!! History Commons Alert, Exciting News

Context of 'July 8, 2004: Swedish Guantanamo Detainee Returns Home'

This is a scalable context timeline. It contains events related to the event July 8, 2004: Swedish Guantanamo Detainee Returns Home. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

1970s: MEK Kills US Personnel in Tehran

The Mujahedeen-e Khalq (MEK), a militant Iranian political organization formed in the 1960s, kills US military personnel and US civilians working on defense projects in Tehran. MEK is currently led by husband and wife Massoud and Maryam Rajavi. MEK is part of a larger political organization know as the National Council of Resistance of Iran (NCRI). [US Department of State, 4/30/2003; US Department of State, 4/2005; GlobalSecurity (.org), 4/27/2005; National Memorial Institute for the Prevention of Terrorism, 5/12/2005]

Entity Tags: People’s Mujahedin of Iran, Massoud Rajavi, Maryam Rajavi

Timeline Tags: US confrontation with Iran

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

In December 1978, President Carter’s National Security Adviser Zbigniew Brzezinski says, “An arc of crisis stretches along the shores of the Indian Ocean, with fragile social and political structures in a region of vital importance to us threatened with fragmentation. The resulting political chaos could well be filled by elements hostile to our values and sympathetic to our adversaries.” [Time, 1/8/1979] There is widespread discontent and rioting in Iran at the time. State Department official Henry Precht will later recall that Brzezinski had the idea “that Islamic forces could be used against the Soviet Union. The theory was, there was an arc of crisis, and so an arc of Islam could be mobilized to contain the Soviets.” [Scott, 2007, pp. 67] In November 1978, President Carter appointed George Ball head of a special White House Iran task force under Brzezinski. Ball recommends the US should drop support for the Shah of Iran and support the radical Islamist opposition of Ayatollah Khomeini. This idea is based on ideas from British Islamic expert Dr. Bernard Lewis, who advocates the balkanization of the entire Muslim Near East along tribal and religious lines. The chaos would spread in what he also calls an “arc of crisis” and ultimately destabilize the Muslim regions of the Soviet Union. The Shah will later comment in exile, “I did not know it then, perhaps I did not want to know? But it is clear to me now that the Americans wanted me out. Clearly this is what the human rights advocates in the State Department wanted. What was I to make of the Administration’s sudden decision to call former Under Secretary of State George Ball to the White House as an adviser on Iran? Ball was among those Americans who wanted to abandon me and ultimately my country.” [Engdahl, 1992] While there is later debate about US policy towards Iran actually is at this time, it will be noted that the Carter administration had “no clear policy” due to internal divisions and confusion. [Keddie, 2003] The Shah abdicates on January 16, 1979, and Ayatollah Khomeini returns from exile to Iran on February 1, 1979, taking over the government. Brzezinski will attempt to create a de facto alliance with Khomeini’s new fundamentalist government, but his efforts will come to a half with the Iranian hostage crisis in November 1979 (see February-November 4, 1979).

Entity Tags: Shah Mohammad Reza Pahlavi, James Earl “Jimmy” Carter, Jr., George Ball, Zbigniew Brzezinski, Bernard Lewis, Henry Precht, Seyyed Ruhollah Khomeini

Timeline Tags: Complete 911 Timeline, War in Afghanistan

After the Shah Mohammad Reza Pahlavi is deposed in Iran and Ayatollah Khomeini takes over as Iran’s new leader in February 1979, the US is interested in continuing to work with the Iranian government. At first the US is taken aback by the new fundamentalist Islamic government, and National Security Adviser Zbigniew Brzezinski contemplates fomenting a military coup to stop Khomeini. But Khomeini is fiercely anti-communist, and Brzezinski soon decides that Iran’s new government can become part of an effective anti-Soviet alliance he calls the “arc of crisis’ (see November 1978-February 1979). The US embassy in Teheran, Iran, remains open, and more US officials come to Iran and begin tentative talks there. [Dreyfuss, 2005, pp. 236-243] The CIA in particular begins secretly collaborating with Iranian intelligence, providing information about the Soviet Union, Afghanistan, and Iraq. The CIA and Iran both covertly work to destabilize the pro-Soviet government in Afghanistan. [Dreyfuss, 2005, pp. 264-265] In early November 1979, Brzezinski secretly meets with Iranian Prime Minister Mehdi Bazargan, as well as Iran’s foreign minister and defense minister, in Algiers, Algeria. But shortly before the meeting, the US agrees to allow the Shah, dying with cancer, to come to the US for medical treatment. Khomeini is enraged, and on November 4, just three days after the Algeria meeting begins, Khomeini arranges for students to take over the US embassy in Teheran and seize hostages. This realigns political forces in Iran and allows Khomeini to sideline Bazargan and other others meeting in Algeria, rendering the negotiations there moot. Brzezinski’s attempts to create a de facto alliance with Iran collapse. The US hostages will be held for over a year before finally being freed. [Dreyfuss, 2005, pp. 240-243]

Entity Tags: Central Intelligence Agency, Shah Mohammad Reza Pahlavi, Mehdi Bazargan, Seyyed Ruhollah Khomeini, Zbigniew Brzezinski

Timeline Tags: US confrontation with Iran, Complete 911 Timeline, War in Afghanistan

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

About 500 Iranian students take over the American Embassy in Tehran and hold 52 Americans hostage for 444 days. The Mujahedeen-e Khalq (MEK) is one of the groups that supports the take-over. [US Department of State, 4/30/2003; PBS, 1/15/2006]

Entity Tags: People’s Mujahedin of Iran

Timeline Tags: US confrontation with Iran, Iran-Contra Affair

Shortly after the seizure of the US embassy in Tehran (see November 4, 1979-January 20, 1981), President Jimmy Carter issues Executive Order 12170 freezing Iranian government assets held in the United States under the authority of the International Emergency Economic Powers Act (IEEPA). [US President, 11/14/1979] Iran has an estimated $12 billion in bank deposits, gold, and other properties, including $5.6 billion in deposits and securities held by overseas branches of US banks. [US Department of the Treasury. Office of Foreign Assets Control, 11/1979]

Entity Tags: James Earl “Jimmy” Carter, Jr.

Timeline Tags: US confrontation with Iran

Neoconservative Paul Wolfowitz, the head of the State Department’s Policy Planning Staff, hires fellow neoconservative academic Michael Ledeen as a “special adviser.” [CounterPunch, 2/28/2004] Ledeen will soon fall under suspicion of spying for Israel after moving to the Defense Department (see 1983).

Entity Tags: Michael Ledeen, Paul Wolfowitz, US Department of State

Timeline Tags: Neoconservative Influence

The US and Iran sign the Algiers Accords. Under the terms of the agreement, the US is required to transfer Iranian assets (see November 14, 1979) held in US banks to Iran. However a portion of this amount is to be held in a security account at the Central Bank for the purpose of ensuring payment of awards to successful US claimants. The balance in this account must never fall below $500 million. Additionally, the agreement requires the US to pledge noninterference in Iran’s affairs. [US Department of the Treasury. Office of Foreign Assets Control, 11/1979; US President, 11/16/1998; Microsoft Encarta Online Encyclopedia, 5/27/2005]

Entity Tags: Algiers Accords

Timeline Tags: US confrontation with Iran

Ronald and Nancy Reagan celebrate winning the presidency.Ronald and Nancy Reagan celebrate winning the presidency. [Source: Medal of Freedom (.com)]After winning a sweeping election victory against President Jimmy Carter in November 1980, Ronald Reagan is sworn in as US president. The same day that Reagan is sworn in, Iran releases the remaining 52 hostages it has held captive at the US Embassy in Tehran for 444 days (see November 4, 1979-January 20, 1981). [PBS, 2000]

Entity Tags: Ronald Reagan, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Iran-Contra Affair, Elections Before 2000

Neoconservative academic Michael Ledeen is brought into the Defense Department as a consultant on terrorism, via the auspices of Assistant Secretary of Defense Richard Perle, a fellow neoconservative. Ledeen’s supervisor, Noel Koch, is troubled by Ledeen’s frequent visits to his office to read classified documents. When Koch and Ledeen journey to Italy on Pentagon business, Koch learns that Ledeen is considered an “agent of influence” for a foreign government: Israel. After returning from Italy, Ledeen asks Koch to help him obtain two highly classified CIA reports which he says are being held by the FBI. Ledeen gives Koch the reports’ “alpha numeric designators”—numbers as highly classified as the reports themselves. Koch is at a loss to understand how Ledeen obtained such information. Koch tells his executive assistant to stop allowing Ledeen to access the classified materials in his office. In return, Ledeen stops coming to work. [CounterPunch, 2/28/2004] Shortly thereafter, Ledeen will begin “consulting work” for the National Security Council (see Late 1984).

Entity Tags: Michael Ledeen, Central Intelligence Agency, US Department of Defense, Richard Perle, Noel Koch

Timeline Tags: Neoconservative Influence

Neoconservative academic Michael Ledeen, who left the Defense Department under suspicion of engaging in espionage on behalf of Israel (see 1983), gains a position at the National Security Council. His boss is Lieutenant Colonel Oliver North (see July 7-10, 1987 and May-June, 1989). According to Iran-Contra investigators, it is Ledeen who suggests to North “that Israeli contacts might be useful in obtaining release of the US hostages in Lebanon” (see November 4, 1979-January 20, 1981). Ledeen is granted high-level security clearance. [CounterPunch, 2/28/2004]

Entity Tags: Michael Ledeen, National Security Council

Timeline Tags: Iran-Contra Affair, Neoconservative Influence

NSC Middle East analyst Donald Fortier writes to his boss, National Security Adviser Robert McFarlane, of his concerns that NSC consultant Michael Ledeen (see Late 1984) might be a risk for passing classified information to Israel (see 1983). According to Fortier, NSC staffers agree that Ledeen’s role in the secret hostage negotiations with Iran should be limited to ferrying messages to Israeli Prime Minister Shimon Peres regarding Israel’s role in the negotiations, and Ledeen should specifically not be entrusted to ask Peres for detailed operational information. [CounterPunch, 2/28/2004]

Entity Tags: Michael Ledeen, Robert C. McFarlane, National Security Council, Donald Fortier

Timeline Tags: Iran-Contra Affair, Neoconservative Influence

Michael Ledeen, a neoconservative author who consults for the National Security Council (see Late 1984), meets informally with Israeli Prime Minister Shimon Peres. Ledeen tells Peres that the Reagan administration will quietly support Israeli arms shipments to Iran. [New York Times, 11/19/1987]

Entity Tags: Reagan administration, National Security Council, Shimon Peres, Michael Ledeen

Timeline Tags: Iran-Contra Affair, Neoconservative Influence

Secretary of State George Shultz writes to National Security Adviser Robert McFarlane that “Israel’s record of dealings with Iran since the fall of the Shah and during the hostage crisis [shows] that Israel’s agenda is not the same as ours.” Referring to the plan concocted by NSC staffer Oliver North and North’s consultant, neoconservative and likely Israeli spy Michael Ledeen (see 1983), to seek Israeli help in freeing the American hostages in Lebanon (see Late 1984 and April 9, 1985), Shultz writes, “Consequently doubt whether an intelligence relationship such as what Ledeen has in mind would be one which we could fully rely upon and it could seriously skew our own perception and analysis of the Iranian scene.” [CounterPunch, 2/28/2004]

Entity Tags: Robert C. McFarlane, George Shultz, Oliver North, Michael Ledeen

Timeline Tags: Iran-Contra Affair, Neoconservative Influence

Neoconservative author and likely Israeli spy Michael Ledeen (see April 9, 1985), a consultant for the National Security Council (see Late 1984), has his security clearance downgraded by the Department of Defense. Ledeen formerly held “Top Secret-SCI” clearance; he now holds only “Secret” clearance. [CounterPunch, 2/28/2004]

Entity Tags: Michael Ledeen, US Department of Defense, National Security Council

Timeline Tags: Neoconservative Influence

Retired Air Force Major General Richard Secord becomes deeply involved in organizing a covert supply operation for Nicaragua’s Contras under the name “Airlift Project.” Secord later testifies to the Congressional Iran-Contra Committee that the project’s money comes from private donations and friendly foreign governments. [New York Times, 11/19/1987]

Entity Tags: Contras, Joint House-Senate Iran-Contra Committee, Richard Secord

Timeline Tags: Iran-Contra Affair

Oliver North, the National Security Council staffer who handles the Iran-Contra dealings, tells Israeli Defense Ministry officials that he plans to use profits from future arms sales to Iran to fund the Nicaraguan Contras. [New York Times, 11/19/1987] North will not inform his supervisor, National Security Adviser Robert McFarlane, for five more months (see May 29, 1986).

Entity Tags: Oliver North, Robert C. McFarlane

Timeline Tags: Iran-Contra Affair

Defense Department official Noel Koch arranges to discuss a matter of potential espionage with the FBI. Koch is worried that his former aide, neoconservative Michael Ledeen, has access to highly classified information in his role as a National Security Council consultant (see Late 1984 and May 3, 1985). Koch feels that Ledeen had possibly given classified information to Israel during his tenure at the Defense Department (see 1983). Koch is debriefed for two hours by FBI investigators, who tell him that they are only worried about possible Soviet espionage. Koch wonders at this, considering that Naval intelligence analyst Jonathan Pollard had been arrested just months before and charged with espionage on behalf of Israel. A frustrated Koch writes up his knowledge of Ledeen’s actions at the Defense Department and sends the report to Senator Charles Grassley (R-IA), a member of the Senate Intelligence Committee. Nothing concrete comes from Koch’s attempts to alert the FBI and Congress to potential espionage by Ledeen. [CounterPunch, 2/28/2004]

Entity Tags: Jonathan Pollard, Charles Grassley, Federal Bureau of Investigation, US Department of Defense, Michael Ledeen, National Security Council, Noel Koch

Timeline Tags: Neoconservative Influence

National Security Council official Oliver North tells National Security Adviser John Poindexter that his consultant, neoconservative Michael Ledeen, is no longer trustworthy. Ledeen has long been suspected of operating as a spy for Israel (see April 9, 1985 and August 20, 1985). North tells Poindexter that “for [the] security of the Iran initiative,” Ledeen should be asked to take periodic polygraph examinations. [CounterPunch, 2/28/2004]

Entity Tags: John Poindexter, National Security Council, Oliver North, Michael Ledeen

Timeline Tags: Iran-Contra Affair, Neoconservative Influence

Lieutenant Colonel Oliver North, the National Security Council staffer who facilitates the secret Iran arms deals, helps divert $12 million in money from those arms sales to the Nicaraguan Contras. The deal is documented in a memorandum located in North’s desk by investigators for Attorney General Edwin Meese (see November 21-25, 1986). Meese will inform President Reagan and top White House officials of the memo, but many of the cabinet members and top officials he will inform already know of the transaction. [United States Court of Appeals for the District of Columbia Circuit, 8/4/1993] National Security Adviser John Poindexter, the recipient of the memo, will later testify that President Reagan never saw the memo. Reagan will deny knowing anything about the diversion of arms profits to the Contras until November 1986 (see November 10, 1986 and After and November 13, 1986). [New York Times, 11/19/1987]

Entity Tags: John Poindexter, Edwin Meese, Contras, Oliver North, Ronald Reagan, Reagan administration

Timeline Tags: Iran-Contra Affair

Attorney General Edwin Meese.Attorney General Edwin Meese. [Source: Doug Mills / Bettman / Corbis]Attorney General Edwin Meese undertakes an internal fact-finding investigation focused on President Reagan’s involvement in the November 1985 sale of Hawk missiles to Iran (see 1985). Meese is apparently not interested in finding facts, because he refuses a request to assist from the FBI, and takes no notes during his interviews of administration officials.
'Shredding Party' - Additionally, during his investigation, National Security Council documents are altered or destroyed, including a presidential finding from December 1985 that retroactively authorized US missile sales to Iran (see November 24-25, 1985 and December 5, 1985); National Security Adviser John Poindexter will later admit to destroying this document. Lieutenant Colonel Oliver North holds what is later called a “shredding party,” destroying thousands of documents that would likely implicate White House officials in a criminal conspiracy to break the law (see November 21-23, 1986). The Iran-Contra investigative committee will later fault Meese for departing from “standard investigative techniques” during his investigation.
Document Linking Iran Arms Sales, Contra Supplies Survives - Meese also finds a potentially explosive document in the desk of North, the National Security Council staffer who managed the Iran arms deals. The document, an undated memorandum apparently from April 1986, outlined “a planned diversion of $12 million in proceeds from the Iran arms sales to the Nicaraguan contras” (see April 4, 1986). Meese’s investigation now diverges onto two tracks, one a continuation of the Hawk shipments, and the second an investigation into who knew about, and who had approved, the diversion.
Reagan Courting Impeachment? - Meese confirms from North that the $12 million had indeed been given to the Contras, and informs Reagan, Chief of Staff Donald Regan, and Vice President Bush. Reagan is reportedly shocked by the revelation, in part because he knows he could face impeachment for violating the Boland Amendment (see October 10, 1984). Meese informs the cabinet the next day. Apparently Meese does not want to know if any senior White House officials knew of the diversion, because he does not ask them about it. When Poindexter informs Meese that before December 1985, his predecessor Robert McFarlane handled the Iran arms sales “all alone” with “no documentation,” Meese accepts his word. Several White House officials present at the meeting—Reagan, Regan, Bush, Poindexter, Secretary of State George Shultz, and Secretary of Defense Caspar Weinberger—all know that Poindexter is lying, but none correct him. After the meeting, Shultz tells his aide, Charles Hill: “They may lay all this off on Bud [McFarlane].… They [are] rearranging the record.” Investigative counsel Lawrence Walsh will later write: “The Select Committees viewed this as an isolated error. It was not.”
'Case for Deniability' for Reagan - In Walsh’s opinion, Meese is not conducting an investigation at all, but instead is “building a case of deniability for his client-in-fact, President Reagan.” Walsh will characterize Meese’s actions as “an effort to obstruct a congressional inquiry.” In 2006, authors Lou Dubose and Jake Bernstein will write, “The two strands of an illegal policy came together in that memo.” The authors refer to the US arms sales to Iran and the diversion of the profits from those sales to the Contras. [New York Times, 11/19/1987; United States Court of Appeals for the District of Columbia Circuit, 8/4/1993; PBS, 2000; Dubose and Bernstein, 2006, pp. 66]

Entity Tags: Charles Hill, Edwin Meese, Caspar Weinberger, Ronald Reagan, Robert C. McFarlane, Oliver North, Federal Bureau of Investigation, George Herbert Walker Bush, George Shultz, Jake Bernstein, Contras, Donald Regan, Lou Dubose, Lawrence E. Walsh, John Poindexter

Timeline Tags: Iran-Contra Affair

CIA Director William Casey abruptly resigns due to terminal brain cancer (see December 18, 1986). Casey’s illness makes him unavailable to testify before the Congressional Iran-Contra investigation, a huge boon for committee Republicans who are determined to keep the truth of Iran-Contra from being revealed (see January 6-7, 1987). Casey had been one of the prime movers behind the Iran arms sales, and was National Security Council staffer Oliver North’s prime supervisor in what insiders call “the Enterprise”—the ad hoc organization run by North and retired General Richard Secord (see November 19, 1985) that trained, supplied, and even at times fought for Nicaragua’s Contras. North and Secord’s organization managed to evade Congressional oversight and ignore laws passed to limit US involvement in the Nicaraguan insurgency (see October 10, 1984). According to upcoming testimony from North, Casey saw “the Enterprise” as such a success that it should serve as a model for other US covert operations around the globe. It was Casey’s idea to have foreign countries such as Saudi Arabia (see July, 1984) and Brunei (see June 11, 1986) supply money to the Contras, over the objections of White House officials such as Secretary of State George Shultz, who told Casey in reference to the phrase “quid pro quo” that he should remember that “every quid had a quo.” As one Democratic congressmen later puts it, Casey was the “godfather” of the entire Iran-Contra operation, and his unavailability to the committee is a tremendous blow to its ability to find the truth. [Dubose and Bernstein, 2006, pp. 70]

Entity Tags: George Shultz, Contras, William Casey, Richard Secord, Oliver North, Joint House-Senate Iran-Contra Committee

Timeline Tags: Iran-Contra Affair

Richard Secord receives whispered advice from his attorney, Thomas Green, during his testimony.Richard Secord receives whispered advice from his attorney, Thomas Green, during his testimony. [Source: Bettmann / Corbis]Public testimony begins in the joint House and Senate investigations of the Iran-Contra affair. General Richard Secord (see November 19, 1985) is the first witness (see May 5, 1987). [New York Times, 11/19/1987]
'Hero's Angle' - The televised hearing area in Room 325 of the Senate Office Building, built to accommodate over two dozen committee members, their staff, witnesses, lawyers, and television reporters and camera operators, features a series of two-tiered stages. Film director Steven Spielberg will later tell Senate counsel Arthur Liman that from a visual viewpoint, the staging is a terrible mistake; the witnesses appear on television “at the hero’s angle, looking up as though from a pit at the committees, who resembled two rows of judges at the Spanish Inquisition.” Authors Lou Dubose and Jake Bernstein will note with some sardonicism that the committee’s two lawyers could not have been better choices to play television villains. Liman is “a nasal-voiced New York ethnic with ‘spaghetti hair,’” and House counsel John Nields is “a balding lawyer with long locks down to his collar who couldn’t keep his distaste for the witnesses from creeping into his voice.”
Opening Statements; Cheney Blames Congress, Not the White House - The hearings open with the usual long-winded opening statements from the various committee members. Representative Dick Cheney (R-WY), the leader of the Republican hardline contingent, makes it clear from the outset where he intends to go in the investigation. “Some will argue that these events justify the imposition of additional restrictions on presidents to prohibit the possibility of similar occurrences in the future,” he says. “In my opinion, this would be a mistake. In completing our task, we should seek above all to find ways to strengthen the capacity of future presidents and future Congresses to meet the often dangerous and difficult challenges that are bound to rise in the years ahead.” He then introduces his counter-argument: Congress’s dithering, not the Reagan administration’s clear violation of the law, is the crux of the problem with the Iran-Contra affair. “One important question to be asked is to what extent did the lack of a clear-cut policy by the Congress contribute to the events we will be exploring in the weeks ahead?” Cheney and his colleagues will argue that because Congress had supported the Contras in the past, its decision not to continue that support was an unforgivable breach, “a form of actionable negligence,” in Dubose and Bernstein’s words, that made it necessary for the Reagan administration to establish “a parallel support network as a ‘bridging’ mechanism until Congress could be brought around to a sensible policy.” Oliver North will echo this concept in his own testimony (see July 7-10, 1987), driving committee Vice Chairman Warren Rudman (R-NH) to retort: “The American people have the Constitutional right to be wrong. And what Ronald Reagan thinks, or what Oliver North thinks or what I think or what anybody else thinks makes not a whit if the American people say, ‘Enough.’” [Dubose and Bernstein, 2006, pp. 72-75]

Entity Tags: Richard Secord, John Nields, Jake Bernstein, Contras, Arthur Liman, Joint House-Senate Iran-Contra Committee, Reagan administration, Lou Dubose, Richard (“Dick”) Cheney, Steven Spielberg, Oliver North

Timeline Tags: Iran-Contra Affair

May 6, 1987: Former CIA Director Casey Dies

Former CIA Director William Casey (see February 2, 1987) dies as a result of his inoperable brain cancer. Casey was a key figure in the Iran-Contra machinations. Authors Lou Dubose and Jake Bernstein will later write, “In death he would become a helpful scapegoat for Oliver North and a resting place for missing information that would have filled out the contours of the scandal.” [Dubose and Bernstein, 2006, pp. 70] Casey had been named as one of the architects of the scheme to use profits from illegal arms sales to Iran to secretly fund the Nicaraguan Contras (see May 5, 1987). He had been hospitalized since April 25, and unable to testify in the Iran-Contra hearings. The immediate cause of death is what doctors call “aspiration pneumonia,” which may mean that Casey inhaled food or food particles in his lungs that set up a toxic chemical reaction. A physician not involved in Casey’s treatment says that Casey may have had trouble swallowing properly. The hospital in Glen Cove, Long Island refuses to give any more details. Despite the swirling Iran-Contra controversy, President Reagan says of his longtime colleague and friend: “His nation and all those who love freedom honor today the name and memory of Bill Casey. In addition to crediting him with rebuilding America’s intelligence capability, history will note the brilliance of his mind and strategic vision, his passionate commitment to the cause of freedom and his unhesitating willingness to make personal sacrifices for the sake of that cause and his country.” [New York Times, 5/7/1987]

Entity Tags: Lou Dubose, Oliver North, Ronald Reagan, William Casey, Contras, Jake Bernstein

Timeline Tags: Iran-Contra Affair

Testimony in the Iran-Contra investigations turns to the possibility that NSC aide Michael Ledeen may have profited from the US sales of arms to Iran through Israel (see January 24, 1986). Ledeen’s former supervisor at the Department of Defense, Noel Koch, who has long suspected Ledeen of spying for Israel (see 1983 and 1986), says that he first became suspicious of Ledeen when he learned that the price Ledeen had negotiated for the sale to the Israeli government of basic TOW missiles was $2,500 each. Koch found that no TOW missile had ever been sold to any foreign government for less than $6,800 per unit. Under orders from his superiors in the department, Koch renegotiated the deal with an Israeli official, eventually raising the price to $4,500 per missile, almost twice what Ledeen had “negotiated” in Israel. Author Stephen Green, who will write two books on US-Israeli relations, will comment, “There are two possibilities here—one would be a kickback, as suspected by his NSC colleagues, and the other would be that Michael Ledeen was effectively negotiating for Israel, not the US.” [CounterPunch, 2/28/2004]

Entity Tags: US Department of Defense, Joint House-Senate Iran-Contra Committee, Michael Ledeen, Stephen Green, Noel Koch, National Security Council

Timeline Tags: Iran-Contra Affair, Neoconservative Influence

Oliver North testifying before the Iran-Contra Committee.Oliver North testifying before the Iran-Contra Committee. [Source: Bettmann / Corbis]Lieutenant Colonel Oliver North testifies before the joint House-Senate Iran-Contra investigative committee. During the course of his testimony, he says he does not know if President Reagan had any knowledge of the diversion of funds from Iranian arms sales to the Nicaraguan Contras (see December 6, 1985 and April 4, 1986). North also testifies that William Casey, the recently deceased CIA director (see May 6, 1987), knew of and approved the diversion of funds to the Contras. North admits that the Iranian arms sales were initially designed to help facilitate the release of the American hostages being held by Hezbollah. [New York Times, 11/19/1987]
Tour de Force - North’s testimony is a “tour de force,” in the words of authors Lou Dubose and Jake Bernstein, that allows Republicans the opportunity to reverse the field of the hearings and go on the offensive instead of defending the conduct of the Reagan administration. North, a Marine lieutenant colonel, wears his full-dress Marine uniform throughout his entire testimony with rows of ribbons festooning his chest. Handsome and full of righteous patriotism, he is striking on television, and contrasts well with the nasal, disdainful committee lawyers (see May 5, 1987) who spend four days interrogating him.
Need to Free Hostages Trumps Law - For the first two days, North and House counsel John Nields spar for the cameras. North says that Casey had directed him to create the so-called “Enterprise” (see November 19, 1985 and February 2, 1987), the clandestine organization that supported the Nicaraguan Contras with money, weapons, and sometimes US personnel. North admits to shredding untold amounts of evidence after the operation came to light (see November 21-25, 1986). He also admits to lying to Congress in previous testimony. But all of his actions are justified, he says, by the need to get Iran to free the American hostages. “I’d have offered the Iranians a free trip to Disneyland if we could have gotten Americans home for it,” he declares in response to one question about US arms sales to Iran. Senate counsel Arthur Liman will later write, “He made all his illegal acts—the lying to Congress, the diversion [of funds from Iranian arms sales to the Contras], the formation of the Enterprise, the cover-up—seem logical and patriotic.”
Targeting Covert Operations - Nields’s preferred line of questioning—covert operations—makes many committee members uncomfortable. Some House Democrats want to use the investigation to further their own goals of limiting covert actions, and others simply want the truth to be revealed. In contrast, House Republicans are united in opposition to any details of covert operations being revealed on national television and thus hampering the president’s ability to conduct future operations as needed. After the first day of North’s testimony, committee member Dick Cheney (R-WY) exults on PBS that North “probably was as effective as anybody we’ve had before the committee in coming forward very aggressively and stating what he did, saying why he did it, arguing that he was in fact authorized to take the activities that he did.”
Leaky Congress Unfit to Know of Covert Ops, North Contends - North echoes Cheney’s position that the question is not whether White House officials broke the law, but whether Congress was fit to consider the question of national security at all. North goes so far as to question the propriety of the hearings themselves: “I believe that these hearings, perhaps unintentionally so, have revealed matters of great secrecy in the operation of our government, and sources of methods of intelligence activities have clearly been revealed, to the detriment of our security.” North’s message is clear: Congress is not fit to handle covert operations or, by and large, to even know about them. Best for the legislature to allow the White House and the intelligence community to do what needs doing and remain quiet about it. North’s contention that Congress has leaked vital national security information is shot down by Senate committee chairman Daniel Inouye (D-HI), who not only forces North to admit that he has no evidence of his contention, but that the White House, not Congress, is the main source of leaked classified information. Indeed, North himself has leaked information (see July 7-10, 1987). Inouye’s co-chair, Warren Rudman (R-NH) will later say: “The greatest leaks came out of the White House. North and company were the biggest leakers of all during that period.” [Dubose and Bernstein, 2006, pp. 75-78] Nields, addressing North’s implication that the NSC has no obligation to tell the truth to Congress, says towards the end of his session with North: “We do believe in a democracy in which the people, not one lieutenant colonel, decide important policy issues, don’t we? … You denied Congress the facts North had admitted to lying about the government’s involvement with the Hasenfus plane. You denied the elected representatives of the people the facts.” [Boston Globe, 7/9/1987]
Impact on Public Opinion - Results will differ on North’s popularity with viewers (see July 9-31, 1987).

Entity Tags: William Casey, Warren Rudman, Ronald Reagan, Oliver North, Joint House-Senate Iran-Contra Committee, Arthur Liman, Bush administration (41), Contras, Daniel Inouye, Hezbollah, Richard (“Dick”) Cheney, John Nields, Jake Bernstein, Lou Dubose

Timeline Tags: Iran-Contra Affair

Public opinion is sharply divided on the testimony, believability, and popularity of Lieutenant Colonel Oliver North after his testimony before Congress’s Iran-Contra committee (see July 7-10, 1987). A Washington Post/ABC News poll shows 64 percent of those surveyed have a “favorable opinion” of North after watching his testimony. But the “scores of letters received” by the Post was almost exactly opposite, with two-thirds expressing disapproval or reservations about North’s testimony. The Post reports, “Of 130 letters that could be categorized easily as either favorable or unfavorable, 39 were favorable, 91 unfavorable.” One of the unfavorable letters reads in part: “I wish to register an emphatic voice that does not join in the general adulation of… North. He is certainly bright, articulate, sincere and dedicated—but not to the basics of democracy, the rule of law or the tenets of the Constitution.” One favorable letter characterizes North as “the guy we thought we were voting for when we voted for Reagan,” and lauds North for “his endeavor to help release our hostages, get a better relationship with Iran and most of all support the Nicaraguan contras with both military arms and humanitarian supplies.” Many of the letters in support of North chastize the media. One letter writer accuses the Post and the television news media of mocking North throughout his testimony, and concludes that after North’s performance, “the media have, at long last, been hoist on their own petard.” The Post reports that “the mix of letters” is “evidently not so very different from that received at other newspapers across the country,” with “letters editors at the Chicago Tribune, the Los Angeles Times and the New York Times all reported more mail against North. USA Today said the mail is now running 50-50 after an initial flurry of mail in North’s favor.” According to Gallup Polls president Andrew Kohut, letter writers are more articulate, more involved in public affairs, and more politicized than people who don’t write. Also, “people who hold intense attitudes tend to write…” [Washington Post, 7/31/1987] Television news anchors and pundits are equally divided. NBC’s Tom Brokaw says North “performed the congressional equivalent of a grand slam, a touchdown, a hole-in-one, a knockout. You can almost hear his supporters around the country chanting ‘Ol-lie, Ol-lie, Ol-lie.’” But CBS’s Dan Rather asks why North did not do as he had sworn to do and take all the blame for the Iran-Contra machinations: “Whatever happened to the idea that he would take arrows in his chest?” [Boston Globe, 7/9/1987]

Entity Tags: Washington Post, Chicago Tribune, Andrew Kohut, ABC News, Dan Rather, Joint House-Senate Iran-Contra Committee, Los Angeles Times, New York Times, Tom Brokaw, USA Today, Oliver North

Timeline Tags: Iran-Contra Affair

On the last day of Oliver North’s testimony to the Joint House-Senate Iran-Contra Committee (see July 7-10, 1987), ranking Republican Dick Cheney handles the questioning. Authors Lou Dubose and Jake Bernstein will observe that the questioning is more of “a duet than an interrogation.”
Praise from Cheney to North - Cheney opens by praising North’s handling of the hearings, saying, “I know I speak for a great many people who have been watching the proceedings, because the Congress has been absolutely buried in the favorable public reaction to your testimony and phone calls and telegrams” (see July 9-31, 1987). North has taken to stacking piles of supportive telegrams on his witness table; what he and Cheney do not tell those watching the hearings is that Western Union is offering a half-price special on pro-North telegrams sent to the committee.
Obvious Orchestration - Dubose and Bernstein later write that Cheney and North’s session is so perfectly carried out that it seems scripted and rehearsed, “complete with programmed queries and answers not available to everyone else.” Committee co-chairman Warren Rudman (R-NH) later says, “It was apparent to me that there was coordination going on.” Bruce Fein, the Republican staff’s chief of research, later admits that there was indeed such collaboration, though he says it was nothing more than “coordinat[ing] strategy.” Cheney and North’s duet paints North as nothing more than a guy who wanted “to cut through red tape” to save Nicaragua from Communism. North takes the opportunity to portray the selfless hero: “Hang whatever you want around the neck of Ollie North… but for the love of God and the love of this nation, don’t hang around Ollie North’s neck the cutoff of funds to the Nicaraguan resistance again. This country cannot stand that, not just because of Nicaragua, but because of all the other nations in the world who look at us and measure by what we do now in Nicaragua, the measure of our whole commitment to their cause. To things like NATO, to things like our commitment to peace and democracy elsewhere in the world.”
'Turnaround from Defense to Offense [Is] Complete' - Dubose and Bernstein later write, “The two men were now in the zone, a parallel radical-right fantasyland, blissfully ignoring the damage to America’s reputation caused by the administration’s support for the Contras and its willingness to barter weapons for hostages with Iran and Hezbollah.” Cheney and North ignore the World Court’s condemnation of the US mining of Nicaraguan harbors, the Contras’ attacks on civilian targets such as medical centers while refusing to engage the Sandinista forces themselves, which had inflamed outrage in Europe, and the ridicule that Iranian hardliners had subjected US attempts to open negotiations. Cheney’s questioning strategy is so successful that he is able to offer North his remaining time to present a slideshow on why funding the Contras is so important. Dubose and Bernstein later write, “The turnaround from defense to offense was complete.” [Dubose and Bernstein, 2006, pp. 75-78, 80]

Entity Tags: Richard (“Dick”) Cheney, Contras, Jake Bernstein, Joint House-Senate Iran-Contra Committee, Lou Dubose, Oliver North, Warren Rudman

Timeline Tags: Iran-Contra Affair

Former National Security Adviser John Poindexter is indicted on seven felony counts relating to his participation in the Iran-Contra affair. Poindexter is named with fellow Iran-Contra conspirators Oliver North, Richard Secord, and Albert Hakim as part of a 23-count, multi-defendant indictment. The charges are based on evidence that shows all four defendants conspired to defraud the United States and violate federal law by secretly providing funds and supplies to the Nicaraguan Contras. The cases will soon be severed and each defendant will be tried separately (see May-June, 1989). [FINAL REPORT OF THE INDEPENDENT COUNSEL FOR IRAN/CONTRA MATTERS: Chapter 3: United States v. John M. Poindexter, 8/4/1993; PBS, 2000]

Entity Tags: Richard Secord, Albert Hakim, Oliver North, Contras, John Poindexter

Timeline Tags: Iran-Contra Affair

Lieutenant Colonel Oliver North, the former National Security Council member who had been a key figure in the Iran-Contra scandal (see July 7-10, 1987), is tried for crimes related to the operation (see March 16, 1988). [Dubose and Bernstein, 2006, pp. 82]

Entity Tags: Oliver North, National Security Council

Timeline Tags: Iran-Contra Affair

Lieutenant Colonel Oliver North, a key figure in the Iran-Contra scandal (see February 1989), is convicted of three counts of falsifying and destroying documents (see November 21-25, 1986 and March 16, 1988), of obstructing a Congressional investigation, and of illegally receiving a gift of a security fence around his home. He is acquitted of nine other counts. Though facing up to ten years in prison and a $750,000 fine, North receives an extremely lenient sentence: three years’ suspended, two years’ probation, community service, and a $150,000 fine. He also has his Marine service pension suspended. During the trial, North admits he lied repeatedly to Congress during his testimony (see July 7-10, 1987), but says that his superiors, including National Security Adviser John Poindexter, ordered him to lie under oath. North contends that he was made a scapegoat for the Reagan administration. “I knew it wasn’t right not to tell the truth about these things,” he says, “but I didn’t think it was unlawful.” US District Court Judge Gerhard Gesell calls North a “low-ranking subordinate who was carrying out the instructions of a few cynical superiors,” and says to North: “I believe you still lack understanding of how the public service has been tarnished. Jail would only harden your misconceptions.” North, who had been staunch in justifying his actions in the Iran-Contra hearings, now expresses remorse over his crimes, saying, “I recognize that I made many mistakes that resulted in my conviction of serious crimes… and I grieve every day.” North, who is a popular speaker with conservative organizations, can pay off his fine with six speaking engagements. Nevertheless, he says he will appeal his conviction. [BBC, 7/5/1989; New York Times, 9/17/1991] North’s conviction will indeed be overturned by an appeals court (see September 17, 1991).

Entity Tags: John Poindexter, Reagan administration, Oliver North, Gerhard Gesell

Timeline Tags: Iran-Contra Affair

A federal judge drops all charges against convicted felon Oliver North (see May-June, 1989). A federal appeals court had reversed part of North’s conviction and ordered the case returned to a US District Court for the remainder of the convictions. District Judge Gerhard Gesell, who presided over the original trial that found North guilty of three felonies, drops the charges after special prosecutor Lawrence Walsh says he is forced to abandon the prosecution of North. In order to testify before the Iran-Contra hearings (see July 7-10, 1987), North was granted limited immunity from prosecution, and Walsh says prosecutors will be unable to show that North’s immunity grant did not affect his trial testimony, and the testimony of witnesses in his earlier trials. The decision by Walsh and Gesell brings to an end five years of court proceedings against North, who calls himself “fully, completely” vindicated. Last week, former National Security Adviser Robert McFarlane, North’s former superior and mentor, testified that his testimony in North’s earlier trials had been heavily influenced by North’s testimony before Congress. President Bush says: “He’s been through enough. There was an appeal. He’s been let off. Now that’s the system of justice is working.… I’m very, very pleased.” Senate Majority Leader Bob Dole (R-KS) says the Walsh investigation should be closed down entirely, saying, “What have American taxpayers received for their $50 million?” referring to some estimates of the cost of the overall inquiry. “A lot of press releases. A lot of rumor and innuendo. But little in terms of justice.” Walsh, who had opposed immunity for North from the start of the investigations in 1987, says: “This is a very, very serious warning that immunity is not to be granted lightly. Now, I have never criticized Congress. I urged them not to grant immunity, but they have the very broad political responsibility for making a judgment as to whether it’s more important that the country hear the facts quickly or that they await a prosecution.” [New York Times, 9/17/1991] An outraged New York Times editorial says that North’s claim of complete exoneration is a “wild overstatement” and calls the reversal “a serious setback for another objective of democratic government: promptly to uncover the truth in high-profile cases and to prosecute them when necessary without sacrificing the Constitution’s privilege against compelled self-incrimination.” It concludes: “Mr. North can thank his battling lawyers and a fastidious judiciary for letting him beat the rap. That remains far short, however, of exoneration.” [New York Times, 9/17/1991]

Entity Tags: Oliver North, Robert C. McFarlane, Robert J. (“Bob”) Dole, Lawrence E. Walsh, New York Times

Timeline Tags: Iran-Contra Affair

Former Assistant Secretary of State Elliott Abrams, facing multiple counts of lying under oath to Congress about, among other things, his knowledge of the US government’s involvement in the resupply operation to the Nicaraguan Contras (see October 10-15, 1986), his knowledge of the role played by former CIA agent Felix Rodriguez in the resupply (see December 17, 1986), and his knowledge of third-party funding of the Nicaraguan Contras (see November 25, 1986), agrees to plead guilty to two misdemeanor charges of withholding evidence from Congress. Abrams agrees to the plea after being confronted with reams of evidence about his duplicity by investigators for special prosecutor Lawrence Walsh as well as from testimony elicited during the House-Senate investigation of 1987 (see July 7-10, 1987) and the guilty plea and subsequent testimony of former CIA agent Alan Fiers (see July 17, 1991). Abrams pleads guilty to two counts of withholding information from Congress, to unlawfully withholding information from the Senate Foreign Relations Committee and the House Intelligence Committee, and admits lying when he claimed that he knew nothing of former National Security Council official Oliver North’s illegal diversion of government funds to the Contras (see December 6, 1985, April 4, 1986, and November 25-28, 1986). Abrams says that he lied because he believed “that disclosure of Lt. Col. [Oliver] North’s activities in the resupply of the Contras would jeopardize final enactment” of a $100 million appropriation pending in Congress at the time of his testimony, a request that was narrowly defeated (see March 1986). Abrams also admits to soliciting $10 million in aid for the Contras from the Sultan of Brunei (see June 11, 1986). [Final Report of the Independent Counsel for Iran/Contra Matters: Chapter 25: United States v. Elliott Abrams: November 1986, 8/4/1993]

Entity Tags: Elliott Abrams, Alan Fiers, Contras, Felix Rodriguez, House Intelligence Committee, Senate Foreign Relations Committee, Lawrence E. Walsh

Timeline Tags: Iran-Contra Affair

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Timeline Tags: Civil Liberties

Retired Colonel David Hackworth, a columnist for Newsweek, talks to PBS interviewer Charlie Rose about his recent interview with accused Oklahoma City bomber Timothy McVeigh (see 8:35 a.m. - 9:02 a.m. April 19, 1995 and April 21, 1995). Hackworth’s interview will result in a brief column (see July 3, 1995) and a cover story (see June 26, 1995), both of which engender tremendous controversy; critics have said that Hackworth has played into McVeigh’s lawyers’ efforts to “soften his image” (see June 26, 1995). Hackworth says that while he “expected to find a monster,” he found a normal young man, “disarming… laid back,” and a “very cool” person. “He came across as the boy that lived next door.” Hackworth says he set up the interview after sending McVeigh a copy of his book About Face, which interested McVeigh enough to have him and attorney Stephen Jones agree to the interview, McVeigh’s first after being arrested. McVeigh is “nothing like I had read in the press.” Rose asks how much of McVeigh’s presentation was “spin” to affect the press, and Hackworth says, “One hundred percent.… He knew that Newsweek talks to 20 million people, he knew that if he could project this kind of ‘boy next door’ image, it would hit the, uh, it might present a new twist on where he is coming from.… He handled himself very well.… He’s so smart that he’s capable of masterminding the operation, which a lot of people in the press said” he was too unintelligent to have done on his own. People in the Pentagon have told him, Hackworth says, that McVeigh could have been a brilliantly successful officer had he stayed in the military. Hackworth says that McVeigh refused to answer direct questions about his carrying out the bombing, instead saying, “We’re going to trial… we’re pleading not guilty.” He calls the bombing a “precise… military operation” that “wasn’t something a militia type, frothing at the mouth, could have put together.” The bombing was handled well, he says, up until McVeigh’s “bug out,” or escape: “To jump in that old car… and get stopped (see 9:03 a.m. -- 10:17 a.m. April 19, 1995) was a minor charge.” Asked what that says about McVeigh, Hackworth replies, “It was almost one of those odd coincidences that we saw in the Lee Harvey Oswald case [the purported assassin of President John F. Kennedy], you know, it was perfect except he’s got the wrong ammunition or something.” Hackworth reiterates his characterization in Newsweek of McVeigh suffering from a “postwar hangover,” a depression that ensued after the war ended and he lost his battlefield comrades (see November 1991 - Summer 1992); his judgment became clouded and his thinking became skewed. Hackworth says that McVeigh denies any miltia ties whatsoever, and denies ever claiming he was being held as a “prisoner of war,” as news reports have alleged. Hackworth says that McVeigh told him he was treated well by his jailers, but says that McVeigh asked why he was not given a bulletproof vest on his short walk from the Noble County Courthouse to his transport to the El Reno federal facility. Hackworth says that the blank, grim look on McVeigh’s face that has characterized him in the news is actually the “thousand-yard stare” that soldiers get when they are expecting to be shot. Hackworth says he expected to “push a button” by asking McVeigh about the Branch Davidian standoff and ultimate tragedy (see April 19, 1993 and April 19, 1993 and After), but McVeigh was not rattled. He concludes that when he interviewed accused Iran-Contra conspirator Oliver North (see May-June, 1989), he caught North in “a hundred lies,” but he did not catch McVeigh in a single lie. Either McVeigh was telling the truth, Hackworth says, or he is a masterful liar. [PBS, 6/26/1995]

Entity Tags: Charlie Rose, Timothy James McVeigh, El Reno Federal Corrections Center, David Hackworth

Timeline Tags: US Domestic Terrorism

Jury selection begins in the trial of Oklahoma City bomber Timothy McVeigh (see 8:35 a.m. - 9:02 a.m. April 19, 1995 and August 10, 1995). Judge Richard Matsch has denied defense attempts to delay the trial after a brief controversy erupted over media reports using defense documents (see February 28 - March 4, 1997). “I have full confidence that a fair-minded jury can and will be impaneled and that those selected will return a just verdict based on the law and evidence presented to them,” Matsch wrote on March 17. Jurors’ identities are kept hidden from the press. One potential juror, asked by US Attorney Patrick Ryan, “Did you watch a lot of the coverage?” answers: “It was unavoidable. In Oklahoma, it was wall to wall and floor to ceiling.” Another potential juror says he worries about his safety in regards to what he will learn in the course of the trial: “It would seem this case goes further, wider, and deeper in many ways. A juror is going to be an insider on information he might just as soon not know.” [Washington Post, 3/18/1997; New York Times, 4/1/1997; Douglas O. Linder, 2001] The pressure of this being a death-penalty trial, and the prospect of potentially confusing forensic evidence countered by the raw emotions of the bombing itself and of the conspiracy theories surrounding the proceedings, raises oft-asked questions about the competence of 12 jurors to find the truth in such a complex situation. The difference between an open-minded juror and one who is ignorant or intellectually challenged is difficult for lawyers and observers to assess. New York Times reporter Laura Mansnerus reflects on the trial of Lieutenant Colonel Oliver North, charged with crimes relating to the Iran-Contra scandal (see July 7-10, 1987 and May-June, 1989), in which, she writes: “When the jury was selected for the 1989 trial of Oliver North, a search went out for 12 people who knew nothing about Oliver North, which produced, well, 12 people who knew nothing about Oliver North. One person who qualified for service said she had seen him on television, but added, ‘It was just like I was focusing on the Three Stooges or something.’” That ill-informed jury proved remarkably pliable to North’s theatrics, Mansnerus writes, and many believe McVeigh’s defense team hopes for a similar jury pool that may be willing to set aside scientific evidence in favor of conspiracy theories and emotional pleas. Jury expert Jeffrey Abramson of Brandeis University tells Mansnerus: “In a case that’s heavy on scientific, forensic evidence, the defense is going to favor people who are less sophisticated about scientific matters and who are prone to conspiracy theories. That’s the classic defense approach.” Philadelphia prosecutor Jack McMahon warned in a well-known 1986 instructional video of the pitfalls that can result in letting “smart people” on the jury, saying: “Smart people will analyze the hell out of your case. They have a higher standard. They take those words ‘reasonable doubt’ and they actually try to think about them. You don’t want those people.” Moreover, people with jobs requiring any real level of responsibility are routinely excused from jury service; this case is no exception, leaving a pool of jurors with little or no steady employment, spotty educational status, and somtimes limited intellectual capabilities to judge McVeigh’s innocence or guilt. [New York Times, 4/6/1997]

Entity Tags: Jeffrey Abramson, Timothy James McVeigh, Jack McMahon, Patrick M. Ryan, Laura Mansnerus, Richard P. Matsch

Timeline Tags: US Domestic Terrorism

Legal and media analysts say the trial of convicted Oklahoma City bomber Timothy McVeigh (see June 2, 1997) never captured the public’s attention the way some other trials have in recent years. “Maybe it was the absence of cameras in the courtroom,” writes the New York Times’s Bill Dedman. “Maybe the outcome never seemed in doubt. Maybe it was the numerousness of the victims or the nobodyness of the defendant or the mind-numbing horror of the event.” Dedman compares the public interest in the McVeigh trial to the far more sensational, media-saturated trials of acquitted murder suspect O.J. Simpson and the Los Angeles police officers acquitted of beating motorist Rodney King. The McVeigh trial did not attract anywhere near the media and public interest of those two trials, Dedman asserts, based on numerous polls and focus group studies. The McVeigh trial did not even garner the same level of interest as the Oliver North Iran-Contra trial (see July 7-10, 1987 and May-June, 1989). Jeffrey Toobin, a legal analyst for ABC News who wrote a best-selling book on the Simpson case, says: “It’s not that people are uninterested in this story. It’s just that it’s just another story. I’m certainly not writing a book about the McVeigh case.” Polls show that 30 percent of Americans followed the McVeigh case “very closely,” a number not significantly higher than the interest showed in most big news stories, and far lower than the public interest in the Simpson and King trials. Andrew Kohut, director of the Pew Center, says: “There is not the manic interest there was in O.J. at certain points in time. I don’t think people are swept up in the emotion of this. That’s for sure.” Merrill Brown of MSNBC’s Internet news service calls the McVeigh trial one of “the top half-dozen” stories he could recall in the network’s Internet news coverage. “It has not changed people’s lives, like the Simpson case,” Brown says. “It has not reached into the nation’s consciousness like Rodney King or William Kennedy Smith [a member of the Kennedy family accused of rape] or any trial that received national notoriety as a result of cameras.” Most media news outlets covered the McVeigh trial steadily, but with few pre-emptions and special reports. Neither Time nor Newsweek featured the trial as a cover story, and supermarket tabloids paid little attention to the trial. The most obvious reason for the relative lack of media coverage is the lack of cameras in the courtroom. Dedman writes: “As a result, people never got to scrutinize the witnesses’ demeanor, study the prosecutor’s hair style and wardrobe, hear the judge’s voice, watch the lawyers bicker, see the defendant react—all those things that… turned the Simpson case from a trial into a drama.” Media psychology professor Stuart Fischoff says: “I think America has very quickly adapted to a sense of judicial activities as entertainment. [Americans now] expect to see their trials on television” so they can become “hooked.” The trial also lacked the salacious and controversial elements of other trials: unlike the Simpson case, there was virtually no sexual content, nor was there the overt racism that permeated the King trial. And unlike Simpson and Smith, no celebrities or wealthy persons were involved. Fischoff says of McVeigh: “There’s nothing particularly interesting about him. He’s not particularly handsome, he’s not particularly verbal, he’s not particularly horrible. He’s not [convicted serial killer and cannibal] Jeffrey Dahmer; you really can’t love to hate this guy. There’s no Darth Vader quotient.” And though the victims evoked considerable sympathy among Americans, they did not evoke fascination such as the victims in the Simpson murders. Observers such as CNN’s Greta van Susteren have said the victims’ stories were just too painful to contemplate for long; others have said there were too many victims for Americans to focus upon. [New York Times, 6/4/1997]

Entity Tags: Merrill Brown, Andrew Kohut, Bill Dedman, Stuart Fischoff, Greta Van Susteren, Timothy James McVeigh, Jeffrey Toobin

Timeline Tags: US Domestic Terrorism

President Clinton submits his biannual report to Congress on the “National Emergency with Respect to Iran” that was declared in Executive Order 12170 (see November 14, 1979). The report, required under the International Emergency Economic Powers Act, states that Iran is not in full compliance with the Algiers Accords (see January 19, 1981) which require Iran to maintain a certain amount of funds in a special security account for the purpose of honoring claims made against Iran by US claimants. [US President, 11/16/1998]

Entity Tags: Algiers Accords, William Jefferson (“Bill”) Clinton

Timeline Tags: US confrontation with Iran

The Bush White House alleges that officials and aides from the outgoing Clinton administration vandalized the White House in the last days before Bush officials took over. Conservative news site NewsMax reports that the “slovenly misfits” of the Clinton administration “left the [White House] in a shambles” in the transition between the outgoing Clinton administration and the incoming Bush administration. Clinton aides engaged in “deliberate vandalism,” the report says, and cites a General Services Administration (GSA) official estimating that it may cost up to $250,000 to repair the damage. NewsMax quotes a report by another conservative publication, the American Spectator, which itself quotes “an inspector… called in to assess the vandalism as saying that several executive desks were damaged to the point that they must be replaced, and several more offices must be repainted because of graffiti.” [Guardian, 1/26/2001; NewsMax, 1/26/2001] Conservative Internet gossip writer Matt Drudge reports that “White House offices [were] left ‘trashed’” and so-called “[p]orn bombs [and] lewd messages” were left behind. No explanation of what Drudge meant by the “porn bomb” allegation is ever given. [Chicago Sun-Times, 1/27/2001] The allegations of vandalism and theft will prove to be almost entirely false (see February 8, 2001, February 14, 2001, and May 18, 2001).
Gore's Staffers Charged with Worst of Vandalism - British newspaper The Guardian repeats earlier claims that the worst of the damage was found in offices once occupied by staffers for former Vice President Al Gore, and that Gore’s wife, Tipper, has phoned Lynne Cheney, the wife of Vice President Dick Cheney, to apologize for the damage. The story is false (see January 24, 2001). [Guardian, 1/26/2001]
Reports: Cut Phone Lines, Extensive Damage, Pornographic Photos - Both the Washington Post and The Guardian report allegations that computer and telephone lines were “sliced,” voice-mail messages were changed to “obscene remarks and lewd greetings,” desks were overturned, and trash strewn throughout the premises. The reports add that filing cabinets were glued shut with Superglue, pornographic photographs displayed in printers, and “filthy graffiti scrawled on at least one hallway wall.” The Spectator’s inspector adds that “[e]ntire computer keyboards will have to be replaced because the damage to them is more extensive than simply missing keys,” referring to allegations that some White House keyboards had the “W” keys pried off. The Spectator also reports tales of former Clinton staffers reportedly “laughing and giggling about the mess their former colleagues left behind.” A Bush White House official calls the White House “a pigsty” in the aftermath of the transition. “The Gore and Clinton people didn’t ‘clean out’ the place because there was nothing clean about what they did before they left.” The GSA will pursue the former Clinton officials for reimbursement and expenses. The Spectator reports that “investigators” conclude the damage was “the result of a carefully organized campaign of vandalism unlike anything ever seen in the aftermath of a presidential transition.” [NewsMax, 1/26/2001; Guardian, 1/26/2001; Washington Post, 1/26/2001] The New York Daily News reports, “The destruction was so vast that a telecommunications staffer with more than a quarter-century of service was seen sobbing near his office one night last week.” [New York Daily News, 1/27/2001] CNN’s Paula Zahn observes: “All right, but this is the White House, for God’s sakes. We’re not talking about people living in a fraternity.” [Fairness and Accuracy in Reporting, 5/21/2001] Fox News is particularly vehement in its coverage. “They trash[ed] the place,” says Fox commentator Sean Hannity. ”$200,000 in furniture [was] taken out.” Fellow Fox commentator Oliver North (see May-June, 1989) adds: “We should expect from white trash what they did at the White House.… I recommend that what the Bush White House do is peel the wallpaper off that they defaced with their graffiti and ship it off to the Clinton Library so people can see it.” Fox host Bill O’Reilly says, “I mean, the price tag right now is about $200,000, so that’s a felony right there.” And O’Reilly guest Tom Schatz says, referring to the famous film about fraternity life, “They turned it into Animal House.” [Knight Ridder, 2/8/2001; Fairness and Accuracy in Reporting, 5/21/2001]
Air Force One 'Stripped Bare,' Reports Claim - The Guardian also reports that during former President Clinton’s last trip in Air Force One, the presidential jet was subjected to what it calls “an orgy of pilfering” (see January 25-27, 2001). It was “stripped bare” by aides, who reportedly took china, silverware, salt and pepper shakers, and other items, most bearing the presidential seal. [Guardian, 1/26/2001] On Fox, Hannity charges, “They strip[ped] Air Force One of the china and everything else that wasn’t bolted down.” [Knight Ridder, 2/8/2001]
Clinton Officials Admit to 'Pranks,' Bush Officials Allege Attempts at Theft - Clinton and Gore officials deny the reports of vandalism, but admit to carrying out pranks such as removing the “W” keys and affixing satirical signs to office doors that read, “Office of Strategery,” “Office of Subliminable Messages,” and “Division of Uniting.” A former Clinton official says, “It’s childish, but it’s also funny.” However, a senior Bush official accuses Clinton staffers of attempting to steal White House paintings and official seals from doors, and attempting to have those items shipped to themselves; Bush officials have ordered that all packages leaving the White House be X-rayed. [Washington Post, 1/26/2001]
Bush Aide Documenting Damages - A Bush White House aide has been delegated to document the vandalism, videos are being taken of the damages, and White House officials are being interviewed. White House press secretary Ari Fleischer has confirmed that the administration is reviewing reports of the alleged vandalism. [NewsMax, 1/26/2001] Bush himself downplays the reports, saying: “There might have been a prank or two, maybe somebody put a cartoon on the wall, but that’s okay. It’s time now to move forward.” [New York Daily News, 1/27/2001]

Entity Tags: Mary Elizabeth (“Tipper”) Gore, Sean Hannity, Matt Drudge, New York Daily News, Paula Zahn, Oliver North, Lynne Cheney, NewsMax, The Guardian, Fox News, General Services Administration, Albert Arnold (“Al”) Gore, Jr., American Spectator, George W. Bush, Ari Fleischer, Bush administration (43), Bill O’Reilly, Tom Schatz, Clinton administration, Washington Post

Timeline Tags: Domestic Propaganda

The National Security Agency seeks the assistance of global telecommunications corporation AT&T to help it set up a domestic call monitoring site to eavesdrop on US citizens’ phone communications, according to court papers filed in June 2006 as part of a lawsuit against AT&T (see October 2001). The NSA is expressly forbidden from spying on US citizens within US borders unless authorized by the Foreign Surveillance Intelligence Court (FISC) (see 1978). When the NSA program, which wiretaps phone and email communications often without court warrants, becomes public knowledge well over four years later (see December 15, 2005), President Bush, NSA Director Michael Hayden, and other White House and government officials will assert that the program was set up in response to the September 11, 2001 terrorist attacks. If the claims made in the lawsuit are accurate, these assertions are provably false. “The Bush administration asserted this became necessary after 9/11,” lawyer Carl Mayer will claim in 2006. “This undermines that assertion.” Unbeknownst to most Americans, the NSA is operating a secret “data mining” operation that, by 2006, will have compiled phone records and contact information on millions of domestic phone and email communications. The NSA project is code-named “Project Groundbreaker,” and is ostensibly an above-board attempt announced in June 2000 to have AT&T and other firms help modernize its technological capabilities. The project originally seeks to have AT&T build a network operations center that duplicates AT&T’s facility in Bedminster, New Jersey; this plan will be altered when the NSA decides it will be better served by acquiring the monitoring technology itself. The agency is seeking bids for a project to “modernize and improve its information technology infrastructure,” including the privatization of its “non-mission related” systems support. [TechWeb, 6/13/2000; Bloomberg, 6/30/2006] Groundbreaker’s privatization project is expected to provide up to $5 billion in government contracts to various private firms such as AT&T, Computer Sciences Corporation, and OAO Corporation, [Computerworld, 12/4/2000; Government Executive, 9/1/2001] and up to 750 NSA employees will become private contractors. Hayden, who has aggressively instituted a corporate management protocol to enhance productivity and has brought in numerous senior managers and agency executives from private defense firms, is a strong proponent of privatizing and outsourcing much of the NSA’s technological operations, and in 2001 will say that he wants the agency to focus on its primary task of breaking codes and conducting surveillance. Hayden does not admit that Groundbreaker is part of a larger NSA domestic surveillance program, [Government Executive, 9/1/2001] and publicly, NSA officials say that the project is limited to administrative and logistics functions. [Computerworld, 12/4/2000] The covert data mining portion of the project is code-named “Pioneer.” A former, unnamed employee of the NSA, [Bloomberg, 6/30/2006] and a former AT&T technician, Mark Klein, will provide the key information about Groundbreaker (see Late 2002, July 7, 2009 and December 15-31, 2005). Klein will say in 2006 that he saw the NSA construct a clandestine area within its switching center in San Francisco, and saw NSA technicians shunt fiber optic cable carrying Internet traffic into that area, which contains a large data bank and secret data mining hardware (see April 6, 2006). Klein will say he knew that the NSA built other such facilities in other switching locations. He will go on to say that the NSA did not work with just AT&T traffic; when AT&T’s network connected with other networks, the agency acquired access to that traffic as well. [Democracy Now!, 5/12/2006] The information about AT&T and the NSA will become public knowledge after the 2006 filing of a lawsuit against AT&T and other telecommunications firms (see May 12, 2006 and June 26, 2006).

Entity Tags: Mark Klein, Michael Hayden, George W. Bush, Foreign Intelligence Surveillance Court, Bush administration (43), Carl Mayer, Computer Sciences Corporation, AT&T, National Security Agency, OAO Corporation

Timeline Tags: Civil Liberties

The FBI dramatically escalates its warrantless wiretaps of US citizens, most without the proper paperwork or oversight. The public will not learn of the FBI wiretapping program until October 2005, when classified documents will be made available to the Electronic Privacy Information Center (EPIC), an advocacy group that will sue the Justice Department for records relating to the Patriot Act. According to those documents, which are heavily redacted, the FBI conducts clandestine surveillance on some US residents for 18 months and even longer. The FBI will also internally investigate at least 287 violations of its use of secret surveillance against US citizens. One target will be kept under surveillance for over five years, including a 15-month stretch where the FBI fails to notify Justice Department lawyers after the subject moves from New York to Detroit. According to an FBI investigation, that delay is a violation of department guidelines and will prevent the department “from exercising its responsibility for oversight and approval of an ongoing foreign counterintelligence investigation of a US person.” Other cases involve agents obtaining e-mails after warrants expire, seizing bank records without authorization, and conducting improper “unconsented physical search(es).” EPIC’s general counsel, David Sobel, will say in October 2005 that the classified documents indicate possible misconduct by the FBI in counterintelligence investigations, and highlight the need for greater congressional oversight of clandestine surveillance within the United States. “We’re seeing what might be the tip of the iceberg at the FBI and across the intelligence community,” Sobel will say. “It indicates that the existing mechanisms do not appear adequate to prevent abuses or to ensure the public that abuses that are identified are treated seriously and remedied.” The FBI will counter by insisting that all of the infractions are minor, mostly what it calls administrative errors, and that any information obtained improperly is quarantined and eventually destroyed. One senior FBI official will say, “Every investigator wants to make sure that their investigation is handled appropriately, because they’re not going to be allowed to keep information that they didn’t have the proper authority to obtain. But that is a relatively uncommon occurrence. The vast majority of the potential [violations] reported have to do with administrative timelines and time frames for renewing orders.” Catherine Lotrionte, the counsel for the President’s Foreign Intelligence Advisory Board, which is tasked with overseeing the FBI’s domestic surveillance operations, will refuse to disclose any details of any of the FBI violations, saying most of its work is classified and covered by executive privilege. The surveillance operations are conducted under the aegis of the Foreign Intelligence Surveillance Act (see 1978), whose threshold for such surveillance is lower than for criminal warrants. In 2004 alone, over 1,700 new cases will be opened by the secret Foreign Intelligence Surveillance Court. [Washington Post, 10/24/2005] Though Bush officials eventually admit to beginning surveillance of US citizens after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Issuetsdeah, Federal Bureau of Investigation, Catherine Lotrionte, Electronic Privacy Information Center, David Sobel, US Department of Justice, Foreign Intelligence Surveillance Court

Timeline Tags: Civil Liberties

A self-styled White House “war council” begins meeting shortly after the 9/11 attacks, to discuss the administration’s response to the attacks and the methods it will use (see (After 10:00 a.m.) September 11, 2001). The ad hoc group is composed of White House counsel Alberto Gonzales, Justice Department lawyer John Yoo, Pentagon chief counsel William J. Haynes, and the chief aide to Vice President Dick Cheney, David Addington. According to Jack Goldsmith, who will become head of the Justice Department’s Office of Legal Counsel (OLC) in 2003 (see October 6, 2003), the four believe that the administration’s biggest obstacle to responding properly to the 9/11 attacks is the body of domestic and international law that arose in the 1970s to constrain the president’s powers after the criminal excesses of Richard Nixon’s White House. Chief among these restraints is the Foreign Intelligence Surveillance Act (FISA) of 1978 (see 1978). Though Addington tends to dominate the meetings with his imposing physical presence and aggressive personality, Yoo is particularly useful to the group; the head of the OLC, Jay Bybee (whom Goldsmith will replace) has little experience with national security issues, and delegates much of the responsibility for that subject to Yoo, even giving him the authority to draft opinions that are binding on the entire executive branch. Yoo agrees wholeheartedly with Addington, Gonzales, and Cheney about the need for vastly broadened presidential powers. According to Goldsmith, Yoo is seen as a “godsend” for the White House because he is eager to draft legal opinions that would protect Bush and his senior officials from any possible war crimes charges. However, Yoo’s direct access to Gonzales angers Attorney General John Ashcroft, who feels that the “war council” is usurping legal and policy decision-making powers that are legally his own. [New York Times Magazine, 9/9/2007] In 2009, Goldsmith will say, “[I]it was almost as if they [Cheney and Addington] were interested in expanding executive power for its own sake.” [Vanity Fair, 2/2009]

Entity Tags: Richard (“Dick”) Cheney, William J. Haynes, Richard M. Nixon, Office of Legal Counsel (DOJ), Jay S. Bybee, Jack Goldsmith, John C. Yoo, Bush administration (43), Foreign Intelligence Surveillance Act, Alberto R. Gonzales, David S. Addington

Timeline Tags: Civil Liberties

Former AT&T employee Mark Klein.Former AT&T employee Mark Klein. [Source: PBS]The National Security Agency, as part of its huge, covert, and possibly illegal wiretapping program directed at US citizens (see Spring 2001 and After September 11, 2001), begins collecting telephone records of tens of millions of Americans, using data provided by telecommunications firms such as AT&T, Verizon, and BellSouth (see February 5, 2006). The media will not report on this database until May 2006 (see May 11, 2006). The program collects information on US citizens not suspected of any crime or any terrorist connections. Although informed sources say the NSA is not listening to or recording actual conversations, the agency is using the data to analyze calling patterns in an effort to detect terrorist activity. “It’s the largest database ever assembled in the world,” says one anonymous source. The NSA intends “to create a database of every call ever made.” As a result, the NSA has detailed records of the phone activities of tens of millions of US citizens, from local calls to family and friends to international calls. The three telecommunications companies are working with the NSA in part under the Communications Assistance Act for Law Enforcement (CALEA) (see January 1, 1995 and June 13, 2006) and in part under contract to the agency.
Surveillance Much More Extensive Than Acknowledged - The wiretapping program, which features electronic surveillance of US citizens without court warrants or judicial oversight, is far more extensive than anything the White House or the NSA has ever publicly acknowledged. President Bush will repeatedly insist that the NSA focuses exclusively on monitoring international calls where one of the call participants is a known terrorist suspect or has a connection to terrorist groups (see December 17, 2005 and May 11, 2006), and he and other officials always insist that domestic calls are not monitored. This will be proven false. The NSA has become expert at “data mining,” sifting through reams of information in search of patterns. The warrantless wiretapping database is one source of information for the NSA’s data mining. As long as the NSA does not collect “personal identifiers”—names, Social Security numbers, street addresses, and the like—such data mining is legal. But the actual efficacy of the wiretapping program in learning about terrorists and possibly preventing terrorist attacks is unclear at best. And many wonder if the NSA is not repeating its activities from the 1950s and 1960s, when it conducted “Operation Shamrock” (see 1945-1975), a 20-year program of warrantless wiretaps of international phone calls at the behest of the CIA and other intelligence agencies. Operation Shamrock, among other things, led to the 1978 passage of the Foreign Intelligence Surveillance Act (see 1978). [USA Today, 5/11/2006] In May 2006, former NSA director Bobby Ray Inman will say, “[T]his activity is not authorized” (see May 12, 2006). [Democracy Now!, 5/12/2006]
Secret Data Mining Center - In May 2006, retired AT&T technician Mark Klein, a 22-year veteran of the firm, will file a court affidavit saying that he saw the firm construct a secret data-mining center in its San Francisco switching center that would let the NSA monitor domestic and international communications (see January 2003). And former AT&T workers say that, as early as 2002, AT&T has maintained a secret area in its Bridgeton, Missouri, facility that is likely being used for NSA surveillance (see Late 2002-Early 2003).
Domestic Surveillance Possibly Began Before 9/11 - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, Verizon Communications, Mark Klein, George W. Bush, AT&T, BellSouth, Central Intelligence Agency, Communications Assistance for Law Enforcement Act (CALEA), Foreign Intelligence Surveillance Act, Qwest, National Security Agency

Timeline Tags: Civil Liberties

Mehdi Ghezali, a Muslim Swede, is arrested by Pakistani police and handed over to US authorities. According to an account provided by Ghezali in 2004, he was kidnapped by Pakistani villagers shortly after crossing into Pakistan from Afghanistan where he was visiting a friend. The villagers sold him to the Pakistani police who then gave him to the Americans. He was then flown back to Afghanistan. [Reuters, 7/14/2004; Agence France-Presse, 7/14/2004]

Entity Tags: Mehdi Ghezali

Timeline Tags: Torture of US Captives

Mehdi Ghezali, a Muslim Swede being held by US authorities, is transferred to Guantanamo, where he will be subjected to almost daily interrogations and subjected to a variety of abuses (see (July 2002)). [Reuters, 7/14/2004; Agence France-Presse, 7/14/2004]

Entity Tags: Mehdi Ghezali

Timeline Tags: Torture of US Captives

The conservative National Review publishes an op-ed article by Sam Dealy titled “A Very, Very Bad Bunch,” commenting on the Iranian opposition group known as People’s Mujahedeen of Iran (MEK) and “its surprising American friends.” Dealy’s piece is an attack on Congresspersons who support the MEK despite the exile group’s past history of anti-Americanism (see 1970s and November 4, 1979-January 20, 1981). “How has a terrorist group managed to win the support of mainstream US politicians?” he asks. “Simple: Its political representatives in the US have worked hard to repackage the group as a legitimate dissident organization fighting for democracy in Iran—by whitewashing its record and duping our leaders.” Dealy emphasizes that the group’s initial ideological underpinning had been influenced by the likes of Marx, Ho Chi Minh, and Che Guevara, whose ideas the MEK attempted to apply to Shiite society. [National Review, 3/25/2002]

Entity Tags: People’s Mujahedin of Iran, Sam Dealy

Timeline Tags: US confrontation with Iran

When al-Qaeda logistics manager Abu Zubaida is arrested in late March 2002 (see March 28, 2002), his computer is searched. According to the Washington Post: “When agents found Zubaida’s laptop computer, a senior law enforcement source said, they discovered that the vast majority of people he had been communicating with were being monitored under FISA warrants or international spying efforts. ‘Finally, we got some comfort’ that surveillance efforts were working, said a government official familiar with Zubaida’s arrest.” The fact some of his contacts are monitored under FISA warrants indicates that they are in the US, as FISA warrants are only used for US targets (see 1978). The monitoring of Abu Zubaida’s communications began in the mid-1990s, at the latest (see (Mid-1996) and October 1998 and After), and continued after 9/11 (see October 8, 2001). [Washington Post, 2/9/2006] Some will later suggest that Zubaida may have had mental problems (see Shortly After March 28, 2002), but this apparently did not stop him from being a key al-Qaeda contact point. FBI agent Dan Coleman, an expert on al-Qaeda, will later say that the FBI “all knew he was crazy, and they knew he was always on the damn phone.” [Washington Post, 12/18/2007] Vincent Cannistraro, former head of the CIA’s Counter Terrorism Center, says of Zubaida shortly after Zubaida’s capture, “He was the guy that had the direct contact with prominent al-Qaeda cell leaders abroad, and he knew where they all were. He would have been the guy co-ordinating new attacks.” [Observer, 4/7/2002]

Entity Tags: Dan Coleman, Vincent Cannistraro, Abu Zubaida

Timeline Tags: Complete 911 Timeline

Mehdi Ghezali, a detainee at Guantanamo, decides to stop answering his interrogators’ questions. According to Ghezali, they had been asking the same questions over and over again. At some point during his detention, the guards bring Ghezali an American woman so he can have sex with her. “They tried to make me lose my faith,” he tells the Agence France-Presse in July 2004. “Maybe they wanted to use it against me so I would cooperate.” [Reuters, 7/14/2004; Agence France-Presse, 7/14/2004]

Entity Tags: Mehdi Ghezali

Timeline Tags: Torture of US Captives

Former Marine colonel and convicted felon Oliver North (see May-June, 1989), now a conservative radio host, is embedded with a Marine unit by Fox News. North reports “rumors” that French officials at the Embassy in Baghdad are destroying documents proving French complicity in Iraq’s chemical—and biological—weapons programs. The report is quickly proven false. Fox spokeswoman Irena Steffen tells a newspaper that North is “a military contributor to Fox. He is neither a reporter nor a correspondent.” [New Yorker, 5/26/2003]

Entity Tags: Oliver North, Fox News, Irena Steffen

Timeline Tags: Iraq under US Occupation, Domestic Propaganda

A sample page from Mark Klein’s AT&T documentation.A sample page from Mark Klein’s AT&T documentation. [Source: Mark Klein / Seattle Times]Senior AT&T technician Mark Klein (see July 7, 2009), gravely concerned by the National Security Agency (NSA) spying operation going on in AT&T’s San Francisco facility (see October 2003) and now in possession of documents which prove the nature and scope of the telecommunications surveillance activities (see Fall 2003 and Late 2003), writes a memo summarizing his findings and conclusions. He appends eight pages of the unclassified documents he has in his possession, along with two photographs and some material from the Internet which documents the sophisticated surveillance equipment being used to gather data from AT&T’s electronic transmissions. The NSA and AT&T were, he later says, “basically sweeping up, vacuum-cleaning the Internet through all the data, sweeping it all into this secret room.… It’s the sort of thing that very intrusive, repressive governments would do, finding out about everybody’s personal data without a warrant. I knew right away that this was illegal and unconstitutional, and yet they were doing it.… I think I’m looking at something Orwellian. It’s a government, many-tentacled operation to gather daily information on what everybody in the country is doing. Your daily transactions on the Internet can be monitored with this kind of system, not just your Web surfing. All kinds of business that people do on the Internet these days—your bank transactions, your email, everything—it sort of opens a window into your entire private life, and that’s why I thought of the term ‘Orwellian.’ As you know, in [George] Orwell’s story [1984], they have cameras in your house, watching you. Well, this is the next best thing.… So I was not only angry about it; I was also scared, because I knew this authorization came from very high up—not only high up in AT&T, but high up in the government. So I was in a bit of a quandary as to what to do about it, but I thought this should be halted.”
Gathering 'the Entire Data Stream' - In his memo, Klein concludes that the NSA is using “splitter” equipment to copy “the entire data stream [emphasis in the original] and sent it to the [NSA’s] secret room for further analysis.” Klein writes that the splitters actually “split off a percentage of the light signal [from the fiber optic circuits] so it can be examined. This is the purpose of the special cabinet… circuits are connected into it, the light signal is split into two signals, one of which is diverted to the ‘secret room.’ The cabinet is totally unnecessary for the circuit to perform—in fact, it introduces problems since the signal level is reduced by the splitter—its only purpose is to enable a third party [the NSA] to examine the data flowing between sender and recipient on the Internet.” (Emphasis in the original.) In his book, Klein will explain that “each separate signal,” after being split, “contains all the information, nothing is lost, so in effect the entire data stream has been copied.” He will continue: “What screams out at you when examining this physical arrangement is that the NSA was vacuuming up everything flowing in the Internet stream: email, Web browsing, voice-over-Internet phone calls, pictures, streaming video, you name it. The splitter has no intelligence at all, it just makes a blind copy.” Klein later explains to a reporter: “The signals that go across fiber optics are laser light signals. It’s light basically that runs through a fiber optic, which is a clear glass fiber, and it has to be at a certain level for the routers to see the light and interpret the data correctly. If the light gets too low, just as if you get a weak flashlight with bad batteries, at a certain point it doesn’t work. If the light level drops too low, the router starts dropping bits and getting errors, and eventually you get loss of signal, and it just doesn’t work at all.… The effect of the splitter is to reduce the strength of the signal, and that may or may not cause a problem, depending on how much the signal is reduced.” A telecommunications company would not, as a rule, use such a splitter on its backbone Internet traffic because of the risk of degraded signal quality. “You want to have as few connections on your main data lines as possible,” Klein will say, “because each connection reduces the signal strength, and a splitter is a connection, and if you can avoid that, all the better.”
Inherently Illegal - Klein will explain that there is no way these activities are legal: “There could not possibly be a legal warrant for this, since according to the Fourth Amendment, warrants have to be specific, ‘particularly describing the place to be searched and the persons or things to be seized.’ It was also a blatant violation of the 1978 Foreign Intelligence Surveillance Act [FISA—see 1978], which calls for specific warrants as required by the Fourth Amendment. This was a massive blind copying of the communications of millions of people, foreign and domestic, randomly mixed together. From a legal standpoint, it does not matter what they claim to throw away later in their secret rooms, the violation has already occurred at the splitter.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 37, 119-133]
The Narus STA 6400 - Klein discusses one key piece of equipment in the NSA’s secret room, the Narus STA 6400 (see Late 2003). Narus is a firm that routinely sells its equipment not only to telecom firms such as AT&T, “but also to police, military, and intelligence officials” (see November 13-14, 2003). Quoting an April 2000 article in Telecommunications magazine, Klein writes that the STA 6400 is a group of signal “traffic analyzers that collect network and customer usage information in real time directly from the message.… These analyzers sit on the message pipe into the ISP [Internet Service Provider] cloud rather than tap into each router or ISP device.” Klein quotes a 1999 Narus press release that says its Semantic Traffic Analysis (STA) technology “captures comprehensive customer usage data… and transforms it into actionable information… [it] is the only technology that provides complete visibility for all Internet applications.” The Narus hardware allows the NSA “to look at the content of every data packet going by, not just the addressing information,” Klein will later write.
A 'Dream Machine for a Police State' - Klein later writes of the Narus STA 6400: “It is the dream machine of a police state, one that even George Orwell could not imagine. Not only does it enable the government to see what millions of people are saying and doing every day, but it can build up a database which reveals the connections among social groups—who’s calling and emailing whom. Such a device can easily be turned against all dissident protest groups, and even the Democratic and Republican parties, with devastating effect. And it’s in the hands of the executive power, in total secrecy.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; Klein, 2009, pp. 37-40] In support of the memo and an ensuing lawsuit against AT&T (see January 31, 2006), Klein will later write: “Despite what we are hearing, and considering the public track record of this administration, I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or is otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” [Wired News, 4/7/2006]

Entity Tags: National Security Agency, Narus, Mark Klein, Foreign Intelligence Surveillance Act, AT&T

Timeline Tags: Civil Liberties

Conditions for Mehdi Ghezali, a detainee at Guantanamo, become worse. After he is released in July, he will say that during this period he was shackled for hours, deprived of sleep, put in isolation, and subjected to cold temperatures for up to 14 hours at a time. “They put me in the interrogation room and used it as a refrigerator. They set the temperature to minus degrees so it was terribly cold and one had to freeze there for many hours; 12 to 14 hours one had to sit there, chained.” [Reuters, 7/14/2004; Agence France-Presse, 7/14/2004]

Entity Tags: Mehdi Ghezali

Timeline Tags: Torture of US Captives

After a 16-month review by the US State Department and the Federal Bureau of Investigation, the Bush administration says it has found no basis to charge any of the 3,800 Mujahedeen-e Khalq (MEK) fighters held in custody by the US at Camp Ashraf with violations of American law. The decision is made in spite of the group’s long history of collusion with Saddam Hussein. MEK fought alongside Iraqi forces against Iran during the 1980s (see December 2003) and helped Saddam’s internal security forces brutally put down the 1991 Shia uprisings (see 1991). The organization was also responsible for a number of American deaths during the 1970s (see 1970s) and has been listed on the State Department’s list of “foreign terrorist organizations” since 1997 (see 1997). “A member of a terrorist organization is not necessarily a terrorist,” a senior American official explains. “To take action against somebody, you have to demonstrate that they have done something.” [New York Times, 7/27/2004; Christian Science Monitor, 7/29/2004]

Entity Tags: People’s Mujahedin of Iran, Bush administration (43), US Department of State, Federal Bureau of Investigation

Timeline Tags: US confrontation with Iran

Mehdi Ghezali, held at Guantanamo since December 2001, returns to Sweden. He has lost feeling in part of his left foot because of the ankle chains he wore at Guantanamo. His teeth are also in poor condition. [Agence France-Presse, 7/14/2004]

Entity Tags: Mehdi Ghezali

Timeline Tags: Torture of US Captives

Representatives from Iran, Russia, Kazakhstan, Turkmenistan, and Azerbaijan meet in Tehran as part of an effort to resolve territorial disputes concerning oil and gas exploitation in the Caspian Sea. During the meeting, Iran’s special representative for the Caspian Sea Affairs, Mehdi Safari, says that Iran is opposed to the militarization of the Caspian region. [Xinhua News Agency (Beijing), 5/16/2005]

Entity Tags: Mehdi Safari

Timeline Tags: US confrontation with Iran

Tehran’s ultra-conservative mayor, Mahmoud Ahmedinejad, wins 19.5 percent of the vote in Iran’s national election for president putting him in second place behind the moderate Ayatollah Hashemi Rafsanjani, who receives 21 percent. A run-off election is scheduled for June 25 (see June 24, 2005). Many say the strong voter turn-out—62.7 percent—is a response to George Bush’s denunciations of Iran’s electoral system and government which angered many Iranians. “I picked Ahmadinejad to slap America in the face,” says one voter. Abdollah Momeni, a political affairs expert at Tehran University, tells the Washington Post: “People faced a dilemma. In people’s minds it became a choice between voting or giving Bush an excuse to attack.” [Associated Press, 6/18/2005; Washington Post, 6/19/2005] Mehdi Karroubi, a reformist cleric and former parliamentary speaker who comes in third, alleges voter fraud and calls for an investigation. “There has been bizarre interference. Money has changed hands,” he says. [BBC, 6/18/2005]

Entity Tags: Mahmoud Ahmadinejad, Hashemi Rafsanjani, Mehdi Karroubi

Timeline Tags: US confrontation with Iran

Mahmoud Ahmadinejad.Mahmoud Ahmadinejad. [Source: Associated Press]Tehran Mayor Mahmoud Ahmadinejad is declared the winner of Iran’s presidential run-off election (see also June 24, 2005), winning 62 percent of the vote and beating President Akbar Hashemi Rafsanjani, who garners just 35.3 percent. An estimated 50 percent of eligible Iranian voters vote. Ahmadinejad wins the election with 62 percent of the vote. [CNN, 6/25/2005; Islamic Republic News Agency, 7/9/2005] Ahmadinejad ran on a humble anti-corruption platform based on embracing the founding principles of the 1979 Islamic Revolution. Ahmadinejad calls for encouraging foreign investment and partnership with Iran, modernizing industry, promoting a peaceful nuclear energy alternative while shunning reconciliation with the US. He had the support of many popular militia groups, as well as much of the poor. [CNN, 6/25/2005]

Entity Tags: Hashemi Rafsanjani, Mahmoud Ahmadinejad

Timeline Tags: US confrontation with Iran

Britain accuses Iran of having played a role in the transfer of explosive technology from Hezbollah in Lebanon to the Shia cleric Moqtada al-Sadr’s Mahdi army in Iraq. British officials say Iran is responsible for the deaths of all eight UK soldiers killed in Iraq this year, all of whom died in explosions. Iran denies the charges. [BBC, 9/5/2005; Reuters, 10/6/2005]

Entity Tags: Moqtada al-Sadr, Hezbollah, Mahdi Army

Timeline Tags: US confrontation with Iran

New York Times headline from article revealing NSA surveillance.New York Times headline from article revealing NSA surveillance. [Source: CBS News]The New York Times reveals that after the 9/11 attacks, President Bush granted the National Security Agency (NSA) secret authorization to eavesdrop on Americans and others inside the US without going through the Foreign Intelligence Surveillance Act (FISA) court to obtain legal warrants (see Early 2002. The administration justifies its actions by claiming such eavesdropping, which includes wiretapping phones and reading e-mails, is necessary to find evidence of terrorist activities, and says the nation needs the program after the 9/11 attacks exposed deficiencies in the US intelligence community’s information gathering process, and because of what they characterize as the “handcuffing” of US intelligence agencies by restrictive laws. The Times has had the article for over a year; the White House prevailed on the Times not to publish its findings for that time, arguing that publication would jeopardize continuing investigations and warn potential terrorists that they were under scrutiny. Many believe that the White House wanted to delay the publication of the article until well after the 2004 presidential elections. The Times delayed publication for over a year, and agreed to suppress some information that administration officials say could be useful to terrorists. (Less than two weeks before the article is published, Bush tries to convince the Times not to print the article at all: see December 6, 2005.) Two days after the Times publishes its article, Bush will acknowledge the order, and accuse the Times of jeopardizing national security (see December 17, 2005). The NSA program eavesdrops without warrants on up to 500 people in the US at any given time, officials say; the overall numbers have likely reached into the thousands. Overseas, up to 7,000 people suspected of terrorist ties are being monitored. Officials point to the discovery of a plot by Ohio trucker and naturalized US citizen and alleged al-Qaeda supporter Iyman Faris to bring down the Brooklyn Bridge with blowtorches as evidence of the program’s efficacy. They also cite the disruption of an al-Qaeda plot to detonate fertilizer bombs outside of British pubs and train stations by the program. But, officials say, most people targeted by the NSA for warrantless wiretapping have never been charged with a crime, and many are targeted because of questionable evidence and groundless suspicion. Many raise an outcry against the program, including members of Congress, civil liberties groups, immigrant rights groups, and others who insist that the program undermines fundamental Constitutional protections of US citizens’ civil liberties and rights to privacy. Several other government programs to spy on Americans have been challenged, including the Federal Bureau of Investigation (FBI)‘s surveillance of US citizens’ library and Internet usage, the monitoring of peaceful antiwar protests, and the proposed use of public and private databases to hunt for terrorist links. In 2004, the Supreme Court overturned the administration’s claim that so-called “enemy detainees” were not entitled to judicial review of their indefinite detentions. Several senior officials say that when the warrantless wiretapping program began, it operated with few controls and almost no oversight outside of the NSA itself. The agency is not required to seek the approval of the Justice Department or anyone else outside the FISA court for its surveillance operations. Some NSA officials wanted nothing to do with a program they felt was patently illegal, according to a former senior Bush administration official. Internal concerns about the program prompted the Bush administration to briefly suspend the program while Justice Department officials audited it and eventually provided some guidelines for its operations. A complaint from Judge Colleen Kollar-Kotelly, the federal judge who oversees the FISA Court, helped spur the suspension, according to officials. Kollar-Kotelly questioned whether information obtained under the program was being improperly used as the basis for FISA wiretap warrant requests from the Justice Department. Some government lawyers say that the Justice Department may have deliberately misled Kollar-Kotelly and the FISA court about the program in order to keep the program under wraps. The judge insisted to Justice Department officials that any material gathered under the program not be used in seeking wiretap warrants from her court. The question also arose in the Faris case, when senior Justice Department officials worried that evidence obtained by warrantless wiretapping by the NSA of Faris could be used in court without having to lie to the court about its origins. [New York Times, 12/15/2005]

Entity Tags: US Supreme Court, George W. Bush, US Department of Justice, Iyman Faris, National Security Agency, New York Times, Al-Qaeda, Foreign Intelligence Surveillance Court, Colleen Kollar-Kotelly

Timeline Tags: Civil Liberties

Jonathan Alter.Jonathan Alter. [Source: Publicity photo via Greater Talent Network]Reporter and political pundit Jonathan Alter writes that President Bush’s attempt to kill the New York Times domestic wiretapping story (see December 15, 2005 and December 6, 2005), which the Times delayed for over a year at the White House’s request, is not an attempt to protect national security, as Bush will say in his response to the article (see December 17, 2005), but “because he knew that it would reveal him as a law-breaker.” Alter continues, “He insists he had ‘legal authority derived from the Constitution and Congressional resolution authorizing force.’ But the Constitution explicitly requires the president to obey the law. And the post-9/11 congressional resolution authorizing ‘all necessary force’ in fighting terrorism was made in clear reference to military intervention. It did not scrap the Constitution and allow the president to do whatever he pleased in any area in the name of fighting terrorism.” Alter is puzzled that Bush felt the need for the program when the 1978 Foreign Intelligence Surveillance Act (see 1978) “allows the government to eavesdrop on its own, then retroactively justify it to the court, essentially obtaining a warrant after the fact.” Alter says that only four of “tens of thousands” of FISA requests have ever been rejected, and, “There was no indication the existing system was slow—as the president seemed to claim in his press conference—or in any way required extra-constitutional action.” He concludes: “[Bush] knew publication would cause him great embarrassment and trouble for the rest of his presidency. It was for that reason—and less out of genuine concern about national security—that George W. Bush tried so hard to kill the New York Times story. …We’re seeing clearly now that Bush thought 9/11 gave him license to act like a dictator, or in his own mind, no doubt, like Abraham Lincoln during the Civil War.” [Newsweek, 12/21/2005]

Entity Tags: Abraham Lincoln, Bush administration (43), National Security Agency, New York Times, George W. Bush, Foreign Intelligence Surveillance Court, Foreign Intelligence Surveillance Act, Jonathan Alter

Timeline Tags: Civil Liberties

Chart showing NSA surveillance network.Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” [New York Times, 12/24/2005]

Entity Tags: US Department of Defense, US Department of Justice, Total Information Awareness, New York Times, US Department of Homeland Security, Computer Assisted Passenger Prescreening System, Bush administration (43), Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, George W. Bush, National Security Agency, Phil Karn

Timeline Tags: Civil Liberties

The second part of the Senate Intelligence Committee’s investigation into the mismanagement of intelligence before the Iraq invasion (see July 9, 2004) is being held up by the Pentagon’s internal investigation of former Defense Department official Douglas Feith, one of the department’s primary architects of the war plans (see Late December 2000 and Early January 2001, Shortly After September 11, 2001, September 20, 2001, Fall 2002, and May 9, 2005). The committee is waiting on a report from the Pentagon inspector general on Feith’s alleged role in manipulating pre-war intelligence to support a case for war. Feith is also being investigated by the FBI for his role in an Israeli spy case. One aspect of the committee’s investigation is likely to focus on the efforts by Defense Secretary Donald Rumsfeld to procure top-level security clearances for Feith after he was fired from the National Security Council in 1982 over allegations of espionage (see March 1982). Feith is one of a large number of pro-war conservatives to shuttle in and out of the Pentagon despite being involved in intelligence-related scandals (see Late 1969, October 1970, 1978, April 1979, March 1981, 1983, April 13, 1999-2004, 2001, and October 5, 2005), many of whom were provided security clearances by Rumsfeld. The committee’s report is being delayed because both Feith and the Defense Department refuse to provide documents and witnesses to the committee. The committee is investigating whether Feith and other current and former Defense Department officials broke the 1947 National Security Act by refusing to keep the committee “fully and currently informed of all intelligence activities” and refusing to “furnish the Congressional intelligence committees any information or material concerning intelligence activities, other than covert actions, which is within their custody or control, and which is requested by either of the Congressional intelligence committees in order to carry out its authorized responsibilities.” Senate sources say committee chairman Pat Roberts (R-KS) is not pressuring the Pentagon to cooperate, but instead is deferring to the Pentagon’s Inspector General, in essence allowing the Pentagon to investigate itself. [Raw Story, 1/30/2006] The report will be issued in June 2008, with few of the above issues addressed (see June 5, 2008).

Entity Tags: National Security Council, US Department of Defense, Office of the Inspector General (DoD), Pat Roberts, Senate Intelligence Committee, Douglas Feith, Donald Rumsfeld

Timeline Tags: Events Leading to Iraq Invasion

In a public speech, former National Security Agency chief Michael Hayden claims that everything the NSA does is with authorization from the White House, specifically the warrantless wiretapping program that spies on US citizens (see Early 2002). “I didn’t craft the authorization,” he says. “I am responding to a lawful order.” Hayden claims that while the NSA continues to use court warrants from the Foreign Intelligence Surveillance Court (FISC), technological advances and terrorist threats have made the law that created and supports FISC, the Foreign Intelligence Surveillance Act of 1978 (see 1978), obsolete. Therefore, the NSA has carried out domestic surveillance operations with or without FISC warrants. Hayden says the warrantless surveillance operations are “operationally more relevant, operationally more effective” than anything FISA can handle. Hayden repeatedly denies, in the face of reams of evidence collected by journalists and others to the contrary, that the NSA is spying on domestic antiwar groups and religious organizations like the Quakers who publicly advocate nonviolence and peace. [Michael Hayden, 1/23/2006]

Entity Tags: Foreign Intelligence Surveillance Court, Al-Qaeda, Foreign Intelligence Surveillance Act, Religious Society of Friends (Quakers), Terrorist Surveillance Program, National Press Club, Bush administration (43), National Security Agency, Michael Hayden, George W. Bush

Timeline Tags: Civil Liberties

In his State of the Union address, President Bush insists that his authority to wiretap Americans’ phones without warrants (see December 15, 2005 and December 18, 2005) is validated by previous administrations’ actions, saying that “previous presidents have used the same constitutional authority I have.” He fails to note that those presidents authorized warrantless wiretaps before court orders were required for such actions (see June 19, 1972 and 1973). Since the Foreign Intelligence Surveillance Act passed (see 1978), no president except Bush has ever defied the law. Law professor David Cole calls Bush’s assertion of authority “either intentionally misleading or downright false.” Fellow law professor Richard Epstein predicts that the Supreme Court will strike down any such assertions, if it ever addresses the issue. “I find every bit of this legal argument disingenuous,” he says. Even many conservatives refuse to support Bush, with columnist George Will calling his arguments “risible” and a “monarchical doctrine” that is “refuted by the plain text of the Constitution.” David Keene, the chairman of the American Conservative Union, says the legal powers claimed by Bush and his officials can be used to justify anything: “Their argument is extremely dangerous.… The American system was set up on the assumption that you can’t rely on the good will of people with power.” Conservative activist Grover Norquist says flatly, “There is no excuse for violating the rule of law.” And former Justice Department official Bruce Fein says Bush and his officials have “a view that would cause the Founding Fathers to weep. The real conservatives are the ones who treasure the original understanding of the Constitution, and clearly this is inconsistent with the separation of powers.” Even former George H. W. Bush official Brent Scowcroft says that Bush’s interpretation of the Constitution is “fundamentally in error.” [Savage, 2007, pp. 203-204]

Entity Tags: David D. Cole, Brent Scowcroft, American Conservative Union, Bruce Fein, Richard Epstein, Grover Norquist, Foreign Intelligence Surveillance Act, David Keene, George Will, George W. Bush

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group and a reporter to expose the collusion of AT&T and the National Security Agency in pushing the government’s illegal surveillance program (see Early January 2006 and January 23, 2006 and After), contacts the office of Senator Dianne Feinstein (D-CA) at the advice of Electronic Frontier Foundation lawyer Kevin Bankston. Klein talks to Feinstein’s chief attorney in Washington, DC, Steven Cash. Klein will later write: “I instinctively recoiled at the thought of trying to approach her as my memory of her record told me she was no friend of civil liberties, though she plays one on TV. My instinct was not wrong.” After an initial discussion with Cash, Klein emails him his packet of documentation (see December 31, 2005). On the afternoon of February 3, Cash calls Klein and says he is very interested in his story, though Feinstein’s staff rates the probability of the NSA performing illegal acts at somewhere around “50-50,” according to Klein. Cash promises to get back in touch with Klein on February 6, but fails to do so. Neither Klein nor his attorneys (see Early January 2006) are able to talk to anyone on Feinstein’s staff from here on. Klein later writes: “The silent message was unmistakable: the senator did not want to sully her political skirts by having contact with a whistleblower. And this was a foretaste of her behavior and voting for the next two and a half years. At every turn, she was there pushing for immunity for the telecom companies in the Senate Intelligence and Judiciary Committees; peddling her toothless restatement of the ‘exclusive means’ clause of FISA [the Foreign Intelligence Surveillance Act—see 1978] as a substitute for any confrontation with the president over ongoing illegal NSA spying; ushering former NSA Director Michael Hayden through his nomination for CIA director; and backing Michael Mukasey as a clone replacement for the resigning Attorney General [Alberto] Gonzales. Moreover, this ultimately turned out to be the attitude of virtually the entire Democratic Party leadership, not to mention the Republicans.” Klein will explain that FISA’s “exclusive means” clause states that FISA should be the “exclusive means” for the federal government to conduct surveillance. Congress’s duty under the law was, Klein will state, to enforce the law against President Bush, “who openly flouted the law.” Instead, Klein will claim, Feinstein uses the “exclusive means” clause to protect the Bush administration and the telecom firms. [Klein, 2009, pp. 57-60]

Entity Tags: Electronic Frontier Foundation, AT&T, Dianne Feinstein, Mark Klein, National Security Agency, Steven Cash, Kevin Bankston

Timeline Tags: Civil Liberties

The Al Haramain Islamic Foundation, a now-defunct Saudi Arabian charitable organization that once operated in Oregon, sues the Bush administration [Associated Press, 2/28/2006] over what it calls illegal surveillance of its telephone and e-mail communications by the National Security Agency, the so-called Terrorist Surveillance Program. The lawsuit may provide the first direct evidence of US residents and citizens being spied upon by the Bush administration’s secret eavesdropping program, according to the lawsuit (see December 15, 2005). According to a source familiar with the case, the NSA monitored telephone conversations between Al Haramain’s director, then in Saudi Arabia, and two US citizens working as lawyers for the organization and operating out of Washington, DC. The lawsuit alleges that the NSA violated the Foreign Intelligence Surveillance Act (see 1978), the US citizens’ Fourth Amendment rights, and the attorney-client privilege. FISA experts say that while they are unfamiliar with the specifics of this lawsuit, they question whether a FISA judge would have allowed surveillance of conversations between US lawyers and their client under the circumstances described in the lawsuit. Other lawsuits have been filed against the Bush administration over suspicions of illegal government wiretapping, but this is the first lawsuit to present classified government documents as evidence to support its contentions. The lawsuit alleges that the NSA illegally intercepted communications between Al Haramain officer Suliman al-Buthe in Saudi Arabia, and its lawyers Wendell Belew and Asim Ghafoor in Washington. One of its most effective pieces of evidence is a document accidentally turned over to the group by the Treasury Department, dated May 24, 2004, that shows the NSA did indeed monitor conversations between Al Haramain officials and lawyers. When Al Haramain officials received the document in late May, 2004, they gave a copy to the Washington Post, whose editors and lawyers decided, under threat of government prosecution, to return the document to the government rather than report on it (see Late May, 2004). [Washington Post, 3/2/2006; Washington Post, 3/3/2006] Lawyer Thomas Nelson, who represents Al Haramain and Belew, later recalls he didn’t realize what the organization had until he read the New York Times’s December 2005 story of the NSA’s secret wiretapping program (see December 15, 2005). “I got up in the morning and read the story, and I thought, ‘My god, we had a log of a wiretap and it may or may not have been the NSA and on further reflection it was NSA,’” Nelson will recall. “So we decided to file a lawsuit.” Nelson and other lawyers were able to retrieve one of the remaining copies of the document, most likely from Saudi Arabia, and turned it over to the court as part of their lawsuit. [Wired News, 3/5/2007]
Al Haramain Designated a Terrorist Organization - In February 2004, the Treasury Department froze the organization’s US financial assets pending an investigation, and in September 2004, designated it a terrorist organization, citing ties to al-Qaeda and alleging financial ties between Al Haramain and the 1998 bombings of two US embassies in Africa (see 10:35-10:39 a.m., August 7, 1998). The organization was disbanded by the Saudi Arabian government in June 2004 and folded into an “umbrella” private Saudi charitable organization, the Saudi National Commission for Relief and Charity Work Abroad (see March 2002-September 2004). In February 2005, the organization was indicted for conspiring to funnel money to Islamist fighters in Chechnya. The charges were later dropped. [US Treasury Department, 9/9/2004; Washington Post, 3/2/2006] The United Nations has banned the organization, saying it has ties to the Taliban. [United Nations, 7/27/2007]
Challenging Designation - In its lawsuit, Al Haramain is also demanding that its designation as a terrorist organization be reversed. It says it can prove that its financial support for Chechen Muslims was entirely humanitarian, with no connections to terrorism or violence, and that the Treasury Department has never provided any evidence for its claims that Al Haramain is linked to al-Qaeda or has funded terrorist activities. [Associated Press, 8/6/2007] The lawsuit also asks for $1 million in damages, and the unfreezing of Al Haramain’s US assets. [Associated Press, 8/5/2007]
Administration Seeks to Have Lawsuit Dismissed - The Bush administration will seek to have the lawsuit thrown out on grounds of national security and executive privilege (see Late 2006-July 2007, Mid-2007).

Entity Tags: Wendell Belew, Suliman al-Buthe, Taliban, Washington Post, United Nations, Saudi National Commission for Relief and Charity Work Abroad, US Department of the Treasury, National Security Agency, Thomas Nelson, Foreign Intelligence Surveillance Act, Al Haramain Islamic Foundation, Al-Qaeda, Al Haramain Islamic Foundation (Oregon branch), Foreign Intelligence Surveillance Court, Asim Ghafoor, Bush administration (43)

Timeline Tags: Civil Liberties

USA Today headline.USA Today headline. [Source: CBS News]USA Today reports that “[t]he National Security Agency (NSA) has been secretly collecting the phone call records of tens of millions of Americans, using data provided by the nation’s three biggest telecommunications providers, AT&T, Verizon, and BellSouth,” according to “people with direct knowledge of the arrangement.” None of the sources would allow USA Today to identify them by name, job, or affiliation. The USA Today story claims that the NSA program “does not involve the NSA listening to or recording conversations,” but does use “the data to analyze calling patterns in an effort to detect terrorist activity,” according to their sources. One source says that the NSA program is compiling “the largest database ever assembled in the world,” with the goal of creating “a database of every call ever made” within US borders. President Bush has said that the NSA program is focused exclusively on international calls, and for the calls to be recorded, “one end of the communication must be outside the United States.” However, this is now shown not to be the case (see January 16, 2004). A US intelligence official says that the NSA program is not recording the actual phone calls themselves, but is collecting what he calls “external” data about the communications to allow the agency to emply “social network analysis” for insight into how terrorist networks are connected with one another. Another large telecommunications company, Qwest, has refused to help the NSA eavesdrop on customer calls (see February 2001, February 2001 and Beyond, and February 27, 2001). USA Today’s sources say that the NSA eavesdropping program began after the 9/11 attacks, a claim that is not bolstered by the facts (see 1997, February 27, 2000, February 27, 2000, December 2000, February 2001, February 2001, February 2001 and Beyond, February 2001, Spring 2001, April 2001, April 4, 2001, July 2001, Before September 11, 2001, and Early 2002). The sources say that the three companies agreed to provide “call-detail records,” lists of their customers’ calling histories, and updates, which would allow the agency to track citizens’ calling habits. In return, the sources say, the NSA offered to pay the firms for their cooperation. After the three firms agreed to help the agency, USA Today writes, “the NSA’s domestic program began in earnest” (see After September 11, 2001, After September 11, 2001, October 2001, September 2002, and Spring 2004). NSA spokesman Don Weber says the agency is operating strictly “within the law,” but otherwise refuses to comment. Former US prosecutor Paul Butler says that the Foreign Intelligence Surveillance Act (FISA), which governs surveillance operations by US intelligence agencies, “does not prohibit the government from doing data mining” (see 1978). White House press spokesman Dana Perino says, “There is no domestic surveillance without court approval,” and all surveillance activities undertaken by government agencies “are lawful, necessary, and required for the pursuit of al-Qaeda and affiliated terrorists.” All government-sponsored intelligence activities “are carefully reviewed and monitored,” she adds, and says that “all appropriate members of Congress have been briefed on the intelligence efforts of the United States” (see October 11, 2001 and October 25, 2001 and November 14, 2001). Don Weber, a senior spokesman for the NSA, refuses to discuss the agency’s operations, saying: “Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues; therefore, we have no information to provide. However, it is important to note that NSA takes its legal responsibilities seriously and operates within the law.” All three firms released similar comments saying that they would not discuss “matters of national security,” but were complying with the law in their alleged cooperation with the NSA. The Electronic Frontier Foundation (EFF) is suing AT&T for what it calls its complicity in the NSA’s “illegal” domestic surveillance program (see January 31, 2006). [USA Today, 5/11/2006]

Entity Tags: Verizon Communications, USA Today, Qwest, Paul Butler, Foreign Intelligence Surveillance Act, Jane Harman, AT&T, BellSouth, National Security Agency, Dana Perino, Don Weber

Timeline Tags: Civil Liberties

Retired Republican Senator Warren Rudman, the former co-chairman of Congress’s Iran-Contra investigation (see July 7-10, 1987), says that today’s White House officials are little different in at least one respect to the Reagan-era officials who constantly leaked information to the press, then claimed Congress leaked so much information that it was unfit to be trusted with the nation’s secrets. “Just look at the case now with that CIA agent [Valerie] Plame [Wilson],” Rudman says. “God forbid anyone did that on the Hill, there would be hell to pay. The administration would be lining up howitzers on the White House lawn to fire at the Capitol.” [Dubose and Bernstein, 2006, pp. 76-77]

Entity Tags: Bush administration (43), Warren Rudman, Valerie Plame Wilson

Timeline Tags: Civil Liberties

Civil liberties lawyer and columnist Glenn Greenwald states that the recent Supreme Court ruling in Hamdan v. Rumsfeld (see June 30, 2006), finding that the Bush administration’s Guantanamo Bay military commissions violate both federal law and the Geneva Conventions, also proves that the NSA’s warrantless wiretapping program is illegal (see December 15, 2005). “To arrive at its decision,” Greenwald writes, “the Court emphatically rejected the administration’s radical theories of executive power, and in doing so, rendered entirely discredited the administration’s only defenses for eavesdropping on Americans without the warrants required by law. Actual compliance with the Court’s ruling, then, compels the administration to immediately cease eavesdropping on Americans in violation of FISA,” the Foreign Intelligence Surveillance Act (see 1978). “If the administration continues these programs now, then they are openly defying the Court and the law with a brazeness and contempt for the rule of law that would be unprecedented even for them.” Greenwald notes that FISA prohibits any surveillance of American citizens without judicial approval and oversight. The Bush administration has already admitted to conducting just such surveillance (see December 17, 2005 and December 21, 2005), and President Bush has even stated his intention to expand the program (see December 19, 2005). The Justice Department and a number of administration officials have attempted to claim the NSA surveillance program is both legal and necessary (see December 19, 2005, December 19, 2005, December 21-22, 2005, and Early 2006); Greenwald writes that the Hamdan decision “decimated” those claims, a conclusion shared by a number of legal experts (see January 9, 2006). Moreover, he writes, there is no remaining excuse for Democratic senators not to endorse Senator Russ Feingold’s resolution to censure Bush for violating FISA (see March 12, 2006 and After). The argument advanced by, among others, Senator Barack Obama (D-IL), that Bush believed he was complying with the law because his lawyers told him he was in compliance, is no longer relevant in light of Hamdan, Greenwald argues. “[T]here is no longer any good faith basis left for violating FISA. Ongoing warrantless eavesdropping can only be ordered by the president with a deliberate intent to break the law. After Hamdan, there are no more excuses left for the president to violate FISA, and there is therefore no more excuse left for Democratic senators to refuse to take a stand with Sen. Feingold against the administration’s lawbreaking.” Bush has two clear choices, Greenwald writes: either to comply with FISA or openly defy the Supreme Court. “If we are a country that continues to operate under the rule of law, compliance with the Supreme Court’s ruling compels the immediate cessation of the president’s warrantless eavesdropping program, as well as what are undoubtedly the other, still-secret programs prohibited by law but which have been justified by these same now-rejected theories of unlimited executive power. Put simply, after Hamdan, there are no more excuses left for the president’s refusal to comply with the law.” [Crooks and Liars, 7/8/2006]

Entity Tags: Geneva Conventions, Barack Obama, Bush administration (43), Foreign Intelligence Surveillance Act, Glenn Greenwald, US Department of Justice, US Supreme Court, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Federal district court judge Anna Diggs Taylor rules that the NSA’s warrantless wiretapping program (see Early 2002) is unconstitutional and orders it ended. She amends her ruling to allow the program to continue while the Justice Department appeals her decision. The decision is a result of a lawsuit filed by the American Civil Liberties Union (ACLU) and other civil liberties groups. Taylor rules that the NSA program violates US citizens’ rights to privacy and free speech, the Constitutional separation of powers among the three branches of government, and the Foreign Intelligence Surveillance Act (see 1978). Taylor writes: “It was never the intent of the framers to give the president such unfettered control, particularly where his actions blatantly disregard the parameters clearly enumerated in the Bill of Rights. There are no hereditary Kings in America and no powers not created by the Constitution. So all ‘inherent powers’ must derive from that Constitution.” [Verdict in ACLU et al v. NSA et al, 8/17/2006 pdf file; Washington Post, 8/18/2006] The program “violates the separation of powers doctrine, the Administrative Procedures Act, the First and Fourth amendments to the United States Constitution, the FISA and Title III,” Taylor writes, and adds, “[T]he president of the United States… has undisputedly violated the Fourth in failing to procure judicial orders.” [CNN, 8/17/2006]
Judge Lets One Portion Stand - Taylor rejects one part of the lawsuit that seeks information about the NSA’s data mining program (see October 2001), accepting the government’s argument that to allow that portion of the case to proceed would reveal state secrets (see March 9, 1953). Other lawsuits challenging the program are still pending. Some legal scholars regard Taylor’s decision as poorly reasoned: national security law specialist Bobby Chesney says: “Regardless of what your position is on the merits of the issue, there’s no question that it’s a poorly reasoned decision. The opinion kind of reads like an outline of possible grounds to strike down the program, without analysis to fill it in.” The White House and its Republican supporters quickly attack Taylor, who was appointed to the bench by then-President Jimmy Carter, as a “liberal judge” who is trying to advance the agenda of Congressional Democrats and “weaken national security.” For instance, Senator Mike DeWine (R-OH) says that halting the program “would hamper our ability to foil terrorist plots.” [Washington Post, 8/18/2006]
Democrats, Civil Libertarians Celebrate Ruling - But Democrats defend the ruling. For instance, Senator John Kerry (D-MA) says the ruling provides a much-needed check on the unfettered power of the Bush White House. “[N]o one is above the law,” says Kerry. [Washington Post, 8/18/2006] Lawyers for some of the other cases against the NSA and the Bush administration laud the decision as giving them vital legal backing for their own court proceedings. “We now have a ruling on the books that upholds what we’ve been saying all along: that this wiretapping program violates the Constitution,” says Kevin Bankston, who represents the Electronic Frontier Foundation (EFF) in its class-action case against AT&T for its role in the NSA’s surveillance program (see January 31, 2006). [Washington Post, 8/18/2006] Legal expert and liberal commentator Glenn Greenwald writes that Taylor’s ruling “does not, of course, prohibit eavesdropping on terrorists; it merely prohibits illegal eavesdropping in violation of FISA. Thus, even under the court’s order, the Bush administration is free to continue to do all the eavesdropping on terrorists it wants to do. It just has to cease doing so using its own secretive parameters, and instead do so with the oversight of the FISA court—just as all administrations have done since 1978, just as the law requires, and just as it did very recently when using surveillance with regard to the [British] terror plot. Eavesdropping on terrorists can continue in full force. But it must comply with the law.” Greenwald writes: “[T]he political significance of this decision cannot be denied. The first federal court ever to rule on the administration’s NSA program has ruled that it violates the constitutional rights of Americans in several respects, and that it violates criminal law. And in so holding, the court eloquently and powerfully rejected the Bush administration’s claims of unchecked executive power in the area of national security.” [Salon, 8/17/2006]
White House Refuses to Comply - The Bush administration refuses to comply with Taylor’s ruling, asserting that the program is indeed legal and a “vital tool” in the “war on terrorism.” It will quickly file an appeal, and law professors on both sides of the issue predict that Taylor’s ruling will be overturned. [Savage, 2007, pp. 206]
Lawsuit Ends with White House 'Compromise' - The lawsuit will end when the White House announces a “compromise” between the wiretapping program and FISC (see January 17, 2007).

Entity Tags: John Kerry, Kevin Bankston, Mike DeWine, US Department of Justice, Peter Hoekstra, Glenn Greenwald, National Security Agency, George W. Bush, James Earl “Jimmy” Carter, Jr., Foreign Intelligence Surveillance Act, Alberto R. Gonzales, American Civil Liberties Union, AT&T, Anna Diggs Taylor, Bush administration (43), Bobby Chesney, Foreign Intelligence Surveillance Court, Electronic Frontier Foundation

Timeline Tags: Civil Liberties

The US is receiving false and misleading information about Iran’s nuclear capabilities from an Iranian dissident group labeled as a terrorist organization, says a former UN weapons inspector. The Mujahedeen-e Khalq, or MEK (see 1970s), is an exile group labeled by the US State Department as a terrorist organization, but embraced by many Washington neoconservatives, including a key group of White House officials operating inside Vice President Dick Cheney’s office and another working with Deputy Defense Secretary Paul Wolfowitz. David Albright, a former UN weapons inspector for the International Atomic Energy Agency (IAEA), says, “We should be very suspicious about what our leaders or the exile groups say about Iran’s nuclear capacity. There’s a drumbeat of allegations, but there’s not a whole lot of solid information. It may be that Iran has not made the decision to build nuclear weapons. We have to be very careful not to overstate the intelligence.” Albright says the information from MEK is somewhat more believable than the extravagantly false information provided by Ahmed Chalabi’s Iraq National Congress, which was used to bolster Bush administration allegations that Saddam Hussein’s Iraq posed a grave and imminent threat to world peace and US security (see (1994). In 2002, MEK provided critical information about Iran’s nuclear-enrichment complex at Natanz and a heavy-water production facility at Arak (see August 2002). It is unclear if Iran is pursuing a nuclear-weapons program; one UN official says of the information gleaned by the IAEA, “It’s a mixed bag.” Of MEK, he says, “The Mujahedeen Khalq appears to have some real sources inside Iran, but you can’t trust them all the time.” Iran has not been fully compliant with IAEA attempts to determine the nature and extent of its nuclear program. Nevertheless, some Congressional lawmakers say that, in light of the misinformation surrounding the claims of Iraq’s weapons programs, policy makers need to be doubly cautious about making claims and pursuing aggressive deterrence operations against Iran. Jane Harman, the ranking Democrat on the House Intelligence Committee, says, “In Iran, as well as North Korea, Syria, and so on, we need accurate, unbiased and timely intelligence. Iraq has shown that our intelligence products have a credibility problem and improvements are critically needed.” Iranian journalist Emadeddin Baghi, a columnist for the liberal Sharq newspaper who served two years in prison for criticizing the religious establishment, says that in Iran, skepticism runs deep. “Many Iranians instinctively disbelieve anything their own government says, but they also disbelieve the Americans, and what has happened in Iraq has strengthened that,” Baghi says. “Iranians see the failure to find weapons of mass destruction in Iraq, and they see the American accusations about nuclear weapons as just another pretext for other hidden aims.” [San Francisco Chronicle, 10/26/2006]

Entity Tags: Iraqi National Congress, David Albright, Bush administration (43), Ahmed Chalabi, Emadeddin Baghi, International Atomic Energy Agency, Jane Harman, Paul Wolfowitz, US Department of State, Richard (“Dick”) Cheney, Saddam Hussein, People’s Mujahedin of Iran, House Intelligence Committee

Timeline Tags: US confrontation with Iran

The Protect America Act (PAA) (see August 5, 2007), an amendment to the Foreign Intelligence Surveillance Act (FISA—see 1978), is introduced in Congress. With limited debate and no committee hearings, it passes both houses with substantial majorities. [US Senate, 8/5/2007; Boston Globe, 8/6/2007; House Judiciary Committee, 9/18/2007 pdf file] Congressional Democrats quickly capitulate on the bill, submitting to what the Washington Post later calls “a high-pressure campaign by the White House to change the nation’s wiretap law, in which the administration capitalized on Democrats’ fears of being branded weak on terrorism and on Congress’s desire to act on the issue before its August recess.” [Washington Post, 8/5/2007] Indeed, one Republican senator, Trent Lott, warns during the initial debate that lawmakers should pass the law quickly and get out of Washington before they could be killed in a terrorist attack (see August 2, 2007). McConnell tells the Senate, “Al-Qaeda is not going on vacation this month.” And Democrat Joseph Lieberman (D-CT), a supporter of the bill, told his colleagues: “We’re at war. The enemy wants to attack us. This is not the time to strive for legislative perfection.” [Slate, 8/6/2007]
Some Democrats Unhappy - One Democratic lawmaker responds angrily: “There are a lot of people who felt we had to pass something. It was tantamount to being railroaded.” Many House Democrats feel betrayed by the White House; Democratic leaders had reached what they believed was a deal on the bill with the Director of National Intelligence, Mike McConnell, only to have the White House throw out the deal and present a new list of conditions at the last minute. Both McConnell and the White House deny that any such deal was reached. Jan Schakowsky (D-IL), a member of the House Intelligence Committee, says, “I think the White House didn’t want to take ‘yes’ for an answer from the Democrats.” Representative Jerrold Nadler (R-NY) says lawmakers were “stampeded by fear-mongering and deception” into voting for the bill. Fellow House Democrat Jane Harman (D-CA) warns that the PAA will lead to “potential unprecedented abuse of innocent Americans’ privacy.” [Washington Post, 8/5/2007] The ACLU’s Caroline Fredrickson has a succinct explanation of why the Democrats folded so quickly: “Whenever the president says the word terrorism, they roll over and play dead.” [Slate, 8/6/2007]
AT&T Whistleblower: Democratic Leadership Colluded in Passing PAA - AT&T whistleblower Mark Klein (see July 7, 2009 and December 15-31, 2005) will later write that the Democrats played a far more active role in getting the PAA passed than others acknowledge. He will quote a 2008 column by liberal civil liberties advocate Glenn Greenwald, who will write: “[I]n 2006, when the Congress was controlled by [then-Senate Majority Leader] Bill Frist [R-TN] and [then-House Speaker] Denny Hastert [R-IL], the administration tried to get a bill passed legalizing warrantless eavesdropping and telecom amnesty, but was unable. They had to wait until the Congress was controlled by [House Majority Leader] Steny Hoyer [D-MD], [House Speaker] Nancy Pelosi [D-CA], and [Senate Majority Leader] Harry Reid [D-NV] to accomplish that.” According to Klein, once the Democrats took control of Congress in January 2007, they engaged in “pure theater, posturing as opponents of the illegal NSA program while seeking a way to protect the president.” The few principled Democrats to actively oppose the legislation, such as Senator Christopher Dodd (D-CT), were, Klein will write, “hamstrung by their own leadership.” The PAA passage was accompanied by refusals from the Democratic leaders of “the relevant Intelligence and Judiciary Committees, which were now led by Democrats such as [John D.] Rockefeller, [Dianne] Feinstein (see February 1-6, 2006), and [Patrick] Leahy in the Senate, and John Conyers and Sylvestre Reyes in the House,” who “quickly decided not to launch any serious investigations into the NSA spying.” Klein will later add that at the time of the PAA passage, he was unaware of how thoroughly Democrats had been briefed on the NSA program (see October 1, 2001, October 11, 2001, October 25, 2001 and November 14, 2001, July 17, 2003, and March 10, 2004), “and thus were in on the secret but took no action to stop it.” [Salon, 6/19/2008; Klein, 2009, pp. 86-87]

Entity Tags: Trent Lott, Mike McConnell, Protect America Act, Joseph Lieberman, Mitch McConnell, Jane Harman, Jerrold Nadler, Caroline Fredrickson, Bush administration (43), Jan Schakowsky, House Intelligence Committee

Timeline Tags: Civil Liberties

Mitch McConnell.Mitch McConnell. [Source: US Senate]President Bush signs the controversial Protect America Act (PAA) into law. The bill, which drastically modifies the Foreign Intelligence Surveillance Act (FISA) of 1978 (see 1978), was sponsored by two Senate Republicans, Mitch McConnell (R-KY) and Christopher Bond (R-MO), but written by the Bush administration’s intelligence advisers. [US Senate, 8/5/2007; Washington Post, 8/5/2007] It passed both houses of Congress with little debate and no hearings (see August 1-4, 2007). “This more or less legalizes the NSA [domestic surveillance] program,” says Kate Martin, director of the Center for National Security Studies. [New York Times, 8/6/2007] Slate’s Patrick Radden Keefe adds ominously, “The Foreign Intelligence Surveillance Act is now dead, and it’s never coming back.” [Slate, 8/6/2007] The PAA expires in six months, the only real concession Congressional Democrats were able to secure. Though the Bush administration and its allies in Congress insist that the law gives the government “the essential tools it needs” to conduct necessary surveillance of foreign-based terrorists while protecting Americans’ civil liberties, many Democrats and civil liberties organizations say the bill allows the government to wiretap US residents in communication with overseas parties without judiciary or Congressional oversight. Bush calls the bill “a temporary, narrowly focused statute to deal with the most immediate shortcomings in the law” that needs to be expanded and made permanent by subsequent legislation. The administration says that the lack of judiciary oversight in the new law will be adequately covered by “internal bureaucratic controls” at the National Security Agency. [Associated Press, 8/5/2007; Washington Post, 8/5/2007]
Reining in FISA - The PAA allows FISA to return “to its original focus on protecting the rights of Americans, while not acting as an obstacle to conducting foreign intelligence surveillance on foreign targets located overseas.” Before the PAA, the White House says, FISA created unnecessary obstacles in allowing US intelligence to “gain real-time information about the intent of our enemies overseas,” and “diverted scarce resources that would be better spent safeguarding the civil liberties of people in the United States, not foreign terrorists who wish to do us harm.” The PAA no longer requires the government to obtain FISA warrants to monitor “foreign intelligence targets located in foreign countries” who are contacting, or being contacted by, US citizens inside US borders. FISA will continue to review the procedures used by US intelligence officials in monitoring US citizens and foreign contacts by having the attorney general inform the FISA Court of the procedures used by the intelligence community to determine surveillance targets are outside the United States.”
Allows Third Parties to Assist in Surveillance, Grants Immunity - The PAA also allows the director of national intelligence and the attorney general to secure the cooperation of “third parties,” particularly telecommunications firms and phone carriers, to “provide the information, facilities, and assistance necessary to conduct surveillance of foreign intelligence targets located overseas.” It provides these firms with immunity from any civil lawsuits engendered by such cooperation.
Short Term Legislation - The White House says that Congress must pass further legislation to give telecommunications firms permanent and retroactive immunity against civil lawsuits arising from their cooperation with the government’s domestic surveillance program. [White House, 8/6/2006]
Temporary Suspension of the Constitution? - Representative Rush Holt (D-NJ), a member of the House Intelligence Committee, says: “I’m not comfortable suspending the Constitution even temporarily. The countries we detest around the world are the ones that spy on their own people. Usually they say they do it for the sake of public safety and security.” [Washington Post, 8/5/2007]

Entity Tags: Christopher (“Kit”) Bond, National Security Agency, Foreign Intelligence Surveillance Act, George W. Bush, Foreign Intelligence Surveillance Court, Mitch McConnell, Al-Qaeda, Terrorist Surveillance Program, Kate Martin, Patrick Radden Keefe, Rush Holt, Protect America Act

Timeline Tags: Civil Liberties

Director of National Intelligence Michael McConnell says that the 9/11 hijackers could not be monitored in the US because they did not commit any crimes. He says in a speech: “[I]f Mohamed Atta had been in Pakistan and we were tracking him, some way to track him—he went to Turkey, went to Europe, got over to Canada, we’d track him as foreign intelligence target, and he crosses into the United States, he’s now a US person; he gets all of the rights and privileges that you get. He’s invisible to your intelligence community. As long as he doesn’t break the law, law enforcement can’t conduct surveillance because they don’t have a probable cause. Al-Qaeda recognized that and that is why 9/11 happened in my view.” [Director of National Intelligence, 1/17/2008 pdf file] The 9/11 hijackers committed various offenses for which they could have been arrested in the US, such as lying on visa application forms (see August 29, 2001), overstaying their visas (see January 18, 2001, May 20, 2001 and January 10, 2001), driving without a license (note: a warrant for Mohamed Atta’s arrest was even issued in the summer of 2001—see June 4, 2001), and having a known role in blowing up the USS Cole, thereby murdering 17 US servicemen (see Around October 12, 2000). The Foreign Intelligence Surveillance Act was also specifically designed so that the FBI and other agencies could monitor agents of foreign powers in the US even if they did not commit a crime (see 1978).

Entity Tags: Foreign Intelligence Surveillance Act, Federal Bureau of Investigation, Mike McConnell, Mohamed Atta, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

President Bush again demands that Congress reinstate the Protect America Act (PAA) (see August 5, 2007), with new provisions providing the nation’s telecommunications industry retroactive legal immunity from criminal and civil prosecution for possible crimes committed in the administration’s domestic wiretapping program (see May 12, 2006). Bush says that without such immunity, US telecom firms will be reluctant to help the administration spy on potential terrorists. The PAA is a central part of the legislative update of the 1978 Foreign Intelligence Surveillance Act (FISA) (see 1978) which mandates that any wiretaps must receive the approval of the FISA Court. Bush insists that he will veto an update to FISA without the immunity provisions, even as he asserts the country is at risk of further terrorist attacks without the FISA updates, and after letting the PAA lapse without signing an extension of the legislation into law. However, Bush blames Congress for not passing the FISA update with an immunity clause: “Congress’ failure to pass this legislation was irresponsible,” he says. “In other words, the House’s refusal to act is undermining our ability to get cooperation from private companies. And that undermines our efforts to protect us from terrorist attack.” He explains why the Democrats don’t want his bill: “House leaders are blocking this legislation, and the reason can be summed up in three words: class action lawsuits.” A spokesman for Congressional Democrats retorts: “They cannot have it both ways. If it is true that the expiration of the [surveillance law] has caused gaps in intelligence, then it was irresponsible for the president and Congressional Republicans to openly oppose an extension of the law.”
Democrats Put Trial Lawyers Before National Security? - Bush says: “The Senate bill would prevent plaintiffs’ attorneys from suing companies believed to have helped defend America after the 9/11 attacks. More than 40 of these lawsuits have been filed, seeking hundreds of billions of dollars in damages from these companies.… It is unfair and unjust to threaten these companies with financial ruin only because they are believed to have done the right thing and helped their country.” The lawsuits (see June 26, 2006) seek damages based upon violations of FISA, the Wiretap Act, the Communications Act, and the Stored Communications Act, among other laws. Bob Edgar of Common Cause says neither money nor punishment is the issue: “Innocent Americans who have had their rights violated by the telecoms deserve their day in court. If these companies did nothing wrong, then they have nothing to fear.” Bush is apparently attempting to refocus the issue as an attack on trial lawyers—traditionally a group supportive of Democrats—in saying: “Members of the House have a choice to make: They can empower the trial bar—or they can empower the intelligence community. They can help class action trial lawyers sue for billions of dollars—or they can help our intelligence officials protect millions of lives. They can put our national security in the hands of plaintiffs’ lawyers—or they can entrust it to the men and women of our government who work day and night to keep us safe.” House member John Conyers (D-MI) calls such characterizations “irresponsible” and “inaccurate.” [CBS News, 2/23/2008]

Entity Tags: Protect America Act, John Conyers, Foreign Intelligence Surveillance Court, Mike McConnell, George W. Bush, Michael Mukasey, Common Cause, Bob Edgar, Foreign Intelligence Surveillance Act, Dana Rohrbacher

Timeline Tags: Civil Liberties

A new investigation modeled on the Church Committee, which investigated government spying (see April, 1976) and led to the passage of the Foreign Intelligence Surveillance Act (FISA - see 1978) in the 1970s, is proposed. The proposal follows an amendment to wiretapping laws that immunizes telecommunications companies from prosecution for illegally co-operating with the NSA. A detailed seven-page memo is drafted outlining the proposed inquiry by a former senior member of the original Church Committee.
Congressional Investigative Body Proposed - The idea is to have Congress appoint an investigative body to discover the full extent of what the Bush White House did in the war on terror that may have been illegal and then to implement reforms aimed at preventing future abuses—and perhaps to bring accountability for wrongdoing by Bush officials. Key issues to investigate include:
bullet The NSA’s domestic surveillance activities;
bullet The CIA’s use of rendition and torture against terrorist suspects;
bullet The U.S. government’s use of military assets—including satellites, Pentagon intelligence agencies, and U2 surveillance planes—for a spying apparatus that could be used against people in the US; and
bullet The NSA’s use of databases and how its databases, such as the Main Core list of enemies, mesh with other government lists, such as the no-fly list. A deeper investigation should focus on how these lists feed on each other, as well as the government’s “inexorable trend towards treating everyone as a suspect,” says Barry Steinhardt, the director of the Program on Technology and Liberty for the American Civil Liberties Union (ACLU).
Proposers - The proposal is a product of talks between civil liberties advocates and aides to Democratic leaders in Congress. People consulted about the committee include aides to House Speaker Nancy Pelosi (D-CA) and Judiciary Committee chairman John Conyers (D-MI). The civil liberties organizations include the ACLU, the Center for Democracy and Technology, and Common Cause. However, some Democrats, such as Pelosi, Senate Intelligence Committee chairman John D. Rockefeller (D-WV), and former House Intelligence chairwoman Jane Harman (D-CA), approved the Bush administration’s operations and would be made to look bad by such investigation.
Investigating Bush, Clinton Administrations - In order that the inquiry not be called partisan, it is to have a scope going back beyond the start of the Bush administration to include the administrations of Bill Clinton, George H. W. Bush, and Ronald Reagan. The memo states that “[t]he rise of the ‘surveillance state’ driven by new technologies and the demands of counter-terrorism did not begin with this administration.” However, the author later says in interviews that the scope of abuse under George W. Bush would likely be an order of magnitude greater than under preceding presidents.
'Imagine What We Don't Know' - Some of the people involved in the discussions comment on the rationale. “If we know this much about torture, rendition, secret prisons, and warrantless wiretapping despite the administration’s attempts to stonewall, then imagine what we don’t know,” says a senior Democratic congressional aide who is familiar with the proposal. Steinhardt says: “You have to go back to the McCarthy era to find this level of abuse. Because the Bush administration has been so opaque, we don’t know [the extent of] what laws have been violated.” “It’s not just the ‘Terrorist Surveillance Program,’” says Gregory Nojeim from the Center for Democracy and Technology. “We need a broad investigation on the way all the moving parts fit together. It seems like we’re always looking at little chunks and missing the big picture.”
Effect on Presidential Race Unknown - It is unknown how the 2008 presidential race may affect whether the investigation ever begins, although some think that Democratic candidate Barack Obama (D-IL), said to favor open government, might be more cooperative with Congress than his Republican opponent John McCain (R-AZ). However, a participant in the discussions casts doubt on this: “It may be the last thing a new president would want to do.” [Salon, 7/23/2008]

Entity Tags: Nancy Pelosi, Gregory Nojeim, Center for Democracy and Technology, American Civil Liberties Union, Barry Steinhardt, Bush administration (43), Common Cause, Jane Harman

Timeline Tags: Civil Liberties, Inslaw and PROMIS

President Bush signs the FISA Amendments Act of 2008 (FAA), a revamping and expansion of the original Foreign Intelligence Surveillance Act (see 1978). The legislation passed the House by a sweeping 293 to 129 votes, with most Democratic Congressional leaders supporting it over the opposition of the more liberal and civil liberties-minded Democrats. Republicans were almost unanimously supportive of the bill. Though Democratic Senators Russell Feingold (D-WI) and Christopher Dodd (D-CT) managed to delay the bill’s passage through the Senate, their attempt to modify the bill was thwarted by a 66-32 margin. (Dodd credits AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) as one of the very few people to make the public aware of the illegal NSA wiretapping program, which the FISA amendment would protect. Without Klein, Dodd states, “this story might have remained secret for years and years, causing further erosion of our rights.”) Senator Barack Obama (D-IL), the party’s presumptive presidential nominee, gave his qualified support to the bill, stating: “Given the legitimate threats we face, providing effective intelligence collection tools with appropriate safeguards is too important to delay. So I support the compromise, but do so with a firm pledge that as president, I will carefully monitor the program.” Obama had opposed an earlier Senate version that would have given “blanket immunity” to the telecommunications companies for their participation in the illegal NSA wiretapping program (see December 15, 2005). House Speaker Nancy Pelosi (D-CA), who organized Democratic support for the bill in the House, said that she supported the bill primarily because it rejects Bush’s argument that a wartime chief executive has the “inherent authority” to conduct some surveillance activity he considers necessary to fight terrorism. It restores the legal notion that the FISA law is the exclusive rule on government spying, she said, and added: “This is a democracy. It is not a monarchy.” Feingold, however, said that the bill granted “retroactive immunity to the telecommunications companies that may have engaged in President Bush’s illegal wiretapping program.” The amendments restore many of the provisions of the expired Protect America Act (PAA—see August 5, 2007) that drastically modify the original FISA legislation and grant the government broad new surveillance powers. Like the PAA, the FAA grants “third parties” such as telecommunications firms immunity from prosecution for engaging in illegal surveillance of American citizens if they did so in partnership with government agencies such as the National Security Agency (NSA). [Washington Post, 6/20/2008; CNN, 6/26/2008; US Senate, 7/9/2008; White House, 7/10/2008; Klein, 2009, pp. 95-97] Senate Majority Leader Harry Reid (D-NV) actually refused to honor a “hold” placed on the bill by Dodd, a highly unusual move. Klein will later note that Reid has in the past always honored holds placed on legislation by Republicans, even if Democrats were strongly supportive of the legislation being “held.” Klein will write that Pelosi crafted a “showpiece” FISA bill without the immunity provisions, garnering much praise for her from civil liberties organizations; however, Pelosi’s colleague House Majority Leader Steny Hoyer (D-MD) had secretly worked with the White House to craft a bill that preserved immunity for telecoms, and on June 10, Pelosi “rammed” that bill through the House. The final bill actually requires the judiciary to dismiss lawsuits brought against telecom firms if those firms can produce evidence that they had worked in collusion with the NSA. Feingold later observes that the final bill is not a “compromise, it is a capitulation.” [Klein, 2009, pp. 101-103] Klein will write that Democrats and Republicans have worked together to “unw[ind] one of the main reforms of the post-Watergate era and accepted the outrageous criminal rationalizations of [President] Nixon himself.” Klein will quote Nixon as saying, “If the president does it, that means it’s not illegal” (see April 6, 1977), and will say that is “the essence of the FISA ‘compromise’” and turned Congress into the White House’s “rubber stamp.… It is the twisted judicial logic of a dictatorship.” [Klein, 2009, pp. 107]

Entity Tags: Nancy Pelosi, Foreign Intelligence Surveillance Act, FISA Amendments Act of 2008, Christopher Dodd, Barack Obama, George W. Bush, Mark Klein, Russell D. Feingold, Richard M. Nixon, Harry Reid, Steny Hoyer, National Security Agency, Protect America Act

Timeline Tags: Civil Liberties

Judge Vaughn Walker rules that “sufficient facts” exist to keep alive a lawsuit brought by the defunct Islamic charity Al Haramain, which alleges it was subjected to illegal, warrantless wiretapping by the US government (see February 28, 2006). The lawsuit centers on a Top Secret government document accidentally disclosed to plaintiffs’ lawyers Wendell Belew and Asim Ghafoo that allegedly proves the claim of illegal wiretapping; previous court rulings forced Belew and Ghafoo to return the document to the government and prohibited its use in the lawsuit. The lawsuit is widely viewed as a test case to decide in court whether the Bush administration abused its power by authorizing a secret domestic spying program (see Spring 2004 and December 15, 2005). Jon Eisenberg, the lawyer for Belew and Ghafoo, says it does not matter whether the case pertains to the Bush administration or the incoming Obama administration. “I don’t want President Obama to have that power any more than I do President Bush,” he says. Because the lawsuit contains sufficient evidence even without the Top Secret document, Walker rules, it can continue. “The plaintiffs have alleged sufficient facts to withstand the government’s motion to dismiss,” he writes. Therefore, he adds, the law demands that they be allowed to review the classified document, and others, to determine whether the lawyers were spied on illegally and whether Bush’s spy program was unlawful. “To be more specific, the court will review the sealed document ex parte and in camera,” Walker writes. “The court will then issue an order regarding whether plaintiffs may proceed—that is, whether the sealed document establishes that plaintiffs were subject to electronic surveillance not authorized by FISA” (the Foreign Intelligence Surveillance Act—see 1978). [Wired News, 1/5/2009]

Entity Tags: Vaughn Walker, Al Haramain Islamic Foundation, Asim Ghafoo, Jon Eisenberg, Bush administration (43), Wendell Belew, Foreign Intelligence Surveillance Act, Obama administration

Timeline Tags: Civil Liberties

Constitutional lawyer and author Bruce Fein, a former official in the Justice Department under Ronald Reagan, writes that if President Obama wants to “restore the rule of law and to prevent future wrongdoing by high-level government officials,” he “should investigate, among others, former President George W. Bush, former Vice President Dick Cheney, former Defense Secretary Donald Rumsfeld, former Attorney General John Ashcroft, former White House counsel and Attorney General Alberto Gonzales, and former White House political adviser Karl Rove. The crimes to be investigated should include complicity in torture, illegal surveillance, illegal detention, perjury, obstruction of justice, and contempt of Congress. Prosecutions should follow if the evidence convinces a grand jury to indict.” Fein states that “[t]he best way to deter government criminality and to teach citizens the rule of law is to punish the perpetrators who are unanimously found guilty beyond a reasonable doubt by independent and impartial jurors.”
FBI, CIA Feared Prosecution for Torture - He notes that the FBI refused to participate in “enhanced interrogation techniques,” including waterboarding, for fear of being charged with war crimes. And the CIA required specific legal opinions from the Bush Justice Department—the so-called “golden shield” (see August 1, 2002)—and specific presidential authorization before it would allow its agents to torture detainees. And the White House ordered an end to waterboarding after it was warned that such tactics left its officials open to charges of torture and war crimes.
Attorney General Feared Prosecution under FISA - He goes on to note that Justice Department officials such as acting Attorney General James Comey “balked at approving… Bush’s warrantless surveillance program without modification in March 2004 probably because he feared criminal prosecution under the Foreign Intelligence Surveillance Act” (see 1978).
'Unpunished Lawlessness by Government Officials Invites Lawlessness Generally' - Fein asserts that “unpunished lawlessness by government officials invites lawlessness generally.” He quotes former Supreme Court Justice Louis Brandeis: “Decency, security, and liberty alike demand that government officials shall be subjected to the same rules of conduct that are commands to the citizen. In a government of laws, existence of the government will be imperiled if it fails to observe the law scrupulously. Our government is the potent, the omnipresent teacher. For good or for ill, it teaches the whole people by its example. Crime is contagious. If the government becomes a lawbreaker, it breeds contempt for law; it invites every man to become a law unto himself; it invites anarchy.” The best way to deter criminal behavior, he says, is to prosecute alleged criminals, and that process must start with government officials. [Washington Times, 1/20/2009]

Entity Tags: Bruce Fein

Timeline Tags: Civil Liberties

Susan Rice, speaking at the UN.Susan Rice, speaking at the UN. [Source: Agence France-Presse]The newly named US ambassador to the United Nations, Susan Rice, says that the Obama administration will reverse years of Bush administration policies and engage in “direct diplomacy” with Iran. Such direct diplomatic efforts have not been tried with Iran since before the 1979 Iranian revolution (see February-November 4, 1979), when Iranian radicals captured 52 Americans and held them hostage for well over a year (see November 4, 1979-January 20, 1981). [Associated Press, 1/26/2009] Israel’s Arutz Shiva calls the announcement a “not-unexpected bombshell.” [Arutz Shiva, 1/26/2009]
Iran Open to Engagement - Iranian Foreign Minister Manouchehr Mottaki says Iran is “ready for new approaches by the United States.” Mottaki adds that Iran would consider the idea of allowing the US to open a diplomatic office in Tehran. The last US diplomatic office was closed in 1979.
US Still 'Deeply Concerned' about Iran's Nuclear Program - Rice says that Iran must meet UN Security Council demands to suspend uranium enrichment before the US will be willing to discuss its nuclear program. “The dialogue and diplomacy must go hand in hand with a very firm message from the United States and the international community that Iran needs to meet its obligations as defined by the Security Council,” Rice says. “And its continuing refusal to do so will only cause pressure to increase.” Rice says the US remains “deeply concerned about the threat that Iran’s nuclear program poses to the region, indeed to the United States and the entire international community.” She adds, “We look forward to engaging in vigorous diplomacy that includes direct diplomacy with Iran, as well as continued collaboration and partnership” with the other four permanent members of the Security Council—Britain, China, France and Russia—as well as Germany.
NATO: Iran Must Be Included in Decisions Regarding Afghanistan - NATO Secretary General Japp de Hoop Scheffer says that Iran must be part of the engagement process of escalating the war in Afghanistan. “We need a discussion that brings in all the relevant players: Afghanistan, Pakistan, India, China, Russia—and yes, Iran,” he says. “We need a pragmatic approach to solve this very real challenge.” Bush officials have long sought to isolate Iran from having any influence over the events in Afghanistan, even though its ruling Shi’ite theocracy has long opposed Afghanistan’s Taliban. [Associated Press, 1/26/2009; Arutz Shiva, 1/26/2009]
Clinton: 'New, Perhaps Different Approach' - Secretary of State Hillary Clinton says: “Obviously, the incoming administration views with great concern the role that Iran is playing in the world, its sponsorship of terrorism, its continuing interference with the functioning of other governments, and its pursuit of nuclear weapons. There is an ongoing policy review that the Obama administration has undertaken, but… our goal will be to do everything we can, pursue through diplomacy, through the use of sanctions, through creating better coalitions with countries that we believe also have a big stake in preventing Iran from becoming a nuclear weapon power, to try to prevent this from occurring. We are not taking any option off the table, at all. But we will pursue a new, perhaps different approach that will become a cornerstone of what the Obama administration believes is an attitude towards engagement that might bear fruit.” She says that the US continues to view an Iranian nuclear program as “unacceptable.” [Arutz Shiva, 1/26/2009]

Entity Tags: Hillary Clinton, Arutz Shiva, Bush administration (43), Japp de Hoop Scheffer, Manouchehr Mottaki, Susan Rice, United Nations, North Atlantic Treaty Organization, Obama administration

Timeline Tags: US confrontation with Iran

The cover of Mark Klein’s ‘Wiring Up the Big Brother Machine… and Fighting It.’The cover of Mark Klein’s ‘Wiring Up the Big Brother Machine… and Fighting It.’ [Source: BookSurge / aLibris (.com)]Former AT&T technician Mark Klein self-publishes his book, Wiring Up the Big Brother Machine… and Fighting It. In his acknowledgements, Klein writes that he chose to self-publish (through BookSurge, a pay-to-publish venue) because “[t]he big publishers never called me,” and the single small publishing house that offered to publish his book added “an unacceptable requirement to cut core material.” Klein based his book on his experiences as an AT&T engineer at the telecom giant’s San Francisco facility, where he primarily worked with AT&T’s Internet service. In 2002 and 2003, Klein witnessed the construction of of a “secret room,” a facility within the facility that was used by the National Security Agency (NSA) to gather billions of email, telephone, VoIP (voice over Internet Protocol), and text messages, most of which were sent by ordinary Americans. The NSA did its electronic surveillance, Klein writes, secretly and without court warrants. Klein describes himself as “wiring up the Big Brother machine,” and was so concerned about the potential illegality and constitutional violations of the NSA’s actions (with AT&T’s active complicity) that he retained a number of non-classified documents proving the extent of the communications “vacuuming” being done. Klein later used those documents to warn a number of reporters, Congressional members, and judges of what he considered a horrific breach of Americans’ right to privacy. [Klein, 2009, pp. 9-11, 21-24, 33, 35, 38, 40] In 2007, Klein described his job with the firm as “basically to keep the systems going. I worked at AT&T for 22 and a half years. My job was basically to keep the systems going. They were computer systems, network communication systems, Internet equipment, Voice over Internet [Protocol (VoIP)] equipment. I tested circuits long distance across the country. That was my job: to keep the network up.” He explained why he chose to become a “whistleblower:” “Because I remember the last time this happened.… I did my share of anti-war marches when that was an active thing back in the ‘60s, and I remember the violations and traffic transgressions that the government pulled back then for a war that turned out to be wrong, and a lot of innocent people got killed over it. And I’m seeing all this happening again, only worse. When the [NSA] got caught in the ‘70s doing domestic spying, it was a big scandal, and that’s why Congress passed the FISA [Foreign Intelligence Surveillance Act] law, as you know, to supposedly take care of that (see 1978). So I remember all that. And the only way any law is worth anything is if there’s a memory so that people can say: ‘Wait a minute. This happened before.’ And you’ve got to step forward and say: ‘I remember this. This is the same bad thing happening again, and there should be a halt to it.’ And I’m a little bit of that institutional memory in the country; that’s all.” [PBS Frontline, 5/15/2007]

Entity Tags: National Security Agency, AT&T, BookSurge, Mark Klein

Timeline Tags: Civil Liberties

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike