!! History Commons Alert, Exciting News
Events: (Note that this is not the preferable method of finding events because not all events have been assigned topics yet)
Page 14 of 19 (1820 events (use filters to narrow search))previous
Senator John McCain (R-AZ) introduces an amendment to the annual legislation to fund the Defense Department. McCain’s amendment, co-sponsored by Senate Armed Services Committee chairman John Warner (R-VA) and Senator Lindsey Graham (R-SC), a former military lawyer, states that military interrogators cannot exceed the limits on detainee treatment set forth in the US Army Field Manual. In essence, the amendment would prohibit the use of harsh interrogation techniques that many, including McCain, feel constitute torture. The Field Manual limits were specifically written to comply with the Geneva Conventions. The amendment also prohibits US officials, including CIA agents, from inflicting not just torture but any form of “cruel, inhuman, and degrading treatment” on anyone in their custody, no matter where in the world the prisoner is being kept. The amendment, later known as the McCain Amendment or the McCain Torture Ban, becomes the subject of fierce, largely private negotiations between McCain and the White House. Vice President Cheney quickly lobbies friendly Republicans in Congress to oppose the amendment, and has private meetings with Warner and McCain. At Cheney’s behest, Senate Majority Leader Bill Frist (R-TN) withdraws the entire bill from consideration rather than allow it to pass with the McCain amendment attached. [Savage, 2007, pp. 220-221]
The Connecticut Four, from left to right: Janet Nocek, Peter Chase, George Christian, and Barbara Bailey. [Source: Robert Deutsch/ USA Today]A case filed against Attorney General Alberto Gonzales by four plaintiffs from Connecticut’s Library Connection, Inc.—George Christian, Barbara Bailey, Peter Chase, and Janet Nocek—goes to trial in federal district court (see July 13, 2005). The trial is filed as Doe v. Gonzales because the government has filed a gag order against the plaintiffs forbidding them from identifying themselves or discussing the case publicly. The case involves a demand for information from the FBI for information concerning library usage by patrons of a Connecticut library; the four plaintiffs, on behalf of their data management firm Library Connection, have refused. The case revolves around the use of a National Security Letter (NSL) by the FBI; the plaintiffs, with support from the American Civil Liberties Union, want the NSL voided, the gag order lifted, and such use of NSLs found unconstitutional. Christian and his three colleagues are not allowed to attend the hearings in person because of the possibility that they might be identified as the plaintiffs; they are forced to watch the proceedings on a closed-circuit broadcast from a locked room in the Hartford courthouse. When the judge in the proceeding asks to review the government’s evidence for keeping the gag rule in place, Justice Department lawyers insist on submitting secret evidence directly to the judge, without providing that evidence to the plaintiff’s lawyers. The judge is not pleased, and rules, as did her predecessor in New York, that a perpetual gag order amounts to prior restraint, and thereby is unconstitutional. She adds that her review of the secret evidence gives no national security rationale for keeping the plaintiffs gagged. The Justice Department immediately appeals the ruling, and the plaintiffs stay silent and gagged. While the four plaintiffs remain silent about the NSL and the court case, the Justice Department’s primary lawyer, Kevin O’Conner, does not: O’Conner has frequently debated one of the plaintiffs, Chase, about the Patriot Act, and though Chase is now required to remain silent, O’Conner continues to make frequent public appearances touting the Patriot Act. Christian later says, in 2007 testimony before the Senate Judiciary Committee (see April 11, 2007), that the continuing gag order causes the four “John Does” considerable professional and personal distress, especially after the national media begins reporting the story. The media eventually learns, through the careless redaction of information by government lawyers, of Chase’s identity as one of the four plaintiffs, and reveals that Library Connection is the firm involved in the lawsuit. Christian’s name comes to light shortly thereafter. The attorneys warn Christian and the others that even though their identities and their firm have been revealed, they still cannot comment at all on the case. Christian, for one, wants to testify before Congress in regards to the upcoming reauthorization of the Patriot Act (see March 9, 2006), but cannot. The four plaintiffs quickly become known in the media as the “Connecticut John Does” or the “Connecticut Four.”
Appeals Court - In November 2005, a New York court of appeals hears the case. Christian and his colleagues are allowed to be present at the case this time, but are required to conceal their identities by entering and leaving the court building separately, are not allowed to sit together, and are not allowed to confer with, or even make eye contact with, each other or their attorneys. The Justice Department lawyers argue that even revealing themselves as recipients of a NSL would violate national security, an argument refuted by submission of the raft of news articles identifying Christian, Chase, and Library Connection. The government argues that those news reports don’t matter because no one in Connecticut reads the primary newspaper carrying the story, the New York Times, and that surveys prove that most people don’t believe what they read in the news anyway. The Justice Department also tries to get the news articles to be kept under seal in court papers. Christian characterizes the entire proceeding as “absurd.” The court refuses to admit the plaintiff’s claim that 48 states, including Connecticut, have laws protecting the privacy of library patrons, but does admit into evidence the claims by Gonzales that there is no statutory justification for claims of privacy. In an attempt to get the gag order lifted before the Patriot Act reauthorization, the plaintiff’s attorneys make an emergency appeal directly to the Supreme Court, but are rebuffed. [Senate Judiciary Committee, 4/11/2007] In June 2006, Nocek tells a reporter, “Imagine the government came to you with an order demanding that you compromise your professional and personal principles. Imagine then being permanently gagged from speaking to your friends, your family or your colleagues about this wrenching experience.… Under the Patriot Act, the FBI demanded Internet and library records without showing any evidence or suspicion of wrongdoing to a court of law. We were barred from speaking to anyone about the matter and we were even taking a risk by consulting with lawyers.” [Interview: George Christian, 6/2/2006]
Gag Order Lifted, Case Dropped - Weeks after President Bush signs into law the Patriot Act reauthorization (see March 9, 2006), the FBI voluntarily lifts the gag order without waiting for a court order. The agency then tries to get the original ruling against the gag order vacated, an attempt that the appeals court refuses. The appellate judges are clearly disturbed by the breadth of the NSL gag provisions; one appellate judge writes, “A ban on speech and a shroud of secrecy in perpetuity are antithetical to democratic concepts and do not fit comfortably with the fundamental rights guaranteed American citizens… Unending secrecy of actions taken by government officials may also serve as a cover for possible official misconduct and/or incompetence.” The appeals court refers the case back to district court, allowing the original opinion to stand. Weeks later, the FBI withdraws its NSL, saying that it no longer needs the information it originally requested. Christian later testifies, “In doing so, they removed the Patriot Act from the danger of court review.” Christian later says that he believes the entire procedure was managed as an attempt to prevent the case from becoming public knowledge before Congress could vote on the reauthorization of the Patriot Act. [Senate Judiciary Committee, 4/11/2007]
Entity Tags: Peter Chase, Senate Judiciary Committee, National Security Letters, US Department of Justice, Library Connection, Inc., George Christian, George W. Bush, American Civil Liberties Union, Barbara Bailey, Connecticut Four, Alberto R. Gonzales, Federal Bureau of Investigation, Kevin O’Conner
Timeline Tags: Civil Liberties
Lawyers for Sibel Edmonds file a petition with the Supreme Court asking it “to provide guidance to the lower courts about the proper scope and application of the state secrets privilege (see March 9, 1953), and to prevent further misuse of the privilege to dismiss lawsuits at the pleading stage.” The petition also urges the court to affirm that the press and public may not be barred from court proceedings in civil cases without just cause. In May, the federal appeals court had closed the courtroom to the public and media. Edmonds’ lawyers include the American Civil Liberties Union and Mark Zaid of Krieger and Zaid, PLLC. If the Supreme Court rules in favor of Edmonds, she will return to the lower courts and start her case again. [Petition for a writ of certiorari. Sibel Edmonds v. Department of Justice, et all., 8/4/2005, pp. 2 ; Government Executive, 8/8/2005]
Camp Casey. [Source: Indybay (.org)]Antiwar activist Cindy Sheehan, of Vacaville, California, sets up “Camp Casey” three miles outside of President Bush’s Crawford, Texas ranch. Bush has come to his ranch for his yearly August vacation; Sheehan has come to demand a meeting with Bush to discuss the loss of her son, Casey, in Iraq. Sheehan chooses the date to coincide with the fourth anniversary of the briefing that warned Bush of Osama bin Laden’s intention to attack the US (see August 6, 2001). Camp Casey begins as a single pup tent in a ditch by the side of a dirt road, in which Sheehan intends to stay for whatever time it takes to secure a meeting with Bush. Author and media critic Frank Rich later writes that because Bush is so firmly ensconsced in the protective “bubble” that shields him from awareness of criticism, he and his top officials are blindsided by the media response to Sheehan’s lonely vigil. Casey Sheehan, who died in April 2004 a mere two weeks after his arrival in Iraq (see April 4, 2004), will become, Rich will write, emblematic of both “the noble intentions of those who volunteered to fight the war [and] also the arrogance, incompetence, and recklessness of those who gave the marching orders.”
Bush Refuses to Meet with Sheehan - Bush will refuse to meet with Sheehan and the increasing number of peace activists who gather at Camp Casey, causing him inordinate embarrassment (see August 12, 2005) as more and more reporters begin questioning his motives in refusing to meet with the bereaved mother of a fallen US soldier. Bush even ignores the advice of some of his public relations staffers and fellow Republicans, who ask him to reconsider, as Senator George Allen (R-VA) says, “as a matter of courtesy and decency.” Rich will write: “Only someone as adrift as Bush would need to be told that a vacationing president couldn’t win a standoff with a grief-stricken parent commandeering TV cameras and the blogosphere 24/7. But the White House held firm. In a particularly unfortunate gesture, the presidential motorcade, in a rare foray out of the vacation compound, left Sheehan in the dust on its way to a fundraiser at a fat cat’s ranch nearby” (see August 12, 2005). [Rich, 2006, pp. 193-196] Political analyst Charlie Cook says: “Anything that focuses media and public attention on Iraq war casualties day after day—particularly [something] that is a good visual for television, like a weeping Gold Star mother—is a really bad thing for President Bush and his administration.… Americans get a little numb by the numbers of war casualties, but when faces, names, and families are added, it has a much greater effect.” Republican strategist Kellyanne Conway agrees, saying: “Cindy Sheehan has tapped into a latent but fervent feeling among some in this country who would prefer that we not engage our troops in Iraq. She can tap into what has been an astonishingly silent minority since the end of last year’s presidential contest. It will capture attention.” University professor Stephen Hess says that Sheehan’s “movement… can be countered by a countermovement” and therefore negated, but “I think the president might have defused the situation if he had invited her in instantly.” Hess predicts that Sheehan will soon be targeted by Republican strategists in a counterattack (see August 11, 2005 and After).
Focus of Antiwar Movement - Camp Casey quickly becomes the focus of the American antiwar movement, with organizations such as MoveOn.org and Code Pink pitching in to help expand and coordinate the camp, and high-profile Democratic operatives such as Joe Trippi organizing support among left-wing bloggers. MoveOn’s Tom Mattzie says: “Cindy reached out to us.… Cindy is a morally pure voice on the war, so we’re trying to keep the focus on her and not jump in and turn it into a political fight.” [Los Angeles Times, 8/11/2005]
Entity Tags: George W. Bush, Cindy Sheehan, Charlie Cook, Casey Sheehan, Bush administration (43), “Camp Casey”, Code Pink, George F. Allen, MoveOn (.org), Stephen Hess, Frank Rich, Kellyanne Conway, Joe Trippi, Tom Mattzie
Timeline Tags: Iraq under US Occupation
Lawyers refile a civil suit against Secretary of Defense Donald Rumsfeld on behalf of “enemy combatant” Ali Saleh Kahlah al-Marri, who has been in US custody since late 2001 (see December 12, 2001) and was designated as an enemy combatant a year and a half later (see June 23, 2003). Al-Marri is asking the federal district court in South Carolina to declare unconstitutional what he, through his lawyers, calls the severe and unnecessary deprivations and restrictions to which he has been subjected since he was placed in military custody. Al-Marri had already filed a suit challenging the legality of his detention on habeas corpus grounds, a lawsuit that was ultimately dismissed (see October 4, 2004). Human Rights Watch director Jamie Fellner says: “It is bad enough that al-Marri has been held indefinitely without charges and incommunicado. Now we learn that his life in the brig has also been one of cruelty and petty vindictiveness.” [Human Rights Watch, 8/8/2005]
Allegations of Cruel Treatment - Al-Marri is currently the only known person designated as an enemy combatant still in legal limbo. He has been in solitary confinement since his December 2001 arrest, and in Guantanamo since mid-2003. Al-Marri was sent to the Charleston, South Carolina Naval brig once he was designated as an enemy combatant, isolated in a lightless cell hardly larger than a closet, and since then, his lawyers say, he has been subjected to deprivations of the most basic kinds, including shoes, socks, blankets, toilet paper, toothpaste, and sunlight. Sometimes he is denied water. During the day his mattress is removed. His captors often turn the temperature down in his cell to near-freezing conditions, but do not give him extra clothes or blankets. He is provided three short “recreation” sessions a week—in handcuffs and leg irons—but those are often denied him. He is allowed three showers a week, again in handcuffs and leg irons. He has been denied access to medical care. A devout Muslim, he is not given the basic necessities for religious observances—his captors even refuse to tell him which way to face towards Mecca, an essential element of daily devotions. Letters from his wife and children are heavily censored. Privileged notes he has written to his lawyer have been confiscated and not returned. He is subjected to constant video surveillance. He was repeatedly interrogated, his lawyers say, but has not been interrogated for a year. His captors have repeatedly threatened his family, telling him that he would be sent to Egypt or Saudi Arabia, where he would be tortured and sodomized and his wife raped in front of him. According to the lawsuit, his captors falsely told him that, because of him, his father and four of his brothers were in jail, and that if he cooperated, they would be released.
Commentary - “Mr. al-Marri has been detained at a naval brig for two-and-a-half years in cell that is 9 feet by 6 feet,” says law professor Jonathan Hafetz, who will become one of al-Marri’s lawyers. “During that time he has long been denied books, news, any contact with the outside world other than his attorneys, including his wife and five children, who he has neither seen nor spoken to. I mean things that we don’t even do to people who’ve been convicted of crimes.” Fellner says: “It’s the combination of restrictions imposed on al-Marri that offends basic norms of decency. There is no security justification for them. The Pentagon apparently believes it can hold him under any conditions they choose for as long as they choose.” [Human Rights Watch, 8/8/2005; Associated Press, 8/9/2005; Al-Marri v. Rumsfeld, 8/9/2005 ; CNN, 12/13/2005]
Military Denies Mistreatment - The military denies that al-Marri has been mistreated. [CNN, 12/13/2005] Defense spokesman Navy Lieutenant Commander J. D. Gordon says in 2007, “The government in the strongest terms denies allegations of torture, allegations made without support and without citing a shred of record evidence. It is our policy to treat all detainees humanely.” [Progressive, 3/2007]
FBI Director Robert Mueller tells an audience at an InfraGard convention, “Those of you in the private sector are the first line of defense.” InfraGard is an organization made up of private business executives and employees who work with the FBI in counterterrorism, surveillance, and other areas (see 1996-2008). Mueller urges InfraGard members to contact the FBI if they “note suspicious activity or an unusual event.” And he urges members to inform the FBI about “disgruntled employees who will use knowledge gained on the job against their employers.” After the convention, Muller says of InfraGard, “It’s a great program.” [Progressive, 2/7/2008]
Former leaders of the 9/11 Commission, Thomas Kean and Lee Hamilton, release a statement saying that panel staff members have found no documents or other witnesses that support allegations that hijacker Mohamed Atta was identified by a secret Pentagon program, known as Able Danger, before the 9/11 attacks. The existence of Able Danger first received wide public attention a few days before by the New York Times (see August 11, 2005). According to the commissioners, “The interviewee had no documentary evidence” to back up his claims and “the Commission staff concluded that the officer’s account was not sufficiently reliable to warrant revision of the report or further investigation.” [Thomas H. Kean and Lee H. Hamilton, 8/12/2005 ; Washington Post, 8/13/2005]
Deputy Attorney General James Comey, who has already tendered his resignation, gives his farewell speech to an assemblage in the Justice Department. Comey makes what author and reporter Charlie Savage will later call “a cryptic reference to the fights over warrantless surveillance and torture issues that he had fought alongside [former Office of Legal Counsel chief Jack] Goldsmith and the other non-team players” (see Late 2003-2005 and June 17, 2004). Comey tells the assembled employees that, during his tenure, he had dealt with issues that “although of consequence almost beyond my imagination, were invisible because the subject matter demanded it.” In these disputes, he says he worked with people whose loyalty “to the law… would shock people who are cynical about Washington.” Those people, he says, “came to my office, or my home, or called my cell phone late at night, to quietly tell me when I was about to make a mistake; they were people committed to getting it right—and to doing the right thing—whatever the price. These people know who they are. Some of them did pay a price for their commitment to [do] right, but they wouldn’t have it any other way.” [US Department of Justice, 8/15/2005; Consortium News, 2/8/2006; Savage, 2007, pp. 199] Comey will later testify that one of the people he is referring to is former Justice Department lawyer Patrick Philbin. [Savage, 2007, pp. 199]
A protester holds a sign signifying his agreement with Pat Robertson’s call to assassinate Venezuela’s Hugo Chavez. [Source: Foreign Policy Magazine]Right-wing Christian broadcaster Pat Robertson, a former Republican candidate for president, tells his viewing audience that the US should assassinate Venezuelan President Hugo Chavez. Robertson makes his statement on The 700 Club, the flagship broadcast of his Christian Broadcast Network. The US should assassinate Chavez to prevent Venezuela from becoming “a launching pad for communist infiltration and Muslim extremism.” Robertson says: “We have the ability to take him out, and I think the time has come that we exercise that ability. We don’t need another $200 billion war to get rid of one, you know, strong-arm dictator [referring to Iraq’s Saddam Hussein]. It’s a whole lot easier to have some of the covert operatives do the job and then get it over with.… You know, I don’t know about this doctrine of assassination, but if he thinks we’re trying to assassinate him, I think that we really ought to go ahead and do it. It’s a whole lot cheaper than starting a war… and I don’t think any oil shipments will stop.” [Associated Press, 8/22/2005; Foreign Policy, 10/22/2010]
Former members of the 9/11 Commission dismiss recent allegations regarding a secret military intelligence unit called Able Danger, which had been set up in 1999 to bring together information about al-Qaeda. Several former members of the unit have come forward claiming the program identified Mohamed Atta and three other 9/11 hijackers more than a year before the attacks (see August 17, 2005; August 22-September 1, 2005). The 9/11 Commission has been criticized for not mentioning Able Danger in its final report. In response, its former chairman, Thomas Kean, claims there is no evidence that anyone in the government knew about Mohamed Atta before 9/11, and there are no documents that verify the claims made by former members of the unit. However, the Pentagon has recently confirmed that documents associated with Able Danger were destroyed in accordance with regulations about gathering intelligence on people inside the US. Another former commissioner, Slade Gorton, says, “Bluntly, it just didn’t happen and that’s the conclusion of all 10 of us.” But a spokesman for Representative Curt Weldon (R-PA), who helped bring to light the existence of the program, says that none of the commissioners met with anyone from Able Danger, “yet they choose to speak with some form of certainty without firsthand knowledge.” [Associated Press, 9/15/2005; Fox News, 9/16/2005] The commission’s claim that no one in the US knew about Mohamed Atta before 9/11 is further contradicted by reports stating that the CIA had been tracking him while he was still in Germany, early in 2000 (see January-May 2000). And soon after 9/11, Newsweek reported US officials stating that Atta “had been known as [an associate] of Islamic terrorists” well before 9/11. [Newsweek, 9/20/2001 ]
The six-way talks over North Korea’s nuclear program (see August 2003 and Spring and Summer 2005) finally bear fruit: all participants, including North Korea and the US, agree to “the verifiable denuclearization of the Korean Peninsula in a peaceful manner.” The North Koreans had insisted that they were entitled to receive light-water nuclear reactors in return for disarming, a central provision of the 1994 Agreed Framework (see October 21, 1994). The US refused to agree, and the Chinese brokered a compromise statement in which North Korea “stated that it has the right to peaceful uses of nuclear energy” and that the “other parties expressed their respect” and will discuss the reactor demand “at an appropriate time.” But Bush administration conservatives, furious at the agreement, prevail on President Bush to modify the US’s position. The White House forces US negotiator Christopher Hill to read a hard-line statement written by Bush conservatives that defines the “appropriate time” for the reactor discussions as being after North Korea has unilaterally disarmed. Simultaneously, the Treasury Department announces its imposition of sanctions on an Asian bank for allegedly laundering North Korean funds. The North Koreans respond by walking out of the negotiations, leaving the agreement unsigned. They will not return to negotiations for 15 months. [BBC, 12/2007; Scoblic, 2008, pp. 244]
In their book The Next Attack, Daniel Benjamin, a fellow at the Center for Strategic and International Studies, and co-author Steven Simon write that neoconservative Laurie Mylroie’s theories about Iraq being behind every terrorist attack on the US since 1993 (see October 2000 and September 12, 2001) are simply unbelievable. They write: “Mylroie’s work has been carefully investigated by the CIA and the FBI.… The more knowledgeable analysts and investigators at the CIA and FBI believe that their work conclusively disproves Mylroie’s claims.” [Unger, 2007, pp. 216]
In an essay for the Virginia Law Review entitled “Liberalism, Torture, and the Ticking Bomb,” Georgetown law professor David Luban dismantles the familiar argument that torture of a detainee might be necessary to stop the so-called “ticking bomb scenario.” Author and former White House counsel John Dean, who quotes Luban in his 2006 book Conservatives Without Conscience, will describe the scenario and its ramifications thusly: “A nuclear bomb has been planted in the heart of a major American city and authorities have in custody a person who knows where it is located. To save possibly millions of lives, would it not be justified to torture this individual to get the necessary information to stop it? Absolutely. Is not this lesser evil justified? Of course it is. And this argument is a wonderful means to comfort those who have moral problems with torture. Its beauty is that once you concede there are circumstances in which torture might be justified, morally and legally… you are on the other side of the line. You’ve joined the torture crowd. To paraphrase [George W.] Bush, you’ve joined the evildoers.” Dean calls it “a bogus argument, a rhetorical device. It is seductively simple, and compellingly logical. But it is also pure fantasy.” The likelihood of such conditions are extremely remote, Dean writes, on the order of a giant meteor striking the Earth. Dean will cite Luban’s arguments as counters to the scenario. Luban writes, “[T]here are certain situations so monstrous that the idea that the processes of moral rationality could yield an answer in them is insane… to spend time thinking what one would decide if one were in such a situation is also insane, if not actually frivolous.” Luban notes that Senator John McCain (R-AZ), himself a victim of torture during the Vietnam War (see October 1, 2005 and November 21, 2005), “has said that ultimately the debate is over who we are. We will never figure that out until we stop talking about ticking bombs, and stop playing games with words.” [Dean, 2006, pp. 165]
Senator John McCain (R-AZ), an ardent opponent of torture by US officials (see November 21, 2005), continues to press an amendment to a $440 billion defense appropriations bill that prohibits cruel, inhuman, and degrading treatment of prisoners held in US captivity (see July 24, 2005 and After). The bill also posits the US Army Field Manual as the uniform standard for interrogations by any Defense Department personnel. The Field Manual is being revised, and Pentagon sources have claimed the revisions will include a section on the importance of following the Geneva Conventions. The amendment is facing stiff opposition from the White House, which asserts that it would encroach on the power of the president as the commander in chief, and would threaten national security by reducing the ability of military interrogators to obtain critical intelligence from prisoners. On the floor of the Senate, McCain reads a letter from former Secretary of State Colin Powell, who had opposed Vice President Cheney on the issue of torture. Powell writes: “Our troops need to hear from Congress. The world will note that America is making a clear statement with respect to the expected future behavior of our soldiers.” McCain himself calls the White House’s legal theories on torture “strange,” and warns that enemies could use America’s justifications of torture as justifications for the torture of US captives. “We are Americans and we hold ourselves to humane standards of treatment of people no matter how evil or terrible they may be,” he says. Terrorists “don’t deserve our sympathy. But this isn’t about who they are. This is about who we are. These are the values that distinguish us from our enemies.” The White House continues to oppose the amendment. President Bush threatens to veto the entire bill, and Cheney circulates pro-torture talking points to friendly Congressional Republicans. Cheney, with CIA Director Porter Goss in tow, asks McCain to exempt CIA officials from the anti-torture amendment at the discretion of the president; McCain refuses. McCain is bolstered by a letter signed by over two dozen retired generals urging Congress to pass the amendment, including Powell and former Joint Chiefs chairman General John Shalikashvili. The amendment passes the Senate 90 to nine. However, the House leadership, steered by Speaker Dennis Hastert (R-IL), refuses to allow the amendment into the House version by refusing to let the House vote on it at all. It will take a House-Senate conference committee to decide the fate of the amendment. [Dubose and Bernstein, 2006, pp. 195; Savage, 2007, pp. 221]
On October 6, 2005, the FBI warns of al-Qaeda subway bombings in New York City. It is alleged that a terror plot will be put into motion “on or about October 9, 2005.” A counterterrorism official states that the warning is unnecessary: “There was no there there.” [Rolling Stone, 9/21/2006 ] It is later confirmed that New York City authorities had been aware of the threat for at least three days and had responded accordingly. Local TV station WNBC had been asked by federal authorities to hold the story back. [MSNBC, 6/4/2007] Meanwhile, Bush’s nomination of Harriet Miers to the Supreme Court is failing (see October 3-27, 2005). [Rolling Stone, 9/21/2006 ]
The Fourth Circuit Court of Appeals rules that President Bush, as commander in chief, can continue to hold Jose Padilla (see June 9, 2002), a US citizen arrested on US soil (see June 8, 2002), indefinitely as an enemy combatant. Padilla is to be treated the same as an American captured on a foreign battlefield (see June 28, 2004). The majority ruling is written by Judge J. Michael Luttig, often thought of as a potential Bush Supreme Court nominee. Luttig rules there is “no difference in principle between [Yaser Esam] Hamdi (see June 28, 2004) and Padilla.” Bush’s “powers include the power to detain identified and committed enemies such as Padilla, who associated with al-Qaeda and the Taliban regime, and who entered the United States for the avowed purpose of further prosecuting [terrorism] by attacking American citizens and targets on our own soil.” Luttig ignores the fact that Padilla has never been charged, much less convicted, of any crime. When the Bush administration later charges Padilla as an ordinary criminal—and does not charge him with with any of the terrorist activities it had long alleged he had committed—many administration critics will conclude that, just as in the Hamdi case, the administration had used inflammatory rhetoric and baseless charges to obtain a judicial decision it wanted (see October 10, 2004). When Luttig learns of the administration’s actions, he will issue a supplementary opinion excoriating the White House (see December 21, 2005). [Savage, 2007, pp. 200]
The New York Times again finds itself apologizing for its failures in covering the outing of Valerie Plame Wilson and its handling, or lack of handling, of the newspaper’s star reporter, Judith Miller, who recently testified as to her knowledge of the matter (see September 30, 2005). It also admits that much of Miller’s prewar reporting on Iraq was “totally wrong.” Although the paper’s publisher, Arthur Sulzberger, and its executive editor, Bill Keller, supported Miller’s decision to go to jail rather than reveal the source of her knowledge about Plame Wilson’s CIA identity (see July 6, 2005), neither knew many details of Miller’s conversations with her source, former White House aide Lewis “Scooter” Libby. Neither knew, for example, that Miller’s claim of not learning Plame Wilson’s identity from Libby was undermined by her own notes. Ultimately, both Sulzberger and Keller left most of the decisions on how to handle the situation to Miller herself. “This car had her hand on the wheel because she was the one at risk,” says Sulzberger. While Miller continues to portray her decision to go to jail as one rooted in principle, critics say that she and the Times were not protecting a whistleblower, but an administration source bent on crushing dissent. Asked what she regretted about the Times’s handling of the matter, managing editor Jill Abramson says, “The entire thing.”
'I Got It Totally Wrong' - Many in the newsroom and in the editorial staff believed that Miller’s prewar articles on Iraq’s WMD—articles that have long been proven to be based largely on false information from unreliable Iraqi defectors (see December 20, 2001, September 18, 2002, March 19-20, 2003, July 25, 2003, and Autumn 2003)—unfairly advanced the administration’s case for war. Miller operated with a level of autonomy other reporters found unusual and distressing, especially since many of them believed her reporting verged on administration propaganda. Investigative editor Douglas Frantz recalls that Miller once called herself “Miss Run Amok”; when he asked her what she meant, she replied, “I can do whatever I want.” Miller now admits her reports were largely specious. “WMD—I got it totally wrong,” she says. “The analysts, the experts, and the journalists who covered them—we were all wrong. If your sources are wrong, you are wrong. I did the best job that I could.”
Not a Clear-Cut Decision to Fight - Keller says: “I wish it had been a clear-cut whistle-blower case. I wish it had been a reporter who came with less public baggage.” Times reporter Todd Purdom says: “Everyone admires our paper’s willingness to stand behind us and our work, but most people I talk to have been troubled and puzzled by Judy’s seeming ability to operate outside of conventional reportorial channels and managerial controls. Partly because of that, many people have worried about whether this was the proper fight to fight.” For her part, Miller says she intends to take some time off and perhaps write a book about her ordeal. She says she wants to get back into investigative reporting, and continue to cover “the same thing I’ve always covered—threats to our country.” [New York Times, 10/16/2005]
Criticism of Miller, Times - The next day, columnist Norman Solomon will write, “It now seems that Miller functioned with more accountability to US military intelligence officials than to New York Times editors.” Solomon also notes that in her July 8, 2003 meeting with White House official Lewis Libby (see 8:30 a.m. July 8, 2003), Miller expressed frustration at the government’s refusal to allow her “to discuss with editors some of the more sensitive information about Iraq.” Solomon writes: “There’s nothing wrong with this picture if Judith Miller is an intelligence operative for the US government. But if she’s supposed to be a journalist, this is a preposterous situation—and the fact that the New York Times has tolerated it tells us a lot about that newspaper.” Solomon also notes that Miller’s claim of “analysts, the experts, and the journalists who covered them” were “all wrong” about Iraqi WMD is itself wrong. “Some very experienced weapons inspectors—including [the chief of the International Atomic Energy Agency] Mohamed ElBaradei, [former chief UN weapons inspector] Hans Blix, and [former UN weapons inspector] Scott Ritter—challenged key assertions from the White House,” he writes. “Well before the invasion, many other analysts also disputed various aspects of the US government’s claims about WMDs in Iraq.… Meanwhile journalists at some British newspapers, including The Independent and The Guardian, raised tough questions that were virtually ignored by mainstream US reporters in the Washington press corps.… [T]he Times did not ‘fall for misinformation’ as much as jump for it. The newspaper eagerly helped the administration portray deceptions as facts.” [CounterPunch, 10/17/2005] Liberal columnist and blogger Arianna Huffington provides a long list of reporters and publications who “didn’t get it wrong” on Iraqi WMD. She quotes reporter Joe Lauria, a veteran foreign affairs reporter who writes for the London Daily Mail, the Daily Telegraph, and the Boston Globe, who told her: “I didn’t get it wrong. And a lot of others who covered the lead up to the war didn’t get it wrong. Mostly because we weren’t just cozying up to Washington sources but had widened our reporting to what we were hearing from people like Mohamed ElBaradei and Hans Blix, and from sources in other countries, like Germany, France, and Russia. Miller had access to these voices, too, but ignored them. Our chief job as journalists is to challenge authority. Because an official says something might make it ‘official,’ but it doesn’t necessarily make it true.” [Huffington Post, 10/21/2005]
Entity Tags: Lewis (“Scooter”) Libby, Douglas Frantz, Bill Keller, Arthur Sulzberger, Arianna Huffington, Jill Abramson, Judith Miller, Norman Solomon, New York Times, Todd Purdom, Joe Lauria
Timeline Tags: Events Leading to Iraq Invasion
The White House continues to fight against the McCain anti-torture amendment (see October 1, 2005). Vice President Cheney and CIA Director Porter Goss meet privately with Senator John McCain (R-AZ), the primary sponsor of the amendment, for 45 minutes to push a change in the language that would exempt CIA interrogators from the amendment’s restrictions. In 2007, author and reporter Charlie Savage will write on the remarkable aspects of Cheney’s requests. For the first time, the CIA would be “clearly authorize[d] to engage in abusive interrogations. In effect, it would legalize the abuse of detainees in CIA prisons, a matter that had previously been a gray area at best.” McCain flatly rejects Cheney’s proposal, and later says: “I don’t see how you could possibly agree to legitimizing an agent of the government engaging in torture. No amendment at all would be better than that.” [Savage, 2007, pp. 220]
The American Civil Liberties Union (ACLU) releases a report that documents the death of 44 detainees in Iraq and Afghanistan while in US custody. Most died during interrogation. The report, based on government reports (including autopsy reports, death reports, and other documents turned over to the ACLU through a Freedom of Information Act request), finds that “detainees were hooded, gagged, strangled, beaten with blunt objects, subjected to sleep deprivation, and to hot and cold environmental conditions.” ACLU director Anthony Romero says: “There is no question that US interrogations have resulted in deaths. High-ranking officials who knew about the torture and sat on their hands and those who created and endorsed these policies must be held accountable. America must stop putting its head in the sand and deal with the torture scandal that has rocked our military.” The detainees died during or after interrogations by Navy SEALs, military intelligence officials, and “OGA” (Other Governmental Agency) personnel, a designation the ACLU says is usually used to refer to the CIA. Twenty-one of the 44 deaths were homicides, the ACLU says. Eight died from abusive techniques; autopsy reports show the causes of death were “strangulation,” “asphyxiation,” and “blunt force injuries.” Most of the “natural deaths” were attributed to what government doctors termed “Arteriosclerotic Cardiovascular Disease.” The ACLU notes that the report proves that detainees died not only at the hands of CIA personnel, but from abuse and maltreatment by Navy SEALs and military intelligence officials as well. The report cites, among other deaths, an Iraqi prisoner who died from hypothermia (see April 5, 2004), an Iraqi prisoner who was strangled and beaten to death (see January 9, 2004), an Iraqi general who died from smothering and “chest compressions” (see November 26, 2003), an Iraqi prisoner beaten and smothered to death (see Between 4:30 a.m. and 5:30 a.m. November 4, 2003), two Afghani civilians beaten to death by US soldiers (see November 6, 2003 and December 10, 2002), and an older Iraqi man strangled to death while in US custody (see June 5, 2003). ACLU lawyer Amrit Singh says: “These documents present irrefutable evidence that US operatives tortured detainees to death during interrogations. The public has a right to know who authorized the use of torture techniques and why these deaths have been covered up.” [American Civil Liberties Union, 10/24/2005]
The media learns that Vice President Dick Cheney and staffers from the Office of the Vice President (OVP) regularly interfered with the Senate Intelligence Committee’s 2004 report on the intelligence community’s failures to accurately assess Iraq’s WMD threat (see July 9, 2004). According to administration and Congressional sources, that interference was facilitated and encouraged by committee chairman Pat Roberts (R-KS). Cheney and the OVP members regularly intervened in the committee’s deliberations, and drastically limited the scope of the investigation.
Protecting the Bush Administration - Reporter Laura Rozen will later write, “In order to prevent the White House and the Office of the Vice President itself from ever coming under any Congressional oversight scrutiny, Cheney exerted ‘constant’ pressure on [Roberts] to stall an investigation into the Bush administration’s use of flawed intelligence on Iraq.” Cheney and the OVP also withheld key documents from the committee. Some of the withheld materials included portions of then-Secretary of State Colin Powell’s February 2003 address to the United Nations (see February 5, 2003) that were written by Cheney’s then-chief of staff, Lewis Libby, and documents that Libby used to make the administration’s case for war with Iraq. The OVP also withheld the Presidential Daily Briefing (PDB) documents: written intelligence summaries provided to President Bush by the CIA. The decision to withhold the documents was spearheaded by Cheney’s chief legal counsel and chief of staff David Addington. Much of the withheld material, and Cheney-OVP interference, was designed to keep the committee from looking into the Bush administration’s use of intelligence findings to promote the war. According to committee member John D. Rockefeller (D-WV), Cheney attended regular policy meetings in which he gave White House orders to Republican committee staffers. It is “not hearsay,” Rockefeller says, that Cheney pushed Roberts to, in reporter Jonathan Landay’s words, “drag out the probe of the administration’s use of prewar intelligence.” The committee chose to defer the second portion of its report, about the administration’s use of intelligence to propel the nation to war, until after the November 2004 elections. That portion of the report remains uncompleted.
Shifting the Blame to the White House - Reporter Murray Waas writes, “Had the withheld information been turned over, according to administration and Congressional sources, it likely would have shifted a portion of the blame away from the intelligence agencies to the Bush administration as to who was responsible for the erroneous information being presented to the American public, Congress, and the international community.” He continues: “When the [report] was made public, Bush, Cheney, and other administration officials cited it as proof that the administration acted in good faith on Iraq and relied on intelligence from the CIA and others that it did not know was flawed. But some Congressional sources say that had the committee received all the documents it requested from the White House the spotlight could have shifted to the heavy advocacy by Cheney’s office to go to war. Cheney had been the foremost administration advocate for war with Iraq, and Libby played a central staff role in coordinating the sale of the war to both the public and Congress.” [National Journal, 10/27/2005; Wilson, 2007, pp. 381]
Entity Tags: Office of the Vice President, John D. Rockefeller, George W. Bush, David S. Addington, Colin Powell, Bush administration (43), Jonathan Landay, Murray Waas, Laura Rozen, Senate Intelligence Committee, Lewis (“Scooter”) Libby, Richard (“Dick”) Cheney, Pat Roberts
Timeline Tags: Events Leading to Iraq Invasion
In light of the indictment of Lewis “Scooter” Libby (see October 28, 2005), the Center for American Progress (CAP) puts out an analysis of Libby’s role as Vice President Dick Cheney’s chief of staff, and the impact Libby has had on Bush administration policies. Libby, a powerful and influential neoconservative, “has been one of the most important men pulling the levers behind the Bush administration,” the article finds. “From the very beginning of the administration, Libby has essentially been Dick Cheney’s Dick Cheney.” But, the article goes on to note: “[w]hat few have realized at this historic moment is that for the past four and a half years, Libby has been ‘scooting’ from scandal to scandal. Libby has been at center stage for the other major national security scandals of the Bush administration, including the Iraq intelligence debacle, the secret meetings about Halliburton contracts, and doubtless others we have not heard of yet. It was Libby—along with Paul Wolfowitz, Doug Feith, and a handful of other top aides at the Pentagon and White House—who convinced the president that the US should go to war in Iraq. It was Libby who pushed Cheney to publicly argue that Saddam Hussein had ties to al-Qaeda and 9/11. It was also Libby who prodded former Secretary of State Colin Powell to include specious reports about an alleged meeting between 9/11 terrorist Mohamed Atta and an Iraqi intelligence official in Powell’s February 2003 speech to the United Nations” (see February 5, 2003). Libby co-authored the controversial Defense Planning Guidance document of 1988 (see February 18, 1992) that called on the US to essentially transform itself into an aggressive empire, using its military to stretch its power around the world. “This Planning Guidance document went a long way toward endearing Libby to Cheney,” the CAP article reads. There is also evidence that Libby helped steer no-bid Iraqi reconstruction contracts to Cheney’s former firm, Halliburton. The article concludes, “Given the depth of his influence in shaping the White House agenda over the past four and a half years, losing Libby today is not only a huge blow to the vice president, but to the entire Bush administration.” [Center for American Progress, 10/28/2005]
David Addington. [Source: Richard A. Bloom / Corbis]David Addington, the chief counsel for Vice President Dick Cheney, is named Cheney’s chief of staff to replace Lewis “Scooter” Libby, who was convicted of perjury and obstruction of justice in the Valerie Plame Wilson case (see February 13, 2002). [National Journal, 10/30/2005; MSNBC, 11/4/2005] Addington is described by one White House official as “the most powerful man you never heard of.” A former Justice Department official says of Addington, “He seems to have his hand in everything, and he has these incredible powers, energy, reserves in an obsessive, zealot’s kind of way.” He is, according to former Solicitor General Theodore Olson, Cheney’s “eyes, ears, and voice.” [US News and World Report, 5/21/2006] Addington is a neoconservative ideologue committed to dramatically expanding the power of the presidency, and a powerful advocate of the “unitary executive” theory of presidential power. He has been with Cheney for years, ever since Cheney chose him to serve as the Pentagon’s chief counsel while Cheney was Defense Secretary under Ronald Reagan. During that time, Addington was an integral part of Cheney’s battle to keep the Iran-Contra scandal from exploding (see 1984). [Washington Post, 10/11/2004; National Journal, 10/30/2005; MSNBC, 11/4/2005; US News and World Report, 5/21/2006] According to Larry Wilkerson, the former chief of staff to former Secretary of State Colin Powell, documentary evidence shows that Cheney’s office, and Addington in particular, were responsible for giving at least tacit approval for US soldiers to abuse and torture prisoners in Iraq (see January 9, 2002). In an administration devoted to secrecy, Addington stands out in his commitment to keeping information away from the public. [Washington Post, 10/11/2004] Though Addington claims to have a lifelong love affair with the Constitution, his interpretation of it is somewhat unusual. One senior Congressional staffer says, “The joke around here is that Addington looks at the Constitution and sees only Article II, the power of the presidency.” [US News and World Report, 5/21/2006] Addington’s influence in the White House is pervasive. He scrutinizes every page of the federal budget, hunting for riders that might restrict the power of the president. He worked closely with Gonzales to oppose attempts by Congress to pry information from the executive branch, and constantly battles the State Department, whose internationalist philosophy is at odds with his and Cheney’s own beliefs. [Washington Post, 10/11/2004] Former Reagan Justice Department official Bruce Fein calls Addington the “intellectual brainchild” of overreaching legal assertions that “have resulted in actually weakening the presidency because of intransigence.” According to Fein, Addington and Cheney are doing far more than reclaiming executive authority, they are seeking to push it farther than it has ever gone under US constitutional authority. They have already been successful in removing executive restraints formerly in place under the War Powers Act, anti-impoundment legislation, the legislative veto and the independent counsel statute. “They’re in a time warp,” Fein says. “If you look at the facts, presidential powers have never been higher.” [Washington Post, 10/11/2004] “He thinks he’s on the side of the angels,” says a former Justice Department official. “And that’s what makes it so scary.” [US News and World Report, 5/21/2006]
Entity Tags: Saddam Hussein, US Department of State, Theodore (“Ted”) Olson, US Department of Justice, US Department of Defense, Ronald Reagan, Lewis (“Scooter”) Libby, National Security Council, Bruce Fein, Bradford Berenson, 9/11 Commission, Richard (“Dick”) Cheney, David S. Addington, John Bellinger, Jack Goldsmith, Lawrence Wilkerson, John C. Yoo, Valerie Plame Wilson
Timeline Tags: Civil Liberties, Niger Uranium and Plame Outing
The Washington Post publishes an article about the severity of the damage done by the Plame Wilson CIA identity leak. The Post notes that the CIA has not yet completed its damage assessment, because it usually waits until criminal investigations have concluded. But when Plame Wilson and her front company, Brewster Jennings, were exposed as clandestine CIA entities, the damage was believed to have been widespread (see October 3, 2003, October 11, 2003, October 22-24, 2003, and October 23-24, 2003). CIA officials have compiled a long list of Plame Wilson’s contacts and friends both in the US and overseas who may have been exposed as her contacts. Current and former intelligence officials say there is no way to know if the leak has cost anyone their life as yet. Former CIA division chief Arthur Brown says: “Cover and tradecraft are the only forms of protection one has and to have that stripped away because of political scheming is the moral equivalent to exposing forward deployed military units. In the case of the military, they can pack up and go elsewhere. In the case of a serving clandestine officer, it’s the end of that officer’s ability to function in that role.” Representative Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee, says, “Blowing the cover of a CIA officer is the cardinal sin in the intelligence business: It could wipe out information networks and put lives at risk.” Certainly Plame Wilson’s ability to function as a clandestine CIA agent has forever been destroyed. Former senior CIA manager Mark Lowenthal says: “It’s possible that no damage was done [to national security] but she can never [work] overseas again.… You can only speculate that if she had foreign contacts, those contacts might be nervous and their relationships with her put them at risk. It also makes it harder for other CIA officers to recruit sources.” Ultimately, the public will never know just how extensive the damage may be. One intelligence official says, “You’ll never get a straight answer about how valuable she was or how valuable her sources were.” [Washington Post, 10/29/2005] The press is not yet aware of an in-house CIA assessment of the “severe” damage caused to the agency by the leak (see Before September 16, 2003).
According to a United Press International (UPI) report, special counsel Patrick Fitzgerald has sought and received documentation on the Iraq-Niger forgeries (see Between Late 2000 and September 11, 2001, Late September 2001-Early October 2001, October 15, 2001, December 2001, February 5, 2002, February 12, 2002, October 9, 2002, October 15, 2002, January 2003, February 17, 2003, March 7, 2003, March 8, 2003, and 3:09 p.m. July 11, 2003) from the Italian government. UPI reports, “Fitzgerald’s team has been given the full, and as yet unpublished report of the Italian parliamentary inquiry into the affair, which started when an Italian journalist obtained documents that appeared to show officials of the government of Niger helping to supply the Iraqi regime of Saddam Hussein with [y]ellowcake uranium.” (In November, that parliamentary report will be shown not to exist—see July 2005.) According to reporter Jason Leopold, the information about the Iraq-Niger documents being provided to Fitzgerald comes from NATO sources. Leopold’s reporting will later be shown to be less than reliable (see June 19, 2006). [Raw Story, 10/24/2005; Global Research, 10/29/2005; CounterPunch, 11/9/2005]
Vice President Cheney appears at the weekly Republican senatorial luncheon in the Capitol and speaks against the McCain anti-torture amendment (see October 1, 2005 and October 20, 2005). He argues that CIA interrogations of high-value al-Qaeda prisoners have produced valuable information, and the president needs the power and flexibility to use torture against prisoners in order to fight terrorism and protect the nation. Senator John McCain (R-AZ), the primary sponsor of the amendment, counters Cheney’s arguments during the same luncheon, arguing that the idea of the US torturing prisoners damages its standing with its international allies. [Savage, 2007, pp. 220] The next day, the Washington Post will publish an expose of the CIA’s secret prison network (see November 2-18, 2005), causing a firestorm of criticism and sparking a former Bush administration official to say that the “philosophical guidance” behind the torture of prisoners comes directly from Cheney’s office (see November 3, 2005).
The White House continues to battle a Senate-approved amendment against torture (see October 1, 2005). Vice President Cheney, the administration’s strongest voice in favor of torture, gathers a group of Republican senators and gives what is later described as an impassioned plea to let the CIA torture when necessary. President Bush needs that option, Cheney argues, and a prohibition against torture may eventually cost the nation “thousands of lives.” He cites alleged 9/11 mastermind Khalid Shaikh Mohammed as one of torture’s success stories (see February 29 or March 1, 2003, Shortly After February 29 or March 1, 2003, and June 16, 2004). Cheney fails to tell the gathering that the US has overseen the torture of Mohammed’s wife and children, and that Mohammed was told that if he didn’t cooperate, his children would be subjected to further abuse (see After September 11, 2002). He also fails to tell them that the information elicited from Mohammed was considered unreliable (see Summer 2003), and that many of Mohammed’s interrogators felt that torture merely hardened his resistance. During the meeting, John McCain (R-AZ), the author of the anti-torture amendment, tells Cheney, “This is killing us around the world.” On November 4, the Republican House leadership postpones a vote on the amendment when it realizes the amendment will pass overwhelmingly. [Dubose and Bernstein, 2006, pp. 196]
The press learns that UN Ambassador John Bolton was contacted in May 2003 by Lewis Libby to find out who sent former ambassador Joseph Wilson on a fact-finding mission to Niger (see February 21, 2002-March 4, 2002 and May 29, 2003). Bolton was the undersecretary of state for arms control and international security affairs when Libby contacted him. The progressive news Web site Raw Story learns of the Bolton contact from lawyers involved in the investigation of the Plame Wilson identity leak, and from documents posted on the investigation’s Web site. The lawyers say that two former Libby aides, John Hannah and David Wurmser, informed special counsel Patrick Fitzgerald of Libby’s inquiry to Bolton (see Before October 17, 2005 and Before October 19, 2005). At the time, Wurmser was on loan from Bolton’s office and serving as a Middle Eastern affairs aide to Vice President Dick Cheney and Libby. Both Hannah and Wurmser have been cooperating with Fitzgerald’s investigation, the lawyers say. MSNBC has reported that Bolton testified before the Plame Wilson grand jury. Wurmser, the lawyers say, has been cooperating for fear that he would be charged for his role in leaking Valerie Plame Wilson’s CIA identity; Hannah began cooperating after learning that he had been identified by witnesses as a co-conspirator in the leak. Raw Story writes: “It is unclear whether Bolton played any other role in the Plame outing, but his connection to the Iraq uranium claims certainly gave him a motive to discredit Wilson, who had called into question the veracity of the Niger documents. A probe by the State Department inspector general revealed that Bolton’s office was responsible for the placement of the Niger uranium claims in the State Department’s December 2002 ‘fact sheet’ on Iraq’s WMD program.” The lawyers say it is doubtful that the information Hannah and Wurmser have provided will ever be made public, but their information was crucial to Fitzgerald’s investigation because it allowed him “to put together a timeline that showed how various governmental agencies knew about Plame [Wilson]‘s covert CIA status.” [Raw Story, 11/2/2005]
The FBI terminates its two-year investigation into who disseminated the forged documents that alleged Iraq attempted to purchase uranium from Niger (see Between Late 2000 and September 11, 2001, Late September 2001-Early October 2001, October 15, 2001, December 2001, February 5, 2002, February 12, 2002, October 9, 2002, October 15, 2002, January 2003, February 17, 2003, March 7, 2003, March 8, 2003, and 3:09 p.m. July 11, 2003). Italian intelligence chief Nicolo Pollari has confirmed that former Italian intelligence agent Rocco Martino disseminated the documents (see November 3, 2005). FBI chief Robert Mueller has praised Pollari and SISMI’s cooperation with the bureau’s investigation. In part because of information provided by SISMI to the FBI, the bureau concludes that the forgeries were produced by a person or persons for personal profit, and rules out any possibility that SISMI attempted to influence US policies. The Italian newspaper La Repubblica has published a three-part investigative series claiming Pollari had knowingly provided the US and Great Britain with the forgeries (see October 16, 2001, October 18, 2001, December 9, 2001, and September 9, 2002), perhaps at the behest of Italian Prime Minister Silvio Berlusconi, who it says was said to be eager to help President Bush in the search for weapons in Iraq (see (After October 18, 2001)). Berlusconi has denied any involvement. [New York Times, 11/4/2005]
General Nicolo Pollari, the head of Italy’s military intelligence agency SISMI, identifies former SISMI agent and information peddler Rocco Martino as the disseminator of forged documents that alleged Iraqi attempts to buy uranium from Niger (see March 2000, Late June 2002, Afternoon October 7, 2002, and Summer 2004). Pollari discloses Martino’s identity in closed-door hearings conducted by the Italian parliament. Senator Massimo Brutti tells reporters that Martino is a former SISMI agent who had been “kicked out of the agency.” Brutti also tells reporters that Italy attempted to warn the US that the documents were forgeries, but then retracts the claim (see November 3, 2005). Senator Luigi Malabarba, another participant in the hearing, tells reporters that according to Pollari, Martino was “offering the documents not on behalf of SISMI but on behalf of the French,” and that Martino told prosecutors in Rome that he was in the service of French intelligence. A senior French intelligence official refuses to say whether Martino has ever been a paid agent of French intelligence, but calls Pollari’s assertions about France’s involvement in the document dissemination “scandalous.” Pollari denies any involvement in the document forging or dissemination by SISMI. [New York Times, 11/4/2005]
The US charges British citizen Binyam Ahmed Mohamed (see May-September, 2001), who has allegedly used the aliases Talha al-Kini, Foaud Zouaoui, Taha al-Nigeri, and John Samuel, with conspiracy to foment and carry out terrorist attacks against US targets. Mohamed, who was arrested in Pakistan in April 2002, is charged with “attacking civilians; attacking civilian objects; murder by an unprivileged belligerent; destruction of property by an unprivileged belligerent; and terrorism,” though the charge sheet is unclear whether Mohamed carried out any of these actions himself, or whether he was part of a larger conspiracy by the al-Qaeda terrorist organization. The charges allege links between Mohamed and “shoe bomber” Richard Reid (see December 22, 2001), radical Islamist Abu Zubaida, 9/11 plotter Khalid Shaikh Mohammed, and alleged “dirty bomber” Jose Padilla. Mohamed is alleged to have been part of the Padilla bomb plot. [US Defense Department, 11/4/2005 ] Much of the evidence against Mohamed comes from confessions he allegedly made while in US custody at the detention camp at Bagram Air Force Base (see January-September 2004), and in Guantanamo Bay (see September 2004 and After). He was also held in Pakistan (see April 10-May, 2002 and May 17 - July 21, 2002), and “rendered” to a secret prison in Morocco (see July 21, 2002 -- January 2004). Through his lawyers, Mohamed has claimed that he was tortured in all four detention sites. The British judiciary will later establish that British officials facilitated Mohamed’s interrogation in Pakistan, and had “full knowledge of the reported conditions of his detention and treatment” (see February 24, 2009). [Guardian, 2/5/2009] As with Padilla, the charges relating to the “dirty bomb” plot will later be dropped due to lack of evidence, and all charges against Mohamed will eventually be dropped (see October-December 2008 and February 4, 2009).
McCain speaking against torture on Fox News. [Source: Daily Gadfly (.com)]Senator John McCain (R-AZ), a former prisoner of war during the Vietnam War and a victim of torture, writes an impassioned op-ed for Newsweek exhorting the US not to resort to torture in its interrogations of terror suspects. He writes: “I do, respectfully, take issue with the position that the demands of this war require us to accord a lower station to the moral imperatives that should govern our conduct in war and peace when they come in conflict with the unyielding inhumanity of our vicious enemy.… We should not torture or treat inhumanely terrorists we have captured. The abuse of prisoners harms, not helps, our war effort.”
Produces False Information - He gives numerous reasons: abusing prisoners does not produce reliable information, but instead “often produces bad intelligence because under torture a person will say anything he thinks his captors want to hear—whether it is true or false—if he believes it will relieve his suffering.” McCain recounts his own example of providing false information under torture, giving his captors the names of the Green Bay Packers’ offensive line instead of the names of his flight squadron. “It seems probable to me that the terrorists we interrogate under less than humane standards of treatment are also likely to resort to deceptive answers that are perhaps less provably false than that which I once offered.”
Betrays America's 'Commitment to Basic Humanitarian Values' - Moreover, McCain writes, America’s “commitment to basic humanitarian values affects—in part—the willingness of other nations to do the same. Mistreatment of enemy prisoners endangers our own troops who might someday be held captive.” We cannot expect al-Qaeda and other such enemies to be “bound by the principle of reciprocity,” but “we should have concern for those Americans captured by more traditional enemies, if not in this war then in the next.” Global public criticism of North Vietnam’s brutality towards US prisoners resulted in a substantial decrease in their abuse of POWs. The war against terrorism is “a war of ideas,” he writes, “a struggle to advance freedom in the face of terror in places where oppressive rule has bred the malevolence that creates terrorists. Prisoner abuses exact a terrible toll on us in this war of ideas. They inevitably become public, and when they do they threaten our moral standing, and expose us to false but widely disseminated charges that democracies are no more inherently idealistic and moral than other regimes.” To defeat the idea of terrorism, “we must prevail in our defense of American political values as well. The mistreatment of prisoners greatly injures that effort.”
'We Are Different and Better than Our Enemies' - McCain writes that while he does not “mourn the loss of any terrorist’s life… [w]hat I do mourn is what we lose when by official policy or official neglect we allow, confuse, or encourage our soldiers to forget that best sense of ourselves, that which is our greatest strength—that we are different and better than our enemies, that we fight for an idea, not a tribe, not a land, not a king, not a twisted interpretation of an ancient religion, but for an idea that all men are created equal and endowed by their Creator with inalienable rights.”
Waterboarding Is Torture - McCain states flatly that any interrogation technique that simulates an execution, including waterboarding, is torture. “[I]f you gave people who have suffered abuse as prisoners a choice between a beating and a mock execution, many, including me, would choose a beating. The effects of most beatings heal. The memory of an execution will haunt someone for a very long time and damage his or her psyche in ways that may never heal. In my view, to make someone believe that you are killing him by drowning is no different than holding a pistol to his head and firing a blank. I believe that it is torture, very exquisite torture.”
Exceptions Do Not Require New Laws - There is always the extreme circumstance bandied about in discussions: what should be done with a terror suspect who holds critical information about an imminent terrorist attack? While such an extreme circumstance may well require extreme interrogation methods, McCain writes, “I don’t believe this scenario requires us to write into law an exception to our treaty and moral obligations that would permit cruel, inhumane, and degrading treatment. To carve out legal exemptions to this basic principle of human rights risks opening the door to abuse as a matter of course, rather than a standard violated truly in extremis. It is far better to embrace a standard that might be violated in extraordinary circumstances than to lower our standards to accommodate a remote contingency, confusing personnel in the field and sending precisely the wrong message abroad about America’s purposes and practices.” [Newsweek, 11/21/2005]
The Supreme Court declines, without comment, to hear the case (see August 4, 2005) brought by former FBI translator Sibel Edmonds. [New York Times, 11/28/2005; Reuters, 11/28/2005] The decision puts an end to Edmonds’ legal efforts to hold the bureau accountable for its failure to address several security issues raised by Edmonds in late 2001 and early 2002 (see December 2, 2001 and Afternoon February 12, 2002, respectively). On August 4, Edmonds had filed a petition with the Supreme Court asking it “to provide guidance to the lower courts about the proper scope and application of the state secrets privilege (see March 9, 1953), and to prevent further misuse of the privilege to dismiss lawsuits at the pleading stage.” The petition also urged the court to affirm that the press and public may not be barred from court proceedings in civil cases without just cause. (In May, the federal appeals court had closed the courtroom to the public and media.) Had the Supreme Court had ruled in favor of Edmonds, she would have been able to return to the lower courts and start her case again. [Petition for a writ of certiorari. Sibel Edmonds v. Department of Justice, et all., 8/4/2005, pp. 2 ; Government Executive, 8/8/2005]
Members of the 9/11 Commission, issuing their final report on progress made in meeting the commission’s earlier recommendations, give the Bush administration a grade of “D” in its nonproliferation efforts. The administration has wholly failed to help Russia secure loose nuclear materials and actual weapons, the commission finds (see January 10, 2001 and After and June 2005). President Bush needs to make nonproliferation a priority, to “ride herd on the bureaucracy” and engage in “a maximum effort” to ensure the US’s nuclear security. “Given the potential for catastrophic destruction,” the commission members find, “our current efforts fall far short of what we need to do.” [Scoblic, 2008, pp. 210]
Author and Vanity Fair reporter Craig Unger interviews Michael Ledeen regarding the false claims that Iraq attempted to purchase massive amounts of uranium from Niger (see Between Late 2000 and September 11, 2001, Late September 2001-Early October 2001, October 15, 2001, December 2001, February 5, 2002, February 12, 2002, October 9, 2002, October 15, 2002, January 2003, February 17, 2003, March 7, 2003, March 8, 2003, and 3:09 p.m. July 11, 2003). Ledeen, a prominent neoconservative who holds the Freedom Chair at the American Enterprise Institute, is well known to have extensive ties to the Italian intelligence community and for his relationship with discredited Iranian arms merchant Manucher Ghorbanifar (see 1981 and December 9, 2001). Ledeen denies any involvement in promulgating the fraudulent uranium allegations. “I’m tired of being described as someone who likes fascism and is a warmonger,” he says. (Ledeen has written books and articles praising Italy’s Benito Mussolini, and wrote numerous articles in the run-up to the Iraq invasion calling for the US to forcibly overthrow numerous Middle Eastern governments along with Iraq’s—see September 20, 2001, December 7, 2001, and August 6, 2002.) “I think it’s obvious I have no clout in the administration. I haven’t had a role. I don’t have a role.” He barely knows White House political adviser Karl Rove, he says, and has “no professional relationship with any agency of the federal government during the Bush administration. That includes the Pentagon.” The facts contradict Ledeen’s assertions. Since before Bush’s inauguration, Rove has invited Ledeen to funnel ideas to the White House (see After November 2000). Former Pentagon analyst Karen Kwiatkowski says Ledeen “was in and out of [the Pentagon] all the time.” Ledeen is very close to David Wurmser, who held key posts in the Pentagon and State Department before becoming the chief Middle East adviser for Vice President Dick Cheney. Ledeen also has close ties to National Security Adviser Stephen Hadley. Of course, none of this proves or disproves his connections, if any, to the Iraq-Niger fabrications. [Unger, 2007, pp. 231]
Entity Tags: Manucher Ghorbanifar, Bush administration (43), American Enterprise Institute, Craig Unger, David Wurmser, Karen Kwiatkowski, Karl C. Rove, Stephen J. Hadley, Michael Ledeen, US Department of Defense, Richard (“Dick”) Cheney
Timeline Tags: Neoconservative Influence, Niger Uranium and Plame Outing
New York Times headline from article revealing NSA surveillance. [Source: CBS News]The New York Times reveals that after the 9/11 attacks, President Bush granted the National Security Agency (NSA) secret authorization to eavesdrop on Americans and others inside the US without going through the Foreign Intelligence Surveillance Act (FISA) court to obtain legal warrants (see Early 2002. The administration justifies its actions by claiming such eavesdropping, which includes wiretapping phones and reading e-mails, is necessary to find evidence of terrorist activities, and says the nation needs the program after the 9/11 attacks exposed deficiencies in the US intelligence community’s information gathering process, and because of what they characterize as the “handcuffing” of US intelligence agencies by restrictive laws. The Times has had the article for over a year; the White House prevailed on the Times not to publish its findings for that time, arguing that publication would jeopardize continuing investigations and warn potential terrorists that they were under scrutiny. Many believe that the White House wanted to delay the publication of the article until well after the 2004 presidential elections. The Times delayed publication for over a year, and agreed to suppress some information that administration officials say could be useful to terrorists. (Less than two weeks before the article is published, Bush tries to convince the Times not to print the article at all: see December 6, 2005.) Two days after the Times publishes its article, Bush will acknowledge the order, and accuse the Times of jeopardizing national security (see December 17, 2005). The NSA program eavesdrops without warrants on up to 500 people in the US at any given time, officials say; the overall numbers have likely reached into the thousands. Overseas, up to 7,000 people suspected of terrorist ties are being monitored. Officials point to the discovery of a plot by Ohio trucker and naturalized US citizen and alleged al-Qaeda supporter Iyman Faris to bring down the Brooklyn Bridge with blowtorches as evidence of the program’s efficacy. They also cite the disruption of an al-Qaeda plot to detonate fertilizer bombs outside of British pubs and train stations by the program. But, officials say, most people targeted by the NSA for warrantless wiretapping have never been charged with a crime, and many are targeted because of questionable evidence and groundless suspicion. Many raise an outcry against the program, including members of Congress, civil liberties groups, immigrant rights groups, and others who insist that the program undermines fundamental Constitutional protections of US citizens’ civil liberties and rights to privacy. Several other government programs to spy on Americans have been challenged, including the Federal Bureau of Investigation (FBI)‘s surveillance of US citizens’ library and Internet usage, the monitoring of peaceful antiwar protests, and the proposed use of public and private databases to hunt for terrorist links. In 2004, the Supreme Court overturned the administration’s claim that so-called “enemy detainees” were not entitled to judicial review of their indefinite detentions. Several senior officials say that when the warrantless wiretapping program began, it operated with few controls and almost no oversight outside of the NSA itself. The agency is not required to seek the approval of the Justice Department or anyone else outside the FISA court for its surveillance operations. Some NSA officials wanted nothing to do with a program they felt was patently illegal, according to a former senior Bush administration official. Internal concerns about the program prompted the Bush administration to briefly suspend the program while Justice Department officials audited it and eventually provided some guidelines for its operations. A complaint from Judge Colleen Kollar-Kotelly, the federal judge who oversees the FISA Court, helped spur the suspension, according to officials. Kollar-Kotelly questioned whether information obtained under the program was being improperly used as the basis for FISA wiretap warrant requests from the Justice Department. Some government lawyers say that the Justice Department may have deliberately misled Kollar-Kotelly and the FISA court about the program in order to keep the program under wraps. The judge insisted to Justice Department officials that any material gathered under the program not be used in seeking wiretap warrants from her court. The question also arose in the Faris case, when senior Justice Department officials worried that evidence obtained by warrantless wiretapping by the NSA of Faris could be used in court without having to lie to the court about its origins. [New York Times, 12/15/2005]
The House of Representatives overwhelmingly approves the Senate’s amendment to a defense appropriations bill that outlaws torture (see October 1, 2005 and November 1-4, 2005), 308-122, after the Republican House leadership stops blocking a vote on the amendment (see October 1, 2005). The next day, President Bush meets privately with the author of the amendment, Senator John McCain (R-AZ). In a surprising reversal of the White House’s opposition to the bill, Bush now says he supports the amendment—or will if McCain makes some changes. Bush asks McCain to alter the language of the amendment so that US intelligence officers, if charged with war crimes due to their abuse of a prisoner, can offer a defense that a “reasonable” person could conclude they were following a lawful order. McCain agrees. Bush and McCain hold a joint press conference to announce the White House’s support for the amendment (see December 15, 2005). The press bills the agreement between Bush and McCain as a serious setback for Vice President Cheney, the leader of the White House’s opposition to the bill, with the New York Times calling the vote a “stinging defeat” for Bush and a “particularly significant setback for Vice President Dick Cheney, who since July has led the administration’s fight to defeat the amendment or at least exempt the Central Intelligence Agency from its provisions” (see October 20, 2005). [Dubose and Bernstein, 2006, pp. 196; Savage, 2007, pp. 223]
Times executive editor Bill Keller. [Source: New York Times]The New York Times’s executive editor, Bill Keller, defends his paper’s decision to reveal the Bush administration’s warrantless wiretapping program, conducted through the NSA (see December 15, 2005), after holding the story for over a year. Keller writes: “We start with the premise that a newspaper’s job is to publish information that is a matter of public interest. Clearly a secret policy reversal that gives an American intelligence agency discretion to monitor communications within the country is a matter of public interest.… A year ago, when this information first became known to Times reporters, the administration argued strongly that writing about this eavesdropping program would give terrorists clues about the vulnerability of their communications and would deprive the government of an effective tool for the protection of the country’s security. Officials also assured senior editors of The Times that a variety of legal checks had been imposed that satisfied everyone involved that the program raised no legal questions. As we have done before in rare instances when faced with a convincing national security argument, we agreed not to publish at that time. We also continued reporting, and in the ensuing months two things happened that changed our thinking. First, we developed a fuller picture of the concerns and misgivings that had been expressed during the life of the program. It is not our place to pass judgment on the legal or civil liberties questions involved in such a program, but it became clear those questions loomed larger within the government than we had previously understood. Second, in the course of subsequent reporting we satisfied ourselves that we could write about this program—withholding a number of technical details—in a way that would not expose any intelligence-gathering methods or capabilities that are not already on the public record. The fact that the government eavesdrops on those suspected of terrorist connections is well-known. The fact that the NSA can legally monitor communications within the United States with a warrant from the Foreign Intelligence Surveillance Court is also public information. What is new is that the NSA has for the past three years had the authority to eavesdrop on Americans and others inside the United States without a warrant. It is that expansion of authority—not the need for a robust anti-terror intelligence operation—that prompted debate within the government, and that is the subject of the article.” [CNN, 12/16/2005]
President Bush acknowledges that he issued a 2002 executive order authorizing the National Security Agency (NSA) to wiretap US citizens’ phones and e-mails without proper warrants, and accuses the New York Times of jeopardizing national security by publishing its December 15 article (see Early 2002 and December 15, 2005). Bush says he was within the law to issue such an order, which many feel shatters fundamental Constitutional guarantees of liberty and privacy, but accuses the Times of breaking the law by publishing the article. Bush tells listeners during his weekly radio address that the executive order is “fully consistent” with his “constitutional responsibilities and authorities.” But, he continues, “Yesterday the existence of this secret program was revealed in media reports, after being improperly provided to news organizations. As a result, our enemies have learned information they should not have, and the unauthorized disclosure of this effort damages our national security and puts our citizens at risk.” He admits allowing the NSA to “to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations” in a program designed to “detect and prevent terrorist attacks.” Under the law, the NSA must obtain warrants from the Foreign Intelligence Surveillance Act (FISA) Court, but after Bush’s executive order, it was no longer required to do so. Bush justifies the order by citing the example of two 9/11 hijackers, Khalid Almihdhar and Nawaf Alhazmi, who, he says, “communicated while they were in the United States to other members of al-Qaeda who were overseas, but we didn’t know they were here until it was too late.” Because of the unconstitutional wiretapping program, it is “more likely that killers like these 9/11 hijackers will be identified and located in time, and the activities conducted under this authorization have helped detect and prevent possible terrorist attacks in the United States and abroad.” Bush also admits to reauthorizing the program “more than thirty times,” and adds, “I intend to do so for as long as our nation faces a continuing threat from al-Qaeda and related groups.” [CNN, 12/16/2005] Bush fails to address the likelihood that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).
After the NSA’s warrantless wiretapping program is revealed (see Early 2002 and December 15, 2005), some commentators criticize the program. Americans have fundamental Constitutional protections that are enforceable in court whether their conversations are domestic or international, says law scholar Geoffrey Stone. Stone says that President Bush’s emphasis that NSA wiretapping only takes place on US calls to overseas phones or overseas e-mails “is no different, as far as the law is concerned, from saying we only do it on Tuesdays.” Former FBI national security law chief Michael Woods, who served in the position when Bush signed the NSA directive, calls the program “very dangerous.” Though Woods says the program was justifiable in the immediate aftermath of 9/11, “[By now] we ought to be past the time of emergency responses. We ought to have more considered views now…. We have time to debate a legal regime and what’s appropriate.” [Washington Post, 12/18/2005] Kate Martin, director of the Center for National Security Studies, says the secret order may amount to Bush authorizing criminal activity in direct violation of FISA. “This is as shocking a revelation as we have ever seen from the Bush administration,” she says. “It is, I believe, the first time a president has authorized government agencies to violate a specific criminal prohibition and eavesdrop on Americans.” The American Civil Liberties Union’s Caroline Frederickson says of the program, “It’s clear that the administration has been very willing to sacrifice civil liberties in its effort to exercise its authority on terrorism, to the extent that it authorizes criminal activity.” [Washington Post, 12/16/2005]
Attorney General Alberto Gonzales and NSA chief Lieutenant General Michael Hayden conduct their own “briefing” on the recently revealed NSA wiretapping program (see December 15, 2005) with the White House press corps. Gonzales and Hayden make the following points:
Gonzales says that he will not discuss the internal workings of the still-classified program, only what he calls its “legal underpinnings.”
He claims that the program, which he calls “the most classified program that exists in the United States government,” is legal because President Bush authorized it, and says that the idea that “the United States is somehow spying on American citizens” is wrong: it is “[v]ery, very important to understand that one party to the communication has to be outside the United States.”
He says that for the NSA to eavesdrop on a US citizen’s telephone or e-mail communications, “we have to have a reasonable basis to conclude that one party to the communication is a member of al-Qaeda, affiliated with al-Qaeda, or a member of an organization affiliated with al-Qaeda, or working in support of al-Qaeda.” The wiretapping program is an essential part of the administration’s war against terror, he says.
He goes on to claim that “the authorization to use force, which was passed by the Congress in the days following September 11th, constitutes” legal grounds for “this kind of signals intelligence.” [White House, 12/19/2005] The White House signed Congress’s Authorization to Use Military Force (AUMF) into law on September 18, 2001 (see September 14-18, 2001. [White House, 9/18/2001]
Hayden Claims Supreme Court Backing - While he admits that the Congressional authorization to use force against international terrorism does not specifically mention any kind of electronic surveillance, he refers the listeners to the Supreme Court case concerning alleged US terrorist Yaser Esam Hamdi (see June 28, 2004), in which the Court ruled that Hamdi had the legal right to challenge his detention. “[T]he United States government took the position that Congress had authorized that detention in the authorization to use force, even though the authorization to use force never mentions the word ‘detention.’ And the Supreme Court, a plurality written by Justice O’Connor agreed. She said, it was clear and unmistakable that the Congress had authorized the detention of an American citizen captured on the battlefield as an enemy combatant for the remainder—the duration of the hostilities. So even though the authorization to use force did not mention the word, ‘detention,’ she felt that detention of enemy soldiers captured on the battlefield was a fundamental incident of waging war, and therefore, had been authorized by Congress when they used the words, ‘authorize the President to use all necessary and appropriate force.’ For the same reason, we believe signals intelligence is even more a fundamental incident of war, and we believe has been authorized by the Congress. And even though signals intelligence is not mentioned in the authorization to use force, we believe that the Court would apply the same reasoning to recognize the authorization by Congress to engage in this kind of electronic surveillance.”
Bush 'Very Concerned' With Protecting Civil Liberties - Gonzales insists, Bush “is very concerned about the protection of civil liberties, and that’s why we’ve got strict parameters, strict guidelines in place out at NSA to ensure that the program is operating in a way that is consistent with the President’s directives.” He adds, “[W]e feel comfortable that this surveillance is consistent with requirements of the Fourth Amendment. The touchstone of the Fourth Amendment is reasonableness, and the Supreme Court has long held that there are exceptions to the warrant requirement in—when special needs outside the law enforcement arena. And we think that that standard has been met here.”
Wiretapping Essential in Catching Terrorists - Hayden reiterates how important the wiretapping is to catching terrorists and stopping potential attacks against US targets, though he and Gonzales both refuse to say what, if any, terrorist plots or what terror suspects might have been captured through the NSA wiretapping program. Hayden does say, “This program has been successful in detecting and preventing attacks inside the United States.…I can say unequivocally, all right, that we have got information through this program that would not otherwise have been available,” though he refuses to cite specifics. He admits that there have been some errors in surveilling innocent US citizens, though he refuses to give any details, and says those errors were quickly corrected.
Administration Not Required to Go Through FISA - Gonzales, who is the main speaker in the briefing, reiterates that while the administration continues to seek warrants from the Foreign Intelligence Surveillance (FISA) court, “we are not legally required to do, in this particular case, because the law requires that we—FISA requires that we get a court order, unless authorized by a statute, and we believe that authorization has occurred.” He justifies the administration’s refusal to use the FISA court for obtaining warrants by insisting that NSA officials “tell me that we don’t have the speed and the agility that we need, in all circumstances, to deal with this new kind of enemy. You have to remember that FISA was passed by the Congress in 1978. There have been tremendous advances in technology… since then.” Hayden adds, “I don’t think anyone could claim that FISA was envisaged as a tool to cover armed enemy combatants in preparation for attacks inside the United States. And that’s what this authorization under the President is designed to help us do.”
'Balancing' of Civil Liberties, National Security - Hayden says the warrantless wiretapping program is part of “a balancing between security and liberty,” a more “aggressive” operation “than would be traditionally available under FISA. It is also less intrusive. It deals only with international calls. It is generally for far shorter periods of time. And it is not designed to collect reams of intelligence, but to detect and warn and prevent about attacks. And, therefore, that’s where we’ve decided to draw that balance between security and liberty.”
Media Leaks Damaging to National Security - Gonzales refuses to talk about when any members of Congress were briefed on the program or what they were told, but he does imply that there will be some sort of leak investigation as to how the New York Times found out about the program: “[T]his is really hurting national security, this has really hurt our country, and we are concerned that a very valuable tool has been compromised. As to whether or not there will be a leak investigation, we’ll just have to wait and see.”
No Evidence of Compromised National Security - When asked whether he can cite any evidence that the revelation of the program’s existence has actually compromised anything—“Don’t you assume that the other side thinks we’re listening to them? I mean, come on,” one reporter says—Gonzales responds, rather confusingly, “I think the existence of this program, the confirmation of the—I mean, the fact that this program exists, in my judgment, has compromised national security, as the President indicated on Saturday.”
Easier to Sidestep FISA Instead of Seek Congressional Approval - He does admit that the administration decided to sidestep the FISA court entirely instead of attempt to work with Congress to rewrite the FISA statutes because “we were advised that that would be difficult, if not impossible” to amend the law to the White House’s satisfaction. Gonzales says those who are concerned about the program being excessively intrusive or a threat to American civil liberties simply “don’t understand the specifics of the program, they don’t understand the strict safeguards within the program.… Part of the reason for this press brief today is to have you help us educate the American people and the American Congress about what we’re doing and the legal basis for what we’re doing.” He adds that any legal experts who believe the program is illegal are basing their judgments “on very limited information.”
Tough Questioning - One reporter asks an unusually tough series of questions to Gonzales: “Do you think the government has the right to break the law?”, to which Gonzales replies, “Absolutely not. I don’t believe anyone is above the law.” The reporter then says, “You have stretched this resolution for war into giving you carte blanche to do anything you want to do,” to which Gonzales replies cryptically, “Well, one might make that same argument in connection with detention of American citizens, which is far more intrusive than listening into a conversation.” The reporter insists, “You’re never supposed to spy on Americans,” and Gonzales deflects the responsibility for the decision back onto the Supreme Court.
Administration Will Tell Nation What It Needs to Know - Gonzales says the administration has no intention of releasing any of the classified legal opinions underpinning the program, and this press briefing is one of the methods by which the administration will “educat[e] the American people…and the Congress” to give them what they need to know about the program. [White House, 12/19/2005]
DARPA logo. [Source: Duke University]The computer and technology experts at Ars Technica, a well-regarded Web publication which describes itself as focusing on “the art of technology,” speculate on the technology behind the NSA warrantless wiretapping program recently revealed to the public (see December 15, 2005). The Ars Technica experts believe that Senator Jay Rockefeller (D-WV)‘s 2003 comparison between the program and the Total Information Awareness (TIA) project (see March 2002) is the most apt. They believe that the NSA wiretapping program may be built upon the foundation of a shadowy, highly classified surveillance program called Echelon. They write, “This system’s purpose would be to monitor communications and detect would-be terrorists and plots before they happen… This project is not interested in funding ‘evolutionary’ changes in technology, e.g., bit-step improvements to current data mining and storage techniques. Rather, the amount of data that the directors are anticipating (petabytes!) would require massive leaps in technology (and perhaps also some massive leaps in surveillance laws).” [Ars Technica, 12/20/2005; Ars Technica, 2007] Data storage measured in petabytes is a colossal capacity; a petabyte is 1,024 terabytes, and a single terabyte is 1,024 gigabytes, the usual measurement for hard drive capacity. [TechTerms, 2007] The Ars Technica experts continue, “According to DARPA, such data collection ‘increases information coverage by an order of magnitude,’ and ultimately ‘requires keeping track of individuals and understanding how they fit into models.’” They go on to note that the NSA wiretapping program was instituted shortly after the TIA project was quashed by Congress, and say they believe the NSA program is an extension and an outgrowth of TIA. They note that “the FBI requested the legal authorization to do very high-volume monitoring of digital calls” in 1995, that there is “no way for the judicial system to approve warrants for the number of calls that the FBI wanted to monitor,” and that the FBI “could never hire enough humans to be able to monitor that many calls simultaneously, which means that they’d have to use voice recognition technology to look for ‘hits’ that they could then follow up on with human wiretaps.” The Ars Technica experts believe the NSA is using “some kind of high-volume, automated voice recognition and pattern matching system,” employing a form of “smart filtering” that would weed through perhaps hundreds of thousands of computer-monitored calls and turning a fraction of those calls over to human analysts for evaluation: “[Y]es, this kind of real-time voice recognition, crude semantic parsing and pattern matching is doable with today’s technology, especially when you have a budget like the NSA.” In a follow-up, Ars Technica technology specialist and self-described conservative and “privacy nazi” Jon Stokes writes of his own concerns over the program, noting that the program is too wide-reaching and too blunt to actually catch many real terrorists, and that the program is a tremendous intrusion into Americans’ fundamental privacy: “The problem is not that such large-scale industrial fishing invariably catches a few dolphins along with the tuna, but that between 99.999 and 100 percent of what you’re going to get is dolphin.” Stokes also warns that such an intrusive surveillance program will not only violate privacy rights, but be quite ineffective: “As the TSA, with its strip-searching of people’s elderly grandparents, abundantly proves every holiday season, blunt instruments and scorched earth tactics are of dubious value in catching genuine bad actors. In fact, blunt instruments and wide nets are the easiest for professional bad guys to evade. All you need to beat such surveillance tools is patience and know-how.…Blunt instruments like airport facial recognition software and random subway bag searches produce much more noise than they do signal, and any engineer or computer scientist worth his or her salt will tell you that an intelligent, targeted, low-tech approach beats a brute-force high-tech approach every time. There is no high-tech substitute for human intelligence gathering. In fact…an overload of crudely processed information is actually more likely to lead an analyst astray than it is to produce any useful insight.…In the end, brute force security techniques are not only corrosive to democratic values but they’re also bad for national security. They waste massive resources that could be spent more effectively elsewhere, and they give governments and countries a false sense of security that a savvy enemy can exploit to devastating effect.…[I]t’s not just enough to have sound intelligence; you also need political leaders who have the wisdom to use that intelligence appropriately.” [Ars Technica, 12/20/2005]
While on a trip to the Middle East, Vice President Dick Cheney gives a frank outline of his view of the president’s powers, and refers to an Iran-Contra document as support for this view. In response to a question about his perspective as a veteran of the Ford administration, which the reporter says “arguably was the point at which presidential power had reached its absolute nadir,” Cheney replies, “Yes, I do have the view that over the years there had been an erosion of presidential power and authority, that it’s reflected in a number of developments.” Cheney lists several examples, including the War Powers Act, Congressional budget controls, the limitations placed on his own 2001 Energy Task Force, and numerous steps to limit the president’s power taken after Watergate and the Vietnam War. Cheney then advises the reporter: “If you want reference to an obscure text, go look at the minority views that were filed with the Iran-Contra Committee; the Iran Contra Report in about 1987 (see November 16-17, 1987). Nobody has ever read them, but we—part of the argument in Iran Contra was whether or not the president had the authority to do what was done in the Reagan years. And those of us in the minority wrote minority views, but they were actually authored by a guy working for me, for my staff, that I think are very good in laying out a robust view of the president’s prerogatives with respect to the conduct of especially foreign policy and national security matters. It will give you a much broader perspective.… I believe in a strong, robust executive authority. And I think the world we live in demands it. And to some extent, that we have an obligation as an administration to pass on the offices we hold to our successors in as good a shape as we found them.… I do think that to some extent now, we’ve been able to restore the legitimate authority of the presidency.” [White House, 12/20/2005]
Nixon Lawyer: Cheney 'Twisting History' - However, former Nixon White House counsel John Dean will call the Iran-Contra document to which Cheney refers “replete with factual and other errors,” a wholesale “twist[ing] of history” that nevertheless “sought to establish extreme standards for presidential powers vis-a-vis Congress.” According to Dean, Cheney believes now, as he did then, “that the Congress—other than writing checks to finance the president’s policies—has no real role whatsoever.” [Dean, 2007, pp. 86-88]
Former Republican Staffer: 'Chasm of Difference' between Then, Now - Former Justice Department lawyer Bruce Fein, who helped Cheney write the minority report and has since parted ways with his old boss, will say there is “a chasm of difference” between Iran-Contra and the secrecy of the Bush-Cheney administration. “Then it was part of the democratic process,” Fein will say in July 2006. “The way you debate the process, it allows for self-correction. This is the essence, the lifeblood of democracy.” Then, the Reagan administration was forced by a Democratic majority in Congress to disclose at least some details of its inner workings. There is no such disclosure today, Fein says. “They think that democracy ends if you win elections.” [Dubose and Bernstein, 2006, pp. 81]
North Korea declares it will resume building nuclear reactors, and blames the US for withdrawing from the deal it had made in 1994 to build two light-water reactors in return for the nation eschewing nuclear weapons (see October 21, 1994). [BBC, 12/2007]
In an interview on ABC’s “Nightline,” Vice President Cheney takes exception to recent press reports that he was defeated in his opposition to a Congressional anti-torture bill (see December 15-16, 2005). The line on torture is, he says, whether or not a particular act “shocks the conscience.” Cheney says: “Now you can get into a debate about what shocks the conscience and what is cruel and inhumane. And to some extent, I suppose, that’s in the eye of the beholder.” Authors Lou Dubose and Jake Bernstein will later write that Cheney is using the most primitive form of solipsism to say that torture is not really torture. And Cheney is once again evoking fears of terrorist attacks: “There he was, Dick Cheney, nakedly amoral and driven by fear,” Dubose and Bernstein will write. Cheney continues, “We think it’s important to remember that we are in a war against a group of individuals, a terrorist organization that in fact did slaughter three thousand innocent Americans on 9/11; that it’s important for us to be able to have effective interrogations of those people when we capture them.” The implication, Dubose and Bernstein will write, is that further attacks are inevitable—a matter of when and not if—and an evocation of what author Ron Suskind calls “the one percent doctrine… [i]f there was even a one percent chance of terrorists getting a weapons of mass destruction… the United States must now act as if it was a certainty.” Dubose and Bernstein illustrate how keeping torture as a viable interrogation option plays into this mindset: “The end justified any means necessary. It didn’t matter how effective torture was as long as it provided even a remote chance that it might save American lives.” [Dubose and Bernstein, 2006, pp. 197]
Federal appeals court judge J. Michael Luttig, widely considered to be such a reliably conservative supporter of the Bush administration that he is a potential Supreme Court nominee and the author of a highly favorable ruling in the Jose Padilla detention case (see October 9, 2005), is infuriated by the administration’s decision not to charge Padilla with the lurid array of terrorism-related charges it had alleged in Luttig’s courtroom (see November 22, 2005). Luttig believes that he and the rest of the appeals court judges were misled into making a ruling favorable to the administration. Luttig issues a supplementary opinion accusing the White House of manipulating the judicial process to ensure the Supreme Court could not review the precedent his opinion set. The Padilla indictment raises serious questions about the credibility of the government’s accusations against Padilla, and, Luttig writes, leaves “the impression that Padilla may have been held for these years, even justifiably, by mistake.” Luttig and his colleagues take the unusual step of blocking Padilla’s transfer from military custody into the hands of the Justice Department. The move is aimed at attempting to keep the possibility open of a Supreme Court hearing on the Padilla matter, and giving the Court the chance to reverse Luttig’s precedent. The Court will quickly overrule Luttig’s attempt to keep Padilla in military custody and will dismiss Padilla’s appeal because he is no longer classified as an enemy combatant. Author and reporter Charlie Savage will later write: “Just as Luttig had feared, the maneuver ensured that his precedent—written on the assumption that the administration was telling the truth when it said it had good evidence that Padilla was plotting attacks on US soil—was left intact.” Luttig’s move sours his relations with the White House and dooms whatever chance he may have had to be nominated for the high court. He will soon resign from his life-tenured position on the appeals court and take the position of general counsel for Boeing. [Savage, 2007, pp. 200-201]
Former Senate Majority Leader Tom Daschle (D-SD) writes that Congress explicitly rejected several attempts by the Bush administration to provide him with war-making authority and the authority to wiretap and monitor US citizens “in the United States” when it approved the September 18, 2001 authorization to use military force (AUMF) against terrorists (see September 14-18, 2001). Instead, the Bush administration merely usurped that authority and launched—or expanded (see Spring 2001)—its warrantless wiretapping program, conducted by the NSA. Since then, the Bush administration and the Justice Department have both repeatedly asserted that the AUMF gave them the right to conduct the wiretapping program, an assertion that Daschle says is flatly wrong. On December 21, the Justice Department admitted in a letter that the October 2001 presidential order authorizing warrantless eavesdropping on US citizens did not comply with “the ‘procedures’ of” the law that has regulated domestic espionage since 1978, known as the Foreign Intelligence Surveillance Act (FISA). FISA established a secret intelligence court and made it a criminal offense to conduct electronic surveillance without a warrant from that court, “except as authorized by statute.” However, the letter, signed by Assistant Attorney General William Moschella, argues that the AUMF gave the administration the authority to conduct the program. [Washington Post, 12/22/2005] The letter continues the argument that Congress gave President Bush the implict authority to create an exception to FISA’s warrant requirements, though the AUMF resolution did not mention surveillance and made no reference to the president’s intelligence-gathering authority. The Bush administration kept the program secret until it was revealed by the New York Times on December 15, 2005. Moschella argues that secret intelligence-gathering, even against US citizens, is “a fundamental incident to the use of military force” and that its absence from the resolution “cannot be read to exclude this long-recognized and essential authority to conduct communications intelligence targeted at the enemy.” Such eavesdropping, he argued, must by necessity include conversations in which one party is in the United States. [William Moschella, 12/22/2005 ] Daschle, one of the primary authors of the resolution, says that Moschella and the Bush administration are wrong in their assertions: “I did not and never would have supported giving authority to the president for such wiretaps. I am also confident that the 98 senators who voted in favor of authorization of force against al-Qaeda did not believe that they were also voting for warrantless domestic surveillance” (see September 12-18, 2001). [Washington Post, 12/23/2005]
Entity Tags: National Security Agency, Bush administration (43), Authorization to Use Military Force (AUMF), Al-Qaeda, Foreign Intelligence Surveillance Act, George W. Bush, Osama bin Laden, US Department of Justice, Foreign Intelligence Surveillance Court, New York Times, William E. Moschella, Richard (“Dick”) Cheney, Tom Daschle
Timeline Tags: Civil Liberties
Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” [New York Times, 12/24/2005]
Entity Tags: US Department of Defense, US Department of Justice, Total Information Awareness, New York Times, US Department of Homeland Security, Computer Assisted Passenger Prescreening System, Bush administration (43), Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, George W. Bush, National Security Agency, Phil Karn
Timeline Tags: Civil Liberties
Without the knowledge of many in Congress, Vice President Cheney and his allies in Congress manage to insert language into the Detainee Treatment Act (DTA—see December 30, 2005) that renders much of the bill nearly worthless. Some of the widest exceptions are inserted without the knowledge of all but a very few Congressmen. One is the exemption for the CIA, which instead of being bound by the interrogation techniques described in the US Army Field Manual, is only forbidden in general to employ “cruel” or “inhuman” methods. Those terms will be defined in light of US constitutional law. Because of the Supreme Court’s decision that cruelty is an act that “shocks the conscience,” Cheney’s chief lawyer, David Addington, has argued that harsh interrogations would be much less shocking if performed on detainees suspected of planning or taking part in mass casualty terrorist attacks. What “shocks the conscience” is to an extent “in the eye of the beholder,” Cheney has already said. [Washington Post, 6/25/2007]
After President Bush signs the Detainee Treatment Act (DTA—see December 30, 2005), his office issues a “signing statement” concerning how he believes the government should enforce the new law. His advisers have spent days composing a statement that declares the administration’s support for the bill. But that statement is never issued. Just before Bush signs the bill, Vice President Cheney’s chief lawyer, David Addington, intercepts the statement “and just literally takes his red pen all the way through it,” a White House official will later recall. Instead, Addington substitutes a single sentence. Bush, writes Addington, would interpret the law “in a manner consistent with the constitutional authority of the president to supervise the unitary executive branch and as commander in chief.” Neither Addington nor Cheney have any qualms about ignoring or superseding what Addington calls “interagency treaties” or language “agreed between cabinet secretaries.” Top officials from the CIA, the Justice Department, State Department, and Defense Department oppose the substitution. The White House’s senior national security lawyer, John Bellinger, says that Congress will view the statement as a “stick in the eye.” Nevertheless, with Cheney’s backing, White House counsel Harriet Miers sends the revised statement to Bush for his signature. Bush signs the statement. [Washington Post, 6/25/2007]
For the entire fiscal year of 2006, the US grants the new Iraqi military only $3 billion, which is less than what the US military spends in Iraq every two weeks. According to the Iraq Study Group, this results in a major shortage of equipment for the Iraqi military that renders them incapable of carrying out missions. [Iraq Study Group, 2006, pp. 13 ]
Sometime in 2006, the deputy commander of the Defense Department’s Criminal Investigation Task Force (CITF) at Guantanamo tells the Senate Armed Services Committee (see April 21, 2009) that CITF “was troubled with the rationale that techniques used to harden resistance to interrogations [SERE training—see December 2001, January 2002 and After, and July 2002 ] would be the basis for the utilization of techniques to obtain information.” [Huffington Post, 4/21/2009]
The second part of the Senate Intelligence Committee’s investigation into the mismanagement of intelligence before the Iraq invasion (see July 9, 2004) is being held up by the Pentagon’s internal investigation of former Defense Department official Douglas Feith, one of the department’s primary architects of the war plans (see Late December 2000 and Early January 2001, Shortly After September 11, 2001, September 20, 2001, Fall 2002, and May 9, 2005). The committee is waiting on a report from the Pentagon inspector general on Feith’s alleged role in manipulating pre-war intelligence to support a case for war. Feith is also being investigated by the FBI for his role in an Israeli spy case. One aspect of the committee’s investigation is likely to focus on the efforts by Defense Secretary Donald Rumsfeld to procure top-level security clearances for Feith after he was fired from the National Security Council in 1982 over allegations of espionage (see March 1982). Feith is one of a large number of pro-war conservatives to shuttle in and out of the Pentagon despite being involved in intelligence-related scandals (see Late 1969, October 1970, 1978, April 1979, March 1981, 1983, April 13, 1999-2004, 2001, and October 5, 2005), many of whom were provided security clearances by Rumsfeld. The committee’s report is being delayed because both Feith and the Defense Department refuse to provide documents and witnesses to the committee. The committee is investigating whether Feith and other current and former Defense Department officials broke the 1947 National Security Act by refusing to keep the committee “fully and currently informed of all intelligence activities” and refusing to “furnish the Congressional intelligence committees any information or material concerning intelligence activities, other than covert actions, which is within their custody or control, and which is requested by either of the Congressional intelligence committees in order to carry out its authorized responsibilities.” Senate sources say committee chairman Pat Roberts (R-KS) is not pressuring the Pentagon to cooperate, but instead is deferring to the Pentagon’s Inspector General, in essence allowing the Pentagon to investigate itself. [Raw Story, 1/30/2006] The report will be issued in June 2008, with few of the above issues addressed (see June 5, 2008).
Georgetown law professor Marty Lederman, a former Justice Department official under both the Bush and Clinton administrations, notes the recent signing statement from the White House that essentially states President Bush will ignore the newly authorized Detainee Treatment Act (see December 30, 2005). “So much for the president’s assent to the McCain Amendment” (see December 15, 2005), Lederman writes. Of Bush’s signing statement itself, he writes: “Translation: I reserve the constitutional right to waterboard when it will ‘assist’ in protecting the American people from terrorist attacks.… You didn’t think [Vice President] Cheney and [Cheney’s chief of staff David] Addington (see December 30, 2005) were going to go down quietly, did you?” [Marty Lederman, 1/2/2006; Savage, 2007, pp. 225]
The three Republican senators who co-sponsored the recently passed Detainee Treatment Act prohibiting torture (see December 15, 2005) criticize President Bush for his signing statement indicating that he would not follow the law if he sees fit (see December 30, 2005). Senators John McCain (R-AZ), the primary sponsor of the bill, and John Warner (R-VA) issue a statement rejecting Bush’s signing statement. “We believe the president understands Congress’s intent in passing, by very large majorities, legislation governing the treatment of detainees,” the senators write. “The Congress declined when asked by administration officials to include a presidential waiver of the restrictions included in our legislation. Our committee intends through strict oversight to monitor the administration’s implementation of the new law.” The third co-sponsor, Senator Lindsey Graham (R-SC), says he agrees with the letter, “and would go a little bit further.” Graham says: “I do not believe that any political figure in the country has the ability to set aside any… law of armed conflict that we have adopted or treaties that we have ratified. If we go down that road, it will cause great problems for our troops in future conflicts because [nothing] is to prevent other nations’ leaders from doing the same.” The White House refuses to respond to the senators’ comments. Law professor David Golove, a specialist in executive power issues, says the senators’ statements “mean that the battle lines are drawn” for an escalating fight over the balance of power between the two branches of government. “The president is pointing to his commander in chief power, claiming that it somehow gives him the power to dispense with the law when he’s conducting war,” Golove says. “The senators are saying: ‘Wait a minute, we’ve gone over this. This is a law Congress has passed by very large margins, and you are compelled and bound to comply with it.’” Elisa Massimino of Human Rights First says the senators’ statements should warn military and CIA interrogators that they could be subject to prosecution if they torture or abuse a detainee, regardless of Bush’s signing statement. “That power [to override the law] was explicitly sought by the White House, and it was considered and rejected by the Congress,” she says. “And any US official who relies on legal advice from a government lawyer saying there is a presidential override of a law passed by Congress does so at their peril. Cruel, inhuman, and degrading treatment is illegal.” Golove notes that it is highly unlikely that Attorney General Alberto Gonzales would prosecute anyone for performing actions Bush had authorized. [Boston Globe, 1/5/2006; Savage, 2007, pp. 225-226]
Special counsel Patrick Fitzgerald responds to a classified document request submitted by the Lewis Libby defense team (see December 14, 2005). Fitzgerald disputes lawyer John Cline’s characterization of the Office of Special Counsel as “allied with… the FBI, CIA, and the Office of the Vice President,” and notes that “we are not aligned with the various delineated government agencies other than the” FBI. Fitzgerald writes that his office will provide whatever requested documents it can, but many of the classified documents requested are not in its possession, and he doubts his office will ever be provided with many of them, particularly the extremely sensitive Presidential Daily Briefs. Others of the documents, such as some of Libby’s notes from his time in the Office of the Vice President, have not yet been provided; Fitzgerald says that once his office receives the documents, he will provide them to Libby’s lawyers. [Office of Special Counsel, 1/9/2006 ]
Russell Tice. [Source: ABC News]Former National Security Agency (NSA) official Russell Tice says that many of the wiretapping operations he once helped run were illegal. “I specialized in what’s called special access programs,” Tice tells ABC News. “We called them ‘black world’ programs and operations.” Tice is ready to testify before Congress about what he calls the illegal wrongdoings that are part of the Defense Department and the NSA’s wiretapping programs enacted after the 9/11 attacks. Many of these programs were targeted at innocent US citizens. “The mentality was we need to get these guys, and we’re going to do whatever it takes to get them,” he says. The technology used to track and sort through every domestic and international telephone center is impressive. “If you picked the word ‘jihad’ out of a conversation, the technology exists that you focus in on that conversation, and you pull it out of the system for processing.” Intelligence analysts use the information to develop graphs that resemble spiderwebs linking one suspect’s phone number to hundreds or even thousands more. While the president has admitted giving orders that allowed the NSA to eavesdrop on a small number of Americans without warrants, Tice says says the number of Americans subject to eavesdropping by the NSA could be in the millions if the full range of secret NSA programs is used. “That would mean for most Americans that if they conducted, or you know, placed an overseas communication, more than likely they were sucked into that vacuum.” Tice has been subjected to what appears to be bureaucratic punishment for his willingness to blow the whistle on the nation’s warrantless wiretapping programs; last year the NSA revoked his security clearance based on what it calls "psychological concerns," and later fired him. Tice says that is the way the NSA often deals with employees it considers troublemakers and whistleblowers (see January 25-26, 2006). [ABC News, 1/10/2006; ABC, 1/10/2006]
The American Civil Liberties Union releases documents detailing prisoner abuse at US facilities in Iraq, Afghanistan, and Guantanamo. The documents prove the existence of a “Special Access Program,” involving a special operations unit, Task Force 6-26, that has been implicated in numerous abuse incidents in Iraq, and whose operatives used fake names to thwart an Army investigation. ACLU lawyer Amrit Singh says: “These documents confirm that the torture of detainees and its subsequent cover-up was part of a larger clandestine operation, in all likelihood, authorized by senior government officials. Despite mounting evidence of systemic abuse authorized or endorsed from above, however, not a single high-level official has thus far been brought to justice.”
Fake Names, Computer Malfunctions Avoid Accountability - An Army memorandum shows that a prisoner was captured by Task Force 6-26 in Tikrit, Iraq, and subsequently beaten into unconsciousness. The task force members used “fake names,” according to the Army memo, and the claim of a computer malfunction to avoid accountability.
SERE Techniques Used - A heavily redacted memo refers to the use of “Survival, Evasion, Resistance, and Escape” procedures at Guantanamo (see December 10, 2002). Sworn statements from military interrogators and a written “Chronology of Guard/Detainee Issues” show that the Army began receiving reports of prisoner abuse from Afghanistan as early as January 2002. The abuse continued, the documents show, through 2004 and perhaps beyond (see February 12-16, 2004, March 28, 2004, and May 6, 2004). Documents detail incidents where US soldiers poured peroxide and water over an Iraqi prisoner’s open wounds, and fired slingshot missiles at Iraqi children attempting to steal food from the base. [American Civil Liberties Union, 1/12/2006]
Al Gore speaks to the Liberty Coalition and the American Constitution Society. [Source: American Constitution Society]Former Vice President Al Gore delivers a long, impassioned speech on civil liberties and constitutional issues to the Liberty Coalition and the American Constitution Society. Gore joins former Representative Bob Barr (R-GA) in speaking out against the Bush administration’s infringement on American civil liberties. Gore and Barr have what Gore calls a “shared concern that America’s Constitution is in grave danger.”
Patently Illegal Domestic Surveillance - Gore’s speech is sparked by recent revelations that the NSA has been spying on American citizens for years (see December 15, 2005), and in response, the administration “has brazenly declared that it has the unilateral right to continue without regard to the established law enacted by Congress precisely to prevent such abuses.” As the Foreign Intelligence and Surveillance Act (FISA) is perfectly sufficient, there was no need for the Bush administration to circumvent that law. “At present, we still have much to learn about the NSA’s domestic surveillance,” Gore says. “What we do know about this pervasive wiretapping virtually compels the conclusion that the president of the United States has been breaking the law, repeatedly and insistently. A president who breaks the law is a threat to the very structure of our government.” Gore says he agrees with Bush on the threat of terrorism, but disagrees that the US has to “break the law or sacrifice our system of government” to protect itself, as this will make it “weaker and more vulnerable.” In addition, he says, “once violated, the rule of law is itself in danger,” and, “Unless stopped, lawlessness grows, the greater the power of the executive grows, the more difficult it becomes for the other branches to perform their constitutional roles.” It is patently obvious that the Bush administration has broken the law in conducting and approving its warrantless wiretaps, Gore says, regardless of what arguments and defenses administration officials may put forth (see September 12-18, 2001 and Early 2002). So, Gore says, “When President Bush failed to convince Congress to give him the power he wanted when this measure was passed, he secretly assumed that power anyway, as if Congressional authorization was a useless bother. But as [Supreme Court] Justice [Felix] Frankfurter once wrote, ‘To find authority so explicitly withheld is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between the president and the Congress.‘… And the disrespect embodied in these apparent mass violations of the law is part of a larger pattern of seeming indifference to the Constitution that is deeply troubling to millions of Americans in both political parties.”
Illegal Seizure of American Citizens - Gore notes that Bush has declared that he has “a heretofore unrecognized inherent power to seize and imprison any American citizen that he alone determines to be a threat to our nation, and that notwithstanding his American citizenship that person in prison has no right to talk with a lawyer, even if he wants to argue that the president or his appointees have made a mistake and imprisoned the wrong person” (see November 13, 2001 and March 5, 2002). He says: “The president claims that he can imprison that American citizen—any American citizen he chooses—indefinitely, for the rest of his life, without even an arrest warrant, without notifying them of what charges have been filed against them, without even informing their families that they have been imprisoned.” Gore then says: “No such right exists in the America that you and I know and love. It is foreign to our Constitution. It must be rejected.”
Specious Authority to Torture - Neither does the executive branch have the right to authorize torture, Gore says. After citing horrific examples from Guantanamo and Abu Ghraib, he calls it “a shameful exercise of power that overturns a set of principles that you’re nation has observed since General George Washington first enunciated them during our Revolutionary War. They have been observed by every president since then until now. They violate the Geneva Conventions, the International Convention Against Torture, and our own laws against torture.”
Unlawful Kidnapping of Foreign Citizens - The president has no right to have foreign citizens kidnapped from their homes and brought to the US for interrogation and imprisonment, or worse, delivered to other nations for harsh interrogations and torture, says Gore. The closest allies of the US have been shocked by such claims.
No Restraint in the Constitution? - Gore asks whether the president really has such powers under the Constitution and, if so, “are there any acts that can on their face be prohibited?” He quotes the dean of Yale’s law school, Harold Koh, who said, “If the president has commander in chief power to commit torture, he has the power to commit genocide, to sanction slavery, to promote apartheid, to license summary execution.” Gore is “deeply troubl[ed]” that “our normal American safeguards have thus far failed to contain this unprecedented expansion of executive power.” He cites the numerous usage of “signing statements” by Bush that signal his intent “not to comply” with particular legislation (see December 30, 2005). When the Supreme Court struck down Bush’s indefinite detention of “enemy combatants” (see June 28, 2004), “the president then engaged in legal maneuvers designed to prevent the court from providing any meaningful content to the rights of the citizens affected.”
Historical Cycles - Since the founding of America, Gore says, the country has abrogated its citizens’ rights in one circumstance or another, and cites numerous examples. But those abrogations were always rectified to some degree in a repeated cycle of what he calls “excess and regret.” Gore is worried that the country may not be in such a cycle now. Instead, he says, the US may be on a path to permanent, state-sanctioned authoritarianism, with the constitutional safeguards American citizens have come to expect eroded and undermined to the point of irretrievability. Gore specifically cites the administration’s support for the so-called “unitary executive” theory of government, which he says “ought to be more accurately described as the unilateral executive.” That theory “threatens to expand the president’s powers until the contours of the Constitution that the framers actually gave us become obliterated beyond all recognition.”
Stark Authoritarianism - Why are Bush and his top officials doing this? Gore says that “[t]he common denominator seems to be based on an instinct to intimidate and control. The same pattern has characterized the effort to silence dissenting views within the executive branch, to censor information that may be inconsistent with its stated ideological goals, and to demand conformity from all executive branch employees.” Gore continues: “Intellectually, it is possible to carry on this process for an indefinite time. The only check on it is that, sooner or later, a false belief bumps up against solid reality, usually on a battlefield. Two thousand two hundred American soldiers have lost their lives as this false belief bumped into a solid reality.”
Gutting Congress - Though serious damage has been done to the judicial branch, Gore acknowledges, “the most serious damage in our constitutional framework has been to the legislative branch. The sharp decline of Congressional power and autonomy in recent years has been almost as shocking as the efforts by the executive to attain this massive expansion of its power.… [T]he legislative branch of government as a whole, under its current leadership, now operates as if it were entirely subservient to the executive branch.… [T]he whole process is largely controlled by the incumbent president and his political organization” (see February 1, 2004). Gore says each member of Congress, Republican and Democrat, must “uphold your oath of office and defend the Constitution. Stop going along to get along. Start acting like the independent and co-equal branch of American government that you are supposed to be under the Constitution of our country.”
We the People - The American people still, for the moment, have the power to enforce the Constitution, Gore says, quoting former President Dwight Eisenhower, who said, “Any who act as if freedom’s defenses are to be found in suppression and suspicion and fear confess a doctrine that is alien to America.” Gore continues: “Fear drives out reason. Fear suppresses the politics of discourse and opens the door to the politics of destruction.… The founders of our country faced dire threats. If they failed in their endeavors, they would have been hung as traitors. The very existence of our country was at risk. Yet in the teeth of those dangers, they insisted on establishing the full Bill of Rights. Is our Congress today in more danger than were their predecessors when the British army was marching on the Capitol? Is the world more dangerous than when we faced an ideological enemy with tens of thousands of nuclear missiles ready to be launched on a moment’s notice to completely annihilate the country?” [Congressional Quarterly, 1/16/2006; American Constitutional Society, 1/16/2006]
Entity Tags: National Security Agency, Liberty Coalition, US Supreme Court, Harold Koh, George W. Bush, Albert Arnold (“Al”) Gore, Jr., American Constitution Society, Bush administration (43), Convention Against Torture, Felix Frankfurter, George Washington, Geneva Conventions, Foreign Intelligence Surveillance Act, Robert “Bob” Barr
Timeline Tags: Civil Liberties
Controversial neoconservative Michael Ledeen, a consultant for the Bush Defense Department, confirms that he was a contributor to the Italian magazine Panorama. A Panorama reporter, Elisabetta Burba, was one of the first to come across forged documents that purported to prove Iraq had attempted to obtain weapons-grade uranium from Niger (see September 12, 2002 and Afternoon October 7, 2002). Ledeen is widely suspected of playing a role in channeling those forged documents to the CIA (see October 18, 2001, December 9, 2001, and April 3, 2005), though he has always denied doing so. Ledeen confirms that “several years ago” he was a “twice a month” contributor to Panorama, but refuses to give further details. He also denies, again, any involvement in the Niger documents: “I’ve said repeatedly, I have no involvement of any sort with the Niger story, and I have no knowledge of it aside from what has appeared in the press,” he writes. “I have not discussed it with any government person in any country.” Reporter Larisa Alexandrovna notes that Ledeen wrote for Panorama during the time that the magazine received the forgeries from an Italian intelligence peddler, and sent them from the US Embassy in Rome via backchannels to the US State Department. Around that same time, Ledeen also allegedly facilitated an unusual meeting between the head of Italy’s military intelligence agency and Stephen Hadley, the deputy national security adviser in the Bush administration
(see September 9, 2002). Hadley has denied discussing anything about uranium during that meeting. [Raw Story, 1/17/2006]
A secret witness in the court-martial of a US soldier charged with murdering an Iraqi prisoner (see November 26, 2003 and October 5, 2004) says that the soldier, Chief Warrant Officer Lewis Welshofer, disregarded interrogation rules so casually that he wrote a memo warning his CIA superiors. The witness testifies in open court, but is shielded behind a curtain to protect his identity. (Defense lawyers accidentally exposed the witness’s ties to the CIA during previous questioning.) The testimony is conducted in public after much legal wrangling, with lawyers from the Colorado Springs Gazette and other media outlets insisting that the witness’s testimony be conducted in open court. The witness says Welshofer, accused of smothering the prisoner, did not seem to care. “He said he was pretty sure they were breaking those rules every day.” Earlier witnesses have testified that the techniques used by Welshofer—which included covering the prisoner’s head with a bag, wrapping electrical cord around the bag, sitting on the man’s chest, and covering his mouth—were forbidden by order of CENTCOM commander Lieutenant General Ricardo Sanchez. Another witness, Chief Warrant Officer Todd Sonnek, a Green Beret assigned to interrogations at the makeshift prison near the Syrian border, says that two days before Mowhoush’s death, he witnessed Welshofer bringing CIA and Iraqi paramilitary fighters in to witness his interrogation of the prisoner, which Welshofer called an implementation of the accepted method called “fear-up,” in which an interrogator attempts to terrify a prisoner into divulging information. Welshofer, along with the CIA officials and Iraqi fighters, questioned Mowhoush, and interrupted the questions with insults and slaps. Instead of cowering in fear, Mowhoush became enraged and broke free from his plastic handcuffs. Sonnek says he wrestled Mowhoush to the ground, and everyone in the room joined in beating and kicking Mowhoush. Sonnek testifies that Mowhoush was able to walk unaided back to his cell; other witnesses have said that it took five soldiers to carry him back to it. [Rocky Mountain News, 1/17/2006; Colorado Springs Gazette, 1/19/2006; Rocky Mountain News, 1/24/2006] Welshofer will be convicted, but will not serve jail time or even be discharged from the Army (see January 24, 2006).
Chief Warrant Officer Lewis Welshofer, testifying in his own defense on charges of murdering an Iraqi prisoner (see November 26, 2003 and October 5, 2004), says that he was unsure of what interrogation techniques were acceptable and what were not. He also says that he was under orders to treat prisoners very harshly. He testifies: “Basically [an August 30, 2003 memo] said that as far as they [senior commanders] knew there were no ROE [Rules of Engagement] for interrogations. They were still struggling with the definition for a detainee. It also said that commanders were tired of us taking casualties and they [told interrogators they] wanted the gloves to come off.… Other than a memo saying that they were to be considered ‘unprivileged combatants’ we received no guidance from them [on the status of detainees].” [Human Rights First, 2/2006] Welshofer will be convicted, but will not serve jail time or even be discharged from the Army (see January 24, 2006).
Speaking to a cheering crowd of military families in Kansas, President Bush declares that he has no intention of following the laws requiring warrants for wiretaps (see December 15, 2005 and December 18, 2005) because Congress authorized the use of military force against terrorists (AUMF—see September 14-18, 2001), and because he has the power to bypass laws at his own discretion in the interest of national security. The Kansas appearance is part of an election-style “blitz” of appearances around the country designed to build support for the warrantless wiretapping program, and to bolster support for Republicans in the midterm elections (see January 20, 2006). “I’m not a lawyer, but I can tell you what [the AUMF] means,” he says. “It means Congress gave me the authority to use necessary force to protect the American people but it didn’t prescribe the tactics.… If [terrorism suspects] are making phone calls into the United States, we need to know why, to protect you.” [Savage, 2007, pp. 203]
The Lewis Libby defense team files a request to use classified government material as part of Libby’s defense. Legal observers say the Libby request could “bog down” the case for months. The Associated Press reports that the request “puts the Libby case on a dual track: one public, the other secret that often can delay criminal cases from going to trial.” The contents of the filing remain secret, but Libby’s lawyers have implied that they want to reveal the nature of CIA official Valerie Plame Wilson’s work as a CIA operative (see Fall 1985, Fall 1989, Fall 1992 - 1996, and April 2001 and After). Special counsel Patrick Fitzgerald opposes the idea that some of the classified documents would be provided (see January 23, 2006). Fitzgerald has already turned over 850 pages of classified information to Libby’s defense lawyers, and is working to declassify more information. [Associated Press, 1/23/2006]
Special counsel Patrick Fitzgerald responds again to the classified document request from the Lewis Libby defense team (see December 14, 2005, January 9, 2006, and January 23, 2006). Fitzgerald reiterates that his office cannot provide some of the classified White House documents that Libby’s lawyers are requesting, and writes that many of the requested materials have no bearing on the perjury and obstruction charges Libby is facing. He also tells the lawyers that his office may not be able to provide some of the documents requested from the Office of the Vice President because that office seems not to have kept them: “We advise you that we have learned that not all e-mail of the Office of Vice President and the Executive Office of the President for certain time periods in 2003 was preserved through the normal archiving process on the White House computer system.” [Office of Special Counsel, 1/9/2006 ]
The Department of Homeland Security awards a contract to Halliburton subsidiary Kellogg, Brown & Root to establish what the $385 million contract describes as “temporary detention and processing capabilities.” Journalist Christopher Ketcham will comment: “The contract is short on details, stating only that the facilities would be used for ‘an emergency influx of immigrants, or to support the rapid development of new programs.’ Just what those ‘new programs’ might be is not specified.” [Radar, 5/2008]
CWO Lewis Welshofer. [Source: Associated Press / Jerilee Bennett / Salon]Chief Warrant Officer Lewis Welshofer is found guilty of causing the death of an Iraqi prisoner, Major General Abed Hamed Mowhoush (see November 26, 2003). Welshofer, who was originally charged with murder (see October 5, 2004), is not found guilty of murder, but of far lesser charges of negligent homicide and negligent dereliction of duty. The court-martial board sentences Welshofer, who sat on Mowhoush’s chest and smothered him to death, to a reprimand, a fine of $6,000, and 60 days’ restriction. He is not sentenced to jail; neither is he discharged from the Army or even reduced in rank. Soldiers in the courtroom audience applaud the sentence. Welshofer’s attorney, Frank Spinner, says after the sentence, “The court understood our argument that this was a very difficult environment in which the 3rd Armored Cavalry Regiment was operating in November 2003.” Army prosecutor Captain Elana Matt had argued for at least two years’ imprisonment and a dishonorable discharge: “Chief Welshofer should have known better, with 19 years in the Army. You heard some bad things about General Mowhoush, but standards don’t apply just to good victims. They apply to everyone. The reputation of the Army has been dishonored at home and abroad.… You may be tempted to believe that this is the kind of guy the Army needs because he gets the job done. Don’t do it, because that would reduce us to the level of our enemies.” But the court was apparently swayed by Welshofer’s denials that he had done anything that could have led to Mowhoush’s death, and by the argument of Spinner and Welshofer’s military lawyer, Captain Ryan Rosauer, who said that Welshofer was confused by hazy interrogation rules (see January 19, 2006), and was merely doing his duty and trying to save lives. For his part, Welshofer begged the panel to allow him to stay out of jail and in the Army. He said that he had “tried to be a loyal soldier, putting the needs of this institution before my own.” [Rocky Mountain News, 1/24/2006; Colorado Springs Gazette, 1/24/2006] Brigadier General David Irvine, a retired intelligence officer who taught prisoner interrogation and military law for 18 years, and human rights activist David Danzig, will call Welshofer’s sentence a “slap on the wrist,” and write that the verdict “spared the defendant, indicted the prosecutor, and found the law irrelevant” (see January 27, 2006). [Salon, 1/27/2006]
A New York Times investigation along the Afghan-Pakistan border finds not-so-hidden evidence of continued Pakistani support for the growing Taliban insurgency in Afghanistan. Pakistan’s intelligence agencies are said to be using a network of religious political parties to attract and then pressure young men into joining the jihad in Afghanistan or in Kashmir. The agencies are believed to be preparing for the day when NATO troops leave the country and hope to re-install a pro-Pakistan government in Kabul. [New York Times, 1/21/2006]
Brigadier General David Irvine, a retired intelligence officer who taught prisoner interrogation and military law for 18 years, and human rights activist David Danzig write an angry response to the recent court-martial of Army interrogator Lewis Welshofer. Welshofer was found guilty of negligent homicide in causing the death of an Iraqi prisoner (see November 26, 2003 and October 5, 2004), but was given what Irvine and Danzig consider an absurdly light sentence: a reprimand, a small fine, two months’ restriction, and no jail time (see January 24, 2006). Irvine and Danzig believe that the verdict points to a larger problem: “The Welshofer case puts a fine point on a question that has plagued us since Abu Ghraib: Is the Army institutionally capable of dealing with the debacle of torture? The Army and the nation cannot afford to have soldiers draw the obvious lesson from the case’s nonsensical outcome: that in combat, the ends justify the means, and the Geneva Conventions and the McCain anti-torture amendment are subject to change depending on the circumstances or executive whim. Since the Army seems to have no inclination to enforce the principles of command discipline and accountability among the senior ranks, the corrosive effects of US torture in Iraq and elsewhere will continue to haunt any efforts to regain lost stature and credibility in the world.” [Salon, 1/27/2006]
In his State of the Union address, President Bush insists that his authority to wiretap Americans’ phones without warrants (see December 15, 2005 and December 18, 2005) is validated by previous administrations’ actions, saying that “previous presidents have used the same constitutional authority I have.” He fails to note that those presidents authorized warrantless wiretaps before court orders were required for such actions (see June 19, 1972 and 1973). Since the Foreign Intelligence Surveillance Act passed (see 1978), no president except Bush has ever defied the law. Law professor David Cole calls Bush’s assertion of authority “either intentionally misleading or downright false.” Fellow law professor Richard Epstein predicts that the Supreme Court will strike down any such assertions, if it ever addresses the issue. “I find every bit of this legal argument disingenuous,” he says. Even many conservatives refuse to support Bush, with columnist George Will calling his arguments “risible” and a “monarchical doctrine” that is “refuted by the plain text of the Constitution.” David Keene, the chairman of the American Conservative Union, says the legal powers claimed by Bush and his officials can be used to justify anything: “Their argument is extremely dangerous.… The American system was set up on the assumption that you can’t rely on the good will of people with power.” Conservative activist Grover Norquist says flatly, “There is no excuse for violating the rule of law.” And former Justice Department official Bruce Fein says Bush and his officials have “a view that would cause the Founding Fathers to weep. The real conservatives are the ones who treasure the original understanding of the Constitution, and clearly this is inconsistent with the separation of powers.” Even former George H. W. Bush official Brent Scowcroft says that Bush’s interpretation of the Constitution is “fundamentally in error.” [Savage, 2007, pp. 203-204]
Electronic Frontier Foundation logo. [Source: Flickr.com]The Electronic Frontier Foundation (EFF), a civil liberties and privacy-advocacy organization, files a lawsuit against telecommunications giant AT&T for allegedly violating the law and the privacy of its citizens by cooperating with the National Security Agency in the NSA’s construction of what the EFF calls a “massive, illegal program to wiretap and data-mine Americans’ communications.” EFF lawyer Kevin Bankston says: “Our goal is to go after the people who are making the government’s illegal surveillance possible. They could not do what they are doing without the help of companies like AT&T. We want to make it clear to AT&T that it is not in their legal or economic interests to violate the law whenever the president asks them to.”
Unprecedented Access to Communications System - EFF alleges that as part of the NSA’s domestic spying program, AT&T has allowed the NSA direct access to the phone and Internet communications passing over its network, and has given the government “unfettered access to its over 300 terabyte ‘Daytona’ database of caller information—one of the largest databases in the world.” One of AT&T’s databases, nicknamed “Hawkeye,” contains 312 terabytes of data detailing nearly every telephone communication on AT&T’s domestic network since 2001, the lawsuit alleges. The suit goes on to claim that AT&T allowed the NSA to use the company’s powerful Daytona database management software to quickly search this and other communication databases. AT&T, the suit claims, is in violation of the First and Fourth Amendments, federal wiretapping statutes, telecommunications laws, and the Electronic Communications Privacy Act. The suit requests fines up to $22,000 for each AT&T customer, and punitive fines—damages that could potentially reach into the billions of dollars. The EFF lawsuit is one of over 30 lawsuits filed for similar reasons (see June 26, 2006). The lawsuit will survive a number of initial legal challenges by the Justice Department and AT&T, including AT&T’s contention that “whatever we did, the government told us to do” and therefore it should be immune from such lawsuits, and the Justice Department’s invocation of “national security” and the possibility of the revelation of “state secrets” (see March 9, 1953). EFF retorts, “In this country we follow the law, we don’t just follow orders.” Bankston tells a reporter, “If state secrecy can prevent us from preserving the rights of millions upon millions of people, then there is a profound problem with the law.”
Suit Alleges Criminal Actions, Does Not Challenge Government's Right to Wiretap - The lawsuit does not challenge the government’s right to electronically monitor legitimate terrorism suspects, nor does it challenge the judicial right to issue warrants for such surveillance. Rather, EFF writes: “Wiretaps on terrorists are allowed under the law, and this lawsuit is not challenging the wiretap laws. We have sued AT&T for breaking those laws—the telecommunications giant gave the government access to its communications switches and its huge databases of information on millions of ordinary Americans. These are AT&T customers who have not even been accused of affiliations with terrorists. Americans can be both safe and free: if the government truly believes it has cause to wiretap a suspect, it can order AT&T to provide information under FISA [the Foreign Intelligence Surveillance Act]—for up to 72 hours before going to the court. But AT&T has no business providing direct access to the communications of millions of ordinary Americans, without the checks and balances of Congress or the courts.” [Electronic Frontier Foundation, 1/31/2006; Wired News, 1/31/2006]
As part of a panel discussion at the neoconservative American Enterprise Institute, Aaron Friedberg, the deputy national security adviser for Vice President Cheney, says that the most dire ramification of the ongoing six-party talks over North Korea’s nuclear program (see August 2003) is that North Korea’s Kim Jong Il would remain in power (see May 4, 2003). Author J. Peter Scoblic will write in 2008 that Friedberg does not seem to realize “that the six-party process was not designed to oust Kim—and could in fact only succeed in stopping the North’s nuclear program if the regime was assured of its survival.” [Scoblic, 2008, pp. 241]
Seven telecommunications executives confirm to the press that large telecommunications companies such as AT&T, MCI, and Sprint have cooperated with the National Security Agency’s domestic warrantless wiretapping program. Those firms, along with BellSouth, previously denied they had cooperated with the NSA (see October 2001). In typical domestic investigations, telecom companies require court warrants before mounting any surveillance operations, but this has not been the case with the NSA program. Apparently, the companies decided to assist the NSA in tracking international telephone and Internet communications to and from US citizens and routed through “switches” which handle millions of communications, both domestic and international, every day. The telecom firms in question have undergone several mergers and reorganizations—BellSouth, another firm accused of cooperating with the NSA, is now part of AT&T, MCI (formerly WorldCom) was recently acquired by Verizon, and Sprint has merged with Nextel. The companies comply with the NSA requests for information once the NSA determines that there is a “reasonable basis” for believing that the communications may have a connection with militant Islamic organizations such as al-Qaeda. The firms do not require court warrants, but rather implement the monitoring on nothing more than oral requests from senior NSA officials. [USA Today, 2/5/2006]
Zacarias Moussaoui meets FBI special agent James Fitzgerald in jail. Moussaoui tries to persuade Fitzgerald he is worth more to US intelligence alive than dead and offers information in return for being spared the death penalty. However, Fitzgerald demands full and complete co-operation, not only on what he knows about the plot in which he was involved, but also on everything he knows about al-Qaeda. They fail to reach an agreement. [Los Angeles Times, 3/29/2006]
Robert Grenier, the CIA’s chief counterterrorism officer, is relieved of his position after months of turmoil within the agency’s clandestine service. Grenier has headed the Counterterrorist Center for about a year; he will be offered another position within the agency. The CIA’s semi-official position is that some in the agency, particularly Grenier’s superior officer in the clandestine service, do not consider Grenier to be forceful enough in his approach to handling threats from al-Qaeda and other terrorist organizations. Former CIA counterterrorism chief Vincent Cannistraro says that the official story is not entirely true: Grenier was sacked not because of his lack of aggression towards terrorist organizations, but because he opposed the agency’s rendition program and the torture of suspected terrorists. Cannistraro says: “It is not that Grenier wasn’t aggressive enough, it is that he wasn’t ‘with the program.’ He expressed misgivings about the secret prisons in Europe and the rendition of terrorists.” Cannistraro says Grenier also opposed “excessive” interrogation techniques such as waterboarding. Other sources say that CIA Director Porter Goss believes Grenier may either be the source of some of the leaks that have appeared in recent months in the press, or allowed the leaks to occur. Grenier was the CIA’s station chief in Islamabad, Pakistan, during the 9/11 attacks, and helped the agency plan its covert campaign that preceded the US military’s offensive against al-Qaeda and the Taliban in Afghanistan. From there, he went on to head the newly created Iraq Issues Group within the agency, and was heavily involved in the administration’s Iraq invasion efforts. “The word on Bob was that he was a good officer, but not the one for the job and not quite as aggressive as he might have been,” one official says. Another official says, “The director of NCS [the national clandestine service] decided there was somebody better, perhaps to better match his management vision, so [Grenier] is moving on.” Rumors had Grenier resigning in September 2005 along with the CIA’s second-highest official in the clandestine service, Robert Richer (see September 2, 2005), but those rumors proved to be false. [Washington Post, 2/7/2006; Los Angeles Times, 2/7/2006; Sunday Times (London), 2/12/2006]
Seton Hall law professor Mark Denbeaux, who represents some of the detainees at Guantanamo, releases a report on the status of 517 prisoners currently incarcerated at the detention facility. Denbeaux bases his report on documents released by the US military. Eighty-six percent of the detainees had been sold to the US by either Northern Alliance or Pakistani soldiers in Afghanistan during the height of military operations in 2001, with little hard evidence that the captives sold to the Americans were actually Taliban or al-Qaeda fighters. Military analysts concluded that only 8 percent of the Guantanamo detainees had committed attacks on US forces or its allies, and another 30 percent of the detainees were likely members of the Taliban, al-Qaeda, or other radical Islamist groups before their capture, though they themselves had not fought. Over 60 percent of the detainees—some 310 of the 517 detainees—had no ties to terrorist or radical groups whatsoever. In 2007, reporter and author Charlie Savage will write, “Such facts might have emerged had the detainees been given hearings before a ‘competent tribunal,’ a right guaranteed by the Geneva Conventions and obeyed by the United States in every war up to and including the Gulf War.” [Denbeaux and Denbeaux, 2/7/2006 ; Savage, 2007, pp. 147-148]
The online news site Raw Story publishes an article claiming that the exposure of covert CIA agent Valerie Plame Wilson (see June 13, 2003, June 23, 2003, July 7, 2003, 8:30 a.m. July 8, 2003, July 8, 2003, 11:00 a.m. July 11, 2003, 8:00 a.m. July 11, 2003, Late Afternoon, July 12, 2003, 1:26 p.m. July 12, 2003, July 12, 2003, and July 14, 2003) caused more damage to US national security than has previously been admitted, particularly in the area of containing foreign nuclear proliferation. Editor and reporter Larisa Alexandrovna sources the story from a number of anonymous current and former intelligence officials. Plame Wilson, the officials say, was an integral part of an operation tracking distribution and acquisition of weapons of mass destruction technology to and from Iran. Alexandrovna writes, “Their [the officials’] accounts suggest that Plame [Wilson]‘s outing was more serious than has previously been reported and carries grave implications for US national security and its ability to monitor Iran’s burgeoning nuclear program.” The officials say that while previous reports indicate Plame Wilson may have been involved in monitoring nuclear “black market” activities, particularly those involving Abdul Qadeer Khan (see Late February 1999), her real focus was Iran, though her team would have come into contact with Khan’s black market network during the course of its work on Iran’s nuclear program. Khan’s network is believed to have been the primary source of Iran’s nuclear weapons efforts. The officials refuse to identify the specifics of Plame Wilson’s work, but do say that her exposure resulted in “severe” damage to her team and significantly hampered the CIA’s ability to monitor nuclear proliferation. [Raw Story, 2/13/2006] The officials also say that the CIA conducted an “aggressive” in-house assessment of the damage caused by Plame Wilson’s exposure shortly after the White House leaked her identity to the press, and found the damage done by the leak “severe” (see Before September 16, 2003).
The progressive Internet news site Washington Note writes a follow-up to the day’s revelation that the exposure of Valerie Plame Wilson’s identity as a covert CIA agent caused heavy damage to the CIA’s ability to monitor Iran’s nuclear weapons program (see February 13, 2006). The Note reports that, according to its source, Plame Wilson’s husband, former ambassador Joseph Wilson, included information about Iran’s nuclear program in the report from his 2002 trip to Niger (see February 21, 2002-March 4, 2002 and March 4-5, 2002). Note reporter Steve Clemons says he cannot be sure of the accuracy of the claim, “so please take the following with a grain of salt until further sourced.” Clemons describes his source as “[s]omeone with knowledge of the classified report that Joe Wilson ‘orally’ filed after his now famed investigative trip to Niger.” Wilson allegedly included two notes in his debriefing that related to Iran and its possible activities in Niger. Clemons writes that “various intelligence sources” speculate that if Iran was indeed attempting to acquire Nigerien uranium, it would be to avoid “the international intelligence monitoring of Iran’s domestic mining operations.” Wilson, according to the source, may have reported that Iran, not Iraq, tried to acquire 400 to 500 tons of Nigerien uranium (see Between Late 2000 and September 11, 2001). Clemons writes that the notes from Wilson’s Niger debriefing have been destroyed, making it much harder to verify the claims. [Washington Note, 2/13/2006]
Former National Security Agency (NSA) intelligence analyst and current whistleblower Russell Tice tells the House Government Reform Subcommittee on National Security, Emerging Threats, and International Relations that he worries about what he calls a “special access” electronic surveillance program that is far more wide-ranging than the warrantless wiretapping recently exposed by the New York Times. However, Tice says he is forbidden by law to reveal specifics of the program to Congress. Tice says he believes the program violates the Constitution’s protection against unlawful search and seizures, but for him to discuss it with anyone in Congress or even with the NSA’s inspector general would violate classification laws. A spokesman for Congressman Dennis Kucinich (D-OH) says both Kucinich and committee chairman Christopher Shays (R-CT) believe that a few members of the Armed Services Committee have high enough security clearances for Tice’s information: “Congressman Kucinich wants Congressman Shays to hold a hearing [on the program]. Obviously it would have to take place in some kind of a closed hearing. But Congress has a role to play in oversight. The [Bush] administration does not get to decide what Congress can and can not hear.” In January 2006, it emerged Tice was one of the sources for the New York Times’s revelation that the NSA is engaged in possibly illegal wiretapping of American civilians as part of the war on terror (see January 10, 2006). Tice was fired from the NSA in 2005 and labeled “paranoid,” a classification Tice says was pasted on him in retaliation for his whistleblowing both inside the agency and to the public (see January 25-26, 2006). [United Press International, 2/14/2006] Author James Bamford, an expert on US intelligence, says, “The congressional intelligence committees have lost total control over the intelligence communities. You can’t get any oversight or checks and balances; the Congress is protecting the White House and the White House can do whatever it wants.” [In These Times, 5/15/2006]
The US interagency National Counterterrorism Center (NCTC) maintains a watch list of 325,000 names of international terrorism suspects, a number that has more than quadrupled since the the list was created in 2003 by merging other watch lists together. NCTC officials estimate that, due to aliases, some 200,000 individuals are represented on the list. The main US watch list at the time of 9/11 had 60,000 names on it (see December 11, 1999). An administration official says, “The vast majority are non-US persons and do not live in the US.” However, officials refuse to state how many on the list are US citizens and how many names on the list were obtained through the controversial wiretapping program run by the National Security Agency (NSA). Civil liberties and privacy advocates claim that the scale of the list heightens their concerns that watch lists include the names of large numbers of innocent people. Attorney General Alberto Gonzales tells the Senate Judiciary Committee that he cannot discuss specifics but says, “Information is collected, information is retained, and information disseminated in a way to protect the privacy interests of all Americans.” A September 2003 presidential directive instructs agencies to supply data for the list only about people who are “known or appropriately suspected to be… engaged in conduct constituting, in preparation for, in aid of, or related to terrorism.” Marc Rotenberg, executive director of the Electronic Privacy Information Center, says the scope of the NCTC list highlights the “false positive” problem, in which innocent people have been stopped from flying because their names are wrongly included or are similar to suspects’ names. “If there are that many people on the list, a lot of them probably shouldn’t be there. But how are they ever going to get off?” [Washington Post, 2/15/2006] Numerous problems with the list will be found in 2006 (see March 2006).
Special counsel Patrick Fitzgerald asks Judge Reggie Walton not to grant the request of the Lewis Libby defense team for documents pertaining to reporters’ conversations with White House officials (see January 26, 2006). Libby’s lawyers have already received over 11,000 pages in classified and unclassified documents, says Fitzgerald, including materials from the Office of the Vice President. The defense is also seeking a raft of classified information from the White House and the CIA (see December 14, 2005, January 9, 2006, January 20, 2006, January 23, 2006, January 23, 2006, January 31, 2006, and (February 16, 2006)). “The government has produced all documents and information to which defendant is entitled,” Fitzgerald writes in a court filing. “Requiring the production of the additional materials sought by defendant would unreasonably encroach on legitimate interests of national security, grand jury secrecy, and executive privilege.” [Bloomberg, 2/17/2006]
A Bush administration official sends an e-mail to senior members of the Defense Department’s Transportation Command, including General Norton Schwartz, who later becomes the Air Force chief of staff. The e-mail recommends that a set of prisoners slated for release from Guantanamo be detained longer for fear of negative press coverage. The e-mail will be released three years later as part of an American Civil Liberties Union (ACLU) Freedom of Information Act (FOIA) request (see February 12, 2009). The name of the author of the message will be redacted from the document. It reads in part: “We may need to definitely think about checking with Southcom to see if we can hold off on return flights for 45 days or so until things die down. Otherwise we are likely to have hero’s welcomes awaiting the detainees when they arrive.… It would probably be preferable if we could deliver these detainees in something smaller and more discreet.” The e-mail forwards correspondence entitled “US Getting Creamed on Human Rights,” which cites international news coverage of UN reports on conditions at Guantanamo. The e-mail cites that press coverage, along with “lingering interest in Abu Ghraib photos,” all of which “adds up to the US taking a big hit on the issues of human rights and respect for the rule of law.” In 2009, reporter Liliana Segura will observe: “The line fits neatly with the rest of what we know about the Bush administration’s philosophy: that perceptions of abuse were worth worrying about; the abuse itself? Not so much.” Gitanjali Gutierrez, a lawyer with the Center for Constitutional Rights, will add: “It is astonishing that the government may have delayed releasing men from Guantanamo in order to avoid bad press. Proposing to hold men for a month and a half after they were deemed releasable is inexcusable. The Obama administration should avoid repeating this injustice and release the innocent individuals with all due haste.” [Center for Constitutional Rights, 2/12/2009; AlterNet, 2/13/2009]
Shortly after the press learns that White House counsel Alberto Gonzales has withheld White House e-mails from the Fitzgerald investigation (see February 15, 2006), the White House turns over some 250 pages of e-mails from Vice President Dick Cheney’s office. The e-mails were sent during the spring of 2003 by senior Cheney aides, and pertain to the leak of CIA official Valerie Plame Wilson’s covert identity to the press. Special counsel Patrick Fitzgerald reveals the “discovery” of the missing e-mails in court. According to reporter Jason Leopold, the contents of the e-mails are “explosive, and may prove that Cheney played an active role in the effort to discredit Plame Wilson’s husband, former ambassador Joseph Wilson, a vocal critic of the Bush administration’s pre-war Iraq intelligence.” According to Leopold’s sources, the e-mails could also prove that Cheney lied to FBI investigators when he was interviewed about the leak in early 2004 (see May 8, 2004). Cheney told investigators that he knew nothing of any effort to discredit Wilson or to expose his wife’s undercover status to reporters. However, the e-mails indicate that Cheney led an effort to discredit Wilson that began in March 2003, and used the CIA to dig up information on Wilson that could be used to dirty his reputation in the press (see March 9, 2003 and After). Some of the e-mails refer to Plame Wilson’s identity and CIA status, and reference the US military’s inability to find weapons of mass destruction in Iraq. The e-mails also contain suggestions from Cheney’s senior aides, and from staffers of the National Security Council, as to how the White House should respond to Wilson’s criticisms of the administration’s pre-war Iraq intelligence. Fitzgerald has been attempting to secure the “missing” e-mails since late January (see January 23, 2006). Gonzales is still refusing to turn over some of the e-mails, citing “executive privilege” and “national security” concerns. [Truthout (.org), 2/24/2006; Associated Press, 2/27/2006] On February 28, the Wall Street Journal will write that the e-mails have been in the Libby team’s possession since February 6, and that they contain nothing pertinent to the trial (see February 6, 2006).
Senator John D. Rockefeller (D-WV), the ranking minority member of the Senate Intelligence Committee, writes a letter to John Negroponte, the director of national intelligence, regarding his belief that author and Washington Post reporter Bob Woodward revealed classified and potentially damaging information in his 2004 book, Plan of Attack. Rockefeller writes, “According to [Woodward’s] account, he was provided information related to sources and methods, extremely sensitive covert actions, and foreign intelligence liaison services.” Rockefeller is as yet unaware that Lewis “Scooter” Libby, the then-chief of staff to Vice President Dick Cheney, was authorized by President Bush to reveal such information (see April 5, 2006). Two former government officials confirm to reporter Murray Waas that Woodward’s book contains information that has not been made public. The information was provided by the White House in an attempt to bolster its argument that Iraq had WMD, and most of it was later found unreliable. One former senior official says, “The information was never presented to the public because it was bunk in the first place.” Rockefeller writes: “I [previously] wrote both former Director of Central Intelligence (DCI) George Tenet and Acting DCI John McLaughlin seeking to determine what steps were being taken to address the appalling disclosures in [Woodward’s book]. The only response that I received was to indicate that the leaks had been authorized by the administration.” [National Journal, 4/6/2006]
The Golden Mosque, before and after the bombing. [Source: Associated Press] (click image to enlarge)The Al-Askari or Golden Mosque, in Samarra, Iraq, is partially destroyed in a bombing attack that devastates the ancient shrine. The mosque is one of the holiest of Shi’ite sites. The attacks are carried out by about a dozen men in paramilitary uniforms who enter the shrine, handcuff four guards sleeping in a back room, place a bomb in the dome of the mosque, and detonate it. [New York Times, 2/22/2006; Radio Free Europe, 2/12/2007] The devastating attack on one of Shi’a Islam’s holiest sites prompts off a wave of Shi’ite attacks on Sunni mosques, Sunni citizens, and even US occupiers that eventually takes over 10,000 Iraqi lives and brings the country closer to full-blown civil war. [Washington Post, 6/13/2004] Some local officials say that the bombers wore the uniforms of Iraqi security forces. Iraqi Prime Minister Ibrahim al-Jaafari says that the attack was possibly the result of “infiltration” of Iraqi security forces. The four guards found handcuffed will later be arrested as suspects in the bombing as well as 10 men dressed as Iraqi police commandos. [Washington Post, 2/23/2006] The Iraqi government will blame the al-Qaeda faction in Iraq for the bombings, though that organization’s responsibility for the bombings remains unclear. [Reuters, 6/13/2007] One leading Iraqi Shi’ite politician, Abdul Aziz al-Hakim, lays partial blame for the bombing on the US ambassador to Iraq, Zalmay Khalilzad, saying that Khalilzad’s public comments on death squads operating within Iraq’s Shi’ite-led Interior Ministry were a provocation to the bombing. [New York Times, 2/22/2006] Shi’ite and Sunni politicians exchange accusations over the bombings, with Shi’ite lawmakers saying that the government ignored warnings about the attacks, and Sunnis accusing Shi’ites of bombing their own shrine to exacerbate discords between the two religious factions. [Reuters, 3/2/2006] President Bush promises to rebuild the mosque. [CNN News, 2/22/2006] But the shrine is, as of mid-2007, never rebuilt, partly because of disagreements between Sunnis and Shi’ites as to how to go about the rebuilding process. [Radio Free Europe, 2/12/2007] The shrine will be bombed again 17 months later (see June 13, 2007), setting off another wave of violent reprisals.
US Army Major General Rick Lynch speaks to reporters in Baghdad and claims that there was no warning in advance about a possible attack on the “Golden Mosque” in Samarrah. This directly contradicts claims from internal Iraqi government sources that say the national security ministry sent a warning to the Iraqi government about a breach of security at the mosque weeks before the bombing occurred (see Early February 2006). [Washington File, 2/23/2003]
The American Civil Liberties Union (ACLU) releases Defense Department documents showing that senior Pentagon officials approved harsh interrogation techniques that FBI agents termed abusive, ineffective, and unlawful. “We now possess overwhelming evidence that political and military leaders endorsed interrogation methods that violate both domestic and international law,” according to ACLU lawyer Jameel Jaffer. “It is entirely unacceptable that no senior official has been held accountable.” One document shows that FBI personnel at Guantanamo questioned harsh methods being used by military interrogators (see May 30, 2003). Another shows that senior Pentagon officials approved interrogation methods considered abusive by FBI agents (see May 5, 2004). The ACLU says that, combined with a memo from Navy general counsel Alberto Mora (see January 15-22, 2003), evidence “show[s] conclusively that Pentagon officials at the highest levels authorized the abuse of prisoners and persisted in their endorsement of unlawful interrogation methods even after FBI and Navy personnel objected to those methods orally and in writing.” The documents released by the ACLU also show that interrogators from the Department of Homeland Security identified themselves as FBI agents while using harsh methods against detainees. One FBI memo observed, “The next time a real agent tries to talk to that guy, you can imagine the result.” The documents also show that while FBI agents expressed concern about the harsh interrogation methods being employed by military and other interrogators, the FBI itself did little to counter such tactics (see January 24, 2004). [American Civil Liberties Union, 2/23/2006]
Several problems with the US international no-fly list, which is designed to prevent suspected terrorists from flying to the US, are found by investigative reporters Joe and Susan Trento. The list has grown rapidly since 2003 (see February 15, 2006), and was found to be inaccurate in 2005 (see June 14, 2005).
The list contains the names of fourteen 9/11 hijackers, who are thought to be dead (see March 2006).
The list deliberately omits the names of some known terrorists, apparently so that intelligence agencies can track them as they fly (see May 2006).
The information on the list makes it difficult to distinguish between people with similar names. For example, FBI special agent John E. Lewis is often stopped, as a suspected terrorist has a similar name to his. Several people called Robert Johnson are stopped regularly.
The list includes Francois Genoud, who had ties to both Islamic extremists and the Nazis and committed suicide in the mid-1990s at the age of 81.
The list only includes two people involved in the A. Q. Khan nuclear smuggling ring; dozens of their associates are omitted.
Numerous anti-Castro Cubans with records of suspicious and criminal activity are missing from the list.
However, left-wing Bolivian president Evo Morales is on the list.
A high-level official at United Airlines calls the list “a joke.” A Transportation Security Administration official says: “No-fly doesn’t protect anyone. It is every government agency’s cover-your-ass list of names. Many of the really bad guys are never put on the list because the intelligence people think the airlines are not trustworthy. That makes the incomplete list we give the airlines next to worthless.” [Trento and Trento, 2006, pp. 188-221; CBS News, 6/10/2006] The list will be reported to have over half a million names by June 2007 (see June 13, 2007).
Sam Karmilowicz, a former security officer at the US embassy in Manila, suggests in an interview with CounterPunch magazine, that US intelligence may have failed to properly follow leads in a counterterrorism case because of a potential link to Pakistani intelligence. In September 1994, Karmilowicz allegedly received information that a Pakistani businessman with possible ties to the ISI was part of a plot to assassinate President Clinton during his November 1994 visit to Manila (see September 18-November 14, 1994). An interagency US security team that was tasked with investigating the tip ended its investigation after only a few weeks. “My experience in the Philippines shows the US government has compartmentalized information… in order to cover-up its gross incompetence or its complicity in illegal and questionable activities conducted by, or against, foreign powers,” Karmilowicz says. [CounterPunch, 3/9/2006]
Zacarias Moussaoui. [Source: WNBC / Jonathan Deinst]Zacarias Moussaoui becomes the first and only person charged in direct connection with the 9/11 attacks to stand trial in the US. [Associated Press, 3/17/2006] He was preparing to hijack an aircraft and fly it into a target when he was arrested 26 days before 9/11 (see August 16, 2001 and April 22, 2005). Although there has been disagreement whether Moussaoui was to take part in the actual attack of 9/11 or a follow-up plot (see January 30, 2003), the prosecution alleges that Moussaoui had information related to the attacks (see August 16, 2001) and facilitated them by lying and not disclosing everything he knew to the FBI. He is charged with six counts, including conspiracy to commit acts of terrorism and conspiracy to commit aircraft piracy. [US District Court for the Eastern District of Virginia, Alexandria Division, 12/11/2001 ] The trial receives much media coverage and the highlights include the playing of United 93’s cockpit recorder (see April 12, 2006), a row over a government lawyer coaching witnesses (see March 13, 2006), and testimony by FBI agent Harry Samit (see March 9 and 20, 2006), former FBI assistant director Michael Rolince (see March 21, 2006), and Moussaoui himself (see March 27, 2006).
Moussaoui is forced to wear a stun belt, controlled by one of the marshalls, under his jumpsuit. The belt is to be used if Moussaoui lunges at a trial participant. [New York Times, 4/17/2006] He has already pleaded guilty (see April 22, 2005) and the trial is divided into two phases; in the first phase the jury decides that Moussaoui is eligible for the death penalty, but in the second phase it fails to achieve unanimity on whether Moussaoui should be executed (see May 3, 2006). [Associated Press, 4/3/2006; New York Times, 4/17/2006]
Republicans on the Senate Intelligence Committee refuse to allow an inquiry into the Bush administration’s warrantless wiretapping program (see December 15, 2005 and December 18, 2005), with the committee voting 10-8 along party lines to reject such a probe. Senate Judiciary Committee chairman Arlen Specter (R-PA) had advocated such a probe, but White House officials refused to cooperate with his committee, saying they would only cooperate via classified briefings to the Intelligence Committee. However, committee Republicans, led by chairman Pat Roberts (R-KS), have no intention of allowing such an inquiry. Roberts and his fellows say they will push to impose limitations on the program. Committee Democrats accuse their Republican colleagues of colluding with the administration to block the inquiry. “The committee is, to put it bluntly, is basically under the control of the White House,” says ranking committee member John D. Rockefeller (D-WV). “You can’t legislate properly unless you know what’s going on.” The Republicans have left Congress to “legislate in darkness and ignorance,” he says. Republicans say that a new, select subcommittee will increase oversight of the administration’s wiretapping. “It provides for a case-by-case examination and oversight by the United States Congress,” says Mike DeWine (R-OH), who is helping draft the bill for the new oversight subcommittee. “It will be very consistent with what our constitutional obligations are.” DeWine’s bill would allow the administration to ignore restrictions on wiretapping merely by invoking national security, and would not allow the committee to intervene even in clearly unjustified cases of wiretapping. “The White House could just decide not to tell them everything, and there’s no sanction,” says Bruce Fein, a former Reagan administration lawyer. “And the president can still claim that he has inherent power to conduct surveillance.” The bill is “extremely generous to the president,” says conservative law professor Douglas Kmiec. “It is not significantly different from the status quo. And I think the president would be quite delighted by that.” [Boston Globe, 3/8/2006; Savage, 2007, pp. 204]
President Bush signs the USA Patriot Improvement and Reauthorization Act of 2005 into law. The bill, which extends and modifies the original USA Patriot Act (see October 26, 2001), was driven through Congress primarily by the Republican majorities in both Houses. However, Senator Dianne Feinstein (D-CA) cosponsored the Senate bill, numerous Democrats in both Houses voted with the Republicans in favor of the bill, and the final bill sailed through the Senate by an 89-10 vote on March 2. [GovTrack, 3/9/2006; Library of Congress, 3/9/2006] In the signing ceremony, Bush calls the Reauthorization Act “a really important piece of legislation… that’s vital to win the war on terror and to protect the American people.” He repeatedly evokes the 9/11 attacks as a reason why the new law is needed. [Government Printing Office, 3/9/2006]
Provisions for Oversight Added - One of the reasons why the reauthorization bill received such support from Congressional moderates on both sides of the aisle is because Congress added numerous provisions for judicial and Congressional oversight of how government and law enforcement agencies conduct investigations, especially against US citizens. Representative Butch Otter (R-ID) said in 2004 that Congress came “a long way in two years, and we’ve really brought an awareness to the Patriot Act and its overreaches that we gave to law enforcement.” He adds, “We’ve also quieted any idea of Patriot II, even though they snuck some of Patriot II in on the intelligence bill” (see February 7, 2003). [Associated Press, 1/23/2004]
Opposition From Both Sides - Liberal and conservative organizations joined together in unprecedented cooperation to oppose several key provisions of the original reauthorization and expansion of the Patriot Act, including easing of restrictions on government and law enforcement agencies in obtaining financial records of individuals and businesses, “sneak-and-peek” searches without court warrants or the target’s knowledge, and its “overbroad” definition of the term “terrorist.” Additionally, lawmakers in Congress insisted on expiration dates for the various surveillance and wiretapping methodologies employed by the FBI and other law enforcement agencies (see Early 2002). [Associated Press, 5/23/2005] The final bill mandates that anyone subpoenaed for information regarding terrorist investigations has the right to challenge the requirement that they not reveal anything about the subpoena, those recipients will not be required to tell the FBI the name of their lawyer, and libraries that are not Internet service providers will not be subject to demands from “national security letters” for information about their patrons. Many of the bill’s provisions will expire in four years. [Christian Science Monitor, 3/3/2006]
Reauthorizing Original Provisions - The bill does reauthorize many expiring provisions of the original Patriot Act, including one that allows federal officials to obtain “tangible items,” such as business records from libraries and bookstores, in connection with foreign intelligence and international terrorism investigations. Port security provisions are strengthened, and restrictions on the sale of over-the-counter cold and allergy medicine that can be used in the illegal manufacture of methamphetamine are imposed, forcing individuals to register their purchases of such medicines and limiting the amounts they can buy. [CBS News, 3/9/2006]
Bush Signing Statement Says He Will Ignore Oversight Mandates - But when he signs the bill into law, Bush also issues a signing statement that says he has no intention of obeying mandates that enjoin the White House and the Justice Department to inform Congress about how the FBI is using its new powers under the bill. Bush writes that he is not bound to tell Congress how the new Patriot Act powers are being used, and in spite of what the law requires, he can and will withhold information if he decides that such disclosure may “impair foreign relations, national security, the deliberative process of the executive, or the performance of the executive’s constitutional duties.” [Statement on Signing the USA PATRIOT Improvement and Reauthorization Act, 3/9/2006; Boston Globe, 3/24/2006] Senator Patrick Leahy (D-VT) says that Bush’s assertion that he can ignore provisions of the law as he pleases, under the so-called “unitary executive” theory, are “nothing short of a radical effort to manipulate the constitutional separation of powers and evade accountability and responsibility for following the law.” Law professor David Golove says the statement is illustrative of the Bush administration’s “mind-bogglingly expansive conception” of executive power, and its low regard for legislative power. [Boston Globe, 3/24/2006] Author and legal expert Jennifer Van Bergen warns of Bush using this signing statement to avoid accountability about the NSA’s warrantless wiretapping program, writing: “[I]t is becoming clearer every day that Bush has no qualms about violating either international laws and obligations or domestic laws. The recent revelations about the secret NSA domestic surveillance program revealed Bush flagrantly violating the Foreign Intelligence Surveillance Act which was specifically enacted to prevent unchecked executive branch surveillance. … His signing statements, thus, are nothing short of an attempt to change the very face of our government and our country.” [Institute for Public Accuracy, 3/27/2006]
Request to Rescind Signing Statement - In late March, Democratic House members Jane Harman and John Conyers will write to Attorney General Alberto Gonzales requesting that the administration rescind the signing statement, writing: “As you know, ‘signing statements’ do not have the force of law. Legislation passed by both Houses and signed by the president does. As Article 1, Section 7, of the Constitution states: ‘Every bill which shall have passed the House of Representatives and the Senate, shall, before it become a Law, be presented to the President of the United States; If he approve he shall sign it, but if not he shall return it.’” Bush and Gonzales will ignore the request. [US House of Representatives, 3/29/2006]
Entity Tags: US Department of Justice, Domestic Security Enhancement Act of 2003, David Golove, Alberto R. Gonzales, Butch Otter, Dianne Feinstein, Patrick J. Leahy, USA Patriot Act, John Conyers, Federal Bureau of Investigation, National Security Agency, Foreign Intelligence Surveillance Act, Jennifer Van Bergen, Jane Harman, George W. Bush
Timeline Tags: Civil Liberties
FBI agent Harry Samit testifying at the Moussaoui trial. [Source: Agence France-Presse]FBI agent Harry Samit testifies at the trial of Zacarias Moussaoui (see March 6-May 4, 2006). Samit was one of the main agents involved in Moussaoui’s arrest and bombarded his superiors with messages about the danger Moussaoui posed (see August 21, 2001 and August 21, 2001). Under direct examination he relates what happened in August 2001 (see August 22, 2001). The prosecutor asks Samit several times what he would have done if Moussaoui had told the truth, and Samit is usually allowed by the judge to say how it would have helped the investigation and made 9/11 less likely. [US District Court for the Eastern District of Virginia, Alexandria Division, 3/9/2006] However, under cross examination Samit says he was not fooled by Moussaoui’s lies and that he immediately suspected him of preparing to hijack an airplane, but the investigation was thwarted by FBI headquarters, and the Radical Fundamentalist Unit in particular. He admits that he told the Justice Department’s Office of Inspector General that FBI headquarters was guilty of “obstructionism, criminal negligence, and careerism,” and that its opposition blocked “a serious opportunity to stop the 9/11 attacks.” [Associated Press, 3/20/2006] Samit says he warned his supervisors more than 70 times that Moussaoui was an al-Qaeda operative who might be plotting to hijack an airplane and fly it into a building, and that he was regularly thwarted by two superiors, David Frasca and Michael Maltbie. Reporting Samit’s testimony, the London Times will conclude that “the FBI bungled the Moussaoui investigation.” [London Times, 4/25/2006] Similar charges were made by one of Samit’s colleagues, Coleen Rowley, after 9/11 (see May 21, 2002). The Los Angeles Times will comment, “His testimony appeared to undermine the prosecution’s case for the death penalty.” [Los Angeles Times, 3/20/2006]
The Chicago Tribune uses commercial, Internet-based data search facilities to discover the names and whereabouts of 2,653 CIA officials, many of them covert. It also discovers some 50 internal agency telephone numbers, and the locations of two dozen secret CIA facilities around the US. The CIA is still grappling with the problem of Internet data search facilities risking the covert status of its employees; Director Porter Goss is said to be “horrified” at the prospect of hundreds of his agency’s officials being exposed via the Internet. “Cover is a complex issue that is more complex in the Internet age,” says CIA spokeswoman Jennifer Dyck. “There are things that worked previously that no longer work. Director Goss is committed to modernizing the way the agency does cover in order to protect our officers who are doing dangerous work.” Dyck refuses to give details of the remedies, “since we don’t want the bad guys to know what we’re fixing.” The Tribune declines to publish any personal information on the CIA employees it has unearthed, and is uncertain which of the 2,653 officials it located are actually covert agents. Most of the secret facilities the Tribune found are in northern Virginia, but some are in Chicago, Florida, Ohio, Pennsylvania, Utah, and Washington State. A senior official says of the data searches, “I don’t know whether al-Qaeda could do this, but the Chinese could.” The Tribune’s data search began with Camp Peary, the Virginia training facility known as “The Farm,” and only recently acknowledged by the agency. [Chicago Tribune, 3/12/2006]
Michael Rolince, who headed the FBI’s International Terrorism Operations Section when Zacarias Moussaoui was arrested, testifies at Moussaoui’s trial (see March 6-May 4, 2006). He initially states that he was only informed of the Moussaoui case before 9/11 in two brief hallway conversations (see Late August 2001) and did not read a memo sent to him by the Minneapolis field office. However, under cross-examination he admits he also discussed a plan to deport Moussaoui to France, where his belongings could be searched (see (August 30-September 10, 2001)). [Associated Press, 3/21/2006; Associated Press, 3/21/2006] According to Newsday, Rolince appears “red-faced and flustered” at the end of the cross-examination and makes the court burst out laughing when he says he did not approve a briefing to FBI field offices about bin Laden threats in the US (see Before April 13, 2001), even though the briefing states he approved it. He says one of his subordinates may have approved it. [Associated Press, 3/21/2006; Newsday, 3/22/2006] Rolince is called by the prosecution, which wants him to give a list of steps the FBI would have taken if Moussaoui had confessed. However, Judge Brinkema states that, “Juries cannot decide cases on speculation… Nobody knows what would have happened.” [Associated Press, 3/21/2006; Associated Press, 3/22/2006]
During the trial of Zacarias Moussaoui (see also March 6-May 4, 2006), the prosecution claims that if Zacarias Moussaoui had not lied when arrested and questioned (see August 16, 2001) and had provided information about the plot (see August 16, 2001), the FAA could have altered its security procedures to deal with the suicide hijacker threat. Prosecution witness Robert Cammaroto, an aviation security officer, says that security measures in effect before 9/11 were designed to cope with different types of threats, such as “the homesick Cuban,” rather than suicide hijackings. He says that if the FAA had more information about Moussaoui, its three dozen air marshals could have been moved from international to domestic flights, security checkpoints could have been tightened to detect short knives like the ones Moussaoui had, and flight crews could have been instructed to resist rather than cooperate with hijackers. Most of these steps could have been implemented within a matter of hours. However, Cammarato admits that the FAA was aware before 9/11 that terrorists considered flying a plane into the Eiffel Tower and that al-Qaeda has performed suicide operations on land and sea. [Associated Press, 3/22/2006]
Responding to President Bush’s signing statement indicating that he will not comply with several oversight provisions in the USA Patriot Act reauthorization (see March 9, 2006), House members Jane Harman (D-CA) and John Conyers (D-MI) write to Attorney General Alberto Gonzales asking that the administration rescind the statement. They write, “As you know, ‘signing statements’ do not have the force of law. Legislation passed by both Houses and signed by the President does. As Article 1, Section 7, of the Constitution states: ‘Every Bill which shall have passed the House of Representatives and the Senate, shall, before it become a Law, be presented to the President of the United States; If he approve he shall sign it, but if not he shall return it.’ If the President does not like part of a bill, he has only one option: to veto the entire thing. This signing statement, and many of the 107 similar statements the President has issued on other legislation, have the effect of corrupting the legislative process. Indeed, during consideration of this matter, many Members who supported the final law did so based upon the guarantee of additional reporting and oversight. This Administration cannot, after the fact, unilaterally repeal provisions of the law implementing such oversight.” [US House of Representatives, 3/29/2006]
Conservative Party leader David Cameron. [Source: Public domain]Following the London bombings (see July 7, 2005), Britain passes a new Terrorism Act containing tougher laws, but they have little practical effect and many Islamic radicals carry on as before. The act introduces new offenses such as criminalizing the encouragement of terrorism and dissemination of terrorist publications, but the most controversial measure is an extension of the period for which suspects could be detained without trial. The government pushes for an extension from 14 days to 90 days, but parliament only allows 28 days. [Guardian, 11/9/2005; London Times, 11/9/2005; BBC, 11/9/2005; UK Parliament. House of Commons., 3/30/2006] In August 2006, Conservative Party leader David Cameron will criticize the government for failing to “follow-though when the headlines have moved on.” He asks, “Why have so few, if any, preachers of hate been prosecuted or expelled?” and “why has so little been done to use the existing law to deal with the radicalization that is rife within our shores?” He also criticizes the government for funding conferences addressed by radical imam Yousuf Abdullah Al-Qaradawi. [Conservative Party, 8/15/2006]
Representative Jane Harman (D-CA), the ranking member of the House Intelligence Committee, says she is appalled at President Bush’s 2003 decision to leak portions of the October 2002 National Intelligence Estimate, as Vice President Dick Cheney’s former chief of staff Lewis Libby has testified (see March 24, 2004). Portions of Libby’s testimony are just now becoming public knowledge. “Leaking classified information to the press when you want to get your side out or silence your critics is not appropriate,” Harman says. “If I had leaked the information, I’d be in jail. Why should the president be above the law? I am stunned.” [National Journal, 6/14/2006]
Jeffrey Rapp, the director of the Joint Intelligence Task Force for Combating Terrorism at the Defense Intelligence Agency, provides a 16-page document supporting the government’s declaration that Ali Saleh Kahlah al-Marri is an enemy combatant (see December 12, 2001). Rapp gives the classified document, originally prepared in September 2004 and partially declassified for the court, to the trial judge presiding over the case, Henry Floyd (see April 6, 2006). The document, informally known as the “Rapp Declarations,” makes an array of charges against al-Marri, including alleging that he “met personally” with Osama bin Laden and was sent to the US to “explore computer-hacking methods to disrupt bank records and the US financial system.” Rapp claims that al-Marri was trained in the use of poisons and had detailed information about poisonous chemicals on his laptop computer, a claim verified by an FBI search. Additionally, Rapp says that al-Qaeda “instructed al-Marri to explore possibilities for hacking into the mainframe computers of banks with the objective of wreaking havoc on US banking records.” Rapp also says that al-Marri’s computer was loaded with “numerous computer programs typically utilized by computer hackers; ‘proxy’ computer software which can be utilized to hide a user’s origin or identity when connected to the Internet; and bookmarked lists of favorite Web sites apparently devoted to computer hacking.” Rapp refuses to cite any sources other than “specific intelligence sources” that are “highly classified.” [Jeffrey M. Rapp, 9/9/2004 ; CNET News, 9/22/2006] While this kind of evidence is routinely dismissed as hearsay evidence inadmissible in court, Floyd rules that because the Supreme Court ruled in Hamdi v. Rumsfeld that hearsay evidence can be used against alleged enemy combatants (see June 28, 2004), the “Rapp Declarations” would be considered. Floyd says that al-Marri’s lawyers will have to provide “more persuasive evidence” that counters the government’s case—a reversal of the usual burden of proof that places the responsibility of proving guilt on the prosecution and not the defense. [CNET News, 9/22/2006]
Page 14 of 19 (1820 events (use filters to narrow search))previous
Receive weekly email updates summarizing what contributors have added to the History Commons database
Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.