!! History Commons Alert, Exciting News

Context of 'March 12-Mid-2004: NSA Wiretapping Program Temporarily Suspended, Reviewed by Justice Department'

This is a scalable context timeline. It contains events related to the event March 12-Mid-2004: NSA Wiretapping Program Temporarily Suspended, Reviewed by Justice Department. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 4 (317 events)
previous | 1, 2, 3, 4 | next

A B-29 bomber similar to the one that crashed in Georgia.A B-29 bomber similar to the one that crashed in Georgia. [Source: Global Security (.org)]A test flight for the Air Force’s Project Banshee, located at Robins Air Force Base in Georgia, is set for 8:30 a.m. Banshee is an attempt begun in 1946 to develop and deploy a long-range missile ahead of both the Soviet Union and rival US military branches. The airplane used in the test flight crashes less than an hour into its flight, killing 9 of the 13 aboard.
Maintenance Problems - The plane assigned for the flight is a B-29 Stratofortress, a bomber made famous by its delivery of the atomic bombs to Hiroshima and Nagasaki at the end of World War II. B-29s are notoriously difficult to fly and maintain: their four wing-mounted engines almost routinely overheat and catch fire, causing engine shutdowns, sudden drops in altitude, and, often, crashes. The engines’ eighteen cylinders lack sufficient airflow to keep them cool, and the overheating often causes the crankcases, made of light but highly flammable magnesium, to burst into flames. Like so many of its brethren, the plane has suffered its share of maintenance issues, and is flying without numerous recommended maintenance and repair tasks being performed. Just five days before, it had been designated “red cross”—grounded and unfit for service. It was allowed to fly through an “exceptional release” signed by the squadron commander.
Crew Difficulties - The flight is moved back to the afternoon after some crew members fail to show up on time, and to allow last-minute repairs to be made. By takeoff, the flight crew is assembled: Captain Ralph Erwin; co-pilot Herbert W. Moore; flight engineer Earl Murrhee; First Lieutenant Lawrence Pence, Jr, the navigator; Sergeant Walter Peny, the left scanner; Sergeant Jack York, the right scanner; Sergeant Melvin Walker, the radio operator; and Sergeant Derwood Irvin, manning the bombsight and autopilot. The crew is joined by civilian engineers assigned to Banshee: Al Palya and Robert Reynolds from RCA, William Brauner and Eugene Mechler from the Franklin Institute, and Richard Cox from the Air Force’s Air Materiel Command. In violation of standard procedure, none of the crew or the civilians are briefed on emergency procedures, though Murrhee will later say that the crew were all familiar with the procedures; he is not so sure about the civilians, though he knows Palya and Reynolds have flown numerous test flights before. In another violation of Air Force regulations, none of the flight crew have worked together before. As author Barry Siegel will note in 2008, “The pilot, copilot, and engineer had never shared the same cockpit before.”
Engine Fire and Crash - Less than an hour into the flight, one engine catches fire and two others lose power, due to a combination of maintenance failures and pilot errors. The civilians have some difficulty getting into their parachutes as Erwin and Moore attempt to regain control of the aircraft. Four of the crew and civilians manage to parachute from the plane, but most remain on board as the airplane spirals into the ground on the edge of the Okefenokee Swamp, near Waycross, Georgia. Crew members Moore, Murrhee, and Peny survive, as does a single civilian, Mechler. Four others either jump at too low an altitude or die when their chutes foul the airplane; the other five never manage to leave the plane and die on impact.
Widows File Suit - Several of the civilians’ widows will file suit against the US Air Force, asserting that their husbands died because of Air Force negligence (see June 21, 1949). Their lawsuit will eventually become US v. Reynolds, a landmark Supreme Court case and the underpinning for the government’s claims of state secrets privilege (see March 9, 1953). [Siegel, 2008, pp. 3, 14-17, 33-49]

Entity Tags: Derwood Irvin, Barry Siegel, US Department of the Air Force, Walter Peny, William Brauner, Air Materiel Command, Richard Cox, Ralph Erwin, Robert Reynolds, Al Palya, Radio Corporation of America, Eugene Mechler, Earl Murrhee, Franklin Institute, Project Banshee, Melvin Walker, Lawrence Pence, Jr, Herbert W. Moore, Jr, Jack York

Timeline Tags: Civil Liberties

A three-judge federal appeals court unanimously rejects the government’s claim of unfettered executive privilege and secrecy in regards to classified documents (see October 19, 1951). In an opinion written by Judge Albert Maris, the court finds that the government’s claim that the judiciary can never compel the executive branch to turn over classified documents to be without legal merit. The plaintiffs in the case, three widows who lost their husbands in the crash of a B-29 bomber carrying classified materials (see June 21, 1949), had a compelling need for the documents in question, the downed B-29 accident reports, to further their case, Maris writes (see October 12, 1950).
No Legal Basis for Claim of Privilege - Maris goes further than the parameters of the single lawsuit, writing: “[W]e regard the recognition of such a sweeping privilege… as contrary to a sound public policy. The present cases themselves indicate the breadth of the claim of immunity from disclosure which one government department head has already made. It is but a small step to assert a privilege against any disclosure of records merely because they might prove embarrassing to government officials. Indeed, it requires no great flight of imagination to realize that if the government’s contentions in these cases were affirmed, the privilege against disclosure might gradually be enlarged… until as is the case in some nations today, it embraced the whole range of government activities.… We need to recall in this connection the words of [Revolution-era jurist] Edward Livingston: ‘No nation ever yet found any inconvenience from too close an inspection into the conduct of its officers, but many have been brought to ruin, and reduced to slavery, by suffering gradual imposition and abuses, which were imperceptible, only because the means of publicity had not been secured.’” He also quotes Revolutionary War figure Patrick Henry, who said, “[T]o cover with the veil of secrecy the common routine of business is an abomination in the eyes of every intelligent man and every friend to his country.”
Rejecting Claim of 'State Secrets' - Maris is even less respectful of the government’s claim of a “state secrets” privilege. He notes that the government did not make that claim until well into the lawsuit proceedings (see October 19, 1951), indicating that it was a “fallback” argument used after the original government arguments had failed. Maris is also troubled, as author Barry Siegel later writes, in the government’s “assertion of unilateral executive power, free from judicial review, to decide what qualified as secret.” The lower court judge’s ruling that he alone should be given the documents for review adequately protected the government’s security interests, Maris writes: “[But] the government contends that it is within the sole province of the secretary of the Air Force to determine whether any privileged material is contained in the documents and that his determination of this question must be accepted by the district court without any independent consideration.… We cannot accede to this proposition. On the contrary, we are satisfied that a claim of privilege against disclosing evidence… involves a justiciable question, traditionally within the competence of the courts.… To hold that the head of an executive department of the government in a [law]suit to which the United States is a party may conclusively determine the government’s claim of privilege is to abdicate the judicial function to infringe the independent province of the judiciary as laid down by the Constitution.”
Fundamental Principle of Checks and Balances - Maris continues: “The government of the United States is one of checks and balances. One of the principal checks is furnished by the independent judiciary which the Constitution established. Neither the executive nor the legislative branch of the government may constitutionally encroach upon the field which the Constitution has reserved for the judiciary.… Nor is there any danger to the public interest in submitting the question of privilege to the decision of the courts. The judges of the United States are public officers whose responsibilities under the Constitution is just as great as that of the heads of the executive departments.”
Government Appeal - The Justice Department will appeal the ruling to the US Supreme Court (see March 1952 and March 9, 1953). [Siegel, 2008, pp. 153-156]

Entity Tags: Albert Maris, US Department of Justice, Barry Siegel, US Supreme Court

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Lawyers make their opening arguments before the Supreme Court in the case of US v Reynolds, the lawsuit that finds the government had no overarching right to unilaterally refuse to deliver classified documents in the course of a wrongful death lawsuit against the government (see December 11, 1951). The government has appealed the appellate court ruling to the Supreme Court (see March 1952). Because four of the nine justices had voted not to hear the case—in essence to let the appellate court ruling stand—the defense is cautiously optimistic about the Court’s decision.
Judiciary Has No Right to Interfere with Powers of the Executive, Government Argues - Acting Solicitor General Robert Stern tells the Court that the appellate judges’ decision, written by Judge Albert Maris, “is an unwarranted interference with the powers of the executive,” and that the decision forced the government to choose “whether to disclose public documents contrary to the public interest [or] to suffer the public treasury to be penalized” (a reference to the decision to award the plaintiffs monetary damages—see October 12, 1950). The judiciary “lack[s] power to compel disclosure by means of a direct demand [as well as] by the indirect method of an order against the United States, resulting in judgment when compliance is not forthcoming.”
Executive Has No Right to Unilaterally Withhold Information, Defense Counters - Stern’s arguments are countered by those of the plaintiffs’ lawyer, Charles Biddle, who writes, “We could rest our case with confidence on the clear opinion of Judge Maris,” but continues by arguing that if the government asserts a claim of executive privilege on the basis of national security, it must make the documents available to the Court for adjudication, or at least provide enough information for the Court to judge whether the documents present in fact a threat to national security if disclosed. This is particularly true, Biddle argues, “where there is no showing that the documents in question contain any military secret” (Biddle is unaware that the documents’ classification status had been reduced two years before—see September 14, 1950). “The basic question here is whether those in charge of the various departments of the government may refuse to produce documents properly demanded… in a case where the government is a party (see June 21, 1949), simply because the officials themselves think it would be better to keep them secret, and this without the Courts having any power to question the propriety of such decision.… In other words, say the officials, we will tell you only what we think it is in the public interest that you should know. And furthermore, we may withhold information not only about military or diplomatic secrets, but we may also suppress documents which concern merely the operation of the particular department if we believe it would be best, for purposes of efficiency or morale, that no one outside of the department, not even the Court, should see them.”
No Basis for Claims of Military Secrets - Biddle argues that because of responses he has received to his demands over the course of this lawsuit, he is relatively sure there are no military secrets contained within them. “[T]he proof is to the contrary,” he says, and goes on to say that had the Air Force disclosed from the outset that the plane crash, the fatal accident that sparked the original lawsuit (see October 6, 1948), was probably caused by pilot error and not by random chance, the plaintiffs may have never needed to ask for the disclosure of the documents in question, the accident reports on the crash (see October 18, 1948). “The secretary [of the Air Force]‘s formal claim of privilege said that the plane at the time was engaged in a secret mission and that it carried confidential equipment,” Biddle says, “but nowhere was it asserted that either had anything to do with the accident. The whole purpose of the demand by the respondents was for the purpose of finding out what caused the accident.… They were not in the least interested in the secret mission or equipment.” [Siegel, 2008, pp. 165-170]

Entity Tags: US Supreme Court, Albert Maris, Robert Stern, US Department of the Air Force, Charles Biddle

Timeline Tags: Civil Liberties

In their regular Saturday conference, the nine Supreme Court justices discuss the issues and arguments surrounding US v Reynolds (see October 21, 1952). According to the notes from the discussion, Chief Justice Fred Vinson, a strong advocate for expansive executive powers (see March 1952), says the case “boils down to Executive Branch determine privilege.” Other notes by Justice William O. Douglas suggest that Vinson isn’t convinced that the US must “be forced to pay for exercising its privilege” (see October 12, 1950). A straw vote taken at the end of the discussion shows five justices in favor of the government’s position to unilaterally withhold classified documents—overturning the appellate court decision (see December 11, 1951), and four in favor of allowing the decision to stand. [Siegel, 2008, pp. 171]

Entity Tags: Fred Vinson, US Supreme Court, William O. Douglas

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). [Federation of American Scientists, 7/17/1997]

Entity Tags: National Security Agency, Echelon, Rhyolite, Chalet, Government Communications Headquarters, Owen Lewis, Canyon

Timeline Tags: Civil Liberties

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

About 500 Iranian students take over the American Embassy in Tehran and hold 52 Americans hostage for 444 days. The Mujahedeen-e Khalq (MEK) is one of the groups that supports the take-over. [US Department of State, 4/30/2003; PBS, 1/15/2006]

Entity Tags: People’s Mujahedin of Iran

Timeline Tags: US confrontation with Iran, Iran-Contra Affair

Michael Barnes.Michael Barnes. [Source: Covington and Burling]Representative Michael Barnes (D-MD) is targeted by the NSA’s Echelon satellite surveillance program on orders from Reagan administration officials. Barnes, an outspoken opponent of Reagan’s Central American policies, had phone conversations with Nicaraguan officials intercepted and recorded, including one conversation between Barnes and the foreign minister of Nicaragua. Barnes learns of the surveillance after White House officials, apparently attempting to discredit Barnes, leaks transcripts of the taped conversations to reporters. CIA director William Casey shows Barnes a Nicaraguan embassy cable reporting a meeting between embassy staff and one of Barnes’s aides; Casey demands that Barnes fire the aide. Barnes refuses, noting that the aide had visited the embassy on legitimate business concerning international affairs. Barnes will say in 1995, “I was aware that NSA monitored international calls, that it was a standard part of intelligence gathering. But to use it for domestic political purposes is absolutely outrageous and probably illegal.” Former senator Dennis DeConcini (R-AZ) says he worries about the NSA spying on US citizens: “It has always worried me. What if that is used on American citizens? It is chilling. Are they listening to my private conversations on my telephone?” [Patrick S. Poole, 8/15/2000]

Entity Tags: Michael D. Barnes, Reagan administration, William Casey, National Security Agency, Dennis DeConcini, Echelon

Timeline Tags: Civil Liberties

A federal court rules that because of the government’s “state secrets” privilege (see March 9, 1953), a civilian plaintiff suing the US Navy over a contractual agreement cannot even access “non-privileged,” or unclassified, information from the Navy because to do so might “threaten disclosure” of material that goes against “the overriding interest of the United States… preservation of its state secrets privilege precludes any further attempt to pursue litigation.” [Siegel, 2008, pp. 196-197]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

President Ronald Reagan issues Executive Order 12333, which directs the US intelligence community to provide foreign intelligence data to the White House. The order reads in part, “[A]gencies are not authorized to use such techniques as electronic surveillance, unconsented physical searches, mail surveillance, physical surveillance, or monitoring devices unless they are in accordance with procedures established by the head of the agency concerned and approved by the Attorney General.” It establishes rules of conduct for the intelligence agencies, and mandates a certain level of Congressional oversight. [Executive Order 12333 -- United States intelligence activities, 4/5/2007] It also establishes the basis for what are later called “National Security Letters.” These NSLs, originally envisioned for use to compile information in hunts for foreign criminals and suspected terrorists, will later be used by the administration of George W. Bush to order US booksellers, librarians, employers, Internet providers, and others to turn over records and information they compile on US citizens, with strict adjuncts against allowing those targeted for surveillance to know about the NSLs and with virtually no government oversight (see October 25, 2005). [Washington Post, 11/6/2005] It does not, as some have later asserted, directly prohibit the assassination of targeted foreign subjects—i.e. terrorist suspects and even foreign leaders—though it does restrict the use of assassination by US government operatives to certain very restricted circumstances centered around critical aspects of national security. [Parks, 11/2/1989 pdf file]

Entity Tags: Ronald Reagan, George W. Bush, National Security Letters, Bush administration (43)

Timeline Tags: Civil Liberties

In the second of two rulings in the case of Halkin v Helms, the judiciary comes down squarely on the side of the US government against charges of illegal surveillance and wiretapping leveled against American anti-war protesters. The district and appellate courts uphold the federal government’s “state secrets” claim as codified in US v Reynolds (see March 9, 1953), thereby denying the plaintiffs the right to see government information that they claim would prove their case. The DC Court of Appeals writes that the federal courts do not have any constitutional role as “continuing monitors of the wisdom and soundness of Executive action,” and instead the courts “should accord utmost deference to executive assertions of privilege on grounds of military or diplomatic secrets… courts need only be satisfied that there is a reasonable danger” that military secrets might be exposed. [Siegel, 2008, pp. 196-196]

Timeline Tags: Civil Liberties

Margaret Thatcher.Margaret Thatcher. [Source: UK Parliament]British prime minister Margaret Thatcher, displeased with two of her ministers for challenging her on unidentified policy matters, requests that they be placed under electronic surveillance. Because it is illegal for British intelligence to monitor its own citizens, the operation is handed over to the CSE, Canada’s national security agency. [Daily Iowan, 1/19/2006; Janczewski and Colarik, 2007, pp. 454] According to former CSE spy Mike Frost, who will publicly discuss the matter in 2000, Thatcher “had two ministers that she said ‘…weren’t onside.’” Thatcher, says Frost, “wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers.” Why CSE and not British intelligence? Because for the British to monitor their own government members would be illegal—so instead, they farm out such activities to their allies. “The British Parliament now have total deniability,” Frost says. “They didn’t do anything. They know nothing about it. Of course they didn’t do anything; we did it for them.” Frost will say there is no way to pin any blame or criminal charges on anyone in the British government. “The British Parliament now has total deniability,” Frost says. “They didn’t do anything… we did it for them.” [ZDNet, 2/25/2000; CBS News, 2/27/2000]

Entity Tags: Communications Security Establishment, Mike Frost, Government Communications Headquarters, Margaret Thatcher

Timeline Tags: Civil Liberties

The DC Court of Appeals rejects a claim by civilian plaintiffs to force the government to disclose classified information as part of a lawsuit, citing the “state secrets” privilege (see March 9, 1953). Furthermore, the court broadens the definition of “state secrets” to include “disclosure of intelligence-gathering methods or capabilities and disruption of diplomatic relations.” [Siegel, 2008, pp. 197]

Timeline Tags: Civil Liberties

Strom Thurmond.Strom Thurmond. [Source: US Government]Former Lockheed software manager Margaret Newsham, who worked at the Menwith Hill facility of the NSA’s Echelon satellite surveillance operation in 1979, says she heard a real-time phone intercept of conversations involving senator Strom Thurmond (R-SC). She was shocked, she recalls, because she thought only foreign communications were being monitored. Newsham, who was fired from Lockheed after she filed a whistleblower lawsuit alleging fraud and waste, tells the chairman of the House Intelligence Committee, Louis Stokes (D-OH), of the overheard conversations. In July, Capital Hill staffers will leak the story to the Cleveland Plain Dealer. Thurmond says he doesn’t believe Newsham’s story, but his office admits that it has previously received reports that Thurmond had been a target of NSA surveillance. Thurmond will decline to press for an investigation, and the reason for the surveillance has never been revealed. [CBS News, 2/27/2000; Patrick S. Poole, 8/15/2000]

Entity Tags: Strom Thurmond, National Security Agency, House Intelligence Committee, Louis Stokes, Echelon, Cleveland Plain Dealer, Lockheed Martin Corporation, Margaret Newsham

Timeline Tags: Civil Liberties

A lawsuit against the FBI’s investigation of a sixth-grade boy and his school project to create an “encyclopedia of the world” is stopped when an appeals court rules that the agency is shielded by the “state secrets” privilege (see March 9, 1953). Unable to secure information from the FBI as to why it investigated him, the child had therefore “failed to sustain his burden of proof [and] the cause of action was properly dismissed.” [Siegel, 2008, pp. 197]

Entity Tags: Federal Bureau of Investigation

Timeline Tags: Civil Liberties

A US appellate court refuses to find a number of military contractors liable in the death of Earl Patton Ryals, who died with 36 of his fellow crewmen in the Iraqi attack on the USS Stark (see May 17, 1987 and After). Ryals’s estate claims that he and his fellows died in part because of negligence on the part of the contractors who designed, manufactured, tested, and marketed the weapons system on board the Stark, including the Phalanx anti-missile system. In turning down the estate’s claim, the court cites the government’s “state secrets” privilege (see March 9, 1953), saying that the facts of the issue could not be resolved without examining classified Navy documents. And even without this reason, the court rules, Ryals’s estate cannot see the documents because the case presents “a political question” about military decision-making that is not subject to judicial review. [Zuckerbraun v. General Dynamics Corp., 6/13/1991; Siegel, 2008, pp. 197-198] A year later, a similar case will be dismissed on the grounds that a trial might conceivably reveal “state secrets” (see September 16, 1992).

Entity Tags: Earl Patton Ryals, US Department of the Navy

Timeline Tags: Civil Liberties

A federal appeals court upholds the dismissal of a lawsuit filed on behalf of 23 Navy sailors killed in the attack on the USS Stark (see May 17, 1987 and After) against a number of defense contractors. A similar lawsuit on behalf of one of the sailors killed in the attack was dismissed a year before (see June 13, 1991). This time the plaintiffs file over 2,500 pages of unclassified documentary evidence supporting their claims that the contractors were negligent in their design and implementation of the weapons systems aboard the Stark. The appeals court finds that regardless of the amount of evidence entered, to allow the trial would be to potentially infringe on the US government’s “state secrets” privilege (see March 9, 1953). “[N]o amount of effort could safeguard the privileged information,” the court rules. The court adds that “classified and unclassified information cannot always be separated, and therefore courts must restrict access not only to classified material, but to “those pieces of evidence” that “press so closely upon highly sensitive material that they create a hgh risk of inadvertent or indirect disclosures.” [Siegel, 2008, pp. 198]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

The US Senate ratifies the international Convention Against Torture, originally proposed by the United Nations in 1985. The treaty bans any officials from signatory nations from inflicting “torture and other cruel, inhuman, or degrading treatment or punishment” on prisoners in order to gain information. It also establishes the UN Committee against Torture (UNCAT). The ban is absolute and cannot be waived: “No exceptional circumstances whatsoever, whether a state of war or a threat of war, internal political instability, or any other public emergency, may be invoked as a justification of torture.” [United Nations High Commissioner for Human Rights, 12/10/1984; Savage, 2007, pp. 155] The treaty also forbids signatory nations from sending detainees to other countries if there is a reasonable expectation that they may be tortured. [United Nations High Commissioner for Human Rights, 12/10/1984; Human Rights Web, 1/25/1997]

Entity Tags: United Nations Committee against Torture, Convention Against Torture, United Nations

Timeline Tags: Civil Liberties

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Timeline Tags: Civil Liberties

Sheila E. Witnall, the secretary of the Air Force, declassifies all Air Force accident reports prior to January 25, 1956. The declassification includes the 1948 crash of the B-29 bomber that killed nine of 13 crew members during a secret “Project Banshee” mission (see October 6, 1948). The formerly classified reports had been at the heart of the case of US v Reynolds (see March 9, 1953) that sparked the so-called “state secrets” privilege. Four years after the declassification, the daughter of one of the slain civilians on board, Judy Palya Loether, finds the accident report on the Internet; the discovery spurs her to begin looking into the circumstances of her father’s death, and ultimately will result in a second lawsuit being filed on behalf of the families of the slain crewmen (see February 26, 2003). [Siegel, 2008, pp. 205-208]

Entity Tags: Project Banshee, Sheila E. Witnall, Judy Palya Loether, US Department of the Air Force

Timeline Tags: Civil Liberties

Law professor John Yoo writes a lengthy essay for the California Law Review entitled “The Continuation of Politics by Other Means: The Original Understanding of War Powers,” in which he argues that the Founding Fathers intended to empower presidents to launch wars without Congressional permission. Yoo has clerked for conservative judge Laurence Silberman and equally conservative Supreme Court Justice Clarence Thomas, and served for a year as counsel to then-Senate Judiciary Committee Chairman Orrin Hatch (R-UT). He has become a regular speaker at Federalist Society events, the informal but influential group of conservative lawyers, judges, and legal scholars who will come to have so much influence in the Bush administration. You argues that for generations, Constitutional scholars have misread the Constitution: the Founders actually supported, not repudiated, the British model of executive power that gave the king the sole power of declaring war and committing forces to battle. The Constitution’s granting of the legislature—Congress—the power to “declare war” is merely, Yoo writes, a reference to the ceremonial role of deciding whether to proclaim the existence of a conflict as a diplomatic detail. The Founders always intended the executive branch to actually declare and commence war, he writes. Most other Constitutional scholars will dismiss Yoo’s arguments, citing notes from the Constitutional Convention that show the Founders clearly intended Congress, not the president, to decide whether to commit the country to war. One of those Founders, James Madison, wrote in 1795 that giving a president the unilateral ability to declare war “would have struck, not only at the fabric of the Constitution, but at the foundation of all well organized and well checked governments. The separation of the power of declaring war from that of conducting it, is wisely contrived to exclude the danger of its being declared for the sake of its being conducted.” [Savage, 2007, pp. 80-81] Yoo will go on to join the Bush administration’s Office of Legal Counsel, and write numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002).

Entity Tags: Federalist Society, John C. Yoo

Timeline Tags: Civil Liberties

August 21, 1996: War Crimes Act Becomes Law

The War Crimes Act (HR 3680) becomes Public Law No: 104-192. It prohibits Americans—top officials and soldiers alike—from committing “grave breaches” of the Geneva Conventions. It states: “Whoever, whether inside or outside the United States, commits a grave breach of the Geneva Conventions,” provided that the perpetrator or the victim is a member of the US military or a national of the US, “shall be fined under this title or imprisoned for life or any term of years, or both, and if death results to the victim, shall also be subject to the penalty of death.” [Newsweek, 11/5/2001]

Entity Tags: Geneva Conventions, War Crimes Act

Timeline Tags: Torture of US Captives, Civil Liberties

A lieutenant general meets with Qwest CEO Joe Nacchio and Dean Wandry, who heads Qwest’s government business unit. According to documents filed in 2006 by Nacchio concerning his trial on insider trading charges (see October 12, 2007), the general “told Mr. Wandry that he ran the largest telecom operation in the world, he had looked at Qwest’s network, and he wanted to use it for government purposes.” The general in question could be NSA Director Kenneth Minihan, who will be replaced in 1999 by another lieutenant general, Michael Hayden, but neither Minihan nor Hayden will comment on the allegation. Many former intelligence officials will say that it is likely Minihan who met with Nacchio and Wandry. Nacchio’s court documents indicate that he and Wandry agree to work with the general. Nacchio is not allowed to announce the contract publicly, but according to the court documents, he “understood at the time this was the beginning of a relationship which had enormous potential for future work. This proves increasingly true as time went on.” By 1999 Qwest is working extensively with the NSA. Minihan is particularly concerned about the potential of “cyberwarfare” by foreign governments, terrorist organizations, drug cartels, and organized crime, a prospect which he felt the NSA is unprepared. He particularly worries about Russia and China; in June 1998, he will testify are training personnel in potential cyber-attacks. “These opportunists, enabled by the explosion of technology and the availability of inexpensive, secure means of communication, pose a significant threat to the interests of the United States and its allies,” Minihan will state. In 2007, a former senior NSA official will say that the agency felt those groups knew US privacy laws all too well and were capable of using those laws against the NSA and other intelligence agencies. He will say, “There was such a nuanced understanding of how to tie us in knots and use American law against us, that there were certainly pockets of people saying, ‘We’ve got to be assertive; we’ve got to be more aggressive on this.’” Hayden, Minihan’s successor, will be particularly willing to push agency operations to the edge of legality. After 9/11, Hayden will say, “We’re pretty aggressive within the law. As a professional, I’m troubled if I’m not using the full authority allowed by law.” [National Journal, 11/2/2007] The NSA will approach Qwest will a similar offer in the months before 9/11 (see February 2001).

Entity Tags: Michael Hayden, Dean Wandry, Kenneth Minihan, National Security Agency, Joe Nacchio, Qwest

Timeline Tags: Civil Liberties

The US enacts a law banning torture or abuse by any government official or employee. Title 18 of the US Code, Chapter 113C, Section 2340 bans US officials anywhere in the world from intentionally inflicting “severe physical or mental pain or suffering” upon another person in their control. Violation of this statute would earn the convicted official up to 20 years in prison; if a detainee dies as a result of the abuse, the convicted official can be sentenced to death. Any American official who conspires to have a prisoner abused is subject to the same penalties. [Legal Information Institute, 1/26/1998; Savage, 2007, pp. 155]

Timeline Tags: Torture of US Captives

Princess Diana at a mine field in Angola in 1997.Princess Diana at a mine field in Angola in 1997. [Source: Tim Graham / Corbis]The NSA admits that US intelligence agencies possess 1,056 pages of classified information regarding Britain’s Princess Diana. British tabloids portray the documents as rife with salacious information on Diana’s “most intimate love secrets” about her relationship with Egyptian billionaire Dodi al-Fayed, but the actual documentation may not be so lurid. The NSA recently denied a Freedom of Information request from the Internet news service APB Online about information it has collected on Diana, who died in a tragic car accident in 1997. (It is unclear whether US intelligence has any unreleased information about the circumstances of Diana’s death. [APB Online, 11/30/1998; Washington Post, 12/12/1998] The NSA has denied monitoring Diana on the night of her death, an allegation raised by The Observer in 2006.) [MSNBC, 12/11/2006] In the two-page letter denying the request, the NSA admits to possessing a “Diana file,” but refuses to divulge what is in that file. A US intelligence official says the information is made up of conversations between other people who mentioned Diana; the references to Diana in those intercepted conversations are “incidental.” The official says Diana was never a particular target of the NSA’s Echelon surveillance program. However, the NSA has classified 124 pages of the “Diana documents” as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security.” According to a recent report by the European Parliament, the NSA routinely monitors virtually “all e-mail, telephone and fax communications… within Europe” (see July 11, 2001). Intelligence expert Steven Aftergood of the Federation of American Scientists says “the US and our allies promiscuously collect electronic communications around the world. Whether the descriptions of Echelon are accurate or not, that much is definitely true.” Some believe that lurid snippets of information leaked to the British press regarding Diana’s affair with Fayed, and her ambivalent relationship with Prince Charles, may have come from Echelon wiretaps and surveillance. Another FAS scientist, John Pike, says the NSA and other US intelligence agencies may have been monitoring Diana to protect her from terrorist attacks. Pike says it is also possible she may have been monitored because of her involvement in banning land mines, a position opposed by the Pentagon. [APB Online, 11/30/1998; Washington Post, 12/12/1998] Former NSA official Wayne Madsen will say in 2000, “[W]hen NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?” [CBS News, 2/27/2000] In August 1999, the NSA will deny another Freedom of Information request about its “Diana file” from the British newspaper The Guardian. [Guardian, 8/6/1999]

Entity Tags: Steven Aftergood, Prince Charles, The Guardian, John Pike, Dodi al-Fayed, Echelon, Federation of American Scientists (FAS), National Security Agency, Princess Diana

Timeline Tags: Civil Liberties

Richard Barlow, a former intelligence analyst who was repeatedly fired for correctly claiming that Pakistan had a nuclear weapons program (see 1981-1982, August 1987-1988 and August 4, 1989), is awarded a total of $1 million by President Bill Clinton in compensation for the treatment he received. However, Barlow does not receive the money, as the settlement has to be ratified by Congress. When it runs into procedural problems, it is moved to the Court of Federal Claims to be reviewed. After Clinton is replaced by George W. Bush, CIA Director George Tenet and NSA Director Michael Hayden assert the government’s “state secrets privilege” (see March 9, 1953) over Barlow’s entire legal claim, causing it to collapse due to lack of evidence. [Guardian, 10/13/2007]

Entity Tags: William Jefferson (“Bill”) Clinton, Richard Barlow, National Security Agency, Michael Hayden, Court of Federal Claims, Central Intelligence Agency, George J. Tenet

Timeline Tags: A. Q. Khan's Nuclear Network

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

Jamal Zougam.Jamal Zougam. [Source: El Mundo]By 2000, a Moroccan living in Spain named Jamal Zougam begins to attract the attention of Spanish intelligence. Barakat Yarkas frequently travels to London to meet with al-Qaeda-linked imam Abu Qatada, and Zougam accompanies Yarkas on at least one of these trips (see 1995-February 2001). Spanish intelligence is monitoring Yarkas and his cell, and they are aware that Zougam is introduced to Qatada as “a gifted young recruit.” [Agence France-Presse, 3/17/2004; Irujo, 2005, pp. 77-79] In June 2001, a French investigator warns that Zougam is an important militant with international links and advise the Spanish to arrest him (see June 2001). Around the same time, Spanish investigators learn that Zougam met with Mohammed Fazazi, a Moroccan imam who preached at the Al-Quds mosque in Hamburg, Germany, that is attended by some of the 9/11 hijackers (see 1993-Late 2001). On August 14, 2001, Zougam is recorded telling Yarkas that he had offered Fazazi money for the jihad cause. Fazazi is also linked to Abu Qatada and had met him in London. After the May 2003 Casablanca bombings (see May 16, 2003), interest in Zougam increases as the Moroccan, Spanish, and French governments all suspect he was involved in those bombings. But he is still not arrested, and his surveillance in Spain is not increased, apparently due to lack of resources. [New York Times, 3/17/2004; Observer, 3/21/2004] In the days before the March 2004 Madrid train bombings (see 7:37-7:42 a.m., March 11, 2004), Zougam makes about a dozen phone calls to contacts in London. He is said to talk to four al-Qaeda suspects, as well as a “radical London-based preacher” - a possible reference to Abu Qatada. Zougam will later be sentenced to life in prison for playing a direct role in the Madrid bombings. [Daily Mail, 11/1/2007] After the Madrid bombings, British authorities will say that there was a “definite link” to Britain in the bomb plot. Zougam is believed to have made trips to London in search of funding, planning, and logistical help, and supplying equipment and false identification papers for the bombers. [Independent, 3/19/2004] One figure believed central to the bomb plot, Moutaz Almallah, will be arrested in London in 2005 and extradited to Spain in 2007 (see May 16, 2005).

Entity Tags: Jamal Zougam, Mohammed Fazazi, Abu Qatada, Barakat Yarkas, Moutaz Almallah

Timeline Tags: Complete 911 Timeline

Judy Palya Loether.Judy Palya Loether. [Source: SecrecyFilm (.com)]Judy Palya Loether, the daughter of a civilian engineer killed in a 1948 plane crash while on a secret government mission (see October 6, 1948), reads over the voluminous reports of the accident that claimed her father’s life. The reports, now declassified (see January 1996), had been at the heart of a landmark lawsuit that gave judicial recognition to the government’s “state secrets” privilege (see March 9, 1953). Loether is shocked to find that the reports contain nothing that could be construed as military or tactical secrets of any kind, though for decades the government has insisted that they could not be revealed, even to a judge (see October 18, 1948, July 26, 1950, August 7-8, 1950, September 21, 1950, and October 19, 1951). What they do contain is a compendium of witness statements and expert findings that indicate a number of mistakes and errors led to the crash. Loether begins contacting the families of the widows who had filed the original lawsuit against the government (seeJune 21, 1949) to share her findings. [Siegel, 2008, pp. 210-211] Loether is confused and angered over the contents of the reports, and the government’s response to the lawsuit. She cannot understand why the government pressed so hard to keep the reports classified, knowing that they contained no sensitive information about the secret missile program, and is particularly troubled by the fact that at least two senior government officials signed affidavits affirming the reports’ inclusion of such information while knowing that the reports contained nothing of the sort. She wonders if government officials had perhaps decided to lie about the reports in order to establish some sort of state secrets privilege. In September 2002, lawyers Wilson Brown and Jeff Almeida, retained by Loether and others who lost family members in the crash, come to the same conclusion. As Almeida will say to Brown: “I’ve read this report. There’s nothing in there.” [Siegel, 2008, pp. 219] As time goes on, Loether and her colleagues files a second lawsuit seeking to overturn the first Supreme Court verdict (see February 26, 2003).

Entity Tags: Wilson Brown, Jeff Almeida, Judy Palya Loether

Timeline Tags: Civil Liberties

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

Said Berraj.Said Berraj. [Source: Spanish Interior Ministry]Five suspected al-Qaeda operatives, Said Berraj, Amer el-Azizi, Mohamed Haddad, Lahcen Ikassrien, and Salahedin Benyaich, are arrested in Turkey. They are arrested two weeks after arriving in Turkey, apparently for failing to produce identification papers. They are later released, but the reason for releasing them is unknown. Turkey is a transit center and logistics base for al-Qaeda (see November 1996-September 1998 and Mid-1996) and el-Azizi is said to operate there, as well as in Iran and, possibly, Iraq. Berraj, Haddad, and el-Azizi will later be involved in an attack in Madrid, Spain, that kills nearly 200 people (see Before March 11, 2004 and 7:37-7:42 a.m., March 11, 2004) and Benyaich will later be jailed in Morocco on terrorism charges following a bombing in Casablanca (see May 16, 2003). El-Azizi will also apparently be involved in setting up a meeting where details of the 9/11 plot are finalized (see Before July 8, 2001). [Los Angeles Times, 4/14/2004; New York Times, 4/29/2004; New York Times, 4/30/2004; El Mundo (Madrid), 9/14/2004] Ikassrien will be arrested in Afghanistan in late 2001 and sent to the Guantanamo prison. He will be released back to Spain in 2005, charged for al-Qaeda links, an acquitted. [Associated Press, 10/11/2006]
Possible Informants - Berraj is an informant for Spanish intelligence, regularly meeting with intelligence agents in 2003. It is unknown when he begins informing (see Shortly Before March 11, 2004). Haddad will not be arrested in Morocco after the 2004 train bombings despite strong evidence he was directly involved, leading to suspicions that he has been a government informant (see Shortly After March 18, 2004). El-Azizi also will be suspected of being a government informant because he is tipped off by Spanish intelligence about a police raid (see Shortly After November 21, 2001). He is also arrested in Turkey for passport forgery at one point, and then let go, although it is not clear when. [Wall Street Journal, 3/19/2004] Turkish intelligence is aware of extremists’ use of Turkey as a base (see 1996), but it is unclear whether this is related to the arrest of the three men. El-Azizi will repeatedly evade arrest in Spain after 9/11, apparently with the help of Spanish intelligence (see October 2001 and Shortly After November 21, 2001).

Entity Tags: Lahcen Ikassrien, Said Berraj, Salahedin Benyaich, Mohamed Haddad, Amer el-Azizi

Timeline Tags: Complete 911 Timeline

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). [Truthout (.org), 1/17/2006] In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. [New York Times, 12/16/2007]

Entity Tags: Bush administration (43), National Security Agency

Timeline Tags: Civil Liberties

In 2008, Abdelkader Belliraj, a Belgian government informant heading an Islamist militant group in Morocco, will be arrested in Morocco (see February 18, 2008 and February 29, 2008). Moroccan Interior Minister Chakib Benmoussa will claim that in 2001 Belliraj and several of his followers travel to Afghanistan to meet al-Qaeda second-in-command Ayman al-Zawahiri. Al-Zawahiri gives Belliraj specific instructions to carry out. Belliraj’s followers then train in al-Qaeda camps alongside militants belonging to the Moroccan Islamic Combatant Group, another al-Qaeda linked Moroccan militant group. That group will later carry out a series of attacks in Casablanca in 2003 (see May 16, 2003) and play a role in the Madrid train bombings in 2004 (see 7:37-7:42 a.m., March 11, 2004). It is not known if Belliraj meets al-Zawahiri before or after the 9/11 attacks. [Los Angeles Times, 2/27/2008; Het Laatste News, 3/4/2008] Belliraj’s group maintains al-Qaeda links after this. For instance, in 2005 Belliraj visits training camps run by the Algerian militant group the Salafist Group for Preaching and Combat. One year later, that group will change its name to be Al-Qaeda in the Magreb. [Maghreb Arabe Presse, 3/2/2008]

Entity Tags: Chakib Benmoussa, Abdelkader Belliraj, Al-Qaeda, Ayman al-Zawahiri, Salafist Group for Preaching and Combat, Moroccan Islamic Combatant Group

Timeline Tags: Complete 911 Timeline

The NSA asks Qwest, a major US telecommunications firm and a cutting-edge provider of high-tech wireless and Internet connectivity, to reveal information about its customers and their phone calls. Qwest’s CEO, Joe Nacchio, refuses after meeting with NSA officials and deciding that the program is illegal without court orders (see February 27, 2001). The NSA refuses to seek court authorization for its wiretaps and electronic surveillance. The NSA will renew its request from Qwest after the 9/11 attacks, and will also ask the firm to help it track suspected terrorists. Other telecommunications firms such as Verizon, AT&T, and BellSouth, will comply with the NSA’s requests (see February 2001 and Beyond).
Fears of a 'Digital Pearl Harbor' - According to a former White House official, the NSA’s primary purpose before 9/11 is to watch for computer hackers and foreign-government agents trying to hack into the government’s computer information systems, particularly those within the Defense Department. Government officials fear a “digital Pearl Harbor” if hackers were ever to seize control of those systems or other key US infrastructures. The former official will say in 2007 that the NSA’s proposal to Qwest is, “Can you build a private version of Echelon and tell us what you see?” Echelon is the NSA’s enormous signals intelligence (SIGINT) network used by the agency and its counterparts in Australia, Canada, New Zealand, and Britain. Qwest is constructing a high-speed network for phone and Internet traffic, and the NSA wants Qwest to keep records of its customers’ transactions for it. The NSA, another source will say, wants to analyze call, e-mail, and other transmissions’ traffic patters for signs of suspicious activity. The White House official will say that telecom firms such as Qwest “have an enormous amount of intelligence-gathering” capability. They don’t have to target individual customers to “look for wacky behavior,” or “groups communicating with each other in strange patterns.” Such information could augment intelligence that the NSA and other agencies were gathering from other sources, and enable the NSA to collect the information it wants without violating laws prohibiting it and other intelligence agencies from directly gathering data on US citizens.
Ill Will from NSA - Nacchio’s refusal to go along with the NSA’s request garners it some ill will among the US intelligence community, the former White House official will say. Nacchio will contend that because of his refusal, the NSA denied Qwest a lucrative government contract. A former high-level intelligence official will add that other telecom companies had little problem agreeing to the NSA’s requests. Nacchio believes that the NSA’s request is illegal under the Telecommunications Act without court orders; the former White House official will acknowledge that it might violate the 1986 Electronic Communications Privacy Act. After 9/11, that law will be amended by the USA Patriot Act to give the government more room to monitor US citizens.
Qwest, Other Telecom Firms Cooperative with Other Agencies - Qwest is apparently less reluctant to share other information with the Pentagon. Qwest began sharing its technology and information as far back as 1997 (see 1997). In May 2001, Commerce Secretary Don Evans will tell the Senate Appropriations Committee that his department helped persuade Qwest to “share proprietory information with the Defense Department to evaluate the vulnerability of its network.” Qwest, which serves the Rocky Mountain and West Coast regions of the country, covers the areas that house some of the military’s most important command-and-control facilities, including the US Strategic Command. In the 1990s, Qwest began actively pursuing contracts with the Defense Department to build more modern, private, secure networks for defense and intelligence agencies. [National Journal, 11/2/2007]
Meetings with Bush Officials - In court documents filed in 2006 to challenge his prosecution for insider trading and, in heavily redacted form, released to the public in 2007, Nacchio will indicate that telecom executives met frequently with Bush administration officials before 9/11, including Deputy Defense Secretary Paul Wolfowitz, National Security Adviser Condoleezza Rice, NSA Director Michael Hayden, and counterterrorism “tsar” Richard Clarke. Many telecom firms are working closely with the government to develop highly classified operations, including joint networks to which the government will have unfettered access. The future director of national intelligence, Mike McConnell, works with telecom firms to expand the cooperation between the telecom industry and the federal government. [Salon, 10/15/2007]

Entity Tags: Condoleezza Rice, US Department of Defense, Bush administration (43), Verizon Communications, AT&T, US Department of Commerce, Senate Appropriations Committee, US Strategic Command, BellSouth, Donald L. Evans, Echelon, Richard A. Clarke, Qwest, Mike McConnell, National Security Agency, Joe Nacchio, Paul Wolfowitz

Timeline Tags: Civil Liberties

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Timeline Tags: Civil Liberties

Nicky Hager.Nicky Hager. [Source: Rotorua District Council]New Zealand journalist Nicky Hager appears before a European Parliament investigative committee to testify about the US’s satellite surveillance program, Echelon (see July 11, 2001). Hager has discovered information about Echelon’s use by the New Zealand equivalent of the NSA, the Government Communication Security Bureau (GCSB). In researching Echelon’s use by the USA, Canada, Britain, Australia, and New Zealand, Hager learned of the extent of the system’s “capability to monitor the whole of governments, regional and international organizations, non-government organizations, companies and individuals throughout Europe.” Although Hager warns the committee not to focus exclusively on Echelon’s use for corporate benefits, he gives several examples of such uses in the South Pacific, including monitoring “deals to do with Japan… collecting intelligence on meat sales, which is very important for New Zealand… intelligence to do with oil prices… [and] a particularly large Japanese development project in the South Pacific where there was potential for New Zealand companies to win contracts. In other words, there were both macro-level and micro-level economic intelligence being collected.” Corporate executives routinely received such information, Hager testifies, and tells about “the fantastic amount of intelligence that was arriving, for example, monitoring international trade meetings.… From my sources, they said that whenever there was a GATT meeting or another major international meeting, there were hundreds of reports of the monitoring of the different delegations which were arriving in New Zealand and being shared between [British]/USA partners, and I have absolutely no doubt about that, because I have talked to people who saw it coming from the NSA.” [European Parliament, 4/24/2001]

Entity Tags: Government Communication Security Bureau, Echelon, National Security Agency, Nicky Hager, European Parliament

Timeline Tags: Civil Liberties

One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing.One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing. [Source: Matt Crypto / Public domain]The BBC reports on advances in electronic surveillance. The US’s global surveillance program, Echelon, has become particularly effective in monitoring mobile phones, recording millions of calls simultaneously and checking them against a powerful search engine designed to pick out key words that might represent a security threat. Laser microphones can pick up conversations from up to a kilometer away by monitoring window vibrations. If a bug is attached to a computer keyboard, it is possible to monitor exactly what is being keyed in, because every key on a computer has a unique sound when depressed. [BBC, 4/4/2001] Furthermore, a BBC report on a European Union committee investigation into Echelon one month later notes that the surveillance network can sift through up to 90 percent of all Internet traffic, as well as monitor phone conversations, mobile phone calls, fax transmissions, net browsing history, satellite transmissions and so on. Even encryption may not help much. The BBC suggests that “it is likely that the intelligence agencies can crack open most commercially available encryption software.” [BBC, 5/29/2001]

Entity Tags: Echelon, British Broadcasting Corporation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

In July 2001, NSA director Michael Hayden tells a reporter that the NSA does not monitor any US citizens without court warrants from the Foreign Intelligence Surveillance Court (FISC). “We don’t do anything willy-nilly,” Hayden says. “We’re a foreign intelligence agency. We try to collect information that is of value to American decision-makers, to protect American values, America—and American lives. To suggest that we’re out there, on our own, renegade, pulling in random communications, is—is simply wrong. So everything we do is for a targeted foreign intelligence purpose. With regard to the—the question of industrial espionage, no. Period. Dot. We don’t do that.” When asked how Americans could verify that, Hayden says that they should simply trust the NSA to police and monitor itself, along with oversight from the White House and from Congress. However, it will later come to light that the NSA began illegally monitoring US citizens from the start of the Bush administration (see Spring 2001). A former NSA official will later dispute Hayden’s account. “What do you expect him to say?” the official says. “He’s got to deny it. I agree. We weren’t targeting specific people, which is what the President’s executive order does. However, we did keep tabs on some Americans we caught if there was an interest [by the White House.] That’s not legal. And I am very upset that I played a part in it.” [Truthout (.org), 1/17/2006] Hayden also denies persistent allegations from European government officials that the agency has engaged in economic espionage to help American companies against European competitors (see April 4, 2001). In March 2001, the American Civil Liberties Union’s Barry Steinhardt says that “since there is no real check on [the NSA], there is no way to know” if they are following the law. Steinhardt says that Congress is the only real check on possible NSA abuses, but it has consistently failed to exercise any sort of aggressive oversight on the agency. [CNN, 3/31/2001]

Entity Tags: National Security Agency, Barry Steinhardt, Michael Hayden, American Civil Liberties Union

Timeline Tags: Civil Liberties

Some al-Qaeda operatives hold a meeting in northern Spain to finalize plans for the 9/11 attacks. Those allegedly present are listed below. The first two operatives listed are definitely present; it is less certain that the others are there:
bullet Future 9/11 hijacker Mohamed Atta. [El Mundo (Madrid), 9/30/2001]
bullet Ramzi bin al-Shibh, an associate of Atta from Hamburg, arrives in Spain on July 9, and stays until July 16. Spanish authorities are notified of his arrival in the country by German intelligence (see (Around July 9, 2001)). [New York Times, 5/1/2002]
bullet Some reports say that 9/11 hijacker Marwan Alshehhi attends, although if he does, he may use a false identity, as US immigration has no records of his departure or return. [El Mundo (Madrid), 9/30/2001; US Department of Justice, 5/20/2002]
bullet The Spanish newspaper La Vanguardia will later report that 9/11 hijackers Waleed and Wail Alshehri meet Atta on July 16. [Associated Press, 9/27/2001] However, there will be no mention of them attending the meeting in some other accounts. For example, their attendance will not be mentioned in the relevant section of the 9/11 Commission Report. [9/11 Commission, 7/24/2004, pp. 243-5]
bullet Amer el-Azizi. [Wall Street Journal, 4/7/2004; Associated Press, 1/23/2005] El-Azizi, who seems to have made preparations for the meeting, is under surveillance at this time, as Spanish authorities are listening in on his phone calls. [Wall Street Journal, 3/19/2004] Calls possibly related to the meeting’s organization were overheard (see Before July 8, 2001). [Los Angeles Times, 4/14/2004; Los Angeles Times, 4/29/2004] Spanish judge Baltasar Garzon will later indict el-Azizi for helping plan 9/11 and say that he assisted the plotters by arranging accommodation for them and acting as a courier. However, US officials will be less certain of his involvement. [Associated Press, 1/23/2005] His arrest shortly after 9/11 will be frustrated by Spanish intelligence (see October 2001 and Shortly After November 21, 2001) and he will go on to be involved in the 2004 Madrid bombings (see Before March 11, 2004 and 7:37-7:42 a.m., March 11, 2004).
bullet Barakat Yarkas, head of an al-Qaeda-linked cell in Spain. [New York Times, 11/20/2001; Los Angeles Times, 1/14/2003]
bullet Mohammed Belfatmi. Belfatmi is an associate of Yarkas, and lives near the hotels where Atta and bin al-Shibh stay. He will flee Europe just before 9/11 with Said Bahaji, a member of the al-Qaeda cell in Hamburg (see September 3-5, 2001). [Los Angeles Times, 1/14/2003; BBC Worldwide Monitoring, 12/2/2004]
bullet Mamoun Darkazanli and Mohammed Haydar Zammar, associates of Atta’s from Germany.
bullet Al Jazeera reporter Tayseer Allouni.
bullet Said Bahaji, a member of the al-Qaeda cell in Hamburg. According to Spanish investigators, Bahaji is with Atta the entire time, and they both stay at the Monica Hotel. [Fouda and Fielding, 2003, pp. 137]
bullet 9/11 mastermind Khalid Shaikh Mohammed (KSM). In 2002, Al Jazeera journalist Yosri Fouda will allegedly interview bin al-Shibh and KSM together before either of them are arrested (see April, June, or August 2002). Neither bin al-Shibh nor KSM will discuss any details of the meeting with Fouda, including who attended. KSM will neither confirm nor deny he was there. However, in a 2003 book, Fouda will claim that, according to Spanish investigators, the initial attendees are Atta, bin al-Shibh, Bahaji, and a fourth man who might be KSM. They are later joined by Alshehhi and two unnamed others. [Fouda and Fielding, 2003, pp. 137]
However, there is a parallel meeting in Granada, in the south of Spain, at this time, and Yarkas, Darkazanli, Zammar, and Allouni may only be at that meeting, and may not meet Atta and bin al-Shibh in person (see July 6, 2001 and Shortly After). [New York Times, 11/20/2001; Los Angeles Times, 1/14/2003] After being captured, bin al-Shibh will deny meeting anyone other than Atta while in Spain. [9/11 Commission, 7/24/2004, pp. 243-5] However, questions will be raised about the quality of information obtained from detainees due to the methods—including torture—used to extract it (see June 16, 2004). The movements of Atta and his associates in Spain are apparently mirrored by those of FBI agents John O’Neill and Mark Rossini (see July 5-16, 2001).

Entity Tags: Mamoun Darkazanli, Wail Alshehri, Marwan Alshehhi, Khalid Shaikh Mohammed, Mohamed Atta, Mohammed Haydar Zammar, Amer el-Azizi, Yosri Fouda, Mohammed Belfatmi, Tayseer Allouni, Ramzi bin al-Shibh, Said Bahaji, Barakat Yarkas

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Glyn Ford.Glyn Ford. [Source: British Labour Party]The European Parliament releases its final report on its findings about the secretive US surveillance program known as Echelon. The report, two years in the making, exhaustively details many of Echelon’s surveillance capabilities, and lists many of Echelon’s surveillance stations around the world. One of the more interesting sections of the report concerns its apparent use on behalf of US corporations. According to the report, Echelon—operated by the NSA as a highly classified surveillance program ostensibly for tracking terrorist threats and activities by nations hostile to the West—is also being used for corporate and industrial espionage, with information from the program being turned over to US corporations for their financial advantage. The report gives several instances of Echelon’s use by corporations. One is the use of Echelon to “lift… all the faxes and phone calls” between the European aircraft manufacturer Airbus and Saudi Arabian Airlines; that information was used by two American companies, Boeing and McDonnell Douglas, to outflank Airbus and win a $6 billion contract. The report also alleges that the French company Thomson-CSF lost a $1.3 billion satellite deal to Raytheon the same way. Glyn Ford, the MP who commissioned the report, says he doesn’t have a problem with Echelon itself, but in the way it is being used. “Now, you know, if we’re catching the bad guys, we’re completely in favor of that… What we’re concerned about is that some of the good guys in my constituency don’t have jobs because US corporations got an inside track on—on some global deal.” [Washington Post, 11/14/1999; CBS News, 2/27/2000; BBC, 7/6/2000; European Parliament, 7/11/2001] In 1977, the US government began providing Echelon-based intelligence to US corporations (see 1977). In April 2001, New Zealand journalist Nicky Hager testified about Echelon’s use by US allies for corporate and economic purposes (see April 2001), and former CIA director James Woolsey confirmed that US surveillance programs were used to benefit US corporations (see March 2000).

Entity Tags: US Department of Commerce, Thomson-CSF, Saudi Arabian Airlines, Glyn Ford, McDonnell Douglas, Central Intelligence Agency, Boeing Company, Echelon, Airbus, European Parliament, National Security Agency

Timeline Tags: Civil Liberties

Zacarias Moussaoui writes the phone number of Amer el-Azizi in his notebook. El-Azizi is a Spain-based militant who is linked to 9/11 mastermind Khalid Shaikh Mohammed (see (November 2001)) and is thought to have helped set up a meeting between Mohamed Atta and Ramzi bin al-Shibh in Spain in July 2001 (see Before July 8, 2001 and July 8-19, 2001). It is unclear when the number is written in Moussaoui’s notebook or what type of contact there is between Moussaoui and el-Azizi, if any. [Wall Street Journal, 4/7/2004] However, the connection to el-Azizi does not appear to be mentioned at Moussaoui’s trial (see March 6-May 4, 2006), even though it would be one of very few pieces of evidence potentially tying Moussaoui to the 9/11 plot. The reason for this is unclear. El-Azizi’s arrest shortly after 9/11 will be frustrated by Spanish intelligence (see October 2001 and Shortly After November 21, 2001) and he will go on to be involved in the 2004 Madrid bombings (see Before March 11, 2004 and 7:37-7:42 a.m., March 11, 2004).

Entity Tags: Amer el-Azizi, Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

An Echelon station in Menwith Hill, Britain.An Echelon station in Menwith Hill, Britain. [Source: BBC]By the 1980s, a high-tech global electronic surveillance network shared between the US, Britain, Canada, Australia, and New Zealand is gathering intelligence all over the world. The BBC describes Echelon’s power as “astounding,” and elaborates: “Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. They are looking for evidence of international crime, like terrorism.” [BBC, 11/3/1999] One major focus for Echelon before 9/11 is al-Qaeda. For instance, one account mentions Echelon intercepting al-Qaeda communications in Southeast Asia in 1996 (see Before September 11, 2001). A staff member of the National Security Council who regularly attends briefings on bin Laden states, “We are probably tapped into every hotel room in Pakistan. We can listen in to just about every phone call in Afghanistan.” However, he and other critics will claim one reason why US intelligence failed to stop terrorism before 9/11 was because there was too much of a focus on electronic intelligence gathering and not enough focus on human interpretation of that vast data collection. [Toronto Star, 2/2/2002]

Entity Tags: United Kingdom, United States, Osama bin Laden, Echelon, National Security Council, Canada, Australia, Al-Qaeda, New Zealand

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

All the alleged 9/11 hijackers reportedly check in at the airports from where they board Flights 11, 175, 77, and 93. [9/11 Commission, 7/24/2004, pp. 1-4; 9/11 Commission, 8/26/2004, pp. 27, 89, 93] Since 1998, the FAA has required air carriers to implement a program called the Computer Assisted Passenger Prescreening System (CAPPS). This identifies those passengers who might be a security risk, based upon suspicious behavior such as buying one-way tickets or paying with cash. CAPPS also randomly assigns some passengers to receive additional security scrutiny. If a particular passenger has been designated as a “selectee,” this information is transmitted to the airport’s check-in counter, where a code is printed on their boarding pass. At the airport’s security checkpoints, selectees are subjected to additional security measures. [US News and World Report, 4/1/2002; 9/11 Commission, 1/27/2004; US Congress, 3/17/2004; 9/11 Commission, 8/26/2004, pp. 2, 85] Their baggage is to be screened for explosives or held off the plane until they have boarded. Supposedly, the thinking behind this is that someone smuggling a bomb onto a plane won’t get onto that same flight. According to the 9/11 Commission, nine of the 19 hijackers are flagged by the CAPPS system before boarding Flights 11, 175, 77, and 93. [Washington Post, 1/28/2004; 9/11 Commission, 7/24/2004, pp. 84; United States of America v. Zacarias Moussaoui, a/k/a Shaqil, a/k/a Abu Khalid al Sahrawi, Defendant, 3/6/2006] In addition, Mohamed Atta was selected when he checked in at the airport in Portland, for his earlier connecting flight to Boston (see 5:33 a.m.-5:40 a.m. September 11, 2001). All of the hijackers subsequently pass through security checkpoints before boarding their flights. [9/11 Commission, 7/24/2004, pp. 1-4]

Entity Tags: Federal Aviation Administration, Computer Assisted Passenger Prescreening System

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

President Bush (below television screen) meeting with the National Security Council in a bunker below the White House. In the far row from left to right, are Attorney General Ashcroft, President Bush, Chief of Staff Card, CIA Director Tenet, and counterterrorism “tsar” Ckarke. In the near row, Secretary of State Powell can be seen waving his hand, and National Security Advisor Rice sits to his right.President Bush (below television screen) meeting with the National Security Council in a bunker below the White House. In the far row from left to right, are Attorney General Ashcroft, President Bush, Chief of Staff Card, CIA Director Tenet, and counterterrorism “tsar” Ckarke. In the near row, Secretary of State Powell can be seen waving his hand, and National Security Advisor Rice sits to his right. [Source: Eric Draper/ White House]President Bush meets with his full National Security Council. According to journalist Bob Woodward, this meeting turns out to be “unwieldy.” So at 9:30 p.m., Bush follows it with a meeting with a smaller group of his most senior principal national security advisers in the Presidential Emergency Operations Center (PEOC) beneath the White House. Bush and his advisers have already decided bin Laden is behind the attacks. As the president later recalls, in these meetings, “That’s when we first got the indication… we’ve identified, we think it’s al-Qaeda.” He says the FBI now thinks that “it’s al-Qaeda, and we start to develop our plans to get them. I mean, there wasn’t any hesitation. We’re starting the process of coalition-building and how to get ‘em.” (According to other accounts, though, the CIA had informed Bush hours earlier that it was virtually certain al-Qaeda was to blame for the attacks (see (3:15 p.m.) September 11, 2001).) CIA Director George Tenet says that al-Qaeda and the Taliban in Afghanistan are essentially one and the same. Tenet says, “Tell the Taliban we’re finished with them.” [Sammon, 2002, pp. 133; Woodward, 2002, pp. 31-33; Washington Post, 1/27/2002] The president says, “I want you all to understand that we are at war and we will stay at war until this is done. Nothing else matters. Everything is available for the pursuit of this war. Any barriers in your way, they’re gone. Any money you need, you have it. This is our only agenda.” When, later in the discussion, Defense Secretary Donald Rumsfeld points out that international law only allows force to prevent future attacks and not for retribution, Bush yells, “No. I don’t care what the international lawyers say, we are going to kick some ass.” [Clarke, 2004, pp. 23-24] Bush will subsequently announce a new US doctrine of preemptive attack the following June (see June 1, 2002). [Time, 6/23/2002] During the meeting, the president refers to the present political situation as a “great opportunity” (see (Between 9:30 p.m. and 10:00 p.m.) September 11, 2001). By the time the meeting ends, it is after 10 p.m. [Sammon, 2002, pp. 133]

Entity Tags: Osama bin Laden, Taliban, National Security Council, Richard A. Clarke, George W. Bush, Donald Rumsfeld, Al-Qaeda, George J. Tenet, Condoleezza Rice

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

An illustration of the NIMD dataflow.An illustration of the NIMD dataflow. [Source: LibertyThink.com] (click image to enlarge)Shortly after the 9/11 attacks, the NSA awards $64 million in research contracts for a program called Novel Intelligence from Massive Data (NIMD). [New York Times, 5/21/2003; National Journal, 1/20/2006] NIMD is one of several cutting-edge data mining technologies that not only has the capability of finding keywords among millions of electronically monitored communications, but can find hidden relationships among data points, and even critique the thinking and biases of a particular analyst and suggest alternative hypotheses differing from the human analysts’ conclusion. Like other data-mining technologies, the NSA will steadfastly refuse to discuss whether NIMD is used to analyze data from domestic surveillance operations. NIMD is designed as an preliminary sort program, to keep human analysts from becoming overwhelmed by raw data. In essence, NIMD is an early-warning system. “NIMD funds research to…help analysts deal with information-overload, detect early indicators of strategic surprise, and avoid analytic errors,” according to the “Call for 2005 Challenge Workshop Proposals” released by the Advanced Research and Development Activity (ARDA). ARDA was founded in 1998 to create, design, and field new technologies for US intelligence agencies, particularly the NSA. A selected few Congressional lawmakers (see January 18, 2006) were informed that the warrantless surveillance program authorized by President George W. Bush (see Early 2002) was designed to be an early-warning system for possible terrorist attacks or plans. Assistant Attorney General William Moschella will inform the top Democrats and Republicans on the House and Senate Intelligence committees in December 2002 that the “president determined that it was necessary following September 11 to create an early-warning detection system” to prevent more attacks. He will justify the use of programs such as NIMD by claiming, as NSA director Michael Hayden and other administration officials have repeatedly claimed, that the Foreign Intelligence Surveillance Act (FISA), which allows the government to obtain warrants to conduct domestic eavesdropping or wiretapping, “could not have provided the speed and agility required for the early-warning detection system.” Many experts outside of the Bush administration feel that NIMD and other programs do not have to operate outside of the Foreign Intelligence Surveillance Act (FISA) because of limitations in the law, but because of the fact that the programs cannot meet the law’s minimum requirements for surveillance. FISA requires that any such surveillance must have a probable cause that the target is a terrorist. NIMD has no such threshold. Steven Aftergood, an expert on intelligence and government secrecy with the Federation of American Scientists, will say in 2006, “Logistically speaking, the early-warning approach may involve a significant increase in the number of surveillance actions. It may be that neither the Justice Department nor the [Foreign Intelligence Surveillance Court, which approves wiretapping warrants] is prepared to prepare and process several thousand additional FISA applications per year, beyond the 1,700 or so approved in 2004.” [National Journal, 1/20/2006] Some experts will later express the opinion that NIMD is the controversial Total Information Awareness program in a slightly different form (see February 2003 and September 2002).

Entity Tags: Senate Intelligence Committee, US Department of Justice, Total Information Awareness, William E. Moschella, Tom Armour, Novel Intelligence from Massive Data, Steven Aftergood, Michael Hayden, National Security Agency, Advanced Capabilities for Intelligence Analysis, Advanced Research and Development Activity, John Poindexter, Foreign Intelligence Surveillance Act, George W. Bush, Federation of American Scientists (FAS), House Intelligence Committee

Timeline Tags: Civil Liberties

NSA director Michael Hayden addresses the NSA in a global videoconference, saying that the NSA, like other government agencies, will have to do more to protect the country from further terrorist attacks. The challenge, he says, is to balance Americans’ security with civil liberties, “to keep America free by making Americans feel safe again.” Hayden will say in a 2006 speech reflecting on that videoconference (see January 23, 2006) that US citizens operate under misconceptions about the NSA’s capabilities—that while citizens believe the NSA has a global electronic surveillance network that can, and does, spy on citizens willy-nilly, in reality the NSA is understaffed and unprepared to handle the technological advances of the last decade. Hayden will say that with more extensive domestic surveillance of US citizens and foreign visitors, the NSA could have caught some of the 9/11 hijackers before they were able to put their plan into motion. The standards by which US citizens and foreign visitors are monitored must change, Hayden believes.
Expansion of NSA Surveillance Powers - Using Ronald Reagan’s 1981 executive order 12333 (see December 4, 1981), Hayden expands the NSA’s domestic surveillance practices to eavesdrop, sometimes without court approval, on selected international calls made by US citizens. Though Hayden’s expansion of NSA surveillance is not directly authorized by President Bush, and is not the same program as authorized by Bush’s secret executive order of 2002 (see Early 2002), Hayden will later say that this expansion is based on the intelligence community’s assessment “of a serious and continuing threat to the homeland.” Hayden’s program is reviewed and approved by lawyers at the NSA, the Justice Department, and the White House, as well as Attorney General John Ashcroft. [Michael Hayden, 1/23/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, US Department of Justice, National Security Agency, John Ashcroft, George W. Bush, Bush administration (43), Ronald Reagan, Michael Hayden

Timeline Tags: Civil Liberties

The US Congress adopts a joint resolution, the Authorization for Use of Military Force (AUMF), that determines that “the president is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons.” Congress also states that the “grave acts of violence” committed on the US “continue to pose an unusual and extraordinary threat to [its] national security and foreign policy.” [US Congress, 9/14/2001] President Bush signs the resolution into law on September 18. [White House, 9/18/2001] The passage of the AUMF served another purpose: to extend presidential power. While the Defense Department and the Joint Chiefs of Staff intended the AUMF to define the conflict in narrow terms, and authorize the US to move militarily against al-Qaeda and its confederates, and the Taliban, Vice President Dick Cheney and his chief of staff, David Addington, had a larger goal. Attorney Scott Horton, who has written two major studies on interrogation of terrorism suspects for the New York City Bar Association, says in 2005 that Cheney and Addington “really wanted [the AUMF defined more broadly], because it provided the trigger for this radical redefinition of presidential power.” Addington helped draft a Justice Department opinion in late 2001, written by lawyer John Yoo (see Late September 2001), that asserted Congress cannot “place any limits on the president’s determinations as to any terrorist threat, the amount of military force to be used in response, or the method, timing, and nature of the response.” [US News and World Report, 5/21/2006]

Entity Tags: US Department of Defense, Taliban, Scott Horton, Joint Chiefs of Staff, Richard (“Dick”) Cheney, David S. Addington, George W. Bush, John C. Yoo, Al-Qaeda, Authorization to Use Military Force (AUMF)

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

John Yoo, a deputy assistant attorney general in the Department of Justice (DOJ) Office of Legal Counsel (OLC), issues a legal opinion that says the US can conduct electronic surveillance against its citizens without probable cause or warrants. According to the memo, the opinion was drafted in response to questions about whether it would be constitutional to amend the Foreign Intelligence Surveillance Act (FISA) to state that searches may be approved when foreign intelligence collection is “a purpose” of the search, rather than “the purpose.” Yoo finds this would be constitutional, but goes further. He asserts that FISA is potentially in conflict with the Constitution, stating, “FISA itself is not required by the Constitution, nor is it necessarily the case that its current standards match exactly to Fourth Amendment standards.” Citing Vernonia School Dist. 47J v. Acton, in which the Supreme Court found that warrantless searches of students were permissible, Yoo argues that “reasonableness” and “special needs” are also the standards according to which warrantless monitoring of the private communications of US persons is permissible. According to Yoo, the Fourth Amendment requirement for probable cause and warrants prior to conducting a search pertain primarily to criminal investigations, and in any case cannot be construed to restrict presidential responsibility and authority concerning national security. Yoo further argues that in the context of the post-9/11 world, with the threat posed by terrorism and the military nature of the fight against terrorism, warrantless monitoring of communications is reasonable. Some information indicates the NSA began a broad program involving domestic surveillance prior to the 9/11 attacks, which contradicts the claim that the program began after, and in response to, the attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [US Department of Justice, 9/25/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Inspectors General, 7/10/2009]
Yoo Memo Used to Support Legality of Warrantless Surveillance - Yoo’s memo will be cited to justify the legality of the warrantless domestic surveillance program authorized by President Bush in October 2001 (see October 4, 2001). NSA Director General Michael Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general.” The various post-9/11 NSA surveillance activities authorized by Bush will come to be referred to as the President’s Surveillance Program (PSP), and the first memo directly supporting the program’s legality will be issued by Yoo on November 2, 2001, after the program has been initiated (see November 2, 2001). Many constitutional authorities will reject Yoo’s legal rationale. [Michael Hayden, 1/23/2006]
Yoo Memo Kept Secret from Bush Officials Who Might Object - According to a report by Barton Gellman and Jo Becker in the Washington Post, the memo’s “authors kept it secret from officials who were likely to object,” including ranking White House national security counsel John Bellinger, who reports to National Security Adviser Condoleezza Rice. Bellinger’s deputy, Bryan Cunningham, will tell the Post that Bellinger would have recommended having the program vetted by the Foreign Intelligence Surveillance Court, which oversees surveillance under FISA. Gellman and Becker quote a “senior government lawyer” as saying that Vice President Dick Cheney’s attorney, David Addington, had “open contempt” for Bellinger, and write that “more than once he accused Bellinger, to his face, of selling out presidential authority for good ‘public relations’ or bureaucratic consensus.” [Washington Post, 6/24/2007]

Entity Tags: US Department of Justice, John Bellinger, National Security Agency, Bryan Cunningham, Condoleezza Rice, David S. Addington, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Office of Legal Counsel (DOJ), John C. Yoo, George W. Bush, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

Lt. Col. Stuart Couch.Lt. Col. Stuart Couch. [Source: Wall Street Journal]Mohamedou Ould Slahi, a Mauritanian businessman and alleged liaison between Islamic radicals in Hamburg and Osama bin Laden with foreknowledge of the 9/11 plot (see 1999 and January-April 2000), is arrested in Mauritania by secret police, his family says. By December, he will be in US custody. He will later be housed at a secret CIA facility within Camp Echo at the Guantanamo Bay Naval Station. [Washington Post, 12/17/2004] In 2007, it will be reported that one of Slahi’s prosecutors, Lt. Col. Stuart Couch, has refused to continue to prosecute Slahi after learning details of Slahi’s tortures at Guantanamo. [Wall Street Journal, 3/31/2007] The Nation will later report, “Aside from the beatings, waterboarding, stress positions, and sexual degradation that have been the norm at Guantanamo, Slahi was taunted with details of his mother’s incarceration and rape in an elaborate hoax by an officer who claimed to be representing the White House.” While Couch believes Slahi is a high-level al-Qaeda operative, he also believes the much of the evidence against him is not credible because of the methods used to obtain it. [Nation, 4/4/2007]

Entity Tags: Stuart Couch, Mohamedou Ould Slahi

Timeline Tags: Torture of US Captives, Complete 911 Timeline

Bradford Berenson.Bradford Berenson. [Source: PBS]In the weeks following 9/11, government lawyers begin to formulate a legal response to the newly perceived threat of terrorism. Four related issues are at hand: forceful prevention, detention, prosecution, and interrogation. What degree of force can the government employ to prevent acts of terrorism or apprehend suspected terrorists? How and where can it best detain terrorists if captured? How can it best bring them to trial? And how can it best obtain information from them on terrorist organizations and plots? These questions are handled in a new atmosphere that is more tolerant towards flexible interpretations of the law. Bradford Berenson, an associate White House counsel at this time, later recalls: “Legally, the watchword became ‘forward-leaning’ by which everybody meant: ‘We want to be aggressive. We want to take risks.’” [New York Times, 10/24/2004] This attitude is seemingly in line with the president’s thinking. Counterterrorism “tsar” Richard Clarke will later recall President Bush saying, “I don’t care what the international lawyers say. We are going to kick some ass” (see (9:00 p.m.-10:00 p.m.) September 11, 2001). [Clarke, 2004, pp. 23-24] At the center of legal reconstruction work are Alberto R. Gonzales, the White House counsel, his deputy Timothy E. Flanigan, and David S. Addington, legal counsel to Vice President Cheney. [New York Times, 12/19/2004] They will find a helpful hand in the Justice Department’s Office of Legal Counsel (OLC), most notably its head, Assistant Attorney General Jay S. Bybee [Los Angeles Times, 6/10/2004] and his deputies John C. Yoo [New York Times, 8/15/2004] and Patrick F. Philbin. Most of the top government lawyers dwell in fairly conservative circles, with many being a member of the Federalist Society, a conservative legal fraternity. Some have clerked for conservative Supreme Court Justices Antonin Scalia and Clarence Thomas, whose ruling effectively lead to the presidency being awarded to George W. Bush after the 2000 presidential election. [New York Times, 10/24/2004] Others worked for Judge Lawrence H. Silberman, who set up secret contacts with the Iranian government under President Reagan leading to the Iran-Contra scandal, and who advised on pursuing allegations of sexual misconduct by President Clinton. [Inter Press Service, 2/6/2004]

Entity Tags: Patrick F. Philbin, Richard A. Clarke, John C. Yoo, Joan Claybrook, Alberto R. Gonzales, Bradford Berenson, Jay S. Bybee, Alan M. Dershowitz, Rena Steinzor

Timeline Tags: Torture of US Captives, Civil Liberties

NSA Director Michael Hayden briefs the House Intelligence Committee on the NSA’s efforts to combat terrorism. Though the NSA is already working on a domestic wiretapping program to spy, without warrants, on US citizens (see Early 2002), Hayden does not mention the program to the committee members, but merely discusses the ramifications of President Reagan’s Executive Order 12333 (see December 4, 1981 and September 13, 2001) on NSA functions. He does not mention that Reagan’s executive order forbids warrantless surveillance of US citizens “unless the Attorney General has determined in each case that there is probable cause to believe that the technique is directed against a foreign power or an agent of a foreign power.” On October 11, committee member Nancy Pelosi (D-CA) will write to Hayden expressing her concerns about the warrantless nature of the NSA wiretaps (see October 11, 2001). [Washington Post, 1/4/2006]

Entity Tags: National Security Agency, House Intelligence Committee, Michael Hayden, Nancy Pelosi, Terrorist Surveillance Program, Ronald Reagan

Timeline Tags: Civil Liberties

President Bush issues a directive authorizing the National Security Agency (NSA) to operate a warrantless domestic surveillance program. Author/journalist Jane Mayer will report in 2011, “[O]n October 4, 2001, Bush authorized the policy, and it became operational by October 6th,” and, “[t]he new policy, which lawyers in the Justice Department justified by citing President Bush’s executive authority as commander in chief, contravened a century of constitutional case law.” Mayer will interview NSA whistleblower Thomas Drake for her article and quote him as saying that, following the October 4 directive, “strange things were happening. Equipment was being moved. People were coming to me and saying, ‘We’re now targeting our own country!’” Bush’s directive is based on a legal opinion drafted by Department of Justice Office of Legal Counsel Deputy Attorney General John Yoo (see September 25, 2001). [New Yorker, 5/23/2011]
Conflicting Information regarding Date of First Authorization - The existence of the NSA’s domestic surveillance program will first be made public in December 2005, following reporting by the New York Times that will cite “[n]early a dozen current and former officials” (see December 15, 2005). The Times article will state that in 2002, “[m]onths after the Sept. 11 attacks,” Bush signed an executive order authorizing the NSA to monitor domestic phone calls, including those of US citizens and permanent residents, if one end of the call was outside the country. The Times article also mentions an NSA “‘special collection program’ [that] began soon after the Sept. 11 attacks, as it looked for new tools to attack terrorism.” The difference between the October 4, 2001 directive and the 2002 executive order referred to by the Times is unclear. [New York Times, 12/16/2005]
Other Sources for October Directive - Other sources, including Bush, NSA Director General Michael Hayden, and the inspectors general of five separate agencies, will later refer to a presidential order having been given in “October,” or “weeks” after the 9/11 attacks, and say that, subsequent to this order, international calls of US persons are targeted for content-monitoring. Following the publication of the Times article, Bush will say in a December 17, 2005 radio address: “In the weeks following the terrorist attacks on our nation, I authorized the National Security Agency, consistent with US law and the Constitution, to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations. Before we intercept these communications, the government must have information that establishes a clear link to these terrorist networks” (see December 17, 2005). This presidential authorization was based on a legal opinion drafted by Department of Justice Office of Legal Counsel attorney John Yoo (see October 18, 2001). [WhiteHouse(.gov), 12/17/2005] Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001,” which is when he “gathered key members of the NSA workforce… [and] introduced [the NSA’s] new operational authority to them.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general,” and that “the three most senior and experienced lawyers in NSA… supported the lawfulness of this program.” [Michael Hayden, 1/23/2006] In a July 10, 2009 jointly-issued report, the inspectors general of the Department of Defense, Department of Justice, CIA, NSA, and Office of the Director of National Intelligence will refer to the “President’s Surveillance Program” (PSP) and “the program’s inception in October 2001.” The report will say: “One of the activities authorized as part of the PSP was the interception of the content of communications into and out of the United States where there was a reasonable basis to conclude that one party to the communication was a member of al-Qaeda or related terrorist organizations.… The attorney general subsequently publicly acknowledged the fact that other intelligence activities were also authorized under the same presidential authorization, but the details of those activities remain classified.” [Inspectors General, 7/10/2009] Citing “a senior administration official,” the Washington Post will report on January 4, 2006: “The secret NSA program… was authorized in October 2001.… The president and senior aides have publicly discussed various aspects of the program, but neither the White House, the NSA, nor the office of the director of national intelligence would say what day the president authorized it.” [Washington Post, 1/4/2006]

Entity Tags: US Department of Justice, Thomas Drake, US Department of Defense, Office of Legal Counsel (DOJ), Office of the Director of National Intelligence, Michael Hayden, National Security Agency, George W. Bush, Central Intelligence Agency, John C. Yoo, Jane Mayer

Timeline Tags: Civil Liberties

Nancy Pelosi.Nancy Pelosi. [Source: US Congress]House Minority Leader Nancy Pelosi (D-CA) writes to NSA Director Michael Hayden questioning the nature and extent of the apparently illegal warrantless wiretapping of US citizens by the agency. Pelosi and other members of the House Intelligence Committee were briefed on October 1, 2001, by Hayden, whose agency began conducting surveillance against US citizens after the 9/11 attacks (see After September 11, 2001). Pelosi will release the letter on January 6, 2006, three weeks after the New York Times revealed that the NSA had been conducting electronic surveillance of US citizens without warrants since at least 2002 (see December 15, 2005.) Pelosi’s office will also release Hayden’s response, but almost the entire letter from Hayden is redacted.
Letter to Hayden - Pelosi writes in part, “[Y]ou indicated [in the briefing] that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance under the Foreign Intelligence Surveillance Act and related statutes, orders, regulations, and guidelines.… For several reasons, including what I consider to be an overly broad interpretation of President Bush’s directive of October 5 on sharing with Congress ‘classified or sensitive law enforcement information’ it has not been possible to get answers to my questions. Without those answers, the concerns I have about what you said on the First can not be resolved, and I wanted to bring them to your attention directly. You indicated that you were treating as a matter of first impression, [redacted ] being of foreign intelligence interest. As a result, you were forwarding the intercepts, and any information [redacted ] without first receiving a request for that identifying information to the Federal Bureau of Investigation. Although I may be persuaded by the strength of your analysis [redacted ] I believe you have a much more difficult case to make [redacted ] Therefore, I am concerned whether, and to what extent, the National Security Agency has received specific presidential authorization for the operations you are conducting. Until I understand better the legal analysis regarding the sufficiency of the authority which underlies your decision on the appropriate way to proceed on this matter, I will continue to be concerned.” The only portion of Hayden’s October 18 reply regarding Pelosi’s concerns that has not been redacted reads, “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” In January 2006, an NSA official will say that Pelosi’s concerns were adequately addressed in Hayden’s reply, and in a private briefing shortly thereafter. [Washington Post, 1/4/2006; Nancy Pelosi, 1/6/2006]
Pelosi Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). Pelosi is apparently unaware of any of this.

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi

Timeline Tags: Civil Liberties

NSA Director Michael Hayden responds to an October 11 letter from Representative Nancy Pelosi (see October 11, 2001), expressing concerns about the NSA’s post-9/11 surveillance expansion (see After September 11, 2001) that Hayden outlined for the House Intelligence Committee on October 1 (see October 1, 2001), and asking whether the president authorized it. The substance of Hayden’s October 18 reply will be redacted, except for this statement: “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” [Nancy Pelosi, 1/6/2006] A January 4, 2006 report in the Washington Post will cite “intelligence official close to Hayden” as saying that “[Hayden’s] appearance on Oct. 1, 2001, before the House committee had been to discuss Executive Order 12333, and not the new NSA program,” and that “Pelosi’s concerns had been answered in writing and again several weeks later during a private briefing.” [Washington Post, 1/4/2006] In a January 23, 2006 public briefing, Hayden will say, “September 2001, I asked to update the Congress on what NSA had been doing, and I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities,” and, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” [Michael Hayden, 1/23/2006]
Nature of Hayden's EO 12333 Surveillance Program - The full scope of Hayden’s surveillance program is unclear, but some sources indicate it includes the wholesale collection and data-mining of phone records provided by telecom companies and placement of pen registers (call trackers) on domestic phone numbers (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, October 2001), and October 31, 2001). Some sources indicate the NSA began large-scale domestic surveillance activities prior to the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi, National Security Agency

Timeline Tags: Civil Liberties

Serhane Abdelmajid Fakhet.Serhane Abdelmajid Fakhet. [Source: Spanish Interior Ministry]Serhane Abdelmajid Fakhet, later considered one of about three masterminds of the 2004 Madrid train bombings (see 7:37-7:42 a.m., March 11, 2004), is already being monitored by Spanish intelligence. On this day, he is photographed with Barakat Yarkas, leader of al-Qaeda’s main cell in Spain. Yarkas will be arrested for an alleged role in the 9/11 attacks less than a month later (see November 13, 2001). [El Mundo (Madrid), 8/16/2005] Fakhet had been under surveillance since 2000. [Irujo, 2005, pp. 182-186] He will allegedly blow himself up not long after the bombings (see 9:05 p.m., April 3, 2004). There are allegations that he was an informant at least by 2003 (see Shortly After October 2003). Also seen in the pictures are Yusuf Galan, another member of Yarkas’s cell who will be arrested with Yarkas and later convicted (see September 26, 2005), and Mouhannad Almallah, who has been under surveillance since at least 1998. Almallah will later be sentenced to 12 years in prison for a role in the Madrid bombings (see October 31, 2007). [El Mundo (Madrid), 10/27/2004]

Entity Tags: Serhane Abdelmajid Fakhet, Centro Nacional de Inteligencia, Barakat Yarkas, Mouhannad Almallah, Yusuf Galan

Timeline Tags: Complete 911 Timeline

John Yoo, a deputy assistant attorney general in the Justice Department’s Office of Legal Counsel, and OLC special counsel Robert Delahunty issue a joint memo to White House counsel Alberto Gonzales. The memo claims that President Bush has sweeping extraconstitutional powers to order military strikes inside the US if he says the strikes are against suspected terrorist targets. In the days following the 9/11 attacks, Gonzales asked if Bush could legally order the military to combat potential terrorist activity within the US. The memo is first revealed to exist seven years later (see April 2, 2008) after future OLC head Steven Bradbury acknowledges its existence to the American Civil Liberties Union; it will be released two months after the Bush administration leaves the White House (see March 2, 2009). [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009]
Granting Extraordinary, Extraconstitutional Authority to Order Military Actions inside US - Yoo and Delahunty’s memo goes far past the stationing of troops to keep watch at airports and around sensitive locations. Instead, the memo says that Bush can order the military to conduct “raids on terrorist cells” inside the US, and even to seize property. “The law has recognized that force (including deadly force) may be legitimately used in self-defense,” they write. In 2009, Reuters will write, “The US military could have kicked in doors to raid a suspected terrorist cell in the United States without a warrant” under the findings of the OLC memo. “We do not think that a military commander carrying out a raid on a terrorist cell would be required to demonstrate probable cause or to obtain a warrant,” Yoo and Delahunty write. [US Department of Justice, 10/23/2001 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009] The memo reasons that since 9/11, US soil can be legally construed as being a battlefield, and Congress has no power to restrict the president’s authority to confront enemy tactics on a battlefield. [Savage, 2007, pp. 131]
No Constitutional or Other Legal Protections - “[H]owever well suited the warrant and probable cause requirements may be as applied to criminal investigations or to other law enforcement activities, they are unsuited to the demands of wartime and the military necessity to successfully prosecute a war against an enemy. [Rather,] the Fourth Amendment does not apply to domestic military operations designed to deter and prevent foreign terrorist attacks.” Any objections based on the Fourth Amendment’s ban on unreasonable search and seizures would be invalid since whatever possible infringement on privacy would be trumped by the need to protect the nation from injury by deadly force. The president is “free from the constraints of the Fourth Amendment.” The Posse Comitatus Act, which bars the military from operating inside the US for law enforcement purposes, is also moot, the memo says, because the troops would be acting in a national security function, not as law enforcement. [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009; Ars Technica, 3/2/2009] There are virtually no restrictions on the president’s ability to use the military because, Yoo and Delahunty write, the nation is in a “state of armed conflict.” The scale of violence, they argue, is unprecedented and “legal and constitutional rules” governing law enforcement, even Constitutional restrictions, no longer apply. The US military can be used for “targeting and destroying” hijacked airplanes, they write, or “attacking civilian targets, such as apartment buildings, offices, or ships where suspected terrorists were thought to be.” The memo says, “Military action might encompass making arrests, seizing documents or other property, searching persons or places or keeping them under surveillance, intercepting electronic or wireless communications, setting up roadblocks, interviewing witnesses, or searching for suspects.” [Newsweek, 3/2/2009] Yoo writes that the Justice Department’s criminal division “concurs in our conclusion” that federal criminal laws do not apply to the military during wartime. The criminal division is headed by Michael Chertoff, who will become head of the Department of Homeland Security. [Washington Post, 4/4/2008]
Sweeping Away Constitutional Rights - Civil litigator Glenn Greenwald will later note that the memo gives legal authorization for President Bush to deploy the US military within US borders, to turn it against foreign nationals and US citizens alike, and to render the Constitution’s limits on power irrelevant and non-functional. Greenwald will write, “It was nothing less than an explicit decree that, when it comes to presidential power, the Bill of Rights was suspended, even on US soil and as applied to US citizens.”
Justifying Military Surveillance - Greenwald will note that the memo also justifies the administration’s program of military surveillance against US citizens: “[I]t wasn’t only a decree that existed in theory; this secret proclamation that the Fourth Amendment was inapplicable to what the document calls ‘domestic military operations’ was, among other things, the basis on which Bush ordered the NSA, an arm of the US military, to turn inwards and begin spying—in secret and with no oversight—on the electronic communications (telephone calls and emails) of US citizens on US soil” (see December 15, 2005 and Spring 2004). “If this isn’t the unadorned face of warped authoritarian extremism,” Greenwald will ask, “what is?” [Salon, 3/3/2009] If the president decides to use the military’s spy agency to collect “battlefield intelligence” on US soil, no law enacted by Congress can regulate how he goes about collecting that information, including requiring him to get judicial warrants under the Foreign Intelligence Surveillance Act (FISA). In 2007, Yoo will say in an interview: “I think there’s a law greater than FISA, which is the Constitution, and part of the Constitution is the president’s commander in chief power. Congress can’t take away the president’s powers in running war.” [Savage, 2007, pp. 131; PBS Frontline, 5/15/2007] Cheney and Addington will push the NSA to monitor all calls and e-mails, including those beginning and ending on US soil, but the NSA will balk. Domestic eavesdropping without warrants “could be done and should be done,” Cheney and Addington argue, but the NSA’s lawyers are fearful of the legal repercussions that might follow once their illegal eavesdropping is exposed, with or without the Justice Department’s authorization. The NSA and the White House eventually reach a compromise where the agency will monitor communications going in and out of the US, but will continue to seek warrants for purely domestic communications (see Spring 2001, After September 11, 2001, and October 2001). [Savage, 2007, pp. 131]
Military Use Considered - In 2009, a former Bush administration lawyer will tell a reporter that the memo “gave rise to the Justice Department discussing with the Defense Department whether the military could be used to arrest people and detain people inside the United States. That was considered but rejected on at least one occasion.” The lawyer will not give any indication of when this will happen, or to whom. Under the proposal, the suspects would be held by the military as “enemy combatants.” The proposal will be opposed by the Justice Department’s criminal division and other government lawyers and will ultimately be rejected; instead, the suspects will be arrested under criminal statutes. [Los Angeles Times, 3/3/2009]

Entity Tags: Steven Bradbury, US Department of Homeland Security, US Department of Defense, Robert J. Delahunty, Office of Legal Counsel (DOJ), Bush administration (43), Michael Chertoff, Alberto R. Gonzales, National Security Agency, American Civil Liberties Union, Glenn Greenwald, George W. Bush, US Department of Justice, John C. Yoo

Timeline Tags: Civil Liberties

Vice President Dick Cheney summons the chairmen and ranking members of the Senate and House Intelligence Committees to the White House for a classified briefing on the secret NSA warrantless wiretapping program (see Early 2002). Cheney makes it clear to the lawmakers that he is merely informing them about the program, and not seeking their approval. [Washington Post, 12/18/2005] Officials later say that under any of the previous presidents, such a meeting of this import would involve the president. But the four lawmakers are hustled away from the Oval Office. Instead, “[w]e met in the vice president’s office,” Bob Graham (D-FL), the chairman of the Senate Intelligence Committee, later recalls. President Bush has already told Graham that “the vice president should be your point of contact in the White House.” Cheney, according to the president, “has the portfolio for intelligence activities.” [Washington Post, 6/24/2007] The leaders are briefed by Cheney, CIA Director George Tenet, and NSA Director Michael Hayden. The Congressional leaders will later mostly refuse to comment publicly about what they do and do not learn about the program, even after it is revealed to the public (see December 15, 2005). In 2003, when Senator John D. Rockefeller ascends to the Democratic leadership of the Senate committee, and is himself briefed on the program, he will write to Cheney expressing his concerns over it (see July 17, 2003). [New York Times, 12/15/2005]
'No Discussion about Expanding' NSA Wiretapping - In December 2005, after the program is revealed to the public, one of the Congressmen present at the briefings, Graham, the then-chairman of the Senate Intelligence Committee, will discuss his knowledge of the program. In contradiction to the characterizations of Bush and other White House officials, Graham will say that he recalls “no discussion about expanding [NSA eavesdropping] to include conversations of US citizens or conversations that originated or ended in the United States,” and knew nothing of Bush’s intention to ignore the Foreign Intelligence Surveillance Court (also known as the FISA court). “I came out of the room with the full sense that we were dealing with a change in technology but not policy,” Graham will recall, using new methodologies to intercept overseas calls that passed through US switches. He thought that NSA eavesdropping would continue to be limited to “calls that initiated outside the United States, had a destination outside the United States but that transferred through a US-based communications system.” Instead, Graham will say, it now seems that Bush decided to go “beyond foreign communications to using this as a pretext for listening to US citizens’ communications. There was no discussion of anything like that in the meeting with Cheney.” A senior intelligence official, who refuses to reveal his identity but says he is speaking with the permission of the White House, will accuse Graham of “misremembering the briefings,” which he will call “very, very comprehensive.” The official will refuse to discuss the briefings in any but the most general terms, but will say they were intended “to make sure the Hill knows this program in its entirety, in order to never, ever be faced with the circumstance that someone says, ‘I was briefed on this but I had no idea that—’ and you can fill in the rest.” Graham will characterize the official’s description as saying: “[W]e held a briefing to say that nothing is different.… Why would we have a meeting in the vice president’s office to talk about a change and then tell the members of Congress there is no change?” House Minority Leader Nancy Pelosi (D-CA), who was also present at the meeting as the ranking Democrat on the House Intelligence Committee, will say the briefing described “President Bush’s decision to provide authority to the National Security Agency to conduct unspecified activities.” She will note that she “expressed my strong concerns” but did not go into detail. [Washington Post, 12/18/2005]
Lawmakers Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). In the briefing, Cheney informs the lawmakers of none of this.

Entity Tags: Richard (“Dick”) Cheney, Senate Intelligence Committee, Nancy Pelosi, John D. Rockefeller, House Intelligence Committee, Daniel Robert (“Bob”) Graham, George J. Tenet, George W. Bush, Michael Hayden, National Security Agency

Timeline Tags: Civil Liberties

October 26, 2001: USA Patriot Act Becomes Law

President Bush signs the Patriot Act into law.President Bush signs the Patriot Act into law. [Source: White House]President Bush signs the USA Patriot Act (see October 2, 2001) into law. The act’s provisions include:
bullet 1) Non-citizens can be detained and deported if they provide “assistance” for lawful activities of any group the government chooses to call a terrorist organization. Under this provision the secretary of state can designate any group that has ever engaged in violent activity as a terrorist organization. Representative Patsy Mink (D-HI) notes that in theory supporters of Greenpeace could now be convicted for supporting terrorism. [San Francisco Chronicle, 11/12/2001]
bullet 2) Immigrants can be detained indefinitely, even if they are found not to have any links to terrorism. They can be detained indefinitely for immigration violations or if the attorney general decides their activities pose a danger to national security. They need never be given a trial or even a hearing on their status. [San Francisco Chronicle, 9/8/2002]
bullet 3) Internet service providers can be ordered to reveal the websites and e-mail addresses that a suspect has communicated to or visited. The FBI need only inform a judge that the information is relevant to an investigation. [Village Voice, 11/26/2001; San Francisco Chronicle, 9/8/2002]
bullet 4) The act “lays the foundation for a domestic intelligence-gathering system of unprecedented scale and technological prowess.” [Washington Post, 11/4/2001] It allows the government to access confidential credit reports, school records, and other records, without consent or notification. [San Francisco Chronicle, 9/8/2002] All of this information can now be given to the CIA, in violation of the CIA’s mandate prohibiting it from spying within the US. [Village Voice, 11/26/2001]
bullet 5) Financial institutions are encouraged to disclose possible violations of law or “suspicious activities” by any client. The institution is prohibited from notifying the person involved that it made such a report. The term “suspicious” is not defined, so it is up to the financial institutions to determine when to send such a report.
bullet 6) Federal agents can easily obtain warrants to review a library patron’s reading and computer habits (see January 2002). [Village Voice, 2/22/2002] Section 215 allows the FBI to ask the Foreign Intelligence Surveillance Court (FISC) for an order to obtain documents relating to counterterrorism investigations without meeting the usual standard of legal “probable cause” that a crime may have been committed. Senator Russ Feingold (D-WI—see October 9, 2001) says that Section 215 can allow the FBI to “go on a fishing expedition and collect information on virtually anyone.” Librarians will make Section 215 the centerpiece of their objections to the Patriot Act, arguing that the government can now “sweep up vast amounts of information about people who are not suspected of a crime.” In 2005, one librarian will say, “It reminds me of the Red Scare of the 1950s.” However, some FBI officials find it easier to use provisions of Section 505, which expands the usage of so-called “national security letters” (see November 28, 2001). [Roberts, 2008, pp. 39-40]
bullet 7) The government can refuse to reveal how evidence is collected against a suspected terrorist defendant. [Tampa Tribune, 4/6/2003]
Passes with No Public Debate - The law passes without public debate. [Village Voice, 11/9/2001; Village Voice, 11/26/2001] Even though it ultimately took six weeks to pass the law, there were no hearings or congressional debates. [Salon, 3/24/2003] Congressman Barney Frank (D-MA) says: “This was the least democratic process for debating questions fundamental to democracy I have ever seen. A bill drafted by a handful of people in secret, subject to no committee process, comes before us immune from amendment” (see October 2-4, 2001 and October 24, 2001). [Village Voice, 11/9/2001] Only 66 congresspeople, and one senator, Feingold, vote against it. Few in Congress are able to read summaries, let alone the fine print, before voting on it. [Los Angeles Times, 10/30/2001] Feingold says, “The new law goes into a lot of areas that have nothing to do with terrorism and have a lot to do with the government and the FBI having a wish list of things they want to do.” [Village Voice, 11/9/2001] Supporters of the act point out that some of its provisions will expire in four years, but in fact most provisions will not expire. [Chicago Tribune, 11/1/2001]
Mounting Opposition - One year later, criticism of the law will grow. [San Francisco Chronicle, 9/8/2002] Dozens of cities will later pass resolutions criticizing the Patriot Act (see January 12, 2003).

Entity Tags: George W. Bush, USA Patriot Act, Foreign Intelligence Surveillance Court, US Congress, Patsy Mink, Russell D. Feingold, Barney Frank

Timeline Tags: Complete 911 Timeline, Civil Liberties

Concerned that NSA post-9/11 surveillance operations violated the US Constitution, a senior NSA official reports on the program to House Intelligence Committee staff (see Before October 31, 2001), then retires. William Binney, a crypto-mathematician, had served in the NSA for 36 years. In 1997 he was made technical director of the World Geopolitical and Military Analysis Reporting Group, a 6000-employee unit that focused on signals intelligence (SIGINT) reporting and analysis. In the last part of his NSA career, Binney focused on dealing with the NSA’s problem of information overload, co-founding the Signals Intelligence Automation Research Center (SARC) and leading a 20-member team to develop a data-mining and analysis program called ThinThread. This program made it possible to “correlate data from financial transactions, travel records, Web searches, GPS equipment, and any other ‘attributes’ that an analyst might find useful,” and “could chart relationships among people in real time.” Unlike the NSA’s existing centralized data processing systems, ThinThread was able to identify useful or useless data as it was collected, reducing the overload problem. However, though it targeted foreign communications, ThinThread also intercepted those of Americans, and “continued documenting signals when a trail crossed into the US.” Binney incorporated measures to protect privacy, but NSA lawyers still considered the program too invasive, according to a 2011 article by Jane Mayer based on interviews with Binney and another NSA whistleblower, Thomas Drake. In 1999, NSA Director General Michael Hayden decided to fund a rival program, Trailblazer, which would be developed by defense contractors (see Late 1999). Trailblazer will be abandoned in 2006 as unworkable, after costing $1.2 billion (see January 2006). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012] In 2002, three NSA whistleblowers—Edward Loomis, J. Kirk Wiebe, and Binney—will ask the Pentagon to investigate the NSA for wasting “millions and millions of dollars” on Trailblazer. [Nation, 3/26/2013]
Post-9/11 NSA Surveillance Expansion - Binney will tell Mayer that, after the 9/11 attacks, his people began coming to him, saying things like: “They’re getting billing records on US citizens! They’re putting pen registers [call logs] on everyone in the country!” James Bamford will interview Binney in 2012 and write, “At the outset the program recorded 320 million calls a day, [Binney] says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” Binney has not been personally “read in” to this domestic surveillance program, but some members of his SARC team have, as their knowledge of ThinThread code was needed to set it up. Binney became convinced elements of ThinThread were being used, but without privacy protections, meaning US persons could be targeted. Soon after learning these things, Binney takes his concerns to the House Intelligence Committee (see Before October 31, 2001), and retires on October 31. He will tell Mayer, “I couldn’t be an accessory to subverting the Constitution.” Other sources support Binney’s account of this NSA data-mining and monitoring program (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, and October 2001). However, the claim that NSA domestic surveillance was initiated only after, and in response to, 9/11 is contradicted by information indicating that domestic monitoring programs and activities were established and conducted prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012]
ThinThread 'Would Likely Have Prevented 9/11' - Despite ThinThread’s capacity to collect actionable intelligence, Hayden vetoed the idea of deploying the system three weeks before 9/11, in August 2001. According to the Loomis, Wiebe, and Binney, this decision “left the NSA without a system to analyze the trillions of bits of foreign SIGINT flowing over the Internet at warp speed, as ThinThread could do.” During the summer of 2001, when “the system was blinking red,” according to CIA Director George Tenet, the NSA “failed to detect critical phone and e-mail communications that could have tipped US intelligence to al-Qaeda’s plans to attack.” [Nation, 3/26/2013]

Entity Tags: Edward Loomis, World Geopolitical and Military Analysis Reporting Group, J. Kirk Wiebe, William Binney, Thomas Drake, House Intelligence Committee, James Bamford, Trailblazer, Jane Mayer, National Security Agency, Signals Intelligence Automation Research Center, Michael Hayden, Thinthread

Timeline Tags: Civil Liberties

When investigators search the home of Amer el-Azizi, a known al-Qaeda operative, they find an e-mail address that connects him to 9/11 mastermind Khalid Shaikh Mohammed (KSM). El-Azizi helped arrange a meeting between lead hijacker Mohamed Atta and an associate, Ramzi bin al-Shibh, in the run-up to 9/11 (see July 8-19, 2001), although he was monitored by Spanish authorities at the time (see Before July 8, 2001) and arrested in Turkey in 2000 (see October 10, 2000). His arrest shortly after 9/11 will be frustrated by Spanish intelligence (see October 2001 and Shortly After November 21, 2001) and he will go on to be involved in the 2004 Madrid bombings (see Before March 11, 2004 and 7:37-7:42 a.m., March 11, 2004). An indictment released in 2004 will say, “A fundamental document… connects Amer el-Azizi directly with those responsible for the terrorist attacks of Sept. 11, 2001, and concretely with Khalid Shaikh Mohammed via the e-mail address identified as Safar86@usa.net.” The e-mail address “was being used by an individual who facilitated trips for al-Qaeda members in direct connection with [KSM], organizer of the attacks.” A detainee will also later say that el-Azizi was in contact with the 9/11 plotters via e-mail. [Los Angeles Times, 4/29/2004] After 9/11, however, when the Spanish want to indict el-Azizi, the US will be reluctant to turn the information over to them, and it will take six months to get it. Despite this, problems persist in information sharing between the US and Spain and this has an impact on prosecutions (see Mid-2002-June 1, 2006). [Wall Street Journal, 5/4/2004]

Entity Tags: Amer el-Azizi, Khalid Shaikh Mohammed

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

John Yoo, the Justice Department’s (DOJ) Office of Legal Counsel (OLC) deputy assistant attorney general, sends a classified memo to Attorney General John Ashcroft justifying warrantless surveillance of US persons. The National Security Agency (NSA)‘s domestic surveillance authorized by President Bush (see October 4, 2001, Early 2002, and December 15, 2005) will come to be publicly referred to as the President’s Surveillance Program (PSP). This is not the first Yoo memo supporting warrantless surveillance (see September 25, 2001), but a 2009 report on the PSP jointly issued by the inspectors general (IGs) of the Department of Defense (DOD), DOJ, CIA, National Security Agency (NSA), and Office of the Director of National Intelligence (ODNI) will refer to it as “[t]he first OLC opinion directly supporting the legality of the PSP.” The IGs’ report will quote from and comment on the memo, noting that “deficiencies in Yoo’s memorandum identified by his successors in the Office of Legal Counsel and the Office of the Deputy Attorney General later became critical to DOJ’s decision to reassess the legality of the program in 2003.” According to the IGs’ report, Yoo asserts that warrantless surveillance is constitutional as long as it is “reasonable” under the Fourth Amendment, which only protects against “unreasonable searches and siezures.” On this point, the IGs’ report will note that Yoo’s successors were troubled by his failure to discuss the Supreme Court’s decision in Youngstown Sheet & Tube Co. v. Sawyer (1952), which found the president’s wartime authority to be limited. His memo does acknowledge that the Foreign Intelligence Surveillance Act (FISA) “purports to be the exclusive statutory means for conducting electronic surveillance for foreign intelligence,” but asserts that it is only a “safe harbor for electronic surveillance” because it cannot “restrict the president’s ability to engage in warrantless searches that protect the national security.” Yoo also writes that Congress has not “made a clear statement in FISA that it sought to restrict presidential authority to conduct warrantless searches in the national security area.” The IGs’ report will state that Yoo’s successors considered this problematic because Yoo has omitted discussion of the fact that FISA explicitly authorizes the president to conduct warrantless surveillance during the first 15 days following a declaration of war by Congress, which they considered an expression of Congress’s intent to restrict warrantless surveillance to a limited period of time and specific circumstances. The IGs’ report will also state that Yoo’s memo discusses “the legal rationale for Other Intelligence Activities authorized as part of the PSP,” and that Yoo concludes, “[W]e do not believe that Congress may restrict the president’s inherent constitutional powers, which allow him to gather intelligence necessary to defend the nation from direct attack.” The IGs’ report will say that “Yoo’s discussion of some of the Other Intelligence Activities did not accurately describe the scope of these activities,” and that Yoo’s successors considered his discussion of these other activities to be “insufficient and presenting a serious impediment to recertification of the program as to form and legality.” [Inspectors General, 7/10/2009, pp. pp. 11-13]
Memo's Existence Revealed by ACLU Lawsuit - On December 15, 2005, the New York Times will report that Bush authorized an NSA warrantless domestic surveillance program after the 9/11 attacks (see December 15, 2005). The American Civil Liberties Union (ACLU) will request records pertaining to the program under the Freedom of Information Act (FOIA) and then sue the Justice Department for the release of records. The existence of Yoo’s November 2 memo will first be revealed in an October 19, 2007 deposition filed by then head of the OLC Steven Bradbury in response to the ACLU lawsuit, which says that it “[concerns] the legality of certain communications intelligence activities.” After the 2009 release of the IGs’ report the ACLU will notify the court and the government will agree to reprocess four OLC memos, including Yoo’s November 2 memo. This memo and a May 6, 2004 memo by Yoo’s OLC successor Jack Goldsmith that disputes many of Yoo’s conclusions will be released in heavily redacted form on March 18, 2011. [ACLU.org, 2/7/2006; United States District Court of DC, 10/19/2007; American Civil Liberties Union, 3/19/2011]
Constitutional Experts Dispute Yoo's Legal Rationale - Numerous authorities on the law will question or reject the legal bases for warrantless domestic surveillance. In 2003, Yoo will leave the OLC. Goldsmith will begin a review of the PSP, after which he will conclude it is probably illegal in some respects and protest, within the executive branch, its continuation (see Late 2003-Early 2004 and December 2003-June 2004). Following the public disclosure of its existence, a January 5, 2006 report by the Congressional Research Service will find it to be of dubious legality (see January 5, 2006). On January 19, 2006, the DOJ will issue a 42-page white paper laying out the legal bases for the program (see January 19, 2006). These bases will be reviewed and rejected by 14 constitutional scholars and former government officials in a joint letter to Congress on February 2, 2006. [al [PDF], 2/2/2006 pdf file] The American Bar Association will adopt a resolution on February 13, 2006 that rejects DOJ’s arguments and calls on Congress to investigate the program. [Delegates, 2/13/2006 pdf file] On August 17, 2006, in the case ACLU v. NSA, US district judge Anna Diggs Taylor will reject the government’s invocation of the “state secrets privilege” and its argument that plaintiffs’ lack standing due to their being unable to prove they were surveilled, and will rule that warrantless surveillance is in violation of “the separation of powers doctrine, the Administrative Procedures Act, the First and Fourth Amendments to the United States Constitution, the FISA, and Title III” (see August 17, 2006). Taylor’s ruling will be overturned on appeal, on the grounds that the plaintiffs lack standing as they cannot prove that surveillance has occurred. In another case, Al Haramain v. Barack Obama, the government will make the same arguments, but US district judge Vaughn Walker will reject these and conclude in 2010 that illegal surveillance occurred (see March 31, 2010). [Al-Haramain v. Obama, 3/31/2010]

Entity Tags: Steven Bradbury, Vaughn Walker, Ronald Dworkin, George W. Bush, John C. Yoo, American Bar Association, Office of Legal Counsel (DOJ), American Civil Liberties Union, John Ashcroft, Anna Diggs Taylor, US Department of Justice

Timeline Tags: Civil Liberties

The Geneva Conventions are mentioned in a memo issued the day after the publication of the Heritage Foundation paper (see November 5, 2001), but only to suggest that suspected terrorists should not be entitled to the rights enclosed in them. Patrick F. Philbin, a deputy in the OLC, sends a confidential 35-page memo to the White House legal counsel Gonzales, arguing that the president, as Commander-in-Chief, has “inherent authority” to establish military commissions without authorization from the US Congress. The 9/11 attacks are themselves “plainly sufficient” to justify the application of the laws of war. Furthermore, putting terrorists on trial under the laws of war, “does not mean,” according to Philbin, “that terrorists will receive the protections of the Geneva Conventions or the rights that laws of war accord to lawful combatants.” The Philbin memo will serve as a basis for a Presidential order (see November 13, 2001) establishing the option of military commissions, which will be drafted by Deputy White House Counsel Timothy E. Flanigan and David S. Addington, the legal counsel to Vice President Cheney. [New York Times, 10/24/2004]

Entity Tags: Patrick F. Philbin, Alberto R. Gonzales

Timeline Tags: Torture of US Captives

On November 13, 2001 Spanish police arrest cell leader Barakat Yarkas and ten other alleged members of his cell. Spanish police, led by judge Baltasar Garzon, appear confident that they have smashed the al-Qaeda presence in Spain (see November 13, 2001). However, a number of likely suspects are left at large:
bullet Moutaz Almallah. Spanish police will later say that he had contacts with Yarkas as far back as 1995, the year police began to monitor Yarkas. He is said to have served as the “political chief” of Yarkas’s cell. He and Yarkas were seen meeting with an al-Qaeda courier in 1998. He will move to London in 2002 to live with radical imam Abu Qatada (see August 2002). He will be arrested in 2005 for a role in the Madrid bombings but has yet to be tried (see August 2002). Curiously, in 1995, a police officer who also served as Garzon’s bodyguard, sold Almallah an apartment and stayed friends with him (see November 1995). [El Mundo (Madrid), 3/2/2005; BBC, 3/24/2005]
bullet Amer el-Azizi, who may have had a role in the 9/11 plot, is able to flee a police raid due to a tip-off from Spanish intelligence (see Shortly After November 21, 2001).
bullet Jamal Zougam, even though he has been under suspicion since 2000, and has been tied to al-Qaeda-linked imam Abu Qatada and Mohammed Fazazi, who preached at the mosque attended by the 9/11 hijackers (see 2000-Early March 2004). [New York Times, 11/20/2001; Irujo, 2005, pp. 162-164] A French investigator had warned Spanish intelligence in June 2001 that Zougam was an important Islamist militant in a number of countries and that he should be arrested (see June 2001). Zougam’s Madrid apartment was searched by police on August 10, 2001, and investigators found phone numbers of three other members of the cell, plus a video of mujaheddin fighters in Chechnya. [Associated Press, 3/17/2004]
bullet Serhane Abdelmajid Fakhet. Spanish intelligence began monitoring him in 2000 for his links to other members of the cell. He was photographed with Yarkas in October 2001 (see October 19, 2001). [Irujo, 2005, pp. 182-186] Another informant who later appears as a protected witness will claim that Fakhet was also a government informant (see Shortly After October 2003).
bullet Said Chedadi is arrested, but is later released. He had been monitored traveling to London with Yarkas and giving money to Qatada. He will go on to have a role in the Madrid bombings (see 1995-February 2001). He also is roommates with Dris Chebli up until Chebli is arrested in June 2003 (see April-June 2003). [New York Times, 11/14/2001; El Mundo (Madrid), 10/27/2004]
El-Azizi flees overseas, but allegedly instructs the other cell members not arrested to constitute new cells in Madrid and Morocco. Fakhet becomes a leader of the new cells. Even though the vast majority of those not arrested remain under surveillance, including Fakhet and Zougam (see Shortly Before March 11, 2004), they are able to stage the March 2004 Madrid train bombings (see 7:37-7:42 a.m., March 11, 2004). Fakhet will blow himself up shortly after those bombings, while Zougam will get life in prison for his role. El-Azizi has yet to be captured. Yarkas and most of the others arrested with him will be convicted for al-Qaeda ties in 2005 and given prison terms (see 7:37-7:42 a.m., March 11, 2004). [Irujo, 2005, pp. 165-174] A Spanish investigator will later call Yarkas the mastermind of the Madrid bombings even though he was in prison since 2001, because virtually all of the bombers were connected to him in some way. “It is very clear to me, that if by mastermind we mean the person who has put the group together, prepared the group, trained it ideologically, sent them to Afghanistan to be prepared militarily for terrorism, that man is [Yarkas], without any doubt.” [New York Times, 10/26/2004]

Entity Tags: Centro Nacional de Inteligencia, Baltasar Garzon, Serhane Abdelmajid Fakhet, Amer el-Azizi, Moutaz Almallah, Jamal Zougam, Said Chedadi, Barakat Yarkas

Timeline Tags: Complete 911 Timeline

The Spanish intelligence agency CESID (later renamed CNI) frustrates the arrest of a senior member of al-Qaeda in Europe, Amer el-Azizi, by Spanish police. Most members of the cell of which el-Azizi was a member were arrested shortly before, but el-Azizi had avoided the round-up by fleeing abroad (see October 2001). After returning to Spain, he again falls under police surveillance, but, according to Spanish police union head Jose Manuel Sanchez Fornet, his arrest is prevented by “interference” from CESID. Fornet will later say that a police recording made at this time shows two CESID agents going to el-Azizi’s house. This alerts el-Azizi that he is under surveillance and he flees his home. [El Mundo (Madrid), 4/29/2004] El-Azizi then remains in Spain for some weeks, selling his car to an associate. When his apartment is searched, police find more than a dozen bags with radical Islamic books and videos. They also find videos of bin Laden on his computer and pamphlets from groups like Hamas. [Wall Street Journal, 3/19/2004; Wall Street Journal, 4/7/2004; Los Angeles Times, 4/29/2004] El-Azizi was arrested and released twice before (see October 10, 2000). He helped plan a meeting for Mohamed Atta just before 9/11 (see Before July 8, 2001 and July 8-19, 2001), and will go on to be involved in the Madrid train bombings (see Before March 11, 2004 and 7:37-7:42 a.m., March 11, 2004).

Entity Tags: Centro Nacional de Inteligencia, Amer el-Azizi, Jose Manuel Sanchez Fornet

Timeline Tags: Complete 911 Timeline

Yaser Esam Hamdi in Afghanistan shortly after being captured there.Yaser Esam Hamdi in Afghanistan shortly after being captured there. [Source: Virginian Pilot]Yaser Esam Hamdi, who holds dual Saudi and US citizenship, is captured in Afghanistan by the Northern Alliance and handed over to US forces. According to the US government, at the time of his arrest, Hamdi carries a Kalashnikov assault rifle and is traveling with a Taliban military unit. The following month he will be transferred to Guantanamo. In April 2002, it will be discovered he is a US citizen. He will be officially be declared an “enemy combatant” and transferred to a Navy brig in Norfolk, Virginia (see April 2002). [CNN, 10/14/2004]

Entity Tags: Yaser Esam Hamdi

Timeline Tags: Torture of US Captives, Complete 911 Timeline, War in Afghanistan

Deputy Assistant Attorney Generals Patrick Philbin and John Yoo send a memorandum to Pentagon General Counsel William J. Haynes offering the legal opinion that US courts do not have jurisdiction to review the detention of foreign prisoners at Guantanamo Bay. Therefore detentions of persons there cannot be challenged in a US court of law. The memo is endorsed by the Department of Defense and White House legal counsel Alberto Gonzales. [Newsweek, 5/24/2004] The memo addresses “the question whether a federal district court would properly have jurisdiction to entertain a petition for a writ of habeas corpus filed on behalf of an alien detained at the US naval base at Guantanamo Bay, Cuba.” The conclusion of Philbin and Yoo is that it cannot, based primarily on their interpretation of a decision by the US Supreme Court in the 1950 Eisentrager case, in which the Supreme Court determined that no habeas petition should be honored if the prisoners concerned are seized, tried, and held in territory that is outside of the sovereignty of the US and outside the territorial jurisdiction of any court of the US. Both conditions apply to Guantanamo according to Philbin and Yoo. Approvingly, they quote the US Attorney General in 1929, who stated that Guantanamo is “a mere governmental outpost beyond our borders.” A number of cases, quoted by the authors, “demonstrate that the United States has consistently taken the position that [Guantanamo Bay] remains foreign territory, not subject to US sovereignty.” Guantanamo is indeed land leased from the state of Cuba, and therefore in terms of legal possession and formal sovereignty still part of Cuba. But Philbin and Yoo acknowledge a problem with the other condition: namely that the territory is outside the US’s jurisdiction. They claim with certainty that Guantanamo “is also outside the ‘territorial jurisdiction of any court of the United States.’” However, the Supreme Court should not have made a distinction between jurisdiction and sovereignty here; the wording of the decision is really, Philbin and Yoo believe, an inaccurate reflection of its intent: “an arguable imprecision in the Supreme Court’s language.” For that reason, they call for caution. “A non-frivolous argument might be constructed, however, that [Guantanamo Bay], while not be part of sovereign territory of the United States, is within the territorial jurisdiction of a federal court.” [US Department of Justice, 12/28/2001 pdf file]

Entity Tags: John C. Yoo, Alberto R. Gonzales, Patrick F. Philbin, William J. Haynes

Timeline Tags: Torture of US Captives, Civil Liberties

Sometime in early 2002, President Bush signs a secret executive order authorizing the National Security Agency (NSA) to wiretap phone conversations and read e-mails to and from US citizens. The order extends an operation set into motion at least as early as October 2001 to begin wiretapping US citizens’ phones in a response to the 9/11 attacks. When the program is revealed by the US media in late 2005 (see December 15, 2005), Bush and his officials will say the program is completely legal, though it ignores the requirements of the Foreign Intelligence Surveillance Act (FISA) that requires the government to obtain court-issued warrants to mount surveillance against US citizens. They will insist that only those suspected of having ties to al-Qaeda are monitored, and only when those individuals make or receive international communications. [New York Times, 12/15/2005; Washington Post, 12/22/2005; Newsweek, 12/22/2008] Bush’s order authorizes the NSA to monitor international telephone conversations and international e-mails of hundreds, and perhaps thousands, of US citizens without court warrants, in an effort to track what officials call “dirty numbers” linked to al-Qaeda. When the program is finally revealed by the New York Times over three years later (see December 15, 2005), officials will say that the NSA still seeks warrants to monitor domestic communications. But there is little evidence of this (see, for example, Spring 2001). The presidential order is a radical shift in US surveillance and intelligence-gathering policies, and a major realignment for the NSA, which is mandated to only conduct surveillance abroad. Some officials believe that the NSA’s domestic eavesdropping crosses constitutional limits on legal searches. “This is really a sea change,” a former senior official who specializes in national security law will say in December 2005. “It’s almost a mainstay of this country that the NSA only does foreign searches.” [New York Times, 12/15/2005] Some sources indicate that NSA domestic surveillance activities, such as data-mining, the use of information concerning US persons intercepted in foreign call monitoring, and possibly direct surveillance of US persons, took place prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: George W. Bush, Al-Qaeda, Foreign Intelligence Surveillance Court, National Security Agency

Timeline Tags: Civil Liberties

John Yoo, a neoconservative lawyer in the Justice Department’s Office of Legal Counsel serving as deputy assistant attorney general, writes a classified memo to senior Pentagon counsel William J. Haynes, titled “Application of Treaties and Law to al-Qaeda and Taliban Detainees.” [New York Times, 5/21/2004]
Yoo: Geneva Conventions Do Not Apply in War on Terror - Yoo’s memo, written in conjunction with fellow Justice Department lawyer Robert Delahunty, echoes arguments by another Justice Department lawyer, Patrick Philbin, two months earlier (see November 6, 2001). Yoo states that, in his view, the laws of war, including the Geneva Conventions, do not apply to captured Taliban or al-Qaeda prisoners, nor do they apply to the military commissions set up to try such prisoners.
Geneva Superseded by Presidential Authority - Yoo’s memo goes even farther, arguing that no international laws apply to the US whatsoever, because they do not have any status under US federal law. “As a result,” Yoo and Delahunty write, “any customary international law of armed conflict in no way binds, as a legal matter, the president or the US armed forces concerning the detention or trial of members of al-Qaeda and the Taliban.” In essence, Yoo and Delahunty argue that President Bush and the US military have carte blanche to conduct the global war on terrorism in any manner they see fit, without the restrictions of law or treaty. However, the memo says that while the US need not follow the rules of war, it can and should prosecute al-Qaeda and Taliban detainees for violating those same laws—a legal double standard that provokes sharp criticism when the memo comes to light in May 2004 (see May 21, 2004). Yoo and Delahunty write that while this double standard may seem “at first glance, counter-intuitive,” such expansive legal powers are a product of the president’s constitutional authority “to prosecute the war effectively.” The memo continues, “Restricting the president’s plenary power over military operations (including the treatment of prisoners)” would be “constitutionally dubious.” [Mother Jones, 1/9/2002; US Department of Justice, 6/9/2002 pdf file; Newsweek, 5/21/2004; New York Times, 5/21/2004]
Overriding International Legal Concerns - Yoo warns in the memo that international law experts may not accept his reasoning, as there is no legal precedent giving any country the right to unilaterally ignore its commitment to Geneva or any other such treaty, but Yoo writes that Bush, by invoking “the president’s commander in chief and chief executive powers to prosecute the war effectively,” can simply override any objections. “Importing customary international law notions concerning armed conflict would represent a direct infringement on the president’s discretion as commander in chief and chief executive to determine how best to conduct the nation’s military affairs.” [Savage, 2007, pp. 146] The essence of Yoo’s argument, a Bush official later says, is that the law “applies to them, but it doesn’t apply to us.” [Newsweek, 5/21/2004] Navy general counsel Alberto Mora later says of the memo that it “espoused an extreme and virtually unlimited theory of the extent of the president’s commander-in-chief authority.” [Savage, 2007, pp. 181]
White House Approval - White House counsel and future Attorney General Alberto Gonzales agrees (see January 25, 2002), saying, “In my judgment, this new paradigm renders obsolete Geneva’s strict limitations on questioning of enemy prisoners and renders quaint some of its provisions.” [Mother Jones, 1/9/2002]
Spark for Prisoner Abuses - Many observers believe that Yoo’s memo is the spark for the torture and prisoner abuses later reported from Iraq’s Abu Ghraib prison (see Evening November 7, 2003), Guantanamo Bay (see December 28, 2001), and other clandestine prisoner detention centers (see March 2, 2007). The rationale is that since Afghanistan is what Yoo considers a “failed state,” with no recognizable sovereignity, its militias do not have any status under any international treaties. [Newsweek, 5/21/2004; Newsweek, 5/24/2004]
Resistance from Inside, Outside Government - Within days, the State Department will vehemently protest the memo, but to no practical effect (see January 25, 2002).

Entity Tags: Patrick F. Philbin, Robert J. Delahunty, US Department of Justice, Office of Legal Counsel (DOJ), Taliban, John C. Yoo, Colin Powell, Geneva Conventions, Al-Qaeda, George W. Bush, Alberto Mora, US Department of State, Alberto R. Gonzales, William J. Haynes

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

William Howard Taft IV.William Howard Taft IV. [Source: PBS]William Howard Taft IV, the State Department’s chief legal adviser, responds to John Yoo’s January 9,2002, memo (see January 9, 2002) saying that Yoo’s analysis is “seriously flawed.” Taft writes: “In previous conflicts, the United States has dealt with tens of thousands of detainees without repudiating its obligations under the [Geneva] Conventions. I have no doubt we can do so here, where a relative handful of persons is involved.” [Newsweek, 5/24/2004] Applying the Geneva Conventions, according to Taft, would demonstrate that the United States “bases its conduct on its international legal obligations and the rule of law, not just on its policy preferences.” Taft ends with a scorching criticism. “Your position is, at this point, erroneous in its substance and untenable in practice. Your conclusions are as wrong as they are incomplete. Let’s talk.” [Le Monde (Paris), 10/25/2004]

Entity Tags: William Howard Taft IV, John C. Yoo

Timeline Tags: Torture of US Captives, Civil Liberties

Siding with the Pentagon and Justice Department against the State Department, President Bush declares the Geneva Conventions invalid with regard to conflicts with al-Qaeda and the Taliban. Secretary of State Colin Powell urges Bush to reconsider, saying that while Geneva does not apply to al-Qaeda terrorists, making such a decision for the Taliban—the putative government of Afghanistan—is a different matter. Such a decision could put US troops at risk. Both Defense Secretary Donald Rumsfeld and Joint Chiefs chairman General Richard B. Myers support Powell’s position. Yet another voice carries more weight with Bush: John Yoo, a deputy in the Justice Department’s Office of Legal Counsel (OLC—see October 23, 2001). Yoo says that Afghanistan is a “failed state” without a functional government, and Taliban fighters are not members of an army as such, but members of a “militant, terrorist-like group” (see January 9, 2002). White House counsel Alberto Gonzales agrees with Yoo in a January 25 memo, calling Yoo’s opinion “definitive.” The Gonzales memo concludes that the “new kind of war” Bush wants to fight should not be equated with Geneva’s “quaint” privileges granted to prisoners of war, or the “strict limitations” they impose on interrogations (see January 25, 2002). Military lawyers dispute the idea that Geneva limits interrogations to recitals of name, rank, and serial number, but their objections are ignored. For an OLC lawyer to override the judgment of senior Cabinet officials is unprecedented. OLC lawyers usually render opinions on questions that have already been deliberated by the legal staffs of the agencies involved. But, perhaps because OLC lawyers like Yoo give Bush the legal opinions he wants, Bush grants that agency the first and last say in matters such as these. “OLC was definitely running the show legally, and John Yoo in particular,” a former Pentagon lawyer will recall. “Even though he was quite young, he exercised disproportionate authority because of his personality and his strong opinions.” Yoo is also very close to senior officials in the office of the vice president and in the Pentagon’s legal office. [Ledger (Lakeland FL), 10/24/2004]
Undermining, Cutting out Top Advisers - Cheney deliberately cuts out the president’s national security counsel, John Bellinger, because, as the Washington Post will later report, Cheney’s top adviser, David Addington, holds Bellinger in “open contempt” and does not trust him to adequately push for expanded presidential authority (see January 18-25, 2002). Cheney and his office will also move to exclude Secretary of State Colin Powell from the decision-making process, and, when the media learns of the decision, will manage to shift some of the blame onto Powell (see January 25, 2002). [Washington Post, 6/24/2007]
Final Decision - Bush will make his formal final declaration three weeks later (see February 7, 2002).

Entity Tags: US Department of Defense, US Department of Justice, Richard B. Myers, US Department of State, Taliban, Office of Legal Counsel (DOJ), John C. Yoo, Alberto R. Gonzales, Richard (“Dick”) Cheney, Colin Powell, Al-Qaeda, Condoleezza Rice, Donald Rumsfeld, John Bellinger, George W. Bush, Geneva Conventions, David S. Addington

Timeline Tags: Torture of US Captives, Civil Liberties

Defense Secretary Rumsfeld sends a memo to Joint Chiefs of Staff Chairman General Richard Myers informing him that Bush has declared the Geneva Conventions invalid with regard to conflicts with al-Qaeda and the Taliban (see January 18-25, 2002). In this “Memorandum for Chairman of the Joint Chiefs of Staff,” Rumsfeld states: “The United States has determined that al-Qaeda and Taliban individuals under the control of the Department of Defense are not entitled to prisoner of war status for purposes of the Geneva Conventions of 1949.” Nevertheless, “[t]he Combatant Commanders shall, in detaining al-Qaeda and Taliban individuals under the control of the Department of Defense, treat them humanely and, to the extent appropriate and consistent with military necessity, in a manner consistent with the principles of the Geneva Conventions of 1949.” [US Department of Defense, 1/19/2002 pdf file] The same day, the memorandum is disseminated as an order by the Joint Chiefs of Staff. [Chairman of the Joint Chiefs of Staff, 1/19/2002 pdf file]

Entity Tags: Richard B. Myers, Donald Rumsfeld

Timeline Tags: Torture of US Captives

Attorney General John Ashcroft publicly defends the president’s decision (see January 18-25, 2002) to deny detainees the protections of Geneva Conventions. He calls the detainees “terrorists” who “are uniquely dangerous.” [CNN, 1/22/2002]

Entity Tags: John Ashcroft

Timeline Tags: Torture of US Captives

White House lawyer Alberto Gonzales completes a draft memorandum to the president advising him not to reconsider his decision (see January 18-25, 2002) declaring Taliban and al-Qaeda fighters ineligible for prisoner of war status as Colin Powell has apparently recommended. [US Department of Justice, 1/25/2004 pdf file; Newsweek, 5/24/2004] The memo recommends that President Bush accept a recent Office of Legal Counsel (OLC) memo saying that the president has the authority to set aside the Geneva Conventions as the basis of his policy (see January 9, 2002). [Savage, 2007, pp. 146]
Geneva No Longer Applies, Says Gonzales - Gonzales writes to Bush that Powell “has asked that you conclude that GPW [Third Geneva Convention] does apply to both al-Qaeda and the Taliban. I understand, however, that he would agree that al-Qaeda and the Taliban fighters could be determined not to be prisoners of war (POWs) but only on a case-by-case basis following individual hearings before a military board.” Powell believes that US troops will be put at risk if the US renounces the Geneva Conventions in relation to the Taliban. Rumsfeld and his chairman of the Joint Chiefs of Staff, Gen. Richard B. Myers, allegedly agree with Powell’s argument. [New York Times, 10/24/2004] But Gonzales says that he agrees with the Justice Department’s Office of Legal Counsel, which has determined that the president had the authority to make this declaration on the premise that “the war against terrorism is a new kind of war” and “not the traditional clash between nations adhering to the laws of war that formed the backdrop for GPW [Geneva Convention on the treatment of prisoners of war].” Gonzales thus states, “In my judgment, this new paradigm renders obsolete Geneva’s strict limitations on questioning of enemy prisoners and renders quaint some of its provisions.” [Newsweek, 5/24/2004] Gonzales also says that by declaring the war in Afghanistan exempt from the Geneva Conventions, the president would “[s]ubstantially [reduce] the threat of domestic criminal prosecution under the War Crimes Act [of 1996]” (see August 21, 1996). The president and other officials in the administration would then be protected from any future “prosecutors and independent counsels who may in the future decide to pursue unwarranted charges.” [New York Times, 5/21/2004; Newsweek, 5/24/2004]
Memo Actually Written by Cheney's Lawyer - Though the memo is released under Gonzales’s signature, many inside the White House do not believe the memo was written by him; it has an unorthodox format and a subtly mocking tone that does not go with Gonzales’s usual style. A White House lawyer with direct knowledge of the memo later says it was written by Cheney’s chief lawyer, David Addington. Deputy White House counsel Timothy Flanigan passed it to Gonzales, who signed it as “my judgment” and sent it to Bush. Addington’s memo quotes Bush’s own words: “the war against terrorism is a new kind of war.” [Washington Post, 6/24/2007]
Powell 'Hits the Roof' over Memo - When Powell reads the memo (see January 26, 2002), he reportedly “hit[s] the roof” and immediately arranges for a meeting with the president (see January 25, 2002). [Newsweek, 5/24/2004]

Entity Tags: George W. Bush, Office of Legal Counsel (DOJ), Geneva Conventions, Alberto R. Gonzales, Colin Powell, David S. Addington, Al-Qaeda, Taliban, Richard B. Myers

Timeline Tags: Torture of US Captives, Civil Liberties

US Secretary of State Colin Powell responds to Alberto Gonzales’ January 25 draft memo to the president (see January 25, 2002). He argues that it does not provide the president with a balanced view on the issue of whether or not to apply the Geneva Conventions to the conflict in Afghanistan. Powell lists several problems that could potentially result from exempting the conflict from the Conventions as Gonzales recommends. For example, he notes that it would “reverse over a century of US policy and practice in supporting the Geneva conventions and undermine the protections of the law of war for our troops, both in this specific conflict and in general.” The decision will furthermore have “a high cost in terms of negative international reaction.” It will “undermine public support among critical allies, making military cooperation more difficult to sustain,” and other states would “likely have legal problems with extradition or other forms of cooperation in law enforcement, including in bringing terrorists to justice.” But perhaps most ominously, Powell charges that the proposed decision “may provoke some individual foreign prosecutors to investigate and prosecute our officials and troops” and “make us more vulnerable to domestic and legal challenge.” The end of the memo consists of several rebuttals to points that Gonzales made in his memo. [US Department of State, 1/26/2004 pdf file; New York Times, 5/21/2004; Newsweek, 5/24/2004]

Entity Tags: Geneva Conventions, Alberto R. Gonzales, Colin Powell

Timeline Tags: Torture of US Captives, Civil Liberties

In a reply to White House Counsel Alberto Gonzales (see January 25, 2002), the State Department’s Legal Director, William Howard Taft IV, tries again (see January 11, 2002) to put his view forward supporting obeying the Geneva Conventions. He writes: “The president should know that a decision that the Conventions do apply is consistent with the plain language of the Conventions and the unvaried practice of the United States in introducing its forces into conflict over fifty years.” [US Attorney General, 2/1/2002]

Entity Tags: William Howard Taft IV, Alberto R. Gonzales

Timeline Tags: Torture of US Captives, Civil Liberties

The White House declares that the United States will apply the Geneva Conventions to the conflict in Afghanistan, but will not grant prisoner-of-war status to captured Taliban and al-Qaeda fighters. Though Afghanistan was party to the 1949 treaty, Taliban fighters are not protected by the Conventions, the directive states, because the Taliban is not recognized by the US as Afghanistan’s legitimate government. Likewise, al-Qaeda fighters are not eligible to be protected under the treaty’s provisions because they do not represent a state that is party to the Conventions either.
Administration Will Treat Detainees Humanely 'Consistent' with Geneva - In the memo, President Bush writes that even though al-Qaeda detainees do not qualify as prisoners of war under Geneva, “as a matter of policy, the United States Armed Forces shall continue to treat detainees humanely and to the extent appropriate and consistent with military necessity, in a manner consistent with the principles of Geneva.” The presidential directive is apparently based on Alberto Gonzales’s January 25 memo (see January 25, 2002) and a memo from Vice President Cheney’s chief of staff, David Addington (see January 25, 2002).
Bush Chooses Not to Suspend Geneva between US and Afghanistan - The directive also concludes that Bush, as commander in chief of the United States, has the authority to suspend the Geneva Conventions regarding the conflict in Afghanistan, should he feel necessary: Bush writes, “I have the authority under the Constitution to suspend Geneva as between the United States and Afghanistan, but I decline to exercise that authority at this time.” Though not scheduled for declassification until 2012, the directive will be released by the White House in June 2004 to demonstrate that the president never authorized torture against detainees from the wars in Afghanistan and Iraq. [George W. Bush, 2/7/2002 pdf file; CNN, 2/7/2002; Newsweek, 5/24/2004; Truthout (.org), 1/19/2005; Dubose and Bernstein, 2006, pp. 191]
Overriding State Department Objections - Bush apparently ignores or overrides objections from the State Department, including Secretary of State Colin Powell (see January 25, 2002) and the department’s chief legal counsel, William Howard Taft IV (see January 25, 2002). Both Powell and Taft strenuously objected to the new policy. [Savage, 2007, pp. 147]
Ignoring Promises of Humane Treatment - The reality will be somewhat different. Gonzales laid out the arguments for and against complying with Geneva in an earlier memo (see January 18-25, 2002), and argued that if the administration dispensed with Geneva, no one could later be charged with war crimes. Yet, according to Colin Powell’s chief of staff, Lawrence Wilkerson, sometime after the Bush memo is issued, Vice President Cheney and Defense Secretary Rumsfeld decide to ignore the portions promising humane treatment for prisoners. “In going back and looking at the deliberations,” Wilkerson later recalls, “it was clear to me that what the president had decided was one thing and what was implemented was quite another thing.” [Dubose and Bernstein, 2006, pp. 190-191]

Entity Tags: Geneva Conventions, George W. Bush, Colin Powell, Lawrence Wilkerson, William Howard Taft IV, Richard (“Dick”) Cheney, Bush administration (43)

Timeline Tags: Torture of US Captives, Civil Liberties

Joseph Wilson and Valerie Plame Wilson.Joseph Wilson and Valerie Plame Wilson. [Source: Haraz N. Ghanbari / Associated Press]Officials in the CIA’s Directorate of Operations (DO) Counterproliferation Division (CPD) decide to send former ambassador Joseph Wilson to Niger to investigate allegations that Iraq sought to procure uranium from that country. Wilson’s wife, Valerie Plame Wilson, a senior CPD officer (see April 2001 and After), relays the request to him explaining that “there’s this crazy report” asserting that Iraq made a deal with Niger on the sale of a large quantity of uranium. [US Congress, 7/7/2004] Shortly afterwards, she sends an overseas cable requesting concurrence with the agency’s decision to send her husband to Niger (see February 13, 2002). She writes, “[B]oth State and [the Department of Defense] have requested additional clarification and indeed, the vice president’s office just asked for background information” (see (February 13, 2002)). [US Congress, 7/7/2004]

Entity Tags: Counterproliferation Division, Central Intelligence Agency, Joseph C. Wilson, Valerie Plame Wilson

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing


This partial image from a Total Information Awareness slide presentation shows types of data that will be collected. Note that
even “gait” - the way one walks, will be analyzed.
This partial image from a Total Information Awareness slide presentation shows types of data that will be collected. Note that even “gait” - the way one walks, will be analyzed. [Source: DARPA]The US military internally announces the creation of a new global data collection system called Total Information Awareness. The existence of this program is not reported until August 2002 [Wired News, 8/7/2002] , and not widely known until November 2002 (see November 9, 2002). Interestingly, the early accounts of this program suggest its budget is a “significant amount” of $96 million [Federal Computer Week, 10/17/2002] , and not the $10 million later reported. [Guardian, 11/23/2002] It is also reported that “parts” of the program “are already operational” whereas later it is said to be only in the conceptual stages of development. [Federal Computer Week, 10/17/2002]

Entity Tags: Total Information Awareness, US Department of Defense

Timeline Tags: Civil Liberties

Deputy Assistant Attorney General Joan Larsen and Gregory Jacob, an attorney-adviser to the Office of Legal Counsel (OLC), send a classified memo to lawyers in the Justice Department’s civil division. The memo will remain secret, but the American Civil Liberties Union (ACLU) will learn that it regards the availability of habeas corpus protections to detainees captured in the US’s “war on terror.” [American Civil Liberties Union [PDF], 1/28/2009 pdf file] The memo asserts that detainees have no habeas corpus protections, and therefore cannot challenge their detentions in US courts, despite multiple Supreme Court rulings to the contrary. [ProPublica, 4/16/2009]

Entity Tags: US Supreme Court, Joan Larsen, Office of Legal Counsel (DOJ), American Civil Liberties Union, Gregory Jacob, US Department of Justice

Timeline Tags: Civil Liberties

Abu Zubaida injured, shortly after his arrest. (Note: this picture is from a video presentation on prisoners the Pakistani government gave to BBC filmmakers. It has been adjusted to remove some blue tinge.)Abu Zubaida injured, shortly after his arrest. (Note: this picture is from a video presentation on prisoners the Pakistani government gave to BBC filmmakers. It has been adjusted to remove some blue tinge.) [Source: BBC's "The New Al-Qaeda."]After al-Qaeda leader Abu Zubaida is captured on March 28, 2002 (see March 28, 2002), the CIA takes control of his detention and interrogation, but there is no legal clarity over just how aggressive his interrogation can be for several months. [Tenet, 2007, pp. 241] Thereforem the CIA asks the White House “what the legal limits of interrogation are,” according to Justice Department lawyer John Yoo. [Washington Post, 6/25/2007] CIA Director George Tenet will write in his 2007 book: “Now that we had an undoubted resource in our hands—the highest-ranking al-Qaeda official captured to date—we opened discussions within the National Security Council as to how to handle him, since holding and interrogating large numbers of al-Qaeda operatives had never been part of our plan.… We wondered what we could legitimately do to get that information. Despite what Hollywood might have you believe, in situations like this you don’t call in the tough guys, you call in the lawyers. It took until August to get clear guidance on what Agency officers could legally do.” [Tenet, 2007, pp. 241] This is a reference to an August 1, 2002 Justice Department memo legally justifying the use of some interrogations generally deemed to be torture (see August 1, 2002). But it appears Zubaida was subjected to the most extreme interrogation methods the US used, such as waterboarding, well before August 2002 (see Mid-May 2002 and After). However, during this period of uncertainty and into 2003, the CIA gets advice from Michael Chertoff, head of the Justice Department’s criminal division at the time, about which techniques are likely legal and which ones are not (see 2002-2003).

Entity Tags: Michael Chertoff, Abu Zubaida, George J. Tenet, Central Intelligence Agency, John C. Yoo

Timeline Tags: Torture of US Captives, Complete 911 Timeline

In the days following the capture of al-Qaeda operative Abu Zubaida (see March 28, 2002), a group of top White House officials, the National Security Council’s Principals Committee, begins a series of meetings that result in the authorization of specific torture methods against Zubaida and other detainees. The top secret talks and meetings eventually approve such methods to be used by CIA agents against high-value terrorism suspects. The US media will not learn of this until six years later (see April 9, 2008). The Principals Committee meetings are chaired by National Security Adviser Condoleezza Rice, and attendees include Vice President Dick Cheney, CIA Director George Tenet, Secretary of Defense Donald Rumsfeld, Secretary of State Colin Powell, and Attorney General John Ashcroft. Tenet’s successor, Porter Goss, will also participate in the meetings. Sometimes deputies attend in place of their superiors. Rice’s group not only discusses and approves specific “harsh” methods of interrogation, but also approves the use of “combined” interrogation techniques on suspects who prove recalcitrant. The approved techniques include slapping and shoving prisoners, sleep deprivation, and waterboarding, or simulated drowning, a technique banned for decades by the US military. Some of the discussions of the interrogation sessions are so detailed that the Principals Committee virtually choreographs the sessions down to the number of times CIA agents can use specific tactics. [ABC News, 4/9/2008; Associated Press, 4/10/2008; ABC News, 4/11/2008] The Principals Committee also ensures that President Bush is not involved in the meetings, thereby granting him “deniability” over the decisions, though Bush will eventually admit to being aware of the decisions (see April 11, 2008). The Principals Committee, particularly Cheney, is described by a senior intelligence official as “deeply immersed” in the specifics of the decisions, often viewing demonstrations of how specific tactics work. [Associated Press, 4/10/2008]
Imminent Threat Calls for Extreme Measures - The move towards using harsh and likely illegal interrogation tactics begins shortly after the capture of Zubaida in late March 2002 (see Late March through Early June, 2002 and March 28, 2002). Zubaida is seen as a potentially critical source of information about potential attacks similar to 9/11. He is kept in a secret CIA prison where he recovers from the wounds suffered during his capture, and where he is repeatedly questioned. However, he is allegedly uncooperative with his inquisitors, and CIA officials want to use more physical and aggressive techniques to force him to talk (see March 28, 2002-Mid-2004 and April - June 2002). The CIA briefs the Principals Committee, chaired by Rice, and the committee signs off on the agency’s plan to use more extreme interrogation methods on Zubaida. After Zubaida is waterboarded (see April - June 2002), CIA officials tell the White House that he provided information leading to the capture of two other high-level al-Qaeda operatives, Khalid Shaikh Mohammed (see Shortly After February 29 or March 1, 2003) and Ramzi bin al-Shibh (see Late 2002 and May 2002-2003). The committee approves of waterboarding as well as a number of “combined” interrogation methods, basically a combination of harsh techniques to use against recalcitrant prisoners.
The 'Golden Shield' - The committee asks the Justice Department to determine whether using such methods would violate domestic or international laws. “No one at the agency wanted to operate under a notion of winks and nods and assumptions that everyone understood what was being talked about,” a second senior intelligence official will recall in 2008. “People wanted to be assured that everything that was conducted was understood and approved by the folks in the chain of command.” In August 2002, Justice Department lawyers in the Office of Legal Counsel will write a memo that gives formal legal authority to government interrogators to use harsh, abusive methods on detainees (see August 1, 2002). The memo is called the “Golden Shield” for CIA agents who worry that they could be held criminally liable if the harsh, perhaps tortuous interrogations ever become public knowledge. CIA veterans remember how everything from the Vietnam-era “Phoenix Program” of assassinations to the Iran-Contra arms sales of the 1980s were portrayed as actions of a “rogue,” “out-of-control” CIA; this time, they intend to ensure that the White House and not the agency is given ultimate responsibility for authorizing extreme techniques against terror suspects. Tenet demands White House approval for the use of the methods, even after the Justice Department issues its so-called “Golden Shield” memo explicitly authorizing government interrogators to torture suspected terrorists (see August 1, 2002). Press sources will reveal that Tenet, and later Goss, convey requests for specific techniques to be used against detainees to the committee (see Summer 2003). One high-ranking official will recall: “It kept coming up. CIA wanted us to sign off on each one every time. They’d say: ‘We’ve got so and so. This is the plan.’” The committee approves every request. One source will say of the discussions: “These discussions weren’t adding value. Once you make a policy decision to go beyond what you used to do and conclude it’s legal, [you should] just tell them to implement it.” [ABC News, 4/9/2008; Associated Press, 4/10/2008; ABC News, 4/11/2008] In April 2008, law professor Jonathan Turley will say: “[H]ere you have the CIA, which is basically saying, ‘We’re not going to have a repeat of the 1970s, where you guys have us go exploding cigars and trying to take out leaders and then you say you didn’t know about it.’ So the CIA has learned a lot. So these meetings certainly cover them in that respect.” [MSNBC, 4/10/2008] A former senior intelligence official will say, “If you looked at the timing of the meetings and the memos you’d see a correlation.” Those who attended the dozens of meetings decided “there’d need to be a legal opinion on the legality of these tactics” before using them on detainees. [Associated Press, 4/10/2008]
Ashcroft Uneasy at White House Involvement - Ashcroft in particular is uncomfortable with the discussions of harsh interrogation methods that sometimes cross the line into torture, though his objections seem more focused on White House involvement than on any moral, ethical, or legal problems. After one meeting, Ashcroft reportedly asks: “Why are we talking about this in the White House? History will not judge this kindly.” However, others in the discussions, particularly Rice, continue to support the torture program. Even after Jack Goldsmith, the chief of the Justice Department’s Office of Legal Counsel (OLC), withdraws the “Golden Shield” memo and after Powell begins arguing that the torture program is harming the image of the US abroad, when CIA officials ask to continue using particular torture techniques, Rice responds: “This is your baby. Go do it.”
Reaction after Press Learns of Meetings - After the press learns of the meetings (see April 9, 2008), the only person involved who will comment will be Powell, who will say through an assistant that there were “hundreds of [Principals Committee] meetings” on a wide variety of topics and that he is “not at liberty to discuss private meetings.” [ABC News, 4/9/2008; Associated Press, 4/10/2008; ABC News, 4/11/2008]

Entity Tags: Office of Legal Counsel (DOJ), Porter J. Goss, US Department of Justice, Ramzi bin al-Shibh, Richard (“Dick”) Cheney, Principals Committee, Khalid Shaikh Mohammed, Jack Goldsmith, John Ashcroft, Bush administration (43), Al-Qaeda, Abu Zubaida, Central Intelligence Agency, Colin Powell, Condoleezza Rice, George W. Bush, George J. Tenet, Donald Rumsfeld, Jonathan Turley, National Security Council

Timeline Tags: Torture of US Captives, Civil Liberties

Accused al-Qaeda operative Abu Zubaida, having been tortured for months in a secret CIA prison in Thailand (see April - June 2002), has had a respite from the intensive interrogations he was initially subjected to. Now, though, the interrogations begin again, being what Zubaida will later recall as “more intens[e] than before.”
Intensified Interrogations - Zubaida will later tell officials of the International Committee of the Red Cross (ICRC): “Two black wooden boxes were brought into the room outside my cell. One was tall, slightly higher than me and narrow. Measuring perhaps in area [3 1/2 by 2 1/2 feet by 6 1/2 feet high]. The other was shorter, perhaps only [3 1/2 feet] in height. I was taken out of my cell and one of the interrogators wrapped a towel around my neck, they then used it to swing me around and smash me repeatedly against the hard walls of the room. I was also repeatedly slapped in the face.… I was then put into the tall black box for what I think was about one and a half to two hours. The box was totally black on the inside as well as the outside.… They put a cloth or cover over the outside of the box to cut out the light and restrict my air supply. It was difficult to breathe. When I was let out of the box I saw that one of the walls of the room had been covered with plywood sheeting. From now on it was against this wall that I was then smashed with the towel around my neck. I think that the plywood was put there to provide some absorption of the impact of my body. The interrogators realized that smashing me against the hard wall would probably quickly result in physical injury.”
In the Box - Zubaida will give detailed recollections of his time in the box: “After the beating I was then placed in the small box. They placed a cloth or cover over the box to cut out all light and restrict my air supply. As it was not high enough even to sit upright, I had to crouch down. It was very difficult because of my wounds. The stress on my legs held in this position meant my wounds both in the leg and stomach became very painful. I think this occurred about three months after my last operation. It was always cold in the room, but when the cover was placed over the box it made it hot and sweaty inside. The wound on my leg began to open and started to bleed. I don’t know how long I remained in the small box, I think I may have slept or maybe fainted. I was then dragged from the small box, unable to walk properly and put on what looked like a hospital bed, and strapped down very tightly with belts. A black cloth was then placed over my face and the interrogators used a mineral water bottle to pour water on the cloth so that I could not breathe. After a few minutes the cloth was removed and the bed was rotated into an upright position. The pressure of the straps on my wounds was very painful. I vomited. The bed was then again lowered to horizontal position and the same torture carried out again with the black cloth over my face and water poured on from a bottle. On this occasion my head was in a more backward, downwards position and the water was poured on for a longer time. I struggled against the straps, trying to breathe, but it was hopeless. I thought I was going to die. I lost control of my urine. Since then I still lose control of my urine when under stress. I was then placed again in the tall box. While I was inside the box loud music was played again and somebody kept banging repeatedly on the box from the outside. I tried to sit down on the floor, but because of the small space the bucket with urine tipped over and spilt over me.… I was then taken out and again a towel was wrapped around my neck and I was smashed into the wall with the plywood covering and repeatedly slapped in the face by the same two interrogators as before. I was then made to sit on the floor with a black hood over my head until the next session of torture began. The room was always kept very cold. This went on for approximately one week. During this time the whole procedure was repeated five times. On each occasion, apart from one, I was suffocated once or twice and was put in the vertical position on the bed in between. On one occasion the suffocation was repeated three times. I vomited each time I was put in the vertical position between the suffocation. During that week I was not given any solid food. I was only given Ensure to drink. My head and beard were shaved everyday. I collapsed and lost consciousness on several occasions. Eventually the torture was stopped by the intervention of the doctor. I was told during this period that I was one of the first to receive these interrogation techniques, so no rules applied. It felt like they were experimenting and trying out techniques to be used later on other people.” Author Mark Danner will note that, according to the ICRC report, Zubaida’s impression of being a “guinea pig” is accurate. Some of the techniques used on him will not be reported again—the weeks of sitting in shackles, the coffin-sized boxes. Other techniques, such as the waterboarding, the permanent shackling, the “cold cell,” the incessant loud music and noise, will be used frequently on later captives, as will the constant light and the repeated beatings and physical abuse.
Everything Authorized by Senior CIA, White House Officials - Danner will remind readers that the CIA interrogators never acted alone or with any degree of independence. Everything that is done and said to Zubaida is monitored by other officials on-site—guards, interrogators, doctors—and by senior CIA officials in Washington. CIA interrogator John Kiriakou will later tell a reporter: “It wasn’t up to individual interrogators to decide, ‘Well, I’m gonna slap him. Or I’m going to shake him. Or I’m gonna make him stay up for 48 hours.’ Each one of these steps… had to have the approval of the deputy director for operations. So before you laid a hand on him, you had to send in the cable saying, ‘He’s uncooperative. Request permission to do X.’ And that permission would come.… The cable traffic back and forth was extremely specific. And the bottom line was these were very unusual authorities that the agency got after 9/11. No one wanted to mess them up. No one wanted to get in trouble by going overboard.… No one wanted to be the guy who accidentally did lasting damage to a prisoner.” Danner also notes that shortly after Zubaida’s capture, the CIA briefed top White House officials, including Vice President Dick Cheney, National Security Adviser Condoleezza Rice, and Attorney General John Ashcroft, who, ABC News will later report, “then signed off on the [interrogation] plan” (see April 2002 and After and July 2002). During this time the White House is working with Justice Department officials to produce the so-called “golden shield” memo (see August 1, 2002) that will, supposedly, protect the White House and CIA from criminal charges. Even after the memo’s adoption, CIA Director George Tenet continues to tell top White House officials about the specific procedures being used on Zubaida and other prisoners, including techniques such as waterboarding, to ensure that the White House considered them legal. As ABC will later report, the briefings of principals were so detailed and frequent that “some of the interrogation sessions were almost choreographed.” [New York Review of Books, 3/15/2009]

Entity Tags: John Kiriakou, Abu Zubaida, Al-Qaeda, Central Intelligence Agency, International Committee of the Red Cross, Richard (“Dick”) Cheney, Mark Danner

Timeline Tags: Torture of US Captives

Jose Padilla.
Jose Padilla. [Source: Florida Department of Motor Vehicles]Attorney General John Ashcroft announces the arrest of Abdullah al-Mujahir, a.k.a. Jose Padilla. He claims that Padilla was part of an al-Qaeda plot to detonate a radioactive “dirty bomb” in a US city, and supposedly Padilla was scouting bomb targets when arrested. Padilla, a US citizen, is being held as an “enemy combatant,” allowing him to be held indefinitely. [Guardian, 6/11/2002; PBS, 6/11/2002] But almost immediately, doubts grow about this story. The London Times says that it is “beyond dispute” that the timing of the announcement of his arrest was “politically inspired.” Padilla was actually arrested a month earlier, on May 8. [London Times, 6/13/2002] It is widely believed that Ashcroft made the arrest announcement “only to divert attention from Intelligence Committee inquiries into the FBI and CIA handling of 9/11.” [Village Voice, 6/12/2002; Independent, 6/12/2002; BBC, 6/13/2002; Washington Post, 6/13/2003] Four days earlier, Coleen Rowley testified before Congress. The FBI whistleblower stated her belief that the attacks of Sept. 11 could have been prevented had the FBI flight-school warnings been made available to the agents investigating Zacharias Moussaoui. [Rolling Stone, 9/21/2006 pdf file] Bush soon privately chastises Ashcroft for overstating claims about Padilla. [Guardian, 8/15/2002] The government attorneys apparently could not get an indictment out of a New York grand jury and, rather than let him go, made Padilla an enemy combatant. [Village Voice, 6/12/2002] It later comes out that the FBI found no evidence that he was preparing a dirty bomb attack and little evidence to suggest he had any support from al-Qaeda, or any ties to al-Qaeda cells in the US. Yet the Justice Department maintains that its view of Padilla “remains unchanged,” and that he is a “serious and continuing threat.” [Guardian, 8/15/2002] Because Padilla is a US citizen, he cannot be tried in a military court. So apparently he will simply be held indefinitely. It is pointed out that any American could be declared an enemy combatant and never tried or have that status questioned. [San Francisco Chronicle, 6/11/2002; Washington Post, 6/11/2002] The Washington Post says, “If that’s the case, nobody’s constitutional rights are safe.” [Washington Post, 6/11/2002] Despite the evidence that Padilla’s case is grossly overstated, the government won’t allow him access to a lawyer (see December 4, 2002; March 11, 2003).

Entity Tags: Al-Qaeda, Central Intelligence Agency, London Times, Joint Intelligence Committee, Federal Bureau of Investigation, Jose Padilla

Timeline Tags: Complete 911 Timeline

Military lawyers for a detainee believed to be Abu Zubaida (see March 28, 2002) lodge numerous complaints with unidentified White House officials over the torture of their client. Zubaida has been subjected to waterboarding and other abuses by CIA interrogators (see March 28, 2002-Mid-2004, March 28-August 1, 2002, Mid-April-May 2002, Mid-April 2002, and Mid-May 2002 and After). The complaints trigger a hastily arranged meeting between Vice President Cheney, White House counsel Alberto Gonzales, Cheney’s chief counsel David Addington, National Security Adviser Condoleezza Rice, and a number of officials from the Defense and State Departments. The discussion centers on the production of a legal memo specifically for the CIA that would provide retroactive legal immunity for the use of waterboarding and other illegal interrogation methods. According to a subsequent investigation by the Justice Department (see February 22, 2009), the participants in the discussion believe that the methods used against Zubaida are legal because on February 7, 2002, President Bush signed an executive order stating that terrorists were not entitled to protections under the Geneva Conventions (see February 7, 2002). Nevertheless, the participants agree that methods such as waterboarding probably violate international and domestic laws against torture, and therefore the CIA and the Bush administration would both benefit from a legal opinion stating what techniques are legal, and why they do not fit the legal definition of torture. The meeting results in the production of the so-called “Golden Shield” memo (see August 1, 2002). [Public Record, 2/22/2009]

Entity Tags: US Department of State, Bush administration (43), Alberto R. Gonzales, Abu Zubaida, Central Intelligence Agency, US Department of Justice, Condoleezza Rice, Geneva Conventions, David S. Addington, Richard (“Dick”) Cheney, George W. Bush, US Department of Defense

Timeline Tags: Civil Liberties

CIA Director George Tenet meets with National Security Adviser Condoleezza Rice. Rice tells Tenet that the CIA can begin its proposed interrogation plan for captured alleged al-Qaeda operative Abu Zubaida (see March 28, 2002 and July 13, 2002), advising him “that the CIA could proceed with its proposed interrogation” of Zubaida. Rice’s authorization is subject to a determination of legality by the Justice Department’s Office of Legal Counsel (see August 1, 2002). [Senate Intelligence Committee, 4/22/2009 pdf file; BBC, 4/23/2009] The CIA has already begun torturing Zubaida (see April - June 2002, Mid-May, 2002, Mid-May 2002 and After, Mid-May 2002 and After, and June 2002).

Entity Tags: Condoleezza Rice, George J. Tenet, Office of Legal Counsel (DOJ), US Department of Justice, Abu Zubaida, Central Intelligence Agency

Timeline Tags: Torture of US Captives

Jay Bybee.Jay Bybee. [Source: Public domain]The Justice Department’s Office of Legal Counsel (OLC) sends a non-classified memo to White House Counsel Alberto Gonzales, offering the opinion that a policy allowing suspected al-Qaeda members to be tortured abroad “may be justified.” [US Department of Justice, 8/1/2002 pdf file] This memo will later be nicknamed the “Golden Shield” by insiders in the hopes that it will protect government officials from later being charged with war crimes (see April 2002 and After). [ABC News, 4/9/2008]
Multiple Authors - The 50-page “torture memo” is signed and authored by Jay S. Bybee, head of OLC, and co-authored by John Yoo, a deputy assistant attorney general. It is later revealed that Yoo authored the memo himself, in close consultation with Vice President Cheney’s chief adviser David Addington, and Bybee just signed off on it (see December 2003-June 2004). [Washington Post, 6/9/2004] Deputy White House counsel Timothy Flanigan also contributed to the memo. Addington contributed the claim that the president may authorize any interrogation method, even if it is plainly torture. Addington’s reasoning: US and treaty law “do not apply” to the commander in chief, because Congress “may no more regulate the president’s ability to detain and interrogate enemy combatants than it may regulate his ability to direct troop movements on the battlefield.” [Washington Post, 6/25/2007]
Statute Only Prohibits 'Extreme Acts' - Gonzales had formally asked for the OLC’s legal opinion in response to a request by the CIA for legal guidance. A former administration official, quoted by the Washington Post, says the CIA “was prepared to get more aggressive and re-learn old skills, but only with explicit assurances from the top that they were doing so with the full legal authority the president could confer on them.” [Washington Post, 6/9/2004] “We conclude that the statute, taken as a whole,” Bybee and Yoo write, “makes plain that it prohibits only extreme acts.” Addressing the question of what exactly constitute such acts of an extreme nature, the authors proceed to define torture as the infliction of “physical pain” that is “equivalent in intensity to the pain accompanying serious physical injury, such as organ failure, impairment of bodily function, or even death.” Purely mental pain or suffering can also amount to “torture under Section 2340,” but only if it results “in significant psychological harm of significant duration, e.g. lasting for months or even years.” [Washington Post, 6/9/2004]
Torture Legal and Defensible - Bybee and Yoo appear to conclude that any act short of torture, even though it may be cruel, inhuman or degrading, would be permissible. They examine, for example, “international decisions regarding the use of sensory deprivation techniques.” These cases, they notice, “make clear that while many of these techniques may amount to cruel, inhuman or degrading treatment, they do not produce pain or suffering of the necessary intensity to meet the definition of torture. From these decisions, we conclude that there is a wide range of such techniques that will not rise to the level of torture.” More astounding is Bybee and Yoo’s view that even torture can be defensible. “We conclude,” they write, “that, under the current circumstances, necessity or self-defense may justify interrogation methods that might violate Section 2340A.” Inflicting physical or mental pain might be justified, Bybee and Yoo argue, “in order to prevent further attacks on the United States by the al-Qaeda terrorist network.” In other words, necessity or self-defense may justify torture. Moreover, “necessity and self-defense could provide justifications that would eliminate any criminal liability.” [Washington Post, 6/8/2004] International anti-torture rules, furthermore, “may be unconstitutional if applied to interrogations” of suspected terrorists. [US News and World Report, 6/21/2004] Laws prohibiting torture would “not apply to the president’s detention and interrogation of enemy combatants” in the “war on terror,” because the president has constitutional authority to conduct a military campaign. [Washington Post, 6/27/2004]
Protecting US Officials from Prosecution - In 2007, author and reporter Charlie Savage will write: “In case an interrogator was ever prosecuted for violating the antitorture law (see October 21, 1994 and January 26, 1998, Yoo laid out page after page of legal defenses he could mount to get the charges dismissed. And should someone balk at this strained interpretation of the law, Yoo offered his usual trump card: Applying the antitorture law to interrogations authorized by the president would be unconstitutional, since only the commander in chief could set standards for questioning prisoners.” [Savage, 2007, pp. 155-156]
Virtually Unrestricted Authority of President - “As commander in chief,” the memo argues, “the president has the constitutional authority to order interrogations of enemy combatants to gain intelligence information concerning the military plans of the enemy.” [Washington Post, 6/9/2004] According to some critics, this judgment—which will be echoed in a March 2003 draft Pentagon report (see March 6, 2003)—ignores important past rulings such as the 1952 Supreme Court decision in Youngstown Steel and Tube Co v. Sawyer, which determined that the president, even in wartime, is subject to US laws. [Washington Post, 6/9/2004] The memo also says that US Congress “may no more regulate the president’s ability to detain and interrogate enemy combatants than it may regulate his ability to direct troop movements on the battlefield.” [Washington Post, 6/27/2004]
Ashcroft Refuses to Release Memo - After the memo’s existence is revealed, Attorney General John Ashcroft denies senators’ requests to release it, and refuses to say if or how the president was involved in the discussion. “The president has a right to hear advice from his attorney general, in confidence,” he says. [New York Times, 6/8/2004; Bloomberg, 6/8/2004; Washington Post, 6/9/2004] Privately, Ashcroft is so irritated by Yoo’s hand-in-glove work with the White House that he begins disparagingly referring to him as “Dr. Yes.” [New York Times, 10/4/2007]
Only 'Analytical' - Responding to questions about the memo, White House press secretary Scott McClellan will claim that the memo “was not prepared to provide advice on specific methods or techniques,” but was “analytical.” But the 50-page memo seems to have been considered immensely important, given its length and the fact that it was signed by Bybee. “Given the topic and length of opinion, it had to get pretty high-level attention,” Beth Nolan, a former White House counsel from 1999-2001, will tell reporters. This view is confirmed by another former Office of Legal Counsel lawyer who says that unlike documents signed by deputies in the Office of Legal Counsel, memorandums signed by the Office’s head are considered legally binding. [Washington Post, 6/9/2004]
Memo Will be Withdrawn - Almost two years later, the OLC’s new head, Jack Goldsmith, will withdraw the torture memos, fearing that they go far beyond anything countenanced by US law (see December 2003-June 2004).
Memo Addresses CIA Concerns - The administration, particularly the axis of neoconservatives centered around Cheney’s office, has enthusiastically advocated the use of violent, abusive, and sometimes tortuous interrogation techniques, though the US has never endorsed such tactics before, and many experts say such techniques are counterproductive. The CIA, responding to the desires from the White House, hastily put together a rough program after consulting with intelligence officials from Egypt and Saudi Arabia, where detainees are routinely tortured and killed in captivity, and after studying methods used by former Soviet Union interrogators. The legal questions were continuous. The former deputy legal counsel for the CIA’s Counterterrorist Center, Paul Kelbaugh, recalls in 2007: “We were getting asked about combinations—‘Can we do this and this at the same time?… These approved techniques, say, withholding food, and 50-degree temperature—can they be combined?’ Or ‘Do I have to do the less extreme before the more extreme?’” The “torture memo” is designed to address these concerns. [New York Times, 10/4/2007]

Entity Tags: John C. Yoo, Paul Kelbaugh, Timothy E. Flanigan, Scott McClellan, John Ashcroft, Richard (“Dick”) Cheney, Jay S. Bybee, Office of Legal Counsel (DOJ), David S. Addington, Alberto R. Gonzales, Beth Nolan, Al-Qaeda, Charlie Savage, Central Intelligence Agency, Jack Goldsmith

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

The NSA’s enormous data mining program, Novel Intelligence from Massive Data (NIMD—see After September 11, 2001), closely resembles another data mining program, the Defense Department’s Total Information Awareness program (see March 2002). TIA, which will be suspended in 2003 after outcries from citizens and legal experts concerned over that program’s refusal to comply with fundamental Constitutional guarantees of privacy, was also designed as an early-warning system that not only compiled intelligence data, but mined through private financial databases for credit-card and other financial transactions. Six of the corporations and research institutions who win NIMD contracts also held contracts for the earlier TIA project. Much of their work with TIA duplicated the same aspects and protocols to be used by NIMD, including challenging analytic assumptions and building prototype data-mining devices. Both TIA and NIMD attempt to second-guess human analysts’ conclusions over a particular data schema by creating a database of what TIA creator John Poindexter once called “plausible futures,” or likely terrorism scenarios. NIMD is a creation of the Advanced Research and Development Activity agency (ARDA); another ARDA project, the Advanced Capabilities for Intelligence Analysis (ACIA) also envisions a similar database (see 2005). Though TIA focused more on counterterrorism than the more sweeping NIMD, the two projects coordinated closely with one another, according to former program manager Tom Armour, who worked in Poindexter’s office.
NIMD Survives In Other Agencies - Congress will eliminate funding for TIA and other Poindexter projects, but many of those projects, and related projects such as NIMD, do not disappear. Many are instead transferred to intelligence agencies such as the NSA. Although information about these projects is strictly classified, a former Army intelligence analyst familiar with the programs will confirm in 2006 that large elements of TIA were transferred to other agencies, where they will continue to be researched and implemented. It is highly likely that NIMD is an offshoot and outgrowth of TIA. Armour will say the two programs are specifically designed to analyze large amounts of phone and e-mail traffic: “That’s, in fact, what the interest is.” [National Journal, 1/20/2006]
Government 'Shell Game' - Steven Aftergood of the Federation of American Scientists says in 2004, “The whole congressional action looks like a shell game. There may be enough of a difference for them to claim TIA was terminated while for all practical purposes the identical work is continuing.” [Associated Press, 2/23/2004] Aftergood will note that NIMD has thrived in the shadows where TIA died of exposure: “Pursued with a minimal public profile and lacking a polarizing figure like Admiral Poindexter to galvanize opposition, NIMD has proceeded quietly even as TIA imploded.” [Defense Tech, 9/26/2003]

Entity Tags: Tom Armour, Total Information Awareness, Steven Aftergood, Novel Intelligence from Massive Data, John Poindexter, National Security Agency, Advanced Research and Development Activity, Federation of American Scientists (FAS), George W. Bush, Advanced Capabilities for Intelligence Analysis

Timeline Tags: Civil Liberties

Several high-level Bush administration lawyers arrive in Guantanamo. The group includes White House counsel Alberto Gonzales; Vice President Cheney’s chief of staff David Addington, who had helped the Justice Department craft its “torture memo” (see August 1, 2002); CIA legal counsel John Rizzo, who had asked the Justice Department for details about how interrogation methods could be implemented (see June 22, 2004); and the Pentagon’s general counsel, William J. Haynes. They are at Guantanamo to discuss the case of suspected “20th hijacker” Mohamed al-Khatani (see August 8, 2002-January 15, 2003).
Pressure from Washington - The commander of the Guantanamo facility, Major General Michael Dunlavey, will recall: “They wanted to know what we were doing to get to this guy, and Addington was interested in how we were managing it… They brought ideas with them which had been given from sources in DC. They came down to observe and talk.” Dunlavey will say that he was pressured by Defense Secretary Donald Rumsfeld himself to expedite the interrogation and use extraordinary means to squeeze information from the suspect. “I’ve got a short fuse on this to get it up the chain,” Dunlavey recalls. “I was on a timeline. This guy may have been the key to the survival of the US.” Asked how high up the pressure was from, Dunlavey will say, “It must have been all the way to the White House.” Rumsfeld is “directly and regularly involved” in all the discussions of interrogations.
'Do Whatever Needed to Be Done' - Staff judge advocate Lieutenant Colonel Diane Beaver will recall that Addington is “definitely the guy in charge,” taking control of the discussions. Gonzales is quiet. Haynes, a close friend and colleague of Addington’s, seems most interested in how the military commissions would function to try and convict detainees. The lawyers meet with intelligence officials and themselves witness several interrogations. Beaver will recall that the message from Addington and his group is “Do whatever needed to be done.” In essence, the Guantanamo interrogators and commanders are given a green light from the administration’s top lawyers, representing President Bush, Vice President Cheney, Rumsfeld, and the CIA. [Vanity Fair, 5/2008]

Entity Tags: William J. Haynes, US Department of Justice, Mohamed al-Khatani, Michael E. Dunlavey, David S. Addington, Diane E. Beaver, Central Intelligence Agency, Alberto R. Gonzales, Bush administration (43), Richard (“Dick”) Cheney, Donald Rumsfeld, John Rizzo, George W. Bush

Timeline Tags: Torture of US Captives, Civil Liberties

Maher Arar.Maher Arar. [Source: Chris Wattie / Reuters]On his way home to Montreal, Maher Arar, a 34-year old IT specialist, makes a stopover at JFK International Airport in New York. He is returning alone from a family holiday with his wife and daughter in Tunisia. At the airport, Arar, who was born in Syria and has dual Syrian and Canadian citizenship, is arrested by officers wearing badges from the FBI and the New York Police Department. Arar happens to be on a terrorist watch list. A US official later says Arar has the names of “a large number of known al-Qaeda operatives, affiliates or associates” on him. [Washington Post, 11/19/2003] Canadian Solicitor General Wayne Easter later admits that Canada contributed information that led to Arar’s arrest. [Washington Post, 11/20/2003] In an interrogation room Arar asks for an attorney, but, as he later publishes on his website, is told he has no right to a lawyer because he is not an American citizen. Subsequent requests for a lawyer are ignored and the interrogation continues until midnight. His interrogators are particularly interested in another Canadian by the name of Abdullah Almalki. Arar says he has worked together with his brother, Nazih Almalki, but knows Abdullah only casually. Then, with his hands and feet in shackles, he is taken to a nearby building and put in a cell around 1 a.m. “I could not sleep,” Arar later writes. “I was very, very scared and disoriented.” [Amnesty International, 8/19/2003; CounterPunch, 11/6/2003; CBS News, 1/22/2004; Washington Post, 5/11/2004; CBC News, 11/26/2004; Maher Arar, 1/15/2005]

Entity Tags: Federal Bureau of Investigation, Abdullah Almalki, Wayne Easter, Al-Qaeda, Maher Arar

Timeline Tags: Torture of US Captives

Two days after General Rick Baccus has been relieved from duty as the guard commander at Guantanamo (see October 9, 2002), and almost one and a half months since the writing of the Office of Legal Counsel’s (OLC) August memo on torture (see August 1, 2002), military intelligence at Guantanamo begin suggesting new rules of interrogation. Lieutenant Colonel Jerald Phifer, Director J2, sends a memo, to Major General Michael E. Dunlavey, Commander of Joint Task Force (JTF) 170, requesting approval for more severe interrogation techniques. [US Department of Defense, 10/11/2002 pdf file; New Yorker, 2/27/2008] In 2009, Senator Carl Levin (D-MI) will write (see April 21, 2009) that Dunlavey’s request is sparked by recent reports on the use of SERE training techniques for interrogation purposes (see January 2002 and After and April 16, 2002). [Huffington Post, 4/21/2009]
Three Categories of Techniques - The memo states, “The current guidelines for interrogation procedures at GTMO [Guantanamo] limit the ability of interrogators to counter advanced resistance.” Phifer proposes three categories of techniques. The mildest, which includes yelling and weak forms of deception, are included in category one. Category two techniques are more severe and require approval by an “interrogator group director.” They include the use of stress positions for up to four hours; use of falsified documents; isolation for up to 30 days; sensory deprivation and hooding; 20-hour interrogations; removal of comfort and religious items; replacing hot food with cold military rations; removal of clothing; forced grooming, including the shaving of beards; and playing on detainees’ phobias to induce stress, such as a fear of dogs. The harshest techniques, listed in category three, are to be reserved for a “very small percentage of the most uncooperative detainees” and only used with permission from the commander of the prison. These methods include using non-injurious physical contact like poking or grabbing; threatening a detainee with death or severe pain or threatening that a family member would be subjected to such harm; exposing him to cold weather or water; using a wet towel to “induce the misperception of suffocation.” [US Department of Defense, 10/11/2002 pdf file; New Yorker, 2/27/2008]
Desire to Extract More Information from Detainee - The request is prompted in part by military intelligence’s belief that Guantanamo detainee Mohamed al-Khatani has more information than the FBI has managed to extract from him. “Al-Khatani is a person in… whom we have considerable interest,” Dell’Orto will explain during a 2004 press briefing at the White House. “He has resisted our techniques. And so it is concluded at Guantanamo that it may be time to inquire as to whether there may be more flexibility in the type of techniques we use on him.” [Washington File, 6/23/2004]
JAG Officer Concludes Tactics are Legal - The same day, a staff judge advocate, Lieutenant Colonel Diane E. Beaver, reviews Phifer’s proposed techniques for legality and, while making qualifications and recommending further review, concludes in a memo to Dunlavey that they are legal. Also the same day, Dunlavey sends the list of techniques to his superior, General James T. Hill, commander of the Southern Command, requesting approval for their use. Dunlavey writes: “Although [the techniques currently employed] have resulted in significant exploitable intelligence the same methods have become less effective over time. I believe the methods and techniques delineated in the accompanying J-2 memorandum will enhance our efforts to extract additional information.” [US Department of Defense, 10/11/2002 pdf file] Beaver concludes that since President Bush had decided that all the detainees “are not protected by the Geneva Conventions” (see January 18-25, 2002, February 7, 2002), all of the desired techniques are allowable because “no international body of law directly applies.” [Savage, 2007, pp. 178]

Entity Tags: Rick Baccus, George W. Bush, James T. Hill, Carl Levin, Daniel J. Dell’Orto, Diane E. Beaver, Michael E. Dunlavey, Mohamed al-Khatani

Timeline Tags: Torture of US Captives

At the request of FBI Director Robert Mueller, Attorney General John Ashcroft files a declaration invoking the “state secrets” privilege (see March 9, 1953) to block FBI translator Sibel Edmonds’ lawsuit against the government from being heard in court. [New York Observer, 1/22/2004] The Justice Department insists that disclosing her evidence, even at a closed hearing in court, “could reasonably be expected to cause serious damage to the foreign policy and national security of the United States.” The “state secrets privilege,” derived from English common law, has never been the subject of any congressional vote or statute. Normally, the privilege is used to block the discovery of a specific piece of evidence that could put the nation’s security at risk. But Ashcroft’s declaration asserts that the very subject of her lawsuit constitutes a state secret, thus barring her from even presenting her case in court. The text of Ashcroft’s declaration is classified. [Vanity Fair, 9/2005] The Justice Department’s Director of Public Affairs, Barbara Comstock, says in a press release: “To prevent disclosure of certain classified and sensitive national security information, Attorney General Ashcroft today asserted the state secrets privilege.… The state secrets privilege is well established in federal law… and allows the Executive Branch to safeguard vital information regarding the nation’s security or diplomatic relations. In the past, this privilege has been applied many times to protect our nation’s secrets from disclosure, and to require dismissal of cases when other litigation mechanisms would be inadequate. It is an absolute privilege that renders the information unavailable in litigation.” [US Department of Justice, 10/18/2002; Siegel, 2008, pp. 201]

Entity Tags: Robert S. Mueller III, Sibel Edmonds, Barbara Comstock, John Ashcroft, US Department of Justice

Timeline Tags: Complete 911 Timeline, Civil Liberties

Assistant Attorney General William Moschella informs the ranking members of the House and Senate Intelligence committees of the administration’s use of potentially unconstitutional data mining and electronic surveillance programs after the 9/11 attacks. Moschella tells the lawmakers, “The president determined that it was necessary following September 11 to create an early-warning detection system” to prevent more attacks. One such program is the Novel Intelligence from Massive Data (NIMD) initiative (see After September 11, 2001). Moschella echoes the claims of National Security Agency director Michael Hayden and other administration officials, saying that the Foreign Intelligence Surveillance Act (FISA), which allows the government to obtain warrants to conduct domestic eavesdropping or wiretapping, “could not have provided the speed and agility required for the early-warning detection system.” [National Journal, 1/20/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002). Moschella informs the lawmakers of none of this.

Entity Tags: Senate Intelligence Committee, William E. Moschella, Michael Hayden, Bush administration (43), Foreign Intelligence Surveillance Act, Novel Intelligence from Massive Data, House Intelligence Committee

Timeline Tags: Civil Liberties

Said Berraj will be considered closely involved in the Madrid train bombings plot (see 7:37-7:42 a.m., March 11, 2004), and frequently runs errands for Serhane Abdelmajid Fakhet, one of about three masterminds of the bombings. He was briefly arrested in Turkey in 2000 while meeting with several of the other bombers (see October 10, 2000). In 2003, he regularly meets with Spanish intelligence agents. It is not clear if or when he stops meeting with them. And up until the bombings he also works for a security company owned by a former policeman. He flees Spain two days before the bombing. He has yet to be found. [El Mundo (Madrid), 1/15/2007] A different informant named Abdelkader Farssaoui, a.k.a. Cartagena, will later testify under oath as a protected witness that he accidentally sees Fakhet and Berrai meeting with his handlers in 2003, suggesting that Fakhet is an informant as well (see Shortly After October 2003).

Entity Tags: Abdelkader Farssaoui, Said Berraj, Serhane Abdelmajid Fakhet

Timeline Tags: Complete 911 Timeline

The wife of Mouhannad Almallah gives a statement against her husband to police. She says that he systematically beats her. She also accurately describes in detail his Islamist militant ties:
bullet She says that militants regularly met at her apartment. She and her husband have just moved, and militant continue to meet at their new apartment on Virgen del Coro street in Madrid.
bullet She says that her husband lived with Serhane Abdelmajid Fakhet for a month in December 2002. Mustapha Maymouni, Fakhet’s brother-in-law, visited as well. They moved when they felt they were suspected by police.
bullet She saw her husband open several boxes and noticed they contained books and videos about Osama bin Laden.
bullet Her husband and his brother, Moutaz Almallah, strongly suspect their phones are being monitored. Moutaz lives in London but frequently visits Spain (see August 2002).
bullet She describes four particularly important meetings held in her apartment beginning in November 2002. Moutaz and Mouhannad Almallah, Fakhet, and Mayoumi attended all the meetings. Basel Ghalyoun attended the fourth one. In these meetings, they always speak of attack and jihad. They talk about bin Laden, but refer to him as “Emir.”
bullet Sometimes her husband Mouhannad and Fakhet discuss Amer el-Azizi, who fled a police raid in November 2001 (see Shortly After November 21, 2001). She finds out they helped him escape Spain dressed as a woman. El-Azizi is believed to be linked to the 9/11 attacks (see Before July 8, 2001).
bullet Both Mouhannad and Fakhet remain in contact with el-Azizi by e-mail. Her husband’s brother Moutaz does as well.
bullet She occasionally sees her husband with Jamal Ahmidan, alias “El Chino.”
Police apparently take her warnings seriously because they begin monitoring her apartment in March 2003 (see January 17, 2003-Late March 2004). Most of these people—Fakhet, el-Azizi, Ghalyoun, and both Almallah brothers—are already under surveillance (see December 2001-June 2002). [El Mundo (Madrid), 7/28/2005] All of the people she mentions are believed to have important roles in the 2004 Madrid bombings (see 7:37-7:42 a.m., March 11, 2004), except for Maymouni, who will be arrested and jailed later in 2003 for having a pivotal role in the May 2003 Casablanca bombings (see May 16, 2003).

Entity Tags: Basel Ghalyoun, Amer el-Azizi, Jamal Ahmidan, Serhane Abdelmajid Fakhet, Mouhannad Almallah, Moutaz Almallah, Osama bin Laden, Mouhannad Almallah’s wife, Mustapha Maymouni

Timeline Tags: Complete 911 Timeline

Beginning around January 2003, Spanish authorities discover that a group of Islamist militants living in Madrid are committing a variety of crimes. Barakat Yarkas, the head of the al-Qaeda cell in Madrid, was arrested with some associates in November 2001 (see November 13, 2001) and this group is largely led by other associates who were not arrested then (see November 13, 2001). Police learn members of this group are creating false passports for other militants, and stealing cars and selling them in Morocco to raise money for their militant activities. [El Mundo (Madrid), 8/10/2005] A number of them are drug dealers. For instance, Jamal Ahmidan, who begins associating with Serhane Abdelmajid Fakhet and many of the other militants in 2003, leads a group of about six drug dealers. For example, in December 2003, Ahmidan shoots someone in the leg for failing to pay for the drugs he had given him. And mere days before the 2004 Madrid train bombings (see 7:37-7:42 a.m., March 11, 2004), he flies to the Spanish island of Mallorca to organize a sale of hashish and Ecstasy. Three of the seven men who blow themselves up in April 2003 with Fakhet and Ahmidan are believed to be drug dealers as well (see 9:05 p.m., April 3, 2004). [Los Angeles Times, 5/23/2004; El Mundo (Madrid), 2/12/2006; New York Times Magazine, 11/25/2007] In fact, Spanish authorities have observed militants committing various crimes to fund their activities since 1995, but they continue to merely gather intelligence and none of them are ever arrested for these crimes (see Late 1995 and After). This pattern continues, and none of the militants will be arrested for obvious criminal activity until after they commit the Madrid bombings.

Entity Tags: Serhane Abdelmajid Fakhet, Jamal Ahmidan

Timeline Tags: Complete 911 Timeline

The Navy’s general counsel, Alberto Mora, is angered at the lack of response to his attempts to persuade the Pentagon to stop abusing prisoners at Guantanamo and is particularly frustrated with the Pentagon’s general counsel, William J. Haynes (see December 20, 2002 and January 9, 2003 and After). Mora decides to take a step that he knows will antagonize Haynes, who always warns subordinates never to put anything controversial in writing or in e-mail messages. Mora delivers an unsigned draft memo of his objections to Haynes, and tells him that he intends to “sign it out” that afternoon—thereby making it an official document—unless the harsh interrogation techniques at Guantanamo stop. Mora’s memo describes the interrogations at Guantanamo as “at a minimum cruel and unusual treatment, and, at worst, torture.”
'Working Group to Be Created - Haynes calls Mora later that day with good news: Defense Secretary Donald Rumsfeld is suspending his authorization of the disputed interrogation techniques (see December 2, 2002) and is appointing a “working group” of lawyers from all branches of the armed forces to develop new interrogation guidelines. Mora will be a part of that working group. An elated Mora begins working with the group of lawyers to discuss the constitutionality and effectiveness of various interrogation techniques. In 2006, he will say that he felt “no one would ever learn about the best thing I’d ever done in my life.”
Mora Outmaneuvered - But Haynes has outmaneuvered Mora. A week later, Mora sees a lengthy classified document that negates every argument he has made. Haynes has already solicited a second, overarching opinion from John Yoo, a lawyer at the Justice Department’s Office of Legal Counsel, that supersedes Mora’s working group (see January 9, 2002). Mora is astonished (see January 23-Late January, 2003). He will later learn that the working group’s report will be forced to comply with Yoo’s legal reasoning. In fact, the group’s final report is never completed—though the draft report, which follows Yoo’s memo, is signed by Rumsfeld without Mora’s knowledge. [New Yorker, 2/27/2006] Mora later says that while Yoo’s memo displays a “seeming sophistication,” it is “profoundly in error,” contradicting both domestic law and international treaties. Mora and the other “dissident” members of the working group are led to believe that the report has been abandoned. [Savage, 2007, pp. 181] He will learn about Rumsfeld’s signature on the draft report while watching C-SPAN in mid-2004. [New Yorker, 2/27/2006; Savage, 2007, pp. 189]

Entity Tags: US Department of Defense, US Department of Justice, Alberto Mora, John C. Yoo, Office of Legal Counsel (DOJ), Donald Rumsfeld, William J. Haynes

Timeline Tags: Torture of US Captives, Civil Liberties

Page 1 of 4 (317 events)
previous | 1, 2, 3, 4 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike