!! History Commons Alert, Exciting News

Context of 'December 16, 2009: Congress Bans Funding of Abortions for Military Personnel'

This is a scalable context timeline. It contains events related to the event December 16, 2009: Congress Bans Funding of Abortions for Military Personnel. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 3 of 5 (448 events)
previous | 1, 2, 3, 4, 5 | next

Defense Secretary Donald Rumsfeld signs a memo on interrogation methods approving 24 of the 35 techniques recommended by the Pentagon working group (see April 4, 2003) earlier in the month. The new set of guidelines, to be applied to prisoners at Guantanamo and Afghanistan, is a somewhat softer version of the initial interrogation policy that Rumsfeld approved in December 2002 (see December 2, 2002). [Roth and Malinowski, 5/3/2004; Washington Post, 5/11/2004; Age (Melbourne), 5/13/2004; Washington Post, 5/13/2004; Los Angeles Times, 5/22/2004; Newsweek, 5/24/2004; Wall Street Journal, 6/7/2004; MSNBC, 6/23/2004; Truthout (.org), 6/28/2004] Several of the techniques listed are ones that the US military trains Special Forces to prepare for in the event that they are captured by enemy forces (see December 2001 and July 2002). [New York Times, 5/13/2004]
Two Classes of Methods - The list is divided into two classes: tactics that are authorized for use on all prisoners and special “enhanced measures” that require the approval of Lieutenant General Ricardo Sanchez. The latter category of methods includes tactics that “could cause temporary physical or mental pain,” like “sensory deprivation,” “stress positions,” “dietary manipulation,” forced changes in sleep patterns, and isolated confinement. [Washington Post, 5/11/2004; Washington Post, 5/13/2004] Other techniques include “change of scenery down,” “dietary manipulation,” “environmental manipulation,” and “false flag.” The first 18 tactics listed all appear in the 1992 US Army Field Manual (FM) 34-52, with the exception of the so-called “Mutt-and-Jeff” approach, which is taken from an obsolete 1987 military field manual (1987 FM 34-52). [USA Today, 6/22/2004] The approved tactics can be used in conjunction with one another, essentially allowing interrogators to “pile on” one harsh technique after another. Categories such as “Fear Up Harsh” and “Pride and Ego Down” remain undefined, allowing interrogators to interpret them as they see fit. And Rumsfeld writes that any other tactic not already approved can be used if he gives permission. Author and reporter Charlie Savage will later write, “In other words, there were no binding laws and treaties anymore—the only limit was the judgment and goodwill of executive branch officials. ” [Savage, 2007, pp. 181] The use of forced nudity as a tactic is not included in the list. The working group rejected it because its members felt it might be considered inhumane treatment under international law. [Associated Press, 6/23/2004]
Result of Discussions among Pentagon Officials - The memo, marked for declassification in 2013 [Truthout (.org), 6/28/2004] , is the outcome, according to Deputy General Counsel Daniel Dell’Orto, of discussions between Rumsfeld, William J. Haynes, Douglas Feith, Paul Wolfowitz, and General Richard Myers. [Washington File, 6/23/2004] One US official explains: “There are very specific guidelines that are thoroughly vetted. Everyone is on board. It’s legal.” However in May 2004, it will be learned that there was in fact opposition to the new guidelines. Pentagon lawyers from the Army Judge Advocate General’s office had objected (see May 2003 and October 2003) and many officials quietly expressed concerns that they might have to answer for the policy at a later date (see (April 2003)). [Washington Post, 5/11/2004; Washington Post, 5/13/2004]

Entity Tags: Donald Rumsfeld, Douglas Feith, Paul Wolfowitz, Richard B. Myers, William J. Haynes, Ricardo S. Sanchez, Daniel J. Dell’Orto, Charlie Savage

Timeline Tags: Torture of US Captives, Civil Liberties

Twenty-five al-Qaeda operatives are captured in Karachi, Pakistan, including two key 9/11 figures. The captured include Tawfiq bin Attash, better known by his nickname Khallad. He is considered one of the masterminds of the USS Cole bombing (see October 12, 2000) and attended a Malaysia summit where the 9/11 plot was discussed (see January 5-8, 2000). Also captured is Ali Abdul Aziz Ali, one of 9/11 mastermind Khalid Shaikh Mohammed’s nephews. He made travel arrangements for and wired money to many of the 9/11 hijackers. One investigator will later say, “He was turning up everywhere we looked—like a chameleon.” [New York Times, 5/1/2003; Los Angeles Times, 5/21/2006] Both Aziz Ali and bin Attash will be sent to secret CIA prisons and remain there until 2006, when they will be transfered to the Guantanamo Bay prison (see September 2-3, 2006). Bin Attash will be extensively tortured while in US custody in Afghanistan (see April 29 - Mid-May, 2003). The identities and fates of the others captured with them are unknown.

Entity Tags: Khallad bin Attash, Ali Abdul Aziz Ali

Timeline Tags: Complete 911 Timeline

Eight high-ranking military lawyers from the Army Judge Advocate General’s office—which historically has ensured that interrogators do not violate prisoners’ rights—visit Scott Horton, head of the New York State Bar Association’s committee on international law, and ask him to persuade the Pentagon to reverse its policy on using “stress and duress” interrogation techniques (see Late 2002-April 2003) (see April 16, 2003). “They were quite blunt,” Horton will recall. “They were extremely concerned about how the political appointees were dealing with interrogation issues. They said this was a disaster waiting to happen and that they felt shut out” from the rules-drafting process. [Washington Post, 5/13/2004; Newsday, 5/15/2004; New Yorker, 5/24/2004] The lawyers describe the new interrogation rules as “frightening,” with the potential to “reverse 50 years of a proud tradition of compliance with the Geneva Conventions.” [USA Today, 5/13/2004] The military lawyers will make another visit to Horton’s office in October (see May 2003).

Entity Tags: Scott Horton

Timeline Tags: Torture of US Captives

On May 7, 2003, Leonie Brinkema, the judge in the Zacarias Moussaoui trial, asks the CIA if it has recordings of interrogations of detainees related to Moussaoui’s case. Two days later, the CIA replies that it does not, although it is actually in possession of some recordings. In 2002, the CIA secretly videotaped interrogations of high-ranking detainees Abu Zubaida and Abd al-Rahim al-Nashiri (see Spring-Late 2002) but it does not reveal this to anyone involved in the Moussaoui trial. In 2005, some of these videotapes will be destroyed (see November 2005), around the time the Brinkema makes a repeat request for the tapes (see November 3-14, 2005). However, other recordings—two videotapes and one audio tape—will survive and will finally be viewed by Moussaoui’s prosecutors in 2007, long after Moussaoui has been convicted (see September 19 and October 18, 2007). [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006; US District Court for the Eastern District of Virginia, Alexandria Division, 10/25/2007 pdf file; Reuters, 11/13/2007] Although the identity of the detainees in the recordings requested is not known, one of the prosecutors will later say, “Obviously the important witnesses included [Abu] Zubaidah, [Ramzi] bin al-Shibh, and KSM [Khalid Shaikh Mohammed]… those are the guys at the head of the witness list.” However, he will not specifically recall which tapes are requested. [Associated Press, 12/7/2007]

Entity Tags: Central Intelligence Agency, Leonie Brinkema, Zacarias Moussaoui

Timeline Tags: Torture of US Captives, Complete 911 Timeline, 9/11 Timeline

Ali Saleh Kahlah Al-Marri, a Qatari citizen and former US college student charged with bank fraud and alleged to be an al-Qaeda sleeper agent (see December 12, 2001), pleads innocent in an Illinois federal court. His court date is set for July 21, but before that can happen, President Bush will designate al-Marri an “enemy combatant” and send him into military custody, where he will be denied access to the US court system (see June 23, 2003). Al-Marri has been in detention in New York City while federal investigators probe his alleged connections to 9/11 hijackers. Al-Marri is charged with credit card fraud (see February 8, 2002) based on his alleged possession of at least 15 unauthorized and counterfeit credit cards; he is alleged to have been part of the al-Qaeda finance network. He is also charged with lying to FBI agents over alleged overseas phone calls to a number associated with an al-Qaeda figure in the United Arab Emirates, Mustafa Ahmed al-Hawsawi, a known al-Qaeda facilitator linked to the 9/11 attacks (see Early-Late June, 2001). Al-Marri is not charged with being personally linked to the attacks. US Attorney Jan Paul Miller says al-Marri has not been charged with a terrorist crime. [Associated Press, 5/29/2003]

Entity Tags: Ali Saleh Kahlah al-Marri, Al-Qaeda, Jan Paul Miller, Mustafa Ahmed al-Hawsawi, George W. Bush, Federal Bureau of Investigation

Timeline Tags: Torture of US Captives

Kean (left) and Hamilton (right) of the 9/11 Commission.Kean (left) and Hamilton (right) of the 9/11 Commission. [Source: Doug Mills / New York Times]The 9/11 Commission does not receive video or audio recordings of interrogations of detainees thought to know something about the 9/11 plot (see Spring-Late 2002), even though it is unhappy with the amount and quality of information it is getting from detainees (see Summer 2003) and has a series of meetings with CIA officials to improve access (see November 5, 2003-January 2004). The CIA will indicate that the Commission never asks for the tapes, saying it “went to great lengths to meet the requests of the 9/11 Commission,” and that one of the reasons that the tapes are not destroyed until after the Commission releases its final report in 2004 is so that it could have the tapes, if it so desires. [New York Times, 12/8/2007] However, when the tapes’ destruction is revealed in late 2007 (see November 2005 and December 6, 2007), former 9/11 Commission Chairman Tom Kean and Vice Chairman Lee Hamilton will dispute this, saying that in hours of negotiations and discussions with the CIA and written requests they make it clear they want all material connected to the interrogations of the relevant detainees. [International Herald Tribune, 12/8/2007] Kean will say, “They knew what they had and they didn’t give it to us.” [ABC News, 12/7/2007] Hamilton will say, “The CIA certainly knew of our interest in getting all the information we could on the detainees, and they never indicated to us there were any videotapes… Did they obstruct our inquiry? The answer is clearly yes. Whether that amounts to a crime, others will have to judge.” [International Herald Tribune, 12/8/2007]

Entity Tags: Thomas Kean, Central Intelligence Agency, Lee Hamilton, 9/11 Commission

Timeline Tags: Torture of US Captives, Complete 911 Timeline, 9/11 Timeline

Ali Saleh Kahlah al-Marri.Ali Saleh Kahlah al-Marri. [Source: Slate]A month before he is slated to go on trial for bank and credit card fraud charges (see February 8, 2002), the federal government drops all criminal charges against Ali Saleh Kahlah al-Marri, who has been held without legal representation, and in solitary confinement, since 2001 (see December 12, 2001). [CBS News, 6/23/2003; CBS News, 6/23/2003; CNN, 12/13/2005; Progressive, 3/2007]
'Grave Danger' - President Bush says al-Marri “represents a continuing, present, and grave danger” to the country, and the government designates al-Marri as an “enemy combatant,” alleging that he helped al-Qaeda operatives settle in the US. “Mr. Al-Marri possesses intelligence, including intelligence about personnel and activities of al-Qaeda,” Bush continues, and adds that gaining access to it “would aid US efforts to prevent attacks by al-Qaeda.” [Knight Ridder, 6/24/2003; Progressive, 3/2007] The presidential order says he “engaged in conduct that constituted hostile and war-like acts, including conduct in preparation for acts of international terrorism.” His detention is necessary, the order claims, to prevent him from participating in terrorist activities against the US. The order in effect precludes a pretrial hearing scheduled for July 2 and the start of a formal trial on July 22. [CNN, 6/24/2003]
Alleged Sleeper Agent - The government declaration for al-Marri says he worked as an “al-Qaeda sleeper agent” who was planning to “hack into the computer systems of US banks,” and possibly facilitate a follow up to the 9/11 attacks. For its part, the Defense Department says al-Marri trained at a terror camp in Afghanistan before 9/11, personally met Osama bin Laden, and volunteered for an unspecified “martyr mission.” [CNN, 12/13/2005] Attorney General John Ashcroft will later claim that al-Marri refused repeated offers to cooperate with the FBI; “consequently,” Ashcroft will write, Bush declares him an enemy combatant. Ashcroft will claim that under the laws of war, an enemy combatant can be killed out of hand. Instead, the government will hold al-Marri “without charge or trial until the end of the war.” [Slate, 11/30/2006]
Transferred to Navy Brig - Instead, the “enemy combatant” designation takes al-Marri, a Qatari citizen and legal US resident, out of the civilian criminal justice system and places him under the control of the Defense Department, which immediately transfers him into detention at a Navy brig in South Carolina. He could face a military tribunal or remain in detention indefinitely, without trial. He is only the third person to be publicly named as an enemy combatant, along with US citizens Jose Padilla and Yaser Esam Hamdi.
Fingered by KSM - According to a Justice Department official, al-Marri was “positively identified” as being part of a planned second wave of al-Qaeda terrorist attacks by an “al-Qaeda detainee in a position to know.” Justice officials imply that the detainee to finger al-Marri is senior 9/11 planner Khalid Shaikh Mohammed. [CBS News, 6/23/2003] Another suspected al-Qaeda operative, Mustafa Ahmed al-Hawsawi (see Early-Late June, 2001), is also said to have mentioned him. [CNN, 12/13/2005] Alice Fisher, the deputy assistant attorney general for the Justice Department’s criminal division, says the department did not drop the criminal charges against al-Marri because the case was weak: “We are confident we would have prevailed on the criminal charges. However, setting the criminal charges aside is in the best interests of our national security.” The criminal charges—lying to banks, lying to the FBI, and credit card fraud—could have given al-Marri up to 60 years in prison and $1.75 million in fines. [CBS News, 6/23/2003]
Pleaded Not Guilty - Al-Marri’s lawyer Mark Berman says that his client pleaded not guilty to the criminal charges (see May 29, 2003), and the case was proceeding to trial. “I definitely got the sense they were reluctant to try the case in court,” Berman says. “They’d rather be in a forum where defendants aren’t represented by counsel.” Al-Marri’s wife and five children have left the US. The Saudi Arabian government granted the family passports in February, in spite of a State Department request not to issue the passports, as department officials wanted al-Marri’s wife, who is Saudi, to be available to the FBI for questioning. [Knight Ridder, 6/23/2003] Al-Marri’s lawyers say they are preparing a legal challenge to Bush’s decision. [Knight Ridder, 6/24/2003]

Entity Tags: US Department of Defense, US Department of State, Osama bin Laden, US Department of Justice, Mustafa Ahmed al-Hawsawi, John Ashcroft, Khalid Shaikh Mohammed, Al-Qaeda, Ali Saleh Kahlah al-Marri, Mark Berman, Alice Fisher, George W. Bush, Jose Padilla, Federal Bureau of Investigation, Yaser Esam Hamdi

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Senator Arlen Specter (R-PA) writes to National Security Adviser Condoleezza Rice asking for “clarification about numerous stories concerning alleged mistreatment of enemy combatants in US custody” and requesting that she explain how the administration ensures that detainees rendered to other countries are not tortured. [Human Rights Watch, 5/7/2004] Unbeknownst to Specter, Rice signed off on using torture methods on prisoners over a year earlier (see Mid-May, 2002).

Entity Tags: Arlen Specter, Condoleezza Rice

Timeline Tags: Torture of US Captives

At Guantanamo, detainee Mohamed al-Khatani is given a tranquilizer, fitted with blackened goggles, and put on a plane. He is told he is being sent to a Middle Eastern country. What happens next is probably equivalent to the technique authorized under the description “false flag” by Defense Secretary Donald Rumsfeld’s April 16, 2003 memo on interrogation methods (see April 16, 2003). The plane returns to Guantanamo several hours later and he is taken to an isolation cell in the base’s brig where he is subjected to harsh interrogation procedures. He is led to believe that his interrogators are Egyptian national security operatives. In order to maintain the deception, the International Committee of the Red Cross (ICRC) is not permitted to visit Khatani during this time. [New York Times, 1/1/2005]

Entity Tags: Mohamed al-Khatani, Donald Rumsfeld, International Committee of the Red Cross

Timeline Tags: Torture of US Captives

Rohan Gunaratna.Rohan Gunaratna. [Source: George Washington University]Counterterrorism expert Rohan Gunaratna claims to know what was discussed at the al-Qaeda summit held in Malaysia in January 2000 (see January 5-8, 2000). Gunaratna has been described as an “ad hoc adviser to US intelligence officials,” and it is believed he has seen top secret transcripts of 9/11 mastermind Khalid Shaikh Mohammed’s (KSM) recent interrogations in CIA prisons. It has not been explained how he saw such transcripts, but the CIA has not disputed the assertion that he saw them. [Bergen Record, 7/10/2003] In public testimony before the 9/11 Commission, Gunaratna says that “Khalid Shaikh Mohammed chaired that meeting [in Malaysia]. The first two hijackers to enter the United States, they were present at that meeting. So the 9/11 operation is an extension of old Plan Bojinka (see January 6, 1995). So the players of old plan Bojinka, they were not all arrested.… If you read the interrogation of [KSM], who is now in US custody, he has very clearly stated how 9/11 was planned, that it originated from [Bojinka].” However, the 9/11 Commissioners do not ask him any follow-up questions about this. [9/11 Commission, 7/9/2003 pdf file] In the 9/11 Commission’s final report, there will be no mention of any suggestions KSM was at the Malaysia summit or any clear accounting as to who all the attendees were. Their report will also downplay any connections between the 1995 Bojinka plot and the 9/11 plot, which they will claim began in 1999. [9/11 Commission, 7/24/2004, pp. 153-154] However, later on the same day as his testimony, Gunaratna will give more details of what he claims to have learned from KSM’s interrogations in an interview with a reporter. He says that at the summit KSM said al-Qaeda operatives would need to learn to fly commercial airliners in the US as part of a “suicide operation.” However, although KSM had already agreed on the targets with bin Laden, the World Trade Center and the Pentagon were not mentioned at the summit. KSM “was careful not to discuss all the specific plans at that meeting.” The reporter who interviewed Gunaratna notes that “some US intelligence officials” have “pooh-poohed the significance of the Malaysian meeting as a link to Sept. 11,” and if KSM was at the meeting, that “further underscores how the CIA missed an opportunity” to stop the 9/11 attacks. [Bergen Record, 7/10/2003] The CIA had Malaysian intelligence photograph and film the attendees of the summit as they were coming and going, but apparently there was no attempt to monitor what was said in the summit meetings (see January 5-8, 2000 and Shortly After). If Gunaratna is correct, it suggests that the CIA and 9/11 Commission may have withheld some details of KSM’s interrogations to the public that are embarrassing to US intelligence agencies. Note also that doubts have been expressed about the reliability of KSM’s testimony, which was at least partly obtained through the use of torture (see June 16, 2004).

Entity Tags: Central Intelligence Agency, Al-Qaeda, 9/11 Commission, Khalid Shaikh Mohammed, Rohan Gunaratna

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Senator John D. Rockefeller.Senator John D. Rockefeller. [Source: ViewImages.com]John D. Rockefeller (D-WV), the ranking member of the Senate Intelligence Committee, learns of the secret NSA warrantless wiretapping program against US citizens (see Early 2002) in a secret briefing for himself, the chairman of the committee, and the chairman and ranking member of the House Intelligence Committee. Hours later, Rockefeller sends a handwritten letter to Vice President Cheney expressing his concerns about the potential illegality of the program, concerns he apparently expressed in the briefing as well. Rockefeller will not release the letter publicly until December 19, 2005, four days after the New York Times publishes an article revealing the program’s existence (see December 15, 2005). Disturbed both by the information he was given and the information that was obviously being withheld, Rockefeller writes in part: “Clearly the activities we discussed raise profound oversight issues.… Given the security restrictions associated with this information, and my inability to consult staff or counsel on my own [Cheney had prohibited Rockefeller and the three other lawmakers in the briefing from consulting with their staff experts], I feel unable to fully evaluate, much less endorse these activities. As I reflected on the meeting today, and the future we face, John Poindexter’s TIA [Total Information Awareness (see March 2002)] project sprung to mind, exacerbating my concern regarding the direction the administration is moving with regard to security, technology, and surveillance. Without more information and the ability to draw on any independent legal or technical expertise, I simply cannot satisfy lingering concerns raised by the briefing we received.” [Democratic Party, 12/19/2005; Savage, 2007, pp. 115] Rockefeller also notes that he is not at liberty to do anything about his concerns, since he is legally bound to obey the secrecy rules the White House has invoked, but he wants his concerns noted. [Savage, 2007, pp. 116] It is unclear whether Rockefeller ever receives a reply. Rockefeller is apparently unaware of evidence showing that domestic surveillance may have begun well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: New York Times, Richard (“Dick”) Cheney, John D. Rockefeller, John Poindexter, Total Information Awareness, National Security Agency

Timeline Tags: Civil Liberties

Mohammed Nazir Bin Lep (a.k.a. Lillie).Mohammed Nazir Bin Lep (a.k.a. Lillie). [Source: Defense Department]Hambali (a.k.a. Riduan Isamuddin) is arrested in Thailand in a joint US-Thai operation. He has been considered the operational leader of al-Qaeda in Southeast Asia. He was involved in the Bojinka plot in 1995, attended the January 2000 al-Qaeda summit in Malaysia (see January 5-8, 2000), and was said to be involved in the 2002 bombing of two nightclubs in Bali, Indonesia (see October 12, 2002), the 2003 bombing of a Marriott Hotel in Jakarta, Indonesia (see August 5, 2003), and other similar acts. He is taken into US custody and is said to quickly and fully cooperate with his captors. [Chicago Tribune, 12/7/2003] According to the Washington Post, at some point he will be transferred to the US naval base at the British island colony of Diego Garcia, where the CIA is believed to have a secret interrogation center. [Washington Post, 12/17/2004; Washington Post, 1/2/2005, pp. A01] Two of Hambali’s associates - Mohamad Farik Amin (a.k.a. Zubair), and Mohammed Nazir Bin Lep (a.k.a. Lillie) - are arrested with him. Both are Malaysians and are said to be al-Qaeda operatives. Supposedly they were members of a four person suicide squad working for Hambali and Khalid Shaikh Mohammed to hijack an airplane (see October 2001-February 2002). [Time, 10/6/2003] The US will later classify both of them, and Hambali, as about a dozen of the top al-Qaeda operatives in US custody (see September 2-3, 2006).

Entity Tags: United States, Thailand, Hambali, Mohamad Farik Amin, Khalid Shaikh Mohammed, Mohammed Nazir Bin Lep

Timeline Tags: Torture of US Captives, Complete 911 Timeline

The Joint Personnel Recovery Agency (JPRA) sends a team to Iraq to train interrogators in harsh, SERE-derived methods of interrogation (see December 2001, January 2002 and After, July 2002, and July 1-2, 2002). JPRA personnel demonstrate a number of methods to Special Military Unit (SMU) personnel, including “walling” (see May 10, 2005) and particular methods of physically striking detainees. JPRA personnel are present at several interrogations where detainees are placed in stress positions and repeatedly slapped. In at least one interrogation, JPRA personnel take part in abusing a prisoner, stripping him naked and giving orders to place him in a stress position for 12 hours. In August 2007, one JRPA official will tell the Senate Armed Services Committee that, in regards to stripping detainees, “we [had] done this 100 times, 1,000 times with our [SERE school] students.” [Huffington Post, 4/21/2009]

Entity Tags: Senate Armed Services Committee, Joint Personnel Recovery Agency

Timeline Tags: Torture of US Captives

A team of military lawyers in Iraq issues a memo detailing a new set of interrogation rules entitled, CJTF-7 Interrogation and Counter-Resistance Policy (ICRP). The team—headed by the highest legal expert within the US military apparatus in Iraq, Col. Marc Warren, the staff judge advocate for Combined Joint Task Force (CJTF) 7—includes Capt. Fitch, the command judge advocate with Col. Thomas M. Pappas’ 205th Military Intelligence Brigade, and Maj. Daniel Kazmier and Maj Franklin D. Raab, both from the CJTF-7 Office of the Staff Judge Advocate (OSJA). In crafting the memo, Fitch “copie[s]” Defense Secretary Donald Rumsfeld’s April 16, 2003 memo (see April 16, 2003), intended for Guantanamo, “almost verbatim.” The draft is then sent to the 519th Military Intelligence Battalion for comment. The 519th adds techniques from its own August 27, 2003 memo (see August 27, 2003), including “the use of dogs, stress positions, sleep management, sensory deprivation,… yelling, loud music, and light control.” The techniques listed in the final version of the memo apply to all categories of detainees. [US Department of Defense, 8/23/2004 pdf file] Sleep management and sensory deprivation are also part of the Guantanamo set of interrogation techniques. The other more aggressive methods—the use of dogs, stress positions, and yelling, loud music, and light control—are extras.

Entity Tags: Donald Rumsfeld, Daniel Kazmier, Marc Warren, Brent Fitch, Franklin D. Raab, Thomas M. Pappas

Timeline Tags: Torture of US Captives

The legal experts at the Office of the Staff Judge Advocate (OSJA) issue a memorandum amending the set of interrogation rules included in a September 10 memo (see September 10, 2003) by military legal experts in Iraq. The additional methods included in that memo can only be used with prior approval by Lieutenant General Ricardo Sanchez on a case-by-case basis, the OSJA document says. [US Department of Defense, 8/23/2004 pdf file] Like Major General Geoffrey Miller, the OSJA stresses the importance of collaboration between MPs and intelligence personnel. It also provides “safeguards such as legal reviews of the interrogation plans and scrutiny of how they were carried out,” the Washington Post later reports. [Washington Post, 6/12/2004] Additionally, the memo discusses how the Arab fear of dogs can be exploited. [US Department of Defense, 8/23/2004 pdf file] According to a later report (see August 25, 2004) by General George R. Fay, interrogators at Abu Ghraib immediately adopt the new set of rules. But Staff Judge Advocate Colonel Mark Warren will recall that the memo is not implemented until its approval by the US Central Command (CENTCOM). [US Department of Defense, 8/23/2004 pdf file] Evidence, however, supports the Fay report. “After mid-September 2003,” Fay will write, “all [s]oldiers assigned to Abu Ghraib had to read a memorandum titled IROE [Interrogations Rules of Engagement], acknowledging they understood the ICRP, and sign a confirmation sheet indicating they had read and understood the ICRP.” [US Department of Defense, 8/23/2004 pdf file] According to classified documents uncovered by the Senate Armed Services Committee (see April 21, 2009), CENTCOM lawyers begin objecting to the policies almost immediately. One e-mail, from a CENTCOM lawyer to a Staff Judge Advocate, warns, “Many of the techniques appear to violate [Geneva Conventions] III and IV and should not be used.” [Huffington Post, 4/21/2009]

Entity Tags: George R. Fay, Senate Armed Services Committee, Geoffrey D. Miller, Marc Warren, Ricardo S. Sanchez

Timeline Tags: Torture of US Captives

In an interview, a key 9/11 Commission staffer, Doug MacEachin, reportedly agrees with an important witness, FBI agent Ali Soufan, that the CIA deliberately withheld from the bureau the knowledge that al-Qaeda leader Khallad bin Attash had attended al-Qaeda’s Malaysia summit and was therefore linked to 9/11 hijacker Khalid Almihdhar. [Soufan, 2011, pp. 301-302] However, the Commission’s final report will call the non-passage of this intelligence “an example of how day-to-day gaps in intelligence sharing can emerge even when there is mutual goodwill.” [9/11 Commission, 7/24/2004, pp. 267] This interview appears to be the second time the Commission talks to Soufan, which is on September 15, 2003. [9/11 Commission, 7/24/2004, pp. 507; Soufan, 2011, pp. 297-302] Soufan discusses the case of “Omar,” a joint FBI-CIA source inside al-Qaeda. At an interview of Omar in January 2001 the CIA learned that bin Attash had attended al-Qaeda’s Malaysia summit in early 2000 (see January 5-8, 2000 and January 4, 2001). However, it then failed to share this with the FBI (see January 5, 2001 and After). Soufan tells the Commission’s staff: “This shows that the CIA knew the significance of Malaysia, Khallad, and Almihdhar but actively went out of their way to withhold the information from us. It’s not a case of just not passing on information. This is information the FBI representative working with the source should have been told about. It was a legal requirement. Instead we were deliberately kept out of the loop.” A staffer responds that the CIA claims it shared the information, and Soufan asks whether the Commission checked the “regular cables” between the field and CIA headquarters. After the staffer says they have, Soufan asks whether the Commission has checked the “operational traffic,” and MacEachin responds, “That must be it.” Other staffers are initially puzzled by McEachin’s comment, but he explains it to them. Soufan will comment: “Operational traffic refers to cables sent during an operation. The officer will list procedures, leaving a record in case something goes wrong or something needs to be referred to. Because these cables are strictly procedural and not related to intelligence, they would not be sent to the FBI. If someone wanted to hide something from the FBI, that’s where he would put it. Because Doug had worked for the CIA, he knew what operational cables were, while other members of the team might not have.” The Commission later finds that the information about bin Attash was in an operational cable. [Soufan, 2011, pp. 301-302] The reason for the discrepancy between MacEachin’s attitude in the interview of Soufan and the Commission’s final report is unknown.

Entity Tags: Doug MacEachin, Federal Bureau of Investigation, 9/11 Commission, Ali Soufan

Timeline Tags: Complete 911 Timeline

An Associated Press (AP) report provides details of what alleged 9/11 mastermind Khalid Shaikh Mohammed (KSM) has apparently told his CIA interrogators. The article, based on “interrogation reports” reviewed by the AP, makes the following claims:
bullet KSM worked on the Bojinka plot in 1994 and 1995 in the Philippines with Ramzi Yousef, Abdul Hakim Murad, and Wali Khan Amin Shah;
bullet After Yousef and Murad were captured (see January 6, 1995 and February 7, 1995), KSM began to devise a new plot that focused on hijackings on US soil;
bullet KSM first pitched the 9/11 plot to Osama bin Laden in 1996. He wanted bin Laden “to give him money and operatives so he could hijack 10 planes in the United States and fly them into targets”;
bullet After bin Laden agreed in principle, the original plan, which called for hijacking five commercial jets on each US coast, was modified several times. Some versions even had the planes being blown up in mid-air, possibly with the aid of shoe bombs. Bin Laden scrapped various parts of the plan, including attacks on both coasts and hijacking or bombing some planes in East Asia as well;
bullet The original four al-Qaeda operatives bin Laden offered KSM for the plot were eventual hijackers Nawaf Alhazmi and Khalid Almihdhar, as well as Khallad bin Attash and Abu Bara al-Yemeni. “All four operatives only knew that they had volunteered for a martyrdom operation involving planes,” one interrogation report apparently states;
bullet The first major change to the plans occurred in 1999 when the two Yemeni operatives could not get US visas (see April 3, 1999). [Associated Press, 9/21/2003] (According to the 9/11 Commission Report, KSM actually says Abu Bara al-Yemeni never applied for a US visa); [9/11 Commission, 7/24/2004, pp. 492]
bullet Bin Laden then offered KSM additional operatives, including a member of his personal security detail;
bullet At that time the plot was to hijack a small number of planes in the United States and East Asia and either have them explode or crash into targets simultaneously;
bullet In 1999, the four original operatives picked for the plot traveled to Afghanistan to train at one of bin Laden’s camps, where they received specialized commando training (see Late 1999);
bullet Al-Qaeda’s Malaysia summit (see January 5-8, 2000) was, according to the report, a “key event in the plot,” although it does not say whether KSM was physically present. On the other hand, it confirms the presence of Jemaah Islamiyah leader Hambali;
bullet KSM communicated with Alhazmi and Almihdhar while they were in the US using Internet chat software;
bullet KSM has never heard of Omar al-Bayoumi, an apparent Saudi intelligence agent who provided some assistance to future 9/11 hijackers Khalid Almihdhar and Nawaf Alhazmi when they arrived in California. Neither did he arrange for anyone else in the US to assist Almihdhar and Alhazmi when they arrived in California. Despite this, Almihdhar and Alhazmi soon made contact with a network of people linked to Saudi intelligence services (see January 15-February 2000 and June 23-July 2001);
bullet Bin Laden canceled the East Asian portion of the attacks in the spring of 2000, because, according to a quote from KSM contained in a report, “it would be too difficult to synchronize” attacks in the United States and Asia;
bullet Around that time, KSM reached out to Jemaah Islamiyah, an al-Qaeda affiliate in Southeast Asia. He began “recruiting JI operatives for inclusion in the hijacking plot as part of his second wave of hijacking attacks to occur after Sept. 11,” one summary reportedly says;
bullet Zacarias Moussaoui also went to Malaysia in the run-up to 9/11 (see September-October 2000);
bullet In its final stages, the plan called for as many as 22 terrorists and four planes in a first wave, followed by a second wave of suicide hijackings that were to be aided possibly by al-Qaeda allies in Southeast Asia;
bullet The hijacking teams were originally made up of members from different countries where al-Qaeda had recruited, but in the final stages bin Laden chose instead to use a large group of young Saudi men to populate the hijacking teams;
bullet KSM told interrogators about other terror plots that were in various stages of planning or had been temporarily disrupted when he was captured, including one planned for Singapore (see June 2001 and November 15-Late December 2001);
bullet KSM and al-Qaeda were still actively looking to strike US, Western, and Israeli targets across the world as of this year. [Associated Press, 9/21/2003]
These statements attributed to KSM are similar to later statements attributed to him by the 9/11 Commission Report. [9/11 Commission, 7/24/2004] The Associated Press article cautions that US authorities are still investigating what KSM is telling them, “to eliminate deliberate misinformation.” [Associated Press, 9/21/2003] KSM made some or all these statements under torture, leading some to question their reliability (see Shortly After February 29 or March 1, 2003, After March 7, 2003, June 16, 2004, and August 6, 2007).

Entity Tags: Central Intelligence Agency, Khalid Shaikh Mohammed

Timeline Tags: Complete 911 Timeline

A portion of the outer door of AT&T’s Folsom Street facility.A portion of the outer door of AT&T’s Folsom Street facility. [Source: Wired News]Senior AT&T technician Mark Klein (see July 7, 2009), newly assigned to the company’s Folsom Street facility in San Francisco, is tasked to work at the seventh floor “Internet room,” where AT&T manages much of its domestic Internet traffic. Klein is intensely curious about the National Security Agency’s “secret room” on the sixth floor (see January 2003). The NSA room has two doors, both labeled “641A,” and is in reality what Klein will later term “a room within a room,” with the outer room filled with ordinary “computer equipment for mundane corporate uses.” He does not know what is in the inner “secret” room. Klein will later write, “While working in the outer room, you could walk around three sides of the secret room, which I measured to be about 24 by 48 feet.” An outer door leads from Room 641A to the 4ESS switchroom, which AT&T uses to manage its long-distance telephone communications. The rooms are connected by “row after row of equipment and a tangle of cabling going up and across the ceiling.” Klein learns that the NSA room is sometimes called “the SIMS room,” an acronym of which no one seems to know the meaning. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 32-34] Klein will later describe his job at the Folsom Street facility as working with the phone switch equipment on the sixth floor, “which handled the public’s telephone calls and was the workhorse of the phone system.… My main assignment was to oversee the Internet room, and that meant keeping it going. If there were any trouble calls, I had to answer them. If there’s any upgrading work to do, I had to either do it or arrange for others to do it in off hours. Just oversee the flow of work in the Internet room and watch things.” He also spends a tremendous amount of time on the seventh floor, “where the Internet room was.… That’s where there are a lot of Cisco routers, a lot of fiber-optic lines coming in and going out.” The Folsom Street facility serves the Bay Area as well as much of Western America. According to Klein: “There’s lots of Internet traffic, as you can imagine, that goes in and out of this office, probably hundreds of fiber-optic lines that go out, carrying billions—that’s billions with a ‘B’—billions of bits of data going in and out every second every day. So all the Web surfing you’re doing, whatever you’re doing on the Internet—the pictures, the video, the Voice over Internet—all that stuff’s going in and out of there. And then of course there’s also the traditional phone switch, which is doing what it’s been doing since before the Internet.… Handling millions and millions of phone calls, right. That’s its job.” [PBS Frontline, 5/15/2007]

Entity Tags: Mark Klein, AT&T, National Security Agency

Timeline Tags: Civil Liberties

The American Civil Liberties Union (ACLU), in partnership with the Center for Constitutional Rights, Physicians for Human Rights, Veterans for Common Sense, and Veterans for Peace, file a Freedom of Information Act (FOIA) request for records concerning the treatment of prisoners and detainees in US custody abroad, most specifically Iraq and Afghanistan. The request is the first spark in a firestorm of legal controversies, FOIA requests, government denials, and lawsuits, as the ACLU and its partners continue to attempt to squeeze documentation out of an uncooperative administration. Although the government will continue to withhold key records, ongoing litigation results in the eventual release of over 100,000 documents, which will be used by ACLU lawyers Jameel Jaffer and Amrit Singh to compile the book Administration of Torture (see October 22, 2007), which will show that detainees have been (and will be) systematically tortured and abused under the orders of senior government officials. [Union, 10/7/2003; American Civil Liberties Union, 10/22/2007]

Entity Tags: Veterans for Common Sense, Physicians for Human Rights, Jameel Jaffer, Center for Constitutional Rights, Freedom of Information Act, Amrit Singh, Bush administration (43), American Civil Liberties Union

Timeline Tags: Torture of US Captives

The Department of Defense denies expedited processing on the ACLU request (see October 7, 2003) for the release of documents.

Timeline Tags: Torture of US Captives

After the 9/11 Commission becomes unhappy with the information it is getting from detainees in US custody who may know something about the 9/11 plot (see Summer 2003), it asks CIA Director George Tenet to let it either talk to the detainees itself, or at least view interrogations through a one-way mirror. [Kean and Hamilton, 2006, pp. 119-126]
Reasoning - Dieter Snell, the head of the Commission’s plot team and a former prosecutor, is extremely keen that the detainees, such as Khalid Shaikh Mohammed and Ramzi bin al-Shibh, be interviewed. According to author Philip Shenon, he is aware that “testimony from key witnesses like the al-Qaeda detainees would have value only if they were questioned in person, with investigators given the chance to test their credibility with follow-up questions. The face-to-face interrogations would be especially important in situations in which the al-Qaeda members were giving conflicting testimony.” [Shenon, 2008, pp. 182]
Request Denied - However, Tenet denies the request because he does not want the Commission to know where the detainees are, and he claims questioning by a Commission staffer could apparently damage the “relationship” between interrogator and detainee and “upset the flow of questioning.” In addition, Tenet is worried that if the Commission has access to the detainees, Zacarias Moussaoui might also be able to compel them to testify in court, so he rejects compromise proposals.
Pushback - The Commission decides “to push the issue” and drafts a letter outlining why they should have direct access. Although the draft is seen by Tenet and Defense Secretary Donald Rumsfeld, it is never officially sent. At a White House meeting attended by Rumsfeld and commissioners Lee Hamilton and Fred Fielding, Tenet and Attorney General Alberto Gonzales repeat the arguments Tenet made previously, but Tenet says the Commission can submit written questions, and a CIA “project manager” will try to get them answered. After the administration “plead[s]” with the Commission not to use public pressure to get access to detainees, the Commission decides to drop the matter.
Relatives and Media Blamed - Hamilton and Commission Chairman Thomas Kean will later partially blame the victims’ relatives and media for this failure: “Interestingly, there was no pressure from some of the usual sources for us to push for access. For instance, the 9/11 families never pressed us to seek access to detainees, and the media was never engaged on this issue.” Kean and Hamilton will later say that the “project manager” arrangement works “to a degree.”
Report Includes Disclaimer - However, a disclaimer will be inserted into the 9/11 Commission Report in the first of two chapters that draw heavily on detainees’ alleged statements (see After January 2004). It will say that the Commission could not fully judge the credibility of detainee information, so, according to Kean and Hamilton, “it [is] left to the reader to consider the credibility of the source—we had no opportunity to do so.” [Kean and Hamilton, 2006, pp. 119-126]
Criticism from Staffer - Commission staffer Ernest May will later criticize the Commission’s “reluctance ever to challenge the CIA’s walling off al-Qaeda detainees.” May will also say: “We never had full confidence in the interrogation reports as historical sources. Often we found more reliable the testimony that had been given in open court by those prosecuted for the East African embassy bombings and other crimes.” [New Republic, 5/23/2005] CIA videotapes and transcripts of interrogations are not provided to the Commission (see Summer 2003-January 2004).

Entity Tags: George J. Tenet, Thomas Kean, Fred F. Fielding, Lee Hamilton, US Department of Defense, Ernest May, Dietrich Snell, 9/11 Commission, Alberto R. Gonzales, Central Intelligence Agency, Donald Rumsfeld

Timeline Tags: Torture of US Captives, Complete 911 Timeline, 9/11 Timeline

Narus logo.Narus logo. [Source: Endace (.com)]Narus, a firm which manufactures telecommunications hardware, co-sponsors a technical conference in McLean, Virginia, titled “Intelligence Support Systems for Lawful Interception and Internet Surveillance.” As AT&T engineer Mark Klein (see July 7, 2009) will later write: “Police officials, FBI and DEA agents, and major telecommunications companies eager to cash in on the ‘war on terror’ had gathered in the hometown of the CIA to discuss their special problems. Among the attendees were AT&T, BellSouth, MCI, Sprint, and Verizon. Narus founder Dr. Ori Cohen gave a keynote speech.” Also speaking at the conference is William Crowley, the former deputy director of the National Security Agency (NSA). Narus is providing some of the key hardware components used in the NSA’s domestic surveillance program (see January 16, 2004). [PBS Frontline, 5/15/2007; Klein, 2009, pp. 39]

Entity Tags: Narus, AT&T, BellSouth, Mark Klein, Ori Cohen, Verizon Wireless, National Security Agency, MCI, Sprint/Nextel, William Crowley

Timeline Tags: Civil Liberties

Senior AT&T technician Mark Klein (see July 7, 2009), who is considering “blowing the whistle” on the National Security Agency’s secret data-mining operation being conducted with the complicity and participation of AT&T (see January 16, 2004), is troubleshooting a problem of “signal loss” caused by AT&T’s signals being routed through the NSA’s “splitter cabinet,” which “splits” part of the optical data flow from its normal route into the NSA’s computers, enabling the agency to monitor all of the Internet traffic going through Klein’s Folsom Street, San Francisco, facility (see October 2003). Klein learns from a fellow technician that AT&T is “getting the same problem in the other offices where splitters are going in.” Klein is stunned to learn that other AT&T facilities have NSA splitters. He learns from the other technician that the “other offices” are in, among other places, Atlanta, San Diego, San Jose, and Seattle. (Apparently neither Klein nor the other technician are aware of the NSA splitter at the central AT&T facility in Bridgeton, Missouri—see Late 2002-Early 2003). Klein will later write, “This thing was getting bigger and bigger.” Klein determines that the NSA splitter is causing the signal loss: “The company was degrading the signal quality of its network for the sake of the NSA.”
Visiting the Secret Room - Klein accompanies an AT&T field support specialist named Rick into the NSA’s “secret room” at the Folsom Street building, with the intention of repairing the splitter problem. Rick is one of the few AT&T technicians authorized to work in the room; he invites Klein to join him and Klein agrees. Klein watches Rick punch the entry code into the lock of Room 641A and follows him inside. Klein observes a large amount of hardware, most installed in what he will later call “standard cabinets used by the telecommunications industry,” along with a computer workstation and a set of storage lockers. Klein later says he spends no more than two minutes inside the secret room. He will recall: “[I]f I didn’t know that the NSA was involved, it would look like any other work space where telecom people work, with rows of cabinets with equipment inside them, humming.… [T]he odd thing about the whole room, of course, was that I couldn’t normally get in there, nor could any of the other union technicians. Only this one guy who had clearance from the NSA could get in there, so that changed the whole context of what this is about.” Shortly thereafter, Rick tells Klein and a group of employees that he has keys allowing him access to the other NSA secret rooms in AT&T’s offices in San Diego, San Jose, and Seattle. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 42-44]

Entity Tags: AT&T, “Rick” (AT&T field support specialist), Mark Klein, National Security Agency

Timeline Tags: Civil Liberties

The White House and the Justice Department are at odds over the legality of the National Security Agency’s “data mining” program, which involves the NSA combing through enormous electronic databases containing personal information about millions of US citizens, ostensibly for anti-terrorism purposes and often without court warrants (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, and Early 2002). Such data mining by the NSA potentially threatens citizens’ constitutional right to privacy. This clash between the White House and the Justice Department is one of the reasons that White House counsel Alberto Gonzales and chief of staff Andrew Card will try to pressure Attorney General John Ashcroft, while Ashcroft is recuperating from surgery, to reauthorize the NSA program over the objections of Deputy Attorney General James Comey. That attempt to force reauthorization over Justice Department complaints will result in the protest resignations of Ashcroft, Comey, and other Justice officials (see March 10-12, 2004). In 2007, Gonzales will deny that any such attempt to pressure Ashcroft to overrule Comey ever happened (see July 24, 2007), and will deny that there was any such dispute between the White House and Justice Department over the NSA program. Those denials will lead to calls to investigate Gonzales for perjury (see May 16, 2007). In late 2005, President Bush will admit, after the New York Times reveals the existence of the NSA warrantless wiretapping program (see Early 2002), that the program indeed exists, but will not acknowledge the data mining. Several current and former administration officials, interviewed by reporters in 2007, refuse to go into detail about the dispute between the White House and Justice Department, but say that it involves other issues along with the data mining. They will also refuse to explain what modifications to the surveillance program Bush will authorize to mollify Justice Department officials. Bush and his officials, including Gonzales, who will ascend to the position of attorney general in 2005, will repeatedly insist that he has the authority, both under the Constitution and under Congress’s authorization to use military force against terrorists passed after the 9/11 attacks (see September 14-18, 2001), to bypass the requirements for court warrants to monitor US citizens. Critics will say that such surveillance is illegal under the Foreign Intelligence Surveillance Act. [New York Times, 7/29/2007]
Domestic Surveillance Began Before 9/11? - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: US Department of Justice, National Security Agency, New York Times, James B. Comey Jr., Alberto R. Gonzales, Andrew Card, Bush administration (43), George W. Bush, John Ashcroft

Timeline Tags: Civil Liberties

A sample page from Mark Klein’s AT&T documentation.A sample page from Mark Klein’s AT&T documentation. [Source: Mark Klein / Seattle Times]Senior AT&T technician Mark Klein (see July 7, 2009), gravely concerned by the National Security Agency (NSA) spying operation going on in AT&T’s San Francisco facility (see October 2003) and now in possession of documents which prove the nature and scope of the telecommunications surveillance activities (see Fall 2003 and Late 2003), writes a memo summarizing his findings and conclusions. He appends eight pages of the unclassified documents he has in his possession, along with two photographs and some material from the Internet which documents the sophisticated surveillance equipment being used to gather data from AT&T’s electronic transmissions. The NSA and AT&T were, he later says, “basically sweeping up, vacuum-cleaning the Internet through all the data, sweeping it all into this secret room.… It’s the sort of thing that very intrusive, repressive governments would do, finding out about everybody’s personal data without a warrant. I knew right away that this was illegal and unconstitutional, and yet they were doing it.… I think I’m looking at something Orwellian. It’s a government, many-tentacled operation to gather daily information on what everybody in the country is doing. Your daily transactions on the Internet can be monitored with this kind of system, not just your Web surfing. All kinds of business that people do on the Internet these days—your bank transactions, your email, everything—it sort of opens a window into your entire private life, and that’s why I thought of the term ‘Orwellian.’ As you know, in [George] Orwell’s story [1984], they have cameras in your house, watching you. Well, this is the next best thing.… So I was not only angry about it; I was also scared, because I knew this authorization came from very high up—not only high up in AT&T, but high up in the government. So I was in a bit of a quandary as to what to do about it, but I thought this should be halted.”
Gathering 'the Entire Data Stream' - In his memo, Klein concludes that the NSA is using “splitter” equipment to copy “the entire data stream [emphasis in the original] and sent it to the [NSA’s] secret room for further analysis.” Klein writes that the splitters actually “split off a percentage of the light signal [from the fiber optic circuits] so it can be examined. This is the purpose of the special cabinet… circuits are connected into it, the light signal is split into two signals, one of which is diverted to the ‘secret room.’ The cabinet is totally unnecessary for the circuit to perform—in fact, it introduces problems since the signal level is reduced by the splitter—its only purpose is to enable a third party [the NSA] to examine the data flowing between sender and recipient on the Internet.” (Emphasis in the original.) In his book, Klein will explain that “each separate signal,” after being split, “contains all the information, nothing is lost, so in effect the entire data stream has been copied.” He will continue: “What screams out at you when examining this physical arrangement is that the NSA was vacuuming up everything flowing in the Internet stream: email, Web browsing, voice-over-Internet phone calls, pictures, streaming video, you name it. The splitter has no intelligence at all, it just makes a blind copy.” Klein later explains to a reporter: “The signals that go across fiber optics are laser light signals. It’s light basically that runs through a fiber optic, which is a clear glass fiber, and it has to be at a certain level for the routers to see the light and interpret the data correctly. If the light gets too low, just as if you get a weak flashlight with bad batteries, at a certain point it doesn’t work. If the light level drops too low, the router starts dropping bits and getting errors, and eventually you get loss of signal, and it just doesn’t work at all.… The effect of the splitter is to reduce the strength of the signal, and that may or may not cause a problem, depending on how much the signal is reduced.” A telecommunications company would not, as a rule, use such a splitter on its backbone Internet traffic because of the risk of degraded signal quality. “You want to have as few connections on your main data lines as possible,” Klein will say, “because each connection reduces the signal strength, and a splitter is a connection, and if you can avoid that, all the better.”
Inherently Illegal - Klein will explain that there is no way these activities are legal: “There could not possibly be a legal warrant for this, since according to the Fourth Amendment, warrants have to be specific, ‘particularly describing the place to be searched and the persons or things to be seized.’ It was also a blatant violation of the 1978 Foreign Intelligence Surveillance Act [FISA—see 1978], which calls for specific warrants as required by the Fourth Amendment. This was a massive blind copying of the communications of millions of people, foreign and domestic, randomly mixed together. From a legal standpoint, it does not matter what they claim to throw away later in their secret rooms, the violation has already occurred at the splitter.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 37, 119-133]
The Narus STA 6400 - Klein discusses one key piece of equipment in the NSA’s secret room, the Narus STA 6400 (see Late 2003). Narus is a firm that routinely sells its equipment not only to telecom firms such as AT&T, “but also to police, military, and intelligence officials” (see November 13-14, 2003). Quoting an April 2000 article in Telecommunications magazine, Klein writes that the STA 6400 is a group of signal “traffic analyzers that collect network and customer usage information in real time directly from the message.… These analyzers sit on the message pipe into the ISP [Internet Service Provider] cloud rather than tap into each router or ISP device.” Klein quotes a 1999 Narus press release that says its Semantic Traffic Analysis (STA) technology “captures comprehensive customer usage data… and transforms it into actionable information… [it] is the only technology that provides complete visibility for all Internet applications.” The Narus hardware allows the NSA “to look at the content of every data packet going by, not just the addressing information,” Klein will later write.
A 'Dream Machine for a Police State' - Klein later writes of the Narus STA 6400: “It is the dream machine of a police state, one that even George Orwell could not imagine. Not only does it enable the government to see what millions of people are saying and doing every day, but it can build up a database which reveals the connections among social groups—who’s calling and emailing whom. Such a device can easily be turned against all dissident protest groups, and even the Democratic and Republican parties, with devastating effect. And it’s in the hands of the executive power, in total secrecy.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; Klein, 2009, pp. 37-40] In support of the memo and an ensuing lawsuit against AT&T (see January 31, 2006), Klein will later write: “Despite what we are hearing, and considering the public track record of this administration, I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or is otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” [Wired News, 4/7/2006]

Entity Tags: National Security Agency, Narus, Mark Klein, Foreign Intelligence Surveillance Act, AT&T

Timeline Tags: Civil Liberties

Other 9/11 Commission reports are heavily based on detainee interrogations. The red underlines are endnotes based on the interrogation of Abu Zubaida in the 9/11 Commission’s Terrorist Travel Monograph.Other 9/11 Commission reports are heavily based on detainee interrogations. The red underlines are endnotes based on the interrogation of Abu Zubaida in the 9/11 Commission’s Terrorist Travel Monograph. [Source: Public domain via Wikipedia] (click image to enlarge)Following unsuccessful attempts by the 9/11 Commission to get direct access to high-value detainees on which some sections of its report will be based (see Summer 2003 and November 5, 2003-January 2004), the Commission decides to add a disclaimer to its report at the beginning of Chapter 5, the first of two that describe the development of the 9/11 plot. The disclaimer, entitled “Detainee Interrogation Reports,” reads: “Chapters 5 and 7 rely heavily on information obtained from captured al-Qaeda members. A number of these ‘detainees’ have firsthand knowledge of the 9/11 plot. Assessing the truth of statements by these witnesses—sworn enemies of the United States—is challenging. Our access to them has been limited to the review of intelligence reports based on communications received from the locations where the actual interrogations take place. We submitted questions for use in the interrogations, but had no control over whether, when, or how questions of particular interest would be asked. Nor were we allowed to talk to the interrogators so that we could better judge the credibility of the detainees and clarify ambiguities in the reporting. We were told that our requests might disrupt the sensitive interrogation process. We have nonetheless decided to include information from captured 9/11 conspirators and al-Qaeda members in our report. We have evaluated their statements carefully and have attempted to corroborate them with documents and statements of others. In this report, we indicate where such statements provide the foundation for our narrative. We have been authorized to identify by name only ten detainees whose custody has been confirmed officially by the US government.” [9/11 Commission, 7/24/2004, pp. 146] Most of the endnotes to the report indicate the sources of information contained in the main body of the text. Of the 132 endnotes for Chapter 5, 83 of them cite detainee interrogations as a source of information contained in the report. Of the 192 endnotes for Chapter 7, 89 cite interrogations. [9/11 Commission, 7/24/2004, pp. 488-499, 513-533] The interrogation of 9/11 mastermind Khalid Shaikh Mohammed (KSM) is mentioned as a source 211 times. [9/11 Commission, 7/24/2004] He was repeatedly waterboarded and tortured (see Shortly After February 29 or March 1, 2003) and it will later be reported that up to 90 percent of the information obtained from his interrogations may be unreliable (see August 6, 2007). Interestingly, the 9/11 Commission sometimes seems to prefer KSM’s testimony over other sources. For instance, in 2003 the 9/11 Congressional Inquiry reported that the CIA learned in 1996 that KSM and bin Laden traveled together to a foreign country in 1995, suggesting close ties between them (see 1996). But the 9/11 Commission will ignore this and instead claim, based on KSM’s interrogation, that KSM and bin Laden had no contact between 1989 and late 1996. [US Congress, 7/24/2003; 9/11 Commission, 7/24/2004, pp. 148-148, 489] The interrogations of al-Qaeda leader Khallad bin Attash are used as a source 74 times, 9/11 hijacker associate Ramzi bin al-Shibh, 68 times, al-Qaeda leader Abd al-Rahim al-Nashiri, 14 times, al-Qaeda leader Hambali, 13 times, and and a generic “interrogation[s] of detainee” is used as a source 57 times. [9/11 Commission, 7/24/2004] Most of these detainees are said to be tortured (see May 2002-2003 and Shortly After February 29 or March 1, 2003). Although the CIA videotaped some of the interrogations, it does not pass the videos to the 9/11 Commission (see Summer 2003-January 2004). Slate magazine will later say that these detainees’ accounts are “woven into the commission’s narrative, and nowhere does the 9/11 report delve into interrogation tactics or make any recommendations about the government’s continuing or future practices. That wasn’t the commission’s mandate. Still, one wonders where video evidence—or the knowledge that such evidence was being withheld—might have led it.” [Slate, 12/10/2007]

Entity Tags: Ramzi bin al-Shibh, Khalid Shaikh Mohammed, 9/11 Commission, Abd al-Rahim al-Nashiri, Hambali, Khallad bin Attash

Timeline Tags: Torture of US Captives, Complete 911 Timeline

Thomas Tamm.Thomas Tamm. [Source: Newsweek]Thomas Tamm, a veteran Justice Department prosecutor with a high-level security clearance, is finishing up a yearlong post with the Office of Intelligence Policy and Review (OIPR), a Justice Department unit handling wiretaps of suspected terrorists and spies. As his stint is coming to a close, Tamm learns of the existence of a highly classified National Security Agency (NSA) program that is electronically eavesdropping on American citizens—domestic wiretapping. He later learns that “the program,” as it is referred to by those few who know of it at all, is called “Stellar Wind.”
Concealment from FISA Judges - Tamm learns that the NSA program is being hidden from the Foreign Intelligence Surveillance Act (FISA) Court, a panel of federal judges who by law must approve and supervise such surveillance for intelligence purposes. OIPR lawyers ask the FISA Court for permission to implement national-security wiretaps. But, Tamm learns, some wiretaps—signed only by Attorney General John Ashcroft—are going to the chief FISA Court judge and not the other ten judges on the FISA panel. The “AG-only” requests are extraordinarily secretive, and involve information gleaned from what is only referred to as “the program”—Stellar Wind. Only a very few White House and US intelligence officials know the name and the nature of “the program.” Stellar Wind involves domestic wiretaps on telephones and computer e-mail accounts derived from, but not necessarily linked to, information secured from captured al-Qaeda computers and cell phones overseas. With the voluntary cooperation of American telecommunications companies (see 1997-August 2007 and After, February 2001, February 2001, and February 2001 and Beyond), the NSA program also collects vast amounts of personal data about US citizens’ phone and e-mail communications. The program also collects an enormous amount of financial information from the Treasury Department (see February 28, 2006), all collected as part of the NSA’s “data mining” efforts (see Late 1999 and After September 11, 2001).
Program Is 'Probably Illegal,' Says DOJ Official - Tamm, suspicious about the unusual requests, asks his supervisors about the program, and is told to drop the subject. “[N]o one wanted to talk about it,” he will recall. Tamm asks one of his supervisors, Lisa Farabee, “Do you know what the program is?” Farabee replies: “Don’t even go there.… I assume what they are doing is illegal.” Tamm is horrified. His first thought, he will later recall, is, “I’m a law enforcement officer and I’m participating in something that is illegal?” Tamm soon finds out from deputy OIPR counsel Mark Bradley that the chief FISA judge, Colleen Kollar-Kotelly, is raising unwanted questions about the warrant requests (see 2004 and 2005), and “the AG-only cases are being shut down.” Bradley adds, “This may be [a time] the attorney general gets indicted.”
Request for Guidance Turned Down - For weeks, Tamm agonizes over what to do. He seeks guidance from a former colleague, Sandra Wilkinson, who now works on the Senate Judiciary Committee. The two have coffee in the Senate cafeteria, and Tamm asks Wilkinson to ask if anyone on the committee knows anything about “the program.” Weeks go by without a response, and Tamm sends Wilkinson an e-mail from his OIPR computer—an e-mail that will later alert the FBI to Tamm’s interest in Stellar Wind. During a second conversation, Wilkinson refuses to give Tamm any information. “Well, you know, then,” he replies, “I think my only option is to go to the press.”
Contacting the New York Times - Tamm finally decides to contact the New York Times’s Eric Lichtblau, who has written several stories on the Justice Department that impressed Tamm. By this point he has transferred out of OIPR and back into a Justice Department office that would allow him to return to the courtroom. Tamm calls Lichtblau from a pay phone near the US District Courthouse in Washington. “My whole body was shaking,” he will recall. He identifies himself only as “Mark” (his middle name), and arranges to meet Lichtblau at a bookstore near the Justice Department. (In his 2008 book Bush’s Law: The Remaking of American Justice, Lichtblau describes Tamm as “a walk-in” source who was “agitated about something going on in the intelligence community.” Lichtblau will describe Tamm as wary and “maddeningly vague,” but as they continue to meet—usually in bookstores and coffee shops in the Capitol District—Tamm’s “credibility and his bona fides became clear and his angst appears sincere. Eighteen months later, after finally overriding a request and warning from President Bush not to print the story (see December 6, 2005), the Times reports on the existence of the NSA program (see December 15, 2005). [Ars Technica, 12/16/2008; Newsweek, 12/22/2008]

Entity Tags: Mark Bradley, Federal Bureau of Investigation, Eric Lichtblau, Colleen Kollar-Kotelly, Bush administration (43), ’Stellar Wind’, Foreign Intelligence Surveillance Court, Lisa Farabee, Senate Judiciary Committee, Thomas Tamm, Sandra Wilkinson, Office of Intelligence Policy and Review, New York Times, US Department of the Treasury, National Security Agency, US Department of Justice, John Ashcroft

Timeline Tags: Civil Liberties

Chuck Rosenberg.Chuck Rosenberg. [Source: Associated Press / Charles Dharapak]Vice President Dick Cheney challenges objections to the White House’s secret, warrantless surveillance program (see Early 2002) by Justice Department officials. Cheney makes his objections during a meeting attended by high-level White House and Justice Department officials, but this does not come to light until a 2007 testimony by Deputy Attorney General James Comey (see May 15, 2007). [Washington Post, 6/7/2007] (Comey will step down from his post in mid-2005.) [Law.com, 4/21/2005] The White House meetings take place one day before White House officials journey to Attorney General John Ashcroft’s hospital room to try to force Ashcroft to give his approval for the NSA-managed surveillance program (see March 10-12, 2004). Ashcroft will refuse to give his approval. Cheney’s key role in leading what the Washington Post calls “a fierce internal battle over the legality of the warrantless surveillance program” is not known until Comey’s 2007 testimony. The White House meeting, held to discuss Justice Department objections to the NSA program, is attended by Cheney, White House counsel and future attorney general Alberto Gonzales, Cheney’s chief counsel David Addington, and others. Comey will testify that at the time, eight Justice Department officials are prepared to resign if the White House doesn’t back down on forcing the department to sign off on the program. Those officials include FBI director Robert Mueller, US attorney Chuck Rosenberg of the northern Virginia district, and Office of Legal Counsel head Jack Goldsmith. [Washington Post, 6/7/2007]

Entity Tags: Washington Post, US Department of Justice, Robert S. Mueller III, John Ashcroft, Alberto R. Gonzales, Chuck Rosenberg, David S. Addington, Richard (“Dick”) Cheney, James B. Comey Jr., Jack Goldsmith

Timeline Tags: Civil Liberties

Vice President Dick Cheney gives the Congressional leaders known as the “Gang of Eight”—the House speaker and House minority leader, the Senate majority and minority leaders, and the ranking members of the House and Senate intelligence committees—their first briefing on the NSA’s warrantless wiretapping program (see Early 2002). The Democratic leaders at the meeting are House Minority Leader Nancy Pelosi (D-CA), Senate Minority Leader Tom Daschle (D-SD), House Intelligence Committee ranking member Jane Harman (D-CA), and Senate Intelligence Committee ranking member John D. Rockefeller (D-WV). Daschle (D-SD) later recalls the meeting as superficial. Cheney “talked like it was something routine,” Daschle will say. “We really had no idea what it was about.” Unbeknownst to many of the Congressional leaders, White House and Justice Department leaders are locked in a sharp dispute over whether or not the program is legal and should be continued; Cheney is preparing to send White House counsel Alberto Gonzales and chief of staff Andrew Card to Attorney General John Ashcroft’s hospital room to persuade the gravely ill, heavily sedated Ashcroft to overrule acting Attorney General James Comey and reauthorize the program (see March 10-12, 2004). The briefing is designed to give the appearance of Congressional approval for the program. While most Republicans in the briefing give at least tacit approval of the program, some Democrats, as Daschle will recall, expressed “a lot of concerns” over the program’s apparent violation of fundamental Congressional rights. Pelosi later recalls that she “made clear my disagreement with what the White House was asking.” But administration officials such as Gonzales will later say (see July 24, 2007) that the eight Congressional leaders are in “consensus” in supporting the program, a characterization that is patently false (see July 25, 2007). Gonzales will also later testify that today’s briefing does not cover the NSA wiretapping program, later dubbed the “Terrorist Surveillance Program” (TSP), another apparent falsehood contradicted by Democratic senators such as Rockefeller and Russ Feingold, as well as testimony and notes on the hospital room visit made by FBI Director Robert Mueller and a memo from John Negroponte, the director of national intelligence. Many feel that Gonzales is using the moniker “Terrorist Surveillance Program,” not in use until December 2005, to play what reporter Michael Isikoff calls “verbal parsing” and “a semantic game”—since the NSA wiretapping program is not known by this name at the time of the Congressional briefing, Gonzales will imply that the briefing wasn’t about that program. [Newsweek, 8/6/2007; Klein, 2009, pp. 88]
Cheney, Gonzales: Democrats on Board with Illegal Program - In Angler: The Cheney Vice Presidency, a 2008 book by Washington Post reporter Barton Gellman, Gonzales will claim there is a “consensus in the room” among Democrats and Republicans alike, and according to Gellman’s reporting on Gonzales, “four Democrats and four Republicans, duly informed that the Justice Department had ruled something unlawful, said the White House should do it anyway.” Cheney will confirm this allegation during a December 2008 appearance on Fox News. [Klein, 2009, pp. 88]
Domestic Surveillance Began before 9/11? - Cheney fails to inform the lawmakers that the wiretapping program may have begun well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: Richard (“Dick”) Cheney, National Security Agency, Robert S. Mueller III, Terrorist Surveillance Program, Tom Daschle, US Department of Justice, Russell D. Feingold, Nancy Pelosi, John Negroponte, John D. Rockefeller, Alberto R. Gonzales, Andrew Card, Michael Isikoff, Bush administration (43), Jane Harman, James B. Comey Jr., “Gang of Eight”, John Ashcroft

Timeline Tags: Civil Liberties

After senior Justice Department officials object to the possible illegality of the National Security Agency’s secret domestic surveillance program, and refuse to sign off on its continued use, the program is suspended for several months while Justice Department officials conduct a secret audit of the program. Attorney General John Ashcroft will recertify the program at the end of the month (see Late March, 2004). The suspension is prompted by acting Attorney General James Comey’s refusal to approve the program when it comes up for its regular 45-day review, and a subsequent late-night hospital visit by White House officials Andrew Card and Alberto Gonzales to the hospital room of Attorney General John Ashcroft, where they unsuccessfully attempt to pressure Ashcroft, recuperating from surgery, to overrule Comey and approve the program (see March 10-12, 2004). Bush himself has personally reauthorized the program over 30 times since its inception after the 9/11 attacks (see Early 2002), and reauthorizes it himself after Comey and Ashcroft refuse to give it their approval. This reauthorization prompts a threat of mass resignations by Justice Department officials unless the program is brought under increased oversight. Bush will allow the Justice Department to recommend changes to the program, though those changes have never been made public. The Justice Department audits a selection of cases to see how the NSA is running the program, scrutinizing how NSA officials determine that they have probable cause to wiretap US citizens’ phones and e-mail accounts. The results of that audit have not been made public. When the program was first authorized by Bush’s executive order in early 2002, it was so secret that then-Deputy Attorney General Larry Thompson, who was active in most of the government’s most highly classified counterterrorism operations, was not given access to the program. That decision, among other elements of the program, led many Justice Department officials to worry that the program was operating outside of the Constitution and without proper oversight. Comey, Thompson’s successor, was eventually given authorization to take part in the program and to review intelligence data produced by it. Justice Department officials say that Comey takes part in overseeing the reforms that are put into place during the current audit. However, those reforms do not restrict the NSA’s authority to independently choose its eavesdropping targets, and NSA shift supervisors have the authority to decide for themselves whether there is enough evidence against a US citizen to warrant a secret wiretap. No one at the Justice Department or in the White House needs to be consulted before a wiretap is put into place. [New York Times, 12/31/2005]

Entity Tags: US Department of Justice, National Security Agency, Larry D. Thompson, Associated Press, James B. Comey Jr., John Ashcroft, Alberto R. Gonzales, George W. Bush, Andrew Card

Timeline Tags: Civil Liberties

It was disclosed in 2003 that the NSA had intercepted several calls between hijackers Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi and an al-Qaeda communications hub in Sana’a, Yemen (see Early 2000-Summer 2001 and Summer 2002-Summer 2004). But in 2004, after revelations that the NSA has been wiretapping inside the US, some media begin to re-examine the circumstances of the hijackers’ calls from the US, as the Bush administration uses the example of these calls as a justification for the NSA’s domestic wiretapping program. [New York Times, 12/16/2005; Los Angeles Times, 12/21/2005; US President, 12/26/2005 pdf file] The calls are thought to be a key aspect of the alleged intelligence failures before 9/11. In late 1998, the FBI had started plotting intercepts of al-Qaeda calls to and from the communications hub on a map (see Late 1998-Early 2002). According to author Lawrence Wright, “[h]ad a line been drawn from the [communications hub] in Yemen to Alhazmi and Almihdhar’s San Diego apartment, al-Qaeda’s presence in America would have been glaringly obvious.” [Wright, 2006, pp. 343-344] In 2006, former NSA Director Michael Hayden will tell the Senate that if the NSA’s domestic wiretapping program had been active before 9/11, the NSA would have raised the alarm over the presence of hijackers Khalid Almihdhar and Nawaf Alhazmi in San Diego. [CNN, 5/19/2006] However, reports in the press suggest otherwise. For example, in one newspaper a senior intelligence official will say that it was not technically possible for the NSA, which had a budget of around $3.6 billion in 2000, to trace the calls. “Neither the contents of the calls nor the physics of the intercepts allowed us to determine that one end of the calls was in the United States,” says the official. [Bamford, 2002, pp. 482; US News and World Report, 3/15/2004] But another report flatly contradicts this. “NSA had the technical ability to pick up the actual phone number in the US that the switchboard was calling but didn’t deploy that equipment, fearing they would be accused of domestic spying.” [MSNBC, 7/21/2004] It is unclear why concerns about domestic spying allegations would prevent the NSA from passing the information on to the FBI. Almihdhar and Alhazmi were not US citizens, but foreign nationals who had entered the US illegally claiming to be tourists. In addition, there was a wealth of evidence connecting them to al-Qaeda (see Early 1999, January 5-8, 2000, and Early 2000-Summer 2001). In any event, the NSA did reportedly disseminate dispatches about some of these US calls (see Spring-Summer 2000). Some FBI officials will later profess not to know what went wrong and why they were not notified of the hijackers’ presence in the US by other agencies. A senior counterterrorism official will say: “I don’t know if they got half the conversation or none of it or hung up or whatever. All I can tell you is we didn’t get anything from it—we being the people at the FBI who could have done something about it. So were they sitting on it? I don’t know.” [Los Angeles Times, 12/21/2005] The US intelligence community, through the CIA, also had access to the phone company’s records for the Yemeni communications hub, which would have shown what numbers were being called in the US (see Late 1998-Early 2002).

Entity Tags: Michael Hayden, Khalid Almihdhar, Federal Bureau of Investigation, National Security Agency, Ahmed al-Hada, Bush administration (43), US intelligence, Salem Alhazmi, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Deputy Attorney General James Comey sends a classified memo to Attorney General John Ashcroft. The contents of the memo are kept secret, but the American Civil Liberties Union (ACLU) will later learn that it is a briefing and summary of the Office of Legal Counsel (OLC)‘s preliminary conclusions regarding the Terrorist Surveillance Program (see March 2002). [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: James B. Comey Jr., American Civil Liberties Union, Terrorist Surveillance Program, US Department of Justice, Office of Legal Counsel (DOJ), John Ashcroft

Timeline Tags: Civil Liberties

At a speech in Hershey, Pennsylvania, supporting the USA Patriot Act (see October 26, 2001), President Bush tells listeners that all US surveillance efforts are done with warrants from the Foreign Intelligence Surveillance Act (FISA) Court: “For years, law enforcement used so-called roving wire taps to investigate organized crime. You see, what that meant is if you got a wire tap by court order—and, by the way, everything you hear about requires court order, requires there to be permission from a FISA court, for example.… See, with court approval, we have long used roving wire taps to lock up monsters—mobsters. Now [with the Patriot Act in effect] we have a chance to lock up monsters, terrorist monsters.” [White House, 4/19/2004] The next day, Bush makes a similar claim during another pro-Patriot Act speech in Buffalo. He tells listeners: “[T]here are such things as roving wiretaps. Now, by the way, any time you hear the United States government talking about wiretap, it requires—a wiretap requires a court order. Nothing has changed, by the way. When we’re talking about chasing down terrorists, we’re talking about getting a court order before we do so. It’s important for our fellow citizens to understand, when you think Patriot Act, constitutional guarantees are in place when it comes to doing what is necessary to protect our homeland, because we value the Constitution. But a roving wiretap means—it was primarily used for drug lords. A guy, a pretty intelligence drug lord would have a phone, and in old days they could just get a tap on that phone. So guess what he’d do? He’d get him another phone, particularly with the advent of the cell phones. And so he’d start changing cell phones, which made it hard for our DEA types to listen, to run down these guys polluting our streets. And that changed, the law changed on—roving wiretaps were available for chasing down drug lords. They weren’t available for chasing down terrorists, see? And that didn’t make any sense in the post-9/11 era. If we couldn’t use a tool that we’re using against mobsters on terrorists, something needed to happen. The Patriot Act changed that. So with court order, law enforcement officials can now use what’s called roving wiretaps, which will prevent a terrorist from switching cell phones in order to get a message out to one of his buddies.” [White House, 4/20/2004] Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48] Klein will call Bush’s description of the surveillance program “disingenuous,” and continue: “They present it as about phone calls. They’re just watching a few bad people who make phone calls to al-Qaeda and the Middle East, and you notice they don’t talk about the Internet hardly at all. That part of it hasn’t been revealed, because if they did, Americans would realize it’s not just a few people; it’s everybody, because the data they’re handing over is not selected out. When you run fiber optics through a splitter and you send all that data to a secret room, there’s no selecting going on there at all.… They have no way of sifting it out unless they look through it later. Now they can claim, ‘Oh, we are right as rain; we’re only doing the legal thing and selecting out a few people that we’re legally entitled to,’ but that’s only after they get all the data. The analogy I use: If the government claims: ‘Well, when you do your taxes, why don’t you just write me a blank check and we’ll fill in the amount? Don’t worry. We’ll do it legal. We’ll fill in the right amount,’ would you do that? Nobody would trust the government by writing a blank check to them. It’s the same thing with the data we’re giving them.… [T]he Fourth Amendment specifically bans general warrants. It calls for specific warrants in which the things to be seized and the persons to be seized are specifically named. There’s a reason for that. It’s to protect against arbitrary government power. And what they’ve done is to trample over the Fourth Amendment by basically instituting a general warrant on the Internet.” [PBS Frontline, 5/15/2007]

Entity Tags: Foreign Intelligence Surveillance Court, Mark Klein, National Security Agency, George W. Bush

Timeline Tags: Civil Liberties

CIA Director George Tenet orders a suspension of waterboarding and some other aggressive interrogation techniques. Intelligence officials will later claim that the Abu Ghraib scandal publicized in April 2004 (see April 28, 2004), is a major factor in the decision. Additionally, the CIA’s Inspector General finishes a secret report around the same time the Abu Ghraib scandal breaks, an it suggests that many aggressive techniques may violate an international treaty against torture that the US has signed (see May 7, 2004). NBC News will later claim that the biggest reason is the worry: “Could CIA officials, including both the interrogators and their superiors, ultimately be prosecuted?” [MSNBC, 9/13/2007] The CIA approved a list of about 10 aggressive techniques, including waterboarding, in March 2002 (see Mid-March 2002), and used them on many high-ranking al-Qaeda detainees until this time (see March 28, 2002-Mid-2004). But the CIA suspends their use until the Justice Department can conduct a legal review. One former senior CIA official will say in June 2004, “Everything’s on hold. The whole thing has been stopped until we sort out whether we are sure we’re on legal ground.” [Washington Post, 6/27/2004] In December 2004, the Justice Department will publicly issue a new and public memo allowing the use of some aggressive techniques (see December 30, 2004). Then, in February 2005, it will secretly issue another memo that goes further, and will even allow the CIA to use waterboarding again. The New York Times will later call it “an expansive endorsement of the harshest interrogation techniques ever used by the Central Intelligence Agency” (see February 2005). The CIA presumably then resumes using most of these techniques but it does not resume waterboarding, as it had already stopped doing that in 2003 (see May 2002-2003).

Entity Tags: Central Intelligence Agency, George J. Tenet

Timeline Tags: Torture of US Captives, Complete 911 Timeline

Senior AT&T technician Mark Klein (see July 7, 2009) accepts a buyout package from his firm and retires. Klein, disheartened by the illegal AT&T/NSA wiretapping operation he has documented (see January 16, 2004), decides to keep the documents he has collected over the years (see Fall 2003 and Late 2003), the “hard proof” of the operation, he will later write, “in case there was some change in the political winds that would enable me to come forward and expose… the crimes which I knew were being committed.” [Klein, 2009, pp. 44]

Entity Tags: Mark Klein, AT&T

Timeline Tags: Civil Liberties

Major General Geoffrey Miller says during a Coalition Provisional Authority briefing that while physical contact between the interrogator and detainees is prohibited, “sleep deprivation and stress positions and all that could be used—but they must be authorized.” (see April 16, 2003) But as Amnesty International later notes in a letter to George Bush, “The United Nations Committee against Torture, the expert body established by the Convention against Torture (see October 21, 1994) has expressly held that restraining detainees in very painful positions, hooding, threats, and prolonged sleep deprivation are methods of interrogation which violate the prohibition on torture and cruel, inhuman, or degrading treatment.” [Amnesty International, 5/7/2004]

Entity Tags: Geoffrey D. Miller, George W. Bush, Amnesty International

Timeline Tags: Torture of US Captives

Speaking about the Abu Ghraib scandal (see April 28, 2004), President Bush promises a “full investigation.” In an interview with Al Arabiya, he says: “It’s important for people to understand that in a democracy, there will be a full investigation. In other words, we want to know the truth. In our country, when there’s an allegation of abuse… there will be a full investigation, and justice will be delivered.… It’s very important for people and your listeners to understand that in our country, when an issue is brought to our attention on this magnitude, we act. And we act in a way in which leaders are willing to discuss it with the media.… In other words, people want to know the truth. That stands in contrast to dictatorships. A dictator wouldn’t be answering questions about this. A dictator wouldn’t be saying that the system will be investigated and the world will see the results of the investigation.” [White House, 5/5/2004] In April 2009, after significant revelations of Bush torture policies have hit the press (see April 16, 2009 and April 21, 2009), Atlantic columnist Andrew Sullivan will write: “Bush personally authorized every technique revealed at Abu Ghraib. He refused to act upon the International Committee of the Red Cross’s report that found that he had personally authorized the torture of prisoners, in violation of the Geneva Conventions and the UN Convention on Torture and domestic law against cruel and inhuman treatment. A refusal to investigate and prosecute Red Cross allegations of torture is itself a violation of the Geneva Accords.” [Atlantic Monthly, 4/27/2009]

Entity Tags: Andrew Sullivan, George W. Bush

Timeline Tags: Torture of US Captives

The CIA’s inspector general, John Helgerson, releases a highly classified report from his office that examines allegations of torture from the time period between September 2001 (after the 9/11 attacks, when the CIA first began detaining suspected terrorists and informants) and October 2003. In the report, Helgerson warns that some aggressive interrogation techniques approved for use by the CIA since early 2002 (see Mid-March 2002) might violate some provisions of the international Convention Against Torture (see October 21, 1994). The report doubts the Bush administration position that the techniques do not violate the treaty because the interrogations take place overseas on non-US citizens. It will be released, in heavily redacted form, to the public in August 2009 (see August 24, 2009). From what becomes known of the report’s contents, the CIA engaged in a number of illegal and ethically questionable tactics on the part of its interrogators. Some of these tactics include the use of handguns, power drills, threats, smoke, and mock executions. Many of the techniques used against detainees were carried out without authorization from higher officials. The report says that the CIA’s efforts to provide “systematic, clear, and timely guidance” to interrogators were “inadequate at first” and that that failure largely coincided with the most significant incidents involving the unauthorized coercion of detainees, but as guidelines from the Justice Department accumulated over several years, oversight “improved considerably.” The report does not conclude that the techniques reviewed constitute torture, but it does find that they appear to constitute cruel, inhuman, and degrading treatment under the Convention. [Central Intelligence Agency, 5/7/2004 pdf file; New York Times, 11/9/2005; MSNBC, 8/24/2009; Washington Post, 8/24/2009]
Physical Abuse - The report defines torture as an act “intended to inflict severe physical or mental pain and suffering.” It then begins detailing such acts. Incidents of physical abuse include:
bullet One incident caused the death of an Afghani detainee. According to the report: “An agency independent contractor who was a paramilitary officer is alleged to have severely beaten the detainee with a large metal flashlight and kicked him during interrogation sessions. The detainee died in custody.” [Central Intelligence Agency, 5/7/2004 pdf file; New York Times, 8/24/2009; Washington Post, 8/24/2009; MSNBC, 8/25/2009] In a 2009 statement, Helgerson will write: “In one extreme case, improvisation took a disastrous turn when an agency contractor in rural Afghanistan—acting wholly outside the approved program and with no authorization or training—took it upon himself to interrogate a detainee. This officer beat the detainee and caused his death. Following an investigation of the incident, this contract employee was convicted of assault and is now in prison.” [Central Intelligence Agency, 5/7/2004 pdf file; Washington Post, 8/24/2009]
bullet Waterboarding was routinely used, in a manner far exceeding previously issued guidelines. Interrogators “continuously applied large volumes of water,” and later explained that they needed to make the experience “more poignant and convincing.” The CIA interrogators’ waterboarding technique was far more aggressive than anything used in military survival training such as the SERE program (see December 2001). Eventually, the agency’s Office of Medical Services criticized the waterboarding technique, saying that the “frequency and intensity” with which it was used could not be certified as “efficacious or medically safe.” [Central Intelligence Agency, 5/7/2004 pdf file; New York Times, 8/24/2009; Washington Post, 8/24/2009] The report refers in particular to the treatment of 9/11 mastermind Khalid Shaikh Mohammed (KSM), who was reportedly waterboarded more than once (see Shortly After February 29 or March 1, 2003). Waterboarding is considered torture and is illegal in the US. The report also raises concern that the use of these techniques could eventually cause legal troubles for the CIA officers who used them. [New York Times, 11/9/2005]
Helgerson will write: “We found that waterboarding had been utilized in a manner that was inconsistent with the understanding between CIA and the Department of Justice. The department had provided the agency a written legal opinion based on an agency assurance that although some techniques would be used more than once, repetition would ‘not be substantial.’ My view was that, whatever methodology was used to count applications of the waterboard, the very large number of applications to which some detainees were subjected led to the inescapable conclusion that the agency was abusing this technique.” [Central Intelligence Agency, 5/7/2004 pdf file; Washington Post, 8/24/2009]
bullet In July 2002, a CIA officer used a “pressure point” technique “with both of his hands on the detainee’s neck, the officer manipulated his finger to restrict the detainee’s carotid artery.” The carotid artery supplies the brain with oxygenated blood; such “manipulat[ion]” could lead to unconsciousness or even death. A second officer “reportedly watched his eyes to the point that the detainee would nod and start to pass out. Then the officer shook the detainee to wake him. This process was repeated for a total of three applications on the detainee.”
bullet A technique routinely used by CIA interrogators was the “hard takedown,” which involves an interrogator grabbing a detainee and slamming him to the floor before having the detainee moved to a sleep-deprivation cell. One detainee was hauled off his feet by his arms while they were bound behind his back with a belt, causing him severe pain.
bullet Another routinely used technique is “water dousing,” apparently a variant of waterboarding, in which a detainee is laid on a plastic sheet and subjected to having water sluiced over him for 10 to 15 minutes. The report says that at least one interrogator believed the technique to be useful, and sent a cable back to CIA headquarters requesting guidelines. A return cable explained that a detainee “must be placed on a towel or sheet, may not be placed naked on the bare cement floor, and the air temperature must exceed 65 degrees if the detainee will not be dried immediately.”
- - Detainee Abd al-Rahim al-Nashiri, suspected of plotting the 2000 bombing of the USS Cole (see October 12, 2000), was repeatedly “bathed” with hard-bristled scrub brushes in order to inflict pain. The brushes caused abrasions and bleeding. [Central Intelligence Agency, 5/7/2004 pdf file; New York Times, 8/24/2009; Washington Post, 8/24/2009; MSNBC, 8/25/2009]
Helgerson will write: “Agency officers who were authorized to detain and interrogate terrorists sometimes failed in their responsibilities. In a few cases, agency officers used unauthorized, threatening interrogation techniques. The primary, common problem was that management controls and operational procedures were not in place to avoid the serious problems that arose, jeopardizing agency employees and detainees alike.” [Central Intelligence Agency, 5/7/2004 pdf file; Washington Post, 8/24/2009]
Mental Abuse - Numerous instances of mental and emotional abuse were also documented.
bullet In 2002, interrogators staged a mock execution to intimidate a detainee. CIA officers began screaming outside the room where the detainee was being interrogated. When leaving the room, he “passed a guard who was dressed as a hooded detainee, lying motionless on the ground, and made to appear as if he had been shot to death.” The report says that after witnessing this performance, the detainee “sang like a bird.”
bullet Handguns and power drills were used to threaten detainees with severe bodily harm or death. One such instance involved al-Nashiri. An American, whose name is not released but who is identified as not being a trained interrogator and lacking authorization to use “enhanced methods,” used a gun and a power drill to frighten him. The American pointed the gun at al-Nashiri’s head and “racked” a round in the chamber. The American also held a power drill near al-Nashiri and revved it, while al-Nashiri stood naked and hooded. [Central Intelligence Agency, 5/7/2004 pdf file; New York Times, 8/24/2009; MSNBC, 8/24/2009; MSNBC, 8/25/2009]
In 2009, reporter David Ignatius will say he finds the “image of a CIA interrogator standing with a power drill next to somebody he’s interrogating… particularly horrific, because that’s a technique that’s been used in torturing people in Iraq.” [PBS, 8/24/2009]
bullet A CIA interrogator told al-Nashiri that if he did not cooperate with his captors, “we could get your mother in here” and “we can bring your family in here.” The report says that the interrogator wanted al-Nashiri to infer for “psychological” reasons that his female relatives might be sexually abused. The interrogator has denied actually threatening to sexually abuse al-Nashiri’s mother or other relatives.
bullet An interrogator threatened the lives of one detainee’s children. According to the report, an “interrogator said to Khalid Shaikh Mohammed that if anything else happens in the United States, quote, ‘we’re going to kill your children.’” According to the report, the debriefer was trying to exploit a belief in the Middle East that interrogation techniques included sexually abusing female relatives in front of the detainees. It was during these same interrogation sessions that Mohammed was waterboarded 183 times in a single month (see April 16, 2009). [Central Intelligence Agency, 5/7/2004 pdf file; New York Times, 8/24/2009; MSNBC, 8/24/2009; MSNBC, 8/25/2009]
Fear of Recriminations - According to the report, there was concern throughout the agency over the potential legal consequences for agency officers. Officers “expressed unsolicited concern about the possibility of recrimination or legal action” and said “they feared that the agency would not stand behind them,” according to the report. [Central Intelligence Agency, 5/7/2004 pdf file; New York Times, 8/24/2009] According to the report, CIA personnel “are concerned that public revelation” of the program will “seriously damage” personal reputations as well as “the reputation and effectiveness of the agency itself.” One officer is quoted as saying he could imagine CIA agents ending up before the World Court on war crimes charges. “Ten years from now, we’re going to be sorry we’re doing this,” another officer said. But “it has to be done.” [Central Intelligence Agency, 5/7/2004 pdf file; Washington Post, 8/24/2009] Helgerson will write: “This review of the agency’s early detention and interrogation activities was undertaken in part because of expressions of concern by agency employees that the actions in which they were involved, or of which they were aware, would be determined by judicial authorities in the US or abroad to be illegal. Many expressed to me personally their feelings that what the agency was doing was fundamentally inconsistent with long established US government policy and with American values, and was based on strained legal reasoning. We reported these concerns.” [Central Intelligence Agency, 5/7/2004 pdf file; Washington Post, 8/24/2009]
Recommendations - The report lists 10 recommendations for changes in the treatment of detainees, but it will not be reported what these are. Eight of the recommendations are apparently later adopted. Former CIA assistant general counsel John Radsan will later comment, “The ambiguity in the law must cause nightmares for intelligence officers who are engaged in aggressive interrogations of al-Qaeda suspects and other terrorism suspects.” [New York Times, 11/9/2005]
Approval, Contradictory Statements by Attorney General - The report says that Attorney General John Ashcroft approved all of these actions: “According to the CIA general counsel, the attorney general acknowledged he is fully aware of the repetitive use of the waterboard and that CIA is well within the scope of the DOJ opinion that the authority given to CIA by that opinion. The attorney general was informed the waterboard had been used 119 times on a single individual.” In 2009, reporter Michael Isikoff will say that the contents of the report “conflict… with the public statements that have been made over the years by Bush administration officials and CIA directors.” In 2007, then-CIA Director Michael Hayden will tell the Council on Foreign Relations that the agency’s detention and interrogation program was “very carefully controlled and lawfully conducted—has been carefully controlled and lawfully conducted.” Isikoff will say, “It’s kind of hard to square that with… what was in the CIA inspector general report that had been presented five years ago in 2004.” [Central Intelligence Agency, 5/7/2004 pdf file; MSNBC, 8/25/2009]
Questions of Effectiveness - The report does document that some interrogations obtained critical information to identify terrorists and stop potential plots, and finds that some imprisoned terrorists provided more information after being exposed to brutal treatment (see August 24, 2009). It finds that “there is no doubt” that the detention and interrogation program itself prevented further terrorist activity, provided information that led to the apprehension of other terrorists, warned authorities of future plots, and helped analysts complete an intelligence picture for senior policymakers and military leaders. But whether the harsh techniques were effective in this regard “is a more subjective process and not without some concern,” the report continues. It specifically addresses waterboarding as an illegal tactic that is not shown to have provided useful information. “This review identified concerns about the use of the waterboard, specifically whether the risks of its use were justified by the results, whether it has been unnecessarily used in some instances,” the report reads, and notes that in many instances, the frequency and volume of water poured over prisoners’ mouths and noses may have exceeded the Justice Department’s legal authorization. In the instance of detainee Abu Zubaida, the report finds, “It is not possible to say definitively that the waterboard is the reason for Abu [Zubaida]‘s increased production [of intelligence information], or if another factor, such as the length of detention, was the catalyst.” In 2009, Isikoff will note that the effectiveness of torture is not clarified by the report. “As you know, Vice President [Dick] Cheney and others who had defended this program have insisted time and again that valuable intelligence was gotten out of this program. You could read passages of this report and conclude that that is the case, that they did get—some passages say important intelligence was gotten. But then others are far more nuanced and measured, saying we don’t really know the full story, whether alternative techniques could have been used.” [Central Intelligence Agency, 5/7/2004 pdf file; New York Times, 8/24/2009; MSNBC, 8/24/2009; Washington Post, 8/24/2009; MSNBC, 8/25/2009]
Cheney Blocked Report's Completion - Reporter Jane Mayer later learns that Cheney intervened to block Helgerson from completing his investigation. Mayer will write that as early as 2004, “the vice president’s office was fully aware that there were allegations of serious wrongdoing in the [interrogation] program.” Helgerson met repeatedly and privately with Cheney before, in Mayer’s words, the investigation was “stopped in its tracks.” She will call the meetings “highly unusual.” In October 2007, CIA Director Michael Hayden will order an investigation of Helgerson’s office, alleging that Helgerson was on “a crusade against those who have participated in controversial detention programs.” [Public Record, 3/6/2009]

Entity Tags: Office of Medical Services (CIA), International Criminal Court, Jane Mayer, John Helgerson, David Ignatius, John Radsan, John Ashcroft, Convention Against Torture, Abu Zubaida, Bush administration (43), US Department of Justice, Richard (“Dick”) Cheney, Central Intelligence Agency, Michael Hayden, Abd al-Rahim al-Nashiri, Khalid Shaikh Mohammed, Michael Isikoff

Timeline Tags: Torture of US Captives, Complete 911 Timeline

A Pentagon report determines that conditions at the detention facilities at Guantanamo Bay, Cuba, and Charleston, South Carolina used to house “enemy combatants” are problematic at best. The facilities house three designated enemy combatants: Jose Padilla (see May 8, 2002), Yaser Esam Hamdi (see December 2001), and Ali Saleh Kahlah al-Marri (see December 12, 2001). The report, entitled “Brief to the Secretary of Defense on Treatment of Enemy Combatants Detained at Naval Station Guantanamo Bay, Cuba, and Naval Consolidated Brig Charleston,” is written by the Navy’s Vice Admiral A.T. Church III and by Marine Brigadier General D.D. Thiessen. The focus of the report is to “[e]nsure Department of Defense orders concerning proper treatment of enemy combatants.” The report documents extensive problems at both locations. It cites the following as some of the problems:
bullet “One detainee has Koran removed from cell as part of JFCOM [Joint Forces Command] interrogation plan. Muslim chaplain not available.”
bullet “One detainee in Charleston has mattress removed as part of JFCOM-approved interrogation plan.”
bullet “One detainee in each location currently not authorized ICRC [Red Cross] visits due to interrogation plans in progress.”
bullet “One detainee in Charleston has Koran, mattress, and pillow removed and is fed cold MREs as part of interrogation plan.” This citation has a footnote that reads, “After completion of current interrogation,” removal of the Koran as an incentive to answer questions “will no longer be used at Charleston.”
bullet “Limited number and unique status of detainees in Charleston precludes interaction with other detainees. Argument could be made that this constitutes isolation.”
bullet At the Charleston brig, “Christian chaplain used to provide socialization, but could be perceived as forced proselytization.”
Nonetheless, the report concludes, “No evidence of noncompliance with DoD orders at either facility.” The authors assume that “treatment provided for in presidential and SECDEF orders constitutes ‘humane treatment.’” [Progressive, 3/2007] When Church presents his report to journalists (see May 12, 2004), he says he only found eight “minor infractions.”

Entity Tags: US Department of Defense, Jose Padilla, D.D. Thiessen, Ali Saleh Kahlah al-Marri, Albert T. Church III, Yaser Esam Hamdi

Timeline Tags: Torture of US Captives

The New York Times learns that FBI Director Robert Mueller has ordered FBI interrogators to stay out of CIA-led interrogations of suspected al-Qaeda members. Mueller, and many FBI officials, believe the CIA’s interrogation tactics are too brutal and violate domestic and international laws. Mueller and other FBI officials have objected to the use of techniques such as waterboarding, as well as forced starvation, forced drugging, and beatings. FBI officials told Mueller that the techniques would be prohibited in criminal cases. Some CIA officers are worried that public outrage over the recent revelations of prisoner abuse at Baghdad’s Abu Ghraib prison might lead to a closer examination of the agency’s treatment of al-Qaeda prisoners. “Some people involved in this have been concerned for quite a while that eventually there would be a new president, or the mood in the country would change, and they would be held accountable,” one says. “Now that’s happening faster than anybody expected.” [BBC, 5/13/2004] In 2008, a Justice Department investigation (see May 20, 2008) will reveal that sometime in mid-2002, the FBI’s then-assistant director for counterterrorism, Pasquale D’Amuro, ordered FBI agents at Guantanamo to stop participating in interrogations and leave the facility. D’Amuro brought the issue to Mueller’s attention; according to the Justice Department report, D’Amuro “stated that his exact words to Mueller were ‘we don’t do that’ and that someday the FBI would be called to testify and he wanted to be able to say that the FBI did not participate in this type of activity.” D’Amuro was concerned that the use of such aggressive interrogation techniques “failed to take into account an ‘end game.’” The report will continue: “D’Amuro stated that even a military tribunal would require some standard for admissibility of evidence. Obtaining information by way of ‘aggressive’ techniques would not only jeopardize the government’s ability to use the information against the detainees, but also might have a negative impact on the agents’ ability to testify in future proceedings.” Mueller agreed with D’Amuro and issued what became a “bright line rule” barring FBI agents from participating in CIA and military interrogations involving such methods. [Newsweek, 5/20/2008]

Entity Tags: Federal Bureau of Investigation, Central Intelligence Agency, Robert S. Mueller III, Pasquale D’Amuro, US Department of Justice

Timeline Tags: Torture of US Captives

The American Civil Liberties Union and other civil rights organizations submit a second Freedom of Information Act request to the Departments of Defense, Justice, State, Homeland Security, and the CIA. [Amended Complaint for Injunctive Relief. ACLU, et al. v. Department of Defense, et al., 7/6/2004 pdf file]

Entity Tags: American Civil Liberties Union

Timeline Tags: Torture of US Captives

David Ottaway.David Ottaway. [Source: AAAS.org]According to the Oregon branch of the Islamic charitable organization the Al-Haramain Islamic Foundation, Washington Post reporter David Ottaway receives a classified document that is evidence of illegal surveillance by the National Security Agency. The document shows that the NSA illegally intercepted telephone conversations and e-mails between Al Haramain officials in Oregon and Washington, DC. The document, dated May 24, 2004 and marked “Top Secret,” is accidentally provided to Al Haramain by Treasury Department officials that same month; Al Haramain quickly turns the document over to Ottoway, who is researching Islamic groups and individuals labeled as terrorists by the US government and are attempting to prove their innocence. Instead of reporting on the document, Ottaway will return it to the FBI when that organization demands it back in November 2004. In February 2006, Al Haramain will sue the Bush administration for illegally spying on it (see February 28, 2006) as part of its warrantless wiretapping program (see After September 11, 2001 and December 15, 2005). The Treasury Department has been investigating the charitable organization for possible ties to terrorism, and designated the group as a terrorist organization. The FBI will approach the organization and then Ottaway himself, demanding that all copies of the document be returned and threatening them with prosecution if the contents are revealed. Ottaway will consult with Post editors and lawyers, who will conclude, according to Ottaway, “that it was not relevant to what I was working on at the time.” Post executive editor Leonard Downie, Jr., will defend the decision, saying, “At the time we had this document, it was before we had any knowledge of the eavesdropping program. Without that knowledge, the document provided no useful information. At the time, all we knew was that this document was not relevant to David’s reporting.” [Washington Post, 3/3/2006]

Entity Tags: US Department of the Treasury, Washington Post, Leonard Downie, Jr., Al Haramain Islamic Foundation (Oregon branch), Bush administration (43), National Security Agency, David Ottaway, Federal Bureau of Investigation

Timeline Tags: Civil Liberties, Domestic Propaganda

After many SERE techniques have been authorized for use in interrogations (see December 2001, January 2002 and After, and July 2002), and the Joint Personnel Recovery Agency considers sending SERE trainers to interrogation facilities in Afghanistan, a SERE psychologist warns: “[W]e need to really stress the difference between what instructors do at SERE school (done to INCREASE RESISTANCE capability in students) versus what is taught at interrogator school (done to gather information). What is done by SERE instructors is by definition ineffective interrogator conduct.… Simply stated, SERE school does not train you on how to interrogate, and things you ‘learn’ there by osmosis about interrogation are probably wrong if copied by interrogators.” [Huffington Post, 4/21/2009]

Entity Tags: Joint Personnel Recovery Agency

Timeline Tags: Torture of US Captives

The American Civil Liberties Union, the Center for Constitutional Rights, and four other independent organizations file a lawsuit under the Freedom of Information (FOI) Act demanding the release of information about detainees held by the United States at military bases and other detention facilities overseas. “The government’s ongoing refusal to release these records is absolutely unacceptable, particularly in light of the severity of the abuses we know to have occurred,” says Jameel Jaffer, an ACLU staff lawyer. More than seven months have passed since the initial request (see October 7, 2003) was made to the Departments of State, Defense, Homeland Security and Justice, and the CIA for these documents. [American Civil Liberties Union, 6/2/2004]

Entity Tags: American Civil Liberties Union

Timeline Tags: Torture of US Captives

The 9/11 Commission releases a new report on how the 9/11 plot developed. Most of their information appears to come from interrogations of prisoners Khalid Shaikh Mohammed (KSM), the 9/11 mastermind, and Ramzi bin al-Shibh, a key member of the al-Qaeda Hamburg cell. In this account, the idea for the attacks appears to have originated with KSM. In mid-1996, he met bin Laden and al-Qaeda leader Mohammed Atef in Afghanistan. He presented several ideas for attacking the US, including a version of the 9/11 plot using ten planes (presumably an update of Operation Bojinka’s second phase plot (see February-Early May 1995)). Bin Laden does not commit himself. In 1999, bin Laden approves a scaled-back version of the idea, and provides four operatives to carry it out: Nawaf Alhazmi, Khalid Almihdhar, Khallad bin Attash, and Abu Bara al Taizi. Attash and al Taizi drop out when they fail to get US visas. Alhazmi and Almihdhar prove to be incompetent pilots, but the recruitment of Mohamed Atta and the others in the Hamburg al-Qaeda cell solves that problem. Bin Laden wants the attacks to take place between May and July 2001, but the attacks are ultimately delayed until September. [9/11 Commission, 6/16/2004] However, information such as these accounts resulting from prisoner interrogations is seriously doubted by some experts, because it appears they only began cooperating after being coerced or tortured. For instance, it is said that KSM was “waterboarded,” a technique in which his head is pushed under water until he nearly drowns. Information gained under such duress often is unreliable. Additionally, there is a serious risk that the prisoners might try to intentionally deceive. [New York Times, 6/17/2004] For instance, one CIA report of his interrogations is called, “Khalid Shaikh Mohammed’s Threat Reporting—Precious Truths, Surrounded by a Bodyguard of Lies.” [Los Angeles Times, 6/23/2004] The Commission itself expresses worry that KSM could be trying to exaggerate the role of bin Laden in the plot to boost bin Laden’s reputation in the Muslim world. [9/11 Commission, 6/16/2004] Most of what these prisoners have said is uncorroborated from other sources. [New York Times, 6/17/2004] In 2007, it will be alleged that as much as 90 percent of KSM’s interrogation could be inaccurate, and that he has recanted some of his confessions (see August 6, 2007).

Entity Tags: Osama bin Laden, 9/11 Commission, Ramzi bin al-Shibh, Khalid Shaikh Mohammed

Timeline Tags: Torture of US Captives, Complete 911 Timeline, 9/11 Timeline

After a search of Iraqi paramilitary records indicates a man named Hikmat Shakir Ahmad was a lieutenant colonel in Saddam Hussein’s Fedayeen, there is speculation that he is the same person as Ahmad Hikmat Shakir, an alleged Iraqi al-Qaeda operative who met one of the 9/11 hijackers during an al-Qaeda summit in Malaysia (see January 5-8, 2000), and was captured and inexplicably released after 9/11 (see September 17, 2001). The claim that the two men are the same person is used to bolster the theory that Saddam Hussein was in some way connected to 9/11, but turns out not to be true, as the two of them are found to be in different places at one time, in September 2001. [Knight Ridder, 6/12/2004; Washington Post, 6/22/2004; 9/11 Commission, 7/24/2004, pp. 502]

Entity Tags: Hikmat Shakir Ahmad, Ahmad Hikmat Shakir

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Attempting to stem the flow of bad publicity and world-wide criticism surrounding the revelations of torture at Abu Ghraib prison in Baghdad and similar reports from Guantanamo Bay, Attorney General Alberto Gonzales and Pentagon general counsel William J. Haynes, accompanied by Pentagon lawyer Daniel Dell’Orto, give a lengthy press conference to discuss the US’s position on interrogation and torture. Gonzales and Haynes provide reporters with a thick folder of documents, being made public for the first time. Those documents include the so-called “Haynes Memo” (see November 27, 2002), and the list of 18 interrogation techniques approved for use against detainees (see December 2, 2002 and April 16, 2003). Gonzales and Haynes make carefully prepared points: the war against terrorism, and al-Qaeda in particular, is a different kind of war, they say. Terrorism targets civilians and is not limited to battlefield engagements, nor do terrorists observe the restrictions of the Geneva Conventions or any other international rules. The administration has always acted judiciously in its attempt to counter terrorism, even as it moved from a strictly law-enforcement paradigm to one that marshaled “all elements of national power.” Their arguments are as follows:
Always Within the Law - First, the Bush administration has always acted within reason, care, and deliberation, and has always followed the law. In February 2002, President Bush had determined that none of the detainees at Guantanamo should be covered under the Geneva Conventions (see February 7, 2002). That presidential order is included in the document packet. According to Gonzales and Haynes, that order merely reflected a clear-eyed reading of the actual provision of the conventions, and does not circumvent the law. Another document is the so-called “torture memo” written by the Justice Department’s Office of Legal Counsel (see August 1, 2002). Although such legal opinions carry great weight, and though the administration used the “torture memo” for months to guide actions by military and CIA interrogators, Gonzales says that the memo has nothing to do with the actions at Guantanamo. The memo was intended to do little more than explore “the limits of the legal landscape.” Gonzales says that the memo included “irrelevant and unnecessary” material, and was never given to Bush or distributed to soldiers in the field. The memo did not, Gonzales asserts, “reflect the policies that the administration ultimately adopted.” Unfortunately for their story, the facts are quite different. According to several people involved in the Geneva decision, it was never about following the letter of the law, but was designed to give legal cover to a prior decision to use harsh, coercive interrogation. Author and law professor Phillippe Sands will write, “it deliberately created a legal black hole into which the detainees were meant to fall.” Sands interviewed former Defense Department official Douglas Feith about the Geneva issue, and Feith proudly acknowledged that the entire point of the legal machinations was to strip away detainees’ rights under Geneva (see Early 2006).
Harsh Techniques Suggested from Below - Gonzales and Haynes move to the question of where, exactly, the new interrogation techniques came from. Their answer: the former military commander at Guantanamo, Michael E. Dunlavey. Haynes later describes Dunlavey to the Senate Judiciary Committee as “an aggressive major general.” None of the ideas originated in Washington, and anything signed off or approved by White House or Pentagon officials were merely responses to requests from the field. Those requests were prompted by a recalcitrant detainee at Guantanamo, Mohamed al-Khatani (see August 8, 2002-January 15, 2003), who had proven resistant to normal interrogation techniques. As the anniversary of the 9/11 attacks approached, and fears of a second attack mounted, Dell’Orto says that Guantanamo field commanders decided “that it may be time to inquire as to whether there may be more flexibility in the type of techniques we use on him.” Thusly, a request was processed from Guantanamo through military channels, through Haynes, and ultimately to Defense Secretary Donald Rumsfeld, who approved 15 of the 18 requested techniques to be used against al-Khatani and, later, against other terror suspects (see September 25, 2002 and December 2, 2002). According to Gonzales, Haynes, and Dell’Orto, Haynes and Rumsfeld were just processing a request from military officers. Again, the evidence contradicts their story. The torture memo came as a result of intense pressure from the offices of Rumsfeld and Vice President Cheney. It was never some theoretical document or some exercise in hypothesizing, but, Sands will write, “played a crucial role in giving those at the top the confidence to put pressure on those at the bottom. And the practices employed at Guantanamo led to abuses at Abu Ghraib.” Gonzales and Haynes were, with Cheney chief of staff David Addington and Justice Department lawyers John Yoo and Jay Bybee (the authors of the torture memo), “a torture team of lawyers, freeing the administration from the constraints of all international rules prohibiting abuse,” in Sands’s words. Dunlavey was Rumsfeld’s personal choice to head the interrogations at Guantanamo; he liked the fact that Dunlavey was a “tyrant,” in the words of a former Judge Advocate General official, and had no problem with the decision to ignore the Geneva Conventions. Rumsfeld had Dunlavey ignore the chain of command and report directly to him, though Dunlavey reported most often to Feith. Additionally, the Yoo/Bybee torture memo was in response to the CIA’s desire to aggressively interrogate another terror suspect not held at Guantanamo, Abu Zubaida (see March 28, 2002). Sands will write, “Gonzales would later contend that this policy memo did ‘not reflect the policies the administration ultimately adopted,’ but in fact it gave carte blanche to all the interrogation techniques later recommended by Haynes and approved by Rumsfeld.” He also cites another Justice Department memo, requested by the CIA and never made public, that spells out the specific techniques in detail. No one at Guantanamo ever saw either of the memos. Sands concludes, “The lawyers in Washington were playing a double game. They wanted maximum pressure applied during interrogations, but didn’t want to be seen as the ones applying it—they wanted distance and deniability. They also wanted legal cover for themselves. A key question is whether Haynes and Rumsfeld had knowledge of the content of these memos before they approved the new interrogation techniques for al-Khatani. If they did, then the administration’s official narrative—that the pressure for new techniques, and the legal support for them, originated on the ground at Guantanamo, from the ‘aggressive major general’ and his staff lawyer—becomes difficult to sustain. More crucially, that knowledge is a link in the causal chain that connects the keyboards of Feith and Yoo to the interrogations of Guantanamo.”
Legal Justifications Also From Below - The legal justification for the new interrogation techniques also originated at Guantanamo, the three assert, and not by anyone in the White House and certainly not by anyone in the Justice Department. The document stack includes a legal analysis by the staff judge advocate at Guantanamo, Lieutenant Colonel Diane Beaver (see October 11, 2002), which gives legal justifications for all the interrogation techniques. The responsibility lies ultimately with Beaver, the three imply, and not with anyone higher up the chain. Again, the story is severely flawed. Beaver will give extensive interviews to Sands, and paint a very different picture (see Fall 2006). One Naval Criminal Investigative Service (NCIS) psychologist, Mike Gelles (see December 17-18, 2002), will dispute Gonzales’s contention that the techniques trickled up the chain from lower-level officials at Guantanamo such as Beaver. “That’s not accurate,” he will say. “This was not done by a bunch of people down in Gitmo—no way.” That view is supported by a visit to Guantanamo by several top-ranking administration lawyers, in which Guantanamo personnel are given the “green light” to conduct harsh interrogations of detainees (see September 25, 2002).
No Connection between Guantanamo, Abu Ghraib - Finally, the decisions regarding interrogations at Guantanamo have never had any impact on the interrogations at Abu Ghraib. Gonzales wants to “set the record straight” on that question. The administration has never authorized nor countenanced torture of any kind. The abuses at Abu Ghraib were unauthorized and had nothing to do with administration policies. Much evidence exists to counter this assertion (see December 17-18, 2002). In August 2003, the head of the Guantanamo facility, Major General Geoffrey Miller, visited Abu Ghraib in Baghdad, accompanied by, among others, Diane Beaver (see August 31, 2003-September 9, 2003). They were shocked at the near-lawlessness of the facility, and Miller recommended to Lieutenant General Ricardo Sanchez, the supreme US commander in Iraq, that many of the same techniques used at Guantanamo be used in Abu Ghraib. Sanchez soon authorized the use of those techniques (see September 14-17, 2003). The serious abuses reported at Abu Ghraib began a month later. Gelles worried, with justification, that the techniques approved for use against al-Khatani would spread to other US detention facilities. Gelles’s “migration theory” was controversial and dangerous, because if found to be accurate, it would tend to implicate those who authorized the Guantanamo interrogation techniques in the abuses at Abu Ghraib and elsewhere. “Torture memo” author John Yoo called the theory “an exercise in hyperbole and partisan smear.” But Gelles’s theory is supported, not only by the Abu Ghraib abuses, but by an August 2006 Pentagon report that will find that techniques from Guantanamo did indeed migrate into Abu Ghraib, and a report from an investigation by former defense secretary James Schlesinger (see August 24, 2004) that will find “augmented techniques for Guantanamo migrated to Afghanistan and Iraq where they were neither limited nor safeguarded.” [White House, 7/22/2004; Vanity Fair, 5/2008]

Dhiren Barot.Dhiren Barot. [Source: London Metropolitan Police]Dhiren Barot, a Londoner of Indian descent who converted to Islam and fought in Afghanistan and Pakistan, is arrested along with about a dozen other al-Qaeda suspects by British authorities (see August 3, 2004). Barot, who uses a number of pseudonyms, including Abu Eissa al-Hindi, will be charged with several crimes surrounding his plans to launch attacks against British and US targets. Barot’s plans were discovered in a computer owned by al-Qaeda operative Muhammad Naeem Noor Khan, who was arrested in July 2004 and was helping US intelligence until his outing by US and Pakistani officials on August 2, 2004 (see August 2, 2004). Though Barot is not believed to be a high-level al-Qaeda operative, he has connections to some of al-Qaeda’s most notorious leaders, including bin Laden and 9/11 plotter Khalid Shaikh Mohammed (KSM), who, according to the 9/11 Commission, dispatched him to “case” targets in New York City in 2001. Under the alias Issa al-Britani, he is known to have been sent to Malaysia in late 1999 or very early 2000 by KSM to meet with Hambali, the head of the al-Qaeda affiliate Jemaah Islamiyah. According to the commission report, Barot may have given Hambali the names of 9/11 hijackers Khalid Almihdhar and Nawaf Alhazmi. Barot may have traveled to Malaysia with Khallad bin Attash. Bin Attash is believed to be one of the planners behind the October 2000 bombing of the USS Cole (see October 12, 2000). Barot’s trip to Malaysia came just days before the well-documented January 2000 al-Qaeda summit where early plans for the 9/11 bombings were hatched (see January 5-8, 2000), though US officials do not believe that Barot was present at that meeting. British authorities believe that Barot was part of an al-Qaeda plan to launch a mass terror attack using chemical and/or radioactive weapons. Barot and other suspects arrested were, according to Western officials, in contact with al-Qaeda operatives in Pakistan, who themselves were communicating with bin Laden and other top al-Qaeda leaders as recently as July 2004. [MSNBC, 8/20/2004] Barot’s plans seem to have focused more actively on British targets, including London’s subway system. In November 2006, Barot will be convicted of conspiracy to commit murder and other crimes, and eventually sentenced to thirty years in prison by a British court. [BBC, 11/7/2006; BBC, 5/16/2007]

Entity Tags: Khallad bin Attash, USS Cole, Nawaf Alhazmi, Hambali, Dhiren Barot, Al-Qaeda, Osama bin Laden, Khalid Almihdhar, Jemaah Islamiyah, Khalid Shaikh Mohammed, Muhammad Naeem Noor Khan

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

James Schlesinger.James Schlesinger. [Source: HBO]The four-member Independent Panel to Review Department of Defense Detention Operations completes its final report on its investigations into the prisoner abuses that are known to have taken place in US-run detention centers throughout Iraq and Afghanistan. The investigative panel, which includes James R. Schlesinger, Harold Brown, Tillie K. Fowler, and Gen. Charles A. Horner, finds that a failure of leadership, leading all the way to Defense Secretary Rumsfeld, contributed to the abuse of prisoners. Like the Fay report (see August 25, 2004), to be released the following day, and the February 2004 Taguba report (see March 9, 2004), the Schlesinger report concludes that a lack of oversight and supervision allowed incidents, such as that which occurred at Abu Ghraib, to occur. Unlike preceding investigations, the Schlesinger Panel takes issue with the notion that abuses resulted from the actions of a few bad apples and were not widespread, charging that there is “both institutional and personal responsibility at higher levels.” The panel however does not name names. Notwithstanding their criticisms of the secretary, all four members say that Rumsfeld’s mistakes were comparably less significant than those made by uniformed officers. The panel, appointed by the secretary himself, recommends against removing Rumsfeld from office. [New York Times, 8/25/2004] In sum, the panel finds:
bullet Defense Secretary Rumsfeld and his aides failed to anticipate significant militant resistance to the US invasion and did not respond quickly enough to it when its strength became apparent. [New York Times, 8/25/2004]
bullet The Department of Defense created confusion when it issued, retracted, and then re-issued its policy on interrogation methods. [New York Times, 8/25/2004]
bullet The failure to adequately staff Abu Ghraib contributed to the poor conditions and abuses that took place at the prison. The ratio of military police to prisoners at the facility was 75 to one. [New York Times, 8/25/2004]
bullet Responsibility for the abuses that took place at Abu Ghraib go beyond the handful of MPs present in the photographs. “We found a string of failures that go well beyond an isolated cellblock in Iraq,” panelist Tillie K. Fowler explains during a Pentagon press conference. “We found fundamental failures throughout all levels of command, from the soldiers on the ground to the Central Command and to the Pentagon. These failures of leadership helped to set the conditions which allowed for the abusive practice to take place.” [US Department of Defense, 8/24/2004; New York Times, 8/25/2004]
bullet Rumsfeld’s decision (see December 2, 2002) on December 2, 2002 to authorize 16 pre-approved additional interrogation procedures for use at the Guantanamo facility; his subsequent decision (see January 15, 2003) to rescind that authority, and the final April 16, 2003 decision (see April 16, 2003) providing a final list of approved techniques was “an element contributing to uncertainties in the field as to which techniques were authorized.” The methods on the list eventually “migrated to Afghanistan and Iraq where they were neither limited nor safeguarded.” [New York Times, 8/25/2004]
bullet The panel seemingly concludes that the interrogation methods approved for use in Afghanistan and at Guantanamo are lawful, fully agreeing that the Third Geneva Convention does not apply to detainees considered enemy combatants. The panel does not question whether the military was justified in classifying the detainees, or “terrorists,” as such. “The Panel accepts the proposition that these terrorists are not combatants entitled to the protections of Geneva Convention III. Furthermore, the Panel accepts the conclusion the Geneva Convention IV and the provisions of domestic criminal law are not sufficiently robust and adequate to provide for the appropriate detention of captured terrorists.” [US Congress, 9/9/2004, pp. 83 pdf file]
bullet The panel says that Gen. Ricardo Sanchez’s decision to classify some prisoners in Iraq as enemy combatants was “understandable,” even though Combined Joint Task Force 7 “understood there was no authorization to suspend application of the Geneva Conventions… .” [US Congress, 9/9/2004, pp. 83 pdf file]
bullet Abuses at Abu Ghraib involved both MPs and military intelligence personnel. “We now know these abuses occurred at the hands of both military police and military intelligence personnel,” the report says. “The pictured abuses, unacceptable even in wartime, were not part of authorized interrogations nor were they even directed at intelligence targets. They represent deviant behavior and a failure of military leadership and discipline. However, we do know that some of the egregious abuses at Abu Ghraib which were not photographed did occur during interrogation sessions and that abuses during interrogation sessions occurred elsewhere.… We concur with the Jones/Fay investigation’s (see August 25, 2004) conclusion that military intelligence personnel share responsibility for the abuses at Abu Ghraib with the military police soldiers cited in the Taguba investigation.” [New York Times, 8/25/2004]
bullet In Guantanamo, roughly one-third of all abuses were interrogation related. [New York Times, 8/25/2004]
bullet Contradicting the conclusions of the Red Cross report (see May 7, 2004), the Schlesinger report demonstrates that abuses were widespread. “Abuses of varying severity occurred at differing locations under differing circumstances and context,” the report’s authors write. “They were widespread and, though inflicted on only a small percentage of those detained… .” [New York Times, 8/25/2004]
bullet The abusive practices were not sanctioned by the military’s interrogation policy. “No approved procedures called for or allowed the kinds of abuse that in fact occurred. There is no evidence of a policy of abuse promulgated by senior officials or military authorities.” [New York Times, 8/25/2004]
bullet The panelists believe the abuses occurring during the night shift in Cell Block 1 of Abu Ghraib “would have been avoided with proper training, leadership and oversight.” [New York Times, 8/25/2004] Critics will say the report is a “whitewash,” noting that the panel cannot be considered independent given that it was appointed by Rumsfeld himself. Months before the panel completed its work, panelist Tillie Fowler said Rumsfeld should not be blamed for the abuses. “The secretary is an honest, decent, honorable man, who’d never condone this type of activity,” she said referring to the abuse at Abu Ghraib. “This was not a tone set by the secretary.” [New York Times, 6/6/2004]

Entity Tags: James R. Schlesinger, International Committee of the Red Cross, Harold Brown, Charles A. Horner, George R. Fay, Donald Rumsfeld, Tillie K. Fowler

Timeline Tags: Torture of US Captives, Civil Liberties

Alvin Hellerstein.Alvin Hellerstein. [Source: Associated Press]In 2003, after reports began to surface that some detainees in US custody had been abused, the American Civil Liberties Union (ACLU) filed a Freedom of Information Act request seeking records about the treatment of all detainees caught since 9/11 and held in US custody overseas. The ACLU eventually filed a lawsuit to get the records, and on September 15, 2004, judge Alvin Hellerstein orders the CIA and other government agencies to “produce or identify” all relevant documents by October 15, 2004. [FindLaw, 12/14/2007] Hellerstein also rules that classified documents must be identified in a written log and the log must be submitted to him for review. In December 2004, the CIA and other agencies make public a huge amount of information but fail to inform the judge about the videotapes and other classified information (see December 21, 2004). Since that time, the case remains delayed with stays, extensions, and appeals. In December 2005, the CIA will destroy videotapes of the interrogations of at least two high-ranking al-Qaeda detainees (see November 2005). After the destruction of the videotapes is publicly revealed in December 2007, the New York Times will comment on the ACLU case, “Some legal experts [say] that the CIA would have great difficulty defending what seemed to be a decision not to identify the tapes to the judge, and the subsequent decision to destroy the tapes.” [New York Times, 12/13/2007] Legal analyst John Dean will later comment, “It is difficult to see why the CIA is, in fact, not in contempt, given the nature of the [ACLU] request and the judge’s order.” He will suggest that the case may represent the best chance to find out why and how the CIA destroyed the videotapes. [FindLaw, 12/14/2007]

Entity Tags: Alvin K. Hellerstein, John Dean, Central Intelligence Agency, American Civil Liberties Union

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

The Supreme Court declines without comment to hear an appeal by “enemy combatant” Ali Saleh Kahlah al-Marri (see December 12, 2001 and June 23, 2003). Al-Marri has filed a civil suit, Al-Marri v. Rumsfeld, challenging his detention and his status as an enemy combatant. Previously, courts ruled that al-Marri’s lawyers should have filed the suit in South Carolina, where al-Marri is being held in a Charleston naval brig, not in Illinois, where al-Marri was attending college. The Supreme Court refused to overturn that decision. Al-Marri’s lawyers intend to refile the suit in South Carolina (see August 8, 2005). [Al-Marri v. Rumsfeld, 6/2004; Associated Press, 10/4/2004; Slate, 4/20/2006]

Entity Tags: US Supreme Court, Ali Saleh Kahlah al-Marri

Timeline Tags: Torture of US Captives, Civil Liberties

The New York Times agrees to a White House request to withhold publication of a potential “bombshell” story: an in-depth article revealing an enormous, and possibly illegal, warrantless wiretapping program executed by the NSA at President Bush’s behest after the 9/11 attacks. The Times will publish the story almost a year later (see December 15, 2005). In August 2006, the Times’s public editor, Byron Calame, will confirm the delay, and note that he has been “increasingly intrigued” by the various descriptions of the delay by Times editor Bill Keller (see December 16, 2005) and others. Keller will tell Calame that, contrary to some statements he and others have made, the story was originally scheduled to be published just days before the November 2004 presidential election. “The climactic discussion about whether to publish was right on the eve of the election,” Keller will say, though he will refuse to explain why he makes the final decision to hold the story. However, he will say that at this time he is not sure the story’s sources are reliable enough to warrant its publication before a close election. [New York Times, 8/13/2006]

Entity Tags: Bush administration (43), Bill Keller, New York Times, Byron Calame, National Security Agency

Timeline Tags: Civil Liberties

Five agencies, under an agreement worked out by US District Judge Alvin Hellerstein, release approximately 9,000 pages of internal reports, investigations, and e-mails containing information about prisoner abuse in Guantanamo, Iraq, and Afghanistan. The massive disclosure seemingly marks the end of a more than 13-month long effort (see October 7, 2003 and September 15, 2004) by five human rights groups to access the documents under the Freedom of Information Act. The documents demonstrate that the abuses were far more widespread and systemic than previously acknowledged by the government. The documents include information about numerous abuses, such as threatened and mocked executions, thefts of private property, physical assaults, shocking detainees with electric guns, the use of dogs to intimidate prisoners at Guantanamo, shackling detainees without food and water, and murder. In many of the cases, the Army chose to punish offenders with non-criminal punishments rather than court-martial them. Reporting on the disclosure, the Washington Post notes, “The variety of the abuse and the fact that it occurred over a three-year period undermine the Pentagon’s past insistence… that the abuse occurred largely during a few months at [Abu Ghraib], and that it mostly involved detainee humiliation or intimidation rather than the deliberate infliction of pain.” [Washington Post, 12/22/2004] However, these agencies continue to secret hold back some material and in late 2005 the CIA will destroy videotapes of interrogations relevant to these requests (see November 2005).

Entity Tags: Central Intelligence Agency, Alvin K. Hellerstein

Timeline Tags: Torture of US Captives, Complete 911 Timeline

2005: NSA Proposes New Data Mining Program

The National Security Agency calls for proposals in regard to a new electronic surveillance program, the Advanced Capabilities for Intelligence Analysis (ACIA). Like its cousin, the Novel Intelligence from Massive Data (NIMD) project (see After September 11, 2001), ACIA will use a huge electronic database of information on US citizens and foreign nationals to track potential terrorists and terror plots. Like NIMD, ACIA will look for ways “to construct and use plausible futures in order to provide additional, novel interpretations for today’s collection” of intelligence information, according to the call for proposals. [National Journal, 1/20/2006]

Entity Tags: National Security Agency, Advanced Capabilities for Intelligence Analysis, Novel Intelligence from Massive Data

Timeline Tags: Civil Liberties

Jay Rockefeller.Jay Rockefeller. [Source: US Senate]Ranking member of the Senate Intelligence Committee Jay Rockefeller (D-WV) requests “over a hundred documents” from the CIA’s Inspector General. The documents are referenced in or pertain to a report the Inspector General drafted in May 2004 about the CIA’s detention and interrogation activities. Rockefeller also requests a report drafted by the CIA’s Office of General Counsel (see 2003) on the examination of videotapes of detainee interrogations stating whether the techniques they show comply with an August 2002 Justice Department opinion on interrogation (see August 1, 2002). However, the CIA refuses to provide these documents, as well as others, even after a second request is sent to CIA Director Porter Goss in September 2005. [US Congress, 12/7/2007] The videotapes Rockefeller is asking about will be destroyed by the CIA just two months after his second request (see November 2005).

Entity Tags: Senate Intelligence Committee, John D. Rockefeller, Office of the Inspector General (CIA), Central Intelligence Agency, Porter J. Goss

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Steven Bradbury, the head of the Justice Department’s Office of Legal Counsel, issues a classified memo to John Rizzo, the senior deputy counsel for the CIA. The memo will remain classified for nearly four years (see April 16, 2009). It addresses, in the words of the American Civil Liberties Union (ACLU), “whether CIA interrogation methods violate the cruel, inhuman, and degrading treatment standards under federal and international law.” Bradbury concludes that neither past nor present CIA interrogation methods violate such standards. [Office of Legal Counsel, 5/10/2005 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file]
CIA Techniques Not Torture, Bradbury Explains - Bradbury calls torture “abhorrent” and “universally repudiated,” and says the US will never condone it. Afterwards, he spends a great deal of effort explaining why the various techniques used by the CIA do not constitute torture. Bradbury goes into numerous details about varieties of “harsh interrogation techniques” that can be used on prisoners, often restating details from an August 2002 OLC memo (see August 1, 2002) and elaborating on those descriptions. One technique he details is forced nudity. “Detainees subject to sleep deprivation who are also subject to nudity as a separate interrogation technique will at times be nude and wearing a diaper,” he writes, and notes that the diaper is “for sanitary and health purposes of the detainee; it is not used for the purpose of humiliating the detainee and it is not considered to be an interrogation technique.… The detainee’s skin condition is monitored, and diapers are changed as needed so that the detainee does not remain in a soiled diaper.” He cites “walling,” a technique involving slamming a detainee into a “false wall,” and writes, “Depending on the extent of the detainee’s lack of cooperation, he may be walled one time during an interrogation session (one impact with the wall) or many times (perhaps 20 or 30 times) consecutively.” Other techniques Bradbury cites include waterboarding, “abdominal slaps,” and “water dousing.” For water dousing, Bradbury gives specific restrictions: “For example, in employing this technique:
bullet “For water temperarure of 41°F, total duration of exposure may not exceed 20 minutes without drying and rewarming.
bullet “For water temperarure of 50°F, total duration of exposure may not exceed 40 minutes without drying and rewarming.
bullet “For water tempetarure of 59°F, total duration of exposure may not exceed 60 minutes without drying and rewarming.
“The minimum permissible temperature of the water used in water dousing is 41°F, though you have informed us that in practice the water temperature is generally not below 50°F, since tap water rather than refrigerated water is generally used.” [Office of Legal Counsel, 5/10/2005 pdf file; CNN, 4/17/2009]
Waterboarding Used More Frequently than Authorized - Bradbury also notes that waterboarding is sometimes used more times than authorized or indicated. Referring to an as-yet-unreleased 2004 report by the CIA’s inspector general on torture and abuse of detainees, he writes: “The IG report noted that in some cases the waterboard was used with far greater frequency than initially indicated.… (‘[T]he waterboard technique… was different from the technique described in the DoJ [Department of Justice] opinion and used in the SERE training (see December 2001 and July 2002). The difference was the manner in which the detainee’s breathing was obstructed. At the SERE school and in the DoJ opinion, the subject’s airflow is disrupted by the firm application of a damp cloth over the air passages; the interrogator applies a small amount of water to the cloth in a controlled manner. By contrast, the [CIA] interrogator… applied large volumes of water to a cloth that covered the detainee’s mouth and nose. One of the psychologists/interrogators acknowledged that the agency’s use of the technique is different from that used in SERE training because it is ‘for real—and is more poignant and convincing.’)… The inspector general further reported that ‘OMS [the CIA’s Office of Medical Services] contends that the expertise of the SERE waterboard experience is so different from the subsequent agency usage as to make it almost irrelevant. Consequently, according to OMS, there was no a priori reason to believe that applying the waterboard with the frequency and intensity with which it was used by the psychologist/interrogators was either efficacious or medically safe.‘… We have carefully considered the IG report and discussed it with OMS personnel. As noted, OMS input has resulted in a number of changes in the application of the waterboard, including limits on frequency and cumulative use of the technique. Moreover, OMS personnel are carefully instructed in monitoring this technique and are personally present whenever it is used.… Indeed, although physician assistants can be present when other enhanced techniques are applied, ‘use of the waterboard requires the presence of the physician.’” [Office of Legal Counsel, 5/10/2005 pdf file]

Entity Tags: US Department of Justice, Steven Bradbury, Central Intelligence Agency, Office of Legal Counsel (DOJ), American Civil Liberties Union

Timeline Tags: Civil Liberties

Steven Bradbury, the acting head of the Justice Department’s Office of Legal Counsel, issues a classified memo. The contents and the recipient remain secret, but the American Civil Liberties Union (ACLU) will later determine the memo deals with the use of “enhanced interrogation techniques” by the CIA. In early May, Bradbury determined that none of the CIA’s past or present interrogation methods violated either federal or international standards (see May 10, 2005). [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: Office of Legal Counsel (DOJ), American Civil Liberties Union, US Department of Justice, Steven Bradbury

Timeline Tags: Civil Liberties

Henry Kennedy.Henry Kennedy. [Source: District Court for the District of Columbia]In June 2005, US District Judge Henry Kennedy orders the Bush administration to safeguard “all evidence and information regarding the torture, mistreatment, and abuse of detainees now at the United States Naval Base at Guantanamo Bay.” US District Judge Gladys Kessler issued a nearly identical order one month later. Later that year, the CIA will destroy videotapes of the interrogation and possible torture of high-ranking al-Qaeda detainees Abu Zubaida and Abd al-Rahim al-Nashiri (see November 2005). In 2005, Zubaida and al-Nashiri are not being held at the Guantanamo prison, but at secret CIA prisons overseas. But while evidence of torture of Zubaida and al-Nashiri is not directly covered by the orders, it may well be indirectly covered. David Remes, a lawyer for some of the Guantanamo detainees, will later claim, “It is still unlawful for the government to destroy evidence, and it had every reason to believe that these interrogation records would be relevant to pending litigation concerning our client.” In January 2005, Assistant Attorney General Peter Keisler assured Kennedy that government officials were “well aware of their obligation not to destroy evidence that may be relevant in pending litigation.” [Associated Press, 12/12/2007] In some court proceedings, prosecutors have used evidence gained from the interrogation of Zubaida to justify the continued detention of some Guantanamo detainees. Scott Horton writing for Harper’s magazine will later comment that “in these trials, a defendant can seek to exclude evidence if it was secured through torture. But the defendant has an obligation to prove this contention. The [destroyed videotapes] would have provided such proof.” [Harper's, 12/15/2007]

Entity Tags: Peter Keisler, Henry H. Kennedy Jr., David Remes, Abd al-Rahim al-Nashiri, Gladys Kessler, Abu Zubaida

Timeline Tags: Torture of US Captives, Complete 911 Timeline

In a Columbus, Ohio, speech praising the USA Patriot Act (see October 26, 2001), President Bush claims that when US government agencies wiretap anyone’s phones or email communications, they do so with a court order. Bush says: “Before the Patriot Act, agents could use wiretaps to investigate a person committing mail fraud, but not to investigate a foreign terrorist. The Patriot Act corrected all these pointless double standards—and America is safer as a result. One tool that has been especially important to law enforcement is called a roving wiretap. Roving wiretaps allow investigators to follow suspects who frequently change their means of communications. These wiretaps must be approved by a judge, and they have been used for years to catch drug dealers and other criminals. Yet, before the Patriot Act, agents investigating terrorists had to get a separate authorization for each phone they wanted to tap. That means terrorists could elude law enforcement by simply purchasing a new cell phone. The Patriot Act fixed the problem by allowing terrorism investigators to use the same wiretaps that were already being using against drug kingpins and mob bosses. The theory here is straightforward: If we have good tools to fight street crime and fraud, law enforcement should have the same tools to fight terrorism.” [White House, 6/9/2005] Bush made almost identical claims a year ago (see April 19-20, 2004). The same day as Bush makes his speech, the White House issues a fact sheet making the same claims (see June 9, 2005). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48]

Entity Tags: Mark Klein, George W. Bush, National Security Agency, USA Patriot Act

Timeline Tags: Civil Liberties

Months after the Bush administration successfully convinced the New York Times to hold off publishing its report on the administration’s warrantless wiretapping program (see Early November 2004, December 6, 2005, and December 15, 2005), one of the reporters on the story, Eric Lichtblau, attempts to get a response on the program from one of the few Democrats briefed on it, House Intelligence Committee ranking member Jane Harman (D-CA). In his 2008 book Bush’s Law: The Remaking of American Justice, Lichtblau will write about covering a House hearing where Harman launches into a passionate call for stronger civil liberties safeguards in the reauthorization of the USA Patriot Act (see March 9, 2006). According to his recollection, Lichtblau approaches Harman and says, “I’m trying to square what I heard in there with what we know about that program.” He will write: “Harman’s golden California tan turned a brighter shade of red. She knew exactly what I was talking about. Shooing away her aides, she grabbed me by the arm and drew me a few feet away to a more remote section of the Capitol corridor. ‘You should not be talking about that here,’ she scolded me in a whisper. ’ They don’t even know about that,’ she said, gesturing to her aides, who were now looking on at the conversation with obvious befuddlement.” Harman tells Lichtblau, “The Times did the right thing by not publishing that story,” but will not discuss the details. When asked what intelligence capabilities would be lost by informing the public about something the terrorists already knew—that the government was listening to them—she simply replies, “This is a valuable program, and it would be compromised.” Lichtblau will add: “This was clearly as far as she was willing to take the conversation, and we didn’t speak again until months later, after the NSA story had already run. By then, Harman’s position had undergone a dramatic transformation. When the story broke publicly, she was among the first in line on Capitol Hill to denounce the administration’s handling of the wiretapping program, declaring that what the NSA was doing could have been done under the existing FISA law.” [TPM Muckraker, 3/19/2008]

Entity Tags: Eric Lichtblau, Bush administration (43), New York Times, House Intelligence Committee, Jane Harman

Timeline Tags: Civil Liberties

After media begin to report on the CIA’s rendition from Italy of Islamist extremist Hassan Mustafa Osama Nasr (see Noon February 17, 2003 and June 23, 2005 and After), the agency’s Director Porter Goss asks its inspector general to review the case. According to the New York Times, the review is to focus on the “amateurish tradecraft in the case, like operatives staying in five-star hotels and using traceable credit cards and cellphones.” However, CIA Deputy Director for Operations Jose Rodriguez says that there is no need for a review by the inspector general and that the directorate of operations, which is soon to be renamed the National Clandestine Service, will investigate itself. [New York Times, 2/20/2008] Rodriguez was the head of the CIA’s Counterterrorist Center at the time of the rendition (see May 2002), but his role in approving the operation is unclear.

Entity Tags: Office of the Inspector General (CIA), Central Intelligence Agency, Jose Rodriguez, Jr., Porter J. Goss, Directorate of Operations

Timeline Tags: Torture of US Captives

Lawyers refile a civil suit against Secretary of Defense Donald Rumsfeld on behalf of “enemy combatant” Ali Saleh Kahlah al-Marri, who has been in US custody since late 2001 (see December 12, 2001) and was designated as an enemy combatant a year and a half later (see June 23, 2003). Al-Marri is asking the federal district court in South Carolina to declare unconstitutional what he, through his lawyers, calls the severe and unnecessary deprivations and restrictions to which he has been subjected since he was placed in military custody. Al-Marri had already filed a suit challenging the legality of his detention on habeas corpus grounds, a lawsuit that was ultimately dismissed (see October 4, 2004). Human Rights Watch director Jamie Fellner says: “It is bad enough that al-Marri has been held indefinitely without charges and incommunicado. Now we learn that his life in the brig has also been one of cruelty and petty vindictiveness.” [Human Rights Watch, 8/8/2005]
Allegations of Cruel Treatment - Al-Marri is currently the only known person designated as an enemy combatant still in legal limbo. He has been in solitary confinement since his December 2001 arrest, and in Guantanamo since mid-2003. Al-Marri was sent to the Charleston, South Carolina Naval brig once he was designated as an enemy combatant, isolated in a lightless cell hardly larger than a closet, and since then, his lawyers say, he has been subjected to deprivations of the most basic kinds, including shoes, socks, blankets, toilet paper, toothpaste, and sunlight. Sometimes he is denied water. During the day his mattress is removed. His captors often turn the temperature down in his cell to near-freezing conditions, but do not give him extra clothes or blankets. He is provided three short “recreation” sessions a week—in handcuffs and leg irons—but those are often denied him. He is allowed three showers a week, again in handcuffs and leg irons. He has been denied access to medical care. A devout Muslim, he is not given the basic necessities for religious observances—his captors even refuse to tell him which way to face towards Mecca, an essential element of daily devotions. Letters from his wife and children are heavily censored. Privileged notes he has written to his lawyer have been confiscated and not returned. He is subjected to constant video surveillance. He was repeatedly interrogated, his lawyers say, but has not been interrogated for a year. His captors have repeatedly threatened his family, telling him that he would be sent to Egypt or Saudi Arabia, where he would be tortured and sodomized and his wife raped in front of him. According to the lawsuit, his captors falsely told him that, because of him, his father and four of his brothers were in jail, and that if he cooperated, they would be released.
Commentary - “Mr. al-Marri has been detained at a naval brig for two-and-a-half years in cell that is 9 feet by 6 feet,” says law professor Jonathan Hafetz, who will become one of al-Marri’s lawyers. “During that time he has long been denied books, news, any contact with the outside world other than his attorneys, including his wife and five children, who he has neither seen nor spoken to. I mean things that we don’t even do to people who’ve been convicted of crimes.” Fellner says: “It’s the combination of restrictions imposed on al-Marri that offends basic norms of decency. There is no security justification for them. The Pentagon apparently believes it can hold him under any conditions they choose for as long as they choose.” [Human Rights Watch, 8/8/2005; Associated Press, 8/9/2005; Al-Marri v. Rumsfeld, 8/9/2005 pdf file; CNN, 12/13/2005]
Military Denies Mistreatment - The military denies that al-Marri has been mistreated. [CNN, 12/13/2005] Defense spokesman Navy Lieutenant Commander J. D. Gordon says in 2007, “The government in the strongest terms denies allegations of torture, allegations made without support and without citing a shred of record evidence. It is our policy to treat all detainees humanely.” [Progressive, 3/2007]

Entity Tags: Jamie Fellner, Bush administration (43), Ali Saleh Kahlah al-Marri, Donald Rumsfeld, J.D. Gordon, US Department of Defense, Mohammed al-Marri, Human Rights Watch, Jonathan Hafetz

Timeline Tags: Torture of US Captives, Civil Liberties

The Fourth Circuit Court of Appeals rules that President Bush, as commander in chief, can continue to hold Jose Padilla (see June 9, 2002), a US citizen arrested on US soil (see June 8, 2002), indefinitely as an enemy combatant. Padilla is to be treated the same as an American captured on a foreign battlefield (see June 28, 2004). The majority ruling is written by Judge J. Michael Luttig, often thought of as a potential Bush Supreme Court nominee. Luttig rules there is “no difference in principle between [Yaser Esam] Hamdi (see June 28, 2004) and Padilla.” Bush’s “powers include the power to detain identified and committed enemies such as Padilla, who associated with al-Qaeda and the Taliban regime, and who entered the United States for the avowed purpose of further prosecuting [terrorism] by attacking American citizens and targets on our own soil.” Luttig ignores the fact that Padilla has never been charged, much less convicted, of any crime. When the Bush administration later charges Padilla as an ordinary criminal—and does not charge him with with any of the terrorist activities it had long alleged he had committed—many administration critics will conclude that, just as in the Hamdi case, the administration had used inflammatory rhetoric and baseless charges to obtain a judicial decision it wanted (see October 10, 2004). When Luttig learns of the administration’s actions, he will issue a supplementary opinion excoriating the White House (see December 21, 2005). [Savage, 2007, pp. 200]

Entity Tags: Jose Padilla, J. Michael Luttig

Timeline Tags: Civil Liberties

John Rizzo.John Rizzo. [Source: C-SPAN]Guidance is issued by CIA lawyers Robert Eatinger and Steven Hermes to the CIA’s National Clandestine Service (NCS) on the preservation of videotapes of detainee interrogations made by the CIA. [New York Times, 12/19/2007] The guidance is apparently used as justification for the tapes’ destruction (see November 2005), but its content is unclear. According to one account, “Lawyers within the clandestine branch of the Central Intelligence Agency gave written approval in advance to the destruction in 2005 of hundreds of hours of videotapes documenting interrogations of two lieutenants from al-Qaeda.” [New York Times, 12/11/2007] Another account supports this, saying the lawyers give “written guidance to [CIA manager Jose] Rodriguez that he had the authority to destroy the tapes and that the destruction would violate no laws.” [New York Times, 12/19/2007] However, according to another account: “[The guidance] advises that there is no explicit legal reason why the Clandestine Service had to preserve the tapes… The document does not, however, directly authorize the tapes’ destruction or offer advice on the wisdom or folly of such a course of action.” [Newsweek, 12/11/2007] Some CIA videotapes have been requested for court proceedings, meaning such tapes should not be destroyed, but it is unclear if the tapes that are destroyed in November 2005 have been requested by courts or not (see May 7-9, 2003 and November 3-14, 2005). The CIA’s top lawyer, John Rizzo, is not asked for an opinion, although he has been involved in discussions about what to do with the tapes for years and several high-ranking officials and legislators are of the opinion that the tapes should not be destroyed (see November 2005). [New York Times, 12/11/2007] Eatinger and Hermes apparently inform Rizzo they have issued the guidance and expect Rodriguez will consult him before destroying the tapes, but Rodriguez does not do so. [New York Times, 12/19/2007] The New York Times will comment, “It is unclear what weight an opinion from a lawyer within the clandestine service would have if it were not formally approved by Mr. Rizzo. But [an anonymous former official] said Mr. Rodriguez and others in the clandestine branch believed the legal judgment gave them the blessing to destroy the tapes.” The former official will also say they “didn’t need to ask Rizzo’s permission.” [New York Times, 12/11/2007] A lawyer acting for Rodriguez will later say, “He had a green light to destroy them.” [New York Times, 12/19/2007] However, other former CIA officers will express surprise that a lawyer junior to Rizzo would approve such a controversial decision without asking for his input. Former CIA lawyer John Radsan will say, “I’d be surprised that even the chief [NCS] lawyer made a decision of that magnitude without bringing the General Counsel’s front office into the loop.” He adds, “Although unlikely, it is conceivable that once a CIA officer got the answer he wanted from a [NCS] lawyer, he acted on that advice… But a streamlined process like that would have been risky for both the officer and the [NCS] lawyer.” [New York Times, 12/11/2007]

Entity Tags: Robert Eatinger, National Clandestine Service, Jose Rodriguez, Jr., Steven Hermes, John Radsan, Central Intelligence Agency, John Rizzo, Directorate of Operations

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

The Central Intelligence Agency destroys videotapes of the interrogations of two high-ranking detainees, Abu Zubaida and Abd al-Rahim al-Nashiri, which were made in 2002 (see Spring-Late 2002). One anonymous senior intelligence official later claims that “Several hundred hours” of videotapes are destroyed. [Washington Post, 12/18/2007] The tapes are destroyed at the CIA station in Thailand by station chief Michael Winograd, as Zubaida and al-Nashiri apparently were tortured at a secret CIA prison in that country. [Newsweek, 6/28/2008; Associated Press, 7/26/2010] The decision to destroy the tapes is apparently made by Jose Rodriguez, chief of the CIA’s Directorate of Operations, despite previous advice not to destroy them (see November 2005). However, some accounts will suggest that Rodriguez received clearance to destroy the tapes (see December 7, 2007). [New York Times, 12/8/2007] The CIA’s treatment of detainees has recently come under increased scrutiny. As the Wall Street Journal will later remark, “the Abu Ghraib prison pictures were still fresh, the existence of secret CIA prisons had just been revealed, and politicians on Capitol Hill were talking about curtailing ‘extreme techniques,’ including the Central Intelligence Agency’s own interrogation tactics.” [Wall Street Journal, 12/10/2007] Beginning on November 2, 2005, there are some pivotal articles revealing details about the CIA’s handling of detainees, suggesting that some of them were illegally tortured (see November 2-18, 2005). According to a 2007 statement by future CIA Director Michael Hayden, the tapes are destroyed “in the absence of any legal or internal reason to keep them” and because they apparently pose “a serious security risk”; if they were leaked, they could be used for retaliation by al-Qaeda and its sympathizers. [Central Intelligence Agency, 12/6/2007] However, this rationale will be questioned when the destruction is revealed in late 2007 (see December 6, 2007). Senator Carl Levin (D-MI) will call this “a pathetic excuse.… You’d have to burn every document at the CIA that has the identity of an agent on it under that theory.” CBS News will offer an alternative explanation, saying that the tapes are destroyed “to protect CIA officers from criminal prosecution.” [CBS News, 12/7/2007] CIA Director Porter Goss and the CIA’s top lawyer, John Rizzo, are allegedly not notified of the destruction in advance, and Rizzo will reportedly be angry at this failure. [New York Times, 12/8/2007] But Newsweek will later claim that Goss and Rizzo were involved in extensive discussions with the White House over what to do with the tapes. Goss supposedly thought there was an understanding the tapes would be saved and is upset to learn they have been destroyed (see Between 2003-Late 2005 and Before November 2005). [Newsweek, 12/11/2007] Congressional officials responsible for oversight are not informed for a year (see March 14, 2007). A White House spokeswoman will say that President Bush has “no recollection” of being made aware of the tapes’ destruction before 2007 (see December 11, 2007). It is also unclear whether the Justice Department is notified in advance or not. [New York Times, 12/8/2007] The CIA still retains tapes of interrogations of at least one detainee (see September 19 and October 18, 2007).

Entity Tags: Abd al-Rahim al-Nashiri, Abu Zubaida, Jose Rodriguez, Jr., CIA Bangkok Station, John Rizzo, Porter J. Goss, Michael K. Winograd, Central Intelligence Agency

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Following a request that the CIA be exempted from a US ban on torture, claims about alleged CIA mistreatment of prisoners begin to appear in the media, apparently fueled by CIA employees unhappy with the practices the CIA is employing. On November 2, the Washington Post reveals information about the CIA’s network of secret prisons, including facilities in Europe, which is kept secret from “nearly all members of Congress charged with overseeing the CIA’s covert actions.” The rationale for the policy is that the CIA apparently needs to hold people without the restrictions imposed by the US legal system, in order to keep the country safe. Detainees are said to be tortured, and this is not only questionable under US law, but, in some cases, against the law of the host country. [Washington Post, 11/2/2005] On November 9, the New York Times reveals that in 2004, the CIA’s Inspector General secretly concluded that the CIA’s aggressive interrogation techniques in use up until that time were likely in violation of a 1994 international treaty against torture signed by the US (see May 7, 2004). [New York Times, 11/9/2005] After the network is revealed, there is much interest in what actually goes on in it and more important details are uncovered by ABC News on November 18. Apparently, the CIA’s interrogation techniques have led to the death of one detainee and include sleep deprivation, physical violence, waterboarding, and leaving prisoners in cold cells (see Mid-March 2002). The intelligence generated by these techniques is said to be questionable, and one source says: “This is the problem with using the waterboard. They get so desperate that they begin telling you what they think you want to hear.” [ABC News, 11/18/2005] Some videotapes of CIA interrogations of detainees are destroyed this same month, although what date this happens exactly is unclear (see November 2005). The CIA is also so alarmed by these revelations that it immediately closes its secret prisons in Eastern Europe and opens a new one in a remote section of the Sahara desert (see November 2005).

Entity Tags: Central Intelligence Agency

Timeline Tags: Torture of US Captives, Complete 911 Timeline

On November 3, 2005, Leonie Brinkema, the judge in the Zacarias Moussaoui trial, asks the CIA about recordings of interrogations of detainees who are related to the Moussaoui case. Eleven days later, the CIA again incorrectly claims to prosecutors in that trial that it has no such recordings. The CIA made a similar claim in 2003 (see May 7-9, 2003), but in fact the CIA secretly videotaped detainee interrogations in 2002 (see Spring-Late 2002). Some of these videotapes are destroyed this month (see November 2005), however it is unknown if the destruction takes place before or after this date. In late 2007, the CIA will reveal that it did have some videotapes after all and prosecutors will finally be able to view some of them (see September 19 and October 18, 2007). But it will also be revealed that most of the videotapes were destroyed (see December 6, 2007). Prosecutors will later claim that neither the video nor the audio recordings contained material relevant to the Moussaoui trial, and some of the content of the interrogations was provided during discovery. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006; US District Court for the Eastern District of Virginia, Alexandria Division, 10/25/2007 pdf file; Reuters, 11/13/2007]

Entity Tags: Leonie Brinkema, Zacarias Moussaoui, Central Intelligence Agency

Timeline Tags: Torture of US Captives, Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Jose Padilla being escorted by federal agents in January 2006.Jose Padilla being escorted by federal agents in January 2006. [Source: Alan Diaz / Associated Press]Jose Padilla, a US citizen and “enemy combatant” alleged to be an al-Qaeda terrorist (see May 8, 2002) and held without charges for over three years (see October 9, 2005), is charged with being part of a North American terrorist cell that sent money and recruits overseas to, as the indictment reads, “murder, maim, and kidnap.” The indictment contains none of the sensational allegations that the US government has made against Padilla (see June 10, 2002), including his supposed plan to detonate a “dirty bomb” inside the US (see Early 2002) and his plans to blow up US hotel and apartment buildings (see March 2002). Nor does the indictment accuse Padilla of being a member of al-Qaeda. Attorney General Alberto Gonzales says, “The indictment alleges that Padilla traveled overseas to train as a terrorist (see September-October 2000) with the intention of fighting a violent jihad.” He refuses to say why the more serious charges were not filed. Some provisions of the Patriot Act helped the investigation, Gonzales adds: “By tearing down the artificial wall that would have prevented this kind of investigation in the past, we’re able to bring these terrorists to justice,” he says. The Padilla case has become a central part of the dispute over holding prisoners such as Padilla without charge; by charging Padilla with lesser crimes, the Bush administration avoids the possibility of the Supreme Court ruling that he and other “enemy combatants,” particularly American citizens, must either be tried or released. Law professor Eric Freedman says the Padilla indictment is an effort by the administration “to avoid an adverse decision of the Supreme Court.” Law professor Jenny Martinez, who represents Padilla, says: “There’s no guarantee the government won’t do this again to Mr. Padilla or others. The Supreme Court needs to review this case on the merits so the lower court decision is not left lying like a loaded gun for the government to use whenever it wants.” Padilla’s lawyers say the government’s case against their client is based on little more than “double and triple hearsay from secret witnesses, along with information allegedly obtained from Padilla himself during his two years of incommunicado interrogation.” Padilla will be transferred from military custody to the Justice Department, where he will await trial in a federal prison in Miami. He faces life in prison if convicted of conspiracy to murder, maim, and kidnap overseas. The lesser charges—providing material support to terrorists and conspiracy—carry maximum prison terms of 15 years each. [Associated Press, 11/22/2005; Fox News, 11/23/2005]
'Dirty Bomb' Allegations 'Not Credible,' Says Former FBI Agent - Retired FBI agent Jack Cloonan, an expert on al-Qaeda, later says: “The dirty bomb plot was simply not credible. The government would never have given up that case if there was any hint of credibility to it. Padilla didn’t stand trial for it, because there was no evidence to support it.” [Vanity Fair, 12/16/2008]
Issue with CIA Videotapes - In 2002, captured al-Qaeda leader Abu Zubaida identified Padilla as an al-Qaeda operative (see Mid-April 2002) and the government cited Zubaida as a source of information about Padilla after Padilla’s arrest. Yet, sometime this same month, the CIA destroys the videotapes of Zubaida’s interrogations from the time period where he allegedly identified Padilla (see November 2005). The Nation’s Aziz Huq will later comment: “Given the [Bush] administration’s reliance on Zubaida’s statements as evidence of Padilla’s guilt, tapes of Zubaida’s interrogation were clearly relevant to the Padilla trial.… A federal criminal statute prevents the destruction of any record for a foreseeable proceeding, even if the evidence is not admissible.… [I]t seems almost certain that preservation of the tapes was legally required by the Jose Padilla prosecution.” [Nation, 12/11/2007]

Entity Tags: Jenny Martinez, Jose Padilla, US Supreme Court, Jack Cloonan, Eric Freedman, Alberto R. Gonzales, Bush administration (43), Al-Qaeda, Aziz Huq, Central Intelligence Agency

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Deputy Director of National Intelligence Michael Hayden learns that the CIA has videotaped some detainee interrogations (see Spring-Late 2002). Hayden will later say he finds this out towards the end of his time as deputy director of national intelligence, a position he leaves in May 2006. Although the tapes were destroyed several months previously (see November 2005), Hayden will later say he is not aware of their destruction at this point: “I did not personally know before they were destroyed, not at all… I was aware of the existence of the tapes but really didn’t become focused on it until the summer of ‘06.” It appears that Hayden does not inform any congressional oversight committees of the destruction until 2007 (see March 14, 2007 and December 7, 2007), even though he becomes CIA director in the summer of 2006 (see May 5, 2006). [Associated Press, 12/12/2007; Fox News, 12/13/2007]

Entity Tags: Michael Hayden, Central Intelligence Agency

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Arthur Sulzberger.Arthur Sulzberger. [Source: New York Times]George W. Bush summons New York Times publisher Arthur Sulzberger and Times editor Bill Keller to the Oval Office to try to dissuade them from running a landmark story revealing the NSA’s illegal wiretapping program (see December 15, 2005) that he authorized in 2002 (see Early 2002). In the meeeting, Bush warns Sulzberger and Keller that “there’ll be blood on your hands” if another terrorist attack were to occur, obviously implying that to reveal the nature of the program would invite terrorist strikes. Bush is unsuccessful in his attempt to quash the story. [Newsweek, 12/21/2005; Newsweek, 12/22/2008]

Entity Tags: New York Times, Arthur Sulzberger, George W. Bush, National Security Agency, Bill Keller

Timeline Tags: Civil Liberties

In his weekly radio address, President Bush claims that the US always obtains court warrants before launching electronic surveillance efforts. “The Patriot Act is helping America defeat our enemies while safeguarding civil liberties for all our people,” he says. “The judicial branch has a strong oversight role in the application of the Patriot Act. Under the act, law enforcement officers need a federal judge’s permission to wiretap a foreign terrorist’s phone or search his property. Congress also oversees our use of the Patriot Act. Attorney General Gonzales delivers regular reports on the Patriot Act to the House and the Senate.” [White House, 12/10/2005] Bush has made similar claims in the recent past (see April 19-20, 2004, June 9, 2005, and April 19-20, 2004). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48]

Entity Tags: Mark Klein, AT&T, George W. Bush, USA Patriot Act, National Security Agency

Timeline Tags: Civil Liberties

New York Times headline from article revealing NSA surveillance.New York Times headline from article revealing NSA surveillance. [Source: CBS News]The New York Times reveals that after the 9/11 attacks, President Bush granted the National Security Agency (NSA) secret authorization to eavesdrop on Americans and others inside the US without going through the Foreign Intelligence Surveillance Act (FISA) court to obtain legal warrants (see Early 2002. The administration justifies its actions by claiming such eavesdropping, which includes wiretapping phones and reading e-mails, is necessary to find evidence of terrorist activities, and says the nation needs the program after the 9/11 attacks exposed deficiencies in the US intelligence community’s information gathering process, and because of what they characterize as the “handcuffing” of US intelligence agencies by restrictive laws. The Times has had the article for over a year; the White House prevailed on the Times not to publish its findings for that time, arguing that publication would jeopardize continuing investigations and warn potential terrorists that they were under scrutiny. Many believe that the White House wanted to delay the publication of the article until well after the 2004 presidential elections. The Times delayed publication for over a year, and agreed to suppress some information that administration officials say could be useful to terrorists. (Less than two weeks before the article is published, Bush tries to convince the Times not to print the article at all: see December 6, 2005.) Two days after the Times publishes its article, Bush will acknowledge the order, and accuse the Times of jeopardizing national security (see December 17, 2005). The NSA program eavesdrops without warrants on up to 500 people in the US at any given time, officials say; the overall numbers have likely reached into the thousands. Overseas, up to 7,000 people suspected of terrorist ties are being monitored. Officials point to the discovery of a plot by Ohio trucker and naturalized US citizen and alleged al-Qaeda supporter Iyman Faris to bring down the Brooklyn Bridge with blowtorches as evidence of the program’s efficacy. They also cite the disruption of an al-Qaeda plot to detonate fertilizer bombs outside of British pubs and train stations by the program. But, officials say, most people targeted by the NSA for warrantless wiretapping have never been charged with a crime, and many are targeted because of questionable evidence and groundless suspicion. Many raise an outcry against the program, including members of Congress, civil liberties groups, immigrant rights groups, and others who insist that the program undermines fundamental Constitutional protections of US citizens’ civil liberties and rights to privacy. Several other government programs to spy on Americans have been challenged, including the Federal Bureau of Investigation (FBI)‘s surveillance of US citizens’ library and Internet usage, the monitoring of peaceful antiwar protests, and the proposed use of public and private databases to hunt for terrorist links. In 2004, the Supreme Court overturned the administration’s claim that so-called “enemy detainees” were not entitled to judicial review of their indefinite detentions. Several senior officials say that when the warrantless wiretapping program began, it operated with few controls and almost no oversight outside of the NSA itself. The agency is not required to seek the approval of the Justice Department or anyone else outside the FISA court for its surveillance operations. Some NSA officials wanted nothing to do with a program they felt was patently illegal, according to a former senior Bush administration official. Internal concerns about the program prompted the Bush administration to briefly suspend the program while Justice Department officials audited it and eventually provided some guidelines for its operations. A complaint from Judge Colleen Kollar-Kotelly, the federal judge who oversees the FISA Court, helped spur the suspension, according to officials. Kollar-Kotelly questioned whether information obtained under the program was being improperly used as the basis for FISA wiretap warrant requests from the Justice Department. Some government lawyers say that the Justice Department may have deliberately misled Kollar-Kotelly and the FISA court about the program in order to keep the program under wraps. The judge insisted to Justice Department officials that any material gathered under the program not be used in seeking wiretap warrants from her court. The question also arose in the Faris case, when senior Justice Department officials worried that evidence obtained by warrantless wiretapping by the NSA of Faris could be used in court without having to lie to the court about its origins. [New York Times, 12/15/2005]

Entity Tags: US Supreme Court, George W. Bush, US Department of Justice, Iyman Faris, National Security Agency, New York Times, Al-Qaeda, Foreign Intelligence Surveillance Court, Colleen Kollar-Kotelly

Timeline Tags: Civil Liberties

Times executive editor Bill Keller.Times executive editor Bill Keller. [Source: New York Times]The New York Times’s executive editor, Bill Keller, defends his paper’s decision to reveal the Bush administration’s warrantless wiretapping program, conducted through the NSA (see December 15, 2005), after holding the story for over a year. Keller writes: “We start with the premise that a newspaper’s job is to publish information that is a matter of public interest. Clearly a secret policy reversal that gives an American intelligence agency discretion to monitor communications within the country is a matter of public interest.… A year ago, when this information first became known to Times reporters, the administration argued strongly that writing about this eavesdropping program would give terrorists clues about the vulnerability of their communications and would deprive the government of an effective tool for the protection of the country’s security. Officials also assured senior editors of The Times that a variety of legal checks had been imposed that satisfied everyone involved that the program raised no legal questions. As we have done before in rare instances when faced with a convincing national security argument, we agreed not to publish at that time. We also continued reporting, and in the ensuing months two things happened that changed our thinking. First, we developed a fuller picture of the concerns and misgivings that had been expressed during the life of the program. It is not our place to pass judgment on the legal or civil liberties questions involved in such a program, but it became clear those questions loomed larger within the government than we had previously understood. Second, in the course of subsequent reporting we satisfied ourselves that we could write about this program—withholding a number of technical details—in a way that would not expose any intelligence-gathering methods or capabilities that are not already on the public record. The fact that the government eavesdrops on those suspected of terrorist connections is well-known. The fact that the NSA can legally monitor communications within the United States with a warrant from the Foreign Intelligence Surveillance Court is also public information. What is new is that the NSA has for the past three years had the authority to eavesdrop on Americans and others inside the United States without a warrant. It is that expansion of authority—not the need for a robust anti-terror intelligence operation—that prompted debate within the government, and that is the subject of the article.” [CNN, 12/16/2005]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, George W. Bush, Bill Keller

Timeline Tags: Civil Liberties

President Bush acknowledges that he issued a 2002 executive order authorizing the National Security Agency (NSA) to wiretap US citizens’ phones and e-mails without proper warrants, and accuses the New York Times of jeopardizing national security by publishing its December 15 article (see Early 2002 and December 15, 2005). Bush says he was within the law to issue such an order, which many feel shatters fundamental Constitutional guarantees of liberty and privacy, but accuses the Times of breaking the law by publishing the article. Bush tells listeners during his weekly radio address that the executive order is “fully consistent” with his “constitutional responsibilities and authorities.” But, he continues, “Yesterday the existence of this secret program was revealed in media reports, after being improperly provided to news organizations. As a result, our enemies have learned information they should not have, and the unauthorized disclosure of this effort damages our national security and puts our citizens at risk.” He admits allowing the NSA to “to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations” in a program designed to “detect and prevent terrorist attacks.” Under the law, the NSA must obtain warrants from the Foreign Intelligence Surveillance Act (FISA) Court, but after Bush’s executive order, it was no longer required to do so. Bush justifies the order by citing the example of two 9/11 hijackers, Khalid Almihdhar and Nawaf Alhazmi, who, he says, “communicated while they were in the United States to other members of al-Qaeda who were overseas, but we didn’t know they were here until it was too late.” Because of the unconstitutional wiretapping program, it is “more likely that killers like these 9/11 hijackers will be identified and located in time, and the activities conducted under this authorization have helped detect and prevent possible terrorist attacks in the United States and abroad.” Bush also admits to reauthorizing the program “more than thirty times,” and adds, “I intend to do so for as long as our nation faces a continuing threat from al-Qaeda and related groups.” [CNN, 12/16/2005] Bush fails to address the likelihood that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, George W. Bush, Khalid Almihdhar, Foreign Intelligence Surveillance Act, Nawaf Alhazmi, Al-Qaeda

Timeline Tags: Civil Liberties

After the NSA’s warrantless wiretapping program is revealed (see Early 2002 and December 15, 2005), some commentators criticize the program. Americans have fundamental Constitutional protections that are enforceable in court whether their conversations are domestic or international, says law scholar Geoffrey Stone. Stone says that President Bush’s emphasis that NSA wiretapping only takes place on US calls to overseas phones or overseas e-mails “is no different, as far as the law is concerned, from saying we only do it on Tuesdays.” Former FBI national security law chief Michael Woods, who served in the position when Bush signed the NSA directive, calls the program “very dangerous.” Though Woods says the program was justifiable in the immediate aftermath of 9/11, “[By now] we ought to be past the time of emergency responses. We ought to have more considered views now…. We have time to debate a legal regime and what’s appropriate.” [Washington Post, 12/18/2005] Kate Martin, director of the Center for National Security Studies, says the secret order may amount to Bush authorizing criminal activity in direct violation of FISA. “This is as shocking a revelation as we have ever seen from the Bush administration,” she says. “It is, I believe, the first time a president has authorized government agencies to violate a specific criminal prohibition and eavesdrop on Americans.” The American Civil Liberties Union’s Caroline Frederickson says of the program, “It’s clear that the administration has been very willing to sacrifice civil liberties in its effort to exercise its authority on terrorism, to the extent that it authorizes criminal activity.” [Washington Post, 12/16/2005]

Entity Tags: Center for National Security Studies, Geoffrey Stone, American Civil Liberties Union, National Security Agency, Caroline Frederickson

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales and NSA chief Lieutenant General Michael Hayden conduct their own “briefing” on the recently revealed NSA wiretapping program (see December 15, 2005) with the White House press corps. Gonzales and Hayden make the following points:
bullet Gonzales says that he will not discuss the internal workings of the still-classified program, only what he calls its “legal underpinnings.”
bullet He claims that the program, which he calls “the most classified program that exists in the United States government,” is legal because President Bush authorized it, and says that the idea that “the United States is somehow spying on American citizens” is wrong: it is “[v]ery, very important to understand that one party to the communication has to be outside the United States.”
bullet He says that for the NSA to eavesdrop on a US citizen’s telephone or e-mail communications, “we have to have a reasonable basis to conclude that one party to the communication is a member of al-Qaeda, affiliated with al-Qaeda, or a member of an organization affiliated with al-Qaeda, or working in support of al-Qaeda.” The wiretapping program is an essential part of the administration’s war against terror, he says.
bullet He goes on to claim that “the authorization to use force, which was passed by the Congress in the days following September 11th, constitutes” legal grounds for “this kind of signals intelligence.” [White House, 12/19/2005] The White House signed Congress’s Authorization to Use Military Force (AUMF) into law on September 18, 2001 (see September 14-18, 2001. [White House, 9/18/2001]
Hayden Claims Supreme Court Backing - While he admits that the Congressional authorization to use force against international terrorism does not specifically mention any kind of electronic surveillance, he refers the listeners to the Supreme Court case concerning alleged US terrorist Yaser Esam Hamdi (see June 28, 2004), in which the Court ruled that Hamdi had the legal right to challenge his detention. “[T]he United States government took the position that Congress had authorized that detention in the authorization to use force, even though the authorization to use force never mentions the word ‘detention.’ And the Supreme Court, a plurality written by Justice O’Connor agreed. She said, it was clear and unmistakable that the Congress had authorized the detention of an American citizen captured on the battlefield as an enemy combatant for the remainder—the duration of the hostilities. So even though the authorization to use force did not mention the word, ‘detention,’ she felt that detention of enemy soldiers captured on the battlefield was a fundamental incident of waging war, and therefore, had been authorized by Congress when they used the words, ‘authorize the President to use all necessary and appropriate force.’ For the same reason, we believe signals intelligence is even more a fundamental incident of war, and we believe has been authorized by the Congress. And even though signals intelligence is not mentioned in the authorization to use force, we believe that the Court would apply the same reasoning to recognize the authorization by Congress to engage in this kind of electronic surveillance.”
Bush 'Very Concerned' With Protecting Civil Liberties - Gonzales insists, Bush “is very concerned about the protection of civil liberties, and that’s why we’ve got strict parameters, strict guidelines in place out at NSA to ensure that the program is operating in a way that is consistent with the President’s directives.” He adds, “[W]e feel comfortable that this surveillance is consistent with requirements of the Fourth Amendment. The touchstone of the Fourth Amendment is reasonableness, and the Supreme Court has long held that there are exceptions to the warrant requirement in—when special needs outside the law enforcement arena. And we think that that standard has been met here.”
Wiretapping Essential in Catching Terrorists - Hayden reiterates how important the wiretapping is to catching terrorists and stopping potential attacks against US targets, though he and Gonzales both refuse to say what, if any, terrorist plots or what terror suspects might have been captured through the NSA wiretapping program. Hayden does say, “This program has been successful in detecting and preventing attacks inside the United States.…I can say unequivocally, all right, that we have got information through this program that would not otherwise have been available,” though he refuses to cite specifics. He admits that there have been some errors in surveilling innocent US citizens, though he refuses to give any details, and says those errors were quickly corrected.
Administration Not Required to Go Through FISA - Gonzales, who is the main speaker in the briefing, reiterates that while the administration continues to seek warrants from the Foreign Intelligence Surveillance (FISA) court, “we are not legally required to do, in this particular case, because the law requires that we—FISA requires that we get a court order, unless authorized by a statute, and we believe that authorization has occurred.” He justifies the administration’s refusal to use the FISA court for obtaining warrants by insisting that NSA officials “tell me that we don’t have the speed and the agility that we need, in all circumstances, to deal with this new kind of enemy. You have to remember that FISA was passed by the Congress in 1978. There have been tremendous advances in technology… since then.” Hayden adds, “I don’t think anyone could claim that FISA was envisaged as a tool to cover armed enemy combatants in preparation for attacks inside the United States. And that’s what this authorization under the President is designed to help us do.”
'Balancing' of Civil Liberties, National Security - Hayden says the warrantless wiretapping program is part of “a balancing between security and liberty,” a more “aggressive” operation “than would be traditionally available under FISA. It is also less intrusive. It deals only with international calls. It is generally for far shorter periods of time. And it is not designed to collect reams of intelligence, but to detect and warn and prevent about attacks. And, therefore, that’s where we’ve decided to draw that balance between security and liberty.”
Media Leaks Damaging to National Security - Gonzales refuses to talk about when any members of Congress were briefed on the program or what they were told, but he does imply that there will be some sort of leak investigation as to how the New York Times found out about the program: “[T]his is really hurting national security, this has really hurt our country, and we are concerned that a very valuable tool has been compromised. As to whether or not there will be a leak investigation, we’ll just have to wait and see.”
No Evidence of Compromised National Security - When asked whether he can cite any evidence that the revelation of the program’s existence has actually compromised anything—“Don’t you assume that the other side thinks we’re listening to them? I mean, come on,” one reporter says—Gonzales responds, rather confusingly, “I think the existence of this program, the confirmation of the—I mean, the fact that this program exists, in my judgment, has compromised national security, as the President indicated on Saturday.”
Easier to Sidestep FISA Instead of Seek Congressional Approval - He does admit that the administration decided to sidestep the FISA court entirely instead of attempt to work with Congress to rewrite the FISA statutes because “we were advised that that would be difficult, if not impossible” to amend the law to the White House’s satisfaction. Gonzales says those who are concerned about the program being excessively intrusive or a threat to American civil liberties simply “don’t understand the specifics of the program, they don’t understand the strict safeguards within the program.… Part of the reason for this press brief today is to have you help us educate the American people and the American Congress about what we’re doing and the legal basis for what we’re doing.” He adds that any legal experts who believe the program is illegal are basing their judgments “on very limited information.”
Tough Questioning - One reporter asks an unusually tough series of questions to Gonzales: “Do you think the government has the right to break the law?”, to which Gonzales replies, “Absolutely not. I don’t believe anyone is above the law.” The reporter then says, “You have stretched this resolution for war into giving you carte blanche to do anything you want to do,” to which Gonzales replies cryptically, “Well, one might make that same argument in connection with detention of American citizens, which is far more intrusive than listening into a conversation.” The reporter insists, “You’re never supposed to spy on Americans,” and Gonzales deflects the responsibility for the decision back onto the Supreme Court.
Administration Will Tell Nation What It Needs to Know - Gonzales says the administration has no intention of releasing any of the classified legal opinions underpinning the program, and this press briefing is one of the methods by which the administration will “educat[e] the American people…and the Congress” to give them what they need to know about the program. [White House, 12/19/2005]

Entity Tags: White House press corps, Michael Hayden, Al-Qaeda, National Security Agency, Alberto R. Gonzales, George W. Bush, Foreign Intelligence Surveillance Court

Timeline Tags: Civil Liberties

DARPA logo.DARPA logo. [Source: Duke University]The computer and technology experts at Ars Technica, a well-regarded Web publication which describes itself as focusing on “the art of technology,” speculate on the technology behind the NSA warrantless wiretapping program recently revealed to the public (see December 15, 2005). The Ars Technica experts believe that Senator Jay Rockefeller (D-WV)‘s 2003 comparison between the program and the Total Information Awareness (TIA) project (see March 2002) is the most apt. They believe that the NSA wiretapping program may be built upon the foundation of a shadowy, highly classified surveillance program called Echelon. They write, “This system’s purpose would be to monitor communications and detect would-be terrorists and plots before they happen… This project is not interested in funding ‘evolutionary’ changes in technology, e.g., bit-step improvements to current data mining and storage techniques. Rather, the amount of data that the directors are anticipating (petabytes!) would require massive leaps in technology (and perhaps also some massive leaps in surveillance laws).” [Ars Technica, 12/20/2005; Ars Technica, 2007] Data storage measured in petabytes is a colossal capacity; a petabyte is 1,024 terabytes, and a single terabyte is 1,024 gigabytes, the usual measurement for hard drive capacity. [TechTerms, 2007] The Ars Technica experts continue, “According to DARPA, such data collection ‘increases information coverage by an order of magnitude,’ and ultimately ‘requires keeping track of individuals and understanding how they fit into models.’” They go on to note that the NSA wiretapping program was instituted shortly after the TIA project was quashed by Congress, and say they believe the NSA program is an extension and an outgrowth of TIA. They note that “the FBI requested the legal authorization to do very high-volume monitoring of digital calls” in 1995, that there is “no way for the judicial system to approve warrants for the number of calls that the FBI wanted to monitor,” and that the FBI “could never hire enough humans to be able to monitor that many calls simultaneously, which means that they’d have to use voice recognition technology to look for ‘hits’ that they could then follow up on with human wiretaps.” The Ars Technica experts believe the NSA is using “some kind of high-volume, automated voice recognition and pattern matching system,” employing a form of “smart filtering” that would weed through perhaps hundreds of thousands of computer-monitored calls and turning a fraction of those calls over to human analysts for evaluation: “[Y]es, this kind of real-time voice recognition, crude semantic parsing and pattern matching is doable with today’s technology, especially when you have a budget like the NSA.” In a follow-up, Ars Technica technology specialist and self-described conservative and “privacy nazi” Jon Stokes writes of his own concerns over the program, noting that the program is too wide-reaching and too blunt to actually catch many real terrorists, and that the program is a tremendous intrusion into Americans’ fundamental privacy: “The problem is not that such large-scale industrial fishing invariably catches a few dolphins along with the tuna, but that between 99.999 and 100 percent of what you’re going to get is dolphin.” Stokes also warns that such an intrusive surveillance program will not only violate privacy rights, but be quite ineffective: “As the TSA, with its strip-searching of people’s elderly grandparents, abundantly proves every holiday season, blunt instruments and scorched earth tactics are of dubious value in catching genuine bad actors. In fact, blunt instruments and wide nets are the easiest for professional bad guys to evade. All you need to beat such surveillance tools is patience and know-how.…Blunt instruments like airport facial recognition software and random subway bag searches produce much more noise than they do signal, and any engineer or computer scientist worth his or her salt will tell you that an intelligent, targeted, low-tech approach beats a brute-force high-tech approach every time. There is no high-tech substitute for human intelligence gathering. In fact…an overload of crudely processed information is actually more likely to lead an analyst astray than it is to produce any useful insight.…In the end, brute force security techniques are not only corrosive to democratic values but they’re also bad for national security. They waste massive resources that could be spent more effectively elsewhere, and they give governments and countries a false sense of security that a savvy enemy can exploit to devastating effect.…[I]t’s not just enough to have sound intelligence; you also need political leaders who have the wisdom to use that intelligence appropriately.” [Ars Technica, 12/20/2005]

Entity Tags: Transportation Safety Administration, Total Information Awareness, Federal Bureau of Investigation, John D. Rockefeller, Defense Advanced Research Projects Agency, Jon Stokes, National Security Agency

Timeline Tags: Civil Liberties

Jonathan Alter.Jonathan Alter. [Source: Publicity photo via Greater Talent Network]Reporter and political pundit Jonathan Alter writes that President Bush’s attempt to kill the New York Times domestic wiretapping story (see December 15, 2005 and December 6, 2005), which the Times delayed for over a year at the White House’s request, is not an attempt to protect national security, as Bush will say in his response to the article (see December 17, 2005), but “because he knew that it would reveal him as a law-breaker.” Alter continues, “He insists he had ‘legal authority derived from the Constitution and Congressional resolution authorizing force.’ But the Constitution explicitly requires the president to obey the law. And the post-9/11 congressional resolution authorizing ‘all necessary force’ in fighting terrorism was made in clear reference to military intervention. It did not scrap the Constitution and allow the president to do whatever he pleased in any area in the name of fighting terrorism.” Alter is puzzled that Bush felt the need for the program when the 1978 Foreign Intelligence Surveillance Act (see 1978) “allows the government to eavesdrop on its own, then retroactively justify it to the court, essentially obtaining a warrant after the fact.” Alter says that only four of “tens of thousands” of FISA requests have ever been rejected, and, “There was no indication the existing system was slow—as the president seemed to claim in his press conference—or in any way required extra-constitutional action.” He concludes: “[Bush] knew publication would cause him great embarrassment and trouble for the rest of his presidency. It was for that reason—and less out of genuine concern about national security—that George W. Bush tried so hard to kill the New York Times story. …We’re seeing clearly now that Bush thought 9/11 gave him license to act like a dictator, or in his own mind, no doubt, like Abraham Lincoln during the Civil War.” [Newsweek, 12/21/2005]

Entity Tags: Abraham Lincoln, Bush administration (43), National Security Agency, New York Times, George W. Bush, Foreign Intelligence Surveillance Court, Foreign Intelligence Surveillance Act, Jonathan Alter

Timeline Tags: Civil Liberties

Chart showing NSA surveillance network.Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” [New York Times, 12/24/2005]

Entity Tags: US Department of Defense, US Department of Justice, Total Information Awareness, New York Times, US Department of Homeland Security, Computer Assisted Passenger Prescreening System, Bush administration (43), Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, George W. Bush, National Security Agency, Phil Karn

Timeline Tags: Civil Liberties

Suzanne Spaulding, a former counsel for the CIA, the Senate and House intelligence commission, and executive director of the National Terrorism Commission from 1999 through 2000, writes an op-ed criticizing the Bush administration for its domestic surveillance program. She writes that the three main sources of oversight and restraint on Bush’s unfettered efforts to monitor US citizens—Congress, the judiciary, and the American people—have failed to halt what she calls “this extraordinary exercise of presidential power.” Spaulding, who will testify along similar lines before the Senate over a year later (see April 11, 2007), writes, “Ironically, if it is ultimately determined that this domestic surveillance program reflects the exercise of unchecked power in contravention of law, it will wind up weakening the presidency. Once again, we will confront the challenge of restoring Americans’ faith in the rule of law and our system of checks and balances.” The pretense of oversight by the administration, in providing limited and perhaps misleading briefings on the program only to the so-called “Gang of Eight” Congressional leaders, is superficial and ineffective, she writes; the entire process “effectively eliminates the possibility of any careful oversight.” She notes that because of the severe restrictions both in the information doled out to these Congressional leaders, and their strict prohibition on discussing the information with anyone else, even other intelligence panel members, “[i]t is virtually impossible for individual members of Congress, particularly members of the minority party, to take any effective action if they have concerns about what they have heard in one of these briefings. It is not realistic to expect them, working alone, to sort through complex legal issues, conduct the kind of factual investigation required for true oversight and develop an appropriate legislative response.” Congressional oversight is key to retaining the trust of the US citizenry, she writes, and adds that that particular principle was well understood at the CIA while she was there. Oversight “is vital for a secret agency operating in a democracy. True oversight helps clarify the authority under which intelligence professionals operate. And when risky operations are revealed, it is important to have members of Congress reassure the public that they have been overseeing the operation. The briefings reportedly provided on the National Security Agency (NSA) surveillance program reflect, instead, a ‘check the box’ mentality—allowing administration officials to claim that they had informed Congress without having really achieved the objectives of oversight.” While those few members of Congress are given little real information, the judiciary, particularly the Foreign Intelligence Surveillance Court (FISC), is cut out of the process entirely. “Instead of going to a judge on the secret court that was specifically established to authorize foreign intelligence surveillance inside the United States, we are told that an NSA shift supervisor was able to sign off on the warrantless surveillance of Americans,” she writes. “That’s neither a check nor a balance. The primary duty of the NSA shift supervisor, who essentially works for the president, is to collect intelligence. The task of the judge is to ensure that the legal standards set out in the 1978 Foreign Intelligence Surveillance Act (FISA) have been met. Which one has stronger independence to say no, if no needs to be said? The objectives of the surveillance program, as described in news reports, seem laudable. The government should be running to ground the contacts listed in a suspected terrorist’s cell phone, for example. What is troubling is that this domestic spying is being done in apparent contravention of FISA, for reasons that still are not clear.” In her piece she takes issue with the Bush administration’s insistence that its surveillance program is legal and necessary. She makes the following case:
Specious Arguments to Duck FISA Court - The argument that the FISA Court is too slow to respond to immediate needs for domestic surveillance is specious, she says. “FISA anticipates situations in which speed is essential. It allows the government to start eavesdropping without a court order and to keep it going for a maximum of three days. And while the FISA application process is often burdensome in routine cases, it can also move with remarkable speed when necessary, with applications written and approved in just a few hours.” Instead, she says that the Bush administration must have dodged FISC because their wiretaps didn’t meet FISA standards of probable cause. Since FISC is staffed by judges hand-picked by conservative then-Supreme Court Chief Justice William Rehnquist, “who presumably felt that they had the right temperament and expertise to understand the national security imperatives as well as the need to protect civil liberties,” and since FISC has granted all but four of the more than 5,645 requests for wiretaps and surveillance made by the administration since 2001, to argue that FISC is unresponsive is simply wrong-headed. And, she notes, if the administration felt that FISA’s standards were too strict, it could have moved to amend the law to allow more leniency in obtaining such warrants. It has not done so since the passage of the 2001 Patriot Act. She writes, “The administration reportedly did not think it could get an amendment without exposing details of the program. But this is not the first time the intelligence community has needed a change in the law to allow it to undertake sensitive intelligence activities that could not be disclosed. In the past, Congress and the administration have worked together to find a way to accomplish what was needed. It was never previously considered an option to simply decide that finding a legislative solution was too hard and that the executive branch could just ignore the law rather than fix it.”
No Justification for Keeping Program Secret - In addition, the administration has consistently failed to make a case for keeping the domestic wiretapping policy secret for four years. US-designated terrorist groups already know that the government listens to their cell phone conversations whenever possible, and they are well aware of the various publicly known programs to search through millions of electronic communications, such as the NSA’s Echelon program (see April 4, 2001). “So what do the terrorists learn from a general public discussion about the legal authority being relied upon to target their conversations?” she asks. “Presumably very little. What does the American public lose by not having the public discussion? We lose the opportunity to hold our elected leaders accountable for what they do on our behalf.”
Assertions that Program Authorized by Congress Fallacious - The argument advanced by Attorney General Alberto Gonzales that says the program does not violate the law because Congress’s post-9/11 authorization of force against terrorists gives the administration the right to circumvent FISA is equally specious, she argues. “FISA does provide for criminal penalties if surveillance is conducted under color of law ‘except as authorized by statute.’ This is a reference to either FISA or the criminal wiretap statute. A resolution, such as the Use of Force resolution, does not provide statutory authority. Moreover, FISA specifically provides for warrantless surveillance for up to 15 days after a declaration of war. Why would Congress include that provision if a mere Use of Force resolution could render FISA inapplicable? The law clearly states that the criminal wiretap statute and FISA are ‘the exclusive means by which electronic surveillance…and the interception of domestic wire, oral, and electronic communications may be conducted.’ If these authorities are exclusive, there is no other legal authority that can authorize warrantless surveillance. Courts generally will not view such a clear statutory statement as having been overruled by a later congressional action unless there is an equally clear indication that Congress intended to do that.” Therefore, by any legal standard, the administration’s program is, apparently, illegal.
No Inherent Presidential Authority - The ultimate argument by Bush officials, that the president has some sort of inherent authority as commander-in-chief to authorize illegal wiretaps, is the same groundless legal argument recently used to justify the use of torture by US intelligence and law enforcement agents (see December 28, 2001). That argument was withdrawn, Spaulding notes, after it became publicly known. While the courts have not specifically ruled on this particular argument, Spaulding notes that the Supreme Court refused to recognize then-President Harry Truman’s attempt to seize control of the nation’s steel mills to avert a possible strike during the Korean War. The Supreme Court ruled “that the president’s inherent authority is at its weakest in areas where Congress has already legislated. It ruled that to find inherent presidential authority when Congress has explicitly withheld that authority—as it has in FISA—‘is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between president and Congress.’” She notes that in 2004, the Supreme Court rejected the argument for unchecked presidential power in the Hamdi case (see June 28, 2004), with Justice Sandra Day O’Connor writing for the court, “We have long since made clear that a state of war is not a blank check for the president when it comes to the rights of the Nation’s citizens. …Whatever power the United States Constitution envisions for the Executive in its exchanges with… enemy organizations in times of conflict, it most assuredly envisions a role for all three branches when individual liberties are at stake.” Spaulding concludes, “The rule of law and our system of checks and balances are not a source of weakness or a luxury of peace. As O’Connor reminded us in Hamdi, ‘It is during our most challenging and uncertain moments…that we must preserve our commitment at home to the principles for which we fight abroad.’” [Washington Post, 12/25/2005]

Entity Tags: Sandra Day O’Connor, William Rehnquist, USA Patriot Act, Suzanne Spaulding, National Security Agency, US Supreme Court, Harry S. Truman, Alberto R. Gonzales, “Gang of Eight”, National Commission on Terrorism, Central Intelligence Agency, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Echelon, Bush administration (43)

Timeline Tags: Civil Liberties

The Justice Department opens an investigation into the leak of classified information about the Bush domestic surveillance program. The investigation focuses on disclosures to the New York Times about the secret warrantless wiretapping program conducted by the National Security Agency since shortly after the 9/11 attacks (see Early 2002). The White House claims that the Justice Department initiated the investigation on its own after receiving a request from the NSA, and that it was not even informed of the investigation until the decision had already been made. But White House spokesman Trent Duffy hails the investigation, and implicitly accuses the Times of aiding and abetting terrorists by printing its stories. “The leaking of classified information is a serious issue,” Duffy says. “The fact is that al-Qaeda’s playbook is not printed on Page One, and when America’s is, it has serious ramifications.” [Associated Press, 12/30/2005] President Bush fuels the attack on the Times when he says, “The fact that we’re discussing this program is helping the enemy.” [New York Times, 12/30/2005] Many outside of the administration have accused the wiretapping program, which functions without external oversight or court warrants, of being illegal, and Bush of breaking the law by authorizing it. Administration officials insist that Bush has the power to make such a decision, both under the Constitution’s war powers provision and under the post-9/11 Congressional authorization to use military force against terrorism, even though, as former Senate Majority Leader Tom Daschle recalls, Congress explicitly refused to give Bush the authority to take military action inside the US itself (see December 21-22, 2005). And, in a recent letter to the chairs of the House and Senate Intelligence Committees, the White House claimed that the nation’s security needs outweigh the needs of the citizenry to be secure from secret government surveillance. [Associated Press, 12/30/2005] Others disagree. The American Civil Liberties Union’s Anthony Romero says, “President Bush broke the law and lied to the American people when he unilaterally authorized secret wiretaps of US citizens. But rather than focus on this constitutional crisis, Attorney General [Alberto] Gonzales is cracking down on critics of his friend and boss. Our nation is strengthened, not weakened, by those whistle-blowers who are courageous enough to speak out on violations of the law.” And Marc Rotenberg, the executive director of the Electronic Privacy Information Center, says the NSA should be the focus of an investigation to determine if it broke federal surveillance laws. Tom Devine of the Government Accountability Project suggests a middle course. His group does not object to a limited investigation into the leak of classified information, but, he says, if the administration does “a blanket witch hunt, which I fear, it would trample all over good government laws” designed to protect government workers who expose wrongdoing. “The whole reason we have whistle-blower laws is so that government workers can act as the public’s eyes and ears to expose illegality or abuse of power.” [New York Times, 12/30/2005] Ultimately, this leak investigation may not achieve much, according to law professor Carl Tobias. “It doesn’t seem to me that this leak investigation will take on the importance of the Plame case,” Tobias says. “The bigger story here is still the one about domestic spying and whether the president intends, as he said, to continue doing it.” [Washington Post, 12/31/2005]

Entity Tags: Anthony D. Romero, Tom Devine, Trent Duffy, American Civil Liberties Union, Al-Qaeda, Tom Daschle, Senate Intelligence Committee, US Department of Justice, National Security Agency, Carl Tobias, Electronic Privacy Information Center, Alberto R. Gonzales, New York Times, Government Accountability Project, George W. Bush, Marc Rotenberg, House Intelligence Committee

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see July 7, 2009 and May 2004), angered by the Bush administration’s counterattack against government and media members who have helped to expose its warrantless wiretapping operation (see December 15-31, 2005), decides to go public with a memo he wrote about his own knowledge of the collusion between AT&T and the National Security Agency (NSA) in eavesdropping on American citizens’ communications (see January 16, 2004). He updates the memo with a brief preface, selects eight pages of the 121 pages of AT&T documentation he possesses which he believes gives a good overview of the NSA’s surveillance equipment installation, and includes the two photographs he has taken of the NSA’s “secret room” at the AT&T facility in San Francisco and the Internet research he has done on the Narus STA 6400 equipment the NSA is using to sort the communications being captured and recorded (see Late 2003). Instead of entrusting his newly refurbished memo to the Internet, he uses the PGP (Pretty Good Privacy) security protocol for anticipated dissemination, burns the data onto a CD, and begins searching online for civil liberties groups that might be interested in his work. [Wired News, 5/17/2006; Klein, 2009, pp. 53-55]

Entity Tags: AT&T, National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

Sometime in 2006, the deputy commander of the Defense Department’s Criminal Investigation Task Force (CITF) at Guantanamo tells the Senate Armed Services Committee (see April 21, 2009) that CITF “was troubled with the rationale that techniques used to harden resistance to interrogations [SERE training—see December 2001, January 2002 and After, and July 2002 ] would be the basis for the utilization of techniques to obtain information.” [Huffington Post, 4/21/2009]

Entity Tags: US Department of Defense, Criminal Investigation Task Force, Senate Armed Services Committee

Timeline Tags: Torture of US Captives

Vice President Cheney mentioned NSA intercepts of the 9/11 hijackers’ calls in a speech to the Heritage Foundation.Vice President Cheney mentioned NSA intercepts of the 9/11 hijackers’ calls in a speech to the Heritage Foundation. [Source: David Bohrer / White House]Vice President Dick Cheney uses calls between the 9/11 hijackers in the US and an al-Qaeda communications hub in Yemen that were intercepted by the NSA (see Early 2000-Summer 2001) to justify the NSA’s warrantless wiretapping program (see December 15, 2005). Cheney points out that, “There are no communications more important to the safety of the United States than those related to al-Qaeda that have one end in the United States,” and says that if the NSA’s warrantless program had been implemented before 9/11, “we might have been able to pick up on two hijackers [Nawaf Alhazmi and Khalid Almihdhar] who subsequently flew a jet into the Pentagon.” He adds: “They were in the United States, communicating with al-Qaeda associates overseas. But we did not know they were here plotting until it was too late.” [White House, 1/4/2006] Other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the program is revealed by the New York Times (see December 17, 2005).

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi, Richard (“Dick”) Cheney

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

President Bush’s rationale for authorizing warrantless surveillance against US citizens is of questionable legality and “may represent an exercise of presidential power at its lowest ebb,” according to a Congressional analysis. The Congressional Research Service (CRS), the independent and nonpartisan research bureau of the legislature, answers the question raised around the nation since the revelation of the secret program by the New York Times (see Early 2002): did Bush break the law when he ordered the National Security Agency to eavesdrop on US citizens without court orders or judicial oversight? The CRS report does not give a definitive yes or no answer to that question, but finds Bush’s legal rationale dubious at best. That rationale “does not seem to be as well-grounded” as administration lawyers have claimed, and the report finds that, despite assertions to the contrary by Bush and administration officials, Congress did not authorize warrantless wiretaps when it gave the executive branch the authority to wage war against al-Qaeda in the days after the 9/11 attacks. Unsurprisingly, Bush administration officials criticize the report. But some Republicans and Democrats find the report’s conclusions persuasive, and hold up the report as further evidence that Bush overextended his authority by authorizing the wiretaps. For instance, Republican Thomas Kean, the former chairman of the 9/11 commission (see January 27, 2003, says he doubts the program’s legality. Kean, who has not spoken publicly about the program until now, says the 9/11 commission was never told about the program, and he strongly doubts its legality. “We live by a system of checks and balances, and I think we ought to continue to live by a system of checks and balances,” Kean says. [Congressional Research Service, 1/5/2006 pdf file; New York Times, 1/6/2006]

Entity Tags: George W. Bush, 9/11 Commission, Congressional Research Service, New York Times, National Security Agency, Thomas Kean

Timeline Tags: Civil Liberties

Fourteen law professors and former federal officials send a letter criticizing the Justice Department’s recent legal arguments supporting the legality of the secret NSA surveillance program (see December 19, 2005 and December 21-22, 2005). The letter is signed by law professors Curtis A. Bradley, a former State Department legal advisor; David Cole; Walter Dellinger, a former acting solicitor general and assistant attorney general; Ronald Dworkin; Richard Epstein; Harold Koh, a former assistant secretary of state and a former Justice Department official; Philip B. Heymann, a former deputy attorney general; Martin Lederman, a former Justice Department official; Beth Nolan, a former presidential counsel and a former Justice Department official; William S. Sessions, the former director of the FBI; Geoffrey R. Stone; Kathleen M. Sullivan; Laurence H. Tribe; and William Van Alstyne, a former Justice Department attorney. The letter is couched in legal language, but clearly states that the signees consider the NSA surveillance program entirely illegal: “[T]he program appears on its face to violate existing law.” The signees consider and reject the Justice Department’s argument that Congress “implicitly authorized the NSA program when it enacted the Authorization for Use of Military Force (AUMF) against al-Qaeda” in 2001 (see September 14-18, 2001), writing: “[T]he AUMF cannot reasonably be construed to implicitly authorize warrantless electronic surveillance in the United States during wartime, where Congress has expressly and specifically addressed that precise question in FISA and limited any such warrantless surveillance to the first 15 days of war.” The signees also reject the Justice Department’s argument that the president’s “inherent constitutional authority as commander in chief to collect ‘signals intelligence’” is not prohibited by FISA. The signees conclude that the Justice Department has failed “to offer a plausible legal defense of the NSA domestic spying program. If the administration felt that FISA was insufficient, the proper course was to seek legislative amendment, as it did with other aspects of FISA in the Patriot Act, and as Congress expressly contemplated when it enacted the wartime wiretap provision in FISA. One of the crucial features of a constitutional democracy is that it is always open to the president—or anyone else—to seek to change the law. But it is also beyond dispute that, in such a democracy, the president cannot simply violate criminal laws behind closed doors because he deems them obsolete or impracticable.” [Marty Lederman, 1/9/2006; Center for Democracy and Technology, 1/9/2006 pdf file]

Entity Tags: Harold Koh, William S. Sessions, William Van Alstyne, Curtis Bradley, Beth Nolan, Geoffrey Stone, US Department of Justice, Walter Dellinger, Richard Epstein, Martin (“Marty”) Lederman, Laurence Tribe, Kathleen M. Sullivan, Ronald Dworkin, National Security Agency, Philip Heymann, David D. Cole

Timeline Tags: Civil Liberties

Russell Tice.Russell Tice. [Source: ABC News]Former National Security Agency (NSA) official Russell Tice says that many of the wiretapping operations he once helped run were illegal. “I specialized in what’s called special access programs,” Tice tells ABC News. “We called them ‘black world’ programs and operations.” Tice is ready to testify before Congress about what he calls the illegal wrongdoings that are part of the Defense Department and the NSA’s wiretapping programs enacted after the 9/11 attacks. Many of these programs were targeted at innocent US citizens. “The mentality was we need to get these guys, and we’re going to do whatever it takes to get them,” he says. The technology used to track and sort through every domestic and international telephone center is impressive. “If you picked the word ‘jihad’ out of a conversation, the technology exists that you focus in on that conversation, and you pull it out of the system for processing.” Intelligence analysts use the information to develop graphs that resemble spiderwebs linking one suspect’s phone number to hundreds or even thousands more. While the president has admitted giving orders that allowed the NSA to eavesdrop on a small number of Americans without warrants, Tice says says the number of Americans subject to eavesdropping by the NSA could be in the millions if the full range of secret NSA programs is used. “That would mean for most Americans that if they conducted, or you know, placed an overseas communication, more than likely they were sucked into that vacuum.” Tice has been subjected to what appears to be bureaucratic punishment for his willingness to blow the whistle on the nation’s warrantless wiretapping programs; last year the NSA revoked his security clearance based on what it calls "psychological concerns," and later fired him. Tice says that is the way the NSA often deals with employees it considers troublemakers and whistleblowers (see January 25-26, 2006). [ABC News, 1/10/2006; ABC, 1/10/2006]

Entity Tags: US Department of Defense, National Security Agency, Russell Tice

Timeline Tags: Civil Liberties

The American Civil Liberties Union releases documents detailing prisoner abuse at US facilities in Iraq, Afghanistan, and Guantanamo. The documents prove the existence of a “Special Access Program,” involving a special operations unit, Task Force 6-26, that has been implicated in numerous abuse incidents in Iraq, and whose operatives used fake names to thwart an Army investigation. ACLU lawyer Amrit Singh says: “These documents confirm that the torture of detainees and its subsequent cover-up was part of a larger clandestine operation, in all likelihood, authorized by senior government officials. Despite mounting evidence of systemic abuse authorized or endorsed from above, however, not a single high-level official has thus far been brought to justice.”
Fake Names, Computer Malfunctions Avoid Accountability - An Army memorandum shows that a prisoner was captured by Task Force 6-26 in Tikrit, Iraq, and subsequently beaten into unconsciousness. The task force members used “fake names,” according to the Army memo, and the claim of a computer malfunction to avoid accountability.
SERE Techniques Used - A heavily redacted memo refers to the use of “Survival, Evasion, Resistance, and Escape” procedures at Guantanamo (see December 10, 2002). Sworn statements from military interrogators and a written “Chronology of Guard/Detainee Issues” show that the Army began receiving reports of prisoner abuse from Afghanistan as early as January 2002. The abuse continued, the documents show, through 2004 and perhaps beyond (see February 12-16, 2004, March 28, 2004, and May 6, 2004). Documents detail incidents where US soldiers poured peroxide and water over an Iraqi prisoner’s open wounds, and fired slingshot missiles at Iraqi children attempting to steal food from the base. [American Civil Liberties Union, 1/12/2006]

Entity Tags: Amrit Singh, American Civil Liberties Union, US Department of the Army

Timeline Tags: Torture of US Captives

Al Gore speaks to the Liberty Coalition and the American Constitution Society.Al Gore speaks to the Liberty Coalition and the American Constitution Society. [Source: American Constitution Society]Former Vice President Al Gore delivers a long, impassioned speech on civil liberties and constitutional issues to the Liberty Coalition and the American Constitution Society. Gore joins former Representative Bob Barr (R-GA) in speaking out against the Bush administration’s infringement on American civil liberties. Gore and Barr have what Gore calls a “shared concern that America’s Constitution is in grave danger.”
Patently Illegal Domestic Surveillance - Gore’s speech is sparked by recent revelations that the NSA has been spying on American citizens for years (see December 15, 2005), and in response, the administration “has brazenly declared that it has the unilateral right to continue without regard to the established law enacted by Congress precisely to prevent such abuses.” As the Foreign Intelligence and Surveillance Act (FISA) is perfectly sufficient, there was no need for the Bush administration to circumvent that law. “At present, we still have much to learn about the NSA’s domestic surveillance,” Gore says. “What we do know about this pervasive wiretapping virtually compels the conclusion that the president of the United States has been breaking the law, repeatedly and insistently. A president who breaks the law is a threat to the very structure of our government.” Gore says he agrees with Bush on the threat of terrorism, but disagrees that the US has to “break the law or sacrifice our system of government” to protect itself, as this will make it “weaker and more vulnerable.” In addition, he says, “once violated, the rule of law is itself in danger,” and, “Unless stopped, lawlessness grows, the greater the power of the executive grows, the more difficult it becomes for the other branches to perform their constitutional roles.” It is patently obvious that the Bush administration has broken the law in conducting and approving its warrantless wiretaps, Gore says, regardless of what arguments and defenses administration officials may put forth (see September 12-18, 2001 and Early 2002). So, Gore says, “When President Bush failed to convince Congress to give him the power he wanted when this measure was passed, he secretly assumed that power anyway, as if Congressional authorization was a useless bother. But as [Supreme Court] Justice [Felix] Frankfurter once wrote, ‘To find authority so explicitly withheld is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between the president and the Congress.‘… And the disrespect embodied in these apparent mass violations of the law is part of a larger pattern of seeming indifference to the Constitution that is deeply troubling to millions of Americans in both political parties.”
Illegal Seizure of American Citizens - Gore notes that Bush has declared that he has “a heretofore unrecognized inherent power to seize and imprison any American citizen that he alone determines to be a threat to our nation, and that notwithstanding his American citizenship that person in prison has no right to talk with a lawyer, even if he wants to argue that the president or his appointees have made a mistake and imprisoned the wrong person” (see November 13, 2001 and March 5, 2002). He says: “The president claims that he can imprison that American citizen—any American citizen he chooses—indefinitely, for the rest of his life, without even an arrest warrant, without notifying them of what charges have been filed against them, without even informing their families that they have been imprisoned.” Gore then says: “No such right exists in the America that you and I know and love. It is foreign to our Constitution. It must be rejected.”
Specious Authority to Torture - Neither does the executive branch have the right to authorize torture, Gore says. After citing horrific examples from Guantanamo and Abu Ghraib, he calls it “a shameful exercise of power that overturns a set of principles that you’re nation has observed since General George Washington first enunciated them during our Revolutionary War. They have been observed by every president since then until now. They violate the Geneva Conventions, the International Convention Against Torture, and our own laws against torture.”
Unlawful Kidnapping of Foreign Citizens - The president has no right to have foreign citizens kidnapped from their homes and brought to the US for interrogation and imprisonment, or worse, delivered to other nations for harsh interrogations and torture, says Gore. The closest allies of the US have been shocked by such claims.
No Restraint in the Constitution? - Gore asks whether the president really has such powers under the Constitution and, if so, “are there any acts that can on their face be prohibited?” He quotes the dean of Yale’s law school, Harold Koh, who said, “If the president has commander in chief power to commit torture, he has the power to commit genocide, to sanction slavery, to promote apartheid, to license summary execution.” Gore is “deeply troubl[ed]” that “our normal American safeguards have thus far failed to contain this unprecedented expansion of executive power.” He cites the numerous usage of “signing statements” by Bush that signal his intent “not to comply” with particular legislation (see December 30, 2005). When the Supreme Court struck down Bush’s indefinite detention of “enemy combatants” (see June 28, 2004), “the president then engaged in legal maneuvers designed to prevent the court from providing any meaningful content to the rights of the citizens affected.”
Historical Cycles - Since the founding of America, Gore says, the country has abrogated its citizens’ rights in one circumstance or another, and cites numerous examples. But those abrogations were always rectified to some degree in a repeated cycle of what he calls “excess and regret.” Gore is worried that the country may not be in such a cycle now. Instead, he says, the US may be on a path to permanent, state-sanctioned authoritarianism, with the constitutional safeguards American citizens have come to expect eroded and undermined to the point of irretrievability. Gore specifically cites the administration’s support for the so-called “unitary executive” theory of government, which he says “ought to be more accurately described as the unilateral executive.” That theory “threatens to expand the president’s powers until the contours of the Constitution that the framers actually gave us become obliterated beyond all recognition.”
Stark Authoritarianism - Why are Bush and his top officials doing this? Gore says that “[t]he common denominator seems to be based on an instinct to intimidate and control. The same pattern has characterized the effort to silence dissenting views within the executive branch, to censor information that may be inconsistent with its stated ideological goals, and to demand conformity from all executive branch employees.” Gore continues: “Intellectually, it is possible to carry on this process for an indefinite time. The only check on it is that, sooner or later, a false belief bumps up against solid reality, usually on a battlefield. Two thousand two hundred American soldiers have lost their lives as this false belief bumped into a solid reality.”
Gutting Congress - Though serious damage has been done to the judicial branch, Gore acknowledges, “the most serious damage in our constitutional framework has been to the legislative branch. The sharp decline of Congressional power and autonomy in recent years has been almost as shocking as the efforts by the executive to attain this massive expansion of its power.… [T]he legislative branch of government as a whole, under its current leadership, now operates as if it were entirely subservient to the executive branch.… [T]he whole process is largely controlled by the incumbent president and his political organization” (see February 1, 2004). Gore says each member of Congress, Republican and Democrat, must “uphold your oath of office and defend the Constitution. Stop going along to get along. Start acting like the independent and co-equal branch of American government that you are supposed to be under the Constitution of our country.”
We the People - The American people still, for the moment, have the power to enforce the Constitution, Gore says, quoting former President Dwight Eisenhower, who said, “Any who act as if freedom’s defenses are to be found in suppression and suspicion and fear confess a doctrine that is alien to America.” Gore continues: “Fear drives out reason. Fear suppresses the politics of discourse and opens the door to the politics of destruction.… The founders of our country faced dire threats. If they failed in their endeavors, they would have been hung as traitors. The very existence of our country was at risk. Yet in the teeth of those dangers, they insisted on establishing the full Bill of Rights. Is our Congress today in more danger than were their predecessors when the British army was marching on the Capitol? Is the world more dangerous than when we faced an ideological enemy with tens of thousands of nuclear missiles ready to be launched on a moment’s notice to completely annihilate the country?” [Congressional Quarterly, 1/16/2006; American Constitutional Society, 1/16/2006]

Entity Tags: National Security Agency, Liberty Coalition, US Supreme Court, Harold Koh, George W. Bush, Albert Arnold (“Al”) Gore, Jr., American Constitution Society, Bush administration (43), Convention Against Torture, Felix Frankfurter, George Washington, Geneva Conventions, Foreign Intelligence Surveillance Act, Robert “Bob” Barr

Timeline Tags: Civil Liberties

The Congressional Research Service (CRS) finds that the Bush administration broke the law when it refused to provide timely and complete briefings to the appropriate members of Congress on the National Security Agency’s domestic wiretapping program. The CRS’s legal analysis concludes that the administration’s limited briefings are “inconsistent with the law.” The CRS performed the analysis at the request of Representative Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee and a member of the so-called “Gang of Eight,” the eight members of Congress that Bush allows to receive limited information on the NSA program. Harman, who calls the CRS report “a solid piece of work,” wrote to Bush on January 4, 2006, to inform him that she believes the information should be provided to all the members of the House and Senate Intelligence Committees. The briefings, which are intentionally limited in scope, are provided only to eight members of Congress: the Speaker of the House, the House Minority Leader, the Senate Majority and Minority Leaders, and the ranking members of the House and Senate Intelligence Committees. Harman says that an upcoming briefing, scheduled for February 6, should include all members of the intelligence committees. The briefings on the NSA program are held through the office of Vice President Dick Cheney. Though Harman is in agreement with the CRS that the briefings are legally inadequate, House Intelligence Committee chairman Peter Hoekstra (R-MI) has said he believes the briefings are adequate for Congressional oversight.
bullet The CRS finding is based on the requirements of the 1947 National Security Act, that mandates that all of the members of the House and Senate Intelligence Committees be “fully and currently informed” of intelligence activities. The Act says that “covert actions” can only be revealed to the “Gang of Eight,” but, the CRS finds, since the NSA’s domestic surveillance program does not appear to be covert, limiting the briefings to just eight members of Congress “would appear to be inconsistent with the law.” The memo gives several options for the administration to bring itself into compliance with the law, noting, for example, that “[t]he executive branch may assert that the mere discussion of the NSA program generally could expose certain intelligence sources and methods to disclosure.” [New York Times, 1/18/2006; Washington Post, 1/19/2006]

Entity Tags: Jane Harman, “Gang of Eight”, Bush administration (43), House Intelligence Committee, National Security Act, Peter Hoekstra, National Security Agency, Congressional Research Service, Richard (“Dick”) Cheney, Senate Intelligence Committee

Timeline Tags: Civil Liberties

The Justice Department (DOJ) issues a 42-page “white paper” detailing its arguments that the National Security Agency’s warrantless wiretapping program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006) is legal. The DOJ reiterates two previous arguments (see December 19, 2005 and December 21-22, 2005)—that Congress implicitly authorized the program in 2001 when it authorized the Bush administration to begin military actions against al-Qaeda (see September 14-18, 2001), and that the president has the authority as commander in chief to conduct such a program—even though these arguments have been thoroughly refuted (see January 9, 2006) and overridden by the Supreme Court’s recent Hamdan v. Rumsfeld ruling (see December 15, 2005 and July 8, 2006). In its paper, the DOJ declares that if necessary, it will attack the legality of the Foreign Intelligence Surveillance Act (FISA) in order to stop that law from “imped[ing]” the president’s power to order domestic surveillance. In essence, according to columnist and civil liberties lawyer Glenn Greenwald, the DOJ is asserting that the president’s powers are limitless as long as he or she declares a given action necessary to battle terrorism. “Because the president has determined that the NSA activities are necessary to the defense of the United States from a subsequent terrorist attack in the armed conflict with al-Qaeda, FISA would impermissibly interfere with the president’s most solemn constitutional obligation—to defend the United States against foreign attack,” the DOJ claims. Neither Congress nor the court system has the right to limit or even review the president’s powers, according to the DOJ. Greenwald calls the DOJ’s argument “a naked theory of limitless presidential power.” In fact, Greenwald argues, the DOJ is asserting that FISA itself is unconstitutional, because no law can in any way limit the president’s power to conduct foreign policy or protect the nation’s security. The document is part of a larger Bush administration defense of the USA Patriot Act, and part of the administration’s push to convince Congress to reauthorize that legislation. Attorney General Alberto Gonzales sends the document to Congress. Justice Department official Steven Bradbury says, “When it comes to responding to external threats to the country… the government would like to have a single executive who could act nimbly and agilely.” [US Department of Justice, 1/19/2006 pdf file; Glenn Greenwald, 1/20/2006; Washington Post, 1/20/2006]
Dubious Legality - The program has already been found to be of questionable legality by two reports recently released by the nonpartisan Congressional Research Service (see January 5, 2006 and January 18, 2006). And author James Bamford, a US intelligence expert who has written extensively about the NSA, says that the Justice Department’s arguments are specious in light of Congress’s clear intent in its 1978 passage of FISA to block warrantless wiretapping, and its demonstrated lack of intent to allow any such operations within US borders in the October 2001 legislation. “You could review the entire legislative history in the authorization to use military force and I guarantee you won’t find one word about electronic surveillance,” he says. “If you review the legislative history of FISA, you will find Attorney General Griffin Bell testifying before the intelligence committee saying this was specifically passed to prevent a president from claiming inherent presidential powers to do this again.” [Washington Post, 1/20/2006]
Self-Contradictory Justifications - In 2007, author and reporter Charlie Savage will write of the “shaky foundation” supporting the administration’s “two-pronged attacks on critics of the wiretapping program and the Patriot Act,” which some officials have claimed authorizes the program. “Beneath the simplistic rhetoric, the administration’s position was self-contradicting,” Savage will write. If Bush has the inherent presidential authority to order warrantless wiretapping, then he needs no authorization from the Patriot Act or any other legislation. But if Congress is endangering the nation by delaying in reauthorizing the Patriot Act and thusly not rendering the program legal, then the wiretapping program is illegal after all. The memo attempts to “paper… over” this problem by claiming that, while Bush has the inherent authority to do whatever he feels is necessary to protect the country, the Patriot Act’s extra police powers are still necessary in “contexts unrelated to terrorism.” Savage will write, “In other words, the administration’s own position, hidden in the fine print, was that the Patriot Act was superfluous and irrelevant to the war on terrorism—a somewhat absurd stance made necessary by their desire to say the wiretapping program was legal.” [Savage, 2007, pp. 315]
Failure to Address Probable Beginning of Program Before Attacks - The Justice Department says nothing about the program apparently beginning well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, James Bamford, Steven Bradbury, US Department of Justice, Griffin Bell, Senate Judiciary Committee, Glenn Greenwald, Foreign Intelligence Surveillance Act, Alberto R. Gonzales, Arlen Specter, George W. Bush, Congressional Research Service, Charlie Savage

Timeline Tags: Civil Liberties

President Bush’s top political adviser, deputy White House chief of staff Karl Rove, tells a meeting of the Republican National Committee that the warrantless wiretapping controversy (see December 15, 2005 and December 18, 2005) can be used to boost Republicans’ election chances in the 2006 midterm elections. Republicans should emphasize that the wiretapping proves that Bush is willing to do whatever it takes to defeat terrorism and keep Americans safe. Critics of the program, therefore, can be painted as weak on terrorism. “The United States faces a ruthless enemy, and we need a commander in chief and a Congress who understand the nature of the threat and the gravity of the moment America finds itself in,” Rove says. “President Bush and the Republican Party do; unfortunately, the same cannot be said of many Democrats.… Let me be clear as I can be: President Bush believes if al-Qaeda is calling somebody in America, it is in our national security interests to know who they’re calling and why. Some important Democrats clearly disagree.” [WIS-TV, 1/20/2006; Savage, 2007, pp. 203]

Entity Tags: George W. Bush, Democratic Party, Republican Party, Republican National Committee, Karl C. Rove

Timeline Tags: Civil Liberties

In a public speech, former National Security Agency chief Michael Hayden claims that everything the NSA does is with authorization from the White House, specifically the warrantless wiretapping program that spies on US citizens (see Early 2002). “I didn’t craft the authorization,” he says. “I am responding to a lawful order.” Hayden claims that while the NSA continues to use court warrants from the Foreign Intelligence Surveillance Court (FISC), technological advances and terrorist threats have made the law that created and supports FISC, the Foreign Intelligence Surveillance Act of 1978 (see 1978), obsolete. Therefore, the NSA has carried out domestic surveillance operations with or without FISC warrants. Hayden says the warrantless surveillance operations are “operationally more relevant, operationally more effective” than anything FISA can handle. Hayden repeatedly denies, in the face of reams of evidence collected by journalists and others to the contrary, that the NSA is spying on domestic antiwar groups and religious organizations like the Quakers who publicly advocate nonviolence and peace. [Michael Hayden, 1/23/2006]

Entity Tags: Foreign Intelligence Surveillance Court, Al-Qaeda, Foreign Intelligence Surveillance Act, Religious Society of Friends (Quakers), Terrorist Surveillance Program, National Press Club, Bush administration (43), National Security Agency, Michael Hayden, George W. Bush

Timeline Tags: Civil Liberties

President Bush at the National Security Agency.President Bush at the National Security Agency. [Source: Eric Draper / White House]President George Bush uses calls between the 9/11 hijackers in the US and an al-Qaeda communications hub in Yemen that were intercepted by the NSA (see Early 2000-Summer 2001) to justify the NSA’s warrantless wiretapping program (see December 15, 2005). Bush says: “We know that two of the hijackers who struck the Pentagon [Nawaf Alhazmi and Khalid Almihdhar] were inside the United States communicating with al-Qaeda operatives overseas. But we didn’t realize they were here plotting the attack until it was too late.” Bush also quotes former NSA Director Michael Hayden, who previously said, “Had this program been in effect prior to 9/11… we would have detected some of the 9/11 al-Qaeda operatives in the United States, and we would have identified them as such” (see January 23, 2006). Bush and other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the program is revealed by the New York Times (see December 17, 2005). [White House, 1/25/2006] Bush made similar remarks at Kansas State University two days previously. [White House, 1/23/2006]

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi, George W. Bush

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Washington Post reporter William Arkin reveals that the National Security Agency (NSA) is “building a new warning hub and data warehouse” in Aurora, Colorado, just outside of Denver, on the grounds of Buckley Air Force Base. The agency is transferring many key personnel from its Fort Meade, Maryland, headquarters to Aurora. Arkin calls the new NSA facility, named the Aerospace Data Facility (ADF), “massive,” and says he believes it is the hub of the NSA’s data mining operation (see January 16, 2004). According to Government Executive magazine, the NSA’s new data storage facility “will be able to hold the electronic equivalent of the Library of Congress every two days.” While the NSA explains that the new facility is a cost-cutting measure and part of the agency’s post-9/11 decentralization—“This strategy better aligns support to national decision makers and combatant commanders,” an NSA spokesman tells one reporter—Arkin says that the “NSA is aligning its growing domestic eavesdropping operations—what the administration calls ‘terrorist warning’ in its current PR campaign—with military homeland defense organizations, as well as the CIA’s new domestic operations [in] Colorado.… Colorado is now the American epicenter for national domestic spying.” Arkin notes that previous news reports have said that the CIA is planning to move much of its domestic National Resources Division to Aurora as well. He also notes that Colorado is the home of the US military’s Northern Command (NORTHCOM), the military arm responsible for homeland defense. The move also allows the NSA to better coordinate its efforts with private contractors such as Lockheed Martin, Northrup Grumman Mission Systems, and Raytheon, all of which have presences in Colorado. Arkin names all three firms as partners with the NSA in building the ADF. Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Over months and years, the database would be huge, ready for data mining whenever the government wants to go after someone.” [Washington Post, 1/31/2006; Klein, 2009, pp. 40-41]

Entity Tags: National Security Agency, Aerospace Data Facility, Government Executive Magazine, Mark Klein, Northrup Grumman Mission Systems, William Arkin, Lockheed Martin Corporation, Raytheon, US Northern Command

Timeline Tags: Civil Liberties

In his State of the Union address, President Bush insists that his authority to wiretap Americans’ phones without warrants (see December 15, 2005 and December 18, 2005) is validated by previous administrations’ actions, saying that “previous presidents have used the same constitutional authority I have.” He fails to note that those presidents authorized warrantless wiretaps before court orders were required for such actions (see June 19, 1972 and 1973). Since the Foreign Intelligence Surveillance Act passed (see 1978), no president except Bush has ever defied the law. Law professor David Cole calls Bush’s assertion of authority “either intentionally misleading or downright false.” Fellow law professor Richard Epstein predicts that the Supreme Court will strike down any such assertions, if it ever addresses the issue. “I find every bit of this legal argument disingenuous,” he says. Even many conservatives refuse to support Bush, with columnist George Will calling his arguments “risible” and a “monarchical doctrine” that is “refuted by the plain text of the Constitution.” David Keene, the chairman of the American Conservative Union, says the legal powers claimed by Bush and his officials can be used to justify anything: “Their argument is extremely dangerous.… The American system was set up on the assumption that you can’t rely on the good will of people with power.” Conservative activist Grover Norquist says flatly, “There is no excuse for violating the rule of law.” And former Justice Department official Bruce Fein says Bush and his officials have “a view that would cause the Founding Fathers to weep. The real conservatives are the ones who treasure the original understanding of the Constitution, and clearly this is inconsistent with the separation of powers.” Even former George H. W. Bush official Brent Scowcroft says that Bush’s interpretation of the Constitution is “fundamentally in error.” [Savage, 2007, pp. 203-204]

Entity Tags: David D. Cole, Brent Scowcroft, American Conservative Union, Bruce Fein, Richard Epstein, Grover Norquist, Foreign Intelligence Surveillance Act, David Keene, George Will, George W. Bush

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group and a reporter to expose the collusion of AT&T and the National Security Agency in pushing the government’s illegal surveillance program (see Early January 2006 and January 23, 2006 and After), contacts the office of Senator Dianne Feinstein (D-CA) at the advice of Electronic Frontier Foundation lawyer Kevin Bankston. Klein talks to Feinstein’s chief attorney in Washington, DC, Steven Cash. Klein will later write: “I instinctively recoiled at the thought of trying to approach her as my memory of her record told me she was no friend of civil liberties, though she plays one on TV. My instinct was not wrong.” After an initial discussion with Cash, Klein emails him his packet of documentation (see December 31, 2005). On the afternoon of February 3, Cash calls Klein and says he is very interested in his story, though Feinstein’s staff rates the probability of the NSA performing illegal acts at somewhere around “50-50,” according to Klein. Cash promises to get back in touch with Klein on February 6, but fails to do so. Neither Klein nor his attorneys (see Early January 2006) are able to talk to anyone on Feinstein’s staff from here on. Klein later writes: “The silent message was unmistakable: the senator did not want to sully her political skirts by having contact with a whistleblower. And this was a foretaste of her behavior and voting for the next two and a half years. At every turn, she was there pushing for immunity for the telecom companies in the Senate Intelligence and Judiciary Committees; peddling her toothless restatement of the ‘exclusive means’ clause of FISA [the Foreign Intelligence Surveillance Act—see 1978] as a substitute for any confrontation with the president over ongoing illegal NSA spying; ushering former NSA Director Michael Hayden through his nomination for CIA director; and backing Michael Mukasey as a clone replacement for the resigning Attorney General [Alberto] Gonzales. Moreover, this ultimately turned out to be the attitude of virtually the entire Democratic Party leadership, not to mention the Republicans.” Klein will explain that FISA’s “exclusive means” clause states that FISA should be the “exclusive means” for the federal government to conduct surveillance. Congress’s duty under the law was, Klein will state, to enforce the law against President Bush, “who openly flouted the law.” Instead, Klein will claim, Feinstein uses the “exclusive means” clause to protect the Bush administration and the telecom firms. [Klein, 2009, pp. 57-60]

Entity Tags: Electronic Frontier Foundation, AT&T, Dianne Feinstein, Mark Klein, National Security Agency, Steven Cash, Kevin Bankston

Timeline Tags: Civil Liberties

The Justice Department’s Office of Professional Responsibility (OPR) opens an internal investigation into the department’s role in approving the Bush administration’s domestic warrantless wiretapping program. OPR counsel Marshall Jarrett informs Representative Maurice Hinchey (D-NY) of the investigation into the program, initiated after the 9/11 attacks by the National Security Agency and authorized via a secret executive order from President Bush shortly thereafter (see Early 2002). Jarrett writes that the OPR probe will include “whether such activities are permissible under existing law.” Justice Department spokeswoman Tasia Scolinos says the inquiry will be quite limited: “They will not be making a determination on the lawfulness of the NSA program but rather will determine whether the department lawyers complied with their professional obligations in connection with that program.” Scolinos calls the OPR probe “routine.” Hinchey says he welcomes the probe, which may determine “how President Bush went about creating this Big Brother program.” [Washington Post, 2/16/2006] The OPR inquiry is derailed after the NSA, with Bush’s authorization, refuses to give routine security clearances to OPR lawyers that would allow them to examine the relevant documents (see May 9, 2006).

Entity Tags: US Department of Justice, Tasia Scolinos, H. Marshall Jarrett, National Security Agency, George W. Bush, Bush administration (43), Maurice Hinchey, Office of Professional Responsibility

Timeline Tags: Civil Liberties

Seven telecommunications executives confirm to the press that large telecommunications companies such as AT&T, MCI, and Sprint have cooperated with the National Security Agency’s domestic warrantless wiretapping program. Those firms, along with BellSouth, previously denied they had cooperated with the NSA (see October 2001). In typical domestic investigations, telecom companies require court warrants before mounting any surveillance operations, but this has not been the case with the NSA program. Apparently, the companies decided to assist the NSA in tracking international telephone and Internet communications to and from US citizens and routed through “switches” which handle millions of communications, both domestic and international, every day. The telecom firms in question have undergone several mergers and reorganizations—BellSouth, another firm accused of cooperating with the NSA, is now part of AT&T, MCI (formerly WorldCom) was recently acquired by Verizon, and Sprint has merged with Nextel. The companies comply with the NSA requests for information once the NSA determines that there is a “reasonable basis” for believing that the communications may have a connection with militant Islamic organizations such as al-Qaeda. The firms do not require court warrants, but rather implement the monitoring on nothing more than oral requests from senior NSA officials. [USA Today, 2/5/2006]

Entity Tags: National Security Agency, MCI, WorldCom, Al-Qaeda, AT&T, Verizon Wireless, Sprint/Nextel

Timeline Tags: Civil Liberties

In an interview with PBS’s Gwen Ifill, Representative Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee, says she supports the administration’s warrantless wiretapping program (see Spring 2001), a position that places her at odds with most Congressional Democrats. “Well, I said then and I say now that I support the program,” she tells Ifill. Harman is critical of the insider leaks that led to the public divulgance of the program (see December 15, 2005), saying, “Well, I think the leaks have done a lot of damage, and I deplore the leaks of this critical program.” She goes on to complain that the administration “says it adequately oversees this program,” but “the system of checks and balances that we have… requires that Congress as an independent branch of government pass the laws, fund the programs, and oversee how all that works.” In addition to requesting greater cooperation on oversight with Congress, she adds that “the courts need to be cut back in,” and thinks the “entire program” should be brought under the Foreign Intelligence Surveillance Act. [PBS, 2/8/2006] Four days later, Harman reiterates her position on NBC’s Meet the Press. She tells moderator Tim Russert, “If the press was part of the process of delivering classified information, there have to be some limits on press immunity.” Russert asks, “But if [the NSA leak] came from a whistleblower, should the New York Times reporter be prosecuted?” Harman answers: “Well, it’s not clear it was a whistleblower. You have to prove that first. If it’s protected by the whistleblower statute, then it’s protected.… By the way, I deplore that leak. This is a very valuable foreign [intelligence] collection program. I think it is tragic that a lot of our capabilities are now [spread] across the pages of the newspapers.” [MSNBC, 2/12/2006; NewsMax, 2/12/2006]

Entity Tags: Jane Harman, Gwen Ifill, New York Times, House Intelligence Committee, Foreign Intelligence Surveillance Act, Tim Russert

Timeline Tags: Civil Liberties

Page 3 of 5 (448 events)
previous | 1, 2, 3, 4, 5 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike