!! History Commons Alert, Exciting News

Context of 'August 4, 2005: Lobbyists Indicted for Passing Classified Information to Israel; Holding Citizens to Same Standards as Government Officials'

This is a scalable context timeline. It contains events related to the event August 4, 2005: Lobbyists Indicted for Passing Classified Information to Israel; Holding Citizens to Same Standards as Government Officials. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 2 (120 events)
previous | 1, 2 | next

Richard Perle, a young neoconservative just hired for the staff of Senator Henry “Scoop” Jackson (D-WA—see Early 1970s), is given a classified CIA report on alleged past Soviet treaty violations by CIA analyst David Sullivan. Apparently Sullivan leaks the report to pressure the US government to take a harder stance on the Soviet Union. Sullivan quits before an incensed CIA Director Stansfield Turner can fire him. Turner urges Jackson to fire Perle, but Jackson not only refuses, he also hires Sullivan for his staff. Sullivan and Perle establish an informal right-wing network called “the Madison Group” after their usual meeting place, the Madison Hotel Coffee Shop. [CounterPunch, 2/28/2004]

Entity Tags: Richard Perle, ’Madison Group’, David Sullivan, Central Intelligence Agency, Stansfield Turner, Henry (“Scoop”) Jackson

Timeline Tags: Neoconservative Influence

An FBI wiretap at the Israeli Embassy in Washington picks up Richard Perle, an aide to Senator Henry “Scoop” Jackson (D-WA—see Early 1970s), discussing classified information with an Israeli official. This is the second time Perle has been involved in providing classified information to Israel (see Late 1969). This data was given to Perle by National Security Council staff member Helmut “Hal” Sonnenfeldt, who has been under investigation since 1967 for providing classified documents to the Israelis. [Atlantic Monthly, 5/1982; American Conservative, 3/24/2003; CounterPunch, 2/28/2004]

Entity Tags: Helmut Sonnenfeldt, Richard Perle, Henry (“Scoop”) Jackson

Timeline Tags: US International Relations, Neoconservative Influence

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” [Dubose and Bernstein, 2006, pp. 34-35]

Entity Tags: Seymour Hersh, US Department of Defense, Ford administration, Edward Levi, Donald Rumsfeld, Church Committee, Richard (“Dick”) Cheney, Philip Buchan, New York Times, Gerald Rudolph Ford, Jr

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Paul Wolfowitz, a young neoconservative with the Arms Control and Disarmament Agency (ACDA—see 1973), is investigated for giving classified documents on the proposed sale of US weapons to an Arab government to an Israeli government official, through the auspices of an official with the American Israel Public Affairs Committee (AIPAC). An inquiry is launched but later dropped, and Wolfowitz will continue with ACDA through 1980. [CounterPunch, 2/28/2004]

Entity Tags: Paul Wolfowitz, American Israel Public Affairs Committee, Arms Control and Disarmament Agency

Timeline Tags: US International Relations, Neoconservative Influence

Dr. Stephen Bryen, a neoconservative staff member of the Senate Foreign Relations Committee, is accused of espionage against the US. An affidavit written by Deputy Assistant Attorney General Robert Keuch recommends a grand jury convene to hear evidence that Bryen had offered classified information to an Israeli Embassy official, Zvi Rafiah, the Mossad station chief in Washington (see March 1978). Bryen made the offer in the presence of the director of the American Israel Public Affairs Committee (AIPAC). Bryen refused to take an FBI lie detector test, but the AIPAC director agreed, and passed the test. One of Bryen’s Senate committee colleagues also tells FBI investigators that she later saw Bryen offering a pile of documents to Rafiah from an open safe in Bryen’s Senate office. Bryen’s fingerprints were found on classified documents which he denied ever handling—the same documents he allegedly offered to Rafiah. The investigation is derailed when the Senate Foreign Relations Committee refuses to grant the FBI access to files key to the probe. Bryen will resign his position with the committee at the insistence of Philip Heymann, the assistant attorney general in charge of the Justice Department’s criminal division, and under strong pressure from senators Clifford Case (R-NJ), who is Bryen’s boss, and Henry “Scoop” Jackson (D-WA). Heymann happens to be a close personal friend and associate of Bryen’s attorney. Soon after his resignation, Bryen will take a post as the executive director of the Jewish Institute for National Security Affairs (JINSA). In 1981, neoconservative Richard Perle, an assistant secretary of defense and then-aide to Jackson, will secure Bryen top-secret security clearance. Bryen will become Perle’s deputy, and will continue to provide Israel with classified information and materials (see May 1988 and After). [Nation, 6/29/1985; Washington Report on Middle East Affairs, 7/4/1986; CounterPunch, 2/28/2004]

Entity Tags: Senate Foreign Relations Committee, Henry (“Scoop”) Jackson, Clifford Case, American Israel Public Affairs Committee, Jewish Institute for National Security Affairs, Robert Keuch, Philip Heymann, Zvi Rafiah, Richard Perle, Stephen Bryen

Timeline Tags: Neoconservative Influence

Richard Perle, a former Senate aide (see Late 1969) and consultant with the Abington Corporation defense consultancy firm, has recently become an assistant secretary of defense. Two of his first clients with Abington were Israeli arms dealers Shlomo Zabludowicz, and his son Chaim Zabludowicz (see March 1980), who now want to sell the US weapons produced by Soltam Ltd, an Israeli company that makes mortars, artillery, ammunition, and other civilian and military products. Shlomo Zabludowicz is the founder of Soltam and its principal shareholder. Soltam agrees to pay Abington $10,000 a month for a period of one year. In return, Perle writes a letter to the secretary of the Army recommending the evaluation and purchase of 155 mm. shells manufactured by Soltam. [New York Times, 4/17/1983; CounterPunch, 2/28/2004] Perle will say in a later interview with the New York Times that the amount was paid to him for services he provided Soltam during the previous year, and not for services rendered while working in the Pentagon. In January 1982, he will also receive a portion of a $90,000 fee that Soltam pays to Abington (see January 1982) The payments made to Perle and Abington are both funneled though Tamares, a small London-based subsidiary of Salgad, another company founded by Shlomo Zabludowicze and based in Liechtenstein. [New York Times, 4/17/1983] When Perle leaves his Defense Department position in 1987, he will go to work for Soltam. [CounterPunch, 2/28/2004]

Entity Tags: Shlomo Zabludowicz, Salgad, Abington Corporation, Chaim Zabludowicz, Richard Perle, Soltam Ltd., Tamares

Timeline Tags: Neoconservative Influence

Douglas Feith, a neoconservative (see Early 1970s) serving as a Middle East analyst for the National Security Council, is fired after becoming the focus of an FBI inquiry into his giving classified NSC information to an Israeli embassy official in Washington. [CounterPunch, 2/28/2004] (Feith has always been a hardline advocate for Israel; his father, Dalck Feith, was a hardline Republican who, in his youth, was active in the militant Zionist youth movement Betar, the predecessor of Israel’s Likud Party. Both Feith and his father will be honored by the hard-right, Likud-aligned Zionist Organization of America.) [Inter Press Service, 11/7/2003] In 1992, Feith will write of his belief that the US and Israel should freely share technology; author Stephen Green will write regarding Feith’s leak of classified information to Israel that “what [Feith] had neglected to say… was that he thought that individuals could decide on their own whether the sharing of classified information was ‘technical cooperation,’ an unauthorized disclosure, or a violation of US Code 794c, the ‘Espionage Act.’” Feith is almost immediately rehired by fellow neoconservative Richard Perle to serve as Perle’s “special counsel” (see Mid-1982); Feith will work for Perle until 1986, when he forms what Green will call “a small but influential law firm… based in Israel.” [CounterPunch, 2/28/2004]

Entity Tags: National Security Council, Dalck Feith, Betar, Douglas Feith, Likud, Richard Perle, Federal Bureau of Investigation, Stephen Green

Timeline Tags: Neoconservative Influence

Neoconservative academic Michael Ledeen is brought into the Defense Department as a consultant on terrorism, via the auspices of Assistant Secretary of Defense Richard Perle, a fellow neoconservative. Ledeen’s supervisor, Noel Koch, is troubled by Ledeen’s frequent visits to his office to read classified documents. When Koch and Ledeen journey to Italy on Pentagon business, Koch learns that Ledeen is considered an “agent of influence” for a foreign government: Israel. After returning from Italy, Ledeen asks Koch to help him obtain two highly classified CIA reports which he says are being held by the FBI. Ledeen gives Koch the reports’ “alpha numeric designators”—numbers as highly classified as the reports themselves. Koch is at a loss to understand how Ledeen obtained such information. Koch tells his executive assistant to stop allowing Ledeen to access the classified materials in his office. In return, Ledeen stops coming to work. [CounterPunch, 2/28/2004] Shortly thereafter, Ledeen will begin “consulting work” for the National Security Council (see Late 1984).

Entity Tags: Michael Ledeen, Central Intelligence Agency, US Department of Defense, Richard Perle, Noel Koch

Timeline Tags: Neoconservative Influence

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Timeline Tags: Civil Liberties

Destruction at the Khobar Towers, Dhahran, Saudi Arabia.Destruction at the Khobar Towers, Dhahran, Saudi Arabia. [Source: US Air Force]Explosions destroy the Khobar Towers in Dhahran, Saudi Arabia, killing 19 American soldiers and wounding 500. [CNN, 6/26/1996] Saudi officials will later interrogate the suspects, declare them guilty, and execute them—without letting the FBI talk to them. [PBS Frontline, 2001; Irish Times, 11/19/2001] Saudis will blame Hezbollah, the Iranian-influenced group, but US investigators will still believe Osama bin Laden was involved. [Seattle Times, 10/29/2001] US intelligence will be listening when al-Qaeda’s number two leader Ayman al-Zawahiri calls bin Laden two days after the bombing to congratulate him on the operation (see June 27, 1996). The New York Times will report that Mamoun Darkazanli, a suspected al-Qaeda financier with extensive ties to the al-Qaeda Hamburg cell, is involved in the attack. [New York Times, 9/25/2001; New York Times, 9/29/2001] Bin Laden will admit to instigating the attacks in a 1998 interview. [Miami Herald, 9/24/2001] Ironically, the bin Laden family’s construction company will be awarded the contract to rebuild the installation. [New Yorker, 11/5/2001] In 1997, Canada will catch one of the Khobar Towers attackers and extradite him to the US. However, in 1999, he will be shipped back to Saudi Arabia before he can reveal what he knows about al-Qaeda and the Saudis. One anonymous insider will call it “President Clinton’s parting kiss to the Saudis.” [Palast, 2002, pp. 102] In June 2001, a US grand jury will indict 13 Saudis for the bombing. According to the indictment, Iran and Hezbollah were also involved in the attack. [US Congress, 7/24/2003]

Entity Tags: Ayman al-Zawahiri, Federal Bureau of Investigation, Hezbollah, Osama bin Laden, William Jefferson (“Bill”) Clinton, Al-Qaeda, Mamoun Darkazanli

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In the wake of the Khobar Towers bombing in Saudi Arabia (see June 25, 1996), the Saudi government continues to stonewall about their knowledge of radical militants in the country. Official inquiries about bin Laden go unanswered and the Saudis give no help to a US probe about the bombing. But often the US does not even ask the Saudis questions for fear of upsetting the Saudi government. Former US officials will later claim that even after the bombing, the CIA instructed officials at its Saudi station not to collect information on Islamic extremists in Saudi Arabia. [US News and World Report, 12/15/2003] It is not known how long this policy will continue, but there is evidence it continues until 9/11. In August 2001, former CIA agent Robert Baer will attempt to give the CIA a list of hundreds of al-Qaeda operatives in Saudi Arabia and Yemen, but the CIA will show no interest in it (see August 2001). Fifteen of the nineteen 9/11 hijackers will reportedly come from Saudi Arabia.

Entity Tags: Saudi Arabia, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

In 1999, a retired CIA official will claim that two days after the Khobar Towers bombing in Saudi Arabia (see June 25, 1996), bin Laden is congratulated by colleagues about the bombing. Both Ayman al-Zawahiri, head of Islamic Jihad and al-Qaeda’s number two leader, and Ashra Hadi, head of the Palestinian Islamic Jihad, are monitored by the NSA as they call bin Laden. This helps confirm that bin Laden was being monitored while using his first satellite phone (see Early 1990s). It will be widely reported that he was monitored after he started using his second satellite phone later in 1996 (see November 1996-Late August 1998). Bin Laden does not exactly publicly take credit for the bombing, but later in the year he will say, “When I got the news about these blasts, I was very happy. This was a noble act. This was a great honor but, unfortunately, I did not conduct these explosions personally.” [Reeve, 1999, pp. 187; New Yorker, 9/9/2002]

Entity Tags: Ayman al-Zawahiri, National Security Agency, Osama bin Laden, Ashra Hadi

Timeline Tags: Complete 911 Timeline

Abdel-Bari Atwan, editor in chief of the British-based pan-Arab daily al-Quds al-Arabi, travels to Afghanistan to interview Osama bin Laden in the mountains of Tora Bora.
Atwan's Journey to Afghanistan - The interview is arranged by Khalid al-Fawwaz, bin Laden’s representative in Europe. Atwan travels secretly to Peshawar, Pakistan, where he meets a representative of bin Laden. Then, dressed as an Afghan, he crosses the border with a series of guides and travels to Jalalabad in eastern Afghanistan, where he meets al-Qaeda manager Mohammed Atef. Atwan is then taken up into the mountains, to the Eagle’s Nest base, where he meets bin Laden. Atwan first meets him “sitting cross-legged on a carpet, a Kalashnikov in his lap,” and they chat informally and then have dinner. Atwan spends two days in bin Laden’s company, and is surprised that such a rich Saudi is staying in such a humble cave, measuring six meters by four, and eating such poor food.
Bin Laden Speaks to Atwan - Bin Laden makes a number of comments during the two days, saying he has no fear of death, he still controls significant sums of money, the US military presence in Saudi Arabia is wrong, and the Sudanese government treated him badly over his recent expulsion and their non-repayment of funds he invested in Sudan (see May 18, 1996). He also talks of his time in Sudan and Somalia, as well as attempts on his life and bribes offered to him to tow the line by Saudi intelligence services. In addition, he claims responsibility for the “Black Hawk Down” incident (see October 3-4, 1993) and the Khobar Towers bombing (see June 25, 1996), and says other operations are in preparation. Atwan also notes that one part of the Eagle’s Nest has computers and Internet access, although this is not common in 1996.
No Signs of Bin Laden's Poor Health - Before the trip, Atwan had heard that bin Laden suffered from some mild form of diabetes. However, he will later comment: “I didn’t notice him taking any medication or showing any signs of ill health at all. We walked for more than two hours in the snow-covered mountains, and he seemed fit and well.” Therefore, Atwan will describe later accounts that say bin Laden requires kidney dialysis as “fanciful.” [Atwan, 2006, pp. 15-37, 61-62]

Entity Tags: Mohammed Atef, Abdel-Bari Atwan, Khalid al-Fawwaz, al-Quds al-Arabi, Al-Qaeda, Osama bin Laden

Timeline Tags: Complete 911 Timeline

In 2004, it will be reported, “A former very senior CIA counterintelligence official told UPI that in 1998-99, the CIA discovered an Israeli couple, who were subcontracted to a US phone company, were working for Mossad, the Israeli intelligence service. ‘They did incredible damage—they got incredibly sensitive data, including key words identifying individuals or projects,’” this source said, adding he himself gave the case to the FBI. Additional details are not known. [United Press International, 12/9/2004] In 2005, a US criminal indictment will reveal that the FBI began monitoring some Israeli diplomatic officials in the US by April 1999 (see April 13, 1999-2004), but is it not known if there is any connection between that and this case.

Entity Tags: Israel Institute for Intelligence and Special Tasks (Mossad), Central Intelligence Agency, Federal Bureau of Investigation, United Press International

Timeline Tags: Complete 911 Timeline

A 2005 US indictment will reveal that two employees for a pro-Israeli lobbying group had somehow obtained classified US information about al-Qaeda and was passing it on to Israeli officials. The two employees are Steven Rosen and Keith Weissman; both work for AIPAC (American Israel Public Affairs Committee) until 2004. On April 13, 1999, Rosen gives Rafi Barak, the former deputy chief of mission at the Israeli embassy in Washington, what he calls a codeword-protected “extremely sensitive piece of intelligence” about terrorist activities in Central Asia. On June 11, 1999, Weissman tells Barak about a classified FBI report on the 1996 Khobar Towers bombing, which has been blamed on al-Qaeda and/or Iran (see June 25, 1996). In retrospect, FBI officials will determine that some, but not all, of this classified information comes from Larry Franklin, a Defense Department analyst on Iran known to be in favor of a tougher US policy regarding Iran (see 2000-2001). It is not known how or why US surveillance of Rosen and Weissman began. [National Public Radio, 8/4/2005; Eastern District of Virginia, 8/4/2005 pdf file; Jerusalem Post, 8/15/2005; Jerusalem Post, 8/17/2005]
Connection to Earlier Investigation? - However, there may be a connection to an earlier investigation. In 1997 and 1998, the FBI monitored Naor Gilon, an official at the Israeli embassy in Washington, as part of an investigation into whether a US intelligence official was illegally giving US spy plane film and other secret material to the Mossad. [Los Angeles Times, 9/3/2004]
Accusations Spark Further Investigation - The US will later accuse Rosen and Weissman of passing classified information given to them by Franklin to Gilon. In any case, the investigation will continue and grow. National Public Radio will later note that from 1999 to 2004, “Franklin, Rosen, and Weissman had regular discussions about the Middle East and about al-Qaeda with a variety of contacts,” sometimes illegally sharing highly classified information. Franklin will plead guilty to sharing classified information in 2005 (see October 5, 2005) while Rosen and Weissman are expected to be tried in 2007 or thereafter. [National Public Radio, 8/4/2005]

Entity Tags: Rafi Barak, Naor Gilon, Keith Weissman, Larry Franklin, American Israel Public Affairs Committee, Steven Rosen

Timeline Tags: Complete 911 Timeline

The US deports Hani El-Sayegh, a Saudi National who is a suspect in the 1996 Khobar Towers bombing (see June 25, 1996), back to Saudi Arabia. [Grey, 2007, pp. 247] The deportation is approved by a US judge. [Washington Post, 10/29/2000]
History - In 1996, el-Sayegh, who had been living in Iran, moved to Kuwait. He later went to Canada, where he cut a deal with American officials that called for him to plead guilty in an unrelated plot against Americans in Saudi Arabia that was never carried out. In 1997, Canada expelled el-Sayegh for suspected terrorist activity. Attorney General Janet Reno allowed him into the United States solely for prosecution under the pact. But after arriving, he said he had not understood the accord, knew nothing about the Khobar attack, and was out of Saudi Arabia when the bombing occurred. Despite this, the Saudis suspected him of being present at the bombing and his brother was held in connection with it, and allegedly tortured in a Saudi jail. [New York Times, 10/12/1999]
Agreement - The deportation follows an agreement between FBI Director Louis Freeh and Prince Naif, Saudi Arabia’s interior minister. Under the agreement, el-Sayagh is returned to Saudi Arabia, and, according to officials familiar with the arrangement, FBI agents will be allowed to watch his interrogation through a one-way mirror and submit questions to his Saudi inquisitors. Washington Post journalist David Vine will comment, “Such practices are sharply at odds with Freeh’s oft-stated message about the FBI’s need to respect human dignity and the tenets of democracy while fighting crime.” Although FBI officials will say a year later they have not seen any indication that el-Sayegh has been tortured, Vine will add, “But agents say privately that when entering a foreign culture to do police work they do not have control over how prisoners are treated and must tread lightly.” [Washington Post, 10/29/2000]
Khobar Towers Attack Could Have Been Prosecuted in US - The Khobar Towers attacks may have been in Saudi Arabia, but were against US nationals, so suspects can be prosecuted in the US. Tony Karon of Time magazine will express surprise at the deportation: “Run that one by again: The United States doesn’t want to try a man suspected of a bomb attack that killed Americans—and they’re sending him home?!” However, the Justice Department apparently thinks there is not enough evidence to try him in the US, and, according to Time correspondent William Dowell, “Clearly, there’s a lower standard of proof in Saudi courts,” so, “It may be easier for Washington if the Saudis handle the trial—and the execution, which would likely follow.”
Possible Geopolitical Motive - According to Karon, an alternative explanation is that geopolitics may be behind the decision: “Sending el-Sayegh… back to Saudi Arabia could solve another touchy problem for Washington.” This is because President Clinton said the US would retaliate against any government that was involved in the attacks, and an Iranian hand is suspected in the bombing. However, according to Time Middle East bureau chief Scott Macleod: “the attack occurred before the election of President Khatami, who has clearly demonstrated a commitment to end state terrorism and normalize Iran’s relations with the rest of the world. Given Washington’s desire to strengthen his reformist government against its hard-line opponents, the US would be unlikely to take military action against Iran unless there were fresh acts of terrorism.” [Time, 10/5/1999]

Entity Tags: Louis J. Freeh, Janet Reno, Hani El-Sayegh, Nayef bin Abdul-Aziz, Federal Bureau of Investigation, Tony Karon, Scott Macleod, William Dowell

Timeline Tags: Torture of US Captives, Complete 911 Timeline

A nuclear proliferation network operating in the US penetrates the Pentagon and related institutions, according to FBI whistleblower Sibel Edmonds. Edmonds will later leave the FBI and say she knows this based on telephone conversations she translated as a part of an FBI investigation. The network, which is run by Pakistani scientist A. Q. Khan, but also includes Turkish and Israeli elements, is allegedly helped by a number of senior officials in the Pentagon. Edmonds will later say: “The [senior officials] provided lists of potential moles from Pentagon-related institutions who had access to databases concerning this information. The handlers, who were part of the diplomatic community, would then try to recruit those people to become moles for the network. The lists contained all their ‘hooking points,’ which could be financial or sexual pressure points, their exact job in the Pentagon and what stuff they had access to.” One of the Pentagon figures that is a target of the FBI investigation is Larry Franklin, an analyst who will be jailed in 2006 for passing US defense information to lobbyists and sharing classified information with an Israeli diplomat. According to Edmonds, Franklin is “one of the top people providing information and packages during 2000 and 2001.” [Sunday Times (London), 1/6/2008]

Entity Tags: US Department of Defense, Larry Franklin, Abdul Qadeer Khan, Sibel Edmonds, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network

The Bush team moves into Washington. Neoconservative Zalmay Khalilzad heads the Pentagon transition team, and he ensures that plenty of his friends and colleagues move into the civilian offices of the Defense Department. Four of the most influential advocates for the US overthrow of Iraq’s Saddam Hussein—Elliott Abrams, Douglas Feith, Richard Perle, and Abram Shulsky—are waiting to learn where they will serve in the department. But Vice President Cheney is still concerned with ensuring the placement of his own colleagues and cronies who will help him build what many will call the “imperial presidency.” Secretary of State Colin Powell, Cheney’s ideological rival, is working to install his friend and colleague Richard Armitage as deputy secretary of defense. For Cheney, Armitage would be a calamity—although Armitage is sufficiently hardline and in line with conservative foreign policy aims, he is far too centrist for Cheney and the neoconservatives. The neoconservative magazine the Weekly Standard alerts the faithful to the potential problem with an article entitled “The Long Arm of Colin Powell: Will the Next Secretary of State Also Run the Pentagon?” Powell does not get his wish; Armitage eventually becomes deputy secretary of state. Abrams will join the National Security Council; Khalilzad, Feith, and Shulksy will join the Defense Department; and Perle will head the Defense Policy Board, an independent group that advises the Pentagon. [Weekly Standard, 12/25/2000 pdf file; Unger, 2007, pp. 115, 191-192, 204, 249]

Entity Tags: Elliott Abrams, Colin Powell, Bush administration (43), Abram Shulsky, Douglas Feith, Richard (“Dick”) Cheney, Richard Armitage, US Department of Defense, Richard Perle, Weekly Standard, Zalmay M. Khalilzad, Saddam Hussein

Timeline Tags: Neoconservative Influence

Sometime this year, the FBI discovers a new and “massive” Israeli spying operation inside the US. In 2004, UPI will report that, according to a former senior US government official, the FBI learned of a spy operation in the East Coast of the US, including New York and New Jersey. The FBI begins intensive surveillance on certain Israeli diplomats and other suspects. As part of this surveillance, in 2003 the FBI will be videotaping Naor Gilon, chief of political affairs at the Israeli Embassy in Washington, when they will discover Gilon is meeting with Larry Franklin, Defense Department analyst. In 2005, Franklin will plead guilty to passing classified secrets to Israeli officials (see October 5, 2005). It appears that the surveillance of some Israeli diplomatic officials in the US actually began by April 1999 (see April 13, 1999-2004), though details remain murky. [United Press International, 12/9/2004] It is not known if this discovered spy operation is connected to or the same as the Israeli art student and moving van spy rings, which appears to have been discovered in 2001 (see March 23, 2001 and June 2001), or something completely different. It is also not clear if the discovery came from an investigation of media leaks begun two days before 9/11 (see September 9, 2001), or if it predated that and the 9/11 attacks.

Entity Tags: Larry Franklin, Federal Bureau of Investigation, Israel Institute for Intelligence and Special Tasks (Mossad), Naor Gilon

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

According to reporter and author Charlie Savage, the White House staff quickly coalesces into two camps: “Bush People[,] mostly personal friends of the new president who shared his inexperience in Washington,” which includes President Bush’s top legal counsels, Alberto Gonzales and Harriet Miers, both corporate lawyers in Texas before joining Bush in Washington. The second group is “Cheney People—allies from [Vice-President Dick] Cheney’s earlier stints in the federal government (see May 25, 1975, November 18, 1980, 1981-1992, 1989, and June 1996) who were deeply versed in Washington-level issues, a familiarity that would allow their views to dominate internal meetings. These included [Defense Secretary Donald] Rumsfeld and other cabinet secretaries, key deputies throughout the administration, and David Addington, Cheney’s longtime aide who would become a chief architect of the administration’s legal strategy in the war on terrorism” (see July 1, 1992 and (After 10:00 a.m.) September 11, 2001). Savage will observe, “Given the stark contrast in experience between Cheney and Bush, it was immediately clear to observers of all political stripes that Cheney would possess far more power than had any prior vice president.”
'Unprecedented' Influence - Cheney will certainly have “unprecedented” influence, according to neoconservative publisher William Kristol, who himself had served as former Vice President Dan Quayle’s chief of staff. “The question to ask about Cheney,” Kristol will write, is “will he be happy to be a very trusted executor of Bush’s policies—a confidant and counselor who suggests personnel and perhaps works on legislative strategy, but who really doesn’t try to change Bush’s mind about anything? Or will he actually, substantively try to shape administration policy in a few areas, in a way that it wouldn’t otherwise be going?”
Expanding the Power of the Presidency - Cheney will quickly answer that question, Savage will write, by attempting to “expand the power of the presidency.” Savage will continue: “He wanted to reduce the authority of Congress and the courts and to expand the ability of the commander in chief and his top advisers to govern with maximum flexibility and minimum oversight. He hoped to enlarge a zone of secrecy around the executive branch, to reduce the power of Congress to restrict presidential action, to undermine limits imposed by international treaties, to nominate judges who favored a stronger presidency, and to impose greater White House control over the permanent workings of government. And Cheney’s vision of expanded executive power was not limited to his and Bush’s own tenure in office. Rather, Cheney wanted to permanently alter the constitutional balance of American government, establishing powers that future presidents would be able to wield as well.” [Savage, 2007, pp. 7-9] Larry Wilkerson, the chief of staff for Secretary of State Colin Powell, will say after leaving the administration: “We used to say about both [Defense Secretary Donald Rumsfeld’s office] and the vice president’s office that they were going to win nine out of 10 battles, because they were ruthless, because they have a strategy, because they never, never deviate from that strategy. They make a decision, and they make it in secret, and they make it in a different way than the rest of the bureaucracy makes it, and then suddenly, foist it on the government—and the rest of the government is all confused.” [Unger, 2007, pp. 299]
Signing Statements to Reshape Legislation, Expand Presidential Power - To that end, Cheney ensures that all legislation is routed through his office for review before it reaches Bush’s desk. Addington goes through every bill for any new provisions that conceivably might infringe on the president’s power as Addington interprets it, and drafts signing statements for Bush to sign. In 2006, White House counsel Bradford Berenson will reflect: “Signing statements unite two of Addington’s passions. One is executive power. And the other is the inner alleyways of bureaucratic combat. It’s a way to advance executive power through those inner alleyways.… So he’s a vigorous advocate of signing statements and including important objections in signing statements. Most lawyers in the White House regard the bill review process as a tedious but necessary bureaucratic aspect of the job. Addington regarded it with relish. He would dive into a 200-page bill like it was a four-course meal.” It will not be long before White House and Justice Department lawyers begin vetting legislation themselves, with Addington’s views in mind. “You didn’t want to miss something,” says a then-lawyer in the White House. [Savage, 2007, pp. 236]

Entity Tags: David S. Addington, Bradford Berenson, Alberto R. Gonzales, Charlie Savage, William Kristol, Richard (“Dick”) Cheney, Donald Rumsfeld, Bush administration (43), Harriet E. Miers, George W. Bush, Lawrence Wilkerson

Timeline Tags: Civil Liberties

The National Security Agency seeks the assistance of global telecommunications corporation AT&T to help it set up a domestic call monitoring site to eavesdrop on US citizens’ phone communications, according to court papers filed in June 2006 as part of a lawsuit against AT&T (see October 2001). The NSA is expressly forbidden from spying on US citizens within US borders unless authorized by the Foreign Surveillance Intelligence Court (FISC) (see 1978). When the NSA program, which wiretaps phone and email communications often without court warrants, becomes public knowledge well over four years later (see December 15, 2005), President Bush, NSA Director Michael Hayden, and other White House and government officials will assert that the program was set up in response to the September 11, 2001 terrorist attacks. If the claims made in the lawsuit are accurate, these assertions are provably false. “The Bush administration asserted this became necessary after 9/11,” lawyer Carl Mayer will claim in 2006. “This undermines that assertion.” Unbeknownst to most Americans, the NSA is operating a secret “data mining” operation that, by 2006, will have compiled phone records and contact information on millions of domestic phone and email communications. The NSA project is code-named “Project Groundbreaker,” and is ostensibly an above-board attempt announced in June 2000 to have AT&T and other firms help modernize its technological capabilities. The project originally seeks to have AT&T build a network operations center that duplicates AT&T’s facility in Bedminster, New Jersey; this plan will be altered when the NSA decides it will be better served by acquiring the monitoring technology itself. The agency is seeking bids for a project to “modernize and improve its information technology infrastructure,” including the privatization of its “non-mission related” systems support. [TechWeb, 6/13/2000; Bloomberg, 6/30/2006] Groundbreaker’s privatization project is expected to provide up to $5 billion in government contracts to various private firms such as AT&T, Computer Sciences Corporation, and OAO Corporation, [Computerworld, 12/4/2000; Government Executive, 9/1/2001] and up to 750 NSA employees will become private contractors. Hayden, who has aggressively instituted a corporate management protocol to enhance productivity and has brought in numerous senior managers and agency executives from private defense firms, is a strong proponent of privatizing and outsourcing much of the NSA’s technological operations, and in 2001 will say that he wants the agency to focus on its primary task of breaking codes and conducting surveillance. Hayden does not admit that Groundbreaker is part of a larger NSA domestic surveillance program, [Government Executive, 9/1/2001] and publicly, NSA officials say that the project is limited to administrative and logistics functions. [Computerworld, 12/4/2000] The covert data mining portion of the project is code-named “Pioneer.” A former, unnamed employee of the NSA, [Bloomberg, 6/30/2006] and a former AT&T technician, Mark Klein, will provide the key information about Groundbreaker (see Late 2002, July 7, 2009 and December 15-31, 2005). Klein will say in 2006 that he saw the NSA construct a clandestine area within its switching center in San Francisco, and saw NSA technicians shunt fiber optic cable carrying Internet traffic into that area, which contains a large data bank and secret data mining hardware (see April 6, 2006). Klein will say he knew that the NSA built other such facilities in other switching locations. He will go on to say that the NSA did not work with just AT&T traffic; when AT&T’s network connected with other networks, the agency acquired access to that traffic as well. [Democracy Now!, 5/12/2006] The information about AT&T and the NSA will become public knowledge after the 2006 filing of a lawsuit against AT&T and other telecommunications firms (see May 12, 2006 and June 26, 2006).

Entity Tags: Mark Klein, Michael Hayden, George W. Bush, Foreign Intelligence Surveillance Court, Bush administration (43), Carl Mayer, Computer Sciences Corporation, AT&T, National Security Agency, OAO Corporation

Timeline Tags: Civil Liberties

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Timeline Tags: Civil Liberties

The cover of the DEA report, as depicted on television.The cover of the DEA report, as depicted on television. [Source: Fox News]The Office of National Drug Control Policy issues a National Security Alert describing “apparent attempts by Israeli nationals to learn about government personnel and office layouts.” This later becomes known through a leaked DEA document called “Suspicious Activities Involving Israeli Art Students at DEA Facilities.” A crackdown ensues and by June, around 120 Israelis are apprehended. More are apprehended later. [Drug Enforcement Agency, 6/2001]

Entity Tags: “Israeli art students”, Office of National Drug Control Policy

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

States the Israeli spy ring were known to have operated in, according to a June 2001 Drug Enforcement Administration report (this Fox news graphic was based on information from that report).States the Israeli spy ring were known to have operated in, according to a June 2001 Drug Enforcement Administration report (this Fox news graphic was based on information from that report). [Source: Fox News]The DEA’s Office of Security Programs prepares a 60-page internal memo on the Israeli “art student spy ring.” [Drug Enforcement Agency, 6/2001] The Memo is a compilation of dozens of field reports, and was meant only for the eyes of senior officials at the Justice Department (of which the DEA is adjunct), but it is leaked to the press around December 2001. The report connects the spies to efforts to foil investigations into Israeli organized crime activity involving the importation of the drug Ecstasy. The spies also appear to be snooping on top-secret military bases. For instance, on April 30, 2001, an Air Force alert was issued from Tinker Air Force Base in Oklahoma City concerning “possible intelligence collection being conducted by Israeli art students.” Tinker AFB houses AWACS surveillance craft and Stealth bombers. By the time of the report, the US has “apprehended or expelled close to 120 Israeli nationals” but many remain at large. [Le Monde (Paris), 3/5/2002; Salon, 5/7/2002] An additional 20 or so Israeli spies are apprehended between June and 9/11. [Fox News, 12/12/2001]

Entity Tags: US Department of Justice, “Israeli art students”, Office of Security Programs

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Crown Prince Abdullah, the effective leader of Saudi Arabia, is upset with US policy over Israel and Palestine and threatens to break the Saudi alliance with the US. He has Prince Bandar, Saudi ambassador to the US, personally deliver a message to President Bush on August 27. Bandar says, “This is the most difficult message I have had to convey to you that I have ever conveyed between the two governments since I started working here in Washington in 1982.” He brings up a number of issues, including the complaint that since Bush became president US policy has tilted towards Israel so much that the US has allowed Israeli Prime Minister Sharon to “determine everything in the Middle East.” The message concludes, “Therefore the Crown Prince will not communicate in any form, type or shape with you, and Saudi Arabia will take all its political, economic and security decisions based on how it sees its own interest in the region without taking into account American interests anymore because it is obvious that the United States has taken a strategic decision adopting Sharon’s policy.” Bush seems shocked and replies, “I want to assure you that the United States did not make any strategic decision.” Secretary of State Powell later confronts Bandar and says, “What the fuck are you doing? You’re putting the fear of God in everybody here. You scared the shit out of everybody.” Bandar reportedly replies, “I don’t give a damn what you feel. We are scared ourselves.” Two days later, Bush replies with a message designed to appease the Saudi concerns (see August 29-September 6, 2001). [Woodward, 2006, pp. 77-79]

Entity Tags: George W. Bush, Bandar bin Sultan, Colin Powell, Abdullah bin Abdulaziz al-Saud

Timeline Tags: Complete 911 Timeline

The Bush administration attempts to repair its relation with Saudi Arabia after a dramatic letter from Saudi Crown Prince Abdullah. On August 27, 2001, Abdullah, the de facto leader of Saudi Arabia, sent a message to President Bush threatening to end the Saudi alliance with the US because of what they see as US favoritism towards Israel (see August 27, 2001). Two days later, Bush sends a two-page letter to Abdullah: “Let me make one thing clear up front: nothing should ever break the relationship between us. There has been no change in the strategic equation. I firmly believe the Palestinian people have a right to self-determination and to live peacefully and securely in their own state, in their own homeland, just as the Israelis have the right to live peacefully and safely in their own state.” Journalist Bob Woodward will later note that this “was a much bigger step than President Clinton had taken. Even as Clinton had tried to fashion a Middle East peace agreement as his legacy, he had never directly supported a separate Palestinian state.” On September 6, Abdullah replies, “Mr. President, it was a great relief to me to find in your letter a clear commitment confirming the principle in which the peace process was established. I was particularly pleased with your commitment to the right of the Palestinians to self-determination as well as the right to peace without humiliation, within their independent state.” The Saudis appear appeased. [Woodward, 2006, pp. 77-79] Also on September 6, Bush holds a meeting with his top advisers and suggests a change of policy towards Palestine, including public support for a separate Palestinian state. However, days before Bush is to announce these new policies, the 9/11 attacks take place. None of the planned US policy changes materialize (see September 6, 2001).

Entity Tags: George W. Bush, Abdullah bin Abdulaziz al-Saud

Timeline Tags: Complete 911 Timeline

According to a New York Times article several days later, on this day President Bush holds a National Security Council meeting with Secretary of State Powell, National Security Adviser Rice, and others, to consider how to change his Middle East policy. This potential change in US policy comes after the Saudis threatened to end their alliance with the US because of US policy towards Israel and Palestine (see August 27, 2001 and August 29-September 6, 2001). It is reported that he is considering meeting with Palestinian leader Yasir Arafat when Arafat is scheduled to come to New York for the opening of the United Nations General Assembly two weeks later. Bush has so far been firm in refusing to meet with Arafat. According to the New York Times, at this meeting, “Bush discussed the wisdom of changing tack, officials said. While no clear decision was made, there was an inclination to go ahead with a meeting with Arafat if events unfolded in a more favorable way in the next 10 days or so…” Additionally, it is reported that Israeli foreign minister Shimon Peres will meet with Arafat in mid-September, in what it is hoped will be “the first of a series that could start a process of serious dialogue” between Palestine and Israel. [New York Times, 9/9/2001] Reporter Bob Woodward will add in 2006, “Bush agreed to come out publicly for a Palestinian state. A big rollout was planned for the week of September 10, 2001.” [Woodward, 2006, pp. 77] But after the 9/11 attacks a few days later, Bush and Peres do not go forward with any meetings with Arafat and US policy does not change. The Nation will later comment, “In the aftermath of [9/11], few people recalled that for a brief moment in the late summer of 2001, the Bush Administration had considered meeting with Arafat and deepening its political involvement in the Israeli-Palestinian conflict.” [Nation, 7/14/2005] The leak to the New York Times about this September 6 meeting will result in a wide FBI investigation of Israeli spying in the US (see September 9, 2001).

Entity Tags: Condoleezza Rice, Colin Powell, Yasser Arafat, Shimon Peres, George W. Bush

Timeline Tags: Complete 911 Timeline

National Security Adviser Rice, upset with a media leak, orders an investigation that will uncover evidence of widespread Israeli spying in the US. The Saudis had recently threatened to end their close alliance with the US (see August 27, 2001 and August 29-September 6, 2001), and on September 6, 2001, President Bush held a meeting attended by Rice and others to work on how to appease Saudi concerns (see September 6, 2001). Just three days after the meeting, there is a story by Jane Perlez in the New York Times accurately detailing what was discussed in the meeting. It will later be reported that Rice is furious about the leak to Perlez and immediately demands a clampdown on leakers. The determination to improve secrecy increases in the wake of the 9/11 attacks. This leak investigation focuses on Israelis in the US. No one is ever prosecuted for the leak to Perlez, but the investigation will takes on a life of its own and continue for years. [New York Times, 9/9/2001; JTA (Jewish Telegraphic Agency, 5/17/2005; Nation, 7/14/2005] It appears the FBI had been investigating Israeli spying in the US since at least 1999 (see April 13, 1999-2004), and there are reports of a discovery of a “massive” Israeli spy operation in the US in 2001 (see 2001) and/or the discovery of the Israeli art student spy ring (see March 23, 2001 and June 2001). It is unclear if there is any connection between these investigations and this media link investigation or not.

Entity Tags: Jane Perlez, Condoleezza Rice

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

David O. Cooke.David O. Cooke. [Source: US Department of Defense]Some Pentagon Renovation Program workers are concerned about the possibility of a plane being deliberately crashed into the Pentagon. This is according to Stacie Condrell, the leader of the Pentagon Renovation Program’s planning, relocation, requirements integration, standards, and space management group. Condrell will say, shortly after 9/11, that although the emergency response to an attack on the Pentagon was not part of its area of responsibility, her group had been “involved, as builders, in what we can do to be smarter and better prepared against things like” the 9/11 attack on the Pentagon.
Workers Contemplate a 'Crazy Pilot' Crashing a Plane into the Pentagon - She will say that, before 9/11, “the particular plane incident” her group thought might happen would involve “one of the regularly scheduled US Air commuter flights from North Carolina that flies directly over the center courtyard [of the Pentagon] 10 or 12 times a day.” This plane “would have a crazy pilot who would crash into the building.” The reason her group had this concern, Condrell will say, is that “all of the people specifically involved in analyzing the physical threat to our environment”—such as the secretary of defense, the other military secretaries, and members of the Defense Threat Reduction Agency and the Defense Protective Service—“mention over and over again that [the Pentagon is] the only national military headquarters in the world that allows commercial overflight.” [Historical Office, Office of the Secretary of Defense, 10/30/2001 pdf file]
Administrator Considers the Possibility of a Plane Hitting the Pentagon - David O. “Doc” Cooke, the Pentagon’s director of administration and management, will similarly say that the event of a plane being deliberately crashed into the Pentagon is seen as a possibility before 9/11. He will say that ways in which the Pentagon might be attacked that are considered possible include “a small aircraft, probably containing explosives, which would either drop the explosive or possibly dive into the building.” [Historical Office, Office of the Secretary of Defense, 10/18/2001 pdf file]
An Explosion outside the Pentagon Is Seen as the Biggest Threat - However, Lee Evey, manager of the Pentagon Renovation Program from November 1997, will say that an attack involving an explosion outside the building is considered the biggest danger to the Pentagon. When asked what he had considered the most likely threat to the Pentagon before 9/11, he will say that a “blast”—meaning an external explosion—“as a threat to the building was very much on our minds.” He will add that the Oklahoma City and Khobar Towers bombings in 1995 and 1996, respectively (see 8:35 a.m. - 9:02 a.m. April 19, 1995 and June 25, 1996), “really influenced our thinking.” [Historical Office, Office of the Secretary of Defense, 10/22/2001 pdf file] Due to this concern, around 1997 or 1998, the Army Corps of Engineers performs simulations to measure how much damage the Pentagon would suffer if a truck bomb exploded outside it. [Historical Office, Office of the Secretary of Defense, 12/7/2001 pdf file; Vogel, 2007, pp. 417] The Pentagon Renovation Program, which began in the early 1990s, involves a complete overhaul of the interior of the Pentagon. [American Forces Press Service, 9/30/2005] From 1998, upgrading security at the Pentagon is one of its priorities. [Goldberg et al., 2007, pp. 6]

Entity Tags: David O. Cooke, Pentagon Renovation Program, Lee Evey, Stacie Condrell

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

President Bush asks Mike Morell, his CIA briefer, who is responsible for today’s attacks on the US and Morell says he is sure al-Qaeda is to blame. About 15 minutes after Air Force One left Barksdale Air Force Base (see 1:37 p.m. September 11, 2001), White House chief of staff Andrew Card enters the staff section of the plane, where Morell is seated, and tells Morell that the president wants to see him. Morell goes to Bush’s office, where he then sits alone with the president and Card.
CIA Briefer Says He'd Bet Al-Qaeda Was behind the Attacks - Bush wants to know who Morell thinks is responsible for today’s attacks. “Michael, who did this?” he asks. Morell explains that he doesn’t have any intelligence indicating who is to blame, so he will simply provide his personal opinion. “I said that there were two countries capable of carrying out an attack like this, Iran and Iraq, but I believed both would have everything to lose and nothing to gain from the attack,” he will later recall. The culprit was almost certainly a non-state actor, he says, adding that he has no doubt that the trail of evidence will lead to the doorstep of Osama bin Laden and al-Qaeda. “I’d bet my children’s future on that,” he says.
Briefer Is Unsure How Long It Will Take to Determine Who Is Responsible - “When will we know?” Bush asks. Morell replies, “I can’t say for sure,” and then goes over some recent terrorist attacks and says how long it took the CIA to determine, with any certainty, who was responsible. He says that in the case of the 1998 bombings of the US embassies in Kenya and Tanzania (see 10:35-10:39 a.m., August 7, 1998), it took a couple of days; with the bombing of the USS Cole in Yemen in 2000 (see October 12, 2000), it took a couple of months; but with the 1996 bombing of the Khobar Towers in Saudi Arabia (see June 25, 1996), it had taken over a year. He says the CIA may know soon who is to blame for today’s attacks, but then again it might take some time. Bush says nothing in response once Morell has finished giving his views on who is responsible for today’s attacks and the men sit in silence for a while. Finally, Morell asks, “Is there anything else, Mr. President?” and Bush replies, “No, Michael, thank you.” Morell then returns to his seat in the staff section of the plane. [Studies in Intelligence, 9/2006 pdf file; Morell and Harlow, 2015, pp. 55-56; Politico Magazine, 9/9/2016] Bush will learn that the CIA has linked al-Qaeda to today’s attacks later this afternoon, after Air Force One lands at Offutt Air Force Base in Nebraska (see 2:50 p.m. September 11, 2001). During a video teleconference, CIA Director George Tenet will tell him that early signs indicate the terrorist group is behind the attacks (see (3:15 p.m.) September 11, 2001). [9/11 Commission, 7/24/2004, pp. 326; Bowden, 2012, pp. 17-18]

Entity Tags: Michael J. Morell, George W. Bush, Andrew Card

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Congress explicitly refuses to grant the Bush administration the authority to conduct warrantless wiretaps and surveillance operations against US citizens in its resolution authorizing the use of military force (AUMF) against terrorists (see September 14-18, 2001). Tom Daschle (D-SD), the Senate Majority Leader, will write in December 2005 (after his ouster from Congress in November 2004) that the White House and the Justice Department will claim, falsely, that the AUMF grants the right for the NSA to conduct such a program (see Early 2002 and December 15, 2005). Instead, Daschle will write, the NSA merely usurps the authority, with the president’s approval, to conduct such an extralegal surveillance program (see December 21-22, 2005). [Washington Post, 12/22/2005]
Administration Efforts to Rewrite AUMF - In an op-ed for the Washington Post, Daschle will observe that the AUMF authorizes Bush “to use all necessary and appropriate force against those nations, organizations or persons” who “planned, authorized, committed or aided” the 9/11 attacks. But, Daschle will write, “Literally minutes before the Senate cast its vote, the administration sought to add the words ‘in the United States and’ after ‘appropriate force’ in the agreed-upon text. This last-minute change would have given the president broad authority to exercise expansive powers not just overseas—where we all understood he wanted authority to act—but right here in the United States, potentially against American citizens. I could see no justification for Congress to accede to this extraordinary request for additional authority. I refused.”
No Vote for Domestic Surveillance - Daschle will also write that the White House attempted to add draft language to the AUMF resolution that would give the administration new and sweeping authority to use force to “deter and pre-empt any future acts of terrorism or aggression against the United States,” even against nations and organizations not responsible for the 9/11 attacks. Bush officials such as Vice President Dick Cheney will claim that the AUMF “granted authority by the Congress to use all means necessary to take on the terrorists, and that’s what we’ve done.” But Daschle will write that Cheney is mistaken. “As Senate majority leader at the time, I helped negotiate that law with the White House counsel’s office over two harried days. I can state categorically that the subject of warrantless wiretaps of American citizens never came up. I did not and never would have supported giving authority to the president for such wiretaps. I am also confident that the 98 senators who voted in favor of authorization of force against al-Qaeda did not believe that they were also voting for warrantless domestic surveillance.” On September 12, six days before the September 18 AUMF vote, Bush officials demand that Congress authorize the use of military force to, in their words, “deter and pre-empt any future acts of terrorism or aggression against the United States.” But Congress refuses, feeling that the request is “too broad and ill defined.” Instead, on September 14, Congress choses to use language that authorizes Bush to use “all necessary and appropriate force against those nations, organizations or persons [the president] determines planned, authorized, committed or aided” the 9/11 attacks. Daschle later writes, “With this language, Congress denied the president the more expansive authority he sought and insisted that his authority be used specifically against Osama bin Laden and al-Qaeda.… The shock and rage we all felt in the hours after the attack were still fresh. America was reeling from the first attack on our soil since Pearl Harbor. We suspected thousands had been killed, and many who worked in the World Trade Center and the Pentagon were not yet accounted for. Even so, a strong bipartisan majority could not agree to the administration’s request for an unprecedented grant of authority.” Instead, Daschle will write, the administration simply takes the authority anyway, and will argue in hindsight that the AUMF actually gives the administration the right to wiretap US citizens. However, Daschle will write, “at the time, the administration clearly felt they [didn’t have the authority] or it wouldn’t have tried to insert the additional language.”
Breeding 'Fear and Suspicion' - He concludes, “[T]here are right and wrong ways to defeat terrorists, and that is a distinction this administration has never seemed to accept. Instead of employing tactics that preserve Americans’ freedoms and inspire the faith and confidence of the American people, the White House seems to have chosen methods that can only breed fear and suspicion. If the stories in the media over the past week are accurate [detailing the breadth and apparent illegality of the NSA program], the president has exercised authority that I do not believe is granted to him in the Constitution, and that I know is not granted to him in the law that I helped negotiate with his counsel and that Congress approved in the days after Sept. 11. For that reason, the president should explain the specific legal justification for his authorization of these actions, Congress should fully investigate these actions and the president’s justification for them, and the administration should cooperate fully with that investigation. In the meantime, if the president believes the current legal architecture of our country is insufficient for the fight against terrorism, he should propose changes to our laws in the light of day. That is how a great democracy operates. And that is how this great democracy will defeat terrorism.” [Washington Post, 12/23/2005]

Entity Tags: National Security Agency, Al-Qaeda, Bush administration (43), Washington Post, Tom Daschle, US Department of Justice, Osama bin Laden, Authorization to Use Military Force (AUMF), Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

Douglas Feith suggests in a draft memo [Washington Post, 8/7/2004] that the US should consider “hitting terrorists outside the Middle East in the initial offensive, perhaps deliberately selecting a non-al-Qaeda target like Iraq.” Other regions he proposes attacking include South America and Southeast Asia. He reasons that an initial attack against such targets would “surprise… the terrorists” and catch them off guard. [9/11 Commission, 7/24/2004, pp. 277, 533; Newsweek, 8/8/2004] According to Newsweek, the content of Feith’s memo derives from the work of the Counter Terrorism Evaluation Group (see Shortly After September 11, 2001), a project headed by Michael Maloof and David Wurmser. The group suggested that an attack on the remote Triborder region, where Paraguay, Argentina, and Brazil meet and where Iranian-backed Hezbollah is said to have a presence, would have a ripple effect among international Islamic militant groups. [Newsweek, 8/8/2004] Feith later says his memo merely expands upon ideas put forth by Defense Secretary Donald Rumsfeld in a memo (see September 19, 2001) the secretary wrote the day before to Gen. Henry Shelton, chairman of the Joint Chiefs of Staff. [Washington Post, 8/7/2004] The logic behind proposing strikes against targets outside of the Middle East, Feith says, was based on the need to “cast a wide net” and achieve “additional objectives,” such as creating fissures in the enemy network, highlighting “the global nature of the conflicts,” showing “seriousness of US military purpose,” and demonstrating that the “war would not be limited geographically to Afghanistan.” [Washington Post, 8/7/2004]

Entity Tags: David Wurmser, Douglas Feith, F. Michael Maloof

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion, Neoconservative Influence

On September 24, 2001, the US freezes the accounts of 27 individuals and organizations, alleging that they had channeled money to al-Qaeda (see September 24, 2001). Included in the list is the Mamoun Darkazanli Import Export Company, which may have been used to funnel money to the hijackers (see June 2000-August 2001). US officials say Darkazanli took part in the 1996 Khobar Towers bombing in Saudi Arabia (see June 25, 1996). Darkazanli attended Said Bahaji’s wedding in 1999 (see October 9, 1999). [New York Times, 9/29/2001] On October 2, 2001, Darkazanli’s other accounts are also frozen. The US and German governments suspect Darkazanli of providing financial and logistical support to the Hamburg al-Qaeda cell. [Agence France-Presse, 10/28/2001] Shortly thereafter, Spanish police listening in to Barakat Yarkas’ telephone hear Yarkas warn the leader of a Syrian extremist organization that Darkazanli has caught the “flu” going around. This is believed to be a coded reference meaning that communicating with Darkazanli is not safe (see August 1998-September 11, 2001 and Spring 2000). [Chicago Tribune, 11/17/2002]

Entity Tags: Al-Qaeda, Said Bahaji, Mamoun Darkazanli, Barakat Yarkas

Timeline Tags: Complete 911 Timeline

The FBI hires Hadia Roberts, the daughter of a former Pakistani general who is thought to have worked as a spy in the US, despite objections by the FBI agent that vets her. John Cole, manager of the FBI national counter-intelligence program for India, Pakistan, and Afghanistan, says he is alerted to her by the personnel security officer, who thinks the woman might not be suitable as an Urdu translator.
Alarming Information - Cole examines the file and “it stuck out a mile: she was the daughter of a retired Pakistani general who had been their military attaché in Washington.” Cole is aware that “[e]very single military attaché they’ve ever assigned has been a known intelligence officer.” [Vanity Fair, 9/2005; Antiwar (.com), 10/8/2005; Sunday Times (London), 1/6/2008] In addition, several hits appear for her father’s name when it is run through the FBI’s computer and at one time he had been the subject of an FBI investigation, which is “an alarming piece of information that was somehow overlooked in the preliminary background check.” Further, the former attaché spends six months in the US a year, and Cole will later comment, “He’s got a lot of friends that are still there in military intelligence, and he more than likely talks to them frequently, living there as he does six months out of the year.” What is more, the results of Roberts’ polygraph examination are inconclusive, so Cole recommends she not be hired.
Hired Anyway - However, a week later she is given a job, top secret security clearance, and access to sensitive compartmentalized information. Colleagues say that Roberts frequently boasts her father is a retired general and say she is such an Islamic “zealot” that she tries to convert her colleagues to Islam. [Sperry, 2005, pp. 155-8] A few weeks later, an FBI field office finds that classified information has been provided to Pakistanis, but it is not known who leaked it, although an investigation will determine that it must have been either the technical agent or one of the Urdu translators. Roberts will still be translating Urdu for the FBI in July 2005, when this incident is first mentioned in the press. [Sperry, 2005, pp. 155-8; Vanity Fair, 9/2005; Antiwar (.com), 10/8/2005] Around this time the FBI is investigating a nuclear technology smuggling ring headed by Pakistani intelligence and allegedly assisted by top US officials (see Mid-Late 1990s, (1997-2002), and 2000-2001).

Entity Tags: Federal Bureau of Investigation, John Cole

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network

President Bush issues a directive authorizing the National Security Agency (NSA) to operate a warrantless domestic surveillance program. Author/journalist Jane Mayer will report in 2011, “[O]n October 4, 2001, Bush authorized the policy, and it became operational by October 6th,” and, “[t]he new policy, which lawyers in the Justice Department justified by citing President Bush’s executive authority as commander in chief, contravened a century of constitutional case law.” Mayer will interview NSA whistleblower Thomas Drake for her article and quote him as saying that, following the October 4 directive, “strange things were happening. Equipment was being moved. People were coming to me and saying, ‘We’re now targeting our own country!’” Bush’s directive is based on a legal opinion drafted by Department of Justice Office of Legal Counsel Deputy Attorney General John Yoo (see September 25, 2001). [New Yorker, 5/23/2011]
Conflicting Information regarding Date of First Authorization - The existence of the NSA’s domestic surveillance program will first be made public in December 2005, following reporting by the New York Times that will cite “[n]early a dozen current and former officials” (see December 15, 2005). The Times article will state that in 2002, “[m]onths after the Sept. 11 attacks,” Bush signed an executive order authorizing the NSA to monitor domestic phone calls, including those of US citizens and permanent residents, if one end of the call was outside the country. The Times article also mentions an NSA “‘special collection program’ [that] began soon after the Sept. 11 attacks, as it looked for new tools to attack terrorism.” The difference between the October 4, 2001 directive and the 2002 executive order referred to by the Times is unclear. [New York Times, 12/16/2005]
Other Sources for October Directive - Other sources, including Bush, NSA Director General Michael Hayden, and the inspectors general of five separate agencies, will later refer to a presidential order having been given in “October,” or “weeks” after the 9/11 attacks, and say that, subsequent to this order, international calls of US persons are targeted for content-monitoring. Following the publication of the Times article, Bush will say in a December 17, 2005 radio address: “In the weeks following the terrorist attacks on our nation, I authorized the National Security Agency, consistent with US law and the Constitution, to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations. Before we intercept these communications, the government must have information that establishes a clear link to these terrorist networks” (see December 17, 2005). This presidential authorization was based on a legal opinion drafted by Department of Justice Office of Legal Counsel attorney John Yoo (see October 18, 2001). [WhiteHouse(.gov), 12/17/2005] Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001,” which is when he “gathered key members of the NSA workforce… [and] introduced [the NSA’s] new operational authority to them.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general,” and that “the three most senior and experienced lawyers in NSA… supported the lawfulness of this program.” [Michael Hayden, 1/23/2006] In a July 10, 2009 jointly-issued report, the inspectors general of the Department of Defense, Department of Justice, CIA, NSA, and Office of the Director of National Intelligence will refer to the “President’s Surveillance Program” (PSP) and “the program’s inception in October 2001.” The report will say: “One of the activities authorized as part of the PSP was the interception of the content of communications into and out of the United States where there was a reasonable basis to conclude that one party to the communication was a member of al-Qaeda or related terrorist organizations.… The attorney general subsequently publicly acknowledged the fact that other intelligence activities were also authorized under the same presidential authorization, but the details of those activities remain classified.” [Inspectors General, 7/10/2009] Citing “a senior administration official,” the Washington Post will report on January 4, 2006: “The secret NSA program… was authorized in October 2001.… The president and senior aides have publicly discussed various aspects of the program, but neither the White House, the NSA, nor the office of the director of national intelligence would say what day the president authorized it.” [Washington Post, 1/4/2006]

Entity Tags: US Department of Justice, Thomas Drake, US Department of Defense, Office of Legal Counsel (DOJ), Office of the Director of National Intelligence, Michael Hayden, National Security Agency, George W. Bush, Central Intelligence Agency, John C. Yoo, Jane Mayer

Timeline Tags: Civil Liberties

The FBI releases a list of its 22 most wanted terrorists. The US government offers up to $5 million for information leading to the capture of anyone of the list. The men are:
bullet Al-Qaeda leaders Osama bin Laden, who was indicted by a grand jury in 1998 (see June 8, 1998), Ayman al-Zawahiri, linked to a 1995 bombing in Pakistan (see November 19, 1995), and Mohammed Atef, who provided training to Somali fighters before the Black Hawk Down incident (see Late 1992-October 1993);
bullet Khalid Shaikh Mohammed (KSM), for his role in the 1995 Bojinka plot (see January 6, 1995). KSM is actually the mastermind of 9/11, although the US intelligence community has allegedly not yet pieced this information together (see (November 7, 2001));
bullet Several other operatives suspected of involvement in the 1998 US embassy bombings in Africa (see 10:35-10:39 a.m., August 7, 1998): Fazul Abdullah Mohammed (see August 2, 2008), Mustafa Fadhil, Usama al-Kini (a.k.a. Fahid Muhammad Ally Msalam (see August 6-7, 1998)), Ahmed Khalfan Ghailani (see July 25-29, 2004), Sheikh Ahmed Salim Swedan (see July 11, 2002), Abdullah Ahmed Abdullah (see September 10, 2002), Anas al-Liby (see January 20, 2002- March 20, 2002), Saif al-Adel (see Spring 2002), Ahmed Mohammed Hamed Ali, and Mushin Musa Matwalli Atwah (see April 12, 2006);
bullet Abdul Rahman Yasin, a US-Iraqi involved in the 1993 World Trade Center bombing (see March 4-5,1993);
bullet Ahmed Ibrahim Al-Mughassil, Ali Saed Bin Ali El-Houri, Ibrahim Salih Mohammed Al-Yacoub, and Abdelkarim Hussein Mohamed Al-Nasser, for their alleged part in the 1996 Khobar Towers bombing in Saudi Arabia (see June 25, 1996);
bullet Imad Mugniyah, Hassan Izz-Al-Din, and Ali Atwa for the hijacking of TWA Flight 847 in June 1985. [CNN, 10/10/2001]

Entity Tags: Mohammed Atef, Mushin Musa Matwalli Atwah, Mustafa Fadhil, Osama bin Laden, Saif al-Adel, Khalid Shaikh Mohammed, Usama al-Kini, Sheikh Ahmed Salim Swedan, Imad Mugniyah, Mohammed Hamed Ali, Hassan Izz-Al-Din, Abdullah Ahmed Abdullah, Abdul Rahman Yasin, Abdelkarim Hussein Mohamed Al-Nasser, Ahmed Ibrahim Al-Mughassil, Ahmed Khalfan Ghailani, Ibrahim Salih Mohammed Al-Yacoub, Ali Saed Bin Ali El-Houri, Fazul Abdullah Mohammed, Federal Bureau of Investigation, Ali Atwa, Ayman al-Zawahiri, Anas al-Liby

Timeline Tags: Complete 911 Timeline

Nancy Pelosi.Nancy Pelosi. [Source: US Congress]House Minority Leader Nancy Pelosi (D-CA) writes to NSA Director Michael Hayden questioning the nature and extent of the apparently illegal warrantless wiretapping of US citizens by the agency. Pelosi and other members of the House Intelligence Committee were briefed on October 1, 2001, by Hayden, whose agency began conducting surveillance against US citizens after the 9/11 attacks (see After September 11, 2001). Pelosi will release the letter on January 6, 2006, three weeks after the New York Times revealed that the NSA had been conducting electronic surveillance of US citizens without warrants since at least 2002 (see December 15, 2005.) Pelosi’s office will also release Hayden’s response, but almost the entire letter from Hayden is redacted.
Letter to Hayden - Pelosi writes in part, “[Y]ou indicated [in the briefing] that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance under the Foreign Intelligence Surveillance Act and related statutes, orders, regulations, and guidelines.… For several reasons, including what I consider to be an overly broad interpretation of President Bush’s directive of October 5 on sharing with Congress ‘classified or sensitive law enforcement information’ it has not been possible to get answers to my questions. Without those answers, the concerns I have about what you said on the First can not be resolved, and I wanted to bring them to your attention directly. You indicated that you were treating as a matter of first impression, [redacted ] being of foreign intelligence interest. As a result, you were forwarding the intercepts, and any information [redacted ] without first receiving a request for that identifying information to the Federal Bureau of Investigation. Although I may be persuaded by the strength of your analysis [redacted ] I believe you have a much more difficult case to make [redacted ] Therefore, I am concerned whether, and to what extent, the National Security Agency has received specific presidential authorization for the operations you are conducting. Until I understand better the legal analysis regarding the sufficiency of the authority which underlies your decision on the appropriate way to proceed on this matter, I will continue to be concerned.” The only portion of Hayden’s October 18 reply regarding Pelosi’s concerns that has not been redacted reads, “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” In January 2006, an NSA official will say that Pelosi’s concerns were adequately addressed in Hayden’s reply, and in a private briefing shortly thereafter. [Washington Post, 1/4/2006; Nancy Pelosi, 1/6/2006]
Pelosi Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). Pelosi is apparently unaware of any of this.

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi

Timeline Tags: Civil Liberties

John Yoo, a deputy assistant attorney general in the Justice Department’s Office of Legal Counsel, and OLC special counsel Robert Delahunty issue a joint memo to White House counsel Alberto Gonzales. The memo claims that President Bush has sweeping extraconstitutional powers to order military strikes inside the US if he says the strikes are against suspected terrorist targets. In the days following the 9/11 attacks, Gonzales asked if Bush could legally order the military to combat potential terrorist activity within the US. The memo is first revealed to exist seven years later (see April 2, 2008) after future OLC head Steven Bradbury acknowledges its existence to the American Civil Liberties Union; it will be released two months after the Bush administration leaves the White House (see March 2, 2009). [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009]
Granting Extraordinary, Extraconstitutional Authority to Order Military Actions inside US - Yoo and Delahunty’s memo goes far past the stationing of troops to keep watch at airports and around sensitive locations. Instead, the memo says that Bush can order the military to conduct “raids on terrorist cells” inside the US, and even to seize property. “The law has recognized that force (including deadly force) may be legitimately used in self-defense,” they write. In 2009, Reuters will write, “The US military could have kicked in doors to raid a suspected terrorist cell in the United States without a warrant” under the findings of the OLC memo. “We do not think that a military commander carrying out a raid on a terrorist cell would be required to demonstrate probable cause or to obtain a warrant,” Yoo and Delahunty write. [US Department of Justice, 10/23/2001 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009] The memo reasons that since 9/11, US soil can be legally construed as being a battlefield, and Congress has no power to restrict the president’s authority to confront enemy tactics on a battlefield. [Savage, 2007, pp. 131]
No Constitutional or Other Legal Protections - “[H]owever well suited the warrant and probable cause requirements may be as applied to criminal investigations or to other law enforcement activities, they are unsuited to the demands of wartime and the military necessity to successfully prosecute a war against an enemy. [Rather,] the Fourth Amendment does not apply to domestic military operations designed to deter and prevent foreign terrorist attacks.” Any objections based on the Fourth Amendment’s ban on unreasonable search and seizures would be invalid since whatever possible infringement on privacy would be trumped by the need to protect the nation from injury by deadly force. The president is “free from the constraints of the Fourth Amendment.” The Posse Comitatus Act, which bars the military from operating inside the US for law enforcement purposes, is also moot, the memo says, because the troops would be acting in a national security function, not as law enforcement. [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009; Ars Technica, 3/2/2009] There are virtually no restrictions on the president’s ability to use the military because, Yoo and Delahunty write, the nation is in a “state of armed conflict.” The scale of violence, they argue, is unprecedented and “legal and constitutional rules” governing law enforcement, even Constitutional restrictions, no longer apply. The US military can be used for “targeting and destroying” hijacked airplanes, they write, or “attacking civilian targets, such as apartment buildings, offices, or ships where suspected terrorists were thought to be.” The memo says, “Military action might encompass making arrests, seizing documents or other property, searching persons or places or keeping them under surveillance, intercepting electronic or wireless communications, setting up roadblocks, interviewing witnesses, or searching for suspects.” [Newsweek, 3/2/2009] Yoo writes that the Justice Department’s criminal division “concurs in our conclusion” that federal criminal laws do not apply to the military during wartime. The criminal division is headed by Michael Chertoff, who will become head of the Department of Homeland Security. [Washington Post, 4/4/2008]
Sweeping Away Constitutional Rights - Civil litigator Glenn Greenwald will later note that the memo gives legal authorization for President Bush to deploy the US military within US borders, to turn it against foreign nationals and US citizens alike, and to render the Constitution’s limits on power irrelevant and non-functional. Greenwald will write, “It was nothing less than an explicit decree that, when it comes to presidential power, the Bill of Rights was suspended, even on US soil and as applied to US citizens.”
Justifying Military Surveillance - Greenwald will note that the memo also justifies the administration’s program of military surveillance against US citizens: “[I]t wasn’t only a decree that existed in theory; this secret proclamation that the Fourth Amendment was inapplicable to what the document calls ‘domestic military operations’ was, among other things, the basis on which Bush ordered the NSA, an arm of the US military, to turn inwards and begin spying—in secret and with no oversight—on the electronic communications (telephone calls and emails) of US citizens on US soil” (see December 15, 2005 and Spring 2004). “If this isn’t the unadorned face of warped authoritarian extremism,” Greenwald will ask, “what is?” [Salon, 3/3/2009] If the president decides to use the military’s spy agency to collect “battlefield intelligence” on US soil, no law enacted by Congress can regulate how he goes about collecting that information, including requiring him to get judicial warrants under the Foreign Intelligence Surveillance Act (FISA). In 2007, Yoo will say in an interview: “I think there’s a law greater than FISA, which is the Constitution, and part of the Constitution is the president’s commander in chief power. Congress can’t take away the president’s powers in running war.” [Savage, 2007, pp. 131; PBS Frontline, 5/15/2007] Cheney and Addington will push the NSA to monitor all calls and e-mails, including those beginning and ending on US soil, but the NSA will balk. Domestic eavesdropping without warrants “could be done and should be done,” Cheney and Addington argue, but the NSA’s lawyers are fearful of the legal repercussions that might follow once their illegal eavesdropping is exposed, with or without the Justice Department’s authorization. The NSA and the White House eventually reach a compromise where the agency will monitor communications going in and out of the US, but will continue to seek warrants for purely domestic communications (see Spring 2001, After September 11, 2001, and October 2001). [Savage, 2007, pp. 131]
Military Use Considered - In 2009, a former Bush administration lawyer will tell a reporter that the memo “gave rise to the Justice Department discussing with the Defense Department whether the military could be used to arrest people and detain people inside the United States. That was considered but rejected on at least one occasion.” The lawyer will not give any indication of when this will happen, or to whom. Under the proposal, the suspects would be held by the military as “enemy combatants.” The proposal will be opposed by the Justice Department’s criminal division and other government lawyers and will ultimately be rejected; instead, the suspects will be arrested under criminal statutes. [Los Angeles Times, 3/3/2009]

Entity Tags: Steven Bradbury, US Department of Homeland Security, US Department of Defense, Robert J. Delahunty, Office of Legal Counsel (DOJ), Bush administration (43), Michael Chertoff, Alberto R. Gonzales, National Security Agency, American Civil Liberties Union, Glenn Greenwald, George W. Bush, US Department of Justice, John C. Yoo

Timeline Tags: Civil Liberties

Vice President Dick Cheney summons the chairmen and ranking members of the Senate and House Intelligence Committees to the White House for a classified briefing on the secret NSA warrantless wiretapping program (see Early 2002). Cheney makes it clear to the lawmakers that he is merely informing them about the program, and not seeking their approval. [Washington Post, 12/18/2005] Officials later say that under any of the previous presidents, such a meeting of this import would involve the president. But the four lawmakers are hustled away from the Oval Office. Instead, “[w]e met in the vice president’s office,” Bob Graham (D-FL), the chairman of the Senate Intelligence Committee, later recalls. President Bush has already told Graham that “the vice president should be your point of contact in the White House.” Cheney, according to the president, “has the portfolio for intelligence activities.” [Washington Post, 6/24/2007] The leaders are briefed by Cheney, CIA Director George Tenet, and NSA Director Michael Hayden. The Congressional leaders will later mostly refuse to comment publicly about what they do and do not learn about the program, even after it is revealed to the public (see December 15, 2005). In 2003, when Senator John D. Rockefeller ascends to the Democratic leadership of the Senate committee, and is himself briefed on the program, he will write to Cheney expressing his concerns over it (see July 17, 2003). [New York Times, 12/15/2005]
'No Discussion about Expanding' NSA Wiretapping - In December 2005, after the program is revealed to the public, one of the Congressmen present at the briefings, Graham, the then-chairman of the Senate Intelligence Committee, will discuss his knowledge of the program. In contradiction to the characterizations of Bush and other White House officials, Graham will say that he recalls “no discussion about expanding [NSA eavesdropping] to include conversations of US citizens or conversations that originated or ended in the United States,” and knew nothing of Bush’s intention to ignore the Foreign Intelligence Surveillance Court (also known as the FISA court). “I came out of the room with the full sense that we were dealing with a change in technology but not policy,” Graham will recall, using new methodologies to intercept overseas calls that passed through US switches. He thought that NSA eavesdropping would continue to be limited to “calls that initiated outside the United States, had a destination outside the United States but that transferred through a US-based communications system.” Instead, Graham will say, it now seems that Bush decided to go “beyond foreign communications to using this as a pretext for listening to US citizens’ communications. There was no discussion of anything like that in the meeting with Cheney.” A senior intelligence official, who refuses to reveal his identity but says he is speaking with the permission of the White House, will accuse Graham of “misremembering the briefings,” which he will call “very, very comprehensive.” The official will refuse to discuss the briefings in any but the most general terms, but will say they were intended “to make sure the Hill knows this program in its entirety, in order to never, ever be faced with the circumstance that someone says, ‘I was briefed on this but I had no idea that—’ and you can fill in the rest.” Graham will characterize the official’s description as saying: “[W]e held a briefing to say that nothing is different.… Why would we have a meeting in the vice president’s office to talk about a change and then tell the members of Congress there is no change?” House Minority Leader Nancy Pelosi (D-CA), who was also present at the meeting as the ranking Democrat on the House Intelligence Committee, will say the briefing described “President Bush’s decision to provide authority to the National Security Agency to conduct unspecified activities.” She will note that she “expressed my strong concerns” but did not go into detail. [Washington Post, 12/18/2005]
Lawmakers Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). In the briefing, Cheney informs the lawmakers of none of this.

Entity Tags: Richard (“Dick”) Cheney, Senate Intelligence Committee, Nancy Pelosi, John D. Rockefeller, House Intelligence Committee, Daniel Robert (“Bob”) Graham, George J. Tenet, George W. Bush, Michael Hayden, National Security Agency

Timeline Tags: Civil Liberties

Juma al-Dosari.Juma al-Dosari. [Source: PBS]In November 2001, al-Qaeda operative Juma al-Dosari is captured in Afghanistan. He is soon transferred to the Guantanamo prison. During interrogation in the spring of 2002, he reveals several aliases and that he was trying to recruit a group of US citizens in New York state known as the “Lackawanna Six.” Based on the aliases, US intelligence realizes they have already intercepted communications between him and Osama bin Laden’s son Saad bin Laden, and also him and al-Qaeda leader Khallad bin Attash. They learn he has a long history with al-Qaeda, having fought in Afghanistan, Bosnia, and Chechnya. He was arrested in Kuwait and Saudi Arabia on different occasions for involvement in the 1996 Khobar Towers bombings (see June 25, 1996). He first went to the US in 1999, staying several months in Indiana. Then he got a job at a mosque in Bloomington, Indiana, in the autumn of 2000. He began traveling around the US as a visiting imam, but investigators believe this was just his cover while he worked to recruit for al-Qaeda. In April 2001, he visited Buffalo, New York, and helped convince the “Lackawanna Six” to go to Afghanistan (see April-August 2001). He left the US for Afghanistan in late September 2001. The FBI gets this information in May 2002 and begins monitoring the “Lackawanna Six,” as they are all back in the US. Investigators suspect al-Dosari recruited others in other cities, but they do not know who. [PBS Frontline, 10/16/2003; PBS Frontline, 10/16/2003] In 2007, al-Dosari will be released from Guantanamo without explanation and set free in Saudi Arabia (see July 16, 2007).

Entity Tags: Federal Bureau of Investigation, Khallad bin Attash, Juma al-Dosari, Saad bin Laden

Timeline Tags: Complete 911 Timeline

John Yoo, the Justice Department’s (DOJ) Office of Legal Counsel (OLC) deputy assistant attorney general, sends a classified memo to Attorney General John Ashcroft justifying warrantless surveillance of US persons. The National Security Agency (NSA)‘s domestic surveillance authorized by President Bush (see October 4, 2001, Early 2002, and December 15, 2005) will come to be publicly referred to as the President’s Surveillance Program (PSP). This is not the first Yoo memo supporting warrantless surveillance (see September 25, 2001), but a 2009 report on the PSP jointly issued by the inspectors general (IGs) of the Department of Defense (DOD), DOJ, CIA, National Security Agency (NSA), and Office of the Director of National Intelligence (ODNI) will refer to it as “[t]he first OLC opinion directly supporting the legality of the PSP.” The IGs’ report will quote from and comment on the memo, noting that “deficiencies in Yoo’s memorandum identified by his successors in the Office of Legal Counsel and the Office of the Deputy Attorney General later became critical to DOJ’s decision to reassess the legality of the program in 2003.” According to the IGs’ report, Yoo asserts that warrantless surveillance is constitutional as long as it is “reasonable” under the Fourth Amendment, which only protects against “unreasonable searches and siezures.” On this point, the IGs’ report will note that Yoo’s successors were troubled by his failure to discuss the Supreme Court’s decision in Youngstown Sheet & Tube Co. v. Sawyer (1952), which found the president’s wartime authority to be limited. His memo does acknowledge that the Foreign Intelligence Surveillance Act (FISA) “purports to be the exclusive statutory means for conducting electronic surveillance for foreign intelligence,” but asserts that it is only a “safe harbor for electronic surveillance” because it cannot “restrict the president’s ability to engage in warrantless searches that protect the national security.” Yoo also writes that Congress has not “made a clear statement in FISA that it sought to restrict presidential authority to conduct warrantless searches in the national security area.” The IGs’ report will state that Yoo’s successors considered this problematic because Yoo has omitted discussion of the fact that FISA explicitly authorizes the president to conduct warrantless surveillance during the first 15 days following a declaration of war by Congress, which they considered an expression of Congress’s intent to restrict warrantless surveillance to a limited period of time and specific circumstances. The IGs’ report will also state that Yoo’s memo discusses “the legal rationale for Other Intelligence Activities authorized as part of the PSP,” and that Yoo concludes, “[W]e do not believe that Congress may restrict the president’s inherent constitutional powers, which allow him to gather intelligence necessary to defend the nation from direct attack.” The IGs’ report will say that “Yoo’s discussion of some of the Other Intelligence Activities did not accurately describe the scope of these activities,” and that Yoo’s successors considered his discussion of these other activities to be “insufficient and presenting a serious impediment to recertification of the program as to form and legality.” [Inspectors General, 7/10/2009, pp. pp. 11-13]
Memo's Existence Revealed by ACLU Lawsuit - On December 15, 2005, the New York Times will report that Bush authorized an NSA warrantless domestic surveillance program after the 9/11 attacks (see December 15, 2005). The American Civil Liberties Union (ACLU) will request records pertaining to the program under the Freedom of Information Act (FOIA) and then sue the Justice Department for the release of records. The existence of Yoo’s November 2 memo will first be revealed in an October 19, 2007 deposition filed by then head of the OLC Steven Bradbury in response to the ACLU lawsuit, which says that it “[concerns] the legality of certain communications intelligence activities.” After the 2009 release of the IGs’ report the ACLU will notify the court and the government will agree to reprocess four OLC memos, including Yoo’s November 2 memo. This memo and a May 6, 2004 memo by Yoo’s OLC successor Jack Goldsmith that disputes many of Yoo’s conclusions will be released in heavily redacted form on March 18, 2011. [ACLU.org, 2/7/2006; United States District Court of DC, 10/19/2007; American Civil Liberties Union, 3/19/2011]
Constitutional Experts Dispute Yoo's Legal Rationale - Numerous authorities on the law will question or reject the legal bases for warrantless domestic surveillance. In 2003, Yoo will leave the OLC. Goldsmith will begin a review of the PSP, after which he will conclude it is probably illegal in some respects and protest, within the executive branch, its continuation (see Late 2003-Early 2004 and December 2003-June 2004). Following the public disclosure of its existence, a January 5, 2006 report by the Congressional Research Service will find it to be of dubious legality (see January 5, 2006). On January 19, 2006, the DOJ will issue a 42-page white paper laying out the legal bases for the program (see January 19, 2006). These bases will be reviewed and rejected by 14 constitutional scholars and former government officials in a joint letter to Congress on February 2, 2006. [al [PDF], 2/2/2006 pdf file] The American Bar Association will adopt a resolution on February 13, 2006 that rejects DOJ’s arguments and calls on Congress to investigate the program. [Delegates, 2/13/2006 pdf file] On August 17, 2006, in the case ACLU v. NSA, US district judge Anna Diggs Taylor will reject the government’s invocation of the “state secrets privilege” and its argument that plaintiffs’ lack standing due to their being unable to prove they were surveilled, and will rule that warrantless surveillance is in violation of “the separation of powers doctrine, the Administrative Procedures Act, the First and Fourth Amendments to the United States Constitution, the FISA, and Title III” (see August 17, 2006). Taylor’s ruling will be overturned on appeal, on the grounds that the plaintiffs lack standing as they cannot prove that surveillance has occurred. In another case, Al Haramain v. Barack Obama, the government will make the same arguments, but US district judge Vaughn Walker will reject these and conclude in 2010 that illegal surveillance occurred (see March 31, 2010). [Al-Haramain v. Obama, 3/31/2010]

Entity Tags: Steven Bradbury, Vaughn Walker, Ronald Dworkin, George W. Bush, John C. Yoo, American Bar Association, Office of Legal Counsel (DOJ), American Civil Liberties Union, John Ashcroft, Anna Diggs Taylor, US Department of Justice

Timeline Tags: Civil Liberties

Manucher Ghorbanifar.Manucher Ghorbanifar. [Source: Ted Thai / Getty Images]The Bush administration sends two defense officials, Harold Rhode and Larry Franklin, to meet with Iranians in Rome in response to an Iranian government offer to provide information relevant to the war on terrorism. The offer had been backchanneled by the Iranians to the White House through Manucher Ghorbanifar, an Iranian arms trader and a central person in the Iran-Contra affair, who contacted another Iran-Contra figure, Michael Ledeen of the American Enterprise Institute. Ledeen passed the information on to his friends in the Defense Department who then relayed the offer to Deputy National Security Adviser Stephen Hadley. Hadley, who expressed no reservations about the proposed meeting, informed CIA Director George Tenet and Deputy Secretary of State Richard L. Armitage. According to officials interviewed by the New York Times, the United States Embassy in Rome was not notified of the planned meeting as required by standard interagency procedures. Neither the US embassy nor the CIA station chief in Rome learns of the three-day meeting until after it happens (see December 12, 2001). When they do catch wind of the meeting, they notify CIA and State Department headquarters in Washington which complain to the administration about how the meetings were arranged. [Newsday, 8/9/2003; Washington Post, 8/9/2003; New York Times, 12/7/2003] In addition to Ghorbanifar, Ledeen, Franklin, and Rhode, the meeting is attended by Nicolo Pollari, head of SISMI, and Antonio Martino, Italy’s minister of defense. [Washington Monthly, 9/2004]
Destabilizing the Iraqi Government - According to the Boston Globe, either at this meeting, a similar one in June (see June 2002), or both, Ledeen and Ghorbanifar discuss ways to destabilize the Iranian government, possibly using the Mujahedeen-e Khalq (MEK), a US-designated terrorist group, as a US proxy. [Boston Globe, 8/31/2004] The meetings are suspected of being an attempt by what investigative reporters Joshua Micah Marshall, Laura Rozen, and Paul Gastris will later call “a rogue faction at the Pentagon… trying to work outside normal US foreign policy channels to advance a ‘regime-change’ agenda.” The fact that MEK members attend the meetings adds weight to the claim. [Unger, 2007, pp. 234-235]
Italian Intelligence on Iraq-Niger Allegations - Additionally, according to an unnamed SISMI source, Pollari speaks with Ledeen about intelligence his agency has collected (see October 15, 2001) suggesting that Iraq made a deal with Niger to purchase several tons of uranium. SISMI already sent a report to Washington on the matter in mid-October (see October 15, 2001). Reportedly, Pollari has also approached CIA Station Chief Jeff Castelli about the report, but Castelli has since indicated he is not interested in the information. [La Repubblica (Rome), 10/25/2005]

Entity Tags: Manucher Ghorbanifar, People’s Mujahedin of Iran, Paul Gastris, Stephen J. Hadley, Michael Ledeen, Larry Franklin, Nicolo Pollari, Harold Rhode, Joshua Micah Marshall, Laura Rozen, George J. Tenet, Antonio Martino

Timeline Tags: US confrontation with Iran, Events Leading to Iraq Invasion, Iran-Contra Affair, Neoconservative Influence, Niger Uranium and Plame Outing

According to a later report by the Senate Intelligence Committee, Pentagon officials conceal potentially life-saving intelligence gleaned from Iranian agents. The report will find that in 2001, the officials, Larry Franklin and Harold Rhode, fail to pass along information gained from Iranian agents to US intelligence agencies, including reports that Iran has sent “hit squads” to Afghanistan to kill Americans. The findings will be based on information from highly unreliable sources: Iranian arms merchant Manucher Ghorbanifar and former Pentagon official Michael Ledeen, both of whom have often provided false or questionable information gathered from questionable sources (see April 3, 2005). In a series of meetings authorized by then-Deputy National Security Adviser Stephen Hadley (see December 9, 2001, December 12, 2001, June 2002, July 2002, and June 2003), two Pentagon officials, including one who reported to then-Undersecretary of Defense for Policy Douglas Feith (see September 2002), meet with Ghorbanifar, Ledeen, and other Iranians. Hadley does not fully brief CIA Director George Tenet and Deputy Secretary of State Richard Armitage about the meetings. The head of the DIA is briefed on the meeting but is not authorized to keep a written summary of it or to discuss it on the orders of then-Deputy Defense Secretary Paul Wolfowitz. For his part, Ledeen will say he twice briefed the US ambassador to Italy about the meetings. “Any time the CIA wanted to find out what was going on all they had to do was ask,” he will say. Though the report will admit that the sources of the intelligence are unreliable, it will still criticize the Pentagon for failing to allow what it calls “potentially useful and actionable intelligence” to be shared with intelligence agencies. [Associated Press, 6/5/2008; Senate Intelligence Committee, 6/5/2008 pdf file]

Entity Tags: US Department of Defense, George J. Tenet, Douglas Feith, Manucher Ghorbanifar, Stephen J. Hadley, Michael Ledeen, Richard Armitage, Paul Wolfowitz, Senate Intelligence Committee

Timeline Tags: US confrontation with Iran

Sometime in early 2002, President Bush signs a secret executive order authorizing the National Security Agency (NSA) to wiretap phone conversations and read e-mails to and from US citizens. The order extends an operation set into motion at least as early as October 2001 to begin wiretapping US citizens’ phones in a response to the 9/11 attacks. When the program is revealed by the US media in late 2005 (see December 15, 2005), Bush and his officials will say the program is completely legal, though it ignores the requirements of the Foreign Intelligence Surveillance Act (FISA) that requires the government to obtain court-issued warrants to mount surveillance against US citizens. They will insist that only those suspected of having ties to al-Qaeda are monitored, and only when those individuals make or receive international communications. [New York Times, 12/15/2005; Washington Post, 12/22/2005; Newsweek, 12/22/2008] Bush’s order authorizes the NSA to monitor international telephone conversations and international e-mails of hundreds, and perhaps thousands, of US citizens without court warrants, in an effort to track what officials call “dirty numbers” linked to al-Qaeda. When the program is finally revealed by the New York Times over three years later (see December 15, 2005), officials will say that the NSA still seeks warrants to monitor domestic communications. But there is little evidence of this (see, for example, Spring 2001). The presidential order is a radical shift in US surveillance and intelligence-gathering policies, and a major realignment for the NSA, which is mandated to only conduct surveillance abroad. Some officials believe that the NSA’s domestic eavesdropping crosses constitutional limits on legal searches. “This is really a sea change,” a former senior official who specializes in national security law will say in December 2005. “It’s almost a mainstay of this country that the NSA only does foreign searches.” [New York Times, 12/15/2005] Some sources indicate that NSA domestic surveillance activities, such as data-mining, the use of information concerning US persons intercepted in foreign call monitoring, and possibly direct surveillance of US persons, took place prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: George W. Bush, Al-Qaeda, Foreign Intelligence Surveillance Court, National Security Agency

Timeline Tags: Civil Liberties

In Paris, Defense Department officials (including either Harold Rhode or Larry Franklin) meet with Iranian officials and Manucher Ghorbanifar, an Iranian arms trader who had been a central figure in the Iran-Contra affair. The meeting reportedly resulted from “an unplanned, unscheduled encounter” that took place without White House approval. An earlier meeting involving several of the same figures had taken place seven months earlier (See December 9, 2001). [Washington Post, 8/9/2003; New York Times, 12/7/2003] When Secretary of State Colin Powell learns of the meeting, he complains directly to Condoleezza Rice and the office of Defense Secretary Donald Rumsfeld. [Newsday, 8/9/2003; Washington Post, 8/9/2003]

Entity Tags: Michael Ledeen, Harold Rhode, Colin Powell, Larry Franklin, Manucher Ghorbanifar

Timeline Tags: US confrontation with Iran, Iran-Contra Affair

Dismayed at the lack of post-invasion planning in the Defense Department (see August 2002), the Joint Chiefs of Staff advance their own proposal for a military command to govern Iraq after the overthrow of Saddam Hussein. Defense Secretary Donald Rumsfeld insists on a split between military and civilian functions; he places Undersecretary for Policy Douglas Feith in charge of planning for the civilian administration. Feith, whom CENTCOM commander Tommy Franks calls “the dumbest f_cking guy on the planet,” is an academic with no experience at administration on such a level, and will be roundly excoriated for his incompetence in handling the assignment. Author and public administration professor Alasdair Roberts will later write that beyond Feith’s lack of competence is a bureaucratic failure: the Pentagon “was simply reaching beyond its abilities.” A RAND report will later find the Defense Department “lacked experience, expertise, funding authority, local knowledge, and established contacts with other potential civilian organizations” to do the task it had set for itself. Roberts will write that the Pentagon will substitute improvisation for meticulous planning (see January 2003). [Roberts, 2008, pp. 126, 134]

Entity Tags: US Department of Defense, Alasdair Roberts, Donald Rumsfeld, Douglas Feith, Joint Chiefs of Staff, Thomas Franks, RAND Corporation

Timeline Tags: Events Leading to Iraq Invasion

Larry Franklin.Larry Franklin. [Source: Win McNamee / Getty Images]Larry Franklin, a member of Undersecretary of Defense Douglas Feith’s Office of Special Plans, and Harold Rhode, a protege of neoconservative Iran “specialist” Michael Ledeen, meets with Iranian arms merchant and Iran-Contra figure Manucher Ghorbanifar in Paris. This is the third of three meetings (see December 9, 2001 and June 2002) between these figures. While no details of the discussions that took place at this meeting are available, it is likely that, like the other two, the main focus of the meeting is the manipulation of “evidence” showing Iraq has weapons of mass destruction in order to provide “proof” that the US invasion of Iraq was justified. (Franklin will later be convicted of passing classified US intelligence to Israel, and will be sentenced to 12 years in prison—see April 13, 1999-2004 and October 5, 2005). [Vanity Fair, 3/2007] Journalists Joshua Micah Marshall, Laura Rozen, and Paul Glastris later speculate that the meetings have a hidden agenda alongside the Iraq concern: the destabilization of Iran. They write, “[T]he [Defense Department]-Ghorbanifar meetings suggest the possibility that a rogue faction at the Pentagon was trying to work outside normal US foreign policy channels to advance a ‘regime change’ agenda not approved by the president’s foreign policy principals or even the president himself.” [Washington Monthly, 9/2004]

Entity Tags: Paul Glastris, Michael Ledeen, Laura Rozen, Douglas Feith, Manucher Ghorbanifar, Harold Rhode, Larry Franklin, Joshua Micah Marshall, Office of Special Plans

Timeline Tags: US confrontation with Iran, Iran-Contra Affair, Neoconservative Influence

Senator John D. Rockefeller.Senator John D. Rockefeller. [Source: ViewImages.com]John D. Rockefeller (D-WV), the ranking member of the Senate Intelligence Committee, learns of the secret NSA warrantless wiretapping program against US citizens (see Early 2002) in a secret briefing for himself, the chairman of the committee, and the chairman and ranking member of the House Intelligence Committee. Hours later, Rockefeller sends a handwritten letter to Vice President Cheney expressing his concerns about the potential illegality of the program, concerns he apparently expressed in the briefing as well. Rockefeller will not release the letter publicly until December 19, 2005, four days after the New York Times publishes an article revealing the program’s existence (see December 15, 2005). Disturbed both by the information he was given and the information that was obviously being withheld, Rockefeller writes in part: “Clearly the activities we discussed raise profound oversight issues.… Given the security restrictions associated with this information, and my inability to consult staff or counsel on my own [Cheney had prohibited Rockefeller and the three other lawmakers in the briefing from consulting with their staff experts], I feel unable to fully evaluate, much less endorse these activities. As I reflected on the meeting today, and the future we face, John Poindexter’s TIA [Total Information Awareness (see March 2002)] project sprung to mind, exacerbating my concern regarding the direction the administration is moving with regard to security, technology, and surveillance. Without more information and the ability to draw on any independent legal or technical expertise, I simply cannot satisfy lingering concerns raised by the briefing we received.” [Democratic Party, 12/19/2005; Savage, 2007, pp. 115] Rockefeller also notes that he is not at liberty to do anything about his concerns, since he is legally bound to obey the secrecy rules the White House has invoked, but he wants his concerns noted. [Savage, 2007, pp. 116] It is unclear whether Rockefeller ever receives a reply. Rockefeller is apparently unaware of evidence showing that domestic surveillance may have begun well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: New York Times, Richard (“Dick”) Cheney, John D. Rockefeller, John Poindexter, Total Information Awareness, National Security Agency

Timeline Tags: Civil Liberties

The new head of the Justice Department’s Office of Legal Counsel (OLC), Jack Goldsmith, begins an internal review of the legality of the NSA’s warrantless wiretapping program (see December 15, 2005). The program is kept so secret that only four Justice officials even have access to information about its inner workings, a pattern of poor consultation he will call “the biggest legal mess I have ever encountered” when he testifies to the Senate about the program four years later (see October 2, 2007). Neither Attorney General John Ashcroft nor Justice’s top legal counsel know much about the program. When Goldsmith begins his legal review, the White House initially refuses to brief Deputy Attorney General James Comey about it. Goldsmith later testifies that he cannot find “a legal basis for some aspects of the program.” Upon completing the review, Goldsmith declares the program illegal, with the support of Ashcroft and Comey. However, White House officials are irate at Goldsmith’s findings. [Washington Post, 10/20/2007]

Entity Tags: Alberto R. Gonzales, Bush administration (43), Office of Legal Counsel (DOJ), US Department of Justice, John Ashcroft, James B. Comey Jr., Jack Goldsmith, National Security Agency

Timeline Tags: Civil Liberties

FISC Presiding Judge Colleen Kollar-Kotelly.FISC Presiding Judge Colleen Kollar-Kotelly. [Source: Washington Post]James Baker, counsel for intelligence policy in the Justice Department’s Office of Intelligence Policy and Review (no relation to the former Secretary of State James A. Baker), informs the Foreign Intelligence Surveillance Court (FISC) that the government has, at least twice, improperly used excluded evidence from NSA domestic wiretaps to obtain warrants from FISC. Colleen Kollar-Kotelly, the senior FISC judge, is angered by this as both she and her predecessor, Royce Lambeth, have insisted that no evidence obtained from warrantless wiretaps can be used to obtain warrants for further surveillance from FISC. The Justice Department assured them that the administration would never attempt to secure warrants in such a manner. By using the excluded information, the Justice Department rendered useless the federal screening system put in place to keep such evidence from reaching FISC, which did not want to receive it due to the questionable legality of the domestic surveillance program (see December 15, 2005). Kollar-Kotelly’s complaint about the use of tainted evidence results in a brief suspension of the NSA wiretapping program. But the practice will continue (see 2005). [Washington Post, 2/9/2006]

Entity Tags: US Department of Justice, James Baker, Foreign Intelligence Surveillance Court, National Security Agency, Office of Intelligence Policy and Review, Bush administration (43), Royce Lambeth, Colleen Kollar-Kotelly

Timeline Tags: Civil Liberties

Thomas Tamm.Thomas Tamm. [Source: Newsweek]Thomas Tamm, a veteran Justice Department prosecutor with a high-level security clearance, is finishing up a yearlong post with the Office of Intelligence Policy and Review (OIPR), a Justice Department unit handling wiretaps of suspected terrorists and spies. As his stint is coming to a close, Tamm learns of the existence of a highly classified National Security Agency (NSA) program that is electronically eavesdropping on American citizens—domestic wiretapping. He later learns that “the program,” as it is referred to by those few who know of it at all, is called “Stellar Wind.”
Concealment from FISA Judges - Tamm learns that the NSA program is being hidden from the Foreign Intelligence Surveillance Act (FISA) Court, a panel of federal judges who by law must approve and supervise such surveillance for intelligence purposes. OIPR lawyers ask the FISA Court for permission to implement national-security wiretaps. But, Tamm learns, some wiretaps—signed only by Attorney General John Ashcroft—are going to the chief FISA Court judge and not the other ten judges on the FISA panel. The “AG-only” requests are extraordinarily secretive, and involve information gleaned from what is only referred to as “the program”—Stellar Wind. Only a very few White House and US intelligence officials know the name and the nature of “the program.” Stellar Wind involves domestic wiretaps on telephones and computer e-mail accounts derived from, but not necessarily linked to, information secured from captured al-Qaeda computers and cell phones overseas. With the voluntary cooperation of American telecommunications companies (see 1997-August 2007 and After, February 2001, February 2001, and February 2001 and Beyond), the NSA program also collects vast amounts of personal data about US citizens’ phone and e-mail communications. The program also collects an enormous amount of financial information from the Treasury Department (see February 28, 2006), all collected as part of the NSA’s “data mining” efforts (see Late 1999 and After September 11, 2001).
Program Is 'Probably Illegal,' Says DOJ Official - Tamm, suspicious about the unusual requests, asks his supervisors about the program, and is told to drop the subject. “[N]o one wanted to talk about it,” he will recall. Tamm asks one of his supervisors, Lisa Farabee, “Do you know what the program is?” Farabee replies: “Don’t even go there.… I assume what they are doing is illegal.” Tamm is horrified. His first thought, he will later recall, is, “I’m a law enforcement officer and I’m participating in something that is illegal?” Tamm soon finds out from deputy OIPR counsel Mark Bradley that the chief FISA judge, Colleen Kollar-Kotelly, is raising unwanted questions about the warrant requests (see 2004 and 2005), and “the AG-only cases are being shut down.” Bradley adds, “This may be [a time] the attorney general gets indicted.”
Request for Guidance Turned Down - For weeks, Tamm agonizes over what to do. He seeks guidance from a former colleague, Sandra Wilkinson, who now works on the Senate Judiciary Committee. The two have coffee in the Senate cafeteria, and Tamm asks Wilkinson to ask if anyone on the committee knows anything about “the program.” Weeks go by without a response, and Tamm sends Wilkinson an e-mail from his OIPR computer—an e-mail that will later alert the FBI to Tamm’s interest in Stellar Wind. During a second conversation, Wilkinson refuses to give Tamm any information. “Well, you know, then,” he replies, “I think my only option is to go to the press.”
Contacting the New York Times - Tamm finally decides to contact the New York Times’s Eric Lichtblau, who has written several stories on the Justice Department that impressed Tamm. By this point he has transferred out of OIPR and back into a Justice Department office that would allow him to return to the courtroom. Tamm calls Lichtblau from a pay phone near the US District Courthouse in Washington. “My whole body was shaking,” he will recall. He identifies himself only as “Mark” (his middle name), and arranges to meet Lichtblau at a bookstore near the Justice Department. (In his 2008 book Bush’s Law: The Remaking of American Justice, Lichtblau describes Tamm as “a walk-in” source who was “agitated about something going on in the intelligence community.” Lichtblau will describe Tamm as wary and “maddeningly vague,” but as they continue to meet—usually in bookstores and coffee shops in the Capitol District—Tamm’s “credibility and his bona fides became clear and his angst appears sincere. Eighteen months later, after finally overriding a request and warning from President Bush not to print the story (see December 6, 2005), the Times reports on the existence of the NSA program (see December 15, 2005). [Ars Technica, 12/16/2008; Newsweek, 12/22/2008]

Entity Tags: Mark Bradley, Federal Bureau of Investigation, Eric Lichtblau, Colleen Kollar-Kotelly, Bush administration (43), ’Stellar Wind’, Foreign Intelligence Surveillance Court, Lisa Farabee, Senate Judiciary Committee, Thomas Tamm, Sandra Wilkinson, Office of Intelligence Policy and Review, New York Times, US Department of the Treasury, National Security Agency, US Department of Justice, John Ashcroft

Timeline Tags: Civil Liberties

David Ottaway.David Ottaway. [Source: AAAS.org]According to the Oregon branch of the Islamic charitable organization the Al-Haramain Islamic Foundation, Washington Post reporter David Ottaway receives a classified document that is evidence of illegal surveillance by the National Security Agency. The document shows that the NSA illegally intercepted telephone conversations and e-mails between Al Haramain officials in Oregon and Washington, DC. The document, dated May 24, 2004 and marked “Top Secret,” is accidentally provided to Al Haramain by Treasury Department officials that same month; Al Haramain quickly turns the document over to Ottoway, who is researching Islamic groups and individuals labeled as terrorists by the US government and are attempting to prove their innocence. Instead of reporting on the document, Ottaway will return it to the FBI when that organization demands it back in November 2004. In February 2006, Al Haramain will sue the Bush administration for illegally spying on it (see February 28, 2006) as part of its warrantless wiretapping program (see After September 11, 2001 and December 15, 2005). The Treasury Department has been investigating the charitable organization for possible ties to terrorism, and designated the group as a terrorist organization. The FBI will approach the organization and then Ottaway himself, demanding that all copies of the document be returned and threatening them with prosecution if the contents are revealed. Ottaway will consult with Post editors and lawyers, who will conclude, according to Ottaway, “that it was not relevant to what I was working on at the time.” Post executive editor Leonard Downie, Jr., will defend the decision, saying, “At the time we had this document, it was before we had any knowledge of the eavesdropping program. Without that knowledge, the document provided no useful information. At the time, all we knew was that this document was not relevant to David’s reporting.” [Washington Post, 3/3/2006]

Entity Tags: US Department of the Treasury, Washington Post, Leonard Downie, Jr., Al Haramain Islamic Foundation (Oregon branch), Bush administration (43), National Security Agency, David Ottaway, Federal Bureau of Investigation

Timeline Tags: Civil Liberties, Domestic Propaganda

Pat Roberts during a July 9, 2004 interview on PBS.Pat Roberts during a July 9, 2004 interview on PBS. [Source: PBS]The Senate Intelligence Committee releases the 511-page Senate Report on Iraqi WMD intelligence, formally titled the “Report of the Select Committee on Intelligence on the US Intelligence Community’s Prewar Intelligence Assessments on Iraq.” [US Congress, 7/7/2004; CNN, 7/9/2004] All nine Republicans and eight Democrats signed off on the report without dissent, which, as reporter Murray Waas will write, is “a rarity for any such report in Washington, especially during an election year.” [National Journal, 10/27/2005]
Report Redacted by White House - About 20 percent of the report was redacted by the White House before its release, over the objections of both Republicans and Democrats on the committee. Some of the redactions include caveats and warnings about the reliability of key CIA informants, one code-named “Red River” and another code-named “Curveball” (see Mid- and Late 2001). The source called “Red River” failed polygraph tests given to him by CIA officers to assess his reliability, but portions of the report detailing these and other caveats were redacted at the behest of Bush administration officials. [New York Times, 7/12/2004; New York Times, 7/18/2004]
Widespread Failures of US Intelligence - The report identifies multiple, widespread failures by the US intelligence community in its gathering and analysis of intelligence about Iraq WMD, which led to gross misunderstandings and misrepresentations about Iraq’s WMD programs to the American public by government officials. Committee chairman Pat Roberts (R-KS), who has previously attempted to shift blame for the intelligence misrepresentations away from the Bush administration and onto the CIA (see July 11, 2003 and After), says that intelligence used to support the invasion of Iraq was based on assessments that were “unreasonable and largely unsupported by the available intelligence.” He continues: “Before the war, the US intelligence community told the president as well as the Congress and the public that Saddam Hussein had stockpiles of chemical and biological weapons and if left unchecked would probably have a nuclear weapon during this decade. Today we know these assessments were wrong.” Senator John D. Rockefeller (D-WV), the ranking Democrat on the 18-member panel that created the report, says “bad information” was used to bolster the case for war. “We in Congress would not have authorized that war with 75 votes if we knew what we know now,” he says (see October 10, 2002). “Leading up to September 11, our government didn’t connect the dots. In Iraq, we are even more culpable because the dots themselves never existed.” Numerous assertions in an October 2002 National Intelligence Estimate (NIE—see October 1, 2002) were “overstated” or “not supported by the raw intelligence reporting,” including:
bullet Claims that Iraq was rebuilding its nuclear weapons program;
bullet Claims that Iraq had large stockpiles of chemical and biological weapons;
bullet Claims that Iraq was developing an unmanned aerial vehicle that could be used to deliver chemical and/or biological weapons payloads onto distant targets;
bullet The so-called “layering effect,” where “assessments were based on previous judgments, without considering the uncertainties of those judgments” (Roberts calls it an “assumption train”);
bullet The failure to explain adequately the uncertainties in the October 2002 NIE to White House officials and Congressional lawmakers;
bullet Reliance on claims by “Curveball,” noting that the use of those claims “demonstrated serious lapses in handling such an important source”;
bullet Use of “overstated, misleading, or incorrect” information in helping then-Secretary of State Colin Powell present the administration’s case to the United Nations in February 2003 (see February 5, 2003); and
bullet The failure of the CIA to share significant intelligence with other agencies. [CNN, 7/9/2004; Cybercast News Service, 7/9/2004; New York Times, 7/9/2004]
“One fact is now clear,” Roberts says. “Before the war, the US intelligence community told the president as well as the Congress and the public that Saddam Hussein had stockpiles of chemical and biological weapons, and if left unchecked, would probably have a nuclear weapon during this decade. Well, today we know these assessments were wrong.” [Cybercast News Service, 7/9/2004; New York Times, 7/9/2004] Rockefeller says the intelligence community failed to “accurately or adequately explain the uncertainties behind the judgments in the October 2002 National Intelligence Estimate to policymakers.” The community’s “intelligence failures” will haunt America’s national security “for generations to come,” he says. “Our credibility is diminished. Our standing in the world has never been lower,” he says. “We have fostered a deep hatred of Americans in the Muslim world, and that will grow. As a direct consequence, our nation is more vulnerable today than ever before.” [CNN, 7/9/2004; New York Times, 7/9/2004]
'Group Think' and 'Corporate Culture' - Roberts says the report finds that the “flawed” information used to send the nation to war was the result of “what we call a collective group think, which led analysts and collectors and managers to presume that Iraq had active and growing WMD programs.” He says this “group think caused the community to interpret ambiguous evidence, such as the procurement of dual-use technology, as conclusive evidence of the existence of WMD programs.” Roberts blames “group think” and a “broken corporate culture and poor management,” which “cannot be solved by simply adding funding and also personnel.” [CNN, 7/9/2004; New York Times, 7/9/2004]
Lack of Human Intelligence in Iraq - Perhaps the most troubling finding, Roberts says, is the intelligence community’s near-total lack of human intelligence in Iraq. “Most alarmingly, after 1998 and the exit of the UN inspectors, the CIA had no human intelligence sources inside Iraq who were collecting against the WMD target,” he says. [CNN, 7/9/2004; New York Times, 7/9/2004]
No Connection between Iraq, al-Qaeda - Rockefeller says that the administration’s claims of an alliance between Iraq’s Saddam Hussein and al-Qaeda had no basis in fact: “[N]o evidence existed of Iraq’s complicity or assistance in al-Qaeda’s terrorist attacks, including 9/11.” The report says that intelligence claims of connections between Iraq and some terrorist activities were accurate, though the contacts between al-Qaeda and Iraq from the 1990s “did not add up to an established formal relationship.” [CNN, 7/9/2004; New York Times, 7/9/2004]
Divided Opinion on Pressure from Bush Administration - Republicans and Democrats on the committee differ as to whether they believe the CIA and other intelligence agencies groomed or distorted their findings as a result of political pressure from the White House. “The committee found no evidence that the intelligence community’s mischaracterization or exaggeration of intelligence on Iraq’s weapons of mass destruction capabilities was the result of politics or pressure,” Roberts says. However, Rockefeller notes that the report fails to explain fully the pressures on the intelligence community “when the most senior officials in the Bush administration had already forcefully and repeatedly stated their conclusions publicly. It was clear to all of us in this room who were watching that—and to many others—that they had made up their mind that they were going to go to war.” The analysts were subjected to a “cascade of ominous statements,” Rockefeller says, that may have pushed them to slant their analyses in the direction the White House indicated it wanted. The report finds that Vice President Dick Cheney and others who repeatedly visited intelligence agencies (see 2002-Early 2003) pressured intelligence analysts or officials to present particular findings or change their views. However, the report notes repeated instances of analysts exaggerating what they knew, and leaving out, glossing over, or omitting dissenting views. According to the report, the intelligence community released a misleading public version of the October 2002 NIE (see October 4, 2002) that eliminated caveats and dissenting opinions, thus misrepresenting “their judgments to the public which did not have access to the classified National Intelligence Estimate containing the more carefully worded assessments.” [CNN, 7/9/2004; New York Times, 7/9/2004; Cybercast News Service, 7/9/2004] In an interview the evening after the report’s release, Rockefeller is asked if the report documents “a failure of a system or is this a failure of a bunch of individuals who just did their jobs poorly?” Rockefeller responds: “This is a failure of a system.… It is not fair to simply dump all of this on the Central Intelligence Agency. The Central Intelligence Agency does not make the decision, and [former Director] George Tenet does not make the decision to go to war. That decision is made at the other end of Pennsylvania Avenue.… So we went to war under false pretenses, and I think that is a very serious subject for Americans to think about for our future.” Asked “if the president had known then what he knows now, he would have still taken us to war?” Rockefeller answers: “I can’t answer that question. I just ask—the question I ask is, why isn’t he, and maybe he is, why isn’t he as angry about his decision, so to speak his vote on this, as I am about mine?” [PBS, 7/9/2004]
Supporting the Claim of Iraq's Attempt to Purchase Nigerien Uranium - The report states flatly that senior CIA case officer Valerie Plame Wilson made the decision to send her husband, former ambassador Joseph Wilson, to Niger to investigate false claims that Iraq had attempted to purchase uranium from that nation (see February 21, 2002-March 4, 2002). The CIA has demonstrated that Plame Wilson did not make that decision (see February 19, 2002). However, as well as claiming that Plame Wilson sent Wilson to Niger, it claims that Wilson’s report, far from disproving the assertion of an attempt by Iraq to purchase uranium, actually bolstered that assertion. The report states that the question of Iraq’s attempt to buy Nigerien uranium remains “open.” It also says Wilson lied to the Washington Post in June 2004 by claiming that the documents used to support the claim were forgeries (see Between Late 2000 and September 11, 2001, Late September 2001-Early October 2001, October 15, 2001, December 2001, February 5, 2002, February 12, 2002, October 9, 2002, October 15, 2002, January 2003, February 17, 2003, March 7, 2003, March 8, 2003, and 3:09 p.m. July 11, 2003). “Committee staff asked how the former ambassador could have come to the conclusion that the ‘dates were wrong and the names were wrong’ when he had never seen the CIA reports and had no knowledge of what names and dates were in the reports,” the report states. Wilson told committee members he may have been confused and may have “misspoken” to some reporters (see May 2, 2004). The committee did not examine the documents themselves. [Washington Post, 7/10/2009] The committee made similar claims a year before (see June 11, 2003 and July 11, 2003 and After). Progressive reporter and columnist Joshua Micah Marshall disputes the report’s claim that Wilson’s trip to Niger actually helped prove the assertion that Iraq tried to buy Nigerien uranium. The intelligence reports making the assertion are “fruits of the same poison tree” that produced so many other false and misleading claims, Marshall writes, and were based on the assumption that the forged documents were genuine. [Joshua Micah Marshall, 7/10/2004] In 2007, Plame Wilson will write, “What was missing from the [committee] report was just as telling as the distortions it contained. The ‘Additional Views’ section… had concluded” that she was responsible for sending Wilson to Niger. Yet that was contradicted by a senior CIA official over a year before. Plame Wilson will call the “Additional Views” section “a political smear if there ever was one,” crammed with “distortions and outright lies. Yet it continues to be cited today by Joe’s critics as proof of his lack of credibility.” The Wilsons learn months later that committee Democrats decided not to fight against the attacks on Wilson’s integrity; according to one of the senior Democratic senators on the panel, there was simply too much “incoming” from the Republicans for them to fight every issue. There were “far too many serious substantial disputes” that needed solving, and the Democrats chose to allow the attacks on Wilson to proceed without comment. [Wilson, 2007, pp. 187-190]
Portion of the Report Delayed - Roberts and other Republican majority committee members were successful in blocking Democrats’ attempts to complete the second portion of the report, which delineates the Bush administration’s use of the intelligence findings. That report will not be released until after the November 2004 presidential election. Rockefeller says he feels “genuine frustration… that virtually everything that has to do with the administration” has been “relegated to phase two” and will be discussed at another time. The second part of the committee’s investigation will focus on the “interaction or the pressure or the shaping of intelligence” by the Bush administration, Rockefeller says. “It was clear to all of us that the Bush administration had made up its mind to go to war,” he says, and he believes that such a “predetermination” influenced the intelligence community. Representative Jane Harman (D-CA), the ranking member of the House Intelligence Committee, says she hopes a similar House investigation would address some of those issues. However, she notes, she has been stymied by House Republicans in even launching that investigation. “There has not been the cooperation that there apparently has been on the Senate side,” she says. She has just now managed to wangle a meeting with House Intelligence Committee chairman Porter Goss (R-FL), who is being touted as the next director of the CIA (see September 24, 2004). Harman says, “I would hope we could address [the issues] factually and on a bipartisan basis, but at the moment I don’t have a lot of confidence in it.” [CNN, 7/9/2004; Cybercast News Service, 7/9/2004] Roberts’s spokeswoman Sarah Little later says that the committee has not yet decided whether the second portion of the report will be fully classified, declassified, or even if it will hold hearings. [National Journal, 10/27/2005]
Cheney, Roberts Colluded in Interfering with Report - Over a year later, the media will find that Roberts allowed Cheney and members of his staff to interfere with the committee’s investigation and dramatically limit its scope (see October 27, 2005). Rockefeller will say that he made three separate requests for White House documents during the committee’s investigation, but never received the documents he asked for. “The fact is,” Rockefeller will say, “that throughout the Iraq investigation any line of questioning that brought us too close to the White House was thwarted.” Rockefeller’s spokesperson, Wendy Morigi, will say that Rockefeller will “sadly come to the conclusion that the Intelligence Committee is not capable of doing the job of investigating the fundamental question as to whether the administration has misused intelligence to go to war.” [National Journal, 10/30/2005] Plame Wilson will write: “In the coming months, many reliable sources told us that before the report was issued, there was considerable collusion between the vice president’s office and… Roberts on how to craft the report and its content. So much for checks and balances and the separation of powers.” [Wilson, 2007, pp. 192]

Entity Tags: Joshua Micah Marshall, Pat Roberts, Murray Waas, Richard (“Dick”) Cheney, Valerie Plame Wilson, Porter J. Goss, Joseph C. Wilson, Senate Intelligence Committee, John D. Rockefeller, Central Intelligence Agency, House Intelligence Committee, ’Curveball’, Jane Harman, Bush administration (43), Al-Qaeda, Colin Powell, Wendy Morigi, Sarah Little, George J. Tenet

Timeline Tags: Events Leading to Iraq Invasion

The New York Times agrees to a White House request to withhold publication of a potential “bombshell” story: an in-depth article revealing an enormous, and possibly illegal, warrantless wiretapping program executed by the NSA at President Bush’s behest after the 9/11 attacks. The Times will publish the story almost a year later (see December 15, 2005). In August 2006, the Times’s public editor, Byron Calame, will confirm the delay, and note that he has been “increasingly intrigued” by the various descriptions of the delay by Times editor Bill Keller (see December 16, 2005) and others. Keller will tell Calame that, contrary to some statements he and others have made, the story was originally scheduled to be published just days before the November 2004 presidential election. “The climactic discussion about whether to publish was right on the eve of the election,” Keller will say, though he will refuse to explain why he makes the final decision to hold the story. However, he will say that at this time he is not sure the story’s sources are reliable enough to warrant its publication before a close election. [New York Times, 8/13/2006]

Entity Tags: Bush administration (43), Bill Keller, New York Times, Byron Calame, National Security Agency

Timeline Tags: Civil Liberties

Outgoing Undersecretary of Defense Douglas Feith, one of the key architects of the Iraq occupation, is bemused by the fact that, despite his predictions and those of his neoconservative colleagues, Iraq is teetering on the edge of all-out civil war. He has come under fire from both political enemies and former supporters, with Senator Carl Levin (D-MI) accusing him of deceiving both the White House and Congress, and fellow neoconservative William Kristol accusing him of “being an agent of” disgraced Defense Secretary Donald Rumsfeld (see November 6-December 18, 2006). Feith defends the invasion of Iraq, calling it “an operation to prevent the next, as it were, 9/11,” and noting that the failure to find WMD is essentially irrelevant to the justification for the war. “There’s a certain revisionism in people looking back and identifying the main intelligence error [the assumption of stockpiles] and then saying that our entire policy was built on that error.” Feith is apparently ignoring the fact that the administration’s arguments for invading Iraq—including many of his own assertions—were built almost entirely on the “error” of the Iraqi WMD threat (see July 30, 2001, Summer 2001, September 11, 2001-March 17, 2003, Shortly After September 11, 2001, September 14, 2001, September 19-20, 2001, September 20, 2001, October 14, 2001, November 14, 2001, 2002, 2002-March 2003, February 2002, Summer 2002, August 26, 2002, September 3, 2002, September 4, 2002, September 8, 2002, September 8, 2002, September 10, 2002, September 12, 2002, Late September 2002, September 19, 2002, September 24, 2002, September 24, 2002, September 28, 2002, October 7, 2002, December 3, 2002, December 12, 2002, January 9, 2003, February 3, 2003, February 5, 2003, February 8, 2003, March 22, 2003, and March 23, 2003, among others).
Cultural Understanding Did Not Lead to Success - Feith says he is not sure why what he describes as his deep understanding of Iraqi culture did not lead to accurate predictions of the welcome the US would receive from the Iraqi people (see November 18-19, 2001, 2002-2003, September 9, 2002, and October 11, 2002). “There’s a paradox I’ve never been able to work out,” he says. “It helps to be deeply knowledgeable about an area—to know the people, to know the language, to know the history, the culture, the literature. But it is not a guarantee that you will have the right strategy or policy as a matter of statecraft for dealing with that area. You see, the great experts in certain areas sometimes get it fundamentally wrong.” Who got it right? President Bush, he says. “[E]xpertise is a very good thing, but it is not the same thing as sound judgment regarding strategy and policy. George W. Bush has more insight, because of his knowledge of human beings and his sense of history, about the motive force, the craving for freedom and participation in self-rule, than do many of the language experts and history experts and culture experts.”
'Flowers in Their Minds' - When a reporter notes that Iraqis had not, as promised, greeted American soldiers with flowers, Feith responds that they were still too intimidated by their fear of the overthrown Hussein regime to physically express their gratitude. “But,” he says, “they had flowers in their minds.” [New Yorker, 5/9/2005; Scoblic, 2008, pp. 228-229]

Entity Tags: US Department of Defense, Carl Levin, William Kristol, Douglas Feith

Timeline Tags: Iraq under US Occupation

The FBI and Justice Department quietly open an investigation into whether Representative Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee, improperly colluded with the American Israel Public Affairs Committee (AIPAC) to win reappointment as the committee’s ranking member. The investigation is not revealed to the public until October 2006 (see October 20, 2006). The investigation centers on allegations that Harman and AIPAC arranged for wealthy supporters to lobby House Minority Leader Nancy Pelosi (D-CA) on Harman’s behalf. The case is an outgrowth of a probe that has already led to the felony conviction of former DIA official Larry Franklin, who pled guilty to giving classified information to two AIPAC lobbyists (see October 5, 2005), and the lobbyists, Steve Rosen and Keith Weissman, who still face charges of passing that information on to Israel (see April 13, 1999-2004). The investigation has now expanded to determine if Harman’s campaign to persuade Pelosi to reappoint her to the committee may have involved AIPAC, and whether Harman promised to return the favor by using her influence to persuade the Justice Department to ease up on the AIPAC lobbyists. Reporter Timothy Burger will write: “If that happened, it might be construed as an illegal quid pro quo, depending on the context of the situation. But the sources caution that there has been no decision to charge anyone and that it is unclear whether Harman and AIPAC acted on the idea.” Both Harman and Pelosi are outspoken supporters of Israel, and have praised AIPAC for its efforts to further cement ties between Israel and the US. However, Congressional sources will say that Pelosi is furious at attempts by major donors to lobby on behalf of Harman. The LA Weekly reported in May that Harman “had some major contributors call Pelosi to impress upon her the importance of keeping Jane in place. According to these members, this tactic, too, hasn’t endeared Harman to Pelosi.” Another powerful figure has lobbied for Harman: entertainment industry billionaire Haim Saban, who made his fortune through the Mighty Morphin Power Rangers children’s entertainment franchise. It is unclear whether Saban had any contact with AIPAC, and if his efforts to lobby on Harman’s behalf were part of a larger, more orchestrated plan. [Time, 10/20/2006] When the story becomes public in October 2006, Harman will deny any improper or illegal conduct (see October 20, 2006). The investigation will eventually be dropped, supposedly for “lack of evidence.” In April 2009, evidence will surface that the NSA wiretapped Harman discussing a quid pro quo with a suspected Israeli agent, and that the investigation was not dropped because of lack of evidence, but because of the intervention of Attorney General Alberto Gonzales (see October 2005, Late 2005, and April 19, 2009). [Congressional Quarterly, 4/19/2009]

Entity Tags: Nancy Pelosi, Haim Saban, Federal Bureau of Investigation, American Israel Public Affairs Committee, Alberto R. Gonzales, House Intelligence Committee, Jane Harman, Steve Rosen, Timothy Burger, US Department of Justice, Keith Weissman, National Security Agency, Larry Franklin

Timeline Tags: Civil Liberties

Months after the Bush administration successfully convinced the New York Times to hold off publishing its report on the administration’s warrantless wiretapping program (see Early November 2004, December 6, 2005, and December 15, 2005), one of the reporters on the story, Eric Lichtblau, attempts to get a response on the program from one of the few Democrats briefed on it, House Intelligence Committee ranking member Jane Harman (D-CA). In his 2008 book Bush’s Law: The Remaking of American Justice, Lichtblau will write about covering a House hearing where Harman launches into a passionate call for stronger civil liberties safeguards in the reauthorization of the USA Patriot Act (see March 9, 2006). According to his recollection, Lichtblau approaches Harman and says, “I’m trying to square what I heard in there with what we know about that program.” He will write: “Harman’s golden California tan turned a brighter shade of red. She knew exactly what I was talking about. Shooing away her aides, she grabbed me by the arm and drew me a few feet away to a more remote section of the Capitol corridor. ‘You should not be talking about that here,’ she scolded me in a whisper. ’ They don’t even know about that,’ she said, gesturing to her aides, who were now looking on at the conversation with obvious befuddlement.” Harman tells Lichtblau, “The Times did the right thing by not publishing that story,” but will not discuss the details. When asked what intelligence capabilities would be lost by informing the public about something the terrorists already knew—that the government was listening to them—she simply replies, “This is a valuable program, and it would be compromised.” Lichtblau will add: “This was clearly as far as she was willing to take the conversation, and we didn’t speak again until months later, after the NSA story had already run. By then, Harman’s position had undergone a dramatic transformation. When the story broke publicly, she was among the first in line on Capitol Hill to denounce the administration’s handling of the wiretapping program, declaring that what the NSA was doing could have been done under the existing FISA law.” [TPM Muckraker, 3/19/2008]

Entity Tags: Eric Lichtblau, Bush administration (43), New York Times, House Intelligence Committee, Jane Harman

Timeline Tags: Civil Liberties

Two lobbyists for the American Israel Public Affairs Committee (AIPAC), Steven Rosen and Keith Weissman, are indicted for crimes relating to their role in passing classified US government information to Israel (see April 13, 1999-2004). They are charged with conspiring “to communicate national defense information [to] persons not entitled to receive it,” applicable under the Espionage Act. Their charges are similar to those filed against former government employee Larry Franklin, their contact (see October 5, 2005). National security expert Eli Lake will call the charges against Rosen and Weissman “unprecedented,” noting that for them to face the same charges as Franklin puts them—two private citizens—under the same obligation as Franklin, a government official, to keep secret any classified information they might acquire. Lake will write: “[I]f it’s illegal for Rosen and Weissman to seek and receive ‘classified information,’ then many investigative journalists are also criminals—not to mention former government officials who write for scholarly journals or the scores of men and women who petition the federal government on defense and foreign policy. In fact, the leaking of classified information is routine in Washington, where such data is traded as a kind of currency. And, while most administrations have tried to crack down on leaks, they have almost always shied away from going after those who receive them—until now. At a time when a growing amount of information is being classified, the prosecution of Rosen and Weissman threatens to have a chilling effect—not on the ability of foreign agents to influence US policy, but on the ability of the American public to understand it.” [US v. Franklin, Rosen, and Weissman Criminal No. 1:05CR225, 8/4/2005 pdf file; New Republic, 10/10/2005; Savage, 2007, pp. 174] Months later, Attorney General Alberto Gonzales will say that journalists and other private citizens can be prosecuted for leaking classified information (see May 21, 2006). Almost four years later, the charges against Rosen and Weissman will be dropped (see May 1, 2009).

Entity Tags: Keith Weissman, Steven Rosen, American Israel Public Affairs Committee, Larry Franklin, Eli Lake

Timeline Tags: US confrontation with Iran

Representative Jane Harman (D-CA) is recorded telling a suspected Israeli agent that she would intervene with the Justice Department to try to get charges against two Israeli lobbyists reduced. In return, the Israeli agent promises to help Harman secure the chairmanship of the House Intelligence Committee. The Israeli agent will remain unidentified; the two lobbyists, Steve Rosen and Keith Weissman, are charged with espionage after they allegedly passed along classified information to the American Israel Public Affairs Committee (AIPAC—see April 13, 1999-2004). The conversation between Harman and the Israeli agent is recorded on an wiretap, reportedly by the NSA, mounted as part of a federal investigation into AIPAC’s potential espionage operations against the US (see October 5, 2005). According to transcripts of the wiretapped conversation, Harman agrees to “waddle into” the AIPAC case “if you think it’ll make a difference.” The Israeli agent asks Harman if she could speak with Attorney General Alberto Gonzales on Rosen’s and Weissman’s behalf. Harman replies that Gonzales might not cooperate, because he “just follows White House orders,” but other officials might be more pliable. In return, the Israeli agent promises to contact House Minority Leader Nancy Pelosi (D-CA) and attempt to persuade her to name Harman as chairwoman of the Intelligence Committee if the Democrats win control of the House in the November 2006 elections. Harman tells the agent, “This conversation doesn’t exist,” and hangs up. The contents of the conversation will later be confirmed by three separate sources, including two former senior national security officials. [Congressional Quarterly, 4/19/2009] Reporter Marc Ambinder will later write that Harman’s conversation may have been recorded by the FBI, and not the NSA, as part of the its investigation into Rosen and Weissman. [Atlantic Monthly, 4/20/2009]

Entity Tags: Nancy Pelosi, Bush administration (43), American Israel Public Affairs Committee, Alberto R. Gonzales, Jane Harman, Marc Ambinder, Steve Rosen, Keith Weissman, National Security Agency, US Department of Justice

Timeline Tags: Civil Liberties

Defense Department analyst Larry Franklin pleads guilty to passing government secrets to two employees of a pro-Israel lobbying group and to an Israeli government official, a violation of the Espionage Act. He is later sentenced to 12 and a half years in prison. [Washington Post, 10/6/2005; Washington Post, 1/21/2006; Savage, 2007, pp. 173] Franklin, an Iran specialist, gave details of US policy towards Iran to Steven Rosen and Keith Weissman, two members of AIPAC (American Israel Public Affairs Committee) which the Washington Post calls “one of Washington’s most influential lobbying organizations.” He also admits to giving classified information directly to Naor Gilon, chief of political affairs at the Israeli Embassy in Washington. Gilon returned to Israel, but Rosen and Weissman have been charged in what prosecutors claim was a conspiracy to obtain and illegally pass classified US information to foreign officials and news reporters. Franklin reportedly has been cooperating with investigators in return for a relatively lenient sentence. [Washington Post, 10/6/2005; Washington Post, 1/21/2006] It appears that Franklin was caught by accident in 2003 as part of a larger FBI investigation into Israeli spying that began in 2001 (see September 9, 2001). Investigators had been monitoring Gilon and were reportedly “floored” to watch Franklin sit down and eat lunch with him. [United Press International, 12/9/2004]

Entity Tags: Naor Gilon, Keith Weissman, American Israel Public Affairs Committee, Larry Franklin, Steven Rosen

Timeline Tags: US confrontation with Iran, Complete 911 Timeline

Arthur Sulzberger.Arthur Sulzberger. [Source: New York Times]George W. Bush summons New York Times publisher Arthur Sulzberger and Times editor Bill Keller to the Oval Office to try to dissuade them from running a landmark story revealing the NSA’s illegal wiretapping program (see December 15, 2005) that he authorized in 2002 (see Early 2002). In the meeeting, Bush warns Sulzberger and Keller that “there’ll be blood on your hands” if another terrorist attack were to occur, obviously implying that to reveal the nature of the program would invite terrorist strikes. Bush is unsuccessful in his attempt to quash the story. [Newsweek, 12/21/2005; Newsweek, 12/22/2008]

Entity Tags: New York Times, Arthur Sulzberger, George W. Bush, National Security Agency, Bill Keller

Timeline Tags: Civil Liberties

An FBI investigation into Jane Harman (D-CA), the ranking minority member of the House Intelligence Committee, is halted by Attorney General Alberto Gonzales, according to three former top national security officials. The investigation was to determine whether she agreed to use her influence on behalf of accused Israeli spies in return for Israeli support in being named chairman of the committee (see Summer 2005, October 2005 and December 2, 2006). In contrast to the former officials’ claims, the media will report that the investigation is ended due to “lack of evidence” of impropriety or illegal behavior on Harman’s part. However, according to the former officials, Gonzales wants Harman to help defend the administration’s warrantless wiretapping program, which is about to be revealed by a long-simmering New York Times story (see December 15, 2005). The evidence against Harman includes NSA wiretaps of a conversation between her and an Israeli agent. Reporter Jeff Stein will write, “As for there being ‘no evidence’ to support the FBI probe, a source with first-hand knowledge of the wiretaps called that ‘bull****.’” Another former national security officer will confirm Harman’s presence on the wiretaps. “It’s true,” the official will say. “She was on there.” Justice Department attorneys in the intelligence and public corruption units have concluded that Harman had committed what they called a “completed crime,” meaning there was evidence to show that she had attempted to complete it; they were prepared to open a case on her that would include wiretaps approved by the Foreign Intelligence Surveillance Court (FISC). CIA Director Porter Goss certified the FISA wiretapping request, and decided to inform House Speaker Dennis Hastert (R-IL) and ranking House Democrat Nancy Pelosi (D-CA) of the impending FBI investigation. At this point, say Stein’s sources, Gonzales intervenes to stop the investigation. Two officials with knowledge of the events will say that, in Gonzales’s words, he “needed Jane” to help support the warrantless wiretapping program once it became public knowledge. Gonzales tells Goss that Harman had helped persuade the Times to refrain from publishing the story in late 2004 (see Early November 2004, December 6, 2005, and Mid-2005), and although the Times would no longer wait on the story, Harman could be counted on to help defend the program. She will do just that (see December 21, 2005 and February 8-12, 2006). Hastert and Pelosi are never told of the FBI investigation. Stein will also learn that Goss’s successor, Michael Hayden, will later be informed of the potential investigation, but choose to take no action. Likewise, Director of National Intelligence John Negroponte will oppose any such investigation. Former officials who will pursue the Israeli espionage case for years will say, in Stein’s words, that “Harman dodged a bullet… [s]he was protected by an administration desperate for help.” A recently retired national security official closely involved in the investigation will add: “It’s the deepest kind of corruption. It’s a story about the corruption of government—not legal corruption necessarily, but ethical corruption.” [Congressional Quarterly, 4/19/2009]

Entity Tags: Jeff Stein, Federal Bureau of Investigation, Dennis Hastert, Alberto R. Gonzales, Foreign Intelligence Surveillance Court, Jane Harman, Michael Hayden, Porter J. Goss, John Negroponte, House Intelligence Committee, New York Times, Nancy Pelosi

Timeline Tags: Civil Liberties

New York Times headline from article revealing NSA surveillance.New York Times headline from article revealing NSA surveillance. [Source: CBS News]The New York Times reveals that after the 9/11 attacks, President Bush granted the National Security Agency (NSA) secret authorization to eavesdrop on Americans and others inside the US without going through the Foreign Intelligence Surveillance Act (FISA) court to obtain legal warrants (see Early 2002. The administration justifies its actions by claiming such eavesdropping, which includes wiretapping phones and reading e-mails, is necessary to find evidence of terrorist activities, and says the nation needs the program after the 9/11 attacks exposed deficiencies in the US intelligence community’s information gathering process, and because of what they characterize as the “handcuffing” of US intelligence agencies by restrictive laws. The Times has had the article for over a year; the White House prevailed on the Times not to publish its findings for that time, arguing that publication would jeopardize continuing investigations and warn potential terrorists that they were under scrutiny. Many believe that the White House wanted to delay the publication of the article until well after the 2004 presidential elections. The Times delayed publication for over a year, and agreed to suppress some information that administration officials say could be useful to terrorists. (Less than two weeks before the article is published, Bush tries to convince the Times not to print the article at all: see December 6, 2005.) Two days after the Times publishes its article, Bush will acknowledge the order, and accuse the Times of jeopardizing national security (see December 17, 2005). The NSA program eavesdrops without warrants on up to 500 people in the US at any given time, officials say; the overall numbers have likely reached into the thousands. Overseas, up to 7,000 people suspected of terrorist ties are being monitored. Officials point to the discovery of a plot by Ohio trucker and naturalized US citizen and alleged al-Qaeda supporter Iyman Faris to bring down the Brooklyn Bridge with blowtorches as evidence of the program’s efficacy. They also cite the disruption of an al-Qaeda plot to detonate fertilizer bombs outside of British pubs and train stations by the program. But, officials say, most people targeted by the NSA for warrantless wiretapping have never been charged with a crime, and many are targeted because of questionable evidence and groundless suspicion. Many raise an outcry against the program, including members of Congress, civil liberties groups, immigrant rights groups, and others who insist that the program undermines fundamental Constitutional protections of US citizens’ civil liberties and rights to privacy. Several other government programs to spy on Americans have been challenged, including the Federal Bureau of Investigation (FBI)‘s surveillance of US citizens’ library and Internet usage, the monitoring of peaceful antiwar protests, and the proposed use of public and private databases to hunt for terrorist links. In 2004, the Supreme Court overturned the administration’s claim that so-called “enemy detainees” were not entitled to judicial review of their indefinite detentions. Several senior officials say that when the warrantless wiretapping program began, it operated with few controls and almost no oversight outside of the NSA itself. The agency is not required to seek the approval of the Justice Department or anyone else outside the FISA court for its surveillance operations. Some NSA officials wanted nothing to do with a program they felt was patently illegal, according to a former senior Bush administration official. Internal concerns about the program prompted the Bush administration to briefly suspend the program while Justice Department officials audited it and eventually provided some guidelines for its operations. A complaint from Judge Colleen Kollar-Kotelly, the federal judge who oversees the FISA Court, helped spur the suspension, according to officials. Kollar-Kotelly questioned whether information obtained under the program was being improperly used as the basis for FISA wiretap warrant requests from the Justice Department. Some government lawyers say that the Justice Department may have deliberately misled Kollar-Kotelly and the FISA court about the program in order to keep the program under wraps. The judge insisted to Justice Department officials that any material gathered under the program not be used in seeking wiretap warrants from her court. The question also arose in the Faris case, when senior Justice Department officials worried that evidence obtained by warrantless wiretapping by the NSA of Faris could be used in court without having to lie to the court about its origins. [New York Times, 12/15/2005]

Entity Tags: US Supreme Court, George W. Bush, US Department of Justice, Iyman Faris, National Security Agency, New York Times, Al-Qaeda, Foreign Intelligence Surveillance Court, Colleen Kollar-Kotelly

Timeline Tags: Civil Liberties

Times executive editor Bill Keller.Times executive editor Bill Keller. [Source: New York Times]The New York Times’s executive editor, Bill Keller, defends his paper’s decision to reveal the Bush administration’s warrantless wiretapping program, conducted through the NSA (see December 15, 2005), after holding the story for over a year. Keller writes: “We start with the premise that a newspaper’s job is to publish information that is a matter of public interest. Clearly a secret policy reversal that gives an American intelligence agency discretion to monitor communications within the country is a matter of public interest.… A year ago, when this information first became known to Times reporters, the administration argued strongly that writing about this eavesdropping program would give terrorists clues about the vulnerability of their communications and would deprive the government of an effective tool for the protection of the country’s security. Officials also assured senior editors of The Times that a variety of legal checks had been imposed that satisfied everyone involved that the program raised no legal questions. As we have done before in rare instances when faced with a convincing national security argument, we agreed not to publish at that time. We also continued reporting, and in the ensuing months two things happened that changed our thinking. First, we developed a fuller picture of the concerns and misgivings that had been expressed during the life of the program. It is not our place to pass judgment on the legal or civil liberties questions involved in such a program, but it became clear those questions loomed larger within the government than we had previously understood. Second, in the course of subsequent reporting we satisfied ourselves that we could write about this program—withholding a number of technical details—in a way that would not expose any intelligence-gathering methods or capabilities that are not already on the public record. The fact that the government eavesdrops on those suspected of terrorist connections is well-known. The fact that the NSA can legally monitor communications within the United States with a warrant from the Foreign Intelligence Surveillance Court is also public information. What is new is that the NSA has for the past three years had the authority to eavesdrop on Americans and others inside the United States without a warrant. It is that expansion of authority—not the need for a robust anti-terror intelligence operation—that prompted debate within the government, and that is the subject of the article.” [CNN, 12/16/2005]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, George W. Bush, Bill Keller

Timeline Tags: Civil Liberties

President Bush acknowledges that he issued a 2002 executive order authorizing the National Security Agency (NSA) to wiretap US citizens’ phones and e-mails without proper warrants, and accuses the New York Times of jeopardizing national security by publishing its December 15 article (see Early 2002 and December 15, 2005). Bush says he was within the law to issue such an order, which many feel shatters fundamental Constitutional guarantees of liberty and privacy, but accuses the Times of breaking the law by publishing the article. Bush tells listeners during his weekly radio address that the executive order is “fully consistent” with his “constitutional responsibilities and authorities.” But, he continues, “Yesterday the existence of this secret program was revealed in media reports, after being improperly provided to news organizations. As a result, our enemies have learned information they should not have, and the unauthorized disclosure of this effort damages our national security and puts our citizens at risk.” He admits allowing the NSA to “to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations” in a program designed to “detect and prevent terrorist attacks.” Under the law, the NSA must obtain warrants from the Foreign Intelligence Surveillance Act (FISA) Court, but after Bush’s executive order, it was no longer required to do so. Bush justifies the order by citing the example of two 9/11 hijackers, Khalid Almihdhar and Nawaf Alhazmi, who, he says, “communicated while they were in the United States to other members of al-Qaeda who were overseas, but we didn’t know they were here until it was too late.” Because of the unconstitutional wiretapping program, it is “more likely that killers like these 9/11 hijackers will be identified and located in time, and the activities conducted under this authorization have helped detect and prevent possible terrorist attacks in the United States and abroad.” Bush also admits to reauthorizing the program “more than thirty times,” and adds, “I intend to do so for as long as our nation faces a continuing threat from al-Qaeda and related groups.” [CNN, 12/16/2005] Bush fails to address the likelihood that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, George W. Bush, Khalid Almihdhar, Foreign Intelligence Surveillance Act, Nawaf Alhazmi, Al-Qaeda

Timeline Tags: Civil Liberties

After the NSA’s warrantless wiretapping program is revealed (see Early 2002 and December 15, 2005), some commentators criticize the program. Americans have fundamental Constitutional protections that are enforceable in court whether their conversations are domestic or international, says law scholar Geoffrey Stone. Stone says that President Bush’s emphasis that NSA wiretapping only takes place on US calls to overseas phones or overseas e-mails “is no different, as far as the law is concerned, from saying we only do it on Tuesdays.” Former FBI national security law chief Michael Woods, who served in the position when Bush signed the NSA directive, calls the program “very dangerous.” Though Woods says the program was justifiable in the immediate aftermath of 9/11, “[By now] we ought to be past the time of emergency responses. We ought to have more considered views now…. We have time to debate a legal regime and what’s appropriate.” [Washington Post, 12/18/2005] Kate Martin, director of the Center for National Security Studies, says the secret order may amount to Bush authorizing criminal activity in direct violation of FISA. “This is as shocking a revelation as we have ever seen from the Bush administration,” she says. “It is, I believe, the first time a president has authorized government agencies to violate a specific criminal prohibition and eavesdrop on Americans.” The American Civil Liberties Union’s Caroline Frederickson says of the program, “It’s clear that the administration has been very willing to sacrifice civil liberties in its effort to exercise its authority on terrorism, to the extent that it authorizes criminal activity.” [Washington Post, 12/16/2005]

Entity Tags: Center for National Security Studies, Geoffrey Stone, American Civil Liberties Union, National Security Agency, Caroline Frederickson

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales and NSA chief Lieutenant General Michael Hayden conduct their own “briefing” on the recently revealed NSA wiretapping program (see December 15, 2005) with the White House press corps. Gonzales and Hayden make the following points:
bullet Gonzales says that he will not discuss the internal workings of the still-classified program, only what he calls its “legal underpinnings.”
bullet He claims that the program, which he calls “the most classified program that exists in the United States government,” is legal because President Bush authorized it, and says that the idea that “the United States is somehow spying on American citizens” is wrong: it is “[v]ery, very important to understand that one party to the communication has to be outside the United States.”
bullet He says that for the NSA to eavesdrop on a US citizen’s telephone or e-mail communications, “we have to have a reasonable basis to conclude that one party to the communication is a member of al-Qaeda, affiliated with al-Qaeda, or a member of an organization affiliated with al-Qaeda, or working in support of al-Qaeda.” The wiretapping program is an essential part of the administration’s war against terror, he says.
bullet He goes on to claim that “the authorization to use force, which was passed by the Congress in the days following September 11th, constitutes” legal grounds for “this kind of signals intelligence.” [White House, 12/19/2005] The White House signed Congress’s Authorization to Use Military Force (AUMF) into law on September 18, 2001 (see September 14-18, 2001. [White House, 9/18/2001]
Hayden Claims Supreme Court Backing - While he admits that the Congressional authorization to use force against international terrorism does not specifically mention any kind of electronic surveillance, he refers the listeners to the Supreme Court case concerning alleged US terrorist Yaser Esam Hamdi (see June 28, 2004), in which the Court ruled that Hamdi had the legal right to challenge his detention. “[T]he United States government took the position that Congress had authorized that detention in the authorization to use force, even though the authorization to use force never mentions the word ‘detention.’ And the Supreme Court, a plurality written by Justice O’Connor agreed. She said, it was clear and unmistakable that the Congress had authorized the detention of an American citizen captured on the battlefield as an enemy combatant for the remainder—the duration of the hostilities. So even though the authorization to use force did not mention the word, ‘detention,’ she felt that detention of enemy soldiers captured on the battlefield was a fundamental incident of waging war, and therefore, had been authorized by Congress when they used the words, ‘authorize the President to use all necessary and appropriate force.’ For the same reason, we believe signals intelligence is even more a fundamental incident of war, and we believe has been authorized by the Congress. And even though signals intelligence is not mentioned in the authorization to use force, we believe that the Court would apply the same reasoning to recognize the authorization by Congress to engage in this kind of electronic surveillance.”
Bush 'Very Concerned' With Protecting Civil Liberties - Gonzales insists, Bush “is very concerned about the protection of civil liberties, and that’s why we’ve got strict parameters, strict guidelines in place out at NSA to ensure that the program is operating in a way that is consistent with the President’s directives.” He adds, “[W]e feel comfortable that this surveillance is consistent with requirements of the Fourth Amendment. The touchstone of the Fourth Amendment is reasonableness, and the Supreme Court has long held that there are exceptions to the warrant requirement in—when special needs outside the law enforcement arena. And we think that that standard has been met here.”
Wiretapping Essential in Catching Terrorists - Hayden reiterates how important the wiretapping is to catching terrorists and stopping potential attacks against US targets, though he and Gonzales both refuse to say what, if any, terrorist plots or what terror suspects might have been captured through the NSA wiretapping program. Hayden does say, “This program has been successful in detecting and preventing attacks inside the United States.…I can say unequivocally, all right, that we have got information through this program that would not otherwise have been available,” though he refuses to cite specifics. He admits that there have been some errors in surveilling innocent US citizens, though he refuses to give any details, and says those errors were quickly corrected.
Administration Not Required to Go Through FISA - Gonzales, who is the main speaker in the briefing, reiterates that while the administration continues to seek warrants from the Foreign Intelligence Surveillance (FISA) court, “we are not legally required to do, in this particular case, because the law requires that we—FISA requires that we get a court order, unless authorized by a statute, and we believe that authorization has occurred.” He justifies the administration’s refusal to use the FISA court for obtaining warrants by insisting that NSA officials “tell me that we don’t have the speed and the agility that we need, in all circumstances, to deal with this new kind of enemy. You have to remember that FISA was passed by the Congress in 1978. There have been tremendous advances in technology… since then.” Hayden adds, “I don’t think anyone could claim that FISA was envisaged as a tool to cover armed enemy combatants in preparation for attacks inside the United States. And that’s what this authorization under the President is designed to help us do.”
'Balancing' of Civil Liberties, National Security - Hayden says the warrantless wiretapping program is part of “a balancing between security and liberty,” a more “aggressive” operation “than would be traditionally available under FISA. It is also less intrusive. It deals only with international calls. It is generally for far shorter periods of time. And it is not designed to collect reams of intelligence, but to detect and warn and prevent about attacks. And, therefore, that’s where we’ve decided to draw that balance between security and liberty.”
Media Leaks Damaging to National Security - Gonzales refuses to talk about when any members of Congress were briefed on the program or what they were told, but he does imply that there will be some sort of leak investigation as to how the New York Times found out about the program: “[T]his is really hurting national security, this has really hurt our country, and we are concerned that a very valuable tool has been compromised. As to whether or not there will be a leak investigation, we’ll just have to wait and see.”
No Evidence of Compromised National Security - When asked whether he can cite any evidence that the revelation of the program’s existence has actually compromised anything—“Don’t you assume that the other side thinks we’re listening to them? I mean, come on,” one reporter says—Gonzales responds, rather confusingly, “I think the existence of this program, the confirmation of the—I mean, the fact that this program exists, in my judgment, has compromised national security, as the President indicated on Saturday.”
Easier to Sidestep FISA Instead of Seek Congressional Approval - He does admit that the administration decided to sidestep the FISA court entirely instead of attempt to work with Congress to rewrite the FISA statutes because “we were advised that that would be difficult, if not impossible” to amend the law to the White House’s satisfaction. Gonzales says those who are concerned about the program being excessively intrusive or a threat to American civil liberties simply “don’t understand the specifics of the program, they don’t understand the strict safeguards within the program.… Part of the reason for this press brief today is to have you help us educate the American people and the American Congress about what we’re doing and the legal basis for what we’re doing.” He adds that any legal experts who believe the program is illegal are basing their judgments “on very limited information.”
Tough Questioning - One reporter asks an unusually tough series of questions to Gonzales: “Do you think the government has the right to break the law?”, to which Gonzales replies, “Absolutely not. I don’t believe anyone is above the law.” The reporter then says, “You have stretched this resolution for war into giving you carte blanche to do anything you want to do,” to which Gonzales replies cryptically, “Well, one might make that same argument in connection with detention of American citizens, which is far more intrusive than listening into a conversation.” The reporter insists, “You’re never supposed to spy on Americans,” and Gonzales deflects the responsibility for the decision back onto the Supreme Court.
Administration Will Tell Nation What It Needs to Know - Gonzales says the administration has no intention of releasing any of the classified legal opinions underpinning the program, and this press briefing is one of the methods by which the administration will “educat[e] the American people…and the Congress” to give them what they need to know about the program. [White House, 12/19/2005]

Entity Tags: White House press corps, Michael Hayden, Al-Qaeda, National Security Agency, Alberto R. Gonzales, George W. Bush, Foreign Intelligence Surveillance Court

Timeline Tags: Civil Liberties

DARPA logo.DARPA logo. [Source: Duke University]The computer and technology experts at Ars Technica, a well-regarded Web publication which describes itself as focusing on “the art of technology,” speculate on the technology behind the NSA warrantless wiretapping program recently revealed to the public (see December 15, 2005). The Ars Technica experts believe that Senator Jay Rockefeller (D-WV)‘s 2003 comparison between the program and the Total Information Awareness (TIA) project (see March 2002) is the most apt. They believe that the NSA wiretapping program may be built upon the foundation of a shadowy, highly classified surveillance program called Echelon. They write, “This system’s purpose would be to monitor communications and detect would-be terrorists and plots before they happen… This project is not interested in funding ‘evolutionary’ changes in technology, e.g., bit-step improvements to current data mining and storage techniques. Rather, the amount of data that the directors are anticipating (petabytes!) would require massive leaps in technology (and perhaps also some massive leaps in surveillance laws).” [Ars Technica, 12/20/2005; Ars Technica, 2007] Data storage measured in petabytes is a colossal capacity; a petabyte is 1,024 terabytes, and a single terabyte is 1,024 gigabytes, the usual measurement for hard drive capacity. [TechTerms, 2007] The Ars Technica experts continue, “According to DARPA, such data collection ‘increases information coverage by an order of magnitude,’ and ultimately ‘requires keeping track of individuals and understanding how they fit into models.’” They go on to note that the NSA wiretapping program was instituted shortly after the TIA project was quashed by Congress, and say they believe the NSA program is an extension and an outgrowth of TIA. They note that “the FBI requested the legal authorization to do very high-volume monitoring of digital calls” in 1995, that there is “no way for the judicial system to approve warrants for the number of calls that the FBI wanted to monitor,” and that the FBI “could never hire enough humans to be able to monitor that many calls simultaneously, which means that they’d have to use voice recognition technology to look for ‘hits’ that they could then follow up on with human wiretaps.” The Ars Technica experts believe the NSA is using “some kind of high-volume, automated voice recognition and pattern matching system,” employing a form of “smart filtering” that would weed through perhaps hundreds of thousands of computer-monitored calls and turning a fraction of those calls over to human analysts for evaluation: “[Y]es, this kind of real-time voice recognition, crude semantic parsing and pattern matching is doable with today’s technology, especially when you have a budget like the NSA.” In a follow-up, Ars Technica technology specialist and self-described conservative and “privacy nazi” Jon Stokes writes of his own concerns over the program, noting that the program is too wide-reaching and too blunt to actually catch many real terrorists, and that the program is a tremendous intrusion into Americans’ fundamental privacy: “The problem is not that such large-scale industrial fishing invariably catches a few dolphins along with the tuna, but that between 99.999 and 100 percent of what you’re going to get is dolphin.” Stokes also warns that such an intrusive surveillance program will not only violate privacy rights, but be quite ineffective: “As the TSA, with its strip-searching of people’s elderly grandparents, abundantly proves every holiday season, blunt instruments and scorched earth tactics are of dubious value in catching genuine bad actors. In fact, blunt instruments and wide nets are the easiest for professional bad guys to evade. All you need to beat such surveillance tools is patience and know-how.…Blunt instruments like airport facial recognition software and random subway bag searches produce much more noise than they do signal, and any engineer or computer scientist worth his or her salt will tell you that an intelligent, targeted, low-tech approach beats a brute-force high-tech approach every time. There is no high-tech substitute for human intelligence gathering. In fact…an overload of crudely processed information is actually more likely to lead an analyst astray than it is to produce any useful insight.…In the end, brute force security techniques are not only corrosive to democratic values but they’re also bad for national security. They waste massive resources that could be spent more effectively elsewhere, and they give governments and countries a false sense of security that a savvy enemy can exploit to devastating effect.…[I]t’s not just enough to have sound intelligence; you also need political leaders who have the wisdom to use that intelligence appropriately.” [Ars Technica, 12/20/2005]

Entity Tags: Transportation Safety Administration, Total Information Awareness, Federal Bureau of Investigation, John D. Rockefeller, Defense Advanced Research Projects Agency, Jon Stokes, National Security Agency

Timeline Tags: Civil Liberties

Jonathan Alter.Jonathan Alter. [Source: Publicity photo via Greater Talent Network]Reporter and political pundit Jonathan Alter writes that President Bush’s attempt to kill the New York Times domestic wiretapping story (see December 15, 2005 and December 6, 2005), which the Times delayed for over a year at the White House’s request, is not an attempt to protect national security, as Bush will say in his response to the article (see December 17, 2005), but “because he knew that it would reveal him as a law-breaker.” Alter continues, “He insists he had ‘legal authority derived from the Constitution and Congressional resolution authorizing force.’ But the Constitution explicitly requires the president to obey the law. And the post-9/11 congressional resolution authorizing ‘all necessary force’ in fighting terrorism was made in clear reference to military intervention. It did not scrap the Constitution and allow the president to do whatever he pleased in any area in the name of fighting terrorism.” Alter is puzzled that Bush felt the need for the program when the 1978 Foreign Intelligence Surveillance Act (see 1978) “allows the government to eavesdrop on its own, then retroactively justify it to the court, essentially obtaining a warrant after the fact.” Alter says that only four of “tens of thousands” of FISA requests have ever been rejected, and, “There was no indication the existing system was slow—as the president seemed to claim in his press conference—or in any way required extra-constitutional action.” He concludes: “[Bush] knew publication would cause him great embarrassment and trouble for the rest of his presidency. It was for that reason—and less out of genuine concern about national security—that George W. Bush tried so hard to kill the New York Times story. …We’re seeing clearly now that Bush thought 9/11 gave him license to act like a dictator, or in his own mind, no doubt, like Abraham Lincoln during the Civil War.” [Newsweek, 12/21/2005]

Entity Tags: Abraham Lincoln, Bush administration (43), National Security Agency, New York Times, George W. Bush, Foreign Intelligence Surveillance Court, Foreign Intelligence Surveillance Act, Jonathan Alter

Timeline Tags: Civil Liberties

Chart showing NSA surveillance network.Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” [New York Times, 12/24/2005]

Entity Tags: US Department of Defense, US Department of Justice, Total Information Awareness, New York Times, US Department of Homeland Security, Computer Assisted Passenger Prescreening System, Bush administration (43), Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, George W. Bush, National Security Agency, Phil Karn

Timeline Tags: Civil Liberties

The second part of the Senate Intelligence Committee’s investigation into the mismanagement of intelligence before the Iraq invasion (see July 9, 2004) is being held up by the Pentagon’s internal investigation of former Defense Department official Douglas Feith, one of the department’s primary architects of the war plans (see Late December 2000 and Early January 2001, Shortly After September 11, 2001, September 20, 2001, Fall 2002, and May 9, 2005). The committee is waiting on a report from the Pentagon inspector general on Feith’s alleged role in manipulating pre-war intelligence to support a case for war. Feith is also being investigated by the FBI for his role in an Israeli spy case. One aspect of the committee’s investigation is likely to focus on the efforts by Defense Secretary Donald Rumsfeld to procure top-level security clearances for Feith after he was fired from the National Security Council in 1982 over allegations of espionage (see March 1982). Feith is one of a large number of pro-war conservatives to shuttle in and out of the Pentagon despite being involved in intelligence-related scandals (see Late 1969, October 1970, 1978, April 1979, March 1981, 1983, April 13, 1999-2004, 2001, and October 5, 2005), many of whom were provided security clearances by Rumsfeld. The committee’s report is being delayed because both Feith and the Defense Department refuse to provide documents and witnesses to the committee. The committee is investigating whether Feith and other current and former Defense Department officials broke the 1947 National Security Act by refusing to keep the committee “fully and currently informed of all intelligence activities” and refusing to “furnish the Congressional intelligence committees any information or material concerning intelligence activities, other than covert actions, which is within their custody or control, and which is requested by either of the Congressional intelligence committees in order to carry out its authorized responsibilities.” Senate sources say committee chairman Pat Roberts (R-KS) is not pressuring the Pentagon to cooperate, but instead is deferring to the Pentagon’s Inspector General, in essence allowing the Pentagon to investigate itself. [Raw Story, 1/30/2006] The report will be issued in June 2008, with few of the above issues addressed (see June 5, 2008).

Entity Tags: National Security Council, US Department of Defense, Office of the Inspector General (DoD), Pat Roberts, Senate Intelligence Committee, Douglas Feith, Donald Rumsfeld

Timeline Tags: Events Leading to Iraq Invasion

Vice President Cheney mentioned NSA intercepts of the 9/11 hijackers’ calls in a speech to the Heritage Foundation.Vice President Cheney mentioned NSA intercepts of the 9/11 hijackers’ calls in a speech to the Heritage Foundation. [Source: David Bohrer / White House]Vice President Dick Cheney uses calls between the 9/11 hijackers in the US and an al-Qaeda communications hub in Yemen that were intercepted by the NSA (see Early 2000-Summer 2001) to justify the NSA’s warrantless wiretapping program (see December 15, 2005). Cheney points out that, “There are no communications more important to the safety of the United States than those related to al-Qaeda that have one end in the United States,” and says that if the NSA’s warrantless program had been implemented before 9/11, “we might have been able to pick up on two hijackers [Nawaf Alhazmi and Khalid Almihdhar] who subsequently flew a jet into the Pentagon.” He adds: “They were in the United States, communicating with al-Qaeda associates overseas. But we did not know they were here plotting until it was too late.” [White House, 1/4/2006] Other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the program is revealed by the New York Times (see December 17, 2005).

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi, Richard (“Dick”) Cheney

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

The Internet news site Raw Story learns that Iranian exile and arms dealer Manucher Ghorbanifar (see December 9, 2001) attempted to peddle a fabricated story of stolen uranium to US and other Western governments in the spring and summer of 2003 (see March 7, 2003 and After). The story comes from US and foreign intelligence sources, and is confirmed by former CIA station chief Bill Murray. Ghorbanifar’s story, of an Iranian intelligence team infiltrating Iraq just before the March 2003 invasion and stealing enriched uranium to use in Iran’s nuclear weapons program, was apparently designed to earn him money as well as to embroil both Iran and Iraq in a spurious WMD plot. It is possible that a June 2003 meeting between Ghorbanifar and two US officials was part of his attempt to peddle the story (see June 2003). Ghorbanifar was extensively involved in the Iran-Contra scandal as a middleman between Iranian government officials and members of the Reagan administration (see July 18, 1985, July 25, 1985, December 8, 1985, and December 1986). [Raw Story, 1/11/2006]

Entity Tags: Raw Story, Bill Murray, Manucher Ghorbanifar

Timeline Tags: US confrontation with Iran

Al Gore speaks to the Liberty Coalition and the American Constitution Society.Al Gore speaks to the Liberty Coalition and the American Constitution Society. [Source: American Constitution Society]Former Vice President Al Gore delivers a long, impassioned speech on civil liberties and constitutional issues to the Liberty Coalition and the American Constitution Society. Gore joins former Representative Bob Barr (R-GA) in speaking out against the Bush administration’s infringement on American civil liberties. Gore and Barr have what Gore calls a “shared concern that America’s Constitution is in grave danger.”
Patently Illegal Domestic Surveillance - Gore’s speech is sparked by recent revelations that the NSA has been spying on American citizens for years (see December 15, 2005), and in response, the administration “has brazenly declared that it has the unilateral right to continue without regard to the established law enacted by Congress precisely to prevent such abuses.” As the Foreign Intelligence and Surveillance Act (FISA) is perfectly sufficient, there was no need for the Bush administration to circumvent that law. “At present, we still have much to learn about the NSA’s domestic surveillance,” Gore says. “What we do know about this pervasive wiretapping virtually compels the conclusion that the president of the United States has been breaking the law, repeatedly and insistently. A president who breaks the law is a threat to the very structure of our government.” Gore says he agrees with Bush on the threat of terrorism, but disagrees that the US has to “break the law or sacrifice our system of government” to protect itself, as this will make it “weaker and more vulnerable.” In addition, he says, “once violated, the rule of law is itself in danger,” and, “Unless stopped, lawlessness grows, the greater the power of the executive grows, the more difficult it becomes for the other branches to perform their constitutional roles.” It is patently obvious that the Bush administration has broken the law in conducting and approving its warrantless wiretaps, Gore says, regardless of what arguments and defenses administration officials may put forth (see September 12-18, 2001 and Early 2002). So, Gore says, “When President Bush failed to convince Congress to give him the power he wanted when this measure was passed, he secretly assumed that power anyway, as if Congressional authorization was a useless bother. But as [Supreme Court] Justice [Felix] Frankfurter once wrote, ‘To find authority so explicitly withheld is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between the president and the Congress.‘… And the disrespect embodied in these apparent mass violations of the law is part of a larger pattern of seeming indifference to the Constitution that is deeply troubling to millions of Americans in both political parties.”
Illegal Seizure of American Citizens - Gore notes that Bush has declared that he has “a heretofore unrecognized inherent power to seize and imprison any American citizen that he alone determines to be a threat to our nation, and that notwithstanding his American citizenship that person in prison has no right to talk with a lawyer, even if he wants to argue that the president or his appointees have made a mistake and imprisoned the wrong person” (see November 13, 2001 and March 5, 2002). He says: “The president claims that he can imprison that American citizen—any American citizen he chooses—indefinitely, for the rest of his life, without even an arrest warrant, without notifying them of what charges have been filed against them, without even informing their families that they have been imprisoned.” Gore then says: “No such right exists in the America that you and I know and love. It is foreign to our Constitution. It must be rejected.”
Specious Authority to Torture - Neither does the executive branch have the right to authorize torture, Gore says. After citing horrific examples from Guantanamo and Abu Ghraib, he calls it “a shameful exercise of power that overturns a set of principles that you’re nation has observed since General George Washington first enunciated them during our Revolutionary War. They have been observed by every president since then until now. They violate the Geneva Conventions, the International Convention Against Torture, and our own laws against torture.”
Unlawful Kidnapping of Foreign Citizens - The president has no right to have foreign citizens kidnapped from their homes and brought to the US for interrogation and imprisonment, or worse, delivered to other nations for harsh interrogations and torture, says Gore. The closest allies of the US have been shocked by such claims.
No Restraint in the Constitution? - Gore asks whether the president really has such powers under the Constitution and, if so, “are there any acts that can on their face be prohibited?” He quotes the dean of Yale’s law school, Harold Koh, who said, “If the president has commander in chief power to commit torture, he has the power to commit genocide, to sanction slavery, to promote apartheid, to license summary execution.” Gore is “deeply troubl[ed]” that “our normal American safeguards have thus far failed to contain this unprecedented expansion of executive power.” He cites the numerous usage of “signing statements” by Bush that signal his intent “not to comply” with particular legislation (see December 30, 2005). When the Supreme Court struck down Bush’s indefinite detention of “enemy combatants” (see June 28, 2004), “the president then engaged in legal maneuvers designed to prevent the court from providing any meaningful content to the rights of the citizens affected.”
Historical Cycles - Since the founding of America, Gore says, the country has abrogated its citizens’ rights in one circumstance or another, and cites numerous examples. But those abrogations were always rectified to some degree in a repeated cycle of what he calls “excess and regret.” Gore is worried that the country may not be in such a cycle now. Instead, he says, the US may be on a path to permanent, state-sanctioned authoritarianism, with the constitutional safeguards American citizens have come to expect eroded and undermined to the point of irretrievability. Gore specifically cites the administration’s support for the so-called “unitary executive” theory of government, which he says “ought to be more accurately described as the unilateral executive.” That theory “threatens to expand the president’s powers until the contours of the Constitution that the framers actually gave us become obliterated beyond all recognition.”
Stark Authoritarianism - Why are Bush and his top officials doing this? Gore says that “[t]he common denominator seems to be based on an instinct to intimidate and control. The same pattern has characterized the effort to silence dissenting views within the executive branch, to censor information that may be inconsistent with its stated ideological goals, and to demand conformity from all executive branch employees.” Gore continues: “Intellectually, it is possible to carry on this process for an indefinite time. The only check on it is that, sooner or later, a false belief bumps up against solid reality, usually on a battlefield. Two thousand two hundred American soldiers have lost their lives as this false belief bumped into a solid reality.”
Gutting Congress - Though serious damage has been done to the judicial branch, Gore acknowledges, “the most serious damage in our constitutional framework has been to the legislative branch. The sharp decline of Congressional power and autonomy in recent years has been almost as shocking as the efforts by the executive to attain this massive expansion of its power.… [T]he legislative branch of government as a whole, under its current leadership, now operates as if it were entirely subservient to the executive branch.… [T]he whole process is largely controlled by the incumbent president and his political organization” (see February 1, 2004). Gore says each member of Congress, Republican and Democrat, must “uphold your oath of office and defend the Constitution. Stop going along to get along. Start acting like the independent and co-equal branch of American government that you are supposed to be under the Constitution of our country.”
We the People - The American people still, for the moment, have the power to enforce the Constitution, Gore says, quoting former President Dwight Eisenhower, who said, “Any who act as if freedom’s defenses are to be found in suppression and suspicion and fear confess a doctrine that is alien to America.” Gore continues: “Fear drives out reason. Fear suppresses the politics of discourse and opens the door to the politics of destruction.… The founders of our country faced dire threats. If they failed in their endeavors, they would have been hung as traitors. The very existence of our country was at risk. Yet in the teeth of those dangers, they insisted on establishing the full Bill of Rights. Is our Congress today in more danger than were their predecessors when the British army was marching on the Capitol? Is the world more dangerous than when we faced an ideological enemy with tens of thousands of nuclear missiles ready to be launched on a moment’s notice to completely annihilate the country?” [Congressional Quarterly, 1/16/2006; American Constitutional Society, 1/16/2006]

Entity Tags: National Security Agency, Liberty Coalition, US Supreme Court, Harold Koh, George W. Bush, Albert Arnold (“Al”) Gore, Jr., American Constitution Society, Bush administration (43), Convention Against Torture, Felix Frankfurter, George Washington, Geneva Conventions, Foreign Intelligence Surveillance Act, Robert “Bob” Barr

Timeline Tags: Civil Liberties

The Justice Department (DOJ) issues a 42-page “white paper” detailing its arguments that the National Security Agency’s warrantless wiretapping program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006) is legal. The DOJ reiterates two previous arguments (see December 19, 2005 and December 21-22, 2005)—that Congress implicitly authorized the program in 2001 when it authorized the Bush administration to begin military actions against al-Qaeda (see September 14-18, 2001), and that the president has the authority as commander in chief to conduct such a program—even though these arguments have been thoroughly refuted (see January 9, 2006) and overridden by the Supreme Court’s recent Hamdan v. Rumsfeld ruling (see December 15, 2005 and July 8, 2006). In its paper, the DOJ declares that if necessary, it will attack the legality of the Foreign Intelligence Surveillance Act (FISA) in order to stop that law from “imped[ing]” the president’s power to order domestic surveillance. In essence, according to columnist and civil liberties lawyer Glenn Greenwald, the DOJ is asserting that the president’s powers are limitless as long as he or she declares a given action necessary to battle terrorism. “Because the president has determined that the NSA activities are necessary to the defense of the United States from a subsequent terrorist attack in the armed conflict with al-Qaeda, FISA would impermissibly interfere with the president’s most solemn constitutional obligation—to defend the United States against foreign attack,” the DOJ claims. Neither Congress nor the court system has the right to limit or even review the president’s powers, according to the DOJ. Greenwald calls the DOJ’s argument “a naked theory of limitless presidential power.” In fact, Greenwald argues, the DOJ is asserting that FISA itself is unconstitutional, because no law can in any way limit the president’s power to conduct foreign policy or protect the nation’s security. The document is part of a larger Bush administration defense of the USA Patriot Act, and part of the administration’s push to convince Congress to reauthorize that legislation. Attorney General Alberto Gonzales sends the document to Congress. Justice Department official Steven Bradbury says, “When it comes to responding to external threats to the country… the government would like to have a single executive who could act nimbly and agilely.” [US Department of Justice, 1/19/2006 pdf file; Glenn Greenwald, 1/20/2006; Washington Post, 1/20/2006]
Dubious Legality - The program has already been found to be of questionable legality by two reports recently released by the nonpartisan Congressional Research Service (see January 5, 2006 and January 18, 2006). And author James Bamford, a US intelligence expert who has written extensively about the NSA, says that the Justice Department’s arguments are specious in light of Congress’s clear intent in its 1978 passage of FISA to block warrantless wiretapping, and its demonstrated lack of intent to allow any such operations within US borders in the October 2001 legislation. “You could review the entire legislative history in the authorization to use military force and I guarantee you won’t find one word about electronic surveillance,” he says. “If you review the legislative history of FISA, you will find Attorney General Griffin Bell testifying before the intelligence committee saying this was specifically passed to prevent a president from claiming inherent presidential powers to do this again.” [Washington Post, 1/20/2006]
Self-Contradictory Justifications - In 2007, author and reporter Charlie Savage will write of the “shaky foundation” supporting the administration’s “two-pronged attacks on critics of the wiretapping program and the Patriot Act,” which some officials have claimed authorizes the program. “Beneath the simplistic rhetoric, the administration’s position was self-contradicting,” Savage will write. If Bush has the inherent presidential authority to order warrantless wiretapping, then he needs no authorization from the Patriot Act or any other legislation. But if Congress is endangering the nation by delaying in reauthorizing the Patriot Act and thusly not rendering the program legal, then the wiretapping program is illegal after all. The memo attempts to “paper… over” this problem by claiming that, while Bush has the inherent authority to do whatever he feels is necessary to protect the country, the Patriot Act’s extra police powers are still necessary in “contexts unrelated to terrorism.” Savage will write, “In other words, the administration’s own position, hidden in the fine print, was that the Patriot Act was superfluous and irrelevant to the war on terrorism—a somewhat absurd stance made necessary by their desire to say the wiretapping program was legal.” [Savage, 2007, pp. 315]
Failure to Address Probable Beginning of Program Before Attacks - The Justice Department says nothing about the program apparently beginning well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, James Bamford, Steven Bradbury, US Department of Justice, Griffin Bell, Senate Judiciary Committee, Glenn Greenwald, Foreign Intelligence Surveillance Act, Alberto R. Gonzales, Arlen Specter, George W. Bush, Congressional Research Service, Charlie Savage

Timeline Tags: Civil Liberties

President Bush’s top political adviser, deputy White House chief of staff Karl Rove, tells a meeting of the Republican National Committee that the warrantless wiretapping controversy (see December 15, 2005 and December 18, 2005) can be used to boost Republicans’ election chances in the 2006 midterm elections. Republicans should emphasize that the wiretapping proves that Bush is willing to do whatever it takes to defeat terrorism and keep Americans safe. Critics of the program, therefore, can be painted as weak on terrorism. “The United States faces a ruthless enemy, and we need a commander in chief and a Congress who understand the nature of the threat and the gravity of the moment America finds itself in,” Rove says. “President Bush and the Republican Party do; unfortunately, the same cannot be said of many Democrats.… Let me be clear as I can be: President Bush believes if al-Qaeda is calling somebody in America, it is in our national security interests to know who they’re calling and why. Some important Democrats clearly disagree.” [WIS-TV, 1/20/2006; Savage, 2007, pp. 203]

Entity Tags: George W. Bush, Democratic Party, Republican Party, Republican National Committee, Karl C. Rove

Timeline Tags: Civil Liberties

Deputy Director of National Intelligence and former NSA Director Michael Hayden says that if the NSA’s recently revealed warrantless wiretapping program (see December 15, 2005) had been in place before 9/11, “it is my professional judgment that we would have detected some of the 9/11 al-Qaeda operatives in the United States, and we would have identified them as such.” Hayden will later say the NSA would have detected calls between an al-Qaeda communications hub in Yemen and 9/11 hijackers Nawaf Alhazmi and Khalid Almihdhar in San Diego (see May 18, 2006). Hayden adds: “You know, the 9/11 Commission criticized our ability to link things happening in the United States with things that were happening elsewhere. In that light, there are no communications more important to the safety of this country than those affiliated with al-Qaeda with one end in the United States.” Before the attacks, the NSA intercepted a series of calls between two of the 9/11 hijackers and a known al-Qaeda communications hub in Yemen (see Early 2000-Summer 2001), but failed to notify the FBI about them (see (Spring 2000)). [Press Club, 1/23/2006] Other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the NSA’s warrantless program is revealed by the New York Times (see December 17, 2005).

Entity Tags: Nawaf Alhazmi, Khalid Almihdhar, Michael Hayden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

President Bush at the National Security Agency.President Bush at the National Security Agency. [Source: Eric Draper / White House]President George Bush uses calls between the 9/11 hijackers in the US and an al-Qaeda communications hub in Yemen that were intercepted by the NSA (see Early 2000-Summer 2001) to justify the NSA’s warrantless wiretapping program (see December 15, 2005). Bush says: “We know that two of the hijackers who struck the Pentagon [Nawaf Alhazmi and Khalid Almihdhar] were inside the United States communicating with al-Qaeda operatives overseas. But we didn’t realize they were here plotting the attack until it was too late.” Bush also quotes former NSA Director Michael Hayden, who previously said, “Had this program been in effect prior to 9/11… we would have detected some of the 9/11 al-Qaeda operatives in the United States, and we would have identified them as such” (see January 23, 2006). Bush and other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the program is revealed by the New York Times (see December 17, 2005). [White House, 1/25/2006] Bush made similar remarks at Kansas State University two days previously. [White House, 1/23/2006]

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi, George W. Bush

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

In his State of the Union address, President Bush insists that his authority to wiretap Americans’ phones without warrants (see December 15, 2005 and December 18, 2005) is validated by previous administrations’ actions, saying that “previous presidents have used the same constitutional authority I have.” He fails to note that those presidents authorized warrantless wiretaps before court orders were required for such actions (see June 19, 1972 and 1973). Since the Foreign Intelligence Surveillance Act passed (see 1978), no president except Bush has ever defied the law. Law professor David Cole calls Bush’s assertion of authority “either intentionally misleading or downright false.” Fellow law professor Richard Epstein predicts that the Supreme Court will strike down any such assertions, if it ever addresses the issue. “I find every bit of this legal argument disingenuous,” he says. Even many conservatives refuse to support Bush, with columnist George Will calling his arguments “risible” and a “monarchical doctrine” that is “refuted by the plain text of the Constitution.” David Keene, the chairman of the American Conservative Union, says the legal powers claimed by Bush and his officials can be used to justify anything: “Their argument is extremely dangerous.… The American system was set up on the assumption that you can’t rely on the good will of people with power.” Conservative activist Grover Norquist says flatly, “There is no excuse for violating the rule of law.” And former Justice Department official Bruce Fein says Bush and his officials have “a view that would cause the Founding Fathers to weep. The real conservatives are the ones who treasure the original understanding of the Constitution, and clearly this is inconsistent with the separation of powers.” Even former George H. W. Bush official Brent Scowcroft says that Bush’s interpretation of the Constitution is “fundamentally in error.” [Savage, 2007, pp. 203-204]

Entity Tags: David D. Cole, Brent Scowcroft, American Conservative Union, Bruce Fein, Richard Epstein, Grover Norquist, Foreign Intelligence Surveillance Act, David Keene, George Will, George W. Bush

Timeline Tags: Civil Liberties

In an interview with PBS’s Gwen Ifill, Representative Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee, says she supports the administration’s warrantless wiretapping program (see Spring 2001), a position that places her at odds with most Congressional Democrats. “Well, I said then and I say now that I support the program,” she tells Ifill. Harman is critical of the insider leaks that led to the public divulgance of the program (see December 15, 2005), saying, “Well, I think the leaks have done a lot of damage, and I deplore the leaks of this critical program.” She goes on to complain that the administration “says it adequately oversees this program,” but “the system of checks and balances that we have… requires that Congress as an independent branch of government pass the laws, fund the programs, and oversee how all that works.” In addition to requesting greater cooperation on oversight with Congress, she adds that “the courts need to be cut back in,” and thinks the “entire program” should be brought under the Foreign Intelligence Surveillance Act. [PBS, 2/8/2006] Four days later, Harman reiterates her position on NBC’s Meet the Press. She tells moderator Tim Russert, “If the press was part of the process of delivering classified information, there have to be some limits on press immunity.” Russert asks, “But if [the NSA leak] came from a whistleblower, should the New York Times reporter be prosecuted?” Harman answers: “Well, it’s not clear it was a whistleblower. You have to prove that first. If it’s protected by the whistleblower statute, then it’s protected.… By the way, I deplore that leak. This is a very valuable foreign [intelligence] collection program. I think it is tragic that a lot of our capabilities are now [spread] across the pages of the newspapers.” [MSNBC, 2/12/2006; NewsMax, 2/12/2006]

Entity Tags: Jane Harman, Gwen Ifill, New York Times, House Intelligence Committee, Foreign Intelligence Surveillance Act, Tim Russert

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), has contacted Los Angeles Times reporter Joseph Menn about publishing an article expising AT&T’s collusion with the National Security Agency (NSA) to illegally conduct surveillance against American citizens (see January 23, 2006 and After). Klein believed Menn was enthusiastic about exposing AT&T and the NSA in his newspaper. Instead, Klein is shocked to hear from Menn that the Times’s “top guy” is preparing to meet with Director of National Intelligence John Negroponte to discuss any such publication. “I nearly fell down in shock,” Klein will later write. “[T]hey were actually negotiating with the government on whether to publish!” Menn describes himself to Klein as “demoralized,” and says the chances of getting the story published are “grim.” In his seven years at the Times, Menn tells Klein, he has never seen a story “spiked” for “nefarious reasons,” implying that the reason behind the story’s non-publication are “nefarious.” Klein is also dismayed that the Times has now revealed his existence as a whistleblower to Negroponte, and by extension to the US intelligence apparatus. Two days ago, Klein began emailing a New York Times reporter, James Risen, the co-author of a 2005 expose about the NSA’s surveillance program (see December 15, 2005). After hearing from Menn, Klein emails Risen to inform him of the Los Angeles Times’s decision to “consult” with Negroponte, and also of the lack of interest he has received from Senator Dianne Feinstein’s office (see February 1-6, 2006). Risen calls in fellow reporter Eric Lichtblau, his co-author on the 2005 story, and the two begin working on their own story. Klein remains worried about his personal and professional safety, since, as he will write, “[t]he government was on to me, but I did not yet have a published article and the protection that comes with publicity. I had visions, perhaps paranoid in hindsight, of being disappeared in the night, like [nuclear industry whistleblower] Karen Silkwood.” The Los Angeles Times story will drag on until March 29, when Menn will inform Klein that it is officially dead, blocked by Times editor Dean Baquet. Klein will later learn that Baquet had not only been in contact with Negroponte, but with NSA Director Michael Hayden. In 2007, Baquet will tell ABC News reporters that “government pressure played no part in my decision not to run with the story,” and will say that he and managing editor Doug Frantz decided “we did not have a story, that we could not figure out what was going on” with Klein’s documentation (see March 26, 2007). Klein will call Baquet’s explanation an “absurd and flimsy excuse,” and will say it is obvious that the Los Angeles Times “capitulated to government pressure.” [PBS Frontline, 5/15/2007; Klein, 2009, pp. 59-62]

Entity Tags: James Risen, Dean Baquet, AT&T, Dianne Feinstein, Eric Lichtblau, Joseph Menn, Michael Hayden, John Negroponte, Douglas Frantz, National Security Agency, Los Angeles Times, Mark Klein

Timeline Tags: Civil Liberties

The Al Haramain Islamic Foundation, a now-defunct Saudi Arabian charitable organization that once operated in Oregon, sues the Bush administration [Associated Press, 2/28/2006] over what it calls illegal surveillance of its telephone and e-mail communications by the National Security Agency, the so-called Terrorist Surveillance Program. The lawsuit may provide the first direct evidence of US residents and citizens being spied upon by the Bush administration’s secret eavesdropping program, according to the lawsuit (see December 15, 2005). According to a source familiar with the case, the NSA monitored telephone conversations between Al Haramain’s director, then in Saudi Arabia, and two US citizens working as lawyers for the organization and operating out of Washington, DC. The lawsuit alleges that the NSA violated the Foreign Intelligence Surveillance Act (see 1978), the US citizens’ Fourth Amendment rights, and the attorney-client privilege. FISA experts say that while they are unfamiliar with the specifics of this lawsuit, they question whether a FISA judge would have allowed surveillance of conversations between US lawyers and their client under the circumstances described in the lawsuit. Other lawsuits have been filed against the Bush administration over suspicions of illegal government wiretapping, but this is the first lawsuit to present classified government documents as evidence to support its contentions. The lawsuit alleges that the NSA illegally intercepted communications between Al Haramain officer Suliman al-Buthe in Saudi Arabia, and its lawyers Wendell Belew and Asim Ghafoor in Washington. One of its most effective pieces of evidence is a document accidentally turned over to the group by the Treasury Department, dated May 24, 2004, that shows the NSA did indeed monitor conversations between Al Haramain officials and lawyers. When Al Haramain officials received the document in late May, 2004, they gave a copy to the Washington Post, whose editors and lawyers decided, under threat of government prosecution, to return the document to the government rather than report on it (see Late May, 2004). [Washington Post, 3/2/2006; Washington Post, 3/3/2006] Lawyer Thomas Nelson, who represents Al Haramain and Belew, later recalls he didn’t realize what the organization had until he read the New York Times’s December 2005 story of the NSA’s secret wiretapping program (see December 15, 2005). “I got up in the morning and read the story, and I thought, ‘My god, we had a log of a wiretap and it may or may not have been the NSA and on further reflection it was NSA,’” Nelson will recall. “So we decided to file a lawsuit.” Nelson and other lawyers were able to retrieve one of the remaining copies of the document, most likely from Saudi Arabia, and turned it over to the court as part of their lawsuit. [Wired News, 3/5/2007]
Al Haramain Designated a Terrorist Organization - In February 2004, the Treasury Department froze the organization’s US financial assets pending an investigation, and in September 2004, designated it a terrorist organization, citing ties to al-Qaeda and alleging financial ties between Al Haramain and the 1998 bombings of two US embassies in Africa (see 10:35-10:39 a.m., August 7, 1998). The organization was disbanded by the Saudi Arabian government in June 2004 and folded into an “umbrella” private Saudi charitable organization, the Saudi National Commission for Relief and Charity Work Abroad (see March 2002-September 2004). In February 2005, the organization was indicted for conspiring to funnel money to Islamist fighters in Chechnya. The charges were later dropped. [US Treasury Department, 9/9/2004; Washington Post, 3/2/2006] The United Nations has banned the organization, saying it has ties to the Taliban. [United Nations, 7/27/2007]
Challenging Designation - In its lawsuit, Al Haramain is also demanding that its designation as a terrorist organization be reversed. It says it can prove that its financial support for Chechen Muslims was entirely humanitarian, with no connections to terrorism or violence, and that the Treasury Department has never provided any evidence for its claims that Al Haramain is linked to al-Qaeda or has funded terrorist activities. [Associated Press, 8/6/2007] The lawsuit also asks for $1 million in damages, and the unfreezing of Al Haramain’s US assets. [Associated Press, 8/5/2007]
Administration Seeks to Have Lawsuit Dismissed - The Bush administration will seek to have the lawsuit thrown out on grounds of national security and executive privilege (see Late 2006-July 2007, Mid-2007).

Entity Tags: Wendell Belew, Suliman al-Buthe, Taliban, Washington Post, United Nations, Saudi National Commission for Relief and Charity Work Abroad, US Department of the Treasury, National Security Agency, Thomas Nelson, Foreign Intelligence Surveillance Act, Al Haramain Islamic Foundation, Al-Qaeda, Al Haramain Islamic Foundation (Oregon branch), Foreign Intelligence Surveillance Court, Asim Ghafoor, Bush administration (43)

Timeline Tags: Civil Liberties

Republicans on the Senate Intelligence Committee refuse to allow an inquiry into the Bush administration’s warrantless wiretapping program (see December 15, 2005 and December 18, 2005), with the committee voting 10-8 along party lines to reject such a probe. Senate Judiciary Committee chairman Arlen Specter (R-PA) had advocated such a probe, but White House officials refused to cooperate with his committee, saying they would only cooperate via classified briefings to the Intelligence Committee. However, committee Republicans, led by chairman Pat Roberts (R-KS), have no intention of allowing such an inquiry. Roberts and his fellows say they will push to impose limitations on the program. Committee Democrats accuse their Republican colleagues of colluding with the administration to block the inquiry. “The committee is, to put it bluntly, is basically under the control of the White House,” says ranking committee member John D. Rockefeller (D-WV). “You can’t legislate properly unless you know what’s going on.” The Republicans have left Congress to “legislate in darkness and ignorance,” he says. Republicans say that a new, select subcommittee will increase oversight of the administration’s wiretapping. “It provides for a case-by-case examination and oversight by the United States Congress,” says Mike DeWine (R-OH), who is helping draft the bill for the new oversight subcommittee. “It will be very consistent with what our constitutional obligations are.” DeWine’s bill would allow the administration to ignore restrictions on wiretapping merely by invoking national security, and would not allow the committee to intervene even in clearly unjustified cases of wiretapping. “The White House could just decide not to tell them everything, and there’s no sanction,” says Bruce Fein, a former Reagan administration lawyer. “And the president can still claim that he has inherent power to conduct surveillance.” The bill is “extremely generous to the president,” says conservative law professor Douglas Kmiec. “It is not significantly different from the status quo. And I think the president would be quite delighted by that.” [Boston Globe, 3/8/2006; Savage, 2007, pp. 204]

Entity Tags: Senate Judiciary Committee, Bruce Fein, Arlen Specter, Bush administration (43), Pat Roberts, Douglas Kmiec, Mike DeWine, John D. Rockefeller, Senate Intelligence Committee

Timeline Tags: Civil Liberties

Senator Russell Feingold (D-WI) tells reporters that he intends to push through legislation that would censure President Bush because of his domestic surveillance program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006). “What the president did by consciously and intentionally violating the Constitution and laws of this country with this illegal wiretapping has to be answered,” Feingold tells an interviewer. “Proper accountability is a censuring of the president, saying, ‘Mr. President, acknowledge that you broke the law, return to the law, return to our system of government.‘… The president has broken the law and, in some way, he must be held accountable.… Congress has to reassert our system of government, and the cleanest and the most efficient way to do that is to censure the president. And, hopefully, he will acknowledge that he did something wrong.” Senate Majority Leader Bill Frist (R-TN) calls Feingold’s proposal “a crazy political move.” The Senate Intelligence Committee, following the Bush administration’s lead, has rejected some Democrats’ call for a full investigation of the surveillance program (see February 1-6, 2006). Instead, the committee has adopted a Republican plan for a seven-member subcommittee to conduct oversight. Feingold says his censure motion is not “a harsh approach, and it’s one that I think should lead to bipartisan support.” Frist, however, says: “I think it, in part, is a political move because here we are, the Republican Party, the leadership in the Congress, supporting the president of the United States as commander in chief who is out there fighting al-Qaeda and the Taliban and Osama bin Laden and the people who have sworn—have sworn—to destroy Western civilization and all the families listening to us.… The signal that it sends that there is in any way a lack of support for our commander in chief who is leading us with a bold vision in a way that we know is making our homeland safer is wrong. And it sends a perception around the world.” Only once in history has a president been censured by Congress: Andrew Jackson in 1834. In the House, Representative John Conyers (D-MI) is exploring the idea of introducing impeachment legislation against Bush. [New York Times, 3/12/2006; Associated Press, 3/12/2006] Feingold says on the Senate floor: “The president has violated the law and Congress must respond. A formal censure by Congress is an appropriate and responsible first step to assure the public that when the president thinks he can violate the law without consequences, Congress has the will to hold him accountable.” Most Congressional Democrats want nothing to do with either Feingold’s or Conyers’s legislative ideas, and some Republicans seem to be daring Democrats to vote for the proposal. Vice President Dick Cheney tells a Republican audience in Feingold’s home state of Wisconsin, “Some Democrats in Congress have decided the president is the enemy.” Democratic leaders in the Senate thwart an immediate vote as requested by Frist, and Senator Richard Durbin (D-IL) says he is not sure the proposal will ever come to a vote. Senate Minority Leader Harry Reid (D-NV) says he does not support it and has not read it. Senator Joseph Lieberman (D-CT) makes a similar assertion. In the House, Minority Leader Nancy Pelosi (D-CA) refuses to support such a proposal, saying in a statement that she “understands Senator Feingold’s frustration that the facts about the NSA domestic surveillance program have not been disclosed appropriately to Congress. Both the House and the Senate must fully investigate the program and assign responsibility for any laws that may have been broken.” [Associated Press, 3/14/2006] Former Nixon aide John Dean testifies in support of Feingold’s censure motion (see March 31, 2006). However, the censure motion, lacking support from Democratic leaders and being used by Republicans as a means to attack Democrats’ patriotism, never comes to a vote. [Klein, 2009, pp. 84]

Entity Tags: Joseph Lieberman, George W. Bush, Bush administration (43), Bill Frist, Harry Reid, John Dean, Russell D. Feingold, Senate Intelligence Committee, Richard (“Dick”) Durbin, Richard (“Dick”) Cheney, Nancy Pelosi, John Conyers

Timeline Tags: Civil Liberties

Bobby Ray Inman.Bobby Ray Inman. [Source: DefenseTech.org]Former NSA director Bobby Ray Inman says that the secret NSA program to wiretap US citizens’ phone and e-mail conversations without court warrants (see After September 11, 2001) “is not authorized.” President Bush authorized the secret wiretapping over four years ago (see Early 2002), a program only revealed at the end of 2005 (see December 15, 2005). Since the program was revealed, it has created tremendous controversy over its possible illegality and its encroachment on fundamental American civil liberties. Bush and other White House officials have repeatedly asserted that the program is legal, mainly because Bush and his officials assert that the president has the authority to implement such a program (see December 15, 2005); Bush also insists, as recently as the day before Inman’s statement, that the program is only being used to spy on terrorists and the privacy of US citizens is being “fiercely protected,” a statement that does not jibe with the facts. [Democracy Now!, 5/12/2006]

Entity Tags: National Security Agency, Al-Qaeda, Bobby Ray Inman, Bush administration (43), George W. Bush

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales says that the government has the right to prosecute journalists for publishing classified information. “There are some statutes on the book which, if you read the language carefully, would seem to indicate that that is a possibility,” he says during an ABC News interview. “That’s a policy judgment by the Congress in passing that kind of legislation. We have an obligation to enforce those laws. We have an obligation to ensure that our national security is protected.” Asked if he is considering prosecuting the New York Times for revealing the Bush administration’s warrantless wiretapping program (see December 15, 2005), Gonzales says the Justice Department is trying to determine “the appropriate course of action in that particular case.” He continues: “I’m not going to talk about it specifically. We have an obligation to enforce the law and to prosecute those who engage in criminal activity.” Experts believe that Gonzales is probably referring to the 1917 Espionage Act, which prohibits government officials from passing classified information to anyone without proper clearance; those same experts say that the Espionage Act was never intended to apply to the press. Furthermore, journalists are protected from such prosecution by the First Amendment. Gonzales says that while the Bush administration respects the right of freedom of the press, “it can’t be the case that that right trumps over the right that Americans would like to see, the ability of the federal government to go after criminal activity.” [New York Times, 5/22/2006] Thirty years ago, then-White House chief of staff Dick Cheney recommended such prosecution against a journalist who revealed the existence of a Cold War-era submarine program (see May 25, 1975). In 2007, reporter and author Charlie Savage will write that in 1975, the attorney general had scuttled the idea. Now, the attorney general is embracing the idea. [Savage, 2007, pp. 175-176]

Entity Tags: US Department of Justice, Alberto R. Gonzales, Bush administration (43), New York Times, Charlie Savage, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

George Terwilliger, a former deputy attorney general under George H. W. Bush, argues that the current Bush administration’s controversial data mining program (see Late 1999 and After September 11, 2001) is not illegal. Terwilliger tells the conservative National Review, “I think it’s fair to say that the statutes contemplate the transfer of this generic type of data much more on a case-by-case rather than a wholesale basis,” meaning that the law calls for a court order only in cases when the government is making a targeted request for information. But, he adds, “I don’t see anything in the statute that forbids such a wholesale turnover.” Terwilliger’s argument echoes the arguments of the Bush Justice Department, which argues that the data mining program—part of the NSA’s “Stellar Wind” surveillance program (see Spring 2004 and December 15, 2005)—does not technically constitute “electronic surveillance” under the law. Both the Fourth Amendment and the Foreign Intelligence Surveillance Act, as interpreted by the courts, define such actions as “electronic surveillance,” according to a number of legal experts, including law professor Orin Kerr. And, Ars Technica reporter Julian Sanchez notes in 2009, “the Stored Communications Act explicitly makes it a crime to ‘knowingly divulge a record or other information pertaining to a subscriber to or customer of such service… to any governmental entity.’” Sanchez will call Terwilliger’s argument “very strange,” but will note that Terwilliger is the attorney for then-Attorney General Alberto Gonzales and “a prominent defender of the administration’s surveillance policies.” Sanchez will conclude that while the argument “might pass for clever in a high school debate round… [i]t would be deeply unsettling if it [passes] for anything more in the halls of power.” [National Review, 6/5/2006; Ars Technica, 12/16/2008]

Entity Tags: US Department of Justice, Alberto R. Gonzales, ’Stellar Wind’, Bush administration (43), National Security Agency, Foreign Intelligence Surveillance Act, Julian Sanchez, George Terwilliger, Orin S. Kerr

Timeline Tags: Civil Liberties

At a campaign luncheon for Representative Scott Garrett (R-NJ), Vice President Dick Cheney lambasts the New York Times for reporting information that the administration wants kept secret. “Some in the press, in particular the New York Times, have made it harder to defend America against attack by insisting on publishing detailed information about vital national security programs,” he says. “First they reported the terrorist surveillance program (see March 2002), which monitors international communications when one end is outside the United States and one end is connected with or associated with al-Qaeda. Now the Times has disclosed the terrorist financial tracking program. On both occasions, the Times had been asked not to publish those stories by senior administration officials (see December 15, 2005). They went ahead anyway. The leaks to the New York Times and the publishing of those leaks is very damaging to our national security. The ability to intercept al-Qaeda communications and to track their sources of financing are essential if we’re going to successfully prosecute the global war on terror. Our capabilities in these areas help explain why we have been so successful in preventing further attacks like 9/11. And putting this information on the front page makes it more difficult for us to prevent future attacks. Publishing this highly classified information about our sources and methods for collecting intelligence will enable the terrorists to look for ways to defeat our efforts. These kinds of stories also adversely affect our relationships with people who work with us against the terrorists. In the future, they will be less likely to cooperate if they think the United States is incapable of keeping secrets.” [White House, 6/30/2006]

Entity Tags: Scott Garrett, New York Times, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties, Domestic Propaganda

Civil liberties lawyer and columnist Glenn Greenwald states that the recent Supreme Court ruling in Hamdan v. Rumsfeld (see June 30, 2006), finding that the Bush administration’s Guantanamo Bay military commissions violate both federal law and the Geneva Conventions, also proves that the NSA’s warrantless wiretapping program is illegal (see December 15, 2005). “To arrive at its decision,” Greenwald writes, “the Court emphatically rejected the administration’s radical theories of executive power, and in doing so, rendered entirely discredited the administration’s only defenses for eavesdropping on Americans without the warrants required by law. Actual compliance with the Court’s ruling, then, compels the administration to immediately cease eavesdropping on Americans in violation of FISA,” the Foreign Intelligence Surveillance Act (see 1978). “If the administration continues these programs now, then they are openly defying the Court and the law with a brazeness and contempt for the rule of law that would be unprecedented even for them.” Greenwald notes that FISA prohibits any surveillance of American citizens without judicial approval and oversight. The Bush administration has already admitted to conducting just such surveillance (see December 17, 2005 and December 21, 2005), and President Bush has even stated his intention to expand the program (see December 19, 2005). The Justice Department and a number of administration officials have attempted to claim the NSA surveillance program is both legal and necessary (see December 19, 2005, December 19, 2005, December 21-22, 2005, and Early 2006); Greenwald writes that the Hamdan decision “decimated” those claims, a conclusion shared by a number of legal experts (see January 9, 2006). Moreover, he writes, there is no remaining excuse for Democratic senators not to endorse Senator Russ Feingold’s resolution to censure Bush for violating FISA (see March 12, 2006 and After). The argument advanced by, among others, Senator Barack Obama (D-IL), that Bush believed he was complying with the law because his lawyers told him he was in compliance, is no longer relevant in light of Hamdan, Greenwald argues. “[T]here is no longer any good faith basis left for violating FISA. Ongoing warrantless eavesdropping can only be ordered by the president with a deliberate intent to break the law. After Hamdan, there are no more excuses left for the president to violate FISA, and there is therefore no more excuse left for Democratic senators to refuse to take a stand with Sen. Feingold against the administration’s lawbreaking.” Bush has two clear choices, Greenwald writes: either to comply with FISA or openly defy the Supreme Court. “If we are a country that continues to operate under the rule of law, compliance with the Supreme Court’s ruling compels the immediate cessation of the president’s warrantless eavesdropping program, as well as what are undoubtedly the other, still-secret programs prohibited by law but which have been justified by these same now-rejected theories of unlimited executive power. Put simply, after Hamdan, there are no more excuses left for the president’s refusal to comply with the law.” [Crooks and Liars, 7/8/2006]

Entity Tags: Geneva Conventions, Barack Obama, Bush administration (43), Foreign Intelligence Surveillance Act, Glenn Greenwald, US Department of Justice, US Supreme Court, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

The New York Times pens an editorial issuing a grim warning about the ramifications of the newly passed Military Commission Act (MCA—see October 17, 2006). The editorial calls the law’s stripping of habeas corpus rights for so-called “enemy combatants” “undemocratic.” It criticizes the highly charged rhetoric of the Republicans who attacked Democrats in opposition to the law as part of the Republican Party’s “scare-America-first strategy” for the upcoming midterm elections. The Times notes that President Bush misled the country into believing that the MCA is the only way the country has of adequately putting 9/11 suspects on trial: “The truth is that Mr. Bush could have done that long ago, but chose to detain them illegally at hidden CIA camps to extract information. He sent them to Guantanamo only to stampede Congress into passing the new law. The 60 or so men at Guantanamo who are now facing tribunals—out of about 450 inmates—also could have been tried years ago if Mr. Bush had not rebuffed efforts by Congress to create suitable courts. He imposed a system of kangaroo courts that was more about expanding his power than about combating terrorism.” The editorial criticizes Bush’s new “separate system of justice for any foreigner whom Mr. Bush chooses to designate as an ‘illegal enemy combatant,” one that “raises insurmountable obstacles for prisoners to challenge their detentions [and] does not require the government to release prisoners who are not being charged, or a prisoner who is exonerated by the tribunals.” However, the editorial gives false comfort to its readers by asserting that the MCA “does not apply to American citizens, but it does apply to other legal United States residents.” [New York Times, 10/19/2006]
Times Errs in Stating MCA Does Not Apply to US Citizens - Most other mainstream media outlets do not mention the possibility of the MCA applying to US citizens. But on the same day as the Times editorial, author and investigative journalist Robert Parry gives a powerful argument that the MCA can indeed be applied to them. The MCA reads in part, “Any person is punishable as a principal under this chapter who commits an offense punishable by this chapter, or aids, abets, counsels, commands, or procures its commission.… Any person subject to this chapter who, in breach of an allegiance or duty to the United States, knowingly and intentionally aids an enemy of the United States… shall be punished as a military commission… may direct.” The legal meaning of “any person,” Parry notes, clearly includes US citizens, particularly those who may act “in breach of an allegiance or duty to the United States.” Parry asks, “Who has ‘an allegiance or duty to the United States’ if not an American citizen? That provision would not presumably apply to Osama bin Laden or al-Qaeda, nor would it apply generally to foreign citizens. This section of the law appears to be singling out American citizens.” If an American citizen is charged with a crime under the MCA, that citizen, like the foreign nationals currently laboring under the weight of the law, cannot challenge their detention and charges under the habeas corpus provisions of US law, and cannot expect a fair trial. They will not be given the chance to appeal their convictions until they are prosecuted, convicted, and sentenced. And since the MCA defendant has no right to a “speedy trial,” that defendant cannot expect to be granted an appeal in any reasonable length of time. In effect, an American citizen, like a foreign national charged under the MCA, can be imprisoned indefinitely without recourse to the US judiciary.
Potential to Jail Media Leakers and Reporters - One aspect of the MCA that has not been widely discussed, Parry notes, is the provision that would allow the incarceration of “any person” who “collects or attempts to collect information by clandestine means or while acting under false pretenses, for the purpose of conveying such information to an enemy of the United States.” That provision is tremendously vague, and could easily be stretched to fit, for example, the whistleblowers who revealed the existence of the NSA’s warrantless wiretapping program to the Times (see December 15, 2005) and the reporters and editors who published the story based on those revelations. [Consortium News, 10/19/2006] Six months later, a Justice Department lawyer will confirm that the Bush administration believes MCA does indeed apply to US citizens (see February 1, 2007).

Entity Tags: Osama bin Laden, George W. Bush, Al-Qaeda, Military Commissions Act, New York Times, US Department of Justice, Robert Parry

Timeline Tags: Civil Liberties

After an investigation into whether an Israeli lobbying organization improperly tried to influence House Minority Leader Nancy Pelosi (D-CA) into naming Jane Harman (D-CA) as the chairman of the House Intelligence Committee (see Summer 2005 and October 2005) becomes public knowledge, Harman calls the allegations “irresponsible, laughable, and scurrilous.” Former Solicitor General Theodore Olson, a Republican just hired by Harman to represent her in the matter, tells Time reporter Timothy Burger: “Congresswoman Harman has asked me to follow up on calls you’ve had. She is not aware of any such investigation, does not believe that it is occurring, and wanted to make sure that you and your editors knew that as far as she knows, that’s not true.… No one from the Justice Department has contacted her.” Burger notes that “[i]t is not, however, a given that Harman would know that she is under investigation.” Olson confirms that Harman hired him because even though she doesn’t believe the media reports of the investigation, she takes the possibility seriously. The American Israel Public Affairs Committee (AIPAC), allegedly Harman’s partner in the scheme, also denies any wrongdoing, and says it takes no position on the question of who wins the committee assignment, which was perceived to be a contest between Harman and fellow committee member Alcee Hastings (D-FL). AIPAC spokesman Patrick Dorton says: “Both Congressman Hastings and Congresswoman Harman are strong leaders on issues of importance to the pro-Israel community and would be exemplary Democratic leaders for the House intelligence committee. AIPAC would never engage in a quid pro quo in relation to a federal investigation or any federal matter and the notion that it would do so is preposterous. AIPAC is not aware that the Justice Department is looking into issues involving the intelligence committee, and has not been asked any questions or contacted by the government on this matter, but certainly would cooperate with any inquiry.” Dorton adds that AIPAC has previously been assured that the organization and its current employees are not being investigated. [Time, 10/20/2006]

Entity Tags: US Department of Justice, Alcee Hastings, American Israel Public Affairs Committee, House Intelligence Committee, Jane Harman, Nancy Pelosi, Theodore (“Ted”) Olson, Timothy Burger, Patrick Dorton

Timeline Tags: Civil Liberties

Silvestre Reyes.Silvestre Reyes. [Source: Foreign Policy (.com)]Representative Nancy Pelosi (D-CA), slated to become the new speaker of the House when the Democrats take over leadership of the House in January 2007, names Silvestre Reyes (D-TX) as the chairman of the House Intelligence Committee. Reyes, a former soldier and Border Patrol chief before being elected to Congress, is named to the chairmanship over two other Intelligence Committee Democrats, Jane Harman (D-CA) and Alcee Hastings (D-FL), both of whom outrank him on the committee. Generally an advocate for the military, Reyes supports withdrawing from Iraq, and voted against the original war resolution. He has accused the Bush administration of using “cherry-picked” and “manipulated” intelligence to justify invading Iraq. He is also a strong critic of the Bush administration’s warrantless wiretapping program (see December 15, 2005). [Washington Post, 12/2/2006] Evidence will later show that Harman may have improperly accepted assistance from an Israeli agent, who promised to lobby Pelosi on Harman’s behalf for the chairmanship (see October 2005 and April 19, 2009).

Entity Tags: House Intelligence Committee, Bush administration (43), Jane Harman, Nancy Pelosi, Alcee Hastings, Silvestre Reyes

Timeline Tags: Civil Liberties

Ali Reza Asgari.Ali Reza Asgari. [Source: FARS / Reuters]Iran’s former Deputy Minister of Defense, General Ali Reza Asgari, defects during a visit to Turkey. [Inter Press Service, 12/17/2007] According to former CIA officer Vincent Cannistraro, Asgari is a longtime Western intelligence agent, and is immediately debriefed by Turkish and US intelligence officials. Asgari will be given a new identity; his current whereabouts are unknown to the public. [Guardian, 12/8/2007]
History and Connections - Asgari held the Defense Ministry position from 1997 through 2005, under the regime of reformist Iranian President Mohammed Khatami, and, according to US media reports, was providing the US with intelligence during that time period. [Inter Press Service, 12/17/2007] He is a former intelligence officer in Iran’s Islamic Revolutionary Guard Corps (IRGC), and is believed to have considerable knowledge about several IRGC-ordered terrorist attacks, including the October 1983 bombing of a US Marine barracks in Lebanon (see April 18-October 23, 1983) and the 1996 Khobar Towers bombing in Saudi Arabia (see June 25, 1996). He has close ties to Lebanese terrorist group Hezbollah, and presumably can tell US intelligence about Hezbollah’s military command structure, its overseas networks, and perhaps its cells inside the US. [Time, 3/22/2007]
Source for National Intelligence Estimate - Former CIA officer Philip Giraldi says that Asgari is a “key” source for the intelligence community’s National Intelligence Estimate (NIE) on Iran’s nuclear program, currently in development (see August 2, 2005). Asgari’s information helps the intelligence community determine that Iran had ceased work on its nuclear program in 2003. According to Giraldi, Asgari had been recruited by Turkish intelligence in 2003, and defected after learning that Iranian intelligence had become suspicious of him. Asgari defects with “bags of documents,” presumably including information about Iran’s nuclear program. Asgari will provide information crucial to the US’s ability to monitor sensitive communications among senior Iranian military officials (see July 2007), which helps corroborate the finding that Iran had indeed ceased research into nuclear weapons development. Former National Security Council official Gary Sick will say that Asgari’s knowledge of the Iranian military is critical in determining what is and is not important among the communications intercepts. “There are zillions of pieces of evidence, and what you look for is defined by what you know,” Sick will say. “What Asgari gave them was a new way of looking at the evidence.” It is highly likely that President Bush will be made aware of Asgari’s information soon after Asgari’s debriefing, though the White House will claim that Bush knew nothing of the new intelligence on Iran until August 2007 (see December 3-4, 2007). [Inter Press Service, 12/17/2007]

Entity Tags: Vincent Cannistraro, Islamic Revolutionary Guard Corps, George W. Bush, Hezbollah, Ali-Reza Asgari, Central Intelligence Agency, Gary G. Sick, Hojjat ol-Eslam Seyyed Mohammad Khatami, Philip Giraldi

Timeline Tags: US confrontation with Iran

Microsoft logo.Microsoft logo. [Source: Your Logo Collection (.com)]The National Security Agency (NSA) reveals plans to build an enormous new data center in San Antonio, Texas, three months after Microsoft announced plans to build a $550 million data center in the same area. [National Security Agency, 4/19/2007] The NSA previously acknowledged building a similar data storage facility in Colorado (see January 30, 2006). Reporter and author James Bamford will later write in his book The Shadow Factory that “[t]he timing of the move was interesting,” because the NSA had leased a building in San Antonio in 2005, but had not done anything further. The NSA only announces plans to move forward with the data center after Microsoft revealed plans to build a 470,000 square foot cloud data center that would handle Internet search data, emails, and instant messages. Bamford will quote Bexar County judge Nelson Wolff’s statement to the San Antonio Express-News, “We told [the NSA] we were going to get Microsoft, and that really opened up their eyes,” and write, “For an agency heavily involved in data harvesting, there were many advantages to having their miners next door to the mother lode of data centers” (see 1997, February 27, 2000, February 2001), Spring 2001, April 4, 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, and December 15, 2005). Microsoft’s operation will be largely automated and employ only 75 people. In contrast, the NSA’s facility is to be the same size, but employ 1,500. Bamford will write that this is “far more than was needed to babysit a warehouse of routers and servers but enough to analyze the data passing across them.” [Data Center Knowledge, 1/19/2007; San Antonio Express-News, 4/18/2007; Bamford, 2008, pp. 317-318] Former senior AT&T technician and warrantless surveillance whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) will reference Bamford’s book and agree that this “suggests a massive data mining operation.” [Klein, 2009, pp. 41]

Entity Tags: James Bamford, Microsoft Corporation, National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

Eric Lichtblau.Eric Lichtblau. [Source: PBS]Jack Goldsmith, the former head of the Justice Department’s Office of Legal Counsel (see October 6, 2003 and June 17, 2004), is subpoenaed to testify in the Justice Department’s investigation of the leaks that resulted in the New York Times’s dramatic disclosure of the NSA domestic wiretapping program (see December 15, 2005). Goldsmith had spoken to one of the two Times reporters, Eric Lichtblau, in October 2004, three months after his resignation from the OLC, but lied to Lichtblau, saying he knew nothing of the program. He immediately alerted his former boss, Deputy Attorney General James Comey, of the interview.
'Stunned' By Subpoena - In his September 2007 book The Terror Presidency, Goldsmith will recall being “stunned” at the subpoena, though the two FBI agents who give him the subpoena—in public—say that they don’t suspect him as the source of the leak. Goldsmith later recalls, “What angered me most about the subpoena I received on that wet day in Cambridge was not the expense of lawyers or a possible perjury trap, but rather the fact that it was Alberto Gonzales’s Justice Department that had issued it. As [the two FBI agents] knew, I had spent hundreds of very difficult hours at OLC, in the face of extraordinary White House resistance, trying to clean up the legal mess that then-White House Counsel Gonzales, David Addington, John Yoo, and others had created in designing the foundations of the Terrorist Surveillance Program. It seemed rich beyond my comprehension for a Gonzales-led Department of Justice to be pursuing me for possibly illegal actions in connection with the Terrorist Surveillance Program….”
Supported Surveillance of Terrorism - Goldsmith will continue, “I was not opposed to the leak investigation itself or to vigorous surveillance of terrorists. I agreed with President Bush that the revelations by [James] Risen and Lichtblau had alerted our enemies, put our citizens at risk, and done ‘great harm’ to the nation. I hoped the FBI would find and punish the leakers, and I had spent many hours trying to help them do so. I also shared many of the White House’s concerns with the Foreign Intelligence Surveillance Act (FISA), the 1978 domestic wiretapping law that required executive officers, on pain of jail, to get a court warrant before wiretapping suspected enemies in the United States. We were at war with terrorists who were armed with disposable cell phones and encrypted e-mails buried in a global multibillion-communications-per-day system. It seemed crazy to require the commander in chief and his subordinates to get a judge’s permission to listen to each communication under a legal regime that was designed before technological revolutions brought us high-speed fiber-optic networks, the public Internet, e-mail, and ten-dollar cell phones. But I deplored the way the White House went about fixing the problem. ‘We’re one bomb away from getting rid of that obnoxious [FISA] court,’ Addington had told me in his typically sarcastic style during a tense White House meeting in February of 2004 (see February 2004). The vice president’s counsel, who was the chief legal architect of the Terrorist Surveillance Program, was singing the White House tune on FISA. He and the vice president had abhorred FISA’s intrusion on presidential power ever since its enactment in 1978. After 9/11 they and other top officials in the administration dealt with FISA the way they dealt with other laws they didn’t like: They blew through them in secret based on flimsy legal opinions that they guarded closely so no one could question the legal basis for the operations. My first experience of this strict control, in fact, had come in a 2003 meeting when Addington angrily denied the NSA inspector general’s request to see a copy of OLC’s legal analysis in support of the Terrorist Surveillance Program. Before I arrived in OLC, not even NSA lawyers were allowed to see the Justice Department’s legal analysis of what NSA was doing.”
Difficult to Justify Legally - Goldsmith will write of the difficulties he found in finding legal justifications for the program. “I first encountered the program in 2003-2004, long after it had been integrated into the post-9/11 counterterrorism architecture. Putting it legally aright at that point, without destroying some of the government’s most important counterterrorism tools, was by far the hardest challenge I faced in government. And the whole ordeal could have been avoided.…In 2004, I and others in the Department of Justice had begun the process of working with the FISA court to give the commander in chief much more flexibility in tracking terrorists. From the beginning the administration could have taken these and other steps to ramp up terrorist surveillance in indisputably lawful ways that would have minimized the likelihood of a devastating national security leak. But only if it had been willing to work with the FISA court or Congress. The White House had found it much easier to go it alone, in secret.” [Slate, 9/10/2007]

Entity Tags: Richard (“Dick”) Cheney, US Department of Justice, New York Times, Terrorist Surveillance Program, John C. Yoo, Office of Legal Counsel (DOJ), James B. Comey Jr., Eric Lichtblau, David S. Addington, Alberto R. Gonzales, James Risen, Jack Goldsmith, Foreign Intelligence Surveillance Court, Foreign Intelligence Surveillance Act, Federal Bureau of Investigation, George W. Bush

Timeline Tags: Civil Liberties

Bush administration officials tell Senate Intelligence Committee members that they will not promise to continue seeking warrants for surveillance on US citizens, as the administration agreed to do in January 2007. They insist that President Bush has the Constitutional authority to decide whether or not to order the NSA to conduct surveillance without warrants if he desires. The secret wiretapping program was revealed to the public just weeks before the agreement (see December 15, 2005), and immediately drew tremendous outcries of criticism from civil libertarians, from lawmakers from all across the political spectrum, and from much of the public. Since the January agreement, the Foreign Intelligence Surveillance Act (FISA) court has issued warrants for domestic wiretaps after being given evidence showing some kind of probable cause to justify the proposed surveillance. Previously, the wiretapping program had ignored the FISA restrictions. Now Bush officials, most notably the new director of national intelligence, Mike McConnell, are saying that Bush has the authority under Article II of the Constitution to order warrantless wiretaps on US citizens.
Invoking Presidential Authority - In Senate testimony on this day, Russ Feingold (D-WI) asks McConnell if he is willing to promise that the administration will no longer ignore the law and the court when monitoring citizens. McConnell replies, “Sir, the president’s authority under Article II is in the Constitution. So if the president chose to exercise Article II authority, that would be the president’s call.” McConnell is echoing previous arguments made by Bush and other officials, who have said that Bush has the power to order wiretaps without court review, both under the Constitution and under the September 2001 Congressional authorization to use military force against al-Qaeda. McConnell says that the administration is conducting surveillance against Americans only with court warrants, and has no plans “that we are formulating or thinking about currently” to resume domestic wiretapping without warrants. “But I’d just highlight,” he adds, “Article II is Article II, so in a different circumstance, I can’t speak for the president what he might decide.” [New York Times, 5/2/2007] Article II is the section of the Constitution that delineates the powers of the executive branch, and establishes the fundamental “separation of powers” doctrine that governs American democracy. Constitutional expert Steve Mount notes that the “Constitution is deliberately inefficient; the “Separation of Powers devised by the framers of the Constitution was designed to do one primary thing: to prevent the majority from ruling with an iron fist.” [Mount, 1995]
White House Seeking Congressional Authorization - While the administration continues to argue that it has the power to eavesdrop on US citizens without warrants, it also continues to seek Congressional legislation affirming and perhaps expanding that power. The White House justifies that hoped-for legislation by pointing to national security and the war on terrorism, as well as the challenges posed by new communications technologies such as e-mail and wireless communications. White House officials have consistently refused to go into specifics as to what communications gaps they feel need plugging. And they have consistently ignored Congressional requests for information and documents related to the NSA’s domestic spy program, now being called the “Terrorist Surveillance Program” by White House officials and their Republican colleagues. Many Congressional Democrats say they would be reluctant to support any such legislation until they receive the information they have requested. “To this day, we have never been provided the presidential authorization that cleared that program to go or the attorney general-Department of Justice opinions that declared it to be lawful,” says Senator Sheldon Whitehouse (D-RI). “Where’s the transparency as to the presidential authorizations for this closed program? That’s a pretty big ‘we’re not going to tell you’ in this new atmosphere of trust we’re trying to build.” [New York Times, 5/2/2007]

Entity Tags: Steve Mount, Sheldon Whitehouse, Senate Intelligence Committee, National Security Agency, Al-Qaeda, Bush administration (43), Foreign Intelligence Surveillance Court, Russell D. Feingold, Mike McConnell, George W. Bush

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales comes under fire from members of the Senate Judiciary Committee regarding the National Security Agency’s domestic warrantless wiretapping program (see December 15, 2005. Testimony from the day before by former deputy attorney general James Comey (see May 15, 2007) showed that White House and Justice Department officials were, and still are, deeply divided over the legality and efficacy of the program. But Gonzales has said repeatedly, both under oath before Congress and in other venues, that there is little debate over the NSA surveillance program, and almost all administration officials are unified in support of the program. In February 2006, he told the committee, “There has not been any serious disagreement about the program that the president has confirmed. There have been disagreements about other matters regarding operations, which I cannot get into.” Gonzales’s veracity has come under question before, and many senators are disinclined to believe his new testimony. Committee Democrats point out that Comey’s testimony flatly contradicts Gonzales’s statements from that February session. A letter from Senators Russ Feingold, Charles Schumer, Edward Kennedy, and Richard Durbin asks Gonzales, “In light of Mr. Comey’s testimony yesterday, do you stand by your 2006 Senate and House testimony, or do you wish to revise it?” And some Senate Republicans are now joining Democrats in calling for Gonzales’s removal. Chuck Hagel (R-NE) says, “The American people deserve an attorney general, the chief law enforcement officer of our country, whose honesty and capability are beyond question. Attorney General Gonzales can no longer meet this standard. He has failed this country. He has lost the moral authority to lead.” White House press secretary Tony Snow says of Hagel’s statement, “We disagree, and the president supports the attorney general.” Hagel joins three other Republican senators, John Sununu, Tom Coburn, and presidential candidate John McCain, and House GOP Conference Chairman Adam Putnam, in calling for Gonzales’s firing. Former Senate Intelligence Commitee chairman Pat Roberts (R-KS) says that Gonzales should consider resigning, a stance echoed by fellow Republican senators Arlen Specter and Gordon Smith. [Associated Press, 5/17/2007] Gonzales’s defenders say that his testimony to the committee, while legalistic and narrowly focused, is technically accurate, because the NSA program also involves “data mining” of huge electronic databases containing personal information on millions of US citizens, and that program is not exactly the same as the so-called “Terrorist Surveillance Program,” as the NSA’s wiretapping program is now called by White House officials (see Early 2004). But Feingold disagrees. “I’ve had the opportunity to review the classified matters at issue here, and I believe that his testimony was misleading at best.” [New York Times, 7/29/2007]

Entity Tags: Charles Schumer, Arlen Specter, Terrorist Surveillance Program, Tom Coburn, Tony Snow, US Department of Justice, Adam Putnam, Senate Intelligence Committee, Russell D. Feingold, Senate Judiciary Committee, Pat Roberts, Richard (“Dick”) Durbin, Edward M. (“Ted”) Kennedy, Chuck Hagel, Gordon Smith, John Sununu, John McCain, National Security Agency, Alberto R. Gonzales, James B. Comey Jr.

Timeline Tags: Civil Liberties

Juma al-Dosari in Saudi Arabia after his release.Juma al-Dosari in Saudi Arabia after his release. [Source: Nancy Durham / CBC]The Defense Department releases 16 Saudis being held in Guantanamo prison and returns them to Saudi Arabia. One of them is Juma al-Dosari, a dual Bahraini/Saudi citizen, and apparently a long-time al-Qaeda operative. [Gulf Daily News, 7/17/2007]
Extensive Al-Qaeda Links - Al-Dosari was known as “the closer” for recruiting new al-Qaeda operatives, and he recruited the “Lackawanna Six” in New York State while he lived in the US from 1999 to 2001. According to his 2006 Guantanamo Administrative Review Board evidence review, there is a long list of evidence tying him to al-Qaeda since he was 16-years old in 1989, just one year after al-Qaeda was founded. He fought with militants in Bosnia, Chechnya, and Tajikistan. He was arrested in Kuwait and then again in Saudi Arabia for suspected involvement in the 1996 Khobar Towers bombings (see June 25, 1996), but released without charge both times. An unnamed source claims he was involved in the 2000 USS Cole bombing (see October 12, 2000). He was arrested during the battle of Tora Bora, Afghanistan, in late 2001, and then sent to Guantanamo. US intelligence intercepted communications between him and Osama bin Laden’s son Saad bin Laden, and also him and al-Qaeda leader Khallad bin Attash (see November 2001-May 2002). [PBS Frontline, 10/16/2003; PBS Frontline, 10/16/2003; US Department of Defense, 9/13/2006 pdf file]
Release Unnoticed, Unexplained - Al-Dosari’s 2007 release goes almost entirely unnoticed by the US media, despite previous articles and books discussing his recruitment of the “Lackawanna Six.” In June 2008, retired FBI agent Peter Ahearn will comment to the Buffalo News that he is baffled that the US government never criminally prosecuted al-Dosari, and then released him. “We felt strongly that we could try him in Buffalo on criminal charges, but the Justice Department declined.” Ahearn is upset that al-Dosari “is walking around as a free man in Saudi Arabia.” [Buffalo News, 6/22/2008]
"Rehabilitated" in Saudi Arabia - Upon arriving in Saudi Arabia, al-Dosari is admitted into a “soft approach” government rehabilitation program designed to prevent militants from relapsing back into violent extremism (see 2007 and After). He is given a car, psychological therapy, a monthly allowance, help to find a job, and help to get married. He had attempted to commit suicide over a dozen times while in Guantanamo. In 2008, it will be reported that he is doing well in Saudi Arabia, with a new wife and a new job. He now says Osama bin Laden “used my religion and destroyed its reputation.” [Los Angeles Times, 12/21/2007; Gulf News, 2/22/2008]

Entity Tags: Peter Ahearn, Juma al-Dosari

Timeline Tags: Complete 911 Timeline

Page 1 of 2 (120 events)
previous | 1, 2 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike