!! History Commons Alert, Exciting News

Context of '(Between Spring and Summer 2001): FBI Rejects Former Army Ranger’s Plan to Assassinate Bin Laden'

This is a scalable context timeline. It contains events related to the event (Between Spring and Summer 2001): FBI Rejects Former Army Ranger’s Plan to Assassinate Bin Laden. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 22 of 29 (2835 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29 | next

Abdurrahman Wahid.Abdurrahman Wahid. [Source: Indonesian Embassy in the Netherlands]In an interview with the Australian public television station SBS, Abdurrahman Wahid, president of Indonesia from 1999 to 2001, suggests that the country’s military or police may have been behind the 2002 Bali bombings (see October 12, 2002). The Australian reports: “Wahid told SBS’s Dateline program that he had grave concerns about links between Indonesian authorities and terrorist groups and believed that authorities may have organized the larger of the two 2002 Bali bombings which hit the Sari Club, killing the bulk of the 202 people who died.… Asked who he thought planted the Sari Club bomb, Mr Wahid said: ‘Maybe the police… or the armed forces. The orders to do this or that came from within our armed forces, not from the fundamentalist people.’” Wahid believes the smaller bomb was indeed planted by Islamist militants. [SBS Dateline, 10/12/2005; Australian, 10/13/2005] Counterterrorism expert John Mempi also comments, “Why this endless violence [in Indonesia]? Why are there acts of terrorism year in, year out? Regimes change, governments change, but violence continues. Why? Because there is a sort of shadow state in this country. A state within a state ruling this country.” [SBS Dateline, 10/12/2005] In 2008, Imam Samudra, imprisoned and sentenced to death for being one of the Bali bombings masterminds, will make comments similar to Wahid’s. While he admits being involved in the bombings, he claims that they never meant to kill so many people. He says the second explosion was much bigger than they had expected and suggests that “the CIA or KGB or Mossad” had somehow tampered with the bomb. [Sunday Times (London), 3/2/2008]

Entity Tags: Imam Samudra, Abdurrahman Wahid, John Mempi

Timeline Tags: Alleged Use of False Flag Attacks, Complete 911 Timeline

The US and Britain send a team to search for the body of Osama bin Laden in the rubble of the Pakistani town of Balakot, according to the British Sunday Express newspaper. The al-Qaeda leader is thought to have been buried there following a recent earthquake. The British component comprises members of the foreign intelligence service MI6 and the SAS Special Forces unit; the Americans are US Special Forces. The team, whose deployment is approved by President Bush, is flown in from Afghanistan equipped with imagery and eavesdropping technology, high-tech weapons systems, and linguists. The search is motivated by the fact that, days before the earthquake happened, an American satellite spotted an al-Qaeda training camp in a nearby area and obtained high-resolution close-ups. A senior intelligence officer in Washington says: “One of those photos bore a remarkable resemblance to bin Laden. His face looked thinner, which is in keeping with our reports that his kidney condition has worsened.” This is a reference to the rumor that bin Laden has kidney problems (see November 23, 1996). The Sunday Express will report: “In recent weeks, both MI6 and the CIA have established that bin Laden has received a portable kidney dialysis machine from China but it requires electricity to power it. Drones, unmanned aircraft that US Special Forces launched from Afghanistan last week, have reported that the area along the border has lost all power supplies.” However, the state of bin Laden’s kidneys will still be shrouded in mystery two years later (see Late 2007). According to the report, Pakistani President Pervez Musharraf has agreed to keep other rescue teams working to locate survivors away from the border area where the search for bin Laden is concentrated. [Daily Times (Lahore), 10/20/2005] There are no reports that the search is a success. A man thought to be bin Laden will continue to release audio messages (see, for example, January 19, 2006).

Entity Tags: Special Air Service, Central Intelligence Agency, George W. Bush, Pervez Musharraf, UK Secret Intelligence Service (MI6), Osama bin Laden

Timeline Tags: Complete 911 Timeline

National Institute of Standards and Technology (NIST) releases a 12-page appendix to its final reports on the WTC collapses (see October 26, 2005) detailing tests it conducted on samples of the type of fireproofing used in the WTC. An earlier NIST report had concluded that loss of fireproofing was a major factor in the collapses (see April 5, 2005). The appendix was not included in earlier drafts of the report (see June 23, 2005) [National Institute of Standards and Technology, 6/23/2005 pdf file; National Institute of Standards & Technology, 9/2005, pp. 263-274 pdf file; National Institute of Standards and Technology, 9/2005, pp. 149] NIST conducted a series of fifteen tests. In the tests projectiles were fired at fireproofing mounted on 12 inch x 12 inch plates, and steel bars with a one inch diameter. The fireproofing used in the tests was Blazeshield DC/F, one of the two grades of fireproofing used on the impact floors. In thirteen of the tests the projectiles were buckshot, which was fired at the steel samples from a modified shotgun at a distance of 29.5 ft. The other two tests used steel bolts and hexagon nuts, fired with less velocity and at closer range. According to NIST, “The test results support the assumption that, within the debris field created by the aircraft impact into WTC 1 and WTC 2, the SFRM [i.e., fireproofing] used for thermal insulation of structural members was damaged and dislodged.” [National Institute of Standards & Technology, 9/2005, pp. 83, 263-274 pdf file]

Entity Tags: National Institute of Standards and Technology, World Trade Center

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The media learns that Vice President Dick Cheney and staffers from the Office of the Vice President (OVP) regularly interfered with the Senate Intelligence Committee’s 2004 report on the intelligence community’s failures to accurately assess Iraq’s WMD threat (see July 9, 2004). According to administration and Congressional sources, that interference was facilitated and encouraged by committee chairman Pat Roberts (R-KS). Cheney and the OVP members regularly intervened in the committee’s deliberations, and drastically limited the scope of the investigation.
Protecting the Bush Administration - Reporter Laura Rozen will later write, “In order to prevent the White House and the Office of the Vice President itself from ever coming under any Congressional oversight scrutiny, Cheney exerted ‘constant’ pressure on [Roberts] to stall an investigation into the Bush administration’s use of flawed intelligence on Iraq.” Cheney and the OVP also withheld key documents from the committee. Some of the withheld materials included portions of then-Secretary of State Colin Powell’s February 2003 address to the United Nations (see February 5, 2003) that were written by Cheney’s then-chief of staff, Lewis Libby, and documents that Libby used to make the administration’s case for war with Iraq. The OVP also withheld the Presidential Daily Briefing (PDB) documents: written intelligence summaries provided to President Bush by the CIA. The decision to withhold the documents was spearheaded by Cheney’s chief legal counsel and chief of staff David Addington. Much of the withheld material, and Cheney-OVP interference, was designed to keep the committee from looking into the Bush administration’s use of intelligence findings to promote the war. According to committee member John D. Rockefeller (D-WV), Cheney attended regular policy meetings in which he gave White House orders to Republican committee staffers. It is “not hearsay,” Rockefeller says, that Cheney pushed Roberts to, in reporter Jonathan Landay’s words, “drag out the probe of the administration’s use of prewar intelligence.” The committee chose to defer the second portion of its report, about the administration’s use of intelligence to propel the nation to war, until after the November 2004 elections. That portion of the report remains uncompleted.
Shifting the Blame to the White House - Reporter Murray Waas writes, “Had the withheld information been turned over, according to administration and Congressional sources, it likely would have shifted a portion of the blame away from the intelligence agencies to the Bush administration as to who was responsible for the erroneous information being presented to the American public, Congress, and the international community.” He continues: “When the [report] was made public, Bush, Cheney, and other administration officials cited it as proof that the administration acted in good faith on Iraq and relied on intelligence from the CIA and others that it did not know was flawed. But some Congressional sources say that had the committee received all the documents it requested from the White House the spotlight could have shifted to the heavy advocacy by Cheney’s office to go to war. Cheney had been the foremost administration advocate for war with Iraq, and Libby played a central staff role in coordinating the sale of the war to both the public and Congress.” [National Journal, 10/27/2005; Wilson, 2007, pp. 381]

Entity Tags: Office of the Vice President, John D. Rockefeller, George W. Bush, David S. Addington, Colin Powell, Bush administration (43), Jonathan Landay, Murray Waas, Laura Rozen, Senate Intelligence Committee, Lewis (“Scooter”) Libby, Richard (“Dick”) Cheney, Pat Roberts

Timeline Tags: Events Leading to Iraq Invasion

Screen graphic from CNN’s coverage of Lewis Libby’s indictment.Screen graphic from CNN’s coverage of Lewis Libby’s indictment. [Source: CNN / Flickr]Lewis “Scooter” Libby, Vice President Dick Cheney’s chief of staff, is indicted for perjury and obstruction of justice. Libby is accused of “outing” Valerie Plame Wilson, an undercover CIA agent, to the press (see June 23, 2003, 8:30 a.m. July 8, 2003, Late Afternoon, July 12, 2003, and 2:24 p.m. July 12, 2003), and then lying about it to the FBI and to a grand jury empaneled by special prosecutor Patrick Fitzgerald (see December 30, 2003, March 5, 2004, and March 24, 2004). Libby immediately resigns his position as Cheney’s chief of staff. [US District Court for the District of Columbia, 10/28/2005 pdf file; CNN, 5/14/2006; MSNBC, 2/21/2007; Washington Post, 7/3/2007]
Five Counts of Obstruction, Two Counts of Perjury - Libby is indicted on five counts of obstruction of justice and two counts of perjury. [US District Court for the District of Columbia, 10/28/2005 pdf file; MSNBC, 2/21/2007] Though the original investigation was of the Plame Wilson leak, Fitzgerald says it is important to understand that Libby’s crimes, though not the prime focus of the initial investigation, should be prosecuted as well. “Investigators do not set out to investigate the statute, they set out to gather the facts,” he says. The indictment does not charge Libby with knowingly disclosing the identity of a covert agent. [New York Times, 10/28/2005]
Confirms that CIA Agent's Status Classified; Important to National Security - Fitzgerald confirms that the fact of Plame Wilson’s employment at the CIA was in and of itself classified information, and not to be shared to the media or the public. He says: “The fact that she was a CIA officer was not well known, for her protection or for the benefit of all us. It’s important that a CIA officer’s identity be protected, that it be protected not just for the officer, but for the nation’s security.… [T]he damage wasn’t to one person. It wasn’t just Valerie Wilson. It was done to all of us” (see Before September 16, 2003, October 3, 2003, October 11, 2003, October 22-24, 2003, October 23-24, 2003, and February 13, 2006). [New York Times, 10/28/2005; Nation, 3/16/2007]
Libby Lied about Knowledge of Plame Wilson's Status, Indictment Charges - The indictment charges that Libby lied when he claimed that he learned of Plame Wilson’s CIA status from NBC reporter Tim Russert (see November 24, 2003, March 5, 2004, March 24, 2004, and August 7, 2004). Instead, the indictment charges, Libby learned about Plame Wilson and her possible role in sending her husband, former ambassador Joseph Wilson, to Niger to investigate claims of Iraqi attempts to buy uranium (see February 21, 2002-March 4, 2002) from a number of people, including an undersecretary of state (see June 10, 2003), a CIA officer who regularly briefed him on national security issues (see 2:00 p.m. June 11, 2003), an unidentified “senior CIA officer,” and from his superior, Cheney (see (June 12, 2003)). In his turn, Libby shared that information with several officials in the Office of the Vice President, including Cheney’s senior counsel David Addington (see July 8, 2003), Cheney’s national security adviser John Hannah (see May 29, 2003), and Cheney’s press secretary at the time, Cathie Martin (who may have actually informed Libby—see 5:27 p.m. June 11, 2003). “In fact, Mr. Libby was the first official known to have told a reporter when he talked to Judith Miller in June of 2003 about Valerie Wilson” (see June 23, 2003), Fitzgerald says. “[T]o be frank, Mr. Libby gave the FBI a compelling story,” he adds. “It would be a compelling story that will lead the FBI to go away if only it were true. It is not true, according to the indictment.” [New York Times, 10/28/2005; US District Court for the District of Columbia, 10/28/2005 pdf file; National Journal, 10/30/2005] (The unidentified “senior CIA officer” is later revealed to be Frederick Fleitz, who served both as a senior officer at the Weapons Intelligence, Nonproliferation, and Arms Control (WINPAC) desk and as Undersecretary of State John Bolton’s chief of staff—see (June 11, 2003).) [Raw Story, 11/2/2005] Jeralyn Merritt, a criminal defense attorney who writes for the progressive blog TalkLeft, notes that according to the indictment, the phrases used by Libby in his denials to the grand jury were nearly verbatim echoes of Cheney’s own denials as told to NBC’s Tim Russert in September 2003 (see September 14, 2003). [Jeralyn Merritt, 10/31/2005]
Sought Information on Plame Wilson's CIA Status - The indictment also charges that Libby sought information from the CIA and the State Department about Plame Wilson’s CIA status, and tried to determine whether she had been responsible for sending her husband to Niger. According to the indictment, Libby asked David Addington, the chief counsel to Cheney, “in sum and substance, what paperwork there would be at the CIA if an employee’s spouse undertook an overseas trip.” The court papers do not say what action, if any, Addington may have taken in response to Libby’s request. [New York Times, 10/28/2005; US District Court for the District of Columbia, 10/28/2005 pdf file; National Journal, 12/16/2005]
Discussed with Multiple Officials before Leaking to Reporters - In a press conference, Fitzgerald walks reporters and listeners through the indictment: from Libby’s learning of Plame Wilson’s identity from State Department and CIA sources and from Cheney, through his discussing it with at least three White House officials, all before the supposed “disclosure” from Russert. Libby subsequently lied to the FBI and to Fitzgerald’s grand jury about those discussions with government officials and again with Miller and Time reporter Matthew Cooper. “[H]e lied about it afterwards,” Fitzgerald says, “under oath and repeatedly.… [A]nyone who would go into a grand jury and lie, obstruct, and impede the investigation has committed a serious crime.” [New York Times, 10/28/2005]
Leak Seriously Jeopardized National Security - Fitzgerald tells reporters that the leaking of a CIA officer’s identity is a serious breach of national security. “This is a very serious matter and compromising national security information is a very serious matter,” he says. “But the need to get to the bottom of what happened and whether national security was compromised by inadvertence, by recklessness, by maliciousness is extremely important.” Fitzgerald continues: “At a time when we need our spy agencies to have people work there, I think just the notion that someone’s identity could be compromised lightly… [discourages] our ability to recruit people and say, ‘Come work for us… come be trained… come work anonymously here or wherever else, go do jobs for the benefit of the country for which people will not thank you.” Senator John D. Rockefeller (D-WV), the ranking Democrat on the Senate Intelligence Committee, says: “Revealing the identity of a covert agent is the type of leak that gets people killed. Not only does it end the person’s career… it puts that person in grave personal danger as well as their colleagues and all the people they have had contact with.” [New York Times, 10/28/2005; National Journal, 10/30/2005]
Charges Are Serious, Not 'Technicalities' - Responding to a question about Republican charges that Libby is being charged as a “technicality,” and Fitzgerald “overreached” his authority in filing the indictment, Fitzgerald says: “That talking point won’t fly. If you’re doing a national security investigation, if you’re trying to find out who compromised the identity of a CIA officer and you go before a grand jury and if the charges are proven… that the chief of staff to the vice president went before a federal grand jury and lied under oath repeatedly and fabricated a story about how he learned this information, how he passed it on, and we prove obstruction of justice, perjury, and false statements to the FBI, that is a very, very serious matter.… [T]he truth is the engine of our judicial system. And if you compromise the truth, the whole process is lost.… Any notion that anyone might have that there’s a different standard for a high official, that this is somehow singling out obstruction of justice and perjury, is upside down.… If these facts are true, if we were to walk away from this and not charge obstruction of justice and perjury, we might as well just hand in our jobs. Because our jobs, the criminal justice system, is to make sure people tell us the truth. And when it’s a high-level official and a very sensitive investigation, it is a very, very serious matter that no one should take lightly.” [New York Times, 10/28/2005]
Explanation for Delay in Filing Indicitment - Fitzgerald gives one reason for the delay in filing the indictment against Libby. When asked why he went to such lengths to compel the testimony of reporters such as Miller (see September 30, 2005) and Cooper (see July 13, 2005), Fitzgerald replies that the rights of the accused are paramount in his mind. The testimony of Miller, Cooper, and other journalists could bolster the case against Libby, or could help exonerate him. The possibility that he might charge someone, only to learn later that one of the journalists who had declined to testify had information to clear the person, was something that “frightens me,” Fitzgerald says. “I think the only way you can do an investigation like this is to hear all eyewitnesses.” [New York Times, 10/28/2005; National Journal, 11/12/2005]
No Charges against Cheney - Asked whether the investigation found evidence of criminal acts by Cheney, Fitzgerald answers: “We make no allegation that the vice president committed any criminal act. We make no allegation that any other people who provided or discussed with Mr. Libby committed any criminal act. But as to any person you asked me a question about other than Mr. Libby, I’m not going to comment on anything.” Fitzgerald refuses to comment on whether White House political strategist Karl Rove or anyone else will be named as co-conspirators, charged, or even named in court. [New York Times, 10/28/2005]

Entity Tags: John Hannah, Judith Miller, John D. Rockefeller, John R. Bolton, Karl C. Rove, Richard (“Dick”) Cheney, Joseph C. Wilson, Lewis (“Scooter”) Libby, Jeralyn Merritt, Frederick Fleitz, Central Intelligence Agency, David S. Addington, Weapons Intelligence, Nonproliferation, and Arms Control, Valerie Plame Wilson, Federal Bureau of Investigation, US Department of State, Catherine (“Cathie”) Martin, Tim Russert, Patrick J. Fitzgerald, Matthew Cooper

Timeline Tags: Niger Uranium and Plame Outing

Mustafa Setmarian Nasar.Mustafa Setmarian Nasar. [Source: Public domain]Around this date, al-Qaeda leader Mustafa Setmarian Nasar, a.k.a. Abu Musab al-Suri, is arrested in a raid in Quetta, Pakistan. The US posted a $5 million reward for his capture in 2004. A red-haired, light-skinned Syrian citizen, he also is a citizen of Spain and long-time resident there. The raid takes place in a Quetta shop used as an office for the Madina Trust, a Pakistani charity that is linked to the Pakistani militant group Jaish-e-Mohammed. A man arrested with Nasar is believed to be a Jaish-e-Mohammed member; another man is killed in the raid. [CNN, 11/5/2005; Associated Press, 11/5/2005; Associated Press, 5/2/2006] He is believed to have taught the use of poisons and chemicals at Afghanistan training camps and he is suspected of a role in the 2004 Madrid train bombings (see 7:37-7:42 a.m., March 11, 2004) and the 7/7 London bombings (see July 7, 2005). But he is best known for his strategic writings. The Washington Post calls him “one of the jihad movement’s prime theorists.” He long advocated a decentralized militant movement, and was often critical of bin Laden’s and al-Qaeda’s mistakes. He says, “Al-Qaeda is not an organization, it is not a group, nor do we want it to be. It is a call, a reference, a methodology.” He is soon flown out of Pakistan and into US custody. In 2006, US intelligence sources will claim that he is now in the secret custody of another unnamed country. [Washington Post, 5/23/2006; New Yorker, 9/4/2006] In 2006, Baltasar Garzon, a Spanish judge involved in many al-Qaeda related cases, will complain that the US has not shared any information about Nasar since his secret arrest. He adds, “I don’t know where he is. Nobody knows where he is. Can you tell me how this helps the struggle against terrorism?” [New York Times, 6/4/2006]

Entity Tags: Baltasar Garzon, Mustafa Setmarian Nasar, Al-Qaeda, Jaish-e-Mohammed

Timeline Tags: Complete 911 Timeline

A local newspaper claims this is the CIA prison in Mauritania.A local newspaper claims this is the CIA prison in Mauritania. [Source: Le Rénovateur Quotidien]Most top al-Qaeda leaders being held by the US has been in a secret CIA prison in Poland. But after the nonprofit watchdog group Human Rights Watch discloses the existence of the prisons, the prisoners are moved to a new CIA prison located in the North African nation of Mauritania. The New Yorker will report that “After a new government friendly to the US took power, in a bloodless coup d’état in August, 2005… it was much easier for the intelligence community to mask secret flights there.” [New Yorker, 6/17/2007] A Mauritanian newspaper places the prison at Ichemmimène, a town deep in the Sahara desert. [Le Rénovateur Quotidien, 6/29/2007] ABC News lists eleven prisoners making the move:
bullet Abu Zubaida (held in Thailand then Poland).
bullet Abd al-Rahim al-Nashiri (held in Poland).
bullet Ramzi bin al-Shibh (held in Poland).
bullet Khalid Shaikh Mohammed (held in Poland).
bullet Khallad bin Attash (held in Poland).
bullet Ahmed Khalfan Ghailani (held in Poland).
bullet Hassan Ghul (held in Poland).
bullet Abdul Rahim al-Sharqawi (held in Poland).
bullet Mohammed Omar Abdul-Rahman (held in Poland).
bullet Ibn al-Shaykh al-Libi (held in Pakistan then Poland).
Further, Hambali is a high level prisoner in US custody but he is being held elsewhere. [ABC News, 12/5/2005; ABC News, 12/5/2005] In 2007 Council of Europe, the European human rights monitoring agency, will reveal that the main CIA prison for high-level prisoners was in a Soviet-era military compound at Stare Kjekuty, in northeastern Poland. Lower-level prisoners from Afghanistan and Iraq were held in a military base near the Black Sea in Romania. The governments of Poland and Romania will continue to deny the existence of the prisons even after the US government admits to their existence. [New York Times, 6/8/2007] Eleven of the twelve prisoners mentioned above were subjected to the so-called “enhanced interrogation techniques” called torture by many. In 2006, Bush will announce that the CIA prisons are being emptied and high level prisoners will be transferred to the prison at Guantanamo Bay, Cuba (see September 2-3, 2006).
Some 'Ghost' Prisoners - But the list of prisoners being transferred will include some other names and will not include al-Shaykh al-Libi, Ghul, al-Sharqawi, or Abdul-Rahman. It will later come out that al-Sharqawi was probably sent to Guantanamo in late 2004 after being held in a Jordanian prison (see February 7, 2002). Ghul is a ‘ghost’ prisoner until he is turned over to the Pakistani government in 2006 (see (Mid-2006)). Al-Libi is similarly turned over to Libya (see Between November 2005 and September 2006). The fate of Abdul-Rahman remains unknown. [ABC News, 12/5/2005]

Entity Tags: Khallad bin Attash, Ramzi bin al-Shibh, Khalid Shaikh Mohammed, Central Intelligence Agency, Hambali, Abd al-Rahim al-Nashiri, Ibn al-Shaykh al-Libi, Abdul Rahim al-Sharqawi, Ahmed Khalfan Ghailani, Abu Zubaida, Mohammed Omar Abdul-Rahman

Timeline Tags: Torture of US Captives, Complete 911 Timeline

Following a request that the CIA be exempted from a US ban on torture, claims about alleged CIA mistreatment of prisoners begin to appear in the media, apparently fueled by CIA employees unhappy with the practices the CIA is employing. On November 2, the Washington Post reveals information about the CIA’s network of secret prisons, including facilities in Europe, which is kept secret from “nearly all members of Congress charged with overseeing the CIA’s covert actions.” The rationale for the policy is that the CIA apparently needs to hold people without the restrictions imposed by the US legal system, in order to keep the country safe. Detainees are said to be tortured, and this is not only questionable under US law, but, in some cases, against the law of the host country. [Washington Post, 11/2/2005] On November 9, the New York Times reveals that in 2004, the CIA’s Inspector General secretly concluded that the CIA’s aggressive interrogation techniques in use up until that time were likely in violation of a 1994 international treaty against torture signed by the US (see May 7, 2004). [New York Times, 11/9/2005] After the network is revealed, there is much interest in what actually goes on in it and more important details are uncovered by ABC News on November 18. Apparently, the CIA’s interrogation techniques have led to the death of one detainee and include sleep deprivation, physical violence, waterboarding, and leaving prisoners in cold cells (see Mid-March 2002). The intelligence generated by these techniques is said to be questionable, and one source says: “This is the problem with using the waterboard. They get so desperate that they begin telling you what they think you want to hear.” [ABC News, 11/18/2005] Some videotapes of CIA interrogations of detainees are destroyed this same month, although what date this happens exactly is unclear (see November 2005). The CIA is also so alarmed by these revelations that it immediately closes its secret prisons in Eastern Europe and opens a new one in a remote section of the Sahara desert (see November 2005).

Entity Tags: Central Intelligence Agency

Timeline Tags: Torture of US Captives, Complete 911 Timeline

On November 3, 2005, Leonie Brinkema, the judge in the Zacarias Moussaoui trial, asks the CIA about recordings of interrogations of detainees who are related to the Moussaoui case. Eleven days later, the CIA again incorrectly claims to prosecutors in that trial that it has no such recordings. The CIA made a similar claim in 2003 (see May 7-9, 2003), but in fact the CIA secretly videotaped detainee interrogations in 2002 (see Spring-Late 2002). Some of these videotapes are destroyed this month (see November 2005), however it is unknown if the destruction takes place before or after this date. In late 2007, the CIA will reveal that it did have some videotapes after all and prosecutors will finally be able to view some of them (see September 19 and October 18, 2007). But it will also be revealed that most of the videotapes were destroyed (see December 6, 2007). Prosecutors will later claim that neither the video nor the audio recordings contained material relevant to the Moussaoui trial, and some of the content of the interrogations was provided during discovery. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006; US District Court for the Eastern District of Virginia, Alexandria Division, 10/25/2007 pdf file; Reuters, 11/13/2007]

Entity Tags: Leonie Brinkema, Zacarias Moussaoui, Central Intelligence Agency

Timeline Tags: Torture of US Captives, Complete 911 Timeline, 9/11 Timeline, Civil Liberties

The US charges British citizen Binyam Ahmed Mohamed (see May-September, 2001), who has allegedly used the aliases Talha al-Kini, Foaud Zouaoui, Taha al-Nigeri, and John Samuel, with conspiracy to foment and carry out terrorist attacks against US targets. Mohamed, who was arrested in Pakistan in April 2002, is charged with “attacking civilians; attacking civilian objects; murder by an unprivileged belligerent; destruction of property by an unprivileged belligerent; and terrorism,” though the charge sheet is unclear whether Mohamed carried out any of these actions himself, or whether he was part of a larger conspiracy by the al-Qaeda terrorist organization. The charges allege links between Mohamed and “shoe bomber” Richard Reid (see December 22, 2001), radical Islamist Abu Zubaida, 9/11 plotter Khalid Shaikh Mohammed, and alleged “dirty bomber” Jose Padilla. Mohamed is alleged to have been part of the Padilla bomb plot. [US Defense Department, 11/4/2005 pdf file] Much of the evidence against Mohamed comes from confessions he allegedly made while in US custody at the detention camp at Bagram Air Force Base (see January-September 2004), and in Guantanamo Bay (see September 2004 and After). He was also held in Pakistan (see April 10-May, 2002 and May 17 - July 21, 2002), and “rendered” to a secret prison in Morocco (see July 21, 2002 -- January 2004). Through his lawyers, Mohamed has claimed that he was tortured in all four detention sites. The British judiciary will later establish that British officials facilitated Mohamed’s interrogation in Pakistan, and had “full knowledge of the reported conditions of his detention and treatment” (see February 24, 2009). [Guardian, 2/5/2009] As with Padilla, the charges relating to the “dirty bomb” plot will later be dropped due to lack of evidence, and all charges against Mohamed will eventually be dropped (see October-December 2008 and February 4, 2009).

Entity Tags: Binyam Mohamed

Timeline Tags: Torture of US Captives

Washington Post reporter Bob Woodward acknowledges testifying in the Plame Wilson investigation (see November 14, 2005), and apologizes to the Post for failing to tell editors and publishers that a senior Bush administration official told him over two years ago that Valerie Plame Wilson was a CIA officer (see June 13, 2003). Woodward is a reporter and assistant managing editor at the Post. While speculation has been rife over which reporters knew of Plame Wilson’s identity, and which administration officials are responsible for blowing her covert status, Woodward has never admitted to being a recipient of the leaked information, and has repeatedly attacked the investigation (see December 1, 2004, July 7, 2005, July 11, 2005, July 17, 2005, July 31, 2005, and October 27, 2005). Woodward explains that he did not reveal his own involvement in the case—that Deputy Secretary of State Richard Armitage informed him of Plame Wilson’s CIA status—because he feared being subpoenaed by special prosecutor Patrick Fitzgerald. Woodward says he was trying to protect his sources. “That’s job number one in a case like this,” he says. “I hunkered down. I’m in the habit of keeping secrets. I didn’t want anything out there that was going to get me subpoenaed.” Woodward told his editors about his knowledge of the case shortly after former White House aide Lewis “Scooter” Libby was indicted for perjury and obstruction of justice (see October 28, 2005). [Washington Post, 11/16/2005; Washington Post, 11/16/2005; Washington Post, 11/17/2005]
Woodward 'Should Have Come Forward' - Executive editor Leonard Downie Jr. says Woodward “made a mistake.… [H]e still should have come forward, which he now admits. We should have had that conversation.… I’m concerned that people will get a mis-impression about Bob’s value to the newspaper and our readers because of this one instance in which he should have told us sooner.” Downie adds: “After Libby was indicted, [Woodward] noticed how his conversation with the source preceded the timing in the indictment. He’s been working on reporting around that subject ever since the indictment.”
Questions of Objectivity, Honesty - Woodward’s silence about his own involvement while repeatedly denigrating the investigation causes many to question his objectivity. “It just looks really bad,” says Eric Boehlert, an author and media critic. “It looks like what people have been saying about Bob Woodward for the past five years, that he’s become a stenographer for the Bush White House” (see November 25, 2002). Journalism professor Jay Rosen says flatly, “Bob Woodward has gone wholly into access journalism.” And Robert Zelnick, chair of Boston University’s journalism department, says: “It was incumbent upon a journalist, even one of Woodward’s stature, to inform his editors.… Bob is justifiably an icon of our profession—he has earned that many times over—but in this case his judgment was erroneous.” Rem Rieder, the editor of American Journalism Review, says Woodward’s disclosure is “stunning… [it] seems awfully reminiscent of what we criticized Judith Miller for.” Miller, a reporter for the New York Times, was accused by Times executive editor Bill Keller of misleading the paper by not informing her editors that she had discussed Plame Wilson’s identity with Libby (see October 16, 2005). Rieder calls Woodward “disingenuous” for his criticism of the investigation (see July 7, 2005, July 11, 2005, July 17, 2005, and October 27, 2005) without revealing his own knowledge of the affair. Columnist and reporter Josh Marshall notes, “By becoming a partisan in the context of the leak case without revealing that he was at the center of it, really a party to it, he wasn’t being honest with his audience.” Woodward claims he only realized his conversation with Armitage might be of some significance after Libby was described in the indictment as the first Bush official to reveal Plame Wilson’s name to reporters. Armitage told Woodward of Plame Wilson’s identity weeks before Libby told Miller. Unlike Libby, Armitage did not release Woodward from his promise to protect his identity (see September 15, 2005). [Washington Post, 11/17/2005]
Woodward Denies Quid Pro Quo - Some time later, a colleague will ask Woodward if he were trading information with Armitage on a friendly, perhaps less-than-professional basis. “Was this a case of being in a relationship where you traded information with a friend?” Woodward will respond sharply: “It’s not trading information. It is a subterranean narrative. What do you have? What do you know? If you start making this a criminal act, people will not speak to you.” [Vanity Fair, 4/2006]

Entity Tags: Lewis (“Scooter”) Libby, Eric Boehlert, Bush administration (43), Bob Woodward, Jay Rosen, Leonard Downie, Jr., Valerie Plame Wilson, Washington Post, Richard Armitage, Robert Zelnick, Joshua Micah Marshall, Patrick J. Fitzgerald, Rem Rieder

Timeline Tags: Domestic Propaganda, Niger Uranium and Plame Outing

The US lifts an arms embargo on Indonesia. The US imposed a limited arms ban in 1991 after the Indonesian military massacred civilians in East Timor. The arms ban was strengthened in 1999 after the Indonesian military committed more massacres as East Timor voted for independence. The Bush administration had long desired closer ties with the Indonesian military, but was held back by Congress, which imposed conditions before military relations could be reestablished. In particular, the Indonesian military was required to account for some atrocities, especially the alleged killing of several US teachers by Indonesian soldiers in the province of West Papua in 2002 (see August 31, 2002). Indonesia had yet to fulfill these conditions, but earlier in the month Congress inserted a loophole in the law, allowing the restrictions to be waived by the Bush administration if it was found necessary for national security reasons. The Bush administration uses the loophole during Thanksgiving vacation while Congress is out of session, despite the lack of any new national security reason to do so. The lifting of restrictions still falls short of full military relations the US has with most other countries in the region. The US also renewed training and educational exchanges with the Indonesian military earlier in the year. [International Herald Tribune, 11/24/2005] The killing of US teachers in Papua remains unresolved. In January 2006, the New York Times will report that Indonesian police have concluded that the Indonesian military committed the killings but are unwilling to officially report this because of diplomatic sensitivities between the US and Indonesia. [New York Times, 1/27/2006]

Entity Tags: Bush administration (43), Tentara Nasional Indonesia

Timeline Tags: Complete 911 Timeline

The Supreme Court declines, without comment, to hear the case (see August 4, 2005) brought by former FBI translator Sibel Edmonds. [New York Times, 11/28/2005; Reuters, 11/28/2005] The decision puts an end to Edmonds’ legal efforts to hold the bureau accountable for its failure to address several security issues raised by Edmonds in late 2001 and early 2002 (see December 2, 2001 and Afternoon February 12, 2002, respectively). On August 4, Edmonds had filed a petition with the Supreme Court asking it “to provide guidance to the lower courts about the proper scope and application of the state secrets privilege (see March 9, 1953), and to prevent further misuse of the privilege to dismiss lawsuits at the pleading stage.” The petition also urged the court to affirm that the press and public may not be barred from court proceedings in civil cases without just cause. (In May, the federal appeals court had closed the courtroom to the public and media.) Had the Supreme Court had ruled in favor of Edmonds, she would have been able to return to the lower courts and start her case again. [Petition for a writ of certiorari. Sibel Edmonds v. Department of Justice, et all., 8/4/2005, pp. 2 pdf file; Government Executive, 8/8/2005]

Entity Tags: US Supreme Court, Sibel Edmonds

Timeline Tags: Complete 911 Timeline

A new report by the Government Accountability Office (GAO), an impartial investigative arm of Congress, claims the US effort to help foreign nations cut off terrorism funding has been frustrated by infighting among US agencies, a lack of funding, and leadership problems. The report says “the US government lacks an integrated strategy” to train foreign countries and give them technical assistance. Officials at the State and Treasury Departments cannot even agree on who is supposed to be in charge of the effort. In at least one case, the State Department refused to even allow a Treasury official to enter a certain foreign country. “Investigators found clear tensions between officials at State, Treasury, Justice, and other US government departments.” Remarkably, private contractors have sometimes been allowed to draft proposed laws for foreign countries to curb terrorist financing. The contractors’ work at times resulted in proposals with “substantial deficiencies.” Generally speaking, the New York Times notes that experts say that the Bush administration’s efforts with terrorist financing has been “spotty, with few clear dents in al-Qaeda’s ability to move money and finance terrorist attacks.” [New York Times, 11/29/2005]

Entity Tags: US Department of State, US Department of the Treasury, Government Accountability Office, Al-Qaeda, Bush administration (43), US Department of Justice

Timeline Tags: Complete 911 Timeline

Deputy Director of National Intelligence Michael Hayden learns that the CIA has videotaped some detainee interrogations (see Spring-Late 2002). Hayden will later say he finds this out towards the end of his time as deputy director of national intelligence, a position he leaves in May 2006. Although the tapes were destroyed several months previously (see November 2005), Hayden will later say he is not aware of their destruction at this point: “I did not personally know before they were destroyed, not at all… I was aware of the existence of the tapes but really didn’t become focused on it until the summer of ‘06.” It appears that Hayden does not inform any congressional oversight committees of the destruction until 2007 (see March 14, 2007 and December 7, 2007), even though he becomes CIA director in the summer of 2006 (see May 5, 2006). [Associated Press, 12/12/2007; Fox News, 12/13/2007]

Entity Tags: Michael Hayden, Central Intelligence Agency

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Arthur Sulzberger.Arthur Sulzberger. [Source: New York Times]George W. Bush summons New York Times publisher Arthur Sulzberger and Times editor Bill Keller to the Oval Office to try to dissuade them from running a landmark story revealing the NSA’s illegal wiretapping program (see December 15, 2005) that he authorized in 2002 (see Early 2002). In the meeeting, Bush warns Sulzberger and Keller that “there’ll be blood on your hands” if another terrorist attack were to occur, obviously implying that to reveal the nature of the program would invite terrorist strikes. Bush is unsuccessful in his attempt to quash the story. [Newsweek, 12/21/2005; Newsweek, 12/22/2008]

Entity Tags: New York Times, Arthur Sulzberger, George W. Bush, National Security Agency, Bill Keller

Timeline Tags: Civil Liberties

According to an unnamed law enforcement official who works with the FBI and the National Counter Terrorism Center, the investigation into the SAAR network is still ongoing. However, only a small portion of the documents and computer files confiscated in a raid on the network in 2002 (see March 20, 2002) have been fully translated from Arabic into English. This official complains, “They don’t have the damn resources. They don’t have the language skills or computer forensic personnel to go through it all. And yet it’s a gold mine of information.” [FrontPage Magazine, 12/9/2005]

Entity Tags: Federal Bureau of Investigation, SAAR Foundation

Timeline Tags: Complete 911 Timeline

An FBI investigation into Jane Harman (D-CA), the ranking minority member of the House Intelligence Committee, is halted by Attorney General Alberto Gonzales, according to three former top national security officials. The investigation was to determine whether she agreed to use her influence on behalf of accused Israeli spies in return for Israeli support in being named chairman of the committee (see Summer 2005, October 2005 and December 2, 2006). In contrast to the former officials’ claims, the media will report that the investigation is ended due to “lack of evidence” of impropriety or illegal behavior on Harman’s part. However, according to the former officials, Gonzales wants Harman to help defend the administration’s warrantless wiretapping program, which is about to be revealed by a long-simmering New York Times story (see December 15, 2005). The evidence against Harman includes NSA wiretaps of a conversation between her and an Israeli agent. Reporter Jeff Stein will write, “As for there being ‘no evidence’ to support the FBI probe, a source with first-hand knowledge of the wiretaps called that ‘bull****.’” Another former national security officer will confirm Harman’s presence on the wiretaps. “It’s true,” the official will say. “She was on there.” Justice Department attorneys in the intelligence and public corruption units have concluded that Harman had committed what they called a “completed crime,” meaning there was evidence to show that she had attempted to complete it; they were prepared to open a case on her that would include wiretaps approved by the Foreign Intelligence Surveillance Court (FISC). CIA Director Porter Goss certified the FISA wiretapping request, and decided to inform House Speaker Dennis Hastert (R-IL) and ranking House Democrat Nancy Pelosi (D-CA) of the impending FBI investigation. At this point, say Stein’s sources, Gonzales intervenes to stop the investigation. Two officials with knowledge of the events will say that, in Gonzales’s words, he “needed Jane” to help support the warrantless wiretapping program once it became public knowledge. Gonzales tells Goss that Harman had helped persuade the Times to refrain from publishing the story in late 2004 (see Early November 2004, December 6, 2005, and Mid-2005), and although the Times would no longer wait on the story, Harman could be counted on to help defend the program. She will do just that (see December 21, 2005 and February 8-12, 2006). Hastert and Pelosi are never told of the FBI investigation. Stein will also learn that Goss’s successor, Michael Hayden, will later be informed of the potential investigation, but choose to take no action. Likewise, Director of National Intelligence John Negroponte will oppose any such investigation. Former officials who will pursue the Israeli espionage case for years will say, in Stein’s words, that “Harman dodged a bullet… [s]he was protected by an administration desperate for help.” A recently retired national security official closely involved in the investigation will add: “It’s the deepest kind of corruption. It’s a story about the corruption of government—not legal corruption necessarily, but ethical corruption.” [Congressional Quarterly, 4/19/2009]

Entity Tags: Jeff Stein, Federal Bureau of Investigation, Dennis Hastert, Alberto R. Gonzales, Foreign Intelligence Surveillance Court, Jane Harman, Michael Hayden, Porter J. Goss, John Negroponte, House Intelligence Committee, New York Times, Nancy Pelosi

Timeline Tags: Civil Liberties

New York Times headline from article revealing NSA surveillance.New York Times headline from article revealing NSA surveillance. [Source: CBS News]The New York Times reveals that after the 9/11 attacks, President Bush granted the National Security Agency (NSA) secret authorization to eavesdrop on Americans and others inside the US without going through the Foreign Intelligence Surveillance Act (FISA) court to obtain legal warrants (see Early 2002. The administration justifies its actions by claiming such eavesdropping, which includes wiretapping phones and reading e-mails, is necessary to find evidence of terrorist activities, and says the nation needs the program after the 9/11 attacks exposed deficiencies in the US intelligence community’s information gathering process, and because of what they characterize as the “handcuffing” of US intelligence agencies by restrictive laws. The Times has had the article for over a year; the White House prevailed on the Times not to publish its findings for that time, arguing that publication would jeopardize continuing investigations and warn potential terrorists that they were under scrutiny. Many believe that the White House wanted to delay the publication of the article until well after the 2004 presidential elections. The Times delayed publication for over a year, and agreed to suppress some information that administration officials say could be useful to terrorists. (Less than two weeks before the article is published, Bush tries to convince the Times not to print the article at all: see December 6, 2005.) Two days after the Times publishes its article, Bush will acknowledge the order, and accuse the Times of jeopardizing national security (see December 17, 2005). The NSA program eavesdrops without warrants on up to 500 people in the US at any given time, officials say; the overall numbers have likely reached into the thousands. Overseas, up to 7,000 people suspected of terrorist ties are being monitored. Officials point to the discovery of a plot by Ohio trucker and naturalized US citizen and alleged al-Qaeda supporter Iyman Faris to bring down the Brooklyn Bridge with blowtorches as evidence of the program’s efficacy. They also cite the disruption of an al-Qaeda plot to detonate fertilizer bombs outside of British pubs and train stations by the program. But, officials say, most people targeted by the NSA for warrantless wiretapping have never been charged with a crime, and many are targeted because of questionable evidence and groundless suspicion. Many raise an outcry against the program, including members of Congress, civil liberties groups, immigrant rights groups, and others who insist that the program undermines fundamental Constitutional protections of US citizens’ civil liberties and rights to privacy. Several other government programs to spy on Americans have been challenged, including the Federal Bureau of Investigation (FBI)‘s surveillance of US citizens’ library and Internet usage, the monitoring of peaceful antiwar protests, and the proposed use of public and private databases to hunt for terrorist links. In 2004, the Supreme Court overturned the administration’s claim that so-called “enemy detainees” were not entitled to judicial review of their indefinite detentions. Several senior officials say that when the warrantless wiretapping program began, it operated with few controls and almost no oversight outside of the NSA itself. The agency is not required to seek the approval of the Justice Department or anyone else outside the FISA court for its surveillance operations. Some NSA officials wanted nothing to do with a program they felt was patently illegal, according to a former senior Bush administration official. Internal concerns about the program prompted the Bush administration to briefly suspend the program while Justice Department officials audited it and eventually provided some guidelines for its operations. A complaint from Judge Colleen Kollar-Kotelly, the federal judge who oversees the FISA Court, helped spur the suspension, according to officials. Kollar-Kotelly questioned whether information obtained under the program was being improperly used as the basis for FISA wiretap warrant requests from the Justice Department. Some government lawyers say that the Justice Department may have deliberately misled Kollar-Kotelly and the FISA court about the program in order to keep the program under wraps. The judge insisted to Justice Department officials that any material gathered under the program not be used in seeking wiretap warrants from her court. The question also arose in the Faris case, when senior Justice Department officials worried that evidence obtained by warrantless wiretapping by the NSA of Faris could be used in court without having to lie to the court about its origins. [New York Times, 12/15/2005]

Entity Tags: US Supreme Court, George W. Bush, US Department of Justice, Iyman Faris, National Security Agency, New York Times, Al-Qaeda, Foreign Intelligence Surveillance Court, Colleen Kollar-Kotelly

Timeline Tags: Civil Liberties

Times executive editor Bill Keller.Times executive editor Bill Keller. [Source: New York Times]The New York Times’s executive editor, Bill Keller, defends his paper’s decision to reveal the Bush administration’s warrantless wiretapping program, conducted through the NSA (see December 15, 2005), after holding the story for over a year. Keller writes: “We start with the premise that a newspaper’s job is to publish information that is a matter of public interest. Clearly a secret policy reversal that gives an American intelligence agency discretion to monitor communications within the country is a matter of public interest.… A year ago, when this information first became known to Times reporters, the administration argued strongly that writing about this eavesdropping program would give terrorists clues about the vulnerability of their communications and would deprive the government of an effective tool for the protection of the country’s security. Officials also assured senior editors of The Times that a variety of legal checks had been imposed that satisfied everyone involved that the program raised no legal questions. As we have done before in rare instances when faced with a convincing national security argument, we agreed not to publish at that time. We also continued reporting, and in the ensuing months two things happened that changed our thinking. First, we developed a fuller picture of the concerns and misgivings that had been expressed during the life of the program. It is not our place to pass judgment on the legal or civil liberties questions involved in such a program, but it became clear those questions loomed larger within the government than we had previously understood. Second, in the course of subsequent reporting we satisfied ourselves that we could write about this program—withholding a number of technical details—in a way that would not expose any intelligence-gathering methods or capabilities that are not already on the public record. The fact that the government eavesdrops on those suspected of terrorist connections is well-known. The fact that the NSA can legally monitor communications within the United States with a warrant from the Foreign Intelligence Surveillance Court is also public information. What is new is that the NSA has for the past three years had the authority to eavesdrop on Americans and others inside the United States without a warrant. It is that expansion of authority—not the need for a robust anti-terror intelligence operation—that prompted debate within the government, and that is the subject of the article.” [CNN, 12/16/2005]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, George W. Bush, Bill Keller

Timeline Tags: Civil Liberties

After an NSA program to intercept telephone calls where one party is in the US and the other party is abroad is revealed (see December 15, 2005), President George Bush defends the program in a radio address. He justifies the program by implying that, if it had been in place before 9/11, it may have prevented the attacks: “As the 9/11 Commission pointed out, it was clear that terrorists inside the United States were communicating with terrorists abroad before the September the 11th attacks, and the commission criticized our nation’s inability to uncover links between terrorists here at home and terrorists abroad. Two of the terrorist hijackers who flew a jet into the Pentagon, Nawaf Alhazmi and Khalid Almihdhar, communicated while they were in the United States to other members of al-Qaeda who were overseas. But we didn’t know they were here until it was too late.” There are conflicting accounts of the circumstances of the hijackers’ calls and the NSA actually intercepted them, so it is unclear why they were not exploited to prevent the attacks (see Early 2000-Summer 2001, (Spring 2000), Summer 2002-Summer 2004, and March 15, 2004 and After). [WhiteHouse(.gov), 12/17/2005; US President, 12/26/2005 pdf file] It is unclear which statements of the 9/11 Commission the president thinks he is referring to. The Commission’s final report touches on the NSA intercepts of the hijackers’ calls from the US in two places; in one it says: “[T]he NSA was supposed to let the FBI know of any indication of crime, espionage, or ‘terrorist enterprise’ so that the FBI could obtain the appropriate warrant. Later in this story, we will learn that while the NSA had the technical capability to report on communications with suspected terrorist facilities in the Middle East, the NSA did not seek FISA Court warrants to collect communications between individuals in the United States and foreign countries, because it believed that this was an FBI role,” (note: we do not actually learn this later in the 9/11 Commission report, this is the only mention). The second passage refers to Almihdhar’s time in San Diego and does not actually mention that the NSA intercepted the relevant calls, “Almihdhar’s mind seems to have been with his family in Yemen, as evidenced by calls he made from the apartment telephone.” [9/11 Commission, 7/24/2004, pp. 87-8, 222]

Entity Tags: National Security Agency, Nawaf Alhazmi, George W. Bush, Khalid Almihdhar, 9/11 Commission

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

After the NSA’s warrantless wiretapping program is revealed (see Early 2002 and December 15, 2005), some commentators criticize the program. Americans have fundamental Constitutional protections that are enforceable in court whether their conversations are domestic or international, says law scholar Geoffrey Stone. Stone says that President Bush’s emphasis that NSA wiretapping only takes place on US calls to overseas phones or overseas e-mails “is no different, as far as the law is concerned, from saying we only do it on Tuesdays.” Former FBI national security law chief Michael Woods, who served in the position when Bush signed the NSA directive, calls the program “very dangerous.” Though Woods says the program was justifiable in the immediate aftermath of 9/11, “[By now] we ought to be past the time of emergency responses. We ought to have more considered views now…. We have time to debate a legal regime and what’s appropriate.” [Washington Post, 12/18/2005] Kate Martin, director of the Center for National Security Studies, says the secret order may amount to Bush authorizing criminal activity in direct violation of FISA. “This is as shocking a revelation as we have ever seen from the Bush administration,” she says. “It is, I believe, the first time a president has authorized government agencies to violate a specific criminal prohibition and eavesdrop on Americans.” The American Civil Liberties Union’s Caroline Frederickson says of the program, “It’s clear that the administration has been very willing to sacrifice civil liberties in its effort to exercise its authority on terrorism, to the extent that it authorizes criminal activity.” [Washington Post, 12/16/2005]

Entity Tags: Center for National Security Studies, Geoffrey Stone, American Civil Liberties Union, National Security Agency, Caroline Frederickson

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales and NSA chief Lieutenant General Michael Hayden conduct their own “briefing” on the recently revealed NSA wiretapping program (see December 15, 2005) with the White House press corps. Gonzales and Hayden make the following points:
bullet Gonzales says that he will not discuss the internal workings of the still-classified program, only what he calls its “legal underpinnings.”
bullet He claims that the program, which he calls “the most classified program that exists in the United States government,” is legal because President Bush authorized it, and says that the idea that “the United States is somehow spying on American citizens” is wrong: it is “[v]ery, very important to understand that one party to the communication has to be outside the United States.”
bullet He says that for the NSA to eavesdrop on a US citizen’s telephone or e-mail communications, “we have to have a reasonable basis to conclude that one party to the communication is a member of al-Qaeda, affiliated with al-Qaeda, or a member of an organization affiliated with al-Qaeda, or working in support of al-Qaeda.” The wiretapping program is an essential part of the administration’s war against terror, he says.
bullet He goes on to claim that “the authorization to use force, which was passed by the Congress in the days following September 11th, constitutes” legal grounds for “this kind of signals intelligence.” [White House, 12/19/2005] The White House signed Congress’s Authorization to Use Military Force (AUMF) into law on September 18, 2001 (see September 14-18, 2001. [White House, 9/18/2001]
Hayden Claims Supreme Court Backing - While he admits that the Congressional authorization to use force against international terrorism does not specifically mention any kind of electronic surveillance, he refers the listeners to the Supreme Court case concerning alleged US terrorist Yaser Esam Hamdi (see June 28, 2004), in which the Court ruled that Hamdi had the legal right to challenge his detention. “[T]he United States government took the position that Congress had authorized that detention in the authorization to use force, even though the authorization to use force never mentions the word ‘detention.’ And the Supreme Court, a plurality written by Justice O’Connor agreed. She said, it was clear and unmistakable that the Congress had authorized the detention of an American citizen captured on the battlefield as an enemy combatant for the remainder—the duration of the hostilities. So even though the authorization to use force did not mention the word, ‘detention,’ she felt that detention of enemy soldiers captured on the battlefield was a fundamental incident of waging war, and therefore, had been authorized by Congress when they used the words, ‘authorize the President to use all necessary and appropriate force.’ For the same reason, we believe signals intelligence is even more a fundamental incident of war, and we believe has been authorized by the Congress. And even though signals intelligence is not mentioned in the authorization to use force, we believe that the Court would apply the same reasoning to recognize the authorization by Congress to engage in this kind of electronic surveillance.”
Bush 'Very Concerned' With Protecting Civil Liberties - Gonzales insists, Bush “is very concerned about the protection of civil liberties, and that’s why we’ve got strict parameters, strict guidelines in place out at NSA to ensure that the program is operating in a way that is consistent with the President’s directives.” He adds, “[W]e feel comfortable that this surveillance is consistent with requirements of the Fourth Amendment. The touchstone of the Fourth Amendment is reasonableness, and the Supreme Court has long held that there are exceptions to the warrant requirement in—when special needs outside the law enforcement arena. And we think that that standard has been met here.”
Wiretapping Essential in Catching Terrorists - Hayden reiterates how important the wiretapping is to catching terrorists and stopping potential attacks against US targets, though he and Gonzales both refuse to say what, if any, terrorist plots or what terror suspects might have been captured through the NSA wiretapping program. Hayden does say, “This program has been successful in detecting and preventing attacks inside the United States.…I can say unequivocally, all right, that we have got information through this program that would not otherwise have been available,” though he refuses to cite specifics. He admits that there have been some errors in surveilling innocent US citizens, though he refuses to give any details, and says those errors were quickly corrected.
Administration Not Required to Go Through FISA - Gonzales, who is the main speaker in the briefing, reiterates that while the administration continues to seek warrants from the Foreign Intelligence Surveillance (FISA) court, “we are not legally required to do, in this particular case, because the law requires that we—FISA requires that we get a court order, unless authorized by a statute, and we believe that authorization has occurred.” He justifies the administration’s refusal to use the FISA court for obtaining warrants by insisting that NSA officials “tell me that we don’t have the speed and the agility that we need, in all circumstances, to deal with this new kind of enemy. You have to remember that FISA was passed by the Congress in 1978. There have been tremendous advances in technology… since then.” Hayden adds, “I don’t think anyone could claim that FISA was envisaged as a tool to cover armed enemy combatants in preparation for attacks inside the United States. And that’s what this authorization under the President is designed to help us do.”
'Balancing' of Civil Liberties, National Security - Hayden says the warrantless wiretapping program is part of “a balancing between security and liberty,” a more “aggressive” operation “than would be traditionally available under FISA. It is also less intrusive. It deals only with international calls. It is generally for far shorter periods of time. And it is not designed to collect reams of intelligence, but to detect and warn and prevent about attacks. And, therefore, that’s where we’ve decided to draw that balance between security and liberty.”
Media Leaks Damaging to National Security - Gonzales refuses to talk about when any members of Congress were briefed on the program or what they were told, but he does imply that there will be some sort of leak investigation as to how the New York Times found out about the program: “[T]his is really hurting national security, this has really hurt our country, and we are concerned that a very valuable tool has been compromised. As to whether or not there will be a leak investigation, we’ll just have to wait and see.”
No Evidence of Compromised National Security - When asked whether he can cite any evidence that the revelation of the program’s existence has actually compromised anything—“Don’t you assume that the other side thinks we’re listening to them? I mean, come on,” one reporter says—Gonzales responds, rather confusingly, “I think the existence of this program, the confirmation of the—I mean, the fact that this program exists, in my judgment, has compromised national security, as the President indicated on Saturday.”
Easier to Sidestep FISA Instead of Seek Congressional Approval - He does admit that the administration decided to sidestep the FISA court entirely instead of attempt to work with Congress to rewrite the FISA statutes because “we were advised that that would be difficult, if not impossible” to amend the law to the White House’s satisfaction. Gonzales says those who are concerned about the program being excessively intrusive or a threat to American civil liberties simply “don’t understand the specifics of the program, they don’t understand the strict safeguards within the program.… Part of the reason for this press brief today is to have you help us educate the American people and the American Congress about what we’re doing and the legal basis for what we’re doing.” He adds that any legal experts who believe the program is illegal are basing their judgments “on very limited information.”
Tough Questioning - One reporter asks an unusually tough series of questions to Gonzales: “Do you think the government has the right to break the law?”, to which Gonzales replies, “Absolutely not. I don’t believe anyone is above the law.” The reporter then says, “You have stretched this resolution for war into giving you carte blanche to do anything you want to do,” to which Gonzales replies cryptically, “Well, one might make that same argument in connection with detention of American citizens, which is far more intrusive than listening into a conversation.” The reporter insists, “You’re never supposed to spy on Americans,” and Gonzales deflects the responsibility for the decision back onto the Supreme Court.
Administration Will Tell Nation What It Needs to Know - Gonzales says the administration has no intention of releasing any of the classified legal opinions underpinning the program, and this press briefing is one of the methods by which the administration will “educat[e] the American people…and the Congress” to give them what they need to know about the program. [White House, 12/19/2005]

Entity Tags: White House press corps, Michael Hayden, Al-Qaeda, National Security Agency, Alberto R. Gonzales, George W. Bush, Foreign Intelligence Surveillance Court

Timeline Tags: Civil Liberties

DARPA logo.DARPA logo. [Source: Duke University]The computer and technology experts at Ars Technica, a well-regarded Web publication which describes itself as focusing on “the art of technology,” speculate on the technology behind the NSA warrantless wiretapping program recently revealed to the public (see December 15, 2005). The Ars Technica experts believe that Senator Jay Rockefeller (D-WV)‘s 2003 comparison between the program and the Total Information Awareness (TIA) project (see March 2002) is the most apt. They believe that the NSA wiretapping program may be built upon the foundation of a shadowy, highly classified surveillance program called Echelon. They write, “This system’s purpose would be to monitor communications and detect would-be terrorists and plots before they happen… This project is not interested in funding ‘evolutionary’ changes in technology, e.g., bit-step improvements to current data mining and storage techniques. Rather, the amount of data that the directors are anticipating (petabytes!) would require massive leaps in technology (and perhaps also some massive leaps in surveillance laws).” [Ars Technica, 12/20/2005; Ars Technica, 2007] Data storage measured in petabytes is a colossal capacity; a petabyte is 1,024 terabytes, and a single terabyte is 1,024 gigabytes, the usual measurement for hard drive capacity. [TechTerms, 2007] The Ars Technica experts continue, “According to DARPA, such data collection ‘increases information coverage by an order of magnitude,’ and ultimately ‘requires keeping track of individuals and understanding how they fit into models.’” They go on to note that the NSA wiretapping program was instituted shortly after the TIA project was quashed by Congress, and say they believe the NSA program is an extension and an outgrowth of TIA. They note that “the FBI requested the legal authorization to do very high-volume monitoring of digital calls” in 1995, that there is “no way for the judicial system to approve warrants for the number of calls that the FBI wanted to monitor,” and that the FBI “could never hire enough humans to be able to monitor that many calls simultaneously, which means that they’d have to use voice recognition technology to look for ‘hits’ that they could then follow up on with human wiretaps.” The Ars Technica experts believe the NSA is using “some kind of high-volume, automated voice recognition and pattern matching system,” employing a form of “smart filtering” that would weed through perhaps hundreds of thousands of computer-monitored calls and turning a fraction of those calls over to human analysts for evaluation: “[Y]es, this kind of real-time voice recognition, crude semantic parsing and pattern matching is doable with today’s technology, especially when you have a budget like the NSA.” In a follow-up, Ars Technica technology specialist and self-described conservative and “privacy nazi” Jon Stokes writes of his own concerns over the program, noting that the program is too wide-reaching and too blunt to actually catch many real terrorists, and that the program is a tremendous intrusion into Americans’ fundamental privacy: “The problem is not that such large-scale industrial fishing invariably catches a few dolphins along with the tuna, but that between 99.999 and 100 percent of what you’re going to get is dolphin.” Stokes also warns that such an intrusive surveillance program will not only violate privacy rights, but be quite ineffective: “As the TSA, with its strip-searching of people’s elderly grandparents, abundantly proves every holiday season, blunt instruments and scorched earth tactics are of dubious value in catching genuine bad actors. In fact, blunt instruments and wide nets are the easiest for professional bad guys to evade. All you need to beat such surveillance tools is patience and know-how.…Blunt instruments like airport facial recognition software and random subway bag searches produce much more noise than they do signal, and any engineer or computer scientist worth his or her salt will tell you that an intelligent, targeted, low-tech approach beats a brute-force high-tech approach every time. There is no high-tech substitute for human intelligence gathering. In fact…an overload of crudely processed information is actually more likely to lead an analyst astray than it is to produce any useful insight.…In the end, brute force security techniques are not only corrosive to democratic values but they’re also bad for national security. They waste massive resources that could be spent more effectively elsewhere, and they give governments and countries a false sense of security that a savvy enemy can exploit to devastating effect.…[I]t’s not just enough to have sound intelligence; you also need political leaders who have the wisdom to use that intelligence appropriately.” [Ars Technica, 12/20/2005]

Entity Tags: Transportation Safety Administration, Total Information Awareness, Federal Bureau of Investigation, John D. Rockefeller, Defense Advanced Research Projects Agency, Jon Stokes, National Security Agency

Timeline Tags: Civil Liberties

Jonathan Alter.Jonathan Alter. [Source: Publicity photo via Greater Talent Network]Reporter and political pundit Jonathan Alter writes that President Bush’s attempt to kill the New York Times domestic wiretapping story (see December 15, 2005 and December 6, 2005), which the Times delayed for over a year at the White House’s request, is not an attempt to protect national security, as Bush will say in his response to the article (see December 17, 2005), but “because he knew that it would reveal him as a law-breaker.” Alter continues, “He insists he had ‘legal authority derived from the Constitution and Congressional resolution authorizing force.’ But the Constitution explicitly requires the president to obey the law. And the post-9/11 congressional resolution authorizing ‘all necessary force’ in fighting terrorism was made in clear reference to military intervention. It did not scrap the Constitution and allow the president to do whatever he pleased in any area in the name of fighting terrorism.” Alter is puzzled that Bush felt the need for the program when the 1978 Foreign Intelligence Surveillance Act (see 1978) “allows the government to eavesdrop on its own, then retroactively justify it to the court, essentially obtaining a warrant after the fact.” Alter says that only four of “tens of thousands” of FISA requests have ever been rejected, and, “There was no indication the existing system was slow—as the president seemed to claim in his press conference—or in any way required extra-constitutional action.” He concludes: “[Bush] knew publication would cause him great embarrassment and trouble for the rest of his presidency. It was for that reason—and less out of genuine concern about national security—that George W. Bush tried so hard to kill the New York Times story. …We’re seeing clearly now that Bush thought 9/11 gave him license to act like a dictator, or in his own mind, no doubt, like Abraham Lincoln during the Civil War.” [Newsweek, 12/21/2005]

Entity Tags: Abraham Lincoln, Bush administration (43), National Security Agency, New York Times, George W. Bush, Foreign Intelligence Surveillance Court, Foreign Intelligence Surveillance Act, Jonathan Alter

Timeline Tags: Civil Liberties

Chart showing NSA surveillance network.Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” [New York Times, 12/24/2005]

Entity Tags: US Department of Defense, US Department of Justice, Total Information Awareness, New York Times, US Department of Homeland Security, Computer Assisted Passenger Prescreening System, Bush administration (43), Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, George W. Bush, National Security Agency, Phil Karn

Timeline Tags: Civil Liberties

Suzanne Spaulding, a former counsel for the CIA, the Senate and House intelligence commission, and executive director of the National Terrorism Commission from 1999 through 2000, writes an op-ed criticizing the Bush administration for its domestic surveillance program. She writes that the three main sources of oversight and restraint on Bush’s unfettered efforts to monitor US citizens—Congress, the judiciary, and the American people—have failed to halt what she calls “this extraordinary exercise of presidential power.” Spaulding, who will testify along similar lines before the Senate over a year later (see April 11, 2007), writes, “Ironically, if it is ultimately determined that this domestic surveillance program reflects the exercise of unchecked power in contravention of law, it will wind up weakening the presidency. Once again, we will confront the challenge of restoring Americans’ faith in the rule of law and our system of checks and balances.” The pretense of oversight by the administration, in providing limited and perhaps misleading briefings on the program only to the so-called “Gang of Eight” Congressional leaders, is superficial and ineffective, she writes; the entire process “effectively eliminates the possibility of any careful oversight.” She notes that because of the severe restrictions both in the information doled out to these Congressional leaders, and their strict prohibition on discussing the information with anyone else, even other intelligence panel members, “[i]t is virtually impossible for individual members of Congress, particularly members of the minority party, to take any effective action if they have concerns about what they have heard in one of these briefings. It is not realistic to expect them, working alone, to sort through complex legal issues, conduct the kind of factual investigation required for true oversight and develop an appropriate legislative response.” Congressional oversight is key to retaining the trust of the US citizenry, she writes, and adds that that particular principle was well understood at the CIA while she was there. Oversight “is vital for a secret agency operating in a democracy. True oversight helps clarify the authority under which intelligence professionals operate. And when risky operations are revealed, it is important to have members of Congress reassure the public that they have been overseeing the operation. The briefings reportedly provided on the National Security Agency (NSA) surveillance program reflect, instead, a ‘check the box’ mentality—allowing administration officials to claim that they had informed Congress without having really achieved the objectives of oversight.” While those few members of Congress are given little real information, the judiciary, particularly the Foreign Intelligence Surveillance Court (FISC), is cut out of the process entirely. “Instead of going to a judge on the secret court that was specifically established to authorize foreign intelligence surveillance inside the United States, we are told that an NSA shift supervisor was able to sign off on the warrantless surveillance of Americans,” she writes. “That’s neither a check nor a balance. The primary duty of the NSA shift supervisor, who essentially works for the president, is to collect intelligence. The task of the judge is to ensure that the legal standards set out in the 1978 Foreign Intelligence Surveillance Act (FISA) have been met. Which one has stronger independence to say no, if no needs to be said? The objectives of the surveillance program, as described in news reports, seem laudable. The government should be running to ground the contacts listed in a suspected terrorist’s cell phone, for example. What is troubling is that this domestic spying is being done in apparent contravention of FISA, for reasons that still are not clear.” In her piece she takes issue with the Bush administration’s insistence that its surveillance program is legal and necessary. She makes the following case:
Specious Arguments to Duck FISA Court - The argument that the FISA Court is too slow to respond to immediate needs for domestic surveillance is specious, she says. “FISA anticipates situations in which speed is essential. It allows the government to start eavesdropping without a court order and to keep it going for a maximum of three days. And while the FISA application process is often burdensome in routine cases, it can also move with remarkable speed when necessary, with applications written and approved in just a few hours.” Instead, she says that the Bush administration must have dodged FISC because their wiretaps didn’t meet FISA standards of probable cause. Since FISC is staffed by judges hand-picked by conservative then-Supreme Court Chief Justice William Rehnquist, “who presumably felt that they had the right temperament and expertise to understand the national security imperatives as well as the need to protect civil liberties,” and since FISC has granted all but four of the more than 5,645 requests for wiretaps and surveillance made by the administration since 2001, to argue that FISC is unresponsive is simply wrong-headed. And, she notes, if the administration felt that FISA’s standards were too strict, it could have moved to amend the law to allow more leniency in obtaining such warrants. It has not done so since the passage of the 2001 Patriot Act. She writes, “The administration reportedly did not think it could get an amendment without exposing details of the program. But this is not the first time the intelligence community has needed a change in the law to allow it to undertake sensitive intelligence activities that could not be disclosed. In the past, Congress and the administration have worked together to find a way to accomplish what was needed. It was never previously considered an option to simply decide that finding a legislative solution was too hard and that the executive branch could just ignore the law rather than fix it.”
No Justification for Keeping Program Secret - In addition, the administration has consistently failed to make a case for keeping the domestic wiretapping policy secret for four years. US-designated terrorist groups already know that the government listens to their cell phone conversations whenever possible, and they are well aware of the various publicly known programs to search through millions of electronic communications, such as the NSA’s Echelon program (see April 4, 2001). “So what do the terrorists learn from a general public discussion about the legal authority being relied upon to target their conversations?” she asks. “Presumably very little. What does the American public lose by not having the public discussion? We lose the opportunity to hold our elected leaders accountable for what they do on our behalf.”
Assertions that Program Authorized by Congress Fallacious - The argument advanced by Attorney General Alberto Gonzales that says the program does not violate the law because Congress’s post-9/11 authorization of force against terrorists gives the administration the right to circumvent FISA is equally specious, she argues. “FISA does provide for criminal penalties if surveillance is conducted under color of law ‘except as authorized by statute.’ This is a reference to either FISA or the criminal wiretap statute. A resolution, such as the Use of Force resolution, does not provide statutory authority. Moreover, FISA specifically provides for warrantless surveillance for up to 15 days after a declaration of war. Why would Congress include that provision if a mere Use of Force resolution could render FISA inapplicable? The law clearly states that the criminal wiretap statute and FISA are ‘the exclusive means by which electronic surveillance…and the interception of domestic wire, oral, and electronic communications may be conducted.’ If these authorities are exclusive, there is no other legal authority that can authorize warrantless surveillance. Courts generally will not view such a clear statutory statement as having been overruled by a later congressional action unless there is an equally clear indication that Congress intended to do that.” Therefore, by any legal standard, the administration’s program is, apparently, illegal.
No Inherent Presidential Authority - The ultimate argument by Bush officials, that the president has some sort of inherent authority as commander-in-chief to authorize illegal wiretaps, is the same groundless legal argument recently used to justify the use of torture by US intelligence and law enforcement agents (see December 28, 2001). That argument was withdrawn, Spaulding notes, after it became publicly known. While the courts have not specifically ruled on this particular argument, Spaulding notes that the Supreme Court refused to recognize then-President Harry Truman’s attempt to seize control of the nation’s steel mills to avert a possible strike during the Korean War. The Supreme Court ruled “that the president’s inherent authority is at its weakest in areas where Congress has already legislated. It ruled that to find inherent presidential authority when Congress has explicitly withheld that authority—as it has in FISA—‘is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between president and Congress.’” She notes that in 2004, the Supreme Court rejected the argument for unchecked presidential power in the Hamdi case (see June 28, 2004), with Justice Sandra Day O’Connor writing for the court, “We have long since made clear that a state of war is not a blank check for the president when it comes to the rights of the Nation’s citizens. …Whatever power the United States Constitution envisions for the Executive in its exchanges with… enemy organizations in times of conflict, it most assuredly envisions a role for all three branches when individual liberties are at stake.” Spaulding concludes, “The rule of law and our system of checks and balances are not a source of weakness or a luxury of peace. As O’Connor reminded us in Hamdi, ‘It is during our most challenging and uncertain moments…that we must preserve our commitment at home to the principles for which we fight abroad.’” [Washington Post, 12/25/2005]

Entity Tags: Sandra Day O’Connor, William Rehnquist, USA Patriot Act, Suzanne Spaulding, National Security Agency, US Supreme Court, Harry S. Truman, Alberto R. Gonzales, “Gang of Eight”, National Commission on Terrorism, Central Intelligence Agency, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Echelon, Bush administration (43)

Timeline Tags: Civil Liberties

After months of opposition and a recent, clandestine rewriting of the bill (see Before December 30, 2005), President Bush signs the Detainee Treatment Act (DTA) into law, effectively outlawing torture by government and military officials (see December 15, 2005). However, Bush also inserts a signing statement into the record reserving for himself the right to ignore the law under his powers as commander in chief if he judges that torturing a prisoner is in the interest of national security (see December 30, 2005). Signing statements have no legal status, but serve to inform the nation as to how the president interprets a particular law. In this case, Bush writes that he will waive the restrictions on torture if he feels it is necessary to protect national security. “We consider ourselves bound by the prohibition on cruel, unusual, and degrading treatment,” says a senior administration official, but under unusual circumstances—a “ticking time bomb” scenario, for example, where a detainee is believed to have information that could prevent an imminent terrorist attack, Bush’s responsibility to protect the nation will supersede the law. Law professor David Golove is critical of the White House’s position, saying: “The signing statement is saying ‘I will only comply with this law when I want to, and if something arises in the war on terrorism where I think it’s important to torture or engage in cruel, inhuman, and degrading conduct, I have the authority to do so and nothing in this law is going to stop me.’ They don’t want to come out and say it directly because it doesn’t sound very nice, but it’s unmistakable to anyone who has been following what’s going on.” Bush has issued numerous signing statements signaling his intent to flaunt the law in the areas of domestic surveillance, detaining terrorist suspects without due legal process, and previous legislation forbidding the torture of prisoners. Many legal and civil rights organizations believe that Bush’s signing statement is part of his push for a “unitary executive,” where the president has virtually unlimited powers in the areas of foreign policy and national security, and neither Congress nor the courts have the right to limit his powers (see April 30, 1986). Former Justice Department official and law professor Marty Lederman says: “The whole point of the McCain Amendment was to close every loophole. The president has re-opened the loophole by asserting the constitutional authority to act in violation of the statute where it would assist in the war on terrorism.” Human Rights Watch director Elisa Massamino calls the signing statement an “in-your-face affront” to both McCain and to Congress. “The basic civics lesson that there are three co-equal branches of government that provide checks and balances on each other is being fundamentally rejected by this executive branch. Congress is trying to flex its muscle to provide those checks [on detainee abuse], and it’s being told through the signing statement that it’s impotent. It’s quite a radical view.” [Boston Globe, 1/4/2006; Boston Globe, 4/30/2006]

Entity Tags: George W. Bush, Detainee Treatment Act, Martin (“Marty”) Lederman, Bush administration (43), David Golove, Elisa Massamino

Timeline Tags: Torture of US Captives, Civil Liberties

According to authors Joe and Susan Trento, writing in 2006, the CIA places employees undercover with both airlines and the Federal Air Marshal Service, as a part of a program to allow known terrorists to keep flying (see May 2006). The undercover employees allow the CIA to control arrangements when it wants a terrorist to fly openly without the airlines’ or Marshal Service’s knowledge. [Trento and Trento, 2006, pp. 194] One example of this is travel in 2006 by Rayed Abdullah, an associate of alleged 9/11 pilot Hani Hanjour. Abdullah is allowed to fly to New Zealand for flight training in the hope he will meet al-Qaeda operatives, who will then be put under surveillance (see February-May 30, 2006).

Entity Tags: Joseph Trento, Federal Air Marshal Service, Susan Trento, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

After 9/11 there was much discussion about how hijackers Nawaf Alhazmi and Khalid Almihdhar were able to participate in an operation like 9/11, even though they were well known to US intelligence (see, for example, January 5-8, 2000, Early 2000-Summer 2001, and 9:53 p.m. September 11, 2001).
FBI Theory - Based on conversations with FBI agents, author Lawrence Wright speculates on why the CIA withheld information it should have given the FBI: “Some… members of the [FBI’s] I-49 squad would later come to believe that the [CIA] was shielding Almihdhar and Alhazmi because it hoped to recruit them.… [They] must have seemed like attractive opportunities; however, once they entered the United States they were the province of the FBI. The CIA has no legal authority to operate inside the country, although in fact, the bureau often caught the agency running backdoor operations in the United States.… It is also possible, as some FBI investigators suspect, the CIA was running a joint venture with Saudi intelligence in order to get around that restriction. Of course, it is also illegal for foreign intelligence services to operate in the United States, but they do so routinely.” [Wright, 2006, pp. 312-313]
Explanation of Acquired Visas - This theory offers a possible explanation, for example, of how Almihdhar and Alhazmi managed to move in and out of Saudi Arabia and obtain US visas there even though they were supposedly on the Saudi watch list (see 1997 and April 3-7, 1999), and why a Saudi agent in the US associated with them (see January 15-February 2000). Wright points out that “these are only theories” but still notes that “[h]alf the guys in the Bureau think CIA was trying to turn them to get inside al-Qaeda.” [Wright, 2006, pp. 313; Media Channel, 9/5/2006]
Participant Does Not Know - Doug Miller, an FBI agent loaned to the CIA who was part of a plot to withhold the information from the FBI (see 9:30 a.m. - 4:00 p.m. January 5, 2000), will indicate he does not know why he was ordered to withhold the information, but that his superiors may have had a good reason for keeping it from the FBI. Another intelligence source will claim that the CIA withheld the information to keep the FBI away from a sensitive operation to penetrate al-Qaeda. [Congressional Quarterly, 10/1/2008]
CIA Wanted to Keep FBI Off Case - Another unnamed FBI agent loaned to Alec Station before 9/11 will say: “They didn’t want the bureau meddling in their business—that’s why they didn’t tell the FBI. Alec Station… purposely hid from the FBI, purposely refused to tell the bureau that they were following a man in Malaysia who had a visa to come to America. The thing was, they didn’t want… the FBI running over their case.” [Bamford, 2008, pp. 20]
Similar Explanation - Wright is not the first to have made the suggestion that Alhazmi and Almihdhar were protected for recruitment purposes. Investigative journalist Joe Trento reported in 2003 that a former US intelligence official had told him that Alhazmi and Almihdhar were already Saudi Arabian intelligence agents when they entered the US (see August 6, 2003).

Entity Tags: Nawaf Alhazmi, Lawrence Wright, Doug Miller, Saudi General Intelligence Directorate, Central Intelligence Agency, Khalid Almihdhar, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Vice President Cheney mentioned NSA intercepts of the 9/11 hijackers’ calls in a speech to the Heritage Foundation.Vice President Cheney mentioned NSA intercepts of the 9/11 hijackers’ calls in a speech to the Heritage Foundation. [Source: David Bohrer / White House]Vice President Dick Cheney uses calls between the 9/11 hijackers in the US and an al-Qaeda communications hub in Yemen that were intercepted by the NSA (see Early 2000-Summer 2001) to justify the NSA’s warrantless wiretapping program (see December 15, 2005). Cheney points out that, “There are no communications more important to the safety of the United States than those related to al-Qaeda that have one end in the United States,” and says that if the NSA’s warrantless program had been implemented before 9/11, “we might have been able to pick up on two hijackers [Nawaf Alhazmi and Khalid Almihdhar] who subsequently flew a jet into the Pentagon.” He adds: “They were in the United States, communicating with al-Qaeda associates overseas. But we did not know they were here plotting until it was too late.” [White House, 1/4/2006] Other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the program is revealed by the New York Times (see December 17, 2005).

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi, Richard (“Dick”) Cheney

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

President Bush’s rationale for authorizing warrantless surveillance against US citizens is of questionable legality and “may represent an exercise of presidential power at its lowest ebb,” according to a Congressional analysis. The Congressional Research Service (CRS), the independent and nonpartisan research bureau of the legislature, answers the question raised around the nation since the revelation of the secret program by the New York Times (see Early 2002): did Bush break the law when he ordered the National Security Agency to eavesdrop on US citizens without court orders or judicial oversight? The CRS report does not give a definitive yes or no answer to that question, but finds Bush’s legal rationale dubious at best. That rationale “does not seem to be as well-grounded” as administration lawyers have claimed, and the report finds that, despite assertions to the contrary by Bush and administration officials, Congress did not authorize warrantless wiretaps when it gave the executive branch the authority to wage war against al-Qaeda in the days after the 9/11 attacks. Unsurprisingly, Bush administration officials criticize the report. But some Republicans and Democrats find the report’s conclusions persuasive, and hold up the report as further evidence that Bush overextended his authority by authorizing the wiretaps. For instance, Republican Thomas Kean, the former chairman of the 9/11 commission (see January 27, 2003, says he doubts the program’s legality. Kean, who has not spoken publicly about the program until now, says the 9/11 commission was never told about the program, and he strongly doubts its legality. “We live by a system of checks and balances, and I think we ought to continue to live by a system of checks and balances,” Kean says. [Congressional Research Service, 1/5/2006 pdf file; New York Times, 1/6/2006]

Entity Tags: George W. Bush, 9/11 Commission, Congressional Research Service, New York Times, National Security Agency, Thomas Kean

Timeline Tags: Civil Liberties

John Yoo’s ‘The Powers of War and Peace.’John Yoo’s ‘The Powers of War and Peace.’ [Source: University of Maryland]Libertarian law professor Cass Sunstein reviews a recent book by former Bush legal adviser John Yoo, who authored several of the Bush administration’s most controversial legal opinions concerning terrorism and executive power (see September 21, 2001, September 25, 2001, September 25, 2001, October 4, 2001, October 23, 2001, October 23, 2001, November 2, 2001, November 6-10, 2001, November 15, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24, 2002, January 24-26, 2002, March 13, 2002, April 8, 2002, June 27, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and October 11, 2002). Yoo’s book, The Powers of War and Peace: The Constitution and Foreign Affairs After 9/11, is a compendium of his pre-9/11 academic writings that landed him his job at the Justice Department’s Office of Legal Counsel. Sunstein notes that Yoo, perhaps more than any other single legal scholar, has reshaped the government’s legal stance on any number of issues. He argued for the president’s unilateral ability to declare war without the approval of Congress, the use of “enhanced interrogation techniques” on suspected terrorists, the withdrawal of essential civil liberties and legal rights from suspected terrorists and enemy collaborators, the right of the administration to electronically eavesdrop on the American citizenry without judicial consent or oversight, the ability to ignore or withdraw from international treaties without congressional approval, and more besides. Sunstein writes: “[T]aken as a whole, the claims of the Bush administration may be properly regarded as an effort to create a distinctive set of constitutional understandings for the post-September 11 era. The White House is attempting to create a kind of 9/11 Constitution. A defining feature of these understandings is a strong commitment to inherent presidential authority over national security, including a belief that in crucial domains the president can act without congressional permission, and indeed cannot be checked by congressional prohibitions.” Yoo is a key figure in that effort. Sunstein calls his work interesting but completely one-sided, simply ignoring “the mountainous counter-evidence” against most of his constitutional claims. “Yoo’s reading would require us to ignore far too many statements by prominent figures in the founding generation,” Sunstein writes. “There are not many issues on which James Madison, Thomas Jefferson, John Marshall, Alexander Hamilton, George Washington, James Wilson, John Adams, and Pierce Butler can be said to agree. Were all of them wrong?” Sunstein concludes: “[W]ith respect to war, there is no reason for a 9/11 Constitution. The old one, read in the light of our traditions, will do just fine.” [New Republic, 1/9/2006; Savage, 2007, pp. 81-82]

Entity Tags: Bush administration (43), Office of Legal Counsel (DOJ), John C. Yoo, Cass Sunstein

Timeline Tags: Civil Liberties

After Human Rights Watch, an organization which works to end torture of government detainees around the globe, claims that the Bush administration has made a “deliberate policy choice” to abuse detainees at Guantanamo Bay, Defense Secretary Donald Rumsfeld says, “What took place at Guantanamo is a matter of public record today, and the investigations turned up nothing that suggested that there was any policy in the department other than humane treatment.” In 2002, President Bush declared that detainees in US custody should be treated “humanely, and to the extent appropriate and consistent with military necessity, in a manner consistent with the principles” of the Geneva Conventions (see January 19, 2002). Shortly after Rumsfeld’s statement, White House press secretary Scott McClellan says that Human Rights Watch has damaged its own credibility by making such claims. [New Yorker, 2/27/2006]

Entity Tags: Donald Rumsfeld, Bush administration (43), Human Rights Watch, Scott McClellan, George W. Bush, Geneva Conventions

Timeline Tags: Torture of US Captives, Civil Liberties

A federal appeals court refuses to block the forced redeployment of a California National Guardsman under the Army’s so-called “stop-loss” program (see August 2004). The appeals court finds that the right of the plaintiff, known for purposes of the lawsuit as “John Doe,” were not violated. “[T]he ‘stop-loss’ order extending Doe’s enlistment is a valid exercise of presidential power” authorized by a federal law, and that law neither violates the Fifth Amendment’s requirement of due process of law nor is an improper delegation of congressional power,” writes Circuit Judge Stephen Trott in a unanimous three-judge opinion. Trott also finds that the “stop-loss” order does not conflict with other sections of federal law, and even if it did, it would override such laws. The appeals court upholds a similar finding of a lower court from March 2005. Doe’s attorney, Michael Sorgen, had argued that without a Congressional declaration of war, the president’s power to force soldiers to serve indefinitely violates the Constitutional separation of powers. [Oakland Tribune, 1/14/2006]

Entity Tags: Stephen Trott, ’John Doe’, Michael Sorgen, California National Guard

Timeline Tags: US Military, Iraq under US Occupation

It had been widely reported that the Saudi government began to crack down seriously on al-Qaeda and other radical militants after a 2003 al-Qaeda attack in Saudi Arabia (see May 12, 2003). However, the Los Angeles Times reports that US officials now claim that is not true. While Saudis have been very aggressive and cooperative in cracking down on militants within Saudi Arabia since that attack, they have done little outside the country. Millions of dollars continue to flow from wealthy Saudis through charity fronts to al-Qaeda and other suspected groups, and the Saudi government is doing next to nothing about it. In 2004, the Saudis promised to set up a government commission to police such groups, but they have yet to do so. The Saudi government has also done little to rein in influential radical religious leaders who openly encourage their followers to attack US interests in Iraq and elsewhere in the world. US officials claim that at least five organizations, including the Muslim World League (MWL), the International Islamic Relief Organization (IIRO), and the World Assembly of Muslim Youth (WML), “are headquartered in Saudi Arabia but continue to engage in highly suspect activity overseas.” A senior US counterterrorism official says that some known terrorist financiers continue to “operate and live comfortably in Saudi Arabia” despite US objections. [Los Angeles Times, 1/15/2006]

Entity Tags: Saudi Arabia, International Islamic Relief Organization, Muslim World League, World Assembly of Muslim Youth

Timeline Tags: Complete 911 Timeline

Al Gore speaks to the Liberty Coalition and the American Constitution Society.Al Gore speaks to the Liberty Coalition and the American Constitution Society. [Source: American Constitution Society]Former Vice President Al Gore delivers a long, impassioned speech on civil liberties and constitutional issues to the Liberty Coalition and the American Constitution Society. Gore joins former Representative Bob Barr (R-GA) in speaking out against the Bush administration’s infringement on American civil liberties. Gore and Barr have what Gore calls a “shared concern that America’s Constitution is in grave danger.”
Patently Illegal Domestic Surveillance - Gore’s speech is sparked by recent revelations that the NSA has been spying on American citizens for years (see December 15, 2005), and in response, the administration “has brazenly declared that it has the unilateral right to continue without regard to the established law enacted by Congress precisely to prevent such abuses.” As the Foreign Intelligence and Surveillance Act (FISA) is perfectly sufficient, there was no need for the Bush administration to circumvent that law. “At present, we still have much to learn about the NSA’s domestic surveillance,” Gore says. “What we do know about this pervasive wiretapping virtually compels the conclusion that the president of the United States has been breaking the law, repeatedly and insistently. A president who breaks the law is a threat to the very structure of our government.” Gore says he agrees with Bush on the threat of terrorism, but disagrees that the US has to “break the law or sacrifice our system of government” to protect itself, as this will make it “weaker and more vulnerable.” In addition, he says, “once violated, the rule of law is itself in danger,” and, “Unless stopped, lawlessness grows, the greater the power of the executive grows, the more difficult it becomes for the other branches to perform their constitutional roles.” It is patently obvious that the Bush administration has broken the law in conducting and approving its warrantless wiretaps, Gore says, regardless of what arguments and defenses administration officials may put forth (see September 12-18, 2001 and Early 2002). So, Gore says, “When President Bush failed to convince Congress to give him the power he wanted when this measure was passed, he secretly assumed that power anyway, as if Congressional authorization was a useless bother. But as [Supreme Court] Justice [Felix] Frankfurter once wrote, ‘To find authority so explicitly withheld is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between the president and the Congress.‘… And the disrespect embodied in these apparent mass violations of the law is part of a larger pattern of seeming indifference to the Constitution that is deeply troubling to millions of Americans in both political parties.”
Illegal Seizure of American Citizens - Gore notes that Bush has declared that he has “a heretofore unrecognized inherent power to seize and imprison any American citizen that he alone determines to be a threat to our nation, and that notwithstanding his American citizenship that person in prison has no right to talk with a lawyer, even if he wants to argue that the president or his appointees have made a mistake and imprisoned the wrong person” (see November 13, 2001 and March 5, 2002). He says: “The president claims that he can imprison that American citizen—any American citizen he chooses—indefinitely, for the rest of his life, without even an arrest warrant, without notifying them of what charges have been filed against them, without even informing their families that they have been imprisoned.” Gore then says: “No such right exists in the America that you and I know and love. It is foreign to our Constitution. It must be rejected.”
Specious Authority to Torture - Neither does the executive branch have the right to authorize torture, Gore says. After citing horrific examples from Guantanamo and Abu Ghraib, he calls it “a shameful exercise of power that overturns a set of principles that you’re nation has observed since General George Washington first enunciated them during our Revolutionary War. They have been observed by every president since then until now. They violate the Geneva Conventions, the International Convention Against Torture, and our own laws against torture.”
Unlawful Kidnapping of Foreign Citizens - The president has no right to have foreign citizens kidnapped from their homes and brought to the US for interrogation and imprisonment, or worse, delivered to other nations for harsh interrogations and torture, says Gore. The closest allies of the US have been shocked by such claims.
No Restraint in the Constitution? - Gore asks whether the president really has such powers under the Constitution and, if so, “are there any acts that can on their face be prohibited?” He quotes the dean of Yale’s law school, Harold Koh, who said, “If the president has commander in chief power to commit torture, he has the power to commit genocide, to sanction slavery, to promote apartheid, to license summary execution.” Gore is “deeply troubl[ed]” that “our normal American safeguards have thus far failed to contain this unprecedented expansion of executive power.” He cites the numerous usage of “signing statements” by Bush that signal his intent “not to comply” with particular legislation (see December 30, 2005). When the Supreme Court struck down Bush’s indefinite detention of “enemy combatants” (see June 28, 2004), “the president then engaged in legal maneuvers designed to prevent the court from providing any meaningful content to the rights of the citizens affected.”
Historical Cycles - Since the founding of America, Gore says, the country has abrogated its citizens’ rights in one circumstance or another, and cites numerous examples. But those abrogations were always rectified to some degree in a repeated cycle of what he calls “excess and regret.” Gore is worried that the country may not be in such a cycle now. Instead, he says, the US may be on a path to permanent, state-sanctioned authoritarianism, with the constitutional safeguards American citizens have come to expect eroded and undermined to the point of irretrievability. Gore specifically cites the administration’s support for the so-called “unitary executive” theory of government, which he says “ought to be more accurately described as the unilateral executive.” That theory “threatens to expand the president’s powers until the contours of the Constitution that the framers actually gave us become obliterated beyond all recognition.”
Stark Authoritarianism - Why are Bush and his top officials doing this? Gore says that “[t]he common denominator seems to be based on an instinct to intimidate and control. The same pattern has characterized the effort to silence dissenting views within the executive branch, to censor information that may be inconsistent with its stated ideological goals, and to demand conformity from all executive branch employees.” Gore continues: “Intellectually, it is possible to carry on this process for an indefinite time. The only check on it is that, sooner or later, a false belief bumps up against solid reality, usually on a battlefield. Two thousand two hundred American soldiers have lost their lives as this false belief bumped into a solid reality.”
Gutting Congress - Though serious damage has been done to the judicial branch, Gore acknowledges, “the most serious damage in our constitutional framework has been to the legislative branch. The sharp decline of Congressional power and autonomy in recent years has been almost as shocking as the efforts by the executive to attain this massive expansion of its power.… [T]he legislative branch of government as a whole, under its current leadership, now operates as if it were entirely subservient to the executive branch.… [T]he whole process is largely controlled by the incumbent president and his political organization” (see February 1, 2004). Gore says each member of Congress, Republican and Democrat, must “uphold your oath of office and defend the Constitution. Stop going along to get along. Start acting like the independent and co-equal branch of American government that you are supposed to be under the Constitution of our country.”
We the People - The American people still, for the moment, have the power to enforce the Constitution, Gore says, quoting former President Dwight Eisenhower, who said, “Any who act as if freedom’s defenses are to be found in suppression and suspicion and fear confess a doctrine that is alien to America.” Gore continues: “Fear drives out reason. Fear suppresses the politics of discourse and opens the door to the politics of destruction.… The founders of our country faced dire threats. If they failed in their endeavors, they would have been hung as traitors. The very existence of our country was at risk. Yet in the teeth of those dangers, they insisted on establishing the full Bill of Rights. Is our Congress today in more danger than were their predecessors when the British army was marching on the Capitol? Is the world more dangerous than when we faced an ideological enemy with tens of thousands of nuclear missiles ready to be launched on a moment’s notice to completely annihilate the country?” [Congressional Quarterly, 1/16/2006; American Constitutional Society, 1/16/2006]

Entity Tags: National Security Agency, Liberty Coalition, US Supreme Court, Harold Koh, George W. Bush, Albert Arnold (“Al”) Gore, Jr., American Constitution Society, Bush administration (43), Convention Against Torture, Felix Frankfurter, George Washington, Geneva Conventions, Foreign Intelligence Surveillance Act, Robert “Bob” Barr

Timeline Tags: Civil Liberties

Journalist and columnist Joshua Micah Marshall says of former Vice President Al Gore’s speech on civil liberties the previous day (see January 16, 2006): “The point Gore makes in his speech that I think is most key is the connection between authoritarianism, official secrecy, and incompetence. The president’s critics are always accusing him of law-breaking or unconstitutional acts and then also berating the incompetence of his governance. And it’s often treated as, well… he’s power-hungry and incompetent to boot! Imagine that! The point though is that they are directly connected. Authoritarianism and secrecy breed incompetence; the two feed on each other. It’s a vicious cycle. Governments with authoritarian tendencies point to what is in fact their own incompetence as the rationale for giving them yet more power.… The basic structure of our Republic really is in danger from a president who militantly insists that he is above the law.” [Dean, 2006, pp. 170-171; Talking Points Memo, 1/17/2006]

Entity Tags: Albert Arnold (“Al”) Gore, Jr., George W. Bush, Joshua Micah Marshall

Timeline Tags: Civil Liberties

A memo from the nonpartisan Congressional Research Service (CRS) finds that President Bush appears to be in violation of the National Security Act of 1947 in his practice of briefing only select members of Congress on the National Security Agency’s warrantless wiretapping program. Bush has provided only limited briefings to the so-called “Gang of Eight,” the four Congressional leaders and the four ranking members of the House and Senate Intelligence Committees. But the 1947 law requires the US intelligence community to brief the full membership of both committees on the program. The memo is the result of a request by Representative Jane Harman (D-CA), who wrote Bush a letter saying that she believes he is required under the Act to brief both committees, and not just the Gang of Eight (see January 4, 2006). The White House claims that it has briefed Congressional leaders about the program over a dozen times, but refuses to provide details; the Congressional members so briefed are forbidden by law to discuss the content or nature of those classified briefings, even with their own staff members. “We believe that Congress was appropriately briefed,” says White House spokeswoman Dana Perino. The CRS agrees with Harman that the single exception to such full briefings under the law, covert actions taken under extraordinary threats to national security, is not applicable in this instance. Unless the White House contends the program is a covert action, the memo says, “limiting congressional notification of the NSA program to the Gang of Eight…would appear to be inconsistent with the law.” [US House of Representatives, 1/4/2006; Congressional Research Service, 1/18/2006 pdf file; Washington Post, 1/19/2006] The day after the CRS memo is released, Senate Democrats John D. Rockefeller (D-WV) and Harry Reid (D-NV), along with House Minority Leader Nancy Pelosi (D-CA) and Harman, the ranking member of the House Intelligence Committee, write to Vice President Dick Cheney demanding that the full committees be briefed on such intelligence matters in the future. [Washington Post, 1/20/2006] On February 9, Bush will allow Attorney General Alberto Gonzales and former NSA chief Michael Hayden to brief the full House Intelligence Committee on the program (see February 8-17, 2006).

Entity Tags: Jane Harman, John D. Rockefeller, National Security Agency, National Security Act, Richard (“Dick”) Cheney, Michael Hayden, House Intelligence Committee, George W. Bush, Dana Perino, “Gang of Eight”, Alberto R. Gonzales, Harry Reid, Congressional Research Service, Bush administration (43)

Timeline Tags: Civil Liberties

The Justice Department (DOJ) issues a 42-page “white paper” detailing its arguments that the National Security Agency’s warrantless wiretapping program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006) is legal. The DOJ reiterates two previous arguments (see December 19, 2005 and December 21-22, 2005)—that Congress implicitly authorized the program in 2001 when it authorized the Bush administration to begin military actions against al-Qaeda (see September 14-18, 2001), and that the president has the authority as commander in chief to conduct such a program—even though these arguments have been thoroughly refuted (see January 9, 2006) and overridden by the Supreme Court’s recent Hamdan v. Rumsfeld ruling (see December 15, 2005 and July 8, 2006). In its paper, the DOJ declares that if necessary, it will attack the legality of the Foreign Intelligence Surveillance Act (FISA) in order to stop that law from “imped[ing]” the president’s power to order domestic surveillance. In essence, according to columnist and civil liberties lawyer Glenn Greenwald, the DOJ is asserting that the president’s powers are limitless as long as he or she declares a given action necessary to battle terrorism. “Because the president has determined that the NSA activities are necessary to the defense of the United States from a subsequent terrorist attack in the armed conflict with al-Qaeda, FISA would impermissibly interfere with the president’s most solemn constitutional obligation—to defend the United States against foreign attack,” the DOJ claims. Neither Congress nor the court system has the right to limit or even review the president’s powers, according to the DOJ. Greenwald calls the DOJ’s argument “a naked theory of limitless presidential power.” In fact, Greenwald argues, the DOJ is asserting that FISA itself is unconstitutional, because no law can in any way limit the president’s power to conduct foreign policy or protect the nation’s security. The document is part of a larger Bush administration defense of the USA Patriot Act, and part of the administration’s push to convince Congress to reauthorize that legislation. Attorney General Alberto Gonzales sends the document to Congress. Justice Department official Steven Bradbury says, “When it comes to responding to external threats to the country… the government would like to have a single executive who could act nimbly and agilely.” [US Department of Justice, 1/19/2006 pdf file; Glenn Greenwald, 1/20/2006; Washington Post, 1/20/2006]
Dubious Legality - The program has already been found to be of questionable legality by two reports recently released by the nonpartisan Congressional Research Service (see January 5, 2006 and January 18, 2006). And author James Bamford, a US intelligence expert who has written extensively about the NSA, says that the Justice Department’s arguments are specious in light of Congress’s clear intent in its 1978 passage of FISA to block warrantless wiretapping, and its demonstrated lack of intent to allow any such operations within US borders in the October 2001 legislation. “You could review the entire legislative history in the authorization to use military force and I guarantee you won’t find one word about electronic surveillance,” he says. “If you review the legislative history of FISA, you will find Attorney General Griffin Bell testifying before the intelligence committee saying this was specifically passed to prevent a president from claiming inherent presidential powers to do this again.” [Washington Post, 1/20/2006]
Self-Contradictory Justifications - In 2007, author and reporter Charlie Savage will write of the “shaky foundation” supporting the administration’s “two-pronged attacks on critics of the wiretapping program and the Patriot Act,” which some officials have claimed authorizes the program. “Beneath the simplistic rhetoric, the administration’s position was self-contradicting,” Savage will write. If Bush has the inherent presidential authority to order warrantless wiretapping, then he needs no authorization from the Patriot Act or any other legislation. But if Congress is endangering the nation by delaying in reauthorizing the Patriot Act and thusly not rendering the program legal, then the wiretapping program is illegal after all. The memo attempts to “paper… over” this problem by claiming that, while Bush has the inherent authority to do whatever he feels is necessary to protect the country, the Patriot Act’s extra police powers are still necessary in “contexts unrelated to terrorism.” Savage will write, “In other words, the administration’s own position, hidden in the fine print, was that the Patriot Act was superfluous and irrelevant to the war on terrorism—a somewhat absurd stance made necessary by their desire to say the wiretapping program was legal.” [Savage, 2007, pp. 315]
Failure to Address Probable Beginning of Program Before Attacks - The Justice Department says nothing about the program apparently beginning well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, James Bamford, Steven Bradbury, US Department of Justice, Griffin Bell, Senate Judiciary Committee, Glenn Greenwald, Foreign Intelligence Surveillance Act, Alberto R. Gonzales, Arlen Specter, George W. Bush, Congressional Research Service, Charlie Savage

Timeline Tags: Civil Liberties

President Bush’s top political adviser, deputy White House chief of staff Karl Rove, tells a meeting of the Republican National Committee that the warrantless wiretapping controversy (see December 15, 2005 and December 18, 2005) can be used to boost Republicans’ election chances in the 2006 midterm elections. Republicans should emphasize that the wiretapping proves that Bush is willing to do whatever it takes to defeat terrorism and keep Americans safe. Critics of the program, therefore, can be painted as weak on terrorism. “The United States faces a ruthless enemy, and we need a commander in chief and a Congress who understand the nature of the threat and the gravity of the moment America finds itself in,” Rove says. “President Bush and the Republican Party do; unfortunately, the same cannot be said of many Democrats.… Let me be clear as I can be: President Bush believes if al-Qaeda is calling somebody in America, it is in our national security interests to know who they’re calling and why. Some important Democrats clearly disagree.” [WIS-TV, 1/20/2006; Savage, 2007, pp. 203]

Entity Tags: George W. Bush, Democratic Party, Republican Party, Republican National Committee, Karl C. Rove

Timeline Tags: Civil Liberties

Deputy Director of National Intelligence and former NSA Director Michael Hayden says that if the NSA’s recently revealed warrantless wiretapping program (see December 15, 2005) had been in place before 9/11, “it is my professional judgment that we would have detected some of the 9/11 al-Qaeda operatives in the United States, and we would have identified them as such.” Hayden will later say the NSA would have detected calls between an al-Qaeda communications hub in Yemen and 9/11 hijackers Nawaf Alhazmi and Khalid Almihdhar in San Diego (see May 18, 2006). Hayden adds: “You know, the 9/11 Commission criticized our ability to link things happening in the United States with things that were happening elsewhere. In that light, there are no communications more important to the safety of this country than those affiliated with al-Qaeda with one end in the United States.” Before the attacks, the NSA intercepted a series of calls between two of the 9/11 hijackers and a known al-Qaeda communications hub in Yemen (see Early 2000-Summer 2001), but failed to notify the FBI about them (see (Spring 2000)). [Press Club, 1/23/2006] Other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the NSA’s warrantless program is revealed by the New York Times (see December 17, 2005).

Entity Tags: Nawaf Alhazmi, Khalid Almihdhar, Michael Hayden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

President Bush at the National Security Agency.President Bush at the National Security Agency. [Source: Eric Draper / White House]President George Bush uses calls between the 9/11 hijackers in the US and an al-Qaeda communications hub in Yemen that were intercepted by the NSA (see Early 2000-Summer 2001) to justify the NSA’s warrantless wiretapping program (see December 15, 2005). Bush says: “We know that two of the hijackers who struck the Pentagon [Nawaf Alhazmi and Khalid Almihdhar] were inside the United States communicating with al-Qaeda operatives overseas. But we didn’t realize they were here plotting the attack until it was too late.” Bush also quotes former NSA Director Michael Hayden, who previously said, “Had this program been in effect prior to 9/11… we would have detected some of the 9/11 al-Qaeda operatives in the United States, and we would have identified them as such” (see January 23, 2006). Bush and other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the program is revealed by the New York Times (see December 17, 2005). [White House, 1/25/2006] Bush made similar remarks at Kansas State University two days previously. [White House, 1/23/2006]

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi, George W. Bush

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Washington Post reporter William Arkin reveals that the National Security Agency (NSA) is “building a new warning hub and data warehouse” in Aurora, Colorado, just outside of Denver, on the grounds of Buckley Air Force Base. The agency is transferring many key personnel from its Fort Meade, Maryland, headquarters to Aurora. Arkin calls the new NSA facility, named the Aerospace Data Facility (ADF), “massive,” and says he believes it is the hub of the NSA’s data mining operation (see January 16, 2004). According to Government Executive magazine, the NSA’s new data storage facility “will be able to hold the electronic equivalent of the Library of Congress every two days.” While the NSA explains that the new facility is a cost-cutting measure and part of the agency’s post-9/11 decentralization—“This strategy better aligns support to national decision makers and combatant commanders,” an NSA spokesman tells one reporter—Arkin says that the “NSA is aligning its growing domestic eavesdropping operations—what the administration calls ‘terrorist warning’ in its current PR campaign—with military homeland defense organizations, as well as the CIA’s new domestic operations [in] Colorado.… Colorado is now the American epicenter for national domestic spying.” Arkin notes that previous news reports have said that the CIA is planning to move much of its domestic National Resources Division to Aurora as well. He also notes that Colorado is the home of the US military’s Northern Command (NORTHCOM), the military arm responsible for homeland defense. The move also allows the NSA to better coordinate its efforts with private contractors such as Lockheed Martin, Northrup Grumman Mission Systems, and Raytheon, all of which have presences in Colorado. Arkin names all three firms as partners with the NSA in building the ADF. Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Over months and years, the database would be huge, ready for data mining whenever the government wants to go after someone.” [Washington Post, 1/31/2006; Klein, 2009, pp. 40-41]

Entity Tags: National Security Agency, Aerospace Data Facility, Government Executive Magazine, Mark Klein, Northrup Grumman Mission Systems, William Arkin, Lockheed Martin Corporation, Raytheon, US Northern Command

Timeline Tags: Civil Liberties

In his State of the Union address, President Bush insists that his authority to wiretap Americans’ phones without warrants (see December 15, 2005 and December 18, 2005) is validated by previous administrations’ actions, saying that “previous presidents have used the same constitutional authority I have.” He fails to note that those presidents authorized warrantless wiretaps before court orders were required for such actions (see June 19, 1972 and 1973). Since the Foreign Intelligence Surveillance Act passed (see 1978), no president except Bush has ever defied the law. Law professor David Cole calls Bush’s assertion of authority “either intentionally misleading or downright false.” Fellow law professor Richard Epstein predicts that the Supreme Court will strike down any such assertions, if it ever addresses the issue. “I find every bit of this legal argument disingenuous,” he says. Even many conservatives refuse to support Bush, with columnist George Will calling his arguments “risible” and a “monarchical doctrine” that is “refuted by the plain text of the Constitution.” David Keene, the chairman of the American Conservative Union, says the legal powers claimed by Bush and his officials can be used to justify anything: “Their argument is extremely dangerous.… The American system was set up on the assumption that you can’t rely on the good will of people with power.” Conservative activist Grover Norquist says flatly, “There is no excuse for violating the rule of law.” And former Justice Department official Bruce Fein says Bush and his officials have “a view that would cause the Founding Fathers to weep. The real conservatives are the ones who treasure the original understanding of the Constitution, and clearly this is inconsistent with the separation of powers.” Even former George H. W. Bush official Brent Scowcroft says that Bush’s interpretation of the Constitution is “fundamentally in error.” [Savage, 2007, pp. 203-204]

Entity Tags: David D. Cole, Brent Scowcroft, American Conservative Union, Bruce Fein, Richard Epstein, Grover Norquist, Foreign Intelligence Surveillance Act, David Keene, George Will, George W. Bush

Timeline Tags: Civil Liberties

The Navy’s former general counsel, Alberto Mora, now the general counsel for Wal-Mart’s international operations, ends a long, self-imposed silence about his opposition to the military’s advocacy of torture and abuse of terror suspects (see July 7, 2004). Mora tells New Yorker reporter Jane Mayer that the administration’s legal response to the 9/11 attacks was flawed from the outset, triggering a series of subsequent errors and misjudgments that were virtually impossible to correct. In particular, the determination to ignore the Geneva Conventions “was a legal and policy mistake,” but “very few lawyers could argue to the contrary once the decision had been made.” Mora continues, “It seemed odd to me that the actors weren’t more troubled by what they were doing.” Many administration lawyers seemed to be ignorant of history. “I wondered if they were even familiar with the Nuremberg trials—or with the laws of war, or with the Geneva Conventions. They cut many of the experts on those areas out. The State Department [whose lawyers and officials often opposed the use of abusive interrogation tactics] wasn’t just on the back of the bus—it was left off the bus.… [P]eople were afraid that more 9/11s would happen, so getting the information became the overriding objective. But there was a failure to look more broadly at the ramifications. These were enormously hardworking, patriotic individuals. When you put together the pieces, it’s all so sad. To preserve flexibility, they were willing to throw away our values.” [New Yorker, 2/27/2006]

Entity Tags: Geneva Conventions, US Department of State, Alberto Mora, Jane Mayer

Timeline Tags: Torture of US Captives, Civil Liberties

Jaber Elbaneh.Jaber Elbaneh. [Source: Yahya Arhab / EPA / Corbi]Twenty-three suspected al-Qaeda operatives break out of a high-security prison in the Yemeni capital of Sana’a. Escapees include Jamal al-Badawi, wanted for a role in the bombing of the USS Cole (see October 12, 2000), and Jaber Elbaneh, a US citizen believed to be linked to the alleged al-Qaeda sleeper cell in Lackawanna, New York (see April-August 2001). The men allegedly tunnel their way from the prison to the bathroom of a neighboring mosque. However, the New York Times will later comment: “[T]hat account is viewed with great skepticism, both in the United States and in Yemen. Many in Yemen say the escape could not have taken place without assistance, whether from corrupt guards or through a higher-level plan.” [New York Times, 3/1/2008] The prison is located in the basement of the Political Security Organization (PSO), Yemen’s equivalent of the FBI. Several days later, a cable sent from the US embassy in Yemen notes “the lack of obvious security measures on the streets,” and concludes, “One thing is certain: PSO insiders must have been involved.” Newsweek comments: “[P]rivately, US officials say the plotters must have had serious—possibly high-level—help at the Political [Security Organization].…. [T]he head of the PSO, Ali Mutahar al-Qamish, is said to be under suspicion, according to two US officials.” [Newsweek, 2/13/2006] Al-Badawi and nine others escaped a Yemeni prison in 2003 and then were recaptured one year later (see April 11, 2003-March 2004). Al-Badawi and Elbaneh turn themselves in to the Yemeni government in 2007 and then are freed (see October 17-29, 2007 and February 23, 2008).

Entity Tags: Jamal al-Badawi, Ali Mutahar al-Qamish, Jaber Elbaneh, Yemeni Political Security Organization

Timeline Tags: Complete 911 Timeline

A Washington Post article repeats assertions by the National Security Agency (NSA) and the Bush administration that even if the NSA is automatically intercepting and storing millions of domestic phone calls and emails (see January 16, 2004), such computerized surveillance does not legally “count” unless it is examined—i.e. read or listened to—by human analysts. As the Post reports, NSA rules state that “‘acquisition’ of content does not take place until a conversation is interrupted and processed ‘into an intelligible form intended for human inspection.’” The Post article says that “nearly all” of the intercepted “overseas” communications from American citizens have been “dismissed” by intelligence officers who found nothing of interest in them. The Post observes: “Fewer than 10 US citizens or residents a year, according to an authoritative account, have aroused enough suspicion during warrantless eavesdropping to justify interception of their domestic calls, as well. That step still requires a warrant from a federal judge, for which the government must supply evidence of probable cause.” And, according to the Post’s “knowledgeable sources,” no more than 5,000 Americans have had their conversations recorded or their emails examined by intelligence analysts. According to Bush administration officials, the Post reports, “[s]urveillance takes place in several stages… the earliest by machine. Computer-controlled systems collect and sift basic information about hundreds of thousands of faxes, emails, and telephone calls into and out of the United States before selecting the ones for scrutiny by human eyes and ears. Successive stages of filtering grow more intrusive as artificial intelligence systems rank voice and data traffic in order of likeliest interest to human analysts. But intelligence officers, who test the computer judgments by listening initially to brief fragments of conversation, ‘wash out’ most of the leads within days or weeks.” People who have helped develop the computer analysis technology say that “it is a triumph for artificial intelligence if a fraction of one percent of the computer-flagged conversations guide human analysts to meaningful leads.”
Controversy over Legality, Usefulness of Surveillance - National security lawyers say that the high proportion of false leads and innocent bystanders being wiretapped contravenes the “reasonable” search provisions of the Fourth Amendment. One government official says the success rate should be closer to 50 percent—one out of every two persons surveilled—and not less than one percent. “Those who devised the surveillance plan, the official says, “knew they could never meet that standard—that’s why they didn’t go through” the court that supervises the Foreign Intelligence Surveillance Act, or FISA. Bush officials refuse to say whether the NSA is discarding the more than 99 percent of communications that it intercepts and deems useless for further analysis. Jeff Jonas, an IBM scientist who invented a data-mining system now in use by both private and governmental entities, says that the kind of pattern-matching data analysis used by the NSA in its surveillance program is neither useful nor accurate. Those analysis techniques that “look at people’s behavior to predict terrorist intent,” he says, “are so far from reaching the level of accuracy that’s necessary that I see them as nothing but civil liberty infringement engines.” Psychology professor James W. Pennebaker disagrees. “Frankly, we’ll probably be wrong 99 percent of the time,” he says, “but one percent is far better than one in 100 million times if you were just guessing at random. And this is where the culture has to make some decisions.” [Washington Post, 2/5/2006]
Former AT&T Technician: AT&T, NSA Violating Fourth Amendment - Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004) will later take a different view of the issue. In 2009, he will write: “[T]he illegal act happens at the point of seizure by the government, i.e. the splitter—not later, whether or not a medium is involved (see January 16, 2004). That is the whole part of the Fourth Amendment, which demands the government get a warrant to show ‘probable cause’ for seizing things, whatever the government does with it afterwards. What they do later is unknown, and at any rate, their word on anything has proven to be an exercise in prevarication.” [Klein, 2009, pp. 48-49]

Entity Tags: Jeff Jonas, Foreign Intelligence Surveillance Act, Bush administration (43), James W. Pennebaker, Mark Klein, National Security Agency, Washington Post

Timeline Tags: Civil Liberties

In an interview with PBS’s Gwen Ifill, Representative Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee, says she supports the administration’s warrantless wiretapping program (see Spring 2001), a position that places her at odds with most Congressional Democrats. “Well, I said then and I say now that I support the program,” she tells Ifill. Harman is critical of the insider leaks that led to the public divulgance of the program (see December 15, 2005), saying, “Well, I think the leaks have done a lot of damage, and I deplore the leaks of this critical program.” She goes on to complain that the administration “says it adequately oversees this program,” but “the system of checks and balances that we have… requires that Congress as an independent branch of government pass the laws, fund the programs, and oversee how all that works.” In addition to requesting greater cooperation on oversight with Congress, she adds that “the courts need to be cut back in,” and thinks the “entire program” should be brought under the Foreign Intelligence Surveillance Act. [PBS, 2/8/2006] Four days later, Harman reiterates her position on NBC’s Meet the Press. She tells moderator Tim Russert, “If the press was part of the process of delivering classified information, there have to be some limits on press immunity.” Russert asks, “But if [the NSA leak] came from a whistleblower, should the New York Times reporter be prosecuted?” Harman answers: “Well, it’s not clear it was a whistleblower. You have to prove that first. If it’s protected by the whistleblower statute, then it’s protected.… By the way, I deplore that leak. This is a very valuable foreign [intelligence] collection program. I think it is tragic that a lot of our capabilities are now [spread] across the pages of the newspapers.” [MSNBC, 2/12/2006; NewsMax, 2/12/2006]

Entity Tags: Jane Harman, Gwen Ifill, New York Times, House Intelligence Committee, Foreign Intelligence Surveillance Act, Tim Russert

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), has contacted Los Angeles Times reporter Joseph Menn about publishing an article expising AT&T’s collusion with the National Security Agency (NSA) to illegally conduct surveillance against American citizens (see January 23, 2006 and After). Klein believed Menn was enthusiastic about exposing AT&T and the NSA in his newspaper. Instead, Klein is shocked to hear from Menn that the Times’s “top guy” is preparing to meet with Director of National Intelligence John Negroponte to discuss any such publication. “I nearly fell down in shock,” Klein will later write. “[T]hey were actually negotiating with the government on whether to publish!” Menn describes himself to Klein as “demoralized,” and says the chances of getting the story published are “grim.” In his seven years at the Times, Menn tells Klein, he has never seen a story “spiked” for “nefarious reasons,” implying that the reason behind the story’s non-publication are “nefarious.” Klein is also dismayed that the Times has now revealed his existence as a whistleblower to Negroponte, and by extension to the US intelligence apparatus. Two days ago, Klein began emailing a New York Times reporter, James Risen, the co-author of a 2005 expose about the NSA’s surveillance program (see December 15, 2005). After hearing from Menn, Klein emails Risen to inform him of the Los Angeles Times’s decision to “consult” with Negroponte, and also of the lack of interest he has received from Senator Dianne Feinstein’s office (see February 1-6, 2006). Risen calls in fellow reporter Eric Lichtblau, his co-author on the 2005 story, and the two begin working on their own story. Klein remains worried about his personal and professional safety, since, as he will write, “[t]he government was on to me, but I did not yet have a published article and the protection that comes with publicity. I had visions, perhaps paranoid in hindsight, of being disappeared in the night, like [nuclear industry whistleblower] Karen Silkwood.” The Los Angeles Times story will drag on until March 29, when Menn will inform Klein that it is officially dead, blocked by Times editor Dean Baquet. Klein will later learn that Baquet had not only been in contact with Negroponte, but with NSA Director Michael Hayden. In 2007, Baquet will tell ABC News reporters that “government pressure played no part in my decision not to run with the story,” and will say that he and managing editor Doug Frantz decided “we did not have a story, that we could not figure out what was going on” with Klein’s documentation (see March 26, 2007). Klein will call Baquet’s explanation an “absurd and flimsy excuse,” and will say it is obvious that the Los Angeles Times “capitulated to government pressure.” [PBS Frontline, 5/15/2007; Klein, 2009, pp. 59-62]

Entity Tags: James Risen, Dean Baquet, AT&T, Dianne Feinstein, Eric Lichtblau, Joseph Menn, Michael Hayden, John Negroponte, Douglas Frantz, National Security Agency, Los Angeles Times, Mark Klein

Timeline Tags: Civil Liberties

The progressive Internet news site Washington Note writes a follow-up to the day’s revelation that the exposure of Valerie Plame Wilson’s identity as a covert CIA agent caused heavy damage to the CIA’s ability to monitor Iran’s nuclear weapons program (see February 13, 2006). The Note reports that, according to its source, Plame Wilson’s husband, former ambassador Joseph Wilson, included information about Iran’s nuclear program in the report from his 2002 trip to Niger (see February 21, 2002-March 4, 2002 and March 4-5, 2002). Note reporter Steve Clemons says he cannot be sure of the accuracy of the claim, “so please take the following with a grain of salt until further sourced.” Clemons describes his source as “[s]omeone with knowledge of the classified report that Joe Wilson ‘orally’ filed after his now famed investigative trip to Niger.” Wilson allegedly included two notes in his debriefing that related to Iran and its possible activities in Niger. Clemons writes that “various intelligence sources” speculate that if Iran was indeed attempting to acquire Nigerien uranium, it would be to avoid “the international intelligence monitoring of Iran’s domestic mining operations.” Wilson, according to the source, may have reported that Iran, not Iraq, tried to acquire 400 to 500 tons of Nigerien uranium (see Between Late 2000 and September 11, 2001). Clemons writes that the notes from Wilson’s Niger debriefing have been destroyed, making it much harder to verify the claims. [Washington Note, 2/13/2006]

Entity Tags: Valerie Plame Wilson, Central Intelligence Agency, Steve Clemons, Joseph C. Wilson

Timeline Tags: US confrontation with Iran, Niger Uranium and Plame Outing

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), is concerned that the New York Times will not publish a story featuring his allegations and evidence against AT&T and the National Security Agency (NSA). Klein was “outed” by Los Angeles Times editor Dean Baquet to the US intelligence apparatus after Klein approached a Los Angeles Times reporter about his story, and Klein is concerned that he lacks the protection that publicity would afford him (see February 11, 2006 and After). New York Times reporters James Risen and Eric Lichtblau fail to contact Klein for weeks during this time period, leaving Klein to wonder if the New York Times, like the Los Angeles Times before it, will fail to publish his story. Klein emails Risen and Lichtblau his full set of AT&T documents proving his allegations in mid-February (see December 31, 2005). Meanwhile, he sends emails containing selected documents to a number of Congressional members. Only one, House Representative Pete Stark (D-CA), responds, promising that he will present Klein’s information to the House Judiciary Committee, but, as Klein will write, “I never heard anything from the Judiciary Committee, or any other committee for that matter.” [PBS Frontline, 5/15/2007; Klein, 2009, pp. 63]

Entity Tags: James Risen, Dean Baquet, AT&T, Eric Lichtblau, House Judiciary Committee, Los Angeles Times, Mark Klein, New York Times, National Security Agency, Fortney Hillman (“Pete”) Stark, Jr

Timeline Tags: Civil Liberties

Electronic Frontier Foundation (EFF) lawyer Kevin Bankston asks AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) to submit a legal declaration as to his knowledge of AT&T’s collusion with the National Security Agency (NSA) in its illegal domestic wiretapping program. Klein is working with the EFF in that organization’s lawsuit against AT&T (see Early January 2006 and January 31, 2006). Five days later, Klein submits his evidence of AT&T’s actions (see December 31, 2005) to Bankston to be used in the lawsuit. Klein will work with his lawyers to craft the declaration, and will have it in final form by late March. [Klein, 2009, pp. 63-64]

Entity Tags: National Security Agency, AT&T, Electronic Frontier Foundation, Mark Klein, Kevin Bankston

Timeline Tags: Civil Liberties

In a court hearing, special counsel Patrick Fitzgerald argues that Valerie Plame Wilson’s identity as a covert CIA official (see Fall 1992 - 1996) is irrelevant to the perjury charges pending against former White House official Lewis Libby (see October 28, 2005). “We’re trying a perjury case,” Fitzgerald tells Judge Reggie Walton. Even if Plame Wilson had never worked for the CIA at all, Fitzgerald continues, even if she had been simply mistaken for a CIA agent, the charges against Libby would still stand. Furthermore, Fitzgerald tells Walton, he does not intend to offer “any proof of actual damage” caused by the disclosure of Plame Wilson’s identity. Libby’s defense lawyer Theodore Wells objects to Fitzgerald’s statement, saying that in the actual trial, Fitzgerald will likely tell the jury that the leak of Plame Wilson’s identity either damaged or could have damaged the CIA’s ability to gather critical intelligence (see Before September 16, 2003, October 3, 2003, October 11, 2003, October 22-24, 2003, October 23-24, 2003, and February 13, 2006). Wells says he may call either Plame Wilson, her husband Joseph Wilson (see February 21, 2002-March 4, 2002), or both to testify in the case, as well as CIA employees. “I might call Ms. Wilson” to testify, he says. “I might call her husband. There are going to be CIA employees as witnesses in this.… Was she just classified because some bureaucracy didn’t declassify her five years ago when they should have?” Wells asks if Plame Wilson may have been “classified based on a piece of paper.” One anonymous source tells a National Review columnist: “She was definitely undercover by agency standards at the time in question. That was a classified bit of information, and is sufficient as far as the agency is concerned to bring it to the attention of the Justice Department. You can argue whether she should have been, but as far as the agency was concerned it was classified.” [National Review, 2/27/2006] In his statement to the court, Fitzgerald notes: “[T]he issue is whether [Libby] knowingly lied or not. And if there is information about actual damage, whatever was caused or not caused that isn’t in his mind, it is not a defense. If she turned out to be a postal driver mistaken for a CIA employee, it’s not a defense if you lie in a grand jury under oath about what you said and you told people, ‘I didn’t know he had a wife.’ That is what this case is about. It is about perjury, if he knowingly lied or not.” [Truthout (.org), 3/18/2006]

Entity Tags: Reggie B. Walton, Joseph C. Wilson, Lewis (“Scooter”) Libby, Theodore Wells, Patrick J. Fitzgerald, Valerie Plame Wilson

Timeline Tags: Niger Uranium and Plame Outing

The Al Haramain Islamic Foundation, a now-defunct Saudi Arabian charitable organization that once operated in Oregon, sues the Bush administration [Associated Press, 2/28/2006] over what it calls illegal surveillance of its telephone and e-mail communications by the National Security Agency, the so-called Terrorist Surveillance Program. The lawsuit may provide the first direct evidence of US residents and citizens being spied upon by the Bush administration’s secret eavesdropping program, according to the lawsuit (see December 15, 2005). According to a source familiar with the case, the NSA monitored telephone conversations between Al Haramain’s director, then in Saudi Arabia, and two US citizens working as lawyers for the organization and operating out of Washington, DC. The lawsuit alleges that the NSA violated the Foreign Intelligence Surveillance Act (see 1978), the US citizens’ Fourth Amendment rights, and the attorney-client privilege. FISA experts say that while they are unfamiliar with the specifics of this lawsuit, they question whether a FISA judge would have allowed surveillance of conversations between US lawyers and their client under the circumstances described in the lawsuit. Other lawsuits have been filed against the Bush administration over suspicions of illegal government wiretapping, but this is the first lawsuit to present classified government documents as evidence to support its contentions. The lawsuit alleges that the NSA illegally intercepted communications between Al Haramain officer Suliman al-Buthe in Saudi Arabia, and its lawyers Wendell Belew and Asim Ghafoor in Washington. One of its most effective pieces of evidence is a document accidentally turned over to the group by the Treasury Department, dated May 24, 2004, that shows the NSA did indeed monitor conversations between Al Haramain officials and lawyers. When Al Haramain officials received the document in late May, 2004, they gave a copy to the Washington Post, whose editors and lawyers decided, under threat of government prosecution, to return the document to the government rather than report on it (see Late May, 2004). [Washington Post, 3/2/2006; Washington Post, 3/3/2006] Lawyer Thomas Nelson, who represents Al Haramain and Belew, later recalls he didn’t realize what the organization had until he read the New York Times’s December 2005 story of the NSA’s secret wiretapping program (see December 15, 2005). “I got up in the morning and read the story, and I thought, ‘My god, we had a log of a wiretap and it may or may not have been the NSA and on further reflection it was NSA,’” Nelson will recall. “So we decided to file a lawsuit.” Nelson and other lawyers were able to retrieve one of the remaining copies of the document, most likely from Saudi Arabia, and turned it over to the court as part of their lawsuit. [Wired News, 3/5/2007]
Al Haramain Designated a Terrorist Organization - In February 2004, the Treasury Department froze the organization’s US financial assets pending an investigation, and in September 2004, designated it a terrorist organization, citing ties to al-Qaeda and alleging financial ties between Al Haramain and the 1998 bombings of two US embassies in Africa (see 10:35-10:39 a.m., August 7, 1998). The organization was disbanded by the Saudi Arabian government in June 2004 and folded into an “umbrella” private Saudi charitable organization, the Saudi National Commission for Relief and Charity Work Abroad (see March 2002-September 2004). In February 2005, the organization was indicted for conspiring to funnel money to Islamist fighters in Chechnya. The charges were later dropped. [US Treasury Department, 9/9/2004; Washington Post, 3/2/2006] The United Nations has banned the organization, saying it has ties to the Taliban. [United Nations, 7/27/2007]
Challenging Designation - In its lawsuit, Al Haramain is also demanding that its designation as a terrorist organization be reversed. It says it can prove that its financial support for Chechen Muslims was entirely humanitarian, with no connections to terrorism or violence, and that the Treasury Department has never provided any evidence for its claims that Al Haramain is linked to al-Qaeda or has funded terrorist activities. [Associated Press, 8/6/2007] The lawsuit also asks for $1 million in damages, and the unfreezing of Al Haramain’s US assets. [Associated Press, 8/5/2007]
Administration Seeks to Have Lawsuit Dismissed - The Bush administration will seek to have the lawsuit thrown out on grounds of national security and executive privilege (see Late 2006-July 2007, Mid-2007).

Entity Tags: Wendell Belew, Suliman al-Buthe, Taliban, Washington Post, United Nations, Saudi National Commission for Relief and Charity Work Abroad, US Department of the Treasury, National Security Agency, Thomas Nelson, Foreign Intelligence Surveillance Act, Al Haramain Islamic Foundation, Al-Qaeda, Al Haramain Islamic Foundation (Oregon branch), Foreign Intelligence Surveillance Court, Asim Ghafoor, Bush administration (43)

Timeline Tags: Civil Liberties

Sam Karmilowicz, a former security officer at the US embassy in Manila, suggests in an interview with CounterPunch magazine, that US intelligence may have failed to properly follow leads in a counterterrorism case because of a potential link to Pakistani intelligence. In September 1994, Karmilowicz allegedly received information that a Pakistani businessman with possible ties to the ISI was part of a plot to assassinate President Clinton during his November 1994 visit to Manila (see September 18-November 14, 1994). An interagency US security team that was tasked with investigating the tip ended its investigation after only a few weeks. “My experience in the Philippines shows the US government has compartmentalized information… in order to cover-up its gross incompetence or its complicity in illegal and questionable activities conducted by, or against, foreign powers,” Karmilowicz says. [CounterPunch, 3/9/2006]

Entity Tags: Sam Karmilowicz, US intelligence

Timeline Tags: Complete 911 Timeline

Rayed Abdullah.Rayed Abdullah. [Source: Scoop]Rayed Abdullah, an associate of hijacker pilot Hani Hanjour (see October 1996-December 1997 and October 1996-Late April 1999), enters New Zealand despite being on the watch list there and takes further pilot training. The New Zealand government claims it only ascertains his real identity after he has been in the country several months. Abdullah is then arrested and deported to Saudi Arabia, even though he was traveling on a Yemeni passport. [Associated Press, 6/9/2006; New Zealand Herald, 6/10/2006] However, FBI agents and CIA officers later say that the US released Abdullah after 9/11 in an attempt to use him to spy on al-Qaeda for Saudi Arabia’s intelligence agency. The CIA ensures he is allowed into New Zealand as a part of a joint operation. However, the New Zealanders get cold feet when Abdullah starts flight training again. A CIA official will say: “[W]e know if Rayed was part of the [9/11] plot, someone in al-Qaeda will reach out for him, and we have a chance of making that connection.” An FBI official will comment: “The amazing thing is the CIA convinced itself that by getting [Abdullah] tossed out of New Zealand, he would then be trusted and acceptable to Saudi intelligence and useful in al-Qaeda operations. For this tiny chance of success they put passengers at risk to enter into a partnership with Saudi intelligence.” [Stories that Matter, 10/9/2006]

Entity Tags: Central Intelligence Agency, Rayed Abdullah

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Zacarias Moussaoui.Zacarias Moussaoui. [Source: WNBC / Jonathan Deinst]Zacarias Moussaoui becomes the first and only person charged in direct connection with the 9/11 attacks to stand trial in the US. [Associated Press, 3/17/2006] He was preparing to hijack an aircraft and fly it into a target when he was arrested 26 days before 9/11 (see August 16, 2001 and April 22, 2005). Although there has been disagreement whether Moussaoui was to take part in the actual attack of 9/11 or a follow-up plot (see January 30, 2003), the prosecution alleges that Moussaoui had information related to the attacks (see August 16, 2001) and facilitated them by lying and not disclosing everything he knew to the FBI. He is charged with six counts, including conspiracy to commit acts of terrorism and conspiracy to commit aircraft piracy. [US District Court for the Eastern District of Virginia, Alexandria Division, 12/11/2001 pdf file] The trial receives much media coverage and the highlights include the playing of United 93’s cockpit recorder (see April 12, 2006), a row over a government lawyer coaching witnesses (see March 13, 2006), and testimony by FBI agent Harry Samit (see March 9 and 20, 2006), former FBI assistant director Michael Rolince (see March 21, 2006), and Moussaoui himself (see March 27, 2006). Moussaoui is forced to wear a stun belt, controlled by one of the marshalls, under his jumpsuit. The belt is to be used if Moussaoui lunges at a trial participant. [New York Times, 4/17/2006] He has already pleaded guilty (see April 22, 2005) and the trial is divided into two phases; in the first phase the jury decides that Moussaoui is eligible for the death penalty, but in the second phase it fails to achieve unanimity on whether Moussaoui should be executed (see May 3, 2006). [Associated Press, 4/3/2006; New York Times, 4/17/2006]

Entity Tags: Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Republicans on the Senate Intelligence Committee refuse to allow an inquiry into the Bush administration’s warrantless wiretapping program (see December 15, 2005 and December 18, 2005), with the committee voting 10-8 along party lines to reject such a probe. Senate Judiciary Committee chairman Arlen Specter (R-PA) had advocated such a probe, but White House officials refused to cooperate with his committee, saying they would only cooperate via classified briefings to the Intelligence Committee. However, committee Republicans, led by chairman Pat Roberts (R-KS), have no intention of allowing such an inquiry. Roberts and his fellows say they will push to impose limitations on the program. Committee Democrats accuse their Republican colleagues of colluding with the administration to block the inquiry. “The committee is, to put it bluntly, is basically under the control of the White House,” says ranking committee member John D. Rockefeller (D-WV). “You can’t legislate properly unless you know what’s going on.” The Republicans have left Congress to “legislate in darkness and ignorance,” he says. Republicans say that a new, select subcommittee will increase oversight of the administration’s wiretapping. “It provides for a case-by-case examination and oversight by the United States Congress,” says Mike DeWine (R-OH), who is helping draft the bill for the new oversight subcommittee. “It will be very consistent with what our constitutional obligations are.” DeWine’s bill would allow the administration to ignore restrictions on wiretapping merely by invoking national security, and would not allow the committee to intervene even in clearly unjustified cases of wiretapping. “The White House could just decide not to tell them everything, and there’s no sanction,” says Bruce Fein, a former Reagan administration lawyer. “And the president can still claim that he has inherent power to conduct surveillance.” The bill is “extremely generous to the president,” says conservative law professor Douglas Kmiec. “It is not significantly different from the status quo. And I think the president would be quite delighted by that.” [Boston Globe, 3/8/2006; Savage, 2007, pp. 204]

Entity Tags: Senate Judiciary Committee, Bruce Fein, Arlen Specter, Bush administration (43), Pat Roberts, Douglas Kmiec, Mike DeWine, John D. Rockefeller, Senate Intelligence Committee

Timeline Tags: Civil Liberties

President Bush signs the USA Patriot Improvement and Reauthorization Act of 2005 into law. The bill, which extends and modifies the original USA Patriot Act (see October 26, 2001), was driven through Congress primarily by the Republican majorities in both Houses. However, Senator Dianne Feinstein (D-CA) cosponsored the Senate bill, numerous Democrats in both Houses voted with the Republicans in favor of the bill, and the final bill sailed through the Senate by an 89-10 vote on March 2. [GovTrack, 3/9/2006; Library of Congress, 3/9/2006] In the signing ceremony, Bush calls the Reauthorization Act “a really important piece of legislation… that’s vital to win the war on terror and to protect the American people.” He repeatedly evokes the 9/11 attacks as a reason why the new law is needed. [Government Printing Office, 3/9/2006]
Provisions for Oversight Added - One of the reasons why the reauthorization bill received such support from Congressional moderates on both sides of the aisle is because Congress added numerous provisions for judicial and Congressional oversight of how government and law enforcement agencies conduct investigations, especially against US citizens. Representative Butch Otter (R-ID) said in 2004 that Congress came “a long way in two years, and we’ve really brought an awareness to the Patriot Act and its overreaches that we gave to law enforcement.” He adds, “We’ve also quieted any idea of Patriot II, even though they snuck some of Patriot II in on the intelligence bill” (see February 7, 2003). [Associated Press, 1/23/2004]
Opposition From Both Sides - Liberal and conservative organizations joined together in unprecedented cooperation to oppose several key provisions of the original reauthorization and expansion of the Patriot Act, including easing of restrictions on government and law enforcement agencies in obtaining financial records of individuals and businesses, “sneak-and-peek” searches without court warrants or the target’s knowledge, and its “overbroad” definition of the term “terrorist.” Additionally, lawmakers in Congress insisted on expiration dates for the various surveillance and wiretapping methodologies employed by the FBI and other law enforcement agencies (see Early 2002). [Associated Press, 5/23/2005] The final bill mandates that anyone subpoenaed for information regarding terrorist investigations has the right to challenge the requirement that they not reveal anything about the subpoena, those recipients will not be required to tell the FBI the name of their lawyer, and libraries that are not Internet service providers will not be subject to demands from “national security letters” for information about their patrons. Many of the bill’s provisions will expire in four years. [Christian Science Monitor, 3/3/2006]
Reauthorizing Original Provisions - The bill does reauthorize many expiring provisions of the original Patriot Act, including one that allows federal officials to obtain “tangible items,” such as business records from libraries and bookstores, in connection with foreign intelligence and international terrorism investigations. Port security provisions are strengthened, and restrictions on the sale of over-the-counter cold and allergy medicine that can be used in the illegal manufacture of methamphetamine are imposed, forcing individuals to register their purchases of such medicines and limiting the amounts they can buy. [CBS News, 3/9/2006]
Bush Signing Statement Says He Will Ignore Oversight Mandates - But when he signs the bill into law, Bush also issues a signing statement that says he has no intention of obeying mandates that enjoin the White House and the Justice Department to inform Congress about how the FBI is using its new powers under the bill. Bush writes that he is not bound to tell Congress how the new Patriot Act powers are being used, and in spite of what the law requires, he can and will withhold information if he decides that such disclosure may “impair foreign relations, national security, the deliberative process of the executive, or the performance of the executive’s constitutional duties.” [Statement on Signing the USA PATRIOT Improvement and Reauthorization Act, 3/9/2006; Boston Globe, 3/24/2006] Senator Patrick Leahy (D-VT) says that Bush’s assertion that he can ignore provisions of the law as he pleases, under the so-called “unitary executive” theory, are “nothing short of a radical effort to manipulate the constitutional separation of powers and evade accountability and responsibility for following the law.” Law professor David Golove says the statement is illustrative of the Bush administration’s “mind-bogglingly expansive conception” of executive power, and its low regard for legislative power. [Boston Globe, 3/24/2006] Author and legal expert Jennifer Van Bergen warns of Bush using this signing statement to avoid accountability about the NSA’s warrantless wiretapping program, writing: “[I]t is becoming clearer every day that Bush has no qualms about violating either international laws and obligations or domestic laws. The recent revelations about the secret NSA domestic surveillance program revealed Bush flagrantly violating the Foreign Intelligence Surveillance Act which was specifically enacted to prevent unchecked executive branch surveillance. … His signing statements, thus, are nothing short of an attempt to change the very face of our government and our country.” [Institute for Public Accuracy, 3/27/2006]
Request to Rescind Signing Statement - In late March, Democratic House members Jane Harman and John Conyers will write to Attorney General Alberto Gonzales requesting that the administration rescind the signing statement, writing: “As you know, ‘signing statements’ do not have the force of law. Legislation passed by both Houses and signed by the president does. As Article 1, Section 7, of the Constitution states: ‘Every bill which shall have passed the House of Representatives and the Senate, shall, before it become a Law, be presented to the President of the United States; If he approve he shall sign it, but if not he shall return it.’” Bush and Gonzales will ignore the request. [US House of Representatives, 3/29/2006]

Entity Tags: US Department of Justice, Domestic Security Enhancement Act of 2003, David Golove, Alberto R. Gonzales, Butch Otter, Dianne Feinstein, Patrick J. Leahy, USA Patriot Act, John Conyers, Federal Bureau of Investigation, National Security Agency, Foreign Intelligence Surveillance Act, Jennifer Van Bergen, Jane Harman, George W. Bush

Timeline Tags: Civil Liberties

Senator Russell Feingold (D-WI) tells reporters that he intends to push through legislation that would censure President Bush because of his domestic surveillance program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006). “What the president did by consciously and intentionally violating the Constitution and laws of this country with this illegal wiretapping has to be answered,” Feingold tells an interviewer. “Proper accountability is a censuring of the president, saying, ‘Mr. President, acknowledge that you broke the law, return to the law, return to our system of government.‘… The president has broken the law and, in some way, he must be held accountable.… Congress has to reassert our system of government, and the cleanest and the most efficient way to do that is to censure the president. And, hopefully, he will acknowledge that he did something wrong.” Senate Majority Leader Bill Frist (R-TN) calls Feingold’s proposal “a crazy political move.” The Senate Intelligence Committee, following the Bush administration’s lead, has rejected some Democrats’ call for a full investigation of the surveillance program (see February 1-6, 2006). Instead, the committee has adopted a Republican plan for a seven-member subcommittee to conduct oversight. Feingold says his censure motion is not “a harsh approach, and it’s one that I think should lead to bipartisan support.” Frist, however, says: “I think it, in part, is a political move because here we are, the Republican Party, the leadership in the Congress, supporting the president of the United States as commander in chief who is out there fighting al-Qaeda and the Taliban and Osama bin Laden and the people who have sworn—have sworn—to destroy Western civilization and all the families listening to us.… The signal that it sends that there is in any way a lack of support for our commander in chief who is leading us with a bold vision in a way that we know is making our homeland safer is wrong. And it sends a perception around the world.” Only once in history has a president been censured by Congress: Andrew Jackson in 1834. In the House, Representative John Conyers (D-MI) is exploring the idea of introducing impeachment legislation against Bush. [New York Times, 3/12/2006; Associated Press, 3/12/2006] Feingold says on the Senate floor: “The president has violated the law and Congress must respond. A formal censure by Congress is an appropriate and responsible first step to assure the public that when the president thinks he can violate the law without consequences, Congress has the will to hold him accountable.” Most Congressional Democrats want nothing to do with either Feingold’s or Conyers’s legislative ideas, and some Republicans seem to be daring Democrats to vote for the proposal. Vice President Dick Cheney tells a Republican audience in Feingold’s home state of Wisconsin, “Some Democrats in Congress have decided the president is the enemy.” Democratic leaders in the Senate thwart an immediate vote as requested by Frist, and Senator Richard Durbin (D-IL) says he is not sure the proposal will ever come to a vote. Senate Minority Leader Harry Reid (D-NV) says he does not support it and has not read it. Senator Joseph Lieberman (D-CT) makes a similar assertion. In the House, Minority Leader Nancy Pelosi (D-CA) refuses to support such a proposal, saying in a statement that she “understands Senator Feingold’s frustration that the facts about the NSA domestic surveillance program have not been disclosed appropriately to Congress. Both the House and the Senate must fully investigate the program and assign responsibility for any laws that may have been broken.” [Associated Press, 3/14/2006] Former Nixon aide John Dean testifies in support of Feingold’s censure motion (see March 31, 2006). However, the censure motion, lacking support from Democratic leaders and being used by Republicans as a means to attack Democrats’ patriotism, never comes to a vote. [Klein, 2009, pp. 84]

Entity Tags: Joseph Lieberman, George W. Bush, Bush administration (43), Bill Frist, Harry Reid, John Dean, Russell D. Feingold, Senate Intelligence Committee, Richard (“Dick”) Durbin, Richard (“Dick”) Cheney, Nancy Pelosi, John Conyers

Timeline Tags: Civil Liberties

Judge Leonie Brinkema halts the trial of Zacarias Moussaoui (see March 6-May 4, 2006) after it is discovered that Transportation Security Administration lawyer Carla J. Martin violated a court order prohibiting witnesses from following the trial. Martin e-mailed transcripts to seven witnesses and coached them on their testimony. Brinkema calls it “the most egregious violation of the court’s rules on witnesses [I have seen] in all the years I’ve been on the bench.” Even the prosecution says, “We frankly cannot fathom why she engaged in such conduct.” [Washington Post, 3/14/2006; Associated Press, 3/17/2006] Brinkema allows the prosecution to continue to seek the death penalty, but initially removes the aviation security portion of evidence from its case. However, after the prosecution complains this makes the proceedings pointless, she reinstates some of it, allowing the trial to continue. [Associated Press, 3/15/2006; CNN, 3/16/2006; Associated Press, 3/17/2006] As a result of her actions, Martin is placed on paid leave. Additionally, Pennsylvania’s lawyer disciplinary board begins an investigation and federal prosecutors explore charges. [Washington Post, 7/10/2006] Martin’s e-mails also reveal that she has been communicating with attorneys for United and American Airlines. This prompts seven victims’ relatives, who are suing the airlines for being negligent on 9/11, to file a civil action against her alleging that she is trying to help the airline industry avoid civil liability. [CBS News, 4/7/2006; CNN, 4/26/2006]

Entity Tags: Leonie Brinkema, Carla Martin

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Congressman Curt Weldon (R-PA) says that Osama bin Laden has died in Iran. According to Weldon, the information comes from a high-level Iranian exile source, who claims that bin Laden had been in hiding in Iran. Weldon, who last spoke to the source three weeks ago, says: “[The source has] told me that Osama bin Laden is dead. He died in Iran.” Weldon has long alleged that bin Laden has been using Iran for sanctuary. For example, last June he said: “I’m confident that I know for sure that [bin Laden] has been in and out of Iran.… Two years ago, he was in the southern town of Ladis, 10 kilometers inside the Pakistan border. I also know that earlier this year, he had a meeting with [Iraqi insurgent leader Abu Musab] al-Zarqawi in Tehran.” [NewsMax, 3/17/2003] Despite this, a man thought to be bin Laden will continue to release statements to the media (see, for example, May 23, 2006).

Entity Tags: Al-Qaeda, Curt Weldon, Osama bin Laden

Timeline Tags: Complete 911 Timeline

Michael Rolince, who headed the FBI’s International Terrorism Operations Section when Zacarias Moussaoui was arrested, testifies at Moussaoui’s trial (see March 6-May 4, 2006). He initially states that he was only informed of the Moussaoui case before 9/11 in two brief hallway conversations (see Late August 2001) and did not read a memo sent to him by the Minneapolis field office. However, under cross-examination he admits he also discussed a plan to deport Moussaoui to France, where his belongings could be searched (see (August 30-September 10, 2001)). [Associated Press, 3/21/2006; Associated Press, 3/21/2006] According to Newsday, Rolince appears “red-faced and flustered” at the end of the cross-examination and makes the court burst out laughing when he says he did not approve a briefing to FBI field offices about bin Laden threats in the US (see Before April 13, 2001), even though the briefing states he approved it. He says one of his subordinates may have approved it. [Associated Press, 3/21/2006; Newsday, 3/22/2006] Rolince is called by the prosecution, which wants him to give a list of steps the FBI would have taken if Moussaoui had confessed. However, Judge Brinkema states that, “Juries cannot decide cases on speculation… Nobody knows what would have happened.” [Associated Press, 3/21/2006; Associated Press, 3/22/2006]

Entity Tags: Michael Rolince

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

During the trial of Zacarias Moussaoui (see also March 6-May 4, 2006), the prosecution claims that if Zacarias Moussaoui had not lied when arrested and questioned (see August 16, 2001) and had provided information about the plot (see August 16, 2001), the FAA could have altered its security procedures to deal with the suicide hijacker threat. Prosecution witness Robert Cammaroto, an aviation security officer, says that security measures in effect before 9/11 were designed to cope with different types of threats, such as “the homesick Cuban,” rather than suicide hijackings. He says that if the FAA had more information about Moussaoui, its three dozen air marshals could have been moved from international to domestic flights, security checkpoints could have been tightened to detect short knives like the ones Moussaoui had, and flight crews could have been instructed to resist rather than cooperate with hijackers. Most of these steps could have been implemented within a matter of hours. However, Cammarato admits that the FAA was aware before 9/11 that terrorists considered flying a plane into the Eiffel Tower and that al-Qaeda has performed suicide operations on land and sea. [Associated Press, 3/22/2006]

Entity Tags: Federal Aviation Administration, Robert Cammarato, Carla Martin, Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Ahmed Alnami’s youth hosteling card found in the Flight 93 crash site.Ahmed Alnami’s youth hosteling card found in the Flight 93 crash site. [Source: FBI]During the trial of Zacarias Moussaoui (see March 6-May 4, 2006), the Reporters Committee for Freedom of the Press publishes a significant portion of the exhibits used during the trial. [Reporters Committee for Freedom of the Press, 12/4/2006] Previously, only a few items of the evidence linking the attacks to al-Qaeda were made public. For example, the 9/11 Commission’s Terrorist Travel Monograph contained 18 documents of the alleged hijackers and their associates. [9/11 Commission, 8/21/2004, pp. 171-195 pdf file] The published exhibits include:
bullet Items belonging to the alleged hijackers that were recovered from the crash sites and Logan airport;
bullet Some details of the hijackers’ movements in the US;
bullet Graphic photos of dead victims and body parts in the Pentagon and WTC ruins;
bullet Substitutions for testimony from some of the main plotters such as Khalid Shaikh Mohammed;
bullet The missing chapter from the Justice Department’s Office of Inspector General’s review of the FBI’s performance before 9/11 (see June 9, 2005); and
bullet FBI and CIA documents. [Reporters Committee for Freedom of the Press, 12/4/2006]
At the end of July, the US District Court for the Eastern District of Virginia, Alexandria Division, publishes more of the exhibits used in the trial. The additionally published exhibits include, for example:
bullet Documents of the hijackers found at the crash sites and Logan airport, such as Satam Al Suqami’s passport (see After 8:46 a.m. September 11, 2001), Ahmed Alnami’s youth hosteling card, and old correspondence between Mohamed Atta and the German authorities;
bullet Recordings of calls made by the passengers from the flights and recordings of the hijacker pilots talking to the passengers;
bullet Documents about the alleged hijackers prepared by the FBI such as a True Name Usage Chart for 2001 and chronologies for eleven of the hijackers from August 16-September 11, 2001;
bullet Documents from the hijackers’ flight schools;
bullet A small sample of the hijackers’ banking and phone records.
However, some of the exhibits are not disclosed. For example, the cockpit voice recording from United 93 is sealed and only a transcript is made available. [US District Court for the Eastern District of Virginia, 7/31/2006]

Entity Tags: Reporters Committee for Freedom of the Press

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Zacarias Moussaoui claimed that Richard Reid (above) was to have helped him hijack a fifth plane on 9/11.Zacarias Moussaoui claimed that Richard Reid (above) was to have helped him hijack a fifth plane on 9/11. [Source: Mirrorpix(.com)]Against the will of his defense attorneys, Zacarias Moussaoui takes the stand at his trial (see March 6-May 4, 2006) and claims that he was supposed to fly a fifth plane on 9/11. He says the plane would have targeted the White House and one of the muscle hijackers would have been shoe-bomber Richard Reid (see December 22, 2001). However, he claims not to have known the details of the other hijackings, only that the WTC would be hit. He does not mention any other collaborators aside from Reid, who has already been sentenced to a long prison term. When the prosecution asks him whether he lied to FBI investigators so the plan could go forward he replies, “That’s correct.” An Associated Press expert calls this, “a stunning revelation that would help prosecutors rather than him.” [Associated Press, 3/27/2006] In what the New York Times calls a “bizarre moment,” the defense team, aware of the damage this admission could do, subject Moussaoui to tough questioning and the chief prosecutor objects that one of the defense attorneys is badgering his own client. [New York Times, 4/17/2006]
Uncertainty over Fifth Jet - There is some dispute over whether Moussaoui was indeed to have flown a fifth plane (see January 30, 2003 and Before 2008). Following the testimony, the defense reads statements made by al-Qaeda leaders who are in custody, but are not permitted to testify at the trial (see May 14, 2003 and March 22, 2005). The statements say that Moussaoui was not part of 9/11, but a follow-up operation. [Associated Press, 3/28/2006; US District Court for the Eastern District of Virginia, 7/31/2006 pdf file] However, these statements were obtained using torture (see June 16, 2004). The government later concedes that there is no evidence linking Richard Reid to 9/11. [Associated Press, 4/20/2006]
"Complete Fabrication" - Moussaoui had denied being part of 9/11 before the trial (see April 22, 2005). By the end of the trial he will do so again, calling the confession he makes on this day “a complete fabrication.” [Associated Press, 5/8/2006]

Entity Tags: Zacarias Moussaoui, Richard C. Reid

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Four statements based on the CIA inspector general’s report on some aspects of the agency’s performance before 9/11 are introduced as evidence at the trial of Zacarias Moussaoui by the defense. The report was completed in 2004 (see June-November 2004), but rewritten and is still secret (see January 7, 2005). The four passages say:
bullet “Numerous” CIA officers accessed cables reporting that Khalid Almihdhar’s passport contained a US visa and Nawaf Alhazmi had flown from Thailand to Los Angeles (see Mid-January-March 2000); [US District Court for the Eastern District of Virginia, Alexandria District, 3/28/2006 pdf file]
bullet FBI Director Louis Freeh was briefed about Almihdhar in January 2000, but not told that Almihdhar had a US visa (see January 6-9, 2000); [US District Court for the Eastern District of Virginia, Alexandria Division, 3/28/2006 pdf file]
bullet Nobody at Alec Station, the CIA’s bin Laden unit, notified CIA personnel authorized to collect foreign intelligence in the US together with the FBI about Almihdhar’s US visa (see 9:30 a.m. - 4:00 p.m. January 5, 2000); [US District Court for the Eastern District of Virginia, Alexandria Division, 3/28/2006 pdf file]
bullet The CIA was unaware of the Phoenix memo until after 9/11 (note: this may not actually be true—see (July 27, 2001)). [US District Court for the Eastern District of Virginia, Alexandria Division, 3/28/2005 pdf file]
Two sections of the 9/11 Congressional Inquiry report are also introduced as evidence as substitutes for the CIA inspector general’s report. They cover the use of aircraft as weapons and US knowledge of bin Laden’s intentions to strike inside the US in the summer of 2001. [US District Court for the Eastern District of Virginia, Alexandria Division, 3/28/2006 pdf file; US District Court for the Eastern District of Virginia, Alexandria Division, 3/28/2006 pdf file]

Entity Tags: Office of the Inspector General (CIA), Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In an interview, Vice President Cheney says, “We had one report early on from another intelligence service that suggested that the lead hijacker, Mohamed Atta, had met with Iraqi intelligence officials in Prague, Czechoslovakia. And that reporting waxed and waned where the degree of confidence in it, and so forth, has been pretty well knocked down now at this stage, that that meeting ever took place. So we’ve never made the case, or argued the case that somehow [Saddam Hussein] was directly involved in 9/11. That evidence has never been forthcoming. But there—that’s a separate proposition from the question of whether or not there was some kind of a relationship between the Iraqi government, Iraqi intelligence services and the al-Qaeda organization.” [White House, 3/29/2006] This is a reversal for Cheney, who strongly argued that the meeting took place, even after most experts concluded that it did not (see June 17, 2004).

Entity Tags: Richard (“Dick”) Cheney

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion

The Justice Department demands that it be allowed to review evidence obtained by the Electronic Frontier Foundation (EFF) from retired AT&T technician Mark Klein (see February 23-28, 2006). The EFF is preparing to submit the evidence under regular court seal to presiding Judge Vaughn Walker. Neither the Justice Department nor any other government agency is a named defendant in the EFF’s lawsuit against AT&T for its allegedly illegal behavior in working with the National Security Agency (NSA) to conduct warrantless surveillance against American citizens (see January 31, 2006). Even so, lawyers from the Justice Department say they want to see if Klein’s documentation contains classified information (it does not—see Late 2003), and if so, they intend to place Klein’s documentation into a “sensitive compartmented information facility,” which would mean it would not be kept at the courthouse but in the possession of government agents at a secure location. Such classification would make the legal proceedings more difficult for both Judge Walker and the EFF lawyers. However, the request piques the interest of the national media, and reporters begin “flooding” Klein and the EFF with requests for information and interviews. [Klein, 2009, pp. 65-66] Ironically, two news outlets, the Los Angeles Times and New York Times, have all but shunned Klein before now (see February 11, 2006 and After and Mid-February - Late March, 2006). On April 4, after perusing the documents, the government lawyers return them to Walker with approval from senior Justice Department lawyer Anthony J. Coppolino to file them under ordinary court seal. Klein will later write that Coppolino’s acquiescence will undermine the government’s later efforts to have the lawsuit dismissed under the “state secrets” provision (see Late May, 2006). [Klein, 2009, pp. 66] In June 2007, the online technical news site Wired News will publish the documents after they are released by the Electronic Frontier Foundation (see June 13, 2007) under the headline “AT&T ‘Spy Room’ Documents Unsealed; You’ve Already Seen Them.” Wired previously published them in May 2006 (see May 17, 2006), and PBS’s Frontline also published them as part of a televised documentary on Klein and the eavesdropping program. [Wired News, 6/13/2007]

Entity Tags: Mark Klein, AT&T, Anthony J. Coppolino, Los Angeles Times, US Department of Justice, New York Times, Electronic Frontier Foundation, Vaughn Walker, Wired News, National Security Agency

Timeline Tags: Civil Liberties

A map drawn by one of the defectors, showing his version of the Salman Pak facility.A map drawn by one of the defectors, showing his version of the Salman Pak facility. [Source: PBS]The story told by three Iraqi defectors in November 2001, of a terrorist training camp in Salman Pak, outside of Baghdad, has long been disproven (November 6-8, 2001) and one defector has been shown to have pretended to be former Iraqi general Jamal al-Ghurairy, the key source for the story. But only now are the news reporters and pundits beginning to acknowledge—however grudgingly—that they were duped, and that their credulous reportings helped cement the Bush administration’s fabricated case for invading Iraq. The story was one of at least 108 planted in the US and British press by the Iraqi National Congress (INC) between October 2001 and May 2002, a number audaciously provided by the INC itself in its attempts to persuade Congress to continue its funding (see June 26, 2002). The New York Times eventually admitted some faults with its prewar reporting, but only admitted that its coverage of the Salman Pak story had “never been independently verified.” PBS, similarly gulled by the defectors and their fraudulent claims (see October 2005), amended its Frontline Web site for its “Gunning for Saddam” story, which featured interviews with the defectors, to note that the defector’s claims have “not been substantiated,” and later will admit to the likelihood that its reporter, Christopher Buchanan, was duped. New York Times reporter Chris Hedges now says he took the word of producer Lowell Bergman as to the validity of the defector, and was further convinced by one of the defector’s military appearance. As for Bergman, Hedges says, “There has to be a level of trust between reporters. We cover each other’s sources when it’s a good story because otherwise everyone would get hold of it.” Hedges admits he was not aware at the time of how close Bergman, and other Times reporters such as Judith Miller, was to INC head Ahmed Chalabi. “I was on the periphery of all this. This was Bergman’s show.” [Mother Jones, 4/2006] In 2004, Hedges noted that he attempted to get confirmation from the US government about the defectors and their story, and government officials confirmed the claims: “We tried to vet the defectors and we didn’t get anything out of Washington that said ‘these guys are full of sh*t.’” [Columbia Journalism Review, 7/1/2004] Hedges says he later rejected an attempt by Chalabi to convince him that UN inspectors were spying for Saddam Hussein. He also says that he never believed the stories placing 9/11 hijacker Mohamed Atta in Prague (see April 8, 2001). He no longer trusts Chalabi as a source of information: “He’s a sleazy guy who I was not comfortable working around, but there was nothing right after 9/11 to indicate he was an outright liar.” [Mother Jones, 4/2006] Hedges notes that Chalabi seemed to have an “endless stable” of defectors to talk with reporters. “He had defectors for any story you wanted. He tried to introduce me to this guy who said he knew about Iraqi spies on the UN inspection teams: the guy was a thug. I didn’t trust either of them.” [Columbia Journalism Review, 7/1/2004] However, none of this uncertainty made it into Hedges’s Times report. Bergman says, “You’ve got to remember that back then there really was only one show in town, and that was Chalabi’s. If you were doing a story on Saddam’s Iraq, you would speak to the Iraqi government, the White House, and the INC.” Bergman tried to confirm the al-Ghurairy story with former CIA director and prominent neoconservative James Woolsey, and Woolsey told him that “al-Ghurairy” had met with the FBI in Ankara. (At the time, Woolsey was hardly a neutral source since it was already reported that he was aggressively trying to drum up connections between Iraq and al-Qaeda (see Late September 2001 and Mid-September-October 2001).) “Chalabi was dangerous goods in the sense you know he’s advocating war” Bergman recalls. “But that label is up-front. I think Chalabi is given too much credit for influencing the march to war.” Many conservative pundits still cite the al-Ghurairy tale as justification for the Iraq invasion. And the White House still lists “shutting down the Salman Pak training camp where members of many terrorist camps trained” in its “Progress Report on the Global War on Terrorism” Web page. In 2004, Chalabi boasted, “As far as we’re concerned, we’ve been entirely successful. That tyrant Saddam is gone, and the Americans are in Baghdad. What was said before is not important. The Bush administration is looking for a scapegoat. We’re ready to fall on our swords if he wants. We are heroes in error.” [Columbia Journalism Review, 7/1/2004; Mother Jones, 4/2006]

Entity Tags: Jamal al-Ghurairy, Chris Hedges, Bush administration (43), Ahmed Chalabi, Iraqi National Congress, Christopher Buchanan, Saddam Hussein, Mohamed Atta, New York Times, Public Broadcasting System, Lowell Bergman, Judith Miller, James Woolsey

Timeline Tags: Events Leading to Iraq Invasion

Special counsel Patrick Fitzgerald responds to the Lewis Libby defense team’s third motion to compel the discovery of a huge number of classified documents (see March 17, 2006), including Presidential Daily Briefings, the October 2002 National Intelligence Estimate on Iraq (see October 1, 2002), and a raft of CIA documents. Judge Reggie Walton has already allowed the discovery of some of the requested documents (see March 10, 2006). Fitzgerald writes that Libby is seeking “nearly every document generated by four large executive branch entities relating to Ambassador Joseph Wilson’s trip to Niger” (see February 21, 2002-March 4, 2002), and notes that such a request is overly broad, unnecessary for a perjury defense, and relies on an incorrect reading of the law. The request, Fitzgerald writes, “is premised on relevance arguments which overlook the fact that defendant is charged with perjury, not a conspiracy to commit various other crimes.” Hence the requsted documents go “far beyond the scope of what is relevant to the charges contained in the indictment.” [US District Court for the District of Columbia, 4/5/2006 pdf file; New York Sun, 4/7/2006]

Entity Tags: Lewis (“Scooter”) Libby, Joseph C. Wilson, Reggie B. Walton, Patrick J. Fitzgerald

Timeline Tags: Niger Uranium and Plame Outing

Court documents filed by the Justice Department allege that accused al-Qaeda sleeper agent Ali Saleh Kahlah al-Marri, a Qatari national, was chosen to come to the US by 9/11 mastermind Khalid Shaikh Mohammed because, in part, al-Marri has a wife and children, and therefore would arouse less suspicion. Al-Marri was taken into federal custody as a material witness to the attacks (see December 12, 2001) and later designated as a “enemy combatant” (see June 23, 2003). The Justice Department is battling a lawsuit filed by al-Marri’s lawyers challenging his detention. According to the Justice Department, al-Marri was told to arrive in the US before the attacks, and to head to Pakistan if he didn’t get inside the US in time. Al-Marri, his wife, and their five children arrived in the US on September 10, 2001, where he began taking courses at Bradley University in Peoria, Illinois. The new details come from declassified portions of a sworn statement that the government is using to justify al-Marri’s indefinite detention. The Bush administration has insisted on limiting the information available to detainees and to the public, but was pressured into releasing the al-Marri information after a federal magistrate told government lawyers in February that “the deck is stacked pretty good in favor of the government to start with,” and thusly he wouldn’t consider evidence about al-Marri that al-Marri and his lawyers were not permitted to view for themselves. The magistrate, Judge Robert Carr, is expected to soon recommend whether al-Marri should continue to be held as an enemy combatant. According to the declassified summary, al-Marri traveled to Dubai in August 2001 and was given somewhere between $10,000 and $13,000 plus $3,000 more for a laptop computer. Al-Marri was allegedly given the money by Mustafa Ahmed al-Hawsawi, an al-Qaeda paymaster and one of Mohammed’s lieutenants who also allegedly helped some of the 9/11 hijackers (see Early-Late June, 2001). When al-Marri was taken into custody, the computer was found to contain files on the manufacture of hydrogen cyanide as well as over a thousand credit card numbers. The documents say that Mohammed communicated about al-Marri’s activities in the US through his brother, Jaralla Saleh Mohamed Kahla al-Marri, currently being held at Guantanamo Bay. Jonathan Hafetz, one of Ali al-Marri’s lawyers, says that not only should al-Marri “been given this information long ago,” but because the government has not offered any evidence to support the summary, the document is little more than hearsay. Carr told government lawyers to either stop using classified information or declassify it so that al-Marri could see it and respond to it. “You need to make your choice, because this deals with a man’s freedom,” Carr tells the Justice Department lawyers. “He has been removed from the battlefield, so to speak, for many years.” [Chicago Tribune, 4/6/2006]

Entity Tags: US Department of Justice, Robert Carr, Khalid Shaikh Mohammed, Bradley University, Ali Saleh Kahlah al-Marri, Al-Qaeda, Mustafa Ahmed al-Hawsawi, Bush administration (43), Jonathan Hafetz, Jaralla Saleh Mohamed Kahla al-Marri

Timeline Tags: Torture of US Captives, Civil Liberties

The New York Times publishes its first report on the allegations by former AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), who is providing evidence and documentation to the Electronic Frontier Foundation (EFF) for that organization’s lawsuit against AT&T (see December 31, 2005 and January 31, 2006). The three-paragraph squib, buried deep in the pages of the “A” section, says that AT&T “cooperated with the National Security Agency in 2003 to install equipment capable of ‘vacuum-cleaner surveillance’ of email messages and other Internet traffic.” The report is based in part on a recent press release issued by Klein (see April 6, 2006), and notes the EFF lawsuit in passing. It admits that Klein has provided some of the documentation to the press, if not to the Times itself (see Mid-February - Late March, 2006), but simply writes that Klein’s documents “describe a room at the AT&T Internet and telephone hub in San Francisco that contained a piece of equipment that could sift through large volumes of Internet traffic.” Klein later calls the brevity and incompleteness of the report “puzzling,” and will say, “Their only purpose seemed to be to signal the government that I had ‘provided’ the New York Times with the documents, while minimizing the story for everyone else.” Klein will speculate, “It looked like some kind of backroom brawl was going on, but the public could not know the details.” [New York Times, 4/7/2006; Klein, 2009, pp. 70] A week later, the Times will publish a more in-depth article (see April 12, 2006).

Entity Tags: Mark Klein, AT&T, Electronic Frontier Foundation, New York Times, National Security Agency

Timeline Tags: Civil Liberties

Mushin Musa Matwalli Atwah.Mushin Musa Matwalli Atwah. [Source: FBI]Mohsin Musa Matawalli Atwah, an Egyptian al-Qaeda operative, is killed in a remote village in the North Waziristan region of Pakistan. There was a $5 million bountry for Atwah, who was wanted for involvement in the 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). Witnesses describe a missile strike followed by a Pakistani helicopter gunship attack. The attack is said to have killed nine people, including two young children. [Associated Press, 4/13/2006; CNN, 10/24/2006]

Entity Tags: Mushin Musa Matwalli Atwah

Timeline Tags: Complete 911 Timeline

Ty Cobb, the lawyer for fired CIA agent Mary McCarthy (see April 21, 2006), denies that his client leaked classified information to any reporter, and denies that his client gave any information about secret CIA prisons to Washington Post reporter Dana Priest (see November 2-18, 2005). A CIA source confirms Cobb’s statement, saying that the agency no longer asserts that McCarthy was one of Priest’s key sources. Instead, the agency now says it fired McCarthy because she had “undisclosed contacts” with Priest and other journalists. Such contacts violated her security agreement, agency officials say.
No Leaks of Classified Information - The original allegations that McCarthy revealed classified information to journalists are, apparently, no longer operational. Cobb says that McCarthy, who worked in the CIA inspector general’s office, “did not have access to the information she is accused of leaking,” namely the classified information about any secret detention centers in Europe. Cobb says that his client, who is 61, was just 10 days from retirement when she was fired, and had held senior positions at both the White House and the National Intelligence Council, is “devastated” over her firing. She believes her career will “forever be linked with misinformation about the reasons for her termination,” and, her lawyer says, her firing was “certainly not for the reasons attributed to the agency.” McCarthy had begun her retirement process in December 2005, and was planning on pursuing a legal career after leaving the agency. She will be allowed to retain her pension. A former intelligence official says, “Firing someone who was days away from retirement is the least serious action they could have taken.”
Firing Designed to Intimidate Others? - He adds, “That’s certainly enough to frighten those who remain in the agency.” The official is not the only one to believe that McCarthy was fired to intimidate other potential leakers and whistleblowers who may feel impelled to reveal questionable activities such as the CIA’s secret prison programs. Thomas Blanton, the director of George Washington University’s National Security Archive, says the Post articles about the secret prisons contained nothing that would warrant prosecution. “It’s the fact of the thing that they’re trying to keep secret, not to protect sources and methods, but to hide something controversial,” he says. “That seems like a hard prosecution to me.” Kate Martin, executive director of the Center for National Security Studies, says, “[E]ven if the espionage statutes were read to apply to leaks of information, we would say the First Amendment prohibits criminalizing leaks of information which reveal wrongful or illegal activities by the government.” [Washington Post, 4/25/2006] In 2007, former senior CIA case officer Valerie Plame Wilson will write, “By firing Mary, who was only 10 days away from retirement, the CIA management under [Director] Porter Goss was sending a clear signal that no one was to step out of line and if they did, the results would be harsh.” [Wilson, 2007, pp. 245-246]

Entity Tags: Kate Martin, Dana Priest, Ty Cobb, Central Intelligence Agency, Porter J. Goss, Valerie Plame Wilson, Tom Blanton, Mary McCarthy

Timeline Tags: Civil Liberties

Karl Rove discusses his testimony with his lawyers outside the grand jury chambers.Karl Rove discusses his testimony with his lawyers outside the grand jury chambers. [Source: CNN / ThinkProgress]White House deputy chief of staff Karl Rove testifies before special prosecutor Patrick Fitzgerald’s grand jury for a fifth time. Rove partially waives his attorney-client privilege with his attorney, Robert Luskin, to allow Luskin to testify about conversations he had with Rove concerning Rove’s knowledge of the leak of CIA agent Valerie Plame Wilson’s identity. Rove is also questioned extensively about the contradictions between his previous testimony and the testimony of Time reporter Matthew Cooper regarding Rove and Cooper’s July 2003 conversation about Plame Wilson (see 11:00 a.m. July 11, 2003), and his conversations with conservative columnist Robert Novak (see July 8, 2003, July 8 or 9, 2003, and July 14, 2003). [Washington Post, 4/27/2006; National Journal, 4/28/2006; Washington Post, 7/3/2007] According to Luskin, Rove “indirectly” confirmed Plame Wilson’s CIA status to Novak. [Washington Post, 7/15/2006]
Changing Stories - Rove is asked how he learned of Plame Wilson’s CIA status, and the circumstances surrounding his leaking of that information to Cooper. Rove tells the jury that when he told Cooper that Plame Wilson was a CIA agent, he was merely passing along unverified gossip. Cooper has testified that Rove told him that Plame Wilson was a CIA agent, and that she played a role in sending her husband, Joseph Wilson, on a fact-finding mission to Niger in 2002 (see February 21, 2002-March 4, 2002). Cooper has testified that both Rove and Lewis Libby, the former chief of staff for Vice President Dick Cheney, portrayed the information about Plame Wilson as definitive. It was because of their definitive statements, Cooper testified, that he identified Plame Wilson in a July 2003 story for Time (see July 17, 2003). In his first interview by the FBI, Rove failed to tell the investigators that he had talked to Cooper at all (see October 8, 2003); he again failed to disclose the conversation during his early appearances before the grand jury (see February 2004). Later, Rove testified that he did indeed speak with Cooper, and that his earlier failures to disclose the information were due to lapses in his memory (see October 15, 2004). In his fourth appearance before the grand jury, Rove testified that he revealed Plame Wilson’s identity to the reporter (see October 14, 2005), a recollection prompted by the discovery of an e-mail Rove sent to then-Deputy National Security Adviser Stephen Hadley soon after his leak to Cooper (see March 1, 2004). Rove has also testified that he learned of Plame Wilson’s CIA status from a journalist or journalists, a claim strongly contradicted by evidence. He has said in previous testimony that he may have learned of Plame Wilson’s identity from Novak, who outed Plame Wilson in a July 2003 column (see July 14, 2003). Novak, however, has testified that he learned of Plame Wilson’s identity from Libby and Rove. A person with first-hand knowledge of the grand jury proceedings will later comment, “If you believe both of them, Novak was saying that Rove was his source, and Rove was saying that Novak was his source.” [Washington Post, 4/27/2006; National Journal, 4/28/2006] Rove says that he still doesn’t remember talking to Cooper, though he does not dispute the e-mail he sent to Hadley. [Bloomberg, 4/28/2006] He argues that it would have been foolish for him to attempt to lie to the FBI and to the grand jury, because he knew that whatever lies he might have chosen to tell would have eventually been exposed, and he would then risk going to jail. [Washington Post, 4/27/2006] It is difficult to reconcile Rove’s “indirect” confirmation of Plame Wilson’s identity for Novak with his earlier claims that he learned of Plame Wilson’s CIA status from Novak.
Lawyer's Statement - Rove’s lawyer Robert Luskin says in a written statement: “Karl Rove appeared today before the grand jury investigating the disclosure of a CIA agent’s identity. He testified voluntarily and unconditionally at the request of special counsel Patrick Fitzgerald to explore a matter raised since Mr. Rove’s last appearance in October 2005 (see October 14, 2005). In connection with this appearance, the special counsel has advised Mr. Rove that he is not a target of the investigation. Mr. Fitzgerald has affirmed that he has made no decision concerning charges. At the request of the special counsel, Mr. Rove will not discuss the substance of his testimony.” [CNN, 4/26/2006; Washington Post, 4/27/2006]
Difficulties in Proving Intent - Law professor and former federal prosecutor Dan Richman says that while Fitzgerald may well be trying to build a case against Rove for either perjury or obstruction of justice, it may be quite difficult to prove Rove intended to lie to the grand jury. Rove’s subsequent appearances before the jury might “prove to be an obstacle to any [potential] obstruction or perjury case in that the person ultimately cooperated and told what he knew,” Richman says. [National Journal, 4/28/2006]

Entity Tags: Joseph C. Wilson, Matthew Cooper, Lewis (“Scooter”) Libby, Robert Luskin, Karl C. Rove, Valerie Plame Wilson, Dan Richman, Robert Novak, Patrick J. Fitzgerald, Stephen J. Hadley

Timeline Tags: Niger Uranium and Plame Outing

The Justice Department announces that it is invoking the “state secrets” clause to prevent a lawsuit by the Electronic Frontier Foundation (EFF) against AT&T from going forward (see March 9, 1953 and January 31, 2006). The EFF is suing AT&T for compromising its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s domestic surveillance program. The government alleges that the lawsuit would reveal “state secrets” critical to “national security” if it continues. The Justice Department makes its initial filing in mid-May (see May 13, 2006). [US District Court, Northern District of California, 4/28/2006 pdf file; Klein, 2009, pp. 71]

Entity Tags: Electronic Frontier Foundation, AT&T, National Security Agency, US Department of Justice

Timeline Tags: Civil Liberties

In May 2006, investigative reporters Joe and Susan Trento find that the CIA is continuing a pre-9/11 policy (see July 1990 and January 8, 2000) and deliberately keeping some suspected terrorists off the US international no-fly list, which is aimed at preventing terrorists from traveling to the US and other countries. In addition, it has an agreement with some airlines to allow suspected terrorists who are on the no-fly list to fly anyway. For example, it allows Rayed Abdullah, an associate of alleged 9/11 pilot Hani Hanjour, to fly to New Zealand, where he takes flying lessons (see February-May 30, 2006). The CIA, as well as the Defense Intelligence Agency, keeps some terrorists’ names off the no-fly list because they are already intelligence assets, others are allowed to fly because the CIA hopes to recruit them, and more are allowed to travel just because the CIA wants to see where they are going and who they will meet. In addition, others are kept off the no-fly list at the request of US allies like Pakistan and Saudi Arabia. A former CIA officer says: “I cannot describe to you how reluctant our operational people were to turn over names. Many terrorists act as assets for our case officers. We do deal with bad guys, and, like cops protect snitches, we protect ours, too, and none of those guys is going to show up on the no-fly list anytime soon. So we made a deal. The CIA effectively has the ability to allow people to fly who are on the no-fly list if we deem it in the national interest—just not on domestic airlines.” There are other problems with the no-fly list (see March 2006 and March 2006) and the CIA also penetrates the Federal Air Marshal Service to ensure that terrorists can fly openly without the marshals’ knowledge (see Before 2006). [Trento and Trento, 2006, pp. xiii, 187, 192-3]

Entity Tags: Central Intelligence Agency, Defense Intelligence Agency, Joseph Trento, Susan Trento

Timeline Tags: Complete 911 Timeline

Zacarias Moussaoui on his way to the Supermax prison.Zacarias Moussaoui on his way to the Supermax prison. [Source: WNBC / Jonathan Deinst]Zacarias Moussaoui is sentenced to life in prison for his role in the 9/11 attacks. A jury sentences him to six consecutive life terms without the possibility of parole. A single juror votes against the death penalty for one of the three counts for which Moussaoui is eligible to receive the death sentence (see March 6-May 4, 2006). For the other two counts, the vote is 10-2. According to the foreman of the jury, the lone dissenter did not identify his or herself to the other jurors during deliberations and consequently they could not discuss the person’s reasons for opposing the death penalty. “But there was no yelling. It was as if a heavy cloud of doom had fallen over the deliberation room, and many of us realized that all our beliefs and our conclusions were being vetoed by one person,” the foreman explains to the Washington Post. “We tried to discuss the pros and cons. But I would have to say that most of the arguments we heard around the deliberation table were [in favor of the death penalty]… Our sense was this was a done deal for that person and whoever that person is, they were consistent from the first day and their point of view didn’t change.” [Washington Post, 5/12/2006] As a result of the vote, Moussaoui will not be executed and instead will serve six life sentences at the Supermax prison in Florence, Colorado. A day after the sentencing, on May 5, Moussaoui files a motion to withdraw his guilty plea. He says that his March 27 testimony that he was supposed to have hijacked a fifth plane on September 11 and fly it into the White House “was a complete fabrication.” At sentencing the judge told him, “You do not have a right to appeal your convictions, as was explained to you when you plead guilty. You waived that right.” [Associated Press, 5/8/2006]

Entity Tags: Zacarias Moussaoui

Timeline Tags: Torture of US Captives, Complete 911 Timeline, 9/11 Timeline

CIA Director Porter Goss abruptly resigns “amid allegations that he and a top aide may have attended Watergate poker parties where bribes and prostitutes were provided to a corrupt congressman.” A senior law enforcement official says, “It’s all about the Duke Cunningham scandal.” Congressman Randall “Duke” Cunningham (R-CA) was sentenced to eight years in prison after pleading guilty in late 2005 to taking millions of dollars in bribes. Goss is replaced by General Michael Hayden, the former director of the NSA. [New York Daily News, 5/6/2006] The Bush administration gives no explanation for the resignation and even Goss publicly describes his own resignation as “just one of those mysteries.” [CNN, 5/6/2006] It is later learned that Goss’s resignation is spurred in part because of the controversy surrounding his chosen CIA Executive Director, Kyle “Dusty” Foggo. Foggo is being investigated for his connections to Cunningham. Both Foggo and Cunningham are being investigated by the office of US Attorney Carol Lam (see November 8, 2002). [Talking Points Memo, 2011] In 2007, former senior CIA analyst Valerie Plame Wilson will write: “Once John Negroponte became the de facto intelligence czar as director of national intelligence (DNI—see February 17, 2005)… Goss’s effectiveness, prestige, and daily access to the president had been considerably diminished. This, in turn, further degraded and undermined the organization he led. During a time of driving massive change, which Goss and other senior intelligence managers were attempting to do at the agency, effective and clear communication with all levels of the organization is critical. Goss failed completely at this task and the cost was high.… [H]e had been a poor fit from the beginning. In an underperforming bureaucracy such as the CIA, a strong leader, respected by the rank and file, is essential to managing needed change and modernization. On a personal note, I was not sorry to see him go.” [Wilson, 2007, pp. 247-248]

Entity Tags: Randall (“Duke”) Cunningham, Porter J. Goss, Valerie Plame Wilson, Michael Hayden, John Negroponte, Bush administration (43), Kyle Dustin “Dusty” Foggo, Carol C. Lam

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

The Wall Street Journal’s Stephen Moore interviews reclusive billionaire Charles Koch, the head of the Koch Brothers oil empire. Among the items of interest in the interview is Koch’s admission that he, along with his brother David (see 1977-Present, 1979-1980, 1981-2010, 1984 and After, and Late 2004), coordinates the funding of the conservative infrastructure of some of the most influential front groups, political campaigns, think tanks, media outlets, and other such efforts through a semiannual meeting with wealthy conservative donors. (Moore himself receives Koch funding for his work, according to a Think Progress report published four years later. In return, Moore is quite laudatory in the interview, writing that Koch is a “creative forward-thinking… professorial CEO” who “is immersed in the ideas of liberty and free markets.”) Koch tells Moore that his basic goal is to strengthen what he calls the “culture of prosperity” by eliminating “90 percent” of all laws and government regulations. Moore writes of the twice-yearly conference: “Mr. Koch’s latest crusade to spread the ideas of liberty has been his sponsorship of a twice-yearly conference that gathers together many of the most successful American entrepreneurs, from T. Boone Pickens to former Circuit City CEO Rick Sharp. The objective is to encourage these captains of industry to help fund free-market groups devoted to protecting the fragile infrastructure of liberty. That task seems especially critical given that so many of the global superrich, like George Soros and Warren Buffett, finance institutions that undermine the very system of capitalism that made their success possible (see January - November 2004). Isn’t this just the usual rich liberal guilt, I ask. ‘No,’ he says, ‘I think they simply haven’t been sufficiently exposed to the ideas of liberty.’” [Wall Street Journal, 5/6/2006; Think Progress, 10/20/2010]

Entity Tags: Think Progress (.org), Charles Koch, Wall Street Journal, David Koch, Stephen Moore

Timeline Tags: Civil Liberties

USA Today headline.USA Today headline. [Source: CBS News]USA Today reports that “[t]he National Security Agency (NSA) has been secretly collecting the phone call records of tens of millions of Americans, using data provided by the nation’s three biggest telecommunications providers, AT&T, Verizon, and BellSouth,” according to “people with direct knowledge of the arrangement.” None of the sources would allow USA Today to identify them by name, job, or affiliation. The USA Today story claims that the NSA program “does not involve the NSA listening to or recording conversations,” but does use “the data to analyze calling patterns in an effort to detect terrorist activity,” according to their sources. One source says that the NSA program is compiling “the largest database ever assembled in the world,” with the goal of creating “a database of every call ever made” within US borders. President Bush has said that the NSA program is focused exclusively on international calls, and for the calls to be recorded, “one end of the communication must be outside the United States.” However, this is now shown not to be the case (see January 16, 2004). A US intelligence official says that the NSA program is not recording the actual phone calls themselves, but is collecting what he calls “external” data about the communications to allow the agency to emply “social network analysis” for insight into how terrorist networks are connected with one another. Another large telecommunications company, Qwest, has refused to help the NSA eavesdrop on customer calls (see February 2001, February 2001 and Beyond, and February 27, 2001). USA Today’s sources say that the NSA eavesdropping program began after the 9/11 attacks, a claim that is not bolstered by the facts (see 1997, February 27, 2000, February 27, 2000, December 2000, February 2001, February 2001, February 2001 and Beyond, February 2001, Spring 2001, April 2001, April 4, 2001, July 2001, Before September 11, 2001, and Early 2002). The sources say that the three companies agreed to provide “call-detail records,” lists of their customers’ calling histories, and updates, which would allow the agency to track citizens’ calling habits. In return, the sources say, the NSA offered to pay the firms for their cooperation. After the three firms agreed to help the agency, USA Today writes, “the NSA’s domestic program began in earnest” (see After September 11, 2001, After September 11, 2001, October 2001, September 2002, and Spring 2004). NSA spokesman Don Weber says the agency is operating strictly “within the law,” but otherwise refuses to comment. Former US prosecutor Paul Butler says that the Foreign Intelligence Surveillance Act (FISA), which governs surveillance operations by US intelligence agencies, “does not prohibit the government from doing data mining” (see 1978). White House press spokesman Dana Perino says, “There is no domestic surveillance without court approval,” and all surveillance activities undertaken by government agencies “are lawful, necessary, and required for the pursuit of al-Qaeda and affiliated terrorists.” All government-sponsored intelligence activities “are carefully reviewed and monitored,” she adds, and says that “all appropriate members of Congress have been briefed on the intelligence efforts of the United States” (see October 11, 2001 and October 25, 2001 and November 14, 2001). Don Weber, a senior spokesman for the NSA, refuses to discuss the agency’s operations, saying: “Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues; therefore, we have no information to provide. However, it is important to note that NSA takes its legal responsibilities seriously and operates within the law.” All three firms released similar comments saying that they would not discuss “matters of national security,” but were complying with the law in their alleged cooperation with the NSA. The Electronic Frontier Foundation (EFF) is suing AT&T for what it calls its complicity in the NSA’s “illegal” domestic surveillance program (see January 31, 2006). [USA Today, 5/11/2006]

Entity Tags: Verizon Communications, USA Today, Qwest, Paul Butler, Foreign Intelligence Surveillance Act, Jane Harman, AT&T, BellSouth, National Security Agency, Dana Perino, Don Weber

Timeline Tags: Civil Liberties

Bobby Ray Inman.Bobby Ray Inman. [Source: DefenseTech.org]Former NSA director Bobby Ray Inman says that the secret NSA program to wiretap US citizens’ phone and e-mail conversations without court warrants (see After September 11, 2001) “is not authorized.” President Bush authorized the secret wiretapping over four years ago (see Early 2002), a program only revealed at the end of 2005 (see December 15, 2005). Since the program was revealed, it has created tremendous controversy over its possible illegality and its encroachment on fundamental American civil liberties. Bush and other White House officials have repeatedly asserted that the program is legal, mainly because Bush and his officials assert that the president has the authority to implement such a program (see December 15, 2005); Bush also insists, as recently as the day before Inman’s statement, that the program is only being used to spy on terrorists and the privacy of US citizens is being “fiercely protected,” a statement that does not jibe with the facts. [Democracy Now!, 5/12/2006]

Entity Tags: National Security Agency, Al-Qaeda, Bobby Ray Inman, Bush administration (43), George W. Bush

Timeline Tags: Civil Liberties

The Justice Department files a brief with the US District Court of Northern California asking that the Electronic Frontier Foundation (EFF)‘s lawsuit against AT&T (see January 31, 2006) be dismissed on the grounds that it would breach “state secrets” vital to “national security.” The Justice Department publicly announced its intentions of asking that the lawsuit be dismissed on those grounds two weeks ago (see April 28, 2006). EFF is suing AT&T for compromising its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s domestic surveillance program. The lawsuit is Hepting, et al v. AT&T, often shortened in the media to Hepting v. AT&T. The government submits a number of secret documents to Judge Vaughn Walker as evidence, along with a heavily redacted document submitted for public perusal. Other documents include affidavits from the Director of National Intelligence, John Negroponte, and the head of the NSA, Lieutenant General Keith Alexander. Some observers believe that Walker, a conservative appointed to the bench by President George H.W. Bush, will quickly comply with the government’s request. However, as AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009), who is working with EFF on the lawsuit (see Early January 2006), will later write, Vaughn is independent-minded and possessed of a “strong libertarian bent,” and will not be so prone to do the government’s bidding as some believe. [Klein, 2009, pp. 72-73] Walker’s first hearing on the brief will be held four days later (see May 17, 2006).

Entity Tags: John Negroponte, AT&T, Electronic Frontier Foundation, Keith Alexander, Mark Klein, US Department of Justice, Vaughn Walker, National Security Agency

Timeline Tags: Civil Liberties

A photograph of the copy of Wilson’s op-ed annotated by Dick Cheney.A photograph of the copy of Wilson’s op-ed annotated by Dick Cheney. [Source: Department of Justice / New York Times] (click image to enlarge)Special prosecutor Patrick Fitzgerald, pursuing charges that former vice-presidential chief of staff Lewis “Scooter” Libby lied to his grand jury about revealing the identity of CIA undercover agent Valerie Plame Wilson (see January 2004, March 5, 2004, and March 24, 2004), introduces into evidence a document that directly implicates Libby’s former boss, Vice President Dick Cheney, in Libby’s allegedly criminal behavior.
Notated Clipping - Fitzgerald submits an original clipping of a New York Times op-ed written by Plame Wilson’s husband, Joseph Wilson, challenging the Bush administration’s claims that Iraq had attempted to purchase uranium from Niger (see July 6, 2003). The clipping bears notations in Cheney’s own hand, as well as Cheney’s fingerprints. Cheney’s commentary reads: “Have they done this sort of thing before? [Cheney is referring to the CIA’s decision to send Wilson to Niger to investigate the uranium claims—see February 21, 2002-March 4, 2002.] Send an amb. to answer a question. Do we ordinarily send people out to do pro bono work for us? Or did his wife send him on a junket?” It is unclear when Cheney made the notes, but prosecutors believe they were taken before the July 14, 2003 column by Robert Novak that outed Plame Wilson (see July 14, 2003). According to Fitzgerald’s filing, Cheney’s copy of the op-ed is now “at the center of the sequence of events leading” to Libby’s alleged perjury and obstruction of justice. [CNN, 5/14/2006; New York Times, 5/14/2006; Newsweek, 5/16/2006]
'Acutely Focused' Attention of Cheney, Libby on Wilson - The filing goes on to state that Cheney’s notes support the idea that Wilson’s op-ed drew the attention of Cheney and Libby, and “acutely focused” their attention on Wilson’s assertions “and on responding to those assertions.… The article, and the fact that it contained certain criticisms of the administration, including criticism regarding issues dealt with by the Office of the Vice President, serve both to explain the context of, and provide the motive for, many of the defendant’s statements and actions at issue in this case. The annotated version of the article reflects the contemporaneous reaction of the vice president to Mr. Wilson’s op-ed article, and thus is relevant to establishing some of the facts that were viewed as important by the defendant’s immediate superior, including whether Mr. Wilson’s wife had sent him on a junket.” [CNN, 5/14/2006; Newsweek, 5/16/2006] Libby testified before the grand jury about the annotated op-ed, and that testimony is now entered into evidence. Libby said he recalled discussing the issues with Cheney, and said of those conversations: “I recall that along the way he asked, ‘Is this normal for them to just send somebody out like this uncompensated, as it says?’ He was interested in how did that person come to be selected for this mission. And at some point, his wife worked at the agency, you know, that was part of the question.” A prosecutor asked Libby, “Was it a topic that was discussed on a daily basis… on multiple occasions each day in fact?” Libby answered, “Yes, sir.” Libby acknowledged that during that time, Cheney indicated that he was upset about the Wilson article and what he considered to be false attacks on his credibility, saying: “I recall that he was very keen to get the truth out. He wanted to get all the facts out about what he [Cheney] had or hadn’t done—what the facts were or were not. He was very keen on that and said it repeatedly. ‘Let’s get everything out.’” During his testimony before the grand jury, prosecutors did not believe Libby’s assertion that Cheney might have “scribbled” notes on the Wilson op-ed on July 14, the day Novak’s column was published. Libby testified: “And I think what may have happened here is what he may have—I don’t know if he wrote, he wrote the points down. He might have pulled out the column to think about the problem and written on it, but I don’t know. You’ll have to ask him.” [National Journal, 1/12/2007]
Cheney's Other Actions - Fitzgerald has already asserted that Cheney had attempted to pass Wilson’s trip to Niger off as a “junket”—essentially a taxpayer-funded excursion with little real purpose—to discredit Wilson’s claims about the Iraq-Niger affair. Fitzgerald has also asserted that Cheney, acting with the approval of President Bush, authorized Libby to disclose some of the classfied portions of the 2002 National Intelligence Estimate on Iraq (see October 1, 2002, June 23, 2003, 8:30 a.m. July 8, 2003, and Late Afternoon, July 12, 2003) to reporters to rebut some of Wilson’s claims. The Cheney notes provide, in reporter Michael Isikoff’s words, “significant new context to that assertion.” The notes show that Cheney had “personally raised questions about Wilson’s trip right after the publication of the Wilson column—and five days before Libby confirmed to Time reporter Matt Cooper that he had ‘heard’ that Wilson’s wife… had played a role in sending him to Africa” (see July 13, 2005). [CNN, 5/14/2006; Newsweek, 5/16/2006]
Cheney 'at Center of Campaign to Discredit Wilson' - Authors Lou Dubose and Jake Bernstein later write, “The annotation places Cheney at the center of the campaign to discredit Wilson, aware early on that Wilson’s wife was a CIA agent.” [Dubose and Bernstein, 2006, pp. 217] Plame Wilson herself will write: “Given Cheney’s vaunted decades of government service, it is frankly unbelievable that he would ask such questions. He would have known that the CIA frequently sends US citizens abroad, on a pro bono basis, to answer specific intelligence questions. It is even quite possible that the CIA debriefed employees of Halliburton, the multinational company that Cheney headed prior to becoming vice president, when they returned from business trips in restricted countries of interest to the United States. Cheney’s marginal notes should be more accurately interpreted as marching orders to staff on how to spin Joe’s story so that Cheney could stay as far from it as possible while simultaneously undermining Joe’s credibility.” (Emphasis in the original.) [Wilson, 2007, pp. 288]

Entity Tags: George W. Bush, Michael Isikoff, Jake Bernstein, Joseph C. Wilson, Lewis (“Scooter”) Libby, Lou Dubose, Valerie Plame Wilson, Office of the Vice President, Patrick J. Fitzgerald, Matthew Cooper, Richard (“Dick”) Cheney, Robert Novak

Timeline Tags: Niger Uranium and Plame Outing

Wired News, the online technical news site, publishes a copy of AT&T whistleblower Mark Klein’s unclassified memo written in 2004 (see January 16, 2004). Klein has joined the Electronic Frontier Foundation (EFF) in its lawsuit against AT&T. Klein has evidence that AT&T colluded with the National Security Agency (NSA) to illegally wiretap Americans’ domestic telephone and Internet communications. [Wired News, 5/17/2006]

Entity Tags: Electronic Frontier Foundation, AT&T, National Security Agency, Mark Klein, Wired News

Timeline Tags: Civil Liberties

Former NSA director and soon-to-be CIA director Michael Hayden says that a program in which the NSA listens in on calls between the US and other countries without obtaining warrants would have prevented 9/11, had it been in place then. Hayden tells a Senate hearing discussing his confirmation as CIA director, “Had this been in place prior to the attacks, the two hijackers who were in San Diego, Khalid Almihdhar and Nawaf Alhazmi, almost certainly would have been identified as who they were, what they were, and most importantly, where they were.” Hayden also says, “I can demonstrate in closed session how the physics and the math would work.” [US Congress, 5/18/2006 pdf file] However, the NSA actually intercepted the calls between Alhazmi and Almihdhar in the US and an al-Qaeda communications hub in Yemen (see Early 2000-Summer 2001), which it knew had been in contact with Osama bin Laden (see November 1996-Late August 1998) and was also involved in the East African embassy bombings (see August 4-25, 1998) and the attack on the USS Cole (see Mid-August 1998-October 2000). Before 9/11, the NSA was entitled to pass on information about the calls to the FBI, but did not do so, even though the FBI had specifically asked for information about calls between the communications hub in Yemen and the US (see Late 1998 and (Spring 2000)). Various explanations for this failure are offered after 9/11 (see Summer 2002-Summer 2004 and March 15, 2004 and After).

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Attorney General Alberto Gonzales says that the government has the right to prosecute journalists for publishing classified information. “There are some statutes on the book which, if you read the language carefully, would seem to indicate that that is a possibility,” he says during an ABC News interview. “That’s a policy judgment by the Congress in passing that kind of legislation. We have an obligation to enforce those laws. We have an obligation to ensure that our national security is protected.” Asked if he is considering prosecuting the New York Times for revealing the Bush administration’s warrantless wiretapping program (see December 15, 2005), Gonzales says the Justice Department is trying to determine “the appropriate course of action in that particular case.” He continues: “I’m not going to talk about it specifically. We have an obligation to enforce the law and to prosecute those who engage in criminal activity.” Experts believe that Gonzales is probably referring to the 1917 Espionage Act, which prohibits government officials from passing classified information to anyone without proper clearance; those same experts say that the Espionage Act was never intended to apply to the press. Furthermore, journalists are protected from such prosecution by the First Amendment. Gonzales says that while the Bush administration respects the right of freedom of the press, “it can’t be the case that that right trumps over the right that Americans would like to see, the ability of the federal government to go after criminal activity.” [New York Times, 5/22/2006] Thirty years ago, then-White House chief of staff Dick Cheney recommended such prosecution against a journalist who revealed the existence of a Cold War-era submarine program (see May 25, 1975). In 2007, reporter and author Charlie Savage will write that in 1975, the attorney general had scuttled the idea. Now, the attorney general is embracing the idea. [Savage, 2007, pp. 175-176]

Entity Tags: US Department of Justice, Alberto R. Gonzales, Bush administration (43), New York Times, Charlie Savage, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

Wired News logo.Wired News logo. [Source: Delve Networks]Evan Hansen, the editor in chief of Wired News, an online technical news site, explains why the site published a set of documents from AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009). Klein is working with the Electronic Frontier Foundation (EFF) in that organization’s lawsuit against AT&T for invading its customers’ privacy by taking part in the National Security Agency’s warrantless domestic wiretap operation (see January 31, 2006). The presiding judge, Vaughn Walker, has denied requests from the EFF and a number of news organizations to unseal the documents and make them public. For its part, AT&T wants the documents to remain sealed, claiming they are proprietary and that it would suffer harm if they were disclosed (see April 6-8, 2006). Hansen and the Wired News senior staff disagree. “In addition,” Hansen writes, “we believe the public’s right to know the full facts in this case outweighs AT&T’s claims to secrecy.” Hansen erroneously says that the documents seem “to be excerpted from material that was later filed in the lawsuit under seal,” though “we can’t be entirely sure, because the protective order prevents us from comparing the two sets of documents.” Klein later writes that the Wired News staff “confused my 2004 memo (see January 16, 2004) with my court-sealed legal declaration” (see February 23-28, 2006); even so, Klein will write, “it was true that all of the AT&T documents were still under court seal.” Hansen says Wired News reporter Ryan Singel received the Klein documents from “an anonymous source close to the litigation.” Hansen also writes: “We are filing a motion to intervene in the case in order to request that the court unseal the evidence, joining other news and civil rights organizations that have already done so, including the EFF, the San Francisco Chronicle, the Los Angeles Times, the San Jose Mercury News, the Associated Press, and Bloomberg. Before publishing these documents we showed them to independent security experts, who agreed they pose no significant danger to AT&T. For example, they do not reveal information that hackers might use to easily attack the company’s systems.” Hansen writes that Wired’s publication of the documents does not violate Walker’s gag order concerning the documents’ publication, as the order specifically bars the EFF and its representatives—and no one else—from publishing or discussing them. “The court explicitly rejected AT&T’s motion to include Klein in the gag order and declined AT&T’s request to force the EFF to return the documents,” he notes (see May 17, 2006). [Wired News, 5/22/2006; Klein, 2009, pp. 75]

Entity Tags: Vaughn Walker, AT&T, Electronic Frontier Foundation, Evan Hansen, Mark Klein, Ryan Singel, Wired News, National Security Agency

Timeline Tags: Civil Liberties

A new 5-minute audiotape is released by a person said to be Osama bin Laden. The voice on the tape says that Zacarias Moussaoui and the vast majority of prisoners held in Guantanamo Bay had nothing to do with 9/11. The speaker says that Moussaoui “has no connection whatsoever with the events of September 11th” and “his confession that he was assigned to participate in those raids is a false confession which no intelligent person doubts is a result of the pressure put upon him for the past four and a half years.” The voice also says that, as Moussaoui has not named a support team, he cannot have been slated to pilot a hijacked airliner, and that, as he was learning to fly, he cannot have been intended to be the 20th hijacker. Further, if Moussaoui had known the 9/11 group, he would have called lead hijacker Mohamed Atta and told him to flee the country (note: jail house calls can be recorded, so this may not have been wise (see August 17, 2001)). There are various theories about Moussaoui’s closeness to the 9/11 plot, but he was supported by some of the people who supported the hijackers (see January 30, 2003). The speaker also says that the detainees in Guantanamo Bay “have no connection whatsoever to the events of September 11th, and even stranger is that many of them have no connection with al-Qaeda in the first place, and even more amazing is that some of them oppose al-Qaeda’s methodology of calling for war with America.” The apparent reason so many detainees are being held: ”(I)t is necessary to create justifications for the massive spending of hundreds of billions on the Defense Department and other agencies in their war against the Mujaheddin.” [MSNBC, 5/23/2006] One Guantanamo detainee, Mohamed al-Khatani, was allegedly supposed to meet lead hijacker Mohamed Atta in the US, but was refused entry to the country, indicating that he was scheduled to be involved in 9/11 (see August 4, 2001 and July 2002).

Entity Tags: Osama bin Laden, Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

AT&T lawyers accidentally release sensitive information in their defense of a lawsuit accusing AT&T and two other telecommunications firms of illegally cooperating with an NSA wiretapping program (see January 31, 2006). They release a 25-page legal brief, heavily redacted with thick black lines intended to obscure portions of three pages, in PDF (Portable Data File) format. But some software programs can read the text. The redacted information offers alternative reasons why AT&T has a secret room in its downtown San Francisco switching center designed to monitor Internet and telephone traffic (see February 2001). The Electronic Frontier Foundation, who filed the lawsuit, says the room is used by the NSA surveillance program. The redacted sections argue that the room could be used for “legitimate Internet monitoring systems, such as those used to detect viruses and stop hackers.” Another argument reads, “Although the plaintiffs ominously refer to the equipment as the ‘Surveillance Configuration,’ the same physical equipment could be utilized exclusively for other surveillance in full compliance with” the Foreign Intelligence Surveillance Act (FISA). The court filing is not classified, and no information relating to the actual operations of the NSA’s surveillance program is disclosed. [US District Court, Northern District of California, San Francisco Division, 5/24/2006 pdf file; US District Court, Northern District of California, San Francisco Division, 5/24/2006; CNET News, 5/26/2006]

Entity Tags: National Security Agency, Electronic Frontier Foundation, AT&T

Timeline Tags: Civil Liberties

The Bush administration submits a legal brief arguing that the Electronic Frontier Foundation’s lawsuit against AT&T, alleging that firm cooperated with the NSA’s domestic surveillance program (see January 31, 2006), should be thrown out of court because of the government’s “state secrets” privilege (see March 9, 1953). Justice Department lawyers want Judge Vaughn Walker to examine classified documents that they say will convince him to dismiss the lawsuit. However, the government does not want the defense lawyers to see that material. “No aspect of this case can be litigated without disclosing state secrets,” the government argues. “The United States has not lightly invoked the state secrets privilege, and the weighty reasons for asserting the privilege are apparent from the classified material submitted in support of its assertion.” [CNET News, 5/26/2006]

Entity Tags: US Department of Justice, Electronic Frontier Foundation, AT&T, Vaughn Walker, Bush administration (43)

Timeline Tags: Civil Liberties

Judge Reggie Walton issues an order disallowing, in large part, the Libby defense team’s motions to compel discovery of an array of government classified documents (see March 17, 2006, April 5, 2006, May 12, 2006, and May 19, 2006). “[T]he defendant’s motion to compel is largely without merit,” Walton writes. He recognizes that the charges against Lewis Libby are impacted by former ambassador Joseph Wilson’s criticism of the Iraq invasion (see July 6, 2003), Wilson’s trip to Niger (see February 21, 2002-March 4, 2002), and the exposure of Wilson’s wife, Valerie Plame Wilson, as a CIA official (see July 14, 2003). Walton intends to allow a “limited” amount of evidence to be admitted in regards to these concerns, but, he writes, “these events have merely an abstract relationship to the charged offenses.” [US District Court for the District of Columbia, 6/2/2006 pdf file] Walton also compels prosecutor Patrick Fitzgerald to turn over “substitutes” for classified documents pertaining to Plame Wilson’s employment history with the CIA, potential damage caused by Plame Wilson’s identity disclosure, and the names of “three individuals whose identities were redacted from classified documents previously made available to the defense.” [US District Court for the District of Columbia, 6/2/2006 pdf file] According to Salon’s Tim Grieve, Walton is clearly siding with Fitzgerald’s “small case” view over the Libby team’s “big case” view (see May 10, 2006), focusing primarily on the issue of Libby’s alleged perjury and disallowing Libby’s efforts to refocus the case on the Bush administration’s response to criticisms of its handling of the Iraq war. [Salon, 6/2/2006]

Entity Tags: Joseph C. Wilson, Reggie B. Walton, Lewis (“Scooter”) Libby, Valerie Plame Wilson, Tim Grieve, Patrick J. Fitzgerald

Timeline Tags: Niger Uranium and Plame Outing

George Terwilliger, a former deputy attorney general under George H. W. Bush, argues that the current Bush administration’s controversial data mining program (see Late 1999 and After September 11, 2001) is not illegal. Terwilliger tells the conservative National Review, “I think it’s fair to say that the statutes contemplate the transfer of this generic type of data much more on a case-by-case rather than a wholesale basis,” meaning that the law calls for a court order only in cases when the government is making a targeted request for information. But, he adds, “I don’t see anything in the statute that forbids such a wholesale turnover.” Terwilliger’s argument echoes the arguments of the Bush Justice Department, which argues that the data mining program—part of the NSA’s “Stellar Wind” surveillance program (see Spring 2004 and December 15, 2005)—does not technically constitute “electronic surveillance” under the law. Both the Fourth Amendment and the Foreign Intelligence Surveillance Act, as interpreted by the courts, define such actions as “electronic surveillance,” according to a number of legal experts, including law professor Orin Kerr. And, Ars Technica reporter Julian Sanchez notes in 2009, “the Stored Communications Act explicitly makes it a crime to ‘knowingly divulge a record or other information pertaining to a subscriber to or customer of such service… to any governmental entity.’” Sanchez will call Terwilliger’s argument “very strange,” but will note that Terwilliger is the attorney for then-Attorney General Alberto Gonzales and “a prominent defender of the administration’s surveillance policies.” Sanchez will conclude that while the argument “might pass for clever in a high school debate round… [i]t would be deeply unsettling if it [passes] for anything more in the halls of power.” [National Review, 6/5/2006; Ars Technica, 12/16/2008]

Entity Tags: US Department of Justice, Alberto R. Gonzales, ’Stellar Wind’, Bush administration (43), National Security Agency, Foreign Intelligence Surveillance Act, Julian Sanchez, George Terwilliger, Orin S. Kerr

Timeline Tags: Civil Liberties

The dead Abu Musab al-Zarqawi.The dead Abu Musab al-Zarqawi. [Source: US army]Abu Musab al-Zarqawi, the supposed leader of al-Qaeda in Iraq, is apparently killed in a US airstrike north of Baghdad. There are contradictory details of what exactly happened in the airstrike, and three days later the Washington Post will report that “circumstances surrounding the killing [remain] cloudy.” [Washington Post, 6/10/2006] His killing is hailed by US and Iraqi officials as the most significant public triumph for US-allied forces since the 2003 capture of Saddam Hussein. For instance, Defense Secretary Rumsfeld calls him “the leading terrorist in Iraq and one of three senior al-Qaeda leaders worldwide.” The Washington Post calls al-Zarqawi the “mastermind behind hundreds of bombings, kidnappings and beheadings in Iraq.” [Washington Post, 6/8/2006; Washington Post, 6/10/2006] These pronouncements and media reports ignore a revelation made two months earlier by the Washington Post that the US military has been engaged in a propaganda campaign to exaggerate al-Zarqawi’s importance. The newspaper had reported that Zarqawi wasn’t behind nearly as many attacks as commonly reported (see October 4, 2004 and April 10, 2006). Even a Washington Post article about the propaganda surrounding al-Zarqawi published two days after his death will fail to mention any of the details provided in the Post’s original reporting on the campaign. [Washington Post, 6/10/2006] Later in the month, an audiotape surfaces in which bin Laden supposedly praises al-Zarqawi as a martyr (see June 30, 2006), calling him a “brave knight” and a “lion of jihad.” US officials say the tape is genuine, however it should be noted that a letter from 2004 said to tie al-Zarqawi to al-Qaeda leadership is believed by many experts to be a US-government promoted hoax (see April 10, 2006). [Washington Post, 6/30/2006] Al-Zarqawi did pledge loyalty to bin Laden in 2004, but they don’t appear to have been closely linked before then and there even are doubts about how close their relationship was after that time (see October 17, 2004).

Entity Tags: Al-Qaeda, Abu Musab al-Zarqawi, Donald Rumsfeld, Osama bin Laden

Timeline Tags: Complete 911 Timeline, Iraq under US Occupation

Joseph Wilson poses with Yearly Kos participant Natasha Chart.Joseph Wilson poses with Yearly Kos participant Natasha Chart. [Source: Pacific Views (.org)]Former ambassador Joseph Wilson, who became the target of a White House smear campaign after he publicly criticized the government’s push for war with Iraq (see June 2003, June 3, 2003, June 11, 2003, June 12, 2003, June 19 or 20, 2003, July 6, 2003, July 6-10, 2003, July 7, 2003 or Shortly After, 8:45 a.m. July 7, 2003, 9:22 a.m. July 7, 2003, July 7-8, 2003, July 11, 2003, (July 11, 2003), July 12, 2003, July 12, 2003, July 18, 2003, October 1, 2003, April 5, 2006, and April 9, 2006), receives a standing ovation from the audience at his appearance at the Yearly Kos convention in Las Vegas. The convention is a group of bloggers and citizen journalists, mostly liberals and progressives, organized by the Daily Kos Web site. About a thousand convention goers gather to hear Wilson speak during one of the day’s panel discussions. Wilson says he will not be intimidated by what he calls a White House campaign to obscure lies told during the run-up to the war in Iraq. “We must and we can stand up to the schoolyard bullies and insure that these decisions on war and peace and other major issues are undertaken with the consent of the governed,” he says. Wilson goes on to say that the indictment of former White House official Lewis Libby (see October 28, 2005) and the disclosures about the case that have come in subsequent court filings have vindicated him against critics who claim he lied or misrepresented the facts surrounding his 2002 mission to Africa (see February 21, 2002-March 4, 2002 and July 6, 2003). “As facts emerge, of course, the dwindling number of those who still believe the thesis of ‘Wilson is a liar, or has been discredited,’ are either victims of the ongoing disinformation campaign or the willful perpetrators of it,” he says. Wilson affirms that neither he nor his wife, exposed CIA official Valerie Plame Wilson, intend to run for elective office. “I can assure you that neither she [nor] I intend to do anything other than return to our private lives,” he says.
Former CIA Agent Reaffirms Damage Done by Plame Wilson's Exposure - One of Wilson’s panel colleagues, former CIA agent and State Department official Larry Johnson (see September 30, 2003, October 3, 2003, October 11, 2003, October 22-24, 2003, and October 23-24, 2003), says partisan Republicans have lost sight of the gravity of what he believes was a deliberate campaign to expose Plame Wilson’s status for political reasons. “How it is that conservative Republicans can excuse what is nothing short of treason is beyond me,” he says. Johnson describes himself as “a lifelong conservative.” He reiterates his earlier statements that Plame Wilson was not publicly known as a CIA official before being “outed” by columnist Robert Novak (see July 14, 2003). “Valerie Plame, Valerie Wilson was an undercover CIA officer until the day her name appeared in Robert Novak’s column,” Johnson says. Libby’s lawyers have said they have witnesses who will testify that Plame Wilson’s CIA affiliation was known outside the government, but they have not identified those witnesses. Plame Wilson’s exposure did “damage… to the intelligence operations of the Central Intelligence Agency and ultimately to the security of this nation,” Johnson tells the audience. White House political strategist Karl Rove, whom Wilson once said should be “frog marched” out of the White House in handcuffs (see August 21, 2003), should have his security clearance revoked and be fired, Johnson says, regardless of whether he is indicted.
Journalists: Media Did Not Do Its Job in Covering Story - Another panel member, the Washington Post’s Dan Froomkin, says journalists have become so preoccupied by the jailing of fellow reporter Judith Miller (see October 7, 2004) that they have lost sight of the broader story. “The really sad moment for journalism here is, faced with this incredibly important story, reporters didn’t go out and develop sources for this story,” he says. “This is a hell of a story.” Froomkin calls Miller “a humiliated and discredited shill,” presumably for the Bush administration. Fellow panel member Murray Waas of the National Journal says most major news outlets have not adequately covered the story. “There’s no reporter for any major news organization covering it even one or two days a week,” he says. “I don’t know why.” Waas says that perhaps some editors have ignored the story because it involves leaks to reporters at those same news outlets. “Their own role is so comprised that they hope it just goes away,” he says. [New York Sun, 6/10/2006]

Entity Tags: Karl C. Rove, Daily Kos, Central Intelligence Agency, Bush administration (43), Dan Froomkin, Judith Miller, Larry C. Johnson, Robert Novak, Joseph C. Wilson, Valerie Plame Wilson, Murray Waas

Timeline Tags: Niger Uranium and Plame Outing

In a follow-up hearing, Judge Vaughn Walker of the US District Court of Northern California hears arguments by AT&T and the Justice Department as to whether he should dismiss a lawsuit against AT&T by the Electronic Frontier Foundation (EFF—see January 31, 2006). The EFF argues that AT&T violated its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s allegedly illegal domestic wiretapping project. The government asserts that the lawsuit would jeopardize “state secrets” if permitted to go forward (see May 22, 2006). In today’s hearing, Justice Department lawyer Peter Keisler admits to Walker that the documents presented on behalf of the EFF by AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) and others are not classified. “None of the documents they (EFF) have submitted… implicate any privileged [classified] matters,” Keisler tells Walker. The judge says, “Including the Klein documents.” Keisler agrees, saying: “We have not asserted any privilege over the information that is in the Klein and Marcus (see March 29, 2006) documents.… Mr. Klein and Marcus never had access to any of the relevant classified information here, and with all respect to them, through no fault or failure of their own, they don’t know anything.” Klein will later write that Keisler’s admission is a crippling blow to the government’s assertion that the EFF documentation would compromise national security if made public or submitted in open court. [Klein, 2009, pp. 77]

Entity Tags: US Department of Justice, AT&T, Electronic Frontier Foundation, Mark Klein, Vaughn Walker, National Security Agency, Peter Keisler

Timeline Tags: Civil Liberties

Lawyers file court documents alleging that the National Security Agency (NSA) worked with AT&T to set up a domestic wiretapping site seven months before the 9/11 attacks. The papers are filed as part of a lawsuit, McMurray v. Verizon Communications, which cites as plaintiffs AT&T, Verizon, and BellSouth customers whose privacy was allegedly violated by the NSA warrantless wiretapping program (see May 12, 2006); it also alleges that the firms, along with the NSA and President Bush, violated the Telecommunications Act of 1934 and the US Constitution. AT&T, Verizon, and BellSouth have been accused of working with the NSA to set up domestic call monitoring sites (see October 2001). Evidence that the NSA set up domestic surveillance operations at least seven months before the 9/11 attacks is at the core of the lawsuit (see Spring 2001). The suit is similar to one filed against AT&T by the Electronic Frontier Foundation (EFF—see January 31, 2006) and other such lawsuits. A lawyer for the plaintiffs in McMurray, Carl Mayer, says: “The Bush administration asserted this [the warrantless wiretapping program] became necessary after 9/11. This undermines that assertion.” AT&T spokesman Dave Pacholczyk responds, “The US Department of Justice has stated that AT&T may neither confirm nor deny AT&T’s participation in the alleged NSA program because doing so would cause ‘exceptionally grave harm to national security’ and would violate both civil and criminal statutes.” Verizon has denied being asked by the NSA for its customer phone records, and has refused to confirm or deny “whether it has any relationship to the classified NSA program.” BellSouth spokesman Jeff Battcher says: “We never turned over any records to the NSA. We’ve been clear all along that they’ve never contacted us. Nobody in our company has ever had any contact with the NSA.” The NSA domestic wiretapping program is known as “Pioneer Groundbreaker,” a part of the larger “Project Groundbreaker” (see February 2001). According to Mayer and his fellow lawyer Bruce Afran, an unnamed former employee of AT&T provided them with information about NSA’s approach to AT&T. (That former employee will later be revealed as retired technician Mark Klein—see Late 2002, July 7, 2009, December 15-31, 2005, and April 6, 2006). The lawsuit is on a temporary hiatus while a judicial panel rules on a government request to assign all of the telecommunications lawsuits to a single judge. [Bloomberg, 6/30/2006]

Entity Tags: Verizon Wireless, US Department of Justice, National Security Agency, George W. Bush, Jeff Battcher, Bruce Afran, BellSouth, AT&T, Mark Klein, Carl Mayer, Electronic Frontier Foundation, Dave Pacholczyk

Timeline Tags: Civil Liberties

At a campaign luncheon for Representative Scott Garrett (R-NJ), Vice President Dick Cheney lambasts the New York Times for reporting information that the administration wants kept secret. “Some in the press, in particular the New York Times, have made it harder to defend America against attack by insisting on publishing detailed information about vital national security programs,” he says. “First they reported the terrorist surveillance program (see March 2002), which monitors international communications when one end is outside the United States and one end is connected with or associated with al-Qaeda. Now the Times has disclosed the terrorist financial tracking program. On both occasions, the Times had been asked not to publish those stories by senior administration officials (see December 15, 2005). They went ahead anyway. The leaks to the New York Times and the publishing of those leaks is very damaging to our national security. The ability to intercept al-Qaeda communications and to track their sources of financing are essential if we’re going to successfully prosecute the global war on terror. Our capabilities in these areas help explain why we have been so successful in preventing further attacks like 9/11. And putting this information on the front page makes it more difficult for us to prevent future attacks. Publishing this highly classified information about our sources and methods for collecting intelligence will enable the terrorists to look for ways to defeat our efforts. These kinds of stories also adversely affect our relationships with people who work with us against the terrorists. In the future, they will be less likely to cooperate if they think the United States is incapable of keeping secrets.” [White House, 6/30/2006]

Entity Tags: Scott Garrett, New York Times, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties, Domestic Propaganda

Page 22 of 29 (2835 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike