!! History Commons Alert, Exciting News

Context of 'January 19, 2009: Bush Administration Requests Stay in Judge’s Decision to Allow Lawsuit to Proceed'

This is a scalable context timeline. It contains events related to the event January 19, 2009: Bush Administration Requests Stay in Judge’s Decision to Allow Lawsuit to Proceed. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 15 of 18 (1749 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18 | next

After the NSA’s warrantless wiretapping program is revealed (see Early 2002 and December 15, 2005), some commentators criticize the program. Americans have fundamental Constitutional protections that are enforceable in court whether their conversations are domestic or international, says law scholar Geoffrey Stone. Stone says that President Bush’s emphasis that NSA wiretapping only takes place on US calls to overseas phones or overseas e-mails “is no different, as far as the law is concerned, from saying we only do it on Tuesdays.” Former FBI national security law chief Michael Woods, who served in the position when Bush signed the NSA directive, calls the program “very dangerous.” Though Woods says the program was justifiable in the immediate aftermath of 9/11, “[By now] we ought to be past the time of emergency responses. We ought to have more considered views now…. We have time to debate a legal regime and what’s appropriate.” [Washington Post, 12/18/2005] Kate Martin, director of the Center for National Security Studies, says the secret order may amount to Bush authorizing criminal activity in direct violation of FISA. “This is as shocking a revelation as we have ever seen from the Bush administration,” she says. “It is, I believe, the first time a president has authorized government agencies to violate a specific criminal prohibition and eavesdrop on Americans.” The American Civil Liberties Union’s Caroline Frederickson says of the program, “It’s clear that the administration has been very willing to sacrifice civil liberties in its effort to exercise its authority on terrorism, to the extent that it authorizes criminal activity.” [Washington Post, 12/16/2005]

Entity Tags: Center for National Security Studies, Geoffrey Stone, American Civil Liberties Union, National Security Agency, Caroline Frederickson

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales and NSA chief Lieutenant General Michael Hayden conduct their own “briefing” on the recently revealed NSA wiretapping program (see December 15, 2005) with the White House press corps. Gonzales and Hayden make the following points:
bullet Gonzales says that he will not discuss the internal workings of the still-classified program, only what he calls its “legal underpinnings.”
bullet He claims that the program, which he calls “the most classified program that exists in the United States government,” is legal because President Bush authorized it, and says that the idea that “the United States is somehow spying on American citizens” is wrong: it is “[v]ery, very important to understand that one party to the communication has to be outside the United States.”
bullet He says that for the NSA to eavesdrop on a US citizen’s telephone or e-mail communications, “we have to have a reasonable basis to conclude that one party to the communication is a member of al-Qaeda, affiliated with al-Qaeda, or a member of an organization affiliated with al-Qaeda, or working in support of al-Qaeda.” The wiretapping program is an essential part of the administration’s war against terror, he says.
bullet He goes on to claim that “the authorization to use force, which was passed by the Congress in the days following September 11th, constitutes” legal grounds for “this kind of signals intelligence.” [White House, 12/19/2005] The White House signed Congress’s Authorization to Use Military Force (AUMF) into law on September 18, 2001 (see September 14-18, 2001. [White House, 9/18/2001]
Hayden Claims Supreme Court Backing - While he admits that the Congressional authorization to use force against international terrorism does not specifically mention any kind of electronic surveillance, he refers the listeners to the Supreme Court case concerning alleged US terrorist Yaser Esam Hamdi (see June 28, 2004), in which the Court ruled that Hamdi had the legal right to challenge his detention. “[T]he United States government took the position that Congress had authorized that detention in the authorization to use force, even though the authorization to use force never mentions the word ‘detention.’ And the Supreme Court, a plurality written by Justice O’Connor agreed. She said, it was clear and unmistakable that the Congress had authorized the detention of an American citizen captured on the battlefield as an enemy combatant for the remainder—the duration of the hostilities. So even though the authorization to use force did not mention the word, ‘detention,’ she felt that detention of enemy soldiers captured on the battlefield was a fundamental incident of waging war, and therefore, had been authorized by Congress when they used the words, ‘authorize the President to use all necessary and appropriate force.’ For the same reason, we believe signals intelligence is even more a fundamental incident of war, and we believe has been authorized by the Congress. And even though signals intelligence is not mentioned in the authorization to use force, we believe that the Court would apply the same reasoning to recognize the authorization by Congress to engage in this kind of electronic surveillance.”
Bush 'Very Concerned' With Protecting Civil Liberties - Gonzales insists, Bush “is very concerned about the protection of civil liberties, and that’s why we’ve got strict parameters, strict guidelines in place out at NSA to ensure that the program is operating in a way that is consistent with the President’s directives.” He adds, “[W]e feel comfortable that this surveillance is consistent with requirements of the Fourth Amendment. The touchstone of the Fourth Amendment is reasonableness, and the Supreme Court has long held that there are exceptions to the warrant requirement in—when special needs outside the law enforcement arena. And we think that that standard has been met here.”
Wiretapping Essential in Catching Terrorists - Hayden reiterates how important the wiretapping is to catching terrorists and stopping potential attacks against US targets, though he and Gonzales both refuse to say what, if any, terrorist plots or what terror suspects might have been captured through the NSA wiretapping program. Hayden does say, “This program has been successful in detecting and preventing attacks inside the United States.…I can say unequivocally, all right, that we have got information through this program that would not otherwise have been available,” though he refuses to cite specifics. He admits that there have been some errors in surveilling innocent US citizens, though he refuses to give any details, and says those errors were quickly corrected.
Administration Not Required to Go Through FISA - Gonzales, who is the main speaker in the briefing, reiterates that while the administration continues to seek warrants from the Foreign Intelligence Surveillance (FISA) court, “we are not legally required to do, in this particular case, because the law requires that we—FISA requires that we get a court order, unless authorized by a statute, and we believe that authorization has occurred.” He justifies the administration’s refusal to use the FISA court for obtaining warrants by insisting that NSA officials “tell me that we don’t have the speed and the agility that we need, in all circumstances, to deal with this new kind of enemy. You have to remember that FISA was passed by the Congress in 1978. There have been tremendous advances in technology… since then.” Hayden adds, “I don’t think anyone could claim that FISA was envisaged as a tool to cover armed enemy combatants in preparation for attacks inside the United States. And that’s what this authorization under the President is designed to help us do.”
'Balancing' of Civil Liberties, National Security - Hayden says the warrantless wiretapping program is part of “a balancing between security and liberty,” a more “aggressive” operation “than would be traditionally available under FISA. It is also less intrusive. It deals only with international calls. It is generally for far shorter periods of time. And it is not designed to collect reams of intelligence, but to detect and warn and prevent about attacks. And, therefore, that’s where we’ve decided to draw that balance between security and liberty.”
Media Leaks Damaging to National Security - Gonzales refuses to talk about when any members of Congress were briefed on the program or what they were told, but he does imply that there will be some sort of leak investigation as to how the New York Times found out about the program: “[T]his is really hurting national security, this has really hurt our country, and we are concerned that a very valuable tool has been compromised. As to whether or not there will be a leak investigation, we’ll just have to wait and see.”
No Evidence of Compromised National Security - When asked whether he can cite any evidence that the revelation of the program’s existence has actually compromised anything—“Don’t you assume that the other side thinks we’re listening to them? I mean, come on,” one reporter says—Gonzales responds, rather confusingly, “I think the existence of this program, the confirmation of the—I mean, the fact that this program exists, in my judgment, has compromised national security, as the President indicated on Saturday.”
Easier to Sidestep FISA Instead of Seek Congressional Approval - He does admit that the administration decided to sidestep the FISA court entirely instead of attempt to work with Congress to rewrite the FISA statutes because “we were advised that that would be difficult, if not impossible” to amend the law to the White House’s satisfaction. Gonzales says those who are concerned about the program being excessively intrusive or a threat to American civil liberties simply “don’t understand the specifics of the program, they don’t understand the strict safeguards within the program.… Part of the reason for this press brief today is to have you help us educate the American people and the American Congress about what we’re doing and the legal basis for what we’re doing.” He adds that any legal experts who believe the program is illegal are basing their judgments “on very limited information.”
Tough Questioning - One reporter asks an unusually tough series of questions to Gonzales: “Do you think the government has the right to break the law?”, to which Gonzales replies, “Absolutely not. I don’t believe anyone is above the law.” The reporter then says, “You have stretched this resolution for war into giving you carte blanche to do anything you want to do,” to which Gonzales replies cryptically, “Well, one might make that same argument in connection with detention of American citizens, which is far more intrusive than listening into a conversation.” The reporter insists, “You’re never supposed to spy on Americans,” and Gonzales deflects the responsibility for the decision back onto the Supreme Court.
Administration Will Tell Nation What It Needs to Know - Gonzales says the administration has no intention of releasing any of the classified legal opinions underpinning the program, and this press briefing is one of the methods by which the administration will “educat[e] the American people…and the Congress” to give them what they need to know about the program. [White House, 12/19/2005]

Entity Tags: White House press corps, Michael Hayden, Al-Qaeda, National Security Agency, Alberto R. Gonzales, George W. Bush, Foreign Intelligence Surveillance Court

Timeline Tags: Civil Liberties

DARPA logo.DARPA logo. [Source: Duke University]The computer and technology experts at Ars Technica, a well-regarded Web publication which describes itself as focusing on “the art of technology,” speculate on the technology behind the NSA warrantless wiretapping program recently revealed to the public (see December 15, 2005). The Ars Technica experts believe that Senator Jay Rockefeller (D-WV)‘s 2003 comparison between the program and the Total Information Awareness (TIA) project (see March 2002) is the most apt. They believe that the NSA wiretapping program may be built upon the foundation of a shadowy, highly classified surveillance program called Echelon. They write, “This system’s purpose would be to monitor communications and detect would-be terrorists and plots before they happen… This project is not interested in funding ‘evolutionary’ changes in technology, e.g., bit-step improvements to current data mining and storage techniques. Rather, the amount of data that the directors are anticipating (petabytes!) would require massive leaps in technology (and perhaps also some massive leaps in surveillance laws).” [Ars Technica, 12/20/2005; Ars Technica, 2007] Data storage measured in petabytes is a colossal capacity; a petabyte is 1,024 terabytes, and a single terabyte is 1,024 gigabytes, the usual measurement for hard drive capacity. [TechTerms, 2007] The Ars Technica experts continue, “According to DARPA, such data collection ‘increases information coverage by an order of magnitude,’ and ultimately ‘requires keeping track of individuals and understanding how they fit into models.’” They go on to note that the NSA wiretapping program was instituted shortly after the TIA project was quashed by Congress, and say they believe the NSA program is an extension and an outgrowth of TIA. They note that “the FBI requested the legal authorization to do very high-volume monitoring of digital calls” in 1995, that there is “no way for the judicial system to approve warrants for the number of calls that the FBI wanted to monitor,” and that the FBI “could never hire enough humans to be able to monitor that many calls simultaneously, which means that they’d have to use voice recognition technology to look for ‘hits’ that they could then follow up on with human wiretaps.” The Ars Technica experts believe the NSA is using “some kind of high-volume, automated voice recognition and pattern matching system,” employing a form of “smart filtering” that would weed through perhaps hundreds of thousands of computer-monitored calls and turning a fraction of those calls over to human analysts for evaluation: “[Y]es, this kind of real-time voice recognition, crude semantic parsing and pattern matching is doable with today’s technology, especially when you have a budget like the NSA.” In a follow-up, Ars Technica technology specialist and self-described conservative and “privacy nazi” Jon Stokes writes of his own concerns over the program, noting that the program is too wide-reaching and too blunt to actually catch many real terrorists, and that the program is a tremendous intrusion into Americans’ fundamental privacy: “The problem is not that such large-scale industrial fishing invariably catches a few dolphins along with the tuna, but that between 99.999 and 100 percent of what you’re going to get is dolphin.” Stokes also warns that such an intrusive surveillance program will not only violate privacy rights, but be quite ineffective: “As the TSA, with its strip-searching of people’s elderly grandparents, abundantly proves every holiday season, blunt instruments and scorched earth tactics are of dubious value in catching genuine bad actors. In fact, blunt instruments and wide nets are the easiest for professional bad guys to evade. All you need to beat such surveillance tools is patience and know-how.…Blunt instruments like airport facial recognition software and random subway bag searches produce much more noise than they do signal, and any engineer or computer scientist worth his or her salt will tell you that an intelligent, targeted, low-tech approach beats a brute-force high-tech approach every time. There is no high-tech substitute for human intelligence gathering. In fact…an overload of crudely processed information is actually more likely to lead an analyst astray than it is to produce any useful insight.…In the end, brute force security techniques are not only corrosive to democratic values but they’re also bad for national security. They waste massive resources that could be spent more effectively elsewhere, and they give governments and countries a false sense of security that a savvy enemy can exploit to devastating effect.…[I]t’s not just enough to have sound intelligence; you also need political leaders who have the wisdom to use that intelligence appropriately.” [Ars Technica, 12/20/2005]

Entity Tags: Transportation Safety Administration, Total Information Awareness, Federal Bureau of Investigation, John D. Rockefeller, Defense Advanced Research Projects Agency, Jon Stokes, National Security Agency

Timeline Tags: Civil Liberties

Jonathan Alter.Jonathan Alter. [Source: Publicity photo via Greater Talent Network]Reporter and political pundit Jonathan Alter writes that President Bush’s attempt to kill the New York Times domestic wiretapping story (see December 15, 2005 and December 6, 2005), which the Times delayed for over a year at the White House’s request, is not an attempt to protect national security, as Bush will say in his response to the article (see December 17, 2005), but “because he knew that it would reveal him as a law-breaker.” Alter continues, “He insists he had ‘legal authority derived from the Constitution and Congressional resolution authorizing force.’ But the Constitution explicitly requires the president to obey the law. And the post-9/11 congressional resolution authorizing ‘all necessary force’ in fighting terrorism was made in clear reference to military intervention. It did not scrap the Constitution and allow the president to do whatever he pleased in any area in the name of fighting terrorism.” Alter is puzzled that Bush felt the need for the program when the 1978 Foreign Intelligence Surveillance Act (see 1978) “allows the government to eavesdrop on its own, then retroactively justify it to the court, essentially obtaining a warrant after the fact.” Alter says that only four of “tens of thousands” of FISA requests have ever been rejected, and, “There was no indication the existing system was slow—as the president seemed to claim in his press conference—or in any way required extra-constitutional action.” He concludes: “[Bush] knew publication would cause him great embarrassment and trouble for the rest of his presidency. It was for that reason—and less out of genuine concern about national security—that George W. Bush tried so hard to kill the New York Times story. …We’re seeing clearly now that Bush thought 9/11 gave him license to act like a dictator, or in his own mind, no doubt, like Abraham Lincoln during the Civil War.” [Newsweek, 12/21/2005]

Entity Tags: Abraham Lincoln, Bush administration (43), National Security Agency, New York Times, George W. Bush, Foreign Intelligence Surveillance Court, Foreign Intelligence Surveillance Act, Jonathan Alter

Timeline Tags: Civil Liberties

Chart showing NSA surveillance network.Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” [New York Times, 12/24/2005]

Entity Tags: US Department of Defense, US Department of Justice, Total Information Awareness, New York Times, US Department of Homeland Security, Computer Assisted Passenger Prescreening System, Bush administration (43), Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, George W. Bush, National Security Agency, Phil Karn

Timeline Tags: Civil Liberties

Suzanne Spaulding, a former counsel for the CIA, the Senate and House intelligence commission, and executive director of the National Terrorism Commission from 1999 through 2000, writes an op-ed criticizing the Bush administration for its domestic surveillance program. She writes that the three main sources of oversight and restraint on Bush’s unfettered efforts to monitor US citizens—Congress, the judiciary, and the American people—have failed to halt what she calls “this extraordinary exercise of presidential power.” Spaulding, who will testify along similar lines before the Senate over a year later (see April 11, 2007), writes, “Ironically, if it is ultimately determined that this domestic surveillance program reflects the exercise of unchecked power in contravention of law, it will wind up weakening the presidency. Once again, we will confront the challenge of restoring Americans’ faith in the rule of law and our system of checks and balances.” The pretense of oversight by the administration, in providing limited and perhaps misleading briefings on the program only to the so-called “Gang of Eight” Congressional leaders, is superficial and ineffective, she writes; the entire process “effectively eliminates the possibility of any careful oversight.” She notes that because of the severe restrictions both in the information doled out to these Congressional leaders, and their strict prohibition on discussing the information with anyone else, even other intelligence panel members, “[i]t is virtually impossible for individual members of Congress, particularly members of the minority party, to take any effective action if they have concerns about what they have heard in one of these briefings. It is not realistic to expect them, working alone, to sort through complex legal issues, conduct the kind of factual investigation required for true oversight and develop an appropriate legislative response.” Congressional oversight is key to retaining the trust of the US citizenry, she writes, and adds that that particular principle was well understood at the CIA while she was there. Oversight “is vital for a secret agency operating in a democracy. True oversight helps clarify the authority under which intelligence professionals operate. And when risky operations are revealed, it is important to have members of Congress reassure the public that they have been overseeing the operation. The briefings reportedly provided on the National Security Agency (NSA) surveillance program reflect, instead, a ‘check the box’ mentality—allowing administration officials to claim that they had informed Congress without having really achieved the objectives of oversight.” While those few members of Congress are given little real information, the judiciary, particularly the Foreign Intelligence Surveillance Court (FISC), is cut out of the process entirely. “Instead of going to a judge on the secret court that was specifically established to authorize foreign intelligence surveillance inside the United States, we are told that an NSA shift supervisor was able to sign off on the warrantless surveillance of Americans,” she writes. “That’s neither a check nor a balance. The primary duty of the NSA shift supervisor, who essentially works for the president, is to collect intelligence. The task of the judge is to ensure that the legal standards set out in the 1978 Foreign Intelligence Surveillance Act (FISA) have been met. Which one has stronger independence to say no, if no needs to be said? The objectives of the surveillance program, as described in news reports, seem laudable. The government should be running to ground the contacts listed in a suspected terrorist’s cell phone, for example. What is troubling is that this domestic spying is being done in apparent contravention of FISA, for reasons that still are not clear.” In her piece she takes issue with the Bush administration’s insistence that its surveillance program is legal and necessary. She makes the following case:
Specious Arguments to Duck FISA Court - The argument that the FISA Court is too slow to respond to immediate needs for domestic surveillance is specious, she says. “FISA anticipates situations in which speed is essential. It allows the government to start eavesdropping without a court order and to keep it going for a maximum of three days. And while the FISA application process is often burdensome in routine cases, it can also move with remarkable speed when necessary, with applications written and approved in just a few hours.” Instead, she says that the Bush administration must have dodged FISC because their wiretaps didn’t meet FISA standards of probable cause. Since FISC is staffed by judges hand-picked by conservative then-Supreme Court Chief Justice William Rehnquist, “who presumably felt that they had the right temperament and expertise to understand the national security imperatives as well as the need to protect civil liberties,” and since FISC has granted all but four of the more than 5,645 requests for wiretaps and surveillance made by the administration since 2001, to argue that FISC is unresponsive is simply wrong-headed. And, she notes, if the administration felt that FISA’s standards were too strict, it could have moved to amend the law to allow more leniency in obtaining such warrants. It has not done so since the passage of the 2001 Patriot Act. She writes, “The administration reportedly did not think it could get an amendment without exposing details of the program. But this is not the first time the intelligence community has needed a change in the law to allow it to undertake sensitive intelligence activities that could not be disclosed. In the past, Congress and the administration have worked together to find a way to accomplish what was needed. It was never previously considered an option to simply decide that finding a legislative solution was too hard and that the executive branch could just ignore the law rather than fix it.”
No Justification for Keeping Program Secret - In addition, the administration has consistently failed to make a case for keeping the domestic wiretapping policy secret for four years. US-designated terrorist groups already know that the government listens to their cell phone conversations whenever possible, and they are well aware of the various publicly known programs to search through millions of electronic communications, such as the NSA’s Echelon program (see April 4, 2001). “So what do the terrorists learn from a general public discussion about the legal authority being relied upon to target their conversations?” she asks. “Presumably very little. What does the American public lose by not having the public discussion? We lose the opportunity to hold our elected leaders accountable for what they do on our behalf.”
Assertions that Program Authorized by Congress Fallacious - The argument advanced by Attorney General Alberto Gonzales that says the program does not violate the law because Congress’s post-9/11 authorization of force against terrorists gives the administration the right to circumvent FISA is equally specious, she argues. “FISA does provide for criminal penalties if surveillance is conducted under color of law ‘except as authorized by statute.’ This is a reference to either FISA or the criminal wiretap statute. A resolution, such as the Use of Force resolution, does not provide statutory authority. Moreover, FISA specifically provides for warrantless surveillance for up to 15 days after a declaration of war. Why would Congress include that provision if a mere Use of Force resolution could render FISA inapplicable? The law clearly states that the criminal wiretap statute and FISA are ‘the exclusive means by which electronic surveillance…and the interception of domestic wire, oral, and electronic communications may be conducted.’ If these authorities are exclusive, there is no other legal authority that can authorize warrantless surveillance. Courts generally will not view such a clear statutory statement as having been overruled by a later congressional action unless there is an equally clear indication that Congress intended to do that.” Therefore, by any legal standard, the administration’s program is, apparently, illegal.
No Inherent Presidential Authority - The ultimate argument by Bush officials, that the president has some sort of inherent authority as commander-in-chief to authorize illegal wiretaps, is the same groundless legal argument recently used to justify the use of torture by US intelligence and law enforcement agents (see December 28, 2001). That argument was withdrawn, Spaulding notes, after it became publicly known. While the courts have not specifically ruled on this particular argument, Spaulding notes that the Supreme Court refused to recognize then-President Harry Truman’s attempt to seize control of the nation’s steel mills to avert a possible strike during the Korean War. The Supreme Court ruled “that the president’s inherent authority is at its weakest in areas where Congress has already legislated. It ruled that to find inherent presidential authority when Congress has explicitly withheld that authority—as it has in FISA—‘is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between president and Congress.’” She notes that in 2004, the Supreme Court rejected the argument for unchecked presidential power in the Hamdi case (see June 28, 2004), with Justice Sandra Day O’Connor writing for the court, “We have long since made clear that a state of war is not a blank check for the president when it comes to the rights of the Nation’s citizens. …Whatever power the United States Constitution envisions for the Executive in its exchanges with… enemy organizations in times of conflict, it most assuredly envisions a role for all three branches when individual liberties are at stake.” Spaulding concludes, “The rule of law and our system of checks and balances are not a source of weakness or a luxury of peace. As O’Connor reminded us in Hamdi, ‘It is during our most challenging and uncertain moments…that we must preserve our commitment at home to the principles for which we fight abroad.’” [Washington Post, 12/25/2005]

Entity Tags: Sandra Day O’Connor, William Rehnquist, USA Patriot Act, Suzanne Spaulding, National Security Agency, US Supreme Court, Harry S. Truman, Alberto R. Gonzales, “Gang of Eight”, National Commission on Terrorism, Central Intelligence Agency, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Echelon, Bush administration (43)

Timeline Tags: Civil Liberties

The Justice Department opens an investigation into the leak of classified information about the Bush domestic surveillance program. The investigation focuses on disclosures to the New York Times about the secret warrantless wiretapping program conducted by the National Security Agency since shortly after the 9/11 attacks (see Early 2002). The White House claims that the Justice Department initiated the investigation on its own after receiving a request from the NSA, and that it was not even informed of the investigation until the decision had already been made. But White House spokesman Trent Duffy hails the investigation, and implicitly accuses the Times of aiding and abetting terrorists by printing its stories. “The leaking of classified information is a serious issue,” Duffy says. “The fact is that al-Qaeda’s playbook is not printed on Page One, and when America’s is, it has serious ramifications.” [Associated Press, 12/30/2005] President Bush fuels the attack on the Times when he says, “The fact that we’re discussing this program is helping the enemy.” [New York Times, 12/30/2005] Many outside of the administration have accused the wiretapping program, which functions without external oversight or court warrants, of being illegal, and Bush of breaking the law by authorizing it. Administration officials insist that Bush has the power to make such a decision, both under the Constitution’s war powers provision and under the post-9/11 Congressional authorization to use military force against terrorism, even though, as former Senate Majority Leader Tom Daschle recalls, Congress explicitly refused to give Bush the authority to take military action inside the US itself (see December 21-22, 2005). And, in a recent letter to the chairs of the House and Senate Intelligence Committees, the White House claimed that the nation’s security needs outweigh the needs of the citizenry to be secure from secret government surveillance. [Associated Press, 12/30/2005] Others disagree. The American Civil Liberties Union’s Anthony Romero says, “President Bush broke the law and lied to the American people when he unilaterally authorized secret wiretaps of US citizens. But rather than focus on this constitutional crisis, Attorney General [Alberto] Gonzales is cracking down on critics of his friend and boss. Our nation is strengthened, not weakened, by those whistle-blowers who are courageous enough to speak out on violations of the law.” And Marc Rotenberg, the executive director of the Electronic Privacy Information Center, says the NSA should be the focus of an investigation to determine if it broke federal surveillance laws. Tom Devine of the Government Accountability Project suggests a middle course. His group does not object to a limited investigation into the leak of classified information, but, he says, if the administration does “a blanket witch hunt, which I fear, it would trample all over good government laws” designed to protect government workers who expose wrongdoing. “The whole reason we have whistle-blower laws is so that government workers can act as the public’s eyes and ears to expose illegality or abuse of power.” [New York Times, 12/30/2005] Ultimately, this leak investigation may not achieve much, according to law professor Carl Tobias. “It doesn’t seem to me that this leak investigation will take on the importance of the Plame case,” Tobias says. “The bigger story here is still the one about domestic spying and whether the president intends, as he said, to continue doing it.” [Washington Post, 12/31/2005]

Entity Tags: Anthony D. Romero, Tom Devine, Trent Duffy, American Civil Liberties Union, Al-Qaeda, Tom Daschle, Senate Intelligence Committee, US Department of Justice, National Security Agency, Carl Tobias, Electronic Privacy Information Center, Alberto R. Gonzales, New York Times, Government Accountability Project, George W. Bush, Marc Rotenberg, House Intelligence Committee

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see July 7, 2009 and May 2004), angered by the Bush administration’s counterattack against government and media members who have helped to expose its warrantless wiretapping operation (see December 15-31, 2005), decides to go public with a memo he wrote about his own knowledge of the collusion between AT&T and the National Security Agency (NSA) in eavesdropping on American citizens’ communications (see January 16, 2004). He updates the memo with a brief preface, selects eight pages of the 121 pages of AT&T documentation he possesses which he believes gives a good overview of the NSA’s surveillance equipment installation, and includes the two photographs he has taken of the NSA’s “secret room” at the AT&T facility in San Francisco and the Internet research he has done on the Narus STA 6400 equipment the NSA is using to sort the communications being captured and recorded (see Late 2003). Instead of entrusting his newly refurbished memo to the Internet, he uses the PGP (Pretty Good Privacy) security protocol for anticipated dissemination, burns the data onto a CD, and begins searching online for civil liberties groups that might be interested in his work. [Wired News, 5/17/2006; Klein, 2009, pp. 53-55]

Entity Tags: AT&T, National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

The National Security Agency’s ‘Trailblazer’ program (see Late 1999), envisioned in 1999 as an overarching state-of-the-art data-mining system capable of sorting through millions of telephone and Internet communications and pluck out items relevant to national security and counterterrorism, is an abject failure, according to multiple sources and reports. The program has soaked up six years of effort and $1.2 billion in taxpayer dollars, with nothing to show except some schematic drawings and a few isolated technological and analytical gadgets, and little hope of much future progress. Matthew Aid, who has advised three federal commissions and panels investigating the 9/11 attacks, says that Trailblazer is “the biggest boondoggle going on now in the intelligence community.” Part of the problem is that over its six years of development, Trailblazer has passed through three separate NSA divisions, each with its own priorities and design goals. Its overseers have failed to exert the proper authority to clearly define the program’s goals and keep the project on track. In 2003, the NSA’s inspector general found that the program suffered from “inadequate management and oversight” of private contractors and overpayment for the work that was done. The lead private contractor for the project, Science Applications International Corporation (SAIC), has not provided the technical and managerial expertise necessary to create the system. While the Bush administration has touted the NSA wiretapping program (see December 15, 2005) as vital to protecting the nation from terrorism, it allows the agency to mismanage Trailblazer, in essence allowing the agency to go increasingly “deaf” as millions of items of unimportant information overwhelm the agency’s ability to sort out key bits of information, according to a government official. A Congressional investigation of intelligence failures surrounding the 9/11 attacks found that the NSA did not sift out “potentially vital” information that could have predicted or even prevented the attacks—a lapse that Trailblazer was intended to correct. Aid says that the problem is akin to searching for a needle in a haystack that doubles in size every few months. Intelligence experts say that the problem with Trailblazer is like deciding whether to keep a piece of mail or throw it out based only on what is on the outside of the envelope. Approximately 95% of the information gathered by the NSA is discarded without ever being translated from its original binary form; the remaining 5% is turned into plain text for human analysts to survey. Trailblazer was designed to sort through this information to identify patterns, keywords, and links to other data. The program would, in theory, translate all of the information into plain text or voice data, analyze the results to identify items of interest, store the results in an easily searchable database, and forward selected items to the appropriate analysts for follow-up. But after six years of work, there will still be no consensus among agency managers and experts as how to create a system to do this. Interestingly, another, less grandiose program, code-named Thinthread, appeared promising—a 2004 Pentagon report found that Thinthread could work better and be put to use more quickly than Trailblazer—but NSA managers disagreed with the Pentagon report and canceled Thinthread. Instead, Hayden pushed the agency to get Trailblazer up and running after the 9/11 attacks, cutting into time needed for review and corrections. Internal and external warnings that the program was going off-course were ignored; because of its secrecy and technological sophistication, neither Congress nor the NSA was able to effectively monitor the progress of the program’s development. And the agency lost track of much of the $1.2 billion that was allocated by Congress for the program. NSA Inspector General Joel Brenner blames the waste and inefficiency on “inadequate management and oversight.” As of 2006, the Government Accountability Office, the investigative arm of Congress, has not investigated Trailblazer simply because no one in Congress had asked it to. Because of the impact of the 9/11 attacks, and the war in Iraq, Congress has never seriously considered cutting back or reviewing any programs such as Trailblazer that might provide information on further terrorist attacks. [Baltimore Sun, 1/29/2006]

Entity Tags: Matthew Aid, Bush administration (43), Joel Brenner, Trailblazer, US Department of Defense, Government Accountability Office, Michael Hayden, Thinthread, National Security Agency, Science Applications International Corporation (SAIC)

Timeline Tags: Civil Liberties

Vice President Cheney mentioned NSA intercepts of the 9/11 hijackers’ calls in a speech to the Heritage Foundation.Vice President Cheney mentioned NSA intercepts of the 9/11 hijackers’ calls in a speech to the Heritage Foundation. [Source: David Bohrer / White House]Vice President Dick Cheney uses calls between the 9/11 hijackers in the US and an al-Qaeda communications hub in Yemen that were intercepted by the NSA (see Early 2000-Summer 2001) to justify the NSA’s warrantless wiretapping program (see December 15, 2005). Cheney points out that, “There are no communications more important to the safety of the United States than those related to al-Qaeda that have one end in the United States,” and says that if the NSA’s warrantless program had been implemented before 9/11, “we might have been able to pick up on two hijackers [Nawaf Alhazmi and Khalid Almihdhar] who subsequently flew a jet into the Pentagon.” He adds: “They were in the United States, communicating with al-Qaeda associates overseas. But we did not know they were here plotting until it was too late.” [White House, 1/4/2006] Other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the program is revealed by the New York Times (see December 17, 2005).

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi, Richard (“Dick”) Cheney

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

President Bush’s rationale for authorizing warrantless surveillance against US citizens is of questionable legality and “may represent an exercise of presidential power at its lowest ebb,” according to a Congressional analysis. The Congressional Research Service (CRS), the independent and nonpartisan research bureau of the legislature, answers the question raised around the nation since the revelation of the secret program by the New York Times (see Early 2002): did Bush break the law when he ordered the National Security Agency to eavesdrop on US citizens without court orders or judicial oversight? The CRS report does not give a definitive yes or no answer to that question, but finds Bush’s legal rationale dubious at best. That rationale “does not seem to be as well-grounded” as administration lawyers have claimed, and the report finds that, despite assertions to the contrary by Bush and administration officials, Congress did not authorize warrantless wiretaps when it gave the executive branch the authority to wage war against al-Qaeda in the days after the 9/11 attacks. Unsurprisingly, Bush administration officials criticize the report. But some Republicans and Democrats find the report’s conclusions persuasive, and hold up the report as further evidence that Bush overextended his authority by authorizing the wiretaps. For instance, Republican Thomas Kean, the former chairman of the 9/11 commission (see January 27, 2003, says he doubts the program’s legality. Kean, who has not spoken publicly about the program until now, says the 9/11 commission was never told about the program, and he strongly doubts its legality. “We live by a system of checks and balances, and I think we ought to continue to live by a system of checks and balances,” Kean says. [Congressional Research Service, 1/5/2006 pdf file; New York Times, 1/6/2006]

Entity Tags: George W. Bush, 9/11 Commission, Congressional Research Service, New York Times, National Security Agency, Thomas Kean

Timeline Tags: Civil Liberties

John Yoo’s ‘The Powers of War and Peace.’John Yoo’s ‘The Powers of War and Peace.’ [Source: University of Maryland]Libertarian law professor Cass Sunstein reviews a recent book by former Bush legal adviser John Yoo, who authored several of the Bush administration’s most controversial legal opinions concerning terrorism and executive power (see September 21, 2001, September 25, 2001, September 25, 2001, October 4, 2001, October 23, 2001, October 23, 2001, November 2, 2001, November 6-10, 2001, November 15, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24, 2002, January 24-26, 2002, March 13, 2002, April 8, 2002, June 27, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and October 11, 2002). Yoo’s book, The Powers of War and Peace: The Constitution and Foreign Affairs After 9/11, is a compendium of his pre-9/11 academic writings that landed him his job at the Justice Department’s Office of Legal Counsel. Sunstein notes that Yoo, perhaps more than any other single legal scholar, has reshaped the government’s legal stance on any number of issues. He argued for the president’s unilateral ability to declare war without the approval of Congress, the use of “enhanced interrogation techniques” on suspected terrorists, the withdrawal of essential civil liberties and legal rights from suspected terrorists and enemy collaborators, the right of the administration to electronically eavesdrop on the American citizenry without judicial consent or oversight, the ability to ignore or withdraw from international treaties without congressional approval, and more besides. Sunstein writes: “[T]aken as a whole, the claims of the Bush administration may be properly regarded as an effort to create a distinctive set of constitutional understandings for the post-September 11 era. The White House is attempting to create a kind of 9/11 Constitution. A defining feature of these understandings is a strong commitment to inherent presidential authority over national security, including a belief that in crucial domains the president can act without congressional permission, and indeed cannot be checked by congressional prohibitions.” Yoo is a key figure in that effort. Sunstein calls his work interesting but completely one-sided, simply ignoring “the mountainous counter-evidence” against most of his constitutional claims. “Yoo’s reading would require us to ignore far too many statements by prominent figures in the founding generation,” Sunstein writes. “There are not many issues on which James Madison, Thomas Jefferson, John Marshall, Alexander Hamilton, George Washington, James Wilson, John Adams, and Pierce Butler can be said to agree. Were all of them wrong?” Sunstein concludes: “[W]ith respect to war, there is no reason for a 9/11 Constitution. The old one, read in the light of our traditions, will do just fine.” [New Republic, 1/9/2006; Savage, 2007, pp. 81-82]

Entity Tags: Bush administration (43), Office of Legal Counsel (DOJ), John C. Yoo, Cass Sunstein

Timeline Tags: Civil Liberties

Russell Tice.Russell Tice. [Source: ABC News]Former National Security Agency (NSA) official Russell Tice says that many of the wiretapping operations he once helped run were illegal. “I specialized in what’s called special access programs,” Tice tells ABC News. “We called them ‘black world’ programs and operations.” Tice is ready to testify before Congress about what he calls the illegal wrongdoings that are part of the Defense Department and the NSA’s wiretapping programs enacted after the 9/11 attacks. Many of these programs were targeted at innocent US citizens. “The mentality was we need to get these guys, and we’re going to do whatever it takes to get them,” he says. The technology used to track and sort through every domestic and international telephone center is impressive. “If you picked the word ‘jihad’ out of a conversation, the technology exists that you focus in on that conversation, and you pull it out of the system for processing.” Intelligence analysts use the information to develop graphs that resemble spiderwebs linking one suspect’s phone number to hundreds or even thousands more. While the president has admitted giving orders that allowed the NSA to eavesdrop on a small number of Americans without warrants, Tice says says the number of Americans subject to eavesdropping by the NSA could be in the millions if the full range of secret NSA programs is used. “That would mean for most Americans that if they conducted, or you know, placed an overseas communication, more than likely they were sucked into that vacuum.” Tice has been subjected to what appears to be bureaucratic punishment for his willingness to blow the whistle on the nation’s warrantless wiretapping programs; last year the NSA revoked his security clearance based on what it calls "psychological concerns," and later fired him. Tice says that is the way the NSA often deals with employees it considers troublemakers and whistleblowers (see January 25-26, 2006). [ABC News, 1/10/2006; ABC, 1/10/2006]

Entity Tags: US Department of Defense, National Security Agency, Russell Tice

Timeline Tags: Civil Liberties

It had been widely reported that the Saudi government began to crack down seriously on al-Qaeda and other radical militants after a 2003 al-Qaeda attack in Saudi Arabia (see May 12, 2003). However, the Los Angeles Times reports that US officials now claim that is not true. While Saudis have been very aggressive and cooperative in cracking down on militants within Saudi Arabia since that attack, they have done little outside the country. Millions of dollars continue to flow from wealthy Saudis through charity fronts to al-Qaeda and other suspected groups, and the Saudi government is doing next to nothing about it. In 2004, the Saudis promised to set up a government commission to police such groups, but they have yet to do so. The Saudi government has also done little to rein in influential radical religious leaders who openly encourage their followers to attack US interests in Iraq and elsewhere in the world. US officials claim that at least five organizations, including the Muslim World League (MWL), the International Islamic Relief Organization (IIRO), and the World Assembly of Muslim Youth (WML), “are headquartered in Saudi Arabia but continue to engage in highly suspect activity overseas.” A senior US counterterrorism official says that some known terrorist financiers continue to “operate and live comfortably in Saudi Arabia” despite US objections. [Los Angeles Times, 1/15/2006]

Entity Tags: Saudi Arabia, International Islamic Relief Organization, Muslim World League, World Assembly of Muslim Youth

Timeline Tags: Complete 911 Timeline

Al Gore speaks to the Liberty Coalition and the American Constitution Society.Al Gore speaks to the Liberty Coalition and the American Constitution Society. [Source: American Constitution Society]Former Vice President Al Gore delivers a long, impassioned speech on civil liberties and constitutional issues to the Liberty Coalition and the American Constitution Society. Gore joins former Representative Bob Barr (R-GA) in speaking out against the Bush administration’s infringement on American civil liberties. Gore and Barr have what Gore calls a “shared concern that America’s Constitution is in grave danger.”
Patently Illegal Domestic Surveillance - Gore’s speech is sparked by recent revelations that the NSA has been spying on American citizens for years (see December 15, 2005), and in response, the administration “has brazenly declared that it has the unilateral right to continue without regard to the established law enacted by Congress precisely to prevent such abuses.” As the Foreign Intelligence and Surveillance Act (FISA) is perfectly sufficient, there was no need for the Bush administration to circumvent that law. “At present, we still have much to learn about the NSA’s domestic surveillance,” Gore says. “What we do know about this pervasive wiretapping virtually compels the conclusion that the president of the United States has been breaking the law, repeatedly and insistently. A president who breaks the law is a threat to the very structure of our government.” Gore says he agrees with Bush on the threat of terrorism, but disagrees that the US has to “break the law or sacrifice our system of government” to protect itself, as this will make it “weaker and more vulnerable.” In addition, he says, “once violated, the rule of law is itself in danger,” and, “Unless stopped, lawlessness grows, the greater the power of the executive grows, the more difficult it becomes for the other branches to perform their constitutional roles.” It is patently obvious that the Bush administration has broken the law in conducting and approving its warrantless wiretaps, Gore says, regardless of what arguments and defenses administration officials may put forth (see September 12-18, 2001 and Early 2002). So, Gore says, “When President Bush failed to convince Congress to give him the power he wanted when this measure was passed, he secretly assumed that power anyway, as if Congressional authorization was a useless bother. But as [Supreme Court] Justice [Felix] Frankfurter once wrote, ‘To find authority so explicitly withheld is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between the president and the Congress.‘… And the disrespect embodied in these apparent mass violations of the law is part of a larger pattern of seeming indifference to the Constitution that is deeply troubling to millions of Americans in both political parties.”
Illegal Seizure of American Citizens - Gore notes that Bush has declared that he has “a heretofore unrecognized inherent power to seize and imprison any American citizen that he alone determines to be a threat to our nation, and that notwithstanding his American citizenship that person in prison has no right to talk with a lawyer, even if he wants to argue that the president or his appointees have made a mistake and imprisoned the wrong person” (see November 13, 2001 and March 5, 2002). He says: “The president claims that he can imprison that American citizen—any American citizen he chooses—indefinitely, for the rest of his life, without even an arrest warrant, without notifying them of what charges have been filed against them, without even informing their families that they have been imprisoned.” Gore then says: “No such right exists in the America that you and I know and love. It is foreign to our Constitution. It must be rejected.”
Specious Authority to Torture - Neither does the executive branch have the right to authorize torture, Gore says. After citing horrific examples from Guantanamo and Abu Ghraib, he calls it “a shameful exercise of power that overturns a set of principles that you’re nation has observed since General George Washington first enunciated them during our Revolutionary War. They have been observed by every president since then until now. They violate the Geneva Conventions, the International Convention Against Torture, and our own laws against torture.”
Unlawful Kidnapping of Foreign Citizens - The president has no right to have foreign citizens kidnapped from their homes and brought to the US for interrogation and imprisonment, or worse, delivered to other nations for harsh interrogations and torture, says Gore. The closest allies of the US have been shocked by such claims.
No Restraint in the Constitution? - Gore asks whether the president really has such powers under the Constitution and, if so, “are there any acts that can on their face be prohibited?” He quotes the dean of Yale’s law school, Harold Koh, who said, “If the president has commander in chief power to commit torture, he has the power to commit genocide, to sanction slavery, to promote apartheid, to license summary execution.” Gore is “deeply troubl[ed]” that “our normal American safeguards have thus far failed to contain this unprecedented expansion of executive power.” He cites the numerous usage of “signing statements” by Bush that signal his intent “not to comply” with particular legislation (see December 30, 2005). When the Supreme Court struck down Bush’s indefinite detention of “enemy combatants” (see June 28, 2004), “the president then engaged in legal maneuvers designed to prevent the court from providing any meaningful content to the rights of the citizens affected.”
Historical Cycles - Since the founding of America, Gore says, the country has abrogated its citizens’ rights in one circumstance or another, and cites numerous examples. But those abrogations were always rectified to some degree in a repeated cycle of what he calls “excess and regret.” Gore is worried that the country may not be in such a cycle now. Instead, he says, the US may be on a path to permanent, state-sanctioned authoritarianism, with the constitutional safeguards American citizens have come to expect eroded and undermined to the point of irretrievability. Gore specifically cites the administration’s support for the so-called “unitary executive” theory of government, which he says “ought to be more accurately described as the unilateral executive.” That theory “threatens to expand the president’s powers until the contours of the Constitution that the framers actually gave us become obliterated beyond all recognition.”
Stark Authoritarianism - Why are Bush and his top officials doing this? Gore says that “[t]he common denominator seems to be based on an instinct to intimidate and control. The same pattern has characterized the effort to silence dissenting views within the executive branch, to censor information that may be inconsistent with its stated ideological goals, and to demand conformity from all executive branch employees.” Gore continues: “Intellectually, it is possible to carry on this process for an indefinite time. The only check on it is that, sooner or later, a false belief bumps up against solid reality, usually on a battlefield. Two thousand two hundred American soldiers have lost their lives as this false belief bumped into a solid reality.”
Gutting Congress - Though serious damage has been done to the judicial branch, Gore acknowledges, “the most serious damage in our constitutional framework has been to the legislative branch. The sharp decline of Congressional power and autonomy in recent years has been almost as shocking as the efforts by the executive to attain this massive expansion of its power.… [T]he legislative branch of government as a whole, under its current leadership, now operates as if it were entirely subservient to the executive branch.… [T]he whole process is largely controlled by the incumbent president and his political organization” (see February 1, 2004). Gore says each member of Congress, Republican and Democrat, must “uphold your oath of office and defend the Constitution. Stop going along to get along. Start acting like the independent and co-equal branch of American government that you are supposed to be under the Constitution of our country.”
We the People - The American people still, for the moment, have the power to enforce the Constitution, Gore says, quoting former President Dwight Eisenhower, who said, “Any who act as if freedom’s defenses are to be found in suppression and suspicion and fear confess a doctrine that is alien to America.” Gore continues: “Fear drives out reason. Fear suppresses the politics of discourse and opens the door to the politics of destruction.… The founders of our country faced dire threats. If they failed in their endeavors, they would have been hung as traitors. The very existence of our country was at risk. Yet in the teeth of those dangers, they insisted on establishing the full Bill of Rights. Is our Congress today in more danger than were their predecessors when the British army was marching on the Capitol? Is the world more dangerous than when we faced an ideological enemy with tens of thousands of nuclear missiles ready to be launched on a moment’s notice to completely annihilate the country?” [Congressional Quarterly, 1/16/2006; American Constitutional Society, 1/16/2006]

Entity Tags: National Security Agency, Liberty Coalition, US Supreme Court, Harold Koh, George W. Bush, Albert Arnold (“Al”) Gore, Jr., American Constitution Society, Bush administration (43), Convention Against Torture, Felix Frankfurter, George Washington, Geneva Conventions, Foreign Intelligence Surveillance Act, Robert “Bob” Barr

Timeline Tags: Civil Liberties

Journalist and columnist Joshua Micah Marshall says of former Vice President Al Gore’s speech on civil liberties the previous day (see January 16, 2006): “The point Gore makes in his speech that I think is most key is the connection between authoritarianism, official secrecy, and incompetence. The president’s critics are always accusing him of law-breaking or unconstitutional acts and then also berating the incompetence of his governance. And it’s often treated as, well… he’s power-hungry and incompetent to boot! Imagine that! The point though is that they are directly connected. Authoritarianism and secrecy breed incompetence; the two feed on each other. It’s a vicious cycle. Governments with authoritarian tendencies point to what is in fact their own incompetence as the rationale for giving them yet more power.… The basic structure of our Republic really is in danger from a president who militantly insists that he is above the law.” [Dean, 2006, pp. 170-171; Talking Points Memo, 1/17/2006]

Entity Tags: Albert Arnold (“Al”) Gore, Jr., George W. Bush, Joshua Micah Marshall

Timeline Tags: Civil Liberties

A memo from the nonpartisan Congressional Research Service (CRS) finds that President Bush appears to be in violation of the National Security Act of 1947 in his practice of briefing only select members of Congress on the National Security Agency’s warrantless wiretapping program. Bush has provided only limited briefings to the so-called “Gang of Eight,” the four Congressional leaders and the four ranking members of the House and Senate Intelligence Committees. But the 1947 law requires the US intelligence community to brief the full membership of both committees on the program. The memo is the result of a request by Representative Jane Harman (D-CA), who wrote Bush a letter saying that she believes he is required under the Act to brief both committees, and not just the Gang of Eight (see January 4, 2006). The White House claims that it has briefed Congressional leaders about the program over a dozen times, but refuses to provide details; the Congressional members so briefed are forbidden by law to discuss the content or nature of those classified briefings, even with their own staff members. “We believe that Congress was appropriately briefed,” says White House spokeswoman Dana Perino. The CRS agrees with Harman that the single exception to such full briefings under the law, covert actions taken under extraordinary threats to national security, is not applicable in this instance. Unless the White House contends the program is a covert action, the memo says, “limiting congressional notification of the NSA program to the Gang of Eight…would appear to be inconsistent with the law.” [US House of Representatives, 1/4/2006; Congressional Research Service, 1/18/2006 pdf file; Washington Post, 1/19/2006] The day after the CRS memo is released, Senate Democrats John D. Rockefeller (D-WV) and Harry Reid (D-NV), along with House Minority Leader Nancy Pelosi (D-CA) and Harman, the ranking member of the House Intelligence Committee, write to Vice President Dick Cheney demanding that the full committees be briefed on such intelligence matters in the future. [Washington Post, 1/20/2006] On February 9, Bush will allow Attorney General Alberto Gonzales and former NSA chief Michael Hayden to brief the full House Intelligence Committee on the program (see February 8-17, 2006).

Entity Tags: Jane Harman, John D. Rockefeller, National Security Agency, National Security Act, Richard (“Dick”) Cheney, Michael Hayden, House Intelligence Committee, George W. Bush, Dana Perino, “Gang of Eight”, Alberto R. Gonzales, Harry Reid, Congressional Research Service, Bush administration (43)

Timeline Tags: Civil Liberties

The Justice Department (DOJ) issues a 42-page “white paper” detailing its arguments that the National Security Agency’s warrantless wiretapping program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006) is legal. The DOJ reiterates two previous arguments (see December 19, 2005 and December 21-22, 2005)—that Congress implicitly authorized the program in 2001 when it authorized the Bush administration to begin military actions against al-Qaeda (see September 14-18, 2001), and that the president has the authority as commander in chief to conduct such a program—even though these arguments have been thoroughly refuted (see January 9, 2006) and overridden by the Supreme Court’s recent Hamdan v. Rumsfeld ruling (see December 15, 2005 and July 8, 2006). In its paper, the DOJ declares that if necessary, it will attack the legality of the Foreign Intelligence Surveillance Act (FISA) in order to stop that law from “imped[ing]” the president’s power to order domestic surveillance. In essence, according to columnist and civil liberties lawyer Glenn Greenwald, the DOJ is asserting that the president’s powers are limitless as long as he or she declares a given action necessary to battle terrorism. “Because the president has determined that the NSA activities are necessary to the defense of the United States from a subsequent terrorist attack in the armed conflict with al-Qaeda, FISA would impermissibly interfere with the president’s most solemn constitutional obligation—to defend the United States against foreign attack,” the DOJ claims. Neither Congress nor the court system has the right to limit or even review the president’s powers, according to the DOJ. Greenwald calls the DOJ’s argument “a naked theory of limitless presidential power.” In fact, Greenwald argues, the DOJ is asserting that FISA itself is unconstitutional, because no law can in any way limit the president’s power to conduct foreign policy or protect the nation’s security. The document is part of a larger Bush administration defense of the USA Patriot Act, and part of the administration’s push to convince Congress to reauthorize that legislation. Attorney General Alberto Gonzales sends the document to Congress. Justice Department official Steven Bradbury says, “When it comes to responding to external threats to the country… the government would like to have a single executive who could act nimbly and agilely.” [US Department of Justice, 1/19/2006 pdf file; Glenn Greenwald, 1/20/2006; Washington Post, 1/20/2006]
Dubious Legality - The program has already been found to be of questionable legality by two reports recently released by the nonpartisan Congressional Research Service (see January 5, 2006 and January 18, 2006). And author James Bamford, a US intelligence expert who has written extensively about the NSA, says that the Justice Department’s arguments are specious in light of Congress’s clear intent in its 1978 passage of FISA to block warrantless wiretapping, and its demonstrated lack of intent to allow any such operations within US borders in the October 2001 legislation. “You could review the entire legislative history in the authorization to use military force and I guarantee you won’t find one word about electronic surveillance,” he says. “If you review the legislative history of FISA, you will find Attorney General Griffin Bell testifying before the intelligence committee saying this was specifically passed to prevent a president from claiming inherent presidential powers to do this again.” [Washington Post, 1/20/2006]
Self-Contradictory Justifications - In 2007, author and reporter Charlie Savage will write of the “shaky foundation” supporting the administration’s “two-pronged attacks on critics of the wiretapping program and the Patriot Act,” which some officials have claimed authorizes the program. “Beneath the simplistic rhetoric, the administration’s position was self-contradicting,” Savage will write. If Bush has the inherent presidential authority to order warrantless wiretapping, then he needs no authorization from the Patriot Act or any other legislation. But if Congress is endangering the nation by delaying in reauthorizing the Patriot Act and thusly not rendering the program legal, then the wiretapping program is illegal after all. The memo attempts to “paper… over” this problem by claiming that, while Bush has the inherent authority to do whatever he feels is necessary to protect the country, the Patriot Act’s extra police powers are still necessary in “contexts unrelated to terrorism.” Savage will write, “In other words, the administration’s own position, hidden in the fine print, was that the Patriot Act was superfluous and irrelevant to the war on terrorism—a somewhat absurd stance made necessary by their desire to say the wiretapping program was legal.” [Savage, 2007, pp. 315]
Failure to Address Probable Beginning of Program Before Attacks - The Justice Department says nothing about the program apparently beginning well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, James Bamford, Steven Bradbury, US Department of Justice, Griffin Bell, Senate Judiciary Committee, Glenn Greenwald, Foreign Intelligence Surveillance Act, Alberto R. Gonzales, Arlen Specter, George W. Bush, Congressional Research Service, Charlie Savage

Timeline Tags: Civil Liberties

President Bush’s top political adviser, deputy White House chief of staff Karl Rove, tells a meeting of the Republican National Committee that the warrantless wiretapping controversy (see December 15, 2005 and December 18, 2005) can be used to boost Republicans’ election chances in the 2006 midterm elections. Republicans should emphasize that the wiretapping proves that Bush is willing to do whatever it takes to defeat terrorism and keep Americans safe. Critics of the program, therefore, can be painted as weak on terrorism. “The United States faces a ruthless enemy, and we need a commander in chief and a Congress who understand the nature of the threat and the gravity of the moment America finds itself in,” Rove says. “President Bush and the Republican Party do; unfortunately, the same cannot be said of many Democrats.… Let me be clear as I can be: President Bush believes if al-Qaeda is calling somebody in America, it is in our national security interests to know who they’re calling and why. Some important Democrats clearly disagree.” [WIS-TV, 1/20/2006; Savage, 2007, pp. 203]

Entity Tags: George W. Bush, Democratic Party, Republican Party, Republican National Committee, Karl C. Rove

Timeline Tags: Civil Liberties

In a public speech, former National Security Agency chief Michael Hayden claims that everything the NSA does is with authorization from the White House, specifically the warrantless wiretapping program that spies on US citizens (see Early 2002). “I didn’t craft the authorization,” he says. “I am responding to a lawful order.” Hayden claims that while the NSA continues to use court warrants from the Foreign Intelligence Surveillance Court (FISC), technological advances and terrorist threats have made the law that created and supports FISC, the Foreign Intelligence Surveillance Act of 1978 (see 1978), obsolete. Therefore, the NSA has carried out domestic surveillance operations with or without FISC warrants. Hayden says the warrantless surveillance operations are “operationally more relevant, operationally more effective” than anything FISA can handle. Hayden repeatedly denies, in the face of reams of evidence collected by journalists and others to the contrary, that the NSA is spying on domestic antiwar groups and religious organizations like the Quakers who publicly advocate nonviolence and peace. [Michael Hayden, 1/23/2006]

Entity Tags: Foreign Intelligence Surveillance Court, Al-Qaeda, Foreign Intelligence Surveillance Act, Religious Society of Friends (Quakers), Terrorist Surveillance Program, National Press Club, Bush administration (43), National Security Agency, Michael Hayden, George W. Bush

Timeline Tags: Civil Liberties

President Bush at the National Security Agency.President Bush at the National Security Agency. [Source: Eric Draper / White House]President George Bush uses calls between the 9/11 hijackers in the US and an al-Qaeda communications hub in Yemen that were intercepted by the NSA (see Early 2000-Summer 2001) to justify the NSA’s warrantless wiretapping program (see December 15, 2005). Bush says: “We know that two of the hijackers who struck the Pentagon [Nawaf Alhazmi and Khalid Almihdhar] were inside the United States communicating with al-Qaeda operatives overseas. But we didn’t realize they were here plotting the attack until it was too late.” Bush also quotes former NSA Director Michael Hayden, who previously said, “Had this program been in effect prior to 9/11… we would have detected some of the 9/11 al-Qaeda operatives in the United States, and we would have identified them as such” (see January 23, 2006). Bush and other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the program is revealed by the New York Times (see December 17, 2005). [White House, 1/25/2006] Bush made similar remarks at Kansas State University two days previously. [White House, 1/23/2006]

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi, George W. Bush

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Washington Post reporter William Arkin reveals that the National Security Agency (NSA) is “building a new warning hub and data warehouse” in Aurora, Colorado, just outside of Denver, on the grounds of Buckley Air Force Base. The agency is transferring many key personnel from its Fort Meade, Maryland, headquarters to Aurora. Arkin calls the new NSA facility, named the Aerospace Data Facility (ADF), “massive,” and says he believes it is the hub of the NSA’s data mining operation (see January 16, 2004). According to Government Executive magazine, the NSA’s new data storage facility “will be able to hold the electronic equivalent of the Library of Congress every two days.” While the NSA explains that the new facility is a cost-cutting measure and part of the agency’s post-9/11 decentralization—“This strategy better aligns support to national decision makers and combatant commanders,” an NSA spokesman tells one reporter—Arkin says that the “NSA is aligning its growing domestic eavesdropping operations—what the administration calls ‘terrorist warning’ in its current PR campaign—with military homeland defense organizations, as well as the CIA’s new domestic operations [in] Colorado.… Colorado is now the American epicenter for national domestic spying.” Arkin notes that previous news reports have said that the CIA is planning to move much of its domestic National Resources Division to Aurora as well. He also notes that Colorado is the home of the US military’s Northern Command (NORTHCOM), the military arm responsible for homeland defense. The move also allows the NSA to better coordinate its efforts with private contractors such as Lockheed Martin, Northrup Grumman Mission Systems, and Raytheon, all of which have presences in Colorado. Arkin names all three firms as partners with the NSA in building the ADF. Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Over months and years, the database would be huge, ready for data mining whenever the government wants to go after someone.” [Washington Post, 1/31/2006; Klein, 2009, pp. 40-41]

Entity Tags: National Security Agency, Aerospace Data Facility, Government Executive Magazine, Mark Klein, Northrup Grumman Mission Systems, William Arkin, Lockheed Martin Corporation, Raytheon, US Northern Command

Timeline Tags: Civil Liberties

Electronic Frontier Foundation logo.Electronic Frontier Foundation logo. [Source: Flickr.com]The Electronic Frontier Foundation (EFF), a civil liberties and privacy-advocacy organization, files a lawsuit against telecommunications giant AT&T for allegedly violating the law and the privacy of its citizens by cooperating with the National Security Agency in the NSA’s construction of what the EFF calls a “massive, illegal program to wiretap and data-mine Americans’ communications.” EFF lawyer Kevin Bankston says: “Our goal is to go after the people who are making the government’s illegal surveillance possible. They could not do what they are doing without the help of companies like AT&T. We want to make it clear to AT&T that it is not in their legal or economic interests to violate the law whenever the president asks them to.”
Unprecedented Access to Communications System - EFF alleges that as part of the NSA’s domestic spying program, AT&T has allowed the NSA direct access to the phone and Internet communications passing over its network, and has given the government “unfettered access to its over 300 terabyte ‘Daytona’ database of caller information—one of the largest databases in the world.” One of AT&T’s databases, nicknamed “Hawkeye,” contains 312 terabytes of data detailing nearly every telephone communication on AT&T’s domestic network since 2001, the lawsuit alleges. The suit goes on to claim that AT&T allowed the NSA to use the company’s powerful Daytona database management software to quickly search this and other communication databases. AT&T, the suit claims, is in violation of the First and Fourth Amendments, federal wiretapping statutes, telecommunications laws, and the Electronic Communications Privacy Act. The suit requests fines up to $22,000 for each AT&T customer, and punitive fines—damages that could potentially reach into the billions of dollars. The EFF lawsuit is one of over 30 lawsuits filed for similar reasons (see June 26, 2006). The lawsuit will survive a number of initial legal challenges by the Justice Department and AT&T, including AT&T’s contention that “whatever we did, the government told us to do” and therefore it should be immune from such lawsuits, and the Justice Department’s invocation of “national security” and the possibility of the revelation of “state secrets” (see March 9, 1953). EFF retorts, “In this country we follow the law, we don’t just follow orders.” Bankston tells a reporter, “If state secrecy can prevent us from preserving the rights of millions upon millions of people, then there is a profound problem with the law.”
Suit Alleges Criminal Actions, Does Not Challenge Government's Right to Wiretap - The lawsuit does not challenge the government’s right to electronically monitor legitimate terrorism suspects, nor does it challenge the judicial right to issue warrants for such surveillance. Rather, EFF writes: “Wiretaps on terrorists are allowed under the law, and this lawsuit is not challenging the wiretap laws. We have sued AT&T for breaking those laws—the telecommunications giant gave the government access to its communications switches and its huge databases of information on millions of ordinary Americans. These are AT&T customers who have not even been accused of affiliations with terrorists. Americans can be both safe and free: if the government truly believes it has cause to wiretap a suspect, it can order AT&T to provide information under FISA [the Foreign Intelligence Surveillance Act]—for up to 72 hours before going to the court. But AT&T has no business providing direct access to the communications of millions of ordinary Americans, without the checks and balances of Congress or the courts.” [Electronic Frontier Foundation, 1/31/2006; Wired News, 1/31/2006]

Entity Tags: Electronic Frontier Foundation, Foreign Intelligence Surveillance Act, National Security Agency, AT&T, US Department of Justice, Kevin Bankston

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group and a reporter to expose the collusion of AT&T and the National Security Agency in pushing the government’s illegal surveillance program (see Early January 2006 and January 23, 2006 and After), contacts the office of Senator Dianne Feinstein (D-CA) at the advice of Electronic Frontier Foundation lawyer Kevin Bankston. Klein talks to Feinstein’s chief attorney in Washington, DC, Steven Cash. Klein will later write: “I instinctively recoiled at the thought of trying to approach her as my memory of her record told me she was no friend of civil liberties, though she plays one on TV. My instinct was not wrong.” After an initial discussion with Cash, Klein emails him his packet of documentation (see December 31, 2005). On the afternoon of February 3, Cash calls Klein and says he is very interested in his story, though Feinstein’s staff rates the probability of the NSA performing illegal acts at somewhere around “50-50,” according to Klein. Cash promises to get back in touch with Klein on February 6, but fails to do so. Neither Klein nor his attorneys (see Early January 2006) are able to talk to anyone on Feinstein’s staff from here on. Klein later writes: “The silent message was unmistakable: the senator did not want to sully her political skirts by having contact with a whistleblower. And this was a foretaste of her behavior and voting for the next two and a half years. At every turn, she was there pushing for immunity for the telecom companies in the Senate Intelligence and Judiciary Committees; peddling her toothless restatement of the ‘exclusive means’ clause of FISA [the Foreign Intelligence Surveillance Act—see 1978] as a substitute for any confrontation with the president over ongoing illegal NSA spying; ushering former NSA Director Michael Hayden through his nomination for CIA director; and backing Michael Mukasey as a clone replacement for the resigning Attorney General [Alberto] Gonzales. Moreover, this ultimately turned out to be the attitude of virtually the entire Democratic Party leadership, not to mention the Republicans.” Klein will explain that FISA’s “exclusive means” clause states that FISA should be the “exclusive means” for the federal government to conduct surveillance. Congress’s duty under the law was, Klein will state, to enforce the law against President Bush, “who openly flouted the law.” Instead, Klein will claim, Feinstein uses the “exclusive means” clause to protect the Bush administration and the telecom firms. [Klein, 2009, pp. 57-60]

Entity Tags: Electronic Frontier Foundation, AT&T, Dianne Feinstein, Mark Klein, National Security Agency, Steven Cash, Kevin Bankston

Timeline Tags: Civil Liberties

The Justice Department’s Office of Professional Responsibility (OPR) opens an internal investigation into the department’s role in approving the Bush administration’s domestic warrantless wiretapping program. OPR counsel Marshall Jarrett informs Representative Maurice Hinchey (D-NY) of the investigation into the program, initiated after the 9/11 attacks by the National Security Agency and authorized via a secret executive order from President Bush shortly thereafter (see Early 2002). Jarrett writes that the OPR probe will include “whether such activities are permissible under existing law.” Justice Department spokeswoman Tasia Scolinos says the inquiry will be quite limited: “They will not be making a determination on the lawfulness of the NSA program but rather will determine whether the department lawyers complied with their professional obligations in connection with that program.” Scolinos calls the OPR probe “routine.” Hinchey says he welcomes the probe, which may determine “how President Bush went about creating this Big Brother program.” [Washington Post, 2/16/2006] The OPR inquiry is derailed after the NSA, with Bush’s authorization, refuses to give routine security clearances to OPR lawyers that would allow them to examine the relevant documents (see May 9, 2006).

Entity Tags: US Department of Justice, Tasia Scolinos, H. Marshall Jarrett, National Security Agency, George W. Bush, Bush administration (43), Maurice Hinchey, Office of Professional Responsibility

Timeline Tags: Civil Liberties

Jaber Elbaneh.Jaber Elbaneh. [Source: Yahya Arhab / EPA / Corbi]Twenty-three suspected al-Qaeda operatives break out of a high-security prison in the Yemeni capital of Sana’a. Escapees include Jamal al-Badawi, wanted for a role in the bombing of the USS Cole (see October 12, 2000), and Jaber Elbaneh, a US citizen believed to be linked to the alleged al-Qaeda sleeper cell in Lackawanna, New York (see April-August 2001). The men allegedly tunnel their way from the prison to the bathroom of a neighboring mosque. However, the New York Times will later comment: “[T]hat account is viewed with great skepticism, both in the United States and in Yemen. Many in Yemen say the escape could not have taken place without assistance, whether from corrupt guards or through a higher-level plan.” [New York Times, 3/1/2008] The prison is located in the basement of the Political Security Organization (PSO), Yemen’s equivalent of the FBI. Several days later, a cable sent from the US embassy in Yemen notes “the lack of obvious security measures on the streets,” and concludes, “One thing is certain: PSO insiders must have been involved.” Newsweek comments: “[P]rivately, US officials say the plotters must have had serious—possibly high-level—help at the Political [Security Organization].…. [T]he head of the PSO, Ali Mutahar al-Qamish, is said to be under suspicion, according to two US officials.” [Newsweek, 2/13/2006] Al-Badawi and nine others escaped a Yemeni prison in 2003 and then were recaptured one year later (see April 11, 2003-March 2004). Al-Badawi and Elbaneh turn themselves in to the Yemeni government in 2007 and then are freed (see October 17-29, 2007 and February 23, 2008).

Entity Tags: Jamal al-Badawi, Ali Mutahar al-Qamish, Jaber Elbaneh, Yemeni Political Security Organization

Timeline Tags: Complete 911 Timeline

Seven telecommunications executives confirm to the press that large telecommunications companies such as AT&T, MCI, and Sprint have cooperated with the National Security Agency’s domestic warrantless wiretapping program. Those firms, along with BellSouth, previously denied they had cooperated with the NSA (see October 2001). In typical domestic investigations, telecom companies require court warrants before mounting any surveillance operations, but this has not been the case with the NSA program. Apparently, the companies decided to assist the NSA in tracking international telephone and Internet communications to and from US citizens and routed through “switches” which handle millions of communications, both domestic and international, every day. The telecom firms in question have undergone several mergers and reorganizations—BellSouth, another firm accused of cooperating with the NSA, is now part of AT&T, MCI (formerly WorldCom) was recently acquired by Verizon, and Sprint has merged with Nextel. The companies comply with the NSA requests for information once the NSA determines that there is a “reasonable basis” for believing that the communications may have a connection with militant Islamic organizations such as al-Qaeda. The firms do not require court warrants, but rather implement the monitoring on nothing more than oral requests from senior NSA officials. [USA Today, 2/5/2006]

Entity Tags: National Security Agency, MCI, WorldCom, Al-Qaeda, AT&T, Verizon Wireless, Sprint/Nextel

Timeline Tags: Civil Liberties

In an interview with PBS’s Gwen Ifill, Representative Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee, says she supports the administration’s warrantless wiretapping program (see Spring 2001), a position that places her at odds with most Congressional Democrats. “Well, I said then and I say now that I support the program,” she tells Ifill. Harman is critical of the insider leaks that led to the public divulgance of the program (see December 15, 2005), saying, “Well, I think the leaks have done a lot of damage, and I deplore the leaks of this critical program.” She goes on to complain that the administration “says it adequately oversees this program,” but “the system of checks and balances that we have… requires that Congress as an independent branch of government pass the laws, fund the programs, and oversee how all that works.” In addition to requesting greater cooperation on oversight with Congress, she adds that “the courts need to be cut back in,” and thinks the “entire program” should be brought under the Foreign Intelligence Surveillance Act. [PBS, 2/8/2006] Four days later, Harman reiterates her position on NBC’s Meet the Press. She tells moderator Tim Russert, “If the press was part of the process of delivering classified information, there have to be some limits on press immunity.” Russert asks, “But if [the NSA leak] came from a whistleblower, should the New York Times reporter be prosecuted?” Harman answers: “Well, it’s not clear it was a whistleblower. You have to prove that first. If it’s protected by the whistleblower statute, then it’s protected.… By the way, I deplore that leak. This is a very valuable foreign [intelligence] collection program. I think it is tragic that a lot of our capabilities are now [spread] across the pages of the newspapers.” [MSNBC, 2/12/2006; NewsMax, 2/12/2006]

Entity Tags: Jane Harman, Gwen Ifill, New York Times, House Intelligence Committee, Foreign Intelligence Surveillance Act, Tim Russert

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), has contacted Los Angeles Times reporter Joseph Menn about publishing an article expising AT&T’s collusion with the National Security Agency (NSA) to illegally conduct surveillance against American citizens (see January 23, 2006 and After). Klein believed Menn was enthusiastic about exposing AT&T and the NSA in his newspaper. Instead, Klein is shocked to hear from Menn that the Times’s “top guy” is preparing to meet with Director of National Intelligence John Negroponte to discuss any such publication. “I nearly fell down in shock,” Klein will later write. “[T]hey were actually negotiating with the government on whether to publish!” Menn describes himself to Klein as “demoralized,” and says the chances of getting the story published are “grim.” In his seven years at the Times, Menn tells Klein, he has never seen a story “spiked” for “nefarious reasons,” implying that the reason behind the story’s non-publication are “nefarious.” Klein is also dismayed that the Times has now revealed his existence as a whistleblower to Negroponte, and by extension to the US intelligence apparatus. Two days ago, Klein began emailing a New York Times reporter, James Risen, the co-author of a 2005 expose about the NSA’s surveillance program (see December 15, 2005). After hearing from Menn, Klein emails Risen to inform him of the Los Angeles Times’s decision to “consult” with Negroponte, and also of the lack of interest he has received from Senator Dianne Feinstein’s office (see February 1-6, 2006). Risen calls in fellow reporter Eric Lichtblau, his co-author on the 2005 story, and the two begin working on their own story. Klein remains worried about his personal and professional safety, since, as he will write, “[t]he government was on to me, but I did not yet have a published article and the protection that comes with publicity. I had visions, perhaps paranoid in hindsight, of being disappeared in the night, like [nuclear industry whistleblower] Karen Silkwood.” The Los Angeles Times story will drag on until March 29, when Menn will inform Klein that it is officially dead, blocked by Times editor Dean Baquet. Klein will later learn that Baquet had not only been in contact with Negroponte, but with NSA Director Michael Hayden. In 2007, Baquet will tell ABC News reporters that “government pressure played no part in my decision not to run with the story,” and will say that he and managing editor Doug Frantz decided “we did not have a story, that we could not figure out what was going on” with Klein’s documentation (see March 26, 2007). Klein will call Baquet’s explanation an “absurd and flimsy excuse,” and will say it is obvious that the Los Angeles Times “capitulated to government pressure.” [PBS Frontline, 5/15/2007; Klein, 2009, pp. 59-62]

Entity Tags: James Risen, Dean Baquet, AT&T, Dianne Feinstein, Eric Lichtblau, Joseph Menn, Michael Hayden, John Negroponte, Douglas Frantz, National Security Agency, Los Angeles Times, Mark Klein

Timeline Tags: Civil Liberties

Former National Security Agency (NSA) intelligence analyst and current whistleblower Russell Tice tells the House Government Reform Subcommittee on National Security, Emerging Threats, and International Relations that he worries about what he calls a “special access” electronic surveillance program that is far more wide-ranging than the warrantless wiretapping recently exposed by the New York Times. However, Tice says he is forbidden by law to reveal specifics of the program to Congress. Tice says he believes the program violates the Constitution’s protection against unlawful search and seizures, but for him to discuss it with anyone in Congress or even with the NSA’s inspector general would violate classification laws. A spokesman for Congressman Dennis Kucinich (D-OH) says both Kucinich and committee chairman Christopher Shays (R-CT) believe that a few members of the Armed Services Committee have high enough security clearances for Tice’s information: “Congressman Kucinich wants Congressman Shays to hold a hearing [on the program]. Obviously it would have to take place in some kind of a closed hearing. But Congress has a role to play in oversight. The [Bush] administration does not get to decide what Congress can and can not hear.” In January 2006, it emerged Tice was one of the sources for the New York Times’s revelation that the NSA is engaged in possibly illegal wiretapping of American civilians as part of the war on terror (see January 10, 2006). Tice was fired from the NSA in 2005 and labeled “paranoid,” a classification Tice says was pasted on him in retaliation for his whistleblowing both inside the agency and to the public (see January 25-26, 2006). [United Press International, 2/14/2006] Author James Bamford, an expert on US intelligence, says, “The congressional intelligence committees have lost total control over the intelligence communities. You can’t get any oversight or checks and balances; the Congress is protecting the White House and the White House can do whatever it wants.” [In These Times, 5/15/2006]

Entity Tags: Russell Tice, Christopher Shays, Dennis Kucinich, House Armed Services Committee, James Bamford, House Government Reform Subcommittee on National Security, Emerging Threats and International Relations

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales says he will sharply limit the testimony of former attorney general John Ashcroft and former deputy attorney general James Comey before the Senate Judiciary Committee. The committee is preparing for hearings on the warrantless wiretapping program authorized by President Bush several months after the 9/11 attacks (see Early 2002). Gonzales says that “privilege issues” will circumscribe both men’s testimony: “As a general matter, we would not be disclosing internal deliberations, internal recommendations. That’s not something we’d do as a general matter, whether or not you’re a current member of the administration or a former member of the administration.” He adds, “You have to wonder what could Messrs. Comey and Ashcroft add to the discussion.” Comey was an observer to the late-night visit by Gonzales and then-White House chief of staff Andrew Card to Ashcroft’s hospital room, where Gonzales and Card unsuccessfully attempted to persuade the heavily sedated Ashcroft to reauthorize the program after Comey, as acting attorney general, determined the program was likely illegal (see March 10-12, 2004). Committee chairman Arlen Specter (R-PA) says he has asked Gonzales for permission to call Comey and Ashcroft to testify, but has not yet received an answer. Specter says, “I’m not asking about internal memoranda or any internal discussions or any of those kind of documents which would have a chilling effect.” Specter will ask Ashcroft and Comey to talk about the legal issues at play in the case, including the events surrounding the hospital visit. In the House Judiciary Committee, Republicans block an attempt by Democrats to ask Gonzales to provide legal opinions and other documents related to the program. [Washington Post, 2/16/2006]

Entity Tags: Andrew Card, Alberto R. Gonzales, Arlen Specter, George W. Bush, John Ashcroft, House Judiciary Committee, James B. Comey Jr., Senate Judiciary Committee

Timeline Tags: Civil Liberties

Electronic Frontier Foundation (EFF) lawyer Kevin Bankston asks AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) to submit a legal declaration as to his knowledge of AT&T’s collusion with the National Security Agency (NSA) in its illegal domestic wiretapping program. Klein is working with the EFF in that organization’s lawsuit against AT&T (see Early January 2006 and January 31, 2006). Five days later, Klein submits his evidence of AT&T’s actions (see December 31, 2005) to Bankston to be used in the lawsuit. Klein will work with his lawyers to craft the declaration, and will have it in final form by late March. [Klein, 2009, pp. 63-64]

Entity Tags: National Security Agency, AT&T, Electronic Frontier Foundation, Mark Klein, Kevin Bankston

Timeline Tags: Civil Liberties

The Al Haramain Islamic Foundation, a now-defunct Saudi Arabian charitable organization that once operated in Oregon, sues the Bush administration [Associated Press, 2/28/2006] over what it calls illegal surveillance of its telephone and e-mail communications by the National Security Agency, the so-called Terrorist Surveillance Program. The lawsuit may provide the first direct evidence of US residents and citizens being spied upon by the Bush administration’s secret eavesdropping program, according to the lawsuit (see December 15, 2005). According to a source familiar with the case, the NSA monitored telephone conversations between Al Haramain’s director, then in Saudi Arabia, and two US citizens working as lawyers for the organization and operating out of Washington, DC. The lawsuit alleges that the NSA violated the Foreign Intelligence Surveillance Act (see 1978), the US citizens’ Fourth Amendment rights, and the attorney-client privilege. FISA experts say that while they are unfamiliar with the specifics of this lawsuit, they question whether a FISA judge would have allowed surveillance of conversations between US lawyers and their client under the circumstances described in the lawsuit. Other lawsuits have been filed against the Bush administration over suspicions of illegal government wiretapping, but this is the first lawsuit to present classified government documents as evidence to support its contentions. The lawsuit alleges that the NSA illegally intercepted communications between Al Haramain officer Suliman al-Buthe in Saudi Arabia, and its lawyers Wendell Belew and Asim Ghafoor in Washington. One of its most effective pieces of evidence is a document accidentally turned over to the group by the Treasury Department, dated May 24, 2004, that shows the NSA did indeed monitor conversations between Al Haramain officials and lawyers. When Al Haramain officials received the document in late May, 2004, they gave a copy to the Washington Post, whose editors and lawyers decided, under threat of government prosecution, to return the document to the government rather than report on it (see Late May, 2004). [Washington Post, 3/2/2006; Washington Post, 3/3/2006] Lawyer Thomas Nelson, who represents Al Haramain and Belew, later recalls he didn’t realize what the organization had until he read the New York Times’s December 2005 story of the NSA’s secret wiretapping program (see December 15, 2005). “I got up in the morning and read the story, and I thought, ‘My god, we had a log of a wiretap and it may or may not have been the NSA and on further reflection it was NSA,’” Nelson will recall. “So we decided to file a lawsuit.” Nelson and other lawyers were able to retrieve one of the remaining copies of the document, most likely from Saudi Arabia, and turned it over to the court as part of their lawsuit. [Wired News, 3/5/2007]
Al Haramain Designated a Terrorist Organization - In February 2004, the Treasury Department froze the organization’s US financial assets pending an investigation, and in September 2004, designated it a terrorist organization, citing ties to al-Qaeda and alleging financial ties between Al Haramain and the 1998 bombings of two US embassies in Africa (see 10:35-10:39 a.m., August 7, 1998). The organization was disbanded by the Saudi Arabian government in June 2004 and folded into an “umbrella” private Saudi charitable organization, the Saudi National Commission for Relief and Charity Work Abroad (see March 2002-September 2004). In February 2005, the organization was indicted for conspiring to funnel money to Islamist fighters in Chechnya. The charges were later dropped. [US Treasury Department, 9/9/2004; Washington Post, 3/2/2006] The United Nations has banned the organization, saying it has ties to the Taliban. [United Nations, 7/27/2007]
Challenging Designation - In its lawsuit, Al Haramain is also demanding that its designation as a terrorist organization be reversed. It says it can prove that its financial support for Chechen Muslims was entirely humanitarian, with no connections to terrorism or violence, and that the Treasury Department has never provided any evidence for its claims that Al Haramain is linked to al-Qaeda or has funded terrorist activities. [Associated Press, 8/6/2007] The lawsuit also asks for $1 million in damages, and the unfreezing of Al Haramain’s US assets. [Associated Press, 8/5/2007]
Administration Seeks to Have Lawsuit Dismissed - The Bush administration will seek to have the lawsuit thrown out on grounds of national security and executive privilege (see Late 2006-July 2007, Mid-2007).

Entity Tags: Wendell Belew, Suliman al-Buthe, Taliban, Washington Post, United Nations, Saudi National Commission for Relief and Charity Work Abroad, US Department of the Treasury, National Security Agency, Thomas Nelson, Foreign Intelligence Surveillance Act, Al Haramain Islamic Foundation, Al-Qaeda, Al Haramain Islamic Foundation (Oregon branch), Foreign Intelligence Surveillance Court, Asim Ghafoor, Bush administration (43)

Timeline Tags: Civil Liberties

Zacarias Moussaoui.Zacarias Moussaoui. [Source: WNBC / Jonathan Deinst]Zacarias Moussaoui becomes the first and only person charged in direct connection with the 9/11 attacks to stand trial in the US. [Associated Press, 3/17/2006] He was preparing to hijack an aircraft and fly it into a target when he was arrested 26 days before 9/11 (see August 16, 2001 and April 22, 2005). Although there has been disagreement whether Moussaoui was to take part in the actual attack of 9/11 or a follow-up plot (see January 30, 2003), the prosecution alleges that Moussaoui had information related to the attacks (see August 16, 2001) and facilitated them by lying and not disclosing everything he knew to the FBI. He is charged with six counts, including conspiracy to commit acts of terrorism and conspiracy to commit aircraft piracy. [US District Court for the Eastern District of Virginia, Alexandria Division, 12/11/2001 pdf file] The trial receives much media coverage and the highlights include the playing of United 93’s cockpit recorder (see April 12, 2006), a row over a government lawyer coaching witnesses (see March 13, 2006), and testimony by FBI agent Harry Samit (see March 9 and 20, 2006), former FBI assistant director Michael Rolince (see March 21, 2006), and Moussaoui himself (see March 27, 2006). Moussaoui is forced to wear a stun belt, controlled by one of the marshalls, under his jumpsuit. The belt is to be used if Moussaoui lunges at a trial participant. [New York Times, 4/17/2006] He has already pleaded guilty (see April 22, 2005) and the trial is divided into two phases; in the first phase the jury decides that Moussaoui is eligible for the death penalty, but in the second phase it fails to achieve unanimity on whether Moussaoui should be executed (see May 3, 2006). [Associated Press, 4/3/2006; New York Times, 4/17/2006]

Entity Tags: Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Republicans on the Senate Intelligence Committee refuse to allow an inquiry into the Bush administration’s warrantless wiretapping program (see December 15, 2005 and December 18, 2005), with the committee voting 10-8 along party lines to reject such a probe. Senate Judiciary Committee chairman Arlen Specter (R-PA) had advocated such a probe, but White House officials refused to cooperate with his committee, saying they would only cooperate via classified briefings to the Intelligence Committee. However, committee Republicans, led by chairman Pat Roberts (R-KS), have no intention of allowing such an inquiry. Roberts and his fellows say they will push to impose limitations on the program. Committee Democrats accuse their Republican colleagues of colluding with the administration to block the inquiry. “The committee is, to put it bluntly, is basically under the control of the White House,” says ranking committee member John D. Rockefeller (D-WV). “You can’t legislate properly unless you know what’s going on.” The Republicans have left Congress to “legislate in darkness and ignorance,” he says. Republicans say that a new, select subcommittee will increase oversight of the administration’s wiretapping. “It provides for a case-by-case examination and oversight by the United States Congress,” says Mike DeWine (R-OH), who is helping draft the bill for the new oversight subcommittee. “It will be very consistent with what our constitutional obligations are.” DeWine’s bill would allow the administration to ignore restrictions on wiretapping merely by invoking national security, and would not allow the committee to intervene even in clearly unjustified cases of wiretapping. “The White House could just decide not to tell them everything, and there’s no sanction,” says Bruce Fein, a former Reagan administration lawyer. “And the president can still claim that he has inherent power to conduct surveillance.” The bill is “extremely generous to the president,” says conservative law professor Douglas Kmiec. “It is not significantly different from the status quo. And I think the president would be quite delighted by that.” [Boston Globe, 3/8/2006; Savage, 2007, pp. 204]

Entity Tags: Senate Judiciary Committee, Bruce Fein, Arlen Specter, Bush administration (43), Pat Roberts, Douglas Kmiec, Mike DeWine, John D. Rockefeller, Senate Intelligence Committee

Timeline Tags: Civil Liberties

President Bush signs the USA Patriot Improvement and Reauthorization Act of 2005 into law. The bill, which extends and modifies the original USA Patriot Act (see October 26, 2001), was driven through Congress primarily by the Republican majorities in both Houses. However, Senator Dianne Feinstein (D-CA) cosponsored the Senate bill, numerous Democrats in both Houses voted with the Republicans in favor of the bill, and the final bill sailed through the Senate by an 89-10 vote on March 2. [GovTrack, 3/9/2006; Library of Congress, 3/9/2006] In the signing ceremony, Bush calls the Reauthorization Act “a really important piece of legislation… that’s vital to win the war on terror and to protect the American people.” He repeatedly evokes the 9/11 attacks as a reason why the new law is needed. [Government Printing Office, 3/9/2006]
Provisions for Oversight Added - One of the reasons why the reauthorization bill received such support from Congressional moderates on both sides of the aisle is because Congress added numerous provisions for judicial and Congressional oversight of how government and law enforcement agencies conduct investigations, especially against US citizens. Representative Butch Otter (R-ID) said in 2004 that Congress came “a long way in two years, and we’ve really brought an awareness to the Patriot Act and its overreaches that we gave to law enforcement.” He adds, “We’ve also quieted any idea of Patriot II, even though they snuck some of Patriot II in on the intelligence bill” (see February 7, 2003). [Associated Press, 1/23/2004]
Opposition From Both Sides - Liberal and conservative organizations joined together in unprecedented cooperation to oppose several key provisions of the original reauthorization and expansion of the Patriot Act, including easing of restrictions on government and law enforcement agencies in obtaining financial records of individuals and businesses, “sneak-and-peek” searches without court warrants or the target’s knowledge, and its “overbroad” definition of the term “terrorist.” Additionally, lawmakers in Congress insisted on expiration dates for the various surveillance and wiretapping methodologies employed by the FBI and other law enforcement agencies (see Early 2002). [Associated Press, 5/23/2005] The final bill mandates that anyone subpoenaed for information regarding terrorist investigations has the right to challenge the requirement that they not reveal anything about the subpoena, those recipients will not be required to tell the FBI the name of their lawyer, and libraries that are not Internet service providers will not be subject to demands from “national security letters” for information about their patrons. Many of the bill’s provisions will expire in four years. [Christian Science Monitor, 3/3/2006]
Reauthorizing Original Provisions - The bill does reauthorize many expiring provisions of the original Patriot Act, including one that allows federal officials to obtain “tangible items,” such as business records from libraries and bookstores, in connection with foreign intelligence and international terrorism investigations. Port security provisions are strengthened, and restrictions on the sale of over-the-counter cold and allergy medicine that can be used in the illegal manufacture of methamphetamine are imposed, forcing individuals to register their purchases of such medicines and limiting the amounts they can buy. [CBS News, 3/9/2006]
Bush Signing Statement Says He Will Ignore Oversight Mandates - But when he signs the bill into law, Bush also issues a signing statement that says he has no intention of obeying mandates that enjoin the White House and the Justice Department to inform Congress about how the FBI is using its new powers under the bill. Bush writes that he is not bound to tell Congress how the new Patriot Act powers are being used, and in spite of what the law requires, he can and will withhold information if he decides that such disclosure may “impair foreign relations, national security, the deliberative process of the executive, or the performance of the executive’s constitutional duties.” [Statement on Signing the USA PATRIOT Improvement and Reauthorization Act, 3/9/2006; Boston Globe, 3/24/2006] Senator Patrick Leahy (D-VT) says that Bush’s assertion that he can ignore provisions of the law as he pleases, under the so-called “unitary executive” theory, are “nothing short of a radical effort to manipulate the constitutional separation of powers and evade accountability and responsibility for following the law.” Law professor David Golove says the statement is illustrative of the Bush administration’s “mind-bogglingly expansive conception” of executive power, and its low regard for legislative power. [Boston Globe, 3/24/2006] Author and legal expert Jennifer Van Bergen warns of Bush using this signing statement to avoid accountability about the NSA’s warrantless wiretapping program, writing: “[I]t is becoming clearer every day that Bush has no qualms about violating either international laws and obligations or domestic laws. The recent revelations about the secret NSA domestic surveillance program revealed Bush flagrantly violating the Foreign Intelligence Surveillance Act which was specifically enacted to prevent unchecked executive branch surveillance. … His signing statements, thus, are nothing short of an attempt to change the very face of our government and our country.” [Institute for Public Accuracy, 3/27/2006]
Request to Rescind Signing Statement - In late March, Democratic House members Jane Harman and John Conyers will write to Attorney General Alberto Gonzales requesting that the administration rescind the signing statement, writing: “As you know, ‘signing statements’ do not have the force of law. Legislation passed by both Houses and signed by the president does. As Article 1, Section 7, of the Constitution states: ‘Every bill which shall have passed the House of Representatives and the Senate, shall, before it become a Law, be presented to the President of the United States; If he approve he shall sign it, but if not he shall return it.’” Bush and Gonzales will ignore the request. [US House of Representatives, 3/29/2006]

Entity Tags: US Department of Justice, Domestic Security Enhancement Act of 2003, David Golove, Alberto R. Gonzales, Butch Otter, Dianne Feinstein, Patrick J. Leahy, USA Patriot Act, John Conyers, Federal Bureau of Investigation, National Security Agency, Foreign Intelligence Surveillance Act, Jennifer Van Bergen, Jane Harman, George W. Bush

Timeline Tags: Civil Liberties

Senator Russell Feingold (D-WI) tells reporters that he intends to push through legislation that would censure President Bush because of his domestic surveillance program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006). “What the president did by consciously and intentionally violating the Constitution and laws of this country with this illegal wiretapping has to be answered,” Feingold tells an interviewer. “Proper accountability is a censuring of the president, saying, ‘Mr. President, acknowledge that you broke the law, return to the law, return to our system of government.‘… The president has broken the law and, in some way, he must be held accountable.… Congress has to reassert our system of government, and the cleanest and the most efficient way to do that is to censure the president. And, hopefully, he will acknowledge that he did something wrong.” Senate Majority Leader Bill Frist (R-TN) calls Feingold’s proposal “a crazy political move.” The Senate Intelligence Committee, following the Bush administration’s lead, has rejected some Democrats’ call for a full investigation of the surveillance program (see February 1-6, 2006). Instead, the committee has adopted a Republican plan for a seven-member subcommittee to conduct oversight. Feingold says his censure motion is not “a harsh approach, and it’s one that I think should lead to bipartisan support.” Frist, however, says: “I think it, in part, is a political move because here we are, the Republican Party, the leadership in the Congress, supporting the president of the United States as commander in chief who is out there fighting al-Qaeda and the Taliban and Osama bin Laden and the people who have sworn—have sworn—to destroy Western civilization and all the families listening to us.… The signal that it sends that there is in any way a lack of support for our commander in chief who is leading us with a bold vision in a way that we know is making our homeland safer is wrong. And it sends a perception around the world.” Only once in history has a president been censured by Congress: Andrew Jackson in 1834. In the House, Representative John Conyers (D-MI) is exploring the idea of introducing impeachment legislation against Bush. [New York Times, 3/12/2006; Associated Press, 3/12/2006] Feingold says on the Senate floor: “The president has violated the law and Congress must respond. A formal censure by Congress is an appropriate and responsible first step to assure the public that when the president thinks he can violate the law without consequences, Congress has the will to hold him accountable.” Most Congressional Democrats want nothing to do with either Feingold’s or Conyers’s legislative ideas, and some Republicans seem to be daring Democrats to vote for the proposal. Vice President Dick Cheney tells a Republican audience in Feingold’s home state of Wisconsin, “Some Democrats in Congress have decided the president is the enemy.” Democratic leaders in the Senate thwart an immediate vote as requested by Frist, and Senator Richard Durbin (D-IL) says he is not sure the proposal will ever come to a vote. Senate Minority Leader Harry Reid (D-NV) says he does not support it and has not read it. Senator Joseph Lieberman (D-CT) makes a similar assertion. In the House, Minority Leader Nancy Pelosi (D-CA) refuses to support such a proposal, saying in a statement that she “understands Senator Feingold’s frustration that the facts about the NSA domestic surveillance program have not been disclosed appropriately to Congress. Both the House and the Senate must fully investigate the program and assign responsibility for any laws that may have been broken.” [Associated Press, 3/14/2006] Former Nixon aide John Dean testifies in support of Feingold’s censure motion (see March 31, 2006). However, the censure motion, lacking support from Democratic leaders and being used by Republicans as a means to attack Democrats’ patriotism, never comes to a vote. [Klein, 2009, pp. 84]

Entity Tags: Joseph Lieberman, George W. Bush, Bush administration (43), Bill Frist, Harry Reid, John Dean, Russell D. Feingold, Senate Intelligence Committee, Richard (“Dick”) Durbin, Richard (“Dick”) Cheney, Nancy Pelosi, John Conyers

Timeline Tags: Civil Liberties

Judge Leonie Brinkema halts the trial of Zacarias Moussaoui (see March 6-May 4, 2006) after it is discovered that Transportation Security Administration lawyer Carla J. Martin violated a court order prohibiting witnesses from following the trial. Martin e-mailed transcripts to seven witnesses and coached them on their testimony. Brinkema calls it “the most egregious violation of the court’s rules on witnesses [I have seen] in all the years I’ve been on the bench.” Even the prosecution says, “We frankly cannot fathom why she engaged in such conduct.” [Washington Post, 3/14/2006; Associated Press, 3/17/2006] Brinkema allows the prosecution to continue to seek the death penalty, but initially removes the aviation security portion of evidence from its case. However, after the prosecution complains this makes the proceedings pointless, she reinstates some of it, allowing the trial to continue. [Associated Press, 3/15/2006; CNN, 3/16/2006; Associated Press, 3/17/2006] As a result of her actions, Martin is placed on paid leave. Additionally, Pennsylvania’s lawyer disciplinary board begins an investigation and federal prosecutors explore charges. [Washington Post, 7/10/2006] Martin’s e-mails also reveal that she has been communicating with attorneys for United and American Airlines. This prompts seven victims’ relatives, who are suing the airlines for being negligent on 9/11, to file a civil action against her alleging that she is trying to help the airline industry avoid civil liability. [CBS News, 4/7/2006; CNN, 4/26/2006]

Entity Tags: Leonie Brinkema, Carla Martin

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Michael Rolince, who headed the FBI’s International Terrorism Operations Section when Zacarias Moussaoui was arrested, testifies at Moussaoui’s trial (see March 6-May 4, 2006). He initially states that he was only informed of the Moussaoui case before 9/11 in two brief hallway conversations (see Late August 2001) and did not read a memo sent to him by the Minneapolis field office. However, under cross-examination he admits he also discussed a plan to deport Moussaoui to France, where his belongings could be searched (see (August 30-September 10, 2001)). [Associated Press, 3/21/2006; Associated Press, 3/21/2006] According to Newsday, Rolince appears “red-faced and flustered” at the end of the cross-examination and makes the court burst out laughing when he says he did not approve a briefing to FBI field offices about bin Laden threats in the US (see Before April 13, 2001), even though the briefing states he approved it. He says one of his subordinates may have approved it. [Associated Press, 3/21/2006; Newsday, 3/22/2006] Rolince is called by the prosecution, which wants him to give a list of steps the FBI would have taken if Moussaoui had confessed. However, Judge Brinkema states that, “Juries cannot decide cases on speculation… Nobody knows what would have happened.” [Associated Press, 3/21/2006; Associated Press, 3/22/2006]

Entity Tags: Michael Rolince

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

During the trial of Zacarias Moussaoui (see also March 6-May 4, 2006), the prosecution claims that if Zacarias Moussaoui had not lied when arrested and questioned (see August 16, 2001) and had provided information about the plot (see August 16, 2001), the FAA could have altered its security procedures to deal with the suicide hijacker threat. Prosecution witness Robert Cammaroto, an aviation security officer, says that security measures in effect before 9/11 were designed to cope with different types of threats, such as “the homesick Cuban,” rather than suicide hijackings. He says that if the FAA had more information about Moussaoui, its three dozen air marshals could have been moved from international to domestic flights, security checkpoints could have been tightened to detect short knives like the ones Moussaoui had, and flight crews could have been instructed to resist rather than cooperate with hijackers. Most of these steps could have been implemented within a matter of hours. However, Cammarato admits that the FAA was aware before 9/11 that terrorists considered flying a plane into the Eiffel Tower and that al-Qaeda has performed suicide operations on land and sea. [Associated Press, 3/22/2006]

Entity Tags: Federal Aviation Administration, Robert Cammarato, Carla Martin, Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Ahmed Alnami’s youth hosteling card found in the Flight 93 crash site.Ahmed Alnami’s youth hosteling card found in the Flight 93 crash site. [Source: FBI]During the trial of Zacarias Moussaoui (see March 6-May 4, 2006), the Reporters Committee for Freedom of the Press publishes a significant portion of the exhibits used during the trial. [Reporters Committee for Freedom of the Press, 12/4/2006] Previously, only a few items of the evidence linking the attacks to al-Qaeda were made public. For example, the 9/11 Commission’s Terrorist Travel Monograph contained 18 documents of the alleged hijackers and their associates. [9/11 Commission, 8/21/2004, pp. 171-195 pdf file] The published exhibits include:
bullet Items belonging to the alleged hijackers that were recovered from the crash sites and Logan airport;
bullet Some details of the hijackers’ movements in the US;
bullet Graphic photos of dead victims and body parts in the Pentagon and WTC ruins;
bullet Substitutions for testimony from some of the main plotters such as Khalid Shaikh Mohammed;
bullet The missing chapter from the Justice Department’s Office of Inspector General’s review of the FBI’s performance before 9/11 (see June 9, 2005); and
bullet FBI and CIA documents. [Reporters Committee for Freedom of the Press, 12/4/2006]
At the end of July, the US District Court for the Eastern District of Virginia, Alexandria Division, publishes more of the exhibits used in the trial. The additionally published exhibits include, for example:
bullet Documents of the hijackers found at the crash sites and Logan airport, such as Satam Al Suqami’s passport (see After 8:46 a.m. September 11, 2001), Ahmed Alnami’s youth hosteling card, and old correspondence between Mohamed Atta and the German authorities;
bullet Recordings of calls made by the passengers from the flights and recordings of the hijacker pilots talking to the passengers;
bullet Documents about the alleged hijackers prepared by the FBI such as a True Name Usage Chart for 2001 and chronologies for eleven of the hijackers from August 16-September 11, 2001;
bullet Documents from the hijackers’ flight schools;
bullet A small sample of the hijackers’ banking and phone records.
However, some of the exhibits are not disclosed. For example, the cockpit voice recording from United 93 is sealed and only a transcript is made available. [US District Court for the Eastern District of Virginia, 7/31/2006]

Entity Tags: Reporters Committee for Freedom of the Press

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Zacarias Moussaoui claimed that Richard Reid (above) was to have helped him hijack a fifth plane on 9/11.Zacarias Moussaoui claimed that Richard Reid (above) was to have helped him hijack a fifth plane on 9/11. [Source: Mirrorpix(.com)]Against the will of his defense attorneys, Zacarias Moussaoui takes the stand at his trial (see March 6-May 4, 2006) and claims that he was supposed to fly a fifth plane on 9/11. He says the plane would have targeted the White House and one of the muscle hijackers would have been shoe-bomber Richard Reid (see December 22, 2001). However, he claims not to have known the details of the other hijackings, only that the WTC would be hit. He does not mention any other collaborators aside from Reid, who has already been sentenced to a long prison term. When the prosecution asks him whether he lied to FBI investigators so the plan could go forward he replies, “That’s correct.” An Associated Press expert calls this, “a stunning revelation that would help prosecutors rather than him.” [Associated Press, 3/27/2006] In what the New York Times calls a “bizarre moment,” the defense team, aware of the damage this admission could do, subject Moussaoui to tough questioning and the chief prosecutor objects that one of the defense attorneys is badgering his own client. [New York Times, 4/17/2006]
Uncertainty over Fifth Jet - There is some dispute over whether Moussaoui was indeed to have flown a fifth plane (see January 30, 2003 and Before 2008). Following the testimony, the defense reads statements made by al-Qaeda leaders who are in custody, but are not permitted to testify at the trial (see May 14, 2003 and March 22, 2005). The statements say that Moussaoui was not part of 9/11, but a follow-up operation. [Associated Press, 3/28/2006; US District Court for the Eastern District of Virginia, 7/31/2006 pdf file] However, these statements were obtained using torture (see June 16, 2004). The government later concedes that there is no evidence linking Richard Reid to 9/11. [Associated Press, 4/20/2006]
"Complete Fabrication" - Moussaoui had denied being part of 9/11 before the trial (see April 22, 2005). By the end of the trial he will do so again, calling the confession he makes on this day “a complete fabrication.” [Associated Press, 5/8/2006]

Entity Tags: Zacarias Moussaoui, Richard C. Reid

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Four statements based on the CIA inspector general’s report on some aspects of the agency’s performance before 9/11 are introduced as evidence at the trial of Zacarias Moussaoui by the defense. The report was completed in 2004 (see June-November 2004), but rewritten and is still secret (see January 7, 2005). The four passages say:
bullet “Numerous” CIA officers accessed cables reporting that Khalid Almihdhar’s passport contained a US visa and Nawaf Alhazmi had flown from Thailand to Los Angeles (see Mid-January-March 2000); [US District Court for the Eastern District of Virginia, Alexandria District, 3/28/2006 pdf file]
bullet FBI Director Louis Freeh was briefed about Almihdhar in January 2000, but not told that Almihdhar had a US visa (see January 6-9, 2000); [US District Court for the Eastern District of Virginia, Alexandria Division, 3/28/2006 pdf file]
bullet Nobody at Alec Station, the CIA’s bin Laden unit, notified CIA personnel authorized to collect foreign intelligence in the US together with the FBI about Almihdhar’s US visa (see 9:30 a.m. - 4:00 p.m. January 5, 2000); [US District Court for the Eastern District of Virginia, Alexandria Division, 3/28/2006 pdf file]
bullet The CIA was unaware of the Phoenix memo until after 9/11 (note: this may not actually be true—see (July 27, 2001)). [US District Court for the Eastern District of Virginia, Alexandria Division, 3/28/2005 pdf file]
Two sections of the 9/11 Congressional Inquiry report are also introduced as evidence as substitutes for the CIA inspector general’s report. They cover the use of aircraft as weapons and US knowledge of bin Laden’s intentions to strike inside the US in the summer of 2001. [US District Court for the Eastern District of Virginia, Alexandria Division, 3/28/2006 pdf file; US District Court for the Eastern District of Virginia, Alexandria Division, 3/28/2006 pdf file]

Entity Tags: Office of the Inspector General (CIA), Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Expert witness J. Scott Marcus, in an analysis submitted on behalf of the Electronic Frontier Foundation’s lawsuit against AT&T (see January 31, 2006), notes that if the NSA had wanted to intercept only international electronic communications in its surveillance operations facilited by AT&T (see January 16, 2004), it would have placed “splitters” only at entry points such as ocean cable-head stations rather than in AT&T offices (see October 2003) in locations such as Atlanta and San Francisco (see Late 2003), where they would inevitably pick up huge amounts of domestic communications. Marcus, a former AT&T employee who held a top secret clearance when he was a consultant for the Federal Communications Commission (FCC), writes: “The majority of international IP [Internet Protocol] traffic enters the United States at a limited number of locations, many of them in the areas of northern Virginia, Silicon Valley, New York, and (for Latin America) south Florida. This deployment, however, is neither modest nor limited, and it apparently involves considerably more locations that would be required to catch the majority of international traffic.” (Emphasis in original.) Marcus continues: “I conclude that the designers of the SG3 Configuration (see Late 2003) made no attempt, in terms of the location or position of the fiber split, to exclude data sources primarily comprised of domestic data.… Once the data has been diverted, there is nothing in the data that reliably and unambiguously distinguishes whether the destination is domestic or foreign.” Marcus estimates that the NSA has 15 to 20 sites in AT&T facilities around the country, and says, “a substantial fraction, probably well over half, of AT&T’s purely domestic traffic was diverted.” Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Though Marcus refrained from drawing the obvious conclusion, the facts strongly suggest that this entire apparatus was designed for domestic spying.” (Emphasis in original). [Klein, 2009, pp. 49-50, 71] Klein will also write that Marcus’s expertise “was at a much higher level than mine.” Klein will later write that he is pleased that Marcus’s statement validates and supports his own documentation and conclusions. [Klein, 2009, pp. 71]

Entity Tags: National Security Agency, AT&T, Electronic Frontier Foundation, Mark Klein, J. Scott Marcus

Timeline Tags: Civil Liberties

The Justice Department demands that it be allowed to review evidence obtained by the Electronic Frontier Foundation (EFF) from retired AT&T technician Mark Klein (see February 23-28, 2006). The EFF is preparing to submit the evidence under regular court seal to presiding Judge Vaughn Walker. Neither the Justice Department nor any other government agency is a named defendant in the EFF’s lawsuit against AT&T for its allegedly illegal behavior in working with the National Security Agency (NSA) to conduct warrantless surveillance against American citizens (see January 31, 2006). Even so, lawyers from the Justice Department say they want to see if Klein’s documentation contains classified information (it does not—see Late 2003), and if so, they intend to place Klein’s documentation into a “sensitive compartmented information facility,” which would mean it would not be kept at the courthouse but in the possession of government agents at a secure location. Such classification would make the legal proceedings more difficult for both Judge Walker and the EFF lawyers. However, the request piques the interest of the national media, and reporters begin “flooding” Klein and the EFF with requests for information and interviews. [Klein, 2009, pp. 65-66] Ironically, two news outlets, the Los Angeles Times and New York Times, have all but shunned Klein before now (see February 11, 2006 and After and Mid-February - Late March, 2006). On April 4, after perusing the documents, the government lawyers return them to Walker with approval from senior Justice Department lawyer Anthony J. Coppolino to file them under ordinary court seal. Klein will later write that Coppolino’s acquiescence will undermine the government’s later efforts to have the lawsuit dismissed under the “state secrets” provision (see Late May, 2006). [Klein, 2009, pp. 66] In June 2007, the online technical news site Wired News will publish the documents after they are released by the Electronic Frontier Foundation (see June 13, 2007) under the headline “AT&T ‘Spy Room’ Documents Unsealed; You’ve Already Seen Them.” Wired previously published them in May 2006 (see May 17, 2006), and PBS’s Frontline also published them as part of a televised documentary on Klein and the eavesdropping program. [Wired News, 6/13/2007]

Entity Tags: Mark Klein, AT&T, Anthony J. Coppolino, Los Angeles Times, US Department of Justice, New York Times, Electronic Frontier Foundation, Vaughn Walker, Wired News, National Security Agency

Timeline Tags: Civil Liberties

A map drawn by one of the defectors, showing his version of the Salman Pak facility.A map drawn by one of the defectors, showing his version of the Salman Pak facility. [Source: PBS]The story told by three Iraqi defectors in November 2001, of a terrorist training camp in Salman Pak, outside of Baghdad, has long been disproven (November 6-8, 2001) and one defector has been shown to have pretended to be former Iraqi general Jamal al-Ghurairy, the key source for the story. But only now are the news reporters and pundits beginning to acknowledge—however grudgingly—that they were duped, and that their credulous reportings helped cement the Bush administration’s fabricated case for invading Iraq. The story was one of at least 108 planted in the US and British press by the Iraqi National Congress (INC) between October 2001 and May 2002, a number audaciously provided by the INC itself in its attempts to persuade Congress to continue its funding (see June 26, 2002). The New York Times eventually admitted some faults with its prewar reporting, but only admitted that its coverage of the Salman Pak story had “never been independently verified.” PBS, similarly gulled by the defectors and their fraudulent claims (see October 2005), amended its Frontline Web site for its “Gunning for Saddam” story, which featured interviews with the defectors, to note that the defector’s claims have “not been substantiated,” and later will admit to the likelihood that its reporter, Christopher Buchanan, was duped. New York Times reporter Chris Hedges now says he took the word of producer Lowell Bergman as to the validity of the defector, and was further convinced by one of the defector’s military appearance. As for Bergman, Hedges says, “There has to be a level of trust between reporters. We cover each other’s sources when it’s a good story because otherwise everyone would get hold of it.” Hedges admits he was not aware at the time of how close Bergman, and other Times reporters such as Judith Miller, was to INC head Ahmed Chalabi. “I was on the periphery of all this. This was Bergman’s show.” [Mother Jones, 4/2006] In 2004, Hedges noted that he attempted to get confirmation from the US government about the defectors and their story, and government officials confirmed the claims: “We tried to vet the defectors and we didn’t get anything out of Washington that said ‘these guys are full of sh*t.’” [Columbia Journalism Review, 7/1/2004] Hedges says he later rejected an attempt by Chalabi to convince him that UN inspectors were spying for Saddam Hussein. He also says that he never believed the stories placing 9/11 hijacker Mohamed Atta in Prague (see April 8, 2001). He no longer trusts Chalabi as a source of information: “He’s a sleazy guy who I was not comfortable working around, but there was nothing right after 9/11 to indicate he was an outright liar.” [Mother Jones, 4/2006] Hedges notes that Chalabi seemed to have an “endless stable” of defectors to talk with reporters. “He had defectors for any story you wanted. He tried to introduce me to this guy who said he knew about Iraqi spies on the UN inspection teams: the guy was a thug. I didn’t trust either of them.” [Columbia Journalism Review, 7/1/2004] However, none of this uncertainty made it into Hedges’s Times report. Bergman says, “You’ve got to remember that back then there really was only one show in town, and that was Chalabi’s. If you were doing a story on Saddam’s Iraq, you would speak to the Iraqi government, the White House, and the INC.” Bergman tried to confirm the al-Ghurairy story with former CIA director and prominent neoconservative James Woolsey, and Woolsey told him that “al-Ghurairy” had met with the FBI in Ankara. (At the time, Woolsey was hardly a neutral source since it was already reported that he was aggressively trying to drum up connections between Iraq and al-Qaeda (see Late September 2001 and Mid-September-October 2001).) “Chalabi was dangerous goods in the sense you know he’s advocating war” Bergman recalls. “But that label is up-front. I think Chalabi is given too much credit for influencing the march to war.” Many conservative pundits still cite the al-Ghurairy tale as justification for the Iraq invasion. And the White House still lists “shutting down the Salman Pak training camp where members of many terrorist camps trained” in its “Progress Report on the Global War on Terrorism” Web page. In 2004, Chalabi boasted, “As far as we’re concerned, we’ve been entirely successful. That tyrant Saddam is gone, and the Americans are in Baghdad. What was said before is not important. The Bush administration is looking for a scapegoat. We’re ready to fall on our swords if he wants. We are heroes in error.” [Columbia Journalism Review, 7/1/2004; Mother Jones, 4/2006]

Entity Tags: Jamal al-Ghurairy, Chris Hedges, Bush administration (43), Ahmed Chalabi, Iraqi National Congress, Christopher Buchanan, Saddam Hussein, Mohamed Atta, New York Times, Public Broadcasting System, Lowell Bergman, Judith Miller, James Woolsey

Timeline Tags: Events Leading to Iraq Invasion

Jeffrey Rapp, the director of the Joint Intelligence Task Force for Combating Terrorism at the Defense Intelligence Agency, provides a 16-page document supporting the government’s declaration that Ali Saleh Kahlah al-Marri is an enemy combatant (see December 12, 2001). Rapp gives the classified document, originally prepared in September 2004 and partially declassified for the court, to the trial judge presiding over the case, Henry Floyd (see April 6, 2006). The document, informally known as the “Rapp Declarations,” makes an array of charges against al-Marri, including alleging that he “met personally” with Osama bin Laden and was sent to the US to “explore computer-hacking methods to disrupt bank records and the US financial system.” Rapp claims that al-Marri was trained in the use of poisons and had detailed information about poisonous chemicals on his laptop computer, a claim verified by an FBI search. Additionally, Rapp says that al-Qaeda “instructed al-Marri to explore possibilities for hacking into the mainframe computers of banks with the objective of wreaking havoc on US banking records.” Rapp also says that al-Marri’s computer was loaded with “numerous computer programs typically utilized by computer hackers; ‘proxy’ computer software which can be utilized to hide a user’s origin or identity when connected to the Internet; and bookmarked lists of favorite Web sites apparently devoted to computer hacking.” Rapp refuses to cite any sources other than “specific intelligence sources” that are “highly classified.” [Jeffrey M. Rapp, 9/9/2004 pdf file; CNET News, 9/22/2006] While this kind of evidence is routinely dismissed as hearsay evidence inadmissible in court, Floyd rules that because the Supreme Court ruled in Hamdi v. Rumsfeld that hearsay evidence can be used against alleged enemy combatants (see June 28, 2004), the “Rapp Declarations” would be considered. Floyd says that al-Marri’s lawyers will have to provide “more persuasive evidence” that counters the government’s case—a reversal of the usual burden of proof that places the responsibility of proving guilt on the prosecution and not the defense. [CNET News, 9/22/2006]

Entity Tags: Henry Floyd, Defense Intelligence Agency, Joint Intelligence Task Force for Combating Terrorism (DIA), Jeffrey Rapp, Al-Qaeda, Ali Saleh Kahlah al-Marri

Timeline Tags: Torture of US Captives, Civil Liberties

Retired AT&T technician and incipient whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) issues his first press release, summarizing his knowledge of AT&T’s complicity with the National Security Agency (NSA) in that agency’s illegal domestic wiretapping program (see December 31, 2005). Klein has given documentation supporting his claims to the Electronic Frontier Foundation (EFF) in support of that organization’s lawsuit against AT&T (see January 31, 2006). Klein’s press release tells of the NSA’s “secret room” in AT&T’s Folsom Street, San Francisco, facility (see January 2003) and reveals for the first time the NSA’s use of the Narus STA 6400 to comb through the wiretapped data (see January 16, 2004). The release reads in part: “Based on my understanding of the connections and equipment at issue, it appears the NSA is capable of conducting what amounts to vacuum-cleaner surveillance of all the data crossing the Internet—whether that be people’s email, Web surfing, or any other data. Given the public debate about the constitutionality of the Bush administration’s spying on US citizens without obtaining a FISA warrant (see December 18, 2005, December 20, 2005, December 21, 2005, December 21, 2005, December 25, 2005, January 5, 2006, January 10, 2006, January 18, 2006, January 18, 2006, and January 31, 2006), I think it is critical that this information be brought out into the open, and that the American people be told the truth about the extent of the administration’s warrantless surveillance practices, particularly as it relates to the Internet. Despite what we are hearing (see December 19, 2005, December 19, 2005, December 21-22, 2005, and January 19, 2006), and considering the public track record of this administration (see December 24, 2005, Early 2006, January 23, 2006, January 25-26, 2006, and February 2, 2006), I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” Klein issues the press release in part to give himself some publicity, and the protection from government harassment such publicity might entail (see February 11, 2006 and After). [Wired News, 4/7/2006; Wired News, 4/7/2006; Klein, 2009, pp. 66-67]

Entity Tags: Electronic Frontier Foundation, AT&T, Bush administration (43), National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

The New York Times publishes its first report on the allegations by former AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), who is providing evidence and documentation to the Electronic Frontier Foundation (EFF) for that organization’s lawsuit against AT&T (see December 31, 2005 and January 31, 2006). The three-paragraph squib, buried deep in the pages of the “A” section, says that AT&T “cooperated with the National Security Agency in 2003 to install equipment capable of ‘vacuum-cleaner surveillance’ of email messages and other Internet traffic.” The report is based in part on a recent press release issued by Klein (see April 6, 2006), and notes the EFF lawsuit in passing. It admits that Klein has provided some of the documentation to the press, if not to the Times itself (see Mid-February - Late March, 2006), but simply writes that Klein’s documents “describe a room at the AT&T Internet and telephone hub in San Francisco that contained a piece of equipment that could sift through large volumes of Internet traffic.” Klein later calls the brevity and incompleteness of the report “puzzling,” and will say, “Their only purpose seemed to be to signal the government that I had ‘provided’ the New York Times with the documents, while minimizing the story for everyone else.” Klein will speculate, “It looked like some kind of backroom brawl was going on, but the public could not know the details.” [New York Times, 4/7/2006; Klein, 2009, pp. 70] A week later, the Times will publish a more in-depth article (see April 12, 2006).

Entity Tags: Mark Klein, AT&T, Electronic Frontier Foundation, New York Times, National Security Agency

Timeline Tags: Civil Liberties

Mushin Musa Matwalli Atwah.Mushin Musa Matwalli Atwah. [Source: FBI]Mohsin Musa Matawalli Atwah, an Egyptian al-Qaeda operative, is killed in a remote village in the North Waziristan region of Pakistan. There was a $5 million bountry for Atwah, who was wanted for involvement in the 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). Witnesses describe a missile strike followed by a Pakistani helicopter gunship attack. The attack is said to have killed nine people, including two young children. [Associated Press, 4/13/2006; CNN, 10/24/2006]

Entity Tags: Mushin Musa Matwalli Atwah

Timeline Tags: Complete 911 Timeline

The Justice Department announces that it is invoking the “state secrets” clause to prevent a lawsuit by the Electronic Frontier Foundation (EFF) against AT&T from going forward (see March 9, 1953 and January 31, 2006). The EFF is suing AT&T for compromising its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s domestic surveillance program. The government alleges that the lawsuit would reveal “state secrets” critical to “national security” if it continues. The Justice Department makes its initial filing in mid-May (see May 13, 2006). [US District Court, Northern District of California, 4/28/2006 pdf file; Klein, 2009, pp. 71]

Entity Tags: Electronic Frontier Foundation, AT&T, National Security Agency, US Department of Justice

Timeline Tags: Civil Liberties

President Bush personally intervenes in a Justice Department attempt to investigate the NSA’s domestic surveillance program (see May 9, 2006), refusing to grant the Justice Department’s investigators routine security clearances so they can proceed with the investigation. Bush’s intervention is later admitted by Attorney General Alberto Gonzales in testimony before the Senate Judiciary Committee on July 18, 2006. Bush’s action to block the granting of clearances to the Justice Department’s Office of Professional Responsibility (OPR) is unprecedented, and astonishes many legal experts. As a result of his decision, the OPR has no choice but to drop the investigation (see May 9, 2006). The OPR investigation would not have determined whether the surveillance program was illegal or unconstitutional; rather, the office would have investigated “allegations of misconduct involving department attorneys that relate to the exercise of their authority to investigate, litigate, or provide legal advice,” according to the office’s policies and procedures. [Associated Press, 5/11/2006; USA Today, 7/18/2006; Washington Post, 7/19/2006; National Journal, 3/15/2007]
Stopping Gonzales from Being Investigated - The press later learns that had the probe gone forward, Gonzales himself would have been a prime target of inquiry. It is unclear if Bush knows the OPR investigation would have focused on Gonzales. The probe would have focused on Gonzales’s role in authorizing the eavesdropping program while he was White House counsel, as well as his subsequent oversight of the program as attorney general. Before Bush shuts down the probe, OPR investigators were preparing to question two crucial witnesses—Jack Goldsmith, the former chief of the Justice Department’s Office of Legal Counsel, and James A. Baker, the counsel for the department’s Office of Intelligence Policy and Review. Both Goldsmith and Baker had raised questions about the propriety and legality of numerous aspects of the wiretapping program. The OPR would have also examined documents detailing Gonzales’s participation in the program. [National Journal, 3/15/2007]
OPR Chief Counsel Protests Decision - Upon Gonzales’s admission of Bush’s action, OPR chief counsel H. Marshall Jarrett responds: “Since its creation some 31 years ago, OPR has conducted many highly sensitive investigations involving executive branch programs and has obtained access to information classified at the highest levels. In all those years, OPR has never been prevented from initiating or pursuing an investigation.” Jarrett notes in other memos that clearances had previously been granted to lawyers and agents from the Justice Department and the FBI who were assigned to investigate the original leak of the NSA program’s existence to the media. He also writes that numerous other investigators and officials, including members of Congress and the members of a federal civil liberties board, had been granted access to or been briefed on the program. On March 21, he will write to Gonzales’s deputy, “In contrast, our repeated requests for access to classified information about the NSA program have not been granted.” Gonzales will defend the president’s decicion by saying, in a letter to Judiciary Committee Chairman Arlen Specter (R-PA), that Bush “decided that protecting the secrecy and security of the program requires that a strict limit be placed on the number of persons granted access to information about the program for non-operational reasons. Every additional security clearance that is granted for the [program] increases the risk that national security might be compromised.” In other words, granting the OPR investigators routine security clearances, as has been done countless times in the last three decades as well as in the instances noted by Jarrett, would have jeopardized national security, according to Gonzales’s reasoning. [Associated Press, 5/11/2006; USA Today, 7/18/2006; Washington Post, 7/19/2006] “It is very difficult to understand why OPR was not given clearance so they could conduct their investigation,” Specter will say. “Many other lawyers in the Department of Justice had clearance.” [Boston Globe, 7/19/2006]
OPR Investigators Seeking Information Already in Justice Department's Possession - The questions surrounding the refusal to grant security clearances deepen when it is learned that the OPR investigators were only seeking information and documents relating to the NSA’s surveillance program that were already in the Justice Department’s possession, according to two senior government officials. The only classified information that OPR investigators were seeking was what had already been given to former Attorney General John Ashcroft, Gonzales, and other department attorneys in their original approval and advice on the program, the two senior government officials say. OPR’s request was limited to documents such as internal Justice Department communications and legal opinions, and didn’t extend to secrets that are the sole domain of other agencies. [National Journal, 5/29/2006]
OPR No; Private Citizens Yes - Jarrett will also note in his March 21 letter that, while Bush refused security clearances to OPR investigators, five “private individuals” who serve on Bush’s “Privacy and Civil Liberties Oversight Board have been briefed on the NSA program and have been granted authorization to receive the clearances in question.” Private citizens, especially those who serve only part-time on governmental panels, have traditionally been considered higher security risks than full-time government employees, who can lose their jobs or even be prosecuted for leaking to the press. Jarrett says that in contrast to the private individuals on Bush’s advisory board, OPR’s “repeated requests for access to classified information about the NSA have not been granted. As a result, this office, which is charged with monitoring the integrity of the department’s attorneys and with ensuring that the highest standards of professional ethics are maintained, has been precluded from performing its duties.” Michael Shaheen, who headed the OPR from its inception until 1997, will say that his staff “never, ever was denied a clearance” and that OPR under his leadership had conducted numerous investigations involving the activities of various attorneys general. “No attorney general has ever said no to me,” Shaheen says. [National Journal, 7/18/2006]
Inquiry Opened - The Justice Department’s inspector general, Glenn Fine, will open a preliminary inquiry into how the FBI has used the NSA’s surveillance data, which has often been obtained without judicial warrants and is considered by many legal experts to be illegal. Representative Maurice Hinchey (D-NY), who led the Congressional calls for an investigation of the NSA, says Bush’s decision is an example of “an administration that thinks it doesn’t have to follow the law.” [Washington Post, 7/19/2006] “We can’t have a president acting in a dictatorial fashion,” he says. [USA Today, 7/18/2006]
'Abusing' Their Offices? - Bruce Fein, a Republican constitutional lawyer who served in Ronald Reagan’s Justice Department, compares Gonzales unfavorably to Elliot Richardson, who resigned in 1973 rather than obey then-President Nixon’s order to fire Watergate special prosecutor Archibald Cox. “If he was like Elliot Richardson, he’d say, ‘Mr. President, I quit,’” Fein observes. [Think Progress, 7/18/2006; Washington Post, 7/19/2006] In 2007, law professor and legal ethics expert Charles Wolfram will say that if Gonzales did not inform the president that he might be a target of the OPR investigation, then he ill-served Bush and abused “the discretion of his office” for his own benefit. However, Wolfram will continue, if Gonzales did inform Bush that the probe might harm Gonzales, then “both [men] are abusing the discretion of their offices.” [National Journal, 3/15/2007]
Defending Bush's Decision - Bush officials dismiss the attempted investigation, and the criticisms by Fein, Hinchey, and others, as politically motivated. White House press secretary Tony Snow says the NSA wiretapping program is adequately supervised by internal oversight procedures, including periodic reviews by Gonzales. [Think Progress, 7/18/2006; Washington Post, 7/19/2006] “The Office of Professional Responsibility was not the proper venue for conducting that,” Snow says. He adds that Bush’s denial of the security clearances is warranted because “in the case of a highly classified program, you need to keep the number of people to it tight for reasons of national security, and that was what he did.” [National Journal, 3/15/2007]

Entity Tags: Maurice Hinchey, John Ashcroft, James Baker, Michael Shaheen, US Department of Justice, Office of Professional Responsibility, National Security Agency, Ronald Reagan, Jack Goldsmith, H. Marshall Jarrett, Elliot Richardson, George W. Bush, Alberto R. Gonzales, Archibald Cox, Glenn Fine, Arlen Specter, Charles Wolfram, Bruce Fein, Federal Bureau of Investigation, Senate Judiciary Committee, Tony Snow

Timeline Tags: Civil Liberties

A simulation of waterboarding arranged by ABC News.A simulation of waterboarding arranged by ABC News. [Source: ABC News]According to an ABC News report in September 2007, CIA Director Michael Hayden bans the use of waterboarding some time in 2006, with the approval of the White House. It is not known when exactly the technique is banned that year, but presumably it takes place after Hayden becomes CIA director (see May 5, 2006) and in response to the Supreme Court decision mandating that terror suspects must be given treatment consistent with the Geneva Conventions (see July 12, 2006). Waterboarding is a harsh interrogation technique that simulates drowning and is usually referred to as torture. Allegedly, the CIA last used waterboarding in 2003 on Khalid Shaikh Mohammed and “It is believed that waterboarding was used on fewer than five ‘high-value’ terrorist subjects” (see May 2002-2003). John Sifton of Human Rights Watch later says the ban “a good thing, but the fact remains that the entire [CIA interrogation] program is illegal.” [ABC News, 9/14/2007] Over a year before Hayden’s decision, Justice Department official Daniel Levin had himself subjected to simulated waterboarding to help him determine if waterboarding was indeed torture (see Late 2004-Early 2005). Levin intended to issue a memo condemning the practice as beyond the bounds of the law, but was forced out of the Justice Department before he could make that ruling.

Entity Tags: Daniel Levin, US Supreme Court, US Department of Justice, White House, Central Intelligence Agency, John Sifton, Khalid Shaikh Mohammed, Michael Hayden, Geneva Conventions

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

President George Bush issues a memo granting the Director of National Intelligence (DNI) the authority to authorize a corporation to conceal any of its activities related to national security under United States Code 15 USC 78m(b)(3)(A). [US Code Title 15,78m; George W. Bush, 5/5/2006] The memo follows recent allegations that telecommunications firms AT&T, BellSouth, and Verizon have all provided records of US citizens’ telephone communications to the National Security Agency as part of the NSA’s warrantless surveillance program (see October 2001 and February 5, 2006). Almost two months later, Representative Jan Schakowsky (D-IL) learns of the memo and demands an explanation from DNI John Negroponte. Schakowsky will write in part: “I am concerned about this new authority because under it, the DNI does not need to seek any permission from the president or Congress to issue such directives and there is minimal oversight once the directive is given. In fact, it is my understanding that since the DNI is only required to report on directives ‘active’ on the annual October 1st reporting date, the DNI could in fact cover up all directives by having them expire on September 30th of the reporting year. I believe that such expansive authority coupled with lax oversight could lead to the misuse of the power, the over-issuing of directives, and the hiding of activities that could be unconstitutional and violations of citizens’ civil liberties. For instance, I believe that such directives could have been issued to the major telecommunications firms concerning the sharing of phone call records with the National Security Agency without citizens’ knowledge or consent.” Schakowsky asks if there was “a particular corporate activity that the DNI or another believed warranted such protection from disclosure and liability,” how many such directives his office has issued since he was granted such authority, whether any such directives were retroactive, how it is determined that “national security” matters are at stake and who makes such determinations, and whether directives telecommunications firms provide citizens’ phone records without their knowledge or consent are being “covered up.” Negroponte’s reply to Schakowsky, if any, is not known. [Jan Schakowsky, 6/27/2006]

Entity Tags: National Security Agency, Verizon Communications, John Negroponte, George W. Bush, BellSouth, Jan Schakowsky, AT&T

Timeline Tags: Civil Liberties

Zacarias Moussaoui on his way to the Supermax prison.Zacarias Moussaoui on his way to the Supermax prison. [Source: WNBC / Jonathan Deinst]Zacarias Moussaoui is sentenced to life in prison for his role in the 9/11 attacks. A jury sentences him to six consecutive life terms without the possibility of parole. A single juror votes against the death penalty for one of the three counts for which Moussaoui is eligible to receive the death sentence (see March 6-May 4, 2006). For the other two counts, the vote is 10-2. According to the foreman of the jury, the lone dissenter did not identify his or herself to the other jurors during deliberations and consequently they could not discuss the person’s reasons for opposing the death penalty. “But there was no yelling. It was as if a heavy cloud of doom had fallen over the deliberation room, and many of us realized that all our beliefs and our conclusions were being vetoed by one person,” the foreman explains to the Washington Post. “We tried to discuss the pros and cons. But I would have to say that most of the arguments we heard around the deliberation table were [in favor of the death penalty]… Our sense was this was a done deal for that person and whoever that person is, they were consistent from the first day and their point of view didn’t change.” [Washington Post, 5/12/2006] As a result of the vote, Moussaoui will not be executed and instead will serve six life sentences at the Supermax prison in Florence, Colorado. A day after the sentencing, on May 5, Moussaoui files a motion to withdraw his guilty plea. He says that his March 27 testimony that he was supposed to have hijacked a fifth plane on September 11 and fly it into the White House “was a complete fabrication.” At sentencing the judge told him, “You do not have a right to appeal your convictions, as was explained to you when you plead guilty. You waived that right.” [Associated Press, 5/8/2006]

Entity Tags: Zacarias Moussaoui

Timeline Tags: Torture of US Captives, Complete 911 Timeline, 9/11 Timeline

Maurice Hinchey.Maurice Hinchey. [Source: Washington Post]A Justice Department investigation into the National Security Agency’s warrantless wiretapping program ends before it begins, because the NSA will not grant Justice Department lawyers routine security clearances. The investigation had been opened in February 2006 (see February 2, 2006) when Representative Maurice Hinchey (D-NY) asked the Justice Department’s Office of Professional Responsibility (OPR) to investigate the NSA’s warrantless surveillance of US citizens (see After September 11, 2001). Without security clearances, investigators could not examine NSA lawyers’ role in the program. OPR counsel H. Marshall Jarrett writes in a letter to Hinchey: “We have been unable to make any meaningful progress in our investigation because OPR has been denied security clearances for access to information about the NSA program. Without these clearances, we cannot investigate this matter and therefore have closed our investigation.” Jarrett and his office have made routine requests for security clearances since January, to no avail. The OPR’s investigation would have focused strictly on whether Justice Department lawyers violated ethical rules, and would not have examined the entire NSA program. Hinchey says, “This administration thinks they can just violate any law they want, and they’ve created a culture of fear to try to get away with that.” [Associated Press, 5/11/2006] Hinchey writes to Jarrett, regarding the failure to grant clearances: “We are perplexed and cannot make sense of your denial of these security clearances. Our request did not ask OPR to give us the intricate details of the NSA program; we understand that such a request would not even be within OPR’s jurisdiction. There appear to be no reasonable grounds for blocking this investigation. Not only does your denial of their request for a security clearance not make sense, it is unprecedented.” Hinchey will try, and fail, to get a bill through the Republican-controlled House Judiciary Committee to force the White House, Justice Department, and Defense Department to turn over to Congress all documents related to the closure of the OPR probe. He will write in a letter to President Bush, “If the NSA program is justified and legal, as you yourself have indicated, then there is no reason to prevent this investigation from continuing.” [US House of Representatives, 7/18/2006] In June 2006, it will be revealed that Bush personally made the decision not to grant the OPR investigators security clearances (see Late April 2006).

Entity Tags: Office of Professional Responsibility, Maurice Hinchey, US Department of Justice, George W. Bush, H. Marshall Jarrett, National Security Agency

Timeline Tags: Civil Liberties

USA Today headline.USA Today headline. [Source: CBS News]USA Today reports that “[t]he National Security Agency (NSA) has been secretly collecting the phone call records of tens of millions of Americans, using data provided by the nation’s three biggest telecommunications providers, AT&T, Verizon, and BellSouth,” according to “people with direct knowledge of the arrangement.” None of the sources would allow USA Today to identify them by name, job, or affiliation. The USA Today story claims that the NSA program “does not involve the NSA listening to or recording conversations,” but does use “the data to analyze calling patterns in an effort to detect terrorist activity,” according to their sources. One source says that the NSA program is compiling “the largest database ever assembled in the world,” with the goal of creating “a database of every call ever made” within US borders. President Bush has said that the NSA program is focused exclusively on international calls, and for the calls to be recorded, “one end of the communication must be outside the United States.” However, this is now shown not to be the case (see January 16, 2004). A US intelligence official says that the NSA program is not recording the actual phone calls themselves, but is collecting what he calls “external” data about the communications to allow the agency to emply “social network analysis” for insight into how terrorist networks are connected with one another. Another large telecommunications company, Qwest, has refused to help the NSA eavesdrop on customer calls (see February 2001, February 2001 and Beyond, and February 27, 2001). USA Today’s sources say that the NSA eavesdropping program began after the 9/11 attacks, a claim that is not bolstered by the facts (see 1997, February 27, 2000, February 27, 2000, December 2000, February 2001, February 2001, February 2001 and Beyond, February 2001, Spring 2001, April 2001, April 4, 2001, July 2001, Before September 11, 2001, and Early 2002). The sources say that the three companies agreed to provide “call-detail records,” lists of their customers’ calling histories, and updates, which would allow the agency to track citizens’ calling habits. In return, the sources say, the NSA offered to pay the firms for their cooperation. After the three firms agreed to help the agency, USA Today writes, “the NSA’s domestic program began in earnest” (see After September 11, 2001, After September 11, 2001, October 2001, September 2002, and Spring 2004). NSA spokesman Don Weber says the agency is operating strictly “within the law,” but otherwise refuses to comment. Former US prosecutor Paul Butler says that the Foreign Intelligence Surveillance Act (FISA), which governs surveillance operations by US intelligence agencies, “does not prohibit the government from doing data mining” (see 1978). White House press spokesman Dana Perino says, “There is no domestic surveillance without court approval,” and all surveillance activities undertaken by government agencies “are lawful, necessary, and required for the pursuit of al-Qaeda and affiliated terrorists.” All government-sponsored intelligence activities “are carefully reviewed and monitored,” she adds, and says that “all appropriate members of Congress have been briefed on the intelligence efforts of the United States” (see October 11, 2001 and October 25, 2001 and November 14, 2001). Don Weber, a senior spokesman for the NSA, refuses to discuss the agency’s operations, saying: “Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues; therefore, we have no information to provide. However, it is important to note that NSA takes its legal responsibilities seriously and operates within the law.” All three firms released similar comments saying that they would not discuss “matters of national security,” but were complying with the law in their alleged cooperation with the NSA. The Electronic Frontier Foundation (EFF) is suing AT&T for what it calls its complicity in the NSA’s “illegal” domestic surveillance program (see January 31, 2006). [USA Today, 5/11/2006]

Entity Tags: Verizon Communications, USA Today, Qwest, Paul Butler, Foreign Intelligence Surveillance Act, Jane Harman, AT&T, BellSouth, National Security Agency, Dana Perino, Don Weber

Timeline Tags: Civil Liberties

Bobby Ray Inman.Bobby Ray Inman. [Source: DefenseTech.org]Former NSA director Bobby Ray Inman says that the secret NSA program to wiretap US citizens’ phone and e-mail conversations without court warrants (see After September 11, 2001) “is not authorized.” President Bush authorized the secret wiretapping over four years ago (see Early 2002), a program only revealed at the end of 2005 (see December 15, 2005). Since the program was revealed, it has created tremendous controversy over its possible illegality and its encroachment on fundamental American civil liberties. Bush and other White House officials have repeatedly asserted that the program is legal, mainly because Bush and his officials assert that the president has the authority to implement such a program (see December 15, 2005); Bush also insists, as recently as the day before Inman’s statement, that the program is only being used to spy on terrorists and the privacy of US citizens is being “fiercely protected,” a statement that does not jibe with the facts. [Democracy Now!, 5/12/2006]

Entity Tags: National Security Agency, Al-Qaeda, Bobby Ray Inman, Bush administration (43), George W. Bush

Timeline Tags: Civil Liberties

The Justice Department files a brief with the US District Court of Northern California asking that the Electronic Frontier Foundation (EFF)‘s lawsuit against AT&T (see January 31, 2006) be dismissed on the grounds that it would breach “state secrets” vital to “national security.” The Justice Department publicly announced its intentions of asking that the lawsuit be dismissed on those grounds two weeks ago (see April 28, 2006). EFF is suing AT&T for compromising its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s domestic surveillance program. The lawsuit is Hepting, et al v. AT&T, often shortened in the media to Hepting v. AT&T. The government submits a number of secret documents to Judge Vaughn Walker as evidence, along with a heavily redacted document submitted for public perusal. Other documents include affidavits from the Director of National Intelligence, John Negroponte, and the head of the NSA, Lieutenant General Keith Alexander. Some observers believe that Walker, a conservative appointed to the bench by President George H.W. Bush, will quickly comply with the government’s request. However, as AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009), who is working with EFF on the lawsuit (see Early January 2006), will later write, Vaughn is independent-minded and possessed of a “strong libertarian bent,” and will not be so prone to do the government’s bidding as some believe. [Klein, 2009, pp. 72-73] Walker’s first hearing on the brief will be held four days later (see May 17, 2006).

Entity Tags: John Negroponte, AT&T, Electronic Frontier Foundation, Keith Alexander, Mark Klein, US Department of Justice, Vaughn Walker, National Security Agency

Timeline Tags: Civil Liberties

Judge Vaughn Walker of the US District Court of Northern California holds a hearing on the government’s request to have the Electronic Frontier Foundation (EFF)‘s lawsuit against AT&T dismissed (see May 13, 2006). The Justice Department says the lawsuit must be dismissed on the grounds that it would breach “state secrets” vital to “national security” if allowed to go forward. EFF is suing AT&T for compromising its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s domestic surveillance program (see January 31, 2006). AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009), who is working with EFF on the lawsuit (see Early January 2006), attends the hearing along with a small phalanx of lawyers; a woman slips a piece of paper into his hand containing her name and the telephone number for CBS News’s 60 Minutes. The AT&T lawyers are furious at Klein because an online news site, Wired News, just published his 2005 memo containing evidence against AT&T that the firm wants suppressed (see May 17, 2006). Klein will later write that he has no knowledge of how Wired News received the document, though the AT&T lawyers believe he supplied it to Wired News, and he will say he is pleased at the publication. (Wired News will later explain why it chose to publish the document—see May 22, 2006.) In the hearing, Walker refuses to order Klein to return the documents to AT&T, noting that Klein is not a plaintiff in the case and therefore Walker lacks the judicial authority to make such an order. Walker advises AT&T if it wants the documents back, it will have to sue Klein for their return. EFF lawyer Cindy Cohn challenges the government’s claim that the lawsuit should be dismissed on “state secrets” grounds, arguing that “this can be litigated without reference to any state secrets.… The question is whether the information has been acquired by AT&T in order to give it to the government and whether it’s been divulged to the government and what the government does with that information afterward, which I think could implicate state secrets, is completely irrelevant, or not necessary for us to pursue this case.” The motion to dismiss is not decided in this hearing. [Klein, 2009, pp. 73-78]

Entity Tags: US Department of Justice, AT&T, Cindy Cohn, Mark Klein, Electronic Frontier Foundation, Vaughn Walker, National Security Agency, Wired News

Timeline Tags: Civil Liberties

The lawsuit brought forth by Khalid el-Masri and the ACLU (see December 6, 2005) is dismissed by US District Judge T.S. Ellis III in Alexandria, who rules that the state secrets privilege (see March 9, 1953) was properly invoked by the US Justice Department. The judge argues that Masri’s “private interests must give way to the national interest in preserving state secrets.” [Washington Post, 5/19/2006]

Entity Tags: American Civil Liberties Union, Central Intelligence Agency, T.S. Ellis III, Khalid el-Masri

Timeline Tags: Torture of US Captives, Civil Liberties

Attorney General Alberto Gonzales says that the government has the right to prosecute journalists for publishing classified information. “There are some statutes on the book which, if you read the language carefully, would seem to indicate that that is a possibility,” he says during an ABC News interview. “That’s a policy judgment by the Congress in passing that kind of legislation. We have an obligation to enforce those laws. We have an obligation to ensure that our national security is protected.” Asked if he is considering prosecuting the New York Times for revealing the Bush administration’s warrantless wiretapping program (see December 15, 2005), Gonzales says the Justice Department is trying to determine “the appropriate course of action in that particular case.” He continues: “I’m not going to talk about it specifically. We have an obligation to enforce the law and to prosecute those who engage in criminal activity.” Experts believe that Gonzales is probably referring to the 1917 Espionage Act, which prohibits government officials from passing classified information to anyone without proper clearance; those same experts say that the Espionage Act was never intended to apply to the press. Furthermore, journalists are protected from such prosecution by the First Amendment. Gonzales says that while the Bush administration respects the right of freedom of the press, “it can’t be the case that that right trumps over the right that Americans would like to see, the ability of the federal government to go after criminal activity.” [New York Times, 5/22/2006] Thirty years ago, then-White House chief of staff Dick Cheney recommended such prosecution against a journalist who revealed the existence of a Cold War-era submarine program (see May 25, 1975). In 2007, reporter and author Charlie Savage will write that in 1975, the attorney general had scuttled the idea. Now, the attorney general is embracing the idea. [Savage, 2007, pp. 175-176]

Entity Tags: US Department of Justice, Alberto R. Gonzales, Bush administration (43), New York Times, Charlie Savage, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

Wired News logo.Wired News logo. [Source: Delve Networks]Evan Hansen, the editor in chief of Wired News, an online technical news site, explains why the site published a set of documents from AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009). Klein is working with the Electronic Frontier Foundation (EFF) in that organization’s lawsuit against AT&T for invading its customers’ privacy by taking part in the National Security Agency’s warrantless domestic wiretap operation (see January 31, 2006). The presiding judge, Vaughn Walker, has denied requests from the EFF and a number of news organizations to unseal the documents and make them public. For its part, AT&T wants the documents to remain sealed, claiming they are proprietary and that it would suffer harm if they were disclosed (see April 6-8, 2006). Hansen and the Wired News senior staff disagree. “In addition,” Hansen writes, “we believe the public’s right to know the full facts in this case outweighs AT&T’s claims to secrecy.” Hansen erroneously says that the documents seem “to be excerpted from material that was later filed in the lawsuit under seal,” though “we can’t be entirely sure, because the protective order prevents us from comparing the two sets of documents.” Klein later writes that the Wired News staff “confused my 2004 memo (see January 16, 2004) with my court-sealed legal declaration” (see February 23-28, 2006); even so, Klein will write, “it was true that all of the AT&T documents were still under court seal.” Hansen says Wired News reporter Ryan Singel received the Klein documents from “an anonymous source close to the litigation.” Hansen also writes: “We are filing a motion to intervene in the case in order to request that the court unseal the evidence, joining other news and civil rights organizations that have already done so, including the EFF, the San Francisco Chronicle, the Los Angeles Times, the San Jose Mercury News, the Associated Press, and Bloomberg. Before publishing these documents we showed them to independent security experts, who agreed they pose no significant danger to AT&T. For example, they do not reveal information that hackers might use to easily attack the company’s systems.” Hansen writes that Wired’s publication of the documents does not violate Walker’s gag order concerning the documents’ publication, as the order specifically bars the EFF and its representatives—and no one else—from publishing or discussing them. “The court explicitly rejected AT&T’s motion to include Klein in the gag order and declined AT&T’s request to force the EFF to return the documents,” he notes (see May 17, 2006). [Wired News, 5/22/2006; Klein, 2009, pp. 75]

Entity Tags: Vaughn Walker, AT&T, Electronic Frontier Foundation, Evan Hansen, Mark Klein, Ryan Singel, Wired News, National Security Agency

Timeline Tags: Civil Liberties

A new 5-minute audiotape is released by a person said to be Osama bin Laden. The voice on the tape says that Zacarias Moussaoui and the vast majority of prisoners held in Guantanamo Bay had nothing to do with 9/11. The speaker says that Moussaoui “has no connection whatsoever with the events of September 11th” and “his confession that he was assigned to participate in those raids is a false confession which no intelligent person doubts is a result of the pressure put upon him for the past four and a half years.” The voice also says that, as Moussaoui has not named a support team, he cannot have been slated to pilot a hijacked airliner, and that, as he was learning to fly, he cannot have been intended to be the 20th hijacker. Further, if Moussaoui had known the 9/11 group, he would have called lead hijacker Mohamed Atta and told him to flee the country (note: jail house calls can be recorded, so this may not have been wise (see August 17, 2001)). There are various theories about Moussaoui’s closeness to the 9/11 plot, but he was supported by some of the people who supported the hijackers (see January 30, 2003). The speaker also says that the detainees in Guantanamo Bay “have no connection whatsoever to the events of September 11th, and even stranger is that many of them have no connection with al-Qaeda in the first place, and even more amazing is that some of them oppose al-Qaeda’s methodology of calling for war with America.” The apparent reason so many detainees are being held: ”(I)t is necessary to create justifications for the massive spending of hundreds of billions on the Defense Department and other agencies in their war against the Mujaheddin.” [MSNBC, 5/23/2006] One Guantanamo detainee, Mohamed al-Khatani, was allegedly supposed to meet lead hijacker Mohamed Atta in the US, but was refused entry to the country, indicating that he was scheduled to be involved in 9/11 (see August 4, 2001 and July 2002).

Entity Tags: Osama bin Laden, Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

AT&T lawyers accidentally release sensitive information in their defense of a lawsuit accusing AT&T and two other telecommunications firms of illegally cooperating with an NSA wiretapping program (see January 31, 2006). They release a 25-page legal brief, heavily redacted with thick black lines intended to obscure portions of three pages, in PDF (Portable Data File) format. But some software programs can read the text. The redacted information offers alternative reasons why AT&T has a secret room in its downtown San Francisco switching center designed to monitor Internet and telephone traffic (see February 2001). The Electronic Frontier Foundation, who filed the lawsuit, says the room is used by the NSA surveillance program. The redacted sections argue that the room could be used for “legitimate Internet monitoring systems, such as those used to detect viruses and stop hackers.” Another argument reads, “Although the plaintiffs ominously refer to the equipment as the ‘Surveillance Configuration,’ the same physical equipment could be utilized exclusively for other surveillance in full compliance with” the Foreign Intelligence Surveillance Act (FISA). The court filing is not classified, and no information relating to the actual operations of the NSA’s surveillance program is disclosed. [US District Court, Northern District of California, San Francisco Division, 5/24/2006 pdf file; US District Court, Northern District of California, San Francisco Division, 5/24/2006; CNET News, 5/26/2006]

Entity Tags: National Security Agency, Electronic Frontier Foundation, AT&T

Timeline Tags: Civil Liberties

The Bush administration submits a legal brief arguing that the Electronic Frontier Foundation’s lawsuit against AT&T, alleging that firm cooperated with the NSA’s domestic surveillance program (see January 31, 2006), should be thrown out of court because of the government’s “state secrets” privilege (see March 9, 1953). Justice Department lawyers want Judge Vaughn Walker to examine classified documents that they say will convince him to dismiss the lawsuit. However, the government does not want the defense lawyers to see that material. “No aspect of this case can be litigated without disclosing state secrets,” the government argues. “The United States has not lightly invoked the state secrets privilege, and the weighty reasons for asserting the privilege are apparent from the classified material submitted in support of its assertion.” [CNET News, 5/26/2006]

Entity Tags: US Department of Justice, Electronic Frontier Foundation, AT&T, Vaughn Walker, Bush administration (43)

Timeline Tags: Civil Liberties

George Terwilliger, a former deputy attorney general under George H. W. Bush, argues that the current Bush administration’s controversial data mining program (see Late 1999 and After September 11, 2001) is not illegal. Terwilliger tells the conservative National Review, “I think it’s fair to say that the statutes contemplate the transfer of this generic type of data much more on a case-by-case rather than a wholesale basis,” meaning that the law calls for a court order only in cases when the government is making a targeted request for information. But, he adds, “I don’t see anything in the statute that forbids such a wholesale turnover.” Terwilliger’s argument echoes the arguments of the Bush Justice Department, which argues that the data mining program—part of the NSA’s “Stellar Wind” surveillance program (see Spring 2004 and December 15, 2005)—does not technically constitute “electronic surveillance” under the law. Both the Fourth Amendment and the Foreign Intelligence Surveillance Act, as interpreted by the courts, define such actions as “electronic surveillance,” according to a number of legal experts, including law professor Orin Kerr. And, Ars Technica reporter Julian Sanchez notes in 2009, “the Stored Communications Act explicitly makes it a crime to ‘knowingly divulge a record or other information pertaining to a subscriber to or customer of such service… to any governmental entity.’” Sanchez will call Terwilliger’s argument “very strange,” but will note that Terwilliger is the attorney for then-Attorney General Alberto Gonzales and “a prominent defender of the administration’s surveillance policies.” Sanchez will conclude that while the argument “might pass for clever in a high school debate round… [i]t would be deeply unsettling if it [passes] for anything more in the halls of power.” [National Review, 6/5/2006; Ars Technica, 12/16/2008]

Entity Tags: US Department of Justice, Alberto R. Gonzales, ’Stellar Wind’, Bush administration (43), National Security Agency, Foreign Intelligence Surveillance Act, Julian Sanchez, George Terwilliger, Orin S. Kerr

Timeline Tags: Civil Liberties

The dead Abu Musab al-Zarqawi.The dead Abu Musab al-Zarqawi. [Source: US army]Abu Musab al-Zarqawi, the supposed leader of al-Qaeda in Iraq, is apparently killed in a US airstrike north of Baghdad. There are contradictory details of what exactly happened in the airstrike, and three days later the Washington Post will report that “circumstances surrounding the killing [remain] cloudy.” [Washington Post, 6/10/2006] His killing is hailed by US and Iraqi officials as the most significant public triumph for US-allied forces since the 2003 capture of Saddam Hussein. For instance, Defense Secretary Rumsfeld calls him “the leading terrorist in Iraq and one of three senior al-Qaeda leaders worldwide.” The Washington Post calls al-Zarqawi the “mastermind behind hundreds of bombings, kidnappings and beheadings in Iraq.” [Washington Post, 6/8/2006; Washington Post, 6/10/2006] These pronouncements and media reports ignore a revelation made two months earlier by the Washington Post that the US military has been engaged in a propaganda campaign to exaggerate al-Zarqawi’s importance. The newspaper had reported that Zarqawi wasn’t behind nearly as many attacks as commonly reported (see October 4, 2004 and April 10, 2006). Even a Washington Post article about the propaganda surrounding al-Zarqawi published two days after his death will fail to mention any of the details provided in the Post’s original reporting on the campaign. [Washington Post, 6/10/2006] Later in the month, an audiotape surfaces in which bin Laden supposedly praises al-Zarqawi as a martyr (see June 30, 2006), calling him a “brave knight” and a “lion of jihad.” US officials say the tape is genuine, however it should be noted that a letter from 2004 said to tie al-Zarqawi to al-Qaeda leadership is believed by many experts to be a US-government promoted hoax (see April 10, 2006). [Washington Post, 6/30/2006] Al-Zarqawi did pledge loyalty to bin Laden in 2004, but they don’t appear to have been closely linked before then and there even are doubts about how close their relationship was after that time (see October 17, 2004).

Entity Tags: Al-Qaeda, Abu Musab al-Zarqawi, Donald Rumsfeld, Osama bin Laden

Timeline Tags: Complete 911 Timeline, Iraq under US Occupation

Vinton Cerf.Vinton Cerf. [Source: Ipswitch.com]The Information Technology Association of America, an information technology (IT) trade association, presents a paper authored by Internet founder Vinton Cerf and others which notes that the new capabilities of electronic surveillance of Internet, cellular communications, and voice-over internet protocols (VoIP) by US government and law enforcement officials under CALEA (see January 1, 1995) is inherently dangerous for fundamental civil liberties as well as technological innovation. (CALEA mandates that US telecommunications providers such as AT&T give US law enforcement agencies and intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks.) Cerf and his colleagues write, “In order to extend authorized interception much beyond the easy scenario, it is necessary either to eliminate the flexibility that Internet communications allow, or else introduce serious security risks to domestic VoIP implementations. The former would have significant negative effects on US ability to innovate, while the latter is simply dangerous. The current FBI and FCC direction on CALEA applied to VoIP carries great risks.” In order to implement the mandates of CALEA, the authors write, the nation’s electronic communications systems will become inherently less secure from hackers and others seeking to eavesdrop or disrupt communications, innocent citizens will not be secure from possibly illegal surveillance by law enforcement or intelligence agencies, and the nation’s communications systems will face near-insurmountable technological hurdles that will make it difficult for US telecommunications and Internet providers to continue to innovate and improve services. They conclude, “The real cost of a poorly conceived ‘packet CALEA’ requirement would be the destruction of American leadership in the world of telecommunications and the services built on them. This would cause enormous and very serious national-security implications. Blindly applying CALEA to VoIP and realtime Internet communications is simply not worth this risk.” [Information Technology Association of America, 7/13/2006 pdf file]

Entity Tags: Information Technology Association of America, Federal Bureau of Investigation, Communications Assistance for Law Enforcement Act (CALEA), Vinton Cerf, Federal Communications Commission

Timeline Tags: Civil Liberties

In a follow-up hearing, Judge Vaughn Walker of the US District Court of Northern California hears arguments by AT&T and the Justice Department as to whether he should dismiss a lawsuit against AT&T by the Electronic Frontier Foundation (EFF—see January 31, 2006). The EFF argues that AT&T violated its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s allegedly illegal domestic wiretapping project. The government asserts that the lawsuit would jeopardize “state secrets” if permitted to go forward (see May 22, 2006). In today’s hearing, Justice Department lawyer Peter Keisler admits to Walker that the documents presented on behalf of the EFF by AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) and others are not classified. “None of the documents they (EFF) have submitted… implicate any privileged [classified] matters,” Keisler tells Walker. The judge says, “Including the Klein documents.” Keisler agrees, saying: “We have not asserted any privilege over the information that is in the Klein and Marcus (see March 29, 2006) documents.… Mr. Klein and Marcus never had access to any of the relevant classified information here, and with all respect to them, through no fault or failure of their own, they don’t know anything.” Klein will later write that Keisler’s admission is a crippling blow to the government’s assertion that the EFF documentation would compromise national security if made public or submitted in open court. [Klein, 2009, pp. 77]

Entity Tags: US Department of Justice, AT&T, Electronic Frontier Foundation, Mark Klein, Vaughn Walker, National Security Agency, Peter Keisler

Timeline Tags: Civil Liberties

Lawyers file court documents alleging that the National Security Agency (NSA) worked with AT&T to set up a domestic wiretapping site seven months before the 9/11 attacks. The papers are filed as part of a lawsuit, McMurray v. Verizon Communications, which cites as plaintiffs AT&T, Verizon, and BellSouth customers whose privacy was allegedly violated by the NSA warrantless wiretapping program (see May 12, 2006); it also alleges that the firms, along with the NSA and President Bush, violated the Telecommunications Act of 1934 and the US Constitution. AT&T, Verizon, and BellSouth have been accused of working with the NSA to set up domestic call monitoring sites (see October 2001). Evidence that the NSA set up domestic surveillance operations at least seven months before the 9/11 attacks is at the core of the lawsuit (see Spring 2001). The suit is similar to one filed against AT&T by the Electronic Frontier Foundation (EFF—see January 31, 2006) and other such lawsuits. A lawyer for the plaintiffs in McMurray, Carl Mayer, says: “The Bush administration asserted this [the warrantless wiretapping program] became necessary after 9/11. This undermines that assertion.” AT&T spokesman Dave Pacholczyk responds, “The US Department of Justice has stated that AT&T may neither confirm nor deny AT&T’s participation in the alleged NSA program because doing so would cause ‘exceptionally grave harm to national security’ and would violate both civil and criminal statutes.” Verizon has denied being asked by the NSA for its customer phone records, and has refused to confirm or deny “whether it has any relationship to the classified NSA program.” BellSouth spokesman Jeff Battcher says: “We never turned over any records to the NSA. We’ve been clear all along that they’ve never contacted us. Nobody in our company has ever had any contact with the NSA.” The NSA domestic wiretapping program is known as “Pioneer Groundbreaker,” a part of the larger “Project Groundbreaker” (see February 2001). According to Mayer and his fellow lawyer Bruce Afran, an unnamed former employee of AT&T provided them with information about NSA’s approach to AT&T. (That former employee will later be revealed as retired technician Mark Klein—see Late 2002, July 7, 2009, December 15-31, 2005, and April 6, 2006). The lawsuit is on a temporary hiatus while a judicial panel rules on a government request to assign all of the telecommunications lawsuits to a single judge. [Bloomberg, 6/30/2006]

Entity Tags: Verizon Wireless, US Department of Justice, National Security Agency, George W. Bush, Jeff Battcher, Bruce Afran, BellSouth, AT&T, Mark Klein, Carl Mayer, Electronic Frontier Foundation, Dave Pacholczyk

Timeline Tags: Civil Liberties

At a campaign luncheon for Representative Scott Garrett (R-NJ), Vice President Dick Cheney lambasts the New York Times for reporting information that the administration wants kept secret. “Some in the press, in particular the New York Times, have made it harder to defend America against attack by insisting on publishing detailed information about vital national security programs,” he says. “First they reported the terrorist surveillance program (see March 2002), which monitors international communications when one end is outside the United States and one end is connected with or associated with al-Qaeda. Now the Times has disclosed the terrorist financial tracking program. On both occasions, the Times had been asked not to publish those stories by senior administration officials (see December 15, 2005). They went ahead anyway. The leaks to the New York Times and the publishing of those leaks is very damaging to our national security. The ability to intercept al-Qaeda communications and to track their sources of financing are essential if we’re going to successfully prosecute the global war on terror. Our capabilities in these areas help explain why we have been so successful in preventing further attacks like 9/11. And putting this information on the front page makes it more difficult for us to prevent future attacks. Publishing this highly classified information about our sources and methods for collecting intelligence will enable the terrorists to look for ways to defeat our efforts. These kinds of stories also adversely affect our relationships with people who work with us against the terrorists. In the future, they will be less likely to cooperate if they think the United States is incapable of keeping secrets.” [White House, 6/30/2006]

Entity Tags: Scott Garrett, New York Times, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties, Domestic Propaganda

Al-Qaeda leader Hassan Ghul is secretly transferred from US custody to Pakistani custody. The Pakistani government will later release him and he will apparently rejoin al-Qaeda. In early 2004, Ghul was captured in Iraq and put in the CIA’s secret prison system (see January 23, 2004). He became a “ghost detainee” because the US refused to admit they even held him. In 2006, the Bush administration decides to close most of the CIA’s secret prisons and transfer most of the important al-Qaeda prisoners to the Guantanamo prison. But Ghul is given to the Pakistani government instead, apparently as a goodwill gesture. According to a 2011 article by the Associated Press, “[T]he move frustrated and angered former CIA officers, who at the time believed Ghul should have been moved to Guantanamo along with 14 other high-value detainees” (See September 2-3, 2006). The ISI, Pakistan’s intelligence agency, promises that it will make sure Ghul is never released. But after only about a year, Pakistan will secretly let Ghul go and he apparently will return to working with al-Qaeda (see (Mid-2007)). [Associated Press, 6/15/2011] Ghul is given to Pakistan even though he is linked to a Pakistani militant group supported by the ISI, Pakistan’s intelligence agency, and the ISI had a history of protecting him from arrest (see (2002-January 23, 2004)). Also, Ghul is released even though he told US interrogators key information about Osama bin Laden’s courier that will eventually prove key to the discovery of bin Laden’s location (see Shortly After January 23, 2004 and Late 2005).

Entity Tags: Hassan Ghul, Central Intelligence Agency, Pakistan Directorate for Inter-Services Intelligence, Pakistan

Timeline Tags: Torture of US Captives, Complete 911 Timeline, War in Afghanistan

The American Civil Liberties Union (ACLU) accuses the Defense Department of releasing a “whitewash” report on prisoner abuse in Iraq, Afghanistan, and Guantanamo Bay. The “Church report,” compiled in 2004 (see May 11, 2004), has just been released to the public in response to a Freedom of Information Act request from the ACLU. The report’s executive summary was released in 2005, but the entirety of the report has now been made available. “Despite its best efforts to absolve high-ranking officials of any blame, the Church report cannot hide the fact that abusive and unlawful interrogation techniques authorized by Secretary [of Defense Donald] Rumsfeld were used in Guantanamo Bay, Iraq, and Afghanistan,” says ACLU lawyer Amrit Singh. “The facts speak for themselves, and only underscore the need for an independent investigation into command responsibility for the widespread and systemic abuse of detainees held in US custody abroad.” The report only focused on cases closed before September 30, 2004, did not attempt to determine the culpability of senior officials, and used abuse statistics that the Church investigation itself admitted were incomplete and out of date. The ACLU writes that the Church report “skirts the question of command responsibility for detainee abuse, euphemistically labeling official failure to issue interrogation guidelines for Iraq and Afghanistan as a ‘missed opportunity.’ In addition, it references a ‘failure to react to early warning signs of abuse… that should have prompted… commanders to put in place more specific procedures and direct guidance to prevent further abuse.’ The report provides details of how techniques such as ‘stress positions’—authorized by Secretary Rumsfeld for Guantanamo Bay in December 2002—came to be used in Afghanistan and Iraq. It specifically notes, moreover, that the ‘migration’ of interrogation techniques intended for Guantanamo Bay to Iraq was ‘neither accidental nor uncontrolled.’ Yet, the report concludes that there is ‘no link between approved interrogation techniques and detainee abuse.’” [American Civil Liberties Union, 7/3/2006]

Entity Tags: US Department of Defense, American Civil Liberties Union, Donald Rumsfeld, Amrit Singh

Timeline Tags: Torture of US Captives

Civil liberties lawyer and columnist Glenn Greenwald states that the recent Supreme Court ruling in Hamdan v. Rumsfeld (see June 30, 2006), finding that the Bush administration’s Guantanamo Bay military commissions violate both federal law and the Geneva Conventions, also proves that the NSA’s warrantless wiretapping program is illegal (see December 15, 2005). “To arrive at its decision,” Greenwald writes, “the Court emphatically rejected the administration’s radical theories of executive power, and in doing so, rendered entirely discredited the administration’s only defenses for eavesdropping on Americans without the warrants required by law. Actual compliance with the Court’s ruling, then, compels the administration to immediately cease eavesdropping on Americans in violation of FISA,” the Foreign Intelligence Surveillance Act (see 1978). “If the administration continues these programs now, then they are openly defying the Court and the law with a brazeness and contempt for the rule of law that would be unprecedented even for them.” Greenwald notes that FISA prohibits any surveillance of American citizens without judicial approval and oversight. The Bush administration has already admitted to conducting just such surveillance (see December 17, 2005 and December 21, 2005), and President Bush has even stated his intention to expand the program (see December 19, 2005). The Justice Department and a number of administration officials have attempted to claim the NSA surveillance program is both legal and necessary (see December 19, 2005, December 19, 2005, December 21-22, 2005, and Early 2006); Greenwald writes that the Hamdan decision “decimated” those claims, a conclusion shared by a number of legal experts (see January 9, 2006). Moreover, he writes, there is no remaining excuse for Democratic senators not to endorse Senator Russ Feingold’s resolution to censure Bush for violating FISA (see March 12, 2006 and After). The argument advanced by, among others, Senator Barack Obama (D-IL), that Bush believed he was complying with the law because his lawyers told him he was in compliance, is no longer relevant in light of Hamdan, Greenwald argues. “[T]here is no longer any good faith basis left for violating FISA. Ongoing warrantless eavesdropping can only be ordered by the president with a deliberate intent to break the law. After Hamdan, there are no more excuses left for the president to violate FISA, and there is therefore no more excuse left for Democratic senators to refuse to take a stand with Sen. Feingold against the administration’s lawbreaking.” Bush has two clear choices, Greenwald writes: either to comply with FISA or openly defy the Supreme Court. “If we are a country that continues to operate under the rule of law, compliance with the Supreme Court’s ruling compels the immediate cessation of the president’s warrantless eavesdropping program, as well as what are undoubtedly the other, still-secret programs prohibited by law but which have been justified by these same now-rejected theories of unlimited executive power. Put simply, after Hamdan, there are no more excuses left for the president’s refusal to comply with the law.” [Crooks and Liars, 7/8/2006]

Entity Tags: Geneva Conventions, Barack Obama, Bush administration (43), Foreign Intelligence Surveillance Act, Glenn Greenwald, US Department of Justice, US Supreme Court, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Former ambassador Joseph Wilson, whose wife Valerie Plame Wilson was exposed as a CIA agent by columnist Robert Novak (see July 14, 2003), writes an e-mail to Christy Hardin Smith, a former prosecutor who writes for the progressive blog FireDogLake. Referring to Novak’s recent column (see July 12, 2006) and its falsehoods and misrepresentations (see July 12, 2006), Wilson writes: “Robert Novak, some other commentators, and the administration continue to try to completely distort the role that Valerie Wilson played with respect to Ambassador Wilson’s trip to Niger. The facts are beyond dispute. The Office of the Vice President requested that the CIA investigate reports of alleged uranium purchases by Iraq from Niger (see (February 13, 2002)). The CIA set up a meeting to respond to the vice president’s inquiry (see Shortly after February 13, 2002). Another CIA official, not Valerie Wilson, suggested to Valerie Wilson’s supervisor that the ambassador attend that meeting (see February 19, 2002). That other CIA official made the recommendation because that official was familiar with the ambassador’s vast experience in Niger and knew of a previous trip to Africa concerning uranium matters that had been undertaken by the ambassador on behalf of the CIA in 1999 (see Fall 1999). Valerie Wilson’s supervisor subsequently asked her to relay a request from him to the ambassador that he would like the ambassador to attend the meeting at the CIA. Valerie Wilson did not participate in the meeting” (see February 13, 2002). [Christy Hardin Smith, 7/13/2006]

Entity Tags: Valerie Plame Wilson, Central Intelligence Agency, Christy Hardin Smith, FireDogLake, Joseph C. Wilson, Robert Novak, Office of the Vice President

Timeline Tags: Niger Uranium and Plame Outing

Judge Vaughn Walker of the US District Court of Northern California rejects a request by the Justice Department to dismiss a lawsuit by the Electronic Frontier Foundation (EFF—see January 31, 2006) against AT&T. The EFF argues that AT&T violated its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s allegedly illegal domestic wiretapping project. The government has asserted that the lawsuit would jeopardize “state secrets” if permitted to go forward (see May 22, 2006 and June 23, 2006). According to AT&T whistleblower Mark Klein, working with the EFF in the lawsuit, Walker “ridicule[s]” the government’s request for dismissal on state secrets grounds, finding that “[t]he government has opened the door for judicial inquiry by publicly confirming and denying material information about its monitoring of communications content.… AT&T and the government have for all practical purposes already disclosed that AT&T assists the government in monitoring communication content. [T]he government has publicly admitted the existence of a ‘terrorist surveillance program’ (see After September 11, 2001, After September 11, 2001, October 2001, and September 2002).… Considering the ubiquity of AT&T telecommunications services, it is unclear whether this program could even exist without AT&T’s acquiescence and cooperation.” EFF had given Walker the ammunition for his finding by providing him with a raft of media stories about AT&T’s involvement in the NSA surveillance program, as well as media coverage of Klein’s assertions (see April 12, 2006 and May 17, 2006). “The very subject matter of this action is hardly a secret” any longer, Walker finds (see May 24, 2006). “[D]ismissing this case at the outset would sacrifice liberty for no apparent enhancement of security.” Walker also rejects a separate motion to dismiss by AT&T, which had argued that its relationship with the government made it immune from prosecution. Marc Rotenberg of the Electronic Privacy Information Center (EPIC) says: “This cases arises against the backdrop of the accountability of the government as it pursues its surveillance program. This is a significant victory for the principle of government accountability.” AT&T spokesman Walt Sharp refuses to give a direct comment about the ruling, but says that AT&T has always protected its customers’ privacy (see February 2001 and Beyond, February 2001, and Late 2002-Early 2003). The government will obtain a stay of Walker’s ruling while it files an appeal, preventing the EFF documents from being publicly disseminated. [New York Times, 7/21/2006; Klein, 2009, pp. 78-79]

Entity Tags: Mark Klein, AT&T, Electronic Frontier Foundation, Marc Rotenberg, US Department of Justice, Walter Sharp, Vaughn Walker, National Security Agency

Timeline Tags: Civil Liberties

A map of the 2006 advance of the Islamic Courts Union in Somalia.A map of the 2006 advance of the Islamic Courts Union in Somalia. [Source: Public domain / James Dahl]In late July 2006, the Islamic Courts Union (ICU), an Islamist militant group, conquers the Somali capital of Mogadishu. Somalia has long been divided by various warlords and factions, but the ICU soon takes over much of the country. Within days of taking Mogadishu, a number of large Russian-made cargo planes begin landing in Mogadishu’s newly reopened airport, bringing in weapons for the ICU. US military officials order an investigation as to who is supplying the ICU, and within weeks US intelligence concludes that the planes are owned by companies linked to Victor Bout, the world’s biggest illegal arms dealer. Soon, intelligence confirms that Bout is working closely not only with Islamist militias in Somalia, but also their allies in nearby Eritrea. [Farah and Braun, 2007, pp. 254-255] The ICU will lose control of Mogadishu and much of Somalia in December 2006 after Ethiopia invades the country (see December 24, 2006-January 2007), but the group continues fighting. Bout’s flights will continue into 2007. In July 2007, a Sunday Times reporter posing as a middleman for the ICU will arrange an arms deal with Alexander Radionov, who runs a front company linked to Bout. Had the reporter paid, Radionov would have parachuted eight tons of ammunition into Somalia. [Sunday Times (London), 7/15/2007] Bout had previously worked with other al-Qaeda linked Islamist groups, including the Taliban (see Summer 2002), but he has also been supplying the US military in Iraq since war began there in 2003 (see Late April 2003).

Entity Tags: Islamic Courts Union, Alexander Radionov, Victor Bout

Timeline Tags: Complete 911 Timeline

The US and UN finally officially designates the Philippines and Indonesian branches of the International Islamic Relief Organization (IIRO) as a financier of terrorism. Abdul Al-Hamid Sulaiman Al-Mujil, executive director of the IRRO’s far east division, is similarly designated as well. The IIRO is a major charity connected to the Saudi government that has long been suspected of financing Islamic militant groups (see January 1996). It was reported shortly after 9/11 that the US left the IIRO off a list of designated terrorism financiers so as to not embarrass the Saudi government (see October 12, 2001). The Philippine IIRO branch in particular has been publicly accused of funding al-Qaeda since the mid-1990s, due to the activities of Mohammed Jamal Khalifa, bin Laden’s brother-in-law who headed that branch when he funded the Bojinka plot in the early 1990s (see 1987-1991). [Associated Press, 8/3/2006; Manila Times, 12/12/2006] A US Treasury Department press release says Al-Mujil has been nicknamed the “million dollar man” for his “long history of providing support to terrorist organizations.” He is accused of funding the Abu Sayyaf group in the Philippines and Jemaah Islamiyah in Indonesia. He is said to have had relationships with bin Laden and Khalid Shaikh Mohammed. The press release also calls “a senior al-Qaeda member” and accuses the current director of the IIRO’s Philippine branch, Abd al-Hadi Daguit, “a trusted associate of Khalifa.” But curiously, Khalifa himself is still not officially listed, nor is Daguit. He will die in mysterious circumstances several months later. [Treasury Department, 8/3/2006]

Entity Tags: Abu Sayyaf, US Department of the Treasury, Osama bin Laden, Khalid Shaikh Mohammed, Al-Qaeda, International Islamic Relief Organization, Abd al-Hadi Daguit, Abdul Al-Hamid Sulaiman Al-Mujil, Jemaah Islamiyah

Timeline Tags: Complete 911 Timeline

Federal district court judge Anna Diggs Taylor rules that the NSA’s warrantless wiretapping program (see Early 2002) is unconstitutional and orders it ended. She amends her ruling to allow the program to continue while the Justice Department appeals her decision. The decision is a result of a lawsuit filed by the American Civil Liberties Union (ACLU) and other civil liberties groups. Taylor rules that the NSA program violates US citizens’ rights to privacy and free speech, the Constitutional separation of powers among the three branches of government, and the Foreign Intelligence Surveillance Act (see 1978). Taylor writes: “It was never the intent of the framers to give the president such unfettered control, particularly where his actions blatantly disregard the parameters clearly enumerated in the Bill of Rights. There are no hereditary Kings in America and no powers not created by the Constitution. So all ‘inherent powers’ must derive from that Constitution.” [Verdict in ACLU et al v. NSA et al, 8/17/2006 pdf file; Washington Post, 8/18/2006] The program “violates the separation of powers doctrine, the Administrative Procedures Act, the First and Fourth amendments to the United States Constitution, the FISA and Title III,” Taylor writes, and adds, “[T]he president of the United States… has undisputedly violated the Fourth in failing to procure judicial orders.” [CNN, 8/17/2006]
Judge Lets One Portion Stand - Taylor rejects one part of the lawsuit that seeks information about the NSA’s data mining program (see October 2001), accepting the government’s argument that to allow that portion of the case to proceed would reveal state secrets (see March 9, 1953). Other lawsuits challenging the program are still pending. Some legal scholars regard Taylor’s decision as poorly reasoned: national security law specialist Bobby Chesney says: “Regardless of what your position is on the merits of the issue, there’s no question that it’s a poorly reasoned decision. The opinion kind of reads like an outline of possible grounds to strike down the program, without analysis to fill it in.” The White House and its Republican supporters quickly attack Taylor, who was appointed to the bench by then-President Jimmy Carter, as a “liberal judge” who is trying to advance the agenda of Congressional Democrats and “weaken national security.” For instance, Senator Mike DeWine (R-OH) says that halting the program “would hamper our ability to foil terrorist plots.” [Washington Post, 8/18/2006]
Democrats, Civil Libertarians Celebrate Ruling - But Democrats defend the ruling. For instance, Senator John Kerry (D-MA) says the ruling provides a much-needed check on the unfettered power of the Bush White House. “[N]o one is above the law,” says Kerry. [Washington Post, 8/18/2006] Lawyers for some of the other cases against the NSA and the Bush administration laud the decision as giving them vital legal backing for their own court proceedings. “We now have a ruling on the books that upholds what we’ve been saying all along: that this wiretapping program violates the Constitution,” says Kevin Bankston, who represents the Electronic Frontier Foundation (EFF) in its class-action case against AT&T for its role in the NSA’s surveillance program (see January 31, 2006). [Washington Post, 8/18/2006] Legal expert and liberal commentator Glenn Greenwald writes that Taylor’s ruling “does not, of course, prohibit eavesdropping on terrorists; it merely prohibits illegal eavesdropping in violation of FISA. Thus, even under the court’s order, the Bush administration is free to continue to do all the eavesdropping on terrorists it wants to do. It just has to cease doing so using its own secretive parameters, and instead do so with the oversight of the FISA court—just as all administrations have done since 1978, just as the law requires, and just as it did very recently when using surveillance with regard to the [British] terror plot. Eavesdropping on terrorists can continue in full force. But it must comply with the law.” Greenwald writes: “[T]he political significance of this decision cannot be denied. The first federal court ever to rule on the administration’s NSA program has ruled that it violates the constitutional rights of Americans in several respects, and that it violates criminal law. And in so holding, the court eloquently and powerfully rejected the Bush administration’s claims of unchecked executive power in the area of national security.” [Salon, 8/17/2006]
White House Refuses to Comply - The Bush administration refuses to comply with Taylor’s ruling, asserting that the program is indeed legal and a “vital tool” in the “war on terrorism.” It will quickly file an appeal, and law professors on both sides of the issue predict that Taylor’s ruling will be overturned. [Savage, 2007, pp. 206]
Lawsuit Ends with White House 'Compromise' - The lawsuit will end when the White House announces a “compromise” between the wiretapping program and FISC (see January 17, 2007).

Entity Tags: John Kerry, Kevin Bankston, Mike DeWine, US Department of Justice, Peter Hoekstra, Glenn Greenwald, National Security Agency, George W. Bush, James Earl “Jimmy” Carter, Jr., Foreign Intelligence Surveillance Act, Alberto R. Gonzales, American Civil Liberties Union, AT&T, Anna Diggs Taylor, Bush administration (43), Bobby Chesney, Foreign Intelligence Surveillance Court, Electronic Frontier Foundation

Timeline Tags: Civil Liberties

Abd al-Hadi al-Iraqi.Abd al-Hadi al-Iraqi. [Source: FBI]Abd al-Hadi al-Iraqi, said to be an adviser to Osama bin Laden, is captured and detained in a secret CIA prison. President Bush announced on September 6, 2006 that the secret CIA prisons have just been emptied, at least temporarily (see September 2-3, 2006 and September 6, 2006). Nonetheless, Al-Hadi is put in the CIA’s secret prison system (see Autumn 2006-Late April 2007). Very little is known about al-Hadi’s arrest, which will not even be announced until late April 2007, shortly after he is transferred to the Guantanamo prison. It is unknown whether he is captured before Bush’s announcement (in which case he should have been sent to Guantanamo with other high-ranking prisoners), or after. [Salon, 5/22/2007] Prior to Al-Hadi’s arrest, the US government had posted a $1 million reward for his capture. His reward announcement calls him “one of Osama bin Laden’s top global deputies, personally chosen by bin Laden to monitor al-Qaeda operations in Iraq.… He has been associated with numerous attacks in Afghanistan and Pakistan and has been known to facilitate communication between al-Qaeda in Iraq and al-Qaeda.” The announcement notes that al-Hadi once served as a major in the Iraqi army, and he may still be in contact with bin Laden. [Rewards for Justice, 1/4/2007] In 2005, Newsweek reported that al-Hadi had been the main liaison between bin Laden and the independent minded Islamist militant leader Abu Musab al-Zarqawi in Iraq. [Newsweek, 4/4/2005]

Entity Tags: Osama bin Laden, Abd al-Hadi al-Iraqi, Abu Musab al-Zarqawi, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

Mohamad Farik Amin.Mohamad Farik Amin. [Source: FBI]The US temporarily closes a network of secret CIA prisons around the world and transfers the most valuable prisoners to the US prison in Guantanamo, Cuba, for eventual military tribunals. The prison network will be reopened a short time later (see Autumn 2006-Late April 2007). There were reportedly fewer than 100 suspects in the CIA prisons; most of them are apparently sent back to their home countries while fourteen are sent to Guantanamo. All fourteen have some connection to al-Qaeda. Seven of them reportedly had some connection to the 9/11 attacks. Here are their names, nationalities, and the allegations against them.
bullet Khalid Shaikh Mohammed (KSM) (Pakistani, raised in Kuwait). He is the suspected mastermind of 9/11 attacks and many other al-Qaeda attacks. A CIA biography of KSM calls him “one of history’s most infamous terrorists.”
bullet Mustafa Ahmed al-Hawsawi (Saudi). He allegedly helped finance the 9/11 attacks.
bullet Hambali (Indonesian). He attended a key planning meeting for the 9/11 attacks in Malaysia (see January 5-8, 2000) and is accused of involvement in many other plots, including the 2002 Bali bombings (see October 12, 2002).
bullet Khallad bin Attash (a.k.a. Tawfiq bin Attash) (Yemeni). He also attended a key planning meeting for the 9/11 attacks in Malaysia (see January 5-8, 2000) and had a role in other plots such as the 2000 USS Cole bombing (see October 12, 2000).
bullet Ali Abdul Aziz Ali (Pakistani, raised in Kuwait). He allegedly helped finance the 9/11 attacks and arranged transportation for some hijackers. His uncle is KSM.
bullet Ramzi bin al-Shibh (Yemeni). A member of the Hamburg al-Qaeda cell with Mohamed Atta and other 9/11 hijackers. The CIA calls him the “primary communications intermediary” between the hijackers and KSM. He also attended a key planning meeting for the 9/11 attacks in Malaysia (see January 5-8, 2000).
bullet Abd al-Rahim al-Nashiri (Saudi). He is said to have been one of the masterminds of the USS Cole bombing (see October 12, 2000). He also attended a key planning meeting for the 9/11 attacks in Malaysia (see January 5-8, 2000).
The remaining seven suspects are alleged to have been involved in other al-Qaeda plots:
bullet Abu Zubaida (Palestinian, raised in Saudi Arabia). He is said to be a facilitator who helped make travel arrangements for al-Qaeda operatives. He is also alleged to have organized a series of planned millennium attacks.
bullet Ahmed Khalfan Ghailani (Tanzanian). He was indicted for a role in the 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). He is also said to be an expert document forger.
bullet Majid Khan (Pakistani). He lived in the US since 1996 and is said to have worked with KSM on some US bomb plots (see March 5, 2003).
bullet Abu Faraj al-Libbi (a.k.a. Mustafa al-‘Uzayti) (Libyan). He allegedly became al-Qaeda’s top operations officer after KSM was captured.
bullet Mohamad Farik Amin (a.k.a. Zubair) (Malaysian). He is a key Hambali associate and was allegedly tapped for a suicide mission targeting Los Angeles.
bullet Mohammed Nazir Bin Lep (a.k.a. Lillie) (Malaysian). He is a key Hambali associate. He is accused of providing funds for the 2003 bombing of the Marriott hotel in Jakarta, Indonesia (see August 5, 2003). He was allegedly tapped for a suicide mission targeting Los Angeles.
bullet Gouled Hassan Dourad (Somali). He allegedly scouted a US military base in Djibouti for a planned terrorist attack.
The fourteen are expected to go on trial in 2007. [Knight Ridder, 9/6/2006; Central Intelligence Agency, 9/6/2006; USA Today, 9/7/2006]

Entity Tags: Majid Khan, Mustafa Ahmed al-Hawsawi, Mohamad Farik Amin, Mohammed Nazir Bin Lep, Ramzi bin al-Shibh, Hambali, Gouled Hassan Dourad, Abd al-Rahim al-Nashiri, Abu Faraj al-Libbi, Khallad bin Attash, Abu Zubaida, Ali Abdul Aziz Ali, Central Intelligence Agency, Ahmed Khalfan Ghailani, Khalid Shaikh Mohammed

Timeline Tags: Torture of US Captives, Complete 911 Timeline, 9/11 Timeline

Bush acknowledging the secret CIA prison network.Bush acknowledging the secret CIA prison network. [Source: Gerald Herbert / Associated Press]In a speech, President Bush acknowledges a network of secret CIA prisons and announces plans to try 14 top al-Qaeda terrorist suspects in military tribunals. [Knight Ridder, 9/6/2006]
Admits Existence of Detainees in CIA Custody - Bush tells his listeners: “In addition to the terrorists held at Guantanamo, a small number of suspected terrorist leaders and operatives captured during the war have been held and questioned outside the United States, in a separate program operated by the Central Intelligence Agency.… Many specifics of this program, including where these detainees have been held and the details of their confinement, cannot be divulged.… We knew that Abu Zubaida (see March 28, 2002) had more information that could save innocent lives, but he stopped talking.… As his questioning proceeded, it became clear that he had received training on how to resist interrogation. And so the CIA used an alternative set of procedures… The procedures were tough, and they were safe, and lawful, and necessary.… These procedures were designed to be safe, to comply with our laws, our Constitution, and our treaty obligations. The Department of Justice reviewed the authorized methods extensively and determined them to be lawful. I cannot describe the specific methods used—I think you understand why.” Bush then adds that Zubaida “began to provide information on key al-Qaeda operatives, including information that helped us find and capture more of those responsible for the attacks on September 11” (see June 2002). Another high-value detainee, 9/11 planner Khalid Shaikh Mohammed (see Shortly After February 29 or March 1, 2003), provided “many details of other plots to kill innocent Americans” (see March 7 - Mid-April, 2003 and August 6, 2007). [Vanity Fair, 12/16/2008; New York Review of Books, 3/15/2009] The 14 prisoners will be put on trial as soon as Congress enacts the Military Commissions Act (MCA—see October 17, 2006), which he is sending to Congress for its approval today. [Savage, 2007, pp. 308-309]
Political Reasons to Acknowledge CIA Prisons - The US government has never officially acknowledged the existence of the CIA prisons before, despite numerous media accounts about them. Bush’s speech comes less than two months before midterm Congressional elections and also comes as the White House is preparing new legislation to legalize the CIA’s detention program and shield US officials from prosecution for possible war crimes. Knight Ridder comments that the speech “appeared to be intended to give him more leverage in his negotiations with Congress over how to try suspected terrorists.… In addition to the potential political benefits, Bush had other reasons to make the program public. A Supreme Court ruling in June struck down the administration’s plan to bring terrorist suspects before military tribunals and called into question the legality of secret CIA detentions.” [Knight Ridder, 9/6/2006]
Sites Closed Down? - Other administration officials say the CIA prison network has been closed down, at least for the time being. (In fact, it will be reopened a short time later (see Autumn 2006-Late April 2007).) Reportedly, “fewer than 100” suspects had ever been in CIA custody. It is not known who they were or what happened to all of them, but most of them reportedly were returned to their home countries for prosecution. Fourteen “high-value” suspects, including accused 9/11 mastermind Khalid Shaikh Mohammed, were transferred from the secret CIA prisons to the prison in Guantanamo, Cuba in the days just prior to Bush’s speech (see September 2-3, 2006).
Torture is 'against [US] Values' - Bush says: “I want to be absolutely clear with our people and the world: The United States does not torture. It’s against our laws, and it’s against our values. I have not authorized it—and I will not authorize it.” However, he says the Geneva Conventions’ prohibition against “humiliating and degrading treatment” could potentially cause legal problems for CIA interrogators. Other administration officials say harsh interrogation techniques such as waterboarding were used in the CIA prisons. Such techniques are considered by many to be forms of torture. Bush claims that information gleaned from interrogations in the secret prisons helped thwart attacks on the US and provided valuable information about al-Qaeda operations around the world. [Knight Ridder, 9/6/2006; Washington Post, 9/7/2006]

Entity Tags: Geneva Conventions, Central Intelligence Agency, George W. Bush, Military Commissions Act, Abu Zubaida, Khalid Shaikh Mohammed

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Shortly after 14 high-ranking al-Qaeda prisoners are transferred from secret CIA prisons to the US-controlled Guantanamo prison in Cuba (see September 2-3, 2006), the International Committee of the Red Cross is finally allowed to interview them. The prisoners include 9/11 mastermind Khalid Shaikh Mohammed, Ramzi bin al-Shibh, Hambali, and Abu Zubaida. The Red Cross has a policy of not publicizing or commenting its findings. However, some US officials are shown the report on the interviews with these prisoners and apparently some of these officials leak information to the New Yorker about one year later. The New Yorker will report, “Congressional and other Washington sources familiar with the report said that it harshly criticized the CIA’s practices. One of the sources said that the Red Cross described the agency’s detention and interrogation methods as tantamount to torture, and declared that American officials responsible for the abusive treatment could have committed serious crimes. The source said the report warned that these officials may have committed ‘grave breaches’ of the Geneva Conventions, and may have violated the US Torture Act, which Congress passed in 1994. The conclusions of the Red Cross, which is known for its credibility and caution, could have potentially devastating legal ramifications.” [New Yorker, 8/6/2007]

Entity Tags: Ahmed Khalfan Ghailani, Mustafa Ahmed al-Hawsawi, Ramzi bin al-Shibh, Khallad bin Attash, Abd al-Rahim al-Nashiri, Abu Zubaida, Mohamad Farik Amin, Mohammed Nazir Bin Lep, Khalid Shaikh Mohammed, Ali Abdul Aziz Ali, Central Intelligence Agency, Majid Khan, International Committee of the Red Cross, Abu Faraj al-Libbi, Hambali, Gouled Hassan Dourad

Timeline Tags: Torture of US Captives, Complete 911 Timeline, 9/11 Timeline

Two simultaneous suicide attacks on oil and gas installations in Yemen fail. The Safer refinery in Marib and the al-Dhabba terminal in Hadramout are attacked by four suicide bombers with car bombs, but Yemeni security forces blow the cars up just before they reach their targets. The four suicide bombers and one security guard are killed. The attacks come just a few days after al-Qaeda number two leader Ayman al-Zawahiri called for attacks on oil facilities in the Persian Gulf region. A Yemeni court later sentences 32 men to between two and 15 years in jail for their roles in the attacks. Three of them are alleged al-Qaeda operatives tried in absentia who escaped from prison earlier in 2006 (see February 3, 2006). [BBC, 11/7/2007] Anwar al-Awlaki, an imam for several of the 9/11 hijackers while they lived in the US, was arrested in Yemen earlier in the month (see Early September 2006-December 2007). He allegedly also has a role preparing for the foiled attacks. [Australian, 11/3/2006; Australian, 11/4/2006] The attempted attacks also come just days before Yemen’s presidential elections. Yemeni President Ali Abdallah Saleh, in power since 1978, quickly uses the attacks to criticize his opponent, because one of the opponents’ guards was accused of being involved. The guard is later acquitted. Saleh wins reelection. [New York Times, 3/1/2008] In 2008, one anonymous senior Yemeni official will tell the Washington Post that some important al-Qaeda members have had a long relationship with Yemen’s intelligence agencies and have targeted political opponents in the past. [Washington Post, 5/4/2008]

Entity Tags: Anwar al-Awlaki, Ayman al-Zawahiri, Al-Qaeda, Ali Abdallah Saleh

Timeline Tags: Alleged Use of False Flag Attacks, Complete 911 Timeline

Former Nixon White House counsel John Dean is troubled by the Military Commissions Act (MCA) (see October 17, 2006) currently under consideration in Congress. The MCA authorizes military tribunals instead of criminal court trials for suspected terrorists. Dean supported the idea of tribunals when they were first suggested in 2001, but, he writes: “[T]he devil… arrived later with the details. It never occurred to me (and most people) that Bush & Co. would design a system more befitting a totalitarian state than a democratic nation that once led the world by its good example.” After a previous tribunal procedure was struck down by the Supreme Court (see June 30, 2006), Bush sent another proposal to Congress in early September. Where the bill did not actively rewrite the Court’s findings, it ignored them altogether, Dean writes. Dean finds the law a stunning reversal of decades—centuries, in some instances—of US jurisprudence and international law, including its dismissal of Geneva protections, its retroactive protection for US officials who may have tortured detainees, and its dismissal of habeas corpus rights for detainees. Dean calls the proposed legislation “shameful,” and writes: “This proposal… is going to tell us a great deal about where we are as a nation, for as General [Colin] Powell said, ‘The world is beginning to doubt the moral basis of our fight against terrorism. To redefine [the Geneva Conventions] would add to those doubts.’ As will amending the war crimes law to absolve prior wrongs, denying detainees ‘a regularly constituted court affording all the judicial guarantees which are recognized as indispensable by civilized peoples,’ and enacting a law that insults the Supreme Court.” [FindLaw, 9/22/2006]

Entity Tags: US Supreme Court, Bush administration (43), Military Commissions Act, Colin Powell, Geneva Conventions, John Dean

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), gives an interview for CBS’s flagship news program 60 Minutes. The interview is conducted by Steve Kroft. Klein later describes the interview as “good [and] solid,” and says it should make for a “blockbuster news story.” Klein has agreed to give CBS an “exclusive,” so he gives no interviews for the next four months while CBS fails to run the story. “I was silent during the entire 2006 election period,” Klein will write. Klein’s lead attorney, civil rights lawyer Jim Brosnahan, is astonished at CBS’s failure to run the segment, telling Klein the network has “no good reason” for not broadcasting it. CBS will never air the segment featuring Klein. Klein will later write, “It seems obvious to me that someone higher up at CBS had killed the story for political reasons, but could not tell us that, so they put us off without explanation.” Klein will later grant interviews to ABC and PBS; those interviews will be aired. [Klein, 2009, pp. 62-63]

Entity Tags: Public Broadcasting System, ABC News, AT&T, CBS News, Steve Kroft, James Brosnahan, Mark Klein

Timeline Tags: Civil Liberties

The Military Commissions Act (MCA) (see October 17, 2006) is characterized by many as not applying to US citizens. Law professor Marty Lederman disagrees. Under the MCA, Lederman says, “if the Pentagon says you’re an unlawful enemy combatant—using whatever criteria they wish—then as far as Congress, and US law, is concerned, you are one, whether or not you have had any connection to ‘hostilities’ at all.” [Unclaimed Territory, 9/28/2006] Six months later, an administration lawyer will confirm that the law does indeed apply to US citizens (see February 1, 2007).

Entity Tags: Martin (“Marty”) Lederman, Military Commissions Act, US Department of Defense

Timeline Tags: Civil Liberties

Original cover to Woodward’s ‘State of Denial.’Original cover to Woodward’s ‘State of Denial.’ [Source: Barnes and Noble]Journalist Bob Woodward’s new book State of Denial is released. While the book focuses mainly on politics regarding the Iraq war, it also describes an urgent warning that then-CIA Director George Tenet gave to Condoleezza Rice, National Security Adviser at the time, and other White House officials on July 10, 2001 (see July 10, 2001). [New York Times, 9/29/2006; New York Daily News, 9/29/2006; Washington Post, 10/1/2006] This warning had been mentioned in passing in a 2002 Time magazine article, but it had escaped widespread attention until Woodward’s book. [Time, 8/4/2002] The meeting is particularly controversial because neither the 9/11 Congressional Inquiry nor the 9/11 Commission mentioned in it in their final reports. The 9/11 Commission had learned about it from Tenet in early 2004 (see January 28, 2004). Rice and a number of 9/11 Commissioners deny knowing about the July meeting for several days, until documentation surfaces in the media detailing the meeting and Tenet’s testimony to the commission (see October 1-2, 2006 and September 30-October 3, 2006). Details about the July meeting and surrounding controversies are reported on by the mainstream media for about a week, but there are no articles on it in any prominent newspaper after October 3, 2006. On October 5, Sen. John Kerry (D-MA) formally asks Sen. Richard Lugar (R-IN), chairman of the Senate Foreign Relations Committee, for hearings about the revelations in Woodward’s book, including controversies surrounding the July meeting. Kerry says in a letter to Lugar, “It is necessary to understand the mistakes of the past in order to ensure they are not repeated, and having testimony from the parties under oath will help to sharpen recollections and clarify the exact nature of this important meeting.” However, no hearings take place. [Kerry, 10/5/2006]

Entity Tags: Bob Woodward, Condoleezza Rice, Bob Kerry, 9/11 Commission

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Video footage of Abd al-Hadi al-Iraqi, apparently at a night campsite.Video footage of Abd al-Hadi al-Iraqi, apparently at a night campsite. [Source: IntelCenter]In autumn 2006, Abd al-Hadi al-Iraqi, said to be an adviser to Osama bin Laden, is captured and then detained in a secret CIA prison (see Autumn 2006). President Bush announced on September 6, 2006 that the secret CIA prisons were emptied, at least temporarily (see September 2-3, 2006 and September 6, 2006), and it is not known if al-Hadi is transferred to CIA custody before or after this announcement. The CIA keeps al-Hadi’s detention secret from not only the public but also from the Red Cross until late April 2007, when it is publicly announced that al-Hadi has been transferred to the US military prison at Guantanamo. Only then is the Red Cross allowed to examine him. President Bush’s September 2006 announcement was in response to a US Supreme Court decision that rules that all detainees, including those like al-Hadi held in secret CIA prisons, are protected by some provisions of the Geneva Conventions. Then in October 2006 Congress passed the Military Commissions Act, which forbids abuse of all detainees in US custody, including those in CIA custody. The CIA claims that it has no legal responsibility to alert the Red Cross about detainees such as al-Hadi, but without notifying watchdog organizations such as the Red Cross, there is no way to really know if detainees being held by the CIA are being illegally abused or not. Mary Ellen O’Connell, a professor of international law at Notre Dame Law School, says al-Hadi’s case raises the possibility that President Bush has secretly given the CIA a new mandate to operate outside the constraints of the Military Commissions Act: “This suggests that the president has signed some sort of additional authority for the CIA.” [Salon, 5/22/2007]

Entity Tags: Central Intelligence Agency, Mary Ellen O’Connell, International Committee of the Red Cross, Abd al-Hadi al-Iraqi

Timeline Tags: Torture of US Captives, Complete 911 Timeline

Secretary of State Rice says that she does not recall the meeting on July 10, 2001, when CIA Director Tenet and other officials briefed her about the al-Qaeda threat (see July 10, 2001). “What I am quite certain of is that I would remember if I was told, as this account apparently says, that there was about to be an attack in the United States, and the idea that I would somehow have ignored that I find incomprehensible.” [Associated Press, 10/2/2006] Rice says she has no recollection of what she variously calls “the supposed meeting” and “the emergency so-called meeting.” [Editor & Publisher, 10/1/2006; McClatchy Newspapers, 10/2/2006] The Washington Post comments that “Rice added to the confusion… by strongly suggesting that the meeting may never have occurred at all—even though administration officials had conceded for several days that it had.” Hours after Rice’s latest denial, the State Department confirms that documents show Rice did attend such a meeting on that date. However, State Department spokesman Sean McCormack then says, “The briefing was a summary of the threat reporting from the previous weeks. There was nothing new.” The Washington Post notes that when it was pointed out to McCormack that Rice asked for the briefing to be shown to Defense Secretary Rumsfeld and Attorney General Ashcroft (see July 11-17, 2001), “McCormack was unable to explain why Rice felt the briefing should be repeated if it did not include new material.” [Washington Post, 10/3/2006]

Entity Tags: John Ashcroft, Sean McCormack, Condoleezza Rice, US Department of State, Al-Qaeda, George J. Tenet, Donald Rumsfeld

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In two separate sessions, from October 6-11 and again from December 4-14, officials of the International Committee of the Red Cross (ICRC) interview 14 detainees newly transferred from a variety of CIA secret “black sites” to Guantanamo. The transfers followed President Bush’s acknowledgment that the CIA has maintained a number of these sites and his announced intention to have a number of the detainees sent to the Cuban facility (see September 17, 2001 and September 6, 2006).
ICRC Access - The ICRC is legally bound to monitor compliance with the Geneva Conventions and to supervise the treatment of prisoners of war; previously, it had not been allowed to see the detainees, and in some cases were never informed of their detention. The ICRC officials interview each prisoner in private, with the intention of producing “a description of the treatment and material conditions of detention of the 14 during the period they were held in the CIA detention program.”
Interviews - The 14 have been held for periods ranging “from 16 months to almost four and a half years.” The ICRC’s report, never intended for public consumption, will be released to the CIA several months later (see February 14, 2007) and revealed in a book in early 2009 (see March 15, 2009). Some of the detainees, concerned about the possible repercussions that may ensue from their discussions, ask the ICRC to withhold their names from some allegations, though most of the report attributes specific narratives and allegations to particular prisoners. Almost every allegation is independently corroborated by other, named detainees.
'Striking Similarity' - In 2009, author Mark Danner will write, quoting the ICRC report: “[I]ndeed, since the detainees were kept ‘in continuous solitary confinement and incommunicado detention’ throughout their time in ‘the black sites,’ and were kept strictly separated as well when they reached Guantanamo, the striking similarity in their stories, even down to small details, would seem to make fabrication extremely unlikely, if not impossible. ‘The ICRC wishes to underscore,’ as the writers tell us in the introduction, ‘that the consistency of the detailed allegations provided separately by each of the 14 adds particular weight to the information provided below.’”
Topics of Report - The report covers the following areas:
bullet Main elements of the CIA detention program;
bullet Arrest and transfer;
bullet Continuous solitary confinement and incommunicado detention;
bullet Other methods of ill-treatment;
bullet Suffocation by water (the ICRC term for waterboarding);
bullet Prolonged stress standing;
bullet Beatings by use of a collar;
bullet Beating and kicking;
bullet Confinement in a box;
bullet Prolonged nudity;
bullet Sleep deprivation and use of loud music;
bullet Exposure to cold temperature/cold water;
bullet Prolonged use of handcuffs and shackles;
bullet Threats;
bullet Forced shaving;
bullet Deprivation/restricted provision of solid food;
bullet Further elements of the detention regime.
Conclusion - The report concludes: “The allegations of ill-treatment of the detainees indicate that, in many cases, the ill-treatment to which they were subjected while held in the CIA program, either singly or in combination, constituted torture. In addition, many other elements of the ill-treatment, either singly or in combination, constituted cruel, inhuman, or degrading treatment.” Danner will write, “Such unflinching clarity, from the body legally charged with overseeing compliance with the Geneva Conventions—in which the terms ‘torture’ and ‘cruel, inhuman, and degrading treatment’ are accorded a strictly defined legal meaning—couldn’t be more significant.” [New York Review of Books, 3/15/2009]

Entity Tags: International Committee of the Red Cross, Geneva Conventions, Central Intelligence Agency, Mark Danner

Timeline Tags: Torture of US Captives

Joanne Mariner, an attorney with the civil liberties organization Human Rights Watch, calls the Military Commissions Act (see October 17, 2006) “exceedingly harmful” and a “grab-bag of unnecessary and abusive measures” that creates for detainees “a system of justice that is far inferior to that of the federal courts and courts-martial.” The bill does not directly address detention, Mariner writes, but does nothing to limit detention and, she believes, will be used by the administration to justify its current detention practices. [FindLaw, 10/9/2006]

Entity Tags: Joanne Mariner, Human Rights Watch, Military Commissions Act

Timeline Tags: Civil Liberties

President Bush signs the Military Commissions Act into law.President Bush signs the Military Commissions Act into law. [Source: White House]President Bush signs the Military Commissions Act (MCA) into law. [White House, 10/17/2006] The MCA is designed to give the president the authority to order “enemy detainees” tried by military commissions largely outside the scope of US civil and criminal procedures. The bill was requested by the Bush administration after the Supreme Court’s ruling in Hamdi v. Rumsfeld (see June 28, 2004) that the US could not hold prisoners indefinitely without access to the US judicial system, and that the administration’s proposal that they be tried by military tribunals was unconstitutional (see June 28, 2004). [FindLaw, 10/9/2006] It is widely reported that the MCA does not directly apply to US citizens, but to only non-citizens defined as “enemy combatants. [CBS News, 10/19/2006] However, six months later, a Bush administration lawyer will confirm that the administration believes the law does indeed apply to US citizens (see February 1, 2007).
Sweeping New Executive Powers - The MCA virtually eliminates the possibility that the Supreme Court can ever again act as a check on a president’s power in the war on terrorism. Similarly, the law gives Congressional approval to many of the executive powers previously, and unilaterally, seized by the Bush administration. Former Justice Department official John Yoo celebrates the MCA, writing, “Congress… told the courts, in effect, to get out of the war on terror” (see October 19, 2006). [Savage, 2007, pp. 319, 322]
'Abandoning' Core 'Principles' - The bill passed the Senate on a 65-34 vote, and the House by a 250-170 vote. The floor debate was often impassioned and highly partisan; House Majority Leader John Boehner (R-OH) called Democrats who opposed the bill “dangerous,” and Senate Judiciary Committee member Patrick Leahy (D-VT) said this bill showed that the US is losing its “moral compass.” Leahy asked during the debate, “Why would we allow the terrorists to win by doing to ourselves what they could never do, and abandon the principles for which so many Americans today and through our history have fought and sacrificed?” Senate Judiciary Committee chairman Arlen Specter (R-PA) had said he would vote against it because it is “patently unconstitutional on its face,” but then voted for it, saying he believes the courts will eventually “clean it up.” Specter’s attempt to amend the bill to provide habeas corpus rights for enemy combatants was defeated, as were four Democratic amendments. Republicans have openly used the debate over the MCA as election-year fodder, with House Speaker Dennis Hastert (R-IL) saying after the vote that “House Democrats have voted to protect the rights of terrorists,” and Boehner decrying “the Democrats’ irrational opposition to strong national security policies.” Democrats such as Senator Barack Obama (D-IL) say they will not fight back at such a level. “There will be 30-second attack ads and negative mail pieces, and we will be called everything from cut-and-run quitters to Defeatocrats, to people who care more about the rights of terrorists than the protection of Americans,” Obama says. “While I know all of this, I’m still disappointed, and I’m still ashamed, because what we’re doing here today—a debate over the fundamental human rights of the accused—should be bigger than politics.” [Washington Post, 10/19/2006] After winning the vote, Hastert accused Democrats who opposed the bill of “putting their liberal agenda ahead of the security of America.” Hastert said the Democrats “would gingerly pamper the terrorists who plan to destroy innocent Americans’ lives” and create “new rights for terrorists.” [New York Times, 10/19/2006]
Enemy Combatants - The MCA applies only to “enemy combatants.” Specifically, the law defines an “unlawful enemy combatant” as a person “who has engaged in hostilities or who has purposefully and materially supported hostilities against the United States or its co-belligerents,” and who is not a lawful combatant. Joanne Mariner of Human Rights Watch says the definition far exceeds the traditionally accepted definition of combatant as someone who directly participates in hostilities. But under the MCA, someone who provides “material support” for terrorists—whether that be in the form of financial contributions or sweeping the floors at a terrorist camp—can be so defined. Worse, the label can be applied without recourse by either Bush or the secretary of defense, after a “competent tribunal” makes the determination. The MCA provides no guidelines as to what criteria these tribunals should use. Taken literally, the MCA gives virtually unrestricted power to the tribunals to apply the label as requested by the president or the secretary. Mariner believes the definition is both “blatantly unconstitutional” and a direct contradiction of centuries of Supreme Court decisions that define basic judicial rights. [FindLaw, 10/9/2006] Under this definition, the president can imprison, without charge or trial, any US citizen accused of donating money to a Middle East charity that the government believes is linked to terrorist activity. Citizens associated with “fringe” groups such as the left-wing Black Panthers or right-wing militias can be incarcerated without trial or charge. Citizens accused of helping domestic terrorists can be so imprisoned. Law professor Bruce Ackerman calls the MCA “a massive Congressional expansion of the class of enemy combatants,” and warns that the law may “haunt all of us on the morning after the next terrorist attack” by enabling a round of mass detentions similar to the roundup of Japanese-American citizens during World War II. [Savage, 2007, pp. 322]
Military Commissions - The MCA mandates that enemy combatants are to be tried by military commissions, labeled “regularly constituted courts that afford all the necessary ‘judicial guarantees which are recognized as indispensable by civilized peoples’ for purposes of common Article 3 of the Geneva Conventions.” The commissions must have a minimum of five commissioned military officers and a military judge; if death is a possible penalty, the commissions must have at least 12 officers. The defendant’s guilt must be proven beyond a reasonable doubt; convictions require a two-thirds vote. Sentences of beyond 10 years require a three-quarters vote, and death penalties must be unanimously voted for. Defendants may either represent themselves or by military or civilian counsel. The court procedures themselves, although based on standard courts-martial proceedings, are fluid, and can be set or changed as the secretary of defense sees fit. Statements obtained through methods defined as torture are inadmissible, but statements take by coercion and “cruel treatment” can be admitted. The MCA sets the passage of the Detainee Treatment Act (DTA—see December 15, 2005) as a benchmark—statements obtained before the December 30, 2005 enactment of that law can be used, even if the defendant was “coerced,” if a judge finds the statement “reasonable and possessing sufficient probative value.” Statements after that date must have been taken during interrogations that fall under the DTA guidelines. Defendants have the right to examine and respond to evidence seen by the commission, a provision originally opposed by the administration. However, if the evidence is classified, an unclassified summary of that material is acceptable, and classified exculpatory evidence can be denied in lieu of what the MCA calls “acceptable substitutes.” Hearsay evidence is admissible, as is evidence obtained without search warrants. Generally, defendants will not be allowed to inquire into the classified “sources, methods, or activities” surrounding evidence against them. Some human rights activists worry that evidence obtained through torture can be admitted, and the fact that it was obtained by torture, if that detail is classified, will not be presented to the court or preclude the evidence from being used. Public access to the commissions will be quite limited. Many experts claim these commissions are illegal both by US constitutional law and international law. [FindLaw, 10/9/2006]
Secret Courts - The military tribunals can be partially or completely closed to public scrutiny if the presiding judge deems such an action necessary to national security. The government can convey such concerns to the judge without the knowledge of the defense. The judge can exclude the accused from the trial if he deems it necessary for safety or if he decides the defendant is “disruptive.” Evidence can be presented in secret, without the knowledge of the defense and without giving the defense a chance to examine that evidence, if the judge finds that evidence “reliable.” And during the trial, the prosecution can at any time assert a “national security privilege” that would stop “the examination of any witness” if that witness shows signs of discussing sensitive security matters. This provision can easily be used to exclude any potential defense witness who might “breach national security” with their testimony. Author and investigative reporter Robert Parry writes, “In effect, what the new law appears to do is to create a parallel ‘star chamber’ system for the prosecution, imprisonment, and elimination of enemies of the state, whether those enemies are foreign or domestic.” [Consortium News, 10/19/2006]
Appeals - Guilty verdicts are automatically appealed to a Court of Military Commission Review, consisting of three appellate military justices. The DC Circuit Court of Appeals has extremely limited authority of review of the commissions; even its authority to judge whether a decision is consistent with the Constitution is limited “to the extent [that the Constitution is] applicable.”
Types of Crimes - Twenty-eight specific crimes fall under the rubric of the military commissions, including conspiracy (not a traditional war crime), murder of protected persons, murder in violation of the bill of war, hostage-taking, torture, cruel or inhuman treatment, mutilation or maiming, rape, sexual abuse or assault, hijacking, terrorism, providing material support for terrorism, and spying. [FindLaw, 10/9/2006]
CIA Abuses - The MCA, responding to the recent Supreme Court decision of Hamdan v. Rumsfeld (see June 30, 2006) that found the CIA’s secret detention program and abusive interrogation practices illegal, redefines and amends the law to make all but the most pernicious interrogation practices, even those defined as torture by the War Crimes Act and the Geneva Conventions, legal. The MCA actually rules that the Geneva Conventions are all but unenforceable in US courts. It also provides retroactive protection under the law to all actions as far back as November 1997. Under the MCA, practices such as waterboarding, stress positioning, and sleep deprivation cannot be construed as torture. [FindLaw, 10/9/2006] The MCA even states that rape as part of interrogations cannot be construed as torture unless the intent of the rapist to torture his victim can be proven, a standard rejected by international law. The MCA provides such a narrow definition of coercion and sexual abuse that most of the crimes perpetrated at Abu Ghraib are now legal. [Jurist, 10/4/2006] Although the MCA seems to cover detainee abuse for all US agencies, including the CIA, Bush says during the signing of the bill, “This bill will allow the Central Intelligence Agency to continue its program for questioning key terrorist leaders and operatives.” International law expert Scott Horton will note, “The administration wanted these prohibitions on the military and not on the CIA, but it did not work out that way.” Apparently Bush intends to construe the law to exempt the CIA from its restrictions, such as they are, on torture and abuse of prisoners. [Salon, 5/22/2007]
No Habeas Corpus Rights - Under the MCA, enemy combatants no longer have the right to file suit under the habeas corpus provision of US law. This means that they cannot challenge the legality of their detention, or raise claims of torture and mistreatment. Even detainees who have been released can never file suit to seek redress for their treatment while in US captivity. [FindLaw, 10/25/2006]
Retroactive Immunity - The administration added a provision to the MCA that rewrote the War Crimes Act retroactively to November 26, 1997, making any offenses considered war crimes before the MCA is adopted no longer punishable under US law. Former Nixon White House counsel John Dean will write in 2007 that the only reason he can fathom for the change is to protect administration officials—perhaps including President Bush himself—from any future prosecutions as war criminals. Dean will note that if the administration actually believes in the inherent and indisputable powers of the presidency, as it has long averred, then it would not worry about any such criminal liability. [Dean, 2007, pp. 239-240]

Entity Tags: Human Rights Watch, Joanne Mariner, US Supreme Court, Patrick J. Leahy, Military Commissions Act, John Dean, George W. Bush, Scott Horton, Geneva Conventions, Bruce Ackerman, Dennis Hastert, American Civil Liberties Union, Amnesty International, Detainee Treatment Act, Arlen Specter, War Crimes Act, Barack Obama, Central Intelligence Agency, Bush administration (43), John Boehner

Timeline Tags: Civil Liberties

The New York Times pens an editorial issuing a grim warning about the ramifications of the newly passed Military Commission Act (MCA—see October 17, 2006). The editorial calls the law’s stripping of habeas corpus rights for so-called “enemy combatants” “undemocratic.” It criticizes the highly charged rhetoric of the Republicans who attacked Democrats in opposition to the law as part of the Republican Party’s “scare-America-first strategy” for the upcoming midterm elections. The Times notes that President Bush misled the country into believing that the MCA is the only way the country has of adequately putting 9/11 suspects on trial: “The truth is that Mr. Bush could have done that long ago, but chose to detain them illegally at hidden CIA camps to extract information. He sent them to Guantanamo only to stampede Congress into passing the new law. The 60 or so men at Guantanamo who are now facing tribunals—out of about 450 inmates—also could have been tried years ago if Mr. Bush had not rebuffed efforts by Congress to create suitable courts. He imposed a system of kangaroo courts that was more about expanding his power than about combating terrorism.” The editorial criticizes Bush’s new “separate system of justice for any foreigner whom Mr. Bush chooses to designate as an ‘illegal enemy combatant,” one that “raises insurmountable obstacles for prisoners to challenge their detentions [and] does not require the government to release prisoners who are not being charged, or a prisoner who is exonerated by the tribunals.” However, the editorial gives false comfort to its readers by asserting that the MCA “does not apply to American citizens, but it does apply to other legal United States residents.” [New York Times, 10/19/2006]
Times Errs in Stating MCA Does Not Apply to US Citizens - Most other mainstream media outlets do not mention the possibility of the MCA applying to US citizens. But on the same day as the Times editorial, author and investigative journalist Robert Parry gives a powerful argument that the MCA can indeed be applied to them. The MCA reads in part, “Any person is punishable as a principal under this chapter who commits an offense punishable by this chapter, or aids, abets, counsels, commands, or procures its commission.… Any person subject to this chapter who, in breach of an allegiance or duty to the United States, knowingly and intentionally aids an enemy of the United States… shall be punished as a military commission… may direct.” The legal meaning of “any person,” Parry notes, clearly includes US citizens, particularly those who may act “in breach of an allegiance or duty to the United States.” Parry asks, “Who has ‘an allegiance or duty to the United States’ if not an American citizen? That provision would not presumably apply to Osama bin Laden or al-Qaeda, nor would it apply generally to foreign citizens. This section of the law appears to be singling out American citizens.” If an American citizen is charged with a crime under the MCA, that citizen, like the foreign nationals currently laboring under the weight of the law, cannot challenge their detention and charges under the habeas corpus provisions of US law, and cannot expect a fair trial. They will not be given the chance to appeal their convictions until they are prosecuted, convicted, and sentenced. And since the MCA defendant has no right to a “speedy trial,” that defendant cannot expect to be granted an appeal in any reasonable length of time. In effect, an American citizen, like a foreign national charged under the MCA, can be imprisoned indefinitely without recourse to the US judiciary.
Potential to Jail Media Leakers and Reporters - One aspect of the MCA that has not been widely discussed, Parry notes, is the provision that would allow the incarceration of “any person” who “collects or attempts to collect information by clandestine means or while acting under false pretenses, for the purpose of conveying such information to an enemy of the United States.” That provision is tremendously vague, and could easily be stretched to fit, for example, the whistleblowers who revealed the existence of the NSA’s warrantless wiretapping program to the Times (see December 15, 2005) and the reporters and editors who published the story based on those revelations. [Consortium News, 10/19/2006] Six months later, a Justice Department lawyer will confirm that the Bush administration believes MCA does indeed apply to US citizens (see February 1, 2007).

Entity Tags: Osama bin Laden, George W. Bush, Al-Qaeda, Military Commissions Act, New York Times, US Department of Justice, Robert Parry

Timeline Tags: Civil Liberties

After an investigation into whether an Israeli lobbying organization improperly tried to influence House Minority Leader Nancy Pelosi (D-CA) into naming Jane Harman (D-CA) as the chairman of the House Intelligence Committee (see Summer 2005 and October 2005) becomes public knowledge, Harman calls the allegations “irresponsible, laughable, and scurrilous.” Former Solicitor General Theodore Olson, a Republican just hired by Harman to represent her in the matter, tells Time reporter Timothy Burger: “Congresswoman Harman has asked me to follow up on calls you’ve had. She is not aware of any such investigation, does not believe that it is occurring, and wanted to make sure that you and your editors knew that as far as she knows, that’s not true.… No one from the Justice Department has contacted her.” Burger notes that “[i]t is not, however, a given that Harman would know that she is under investigation.” Olson confirms that Harman hired him because even though she doesn’t believe the media reports of the investigation, she takes the possibility seriously. The American Israel Public Affairs Committee (AIPAC), allegedly Harman’s partner in the scheme, also denies any wrongdoing, and says it takes no position on the question of who wins the committee assignment, which was perceived to be a contest between Harman and fellow committee member Alcee Hastings (D-FL). AIPAC spokesman Patrick Dorton says: “Both Congressman Hastings and Congresswoman Harman are strong leaders on issues of importance to the pro-Israel community and would be exemplary Democratic leaders for the House intelligence committee. AIPAC would never engage in a quid pro quo in relation to a federal investigation or any federal matter and the notion that it would do so is preposterous. AIPAC is not aware that the Justice Department is looking into issues involving the intelligence committee, and has not been asked any questions or contacted by the government on this matter, but certainly would cooperate with any inquiry.” Dorton adds that AIPAC has previously been assured that the organization and its current employees are not being investigated. [Time, 10/20/2006]

Entity Tags: US Department of Justice, Alcee Hastings, American Israel Public Affairs Committee, House Intelligence Committee, Jane Harman, Nancy Pelosi, Theodore (“Ted”) Olson, Timothy Burger, Patrick Dorton

Timeline Tags: Civil Liberties

Vice President Cheney linked the NSA’s warrantless surveillance program to the case of 9/11 hijackers Khalid Almihdhar and Nawaf Alhazmi.Vice President Cheney linked the NSA’s warrantless surveillance program to the case of 9/11 hijackers Khalid Almihdhar and Nawaf Alhazmi. [Source: White House]Vice President Dick Cheney justifies an NSA program for warrantless surveillance of conversations between the US and other countries by referring to communications between 9/11 hijackers Khalid Almihdhar and Nawaf Alhazmi in the US and an al-Qaeda communications hub in Yemen (see Early 2000-Summer 2001). The calls were intercepted by the NSA, but this did not help the US roll up the plot. Echoing remarks previously made by President Bush (see December 17, 2005), Cheney says: “If you’ll recall, the 9/11 Commission focused criticism on the nation’s inability to uncover links between terrorists at home and terrorists overseas [note: the 9/11 Commission’s final report does not actually say this (see December 17, 2005)]. The term that was used is ‘connecting the dots’—and the fact is that one small piece of data might very well make it possible to save thousands of lives. If this program had been in place before 9/11, we might have been able to prevent it because we had two terrorists living in San Diego, contacting terrorist-related numbers overseas.” [Office of the Vice President, 8/25/2006] Before 9/11, the NSA was entitled to pass on information about the calls to the FBI, but did not do so, even though the FBI had specifically asked for information about calls between the communications hub in Yemen and the US (see Late 1998 and (Spring 2000)). Various explanations for this failure are offered after 9/11 (see Summer 2002-Summer 2004 and March 15, 2004 and After).

Entity Tags: National Security Agency, Richard (“Dick”) Cheney

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

MSNBC reports that Mohammed al-Khatani, the alleged would-be twentieth 9/11 hijacker, will likely never be put on trial. A US army investigation concluded that he “was forced to wear a bra. He had a thong placed on his head. He was massaged by a female interrogator who straddled him like a lap dancer. He was told that his mother and sisters were whores. He was told that other detainees knew he was gay. He was forced to dance with a male interrogator. He was strip-searched in front of women. He was led on a leash and forced to perform dog tricks. He was doused with water. He was prevented from praying. He was forced to watch as an interrogator squatted over his Koran.” Mark Fallon, head of the Pentagon’s Criminal Investigation Task Force, claims that he was told by other officials several times not to worry building a legal case against al-Khatani since there would never be a trial against him due to the interrogation techniques used on him. [MSNBC, 10/26/2006] According to al-Khatani’s lawyer, al-Khatani appears to be a broken man, who “painfully described how he could not endure the months of isolation, torture and abuse, during which he was nearly killed, before making false statements to please his interrogators.” [Time, 3/3/2006]

Entity Tags: Mohamed al-Khatani

Timeline Tags: Torture of US Captives

Vice President Dick Cheney says foreign terrorists in Iraq are launching a spate of attacks in order to influence the upcoming US midterm elections—in essence, accusing terrorists of trying to sway Americans to vote for Democrats. Al-Qaeda and other terror groups active in Iraq are trying to “break the will of the American people.” He continues, “They’re very sensitive to the fact that we’ve got an election scheduled.” He goes on to claim that terror attacks in Iraq are being scheduled to coincide with US election events and to garner maximum media coverage to impact the elections. He provides no evidence for this. October saw one of the highest death tolls for US forces since the invasion of March 2003. Republicans fear that bad news from Iraq will cost them seats in the US Congress. Pentagon spokesman Eric Ruff echoes Cheney’s statements, saying that Islamist militants are trying to “increase opposition to the war and have an influence against the president.” White House officials add that the US media is deliberately focusing on the “bad” news of casualties, carnage, and terrorist attacks, and failing to cover the “good” news coming out of the occupation. The White House and the Pentagon are launching a new propaganda effort to use “new media” outlets such as blogs to spread their message and counter what they say is a sophisticated propaganda effort by Islamists to manipulate the news and affect the US elections. [BBC, 10/31/2006]

Entity Tags: US Department of Defense, Al-Qaeda, Bush administration (43), Eric Ruff, Richard (“Dick”) Cheney

Timeline Tags: Iraq under US Occupation

After learning that a new book published by Pakistani President Pervez Musharraf (see September 25, 2006) says that alleged 9/11 mastermind Khalid Shaikh Mohammed (KSM) either killed American reporter Daniel Pearl or played a leading role in the murder (see January 31, 2002), the lawyer for Saeed Sheikh, one of the kidnappers, says he plans to use the book in an appeal. Sheikh was found guilty of the kidnapping (see April 5, 2002), but the lawyer, Rai Bashir, says, “I’m going to submit an application that [Musharraf’s] book be used as a piece of evidence. The head of state has exonerated [Sheikh and his accomplices].” [Christian Science Monitor, 11/8/2006] Bashir will also make similar comments after KSM says that he carried out the murder in early 2007 (see March 10, 2007): “In the next court hearing, I am going to submit the recent statement by Khalid Shaikh Mohammed in which he said he himself beheaded the US journalist… From day one, my contention was that the evidence presented in court was not strong enough to lead to the conviction of my client.” [Guardian, 3/19/2007] Sheikh was convicted in July 2002 (see July 15, 2002). As of late July 2005, the appeal proceedings had been adjourned thirty-two times. [International Herald Tribune, 7/29/2005] As of 2007, his appeal process is still in limbo.

Entity Tags: Pervez Musharraf, Rai Bashir, Saeed Sheikh

Timeline Tags: Complete 911 Timeline

Page 15 of 18 (1749 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike