!! History Commons Alert, Exciting News

Context of 'February 2, 2006: Justice Department Opens Internal Probe into Warrantless Wiretapping Program'

This is a scalable context timeline. It contains events related to the event February 2, 2006: Justice Department Opens Internal Probe into Warrantless Wiretapping Program. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 18 of 25 (2423 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25 | next

Viveca Novak.Viveca Novak. [Source: Annenberg Public Policy Center]The New York Times learns that a conversation between the lawyer for White House official Karl Rove and Time magazine reporter Viveca Novak led Rove to change his testimony to the grand jury investigating the Plame Wilson identity leak (see October 14, 2005). Novak told Rove’s lawyer, Robert Luskin, that her colleague at Time, Matthew Cooper, had possibly learned of Valerie Plame Wilson’s CIA status from Rove (see March 1, 2004). Special prosecutor Patrick Fitzgerald has summoned Novak to testify before his grand jury about the Luskin conversation. Sources say Fitzgerald is still determining whether Rove has been truthful and forthcoming in his multiple testimonies before the jury, and whether he altered his testimony after learning that Cooper might identify him as a source (see October 15, 2004). Previously, Rove testified that he only spoke to columnist Robert Novak (no relation to Viveca Novak) about Plame Wilson’s secret CIA identity (see July 8, 2003), and failed to disclose his similar leak to Cooper (see 11:00 a.m. July 11, 2003). Rove testified that he simply forgot about his conversation with Cooper during previous testimony. [Washington Post, 11/29/2005; New York Times, 12/2/2005] Progressive media watchdog organization Media Matters notes that Novak never disclosed her conversation with Luskin to Fitzgerald, and failed to inform her readers of her contacts and her knowledge of the case in several articles she wrote about the investigation subsequent to her conversation with Luskin. Media Matters also notes that Novak “provid[ed] Luskin with information that might prove crucial to Rove’s defense in the case.… Novak, an experienced journalist working for a prestigious publication, disclosed to Rove’s lawyer information that she did not give to her readers and that Cooper would zealously try to withhold for more than a year on the basis of the purportedly sacrosanct anonymity agreement between a reporter and a source.… Novak may have affirmatively helped Rove—a source the magazine covers and will continue to cover—beat a perjury rap, not by exonerating him through a story in the course of her job, but by providing his lawyer with information in a private conversation.… Novak apparently felt free to disclose to Rove’s lawyer that Cooper might be compelled to testify before a grand jury about the conversation between Cooper and Rove, but she did not accord Time readers the same privilege.” [Media Matters, 12/2/2005] The Washington Post notes that Luskin and Novak are friends. [Washington Post, 11/29/2005]

Entity Tags: Valerie Plame Wilson, Media Matters, Matthew Cooper, Karl C. Rove, Patrick J. Fitzgerald, Robert Novak, Viveca Novak, Robert Luskin

Timeline Tags: Niger Uranium and Plame Outing

Arthur Sulzberger.Arthur Sulzberger. [Source: New York Times]George W. Bush summons New York Times publisher Arthur Sulzberger and Times editor Bill Keller to the Oval Office to try to dissuade them from running a landmark story revealing the NSA’s illegal wiretapping program (see December 15, 2005) that he authorized in 2002 (see Early 2002). In the meeeting, Bush warns Sulzberger and Keller that “there’ll be blood on your hands” if another terrorist attack were to occur, obviously implying that to reveal the nature of the program would invite terrorist strikes. Bush is unsuccessful in his attempt to quash the story. [Newsweek, 12/21/2005; Newsweek, 12/22/2008]

Entity Tags: New York Times, Arthur Sulzberger, George W. Bush, National Security Agency, Bill Keller

Timeline Tags: Civil Liberties

Investigative reporter Jason Leopold notes that, according to his sources, special prosecutor Patrick Fitzgerald does not believe the story that White House political strategist Karl Rove and his lawyer, Robert Luskin, are telling about the fortuitous discovery of an internal e-mail that led Rove to admit that he told Time reporter Matthew Cooper about Valerie Plame Wilson’s identity. In March 2004, Time reporter Viveca Novak told Luskin that she was sure Rove outed Plame Wilson to Cooper; that information prompted Luskin to have Rove search the White House e-mail archives for information bearing out Novak’s assertion, and Rove found an e-mail he had sent to Deputy National Security Adviser Stephen Hadley about his conversation with Hadley (see March 1, 2004). Novak testified yesterday about her conversation with Luskin (see December 8, 2005). “Fitzgerald is said to be suspicious about the chain of events that led up to the discovery of the email,” Leopold writes. “Moreover, he is said to be convinced that Rove had changed his story once it became clear that Cooper would be compelled to testify about the source—Rove—who revealed Plame Wilson’s CIA status to him.” Luskin has said that his client, Rove, initially forgot about his conversation with Cooper in his first testimonies before Fitzgerald’s grand jury, and claimed he was not Cooper’s source (see October 8, 2003). According to Leopold’s sources, some of which are inside the Fitzgerald team, Fitzgerald does not find Rove and Luskin’s assertions “believable.” [CounterPunch, 12/9/2005]

Entity Tags: Patrick J. Fitzgerald, Jason Leopold, Karl C. Rove, Robert Luskin, Matthew Cooper, Valerie Plame Wilson, Stephen J. Hadley, Viveca Novak

Timeline Tags: Niger Uranium and Plame Outing

In his weekly radio address, President Bush claims that the US always obtains court warrants before launching electronic surveillance efforts. “The Patriot Act is helping America defeat our enemies while safeguarding civil liberties for all our people,” he says. “The judicial branch has a strong oversight role in the application of the Patriot Act. Under the act, law enforcement officers need a federal judge’s permission to wiretap a foreign terrorist’s phone or search his property. Congress also oversees our use of the Patriot Act. Attorney General Gonzales delivers regular reports on the Patriot Act to the House and the Senate.” [White House, 12/10/2005] Bush has made similar claims in the recent past (see April 19-20, 2004, June 9, 2005, and April 19-20, 2004). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48]

Entity Tags: Mark Klein, AT&T, George W. Bush, USA Patriot Act, National Security Agency

Timeline Tags: Civil Liberties

The Army adopts a new, classified set of interrogation methods that some feel may change the nature of the debate over cruel and inhuman treatment of detainees in US custody. The Detainee Treatment Act (DTA—see December 30, 2005), which bases its definition of torture in part on Army standards, is currently wending its way through Congress. The new set of instructions are being added to the revised Army Field Manual, after they are approved by undersecretary of defense Stephen Cambone. The addendum provides exact details on what kinds of interrogation procedures can and cannot be used, and under what circumstances, pushing the legal limit of what interrogations can be used in ways that the Army has never done before. Some military observers believe that the new guidelines are an attempt by the Army to undercut the DTA, and many believe the bill’s sponsor, Senator John McCain (R-AZ) will be unhappy with the addendum. “This is a stick in McCain’s eye,” one official says. “It goes right up to the edge. He’s not going to be comfortable with this.” McCain has not yet been briefed on the contents of the new guidelines. McCain spokesman Mark Salter says, “This is politically obtuse and damaging. The Pentagon hasn’t done one molecule of political due diligence on this.” One Army officer says that the core of the definition of torture—what is and is not “cruel, inhumane, and degrading” treatment—“is at the crux of the problem, but we’ve never defined that.” The new Army Field Manual specifically prohibits such tactics as stress positioning, stripping prisoners, imposing dietary restrictions, using police dogs to intimidate prisoners, and sleep deprivation. The new manual is expected to be issued before the end of the year. [New York Times, 12/14/2005] The day after this is reported, President Bush agrees not to veto the DTA (see December 15, 2005).

Entity Tags: Stephen A. Cambone, Detainee Treatment Act, US Department of Defense, John McCain, US Department of the Army

Timeline Tags: Torture of US Captives, Civil Liberties

Conservative columnist Robert Novak, who first outed Valerie Plame Wilson as a CIA agent (see July 14, 2003), writes that he believes President Bush knows which administration official or officials leaked Plame Wilson’s identity to the press. If Novak is correct, this would implicate Bush in a potential crime. [Washington Post, 7/3/2007]

Entity Tags: George W. Bush, Robert Novak, Valerie Plame Wilson

Timeline Tags: Niger Uranium and Plame Outing

New York Times headline from article revealing NSA surveillance.New York Times headline from article revealing NSA surveillance. [Source: CBS News]The New York Times reveals that after the 9/11 attacks, President Bush granted the National Security Agency (NSA) secret authorization to eavesdrop on Americans and others inside the US without going through the Foreign Intelligence Surveillance Act (FISA) court to obtain legal warrants (see Early 2002. The administration justifies its actions by claiming such eavesdropping, which includes wiretapping phones and reading e-mails, is necessary to find evidence of terrorist activities, and says the nation needs the program after the 9/11 attacks exposed deficiencies in the US intelligence community’s information gathering process, and because of what they characterize as the “handcuffing” of US intelligence agencies by restrictive laws. The Times has had the article for over a year; the White House prevailed on the Times not to publish its findings for that time, arguing that publication would jeopardize continuing investigations and warn potential terrorists that they were under scrutiny. Many believe that the White House wanted to delay the publication of the article until well after the 2004 presidential elections. The Times delayed publication for over a year, and agreed to suppress some information that administration officials say could be useful to terrorists. (Less than two weeks before the article is published, Bush tries to convince the Times not to print the article at all: see December 6, 2005.) Two days after the Times publishes its article, Bush will acknowledge the order, and accuse the Times of jeopardizing national security (see December 17, 2005). The NSA program eavesdrops without warrants on up to 500 people in the US at any given time, officials say; the overall numbers have likely reached into the thousands. Overseas, up to 7,000 people suspected of terrorist ties are being monitored. Officials point to the discovery of a plot by Ohio trucker and naturalized US citizen and alleged al-Qaeda supporter Iyman Faris to bring down the Brooklyn Bridge with blowtorches as evidence of the program’s efficacy. They also cite the disruption of an al-Qaeda plot to detonate fertilizer bombs outside of British pubs and train stations by the program. But, officials say, most people targeted by the NSA for warrantless wiretapping have never been charged with a crime, and many are targeted because of questionable evidence and groundless suspicion. Many raise an outcry against the program, including members of Congress, civil liberties groups, immigrant rights groups, and others who insist that the program undermines fundamental Constitutional protections of US citizens’ civil liberties and rights to privacy. Several other government programs to spy on Americans have been challenged, including the Federal Bureau of Investigation (FBI)‘s surveillance of US citizens’ library and Internet usage, the monitoring of peaceful antiwar protests, and the proposed use of public and private databases to hunt for terrorist links. In 2004, the Supreme Court overturned the administration’s claim that so-called “enemy detainees” were not entitled to judicial review of their indefinite detentions. Several senior officials say that when the warrantless wiretapping program began, it operated with few controls and almost no oversight outside of the NSA itself. The agency is not required to seek the approval of the Justice Department or anyone else outside the FISA court for its surveillance operations. Some NSA officials wanted nothing to do with a program they felt was patently illegal, according to a former senior Bush administration official. Internal concerns about the program prompted the Bush administration to briefly suspend the program while Justice Department officials audited it and eventually provided some guidelines for its operations. A complaint from Judge Colleen Kollar-Kotelly, the federal judge who oversees the FISA Court, helped spur the suspension, according to officials. Kollar-Kotelly questioned whether information obtained under the program was being improperly used as the basis for FISA wiretap warrant requests from the Justice Department. Some government lawyers say that the Justice Department may have deliberately misled Kollar-Kotelly and the FISA court about the program in order to keep the program under wraps. The judge insisted to Justice Department officials that any material gathered under the program not be used in seeking wiretap warrants from her court. The question also arose in the Faris case, when senior Justice Department officials worried that evidence obtained by warrantless wiretapping by the NSA of Faris could be used in court without having to lie to the court about its origins. [New York Times, 12/15/2005]

Entity Tags: US Supreme Court, George W. Bush, US Department of Justice, Iyman Faris, National Security Agency, New York Times, Al-Qaeda, Foreign Intelligence Surveillance Court, Colleen Kollar-Kotelly

Timeline Tags: Civil Liberties

Times executive editor Bill Keller.Times executive editor Bill Keller. [Source: New York Times]The New York Times’s executive editor, Bill Keller, defends his paper’s decision to reveal the Bush administration’s warrantless wiretapping program, conducted through the NSA (see December 15, 2005), after holding the story for over a year. Keller writes: “We start with the premise that a newspaper’s job is to publish information that is a matter of public interest. Clearly a secret policy reversal that gives an American intelligence agency discretion to monitor communications within the country is a matter of public interest.… A year ago, when this information first became known to Times reporters, the administration argued strongly that writing about this eavesdropping program would give terrorists clues about the vulnerability of their communications and would deprive the government of an effective tool for the protection of the country’s security. Officials also assured senior editors of The Times that a variety of legal checks had been imposed that satisfied everyone involved that the program raised no legal questions. As we have done before in rare instances when faced with a convincing national security argument, we agreed not to publish at that time. We also continued reporting, and in the ensuing months two things happened that changed our thinking. First, we developed a fuller picture of the concerns and misgivings that had been expressed during the life of the program. It is not our place to pass judgment on the legal or civil liberties questions involved in such a program, but it became clear those questions loomed larger within the government than we had previously understood. Second, in the course of subsequent reporting we satisfied ourselves that we could write about this program—withholding a number of technical details—in a way that would not expose any intelligence-gathering methods or capabilities that are not already on the public record. The fact that the government eavesdrops on those suspected of terrorist connections is well-known. The fact that the NSA can legally monitor communications within the United States with a warrant from the Foreign Intelligence Surveillance Court is also public information. What is new is that the NSA has for the past three years had the authority to eavesdrop on Americans and others inside the United States without a warrant. It is that expansion of authority—not the need for a robust anti-terror intelligence operation—that prompted debate within the government, and that is the subject of the article.” [CNN, 12/16/2005]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, George W. Bush, Bill Keller

Timeline Tags: Civil Liberties

President Bush acknowledges that he issued a 2002 executive order authorizing the National Security Agency (NSA) to wiretap US citizens’ phones and e-mails without proper warrants, and accuses the New York Times of jeopardizing national security by publishing its December 15 article (see Early 2002 and December 15, 2005). Bush says he was within the law to issue such an order, which many feel shatters fundamental Constitutional guarantees of liberty and privacy, but accuses the Times of breaking the law by publishing the article. Bush tells listeners during his weekly radio address that the executive order is “fully consistent” with his “constitutional responsibilities and authorities.” But, he continues, “Yesterday the existence of this secret program was revealed in media reports, after being improperly provided to news organizations. As a result, our enemies have learned information they should not have, and the unauthorized disclosure of this effort damages our national security and puts our citizens at risk.” He admits allowing the NSA to “to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations” in a program designed to “detect and prevent terrorist attacks.” Under the law, the NSA must obtain warrants from the Foreign Intelligence Surveillance Act (FISA) Court, but after Bush’s executive order, it was no longer required to do so. Bush justifies the order by citing the example of two 9/11 hijackers, Khalid Almihdhar and Nawaf Alhazmi, who, he says, “communicated while they were in the United States to other members of al-Qaeda who were overseas, but we didn’t know they were here until it was too late.” Because of the unconstitutional wiretapping program, it is “more likely that killers like these 9/11 hijackers will be identified and located in time, and the activities conducted under this authorization have helped detect and prevent possible terrorist attacks in the United States and abroad.” Bush also admits to reauthorizing the program “more than thirty times,” and adds, “I intend to do so for as long as our nation faces a continuing threat from al-Qaeda and related groups.” [CNN, 12/16/2005] Bush fails to address the likelihood that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, George W. Bush, Khalid Almihdhar, Foreign Intelligence Surveillance Act, Nawaf Alhazmi, Al-Qaeda

Timeline Tags: Civil Liberties

After the NSA’s warrantless wiretapping program is revealed (see Early 2002 and December 15, 2005), some commentators criticize the program. Americans have fundamental Constitutional protections that are enforceable in court whether their conversations are domestic or international, says law scholar Geoffrey Stone. Stone says that President Bush’s emphasis that NSA wiretapping only takes place on US calls to overseas phones or overseas e-mails “is no different, as far as the law is concerned, from saying we only do it on Tuesdays.” Former FBI national security law chief Michael Woods, who served in the position when Bush signed the NSA directive, calls the program “very dangerous.” Though Woods says the program was justifiable in the immediate aftermath of 9/11, “[By now] we ought to be past the time of emergency responses. We ought to have more considered views now…. We have time to debate a legal regime and what’s appropriate.” [Washington Post, 12/18/2005] Kate Martin, director of the Center for National Security Studies, says the secret order may amount to Bush authorizing criminal activity in direct violation of FISA. “This is as shocking a revelation as we have ever seen from the Bush administration,” she says. “It is, I believe, the first time a president has authorized government agencies to violate a specific criminal prohibition and eavesdrop on Americans.” The American Civil Liberties Union’s Caroline Frederickson says of the program, “It’s clear that the administration has been very willing to sacrifice civil liberties in its effort to exercise its authority on terrorism, to the extent that it authorizes criminal activity.” [Washington Post, 12/16/2005]

Entity Tags: Center for National Security Studies, Geoffrey Stone, American Civil Liberties Union, National Security Agency, Caroline Frederickson

Timeline Tags: Civil Liberties

During a press conference, President Bush is asked if he will order an investigation into the leak that revealed the NSA’s domestic surveillance program (see December 15, 2005). Bush says he has not directly ordered an investigation, presuming the Justice Department is handling the matter, but he calls the leak “a shameful act for someone to disclose this very important program in a time of war.” And he implies that the leak, and the New York Times’s decision to print the resulting article, is treason: “The fact that we’re discussing this program is helping the enemy.… But it is a shameful act by somebody who has got secrets of the United States government and feels like they need to disclose them publicly.” When asked why he “skip[ped] the basic safeguards of asking courts for permission for the intercepts,” he answers: “[R]ight after September the 11th, I knew we were fighting a different kind of war. And so I asked people in my administration to analyze how best for me and our government to do the job people expect us to do, which is to detect and prevent a possible attack. That’s what the American people want. We looked at the possible scenarios. And the people responsible for helping us protect and defend came forth with the current program, because it enables us to move faster and quicker. And that’s important. We’ve got to be fast on our feet, quick to detect and prevent. We use FISA still—you’re referring to the FISA court in your question—of course, we use FISAs. But FISA is for long-term monitoring. What is needed in order to protect the American people is the ability to move quickly to detect. Now, having suggested this idea, I then, obviously, went to the question, is it legal to do so? I am—I swore to uphold the laws. Do I have the legal authority to do this? And the answer is, absolutely.… [T]he legal authority is derived from the Constitution, as well as the authorization of force by the United States Congress” (see September 14-18, 2001). A reporter asks why “has your administration not sought to get changes in the law instead of bypassing it, as some of your critics have said?” Bush responds by reiterating the point that the program is “limited in nature to those that are known al-Qaeda ties and/or affiliates.” He then reiterates another point: he believes he has the authority to bypass the law. He “share[s] the same concerns” about civil liberties that members of Congress have expressed (see December 16, 2005).” However, his reassurances that domestic calls are not being monitored are not absolute. “[I]f you’re calling from Houston to [Los Angeles], that call is not monitored. And if there was ever any need to monitor, there would be a process to do that.” He is asked: “You say you have an obligation to protect us. Then why not monitor those calls between Houston and LA? If the threat is so great, and you use the same logic, why not monitor those calls? Americans thought they weren’t being spied on in calls overseas—why not within the country, if the threat is so great?” Bush replies: “We will, under current law, if we have to. We will monitor those calls. And that’s why there is a FISA law. We will apply for the right to do so. And there’s a difference—let me finish—there is a difference between detecting so we can prevent, and monitoring. And it’s important to know the distinction between the two.” He concludes, “I just want to assure the American people that, one, I’ve got the authority to do this; two, it is a necessary part of my job to protect you; and, three, we’re guarding your civil liberties.” [White House, 12/19/2005]

Entity Tags: US Department of Justice, George W. Bush, New York Times, National Security Agency

Timeline Tags: Civil Liberties

DARPA logo.DARPA logo. [Source: Duke University]The computer and technology experts at Ars Technica, a well-regarded Web publication which describes itself as focusing on “the art of technology,” speculate on the technology behind the NSA warrantless wiretapping program recently revealed to the public (see December 15, 2005). The Ars Technica experts believe that Senator Jay Rockefeller (D-WV)‘s 2003 comparison between the program and the Total Information Awareness (TIA) project (see March 2002) is the most apt. They believe that the NSA wiretapping program may be built upon the foundation of a shadowy, highly classified surveillance program called Echelon. They write, “This system’s purpose would be to monitor communications and detect would-be terrorists and plots before they happen… This project is not interested in funding ‘evolutionary’ changes in technology, e.g., bit-step improvements to current data mining and storage techniques. Rather, the amount of data that the directors are anticipating (petabytes!) would require massive leaps in technology (and perhaps also some massive leaps in surveillance laws).” [Ars Technica, 12/20/2005; Ars Technica, 2007] Data storage measured in petabytes is a colossal capacity; a petabyte is 1,024 terabytes, and a single terabyte is 1,024 gigabytes, the usual measurement for hard drive capacity. [TechTerms, 2007] The Ars Technica experts continue, “According to DARPA, such data collection ‘increases information coverage by an order of magnitude,’ and ultimately ‘requires keeping track of individuals and understanding how they fit into models.’” They go on to note that the NSA wiretapping program was instituted shortly after the TIA project was quashed by Congress, and say they believe the NSA program is an extension and an outgrowth of TIA. They note that “the FBI requested the legal authorization to do very high-volume monitoring of digital calls” in 1995, that there is “no way for the judicial system to approve warrants for the number of calls that the FBI wanted to monitor,” and that the FBI “could never hire enough humans to be able to monitor that many calls simultaneously, which means that they’d have to use voice recognition technology to look for ‘hits’ that they could then follow up on with human wiretaps.” The Ars Technica experts believe the NSA is using “some kind of high-volume, automated voice recognition and pattern matching system,” employing a form of “smart filtering” that would weed through perhaps hundreds of thousands of computer-monitored calls and turning a fraction of those calls over to human analysts for evaluation: “[Y]es, this kind of real-time voice recognition, crude semantic parsing and pattern matching is doable with today’s technology, especially when you have a budget like the NSA.” In a follow-up, Ars Technica technology specialist and self-described conservative and “privacy nazi” Jon Stokes writes of his own concerns over the program, noting that the program is too wide-reaching and too blunt to actually catch many real terrorists, and that the program is a tremendous intrusion into Americans’ fundamental privacy: “The problem is not that such large-scale industrial fishing invariably catches a few dolphins along with the tuna, but that between 99.999 and 100 percent of what you’re going to get is dolphin.” Stokes also warns that such an intrusive surveillance program will not only violate privacy rights, but be quite ineffective: “As the TSA, with its strip-searching of people’s elderly grandparents, abundantly proves every holiday season, blunt instruments and scorched earth tactics are of dubious value in catching genuine bad actors. In fact, blunt instruments and wide nets are the easiest for professional bad guys to evade. All you need to beat such surveillance tools is patience and know-how.…Blunt instruments like airport facial recognition software and random subway bag searches produce much more noise than they do signal, and any engineer or computer scientist worth his or her salt will tell you that an intelligent, targeted, low-tech approach beats a brute-force high-tech approach every time. There is no high-tech substitute for human intelligence gathering. In fact…an overload of crudely processed information is actually more likely to lead an analyst astray than it is to produce any useful insight.…In the end, brute force security techniques are not only corrosive to democratic values but they’re also bad for national security. They waste massive resources that could be spent more effectively elsewhere, and they give governments and countries a false sense of security that a savvy enemy can exploit to devastating effect.…[I]t’s not just enough to have sound intelligence; you also need political leaders who have the wisdom to use that intelligence appropriately.” [Ars Technica, 12/20/2005]

Entity Tags: Transportation Safety Administration, Total Information Awareness, Federal Bureau of Investigation, John D. Rockefeller, Defense Advanced Research Projects Agency, Jon Stokes, National Security Agency

Timeline Tags: Civil Liberties

Judge James Robertson.Judge James Robertson. [Source: US Courts.gov]US District Judge James Robertson resigns from the Foreign Intelligence Surveillance Court (FISC), a special, secret court set up to oversee government surveillance operations. Robertson refuses to comment on his resignation from FISC, but two of Robertson’s associates say that Robertson’s resignation stems from his deep concerns that the NSA’s warrantless domestic wiretapping program (see Early 2002) is not legal, and has tainted the work of the court. Robertson, formerly one of ten “revolving” members of FISC who periodically rotate in and out of duty on the court, continues to serve as a Washington, DC district judge. Colleagues of Robertson say that he is concerned that information gained from the warrantless surveillance under Bush’s program subsequently could have been used to obtain warrants under the FISA program, a practice specifically prohibited by the court. Robertson, a Clinton appointee selected for FISC by Chief Justice William Rehnquist, has also been critical of the Bush administration’s treatment of detainees at the Guantanamo Bay prison camp, and recently issued a decision that sidetracked Bush’s use of military tribunals for some Guantanamo detainees (see November 8, 2004). Even though Robertson was hand-picked for FISC by the deeply conservative Rehnquist, who expressly selected judges who took an expansive view of wiretapping and other surveillance programs, [Associated Press, 12/21/2005] some conservative critics such as Jim Kouri, a vice-president of the National Association of Chiefs of Police, call Robertson a “left-leaning, liberal” “Clintonista” jurist with ties to “ultra-liberal” civil rights associations and a desire for media attention (though Robertson has refused to speak to the press about his resignation). Critics also demand that less attention be directed at the NSA wiretapping program and more on finding out who leaked the information that led to the New York Times’s recent revelatory articles on the program (see Early 2002). GOP strategist Mike Baker says in response to Robertson’s resignation, “Only the Democrats make confirmations and appointments of people by Republican President [sic] a question of ideology. The news media try to portray [Robertson] as non-partisan. He’s as liberal as they come and as partisan as they come.” [Men's News, 12/23/2005] Presiding judge Colleen Kollar-Kotelly is arranging for a classified briefing of all the remaining FISC judges on the wiretapping program, partly in order to bring any doubts harbored by other justices into the open. Sources say Kollar-Kotelly expects top NSA and Justice Department officials to outline the program for the judges. No one on FISC except for Kollar-Kotelly and her predecessor, Judge Royce Lambeth, have ever been briefed on the program. If the judges are not satisfied with the information provided in this briefing, they could take action, which could include anything from demanding proof from the Justice Department that previous wiretaps were not tainted, could refuse to issue warrants based on secretly-obtained evidence, or, conceivably, could disband the entire court, especially in light of Bush’s recent suggestions that he has the power to bypass the court if he so desires. [Washington Post, 12/22/2005]

Entity Tags: US Department of Justice, Royce Lambeth, William Rehnquist, National Security Agency, Jim Kouri, Mike Baker, Foreign Intelligence Surveillance Court, George W. Bush, James Robertson, Colleen Kollar-Kotelly

Timeline Tags: Civil Liberties

Chart showing NSA surveillance network.Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” [New York Times, 12/24/2005]

Entity Tags: US Department of Defense, US Department of Justice, Total Information Awareness, New York Times, US Department of Homeland Security, Computer Assisted Passenger Prescreening System, Bush administration (43), Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, George W. Bush, National Security Agency, Phil Karn

Timeline Tags: Civil Liberties

Suzanne Spaulding, a former counsel for the CIA, the Senate and House intelligence commission, and executive director of the National Terrorism Commission from 1999 through 2000, writes an op-ed criticizing the Bush administration for its domestic surveillance program. She writes that the three main sources of oversight and restraint on Bush’s unfettered efforts to monitor US citizens—Congress, the judiciary, and the American people—have failed to halt what she calls “this extraordinary exercise of presidential power.” Spaulding, who will testify along similar lines before the Senate over a year later (see April 11, 2007), writes, “Ironically, if it is ultimately determined that this domestic surveillance program reflects the exercise of unchecked power in contravention of law, it will wind up weakening the presidency. Once again, we will confront the challenge of restoring Americans’ faith in the rule of law and our system of checks and balances.” The pretense of oversight by the administration, in providing limited and perhaps misleading briefings on the program only to the so-called “Gang of Eight” Congressional leaders, is superficial and ineffective, she writes; the entire process “effectively eliminates the possibility of any careful oversight.” She notes that because of the severe restrictions both in the information doled out to these Congressional leaders, and their strict prohibition on discussing the information with anyone else, even other intelligence panel members, “[i]t is virtually impossible for individual members of Congress, particularly members of the minority party, to take any effective action if they have concerns about what they have heard in one of these briefings. It is not realistic to expect them, working alone, to sort through complex legal issues, conduct the kind of factual investigation required for true oversight and develop an appropriate legislative response.” Congressional oversight is key to retaining the trust of the US citizenry, she writes, and adds that that particular principle was well understood at the CIA while she was there. Oversight “is vital for a secret agency operating in a democracy. True oversight helps clarify the authority under which intelligence professionals operate. And when risky operations are revealed, it is important to have members of Congress reassure the public that they have been overseeing the operation. The briefings reportedly provided on the National Security Agency (NSA) surveillance program reflect, instead, a ‘check the box’ mentality—allowing administration officials to claim that they had informed Congress without having really achieved the objectives of oversight.” While those few members of Congress are given little real information, the judiciary, particularly the Foreign Intelligence Surveillance Court (FISC), is cut out of the process entirely. “Instead of going to a judge on the secret court that was specifically established to authorize foreign intelligence surveillance inside the United States, we are told that an NSA shift supervisor was able to sign off on the warrantless surveillance of Americans,” she writes. “That’s neither a check nor a balance. The primary duty of the NSA shift supervisor, who essentially works for the president, is to collect intelligence. The task of the judge is to ensure that the legal standards set out in the 1978 Foreign Intelligence Surveillance Act (FISA) have been met. Which one has stronger independence to say no, if no needs to be said? The objectives of the surveillance program, as described in news reports, seem laudable. The government should be running to ground the contacts listed in a suspected terrorist’s cell phone, for example. What is troubling is that this domestic spying is being done in apparent contravention of FISA, for reasons that still are not clear.” In her piece she takes issue with the Bush administration’s insistence that its surveillance program is legal and necessary. She makes the following case:
Specious Arguments to Duck FISA Court - The argument that the FISA Court is too slow to respond to immediate needs for domestic surveillance is specious, she says. “FISA anticipates situations in which speed is essential. It allows the government to start eavesdropping without a court order and to keep it going for a maximum of three days. And while the FISA application process is often burdensome in routine cases, it can also move with remarkable speed when necessary, with applications written and approved in just a few hours.” Instead, she says that the Bush administration must have dodged FISC because their wiretaps didn’t meet FISA standards of probable cause. Since FISC is staffed by judges hand-picked by conservative then-Supreme Court Chief Justice William Rehnquist, “who presumably felt that they had the right temperament and expertise to understand the national security imperatives as well as the need to protect civil liberties,” and since FISC has granted all but four of the more than 5,645 requests for wiretaps and surveillance made by the administration since 2001, to argue that FISC is unresponsive is simply wrong-headed. And, she notes, if the administration felt that FISA’s standards were too strict, it could have moved to amend the law to allow more leniency in obtaining such warrants. It has not done so since the passage of the 2001 Patriot Act. She writes, “The administration reportedly did not think it could get an amendment without exposing details of the program. But this is not the first time the intelligence community has needed a change in the law to allow it to undertake sensitive intelligence activities that could not be disclosed. In the past, Congress and the administration have worked together to find a way to accomplish what was needed. It was never previously considered an option to simply decide that finding a legislative solution was too hard and that the executive branch could just ignore the law rather than fix it.”
No Justification for Keeping Program Secret - In addition, the administration has consistently failed to make a case for keeping the domestic wiretapping policy secret for four years. US-designated terrorist groups already know that the government listens to their cell phone conversations whenever possible, and they are well aware of the various publicly known programs to search through millions of electronic communications, such as the NSA’s Echelon program (see April 4, 2001). “So what do the terrorists learn from a general public discussion about the legal authority being relied upon to target their conversations?” she asks. “Presumably very little. What does the American public lose by not having the public discussion? We lose the opportunity to hold our elected leaders accountable for what they do on our behalf.”
Assertions that Program Authorized by Congress Fallacious - The argument advanced by Attorney General Alberto Gonzales that says the program does not violate the law because Congress’s post-9/11 authorization of force against terrorists gives the administration the right to circumvent FISA is equally specious, she argues. “FISA does provide for criminal penalties if surveillance is conducted under color of law ‘except as authorized by statute.’ This is a reference to either FISA or the criminal wiretap statute. A resolution, such as the Use of Force resolution, does not provide statutory authority. Moreover, FISA specifically provides for warrantless surveillance for up to 15 days after a declaration of war. Why would Congress include that provision if a mere Use of Force resolution could render FISA inapplicable? The law clearly states that the criminal wiretap statute and FISA are ‘the exclusive means by which electronic surveillance…and the interception of domestic wire, oral, and electronic communications may be conducted.’ If these authorities are exclusive, there is no other legal authority that can authorize warrantless surveillance. Courts generally will not view such a clear statutory statement as having been overruled by a later congressional action unless there is an equally clear indication that Congress intended to do that.” Therefore, by any legal standard, the administration’s program is, apparently, illegal.
No Inherent Presidential Authority - The ultimate argument by Bush officials, that the president has some sort of inherent authority as commander-in-chief to authorize illegal wiretaps, is the same groundless legal argument recently used to justify the use of torture by US intelligence and law enforcement agents (see December 28, 2001). That argument was withdrawn, Spaulding notes, after it became publicly known. While the courts have not specifically ruled on this particular argument, Spaulding notes that the Supreme Court refused to recognize then-President Harry Truman’s attempt to seize control of the nation’s steel mills to avert a possible strike during the Korean War. The Supreme Court ruled “that the president’s inherent authority is at its weakest in areas where Congress has already legislated. It ruled that to find inherent presidential authority when Congress has explicitly withheld that authority—as it has in FISA—‘is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between president and Congress.’” She notes that in 2004, the Supreme Court rejected the argument for unchecked presidential power in the Hamdi case (see June 28, 2004), with Justice Sandra Day O’Connor writing for the court, “We have long since made clear that a state of war is not a blank check for the president when it comes to the rights of the Nation’s citizens. …Whatever power the United States Constitution envisions for the Executive in its exchanges with… enemy organizations in times of conflict, it most assuredly envisions a role for all three branches when individual liberties are at stake.” Spaulding concludes, “The rule of law and our system of checks and balances are not a source of weakness or a luxury of peace. As O’Connor reminded us in Hamdi, ‘It is during our most challenging and uncertain moments…that we must preserve our commitment at home to the principles for which we fight abroad.’” [Washington Post, 12/25/2005]

Entity Tags: Sandra Day O’Connor, William Rehnquist, USA Patriot Act, Suzanne Spaulding, National Security Agency, US Supreme Court, Harry S. Truman, Alberto R. Gonzales, “Gang of Eight”, National Commission on Terrorism, Central Intelligence Agency, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Echelon, Bush administration (43)

Timeline Tags: Civil Liberties

The Justice Department opens an investigation into the leak of classified information about the Bush domestic surveillance program. The investigation focuses on disclosures to the New York Times about the secret warrantless wiretapping program conducted by the National Security Agency since shortly after the 9/11 attacks (see Early 2002). The White House claims that the Justice Department initiated the investigation on its own after receiving a request from the NSA, and that it was not even informed of the investigation until the decision had already been made. But White House spokesman Trent Duffy hails the investigation, and implicitly accuses the Times of aiding and abetting terrorists by printing its stories. “The leaking of classified information is a serious issue,” Duffy says. “The fact is that al-Qaeda’s playbook is not printed on Page One, and when America’s is, it has serious ramifications.” [Associated Press, 12/30/2005] President Bush fuels the attack on the Times when he says, “The fact that we’re discussing this program is helping the enemy.” [New York Times, 12/30/2005] Many outside of the administration have accused the wiretapping program, which functions without external oversight or court warrants, of being illegal, and Bush of breaking the law by authorizing it. Administration officials insist that Bush has the power to make such a decision, both under the Constitution’s war powers provision and under the post-9/11 Congressional authorization to use military force against terrorism, even though, as former Senate Majority Leader Tom Daschle recalls, Congress explicitly refused to give Bush the authority to take military action inside the US itself (see December 21-22, 2005). And, in a recent letter to the chairs of the House and Senate Intelligence Committees, the White House claimed that the nation’s security needs outweigh the needs of the citizenry to be secure from secret government surveillance. [Associated Press, 12/30/2005] Others disagree. The American Civil Liberties Union’s Anthony Romero says, “President Bush broke the law and lied to the American people when he unilaterally authorized secret wiretaps of US citizens. But rather than focus on this constitutional crisis, Attorney General [Alberto] Gonzales is cracking down on critics of his friend and boss. Our nation is strengthened, not weakened, by those whistle-blowers who are courageous enough to speak out on violations of the law.” And Marc Rotenberg, the executive director of the Electronic Privacy Information Center, says the NSA should be the focus of an investigation to determine if it broke federal surveillance laws. Tom Devine of the Government Accountability Project suggests a middle course. His group does not object to a limited investigation into the leak of classified information, but, he says, if the administration does “a blanket witch hunt, which I fear, it would trample all over good government laws” designed to protect government workers who expose wrongdoing. “The whole reason we have whistle-blower laws is so that government workers can act as the public’s eyes and ears to expose illegality or abuse of power.” [New York Times, 12/30/2005] Ultimately, this leak investigation may not achieve much, according to law professor Carl Tobias. “It doesn’t seem to me that this leak investigation will take on the importance of the Plame case,” Tobias says. “The bigger story here is still the one about domestic spying and whether the president intends, as he said, to continue doing it.” [Washington Post, 12/31/2005]

Entity Tags: Anthony D. Romero, Tom Devine, Trent Duffy, American Civil Liberties Union, Al-Qaeda, Tom Daschle, Senate Intelligence Committee, US Department of Justice, National Security Agency, Carl Tobias, Electronic Privacy Information Center, Alberto R. Gonzales, New York Times, Government Accountability Project, George W. Bush, Marc Rotenberg, House Intelligence Committee

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see July 7, 2009 and May 2004), angered by the Bush administration’s counterattack against government and media members who have helped to expose its warrantless wiretapping operation (see December 15-31, 2005), decides to go public with a memo he wrote about his own knowledge of the collusion between AT&T and the National Security Agency (NSA) in eavesdropping on American citizens’ communications (see January 16, 2004). He updates the memo with a brief preface, selects eight pages of the 121 pages of AT&T documentation he possesses which he believes gives a good overview of the NSA’s surveillance equipment installation, and includes the two photographs he has taken of the NSA’s “secret room” at the AT&T facility in San Francisco and the Internet research he has done on the Narus STA 6400 equipment the NSA is using to sort the communications being captured and recorded (see Late 2003). Instead of entrusting his newly refurbished memo to the Internet, he uses the PGP (Pretty Good Privacy) security protocol for anticipated dissemination, burns the data onto a CD, and begins searching online for civil liberties groups that might be interested in his work. [Wired News, 5/17/2006; Klein, 2009, pp. 53-55]

Entity Tags: AT&T, National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales testifies before the Senate Judiciary Committee that the new “reasonable belief” standard for wiretaps is just another term for “probable cause.” Gonzales’s claim is legally false. The difference between the two standards is significant: while administration officials must present relatively compelling evidence that a US citizen has ties to US-designated terrorist organizations or is involved in terror plots to meet the “probable cause” standard for authorizing electronic surveillance, the “reasonable belief” standard is far more lenient. Gonzales also repeats for the committee President Bush’s claims that the Foreign Intelligence Surveillance Court (FISC) isn’t “agile” or “nimble” enough to assist the Justice Department and the US intelligence community in finding and arresting terrorists, a claim that FISC judges find baffling. FISC routinely approves almost all warrant requests, and FISA allows the government to conduct surveillance for 72 hours before even applying for a warrant. Additionally, FISC has consistently worked with the government to expedite requests and streamline the warrant-issuance procedure. For example, in March 2002, when the FBI and Pakistani police arrested al-Qaeda operative Abu Zubaida, agents found that almost all of Zubaida’s contacts were already being monitored under FISA warrants or through international surveillance efforts (see March 28, 2002). One government official says that the Zubaida discovery gave them “some comfort” that surveillance efforts were working as needed. [Washington Post, 2/9/2006]

Entity Tags: Foreign Intelligence Surveillance Court, Abu Zubaida, Al-Qaeda, Alberto R. Gonzales, US Department of Justice, Senate Judiciary Committee

Timeline Tags: Civil Liberties

Vice President Cheney mentioned NSA intercepts of the 9/11 hijackers’ calls in a speech to the Heritage Foundation.Vice President Cheney mentioned NSA intercepts of the 9/11 hijackers’ calls in a speech to the Heritage Foundation. [Source: David Bohrer / White House]Vice President Dick Cheney uses calls between the 9/11 hijackers in the US and an al-Qaeda communications hub in Yemen that were intercepted by the NSA (see Early 2000-Summer 2001) to justify the NSA’s warrantless wiretapping program (see December 15, 2005). Cheney points out that, “There are no communications more important to the safety of the United States than those related to al-Qaeda that have one end in the United States,” and says that if the NSA’s warrantless program had been implemented before 9/11, “we might have been able to pick up on two hijackers [Nawaf Alhazmi and Khalid Almihdhar] who subsequently flew a jet into the Pentagon.” He adds: “They were in the United States, communicating with al-Qaeda associates overseas. But we did not know they were here plotting until it was too late.” [White House, 1/4/2006] Other administration officials make similar claims about the calls by Almihdhar and Alhazmi in the years after the program is revealed by the New York Times (see December 17, 2005).

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi, Richard (“Dick”) Cheney

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

President Bush’s rationale for authorizing warrantless surveillance against US citizens is of questionable legality and “may represent an exercise of presidential power at its lowest ebb,” according to a Congressional analysis. The Congressional Research Service (CRS), the independent and nonpartisan research bureau of the legislature, answers the question raised around the nation since the revelation of the secret program by the New York Times (see Early 2002): did Bush break the law when he ordered the National Security Agency to eavesdrop on US citizens without court orders or judicial oversight? The CRS report does not give a definitive yes or no answer to that question, but finds Bush’s legal rationale dubious at best. That rationale “does not seem to be as well-grounded” as administration lawyers have claimed, and the report finds that, despite assertions to the contrary by Bush and administration officials, Congress did not authorize warrantless wiretaps when it gave the executive branch the authority to wage war against al-Qaeda in the days after the 9/11 attacks. Unsurprisingly, Bush administration officials criticize the report. But some Republicans and Democrats find the report’s conclusions persuasive, and hold up the report as further evidence that Bush overextended his authority by authorizing the wiretaps. For instance, Republican Thomas Kean, the former chairman of the 9/11 commission (see January 27, 2003, says he doubts the program’s legality. Kean, who has not spoken publicly about the program until now, says the 9/11 commission was never told about the program, and he strongly doubts its legality. “We live by a system of checks and balances, and I think we ought to continue to live by a system of checks and balances,” Kean says. [Congressional Research Service, 1/5/2006 pdf file; New York Times, 1/6/2006]

Entity Tags: George W. Bush, 9/11 Commission, Congressional Research Service, New York Times, National Security Agency, Thomas Kean

Timeline Tags: Civil Liberties

John Yoo’s ‘The Powers of War and Peace.’John Yoo’s ‘The Powers of War and Peace.’ [Source: University of Maryland]Libertarian law professor Cass Sunstein reviews a recent book by former Bush legal adviser John Yoo, who authored several of the Bush administration’s most controversial legal opinions concerning terrorism and executive power (see September 21, 2001, September 25, 2001, September 25, 2001, October 4, 2001, October 23, 2001, October 23, 2001, November 2, 2001, November 6-10, 2001, November 15, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24, 2002, January 24-26, 2002, March 13, 2002, April 8, 2002, June 27, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and October 11, 2002). Yoo’s book, The Powers of War and Peace: The Constitution and Foreign Affairs After 9/11, is a compendium of his pre-9/11 academic writings that landed him his job at the Justice Department’s Office of Legal Counsel. Sunstein notes that Yoo, perhaps more than any other single legal scholar, has reshaped the government’s legal stance on any number of issues. He argued for the president’s unilateral ability to declare war without the approval of Congress, the use of “enhanced interrogation techniques” on suspected terrorists, the withdrawal of essential civil liberties and legal rights from suspected terrorists and enemy collaborators, the right of the administration to electronically eavesdrop on the American citizenry without judicial consent or oversight, the ability to ignore or withdraw from international treaties without congressional approval, and more besides. Sunstein writes: “[T]aken as a whole, the claims of the Bush administration may be properly regarded as an effort to create a distinctive set of constitutional understandings for the post-September 11 era. The White House is attempting to create a kind of 9/11 Constitution. A defining feature of these understandings is a strong commitment to inherent presidential authority over national security, including a belief that in crucial domains the president can act without congressional permission, and indeed cannot be checked by congressional prohibitions.” Yoo is a key figure in that effort. Sunstein calls his work interesting but completely one-sided, simply ignoring “the mountainous counter-evidence” against most of his constitutional claims. “Yoo’s reading would require us to ignore far too many statements by prominent figures in the founding generation,” Sunstein writes. “There are not many issues on which James Madison, Thomas Jefferson, John Marshall, Alexander Hamilton, George Washington, James Wilson, John Adams, and Pierce Butler can be said to agree. Were all of them wrong?” Sunstein concludes: “[W]ith respect to war, there is no reason for a 9/11 Constitution. The old one, read in the light of our traditions, will do just fine.” [New Republic, 1/9/2006; Savage, 2007, pp. 81-82]

Entity Tags: Bush administration (43), Office of Legal Counsel (DOJ), John C. Yoo, Cass Sunstein

Timeline Tags: Civil Liberties

Russell Tice.Russell Tice. [Source: ABC News]Former National Security Agency (NSA) official Russell Tice says that many of the wiretapping operations he once helped run were illegal. “I specialized in what’s called special access programs,” Tice tells ABC News. “We called them ‘black world’ programs and operations.” Tice is ready to testify before Congress about what he calls the illegal wrongdoings that are part of the Defense Department and the NSA’s wiretapping programs enacted after the 9/11 attacks. Many of these programs were targeted at innocent US citizens. “The mentality was we need to get these guys, and we’re going to do whatever it takes to get them,” he says. The technology used to track and sort through every domestic and international telephone center is impressive. “If you picked the word ‘jihad’ out of a conversation, the technology exists that you focus in on that conversation, and you pull it out of the system for processing.” Intelligence analysts use the information to develop graphs that resemble spiderwebs linking one suspect’s phone number to hundreds or even thousands more. While the president has admitted giving orders that allowed the NSA to eavesdrop on a small number of Americans without warrants, Tice says says the number of Americans subject to eavesdropping by the NSA could be in the millions if the full range of secret NSA programs is used. “That would mean for most Americans that if they conducted, or you know, placed an overseas communication, more than likely they were sucked into that vacuum.” Tice has been subjected to what appears to be bureaucratic punishment for his willingness to blow the whistle on the nation’s warrantless wiretapping programs; last year the NSA revoked his security clearance based on what it calls "psychological concerns," and later fired him. Tice says that is the way the NSA often deals with employees it considers troublemakers and whistleblowers (see January 25-26, 2006). [ABC News, 1/10/2006; ABC, 1/10/2006]

Entity Tags: US Department of Defense, National Security Agency, Russell Tice

Timeline Tags: Civil Liberties

After Human Rights Watch, an organization which works to end torture of government detainees around the globe, claims that the Bush administration has made a “deliberate policy choice” to abuse detainees at Guantanamo Bay, Defense Secretary Donald Rumsfeld says, “What took place at Guantanamo is a matter of public record today, and the investigations turned up nothing that suggested that there was any policy in the department other than humane treatment.” In 2002, President Bush declared that detainees in US custody should be treated “humanely, and to the extent appropriate and consistent with military necessity, in a manner consistent with the principles” of the Geneva Conventions (see January 19, 2002). Shortly after Rumsfeld’s statement, White House press secretary Scott McClellan says that Human Rights Watch has damaged its own credibility by making such claims. [New Yorker, 2/27/2006]

Entity Tags: Donald Rumsfeld, Bush administration (43), Human Rights Watch, Scott McClellan, George W. Bush, Geneva Conventions

Timeline Tags: Torture of US Captives, Civil Liberties

It had been widely reported that the Saudi government began to crack down seriously on al-Qaeda and other radical militants after a 2003 al-Qaeda attack in Saudi Arabia (see May 12, 2003). However, the Los Angeles Times reports that US officials now claim that is not true. While Saudis have been very aggressive and cooperative in cracking down on militants within Saudi Arabia since that attack, they have done little outside the country. Millions of dollars continue to flow from wealthy Saudis through charity fronts to al-Qaeda and other suspected groups, and the Saudi government is doing next to nothing about it. In 2004, the Saudis promised to set up a government commission to police such groups, but they have yet to do so. The Saudi government has also done little to rein in influential radical religious leaders who openly encourage their followers to attack US interests in Iraq and elsewhere in the world. US officials claim that at least five organizations, including the Muslim World League (MWL), the International Islamic Relief Organization (IIRO), and the World Assembly of Muslim Youth (WML), “are headquartered in Saudi Arabia but continue to engage in highly suspect activity overseas.” A senior US counterterrorism official says that some known terrorist financiers continue to “operate and live comfortably in Saudi Arabia” despite US objections. [Los Angeles Times, 1/15/2006]

Entity Tags: Saudi Arabia, International Islamic Relief Organization, Muslim World League, World Assembly of Muslim Youth

Timeline Tags: Complete 911 Timeline

Al Gore speaks to the Liberty Coalition and the American Constitution Society.Al Gore speaks to the Liberty Coalition and the American Constitution Society. [Source: American Constitution Society]Former Vice President Al Gore delivers a long, impassioned speech on civil liberties and constitutional issues to the Liberty Coalition and the American Constitution Society. Gore joins former Representative Bob Barr (R-GA) in speaking out against the Bush administration’s infringement on American civil liberties. Gore and Barr have what Gore calls a “shared concern that America’s Constitution is in grave danger.”
Patently Illegal Domestic Surveillance - Gore’s speech is sparked by recent revelations that the NSA has been spying on American citizens for years (see December 15, 2005), and in response, the administration “has brazenly declared that it has the unilateral right to continue without regard to the established law enacted by Congress precisely to prevent such abuses.” As the Foreign Intelligence and Surveillance Act (FISA) is perfectly sufficient, there was no need for the Bush administration to circumvent that law. “At present, we still have much to learn about the NSA’s domestic surveillance,” Gore says. “What we do know about this pervasive wiretapping virtually compels the conclusion that the president of the United States has been breaking the law, repeatedly and insistently. A president who breaks the law is a threat to the very structure of our government.” Gore says he agrees with Bush on the threat of terrorism, but disagrees that the US has to “break the law or sacrifice our system of government” to protect itself, as this will make it “weaker and more vulnerable.” In addition, he says, “once violated, the rule of law is itself in danger,” and, “Unless stopped, lawlessness grows, the greater the power of the executive grows, the more difficult it becomes for the other branches to perform their constitutional roles.” It is patently obvious that the Bush administration has broken the law in conducting and approving its warrantless wiretaps, Gore says, regardless of what arguments and defenses administration officials may put forth (see September 12-18, 2001 and Early 2002). So, Gore says, “When President Bush failed to convince Congress to give him the power he wanted when this measure was passed, he secretly assumed that power anyway, as if Congressional authorization was a useless bother. But as [Supreme Court] Justice [Felix] Frankfurter once wrote, ‘To find authority so explicitly withheld is not merely to disregard in a particular instance the clear will of Congress. It is to disrespect the whole legislative process and the constitutional division of authority between the president and the Congress.‘… And the disrespect embodied in these apparent mass violations of the law is part of a larger pattern of seeming indifference to the Constitution that is deeply troubling to millions of Americans in both political parties.”
Illegal Seizure of American Citizens - Gore notes that Bush has declared that he has “a heretofore unrecognized inherent power to seize and imprison any American citizen that he alone determines to be a threat to our nation, and that notwithstanding his American citizenship that person in prison has no right to talk with a lawyer, even if he wants to argue that the president or his appointees have made a mistake and imprisoned the wrong person” (see November 13, 2001 and March 5, 2002). He says: “The president claims that he can imprison that American citizen—any American citizen he chooses—indefinitely, for the rest of his life, without even an arrest warrant, without notifying them of what charges have been filed against them, without even informing their families that they have been imprisoned.” Gore then says: “No such right exists in the America that you and I know and love. It is foreign to our Constitution. It must be rejected.”
Specious Authority to Torture - Neither does the executive branch have the right to authorize torture, Gore says. After citing horrific examples from Guantanamo and Abu Ghraib, he calls it “a shameful exercise of power that overturns a set of principles that you’re nation has observed since General George Washington first enunciated them during our Revolutionary War. They have been observed by every president since then until now. They violate the Geneva Conventions, the International Convention Against Torture, and our own laws against torture.”
Unlawful Kidnapping of Foreign Citizens - The president has no right to have foreign citizens kidnapped from their homes and brought to the US for interrogation and imprisonment, or worse, delivered to other nations for harsh interrogations and torture, says Gore. The closest allies of the US have been shocked by such claims.
No Restraint in the Constitution? - Gore asks whether the president really has such powers under the Constitution and, if so, “are there any acts that can on their face be prohibited?” He quotes the dean of Yale’s law school, Harold Koh, who said, “If the president has commander in chief power to commit torture, he has the power to commit genocide, to sanction slavery, to promote apartheid, to license summary execution.” Gore is “deeply troubl[ed]” that “our normal American safeguards have thus far failed to contain this unprecedented expansion of executive power.” He cites the numerous usage of “signing statements” by Bush that signal his intent “not to comply” with particular legislation (see December 30, 2005). When the Supreme Court struck down Bush’s indefinite detention of “enemy combatants” (see June 28, 2004), “the president then engaged in legal maneuvers designed to prevent the court from providing any meaningful content to the rights of the citizens affected.”
Historical Cycles - Since the founding of America, Gore says, the country has abrogated its citizens’ rights in one circumstance or another, and cites numerous examples. But those abrogations were always rectified to some degree in a repeated cycle of what he calls “excess and regret.” Gore is worried that the country may not be in such a cycle now. Instead, he says, the US may be on a path to permanent, state-sanctioned authoritarianism, with the constitutional safeguards American citizens have come to expect eroded and undermined to the point of irretrievability. Gore specifically cites the administration’s support for the so-called “unitary executive” theory of government, which he says “ought to be more accurately described as the unilateral executive.” That theory “threatens to expand the president’s powers until the contours of the Constitution that the framers actually gave us become obliterated beyond all recognition.”
Stark Authoritarianism - Why are Bush and his top officials doing this? Gore says that “[t]he common denominator seems to be based on an instinct to intimidate and control. The same pattern has characterized the effort to silence dissenting views within the executive branch, to censor information that may be inconsistent with its stated ideological goals, and to demand conformity from all executive branch employees.” Gore continues: “Intellectually, it is possible to carry on this process for an indefinite time. The only check on it is that, sooner or later, a false belief bumps up against solid reality, usually on a battlefield. Two thousand two hundred American soldiers have lost their lives as this false belief bumped into a solid reality.”
Gutting Congress - Though serious damage has been done to the judicial branch, Gore acknowledges, “the most serious damage in our constitutional framework has been to the legislative branch. The sharp decline of Congressional power and autonomy in recent years has been almost as shocking as the efforts by the executive to attain this massive expansion of its power.… [T]he legislative branch of government as a whole, under its current leadership, now operates as if it were entirely subservient to the executive branch.… [T]he whole process is largely controlled by the incumbent president and his political organization” (see February 1, 2004). Gore says each member of Congress, Republican and Democrat, must “uphold your oath of office and defend the Constitution. Stop going along to get along. Start acting like the independent and co-equal branch of American government that you are supposed to be under the Constitution of our country.”
We the People - The American people still, for the moment, have the power to enforce the Constitution, Gore says, quoting former President Dwight Eisenhower, who said, “Any who act as if freedom’s defenses are to be found in suppression and suspicion and fear confess a doctrine that is alien to America.” Gore continues: “Fear drives out reason. Fear suppresses the politics of discourse and opens the door to the politics of destruction.… The founders of our country faced dire threats. If they failed in their endeavors, they would have been hung as traitors. The very existence of our country was at risk. Yet in the teeth of those dangers, they insisted on establishing the full Bill of Rights. Is our Congress today in more danger than were their predecessors when the British army was marching on the Capitol? Is the world more dangerous than when we faced an ideological enemy with tens of thousands of nuclear missiles ready to be launched on a moment’s notice to completely annihilate the country?” [Congressional Quarterly, 1/16/2006; American Constitutional Society, 1/16/2006]

Entity Tags: National Security Agency, Liberty Coalition, US Supreme Court, Harold Koh, George W. Bush, Albert Arnold (“Al”) Gore, Jr., American Constitution Society, Bush administration (43), Convention Against Torture, Felix Frankfurter, George Washington, Geneva Conventions, Foreign Intelligence Surveillance Act, Robert “Bob” Barr

Timeline Tags: Civil Liberties

Journalist and columnist Joshua Micah Marshall says of former Vice President Al Gore’s speech on civil liberties the previous day (see January 16, 2006): “The point Gore makes in his speech that I think is most key is the connection between authoritarianism, official secrecy, and incompetence. The president’s critics are always accusing him of law-breaking or unconstitutional acts and then also berating the incompetence of his governance. And it’s often treated as, well… he’s power-hungry and incompetent to boot! Imagine that! The point though is that they are directly connected. Authoritarianism and secrecy breed incompetence; the two feed on each other. It’s a vicious cycle. Governments with authoritarian tendencies point to what is in fact their own incompetence as the rationale for giving them yet more power.… The basic structure of our Republic really is in danger from a president who militantly insists that he is above the law.” [Dean, 2006, pp. 170-171; Talking Points Memo, 1/17/2006]

Entity Tags: Albert Arnold (“Al”) Gore, Jr., George W. Bush, Joshua Micah Marshall

Timeline Tags: Civil Liberties

A memo from the nonpartisan Congressional Research Service (CRS) finds that President Bush appears to be in violation of the National Security Act of 1947 in his practice of briefing only select members of Congress on the National Security Agency’s warrantless wiretapping program. Bush has provided only limited briefings to the so-called “Gang of Eight,” the four Congressional leaders and the four ranking members of the House and Senate Intelligence Committees. But the 1947 law requires the US intelligence community to brief the full membership of both committees on the program. The memo is the result of a request by Representative Jane Harman (D-CA), who wrote Bush a letter saying that she believes he is required under the Act to brief both committees, and not just the Gang of Eight (see January 4, 2006). The White House claims that it has briefed Congressional leaders about the program over a dozen times, but refuses to provide details; the Congressional members so briefed are forbidden by law to discuss the content or nature of those classified briefings, even with their own staff members. “We believe that Congress was appropriately briefed,” says White House spokeswoman Dana Perino. The CRS agrees with Harman that the single exception to such full briefings under the law, covert actions taken under extraordinary threats to national security, is not applicable in this instance. Unless the White House contends the program is a covert action, the memo says, “limiting congressional notification of the NSA program to the Gang of Eight…would appear to be inconsistent with the law.” [US House of Representatives, 1/4/2006; Congressional Research Service, 1/18/2006 pdf file; Washington Post, 1/19/2006] The day after the CRS memo is released, Senate Democrats John D. Rockefeller (D-WV) and Harry Reid (D-NV), along with House Minority Leader Nancy Pelosi (D-CA) and Harman, the ranking member of the House Intelligence Committee, write to Vice President Dick Cheney demanding that the full committees be briefed on such intelligence matters in the future. [Washington Post, 1/20/2006] On February 9, Bush will allow Attorney General Alberto Gonzales and former NSA chief Michael Hayden to brief the full House Intelligence Committee on the program (see February 8-17, 2006).

Entity Tags: Jane Harman, John D. Rockefeller, National Security Agency, National Security Act, Richard (“Dick”) Cheney, Michael Hayden, House Intelligence Committee, George W. Bush, Dana Perino, “Gang of Eight”, Alberto R. Gonzales, Harry Reid, Congressional Research Service, Bush administration (43)

Timeline Tags: Civil Liberties

The Justice Department (DOJ) issues a 42-page “white paper” detailing its arguments that the National Security Agency’s warrantless wiretapping program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006) is legal. The DOJ reiterates two previous arguments (see December 19, 2005 and December 21-22, 2005)—that Congress implicitly authorized the program in 2001 when it authorized the Bush administration to begin military actions against al-Qaeda (see September 14-18, 2001), and that the president has the authority as commander in chief to conduct such a program—even though these arguments have been thoroughly refuted (see January 9, 2006) and overridden by the Supreme Court’s recent Hamdan v. Rumsfeld ruling (see December 15, 2005 and July 8, 2006). In its paper, the DOJ declares that if necessary, it will attack the legality of the Foreign Intelligence Surveillance Act (FISA) in order to stop that law from “imped[ing]” the president’s power to order domestic surveillance. In essence, according to columnist and civil liberties lawyer Glenn Greenwald, the DOJ is asserting that the president’s powers are limitless as long as he or she declares a given action necessary to battle terrorism. “Because the president has determined that the NSA activities are necessary to the defense of the United States from a subsequent terrorist attack in the armed conflict with al-Qaeda, FISA would impermissibly interfere with the president’s most solemn constitutional obligation—to defend the United States against foreign attack,” the DOJ claims. Neither Congress nor the court system has the right to limit or even review the president’s powers, according to the DOJ. Greenwald calls the DOJ’s argument “a naked theory of limitless presidential power.” In fact, Greenwald argues, the DOJ is asserting that FISA itself is unconstitutional, because no law can in any way limit the president’s power to conduct foreign policy or protect the nation’s security. The document is part of a larger Bush administration defense of the USA Patriot Act, and part of the administration’s push to convince Congress to reauthorize that legislation. Attorney General Alberto Gonzales sends the document to Congress. Justice Department official Steven Bradbury says, “When it comes to responding to external threats to the country… the government would like to have a single executive who could act nimbly and agilely.” [US Department of Justice, 1/19/2006 pdf file; Glenn Greenwald, 1/20/2006; Washington Post, 1/20/2006]
Dubious Legality - The program has already been found to be of questionable legality by two reports recently released by the nonpartisan Congressional Research Service (see January 5, 2006 and January 18, 2006). And author James Bamford, a US intelligence expert who has written extensively about the NSA, says that the Justice Department’s arguments are specious in light of Congress’s clear intent in its 1978 passage of FISA to block warrantless wiretapping, and its demonstrated lack of intent to allow any such operations within US borders in the October 2001 legislation. “You could review the entire legislative history in the authorization to use military force and I guarantee you won’t find one word about electronic surveillance,” he says. “If you review the legislative history of FISA, you will find Attorney General Griffin Bell testifying before the intelligence committee saying this was specifically passed to prevent a president from claiming inherent presidential powers to do this again.” [Washington Post, 1/20/2006]
Self-Contradictory Justifications - In 2007, author and reporter Charlie Savage will write of the “shaky foundation” supporting the administration’s “two-pronged attacks on critics of the wiretapping program and the Patriot Act,” which some officials have claimed authorizes the program. “Beneath the simplistic rhetoric, the administration’s position was self-contradicting,” Savage will write. If Bush has the inherent presidential authority to order warrantless wiretapping, then he needs no authorization from the Patriot Act or any other legislation. But if Congress is endangering the nation by delaying in reauthorizing the Patriot Act and thusly not rendering the program legal, then the wiretapping program is illegal after all. The memo attempts to “paper… over” this problem by claiming that, while Bush has the inherent authority to do whatever he feels is necessary to protect the country, the Patriot Act’s extra police powers are still necessary in “contexts unrelated to terrorism.” Savage will write, “In other words, the administration’s own position, hidden in the fine print, was that the Patriot Act was superfluous and irrelevant to the war on terrorism—a somewhat absurd stance made necessary by their desire to say the wiretapping program was legal.” [Savage, 2007, pp. 315]
Failure to Address Probable Beginning of Program Before Attacks - The Justice Department says nothing about the program apparently beginning well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, James Bamford, Steven Bradbury, US Department of Justice, Griffin Bell, Senate Judiciary Committee, Glenn Greenwald, Foreign Intelligence Surveillance Act, Alberto R. Gonzales, Arlen Specter, George W. Bush, Congressional Research Service, Charlie Savage

Timeline Tags: Civil Liberties

President Bush’s top political adviser, deputy White House chief of staff Karl Rove, tells a meeting of the Republican National Committee that the warrantless wiretapping controversy (see December 15, 2005 and December 18, 2005) can be used to boost Republicans’ election chances in the 2006 midterm elections. Republicans should emphasize that the wiretapping proves that Bush is willing to do whatever it takes to defeat terrorism and keep Americans safe. Critics of the program, therefore, can be painted as weak on terrorism. “The United States faces a ruthless enemy, and we need a commander in chief and a Congress who understand the nature of the threat and the gravity of the moment America finds itself in,” Rove says. “President Bush and the Republican Party do; unfortunately, the same cannot be said of many Democrats.… Let me be clear as I can be: President Bush believes if al-Qaeda is calling somebody in America, it is in our national security interests to know who they’re calling and why. Some important Democrats clearly disagree.” [WIS-TV, 1/20/2006; Savage, 2007, pp. 203]

Entity Tags: George W. Bush, Democratic Party, Republican Party, Republican National Committee, Karl C. Rove

Timeline Tags: Civil Liberties

In a public speech, former National Security Agency chief Michael Hayden claims that everything the NSA does is with authorization from the White House, specifically the warrantless wiretapping program that spies on US citizens (see Early 2002). “I didn’t craft the authorization,” he says. “I am responding to a lawful order.” Hayden claims that while the NSA continues to use court warrants from the Foreign Intelligence Surveillance Court (FISC), technological advances and terrorist threats have made the law that created and supports FISC, the Foreign Intelligence Surveillance Act of 1978 (see 1978), obsolete. Therefore, the NSA has carried out domestic surveillance operations with or without FISC warrants. Hayden says the warrantless surveillance operations are “operationally more relevant, operationally more effective” than anything FISA can handle. Hayden repeatedly denies, in the face of reams of evidence collected by journalists and others to the contrary, that the NSA is spying on domestic antiwar groups and religious organizations like the Quakers who publicly advocate nonviolence and peace. [Michael Hayden, 1/23/2006]

Entity Tags: Foreign Intelligence Surveillance Court, Al-Qaeda, Foreign Intelligence Surveillance Act, Religious Society of Friends (Quakers), Terrorist Surveillance Program, National Press Club, Bush administration (43), National Security Agency, Michael Hayden, George W. Bush

Timeline Tags: Civil Liberties

Current and former National Security Agency (NSA) employees say that the agency often retaliates against whistleblowers by labeling them “delusional,” “paranoid,” or “psychotic.” They say such labeling protects powerful superiors who might be incriminated by potentially criminal evidence provided by such whistleblowers, and helps to keep employees in line through fear and intimidation. One NSA whistleblower, former intelligence analyst Russell Tice, is currently the victim of such agency allegations. Tice, along with three other former analysts, Diane Ring, Thomas Reinbold, and another analyst who wishes to remain anonymous, make the allegations of unfounded psychological labeling by the agency; their allegations are corroborated by a current NSA officer who also wishes to remain anonymous. [Cybercast News Service, 1/25/2006]
Identifying a Potential Spy - Tice, a former signals intelligence (SIGINT) officer, is the first NSA whistleblower to capture the media’s attention, when in 2004, the Pentagon investigated possible NSA retaliation against him. In 2001, Tice reported that a co-worker at the Pentagon’s Defense Intelligence Agency (DIA) was possibly engaged in espionage for China, possibly connected to California Republican official and Chinese double agent Katrina Leung. [Democracy Now!, 1/3/2006; Cybercast News Service, 1/25/2006] Tice says, “I saw all the classic signs” in the DIA employee. After transferring to the NSA in November 2002, he reported his concerns again, this time adding criticisms of incompetence for the FBI, who in Tice’s view failed to properly investigate his allegations. Instead, Tice was ordered by NSA Security to undergo psychiatric evaluation. He was labeled “paranoid” and “psychotic” by NSA forensic psychologist Dr. John Michael Schmidt; Tice lost his top-secret security clearance as a result. [Cybercast News Service, 1/25/2006]
Fired - He was fired from the NSA in 2005 after spending his last years at the agency pumping gas and working in an agency warehouse. “I reported my suspicion and got blown off,” he says. “I pushed the issue and that ticked them off, the fact that I questioned their almighty wisdom.” [Cox News Service, 5/5/2005] Tice again made news on January 10, 2006 (see January 10, 2006), when he admitted to being a source for the New York Times’s article about a secret NSA electronic surveillance program against American citizens, a program carried out in the name of combating terrrorism. [ABC News, 1/10/2006]
No Evidence of Mental Instability - As for Tice’s own psychological evaluation by Schmidt, according to three other clinical psychologists, there is “no evidence” of either of the disorders in Tice’s mental makeup. And another NSA psychologist pronounced Tice mentally sound in 2002, though having a “somewhat rigid approach to situations.” Tice is described by five retired NSA and intelligence officials as “congenial,” “enthusiastic,” and “a scholar of high intellectual rigor [with] sound judgment [and] unparalleled professionalism.” Tice says of the NSA’s attempts to smear whistleblowers with apparently baseless psychological allegations, “This nonsense has to stop. It’s like Soviet-era torture. These people are vicious and sadistic. They’re destroying the lives of good people, and defrauding the public of good analysts and linguists.” But it has been effective in cowing others who were, in Tice’s words, “too afraid or ashamed to come forward.” [Cybercast News Service, 1/25/2006]
Further Allegations - Another former analyst, now employed by another federal agency and who only allows himself to be identified as “J,” describes similar targeting by the NSA. J is fluent in an unusually high number of languages, and is described by former colleagues as “brilliant” and possessed of “amazing” critical skills. “I believe the abuse is very widespread,” J says. “The targeted person suddenly is described as ‘not being a team player,’ as ‘disgruntled,’ and then they’re accused of all sorts of bizarre things. Soon they’re sent to the psych people.” J himself was targeted in September 1993 (see September 11, 1993) when he and other analysts concluded that the United States was being targeted by Islamic terrorists, and then again in early 2001 after predicting a terrorist attack using planes as weapons (see May 2001).
NSA Like the 'Gestapo' - A third whistleblower, a current NSA officer who refuses to be identified, confirms the allegations and says that baseless psychiatric allegations as a form of retaliation are “commonplace” at the agency. He says, “A lot of people who work there are going through the same thing. People live in fear here. They run it like some kind of Gestapo.” Those identified as “problems” are “yelled at, badgered and abused.…These are really good people, who start to be labeled crazy, but they’re telling the truth.” The official adds that the NSA often plants false evidence in personnel files as part of the intimidation campaign. Tice says the NSA maintains what he calls a “dirt database” of inconsequential but potentially embarrassing information on employees, gathered during routine clearance investigations and used as a form of leverage. The current officer says that an “underground network” has developed to discuss these issues. “It’s like the Nazis have taken over,” he says. [Cybercast News Service, 1/25/2006]
Personal Vendettas - Diane Ring is another former NSA official targeted by her superiors. Unlike Tice, a self-described conservative who believes President Bush should be impeached over the NSA’s illegal wiretapping program, Ring is a Bush supporter who believes the surveillance program is entirely proper. Ring, a former NSA computer scientist, says she was ordered to undergo psychiatric evaluations after coming into conflict with a colonel at the Pentagon. Ring is not a whistleblower per se like the others, but says she was targeted for retaliation because of a personal vendetta against her. The colonel “blew up” at Ring after she missed a meeting and explained that her branch chief had her working on a classified program that took priority over the meeting. Ring also was evaluated by Dr. Schmidt. When she complained about the apparent retaliation, her security clearance was, like Tice’s, revoked, and she was “red-badged,” or put on restricted access within the NSA offices. Ring says she received an excellent job evaluation just three months prior to the actions taken against her. She says her colleagues at the time were told not to talk to her, and she was restricted to working in a room filled with other red-badgers. She thinks she was isolated as part of an intentional campaign to force her to leave the agency. “They had these red-badgers spread out all over the place.” she recalls. “Some were sent to pump gas in the motor pool and chauffeur people around. In our room, some people brought sleeping bags in and slept all day long. Others read. I would think that would incense the taxpaying public.” Schmidt eventually reported that another doctor diagnosed Ring with a “personality disorder,” but Ring has a July 21, 2005 letter from that doctor, Lawrence Breslau, which reads in part, “On mental status examination including cognitive assessment she performs extremely well.” In the letter, Breslau says he never made such a diagnosis. She, like others in her position, went to the NSA Employee Assistance Service (EAS) for confidential counseling, but the current NSA officer says that though those sessions are supposed to be confidential, NSA officials can and do obtain “confidential” sessions for retaliatory purposes. “Their goal is to freak you out, to get inside your mind,” that officer says. Rice claims that NSA General Counsel Paul Caminos lied about her case before a judge, denying that he had sent an internal e-mail forbidding anyone from supporting Ring. Ring says she was “floored” by Caminos’s actions: “I served in Bosnia. We had mines going off all around us, all day long. That was nothing compared to this.” She is currently working on clearing her name with the NSA’s new director, Lieutenant General Keith Alexander. Ring believes that the problem at NSA involves a small number of people, “The whole lot of them is corrupt though. There is zero integrity in the process. And zero accountability.”
'Psychiatric Abuse' 'Very Widespread' - Like his fellow whistleblowers, former NSA officer Thomas Reinbold says the practice of “psychiatric abuse” inside the NSA is “very widespread.” Reinbold, who recelved 26 commendations and awards during his career at the NSA, including a medal for the intelligence he provided during the 1991 Gulf War, says, “They call it ‘doing a mental’ on someone.” Such practices have a “chilling effect” on other potential whistleblowers: “They fear for their careers because they fear someone will write up bad [psychological] fitness reports on them.” Reinhold was labeled “paranoid” and “delusional” by Schmidt after he complained to an inspector general on February 25, 1994, that the federal government was guilty of contract tampering; Schmidt’s evaluation contradicts a psychological evaluation he conducted on Reinbold eight months before that found he was mentally sound. At the time, Reinbold worked as a contracting officer representative for the Naval Security Group (NAVSECGRU) in Virginia. Reinbold had his high-level security clearance revoked, and was escorted off the grounds by armed security officers. Reinbold says NSA officials fabricated evidence in his personnel file to force him out; that evidence included allegations that he was a danger to himself and others, and that he had said “if [he] was going down, [he] would take everyone with him.” In September 1995, an administrative hearing found that the revocation of Reinbold’s security clearance was unjustified and recommended restoring his clearance, but did not allow the damaging information to be removed from his personnel file. He later sued the agency, and then retired because of diabetes. “I gave 29 years of my life to the intelligence community,” he recalls. “They couldn’t get me out the door fast enough. There are very good people, getting screwed and going through hell.”
Helping Those Who Come After - Some of the whistleblowers hope to gain the assistance of politicians to help their cases. But Tice is less optimistic. “Our time is over,” Tice says he told Ring. “But we can make a difference for those who come behind us.” The five whistleblowers have the support of the whistleblower advocacy group Integrity International. Its founder and director, Dr. Don Soeken, himself a whistleblower while he was with the US Public Health Service in the 1970s, says, “When this retaliation first starts, there’s a tendency by bosses to use code words like ‘delusional,’ ‘paranoid’ and ‘disgruntled’. Then they use psychiatric exams to destroy them. They kill the messenger and hope the PR spin will be bought by the public.” Tom Devine of the Government Accountability Project says that “psychiatric retaliation” is a knee-jerk reaction against whistleblowers: “It’s a classic way to implement the first rule of retaliation: shift the spotlight from the message to the messenger. We call it the ‘Smokescreen Syndrome.’” Superiors investigate and smear the whistleblower for anything from financial irregularities to family problems, sexual practices, bad driving records, or even failure to return library books, Devine says. “It’s a form of abuse of power.” The Whistleblower Protection Act was written to protect those like Tice, Ring, Reinbold, and Soeken, but, says Beth Daly of the Project on Government Oversight (POGO), the act has serious flaws. “You have to go through the inspector general or the director of the CIA to let them know if you’re going to Congress and what you’re going to disclose,” she says. “And inspector generals are notorious for revealing who whistleblowers are.”

Entity Tags: Paul Caminos, Project for Government Oversight, Naval Security Group, Russell Tice, Tom Devine, Thomas Reinbold, National Security Agency, US Public Health Service, Keith Alexander, Lawrence Breslau, Diane Ring, Defense Intelligence Agency, Beth Daly, Don Soeken, House National Security Subcommittee, Government Accountability Project, John Michael Schmidt, Integrity International, “J”

Timeline Tags: Civil Liberties

Lewis Libby’s defense team files a motion with the US District Court to compel the discovery of documents and materials relating to a number of journalists in Libby’s upcoming trial (see January 20, 2006). The filing includes a request for the prosecution to turn over all the information it obtained from reporters about their confidential conversations with Bush administration sources in the course of its investigation. “There can be no information more material to the defense of a perjury case than information tending to show that the alleged false statements are, in fact, true or that they could be the result of mistake or confusion,” the lawyers argue. “Libby is entitled to know what the government knows.” After complaining that the prosecution has refused to provide numerous classified documents the defense has requested (see January 23, 2006), and reiterating its requests for a huge number of White House and CIA documents (see December 14, 2005), the motion asks that documents relating to NBC bureau chief Tim Russert (see July 10 or 11, 2003), Time reporter Matthew Cooper (see 11:00 a.m. July 11, 2003 and 2:24 p.m. July 12, 2003), New York Times reporter Judith Miller (see June 23, 2003, 8:30 a.m. July 8, 2003, and Late Afternoon, July 12, 2003), and Washington Post reporter Bob Woodward (see November 14, 2005) be released to the defense. The defense also indicates its interest in information about NBC’s Andrea Mitchell and the Post’s Walter Pincus. [Washington Post, 1/27/2006; New York Times, 1/27/2006; US District Court for the District of Columbia, 1/26/2009 pdf file] Washington lawyer Charles Tobin says that the Libby defense move was expected, and is a result of the prosecution’s aggressive insistence on deposing journalists and forcing them to reveal confidential sources. “I think we could have expected that, when the prosecutor went on a fishing expedition, that the fish he caught would want to look back in the pail,” Tobin says. “The more this case develops, the further we seem to be getting from the core issues of the indictment—and more into the business of journalism and how news gets put out in this town.” [Washington Post, 1/27/2006]

Entity Tags: Judith Miller, Andrea Mitchell, Bob Woodward, Charles Tobin, Tim Russert, Bush administration (43), Walter Pincus, Matthew Cooper, Lewis (“Scooter”) Libby

Timeline Tags: Domestic Propaganda, Niger Uranium and Plame Outing

Washington Post reporter William Arkin reveals that the National Security Agency (NSA) is “building a new warning hub and data warehouse” in Aurora, Colorado, just outside of Denver, on the grounds of Buckley Air Force Base. The agency is transferring many key personnel from its Fort Meade, Maryland, headquarters to Aurora. Arkin calls the new NSA facility, named the Aerospace Data Facility (ADF), “massive,” and says he believes it is the hub of the NSA’s data mining operation (see January 16, 2004). According to Government Executive magazine, the NSA’s new data storage facility “will be able to hold the electronic equivalent of the Library of Congress every two days.” While the NSA explains that the new facility is a cost-cutting measure and part of the agency’s post-9/11 decentralization—“This strategy better aligns support to national decision makers and combatant commanders,” an NSA spokesman tells one reporter—Arkin says that the “NSA is aligning its growing domestic eavesdropping operations—what the administration calls ‘terrorist warning’ in its current PR campaign—with military homeland defense organizations, as well as the CIA’s new domestic operations [in] Colorado.… Colorado is now the American epicenter for national domestic spying.” Arkin notes that previous news reports have said that the CIA is planning to move much of its domestic National Resources Division to Aurora as well. He also notes that Colorado is the home of the US military’s Northern Command (NORTHCOM), the military arm responsible for homeland defense. The move also allows the NSA to better coordinate its efforts with private contractors such as Lockheed Martin, Northrup Grumman Mission Systems, and Raytheon, all of which have presences in Colorado. Arkin names all three firms as partners with the NSA in building the ADF. Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Over months and years, the database would be huge, ready for data mining whenever the government wants to go after someone.” [Washington Post, 1/31/2006; Klein, 2009, pp. 40-41]

Entity Tags: National Security Agency, Aerospace Data Facility, Government Executive Magazine, Mark Klein, Northrup Grumman Mission Systems, William Arkin, Lockheed Martin Corporation, Raytheon, US Northern Command

Timeline Tags: Civil Liberties

Electronic Frontier Foundation logo.Electronic Frontier Foundation logo. [Source: Flickr.com]The Electronic Frontier Foundation (EFF), a civil liberties and privacy-advocacy organization, files a lawsuit against telecommunications giant AT&T for allegedly violating the law and the privacy of its citizens by cooperating with the National Security Agency in the NSA’s construction of what the EFF calls a “massive, illegal program to wiretap and data-mine Americans’ communications.” EFF lawyer Kevin Bankston says: “Our goal is to go after the people who are making the government’s illegal surveillance possible. They could not do what they are doing without the help of companies like AT&T. We want to make it clear to AT&T that it is not in their legal or economic interests to violate the law whenever the president asks them to.”
Unprecedented Access to Communications System - EFF alleges that as part of the NSA’s domestic spying program, AT&T has allowed the NSA direct access to the phone and Internet communications passing over its network, and has given the government “unfettered access to its over 300 terabyte ‘Daytona’ database of caller information—one of the largest databases in the world.” One of AT&T’s databases, nicknamed “Hawkeye,” contains 312 terabytes of data detailing nearly every telephone communication on AT&T’s domestic network since 2001, the lawsuit alleges. The suit goes on to claim that AT&T allowed the NSA to use the company’s powerful Daytona database management software to quickly search this and other communication databases. AT&T, the suit claims, is in violation of the First and Fourth Amendments, federal wiretapping statutes, telecommunications laws, and the Electronic Communications Privacy Act. The suit requests fines up to $22,000 for each AT&T customer, and punitive fines—damages that could potentially reach into the billions of dollars. The EFF lawsuit is one of over 30 lawsuits filed for similar reasons (see June 26, 2006). The lawsuit will survive a number of initial legal challenges by the Justice Department and AT&T, including AT&T’s contention that “whatever we did, the government told us to do” and therefore it should be immune from such lawsuits, and the Justice Department’s invocation of “national security” and the possibility of the revelation of “state secrets” (see March 9, 1953). EFF retorts, “In this country we follow the law, we don’t just follow orders.” Bankston tells a reporter, “If state secrecy can prevent us from preserving the rights of millions upon millions of people, then there is a profound problem with the law.”
Suit Alleges Criminal Actions, Does Not Challenge Government's Right to Wiretap - The lawsuit does not challenge the government’s right to electronically monitor legitimate terrorism suspects, nor does it challenge the judicial right to issue warrants for such surveillance. Rather, EFF writes: “Wiretaps on terrorists are allowed under the law, and this lawsuit is not challenging the wiretap laws. We have sued AT&T for breaking those laws—the telecommunications giant gave the government access to its communications switches and its huge databases of information on millions of ordinary Americans. These are AT&T customers who have not even been accused of affiliations with terrorists. Americans can be both safe and free: if the government truly believes it has cause to wiretap a suspect, it can order AT&T to provide information under FISA [the Foreign Intelligence Surveillance Act]—for up to 72 hours before going to the court. But AT&T has no business providing direct access to the communications of millions of ordinary Americans, without the checks and balances of Congress or the courts.” [Electronic Frontier Foundation, 1/31/2006; Wired News, 1/31/2006]

Entity Tags: Electronic Frontier Foundation, Foreign Intelligence Surveillance Act, National Security Agency, AT&T, US Department of Justice, Kevin Bankston

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group and a reporter to expose the collusion of AT&T and the National Security Agency in pushing the government’s illegal surveillance program (see Early January 2006 and January 23, 2006 and After), contacts the office of Senator Dianne Feinstein (D-CA) at the advice of Electronic Frontier Foundation lawyer Kevin Bankston. Klein talks to Feinstein’s chief attorney in Washington, DC, Steven Cash. Klein will later write: “I instinctively recoiled at the thought of trying to approach her as my memory of her record told me she was no friend of civil liberties, though she plays one on TV. My instinct was not wrong.” After an initial discussion with Cash, Klein emails him his packet of documentation (see December 31, 2005). On the afternoon of February 3, Cash calls Klein and says he is very interested in his story, though Feinstein’s staff rates the probability of the NSA performing illegal acts at somewhere around “50-50,” according to Klein. Cash promises to get back in touch with Klein on February 6, but fails to do so. Neither Klein nor his attorneys (see Early January 2006) are able to talk to anyone on Feinstein’s staff from here on. Klein later writes: “The silent message was unmistakable: the senator did not want to sully her political skirts by having contact with a whistleblower. And this was a foretaste of her behavior and voting for the next two and a half years. At every turn, she was there pushing for immunity for the telecom companies in the Senate Intelligence and Judiciary Committees; peddling her toothless restatement of the ‘exclusive means’ clause of FISA [the Foreign Intelligence Surveillance Act—see 1978] as a substitute for any confrontation with the president over ongoing illegal NSA spying; ushering former NSA Director Michael Hayden through his nomination for CIA director; and backing Michael Mukasey as a clone replacement for the resigning Attorney General [Alberto] Gonzales. Moreover, this ultimately turned out to be the attitude of virtually the entire Democratic Party leadership, not to mention the Republicans.” Klein will explain that FISA’s “exclusive means” clause states that FISA should be the “exclusive means” for the federal government to conduct surveillance. Congress’s duty under the law was, Klein will state, to enforce the law against President Bush, “who openly flouted the law.” Instead, Klein will claim, Feinstein uses the “exclusive means” clause to protect the Bush administration and the telecom firms. [Klein, 2009, pp. 57-60]

Entity Tags: Electronic Frontier Foundation, AT&T, Dianne Feinstein, Mark Klein, National Security Agency, Steven Cash, Kevin Bankston

Timeline Tags: Civil Liberties

The Justice Department’s Office of Professional Responsibility (OPR) opens an internal investigation into the department’s role in approving the Bush administration’s domestic warrantless wiretapping program. OPR counsel Marshall Jarrett informs Representative Maurice Hinchey (D-NY) of the investigation into the program, initiated after the 9/11 attacks by the National Security Agency and authorized via a secret executive order from President Bush shortly thereafter (see Early 2002). Jarrett writes that the OPR probe will include “whether such activities are permissible under existing law.” Justice Department spokeswoman Tasia Scolinos says the inquiry will be quite limited: “They will not be making a determination on the lawfulness of the NSA program but rather will determine whether the department lawyers complied with their professional obligations in connection with that program.” Scolinos calls the OPR probe “routine.” Hinchey says he welcomes the probe, which may determine “how President Bush went about creating this Big Brother program.” [Washington Post, 2/16/2006] The OPR inquiry is derailed after the NSA, with Bush’s authorization, refuses to give routine security clearances to OPR lawyers that would allow them to examine the relevant documents (see May 9, 2006).

Entity Tags: US Department of Justice, Tasia Scolinos, H. Marshall Jarrett, National Security Agency, George W. Bush, Bush administration (43), Maurice Hinchey, Office of Professional Responsibility

Timeline Tags: Civil Liberties

A Washington Post article repeats assertions by the National Security Agency (NSA) and the Bush administration that even if the NSA is automatically intercepting and storing millions of domestic phone calls and emails (see January 16, 2004), such computerized surveillance does not legally “count” unless it is examined—i.e. read or listened to—by human analysts. As the Post reports, NSA rules state that “‘acquisition’ of content does not take place until a conversation is interrupted and processed ‘into an intelligible form intended for human inspection.’” The Post article says that “nearly all” of the intercepted “overseas” communications from American citizens have been “dismissed” by intelligence officers who found nothing of interest in them. The Post observes: “Fewer than 10 US citizens or residents a year, according to an authoritative account, have aroused enough suspicion during warrantless eavesdropping to justify interception of their domestic calls, as well. That step still requires a warrant from a federal judge, for which the government must supply evidence of probable cause.” And, according to the Post’s “knowledgeable sources,” no more than 5,000 Americans have had their conversations recorded or their emails examined by intelligence analysts. According to Bush administration officials, the Post reports, “[s]urveillance takes place in several stages… the earliest by machine. Computer-controlled systems collect and sift basic information about hundreds of thousands of faxes, emails, and telephone calls into and out of the United States before selecting the ones for scrutiny by human eyes and ears. Successive stages of filtering grow more intrusive as artificial intelligence systems rank voice and data traffic in order of likeliest interest to human analysts. But intelligence officers, who test the computer judgments by listening initially to brief fragments of conversation, ‘wash out’ most of the leads within days or weeks.” People who have helped develop the computer analysis technology say that “it is a triumph for artificial intelligence if a fraction of one percent of the computer-flagged conversations guide human analysts to meaningful leads.”
Controversy over Legality, Usefulness of Surveillance - National security lawyers say that the high proportion of false leads and innocent bystanders being wiretapped contravenes the “reasonable” search provisions of the Fourth Amendment. One government official says the success rate should be closer to 50 percent—one out of every two persons surveilled—and not less than one percent. “Those who devised the surveillance plan, the official says, “knew they could never meet that standard—that’s why they didn’t go through” the court that supervises the Foreign Intelligence Surveillance Act, or FISA. Bush officials refuse to say whether the NSA is discarding the more than 99 percent of communications that it intercepts and deems useless for further analysis. Jeff Jonas, an IBM scientist who invented a data-mining system now in use by both private and governmental entities, says that the kind of pattern-matching data analysis used by the NSA in its surveillance program is neither useful nor accurate. Those analysis techniques that “look at people’s behavior to predict terrorist intent,” he says, “are so far from reaching the level of accuracy that’s necessary that I see them as nothing but civil liberty infringement engines.” Psychology professor James W. Pennebaker disagrees. “Frankly, we’ll probably be wrong 99 percent of the time,” he says, “but one percent is far better than one in 100 million times if you were just guessing at random. And this is where the culture has to make some decisions.” [Washington Post, 2/5/2006]
Former AT&T Technician: AT&T, NSA Violating Fourth Amendment - Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004) will later take a different view of the issue. In 2009, he will write: “[T]he illegal act happens at the point of seizure by the government, i.e. the splitter—not later, whether or not a medium is involved (see January 16, 2004). That is the whole part of the Fourth Amendment, which demands the government get a warrant to show ‘probable cause’ for seizing things, whatever the government does with it afterwards. What they do later is unknown, and at any rate, their word on anything has proven to be an exercise in prevarication.” [Klein, 2009, pp. 48-49]

Entity Tags: Jeff Jonas, Foreign Intelligence Surveillance Act, Bush administration (43), James W. Pennebaker, Mark Klein, National Security Agency, Washington Post

Timeline Tags: Civil Liberties

Author and columnist David Corn, who was the first member of the media to speculate that Valerie Plame Wilson’s exposure as a CIA official may have been a crime (see July 16, 2003), now speculates that the Lewis Libby defense team may resort to “graymail” to derail Libby’s criminal prosecution (see After October 28, 2005 and January 31, 2006). Corn writes: “[Y]ears ago defense attorneys representing clients connected to the national security establishment—say, a former CIA employee gone bad—figured out a way to squeeze the government in order to win the case: Claim you need access to loads of classified information in order to mount a defense—more than might truly be necessary. Of course, the government is going to put up a fight. It may release some information—but not everything a thorough defense attorney will say is needed. The goal is to get the government to say no to the informant. Then the defense attorney can attempt to convince the judge that without access to this material he or she cannot put up an adequate defense. If the lawyer succeeds, it’s case dismissed. In such situations, the defendant is essentially saying, ‘Prosecute me and I’ll blow whatever government secrets I can.’” Corn notes the defense’s requests for 10 months of highly classified Presidential Daily Briefings (PDBs), a request that may yet be granted (see February 24, 2006) and as such, will set up a battle with the Bush White House, which is almost certain to refuse to release any PDBs. Corn also notes defense requests for information surrounding Plame Wilson’s covert CIA status (see Fall 1992 - 1996 and April 2001 and After), another request that, if granted, will likely be refused by the CIA. Both scenarios are openings for the defense to ask for the dismissal of all charges against their client. And Libby’s team may ask for further classified information, from the State Department, the National Security Council, and the Office of the President. [Nation, 2/6/2006]

Entity Tags: Valerie Plame Wilson, Bush administration (43), Central Intelligence Agency, Lewis (“Scooter”) Libby, David Corn

Timeline Tags: Niger Uranium and Plame Outing

Slate reporter John Dickerson, who formerly worked for Time magazine during the initial Plame Wilson identity leak investigation coverage, writes of his knowledge of, and participation in, the investigation, including his knowledge that White House official Karl Rove leaked Valerie Plame Wilson’s CIA identity to Dickerson’s colleague, Matthew Cooper (see 11:00 a.m. July 11, 2003). Dickerson co-wrote a July 2003 Time article with Cooper (see July 17, 2003) that led to Cooper’s subpoena from the Patrick Fitzgerald investigation (see August 9, 2004 and September 13, 2004), his being held in contempt of court (see October 13, 2004), and his eventual testimony (see July 13, 2005). However, Dickerson was never subpoenaed to testify before the Fitzgerald grand jury. He writes that he accompanied the gaggle of reporters with President Bush on his trip to Africa in July 2003, and of the extensive time spent by two “senior administration official[s]” telling him how partisan and unreliable Plame Wilson’s husband Joseph Wilson is, and how he should investigate what “low-level” CIA official sent Wilson to Niger (see July 11, 2003). “I thought I got the point,” Dickerson writes. “He’d been sent by someone around the rank of deputy assistant undersecretary or janitor.” Dickerson goes on to observe, “What struck me was how hard both officials were working to knock down Wilson” (see October 1, 2003). After returning from the trip, Cooper told Dickerson that Rove had informed him of Plame Wilson’s CIA identity. “So, that explained the wink-wink nudge-nudge I was getting about who sent Wilson,” Dickerson writes. Cooper and Dickerson were careful, Dickerson writes, to ensure that other reporters would not learn of Plame Wilson’s CIA identity from either of them. And Dickerson did not want to encroach on Cooper’s arrangement with Rove. Dickerson writes: “At this point the information about Valerie Plame was not the radioactive material it is today. No one knew she might have been a protected agent—and for whatever reason, the possibility didn’t occur to us or anyone else at the time. But it was still newsworthy that the White House was using her to make its case. That Scooter Libby and Karl Rove mentioned Plame to Matt was an example of how they were attempting to undermine Wilson. They were trying to make his trip look like a special family side deal not officially sanctioned by the agency.” [Slate, 2/7/2006; Slate, 2/7/2006] In 2007, former White House press secretary Ari Fleischer will testify that he informed Dickerson of Plame Wilson’s identity (see 8:00 a.m. July 11, 2003), a statement that Dickerson will dispute. [Slate, 1/29/2007]

Entity Tags: Lewis (“Scooter”) Libby, George W. Bush, Bush administration (43), Ari Fleischer, John Dickerson, Karl C. Rove, Patrick J. Fitzgerald, Time magazine, Valerie Plame Wilson, Matthew Cooper, Joseph C. Wilson

Timeline Tags: Niger Uranium and Plame Outing

In an interview with PBS’s Gwen Ifill, Representative Jane Harman (D-CA), the ranking Democrat on the House Intelligence Committee, says she supports the administration’s warrantless wiretapping program (see Spring 2001), a position that places her at odds with most Congressional Democrats. “Well, I said then and I say now that I support the program,” she tells Ifill. Harman is critical of the insider leaks that led to the public divulgance of the program (see December 15, 2005), saying, “Well, I think the leaks have done a lot of damage, and I deplore the leaks of this critical program.” She goes on to complain that the administration “says it adequately oversees this program,” but “the system of checks and balances that we have… requires that Congress as an independent branch of government pass the laws, fund the programs, and oversee how all that works.” In addition to requesting greater cooperation on oversight with Congress, she adds that “the courts need to be cut back in,” and thinks the “entire program” should be brought under the Foreign Intelligence Surveillance Act. [PBS, 2/8/2006] Four days later, Harman reiterates her position on NBC’s Meet the Press. She tells moderator Tim Russert, “If the press was part of the process of delivering classified information, there have to be some limits on press immunity.” Russert asks, “But if [the NSA leak] came from a whistleblower, should the New York Times reporter be prosecuted?” Harman answers: “Well, it’s not clear it was a whistleblower. You have to prove that first. If it’s protected by the whistleblower statute, then it’s protected.… By the way, I deplore that leak. This is a very valuable foreign [intelligence] collection program. I think it is tragic that a lot of our capabilities are now [spread] across the pages of the newspapers.” [MSNBC, 2/12/2006; NewsMax, 2/12/2006]

Entity Tags: Jane Harman, Gwen Ifill, New York Times, House Intelligence Committee, Foreign Intelligence Surveillance Act, Tim Russert

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), has contacted Los Angeles Times reporter Joseph Menn about publishing an article expising AT&T’s collusion with the National Security Agency (NSA) to illegally conduct surveillance against American citizens (see January 23, 2006 and After). Klein believed Menn was enthusiastic about exposing AT&T and the NSA in his newspaper. Instead, Klein is shocked to hear from Menn that the Times’s “top guy” is preparing to meet with Director of National Intelligence John Negroponte to discuss any such publication. “I nearly fell down in shock,” Klein will later write. “[T]hey were actually negotiating with the government on whether to publish!” Menn describes himself to Klein as “demoralized,” and says the chances of getting the story published are “grim.” In his seven years at the Times, Menn tells Klein, he has never seen a story “spiked” for “nefarious reasons,” implying that the reason behind the story’s non-publication are “nefarious.” Klein is also dismayed that the Times has now revealed his existence as a whistleblower to Negroponte, and by extension to the US intelligence apparatus. Two days ago, Klein began emailing a New York Times reporter, James Risen, the co-author of a 2005 expose about the NSA’s surveillance program (see December 15, 2005). After hearing from Menn, Klein emails Risen to inform him of the Los Angeles Times’s decision to “consult” with Negroponte, and also of the lack of interest he has received from Senator Dianne Feinstein’s office (see February 1-6, 2006). Risen calls in fellow reporter Eric Lichtblau, his co-author on the 2005 story, and the two begin working on their own story. Klein remains worried about his personal and professional safety, since, as he will write, “[t]he government was on to me, but I did not yet have a published article and the protection that comes with publicity. I had visions, perhaps paranoid in hindsight, of being disappeared in the night, like [nuclear industry whistleblower] Karen Silkwood.” The Los Angeles Times story will drag on until March 29, when Menn will inform Klein that it is officially dead, blocked by Times editor Dean Baquet. Klein will later learn that Baquet had not only been in contact with Negroponte, but with NSA Director Michael Hayden. In 2007, Baquet will tell ABC News reporters that “government pressure played no part in my decision not to run with the story,” and will say that he and managing editor Doug Frantz decided “we did not have a story, that we could not figure out what was going on” with Klein’s documentation (see March 26, 2007). Klein will call Baquet’s explanation an “absurd and flimsy excuse,” and will say it is obvious that the Los Angeles Times “capitulated to government pressure.” [PBS Frontline, 5/15/2007; Klein, 2009, pp. 59-62]

Entity Tags: James Risen, Dean Baquet, AT&T, Dianne Feinstein, Eric Lichtblau, Joseph Menn, Michael Hayden, John Negroponte, Douglas Frantz, National Security Agency, Los Angeles Times, Mark Klein

Timeline Tags: Civil Liberties

The progressive Internet news site Washington Note writes a follow-up to the day’s revelation that the exposure of Valerie Plame Wilson’s identity as a covert CIA agent caused heavy damage to the CIA’s ability to monitor Iran’s nuclear weapons program (see February 13, 2006). The Note reports that, according to its source, Plame Wilson’s husband, former ambassador Joseph Wilson, included information about Iran’s nuclear program in the report from his 2002 trip to Niger (see February 21, 2002-March 4, 2002 and March 4-5, 2002). Note reporter Steve Clemons says he cannot be sure of the accuracy of the claim, “so please take the following with a grain of salt until further sourced.” Clemons describes his source as “[s]omeone with knowledge of the classified report that Joe Wilson ‘orally’ filed after his now famed investigative trip to Niger.” Wilson allegedly included two notes in his debriefing that related to Iran and its possible activities in Niger. Clemons writes that “various intelligence sources” speculate that if Iran was indeed attempting to acquire Nigerien uranium, it would be to avoid “the international intelligence monitoring of Iran’s domestic mining operations.” Wilson, according to the source, may have reported that Iran, not Iraq, tried to acquire 400 to 500 tons of Nigerien uranium (see Between Late 2000 and September 11, 2001). Clemons writes that the notes from Wilson’s Niger debriefing have been destroyed, making it much harder to verify the claims. [Washington Note, 2/13/2006]

Entity Tags: Valerie Plame Wilson, Central Intelligence Agency, Steve Clemons, Joseph C. Wilson

Timeline Tags: US confrontation with Iran, Niger Uranium and Plame Outing

Former National Security Agency (NSA) intelligence analyst and current whistleblower Russell Tice tells the House Government Reform Subcommittee on National Security, Emerging Threats, and International Relations that he worries about what he calls a “special access” electronic surveillance program that is far more wide-ranging than the warrantless wiretapping recently exposed by the New York Times. However, Tice says he is forbidden by law to reveal specifics of the program to Congress. Tice says he believes the program violates the Constitution’s protection against unlawful search and seizures, but for him to discuss it with anyone in Congress or even with the NSA’s inspector general would violate classification laws. A spokesman for Congressman Dennis Kucinich (D-OH) says both Kucinich and committee chairman Christopher Shays (R-CT) believe that a few members of the Armed Services Committee have high enough security clearances for Tice’s information: “Congressman Kucinich wants Congressman Shays to hold a hearing [on the program]. Obviously it would have to take place in some kind of a closed hearing. But Congress has a role to play in oversight. The [Bush] administration does not get to decide what Congress can and can not hear.” In January 2006, it emerged Tice was one of the sources for the New York Times’s revelation that the NSA is engaged in possibly illegal wiretapping of American civilians as part of the war on terror (see January 10, 2006). Tice was fired from the NSA in 2005 and labeled “paranoid,” a classification Tice says was pasted on him in retaliation for his whistleblowing both inside the agency and to the public (see January 25-26, 2006). [United Press International, 2/14/2006] Author James Bamford, an expert on US intelligence, says, “The congressional intelligence committees have lost total control over the intelligence communities. You can’t get any oversight or checks and balances; the Congress is protecting the White House and the White House can do whatever it wants.” [In These Times, 5/15/2006]

Entity Tags: Russell Tice, Christopher Shays, Dennis Kucinich, House Armed Services Committee, James Bamford, House Government Reform Subcommittee on National Security, Emerging Threats and International Relations

Timeline Tags: Civil Liberties

Attorney General Alberto Gonzales says he will sharply limit the testimony of former attorney general John Ashcroft and former deputy attorney general James Comey before the Senate Judiciary Committee. The committee is preparing for hearings on the warrantless wiretapping program authorized by President Bush several months after the 9/11 attacks (see Early 2002). Gonzales says that “privilege issues” will circumscribe both men’s testimony: “As a general matter, we would not be disclosing internal deliberations, internal recommendations. That’s not something we’d do as a general matter, whether or not you’re a current member of the administration or a former member of the administration.” He adds, “You have to wonder what could Messrs. Comey and Ashcroft add to the discussion.” Comey was an observer to the late-night visit by Gonzales and then-White House chief of staff Andrew Card to Ashcroft’s hospital room, where Gonzales and Card unsuccessfully attempted to persuade the heavily sedated Ashcroft to reauthorize the program after Comey, as acting attorney general, determined the program was likely illegal (see March 10-12, 2004). Committee chairman Arlen Specter (R-PA) says he has asked Gonzales for permission to call Comey and Ashcroft to testify, but has not yet received an answer. Specter says, “I’m not asking about internal memoranda or any internal discussions or any of those kind of documents which would have a chilling effect.” Specter will ask Ashcroft and Comey to talk about the legal issues at play in the case, including the events surrounding the hospital visit. In the House Judiciary Committee, Republicans block an attempt by Democrats to ask Gonzales to provide legal opinions and other documents related to the program. [Washington Post, 2/16/2006]

Entity Tags: Andrew Card, Alberto R. Gonzales, Arlen Specter, George W. Bush, John Ashcroft, House Judiciary Committee, James B. Comey Jr., Senate Judiciary Committee

Timeline Tags: Civil Liberties

Shortly after the press learns that White House counsel Alberto Gonzales has withheld White House e-mails from the Fitzgerald investigation (see February 15, 2006), the White House turns over some 250 pages of e-mails from Vice President Dick Cheney’s office. The e-mails were sent during the spring of 2003 by senior Cheney aides, and pertain to the leak of CIA official Valerie Plame Wilson’s covert identity to the press. Special counsel Patrick Fitzgerald reveals the “discovery” of the missing e-mails in court. According to reporter Jason Leopold, the contents of the e-mails are “explosive, and may prove that Cheney played an active role in the effort to discredit Plame Wilson’s husband, former ambassador Joseph Wilson, a vocal critic of the Bush administration’s pre-war Iraq intelligence.” According to Leopold’s sources, the e-mails could also prove that Cheney lied to FBI investigators when he was interviewed about the leak in early 2004 (see May 8, 2004). Cheney told investigators that he knew nothing of any effort to discredit Wilson or to expose his wife’s undercover status to reporters. However, the e-mails indicate that Cheney led an effort to discredit Wilson that began in March 2003, and used the CIA to dig up information on Wilson that could be used to dirty his reputation in the press (see March 9, 2003 and After). Some of the e-mails refer to Plame Wilson’s identity and CIA status, and reference the US military’s inability to find weapons of mass destruction in Iraq. The e-mails also contain suggestions from Cheney’s senior aides, and from staffers of the National Security Council, as to how the White House should respond to Wilson’s criticisms of the administration’s pre-war Iraq intelligence. Fitzgerald has been attempting to secure the “missing” e-mails since late January (see January 23, 2006). Gonzales is still refusing to turn over some of the e-mails, citing “executive privilege” and “national security” concerns. [Truthout (.org), 2/24/2006; Associated Press, 2/27/2006] On February 28, the Wall Street Journal will write that the e-mails have been in the Libby team’s possession since February 6, and that they contain nothing pertinent to the trial (see February 6, 2006).

Entity Tags: Joseph C. Wilson, Bush administration (43), Alberto R. Gonzales, Jason Leopold, Office of the Vice President, Patrick J. Fitzgerald, Valerie Plame Wilson, Richard (“Dick”) Cheney

Timeline Tags: Niger Uranium and Plame Outing

Web site header graphic for the Libby Legal Defense Trust’s site, reduced in size.Web site header graphic for the Libby Legal Defense Trust’s site, reduced in size. [Source: Libby Legal Defense Trust] (click image to enlarge)Conservative media outlets such as the Web site Human Events announce the launch of scooterlibby.com, a Web site that coordinates and markets the fundraising efforts of the Lewis Libby defense fund (see After October 28, 2005). (The site also operates under the URL scooterlibby.org.) The chairman of the Libby Legal Defense Trust, Republican fundraiser and former ambassador Mel Sembler, writes on the front page of the site: “Since September 11, 2001, Lewis ‘Scooter’ Libby has been one of the unsung heroes in fighting the war on terror, working diligently and making countless contributions on some of the most critical life and death issues that our country has faced. For the past five years, Scooter Libby served selflessly as an assistant to President Bush and as the chief of staff and national security adviser to Vice President Cheney. But Scooter’s great service to our country has now been cut short, and his good name attacked. A distinguished group of friends, business leaders, and former government officials have joined the Libby Legal Defense Trust to help Scooter defray his legal costs from the recent charges. We hope you will join us in supporting this effort.” The site features an endorsement from Dick Cheney calling Libby “one of the most capable and talented individuals I have ever known.” [Human Events, 2/21/2006; Jeralyn Merritt, 2/21/2006; Libby Legal Defense Trust, 2/21/2006] Sembler says the group wants to raise $5 million for Libby’s defense. The group, staffed with veteran fundraisers who worked for the 2004 Bush-Cheney re-election campaign and other high-profile Republican campaigns, is believed to have raised almost half of that amount already. [Washington Post, 2/22/2006] In upcoming days, Slate editor John Dickerson will publish an analysis of the site’s efforts, calling it an attempt to “humanize” Libby and portray him as a selfless, innocent victim of government persecution (see February 27, 2006).

Entity Tags: Libby Legal Defense Trust, Mel Sembler, Human Events, Richard (“Dick”) Cheney, Lewis (“Scooter”) Libby, John Dickerson

Timeline Tags: Niger Uranium and Plame Outing

Electronic Frontier Foundation (EFF) lawyer Kevin Bankston asks AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) to submit a legal declaration as to his knowledge of AT&T’s collusion with the National Security Agency (NSA) in its illegal domestic wiretapping program. Klein is working with the EFF in that organization’s lawsuit against AT&T (see Early January 2006 and January 31, 2006). Five days later, Klein submits his evidence of AT&T’s actions (see December 31, 2005) to Bankston to be used in the lawsuit. Klein will work with his lawyers to craft the declaration, and will have it in final form by late March. [Klein, 2009, pp. 63-64]

Entity Tags: National Security Agency, AT&T, Electronic Frontier Foundation, Mark Klein, Kevin Bankston

Timeline Tags: Civil Liberties

In a court hearing, special counsel Patrick Fitzgerald argues that Valerie Plame Wilson’s identity as a covert CIA official (see Fall 1992 - 1996) is irrelevant to the perjury charges pending against former White House official Lewis Libby (see October 28, 2005). “We’re trying a perjury case,” Fitzgerald tells Judge Reggie Walton. Even if Plame Wilson had never worked for the CIA at all, Fitzgerald continues, even if she had been simply mistaken for a CIA agent, the charges against Libby would still stand. Furthermore, Fitzgerald tells Walton, he does not intend to offer “any proof of actual damage” caused by the disclosure of Plame Wilson’s identity. Libby’s defense lawyer Theodore Wells objects to Fitzgerald’s statement, saying that in the actual trial, Fitzgerald will likely tell the jury that the leak of Plame Wilson’s identity either damaged or could have damaged the CIA’s ability to gather critical intelligence (see Before September 16, 2003, October 3, 2003, October 11, 2003, October 22-24, 2003, October 23-24, 2003, and February 13, 2006). Wells says he may call either Plame Wilson, her husband Joseph Wilson (see February 21, 2002-March 4, 2002), or both to testify in the case, as well as CIA employees. “I might call Ms. Wilson” to testify, he says. “I might call her husband. There are going to be CIA employees as witnesses in this.… Was she just classified because some bureaucracy didn’t declassify her five years ago when they should have?” Wells asks if Plame Wilson may have been “classified based on a piece of paper.” One anonymous source tells a National Review columnist: “She was definitely undercover by agency standards at the time in question. That was a classified bit of information, and is sufficient as far as the agency is concerned to bring it to the attention of the Justice Department. You can argue whether she should have been, but as far as the agency was concerned it was classified.” [National Review, 2/27/2006] In his statement to the court, Fitzgerald notes: “[T]he issue is whether [Libby] knowingly lied or not. And if there is information about actual damage, whatever was caused or not caused that isn’t in his mind, it is not a defense. If she turned out to be a postal driver mistaken for a CIA employee, it’s not a defense if you lie in a grand jury under oath about what you said and you told people, ‘I didn’t know he had a wife.’ That is what this case is about. It is about perjury, if he knowingly lied or not.” [Truthout (.org), 3/18/2006]

Entity Tags: Reggie B. Walton, Joseph C. Wilson, Lewis (“Scooter”) Libby, Theodore Wells, Patrick J. Fitzgerald, Valerie Plame Wilson

Timeline Tags: Niger Uranium and Plame Outing

Lawyers for indicted former White House official Lewis Libby (see October 28, 2005) say they intend to subpoena news reporters and organizations in defense of their client. Judge Reggie Walton, presiding over the upcoming trial, has yet to rule whether he will allow such subpoenas. Libby’s lawyers say they want to question journalists who have testified that they were the recipients of classified information from Libby (see June 23, 2003, 8:30 a.m. July 8, 2003, 2:24 p.m. July 12, 2003, and Late Afternoon, July 12, 2003). Walton has set a deadline of April 7, 2006 for any subpoenaed journalists and news organizations to respond as to their intentions to testify in Libby’s trial. [NewsMax, 2/25/2006]

Entity Tags: Reggie B. Walton, Lewis (“Scooter”) Libby

Timeline Tags: Niger Uranium and Plame Outing

Slate editor John Dickerson, who played a small role in the Valerie Plame Wilson identity leak (see February 7, 2006), writes about the recently launched Lewis Libby defense fund’s Web site created to help raise money for Libby’s defense (see After October 28, 2005 and February 21, 2006). Far from looking like the Web site of an indicted criminal, Dickerson writes, the site’s design makes it seem as if Libby is running for elected office. He is shown with Afghan President Hamid Karzai, while “[o]ther snapshots portray him in soft focus and at oblique angles, the kinds of images candidates use to make themselves look more huggable. Fortunately, Libby’s Web designers didn’t stoop to showing him with dogs and children.”
The 'Soft Sell' - Dickerson says the site is attempting to portray Libby to the American people as a likeable, honest person whose years of public service have left him open to unfair and unwarranted criminal charges. The site claims that Libby has virtually no money with which to fight those charges, and is basically relying on the generosity of the public to help him fight the government. The site does not focus as strongly on the array of powerful Washington Republicans lined up to help Libby raise money, particularly the large number of star fundraisers who raised large amounts of money for the Bush-Cheney presidential campaigns. However, the site notes, the Libby defense fund will not publicly release the names of donors to the fund. The site does focus on what Dickerson calls “the soft Scooter sell.” It intends to “clean… up his image for the public, the press, and potential jurors. The Web site offers a page titled ‘What You Aren’t Hearing,’ with testimonials lined up like movie blurbs.”
Possible Defense Strategy - And, Dickerson writes, the site offers hints as to what Libby’s defense strategy might be.
bullet If the site is accurate, the defense team intends to portray Libby as “a good guy” who, as former Republican congressman Vin Weber says in a testimonial, “is a tough, honorable, honest guy.” He has spent his adult life in “selfless,” and apparently almost penniless, service to his country, fighting for the American people and battling terrorism and other national security threats with every waking breath. He is a “perfectionist,” says former Deputy Defense Secretary Paul Wolfowitz.
bullet Libby just forgot about his knowledge of Plame Wilson’s CIA status, the site emphasizes, because he was too busy serving his country (see January 31, 2006). Former Bush Legislative Affairs Director Nick Calio is quoted as saying: “There are a lot of things that I don’t remember. I go through notes sometimes now and say I don’t even remember being in the meeting, let alone, you know, having said what I said.” Former Bush Solicitor General Theodore Olson adds, “From personal experience as a former public official who has been investigated by a special prosecutor, I know how easy it is not to be able to remember details of seemingly insignificant conversations.”
Dickerson notes that the two arguments are somewhat contradictory. He writes, “Libby’s site has a hard time, because it simultaneously is trying to argue that a) he was likely to forget the Plame episodes and b) he was hypercompetent.”
bullet The site also spends a large amount of time and bandwidth attacking special counsel Patrick Fitzgerald. Seven of the 19 perspectives on Libby are criticisms of Fitzgerald, such as a statement by former Deputy Attorney General Victoria Toensing (see November 3, 2005) that the special counsel “has been investigating a very simple factual scenario and he’s missed this crucial fact.” [Slate, 2/27/2006] Toensing will engage in further criticism of Fitzgerald and the criminal case against Libby in op-eds (see February 18, 2007, February 18, 2007, and March 16, 2007).

Entity Tags: Theodore (“Ted”) Olson, Lewis (“Scooter”) Libby, John Dickerson, Bush administration (43), Nicholas E. Calio, Paul Wolfowitz, Vin Weber, Victoria Toensing, Valerie Plame Wilson, Patrick J. Fitzgerald

Timeline Tags: Niger Uranium and Plame Outing

The Al Haramain Islamic Foundation, a now-defunct Saudi Arabian charitable organization that once operated in Oregon, sues the Bush administration [Associated Press, 2/28/2006] over what it calls illegal surveillance of its telephone and e-mail communications by the National Security Agency, the so-called Terrorist Surveillance Program. The lawsuit may provide the first direct evidence of US residents and citizens being spied upon by the Bush administration’s secret eavesdropping program, according to the lawsuit (see December 15, 2005). According to a source familiar with the case, the NSA monitored telephone conversations between Al Haramain’s director, then in Saudi Arabia, and two US citizens working as lawyers for the organization and operating out of Washington, DC. The lawsuit alleges that the NSA violated the Foreign Intelligence Surveillance Act (see 1978), the US citizens’ Fourth Amendment rights, and the attorney-client privilege. FISA experts say that while they are unfamiliar with the specifics of this lawsuit, they question whether a FISA judge would have allowed surveillance of conversations between US lawyers and their client under the circumstances described in the lawsuit. Other lawsuits have been filed against the Bush administration over suspicions of illegal government wiretapping, but this is the first lawsuit to present classified government documents as evidence to support its contentions. The lawsuit alleges that the NSA illegally intercepted communications between Al Haramain officer Suliman al-Buthe in Saudi Arabia, and its lawyers Wendell Belew and Asim Ghafoor in Washington. One of its most effective pieces of evidence is a document accidentally turned over to the group by the Treasury Department, dated May 24, 2004, that shows the NSA did indeed monitor conversations between Al Haramain officials and lawyers. When Al Haramain officials received the document in late May, 2004, they gave a copy to the Washington Post, whose editors and lawyers decided, under threat of government prosecution, to return the document to the government rather than report on it (see Late May, 2004). [Washington Post, 3/2/2006; Washington Post, 3/3/2006] Lawyer Thomas Nelson, who represents Al Haramain and Belew, later recalls he didn’t realize what the organization had until he read the New York Times’s December 2005 story of the NSA’s secret wiretapping program (see December 15, 2005). “I got up in the morning and read the story, and I thought, ‘My god, we had a log of a wiretap and it may or may not have been the NSA and on further reflection it was NSA,’” Nelson will recall. “So we decided to file a lawsuit.” Nelson and other lawyers were able to retrieve one of the remaining copies of the document, most likely from Saudi Arabia, and turned it over to the court as part of their lawsuit. [Wired News, 3/5/2007]
Al Haramain Designated a Terrorist Organization - In February 2004, the Treasury Department froze the organization’s US financial assets pending an investigation, and in September 2004, designated it a terrorist organization, citing ties to al-Qaeda and alleging financial ties between Al Haramain and the 1998 bombings of two US embassies in Africa (see 10:35-10:39 a.m., August 7, 1998). The organization was disbanded by the Saudi Arabian government in June 2004 and folded into an “umbrella” private Saudi charitable organization, the Saudi National Commission for Relief and Charity Work Abroad (see March 2002-September 2004). In February 2005, the organization was indicted for conspiring to funnel money to Islamist fighters in Chechnya. The charges were later dropped. [US Treasury Department, 9/9/2004; Washington Post, 3/2/2006] The United Nations has banned the organization, saying it has ties to the Taliban. [United Nations, 7/27/2007]
Challenging Designation - In its lawsuit, Al Haramain is also demanding that its designation as a terrorist organization be reversed. It says it can prove that its financial support for Chechen Muslims was entirely humanitarian, with no connections to terrorism or violence, and that the Treasury Department has never provided any evidence for its claims that Al Haramain is linked to al-Qaeda or has funded terrorist activities. [Associated Press, 8/6/2007] The lawsuit also asks for $1 million in damages, and the unfreezing of Al Haramain’s US assets. [Associated Press, 8/5/2007]
Administration Seeks to Have Lawsuit Dismissed - The Bush administration will seek to have the lawsuit thrown out on grounds of national security and executive privilege (see Late 2006-July 2007, Mid-2007).

Entity Tags: Wendell Belew, Suliman al-Buthe, Taliban, Washington Post, United Nations, Saudi National Commission for Relief and Charity Work Abroad, US Department of the Treasury, National Security Agency, Thomas Nelson, Foreign Intelligence Surveillance Act, Al Haramain Islamic Foundation, Al-Qaeda, Al Haramain Islamic Foundation (Oregon branch), Foreign Intelligence Surveillance Court, Asim Ghafoor, Bush administration (43)

Timeline Tags: Civil Liberties

Rayed Abdullah.Rayed Abdullah. [Source: Scoop]Rayed Abdullah, an associate of hijacker pilot Hani Hanjour (see October 1996-December 1997 and October 1996-Late April 1999), enters New Zealand despite being on the watch list there and takes further pilot training. The New Zealand government claims it only ascertains his real identity after he has been in the country several months. Abdullah is then arrested and deported to Saudi Arabia, even though he was traveling on a Yemeni passport. [Associated Press, 6/9/2006; New Zealand Herald, 6/10/2006] However, FBI agents and CIA officers later say that the US released Abdullah after 9/11 in an attempt to use him to spy on al-Qaeda for Saudi Arabia’s intelligence agency. The CIA ensures he is allowed into New Zealand as a part of a joint operation. However, the New Zealanders get cold feet when Abdullah starts flight training again. A CIA official will say: “[W]e know if Rayed was part of the [9/11] plot, someone in al-Qaeda will reach out for him, and we have a chance of making that connection.” An FBI official will comment: “The amazing thing is the CIA convinced itself that by getting [Abdullah] tossed out of New Zealand, he would then be trusted and acceptable to Saudi intelligence and useful in al-Qaeda operations. For this tiny chance of success they put passengers at risk to enter into a partnership with Saudi intelligence.” [Stories that Matter, 10/9/2006]

Entity Tags: Central Intelligence Agency, Rayed Abdullah

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Zacarias Moussaoui.Zacarias Moussaoui. [Source: WNBC / Jonathan Deinst]Zacarias Moussaoui becomes the first and only person charged in direct connection with the 9/11 attacks to stand trial in the US. [Associated Press, 3/17/2006] He was preparing to hijack an aircraft and fly it into a target when he was arrested 26 days before 9/11 (see August 16, 2001 and April 22, 2005). Although there has been disagreement whether Moussaoui was to take part in the actual attack of 9/11 or a follow-up plot (see January 30, 2003), the prosecution alleges that Moussaoui had information related to the attacks (see August 16, 2001) and facilitated them by lying and not disclosing everything he knew to the FBI. He is charged with six counts, including conspiracy to commit acts of terrorism and conspiracy to commit aircraft piracy. [US District Court for the Eastern District of Virginia, Alexandria Division, 12/11/2001 pdf file] The trial receives much media coverage and the highlights include the playing of United 93’s cockpit recorder (see April 12, 2006), a row over a government lawyer coaching witnesses (see March 13, 2006), and testimony by FBI agent Harry Samit (see March 9 and 20, 2006), former FBI assistant director Michael Rolince (see March 21, 2006), and Moussaoui himself (see March 27, 2006). Moussaoui is forced to wear a stun belt, controlled by one of the marshalls, under his jumpsuit. The belt is to be used if Moussaoui lunges at a trial participant. [New York Times, 4/17/2006] He has already pleaded guilty (see April 22, 2005) and the trial is divided into two phases; in the first phase the jury decides that Moussaoui is eligible for the death penalty, but in the second phase it fails to achieve unanimity on whether Moussaoui should be executed (see May 3, 2006). [Associated Press, 4/3/2006; New York Times, 4/17/2006]

Entity Tags: Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Republicans on the Senate Intelligence Committee refuse to allow an inquiry into the Bush administration’s warrantless wiretapping program (see December 15, 2005 and December 18, 2005), with the committee voting 10-8 along party lines to reject such a probe. Senate Judiciary Committee chairman Arlen Specter (R-PA) had advocated such a probe, but White House officials refused to cooperate with his committee, saying they would only cooperate via classified briefings to the Intelligence Committee. However, committee Republicans, led by chairman Pat Roberts (R-KS), have no intention of allowing such an inquiry. Roberts and his fellows say they will push to impose limitations on the program. Committee Democrats accuse their Republican colleagues of colluding with the administration to block the inquiry. “The committee is, to put it bluntly, is basically under the control of the White House,” says ranking committee member John D. Rockefeller (D-WV). “You can’t legislate properly unless you know what’s going on.” The Republicans have left Congress to “legislate in darkness and ignorance,” he says. Republicans say that a new, select subcommittee will increase oversight of the administration’s wiretapping. “It provides for a case-by-case examination and oversight by the United States Congress,” says Mike DeWine (R-OH), who is helping draft the bill for the new oversight subcommittee. “It will be very consistent with what our constitutional obligations are.” DeWine’s bill would allow the administration to ignore restrictions on wiretapping merely by invoking national security, and would not allow the committee to intervene even in clearly unjustified cases of wiretapping. “The White House could just decide not to tell them everything, and there’s no sanction,” says Bruce Fein, a former Reagan administration lawyer. “And the president can still claim that he has inherent power to conduct surveillance.” The bill is “extremely generous to the president,” says conservative law professor Douglas Kmiec. “It is not significantly different from the status quo. And I think the president would be quite delighted by that.” [Boston Globe, 3/8/2006; Savage, 2007, pp. 204]

Entity Tags: Senate Judiciary Committee, Bruce Fein, Arlen Specter, Bush administration (43), Pat Roberts, Douglas Kmiec, Mike DeWine, John D. Rockefeller, Senate Intelligence Committee

Timeline Tags: Civil Liberties

President Bush signs the USA Patriot Improvement and Reauthorization Act of 2005 into law. The bill, which extends and modifies the original USA Patriot Act (see October 26, 2001), was driven through Congress primarily by the Republican majorities in both Houses. However, Senator Dianne Feinstein (D-CA) cosponsored the Senate bill, numerous Democrats in both Houses voted with the Republicans in favor of the bill, and the final bill sailed through the Senate by an 89-10 vote on March 2. [GovTrack, 3/9/2006; Library of Congress, 3/9/2006] In the signing ceremony, Bush calls the Reauthorization Act “a really important piece of legislation… that’s vital to win the war on terror and to protect the American people.” He repeatedly evokes the 9/11 attacks as a reason why the new law is needed. [Government Printing Office, 3/9/2006]
Provisions for Oversight Added - One of the reasons why the reauthorization bill received such support from Congressional moderates on both sides of the aisle is because Congress added numerous provisions for judicial and Congressional oversight of how government and law enforcement agencies conduct investigations, especially against US citizens. Representative Butch Otter (R-ID) said in 2004 that Congress came “a long way in two years, and we’ve really brought an awareness to the Patriot Act and its overreaches that we gave to law enforcement.” He adds, “We’ve also quieted any idea of Patriot II, even though they snuck some of Patriot II in on the intelligence bill” (see February 7, 2003). [Associated Press, 1/23/2004]
Opposition From Both Sides - Liberal and conservative organizations joined together in unprecedented cooperation to oppose several key provisions of the original reauthorization and expansion of the Patriot Act, including easing of restrictions on government and law enforcement agencies in obtaining financial records of individuals and businesses, “sneak-and-peek” searches without court warrants or the target’s knowledge, and its “overbroad” definition of the term “terrorist.” Additionally, lawmakers in Congress insisted on expiration dates for the various surveillance and wiretapping methodologies employed by the FBI and other law enforcement agencies (see Early 2002). [Associated Press, 5/23/2005] The final bill mandates that anyone subpoenaed for information regarding terrorist investigations has the right to challenge the requirement that they not reveal anything about the subpoena, those recipients will not be required to tell the FBI the name of their lawyer, and libraries that are not Internet service providers will not be subject to demands from “national security letters” for information about their patrons. Many of the bill’s provisions will expire in four years. [Christian Science Monitor, 3/3/2006]
Reauthorizing Original Provisions - The bill does reauthorize many expiring provisions of the original Patriot Act, including one that allows federal officials to obtain “tangible items,” such as business records from libraries and bookstores, in connection with foreign intelligence and international terrorism investigations. Port security provisions are strengthened, and restrictions on the sale of over-the-counter cold and allergy medicine that can be used in the illegal manufacture of methamphetamine are imposed, forcing individuals to register their purchases of such medicines and limiting the amounts they can buy. [CBS News, 3/9/2006]
Bush Signing Statement Says He Will Ignore Oversight Mandates - But when he signs the bill into law, Bush also issues a signing statement that says he has no intention of obeying mandates that enjoin the White House and the Justice Department to inform Congress about how the FBI is using its new powers under the bill. Bush writes that he is not bound to tell Congress how the new Patriot Act powers are being used, and in spite of what the law requires, he can and will withhold information if he decides that such disclosure may “impair foreign relations, national security, the deliberative process of the executive, or the performance of the executive’s constitutional duties.” [Statement on Signing the USA PATRIOT Improvement and Reauthorization Act, 3/9/2006; Boston Globe, 3/24/2006] Senator Patrick Leahy (D-VT) says that Bush’s assertion that he can ignore provisions of the law as he pleases, under the so-called “unitary executive” theory, are “nothing short of a radical effort to manipulate the constitutional separation of powers and evade accountability and responsibility for following the law.” Law professor David Golove says the statement is illustrative of the Bush administration’s “mind-bogglingly expansive conception” of executive power, and its low regard for legislative power. [Boston Globe, 3/24/2006] Author and legal expert Jennifer Van Bergen warns of Bush using this signing statement to avoid accountability about the NSA’s warrantless wiretapping program, writing: “[I]t is becoming clearer every day that Bush has no qualms about violating either international laws and obligations or domestic laws. The recent revelations about the secret NSA domestic surveillance program revealed Bush flagrantly violating the Foreign Intelligence Surveillance Act which was specifically enacted to prevent unchecked executive branch surveillance. … His signing statements, thus, are nothing short of an attempt to change the very face of our government and our country.” [Institute for Public Accuracy, 3/27/2006]
Request to Rescind Signing Statement - In late March, Democratic House members Jane Harman and John Conyers will write to Attorney General Alberto Gonzales requesting that the administration rescind the signing statement, writing: “As you know, ‘signing statements’ do not have the force of law. Legislation passed by both Houses and signed by the president does. As Article 1, Section 7, of the Constitution states: ‘Every bill which shall have passed the House of Representatives and the Senate, shall, before it become a Law, be presented to the President of the United States; If he approve he shall sign it, but if not he shall return it.’” Bush and Gonzales will ignore the request. [US House of Representatives, 3/29/2006]

Entity Tags: US Department of Justice, Domestic Security Enhancement Act of 2003, David Golove, Alberto R. Gonzales, Butch Otter, Dianne Feinstein, Patrick J. Leahy, USA Patriot Act, John Conyers, Federal Bureau of Investigation, National Security Agency, Foreign Intelligence Surveillance Act, Jennifer Van Bergen, Jane Harman, George W. Bush

Timeline Tags: Civil Liberties

Senator Russell Feingold (D-WI) tells reporters that he intends to push through legislation that would censure President Bush because of his domestic surveillance program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006). “What the president did by consciously and intentionally violating the Constitution and laws of this country with this illegal wiretapping has to be answered,” Feingold tells an interviewer. “Proper accountability is a censuring of the president, saying, ‘Mr. President, acknowledge that you broke the law, return to the law, return to our system of government.‘… The president has broken the law and, in some way, he must be held accountable.… Congress has to reassert our system of government, and the cleanest and the most efficient way to do that is to censure the president. And, hopefully, he will acknowledge that he did something wrong.” Senate Majority Leader Bill Frist (R-TN) calls Feingold’s proposal “a crazy political move.” The Senate Intelligence Committee, following the Bush administration’s lead, has rejected some Democrats’ call for a full investigation of the surveillance program (see February 1-6, 2006). Instead, the committee has adopted a Republican plan for a seven-member subcommittee to conduct oversight. Feingold says his censure motion is not “a harsh approach, and it’s one that I think should lead to bipartisan support.” Frist, however, says: “I think it, in part, is a political move because here we are, the Republican Party, the leadership in the Congress, supporting the president of the United States as commander in chief who is out there fighting al-Qaeda and the Taliban and Osama bin Laden and the people who have sworn—have sworn—to destroy Western civilization and all the families listening to us.… The signal that it sends that there is in any way a lack of support for our commander in chief who is leading us with a bold vision in a way that we know is making our homeland safer is wrong. And it sends a perception around the world.” Only once in history has a president been censured by Congress: Andrew Jackson in 1834. In the House, Representative John Conyers (D-MI) is exploring the idea of introducing impeachment legislation against Bush. [New York Times, 3/12/2006; Associated Press, 3/12/2006] Feingold says on the Senate floor: “The president has violated the law and Congress must respond. A formal censure by Congress is an appropriate and responsible first step to assure the public that when the president thinks he can violate the law without consequences, Congress has the will to hold him accountable.” Most Congressional Democrats want nothing to do with either Feingold’s or Conyers’s legislative ideas, and some Republicans seem to be daring Democrats to vote for the proposal. Vice President Dick Cheney tells a Republican audience in Feingold’s home state of Wisconsin, “Some Democrats in Congress have decided the president is the enemy.” Democratic leaders in the Senate thwart an immediate vote as requested by Frist, and Senator Richard Durbin (D-IL) says he is not sure the proposal will ever come to a vote. Senate Minority Leader Harry Reid (D-NV) says he does not support it and has not read it. Senator Joseph Lieberman (D-CT) makes a similar assertion. In the House, Minority Leader Nancy Pelosi (D-CA) refuses to support such a proposal, saying in a statement that she “understands Senator Feingold’s frustration that the facts about the NSA domestic surveillance program have not been disclosed appropriately to Congress. Both the House and the Senate must fully investigate the program and assign responsibility for any laws that may have been broken.” [Associated Press, 3/14/2006] Former Nixon aide John Dean testifies in support of Feingold’s censure motion (see March 31, 2006). However, the censure motion, lacking support from Democratic leaders and being used by Republicans as a means to attack Democrats’ patriotism, never comes to a vote. [Klein, 2009, pp. 84]

Entity Tags: Joseph Lieberman, George W. Bush, Bush administration (43), Bill Frist, Harry Reid, John Dean, Russell D. Feingold, Senate Intelligence Committee, Richard (“Dick”) Durbin, Richard (“Dick”) Cheney, Nancy Pelosi, John Conyers

Timeline Tags: Civil Liberties

Judge Leonie Brinkema halts the trial of Zacarias Moussaoui (see March 6-May 4, 2006) after it is discovered that Transportation Security Administration lawyer Carla J. Martin violated a court order prohibiting witnesses from following the trial. Martin e-mailed transcripts to seven witnesses and coached them on their testimony. Brinkema calls it “the most egregious violation of the court’s rules on witnesses [I have seen] in all the years I’ve been on the bench.” Even the prosecution says, “We frankly cannot fathom why she engaged in such conduct.” [Washington Post, 3/14/2006; Associated Press, 3/17/2006] Brinkema allows the prosecution to continue to seek the death penalty, but initially removes the aviation security portion of evidence from its case. However, after the prosecution complains this makes the proceedings pointless, she reinstates some of it, allowing the trial to continue. [Associated Press, 3/15/2006; CNN, 3/16/2006; Associated Press, 3/17/2006] As a result of her actions, Martin is placed on paid leave. Additionally, Pennsylvania’s lawyer disciplinary board begins an investigation and federal prosecutors explore charges. [Washington Post, 7/10/2006] Martin’s e-mails also reveal that she has been communicating with attorneys for United and American Airlines. This prompts seven victims’ relatives, who are suing the airlines for being negligent on 9/11, to file a civil action against her alleging that she is trying to help the airline industry avoid civil liability. [CBS News, 4/7/2006; CNN, 4/26/2006]

Entity Tags: Leonie Brinkema, Carla Martin

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Several news organizations are subpoenaed by the Lewis Libby defense team (see February 27, 2006). The New York Times, NBC News, and Time magazine all say they have been subpoenaed for documents and records pertaining to Libby’s involvement in the Plame Wilson CIA identity leak. The Washington Post says it expects a subpoena as well. Libby’s lawyers want to use reporters to prove that Libby did not intentionally lie to the FBI (see October 14, 2003 and November 26, 2003) and to a grand jury (see March 5, 2004 and March 24, 2004) about disclosing Valerie Plame Wilson’s identity to the press. Instead, they intend to argue that Libby failed to remember important details about his conversations with reporters regarding Plame Wilson’s identity. The New York Times acknowledges that it has been asked to provide notes, e-mail messages, draft news articles, and all other documents that refer to Plame Wilson before July 14, 2003, when her identity was made public (see July 14, 2003), and information regarding its columnist Nicholas Kristof, who wrote an article featuring Plame Wilson’s husband, Joseph Wilson (see May 6, 2003). Times spokeswoman Catherine Mathis says the newspaper has not yet decided whether to comply with the subpoena. She says former Times reporter Judith Miller has received a separate subpoena (see June 23, 2003, 8:30 a.m. July 8, 2003, and Late Afternoon, July 12, 2003). NBC’s Tim Russert (see July 10 or 11, 2003) and Time’s Matt Cooper (see 2:24 p.m. July 12, 2003) have also been subpoenaed. The Post anticipates receiving a subpoena for its managing editor Bob Woodward (see November 14, 2005 and November 16-17, 2005). [US District Court for the District of Columbia, 3/14/2006 pdf file; US District Court for the District of Columbia, 3/14/2006 pdf file; Reuters, 3/16/2006; New York Times, 3/16/2006] Robert Bennett, a lawyer for Miller, says she will most likely fight the subpoena. “It’s entirely too broad,” he says. “It’s highly likely we’ll be filing something with the court.” [New York Times, 3/16/2006]

Entity Tags: Lewis (“Scooter”) Libby, Judith Miller, Catherine Mathis, Bob Woodward, Washington Post, Valerie Plame Wilson, Tim Russert, Joseph C. Wilson, New York Times, NBC News, Matthew Cooper, Nicholas Kristof, Robert T. Bennett, Time magazine

Timeline Tags: Niger Uranium and Plame Outing

The Libby defense team files a motion asking the court to disallow the prosecution to present classified information to Judge Reggie Walton without the defense’s presence. Special counsel Patrick Fitzgerald intends to argue that certain classified information is not pertinent to the defense of accused perjurer Lewis Libby, and wants to share that information with Walton, but not with Libby’s lawyers. Fitzgerald has argued that the information must be kept secret in order to protect national security, an argument that Libby’s lawyers say “rings hollow.” They tout Libby, who leaked classified information to reporters (see June 23, 2003, 8:30 a.m. July 8, 2003, and Late Afternoon, July 12, 2003), as someone who “has diligently protected some of this country’s most sensitive secrets throughout his many years of public service.” Fitzgerald has noted that an underlying criminal charge against Libby is the failure to adequately safeguard sensitive classified information. Walton has already ordered the government to turn over some classified information to the defense (see March 10, 2006). [Associated Press, 3/15/2006; US District Court for the District of Columbia, 3/15/2006 pdf file] Former state prosecutor Christy Hardin Smith observes that Libby has already violated his nondisclosure agreement against revealing classified information, and writes: “By breaking the law and releasing sensitive national security information, Scooter Libby forfeited his privilege of clearance—any presumption that he had the integrity to protect the nation’s secrets is gone. He is being treated like any other defendant in this situation—and who he worked for and how high his friends go in the government ought not matter one whit.” [Christy Hardin Smith, 3/16/2006]

Entity Tags: Reggie B. Walton, Lewis (“Scooter”) Libby, Christy Hardin Smith, Patrick J. Fitzgerald

Timeline Tags: Niger Uranium and Plame Outing

A court filing by Lewis Libby’s defense team lists the witnesses the lawyers say they intend to put on the stand in their client’s defense. The list includes:
bullet Former Deputy Secretary of State Richard Armitage (see June 13, 2003, After October 28, 2005, and November 14, 2005);
bullet Former White House press secretary Ari Fleischer (see July 7, 2003, 8:00 a.m. July 11, 2003, and 1:26 p.m. July 12, 2003);
bullet Former Undersecretary of State Marc Grossman (see June 10, 2003);
bullet Former Secretary of State Colin Powell (see July 16, 2004);
bullet White House political strategist Karl Rove (see July 8, 2003, July 8 or 9, 2003, and 11:00 a.m. July 11, 2003);
bullet Former CIA Director George Tenet (see June 11 or 12, 2003, July 11, 2003 and 3:09 p.m. July 11, 2003);
bullet Former US ambassador Joseph Wilson (see July 6, 2003);
bullet Former CIA covert operative Valerie Plame Wilson (see July 14, 2003);
bullet National Security Adviser Stephen Hadley (see July 21, 2003 and November 14, 2005);
bullet CIA briefers Craig Schmall (see 7:00 a.m. June 14, 2003), Peter Clement, and/or Matt Barrett;
bullet Former CIA officials Robert Grenier (see 4:30 p.m. June 10, 2003, 2:00 p.m. June 11, 2003, and 5:27 p.m. June 11, 2003) and/or John McLaughlin (see June 11 or 12, 2003);
bullet Former CIA spokesman Bill Harlow (see 5:27 p.m. June 11, 2003, (July 11, 2003), and Before July 14, 2003);
bullet Vice President Dick Cheney’s chief of staff David Addington (see July 8, 2003);
bullet Former Cheney press secretary Cathie Martin (see 5:27 p.m. June 11, 2003); and
bullet Cheney himself (see July 12, 2003 and Late September or Early October, 2003).
The defense also:
bullet Wants notes from a September 2003 White House briefing where Powell reportedly claimed that many people knew of Plame Wilson’s CIA identity before it became public knowledge;
bullet Implies that Grossman may not be an unbiased witness;
bullet Suspects Fleischer may have already cooperated with the investigation (see June 10, 2004);
bullet Intends to argue that Libby had no motive to lie to either the FBI (see October 14, 2003 and November 26, 2003) or the grand jury (see March 5, 2004 and March 24, 2004); and
bullet Intends to argue that columnist Robert Novak’s primary source for his column exposing Plame Wilson as a CIA official was not Libby, but “a source outside the White House” (see July 8, 2003). [US District Court for the District of Columbia, 3/17/2006 pdf file; Jeralyn Merritt, 3/18/2006]
Criminal defense attorney Jeralyn Merritt believes Libby’s team may be preparing to lay blame for the Plame Wilson leak on Grossman. She writes that, in her view, “Libby’s lawyers are publicly laying out how they intend to impeach him: by claiming he is not to be believed because (either or both) his true loyalty is to Richard Armitage rather than to the truth, or he is a self-aggrandizing government employee who thinks of himself a true patriot whose duty it is to save the integrity of the State Department.” [Jeralyn Merritt, 4/4/2006] Libby’s lawyers indicate that they will challenge Plame Wilson’s significance as a covert CIA official (see Fall 1992 - 1996, April 2001 and After, Before September 16, 2003, October 3, 2003, October 11, 2003, October 22-24, 2003, October 23-24, 2003, and February 13, 2006). “The prosecution has an interest in continuing to overstate the significance of Ms. Wilson’s affiliation with the CIA,” the court filing states. They also intend to attempt to blame Armitage, Grossman, Grenier, McLaughlin, Schmall, and/or other officials outside the White House proper as the real sources for the Plame Wilson identity leak. [US District Court for the District of Columbia, 3/17/2006 pdf file; Truthout (.org), 3/18/2006]

Entity Tags: Valerie Plame Wilson, Robert Novak, Robert Grenier, Catherine (“Cathie”) Martin, Colin Powell, Ari Fleischer, Central Intelligence Agency, Bush administration (43), Bill Harlow, Richard Armitage, Richard (“Dick”) Cheney, Stephen J. Hadley, Matt Barrett, George J. Tenet, Peter Clement, Craig Schmall, Jeralyn Merritt, John E. McLaughlin, David S. Addington, Karl C. Rove, Joseph C. Wilson, Marc Grossman, Lewis (“Scooter”) Libby

Timeline Tags: Niger Uranium and Plame Outing

Michael Rolince, who headed the FBI’s International Terrorism Operations Section when Zacarias Moussaoui was arrested, testifies at Moussaoui’s trial (see March 6-May 4, 2006). He initially states that he was only informed of the Moussaoui case before 9/11 in two brief hallway conversations (see Late August 2001) and did not read a memo sent to him by the Minneapolis field office. However, under cross-examination he admits he also discussed a plan to deport Moussaoui to France, where his belongings could be searched (see (August 30-September 10, 2001)). [Associated Press, 3/21/2006; Associated Press, 3/21/2006] According to Newsday, Rolince appears “red-faced and flustered” at the end of the cross-examination and makes the court burst out laughing when he says he did not approve a briefing to FBI field offices about bin Laden threats in the US (see Before April 13, 2001), even though the briefing states he approved it. He says one of his subordinates may have approved it. [Associated Press, 3/21/2006; Newsday, 3/22/2006] Rolince is called by the prosecution, which wants him to give a list of steps the FBI would have taken if Moussaoui had confessed. However, Judge Brinkema states that, “Juries cannot decide cases on speculation… Nobody knows what would have happened.” [Associated Press, 3/21/2006; Associated Press, 3/22/2006]

Entity Tags: Michael Rolince

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

During the trial of Zacarias Moussaoui (see also March 6-May 4, 2006), the prosecution claims that if Zacarias Moussaoui had not lied when arrested and questioned (see August 16, 2001) and had provided information about the plot (see August 16, 2001), the FAA could have altered its security procedures to deal with the suicide hijacker threat. Prosecution witness Robert Cammaroto, an aviation security officer, says that security measures in effect before 9/11 were designed to cope with different types of threats, such as “the homesick Cuban,” rather than suicide hijackings. He says that if the FAA had more information about Moussaoui, its three dozen air marshals could have been moved from international to domestic flights, security checkpoints could have been tightened to detect short knives like the ones Moussaoui had, and flight crews could have been instructed to resist rather than cooperate with hijackers. Most of these steps could have been implemented within a matter of hours. However, Cammarato admits that the FAA was aware before 9/11 that terrorists considered flying a plane into the Eiffel Tower and that al-Qaeda has performed suicide operations on land and sea. [Associated Press, 3/22/2006]

Entity Tags: Federal Aviation Administration, Robert Cammarato, Carla Martin, Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Ahmed Alnami’s youth hosteling card found in the Flight 93 crash site.Ahmed Alnami’s youth hosteling card found in the Flight 93 crash site. [Source: FBI]During the trial of Zacarias Moussaoui (see March 6-May 4, 2006), the Reporters Committee for Freedom of the Press publishes a significant portion of the exhibits used during the trial. [Reporters Committee for Freedom of the Press, 12/4/2006] Previously, only a few items of the evidence linking the attacks to al-Qaeda were made public. For example, the 9/11 Commission’s Terrorist Travel Monograph contained 18 documents of the alleged hijackers and their associates. [9/11 Commission, 8/21/2004, pp. 171-195 pdf file] The published exhibits include:
bullet Items belonging to the alleged hijackers that were recovered from the crash sites and Logan airport;
bullet Some details of the hijackers’ movements in the US;
bullet Graphic photos of dead victims and body parts in the Pentagon and WTC ruins;
bullet Substitutions for testimony from some of the main plotters such as Khalid Shaikh Mohammed;
bullet The missing chapter from the Justice Department’s Office of Inspector General’s review of the FBI’s performance before 9/11 (see June 9, 2005); and
bullet FBI and CIA documents. [Reporters Committee for Freedom of the Press, 12/4/2006]
At the end of July, the US District Court for the Eastern District of Virginia, Alexandria Division, publishes more of the exhibits used in the trial. The additionally published exhibits include, for example:
bullet Documents of the hijackers found at the crash sites and Logan airport, such as Satam Al Suqami’s passport (see After 8:46 a.m. September 11, 2001), Ahmed Alnami’s youth hosteling card, and old correspondence between Mohamed Atta and the German authorities;
bullet Recordings of calls made by the passengers from the flights and recordings of the hijacker pilots talking to the passengers;
bullet Documents about the alleged hijackers prepared by the FBI such as a True Name Usage Chart for 2001 and chronologies for eleven of the hijackers from August 16-September 11, 2001;
bullet Documents from the hijackers’ flight schools;
bullet A small sample of the hijackers’ banking and phone records.
However, some of the exhibits are not disclosed. For example, the cockpit voice recording from United 93 is sealed and only a transcript is made available. [US District Court for the Eastern District of Virginia, 7/31/2006]

Entity Tags: Reporters Committee for Freedom of the Press

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Responding to President Bush’s signing statement indicating that he will not comply with several oversight provisions in the USA Patriot Act reauthorization (see March 9, 2006), House members Jane Harman (D-CA) and John Conyers (D-MI) write to Attorney General Alberto Gonzales asking that the administration rescind the statement. They write, “As you know, ‘signing statements’ do not have the force of law. Legislation passed by both Houses and signed by the President does. As Article 1, Section 7, of the Constitution states: ‘Every Bill which shall have passed the House of Representatives and the Senate, shall, before it become a Law, be presented to the President of the United States; If he approve he shall sign it, but if not he shall return it.’ If the President does not like part of a bill, he has only one option: to veto the entire thing. This signing statement, and many of the 107 similar statements the President has issued on other legislation, have the effect of corrupting the legislative process. Indeed, during consideration of this matter, many Members who supported the final law did so based upon the guarantee of additional reporting and oversight. This Administration cannot, after the fact, unilaterally repeal provisions of the law implementing such oversight.” [US House of Representatives, 3/29/2006]

Entity Tags: Jane Harman, Alberto R. Gonzales, George W. Bush, John Conyers, USA Patriot Act, Bush administration (43)

Timeline Tags: Civil Liberties

Four statements based on the CIA inspector general’s report on some aspects of the agency’s performance before 9/11 are introduced as evidence at the trial of Zacarias Moussaoui by the defense. The report was completed in 2004 (see June-November 2004), but rewritten and is still secret (see January 7, 2005). The four passages say:
bullet “Numerous” CIA officers accessed cables reporting that Khalid Almihdhar’s passport contained a US visa and Nawaf Alhazmi had flown from Thailand to Los Angeles (see Mid-January-March 2000); [US District Court for the Eastern District of Virginia, Alexandria District, 3/28/2006 pdf file]
bullet FBI Director Louis Freeh was briefed about Almihdhar in January 2000, but not told that Almihdhar had a US visa (see January 6-9, 2000); [US District Court for the Eastern District of Virginia, Alexandria Division, 3/28/2006 pdf file]
bullet Nobody at Alec Station, the CIA’s bin Laden unit, notified CIA personnel authorized to collect foreign intelligence in the US together with the FBI about Almihdhar’s US visa (see 9:30 a.m. - 4:00 p.m. January 5, 2000); [US District Court for the Eastern District of Virginia, Alexandria Division, 3/28/2006 pdf file]
bullet The CIA was unaware of the Phoenix memo until after 9/11 (note: this may not actually be true—see (July 27, 2001)). [US District Court for the Eastern District of Virginia, Alexandria Division, 3/28/2005 pdf file]
Two sections of the 9/11 Congressional Inquiry report are also introduced as evidence as substitutes for the CIA inspector general’s report. They cover the use of aircraft as weapons and US knowledge of bin Laden’s intentions to strike inside the US in the summer of 2001. [US District Court for the Eastern District of Virginia, Alexandria Division, 3/28/2006 pdf file; US District Court for the Eastern District of Virginia, Alexandria Division, 3/28/2006 pdf file]

Entity Tags: Office of the Inspector General (CIA), Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Expert witness J. Scott Marcus, in an analysis submitted on behalf of the Electronic Frontier Foundation’s lawsuit against AT&T (see January 31, 2006), notes that if the NSA had wanted to intercept only international electronic communications in its surveillance operations facilited by AT&T (see January 16, 2004), it would have placed “splitters” only at entry points such as ocean cable-head stations rather than in AT&T offices (see October 2003) in locations such as Atlanta and San Francisco (see Late 2003), where they would inevitably pick up huge amounts of domestic communications. Marcus, a former AT&T employee who held a top secret clearance when he was a consultant for the Federal Communications Commission (FCC), writes: “The majority of international IP [Internet Protocol] traffic enters the United States at a limited number of locations, many of them in the areas of northern Virginia, Silicon Valley, New York, and (for Latin America) south Florida. This deployment, however, is neither modest nor limited, and it apparently involves considerably more locations that would be required to catch the majority of international traffic.” (Emphasis in original.) Marcus continues: “I conclude that the designers of the SG3 Configuration (see Late 2003) made no attempt, in terms of the location or position of the fiber split, to exclude data sources primarily comprised of domestic data.… Once the data has been diverted, there is nothing in the data that reliably and unambiguously distinguishes whether the destination is domestic or foreign.” Marcus estimates that the NSA has 15 to 20 sites in AT&T facilities around the country, and says, “a substantial fraction, probably well over half, of AT&T’s purely domestic traffic was diverted.” Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Though Marcus refrained from drawing the obvious conclusion, the facts strongly suggest that this entire apparatus was designed for domestic spying.” (Emphasis in original). [Klein, 2009, pp. 49-50, 71] Klein will also write that Marcus’s expertise “was at a much higher level than mine.” Klein will later write that he is pleased that Marcus’s statement validates and supports his own documentation and conclusions. [Klein, 2009, pp. 71]

Entity Tags: National Security Agency, AT&T, Electronic Frontier Foundation, Mark Klein, J. Scott Marcus

Timeline Tags: Civil Liberties

Conservative Party leader David Cameron.Conservative Party leader David Cameron. [Source: Public domain]Following the London bombings (see July 7, 2005), Britain passes a new Terrorism Act containing tougher laws, but they have little practical effect and many Islamic radicals carry on as before. The act introduces new offenses such as criminalizing the encouragement of terrorism and dissemination of terrorist publications, but the most controversial measure is an extension of the period for which suspects could be detained without trial. The government pushes for an extension from 14 days to 90 days, but parliament only allows 28 days. [Guardian, 11/9/2005; London Times, 11/9/2005; BBC, 11/9/2005; UK Parliament. House of Commons., 3/30/2006] In August 2006, Conservative Party leader David Cameron will criticize the government for failing to “follow-though when the headlines have moved on.” He asks, “Why have so few, if any, preachers of hate been prosecuted or expelled?” and “why has so little been done to use the existing law to deal with the radicalization that is rife within our shores?” He also criticizes the government for funding conferences addressed by radical imam Yousuf Abdullah Al-Qaradawi. [Conservative Party, 8/15/2006]

Entity Tags: David Cameron, Yousuf Abdullah Al-Qaradawi, Terrorism Act of 2006

Timeline Tags: Complete 911 Timeline, Civil Liberties

The Justice Department demands that it be allowed to review evidence obtained by the Electronic Frontier Foundation (EFF) from retired AT&T technician Mark Klein (see February 23-28, 2006). The EFF is preparing to submit the evidence under regular court seal to presiding Judge Vaughn Walker. Neither the Justice Department nor any other government agency is a named defendant in the EFF’s lawsuit against AT&T for its allegedly illegal behavior in working with the National Security Agency (NSA) to conduct warrantless surveillance against American citizens (see January 31, 2006). Even so, lawyers from the Justice Department say they want to see if Klein’s documentation contains classified information (it does not—see Late 2003), and if so, they intend to place Klein’s documentation into a “sensitive compartmented information facility,” which would mean it would not be kept at the courthouse but in the possession of government agents at a secure location. Such classification would make the legal proceedings more difficult for both Judge Walker and the EFF lawyers. However, the request piques the interest of the national media, and reporters begin “flooding” Klein and the EFF with requests for information and interviews. [Klein, 2009, pp. 65-66] Ironically, two news outlets, the Los Angeles Times and New York Times, have all but shunned Klein before now (see February 11, 2006 and After and Mid-February - Late March, 2006). On April 4, after perusing the documents, the government lawyers return them to Walker with approval from senior Justice Department lawyer Anthony J. Coppolino to file them under ordinary court seal. Klein will later write that Coppolino’s acquiescence will undermine the government’s later efforts to have the lawsuit dismissed under the “state secrets” provision (see Late May, 2006). [Klein, 2009, pp. 66] In June 2007, the online technical news site Wired News will publish the documents after they are released by the Electronic Frontier Foundation (see June 13, 2007) under the headline “AT&T ‘Spy Room’ Documents Unsealed; You’ve Already Seen Them.” Wired previously published them in May 2006 (see May 17, 2006), and PBS’s Frontline also published them as part of a televised documentary on Klein and the eavesdropping program. [Wired News, 6/13/2007]

Entity Tags: Mark Klein, AT&T, Anthony J. Coppolino, Los Angeles Times, US Department of Justice, New York Times, Electronic Frontier Foundation, Vaughn Walker, Wired News, National Security Agency

Timeline Tags: Civil Liberties

Lawmakers in Congress complain that restrictions on their discussion of upcoming appropriations bills make it almost impossible to conduct appropriate oversight on those bills. The House votes 327 to 96 to authorize an appropriations bill to fight the administration’s war on terror, but only about a dozen members have actually read the bill. Rules adopted by the Republican leadership of both houses in concert with the White House (see February 1, 2004) allow lawmakers to read the bills, but prohibit discussing the contents of those bills, even if that information has already been leaked to the press, under penalty of criminal prosecution and expulsion from Congress. “It’s a trap,” says Representative Russ Carnahan (D-MO), referring to the restrictions on discussing the bill. “Either way, you’re flying blind.” Carnahan’s colleague, Walter Jones (R-NC) agrees: “We ought to be doing a better job on oversight, [but] if you’re not going to be able to question it or challenge it, that makes it difficult.” [Savage, 2007, pp. 117]

Entity Tags: Walter Jones, Bush administration (43), Russ Carnahan

Timeline Tags: Civil Liberties

Jeffrey Rapp, the director of the Joint Intelligence Task Force for Combating Terrorism at the Defense Intelligence Agency, provides a 16-page document supporting the government’s declaration that Ali Saleh Kahlah al-Marri is an enemy combatant (see December 12, 2001). Rapp gives the classified document, originally prepared in September 2004 and partially declassified for the court, to the trial judge presiding over the case, Henry Floyd (see April 6, 2006). The document, informally known as the “Rapp Declarations,” makes an array of charges against al-Marri, including alleging that he “met personally” with Osama bin Laden and was sent to the US to “explore computer-hacking methods to disrupt bank records and the US financial system.” Rapp claims that al-Marri was trained in the use of poisons and had detailed information about poisonous chemicals on his laptop computer, a claim verified by an FBI search. Additionally, Rapp says that al-Qaeda “instructed al-Marri to explore possibilities for hacking into the mainframe computers of banks with the objective of wreaking havoc on US banking records.” Rapp also says that al-Marri’s computer was loaded with “numerous computer programs typically utilized by computer hackers; ‘proxy’ computer software which can be utilized to hide a user’s origin or identity when connected to the Internet; and bookmarked lists of favorite Web sites apparently devoted to computer hacking.” Rapp refuses to cite any sources other than “specific intelligence sources” that are “highly classified.” [Jeffrey M. Rapp, 9/9/2004 pdf file; CNET News, 9/22/2006] While this kind of evidence is routinely dismissed as hearsay evidence inadmissible in court, Floyd rules that because the Supreme Court ruled in Hamdi v. Rumsfeld that hearsay evidence can be used against alleged enemy combatants (see June 28, 2004), the “Rapp Declarations” would be considered. Floyd says that al-Marri’s lawyers will have to provide “more persuasive evidence” that counters the government’s case—a reversal of the usual burden of proof that places the responsibility of proving guilt on the prosecution and not the defense. [CNET News, 9/22/2006]

Entity Tags: Henry Floyd, Defense Intelligence Agency, Joint Intelligence Task Force for Combating Terrorism (DIA), Jeffrey Rapp, Al-Qaeda, Ali Saleh Kahlah al-Marri

Timeline Tags: Torture of US Captives, Civil Liberties

Retired AT&T technician and incipient whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) issues his first press release, summarizing his knowledge of AT&T’s complicity with the National Security Agency (NSA) in that agency’s illegal domestic wiretapping program (see December 31, 2005). Klein has given documentation supporting his claims to the Electronic Frontier Foundation (EFF) in support of that organization’s lawsuit against AT&T (see January 31, 2006). Klein’s press release tells of the NSA’s “secret room” in AT&T’s Folsom Street, San Francisco, facility (see January 2003) and reveals for the first time the NSA’s use of the Narus STA 6400 to comb through the wiretapped data (see January 16, 2004). The release reads in part: “Based on my understanding of the connections and equipment at issue, it appears the NSA is capable of conducting what amounts to vacuum-cleaner surveillance of all the data crossing the Internet—whether that be people’s email, Web surfing, or any other data. Given the public debate about the constitutionality of the Bush administration’s spying on US citizens without obtaining a FISA warrant (see December 18, 2005, December 20, 2005, December 21, 2005, December 21, 2005, December 25, 2005, January 5, 2006, January 10, 2006, January 18, 2006, January 18, 2006, and January 31, 2006), I think it is critical that this information be brought out into the open, and that the American people be told the truth about the extent of the administration’s warrantless surveillance practices, particularly as it relates to the Internet. Despite what we are hearing (see December 19, 2005, December 19, 2005, December 21-22, 2005, and January 19, 2006), and considering the public track record of this administration (see December 24, 2005, Early 2006, January 23, 2006, January 25-26, 2006, and February 2, 2006), I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” Klein issues the press release in part to give himself some publicity, and the protection from government harassment such publicity might entail (see February 11, 2006 and After). [Wired News, 4/7/2006; Wired News, 4/7/2006; Klein, 2009, pp. 66-67]

Entity Tags: Electronic Frontier Foundation, AT&T, Bush administration (43), National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

The New York Times publishes its first report on the allegations by former AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), who is providing evidence and documentation to the Electronic Frontier Foundation (EFF) for that organization’s lawsuit against AT&T (see December 31, 2005 and January 31, 2006). The three-paragraph squib, buried deep in the pages of the “A” section, says that AT&T “cooperated with the National Security Agency in 2003 to install equipment capable of ‘vacuum-cleaner surveillance’ of email messages and other Internet traffic.” The report is based in part on a recent press release issued by Klein (see April 6, 2006), and notes the EFF lawsuit in passing. It admits that Klein has provided some of the documentation to the press, if not to the Times itself (see Mid-February - Late March, 2006), but simply writes that Klein’s documents “describe a room at the AT&T Internet and telephone hub in San Francisco that contained a piece of equipment that could sift through large volumes of Internet traffic.” Klein later calls the brevity and incompleteness of the report “puzzling,” and will say, “Their only purpose seemed to be to signal the government that I had ‘provided’ the New York Times with the documents, while minimizing the story for everyone else.” Klein will speculate, “It looked like some kind of backroom brawl was going on, but the public could not know the details.” [New York Times, 4/7/2006; Klein, 2009, pp. 70] A week later, the Times will publish a more in-depth article (see April 12, 2006).

Entity Tags: Mark Klein, AT&T, Electronic Frontier Foundation, New York Times, National Security Agency

Timeline Tags: Civil Liberties

Special counsel Patrick Fitzgerald accuses “multiple people in the White House” of engaging in a “concerted action” to smear the character of war critic Joseph Wilson (see June 2003, June 3, 2003, June 11, 2003, June 12, 2003, June 19 or 20, 2003, July 6, 2003, July 6-10, 2003, July 7, 2003 or Shortly After, 8:45 a.m. July 7, 2003, 9:22 a.m. July 7, 2003, July 7-8, 2003, July 11, 2003, (July 11, 2003), July 12, 2003, July 12, 2003, July 18, 2003, October 1, 2003, and April 5, 2006), using classified information (see April 5, 2006) to do so. Fitzgerald places Vice President Dick Cheney at the heart of the smear campaign. He uses grand jury testimony from Cheney’s former chief of staff, Lewis Libby (see March 5, 2004 and March 24, 2004), to substantiate his charges. Libby’s efforts to spread false rumors via classified information include his June 2003 meeting with Washington Post reporter Bob Woodward (see June 27, 2003), his two conversations with New York Times reporter Judith Miller (see 8:30 a.m. July 8, 2003 and Late Afternoon, July 12, 2003), and his conversation with Time reporter Matthew Cooper (see 2:24 p.m. July 12, 2003). Fitzgerald says that White House officials besides Cheney, Libby, and White House political strategist Karl Rove are involved in the Wilson smear campaign. According to Fitzgerald, the grand jury has collected so much testimony and so many documents that “it is hard to conceive of what evidence there could be that would disprove the existence of White House efforts to ‘punish’ Wilson.” [Washington Post, 4/9/2006]

Entity Tags: Joseph C. Wilson, Bush administration (43), Richard (“Dick”) Cheney, Karl C. Rove, Patrick J. Fitzgerald, Lewis (“Scooter”) Libby

Timeline Tags: Niger Uranium and Plame Outing

Former Secretary of State Colin Powell tells reporter Robert Scheer that neither he nor any of the State Department’s top experts believed that Iraq ever posed an imminent nuclear threat, contrary to the statements of President Bush, Vice President Dick Cheney, and other top White House officials. Powell says that Bush followed the advice of Cheney and the CIA (see October 1, 2002) in making the claim (see Mid-January 2003 and 9:01 pm January 28, 2003) and taking the country to war in Iraq. Scheer asks Powell why, in light of the State Department’s own intelligence bureau correctly concluding that the claims that Iraq attempted to buy uranium from Niger were false (see March 1, 2002, March 4, 2002, Mid-October 2002, and January 12, 2003), Bush ignored that information in making his case for war? Powell responds: “The CIA was pushing the aluminum tube argument heavily (see March 7, 2003) and Cheney went with that instead of what our guys wrote. That was a big mistake. It should never have been in the speech. I didn’t need [former ambassador Joseph] Wilson to tell me that there wasn’t a Niger connection. He didn’t tell us anything we didn’t already know. I never believed it” (see January 26, 2003). Powell adds that the responsibility for pressing the argument that Iraq was a nuclear threat was not Bush’s; rather, “That was all Cheney.” In his article, Scheer asks, “Why was this doubt, on the part of the secretary of state and others, about the salient facts justifying the invasion of Iraq kept from the public until we heard the truth from whistle-blower Wilson, whose credibility the president then sought to destroy?” [Truthdig, 4/11/2006]

Entity Tags: Robert Scheer, Bush administration (43), Central Intelligence Agency, Richard (“Dick”) Cheney, Colin Powell, US Department of State, Joseph C. Wilson, George W. Bush

Timeline Tags: Events Leading to Iraq Invasion

A former senior government official says that President Bush’s selective declassification of portions of the National Intelligence Estimate (NIE—see October 1, 2002) for political purposes (see April 5, 2006), as testified to by Lewis Libby (see March 5, 2004 and March 24, 2004), was a misuse of the classification process for political reasons. Bush and his top officials released certain sections of the NIE to journalists (see 8:30 a.m. July 8, 2003) in an attempt to bolster their arguments in favor of invading Iraq, yet concealed other sections that showed how they misrepresented intelligence to suit their arguments. The former senior official says that the selective declassification was intertwined with the attempts to besmirch the reputation of war critic Joseph Wilson: “It was part and parcel of the same effort, but people don’t see it in that context yet.” The identify of the official is unstated. [National Journal, 4/6/2006] In 2007, Wilson’s wife, current senior CIA case officer Valerie Plame Wilson, will write that she experiences “a rush of relief” upon reading a New York Times story that reveals the “selective declassification” and the Times’s conclusion that “[i]t is hard to conceive of what evidence there could be that would disprove the existence of White House efforts to punish Wilson” (see April 5, 2006). [Wilson, 2007, pp. 244]

Entity Tags: Joseph C. Wilson, Valerie Plame Wilson, Lewis (“Scooter”) Libby, George W. Bush

Timeline Tags: Niger Uranium and Plame Outing

The New York Times does a more in-depth report on the allegations advanced by former AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), who is providing evidence and documentation to the Electronic Frontier Foundation (EFF) for that organization’s lawsuit against AT&T (see December 31, 2005 and January 31, 2006). The Times published a far briefer report five days earlier (see April 7, 2006). The article provides a brief synopsis of Klein’s allegations—that AT&T worked with the National Security Agency (NSA) to illegally monitor and record millions of Americans’ telephone and Internet communications and thus illegally invaded its customers’ privacy. It also notes, as did the first article, that Klein had provided some of his documentation “to reporters,” though neither article admits that the Times received the documents months beforehand (see Mid-February - Late March, 2006). The new information in the article is the conclusion of “four independent telecommunications and computer security experts” who examined Klein’s documents “at the request of The New York Times.” According to the four experts, the documents “describe equipment capable of monitoring a large quantity of email messages, Internet phone calls, and other Internet traffic. The equipment… was able to select messages that could be identified by keywords, Internet or email addresses, or country of origin and divert copies to another location for further analysis.” All four experts agreed that the documents proved “AT&T had an agreement with the federal government to systematically gather information flowing on the Internet through the company’s network. The gathering of such information, known as data mining, involves the use of sophisticated computer programs to detect patterns or glean useful intelligence from masses of information.” Brian Reid, the director of engineering at the Internet Systems Consortium, says of the AT&T/NSA project: “This took expert planning and hundreds of millions of dollars to build. This is the correct way to do high volume Internet snooping.” An expert who refuses to be named says the documents are “consistent” with Bush administration claims that the NSA only monitored foreign communications and communications between foreign and US locations, in part because of the location of the monitoring sites. (An expert witness, former AT&T and FCC employee J. Scott Marcus, has given testimony for EFF that flatly contradicts this expert’s assertions—see March 29, 2006). The article notes the Justice Department’s objections to Klein’s documents being filed with the court in the EFF lawsuit, and notes that the department withdrew its objections (see Late March - April 4, 2006). It also notes AT&T’s request for the court to order the EFF to return the documents because they are, the firm claimed, “proprietary” (see April 6-8, 2006). AT&T spokesman Walt Sharp says of Klein and the EFF lawsuit: “AT&T does follow all laws with respect to assistance offered to government agencies. However, we are not in a position to comment on matters of national security.” NSA spokesman Don Weber makes a similar statement: “It would be irresponsible of us to discuss actual or alleged operational issues as it would give those wishing to do harm to the United States the ability to adjust and potentially inflict harm.” [New York Times, 4/12/2006] Klein will write of the story, “Finally it was out there in a major newspaper, though I noticed that the New York Times did not show any images of the actual documents, and never called me back for an in-depth followup story.” [Klein, 2009, pp. 71]

Entity Tags: J. Scott Marcus, Brian Reid, AT&T, Bush administration (43), Electronic Frontier Foundation, National Security Agency, Walter Sharp, Mark Klein, Don Weber, New York Times, US Department of Justice

Timeline Tags: Civil Liberties

Lawyers for indicted White House official Lewis “Scooter” Libby tell reporters that their client did not testify that either President Bush or Vice President Dick Cheney authorized him to disclose the identify of then-CIA agent Valerie Plame Wilson to reporters. After recent court filings by special prosecutor Patrick Fitzgerald revealed that Libby had testified about being authorized to disclose classified information to reporters by Bush and Cheney (see April 5, 2006), many reporters, pundits, and Internet bloggers have speculated that Libby was authorized by Bush and Cheney to reveal Plame Wilson’s identity. Libby’s lawyers say he never mentioned Plame Wilson’s name in conversations with reporters, and therefore never took part in a campaign to besmirch the reputation of her husband, former ambassador Joseph Wilson (see June 23, 2003, 8:30 a.m. July 8, 2003, 2:24 p.m. July 12, 2003, and Late Afternoon, July 12, 2003). The assertion is contradicted by several reporters (see June 23, 2003, 8:30 a.m. July 8, 2003, 2:24 p.m. July 12, 2003, and Late Afternoon, July 12, 2003). Fitzgerald has asserted that Libby revealed Plame Wilson’s identity as a covert CIA agent in order to allege that she sent her husband to Niger to debunk the tales of Iraqi attempts to buy Nigerien uranium “on account of nepotism” (see April 5, 2006). [Washington Post, 4/13/2006]

Entity Tags: Lewis (“Scooter”) Libby, George W. Bush, Patrick J. Fitzgerald, Richard (“Dick”) Cheney, Valerie Plame Wilson

Timeline Tags: Niger Uranium and Plame Outing

The New York Times prints a brief editorial in response to its article about AT&T whistleblower Mark Klein and his allegations that the company is colluding with the NSA to illegally wiretap Americans’ communications and compromise their privacy (see April 12, 2006). The editorial recommends: “If AT&T is violating its customers’ privacy rights, it should come clean and stop immediately.… AT&T has a reason to worry if it is participating in illegal domestic spying. In the age of unfettered communication, no company should want to get a reputation for allowing the government to listen in on its customers’ phone calls, read their e-mail, and monitor their Web activity without the requisite legal showing.” [New York Times, 4/17/2006]

Entity Tags: AT&T, New York Times, National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

Lawyers for NBC News, the New York Times, Time magazine, and Time reporter Matt Cooper file motions to quash the Lewis Libby defense team’s subpoenas (see March 14, 2006). Lawyers for the Times argue that the newspaper “has a substantial First Amendment interest, and common law qualified privilege against compelled production of unpublished information of the kind sought by Libby.” Time magazine notes Libby’s argument that since he believed Valerie Plame Wilson’s CIA identity was well known within the Washington press corps, he needs to show that her employment was discussed by reporters in June and July 2003, when he was meeting with reporters. Time says that the Libby argument should not allow his lawyers to conduct a broad search for potentially helpful evidence. “Although Mr. Libby has claimed a right to know what information the press corps in general possessed concerning Mrs. Wilson’s affiliation with the CIA, under that theory he would be entitled to subpoena all reporters in Washington to learn what they knew, and when they knew it,” Time argues in its motion. “There is no stopping point to this approach.” Other lawyers for the news organizations call the Libby subpoenas “fishing expeditions.” NBC News argues that it has no documents that show that any network employee, including reporters Andrea Mitchell and Tim Russert, knew that Plame Wilson was employed by the CIA before her public exposure (see July 14, 2003). Through his lawyers, Cooper argues that the subpoena from Libby is “materially the same as the subpoena issued to Time Inc.” by special counsel Patrick Fitzgerald, and is “overbroad, unreasonable, and burdensome… and seeks information protected by the reporter’s privilege that exists under the First Amendment.” [US District Court for the District of Columbia, 4/18/2006 pdf file; New York Times, 4/19/2006; Washington Post, 4/19/2006]

Entity Tags: New York Times, Andrea Mitchell, Lewis (“Scooter”) Libby, NBC News, Tim Russert, Valerie Plame Wilson, Patrick J. Fitzgerald, Matthew Cooper, Time magazine

Timeline Tags: Niger Uranium and Plame Outing

Progressive columnist, author, and blogger Arianna Huffington writes that the recent motions by the New York Times, Time magazine, and other news organizations to quash subpoenas issued by the Lewis Libby defense team (see April 18, 2006) raise more questions than the organizations may be willing to answer. Huffington says that lawyers for the New York Times and its reporter Judith Miller are correct in calling Libby’s subpoenas a “fishing expedition” and accusing the lawyers of casting an overly “wide net.” However, the Times motion, in conjunction with the original Libby subpoena (see March 14, 2006), reveals that Libby’s lawyers want to know more about the situation surrounding Miller’s July 2003 conversation with Libby, in which he divulged classified information to her in order to influence her reporting on Iraq (see 8:30 a.m. July 8, 2003). Specifically, Libby’s lawyers, as well as Huffington and others, want to know if Miller proposed writing a story based on Libby’s disclosures. As Huffington writes: “If she did pitch the story, which Times editor did she pitch it to? What was their reaction? Why did no story result? Had the editors become so suspect of Miller’s sources and reporting that they refused to sign off on the story? Was she officially barred from writing about Iraq/WMD?” Huffington observes that it is obvious the Libby team intends to impugn Miller’s integrity as a journalist, and writes that such a defense tactic “mak[es] it all the more important for the paper to stop operating behind a veil of secrecy when it comes to Miller.” Huffington also notes that Miller has spoken to Times in-house lawyer George Freeman and to Vanity Fair reporter Marie Brenner about Valerie Plame Wilson; Brenner wrote an article saying that Miller had talked to numerous government officials about Plame Wilson’s identity both before and after her outing by columnist Robert Novak (see July 14, 2003). [Huffington Post, 4/20/2006] Lawyer Jeralyn Merritt, writing for the progressive legal blog TalkLeft, notes that special counsel Patrick Fitzgerald is likely very interested in determining which government officials Miller may have spoken to about Plame Wilson, but goes on to write that Miller may have already disclosed that information to Fitzgerald. [Jeralyn Merritt, 4/20/2006]

Entity Tags: New York Times, Jeralyn Merritt, George Freeman, Arianna Huffington, Judith Miller, Marie Brenner, Patrick J. Fitzgerald, Time magazine, Lewis (“Scooter”) Libby, Valerie Plame Wilson, Robert Novak

Timeline Tags: Niger Uranium and Plame Outing

William Jeffress, one of Libby’s lawyers.William Jeffress, one of Libby’s lawyers. [Source: Life]The legal team for accused felon Lewis Libby admits to twice leaking information to the media (see April 12, 2006). The admissions are included in a filing submitted by Libby’s lawyers in response to Judge Reggie Walton’s threat to issue a gag order (see April 13, 2006). The threatened gag order was in response to multiple press leaks emanating from “unnamed sources” involved in the Libby trial. Libby’s lawyers oppose the proposed gag order, which would dramatically curtail the lawyers’ ability to speak to reporters about the legal proceedings; special prosecutor Patrick Fitzgerald says he has no opinion on a gag order because his office does not talk to the media anyway. Libby’s lawyers acknowledge leaking two documents: Fitzgerald’s “correction” letter to an earlier statement implying that Libby had mischaracterized some of the elements of the 2002 National Intelligence Estimate (see October 1, 2002) to reporter Judith Miller, and information given to a Washington Post reporter to correct what lawyer William Jeffress believed was a misunderstanding on that reporter’s part that might have resulted in erroneous information being reported.
First Leak - Libby’s lawyers say they released the Fitzgerald letter to the press “in good faith,” and do not believe the release goes against the court’s earlier restrictions on making information public. They write: “When we received the letter, we assumed that the government wanted to correct the public record. We thought the government was motivated to file the letter because the government had realized that the erroneous sentence in its brief was responsible for spawning false news reports and wholly unjustified conjecture about possible misdeeds by Mr. Libby and his superiors. Nothing about the letter indicated that it was not to be disclosed publicly. It was not designated as confidential under the protective order in this case, and it did not contain any classified information.… When we received the letter, we simply assumed that it was a public filing that was intended to be entered in the public docket, because we believed its sole purpose was to correct inaccurate statements in a publicly filed brief. Accordingly, we swiftly disseminated it to the media—without any public statements by defense counsel—for the purpose of preventing the publication of any additional incorrect reports that Mr. Libby, the president, and/or the vice president had lied to the press and the public.” The lawyers deny releasing the letter for any “tactical advantage or for any other improper purpose.”
Second Leak - Jeffress spoke with one of two Washington Post reporters, R. Jeffrey Smith or Jim VandeHei. The reporter apparently misunderstood the content of an argument in an earlier legal brief, and called Libby’s legal team to discuss the brief. The reporter intended to file a report showing that Fitzgerald’s evidence undermined Libby’s contention that no one in the Bush White House was overly concerned with the criticisms of former ambassador Joseph Wilson (see June 2003, June 3, 2003, June 11, 2003, June 12, 2003, June 19 or 20, 2003, July 6, 2003, July 6-10, 2003, July 7, 2003 or Shortly After, 8:45 a.m. July 7, 2003, 9:22 a.m. July 7, 2003, July 7-8, 2003, July 11, 2003, (July 11, 2003), July 12, 2003, July 12, 2003, July 18, 2003, October 1, 2003, April 5, 2006, and April 9, 2006). Jeffress’s intent, he tells Judge Walton, was merely to ensure that the Post published an accurate news report that did not misconstrue the legal brief. Again, Jeffress says that he intended to gain no “tactical advantage” or “to interfere with a fair trial or otherwise prejudice the due administration of justice.” He was, he asserts, merely concerned that such an inaccurate report “would have been unfairly prejudicial to Mr. Libby.”
Convincing Arguments? - Criminal lawyer Jeralyn Merritt, writing for the blog TalkLeft, says that she finds the rationales for the two leaks convincing, and doubts that Judge Walton will issue any gag order. [Jeralyn Merritt, 4/21/2006; US District Court for the District of Columbia, 4/21/2006 pdf file; US District Court for the District of Columbia, 4/21/2006 pdf file; US District Court for the District of Columbia, 4/21/2006 pdf file]
Not the Only Press Leaks? - Author and blogger Marcy Wheeler, who has covered the trial since before it started, contends that Libby’s team is trying to imply that these two leaks are the only ones it has made. She strongly disagrees with this implication, and says that while there is no way to know what, if any, information the Libby team has leaked to the press besides these two incidents, the entire trial is about carefully orchestrated press leaks and Libby’s perjury about said leaks, and says she doubts the Libby team’s contention that they have not leaked other information to any members of the press. [Marcy Wheeler, 4/22/2006]

Entity Tags: Jeralyn Merritt, Jim VandeHei, Lewis (“Scooter”) Libby, Bush administration (43), Marcy Wheeler, Judith Miller, William Jeffress, Patrick J. Fitzgerald, Joseph C. Wilson, R. Jeffrey Smith, Washington Post, Reggie B. Walton

Timeline Tags: Niger Uranium and Plame Outing

CBS’s 60 Minutes airs a half-hour interview with Italian journalist Elisabetta Burba, the first reporter to obtain the now-infamous forged documents that purported to show that Iraq attempted to buy uranium from Niger (see Between Late 2000 and September 11, 2001, Late September 2001-Early October 2001, October 15, 2001, December 2001, February 5, 2002, February 12, 2002, October 9, 2002, October 15, 2002, January 2003, February 17, 2003, March 7, 2003, March 8, 2003, and 3:09 p.m. July 11, 2003). The now-defunct 60 Minutes II had planned to show the segment just before the November 2004 elections, but questions from right-wing bloggers and commentators about another 60 Minutes II segment—one that showed President Bush did not fulfill his Texas Air National Guard duties during the Vietnam War—led CBS executives to pull the segment (see Late September 2004). [Newsweek, 9/23/2004; Rich, 2006, pp. 142-143; CBS News, 4/23/2006] CBS News president Andrew Heyward refused to air the story during the last week of September 2004, saying it would be “inappropriate” to air it during the last weeks of the 2004 presidential election campaign. Media observer Mary Jacoby says the CBS report contains little new information, but “is powerfully, coherently, and credibly reported.” She calls CBS “cowardly” for not airing the segment when it was originally scheduled. [Salon, 9/29/2004] Author Jane Hamsher, the owner of the progressive blog FireDogLake, writes that the 60 Minutes segment is “a simple, direct narrative that will reach millions of Americans and let them know that they have been duped.” The segment does not delve into the outing of CIA official Valerie Plame Wilson, staying strictly with the Iraq-Niger uranium claims, and, she writes, demonstrates that the officially sanctioned “investigations” into the claims were little more than “partisan hatchet jobs.” [Jane Hamsher, 4/23/2006]

Entity Tags: Valerie Plame Wilson, Mary Jacoby, George W. Bush, CBS News, Andrew Heyward, Jane Hamsher, Elisabetta Burba

Timeline Tags: Niger Uranium and Plame Outing

Ty Cobb, the lawyer for fired CIA agent Mary McCarthy (see April 21, 2006), denies that his client leaked classified information to any reporter, and denies that his client gave any information about secret CIA prisons to Washington Post reporter Dana Priest (see November 2-18, 2005). A CIA source confirms Cobb’s statement, saying that the agency no longer asserts that McCarthy was one of Priest’s key sources. Instead, the agency now says it fired McCarthy because she had “undisclosed contacts” with Priest and other journalists. Such contacts violated her security agreement, agency officials say.
No Leaks of Classified Information - The original allegations that McCarthy revealed classified information to journalists are, apparently, no longer operational. Cobb says that McCarthy, who worked in the CIA inspector general’s office, “did not have access to the information she is accused of leaking,” namely the classified information about any secret detention centers in Europe. Cobb says that his client, who is 61, was just 10 days from retirement when she was fired, and had held senior positions at both the White House and the National Intelligence Council, is “devastated” over her firing. She believes her career will “forever be linked with misinformation about the reasons for her termination,” and, her lawyer says, her firing was “certainly not for the reasons attributed to the agency.” McCarthy had begun her retirement process in December 2005, and was planning on pursuing a legal career after leaving the agency. She will be allowed to retain her pension. A former intelligence official says, “Firing someone who was days away from retirement is the least serious action they could have taken.”
Firing Designed to Intimidate Others? - He adds, “That’s certainly enough to frighten those who remain in the agency.” The official is not the only one to believe that McCarthy was fired to intimidate other potential leakers and whistleblowers who may feel impelled to reveal questionable activities such as the CIA’s secret prison programs. Thomas Blanton, the director of George Washington University’s National Security Archive, says the Post articles about the secret prisons contained nothing that would warrant prosecution. “It’s the fact of the thing that they’re trying to keep secret, not to protect sources and methods, but to hide something controversial,” he says. “That seems like a hard prosecution to me.” Kate Martin, executive director of the Center for National Security Studies, says, “[E]ven if the espionage statutes were read to apply to leaks of information, we would say the First Amendment prohibits criminalizing leaks of information which reveal wrongful or illegal activities by the government.” [Washington Post, 4/25/2006] In 2007, former senior CIA case officer Valerie Plame Wilson will write, “By firing Mary, who was only 10 days away from retirement, the CIA management under [Director] Porter Goss was sending a clear signal that no one was to step out of line and if they did, the results would be harsh.” [Wilson, 2007, pp. 245-246]

Entity Tags: Kate Martin, Dana Priest, Ty Cobb, Central Intelligence Agency, Porter J. Goss, Valerie Plame Wilson, Tom Blanton, Mary McCarthy

Timeline Tags: Civil Liberties

Karl Rove discusses his testimony with his lawyers outside the grand jury chambers.Karl Rove discusses his testimony with his lawyers outside the grand jury chambers. [Source: CNN / ThinkProgress]White House deputy chief of staff Karl Rove testifies before special prosecutor Patrick Fitzgerald’s grand jury for a fifth time. Rove partially waives his attorney-client privilege with his attorney, Robert Luskin, to allow Luskin to testify about conversations he had with Rove concerning Rove’s knowledge of the leak of CIA agent Valerie Plame Wilson’s identity. Rove is also questioned extensively about the contradictions between his previous testimony and the testimony of Time reporter Matthew Cooper regarding Rove and Cooper’s July 2003 conversation about Plame Wilson (see 11:00 a.m. July 11, 2003), and his conversations with conservative columnist Robert Novak (see July 8, 2003, July 8 or 9, 2003, and July 14, 2003). [Washington Post, 4/27/2006; National Journal, 4/28/2006; Washington Post, 7/3/2007] According to Luskin, Rove “indirectly” confirmed Plame Wilson’s CIA status to Novak. [Washington Post, 7/15/2006]
Changing Stories - Rove is asked how he learned of Plame Wilson’s CIA status, and the circumstances surrounding his leaking of that information to Cooper. Rove tells the jury that when he told Cooper that Plame Wilson was a CIA agent, he was merely passing along unverified gossip. Cooper has testified that Rove told him that Plame Wilson was a CIA agent, and that she played a role in sending her husband, Joseph Wilson, on a fact-finding mission to Niger in 2002 (see February 21, 2002-March 4, 2002). Cooper has testified that both Rove and Lewis Libby, the former chief of staff for Vice President Dick Cheney, portrayed the information about Plame Wilson as definitive. It was because of their definitive statements, Cooper testified, that he identified Plame Wilson in a July 2003 story for Time (see July 17, 2003). In his first interview by the FBI, Rove failed to tell the investigators that he had talked to Cooper at all (see October 8, 2003); he again failed to disclose the conversation during his early appearances before the grand jury (see February 2004). Later, Rove testified that he did indeed speak with Cooper, and that his earlier failures to disclose the information were due to lapses in his memory (see October 15, 2004). In his fourth appearance before the grand jury, Rove testified that he revealed Plame Wilson’s identity to the reporter (see October 14, 2005), a recollection prompted by the discovery of an e-mail Rove sent to then-Deputy National Security Adviser Stephen Hadley soon after his leak to Cooper (see March 1, 2004). Rove has also testified that he learned of Plame Wilson’s CIA status from a journalist or journalists, a claim strongly contradicted by evidence. He has said in previous testimony that he may have learned of Plame Wilson’s identity from Novak, who outed Plame Wilson in a July 2003 column (see July 14, 2003). Novak, however, has testified that he learned of Plame Wilson’s identity from Libby and Rove. A person with first-hand knowledge of the grand jury proceedings will later comment, “If you believe both of them, Novak was saying that Rove was his source, and Rove was saying that Novak was his source.” [Washington Post, 4/27/2006; National Journal, 4/28/2006] Rove says that he still doesn’t remember talking to Cooper, though he does not dispute the e-mail he sent to Hadley. [Bloomberg, 4/28/2006] He argues that it would have been foolish for him to attempt to lie to the FBI and to the grand jury, because he knew that whatever lies he might have chosen to tell would have eventually been exposed, and he would then risk going to jail. [Washington Post, 4/27/2006] It is difficult to reconcile Rove’s “indirect” confirmation of Plame Wilson’s identity for Novak with his earlier claims that he learned of Plame Wilson’s CIA status from Novak.
Lawyer's Statement - Rove’s lawyer Robert Luskin says in a written statement: “Karl Rove appeared today before the grand jury investigating the disclosure of a CIA agent’s identity. He testified voluntarily and unconditionally at the request of special counsel Patrick Fitzgerald to explore a matter raised since Mr. Rove’s last appearance in October 2005 (see October 14, 2005). In connection with this appearance, the special counsel has advised Mr. Rove that he is not a target of the investigation. Mr. Fitzgerald has affirmed that he has made no decision concerning charges. At the request of the special counsel, Mr. Rove will not discuss the substance of his testimony.” [CNN, 4/26/2006; Washington Post, 4/27/2006]
Difficulties in Proving Intent - Law professor and former federal prosecutor Dan Richman says that while Fitzgerald may well be trying to build a case against Rove for either perjury or obstruction of justice, it may be quite difficult to prove Rove intended to lie to the grand jury. Rove’s subsequent appearances before the jury might “prove to be an obstacle to any [potential] obstruction or perjury case in that the person ultimately cooperated and told what he knew,” Richman says. [National Journal, 4/28/2006]

Entity Tags: Joseph C. Wilson, Matthew Cooper, Lewis (“Scooter”) Libby, Robert Luskin, Karl C. Rove, Valerie Plame Wilson, Dan Richman, Robert Novak, Patrick J. Fitzgerald, Stephen J. Hadley

Timeline Tags: Niger Uranium and Plame Outing

The Justice Department announces that it is invoking the “state secrets” clause to prevent a lawsuit by the Electronic Frontier Foundation (EFF) against AT&T from going forward (see March 9, 1953 and January 31, 2006). The EFF is suing AT&T for compromising its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s domestic surveillance program. The government alleges that the lawsuit would reveal “state secrets” critical to “national security” if it continues. The Justice Department makes its initial filing in mid-May (see May 13, 2006). [US District Court, Northern District of California, 4/28/2006 pdf file; Klein, 2009, pp. 71]

Entity Tags: Electronic Frontier Foundation, AT&T, National Security Agency, US Department of Justice

Timeline Tags: Civil Liberties

President Bush personally intervenes in a Justice Department attempt to investigate the NSA’s domestic surveillance program (see May 9, 2006), refusing to grant the Justice Department’s investigators routine security clearances so they can proceed with the investigation. Bush’s intervention is later admitted by Attorney General Alberto Gonzales in testimony before the Senate Judiciary Committee on July 18, 2006. Bush’s action to block the granting of clearances to the Justice Department’s Office of Professional Responsibility (OPR) is unprecedented, and astonishes many legal experts. As a result of his decision, the OPR has no choice but to drop the investigation (see May 9, 2006). The OPR investigation would not have determined whether the surveillance program was illegal or unconstitutional; rather, the office would have investigated “allegations of misconduct involving department attorneys that relate to the exercise of their authority to investigate, litigate, or provide legal advice,” according to the office’s policies and procedures. [Associated Press, 5/11/2006; USA Today, 7/18/2006; Washington Post, 7/19/2006; National Journal, 3/15/2007]
Stopping Gonzales from Being Investigated - The press later learns that had the probe gone forward, Gonzales himself would have been a prime target of inquiry. It is unclear if Bush knows the OPR investigation would have focused on Gonzales. The probe would have focused on Gonzales’s role in authorizing the eavesdropping program while he was White House counsel, as well as his subsequent oversight of the program as attorney general. Before Bush shuts down the probe, OPR investigators were preparing to question two crucial witnesses—Jack Goldsmith, the former chief of the Justice Department’s Office of Legal Counsel, and James A. Baker, the counsel for the department’s Office of Intelligence Policy and Review. Both Goldsmith and Baker had raised questions about the propriety and legality of numerous aspects of the wiretapping program. The OPR would have also examined documents detailing Gonzales’s participation in the program. [National Journal, 3/15/2007]
OPR Chief Counsel Protests Decision - Upon Gonzales’s admission of Bush’s action, OPR chief counsel H. Marshall Jarrett responds: “Since its creation some 31 years ago, OPR has conducted many highly sensitive investigations involving executive branch programs and has obtained access to information classified at the highest levels. In all those years, OPR has never been prevented from initiating or pursuing an investigation.” Jarrett notes in other memos that clearances had previously been granted to lawyers and agents from the Justice Department and the FBI who were assigned to investigate the original leak of the NSA program’s existence to the media. He also writes that numerous other investigators and officials, including members of Congress and the members of a federal civil liberties board, had been granted access to or been briefed on the program. On March 21, he will write to Gonzales’s deputy, “In contrast, our repeated requests for access to classified information about the NSA program have not been granted.” Gonzales will defend the president’s decicion by saying, in a letter to Judiciary Committee Chairman Arlen Specter (R-PA), that Bush “decided that protecting the secrecy and security of the program requires that a strict limit be placed on the number of persons granted access to information about the program for non-operational reasons. Every additional security clearance that is granted for the [program] increases the risk that national security might be compromised.” In other words, granting the OPR investigators routine security clearances, as has been done countless times in the last three decades as well as in the instances noted by Jarrett, would have jeopardized national security, according to Gonzales’s reasoning. [Associated Press, 5/11/2006; USA Today, 7/18/2006; Washington Post, 7/19/2006] “It is very difficult to understand why OPR was not given clearance so they could conduct their investigation,” Specter will say. “Many other lawyers in the Department of Justice had clearance.” [Boston Globe, 7/19/2006]
OPR Investigators Seeking Information Already in Justice Department's Possession - The questions surrounding the refusal to grant security clearances deepen when it is learned that the OPR investigators were only seeking information and documents relating to the NSA’s surveillance program that were already in the Justice Department’s possession, according to two senior government officials. The only classified information that OPR investigators were seeking was what had already been given to former Attorney General John Ashcroft, Gonzales, and other department attorneys in their original approval and advice on the program, the two senior government officials say. OPR’s request was limited to documents such as internal Justice Department communications and legal opinions, and didn’t extend to secrets that are the sole domain of other agencies. [National Journal, 5/29/2006]
OPR No; Private Citizens Yes - Jarrett will also note in his March 21 letter that, while Bush refused security clearances to OPR investigators, five “private individuals” who serve on Bush’s “Privacy and Civil Liberties Oversight Board have been briefed on the NSA program and have been granted authorization to receive the clearances in question.” Private citizens, especially those who serve only part-time on governmental panels, have traditionally been considered higher security risks than full-time government employees, who can lose their jobs or even be prosecuted for leaking to the press. Jarrett says that in contrast to the private individuals on Bush’s advisory board, OPR’s “repeated requests for access to classified information about the NSA have not been granted. As a result, this office, which is charged with monitoring the integrity of the department’s attorneys and with ensuring that the highest standards of professional ethics are maintained, has been precluded from performing its duties.” Michael Shaheen, who headed the OPR from its inception until 1997, will say that his staff “never, ever was denied a clearance” and that OPR under his leadership had conducted numerous investigations involving the activities of various attorneys general. “No attorney general has ever said no to me,” Shaheen says. [National Journal, 7/18/2006]
Inquiry Opened - The Justice Department’s inspector general, Glenn Fine, will open a preliminary inquiry into how the FBI has used the NSA’s surveillance data, which has often been obtained without judicial warrants and is considered by many legal experts to be illegal. Representative Maurice Hinchey (D-NY), who led the Congressional calls for an investigation of the NSA, says Bush’s decision is an example of “an administration that thinks it doesn’t have to follow the law.” [Washington Post, 7/19/2006] “We can’t have a president acting in a dictatorial fashion,” he says. [USA Today, 7/18/2006]
'Abusing' Their Offices? - Bruce Fein, a Republican constitutional lawyer who served in Ronald Reagan’s Justice Department, compares Gonzales unfavorably to Elliot Richardson, who resigned in 1973 rather than obey then-President Nixon’s order to fire Watergate special prosecutor Archibald Cox. “If he was like Elliot Richardson, he’d say, ‘Mr. President, I quit,’” Fein observes. [Think Progress, 7/18/2006; Washington Post, 7/19/2006] In 2007, law professor and legal ethics expert Charles Wolfram will say that if Gonzales did not inform the president that he might be a target of the OPR investigation, then he ill-served Bush and abused “the discretion of his office” for his own benefit. However, Wolfram will continue, if Gonzales did inform Bush that the probe might harm Gonzales, then “both [men] are abusing the discretion of their offices.” [National Journal, 3/15/2007]
Defending Bush's Decision - Bush officials dismiss the attempted investigation, and the criticisms by Fein, Hinchey, and others, as politically motivated. White House press secretary Tony Snow says the NSA wiretapping program is adequately supervised by internal oversight procedures, including periodic reviews by Gonzales. [Think Progress, 7/18/2006; Washington Post, 7/19/2006] “The Office of Professional Responsibility was not the proper venue for conducting that,” Snow says. He adds that Bush’s denial of the security clearances is warranted because “in the case of a highly classified program, you need to keep the number of people to it tight for reasons of national security, and that was what he did.” [National Journal, 3/15/2007]

Entity Tags: Maurice Hinchey, John Ashcroft, James Baker, Michael Shaheen, US Department of Justice, Office of Professional Responsibility, National Security Agency, Ronald Reagan, Jack Goldsmith, H. Marshall Jarrett, Elliot Richardson, George W. Bush, Alberto R. Gonzales, Archibald Cox, Glenn Fine, Arlen Specter, Charles Wolfram, Bruce Fein, Federal Bureau of Investigation, Senate Judiciary Committee, Tony Snow

Timeline Tags: Civil Liberties

A simulation of waterboarding arranged by ABC News.A simulation of waterboarding arranged by ABC News. [Source: ABC News]According to an ABC News report in September 2007, CIA Director Michael Hayden bans the use of waterboarding some time in 2006, with the approval of the White House. It is not known when exactly the technique is banned that year, but presumably it takes place after Hayden becomes CIA director (see May 5, 2006) and in response to the Supreme Court decision mandating that terror suspects must be given treatment consistent with the Geneva Conventions (see July 12, 2006). Waterboarding is a harsh interrogation technique that simulates drowning and is usually referred to as torture. Allegedly, the CIA last used waterboarding in 2003 on Khalid Shaikh Mohammed and “It is believed that waterboarding was used on fewer than five ‘high-value’ terrorist subjects” (see May 2002-2003). John Sifton of Human Rights Watch later says the ban “a good thing, but the fact remains that the entire [CIA interrogation] program is illegal.” [ABC News, 9/14/2007] Over a year before Hayden’s decision, Justice Department official Daniel Levin had himself subjected to simulated waterboarding to help him determine if waterboarding was indeed torture (see Late 2004-Early 2005). Levin intended to issue a memo condemning the practice as beyond the bounds of the law, but was forced out of the Justice Department before he could make that ruling.

Entity Tags: Daniel Levin, US Supreme Court, US Department of Justice, White House, Central Intelligence Agency, John Sifton, Khalid Shaikh Mohammed, Michael Hayden, Geneva Conventions

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Zacarias Moussaoui on his way to the Supermax prison.Zacarias Moussaoui on his way to the Supermax prison. [Source: WNBC / Jonathan Deinst]Zacarias Moussaoui is sentenced to life in prison for his role in the 9/11 attacks. A jury sentences him to six consecutive life terms without the possibility of parole. A single juror votes against the death penalty for one of the three counts for which Moussaoui is eligible to receive the death sentence (see March 6-May 4, 2006). For the other two counts, the vote is 10-2. According to the foreman of the jury, the lone dissenter did not identify his or herself to the other jurors during deliberations and consequently they could not discuss the person’s reasons for opposing the death penalty. “But there was no yelling. It was as if a heavy cloud of doom had fallen over the deliberation room, and many of us realized that all our beliefs and our conclusions were being vetoed by one person,” the foreman explains to the Washington Post. “We tried to discuss the pros and cons. But I would have to say that most of the arguments we heard around the deliberation table were [in favor of the death penalty]… Our sense was this was a done deal for that person and whoever that person is, they were consistent from the first day and their point of view didn’t change.” [Washington Post, 5/12/2006] As a result of the vote, Moussaoui will not be executed and instead will serve six life sentences at the Supermax prison in Florence, Colorado. A day after the sentencing, on May 5, Moussaoui files a motion to withdraw his guilty plea. He says that his March 27 testimony that he was supposed to have hijacked a fifth plane on September 11 and fly it into the White House “was a complete fabrication.” At sentencing the judge told him, “You do not have a right to appeal your convictions, as was explained to you when you plead guilty. You waived that right.” [Associated Press, 5/8/2006]

Entity Tags: Zacarias Moussaoui

Timeline Tags: Torture of US Captives, Complete 911 Timeline, 9/11 Timeline

Judge Reggie Walton holds a hearing to discuss numerous issues surrounding the upcoming Lewis Libby trial. One of the key areas of discussion is the involvement and expected testimony of White House political strategist Karl Rove (see July 8, 2003, July 8 or 9, 2003, 11:00 a.m. July 11, 2003, October 8, 2003, October 15, 2004, October 14, 2005, and April 26, 2006). The Libby defense team wants to compel the disclosure of a raft of classified White House and CIA documents concerning Rove’s actions in the Valerie Plame Wilson identity leak, but special counsel Patrick Fitzgerald, saying he does not intend to call Rove as a witness, is refusing to ask the White House for those documents (see After October 28, 2005, January 31, 2006, February 6, 2006, and (February 16, 2006)). Fitzgerald admits to being legally compelled to turn over any material he has on witnesses he intends to call, but will not agree to go after material regarding witnesses he does not intend to call, especially when that material may prove to be to the defense’s benefit. For Libby, lawyer Theodore Wells says he intends to call Rove as a witness, and he wants Fitzgerald to battle with the White House for documents pertaining to Rove’s involvement in the leak. Fitzgerald retorts, as he has before, that the material Wells and his team are asking for is not germane to a perjury defense. In the process, Wells falsely claims that a legal precedent exists for forcing a government prosecution to seek evidence the defense wants, and Walton is briefly taken in by his deception before learning that Wells is misrepresenting the case law. Fitzgerald says flatly: “I’m responsible for the government’s case… and turning over my obligations. I am not responsible for preparing the defense case. And the case law, and Your Honor cited it. It is material defined by the indictment and the government’s case in chief. You just can’t say I’m going to call 20 witnesses so give me everything about them. We then would have effectively open-file discovery or beyond that and I don’t agree with that reading of the law.” The conversation, especially on Fitzgerald’s part, is circumspect, with all parties well aware that the hearing is being held in open court. However, Walton is somewhat testy with Wells during one exchange. Referring to Wells’s stated intention to introduce former ambassador Joseph Wilson’s classified CIA report on the Iraq-Niger uranium claims (see March 4-5, 2002), Walton says, “I don’t see how this is relevant to the case.” Any focus on Wilson’s report would turn the trial into an inquiry on “statements the president made in the State of the Union (see Mid-January 2003 and 9:01 pm January 28, 2003). You want to try the legitimacy of us going to war.” [US District Court for the District of Columbia, 5/5/2006 pdf file; Bloomberg, 5/5/2006; Marcy Wheeler, 6/15/2006]
Defense: Libby Small Part of Larger White House Operation - Wells makes a statement that indicates he and his fellow attorneys intend to try to prove that Libby was indeed a small part of a much larger White House operation. He says: “It wasn’t just him [Libby]. He was involved in what was a multi-agency response. It was [sic] Office of the Vice President. It was the Office of the President.” Former prosecutor Christy Hardin Smith calls Wells’s statement a “‘Hello, Karl’ moment,” and notes that Wells is trying to go in at least two different directions: Libby’s memory is demonstrably faulty (see January 31, 2006) and he is being made into a White House scapegoat. Smith observes, “Team Libby is going to have a very tough time indeed if they are going to play such substantially adverse ends of the spectrum against each other at trial in order to raise reasonable doubt in the jurors’ minds.” [Christy Hardin Smith, 5/12/2006]
Author: Defense May Not Intend to Call Rove, Maneuvering for Materials Instead? - Author and blogger Marcy Wheeler, who is closely following the case, will later write that she is not at all sure that Libby’s lawyers really intend to call Rove as a defense witness. “But they seem awfully interested in getting all the materials relating, presumably, to Rove’s conversation with [columnist Robert] Novak (see July 14, 2003). They sure seem interested in knowing what Rove said, and whether they can make certain arguments without Rove refuting those arguments.” [Marcy Wheeler, 6/15/2006]

Entity Tags: Karl C. Rove, Christy Hardin Smith, Bush administration (43), Joseph C. Wilson, Theodore Wells, Reggie B. Walton, Marcy Wheeler, Executive Office of the President, Office of the Vice President, Lewis (“Scooter”) Libby, Patrick J. Fitzgerald

Timeline Tags: Niger Uranium and Plame Outing

The Wall Street Journal’s Stephen Moore interviews reclusive billionaire Charles Koch, the head of the Koch Brothers oil empire. Among the items of interest in the interview is Koch’s admission that he, along with his brother David (see 1977-Present, 1979-1980, 1981-2010, 1984 and After, and Late 2004), coordinates the funding of the conservative infrastructure of some of the most influential front groups, political campaigns, think tanks, media outlets, and other such efforts through a semiannual meeting with wealthy conservative donors. (Moore himself receives Koch funding for his work, according to a Think Progress report published four years later. In return, Moore is quite laudatory in the interview, writing that Koch is a “creative forward-thinking… professorial CEO” who “is immersed in the ideas of liberty and free markets.”) Koch tells Moore that his basic goal is to strengthen what he calls the “culture of prosperity” by eliminating “90 percent” of all laws and government regulations. Moore writes of the twice-yearly conference: “Mr. Koch’s latest crusade to spread the ideas of liberty has been his sponsorship of a twice-yearly conference that gathers together many of the most successful American entrepreneurs, from T. Boone Pickens to former Circuit City CEO Rick Sharp. The objective is to encourage these captains of industry to help fund free-market groups devoted to protecting the fragile infrastructure of liberty. That task seems especially critical given that so many of the global superrich, like George Soros and Warren Buffett, finance institutions that undermine the very system of capitalism that made their success possible (see January - November 2004). Isn’t this just the usual rich liberal guilt, I ask. ‘No,’ he says, ‘I think they simply haven’t been sufficiently exposed to the ideas of liberty.’” [Wall Street Journal, 5/6/2006; Think Progress, 10/20/2010]

Entity Tags: Think Progress (.org), Charles Koch, Wall Street Journal, David Koch, Stephen Moore

Timeline Tags: Civil Liberties

Maurice Hinchey.Maurice Hinchey. [Source: Washington Post]A Justice Department investigation into the National Security Agency’s warrantless wiretapping program ends before it begins, because the NSA will not grant Justice Department lawyers routine security clearances. The investigation had been opened in February 2006 (see February 2, 2006) when Representative Maurice Hinchey (D-NY) asked the Justice Department’s Office of Professional Responsibility (OPR) to investigate the NSA’s warrantless surveillance of US citizens (see After September 11, 2001). Without security clearances, investigators could not examine NSA lawyers’ role in the program. OPR counsel H. Marshall Jarrett writes in a letter to Hinchey: “We have been unable to make any meaningful progress in our investigation because OPR has been denied security clearances for access to information about the NSA program. Without these clearances, we cannot investigate this matter and therefore have closed our investigation.” Jarrett and his office have made routine requests for security clearances since January, to no avail. The OPR’s investigation would have focused strictly on whether Justice Department lawyers violated ethical rules, and would not have examined the entire NSA program. Hinchey says, “This administration thinks they can just violate any law they want, and they’ve created a culture of fear to try to get away with that.” [Associated Press, 5/11/2006] Hinchey writes to Jarrett, regarding the failure to grant clearances: “We are perplexed and cannot make sense of your denial of these security clearances. Our request did not ask OPR to give us the intricate details of the NSA program; we understand that such a request would not even be within OPR’s jurisdiction. There appear to be no reasonable grounds for blocking this investigation. Not only does your denial of their request for a security clearance not make sense, it is unprecedented.” Hinchey will try, and fail, to get a bill through the Republican-controlled House Judiciary Committee to force the White House, Justice Department, and Defense Department to turn over to Congress all documents related to the closure of the OPR probe. He will write in a letter to President Bush, “If the NSA program is justified and legal, as you yourself have indicated, then there is no reason to prevent this investigation from continuing.” [US House of Representatives, 7/18/2006] In June 2006, it will be revealed that Bush personally made the decision not to grant the OPR investigators security clearances (see Late April 2006).

Entity Tags: Office of Professional Responsibility, Maurice Hinchey, US Department of Justice, George W. Bush, H. Marshall Jarrett, National Security Agency

Timeline Tags: Civil Liberties

Conservative columnist Byron York writes that in his view, one of the overarching conflicts between Patrick Fitzgerald’s prosecution team and the defense team of Lewis Libby is that of the “size” of the case. Fitzgerald wants to focus on the “little case,” the narrow parameters of the perjury charges Libby faces: namely, did Libby lie under oath when he told Fitzgerald’s grand jury that he learned of Valerie Plame Wilson’s CIA identity from NBC reporter Tim Russert (see June 23, 2003, 8:30 a.m. July 8, 2003, 2:24 p.m. July 12, 2003, Late Afternoon, July 12, 2003, and July 10 or 11, 2003)? Fitzgerald, York writes, has abandoned his pursuit of the larger case—who leaked Plame Wilson’s identity, why was it leaked, and did it violate the Intelligence Identities Protection Act, the Espionage Act, or some other law? York writes: “He has learned about the Big Case as much as one man with subpoena power, no supervision, unlimited funds, and no hesitation to threaten reporters with jail can learn. He just doesn’t want to talk about it.” On the other hand, Libby’s team wants to focus on the larger case. Was Libby merely following orders from senior Bush administration officials who felt “under attack” by Plame Wilson’s husband, war critic Joseph Wilson, and others? York writes: “Libby might have simply forgotten some of the details, and because of that testified incorrectly, his lawyers contend, because he was focusing on the big picture. If Libby’s defense team had its way, the whole thing—the Big Case—would be re-fought in the courtroom.” Judge Reggie Walton is trying to balance the two interests, York observes, and finding it understandably difficult to do so. [National Review, 5/10/2006]

Entity Tags: Joseph C. Wilson, Bush administration (43), Byron York, Lewis (“Scooter”) Libby, Patrick J. Fitzgerald, Valerie Plame Wilson, Reggie B. Walton, Tim Russert

Timeline Tags: Niger Uranium and Plame Outing

USA Today headline.USA Today headline. [Source: CBS News]USA Today reports that “[t]he National Security Agency (NSA) has been secretly collecting the phone call records of tens of millions of Americans, using data provided by the nation’s three biggest telecommunications providers, AT&T, Verizon, and BellSouth,” according to “people with direct knowledge of the arrangement.” None of the sources would allow USA Today to identify them by name, job, or affiliation. The USA Today story claims that the NSA program “does not involve the NSA listening to or recording conversations,” but does use “the data to analyze calling patterns in an effort to detect terrorist activity,” according to their sources. One source says that the NSA program is compiling “the largest database ever assembled in the world,” with the goal of creating “a database of every call ever made” within US borders. President Bush has said that the NSA program is focused exclusively on international calls, and for the calls to be recorded, “one end of the communication must be outside the United States.” However, this is now shown not to be the case (see January 16, 2004). A US intelligence official says that the NSA program is not recording the actual phone calls themselves, but is collecting what he calls “external” data about the communications to allow the agency to emply “social network analysis” for insight into how terrorist networks are connected with one another. Another large telecommunications company, Qwest, has refused to help the NSA eavesdrop on customer calls (see February 2001, February 2001 and Beyond, and February 27, 2001). USA Today’s sources say that the NSA eavesdropping program began after the 9/11 attacks, a claim that is not bolstered by the facts (see 1997, February 27, 2000, February 27, 2000, December 2000, February 2001, February 2001, February 2001 and Beyond, February 2001, Spring 2001, April 2001, April 4, 2001, July 2001, Before September 11, 2001, and Early 2002). The sources say that the three companies agreed to provide “call-detail records,” lists of their customers’ calling histories, and updates, which would allow the agency to track citizens’ calling habits. In return, the sources say, the NSA offered to pay the firms for their cooperation. After the three firms agreed to help the agency, USA Today writes, “the NSA’s domestic program began in earnest” (see After September 11, 2001, After September 11, 2001, October 2001, September 2002, and Spring 2004). NSA spokesman Don Weber says the agency is operating strictly “within the law,” but otherwise refuses to comment. Former US prosecutor Paul Butler says that the Foreign Intelligence Surveillance Act (FISA), which governs surveillance operations by US intelligence agencies, “does not prohibit the government from doing data mining” (see 1978). White House press spokesman Dana Perino says, “There is no domestic surveillance without court approval,” and all surveillance activities undertaken by government agencies “are lawful, necessary, and required for the pursuit of al-Qaeda and affiliated terrorists.” All government-sponsored intelligence activities “are carefully reviewed and monitored,” she adds, and says that “all appropriate members of Congress have been briefed on the intelligence efforts of the United States” (see October 11, 2001 and October 25, 2001 and November 14, 2001). Don Weber, a senior spokesman for the NSA, refuses to discuss the agency’s operations, saying: “Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues; therefore, we have no information to provide. However, it is important to note that NSA takes its legal responsibilities seriously and operates within the law.” All three firms released similar comments saying that they would not discuss “matters of national security,” but were complying with the law in their alleged cooperation with the NSA. The Electronic Frontier Foundation (EFF) is suing AT&T for what it calls its complicity in the NSA’s “illegal” domestic surveillance program (see January 31, 2006). [USA Today, 5/11/2006]

Entity Tags: Verizon Communications, USA Today, Qwest, Paul Butler, Foreign Intelligence Surveillance Act, Jane Harman, AT&T, BellSouth, National Security Agency, Dana Perino, Don Weber

Timeline Tags: Civil Liberties

Bobby Ray Inman.Bobby Ray Inman. [Source: DefenseTech.org]Former NSA director Bobby Ray Inman says that the secret NSA program to wiretap US citizens’ phone and e-mail conversations without court warrants (see After September 11, 2001) “is not authorized.” President Bush authorized the secret wiretapping over four years ago (see Early 2002), a program only revealed at the end of 2005 (see December 15, 2005). Since the program was revealed, it has created tremendous controversy over its possible illegality and its encroachment on fundamental American civil liberties. Bush and other White House officials have repeatedly asserted that the program is legal, mainly because Bush and his officials assert that the president has the authority to implement such a program (see December 15, 2005); Bush also insists, as recently as the day before Inman’s statement, that the program is only being used to spy on terrorists and the privacy of US citizens is being “fiercely protected,” a statement that does not jibe with the facts. [Democracy Now!, 5/12/2006]

Entity Tags: National Security Agency, Al-Qaeda, Bobby Ray Inman, Bush administration (43), George W. Bush

Timeline Tags: Civil Liberties

The Justice Department files a brief with the US District Court of Northern California asking that the Electronic Frontier Foundation (EFF)‘s lawsuit against AT&T (see January 31, 2006) be dismissed on the grounds that it would breach “state secrets” vital to “national security.” The Justice Department publicly announced its intentions of asking that the lawsuit be dismissed on those grounds two weeks ago (see April 28, 2006). EFF is suing AT&T for compromising its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s domestic surveillance program. The lawsuit is Hepting, et al v. AT&T, often shortened in the media to Hepting v. AT&T. The government submits a number of secret documents to Judge Vaughn Walker as evidence, along with a heavily redacted document submitted for public perusal. Other documents include affidavits from the Director of National Intelligence, John Negroponte, and the head of the NSA, Lieutenant General Keith Alexander. Some observers believe that Walker, a conservative appointed to the bench by President George H.W. Bush, will quickly comply with the government’s request. However, as AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009), who is working with EFF on the lawsuit (see Early January 2006), will later write, Vaughn is independent-minded and possessed of a “strong libertarian bent,” and will not be so prone to do the government’s bidding as some believe. [Klein, 2009, pp. 72-73] Walker’s first hearing on the brief will be held four days later (see May 17, 2006).

Entity Tags: John Negroponte, AT&T, Electronic Frontier Foundation, Keith Alexander, Mark Klein, US Department of Justice, Vaughn Walker, National Security Agency

Timeline Tags: Civil Liberties

A photograph of the copy of Wilson’s op-ed annotated by Dick Cheney.A photograph of the copy of Wilson’s op-ed annotated by Dick Cheney. [Source: Department of Justice / New York Times] (click image to enlarge)Special prosecutor Patrick Fitzgerald, pursuing charges that former vice-presidential chief of staff Lewis “Scooter” Libby lied to his grand jury about revealing the identity of CIA undercover agent Valerie Plame Wilson (see January 2004, March 5, 2004, and March 24, 2004), introduces into evidence a document that directly implicates Libby’s former boss, Vice President Dick Cheney, in Libby’s allegedly criminal behavior.
Notated Clipping - Fitzgerald submits an original clipping of a New York Times op-ed written by Plame Wilson’s husband, Joseph Wilson, challenging the Bush administration’s claims that Iraq had attempted to purchase uranium from Niger (see July 6, 2003). The clipping bears notations in Cheney’s own hand, as well as Cheney’s fingerprints. Cheney’s commentary reads: “Have they done this sort of thing before? [Cheney is referring to the CIA’s decision to send Wilson to Niger to investigate the uranium claims—see February 21, 2002-March 4, 2002.] Send an amb. to answer a question. Do we ordinarily send people out to do pro bono work for us? Or did his wife send him on a junket?” It is unclear when Cheney made the notes, but prosecutors believe they were taken before the July 14, 2003 column by Robert Novak that outed Plame Wilson (see July 14, 2003). According to Fitzgerald’s filing, Cheney’s copy of the op-ed is now “at the center of the sequence of events leading” to Libby’s alleged perjury and obstruction of justice. [CNN, 5/14/2006; New York Times, 5/14/2006; Newsweek, 5/16/2006]
'Acutely Focused' Attention of Cheney, Libby on Wilson - The filing goes on to state that Cheney’s notes support the idea that Wilson’s op-ed drew the attention of Cheney and Libby, and “acutely focused” their attention on Wilson’s assertions “and on responding to those assertions.… The article, and the fact that it contained certain criticisms of the administration, including criticism regarding issues dealt with by the Office of the Vice President, serve both to explain the context of, and provide the motive for, many of the defendant’s statements and actions at issue in this case. The annotated version of the article reflects the contemporaneous reaction of the vice president to Mr. Wilson’s op-ed article, and thus is relevant to establishing some of the facts that were viewed as important by the defendant’s immediate superior, including whether Mr. Wilson’s wife had sent him on a junket.” [CNN, 5/14/2006; Newsweek, 5/16/2006] Libby testified before the grand jury about the annotated op-ed, and that testimony is now entered into evidence. Libby said he recalled discussing the issues with Cheney, and said of those conversations: “I recall that along the way he asked, ‘Is this normal for them to just send somebody out like this uncompensated, as it says?’ He was interested in how did that person come to be selected for this mission. And at some point, his wife worked at the agency, you know, that was part of the question.” A prosecutor asked Libby, “Was it a topic that was discussed on a daily basis… on multiple occasions each day in fact?” Libby answered, “Yes, sir.” Libby acknowledged that during that time, Cheney indicated that he was upset about the Wilson article and what he considered to be false attacks on his credibility, saying: “I recall that he was very keen to get the truth out. He wanted to get all the facts out about what he [Cheney] had or hadn’t done—what the facts were or were not. He was very keen on that and said it repeatedly. ‘Let’s get everything out.’” During his testimony before the grand jury, prosecutors did not believe Libby’s assertion that Cheney might have “scribbled” notes on the Wilson op-ed on July 14, the day Novak’s column was published. Libby testified: “And I think what may have happened here is what he may have—I don’t know if he wrote, he wrote the points down. He might have pulled out the column to think about the problem and written on it, but I don’t know. You’ll have to ask him.” [National Journal, 1/12/2007]
Cheney's Other Actions - Fitzgerald has already asserted that Cheney had attempted to pass Wilson’s trip to Niger off as a “junket”—essentially a taxpayer-funded excursion with little real purpose—to discredit Wilson’s claims about the Iraq-Niger affair. Fitzgerald has also asserted that Cheney, acting with the approval of President Bush, authorized Libby to disclose some of the classfied portions of the 2002 National Intelligence Estimate on Iraq (see October 1, 2002, June 23, 2003, 8:30 a.m. July 8, 2003, and Late Afternoon, July 12, 2003) to reporters to rebut some of Wilson’s claims. The Cheney notes provide, in reporter Michael Isikoff’s words, “significant new context to that assertion.” The notes show that Cheney had “personally raised questions about Wilson’s trip right after the publication of the Wilson column—and five days before Libby confirmed to Time reporter Matt Cooper that he had ‘heard’ that Wilson’s wife… had played a role in sending him to Africa” (see July 13, 2005). [CNN, 5/14/2006; Newsweek, 5/16/2006]
Cheney 'at Center of Campaign to Discredit Wilson' - Authors Lou Dubose and Jake Bernstein later write, “The annotation places Cheney at the center of the campaign to discredit Wilson, aware early on that Wilson’s wife was a CIA agent.” [Dubose and Bernstein, 2006, pp. 217] Plame Wilson herself will write: “Given Cheney’s vaunted decades of government service, it is frankly unbelievable that he would ask such questions. He would have known that the CIA frequently sends US citizens abroad, on a pro bono basis, to answer specific intelligence questions. It is even quite possible that the CIA debriefed employees of Halliburton, the multinational company that Cheney headed prior to becoming vice president, when they returned from business trips in restricted countries of interest to the United States. Cheney’s marginal notes should be more accurately interpreted as marching orders to staff on how to spin Joe’s story so that Cheney could stay as far from it as possible while simultaneously undermining Joe’s credibility.” (Emphasis in the original.) [Wilson, 2007, pp. 288]

Entity Tags: George W. Bush, Michael Isikoff, Jake Bernstein, Joseph C. Wilson, Lewis (“Scooter”) Libby, Lou Dubose, Valerie Plame Wilson, Office of the Vice President, Patrick J. Fitzgerald, Matthew Cooper, Richard (“Dick”) Cheney, Robert Novak

Timeline Tags: Niger Uranium and Plame Outing

Ira Winkler.Ira Winkler. [Source: Canadian Broadcasting Corporation]Former NSA analyst Ira Winkler, author of the 2005 book Spies Among Us, writes of his disgust with the NSA’s domestic surveillance program, saying that because it is warrantless, it is illegal. He argues the program violates both the NSA’s rules of engagement and its long-term missions.
Warrantless Surveillance is Illegal - Securing warrants under the Foreign Intelligence Surveillance Act is easily done, Winkler says: “FISA blocks no legitimate acquisition of knowledge. It doesn’t even slow the process down.” The problem, Winkler says, is that the program is so large that securing FISA warrants for every communication the NSA monitors “would [take] an army of lawyers to get all the warrants they’d need to be in compliance with FISA.” However: “[T]he law is the law. No president has the right to pick and choose which laws they find convenient to follow.” President Bush could have asked Congress to amend the FISA laws: “After all, after 9/11 Congress passed a wide variety of laws (without, for the most part, reading them) that were supposed to prevent another attack. They could have easily slipped something modifying FISA into all of that legislation. They did not, though recent revelations about this administration’s use of signing statements may indicate that they simply didn’t want to raise the possibility of questions.” Merely ignoring FISA “is illegal,” Winkler writes.
Weakens National Security - Another issue is national security. Not obtaining warrants actually weakens natural security, he argues, “since the process of obtaining the warrants has an effect on quality control.” For example: “To date, FBI agents have been sent out to do thousands of investigations based on this warrantless wiretapping. None of those investigations turned up a legitimate lead. I have spoken to about a dozen agents, and they all roll their eyes and indicate disgust with the man-years of wasted effort being put into physically examining NSA ‘leads.’ This scattershot attempt at data mining drags FBI agents away from real investigations, while destroying the NSA’s credibility in the eyes of law enforcement and the public in general. That loss of credibility makes the NSA the agency that cried wolf—and after so many false leads, should they provide something useful, the data will be looked at skeptically and perhaps given lower priority by law enforcement than it would otherwise have been given.” Winkler says the NSA’s claim that it does not retain any personal information is ludicrous. “Frankly, you have to be a complete moron to believe that,” he writes. “It is trivial to narrow down access to a phone number to just a few members of a household, if not in fact to exactly one person.”
Extortion - And the warrantless surveillance is not the only illegal action taken by the government. If the government did threaten one telecom firm, Qwest, for not cooperating (see February 2001), “[t]hat’s extortion—another crime.” Winkler writes that both Congress and the American people must demand answers, or the White House and the NSA will continue to usurp our freedom under the cloak of protecting freedoms.
Arguments For Program are Specious - Winkler says the arguments for the program that he hears are groundless. He hears three main threads:
bullet “I have nothing to worry about so I don’t care if they investigate me.” Winkler points out that plenty of people have been investigated and incarcerated in the US and abroad without doing anything wrong: “I believe that Saddam Hussein would cheerfully agree with the tired allegation that if you did nothing wrong, you shouldn’t mind the government looking at your calls. I think Lenin, Stalin, Hitler and the Chinese government would also agree with that line of thought. Is this the company we consent to keep in the name of safety?”
bullet “[W]e need to do everything we can to protect ourselves.” Protecting ourselves, Winkler argues, means letting law enforcement work to protect US citizens against real, ongoing crimes. The government is “watching for dragons while very real snakes multiply freely in our midst.”
bullet “[T]he NSA isn’t listening to the content of the calls, so there’s no harm.” Aside from the fact that Winkler believes the NSA is lying about not listening to the calls themselves, he says: “[The NSA] doesn’t need to hear your chatter to invade your privacy. By simply tying numbers together—an intelligence discipline of traffic analysis—I assure you I can put together a portrait of your life. I’ll know your friends, your hobbies, where your children go to school, if you’re having an affair, whether you plan to take a trip and even when you’re awake or asleep. Give me a list of whom you’re calling and I can tell most of the critical things I need to know about you.” The NSA is made up of mostly “good and honest people,” but it has “more than its share of bitter, vindictive mid- and senior-level bureaucrats. I would not trust my personal information with these people, since I have personally seen them use internal information against their enemies.” Winkler reminds his readers that the Bush administration deliberately outed CIA agent Valerie Plame Wilson because her husband dared debunk an administration claim about Iraq (see November 20, 2007), and tried to undermine the credibility of former counterterrorism chief Richard Clarke when he spoke out against the administration (see March 24, 2004). The NSA could easily provide the administration with damaging information about other administration enemies.
'Against Everything I Was Taught' - “NSA domestic spying is against everything I was ever taught working at the NSA,” Winkler writes. “I might be more for it if there was any credible evidence that this somehow provides useful information that couldn’t otherwise be had. However, the domestic spying program has gotten so massive that the well-established process of getting a warrant cannot be followed—and quantity most certainly doesn’t translate to quality. Quite the opposite.” The terrorists number in the hundreds, Winkler writes, but “the NSA is collecting data on hundreds of millions of people who are clearly not the enemy. These numbers speak for themselves.” [Computerworld, 5/16/2006]

Entity Tags: Qwest, George W. Bush, Foreign Intelligence Surveillance Act, Federal Bureau of Investigation, Ira Winkler, National Security Agency, Valerie Plame Wilson, Saddam Hussein, Richard A. Clarke, Vladimir Lenin, Josef Stalin

Timeline Tags: Civil Liberties

Wired News, the online technical news site, publishes a copy of AT&T whistleblower Mark Klein’s unclassified memo written in 2004 (see January 16, 2004). Klein has joined the Electronic Frontier Foundation (EFF) in its lawsuit against AT&T. Klein has evidence that AT&T colluded with the National Security Agency (NSA) to illegally wiretap Americans’ domestic telephone and Internet communications. [Wired News, 5/17/2006]

Entity Tags: Electronic Frontier Foundation, AT&T, National Security Agency, Mark Klein, Wired News

Timeline Tags: Civil Liberties

The lawsuit brought forth by Khalid el-Masri and the ACLU (see December 6, 2005) is dismissed by US District Judge T.S. Ellis III in Alexandria, who rules that the state secrets privilege (see March 9, 1953) was properly invoked by the US Justice Department. The judge argues that Masri’s “private interests must give way to the national interest in preserving state secrets.” [Washington Post, 5/19/2006]

Entity Tags: American Civil Liberties Union, Central Intelligence Agency, T.S. Ellis III, Khalid el-Masri

Timeline Tags: Torture of US Captives, Civil Liberties

The Libby defense team files a brief with the court arguing that the special counsel’s recent filing about presentation of news articles into evidence is unsatisfactory (see May 12, 2006), and says that the prosecution must not be allowed to present a copy of former ambassador Joseph Wilson’s New York Times op-ed (see July 6, 2003), annotated with notes written by Vice President Dick Cheney (see May 14, 2006), into evidence. The defense says that Lewis Libby had never seen the op-ed before the FBI showed it to him in November 2003 (see October 14, 2003 and November 26, 2003). “These arguments are tantamount to an acknowledgment that the state of mind of witnesses other than Mr. Libby will be important at trial,” Libby’s lawyers write. The defense also reiterates arguments that the government must provide classified documents for Libby to mount an adequate defense (see May 12, 2006), and reassures Judge Reggie Walton that they do not intend “to use this case to reargue the reasons why the United States invaded Iraq.” They acknowledge that given the fact that a jury will made up of Washington, DC, residents, “such an approach would be a foolish and self-destructive trial strategy.” [US District Court for the District of Columbia, 5/19/2006 pdf file; NBC News, 5/20/2006; Washington Post, 5/20/2006]

Entity Tags: Lewis (“Scooter”) Libby, Joseph C. Wilson, Reggie B. Walton, Richard (“Dick”) Cheney

Timeline Tags: Niger Uranium and Plame Outing

Page 18 of 25 (2423 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike