!! History Commons Alert, Exciting News

Context of 'March 3, 2009: Law Expert: Memos Prove US a ‘Dictatorship’ for Last Seven Years of Bush Presidency'

This is a scalable context timeline. It contains events related to the event March 3, 2009: Law Expert: Memos Prove US a ‘Dictatorship’ for Last Seven Years of Bush Presidency. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 8 (762 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8 | next

After the failure of the US federal government under the Articles of Confederation, the men working to shape the new American government—later termed the “Founders”—determine that the new government must have a president with power equal to that of Congress and the Supreme Court. The federal government itself has far more power under the new Constitution than it had under the Articles, but many Founders worry that the government will have, or take upon itself, the power to constrain or even destroy individual rights and freedoms. The government, therefore, will have strict limitations on its functions, and will be divided into three co-equal branches. Debate over whether the new government should have a single president or an executive council rages, but eventually the Founders decide that a single president could best act decisively in times of crisis. However, Congress has the strength to curtail presidential power via legislation and oversight. One of the Founders’ most crucial decisions is to give Congress, not the president, the power to declare war and commit military troops to battle. Congress must also authorize any military actions that fall short of actual war, the creation and maintenance of armies, and exercise control over how the president can call on the armed forces in emergencies. Finally, the Founders, all too aware that until the English Revolution of 1688, the King of England could use his “prerogative powers” to dispense with a law that he felt unnecessary, move to ensure that the US president cannot use a similar usurpation of power to override Congressional legislation, writing in the Constitution that the president must “take care that the laws be faithfully executed.” In 2007, reporter Charlie Savage, drawing on James Madison’s Federalist Papers, will write: “Knowing that it was inevitable that from time to time foolish, corrupt, or shortsighted individuals would win positions of responsibility in the government, the Founders came up with a system that would limit anyone’s ability to become a tyrant or to otherwise wreck the country. And over the next century and a half, the system worked as the Founders had designed it to work.” [Savage, 2007, pp. 14-16]

Entity Tags: James Madison, Charlie Savage

Timeline Tags: Civil Liberties

James Madison, one of the founders of the American system of constitutional government (see 1787), writes of the importance of Congress, not the president, retaining the power to send the nation to war. “Those who are to conduct a war cannot, in the nature of things, be proper or safe judges,” he writes, “whether a war ought to be commenced, continued, or concluded. They are barred from the latter functions by a great principle in free government, analagous to that which separates the sword from the purse, or the power from executing from the power of enacting laws.” [Savage, 2007, pp. 19]

Entity Tags: James Madison

Timeline Tags: Civil Liberties

Senator Benjamin Tillman, an ardent segregationist who once said, ‘My Democracy means white supremacy.’ Senator Benjamin Tillman, an ardent segregationist who once said, ‘My Democracy means white supremacy.’ [Source: Black Americans in Congress]President Theodore “Teddy” Roosevelt signs the Tillman Act into law. The Act prohibits monetary contributions to national political campaigns by corporations and national banks. Roosevelt, dogged by allegations that he had accepted improper donations during his 1904 presidential campaign, has pushed for such restrictions since he took office (see August 23, 1902 and December 5, 1905). [Federal Elections Commission, 1998; Center for Responsive Politics, 2002 pdf file; Moneyocracy, 2/2012] Senator Benjamin Tillman (D-SC), later described by National Public Radio as a “populist and virulent racist,” sponsored the bill. [National Public Radio, 2012] In 1900, Tillman was quoted as saying about black voters: “We have done our level best. We have scratched our heads to find out how we could eliminate every last one of them. We stuffed ballot boxes. We shot them. We are not ashamed of it.” [Atlas, 2010, pp. 205] Unfortunately, the law is easily circumvented. Businesses and corporations give employees large “bonuses” with the understanding that the employee then gives the bonus to a candidate “endorsed” by the firm. Not only do the corporations find and exploit this loophole, they receive an additional tax deduction for “employee benefits.” The law will be amended to cover primary elections in 1911 (see 1911). [Campaign Finance Timeline, 1999]

Entity Tags: Benjamin Tillman, Theodore Roosevelt, Tillman Act

Timeline Tags: Civil Liberties

The German Reich Ministry of Justice issues a secret memo following a meeting of several Justice Ministry lawyers and public prosecutors with senior Gestapo officers. The participants discuss the fact that Germany has been on a war footing for years, and the leaders’ worry that the citizenry is riddled with sleeper cells of subversives. The solution: detaining and torturing subversives. It is unclear whether torture will be used to terrorize other subversives, to extract information, or produce confessions. German law enforcement officials are balky at applying “more rigorous interrogation” techniques. Though some judges seem unmoved by defendants appearing in court with obvious marks of torture upon their bodies, the law enforcement officers are bureaucrats in a system that has always respected the rule of law and the Hitler government was originally elected on a law-and-order platform. The memo is the product of the top officials in the Gestapo and Justice Ministry, and lays out detailed instructions as to when torture techniques can be applied, the specific equipment used in such interrogations, and how many times particular techniques could be used on certain categories of detainees. Perhaps most importantly, the memo promises immunity from prosecution to any German interrogator who follows the rules as laid down in the memo.
Specific Instructions - It reads in part: “At present, we thus have a situation which cannot continue: a deficient sense of what is right on the part of judicial officers; an undignified position for police officers, who try to help matters by foolish denials [that torture has taken place in court proceedings].… [I]nterrogations of this kind [torture] may be undertaken in cases where charges involve the immediate interests of the state.… chiefly treason and high treason. Representatives of the Gestapo expressed the opinion that a more rigorous interrogation could also be considered in cases of Jehovah’s Witnesses, explosives, and sabotage.… As a general principle, in more rigorous interrogations only blows with a club on the buttocks are permissible, up to 25 such blows. The number is to be determined in advance by the Gestapo.… Beginning with the tenth blow, a physician must be present. A standard club will be designated, to eliminate all irregularities.” Gestapo Headquarters in Berlin must give permission for more “rigorous interrogation[s],” the memo continues.
Drawing Parallels to Bush Administration Torture - The memo will be the subject of a 2009 article by Shayana Kadidal, the senior managing attorney of the Guantanamo project at the Center for Constitutional Rights. Kadidal will draw parallels between the Nazi torture authorization and similar legal justifications issued by the American government after the 9/11 attacks (see March 2, 2009 and April 21, 2009). Kadidal will write: “I realize that, as a matter of principle, there is a strong bias against making Nazi analogies to any events happening in our modern world.… But here we have: (1) a system set up to allow torture on certain specific individual detainees, (2) specifying standardized equipment for the torture (apparently down to the exact length of the club to be used), along with physician participation to ensure survival of the victim for the more several applications, (3) requiring prior approval of the use of torture from the central authorities in the justice department and intelligence agency in the capital, so as to ensure that (6) the local field officers actually carrying out the abuse are immune from prosecution.” [Huffington Post, 4/21/2009]

Entity Tags: Gestapo, Shayana Kadidal, German Reich Ministry of Justice

Timeline Tags: Torture of US Captives

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

A B-29 bomber similar to the one that crashed in Georgia.A B-29 bomber similar to the one that crashed in Georgia. [Source: Global Security (.org)]A test flight for the Air Force’s Project Banshee, located at Robins Air Force Base in Georgia, is set for 8:30 a.m. Banshee is an attempt begun in 1946 to develop and deploy a long-range missile ahead of both the Soviet Union and rival US military branches. The airplane used in the test flight crashes less than an hour into its flight, killing 9 of the 13 aboard.
Maintenance Problems - The plane assigned for the flight is a B-29 Stratofortress, a bomber made famous by its delivery of the atomic bombs to Hiroshima and Nagasaki at the end of World War II. B-29s are notoriously difficult to fly and maintain: their four wing-mounted engines almost routinely overheat and catch fire, causing engine shutdowns, sudden drops in altitude, and, often, crashes. The engines’ eighteen cylinders lack sufficient airflow to keep them cool, and the overheating often causes the crankcases, made of light but highly flammable magnesium, to burst into flames. Like so many of its brethren, the plane has suffered its share of maintenance issues, and is flying without numerous recommended maintenance and repair tasks being performed. Just five days before, it had been designated “red cross”—grounded and unfit for service. It was allowed to fly through an “exceptional release” signed by the squadron commander.
Crew Difficulties - The flight is moved back to the afternoon after some crew members fail to show up on time, and to allow last-minute repairs to be made. By takeoff, the flight crew is assembled: Captain Ralph Erwin; co-pilot Herbert W. Moore; flight engineer Earl Murrhee; First Lieutenant Lawrence Pence, Jr, the navigator; Sergeant Walter Peny, the left scanner; Sergeant Jack York, the right scanner; Sergeant Melvin Walker, the radio operator; and Sergeant Derwood Irvin, manning the bombsight and autopilot. The crew is joined by civilian engineers assigned to Banshee: Al Palya and Robert Reynolds from RCA, William Brauner and Eugene Mechler from the Franklin Institute, and Richard Cox from the Air Force’s Air Materiel Command. In violation of standard procedure, none of the crew or the civilians are briefed on emergency procedures, though Murrhee will later say that the crew were all familiar with the procedures; he is not so sure about the civilians, though he knows Palya and Reynolds have flown numerous test flights before. In another violation of Air Force regulations, none of the flight crew have worked together before. As author Barry Siegel will note in 2008, “The pilot, copilot, and engineer had never shared the same cockpit before.”
Engine Fire and Crash - Less than an hour into the flight, one engine catches fire and two others lose power, due to a combination of maintenance failures and pilot errors. The civilians have some difficulty getting into their parachutes as Erwin and Moore attempt to regain control of the aircraft. Four of the crew and civilians manage to parachute from the plane, but most remain on board as the airplane spirals into the ground on the edge of the Okefenokee Swamp, near Waycross, Georgia. Crew members Moore, Murrhee, and Peny survive, as does a single civilian, Mechler. Four others either jump at too low an altitude or die when their chutes foul the airplane; the other five never manage to leave the plane and die on impact.
Widows File Suit - Several of the civilians’ widows will file suit against the US Air Force, asserting that their husbands died because of Air Force negligence (see June 21, 1949). Their lawsuit will eventually become US v. Reynolds, a landmark Supreme Court case and the underpinning for the government’s claims of state secrets privilege (see March 9, 1953). [Siegel, 2008, pp. 3, 14-17, 33-49]

Entity Tags: Derwood Irvin, Barry Siegel, US Department of the Air Force, Walter Peny, William Brauner, Air Materiel Command, Richard Cox, Ralph Erwin, Robert Reynolds, Al Palya, Radio Corporation of America, Eugene Mechler, Earl Murrhee, Franklin Institute, Project Banshee, Melvin Walker, Lawrence Pence, Jr, Herbert W. Moore, Jr, Jack York

Timeline Tags: Civil Liberties

A three-judge federal appeals court unanimously rejects the government’s claim of unfettered executive privilege and secrecy in regards to classified documents (see October 19, 1951). In an opinion written by Judge Albert Maris, the court finds that the government’s claim that the judiciary can never compel the executive branch to turn over classified documents to be without legal merit. The plaintiffs in the case, three widows who lost their husbands in the crash of a B-29 bomber carrying classified materials (see June 21, 1949), had a compelling need for the documents in question, the downed B-29 accident reports, to further their case, Maris writes (see October 12, 1950).
No Legal Basis for Claim of Privilege - Maris goes further than the parameters of the single lawsuit, writing: “[W]e regard the recognition of such a sweeping privilege… as contrary to a sound public policy. The present cases themselves indicate the breadth of the claim of immunity from disclosure which one government department head has already made. It is but a small step to assert a privilege against any disclosure of records merely because they might prove embarrassing to government officials. Indeed, it requires no great flight of imagination to realize that if the government’s contentions in these cases were affirmed, the privilege against disclosure might gradually be enlarged… until as is the case in some nations today, it embraced the whole range of government activities.… We need to recall in this connection the words of [Revolution-era jurist] Edward Livingston: ‘No nation ever yet found any inconvenience from too close an inspection into the conduct of its officers, but many have been brought to ruin, and reduced to slavery, by suffering gradual imposition and abuses, which were imperceptible, only because the means of publicity had not been secured.’” He also quotes Revolutionary War figure Patrick Henry, who said, “[T]o cover with the veil of secrecy the common routine of business is an abomination in the eyes of every intelligent man and every friend to his country.”
Rejecting Claim of 'State Secrets' - Maris is even less respectful of the government’s claim of a “state secrets” privilege. He notes that the government did not make that claim until well into the lawsuit proceedings (see October 19, 1951), indicating that it was a “fallback” argument used after the original government arguments had failed. Maris is also troubled, as author Barry Siegel later writes, in the government’s “assertion of unilateral executive power, free from judicial review, to decide what qualified as secret.” The lower court judge’s ruling that he alone should be given the documents for review adequately protected the government’s security interests, Maris writes: “[But] the government contends that it is within the sole province of the secretary of the Air Force to determine whether any privileged material is contained in the documents and that his determination of this question must be accepted by the district court without any independent consideration.… We cannot accede to this proposition. On the contrary, we are satisfied that a claim of privilege against disclosing evidence… involves a justiciable question, traditionally within the competence of the courts.… To hold that the head of an executive department of the government in a [law]suit to which the United States is a party may conclusively determine the government’s claim of privilege is to abdicate the judicial function to infringe the independent province of the judiciary as laid down by the Constitution.”
Fundamental Principle of Checks and Balances - Maris continues: “The government of the United States is one of checks and balances. One of the principal checks is furnished by the independent judiciary which the Constitution established. Neither the executive nor the legislative branch of the government may constitutionally encroach upon the field which the Constitution has reserved for the judiciary.… Nor is there any danger to the public interest in submitting the question of privilege to the decision of the courts. The judges of the United States are public officers whose responsibilities under the Constitution is just as great as that of the heads of the executive departments.”
Government Appeal - The Justice Department will appeal the ruling to the US Supreme Court (see March 1952 and March 9, 1953). [Siegel, 2008, pp. 153-156]

Entity Tags: Albert Maris, US Department of Justice, Barry Siegel, US Supreme Court

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

The US Supreme Court rules that the federal government cannot seize the nation’s steel mills. In April, President Truman, fearing a nationwide strike that could impact the US war effort in Korea, ordered the seizure of all US steel mills; the lawsuit that resulted, Youngstown Sheet & Tube Co. v. Sawyer, quickly made its way to the Supreme Court.
Rejection of 'Inherent Powers' Claim - During oral arguments, the justices grilled Acting Attorney General Philip Perlman, demanding to know what statutes he had relied on for his arguments and asserting that the president had limitations both on his emergency wartime powers and on his ability to claim that he is the “sole judge” of the existence of, and remedies for, an emergency. The justices are not convinced by the government’s arguments for the president’s “inherent powers.” They are also troubled by repeated refusals of the government to provide facts and documentary backing for its legal arguments, and its reliance instead on claims of “national security.” The attorney for the steel industry, John Davis, quoted Thomas Jefferson in his argument: “In questions of power, let no more be said of confidence in man, but bind him down from mischief by the chains of the Constitution.” Justice William O. Douglas noted that if the government’s claims were valid, there would be “no more need for Congress.”
Court Rejects Argument - In a 6-3 vote, the Court rules that the president has no inherent power to seize the steel mills. Writing for the majority, Justice Hugo Black states: “In the framework of our Constitution, the president’s power to see that the laws are faithfully executed refutes the idea that he is to be a lawmaker.… The founders of this nation entrusted the lawmaking power to the Congress alone in both good and bad times.… This is a job for the nation’s lawmakers.” In a concurring opinion, Justice Robert Jackson writes, “No penance would ever expiate the sin against free government of holding that a president can escape control of executive powers by law through assuming his military role.” In his dissent, Chief Justice Fred Vinson (see March 1952) argues that “the gravity of the emergency” overrides the Constitutional arguments accepted by the majority of the Court. “Those who suggest that this is a case involving extraordinary powers should be mindful that these are extraordinary times. A world not yet recovered from the devastation of World War II has been forced to face the threat of another and more terrifying global conflict.” [Savage, 2007, pp. 123; Siegel, 2008, pp. 163-164] In 2007, reporter and author Charlie Savage will observe that the Youngstown decision “turned out to be only a pause in the movement toward an increasingly authoritarian presidency.” [Savage, 2007, pp. 19]

Entity Tags: William O. Douglas, John Davis, Hugo Black, Charlie Savage, Fred Vinson, Harry S. Truman, Philip Perlman, US Supreme Court

Timeline Tags: Civil Liberties

Lawyers make their opening arguments before the Supreme Court in the case of US v Reynolds, the lawsuit that finds the government had no overarching right to unilaterally refuse to deliver classified documents in the course of a wrongful death lawsuit against the government (see December 11, 1951). The government has appealed the appellate court ruling to the Supreme Court (see March 1952). Because four of the nine justices had voted not to hear the case—in essence to let the appellate court ruling stand—the defense is cautiously optimistic about the Court’s decision.
Judiciary Has No Right to Interfere with Powers of the Executive, Government Argues - Acting Solicitor General Robert Stern tells the Court that the appellate judges’ decision, written by Judge Albert Maris, “is an unwarranted interference with the powers of the executive,” and that the decision forced the government to choose “whether to disclose public documents contrary to the public interest [or] to suffer the public treasury to be penalized” (a reference to the decision to award the plaintiffs monetary damages—see October 12, 1950). The judiciary “lack[s] power to compel disclosure by means of a direct demand [as well as] by the indirect method of an order against the United States, resulting in judgment when compliance is not forthcoming.”
Executive Has No Right to Unilaterally Withhold Information, Defense Counters - Stern’s arguments are countered by those of the plaintiffs’ lawyer, Charles Biddle, who writes, “We could rest our case with confidence on the clear opinion of Judge Maris,” but continues by arguing that if the government asserts a claim of executive privilege on the basis of national security, it must make the documents available to the Court for adjudication, or at least provide enough information for the Court to judge whether the documents present in fact a threat to national security if disclosed. This is particularly true, Biddle argues, “where there is no showing that the documents in question contain any military secret” (Biddle is unaware that the documents’ classification status had been reduced two years before—see September 14, 1950). “The basic question here is whether those in charge of the various departments of the government may refuse to produce documents properly demanded… in a case where the government is a party (see June 21, 1949), simply because the officials themselves think it would be better to keep them secret, and this without the Courts having any power to question the propriety of such decision.… In other words, say the officials, we will tell you only what we think it is in the public interest that you should know. And furthermore, we may withhold information not only about military or diplomatic secrets, but we may also suppress documents which concern merely the operation of the particular department if we believe it would be best, for purposes of efficiency or morale, that no one outside of the department, not even the Court, should see them.”
No Basis for Claims of Military Secrets - Biddle argues that because of responses he has received to his demands over the course of this lawsuit, he is relatively sure there are no military secrets contained within them. “[T]he proof is to the contrary,” he says, and goes on to say that had the Air Force disclosed from the outset that the plane crash, the fatal accident that sparked the original lawsuit (see October 6, 1948), was probably caused by pilot error and not by random chance, the plaintiffs may have never needed to ask for the disclosure of the documents in question, the accident reports on the crash (see October 18, 1948). “The secretary [of the Air Force]‘s formal claim of privilege said that the plane at the time was engaged in a secret mission and that it carried confidential equipment,” Biddle says, “but nowhere was it asserted that either had anything to do with the accident. The whole purpose of the demand by the respondents was for the purpose of finding out what caused the accident.… They were not in the least interested in the secret mission or equipment.” [Siegel, 2008, pp. 165-170]

Entity Tags: US Supreme Court, Albert Maris, Robert Stern, US Department of the Air Force, Charles Biddle

Timeline Tags: Civil Liberties

In their regular Saturday conference, the nine Supreme Court justices discuss the issues and arguments surrounding US v Reynolds (see October 21, 1952). According to the notes from the discussion, Chief Justice Fred Vinson, a strong advocate for expansive executive powers (see March 1952), says the case “boils down to Executive Branch determine privilege.” Other notes by Justice William O. Douglas suggest that Vinson isn’t convinced that the US must “be forced to pay for exercising its privilege” (see October 12, 1950). A straw vote taken at the end of the discussion shows five justices in favor of the government’s position to unilaterally withhold classified documents—overturning the appellate court decision (see December 11, 1951), and four in favor of allowing the decision to stand. [Siegel, 2008, pp. 171]

Entity Tags: Fred Vinson, US Supreme Court, William O. Douglas

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

In the case of United States v. Auto Workers, the Supreme Court reverses a lower court’s dismissal of an indictment against a labor union accused of violating federal laws prohibiting corporations and labor unions from making contributions or expenditures in federal elections (see June 23, 1947). Justice Felix Frankfurter writes the majority opinion; Chief Justice Earl Warren and Justices William O. Douglas and Hugo Black dissent. In a 5-3 decision, the Court finds the International Union United Automobile, Aircraft, and Agricultural Implement Workers of America liable for its practice of using union dues to sponsor television commercials relating to the 1954 Congressional elections. [UNITED STATES v. AUTO. WORKERS, 2011; Moneyocracy, 2/2012] Law professor Allison R. Hayward will later write that in her opinion the Court finding created “a fable of campaign finance reform… dictated by political opportunism. Politicians used reform to exploit public sentiment and reduce rivals’ access to financial resources.… [J]udges should closely examine campaign finance regulation and look for the improper use of legislation for political gain instead of simply deferring to Congress. Undue deference to the Auto Workers fable of reform could lead to punishment for the exercise of political rights. Correcting the history is thus essential to restoring proper checks on campaign finance legislation.” Hayward will argue that Frankfurter used a timeline of Congressional efforts to curb and reform campaign finance practices as an excuse to allow powerful political interests to exert restrictions on political opponents with less access to large election finance contributions. The case is used uncritically, and sometimes unfairly, to influence later campaign reform efforts, Hayward will argue. [Hayward, 6/17/2008 pdf file]

Entity Tags: US Supreme Court, Earl Warren, Allison R. Hayward, Felix Frankfurter, International Union United Automobile, Aircraft, and Agricultural Implement Workers of America, William O. Douglas, Hugo Black

Timeline Tags: Civil Liberties

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]

Entity Tags: Malcolm Little, Central Intelligence Agency, Church Committee, Lew Allen, National Security Agency, Martin Luther King, Jr., Office of Security Services, Joan Baez

Timeline Tags: Civil Liberties

The NSA launches the first of seven satellites, code-named “Canyon,” that can pick up various types of voice and data traffic from Earth orbit. Canyon will lead to a more sophisticated satellite intelligence system, code-named “Rhyolite” (later “Aquacade”—see Early 1970s). [Federation of American Scientists, 7/17/1997]

Entity Tags: Rhyolite, National Security Agency, Canyon

Timeline Tags: Civil Liberties

After Richard Nixon wins the presidency (see November 5, 1968), he orders a review of the Sentinel anti-ballistic missile program (see September 18, 1967). It is suspended and later reintroduced in a more modest form under the moniker “Safeguard.” Nixon says the program will protect “our land-based retaliatory forces against a direct attack by the Soviet Union.” Safeguard has serious conception and design flaws, and is never completely deployed; when the 1972 Anti-Ballistic Missile Treaty is signed with the Soviet Union (see May 26, 1972), the program is scaled back and eventually terminated by Congress. Author Stephen Schwartz will later write that the Sentinel/Safeguard program is “the only time that Congress has successfully voted down a major strategic nuclear weapons program supported by the executive branch.” [Schwartz, 1998, pp. 286-288; Federation of American Scientists, 1/15/2008]

Entity Tags: Richard M. Nixon, Sentinel, Stephen Schwartz, Safeguard

Timeline Tags: US International Relations

November 17, 1969: SALT I Talks Begin

Impelled in part by anti-ballistic missiles deployed in both the US and the Soviet Union (see September 18, 1967 and 1969-1976), the two nuclear superpowers begin the first round of Strategic Arms Limitation Talks, later known as SALT I. The negotiations are designed to limit both anti-ballistic missile systems and offensive nuclear arsenals. An agreement will be signed three years later (see May 26, 1972 and May 26, 1972). [Federation of American Scientists, 1/15/2008]

Entity Tags: Sentinel, Safeguard

Timeline Tags: US International Relations

The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). [Federation of American Scientists, 7/17/1997]

Entity Tags: National Security Agency, Echelon, Rhyolite, Chalet, Government Communications Headquarters, Owen Lewis, Canyon

Timeline Tags: Civil Liberties

With the arrival of the first Americans at Diego Garcia, the largest atoll of the Chagos Archipelago, the island’s remaining residents are told they must leave. [BBC, 11/3/2000; CBS News, 6/13/2003; CNN, 6/18/2003] Recalling the massive forced relocation, Marcel Moulinie, the manager of a coconut plantation on the island, tells CBS 60 minutes in 2003 that he was ordered to ship the people out. “Total evacuation. They wanted no indigenous people there,” Marcel Moulinie explains. “When the final time came and the ships were chartered, they weren’t allowed to take anything with them except a suitcase of their clothes. The ships were small and they could take nothing else, no furniture, nothing.” To make it clear to residents that there would be no compromise, Sir Bruce Greatbatch, governor of the Seychelles, orders the killing of the Chagossians’ pets, which are rounded up into a furnace and gassed with exhaust fumes from American military vehicles. [CBS News, 6/13/2003; CNN, 6/18/2003; ZNet, 10/22/2004] “They put the dogs in a furnace where the people worked,” Lisette Talatte, a Chagossian, will later tell investigative journalist John Pilger. “[W]hen their dogs were taken away in front of them our children screamed and cried.” [ZNet, 10/22/2004] Marie Therese Mein, another Chagossian, later says US officials threatened to bomb them if they did not leave. [Self-Determination News, 1/28/2002; ZNet, 10/22/2004] And the Washington Post interviews one man in 1975 who says he was told by an American official, “If you don’t leave you won’t be fed any longer.” [Washington Post, 9/9/1975] The Chagossians are first shipped to the nearby islands of Peros Banhos and Salomon and then 1,200 miles away to Mauritius and the Seychelles. [BBC, 11/3/2000; CBS News, 6/13/2003; CNN, 6/18/2003] Before the eviction, the Chagossians were employed, grew their own fruit and vegetables, raised poultry and ducks, and fished. [Sunday Times (London), 9/21/1975; Self-Determination News, 1/28/2002; British Royal Courts of Justice, 10/9/2003; Tribune (Bahamas), 11/17/2003] On the island of Diego Garcia, there was a church, a school as well as a few stores. [Sunday Times (London), 9/21/1975] But now, after being removed from their homes and dumped into foreign lands without compensation or resettlement assistance, they are forced to live in poverty. [CBS News, 6/13/2003; CNN, 6/18/2003] The uprooted Chagossians find shelter in abandoned slums, which have no water or electricity. [Sunday Times (London), 9/21/1975; Church Times, 1/7/2005] Many commit suicide during and after the eviction campaign. [ZNet, 10/22/2004] Lisette Taleti loses two of her children. [Guardian, 5/12/2006] Describing the plight of the Chagossians at this time, the British High Court writes in 2003: “The Ilois [Chagossians] were experienced in working on coconut plantations but lacked other employment experience. They were largely illiterate and spoke only Creole. Some had relatives with whom they could stay for a while; some had savings from their wages; some received social security, but extreme poverty routinely marked their lives. Mauritius already itself experienced high unemployment and considerable poverty. Jobs, including very low paid domestic service, were hard to find. The Ilois were marked by their poverty and background for insults and discrimination. Their diet, when they could eat, was very different from what they were used to. They were unused to having to fend for themselves in finding jobs and accommodation and they had little enough with which to do either. The contrast with the simple island life which they had left behind could scarcely have been more marked.”

Entity Tags: Sir Bruce Greatbatch, Chagossians, Marcel Moulinie, Marie Therese Mein, Lisette Talatte

Timeline Tags: US-Britain-Diego Garcia (1770-2004)

The US and the Soviet Union sign the Anti-Ballistic Missile Systems (ABM) Treaty. It will be ratified by the US Senate in August 1972, and will go into force in October 1972. Originally, the treaty agrees that each nation can have only two ABM deployment areas, located so that those areas cannot provide a nationwide ABM defense or become the basis for developing one. In essence, the ABM Treaty prevents either nation from developing a missile defense system (see March 23, 1983), and allows each country the likelihood of destroying the other with an all-out nuclear barrage. The treaty puts in place the doctrine of MAD, or Mutual Assured Destruction, which states that because both nations can obliterate the other in a nuclear exchange, neither one will trigger such a strike. In 1976, an addendum to the treaty further limits the number of ABM deployment areas from two to one; the Soviets will deploy a rudimentary ABM system around Moscow, but the US never does, and even deactivates its single ABM site near Grand Forks, North Dakota. In 2001, US President George W. Bush will unilaterally withdraw from the treaty (see December 13, 2001 and June 14, 2002). [Federation of American Scientists, 1/15/2008]

Entity Tags: Nixon administration, George W. Bush

Timeline Tags: US International Relations

The US Supreme Court, in what becomes informally known as the “Keith case,” upholds, 8-0, an appellate court ruling that strikes down warrantless surveillance of domestic groups for national security purposes. The Department of Justice had wiretapped, without court warrants, several defendants charged with destruction of government property; those wiretaps provided key evidence against the defendants. Attorney General John Mitchell refused to disclose the source of the evidence pursuant to the “national security” exception to the Omnibus Crime Control and Safe Streets Act of 1968. The courts disagreed, and the government appealed the decision to the Supreme Court, which upheld the lower courts’ rulings against the government in a unanimous verdict. The Court held that the wiretaps were an unconstitutional violation of the Fourth Amendment, establishing the judicial precedent that warrants must be obtained before the government can wiretap a US citizen. [US Supreme Court, 6/19/1972; Bernstein and Woodward, 1974, pp. 258-259] Critics of the Nixon administration have long argued that its so-called “Mitchell Doctrine” of warrantlessly wiretapping “subversives” has been misused to spy on anyone whom Nixon officials believe may be political enemies. [Bernstein and Woodward, 1974, pp. 258-259] As a result of the Supreme Court’s decision, Congress passes the Foreign Intelligence Surveillance Act. [John Conyers, 5/14/2003]
Opinion of Justice Powell - Writing for the Court, Justice Lewis Powell observes: “History abundantly documents the tendency of Government—however benevolent and benign its motives—to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the government attempts to act under so vague a concept as the power to protect ‘domestic security.’ Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent.” [US Supreme Court, 6/19/1972]
Justice Department Wiretapped Reporters, Government Officials - In February 1973, the media will report that, under the policy, the Justice Department had wiretapped both reporters and Nixon officials themselves who were suspected of leaking information to the press (see May 1969 and July 26-27, 1970), and that some of the information gleaned from those wiretaps was given to “Plumbers” E. Howard Hunt and G. Gordon Liddy for their own political espionage operations. [Bernstein and Woodward, 1974, pp. 258-259]
Conyers Hails Decision 30 Years Later - In 2003, Representative John Conyers (D-MI) will say on the floor of the House: “Prior to 1970, every modern president had claimed ‘inherent Executive power’ to conduct electronic surveillance in ‘national security’ cases without the judicial warrant required in criminal cases by the Fourth Amendment to the Constitution. Then Attorney General John Mitchell, on behalf of President Richard Nixon sought to wiretap several alleged ‘domestic’ terrorists without warrants, on the ground that it was a national security matter. Judge [Damon] Keith rejected this claim of the Sovereign’s inherent power to avoid the safeguard of the Fourth Amendment. He ordered the government to produce the wiretap transcripts. When the Attorney General appealed to the US Supreme Court, the Court unanimously affirmed Judge Keith. The Keith decision not only marked a watershed in civil liberties protection for Americans. It also led directly to the current statutory restriction on the government’s electronic snooping in national security cases.” [John Conyers, 5/14/2003]

Entity Tags: Lewis Powell, US Supreme Court, John Mitchell, E. Howard Hunt, US Department of Justice, G. Gordon Liddy, ’Plumbers’, Damon Keith, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

CIA Counterintelligence Director James Angleton.CIA Counterintelligence Director James Angleton. [Source: CI Centre.com]CIA Director James Schlesinger orders an internal review of CIA surveillance operations against US citizens. The review finds dozens of instances of illegal CIA surveillance operations against US citizens dating back to the 1950s, including break-ins, wiretaps, and the surreptitious opening of personal mail. The earlier surveillance operations were not directly targeted at US citizens, but against “suspected foreign intelligence agents operating in the United States.” Schlesinger is disturbed to find that the CIA is currently mounting illegal surveillance operations against antiwar protesters, civil rights organizations, and political “enemies” of the Nixon administration. In the 1960s and early 1970s, CIA agents photographed participants in antiwar rallies and other demonstrations. The CIA also created a network of informants who were tasked to penetrate antiwar and civil rights groups and report back on their findings. At least one antiwar Congressman was placed under surveillance, and other members of Congress were included in the agency’s dossier of “dissident Americans.” As yet, neither Schlesinger nor his successor, current CIA Director William Colby, will be able to learn whether or not Schlesinger’s predecessor, Richard Helms, was asked by Nixon officials to perform such illegal surveillance, though both Schlesinger and Colby disapproved of the operations once they learned of them. Colby will privately inform the heads of the House and Senate Intelligence Committees of the domestic spying engaged in by his agency. The domestic spying program was headed by James Angleton, who is still serving as the CIA’s head of counterintelligence operations, one of the most powerful and secretive bureaus inside the agency. It is Angleton’s job to maintain the CIA’s “sources and methods of intelligence,” including the prevention of foreign “moles” from penetrating the CIA. But to use counterintelligence as a justification for the domestic spying program is wrong, several sources with first-hand knowledge of the program will say in 1974. “Look, that’s how it started,” says one. “They were looking for evidence of foreign involvement in the antiwar movement. But that’s not how it ended up. This just grew and mushroomed internally.” The source continues, speaking hypothetically: “Maybe they began with a check on [Jane] Fonda. They began to check on her friends. They’d see her at an antiwar rally and take photographs. I think this was going on even before the Huston plan” (see July 26-27, 1970 and December 21, 1974). “This wasn’t a series of isolated events. It was highly coordinated. People were targeted, information was collected on them, and it was all put on [computer] tape, just like the agency does with information about KGB agents. Every one of these acts was blatantly illegal.” Schlesinger begins a round of reforms in the CIA, a program continued by Colby. [New York Times, 12/22/1974 pdf file]

Entity Tags: William Colby, Senate Intelligence Committee, Richard Helms, James Angleton, Jane Fonda, Nixon administration, Central Intelligence Agency, James R. Schlesinger, House Intelligence Committee

Timeline Tags: Civil Liberties

In the aftermath of the Watergate scandal (see August 8, 1974), amendments to the Federal Election Campaign Act (FECA—see February 7, 1972) provide the option for full public financing for presidential general elections, matching funds for presidential primaries, and public expenditures for presidential nominating conventions. The amendments also set spending limits on presidential primaries and general elections as well as for House and Senate primaries. The amendments give some enforcement provisions to previously enacted spending limits on House and Senate general elections. They set strict spending guidelines: for presidential campaigns, each candidate is limited to $10 million for primaries, $20 million for general elections, and $2 million for nominating conventions; Senatorial candidates are limited to $100,000 or eight cents per eligible voter, whichever is higher, for primaries, and higher limits of $150,000 or 12 cents per voter for general elections; House candidates are limited to $70,000 each for primaries and general elections. Loans are treated as contributions. The amendments create an individual contribution limit of $1,000 to a candidate per election and a PAC (political action committee) contribution limit of $5,000 to a candidate per election (this provision will trigger what the Center for Responsive Politics will call a “PAC boom” in the late 1970s). The total aggregate contributions from an individual are set at $25,000 per year. Candidates face further restrictions on how much personal wealth they can contribute to their own campaign. The 1940 ban on contributions from government employees and contract workers (see 1940) is repealed, as are the 1971 limitations on media spending. Perhaps most importantly, the amendments create the Federal Election Commission (FEC) to oversee and administer campaign law. (Before, enforcement and oversight responsibilities were spread among the Clerk of the House, the Secretary of the Senate, and the Comptroller General of the United States General Accounting Office (GAO), with the Justice Department responsible for prosecuting violators (see 1967).) The FEC is led by a board of six commissioners, with Congress appointing four of those commissioners and the president appointing two more. The Secretary of the Senate and the Clerk of the House are designated nonvoting, exofficio commissioners. [Federal Elections Commission, 1998; Campaign Finance Timeline, 1999; Center for Responsive Politics, 2002 pdf file] Part of the impetus behind the law is the public outrage over the revelations of how disgraced ex-President Nixon’s re-election campaign was funded, with millions of dollars in secret, illegal corporate contributions being funneled into the Nixon campaign. [Campaign Finance Timeline, 1999; Connecticut Network, 2006 pdf file]

Entity Tags: Center for Responsive Politics, Federal Election Campaign Act of 1972, Federal Election Commission, US Department of Justice

Timeline Tags: Civil Liberties

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” [Dubose and Bernstein, 2006, pp. 34-35]

Entity Tags: Seymour Hersh, US Department of Defense, Ford administration, Edward Levi, Donald Rumsfeld, Church Committee, Richard (“Dick”) Cheney, Philip Buchan, New York Times, Gerald Rudolph Ford, Jr

Timeline Tags: Civil Liberties

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]

Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News

Timeline Tags: Civil Liberties

The Supreme Court case Buckley v. Valeo, filed by Senator James L. Buckley (R-NY) and former Senator Eugene McCarthy (D-WI) against the Secretary of the Senate, Francis R. Valeo, challenges the constitutionality of the Federal Election Campaign Act (FECA—see February 7, 1972 and 1974) on free-speech grounds. The suit also named the Federal Election Commission (FEC) as a defendant. A federal appeals court validated almost all of FECA, and the plaintiffs sent the case to the Supreme Court. The Court upholds the contribution limits set by FECA because those limits help to safeguard the integrity of elections. However, the court overrules the limits set on campaign expenditures, ruling: “It is clear that a primary effect of these expenditure limitations is to restrict the quantity of campaign speech by individuals, groups, and candidates. The restrictions… limit political expression at the core of our electoral process and of First Amendment freedoms.” One of the most important aspects of the Supreme Court’s ruling is that financial contributions to political campaigns can be considered expressions of free speech, thereby allowing individuals to essentially make unrestricted donations. The Court implies that expenditure limits on publicly funded candidates are allowable under the Constitution, because presidential candidates may disregard the limits by rejecting public financing (the Court will affirm this stance in a challenge brought by the Republican National Committee in 1980).
Provisions of 'Buckley' - The Court finds the following provisions constitutional:
bullet Limitations on contributions to candidates for federal office;
bullet Disclosure and record-keeping provisions; and
bullet The public financing of presidential elections.
However, the Court finds these provisions unconstitutional:
bullet Limitations on expenditures by candidates and their committees, except for presidential candidates who accept public funding;
bullet The $1,000 limitation on independent expenditures;
bullet The limitations on expenditures by candidates from their personal funds; and
bullet The method of appointing members of the FEC, holding that as the method stands, it violates the principle of separation of powers.
In May 1976, following the Court’s ruling, the FEC will reconstitute its board with six presidential appointees after Senate confirmation. [Federal Elections Commission, 3/1997; Federal Elections Commission, 1998; Campaign Finance Timeline, 1999; Center for Responsive Politics, 2002 pdf file; Casebriefs, 2012]
No Clear Authors - The opinion is labeled per curiam, a term usually reserved for brief and minor Court decisions when authorship of an opinion is less relevant. It is unclear exactly which Justices write the opinion. Most Court observers believe Justice William Brennan writes the bulk of the opinion, but Brennan’s biographers will later note that sections of the opinion are authored by Chief Justice Warren Burger and Justices Potter Stewart, Lewis Powell, and William Rehnquist. The opinion is an amalgamation of multiple authors, reflecting the several compromises made in the resolution of the decision. [New Yorker, 5/21/2012]
Criticism of 'Buckley' - Critics claim that the ruling enshrines the principle of “money equals speech.” The ruling also says that television and radio advertisements that do not expressly attack an individual candidate can be paid for with “unregulated” funds. This leads organizations to begin airing “attack ads” that masquerade as “issue ads,” ostensibly promoting or opposing a particular social or political issue and avoiding such words as “elect” or “defeat.” [National Public Radio, 2012] In 1999, law professor Burt Neuborne will write: “Buckley is like a rotten tree. Give it a good, hard push and, like a rotten tree, Buckley will keel over. The only question is in which direction.” Neuborne will write that his preference goes towards reasonable federal regulations of spending and contributions, but “any change would be welcome” in lieu of this decision, and even a completely deregulated system would be preferable to Buckley’s legal and intellectual incoherence. [New York Times, 5/3/2010] In 2011, law professor Richard Hasen will note that while the Buckley decision codifies the idea that contributions are a form of free speech, it also sets strict limitations on those contributions. Calling the decision “Solomonic,” Hasen will write that the Court “split the baby, upholding the contribution limits but striking down the independent spending limit as a violation of the First Amendment protections of free speech and association.” Hasen will reflect: “Buckley set the main parameters for judging the constitutionality of campaign finance restrictions for a generation. Contribution limits imposed only a marginal restriction on speech, because the most important thing about a contribution is the symbolic act of contributing, not the amount. Further, contribution limits could advance the government’s interest in preventing corruption or the appearance of corruption. The Court upheld Congress’ new contribution limits. It was a different story with spending limits, which the Court said were a direct restriction on speech going to the core of the First Amendment. Finding no evidence in the record then that independent spending could corrupt candidates, the Court applied a tough ‘strict scrutiny’ standard of review and struck down the limits.” [Slate, 10/25/2011] In 2012, reporter and author Jeffrey Toobin will call it “one of the Supreme Court’s most complicated, contradictory, incomprehensible (and longest) opinions.” [New Yorker, 5/21/2012]

Entity Tags: Federal Election Campaign Act of 1972, Federal Election Commission, James Buckley, Jeffrey Toobin, US Supreme Court, Eugene McCarthy, Lewis Powell, Potter Stewart, Burt Neuborne, William Rehnquist, Warren Burger, Richard L. Hasen, William Brennan

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Amendments to the 1971 Federal Election Campaign Act (FECA—see February 7, 1972 and 1974) passed by Congress after the controversial Buckley ruling by the Supreme Court (see January 30, 1976) bring FECA into conformity with the Court’s decision. The amendments repeal expenditure limits except for presidential candidates who accept public funding, and revise the provisions governing the appointment of commissioners to the Federal Election Commission (FEC). The amendments also limit the scope of PAC fundraising by corporations and labor unions. The amendments limit individual contributions to national political parties to $20,000 per year, and individual contributions to a PAC to $5,000 per year. [Federal Elections Commission, 1998; Center for Responsive Politics, 2002 pdf file] However, the Constitution restricts what Congress can, or is willing, to do, and the amendments are relatively insignificant. [Campaign Finance Timeline, 1999]

Entity Tags: Federal Election Commission, Federal Election Campaign Act of 1972, US Supreme Court

Timeline Tags: Civil Liberties

The US Foreign Intelligence Advisory Board recommended in 1970 that “economic intelligence be considered a function of national security” equal to that of other intelligence. In 1977, the NSA, CIA, and Department of Commerce forms a joint “Office of Intelligence Liaison” (later renamed the “Office of Executive Support”) specifically authorized to handle “foreign intelligence” of interest to the Commerce Department, much of it provided by the NSA. The other countries using Echelon, the NSA’s satellite surveillance program, which include Britain, Canada, Australia, and New Zealand, all operate similar programs. President Bill Clinton will extend this operation in 1993. In 1993, the European company Panavia will be specifically targeted over aircraft sales to the Middle East. In 1994, US companies will be given NSA and CIA intelligence intercepts that help them win contracts in Indonesia. Other information that will be provided by US intelligence to US and allied corporations include information about the emission standards for Japanese automobiles, 1995 trade negotiations over the US importing of Japanese luxury cars, France’s participation in the GATT trade negotiations of 1993, and the 1997 Asian-Pacific Economic Conference. [Science and Technology Assessments Office, 8/15/2000]

Entity Tags: William Jefferson (“Bill”) Clinton, Issuetsdeah, National Security Agency, Office of Executive Support, Panavia

Timeline Tags: Civil Liberties

Interviewer David Frost has a difficult time with his subject, former President Richard Nixon, in the day’s early questioning (see April 6, 1977). Frost attempts to recoup with a line of questioning suggested by his adviser James Reston, Jr., one used in the trial of former Nixon aide John Ehrlichman (see January 1, 1975). Were there no limits to what a president can do, even if the president wants to do something plainly illegal? he asks. Could he do anything despite the law? Burglary? Forgery? Even murder? “If the president does it, that means it’s not illegal,” Nixon retorts. “Never had his imperialism been so baldly stated,” Reston will later reflect. Frost asks if the dividing line between, for example, a police burglary and the murder of an antiwar protester is only the president’s judgment? Nixon agrees, and adds: “There’s nothing specific that the Constitution contemplates in that respect. I haven’t read every word, every jot and every tittle, but I do know this: That it has been, however, argued that as far as a president is concerned, that in war time, a president does have certain extraordinary powers which would make acts that would otherwise be unlawful, lawful if undertaken for the purpose of preserving the nation and the Constitution, which is essential for the rights we’re all talking about.” [Time, 5/30/1977; Reston, 2007, pp. 102-105; Landmark Cases, 8/28/2007]

Entity Tags: Richard M. Nixon, David Frost, James Reston, Jr, John Ehrlichman

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

The Supreme Court, in the case of First National Bank of Boston v. Bellotti, rules 5-4 that corporations have the First Amendment right to make contributions in order to influence political processes. Writing for the majority, Justice Lewis Powell finds that under the recent Buckley ruling (see January 30, 1976), corporate political donations are protected speech. Powell’s opinion finds that a Massachusetts criminal statute prohibiting corporations from spending money for the purpose of “influencing or affecting” voters’ opinions is not legitimate. The split among the justices is unusual, with Powell, a conservative, being joined by two more conservatives, Chief Justice Warren Burger and Potter Stewart, and liberals Harry Blackmun and John Paul Stevens. The four dissenters are liberals William Brennan and Thurgood Marshall, and conservatives Byron White and William Rehnquist. [FIRST NATIONAL BANK OF BOSTON v. BELLOTTI, 2012; Moneyocracy, 2/2012] Rehnquist’s standalone dissent advocates for far stricter controls on corporate spending in elections than most of the other justices’ dissents, with Rehnquist writing that such spending could “pose special dangers in the political sphere.” [Reclaim Democracy, 4/26/1978; FIRST NATIONAL BANK OF BOSTON v. BELLOTTI, 2012]

Entity Tags: Lewis Powell, Byron White, John Paul Stevens, William Rehnquist, Warren Burger, Harry Blackmun, William Brennan, US Supreme Court, Potter Stewart, Thurgood Marshall

Timeline Tags: Civil Liberties

Oil billionaire David Koch runs for vice president on the Libertarian Party ticket. David and his brother Charles are the primary backers of hard-right libertarian politics in the US (see August 30, 2010); Charles, the dominant brother, is determined to tear government “out at the root,” as he will later be characterized by libertarian Brian Doherty. The brothers have thrown their support behind Libertarian presidential candidate Ed Clark, who is running against Republican Ronald Reagan from the right of the political spectrum. The brothers are frustrated by the legal limits on campaign financing, and they persuade the party to place David on the ticket as vice president, thereby enabling him to spend as much of his personal fortune as he likes. The Libertarian’s presidential campaign slogan is, “The Libertarian Party has only one source of funds: You.” In reality, the Koch brothers’ expenditures of over $2 million is the campaign’s primary source of funding. Clark tells a reporter that the Libertarians are preparing to stage “a very big tea party” because people are “sick to death” of taxes. The Libertarian Party platform calls for the abolition of the FBI and the CIA, as well as of federal regulatory agencies, such as the Securities and Exchange Commission and the Department of Energy. The platform proposes the abolition of Social Security, minimum-wage laws, gun control, and all personal and corporate income taxes; in return, it proposes the legalization of prostitution, recreational drugs, and suicide. Government should be reduced to only one function, the party proclaims: the protection of individual rights. Conservative eminence William F. Buckley Jr. calls the movement “Anarcho-Totalitarianism.” The Clark-Koch ticket receives only one percent of the vote in the November 1980 elections, forcing the Koch brothers to realize that their brand of politics isn’t popular. In response, Charles Koch becomes openly scornful of conventional politics. “It tends to be a nasty, corrupting business,” he says. “I’m interested in advancing libertarian ideas.” Doherty will later write that both Kochs come to view elected politicians as merely “actors playing out a script.” Doherty will quote a longtime confidant of the Kochs as saying that after the 1980 elections, the brothers decide they will “supply the themes and words for the scripts.” In order to alter the direction of America, they had to “influence the areas where policy ideas percolate from: academia and think tanks.” [New Yorker, 8/30/2010]

Entity Tags: Libertarian Party, Brian Doherty, Charles Koch, Ronald Reagan, David Koch, William F. Buckley, Ed Clark

Timeline Tags: Domestic Propaganda

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

Michael Barnes.Michael Barnes. [Source: Covington and Burling]Representative Michael Barnes (D-MD) is targeted by the NSA’s Echelon satellite surveillance program on orders from Reagan administration officials. Barnes, an outspoken opponent of Reagan’s Central American policies, had phone conversations with Nicaraguan officials intercepted and recorded, including one conversation between Barnes and the foreign minister of Nicaragua. Barnes learns of the surveillance after White House officials, apparently attempting to discredit Barnes, leaks transcripts of the taped conversations to reporters. CIA director William Casey shows Barnes a Nicaraguan embassy cable reporting a meeting between embassy staff and one of Barnes’s aides; Casey demands that Barnes fire the aide. Barnes refuses, noting that the aide had visited the embassy on legitimate business concerning international affairs. Barnes will say in 1995, “I was aware that NSA monitored international calls, that it was a standard part of intelligence gathering. But to use it for domestic political purposes is absolutely outrageous and probably illegal.” Former senator Dennis DeConcini (R-AZ) says he worries about the NSA spying on US citizens: “It has always worried me. What if that is used on American citizens? It is chilling. Are they listening to my private conversations on my telephone?” [Patrick S. Poole, 8/15/2000]

Entity Tags: Michael D. Barnes, Reagan administration, William Casey, National Security Agency, Dennis DeConcini, Echelon

Timeline Tags: Civil Liberties

The federal government passes even more amendments to the 1971 Federal Election Campaign Act (FECA—see February 7, 1972, 1974, and May 11, 1976). The new amendments simplify campaign finance reporting requirements, encourage political party activity at the state and local levels, and increase the public funding grants for presidential nominating conventions. The new amendments prohibit the Federal Election Commission (FEC) from conducting random campaign audits. They also allow state and local parties to spend unlimited amounts on federal campaign efforts, including the production and distribution of campaign materials such as signs and bumper stickers used in “get out the vote” (GOTV) efforts. [Federal Elections Commission, 1998; Center for Responsive Politics, 2002 pdf file] The amendment creates what later becomes known as “soft money,” or donations and contributions that are essentially unregulated as long as they ostensibly go for “party building” expenses. The amendments allow corporations, labor unions, and wealthy individuals to contribute vast sums to political parties and influence elections. By 1988, both the Republican and Democratic Parties will spend inordinate and controversial amounts of “soft money” in election efforts. [National Public Radio, 2012] While the amendments were envisioned as strengthening campaign finance law, many feel that in hindsight, the amendments actually weaken FECA and campaign finance regulation. Specifically, the amendments reverse much of the 1974 amendments, and allow money once prohibited from being spent on campaigns to flow again. [Campaign Finance Timeline, 1999]

Entity Tags: Federal Election Commission, Federal Election Campaign Act of 1972

Timeline Tags: Civil Liberties

A federal court rules that because of the government’s “state secrets” privilege (see March 9, 1953), a civilian plaintiff suing the US Navy over a contractual agreement cannot even access “non-privileged,” or unclassified, information from the Navy because to do so might “threaten disclosure” of material that goes against “the overriding interest of the United States… preservation of its state secrets privilege precludes any further attempt to pursue litigation.” [Siegel, 2008, pp. 196-197]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

KochPAC logo.KochPAC logo. [Source: KochPAC (.com)]After their stinging loss during the November 1980 presidential campaign, the billionaire Koch brothers, Charles and David, decide that they need to work to inculcate their brand of hard-right libertarianism into the electorate through indirect means (see 1979-1980). Therefore, they begin spending vast amounts of their personal fortunes on what purport to be independent think tanks and other political or ideological organizations. At the same time, the brothers become political recluses, rarely speaking in public and rarely acknowledging the breadth or the direction of their donations. It is hard to know exactly how much the Kochs spend and where they spend it, though public records give some of the picture. Between 1998 and 2008, Charles Koch’s foundation spends over $48 million on political funding. The Claude R. Lambe Charitable Foundation, controlled by Charles and his wife, spends over $28 million. David Koch’s foundation spends over $120 million. Koch Industries, controlled primarily by Charles, spends over $50 million on lobbying efforts. Their political action committee, KochPAC, donates around $8 million, almost all of it going to Republicans. In 2010, as in other years, Koch Industries leads all other energy companies in political donations. The brothers spend over $2 million of their personal fortunes on political donations, almost all of it going to Republicans. Ari Rabin-Havt of the progressive media watchdog organization Media Matters will say that the Kochs’ effort is unusual in its marshalling of corporate and personal funds: “Their role, in terms of financial commitments, is staggering.” Lee Fang, writing for the liberal blog ThinkProgress (an arm of the Center for American Progress), calls the Kochs “the billionaires behind the hate.” Some believe that the Kochs have either skirted, or outright broken, laws controlling tax-exempt giving. Charitable foundations must conduct exclusively nonpartisan activities that promote the public welfare. But in 2004, a report by the National Committee for Responsive Philanthropy, a watchdog group, describes the Kochs’ foundations as being self-serving, and concludes, “These foundations give money to nonprofit organizations that do research and advocacy on issues that impact the profit margin of Koch Industries.” The Kochs also use their charitable foundations to fund hard-right political organizations that, according to reporter Jane Mayer, “aim to push the country in a libertarian direction,” including: the Institute for Justice, which files lawsuits opposing state and federal regulations; the Institute for Humane Studies, which underwrites libertarian academics; and the Bill of Rights Institute, which promotes a conservative interpretation of the Constitution. David Koch acknowledges that the family exerts tight ideological control. “If we’re going to give a lot of money, we’ll make darn sure they spend it in a way that goes along with our intent,” he tells a reporter. “And if they make a wrong turn and start doing things we don’t agree with, we withdraw funding.” [New Yorker, 8/30/2010]

Entity Tags: Institute for Justice, Charles Koch, Bill of Rights Institute, Ari Rabin-Havt, Claude R. Lambe Charitable Foundation, Institute for Humane Studies, Koch Industries, National Committee for Responsive Philanthropy, Jane Mayer, David Koch, Lee Fang, KochPAC

Timeline Tags: Domestic Propaganda

President Ronald Reagan issues Executive Order 12333, which directs the US intelligence community to provide foreign intelligence data to the White House. The order reads in part, “[A]gencies are not authorized to use such techniques as electronic surveillance, unconsented physical searches, mail surveillance, physical surveillance, or monitoring devices unless they are in accordance with procedures established by the head of the agency concerned and approved by the Attorney General.” It establishes rules of conduct for the intelligence agencies, and mandates a certain level of Congressional oversight. [Executive Order 12333 -- United States intelligence activities, 4/5/2007] It also establishes the basis for what are later called “National Security Letters.” These NSLs, originally envisioned for use to compile information in hunts for foreign criminals and suspected terrorists, will later be used by the administration of George W. Bush to order US booksellers, librarians, employers, Internet providers, and others to turn over records and information they compile on US citizens, with strict adjuncts against allowing those targeted for surveillance to know about the NSLs and with virtually no government oversight (see October 25, 2005). [Washington Post, 11/6/2005] It does not, as some have later asserted, directly prohibit the assassination of targeted foreign subjects—i.e. terrorist suspects and even foreign leaders—though it does restrict the use of assassination by US government operatives to certain very restricted circumstances centered around critical aspects of national security. [Parks, 11/2/1989 pdf file]

Entity Tags: Ronald Reagan, George W. Bush, National Security Letters, Bush administration (43)

Timeline Tags: Civil Liberties

In the second of two rulings in the case of Halkin v Helms, the judiciary comes down squarely on the side of the US government against charges of illegal surveillance and wiretapping leveled against American anti-war protesters. The district and appellate courts uphold the federal government’s “state secrets” claim as codified in US v Reynolds (see March 9, 1953), thereby denying the plaintiffs the right to see government information that they claim would prove their case. The DC Court of Appeals writes that the federal courts do not have any constitutional role as “continuing monitors of the wisdom and soundness of Executive action,” and instead the courts “should accord utmost deference to executive assertions of privilege on grounds of military or diplomatic secrets… courts need only be satisfied that there is a reasonable danger” that military secrets might be exposed. [Siegel, 2008, pp. 196-196]

Timeline Tags: Civil Liberties

Margaret Thatcher.Margaret Thatcher. [Source: UK Parliament]British prime minister Margaret Thatcher, displeased with two of her ministers for challenging her on unidentified policy matters, requests that they be placed under electronic surveillance. Because it is illegal for British intelligence to monitor its own citizens, the operation is handed over to the CSE, Canada’s national security agency. [Daily Iowan, 1/19/2006; Janczewski and Colarik, 2007, pp. 454] According to former CSE spy Mike Frost, who will publicly discuss the matter in 2000, Thatcher “had two ministers that she said ‘…weren’t onside.’” Thatcher, says Frost, “wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers.” Why CSE and not British intelligence? Because for the British to monitor their own government members would be illegal—so instead, they farm out such activities to their allies. “The British Parliament now have total deniability,” Frost says. “They didn’t do anything. They know nothing about it. Of course they didn’t do anything; we did it for them.” Frost will say there is no way to pin any blame or criminal charges on anyone in the British government. “The British Parliament now has total deniability,” Frost says. “They didn’t do anything… we did it for them.” [ZDNet, 2/25/2000; CBS News, 2/27/2000]

Entity Tags: Communications Security Establishment, Mike Frost, Government Communications Headquarters, Margaret Thatcher

Timeline Tags: Civil Liberties

Strategic Defense Initiative logo.Strategic Defense Initiative logo. [Source: United States Missile Defense Agency]President Reagan announces his proposal for the Strategic Defense Initiative (SDI, later nicknamed “Star Wars”), originally conceived two years earlier (see 1981). SDI is envisioned as a wide-ranging missile defense system that, if it works, will protect the United States from nuclear attacks from the Soviet Union or other countries with ballistic missiles, essentially rendering nuclear weapons, in Reagan’s words, “impotent and obsolete.” Reagan says, “I call upon the scientific community in our country, those who gave us nuclear weapons, to turn their great talents now to the cause of mankind and world peace, to give us the means of rendering these nuclear weapons impotent and obsolete.” Soviet leader Yuri Andropov’s response is unprececented in its anger (see March 27, 1983); Soviet Ambassador Anatoly Dobrinyn says SDI will “open a new phase in the arms race.” [PBS, 2000; Scoblic, 2008, pp. 129]
US Hardliners 'Ecstatic' - Hardliners in and out of the Reagan administration are, in author J. Peter Scoblic’s characterization, “ecstatic, seeing SDI as the ultimate refutation of [the principle of] mutual assured destruction and therefore of the status quo, which left [the US] unable to seek victory over the Soviet Union.” The day after the speech, Senator Barry Goldwater (R-AZ) sends Reagan a one-sentence letter: “That was the best statement I have heard from any president.”
'Less Suicidal' Adjunct to First Strike - Scoblic will write that if SDI is implemented as envisioned, “[a]lthough the Soviets would still be able to inflict enough damage that a first strike by the United States would be suicidal, it would be ‘less suicidal’ to the extent that such a concept made sense, which some Reagan officials believed it did. In short, SDI was a better adjunct to a first strike than it was a standalone defense. That made it critically destabilizing, which is why missile defense had been outlawed by [earlier treaties] in the first place.” [Scoblic, 2008, pp. 129-130]

Entity Tags: Strategic Defense Initiative, J. Peter Scoblic, Ronald Reagan, Anatoly Dobrinyn, Barry Goldwater, Yuri Andropov

Timeline Tags: US International Relations

The Supreme Court rules in INS v. Chadha that Congress has no right to issue what it calls “legislative vetoes,” essentially provisions passed by Congress giving the executive branch specific powers but with Congress reserving the right to veto specific decisions by the executive branch if it does not approve of the decisions made by the executive. Congress had relied on such “legislative vetoes” for years to curb the expanding power of the president. The Court strikes down hundreds of these “legislative vetoes” throughout federal law. Congress quickly schedules hearings to decide how to respond to the Court’s ruling. White House attorney John Roberts (see September 29, 2005), a young, fast-rising conservative, is one of a team of lawyers assigned to review the administration’s upcoming testimony before Congress. Some of the lawyers want to push Congress to place independent agencies such as the Federal Trade Commission (FTC) and Food and Drug Administration (FDA) under White House control—part of the evolving “unitary executive” theory of presidential power (see April 30, 1986). Roberts writes: “With respect to independent agencies… the time may be ripe to reconsider the existence of such entities, and take action to bring them back within the executive branch.… I agree that the time is ripe to reconsider the Constitutional anomaly of independent agencies… More timid souls may, however, desire to see this deleted as provocative.” [Savage, 2007, pp. 256-257]

Entity Tags: Reagan administration, Food and Drug Administration, Federal Trade Commission, John G. Roberts, Jr, US Supreme Court

Timeline Tags: Civil Liberties

The US announces that the Soviet Union has established a large early-warning radar system near the city of Krasnoyarsk. The installation violates the 1972 ABM Treaty (see May 26, 1972), which requires that such installations be located near the nation’s border and oriented outward. It is possible that the Soviet radar installation is built in response to the US’s recent decision to violate the ABM treaty by developing a missile defense system (see March 23, 1983). [Federation of American Scientists, 1/15/2008]

Timeline Tags: US International Relations

Citizens for a Sound Economy logo.Citizens for a Sound Economy logo. [Source: Greater Houston Pachyderm Club]The billionaire Koch brothers, Charles and David, launch the first of a number of “citizen advocacy” groups they either found or fund, Citizens for a Sound Economy. The Kochs are staunch right-wing libertarians determined to successfully combat government regulation and oversight of businesses, government taxation, and government funding of social programs (see August 30, 2010). Between 1986 and 1993, the brothers will provide $7.9 million to the group, even as it promotes itself as a “grassroots,” “citizen-driven” organization. (Such organizations that call themselves “citizen-based” while actually being founded, operated, and funded by corporate interests are called “astroturf” organizations.) Matt Kibbe, who will go on to head a Koch-funded lobbying organization, FreedomWorks, will later say of Citizens for a Sound Economy that its driving force was to take the Kochs’ “heavy ideas and translate them for mass America.… We read the same literature Obama did about nonviolent revolutions—Saul Alinsky, Gandhi, Martin Luther King. We studied the idea of the Boston Tea Party as an example of nonviolent social change. We learned we needed boots on the ground to sell ideas, not candidates.” One organization participant will say that the brothers are “very controlling, very top down. You can’t build an organization with them. They run it.” By 1993, the organization will become powerful enough to successfully thwart the Clinton administration’s efforts to place a “BTU tax” on energy, and mounts successful “citizen protests” against Democrats, sometimes funnelling millions of Koch monies into the political campaigns of their Republican opponents. [New Yorker, 8/30/2010]

Entity Tags: Clinton administration, Charles Koch, David Koch, Citizens for a Sound Economy, Matt Kibbe, FreedomWorks

Timeline Tags: Domestic Propaganda

The DC Court of Appeals rejects a claim by civilian plaintiffs to force the government to disclose classified information as part of a lawsuit, citing the “state secrets” privilege (see March 9, 1953). Furthermore, the court broadens the definition of “state secrets” to include “disclosure of intelligence-gathering methods or capabilities and disruption of diplomatic relations.” [Siegel, 2008, pp. 197]

Timeline Tags: Civil Liberties

The Supreme Court, in the case of Federal Election Commission v. NCPAC, rules that political action committees (PACs) can spend more than the $1,000 mandated by federal law (see February 7, 1972, 1974, and May 11, 1976). The Democratic Party and the FEC argued that large expenditures by the National Conservative Political Action Committee (NCPAC) in 1975 violated the Federal Election Campaign Act (FECA), which caps spending by independent political action committees in support of a publicly funded presidential candidate at $1,000. The Court rules 7-2 in favor of NCPAC, finding that the relevant section of FECA encroaches on the organization’s right to free speech (see January 30, 1976). Justice William Rehnquist writes the majority opinion, joined by fellow conservatives Chief Justice Warren Burger, Sandra Day O’Connor, and Lewis Powell, and liberals Harry Blackmun, John Paul Stevens, and William Brennan. Justices Byron White and Thurgood Marshall dissent from the majority. [Oyez (.org), 2012; Moneyocracy, 2/2012]

Entity Tags: Federal Election Commission, William Brennan, William Rehnquist, Byron White, Federal Election Campaign Act of 1972, US Supreme Court, Warren Burger, Sandra Day O’Connor, Harry Blackmun, John Paul Stevens, Thurgood Marshall, National Conservative Political Action Committee, Democratic Party, Lewis Powell

Timeline Tags: Civil Liberties

The Reagan administration takes another step in attempting to “purge” the federal bureaucracy of those who disagree with its policies (see February 1981 and After). President Reagan issues an executive order requiring agencies to annually submit a cost-benefit analysis of their proposed new rules to the White House, giving administration officials the chance to object to, delay, and block regulations it opposes for ideological reasons. Reagan attorney Douglas Kmiec will later write that this scheme is a major part of the Reagan administration’s attempt to implement the “unitary executive” theory of executive power (see April 30, 1986). Kmiec will write that though White House objections have no legal weight because Congress has given the agencies the power to make rules by law, the White House often wins the argument anyway. [Savage, 2007, pp. 304-305]

Entity Tags: Douglas Kmiec, Reagan administration

Timeline Tags: Civil Liberties

Steven Calabresi joins the Justice Department. Calabresi is a young conservative lawyer who has clerked for appeals court Robert Bork, who failed to secure a position on the Supreme Court just months before (see July 1-October 23, 1987). Calabresi, a co-founder of the Federalist Society of conservative lawyers and judges, joins forces with another ambitious young Justice Department lawyer, John Harrison, and the two begin working to expand the power of the president. Calabresi and Harrison decide that an aggressive use of presidential signing statements can advance the president’s authority to the detriment of the legislative and judicial branches. Unfazed by a recent judicial rejection of just such signing statement usage (see 1984-1985), Calabresi and Harrison write a memo to Attorney General Edwin Meese advocating the issuing of more signing statements as part of a larger strategy to increase the president’s influence over the law. Calabresi and Harrison are interested in how what they call “activist judges” use the legislative history of a bill that became law to interpret that law’s meaning in subsequent judicial actions. The two lawyers believe that by issuing signing statements, the president can create a parallel record of presidential interpretations of potentially ambiguous laws to help guide judicial decisions. Meese approves of the idea, and in December has the West Publishing Company, which prints the US Code Congressional and Administration News, the standard collection of bills’ legislative history, begin including presidential signing statements in its publications. In 2007, author Charlie Savage will call Meese’s move “a major step in increasing the perceived legitimacy of the device.” [Savage, 2007, pp. 232] In 2007, Calabresi will say: “I initially thought of signing statements as presidential legislative history. I’ve subsequently come to think of them as being important vehicles by which presidents can control subordinates in the executive branch. They subsequently came to be important to the unitary executive [theory of presidential power].” [Savage, 2007, pp. 234]

Entity Tags: John Harrison, Charlie Savage, Federalist Society, West Publishing Company, US Department of Justice, Edwin Meese, Robert Bork, Steven Calabresi, US Supreme Court

Timeline Tags: Civil Liberties

National Security Adviser Robert McFarlane, speaking for the Reagan administration, proposes a new, “broad” interpretation of the US-Soviet Anti-Ballistic Missile (ABM) Treaty (see May 26, 1972) on national television. McFarlane proposes that space-based and mobile systems and components based on “other physical principles,” i.e. lasers, particle beams, etc., should be developed and tested, but not deployed. (The traditional, “narrow” interpretation of the treaty is more restrictive.) Days later, President Reagan announces that while he and his administration support this “broad” interpretation, as a matter of national policy, the US’s Strategic Defense Initiative (see March 23, 1983) will continue to observe the more traditional interpretation. [Federation of American Scientists, 1/15/2008]

Entity Tags: Robert C. McFarlane, Strategic Defense Initiative, Ronald Reagan

Timeline Tags: US International Relations

Edwin Meese.Edwin Meese. [Source: GQ (.com)]Attorney General Edwin Meese receives a report, “Separation of Powers: Legislative-Executive Relations.” Meese had commissioned the report from the Justice Department’s Domestic Policy Committee, an internal “think tank” staffed with hardline conservative scholars and policy advisers.
Recommendations for Restoring, Expanding Executive Power - The Meese report approvingly notes that “the strong leadership of President Reagan seems clearly to have ended the congressional resurgence of the 1970s.” It lays out recommendations for restoring the power taken from the executive branch after Watergate and Vietnam, and adding new powers besides. It recommends that the White House refuse to enforce laws and statutes that “unconstitutionally encroach upon the executive branch,” and for Reagan to veto more legislation and to use “signing statements” to state the White House’s position on newly passed laws. It also assails the 1972 War Powers Resolution and other laws that limit presidential power.
Reinterpreting the Separation of Powers and the Concept of 'Checks and Balances' - Perhaps most importantly, the Meese report claims that for 200 years, courts and scholars alike have misunderstood and misinterpreted the Founders’ intentions in positing the “separation of powers” system (see 1787 and 1793). The belief that the Constitution mandates three separate, co-equal branches of government—executive, judicial, and legislative—who wield overlapping areas of authority and work to keep each of the other branches from usurping too much power—a concept taught in school as “checks and balances”—is wrong, the report asserts. Instead, each branch has separate and independent sets of powers, and none of the three branches may tread or encroach on the others’ area of responsibility and authority. “The only ‘sharing of power’ is the sharing of the sum of all national government power,” the report claims. “But that is not joint shared, it is explicitly divided among the three branches.” According to the report, the White House should exercise total and unchallenged control of the executive branch, which, as reporter and author Charlie Savage will later explain, “could be conceived of as a unitary being with the president as its brain.” The concept of “checks and balances” is nothing more than an unconstitutional attempt by Congress to encroach on the rightful power of the executive. This theory of presidential function will soon be dubbed the “unitary executive theory,” a title adapted from a passage by Alexander Hamilton in the Federalist Papers. [Savage, 2007, pp. 47-48] Charles Fried, Reagan’s solicitor general during the second term, will later write that though the unitary executive theory displays “perfect logic” and a “beautiful symmetry,” it is difficult to defend, because it “is not literally compelled by the words of the Constitution. Nor did the framers’ intent compel this view.” [Savage, 2007, pp. 50]

Entity Tags: Charles Fried, Reagan administration, Domestic Policy Committee, US Department of Justice, Ronald Reagan, Edwin Meese, Charlie Savage

Timeline Tags: Civil Liberties

Gorbachev and Reagan at the Reykjavik summit.Gorbachev and Reagan at the Reykjavik summit. [Source: Ronald Reagan Library]President Reagan and Soviet Premier Mikhail Gorbachev meet in Reykjavik, Iceland, for a second summit, to follow on the success of their first meeting almost a year before (see November 16-19, 1985). They base their discussion on Gorbachev’s January proposals of deep cuts in the two nations’ nuclear arsenals (see January 1986).
Elimination of All Nuclear Weapons by 1996 - Gorbachev and his negotiators begin by reiterating Gorbachev’s proposals for a 50 percent cut in all nuclear weapons, deep reductions in Soviet ICBMs, and the elimination of all European-based intermediate nuclear weapons. Reagan and his negotiators counter with a proposal for both sides to destroy half of their nuclear ballistic missiles in the next five years, and the rest to be destroyed over the next five, leaving both sides with large arsenals of cruise missiles and bomber-based weapons. Gorbachev ups the ante, proposing that all nuclear weapons be destroyed within 10 years. Reagan responds that it would be fine with him “if we eliminated all nuclear weapons,” implicitly including all tactical nuclear weapons in Europe and everywhere else. Gorbachev says, “We can do that,” and Secretary of State George Shultz says, “Let’s do it.”
Agreement Founders on SDI - The heady moment is lost when the two sides fail to reach an agreement on SDI—the Americans’ “Star Wars” missile defense system (see March 23, 1983). Gorbachev cannot accept any major reductions in nuclear weapons if the US has a viable missile defense system; Reagan is convinced that SDI would allow both sides to eliminate their nuclear weapons, and offers the SDI technology to the Soviets. Gorbachev finds Reagan’s offer naive, since there is no guarantee that future presidents would honor the deal. Reagan, in another example of his ignorance of the mechanics of the US nuclear program (see April 1981 and After), does not seem to realize that even a completely effective SDI program would not defend against Soviet cruise missiles and long-range bombers, and therefore would not end the threat of nuclear destruction for either side. Author J. Peter Scoblic will later write, “[SDI] would have convinced the Soviet Union that the United States sought a first-strike capability, since the Americans were so far ahead in cruise missile and stealth bomber technology.” Gorbachev does not ask that the US abandon SDI entirely, but simply observe the terms of the 1972 Anti-Ballistic Missile treaty (see May 26, 1972) and confine SDI research to the laboratory. Reagan refuses. Gorbachev says that if this is the US’s position, then they would have to “forget everything they discussed.” Foreign Minister Eduard Shevardnadze breaks in, saying that the two nations are “so close” to making history that “if future generations read the minutes of these meetings, and saw how close we had come but how we did not use these opportunities, they would never forgive us.” But the agreement is not to be.
Participants' Reactions - As Shultz later says, “Reykjavik was too bold for the world.” Shultz tells reporters that he is “deeply disappointed” in the results, and no longer sees “any prospect” for a third summit. Gorbachev tells reporters that Reagan’s insistence on retaining SDI had “frustrated and scuttled” the opportunity for an agreement. Gorbachev says he told Reagan that the two countries “were missing a historic chance. Never had our positions been so close together.” Reagan says as he is leaving Iceland that “though we put on the table the most far-reaching arms control proposal in history, the general secretary [Gorbachev] rejected it.” Scoblic will later write, “In the end, ironically, it was Reagan’s utopianism, hitched as it was to a missile shield, that preserved the status quo.” [Washington Post, 10/13/1986; Scoblic, 2008, pp. 140-142]
Hardline Sabotage - One element that contributes to the failure of the negotiations is the efforts to undermine the talks by hardline advisers Richard Perle and Ken Adelman, who tell Reagan that confining SDI to research facilities would destroy the program. Perle and Adelman are lying, but Reagan, not knowing any better, believes them, and insists that SDI remain in development. [Scoblic, 2008, pp. 143-144]
Going Too Far? - Reagan’s negotiators, even the most ardent proponents of nuclear reduction, are shocked that he almost agreed to give up the US’s entire nuclear arsenal—with Shultz’s encouragement. British Prime Minister Margaret Thatcher and French President Francois Mitterand are horrified at the prospect, given that NATO’s nuclear arsenal in Europe is the only real counterweight to the huge Red Army so close to the borders of Western European nations. [Scoblic, 2008, pp. 140-142]
Failure of Trust - The US-Soviet talks may well have foundered on an inability of either side to trust the other one to the extent necessary to implement the agreements. During the talks, Soviet aide Gyorgy Arbatov tells US negotiator Paul Nitze that the proposals would require “an exceptional level of trust.” Therefore, Arbatov says, “we cannot accept your position.” [National Security Archives, 3/12/2008]

Entity Tags: Paul Nitze, J. Peter Scoblic, Kenneth Adelman, Gyorgy Arbatov, George Shultz, Francois Mitterand, Margaret Thatcher, Richard Perle, Ronald Reagan, Mikhail Gorbachev

Timeline Tags: US International Relations

The Supreme Court rules in Federal Election Commission v. Massachusetts Citizens for Life that an anti-abortion organization can print flyers promoting “pro-life” candidates in the weeks before an election, and that the portion of the Federal Election Campaign Act (FECA—see February 7, 1972, 1974, and May 11, 1976) that bars distribution of such materials to the general public restricts free speech. In September 1978, the Massachusetts Citizens For Life (MCFL) spent almost $10,000 printing flyers captioned “Everything You Need to Vote Pro-Life,” which included information about specific federal and state candidates’ positions on abortion rights, along with exhortations to “vote pro-life” and “No pro-life candidate can win in November without your vote in September.” The Federal Election Commission (FEC) ruled that MCFL’s expenditures violated FECA’s ban on corporate spending in connection with federal elections. A Massachusetts district court ruled against the FEC, finding that the flyer distribution “was uninvited by any candidate and uncoordinated with any campaign” and the flyers fell under the “newspaper exemption” of the law. Moreover, the court found, FECA’s restrictions infringed on MCFL’s freedom of speech (see January 30, 1976 and April 26, 1978). An appeals court reversed much of the district court’s decision, but agreed that the named provision of FECA violated MCFL’s free speech rights. The FEC appealed to the Supreme Court. By a 5-4 vote, the Court affirms that FECA’s prohibition on corporate expenditures is unconstitutional as applied to independent expenditures made by a narrowly defined type of nonprofit corporation such as MCFL. The Court writes that few organizations will be impacted by its decision. The majority opinion is written by Justice William Brennan, a Court liberal, and joined by liberal Thurgood Marshall and conservatives Lewis Powell, Antonin Scalia, and (in part) by Sandra Day O’Connor. Court conservatives William Rehnquist and Byron White, joined by liberals Harry Blackmun and John Paul Stevens, dissent with the majority, saying that the majority ruling gives “a vague and barely adumbrated exception [to the law] certain to result in confusion and costly litigation.” [Federal Election Commission, 2011; Moneyocracy, 2/2012]

Entity Tags: Federal Election Commission, William Rehnquist, Antonin Scalia, Federal Election Campaign Act of 1972, US Supreme Court, William Brennan, Sandra Day O’Connor, Harry Blackmun, John Paul Stevens, Thurgood Marshall, Massachusetts Citizens for Life, Byron White, Lewis Powell

Timeline Tags: Civil Liberties

A federal appeals court rules 2-1 in favor of Theodore Olson, the former head of the Justice Department’s Office of Legal Counsel, who has refused to comply with a subpoena issued as part of an independent counsel’s investigation into political interference at the Environmental Protection Agency (EPA). Olson’s position is that the independent counsel is illegal under the Constitution, as interpreted by the so-called “unitary executive theory” (see April 30, 1986). One of the appellate court judges, Carter appointee Ruth Bader Ginsberg, argues that the independent counsel law is perfectly constitutional, and fits with the Founding Fathers’ vision of a system of “checks and balances” among the three governmental branches. But Reagan appointees Laurence Silberman and Stephen Williams outvote Ginsberg. Silberman, who writes the majority opinion, is a longtime advocate of increased executive power, and calls the independent counsel law “inconsistent with the doctrine of a unitary executive.” The Supreme Court will strike down Silberman’s ruling (see June 1988), but the independent counsel will not bring charges against Olson. [Savage, 2007, pp. 46-49]

Entity Tags: Office of Legal Counsel (DOJ), Environmental Protection Agency, Laurence Silberman, Stephen Williams, Theodore (“Ted”) Olson, US Supreme Court, Ruth Bader Ginsberg

Timeline Tags: Civil Liberties

Strom Thurmond.Strom Thurmond. [Source: US Government]Former Lockheed software manager Margaret Newsham, who worked at the Menwith Hill facility of the NSA’s Echelon satellite surveillance operation in 1979, says she heard a real-time phone intercept of conversations involving senator Strom Thurmond (R-SC). She was shocked, she recalls, because she thought only foreign communications were being monitored. Newsham, who was fired from Lockheed after she filed a whistleblower lawsuit alleging fraud and waste, tells the chairman of the House Intelligence Committee, Louis Stokes (D-OH), of the overheard conversations. In July, Capital Hill staffers will leak the story to the Cleveland Plain Dealer. Thurmond says he doesn’t believe Newsham’s story, but his office admits that it has previously received reports that Thurmond had been a target of NSA surveillance. Thurmond will decline to press for an investigation, and the reason for the surveillance has never been revealed. [CBS News, 2/27/2000; Patrick S. Poole, 8/15/2000]

Entity Tags: Strom Thurmond, National Security Agency, House Intelligence Committee, Louis Stokes, Echelon, Cleveland Plain Dealer, Lockheed Martin Corporation, Margaret Newsham

Timeline Tags: Civil Liberties

The newly appointed general counsels of each executive branch receive a memo from William Barr, the new head of the Justice Department’s Office of Legal Counsel (OLC). The memo, entitled “Common Legislative Encroachments on Executive Branch Authority,” details the top 10 ways in which, in Barr’s view, Congress tries to interfere with executive branch powers. The list includes:
bullet “4. Micromanagement of the Executive Branch”;
bullet “5. Attempts to Gain Access to Sensitive Executive Branch Information”;
bullet “9. Attempts to Restrict the President’s Foreign Affairs Powers.”
The memo unequivocally endorses the “unitary executive theory” of the presidency (see April 30, 1986), despite that theory’s complete rejection by the Supreme Court (see June 1988). Barr also reiterates the belief that the Constitution requires the executive branch to “speak with one voice”—the president’s—and tells the general counsels to watch for any legislation that would protect executive branch officials from being fired at will by the president, one of the powers that Barr and other unitary executive proponents believe has been illegally taken by Congress. “Only by consistently and forcefully resisting such congressional incursions can executive branch prerogatives be preserved,” Barr writes. Reflecting on Barr’s arguments, law professor Neil Kinkopf, who will later serve in the OLC under President Clinton, will later write: “Never before had the Office of Legal Counsel… publicly articulated a policy of resisting Congress. The Barr memo did so with belligerence, staking out an expansive view of presidential power while asserting positions that contradicted recent Supreme Court precedent. Rather than fade away as ill-conceived and legally dubious, however, the memo’s ideas persisted and evolved within the Republican Party and conservative legal circles like the Federalist Society.” [Savage, 2007, pp. 57-59]

Entity Tags: Federalist Society, Neil Kinkopf, US Department of Justice, William P. Barr, Office of Legal Counsel (DOJ), Republican Party

Timeline Tags: Civil Liberties

A lawsuit against the FBI’s investigation of a sixth-grade boy and his school project to create an “encyclopedia of the world” is stopped when an appeals court rules that the agency is shielded by the “state secrets” privilege (see March 9, 1953). Unable to secure information from the FBI as to why it investigated him, the child had therefore “failed to sustain his burden of proof [and] the cause of action was properly dismissed.” [Siegel, 2008, pp. 197]

Entity Tags: Federal Bureau of Investigation

Timeline Tags: Civil Liberties

The Supreme Court, in the case of Austin v. Michigan Chamber of Commerce, rules that the Michigan Chamber of Commerce (MCC) cannot run newspaper advertisements in support of a candidate for the state legislature because the MCC is subject to the Michigan Campaign Finance Act, which prohibits corporations from using treasury money to support or oppose candidates running for state offices. The Court finds that corporations can use money only from funds specifically designated for political purposes. The MCC holds a political fund separate from its other monies, but wanted to use money from its general fund to buy political advertising, and sued for the right to do so. The case explored whether a Michigan law prohibiting such political expenditures is constitutional. The Court agrees 7-2 that it is constitutional. Justices Antonin Scalia and Anthony Kennedy dissent, arguing that the government should not require such “segregated” funds, but should allow corporations and other such entities to spend their money on political activities without such restraints. [Public Resource (.org), 1990; Casebriefs, 2012; Moneyocracy, 2/2012] The 2010 Citizens United ruling (see January 21, 2010) will overturn this decision, with Scalia and Kennedy voting in the majority, and Kennedy writing the majority opinion.

Entity Tags: Michigan Chamber of Commerce, Anthony Kennedy, Michigan Campaign Finance Act, US Supreme Court, Antonin Scalia

Timeline Tags: Civil Liberties

In an unusually fiery speech, President George H. W. Bush tells an audience at Princeton University that he does not hold with Congressional attempts to limit presidential power. “The most common challenge to presidential powers comes from a predictable source,” he says, “the United States Congress.” Bush accuses lawmakers of trying to “micromanage” executive branch decisions, particularly in foreign policy (see July 27, 1989). He denounces Congress for attempting to, in his view, accumulate power at the expense of the executive branch by making excessive and unwarranted demands for information, and by “writing too-specific directions for carrying out a particular law.” Six of the 20 vetoes he has cast were to defend the presidency against such meddling, he asserts. And he criticizes Congress for passing bills containing indefensible earmarks and spending provisions; to curb such excesses, he demands a line-item veto. But he tempers his remarks: “The great joy and challenge of the office I occupy,” he concludes, “is that the president serves, not just as the unitary executive (see April 30, 1986), but hopefully as a unifying executive.” [Savage, 2007, pp. 59]

Entity Tags: George Herbert Walker Bush

Timeline Tags: Civil Liberties

A US appellate court refuses to find a number of military contractors liable in the death of Earl Patton Ryals, who died with 36 of his fellow crewmen in the Iraqi attack on the USS Stark (see May 17, 1987 and After). Ryals’s estate claims that he and his fellows died in part because of negligence on the part of the contractors who designed, manufactured, tested, and marketed the weapons system on board the Stark, including the Phalanx anti-missile system. In turning down the estate’s claim, the court cites the government’s “state secrets” privilege (see March 9, 1953), saying that the facts of the issue could not be resolved without examining classified Navy documents. And even without this reason, the court rules, Ryals’s estate cannot see the documents because the case presents “a political question” about military decision-making that is not subject to judicial review. [Zuckerbraun v. General Dynamics Corp., 6/13/1991; Siegel, 2008, pp. 197-198] A year later, a similar case will be dismissed on the grounds that a trial might conceivably reveal “state secrets” (see September 16, 1992).

Entity Tags: Earl Patton Ryals, US Department of the Navy

Timeline Tags: Civil Liberties

Author Terry Eastland, the editor of Forbes Media Critic and a fellow with the Ethics and Public Policy Center, publishes Energy in the Executive: The Case for the Strong Presidency. The book makes an impassioned case for the “unitary executive” theory of the presidency (see April 30, 1986). In essence, Eastland’s argument is that a strong presidency, combined with a much diluted Congress and Supreme Court, is the best way for conservatives to achieve their aims. While traditional conservatives tend to reject this theory as unacceptably authoritarian, many others on the right—neoconservatives, social conservatives, the religious right, and other groups—have embraced the concept. Author and former Nixon White House counsel John Dean will call Eastland’s arguments “weak… deeply flawed as history and constitutional law, and closer to cheerleading for presidential hubris, excessive secrecy, and monarchical-like authority than a solid justification for a strong presidency.” [Dean, 2007, pp. 100-106]

Entity Tags: John Dean, Terry Eastland

Timeline Tags: Civil Liberties

Russian President Boris Yeltsin proposes that the US and Russia engage in a “joint” global defense system that would supplant the US-only Strategic Defense Initiative (see March 23, 1983 and January 29, 1991). He says that Russia will continue to honor the US-Soviet Anti-Ballistic Missile Treaty (see May 26, 1972), and proposes that all existing anti-satellite (ASAT) programs be eliminated and banned. [Federation of American Scientists, 1/15/2008]

Entity Tags: Strategic Defense Initiative, Boris Yeltsin

Timeline Tags: US International Relations

A federal appeals court upholds the dismissal of a lawsuit filed on behalf of 23 Navy sailors killed in the attack on the USS Stark (see May 17, 1987 and After) against a number of defense contractors. A similar lawsuit on behalf of one of the sailors killed in the attack was dismissed a year before (see June 13, 1991). This time the plaintiffs file over 2,500 pages of unclassified documentary evidence supporting their claims that the contractors were negligent in their design and implementation of the weapons systems aboard the Stark. The appeals court finds that regardless of the amount of evidence entered, to allow the trial would be to potentially infringe on the US government’s “state secrets” privilege (see March 9, 1953). “[N]o amount of effort could safeguard the privileged information,” the court rules. The court adds that “classified and unclassified information cannot always be separated, and therefore courts must restrict access not only to classified material, but to “those pieces of evidence” that “press so closely upon highly sensitive material that they create a hgh risk of inadvertent or indirect disclosures.” [Siegel, 2008, pp. 198]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

President-elect Bill Clinton announces that his administration rejects the idea of a US-only space-based defense system (see March 23, 1983 and January 29, 1991) and would instead support the development of what he calls “a limited missile defense system within the strict framework” of the ABM Treaty (see May 26, 1972). He announces that his administration also supports the development and deployment of theater missile defense (TMD) systems “to protect our troops from short- and medium-range missiles.” [Federation of American Scientists, 1/15/2008]

Entity Tags: William Jefferson (“Bill”) Clinton, Strategic Defense Initiative

Timeline Tags: US International Relations

Informant Emad Salem, pictured bent over in a green shirt, enables the FBI to take surveillance footage like this of the plotters making a bomb.Informant Emad Salem, pictured bent over in a green shirt, enables the FBI to take surveillance footage like this of the plotters making a bomb. [Source: National Geographic]Eight people are arrested, foiling a plot to bomb several New York City landmarks. The targets were the United Nations building, 26 Federal Plaza, and the Lincoln and Holland tunnels. This is known as the “Landmarks” or “Day of Terror” plot. The plotters are connected to Ramzi Yousef and the “Blind Sheikh,” Sheikh Omar Abdul-Rahman. If the bombing, planned for later in the year, had been successful, thousands would have died. An FBI informant named Emad Salem had infiltrated the group, gathering information that leads to arrests of the plotters (see April 23, 1993). [US Congress, 7/24/2003] Abdul-Rahman will eventually be sentenced to life in prison for a role in the plot. Nine others will be given long prison terms, including Ibrahim El-Gabrowny and Clement Rodney Hampton-El. [New York Times, 1/18/1996] Siddig Siddig Ali, who was possibly the main force behind the plot (see April 23, 1993), will eventually be sentenced to only 11 years in prison because he agreed to provide evidence on the other suspects [New York Times, 10/16/1999]

Entity Tags: Ramzi Yousef, Siddig Siddig Ali, Ibrahim El-Gabrowny, Clement Rodney Hampton-El, Emad Salem, Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline

The Clinton administration rejects the Reagan/Bush “broad interpretation” of the 1972 Anti-Ballistic Missile Treaty (see May 26, 1972 and October 6-11, 1985) in favor of the narrow, “traditional” interpretation. A senior government official informs Congress that “it is the position of the Clinton administration that the ‘narrow,’ or ‘traditional,’ interpretation of the ABM Treaty is the correct interpretation and, therefore, that the ABM Treaty prohibits the development, testing, and deployment of sea-based, air-based, space-based, and mobile land-based ABM systems and components without regard to technology utilized.” [Federation of American Scientists, 1/15/2008]

Entity Tags: Clinton administration

Timeline Tags: US International Relations

Kifah Wael Jayyousi.Kifah Wael Jayyousi. [Source: Robert A. Reeder]A Florida cell of Islamic radicals carries out fundraising, training, and recruitment to support the global jihad movement. The group is monitored by the FBI from the early 1990s, but no action is taken against it until after 9/11. The cell’s most prominent members are Adham Amin Hassoun, Mohammed Hesham Youssef, Kifah Wael Jayyousi, Kassem Daher, and Jose Padilla. Adnan Shukrijumah may also be involved (see (Spring 2001)).
bullet Both Hassoun and Jayyousi are associates of “Blind Sheikh” Omar Abdul-Rahman and the FBI monitors telephone conversations between them and Abdul-Rahman from January 1993 to 1995, at least. After Abdul-Rahman is taken into police custody in July 1993, according to an FBI agent, Jayyousi calls Abdul-Rahman in jail to “update the sheikh with jihad news, many times reading accounts and statements issued directly by terrorist organizations.” [St. Petersburg Times, 11/23/2003; Lance, 2006, pp. 126-8; Associated Press, 4/8/2006; International Herald Tribune, 1/4/2007]
bullet Funds are provided through bank accounts of Al-Gama’a al-Islamiyya (the Islamic Group), the Canadian Islamic Association, and Benevolence International Foundation (BIF), for which Hassoun files incorporation papers in Florida. The cell pays out thousands of dollars in checks, some of which are marked “Chechnya”, “Kosovo,” or “for tourism”.
bullet They try to talk in code, but the code is unsophisticated; for example “tourism” apparently means “terrorism”. In addition, they are not very careful and in one conversation overheard by the FBI, which records tens of thousands of their conversations from the early 1990s, one plotter asks another if he has enough “soccer equipment” to “launch an attack on the enemy.” In another, the conspirators discuss a $3,500 purchase of “zucchini” in Lebanon.
bullet Cell members are involved in jihad, through funding or direct participation, in Egypt, Somalia, Bosnia, Chechnya, Afghanistan, Lebanon, Libya, Kosovo, the former Soviet Republic of Georgia, and Azerbaijan.
bullet They are involved with both bin Laden and Chechen leader Ibn Khattab; for example, in one conversation Youssef tells Hassoun that he would be traveling “there at Osama’s and… Khattab’s company.” [Indictment. United States v. Jose Padilla, 11/17/2005 pdf file]
bullet They publish the Islam Report, a radical magazine about jihad. [Associated Press, 4/8/2006]
It is unclear why the FBI monitors the cell for almost a decade before doing anything. However, some of their activities are focused on Bosnia, where the US is turning a blind eye, or even actively assisting Islamic militants fighting on the Bosnian side (see 1992-1995 and April 27, 1994). The cell is broken up in the months after 9/11, and Hassoun, Jayyousi, and Padilla are sent for trial, which begins in 2007. [International Herald Tribune, 1/4/2007]

Entity Tags: Mohamed Hesham Youssef, Adnan Shukrijumah, Adham Amin Hassoun, Kifah Wael Jayyousi, Al-Gama’a al-Islamiyya, Omar Abdul-Rahman, Kassem Daher, Jose Padilla, Federal Bureau of Investigation, Canadian Islamic Association, Benevolence International Foundation

Timeline Tags: Complete 911 Timeline

President Clinton signs into law the Brady Handgun Violence Prevention Act, sometimes called the “Brady Bill,” which imposes a waiting period for handgun purchases. Many gun enthusiasts are infuriated by the new law. The Southern Poverty Law Center will later observe that the “Brady Bill” and a 1994 ban on some assault weapons (see September 13, 1994) help spark the nascent militia movement. [Southern Poverty Law Center, 6/2001; US Government Info, 2010]

Entity Tags: Brady Handgun Violence Prevention Act, William Jefferson (“Bill”) Clinton, Southern Poverty Law Center

Timeline Tags: Civil Liberties, US Domestic Terrorism

Curveball, as a college student.Curveball, as a college student. [Source: CBS News]The Iraqi engineering student later known to the US and German intelligence communities as “Curveball” graduates last in his class from engineering school at Baghdad University and is hired to work at the Chemical Engineering and Design Center. [Los Angeles Times, 11/20/2005] Curveball, identified thirteen years later as Rafid Ahmed Alwan (see November 4, 2007), will tell German intelligence officials that he graduated first in his class and went on to oversee a secret Iraqi bioweapons laboratory. His claims are entirely fictional (see June 2003-Late 2003), but will become a linchpin of the US’s case for the necessity of invading Iraq (see February 5, 2003).

Entity Tags: ’Curveball’

Timeline Tags: Events Leading to Iraq Invasion

Yeltsin and Clinton share a laugh.Yeltsin and Clinton share a laugh. [Source: Associated Press / BBC]US President Bill Clinton and Russian President Boris Yeltsin issue a joint statement that they have “agreed on the fundamental importance of preserving the viability and integrity of the ABM Treaty” (see May 26, 1972). In the statement, Clinton and Yeltsin state: “Both sides have an interest in developing and fielding effective theater missile defense systems on a cooperative basis. The presidents agree that the two sides will conduct a joint exercise of theater missile defenses and early warning. This exercise would contribute to providing a basis for US and Russian forces to operate together, for example, in peacekeeping operations.” [Federation of American Scientists, 1/15/2008]

Entity Tags: William Jefferson (“Bill”) Clinton, Boris Yeltsin

Timeline Tags: US International Relations

The US Senate ratifies the international Convention Against Torture, originally proposed by the United Nations in 1985. The treaty bans any officials from signatory nations from inflicting “torture and other cruel, inhuman, or degrading treatment or punishment” on prisoners in order to gain information. It also establishes the UN Committee against Torture (UNCAT). The ban is absolute and cannot be waived: “No exceptional circumstances whatsoever, whether a state of war or a threat of war, internal political instability, or any other public emergency, may be invoked as a justification of torture.” [United Nations High Commissioner for Human Rights, 12/10/1984; Savage, 2007, pp. 155] The treaty also forbids signatory nations from sending detainees to other countries if there is a reasonable expectation that they may be tortured. [United Nations High Commissioner for Human Rights, 12/10/1984; Human Rights Web, 1/25/1997]

Entity Tags: United Nations Committee against Torture, Convention Against Torture, United Nations

Timeline Tags: Civil Liberties

The Communications Assistance for Law Enforcement Act (CALEA) takes effect. CALEA obliges telecommunications providers such as AT&T to give law enforcement agencies and US intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks. In more recent years, the law will be expanded to give law enforcement and intelligence agencies similar abilities to monitor Internet usage by US citizens. [Federal Communications Commission, 2/21/2007]

Entity Tags: Communications Assistance for Law Enforcement Act (CALEA), AT&T

Timeline Tags: Civil Liberties

One of Ramzi Yousef’s timers seized by Philippines police in January 1995.One of Ramzi Yousef’s timers seized by Philippines police in January 1995. [Source: Peter Lance]Responding to an apartment fire, Philippine investigators uncover an al-Qaeda plot to assassinate the Pope that is scheduled to take place when he visits the Philippines one week later. While investigating that scheme, they also uncover Operation Bojinka, planned by the same people: 1993 WTC bomber Ramzi Yousef and 9/11 mastermind Khalid Shaikh Mohammed (KSM). [Independent, 6/6/2002; Los Angeles Times, 6/24/2002; Los Angeles Times, 9/1/2002] Many initial reports after 9/11 will claim the fire was accidental and the police discovery of it was a lucky break, but in 2002 the Los Angeles Times will report that the police started the fire on purpose as an excuse to look around the apartment. In the course of investigating the fire, one of the main plotters, Abdul Hakim Murad, is arrested. [Los Angeles Times, 9/1/2002] The plot has two main components. On January 12, Pope John Paul II is scheduled to visit Manila and stay for five days. A series of bombs along his parade route would be detonated by remote control, killing thousands, including the Pope. Yousef’s apartment is only 500 feet from the residence where the Pope will be staying. [Reeve, 1999, pp. 78; Lance, 2006, pp. 138] Then, starting January 21, a series of bombs would be placed on airplanes. [Insight, 5/27/2002] Five men, Yousef, Wali Khan Amin Shah, Abdul Hakim Murad, Abd al-Karim Yousef (a.k.a., Adel Anon, Yousef’s twin brother), and Khalid Al-Shaikh (thought to be an alias for KSM) would depart to different Asian cities and place a timed bomb on board during the first leg of passenger planes traveling to Los Angeles, San Francisco, Honolulu, and New York. They would then transfer to another flight and place a second bomb on board that flight. In all, 11 to 12 planes would blow up in a two day period over the Pacific. If successful, some 4,000 people would have been killed. [Agence France-Presse, 12/8/2001; Insight, 5/27/2002; Contemporary Southeast Asia, 12/1/2002] According to another account, some of the bombs would be timed to go off weeks or even months later. Presumably worldwide air travel could be interrupted for months. [Lance, 2003, pp. 260-61] A second wave of attacks involving crashing airplanes into buildings in the US would go forward later, once the pilots are trained for it (see February-Early May 1995).

Entity Tags: Abd al-Karim Yousef, Khalid Shaikh Mohammed, Ramzi Yousef, Wali Khan Amin Shah, Operation Bojinka, Al-Qaeda, Abdul Hakim Murad

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Timeline Tags: Civil Liberties

US President Bill Clinton and Russian President Boris Yeltsin issue a joint statement announcing that they endorse a set of principles for negotiating the deployment of “theater missile defense” systems (TMD), designed for protection from intermediate-range ballistic missiles (IRBMs) and smaller “tactical” or “battlefield” nuclear weapons. TMD systems will not be designed and implemented in a manner that poses a serious threat to either side’s nuclear arsenals. They both agree that the 1972 ABM Treaty (see May 26, 1972) “does not apply to theater missile defense systems that may simply have a theoretical capability against some strategic missiles but which would not be militarily significant in the context of operational considerations.” They agree that “theater missile defense systems will not be deployed by the sides for use against each other,” and that “the scale of deployment—in number and geographic scope—of theater missile defense systems by either side will be consistent with theater missile defense programs confronting that side.” The two nations will develop their respective TMD systems “on a cooperative basis.” [Federation of American Scientists, 1/15/2008]

Entity Tags: William Jefferson (“Bill”) Clinton, Boris Yeltsin

Timeline Tags: US International Relations

An “umbrella” militia organization called the Tri-States Militia holds an organizing meeting. Group founder John Parsons, a South Dakota militia figure, tells the assembled militia members, “There is a thunder rolling across this country, and what you’re looking at is the lightning bolt in that thunder.” One of the Tri-States council members is Bradley Glover (see July 4-11, 1997). Part of the meeting is open to the press; Glover tells reporters: “We have two arms. The political side and the military side. We hope the political approach will solve our country’s problems, but if the situation deteriorates to the point where they deny our political efforts then we have the other side.” He tells the reporters that militias are little more than the “original neighborhood watch.” But one attendee at the meeting, recalling Glover’s statements in the portion of the meeting closed to the press, will call him a “crazy and dangerous” person who tried to push others into overt action at the meeting. Glover and other Tri-States members do not know that Parsons is a paid FBI informant who is earning $1,800 a month to run the Tri-States “National Information Center.” After members learn of Parsons’s FBI connections during the bombing conspiracy trial of militia leader Willie Ray Lampley (see November 9, 1995), the organization dissolves, with members accusing each other of a variety of crimes. Alabama militiaman Mike Vanderboegh accuses Glover of being an “agent provocateur,” paid by the government to encourage “patriots” to commit illegal acts and bring law enforcement down upon them. Vanderboegh says Glover “was tossed out of the organization for scaring little old ladies on patriot shortwave with tales of millions of jabbering communists poised to invade from Mexico… his mental health was the subject of intense and frequent debate during his association with Tri-States, and from personal observation I would say that he is either looney tunes or crazy like a fox.… It would be fair to say that he is an unstable personality with paranoid ideations [sic]. He started out with a pretty fair constitutional militia unit in Kansas, but his inherent instability caused most of his troops to vote with their feet to other, more responsible commanders (i.e., non-nutburgers that didn’t propose to START a war). Glover has a serious John Brown complex and has spoken of sparking the second American Civil War. He just can’t seem to figure out where Harper’s Ferry is at.” With his credibility among “mainstream” militia members in question, Glover will begin associating with more radical, violence-prone anti-government extremists. [Mark Pitcavage, 1997]

Entity Tags: Federal Bureau of Investigation, Bradley Glover, Willie Ray Lampley, Tri-States Militia, Mike Vanderboegh, John Parsons

Timeline Tags: US Domestic Terrorism

Sheila E. Witnall, the secretary of the Air Force, declassifies all Air Force accident reports prior to January 25, 1956. The declassification includes the 1948 crash of the B-29 bomber that killed nine of 13 crew members during a secret “Project Banshee” mission (see October 6, 1948). The formerly classified reports had been at the heart of the case of US v Reynolds (see March 9, 1953) that sparked the so-called “state secrets” privilege. Four years after the declassification, the daughter of one of the slain civilians on board, Judy Palya Loether, finds the accident report on the Internet; the discovery spurs her to begin looking into the circumstances of her father’s death, and ultimately will result in a second lawsuit being filed on behalf of the families of the slain crewmen (see February 26, 2003). [Siegel, 2008, pp. 205-208]

Entity Tags: Project Banshee, Sheila E. Witnall, Judy Palya Loether, US Department of the Air Force

Timeline Tags: Civil Liberties

Law professor John Yoo writes a lengthy essay for the California Law Review entitled “The Continuation of Politics by Other Means: The Original Understanding of War Powers,” in which he argues that the Founding Fathers intended to empower presidents to launch wars without Congressional permission. Yoo has clerked for conservative judge Laurence Silberman and equally conservative Supreme Court Justice Clarence Thomas, and served for a year as counsel to then-Senate Judiciary Committee Chairman Orrin Hatch (R-UT). He has become a regular speaker at Federalist Society events, the informal but influential group of conservative lawyers, judges, and legal scholars who will come to have so much influence in the Bush administration. You argues that for generations, Constitutional scholars have misread the Constitution: the Founders actually supported, not repudiated, the British model of executive power that gave the king the sole power of declaring war and committing forces to battle. The Constitution’s granting of the legislature—Congress—the power to “declare war” is merely, Yoo writes, a reference to the ceremonial role of deciding whether to proclaim the existence of a conflict as a diplomatic detail. The Founders always intended the executive branch to actually declare and commence war, he writes. Most other Constitutional scholars will dismiss Yoo’s arguments, citing notes from the Constitutional Convention that show the Founders clearly intended Congress, not the president, to decide whether to commit the country to war. One of those Founders, James Madison, wrote in 1795 that giving a president the unilateral ability to declare war “would have struck, not only at the fabric of the Constitution, but at the foundation of all well organized and well checked governments. The separation of the power of declaring war from that of conducting it, is wisely contrived to exclude the danger of its being declared for the sake of its being conducted.” [Savage, 2007, pp. 80-81] Yoo will go on to join the Bush administration’s Office of Legal Counsel, and write numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002).

Entity Tags: Federalist Society, John C. Yoo

Timeline Tags: Civil Liberties

The Supreme Court rules in the case of Colorado Republican Federal Campaign Committee v. Federal Election Committee. The case originated with advertisements run by the Colorado Republican Party (CRP) in 1986 attacking the Colorado Democratic Party’s likely US Senate candidate. Neither party had yet selected its candidate for that position. The Federal Election Commission (FEC) sued the CRP’s Federal Campaign Committee, saying that its actions violated the “party expenditure provision” of the Federal Election Campaign Act (FECA—see February 7, 1972, 1974, and May 11, 1976) by spending more than the law allows. The CRP in turn claimed that FECA violated its freedom of speech, and filed a counterclaim. A Colorado court ruled in favor of the CRP, dismissing the counterclaim as moot, but an appeals court overturned the lower court’s decision. The Supreme Court rules 7-2 in favor of the FEC. The decision is unusual, lacking a clear majority, but being comprised of a “plurality” of concurrences. The majority opinion, such as it is, is authored by Justice Stephen Breyer, one of the Court liberals, and is joined by fellow liberal David Souter and conservative Sandra Day O’Connor. Conservatives Anthony Kennedy, William Rehnquist, and Antonin Scalia go farther than Breyer’s majority decision, writing that the provision violates the First Amendment when it restricts as a “contribution” a political party’s spending “in cooperation, consultation, or concert, with a candidate.” In yet another concurrence, conservative Clarence Thomas argues that the entire provision is flatly unconstitutional. Liberals John Paul Stevens and Ruth Bader Ginsburg dissent, agreeing with the appeals court. [Oyez (.org), 2011; Moneyocracy, 2/2012] In 2001, the Court will revisit the case and find its initial ruling generally sound, though the later decision will find that some spending restrictions are constitutional. In the revisiting, four of the Court’s five conservatives will dissent, with the liberals joined by O’Connor. [Oyez (.org), 2011; Moneyocracy, 2/2012]

Entity Tags: Colorado Republican Party, Colorado Democratic Party, Antonin Scalia, Anthony Kennedy, US Supreme Court, Stephen Breyer, William Rehnquist, Clarence Thomas, Federal Election Campaign Act of 1972, David Souter, Colorado Republican Party Federal Campaign Committee, Sandra Day O’Connor, Ruth Bader Ginsburg, Federal Election Commission, John Paul Stevens

Timeline Tags: Civil Liberties

August 21, 1996: War Crimes Act Becomes Law

The War Crimes Act (HR 3680) becomes Public Law No: 104-192. It prohibits Americans—top officials and soldiers alike—from committing “grave breaches” of the Geneva Conventions. It states: “Whoever, whether inside or outside the United States, commits a grave breach of the Geneva Conventions,” provided that the perpetrator or the victim is a member of the US military or a national of the US, “shall be fined under this title or imprisoned for life or any term of years, or both, and if death results to the victim, shall also be subject to the penalty of death.” [Newsweek, 11/5/2001]

Entity Tags: Geneva Conventions, War Crimes Act

Timeline Tags: Torture of US Captives, Civil Liberties

A lieutenant general meets with Qwest CEO Joe Nacchio and Dean Wandry, who heads Qwest’s government business unit. According to documents filed in 2006 by Nacchio concerning his trial on insider trading charges (see October 12, 2007), the general “told Mr. Wandry that he ran the largest telecom operation in the world, he had looked at Qwest’s network, and he wanted to use it for government purposes.” The general in question could be NSA Director Kenneth Minihan, who will be replaced in 1999 by another lieutenant general, Michael Hayden, but neither Minihan nor Hayden will comment on the allegation. Many former intelligence officials will say that it is likely Minihan who met with Nacchio and Wandry. Nacchio’s court documents indicate that he and Wandry agree to work with the general. Nacchio is not allowed to announce the contract publicly, but according to the court documents, he “understood at the time this was the beginning of a relationship which had enormous potential for future work. This proves increasingly true as time went on.” By 1999 Qwest is working extensively with the NSA. Minihan is particularly concerned about the potential of “cyberwarfare” by foreign governments, terrorist organizations, drug cartels, and organized crime, a prospect which he felt the NSA is unprepared. He particularly worries about Russia and China; in June 1998, he will testify are training personnel in potential cyber-attacks. “These opportunists, enabled by the explosion of technology and the availability of inexpensive, secure means of communication, pose a significant threat to the interests of the United States and its allies,” Minihan will state. In 2007, a former senior NSA official will say that the agency felt those groups knew US privacy laws all too well and were capable of using those laws against the NSA and other intelligence agencies. He will say, “There was such a nuanced understanding of how to tie us in knots and use American law against us, that there were certainly pockets of people saying, ‘We’ve got to be assertive; we’ve got to be more aggressive on this.’” Hayden, Minihan’s successor, will be particularly willing to push agency operations to the edge of legality. After 9/11, Hayden will say, “We’re pretty aggressive within the law. As a professional, I’m troubled if I’m not using the full authority allowed by law.” [National Journal, 11/2/2007] The NSA will approach Qwest will a similar offer in the months before 9/11 (see February 2001).

Entity Tags: Michael Hayden, Dean Wandry, Kenneth Minihan, National Security Agency, Joe Nacchio, Qwest

Timeline Tags: Civil Liberties

The US enacts a law banning torture or abuse by any government official or employee. Title 18 of the US Code, Chapter 113C, Section 2340 bans US officials anywhere in the world from intentionally inflicting “severe physical or mental pain or suffering” upon another person in their control. Violation of this statute would earn the convicted official up to 20 years in prison; if a detainee dies as a result of the abuse, the convicted official can be sentenced to death. Any American official who conspires to have a prisoner abused is subject to the same penalties. [Legal Information Institute, 1/26/1998; Savage, 2007, pp. 155]

Timeline Tags: Torture of US Captives

Princess Diana at a mine field in Angola in 1997.Princess Diana at a mine field in Angola in 1997. [Source: Tim Graham / Corbis]The NSA admits that US intelligence agencies possess 1,056 pages of classified information regarding Britain’s Princess Diana. British tabloids portray the documents as rife with salacious information on Diana’s “most intimate love secrets” about her relationship with Egyptian billionaire Dodi al-Fayed, but the actual documentation may not be so lurid. The NSA recently denied a Freedom of Information request from the Internet news service APB Online about information it has collected on Diana, who died in a tragic car accident in 1997. (It is unclear whether US intelligence has any unreleased information about the circumstances of Diana’s death. [APB Online, 11/30/1998; Washington Post, 12/12/1998] The NSA has denied monitoring Diana on the night of her death, an allegation raised by The Observer in 2006.) [MSNBC, 12/11/2006] In the two-page letter denying the request, the NSA admits to possessing a “Diana file,” but refuses to divulge what is in that file. A US intelligence official says the information is made up of conversations between other people who mentioned Diana; the references to Diana in those intercepted conversations are “incidental.” The official says Diana was never a particular target of the NSA’s Echelon surveillance program. However, the NSA has classified 124 pages of the “Diana documents” as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security.” According to a recent report by the European Parliament, the NSA routinely monitors virtually “all e-mail, telephone and fax communications… within Europe” (see July 11, 2001). Intelligence expert Steven Aftergood of the Federation of American Scientists says “the US and our allies promiscuously collect electronic communications around the world. Whether the descriptions of Echelon are accurate or not, that much is definitely true.” Some believe that lurid snippets of information leaked to the British press regarding Diana’s affair with Fayed, and her ambivalent relationship with Prince Charles, may have come from Echelon wiretaps and surveillance. Another FAS scientist, John Pike, says the NSA and other US intelligence agencies may have been monitoring Diana to protect her from terrorist attacks. Pike says it is also possible she may have been monitored because of her involvement in banning land mines, a position opposed by the Pentagon. [APB Online, 11/30/1998; Washington Post, 12/12/1998] Former NSA official Wayne Madsen will say in 2000, “[W]hen NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?” [CBS News, 2/27/2000] In August 1999, the NSA will deny another Freedom of Information request about its “Diana file” from the British newspaper The Guardian. [Guardian, 8/6/1999]

Entity Tags: Steven Aftergood, Prince Charles, The Guardian, John Pike, Dodi al-Fayed, Echelon, Federation of American Scientists (FAS), National Security Agency, Princess Diana

Timeline Tags: Civil Liberties

Richard Barlow, a former intelligence analyst who was repeatedly fired for correctly claiming that Pakistan had a nuclear weapons program (see 1981-1982, August 1987-1988 and August 4, 1989), is awarded a total of $1 million by President Bill Clinton in compensation for the treatment he received. However, Barlow does not receive the money, as the settlement has to be ratified by Congress. When it runs into procedural problems, it is moved to the Court of Federal Claims to be reviewed. After Clinton is replaced by George W. Bush, CIA Director George Tenet and NSA Director Michael Hayden assert the government’s “state secrets privilege” (see March 9, 1953) over Barlow’s entire legal claim, causing it to collapse due to lack of evidence. [Guardian, 10/13/2007]

Entity Tags: William Jefferson (“Bill”) Clinton, Richard Barlow, National Security Agency, Michael Hayden, Court of Federal Claims, Central Intelligence Agency, George J. Tenet

Timeline Tags: A. Q. Khan's Nuclear Network

President Clinton orders the US Air Force to participate in a NATO bombing campaign in Kosovo. The campaign lasts for 79 days, and constitutes the first time since the War Powers Resolution became law in 1974 that any president has deployed US forces into overseas combat for over 60 days without Congressional authorization. Clinton’s legal advisers argue that Clinton has all the authority he needs to continue the air war because on May 22 Congress passes an emergency spending bill to fund the Kosovo war, just days before the 60-day clock runs out. The War Powers Resolution explicitly forbids appropriations to count as authorization, so Clinton’s legal ground is shaky. In 2007, author and reporter Charlie Savage will note the unusual role reversal in Washington—Democrats, who had insisted that Republican presidents obey the War Powers Resolution, now stand by Clinton (or at least offer no overt criticism), and Republicans, who had argued that Congress had no right to challenge a president’s authority to conduct a war as he sees fit, now challenge Clinton’s authority under the selfsame War Powers Resolution they have previously criticized. The Congressional debate ends inconclusively when the air campaign ends. [Savage, 2007, pp. 65-66]

Entity Tags: William Jefferson (“Bill”) Clinton, Charlie Savage

Timeline Tags: Civil Liberties

President Clinton signs the National Missile Defense Act of 1999 (NMDA), which states in its entirety, “It is the policy of the United States to deploy as soon as is technologically possible an effective National Missile Defense system capable of defending the territory of the United States against limited ballistic missile attack (whether accidental, unauthorized, or deliberate).” The NMDA mandates that the US will deploy some sort of missile defense system (see March 23, 1983 and January 29, 1991), but Clinton will refuse to order the system’s deployment in 2000, in part because it has failed its tests and in part because to deploy the system would require the US to withdraw from the 1972 Anti-Ballistic Missile Treaty (see May 26, 1972), a move Clinton is unwilling to make. Clinton will acknowledge that the US makes its own national security decision, but will add, “We can never afford to overlook the fact that the actions and reactions of others in this increasingly interdependent world do bear on our security.” [US Senate, 7/22/1999; White House, 7/22/1999; Scoblic, 2008, pp. 173-174]

Entity Tags: National Missile Defense Act, William Jefferson (“Bill”) Clinton

Timeline Tags: US International Relations

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

Diana Dean.Diana Dean. [Source: Seattle Times]Al-Qaeda operative Ahmed Ressam is arrested in Port Angeles, Washington, attempting to enter the US with components of explosive devices. One hundred and thirty pounds of bomb-making chemicals and detonator components are found inside his rental car. He subsequently admits he planned to bomb Los Angeles International Airport on December 31, 1999. [New York Times, 12/30/2001] Alert border patrol agent Diana Dean stops him; she and other agents nationwide had been warned recently to look for suspicious activity. Ressam’s bombing would have been part of a wave of attacks against US targets over the New Year’s weekend (see December 15-31, 1999). He is later connected to al-Qaeda and convicted. [US Congress, 9/18/2002; PBS Frontline, 10/3/2002]

Entity Tags: Diana Dean, Ahmed Ressam, Los Angeles International Airport, Al-Qaeda

Timeline Tags: Complete 911 Timeline

While the 9/11 hijackers are in the US, the NSA intercepts several calls between them and an al-Qaeda communications hub in Sana’a, Yemen, run by Ahmed al-Hada, who is hijacker Khalid Almihdhar’s father-in-law (see August 4-25, 1998).
Summary of Calls -
bullet The first calls are made by Almihdhar and are intercepted during the spring and summer of 2000 (see Spring-Summer 2000).
bullet More calls are made by hijacker Nawaf Alhazmi after the bombing of the USS Cole in October 2000 (see Mid-October 2000-Summer 2001).
bullet The final call from the US is intercepted just a few weeks before 9/11 (see (August 2001)).
The NSA intercepted the hijackers’ calls outside the US before this (see Early 1999 and December 29, 1999) and continues to do so in 2000 (see Summer 2000) after Almihdhar returns to Yemen (see June 10, 2000 and (Mid-June-Mid-July 2000)).
Calls' Content - Some of the calls may only contain non-operational information, as they are reportedly between Almihdhar and his wife. [9/11 Commission, 7/24/2004, pp. 222; Suskind, 2006, pp. 94; Wright, 2006, pp. 343] However, the calls are also used to relay messages to the 9/11 hijackers. [Embassy of Yemen (Washington), 2/13/2002; MSNBC, 2/14/2002; MSNBC, 5/2005]
Agencies' Roles - The CIA is the lead agency monitoring the communications hub. It has planted bugs inside it and is wiretapping all calls (see Late August 1998). Intercepts of calls to and from the hub are a major plank of the US intelligence community’s effort to fight al-Qaeda. Also involved is the FBI, which is using phone records to plot these calls on a map (see Late 1998-Early 2002). Some of the calls intercepted by US intelligence come from Osama bin Laden’s satellite phone in Afghanistan (see August 4-25, 1998 and Late August 1998). After 9/11, counterterrorism officials will say that the number was one of the hottest targets being monitored by the NSA and was an “intelligence bonanza.” [Los Angeles Times, 12/21/2005; Wright, 2006, pp. 343]
Importance of Failure - Also after 9/11, counterterrorism officials will agree that the failure to follow leads to the US from this number was a huge missed opportunity to stop the 9/11 plot. For instance, FBI agent Kenneth Maxwell will say: “Two al-Qaeda guys living in California—are you kidding me? We would have been on them like white on snow: physical surveillance, electronic surveillance, a special unit devoted entirely to them.” [MSNBC, 7/21/2004; New Yorker, 7/10/2006 pdf file]
Discussed after 9/11 - The failure to roll up the plot based on these communications intercepts will be discussed following 9/11 (see Summer 2002-Summer 2004 and March 15, 2004 and After).

Entity Tags: Federal Bureau of Investigation, Central Intelligence Agency, Khalid Almihdhar, Nawaf Alhazmi, National Security Agency, Hoda al-Hada, Ahmed al-Hada, Kenneth Maxwell

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Judy Palya Loether.Judy Palya Loether. [Source: SecrecyFilm (.com)]Judy Palya Loether, the daughter of a civilian engineer killed in a 1948 plane crash while on a secret government mission (see October 6, 1948), reads over the voluminous reports of the accident that claimed her father’s life. The reports, now declassified (see January 1996), had been at the heart of a landmark lawsuit that gave judicial recognition to the government’s “state secrets” privilege (see March 9, 1953). Loether is shocked to find that the reports contain nothing that could be construed as military or tactical secrets of any kind, though for decades the government has insisted that they could not be revealed, even to a judge (see October 18, 1948, July 26, 1950, August 7-8, 1950, September 21, 1950, and October 19, 1951). What they do contain is a compendium of witness statements and expert findings that indicate a number of mistakes and errors led to the crash. Loether begins contacting the families of the widows who had filed the original lawsuit against the government (seeJune 21, 1949) to share her findings. [Siegel, 2008, pp. 210-211] Loether is confused and angered over the contents of the reports, and the government’s response to the lawsuit. She cannot understand why the government pressed so hard to keep the reports classified, knowing that they contained no sensitive information about the secret missile program, and is particularly troubled by the fact that at least two senior government officials signed affidavits affirming the reports’ inclusion of such information while knowing that the reports contained nothing of the sort. She wonders if government officials had perhaps decided to lie about the reports in order to establish some sort of state secrets privilege. In September 2002, lawyers Wilson Brown and Jeff Almeida, retained by Loether and others who lost family members in the crash, come to the same conclusion. As Almeida will say to Brown: “I’ve read this report. There’s nothing in there.” [Siegel, 2008, pp. 219] As time goes on, Loether and her colleagues files a second lawsuit seeking to overturn the first Supreme Court verdict (see February 26, 2003).

Entity Tags: Wilson Brown, Jeff Almeida, Judy Palya Loether

Timeline Tags: Civil Liberties

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

The US routinely denies that its satellite surveillance program, Echelon, provides any information to corporations, noting that the law clearly prevents such transactions. But former CIA director James Woolsey confirms that the US does indeed conduct economic espionage against its European allies, though he does not specifically mention Echelon. Woolsey, a well-known neoconservative, justifies such actions by accusing European companies of using bribery to gain unfair advantages against US corporations. “We have spied on you because you bribe,” he writes in the Wall Street Journal. “[European] products are often more costly, less technically advanced or both, than [their] American competitors’. As a result [they] bribe a lot.” [BBC, 7/6/2000]

Entity Tags: Echelon, Wall Street Journal, James Woolsey

Timeline Tags: Civil Liberties

President Clinton considers building a radar facility as part of a proposed national missile defense system. Clinton’s legal advisers have told him that he could “interpret” the 1972 Anti-Ballistic Missile (ABM) Treaty (see May 26, 1972) to allow such a facility, even though the treaty clearly prohibits any moves towards a missile defense system. Clinton later authorizes the construction of a radar facility in Alaska, but leaves the bulk of the decision-making to the next administration. [Agence France-Presse, 6/21/2000; Savage, 2007, pp. 67] Clinton’s successor, George W. Bush, will withdraw from the treaty entirely (see December 13, 2001).

Entity Tags: George W. Bush, William Jefferson (“Bill”) Clinton

Timeline Tags: US International Relations

John Yoo, an associate law professor at the University of California at Berkeley, makes a presentation at a Cato Institute seminar on executive power. Yoo, who will go on to become one of the Bush administration’s primary advocates of unchecked executive power (see March 1996), accuses the Clinton administration of upending the Constitution to give the executive branch unwarranted authority (see March 24 - Mid-June, 1999). “[T]he Clinton administration has undermined the balance of powers that exist in foreign affairs, and [they] have undermined principles of democratic accountability that executive branches have agreed upon well to the Nixon administration,” he says. Regarding the Clinton administration’s stretched interpretation of the Anti-Ballistic Missile Treaty (see June 2000), Yoo says that the Clinton “legal arguments are so outrageous, they’re so incredible, that they actually show, I think, a disrespect for the idea of law, by showing how utterly manipulatible it is.” [Savage, 2007, pp. 67]

Entity Tags: Bush administration (43), John C. Yoo, Nixon administration, Clinton administration

Timeline Tags: Civil Liberties

Texas Governor George W. Bush, the Republican candidate for president, accepts his party’s nomination for president during the Republican National Convention in Philadelphia. During his speech, he declares his intent to move the United States away from observing “outdated” treaties such as the 1972 Anti-Ballistic Missile Treaty with Russia (see May 26, 1972). “Now is the time,” he says, “not to defend outdated treaties, but to defend the American people.” Less than a year after taking office, Bush will unilaterally withdraw the US from the treaty (see December 13, 2001). [Savage, 2007, pp. 140]

Entity Tags: George W. Bush

Timeline Tags: US International Relations

Jose Padilla, an American Muslim who has recently become interested in becoming an al-Qaeda fighter, attends an al-Qaeda training camp in Afghanistan. He goes under the name Abdullah al-Espani. [Associated Press, 6/2004]

Entity Tags: Jose Padilla, Al-Qaeda

Timeline Tags: Torture of US Captives, Complete 911 Timeline

October 12, 2000: USS Cole Bombed by Al-Qaeda

Damage to the USS Cole.Damage to the USS Cole. [Source: Department of Defense]The USS Cole is bombed in the Aden, Yemen harbor by two al-Qaeda militants, Hassan al-Khamri and Ibrahim al-Thawar (a.k.a. Nibras). Seventeen US soldiers are killed and 30 are wounded. The CIA will later conclude that with just slightly more skilled execution, the attack would have killed 300 and sunk the ship. [ABC News, 10/13/2000; Coll, 2004, pp. 532; 9/11 Commission, 7/24/2004, pp. 191] The Islamic Army of Aden (IAA) immediately takes credit for the attack. This is a Yemen-based Muslim militant group widely believed to have close ties to al-Qaeda (see 1996-1997 and After). [Guardian, 10/14/2000] The IAA statement is released by its spokesman, Abu Hamza al-Masri (see Early 1997, (June 1998), and December 28, 1998 and After). Abu Hamza says that the attack was timed to mark the anniversary of the execution of the IAA’s former commander (see October 17, 1999). [O'Neill and McGrory, 2006, pp. 184] The prime minister of Yemen at the time of the bombing will say shortly after 9/11, “The Islamic Army was part of al-Qaeda.” [Guardian, 10/13/2001] The US soon learns the names of some al-Qaeda operatives involved in the attack, including Khalid Shaikh Mohammed, Tawfiq bin Attash and Fahad al-Quso (see Early December 2000), and Abd al-Rahim al-Nashiri (see November-December 2000). 9/11 hijackers Ramzi bin al-Shibh (see October 10-21, 2000) and Khalid Almihdhar (see Around October 12, 2000) may also have been involved. This is a repeat of a previously attempted attack, against the USS The Sullivans, which failed and was apparently undetected (see January 3, 2000). [Los Angeles Times, 12/22/2002] The 9/11 Commission will later say the Cole bombing “was a full-fledged al-Qaeda operation, supervised directly by bin Laden. He chose the target and location of the attack, selected the suicide operatives, and provided the money needed to purchase explosives and equipment.” [9/11 Commission, 7/24/2004, pp. 190]

Entity Tags: Khalid Shaikh Mohammed, Khallad bin Attash, Ramzi bin al-Shibh, Islamic Army of Aden, USS Cole, Osama bin Laden, Ibrahim al-Thawar, Khalid Almihdhar, Fahad al-Quso, Abd al-Rahim al-Nashiri, Hassan al-Khamri, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). [Truthout (.org), 1/17/2006] In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. [New York Times, 12/16/2007]

Entity Tags: Bush administration (43), National Security Agency

Timeline Tags: Civil Liberties

Page 1 of 8 (762 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike