of tens of millions of Americans, using data provided by telecommunications firms such as AT&T, Verizon, and BellSouth (see February 5, 2006). The media will not report on this database until May 2006 (see May 11, 2006). The program collects information on US citizens not suspected of any crime or any terrorist connections. Although informed sources say the NSA is not listening to or recording actual conversations, the agency is using the data to analyze calling patterns in an effort to detect terrorist activity. “It’s the largest database ever assembled in the world,” says one anonymous source. The NSA intends “to create a database of every call ever made.” As a result, the NSA has detailed records of the phone activities of tens of millions of US citizens, from local calls to family and friends to international calls. The three telecommunications companies are working with the NSA in part under the Communications Assistance Act for Law Enforcement (CALEA) (see January 1, 1995 and June 13, 2006) and in part under contract to the agency.
Surveillance Much More Extensive Than Acknowledged - The wiretapping program, which features electronic surveillance of US citizens without court warrants or judicial oversight, is far more extensive than anything the White House or the NSA has ever publicly acknowledged. President Bush will repeatedly insist that the NSA focuses exclusively on monitoring international calls where one of the call participants is a known terrorist suspect or has a connection to terrorist groups (see December 17, 2005 and May 11, 2006), and he and other officials always insist that domestic calls are not monitored. This will be proven false. The NSA has become expert at “data mining,” sifting through reams of information in search of patterns. The warrantless wiretapping database is one source of information for the NSA’s data mining. As long as the NSA does not collect “personal identifiers”—names, Social Security numbers, street addresses, and the like—such data mining is legal. But the actual efficacy of the wiretapping program in learning about terrorists and possibly preventing terrorist attacks is unclear at best. And many wonder if the NSA is not repeating its activities from the 1950s and 1960s, when it conducted “Operation Shamrock” (see 1945-1975), a 20-year program of warrantless wiretaps of international phone calls at the behest of the CIA and other intelligence agencies. Operation Shamrock, among other things, led to the 1978 passage of the Foreign Intelligence Surveillance Act (see 1978). [USA Today, 5/11/2006] In May 2006, former NSA director Bobby Ray Inman will say, “[T]his activity is not authorized” (see May 12, 2006). [Democracy Now!, 5/12/2006]
Secret Data Mining Center - In May 2006, retired AT&T technician Mark Klein, a 22-year veteran of the firm, will file a court affidavit saying that he saw the firm construct a secret data-mining center in its San Francisco switching center that would let the NSA monitor domestic and international communications (see January 2003). And former AT&T workers say that, as early as 2002, AT&T has maintained a secret area in its Bridgeton, Missouri, facility that is likely being used for NSA surveillance (see Late 2002-Early 2003).
Domestic Surveillance Possibly Began Before 9/11 - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, Verizon Communications, Mark Klein, George W. Bush, AT&T, BellSouth, Central Intelligence Agency, Communications Assistance for Law Enforcement Act (CALEA), Foreign Intelligence Surveillance Act, Qwest, National Security Agency

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

NSA Director Michael Hayden briefs the House Intelligence Committee on the NSA’s efforts to combat terrorism. Though the NSA is already working on a domestic wiretapping program to spy, without warrants, on US citizens (see Early 2002), Hayden does not mention the program to the committee members, but merely discusses the ramifications of President Reagan’s Executive Order 12333 (see December 4, 1981 and September 13, 2001) on NSA functions. He does not mention that Reagan’s executive order forbids warrantless surveillance of US citizens “unless the Attorney General has determined in each case that there is probable cause to believe that the technique is directed against a foreign power or an agent of a foreign power.” On October 11, committee member Nancy Pelosi (D-CA) will write to Hayden expressing her concerns about the warrantless nature of the NSA wiretaps (see October 11, 2001). [Washington Post, 1/4/2006]

Entity Tags: National Security Agency, House Intelligence Committee, Michael Hayden, Nancy Pelosi, Terrorist Surveillance Program, Ronald Reagan

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

The Justice Department’s John Yoo, an official in the Office of Legal Counsel (OLC), issues a secret opinion regarding legal statutes governing the use of certain interrogation techniques. The opinion will not be made public; its existence will not be revealed until October 18, 2007, when future OLC head Steven Bradbury will note its existence as part of an American Civil Liberties Union (ACLU) lawsuit. [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: US Department of Justice, American Civil Liberties Union, John C. Yoo, Office of Legal Counsel (DOJ), Steven Bradbury

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

President Bush issues a directive authorizing the National Security Agency (NSA) to operate a warrantless domestic surveillance program. Author/journalist Jane Mayer will report in 2011, “[O]n October 4, 2001, Bush authorized the policy, and it became operational by October 6th,” and, “[t]he new policy, which lawyers in the Justice Department justified by citing President Bush’s executive authority as commander in chief, contravened a century of constitutional case law.” Mayer will interview NSA whistleblower Thomas Drake for her article and quote him as saying that, following the October 4 directive, “strange things were happening. Equipment was being moved. People were coming to me and saying, ‘We’re now targeting our own country!’” Bush’s directive is based on a legal opinion drafted by Department of Justice Office of Legal Counsel Deputy Attorney General John Yoo (see September 25, 2001). [New Yorker, 5/23/2011]
Conflicting Information regarding Date of First Authorization - The existence of the NSA’s domestic surveillance program will first be made public in December 2005, following reporting by the New York Times that will cite “[n]early a dozen current and former officials” (see December 15, 2005). The Times article will state that in 2002, “[m]onths after the Sept. 11 attacks,” Bush signed an executive order authorizing the NSA to monitor domestic phone calls, including those of US citizens and permanent residents, if one end of the call was outside the country. The Times article also mentions an NSA “‘special collection program’ [that] began soon after the Sept. 11 attacks, as it looked for new tools to attack terrorism.” The difference between the October 4, 2001 directive and the 2002 executive order referred to by the Times is unclear. [New York Times, 12/16/2005]
Other Sources for October Directive - Other sources, including Bush, NSA Director General Michael Hayden, and the inspectors general of five separate agencies, will later refer to a presidential order having been given in “October,” or “weeks” after the 9/11 attacks, and say that, subsequent to this order, international calls of US persons are targeted for content-monitoring. Following the publication of the Times article, Bush will say in a December 17, 2005 radio address: “In the weeks following the terrorist attacks on our nation, I authorized the National Security Agency, consistent with US law and the Constitution, to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations. Before we intercept these communications, the government must have information that establishes a clear link to these terrorist networks” (see December 17, 2005). This presidential authorization was based on a legal opinion drafted by Department of Justice Office of Legal Counsel attorney John Yoo (see October 18, 2001). [WhiteHouse(.gov), 12/17/2005] Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001,” which is when he “gathered key members of the NSA workforce… [and] introduced [the NSA’s] new operational authority to them.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general,” and that “the three most senior and experienced lawyers in NSA… supported the lawfulness of this program.” [Michael Hayden, 1/23/2006] In a July 10, 2009 jointly-issued report, the inspectors general of the Department of Defense, Department of Justice, CIA, NSA, and Office of the Director of National Intelligence will refer to the “President’s Surveillance Program” (PSP) and “the program’s inception in October 2001.” The report will say: “One of the activities authorized as part of the PSP was the interception of the content of communications into and out of the United States where there was a reasonable basis to conclude that one party to the communication was a member of al-Qaeda or related terrorist organizations.… The attorney general subsequently publicly acknowledged the fact that other intelligence activities were also authorized under the same presidential authorization, but the details of those activities remain classified.” [Inspectors General, 7/10/2009] Citing “a senior administration official,” the Washington Post will report on January 4, 2006: “The secret NSA program… was authorized in October 2001.… The president and senior aides have publicly discussed various aspects of the program, but neither the White House, the NSA, nor the office of the director of national intelligence would say what day the president authorized it.” [Washington Post, 1/4/2006]

Entity Tags: US Department of Justice, Thomas Drake, US Department of Defense, Office of Legal Counsel (DOJ), Office of the Director of National Intelligence, Michael Hayden, National Security Agency, George W. Bush, Central Intelligence Agency, John C. Yoo, Jane Mayer

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

In a memo to the Secretaries of State, Treasury, and Defense, and to the Attorney General, the Director of Central Intelligence, and the Director of the FBI, President Bush mandates that they strictly control and oversee information from their departments disclosed to members of Congress. In order to “protect military operational security, intelligence sources and methods, and sensitive law enforcement investigations,” Bush orders, “your departments should adhere to the following procedures when providing briefings to the Congress relating to the information we have or the actions we plan to take: (i) Only you or officers expressly designated by you may brief Members of Congress regarding classified or sensitive law enforcement information; and (ii) The only Members of Congress whom you or your expressly designated officers may brief regarding classified or sensitive law enforcement information are the Speaker of the House, the House Minority Leader, the Senate Majority and Minority Leaders, and the Chairs and Ranking Members of the Intelligence Committees in the House and Senate.” [George W. Bush, 10/5/2001] In 2006, the Congressional Research Service (CRS) will conclude that the Bush administration is in violation of the law by refusing to inform any other members of Congress aside from the so-called “Gang of Eight” about the NSA warrantless wiretapping program (see January 18, 2006).

Entity Tags: “Gang of Eight”, Senate Intelligence Committee, George W. Bush

Category Tags: Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, Other Surveillance

Nancy Pelosi.Nancy Pelosi. [Source: US Congress]House Minority Leader Nancy Pelosi (D-CA) writes to NSA Director Michael Hayden questioning the nature and extent of the apparently illegal warrantless wiretapping of US citizens by the agency. Pelosi and other members of the House Intelligence Committee were briefed on October 1, 2001, by Hayden, whose agency began conducting surveillance against US citizens after the 9/11 attacks (see After September 11, 2001). Pelosi will release the letter on January 6, 2006, three weeks after the New York Times revealed that the NSA had been conducting electronic surveillance of US citizens without warrants since at least 2002 (see December 15, 2005.) Pelosi’s office will also release Hayden’s response, but almost the entire letter from Hayden is redacted.
Letter to Hayden - Pelosi writes in part, “[Y]ou indicated [in the briefing] that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance under the Foreign Intelligence Surveillance Act and related statutes, orders, regulations, and guidelines.… For several reasons, including what I consider to be an overly broad interpretation of President Bush’s directive of October 5 on sharing with Congress ‘classified or sensitive law enforcement information’ it has not been possible to get answers to my questions. Without those answers, the concerns I have about what you said on the First can not be resolved, and I wanted to bring them to your attention directly. You indicated that you were treating as a matter of first impression, [redacted ] being of foreign intelligence interest. As a result, you were forwarding the intercepts, and any information [redacted ] without first receiving a request for that identifying information to the Federal Bureau of Investigation. Although I may be persuaded by the strength of your analysis [redacted ] I believe you have a much more difficult case to make [redacted ] Therefore, I am concerned whether, and to what extent, the National Security Agency has received specific presidential authorization for the operations you are conducting. Until I understand better the legal analysis regarding the sufficiency of the authority which underlies your decision on the appropriate way to proceed on this matter, I will continue to be concerned.” The only portion of Hayden’s October 18 reply regarding Pelosi’s concerns that has not been redacted reads, “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” In January 2006, an NSA official will say that Pelosi’s concerns were adequately addressed in Hayden’s reply, and in a private briefing shortly thereafter. [Washington Post, 1/4/2006; Nancy Pelosi, 1/6/2006]
Pelosi Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). Pelosi is apparently unaware of any of this.

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

Deputy Defense Secretary Paul Wolfowitz issues a memorandum to senior officials throughout the Defense Department stating that, following President Bush’s declaration of a national emergency on September 14, Defense Department employees should exercise great caution whenever discussing information relating to their department’s work. The memo instructs: “Do not conduct any work-related conversations in common areas, public places, while commuting, or over unsecured electronic circuits. Classified information may be discussed only in authorized spaces and with persons having a specific need to know and the proper security clearance. Unclassified information may likewise require protection because it can often be compiled to reveal sensitive conclusions. Much of the information we use to conduct [the department]‘s operations must be withheld from public release because of its sensitivity. If in doubt, do not release or discuss official information except with other [Defense Department] personnel.” According to the memo, “the security of information critical to the national security will remain at risk for an indefinite period.” [US Department of Defense, 10/18/2001; Washington Times, 10/23/2001]

Entity Tags: US Department of Defense, Paul Wolfowitz

Timeline Tags: Complete 911 Timeline

Category Tags: Government Acting in Secret

John Yoo, a deputy assistant attorney general in the Justice Department’s Office of Legal Counsel, and OLC special counsel Robert Delahunty issue a joint memo to White House counsel Alberto Gonzales. The memo claims that President Bush has sweeping extraconstitutional powers to order military strikes inside the US if he says the strikes are against suspected terrorist targets. In the days following the 9/11 attacks, Gonzales asked if Bush could legally order the military to combat potential terrorist activity within the US. The memo is first revealed to exist seven years later (see April 2, 2008) after future OLC head Steven Bradbury acknowledges its existence to the American Civil Liberties Union; it will be released two months after the Bush administration leaves the White House (see March 2, 2009). [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009]
Granting Extraordinary, Extraconstitutional Authority to Order Military Actions inside US - Yoo and Delahunty’s memo goes far past the stationing of troops to keep watch at airports and around sensitive locations. Instead, the memo says that Bush can order the military to conduct “raids on terrorist cells” inside the US, and even to seize property. “The law has recognized that force (including deadly force) may be legitimately used in self-defense,” they write. In 2009, Reuters will write, “The US military could have kicked in doors to raid a suspected terrorist cell in the United States without a warrant” under the findings of the OLC memo. “We do not think that a military commander carrying out a raid on a terrorist cell would be required to demonstrate probable cause or to obtain a warrant,” Yoo and Delahunty write. [US Department of Justice, 10/23/2001 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009] The memo reasons that since 9/11, US soil can be legally construed as being a battlefield, and Congress has no power to restrict the president’s authority to confront enemy tactics on a battlefield. [Savage, 2007, pp. 131]
No Constitutional or Other Legal Protections - “[H]owever well suited the warrant and probable cause requirements may be as applied to criminal investigations or to other law enforcement activities, they are unsuited to the demands of wartime and the military necessity to successfully prosecute a war against an enemy. [Rather,] the Fourth Amendment does not apply to domestic military operations designed to deter and prevent foreign terrorist attacks.” Any objections based on the Fourth Amendment’s ban on unreasonable search and seizures would be invalid since whatever possible infringement on privacy would be trumped by the need to protect the nation from injury by deadly force. The president is “free from the constraints of the Fourth Amendment.” The Posse Comitatus Act, which bars the military from operating inside the US for law enforcement purposes, is also moot, the memo says, because the troops would be acting in a national security function, not as law enforcement. [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009; Ars Technica, 3/2/2009] There are virtually no restrictions on the president’s ability to use the military because, Yoo and Delahunty write, the nation is in a “state of armed conflict.” The scale of violence, they argue, is unprecedented and “legal and constitutional rules” governing law enforcement, even Constitutional restrictions, no longer apply. The US military can be used for “targeting and destroying” hijacked airplanes, they write, or “attacking civilian targets, such as apartment buildings, offices, or ships where suspected terrorists were thought to be.” The memo says, “Military action might encompass making arrests, seizing documents or other property, searching persons or places or keeping them under surveillance, intercepting electronic or wireless communications, setting up roadblocks, interviewing witnesses, or searching for suspects.” [Newsweek, 3/2/2009] Yoo writes that the Justice Department’s criminal division “concurs in our conclusion” that federal criminal laws do not apply to the military during wartime. The criminal division is headed by Michael Chertoff, who will become head of the Department of Homeland Security. [Washington Post, 4/4/2008]
Sweeping Away Constitutional Rights - Civil litigator Glenn Greenwald will later note that the memo gives legal authorization for President Bush to deploy the US military within US borders, to turn it against foreign nationals and US citizens alike, and to render the Constitution’s limits on power irrelevant and non-functional. Greenwald will write, “It was nothing less than an explicit decree that, when it comes to presidential power, the Bill of Rights was suspended, even on US soil and as applied to US citizens.”
Justifying Military Surveillance - Greenwald will note that the memo also justifies the administration’s program of military surveillance against US citizens: “[I]t wasn’t only a decree that existed in theory; this secret proclamation that the Fourth Amendment was inapplicable to what the document calls ‘domestic military operations’ was, among other things, the basis on which Bush ordered the NSA, an arm of the US military, to turn inwards and begin spying—in secret and with no oversight—on the electronic communications (telephone calls and emails) of US citizens on US soil” (see December 15, 2005 and Spring 2004). “If this isn’t the unadorned face of warped authoritarian extremism,” Greenwald will ask, “what is?” [Salon, 3/3/2009] If the president decides to use the military’s spy agency to collect “battlefield intelligence” on US soil, no law enacted by Congress can regulate how he goes about collecting that information, including requiring him to get judicial warrants under the Foreign Intelligence Surveillance Act (FISA). In 2007, Yoo will say in an interview: “I think there’s a law greater than FISA, which is the Constitution, and part of the Constitution is the president’s commander in chief power. Congress can’t take away the president’s powers in running war.” [Savage, 2007, pp. 131; PBS Frontline, 5/15/2007] Cheney and Addington will push the NSA to monitor all calls and e-mails, including those beginning and ending on US soil, but the NSA will balk. Domestic eavesdropping without warrants “could be done and should be done,” Cheney and Addington argue, but the NSA’s lawyers are fearful of the legal repercussions that might follow once their illegal eavesdropping is exposed, with or without the Justice Department’s authorization. The NSA and the White House eventually reach a compromise where the agency will monitor communications going in and out of the US, but will continue to seek warrants for purely domestic communications (see Spring 2001, After September 11, 2001, and October 2001). [Savage, 2007, pp. 131]
Military Use Considered - In 2009, a former Bush administration lawyer will tell a reporter that the memo “gave rise to the Justice Department discussing with the Defense Department whether the military could be used to arrest people and detain people inside the United States. That was considered but rejected on at least one occasion.” The lawyer will not give any indication of when this will happen, or to whom. Under the proposal, the suspects would be held by the military as “enemy combatants.” The proposal will be opposed by the Justice Department’s criminal division and other government lawyers and will ultimately be rejected; instead, the suspects will be arrested under criminal statutes. [Los Angeles Times, 3/3/2009]

Entity Tags: Steven Bradbury, US Department of Homeland Security, US Department of Defense, Robert J. Delahunty, Office of Legal Counsel (DOJ), Bush administration (43), Michael Chertoff, Alberto R. Gonzales, National Security Agency, American Civil Liberties Union, Glenn Greenwald, George W. Bush, US Department of Justice, John C. Yoo

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Government Acting in Secret, Government Classification

The Justice Department’s John Yoo and Robert Delahunty issue a memo to White House counsel Alberto Gonzales claiming President Bush has sweeping powers in wartime that essentially void large portions of the Constitution. The memo, which says that Bush can order military operations inside the US (see October 23, 2001), also says that Bush can suspend First Amendment freedoms: “First Amendment speech and press rights may also be subordinated to the overriding need to wage war successfully.” It adds that “the current campaign against terrorism may require even broader exercises of federal power domestically.” [American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009]

Entity Tags: John C. Yoo, George W. Bush, Robert J. Delahunty, US Department of Justice, Alberto R. Gonzales

Category Tags: Impositions on Rights and Freedoms, Media Freedoms, Expansion of Presidential Power, Other Legal Changes, Government Acting in Secret, Government Classification

Concerned that NSA post-9/11 surveillance operations violated the US Constitution, a senior NSA official reports on the program to House Intelligence Committee staff (see Before October 31, 2001), then retires. William Binney, a crypto-mathematician, had served in the NSA for 36 years. In 1997 he was made technical director of the World Geopolitical and Military Analysis Reporting Group, a 6000-employee unit that focused on signals intelligence (SIGINT) reporting and analysis. In the last part of his NSA career, Binney focused on dealing with the NSA’s problem of information overload, co-founding the Signals Intelligence Automation Research Center (SARC) and leading a 20-member team to develop a data-mining and analysis program called ThinThread. This program made it possible to “correlate data from financial transactions, travel records, Web searches, GPS equipment, and any other ‘attributes’ that an analyst might find useful,” and “could chart relationships among people in real time.” Unlike the NSA’s existing centralized data processing systems, ThinThread was able to identify useful or useless data as it was collected, reducing the overload problem. However, though it targeted foreign communications, ThinThread also intercepted those of Americans, and “continued documenting signals when a trail crossed into the US.” Binney incorporated measures to protect privacy, but NSA lawyers still considered the program too invasive, according to a 2011 article by Jane Mayer based on interviews with Binney and another NSA whistleblower, Thomas Drake. In 1999, NSA Director General Michael Hayden decided to fund a rival program, Trailblazer, which would be developed by defense contractors (see Late 1999). Trailblazer will be abandoned in 2006 as unworkable, after costing $1.2 billion (see January 2006). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012]
Post-9/11 NSA Surveillance Expansion - Binney will tell Mayer that, after the 9/11 attacks, his people began coming to him, saying things like: “They’re getting billing records on US citizens! They’re putting pen registers [call logs] on everyone in the country!” James Bamford will interview Binney in 2012 and write, “At the outset the program recorded 320 million calls a day, [Binney] says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” Binney has not been personally “read in” to this domestic surveillance program, but some members of his SARC team have, as their knowledge of ThinThread code was needed to set it up. Binney became convinced elements of ThinThread were being used, but without privacy protections, meaning US persons could be targeted. Soon after learning these things, Binney takes his concerns to the House Intelligence Committee (see Before October 31, 2001), and retires on October 31. He will tell Mayer, “I couldn’t be an accessory to subverting the Constitution.” Other sources support Binney’s account of this NSA data-mining and monitoring program (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, and October 2001). However, the claim that NSA domestic surveillance was initiated only after, and in response to, 9/11 is contradicted by information indicating that domestic monitoring programs and activities were established and conducted prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012]

Entity Tags: William Binney, World Geopolitical and Military Analysis Reporting Group, Thinthread, Signals Intelligence Automation Research Center, House Intelligence Committee, James Bamford, Jane Mayer, Michael Hayden, National Security Agency, Thomas Drake, Trailblazer

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Government Acting in Secret, Database Programs, NSA Wiretapping / Stellar Wind

George W. Bush signs Executive Order 13233 which limits public access to papers of all presidents since 1980. A 1978 law provided for the release of presidential papers 12 years after the president leaves office, so Ronald Reagan’s papers would have been released next year. Reagan issued an order in 1989 that called for disclosure of most of his official papers 12 years after he left office but under the new executive order the papers can be kept secret even if the president in question wants them released. President Bush’s father was vice president during the Reagan administration. [Seattle Post-Intelligencer, 11/8/2001] The Guardian notes that now Bush’s “personal papers detailing the decision-making process in the current war on terrorism could remain secret in perpetuity.” [Guardian, 11/2/2001] In March 2001, Bush signed a temporary order delaying the release of these papers for 90 days, and then signed for another 90 day delay before signing this order making the change permanent (see January 20, 2001). [New York Times, 1/3/2003]
'Executive Fiat' - Bush’s executive order radically reforms the PRA and unilaterally imposes limitations never contemplated by Congress. Bush is, according to former Nixon White House counsel John Dean, “in essence… repealing an act of Congress and imposing a new law by executive fiat.” If not overturned by Congress or lawsuits, the executive order mandates the following, according to Dean:
bullet Former presidents can keep their papers sealed indefinitely.
bullet Vice presidents have the power to invoke executive privilege, an authority limited to the president since 1969.
bullet The burden shifts from a presumption to release presidential documents unless good cause exists to keep them sealed, to the opposite, where an applicant must show good cause why a set of documents should be unsealed.
bullet Any request to release a former president’s papers must be approved by both the former president and the current incumbent. Either one’s objection keeps the papers sealed.
bullet “Representatives of former presidents” may invoke executive privilege after a former president’s death. Dean will write, “Although there is no constitutional basis whatsoever for this, under Bush’s order such a right can be passed from generation to generation, to friends, anyone.”
Tom Connors of the Society of American Archivists will say, “What seems to be coming out of the [Bush-Cheney] administration is the idea that public information is a dangerous thing.” Historian Hugh Davis Graham, who will, before his death, take part in a lawsuit to overturn the order, will observe, “George W. Bush has a fetish for secrecy. And unless this executive order is overturned, it will be a victory for secrecy in government—a victory so total that it would make [former president Richard] Nixon jealous in his grave.” Dean will add, “Bush and Cheney assumed office planning to take total and absolute control of executive branch information. The truth will be what they say it is. They will decide what the public should know and when, if ever.” [Dean, 2004, pp. 89-92]

Entity Tags: Society of American Archivists, Bush administration (43), Tom Connors, George Herbert Walker Bush, Ronald Reagan, George W. Bush, John Dean, Hugh Davis Graham

Category Tags: Expansion of Presidential Power, Other Legal Changes, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification

John Yoo, the Justice Department’s (DOJ) Office of Legal Counsel (OLC) deputy assistant attorney general, sends a classified memo to Attorney General John Ashcroft justifying warrantless surveillance of US persons. The National Security Agency (NSA)‘s domestic surveillance authorized by President Bush (see October 4, 2001, Early 2002, and December 15, 2005) will come to be publicly referred to as the President’s Surveillance Program (PSP). This is not the first Yoo memo supporting warrantless surveillance (see September 25, 2001), but a 2009 report on the PSP jointly issued by the inspectors general (IGs) of the Department of Defense (DOD), DOJ, CIA, National Security Agency (NSA), and Office of the Director of National Intelligence (ODNI) will refer to it as “[t]he first OLC opinion directly supporting the legality of the PSP.” The IGs’ report will quote from and comment on the memo, noting that “deficiencies in Yoo’s memorandum identified by his successors in the Office of Legal Counsel and the Office of the Deputy Attorney General later became critical to DOJ’s decision to reassess the legality of the program in 2003.” According to the IGs’ report, Yoo asserts that warrantless surveillance is constitutional as long as it is “reasonable” under the Fourth Amendment, which only protects against “unreasonable searches and siezures.” On this point, the IGs’ report will note that Yoo’s successors were troubled by his failure to discuss the Supreme Court’s decision in Youngstown Sheet & Tube Co. v. Sawyer (1952), which found the president’s wartime authority to be limited. His memo does acknowledge that the Foreign Intelligence Surveillance Act (FISA) “purports to be the exclusive statutory means for conducting electronic surveillance for foreign intelligence,” but asserts that it is only a “safe harbor for electronic surveillance” because it cannot “restrict the president’s ability to engage in warrantless searches that protect the national security.” Yoo also writes that Congress has not “made a clear statement in FISA that it sought to restrict presidential authority to conduct warrantless searches in the national security area.” The IGs’ report will state that Yoo’s successors considered this problematic because Yoo has omitted discussion of the fact that FISA explicitly authorizes the president to conduct warrantless surveillance during the first 15 days following a declaration of war by Congress, which they considered an expression of Congress’s intent to restrict warrantless surveillance to a limited period of time and specific circumstances. The IGs’ report will also state that Yoo’s memo discusses “the legal rationale for Other Intelligence Activities authorized as part of the PSP,” and that Yoo concludes, “[W]e do not believe that Congress may restrict the president’s inherent constitutional powers, which allow him to gather intelligence necessary to defend the nation from direct attack.” The IGs’ report will say that “Yoo’s discussion of some of the Other Intelligence Activities did not accurately describe the scope of these activities,” and that Yoo’s successors considered his discussion of these other activities to be “insufficient and presenting a serious impediment to recertification of the program as to form and legality.” [Inspectors General, 7/10/2009, pp. pp. 11-13]
Memo's Existence Revealed by ACLU Lawsuit - On December 15, 2005, the New York Times will report that Bush authorized an NSA warrantless domestic surveillance program after the 9/11 attacks (see December 15, 2005). The American Civil Liberties Union (ACLU) will request records pertaining to the program under the Freedom of Information Act (FOIA) and then sue the Justice Department for the release of records. The existence of Yoo’s November 2 memo will first be revealed in an October 19, 2007 deposition filed by then head of the OLC Steven Bradbury in response to the ACLU lawsuit, which says that it “[concerns] the legality of certain communications intelligence activities.” After the 2009 release of the IGs’ report the ACLU will notify the court and the government will agree to reprocess four OLC memos, including Yoo’s November 2 memo. This memo and a May 6, 2004 memo by Yoo’s OLC successor Jack Goldsmith that disputes many of Yoo’s conclusions will be released in heavily redacted form on March 18, 2011. [ACLU.org, 2/7/2006; United States District Court of DC, 10/19/2007; American Civil Liberties Union, 3/19/2011]
Constitutional Experts Dispute Yoo's Legal Rationale - Numerous authorities on the law will question or reject the legal bases for warrantless domestic surveillance. In 2003, Yoo will leave the OLC. Goldsmith will begin a review of the PSP, after which he will conclude it is probably illegal in some respects and protest, within the executive branch, its continuation (see Late 2003-Early 2004 and December 2003-June 2004). Following the public disclosure of its existence, a January 5, 2006 report by the Congressional Research Service will find it to be of dubious legality (see January 5, 2006). On January 19, 2006, the DOJ will issue a 42-page white paper laying out the legal bases for the program (see January 19, 2006). These bases will be reviewed and rejected by 14 constitutional scholars and former government officials in a joint letter to Congress on February 2, 2006. [al [PDF], 2/2/2006 pdf file] The American Bar Association will adopt a resolution on February 13, 2006 that rejects DOJ’s arguments and calls on Congress to investigate the program. [Delegates, 2/13/2006 pdf file] On August 17, 2006, in the case ACLU v. NSA, US district judge Anna Diggs Taylor will reject the government’s invocation of the “state secrets privilege” and its argument that plaintiffs’ lack standing due to their being unable to prove they were surveilled, and will rule that warrantless surveillance is in violation of “the separation of powers doctrine, the Administrative Procedures Act, the First and Fourth Amendments to the United States Constitution, the FISA, and Title III” (see August 17, 2006). Taylor’s ruling will be overturned on appeal, on the grounds that the plaintiffs lack standing as they cannot prove that surveillance has occurred. In another case, Al Haramain v. Barack Obama, the government will make the same arguments, but US district judge Vaughn Walker will reject these and conclude in 2010 that illegal surveillance occurred (see March 31, 2010). [Al-Haramain v. Obama, 3/31/2010]

Entity Tags: Steven Bradbury, Vaughn Walker, Ronald Dworkin, George W. Bush, John C. Yoo, American Bar Association, Office of Legal Counsel (DOJ), American Civil Liberties Union, John Ashcroft, Anna Diggs Taylor, US Department of Justice

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

Patrick Philbin, an attorney with the Justice Department’s Office of Legal Counsel, writes a lengthy and detailed memo arguing that the president may establish so-called “military commissions” for the trial and disposition of terror suspects without involvement in the US criminal justice system. Furthermore, Philbin opines, the president may do so without the approval or even the knowledge of Congress. [US Department of Justice, 11/6/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file] Philbin’s central argument is that 9/11 was an act of war, not a crime, and therefore the attacks triggered the president’s full array of war powers, including the inherent authority to create military commissions. Philbin cites a 1942 case where then-President Roosevelt created a military commission to try eight Nazi saboteurs captured inside the US during the first year of America’s involvement in World War II (see 1942); even though the Supreme Court backed Roosevelt, he felt unsure of the legality of such commissions, and did not use them in later trials of captured saboteurs. Since World War II, the laws of war have undergone drastic revisions, with Congress enacting the Uniform Code of Military Justice (UCMJ), which said that if military commissions were ever to be used again, they should use, as much as is practical, the same procedures and defendant rights as are found in military courts-martial. The Senate had also ratified the 1949 Geneva Conventions, which granted all wartime prisoners the right to a fair trial. Philbin’s memo ignores everything except the 1942 military commissions, and argues that if the president has the inherent and exclusive right to set up military commissions, as the Supreme Court had found, then Congress has no authority to restrict that right. [Savage, 2007, pp. 136-137]

Entity Tags: Office of Legal Counsel (DOJ), Geneva Conventions, George W. Bush, Patrick F. Philbin, US Department of Justice

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

Vice President Cheney leads a meeting at the White House to put the finishing touches on a draft presidential order establishing military commissions (see Late October 2001 and November 9, 2001). The meeting includes Attorney General John Ashcroft, Defense Department chief counsel William J. Haynes, and several White House lawyers, but leaves out senior officials of the State Department and the National Security Council. Cheney has decided to tell neither National Security Adviser Condoleezza Rice nor Secretary of State Colin Powell about the order until it has already been signed. Cheney has also told no one in the interagency working group ostensibly formulating the administration’s approach to prosecuting terrorists (see Shortly Before September 23, 2001). Ashcroft angrily dissents from Cheney’s plan to give the White House sole authority over the commissions, and invokes his authority as the nation’s top law enforcement official to demand that the Justice Department be given a say in the decision. Cheney overrules Ashcroft’s objections. He will discuss the draft with President Bush over lunch a few days later (see November 11-13, 2001). [New York Times, 10/24/2004; Savage, 2007, pp. 138]

Entity Tags: William J. Haynes, Colin Powell, George W. Bush, John Ashcroft, Condoleezza Rice, Richard (“Dick”) Cheney

Timeline Tags: Torture of US Captives

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Detainments in US, Gov't Violations of Prisoner Rights, Government Acting in Secret

At a private lunch meeting, Vice President Cheney presents President Bush with a four-page memo, written in strict secrecy by lawyer John Yoo of the Justice Department’s Office of Legal Counsel (see November 6-10, 2001), and a draft executive order that establishes military commissions for the trial of suspected terrorists (see November 10, 2001). The legal brief mandates that foreign terrorism suspects held in US custody have no access to any courts whatsoever, civil, criminal, military, domestic, or foreign. They can be detained indefinitely without charges. If they are to be tried, they can be tried in closed “military commissions.” [White House, 11/13/2001; Savage, 2007, pp. 138; Washington Post, 6/24/2007]
Military Commissions Suitable to 'Unitary Executive' Agenda - According to author Craig Unger, military commissions are a key element of Cheney’s drive towards a “unitary executive,” the accretion of governmental powers to the presidency at the expense of the legislative and judicial branches. Federal trials for terror suspects would put them under all the legal procedures provided under the US judicial system, an unacceptable alternative. Military courts-martial would give them the rights granted by the Geneva Conventions. Military commissions, however, are essentially tribunals operating outside of both civilian and military law. Defendants have few rights. Secret evidence can be admitted without being disclosed to the defendants. Hearsay and coerced testimony are admissible. Prisoners can be held indefinitely. [Unger, 2007, pp. 221-222]
No Bureaucratic Footprints - After Bush peruses the memo and the draft order, Cheney takes them back with him to his office. After leaving Bush, Cheney takes extraordinary steps to ensure that no evidence of his involvement remains. The order passes from Cheney to his chief counsel David Addington, and then to associate White House counsel Bradford Berenson. At Berenson, the provenance of the order breaks, as no one tells him of its origin. Berenson rushes the order to deputy staff secretary Stuart Bowen with instructions to prepare it for signature immediately, without advance distribution to Bush’s top advisers. Bowen objects, saying that he had handled thousands of presidential documents without ever sidestepping the strict procedures governing coordination and review. Bowen relents only after being subjected to what he will later recall as “rapid, urgent persuasion” that Bush is standing by to sign and that the order is too sensitive to delay. Berenson will later say he understood that “someone had briefed” Bush “and gone over it” already. “I don’t know who that was.” When it is returned to Bush’s office later in the day, Bush signs it immediately (see November 13, 2001). Virtually no one else has seen the text of the memo. The Cheney/Yoo proposal has become a military order from the commander in chief.
Dodging Proper Channels - The government has had an interagency working group, headed by Pierre Prosper, the ambassador at large for war crimes, working on the same question (see Shortly Before September 23, 2001). But Cheney and Addington have refused to have any contact with Prosper’s group; one of Cheney’s team later says, “The interagency [group] was just constipated.” Cheney leapfrogged over Prosper’s group with their own proposal, performing an adroit bureaucratic move that puts their proposal in place without any oversight whatsoever, and cutting Prosper’s group entirely out of the process. When the news of the order is broadcast on CNN, Secretary of State Colin Powell demands, “What the hell just happened?” An angry Condoleezza Rice, the president’s national security adviser, sends an aide to find out. Virtually no one, even witnesses to the presidential signing, know that Cheney promulgated the order. In 2007, Washington Post reporters Barton Gellman and Jo Becker will call the episode “a defining moment in Cheney’s tenure” as vice president. Cheney has little Constitutional power, but his deft behind-the-scenes manuevering and skilled bureaucratic gamesmanship enable him to pull off coups like this one, often leaving even the highest White House officials none the wiser. “[H]e has found a ready patron in George W. Bush for edge-of-the-envelope views on executive supremacy that previous presidents did not assert,” the reporters write. [White House, 11/13/2001; Unger, 2007, pp. 221-222; Washington Post, 6/24/2007]
Quiet Contravening of US Law - Six years later, Unger will observe that few inside or outside Washington realize that Cheney has, within a matter of days, contravened and discarded two centuries of American law. He has given the president, in the words of former Justice Department lawyer Bruce Fein, “the functions of judge, jury, and prosecutor in the trial of war crimes [and] the authority to detain American citizens as enemy combatants indefinitely… a frightening power indistinguishable from King Louis XIV’s execrated lettres de cachet that occasioned the storming of the Bastille.” [Unger, 2007, pp. 223-224]

Entity Tags: Stuart W. Bowen, Office of Legal Counsel (DOJ), Richard (“Dick”) Cheney, US Department of Justice, John C. Yoo, David S. Addington, George W. Bush, Barton Gellman, Bradford Berenson, Jo Becker, Bruce Fein, Condoleezza Rice, Craig Unger, Colin Powell, Pierre-Richard Prosper

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Detainments in US, Gov't Violations of Prisoner Rights, Government Acting in Secret

Justice Department lawyer John Yoo, an official with the Office of Legal Counsel (OLC), issues a classified memo to White House counsel Alberto Gonzales. The contents of the memo will remain secret, but its existence will be revealed in a June 2007 deposition filed in the course of an American Civil Liberties Union (ACLU) lawsuit. The memo is known to cover the War Crimes Act, the Hague Convention, the Geneva Conventions, the federal criminal code, and detainee treatment. [American Civil Liberties Union [PDF], 1/28/2009 pdf file] It is co-authored by OLC special counsel Robert Delahunty. [ProPublica, 4/16/2009]

Entity Tags: Robert J. Delahunty, American Civil Liberties Union, Office of Legal Counsel (DOJ), John C. Yoo, US Department of Justice

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

The newly adopted USA Patriot Act (see October 26, 2001) allows FBI field offices to issue, without court orders, so-called “national security letters,” or NSLs, that require recipients—telecommunications firms, employers, libraries, anyone—to provide detailed information on their clients, employees, and patrons. The FBI’s Office of General Counsel warns each field office of the potential for abuse inherent in such powerful and relatively unrestricted instruments, writing in part: “NSLs are powerful investigative tools in that they can compel the production of substantial amounts of relevant information. However, they must be used judiciously.… In deciding whether or not to re-authorize the broadened authority, Congress certainly will examine the manner in which the FBI exercised it. Executive Order 12333 and the FCIG [Attorney General Guidelines for FBI Foreign Intelligence Collection and Counterintelligence Investigations] require that the FB[I] accomplish its investigations through the ‘least intrusive’ means. Supervisors should keep this in mind when deciding whether or not a particular use of NSL authority is appropriate. The greater availability of NSLs does not mean that they should be used in every case.” This warning not to overuse NSLs is not always heeded (see February 2005 and Before Mid-March, 2007). [Wired News, 7/10/2007]

Entity Tags: Federal Bureau of Investigation, Office of General Counsel (FBI), USA Patriot Act

Category Tags: Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, National Security Letters

The Bush administration solves the dilemma surrounding a request by Congressman Dan Burton (R-IN) for documents from the Clinton administration (see Early September, 2001) by placing secrecy and executive privilege above a chance to potentially attack Clinton. Burton has tucked the request for the Clinton documents in with another request on a far more serious matter, possible malfeasance by an FBI office. President Bush instructs Attorney General John Ashcroft not to turn over the documents on either case, explaining that turning over the documents would violate the “national interest” by giving Congress documents related to “prosecutorial decision making.” Burton, the Republican and Democratic members of the House Government Reform Committee, and editorial writers and commentators around the country criticize the administration over the refusal to turn over the documents, particularly the FBI information. The White House adds fuel to the controversy by claiming, both on this day and in a January 2002 letter from White House counsel Alberto Gonzales, that the refusal is consistent with long-standing Justice Department policy (see January 10, 2002). The committee will secure an opinion from eminent Constitutional scholar Professor Charles Tiefer, who will show that the White House’s argument is flatly wrong. [Dean, 2004, pp. 85-88]
'Your Guy's Acting Like a King' - An infuriated Burton confronts a lower-level Justice Department official sent to testify about the government’s position: “We’ve got a dictatorial president and a Justice Department that does not want Congress involved. Your guy’s acting like he’s king.” In his official comments, Burton accuses the Bush administration of setting a “terrible, terrible precedent” in the name of executive power. “This is not a monarchy,” Burton says. “The legislative branch has oversight responsibilities to make sure there is no corruption in the executive branch.” In the Senate, Charles Grassley (R-IA) agrees with Burton. “Anything that limits legitimate Congressional oversight is worrisome,” he says. “This move needs to be carefully scrutinized, particularly in an atmosphere where Congress is giving the Justice Department additional powers and authority.”
Politics over Principles - But the storm of Congressional criticism will have little lasting effect. In 2007, author Charlie Savage will write: “[P]olitics defeated… principles. Most Republicans were unwilling to challenge Bush, and many Democrats opposed Burton’s probes of the Clinton campaign fund-raising, so few members of either party were interested in fighting the White House about it. And because Bush’s first invocation of [executive privilege] was done in part to protect Clinton and the Democrats, the gesture seemed principled rather than self-serving. It was tactically brilliant.” [Savage, 2007, pp. 98]
Administration Later Turns Over Documents - After the media controversy, the administration quietly, and without public acknowledgment, will provide the FBI material to the committee. The committee’s final report on the FBI investigation will conclude with six pages of withering criticism of the administration’s fallacious claim to executive privilege. However, as former Nixon White House counsel John Dean will note in 2004, the criticism from the committee is essentially meaningless to the White House, because it will garner no attention from the media and thereby cost the administration no political capital. And while some observers cannot understand why the administration would take such a hardline stand on an issue that lacks any implications for national security, the public interest, or the protection of ongoing criminal investigations, Dean will write that “it makes absolute sense if the administration’s aim is total information control.” He adds: “Accordingly, its policy remains to employ executive privilege aggressively, as long as the political price is not too high. If this administration is given a second term, there will be no price too high to expand this presidential privilege, enabling the executive branch to remain completely unaccountable.” [Dean, 2004, pp. 85-88]
Court Upholds Bush Actions - In 2003, a district court will uphold the Bush administration’s refusal to turn over the documents to Burton’s committee (see March 28, 2003).

Entity Tags: John Dean, House Committee on Government Reform, Dan Burton, Clinton administration, Bush administration (43), Charles Tiefer, Charlie Savage, Federal Bureau of Investigation, George W. Bush

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Government Acting in Secret, Government Classification

The Justice Department’s John Yoo sends a classified memo to the Defense Department’s general counsel, William Haynes. The contents will not be made public, but the American Civil Liberties Union (ACLU) will eventually learn that the memo concerns possible criminal charges to be brought against an American citizen who is suspected of being a member of either al-Qaeda or the Taliban. The ACLU believes the memo discusses the laws mandating that US military personnel must adhere to the Uniform Code of Military Justice, and how those laws may not apply to military personnel during a so-called “undeclared war.” [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: US Department of Justice, American Civil Liberties Union, Office of Legal Counsel (DOJ), John C. Yoo

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Government Acting in Secret, Government Classification

Jesselyn Radack.Jesselyn Radack. [Source: Whistleblower (.org)]Justice Department legal ethics adviser Jesselyn Radack is subjected to intensive harassment and scrutiny by her employer after she consulted with a Criminal Division lawyer over the John Walker Lindh (“American Taliban”) case (see December 7, 2001).
Suddenly Fired - After Radack contradicts the department’s story on Lindh and his supposed failure to request legal counsel, she is suddenly fired when an unscheduled performance evaluation gives her poor ratings. Less than a year before, her performance evaluation had earned her a promotion and a merit bonus.
Leaks E-Mails to Reporter, Lindh Case Derailed - When she learns that the Justice Department has failed to turn over a number of e-mails concerning Lindh to a federal judge as requested, Radack turns over the e-mails to reporter Michael Isikoff of Newsweek. “I wasn’t in my mind saying, ‘Gee, I want to be a whistle-blower,’” she will later say. “I was just trying to correct the wrong, just trying to set something straight.” The resulting article prompts questions about the Justice Department’s honesty in discussing the Lindh case, and prompts a surprising turn of events: the department announces that it will end the Lindh case rather than hold an evidence-suppression hearing that would have probed the facts surrounding his interrogations. The government drops the worst of the charges against Lindh, and he pleads guilty to lesser charges (see July 15, 2002) and October 4, 2002).
Unspecified Allegations of 'Criminal' Behavior, Secret Reports Alleging Unfitness - As for Radack, even though the e-mails she released are not classified and she has broken no laws in making them public, the Bush administration wanted that information kept secret. She loses her job at a private law firm after the administration informs the firm that she is a “criminal” who cannot be trusted. She is subjected to a yearlong criminal investigation by the Justice Department; no charges are ever filed. “My attorneys asked what I was being investigated for and never got an answer,” Radack will later say. “There is no law against leaking. This was nonclassified stuff. I think they were just trying to get me to slip into making a false statement. Beyond that, it never seemed like they were really going to bring charges. This was just to harass me.” The administration files a secret report with the bar associations in the states she is licensed to practice law, alleging that she is unfit to practice law and recommending “discipline” against her. Because the report is secret, Radack finds it difficult to challenge the unspecified charges. (Most of the complaints against her will eventually be dismissed.)
No-Fly List - And Radack is placed on the administration’s “no-fly” list, ostensibly reserved for suspected terrorists and other criminals, forcing her to endure intensive and invasive searches every time she attempts to board an airplane.
Making an Example - In 2007, reporter and author Charlie Savage will note that Radack gained no protection from the various whistleblower protection laws on the books, mostly because those laws have no enforcement mechanisms and rely “on the willingness of high-ranking executive branch officials to obey a statute.” Savage will observe: “The whistleblower laws did nothing to help Radack when the Bush-Cheney administration decided to make an example of her, sending a clear warning to other officials who might be inclined to bring secret executive branch wrongdoing to light. And Radack would not be the last.” [Reporters Committee for Freedom of the Press, 6/2003; Savage, 2007, pp. 107-110]

Entity Tags: Michael Isikoff, Jesselyn Radack, Charlie Savage, Bush administration (43), John Walker Lindh, US Department of Justice

Category Tags: Impositions on Rights and Freedoms, Government Acting in Secret, Media Involvement and Responses

Vice President Dick Cheney tells the CIA not to brief Congress about an agency program to kill and capture al-Qaeda leaders (see Shortly After September 17, 2001). Two reasons will be given for withholding the information. One is that the program never becomes operational. [New York Times, 7/12/2009; New York Times, 7/14/2009; Washington Post, 8/20/2009; New York Times, 8/20/2009] The other is that the agency already has legal authority to kill al-Qaeda leaders (see September 17, 2001). [New York Times, 8/20/2009] According to the New York Times, Cheney’s instruction to keep the program secret suggests “that the Bush administration had put a high priority on the program and its secrecy.” [New York Times, 7/12/2009] The fact that the program is never briefed to Congress until it is cancelled in 2009 (see June 24, 2009) will cause controversy after it becomes public knowledge, and the House Intelligence Committee will investigate whether it was a breach of the law (see Before August 20, 2009). The law is apparently unclear on whether this program should be briefed, as it requires the president to make sure the House and Senate intelligence committees “are kept fully and currently informed of the intelligence activities of the United States, including any significant anticipated intelligence activity.” However, such briefings should be done “to the extent consistent with due regard for the protection from unauthorized disclosure of classified information relating to sensitive intelligence sources and methods or other exceptionally sensitive matters.” House Intelligence Committee member Peter Hoekstra (R-MI) will later say that Congress would have approved of the program only in what the New York Times calls “the angry and panicky days after 9/11, on 9/12,” but not later, after fears and tempers had begun to cool. [New York Times, 7/12/2009]

Entity Tags: House Intelligence Committee, Peter Hoekstra, Central Intelligence Agency, Richard (“Dick”) Cheney, Senate Intelligence Committee

Timeline Tags: Complete 911 Timeline

Category Tags: Expansion of Presidential Power, Other Legal Changes, Government Acting in Secret

Sometime in early 2002, President Bush signs a secret executive order authorizing the National Security Agency (NSA) to wiretap phone conversations and read e-mails to and from US citizens. The order extends an operation set into motion at least as early as October 2001 to begin wiretapping US citizens’ phones in a response to the 9/11 attacks. When the program is revealed by the US media in late 2005 (see December 15, 2005), Bush and his officials will say the program is completely legal, though it ignores the requirements of the Foreign Intelligence Surveillance Act (FISA) that requires the government to obtain court-issued warrants to mount surveillance against US citizens. They will insist that only those suspected of having ties to al-Qaeda are monitored, and only when those individuals make or receive international communications. [New York Times, 12/15/2005; Washington Post, 12/22/2005; Newsweek, 12/22/2008] Bush’s order authorizes the NSA to monitor international telephone conversations and international e-mails of hundreds, and perhaps thousands, of US citizens without court warrants, in an effort to track what officials call “dirty numbers” linked to al-Qaeda. When the program is finally revealed by the New York Times over three years later (see December 15, 2005), officials will say that the NSA still seeks warrants to monitor domestic communications. But there is little evidence of this (see, for example, Spring 2001). The presidential order is a radical shift in US surveillance and intelligence-gathering policies, and a major realignment for the NSA, which is mandated to only conduct surveillance abroad. Some officials believe that the NSA’s domestic eavesdropping crosses constitutional limits on legal searches. “This is really a sea change,” a former senior official who specializes in national security law will say in December 2005. “It’s almost a mainstay of this country that the NSA only does foreign searches.” [New York Times, 12/15/2005] Some sources indicate that NSA domestic surveillance activities, such as data-mining, the use of information concerning US persons intercepted in foreign call monitoring, and possibly direct surveillance of US persons, took place prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: George W. Bush, Al-Qaeda, Foreign Intelligence Surveillance Court, National Security Agency

Category Tags: Impositions on Rights and Freedoms, Privacy, Patriot Act, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind

The Justice Department’s Patrick Philbin sends a classified memo to Attorney General John Ashcroft. The memo’s contents will not be divulged, but the American Civil Liberties Union (ACLU) will later learn that it regards Ashcroft’s review of the Terrorist Surveillance Program (TSP—see March 2002). [American Civil Liberties Union [PDF], 1/28/2009 pdf file] The memo contains a legal review by Ashcroft of President Bush’s order authorizing the TSP, the Bush administration’s name for its warrantless wiretapping program. The review is requested before one of the 45-day reauthorizations by the president as required by law. [ProPublica, 4/16/2009]

Entity Tags: US Department of Justice, Patrick F. Philbin, Terrorist Surveillance Program, American Civil Liberties Union, John Ashcroft

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Government Acting in Secret, Government Classification, NSA Wiretapping / Stellar Wind, Other Surveillance

White House counsel Alberto Gonzales issues a letter stating that the administration’s refusal to turn over documents about possible FBI malfeasance to Dan Burton (R-IN), the chairman of the House Government Reform Committee, is consistent with long-standing Justice Department policy. Gonzales’s assertion will be disputed by the Committee, based on an assessment by law Professor Charles Tiefer of the University of Baltimore (see December 13, 2001). [Dean, 2004, pp. 87]

Entity Tags: Federal Bureau of Investigation, Alberto R. Gonzales, Dan Burton, US Department of Justice, Bush administration (43)

Category Tags: Expansion of Presidential Power, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification

Justice Department lawyer John Yoo sends a classified memo to White House counsel Alberto Gonzales. The contents of the memo will remain secret, but the American Civil Liberties Union (ACLU) will later learn that the memo is about the Geneva Conventions. [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: US Department of Justice, Alberto R. Gonzales, American Civil Liberties Union, John C. Yoo, Office of Legal Counsel (DOJ)

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

Jay Bybee, the chief of the Justice Department’s Office of Legal Counsel (OLC), sends a classified memo to White House counsel Alberto Gonzales. The contents will never be divulged, but the American Civil Liberties Union (ACLU) will later learn that it regards the authority of the OLC, the attorney general, the Justice Department, and the State Department in interpreting treaties and international law. [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: American Civil Liberties Union, Alberto R. Gonzales, US Department of State, US Department of Justice, Office of Legal Counsel (DOJ), Jay S. Bybee

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Government Acting in Secret, Government Classification

Justice Department lawyers John Yoo and Robert Delahunty send a classified memo to the chief legal adviser for the State Department, William Howard Taft IV. The contents of the memo will remain secret, but the American Civil Liberties Union (ACLU) will later learn that the memo concerns the Justice Department’s interpretation of the War Crimes Act. According to Yoo and Delahunty, the War Crimes Act does not allow the prosecution of accused al-Qaeda and Taliban suspects. Yoo will cite this memo in a 2003 memo concerning the military interrogation of so-called enemy combatants (see March 14, 2003). [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: Office of Legal Counsel (DOJ), American Civil Liberties Union, John C. Yoo, William Howard Taft IV, US Department of Justice, War Crimes Act, US Department of State

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

John Bellinger, the White House’s chief national security counsel, sends his supervisor, National Security Adviser Condoleezza Rice, what he thinks is a private memo with a blunt warning about the legality of the proposal to ignore the Geneva Conventions in interrogating terror suspects (see January 18-25, 2002). The proposal, Bellinger writes, will place Bush in direct breach of international law and threaten the most fundamental cooperation from allied governments. Faxes from other governments, even Britain, have been pouring into the State Department warning that they cannot turn over suspects to the US if the Bush administration withdraws from accepted legal norms. The Bellinger memo quickly finds its way into Vice President Cheney’s office, to Bellinger’s chagrin; Cheney is reportedly “concerned” about Belliger’s advice. Bellinger does not know until now that any documents prepared for Rice are always “routed outside the formal process” to Cheney. The reverse does not apply. Bellinger is unaware of just how systematically he is being cut out of the decision-making process. [Ledger (Lakeland FL), 10/24/2004; Washington Post, 6/24/2007]

Entity Tags: Condoleezza Rice, Bush administration (43), John Bellinger, US Department of State, Geneva Conventions, Richard (“Dick”) Cheney

Timeline Tags: Torture of US Captives

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Government Acting in Secret, Gov't Violations of Prisoner Rights

Jay Bybee, the head of the Justice Department’s Office of Legal Counsel (OLC), and OLC lawyer John Yoo send a memo to White House counsel Alberto Gonzales and Defense Department chief counsel William Haynes. Known as the “Treaties and Laws Memorandum,” the document addresses the treatment of detainees captured in Afghanistan, and their eventual incarceration at Guantanamo and possible trial by military commissions. The memo asserts that the Geneva Conventions do not apply to al-Qaeda detainees, and the president has the authority to deny Taliban members POW status. The document goes on to assert that the president is not bound by international laws such as the Geneva Conventions because they are neither treaties nor federal laws. [US Department of Justice, 1/22/2002 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: Office of Legal Counsel (DOJ), John C. Yoo, Jay S. Bybee, US Department of Justice

Timeline Tags: Torture of US Captives, War in Afghanistan

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Detainments Outside US, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

Justice Department lawyer John Yoo sends a classified memo to White House counsel Alberto Gonzales. The contents of the memo remain secret, but the American Civil Liberties Union (ACLU) will later learn that the memo regards the application of international law to the United States (see January 22, 2002). [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: US Department of Justice, American Civil Liberties Union, Office of Legal Counsel (DOJ), John C. Yoo

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

John Yoo, a lawyer in the Justice Department’s Office of Legal Counsel (OLC), sends a classified memo to White House counsel Alberto Gonzales. The contents of the memo will remain secret, but the American Civil Liberties Union (ACLU) will later learn that the memo is about the Geneva Conventions and is applicable to prisoners of war. Yoo’s boss, OLC head Jay Bybee, sends another secret memo about the Geneva Conventions to Deputy Attorney General Larry Thompson. [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: Jay S. Bybee, American Civil Liberties Union, Geneva Conventions, US Department of Justice, John C. Yoo, Office of Legal Counsel (DOJ), Larry D. Thompson

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

David Addington, the chief counsel for Vice President Cheney, writes that the Geneva Conventions’ “strict limits on questioning of enemy prisoners” cripple US efforts “to quickly obtain information from captured terrorists” (see January 18-25, 2002). Cheney is now grappling with the fundamental concept of how much pain and suffering US personnel can inflict on an enemy to make him divulge information. Addington worries that US personnel, including perhaps even Cheney, might someday face criminal charges of torture and abuse of prisoners. Geneva forbids not only torture but the use of “violence,” “cruel treatment” or “humiliating and degrading treatment” against a detainee “at any time and in any place whatsoever.” Such actions constitute felonies under the 1996 War Crimes Act. Addington decides that the best defense for any such charge will combine a broad presidential directive mandating general humane treatment for detainees, and an assertion of unrestricted authority to make exceptions. Bush will issue such a directive, which uses Addington’s words verbatim, two weeks later (see February 7, 2002). [Washington Post, 6/25/2007]

Entity Tags: Richard (“Dick”) Cheney, David S. Addington, Geneva Conventions

Category Tags: Impositions on Rights and Freedoms, Detainments in US, Government Acting in Secret, Government Classification, Gov't Violations of Prisoner Rights

James Ho, an attorney-adviser to the Office of Legal Counsel (OLC), sends a classified memo to the OLC’s John Yoo. The memo, entitled “RE: Possible interpretation of Common Article 3 of the 1949 Geneva Convention Relative to the Treatment of Prisoners of War,” will remain secret, but according to the American Civil Liberties Union (ACLU), it is likely a legal interpretation of Common Article 3 of the Geneva Convention, the section addressing the treatment of prisoners of war. The ACLU believes the memo interprets the scope of prohibited conduct under Common Artlcle 3, and gives specificity to the phrases “outrages upon personal dignity” and “humiliating and degrading treatment.” It also believes that the memo determines that Geneva does not apply to conflicts with terrorist organizations. Yoo will cite this memo in his 2003 memo concerning the military interrogation of so-called enemy combatants (see March 14, 2003). [American Civil Liberties Union [PDF], 1/28/2009 pdf file; ProPublica, 4/16/2009]

Entity Tags: Office of Legal Counsel (DOJ), American Civil Liberties Union, John C. Yoo, James C. Ho, US Department of Justice

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

In a memo concurrent with the presidential declaration that the Geneva Convention does not apply to Taliban or al-Qaeda fighters (see February 7, 2002), Jay Bybee, the head of the Justice Department’s Office of Legal Counsel, sends a memo to White House counsel Alberto Gonzales. Bybee concludes that President Bush has the legal authority to conclude that Taliban fighters have no rights to prisoner of war status as defined under the Geneva Conventions, because the Taliban lack an organized command structure, do not wear uniforms, and do not consider themselves bound by Geneva. It also concludes that there is no need for the US to convene Article 5 tribunals under Geneva to determine the status of the Taliban, as Bush’s presidential determination of their status eliminates any doubt under domestic law. [US Department of Justice, 2/7/2002 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: George W. Bush, Alberto R. Gonzales, Geneva Conventions, US Department of Justice, Taliban, Office of Legal Counsel (DOJ), Jay S. Bybee

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

Vice President Dick Cheney’s office refuses to disclose information about trips taken by its employees that are paid for by private financiers. The rationale is that since the Office of the Vice President (OVP) is not strictly part of the executive branch (see 2003), it need not disclose the information under the laws applying to that branch of the federal government. From this time forward, Cheney’s office repeatedly responds to inquiries by the Office of Government Ethics with letters stating “that it is not obligated to file such disclosure forms for travel funded by non-federal sources,” Kate Sheppard and Bob Williams of the Center for Public Integrity will write in 2005. “The letters were signed by then-Counsel to the Vice President David Addington…. Addington writes that the Office of the Vice President is not classified as an agency of the executive branch and is therefore not required to issue reports on travel, lodging and related expenses funded by non-federal sources.” Judicial Watch’s Tom Fitton will say that Cheney and his staff believe “the vice president is a constitutional office that is not subject to the laws that others in the executive branch are.” [Center for Public Integrity, 11/16/2005]

Entity Tags: David S. Addington, Bob Williams, Center for Public Integrity, Judicial Watch, Kate Sheppard, Tom Filton, Office of the Vice President, Richard (“Dick”) Cheney

Category Tags: Expansion of Presidential Power, Government Acting in Secret, Government Classification

Deputy Assistant Attorney General Joan Larsen and Gregory Jacob, an attorney-adviser to the Office of Legal Counsel (OLC), send a classified memo to lawyers in the Justice Department’s civil division. The memo will remain secret, but the American Civil Liberties Union (ACLU) will learn that it regards the availability of habeas corpus protections to detainees captured in the US’s “war on terror.” [American Civil Liberties Union [PDF], 1/28/2009 pdf file] The memo asserts that detainees have no habeas corpus protections, and therefore cannot challenge their detentions in US courts, despite multiple Supreme Court rulings to the contrary. [ProPublica, 4/16/2009]

Entity Tags: US Supreme Court, Joan Larsen, Office of Legal Counsel (DOJ), American Civil Liberties Union, Gregory Jacob, US Department of Justice

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

Phyllis Schlafly.Phyllis Schlafly. [Source: Phyllis Schlafly.com]The conservative commentator and activist Phyllis Schlafly writes, “The voters aren’t going to buy the sanctimonious argument that the Bush administration has some sort of duty to protect the power of the presidency.… The American people do not and should not tolerate government by secrecy.” [Eagle Forum, 3/6/2002]

Entity Tags: Bush administration (43), Phyllis Schlafly

Category Tags: Government Acting in Secret

President Bush refuses to allow DHS chief Tom Ridge to testify before Congress regarding the agency’s efforts to protect the nation. Bush’s rationale is that Ridge was on the White House staff before the department was created. Bush tells reporters, “Well, he’s not—he doesn’t have to testify; he’s a part of my staff, and that’s part of the prerogative of the Executive Branch of government. And we hold that very dear.… I’m not going to let Congress erode the power of the Executive Branch. I have a duty to protect the Executive Branch from legislative encroachment. I mean, for example, when the GAO [Government Accountability Office] demands documents from us, we’re not going to give them to them. These were privileged conversations. These were conversations when people come into our offices and brief us. Can you imagine having to give up every single transcript of what is—advised me or the Vice President? Our advice wouldn’t be good and honest and open. And so I viewed that as an encroachment on the power of the Executive Branch. I have an obligation to make sure that the presidency remains robust and the Legislative Branch doesn’t end up running the Executive Branch.” [White House, 3/13/2002; Dean, 2004, pp. 180]

Entity Tags: George W. Bush, Bush administration (43), Tom Ridge, Government Accountability Office

Category Tags: Expansion of Presidential Power, Government Acting in Secret

Jay Bybee, the chief of the Justice Department’s Office of Legal Counsel (OLC), issues a classified memo to William Howard Taft IV, the chief counsel of the State Department, titled “The President’s Power as Commander in Chief to Transfer Captive Terrorists to the Control and Custody of Foreign Nations.” The memo, actually written by Bybee’s deputy John Yoo, says Congress has no authority to block the president’s power to unilaterally transfer detainees in US custody to other countries. In essence, the memo grants President Bush the power to “rendition” terror suspects to countries without regard to the law or to Congressional legislation, as long as there is no explicit agreement between the US and the other nations to torture the detainees. [US Department of Justice, 3/12/2002 pdf file; Savage, 2007, pp. 148; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009] The memo directly contradicts the 1988 Convention Against Torture (see October 21, 1994), which specifically forbids the transfer of prisoners in the custody of a signatory country to a nation which practices torture. Once the treaty was ratified by Congress in 1994, it became binding law. But Yoo and Bybee argue that the president has the authority as commander in chief to ignore treaties and laws that supposedly interfere with his power to conduct wartime activities. [Savage, 2007, pp. 148-149] In 2009, when the memos are made public (see March 2, 2009), Jennifer Daskal of Human Rights Watch says she is shocked at the memo: “That is [the Office of Legal Counsel] telling people how to get away with sending someone to a nation to be tortured. The idea that the legal counsel’s office would be essentially telling the president how to violate the law is completely contrary to the purpose and the role of what a legal adviser is supposed to do.” [Washington Post, 3/3/2009]

Entity Tags: John C. Yoo, Jay S. Bybee, Office of Legal Counsel (DOJ), US Department of Justice

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Government Acting in Secret, Government Classification

White House chief of staff Andrew Card instructs government agencies to be watchful about safeguarding records that might contain any “information that could be misused to harm the security of our nation and the safety of our people.” Card’s order does not define terms, and agency heads are encouraged to define such cited information as broadly as possible. As a result, many government agencies begin refusing Freedom of Information Act (FOIA) requests under a broadly, and often crudely, applied rubric of “national security.” Card’s order precipitates a cascade of new designations for non-classified information that agencies do not want to release, including “For Official Use Only,” “Sensitive but Unclassified,” “Not for Public Dissemination,” and others. The Congressional Research Service will later estimate that some 50 to 60 new designations are created by various executive agencies to keep information away from the public. In addition, some agencies allow any official or employee, from the agency head to the lowliest clerk, to designate a document as off-limits; all 180,000 employees of the Department of Homeland Security, for example, can designate a document “For Official Use Only” and thus keep it out of public hands. Reporter and author Charlie Savage will write in 2007: “There is no system for tracking who stamped it, for what reason, and how long it should stay secret. There is no process for appealing a secrecy decision.” Websites containing reams of government information are purged and sometimes shut down entirely. Periodic reports containing information that someone deems sensitive, or perhaps merely embarrassing, are terminated. FOIA requests are routinely stalled. Even such innocuous documents as the Defense Department’s personnel directory, formerly available for sale at the Government Printing Office, is now deemed unsafe for public consumption. The Environmental Protection Agency stops publishing chemical plants’ plans for dealing with disasters, perhaps protecting the public from inquisitive terrorists but certainly easing the pressure on the plants to keep their disaster preparation plans current and effective. The Defense Department stops selling topographic charts, used by, among others, airlines for creating flight charts and biologists for mapping species distribution, for “fear” that “those intending harm” might use the charts to plot attacks on US targets. Even old press releases written specifically for public distribution are retroactively classified. [Andrew Card, 3/19/2002; Savage, 2007, pp. 101-103]

Entity Tags: Freedom of Information Act, Bush administration (43), Andrew Card, Charlie Savage, Environmental Protection Agency, Government Printing Office, US Department of Defense, US Department of Homeland Security, Congressional Research Service

Category Tags: Expansion of Presidential Power, Government Acting in Secret, Government Classification

Justice Department lawyer Patrick Philbin sends a classified memo to Daniel Bryant, a lawyer with the Justice Department’s Office of Legal Counsel, concerning the “Swift Justice Authorization Act.” The memo states that Congress has no power to interfere with President Bush’s authority to act as commander in chief to control US actions during wartime, including Bush’s authority to promulgate military commissions to try and sentence suspected terrorists and other detainees taken by the US as part of its “war on terror.” Philbin’s colleague, OLC lawyer John Yoo, will cite this memo in his 2003 memo concerning the military interrogation of so-called enemy combatants (see March 14, 2003). [US Department of Justice, 4/8/2002 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file] The memo will be made public in early 2009 (see March 2, 2009).

Entity Tags: Office of Legal Counsel (DOJ), Patrick F. Philbin, US Department of Justice, Daniel Bryant, John C. Yoo

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

The Foreign Intelligence Surveillance Court (FISC) turns down the Justice Department’s bid for sweeping new powers to monitor and wiretap US citizens. FISC judges rule that the government has misused the law and misled the court dozens of times. The court finds that Justice Department and FBI officials supplied false or misleading information to the court in over 75 applications for search warrants and wiretaps, including one signed by then-FBI director Louis Freeh. While the court does not find that the misrepresentations were deliberate, it does rule that not only were erroneous statements made, but important information was omitted from some FISA applications. The judges found so many inaccuracies and errors in FBI agent Michael Resnick’s affidavits that they bar him from ever appearing before the court again. The court cites “the troubling number of inaccurate FBI affidavits in so many FISA applications,” and says, “In virtually every instance, the government’s misstatements and omissions in FISA applications and violations of the Court’s orders involved information sharing and unauthorized disseminations to criminal investigators and prosecutors.” The court is also unhappy with the Justice Department’s failure to answer for these errors and omissions, writing, “How these misrepresentations occurred remains unexplained to the court.” The court finds that in light of such impropriety, the new procedures proposed by Attorney General John Ashcroft in March would give prosecutors too much control over counterintelligence investigations, and would allow the government to misuse intelligence information for criminal cases. The ruling is a severe blow to Ashcroft’s attempts since the 9/11 attacks to allow investigators working in terrorism and espionage to share more information with criminal investigators. (These limitations were put in place after the Church Commission’s findings of massive fraud and misuse of domestic surveillance programs during the 1950s, 60s, and 70s. See April, 1976, January 29, 1976, and December 21, 1974). The Justice Department says of the decision, “We believe the court’s action unnecessarily narrowed the Patriot Act and limited our ability to fully utilize the authority Congress gave us.” Interestingly, the Justice Department also opposed the public release of FISC’s decision not to grant the requested powers. Stewart Baker, former general counsel of the NSA, calls the opinion “a public rebuke. The message is you need better quality control. The judges want to ensure they have information they can rely on implicitly.” Bush officials have complained since the 9/11 attacks that FISA requirements hamper the ability of law enforcement and intelligence agents to track terrorist suspects, including alleged hijacking conspirator Zacarias Moussaoui (see August 16, 2001). Those requirements mandate that agents must show probable cause that the subject of a search or wiretap is an agent of a foreign government or terrorist group, and, because FISA standards for obtaining warrants is far lower than for ordinary criminal warrants, mandate strict limits on the distribution of information secured from such investigations. The FBI searched Moussaoui’s laptop computer and other belongings without a FISA warrant because some officials did not believe they could adequately show the court that Moussaoui had any connections to a foreign government or terrorist group. In its ruling, FISC suggests that if the Justice Department finds FISA too restrictive, they should ask Congress to update the law. Many senators on the Judiciary Committee say they are willing to enact such reforms, but have complained of resistance from Ashcroft and a lack of cooperation from the Bush administration. [Washington Post, 8/23/2002] In November 2002, the Foreign Intelligence Surveillance Court of Review will overturn the FISC decision and give the Justice Department what it asked for (see November 18, 2002).

Entity Tags: Foreign Intelligence Surveillance Court, Federal Bureau of Investigation, Charles Grassley, US Department of Justice, Stewart Baker, Zacarias Moussaoui, National Security Agency, John Ashcroft, Church Commission, USA Patriot Act, Louis J. Freeh, Michael Resnick

Category Tags: Court Procedures and Verdicts, Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, Database Programs, Other Surveillance

In a memo to Attorney General John Ashcroft, Jay Bybee, the head of the Justice Department’s Office of Legal Counsel (OLC), says that the US has the absolute right to detain US citizen Jose Padilla without charge and without legal representation (see May 8, 2002). Bybee also claims that the Posse Comitatus Act, which prevents the US military from operating inside the US itself, “poses no bar to the military’s operations in detaining Padilla.” [US Department of Justice, 6/8/2002 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file] The day after this memo is issued, Padilla is classified as an “enemy combatant” and transferred to the US Naval Brig in Charleston, South Carolina (see June 9, 2002).

Entity Tags: Jose Padilla, Jay S. Bybee, John Ashcroft, US Department of Justice, Posse Comitatus Act, Office of Legal Counsel (DOJ)

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Detainments in US, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification, Citizenship Rights

John Yoo, a lawyer with the Office of Legal Counsel (OLC), sends a classified memo to Daniel J. Bryant, another OLC lawyer. Yoo concludes that the Constitution “vests full control of the military operations of the United States to the president,” and denies Congress any role in overseeing or influencing such operations. The memo is consisent with an earlier Justice Department memo (see April 8, 2002). Yoo will cite this memo in his 2003 memo concerning the military interrogation of so-called enemy combatants (see March 14, 2003). [US Department of Justice`, 6/27/2002 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file] The memo ignores the Non-Detention Act, which states, “No citizen shall be imprisoned or otherwise detained by the United States except pursuant to an act of Congress.” [ProPublica, 4/16/2009] It will be made public in early 2009 (see March 2, 2009).

Entity Tags: John C. Yoo, Daniel Bryant, Office of Legal Counsel (DOJ), US Department of Justice

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Government Acting in Secret, Government Classification

Military lawyers for a detainee believed to be Abu Zubaida (see March 28, 2002) lodge numerous complaints with unidentified White House officials over the torture of their client. Zubaida has been subjected to waterboarding and other abuses by CIA interrogators (see March 28, 2002-Mid-2004, March 28-August 1, 2002, Mid-April-May 2002, Mid-April 2002, and Mid-May 2002 and After). The complaints trigger a hastily arranged meeting between Vice President Cheney, White House counsel Alberto Gonzales, Cheney’s chief counsel David Addington, National Security Adviser Condoleezza Rice, and a number of officials from the Defense and State Departments. The discussion centers on the production of a legal memo specifically for the CIA that would provide retroactive legal immunity for the use of waterboarding and other illegal interrogation methods. According to a subsequent investigation by the Justice Department (see February 22, 2009), the participants in the discussion believe that the methods used against Zubaida are legal because on February 7, 2002, President Bush signed an executive order stating that terrorists were not entitled to protections under the Geneva Conventions (see February 7, 2002). Nevertheless, the participants agree that methods such as waterboarding probably violate international and domestic laws against torture, and therefore the CIA and the Bush administration would both benefit from a legal opinion stating what techniques are legal, and why they do not fit the legal definition of torture. The meeting results in the production of the so-called “Golden Shield” memo (see August 1, 2002). [Public Record, 2/22/2009]

Entity Tags: US Department of State, Bush administration (43), Alberto R. Gonzales, Abu Zubaida, Central Intelligence Agency, US Department of Justice, Condoleezza Rice, Geneva Conventions, David S. Addington, Richard (“Dick”) Cheney, George W. Bush, US Department of Defense

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Other Legal Changes, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

John Yoo, a lawyer with the Office of Legal Counsel (OLC), sends a classified memo to White House counsel Alberto Gonzales. The memo’s contents will remain secret, but the American Civil Liberties Union (ACLU) will learn that the memo regards the 1984 Convention Against Torture. According to the memo, the first fifteen articles of the Convention, ratified by the United States almost a decade before, “are non-self executing and place no affirmative obligations on the executive branch.” Furthermore, international law in general “lacks domestic legal effect, and in any event can be overridden by the president,” the memo states. In essence, Yoo concludes that the Convention can be ignored by the president. Yoo will cite this memo in his 2003 memo concerning the military interrogation of so-called enemy combatants (see March 14, 2003). [United Nations High Commissioner for Human Rights, 12/10/1984; American Civil Liberties Union [PDF], 1/28/2009 pdf file; ProPublica, 4/16/2009]

Entity Tags: John C. Yoo, Alberto R. Gonzales, American Civil Liberties Union, Convention Against Torture, Bush administration (43), US Department of Justice, Office of Legal Counsel (DOJ)

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Gov't Violations of Prisoner Rights, Government Acting in Secret, Government Classification

District Court Judge Emmet Sullivan rules that if Vice President Dick Cheney wants to have him dismiss a lawsuit brought by the watchdog organization Judicial Watch (see June 25, 2001), Cheney must show him the task force documents so that he can make an informed decision. No one else would see the documents, Sullivan says, and he cites a 1993 ruling forcing the Clinton health care task force to reveal its source documents and allow a judge to decide whether that task force had had outside lobbyists directly participating in its work. Judicial Watch’s director of investigations, Chris Farrell, is jubilant over Sullivan’s ruling. “It was very encouraging,” he will later recall. “It looked like the judge had the intellectual honesty and courage to at least give it an evaluation and a fair look. If, in fact, everything the administration was saying was true, then the judge would look at it and draw that conclusion. At least then the public would have some sense of confidence and trust that the right thing was being done, because a fresh set of eyes had looked at it. Without that check, you don’t know.” But Cheney refuses to comply with the order, and instead appeals Sullivan’s decision, asking an appeals court to summarily dismiss Sullivan’s ruling without first making Cheney show the documents to a judge. The appeals court will turn Cheney down, paving the way for a Supreme Court hearing (see December 15, 2003). [Savage, 2007, pp. 160-161]

Entity Tags: Richard (“Dick”) Cheney, Emmet Sullivan, Judicial Watch, Chris Farrell

Timeline Tags: US Environmental Record

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Government Acting in Secret

As Bush administration lawyers warn that Vice President Cheney and his Pentagon allies are setting the government up for defeat in the courts with their hardline advice on interrogation techniques (see Late 2001-Early 2002, January 25, 2002, April 2002 and After, and August 1, 2002) and indefinite detentions (see After September 11, 2001 and December 2001-January 2002), one of the uneasiest of Justice Department lawyers is Solicitor General Theodore Olson. Cheney and Olson have similar views on the expansion of presidential powers, but his job in the administration is to win court cases. Olson is not sure that Cheney’s legal arguments are tenable. Olson is particularly worried about two pending cases, those of US citizens Jose Padilla (see June 10, 2002) and Yaser Esam Hamdi (see December 2001 and August 16, 2002). Both have been declared enemy combatants and denied access to lawyers. Olson warns that federal courts will not go along with that provision, but he finds himself opposed by CIA and Pentagon officials. When Olson and other lawyers propose that Padilla and Hamdi be granted lawyers, Cheney’s chief lawyer, David Addington, beats back their proposal because, says deputy White House counsel Timothy Flanigan, “that was the position of his client, the vice president.” The issue comes to a head in the West Wing office of Alberto Gonzales, the White House’s chief legal counsel. Four officials with direct knowledge of the meeting later recall the chain of events. Olson has the support of associate White House counsel Bradford Berenson, a former law clerk to Supreme Court Justice Anthony Kennedy. Berenson says that Kennedy, the Court’s swing vote, will never accept absolute presidential authority to declare a US citizen an enemy and lock him away without benefit of counsel. Another former Kennedy law clerk, White House lawyer Brett Kavanaugh, had made the same argument earlier. Addington, representing Cheney in the meeting, accuses Berenson of surrendering presidential authority on what he calls a fool’s prophecy about the Court; Berenson retorts by accusing Addington of “know-nothingness.” Gonzales listens quietly as the Justice Department and his own staff line up against Addington. He finally makes a decision: in favor of Cheney and Addington. [Washington Post, 6/25/2007]

Entity Tags: US Department of Defense, Brett Kavanaugh, Bradford Berenson, Alberto R. Gonzales, Central Intelligence Agency, Theodore (“Ted”) Olson, David S. Addington, Richard (“Dick”) Cheney, US Department of Justice, Jose Padilla, Yaser Esam Hamdi, Timothy E. Flanigan

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Detainments in US, Government Acting in Secret, Gov't Violations of Prisoner Rights

The NSA’s enormous data mining program, Novel Intelligence from Massive Data (NIMD—see After September 11, 2001), closely resembles another data mining program, the Defense Department’s Total Information Awareness program (see March 2002). TIA, which will be suspended in 2003 after outcries from citizens and legal experts concerned over that program’s refusal to comply with fundamental Constitutional guarantees of privacy, was also designed as an early-warning system that not only compiled intelligence data, but mined through private financial databases for credit-card and other financial transactions. Six of the corporations and research institutions who win NIMD contracts also held contracts for the earlier TIA project. Much of their work with TIA duplicated the same aspects and protocols to be used by NIMD, including challenging analytic assumptions and building prototype data-mining devices. Both TIA and NIMD attempt to second-guess human analysts’ conclusions over a particular data schema by creating a database of what TIA creator John Poindexter once called “plausible futures,” or likely terrorism scenarios. NIMD is a creation of the Advanced Research and Development Activity agency (ARDA); another ARDA project, the Advanced Capabilities for Intelligence Analysis (ACIA) also envisions a similar database (see 2005). Though TIA focused more on counterterrorism than the more sweeping NIMD, the two projects coordinated closely with one another, according to former program manager Tom Armour, who worked in Poindexter’s office.
NIMD Survives In Other Agencies - Congress will eliminate funding for TIA and other Poindexter projects, but many of those projects, and related projects such as NIMD, do not disappear. Many are instead transferred to intelligence agencies such as the NSA. Although information about these projects is strictly classified, a former Army intelligence analyst familiar with the programs will confirm in 2006 that large elements of TIA were transferred to other agencies, where they will continue to be researched and implemented. It is highly likely that NIMD is an offshoot and outgrowth of TIA. Armour will say the two programs are specifically designed to analyze large amounts of phone and e-mail traffic: “That’s, in fact, what the interest is.” [National Journal, 1/20/2006]
Government 'Shell Game' - Steven Aftergood of the Federation of American Scientists says in 2004, “The whole congressional action looks like a shell game. There may be enough of a difference for them to claim TIA was terminated while for all practical purposes the identical work is continuing.” [Associated Press, 2/23/2004] Aftergood will note that NIMD has thrived in the shadows where TIA died of exposure: “Pursued with a minimal public profile and lacking a polarizing figure like Admiral Poindexter to galvanize opposition, NIMD has proceeded quietly even as TIA imploded.” [Defense Tech, 9/26/2003]

Entity Tags: Tom Armour, Total Information Awareness, Steven Aftergood, Novel Intelligence from Massive Data, John Poindexter, National Security Agency, Advanced Research and Development Activity, Federation of American Scientists (FAS), George W. Bush, Advanced Capabilities for Intelligence Analysis

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, Database Programs, NSA Wiretapping / Stellar Wind

Defense Secretary Donald Rumsfeld holds a “top secret” briefing on Iraq for selected Congressional members, including, among others, Senator John McCain (R-AZ). The briefing takes place in the most secure room in the Capitol, a small, windowless chamber that is ostentatiously swept for bugs before the briefing. At the outset, the lawmakers are sworn to deepest secrecy. But during the briefing, Rumsfeld tells the assembled members nothing they couldn’t learn by watching the nightly news. McCain abruptly leaves the meeting, and later says, “It was a joke.” Vice President Cheney has said that the administration doesn’t trust the 535 members of Congress not to leak classified information, and therefore they must make their decisions concerning war with Iraq without the benefit of complete intelligence briefings (see Before September 9, 2002 and After). McCain reflects the feelings of many members in expressing his aggravation with the administration. “It becomes almost insulting after a while,” he says. “Everyone that goes to them is frustrated.” Rather than give “pretend” briefings that convey little information, McCain says, President Bush should just suspend the briefings entirely. House member Robert Menendez (D-NJ) says many members are skipping the briefings entirely to avoid signing a secrecy pledge that restricts what they can and cannot talk about. Menendez, briefed earlier by National Security Adviser Condoleezza Rice and CIA Director George Tenet, says, “I heard nothing that was new, compelling, or that I have not heard before.” White House spokesman Ari Fleischer says, “The White House will continue to as fully inform as possible members of Congress, while also preserving sensitive intelligence information so no inadvertent disclosure jeopardizes sources or methods or missions.” The White House has had some success with Democrats who might be resistant to its arguments for war by choosing to give more complete briefings to a few selected Democratic leaders, including House Minority Leader Richard Gephardt (D-MO). As a result, Democratic leaders in Congress are more supportive of the push towards war than many of their rank-and-file colleagues. [Washington Post, 9/15/2002]

Entity Tags: George J. Tenet, Condoleezza Rice, Ari Fleischer, Donald Rumsfeld, Robert Menendez, US Department of Defense, John McCain, George W. Bush, Richard Gephardt, Richard (“Dick”) Cheney

Category Tags: Expansion of Presidential Power, Government Acting in Secret

Vice President Cheney continues to argue his case for war with Iraq, this time during an appearance on PBS’s “News Hour with Jim Lehrer.” “We know based on primarily intelligence reporting [that Saddam Hussein] is continuing to expand and improve his biological weapons capability both in terms of production and delivery systems; we know he is working once again on a nuclear program.” Cheney goes on to say that Congress would have to make a decision on whether to authorize an attack on Iraq without being able to see the evidence that Cheney says exists. To brief Congress—535 lawmakers—about such “highly classified” matters would invite leaks that would potentially compromise national security. Instead, lawmakers who do not sit on the respective intelligence committees will have to make their decisions based on the limited amount of information the White House chooses to share with them. [Savage, 2007, pp. 157, 357]

Entity Tags: Richard (“Dick”) Cheney

Timeline Tags: Events Leading to Iraq Invasion

Category Tags: Expansion of Presidential Power, Government Acting in Secret

The Third US Court of Appeals in Philadelphia rules 2-1 to uphold the Bush administration’s claim of blanket secrecy regarding immigration deportation hearings (see September 21, 2001). The ruling directly contradicts a ruling by the Sixth Appeals Court on the same issue (see August 26, 2002). Chief Judge Edward Becker, a Reagan appointee, rules that if a president or his top advisers decide that blanket closure of immigration deportation hearings is needed to protect national security, then the courts should defer to their judgment. “We are quite hesitant to conduct a judicial inquiry into the credibility of these security concerns, as national security is an area where courts have traditionally extended great deference to executive expertise.” Usually when two appellate courts conflict in their rulings, the Supreme Court settles the issue. However, the Bush administration does not appeal the loss in the other case, as the 9/11-related immigration sweeps are already concluded. In 2007, author Charlie Savage will write, “As a result, even though four of the six appeals court judges who reviewed the… directive rejected it as unconstitutional, the administration managed to create a precedent for a presidential power to impose blanket secrecy over immigration hearings that stands in forty-six states—everywhere except the Sixth Circuit’s Kentucky, Michigan, Ohio, and Tennessee.” [Savage, 2007, pp. 95-96]

Entity Tags: Charlie Savage, Edward Becker, Bush administration (43)

Category Tags: Expansion of Presidential Power, Court Procedures and Verdicts, Government Acting in Secret

The Office of Legal Counsel (OLC)‘s John Yoo sends a classified memo to Attorney General John Ashcroft. The contents of the memo remain secret, but the American Civil Liberties Union (ACLU) will later learn that the memo’s subject is the legality of certain communications intelligence activities. [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: US Department of Justice, American Civil Liberties Union, John Ashcroft, John C. Yoo, Office of Legal Counsel (DOJ)

Category Tags: Impositions on Rights and Freedoms, Expansion of Presidential Power, Government Acting in Secret, Government Classification

The Justice Department provides limited information to the House Judiciary Committee about actions performed under the new Patriot Act (see October 26, 2001). Representative James Sensenbrenner (R-WI) had demanded answers to 50 questions regarding the Patriot Act from Attorney General John Ashcroft, or else he would “start blowing a fuse.” Among other things, Sensenbrenner wanted to know how many times the Justice Department had implemented wiretaps under the act, and threatened Congressional subpoenas and opposition to the act when it comes up for renewal. Sensenbrenner and the Judiciary Committee receive far less than originally requested, with the Justice Department asserting that much of the information is classified and cannot be revealed. Sensenbrenner declares himself satisfied. [Savage, 2007, pp. 114-115]

Entity Tags: James Sensenbrenner, House Judiciary Committee, USA Patriot Act, John Ashcroft, US Department of Justice

Category Tags: Impositions on Rights and Freedoms, Patriot Act, Government Acting in Secret, Government Classification

The Foreign Intelligence Surveillance Court of Review, in its first-ever ruling, overturns a ruling by the Foreign Intelligence Surveillance Court (see May 17, 2002) that stopped the Justice Department from being granted sweeping new powers to conduct domestic surveillance on US citizens. [American Civil Liberties Union, 11/18/2002; FindLaw, 11/18/2002 pdf file]
'Rubber Stamp' - The ACLU’s Ann Beeson says of the ruling, “We are deeply disappointed with the decision, which suggests that this special court exists only to rubberstamp government applications for intrusive surveillance warrants. “As of today, the Attorney General can suspend the ordinary requirements of the Fourth Amendment in order to listen in on phone calls, read e-mails, and conduct secret searches of Americans’ homes and offices.” The ACLU and other civil liberties organizations filed a friend-of-the-court brief asking that the original ruling stand. The ACLU and its partners are considering appealing the decision to the Supreme Court, as well as asking Congress to legislate tighter restrictions on the Justice Department’s ability to conduct domestic surveillance. Beeson notes that appealing the FISA Review Court’s decision might be impossible: “This is a major Constitutional decision that will affect every American’s privacy rights, yet there is no way anyone but the government can automatically appeal this ruling to the Supreme Court. Hearing a one-sided argument and doing so in secret goes against the traditions of fairness and open government that have been the hallmark of our democracy.” The FISC Review Court is a special three-judge panel appointed by Chief Justice William Rehnquist in accordance with provisions of the Foreign Intelligence Surveillance Act. The judges include appellate court justices Laurence Silberman, Edward Leavy, and Ralph Guy, Jr. [American Civil Liberties Union, 11/18/2002]
Law Professor Slams Ruling - Law professor Raneta Lawson Mack is highly critical of the ruling. Mack writes that the court twisted its reasoning upon itself in order to give the Justice Department what it asked for. It misrepresented the facts and legal arguments of the case. It gratuitously insulted the ACLU and other “friends of the court” in its ruling. It wrote that the entire FISA law is constitutional even though its standards conflict with the Fourth Amendment. To justify its ruling from a legislative standpoint, the Review Court cherrypicked statements by legislators that supported the Justice Department’s stance while ignoring those from other viewpoints. It called the Bush administration’s efforts to challenge the “firewall” between law enforcement and foreign intelligence as “heroic,” even though the Justice Department, Congress, and FISA itself recognizes and accepts the dichotomy. It accepted without question or evidence the government’s contention that false, misleading, or inaccurate FBI affidavits in numerous FISA applications were a result of “confusion within the Justice Department over implementation” of the firewall procedures that the Justice Department itself drafted and implemented. Mack writes that the court failed entirely to grapple with one key question that, if considered, would, in her opinion, “easily have laid bare the Executive Branch’s thinly-veiled quest for unconstrained authority to invade the privacy of US citizens with minimal oversight.” The question is, “why would the government need to alter procedures for obtaining FISA warrants when the lower FISA court had never rejected an application? Indeed, according to the lower FISA court opinion the court had ‘reviewed and approved several thousand FISA applications, including many hundreds of surveillances and searches of US persons [and had] long accepted and approved minimization procedures authorizing in-depth information sharing and coordination with criminal prosecutors.’” The lower court ruling provided for coordination and sharing of information between law enforcement and government agencies, Mack notes, and writes that in light of that finding, “can the government seriously contend that the minimization procedures that it drafted in 1995, which the lower FISA court dutifully adopted, were too restrictive, warranting a still more lenient approach?” Mack considers the ruling to be “legally unsound.” She is appalled by the Review Court’s groundless implication that FISA hindered the ability of the FBI to anticipate and perhaps prevent the 9/11 attacks. “What the lower FISA court recognized and, indeed, what all Americans should legitimately fear is that the Executive branch is disingenuously using its September 11th failures in conjunction with the hastily drafted and poorly crafted Patriot Act to ‘give the government a powerful engine for the collection of foreign intelligence information targeting US persons.’ By adhering to the minimization procedures, the lower FISA court merely sought to assure that the balance between legitimate national security concerns and individual privacy was not disturbed by seemingly unconstrained executive power.… [T]here is… no question that a secret FISA appellate court structure, with judges hand selected by the Chief Justice of the US Supreme Court, that hears only the government’s evidence, and grants only the government a right to appeal is a singularly inappropriate forum to resolve issues that threaten the fundamental rights and values of all US citizens. The only question that remains is how much further our justice system will be derailed in pursuit of the war on terrorism.” [Jurist, 11/26/2002]

An aerial view of the AT&T Easylink Service building in Bridgeton, Missouri, where the NSA allegedly has secret facilities.An aerial view of the AT&T Easylink Service building in Bridgeton, Missouri, where the NSA allegedly has secret facilities. [Source: USGS via Microsoft]On behalf of the National Security Agency (NSA), AT&T constructs a secret, highly secured room in its network operations center in Bridgeton, Missouri, used to conduct secret government wiretapping operations. This is a larger and more elaborate “data mining” center than the one AT&T has constructed in San Francisco (see January 2003). Salon’s Kim Zetter will later write that the Bridgeton facility “had the earmarks of a National Security Agency operation,” including a sophisticated “mantrap” entrance using retinal and fingerprint scanners. Sometime in early 2003, AT&T technician Mark Klein (see July 7, 2009) discusses the Bridgeton facility with a senior AT&T manager, whom he will only identify as “Morgan.” The manager tells Klein that he considers the Bridgeton facility “creepy,” very secretive and with access restricted to only a few personnel. Morgan tells Klein that the secure room at Bridgeton features a logo on the door, which Klein will describe as “the eye-on-the-pyramid logo which is on the back of the dollar bill—and that got my attention because I knew that was for awhile the logo of the Total Awareness Program” (TIA-see Mid-January 2002, March 2002 and November 9, 2002). Klein notes that the logo “became such a laughingstock that they [the US government] withdrew it.” However, neither Klein nor Morgan find the NSA secure room at Bridgeton amusing. In June 2006, two AT&T workers will tell Zetter that the 100 or so employees who work in the room are “monitoring network traffic” for “a government agency,” later determined to be the NSA. Only government officials or AT&T employees with top-secret security clearance are admitted to the room, which is secured with a biometric “mantrap” or highly sophisticated double door, secured with retinal and fingerprint scanners. The few AT&T employees allowed into the room have undergone exhaustive security clearance procedures. “It was very hush-hush,” one of the AT&T workers will recall. “We were told there was going to be some government personnel working in that room. We were told: ‘Do not try to speak to them. Do not hamper their work. Do not impede anything that they’re doing.’” (Neither of Zetter’s sources is Klein, who by the time Zetter’s article is published in 2006, will have made his concerns about the NSA and AT&T public.) The Bridgeton facility is the central “command center” for AT&T’s management of all routers and circuits carrying domestic and international Internet traffic. Hence, it is the ideal location for conducting surveillance or collecting data. AT&T controls about a third of all bandwidth carrying Internet traffic to and from homes and businesses throughout the US. The two employees, who both will leave AT&T to work with other telecommunications firms, will say they cannot be sure what kinds of activities actually take place within the secret room. The allegations follow those made by Klein, who after his retirement (see May 2004) will submit an affidavit stating his knowledge of other, similar facilities in San Francisco and other West Coast switching centers, whose construction and operations were overseen by the NSA (see January 16, 2004 and January 2003); the two AT&T employees say that the orders for the San Francisco facility came from Bridgeton. NSA expert Matthew Aid will say of the Bridgeton facility, “I’m not a betting man, but if I had to plunk $100 down, I’d say it’s safe that it’s NSA.” Aid will say the Bridgeton facility is most likely part of “what is obviously a much larger operation, or series of interrelated operations” combining foreign intelligence gathering with domestic eavesdropping and data collection. Former high-level NSA intelligence officer Russell Tice will say bluntly: “You’re talking about a backbone for computer communications, and that’s NSA.… Whatever is happening there with the security you’re talking about is a whole lot more closely held than what’s going on with the Klein case.” The kind of vetting that the Bridgeton AT&T employees underwent points to the NSA, both Aid and Tice will say; one of the two AT&T employees who will reveal the existence of the Bridgeton facility will add, “Although they work for AT&T, they’re actually doing a job for the government.” Aid will add that, while it is possible that the Bridgeton facility is actually a center for legal FBI operations, it is unlikely due to the stringent security safeguards in place: “The FBI, which is probably the least technical agency in the US government, doesn’t use mantraps. But virtually every area of the NSA’s buildings that contain sensitive operations require you to go through a mantrap with retinal and fingerprint scanners. All of the sensitive offices in NSA buildings have them.” The American Civil Liberties Union’s Jameel Jaffer will add that when the FBI wants information from a telecom such as AT&T, it would merely show up at the firm with a warrant and have a wiretap placed. And both the NSA and FBI can legally, with warrants, tap into communications data using existing technological infrastructure, without the need for such sophisticated surveillance and data-mining facilities as the ones in Bridgeton and San Francisco. Both AT&T and the NSA will refuse to comment on the facilities in Bridgeton, citing national security concerns. [Salon, 6/21/2006; Klein, 2009, pp. 28-30]

Entity Tags: Terrorist Surveillance Program, National Security Agency, Russell Tice, Matthew Aid, Federal Bureau of Investigation, Kim Zetter, Mark Klein, AT&T, Jameel Jaffer, “Morgan” (senior AT&T manager), American Civil Liberties Union

Category Tags: Impositions on Rights and Freedoms, Privacy, Government Acting in Secret, Government Classification, Database Programs, NSA Wiretapping / Stellar Wind

Assistant Attorney General William Moschella informs the ranking members of the House and Senate Intelligence committees of the administration’s use of potentially unconstitutional data mining and electronic surveillance programs after the 9/11 attacks. Moschella tells the lawmakers, “The president determined that it was necessary following September 11 to create an early-warning detection system” to prevent more attacks. One such program is the Novel Intelligence from Massive Data (NIMD) initiative (see After September 11, 2001). Moschella echoes the claims of National Security Agency director Michael Hayden and other administration officials, saying that the Foreign Intelligence Surveillance Act (FISA), which allows the government to obtain warrants to conduct domestic eavesdropping or wiretapping, “could not have provided the speed and agility required for the early-warning detection system.” [National Journal, 1/20/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002). Moschella informs the lawmakers of none of this.

Entity Tags: Senate Intelligence Committee, William E. Moschella, Michael Hayden, Bush administration (43), Foreign Intelligence Surveillance Act, Novel Intelligence from Massive Data, House Intelligence Committee

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, Database Programs, Other Surveillance

District Court Judge John Bates rules against the General Accounting Office (GAO), the investigative arm of Congress, in its attempt to force Vice President Cheney to disclose some of his Energy Task Force documents (see January 29, 2001 and May 16, 2001). The judge writes, “This case, in which neither a House of Congress nor any congressional committee has issued a subpoena for the disputed information or authorized this suit, is not the setting for such unprecedented judicial action.” [Associated Press, 12/9/2002] Bates is a Republican who worked as the deputy independent counsel to Kenneth Starr in the Whitewater investigation, and was appointed to the bench by President Bush in 2001. [Savage, 2007, pp. 112] The GAO later declines to appeal the ruling (see February 7, 2003). In a similar suit being filed by Judicial Watch and the Sierra Club, the Bush administration has successfully delayed deadlines forcing these documents to be turned over. [Associated Press, 12/6/2002] That case will eventually be decided in the administration’s favor (see May 10, 2005).
Cheney Pushes Back - Unfortunately, the ruling’s claim of no Congressional involvement is somewhat misleading. The original request for information came from two ranking House members, Henry Waxman (D-CA) of the Committee on Government Reform and John Conyers (D-MI) of the Energy and Commerce Committee (see April 19 - May 4, 2001). Waxman and Conyers followed standard procedure by writing to David Walker, head of the GAO, to request information about who was meeting with the task force and what the task force was doing (May 8, 2001. Instead of complying with the request, Cheney’s legal counsel, David Addington, replied that the task force was not subject to the Federal Advisory Committee Act, and therefore not bound by law to provide such information (see May 16 - 17, 2001). Addington later challenged the GAO’s authority, saying that it was trying “to intrude into the heart of Executive deliberations, including deliberations among the President, the Vice President, members of the President’s Cabinet, and the President’s immediate assistants, which the law protects to ensure the candor in Executive deliberation necessary to effective government.” The GAO was not asking for such information; former Nixon White House counsel John Dean will write in 2004, “It was clear [Addington] was looking to pick a fight.”
Tug of War - The GAO advised Addington that it did indeed have the legal power to examine the deliberations of such entities as the task force, and provided Addington both the statutory law and the legislative history, which flatly contradicted Addington’s refusal. The GAO also noted that it was “not inquiring into the deliberative process but [was] focused on gathering factual information regarding the process of developing President Bush’s National Energy Policy.” The GAO even narrowed the scope of its original request, asking only for the names of those who had worked with the task force, and the dates (see July 31, 2001). But this provoked further resistance from Cheney and his office, with Cheney publicly stating on numerous occasions that the GAO was unlawfully trying to intrude into the deliberative process. Walker’s patience ran out in January 2002, and he notified the White House and Congress that the GAO was taking the administration to court (see February 22, 2002).
Hardball in Federal Court - Usually the case will be handled by lawyers from the Justice Department’s Civil Division. But this case is much more important to the White House to be left to the usual group of attorneys. Instead, this lawsuit is one of the very few to be handled by a special unit operating under the direct supervision of Deputy Solicitor General Paul Clement and Clement’s boss, Solicitor General Theodore Olson. Olson, the lawyer who spearheaded the team that successfully argued the December 2000 Bush v. Gore case that awarded George W. Bush the presidency. Dean later learns that this special team was created specifically to find and handle cases that they can take to the Supreme Court in order to rewrite existing law, mostly laws that restrict the power of the presidency (see January 21, 2001). Many career attorneys at the Justice Department will become so offended by the existence and the agenda of this special legal team that they will resign their positions. The administraton sent a strong signal to Judge Bates when it sent Olson, who has argued many times before the Supreme Court, to argue the government’s case in his court. Dean will write that Bates, a recent Bush appointee and a veteran of the Whitewater investigation, “got the message.” He knows this case is slated to go to the Supreme Court if it doesn’t go the way the White House wants.
Standing the Law On Its Head - According to Dean, Bates turns the entire body of statutory law overseeing the GAO and its powers to compel information from the executive branch on its head. He rules that the GAO lacks the “standing to sue,” saying that it doesn’t have enough of a legal stake in the controversy to have a role in trying to compel information. Bates, flying in the face of over eight decades of law and precedent, rules that, in essence, the GAO is merely an agent of Congress, and because neither the GAO nor Walker had suffered injury because of the task force’s refusal to comply with its request, the GAO has no legal recourse against the executive branch. Bates hangs much of his ruling on the fact that Congress has not yet subpoenaed the White House for the task force information. Thusly, Bates guts the entire structure of enforcement authority the GAO has as part of its statutory mandate. Bates does not go as far as the Justice Department wants, by not specifically ruling that the entire GAO statute is unconstitutional, but otherwise Bates’s ruling is a complete victory for the White House. [Dean, 2004, pp. 76-80] Authors Lou Dubose and Jake Bernstein later write that “Bates’s ruling creates a legislative Catch-22 for Democrats.” Because the GOP is the majority party, and because GOP Congressional leaders refuse to subpoena the White House on virtually any issue or conflict, no such subpoenas as Bates is mandating are likely to ever be granted by Republican committee chairmen. [Dubose and Bernstein, 2006, pp. 14] In 2007, author and reporter Charlie Savage will write that Bates’s ruling severely eroded the GAO’s “ability to threaten to file a lawsuit [and] damaged the congressional watchdog’s capability to persuade executive branch agencies to comply with its requests for information.… Bates had established a principle that, if left undisturbed, could change the attitudes of executive branch officials when the GAO asked for documents they did not want to disclose.” [Savage, 2007, pp. 112-113]

Entity Tags: John Dean, Lou Dubose, Paul Clement, Sierra Club, John Conyers, US Supreme Court, US Department of Justice, Theodore (“Ted”) Olson, Richard (“Dick”) Cheney, John Bates, Judicial Watch, Henry A. Waxman, Bush administration (43), Charlie Savage, David Walker, David S. Addington, Government Accountability Office, Energy Task Force, Jake Bernstein, Federal Advisory Committee Act

Timeline Tags: US Environmental Record

Category Tags: Court Procedures and Verdicts, Government Acting in Secret

An internal audit shows that the cutting-edge electronic surveillance system, DCSNet (see 1997-August 2007 and After), is unacceptably vulnerable to hacking and exploitation. The audit finds numerous security vulnerabilities, including the allowing of multiple and shared logins, a lack of firewall and antivirus software, and Windows-based vulnerabilities surrounding the operating system’s administrative functions. Steven Bellovin, a computer science professor and surveillance expert, says the risks from insiders are particularly worrisome. “The underlying problem isn’t so much the weaknesses here, as the FBI attitude towards security,” he says. The FBI assumes “the threat is from the outside, not the inside,” and believes that “to the extent that inside threats exist, they can be controlled by process rather than technology.” He considers the entire system at risk both from insiders and hackers from outside. “Any time something is tappable there is a risk,” Bellovin says. “I’m not saying, ‘Don’t do wiretaps,’ but when you start designing a system to be wiretappable, you start to create a new vulnerability. A wiretap is, by definition, a vulnerability from the point of the third party. The question is, can you control it?” [Wired News, 8/29/2007]

Entity Tags: Digital Collection System, Steven Bellovin, Federal Bureau of Investigation

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, Other Surveillance

Vice President Dick Cheney unilaterally exempts his office from Executive Order 12958, which established government-wide procedures for safeguarding classified national security information. [White House, 4/17/1995; Congress Committee On Oversight And Government Reform, 6/21/2007] It was amended by President Bush’s Executive Order 13292 (see March 25, 2003) to require that all agencies or “any other entity within the executive branch that comes into the possession of classified information” regularly report on their activities to the Information Security Oversight Office. [White House, 3/25/2003]
Vice President Not Part of Executive Branch, Cheney Argues - Cheney’s argument is that the vice president’s office is not part of the executive branch, and therefore has no legal obligation to report on its classification decisions as mandated by the order. Cheney justifies his position by noting that the vice president has a role in both the executive and legislative branches—the vice president is also president of the Senate—and the vice president’s office is not an agency. In May 2006, Cheney spokeswoman Lea Anne McBride will say, “This has been thoroughly reviewed and it’s been determined that the reporting requirement does not apply to [the office of the vice president], which has both legislative and executive functions.” (McBride does not say who reviewed the claim.)
Criticism - Others, such as government secrecy expert Steven Aftergood of the Federation of American Scientists, disagree. “It undermines oversight of the classification system and reveals a disdain for presidential authority,” he says. “It’s part of a larger picture of disrespect that this vice president has shown for the norms of oversight and accountability.” Around 80 agencies and entities must report annually to the National Archives; besides the Office of the Vice President, only the president’s Homeland Security Council and the president’s Foreign Intelligence Advisory Board have as yet failed to report on their activities. Aftergood will say: “Somebody made a decision that they don’t want to do what they used to do.… They have to explain why they stopped doing it, and they haven’t done that.” [ABC News, 6/21/2007] Law professor Garrett Epps observes: “The vice president is saying he doesn’t have to follow the orders of the president. That’s a very interesting proposition.” And Judicial Watch’s Paul Orfanedes says Cheney’s claim “seems most disingenuous.” [Cox News Service, 6/21/2007]
Retaliation For Attempt To Force Compliance - The National Archives’ Information Security Oversight Office (ISOO) will attempt in 2004 to conduct an inspection of Cheney’s offices pursuant to the executive order; Cheney’s staff will block the inspection, the first time since the ISOO’s inception in 1978 that one of its inspections has been thwarted. The National Archives will protest Cheney’s decision (see June 8, 2006 and January 9, 2007); Cheney will respond by attempting to abolish the ISOO (see May 29, 2007-June 7, 2007). [Henry A. Waxman, 6/21/2007 pdf file; ABC News, 6/21/2007] In June 2007, President Bush will announce that he never intended for either his or Cheney’s office to have to comply with the directive. [USA Today, 6/24/2007; Newsweek, 12/27/2007]
Issue Nothing More Than 'Kerfuffle' - In December 2007, Cheney will call the entire issue a “kerfuffle… is he or isn’t he; is he part of the executive branch, part of the legislative branch? And the answer really is, you’ve got a foot in both camps. I obviously work for the president. That’s why I’m sitting here in the West Wing of the White House. But I also have a role to play in the Congress as the president of the Senate. I actually get paid—that’s where my paycheck comes from, is the Senate. So I try to keep lines open to both sides of the Congress, both the House and the Senate.” [White House, 12/6/2007] However, Cheney sometimes asserts executive privilege, a function of the executive branch (see June 26, 2007 and June 29, 2007).

Entity Tags: Information Security Oversight Office, Richard (“Dick”) Cheney, National Archives and Records Administration, Homeland Security Advisory Council, Lea Anne McBride, George W. Bush, Federation of American Scientists (FAS), Foreign Intelligence Advisory Board, Garrett Epps, Steven Aftergood, Office of the Vice President, Paul Orfanedes

Category Tags: Expansion of Presidential Power, Government Acting in Secret, Government Classification

The NSA’s secret room in the AT&T switching center.The NSA’s secret room in the AT&T switching center. [Source: PBS]Veteran AT&T technician Mark Klein (see July 7, 2009) takes an informal tour of his company’s facility on San Francisco’s Folsom Street (see Late 2002), along with three other technicians from his Geary Street offices. The tour, Klein will later say, is to introduce the four technicians to the Folsom Street staff, “because they were obviously eventually planning to bring us over there.” Klein learns that the rumors of a “secret room” in the facility are true (see Fall 2002). The secret room is on the facility’s sixth floor and is being built to house some sort of equipment, but Klein is unsure exactly what that equipment might be. Klein and the others see the outer door of the secret room, and a workman working on the door “suddenly [began talking to Klein and his colleages in a] very low voice like he didn’t want to be overheard. He felt like this was something secret, you know, and he didn’t know much about it, and he was saying: ‘None of us can go in there. It’s all secret.’ This was not only an affront to the technicians; it was a violation of union rules, because they were obviously planning to install telecommunications equipment, which is supposed to be the jurisdiction of the union technicians. We had a contract. So the technicians were not only angry about this secret thing that they’re not let in on, but also the fact that there’s work there that they’re excluded from. And they were told nothing about it. So that was it.” Klein is further surprised to learn that only a single non-union technician (whom he only identifies as “Ski,” an AT&T “field support specialist” who has been granted a security clearance by the National Security Agency (NSA)), is allowed to work in the secure room. No union technicians are allowed in, even though the installation work being done is specifically contracted to the union workers. “The regular technician work force was not allowed in the room,” Klein will later state. Klein deduces that this secret room is the long-rumored NSA installation he has been hearing about. Moreover, he notes with some alarm that the room is next door to the 4ESS phone switch, “the traditional workhorse used for AT&T long-distance calls.” Klein will write, “Now my mental alarm bells were ringing, but for the moment there was nothing to do but take some mental notes, particularly since it was not clear exactly what they [the NSA and AT&T] were doing.” [Wired News, 4/7/2006; Democracy Now!, 5/12/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 26-28] Klein will explain that he chooses not to say anything about his concerns because he is “scared for several reasons, one being, well, this is obviously secret. This is obviously some federal government secret operation that they don’t want nosy people nosing around in, and if I started asking questions I could get into trouble. Furthermore, our jobs were in jeopardy anyway, because [we] were always getting wind that they were planning to close our previous office at Geary Street, and I didn’t need to give them an excuse to fire me. So I thought after thinking about it that the best thing to do is not to say anything and just watch it.” [PBS Frontline, 5/15/2007] He later learns that similar cabinets are being installed in AT&T centers in other cities, including Seattle, San Jose, Los Angeles, and San Diego (see Late 2003). [Wired News, 4/7/2006] The Folsom Street facility is apparently connected to a more central surveillance facility operated out of one of AT&T’s main command centers in Missouri (see Late 2002-Early 2003).

Entity Tags: Bush administration (43), AT&T, Electronic Frontier Foundation, Mark Klein, Terrorist Surveillance Program, “Ski” (AT&T field support specialist), National Security Agency

Category Tags: Impositions on Rights and Freedoms, Privacy, Government Acting in Secret, Government Classification, Database Programs, NSA Wiretapping / Stellar Wind

Steven Aftergood of the Federation of American Scientists says that he is not sure that Congress’s public termination of the Total Information Awareness (TIA) project (see January 23, 2003) was as real and outrage-driven as it seemed at the time. “The whole congressional action looks like a shell game,” Aftergood says. “There may be enough of a difference for them to claim TIA was terminated while for all practical purposes the identical work is continuing.” While Congress terminated TIA with visible indignation, it also quietly funded the “National Foreign Intelligence Program,” and never identified which intelligence agency would do the work—which was also kept from the public eye. Congress did say that none of the research would be used against US citizens. No one in Congress will discuss how many of Poindexter’s programs survived, but knowledgeable sources will confirm that some 18 data-mining programs known as Evidence Extraction and Link Discovery in Poindexter’s research were preserved after TIA’s termination. These programs may well include the sprawling data mining program known as Novel Intelligence from Massive Data (NIMD) (see After September 11, 2001), though this cannot be confirmed. Former TIA chief John Poindexter’s vision of the technology behind NIMD envisioned software that can quickly analyze “multiple petabytes” of data. A single petabyte would fill the Library of Congress space for 18 million books more than 50 times, or could hold 40 pages of text for each of the more than 6.2 billion humans on Earth. Poindexter and his colleagues envisioned the program as handling a petabyte or more of data a month. [Associated Press, 2/23/2004] Concerns about the privacy rights of US citizens being damaged by the program are rife. “If they were to stick to strictly military-related research and development, there is less of an issue, but these technologies have much broader social implications,” says Barbara Simons, a computer scientist who is past president of the Association of Computing Machinery, an organization that has expressed concerns about TIA. [New York Times, 5/21/2003] At least one Senator is uncomfortable with the apparent resurgence of TIA. Jay Rockefeller (D-WV) will write Vice President Dick Cheney in June 2003 after receiving a briefing on the various secret surveillance programs (see July 17, 2003). Rockefeller will write, “As I reflected on the meeting today, John Poindexter’s TIA project sprung to mind, exacerbating my concern regarding the direction the administration is moving with regard to security, technology, and surveillance.” [National Journal, 1/20/2006]

Entity Tags: Steven Aftergood, Richard (“Dick”) Cheney, Total Information Awareness, Novel Intelligence from Massive Data, John D. Rockefeller, John Poindexter, Barbara Simons, Federation of American Scientists (FAS), Foreign Intelligence Surveillance Act, Association of Computing Machinery

Category Tags: Privacy, Impositions on Rights and Freedoms, Government Acting in Secret, Government Classification, Database Programs, Other Surveillance

Republican lobbyist Jack Abramoff sends an email to White House aide Susan Ralston, a former Abramoff associate who now works in the White House Office of Political Affairs (OPA) under Karl Rove. Abramoff wants Ralston to tell Rove to covertly use his position in the White House to prevent a Louisiana Indian tribe from acquiring land for a casino. (The land acquisition would threaten the interests of an Abramoff client, a different Indian tribe that already has gaming establishments in the area.) Abramoff asks if Rove can give “some quiet message from the WH [White House] that this is absurd.” Ralston agrees, and Abramoff sends her a thank-you reply. But instead of sending the reply to Ralston’s private email account administered by the Republican National Committee (RNC) at sralston@georgewbush.com, he sends it to her official White House email account. The next day, Abramoff’s colleague Kevin Ring alerts Abramoff to the error. Ring writes, “She said it is better to not put this stuff in writing in their email system because it might actually limit what they can do to help us, especially since there could be lawsuits, etc.” Abramoff responds: “Dammit. It was sent to Susan on her rnc [Republican National Committee] pager and was not supposed to go into the WH system.” The email will be publicly revealed as part of a Congressional investigation into Abramoff’s criminal enterprises. In 2007, documents will connect this email exchange to thousands of other private emails sent to and from White House officials using the georgewbush.com, gwb43.com, rnchq.com, and other private email domains. Ralston is one of many White House officials to use these outside accounts to communicate with Abramoff and others. Federal law requires that all emails and other communications be preserved as part of the National Archives data storage, for future review. Using private email accounts such as those provided by the RNC, especially for official (and quasi-official) government business, is also a violation of the Presidential Records Law. In March 2007, the House Oversight Committee’s chairman, Henry Waxman (D-CA), will demand that the RNC preserve all White House emails “because of their potential relevance to Congressional investigations.… The email exchanges reviewed by the committee provide evidence that in some instances, White House officials were using the nongovernmental accounts specifically to avoid creating a record of the communications.” Steven Aftergood of the Federation of American Scientists will say that the use of the RNC email accounts also “shows how closely intertwined the White House is with its partisan allies. The fact that the White House and the RNC are working hand in hand and White House officials are using RNC emails is itself remarkable.” Aftergood recalls the Iran-Contra investigation, where incriminating White House emails were recovered even after officials believed they had been deleted. “People may have learned that lesson,” Aftergood will muse. Since the Iran-Contra investigation, both the first Bush administration and Clinton administration have had issues with suppressing and hiding emails. Steven Hensen, a past president of the Society of American Archivists, will say that the current Bush email practice “clearly looks like an attempt to conceal official business.” Mother Jones reporter Daniel Schulman will agree, writing that “it’s clear that others are taking pains to use alternate email accounts simply to keep their communications from becoming public record.” [Mother Jones, 3/30/2007; Los Angeles Times, 4/9/2007]

Entity Tags: Jack Abramoff, White House Office of Political Affairs, Bush administration (43), Henry A. Waxman, Steven Hensen, Susan Ralston, Daniel Schulman, Karl C. Rove, Kevin Ring, Steven Aftergood, Republican National Committee, National Archives and Records Administration

Category Tags: Government Acting in Secret

Page 2 of 5 (445 events)
previous | 1, 2, 3, 4, 5 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike