The Center for Grassroots Oversight

This page can be viewed at http://www.historycommons.org/context.jsp?item=a121704affirmbush&scale=4


Context of 'December 17, 2004: Bush Rejects Affirmative Action Law for National Intelligence Hires'

This is a scalable context timeline. It contains events related to the event December 17, 2004: Bush Rejects Affirmative Action Law for National Intelligence Hires. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 5 (472 events)
previous | 1, 2, 3, 4, 5 | next

After the failure of the US federal government under the Articles of Confederation, the men working to shape the new American government—later termed the “Founders”—determine that the new government must have a president with power equal to that of Congress and the Supreme Court. The federal government itself has far more power under the new Constitution than it had under the Articles, but many Founders worry that the government will have, or take upon itself, the power to constrain or even destroy individual rights and freedoms. The government, therefore, will have strict limitations on its functions, and will be divided into three co-equal branches. Debate over whether the new government should have a single president or an executive council rages, but eventually the Founders decide that a single president could best act decisively in times of crisis. However, Congress has the strength to curtail presidential power via legislation and oversight. One of the Founders’ most crucial decisions is to give Congress, not the president, the power to declare war and commit military troops to battle. Congress must also authorize any military actions that fall short of actual war, the creation and maintenance of armies, and exercise control over how the president can call on the armed forces in emergencies. Finally, the Founders, all too aware that until the English Revolution of 1688, the King of England could use his “prerogative powers” to dispense with a law that he felt unnecessary, move to ensure that the US president cannot use a similar usurpation of power to override Congressional legislation, writing in the Constitution that the president must “take care that the laws be faithfully executed.” In 2007, reporter Charlie Savage, drawing on James Madison’s Federalist Papers, will write: “Knowing that it was inevitable that from time to time foolish, corrupt, or shortsighted individuals would win positions of responsibility in the government, the Founders came up with a system that would limit anyone’s ability to become a tyrant or to otherwise wreck the country. And over the next century and a half, the system worked as the Founders had designed it to work.” (Savage 2007, pp. 14-16)

James Madison, one of the founders of the American system of constitutional government (see 1787), writes of the importance of Congress, not the president, retaining the power to send the nation to war. “Those who are to conduct a war cannot, in the nature of things, be proper or safe judges,” he writes, “whether a war ought to be commenced, continued, or concluded. They are barred from the latter functions by a great principle in free government, analagous to that which separates the sword from the purse, or the power from executing from the power of enacting laws.” (Savage 2007, pp. 19)

The German Reich Ministry of Justice issues a secret memo following a meeting of several Justice Ministry lawyers and public prosecutors with senior Gestapo officers. The participants discuss the fact that Germany has been on a war footing for years, and the leaders’ worry that the citizenry is riddled with sleeper cells of subversives. The solution: detaining and torturing subversives. It is unclear whether torture will be used to terrorize other subversives, to extract information, or produce confessions. German law enforcement officials are balky at applying “more rigorous interrogation” techniques. Though some judges seem unmoved by defendants appearing in court with obvious marks of torture upon their bodies, the law enforcement officers are bureaucrats in a system that has always respected the rule of law and the Hitler government was originally elected on a law-and-order platform. The memo is the product of the top officials in the Gestapo and Justice Ministry, and lays out detailed instructions as to when torture techniques can be applied, the specific equipment used in such interrogations, and how many times particular techniques could be used on certain categories of detainees. Perhaps most importantly, the memo promises immunity from prosecution to any German interrogator who follows the rules as laid down in the memo.
Specific Instructions - It reads in part: “At present, we thus have a situation which cannot continue: a deficient sense of what is right on the part of judicial officers; an undignified position for police officers, who try to help matters by foolish denials [that torture has taken place in court proceedings].… [I]nterrogations of this kind [torture] may be undertaken in cases where charges involve the immediate interests of the state.… chiefly treason and high treason. Representatives of the Gestapo expressed the opinion that a more rigorous interrogation could also be considered in cases of Jehovah’s Witnesses, explosives, and sabotage.… As a general principle, in more rigorous interrogations only blows with a club on the buttocks are permissible, up to 25 such blows. The number is to be determined in advance by the Gestapo.… Beginning with the tenth blow, a physician must be present. A standard club will be designated, to eliminate all irregularities.” Gestapo Headquarters in Berlin must give permission for more “rigorous interrogation[s],” the memo continues.
Drawing Parallels to Bush Administration Torture - The memo will be the subject of a 2009 article by Shayana Kadidal, the senior managing attorney of the Guantanamo project at the Center for Constitutional Rights. Kadidal will draw parallels between the Nazi torture authorization and similar legal justifications issued by the American government after the 9/11 attacks (see March 2, 2009 and April 21, 2009). Kadidal will write: “I realize that, as a matter of principle, there is a strong bias against making Nazi analogies to any events happening in our modern world.… But here we have: (1) a system set up to allow torture on certain specific individual detainees, (2) specifying standardized equipment for the torture (apparently down to the exact length of the club to be used), along with physician participation to ensure survival of the victim for the more several applications, (3) requiring prior approval of the use of torture from the central authorities in the justice department and intelligence agency in the capital, so as to ensure that (6) the local field officers actually carrying out the abuse are immune from prosecution.” (Kadidal 4/21/2009)

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). (Campbell 7/25/2000) The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). (Ponder 5/13/2006) The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. (Campbell 7/25/2000) (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) (Ponder 5/13/2006) In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” (Campbell 7/25/2000) The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” (Church Committee 4/23/1976) Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” (Ponder 5/13/2006) Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. (Campbell 7/25/2000)
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

With the approval of President Harry S. Truman, the US government constructs a massive 200,000-square-foot underground facility along the Maryland-Pennsylvania border, about seven miles north of Camp David and about 65 miles north of Washington, DC. Site-R at Raven Rock, officially known as the Alternate Joint Communications Center, is one of 96 bunkers being assembled around the nation’s capital in preparation for a potential nuclear conflict with the Soviet Union (see 1950-1962). Site-R is designed to serve as a complete backup to the Pentagon in times of war and is complete with state-of-the-art technology, alternate command posts, war rooms, and living spaces for top officials. The subterranean fortress resembles a small city, with all the basic necessities for sustaining a population in the thousands for months at a time. The site is equipped with its own self-generating power supply, offices, medical clinic, fire department, mail service center, dining halls, and dormitories. The facility is said to have its own a chapel, two fishing lakes, a barbershop, a drug store, and even a bowling alley. There are also rumors that an underground tunnel connects Site-R to Camp David less than 10 miles to the south. Decades later, Vice President Dick Cheney and other high-ranking officials will relocate to Site-R in the aftermath of the terrorist attacks of September 11, 2001 (see (11:00 a.m.) September 11, 2001 and September 12, 2001-2002). (Guo 8/7/1985; Gup 5/31/1992; Gifford 12/2/2000; Weiser 6/25/2002; Goldstein 7/20/2004)

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, (New York Times 12/16/2005) The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. (Ensor 3/31/2001) After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. (New York Times 12/16/2005)

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. (U. S. v. Reynolds 3/9/1953; Siegel 2008, pp. 171-176)
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” (Siegel 2008, pp. ix-x)

The CIA’s Technical Services Division (TSD) considers plans to undermine Fidel Castro’s charismatic appeal by sabotaging his speeches. At one point, there is discussion of spraying Castro’s broadcasting studio with a hallucinogenic chemical. The plan is taken of the shelf because the chemical is deemed unreliable. During this period, the TSD laces a box of cigars with a chemical that would produce temporary disorientation, hoping that he will smoke one of the cigars before giving a speech. In another instance, the TSD comes up with a scheme to dust Castro’s shoes with thallium salts during a trip outside of Cuba. The salts would cause his beard to fall out. The plan is abandoned when Castro cancels the trip. (US Congress 12/18/1975)

The CIA works with a high-level Cuban official, codenamed “AM/LASH,” on a plan to assassinate Fidel Castro and overthrow his government. In June 1965, the CIA ends its contact with AM/LASH and his associates, citing security concerns. (US Congress 12/18/1975; Central Intelligence Agency Inspector General 1/1996)

The CIA’s Task Force W devises two plans to assassinate Fidel Castro. The first one, involving an exploding sea shell that would be placed where Castro regularly dives, is dismissed by the CIA’s Technical Services Division (TSD) as impractical. In the second plan, James Donovan (who has been negotiating with Castro for the release of prisoners taken during the Bay of Pigs operation) would present Castro with a contaminated diving suit. TSD decides to give the plan a try. It purchases a diving suit and laces its breathing apparatus with tubercule bacillus. The suit itself is dusted with a fungus that is known to cause a chronic skin disease. But the suit never leaves the laboratory. (US Congress 12/18/1975; Central Intelligence Agency Inspector General 1/1996)

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” (Poole 8/15/2000; Ponder 5/13/2006) MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. (Bamford 1983; Ponder 5/13/2006)

Dick Cheney.Dick Cheney. [Source: Boston Globe]Dick Cheney, a long-term college student who avoided the Vietnam War by securing five student deferments (Dionne 1/17/2006) and now a Congressional aide, is hired by Donald Rumsfeld, who had been a congressman but resigned to run the Office of Economic Opportunity (OEO). Cheney is a young staff assistant to Representative Bill Steiger (R-WI), who took Cheney under his wing and taught him what he knew of the ins and outs of Washington bureaucracy. There are two versions of how Cheney comes to Rumsfeld’s attention. Rumsfeld sends a letter to Steiger asking for advice on how to run the OEO. The official story has Cheney spying the letter and writing a ten-page policy memo on how to run a federal agency, a memo that so impresses Steiger that he recommends Cheney to Rumsfeld’s attention. Authors Lou Dubose and Jake Bernstein will write, “A more plausible version has Steiger (who died in 1978) assigning Cheney the task of collecting information on the OEO for Rumsfeld.” Either way, Rumsfeld is so taken with the memo that he hires Cheney on the spot. Rumsfeld, who is also an assistant to President Nixon, takes Cheney with him to morning and afternoon meetings in the White House. Cheney later says these meetings taught him “what [a president] has to do in the course of a day.” (Dubose and Bernstein 2006, pp. 24-25)

The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). (Urban 7/17/1997)

The US Supreme Court, in what becomes informally known as the “Keith case,” upholds, 8-0, an appellate court ruling that strikes down warrantless surveillance of domestic groups for national security purposes. The Department of Justice had wiretapped, without court warrants, several defendants charged with destruction of government property; those wiretaps provided key evidence against the defendants. Attorney General John Mitchell refused to disclose the source of the evidence pursuant to the “national security” exception to the Omnibus Crime Control and Safe Streets Act of 1968. The courts disagreed, and the government appealed the decision to the Supreme Court, which upheld the lower courts’ rulings against the government in a unanimous verdict. The Court held that the wiretaps were an unconstitutional violation of the Fourth Amendment, establishing the judicial precedent that warrants must be obtained before the government can wiretap a US citizen. (US Supreme Court 6/19/1972; Bernstein and Woodward 1974, pp. 258-259) Critics of the Nixon administration have long argued that its so-called “Mitchell Doctrine” of warrantlessly wiretapping “subversives” has been misused to spy on anyone whom Nixon officials believe may be political enemies. (Bernstein and Woodward 1974, pp. 258-259) As a result of the Supreme Court’s decision, Congress passes the Foreign Intelligence Surveillance Act. (Conyers 5/14/2003)
Opinion of Justice Powell - Writing for the Court, Justice Lewis Powell observes: “History abundantly documents the tendency of Government—however benevolent and benign its motives—to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the government attempts to act under so vague a concept as the power to protect ‘domestic security.’ Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent.” (US Supreme Court 6/19/1972)
Justice Department Wiretapped Reporters, Government Officials - In February 1973, the media will report that, under the policy, the Justice Department had wiretapped both reporters and Nixon officials themselves who were suspected of leaking information to the press (see May 1969 and July 26-27, 1970), and that some of the information gleaned from those wiretaps was given to “Plumbers” E. Howard Hunt and G. Gordon Liddy for their own political espionage operations. (Bernstein and Woodward 1974, pp. 258-259)
Conyers Hails Decision 30 Years Later - In 2003, Representative John Conyers (D-MI) will say on the floor of the House: “Prior to 1970, every modern president had claimed ‘inherent Executive power’ to conduct electronic surveillance in ‘national security’ cases without the judicial warrant required in criminal cases by the Fourth Amendment to the Constitution. Then Attorney General John Mitchell, on behalf of President Richard Nixon sought to wiretap several alleged ‘domestic’ terrorists without warrants, on the ground that it was a national security matter. Judge [Damon] Keith rejected this claim of the Sovereign’s inherent power to avoid the safeguard of the Fourth Amendment. He ordered the government to produce the wiretap transcripts. When the Attorney General appealed to the US Supreme Court, the Court unanimously affirmed Judge Keith. The Keith decision not only marked a watershed in civil liberties protection for Americans. It also led directly to the current statutory restriction on the government’s electronic snooping in national security cases.” (Conyers 5/14/2003)

CIA Counterintelligence Director James Angleton.CIA Counterintelligence Director James Angleton. [Source: CI Centre.com]CIA Director James Schlesinger orders an internal review of CIA surveillance operations against US citizens. The review finds dozens of instances of illegal CIA surveillance operations against US citizens dating back to the 1950s, including break-ins, wiretaps, and the surreptitious opening of personal mail. The earlier surveillance operations were not directly targeted at US citizens, but against “suspected foreign intelligence agents operating in the United States.” Schlesinger is disturbed to find that the CIA is currently mounting illegal surveillance operations against antiwar protesters, civil rights organizations, and political “enemies” of the Nixon administration. In the 1960s and early 1970s, CIA agents photographed participants in antiwar rallies and other demonstrations. The CIA also created a network of informants who were tasked to penetrate antiwar and civil rights groups and report back on their findings. At least one antiwar Congressman was placed under surveillance, and other members of Congress were included in the agency’s dossier of “dissident Americans.” As yet, neither Schlesinger nor his successor, current CIA Director William Colby, will be able to learn whether or not Schlesinger’s predecessor, Richard Helms, was asked by Nixon officials to perform such illegal surveillance, though both Schlesinger and Colby disapproved of the operations once they learned of them. Colby will privately inform the heads of the House and Senate Intelligence Committees of the domestic spying engaged in by his agency. The domestic spying program was headed by James Angleton, who is still serving as the CIA’s head of counterintelligence operations, one of the most powerful and secretive bureaus inside the agency. It is Angleton’s job to maintain the CIA’s “sources and methods of intelligence,” including the prevention of foreign “moles” from penetrating the CIA. But to use counterintelligence as a justification for the domestic spying program is wrong, several sources with first-hand knowledge of the program will say in 1974. “Look, that’s how it started,” says one. “They were looking for evidence of foreign involvement in the antiwar movement. But that’s not how it ended up. This just grew and mushroomed internally.” The source continues, speaking hypothetically: “Maybe they began with a check on [Jane] Fonda. They began to check on her friends. They’d see her at an antiwar rally and take photographs. I think this was going on even before the Huston plan” (see July 26-27, 1970 and December 21, 1974). “This wasn’t a series of isolated events. It was highly coordinated. People were targeted, information was collected on them, and it was all put on [computer] tape, just like the agency does with information about KGB agents. Every one of these acts was blatantly illegal.” Schlesinger begins a round of reforms in the CIA, a program continued by Colby. (Hersh 12/22/1974 pdf file)

Washington Post headline of firings.Washington Post headline of firings. [Source: Washington Post]After Watergate special prosecutor Archibald Cox refuses President Nixon’s offer of a “compromise” on the issue of the White House tapes (see October 19, 1973), Nixon orders (through his chief of staff Alexander Haig) Attorney General Elliot Richardson to fire Cox. Richardson refuses the presidential order, and resigns on the spot. Haig then orders Deputy Attorney General William Ruckelshaus to fire Cox. Ruckelshaus also refuses, and resigns also. Haig finally finds a willing Justice Department official in Solicitor General Robert Bork, who is named acting attorney general and fires Cox. (Of the firing, Bork tells reporters, “All I will say is that I carried out the president’s directive.”) White House press secretary Ronald Ziegler announces that the Office of the Special Prosecutor has been abolished. FBI agents are sent to prevent Cox’s staff from taking their files out of their offices. Ziegler justifies the firing by saying that Cox “defied” Nixon’s instructions “at a time of serious world crisis” and made it “necessary” for Nixon to discharge him. After his firing, Cox says, “Whether ours shall continue to be a government of laws and not of men is now for Congress and ultimately the American people.” The press dubs Cox’s firings and the abolishment of the OSP the “Saturday Night Massacre,” and the public reacts with a fury unprecedented in modern American political history. In a period of ten days, Congress receives more than a million letters and telegrams (some sources say the number is closer to three million), almost all demanding Nixon’s impeachment. Congress will soon launch an impeachment inquiry. Former Washington Post editor Barry Sussman writes in 1974 that Cox’s firing was not a result of impetuous presidential anger. Nixon had been more than reluctant to accept a special prosecutor for Watergate. Cox, named special prosecutor in the spring of 1973, had quickly earned the ire of White House officials and of Nixon himself, and by October 7, Nixon had announced privately that Cox would be fired. (Kilpatrick 10/21/1973; Sussman 1974, pp. 251; Gerald R. Ford Library and Museum 7/3/2007)

Republican political adviser and corporate lobbyist Bryce Harlow recommends former New York governor Nelson Rockefeller over former ambassador and current Republican National Committee chairman George H.W. Bush to serve as vice president (see August 20, 1974). Bush may be a better choice for party harmony, Harlow says, but that choice would be considered indecisive and overly partisan. On the other hand, Rockefeller, a liberal Republican, would be considered a “bold” choice and “would be hailed by the media normally most hostile to Republicans.” Rockefeller’s selection would also “encourage estranged groups to return to the Party and would signal that the new president will not be captive of any political faction.”
Watergate Allegations against Rockefeller - Rockefeller’s naming as vice president, strongly supported by President Ford, is briefly held up by unfounded allegations that Rockefeller hired thugs to disrupt the 1972 Democratic National Convention, and that the papers to prove the allegations were stolen from the offices of convicted Watergate burglar E. Howard Hunt. The charges are leveled by an elderly anti-Communist activist named Hamilton Long. The story leaks to the press, and Ford, taking no chances, orders the FBI to investigate Rockefeller, Bush, and senior staff aide Donald Rumsfeld for possible selection as the vice president. Long’s allegations prove baseless when Watergate investigators locate the safety deposit boxes in which Long says the documents are stored, and find the boxes empty.
Ford Offers VP - After learning that Rockefeller is free of any Watergate taint, Ford privately asks him to accept the vice presidency. Rockefeller will have strong influence on the Ford administration’s domestic and economic policies, Ford promises, and, additionally, Rockefeller will be Ford’s vice presidential choice in the 1976 presidential elections. The last obstacle is the press, which is all but convinced that the White House is involved in another Watergate cover-up, this time with Ford at the helm. A White House source tells reporters that the so-called “Rockefeller Papers” are nothing more than a hoax concocted by “right-wing extremists who decided it would be useful to blacken the name of Governor Rockefeller.” The explanations by press secretary Jerald terHorst, himself a former reporter, and terHorst’s acceptance of the blame for giving confusing and somewhat misleading information about the Rockefeller allegations, somewhat mollifies the press. White House counsel Robert Hartmann recalls the Long incident and its handling as an example of the inexperience of the Ford staff and of Ford himself. “[W]e were all babes in the White House,” he later writes. “We had done the right thing and truthfully told what we had done, but it was unfair to Rockefeller to give presidential credence to Long’s hearsay. And of course, the press castigated us for that the next day.” (Werth 2006, pp. 93-105)

Dick Cheney and Donald Rumsfeld speaking to reporters, 1975.Dick Cheney and Donald Rumsfeld speaking to reporters, 1975. [Source: Gaylinkcontent (.com)]President Ford asks Donald Rumsfeld to replace the outgoing Alexander Haig at the White House (see September 16-Late September, 1974). Rumsfeld has long been Haig’s choice to replace him (see August 14, 1974). Ford does not want to give Rumsfeld the official title of “chief of staff,” and instead wants Rumsfeld as “staff coordinator.” The difference is academic. Ford wants the aggressive, bureaucratically savvy Rumsfeld to help him regain control over a White House that is, in the words of author Barry Werth, “riven with disunity, disorganization, and bad blood.” Rumsfeld agrees, and names former Wyoming Congressman Dick Cheney as his deputy (who makes himself valuable by initially doing the lowest forms of bureaucratic scutwork). Rumsfeld and Cheney will eventually wield almost Nixonian power in Ford’s White House, successfully blocking the “in-house liberal,” Vice President Rockefeller, from exerting any real influence, and hobbling Henry Kissinger’s almost-limitless influence.
Blocking of Rockefeller and Kissinger for Ideological and Political Reasons - Rumsfeld begins his in-house assault in classic fashion: trying to cause tension between Kissinger and White House officials by snitching on Kissinger to any White House official who will listen. Kissinger eventually tells Ford: “Don’t listen to [Rumsfeld], Mr. President. He’s running for president in 1980.” Rumsfeld and Cheney do their best to open the White House to hardline defense hawks and the even more hardline neoconservatives led by Senator Henry “Scoop” Jackson (D-WA) and Jackson’s aide, Richard Perle. (Though Rumsfeld and Cheney are not considered neoconservatives in a strict sense, their aims are almost identical—see June 4-5, 1974). Kissinger’s efforts to win a negotiated peace between Israel and Palestine in the Middle East are held in contempt by Rumsfeld, Cheney, and the neoconservatives; using Ford’s press secretary Ron Nessen as a conduit, Rumsfeld and Cheney leak information about the negotiations to the press, helping to cripple the entire peace process. Rumsfeld and Cheney have larger personal plans as well: they want to secure the White House for Rumsfeld, perhaps as early as 1976, but certainly by 1980. One of their methods of winning support is to undercut Kissinger as much as possible; they believe they can win support among the GOP’s right wing by thwarting Kissinger’s “realpolitik” foreign policy stratagems.
Rumsfeld as 'Wizard of Oz' - According to the chief of Ford’s Economic Policy Board, William Seidman, Rumsfeld’s bureaucratic machinations remind him of the Wizard of Oz: “He thought he was invisible behind the curtain as he worked the levers, but in reality everyone could see what he was doing.” Rumsfeld and Cheney will make their most open grasp for power in orchestrating the “Halloween Massacre” (see November 4, 1975 and After). (Werth 2006, pp. 336-337; Unger 2007, pp. 49-52)

Nelson Rockefeller is sworn in as vice president (see August 20, 1974). (Rockefeller Family Archives 6/7/2007)
Bad Blood and Confirmation Difficulties - Rockefeller has trouble even before taking office. Branded as a liberal by many in the Republican Party, and winning as many enemies as friends with his outsized ego and gladhanding demeanor, Rockefeller garnered swift and obdurate resistance particularly from the right wing both outside the White House (see August 24, 1974) and in (see September 21, 1974 and After). During the Senate’s confirmation hearings, many Democrats and some Republicans relished forcing Rockefeller, one of the wealthiest men in the country, to open his finances to public scrutiny. Even President Ford privately expresses his astonishment. “Can you imagine?” he asked during the hearings. “Nelson lost $30 million in one year and it didn’t make any difference.” When it was revealed that Rockefeller had given huge personal contributions to lawmakers and government officials—including Secretary of State Henry Kissinger—in the form of “loans” that never needed repaying, the Senate hearings became even more inquisitorial. The hearings dragged on for months until Ford personally intervened, telling House and Senate leaders that it was “in the national interest that you confirm Rockefeller, and I’m asking you to move as soon as possible.” (US Senate 7/7/2007)
Cheney Wanted Reagan - Deputy Chief of Staff Dick Cheney, far more conservative than either Ford or Rockefeller, opposes Rockefeller’s influence from the start, and works with his boss, Chief of Staff Donald Rumsfeld, to minimize Rockefeller’s influence. In 1986, Cheney will say that Ford “should have thought of Ronald Reagan as vice president in the summer of 1974, if you are talking strictly in political terms.” (Dubose and Bernstein 2006, pp. 38)
Domestic Squabbles - Both Ford and Rockefeller want the new vice president to be what Ford calls “a full partner” in his administration, particularly on domestic issues. Ford appoints him to chair the Domestic Council, but behind the scenes, Rockefeller’s implacable enemy, Rumsfeld, who sees Rockefeller as a “New Deal” economic liberal, blocks his influence at every term, both from personal and ideological dislike and from a desire to keep power in the White House to himself and his small, close-knit aides. (Cheney, ever attentive to indirect manipulations, inflames Rumsfeld’s dislike of Rockefeller even further by suggesting to his nakedly ambitious boss that if Rockefeller was too successful in implementing domestic policy, he would be perceived as “the man responsible for drafting the agenda of 1976,” thus limiting Rumsfeld’s chances of being named vice president in Ford’s re-election campaign (see November 4, 1975 and After). When Rockefeller tries to implement Ford’s suggested policy that domestic policymakers report to Ford through Rockefeller, Rumsfeld interferes. When Rockefeller names one of his trusted assistants, James Cannon, to head the Domestic Council, Rumsfeld slashes the Council’s budget almost to zero. When Rockefeller proposes a $100 billion Energy Independence Authority, with the aim to reduce and perhaps even end the nation’s dependency on foreign energy sources, Rumsfeld joins Ford’s economic and environmental advisers to block its creation. When Rockefeller proposes an idea for the president to Rumsfeld, Rumsfeld hands it off to Cheney, who ensures that it dies a quiet, untraceable bureaucratic death.
Rockefeller Neutralized - Cheney later recalls that Rockefeller “came to a point where he was absolutely convinced that Don Rumsfeld and myself were out to scuttle whatever new initiatives he could come up with.” Rumsfeld and other Ford staffers ensure that Rockefeller is not involved in key policy meetings; when Ford proposes large cuts in federal taxes and spending, Rockefeller complains, “This is the most important move the president has made, and I wasn’t even consulted.” Asked what he is allowed to do as vice president, Rockefeller answers: “I go to funerals. I go to earthquakes.” He says, only half sardonically, that redesigning the vice-presidential seal is “the most important thing I’ve done.” (Dubose and Bernstein 2006, pp. 38-39; US Senate 7/7/2007)
Following in Rockefeller's Footsteps - Ironically, when Cheney becomes vice president in 2001, he uses what Rockefeller intended to do as a model for his own, extremely powerful vice presidency. James Cannon, who came into the Ford administration with Rockefeller, will marvel in 2006, “Cheney is now doing what he and Rumsfeld blocked Rockefeller from doing—influencing policy.” (Dubose and Bernstein 2006, pp. 39-40)

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” (Hersh 12/22/1974 pdf file)

Vice President Nelson Rockefeller (see December 19, 1974 and After) is instrumental in keeping Senate Democrats from finding out too much about the intelligence community’s excesses. When the New York Times reveals the existence of a decades-old illegal domestic surveillance program run by the CIA (see December 21, 1974), President Ford heads off calls from Democrats to investigate the program by appointing the “Rockefeller Commission” to investigate in the Democrats’ stead. Senate Democrats, unimpressed with the idea, create the Church Committee to investigate the intelligence community (see April, 1976). Rockefeller is adept at keeping critical documents out of the hands of the Church Committee and the press. When Senator Frank Church asks for materials from the White House, he is told that the Rockefeller Commission has them; when he asks Rockefeller for the papers, he is told that he cannot have them because only the president can authorize access. One Church aide later calls Rockefeller “absolutely brilliant” in denying them access in a friendly manner. “He winked and smiled and said, ‘Gee, I want to help you but, of course I can’t—not until we’ve finished our work and the president approves it,’” the aide recalls. Senator John Tower (R-TX), the vice chairman of the committee, will later reflect, “We were very skillfully finessed.” But even Rockefeller, who has his own history of involvement with the CIA, is taken aback at the excesses of the CIA, particularly its history of assassinating foreign leaders. Rockefeller will eventually turn that information over to the Church Committee, giving that body some of the most explosive evidence as yet made public against the agency. (US Senate 7/7/2007)

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. (Dubose and Bernstein 2006, pp. 36-37) Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” (Dubose and Bernstein 2006, pp. 34-35)

President Ford fires a number of Nixon holdovers and replaces them with “my guys… my own team,” both to show his independence and to prepare for a bruising 1976 primary battle with Ronald Reagan. The wholesale firings and reshufflings are dubbed the “Halloween Massacre.” Donald Rumsfeld becomes secretary of defense, replacing James Schlesinger (see November 4, 1975). George H. W. Bush replaces William Colby as director of the CIA. Henry Kissinger remains secretary of state, but his position as national security adviser is given to Brent Scowcroft. Dick Cheney, Rumsfeld’s deputy chief of staff, moves up to become the youngest chief of staff in White House history. Perhaps the most controversial decision is to replace Nelson Rockefeller as Ford’s vice-presidential candidate for the 1976 elections. Ford’s shake-up is widely viewed as his cave-in to Republican Party hardliners. He flounders in his defense of his new staffers: for example, when Senator Barry Goldwater (R-AZ) asks him why he thinks Rumsfeld is qualified to run the Pentagon, Ford replies, “He was a pilot in the Korean War.” The ultimate winner in the shake-up is Rumsfeld, who instigated the moves from behind the scenes and gains the most from them. Rumsfeld quickly wins a reputation in Washington as a political opportunist, gunning for the vice presidency in 1976 and willing to do whatever is necessary to get it. Rockefeller tells Ford: “Rumsfeld wants to be president of the United States. He has given George Bush the deep six by putting him in the CIA, he has gotten me out.… He was third on your [vice-presidential] list (see August 16-17, 1974) and now he has gotten rid of two of us.… You are not going to be able to put him on the [ticket] because he is defense secretary, but he is not going to want anybody who can possibly be elected with you on that ticket.… I have to say I have a serious question about his loyalty to you.” Later, Ford will write of his sharp regret in pushing Rockefeller off the ticket: “I was angry at myself for showing cowardice in not saying to the ultraconservatives: It’s going to be Ford and Rockefeller, whatever the consequences.” (Werth 2006, pp. 340-341) “It was the biggest political mistake of my life,” Ford later says. “And it was one of the few cowardly things I did in my life.” (US Senate 7/7/2007)

The Senate Select Committee to Study Governmental Operations releases its report, “Alleged Assassination Plots Involving Foreign Leaders,” which finds “concrete evidence of at least eight plots involving the CIA to assassinate Fidel Castro from 1960 to 1965.” (US Congress 12/18/1975)

Richard Pipes.Richard Pipes. [Source: Mariusz Kubik]After George H. W. Bush becomes the head of the CIA (see November 4, 1975 and After), he decides to break with previous decisions and allow a coterie of neoconservative outsiders to pursue the allegations of Albert Wohlstetter that the CIA is seriously underestimating the threat the USSR poses to the US (see 1965), allegations pushed by hardliners on the President’s Foreign Intelligence Advisory Board.
Internal Opposition - Bush’s predecessor, William Colby, had steadfastly refused to countenance such a project, saying, “It is hard for me to envisage how an ad hoc ‘independent’ group of government and non-government analysts could prepare a more thorough, comprehensive assessment of Soviet strategic capabilities—even in two specific areas—than the intelligence community can prepare.” (Bush approves the experiment by notating on the authorization memo, “Let ‘er fly!”) The national intelligence officer in charge of the National Intelligence Estimate on the USSR, Howard Stoertz, will later recall: “Most of us were opposed to it because we saw it as an ideological, political foray, not an intelligence exercise. We knew the people who were pleading for it.” But Bush, on the advice of deputy national security adviser William Hyland, agrees to the exercise. Hyland says the CIA had been getting “too much flak for being too peacenik and detentish…. I encouraged [Bush] to undertake the experiment, largely because I thought a new director ought to be receptive to new views.” The neocon team of “analysts” becomes known as “Team B,” with “Team A” being the CIA’s own analytical team. It is unprecedented to allow outsiders to have so much access to highly classified CIA intelligence as Bush is granting the Team B neocons, so the entire project is conducted in secret. CIA analyst Melvin Goodman later says that President Ford’s chief of staff, Dick Cheney, is one of the driving forces behind Team B. The outside analysts “wanted to toughen up the agency’s estimates,” Goodman will say, but “Cheney wanted to drive [the CIA] so far to the right it would never say no to the generals.” (Dubose and Bernstein 2006, pp. 208; Unger 2007, pp. 53-55)
Political Pressure - Ford’s political fortunes help push forward the Team B experiment. Ford has been a strong proponent of detente with the Soviet Union, but his poll numbers are sagging and he is facing a strong presidential primary challenger in Governor Ronald Reagan (R-CA), an avowed hardliner. Reagan is making hay challenging Ford’s foreign policy, claiming that the so-called “Ford-Kissinger” policies have allowed the Soviet Union to leap ahead of the US both militarily and geopolitically. In response, Ford has lurched to the right, banning the word “detente” from speeches and statements by White House officials, and has been responsive to calls for action from the newly reforming Committee on the Present Danger (CPD—see 1976). In combination, these political concerns give Bush the justification he wants to push forward with the Team B experiment.
Three B Teams - According to Carter administration arms control official Anne Cahn, there are actually three “B” teams. One studies Soviet low-altitude air defense capabilities, one examines Soviet intercontinental ballistic missile (ICBM) accuracy, and the third, chaired by Harvard Sovietologist Richard Pipes, examines Soviet strategic policy and objectives. It is Pipes’s team that becomes publicly known as “Team B.” (Cahn 4/1993)
Assembling the Team - Pipes fits in well with his small group of ideological hardliners. He believes that the USSR is determined to fight and win a nuclear war with the US, and he is bent on putting together an analysis that proves his contention. He asks Cold War icon Paul Nitze, the former Secretary of the Navy, to join the team. Richard Perle, a core member, has Pipes bring in Paul Wolfowitz, one of Wohlstetter’s most devout disciples. Wolfowitz immediately begins arguing for the need to deploy tactical nuclear weapons in Europe. The “incestuous closeness” of the members, as Cahn later calls it, ensures that the entire group is focused on the same goals as Wohlstetter and Pipes, with no dissension or counterarguments. Other key members include William von Cleave and Daniel Graham. The entire experiment, Cahn will write, “was concocted by conservative cold warriors determined to bury d├ętente and the SALT process. Panel members were all hard-liners,” and many are members of the newly reconstituted “Committee on the Present Danger” (see 1976). The experiment is “leaked to the press in an unsuccessful attempt at an ‘October surprise’ [an attempt to damage the presidential hopes of Democrat Jimmy Carter—see Late November, 1976]. But most important, the Team B reports became the intellectual foundation of ‘the window of vulnerability’ and of the massive arms buildup that began toward the end of the Carter administration and accelerated under President Reagan.” Team B will formally debate its CIA adversaries, “Team A,” towards the end of the year (see November 1976). (Cahn 4/1993; Mitchell 5/2006 pdf file; Unger 2007, pp. 53-55)
'Designed to be Prejudiced' - In 2008, author J. Peter Scoblic will note, “Team B was designed to be prejudiced.” Pipes, the Soviet experts, holds a corrosive hatred of the Soviet Union, in part stemming from his personal experiences as a young Jew in Nazi-occupied Warsaw, and his belief that the Soviet system is little different from the Nazis. When asked why his team is stacked with hardline opponents of arms negotiations and diplomacy of any kind with the USSR, Pipes replies, “There is no point in another, what you might call, optimistic view.” Scoblic will write, “Team B, in short, begged the question. Its members saw the Soviet threat not as an empirical problem but as a matter of faith.” He will add, “For three months, the members of Team B pored over the CIA’s raw intelligence data—and used them to reaffirm their beliefs.” (Scoblic 2008, pp. 93-94)

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). (Spartacus Educational 2/16/2006) The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. (Haines 1/20/2003)
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” (Spartacus Educational 2/16/2006) The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” (Haines 1/20/2003)

President Ford issues Executive Order 11905, which limits the power of the CIA, the NSA, and military intelligence to engage in surveillance of US citizens. Perhaps its most well-known provision is a total ban on “political assassinations” by US government personnel. (Gerald R. Ford 2/18/1976; Roberts 2008, pp. 38) The provision is sparked by the Church Commission’s finding (see April, 1976) that assassination is “unacceptable in our society,” and a political embarassment, especially botched attempts such as the CIA’s efforts to kill Cuba’s Fidel Castro. (Grant J. Lilly 4/6/2006)

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) (Mooney 11/5/2001; History Matters Archive 3/27/2002; Assassination Archives and Research Center 11/23/2002)
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. (Spartacus Educational 12/18/2002)
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. (Assassination Archives and Research Center 11/23/2002)
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” (Haines 1/20/2003)

Jimmy Carter celebrates his presidential victory.Jimmy Carter celebrates his presidential victory. [Source: PBS]Gerald Ford loses the presidency to Democratic challenger Jimmy Carter, an obscure Georgia governor who contrasts himself to the Nixon and Ford administrations by promising “never to tell a lie to the American people.” The Republican Party’s widening rift between its moderate and conservative wings dooms Ford’s chances at being elected to the office he has held by appointment for over two years (see August 9, 1974). (Werth 2006, pp. 342) Ford’s de facto campaign chairman, Chief of Staff Dick Cheney, contributes heavily to Ford’s loss. Unready for the stresses and demands of a presidential campaign, Cheney nevertheless wrested control from Ford’s ostensible chairman, Bo Calloway, and promptly alienated campaign workers and staffers. Press secretary Ron Nessen will later write, “Some reporters privately started calling him the Grand Teuton, a complex pun referring to his mountainous home state of Wyoming and the Germanic style of his predecessor in the Nixon administration, H. R. Haldeman.” Cheney tried throughout the campaign to move Ford farther to the right than the president was willing to go; even with his attempts, Ford’s primary challenge from Governor Ronald Reagan (R-CA) did much to peel away the right-wing Republican base, while Cheney did little to reassure the liberal and moderate Republicans whom many feel are Ford’s natural base. Cheney succeeded in persuading Ford to adopt a convention platform much farther to the right than Ford, and his supporters, wanted; in particular, the Reaganesque “Morality in Foreign Policy Plank,” which stated, “we shall go forward as a united people to forge a lasting peace in the world based upon our deep belief in the rights of man, the rule of law, and guidance by the hand of God,” alienated many more secular Republicans, who were not comfortable with the aggressive Christianity and implied imperialism contained in the statement. (Ultimately, it took the intervention of James Baker, a veteran Republican “fixer” and close friend of the Bush family, to head off disaster at the nominating convention.) Ford aide James Cannon will say that Cheney “was in over his head.” Had Cheney’s former boss Donald Rumsfeld stayed as chief of staff instead of moving to the Pentagon (see November 4, 1975 and After), Cannon believes Ford would have won a second term. (Dubose and Bernstein 2006, pp. 40)

Donald Rumsfeld.Donald Rumsfeld. [Source: US Defense Department]Defense Secretary Donald Rumsfeld wholeheartedly embraces the “Team B” intelligence analysis of the Soviet nuclear and military threat (see Early 1976), regardless of the fact that the team’s reports are riddled with errors (see November 1976 and November 1976). “No doubt exists about the capabilities of the Soviet armed forces,” he proclaims after reading the team’s final report. “The Soviet Union has been busy. They’ve been busy in terms of their level of effort; they’ve been busy in terms of the actual weapons they’re producing; they’ve been busy in terms of expanding production rates; they’ve been busy in terms of expanding their industrial capacity to produce additional weapons at additional rates.” (Unger 2007, pp. 57)

Interviewer David Frost has a difficult time with his subject, former President Richard Nixon, in the day’s early questioning (see April 6, 1977). Frost attempts to recoup with a line of questioning suggested by his adviser James Reston, Jr., one used in the trial of former Nixon aide John Ehrlichman (see January 1, 1975). Were there no limits to what a president can do, even if the president wants to do something plainly illegal? he asks. Could he do anything despite the law? Burglary? Forgery? Even murder? “If the president does it, that means it’s not illegal,” Nixon retorts. “Never had his imperialism been so baldly stated,” Reston will later reflect. Frost asks if the dividing line between, for example, a police burglary and the murder of an antiwar protester is only the president’s judgment? Nixon agrees, and adds: “There’s nothing specific that the Constitution contemplates in that respect. I haven’t read every word, every jot and every tittle, but I do know this: That it has been, however, argued that as far as a president is concerned, that in war time, a president does have certain extraordinary powers which would make acts that would otherwise be unlawful, lawful if undertaken for the purpose of preserving the nation and the Constitution, which is essential for the rights we’re all talking about.” (Time 5/30/1977; Reston 2007, pp. 102-105; Landmark Cases 8/28/2007)

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. (Tien 9/27/2001; Legal Information Institute 11/30/2004) On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. (US Senate 9/14/2001; Senator Jane Harman 2/1/2006)

The Federal Emergency Management Agency (FEMA), known best as a relief agency for victims of natural disasters, is secretly dedicated to the highly classified Continuity of Government (COG) program, which is meant to ensure the survival of the federal government in times of national emergency. Upon its establishment, FEMA absorbs the Defense Civil Preparedness Agency (DCPA) and the Federal Preparedness Agency (FPA), which were previously responsible for the top-secret plans (see April 1, 1979). During the 1980s and into the early 1990s, FEMA’s budget and workforce are overwhelming geared towards the COG program (see 1982-1991 and February 1993). FEMA remains in charge of overseeing the government’s continuity plans up to present day. According to FEMA’s website, the agency’s Office of National Continuity Programs (NCP) is currently the “Lead Agent for the Federal Executive Branch on matters concerning continuity of national operations under the gravest of conditions.” (fema.gov 6/4/2009)

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). (Jimmy Carter 5/23/1979) The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). (Walden 12/28/2005) While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), (Think Progress 12/20/2005) the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. (Jimmy Carter 5/23/1979; 50 U.S.C. 1802(a); Think Progress 12/20/2005) The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. (Federal Register 2/4/2006)

Michael Barnes.Michael Barnes. [Source: Covington and Burling]Representative Michael Barnes (D-MD) is targeted by the NSA’s Echelon satellite surveillance program on orders from Reagan administration officials. Barnes, an outspoken opponent of Reagan’s Central American policies, had phone conversations with Nicaraguan officials intercepted and recorded, including one conversation between Barnes and the foreign minister of Nicaragua. Barnes learns of the surveillance after White House officials, apparently attempting to discredit Barnes, leaks transcripts of the taped conversations to reporters. CIA director William Casey shows Barnes a Nicaraguan embassy cable reporting a meeting between embassy staff and one of Barnes’s aides; Casey demands that Barnes fire the aide. Barnes refuses, noting that the aide had visited the embassy on legitimate business concerning international affairs. Barnes will say in 1995, “I was aware that NSA monitored international calls, that it was a standard part of intelligence gathering. But to use it for domestic political purposes is absolutely outrageous and probably illegal.” Former senator Dennis DeConcini (R-AZ) says he worries about the NSA spying on US citizens: “It has always worried me. What if that is used on American citizens? It is chilling. Are they listening to my private conversations on my telephone?” (Poole 8/15/2000)

Incoming presidential chief of staff James Baker asks a former chief of staff, Dick Cheney (see November 4, 1975 and After), for advice on handling the job. Baker takes four pages of handwritten notes covering his conversation with Cheney. Most of the notes cover mundane topics such as personnel and managing the president’s schedule. But Cheney offers at least one piece of policy advice. According to Baker’s notes: “Pres. seriously weakened in recent yrs. Restore power & auth [authority] to Exec Branch—Need strong ldr’ship. Get rid of War Powers Act—restore independent rights.” Baker notes Cheney’s emphasis of this last idea by marking it with two double lines and six asterisks, and a note in the margin, “Central theme we ought to push.” (Savage 2007, pp. 43)

Donald Rumsfeld and Dick Cheney, along with then-President Gerald Ford, April 28, 1975.Donald Rumsfeld and Dick Cheney, along with then-President Gerald Ford, April 28, 1975. [Source: David Hume Kennerly / Gerald R. Ford Library] (click image to enlarge)Throughout the 1980s, Dick Cheney and Donald Rumsfeld are key players in one of the most highly classified programs of the Reagan administration. Presently, Cheney is working as a Republican congressman, while Rumsfeld is head of the pharmaceutical company G. D. Searle. At least once per year, they both leave their day jobs for periods of three or four days. They head to Andrews Air Force Base, near Washington, DC, and along with 40 to 60 federal officials and one member of the Reagan Cabinet are taken to a remote location within the US, such as an underground bunker. While they are gone, none of their work colleagues, or even their wives, knows where they are. They are participating in detailed planning exercises for keeping government running during and after a nuclear war with the Soviet Union.
Unconstitutional 'Continuity of Government' - This highly secret “Continuity of Government” (COG) program is known as Project 908. The idea is that if the US were under a nuclear attack, three teams would be sent from Washington to separate locations around the US to prepare to take leadership of the country. If somehow one team was located and hit with a nuclear weapon, the second or third team could take its place. Each of the three teams includes representatives from the State Department, Defense Department, CIA, and various domestic-policy agencies. The program is run by a new government agency called the National Program Office. Based in the Washington area, it has a budget of hundreds of million dollars a year, which grows to $1 billion per year by the end of Reagan’s first term in office. Within the National Security Council, the “action officer” involved in the COG program is Oliver North, who is a key figure in the mid-1980s Iran-Contra scandal. Reagan’s Vice President, George H. W. Bush, also supervises some of the program’s efforts. As well as Cheney and Rumsfeld, other known figures involved in the COG exercises include Kenneth Duberstein, who serves for a time as President Reagan’s chief of staff, and future CIA Director James Woolsey. Another regular participant is Richard Clarke, who on 9/11 will be the White House chief of counterterrorism (see (1984-2004)). The program, though, is extraconstitutional, as it establishes a process for designating a new US president that is nowhere authorized in the US Constitution or federal law. After George H. W. Bush is elected president in 1988 and the effective end of the Soviet Union in 1989, the exercises continue. They will go on after Bill Clinton is elected president, but will then be based around the threat posed by terrorists, rather than the Soviet Union (see 1992-2000). According to journalist James Mann, the participation of Rumsfeld and Cheney in these exercises demonstrates a broader truth about them: “Over three decades, from the Ford administration onward, even when they were out of the executive branch of government, they were never too far away; they stayed in touch with its defense, military, and intelligence officials and were regularly called upon by those officials. Cheney and Rumsfeld were, in a sense, a part of the permanent, though hidden, national security apparatus of the United States.” (Mann 2004, pp. 138-145; Mann 3/2004; Kurtz 4/7/2004; Cockburn 2007, pp. 85)
No Role for Congress - According to one participant, “One of the awkward questions we faced was whether to reconstitute Congress after a nuclear attack. It was decided that no, it would be easier to operate without them.” Thus the decision is made to abandon the Constitutional framework of the nation’s government if this plan is ever activated. (Dubose and Bernstein 2006, pp. 198)
Reactivated after 9/11 - The plan they rehearse for in the COG exercises will be activated, supposedly for the first time, in the hours during and after the 9/11 attacks (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). (Gellman and Schmidt 3/1/2002) Mann subsequently comments, “The program is of particular interest today because it helps to explain the thinking and behavior of the second Bush Administration in the hours, days, and months after the terrorist attacks on September 11, 2001.” (Mann 3/2004)

An E-4B Airborne Command Post.An E-4B Airborne Command Post. [Source: US Air Force] (click image to enlarge)During the 1980s, top-secret exercises are regularly held, testing a program called Continuity of Government (COG) that would keep the federal government functioning during and after a nuclear war (see 1981-1992). The program includes a special plane called the National Emergency Airborne Command Post (NEACP). This is a modified Boeing 747, based at Andrews Air Force Base, near Washington, DC that has its own conference room and special communications gear. Nicknamed the “Doomsday” plane, it could act as an airborne command post from where a president could run the country during a nuclear war. One of the COG exercises run by the Reagan administration involves a team of officials actually staying aloft in the NEACP for three days straight. The team cruises across the US, and up and down the coasts, periodically being refueled in mid-air. (Schwartz 1998; Mann 2004, pp. 144) Dick Cheney and Donald Rumsfeld participate in the COG exercises, though whether they are aboard the NEACP in this particular one is unknown. (Mann 3/2004) The plan that is being rehearsed for in the exercises will be activated in response to the 9/11 attacks (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). Also on 9/11, three Doomsday planes (then known as “National Airborne Operations Center” planes) will be in the air, due to an exercise taking place that morning called Global Guardian (see Before 9:00 a.m. September 11, 2001). (Schwartz 1998; Dejka 2/27/2002)

Margaret Thatcher.Margaret Thatcher. [Source: UK Parliament]British prime minister Margaret Thatcher, displeased with two of her ministers for challenging her on unidentified policy matters, requests that they be placed under electronic surveillance. Because it is illegal for British intelligence to monitor its own citizens, the operation is handed over to the CSE, Canada’s national security agency. (Johnson 1/19/2006; Janczewski and Colarik 2007, pp. 454) According to former CSE spy Mike Frost, who will publicly discuss the matter in 2000, Thatcher “had two ministers that she said ‘…weren’t onside.’” Thatcher, says Frost, “wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers.” Why CSE and not British intelligence? Because for the British to monitor their own government members would be illegal—so instead, they farm out such activities to their allies. “The British Parliament now have total deniability,” Frost says. “They didn’t do anything. They know nothing about it. Of course they didn’t do anything; we did it for them.” Frost will say there is no way to pin any blame or criminal charges on anyone in the British government. “The British Parliament now has total deniability,” Frost says. “They didn’t do anything… we did it for them.” (ZDNet 2/25/2000; Kroft 2/27/2000)

The Supreme Court rules in INS v. Chadha that Congress has no right to issue what it calls “legislative vetoes,” essentially provisions passed by Congress giving the executive branch specific powers but with Congress reserving the right to veto specific decisions by the executive branch if it does not approve of the decisions made by the executive. Congress had relied on such “legislative vetoes” for years to curb the expanding power of the president. The Court strikes down hundreds of these “legislative vetoes” throughout federal law. Congress quickly schedules hearings to decide how to respond to the Court’s ruling. White House attorney John Roberts (see September 29, 2005), a young, fast-rising conservative, is one of a team of lawyers assigned to review the administration’s upcoming testimony before Congress. Some of the lawyers want to push Congress to place independent agencies such as the Federal Trade Commission (FTC) and Food and Drug Administration (FDA) under White House control—part of the evolving “unitary executive” theory of presidential power (see April 30, 1986). Roberts writes: “With respect to independent agencies… the time may be ripe to reconsider the existence of such entities, and take action to bring them back within the executive branch.… I agree that the time is ripe to reconsider the Constitutional anomaly of independent agencies… More timid souls may, however, desire to see this deleted as provocative.” (Savage 2007, pp. 256-257)

Young White House attorney John Roberts (see September 29, 2005), an advocate of expanded presidential powers (see June-July 1983), is selected to respond to a letter from retired Supreme Court Justice Arthur Goldberg. The former justice is commenting on the Reagan administration’s decision to unilaterally invade the tiny Caribbean island nation of Grenada. Goldberg wrote that President Reagan probably did violate the Constitution by sending troops to Grenada without Congressional approval, and in that sense has left himself open to impeachment. However, he added, the invasion had succeeded in establishing democracy in that nation. Therefore Reagan’s actions should be compared to those of President Abraham Lincoln during the Civil War, because, like Lincoln, he “acted in good faith and in the belief that this served our national interest” (see April 12 - July 1861). Drafting the letter for Reagan’s signature, Roberts thanks Goldberg for his defense of Reagan but insists that the invasion was perfectly legal. The president, Roberts writes, has “inherent authority in international affairs to defend American lives and interests and, as commander in chief, to use the military when necessary in discharging these responsibilities.” (Savage 2007, pp. 257)

Congress passes the Competition in Contracting Act. President Reagan signs the bill but issues a signing statement instructing the executive branch that a portion of the bill is unconstitutional, and directs agencies not to obey the law created by that section. A losing bidder who would have won a contract under that portion of the bill files a lawsuit, and a federal judge rules that the Reagan administration has no choice but to follow the entirety of the law. Attorney General Edwin Meese insists that the executive branch has the inherent power to interpret the Constitution as it sees fit, and declares the administration will not obey the judge’s ruling. An appeals court upholds the judge’s ruling and criticizes the Reagan administration for trying to seize a sort of line-item veto power without going through Congress. The House Judiciary Committee votes to cut off funding for Meese’s office unless the White House obeys the court rulings, and Meese withdraws his objections. (Savage 2007, pp. 231-232)

Young conservative White House lawyer John Roberts (see September 29, 2005), an advocate of expanded presidential powers (see June-July 1983 and October 1983), advises senior Reagan officials that the White House should challenge the 1978 Presidential Records Act. To Roberts’s mind, the law goes much too far in requiring that presidential papers be considered government property and should, with some exceptions, be released to the public 12 years after a president leaves office. The law infringes on the right of a president to keep information secret, Roberts argues. Later, he will argue that the 12-year rule is far too brief and, as it would “inhibit the free flow of candid advice and recommendations within the White House,” is unconstitutional. (Savage 2007, pp. 258)

Young conservative White House lawyer John Roberts (see September 29, 2005), an advocate of expanded presidential powers (see June-July 1983 and October 1983), expands on his previous argument that the president’s papers and documents should remain secret and unavailable to the public (see February 13, 1984). Roberts writes that the Reagan administration should oppose a bill pending in Congress that would make the National Archives a separate agency, independent of the White House. Roberts writes that the “legislation could grant the archivist [the head of the National Archives] some independence from presidential control, with all the momentous constitutional consequences that would entail.” Others in the White House disagree with Roberts, and the administration does not oppose the bill. Roberts suggests that President Reagan attach a signing statement to the bill making it clear that Reagan has the power to fire the archivist if he/she tries to disobey the White House in releasing a presidential document. (Savage 2007, pp. 258)

According to former Reagan Justice Department official Terry Eastland, writing in his 1992 book Energy in the Executive, the process of selecting Antonin Scalia as a Supreme Court Justice begins now, well before anyone knows there will be a vacancy for him. Attorney General Edwin Meese asks his assistant attorney general, William Bradford Reynolds, to advise him in preparing a nominee, “just in case.” Reynolds assembles a team of Justice Department officials, who examine about twenty possible choices, mostly federal judges, focusing primarily on conservative judicial philosophy. Two individuals stand out: Robert Bork and Scalia. Eastland writes, “Neither was ranked over the other; both were regarded as the best available, most well-qualified exponents of Reagan’s judicial philosophy.” Both are seen as powerful and influential legal figures. When Chief Justice Warren Burger announces his decision to retire from the bench, Reynolds advises Meese to choose Justice William Rehnquist to replace Burger as Chief Justice (see September 26, 1986), and to choose either Bork or Scalia to replace Rehnquist. Reagan makes the final decision: Scalia. (Dean 2007, pp. 133)

Steven Calabresi joins the Justice Department. Calabresi is a young conservative lawyer who has clerked for appeals court Robert Bork, who failed to secure a position on the Supreme Court just months before (see July 1-October 23, 1987). Calabresi, a co-founder of the Federalist Society of conservative lawyers and judges, joins forces with another ambitious young Justice Department lawyer, John Harrison, and the two begin working to expand the power of the president. Calabresi and Harrison decide that an aggressive use of presidential signing statements can advance the president’s authority to the detriment of the legislative and judicial branches. Unfazed by a recent judicial rejection of just such signing statement usage (see 1984-1985), Calabresi and Harrison write a memo to Attorney General Edwin Meese advocating the issuing of more signing statements as part of a larger strategy to increase the president’s influence over the law. Calabresi and Harrison are interested in how what they call “activist judges” use the legislative history of a bill that became law to interpret that law’s meaning in subsequent judicial actions. The two lawyers believe that by issuing signing statements, the president can create a parallel record of presidential interpretations of potentially ambiguous laws to help guide judicial decisions. Meese approves of the idea, and in December has the West Publishing Company, which prints the US Code Congressional and Administration News, the standard collection of bills’ legislative history, begin including presidential signing statements in its publications. In 2007, author Charlie Savage will call Meese’s move “a major step in increasing the perceived legitimacy of the device.” (Savage 2007, pp. 232) In 2007, Calabresi will say: “I initially thought of signing statements as presidential legislative history. I’ve subsequently come to think of them as being important vehicles by which presidents can control subordinates in the executive branch. They subsequently came to be important to the unitary executive [theory of presidential power].” (Savage 2007, pp. 234)

President Ronald Reagan signs a directive that contributes to the modern era of “continuity planning,” which will ensure the maintenance of a functioning government in the event of a catastrophic attack on Washington, DC. This Continuity of Government (COG) plan will be activated for the first time on 9/11, in response to the terrorist attacks that day (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). (Gellman and Schmidt 3/1/2002; ABC News 4/25/2004) National Security Decision Directive 188 (NSDD 188), “Government Coordination for National Security Emergency Preparedness,” states that it is the policy of the United States to have capabilities at all levels of government to respond to a range of national security emergencies, “from major natural calamities to hostile attacks on the nation.” The US policy “includes an emergency mobilization preparedness program which provides an effective capability to meet defense and essential civilian needs during those emergencies.” The National Security Council (NSC) is assigned as the “principal forum” where the national security emergency preparedness policy will be considered, and the Federal Emergency Management Agency (FEMA) is to “assist in the implementation of this policy through a coordinating role with the other federal agencies.” NSDD 188 also assigns responsibility for continuity planning to an interagency panel that includes the Office of Management and Budget, and the Defense, Treasury, and Justice Departments. (US President 9/16/1985; Gellman and Schmidt 3/1/2002) A subsequent executive order in 1988 will apply the COG plan to “any national security emergency situation that might confront the nation” (see November 18, 1988), and a presidential directive in 1998 will update it to specifically deal with the emerging threat posed by terrorists (see Early 1998 and October 21, 1998). (US President 11/18/1988; Clarke 2004, pp. 166-167 and 170; Arkin 6/4/2006)

Ralph Tarr, the acting head of the Justice Department’s Office of Legal Counsel, drafts a memo explaining how the White House has issued signing statements up until now (see August 23, 1985 - December 1985), and makes recommendations on how to improve the process. Tarr, acting at the behest of an aide to Attorney General Edwin Meese, issues what author Charlie Savage will call “a prescient seven-page manifesto.” Tarr writes that signing statements are “presently underutilized and could become far more important as a tool of presidential management of the agencies, a device for preserving issues of importance in the ongoing struggle for power with Congress, and an aid to statutory interpretation for the courts.” Tarr writes that signing statements have the potential to be used as a threat “with which to negotiate concessions from Congress.” The statements can also be used to tell executive branch agencies how to interpret a law: “The president can direct agencies to ignore unconstitutional provisions or to read provisions in a way that eliminates constitutional or policy problems. This direction permits the president to seize the initiative in creating what will eventually be the agency’s interpretation.” (Savage 2007, pp. 232-233)

Justice Department lawyer Samuel Alito, a member of the department’s Litigation Strategy Working Group, writes a memo advocating the creation of a pilot project designed to increase the frequency and impact of presidential signing statements (see August 23, 1985 - December 1985 and October 1985). The rationale is to use signing statements to “increase the power of the executive to shape the law.” Alito focuses on the use of signing statements to parallel the legislative history of a bill, a relatively modest view, but still recognizes the potentially revolutionary nature of the idea. He writes that signing statements must be used incrementally, so as not to draw undue attention from civil libertarians and key Congressional members. “[D]ue to the novelty of the procedure and the potential increase of presidential power,” he writes, “[C]ongress is likely to resent the fact that the president will get the last word on questions of interpretation.” Alito suggests that President Reagan begin issuing signing statements only on bills affecting the Justice Department, and later issue such statements for bills that affect other areas of the federal government. “As an introductory step, our interpretative statements should be of moderate size and scope,” he writes. “Only relatively important questions should be addressed. We should concentrate on points of true ambiguity, rather than issuing interpretations that may seem to conflict with those of Congress. The first step will be to convince the courts that presidential signing statements are valuable interpretive tools.” President Reagan will issue signing statements that challenge, interpret, or actually rewrite 95 sections of bills, far more than any other president. His successor, George H. W. Bush, will challenge 232 sections of bills. (Savage 2007, pp. 233-234)

Edwin Meese.Edwin Meese. [Source: GQ (.com)]Attorney General Edwin Meese receives a report, “Separation of Powers: Legislative-Executive Relations.” Meese had commissioned the report from the Justice Department’s Domestic Policy Committee, an internal “think tank” staffed with hardline conservative scholars and policy advisers.
Recommendations for Restoring, Expanding Executive Power - The Meese report approvingly notes that “the strong leadership of President Reagan seems clearly to have ended the congressional resurgence of the 1970s.” It lays out recommendations for restoring the power taken from the executive branch after Watergate and Vietnam, and adding new powers besides. It recommends that the White House refuse to enforce laws and statutes that “unconstitutionally encroach upon the executive branch,” and for Reagan to veto more legislation and to use “signing statements” to state the White House’s position on newly passed laws. It also assails the 1972 War Powers Resolution and other laws that limit presidential power.
Reinterpreting the Separation of Powers and the Concept of 'Checks and Balances' - Perhaps most importantly, the Meese report claims that for 200 years, courts and scholars alike have misunderstood and misinterpreted the Founders’ intentions in positing the “separation of powers” system (see 1787 and 1793). The belief that the Constitution mandates three separate, co-equal branches of government—executive, judicial, and legislative—who wield overlapping areas of authority and work to keep each of the other branches from usurping too much power—a concept taught in school as “checks and balances”—is wrong, the report asserts. Instead, each branch has separate and independent sets of powers, and none of the three branches may tread or encroach on the others’ area of responsibility and authority. “The only ‘sharing of power’ is the sharing of the sum of all national government power,” the report claims. “But that is not joint shared, it is explicitly divided among the three branches.” According to the report, the White House should exercise total and unchallenged control of the executive branch, which, as reporter and author Charlie Savage will later explain, “could be conceived of as a unitary being with the president as its brain.” The concept of “checks and balances” is nothing more than an unconstitutional attempt by Congress to encroach on the rightful power of the executive. This theory of presidential function will soon be dubbed the “unitary executive theory,” a title adapted from a passage by Alexander Hamilton in the Federalist Papers. (Savage 2007, pp. 47-48) Charles Fried, Reagan’s solicitor general during the second term, will later write that though the unitary executive theory displays “perfect logic” and a “beautiful symmetry,” it is difficult to defend, because it “is not literally compelled by the words of the Constitution. Nor did the framers’ intent compel this view.” (Savage 2007, pp. 50)

William Rehnquist.William Rehnquist. [Source: US Department of Justice]Associate Justice William Rehnquist becomes Chief Justice of the Supreme Court. A strict conservative, Rehnquist will oversee the transformation of the Court from a middle-of-the-road, sometimes left-leaning instrument into a conservative entity dominated by the “axis” of Rehnquist, Antonin Scalia (see September 26, 1986), and Clarence Thomas (see July 2-August 28, 1991). (Mauro 9/5/2005)
False Testimony? - According to former Nixon White House counsel John Dean, writing in his 2007 book Broken Government, Rehnquist is the first true conservative fundamentalist to be appointed to the Court, “and he would set a pattern for other fundamentalists who found it necessary to make their way through the confirmation process by deception.” Dean, and others, have alleged that Rehnquist lied to the Senate both in his 1971 appointment to the Court as an associate judge (see January 7, 1972) and in his 1986 hearings for becoming chief justice. Dean will write that Rehnquist’s testimony during both sets of Senate confirmations hearings was “conspicuously false,” and in 1986 he committed “pure perjury.” In both sets of hearings, Rehnquist was embarrassed by a 1952 memo he had written while clerking for then-Justice Robert Jackson, in which Rehnquist had urged Jackson not to vote in support of the Brown v. Board of Education verdict that overturned the “separate but equal” clause that allowed for state-sponsored segregation. Although it is clear Rehnquist was stating his own pro-segregationist views, he apparently lied to the Senate over this memo as well, claiming that the memo was written to reflect Jackson’s own views and not his own. Dean will write, “It was an absurd contention, and a defamation of the dead justice for which he worked.” Law professor Laura Ray will observe in 1996: “With the [top] seat on the Supreme Court almost in his grasp, Rehnquist may well have retreated from an uncomfortable position taken almost twenty years earlier in the only way that seemed open to him. That such a step might tarnish the reputation of Justice Jackson years after his death does not seem to have been a concern.” (Dean 2007, pp. 129-137)

Campaigning on behalf of conservative Republican candidates in an attempt to have the GOP retain control of the Senate, Ronald Reagan goes on a campaign tour of the South, where he alludes to Republicans’ plans for exerting control of the nation’s court system. Typical of Reagan’s stump speech is the following one he delivers on behalf of embattled Republican incumbent James Broyhill: “Since I’ve been appointing federal judges to be approved by people like Jim Broyhill in the Republican Senate, the federal judiciary has become tougher, much tougher, on criminals. Criminals are going to jail more often and receiving longer sentences. Over and over the Democratic leadership has tried in the Senate to torpedo our choices for judges. And that’s where Jim Broyhill can make all the difference. Without him and the Republican majority in the Senate, we’ll find liberals like Joe Biden and a certain fellow from Massachusetts deciding who our judges are. And I’ll bet you’ll agree; I’d rather have a Judiciary Committee headed by Strom Thurmond than one run by Joe Biden or Ted Kennedy.” Broyhill will be defeated, and Democrats will regain control of the Senate in spite of Reagan’s efforts, in large part because of Southern blacks offended by such speeches. The new Democratic leadership, responding to the voters, will help block the racially questionable Robert Bork’s nomination to the Supreme Court (see July 1-October 23, 1987). (Dean 2007, pp. 140)

Robert Bork.Robert Bork. [Source: National Constitution Center]The controversial nomination of conservative judge Robert Bork to the Supreme Court is defeated in the US Senate. Bork is denied a seat on the Court in a 58-42 vote, because his views are thought to be extremist and even some Republicans vote against him.
'Right-Wing Zealot' - Bork, nominated by President Reagan as one of the sitting judges who most completely reflects Reagan’s judiciary philosophy (see 1985-1986), is characterized even by administration officials as a “right-wing zealot.” Reagan also wants a nominee to placate the hard right over their disaffection caused by the brewing Iran-Contra scandal. However, to make him more palatable for the majority of Americans, Reagan officials attempt to repackage Bork as a moderate conservative. Senate Judiciary Committee member Edward Kennedy (D-MA) attacks Bork’s political philosophy, saying before the committee hearings: “[In Bork’s America] women would be forced into back alley abortions, blacks would sit at segregated lunch counters, rogue police could break down citizens’ doors in midnight raids, schoolchildren could not be taught about evolution, writers and artists could be censored at the whim of government, and the doors of the federal courts would be shut on the fingers of millions of citizens for whom the judiciary is the—and is often the only—protector of the individual rights that are the heart of our democracy.… No justice would be better than this injustice.” Kennedy’s words provoke complaint, but the characterization of Bork is based on his lengthy record of court verdicts and his large body of judicial writings.
Racial Equality Issues - Although there is no evidence to suggest that Bork is himself a racist, former Nixon White House counsel John Dean will write that “his positions on civil rights were an anathema to all who cared about equality in America.” Constitutional law professor Herman Schwartz will write in 2004, “Bork condemned the Fourteenth Amendment’s Equal Protection Clause decisions outlawing the poll tax (to him it was just ‘a very small tax’), the decision establishing the one-person, one-vote principle, abolishing school segregation in the District of Columbia, barring courts from enforcing racially restrictive housing covenants, preventing a state from sterilizing certain criminals or interfering with the right to travel, and prohibiting discrimination against out-of-wedlock children…. Bork’s hostility to governmental action on behalf of minorities did not stop with his critique of court action. In 1963 he criticized a section of the proposed Civil Rights Act of 1964 that required white businesses to serve blacks as resting on a principle of ‘unsurpassed ugliness.’”
Ready to Fight - The Reagan administration understands that Bork’s nomination is opposed; on July 1, the day of his announced nomination, the media reports that Reagan will try to ensure Bork’s confirmation by waging an “active campaign.” Even Senate-savvy James Baker, Reagan’s chief of staff, is uncertain about Bork’s chances at being confirmed, and further worries that even if Bork wins the fight, the cost to Reagan’s political capital will be too high.
His Own Worst Enemy - Conservatives Justice Department official Terry Eastland will later say Senate Democrats sabotage Bork’s chances at faring well in the confirmation hearings, even positioning his table to ensure the least favorable angles for Bork on television. However, the public’s opinion of Bork is unfavorable, and Dean will write: “[I]t was not the position of his chair in the hearing room that made Bork look bad, but rather his arrogance, his hubris, and his occasional cold-bloodedness, not to mention his equivocations and occasional ‘confirmation conversions,’ where he did what no one else could do. He made himself a terrible witness who did not appear to be truthful.” The confirmation conversions even surprise some of his supporters, as Bork abandons his previous stances that the First Amendment only applies to political speech, and the Fourteenth Amendment’s equal protection clause does not apply to women. The Senate Judiciary Committee passes Bork’s nomination along to the full Senate, where Bork is defeated 58-42.
The Verb 'To Bork' - In 2007, Dean will write, “Bork’s defeat made him both a martyr and a verb,” and quotes conservative pundit William Safire as writing that “to bork” someone means to viciously attack a political figure, particularly by misrepresenting that figure in the media. (Dean 2007, pp. 137-143)

After Robert Bork’s nomination to the Supreme Court fails (see July 1-October 23, 1987), President Reagan nominates an equally hard-line conservative, appeals court judge Douglas Ginsberg. Ginsberg withdraws his nomination after the press learns that he had ignored a serious conflict-of-interest problem while at the Department of Justice, that he had smoked marijuana as both a student and a professor at Harvard Law School, and that, though Ginsberg professes to be stringently anti-abortion, his wife is a doctor who has herself performed abortions. Reagan will nominate a third and final selection for the Court, the somewhat more moderate Anthony Kennedy. (Sabato 1998; http://www.fjc.gov/servlet/tGetInfo?jid=864 9/26/2006; Dean 2007, pp. 143-144)

A federal appeals court rules 2-1 in favor of Theodore Olson, the former head of the Justice Department’s Office of Legal Counsel, who has refused to comply with a subpoena issued as part of an independent counsel’s investigation into political interference at the Environmental Protection Agency (EPA). Olson’s position is that the independent counsel is illegal under the Constitution, as interpreted by the so-called “unitary executive theory” (see April 30, 1986). One of the appellate court judges, Carter appointee Ruth Bader Ginsberg, argues that the independent counsel law is perfectly constitutional, and fits with the Founding Fathers’ vision of a system of “checks and balances” among the three governmental branches. But Reagan appointees Laurence Silberman and Stephen Williams outvote Ginsberg. Silberman, who writes the majority opinion, is a longtime advocate of increased executive power, and calls the independent counsel law “inconsistent with the doctrine of a unitary executive.” The Supreme Court will strike down Silberman’s ruling (see June 1988), but the independent counsel will not bring charges against Olson. (Savage 2007, pp. 46-49)

Strom Thurmond.Strom Thurmond. [Source: US Government]Former Lockheed software manager Margaret Newsham, who worked at the Menwith Hill facility of the NSA’s Echelon satellite surveillance operation in 1979, says she heard a real-time phone intercept of conversations involving senator Strom Thurmond (R-SC). She was shocked, she recalls, because she thought only foreign communications were being monitored. Newsham, who was fired from Lockheed after she filed a whistleblower lawsuit alleging fraud and waste, tells the chairman of the House Intelligence Committee, Louis Stokes (D-OH), of the overheard conversations. In July, Capital Hill staffers will leak the story to the Cleveland Plain Dealer. Thurmond says he doesn’t believe Newsham’s story, but his office admits that it has previously received reports that Thurmond had been a target of NSA surveillance. Thurmond will decline to press for an investigation, and the reason for the surveillance has never been revealed. (Kroft 2/27/2000; Poole 8/15/2000)

President Ronald Reagan signs a directive that details the US government’s plan for dealing with national emergencies, including a nuclear attack against the country. Executive Order 12656, “Assignment of Emergency Preparedness Responsibilities,” sets out the specific responsibilities of federal departments and agencies in national security emergencies. (US President 11/18/1988) It deals with the nation’s Continuity of Government (COG) plan, which would ensure the federal government continued to function should such an emergency occur. (Gellman and Schmidt 3/1/2002; Mann 3/2004) The order states, “The policy of the United States is to have sufficient capabilities at all levels of government to meet essential defense and civilian needs during any national security emergency.” It defines a “national security emergency” as “any occurrence, including natural disaster, military attack, technological emergency, or other emergency, that seriously degrades or seriously threatens the national security of the United States.” The order directs the head of every federal department and agency to “ensure the continuity of essential functions” during such an emergency by, among other things, “providing for succession to office and emergency delegation of authority.” According to Executive Order 12656, the National Security Council is “the principal forum for consideration of national security emergency preparedness policy,” and the director of the Federal Emergency Management Agency (FEMA) is to “assist in the implementation of national security emergency preparedness policy by coordinating with the other federal departments and agencies and with State and local governments.” (US President 11/18/1988) The COG plan this directive deals with will be activated for the first time on 9/11, in response to the terrorist attacks that day (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). (Gellman and Schmidt 3/1/2002; ABC News 4/25/2004) Author Peter Dale Scott will later comment that, by applying the COG plan to “any national security emergency,” Executive Order 12656 means that the attacks of 9/11 will meet the requirements for the plan to be put into action. (Scott 2007, pp. 185-186) In fact, a presidential directive in 1998 will update the COG plan specifically to deal with the threat posed by terrorists (see Early 1998 and October 21, 1998). (Clarke 2004, pp. 166-167 and 170; Arkin 6/4/2006)

Representative Dick Cheney (R-WY) publishes an essay for the neoconservative American Enterprise Institute (AEI), apparently written either by his Iran-Contra commission colleague Michael Malbin or by Cheney and Malbin together, but printed under Cheney’s name. The essay is titled “Congressional Overreaching in Foreign Policy,” and covers what he terms “congressional aggrandizement” of presidential powers.
Congress Has No Place in Determining, Implementing US Foreign Policy - Cheney’s essay bluntly states his belief that Congress has no business interfering in the president’s power to determine and implement the nation’s foreign policy; in general, the essay indicates Cheney’s disdain for the legislative branch of which he has been a member. He writes, in part: “Broadly speaking, the Congress was intended to be a collective, deliberative body. When working at its best, it would slow down decisions, improve their substantive content, subject them to compromise, and help build a consensus behind general rules before they were to be applied to the citizenry. The presidency, in contrast, was designed as a one-person office to ensure that it would be ready for action. Its major characteristics… were to be ‘decision, activity, secrecy, and dispatch.‘… [T]he legislative branch is ill equipped to handle many of the foreign policy tasks it has been taking upon itself lately.” He writes that while Congress may take upon itself powers to launch military actions or respond to an attack, it is by nature so slow and deliberative, and its members so focused on getting reelected, that it cannot adequately wield those powers: “[T]he real world effect often turns out… not to be a transfer of power from the president to Congress, but a denial of power to the government as a whole.” The only power Congress should have in involving itself in foreign policy, Cheney argues, is whether or not to fund presidential initiatives. “[T]he nation should not be paralyzed by Congress’s indecision,” he writes. (Kirk 6/20/2006; Savage 2007, pp. 59-61)
Cheney Selected as Secretary of Defense - Shortly after the essay is published, President George H.W. Bush names Cheney as his secretary of defense. Cheney was scheduled to give a talk based on the essay at AEI, but cancels it and goes to Washington to begin preparing for confirmation hearings in the Senate. Reporter Charlie Savage will note that the essay may have caused Cheney some difficulties in his confirmation hearings had it had a larger audience. (Savage 2007, pp. 61)
Former White House Counsel: Cheney's Proposals Unconstitutional, Unwise - In 2007, former Nixon White House counsel John Dean will write of the essay: “Cheney seems to be oblivious to the fact that the type of government he advocates is not, in fact, the government our Constitution provides.… His argument also assumes that a more agile, energetic, and fast-acting chief executive is the better system, but history does not support that contention. Presidential leadership has consistently shown itself less wise and less prudent than the slower but more deliberative nature of the system that we have. It was Congress that forced presidents out of no-win wars like Vietnam. The reason the nation’s Founders empowered Congress was because they wisely realized that a president—like heads of governments throughout history—was prone to fighting wars for his own glory, without seeming able to easily bring those wars to an end.” (Dean 2007, pp. 88-89)

The newly appointed general counsels of each executive branch receive a memo from William Barr, the new head of the Justice Department’s Office of Legal Counsel (OLC). The memo, entitled “Common Legislative Encroachments on Executive Branch Authority,” details the top 10 ways in which, in Barr’s view, Congress tries to interfere with executive branch powers. The list includes:
bullet “4. Micromanagement of the Executive Branch”;
bullet “5. Attempts to Gain Access to Sensitive Executive Branch Information”;
bullet “9. Attempts to Restrict the President’s Foreign Affairs Powers.”
The memo unequivocally endorses the “unitary executive theory” of the presidency (see April 30, 1986), despite that theory’s complete rejection by the Supreme Court (see June 1988). Barr also reiterates the belief that the Constitution requires the executive branch to “speak with one voice”—the president’s—and tells the general counsels to watch for any legislation that would protect executive branch officials from being fired at will by the president, one of the powers that Barr and other unitary executive proponents believe has been illegally taken by Congress. “Only by consistently and forcefully resisting such congressional incursions can executive branch prerogatives be preserved,” Barr writes. Reflecting on Barr’s arguments, law professor Neil Kinkopf, who will later serve in the OLC under President Clinton, will later write: “Never before had the Office of Legal Counsel… publicly articulated a policy of resisting Congress. The Barr memo did so with belligerence, staking out an expansive view of presidential power while asserting positions that contradicted recent Supreme Court precedent. Rather than fade away as ill-conceived and legally dubious, however, the memo’s ideas persisted and evolved within the Republican Party and conservative legal circles like the Federalist Society.” (Savage 2007, pp. 57-59)

Early diagram of V-22 Osprey.Early diagram of V-22 Osprey. [Source: US Navy]Defense Secretary Dick Cheney refuses to issue contracts for the trouble-plagued V-22 Osprey, a vertical takeoff and landing (VTOL) airplane designed to replace the Vietnam-era Sea Stallion helicopters. Cheney opposes the Osprey, but Congress has voted to appropriate funds for the program anyway. Cheney refuses to issue contracts, reviving the Nixon-era practice of “impounding” funds, refusing to spend money Congress has already appropriated. The practice of impoundment was made illegal by Congressional legislation in 1974; Cheney believes the anti-impoundment law to be illegal, and ignores it. Many look at Cheney’s opposition to the Osprey as an unusual example of fiscal restraint from Cheney, who is well known to favor most high-budget defense programs, but author and reporter Charlie Savage will cite the Osprey example as an instance of Cheney attempting to impose the executive branch’s will on the legislature. The Osprey will become operational in 2006. (Berler 7/2005; Savage 2007, pp. 62)

In an unusually fiery speech, President George H. W. Bush tells an audience at Princeton University that he does not hold with Congressional attempts to limit presidential power. “The most common challenge to presidential powers comes from a predictable source,” he says, “the United States Congress.” Bush accuses lawmakers of trying to “micromanage” executive branch decisions, particularly in foreign policy (see July 27, 1989). He denounces Congress for attempting to, in his view, accumulate power at the expense of the executive branch by making excessive and unwarranted demands for information, and by “writing too-specific directions for carrying out a particular law.” Six of the 20 vetoes he has cast were to defend the presidency against such meddling, he asserts. And he criticizes Congress for passing bills containing indefensible earmarks and spending provisions; to curb such excesses, he demands a line-item veto. But he tempers his remarks: “The great joy and challenge of the office I occupy,” he concludes, “is that the president serves, not just as the unitary executive (see April 30, 1986), but hopefully as a unifying executive.” (Savage 2007, pp. 59)

JAG branch insignia.JAG branch insignia. [Source: About (.com)]Defense Secretary Dick Cheney attempts to have the Judge Advocate General corps of military lawyers placed under the control of the general counsels of the various military branches; the general counsels are political appointees and more amenable to compliance with senior White House and Pentagon officials. Cheney’s decision is initially sparked by a conflict between the US Army’s top JAG, Major General John Fugh, and Army general counsel William “Jim” Haynes. Fugh has compiled a long, outstanding record of legal service in the Army. Haynes, 20 years Fugh’s junior and a civilian, is a former JAG officer (where he worked under Fugh) and a close friend of Cheney’s aide, David Addington. Haynes became something of a protege to Addington, and his career benefited as a result. When Haynes became the Army’s general counsel largely through Addington’s influence, Fugh quickly became irritated with his former subordinate’s attempts to involve himself in issues which Fugh felt should be out of Haynes’s jurisdiction. Haynes eventually goes to Addington for help in his bureaucratic conflicts with Fugh, and Addington takes the issue to Cheney. Cheney responds by asking Congress to place general counsels such as Haynes in direct supervisory positions over the JAG corps. Congress rejects Cheney’s request, but Addington circulates a memo declaring that the general counsels are heretofore to be considered the branch’s “single chief legal officer.” Cheney later rescinds the order under pressure from Congress. After the entire debacle, Haynes will accuse Fugh of disloyalty. Fugh will later recall: “I said, ‘Listen, Jim, my loyalty is owed to the Constitution of the United States and never to an individual and sure as hell never to a political party. You remember that.’ You see, to them, loyalty is to whoever is your political boss. That’s wrong.” (Savage 2007, pp. 283-286)

When Supreme Court Justice Thurgood Marshall, the first and only African-American to serve on the Court, announces his retirement, the Bush administration is ready with a far more conservative replacement. President Bush himself is already under fire for previously naming a moderate, David Souter, to the Court, and Bush is determined to give his conservative base someone they can back. Although Bush had wanted to nominate an appropriately conservative Hispanic, his eventual nomination is Clarence Thomas, who is completing his first year as a judge on the DC Court of Appeals. Thomas has two qualifications that Bush officials want: like Marshall, he is African-American; unlike Marshall, he is as conservative a jurist as Antonin Scalia (see September 26, 1986) or Robert Bork (see July 1-October 23, 1987). Two of former President Reagan’s closest legal advisers, C. Boyden Gray and Lee Liberman (a co-founder of the conservative Federalist Society), privately call Thomas “the black Bork.” Bush calls Thomas “the most qualified man in the country” for the position. (Dowd 7/2/1991; Dean 2007, pp. 146-153) During the July 2 press conference to announce Thomas’s nomination, Bush says: “I don’t feel he’s a quota. I expressed my respect for the ground that Mr. Justice Marshall plowed, but I don’t feel there should be a black seat on the Court or an ethnic seat on the Court.” For his part, Thomas extols his upbringing as a desperately poor child in Georgia, crediting his grandmother and the nuns who taught him in Catholic schools as particular influences on his life and values. Republican senator Orrin Hatch says that opposing Thomas will be difficult: “Anybody who takes him on in the area of civil rights is taking on the grandson of a sharecropper.” (Dowd 7/2/1991) However, the non-partisan American Bar Association’s recommendation panel splits on whether Thomas is qualified or not, the first time since 1969 the ABA has failed to unanimously recommend a nominee. Twelve panelists find Thomas “qualified,” two find him “not qualified,” and none find him “well qualified.” One senior Congressional aide calls the assessment of Thomas “the equivalent of middling.” (Lewis 8/28/1991; Dean 2007, pp. 146-153) In 2007, former Nixon White House counsel John Dean will write, “For the president to send a nominee to the Supreme Court with anything less than a uniformly well-qualified rating is irresponsible, but such decisions have become part of the politicization of the judiciary.” Thomas, himself a beneficiary of the nation’s affirmative action programs, opposes them, once calling them “social engineering;” he has no interest in civil rights legislation, instead insisting that the Constitution should be “color-blind” and the courts should stay out of such matters. Civil rights, women’s rights, and environmental groups are, in Dean’s words, “terrified” of Thomas’s nomination. To overcome these obstacles, the Bush administration decides on a strategy Dean calls “crude but effective… us[ing] Thomas’s color as a wedge with the civil rights community, because he would pick up some blacks’ support notwithstanding his dismal record in protecting their civil rights. (Dowd 7/2/1991; Dean 2007, pp. 146-153) The nomination of an African-American quells some of the planned resistance to a conservative nominee promised by a number of civil rights organizations. (Dowd 7/2/1991) Three months later, Thomas will be named to the court after a bitterly contentious brace of confirmation hearings (see October 13, 1991).

Clarence Thomas.Clarence Thomas. [Source: AP / World Wide Photos]The Senate Judiciary Committee hearings for Supreme Court nominee Clarence Thomas begin (see July 2-August 28, 1991). Thomas is exhaustively coached by a team headed by former senator John Danforth (R-MO), whom Thomas had worked for when Danforth was attorney general of Missouri. As per his coaching, Thomas says as little as possible in response to senators’ questions, staying with generalities and being as congenial, diffident, and bland as the questions will allow. Still, some of his statements defy belief.
Abortion Rights - Thomas is well-known as an ardent opponent of abortion rights, but he claims in testimony that he has no position on the fundamental abortion case of Roe v. Wade (see January 22, 1973), even though he has disparaged the case in his own legal writings. He even claims not to have discussed the case with anyone. His sympathetic biographer Andrew Peyton Thomas (no relation) later admits that “these representations about Roe proved a laughingstock.” Even conservative stalwart Paul Weyrich, who is running a “war room” to counter any negative statements about Thomas in the press or in the hearings, says publicly that Thomas has spoken of the case in discussions between the two, and calls Thomas’s dissembling “disingenuous” and “nauseating.” Weyrich considers, and rejects, withdrawing his support for Thomas.
Comparison with Rehnquist Hearings - Author and former Nixon White House counsel John Dean will write, “[I]t was clear that Thomas was going the route that [Supreme Court Justice William] Rehnquist had traveled” (see September 26, 1986): “Say anything that was necessary to win confirmation, regardless of the conspicuousness of the lie. Regrettably, it would get worse.” The Senate Judiciary Committee splits on sending Thomas’s name to the full Senate, 7-7, therefore making no recommendation either way. But head counts show that Thomas has a narrow but solid majority of senators ready to vote him onto the bench. (Dean 2007, pp. 146-153)

Clarence Thomas survives the Senate hearings to join the Supreme Court.Clarence Thomas survives the Senate hearings to join the Supreme Court. [Source: PBS]The full Senate votes to confirm Clarence Thomas (see July 2-August 28, 1991, October 8, 1991, and October 11-12, 1991) on a 52-48 vote, the lowest margin of victory by any Supreme Court nominee in US history. It is possible that some senators’ votes are influenced by a wash of “fast-action” polls reported by the White House, purporting to show that African-Americans overwhelmingly support Thomas, and a majority of citizens support Thomas’s confirmation. A year later, analysis proves those polls to be completely wrong. (Thomas Hearings Website 8/1997; Dean 2007, pp. 146-153) In 1992, Senator Joseph Biden (D-DE), a member of the Senate Judiciary Committee, will say: “That last hearing was not about Clarence Thomas. It was not about Anita Hill. It was about a massive power struggle going on in this country, a power struggle between women and men, and a power struggle between minoritites and the majority.” (Thomas Hearings Website 8/1997)

During the 1980s, Dick Cheney and Donald Rumsfeld were regular participants in top-secret exercises, designed to test a program called Continuity of Government (COG) that would keep the federal government functioning during and after a nuclear war with the Soviet Union (see 1981-1992). Despite the fall of the Berlin Wall and the collapse of the Soviet Union, the COG exercises continue into the 1990s, being budgeted still at over $200 million per year.
Exercises Prepare for Terrorist Attacks - Now, terrorists replace the Soviet Union as the imagined threat in the exercises. The terrorism envisaged is almost always state-sponsored, with the imagined terrorists acting on behalf of a government. According to journalist James Mann, the COG exercises are abandoned fairly early in the Clinton era, as the scenario is considered farfetched and outdated. However another journalist, Andrew Cockburn, suggests they continue for longer.
Exercise Participants Are Republican Hawks - Cockburn adds that, while the “shadow government” created in the exercises had previously been drawn from across the political spectrum, now the players are almost exclusively Republican hawks. A former Pentagon official with direct knowledge of the program will later say: “It was one way for these people to stay in touch. They’d meet, do the exercise, but also sit around and castigate the Clinton administration in the most extreme way. You could say this was a secret government-in-waiting. The Clinton administration was extraordinarily inattentive, [they had] no idea what was going on.” (Mann 3/2004; Cockburn 2007, pp. 88)
Richard Clarke Participates - A regular participant in these COG exercises is Richard Clarke, who on 9/11 will be the White House chief of counterterrorism (see (1984-2004)). (Kurtz 4/7/2004; ABC News 4/25/2004) Although he will later come to prominence for his criticisms of the administration of President George W. Bush, some who have known him will say they consider Clarke to be hawkish and conservative (see May 22, 1998). (Abel 3/29/2004; Kaplan 4/5/2004) The Continuity of Government plan will be activated, supposedly for the first time, in the hours during and after the 9/11 attacks (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). (Gellman and Schmidt 3/1/2002)

Deputy Defense Secretary Donald J. Atwood issues an administrative order placing all military attorneys under the control of White House civilian officials. The controversy started during the Gulf War, when the civilian general counsel of the Army, William J. Haynes, clashed with the Army’s top military lawyer over whose office should control legal issues arising from the war (see June 1991-March 1992). Haynes is a protege of David Addington, the personal aide to Defense Secretary Dick Cheney, believes in concentrating power in the executive branch, and pressed for the change. Cheney attempted to have Congress implement the change, but the legislative branch refused; instead, Cheney has Atwood issue the order putting all military attorneys under White House control. (Savage 2007, pp. 62)

David Addington, a personal aide to Defense Secretary Dick Cheney, is forced to take part in Senate confirmation hearings for his appointment as chief counsel for the Defense Department. Addington, a Cheney protege and a fierce advocate for the ever-widening power of the executive branch, has gained a reputation for effective, if arrogant, conflicts with the Pentagon’s uniformed leadership and for tightly controlling what information enters and leaves Cheney’s office. Colonel Lawrence Wilkerson, an aide to Joint Chiefs chairman General Colin Powell, will later characterize Addington as an intense bureaucratic infighter bent on concentrating power in Cheney’s office. “Addington was a nut,” Wilkerson will recall. “That was how everybody summed it up. A brilliant nut perhaps, but a nut nevertheless.” The Senate hearing becomes a platform for Democratic senators to attack Cheney’s anti-Congressional policies (see Early 1991 and March 1992). In his turn, Addington calmly denies that he or Cheney have ever exhibited any intention to defy Congress on any issue. “How many ways are there around evading the will of Congress?” storms Senator Carl Levin (D-MI). “How many different legal theories do you have?” Addington answers, “I do not have any, Senator.” Addington is only confirmed after promising that the Pentagon will restore the independence of military lawyers (see March 1992) and begin funding the V-22 Osprey (see Early 1991). (Savage 2007, pp. 63)

The Clinton administration reorganizes the Federal Emergency Management Agency (FEMA), shifting resources away from secret projects and into disaster relief programs. During the previous two administrations, FEMA’s resources were overwhelmingly geared towards the highly classified Continuity of Government program, meant to keep the government functioning in times of extreme national emergency (see April 1, 1979-Present). The changes to the disaster agency are prompted by strong criticism of FEMA’s response to Hurricane Andrew (see August-September 1992). The secret COG programs are scaled back, but not totally discontinued. The newly appointed director of FEMA, James Lee Witt, eliminates FEMA’s secretive National Preparedness Directorate and shifts its responsibilities to other sections of the disaster agency. FEMA’s budget shows a dramatic drop in funding for secret projects, from about $100 million in 1993 to only $7.5 million in 1994. “What [Director Witt has] done is put FEMA in an all-hazards approach and put it aboveboard,” says FEMA spokesperson Morrie Goodman. “There are, of course,” Goodman adds, “certain areas that can’t be discussed or even acknowledged. That’s just the nature of the beast.” Indeed, uncertainties remain regarding the true extent of FEMA’s reformation. As Mother Jones magazine notes, the reduced classified budget “reflects only a fragment of FEMA’s investment in doomsday preparations, given that many former projects have been redesignated as ‘dual-use’ responses for both natural disasters and national security emergencies.” According to Mother Jones, “much of the doomsday bureaucracy remains intact, parts of the fifth floor are still restricted, and there has been no concerted effort to declassify the underground command posts.” Government officials will claim in 1994 that the COG program is coming to a total end (see April 18, 1994), but FEMA will continue to pursue its secret agenda for years to come (see April 1, 1979-Present). (National Academy of Public Administration 2/1993 pdf file; Gup and Aftergood 1/1994; Weiner 4/18/1994; Sylves 5/1994)

The Federal Emergency Management Agency (FEMA), known best as a relief agency for victims of natural disasters, is preoccupied with preparations for a nuclear doomsday, according to Cox News Service. FEMA employees planning for natural disasters are outnumbered more than three-to-one by those working for the agency’s National Preparedness Directorate, which is responsible for overseeing preparations for nuclear war. Since its creation, FEMA has been secretly dedicated to the highly classified Continuity of Government (COG) program, meant to keep the government functioning in times of national emergency (see April 1, 1979-Present and 1982-1991). Cox News Service finds: “Only 20 members of Congress—those with adequate security clearance—know that rather than concentrating on natural disasters such as last year’s Hurricane Andrew, the Federal Emergency Management Agency has been gearing up for Armageddon. While a small group [of FEMA employees] is responsible for helping victims of natural disasters, most of the agency is preoccupied with developing high-tech gadgets for a nuclear doomsday.” (Cox News Service 2/22/1993)

Attorney General Janet Reno announces that all 93 US Attorneys must resign promptly, allowing the Clinton administration to appoint its own prosecutors for the positions. All 93 US Attorneys are Republicans appointed during the Reagan and Bush administrations, and US Attorneys are routinely replaced after a change in administrations, particularly when the incoming president is of a different party than the outgoing president. Jay B. Stephens, the US Attorney for the District of Columbia, suggests that the Clinton administration wants to derail his ongoing investigation of Representative Dan Rostenkowski (D-IL), a key Clinton ally thought to be involved in political corruption. While stopping short of directly accusing Reno or President Clinton of desiring to interfere in the case, he says, “This case has been conducted with integrity, and I trust the decisions in this case will not be made based on political considerations.” If Stephens or his successor indicts Rostenkowski, the congressman would have to relinquish his chairmanship of the House Ways and Means Committee, costing Clinton a key political ally in that powerful body. Reno denies any connection between the Rostenkowski investigation and the firings. Stephens is being treated like the rest of the US Attorneys, she says, and she would consider allowing some to stay on if they were critically involved in ongoing investigations. All 93 US Attorneys knew they would be asked to leave office if Clinton won the election, and 16 have already resigned. Reno says she wants the resignations “so that the US Attorneys presently in position will know where they stand and that we can begin to build a team.” Some Clinton administration officials call Stephens’s veiled allegations “absurd,” and say that it is surprising it has taken this long to ask for the US Attorney resignations. (Johnston 3/24/1993; Garland 3/24/1993) The Rostenkowski investigation will be pursued by Stephens’s successor, Eric Holder, and Rostenkowski will be found guilty of mail fraud and sentenced to jail. (Lacy 4/10/1996)

Walter Dellinger, the head of the Justice Department’s Office of Legal Counsel, writes of the necessity for presidential signing statements: “If the president may properly decline to enforce a law, at least when it unconstitutionally encroaches on his powers, then it arguably follows that he may properly announce to Congress and to the public that he will not enforce a provision of an enactment he is signing. If so, then a signing statement that challenges what the president determines to be an unconstitutional encroachment on his power, or that announces the president’s unwillingness to enforce… such a provision, can be a valid and reasonable exercise of presidential authority.” President Clinton will issue signing statements challenging or commenting on 140 legislative provisions during his eight years in office (see February 1996). (Savage 2007, pp. 235)

Government officials say the highly classified “doomsday” project, also known as the Continuity of Government (COG) program, is being shut down. The secretive program was first designed during the cold war to keep the government functioning in the event of a nuclear conflict with the Soviet Union. “The nuclear tensions of that era having subsided, the project has less than six months to live,” the New York Times reports, citing Pentagon officials. (Weiner 4/18/1994) Despite the claims, the classified plans will not be discontinued. The Clinton administration will actually update the protocols and place a new emphasis on weapons of mass destruction and counterterrorism (see June 21, 1995, October 21, 1998 and Early 1998). The COG program will be officially activated for the first time during the 9/11 attacks and later extended indefinitely (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). (Gellman and Schmidt 3/1/2002)

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” (US President 2/9/1995) As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. (50 U.S.C. 1802(a); Think Progress 12/20/2005) Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. (US President 2/9/1995; Think Progress 12/20/2005)

Congress passes a military budget that includes a section requiring the Pentagon to discharge all HIV-positive soldiers, regardless of their overall health. When President Clinton signs the bill, he issues a signing statement declaring he has “concluded that this discriminatory provision is unconstitutional.” He urges Congress to repeal the statute, and says he will refuse to allow the Justice Department to defend the law in court if an HIV-positive soldier sues the government. However, Clinton’s legal team, including the Justice Department’s head of the Office of Legal Counsel, Walter Dellinger, and White House counsel Jack Quinn, tells reporters that while Clinton believes the provision is unconstitutional, he cannot refuse to enforce it because no court ruling has supported his view. Until a court intervenes, the president is bound by Congress’s decision. “When the president’s obligation to execute laws enacted by Congress is in tension with his responsibility to act in accordance to the Constitution, questions arise that really go to the very heart of the system, and the president can decline to comply with the law, in our view, only where there is a judgment that the Supreme Court has resolved the issue.” (Savage 2007, pp. 235-236)

Law professor John Yoo writes a lengthy essay for the California Law Review entitled “The Continuation of Politics by Other Means: The Original Understanding of War Powers,” in which he argues that the Founding Fathers intended to empower presidents to launch wars without Congressional permission. Yoo has clerked for conservative judge Laurence Silberman and equally conservative Supreme Court Justice Clarence Thomas, and served for a year as counsel to then-Senate Judiciary Committee Chairman Orrin Hatch (R-UT). He has become a regular speaker at Federalist Society events, the informal but influential group of conservative lawyers, judges, and legal scholars who will come to have so much influence in the Bush administration. You argues that for generations, Constitutional scholars have misread the Constitution: the Founders actually supported, not repudiated, the British model of executive power that gave the king the sole power of declaring war and committing forces to battle. The Constitution’s granting of the legislature—Congress—the power to “declare war” is merely, Yoo writes, a reference to the ceremonial role of deciding whether to proclaim the existence of a conflict as a diplomatic detail. The Founders always intended the executive branch to actually declare and commence war, he writes. Most other Constitutional scholars will dismiss Yoo’s arguments, citing notes from the Constitutional Convention that show the Founders clearly intended Congress, not the president, to decide whether to commit the country to war. One of those Founders, James Madison, wrote in 1795 that giving a president the unilateral ability to declare war “would have struck, not only at the fabric of the Constitution, but at the foundation of all well organized and well checked governments. The separation of the power of declaring war from that of conducting it, is wisely contrived to exclude the danger of its being declared for the sake of its being conducted.” (Savage 2007, pp. 80-81) Yoo will go on to join the Bush administration’s Office of Legal Counsel, and write numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002).

Former Defense Secretary Dick Cheney, speaking at an awards ceremony for the Gerald R. Ford Foundation, tells listeners that he intends to do whatever he can to “restore” the power of the presidency. If he ever returns to Washington, he says he will roll back what he calls “unwise” limits on the presidency imposed after the Vietnam War and Watergate. “I clearly do believe, and have spoken directly about the importance of a strong president,” he says. “I think there have been times in the past, oftentimes in response to events such as Watergate or the war in Vietnam, where Congress has begun to encroach upon the powers and responsibilities of the president: that it was important to try to go back and restore that balance.” (Savage 2007, pp. 9)

A lieutenant general meets with Qwest CEO Joe Nacchio and Dean Wandry, who heads Qwest’s government business unit. According to documents filed in 2006 by Nacchio concerning his trial on insider trading charges (see October 12, 2007), the general “told Mr. Wandry that he ran the largest telecom operation in the world, he had looked at Qwest’s network, and he wanted to use it for government purposes.” The general in question could be NSA Director Kenneth Minihan, who will be replaced in 1999 by another lieutenant general, Michael Hayden, but neither Minihan nor Hayden will comment on the allegation. Many former intelligence officials will say that it is likely Minihan who met with Nacchio and Wandry. Nacchio’s court documents indicate that he and Wandry agree to work with the general. Nacchio is not allowed to announce the contract publicly, but according to the court documents, he “understood at the time this was the beginning of a relationship which had enormous potential for future work. This proves increasingly true as time went on.” By 1999 Qwest is working extensively with the NSA. Minihan is particularly concerned about the potential of “cyberwarfare” by foreign governments, terrorist organizations, drug cartels, and organized crime, a prospect which he felt the NSA is unprepared. He particularly worries about Russia and China; in June 1998, he will testify are training personnel in potential cyber-attacks. “These opportunists, enabled by the explosion of technology and the availability of inexpensive, secure means of communication, pose a significant threat to the interests of the United States and its allies,” Minihan will state. In 2007, a former senior NSA official will say that the agency felt those groups knew US privacy laws all too well and were capable of using those laws against the NSA and other intelligence agencies. He will say, “There was such a nuanced understanding of how to tie us in knots and use American law against us, that there were certainly pockets of people saying, ‘We’ve got to be assertive; we’ve got to be more aggressive on this.’” Hayden, Minihan’s successor, will be particularly willing to push agency operations to the edge of legality. After 9/11, Hayden will say, “We’re pretty aggressive within the law. As a professional, I’m troubled if I’m not using the full authority allowed by law.” (Harris 11/2/2007) The NSA will approach Qwest will a similar offer in the months before 9/11 (see February 2001).

Richard Clarke, the chair of the White House’s Counterterrorism Security Group, updates the US Continuity of Government (COG) program. National Security Adviser Sandy Berger has become aware that terrorism and domestic preparedness are now major issues. He suggests the idea of a “national coordinator” for counterterrorism, and that this post should be codified by a new Presidential Decision Directive (PDD). Clarke therefore drafts three new directives. The third, tentatively titled “PDD-Z,” updates the COG program. (Clarke 2004, pp. 166-167) This program, which dates back to the cold war, was originally designed to ensure the US government would continue to function in the event of a nuclear war with the Soviet Union. (Mann 3/2004) Clarke will later say it “had been allowed to fall apart when the threat of a Soviet nuclear attack had gone away.” (Clarke 2004, pp. 167) He will explain: “We thought that individual buildings in Washington, and indeed perhaps all of Washington, could still come under attack, only it might not be from the former Soviet Union.… It might be with a terrorist walking a weapon into our city.” (CBS 9/11/2001) Therefore, “If terrorists could attack Washington, particularly with weapons of mass destruction, we needed to have a robust system of command and control, with plans to devolve authority and capabilities to officials outside Washington.” (Clarke 2004, pp. 167) President Clinton will sign “PDD-Z” on October 21, 1998, as PDD-67, “Enduring Constitutional Government and Continuity of Government Operations” (see October 21, 1998). The two other directives drafted by Clarke will become PDD-62 (see May 22, 1998) and PDD-63. (Clarke 2004, pp. 170; Arkin 6/4/2006) By February 1999, according to the New York Times, Clarke will have written at least four classified presidential directives on terrorism, which “expand the government’s counterterrorism cadres into the $11 billion-a-year enterprise he now coordinates.” (Weiner 2/1/1999) Clarke is a regular participant in secret COG exercises (see (1984-2004)), and will activate the COG plan for the first time on the day of 9/11 (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001).

President Clinton creates the new post of National Coordinator for Security, Infrastructure, Protection, and Counterterrorism. He names Richard Clarke for the job, and due to the length of the title, Clarke soon becomes known as the counterterrorism “tsar.” (Bennet 5/23/1998; Dobbs 4/2/2000) This position is outlined in a new presidential directive on counterterrorism, Presidential Decision Directive 62 (PDD-62), which also outlines goals of fighting terrorism and attempts to strengthen interagency coordination of counterterrorism efforts. (9/11 Commission 3/24/2004) Clarke, who had been working on terrorism issues since the start of the Clinton administration, has more symbolic than actual power in the new position. For instance, he only has a staff of 12, compared to a staff of hundreds for the drug “tsar,” and by law he is not allowed to order law enforcement agents, soldiers, or spies to do anything. He does not have any control over budgets. But he is allowed to sit on Cabinet level meetings that involve terrorism. (Clarke 2004, pp. 170; 9/11 Commission 7/24/2004, pp. 101) Clarke has a long record of prior government service, beginning in 1973 as a nuclear weapons analyst in the Office of the Secretary of Defense. (CBS News 3/30/2004) He came to prominence in the Reagan administration as the deputy assistant secretary of state for intelligence from 1985 to 1989. Having left the State Department in 1992, he has spent the past six years on the National Security Council staff. (Gellman 3/13/2003; BBC 3/22/2004; Associated Press 3/27/2004) After 9/11 Clarke will become well known for his criticisms of the George W. Bush administration (see March 21, 2004 and March 24, 2004), but some who know him consider him to be politically conservative. (Abel 3/29/2004) According to the Washington Post, many within the Clinton administration view Clarke as a hawk. (Eggen and Pincus 3/23/2004) Robert Gelbard, who worked with him at the State Department in the early 1990s, says he is “no liberal. He is very hawkish.” (Kaplan 4/5/2004) Vince Cannistraro, a former CIA official who worked with Clarke in the 1980s, says, “You can’t accuse him of being passive or too liberal on foreign policy.” (Eggen and Pincus 3/23/2004) At the time of the 2000 election he will be a registered Republican, and he votes that year for John McCain in the Republican presidential primary. (Purdum 3/23/2004; Conason 3/24/2004; Ripley 4/5/2004) Larry DiCara, the former president of the Boston City Council who knew Clarke when he was younger, later recalls: “He was fiercely conservative at a time when just about everyone in Boston was a Democrat.… I’m amazed he worked for [President] Clinton.” Clarke, however, will later praise Clinton, and in an interview in 2002 will describe himself as “not a partisan figure.” (Abel 3/29/2004)

Former President Bush secretly invites two people to his Kennebunkport, Maine, compound: his son George W. Bush, and Condoleezza Rice, a longtime protege of his close friend and colleague Brent Scowcroft. Rice had been the elder Bush’s assistant on Soviet affairs from 1989 to 1991, and later became provost of Stanford University. Rice and the younger Bush spend many hours discussing foreign affairs, with Rice attempting to tutor him about the fundamentals of US relations with a host of other countries and regions. “We talked a lot about America’s role in the world,” Rice will recall. Bush “was doing due diligence on whether or not to run for president.” Rice will become “foreign policy coordinator” to the nascent Bush campaign. (Dubose and Bernstein 2006, pp. 117; Unger 2007, pp. 160)

Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right).Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right). [Source: Associated Press]Two US embassies in Africa are bombed within minutes of each other. At 10:35 a.m., local time, a suicide car bomb attack in Nairobi, Kenya, kills 213 people, including 12 US nationals, and injures more than 4,500. Mohamed al-Owhali and someone known only as Azzam are the suicide bombers, but al-Owhali runs away at the last minute and survives. Four minutes later, a suicide car bomb attack in Dar es Salaam, Tanzania, kills 11 and injures 85. Hamden Khalif Allah Awad is the suicide bomber there. The attacks will be blamed on al-Qaeda. (PBS Frontline 2001; United States of America v. Usama Bin Laden, et al., Day 38 5/2/2001) The Tanzania death toll is low because, remarkably, the attack takes place on a national holiday so the US embassy there is closed. (Miller, Stone, and Mitchell 2002, pp. 195) The attack shows al-Qaeda has a capability for simultaneous attacks. The Tanzania bombing appears to have been a late addition, as one of the arrested bombers will allegedly tell US agents that it was added to the plot only about 10 days in advance. (United State of America v. Usama bin Laden, et al., Day 14 3/7/2001) A third attack against the US embassy in Uganda does not take place due to a last-minute delay (see August 7, 1998). (Associated Press 9/25/1998) August 7, 1998, is the eighth anniversary of the arrival of US troops in Saudi Arabia and some people will speculate that this is the reason for the date of the bombings. (Gunaratna 2003, pp. 46) In the 2002 book The Cell, reporters John Miller, Michael Stone, and Chris Mitchell will write: “What has become clear with time is that facets of the East Africa plot had been known beforehand to the FBI, the CIA, the State Department, and to Israeli and Kenyan intelligence services.… [N]o one can seriously argue that the horrors of August 7, 1998, couldn’t have been prevented.” They will also comment, “Inexplicable as the intelligence failure was, more baffling still was that al-Qaeda correctly presumed that a major attack could be carried out by a cell that US agents had already uncovered.” (Miller, Stone, and Mitchell 2002, pp. 195, 206) After 9/11, it will come to light that three of the alleged hijackers, Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi, had some involvement in the bombings (see October 4, 2001, Late 1999, and 1993-1999) and that the US intelligence community was aware of this involvement by late 1999 (see December 15-31, 1999), if not before.

President Clinton issues Presidential Decision Directive 67 (PDD-67), which updates the US Continuity of Government (COG) program in line with the emerging threat posed by terrorists. (Clarke 2004, pp. 166-167 and 170; Arkin 6/4/2006) PDD-67, “Enduring Constitutional Government and Continuity of Government Operations,” requires agencies to plan for governmental continuity if the US is hit by a major terrorist attack. (Landers 11/17/1999; Federation of American Scientists 12/12/2000) The directive is classified and there is no White House fact sheet summarizing its contents. (Federation of American Scientists 12/12/2000; US Congress. House. Committee on Government Reform 4/22/2004) But according to Energy Department documents, the new COG plan “could be triggered by an event worse than what’s expected from the Y2K problem and comparable to the 1995 Oklahoma City bombing.” (Landers 11/17/1999) According to the Washington Post, the result of PDD-67 will be that “every single government department and agency [is] directed to see to it that they could resume critical functions within 12 hours of a warning, and keep their operations running at emergency facilities for up to 30 days.” (Arkin 6/4/2006) The directive puts the Federal Emergency Management Agency (FEMA)—which is responsible for planning for and responding to disasters—in charge of the COG program. (US Congress. House. Committee on Government Reform 4/28/2005, pp. 4 pdf file) Within FEMA, the Office of National Security Affairs will specifically be responsible for COG activities. (Larson and Peters 2001, pp. 103) FEMA’s responsibilities will include providing guidance for agencies to develop their continuity plans (see July 26, 1999), and the coordination of interagency exercises. (US Congress. House. Committee on Government Reform 4/28/2005, pp. 4 pdf file) Richard Clarke, who has now been appointed counterterrorism “tsar” (see May 22, 1998), drafted PDD-67 earlier in the year (see Early 1998). (Clarke 2004, pp. 166-167) The COG plan will be activated for the first time on the morning of 9/11 (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). (ABC News 4/25/2004)

Princess Diana at a mine field in Angola in 1997.Princess Diana at a mine field in Angola in 1997. [Source: Tim Graham / Corbis]The NSA admits that US intelligence agencies possess 1,056 pages of classified information regarding Britain’s Princess Diana. British tabloids portray the documents as rife with salacious information on Diana’s “most intimate love secrets” about her relationship with Egyptian billionaire Dodi al-Fayed, but the actual documentation may not be so lurid. The NSA recently denied a Freedom of Information request from the Internet news service APB Online about information it has collected on Diana, who died in a tragic car accident in 1997. (It is unclear whether US intelligence has any unreleased information about the circumstances of Diana’s death. (Sheheri and Sauter 11/30/1998; Loeb 12/12/1998) The NSA has denied monitoring Diana on the night of her death, an allegation raised by The Observer in 2006.) (MSNBC 12/11/2006) In the two-page letter denying the request, the NSA admits to possessing a “Diana file,” but refuses to divulge what is in that file. A US intelligence official says the information is made up of conversations between other people who mentioned Diana; the references to Diana in those intercepted conversations are “incidental.” The official says Diana was never a particular target of the NSA’s Echelon surveillance program. However, the NSA has classified 124 pages of the “Diana documents” as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security.” According to a recent report by the European Parliament, the NSA routinely monitors virtually “all e-mail, telephone and fax communications… within Europe” (see July 11, 2001). Intelligence expert Steven Aftergood of the Federation of American Scientists says “the US and our allies promiscuously collect electronic communications around the world. Whether the descriptions of Echelon are accurate or not, that much is definitely true.” Some believe that lurid snippets of information leaked to the British press regarding Diana’s affair with Fayed, and her ambivalent relationship with Prince Charles, may have come from Echelon wiretaps and surveillance. Another FAS scientist, John Pike, says the NSA and other US intelligence agencies may have been monitoring Diana to protect her from terrorist attacks. Pike says it is also possible she may have been monitored because of her involvement in banning land mines, a position opposed by the Pentagon. (Sheheri and Sauter 11/30/1998; Loeb 12/12/1998) Former NSA official Wayne Madsen will say in 2000, “[W]hen NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?” (Kroft 2/27/2000) In August 1999, the NSA will deny another Freedom of Information request about its “Diana file” from the British newspaper The Guardian. (Hencke and Evans 8/6/1999)

The Federal Emergency Management Agency (FEMA) issues a circular that provides guidance for government agencies to develop plans for continuity of government operations in the event of an emergency, including a terrorist attack. The circular, FPC 65, goes out to the heads of federal departments and agencies, senior policy officials, and emergency planners. It confirms FEMA’s coordinating role in the nation’s Continuity of Government (COG) program, and contains criteria for agencies to develop their continuity plans. It states that an agency’s continuity of operations (COOP) capability “Must be maintained at a high level of readiness”; “Must be capable of implementation both with and without warning”; “Must be operational no later than 12 hours after activation”; “Must maintain sustained operations for up to 30 days”; and “Should take maximum advantage of existing agency field infrastructures.” (Federal Emergency Management Agency 7/26/1999; US Congress. House. Committee on Government Reform 4/22/2004) Presidential Decision Directive 67 (PDD-67), issued in October 1998 (see October 21, 1998), required agencies to prepare plans to allow the government to continue functioning in the event of a major terrorist attack on the US, and had placed FEMA in charge of the COG program. (Landers 11/17/1999; Arkin 6/4/2006) The COG plan detailed in that directive will be activated for the first time on the morning of 9/11 (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). (ABC News 4/25/2004)

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). (Gorham 1/29/2006)

Jamal Zougam.Jamal Zougam. [Source: El Mundo]By 2000, a Moroccan living in Spain named Jamal Zougam begins to attract the attention of Spanish intelligence. Barakat Yarkas frequently travels to London to meet with al-Qaeda-linked imam Abu Qatada, and Zougam accompanies Yarkas on at least one of these trips (see 1995-February 2001). Spanish intelligence is monitoring Yarkas and his cell, and they are aware that Zougam is introduced to Qatada as “a gifted young recruit.” (Agence France-Presse 3/17/2004; Irujo 2005, pp. 77-79) In June 2001, a French investigator warns that Zougam is an important militant with international links and advise the Spanish to arrest him (see June 2001). Around the same time, Spanish investigators learn that Zougam met with Mohammed Fazazi, a Moroccan imam who preached at the Al-Quds mosque in Hamburg, Germany, that is attended by some of the 9/11 hijackers (see 1993-Late 2001). On August 14, 2001, Zougam is recorded telling Yarkas that he had offered Fazazi money for the jihad cause. Fazazi is also linked to Abu Qatada and had met him in London. After the May 2003 Casablanca bombings (see May 16, 2003), interest in Zougam increases as the Moroccan, Spanish, and French governments all suspect he was involved in those bombings. But he is still not arrested, and his surveillance in Spain is not increased, apparently due to lack of resources. (Golden and van Natta 3/17/2004; Townsend et al. 3/21/2004) In the days before the March 2004 Madrid train bombings (see 7:37-7:42 a.m., March 11, 2004), Zougam makes about a dozen phone calls to contacts in London. He is said to talk to four al-Qaeda suspects, as well as a “radical London-based preacher” - a possible reference to Abu Qatada. Zougam will later be sentenced to life in prison for playing a direct role in the Madrid bombings. (Williams 11/1/2007) After the Madrid bombings, British authorities will say that there was a “definite link” to Britain in the bomb plot. Zougam is believed to have made trips to London in search of funding, planning, and logistical help, and supplying equipment and false identification papers for the bombers. (Bennetto 3/19/2004) One figure believed central to the bomb plot, Moutaz Almallah, will be arrested in London in 2005 and extradited to Spain in 2007 (see May 16, 2005).

While the 9/11 hijackers are in the US, the NSA intercepts several calls between them and an al-Qaeda communications hub in Sana’a, Yemen, run by Ahmed al-Hada, who is hijacker Khalid Almihdhar’s father-in-law (see August 4-25, 1998).
Summary of Calls -
bullet The first calls are made by Almihdhar and are intercepted during the spring and summer of 2000 (see Spring-Summer 2000).
bullet More calls are made by hijacker Nawaf Alhazmi after the bombing of the USS Cole in October 2000 (see Mid-October 2000-Summer 2001).
bullet The final call from the US is intercepted just a few weeks before 9/11 (see (August 2001)).
The NSA intercepted the hijackers’ calls outside the US before this (see Early 1999 and December 29, 1999) and continues to do so in 2000 (see Summer 2000) after Almihdhar returns to Yemen (see June 10, 2000 and (Mid-June-Mid-July 2000)).
Calls' Content - Some of the calls may only contain non-operational information, as they are reportedly between Almihdhar and his wife. (9/11 Commission 7/24/2004, pp. 222; Suskind 2006, pp. 94; Wright 2006, pp. 343) However, the calls are also used to relay messages to the 9/11 hijackers. (Embassy of Yemen (Washington) 2/13/2002; MSNBC 2/14/2002; Windrem 5/2005)
Agencies' Roles - The CIA is the lead agency monitoring the communications hub. It has planted bugs inside it and is wiretapping all calls (see Late August 1998). Intercepts of calls to and from the hub are a major plank of the US intelligence community’s effort to fight al-Qaeda. Also involved is the FBI, which is using phone records to plot these calls on a map (see Late 1998-Early 2002). Some of the calls intercepted by US intelligence come from Osama bin Laden’s satellite phone in Afghanistan (see August 4-25, 1998 and Late August 1998). After 9/11, counterterrorism officials will say that the number was one of the hottest targets being monitored by the NSA and was an “intelligence bonanza.” (Meyer 12/21/2005; Wright 2006, pp. 343)
Importance of Failure - Also after 9/11, counterterrorism officials will agree that the failure to follow leads to the US from this number was a huge missed opportunity to stop the 9/11 plot. For instance, FBI agent Kenneth Maxwell will say: “Two al-Qaeda guys living in California—are you kidding me? We would have been on them like white on snow: physical surveillance, electronic surveillance, a special unit devoted entirely to them.” (Myers 7/21/2004; Wright 7/10/2006 pdf file)
Discussed after 9/11 - The failure to roll up the plot based on these communications intercepts will be discussed following 9/11 (see Summer 2002-Summer 2004 and March 15, 2004 and After).

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 (Kroft 2/27/2000) which exploded over Lockerbie, Scotland in 1988, killing 270 people. (Cody 12/22/1988) “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” (Coulthart 5/23/1999)
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). (Kroft 2/27/2000)
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” (Kroft 2/27/2000)

John Yoo, an associate law professor at the University of California at Berkeley, makes a presentation at a Cato Institute seminar on executive power. Yoo, who will go on to become one of the Bush administration’s primary advocates of unchecked executive power (see March 1996), accuses the Clinton administration of upending the Constitution to give the executive branch unwarranted authority (see March 24 - Mid-June, 1999). “[T]he Clinton administration has undermined the balance of powers that exist in foreign affairs, and [they] have undermined principles of democratic accountability that executive branches have agreed upon well to the Nixon administration,” he says. Regarding the Clinton administration’s stretched interpretation of the Anti-Ballistic Missile Treaty (see June 2000), Yoo says that the Clinton “legal arguments are so outrageous, they’re so incredible, that they actually show, I think, a disrespect for the idea of law, by showing how utterly manipulatible it is.” (Savage 2007, pp. 67)

Said Berraj.Said Berraj. [Source: Spanish Interior Ministry]Five suspected al-Qaeda operatives, Said Berraj, Amer el-Azizi, Mohamed Haddad, Lahcen Ikassrien, and Salahedin Benyaich, are arrested in Turkey. They are arrested two weeks after arriving in Turkey, apparently for failing to produce identification papers. They are later released, but the reason for releasing them is unknown. Turkey is a transit center and logistics base for al-Qaeda (see November 1996-September 1998 and Mid-1996) and el-Azizi is said to operate there, as well as in Iran and, possibly, Iraq. Berraj, Haddad, and el-Azizi will later be involved in an attack in Madrid, Spain, that kills nearly 200 people (see Before March 11, 2004 and 7:37-7:42 a.m., March 11, 2004) and Benyaich will later be jailed in Morocco on terrorism charges following a bombing in Casablanca (see May 16, 2003). El-Azizi will also apparently be involved in setting up a meeting where details of the 9/11 plot are finalized (see Before July 8, 2001). (Rotella 4/14/2004; Fuchs 4/29/2004; Fuchs 4/30/2004; El Mundo (Madrid) 9/14/2004) Ikassrien will be arrested in Afghanistan in late 2001 and sent to the Guantanamo prison. He will be released back to Spain in 2005, charged for al-Qaeda links, an acquitted. (Associated Press 10/11/2006)
Possible Informants - Berraj is an informant for Spanish intelligence, regularly meeting with intelligence agents in 2003. It is unknown when he begins informing (see Shortly Before March 11, 2004). Haddad will not be arrested in Morocco after the 2004 train bombings despite strong evidence he was directly involved, leading to suspicions that he has been a government informant (see Shortly After March 18, 2004). El-Azizi also will be suspected of being a government informant because he is tipped off by Spanish intelligence about a police raid (see Shortly After November 21, 2001). He is also arrested in Turkey for passport forgery at one point, and then let go, although it is not clear when. (Johnson et al. 3/19/2004) Turkish intelligence is aware of extremists’ use of Turkey as a base (see 1996), but it is unclear whether this is related to the arrest of the three men. El-Azizi will repeatedly evade arrest in Spain after 9/11, apparently with the help of Spanish intelligence (see October 2001 and Shortly After November 21, 2001).

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). (Leopold 1/17/2006) In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. (Lichtblau, Risen, and Shane 12/16/2007)

President-elect George W. Bush meets with Donald Rumsfeld in Washington, and offers him the position of secretary of defense. Insiders are amazed that Bush would even consider Rumsfeld, the chief of staff for former President Ford (see September 21, 1974 and After), after Rumsfeld’s open contempt and enmity towards the elder Bush, the “Team B” onslaught against the elder Bush’s CIA (see Late November 1976 and Late November, 1976), and his attempts to keep Bush off the presidential tickets in 1976 and 1980 (see Before November 4, 1975). “Real bitterness there,” a close friend of the Bush family later says. “Makes you wonder what was going through Bush 43’s head when he made [Rumsfeld] secretary of defense.” The Bush family’s great friend and fixer, James Baker, even tries to dissuade Bush from choosing Rumsfeld, telling him, “All I’m going to say is, you know what he did to your daddy.” But Bush chooses Rumsfeld anyway. Not only does Rumsfeld have a long and fruitful relationship with Vice President Cheney (see 1969), but Rumsfeld, described as always an ingratiating courtier by author Craig Unger, plays on Bush’s insecurity about his lack of experience and his desire to be an effective commander in chief. Rumsfeld is also a key element of Cheney’s long-term plan to unify power in the executive branch (see 1981-1992), to the detriment of Congress and the judiciary. (Unger 2007, pp. 186-187)

Shaha Ali Riza.Shaha Ali Riza. [Source: World Bank]With Donald Rumsfeld in as Defense Secretary (see December 28, 2000), Vice President Cheney is moving closer to getting a team in place that will allow him to fulfill his dream of the “unitary executive”—the gathering of power into the executive branch at the expense of the legislative and judicial branches. One key piece to Cheney’s plan is to place neoconservative academic Paul Wolfowitz as the head of the CIA. However, Wolfowitz’s personal life is proving troublesome for Cheney’s plans. Wolfowitz’s marriage is crumbling. His wife of over 30 years, Clare, is threatening to go public with her husband’s infidelities. Wolfowitz is having one affair with a staffer at the School of International Studies, and is openly romancing another woman, Shaha Ali Riza, a secular Muslim neoconservative with close ties to Iraqi oppositions groups, including Ahmed Chalabi’s Iraqi National Congress. Smitten with the idea of a secular Muslim and a secular Jew forming a romantc liaison, Wolfowitz frequently escorts Riza, and not his wife, to neoconservative social events. Many insiders joke about Wolfowitz’s “neoconcubine.” His dalliances, particularly with a Muslim foreign national, raise questions about his ability to obtain the necessary national security clearance he will need to head the CIA. Cheney does not intend to allow questions of security clearances or wronged and vengeful wives to stop him from placing Wolfowitz at the head of the agency, but this time he does not succeed. After Clare Wolfowitz writes a letter to President-elect Bush detailing her husband’s sexual infidelities and possible security vulnerabilities, Wolfowitz is quietly dropped from consideration for the post. Current CIA Director George Tenet, after reassuring Bush that he can work with the new regime, is allowed to keep his position. Author Craig Unger later writes, “If Cheney and the neocons were to have control over the national security apparatus, it would not come from the CIA.” (Unger 2007, pp. 187-189)

In January, Joint Chiefs of Staff Chairman Henry Shelton is given a three hour briefing on Able Danger. Shelton supported the formation of Able Danger back in 1999 (see Fall 1999). The content of the briefing has never been reported. Then in March, during a briefing on another classified program called Door Hop Galley, Able Danger is again brought up. This briefing, given by Lt. Col. Anthony Shaffer, is attended by Vice Adm. Thomas Wilson, director of the Defense Intelligence Agency; Richard Schiefren, an attorney at DOD; and Stephen Cambone, Special Assistant to the Secretary and Deputy Secretary of Defense. (Goodwin 9/2005; Office of Congressman Curt Weldon 9/17/2005 Sources: Curt Weldon) In mid-September 2005, Weldon will say, “I knew that the Clinton administration clearly knew about this. Now I know of at least two briefings in the Bush administration.” He calls these two briefings “very troubling.” He wants to know what became of the information presented in these briefings, suggesting it shouldn’t have been destroyed as part of the other Able Danger data purges. (Bender 9/16/2005; Office of Congressman Curt Weldon 9/17/2005)

There are discussions among future members of the Bush administration, including Bush himself, about making the removal of Saddam Hussein a top priority once they are in office. After the invasion of Iraq in March 2003, counterterrorism “tsar” Richard Clarke will say that the Bush team had been planning regime change in Iraq since before coming to office, with newly named Defense Secretary Donald Rumsfeld (see December 28, 2000) and his deputy Paul Wolfowitz (see January 11, 2001) taking the lead. “Since the beginning of the administration, indeed well before, they had been pressing for a war with Iraq,” he will write in his book Against All Enemies. “My friends in the Pentagon had been telling me that the word was we would be invading Iraq sometime in 2002.” (Clarke 2004, pp. 7-9; Unger 2007, pp. 192) During an appearance on Good Morning America on March 22, 2004, he will say, “[T]hey had been planning to do something about Iraq from before the time they came into office.” (Clarke 3/22/2004) Evidence of pre-inaugural discussions on regime change in Iraq comes from other sources as well. Imam Sayed Hassan al-Qazwini, who heads the Islamic Center of America in Detroit, will tell the New York Times in early 2004 that he spoke with Bush about removing Saddam Hussein six or seven times, both before and after the 2000 elections. (Stevenson 1/12/2004) In 2007, author Craig Unger will write: “In certain respects, their actions were a replay of the 1976 Team B experiment (see Early 1976 and November 1976), with one very important difference. This time it wasn’t just a bunch of feverish ideologues presenting a theoretical challenge to the CIA. This time Team B controlled the entire executive branch of the United States.” (Unger 2007, pp. 192)

According to reporter and author Charlie Savage, the White House staff quickly coalesces into two camps: “Bush People[,] mostly personal friends of the new president who shared his inexperience in Washington,” which includes President Bush’s top legal counsels, Alberto Gonzales and Harriet Miers, both corporate lawyers in Texas before joining Bush in Washington. The second group is “Cheney People—allies from [Vice-President Dick] Cheney’s earlier stints in the federal government (see May 25, 1975, November 18, 1980, 1981-1992, 1989, and June 1996) who were deeply versed in Washington-level issues, a familiarity that would allow their views to dominate internal meetings. These included [Defense Secretary Donald] Rumsfeld and other cabinet secretaries, key deputies throughout the administration, and David Addington, Cheney’s longtime aide who would become a chief architect of the administration’s legal strategy in the war on terrorism” (see July 1, 1992 and (After 10:00 a.m.) September 11, 2001). Savage will observe, “Given the stark contrast in experience between Cheney and Bush, it was immediately clear to observers of all political stripes that Cheney would possess far more power than had any prior vice president.”
'Unprecedented' Influence - Cheney will certainly have “unprecedented” influence, according to neoconservative publisher William Kristol, who himself had served as former Vice President Dan Quayle’s chief of staff. “The question to ask about Cheney,” Kristol will write, is “will he be happy to be a very trusted executor of Bush’s policies—a confidant and counselor who suggests personnel and perhaps works on legislative strategy, but who really doesn’t try to change Bush’s mind about anything? Or will he actually, substantively try to shape administration policy in a few areas, in a way that it wouldn’t otherwise be going?”
Expanding the Power of the Presidency - Cheney will quickly answer that question, Savage will write, by attempting to “expand the power of the presidency.” Savage will continue: “He wanted to reduce the authority of Congress and the courts and to expand the ability of the commander in chief and his top advisers to govern with maximum flexibility and minimum oversight. He hoped to enlarge a zone of secrecy around the executive branch, to reduce the power of Congress to restrict presidential action, to undermine limits imposed by international treaties, to nominate judges who favored a stronger presidency, and to impose greater White House control over the permanent workings of government. And Cheney’s vision of expanded executive power was not limited to his and Bush’s own tenure in office. Rather, Cheney wanted to permanently alter the constitutional balance of American government, establishing powers that future presidents would be able to wield as well.” (Savage 2007, pp. 7-9) Larry Wilkerson, the chief of staff for Secretary of State Colin Powell, will say after leaving the administration: “We used to say about both [Defense Secretary Donald Rumsfeld’s office] and the vice president’s office that they were going to win nine out of 10 battles, because they were ruthless, because they have a strategy, because they never, never deviate from that strategy. They make a decision, and they make it in secret, and they make it in a different way than the rest of the bureaucracy makes it, and then suddenly, foist it on the government—and the rest of the government is all confused.” (Unger 2007, pp. 299)
Signing Statements to Reshape Legislation, Expand Presidential Power - To that end, Cheney ensures that all legislation is routed through his office for review before it reaches Bush’s desk. Addington goes through every bill for any new provisions that conceivably might infringe on the president’s power as Addington interprets it, and drafts signing statements for Bush to sign. In 2006, White House counsel Bradford Berenson will reflect: “Signing statements unite two of Addington’s passions. One is executive power. And the other is the inner alleyways of bureaucratic combat. It’s a way to advance executive power through those inner alleyways.… So he’s a vigorous advocate of signing statements and including important objections in signing statements. Most lawyers in the White House regard the bill review process as a tedious but necessary bureaucratic aspect of the job. Addington regarded it with relish. He would dive into a 200-page bill like it was a four-course meal.” It will not be long before White House and Justice Department lawyers begin vetting legislation themselves, with Addington’s views in mind. “You didn’t want to miss something,” says a then-lawyer in the White House. (Savage 2007, pp. 236)

The Bush administration’s legal team meets for the first time. The head of the group, White House counsel Alberto Gonzales, is well known as a staunchly loyal aide to President Bush, and has long ensured that Bush receives the legal opinions he wants. While Bush was governor of Texas, Gonzales routinely prepared briefings for him on death row prisoners appealing for clemency, briefings that usually left out mitigating circumstances that might have led Bush to consider waiving the death penalty. Bush was pleased at Gonzales’s approach, and the White House legal team will quickly come to understand that that same approach will be used in its legal work. One young team member is Bradford Berenson, who made his reputation working with the Bush-Cheney campaign in its fight to win the disputed 2000 presidential election. Berenson is one of eight White House associate counsels. Gonzales tells the gathered counsels and legal staff that most of their work will be in handling the everyday legal tasks generated by the White House, reviewing speeches and letters, making judgments on ethical issues, and the like. But, according to Gonzales, Bush has personally instructed him to give his team two missions as their top priority.
Appoint Conservatives to Judiciary Positions - One is to find as many conservatives as they can to fill the numerous vacancies on the federal courts, vacancies left unfilled because of Senate Republicans’ refusal to schedule hearings for Clinton nominees. Now, Gonzales tells the legal team, they are to find as many conservative “judicial restraint”-minded lawyers as there are judgeships to be filled, and to get them confirmed as quickly as possible. This is an unsurprising mission, as most in the room expect the Republicans to lose control of Congress in 2002—as, historically, most parties who control the executive branch do in midterm elections—and therefore have only a limited time in which to get nominees named, vetted, and confirmed by friendly Congressional Republicans.
Find Ways to Expand Presidential Power - Gonzales’s second mission is more puzzling. The lawyers are to constantly look for ways to expand presidential power, he tells them. Bush has told his senior counsel that under previous administrations, the power of the presidency has eroded dramatically. (Ironically, some of the losses of executive power came due to the Republican-led investigation of former President Clinton’s involvement in Whitewater and his affair with a White House intern, when Secret Service bodyguards and White House attorneys were compelled to testify about their communications with the president, and Congressional Republicans issued subpoenas and demanded information from the White House.) It is time to turn back the tide, Gonzales tells his team, and not only regain lost ground, but expand presidential power whenever the opportunity presents itself. Berenson will later recall Gonzales telling them that they are “to make sure that [Bush] left the presidency in better shape than he found it.” Berenson will later remark: “Well before 9/11, it was a central part of the administration’s overall institutional agenda to strengthen the presidency as a whole. In January 2001, the Clinton scandals and the resulting impeachment were very much in the forefront of everyone’s mind. Nobody at that point was thinking about terrorism or the national security side of the house.” Berenson does not learn until much later that much of the direction they have received has come, not from President Bush, but from Vice President Cheney and his legal staff, particularly his chief counsel, David Addington. (Savage 2007, pp. 70-75)

President Bush informs a small group of reporters that he is forming an “energy task force” to draw up a new national energy policy. It will be the first major policy initiative of his presidency. The administration is driven by its concern for “the people who work for a living… who struggle every day to get ahead.” The task force will find ways to meet the rising demand for energy and to avoid the shortfalls causing major power blackouts in California and other areas (see January 23, 2001). He has chosen Vice President Cheney to chair the task force. “Can’t think of a better man to run it than the vice president,” he says. He refuses to take questions, turning aside queries with jokes about the recent Super Bowl. The short press briefing will be virtually the only time the White House tells reporters anything about Cheney’s National Energy Policy Development Group. (Savage 2007, pp. 85-86) Deputy press secretary Scott McClellan will later write that the task force “held a series of meetings with outside interests whose identities were withheld from the public. This created an early impression of an administration prone to secrecy and reinforced the image of the Bush White House as in thrall to corporate interests.” (McClellan 2008, pp. 96)

Page 1 of 5 (472 events)
previous | 1, 2, 3, 4, 5 | next

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike