!! History Commons Alert, Exciting News
Events: (Note that this is not the preferable method of finding events because not all events have been assigned topics yet)
Page 7 of 8 (743 events (use filters to narrow search))previous
The Washington Post reports that four years after the 2001 anthrax attacks (see October 5-November 21, 2001), the FBI investigation is growing cold. [Washington Post, 9/16/2005] A New York Times article from the same day also concludes the investigation has stalled. The FBI has found itself on the defensive amid claims that they publicly smeared Steven Hatfill when lacking other viable suspects. [New York Times, 9/16/2005]
The Justice Department’s inspector general says that the number of criminal cases opened by the FBI has dropped by nearly half since 2000. Inspector General Glenn Fine says this is a reflection of the FBI’s new focus on preventing terrorist attacks. Drug cases have declined by 70 percent, and organized crime, bank robberies, civil rights, health case fraud, corporate fraud, and public corruption have also dropped. State and local law enforcement have tried to fill the void, but they aren’t always able to do so, especially in complex financial fraud cases. [Associated Press, 10/3/2005]
On October 6, 2005, the FBI warns of al-Qaeda subway bombings in New York City. It is alleged that a terror plot will be put into motion “on or about October 9, 2005.” A counterterrorism official states that the warning is unnecessary: “There was no there there.” [Rolling Stone, 9/21/2006 ] It is later confirmed that New York City authorities had been aware of the threat for at least three days and had responded accordingly. Local TV station WNBC had been asked by federal authorities to hold the story back. [MSNBC, 6/4/2007] Meanwhile, Bush’s nomination of Harriet Miers to the Supreme Court is failing (see October 3-27, 2005). [Rolling Stone, 9/21/2006 ]
A report by the Justice Department’s Office of the Inspector General is leaked to the New York Times. The report largely backs the allegations made by whistleblower ex-FBI agent Mike German (see September 2002 and August 2, 2004). It finds that FBI officials mishandled a terrorism investigation German was involved in, falsified documents in an effort to cover up agency mistakes, and retaliated against German. In one instance, someone altered dates on three FBI forms using correction fluid to conceal a violation of federal wiretap law. After German tried to complain directly to FBI Director Robert Mueller, other FBI agents distanced themselves from him. For instance, the head of the FBI undercover unit, Jorge Martinez, froze German out of teaching assignments and told another agent that German would “never work another undercover case.” [New York Times, 12/3/2005] Notwithstanding, German is critical of the inspector general’s report. He says the authors of the report distorted some facts and failed to fully investigate whether the investigation he was working on was a genuine terrorist conspiracy. [Government Executive, 12/12/2005]
As the former 9/11 Commissioners issue a harsh report card grading the government’s counterterrorism efforts (see December 5, 2005), former commission chairman Thomas Kean adds some critical comments in several interviews. Kean says, “While the terrorists are learning and adapting, our government is still moving at a crawl… Four years after 9/11 we are not as safe as we could be and that’s simply not acceptable.” [Los Angeles Times, 12/5/2005] He also says that public safety is “not a priority for the government right now. You don’t see the Congress or the president talking about the public safety is number one, as we think it should be, and a lot of the things we need to do really to prevent another 9/11 just simply aren’t being done by the president or by the Congress.” [Meet the Press, 12/4/2005]
The ten ex-9/11 Commissioners issue a report card to monitor the progress on implementation of the commission’s recommendations given in their July 2004 final report, and they generally give harsh grades. The report card assigns letter grades to the commission’s 41 key recommendations. In nearly half the categories, the government receives a D, F, or incomplete grade. There is only one high grade, an A-minus for its “vigorous effort against terrorist financing.” [Washington Post, 12/6/2005] Ironically, that one good grade runs counter to the opinion of many counterterrorism experts. For instance, author Zachary Abuza has said, “The glaring exception to the success in fighting terrorism has been on the financial front…” [Contemporary Southeast Asia, 8/1/2003] The report card criticizes the government for:
still not checking the identities of airplane passengers against a complete terrorism watch list.
continuing to allocate domestic security funding without considering that certain parts of the country are at greater risk than others.
excessive secrecy regarding intelligence spending.
the handling of detainees.
persistent problems in first responder communication systems. [Los Angeles Times, 12/5/2005]
the slow transformation of and continuing problems with the FBI. [Washington Post, 12/6/2005]
The report does not give grades to President Bush or any other specific officials. The 9/11 Commission formally ceased operations after issuing its final report, but some members formed a privately funded foundation to monitor progress. The foundation disbands after releasing the report card. White House spokesman Scott McClellan defends the Bush administration’s efforts, saying, “The best way to protect the American people is to take the fight to the enemy, to stay on the offensive.” [Los Angeles Times, 12/5/2005]
New York Times headline from article revealing NSA surveillance. [Source: CBS News]The New York Times reveals that after the 9/11 attacks, President Bush granted the National Security Agency (NSA) secret authorization to eavesdrop on Americans and others inside the US without going through the Foreign Intelligence Surveillance Act (FISA) court to obtain legal warrants (see Early 2002. The administration justifies its actions by claiming such eavesdropping, which includes wiretapping phones and reading e-mails, is necessary to find evidence of terrorist activities, and says the nation needs the program after the 9/11 attacks exposed deficiencies in the US intelligence community’s information gathering process, and because of what they characterize as the “handcuffing” of US intelligence agencies by restrictive laws. The Times has had the article for over a year; the White House prevailed on the Times not to publish its findings for that time, arguing that publication would jeopardize continuing investigations and warn potential terrorists that they were under scrutiny. Many believe that the White House wanted to delay the publication of the article until well after the 2004 presidential elections. The Times delayed publication for over a year, and agreed to suppress some information that administration officials say could be useful to terrorists. (Less than two weeks before the article is published, Bush tries to convince the Times not to print the article at all: see December 6, 2005.) Two days after the Times publishes its article, Bush will acknowledge the order, and accuse the Times of jeopardizing national security (see December 17, 2005). The NSA program eavesdrops without warrants on up to 500 people in the US at any given time, officials say; the overall numbers have likely reached into the thousands. Overseas, up to 7,000 people suspected of terrorist ties are being monitored. Officials point to the discovery of a plot by Ohio trucker and naturalized US citizen and alleged al-Qaeda supporter Iyman Faris to bring down the Brooklyn Bridge with blowtorches as evidence of the program’s efficacy. They also cite the disruption of an al-Qaeda plot to detonate fertilizer bombs outside of British pubs and train stations by the program. But, officials say, most people targeted by the NSA for warrantless wiretapping have never been charged with a crime, and many are targeted because of questionable evidence and groundless suspicion. Many raise an outcry against the program, including members of Congress, civil liberties groups, immigrant rights groups, and others who insist that the program undermines fundamental Constitutional protections of US citizens’ civil liberties and rights to privacy. Several other government programs to spy on Americans have been challenged, including the Federal Bureau of Investigation (FBI)‘s surveillance of US citizens’ library and Internet usage, the monitoring of peaceful antiwar protests, and the proposed use of public and private databases to hunt for terrorist links. In 2004, the Supreme Court overturned the administration’s claim that so-called “enemy detainees” were not entitled to judicial review of their indefinite detentions. Several senior officials say that when the warrantless wiretapping program began, it operated with few controls and almost no oversight outside of the NSA itself. The agency is not required to seek the approval of the Justice Department or anyone else outside the FISA court for its surveillance operations. Some NSA officials wanted nothing to do with a program they felt was patently illegal, according to a former senior Bush administration official. Internal concerns about the program prompted the Bush administration to briefly suspend the program while Justice Department officials audited it and eventually provided some guidelines for its operations. A complaint from Judge Colleen Kollar-Kotelly, the federal judge who oversees the FISA Court, helped spur the suspension, according to officials. Kollar-Kotelly questioned whether information obtained under the program was being improperly used as the basis for FISA wiretap warrant requests from the Justice Department. Some government lawyers say that the Justice Department may have deliberately misled Kollar-Kotelly and the FISA court about the program in order to keep the program under wraps. The judge insisted to Justice Department officials that any material gathered under the program not be used in seeking wiretap warrants from her court. The question also arose in the Faris case, when senior Justice Department officials worried that evidence obtained by warrantless wiretapping by the NSA of Faris could be used in court without having to lie to the court about its origins. [New York Times, 12/15/2005]
Times executive editor Bill Keller. [Source: New York Times]The New York Times’s executive editor, Bill Keller, defends his paper’s decision to reveal the Bush administration’s warrantless wiretapping program, conducted through the NSA (see December 15, 2005), after holding the story for over a year. Keller writes: “We start with the premise that a newspaper’s job is to publish information that is a matter of public interest. Clearly a secret policy reversal that gives an American intelligence agency discretion to monitor communications within the country is a matter of public interest.… A year ago, when this information first became known to Times reporters, the administration argued strongly that writing about this eavesdropping program would give terrorists clues about the vulnerability of their communications and would deprive the government of an effective tool for the protection of the country’s security. Officials also assured senior editors of The Times that a variety of legal checks had been imposed that satisfied everyone involved that the program raised no legal questions. As we have done before in rare instances when faced with a convincing national security argument, we agreed not to publish at that time. We also continued reporting, and in the ensuing months two things happened that changed our thinking. First, we developed a fuller picture of the concerns and misgivings that had been expressed during the life of the program. It is not our place to pass judgment on the legal or civil liberties questions involved in such a program, but it became clear those questions loomed larger within the government than we had previously understood. Second, in the course of subsequent reporting we satisfied ourselves that we could write about this program—withholding a number of technical details—in a way that would not expose any intelligence-gathering methods or capabilities that are not already on the public record. The fact that the government eavesdrops on those suspected of terrorist connections is well-known. The fact that the NSA can legally monitor communications within the United States with a warrant from the Foreign Intelligence Surveillance Court is also public information. What is new is that the NSA has for the past three years had the authority to eavesdrop on Americans and others inside the United States without a warrant. It is that expansion of authority—not the need for a robust anti-terror intelligence operation—that prompted debate within the government, and that is the subject of the article.” [CNN, 12/16/2005]
President Bush acknowledges that he issued a 2002 executive order authorizing the National Security Agency (NSA) to wiretap US citizens’ phones and e-mails without proper warrants, and accuses the New York Times of jeopardizing national security by publishing its December 15 article (see Early 2002 and December 15, 2005). Bush says he was within the law to issue such an order, which many feel shatters fundamental Constitutional guarantees of liberty and privacy, but accuses the Times of breaking the law by publishing the article. Bush tells listeners during his weekly radio address that the executive order is “fully consistent” with his “constitutional responsibilities and authorities.” But, he continues, “Yesterday the existence of this secret program was revealed in media reports, after being improperly provided to news organizations. As a result, our enemies have learned information they should not have, and the unauthorized disclosure of this effort damages our national security and puts our citizens at risk.” He admits allowing the NSA to “to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations” in a program designed to “detect and prevent terrorist attacks.” Under the law, the NSA must obtain warrants from the Foreign Intelligence Surveillance Act (FISA) Court, but after Bush’s executive order, it was no longer required to do so. Bush justifies the order by citing the example of two 9/11 hijackers, Khalid Almihdhar and Nawaf Alhazmi, who, he says, “communicated while they were in the United States to other members of al-Qaeda who were overseas, but we didn’t know they were here until it was too late.” Because of the unconstitutional wiretapping program, it is “more likely that killers like these 9/11 hijackers will be identified and located in time, and the activities conducted under this authorization have helped detect and prevent possible terrorist attacks in the United States and abroad.” Bush also admits to reauthorizing the program “more than thirty times,” and adds, “I intend to do so for as long as our nation faces a continuing threat from al-Qaeda and related groups.” [CNN, 12/16/2005] Bush fails to address the likelihood that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).
After the NSA’s warrantless wiretapping program is revealed (see Early 2002 and December 15, 2005), some commentators criticize the program. Americans have fundamental Constitutional protections that are enforceable in court whether their conversations are domestic or international, says law scholar Geoffrey Stone. Stone says that President Bush’s emphasis that NSA wiretapping only takes place on US calls to overseas phones or overseas e-mails “is no different, as far as the law is concerned, from saying we only do it on Tuesdays.” Former FBI national security law chief Michael Woods, who served in the position when Bush signed the NSA directive, calls the program “very dangerous.” Though Woods says the program was justifiable in the immediate aftermath of 9/11, “[By now] we ought to be past the time of emergency responses. We ought to have more considered views now…. We have time to debate a legal regime and what’s appropriate.” [Washington Post, 12/18/2005] Kate Martin, director of the Center for National Security Studies, says the secret order may amount to Bush authorizing criminal activity in direct violation of FISA. “This is as shocking a revelation as we have ever seen from the Bush administration,” she says. “It is, I believe, the first time a president has authorized government agencies to violate a specific criminal prohibition and eavesdrop on Americans.” The American Civil Liberties Union’s Caroline Frederickson says of the program, “It’s clear that the administration has been very willing to sacrifice civil liberties in its effort to exercise its authority on terrorism, to the extent that it authorizes criminal activity.” [Washington Post, 12/16/2005]
Newly released documents indicate that several FBI investigations have targeted—albeit peripherally—activist groups working on issues such as animal cruelty, environment, and poverty relief. One document reveals an FBI plan to monitor a “Vegan Community Project.” Another document speaks of the Catholic Workers group’s “semi-communistic ideology.” Other groups monitored include PETA (People for the Ethical Treatment of Animals) and Greenpeace. An American Civil Liberties Union (ACLU) official says, “You look at these documents and you think, wow, we have really returned to the days of J. Edgar Hoover, when you see in FBI files that they’re talking about a group like the Catholic Workers league as having a communist ideology.” A Greenpeace official says, “The fact that we’re even mentioned in the FBI files in connection with terrorism is really troubling.” [New York Times, 12/20/2005]
Attorney General Alberto Gonzales and NSA chief Lieutenant General Michael Hayden conduct their own “briefing” on the recently revealed NSA wiretapping program (see December 15, 2005) with the White House press corps. Gonzales and Hayden make the following points:
Gonzales says that he will not discuss the internal workings of the still-classified program, only what he calls its “legal underpinnings.”
He claims that the program, which he calls “the most classified program that exists in the United States government,” is legal because President Bush authorized it, and says that the idea that “the United States is somehow spying on American citizens” is wrong: it is “[v]ery, very important to understand that one party to the communication has to be outside the United States.”
He says that for the NSA to eavesdrop on a US citizen’s telephone or e-mail communications, “we have to have a reasonable basis to conclude that one party to the communication is a member of al-Qaeda, affiliated with al-Qaeda, or a member of an organization affiliated with al-Qaeda, or working in support of al-Qaeda.” The wiretapping program is an essential part of the administration’s war against terror, he says.
He goes on to claim that “the authorization to use force, which was passed by the Congress in the days following September 11th, constitutes” legal grounds for “this kind of signals intelligence.” [White House, 12/19/2005] The White House signed Congress’s Authorization to Use Military Force (AUMF) into law on September 18, 2001 (see September 14-18, 2001. [White House, 9/18/2001]
Hayden Claims Supreme Court Backing - While he admits that the Congressional authorization to use force against international terrorism does not specifically mention any kind of electronic surveillance, he refers the listeners to the Supreme Court case concerning alleged US terrorist Yaser Esam Hamdi (see June 28, 2004), in which the Court ruled that Hamdi had the legal right to challenge his detention. “[T]he United States government took the position that Congress had authorized that detention in the authorization to use force, even though the authorization to use force never mentions the word ‘detention.’ And the Supreme Court, a plurality written by Justice O’Connor agreed. She said, it was clear and unmistakable that the Congress had authorized the detention of an American citizen captured on the battlefield as an enemy combatant for the remainder—the duration of the hostilities. So even though the authorization to use force did not mention the word, ‘detention,’ she felt that detention of enemy soldiers captured on the battlefield was a fundamental incident of waging war, and therefore, had been authorized by Congress when they used the words, ‘authorize the President to use all necessary and appropriate force.’ For the same reason, we believe signals intelligence is even more a fundamental incident of war, and we believe has been authorized by the Congress. And even though signals intelligence is not mentioned in the authorization to use force, we believe that the Court would apply the same reasoning to recognize the authorization by Congress to engage in this kind of electronic surveillance.”
Bush 'Very Concerned' With Protecting Civil Liberties - Gonzales insists, Bush “is very concerned about the protection of civil liberties, and that’s why we’ve got strict parameters, strict guidelines in place out at NSA to ensure that the program is operating in a way that is consistent with the President’s directives.” He adds, “[W]e feel comfortable that this surveillance is consistent with requirements of the Fourth Amendment. The touchstone of the Fourth Amendment is reasonableness, and the Supreme Court has long held that there are exceptions to the warrant requirement in—when special needs outside the law enforcement arena. And we think that that standard has been met here.”
Wiretapping Essential in Catching Terrorists - Hayden reiterates how important the wiretapping is to catching terrorists and stopping potential attacks against US targets, though he and Gonzales both refuse to say what, if any, terrorist plots or what terror suspects might have been captured through the NSA wiretapping program. Hayden does say, “This program has been successful in detecting and preventing attacks inside the United States.…I can say unequivocally, all right, that we have got information through this program that would not otherwise have been available,” though he refuses to cite specifics. He admits that there have been some errors in surveilling innocent US citizens, though he refuses to give any details, and says those errors were quickly corrected.
Administration Not Required to Go Through FISA - Gonzales, who is the main speaker in the briefing, reiterates that while the administration continues to seek warrants from the Foreign Intelligence Surveillance (FISA) court, “we are not legally required to do, in this particular case, because the law requires that we—FISA requires that we get a court order, unless authorized by a statute, and we believe that authorization has occurred.” He justifies the administration’s refusal to use the FISA court for obtaining warrants by insisting that NSA officials “tell me that we don’t have the speed and the agility that we need, in all circumstances, to deal with this new kind of enemy. You have to remember that FISA was passed by the Congress in 1978. There have been tremendous advances in technology… since then.” Hayden adds, “I don’t think anyone could claim that FISA was envisaged as a tool to cover armed enemy combatants in preparation for attacks inside the United States. And that’s what this authorization under the President is designed to help us do.”
'Balancing' of Civil Liberties, National Security - Hayden says the warrantless wiretapping program is part of “a balancing between security and liberty,” a more “aggressive” operation “than would be traditionally available under FISA. It is also less intrusive. It deals only with international calls. It is generally for far shorter periods of time. And it is not designed to collect reams of intelligence, but to detect and warn and prevent about attacks. And, therefore, that’s where we’ve decided to draw that balance between security and liberty.”
Media Leaks Damaging to National Security - Gonzales refuses to talk about when any members of Congress were briefed on the program or what they were told, but he does imply that there will be some sort of leak investigation as to how the New York Times found out about the program: “[T]his is really hurting national security, this has really hurt our country, and we are concerned that a very valuable tool has been compromised. As to whether or not there will be a leak investigation, we’ll just have to wait and see.”
No Evidence of Compromised National Security - When asked whether he can cite any evidence that the revelation of the program’s existence has actually compromised anything—“Don’t you assume that the other side thinks we’re listening to them? I mean, come on,” one reporter says—Gonzales responds, rather confusingly, “I think the existence of this program, the confirmation of the—I mean, the fact that this program exists, in my judgment, has compromised national security, as the President indicated on Saturday.”
Easier to Sidestep FISA Instead of Seek Congressional Approval - He does admit that the administration decided to sidestep the FISA court entirely instead of attempt to work with Congress to rewrite the FISA statutes because “we were advised that that would be difficult, if not impossible” to amend the law to the White House’s satisfaction. Gonzales says those who are concerned about the program being excessively intrusive or a threat to American civil liberties simply “don’t understand the specifics of the program, they don’t understand the strict safeguards within the program.… Part of the reason for this press brief today is to have you help us educate the American people and the American Congress about what we’re doing and the legal basis for what we’re doing.” He adds that any legal experts who believe the program is illegal are basing their judgments “on very limited information.”
Tough Questioning - One reporter asks an unusually tough series of questions to Gonzales: “Do you think the government has the right to break the law?”, to which Gonzales replies, “Absolutely not. I don’t believe anyone is above the law.” The reporter then says, “You have stretched this resolution for war into giving you carte blanche to do anything you want to do,” to which Gonzales replies cryptically, “Well, one might make that same argument in connection with detention of American citizens, which is far more intrusive than listening into a conversation.” The reporter insists, “You’re never supposed to spy on Americans,” and Gonzales deflects the responsibility for the decision back onto the Supreme Court.
Administration Will Tell Nation What It Needs to Know - Gonzales says the administration has no intention of releasing any of the classified legal opinions underpinning the program, and this press briefing is one of the methods by which the administration will “educat[e] the American people…and the Congress” to give them what they need to know about the program. [White House, 12/19/2005]
DARPA logo. [Source: Duke University]The computer and technology experts at Ars Technica, a well-regarded Web publication which describes itself as focusing on “the art of technology,” speculate on the technology behind the NSA warrantless wiretapping program recently revealed to the public (see December 15, 2005). The Ars Technica experts believe that Senator Jay Rockefeller (D-WV)‘s 2003 comparison between the program and the Total Information Awareness (TIA) project (see March 2002) is the most apt. They believe that the NSA wiretapping program may be built upon the foundation of a shadowy, highly classified surveillance program called Echelon. They write, “This system’s purpose would be to monitor communications and detect would-be terrorists and plots before they happen… This project is not interested in funding ‘evolutionary’ changes in technology, e.g., bit-step improvements to current data mining and storage techniques. Rather, the amount of data that the directors are anticipating (petabytes!) would require massive leaps in technology (and perhaps also some massive leaps in surveillance laws).” [Ars Technica, 12/20/2005; Ars Technica, 2007] Data storage measured in petabytes is a colossal capacity; a petabyte is 1,024 terabytes, and a single terabyte is 1,024 gigabytes, the usual measurement for hard drive capacity. [TechTerms, 2007] The Ars Technica experts continue, “According to DARPA, such data collection ‘increases information coverage by an order of magnitude,’ and ultimately ‘requires keeping track of individuals and understanding how they fit into models.’” They go on to note that the NSA wiretapping program was instituted shortly after the TIA project was quashed by Congress, and say they believe the NSA program is an extension and an outgrowth of TIA. They note that “the FBI requested the legal authorization to do very high-volume monitoring of digital calls” in 1995, that there is “no way for the judicial system to approve warrants for the number of calls that the FBI wanted to monitor,” and that the FBI “could never hire enough humans to be able to monitor that many calls simultaneously, which means that they’d have to use voice recognition technology to look for ‘hits’ that they could then follow up on with human wiretaps.” The Ars Technica experts believe the NSA is using “some kind of high-volume, automated voice recognition and pattern matching system,” employing a form of “smart filtering” that would weed through perhaps hundreds of thousands of computer-monitored calls and turning a fraction of those calls over to human analysts for evaluation: “[Y]es, this kind of real-time voice recognition, crude semantic parsing and pattern matching is doable with today’s technology, especially when you have a budget like the NSA.” In a follow-up, Ars Technica technology specialist and self-described conservative and “privacy nazi” Jon Stokes writes of his own concerns over the program, noting that the program is too wide-reaching and too blunt to actually catch many real terrorists, and that the program is a tremendous intrusion into Americans’ fundamental privacy: “The problem is not that such large-scale industrial fishing invariably catches a few dolphins along with the tuna, but that between 99.999 and 100 percent of what you’re going to get is dolphin.” Stokes also warns that such an intrusive surveillance program will not only violate privacy rights, but be quite ineffective: “As the TSA, with its strip-searching of people’s elderly grandparents, abundantly proves every holiday season, blunt instruments and scorched earth tactics are of dubious value in catching genuine bad actors. In fact, blunt instruments and wide nets are the easiest for professional bad guys to evade. All you need to beat such surveillance tools is patience and know-how.…Blunt instruments like airport facial recognition software and random subway bag searches produce much more noise than they do signal, and any engineer or computer scientist worth his or her salt will tell you that an intelligent, targeted, low-tech approach beats a brute-force high-tech approach every time. There is no high-tech substitute for human intelligence gathering. In fact…an overload of crudely processed information is actually more likely to lead an analyst astray than it is to produce any useful insight.…In the end, brute force security techniques are not only corrosive to democratic values but they’re also bad for national security. They waste massive resources that could be spent more effectively elsewhere, and they give governments and countries a false sense of security that a savvy enemy can exploit to devastating effect.…[I]t’s not just enough to have sound intelligence; you also need political leaders who have the wisdom to use that intelligence appropriately.” [Ars Technica, 12/20/2005]
Former Senate Majority Leader Tom Daschle (D-SD) writes that Congress explicitly rejected several attempts by the Bush administration to provide him with war-making authority and the authority to wiretap and monitor US citizens “in the United States” when it approved the September 18, 2001 authorization to use military force (AUMF) against terrorists (see September 14-18, 2001). Instead, the Bush administration merely usurped that authority and launched—or expanded (see Spring 2001)—its warrantless wiretapping program, conducted by the NSA. Since then, the Bush administration and the Justice Department have both repeatedly asserted that the AUMF gave them the right to conduct the wiretapping program, an assertion that Daschle says is flatly wrong. On December 21, the Justice Department admitted in a letter that the October 2001 presidential order authorizing warrantless eavesdropping on US citizens did not comply with “the ‘procedures’ of” the law that has regulated domestic espionage since 1978, known as the Foreign Intelligence Surveillance Act (FISA). FISA established a secret intelligence court and made it a criminal offense to conduct electronic surveillance without a warrant from that court, “except as authorized by statute.” However, the letter, signed by Assistant Attorney General William Moschella, argues that the AUMF gave the administration the authority to conduct the program. [Washington Post, 12/22/2005] The letter continues the argument that Congress gave President Bush the implict authority to create an exception to FISA’s warrant requirements, though the AUMF resolution did not mention surveillance and made no reference to the president’s intelligence-gathering authority. The Bush administration kept the program secret until it was revealed by the New York Times on December 15, 2005. Moschella argues that secret intelligence-gathering, even against US citizens, is “a fundamental incident to the use of military force” and that its absence from the resolution “cannot be read to exclude this long-recognized and essential authority to conduct communications intelligence targeted at the enemy.” Such eavesdropping, he argued, must by necessity include conversations in which one party is in the United States. [William Moschella, 12/22/2005 ] Daschle, one of the primary authors of the resolution, says that Moschella and the Bush administration are wrong in their assertions: “I did not and never would have supported giving authority to the president for such wiretaps. I am also confident that the 98 senators who voted in favor of authorization of force against al-Qaeda did not believe that they were also voting for warrantless domestic surveillance” (see September 12-18, 2001). [Washington Post, 12/23/2005]
Entity Tags: National Security Agency, Bush administration (43), Authorization to Use Military Force (AUMF), Al-Qaeda, Foreign Intelligence Surveillance Act, George W. Bush, Osama bin Laden, US Department of Justice, Foreign Intelligence Surveillance Court, New York Times, William E. Moschella, Richard (“Dick”) Cheney, Tom Daschle
Timeline Tags: Civil Liberties
For the entire fiscal year of 2006, the US grants the new Iraqi military only $3 billion, which is less than what the US military spends in Iraq every two weeks. According to the Iraq Study Group, this results in a major shortage of equipment for the Iraqi military that renders them incapable of carrying out missions. [Iraq Study Group, 2006, pp. 13 ]
Russell Tice. [Source: ABC News]Former National Security Agency (NSA) official Russell Tice says that many of the wiretapping operations he once helped run were illegal. “I specialized in what’s called special access programs,” Tice tells ABC News. “We called them ‘black world’ programs and operations.” Tice is ready to testify before Congress about what he calls the illegal wrongdoings that are part of the Defense Department and the NSA’s wiretapping programs enacted after the 9/11 attacks. Many of these programs were targeted at innocent US citizens. “The mentality was we need to get these guys, and we’re going to do whatever it takes to get them,” he says. The technology used to track and sort through every domestic and international telephone center is impressive. “If you picked the word ‘jihad’ out of a conversation, the technology exists that you focus in on that conversation, and you pull it out of the system for processing.” Intelligence analysts use the information to develop graphs that resemble spiderwebs linking one suspect’s phone number to hundreds or even thousands more. While the president has admitted giving orders that allowed the NSA to eavesdrop on a small number of Americans without warrants, Tice says says the number of Americans subject to eavesdropping by the NSA could be in the millions if the full range of secret NSA programs is used. “That would mean for most Americans that if they conducted, or you know, placed an overseas communication, more than likely they were sucked into that vacuum.” Tice has been subjected to what appears to be bureaucratic punishment for his willingness to blow the whistle on the nation’s warrantless wiretapping programs; last year the NSA revoked his security clearance based on what it calls "psychological concerns," and later fired him. Tice says that is the way the NSA often deals with employees it considers troublemakers and whistleblowers (see January 25-26, 2006). [ABC News, 1/10/2006; ABC, 1/10/2006]
Current and former National Security Agency (NSA) employees say that the agency often retaliates against whistleblowers by labeling them “delusional,” “paranoid,” or “psychotic.” They say such labeling protects powerful superiors who might be incriminated by potentially criminal evidence provided by such whistleblowers, and helps to keep employees in line through fear and intimidation. One NSA whistleblower, former intelligence analyst Russell Tice, is currently the victim of such agency allegations. Tice, along with three other former analysts, Diane Ring, Thomas Reinbold, and another analyst who wishes to remain anonymous, make the allegations of unfounded psychological labeling by the agency; their allegations are corroborated by a current NSA officer who also wishes to remain anonymous. [Cybercast News Service, 1/25/2006]
Identifying a Potential Spy - Tice, a former signals intelligence (SIGINT) officer, is the first NSA whistleblower to capture the media’s attention, when in 2004, the Pentagon investigated possible NSA retaliation against him. In 2001, Tice reported that a co-worker at the Pentagon’s Defense Intelligence Agency (DIA) was possibly engaged in espionage for China, possibly connected to California Republican official and Chinese double agent Katrina Leung. [Democracy Now!, 1/3/2006; Cybercast News Service, 1/25/2006] Tice says, “I saw all the classic signs” in the DIA employee. After transferring to the NSA in November 2002, he reported his concerns again, this time adding criticisms of incompetence for the FBI, who in Tice’s view failed to properly investigate his allegations. Instead, Tice was ordered by NSA Security to undergo psychiatric evaluation. He was labeled “paranoid” and “psychotic” by NSA forensic psychologist Dr. John Michael Schmidt; Tice lost his top-secret security clearance as a result. [Cybercast News Service, 1/25/2006]
Fired - He was fired from the NSA in 2005 after spending his last years at the agency pumping gas and working in an agency warehouse. “I reported my suspicion and got blown off,” he says. “I pushed the issue and that ticked them off, the fact that I questioned their almighty wisdom.” [Cox News Service, 5/5/2005] Tice again made news on January 10, 2006 (see January 10, 2006), when he admitted to being a source for the New York Times’s article about a secret NSA electronic surveillance program against American citizens, a program carried out in the name of combating terrrorism. [ABC News, 1/10/2006]
No Evidence of Mental Instability - As for Tice’s own psychological evaluation by Schmidt, according to three other clinical psychologists, there is “no evidence” of either of the disorders in Tice’s mental makeup. And another NSA psychologist pronounced Tice mentally sound in 2002, though having a “somewhat rigid approach to situations.” Tice is described by five retired NSA and intelligence officials as “congenial,” “enthusiastic,” and “a scholar of high intellectual rigor [with] sound judgment [and] unparalleled professionalism.” Tice says of the NSA’s attempts to smear whistleblowers with apparently baseless psychological allegations, “This nonsense has to stop. It’s like Soviet-era torture. These people are vicious and sadistic. They’re destroying the lives of good people, and defrauding the public of good analysts and linguists.” But it has been effective in cowing others who were, in Tice’s words, “too afraid or ashamed to come forward.” [Cybercast News Service, 1/25/2006]
Further Allegations - Another former analyst, now employed by another federal agency and who only allows himself to be identified as “J,” describes similar targeting by the NSA. J is fluent in an unusually high number of languages, and is described by former colleagues as “brilliant” and possessed of “amazing” critical skills. “I believe the abuse is very widespread,” J says. “The targeted person suddenly is described as ‘not being a team player,’ as ‘disgruntled,’ and then they’re accused of all sorts of bizarre things. Soon they’re sent to the psych people.” J himself was targeted in September 1993 (see September 11, 1993) when he and other analysts concluded that the United States was being targeted by Islamic terrorists, and then again in early 2001 after predicting a terrorist attack using planes as weapons (see May 2001).
NSA Like the 'Gestapo' - A third whistleblower, a current NSA officer who refuses to be identified, confirms the allegations and says that baseless psychiatric allegations as a form of retaliation are “commonplace” at the agency. He says, “A lot of people who work there are going through the same thing. People live in fear here. They run it like some kind of Gestapo.” Those identified as “problems” are “yelled at, badgered and abused.…These are really good people, who start to be labeled crazy, but they’re telling the truth.” The official adds that the NSA often plants false evidence in personnel files as part of the intimidation campaign. Tice says the NSA maintains what he calls a “dirt database” of inconsequential but potentially embarrassing information on employees, gathered during routine clearance investigations and used as a form of leverage. The current officer says that an “underground network” has developed to discuss these issues. “It’s like the Nazis have taken over,” he says. [Cybercast News Service, 1/25/2006]
Personal Vendettas - Diane Ring is another former NSA official targeted by her superiors. Unlike Tice, a self-described conservative who believes President Bush should be impeached over the NSA’s illegal wiretapping program, Ring is a Bush supporter who believes the surveillance program is entirely proper. Ring, a former NSA computer scientist, says she was ordered to undergo psychiatric evaluations after coming into conflict with a colonel at the Pentagon. Ring is not a whistleblower per se like the others, but says she was targeted for retaliation because of a personal vendetta against her. The colonel “blew up” at Ring after she missed a meeting and explained that her branch chief had her working on a classified program that took priority over the meeting. Ring also was evaluated by Dr. Schmidt. When she complained about the apparent retaliation, her security clearance was, like Tice’s, revoked, and she was “red-badged,” or put on restricted access within the NSA offices. Ring says she received an excellent job evaluation just three months prior to the actions taken against her. She says her colleagues at the time were told not to talk to her, and she was restricted to working in a room filled with other red-badgers. She thinks she was isolated as part of an intentional campaign to force her to leave the agency. “They had these red-badgers spread out all over the place.” she recalls. “Some were sent to pump gas in the motor pool and chauffeur people around. In our room, some people brought sleeping bags in and slept all day long. Others read. I would think that would incense the taxpaying public.” Schmidt eventually reported that another doctor diagnosed Ring with a “personality disorder,” but Ring has a July 21, 2005 letter from that doctor, Lawrence Breslau, which reads in part, “On mental status examination including cognitive assessment she performs extremely well.” In the letter, Breslau says he never made such a diagnosis. She, like others in her position, went to the NSA Employee Assistance Service (EAS) for confidential counseling, but the current NSA officer says that though those sessions are supposed to be confidential, NSA officials can and do obtain “confidential” sessions for retaliatory purposes. “Their goal is to freak you out, to get inside your mind,” that officer says. Rice claims that NSA General Counsel Paul Caminos lied about her case before a judge, denying that he had sent an internal e-mail forbidding anyone from supporting Ring. Ring says she was “floored” by Caminos’s actions: “I served in Bosnia. We had mines going off all around us, all day long. That was nothing compared to this.” She is currently working on clearing her name with the NSA’s new director, Lieutenant General Keith Alexander. Ring believes that the problem at NSA involves a small number of people, “The whole lot of them is corrupt though. There is zero integrity in the process. And zero accountability.”
'Psychiatric Abuse' 'Very Widespread' - Like his fellow whistleblowers, former NSA officer Thomas Reinbold says the practice of “psychiatric abuse” inside the NSA is “very widespread.” Reinbold, who recelved 26 commendations and awards during his career at the NSA, including a medal for the intelligence he provided during the 1991 Gulf War, says, “They call it ‘doing a mental’ on someone.” Such practices have a “chilling effect” on other potential whistleblowers: “They fear for their careers because they fear someone will write up bad [psychological] fitness reports on them.” Reinhold was labeled “paranoid” and “delusional” by Schmidt after he complained to an inspector general on February 25, 1994, that the federal government was guilty of contract tampering; Schmidt’s evaluation contradicts a psychological evaluation he conducted on Reinbold eight months before that found he was mentally sound. At the time, Reinbold worked as a contracting officer representative for the Naval Security Group (NAVSECGRU) in Virginia. Reinbold had his high-level security clearance revoked, and was escorted off the grounds by armed security officers. Reinbold says NSA officials fabricated evidence in his personnel file to force him out; that evidence included allegations that he was a danger to himself and others, and that he had said “if [he] was going down, [he] would take everyone with him.” In September 1995, an administrative hearing found that the revocation of Reinbold’s security clearance was unjustified and recommended restoring his clearance, but did not allow the damaging information to be removed from his personnel file. He later sued the agency, and then retired because of diabetes. “I gave 29 years of my life to the intelligence community,” he recalls. “They couldn’t get me out the door fast enough. There are very good people, getting screwed and going through hell.”
Helping Those Who Come After - Some of the whistleblowers hope to gain the assistance of politicians to help their cases. But Tice is less optimistic. “Our time is over,” Tice says he told Ring. “But we can make a difference for those who come behind us.” The five whistleblowers have the support of the whistleblower advocacy group Integrity International. Its founder and director, Dr. Don Soeken, himself a whistleblower while he was with the US Public Health Service in the 1970s, says, “When this retaliation first starts, there’s a tendency by bosses to use code words like ‘delusional,’ ‘paranoid’ and ‘disgruntled’. Then they use psychiatric exams to destroy them. They kill the messenger and hope the PR spin will be bought by the public.” Tom Devine of the Government Accountability Project says that “psychiatric retaliation” is a knee-jerk reaction against whistleblowers: “It’s a classic way to implement the first rule of retaliation: shift the spotlight from the message to the messenger. We call it the ‘Smokescreen Syndrome.’” Superiors investigate and smear the whistleblower for anything from financial irregularities to family problems, sexual practices, bad driving records, or even failure to return library books, Devine says. “It’s a form of abuse of power.” The Whistleblower Protection Act was written to protect those like Tice, Ring, Reinbold, and Soeken, but, says Beth Daly of the Project on Government Oversight (POGO), the act has serious flaws. “You have to go through the inspector general or the director of the CIA to let them know if you’re going to Congress and what you’re going to disclose,” she says. “And inspector generals are notorious for revealing who whistleblowers are.”
Entity Tags: Paul Caminos, Project for Government Oversight, Naval Security Group, Russell Tice, Tom Devine, Thomas Reinbold, National Security Agency, US Public Health Service, Keith Alexander, Lawrence Breslau, Diane Ring, Defense Intelligence Agency, Beth Daly, Don Soeken, House National Security Subcommittee, Government Accountability Project, John Michael Schmidt, Integrity International, “J”
Timeline Tags: Civil Liberties
Electronic Frontier Foundation logo. [Source: Flickr.com]The Electronic Frontier Foundation (EFF), a civil liberties and privacy-advocacy organization, files a lawsuit against telecommunications giant AT&T for allegedly violating the law and the privacy of its citizens by cooperating with the National Security Agency in the NSA’s construction of what the EFF calls a “massive, illegal program to wiretap and data-mine Americans’ communications.” EFF lawyer Kevin Bankston says: “Our goal is to go after the people who are making the government’s illegal surveillance possible. They could not do what they are doing without the help of companies like AT&T. We want to make it clear to AT&T that it is not in their legal or economic interests to violate the law whenever the president asks them to.”
Unprecedented Access to Communications System - EFF alleges that as part of the NSA’s domestic spying program, AT&T has allowed the NSA direct access to the phone and Internet communications passing over its network, and has given the government “unfettered access to its over 300 terabyte ‘Daytona’ database of caller information—one of the largest databases in the world.” One of AT&T’s databases, nicknamed “Hawkeye,” contains 312 terabytes of data detailing nearly every telephone communication on AT&T’s domestic network since 2001, the lawsuit alleges. The suit goes on to claim that AT&T allowed the NSA to use the company’s powerful Daytona database management software to quickly search this and other communication databases. AT&T, the suit claims, is in violation of the First and Fourth Amendments, federal wiretapping statutes, telecommunications laws, and the Electronic Communications Privacy Act. The suit requests fines up to $22,000 for each AT&T customer, and punitive fines—damages that could potentially reach into the billions of dollars. The EFF lawsuit is one of over 30 lawsuits filed for similar reasons (see June 26, 2006). The lawsuit will survive a number of initial legal challenges by the Justice Department and AT&T, including AT&T’s contention that “whatever we did, the government told us to do” and therefore it should be immune from such lawsuits, and the Justice Department’s invocation of “national security” and the possibility of the revelation of “state secrets” (see March 9, 1953). EFF retorts, “In this country we follow the law, we don’t just follow orders.” Bankston tells a reporter, “If state secrecy can prevent us from preserving the rights of millions upon millions of people, then there is a profound problem with the law.”
Suit Alleges Criminal Actions, Does Not Challenge Government's Right to Wiretap - The lawsuit does not challenge the government’s right to electronically monitor legitimate terrorism suspects, nor does it challenge the judicial right to issue warrants for such surveillance. Rather, EFF writes: “Wiretaps on terrorists are allowed under the law, and this lawsuit is not challenging the wiretap laws. We have sued AT&T for breaking those laws—the telecommunications giant gave the government access to its communications switches and its huge databases of information on millions of ordinary Americans. These are AT&T customers who have not even been accused of affiliations with terrorists. Americans can be both safe and free: if the government truly believes it has cause to wiretap a suspect, it can order AT&T to provide information under FISA [the Foreign Intelligence Surveillance Act]—for up to 72 hours before going to the court. But AT&T has no business providing direct access to the communications of millions of ordinary Americans, without the checks and balances of Congress or the courts.” [Electronic Frontier Foundation, 1/31/2006; Wired News, 1/31/2006]
According to government and political sources, the Iraqi minister for national security sends a report to the Iraqi government saying that the security of the “Golden Mosque” in Samarra was breached. The mosque is considered to be sacred to Shiite Muslims all over the world. [BBC, 2/22/2006; Reuters, 3/2/2006]
Seven telecommunications executives confirm to the press that large telecommunications companies such as AT&T, MCI, and Sprint have cooperated with the National Security Agency’s domestic warrantless wiretapping program. Those firms, along with BellSouth, previously denied they had cooperated with the NSA (see October 2001). In typical domestic investigations, telecom companies require court warrants before mounting any surveillance operations, but this has not been the case with the NSA program. Apparently, the companies decided to assist the NSA in tracking international telephone and Internet communications to and from US citizens and routed through “switches” which handle millions of communications, both domestic and international, every day. The telecom firms in question have undergone several mergers and reorganizations—BellSouth, another firm accused of cooperating with the NSA, is now part of AT&T, MCI (formerly WorldCom) was recently acquired by Verizon, and Sprint has merged with Nextel. The companies comply with the NSA requests for information once the NSA determines that there is a “reasonable basis” for believing that the communications may have a connection with militant Islamic organizations such as al-Qaeda. The firms do not require court warrants, but rather implement the monitoring on nothing more than oral requests from senior NSA officials. [USA Today, 2/5/2006]
Former National Security Agency (NSA) intelligence analyst and current whistleblower Russell Tice tells the House Government Reform Subcommittee on National Security, Emerging Threats, and International Relations that he worries about what he calls a “special access” electronic surveillance program that is far more wide-ranging than the warrantless wiretapping recently exposed by the New York Times. However, Tice says he is forbidden by law to reveal specifics of the program to Congress. Tice says he believes the program violates the Constitution’s protection against unlawful search and seizures, but for him to discuss it with anyone in Congress or even with the NSA’s inspector general would violate classification laws. A spokesman for Congressman Dennis Kucinich (D-OH) says both Kucinich and committee chairman Christopher Shays (R-CT) believe that a few members of the Armed Services Committee have high enough security clearances for Tice’s information: “Congressman Kucinich wants Congressman Shays to hold a hearing [on the program]. Obviously it would have to take place in some kind of a closed hearing. But Congress has a role to play in oversight. The [Bush] administration does not get to decide what Congress can and can not hear.” In January 2006, it emerged Tice was one of the sources for the New York Times’s revelation that the NSA is engaged in possibly illegal wiretapping of American civilians as part of the war on terror (see January 10, 2006). Tice was fired from the NSA in 2005 and labeled “paranoid,” a classification Tice says was pasted on him in retaliation for his whistleblowing both inside the agency and to the public (see January 25-26, 2006). [United Press International, 2/14/2006] Author James Bamford, an expert on US intelligence, says, “The congressional intelligence committees have lost total control over the intelligence communities. You can’t get any oversight or checks and balances; the Congress is protecting the White House and the White House can do whatever it wants.” [In These Times, 5/15/2006]
The US interagency National Counterterrorism Center (NCTC) maintains a watch list of 325,000 names of international terrorism suspects, a number that has more than quadrupled since the the list was created in 2003 by merging other watch lists together. NCTC officials estimate that, due to aliases, some 200,000 individuals are represented on the list. The main US watch list at the time of 9/11 had 60,000 names on it (see December 11, 1999). An administration official says, “The vast majority are non-US persons and do not live in the US.” However, officials refuse to state how many on the list are US citizens and how many names on the list were obtained through the controversial wiretapping program run by the National Security Agency (NSA). Civil liberties and privacy advocates claim that the scale of the list heightens their concerns that watch lists include the names of large numbers of innocent people. Attorney General Alberto Gonzales tells the Senate Judiciary Committee that he cannot discuss specifics but says, “Information is collected, information is retained, and information disseminated in a way to protect the privacy interests of all Americans.” A September 2003 presidential directive instructs agencies to supply data for the list only about people who are “known or appropriately suspected to be… engaged in conduct constituting, in preparation for, in aid of, or related to terrorism.” Marc Rotenberg, executive director of the Electronic Privacy Information Center, says the scope of the NCTC list highlights the “false positive” problem, in which innocent people have been stopped from flying because their names are wrongly included or are similar to suspects’ names. “If there are that many people on the list, a lot of them probably shouldn’t be there. But how are they ever going to get off?” [Washington Post, 2/15/2006] Numerous problems with the list will be found in 2006 (see March 2006).
The Golden Mosque, before and after the bombing. [Source: Associated Press] (click image to enlarge)The Al-Askari or Golden Mosque, in Samarra, Iraq, is partially destroyed in a bombing attack that devastates the ancient shrine. The mosque is one of the holiest of Shi’ite sites. The attacks are carried out by about a dozen men in paramilitary uniforms who enter the shrine, handcuff four guards sleeping in a back room, place a bomb in the dome of the mosque, and detonate it. [New York Times, 2/22/2006; Radio Free Europe, 2/12/2007] The devastating attack on one of Shi’a Islam’s holiest sites prompts off a wave of Shi’ite attacks on Sunni mosques, Sunni citizens, and even US occupiers that eventually takes over 10,000 Iraqi lives and brings the country closer to full-blown civil war. [Washington Post, 6/13/2004] Some local officials say that the bombers wore the uniforms of Iraqi security forces. Iraqi Prime Minister Ibrahim al-Jaafari says that the attack was possibly the result of “infiltration” of Iraqi security forces. The four guards found handcuffed will later be arrested as suspects in the bombing as well as 10 men dressed as Iraqi police commandos. [Washington Post, 2/23/2006] The Iraqi government will blame the al-Qaeda faction in Iraq for the bombings, though that organization’s responsibility for the bombings remains unclear. [Reuters, 6/13/2007] One leading Iraqi Shi’ite politician, Abdul Aziz al-Hakim, lays partial blame for the bombing on the US ambassador to Iraq, Zalmay Khalilzad, saying that Khalilzad’s public comments on death squads operating within Iraq’s Shi’ite-led Interior Ministry were a provocation to the bombing. [New York Times, 2/22/2006] Shi’ite and Sunni politicians exchange accusations over the bombings, with Shi’ite lawmakers saying that the government ignored warnings about the attacks, and Sunnis accusing Shi’ites of bombing their own shrine to exacerbate discords between the two religious factions. [Reuters, 3/2/2006] President Bush promises to rebuild the mosque. [CNN News, 2/22/2006] But the shrine is, as of mid-2007, never rebuilt, partly because of disagreements between Sunnis and Shi’ites as to how to go about the rebuilding process. [Radio Free Europe, 2/12/2007] The shrine will be bombed again 17 months later (see June 13, 2007), setting off another wave of violent reprisals.
US Army Major General Rick Lynch speaks to reporters in Baghdad and claims that there was no warning in advance about a possible attack on the “Golden Mosque” in Samarrah. This directly contradicts claims from internal Iraqi government sources that say the national security ministry sent a warning to the Iraqi government about a breach of security at the mosque weeks before the bombing occurred (see Early February 2006). [Washington File, 2/23/2003]
The FBI has been slow in making use of computers and it is reported on this day that some New York FBI agents still lack e-mail accounts. The FBI’s New York office has often been the lead office in dealing with al-Qaeda. An FBI official says, “As ridiculous as this might sound, we have real money issues right now, and the government is reluctant to give all agents and analysts dot-gov accounts.” An FBI spokesperson says the accounts will be given before the end of 2006. [CBS News, 3/21/2006]
Lawmakers in Congress complain that restrictions on their discussion of upcoming appropriations bills make it almost impossible to conduct appropriate oversight on those bills. The House votes 327 to 96 to authorize an appropriations bill to fight the administration’s war on terror, but only about a dozen members have actually read the bill. Rules adopted by the Republican leadership of both houses in concert with the White House (see February 1, 2004) allow lawmakers to read the bills, but prohibit discussing the contents of those bills, even if that information has already been leaked to the press, under penalty of criminal prosecution and expulsion from Congress. “It’s a trap,” says Representative Russ Carnahan (D-MO), referring to the restrictions on discussing the bill. “Either way, you’re flying blind.” Carnahan’s colleague, Walter Jones (R-NC) agrees: “We ought to be doing a better job on oversight, [but] if you’re not going to be able to question it or challenge it, that makes it difficult.” [Savage, 2007, pp. 117]
Small flash computer drives for sale in a bazaar just outside the Bagram US military base. [Source: NBC]The Los Angeles Times reveals that stolen computer drives containing important classified information can be purchased cheaply at the local bazaar just outside the US military base in Bagram, Afghanistan. Shop owners at the bazaar say a variety of Afghan menial workers at the base continually sell them equipment stolen from inside the base. The drives had been sold cheaply as used equipment and only recently did a reporter discover some of them contained classified information. The drives purchased by reporters include:
Deployment rosters that identify about 700 US soldiers and their social security numbers.
Maps showing the locations of Taliban and al-Qaeda in Pakistan (see January 2005).
Presentations that name suspected militants targeted or “kill or capture.”
A list of officials in the Afghan government profiting from the illegal drug trade (see Early 2005).
Documents and maps suggest the Taliban are staging attacks from across the Pakistan border with Pakistani support (see Late 2004-Early 2005).
A classified briefing about capabilities of a special radar used to find where mortar rounds have been fired, including a map of where the radar was deployed in Iraq in March 2004.
A January 2005 presentation identifying a dozen Afghan governors and police chiefs as “problem makers” involved in kidnappings, support for the Taliban, and/or attacks on US troops.
Discussions of US efforts to “remove” or “marginalize” problematic Afghan officials. One governor on the list was removed from his post in December 2005 after he was caught with almost 20,000 pounds of opium in his office. But President Hamid Karzai then appointed him to Afghanistan’s upper parliament. [Los Angeles Times, 4/10/2006]
Some psychological operations are detailed, including attempts to manage the Afghan media. For instance, one list contains the item, “Prepare radio news stories for local stations highlighting Afghan National Police support.” [Los Angeles Times, 4/12/2006]
“Scores of military documents marked ‘secret,’ describing intelligence-gathering methods and information.”
The names, photographs, and telephone numbers of Afghan spies informing on the Taliban and al-Qaeda. Some spies are described as having networks of informants working for them.
Descriptions of meetings of Taliban commanders held in Pakistan.
A file describing the layout of a US Special Forces base in Afghanistan complete with photographs of its perimeter and procedures for defending the base if attacked. [Los Angeles Times, 4/14/2006] The US immediately launches an investigation into the security breach. One US official says, “We’re obviously concerned that certain sources or assets have been compromised.” [Los Angeles Times, 4/14/2006] Several days after the first press reports, US soldiers buy up every computer drive from the bazaar that they can find, presumably to prevent them from falling into enemy hands. But within two weeks, there are plenty of drives for sale again, some containing classified information. One shopkeeper says he had been selling pilfered US military computer drives for four years: “I may have sold thousands of [them] since I have come and opened this shop.” [Los Angeles Times, 4/25/2006] A month after the security breach was first reported, shopkeepers at the bazaar say they still receive goods from inside the US base, but not at the rate they once did. [Associated Press, 5/8/2006]
John Hannah. [Source: PBS]Dick Cheney’s Office of the Vice President (OVP) is so cloaked in secrecy, journalist Robert Dreyfuss reports, that it routinely refuses to provide a directory of staff members or even the numbers of staff and employees. Dreyfus writes, “Like disciplined Bolsheviks slicing through a fractious opposition, Cheney’s team operates with a single-minded, ideological focus on the exercise of American military power, a belief in the untrammeled power of the presidency, and a fierce penchant for secrecy.” The list of current and former staffers includes, as of April 2006: former chief of staff Lewis Libby; his replacement, David Addington; top national security advisers Eric Edelman and Victoria Nuland; neoconservative and hardline Middle East specialists such as John Hannah, William Luti, and David Wurmser; anti-Chinese Asia specialists such as Stephen Yates and Samantha Ravich; a varying number of technocratic neoconservatives in other posts; and an array of communications specialists, including “Cheney’s Angels”: Mary Matalin, Juleanna Glover Weiss, Jennifer Millerwise, Jennifer Mayfield, Catherine Martin, and Lea Anne McBride. It is known that Cheney’s national security staff was assembled by Libby from various far-right think tanks such as the American Enterprise Institute, the Hudson Institute, and the Washington Institute for Near East Policy (WINEP), as well as carefully screened Cheney supporters from a variety of Washington law firms. [American Prospect, 4/16/2006] Lawrence Wilkerson, the former chief of staff to former Secretary of State Colin Powell, will recall in early 2007: “A friend of mine counted noses [at the office] and came away with 88. That doesn’t count others seconded from other agencies.” [Washington Monthly, 1/7/2007]
'Cabal' of Zealots - Wilkerson calls Cheney’s inner group a “cabal” of arrogant, intensely zealous, highly focused loyalists. Recalling Cheney’s staff interacting in a variety of interagency meetings and committees, “The staff that the vice president sent out made sure that those [committees] didn’t key anything up that wasn’t what the vice president wanted,” says Wilkerson. “Their style was simply to sit and listen, and take notes. And if things looked like they were going to go speedily to a decision that they knew that the vice president wasn’t going to like, generally they would, at the end of the meeting, in great bureaucratic style, they’d say: ‘We totally disagree. Meeting’s over.’” The committee agendas were generally scuttled. And if something did get written up as a “decision memo” bound for the Oval Office, Cheney himself would ensure that it died before ever reaching fruition.”
Sidestepping the NSC - The National Security Council (NSC) is designated as the ultimate arbiter for foreign policy options and recommendations for the president. But, according to Wilkerson, Cheney’s office and the NSC were often at loggerheads, and Cheney’s “shadow NSC” had the upper bureaucratic hand. Cheney “set up a staff that knew what the statutory NSC was doing, but the NSC statutory staff didn’t know what his staff was doing,” says Wilkerson.
China Threat - Cheney’s Asia advisers, Yates and Ravich, were most often encountered by Wilkerson. They helped drive Cheney’s agenda for China, which was obsessive to the point of paranoia. China was a grave, if long-term, threat to the US, they believed. The US must begin strongly cultivating Taiwan as a counterbalance to China, whom they asserted was preparing for military action against the US. Former US ambassador to China Charles Freeman compares Yates to the Defense Department’s Paul Wolfowitz and Douglas Feith; all three believed, Freeman says, that China was “the solution to ‘enemy deprivation syndrome.’”
Iraq Policy - Cheney’s current and former staffers played an even larger role in shaping the administration’s Iraq policy than is generally known, and Cheney “seeded” staffers in other departments to promote his war agenda. Luti left the OVP in 2001 to join the Department of Defense, where he organized the Office of Special Plans (OSP). Wurmser, an AEI neoconservative, joined the Pentagon and created the forerunner of the OSP, the Counterterrorism Evaluation Group, which helped manufacture the evidence of connections between Hussein and al-Qaeda. Wurmser worked closely with Hannah, Libby, Luti, and another Pentagon official, Harold Rhode. Ravich worked with neoconservative Middle East analyst Zalmay Khalilzad to build up Ahmad Chalabi’s Iraqi National Congress, their designated supplanter of Hussein.
US or Israel Interests? - Many of Cheney’s most influential staffers are pro-Israeli to the point where many observers wonder where their ultimate loyalties lie. David Wurmser is a standout of this group. Wurmser worked at WINEP with Hannah, then joined the AEI, where he directed that group’s Middle East affairs, then joined Feith’s OSP before moving on to Bolton’s inner circle at the State Department, all before joining Cheney in the OVP. Most outsiders consider Wurmser’s ideas wildly unrealistic. A former ambassador says of Wurmser, “I’ve known him for years, and I consider him to be a naive simpleton.” [American Prospect, 4/16/2006]
Entity Tags: Elizabeth (“Liz”) Cheney, William Luti, Washington Institute for Near East Policy (WINEP), Victoria Nuland, US Department of State, Douglas Feith, Zalmay M. Khalilzad, Samantha Ravich, Stephen Yates, David Wurmser, David S. Addington, David Phillips, Aaron Friedberg, American Enterprise Institute, Benjamin Netanyahu, Catherine (“Cathie”) Martin, Central Intelligence Agency, Robert G. Joseph, Counterterrorism Evaluation Group, Chas Freeman, Robert Dreyfuss, American Prospect Magazine, US Department of Defense, Richard (“Dick”) Cheney, Jennifer Mayfield, Jennifer Millerwise, John Hannah, James Woolsey, John R. Bolton, Iraqi National Congress, Harold Rhode, Entifadh Qanbar, Eric Edelman, George W. Bush, Hudson Institute, Richard Perle, Office of the Vice President, Lawrence Wilkerson, Lewis (“Scooter”) Libby, Mary Matalin, Lea Anne McBride, National Security Council, Dean McGrath, Paul Wolfowitz, Office of Special Plans, Juleanna Glover Weiss
Timeline Tags: Civil Liberties
Mohammad Daud. [Source: Dieter Nagl / AFP / Getty Images]Interior Minister for Counternarcotics Gen. Mohammad Daud is the top counter-narcotics official in the Afghan government, but it is reported on this day that there are allegations Daud is simultaneously a drug kingpin. One anonymous senior drug official from an unnamed country says, “He frustrates counternarcotics law enforcement when it suits him. He moves competent officials from their jobs, locks cases up and generally ensures that nobody he is associated with will get arrested for drug crimes.” Daud denies the allegations. Additionally, there are allegations that some provincial governors, cabinet ministers, and even the president’s own brother are involved in the drug trade. Although there are several dozen prominent major drug traffickers in the country, only two have been arrested and held since 9/11. [San Francisco Chronicle, 4/17/2006] Daud’s name also appears on a classified document from a US military base listing known Afghan drug kingpins (see Early 2005).
The Government Accountability Office (GAO), Congress’s non-partisan research arm, issues a report criticizing the government’s sharing of counterterrorism information. Despite more than four years of legislation and executive orders, there has been little progress since 9/11 in sharing information among federal agencies and thousands of nonfederal partners. Deadlines set by both President Bush and Congress have repeatedly not been met. The responsibility for the task has also repeatedly shifted since 9/11—from the White House to the Office of Management and Budget, to the Department of Homeland Security, and to the Director of National Intelligence. In January 2006, the program manager in charge of improving information sharing between agencies resigned after complaining of inadequate budget and staffing. The GAO report notes that there is a lack of “government-wide policies and processes to help agencies integrate the myriad of ongoing efforts to improve the sharing of terrorism-related information…” For instance, there are at least 56 different secrecy classifications in use, with different agencies using different terms or sometimes the same terms with widely different meanings. State and local first responders claim they are often left in the dark or overwhelmed with identical information from multiple federal sources. [Washington Post, 4/19/2006]
Maurice Hinchey. [Source: Washington Post]A Justice Department investigation into the National Security Agency’s warrantless wiretapping program ends before it begins, because the NSA will not grant Justice Department lawyers routine security clearances. The investigation had been opened in February 2006 (see February 2, 2006) when Representative Maurice Hinchey (D-NY) asked the Justice Department’s Office of Professional Responsibility (OPR) to investigate the NSA’s warrantless surveillance of US citizens (see After September 11, 2001). Without security clearances, investigators could not examine NSA lawyers’ role in the program. OPR counsel H. Marshall Jarrett writes in a letter to Hinchey: “We have been unable to make any meaningful progress in our investigation because OPR has been denied security clearances for access to information about the NSA program. Without these clearances, we cannot investigate this matter and therefore have closed our investigation.” Jarrett and his office have made routine requests for security clearances since January, to no avail. The OPR’s investigation would have focused strictly on whether Justice Department lawyers violated ethical rules, and would not have examined the entire NSA program. Hinchey says, “This administration thinks they can just violate any law they want, and they’ve created a culture of fear to try to get away with that.” [Associated Press, 5/11/2006] Hinchey writes to Jarrett, regarding the failure to grant clearances: “We are perplexed and cannot make sense of your denial of these security clearances. Our request did not ask OPR to give us the intricate details of the NSA program; we understand that such a request would not even be within OPR’s jurisdiction. There appear to be no reasonable grounds for blocking this investigation. Not only does your denial of their request for a security clearance not make sense, it is unprecedented.” Hinchey will try, and fail, to get a bill through the Republican-controlled House Judiciary Committee to force the White House, Justice Department, and Defense Department to turn over to Congress all documents related to the closure of the OPR probe. He will write in a letter to President Bush, “If the NSA program is justified and legal, as you yourself have indicated, then there is no reason to prevent this investigation from continuing.” [US House of Representatives, 7/18/2006] In June 2006, it will be revealed that Bush personally made the decision not to grant the OPR investigators security clearances (see Late April 2006).
President Bush reiterates claims that the NSA wiretapping program specifically targets only suspected al-Qaeda members and sympathizers and does not target domestic communications without court authorizations. “[T]he privacy of ordinary Americans is fiercely protected in all our activities,” Bush asserts. “We’re not mining or trolling through the personal lives of millions of innocent Americans.” Serious questions have been raised about the accuracy of these assertions (see October 2001, December 18, 2005, and May 12, 2006). [Democracy Now!, 5/12/2006]
Protesters in Kabul run from Afghan police gunshots. [Source: Associated Press / Rodrigo Abd]A US Army truck in a convoy careens out of control in Kabul, Afghanistan, killing at least three locals. Witnesses see the incident as symbolic of lack respect for the Afghan populace and rumors quickly swirl that it was intentional. Angry crowds form and begin pelting the rest of the convoy with rocks. US and/or Afghan soldiers open fire on the crowd and kill about six Afghans. This further enrages the populace, leading to rioting and looting all over Kabul for hours. Looters destroy businesses, Western non-profit offices, and even lay siege to the Interior Ministry for a time. NATO peacekeeping troops stay in their compounds and Afghan security forces are ineffectual. Officially, 17 are killed in the riots, but informed observers believe the death count is close to 100. Afghan member of parliament Dr. Ramazan Bashar Dost says that the people are angry at perceived price gouging by Western contractors and non-profits, and what is seen as poor results for all the billions of dollars spent. He says, “The problem is that the [non-profits] work within the system of corruption that plagues Afghanistan. They pay the bribes to the officials and even to Western contractors. So people see them as part of the same system as the corrupt government.” [Salon, 6/14/2006; New York Times, 8/23/2006] Afghan President Hamid Karzai responds by appointing a new police chief and other top police officers known for their ties to organized crime. [New York Times, 8/23/2006]
The Washington Post and New York Times both publish articles suggesting that Afghan President Hamid Karzai is losing support among Afghans and some of his foreign backers. The Washington Post comments, “public confidence in his leadership has soured with reports of highway police robbing travelers, government jobs sold to the highest bidder, drug traffic booming, and aid money vanishing.” An anonymous Western diplomat says, “There is an awful feeling that everything is lurching downward. Nearly five years on, there is no rule of law, no accountability. The Afghans know it is all a charade, and they see us as not only complicit but actively involved.” [Washington Post, 6/26/2006] The New York Times notes there “is widespread frustration with corruption, the economy and a lack of justice and security.” Karzai is widely viewed as having failed to deal with many pressing problems. “For the first time since Mr. Karzai took office four and half years ago, Afghans and diplomats are speculating about who might replace him. Most agree that the answer for now is no one, leaving the fate of the American-led enterprise tied to his own success or failure.” [New York Times, 8/23/2006]
Abdul Koyar and Abdul Kahar. [Source: Reuters]Acting on intelligence indicating the construction of a chemical device, police carry out an armed raid which leads to a shooting and two arrests in Forest Gate, east London. The shot suspect, Abdul Kahar, is taken to hospital while his brother, Abdul Koyar, is held at a local police station. Sources reveal that intelligence indicated the presence of a “viable” chemical weapon in the house that was capable of producing hundreds of casualties. Deputy Assistance Commissioner Peter Clarke, head of the Metropolitan Police anti-terror unit, describes the intelligence as “specific.” An air exclusion zone is established at an altitude of 2,500 feet above the site and police in bio-chemical suits and gas masks conduct the search. This search of the home fails to turn up any threat, as do searches of where the men work. [BBC, 6/3/2006] The raid, which cost more than $4 million, fails to find the suspected chemical bomb. Scotland Yard justifies the raid as necessary to determine the validity of the intelligence. The raid causes heavy tension between law enforcement and the Bangladeshi Muslim community of Forest Gate. Overtime pay for the more than 200 officers used in the raid amounts to $1.7 million and $.7 million is spent on “non-pay costs” such as catering and the erection of road barriers. The men are subsequently released without charge. [The Telegraph, 10/3/2006]
George Terwilliger, a former deputy attorney general under George H. W. Bush, argues that the current Bush administration’s controversial data mining program (see Late 1999 and After September 11, 2001) is not illegal. Terwilliger tells the conservative National Review, “I think it’s fair to say that the statutes contemplate the transfer of this generic type of data much more on a case-by-case rather than a wholesale basis,” meaning that the law calls for a court order only in cases when the government is making a targeted request for information. But, he adds, “I don’t see anything in the statute that forbids such a wholesale turnover.” Terwilliger’s argument echoes the arguments of the Bush Justice Department, which argues that the data mining program—part of the NSA’s “Stellar Wind” surveillance program (see Spring 2004 and December 15, 2005)—does not technically constitute “electronic surveillance” under the law. Both the Fourth Amendment and the Foreign Intelligence Surveillance Act, as interpreted by the courts, define such actions as “electronic surveillance,” according to a number of legal experts, including law professor Orin Kerr. And, Ars Technica reporter Julian Sanchez notes in 2009, “the Stored Communications Act explicitly makes it a crime to ‘knowingly divulge a record or other information pertaining to a subscriber to or customer of such service… to any governmental entity.’” Sanchez will call Terwilliger’s argument “very strange,” but will note that Terwilliger is the attorney for then-Attorney General Alberto Gonzales and “a prominent defender of the administration’s surveillance policies.” Sanchez will conclude that while the argument “might pass for clever in a high school debate round… [i]t would be deeply unsettling if it [passes] for anything more in the halls of power.” [National Review, 6/5/2006; Ars Technica, 12/16/2008]
Vinton Cerf. [Source: Ipswitch.com]The Information Technology Association of America, an information technology (IT) trade association, presents a paper authored by Internet founder Vinton Cerf and others which notes that the new capabilities of electronic surveillance of Internet, cellular communications, and voice-over internet protocols (VoIP) by US government and law enforcement officials under CALEA (see January 1, 1995) is inherently dangerous for fundamental civil liberties as well as technological innovation. (CALEA mandates that US telecommunications providers such as AT&T give US law enforcement agencies and intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks.) Cerf and his colleagues write, “In order to extend authorized interception much beyond the easy scenario, it is necessary either to eliminate the flexibility that Internet communications allow, or else introduce serious security risks to domestic VoIP implementations. The former would have significant negative effects on US ability to innovate, while the latter is simply dangerous. The current FBI and FCC direction on CALEA applied to VoIP carries great risks.” In order to implement the mandates of CALEA, the authors write, the nation’s electronic communications systems will become inherently less secure from hackers and others seeking to eavesdrop or disrupt communications, innocent citizens will not be secure from possibly illegal surveillance by law enforcement or intelligence agencies, and the nation’s communications systems will face near-insurmountable technological hurdles that will make it difficult for US telecommunications and Internet providers to continue to innovate and improve services. They conclude, “The real cost of a poorly conceived ‘packet CALEA’ requirement would be the destruction of American leadership in the world of telecommunications and the services built on them. This would cause enormous and very serious national-security implications. Blindly applying CALEA to VoIP and realtime Internet communications is simply not worth this risk.” [Information Technology Association of America, 7/13/2006 ]
The Miami Seven. Group leader Narseal Batiste is on the bottom right. [Source: BBC]Police arrest seven people during a raid on a warehouse in the Miami area. The men are alleged to be a “home-grown” terrorist cell plotting to blow up the Sears Tower in Chicago and the FBI building in Miami, as well as possible other unspecified targets. They had allegedly conducted video surveillance of their targets. [CNN, 6/23/2006] The men are identified in the federal indictment as Narseal Batiste, Patrick Abraham, Stanley Grant Phanor, Naudimar Herrera, Burson Augustin, Lyglenson Lemorin, and Rotschild Augustine. [FindLaw, 6/22/2006] Two are Haitians, five are US citizens, and two are US immigrants. [Democracy Now!, 6/26/2006] Vice President Dick Cheney describes them as a “a very real threat.” [London Times, 6/25/2006] Bruce Hoffman, a counterterrorism expert who heads the Washington office of the Rand Corp., says that “amateur terrorists can kill as effectively as the professional kind.” [Washington Post, 6/24/2006] However, officials concede that the group never had any contact with any other terrorist groups, including al-Qaeda. [BBC, 6/23/2006] Officials also admit that the men had not acquired any explosives or weapons. Chicago Police Superintendent Philip Cline says “there was never any danger to the Sears Tower or Chicago.” Deputy FBI Director John Pistole says that the plot had not progressed beyond early planning stages and “was aspirational rather than operational.” Hoffman says that it is “not clear is whether they had any real capabilities to pull [the plot] off.” [Washington Post, 6/24/2006] An FBI informant posing as an al-Qaeda operative had infiltrated the group for nearly six months and many conversations were recorded. [Washington Post, 9/2/2006] Batiste, the leader of the group, allegedly stated that he and his “soldiers” wanted to receive terrorist training in order to wage a “full ground war” against the US and to “kill all the devils we can.” [BBC, 6/23/2006] He requested boots, uniforms, machine guns, radios, vehicles, and $50,000 in cash from the informant. However, the men were only able to acquire military boots and a video camera. The indictment indicates that the men lacked any real resources; these organizational problems caused the plot to peter out by May. [Washington Post, 6/24/2006] Critics accuse the FBI of running a border-line entrapment operation in which a plot that was virtually a pipe-dream was kept alive by the involvement of the informant. Max Rameau of Miami CopWatch points out that the military gear and cameras had been supplied to the men by the government, via the informant. [Democracy Now!, 6/26/2006] Court records would later show that not only did the government provide materiel to the group, but the informant also suggested the Miami FBI office as the first target. The records show that the informant, known as CW2, played a key role in the advancement of the plot, such as administering the “al-Qaeda oaths” taken by the men. At a detention hearing, judge Ted E. Bandstra says that the allegations are “disturbing,” but adds that “the plans appear to be beyond the present ability of these defendants.” [Washington Post, 9/2/2006]
Entity Tags: Narseal Batiste, Naudimar Herrera, Patrick Abraham, Rotschild Augustine, Richard (“Dick”) Cheney, Max Rameau, Philip J. Cline, Lyglenson Lemorin, Federal Bureau of Investigation, Joan Leonard, Al-Qaeda, John S. Pistole, Bruce Hoffman, CW2, Burson Augustin, Ted E. Bandstra, Stanley Grant Phanor
Timeline Tags: Complete 911 Timeline
The Department of Homeland Security’s inspector general releases a report criticizing terrorist targets listed in the federal antiterrorism database. This National Asset Database is used to determine how hundreds of millions of dollars in antiterrorism grants will be divvied up each year. The report says, “The presence of large numbers of out-of-place assets taints the credibility of the data.” For instance, Indiana, with nearly 9,000 potential terrorist targets, has 50 percent more listed targets than New York and more than twice as many as California, making it the most target-rich state in the US. Obscure targets on the list include Old MacDonald’s Petting Zoo, the Amish Country Popcorn factory, the Mule Day Parade, “Ice Cream Parlor,” “Tackle Shop,” “Donut Shop,” and an unspecified “Beach at End of a Street.” The list also apparently does not include many major business and finance operations or critical national telecommunications hubs. As a result, in May 2006 funding to New York City and Washington, DC, was cut by 40 percent while spending significantly increased to cities such as Louisville, Kentucky, and Omaha, Nebraska. The inspector general recommends that the Homeland Security department review the list and cut many “extremely insignificant” targets while providing better guidelines to prevent such future inclusions. [New York Times, 7/11/2006]
Rashid Rauf. [Source: Warrick Page/ Getty Images]British police arrest 24 people in connection with a plot to blow up aircraft flying from Britain to the United States. Metropolitan Police Deputy Commissioner Paul Stephenson says the plot was “intended to be mass murder on an unimaginable scale.” [CNN, 8/10/2006] Secretary of Homeland Security Michael Chertoff describes the plot as “well-advanced and well-thought-out and… really resourced to succeed.” [MSNBC, 8/10/2006] He also likens it to the foiled 1995 Bojinka plot, one portion of which involved blowing up up to a dozen airplanes over the ocean using liquid explosives smuggled onto the planes. [CNN, 8/11/2006] The British threat warning level is raised to critical and London’s Heathrow Airport is closed to most European flights. US officials say the plot involved hiding liquid explosives in carry-on luggage, and up to 12 flights would have been targeted. A senior US congressional source says the plotters planned to carry sports drinks onto the flights, which would then be mixed with a gel-like substance. The explosives would be triggered by the electrical charge from an iPod or mobile phone. Administration officials say the plot involved British Airways, Continental, United, and American Airlines. The plotters intended to detonate the devices over New York, Washington, San Francisco, Boston, and Los Angeles. Officials say the plot demonstrates “very strong links to al-Qaeda” and was nearly operational. In the US, the Department of Homeland Security raises the terror threat to the highest level, red, meaning “severe,” for commercial flights originating in Britain and bound for the US. In addition, the threat level is raised to orange, or “high,” for all commercial flights operating in or coming to the US. [CNN, 8/10/2006] British officials say the death toll could have exceeded the 2,700 of the September 11 attacks, with one source calling the plot “our 9/11.” The arrests were spurred by the detention in Pakistan of one of the plotters, Rashid Rauf. The Pakistanis arrested him at the behest of US Vice President Dick Cheney (see Before August 10, 2006 and Between July 28 and August 9, 2006). [Guardian, 8/11/2006] Officials say some plotters already had tickets for flights and planned to stage test runs over the weekend. Despite the 24 arrests, five suspects in Britain are still being urgently hunted. One official says, “They didn’t get them all.” But British officials claim the arrests in London and Birmingham snare all the alleged “main players.” [MSNBC, 8/10/2006] British Home Secretary John Reid says the operation is ongoing and more arrests may be made. US officials say the suspects are all British citizens between the ages of 17 and 35, with some being of Pakistani ethnicity. They add that some of the suspects had been monitored by British intelligence for several months. Deputy Assistant Commissioner Peter Clarke, head of the Metropolitan Police Service Anti-Terrorist Branch, says the arrests follow an “unprecedented level of surveillance” over several months involving meetings, movements, travel, spending, and the aspirations of a large group of people. [CNN, 8/10/2006]
Liquids, Gels, Electronics Banned from Flights - Homeland Security bans all liquids and gels except baby formula and prescription medications in the name of the ticket holder in carry-on luggage on all flights. Passengers traveling from and through British airports are temporarily permitted to only carry-on items on a restricted list. These items have to be carried in transparent plastic bags. No liquids can be carried on board, including liquid medications “unless verified as authentic.” All electronic items are also banned. [Detroit Free Press, 8/10/2006]
Arrests, Alert Questioned - In the days following the security operation, the arrests will meet with some skepticism. Stephen Glover of the Daily Mail points to previous baseless terror scares in the US and Britain, as well as questioning the political motivations of the home secretary. [Daily Mail, 8/16/2006] Douglas Fraser of the Herald in Edinburgh suggests the “political component” of the operation has caused skepticism. He says the intelligence services are taking credit for foiling a major plot by “ramping up the level of public concern about the threat.” He notes that the timing coincides with an attempt by the government of Prime Minister Tony Blair to return to an issue it was defeated on before: increasing to 90 days the amount of time that people can be detained without charge in the case of alleged terrorist offenses. [VOA News, 8/18/2006] Sean O’Neill and Stewart Tendler of the London Times urge the public and the media to wait for solid evidence before accepting the version of events presented by the government. They say previous bungled anti-terror operations have put pressure on the authorities to build a solid case in public. [London Times, 8/12/2006] In response to these criticisms, intelligence services will be hesitant to release much information publicly, but confirm to The Guardian that surveillance and tips from informants pointed to a plot in the making. Police identify the explosives to be used in the plot as TATP (triacetone triperoxide) and HMTD (hexamethylene triperoxide diamine), both peroxide-based liquid explosives. [Guardian, 8/19/2006] Police will also reveal that the raids uncovered jihadist materials, receipts of Western Union money transfers, seven martyrdom videos, and the last will and testament of one plotter. [New York Times, 8/28/2006]
Some Suspects to Be Released; Security Measures Probably Unnecessary - However, The Guardian does indicate that some of the arrested suspects are likely to be released and that the security measures instituted following the arrests are almost certainly unnecessary. [Guardian, 8/19/2006] Contradicting earlier reports, a senior British official will suggest an attack was not imminent, saying the suspects had not yet purchased any airline tickets. In fact, some do not even have passports. [MSNBC, 8/14/2006] Over two and a half weeks after the arrests, a target date for the attacks and number of planes involved will still be undetermined by investigators. The estimate of 10 to 12 planes is characterized by officials as speculative and exaggerated. Clarke acknowledges the police are still investigating “the number, destination, and timing of the flights.” [New York Times, 8/28/2006]
12 Suspects to Be Tried - Twelve suspects will be charged with terrorism offences near the end of August 2006. Trials are expected to start in January 2008 at the earliest. Prosecutor Colin Gibbs says he expects “a very long trial of [between] five and eight months.” [IOL, 9/4/2006]
Entity Tags: Michael Chertoff, Paul Stephenson, US Department of Homeland Security, Peter Clarke, Metropolitan Police Service Anti-Terrorist Branch, Sean O’Neill, Rashid Rauf, John Reid, Al-Qaeda, Douglas Fraser, United Airlines, Frances Townsend, Stephen Glover, British Airways, American Airlines, Stewart Tendler, Continental Airlines
Timeline Tags: Complete 911 Timeline
Mohamad Farik Amin. [Source: FBI]The US temporarily closes a network of secret CIA prisons around the world and transfers the most valuable prisoners to the US prison in Guantanamo, Cuba, for eventual military tribunals. The prison network will be reopened a short time later (see Autumn 2006-Late April 2007). There were reportedly fewer than 100 suspects in the CIA prisons; most of them are apparently sent back to their home countries while fourteen are sent to Guantanamo. All fourteen have some connection to al-Qaeda. Seven of them reportedly had some connection to the 9/11 attacks. Here are their names, nationalities, and the allegations against them.
Khalid Shaikh Mohammed (KSM) (Pakistani, raised in Kuwait). He is the suspected mastermind of 9/11 attacks and many other al-Qaeda attacks. A CIA biography of KSM calls him “one of history’s most infamous terrorists.”
Mustafa Ahmed al-Hawsawi (Saudi). He allegedly helped finance the 9/11 attacks.
Hambali (Indonesian). He attended a key planning meeting for the 9/11 attacks in Malaysia (see January 5-8, 2000) and is accused of involvement in many other plots, including the 2002 Bali bombings (see October 12, 2002).
Khallad bin Attash (a.k.a. Tawfiq bin Attash) (Yemeni). He also attended a key planning meeting for the 9/11 attacks in Malaysia (see January 5-8, 2000) and had a role in other plots such as the 2000 USS Cole bombing (see October 12, 2000).
Ali Abdul Aziz Ali (Pakistani, raised in Kuwait). He allegedly helped finance the 9/11 attacks and arranged transportation for some hijackers. His uncle is KSM.
Ramzi bin al-Shibh (Yemeni). A member of the Hamburg al-Qaeda cell with Mohamed Atta and other 9/11 hijackers. The CIA calls him the “primary communications intermediary” between the hijackers and KSM. He also attended a key planning meeting for the 9/11 attacks in Malaysia (see January 5-8, 2000).
Abd al-Rahim al-Nashiri (Saudi). He is said to have been one of the masterminds of the USS Cole bombing (see October 12, 2000). He also attended a key planning meeting for the 9/11 attacks in Malaysia (see January 5-8, 2000).
The remaining seven suspects are alleged to have been involved in other al-Qaeda plots:
Abu Zubaida (Palestinian, raised in Saudi Arabia). He is said to be a facilitator who helped make travel arrangements for al-Qaeda operatives. He is also alleged to have organized a series of planned millennium attacks.
Ahmed Khalfan Ghailani (Tanzanian). He was indicted for a role in the 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). He is also said to be an expert document forger.
Majid Khan (Pakistani). He lived in the US since 1996 and is said to have worked with KSM on some US bomb plots (see March 5, 2003).
Abu Faraj al-Libbi (a.k.a. Mustafa al-‘Uzayti) (Libyan). He allegedly became al-Qaeda’s top operations officer after KSM was captured.
Mohamad Farik Amin (a.k.a. Zubair) (Malaysian). He is a key Hambali associate and was allegedly tapped for a suicide mission targeting Los Angeles.
Mohammed Nazir Bin Lep (a.k.a. Lillie) (Malaysian). He is a key Hambali associate. He is accused of providing funds for the 2003 bombing of the Marriott hotel in Jakarta, Indonesia (see August 5, 2003). He was allegedly tapped for a suicide mission targeting Los Angeles.
Gouled Hassan Dourad (Somali). He allegedly scouted a US military base in Djibouti for a planned terrorist attack.
The fourteen are expected to go on trial in 2007. [Knight Ridder, 9/6/2006; Central Intelligence Agency, 9/6/2006; USA Today, 9/7/2006]
Entity Tags: Majid Khan, Mustafa Ahmed al-Hawsawi, Mohamad Farik Amin, Mohammed Nazir Bin Lep, Ramzi bin al-Shibh, Hambali, Gouled Hassan Dourad, Abd al-Rahim al-Nashiri, Abu Faraj al-Libbi, Khallad bin Attash, Abu Zubaida, Ali Abdul Aziz Ali, Central Intelligence Agency, Ahmed Khalfan Ghailani, Khalid Shaikh Mohammed
Timeline Tags: Torture of US Captives, Complete 911 Timeline, 9/11 Timeline
Bush acknowledging the secret CIA prison network. [Source: Gerald Herbert / Associated Press]In a speech, President Bush acknowledges a network of secret CIA prisons and announces plans to try 14 top al-Qaeda terrorist suspects in military tribunals. [Knight Ridder, 9/6/2006]
Admits Existence of Detainees in CIA Custody - Bush tells his listeners: “In addition to the terrorists held at Guantanamo, a small number of suspected terrorist leaders and operatives captured during the war have been held and questioned outside the United States, in a separate program operated by the Central Intelligence Agency.… Many specifics of this program, including where these detainees have been held and the details of their confinement, cannot be divulged.… We knew that Abu Zubaida (see March 28, 2002) had more information that could save innocent lives, but he stopped talking.… As his questioning proceeded, it became clear that he had received training on how to resist interrogation. And so the CIA used an alternative set of procedures… The procedures were tough, and they were safe, and lawful, and necessary.… These procedures were designed to be safe, to comply with our laws, our Constitution, and our treaty obligations. The Department of Justice reviewed the authorized methods extensively and determined them to be lawful. I cannot describe the specific methods used—I think you understand why.” Bush then adds that Zubaida “began to provide information on key al-Qaeda operatives, including information that helped us find and capture more of those responsible for the attacks on September 11” (see June 2002). Another high-value detainee, 9/11 planner Khalid Shaikh Mohammed (see Shortly After February 29 or March 1, 2003), provided “many details of other plots to kill innocent Americans” (see March 7 - Mid-April, 2003 and August 6, 2007). [Vanity Fair, 12/16/2008; New York Review of Books, 3/15/2009] The 14 prisoners will be put on trial as soon as Congress enacts the Military Commissions Act (MCA—see October 17, 2006), which he is sending to Congress for its approval today. [Savage, 2007, pp. 308-309]
Political Reasons to Acknowledge CIA Prisons - The US government has never officially acknowledged the existence of the CIA prisons before, despite numerous media accounts about them. Bush’s speech comes less than two months before midterm Congressional elections and also comes as the White House is preparing new legislation to legalize the CIA’s detention program and shield US officials from prosecution for possible war crimes. Knight Ridder comments that the speech “appeared to be intended to give him more leverage in his negotiations with Congress over how to try suspected terrorists.… In addition to the potential political benefits, Bush had other reasons to make the program public. A Supreme Court ruling in June struck down the administration’s plan to bring terrorist suspects before military tribunals and called into question the legality of secret CIA detentions.” [Knight Ridder, 9/6/2006]
Sites Closed Down? - Other administration officials say the CIA prison network has been closed down, at least for the time being. (In fact, it will be reopened a short time later (see Autumn 2006-Late April 2007).) Reportedly, “fewer than 100” suspects had ever been in CIA custody. It is not known who they were or what happened to all of them, but most of them reportedly were returned to their home countries for prosecution. Fourteen “high-value” suspects, including accused 9/11 mastermind Khalid Shaikh Mohammed, were transferred from the secret CIA prisons to the prison in Guantanamo, Cuba in the days just prior to Bush’s speech (see September 2-3, 2006).
Torture is 'against [US] Values' - Bush says: “I want to be absolutely clear with our people and the world: The United States does not torture. It’s against our laws, and it’s against our values. I have not authorized it—and I will not authorize it.” However, he says the Geneva Conventions’ prohibition against “humiliating and degrading treatment” could potentially cause legal problems for CIA interrogators. Other administration officials say harsh interrogation techniques such as waterboarding were used in the CIA prisons. Such techniques are considered by many to be forms of torture. Bush claims that information gleaned from interrogations in the secret prisons helped thwart attacks on the US and provided valuable information about al-Qaeda operations around the world. [Knight Ridder, 9/6/2006; Washington Post, 9/7/2006]
President Bush signs the 2007 Defense Authorization Act into law. The bill contains a provision that allows the president to more easily declare “martial law” in the US. If Bush or a successor does so, the bill gives the administration the ability to strip much of state governors’ powers over their National Guards and relegate that authority to the federal government. Congress is likely to challenge that provision in the future. The bill makes significant changes to the Insurrection Act that allows the president to invoke the Act during events such as natural disasters, and thereby suspend the 1878 Posse Comitatus Act that prevents the US military from acting in a law enforcement capacity. Senator Patrick Leahy (D-VT) says, “[W]e certainly do not need to make it easier for Presidents to declare martial law. Invoking the Insurrection Act and using the military for law enforcement activities goes against some of the central tenets of our democracy.” [US Senate, 9/19/2006] The relevant section of the bill is entitled “Use of the Armed Forces in Major Public Emergencies.” This section states that “the President may employ the armed forces, including the National Guard in Federal service, to restore public order and enforce the laws of the United States when, as a result of a natural disaster, epidemic, or other serious public health emergency, terrorist attack or incident, or other condition in any State or possession of the United States, the President determines that domestic violence has occurred to such an extent that the constituted authorities of the State or possession are incapable of… maintaining public order, in order to suppress, in any State, any insurrection, domestic violence, unlawful combination, or conspiracy.” [US Congress, 9/19/2006] GlobalResearch’s Frank Morales will write that the new law allows the federal government to, if it chooses, “commandeer guardsmen from any state, over the objections of local governmental, military, and local police entities; ship them off to another state; conscript them in a law enforcement mode; and set them loose against ‘disorderly’ citizenry….” Under the new law, the federal government may more easily order National Guard troops to round up and detain protesters, illegal aliens, “potential terrorists,” and just about anyone else, and ship them off to detention facilities. Those facilities were contracted out for construction to KBR, a subsidiary of Halliburton, in January 2006, according to the Journal of Counterterrorism and Homeland Security International, at a cost of $385 million over five years. The Journal noted that “the contract is to be executed by the US Army Corps of Engineers… for establishing temporary detention and processing capabilities to augment existing [immigration] Detention and Removal Operations (DRO)—in the event of an emergency influx of immigrants into the US, or to support the rapid development of new programs.” [GlobalResearch (.ca), 10/29/2006] Virtually no Congressional lawmakers seriously objected to the bill’s provision during debate. One of the few exceptions is Leahy, who will, six weeks later, sharply criticize the provision during debate over a separate piece of legislation. Leahy will say, “Using the military for law enforcement goes against one of the founding tenets of our democracy, and it is for that reason that the Insurrection Act has only been invoked on three—three—[occasions] in recent history. The implications of changing the Act are enormous, but this change was just slipped in the defense bill as a rider with little study. Other congressional committees with jurisdiction over these matters had no chance to comment, let alone hold hearings on, these proposals.… This is a terrible blow against rational defense policy-making and against the fabric of our democracy. Since hearing word a couple of weeks ago that this outcome was likely, I have wondered how Congress could have gotten to this point.… [I]t seems the changes to the Insurrection Act have survived… because the Pentagon and the White House want it.… Because of this rubberstamp Congress,… [w]e fail the National Guard, which expects great things from us as much as we expect great things from them. And we fail our Constitution, neglecting the rights of the States, when we make it easier for the president to declare martial law and trample on local and state sovereignty.” [US Senate, 10/29/2006]
Entity Tags: National Guard, Insurrection Act, Halliburton, Inc., GlobalResearch (.ca), George W. Bush, Frank Morales, Journal of Counterterrorism & Homeland Security International, Patrick J. Leahy, Kellogg, Brown and Root, Posse Comitatus Act
Timeline Tags: Civil Liberties
President Musharraf appeared on the Daily Show with Jon Stewart to promote his new book. [Source: Adam Rountree / AP]President Pervez Musharraf of Pakistan publishes his autobiography, In the Line of Fire, generating a number of controversies:
He speculates that Omar Saeed Sheikh, who was involved in the kidnapping and murder of Daniel Pearl (see January 23, 2002) and is said to have wired money to the 9/11 hijackers (see Early August 2001), may have been recruited by MI6 in the 1990s (see Before April 1993). The Independent will also comment, “he does not mention that British-born Omar Saeed Sheikh, who planned the Pearl abduction, had surrendered a week before his arrest was announced to a general with intelligence links who was Musharraf’s friend. What happened during that week?” [Independent, 11/21/2006]
Musharraf writes, “Those who habitually accuse us of not doing enough in the war on terror should simply ask the CIA how much prize money it has paid to the Government of Pakistan.” [Press Trust of India, 9/28/2006] However, US law forbids rewards being paid to a government. The US Justice Department says: “We didn’t know about this. It should not happen. These bounty payments are for private individuals who help to trace terrorists on the FBI’s most-wanted list, not foreign governments.” [London Times, 9/26/2006] Musharraf then backtracks and claims the Government of Pakistan has not received any money from the US for capturing people. [Press Trust of India, 9/28/2006]
He also claims that State Department Official Richard Armitage threatened that if Pakistan did not co-operate with the “war on terror,” the US would bomb it “back into the stone age” (see September 13-15, 2001).
The book does not receive good reviews. For example, the Independent calls it “self-serving and self-indulgent” and concludes that “Readers who want to understand contemporary Pakistan deserve a more honest book.” [Independent, 11/21/2006] In a review with the sub-heading “Most of Gen. Pervez Musharraf’s new book cannot be believed,” the Wall Street Journal writes, “The book is not so much an autobiography as a highly selective auto-hagiography, by turns self-congratulatory, narcissistic, and mendacious.” [Wall Street Journal, 10/19/2006]
In late September 2006, a new book by Bob Woodward reveals that CIA Director Tenet and CIA counterterrorism chief Cofer Black gave National Security Adviser Rice their most urgent warning about a likely upcoming al-Qaeda attack (see July 10, 2001 and September 29, 2006). Tenet detailed this meeting to the 9/11 Commission in early 2004 (see January 28, 2004), but it was not mentioned in the 9/11 Commission’s final report later that year. According to the Washington Post, “Though the investigators had access to all the paperwork on the meeting, Black felt there were things the commissions wanted to know about and things they didn’t want to know about.” [Washington Post, 10/1/2006] The 9/11 Commissioners initially vigorously deny that they were not told about the meeting. For instance, 9/11 Commissioner Jamie Gorelick says she checked with commission staff who told her they were never told about a meeting on that date. She says, “We didn’t know about the meeting itself. I can assure you it would have been in our report if we had known to ask about it.” [Washington Post, 9/30/2006] Commissioner Tim Roemer says, “None of this was shared with us in hours of private interviews, including interviews under oath, nor do we have any paper on this. I’m deeply disturbed by this. I’m furious.” Commissioner Richard Ben-Veniste says the meeting “was never mentioned to us.” Philip Zelikow, the executive director of the 9/11 Commission, says the commissioners and their staff had heard nothing in their private interviews with Tenet and Black to suggest that they made such a dire presentation to Rice. “If we had heard something that drew our attention to this meeting, it would have been a huge thing.” [New York Times, 10/2/2006] However, on October 3, 2006, a transcript of Tenet’s private testimony to the 9/11 Commission is leaked to reporters and clearly shows that Tenet did warn Rice of an imminent al-Qaeda threat on July 10, 2001. Ben-Veniste, who attended the meeting along with Zelikow and other staff members, now confirms the meeting did take place and claims to recall details of it, even though he, Zelikow, and other 9/11 Commissioners had denied the existence of the meeting as recently as the day before. In the transcript, Tenet says “the system was blinking red” at the time. This statement becomes a chapter title in the 9/11 Commission’s final report but the report, which normally has detailed footnotes, does not make it clear when Tenet said it. [Washington Post, 10/3/2006] Zelikow had close ties to Rice before joining the 9/11 Commission, having co-written a book with her (see March 21, 2004), and became one of her key aides after the commission disbanded (see February 28, 2005). Zelikow does not respond to requests for comments after Tenet’s transcript surfaces. [McClatchy Newspapers, 10/2/2006; Washington Post, 10/3/2006]
Congress rewrites a two-centuries-old prohibition against the president using federal troops, or state National Guard troops acting under federal control, to act as police on domestic soil. The prohibition dates back to the Insurrection Act of 1807, which stated that the only circumstance under which the president could use troops to enforce the law against US citizens is during a time of armed revolt. The ban on using troops against citizens was strengthened by the 1878 Posse Comitatus Act, which forbids any government official from using military soldiers as police without specific authorization from Congress. The new law stems from the reported lawlessness that swept New Orleans after Hurricane Katrina devastated large parts of the city. The governor of Louisiana, Democrat Kathleen Blanco, refused to allow the federal government to take over the evacuation of the city, fearing that the change would amount to martial law (see 11:00 am EDT August 25, 2005). After this rejection, and the devastation wrought in Texas by Hurricane Rita just weeks later, President Bush began discussing the idea of a new law that would allow the president to impose martial law in a region for reasons other than citizen uprisings. He called it “making the Department of Defense the lead agency” in handling emergencies such as those created by Katrina and Rita, or by another terrorist attack on the scale of 9/11. (Former Justice Department lawyer John Yoo argues that the president does not need any new laws because his inherent authority as commander in chief lets him send federal troops anywhere he likes, no matter what the law says.) A year later, Congressional Republicans slip a provision into a large military appropriations bill allowing the president to deploy federal troops as police at his discretion, regardless of the possible objections of state governors. Any situation in which the president feels the “constituted authorities of the State or possession are incapable of maintaining public order” can trigger military control of a city, county, or state at the president’s behest. Bush signs the law into effect on October 17 with virtually no debate or public discussion. [Savage, 2007, pp. 316-319]
President Bush signs the Postal Reform bill and includes a signing statement asserting that the federal government has a right to search the mail of any US citizen “for foreign intelligence collection.” While
White House spokesman Tony Snow insists that Bush is just clarifying current law, the New York Daily News reports that experts say Bush’s signing statement “is contrary to existing law and contradicted the bill he had just signed.” Nor do the lawmakers who drafted the law agree with Bush’s interpretation. “Despite the president’s statement that he may be able to circumvent a basic privacy protection, the new postal law continues to prohibit the government from snooping into people’s mail without a warrant,” says Representative Henry Waxman (D-CA), who co-sponsored the bill. Under current law, federal agents must have a search warrant to open first-class mail. Commenting on Bush’s signing statement, Ann Beeson, an attorney with the American Civil Liberties Union, remarks, “The signing statement raises serious questions whether he is authorizing opening of mail contrary to the Constitution and to laws enacted by Congress. What is the purpose of the signing statement if it isn’t that?” [New York Daily News, 1/4/2007; MSNBC, 1/5/2007]
The Electronic Frontier Foundation files a lawsuit against the Department of Homeland Security in an effort to obtain more information about a secret program called the Automated Targeting System (ATS) (see 2002 and After). This program allows the government to assign terror risk numbers to American citizens who enter or leave the US. The suit demands an expedited response to the Freedom of Information Act (FOIA) request it filed earlier in the month. Frontier Foundation Senior Counsel David Sobel says, “DHS needs to provide answers, and provide them quickly, to the millions of law-abiding citizens who are worried about this ‘risk assessment’ score that will follow them throughout their lives.” [Electronic Frontier Foundation, 12/19/2006]
The FBI requests $12 million for its proposed National Security Analysis Center (NSAC), which would mine nearly 1.5 billion records created or collected by the FBI and other government agencies in an effort to expose terrorist cells. The FBI’s budget request says that the new agency would “pro-actively” mine the data to find terrorists using “predictive” analysis. Predictive analysis entails combing though personal data—such as bank transactions and travel purchases—to identify patterns of behavior that are believed to be terrorist-like. But this methodology for identifying terrorists is unproven. In 2006, the Office of the Director of National Intelligence completed a report concluding that terrorism researchers “cannot readily distinguish the absolute scale of normal behaviors” for terrorists or ordinary Americans. [ABC News, 6/12/2007] The FBI’s proposed National Security Analysis Center is very similar to another initiative called the Total Information Awareness program (see Mid-January 2002) that was started by the Pentagon in 2002, but which was curtailed by Congress after it was revealed by the New York Times (see November 9, 2002).
Kurt Sonnenfeld (right) at Ground Zero. [Source: FEMA / Mike Reiger]Kurt Sonnenfeld, a former videographer for the Federal Emergency Management Agency (FEMA) who spent weeks at Ground Zero in New York filming the site for the agency, says he doubts the official account of the World Trade Center’s collapse and adds that US intelligence is trying to recover videotapes in his possession that it does not want the public to see. He says a large archive facility located in the World Trade Center complex was apparently emptied of its contents before the collapse, showing US intelligence knew of the attacks beforehand. [Rocky Mountain News, 5/23/2007] Sonnenfeld was one of several FEMA videographers and photographers who were given exclusive access to Ground Zero in the fall of 2001. [TVTechnology.com, 11/28/2001] His claims surface after US authorities file murder charges against him for the death of his wife in 2002. Sonnenfeld claims her death was clearly a suicide and that false charges are being used to force his return back to the United States.
Claiming to be persecuted by US agents, he is seeking political asylum in Argentina. [Rocky Mountain News, 6/14/2002; Rocky Mountain News, 6/14/2002; Rocky Mountain News, 5/23/2007] He will later detail his claims in a Spanish-language book entitled The Persecuted. [Sonnenfeld, 2009]
Fort Dix plot suspects. [Source: NBC]Six Muslim men are arrested in Cherry Hill, New Jersey, and accused of plotting to attack the Army’s Fort Dix in New Jersey and massacre scores of US soldiers. FBI agent J. P. Weiss says “Today we dodged a bullet. In fact, when you look at the type of weapons that this group was trying to purchase, we may have dodged a lot of bullets.” The FBI says the men had formed a “platoon” and had performed documented reconnaissance of their target. Although no evidence is uncovered linking the men to international terrorist organizations, including al-Qaeda, several of the men were willing to kill and die “in the name of Allah” according to court records. [Washington Post, 5/8/2007] Officials characterize the plot as “homegrown” and still in the planning stages. They state that no attack was imminent. [CBS News, 5/8/2007] The plotters are characterized as self-directed terrorist sympathizers. US Attorney Christopher J. Christie says, “Unlike other cases we’ve done, there was no clear ringleader. They all seemed to feed off each other. They were clearly guys turning to this element for inspiration. They wanted to be jihadists.” [Washington Post, 5/9/2007] The men are identified as ethnic Albanian Yugoslavian illegal immigrants Dritan Duka, his brothers Eljvir Duka and Shain Duka, legal Turkish immigrant Serdar Tartar, and US citizens Mohamad Ibrahim Shnewer and Agron Abdullah. [Hurriyet, 5/8/2007] The FBI was first made aware of the alleged plot in January 2006. An unidentified Circuit City store clerk alerted police to a video that showed the men firing assault weapons, calling for jihad and yelling “God is great” in Arabic, according to officials. The video had been taken into the store in order to be transferred to DVD. The video came from firearms training in the Poconos, according to the indictment. [Washington Post, 5/9/2007] The FBI managed to implant an informant in the group of friends. This informant discovered 50 loaded 9mm magazines in Tartar’s car. [Hurriyet, 5/8/2007] Another informant infiltrated the group and was told of the plans to attack military installations. Shnewer was recorded as saying, “My intent is to hit a heavy concentration of soldiers… This is exactly what we are looking for. You hit four, five or six Humvees and light the whole place [up] and retreat completely without any losses.” [US Department of Justice, 5/8/2007 ] The men allegedly possessed jihadist videos and documents, including copies of the last will and testament of two of the 9/11 hijackers. [US Department of Justice, 5/8/2007 ] The target was allegedly decided by information gathered by one of the men, Tartar, who had access to Fort Dix from a job delivering pizzas there. [Hurriyet, 5/8/2007] The men are arrested when they attempt to buy AK-47s, M-16s, and other weapons from yet another FBI informant. [Washington Post, 5/8/2007] Most face possible life sentences. [Washington Post, 5/9/2007]
President Bush issues a classified presidential directive updating the nation’s secretive post-disaster “National Continuity Policy.” The highly classified Continuity of Government (COG) and Continuity of Operations (COOP) plans are designed to keep the government functioning in times of national emergency. Bush’s presidential directive, officially titled National Security Presidential Directive 51 (NSPD-51)/Homeland Security Presidential Directive 20 (HSPD-20), is described by the Boston Globe as a “special kind of executive order that can be kept secret.” The non-classified portion of the directive is posted quietly on the White House website, with no explanation. The document states, “It is the policy of the United States to maintain a comprehensive and effective continuity capability composed of Continuity of Operations and Continuity of Government programs in order to ensure the preservation of our form of government.” The directive orders executive branch officials to establish a wide range of special protocols to keep the government running during an emergency. The directive stresses the importance of relocating to alternative facilities, delegating powers to emergency leaders, and securing and allocating the nation’s vital resources. According to NSPD-51, the special emergency plans should be ready to go at a moment’s notice, and incorporated into the daily operations of all executive departments and agencies. The special emergency protocols are designed for any “catastrophic emergency,” which NSPD-51 defines as “any incident, regardless of location, that results in extraordinary levels of mass casualties, damage, or disruption severely affecting the US population, infrastructure, environment, economy, or government functions.” Incidents falling into this category would not be limited to hostile attacks, the document makes clear, but would also include “localized acts of nature” and “accidents.” The new plan centralizes post-disaster planning in the White House, and appears to limit the powers of the legislative and judicial branches in times of emergency. The directive creates the position of national continuity coordinator, which is to be held by the assistant to the president for homeland security and counterterrorism. The secretary of homeland security and the national continuity coordinator are to oversee the development and implementation of the continuity plans. [Washington Post, 5/10/2007; US President, 5/14/2007 ; Progressive, 5/18/2007; Boston Globe, 6/2/2007]
Conservative Commentators Warn of 'Dictatorial Powers' - Conservative commentator Jerome Corsi says the directive appears to give the president a legal mechanism to seize “dictatorial powers” since it would not require consultation with Congress about when to invoke emergency powers, or when to relinquish them. It is also noted that the new plan does not explicitly acknowledge the National Emergencies Act, which gives Congress the authority to override the president’s determination that a national emergency still exists. James Carafano, a homeland security specialist at the Heritage Foundation, says that the lack of an explanation for the unexpected directive is “appalling.” [Boston Globe, 6/2/2007]
Addressing interior ministers of the six US-allied Gulf Cooperation Council (GCC), Saudi Interior Minister Prince Nayef bin Abdul-Aziz says that Iraq has become a security threat for the whole Middle East. “The security situation in Iraq is deteriorating and terrorism is growing there. Iraq has become fertile ground for creating a new generation of terrorists learning and practicing all forms of murder and destruction,” he says. “The lax security situation in Iraq bears great dangers for our region and stability in our countries.” [Daily Times (Lahore), 5/22/2007]
The Transactional Records Action Clearinghouse (TRAC), a data research organization affiliated with Syracuse University, has discovered that terrorism claims formed less that 0.01 percent of immigration court charges filed by the Department of Homeland Security (DHS). The immigration court records were obtained under the Freedom of Information Act. Of 814,073 cases brought to the immigration courts by the DHS, 12, or 0.0015 percent, were for charges of terrorism. In addition, 114 cases, or 0.014 percent, concerned individuals charged with national security violations. TRAC spokesman David Burnham says, “The DHS claims it is focused on terrorism. Well that’s just not true. Either there’s no terrorism, or they’re terrible at catching them. Either way it’s bad for all of us.” TRAC further claims that there exists an “apparent gap between DHS rhetoric about its role in fighting terrorism and what it actually has been doing.” DHS spokesman Russ Knocke calls the TRAC report “ill-conceived” and said the group “lack[s] a grasp of the DHS mission.” The DHS claims that any clampdown on immigration decreases the likelihood of terrorists entering the US. [CNN, 5/27/2007]
Roslynn Mauskopf. [Source: US Department of Justice]US Attorney Roslynn Mauskopf describes a recently foiled alleged terror plot to blow up John F. Kennedy Airport in New York City as “one of the most chilling plots imaginable.” She claims it “could have resulted in unfathomable damage, deaths, and destruction.” But one unnamed law enforcement official with Mauskopf at her press conference will later say he cringed at the description. Newsday will later relate, “The plot, he knew, was never operational. The public had never been at risk. And the notion of blowing up the airport, let alone the borough of Queens, by exploding a fuel tank was in all likelihood a technical impossibility.” Michael Greenberger, director of the Center for Health and Homeland Security at the University of Maryland, says, “It was a totally overstated characterization that doesn’t comport with the facts.…there’s a pattern here of Justice Department attorneys overstating what they have.” [Newsday, 6/6/2007] Safety experts have criticize the government’s description of the plot’s danger. John Goglia, a former member of the US National Transportation Safety Board, describes the plot as a “fantasy,” saying “You could definitely reach the tank, definitely start a fire, but to get the kind of explosion they were thinking they were going to get… this is virtually impossible to do.” Jake Magish, an engineer with Supersafe Tank Systems, says “The fantasy I’ve heard about people saying, ‘They will blow the tank and destroy the airport’, is nonsense.” The Department of Homeland Security and the Transportation Security Administration comes under fire from aviation expert Michael Boyd, who states that these organizations are “not run by security professionals…[they are] run by political appointees.” [MSNBC, 6/4/2007] In addition, the plotters lacked the explosives and financial resources to carry out the attack. Four alleged Islamic radicals have been charged with conspiracy to cause an explosion at the airport and three of them have been arrested. [The Australian, 6/6/2007] Newsday calls the plot’s alleged mastermind Russell Defreitas “hapless and episodically homeless.” [Newsday, 6/6/2007]
The FBI terrorist watch list now includes over half a million names, which civil liberties advocates say limits its usefulness. Although the actual content of the list is classified, the FBI’s 2008 budget request refers to “the entire watch list of 509,000 names,” which is utilized by its Foreign Terrorist Tracking Task Force. It is common for many names on the list to be associated with one individual. The FBI foreign and domestic terror watch list, combined with the interagency National Counterterrorism Center’s (NCTC) list of suspected international terrorists, comprise the watch list used by federal security screening personnel on the lookout for terrorists. The NCTC refuses to reveal how many US citizens are on the list (see February 15, 2006). ACLU senior legislative counsel Tim Sparapani says the FBI watch list “grows seemingly without control or limitation. If we have 509,000 names on that list, the watch list is virtually useless.” Internal reviews of the list by the US Terrorist Screening Center have previously found the list to be incomplete and inaccurate (see June 14, 2005). Reviews of versions of the list reveal the names of US lawmakers; former Iraqi leader Saddam Hussein, imprisoned at the time of review; al-Qaeda member Zacarias Moussaoui, also imprisoned; and 14 of the 19 9/11 hijackers, all deceased (see March 2006). [ABC News (The Blotter), 6/13/2007]
Henry Waxman (D-CA), the chairman of the House Oversight Committee, writes to Vice President Cheney demanding an explanation for his decision not to comply with executive orders (see 2003). Cheney’s office, like other executive branch entities, is required to annually report on the amount of documents it is classifying, and how those documents are being kept secure. The annual requests are made in pursuance of an executive order, last updated by President Bush in 2003. The order states that it applies to any “entity within the executive branch that comes into the possession of classified information.” Cheney has justified the decision by saying that because the Vice President is also the president of the Senate, the vice president’s office is not strictly a part of the executive branch, and therefore is not subject to the president’s executive orders; he cites as evidence his Constitutional role as a tie breaker in the Senate. Waxman writes, “Your decision to exempt your office from the President’s order is problematic because it could place national security secrets at risk. It is also hard to understand given the history of security breaches involving officials in your office.” Waxman’s point is that, if Cheney’s office is not part of the executive branch, then it is not authorized to view many of the classified documents it routinely receives; therefore the viewing of these documents by Cheney and his officials constitutes a breach of security. Waxman writes, “I question both the legality and the wisdom of your actions. In May 2006, an official in your office [Leandro Aragoncillo] pled guilty to passing classified information to individuals in the Philippines [as part of a plot to overthrow President Gloria Macapagal Arroyo… Aragoncillo reportedly disclosed numerous secret and top secret documents to Philippine officials over several years while working in your office.… In March 2007, your former chief of staff, Lewis ‘Scooter’ Libby, was convicted of perjury, obstruction of justice, and false statements for denying his role in disclosing the identity of a covert CIA agent (see November 20, 2007). In July 2003, you reportedly instructed Mr. Libby to disclose information from a National lntelligence Estimate to Judith Miller, a former New York Times reporter. This record does not inspire confidence in how your office handles the nation’s most sensitive security information. Indeed, it would appear particularly irresponsible to give an office with your history of security breaches an exemption from the safeguards that apply to all other executive branch officials.… Your office may have the worst record in the executive branch for safeguarding classified information.” Waxman notes that Cheney’s office is notorious for declassifying information for purely political reasons, as in the Libby case. Waxman concludes, “Given this record, serious questions can be raised about both the legality and the advisability of exempting your office from the rules that apply to all other executive branch officials.” [Congress Committee On Oversight And Government Reform, 6/21/2007; New York Times, 6/22/2007] The next day, when asked what he believes about Cheney’s position, Senate Majority Leader Harry Reid will quip, “I always thought that he was president of this administration.” [Cox News Service, 6/22/2007] Five days later, Waxman will say, “I know the vice president wants to operate with unprecedented secrecy, but this is absurd. This order is designed to keep classified information safe. His argument is really that he’s not part of the executive branch, so he doesn’t have to comply.… He doesn’t have classified information because of his legislative function. It’s because of his executive function.” [New York Times, 6/22/2007]
Muhammad Naeem Noor Khan. [Source: Agence France-Presse / Getty Images]Muhammad Naeem Noor Khan, an al-Qaeda computer expert, is released in Pakistan. He had been arrested in July 2004 (see July 13, 2004) and was quickly turned, sending out e-mails to help out dozens of al-Qaeda operatives around the world before his name was leaked to the press (see July 24-25, 2004 and August 2, 2004). He was held for three years by Pakistan’s intelligence agencies. He was never charged with any crime and apparently there are no plans to charge him in the future. He is said to be living with his parents in Karachi, Pakistan. He is being closely monitored and the media is not allowed to speak with him. US and British officials and analysts express dismay at Noor Khan’s quick release. Seth Jones of the Rand Corporation says, “I find it strange and baffling.… He presents a major threat to the West.” [Guardian, 8/23/2007] Former counterterrorism “tsar” Richard Clarke says, “Khan may have bargained for an early release because he cooperated.” [ABC News, 8/21/2007] But his release also comes at a time when Pakistan’s judiciary is releasing dozens of suspected Islamic militants and government critics who have been held without trial. This is seen as a sign of President Pervez Musharraf’s eroding influence after public protests forced him to reinstate Pakistan’s chief justice. [London Times, 8/23/2007] One former intelligence official says that Khan’s case is a “murky tale” in which there are “no clear answers.” [Guardian, 8/23/2007]
The Transportation Security Agency (TSA) issues a national security bulletin based on four recent incidents in San Diego, Milwaukee, Houston, and Baltimore. The bulletin creates the impression of imminent terrorist plots targeting the aviation sector. The TSA warns that terrorists are testing the possibility of smuggling bomb components on to an airplane. TSA spokeswoman Ellen Howe says the agency has noticed an increase in unusual items in checked and carry-on luggage, including “wires, switches, cell phone components, and dense clay-like substances” - including a block of cheese. [International Herald Tribune, 7/25/2007] The incidents all turn out to have innocent explanations. On July 27, Brian Todd of CNN reports “That bulletin for law enforcement eyes only told of suspicious items recently found in passenger’s bags at airport checkpoints, warned that they may signify dry runs for terrorist attacks… it turns out none of that is true.” One such case was that of Sara Weiss, who was detained in San Diego after two ice packs covered in tape and containing clay were allegedly found in her baggage. Weiss, who works for a faith-based organization, was also carrying a survey about Muslim Americans. Weiss says she was held for three hours and questioned by San Diego Harbor Police and two other men who did not identify themselves. She says she was asked if she knew Osama bin Laden, which she described as “a ridiculous question.” Todd reports “The FBI now says there were valid explanations for all four incidents in that bulletin, and a US government official says no charges will be brought in any of these cases.” The FBI maintains “they were right” in putting the bogus reports on the TSA bulletin, which is distributed to law enforcement agencies nationwide. The TSA says that security officers must be trained in identifying suspicious packages, even when those packages turn out to be innocuous. [CNN, 7/27/2007] Defense for the TSA bulletin comes from a number of sources. “This is what TSA should be doing whether it turns out to be a whole bunch of harmless coincidences or part of a plot,” says James Carafano, a security expert at the conservative Heritage Foundation who in the past called for TSA’s abolition. House Homeland Security Committee Chairman Rep. Bennie Thompson, also a critic of the TSA, agrees the agency is handling this appropriately: “To stay ahead of potential threats to our aviation system it must use all of the intelligence available as part of its daily operations.” However, the bulletin is questioned by San Diego Harbor Police Chief Kirk Sanfilippo who says officers found two ice packs wrapped in clear tape, not duct tape, and there was no clay inside. “It was not a threat. It was not a test run,” Sanfilippo says. “The whole thing was very explainable and understandable.” [International Herald Tribune, 7/25/2007] He characterizes the bulletin as “a little bit off.” Local TSA Security Director and chief of the airport police Michael J. Aguilar says it was quickly determined the ice packs contained the usual blue gel. Aguilar says he doesn’t know why the TSA memo, issued in Washington, reported the substance as clay. [San Diego Union-Tribune, 7/25/2007]
Entity Tags: Heritage Foundation, CNN, Brian Todd, Bennie Thompson, Federal Bureau of Investigation, Transportation Security Agency, Sara Weiss, James Carafano, House Homeland Security Committee, Kirk Sanfilippo, Ellen Howe, Michael J. Aguilar, San Diego Harbor Police
Timeline Tags: Complete 911 Timeline
FBI agents raid the home of former Justice Department prosecutor Thomas Tamm, who is suspected of leaking information to the New York Times regarding the Bush administration’s warrantless wiretapping program (see Spring 2004 and December 15, 2005). Tamm previously worked in the Justice Department’s Office of Intelligence Policy and Review (OIPR), which oversees surveillance of terrorist and espionage suspects. The FBI agents seize Tamm’s computer as well as those of his three children and a store of personal files. They also take some of his books (including one on famed Watergate whistleblower “Deep Throat” (see May 31, 2005), and even the family’s Christmas card list. Tamm is not home when the raid is staged, so the agents sit his wife and children around the kitchen table and grill them about Tamm’s activities. His oldest son, Terry, will later recall: “They asked me questions like ‘Are there any secret rooms or compartments in the house’? Or did we have a safe? They asked us if any New York Times reporters had been to the house. We had no idea why any of this was happening.” The raid is part of a leak probe ordered by President Bush (see December 30, 2005). James X. Dempsey of the Center for Democracy and Technology calls the decision to stage the raid “amazing,” and says it shows the administration’s misplaced priorities: using FBI agents to track down leakers instead of processing intel warrants to close the gaps. [Newsweek, 8/2007; Newsweek, 12/22/2008] In late 2008, Tamm will reveal to Newsweek that he is one source for the Times articles (see December 22, 2008). At the time of the raid, his family has no idea that he knows anything about the wiretapping program, or that he has spoken to reporters. [Newsweek, 12/22/2008]
During the Senate debate over the controversial Protect America Act (see August 5, 2007), Minority Leader Trent Lott (R-MS) says that the threat from terrorism is so dire, and so imminent, that lawmakers should pass the law and then get out of Washington as soon as they can to save their own lives. (Congress goes into recess in a few days.) Lott says that Congress needs to pass the PAA, otherwise, “the disaster could be on our doorstep.” He continues, “I think it would be good to leave town in August, and it would probably be good to stay out until September the 12th.” Lott provides no information about any predictions of an imminent terrorist attack on Washington or anywhere else. [Roll Call, 8/2/2007]
Congressional Democrats attempt to short-circuit the Protect America Act (see August 5, 2007) currently under debate. They introduce their own bill, the Improving Foreign Intelligence Surveillance to Defend the Nation and the Constitution Act, that would address the administration’s concerns that the Foreign Intelligence Surveillance Act imposed unwieldy limitations on the NSA’s ability to electronically monitor foreign communications that were transmitted through communications networks inside the US. The Democrats’ bill redefines “electronic surveillance” to allow the NSA to monitor such communications without a FISA warrant if it “reasonably believes” the targets of those communications to be outside the US. This would give the NSA new surveillance powers, so the Democrats’ bill provides for oversight by the FISA Court, audits by the Justice Department’s Inspector General, and restrictions on domestic surveillance. However, the Bush administration does not want the bill to become law. President Bush announces that he opposes the bill, and threatens to hold Congress in session past its August adjournment date until he can get the Protect America Act passed. The Democrats’ bill dies before ever coming up for a full vote in Congress. [US House of Representatives, 8/3/2007 ; Slate, 8/6/2007]
The Center for National Security Studies (CNSS) issues a warning about the Protect America Act (PAA—see August 5, 2007). The PAA lets the NSA conduct warrantless surveillance against US citizens “without any meaningful judicial oversight,” the CNSS writes, and gives the NSA almost unlimited access to almost all international communications that originate in, pass through, or terminate with a US citizen, again without oversight. According to the CNSS, the administration refused to countenance any suggestion that the NSA should be restricted to focusing on foreigners, terrorist targets, or conducting surveillance that could be construed as necessary to national security, as well as refusing to allow any meaningful judicial or Congressional oversight. [Center for National Security Studies, 8/5/2007]
Mitch McConnell. [Source: US Senate]President Bush signs the controversial Protect America Act (PAA) into law. The bill, which drastically modifies the Foreign Intelligence Surveillance Act (FISA) of 1978 (see 1978), was sponsored by two Senate Republicans, Mitch McConnell (R-KY) and Christopher Bond (R-MO), but written by the Bush administration’s intelligence advisers. [US Senate, 8/5/2007; Washington Post, 8/5/2007] It passed both houses of Congress with little debate and no hearings (see August 1-4, 2007). “This more or less legalizes the NSA [domestic surveillance] program,” says Kate Martin, director of the Center for National Security Studies. [New York Times, 8/6/2007] Slate’s Patrick Radden Keefe adds ominously, “The Foreign Intelligence Surveillance Act is now dead, and it’s never coming back.” [Slate, 8/6/2007] The PAA expires in six months, the only real concession Congressional Democrats were able to secure. Though the Bush administration and its allies in Congress insist that the law gives the government “the essential tools it needs” to conduct necessary surveillance of foreign-based terrorists while protecting Americans’ civil liberties, many Democrats and civil liberties organizations say the bill allows the government to wiretap US residents in communication with overseas parties without judiciary or Congressional oversight. Bush calls the bill “a temporary, narrowly focused statute to deal with the most immediate shortcomings in the law” that needs to be expanded and made permanent by subsequent legislation. The administration says that the lack of judiciary oversight in the new law will be adequately covered by “internal bureaucratic controls” at the National Security Agency. [Associated Press, 8/5/2007; Washington Post, 8/5/2007]
Reining in FISA - The PAA allows FISA to return “to its original focus on protecting the rights of Americans, while not acting as an obstacle to conducting foreign intelligence surveillance on foreign targets located overseas.” Before the PAA, the White House says, FISA created unnecessary obstacles in allowing US intelligence to “gain real-time information about the intent of our enemies overseas,” and “diverted scarce resources that would be better spent safeguarding the civil liberties of people in the United States, not foreign terrorists who wish to do us harm.” The PAA no longer requires the government to obtain FISA warrants to monitor “foreign intelligence targets located in foreign countries” who are contacting, or being contacted by, US citizens inside US borders. FISA will continue to review the procedures used by US intelligence officials in monitoring US citizens and foreign contacts by having the attorney general inform the FISA Court of the procedures used by the intelligence community to determine surveillance targets are outside the United States.”
Allows Third Parties to Assist in Surveillance, Grants Immunity - The PAA also allows the director of national intelligence and the attorney general to secure the cooperation of “third parties,” particularly telecommunications firms and phone carriers, to “provide the information, facilities, and assistance necessary to conduct surveillance of foreign intelligence targets located overseas.” It provides these firms with immunity from any civil lawsuits engendered by such cooperation.
Short Term Legislation - The White House says that Congress must pass further legislation to give telecommunications firms permanent and retroactive immunity against civil lawsuits arising from their cooperation with the government’s domestic surveillance program. [White House, 8/6/2006]
Temporary Suspension of the Constitution? - Representative Rush Holt (D-NJ), a member of the House Intelligence Committee, says: “I’m not comfortable suspending the Constitution even temporarily. The countries we detest around the world are the ones that spy on their own people. Usually they say they do it for the sake of public safety and security.” [Washington Post, 8/5/2007]
Entity Tags: Christopher (“Kit”) Bond, National Security Agency, Foreign Intelligence Surveillance Act, George W. Bush, Foreign Intelligence Surveillance Court, Mitch McConnell, Al-Qaeda, Terrorist Surveillance Program, Kate Martin, Patrick Radden Keefe, Rush Holt, Protect America Act
Timeline Tags: Civil Liberties
The American Civil Liberties Union registers bitter disapproval of the newly passed Protect America Act (see August 5, 2007), which it disparagingly labels the “Police America Act.” It writes: “[The act] allows for massive, untargeted collection of international communications without court order or meaningful oversight by either Congress or the courts. It contains virtually no protections for the US end of the phone call or email, leaving decisions about the collection, mining and use of Americans’ private communications up to this administration.” The Attorney General can issue warrants for domestic surveillance of international communications without court review, and can order surveillance of people outside of the US for a year, all without any review by the FISA Court. The PAA “cut[s FISA] out of the process, leaving the executive branch unchecked.” Any telephone or e-mail communications from US citizens “caught up in the dragnet” can be examined at the government’s leisure, the ACLU says, without any privacy considerations or respect for Constitutional rights. The law leaves “the administration to decide how to collect, store, datamine and use Americans’ private communications.” The ACLU says that the court review provisions of the PAA are a sham. The Attorney General need not explain how US citizens’ communications are handled once they are intercepted. The FISA Court “will have no information about how extensive the breach of American privacy is, nor the authority to remedy it.” The provisions for Congressional oversight are equally meaningless, the ACLU says, because the Attorney General is not required to disclose any information about what domestic communications the government has intercepted or what is being done with those intercepts. [American Civil Liberties Union, 8/7/2007]
Ryan Singel. [Source: Wired]According to Ryan Singel of Wired, the new Protect America Act (PAA—see August 5, 2007) gives the Bush administration “the power to order the nation’s communication service providers—which range from Gmail, AOL IM, Twitter, Skype, traditional phone companies, ISPs, internet backbone providers, Federal Express, and social networks—to create possibly permanent spying outposts for the federal government.” He adds: “These outposts need only to have a ‘significant’ purpose of spying on foreigners, would be nearly immune to challenge by lawsuit, and have no court supervision over their extent or implementation. Abuses of the outposts will be monitored only by the Justice Department, which has already been found to have underreported abuses of other surveillance powers to Congress.” In addition, Singel says the PAA redefines any monitoring of US citizens’ telephone and Internet communications “reasonably believed” to be outside the country as not surveillance, allows telecommunications firms to target both foreign and domestic parties for surveillance, and forces those firms to give assistance in secret, without informing Congress or the targeted parties. [Wired News, 8/6/2007]
Aziz Huq. [Source: American Prospect]Aziz Huq, an author and the director of the Brennan Center for Justice at New York University, writes that the Protect America Act (PAA-see August 5, 2007) came about as a result of what he calls “the most recent example of the national security waltz, a three-step administration maneuver for taking defeat and turning it into victory.” Step one is a court defeat for the administration, for example regarding detainees at Guantanamo (see June 28, 2004), or the overruling of military commissions in 2006 (see June 30, 2006). The second step, which comes weeks or months later, is an announcement that the ruling has created a security crisis and must be “remedied” through immediate legislation. The third and final step is the administration pushing legislation through Congress, such as the Detainee Treatment Act (see December 15, 2005) or the Military Commissions Act, that, Huq writes, “not only undoes the good court decision but also inflicts substantial damage to the infrastructure of accountability.”
Step One: FISC Refuses to Approve NSA's Surveillance Program - In January 2007, the administration announced that it was submitting the NSA’s domestic surveillance program to the Foreign Intelligence Surveillance Court (FISC), the secret court that issues FISA warrants for surveillance (see May 1, 2007). This was due to pending court cases threatening to rule the program in violation of FISA and the Fourth Amendment; the administration wanted to forestall, or at least sidestep, those upcoming rulings. In June, FISC refused to approve parts of the NSA program that involved monitoring overseas communications that passed through US telecom switches. Since a tremendous amount of overseas communications are routed through US networks, this ruling jeopardized the NSA’s previous ability to wiretap such communications virtually at will without a warrant. The administration objected to the NSA having to secure such warrants.
Step Two: The Drumbeat Begins - Months later, the drumbeat for new legislation to give the NSA untrammeled rights to monitor “overseas” communications, which not only traveled through US networks, but often began or ended with US citizens, began with appearances in the right-wing media by administration supporters, where they insisted that the FISC ruling was seriously hampering the NSA’s ability to garner much-needed intelligence on terrorist plots against the US. The White House and Congressional Republicans drafted legislation giving the NSA what it wanted, and presented it during the last week of the Congressional session, minimizing the time needed for scrutiny of the legislation as well as reducing the time available for meaningful debate.
Step Three: Passing a Law With Hidden Teeth - The legislation that would become the Protect America Act was carefully written by Bush officials, and would go much farther than giving the NSA the leeway it needed to wiretap US citizens. Instead, as Huq writes, “the Protect America Act is a dramatic, across-the-board expansion of government authority to collect information without judicial oversight.” Democrats believed they had negotiated a deal with the administration’s Director of National Intelligence, Mike McConnell, to limit the law to addressing foreign surveillance wiretaps, but, Huq writes, “the White House torpedoed that deal and won a far broader law.” The law removes any real accountability over domestic surveillance by either Congress or the judiciary. Former CIA officer Philip Giraldi says that the PAA provides “unlimited access to currently protected personal information that is already accessible through an oversight procedure.” The law is part of the administration’s continual attempts to “eviscerat[e]” the checks and balances that form the foundation of US democracy.
Ramifications - The law includes the provision that warrantless surveillance can be “directed at a person reasonably believed to be located outside of the United States.” Huq writes that this is a tremendously broad and vague standard that allows “freewheeling surveillance of Americans’ international calls and e-mails.” He adds: “The problem lies in the words ‘directed at.’ Under this language, the NSA could decide to ‘direct’ its surveillance at Peshawar, Pakistan—and seize all US calls going to and from there.… Simply put, the law is an open-ended invitation to collect Americans’ international calls and e-mails.” The law does not impose any restrictions on the reason for surveillance. National security concerns are no longer the standard for implementing surveillance of communications. And the phrase “reasonably believe” is uncertain. The provisions for oversight are, Huq writes, “risibly weak.” Surveillance need only be explained by presentations by the Director of National Intelligence and the Attorney General to FISC, which has little room to invalidate any surveillance, and furthermore will not be informed of any specific cases of surveillance. As for Congress, the Attorney General only need inform that body of “incidents of noncompliance” as reported by the administration. Congress must rely on the administration to police itself; it cannot demand particulars or examine documentation for itself. The law expires in six months, but, Huq notes, that deadline comes up in the middle of the 2008 presidential campaign, with all the pressures that entails. And the law allows “the NSA to continue wielding its new surveillance powers for up to a year afterward.” The law, Huq writes, “does not enhance security-related surveillance powers. Rather, it allows the government to spy when there is no security justification. And it abandons all but the pretense of oversight.” [Nation, 8/7/2007]
Former Nixon White House counsel John Dean considers the newly passed Protect America Act (PAA—see August 5, 2007) a dire threat to American civil liberties. Dean writes that the ire of rank-and-file Democrats with their Congressional leadership is well earned, that the Democrats meekly lined up and voted it into law after some pro forma protestations. Dean notes that editorialists from around the country, and organizations as politically disparate as the ACLU (see August 6, 2007), the Cato Institute, and the John Birch Society (see March 10, 1961 and December 2011) all agree that the new law is a serious threat to civil liberties. They all agree that the law violates the Fourth Amendment while at the same time hides its operations under the rubric of national security secrecy. Dean notes, “Congress was not even certain about the full extent of what it has authorized because President Bush and Vice President Cheney refused to reveal it.”
Executive Power Grab - Dean writes that as much of a threat as the PAA is to citizens’ privacy, it is more threatening because it is another step in the Bush administration’s push for enhancing the powers of the executive branch at the expense of the legislative and judiciary branches, a move towards a so-called “unitary executive.” Bush and Cheney have worked relentlessly “to weaken or eliminate all checks and balances constraining the executive,” Dean writes, pointing to “countless laws enacted by the Republican-controlled Congresses during the first six years of the administration, and in countless signing statements added by the president interpreting away any constraints on the Executive.” The new law “utterly fails to maintain any real check on the president’s power to undertake electronic surveillance of literally millions of Americans. This is an invitation to abuse, especially for a president like the current incumbent.”
Repairing the Damage - Dean is guardedly optimistic about the Democrats’ stated intentions to craft a new law that will supersede the PAA, which expires in February 2008, and restore some of the protections the PAA voids. Any such legislation may be quickly challenged by the Bush administration, which wants retroactive legislative immunity from prosecution for both US telecommunications firms cooperating with the government in monitoring Americans’ communications, and for government officials who may have violated the law in implementing domestic surveillance. Dean writes: “[B]efore Congress caved and gave Bush power to conduct this surveillance, he and telecommunication companies simply opted to do so illegally. Now, Bush will claim, with some justification, that because Congress has now made legal actions that were previously illegal, it should retroactively clear up this nasty problem facing all those who broke the law at his command.” Dean writes that Democrats need only do one thing to “fix [this] dangerous law: [add] meaningful accountability.” He continues: “They must do so, or face the consequences. No one wants to deny the intelligence community all the tools it needs. But regardless of who sits in the Oval Office, no Congress should trust any president with unbridled powers of surveillance over Americans. It is not the way our system is supposed to work.” [FindLaw, 8/10/2007]
A secret US government document from this month called the “Joint Task Force Guantanamo Matrix of Threat Indicators for Enemy Combatants” calls the ISI, Pakistan’s intelligence agency, a terrorist organization. The ISI is listed with al-Qaeda, Hamas, and Hezbollah as threats. The document is meant for interrogators at the Guantanamo prison who are trying to determine which detainees to release. It suggests that any link to any of these groups is an indication of terrorist activity, and evidence the detainee poses a future threat. The US has never officially declared the ISI a terrorist group, suggesting its public posture differs from its private one for political reasons. After this and other Guantanamo documents are leaked to The Guardian in 2011, The Guardian will report: “The revelation that the ISI is considered as much of a threat as al-Qaeda and the Taliban will cause fury in Pakistan. It will further damage the already poor relationship between US intelligence services and their Pakistani counterparts, supposedly key allies in the hunt for Osama bin Laden and other Islamist militants in south Asia.” The newspaper will further note that although the document is from 2007, it is unlikely the ISI’s status at Guantanamo has changed by 2011. Other Guantanamo documents leaked to The Guardian describe instances where the ISI helped US efforts, but also instances where the ISI was seen helping Islamist militants. [Guardian, 4/25/2011]
Donald Kerr, the principal deputy director of national intelligence, tells a conference of intelligence officials that the government needs new rules about how to balance privacy rights and investigative needs. Since many people routinely post details of their lives on social-networking sites such as MySpace, he says, their identity should not require the same protection as in the past. Instead, only their “essential privacy,” or “what they would wish to protect about their lives and affairs,” should be veiled. Commenting on the speech, the Wall Street Journal will say that this is part of a project by intelligence agencies “to change traditional definitions of how to balance privacy rights against investigative needs.” [Office of the Director of National Intelligence, 10/23/2007 ; Wall Street Journal, 3/10/2008] According to some accounts, the prime repository of information about US citizens that the government has is a database known as Main Core, so if the government collected more information about citizens, the information would be placed in or accessed through this database (see 1980s or Before).
The house of Bruce Ivins. [Source: Rob Carr / Associated Press]The FBI suspects that Bruce Ivins, a scientist working at USAMRIID, the US Army’s top biological laboratory, was behind the 2001 anthrax attacks (see October 5-November 21, 2001). His home is searched by the FBI, but no report of this makes the newspapers. On the same day, USAMRIID cuts off his access to the laboratories where biological agents and toxins are used and stored. However, he continues to work at USAMRIID without such access until July 2008, when he will be completely banned from the lab (see July 10, 2008). [Herald-Mail, 8/8/2008] According to McClatchy Newspapers, his lab access is apparently reinstated some time after this date. [McClatchy Newspapers, 8/7/2008]
Former Pakistani Prime Minister Benazir Bhutto gives an interview to David Frost of Al Jazeera in which she makes a number of noteworthy statements:
She says that Saeed Sheikh is “the man who murdered Osama bin Laden.” Saeed helped kidnap Wall Street Journal reporter Daniel Pearl, who was later murdered (see January 23, 2002), is said to have provided money for the 9/11 hijackings (see Early August 2001), and is thought to have been in prison in Pakistan since 2002 (see February 12, 2002). Although bin Laden is thought to be alive at this time (see October 22, 2007), Frost does not ask a follow-up question about bin Laden’s alleged demise. [Al Jazeera, 11/2/2007] When a video of the interview is posted at the BBC’s website, this section is initially edited out, as the editor thinks Bhutto must simply have misspoken. However, the BBC accepts this was an error and later posts a full version of the interview. [BBC, 4/1/2008] This is the only known occasion that Bhutto makes this claim.
Based on information from a “friendly country,” she names four people and/or organizations that might attack her: al-Qaeda linked warlord Baitullah Mahsud; Hamza bin Laden, son of Osama; the “Pakistan Taliban in Islamabad”; and an unnamed group in Karachi.
While she thinks that such groups may be used for an attack on her, they are not pulling the strings, she says. She suggests three people may be behind an attack by one of the groups. The reason these three are said to want her dead is because she could stop the rise of terrorism in Pakistan. One of the three is former ISI officer Ijaz Shah, a “very key figure in security,” who she thinks has turned a blind eye or even colluded with militants, and who is an associate of Saeed Sheikh (see February 5, 2002). [Al Jazeera, 11/2/2007] Shah, a government official, will actually be in charge of protecting Bhutto from assassination when she is assassinated. The names of the other two said to be “pulling the strings” are not certain, but they are a prominent Pakistani figure, one of whose family members was allegedly murdered by a militant group run by Bhutto’s brother, and a well-known chief minister in Pakistan who is a longstanding opponent of Bhutto. [Daily Mail, 12/30/2007]
The FBI warns that al-Qaeda operatives are planning several holiday attacks on US shopping malls in Los Angeles and Chicago over the holiday period. [ABC News, 11/8/2007] In an intelligence report distributed to law enforcement authorities, the FBI says that the attacks have been planned for two years with the goal of disrupting the US economy. [Federal Bureau of Investigation, 11/7/2007 ] The FBI received the information in late September and declassified it for the intelligence information reports. These reports routinely contain raw, unvetted or uncorroborated chatter about possible threats. It is estimated that the FBI released 8,000 such reports over the last year. The FBI and Department of Homeland Security Department have released about 200 threat bulletins possible plot trends that are based on actual events worldwide. [SF Gate, 11/8/2007] Questions are immediately raised about the alert. [ABC News, 11/8/2007] As with previous threats, some in the media question the timing and necessity of such a warning. The FBI anticipates this and clarifies its intentions in releasing the memo. The report states that “this information was obtained through a lengthy chain of acquisition, and was provided to the source by a sub-source who spoke in confidence. The veracity of the information is uncertain but the threat is being reported due to the nature of the information.” [ABC News, 11/8/2007] Other intelligence officers raise the possibility that it could be “disinformation.” It is believed that the source only has “indirect access” to al-Qaeda. It is common for jihadist web sites and chat rooms to have comments discussing attacks on “soft targets,” such as shopping malls. Special Agent Richard Kolko says “out of abundance of caution, and for any number of other reasons, raw intelligence is regularly shared within the intelligence and law enforcement communities - even when the value of the information is unknown… Al-Qaeda messaging has clearly stated they intend to attack the US or its interests; however, there is no information to state this is a credible threat. As always, we remind people to remain vigilant and report suspicious activity to authorities.” A Homeland Security official says “we have no credible, specific information suggesting an imminent attack.” [ABC News, 11/8/2007] LA mayor Antonio Villaraigosa urges residents to go about their daily routines, but says that they should be “mindful of anything out of the ordinary.” [SF Gate, 11/8/2007]
Michael McConnell, the director of national intelligence, writes an op-ed for the New York Times pushing for Congressional immunity for US telecommunications firms over their cooperation with the NSA’s warrantless wiretapping program. Under August’s Protect America Act, McConnell writes, the country is “safer” from terrorist attacks while the privacy of US citizens is protected (see August 5, 2007). The government has “greater understanding of international [al-]Qaeda networks, and the law has allowed us to obtain significant insight into terrorist planning.” But the Act expires in two months, and McConnell wants it re-enacted and significantly expanded “if we are to stay ahead of terrorists who are determined to attack the United States.” Echoing the arguments of Bush administration officials, McConnell attacks the “outdated” Foreign Intelligence Surveillance Act as significantly hindering the government’s “ability to collect timely foreign intelligence.” McConnell complains: “Our experts were diverted from tracking foreign threats to writing lengthy justifications to collect information from a person in a foreign country, simply to satisfy an outdated statute that did not reflect the ways our adversaries communicate. The judicial process intended to protect the privacy and civil liberties of Americans was applied instead to foreign intelligence targets in foreign countries. This made little sense, and the Protect America Act eliminated this problem.” McConnell calls for new legislation that would obviate the need for intelligence agencies such as the NSA to seek warrants to monitor US citizens’ telephone and e-mail communications: “The intelligence community should spend its time protecting our nation, not providing privacy protections to foreign terrorists and other diffuse international threats.” He also calls for retroactive immunity for “private parties”—i.e. the US telecommunications companies—that are subject to lawsuits over their cooperation with the NSA in monitoring US communications. “The intelligence community cannot go it alone,” he writes. “Those in the private sector who stand by us in times of national security emergencies deserve thanks, not lawsuits.” Two days later, new Attorney General Michael Mukasey will write a virtually identical op-ed for the Los Angeles Times (see December 12, 2007). [New York Times, 12/10/2007]
Michael Mukasey, the new Attorney General, writes an op-ed for the Los Angeles Times pushing for Congressional immunity for US telecommunications firms over their cooperation with the NSA’s warrantless wiretapping program. Mukasey supports the NSA program, echoing the administration’s long insistence that the surveillance program is “crucial” in protecting the country against terrorist attacks. He also reiterates the administration’s criticism of the “outdated” Foreign Intelligence Surveillance Act, which he says hampers the government’s ability to collect needed intelligence and does little to protect the privacy of US citizens. Mukasey calls for Congress to pass a Senate bill that would grant the telecommunications firms retroactive immunity to civil lawsuits and criminal charges surrounding their cooperation with the NSA, and would no longer require court orders for the government to “direct surveillance at foreign targets overseas”—surveillance that would target US citizens. Mukasey says the US will “need the full-hearted help of private companies in our intelligence activities; we cannot expect such cooperation to be forthcoming if we do not support companies that have helped us in the past.” Mukasey strongly opposes another Senate bill that would grant no immunity and would continue to require the government to obtain FISA Court warrants before wiretapping domestic communications. Two days earlier, the director of national intelligence, Michael McConnell, penned a virtually identical op-ed for the New York Times (see December 10, 2007). [Los Angeles Times, 12/12/2007]
Rashid Rauf. [Source: Associated Press]Al-Qaeda operative Rashid Rauf mysteriously escapes from a prison in Pakistan. Authorities will say he escapes after freeing himself from handcuffs while being transported from one prison to another. The two policemen escorting him allowed him to stop and pray at a mosque. According to The Guardian, “The officers claimed that when Rauf walked into the mosque they waited outside in their car, never considering for a moment that he could simply walk out of the back door.” Furthermore, they do not report the escape for several hours. The two policemen on the duty are arrested, but it is unclear what happens to them. The Pakistani government will say they must have been bribed to allow Rauf to escape.
Linked to Pakistani Militant Group - Rauf, a dual Pakistani and British citizen, was implicated as a leader of a 2006 plot to blow up airplanes in Britain using liquid explosives (see August 10, 2006). He was arrested in Pakistan. His wife is closely related to Maulana Masood Azhar, the founder of Jaish-e-Mohammed, a Pakistani militant group that has a history of links to the ISI, Pakistan’s intelligence agency.
Was He Allowed to Escape to Avoid Extradition? - Rauf’s lawyer will claim that it is not a case of simple bribery. “You could call it a ‘mysterious disappearance’ if you like, but not an escape,” he will say. “The Pakistanis are simply not interested in handing him over to the British. They never have been, although it is not clear why not.” In December 2006, terrorism charges against Rauf were dropped, but he remained in Pakistani custody on charges of carrying explosives and forged identity papers (see December 13, 2006). In November 2007, those charges were dropped and a judge ordered his immediate release. But less than an hour later, the Pakistani government announced that he would be extradited to Britain to be charged in the airplane plot, and he would remain in custody until that happened. His escape took place as he was getting close to being extradited. People at the mosque where he is supposed to have escaped will say that they never saw him or any policemen on this day, and the police never came looking for him later. [Guardian, 1/28/2008] In November 2008, it will be reported that Rauf was killed in a US drone strike, but his family will insist he remains alive (see November 22, 2008).
The Bush administration begins a push to get Congress to pass legislation to protect telecommunications companies from lawsuits over their assistance with the NSA’s warrantless wiretapping program. This is part of the administration’s long and sometimes uneasy partnership with the telecom industry to conduct a wide range of secret anti-terrorism surveillance operations. The firms fear further lawsuits and more public exposure, and some have refused outright to cooperate (see February 27, 2001 and 1990s).
Fiber Optics - Twenty years ago, the NSA had little difficulty in monitoring telephone communications because older technology relied on broadcast signals carried by microwave towers and satellite relays; the agency used its own satellite dishes to cull the signals. But fiber optic communications are much more difficult to tap, forcing the agency to seek the cooperation of the telecoms to monitor their signals.
Relationship - “It’s a very frayed and strained relationship right now, and that’s not a good thing for the country in terms of keeping all of us safe,” says an industry official in favor of immunity for the telecoms. “This episode has caused companies to change their conduct in a variety of ways.” Both the director of national intelligence, Mike McConnell, and the new Attorney General, Michael Mukasey, write virtually identical op-eds in recent days calling for passage of legislation to grant immunity to the telecoms and remove the need to obtain warrants to wiretap Americans’ communications (see December 10, 2007 and December 12, 2007).
Two Bills - Currently, two bills are before Congress: one largely crafted by Republicans and passed on by the Senate Intelligence Committee that would grant retroactive immunity to the telecoms, and another from the House Judiciary Committee that would not. The White House says President Bush will veto any legislation that does not grant immunity to the telecoms. [New York Times, 12/16/2007]
Newly released CIA documents show that the agency uses “national security letters” (NSLs) to secure financial and other information about US citizens from employers, financial institutions, libraries, and other private and public firms (see January 2004). The documents were requested by the American Civil Liberties Union under the Freedom of Information Act. The FBI has used NSLs for years, and drawn heavy criticism for its use of the instruments (see February 2005), but until now, the CIA’s use of NSLs has been a closely guarded secret. Like the FBI NSLs, the CIA’s letters come with “gag orders” that force the recipients to remain silent about the demand for information, or that there was even such a demand. According to ACLU lawyer Melissa Goodman, often the recipient of an NSL cannot keep a copy of the letter or even take notes about the information turned over to the CIA. A CIA spokesman denies that its use of NSLs was ever kept secret, and the information has always been requested on a voluntary basis for “such legitimate purposes as counterintelligence and counterterrorism.” [Washington Post, 1/25/2008]
Michael Futi. [Source: Honolulu Advertiser]A 14-day old child dies after he and his mother are locked in a Department of Homeland Security (DHS) secure room at Honolulu International Airport. Luaipou Futi flew her son, Michael Tony Futi, from their home in American Samoa for heart surgery. Michael becomes increasingly distressed in the hot room; his mother and a nurse who accompanied them to Hawaii, Arizona Veavea, bang on the door and shout for help. While the baby struggles to breathe and the two women beg for someone to call 911, people on the other side order them to stay calm and refuse to let them out. After 30 minutes of pleading, the door is opened. Fifteen minutes later, city paramedics take Michael to the Moana-lua Medical Center. Michael dies later in the morning. A translator, Simamao Nofoa, says of Mrs. Futi: “She was so happy—the minute she got on that plane—because she knew her baby was coming here…. They were the first ones out of the plane. If they would let them come immediately, her baby would have still been here. Her son would have still been alive. She’s heartbroken. She can’t eat. She can’t sleep…. She’s traumatized.” The Futis were scheduled to go directly from the hospital to Kapi’olani Medical Center for Women and Children, where Michael was scheduled to be hospitalized. But immigration officials detained the Futis for some apparent problem with Mrs. Futi’s visa waiver form. A lawyer retained by Mrs. Futi, Rick Fried, says all of their travel documents were in order, and shows the documents as proof. Veavea says that she tried to explain to the DHS officials that the baby was ill and needed immediate medical treatment, and asked if she and the baby can be released while officials dealt with Mrs. Futi’s documents. The officials refused, and detained everyone. Fried says: “Even if they had a valid cause for holding the mother of the baby… there is absolutely no basis for holding the baby or the baby’s nurse, who traveled with no luggage.… [T]he baby and the nurse are naturalized American citizens and have a US passport.” Fried also notes that airport personnel should have taken notice that Michael flew from Samoa to Hawaii while hooked up to an oxygen tank. [Honolulu Advertiser, 2/13/2008]
National security lawyer Suzanne Spaulding says that the constitutional question of whether the US government can examine a large array of information about citizens contained in its databases (see 1980s or Before) without violating an individual’s reasonable expectation of privacy “has never really been resolved.” She adds that it is “extremely questionable” to assume Americans do not have a reasonable expectation of privacy for data such as the subject-header of an e-mail or a Web address from an Internet search, because those are more like the content of a communication than a phone number. “These are questions that require discussion and debate,” she says. “This is one of the problems with doing it all [collecting data on citizens] in secret.” [Wall Street Journal, 3/10/2008]
A new investigation modeled on the Church Committee, which investigated government spying (see April, 1976) and led to the passage of the Foreign Intelligence Surveillance Act (FISA - see 1978) in the 1970s, is proposed. The proposal follows an amendment to wiretapping laws that immunizes telecommunications companies from prosecution for illegally co-operating with the NSA. A detailed seven-page memo is drafted outlining the proposed inquiry by a former senior member of the original Church Committee.
Congressional Investigative Body Proposed - The idea is to have Congress appoint an investigative body to discover the full extent of what the Bush White House did in the war on terror that may have been illegal and then to implement reforms aimed at preventing future abuses—and perhaps to bring accountability for wrongdoing by Bush officials. Key issues to investigate include:
The NSA’s domestic surveillance activities;
The CIA’s use of rendition and torture against terrorist suspects;
The U.S. government’s use of military assets—including satellites, Pentagon intelligence agencies, and U2 surveillance planes—for a spying apparatus that could be used against people in the US; and
The NSA’s use of databases and how its databases, such as the Main Core list of enemies, mesh with other government lists, such as the no-fly list. A deeper investigation should focus on how these lists feed on each other, as well as the government’s “inexorable trend towards treating everyone as a suspect,” says Barry Steinhardt, the director of the Program on Technology and Liberty for the American Civil Liberties Union (ACLU).
Proposers - The proposal is a product of talks between civil liberties advocates and aides to Democratic leaders in Congress. People consulted about the committee include aides to House Speaker Nancy Pelosi (D-CA) and Judiciary Committee chairman John Conyers (D-MI). The civil liberties organizations include the ACLU, the Center for Democracy and Technology, and Common Cause. However, some Democrats, such as Pelosi, Senate Intelligence Committee chairman John D. Rockefeller (D-WV), and former House Intelligence chairwoman Jane Harman (D-CA), approved the Bush administration’s operations and would be made to look bad by such investigation.
Investigating Bush, Clinton Administrations - In order that the inquiry not be called partisan, it is to have a scope going back beyond the start of the Bush administration to include the administrations of Bill Clinton, George H. W. Bush, and Ronald Reagan. The memo states that “[t]he rise of the ‘surveillance state’ driven by new technologies and the demands of counter-terrorism did not begin with this administration.” However, the author later says in interviews that the scope of abuse under George W. Bush would likely be an order of magnitude greater than under preceding presidents.
'Imagine What We Don't Know' - Some of the people involved in the discussions comment on the rationale. “If we know this much about torture, rendition, secret prisons, and warrantless wiretapping despite the administration’s attempts to stonewall, then imagine what we don’t know,” says a senior Democratic congressional aide who is familiar with the proposal. Steinhardt says: “You have to go back to the McCarthy era to find this level of abuse. Because the Bush administration has been so opaque, we don’t know [the extent of] what laws have been violated.” “It’s not just the ‘Terrorist Surveillance Program,’” says Gregory Nojeim from the Center for Democracy and Technology. “We need a broad investigation on the way all the moving parts fit together. It seems like we’re always looking at little chunks and missing the big picture.”
Effect on Presidential Race Unknown - It is unknown how the 2008 presidential race may affect whether the investigation ever begins, although some think that Democratic candidate Barack Obama (D-IL), said to favor open government, might be more cooperative with Congress than his Republican opponent John McCain (R-AZ). However, a participant in the discussions casts doubt on this: “It may be the last thing a new president would want to do.” [Salon, 7/23/2008]
The American Civil Liberties Union (ACLU), fresh from obtaining the release of a 2003 Justice Department memo that justified torture for US military officials (see April 1, 2008), calls on the Bush administration to release a still-secret Justice Department memo from October 2001 that the 2003 memo used as legal justification to ignore the Fourth Amendment (see October 23, 2001). The Fourth Amendment protects against unlawful search and seizure. The 2001 memo claims that the “Fourth Amendment had no application to domestic military operations.” The ACLU believes that the Fourth Amendment justification “was almost certainly meant to provide a legal basis for the National Security Agency’s warrantless wiretapping program, which President Bush launched the same month the memo was issued” (see Shortly After September 11, 2001-October 2005), a claim the Justice Department denies. The NSA is part of the Defense Department. Jameel Jaffer, director of the ACLU’s National Security Project, says: “The recent disclosures underscore the Bush administration’s extraordinarily sweeping conception of executive power. The administration’s lawyers believe the president should be permitted to violate statutory law, to violate international treaties, and even to violate the Fourth Amendment inside the US. They believe that the president should be above the law.” No one has ever tried to assert, before this memo was written, that the Fourth Amendment was legally impotent for any reason or justification inside US borders. Jaffer notes that no court has ever ruled that the Fourth Amendment does not apply to the military: “In general, the government can’t send an FBI agent to search your home or listen to your phone calls without a warrant, and it can’t send a soldier to do it, either. The applicability of the Fourth Amendment doesn’t turn on what kind of uniform the government agent is wearing.” The ACLU has known about the October 2001 memo for several months, but until now has not known anything of its contents. In response to a 2007 Freedom of Information lawsuit, the Justice Department acknowledged the existence of “a 37-page memorandum, dated October 23, 2001, from a deputy assistant attorney general in OLC [Office of Legal Counsel], and a special counsel, OLC, to the counsel to the president, prepared in response to a request from the White House for OLC’s views concerning the legality of potential responses to terrorist activity.” The only information publicly known about the memo was that it was related to a request for information about the NSA’s warrantless wiretapping program. The ACLU has challenged the withholding of the October 2001 memo in court. [American Civil Liberties Union, 4/2/2008]
The Electronic Frontier Foundation joins the American Civil Liberties Union in its skeptical response to the news of a secret October 2001 Justice Department memo that says the Fourth Amendment does not apply in government actions taken against terrorists (see April 2, 2008). “Does this mean that the administration’s lawyers believed that it could spy on Americans with impunity and face no Fourth Amendment claim?” it asks in a statement. “It may, and based on the thinnest of legal claims—that Congress unintentionally allowed mass surveillance of Americans when it passed the Authorization of Use of Military Force in… 2001 (see September 14-18, 2001) .… In short, it appears that the administration may view NSA domestic surveillance, including the surveillance of millions of ordinary Americans… as a ‘domestic military operation.’ If so, this Yoo memo would blow a loophole in the Fourth Amendment big enough to fit all of our everyday telephone calls, web searches, instant messages and emails through.… Of course, the [Justice Department’s] public defense of the NSA program also asserted that warrantless surveillance did not violate the Fourth Amendment.… But the memo referenced above raises serious questions. The public deserves to know whether the 2001 Yoo memo on domestic military operations—issued the same month that the NSA program began—asserted that the Fourth Amendment did not apply to domestic surveillance operations conducted by the NSA. And of course it reinforces why granting immunity aimed at keeping the courts from ruling on the administration’s flimsy legal arguments is wrongheaded and dangerous.” [Electronic Frontier Foundation, 4/2/2008]
The American Civil Liberties Union learns of another Justice Department memo in a Freedom of Information Act (FOIA) response that produces a 2003 memo supporting the use of torture against terror suspects (see April 1, 2008). This 2001 memo (see October 23, 2001), says that the Constitution’s protections against unreasonable searches and seizures—fundamental Fourth Amendment rights—do not apply in the administration’s efforts to combat terrorism. The Bush administration now says it disavows that view.
Background - The memo was written by John Yoo, then the deputy assistant attorney general, and the same lawyer who wrote the 2003 torture memo. It was written at the request of the White House and addressed to then-Attorney General Alberto Gonzales. The administration wanted a legal opinion on its potential responses to terrorist activity. The 37-page memo itself has not yet been released, but was mentioned in a footnote of the March 2003 terror memo. “Our office recently concluded that the Fourth Amendment had no application to domestic military operations,” the footnote states, referring to a document titled “Authority for Use of Military Force to Combat Terrorist Activities Within the United States.”
Relationship to NSA Wiretapping Unclear - It is not clear exactly what domestic military operations the October memo covers, but federal documents indicate that the memo relates to the National Security Agency’s Terrorist Surveillance Program (TSP). The TSP began after the 9/11 attacks, allowing for warrantless wiretaps of phone calls and e-mails, until it stopped on January 17, 2007, when the administration once again began seeking surveillance warrants from the Foreign Intelligence Surveillance Court (see May 1, 2007). White House spokesman Tony Fratto says that the October 2001 memo is not the legal underpinning for the TSP. Fratto says, “TSP relied on a separate set of legal memoranda” outlined by the Justice Department in January 2006, a month after the program was revealed by the New York Times (see February 2001, After September 11, 2001, and December 15, 2005). Justice Department spokesman Brian Roehrkasse says department officials do not believe the October 2001 memo was about the TSP, but refuses to explain why it was included on FOIA requests for documents linked to the TSP.
No Longer Applicable - Roehrkasse says the administration no longer holds the views expressed in the October 2001 memo. “We disagree with the proposition that the Fourth Amendment has no application to domestic military operations,” he says. “Whether a particular search or seizure is reasonable under the Fourth Amendment requires consideration of the particular context and circumstances of the search.” The ACLU’s Jameel Jaffer is not mollified. “The recent disclosures underscore the Bush administration’s extraordinarily sweeping conception of executive power,” he says. “The administration’s lawyers believe the president should be permitted to violate statutory law, to violate international treaties and even to violate the Fourth Amendment inside the US. They believe that the president should be above the law.” He continues, “Each time one of these memos comes out you have to come up with a more extreme way to characterize it.” The ACLU has filed a court suit to challenge the government’s withholding of the memo. [Associated Press, 4/3/2008] Another civil rights group, the Electronic Frontier Foundation, joins the ACLU in challenging the memo (see April 2, 2008).
Entity Tags: Jameel Jaffer, Brian Roehrkasse, American Civil Liberties Union, Alberto R. Gonzales, Bush administration (43), Foreign Intelligence Surveillance Court, Terrorist Surveillance Program, US Department of Justice, John C. Yoo, Electronic Frontier Foundation, Tony Fratto
Timeline Tags: Civil Liberties
Rolling Stone’s Tim Dickinson berates former Justice Department lawyer John Yoo for his defense of his 2003 advocacy of torture (see April 2, 2008), joining retired military officials (see April 2-4, 2008) and legal experts (see April 2-6, 2008). Dickinson writes, “I’m literally sick” over Yoo’s memo. He characterizes Yoo’s “evil circularity” of logic as: “The Fifth Amendment’s due process protections and Eighth Amendment’s prohibitions against cruelty do not apply a) to aliens abroad and b) are rendered meaningless by the president’s totalitarian powers during time of war. And if the president is above the constitution, he’s certainly above the law.” Dickinson notes that some of the federal statutes rendered inoperative by the power of the commander in chief, Yoo wrote, include assault, maiming, interstate stalking, war crimes, and torture. Furthermore: “If foreign detainees held on foreign soil have no protection from US law, what about international law? Well, says Yoo, the Geneva Conventions do not require anything more of the United States than what is provided for in the Fifth and Eighth Amendments, which as we just learned do not apply to foreign detainees. Furthermore: ‘international law is not federal law and the president is free to override it at his discretion.’ To recap: The president is unbound by international law—ever—and not constrained by either federal law or the Constitution in his role as commander in chief, which gives him carte blanche authority to have illegal enemy combatants who are detained on foreign soil assaulted, maimed, tortured, and otherwise subjected to war crimes, so long as the president deems it necessary or in ‘self-defense’ of the nation.” [Rolling Stone, 4/2/2008]
Jon Kyl. [Source: ViewImages.com]The Senate passes by unanimous consent the Inspector General Reform Act of 2008, a law designed to boost the independence of the inspectors general of various federal agencies. However, the law only passes after Senator Jon Kyl (R-AZ) adds an amendment that deletes a key provision giving the Justice Department’s Office of Inspector General (OIG) jurisdiction to investigate misconduct allegations against Justice Department attorneys and senior officials. OIGs for all other agencies can, under this law, investigate misconduct within their entire agency. The Justice Department’s OIG must now refer allegations against department officials to the department’s Office of Professional Responsibility (OPR), which is not statutorily independent and reports directly to the attorney general and deputy attorney general. A House bill passed last October has no such requirement. Usually a bill with such a discrepancy would be referred to a joint House-Senate conference to resolve the difference, but Congressional sources say in this case there will be no such conference; the House is likely to accept the Senate version. Many observers believe that the Kyl amendment was added at the White House’s behest after President Bush had threatened to veto the House bill. Representative James Cooper (D-TN), the sponsor of the House bill, says: “The Kyl amendment took out a lot of the substance of the bill, but it didn’t kill the bill. I think we should lock in these improvements and leave to a future Congress further improvements.” Danielle Brian, executive director of the Project on Government Oversight, agrees, saying that the Justice Department issue is a “lingering problem that has got to be addressed.” There is a “clear conflict, a real problem,” with the OPR investigating allegations against the officials to whom it reports, she says. Former Justice Department Inspector General Michael Bromwich says that the Kyl amendment sets the Justice Department apart from all other agencies. The amendment gives Justice Department lawyers what Bromwich calls a “privileged status” to be reviewed by the OPR, which lacks the OIG’s independence. Bromwich says that the amendment “either has to be based on a misunderstanding of what the IG is seeking or on an attempt by people in the department to keep certain kinds of investigations away from the IG for reasons they should articulate.” The issue garnered public attention when former Attorney General Alberto Gonzales directed OPR to investigate the firings of eight US attorneys, a matter directly involving Gonzales and his deputies. Inspector General Glenn Fine objected, and eventually the Justice Department’s OIG and OPR agreed to a joint investigation. “The whole bill was held up because of this issue,” Brian says. “We hope the Justice Department problem is not forgotten now that the legislation is passing.” [National Law Journal, 5/5/2008]
Entity Tags: Office of the Inspector General (DOJ), US Department of Justice, Office of Professional Responsibility, Project on Government Oversight, Michael Bromwich, James Cooper, Inspector General Reform Act of 2008, Alberto R. Gonzales, George W. Bush, Glenn Fine, Jon Kyl, Danielle Brian
Timeline Tags: Civil Liberties
Constitutional lawyer Bruce Fein, formerly an associate deputy attorney general under President Ronald Reagan, says that the legality of the Main Core database, which contains a list of enemies primarily for use in national emergencies (see 1980s or Before), is murky: “In the event of a national emergency, the executive branch simply assumes these powers”—the powers to collect domestic intelligence and draw up detention lists, for example—“if Congress doesn’t explicitly prohibit it. It’s really up to Congress to put these things to rest, and Congress has not done so.” Fein adds that it is virtually impossible to contest the legality of these kinds of data collection and spy programs in court “when there are no criminal prosecutions and [there is] no notice to persons on the president’s ‘enemies list.’ That means if Congress remains invertebrate, the law will be whatever the president says it is—even in secret. He will be the judge on his own powers and invariably rule in his own favor.” [Radar, 5/2008]
Former CIA officer Philip Giraldi is interviewed by journalist Christopher Ketcham about the Main Core database, which apparently contains a list of potential enemies of the US state. Giraldi does not know any definite information about the database, but he speculates that it must be contained within the Department of Homeland Security (DHS): “If a master list is being compiled, it would have to be in a place where there are no legal issues”—the CIA and FBI would be restricted by oversight and accountability laws—“so I suspect it is at DHS, which as far as I know operates with no such restraints.” Giraldi notes that the DHS already maintains a central list of suspected terrorists and says it has been freely adding people who pose no reasonable threat to domestic security. “It’s clear that DHS has the mandate for controlling and owning master lists. The process is not transparent, and the criteria for getting on the list are not clear.” Giraldi continues, “I am certain that the content of such a master list [as Main Core] would not be carefully vetted, and there would be many names on it for many reasons—quite likely including the two of us.” [Radar, 5/2008]
Former national security official Norman Bailey admits publicly and on the record that the PROMIS database and search application has been given to the NSA. As Salon magazine points out: “His admission is the first public acknowledgement by a former US intelligence official that the NSA used the PROMIS software.” Bailey also says that the application was given to the Treasury Department for a financial tracking project in the early 1980s that also involved the National Security Council (see 1982-1984). Bailey worked for US governments from the Ronald Reagan era until the George W. Bush administration and, in addition to the 1980s tracking program, he headed a special unit within the Office of the Director of National Intelligence focused on financial intelligence on Cuba and Venezuela in 2006 and 2007. [Salon, 7/23/2008]
What Radar magazine describes as a “knowledgeable source” claims that 8 million Americans are now listed in the Main Core database as potentially suspect. Main Core is a database of enemies of the state established several decades before as a part of the Continuity of Government (COG) program (see 1980s or Before). In the event of a national emergency, the suspects could be subject to, for example, heightened surveillance, tracking, direct questioning, or even detention. [Radar, 5/2008]
Karen S. Johnson. [Source: Publicity photo]Arizona state senator Karen S. Johnson, a Republican, says she suspects a government conspiracy and calls for a new investigation into 9/11. Calling attention to the unexplained collapse of WTC Building 7, she writes: “Why, for example, did Building 7 collapse? It wasn’t hit by a plane, as the towers were. The 9/11 Commission Report completely ignores Building 7. The Federal Emergency Management Agency (FEMA) report discounts fire as a cause and concludes that the reasons for the collapse of Building 7 are unknown and require further research. But when FEMA issued this report, it already cleared the site and disposed of the dust and steel (evidence from a crime scene), thus possibly committing a felony and complicating any ‘further research.’ The National Institute of Standards and Technology, a federal agency, which evaluated the collapse of the towers, has yet to issue its report on Building 7. ‘We’ve had trouble getting a handle on Building 7,’ said the acting director of their Building and Fire Research Lab. Yet a number of private-sector engineers, architects, and demolition experts have not had that problem. They think Building 7 came down by controlled demolition. The building collapsed suddenly, straight down, at nearly free-fall speed. People heard the explosions, and saw the squibs and the characteristic billowing clouds of pulverized concrete so unique to demolitions. There is no reason to think that Building 7 came down for any other reason than explosive demolition.” [Arizona Republic, 5/3/2008]
YouTube logo. [Source: YouTube.com]Senator Joseph Lieberman (D-CT), the chairman of the Senate Homeland Security and Governmental Affairs Committee, asks Google, the parent company of the online video-sharing site YouTube, to “immediately remove content produced by Islamist terrorist organizations” from YouTube and prevent similar content from reappearing. The company refuses Lieberman’s request. Lieberman writes a letter to Eric Schmidt, the CEO and chairman of Google, saying in part that YouTube “unwittingly, permits Islamist terrorist groups to maintain an active, pervasive and amplified voice despite military setbacks or successful operations by the law enforcement and intelligence communities.” Lieberman also asks that Google identify changes it plans to make in YouTube’s community guidelines and delineate exactly what it will do to enforce those guidelines. Lieberman says removing such content ought to be “a straightforward task since so many of the Islamist terrorist organizations brand their material with logos or icons identifying their provenance.” However, YouTube responds by saying that taking such actions is not as simple as Lieberman believes, and refuses to remove any videos from anyone without consideration as to whether the videos are legal, nonviolent, or non-hate speech videos. “While we respect and understand his views, YouTube encourages free speech and defends everyone’s right to express unpopular points of view,” the company says. YouTube has removed a few videos that Lieberman identified last week after determining that the individual videos violated the company’s community guidelines. However, “most of the videos, which did not contain violent or hate speech content, were not removed because they do not violate our Community Guidelines,” the company says. Lieberman’s committee recently released a report that indicated some Islamist terrorist groups used Internet chat rooms, message boards, and Web sites to help recruit and indoctrinate members, and to communicate with one another. Some critics have said that the committee’s report unfairly singles out Muslims as possible extremists. Additionally, civil libertarians and privacy activists speak out against what they see as Lieberman’s attempt to restrain freedom of speech. John Morris of the Center for Democracy and Technology says that Lieberman’s request is a practical impossibility; worse, to have sites such as YouTube pre-screen content would radically change how the Internet is used, he says. “The government can’t get involved in suppressing videos if the content is not illegal.” [Federal Computer Weekly, 5/19/2008; US Senate, 5/19/2008; YouTube, 5/19/2008]
The campaign of Republican presidential nominee John McCain (R-AZ) says that if elected, McCain would retain the right to operate his own warrantless wiretapping program against Americans. Like President Bush, McCain believes that the president’s “wartime” powers trump federal criminal statutes and court oversight. McCain’s campaign is also backing off on earlier assertions that more oversight is needed for telecom companies accused of illegally cooperating with the NSA’s domestic spying program; the campaign now says that McCain is for “unconditional immunity” from prosecution for telecoms. Campaign spokesman Doug Holtz-Eakin says: “[N]either the administration nor the telecoms need apologize for actions that most people, except for the ACLU and the trial lawyers, understand were Constitutional and appropriate in the wake of the attacks on September 11, 2001.… We do not know what lies ahead in our nation’s fight against radical Islamic extremists, but John McCain will do everything he can to protect Americans from such threats, including asking the telecoms for appropriate assistance to collect intelligence against foreign threats to the United States as authorized by Article II of the Constitution.” The Article II citation has long been used by Bush officials to justify their contention that a president’s wartime powers are virtually unlimited. McCain’s stance directly contradicts a statement he made in December 2007, when he told Boston Globe reporter Charlie Savage: “I think that presidents have the obligation to obey and enforce laws that are passed by Congress and signed into law by the president, no matter what the situation is.… I don’t think the president has the right to disobey any law.” McCain’s campaign is so far refusing to respond to requests to explain the differences between his December assertions and those made today. [Wired News, 6/3/2008]
Henry Waxman (D-CA), the chairman of the House Oversight Committee, writes to Attorney General Michael Mukasey requesting access to the transcripts of interviews by President Bush and Vice President Cheney regarding the “outing” of CIA agent Valerie Plame Wilson (see Shortly after February 13, 2002). The interviews were conducted as part of the investigation of former Vice Presidential Chief of Staff Lewis “Scooter” Libby by special prosecutor Patrick Fitzgerald. Waxman notes that he made a similar request in December 2007 which has gone unfulfilled (see December 3, 2007). Waxman wants the reports from Bush and Cheney’s interviews, and the unredacted reports from the interviews with Libby, former White House Deputy Chief of Staff Karl Rove, former White House press secretary Scott McClellan, former National Security Adviser Condoleezza Rice, former White House aide Cathie Martin, “and other senior White House officials.” Information revealed by McClellan in conjuction with his new book What Happened, including McClellan’s statement that Bush and Cheney “directed me to go out there and exonerate Scooter Libby,” and his assertion that “Rove, Libby, and possibly Vice President Cheney… allowed me, even encouraged me, to repeat a lie,” adds to evidence from Libby’s interviews that Cheney may have been the source of the information that Wilson worked for the CIA. For Cheney to leak Wilson’s identity, and to then direct McClellan to mislead the public, “would be a major breach of trust,” Waxman writes. He adds that no argument can be made for withholding the documents on the basis of executive privilege, and notes that in 1997 and 1998, the Oversight Committee demanded and received FBI interviews with then-President Clinton and then-Vice President Gore without even consulting the White House. [US House of Representatives, 6/3/2008; TPM Muckraker, 6/3/2008]
Entity Tags: William Jefferson (“Bill”) Clinton, Karl C. Rove, Richard (“Dick”) Cheney, George W. Bush, Henry A. Waxman, Condoleezza Rice, Albert Arnold (“Al”) Gore, Jr., Catherine (“Cathie”) Martin, Scott McClellan, House Committee on Oversight and Government Reform, Lewis (“Scooter”) Libby, Michael Mukasey
Timeline Tags: Civil Liberties, Niger Uranium and Plame Outing
The Supreme Court finds in the case of Davis v. Federal Election Commission that part of the McCain-Feingold campaign finance reform act (see March 27, 2002) is unconstitutional. Jack Davis (D-NY), a millionaire who has run repeatedly and unsuccessfully as a candidate of both parties to represent New York’s 26th District in the US House of Representatives, has complained in a lawsuit that the so-called “millionaire’s amendment” is unconstitutional. Davis wants to be able to pour his money into the race without his opponents being able to spend more money to counter his donations, as the law enables them to do. The lower courts found against Davis, and under McCain-Feingold the case was expedited directly to the Supreme Court. The Court finds 5-4 in favor of Davis, ruling that the contribution limits unduly restrict Davis’s freedom of speech. Justice Samuel Alito writes the majority opinion, joined by his fellow Court conservatives. Justice John Paul Stevens writes the dissent for the four Court liberals, though Stevens and the others do agree with some aspects of Alito’s majority opinion. Alito’s decision flows directly from an earlier Court precedent (see January 30, 1976). [Oyez (.org), 2011; Moneyocracy, 2/2012]
Italian police testifying at the trial for the kidnap of Islamist extremist Hassan Mustafa Osama Nasr (see Noon February 17, 2003) name their four former CIA contacts. The 12 policemen, all members of the Milan Counterterrorism Police and the Milan Carabinieri Special Branch, say the four CIA officers are Robert Seldon Lady, former chief of the agency’s Milan base, Jeff Castelli, former CIA station chief in Rome, Sabrina Se Sousa, and Betnie Medero. The four are accused of being involved in the kidnap and have all previously been named in prosecution documents. The CIA declines to comment. [Congressional Quarterly, 4/19/2008]
Police at Frederick City, Maryland, enter Fort Detrick to execute an Emergency Medical Evaluation Petition. The petition is for Bruce Ivins, a scientist working at USAMRIID, the US Army’s top biological laboratory, located inside Fort Detrick. The police are escorted to Ivins and take him out of the military base. He is informed that he will not be allowed back into the laboratory or the base again. Ivins is placed in a local hospital the same day. [Herald-Mail, 8/8/2008] Apparently he is hospitalized because he had been acting strangely in recent weeks and associates concluded he could be a danger to himself and others. Jean Duley, a social worker who had treated him in group therapy, sought a restraining order against him the day before (see July 9, 2008). She claims he had been making threats, but she does not claim he confessed to any role in the anthrax attacks. He remains hospitalized until July 23. [New York Times, 8/4/2008]
As reported by progressive media watchdog site Media Matters, Jerome Corsi, author of a widely discredited book that smears presidential candidate Barack Obama (see August 1, 2008 and After), tells a C-SPAN interviewer that if Obama becomes president and people like Corsi dare to criticize him in print, “Obama might just have to create a department of hate crimes and put them in jail.” [Media Matters, 8/16/2008]
Jerome Corsi, author of a widely debunked smear against Democratic candidate Barack Obama (see August 1, 2008 and After), says in a WorldNetDaily article that since the Obama campaign has responded to his book with a Web page called “Unfit for Publication,” it is conceivable that an Obama presidency will create “a censorship department in which a book critical of a President Obama might be banned from publication.” [WorldNetDaily, 9/7/2008] Corsi has previously suggested that Obama is likely to create a “department of hate crimes” and put critics such as himself in jail (see August 16, 2008).
A US District Court orders the Justice Department to turn over ten documents from the Justice Department’s Office of Legal Counsel to determine whether they should be released under the Freedom of Information Act. The Electronic Privacy Information Center (EPIC) and the American Civil Liberties Union (ACLU) say the documents may hold information that would shed light on the legal reasoning behind the Bush administration’s “Stellar Wind” warrantless wiretapping program (see Spring 2004 and December 15, 2005). EPIC and the ACLU seek the release of 30 documents from the OLC; Judge Henry Kennedy has ordered that 10 be turned over to him for further examination and 20 others remain classified because of national security considerations. Seven of those documents are about the government’s “Terrorist Surveillance Program” (TSP—apparently the same program as, or an element of, Stellar Wind), 12 are FBI documents detailing how TSP had assisted the Bureau in counterterrorism investigations, and one is an OLC memo covered under an exemption for “presidential communications”—presumably a memo written either by, or for, President Bush. [Ars Technica, 11/2/2008]
Page 7 of 8 (743 events (use filters to narrow search))previous
Receive weekly email updates summarizing what contributors have added to the History Commons database
Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.