!! History Commons Alert, Exciting News

Context of '(Spring 2000): NSA Does Not Inform FBI that 9/11 Hijacker Almihdhar Is in US, Reason Unclear'

This is a scalable context timeline. It contains events related to the event (Spring 2000): NSA Does Not Inform FBI that 9/11 Hijacker Almihdhar Is in US, Reason Unclear. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 14 of 18 (1709 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18 | next

Dr. Michael Gelles, the head psychologist for the Naval Criminal Investigative Service (NCIS), says that torture and coercion do not produce reliable information from prisoners. Gelles adds that many military and intelligence specialists share his view. Gelles warned of problems with torture and abuse at Guantanamo nearly three years ago (see Early December, 2002 and December 18, 2002). And he is frustrated that Bush administration officials have “dismissed” critics of coercive techniques as weaklings and “doves” who are too squeamish to do what is necessary to obtain information from terror suspects. In reality, Gelles says, many experienced interrogators are convinced that torture and coercion do more harm than good. Gelles has extensive experience with interrogations in Iraq, Afghanistan, and Guantanamo, and notes that NCIS had interrogated Muslim terror suspects well before 9/11, including investigations into the 2000 bombing of the USS Cole (see October 12, 2000) and the 1983 bombing of a Marine barracks in Lebanon (see April 18-October 23, 1983).
'Rapport-Building' - The best way to extract reliable intelligence from a Muslim extremist, Gelles says, is through “rapport-building”—by engaging the suspect in conversations that play on his cultural sensitivities. Similar techniques worked on Japanese soldiers during the height of battles during World War II (see July 17, 1943). Gelles says he and others have identified patterns of questioning that can elicit accurate information from Islamist radicals, but refuses to discuss them specifically. “We do not believe—not just myself, but others who have to remain unnamed—that coercive methods with this adversary are… effective,” he says. “If the goal is to get ‘information,’ then using coercive techniques may be effective. But if the goal is to get reliable and accurate information, looking at this adversary, rapport-building is the best approach.”
Conflict between Experts, Pentagon Civilians - Gelles describes a sharp division between interrogation specialists such as himself, and civilian policymakers at the Pentagon. Many government specialists, including fellow psychologists, intelligence analysts, linguists, and interrogators who have experience extracting information from captured Islamist militants, agree with Gelles that coercion is not effective, but top civilians in the Office of the Secretary of Defense disagree. Coercive interrogations try to “vacuum up all the information you can and figure out later” what is true and what is not, he says. This method jams the system with false and misleading data. Gelles compares it to “coercive tactics leading to false confessions” by suspects in police custody. Many at the Pentagon and elsewhere mistake “rapport-building” techniques for softness or weakness. Just because those interrogations are not humiliating or physically painful, Gelles says, the techniques are not necessarily “soft.” Telling a detainee that he is a reprehensible murderer of innocents is perfectly acceptable, Gelles says: “Being respectful doesn’t mean you don’t confront, clarify, and challenge the detainee when he gives the appearance of being deceptive.” On the other hand, coercive techniques induce detainees to say anything to make the pain and discomfort stop. “Why would you terrify them with a dog?” Gelles asks, referring to one technique of threatening detainees with police dogs. “So they’ll tell you anything to get the dog out of the room?” Referring to shackling prisoners in “stress positions” for hours on end, Gelles adds: “I know there is a school of thought that believes [stress positions] are effective. In my experience, I’ve never seen it be of any value.” Innocent suspects will confess to imagined crimes just to stop the abuse, Gelles says.
Other Harmful Consequences - Gelles also notes that coercive techniques undermine the possibility of building rapport with the prisoner to possibly gain information from him. And, he says, unless the prisoner is either killed in custody or detained for life, eventually he will be released to tell the world of his captivity, damaging America’s credibility and moral authority. [Boston Globe, 3/31/2005; Savage, 2007, pp. 217-218]

Entity Tags: Michael Gelles, Bush administration (43), US Department of Defense, Naval Criminal Investigative Service

Timeline Tags: Torture of US Captives

The DC federal appeals court rules in favor of the attorney general’s use of the state secrets privilege (see March 9, 1953, October 18, 2002 and May 19, 2004) to prevent the court from hearing Sibel Edmonds’ lawsuit (see June 2002). Lawyers for the Justice Department had addressed the judge behind sealed doors. [Vanity Fair, 9/2005]

Entity Tags: Sibel Edmonds, US Department of Justice

Timeline Tags: Complete 911 Timeline

The FBI searches the home that once belonged to convicted Oklahoma City bombing conspirator Terry Nichols (see December 23, 1997 and May 26, 2004) and finds explosive materials related to the 1995 bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995). The bureau acts on a tip that it missed evidence in its search a decade earlier (see 3:15 p.m. and After, April 21-22, 1995). Blasting caps and other explosive materials were concealed in a crawl space of the Herington, Kansas, home, buried under about a foot of rock, dirt, and gravel, an area not searched in the 1995 investigation. FBI agent Gary Johnson says, “[T]he information so far indicates the items have been there since prior to the Oklahoma City bombing.” Nichols’s lawyer, Brian Hermanson, says the discovery is either a hoax or evidence of a major failure by the FBI: “They were there often. It’s surprising. I would think they would have done their job and found everything that was there. But I’m still suspicious that it could be something planted there. The house was empty for several years.” [Associated Press, 4/2/2005] Reportedly, Nichols has admitted conspiring to build the bomb that destroyed the Murrah Federal Building in Oklahoma City (see November 30, 2004).

Entity Tags: Federal Bureau of Investigation, Brian Hermanson, Terry Lynn Nichols, Gary Johnson

Timeline Tags: US Domestic Terrorism

Anti-abortion activist Eric Rudolph, who has pled guilty to bombing abortion clinics (see January 16, 1997 and January 29, 1998), a gay and lesbian nightclub (see February 21, 1997), and the 1996 Olympics (see July 27, 1996 and After and October 14, 1998) in a series of court proceedings, releases an 11-page “manifesto” that explains the rationale behind his bombing spree. In the document, which the Associated Press terms “[a] sometimes-rambling, sometimes-reflective” statement, Rudolph writes that he considers himself a “warrior” against abortion, which he calls murder, and the US government, which he charges with permitting the “slaughter” of “innocent babies.” Rudolph will receive four life sentences without parole in return for the prosecution removing the death penalty from consideration (see July 18, 2005). He has also alerted authorities to a large stash of explosives he created while hiding in the mountains of western North Carolina.
Abortion Providers, Lawmakers 'Legitimate Targets' in 'War' - The “holocaust” of abortion is his driving impulse, Rudolph writes in his statement. Anyone who supports or allows abortion, he writes, is an enemy deserving of death. “Because I believe that abortion is murder, I also believe that force is justified… in an attempt to stop it,” he writes, “whether these agents of the government are armed or otherwise they are legitimate targets in the war to end this holocaust.… Abortion is murder. And when the regime in Washington legalized, sanctioned, and legitimized this practice, they forfeited their legitimacy and moral authority to govern.”
Rationale for Bombing Olympics - Rudolph also writes that the Olympic bombing was envisioned as the first in a weeklong campaign of bombings designed to shut down the Olympics, held in Atlanta, and embarrass the US government as a result. He had hoped to use high-grade explosives to shut down the Atlanta power grid and force the termination of the Olympics, but was unable to procure the explosives, and calls the results of his bombing a “disaster.” He writes: “In the summer of 1996, the world converged upon Atlanta for the Olympic Games. Under the protection and auspices of the regime in Washington, millions of people came to celebrate the ideals of global socialism. Multinational corporations spent billions of dollars, and Washington organized an army of security to protect these best of all games. Even though the conception and purpose of the so-called Olympic movement is to promote the values of global socialism, as perfectly expressed in the song Imagine by John Lennon, which was the theme of the 1996 Games even though the purpose of the Olympics is to promote these despicable ideals, the purpose of the attack on July 27 was to confound, anger, and embarrass the Washington government in the eyes of the world for its abominable sanctioning of abortion on demand.”
Racist, Homophobic Views - In the document, Rudolph attacks homosexuality as an “aberrant” lifestyle, and blames the government for condoning it. He denies holding racist or anti-Semitic views [Associated Press, 4/13/2005; Associated Press, 4/14/2005; CNN, 4/19/2005] , though his ex-sister-in-law Deborah Rudolph told reporters that Rudolph believed abortion was part of a plot to undermine the white race; she said, “He felt like if woman continued to abort their white babies, that eventually the white race would become a minority instead of a majority.” Others have said that Rudolph told them he believed the Holocaust never occurred. [CNN, 6/15/2002]
'Worse to Him than Death' - After Rudolph’s guilty plea, Deborah Rudolph says of the prospects of his life in jail, “Knowing that he’s living under government control for the rest of his life, I think that’s worse to him than death.” [Associated Press, 4/13/2005] Rudolph, Prisoner No. 18282-058, will be incarcerated in a tiny cell in the Federal Correctional Complex in Florence, Colorado, colloquially known as the “Supermax” facility. Rudolph lives on “bomber’s row” along with Ted Kaczynski, the so-called “Unabomber” (see April 3, 1996), Islamist terrorist Ramzi Yousef (see February 7, 1995), “shoe bomber” Richard Reid (see December 22, 2001), and Oklahoma City bomber Terry Nichols (see 8:35 a.m. - 9:02 a.m. April 19, 1995). After his imprisonment, he releases a statement that reads in part, “The talking heads on the news [will] opine that I am ‘finished,’ that I will ‘languish broken and unloved in the bowels of some supermax,’ but I say to you people that by the grace of God I am still here—a little bloodied, but emphatically unbowed.” [Orlando Weekly, 8/24/2006]

Entity Tags: Terry Lynn Nichols, Deborah Rudolph, Richard C. Reid, Ramzi Yousef, Eric Robert Rudolph, Theodore J. (“Ted”) Kaczynski

Timeline Tags: US Health Care, Domestic Propaganda, US Domestic Terrorism

Zacarias Moussaoui.
Zacarias Moussaoui. [Source: Sherburne County Sheriffs Office]In an unexpected move, Zacarias Moussaoui pleads guilty to all six terrorism conspiracy charges against him. Moussaoui had been arrested weeks before 9/11, and was formally charged in December 2001 for his role in the 9/11 plot. He says it is “absolutely correct” that he is guilty of the charges: conspiracy to commit acts of terrorism transcending national boundaries; to commit aircraft piracy; to destroy aircraft; to use weapons of mass destruction; to murder US government employees; and to destroy US government property. However, he says, “I was not part of 9/11,” but rather claims he was part of a “broader conspiracy” aimed at post-9/11 attacks. He says he was personally directed by bin Laden to pilot a 747 and “strike the White House” with it, but as part of a “different conspiracy than 9/11.” His plea means there will be no trial to determine guilt, but there will still be a trial to determine his sentencing, which could be as severe as the death penalty. He promises to fight in the sentencing phase, stating he doesn’t deserve death because he was not directly connected to the 9/11 plot. [CNN, 4/23/2005; Washington Post, 4/23/2005] A CNN legal analyst notes that Moussaoui’s guilty plea “makes little sense.” Moussaoui may have actually had a chance to be proven not guilty because of the many thorny legal issues his case raises (two suspected members of the al-Qaeda Hamburg cell have been found not guilty in German courts because they have not been allowed access to testimony from al-Qaeda prisoners who might exonerate them, and Moussaoui so far has been denied access to those same prisoners (see March 22, 2005)). It is pointed out that Moussaoui gave a guilty plea without “any promise of leniency in exchange for his plea,” and that he is unlikely to gain any sympathetic advantage from it in the death penalty trial. CNN’s analyst notes that the statements in his plea “suggest that Moussaoui [mistakenly] thought he had tricked the prosecution.” Doubts still remain whether Moussaoui is fully mentally sound and capable of legally defending himself. [CNN, 4/28/2005] A counterterrorism expert for RAND Corporation says of Moussaoui’s rather confusing statements, “If we thought by the end of the day we would find the holy grail as to exactly what the genesis of 9/11 was and what Moussaoui’s role in it was, we have been sorely disappointed. This contradiction in his behavior raises more questions than it answers.” The Washington Post notes that, “It remains uncertain” whether the death penalty trial “will divulge much new information about the plot.” [Washington Post, 4/23/2005]

Entity Tags: Zacarias Moussaoui, Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A high-ranking Yemeni defector alleges that the highest ranks of Yemen’s military and security forces have long collaborated with radical militants in the country. The defector, Ahmed Abdullah al-Hasani, was head of Yemen’s navy at the time of the USS Cole bombing (see October 12, 2000) and recently served as its ambassador to Syria. Al-Hasani claims that the perpetrators of the USS Cole attack “are well known by the regime and some are still officers in the national army.” The Yemeni government hindered the Cole investigation (see After October 12, 2000). Al-Hasani also says that Ali Mohsen al-Ahmar, an army commander who is the half-brother of President Ali Abdallah Saleh and has links with radical militants (see 1980-1990 and May 21-July 7, 1994), was involved in a plot to kidnap Western tourists in 1998 (see December 26, 1998 and December 28-29, 1998). Al-Hasani arrived in Britain with his family, and is apparently debriefed by Western intelligence agencies. He claims to have fallen out with President Saleh over discrimination against southern Yemenis and fears he will be assassinated if he returns home. Yemeni authorities dismiss al-Hasani’s claims. “All these allegations are untrue and groundless,” says a government spokesman. “This man is making these allegations in order to legitimise and give significance to his claim of asylum.” [Sunday Times (London), 5/8/2005]

Entity Tags: Ali Mohsen al-Ahmar, Ahmed Abdullah al-Hasani

Timeline Tags: Complete 911 Timeline

Author Gerald Posner has claimed that shortly after al-Qaeda leader Abu Zubaida was captured in late March 2002 (see March 28, 2002), he was tricked into thinking he had been handed over to the Saudis and then confessed high-level cooperation between al-Qaeda and the Saudi and Pakistani governments. Posner’s account has since been corroborated by New York Times journalist James Risen (see Early April 2002). In a 2005 book, Posner further alleges: “From conversations with investigators familiar with the [9/11 Commission’s] probe, the portions of Zubaida’s interrogation in which he named [Saudi and Pakistani connections] were not provided to the Commission. The CIA has even withheld [them] from the FBI, which is supposed to have access to all terror suspects’ questioning.” [Posner, 2005, pp. 14] There is some circumstantial evidence to support this. Aside from the alleged Saudi trickery, Zubaida reportedly confessed vital intelligence in late March and into April 2002, including the previously unknown fact that Khalid Shaikh Mohammed was the mastermind of the 9/11 attacks (see Late March through Early June, 2002). But footnotes from various 9/11 Commission reports indicate that the earliest Zubaida interrogation used by the Commission is from May 23, 2002, after a new CIA team had taken over his interrogation (see Mid-May 2002 and After). [9/11 Commission, 8/21/2004, pp. 65 pdf file] Hundreds of hours of Zubaida’s interrogation sessions have been videotaped by the CIA, but these videotapes will be destroyed by the CIA in 2005 under controversial circumstances (see November 2005).

Entity Tags: Gerald Posner, Abu Zubaida, Central Intelligence Agency, Federal Bureau of Investigation, 9/11 Commission

Timeline Tags: Torture of US Captives, Complete 911 Timeline

Abu Faraj al-Libbi.Abu Faraj al-Libbi. [Source: Pakistani Interior Ministry]Al-Qaeda leader Abu Faraj al-Libbi is arrested in Mardan, Pakistan, near the town of Peshawar. He is captured by Pakistani forces with US assistance. Pakistani President Pervez Musharraf will later claim that he doesn’t even tell the US about al-Libbi’s capture until a few days after it happened (and the first media account comes out three days later), so apparently Pakistan interrogates him on their own for a few days. Al-Libbi is that turned over to the US and detained in a secret CIA prison (see September 2-3, 2006). [New York Times, 5/5/2005; Musharraf, 2006, pp. 209]
Some Call Al-Libbi High-Ranking Leader - In 2004, the Daily Telegraph claimed al-Libbi was Khalid Shaikh Mohammed’s “right hand man” and helped him plan the 9/11 attacks. After Mohammed was arrested in early 2003 (see February 29 or March 1, 2003), Al-Libbi allegedly took his place and became the third in command of al-Qaeda and the group’s operational leader. Furthermore, the Telegraph claims he was once Osama bin Laden’s personal assistant, helped plan two assassination attempts against Pakistani President Pervez Musharraf (see December 14 and 25, 2003), and has been in contact with sleeper cells in the US and Britain. [Daily Telegraph, 9/19/2004] The same month, MSNBC made the same claims. They also called him al-Qaeda’s number three leader and operational commander. [MSNBC, 9/7/2004] President Bush hails al-Libbi’s capture as a “critical victory in the war on terror.” Bush also calls him a “top general” and “a major facilitator and chief planner for the al-Qaeda network.”
Al-Libbi Little Known to Media and Experts - But al-Libbi is little known at the time of his arrest and some experts and insiders question if he really is as important as the US claims. The London Times will report several days after his arrest, “[T]he backslapping in Washington and Islamabad has astonished European terrorism experts, who point out that the Libyan was neither on the FBI’s most wanted list, nor on that of the State Department ‘Rewards for Justice’ program.” One former close associate of Osama bin Laden now living in London laughs at al-Libbi’s supposed importance, saying, “What I remember of him is he used to make the coffee and do the photocopying.” Even a senior FBI official admits that his “influence and position have been overstated.” The Times comments, “Some believe [his] significance has been cynically hyped by two countries [the US and Pakistan] that want to distract attention from their lack of progress in capturing bin Laden, who has now been on the run for almost four years.” [London Times, 5/8/2005] However, later revelations, such as details on al-Libbi’s interrogation (see Shortly After May 2, 2005 and Late 2005), will provide more evidence that al-Libbi in fact was al-Qaeda’s operational leader. It is not known why the FBI did not have him on their most wanted list, if MSNBC and the Telegraph newspaper and other sources were already aware of his importance in 2004.

Entity Tags: George W. Bush, Khalid Shaikh Mohammed, Abu Faraj al-Libbi

Timeline Tags: Torture of US Captives, Complete 911 Timeline

Some time after he is captured in May 2005 (see May 2, 2005), al-Qaeda leader Abu Faraj al-Libbi tells his CIA interrogators that he has never heard of Ibrahim Saeed Ahmed. CIA analysts already strongly suspect that Ahmed is a trusted courier working for Osama bin Laden, but they only know him by his main alias Abu Ahmed al-Kuwaiti.
Al-Libbi's False Claims - Al-Libbi tells his interrogators that he does not know who “al-Kuwaiti” is. Instead, he admits that when 9/11 mastermind Khalid Shaikh Mohammed (KSM) was captured in 2003 and al-Libbi was chosen to replace him as al-Qaeda’s operational chief, he was told the news of his selection by a courier. But he says the courier was someone named Maulawi Abd al-Kahliq Jan. CIA analysts never find anyone using this name, and eventually they will conclude that al-Libbi made it up to protect Ahmed (see Late 2005). Later, the CIA will learn Ahmed’s real name, and this fact will eventually lead to bin Laden’s location (see Summer 2009 and July 2010).
False Claims Made While Tortured? - The interrogation techniques used on al-Libbi are unknown. However, days after his capture, the CIA pressures the Justice Department for new legal memorandums approving the use of very brutal methods. [Associated Press, 5/2/2011; New York Times, 5/3/2011]

Entity Tags: Khalid Shaikh Mohammed, Abu Faraj al-Libbi, Ibrahim Saeed Ahmed, Osama bin Laden, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

Steven Bradbury, the head of the Justice Department’s Office of Legal Counsel, issues a classified memo to John Rizzo, the senior deputy counsel for the CIA. The memo will remain classified for nearly four years (see April 16, 2009). It addresses, in the words of the American Civil Liberties Union (ACLU), “whether CIA interrogation methods violate the cruel, inhuman, and degrading treatment standards under federal and international law.” Bradbury concludes that neither past nor present CIA interrogation methods violate such standards. [Office of Legal Counsel, 5/10/2005 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file]
CIA Techniques Not Torture, Bradbury Explains - Bradbury calls torture “abhorrent” and “universally repudiated,” and says the US will never condone it. Afterwards, he spends a great deal of effort explaining why the various techniques used by the CIA do not constitute torture. Bradbury goes into numerous details about varieties of “harsh interrogation techniques” that can be used on prisoners, often restating details from an August 2002 OLC memo (see August 1, 2002) and elaborating on those descriptions. One technique he details is forced nudity. “Detainees subject to sleep deprivation who are also subject to nudity as a separate interrogation technique will at times be nude and wearing a diaper,” he writes, and notes that the diaper is “for sanitary and health purposes of the detainee; it is not used for the purpose of humiliating the detainee and it is not considered to be an interrogation technique.… The detainee’s skin condition is monitored, and diapers are changed as needed so that the detainee does not remain in a soiled diaper.” He cites “walling,” a technique involving slamming a detainee into a “false wall,” and writes, “Depending on the extent of the detainee’s lack of cooperation, he may be walled one time during an interrogation session (one impact with the wall) or many times (perhaps 20 or 30 times) consecutively.” Other techniques Bradbury cites include waterboarding, “abdominal slaps,” and “water dousing.” For water dousing, Bradbury gives specific restrictions: “For example, in employing this technique:
bullet “For water temperarure of 41°F, total duration of exposure may not exceed 20 minutes without drying and rewarming.
bullet “For water temperarure of 50°F, total duration of exposure may not exceed 40 minutes without drying and rewarming.
bullet “For water tempetarure of 59°F, total duration of exposure may not exceed 60 minutes without drying and rewarming.
“The minimum permissible temperature of the water used in water dousing is 41°F, though you have informed us that in practice the water temperature is generally not below 50°F, since tap water rather than refrigerated water is generally used.” [Office of Legal Counsel, 5/10/2005 pdf file; CNN, 4/17/2009]
Waterboarding Used More Frequently than Authorized - Bradbury also notes that waterboarding is sometimes used more times than authorized or indicated. Referring to an as-yet-unreleased 2004 report by the CIA’s inspector general on torture and abuse of detainees, he writes: “The IG report noted that in some cases the waterboard was used with far greater frequency than initially indicated.… (‘[T]he waterboard technique… was different from the technique described in the DoJ [Department of Justice] opinion and used in the SERE training (see December 2001 and July 2002). The difference was the manner in which the detainee’s breathing was obstructed. At the SERE school and in the DoJ opinion, the subject’s airflow is disrupted by the firm application of a damp cloth over the air passages; the interrogator applies a small amount of water to the cloth in a controlled manner. By contrast, the [CIA] interrogator… applied large volumes of water to a cloth that covered the detainee’s mouth and nose. One of the psychologists/interrogators acknowledged that the agency’s use of the technique is different from that used in SERE training because it is ‘for real—and is more poignant and convincing.’)… The inspector general further reported that ‘OMS [the CIA’s Office of Medical Services] contends that the expertise of the SERE waterboard experience is so different from the subsequent agency usage as to make it almost irrelevant. Consequently, according to OMS, there was no a priori reason to believe that applying the waterboard with the frequency and intensity with which it was used by the psychologist/interrogators was either efficacious or medically safe.‘… We have carefully considered the IG report and discussed it with OMS personnel. As noted, OMS input has resulted in a number of changes in the application of the waterboard, including limits on frequency and cumulative use of the technique. Moreover, OMS personnel are carefully instructed in monitoring this technique and are personally present whenever it is used.… Indeed, although physician assistants can be present when other enhanced techniques are applied, ‘use of the waterboard requires the presence of the physician.’” [Office of Legal Counsel, 5/10/2005 pdf file]

Entity Tags: US Department of Justice, Steven Bradbury, Central Intelligence Agency, Office of Legal Counsel (DOJ), American Civil Liberties Union

Timeline Tags: Civil Liberties

Ali Soufan.Ali Soufan. [Source: CBS News]Ali Soufan resigns from the FBI. As an Arabic-speaking Muslim who joined the FBI long before 9/11 (see November 1997), Soufan has become one of the FBI’s best interrogators and experts on al-Qaeda. However, in a 2011 book, he will claim that he grew increasingly frustrated due to the CIA’s opposition to his work. “It was… clear that some high-level people at the time were specifically targeting me—I was told that by more than a few FBI executives and CIA colleagues,” he will write. “Ever since I had been interviewed by the 9/11 Commission, I was a marked man.” In 2004, Soufan gave information to the 9/11 Commission that made the CIA look bad. He will claim there were instances when the FBI wanted him to go overseas as part of an investigation but the CIA tried to prevent him from doing so. [Soufan, 2011, pp. 515-517, 522-523]

Entity Tags: Federal Bureau of Investigation, Ali Soufan, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

Steven Bradbury, the acting head of the Justice Department’s Office of Legal Counsel, issues a classified memo. The contents and the recipient remain secret, but the American Civil Liberties Union (ACLU) will later determine the memo deals with the use of “enhanced interrogation techniques” by the CIA. In early May, Bradbury determined that none of the CIA’s past or present interrogation methods violated either federal or international standards (see May 10, 2005). [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: Office of Legal Counsel (DOJ), American Civil Liberties Union, US Department of Justice, Steven Bradbury

Timeline Tags: Civil Liberties

W. Mark Felt.W. Mark Felt. [Source: Life Distilled.com]The identity of “Deep Throat,” the Watergate source made famous in Carl Bernstein and Bob Woodward’s book All the President’s Men, is revealed to have been W. Mark Felt, who at the time was the deputy director of the FBI. As “Deep Throat,” Felt provided critical information and guidance for Bernstein and Woodward’s investigations of the Watergate conspiracy for the Washington Post. Felt’s identity has been a closely guarded secret for over 30 years; Woodward, who knew Felt, had repeatedly said that neither he, Bernstein, nor then-editor Ben Bradlee would release any information about his source’s identity until after his death or until Felt authorized its revelation. Felt’s family confirms Felt’s identity as “Deep Throat” in an article published in Vanity Fair. Felt, 91 years old, suffers from advanced senile dementia. Felt’s character as the romantic government source whispering explosive secrets from the recesses of a Washington, DC, parking garage was burned into the American psyche both by the book and by actor Hal Holbrook’s portrayal in the 1976 film of the same name. Woodward says that Holbrook’s portrayal captured Felt’s character both physically and psychologically. [Washington Post, 6/1/2005] Bernstein and Woodward release a joint statement after the Vanity Fair article is published. It reads, “W. Mark Felt was Deep Throat and helped us immeasurably in our Watergate coverage. However, as the record shows, many other sources and officials assisted us and other reporters for the hundreds of stories written in the Washington Post.” [Woodward, 2005, pp. 232]
Surveillance Methods to Protect Both Felt and Woodward - Felt used his experience as an anti-Nazi spy hunter for the FBI to set up secret meetings between himself and the young reporter (see August 1972). “He knew he was taking a monumental risk,” says Woodward. Woodward acknowledges that his continued refusal to reveal Felt’s identity has played a key role in the advancement of his career as a journalist and author, as many sources trust Woodward to keep their identities secret as he did Felt’s.
Obscuring the Greater Meaning - Bernstein cautions that focusing on Felt’s role as a “deep background” source—the source of the nickname, which references a popular 1970s pornographic movie—obscures the greater meaning of the Watergate investigation. “Felt’s role in all this can be overstated,” Bernstein says. “When we wrote the book, we didn’t think his role would achieve such mythical dimensions. You see there that Felt/Deep Throat largely confirmed information we had already gotten from other sources.” [Washington Post, 6/1/2005] Felt was convicted in 1980 of conspiring to violate the civil rights of domestic dissidents belonging to the Weather Underground movement in the early 1970s; Felt was pardoned by then-President Ronald Reagan. [Woodward, 2005, pp. 146-147] At that time, Felt’s identity as “Deep Throat” could have been revealed, but was not.
Felt, Daughter Decide to Go Public - The Vanity Fair article is by Felt family lawyer John D. O’Connor, who helped Felt’s daughter Joan coax Felt into admitting his role as “Deep Throat.” O’Connor’s article quotes Felt as saying, “I’m the guy they used to call Deep Throat.” O’Connor says he wrote the article with the permission of both Felt and his daughter. Woodward has been reluctant to reveal Felt’s identity, though he has already written an as-yet unpublished book about Felt and their relationship, because of his concerns about Felt’s failing health and increasingly poor memory. The Washington Post’s editors concluded that with the publication of the Vanity Fair article, they were not breaking any confidences by confirming Felt’s identity as Woodward’s Watergate source. [Washington Post, 6/1/2005]
Endless Speculation - The identity of “Deep Throat” has been one of the enduring political mysteries of the last 30 years. Many observers, from Richard Nixon to the most obscure Internet sleuth, have speculated on his identity. Watergate-era figures, including then-Secretary of State Henry Kissinger, Nixon speechwriter Pat Buchanan, Nixon deputy counsel Fred Fielding, Nixon chief of staff Alexander Haig, National Security Council staffers Laurence Lynn and Winston Lord, then-CBS reporter Diane Sawyer, and many others, have been advanced as possibilities for the source. Former White House counsels John Dean and Leonard Garment, two key Watergate figures, have written extensively on the subject, but both have been wrong in their speculations. In 1992, Atlantic Monthly journalist James Mann wrote that “Deep Throat” “could well have been Mark Felt.” At the time, Felt cautiously denied the charge, as he did in his 1979 memoir, The FBI Pyramid. [Woodward, 2005, pp. 153-156; Washington Post, 6/1/2005] In 1999, the Hartford Courant published a story saying that 19-year old Chase Coleman-Beckman identified Felt as “Deep Throat.” Coleman-Beckman had attended a day camp with Bernstein’s son Josh a decade earlier, and Josh Bernstein then told her that Felt was Woodward’s source. Felt then denied the charge, telling a reporter: “No, it’s not me. I would have done better. I would have been more effective. Deep Throat didn’t exactly bring the White House crashing down, did he?” Woodward calls Felt’s response a classic Felt evasion. [Woodward, 2005, pp. 158-159]
Motivated by Anger, Concern over Politicization of the FBI - Woodward believes that Felt decided to become a background source for several reasons both personal and ideological. Felt, who idealized former FBI Director J. Edgar Hoover, was angered that he was passed over for the job upon Hoover’s death; instead, the position went to L. Patrick Gray, whom Felt considered both incompetent and far too politically aligned with the Nixon White House. The FBI could not become an arm of the White House, Felt believed, and could not be allowed to help Nixon cover up his participation in the conspiracy. He decided to help Woodward and Bernstein in their often-lonely investigation of the burgeoning Watergate scandal. Woodward and Bernstein never identified Felt as anyone other than “a source in the executive branch who had access” to high-level information. Felt refused to be directly quoted, even as an anonymous source, and would not give information, but would merely confirm or deny it as well as “add[ing] some perspective.” Some of Woodward and Felt’s conversations were strictly business, but sometimes they would wax more philosophical, discussing, in the words of the book, “how politics had infiltrated every corner of government—a strong-arm takeover of the agencies by the Nixon White House…. [Felt] had once called it the ‘switchblade mentality’—and had referred to the willingness of the president’s men to fight dirty and for keeps…. The Nixon White House worried him. ‘They are underhanded and unknowable,’ he had said numerous times. He also distrusted the press. ‘I don’t like newspapers,’ he had said flatly.” [Woodward, 2005, pp. 167-215; Washington Post, 6/1/2005]

Entity Tags: Diane Sawyer, W. Mark Felt, Vanity Fair, Ronald Reagan, Carl Bernstein, Weather Underground, Winston Lord, Chase Coleman-Beckman, Alexander M. Haig, Jr., Ben Bradlee, Bob Woodward, Patrick Buchanan, Nixon administration, Washington Post, Laurence Lynn, Fred F. Fielding, Hartford Courant, Henry A. Kissinger, Federal Bureau of Investigation, James Mann, J. Edgar Hoover, John D. O’Connor, Joan Felt, Josh Bernstein, L. Patrick Gray, Leonard Garment, John Dean

Timeline Tags: Nixon and Watergate

The FBI and Justice Department quietly open an investigation into whether Representative Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee, improperly colluded with the American Israel Public Affairs Committee (AIPAC) to win reappointment as the committee’s ranking member. The investigation is not revealed to the public until October 2006 (see October 20, 2006). The investigation centers on allegations that Harman and AIPAC arranged for wealthy supporters to lobby House Minority Leader Nancy Pelosi (D-CA) on Harman’s behalf. The case is an outgrowth of a probe that has already led to the felony conviction of former DIA official Larry Franklin, who pled guilty to giving classified information to two AIPAC lobbyists (see October 5, 2005), and the lobbyists, Steve Rosen and Keith Weissman, who still face charges of passing that information on to Israel (see April 13, 1999-2004). The investigation has now expanded to determine if Harman’s campaign to persuade Pelosi to reappoint her to the committee may have involved AIPAC, and whether Harman promised to return the favor by using her influence to persuade the Justice Department to ease up on the AIPAC lobbyists. Reporter Timothy Burger will write: “If that happened, it might be construed as an illegal quid pro quo, depending on the context of the situation. But the sources caution that there has been no decision to charge anyone and that it is unclear whether Harman and AIPAC acted on the idea.” Both Harman and Pelosi are outspoken supporters of Israel, and have praised AIPAC for its efforts to further cement ties between Israel and the US. However, Congressional sources will say that Pelosi is furious at attempts by major donors to lobby on behalf of Harman. The LA Weekly reported in May that Harman “had some major contributors call Pelosi to impress upon her the importance of keeping Jane in place. According to these members, this tactic, too, hasn’t endeared Harman to Pelosi.” Another powerful figure has lobbied for Harman: entertainment industry billionaire Haim Saban, who made his fortune through the Mighty Morphin Power Rangers children’s entertainment franchise. It is unclear whether Saban had any contact with AIPAC, and if his efforts to lobby on Harman’s behalf were part of a larger, more orchestrated plan. [Time, 10/20/2006] When the story becomes public in October 2006, Harman will deny any improper or illegal conduct (see October 20, 2006). The investigation will eventually be dropped, supposedly for “lack of evidence.” In April 2009, evidence will surface that the NSA wiretapped Harman discussing a quid pro quo with a suspected Israeli agent, and that the investigation was not dropped because of lack of evidence, but because of the intervention of Attorney General Alberto Gonzales (see October 2005, Late 2005, and April 19, 2009). [Congressional Quarterly, 4/19/2009]

Entity Tags: Nancy Pelosi, Haim Saban, Federal Bureau of Investigation, American Israel Public Affairs Committee, Alberto R. Gonzales, House Intelligence Committee, Jane Harman, Steve Rosen, Timothy Burger, US Department of Justice, Keith Weissman, National Security Agency, Larry Franklin

Timeline Tags: Civil Liberties

In a Columbus, Ohio, speech praising the USA Patriot Act (see October 26, 2001), President Bush claims that when US government agencies wiretap anyone’s phones or email communications, they do so with a court order. Bush says: “Before the Patriot Act, agents could use wiretaps to investigate a person committing mail fraud, but not to investigate a foreign terrorist. The Patriot Act corrected all these pointless double standards—and America is safer as a result. One tool that has been especially important to law enforcement is called a roving wiretap. Roving wiretaps allow investigators to follow suspects who frequently change their means of communications. These wiretaps must be approved by a judge, and they have been used for years to catch drug dealers and other criminals. Yet, before the Patriot Act, agents investigating terrorists had to get a separate authorization for each phone they wanted to tap. That means terrorists could elude law enforcement by simply purchasing a new cell phone. The Patriot Act fixed the problem by allowing terrorism investigators to use the same wiretaps that were already being using against drug kingpins and mob bosses. The theory here is straightforward: If we have good tools to fight street crime and fraud, law enforcement should have the same tools to fight terrorism.” [White House, 6/9/2005] Bush made almost identical claims a year ago (see April 19-20, 2004). The same day as Bush makes his speech, the White House issues a fact sheet making the same claims (see June 9, 2005). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48]

Entity Tags: Mark Klein, George W. Bush, National Security Agency, USA Patriot Act

Timeline Tags: Civil Liberties

Steven Bradbury.Steven Bradbury. [Source: Mark Wilson / Getty Images]Steven Bradbury is nominated by President Bush to head the Justice Department’s Office of Legal Counsel (OLC). He will continue in that position on an acting basis into 2008, even though Congressional Democrats refuse to confirm him for the job, and even though his continuation in the post violates the Vacancies Reform Act, which precludes non-confirmed appointees for holding their positions for over 210 days (see October 16, 2007). [Washington Times, 9/20/2007; New York Times, 10/4/2007; TPM Muckraker, 10/19/2007] Bradbury takes over from Jack Goldsmith, who resigned the position under fire (see June 17, 2004).
Arm of the White House - Bradbury has a long history of supporting the White House’s agenda of expansive executive power. He came to the Justice Department after clerking with Supreme Court Justice Clarence Thomas and mentoring under former Whitewater special counsel Kenneth Starr. [New York Times, 10/4/2007] A co-founder of the Federalist Society [International Herald Tribune, 10/15/2007] , he is as staunchly conservative as any Bush appointee, but unlike some of the more outspoken of his colleagues, he comes across as low-key, pragmatic, and non-confrontational. As a Justice Department lawyer, Bradbury proved himself in line with the neoconservative views of Vice President Dick Cheney and Cheney’s chief of staff, David Addington. Former State Department senior official Philip Zelikow recalls Bradbury as being “fundamentally sympathetic to what the White House and the CIA wanted to do.” Bradbury was brought in to the OLC in part to rein in that office, which under its previous head Jack Goldsmith became the hub of the internal opposition to Bush’s policies of “enhanced interrogation” and domestic surveillance (see Late 2003-2005). In 2005, Bradbury signs two secret Justice Department memos giving broad authorization and legal justification for the CIA’s torture of terrorist suspects (see February 2005 and Late 2005),. Bradbury works closely with then-White House counsel and current attorney general Alberto Gonzales to bring the Justice Department back into line with White House demands. Conservative legal scholar Douglas Kmiec, who headed the OLC under former presidents Reagan and George H. W. Bush, says he believes the intense pressures from the current administration’s campaign against terrorism has warped the OLC’s proper role. “The office was designed to insulate against any need to be an advocate,” Kmiec says. Now the OLC has “lost its ability to say no.… The approach changed dramatically with opinions on the war on terror. The office became an advocate for the president’s policies.”
Probation - Bradbury was first considered for the job after Gonzales, newly confirmed as attorney general, rejected the idea of promoting Daniel Levin, the acting head of the OLC after Goldsmith’s departure. Gonzales considered Levin unsuitable for the job because of his independence and support for Goldsmith’s dissents. Instead, Gonzales chose Bradbury for the job. But the White House was uncertain of Bradbury’s reliability, and so placed him on a sort of “internal trial,” monitored by Gonzales’s replacement at the White House, Harriet Miers. Miers judged Bradbury’s loyalty to the president and his willingness to work with Gonzales in justifying White House policy decisions. Bradbury reportedly understands that his “probation” is intended for him to show just how compliant and supportive he is of the White House, and he soon wins the confidence of the White House by completely aligning himself with Addington. [New York Times, 10/4/2007]
'Sordid criminal conspiracy' - Harper’s Magazine commentator and lawyer Scott Horton will write in November 2007 that it is obvious “Bradbury was picked for one reason: to provide continuing OLC cover for the torture conspirators.… The Justice Department’s strategy has been to cloak Bradbury’s torture memoranda in secrecy classifications and then to lie aggressively about their very existence.… This episode demonstrates once more the intimate interrelationship between the policies of torture, secrecy, and the right to lie to the public and the courts in the interests of shielding the Bush administration from public embarrassment. And once more the Justice Department is enlisted not in the enforcement of the law, but rather in a sordid criminal conspiracy.” [Harper's, 11/7/2007]

Entity Tags: Kenneth Starr, Richard (“Dick”) Cheney, National Security Agency, Philip Zelikow, US Department of Justice, Steven Bradbury, Scott Horton, Vacancies Reform Act, James B. Comey Jr., Jack Goldsmith, Office of Legal Counsel (DOJ), Harper’s Magazine, Clarence Thomas, Central Intelligence Agency, Bush administration (43), Daniel Levin, Alberto R. Gonzales, Harriet E. Miers, Geneva Conventions, Douglas Kmiec, David S. Addington, George Herbert Walker Bush

Timeline Tags: Civil Liberties

Donald Shepperd, on the June 24 CNN broadcast.Donald Shepperd, on the June 24 CNN broadcast. [Source: CNN]Within hours of returning from a Pentagon-sponsored “fact-finding” trip to the Guantanamo detention facility (see June 24-25, 2005), CNN military analyst Don Shepperd, as planned (see June 25, 2005), extolls the virtues of the Pentagon’s handling of detainees on a lineup of CNN news broadcasts. As per his most recent briefing, he does not mention the case of Mohammed al-Khatani (see August 8, 2002-January 15, 2003), who has suffered extensive brutality at the hands of his captors. Instead, his “analyses” are so uniformly laudatory that, as commentator Glenn Greenwald will observe, they are “exactly what it would have been had [Defense Secretary Donald] Rumsfeld himself written the script.” After returning from his half-day visit, he participates in a live telephone interview with CNN anchor Betty Nguyen. He opens with the observation: “I tell you, every American should have a chance to see what our group saw today. The impressions that you’re getting from the media and from the various pronouncements being made by people who have not been here, in my opinion, are totally false. What we’re seeing is a modern prison system of dedicated people, interrogators and analysts that know what they are doing. And people being very, very well-treated. We’ve had a chance to tour the facility, to talk to the guards, to talk to the interrogators and analysts. We’ve had a chance to eat what the prisoners eat. We’ve seen people being interrogated. And it’s nothing like the impression that we’re getting from the media. People need to see this, Betty.… I have been in prisons and I have been in jails in the United States, and this is by far the most professionally-run and dedicated force I’ve ever seen in any correctional institution anywhere.” Shepperd watched an interrogation, and he describes it thusly: “[T]hey’re basically asking questions. They just ask the same questions over a long period of time. They get information about the person’s family, where they’re from, other people they knew. All the type of things that you would want in any kind of criminal investigation. And these were all very cordial, very professional. There was laughing in two of them that we…” Nguyen interrupts to ask, “Laughing in an interrogation?” and Shepperd replies: “In the two of them that we watched. Yes, indeed. It’s not—it’s not like the impression that you and I have of what goes on in an interrogation, where you bend people’s arms and mistreat people. They’re trying to establish a firm professional relationship where they have respect for each other and can talk to each other. And yes, there were laughing and humor going on in a couple of these things. And I’m talking about a remark made where someone will smirk or laugh or chuckle.” In another CNN interview three days later, Shepperd reiterates and expands upon his initial remarks, and says of the detainees: “[W]e have really gotten a lot of information to prevent attacks in this country and in other countries with the information they’re getting from these people. And it’s still valuable.” CNN does not tell its viewers that Shepperd is president of The Shepperd Group, a defense lobbying and consulting firm. [CNN, 6/24/2005; Salon, 5/9/2008]

Entity Tags: The Shepperd Group, CNN, Donald Shepperd, US Department of Defense

Timeline Tags: US Military, Torture of US Captives, Iraq under US Occupation, Domestic Propaganda

Retired Air Force General Donald Shepperd, a CNN news analyst, returns from a “fact-finding” trip to Guantanamo Bay (see June 24-25, 2005) prepared to provide Pentagon talking points to CNN audiences. Shepperd is remarkably candid about his willingness to serve as a Pentagon propagandist, writing in a “trip report” he files with his handlers, “Did we drink the ‘Government Kool-Aid?’—of course, and that was the purpose of the trip.” He acknowledges that “a one day visit does not an expert make” (Shepperd and his fellow analysts spent less than four hours touring the entire facility, all in the company of Pentagon officials), and notes that “the government was obviously going to put its best foot forward to get out its message.” He adds that “former military visitors are more likely to agree with government views than a more appropriately skeptical press.” Shepperd also sends an e-mail to Pentagon officials praising the trip and asking them to “let me know if I can help you.” He signs the e-mail, “Don Shepperd (CNN military analyst).” Shepperd’s e-mail is forwarded to Larry Di Rita, a top public relations aide to Secretary of Defense Donald Rumsfeld. Di Rita’s reply shows just how much control the Pentagon wields over the analysts. Di Rita replies, “OK, but let’s get him briefed on al-Khatani so he doesn’t go too far on that one.” Di Rita is referring to detainee Mohammed al-Khatani (see August 8, 2002-January 15, 2003), who had been subjected to particularly brutal treatment. Shepperd will, as planned, praise the Guantanamo detainee program on CNN in the days and hours following his visit to the facility (see June 24-25, 2005). [Salon, 5/9/2008] He will say in May 2008: “Our message to them as analysts was, ‘Look, you got to get the importance of this war out to the American people.’ The important message is, this is a forward strategy, it is better to fight the war in Iraq than it is a war on American soil.” [PBS, 5/1/2008]

Entity Tags: US Department of Defense, CNN, Donald Shepperd

Timeline Tags: US Military, Torture of US Captives, Iraq under US Occupation, Domestic Propaganda

Former FBI Director L. Patrick Gray, who resigned under fire during the Watergate investigation (see April 27-30, 1973), appears on ABC’s This Week to respond to the recent revelation that his then-deputy, W. Mark Felt, was the notorious informant “Deep Throat” (see May 31, 2005). Thirty years before, Felt had lied to Gray when asked if he had leaked information to the press (see October 19, 1972). Gray, whose health is in serious decline, airs decades’ worth of pent-up grievances against both Felt and the Nixon administration, which he says left him to “twist slowly, slowly in the wind” (Nixon aide John Ehrlichman’s words—see Late March, 1973) after he admitted giving information about the Watergate investigation to White House staffers (see June 28, 1972 and July 21, 1972). He felt “anger, anger of the fiercest sort” after hearing Ehrlichman’s words, and adds, “I could not believe that those guys were as rotten as they were turning out to be.” He was justified in burning key White House documents instead of turning them over to the FBI (see Late December 1972), he says, because the documents were unrelated to the Watergate investigation. Learning that Felt, his trusted deputy, was “Deep Throat” was, Gray says, “like [being] hit with a tremendous sledgehammer.” Gray says that if he could, he would ask Felt: “Mark, why? Why didn’t you come to me? Why didn’t we work it out together?” Gray says he now realizes that he could not stop the FBI from leaking information to the press because Felt was in charge of stopping the leaks. “I think he fooled me… by being the perfect example of the FBI agent that he was.… He did his job well, he did it thoroughly, and I trusted him all along, and I was, I can’t begin to tell you how deep was my shock and my grief when I found that it was Mark Felt.” Two weeks after the interview, Gray will die of cancer. [New York Times, 6/26/2005; Roberts, 2008, pp. 151] After Gray’s death, his son Ed Gray will call his father “the only wholly honest” man involved in Watergate. [Associated Press, 7/6/2005]

Entity Tags: Nixon administration, Ed Gray, ABC News, Federal Bureau of Investigation, L. Patrick Gray, W. Mark Felt, John Ehrlichman

Timeline Tags: Nixon and Watergate

Gordon Cucullu.Gordon Cucullu. [Source: The Intelligence Summit]“Independent military analyst” Gordon Cucullu, a former Green Beret, is an enthusiastic participant in the Pentagon’s Iraq propaganda operation (see April 20, 2008 and Early 2002 and Beyond). Cucullu has just returned from a half-day tour of the Guantanamo detention facility (see June 24-25, 2005), and is prepared to give the Pentagon’s approved message to the media.
Talking Points Covered in Fox Appearance - In an e-mail to Pentagon official Dallas Lawrence, he alerts the department to a new article he has written for conservative Website FrontPage, and notes that he has appeared on an early-morning broadcast on Fox News and delivered the appropriate talking points: “I did a Fox & Friends hit at 0620 this morning. Good emphasis on 1) no torture, 2) detainees abuse guards, and 3) continuing source of vital intel.” [Salon, 5/9/2008]
Op-Ed: Pampered Detainees Regularly Abuse Guards - In the op-ed for FrontPage, entitled “What I Saw at Gitmo,” he writes that the US is being “extraordinarily lenient—far too lenient” on the detainees there. There is certainly abuse going on at Guantanamo, Cucullu writes—abuse of soldiers by the detainees. Based on his three-hour tour of the facility, which included viewing one “interrogation” and touring an unoccupied cellblock, Cucullu says that the detainees “fight their captors at every opportunity” and spew death threats against the soldiers, their families, and Americans in general. The soldiers are regularly splattered with “feces, urine, semen, and spit.” One detainee reportedly told another, “One day I will enjoy sucking American blood, although their blood is bitter, undrinkable.” US soldiers, whom Cucullu says uniformly treat the detainees with courtesy and restraint (see August 8, 2002-January 15, 2003), are constantly attacked by detainees who wield crudely made knives, or try to “gouge eyes and tear mouths [or] grab and break limbs as the guards pass them food.” In return, the detainees are given huge meals of “well-prepared food,” meals which typically overflow from two styrofoam containers. Many detainees insist on “special meal orders,” and throw fits if their meals are not made to order. The level of health care they are granted, Cucullu says, would suit even the most hypochondriac American. Cucullu writes that the detainees are lavished with ice cream treats, granted extended recreational periods, live in “plush environs,” and provided with a full array of religious paraphernalia. “They are not abused, hanged, tortured, beheaded, raped, mutilated, or in any way treated the way that they once treated their own captives—or now treat their guards.” The commander, Brigadier General Jay Hood, tells Cucullu that such pampered treatment provides better results than harsher measures. “Establishing rapport” is more effective than coercion, Hood says, and, in Cucullu’s words, Hood “refers skeptics to the massive amount of usable intelligence information [the detainees] produce even three years into the program.” In conclusion, Cucullu writes, the reader is “right to worry about inhumane treatment” at Guantanamo, but on behalf of the soldiers, not the detainees. [FrontPage Magazine, 6/27/2005]

Entity Tags: US Department of Defense, Dallas Lawrence, Fox News, FrontPage Magazine, Gordon Cucullu, Jay W. Hood

Timeline Tags: US Military, Torture of US Captives, Iraq under US Occupation, Domestic Propaganda

Months after the Bush administration successfully convinced the New York Times to hold off publishing its report on the administration’s warrantless wiretapping program (see Early November 2004, December 6, 2005, and December 15, 2005), one of the reporters on the story, Eric Lichtblau, attempts to get a response on the program from one of the few Democrats briefed on it, House Intelligence Committee ranking member Jane Harman (D-CA). In his 2008 book Bush’s Law: The Remaking of American Justice, Lichtblau will write about covering a House hearing where Harman launches into a passionate call for stronger civil liberties safeguards in the reauthorization of the USA Patriot Act (see March 9, 2006). According to his recollection, Lichtblau approaches Harman and says, “I’m trying to square what I heard in there with what we know about that program.” He will write: “Harman’s golden California tan turned a brighter shade of red. She knew exactly what I was talking about. Shooing away her aides, she grabbed me by the arm and drew me a few feet away to a more remote section of the Capitol corridor. ‘You should not be talking about that here,’ she scolded me in a whisper. ’ They don’t even know about that,’ she said, gesturing to her aides, who were now looking on at the conversation with obvious befuddlement.” Harman tells Lichtblau, “The Times did the right thing by not publishing that story,” but will not discuss the details. When asked what intelligence capabilities would be lost by informing the public about something the terrorists already knew—that the government was listening to them—she simply replies, “This is a valuable program, and it would be compromised.” Lichtblau will add: “This was clearly as far as she was willing to take the conversation, and we didn’t speak again until months later, after the NSA story had already run. By then, Harman’s position had undergone a dramatic transformation. When the story broke publicly, she was among the first in line on Capitol Hill to denounce the administration’s handling of the wiretapping program, declaring that what the NSA was doing could have been done under the existing FISA law.” [TPM Muckraker, 3/19/2008]

Entity Tags: Eric Lichtblau, Bush administration (43), New York Times, House Intelligence Committee, Jane Harman

Timeline Tags: Civil Liberties

The Pentagon, tracking every bit of media coverage provided by the “independent military analysts” who are part of its Iraq propaganda program (see April 20, 2008 and Early 2002 and Beyond), is particularly pleased with the results of its half-day tour of Guantanamo for selected analysts (see June 24-25, 2005). Its tracking (see 2005 and Beyond) finds that Lieutenant Colonel Gordon Cucullu (see June 27, 2005) receives the most coverage during the almost two weeks after the tour, followed by Major General Donald Shepperd (see June 24-27, 2005). In all, the analysts made 37 media appearances. They emphasized the following talking points:
Prisoner/Guard Abuse -
bullet “Most abuse is either toward US military personnel and/or between prisoners.”
bullet “US military guards are regularly threatened by prisoners.”
bullet “Some analysts stated there may have been past abuses at Gitmo but not now.”
'Prisoner Interrogations' -
bullet “Interrogators are building relationships with prisoners, not torturing them.”
bullet “We are still gaining valuable information from prisoners.”
bullet Interrogations are very professionally run.”
'Quality of Prisoner Care' -
bullet “Prisoners are given excellent treatment, including provision of any and all religious paraphernalia.”
bullet “Special dietary requests are routinely granted.”
'Closing Gitmo' -
bullet “Gitmo exceeds Geneva Convention requirements.”
bullet “We should not close this facility and let dangerous terrorists out.” [Salon, 5/9/2008]

Entity Tags: Gordon Cucullu, Geneva Conventions, Donald Shepperd, US Department of Defense

Timeline Tags: US Military, Torture of US Captives, Iraq under US Occupation, Domestic Propaganda

Washington Post reporter Bob Woodward gives an interview to NPR’s Terry Gross about the so-called “Plamegate” scandal. Woodward is dismissive of the entire imbroglio. “There was no nothing” to the story, he says. When “all of the facts come out in this case, it’s going to be laughable because the consequences are not that great.” Woodward does not divulge that he was perhaps the first reporter to have Valerie Plame Wilson’s name leaked to him (see June 13, 2003). Woodward’s dismissive attitude towards the affair is addressed by author and media critic Frank Rich, who writes in 2006: “The Wilsons were nobodies—not players, not part of the tight club to which Woodward and his blue-chip sources belonged. Yet, while Woodward was tone-deaf to the Watergate echoes in the Bush White House’s obsessive secrecy, in its detestation of the press, and in its flouting of the law, the parallels were striking to anyone outside the Beltway.” [American Prospect, 12/18/2005; Rich, 2006, pp. 181-182] In December, American Prospect reporter Todd Gitlin will write that Woodward “publicly and repeatedly sneered” at the Plame Wilson investigation. [American Prospect, 12/18/2005] Woodward says much the same things in private. In a conversation with his friend and former colleague Carl Bernstein around the same time as the NPR interview, he asks: “Why do you keep insisting this is important? I know something about this. There’s nothing there.” Woodward is deeply involved in writing his next book, Plan of Attack, and has little time or patience for what he considers a partisan non-scandal. Additionally, he and Bernstein are frequently together, conducting interviews for their recent book about their Watergate source, W. Mark Felt (see May 31, 2005), and often find themselves in conversations about confidential sources. Bernstein believes Woodward is ignoring something worth watching. “You don’t have this right,” he tells Woodward. “This thing is going to be huge. It will shine a light on the way Bush’s White House operates. It is going to expose the president and his campaign of disinformation.” [Vanity Fair, 4/2006]

Entity Tags: Valerie Plame Wilson, Todd Gitlin, Frank Rich, Carl Bernstein, Bob Woodward, Bush administration (43), Terry Gross, W. Mark Felt

Timeline Tags: Domestic Propaganda, Niger Uranium and Plame Outing

Convicted Oklahoma City bombing conspirator Terry Nichols (see 8:35 a.m. - 9:02 a.m. April 19, 1995, August 10, 1995, June 4, 1998, and May 26, 2004) has said that he believes his co-conspirator, Timothy McVeigh (see 7:14 a.m. June 11, 2001), was involved with a white supremacist compound in eastern Oklahoma, Elohim City (see (April 1) - April 18, 1995). Nichols’s statements to the FBI, a US congressman, and his family are now being reported by The Oklahoman. Representative Dana Rohrbacher (R-CA), who met with Nichols on June 27, 2005 at the federal prison in Florence, Colorado, says: “He said he was driving past it one time and Tim McVeigh knew everything about Elohim City, just told him all about it. And he said on a number of occasions… Tim McVeigh mentioned his friend, Andy the German, who lives at Elohim City.… So there was a strong indication that Tim McVeigh had much more than just a minor association with some of the people at Elohim City.” “Andy the German” is Andreas Strassmeir, a former German soldier who helped coordinate security at Elohim City (see 1973 and After). Strassmeir has admitted meeting McVeigh at a 1993 Tulsa gun show (see April 1993), but has said he never saw or spoke with him again. Strassmeir has denied any role in the bombing (see November 1994), as has Elohim City leader Robert Millar (see May 24, 1995). The FBI investigated Elohim City after discovering McVeigh called there two weeks before the bombing (see April 5, 1995), and ruled out the residents as suspects (see February 1995). The bureau never found conclusive proof that McVeigh ever visited there, though other sources found that McVeigh and Nichols had visited there in late 1993 (see October 12, 1993 - January 1994) and learned that McVeigh took part in paramilitary exercises there in late 1994 (see September 12, 1994 and After). For years, many have speculated that Strassmeir and other Elohim City residents may have played a part in the bombing; Rohrbacher says he is considering holding Congressional hearings on the possibility, and says he asked Nichols specifically about those theories. Former federal informant Carole Howe has claimed she saw McVeigh and Strassmeir together at Elohim City in July 1994, and has said Strassmeir talked about blowing up federal buildings in Oklahoma (see August 1994 - March 1995 and November 1994). Federal prosecutors did not believe Howe’s claims. [The Oklahoman, 7/10/2005] A precursor of the McVeigh-Nichols bomb plot was hatched in 1983 by Elohim City residents (see 1983). Some believe that Strassmeir may have been McVeigh’s alleged co-conspirator identified only as “John Doe No. 2” (see June 14, 1995), even though federal authorities have said that person was not involved with Nichols or McVeigh (see January 29, 1997). McVeigh told his friend Michael Fortier that he planned the Oklahoma City bombing with input from people at Elohim City (see December 1994). Less than two weeks before the bombing, McVeigh went to a strip club with people from Elohim City, including Strassmeir (see April 8, 1995).

Entity Tags: Michael Joseph Fortier, Andreas Strassmeir, Carole Howe, Elohim City, Robert Millar, Terry Lynn Nichols, Timothy James McVeigh, Dana Rohrbacher

Timeline Tags: US Domestic Terrorism

George Christian.George Christian. [Source: PBS]Librarian and data manager George Christian is served with a so-called “National Security Letter” (NSL) from the FBI demanding that his firm turn over private information on its patrons because of an apparent terrorist threat e-mailed from one of his libraries (see February 2005). Christian is the executive director of Library Connection, Inc., which manages catalog information, patron records, and circulation information for 27 libraries in and around Hartford, Connecticut, as well as providing telecommunications services to many of its member libraries. Christian is given the NSL, as well as a gag order preventing them from ever mentioning their receipt of the letter, or any details surrounding it. Christian is notified of the letter five days before actually receiving it; he spends those days frantically learning more about NSLs and the laws surrounding them (see October 25, 2005). He learns that a district court in New York had found the entire NSL statute unconstitutional because of what Christian calls “prima facie violations of the 1st, 4th and 5th amendments.” By the time they receive the letter, he has decided to oppose it. The letter, delivered by two FBI agents, orders Christian and Library Connection to turn over information about a specific IP address registered to the firm. One of the agents warns Christian that the gag order prohibits anyone in the firm from telling anyone that the FBI is attempting to secure information from its library business records. Christian, who will testify before the Senate Judiciary Committee about the NSL in April 2007 (see April 11, 2007), says neither he nor his colleagues could “fathom any ‘exigent’ nature for the FBI request.” The letter was dated May 19, nearly two months before its delivery, was not addressed to Christian, and requested information from the use of the IP address five months earlier, February 15. Christian later says that while he and his colleagues want to assist the FBI in any way they can, and have no desire to “impede the investigation of a perilous situation that endanger[s] my country or my fellow citizens,” because of the date of the letter and the IP usage, they conclude that the FBI has not been in any rush to get the information. Christian tells the FBI agents that he believes the use of NSLs is unconstitutional and that he will consult his attorney. Library Connection’s attorney says that the only way to contest compliance with an NSL is to take the Attorney General, Alberto Gonzales, to court. Christian is understandably reluctant to involve his firm in such a court challenge without authorization, and takes the case to the Executive Committee of the firm’s board of directors. The three members, Barbara Bailey, Peter Chase, and Janet Nocek (who will soon be dubbed the “Connecticut Four” by the media), after conferring with the attorney and reviewing the New York court’s decision against NSLs, decide to go forward with the complaint. They secure representation from the American Civil Liberties Union (ACLU). Together, they decide to ask for relief from the NSL, to seek a broader ruling that the use of NSLs is unconstitutional, and to have the gag order lifted so they can publicly discuss the incident as “part of the national debate over renewal of the Patriot Act” (see March 9, 2006). Christian will tell the Senate Judiciary Committee, “We… felt we were defending our democracy by insisting that the checks and balances established in the Constitution be observed. We had no court order, and there was no evidence that an independent judge had examined the FBI’s evidence and found there to be probable cause justifying their request for information.… [W]e did not want to aid terrorists or criminals.… But we did not feel we would be helping the country or making anyone safer by throwing out the Constitution either.” Because of the way the computer system is set up, to give the FBI the information about the specific IP address and usage it required, Christian would have to give the FBI information about everyone using every computer in the particular library on the day in question. He later says, “[S]ince there was no way of determining who was using the computers in the library five months after the fact, we felt that [the FBI wanted] information we had on all the patrons of that library. That seemed like a rather sweeping request. Some would call it a fishing expedition.” The case goes to trial in August 2005 (see August 2005-May 2006). [Senate Judiciary Committee, 4/11/2007] It is later learned that the original e-mailed threat is a hoax. [USA Today, 7/6/2006]

Entity Tags: Peter Chase, National Security Letters, Senate Judiciary Committee, Library Connection, Inc., Barbara Bailey, George Christian, American Civil Liberties Union, Janet Nocek, Alberto R. Gonzales, Federal Bureau of Investigation, Connecticut Four

Timeline Tags: Civil Liberties

The Connecticut Four, from left to right: Janet Nocek, Peter Chase, George Christian, and Barbara Bailey.The Connecticut Four, from left to right: Janet Nocek, Peter Chase, George Christian, and Barbara Bailey. [Source: Robert Deutsch/ USA Today]A case filed against Attorney General Alberto Gonzales by four plaintiffs from Connecticut’s Library Connection, Inc.—George Christian, Barbara Bailey, Peter Chase, and Janet Nocek—goes to trial in federal district court (see July 13, 2005). The trial is filed as Doe v. Gonzales because the government has filed a gag order against the plaintiffs forbidding them from identifying themselves or discussing the case publicly. The case involves a demand for information from the FBI for information concerning library usage by patrons of a Connecticut library; the four plaintiffs, on behalf of their data management firm Library Connection, have refused. The case revolves around the use of a National Security Letter (NSL) by the FBI; the plaintiffs, with support from the American Civil Liberties Union, want the NSL voided, the gag order lifted, and such use of NSLs found unconstitutional. Christian and his three colleagues are not allowed to attend the hearings in person because of the possibility that they might be identified as the plaintiffs; they are forced to watch the proceedings on a closed-circuit broadcast from a locked room in the Hartford courthouse. When the judge in the proceeding asks to review the government’s evidence for keeping the gag rule in place, Justice Department lawyers insist on submitting secret evidence directly to the judge, without providing that evidence to the plaintiff’s lawyers. The judge is not pleased, and rules, as did her predecessor in New York, that a perpetual gag order amounts to prior restraint, and thereby is unconstitutional. She adds that her review of the secret evidence gives no national security rationale for keeping the plaintiffs gagged. The Justice Department immediately appeals the ruling, and the plaintiffs stay silent and gagged. While the four plaintiffs remain silent about the NSL and the court case, the Justice Department’s primary lawyer, Kevin O’Conner, does not: O’Conner has frequently debated one of the plaintiffs, Chase, about the Patriot Act, and though Chase is now required to remain silent, O’Conner continues to make frequent public appearances touting the Patriot Act. Christian later says, in 2007 testimony before the Senate Judiciary Committee (see April 11, 2007), that the continuing gag order causes the four “John Does” considerable professional and personal distress, especially after the national media begins reporting the story. The media eventually learns, through the careless redaction of information by government lawyers, of Chase’s identity as one of the four plaintiffs, and reveals that Library Connection is the firm involved in the lawsuit. Christian’s name comes to light shortly thereafter. The attorneys warn Christian and the others that even though their identities and their firm have been revealed, they still cannot comment at all on the case. Christian, for one, wants to testify before Congress in regards to the upcoming reauthorization of the Patriot Act (see March 9, 2006), but cannot. The four plaintiffs quickly become known in the media as the “Connecticut John Does” or the “Connecticut Four.”
Appeals Court - In November 2005, a New York court of appeals hears the case. Christian and his colleagues are allowed to be present at the case this time, but are required to conceal their identities by entering and leaving the court building separately, are not allowed to sit together, and are not allowed to confer with, or even make eye contact with, each other or their attorneys. The Justice Department lawyers argue that even revealing themselves as recipients of a NSL would violate national security, an argument refuted by submission of the raft of news articles identifying Christian, Chase, and Library Connection. The government argues that those news reports don’t matter because no one in Connecticut reads the primary newspaper carrying the story, the New York Times, and that surveys prove that most people don’t believe what they read in the news anyway. The Justice Department also tries to get the news articles to be kept under seal in court papers. Christian characterizes the entire proceeding as “absurd.” The court refuses to admit the plaintiff’s claim that 48 states, including Connecticut, have laws protecting the privacy of library patrons, but does admit into evidence the claims by Gonzales that there is no statutory justification for claims of privacy. In an attempt to get the gag order lifted before the Patriot Act reauthorization, the plaintiff’s attorneys make an emergency appeal directly to the Supreme Court, but are rebuffed. [Senate Judiciary Committee, 4/11/2007] In June 2006, Nocek tells a reporter, “Imagine the government came to you with an order demanding that you compromise your professional and personal principles. Imagine then being permanently gagged from speaking to your friends, your family or your colleagues about this wrenching experience.… Under the Patriot Act, the FBI demanded Internet and library records without showing any evidence or suspicion of wrongdoing to a court of law. We were barred from speaking to anyone about the matter and we were even taking a risk by consulting with lawyers.” [Interview: George Christian, 6/2/2006]
Gag Order Lifted, Case Dropped - Weeks after President Bush signs into law the Patriot Act reauthorization (see March 9, 2006), the FBI voluntarily lifts the gag order without waiting for a court order. The agency then tries to get the original ruling against the gag order vacated, an attempt that the appeals court refuses. The appellate judges are clearly disturbed by the breadth of the NSL gag provisions; one appellate judge writes, “A ban on speech and a shroud of secrecy in perpetuity are antithetical to democratic concepts and do not fit comfortably with the fundamental rights guaranteed American citizens… Unending secrecy of actions taken by government officials may also serve as a cover for possible official misconduct and/or incompetence.” The appeals court refers the case back to district court, allowing the original opinion to stand. Weeks later, the FBI withdraws its NSL, saying that it no longer needs the information it originally requested. Christian later testifies, “In doing so, they removed the Patriot Act from the danger of court review.” Christian later says that he believes the entire procedure was managed as an attempt to prevent the case from becoming public knowledge before Congress could vote on the reauthorization of the Patriot Act. [Senate Judiciary Committee, 4/11/2007]

Entity Tags: Peter Chase, Senate Judiciary Committee, National Security Letters, US Department of Justice, Library Connection, Inc., George Christian, George W. Bush, American Civil Liberties Union, Barbara Bailey, Connecticut Four, Alberto R. Gonzales, Federal Bureau of Investigation, Kevin O’Conner

Timeline Tags: Civil Liberties

Two lobbyists for the American Israel Public Affairs Committee (AIPAC), Steven Rosen and Keith Weissman, are indicted for crimes relating to their role in passing classified US government information to Israel (see April 13, 1999-2004). They are charged with conspiring “to communicate national defense information [to] persons not entitled to receive it,” applicable under the Espionage Act. Their charges are similar to those filed against former government employee Larry Franklin, their contact (see October 5, 2005). National security expert Eli Lake will call the charges against Rosen and Weissman “unprecedented,” noting that for them to face the same charges as Franklin puts them—two private citizens—under the same obligation as Franklin, a government official, to keep secret any classified information they might acquire. Lake will write: “[I]f it’s illegal for Rosen and Weissman to seek and receive ‘classified information,’ then many investigative journalists are also criminals—not to mention former government officials who write for scholarly journals or the scores of men and women who petition the federal government on defense and foreign policy. In fact, the leaking of classified information is routine in Washington, where such data is traded as a kind of currency. And, while most administrations have tried to crack down on leaks, they have almost always shied away from going after those who receive them—until now. At a time when a growing amount of information is being classified, the prosecution of Rosen and Weissman threatens to have a chilling effect—not on the ability of foreign agents to influence US policy, but on the ability of the American public to understand it.” [US v. Franklin, Rosen, and Weissman Criminal No. 1:05CR225, 8/4/2005 pdf file; New Republic, 10/10/2005; Savage, 2007, pp. 174] Months later, Attorney General Alberto Gonzales will say that journalists and other private citizens can be prosecuted for leaking classified information (see May 21, 2006). Almost four years later, the charges against Rosen and Weissman will be dropped (see May 1, 2009).

Entity Tags: Keith Weissman, Steven Rosen, American Israel Public Affairs Committee, Larry Franklin, Eli Lake

Timeline Tags: US confrontation with Iran

Camp Casey.Camp Casey. [Source: Indybay (.org)]Antiwar activist Cindy Sheehan, of Vacaville, California, sets up “Camp Casey” three miles outside of President Bush’s Crawford, Texas ranch. Bush has come to his ranch for his yearly August vacation; Sheehan has come to demand a meeting with Bush to discuss the loss of her son, Casey, in Iraq. Sheehan chooses the date to coincide with the fourth anniversary of the briefing that warned Bush of Osama bin Laden’s intention to attack the US (see August 6, 2001). Camp Casey begins as a single pup tent in a ditch by the side of a dirt road, in which Sheehan intends to stay for whatever time it takes to secure a meeting with Bush. Author and media critic Frank Rich later writes that because Bush is so firmly ensconsced in the protective “bubble” that shields him from awareness of criticism, he and his top officials are blindsided by the media response to Sheehan’s lonely vigil. Casey Sheehan, who died in April 2004 a mere two weeks after his arrival in Iraq (see April 4, 2004), will become, Rich will write, emblematic of both “the noble intentions of those who volunteered to fight the war [and] also the arrogance, incompetence, and recklessness of those who gave the marching orders.”
Bush Refuses to Meet with Sheehan - Bush will refuse to meet with Sheehan and the increasing number of peace activists who gather at Camp Casey, causing him inordinate embarrassment (see August 12, 2005) as more and more reporters begin questioning his motives in refusing to meet with the bereaved mother of a fallen US soldier. Bush even ignores the advice of some of his public relations staffers and fellow Republicans, who ask him to reconsider, as Senator George Allen (R-VA) says, “as a matter of courtesy and decency.” Rich will write: “Only someone as adrift as Bush would need to be told that a vacationing president couldn’t win a standoff with a grief-stricken parent commandeering TV cameras and the blogosphere 24/7. But the White House held firm. In a particularly unfortunate gesture, the presidential motorcade, in a rare foray out of the vacation compound, left Sheehan in the dust on its way to a fundraiser at a fat cat’s ranch nearby” (see August 12, 2005). [Rich, 2006, pp. 193-196] Political analyst Charlie Cook says: “Anything that focuses media and public attention on Iraq war casualties day after day—particularly [something] that is a good visual for television, like a weeping Gold Star mother—is a really bad thing for President Bush and his administration.… Americans get a little numb by the numbers of war casualties, but when faces, names, and families are added, it has a much greater effect.” Republican strategist Kellyanne Conway agrees, saying: “Cindy Sheehan has tapped into a latent but fervent feeling among some in this country who would prefer that we not engage our troops in Iraq. She can tap into what has been an astonishingly silent minority since the end of last year’s presidential contest. It will capture attention.” University professor Stephen Hess says that Sheehan’s “movement… can be countered by a countermovement” and therefore negated, but “I think the president might have defused the situation if he had invited her in instantly.” Hess predicts that Sheehan will soon be targeted by Republican strategists in a counterattack (see August 11, 2005 and After).
Focus of Antiwar Movement - Camp Casey quickly becomes the focus of the American antiwar movement, with organizations such as MoveOn.org and Code Pink pitching in to help expand and coordinate the camp, and high-profile Democratic operatives such as Joe Trippi organizing support among left-wing bloggers. MoveOn’s Tom Mattzie says: “Cindy reached out to us.… Cindy is a morally pure voice on the war, so we’re trying to keep the focus on her and not jump in and turn it into a political fight.” [Los Angeles Times, 8/11/2005]

Entity Tags: George W. Bush, Cindy Sheehan, Charlie Cook, Casey Sheehan, Bush administration (43), “Camp Casey”, Code Pink, George F. Allen, MoveOn (.org), Stephen Hess, Frank Rich, Kellyanne Conway, Joe Trippi, Tom Mattzie

Timeline Tags: Iraq under US Occupation

The outgoing Saudi ambassador to Britain, Prince Turki al-Faisal, criticizes the Blair government over its lack of response to terrorism and says that MI5 is hampering efforts to clamp down. Prince Turki describes his experience: “When you call somebody, he says it is the other guy. If you talk to the security people, they say it is the politicians’ fault. If you talk to the politicians, they say it is the Crown Prosecution Service. If you call the Crown Prosecution service, they say, no, it is MI5. So we have been in this runaround…” Turki particularly criticizes the government’s failure to act against Saad al-Fagih of the movement for Islamic Reform in Arabia and Mohammed al-Massari. Al-Fagih is accused of being involved in the 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998) and a plot to assassinate King Abdullah of Saudi Arabia. [London Times, 8/10/2005]

Entity Tags: Turki al-Faisal, UK Security Service (MI5), Mohammed al-Massari, Saad al-Fagih

Timeline Tags: Complete 911 Timeline

In response to new revelations about a military intelligence unit called Able Danger, which allegedly identified Mohamed Atta and three other 9/11 hijackers more than a year before the attacks, Al Felzenberg—formerly the chief spokesman for the 9/11 Commission—acknowledges that a uniformed officer briefed two of the commission’s staff members about the unit in early July 2004 (see July 12, 2004). He also admits that the officer said the program had identified Mohamed Atta as part of an al-Qaeda cell in Brooklyn. This information was not mentioned anywhere in the commission’s final report. [New York Times, 8/11/2005] The existence of the Able Danger program was first revealed two days ago in an August 9 New York Times article (see August 9, 2005). In that article, the Times reported that Felzenberg had confirmed that an October 2003 briefing had taken place which did not include any references to Mohamed Atta or the Brooklyn al-Qaeda cell. But Felzenberg did not tell the newspaper about the July 2004 briefing, which apparently had provided the commission with far more details about the Able Danger program. [New York Times, 8/9/2005; New York Times, 8/11/2005] It is not clear who exactly in the commission was aware of the program. Former 9/11 Commissioners Tim Roemer and John Lehman say they were never briefed about Able Danger before the 9/11 Commission’s Final Report was published. [Government Security News, 8/2005 Sources: Curt Weldon]

Entity Tags: Curt Weldon, Mohamed Atta, Al Felzenberg, 9/11 Commission, Able Danger, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Deputy Attorney General James Comey, who has already tendered his resignation, gives his farewell speech to an assemblage in the Justice Department. Comey makes what author and reporter Charlie Savage will later call “a cryptic reference to the fights over warrantless surveillance and torture issues that he had fought alongside [former Office of Legal Counsel chief Jack] Goldsmith and the other non-team players” (see Late 2003-2005 and June 17, 2004). Comey tells the assembled employees that, during his tenure, he had dealt with issues that “although of consequence almost beyond my imagination, were invisible because the subject matter demanded it.” In these disputes, he says he worked with people whose loyalty “to the law… would shock people who are cynical about Washington.” Those people, he says, “came to my office, or my home, or called my cell phone late at night, to quietly tell me when I was about to make a mistake; they were people committed to getting it right—and to doing the right thing—whatever the price. These people know who they are. Some of them did pay a price for their commitment to [do] right, but they wouldn’t have it any other way.” [US Department of Justice, 8/15/2005; Consortium News, 2/8/2006; Savage, 2007, pp. 199] Comey will later testify that one of the people he is referring to is former Justice Department lawyer Patrick Philbin. [Savage, 2007, pp. 199]

Entity Tags: Patrick F. Philbin, Jack Goldsmith, Charlie Savage, US Department of Justice, James B. Comey Jr.

Timeline Tags: Civil Liberties

Prince Bandar, Saudi ambassador to the US since 1983, steps down and is replaced by Prince Turki al-Faisal. It is said that Prince Bandar had been suffering health problems and is not close to the new Saudi King Abdullah (see August 1, 2005). Prince Turki was Saudi intelligence minister from the late 1970s until about one week before 9/11 (see August 31, 2001). Then he served three years as Saudi ambassador to Britain. Prince Turki has had a controversial past. He was considered a mentor to bin Laden, and encouraged him to represent Saudi Arabia in the Afghanistan war against the Soviet Union. There are allegations that Prince Turki took part in a series of secret meetings between bin Laden and the Saudis over a period of many years (see Summer 1991; May 1996; Spring 1998; June 1998; July 1998; July 4-14, 2001). There are also allegations that he went falcon hunting in Afghanistan with bin Laden during much of the 1990s (see 1995-2001). In the wake of his appointment as ambassador, US officials try to downplay his past. One unnamed US official says, “Yes, he knew members of al-Qaeda. Yes, he talked to the Taliban. At times he delivered messages to us and from us regarding Osama bin Laden and others. Yes, he had links that in this day and age would be considered problematic, but at the time we used those links.” The official adds that Prince Turki seems to have “gotten out of that business” since 2001 and “he understands that times have changed.” He was sued in 2002 by a group of 9/11 victims’ relatives for allegedly supporting al-Qaeda, but his name was dropped from the suit because of diplomatic immunity (see August 15, 2002). [New York Times, 7/21/2005]

Entity Tags: Osama bin Laden, Bandar bin Sultan, Al-Qaeda, Turki al-Faisal

Timeline Tags: Complete 911 Timeline

Several individuals come forward and corroborate claims made about a military intelligence unit called Able Danger that, by mid-2000, allegedly identified Mohamed Atta and three other future 9/11 hijackers. Days previously, a US Army intelligence officer called Anthony Shaffer made claims about the unit (see August 17, 2005). On August 22, Scott J. Phillpott, an active-duty Navy captain who managed the Able Danger program for the Pentagon’s Special Operations Command, comes forward and corroborates Shaffer’s claims. He says, “My story is consistent. Atta was identified by Able Danger in January-February of 2000.” Phillpott states that he was the officer who met with staff from the 9/11 Commission in July 2004, and told them about the program (see July 12, 2004). [New York Times, 8/22/2005] Claims about the program are further corroborated when a former employee of a defense contractor who says he worked on the technical side of the unit, also comes forward. James D. Smith, who worked for Orion Scientific Systems [Times Herald (Norristown), 9/22/2005] , states that in 2000 he helped create a chart for Able Danger. He says, “I am absolutely positive that he [Atta] was on our chart among other pictures and ties that we were doing mainly based upon [terror] cells in New York City.” [Fox News, 8/28/2005] Furthermore, the Pentagon admits that they have found three others, apart from Anthony Shaffer and Scott Phillpott, associated with Able Danger who assert that the program identified Mohamed Atta as an al-Qaeda suspect inside the US more than a year before 9/11. An official says that the five individuals associated with the program (including Shaffer and Phillpott) were all considered “credible people,” and that four of them recalled a photo of Mohamed Atta accompanying the chart they produced. [Reuters, 9/1/2005] Eleven people ran Able Danger. [Bergen Record, 8/14/2005] The Pentagon interviewed a total of 80 people who had some kind of association with the Able Danger program. [New York Times, 9/1/2005]

Entity Tags: 9/11 Commission, Mohamed Atta, Able Danger, Anthony Shaffer, Al-Qaeda, US Department of Defense, Scott Phillpott, James D. Smith

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The FBI begins to build cases against high value detainees held by the US in Guantanamo Bay, due to Defense Department fears that evidence obtained from the detainees by the CIA will be inadmissible or too controversial to present at their upcoming war crimes tribunals. The investigation, which involves up to 300 agents in a “Guantanamo task force,” runs for at least two years and FBI agents travel widely to collect evidence. According to former officials and legal experts, “The [FBI] process is an embarrassment for the Bush administration, which for years held the men incommunicado overseas and allowed the CIA to use coercive means to extract information from them that would not be admissible in a US court of law—and might not be allowed in their military commissions….” In fact, the techniques used to extract the confessions even cause some CIA officials to question whether they are believable, much less sustainable in court, particularly as CIA officers are not trained to obtain evidence that can be used in such a setting. In addition, if the information is used, this may focus the trials on the actions of the CIA and not the accused. The detainees will be designated enemy combatants in 2007 in preparation for military commissions (see March 9-April 28, 2007 and August 9, 2007), but this process will be questioned by a judge (see June 4, 2007). The Los Angeles Times will also comment, “The FBI’s efforts appear in part to be a hedge in case the commissions are ruled unconstitutional or never occur, or the US military detention center at Guantanamo Bay is closed. Under those scenarios, authorities would have to free the detainees, transfer them to military custody elsewhere, send them to another country, or have enough evidence gathered by law enforcement officials to charge them with terrorism in US federal courts.” [Los Angeles Times, 10/21/2007]

Entity Tags: Central Intelligence Agency, Federal Bureau of Investigation, US Department of Defense

Timeline Tags: Torture of US Captives, Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Representative Jane Harman (D-CA) is recorded telling a suspected Israeli agent that she would intervene with the Justice Department to try to get charges against two Israeli lobbyists reduced. In return, the Israeli agent promises to help Harman secure the chairmanship of the House Intelligence Committee. The Israeli agent will remain unidentified; the two lobbyists, Steve Rosen and Keith Weissman, are charged with espionage after they allegedly passed along classified information to the American Israel Public Affairs Committee (AIPAC—see April 13, 1999-2004). The conversation between Harman and the Israeli agent is recorded on an wiretap, reportedly by the NSA, mounted as part of a federal investigation into AIPAC’s potential espionage operations against the US (see October 5, 2005). According to transcripts of the wiretapped conversation, Harman agrees to “waddle into” the AIPAC case “if you think it’ll make a difference.” The Israeli agent asks Harman if she could speak with Attorney General Alberto Gonzales on Rosen’s and Weissman’s behalf. Harman replies that Gonzales might not cooperate, because he “just follows White House orders,” but other officials might be more pliable. In return, the Israeli agent promises to contact House Minority Leader Nancy Pelosi (D-CA) and attempt to persuade her to name Harman as chairwoman of the Intelligence Committee if the Democrats win control of the House in the November 2006 elections. Harman tells the agent, “This conversation doesn’t exist,” and hangs up. The contents of the conversation will later be confirmed by three separate sources, including two former senior national security officials. [Congressional Quarterly, 4/19/2009] Reporter Marc Ambinder will later write that Harman’s conversation may have been recorded by the FBI, and not the NSA, as part of the its investigation into Rosen and Weissman. [Atlantic Monthly, 4/20/2009]

Entity Tags: Nancy Pelosi, Bush administration (43), American Israel Public Affairs Committee, Alberto R. Gonzales, Jane Harman, Marc Ambinder, Steve Rosen, Keith Weissman, National Security Agency, US Department of Justice

Timeline Tags: Civil Liberties

Defense Department analyst Larry Franklin pleads guilty to passing government secrets to two employees of a pro-Israel lobbying group and to an Israeli government official, a violation of the Espionage Act. He is later sentenced to 12 and a half years in prison. [Washington Post, 10/6/2005; Washington Post, 1/21/2006; Savage, 2007, pp. 173] Franklin, an Iran specialist, gave details of US policy towards Iran to Steven Rosen and Keith Weissman, two members of AIPAC (American Israel Public Affairs Committee) which the Washington Post calls “one of Washington’s most influential lobbying organizations.” He also admits to giving classified information directly to Naor Gilon, chief of political affairs at the Israeli Embassy in Washington. Gilon returned to Israel, but Rosen and Weissman have been charged in what prosecutors claim was a conspiracy to obtain and illegally pass classified US information to foreign officials and news reporters. Franklin reportedly has been cooperating with investigators in return for a relatively lenient sentence. [Washington Post, 10/6/2005; Washington Post, 1/21/2006] It appears that Franklin was caught by accident in 2003 as part of a larger FBI investigation into Israeli spying that began in 2001 (see September 9, 2001). Investigators had been monitoring Gilon and were reportedly “floored” to watch Franklin sit down and eat lunch with him. [United Press International, 12/9/2004]

Entity Tags: Naor Gilon, Keith Weissman, American Israel Public Affairs Committee, Larry Franklin, Steven Rosen

Timeline Tags: US confrontation with Iran, Complete 911 Timeline

Dulmatin.Dulmatin. [Source: Rewards for Justice]The US announces a $10 million reward for information leading to the arrest of Dulmatin, a leader of Jemaah Islamiyah (JI), al-Qaeda’s main affiliate in Southeast Asia. A $1 million reward is also offered for Umar Patek, who apparently is a little-known aide to Dulmatin. The reward for Dulmatin is as large as any other cash reward the US has offered for any al-Qaeda linked figure, except for $25 million rewards for Osama bin Laden, Ayman al-Zawahiri, and Abu Musab al-Zarqawi. Dulmatin is believed to have been one of the masterminds of the 2002 Bali bombings (see October 12, 2002). Since then, it is believed that he is hiding out in the Philippines and has not been linked to any other bombings. [Associated Press, 10/7/2005] The announcement is met with puzzlement in Indonesia, because it comes just six days after a second set of bombings in Bali (see October 1, 2005), and Dulmatin has no known role in those bombings. However, Azhari Husin and Noordin Mohammed Top were quickly found to be the masterminds of the bombings. Furthermore, Husin and Top have been named as masterminds to the 2002 Bali bombings and every major bombing in Indonesia since then, including the 2003 Marriott Hotel bombing (see August 5, 2003) and the 2004 Australian embassy bombing (see September 9, 2004). Later in the month, Hank Crumpton, the State Department’s coordinator for counterterrorism, is asked by an Indonesian journalist why cash rewards have been given for Dulmatin and even Patek but not Husin or Top. Crumpton replies, “We believe [Dulmatin] is a threat to the region,” but he declines to be more specific or to explain why there were no rewards for Husin or Top. [New York Times, 10/19/2005] Husin is killed in a shootout in Indonesia one month later (see October 1, 2005). Dulmatin is listed on the US Rewards for Justice website, but he is one of only two out of the 37 suspects listed without actual rewards given for them. The other is Zulkarnaen, who is also said to be involved in the 2002 Bali bombings and 2003 Marriott Hotel bombing. [Rewards for Justice, 8/10/2007; Rewards for Justice, 8/10/2007; Rewards for Justice, 8/11/2007]

Entity Tags: Zulkarnaen, Noordin Mohammed Top, Umar Patek, Azhari Husin, Hank Crumpton, Dulmatin

Timeline Tags: Complete 911 Timeline

The Fourth Circuit Court of Appeals rules that President Bush, as commander in chief, can continue to hold Jose Padilla (see June 9, 2002), a US citizen arrested on US soil (see June 8, 2002), indefinitely as an enemy combatant. Padilla is to be treated the same as an American captured on a foreign battlefield (see June 28, 2004). The majority ruling is written by Judge J. Michael Luttig, often thought of as a potential Bush Supreme Court nominee. Luttig rules there is “no difference in principle between [Yaser Esam] Hamdi (see June 28, 2004) and Padilla.” Bush’s “powers include the power to detain identified and committed enemies such as Padilla, who associated with al-Qaeda and the Taliban regime, and who entered the United States for the avowed purpose of further prosecuting [terrorism] by attacking American citizens and targets on our own soil.” Luttig ignores the fact that Padilla has never been charged, much less convicted, of any crime. When the Bush administration later charges Padilla as an ordinary criminal—and does not charge him with with any of the terrorist activities it had long alleged he had committed—many administration critics will conclude that, just as in the Hamdi case, the administration had used inflammatory rhetoric and baseless charges to obtain a judicial decision it wanted (see October 10, 2004). When Luttig learns of the administration’s actions, he will issue a supplementary opinion excoriating the White House (see December 21, 2005). [Savage, 2007, pp. 200]

Entity Tags: Jose Padilla, J. Michael Luttig

Timeline Tags: Civil Liberties

CIA Director Porter Goss announces that the agency will not pursue disciplinary action against any current or former CIA officials who have been severely criticized in an internal report produced by John Helgerson, the CIA’s inspector general. Those who have read the classified report say that it faults about 20 intelligence officials, including former CIA Director George Tenet, his former Deputy Director of Operations James Pavitt, and the former head of the CIA’s Counter Terrorism Center Cofer Black (see June 2005). Tenet in particular is faulted for focusing too little attention on combating al-Qaeda as a whole in the years prior to 9/11. However, he and others who are singled out strongly object to the report’s conclusions, and have prepared lengthy rebuttals. The 9/11 Congressional Inquiry, of which Goss was ironically the co-chairman, had formally requested the report in November 2002, as it was finishing its investigation. The 400-page document was completed in June 2004, but its release was delayed (see June-November 2004). John Helgerson finally delivered it to Congress in August 2005, and had urged Goss to convene “accountability boards” to assess the performance of officers it criticized. However, Goss says he has decided not to do this. He says the report in no way suggests “that any one person or group of people could have prevented 9/11,” and that “[o]f the officers named in [Helgerson’s] report, about half have retired from the Agency, and those who are still with us are amongst the finest we have.” Goss also claims the report “unveiled no mysteries,” and states that it will remain classified. [New York Times, 10/5/2005; Los Angeles Times, 10/6/2005; Washington Post, 10/6/2005] In response to Goss’s statement, Sen. John D. Rockefeller (D-WV), the senior Democrat on the Senate Select Committee on Intelligence, asks, “What failures in performance, if not these, warrant the convening of an accountability board at the CIA?” 9/11 victim’s relative Kristen Breitweiser comments, “No one has been held accountable for the failures on 9/11.” [Reuters, 10/5/2005]

Entity Tags: Central Intelligence Agency, Porter J. Goss, John D. Rockefeller, Kristen Breitweiser

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Abdurrahman Wahid.Abdurrahman Wahid. [Source: Indonesian Embassy in the Netherlands]In an interview with the Australian public television station SBS, Abdurrahman Wahid, president of Indonesia from 1999 to 2001, suggests that the country’s military or police may have been behind the 2002 Bali bombings (see October 12, 2002). The Australian reports: “Wahid told SBS’s Dateline program that he had grave concerns about links between Indonesian authorities and terrorist groups and believed that authorities may have organized the larger of the two 2002 Bali bombings which hit the Sari Club, killing the bulk of the 202 people who died.… Asked who he thought planted the Sari Club bomb, Mr Wahid said: ‘Maybe the police… or the armed forces. The orders to do this or that came from within our armed forces, not from the fundamentalist people.’” Wahid believes the smaller bomb was indeed planted by Islamist militants. [SBS Dateline, 10/12/2005; Australian, 10/13/2005] Counterterrorism expert John Mempi also comments, “Why this endless violence [in Indonesia]? Why are there acts of terrorism year in, year out? Regimes change, governments change, but violence continues. Why? Because there is a sort of shadow state in this country. A state within a state ruling this country.” [SBS Dateline, 10/12/2005] In 2008, Imam Samudra, imprisoned and sentenced to death for being one of the Bali bombings masterminds, will make comments similar to Wahid’s. While he admits being involved in the bombings, he claims that they never meant to kill so many people. He says the second explosion was much bigger than they had expected and suggests that “the CIA or KGB or Mossad” had somehow tampered with the bomb. [Sunday Times (London), 3/2/2008]

Entity Tags: Imam Samudra, Abdurrahman Wahid, John Mempi

Timeline Tags: Alleged Use of False Flag Attacks, Complete 911 Timeline

The US and Britain send a team to search for the body of Osama bin Laden in the rubble of the Pakistani town of Balakot, according to the British Sunday Express newspaper. The al-Qaeda leader is thought to have been buried there following a recent earthquake. The British component comprises members of the foreign intelligence service MI6 and the SAS Special Forces unit; the Americans are US Special Forces. The team, whose deployment is approved by President Bush, is flown in from Afghanistan equipped with imagery and eavesdropping technology, high-tech weapons systems, and linguists. The search is motivated by the fact that, days before the earthquake happened, an American satellite spotted an al-Qaeda training camp in a nearby area and obtained high-resolution close-ups. A senior intelligence officer in Washington says: “One of those photos bore a remarkable resemblance to bin Laden. His face looked thinner, which is in keeping with our reports that his kidney condition has worsened.” This is a reference to the rumor that bin Laden has kidney problems (see November 23, 1996). The Sunday Express will report: “In recent weeks, both MI6 and the CIA have established that bin Laden has received a portable kidney dialysis machine from China but it requires electricity to power it. Drones, unmanned aircraft that US Special Forces launched from Afghanistan last week, have reported that the area along the border has lost all power supplies.” However, the state of bin Laden’s kidneys will still be shrouded in mystery two years later (see Late 2007). According to the report, Pakistani President Pervez Musharraf has agreed to keep other rescue teams working to locate survivors away from the border area where the search for bin Laden is concentrated. [Daily Times (Lahore), 10/20/2005] There are no reports that the search is a success. A man thought to be bin Laden will continue to release audio messages (see, for example, January 19, 2006).

Entity Tags: Special Air Service, Central Intelligence Agency, George W. Bush, Pervez Musharraf, UK Secret Intelligence Service (MI6), Osama bin Laden

Timeline Tags: Complete 911 Timeline

In light of the indictment of Lewis “Scooter” Libby (see October 28, 2005), the Center for American Progress (CAP) puts out an analysis of Libby’s role as Vice President Dick Cheney’s chief of staff, and the impact Libby has had on Bush administration policies. Libby, a powerful and influential neoconservative, “has been one of the most important men pulling the levers behind the Bush administration,” the article finds. “From the very beginning of the administration, Libby has essentially been Dick Cheney’s Dick Cheney.” But, the article goes on to note: “[w]hat few have realized at this historic moment is that for the past four and a half years, Libby has been ‘scooting’ from scandal to scandal. Libby has been at center stage for the other major national security scandals of the Bush administration, including the Iraq intelligence debacle, the secret meetings about Halliburton contracts, and doubtless others we have not heard of yet. It was Libby—along with Paul Wolfowitz, Doug Feith, and a handful of other top aides at the Pentagon and White House—who convinced the president that the US should go to war in Iraq. It was Libby who pushed Cheney to publicly argue that Saddam Hussein had ties to al-Qaeda and 9/11. It was also Libby who prodded former Secretary of State Colin Powell to include specious reports about an alleged meeting between 9/11 terrorist Mohamed Atta and an Iraqi intelligence official in Powell’s February 2003 speech to the United Nations” (see February 5, 2003). Libby co-authored the controversial Defense Planning Guidance document of 1988 (see February 18, 1992) that called on the US to essentially transform itself into an aggressive empire, using its military to stretch its power around the world. “This Planning Guidance document went a long way toward endearing Libby to Cheney,” the CAP article reads. There is also evidence that Libby helped steer no-bid Iraqi reconstruction contracts to Cheney’s former firm, Halliburton. The article concludes, “Given the depth of his influence in shaping the White House agenda over the past four and a half years, losing Libby today is not only a huge blow to the vice president, but to the entire Bush administration.” [Center for American Progress, 10/28/2005]

Entity Tags: Bush administration (43), US Department of Defense, Lewis (“Scooter”) Libby, Center for American Progress

Timeline Tags: Niger Uranium and Plame Outing

A local newspaper claims this is the CIA prison in Mauritania.A local newspaper claims this is the CIA prison in Mauritania. [Source: Le Rénovateur Quotidien]Most top al-Qaeda leaders being held by the US has been in a secret CIA prison in Poland. But after the nonprofit watchdog group Human Rights Watch discloses the existence of the prisons, the prisoners are moved to a new CIA prison located in the North African nation of Mauritania. The New Yorker will report that “After a new government friendly to the US took power, in a bloodless coup d’état in August, 2005… it was much easier for the intelligence community to mask secret flights there.” [New Yorker, 6/17/2007] A Mauritanian newspaper places the prison at Ichemmimène, a town deep in the Sahara desert. [Le Rénovateur Quotidien, 6/29/2007] ABC News lists eleven prisoners making the move:
bullet Abu Zubaida (held in Thailand then Poland).
bullet Abd al-Rahim al-Nashiri (held in Poland).
bullet Ramzi bin al-Shibh (held in Poland).
bullet Khalid Shaikh Mohammed (held in Poland).
bullet Khallad bin Attash (held in Poland).
bullet Ahmed Khalfan Ghailani (held in Poland).
bullet Hassan Ghul (held in Poland).
bullet Abdul Rahim al-Sharqawi (held in Poland).
bullet Mohammed Omar Abdul-Rahman (held in Poland).
bullet Ibn al-Shaykh al-Libi (held in Pakistan then Poland).
Further, Hambali is a high level prisoner in US custody but he is being held elsewhere. [ABC News, 12/5/2005; ABC News, 12/5/2005] In 2007 Council of Europe, the European human rights monitoring agency, will reveal that the main CIA prison for high-level prisoners was in a Soviet-era military compound at Stare Kjekuty, in northeastern Poland. Lower-level prisoners from Afghanistan and Iraq were held in a military base near the Black Sea in Romania. The governments of Poland and Romania will continue to deny the existence of the prisons even after the US government admits to their existence. [New York Times, 6/8/2007] Eleven of the twelve prisoners mentioned above were subjected to the so-called “enhanced interrogation techniques” called torture by many. In 2006, Bush will announce that the CIA prisons are being emptied and high level prisoners will be transferred to the prison at Guantanamo Bay, Cuba (see September 2-3, 2006).
Some 'Ghost' Prisoners - But the list of prisoners being transferred will include some other names and will not include al-Shaykh al-Libi, Ghul, al-Sharqawi, or Abdul-Rahman. It will later come out that al-Sharqawi was probably sent to Guantanamo in late 2004 after being held in a Jordanian prison (see February 7, 2002). Ghul is a ‘ghost’ prisoner until he is turned over to the Pakistani government in 2006 (see (Mid-2006)). Al-Libi is similarly turned over to Libya (see Between November 2005 and September 2006). The fate of Abdul-Rahman remains unknown. [ABC News, 12/5/2005]

Entity Tags: Khallad bin Attash, Ramzi bin al-Shibh, Khalid Shaikh Mohammed, Central Intelligence Agency, Hambali, Abd al-Rahim al-Nashiri, Ibn al-Shaykh al-Libi, Abdul Rahim al-Sharqawi, Ahmed Khalfan Ghailani, Abu Zubaida, Mohammed Omar Abdul-Rahman

Timeline Tags: Torture of US Captives, Complete 911 Timeline

Following a request that the CIA be exempted from a US ban on torture, claims about alleged CIA mistreatment of prisoners begin to appear in the media, apparently fueled by CIA employees unhappy with the practices the CIA is employing. On November 2, the Washington Post reveals information about the CIA’s network of secret prisons, including facilities in Europe, which is kept secret from “nearly all members of Congress charged with overseeing the CIA’s covert actions.” The rationale for the policy is that the CIA apparently needs to hold people without the restrictions imposed by the US legal system, in order to keep the country safe. Detainees are said to be tortured, and this is not only questionable under US law, but, in some cases, against the law of the host country. [Washington Post, 11/2/2005] On November 9, the New York Times reveals that in 2004, the CIA’s Inspector General secretly concluded that the CIA’s aggressive interrogation techniques in use up until that time were likely in violation of a 1994 international treaty against torture signed by the US (see May 7, 2004). [New York Times, 11/9/2005] After the network is revealed, there is much interest in what actually goes on in it and more important details are uncovered by ABC News on November 18. Apparently, the CIA’s interrogation techniques have led to the death of one detainee and include sleep deprivation, physical violence, waterboarding, and leaving prisoners in cold cells (see Mid-March 2002). The intelligence generated by these techniques is said to be questionable, and one source says: “This is the problem with using the waterboard. They get so desperate that they begin telling you what they think you want to hear.” [ABC News, 11/18/2005] Some videotapes of CIA interrogations of detainees are destroyed this same month, although what date this happens exactly is unclear (see November 2005). The CIA is also so alarmed by these revelations that it immediately closes its secret prisons in Eastern Europe and opens a new one in a remote section of the Sahara desert (see November 2005).

Entity Tags: Central Intelligence Agency

Timeline Tags: Torture of US Captives, Complete 911 Timeline

On November 3, 2005, Leonie Brinkema, the judge in the Zacarias Moussaoui trial, asks the CIA about recordings of interrogations of detainees who are related to the Moussaoui case. Eleven days later, the CIA again incorrectly claims to prosecutors in that trial that it has no such recordings. The CIA made a similar claim in 2003 (see May 7-9, 2003), but in fact the CIA secretly videotaped detainee interrogations in 2002 (see Spring-Late 2002). Some of these videotapes are destroyed this month (see November 2005), however it is unknown if the destruction takes place before or after this date. In late 2007, the CIA will reveal that it did have some videotapes after all and prosecutors will finally be able to view some of them (see September 19 and October 18, 2007). But it will also be revealed that most of the videotapes were destroyed (see December 6, 2007). Prosecutors will later claim that neither the video nor the audio recordings contained material relevant to the Moussaoui trial, and some of the content of the interrogations was provided during discovery. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006; US District Court for the Eastern District of Virginia, Alexandria Division, 10/25/2007 pdf file; Reuters, 11/13/2007]

Entity Tags: Leonie Brinkema, Zacarias Moussaoui, Central Intelligence Agency

Timeline Tags: Torture of US Captives, Complete 911 Timeline, 9/11 Timeline, Civil Liberties

The US charges British citizen Binyam Ahmed Mohamed (see May-September, 2001), who has allegedly used the aliases Talha al-Kini, Foaud Zouaoui, Taha al-Nigeri, and John Samuel, with conspiracy to foment and carry out terrorist attacks against US targets. Mohamed, who was arrested in Pakistan in April 2002, is charged with “attacking civilians; attacking civilian objects; murder by an unprivileged belligerent; destruction of property by an unprivileged belligerent; and terrorism,” though the charge sheet is unclear whether Mohamed carried out any of these actions himself, or whether he was part of a larger conspiracy by the al-Qaeda terrorist organization. The charges allege links between Mohamed and “shoe bomber” Richard Reid (see December 22, 2001), radical Islamist Abu Zubaida, 9/11 plotter Khalid Shaikh Mohammed, and alleged “dirty bomber” Jose Padilla. Mohamed is alleged to have been part of the Padilla bomb plot. [US Defense Department, 11/4/2005 pdf file] Much of the evidence against Mohamed comes from confessions he allegedly made while in US custody at the detention camp at Bagram Air Force Base (see January-September 2004), and in Guantanamo Bay (see September 2004 and After). He was also held in Pakistan (see April 10-May, 2002 and May 17 - July 21, 2002), and “rendered” to a secret prison in Morocco (see July 21, 2002 -- January 2004). Through his lawyers, Mohamed has claimed that he was tortured in all four detention sites. The British judiciary will later establish that British officials facilitated Mohamed’s interrogation in Pakistan, and had “full knowledge of the reported conditions of his detention and treatment” (see February 24, 2009). [Guardian, 2/5/2009] As with Padilla, the charges relating to the “dirty bomb” plot will later be dropped due to lack of evidence, and all charges against Mohamed will eventually be dropped (see October-December 2008 and February 4, 2009).

Entity Tags: Binyam Mohamed

Timeline Tags: Torture of US Captives

Brett Tolman.Brett Tolman. [Source: ABC4 (.com)]Brett Tolman, a Republican Senate Judiciary Committee official, tells Assistant Attorney General William Moschella that he will perform a “comprehensive fix” to the USA Patriot Act reauthorization coming up for approval in Congress (see March 9, 2006). Tolman and Moschella are referring to a provision in the reauthorization legislation that would allow the attorney general to appoint interim US Attorneys on an indefinite basis without having them go through Senate confirmation, and remove the ability of a federal court to appoint a US Attorney (see July 2005 - March 2006). Moschella suggests Tolman use the “comprehensive fix” of repealing Section 546 of Title 28 of the United States Code, subsections C and D, and replacing them with the following language: “A person appointed as United States Attorney under this section may serve until the qualification of a United States Attorney for such district appointed by the president under section 541 of this title.” Late the same evening, Tolman receives an email from Moschella instructing him to quietly insert the provision in the USA Patriot Act reauthorization bill that would eliminate a 120-day limit for “interim” US Attorneys to serve without Senate confirmation. In essence, the provision would allow such “interims” to serve indefinitely, cutting the Senate entirely out of the process of naming US Attorneys and allowing the attorney general to make political appointments without oversight. Tolman replies, “I will get the comprehensive fix done.” He slips the provision into a draft of the bill while it is in conference committee. None of the members notice the provision, and it is part of the bill as signed into law in March 2006 (see March 9, 2006). Tolman himself is one of the first beneficiaries of the new provision, becoming the US Attorney for Utah. When the new provision comes to light in early 2007, both chambers of Congress vote overwhelmingly to repeal it. This is one of numerous “stealth provisions” the White House will have inserted into legislation with the help of compliant Congressional Republicans and staffers. [Savage, 2007, pp. 316; US Department of Justice, 3/23/2007 pdf file] Moschella will later take the credit for the provision, and will tell reporters that he made the change on behalf of the Justice Department “without the knowledge or coordination of his superiors at the Justice Department or anyone at the White House.” [Talking Points Memo, 2011]

Entity Tags: William E. Moschella, USA Patriot Act, Senate Judiciary Committee, Bush administration (43), Brett Tolman, US Department of Justice

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales sends a letter to a federal judge in Montana, assuring him that US Attorney William W. Mercer is not violating federal law by spending almost all of his time in Washington as a temporary Justice Department official. The same day, Mercer has a Republican Senate staffer insert language into the USA Patriot reauthorization bill (see March 9, 2006) that would retroactively change the rules and allow federal prosecutors such as himself to live outside their districts and serve in other positions. Congress will include the language in the bill when it passes the legislation. Mercer and a small number of other Justice Department employees are the only ones to benefit from the provision. In 2007, when the provision is revealed to the public, Justice Department officials will say the provision was necessary to ensure that prosecutors such as Mercer could fill temporary positions in Washington, Iraq, and elsewhere. Critics will accuse Gonzales of being, in the Washington Post’s words, “less than truthful” about the actions of himself, his staff, and the White House. The question surrounding Mercer involves residency. Mercer is the US Attorney for Montana, appointed in 2001. In June 2005, he was appointed to serve as principal associate deputy attorney general, at Gonzales’s request. US District Chief Judge Donald W. Molloy of Billings has become increasingly irked at Mercer’s absence from Montana for the last two years. In October, Molloy wrote Gonzales to say that Mercer was violating federal law because he “no longer resides in Montana” and was living with his family in the Washington area. Gonzales replies three weeks later to tell Molloy that Mercer “is in compliance with the residency requirement” under federal law because he “is domiciled there, returns there on a regular basis, and will live there full-time as soon as his temporary assignment is completed.” At the same time Gonzales writes Molloy, Mercer has a Senate staffer, Brett Tolman, insert the provision into the Patriot Act legislation. Tolman is the counsel for Senator Arlen Specter (R-PA), chairman of the Senate Judiciary Committee. Tolman will later be named the US Attorney for Utah. Specter’s office will characterize the provision as “unremarkable” and aboveboard. Mercer currently serves as acting associate attorney general and has been nominated for the position on a permanent basis. He spends only about three days a month in Montana and delegates almost all of his duties as US Attorney to underlings. [ePluribus Media, 3/26/2007; Washington Post, 5/2/2007] Mercer will be nominated to serve as associate attorney general, the third-highest position in the Justice Department, in September 2006. He will not be confirmed for the position by the Senate, as confirmation would require his leaving the position of US Attorney. In June 2007, Mercer will resign from the associate attorney general position, retaining his position as US Attorney for Montana (see June 22, 2007). [ePluribus Media, 3/26/2007; Washington Post, 6/22/2007]

Entity Tags: Donald W. Molloy, Alberto R. Gonzales, Brett Tolman, Washington Post, Arlen Specter, Senate Judiciary Committee, William W. Mercer, US Department of Justice

Timeline Tags: Civil Liberties

The Supreme Court declines, without comment, to hear the case (see August 4, 2005) brought by former FBI translator Sibel Edmonds. [New York Times, 11/28/2005; Reuters, 11/28/2005] The decision puts an end to Edmonds’ legal efforts to hold the bureau accountable for its failure to address several security issues raised by Edmonds in late 2001 and early 2002 (see December 2, 2001 and Afternoon February 12, 2002, respectively). On August 4, Edmonds had filed a petition with the Supreme Court asking it “to provide guidance to the lower courts about the proper scope and application of the state secrets privilege (see March 9, 1953), and to prevent further misuse of the privilege to dismiss lawsuits at the pleading stage.” The petition also urged the court to affirm that the press and public may not be barred from court proceedings in civil cases without just cause. (In May, the federal appeals court had closed the courtroom to the public and media.) Had the Supreme Court had ruled in favor of Edmonds, she would have been able to return to the lower courts and start her case again. [Petition for a writ of certiorari. Sibel Edmonds v. Department of Justice, et all., 8/4/2005, pp. 2 pdf file; Government Executive, 8/8/2005]

Entity Tags: US Supreme Court, Sibel Edmonds

Timeline Tags: Complete 911 Timeline

Late 2005: CIA Closes Unit Hunting Bin Laden

The CIA closes its unit that had been in charge of hunting bin Laden and other top al-Qaeda leaders. Analysts in the unit, known as Alec Station, are reassigned to other parts of the CIA Counterterrorist Center. CIA officials explain the change by saying the agency can better deal with high-level threats by focusing on regional trends rather than on specific organizations or individuals. Michael Scheuer, who headed the unit when if formed in 1996 (see February 1996), says the move reflects a view within the CIA that bin Laden is no longer the threat he once was, and complains, “This will clearly denigrate our operations against al-Qaeda.” Robert Grenier, head of the Counterterrorist Center in 2005, is said to have instigated the closure. [New York Times, 7/4/2006; Guardian, 7/4/2006] The White House denies the search for bin Laden has slackened, calling the move merely a “reallocation of resources” within the CIA. [Reuters, 8/17/2006]

Entity Tags: Robert Grenier, Osama bin Laden, Counterterrorist Center, Alec Station, Michael Scheuer, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, War in Afghanistan

Arthur Sulzberger.Arthur Sulzberger. [Source: New York Times]George W. Bush summons New York Times publisher Arthur Sulzberger and Times editor Bill Keller to the Oval Office to try to dissuade them from running a landmark story revealing the NSA’s illegal wiretapping program (see December 15, 2005) that he authorized in 2002 (see Early 2002). In the meeeting, Bush warns Sulzberger and Keller that “there’ll be blood on your hands” if another terrorist attack were to occur, obviously implying that to reveal the nature of the program would invite terrorist strikes. Bush is unsuccessful in his attempt to quash the story. [Newsweek, 12/21/2005; Newsweek, 12/22/2008]

Entity Tags: New York Times, Arthur Sulzberger, George W. Bush, National Security Agency, Bill Keller

Timeline Tags: Civil Liberties

According to an unnamed law enforcement official who works with the FBI and the National Counter Terrorism Center, the investigation into the SAAR network is still ongoing. However, only a small portion of the documents and computer files confiscated in a raid on the network in 2002 (see March 20, 2002) have been fully translated from Arabic into English. This official complains, “They don’t have the damn resources. They don’t have the language skills or computer forensic personnel to go through it all. And yet it’s a gold mine of information.” [FrontPage Magazine, 12/9/2005]

Entity Tags: Federal Bureau of Investigation, SAAR Foundation

Timeline Tags: Complete 911 Timeline

An FBI investigation into Jane Harman (D-CA), the ranking minority member of the House Intelligence Committee, is halted by Attorney General Alberto Gonzales, according to three former top national security officials. The investigation was to determine whether she agreed to use her influence on behalf of accused Israeli spies in return for Israeli support in being named chairman of the committee (see Summer 2005, October 2005 and December 2, 2006). In contrast to the former officials’ claims, the media will report that the investigation is ended due to “lack of evidence” of impropriety or illegal behavior on Harman’s part. However, according to the former officials, Gonzales wants Harman to help defend the administration’s warrantless wiretapping program, which is about to be revealed by a long-simmering New York Times story (see December 15, 2005). The evidence against Harman includes NSA wiretaps of a conversation between her and an Israeli agent. Reporter Jeff Stein will write, “As for there being ‘no evidence’ to support the FBI probe, a source with first-hand knowledge of the wiretaps called that ‘bull****.’” Another former national security officer will confirm Harman’s presence on the wiretaps. “It’s true,” the official will say. “She was on there.” Justice Department attorneys in the intelligence and public corruption units have concluded that Harman had committed what they called a “completed crime,” meaning there was evidence to show that she had attempted to complete it; they were prepared to open a case on her that would include wiretaps approved by the Foreign Intelligence Surveillance Court (FISC). CIA Director Porter Goss certified the FISA wiretapping request, and decided to inform House Speaker Dennis Hastert (R-IL) and ranking House Democrat Nancy Pelosi (D-CA) of the impending FBI investigation. At this point, say Stein’s sources, Gonzales intervenes to stop the investigation. Two officials with knowledge of the events will say that, in Gonzales’s words, he “needed Jane” to help support the warrantless wiretapping program once it became public knowledge. Gonzales tells Goss that Harman had helped persuade the Times to refrain from publishing the story in late 2004 (see Early November 2004, December 6, 2005, and Mid-2005), and although the Times would no longer wait on the story, Harman could be counted on to help defend the program. She will do just that (see December 21, 2005 and February 8-12, 2006). Hastert and Pelosi are never told of the FBI investigation. Stein will also learn that Goss’s successor, Michael Hayden, will later be informed of the potential investigation, but choose to take no action. Likewise, Director of National Intelligence John Negroponte will oppose any such investigation. Former officials who will pursue the Israeli espionage case for years will say, in Stein’s words, that “Harman dodged a bullet… [s]he was protected by an administration desperate for help.” A recently retired national security official closely involved in the investigation will add: “It’s the deepest kind of corruption. It’s a story about the corruption of government—not legal corruption necessarily, but ethical corruption.” [Congressional Quarterly, 4/19/2009]

Entity Tags: Jeff Stein, Federal Bureau of Investigation, Dennis Hastert, Alberto R. Gonzales, Foreign Intelligence Surveillance Court, Jane Harman, Michael Hayden, Porter J. Goss, John Negroponte, House Intelligence Committee, New York Times, Nancy Pelosi

Timeline Tags: Civil Liberties

New York Times headline from article revealing NSA surveillance.New York Times headline from article revealing NSA surveillance. [Source: CBS News]The New York Times reveals that after the 9/11 attacks, President Bush granted the National Security Agency (NSA) secret authorization to eavesdrop on Americans and others inside the US without going through the Foreign Intelligence Surveillance Act (FISA) court to obtain legal warrants (see Early 2002. The administration justifies its actions by claiming such eavesdropping, which includes wiretapping phones and reading e-mails, is necessary to find evidence of terrorist activities, and says the nation needs the program after the 9/11 attacks exposed deficiencies in the US intelligence community’s information gathering process, and because of what they characterize as the “handcuffing” of US intelligence agencies by restrictive laws. The Times has had the article for over a year; the White House prevailed on the Times not to publish its findings for that time, arguing that publication would jeopardize continuing investigations and warn potential terrorists that they were under scrutiny. Many believe that the White House wanted to delay the publication of the article until well after the 2004 presidential elections. The Times delayed publication for over a year, and agreed to suppress some information that administration officials say could be useful to terrorists. (Less than two weeks before the article is published, Bush tries to convince the Times not to print the article at all: see December 6, 2005.) Two days after the Times publishes its article, Bush will acknowledge the order, and accuse the Times of jeopardizing national security (see December 17, 2005). The NSA program eavesdrops without warrants on up to 500 people in the US at any given time, officials say; the overall numbers have likely reached into the thousands. Overseas, up to 7,000 people suspected of terrorist ties are being monitored. Officials point to the discovery of a plot by Ohio trucker and naturalized US citizen and alleged al-Qaeda supporter Iyman Faris to bring down the Brooklyn Bridge with blowtorches as evidence of the program’s efficacy. They also cite the disruption of an al-Qaeda plot to detonate fertilizer bombs outside of British pubs and train stations by the program. But, officials say, most people targeted by the NSA for warrantless wiretapping have never been charged with a crime, and many are targeted because of questionable evidence and groundless suspicion. Many raise an outcry against the program, including members of Congress, civil liberties groups, immigrant rights groups, and others who insist that the program undermines fundamental Constitutional protections of US citizens’ civil liberties and rights to privacy. Several other government programs to spy on Americans have been challenged, including the Federal Bureau of Investigation (FBI)‘s surveillance of US citizens’ library and Internet usage, the monitoring of peaceful antiwar protests, and the proposed use of public and private databases to hunt for terrorist links. In 2004, the Supreme Court overturned the administration’s claim that so-called “enemy detainees” were not entitled to judicial review of their indefinite detentions. Several senior officials say that when the warrantless wiretapping program began, it operated with few controls and almost no oversight outside of the NSA itself. The agency is not required to seek the approval of the Justice Department or anyone else outside the FISA court for its surveillance operations. Some NSA officials wanted nothing to do with a program they felt was patently illegal, according to a former senior Bush administration official. Internal concerns about the program prompted the Bush administration to briefly suspend the program while Justice Department officials audited it and eventually provided some guidelines for its operations. A complaint from Judge Colleen Kollar-Kotelly, the federal judge who oversees the FISA Court, helped spur the suspension, according to officials. Kollar-Kotelly questioned whether information obtained under the program was being improperly used as the basis for FISA wiretap warrant requests from the Justice Department. Some government lawyers say that the Justice Department may have deliberately misled Kollar-Kotelly and the FISA court about the program in order to keep the program under wraps. The judge insisted to Justice Department officials that any material gathered under the program not be used in seeking wiretap warrants from her court. The question also arose in the Faris case, when senior Justice Department officials worried that evidence obtained by warrantless wiretapping by the NSA of Faris could be used in court without having to lie to the court about its origins. [New York Times, 12/15/2005]

Entity Tags: US Supreme Court, George W. Bush, US Department of Justice, Iyman Faris, National Security Agency, New York Times, Al-Qaeda, Foreign Intelligence Surveillance Court, Colleen Kollar-Kotelly

Timeline Tags: Civil Liberties

Times executive editor Bill Keller.Times executive editor Bill Keller. [Source: New York Times]The New York Times’s executive editor, Bill Keller, defends his paper’s decision to reveal the Bush administration’s warrantless wiretapping program, conducted through the NSA (see December 15, 2005), after holding the story for over a year. Keller writes: “We start with the premise that a newspaper’s job is to publish information that is a matter of public interest. Clearly a secret policy reversal that gives an American intelligence agency discretion to monitor communications within the country is a matter of public interest.… A year ago, when this information first became known to Times reporters, the administration argued strongly that writing about this eavesdropping program would give terrorists clues about the vulnerability of their communications and would deprive the government of an effective tool for the protection of the country’s security. Officials also assured senior editors of The Times that a variety of legal checks had been imposed that satisfied everyone involved that the program raised no legal questions. As we have done before in rare instances when faced with a convincing national security argument, we agreed not to publish at that time. We also continued reporting, and in the ensuing months two things happened that changed our thinking. First, we developed a fuller picture of the concerns and misgivings that had been expressed during the life of the program. It is not our place to pass judgment on the legal or civil liberties questions involved in such a program, but it became clear those questions loomed larger within the government than we had previously understood. Second, in the course of subsequent reporting we satisfied ourselves that we could write about this program—withholding a number of technical details—in a way that would not expose any intelligence-gathering methods or capabilities that are not already on the public record. The fact that the government eavesdrops on those suspected of terrorist connections is well-known. The fact that the NSA can legally monitor communications within the United States with a warrant from the Foreign Intelligence Surveillance Court is also public information. What is new is that the NSA has for the past three years had the authority to eavesdrop on Americans and others inside the United States without a warrant. It is that expansion of authority—not the need for a robust anti-terror intelligence operation—that prompted debate within the government, and that is the subject of the article.” [CNN, 12/16/2005]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, George W. Bush, Bill Keller

Timeline Tags: Civil Liberties

After an NSA program to intercept telephone calls where one party is in the US and the other party is abroad is revealed (see December 15, 2005), President George Bush defends the program in a radio address. He justifies the program by implying that, if it had been in place before 9/11, it may have prevented the attacks: “As the 9/11 Commission pointed out, it was clear that terrorists inside the United States were communicating with terrorists abroad before the September the 11th attacks, and the commission criticized our nation’s inability to uncover links between terrorists here at home and terrorists abroad. Two of the terrorist hijackers who flew a jet into the Pentagon, Nawaf Alhazmi and Khalid Almihdhar, communicated while they were in the United States to other members of al-Qaeda who were overseas. But we didn’t know they were here until it was too late.” There are conflicting accounts of the circumstances of the hijackers’ calls and the NSA actually intercepted them, so it is unclear why they were not exploited to prevent the attacks (see Early 2000-Summer 2001, (Spring 2000), Summer 2002-Summer 2004, and March 15, 2004 and After). [WhiteHouse(.gov), 12/17/2005; US President, 12/26/2005 pdf file] It is unclear which statements of the 9/11 Commission the president thinks he is referring to. The Commission’s final report touches on the NSA intercepts of the hijackers’ calls from the US in two places; in one it says: “[T]he NSA was supposed to let the FBI know of any indication of crime, espionage, or ‘terrorist enterprise’ so that the FBI could obtain the appropriate warrant. Later in this story, we will learn that while the NSA had the technical capability to report on communications with suspected terrorist facilities in the Middle East, the NSA did not seek FISA Court warrants to collect communications between individuals in the United States and foreign countries, because it believed that this was an FBI role,” (note: we do not actually learn this later in the 9/11 Commission report, this is the only mention). The second passage refers to Almihdhar’s time in San Diego and does not actually mention that the NSA intercepted the relevant calls, “Almihdhar’s mind seems to have been with his family in Yemen, as evidenced by calls he made from the apartment telephone.” [9/11 Commission, 7/24/2004, pp. 87-8, 222]

Entity Tags: National Security Agency, Nawaf Alhazmi, George W. Bush, Khalid Almihdhar, 9/11 Commission

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

After the NSA’s warrantless wiretapping program is revealed (see Early 2002 and December 15, 2005), some commentators criticize the program. Americans have fundamental Constitutional protections that are enforceable in court whether their conversations are domestic or international, says law scholar Geoffrey Stone. Stone says that President Bush’s emphasis that NSA wiretapping only takes place on US calls to overseas phones or overseas e-mails “is no different, as far as the law is concerned, from saying we only do it on Tuesdays.” Former FBI national security law chief Michael Woods, who served in the position when Bush signed the NSA directive, calls the program “very dangerous.” Though Woods says the program was justifiable in the immediate aftermath of 9/11, “[By now] we ought to be past the time of emergency responses. We ought to have more considered views now…. We have time to debate a legal regime and what’s appropriate.” [Washington Post, 12/18/2005] Kate Martin, director of the Center for National Security Studies, says the secret order may amount to Bush authorizing criminal activity in direct violation of FISA. “This is as shocking a revelation as we have ever seen from the Bush administration,” she says. “It is, I believe, the first time a president has authorized government agencies to violate a specific criminal prohibition and eavesdrop on Americans.” The American Civil Liberties Union’s Caroline Frederickson says of the program, “It’s clear that the administration has been very willing to sacrifice civil liberties in its effort to exercise its authority on terrorism, to the extent that it authorizes criminal activity.” [Washington Post, 12/16/2005]

Entity Tags: Center for National Security Studies, Geoffrey Stone, American Civil Liberties Union, National Security Agency, Caroline Frederickson

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales and NSA chief Lieutenant General Michael Hayden conduct their own “briefing” on the recently revealed NSA wiretapping program (see December 15, 2005) with the White House press corps. Gonzales and Hayden make the following points:
bullet Gonzales says that he will not discuss the internal workings of the still-classified program, only what he calls its “legal underpinnings.”
bullet He claims that the program, which he calls “the most classified program that exists in the United States government,” is legal because President Bush authorized it, and says that the idea that “the United States is somehow spying on American citizens” is wrong: it is “[v]ery, very important to understand that one party to the communication has to be outside the United States.”
bullet He says that for the NSA to eavesdrop on a US citizen’s telephone or e-mail communications, “we have to have a reasonable basis to conclude that one party to the communication is a member of al-Qaeda, affiliated with al-Qaeda, or a member of an organization affiliated with al-Qaeda, or working in support of al-Qaeda.” The wiretapping program is an essential part of the administration’s war against terror, he says.
bullet He goes on to claim that “the authorization to use force, which was passed by the Congress in the days following September 11th, constitutes” legal grounds for “this kind of signals intelligence.” [White House, 12/19/2005] The White House signed Congress’s Authorization to Use Military Force (AUMF) into law on September 18, 2001 (see September 14-18, 2001. [White House, 9/18/2001]
Hayden Claims Supreme Court Backing - While he admits that the Congressional authorization to use force against international terrorism does not specifically mention any kind of electronic surveillance, he refers the listeners to the Supreme Court case concerning alleged US terrorist Yaser Esam Hamdi (see June 28, 2004), in which the Court ruled that Hamdi had the legal right to challenge his detention. “[T]he United States government took the position that Congress had authorized that detention in the authorization to use force, even though the authorization to use force never mentions the word ‘detention.’ And the Supreme Court, a plurality written by Justice O’Connor agreed. She said, it was clear and unmistakable that the Congress had authorized the detention of an American citizen captured on the battlefield as an enemy combatant for the remainder—the duration of the hostilities. So even though the authorization to use force did not mention the word, ‘detention,’ she felt that detention of enemy soldiers captured on the battlefield was a fundamental incident of waging war, and therefore, had been authorized by Congress when they used the words, ‘authorize the President to use all necessary and appropriate force.’ For the same reason, we believe signals intelligence is even more a fundamental incident of war, and we believe has been authorized by the Congress. And even though signals intelligence is not mentioned in the authorization to use force, we believe that the Court would apply the same reasoning to recognize the authorization by Congress to engage in this kind of electronic surveillance.”
Bush 'Very Concerned' With Protecting Civil Liberties - Gonzales insists, Bush “is very concerned about the protection of civil liberties, and that’s why we’ve got strict parameters, strict guidelines in place out at NSA to ensure that the program is operating in a way that is consistent with the President’s directives.” He adds, “[W]e feel comfortable that this surveillance is consistent with requirements of the Fourth Amendment. The touchstone of the Fourth Amendment is reasonableness, and the Supreme Court has long held that there are exceptions to the warrant requirement in—when special needs outside the law enforcement arena. And we think that that standard has been met here.”
Wiretapping Essential in Catching Terrorists - Hayden reiterates how important the wiretapping is to catching terrorists and stopping potential attacks against US targets, though he and Gonzales both refuse to say what, if any, terrorist plots or what terror suspects might have been captured through the NSA wiretapping program. Hayden does say, “This program has been successful in detecting and preventing attacks inside the United States.…I can say unequivocally, all right, that we have got information through this program that would not otherwise have been available,” though he refuses to cite specifics. He admits that there have been some errors in surveilling innocent US citizens, though he refuses to give any details, and says those errors were quickly corrected.
Administration Not Required to Go Through FISA - Gonzales, who is the main speaker in the briefing, reiterates that while the administration continues to seek warrants from the Foreign Intelligence Surveillance (FISA) court, “we are not legally required to do, in this particular case, because the law requires that we—FISA requires that we get a court order, unless authorized by a statute, and we believe that authorization has occurred.” He justifies the administration’s refusal to use the FISA court for obtaining warrants by insisting that NSA officials “tell me that we don’t have the speed and the agility that we need, in all circumstances, to deal with this new kind of enemy. You have to remember that FISA was passed by the Congress in 1978. There have been tremendous advances in technology… since then.” Hayden adds, “I don’t think anyone could claim that FISA was envisaged as a tool to cover armed enemy combatants in preparation for attacks inside the United States. And that’s what this authorization under the President is designed to help us do.”
'Balancing' of Civil Liberties, National Security - Hayden says the warrantless wiretapping program is part of “a balancing between security and liberty,” a more “aggressive” operation “than would be traditionally available under FISA. It is also less intrusive. It deals only with international calls. It is generally for far shorter periods of time. And it is not designed to collect reams of intelligence, but to detect and warn and prevent about attacks. And, therefore, that’s where we’ve decided to draw that balance between security and liberty.”
Media Leaks Damaging to National Security - Gonzales refuses to talk about when any members of Congress were briefed on the program or what they were told, but he does imply that there will be some sort of leak investigation as to how the New York Times found out about the program: “[T]his is really hurting national security, this has really hurt our country, and we are concerned that a very valuable tool has been compromised. As to whether or not there will be a leak investigation, we’ll just have to wait and see.”
No Evidence of Compromised National Security - When asked whether he can cite any evidence that the revelation of the program’s existence has actually compromised anything—“Don’t you assume that the other side thinks we’re listening to them? I mean, come on,” one reporter says—Gonzales responds, rather confusingly, “I think the existence of this program, the confirmation of the—I mean, the fact that this program exists, in my judgment, has compromised national security, as the President indicated on Saturday.”
Easier to Sidestep FISA Instead of Seek Congressional Approval - He does admit that the administration decided to sidestep the FISA court entirely instead of attempt to work with Congress to rewrite the FISA statutes because “we were advised that that would be difficult, if not impossible” to amend the law to the White House’s satisfaction. Gonzales says those who are concerned about the program being excessively intrusive or a threat to American civil liberties simply “don’t understand the specifics of the program, they don’t understand the strict safeguards within the program.… Part of the reason for this press brief today is to have you help us educate the American people and the American Congress about what we’re doing and the legal basis for what we’re doing.” He adds that any legal experts who believe the program is illegal are basing their judgments “on very limited information.”
Tough Questioning - One reporter asks an unusually tough series of questions to Gonzales: “Do you think the government has the right to break the law?”, to which Gonzales replies, “Absolutely not. I don’t believe anyone is above the law.” The reporter then says, “You have stretched this resolution for war into giving you carte blanche to do anything you want to do,” to which Gonzales replies cryptically, “Well, one might make that same argument in connection with detention of American citizens, which is far more intrusive than listening into a conversation.” The reporter insists, “You’re never supposed to spy on Americans,” and Gonzales deflects the responsibility for the decision back onto the Supreme Court.
Administration Will Tell Nation What It Needs to Know - Gonzales says the administration has no intention of releasing any of the classified legal opinions underpinning the program, and this press briefing is one of the methods by which the administration will “educat[e] the American people…and the Congress” to give them what they need to know about the program. [White House, 12/19/2005]

Entity Tags: White House press corps, Michael Hayden, Al-Qaeda, National Security Agency, Alberto R. Gonzales, George W. Bush, Foreign Intelligence Surveillance Court

Timeline Tags: Civil Liberties

DARPA logo.DARPA logo. [Source: Duke University]The computer and technology experts at Ars Technica, a well-regarded Web publication which describes itself as focusing on “the art of technology,” speculate on the technology behind the NSA warrantless wiretapping program recently revealed to the public (see December 15, 2005). The Ars Technica experts believe that Senator Jay Rockefeller (D-WV)‘s 2003 comparison between the program and the Total Information Awareness (TIA) project (see March 2002) is the most apt. They believe that the NSA wiretapping program may be built upon the foundation of a shadowy, highly classified surveillance program called Echelon. They write, “This system’s purpose would be to monitor communications and detect would-be terrorists and plots before they happen… This project is not interested in funding ‘evolutionary’ changes in technology, e.g., bit-step improvements to current data mining and storage techniques. Rather, the amount of data that the directors are anticipating (petabytes!) would require massive leaps in technology (and perhaps also some massive leaps in surveillance laws).” [Ars Technica, 12/20/2005; Ars Technica, 2007] Data storage measured in petabytes is a colossal capacity; a petabyte is 1,024 terabytes, and a single terabyte is 1,024 gigabytes, the usual measurement for hard drive capacity. [TechTerms, 2007] The Ars Technica experts continue, “According to DARPA, such data collection ‘increases information coverage by an order of magnitude,’ and ultimately ‘requires keeping track of individuals and understanding how they fit into models.’” They go on to note that the NSA wiretapping program was instituted shortly after the TIA project was quashed by Congress, and say they believe the NSA program is an extension and an outgrowth of TIA. They note that “the FBI requested the legal authorization to do very high-volume monitoring of digital calls” in 1995, that there is “no way for the judicial system to approve warrants for the number of calls that the FBI wanted to monitor,” and that the FBI “could never hire enough humans to be able to monitor that many calls simultaneously, which means that they’d have to use voice recognition technology to look for ‘hits’ that they could then follow up on with human wiretaps.” The Ars Technica experts believe the NSA is using “some kind of high-volume, automated voice recognition and pattern matching system,” employing a form of “smart filtering” that would weed through perhaps hundreds of thousands of computer-monitored calls and turning a fraction of those calls over to human analysts for evaluation: “[Y]es, this kind of real-time voice recognition, crude semantic parsing and pattern matching is doable with today’s technology, especially when you have a budget like the NSA.” In a follow-up, Ars Technica technology specialist and self-described conservative and “privacy nazi” Jon Stokes writes of his own concerns over the program, noting that the program is too wide-reaching and too blunt to actually catch many real terrorists, and that the program is a tremendous intrusion into Americans’ fundamental privacy: “The problem is not that such large-scale industrial fishing invariably catches a few dolphins along with the tuna, but that between 99.999 and 100 percent of what you’re going to get is dolphin.” Stokes also warns that such an intrusive surveillance program will not only violate privacy rights, but be quite ineffective: “As the TSA, with its strip-searching of people’s elderly grandparents, abundantly proves every holiday season, blunt instruments and scorched earth tactics are of dubious value in catching genuine bad actors. In fact, blunt instruments and wide nets are the easiest for professional bad guys to evade. All you need to beat such surveillance tools is patience and know-how.…Blunt instruments like airport facial recognition software and random subway bag searches produce much more noise than they do signal, and any engineer or computer scientist worth his or her salt will tell you that an intelligent, targeted, low-tech approach beats a brute-force high-tech approach every time. There is no high-tech substitute for human intelligence gathering. In fact…an overload of crudely processed information is actually more likely to lead an analyst astray than it is to produce any useful insight.…In the end, brute force security techniques are not only corrosive to democratic values but they’re also bad for national security. They waste massive resources that could be spent more effectively elsewhere, and they give governments and countries a false sense of security that a savvy enemy can exploit to devastating effect.…[I]t’s not just enough to have sound intelligence; you also need political leaders who have the wisdom to use that intelligence appropriately.” [Ars Technica, 12/20/2005]

Entity Tags: Transportation Safety Administration, Total Information Awareness, Federal Bureau of Investigation, John D. Rockefeller, Defense Advanced Research Projects Agency, Jon Stokes, National Security Agency

Timeline Tags: Civil Liberties

Jonathan Alter.Jonathan Alter. [Source: Publicity photo via Greater Talent Network]Reporter and political pundit Jonathan Alter writes that President Bush’s attempt to kill the New York Times domestic wiretapping story (see December 15, 2005 and December 6, 2005), which the Times delayed for over a year at the White House’s request, is not an attempt to protect national security, as Bush will say in his response to the article (see December 17, 2005), but “because he knew that it would reveal him as a law-breaker.” Alter continues, “He insists he had ‘legal authority derived from the Constitution and Congressional resolution authorizing force.’ But the Constitution explicitly requires the president to obey the law. And the post-9/11 congressional resolution authorizing ‘all necessary force’ in fighting terrorism was made in clear reference to military intervention. It did not scrap the Constitution and allow the president to do whatever he pleased in any area in the name of fighting terrorism.” Alter is puzzled that Bush felt the need for the program when the 1978 Foreign Intelligence Surveillance Act (see 1978) “allows the government to eavesdrop on its own, then retroactively justify it to the court, essentially obtaining a warrant after the fact.” Alter says that only four of “tens of thousands” of FISA requests have ever been rejected, and, “There was no indication the existing system was slow—as the president seemed to claim in his press conference—or in any way required extra-constitutional action.” He concludes: “[Bush] knew publication would cause him great embarrassment and trouble for the rest of his presidency. It was for that reason—and less out of genuine concern about national security—that George W. Bush tried so hard to kill the New York Times story. …We’re seeing clearly now that Bush thought 9/11 gave him license to act like a dictator, or in his own mind, no doubt, like Abraham Lincoln during the Civil War.” [Newsweek, 12/21/2005]

Entity Tags: Abraham Lincoln, Bush administration (43), National Security Agency, New York Times, George W. Bush, Foreign Intelligence Surveillance Court, Foreign Intelligence Surveillance Act, Jonathan Alter

Timeline Tags: Civil Liberties

Chart showing NSA surveillance network.Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” [New York Times, 12/24/2005]

Entity Tags: US Department of Defense, US Department of Justice, Total Information Awareness, New York Times, US Department of Homeland Security, Computer Assisted Passenger Prescreening System, Bush administration (43), Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, George W. Bush, National Security Agency, Phil Karn

Timeline Tags: Civil Liberties

Suzanne Spaulding, a former counsel for the CIA, the Senate and House intelligence commission, and executive director of the National Terrorism Commission from 1999 through 2000, writes an op-ed criticizing the Bush administration for its domestic surveillance program. She writes that the three main sources of oversight and restraint on Bush’s unfettered efforts to monitor US citizens—Congress, the judiciary, and the American people—have failed to halt what she calls “this extraordinary exercise of presidential power.” Spaulding, who will testify along similar lines before the Senate over a year later (see April 11, 2007), writes, “Ironically, if it is ultimately determined that this domestic surveillance program reflects the exercise of unchecked power in contravention of law, it will wind up weakening the presidency. Once again, we will confront the challenge of restoring Americans’ faith in the rule of law and our system of checks and balances.” The pretense of oversight by the administration, in providing limited and perhaps misleading briefings on the program only to the so-called “Gang of Eight” Congressional leaders, is superficial and ineffective, she writes; the entire process “effectively eliminates the possibility of any careful oversight.” She notes that because of the severe restrictions both in the information doled out to these Congressional leaders, and their strict prohibition on discussing the information with anyone else, even other intelligence panel members, “[i]t is virtually impossible for individual members of Congress, particularly members of the minority party, to take any effective action if they have concerns about what they have heard in one of these briefings. It is not realistic to expect them, working alone, to sort through complex legal issues, conduct the kind of factual investigation required for true oversight and develop an appropriate legislative response.” Congressional oversight is key to retaining the trust of the US citizenry, she writes, and adds that that particular principle was well understood at the CIA while she was there. Oversight “is vital for a secret agency operating in a democracy. True oversight helps clarify the authority under which intelligence professionals operate. And when risky operations are revealed, it is important to have members of Congress reassure the public that they have been overseeing the operation. The briefings reportedly provided on the National Security Agency (NSA) surveillance program reflect, instead, a ‘check the box’ mentality—allowing administration officials to claim that they had informed Congress without having really achieved the objectives of oversight.” While those few members of Congress are given little real information, the judiciary, particularly the Foreign Intelligence Surveillance Court (FISC), is cut out of the process entirely. “Instead of going to a judge on the secret court that was specifically established to authorize foreign intelligence surveillance inside the United States, we are told that an NSA shift supervisor was able to sign off on the warrantless surveillance of Americans,” she writes. “That’s neither a check nor a balance. The primary duty of the NSA shift supervisor, who essentially works for the president, is to collect intelligence. The task of the judge is to ensure that the legal standards set out in the 1978 Foreign Intelligence Surveillance Act (FISA) have been met. Which one has stronger independence to say no, if no needs to be said? The objectives of the surveillance program, as described in news reports, seem laudable. The government should be running to ground the contacts listed in a suspected terrorist’s cell phone, for example. What is troubling is that this domestic spying is being done in apparent contravention of FISA, for reasons that still are not clear.” In her piece she takes issue with the Bush administration’s insistence that its surveillance program is legal and necessary. She makes the following case:
Specious Arguments to Duck FISA Court - The argument that the FISA Court is too slow to respond to immediate needs for domestic surveillance is specious, she says. “FISA anticipates situations in which speed is essential. It allows the government to start eavesdropping without a court order and to keep it going for a maximum of three days. And while the FISA application process is often burdensome in routine cases, it can also move with remarkable speed when necessary, with applications written and approved in just a few hours.” Instead, she says that the Bush administration must have dodged FISC because their wiretaps didn’t meet FISA standards of probable cause. Since FISC is staffed by judges hand-picked by conservative then-Supreme Court Chief Justice William Rehnquist, “who presumably felt that they had the right temperament and expertise to understand the national security imperatives as well as the need to protect civil liberties,” and since FISC has granted all but four of the more than 5,645 requests for wiretaps and surveillance made by the administration since 2001, to argue that FISC is unresponsive is simply wrong-headed. And, she notes, if the administration felt that FISA’s standards were too strict, it could have moved to amend the law to allow more leniency in obtaining such warrants. It has not done so since the passage of the 2001 Patriot Act. She writes, “The administration reportedly did not think it could get an amendment without exposing details of the program. But this is not the first time the intelligence community has needed a change in the law to allow it to undertake sensitive intelligence activities that could not be disclosed. In the past, Congress and the administration have worked together to find a way to accomplish what was needed. It was never previously considered an option to simply decide that finding a legislative solution was too hard and that the executive branch could just ignore the law rather than fix it.”
No Justification for Keeping Program Secret - In addition, the administration has consistently failed to make a case for keeping the domestic wiretapping policy secret for four years. US-designated terrorist groups already know that the government listens to their cell phone conversations whenever possible, and they are well aware of the various publicly known programs to search through millions of electronic communications, such as the NSA’s Echelon program (see April 4, 2001). “So what do the terrorists learn from a general public discussion about the legal authority being relied upon to target their conversations?” she asks. “Presumably very little. What does the American public lose by not having the public discussion? We lose the opportunity to hold our elected leaders accountable for what they do on our behalf.”
Assertions that Program Authorized by Congress Fallacious - The argument advanced by Attorney General Alberto Gonzales that says the program does not violate the law because Congress’s post-9/11 authorization of force against terrorists gives the administration the right to circumvent FISA is equally specious, she argues. “FISA does provide for criminal penalties if surveillance is conducted under color of law ‘except as authorized by statute.’ This is a reference to either FISA or the criminal wiretap statute. A resolution, such as the Use of Force resolution, does not provide statutory authority. Moreover, FISA specifically provides for warrantless surveillance for up to 15 days after a declaration of war. Why would Congress include that provision if a mere Use of Force resolution could render FISA inapplicable? The law clearly states that the criminal wiretap statute and FISA are ‘the exclusive means by which electronic surveillance…and the interception of domestic wire, oral, and electronic communications may be conducted.’ If these authorities are exclusive, there is no other legal authority that can authorize warrantless surveillance. Courts generally will not view such a clear statutory statement as having been overruled by a later congressional action unless there is an equally clear indication that Congress intended to do that.” Therefore, by any legal standard, the administration’s program is, apparently, illegal.
No Inherent Presidential Authority - The ultimate argument by Bush officials, that the president has some sort of inherent authority as commander-in-chief to authorize illegal wiretaps, is the same groundless legal argument recently used to justify the use of torture by US intelligence and law enforcement agents (see December 28, 2001). That argument was withdrawn, Spaulding notes, after it became publicly known. While the courts have not specifically ruled on this particular argument, Spaulding notes that the Supreme Court refused to recognize then-President Harry Truman’s attempt to seize control of the nation’s steel mills to avert a possible strike during the Korean War. The Supreme Court ruled “that the president’s inherent authority is at its weakest in areas where Congress has already legislated. It ruled that to find inherent presidential authority when Congress has explicitly withheld that authority—as it has in FISA—‘is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between president and Congress.’” She notes that in 2004, the Supreme Court rejected the argument for unchecked presidential power in the Hamdi case (see June 28, 2004), with Justice Sandra Day O’Connor writing for the court, “We have long since made clear that a state of war is not a blank check for the president when it comes to the rights of the Nation’s citizens. …Whatever power the United States Constitution envisions for the Executive in its exchanges with… enemy organizations in times of conflict, it most assuredly envisions a role for all three branches when individual liberties are at stake.” Spaulding concludes, “The rule of law and our system of checks and balances are not a source of weakness or a luxury of peace. As O’Connor reminded us in Hamdi, ‘It is during our most challenging and uncertain moments…that we must preserve our commitment at home to the principles for which we fight abroad.’” [Washington Post, 12/25/2005]

Entity Tags: Sandra Day O’Connor, William Rehnquist, USA Patriot Act, Suzanne Spaulding, National Security Agency, US Supreme Court, Harry S. Truman, Alberto R. Gonzales, “Gang of Eight”, National Commission on Terrorism, Central Intelligence Agency, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Echelon, Bush administration (43)

Timeline Tags: Civil Liberties

The Justice Department opens an investigation into the leak of classified information about the Bush domestic surveillance program. The investigation focuses on disclosures to the New York Times about the secret warrantless wiretapping program conducted by the National Security Agency since shortly after the 9/11 attacks (see Early 2002). The White House claims that the Justice Department initiated the investigation on its own after receiving a request from the NSA, and that it was not even informed of the investigation until the decision had already been made. But White House spokesman Trent Duffy hails the investigation, and implicitly accuses the Times of aiding and abetting terrorists by printing its stories. “The leaking of classified information is a serious issue,” Duffy says. “The fact is that al-Qaeda’s playbook is not printed on Page One, and when America’s is, it has serious ramifications.” [Associated Press, 12/30/2005] President Bush fuels the attack on the Times when he says, “The fact that we’re discussing this program is helping the enemy.” [New York Times, 12/30/2005] Many outside of the administration have accused the wiretapping program, which functions without external oversight or court warrants, of being illegal, and Bush of breaking the law by authorizing it. Administration officials insist that Bush has the power to make such a decision, both under the Constitution’s war powers provision and under the post-9/11 Congressional authorization to use military force against terrorism, even though, as former Senate Majority Leader Tom Daschle recalls, Congress explicitly refused to give Bush the authority to take military action inside the US itself (see December 21-22, 2005). And, in a recent letter to the chairs of the House and Senate Intelligence Committees, the White House claimed that the nation’s security needs outweigh the needs of the citizenry to be secure from secret government surveillance. [Associated Press, 12/30/2005] Others disagree. The American Civil Liberties Union’s Anthony Romero says, “President Bush broke the law and lied to the American people when he unilaterally authorized secret wiretaps of US citizens. But rather than focus on this constitutional crisis, Attorney General [Alberto] Gonzales is cracking down on critics of his friend and boss. Our nation is strengthened, not weakened, by those whistle-blowers who are courageous enough to speak out on violations of the law.” And Marc Rotenberg, the executive director of the Electronic Privacy Information Center, says the NSA should be the focus of an investigation to determine if it broke federal surveillance laws. Tom Devine of the Government Accountability Project suggests a middle course. His group does not object to a limited investigation into the leak of classified information, but, he says, if the administration does “a blanket witch hunt, which I fear, it would trample all over good government laws” designed to protect government workers who expose wrongdoing. “The whole reason we have whistle-blower laws is so that government workers can act as the public’s eyes and ears to expose illegality or abuse of power.” [New York Times, 12/30/2005] Ultimately, this leak investigation may not achieve much, according to law professor Carl Tobias. “It doesn’t seem to me that this leak investigation will take on the importance of the Plame case,” Tobias says. “The bigger story here is still the one about domestic spying and whether the president intends, as he said, to continue doing it.” [Washington Post, 12/31/2005]

Entity Tags: Anthony D. Romero, Tom Devine, Trent Duffy, American Civil Liberties Union, Al-Qaeda, Tom Daschle, Senate Intelligence Committee, US Department of Justice, National Security Agency, Carl Tobias, Electronic Privacy Information Center, Alberto R. Gonzales, New York Times, Government Accountability Project, George W. Bush, Marc Rotenberg, House Intelligence Committee

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see July 7, 2009 and May 2004), angered by the Bush administration’s counterattack against government and media members who have helped to expose its warrantless wiretapping operation (see December 15-31, 2005), decides to go public with a memo he wrote about his own knowledge of the collusion between AT&T and the National Security Agency (NSA) in eavesdropping on American citizens’ communications (see January 16, 2004). He updates the memo with a brief preface, selects eight pages of the 121 pages of AT&T documentation he possesses which he believes gives a good overview of the NSA’s surveillance equipment installation, and includes the two photographs he has taken of the NSA’s “secret room” at the AT&T facility in San Francisco and the Internet research he has done on the Narus STA 6400 equipment the NSA is using to sort the communications being captured and recorded (see Late 2003). Instead of entrusting his newly refurbished memo to the Internet, he uses the PGP (Pretty Good Privacy) security protocol for anticipated dissemination, burns the data onto a CD, and begins searching online for civil liberties groups that might be interested in his work. [Wired News, 5/17/2006; Klein, 2009, pp. 53-55]

Entity Tags: AT&T, National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

After 9/11 there was much discussion about how hijackers Nawaf Alhazmi and Khalid Almihdhar were able to participate in an operation like 9/11, even though they were well known to US intelligence (see, for example, January 5-8, 2000, Early 2000-Summer 2001, and 9:53 p.m. September 11, 2001).
FBI Theory - Based on conversations with FBI agents, author Lawrence Wright speculates on why the CIA withheld information it should have given the FBI: “Some… members of the [FBI’s] I-49 squad would later come to believe that the [CIA] was shielding Almihdhar and Alhazmi because it hoped to recruit them.… [They] must have seemed like attractive opportunities; however, once they entered the United States they were the province of the FBI. The CIA has no legal authority to operate inside the country, although in fact, the bureau often caught the agency running backdoor operations in the United States.… It is also possible, as some FBI investigators suspect, the CIA was running a joint venture with Saudi intelligence in order to get around that restriction. Of course, it is also illegal for foreign intelligence services to operate in the United States, but they do so routinely.” [Wright, 2006, pp. 312-313]
Explanation of Acquired Visas - This theory offers a possible explanation, for example, of how Almihdhar and Alhazmi managed to move in and out of Saudi Arabia and obtain US visas there even though they were supposedly on the Saudi watch list (see 1997 and April 3-7, 1999), and why a Saudi agent in the US associated with them (see January 15-February 2000). Wright points out that “these are only theories” but still notes that “[h]alf the guys in the Bureau think CIA was trying to turn them to get inside al-Qaeda.” [Wright, 2006, pp. 313; Media Channel, 9/5/2006]
Participant Does Not Know - Doug Miller, an FBI agent loaned to the CIA who was part of a plot to withhold the information from the FBI (see 9:30 a.m. - 4:00 p.m. January 5, 2000), will indicate he does not know why he was ordered to withhold the information, but that his superiors may have had a good reason for keeping it from the FBI. Another intelligence source will claim that the CIA withheld the information to keep the FBI away from a sensitive operation to penetrate al-Qaeda. [Congressional Quarterly, 10/1/2008]
CIA Wanted to Keep FBI Off Case - Another unnamed FBI agent loaned to Alec Station before 9/11 will say: “They didn’t want the bureau meddling in their business—that’s why they didn’t tell the FBI. Alec Station… purposely hid from the FBI, purposely refused to tell the bureau that they were following a man in Malaysia who had a visa to come to America. The thing was, they didn’t want… the FBI running over their case.” [Bamford, 2008, pp. 20]
Similar Explanation - Wright is not the first to have made the suggestion that Alhazmi and Almihdhar were protected for recruitment purposes. Investigative journalist Joe Trento reported in 2003 that a former US intelligence official had told him that Alhazmi and Almihdhar were already Saudi Arabian intelligence agents when they entered the US (see August 6, 2003).

Entity Tags: Nawaf Alhazmi, Lawrence Wright, Doug Miller, Saudi General Intelligence Directorate, Central Intelligence Agency, Khalid Almihdhar, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Vice President Cheney mentioned NSA intercepts of the 9/11 hijackers’ calls in a speech to the Heritage Foundation.Vice President Cheney mentioned NSA intercepts of the 9/11 hijackers’ calls in a speech to the Heritage Foundation. [Source: David Bohrer / White House]Vice President Dick Cheney uses calls between the 9/11 hijackers in the US and an al-Qaeda communications hub in Yemen that were intercepted by the NSA (see Early 2000-Summer 2001) to justify the NSA’s warrantless wiretapping program (see December 15, 2005). Cheney points out that, “There are no communications more important to the safety of the United States than those related to al-Qaeda that have one end in the United States,” and says that if the NSA’s warrantless program had been implemented before 9/11, “we might have been able to pick up on two hijackers [Nawaf Alhazmi and Khalid Almihdhar] who subsequently flew a jet into the Pentagon.” He adds: “They were in the United States, communicating with al-Qaeda associates overseas. But we did not know they were here plotting until it was too late.” [White House, 1/4/2006] Other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the program is revealed by the New York Times (see December 17, 2005).

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi, Richard (“Dick”) Cheney

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

President Bush’s rationale for authorizing warrantless surveillance against US citizens is of questionable legality and “may represent an exercise of presidential power at its lowest ebb,” according to a Congressional analysis. The Congressional Research Service (CRS), the independent and nonpartisan research bureau of the legislature, answers the question raised around the nation since the revelation of the secret program by the New York Times (see Early 2002): did Bush break the law when he ordered the National Security Agency to eavesdrop on US citizens without court orders or judicial oversight? The CRS report does not give a definitive yes or no answer to that question, but finds Bush’s legal rationale dubious at best. That rationale “does not seem to be as well-grounded” as administration lawyers have claimed, and the report finds that, despite assertions to the contrary by Bush and administration officials, Congress did not authorize warrantless wiretaps when it gave the executive branch the authority to wage war against al-Qaeda in the days after the 9/11 attacks. Unsurprisingly, Bush administration officials criticize the report. But some Republicans and Democrats find the report’s conclusions persuasive, and hold up the report as further evidence that Bush overextended his authority by authorizing the wiretaps. For instance, Republican Thomas Kean, the former chairman of the 9/11 commission (see January 27, 2003, says he doubts the program’s legality. Kean, who has not spoken publicly about the program until now, says the 9/11 commission was never told about the program, and he strongly doubts its legality. “We live by a system of checks and balances, and I think we ought to continue to live by a system of checks and balances,” Kean says. [Congressional Research Service, 1/5/2006 pdf file; New York Times, 1/6/2006]

Entity Tags: George W. Bush, 9/11 Commission, Congressional Research Service, New York Times, National Security Agency, Thomas Kean

Timeline Tags: Civil Liberties

John Yoo’s ‘The Powers of War and Peace.’John Yoo’s ‘The Powers of War and Peace.’ [Source: University of Maryland]Libertarian law professor Cass Sunstein reviews a recent book by former Bush legal adviser John Yoo, who authored several of the Bush administration’s most controversial legal opinions concerning terrorism and executive power (see September 21, 2001, September 25, 2001, September 25, 2001, October 4, 2001, October 23, 2001, October 23, 2001, November 2, 2001, November 6-10, 2001, November 15, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24, 2002, January 24-26, 2002, March 13, 2002, April 8, 2002, June 27, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and October 11, 2002). Yoo’s book, The Powers of War and Peace: The Constitution and Foreign Affairs After 9/11, is a compendium of his pre-9/11 academic writings that landed him his job at the Justice Department’s Office of Legal Counsel. Sunstein notes that Yoo, perhaps more than any other single legal scholar, has reshaped the government’s legal stance on any number of issues. He argued for the president’s unilateral ability to declare war without the approval of Congress, the use of “enhanced interrogation techniques” on suspected terrorists, the withdrawal of essential civil liberties and legal rights from suspected terrorists and enemy collaborators, the right of the administration to electronically eavesdrop on the American citizenry without judicial consent or oversight, the ability to ignore or withdraw from international treaties without congressional approval, and more besides. Sunstein writes: “[T]aken as a whole, the claims of the Bush administration may be properly regarded as an effort to create a distinctive set of constitutional understandings for the post-September 11 era. The White House is attempting to create a kind of 9/11 Constitution. A defining feature of these understandings is a strong commitment to inherent presidential authority over national security, including a belief that in crucial domains the president can act without congressional permission, and indeed cannot be checked by congressional prohibitions.” Yoo is a key figure in that effort. Sunstein calls his work interesting but completely one-sided, simply ignoring “the mountainous counter-evidence” against most of his constitutional claims. “Yoo’s reading would require us to ignore far too many statements by prominent figures in the founding generation,” Sunstein writes. “There are not many issues on which James Madison, Thomas Jefferson, John Marshall, Alexander Hamilton, George Washington, James Wilson, John Adams, and Pierce Butler can be said to agree. Were all of them wrong?” Sunstein concludes: “[W]ith respect to war, there is no reason for a 9/11 Constitution. The old one, read in the light of our traditions, will do just fine.” [New Republic, 1/9/2006; Savage, 2007, pp. 81-82]

Entity Tags: Bush administration (43), Office of Legal Counsel (DOJ), John C. Yoo, Cass Sunstein

Timeline Tags: Civil Liberties

Russell Tice.Russell Tice. [Source: ABC News]Former National Security Agency (NSA) official Russell Tice says that many of the wiretapping operations he once helped run were illegal. “I specialized in what’s called special access programs,” Tice tells ABC News. “We called them ‘black world’ programs and operations.” Tice is ready to testify before Congress about what he calls the illegal wrongdoings that are part of the Defense Department and the NSA’s wiretapping programs enacted after the 9/11 attacks. Many of these programs were targeted at innocent US citizens. “The mentality was we need to get these guys, and we’re going to do whatever it takes to get them,” he says. The technology used to track and sort through every domestic and international telephone center is impressive. “If you picked the word ‘jihad’ out of a conversation, the technology exists that you focus in on that conversation, and you pull it out of the system for processing.” Intelligence analysts use the information to develop graphs that resemble spiderwebs linking one suspect’s phone number to hundreds or even thousands more. While the president has admitted giving orders that allowed the NSA to eavesdrop on a small number of Americans without warrants, Tice says says the number of Americans subject to eavesdropping by the NSA could be in the millions if the full range of secret NSA programs is used. “That would mean for most Americans that if they conducted, or you know, placed an overseas communication, more than likely they were sucked into that vacuum.” Tice has been subjected to what appears to be bureaucratic punishment for his willingness to blow the whistle on the nation’s warrantless wiretapping programs; last year the NSA revoked his security clearance based on what it calls "psychological concerns," and later fired him. Tice says that is the way the NSA often deals with employees it considers troublemakers and whistleblowers (see January 25-26, 2006). [ABC News, 1/10/2006; ABC, 1/10/2006]

Entity Tags: US Department of Defense, National Security Agency, Russell Tice

Timeline Tags: Civil Liberties

It had been widely reported that the Saudi government began to crack down seriously on al-Qaeda and other radical militants after a 2003 al-Qaeda attack in Saudi Arabia (see May 12, 2003). However, the Los Angeles Times reports that US officials now claim that is not true. While Saudis have been very aggressive and cooperative in cracking down on militants within Saudi Arabia since that attack, they have done little outside the country. Millions of dollars continue to flow from wealthy Saudis through charity fronts to al-Qaeda and other suspected groups, and the Saudi government is doing next to nothing about it. In 2004, the Saudis promised to set up a government commission to police such groups, but they have yet to do so. The Saudi government has also done little to rein in influential radical religious leaders who openly encourage their followers to attack US interests in Iraq and elsewhere in the world. US officials claim that at least five organizations, including the Muslim World League (MWL), the International Islamic Relief Organization (IIRO), and the World Assembly of Muslim Youth (WML), “are headquartered in Saudi Arabia but continue to engage in highly suspect activity overseas.” A senior US counterterrorism official says that some known terrorist financiers continue to “operate and live comfortably in Saudi Arabia” despite US objections. [Los Angeles Times, 1/15/2006]

Entity Tags: Saudi Arabia, International Islamic Relief Organization, Muslim World League, World Assembly of Muslim Youth

Timeline Tags: Complete 911 Timeline

Al Gore speaks to the Liberty Coalition and the American Constitution Society.Al Gore speaks to the Liberty Coalition and the American Constitution Society. [Source: American Constitution Society]Former Vice President Al Gore delivers a long, impassioned speech on civil liberties and constitutional issues to the Liberty Coalition and the American Constitution Society. Gore joins former Representative Bob Barr (R-GA) in speaking out against the Bush administration’s infringement on American civil liberties. Gore and Barr have what Gore calls a “shared concern that America’s Constitution is in grave danger.”
Patently Illegal Domestic Surveillance - Gore’s speech is sparked by recent revelations that the NSA has been spying on American citizens for years (see December 15, 2005), and in response, the administration “has brazenly declared that it has the unilateral right to continue without regard to the established law enacted by Congress precisely to prevent such abuses.” As the Foreign Intelligence and Surveillance Act (FISA) is perfectly sufficient, there was no need for the Bush administration to circumvent that law. “At present, we still have much to learn about the NSA’s domestic surveillance,” Gore says. “What we do know about this pervasive wiretapping virtually compels the conclusion that the president of the United States has been breaking the law, repeatedly and insistently. A president who breaks the law is a threat to the very structure of our government.” Gore says he agrees with Bush on the threat of terrorism, but disagrees that the US has to “break the law or sacrifice our system of government” to protect itself, as this will make it “weaker and more vulnerable.” In addition, he says, “once violated, the rule of law is itself in danger,” and, “Unless stopped, lawlessness grows, the greater the power of the executive grows, the more difficult it becomes for the other branches to perform their constitutional roles.” It is patently obvious that the Bush administration has broken the law in conducting and approving its warrantless wiretaps, Gore says, regardless of what arguments and defenses administration officials may put forth (see September 12-18, 2001 and Early 2002). So, Gore says, “When President Bush failed to convince Congress to give him the power he wanted when this measure was passed, he secretly assumed that power anyway, as if Congressional authorization was a useless bother. But as [Supreme Court] Justice [Felix] Frankfurter once wrote, ‘To find authority so explicitly withheld is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between the president and the Congress.‘… And the disrespect embodied in these apparent mass violations of the law is part of a larger pattern of seeming indifference to the Constitution that is deeply troubling to millions of Americans in both political parties.”
Illegal Seizure of American Citizens - Gore notes that Bush has declared that he has “a heretofore unrecognized inherent power to seize and imprison any American citizen that he alone determines to be a threat to our nation, and that notwithstanding his American citizenship that person in prison has no right to talk with a lawyer, even if he wants to argue that the president or his appointees have made a mistake and imprisoned the wrong person” (see November 13, 2001 and March 5, 2002). He says: “The president claims that he can imprison that American citizen—any American citizen he chooses—indefinitely, for the rest of his life, without even an arrest warrant, without notifying them of what charges have been filed against them, without even informing their families that they have been imprisoned.” Gore then says: “No such right exists in the America that you and I know and love. It is foreign to our Constitution. It must be rejected.”
Specious Authority to Torture - Neither does the executive branch have the right to authorize torture, Gore says. After citing horrific examples from Guantanamo and Abu Ghraib, he calls it “a shameful exercise of power that overturns a set of principles that you’re nation has observed since General George Washington first enunciated them during our Revolutionary War. They have been observed by every president since then until now. They violate the Geneva Conventions, the International Convention Against Torture, and our own laws against torture.”
Unlawful Kidnapping of Foreign Citizens - The president has no right to have foreign citizens kidnapped from their homes and brought to the US for interrogation and imprisonment, or worse, delivered to other nations for harsh interrogations and torture, says Gore. The closest allies of the US have been shocked by such claims.
No Restraint in the Constitution? - Gore asks whether the president really has such powers under the Constitution and, if so, “are there any acts that can on their face be prohibited?” He quotes the dean of Yale’s law school, Harold Koh, who said, “If the president has commander in chief power to commit torture, he has the power to commit genocide, to sanction slavery, to promote apartheid, to license summary execution.” Gore is “deeply troubl[ed]” that “our normal American safeguards have thus far failed to contain this unprecedented expansion of executive power.” He cites the numerous usage of “signing statements” by Bush that signal his intent “not to comply” with particular legislation (see December 30, 2005). When the Supreme Court struck down Bush’s indefinite detention of “enemy combatants” (see June 28, 2004), “the president then engaged in legal maneuvers designed to prevent the court from providing any meaningful content to the rights of the citizens affected.”
Historical Cycles - Since the founding of America, Gore says, the country has abrogated its citizens’ rights in one circumstance or another, and cites numerous examples. But those abrogations were always rectified to some degree in a repeated cycle of what he calls “excess and regret.” Gore is worried that the country may not be in such a cycle now. Instead, he says, the US may be on a path to permanent, state-sanctioned authoritarianism, with the constitutional safeguards American citizens have come to expect eroded and undermined to the point of irretrievability. Gore specifically cites the administration’s support for the so-called “unitary executive” theory of government, which he says “ought to be more accurately described as the unilateral executive.” That theory “threatens to expand the president’s powers until the contours of the Constitution that the framers actually gave us become obliterated beyond all recognition.”
Stark Authoritarianism - Why are Bush and his top officials doing this? Gore says that “[t]he common denominator seems to be based on an instinct to intimidate and control. The same pattern has characterized the effort to silence dissenting views within the executive branch, to censor information that may be inconsistent with its stated ideological goals, and to demand conformity from all executive branch employees.” Gore continues: “Intellectually, it is possible to carry on this process for an indefinite time. The only check on it is that, sooner or later, a false belief bumps up against solid reality, usually on a battlefield. Two thousand two hundred American soldiers have lost their lives as this false belief bumped into a solid reality.”
Gutting Congress - Though serious damage has been done to the judicial branch, Gore acknowledges, “the most serious damage in our constitutional framework has been to the legislative branch. The sharp decline of Congressional power and autonomy in recent years has been almost as shocking as the efforts by the executive to attain this massive expansion of its power.… [T]he legislative branch of government as a whole, under its current leadership, now operates as if it were entirely subservient to the executive branch.… [T]he whole process is largely controlled by the incumbent president and his political organization” (see February 1, 2004). Gore says each member of Congress, Republican and Democrat, must “uphold your oath of office and defend the Constitution. Stop going along to get along. Start acting like the independent and co-equal branch of American government that you are supposed to be under the Constitution of our country.”
We the People - The American people still, for the moment, have the power to enforce the Constitution, Gore says, quoting former President Dwight Eisenhower, who said, “Any who act as if freedom’s defenses are to be found in suppression and suspicion and fear confess a doctrine that is alien to America.” Gore continues: “Fear drives out reason. Fear suppresses the politics of discourse and opens the door to the politics of destruction.… The founders of our country faced dire threats. If they failed in their endeavors, they would have been hung as traitors. The very existence of our country was at risk. Yet in the teeth of those dangers, they insisted on establishing the full Bill of Rights. Is our Congress today in more danger than were their predecessors when the British army was marching on the Capitol? Is the world more dangerous than when we faced an ideological enemy with tens of thousands of nuclear missiles ready to be launched on a moment’s notice to completely annihilate the country?” [Congressional Quarterly, 1/16/2006; American Constitutional Society, 1/16/2006]

Entity Tags: National Security Agency, Liberty Coalition, US Supreme Court, Harold Koh, George W. Bush, Albert Arnold (“Al”) Gore, Jr., American Constitution Society, Bush administration (43), Convention Against Torture, Felix Frankfurter, George Washington, Geneva Conventions, Foreign Intelligence Surveillance Act, Robert “Bob” Barr

Timeline Tags: Civil Liberties

Journalist and columnist Joshua Micah Marshall says of former Vice President Al Gore’s speech on civil liberties the previous day (see January 16, 2006): “The point Gore makes in his speech that I think is most key is the connection between authoritarianism, official secrecy, and incompetence. The president’s critics are always accusing him of law-breaking or unconstitutional acts and then also berating the incompetence of his governance. And it’s often treated as, well… he’s power-hungry and incompetent to boot! Imagine that! The point though is that they are directly connected. Authoritarianism and secrecy breed incompetence; the two feed on each other. It’s a vicious cycle. Governments with authoritarian tendencies point to what is in fact their own incompetence as the rationale for giving them yet more power.… The basic structure of our Republic really is in danger from a president who militantly insists that he is above the law.” [Dean, 2006, pp. 170-171; Talking Points Memo, 1/17/2006]

Entity Tags: Albert Arnold (“Al”) Gore, Jr., George W. Bush, Joshua Micah Marshall

Timeline Tags: Civil Liberties

A memo from the nonpartisan Congressional Research Service (CRS) finds that President Bush appears to be in violation of the National Security Act of 1947 in his practice of briefing only select members of Congress on the National Security Agency’s warrantless wiretapping program. Bush has provided only limited briefings to the so-called “Gang of Eight,” the four Congressional leaders and the four ranking members of the House and Senate Intelligence Committees. But the 1947 law requires the US intelligence community to brief the full membership of both committees on the program. The memo is the result of a request by Representative Jane Harman (D-CA), who wrote Bush a letter saying that she believes he is required under the Act to brief both committees, and not just the Gang of Eight (see January 4, 2006). The White House claims that it has briefed Congressional leaders about the program over a dozen times, but refuses to provide details; the Congressional members so briefed are forbidden by law to discuss the content or nature of those classified briefings, even with their own staff members. “We believe that Congress was appropriately briefed,” says White House spokeswoman Dana Perino. The CRS agrees with Harman that the single exception to such full briefings under the law, covert actions taken under extraordinary threats to national security, is not applicable in this instance. Unless the White House contends the program is a covert action, the memo says, “limiting congressional notification of the NSA program to the Gang of Eight…would appear to be inconsistent with the law.” [US House of Representatives, 1/4/2006; Congressional Research Service, 1/18/2006 pdf file; Washington Post, 1/19/2006] The day after the CRS memo is released, Senate Democrats John D. Rockefeller (D-WV) and Harry Reid (D-NV), along with House Minority Leader Nancy Pelosi (D-CA) and Harman, the ranking member of the House Intelligence Committee, write to Vice President Dick Cheney demanding that the full committees be briefed on such intelligence matters in the future. [Washington Post, 1/20/2006] On February 9, Bush will allow Attorney General Alberto Gonzales and former NSA chief Michael Hayden to brief the full House Intelligence Committee on the program (see February 8-17, 2006).

Entity Tags: Jane Harman, John D. Rockefeller, National Security Agency, National Security Act, Richard (“Dick”) Cheney, Michael Hayden, House Intelligence Committee, George W. Bush, Dana Perino, “Gang of Eight”, Alberto R. Gonzales, Harry Reid, Congressional Research Service, Bush administration (43)

Timeline Tags: Civil Liberties

The Justice Department (DOJ) issues a 42-page “white paper” detailing its arguments that the National Security Agency’s warrantless wiretapping program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006) is legal. The DOJ reiterates two previous arguments (see December 19, 2005 and December 21-22, 2005)—that Congress implicitly authorized the program in 2001 when it authorized the Bush administration to begin military actions against al-Qaeda (see September 14-18, 2001), and that the president has the authority as commander in chief to conduct such a program—even though these arguments have been thoroughly refuted (see January 9, 2006) and overridden by the Supreme Court’s recent Hamdan v. Rumsfeld ruling (see December 15, 2005 and July 8, 2006). In its paper, the DOJ declares that if necessary, it will attack the legality of the Foreign Intelligence Surveillance Act (FISA) in order to stop that law from “imped[ing]” the president’s power to order domestic surveillance. In essence, according to columnist and civil liberties lawyer Glenn Greenwald, the DOJ is asserting that the president’s powers are limitless as long as he or she declares a given action necessary to battle terrorism. “Because the president has determined that the NSA activities are necessary to the defense of the United States from a subsequent terrorist attack in the armed conflict with al-Qaeda, FISA would impermissibly interfere with the president’s most solemn constitutional obligation—to defend the United States against foreign attack,” the DOJ claims. Neither Congress nor the court system has the right to limit or even review the president’s powers, according to the DOJ. Greenwald calls the DOJ’s argument “a naked theory of limitless presidential power.” In fact, Greenwald argues, the DOJ is asserting that FISA itself is unconstitutional, because no law can in any way limit the president’s power to conduct foreign policy or protect the nation’s security. The document is part of a larger Bush administration defense of the USA Patriot Act, and part of the administration’s push to convince Congress to reauthorize that legislation. Attorney General Alberto Gonzales sends the document to Congress. Justice Department official Steven Bradbury says, “When it comes to responding to external threats to the country… the government would like to have a single executive who could act nimbly and agilely.” [US Department of Justice, 1/19/2006 pdf file; Glenn Greenwald, 1/20/2006; Washington Post, 1/20/2006]
Dubious Legality - The program has already been found to be of questionable legality by two reports recently released by the nonpartisan Congressional Research Service (see January 5, 2006 and January 18, 2006). And author James Bamford, a US intelligence expert who has written extensively about the NSA, says that the Justice Department’s arguments are specious in light of Congress’s clear intent in its 1978 passage of FISA to block warrantless wiretapping, and its demonstrated lack of intent to allow any such operations within US borders in the October 2001 legislation. “You could review the entire legislative history in the authorization to use military force and I guarantee you won’t find one word about electronic surveillance,” he says. “If you review the legislative history of FISA, you will find Attorney General Griffin Bell testifying before the intelligence committee saying this was specifically passed to prevent a president from claiming inherent presidential powers to do this again.” [Washington Post, 1/20/2006]
Self-Contradictory Justifications - In 2007, author and reporter Charlie Savage will write of the “shaky foundation” supporting the administration’s “two-pronged attacks on critics of the wiretapping program and the Patriot Act,” which some officials have claimed authorizes the program. “Beneath the simplistic rhetoric, the administration’s position was self-contradicting,” Savage will write. If Bush has the inherent presidential authority to order warrantless wiretapping, then he needs no authorization from the Patriot Act or any other legislation. But if Congress is endangering the nation by delaying in reauthorizing the Patriot Act and thusly not rendering the program legal, then the wiretapping program is illegal after all. The memo attempts to “paper… over” this problem by claiming that, while Bush has the inherent authority to do whatever he feels is necessary to protect the country, the Patriot Act’s extra police powers are still necessary in “contexts unrelated to terrorism.” Savage will write, “In other words, the administration’s own position, hidden in the fine print, was that the Patriot Act was superfluous and irrelevant to the war on terrorism—a somewhat absurd stance made necessary by their desire to say the wiretapping program was legal.” [Savage, 2007, pp. 315]
Failure to Address Probable Beginning of Program Before Attacks - The Justice Department says nothing about the program apparently beginning well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, James Bamford, Steven Bradbury, US Department of Justice, Griffin Bell, Senate Judiciary Committee, Glenn Greenwald, Foreign Intelligence Surveillance Act, Alberto R. Gonzales, Arlen Specter, George W. Bush, Congressional Research Service, Charlie Savage

Timeline Tags: Civil Liberties

President Bush’s top political adviser, deputy White House chief of staff Karl Rove, tells a meeting of the Republican National Committee that the warrantless wiretapping controversy (see December 15, 2005 and December 18, 2005) can be used to boost Republicans’ election chances in the 2006 midterm elections. Republicans should emphasize that the wiretapping proves that Bush is willing to do whatever it takes to defeat terrorism and keep Americans safe. Critics of the program, therefore, can be painted as weak on terrorism. “The United States faces a ruthless enemy, and we need a commander in chief and a Congress who understand the nature of the threat and the gravity of the moment America finds itself in,” Rove says. “President Bush and the Republican Party do; unfortunately, the same cannot be said of many Democrats.… Let me be clear as I can be: President Bush believes if al-Qaeda is calling somebody in America, it is in our national security interests to know who they’re calling and why. Some important Democrats clearly disagree.” [WIS-TV, 1/20/2006; Savage, 2007, pp. 203]

Entity Tags: George W. Bush, Democratic Party, Republican Party, Republican National Committee, Karl C. Rove

Timeline Tags: Civil Liberties

Deputy Director of National Intelligence and former NSA Director Michael Hayden says that if the NSA’s recently revealed warrantless wiretapping program (see December 15, 2005) had been in place before 9/11, “it is my professional judgment that we would have detected some of the 9/11 al-Qaeda operatives in the United States, and we would have identified them as such.” Hayden will later say the NSA would have detected calls between an al-Qaeda communications hub in Yemen and 9/11 hijackers Nawaf Alhazmi and Khalid Almihdhar in San Diego (see May 18, 2006). Hayden adds: “You know, the 9/11 Commission criticized our ability to link things happening in the United States with things that were happening elsewhere. In that light, there are no communications more important to the safety of this country than those affiliated with al-Qaeda with one end in the United States.” Before the attacks, the NSA intercepted a series of calls between two of the 9/11 hijackers and a known al-Qaeda communications hub in Yemen (see Early 2000-Summer 2001), but failed to notify the FBI about them (see (Spring 2000)). [Press Club, 1/23/2006] Other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the NSA’s warrantless program is revealed by the New York Times (see December 17, 2005).

Entity Tags: Nawaf Alhazmi, Khalid Almihdhar, Michael Hayden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

President Bush at the National Security Agency.President Bush at the National Security Agency. [Source: Eric Draper / White House]President George Bush uses calls between the 9/11 hijackers in the US and an al-Qaeda communications hub in Yemen that were intercepted by the NSA (see Early 2000-Summer 2001) to justify the NSA’s warrantless wiretapping program (see December 15, 2005). Bush says: “We know that two of the hijackers who struck the Pentagon [Nawaf Alhazmi and Khalid Almihdhar] were inside the United States communicating with al-Qaeda operatives overseas. But we didn’t realize they were here plotting the attack until it was too late.” Bush also quotes former NSA Director Michael Hayden, who previously said, “Had this program been in effect prior to 9/11… we would have detected some of the 9/11 al-Qaeda operatives in the United States, and we would have identified them as such” (see January 23, 2006). Bush and other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the program is revealed by the New York Times (see December 17, 2005). [White House, 1/25/2006] Bush made similar remarks at Kansas State University two days previously. [White House, 1/23/2006]

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi, George W. Bush

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Washington Post reporter William Arkin reveals that the National Security Agency (NSA) is “building a new warning hub and data warehouse” in Aurora, Colorado, just outside of Denver, on the grounds of Buckley Air Force Base. The agency is transferring many key personnel from its Fort Meade, Maryland, headquarters to Aurora. Arkin calls the new NSA facility, named the Aerospace Data Facility (ADF), “massive,” and says he believes it is the hub of the NSA’s data mining operation (see January 16, 2004). According to Government Executive magazine, the NSA’s new data storage facility “will be able to hold the electronic equivalent of the Library of Congress every two days.” While the NSA explains that the new facility is a cost-cutting measure and part of the agency’s post-9/11 decentralization—“This strategy better aligns support to national decision makers and combatant commanders,” an NSA spokesman tells one reporter—Arkin says that the “NSA is aligning its growing domestic eavesdropping operations—what the administration calls ‘terrorist warning’ in its current PR campaign—with military homeland defense organizations, as well as the CIA’s new domestic operations [in] Colorado.… Colorado is now the American epicenter for national domestic spying.” Arkin notes that previous news reports have said that the CIA is planning to move much of its domestic National Resources Division to Aurora as well. He also notes that Colorado is the home of the US military’s Northern Command (NORTHCOM), the military arm responsible for homeland defense. The move also allows the NSA to better coordinate its efforts with private contractors such as Lockheed Martin, Northrup Grumman Mission Systems, and Raytheon, all of which have presences in Colorado. Arkin names all three firms as partners with the NSA in building the ADF. Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Over months and years, the database would be huge, ready for data mining whenever the government wants to go after someone.” [Washington Post, 1/31/2006; Klein, 2009, pp. 40-41]

Entity Tags: National Security Agency, Aerospace Data Facility, Government Executive Magazine, Mark Klein, Northrup Grumman Mission Systems, William Arkin, Lockheed Martin Corporation, Raytheon, US Northern Command

Timeline Tags: Civil Liberties

In his State of the Union address, President Bush insists that his authority to wiretap Americans’ phones without warrants (see December 15, 2005 and December 18, 2005) is validated by previous administrations’ actions, saying that “previous presidents have used the same constitutional authority I have.” He fails to note that those presidents authorized warrantless wiretaps before court orders were required for such actions (see June 19, 1972 and 1973). Since the Foreign Intelligence Surveillance Act passed (see 1978), no president except Bush has ever defied the law. Law professor David Cole calls Bush’s assertion of authority “either intentionally misleading or downright false.” Fellow law professor Richard Epstein predicts that the Supreme Court will strike down any such assertions, if it ever addresses the issue. “I find every bit of this legal argument disingenuous,” he says. Even many conservatives refuse to support Bush, with columnist George Will calling his arguments “risible” and a “monarchical doctrine” that is “refuted by the plain text of the Constitution.” David Keene, the chairman of the American Conservative Union, says the legal powers claimed by Bush and his officials can be used to justify anything: “Their argument is extremely dangerous.… The American system was set up on the assumption that you can’t rely on the good will of people with power.” Conservative activist Grover Norquist says flatly, “There is no excuse for violating the rule of law.” And former Justice Department official Bruce Fein says Bush and his officials have “a view that would cause the Founding Fathers to weep. The real conservatives are the ones who treasure the original understanding of the Constitution, and clearly this is inconsistent with the separation of powers.” Even former George H. W. Bush official Brent Scowcroft says that Bush’s interpretation of the Constitution is “fundamentally in error.” [Savage, 2007, pp. 203-204]

Entity Tags: David D. Cole, Brent Scowcroft, American Conservative Union, Bruce Fein, Richard Epstein, Grover Norquist, Foreign Intelligence Surveillance Act, David Keene, George Will, George W. Bush

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group and a reporter to expose the collusion of AT&T and the National Security Agency in pushing the government’s illegal surveillance program (see Early January 2006 and January 23, 2006 and After), contacts the office of Senator Dianne Feinstein (D-CA) at the advice of Electronic Frontier Foundation lawyer Kevin Bankston. Klein talks to Feinstein’s chief attorney in Washington, DC, Steven Cash. Klein will later write: “I instinctively recoiled at the thought of trying to approach her as my memory of her record told me she was no friend of civil liberties, though she plays one on TV. My instinct was not wrong.” After an initial discussion with Cash, Klein emails him his packet of documentation (see December 31, 2005). On the afternoon of February 3, Cash calls Klein and says he is very interested in his story, though Feinstein’s staff rates the probability of the NSA performing illegal acts at somewhere around “50-50,” according to Klein. Cash promises to get back in touch with Klein on February 6, but fails to do so. Neither Klein nor his attorneys (see Early January 2006) are able to talk to anyone on Feinstein’s staff from here on. Klein later writes: “The silent message was unmistakable: the senator did not want to sully her political skirts by having contact with a whistleblower. And this was a foretaste of her behavior and voting for the next two and a half years. At every turn, she was there pushing for immunity for the telecom companies in the Senate Intelligence and Judiciary Committees; peddling her toothless restatement of the ‘exclusive means’ clause of FISA [the Foreign Intelligence Surveillance Act—see 1978] as a substitute for any confrontation with the president over ongoing illegal NSA spying; ushering former NSA Director Michael Hayden through his nomination for CIA director; and backing Michael Mukasey as a clone replacement for the resigning Attorney General [Alberto] Gonzales. Moreover, this ultimately turned out to be the attitude of virtually the entire Democratic Party leadership, not to mention the Republicans.” Klein will explain that FISA’s “exclusive means” clause states that FISA should be the “exclusive means” for the federal government to conduct surveillance. Congress’s duty under the law was, Klein will state, to enforce the law against President Bush, “who openly flouted the law.” Instead, Klein will claim, Feinstein uses the “exclusive means” clause to protect the Bush administration and the telecom firms. [Klein, 2009, pp. 57-60]

Entity Tags: Electronic Frontier Foundation, AT&T, Dianne Feinstein, Mark Klein, National Security Agency, Steven Cash, Kevin Bankston

Timeline Tags: Civil Liberties

The Justice Department’s Office of Professional Responsibility (OPR) opens an internal investigation into the department’s role in approving the Bush administration’s domestic warrantless wiretapping program. OPR counsel Marshall Jarrett informs Representative Maurice Hinchey (D-NY) of the investigation into the program, initiated after the 9/11 attacks by the National Security Agency and authorized via a secret executive order from President Bush shortly thereafter (see Early 2002). Jarrett writes that the OPR probe will include “whether such activities are permissible under existing law.” Justice Department spokeswoman Tasia Scolinos says the inquiry will be quite limited: “They will not be making a determination on the lawfulness of the NSA program but rather will determine whether the department lawyers complied with their professional obligations in connection with that program.” Scolinos calls the OPR probe “routine.” Hinchey says he welcomes the probe, which may determine “how President Bush went about creating this Big Brother program.” [Washington Post, 2/16/2006] The OPR inquiry is derailed after the NSA, with Bush’s authorization, refuses to give routine security clearances to OPR lawyers that would allow them to examine the relevant documents (see May 9, 2006).

Entity Tags: US Department of Justice, Tasia Scolinos, H. Marshall Jarrett, National Security Agency, George W. Bush, Bush administration (43), Maurice Hinchey, Office of Professional Responsibility

Timeline Tags: Civil Liberties

Jaber Elbaneh.Jaber Elbaneh. [Source: Yahya Arhab / EPA / Corbi]Twenty-three suspected al-Qaeda operatives break out of a high-security prison in the Yemeni capital of Sana’a. Escapees include Jamal al-Badawi, wanted for a role in the bombing of the USS Cole (see October 12, 2000), and Jaber Elbaneh, a US citizen believed to be linked to the alleged al-Qaeda sleeper cell in Lackawanna, New York (see April-August 2001). The men allegedly tunnel their way from the prison to the bathroom of a neighboring mosque. However, the New York Times will later comment: “[T]hat account is viewed with great skepticism, both in the United States and in Yemen. Many in Yemen say the escape could not have taken place without assistance, whether from corrupt guards or through a higher-level plan.” [New York Times, 3/1/2008] The prison is located in the basement of the Political Security Organization (PSO), Yemen’s equivalent of the FBI. Several days later, a cable sent from the US embassy in Yemen notes “the lack of obvious security measures on the streets,” and concludes, “One thing is certain: PSO insiders must have been involved.” Newsweek comments: “[P]rivately, US officials say the plotters must have had serious—possibly high-level—help at the Political [Security Organization].…. [T]he head of the PSO, Ali Mutahar al-Qamish, is said to be under suspicion, according to two US officials.” [Newsweek, 2/13/2006] Al-Badawi and nine others escaped a Yemeni prison in 2003 and then were recaptured one year later (see April 11, 2003-March 2004). Al-Badawi and Elbaneh turn themselves in to the Yemeni government in 2007 and then are freed (see October 17-29, 2007 and February 23, 2008).

Entity Tags: Jamal al-Badawi, Ali Mutahar al-Qamish, Jaber Elbaneh, Yemeni Political Security Organization

Timeline Tags: Complete 911 Timeline

A Washington Post article repeats assertions by the National Security Agency (NSA) and the Bush administration that even if the NSA is automatically intercepting and storing millions of domestic phone calls and emails (see January 16, 2004), such computerized surveillance does not legally “count” unless it is examined—i.e. read or listened to—by human analysts. As the Post reports, NSA rules state that “‘acquisition’ of content does not take place until a conversation is interrupted and processed ‘into an intelligible form intended for human inspection.’” The Post article says that “nearly all” of the intercepted “overseas” communications from American citizens have been “dismissed” by intelligence officers who found nothing of interest in them. The Post observes: “Fewer than 10 US citizens or residents a year, according to an authoritative account, have aroused enough suspicion during warrantless eavesdropping to justify interception of their domestic calls, as well. That step still requires a warrant from a federal judge, for which the government must supply evidence of probable cause.” And, according to the Post’s “knowledgeable sources,” no more than 5,000 Americans have had their conversations recorded or their emails examined by intelligence analysts. According to Bush administration officials, the Post reports, “[s]urveillance takes place in several stages… the earliest by machine. Computer-controlled systems collect and sift basic information about hundreds of thousands of faxes, emails, and telephone calls into and out of the United States before selecting the ones for scrutiny by human eyes and ears. Successive stages of filtering grow more intrusive as artificial intelligence systems rank voice and data traffic in order of likeliest interest to human analysts. But intelligence officers, who test the computer judgments by listening initially to brief fragments of conversation, ‘wash out’ most of the leads within days or weeks.” People who have helped develop the computer analysis technology say that “it is a triumph for artificial intelligence if a fraction of one percent of the computer-flagged conversations guide human analysts to meaningful leads.”
Controversy over Legality, Usefulness of Surveillance - National security lawyers say that the high proportion of false leads and innocent bystanders being wiretapped contravenes the “reasonable” search provisions of the Fourth Amendment. One government official says the success rate should be closer to 50 percent—one out of every two persons surveilled—and not less than one percent. “Those who devised the surveillance plan, the official says, “knew they could never meet that standard—that’s why they didn’t go through” the court that supervises the Foreign Intelligence Surveillance Act, or FISA. Bush officials refuse to say whether the NSA is discarding the more than 99 percent of communications that it intercepts and deems useless for further analysis. Jeff Jonas, an IBM scientist who invented a data-mining system now in use by both private and governmental entities, says that the kind of pattern-matching data analysis used by the NSA in its surveillance program is neither useful nor accurate. Those analysis techniques that “look at people’s behavior to predict terrorist intent,” he says, “are so far from reaching the level of accuracy that’s necessary that I see them as nothing but civil liberty infringement engines.” Psychology professor James W. Pennebaker disagrees. “Frankly, we’ll probably be wrong 99 percent of the time,” he says, “but one percent is far better than one in 100 million times if you were just guessing at random. And this is where the culture has to make some decisions.” [Washington Post, 2/5/2006]
Former AT&T Technician: AT&T, NSA Violating Fourth Amendment - Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004) will later take a different view of the issue. In 2009, he will write: “[T]he illegal act happens at the point of seizure by the government, i.e. the splitter—not later, whether or not a medium is involved (see January 16, 2004). That is the whole part of the Fourth Amendment, which demands the government get a warrant to show ‘probable cause’ for seizing things, whatever the government does with it afterwards. What they do later is unknown, and at any rate, their word on anything has proven to be an exercise in prevarication.” [Klein, 2009, pp. 48-49]

Entity Tags: Jeff Jonas, Foreign Intelligence Surveillance Act, Bush administration (43), James W. Pennebaker, Mark Klein, National Security Agency, Washington Post

Timeline Tags: Civil Liberties

In an interview with PBS’s Gwen Ifill, Representative Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee, says she supports the administration’s warrantless wiretapping program (see Spring 2001), a position that places her at odds with most Congressional Democrats. “Well, I said then and I say now that I support the program,” she tells Ifill. Harman is critical of the insider leaks that led to the public divulgance of the program (see December 15, 2005), saying, “Well, I think the leaks have done a lot of damage, and I deplore the leaks of this critical program.” She goes on to complain that the administration “says it adequately oversees this program,” but “the system of checks and balances that we have… requires that Congress as an independent branch of government pass the laws, fund the programs, and oversee how all that works.” In addition to requesting greater cooperation on oversight with Congress, she adds that “the courts need to be cut back in,” and thinks the “entire program” should be brought under the Foreign Intelligence Surveillance Act. [PBS, 2/8/2006] Four days later, Harman reiterates her position on NBC’s Meet the Press. She tells moderator Tim Russert, “If the press was part of the process of delivering classified information, there have to be some limits on press immunity.” Russert asks, “But if [the NSA leak] came from a whistleblower, should the New York Times reporter be prosecuted?” Harman answers: “Well, it’s not clear it was a whistleblower. You have to prove that first. If it’s protected by the whistleblower statute, then it’s protected.… By the way, I deplore that leak. This is a very valuable foreign [intelligence] collection program. I think it is tragic that a lot of our capabilities are now [spread] across the pages of the newspapers.” [MSNBC, 2/12/2006; NewsMax, 2/12/2006]

Entity Tags: Jane Harman, Gwen Ifill, New York Times, House Intelligence Committee, Foreign Intelligence Surveillance Act, Tim Russert

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), has contacted Los Angeles Times reporter Joseph Menn about publishing an article expising AT&T’s collusion with the National Security Agency (NSA) to illegally conduct surveillance against American citizens (see January 23, 2006 and After). Klein believed Menn was enthusiastic about exposing AT&T and the NSA in his newspaper. Instead, Klein is shocked to hear from Menn that the Times’s “top guy” is preparing to meet with Director of National Intelligence John Negroponte to discuss any such publication. “I nearly fell down in shock,” Klein will later write. “[T]hey were actually negotiating with the government on whether to publish!” Menn describes himself to Klein as “demoralized,” and says the chances of getting the story published are “grim.” In his seven years at the Times, Menn tells Klein, he has never seen a story “spiked” for “nefarious reasons,” implying that the reason behind the story’s non-publication are “nefarious.” Klein is also dismayed that the Times has now revealed his existence as a whistleblower to Negroponte, and by extension to the US intelligence apparatus. Two days ago, Klein began emailing a New York Times reporter, James Risen, the co-author of a 2005 expose about the NSA’s surveillance program (see December 15, 2005). After hearing from Menn, Klein emails Risen to inform him of the Los Angeles Times’s decision to “consult” with Negroponte, and also of the lack of interest he has received from Senator Dianne Feinstein’s office (see February 1-6, 2006). Risen calls in fellow reporter Eric Lichtblau, his co-author on the 2005 story, and the two begin working on their own story. Klein remains worried about his personal and professional safety, since, as he will write, “[t]he government was on to me, but I did not yet have a published article and the protection that comes with publicity. I had visions, perhaps paranoid in hindsight, of being disappeared in the night, like [nuclear industry whistleblower] Karen Silkwood.” The Los Angeles Times story will drag on until March 29, when Menn will inform Klein that it is officially dead, blocked by Times editor Dean Baquet. Klein will later learn that Baquet had not only been in contact with Negroponte, but with NSA Director Michael Hayden. In 2007, Baquet will tell ABC News reporters that “government pressure played no part in my decision not to run with the story,” and will say that he and managing editor Doug Frantz decided “we did not have a story, that we could not figure out what was going on” with Klein’s documentation (see March 26, 2007). Klein will call Baquet’s explanation an “absurd and flimsy excuse,” and will say it is obvious that the Los Angeles Times “capitulated to government pressure.” [PBS Frontline, 5/15/2007; Klein, 2009, pp. 59-62]

Entity Tags: James Risen, Dean Baquet, AT&T, Dianne Feinstein, Eric Lichtblau, Joseph Menn, Michael Hayden, John Negroponte, Douglas Frantz, National Security Agency, Los Angeles Times, Mark Klein

Timeline Tags: Civil Liberties

The US interagency National Counterterrorism Center (NCTC) maintains a watch list of 325,000 names of international terrorism suspects, a number that has more than quadrupled since the the list was created in 2003 by merging other watch lists together. NCTC officials estimate that, due to aliases, some 200,000 individuals are represented on the list. The main US watch list at the time of 9/11 had 60,000 names on it (see December 11, 1999). An administration official says, “The vast majority are non-US persons and do not live in the US.” However, officials refuse to state how many on the list are US citizens and how many names on the list were obtained through the controversial wiretapping program run by the National Security Agency (NSA). Civil liberties and privacy advocates claim that the scale of the list heightens their concerns that watch lists include the names of large numbers of innocent people. Attorney General Alberto Gonzales tells the Senate Judiciary Committee that he cannot discuss specifics but says, “Information is collected, information is retained, and information disseminated in a way to protect the privacy interests of all Americans.” A September 2003 presidential directive instructs agencies to supply data for the list only about people who are “known or appropriately suspected to be… engaged in conduct constituting, in preparation for, in aid of, or related to terrorism.” Marc Rotenberg, executive director of the Electronic Privacy Information Center, says the scope of the NCTC list highlights the “false positive” problem, in which innocent people have been stopped from flying because their names are wrongly included or are similar to suspects’ names. “If there are that many people on the list, a lot of them probably shouldn’t be there. But how are they ever going to get off?” [Washington Post, 2/15/2006] Numerous problems with the list will be found in 2006 (see March 2006).

Entity Tags: Alberto R. Gonzales, National Counterterrorism Center, Terror Screening Center, Electronic Privacy Information Center, Marc Rotenberg, National Security Agency

Timeline Tags: Complete 911 Timeline, Civil Liberties

Electronic Frontier Foundation (EFF) lawyer Kevin Bankston asks AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) to submit a legal declaration as to his knowledge of AT&T’s collusion with the National Security Agency (NSA) in its illegal domestic wiretapping program. Klein is working with the EFF in that organization’s lawsuit against AT&T (see Early January 2006 and January 31, 2006). Five days later, Klein submits his evidence of AT&T’s actions (see December 31, 2005) to Bankston to be used in the lawsuit. Klein will work with his lawyers to craft the declaration, and will have it in final form by late March. [Klein, 2009, pp. 63-64]

Entity Tags: National Security Agency, AT&T, Electronic Frontier Foundation, Mark Klein, Kevin Bankston

Timeline Tags: Civil Liberties

The Al Haramain Islamic Foundation, a now-defunct Saudi Arabian charitable organization that once operated in Oregon, sues the Bush administration [Associated Press, 2/28/2006] over what it calls illegal surveillance of its telephone and e-mail communications by the National Security Agency, the so-called Terrorist Surveillance Program. The lawsuit may provide the first direct evidence of US residents and citizens being spied upon by the Bush administration’s secret eavesdropping program, according to the lawsuit (see December 15, 2005). According to a source familiar with the case, the NSA monitored telephone conversations between Al Haramain’s director, then in Saudi Arabia, and two US citizens working as lawyers for the organization and operating out of Washington, DC. The lawsuit alleges that the NSA violated the Foreign Intelligence Surveillance Act (see 1978), the US citizens’ Fourth Amendment rights, and the attorney-client privilege. FISA experts say that while they are unfamiliar with the specifics of this lawsuit, they question whether a FISA judge would have allowed surveillance of conversations between US lawyers and their client under the circumstances described in the lawsuit. Other lawsuits have been filed against the Bush administration over suspicions of illegal government wiretapping, but this is the first lawsuit to present classified government documents as evidence to support its contentions. The lawsuit alleges that the NSA illegally intercepted communications between Al Haramain officer Suliman al-Buthe in Saudi Arabia, and its lawyers Wendell Belew and Asim Ghafoor in Washington. One of its most effective pieces of evidence is a document accidentally turned over to the group by the Treasury Department, dated May 24, 2004, that shows the NSA did indeed monitor conversations between Al Haramain officials and lawyers. When Al Haramain officials received the document in late May, 2004, they gave a copy to the Washington Post, whose editors and lawyers decided, under threat of government prosecution, to return the document to the government rather than report on it (see Late May, 2004). [Washington Post, 3/2/2006; Washington Post, 3/3/2006] Lawyer Thomas Nelson, who represents Al Haramain and Belew, later recalls he didn’t realize what the organization had until he read the New York Times’s December 2005 story of the NSA’s secret wiretapping program (see December 15, 2005). “I got up in the morning and read the story, and I thought, ‘My god, we had a log of a wiretap and it may or may not have been the NSA and on further reflection it was NSA,’” Nelson will recall. “So we decided to file a lawsuit.” Nelson and other lawyers were able to retrieve one of the remaining copies of the document, most likely from Saudi Arabia, and turned it over to the court as part of their lawsuit. [Wired News, 3/5/2007]
Al Haramain Designated a Terrorist Organization - In February 2004, the Treasury Department froze the organization’s US financial assets pending an investigation, and in September 2004, designated it a terrorist organization, citing ties to al-Qaeda and alleging financial ties between Al Haramain and the 1998 bombings of two US embassies in Africa (see 10:35-10:39 a.m., August 7, 1998). The organization was disbanded by the Saudi Arabian government in June 2004 and folded into an “umbrella” private Saudi charitable organization, the Saudi National Commission for Relief and Charity Work Abroad (see March 2002-September 2004). In February 2005, the organization was indicted for conspiring to funnel money to Islamist fighters in Chechnya. The charges were later dropped. [US Treasury Department, 9/9/2004; Washington Post, 3/2/2006] The United Nations has banned the organization, saying it has ties to the Taliban. [United Nations, 7/27/2007]
Challenging Designation - In its lawsuit, Al Haramain is also demanding that its designation as a terrorist organization be reversed. It says it can prove that its financial support for Chechen Muslims was entirely humanitarian, with no connections to terrorism or violence, and that the Treasury Department has never provided any evidence for its claims that Al Haramain is linked to al-Qaeda or has funded terrorist activities. [Associated Press, 8/6/2007] The lawsuit also asks for $1 million in damages, and the unfreezing of Al Haramain’s US assets. [Associated Press, 8/5/2007]
Administration Seeks to Have Lawsuit Dismissed - The Bush administration will seek to have the lawsuit thrown out on grounds of national security and executive privilege (see Late 2006-July 2007, Mid-2007).

Entity Tags: Wendell Belew, Suliman al-Buthe, Taliban, Washington Post, United Nations, Saudi National Commission for Relief and Charity Work Abroad, US Department of the Treasury, National Security Agency, Thomas Nelson, Foreign Intelligence Surveillance Act, Al Haramain Islamic Foundation, Al-Qaeda, Al Haramain Islamic Foundation (Oregon branch), Foreign Intelligence Surveillance Court, Asim Ghafoor, Bush administration (43)

Timeline Tags: Civil Liberties

Several problems with the US international no-fly list, which is designed to prevent suspected terrorists from flying to the US, are found by investigative reporters Joe and Susan Trento. The list has grown rapidly since 2003 (see February 15, 2006), and was found to be inaccurate in 2005 (see June 14, 2005).
bullet The list contains the names of fourteen 9/11 hijackers, who are thought to be dead (see March 2006).
bullet The list deliberately omits the names of some known terrorists, apparently so that intelligence agencies can track them as they fly (see May 2006).
bullet The information on the list makes it difficult to distinguish between people with similar names. For example, FBI special agent John E. Lewis is often stopped, as a suspected terrorist has a similar name to his. Several people called Robert Johnson are stopped regularly.
bullet The list includes Francois Genoud, who had ties to both Islamic extremists and the Nazis and committed suicide in the mid-1990s at the age of 81.
bullet The list only includes two people involved in the A. Q. Khan nuclear smuggling ring; dozens of their associates are omitted.
bullet Numerous anti-Castro Cubans with records of suspicious and criminal activity are missing from the list.
bullet However, left-wing Bolivian president Evo Morales is on the list.
A high-level official at United Airlines calls the list “a joke.” A Transportation Security Administration official says: “No-fly doesn’t protect anyone. It is every government agency’s cover-your-ass list of names. Many of the really bad guys are never put on the list because the intelligence people think the airlines are not trustworthy. That makes the incomplete list we give the airlines next to worthless.” [Trento and Trento, 2006, pp. 188-221; CBS News, 6/10/2006] The list will be reported to have over half a million names by June 2007 (see June 13, 2007).

Entity Tags: Transportation Security Administration, Joseph Trento, Susan Trento

Timeline Tags: Complete 911 Timeline

Rayed Abdullah.Rayed Abdullah. [Source: Scoop]Rayed Abdullah, an associate of hijacker pilot Hani Hanjour (see October 1996-December 1997 and October 1996-Late April 1999), enters New Zealand despite being on the watch list there and takes further pilot training. The New Zealand government claims it only ascertains his real identity after he has been in the country several months. Abdullah is then arrested and deported to Saudi Arabia, even though he was traveling on a Yemeni passport. [Associated Press, 6/9/2006; New Zealand Herald, 6/10/2006] However, FBI agents and CIA officers later say that the US released Abdullah after 9/11 in an attempt to use him to spy on al-Qaeda for Saudi Arabia’s intelligence agency. The CIA ensures he is allowed into New Zealand as a part of a joint operation. However, the New Zealanders get cold feet when Abdullah starts flight training again. A CIA official will say: “[W]e know if Rayed was part of the [9/11] plot, someone in al-Qaeda will reach out for him, and we have a chance of making that connection.” An FBI official will comment: “The amazing thing is the CIA convinced itself that by getting [Abdullah] tossed out of New Zealand, he would then be trusted and acceptable to Saudi intelligence and useful in al-Qaeda operations. For this tiny chance of success they put passengers at risk to enter into a partnership with Saudi intelligence.” [Stories that Matter, 10/9/2006]

Entity Tags: Central Intelligence Agency, Rayed Abdullah

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Zacarias Moussaoui.Zacarias Moussaoui. [Source: WNBC / Jonathan Deinst]Zacarias Moussaoui becomes the first and only person charged in direct connection with the 9/11 attacks to stand trial in the US. [Associated Press, 3/17/2006] He was preparing to hijack an aircraft and fly it into a target when he was arrested 26 days before 9/11 (see August 16, 2001 and April 22, 2005). Although there has been disagreement whether Moussaoui was to take part in the actual attack of 9/11 or a follow-up plot (see January 30, 2003), the prosecution alleges that Moussaoui had information related to the attacks (see August 16, 2001) and facilitated them by lying and not disclosing everything he knew to the FBI. He is charged with six counts, including conspiracy to commit acts of terrorism and conspiracy to commit aircraft piracy. [US District Court for the Eastern District of Virginia, Alexandria Division, 12/11/2001 pdf file] The trial receives much media coverage and the highlights include the playing of United 93’s cockpit recorder (see April 12, 2006), a row over a government lawyer coaching witnesses (see March 13, 2006), and testimony by FBI agent Harry Samit (see March 9 and 20, 2006), former FBI assistant director Michael Rolince (see March 21, 2006), and Moussaoui himself (see March 27, 2006). Moussaoui is forced to wear a stun belt, controlled by one of the marshalls, under his jumpsuit. The belt is to be used if Moussaoui lunges at a trial participant. [New York Times, 4/17/2006] He has already pleaded guilty (see April 22, 2005) and the trial is divided into two phases; in the first phase the jury decides that Moussaoui is eligible for the death penalty, but in the second phase it fails to achieve unanimity on whether Moussaoui should be executed (see May 3, 2006). [Associated Press, 4/3/2006; New York Times, 4/17/2006]

Entity Tags: Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Republicans on the Senate Intelligence Committee refuse to allow an inquiry into the Bush administration’s warrantless wiretapping program (see December 15, 2005 and December 18, 2005), with the committee voting 10-8 along party lines to reject such a probe. Senate Judiciary Committee chairman Arlen Specter (R-PA) had advocated such a probe, but White House officials refused to cooperate with his committee, saying they would only cooperate via classified briefings to the Intelligence Committee. However, committee Republicans, led by chairman Pat Roberts (R-KS), have no intention of allowing such an inquiry. Roberts and his fellows say they will push to impose limitations on the program. Committee Democrats accuse their Republican colleagues of colluding with the administration to block the inquiry. “The committee is, to put it bluntly, is basically under the control of the White House,” says ranking committee member John D. Rockefeller (D-WV). “You can’t legislate properly unless you know what’s going on.” The Republicans have left Congress to “legislate in darkness and ignorance,” he says. Republicans say that a new, select subcommittee will increase oversight of the administration’s wiretapping. “It provides for a case-by-case examination and oversight by the United States Congress,” says Mike DeWine (R-OH), who is helping draft the bill for the new oversight subcommittee. “It will be very consistent with what our constitutional obligations are.” DeWine’s bill would allow the administration to ignore restrictions on wiretapping merely by invoking national security, and would not allow the committee to intervene even in clearly unjustified cases of wiretapping. “The White House could just decide not to tell them everything, and there’s no sanction,” says Bruce Fein, a former Reagan administration lawyer. “And the president can still claim that he has inherent power to conduct surveillance.” The bill is “extremely generous to the president,” says conservative law professor Douglas Kmiec. “It is not significantly different from the status quo. And I think the president would be quite delighted by that.” [Boston Globe, 3/8/2006; Savage, 2007, pp. 204]

Entity Tags: Senate Judiciary Committee, Bruce Fein, Arlen Specter, Bush administration (43), Pat Roberts, Douglas Kmiec, Mike DeWine, John D. Rockefeller, Senate Intelligence Committee

Timeline Tags: Civil Liberties

President Bush signs the USA Patriot Improvement and Reauthorization Act of 2005 into law. The bill, which extends and modifies the original USA Patriot Act (see October 26, 2001), was driven through Congress primarily by the Republican majorities in both Houses. However, Senator Dianne Feinstein (D-CA) cosponsored the Senate bill, numerous Democrats in both Houses voted with the Republicans in favor of the bill, and the final bill sailed through the Senate by an 89-10 vote on March 2. [GovTrack, 3/9/2006; Library of Congress, 3/9/2006] In the signing ceremony, Bush calls the Reauthorization Act “a really important piece of legislation… that’s vital to win the war on terror and to protect the American people.” He repeatedly evokes the 9/11 attacks as a reason why the new law is needed. [Government Printing Office, 3/9/2006]
Provisions for Oversight Added - One of the reasons why the reauthorization bill received such support from Congressional moderates on both sides of the aisle is because Congress added numerous provisions for judicial and Congressional oversight of how government and law enforcement agencies conduct investigations, especially against US citizens. Representative Butch Otter (R-ID) said in 2004 that Congress came “a long way in two years, and we’ve really brought an awareness to the Patriot Act and its overreaches that we gave to law enforcement.” He adds, “We’ve also quieted any idea of Patriot II, even though they snuck some of Patriot II in on the intelligence bill” (see February 7, 2003). [Associated Press, 1/23/2004]
Opposition From Both Sides - Liberal and conservative organizations joined together in unprecedented cooperation to oppose several key provisions of the original reauthorization and expansion of the Patriot Act, including easing of restrictions on government and law enforcement agencies in obtaining financial records of individuals and businesses, “sneak-and-peek” searches without court warrants or the target’s knowledge, and its “overbroad” definition of the term “terrorist.” Additionally, lawmakers in Congress insisted on expiration dates for the various surveillance and wiretapping methodologies employed by the FBI and other law enforcement agencies (see Early 2002). [Associated Press, 5/23/2005] The final bill mandates that anyone subpoenaed for information regarding terrorist investigations has the right to challenge the requirement that they not reveal anything about the subpoena, those recipients will not be required to tell the FBI the name of their lawyer, and libraries that are not Internet service providers will not be subject to demands from “national security letters” for information about their patrons. Many of the bill’s provisions will expire in four years. [Christian Science Monitor, 3/3/2006]
Reauthorizing Original Provisions - The bill does reauthorize many expiring provisions of the original Patriot Act, including one that allows federal officials to obtain “tangible items,” such as business records from libraries and bookstores, in connection with foreign intelligence and international terrorism investigations. Port security provisions are strengthened, and restrictions on the sale of over-the-counter cold and allergy medicine that can be used in the illegal manufacture of methamphetamine are imposed, forcing individuals to register their purchases of such medicines and limiting the amounts they can buy. [CBS News, 3/9/2006]
Bush Signing Statement Says He Will Ignore Oversight Mandates - But when he signs the bill into law, Bush also issues a signing statement that says he has no intention of obeying mandates that enjoin the White House and the Justice Department to inform Congress about how the FBI is using its new powers under the bill. Bush writes that he is not bound to tell Congress how the new Patriot Act powers are being used, and in spite of what the law requires, he can and will withhold information if he decides that such disclosure may “impair foreign relations, national security, the deliberative process of the executive, or the performance of the executive’s constitutional duties.” [Statement on Signing the USA PATRIOT Improvement and Reauthorization Act, 3/9/2006; Boston Globe, 3/24/2006] Senator Patrick Leahy (D-VT) says that Bush’s assertion that he can ignore provisions of the law as he pleases, under the so-called “unitary executive” theory, are “nothing short of a radical effort to manipulate the constitutional separation of powers and evade accountability and responsibility for following the law.” Law professor David Golove says the statement is illustrative of the Bush administration’s “mind-bogglingly expansive conception” of executive power, and its low regard for legislative power. [Boston Globe, 3/24/2006] Author and legal expert Jennifer Van Bergen warns of Bush using this signing statement to avoid accountability about the NSA’s warrantless wiretapping program, writing: “[I]t is becoming clearer every day that Bush has no qualms about violating either international laws and obligations or domestic laws. The recent revelations about the secret NSA domestic surveillance program revealed Bush flagrantly violating the Foreign Intelligence Surveillance Act which was specifically enacted to prevent unchecked executive branch surveillance. … His signing statements, thus, are nothing short of an attempt to change the very face of our government and our country.” [Institute for Public Accuracy, 3/27/2006]
Request to Rescind Signing Statement - In late March, Democratic House members Jane Harman and John Conyers will write to Attorney General Alberto Gonzales requesting that the administration rescind the signing statement, writing: “As you know, ‘signing statements’ do not have the force of law. Legislation passed by both Houses and signed by the president does. As Article 1, Section 7, of the Constitution states: ‘Every bill which shall have passed the House of Representatives and the Senate, shall, before it become a Law, be presented to the President of the United States; If he approve he shall sign it, but if not he shall return it.’” Bush and Gonzales will ignore the request. [US House of Representatives, 3/29/2006]

Entity Tags: US Department of Justice, Domestic Security Enhancement Act of 2003, David Golove, Alberto R. Gonzales, Butch Otter, Dianne Feinstein, Patrick J. Leahy, USA Patriot Act, John Conyers, Federal Bureau of Investigation, National Security Agency, Foreign Intelligence Surveillance Act, Jennifer Van Bergen, Jane Harman, George W. Bush

Timeline Tags: Civil Liberties

Senator Russell Feingold (D-WI) tells reporters that he intends to push through legislation that would censure President Bush because of his domestic surveillance program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006). “What the president did by consciously and intentionally violating the Constitution and laws of this country with this illegal wiretapping has to be answered,” Feingold tells an interviewer. “Proper accountability is a censuring of the president, saying, ‘Mr. President, acknowledge that you broke the law, return to the law, return to our system of government.‘… The president has broken the law and, in some way, he must be held accountable.… Congress has to reassert our system of government, and the cleanest and the most efficient way to do that is to censure the president. And, hopefully, he will acknowledge that he did something wrong.” Senate Majority Leader Bill Frist (R-TN) calls Feingold’s proposal “a crazy political move.” The Senate Intelligence Committee, following the Bush administration’s lead, has rejected some Democrats’ call for a full investigation of the surveillance program (see February 1-6, 2006). Instead, the committee has adopted a Republican plan for a seven-member subcommittee to conduct oversight. Feingold says his censure motion is not “a harsh approach, and it’s one that I think should lead to bipartisan support.” Frist, however, says: “I think it, in part, is a political move because here we are, the Republican Party, the leadership in the Congress, supporting the president of the United States as commander in chief who is out there fighting al-Qaeda and the Taliban and Osama bin Laden and the people who have sworn—have sworn—to destroy Western civilization and all the families listening to us.… The signal that it sends that there is in any way a lack of support for our commander in chief who is leading us with a bold vision in a way that we know is making our homeland safer is wrong. And it sends a perception around the world.” Only once in history has a president been censured by Congress: Andrew Jackson in 1834. In the House, Representative John Conyers (D-MI) is exploring the idea of introducing impeachment legislation against Bush. [New York Times, 3/12/2006; Associated Press, 3/12/2006] Feingold says on the Senate floor: “The president has violated the law and Congress must respond. A formal censure by Congress is an appropriate and responsible first step to assure the public that when the president thinks he can violate the law without consequences, Congress has the will to hold him accountable.” Most Congressional Democrats want nothing to do with either Feingold’s or Conyers’s legislative ideas, and some Republicans seem to be daring Democrats to vote for the proposal. Vice President Dick Cheney tells a Republican audience in Feingold’s home state of Wisconsin, “Some Democrats in Congress have decided the president is the enemy.” Democratic leaders in the Senate thwart an immediate vote as requested by Frist, and Senator Richard Durbin (D-IL) says he is not sure the proposal will ever come to a vote. Senate Minority Leader Harry Reid (D-NV) says he does not support it and has not read it. Senator Joseph Lieberman (D-CT) makes a similar assertion. In the House, Minority Leader Nancy Pelosi (D-CA) refuses to support such a proposal, saying in a statement that she “understands Senator Feingold’s frustration that the facts about the NSA domestic surveillance program have not been disclosed appropriately to Congress. Both the House and the Senate must fully investigate the program and assign responsibility for any laws that may have been broken.” [Associated Press, 3/14/2006] Former Nixon aide John Dean testifies in support of Feingold’s censure motion (see March 31, 2006). However, the censure motion, lacking support from Democratic leaders and being used by Republicans as a means to attack Democrats’ patriotism, never comes to a vote. [Klein, 2009, pp. 84]

Entity Tags: Joseph Lieberman, George W. Bush, Bush administration (43), Bill Frist, Harry Reid, John Dean, Russell D. Feingold, Senate Intelligence Committee, Richard (“Dick”) Durbin, Richard (“Dick”) Cheney, Nancy Pelosi, John Conyers

Timeline Tags: Civil Liberties

Judge Leonie Brinkema halts the trial of Zacarias Moussaoui (see March 6-May 4, 2006) after it is discovered that Transportation Security Administration lawyer Carla J. Martin violated a court order prohibiting witnesses from following the trial. Martin e-mailed transcripts to seven witnesses and coached them on their testimony. Brinkema calls it “the most egregious violation of the court’s rules on witnesses [I have seen] in all the years I’ve been on the bench.” Even the prosecution says, “We frankly cannot fathom why she engaged in such conduct.” [Washington Post, 3/14/2006; Associated Press, 3/17/2006] Brinkema allows the prosecution to continue to seek the death penalty, but initially removes the aviation security portion of evidence from its case. However, after the prosecution complains this makes the proceedings pointless, she reinstates some of it, allowing the trial to continue. [Associated Press, 3/15/2006; CNN, 3/16/2006; Associated Press, 3/17/2006] As a result of her actions, Martin is placed on paid leave. Additionally, Pennsylvania’s lawyer disciplinary board begins an investigation and federal prosecutors explore charges. [Washington Post, 7/10/2006] Martin’s e-mails also reveal that she has been communicating with attorneys for United and American Airlines. This prompts seven victims’ relatives, who are suing the airlines for being negligent on 9/11, to file a civil action against her alleging that she is trying to help the airline industry avoid civil liability. [CBS News, 4/7/2006; CNN, 4/26/2006]

Entity Tags: Leonie Brinkema, Carla Martin

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Congressman Curt Weldon (R-PA) says that Osama bin Laden has died in Iran. According to Weldon, the information comes from a high-level Iranian exile source, who claims that bin Laden had been in hiding in Iran. Weldon, who last spoke to the source three weeks ago, says: “[The source has] told me that Osama bin Laden is dead. He died in Iran.” Weldon has long alleged that bin Laden has been using Iran for sanctuary. For example, last June he said: “I’m confident that I know for sure that [bin Laden] has been in and out of Iran.… Two years ago, he was in the southern town of Ladis, 10 kilometers inside the Pakistan border. I also know that earlier this year, he had a meeting with [Iraqi insurgent leader Abu Musab] al-Zarqawi in Tehran.” [NewsMax, 3/17/2003] Despite this, a man thought to be bin Laden will continue to release statements to the media (see, for example, May 23, 2006).

Entity Tags: Al-Qaeda, Curt Weldon, Osama bin Laden

Timeline Tags: Complete 911 Timeline

Michael Rolince, who headed the FBI’s International Terrorism Operations Section when Zacarias Moussaoui was arrested, testifies at Moussaoui’s trial (see March 6-May 4, 2006). He initially states that he was only informed of the Moussaoui case before 9/11 in two brief hallway conversations (see Late August 2001) and did not read a memo sent to him by the Minneapolis field office. However, under cross-examination he admits he also discussed a plan to deport Moussaoui to France, where his belongings could be searched (see (August 30-September 10, 2001)). [Associated Press, 3/21/2006; Associated Press, 3/21/2006] According to Newsday, Rolince appears “red-faced and flustered” at the end of the cross-examination and makes the court burst out laughing when he says he did not approve a briefing to FBI field offices about bin Laden threats in the US (see Before April 13, 2001), even though the briefing states he approved it. He says one of his subordinates may have approved it. [Associated Press, 3/21/2006; Newsday, 3/22/2006] Rolince is called by the prosecution, which wants him to give a list of steps the FBI would have taken if Moussaoui had confessed. However, Judge Brinkema states that, “Juries cannot decide cases on speculation… Nobody knows what would have happened.” [Associated Press, 3/21/2006; Associated Press, 3/22/2006]

Entity Tags: Michael Rolince

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

During the trial of Zacarias Moussaoui (see also March 6-May 4, 2006), the prosecution claims that if Zacarias Moussaoui had not lied when arrested and questioned (see August 16, 2001) and had provided information about the plot (see August 16, 2001), the FAA could have altered its security procedures to deal with the suicide hijacker threat. Prosecution witness Robert Cammaroto, an aviation security officer, says that security measures in effect before 9/11 were designed to cope with different types of threats, such as “the homesick Cuban,” rather than suicide hijackings. He says that if the FAA had more information about Moussaoui, its three dozen air marshals could have been moved from international to domestic flights, security checkpoints could have been tightened to detect short knives like the ones Moussaoui had, and flight crews could have been instructed to resist rather than cooperate with hijackers. Most of these steps could have been implemented within a matter of hours. However, Cammarato admits that the FAA was aware before 9/11 that terrorists considered flying a plane into the Eiffel Tower and that al-Qaeda has performed suicide operations on land and sea. [Associated Press, 3/22/2006]

Entity Tags: Federal Aviation Administration, Robert Cammarato, Carla Martin, Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Ahmed Alnami’s youth hosteling card found in the Flight 93 crash site.Ahmed Alnami’s youth hosteling card found in the Flight 93 crash site. [Source: FBI]During the trial of Zacarias Moussaoui (see March 6-May 4, 2006), the Reporters Committee for Freedom of the Press publishes a significant portion of the exhibits used during the trial. [Reporters Committee for Freedom of the Press, 12/4/2006] Previously, only a few items of the evidence linking the attacks to al-Qaeda were made public. For example, the 9/11 Commission’s Terrorist Travel Monograph contained 18 documents of the alleged hijackers and their associates. [9/11 Commission, 8/21/2004, pp. 171-195 pdf file] The published exhibits include:
bullet Items belonging to the alleged hijackers that were recovered from the crash sites and Logan airport;
bullet Some details of the hijackers’ movements in the US;
bullet Graphic photos of dead victims and body parts in the Pentagon and WTC ruins;
bullet Substitutions for testimony from some of the main plotters such as Khalid Shaikh Mohammed;
bullet The missing chapter from the Justice Department’s Office of Inspector General’s review of the FBI’s performance before 9/11 (see June 9, 2005); and
bullet FBI and CIA documents. [Reporters Committee for Freedom of the Press, 12/4/2006]
At the end of July, the US District Court for the Eastern District of Virginia, Alexandria Division, publishes more of the exhibits used in the trial. The additionally published exhibits include, for example:
bullet Documents of the hijackers found at the crash sites and Logan airport, such as Satam Al Suqami’s passport (see After 8:46 a.m. September 11, 2001), Ahmed Alnami’s youth hosteling card, and old correspondence between Mohamed Atta and the German authorities;
bullet Recordings of calls made by the passengers from the flights and recordings of the hijacker pilots talking to the passengers;
bullet Documents about the alleged hijackers prepared by the FBI such as a True Name Usage Chart for 2001 and chronologies for eleven of the hijackers from August 16-September 11, 2001;
bullet Documents from the hijackers’ flight schools;
bullet A small sample of the hijackers’ banking and phone records.
However, some of the exhibits are not disclosed. For example, the cockpit voice recording from United 93 is sealed and only a transcript is made available. [US District Court for the Eastern District of Virginia, 7/31/2006]

Entity Tags: Reporters Committee for Freedom of the Press

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Zacarias Moussaoui claimed that Richard Reid (above) was to have helped him hijack a fifth plane on 9/11.Zacarias Moussaoui claimed that Richard Reid (above) was to have helped him hijack a fifth plane on 9/11. [Source: Mirrorpix(.com)]Against the will of his defense attorneys, Zacarias Moussaoui takes the stand at his trial (see March 6-May 4, 2006) and claims that he was supposed to fly a fifth plane on 9/11. He says the plane would have targeted the White House and one of the muscle hijackers would have been shoe-bomber Richard Reid (see December 22, 2001). However, he claims not to have known the details of the other hijackings, only that the WTC would be hit. He does not mention any other collaborators aside from Reid, who has already been sentenced to a long prison term. When the prosecution asks him whether he lied to FBI investigators so the plan could go forward he replies, “That’s correct.” An Associated Press expert calls this, “a stunning revelation that would help prosecutors rather than him.” [Associated Press, 3/27/2006] In what the New York Times calls a “bizarre moment,” the defense team, aware of the damage this admission could do, subject Moussaoui to tough questioning and the chief prosecutor objects that one of the defense attorneys is badgering his own client. [New York Times, 4/17/2006]
Uncertainty over Fifth Jet - There is some dispute over whether Moussaoui was indeed to have flown a fifth plane (see January 30, 2003 and Before 2008). Following the testimony, the defense reads statements made by al-Qaeda leaders who are in custody, but are not permitted to testify at the trial (see May 14, 2003 and March 22, 2005). The statements say that Moussaoui was not part of 9/11, but a follow-up operation. [Associated Press, 3/28/2006; US District Court for the Eastern District of Virginia, 7/31/2006 pdf file] However, these statements were obtained using torture (see June 16, 2004). The government later concedes that there is no evidence linking Richard Reid to 9/11. [Associated Press, 4/20/2006]
"Complete Fabrication" - Moussaoui had denied being part of 9/11 before the trial (see April 22, 2005). By the end of the trial he will do so again, calling the confession he makes on this day “a complete fabrication.” [Associated Press, 5/8/2006]

Entity Tags: Zacarias Moussaoui, Richard C. Reid

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Page 14 of 18 (1709 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike