!! History Commons Alert, Exciting News

Context of '(1997): Perle Complains that Bosnia Defense Program Is Under Funded'

This is a scalable context timeline. It contains events related to the event (1997): Perle Complains that Bosnia Defense Program Is Under Funded. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 3 (217 events)
previous | 1, 2, 3 | next

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). [Federation of American Scientists, 7/17/1997]

Entity Tags: National Security Agency, Echelon, Rhyolite, Chalet, Government Communications Headquarters, Owen Lewis, Canyon

Timeline Tags: Civil Liberties

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

Michael Barnes.Michael Barnes. [Source: Covington and Burling]Representative Michael Barnes (D-MD) is targeted by the NSA’s Echelon satellite surveillance program on orders from Reagan administration officials. Barnes, an outspoken opponent of Reagan’s Central American policies, had phone conversations with Nicaraguan officials intercepted and recorded, including one conversation between Barnes and the foreign minister of Nicaragua. Barnes learns of the surveillance after White House officials, apparently attempting to discredit Barnes, leaks transcripts of the taped conversations to reporters. CIA director William Casey shows Barnes a Nicaraguan embassy cable reporting a meeting between embassy staff and one of Barnes’s aides; Casey demands that Barnes fire the aide. Barnes refuses, noting that the aide had visited the embassy on legitimate business concerning international affairs. Barnes will say in 1995, “I was aware that NSA monitored international calls, that it was a standard part of intelligence gathering. But to use it for domestic political purposes is absolutely outrageous and probably illegal.” Former senator Dennis DeConcini (R-AZ) says he worries about the NSA spying on US citizens: “It has always worried me. What if that is used on American citizens? It is chilling. Are they listening to my private conversations on my telephone?” [Patrick S. Poole, 8/15/2000]

Entity Tags: Michael D. Barnes, Reagan administration, William Casey, National Security Agency, Dennis DeConcini, Echelon

Timeline Tags: Civil Liberties

Margaret Thatcher.Margaret Thatcher. [Source: UK Parliament]British prime minister Margaret Thatcher, displeased with two of her ministers for challenging her on unidentified policy matters, requests that they be placed under electronic surveillance. Because it is illegal for British intelligence to monitor its own citizens, the operation is handed over to the CSE, Canada’s national security agency. [Daily Iowan, 1/19/2006; Janczewski and Colarik, 2007, pp. 454] According to former CSE spy Mike Frost, who will publicly discuss the matter in 2000, Thatcher “had two ministers that she said ‘…weren’t onside.’” Thatcher, says Frost, “wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers.” Why CSE and not British intelligence? Because for the British to monitor their own government members would be illegal—so instead, they farm out such activities to their allies. “The British Parliament now have total deniability,” Frost says. “They didn’t do anything. They know nothing about it. Of course they didn’t do anything; we did it for them.” Frost will say there is no way to pin any blame or criminal charges on anyone in the British government. “The British Parliament now has total deniability,” Frost says. “They didn’t do anything… we did it for them.” [ZDNet, 2/25/2000; CBS News, 2/27/2000]

Entity Tags: Communications Security Establishment, Mike Frost, Government Communications Headquarters, Margaret Thatcher

Timeline Tags: Civil Liberties

Strom Thurmond.Strom Thurmond. [Source: US Government]Former Lockheed software manager Margaret Newsham, who worked at the Menwith Hill facility of the NSA’s Echelon satellite surveillance operation in 1979, says she heard a real-time phone intercept of conversations involving senator Strom Thurmond (R-SC). She was shocked, she recalls, because she thought only foreign communications were being monitored. Newsham, who was fired from Lockheed after she filed a whistleblower lawsuit alleging fraud and waste, tells the chairman of the House Intelligence Committee, Louis Stokes (D-OH), of the overheard conversations. In July, Capital Hill staffers will leak the story to the Cleveland Plain Dealer. Thurmond says he doesn’t believe Newsham’s story, but his office admits that it has previously received reports that Thurmond had been a target of NSA surveillance. Thurmond will decline to press for an investigation, and the reason for the surveillance has never been revealed. [CBS News, 2/27/2000; Patrick S. Poole, 8/15/2000]

Entity Tags: Strom Thurmond, National Security Agency, House Intelligence Committee, Louis Stokes, Echelon, Cleveland Plain Dealer, Lockheed Martin Corporation, Margaret Newsham

Timeline Tags: Civil Liberties

The Communications Assistance for Law Enforcement Act (CALEA) takes effect. CALEA obliges telecommunications providers such as AT&T to give law enforcement agencies and US intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks. In more recent years, the law will be expanded to give law enforcement and intelligence agencies similar abilities to monitor Internet usage by US citizens. [Federal Communications Commission, 2/21/2007]

Entity Tags: Communications Assistance for Law Enforcement Act (CALEA), AT&T

Timeline Tags: Civil Liberties

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Timeline Tags: Civil Liberties

Bosnia has so far raised only $200 million for its defense program budget. Half of that amount exists in the form of refurbished US military equipment given to the Bosnians. The other half has been donated by Muslim countries for training and additional weapons systems. Military Professional Resources Inc. (MPRI) of Alexandria, Va. is providing the first year’s training at a cost of $40 million. Richard Perle complains to the APF Reporter that the Clinton administration’s “equip-and-train” program in Bosnia is “too feeble an effort,” and questions the administration’s sincerity. In 1996, the Institute for Defense Analyses estimated that Bosnia would need about $700 million to meet the first stages of its defense program. [APF Reporter, 1997]

Entity Tags: Richard Perle

Timeline Tags: Neoconservative Influence

Fourteen nations, including the US, support a $400 million “Bosnian Defense Fund,” which reportedly collects cash and equipment contributions for a “train and equip” program that is operated by the US. [Arms Trade News, 10/1997] According to investigative journalist Wayne Madsen, a former Naval Officer who has worked with the NSA: “Via something called the Bosnia Defense Fund, these countries [Saudi Arabia, Iran, Malaysia, Brunei, Jordan, and Egypt] deposited millions of dollars into US coffers to buy weapons for the Bosnians…. According to Washington K Street sources, the law firm that established the Bosnia Defense Fund was none other than Feith and Zell, the firm of current Pentagon official and leading neo-con Douglas Feith. Feith’s operation at Feith and Zell was assisted by his one-time boss and current member of Rumsfeld’s Defense Policy Board, Richard Perle.” [CounterPunch, 9/18/2003]

Entity Tags: Richard Perle, Douglas Feith

Timeline Tags: Complete 911 Timeline

Princess Diana at a mine field in Angola in 1997.Princess Diana at a mine field in Angola in 1997. [Source: Tim Graham / Corbis]The NSA admits that US intelligence agencies possess 1,056 pages of classified information regarding Britain’s Princess Diana. British tabloids portray the documents as rife with salacious information on Diana’s “most intimate love secrets” about her relationship with Egyptian billionaire Dodi al-Fayed, but the actual documentation may not be so lurid. The NSA recently denied a Freedom of Information request from the Internet news service APB Online about information it has collected on Diana, who died in a tragic car accident in 1997. (It is unclear whether US intelligence has any unreleased information about the circumstances of Diana’s death. [APB Online, 11/30/1998; Washington Post, 12/12/1998] The NSA has denied monitoring Diana on the night of her death, an allegation raised by The Observer in 2006.) [MSNBC, 12/11/2006] In the two-page letter denying the request, the NSA admits to possessing a “Diana file,” but refuses to divulge what is in that file. A US intelligence official says the information is made up of conversations between other people who mentioned Diana; the references to Diana in those intercepted conversations are “incidental.” The official says Diana was never a particular target of the NSA’s Echelon surveillance program. However, the NSA has classified 124 pages of the “Diana documents” as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security.” According to a recent report by the European Parliament, the NSA routinely monitors virtually “all e-mail, telephone and fax communications… within Europe” (see July 11, 2001). Intelligence expert Steven Aftergood of the Federation of American Scientists says “the US and our allies promiscuously collect electronic communications around the world. Whether the descriptions of Echelon are accurate or not, that much is definitely true.” Some believe that lurid snippets of information leaked to the British press regarding Diana’s affair with Fayed, and her ambivalent relationship with Prince Charles, may have come from Echelon wiretaps and surveillance. Another FAS scientist, John Pike, says the NSA and other US intelligence agencies may have been monitoring Diana to protect her from terrorist attacks. Pike says it is also possible she may have been monitored because of her involvement in banning land mines, a position opposed by the Pentagon. [APB Online, 11/30/1998; Washington Post, 12/12/1998] Former NSA official Wayne Madsen will say in 2000, “[W]hen NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?” [CBS News, 2/27/2000] In August 1999, the NSA will deny another Freedom of Information request about its “Diana file” from the British newspaper The Guardian. [Guardian, 8/6/1999]

Entity Tags: Steven Aftergood, Prince Charles, The Guardian, John Pike, Dodi al-Fayed, Echelon, Federation of American Scientists (FAS), National Security Agency, Princess Diana

Timeline Tags: Civil Liberties

Chairman of the Joint Chiefs of Staff General Henry Shelton will later say, “Right after I left SOCOM [Special Operations Command], I asked my successor to put together a small team, if he could, to try to use the Internet and start trying to see if there was any way that we could track down Osama bin Laden or where he was getting his money from or anything of that nature.” A team of six intelligence officers will be given this task and Shelton will be periodically briefed on the progress of the program. But apparently the team, later to be called Able Danger, will focus on data mining tasks relating to Bosnia and China for most of 1999. [Sacramento Bee, 12/7/2005; US Congress, 2/15/2006] General Peter Schoomaker, the head of SOCOM, helped come up with the idea for Able Danger and helps to set it up. SOCOM, based in Tampa, Florida, is responsible for America’s secret commando units. [Government Security News, 9/2005] Mark Zaid, a lawyer for several Able Danger whistleblowers in 2005, will give this description of Able Danger: “In the most understandable and simplistic terms, Able Danger involved the searching out and compiling of open source or other publicly available information regarding specific targets or tasks that were connected through associational links. No classified information was used. No government database systems were used.… The search and compilation efforts were primarily handled by defense contractors, who did not necessarily know they were working for Able Danger, and that information was then to be utilized by the military members of Able Danger for whatever appropriate purposes.” [US Congress, 9/21/2005] Representative Curt Weldon (R-PA) will say in 2005 that the military’s purpose for the Able Danger program was to enable it to “manipulate, degrade, or destroy the global al-Qaeda infrastructure.” [Washington Post, 8/13/2005] Apparently, Able Danger does not begin to use real data to fight al-Qaeda until near the end of 1999.

Entity Tags: Curt Weldon, Special Operations Command, Peter J. Schoomaker, Able Danger, Henry Hugh Shelton, Mark Zaid

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Hua Di.Hua Di. [Source: Stanford University]A report commissioned in mid-1999 by Rep. Curt Weldon (R-PA) looks into possible Chinese front companies in the US seeking technology for the Chinese military. Dr. Eileen Preisser and Michael Maloof are commissioned to make the report. Dr. Preisser, who runs the Information Dominance Center at the US Army’s Land Information Warfare Activity (LIWA) and will later become closely tied to Able Danger, uses LIWA’s data mining capabilities to search unclassified information. According to Maloof, their results show Chinese front companies in the US posing as US corporations that acquire technology from US defense contractors. When the study is completed in November 1999, the General Counsel’s office in the Office of the Defense Secretary orders the study destroyed. Weldon complains about this to Army Chief of Staff Eric Shinseki, and apparently delays the destruction of the report. Weldon also writes a letter to FBI Director Louis Freeh requesting an espionage investigation into these Chinese links, but Freeh never responds to this. [Washington Times, 10/9/2005] As part of this report, LIWA analysts had produced a chart of Chinese strategic and business connections in the US. But this data mining effort runs into controversy when the chart apparently shows connections between future National Security Adviser Condoleezza Rice, former Defense Secretary William Perry, and other prominent US figures, and business deals benefiting the Chinese military. [New York Post, 8/27/2005; Washington Times, 9/22/2005] The China chart was put together by private contractor James D. Smith, who will come forward in August 2005 to corroborate revelations about the Able Danger unit and its findings (see August 22-September 1, 2005). The New York Post later says there is “no suggestion that Rice or any of the others had done anything wrong.” [New York Post, 8/27/2005] However, articles first appear one month later and through 2001 in the conservative publications WorldNetDaily and NewsMax, which connect Perry and Rice to Hua Di, a Chinese missile scientist and possible spy, and question the nature of their relationship with him. [WorldNetDaily, 12/21/1999; WorldNetDaily, 4/5/2000; NewsMax, 1/24/2001] Di defected to the US in 1989 and worked most of the 1990s at Stanford University’s Center for International Security and Arms Control, which was co-directed by Perry. Di later returned to China and is subsequently sentenced to ten years in prison for writing influential articles said to reveal vital Chinese state secrets. [Stanford Report, 2/7/2001] However, other accounts claim that he was in fact passing on disinformation through these articles, successfully misleading the US military for a couple of years about the abilities of certain Chinese missile programs. [WorldNetDaily, 12/21/1999] Additionally, Hua Di teamed in 1994 with Stanford professor Dr. John Lewis and William Perry to buy an advanced AT&T fiber-optic communications system for “civilian” use inside China that instead is used by the Chinese army. The General Accounting Office later criticized the sale. In 1997, Stanford University investigated Dr. Lewis for his role in it, but Condoleezza Rice, serving as a Stanford provost at the time, apparently stopped the investigation. [WorldNetDaily, 4/5/2000; NewsMax, 1/24/2001] Able Danger and LIWA’s data mining efforts will be severely proscribed in April 2000 as part of the fallout from this China controversy (see April 2000), and the destruction of their collected data will follow shortly thereafter (see May-June 2000).

Entity Tags: F. Michael Maloof, William Perry, James D. Smith, Eric Shinseki, Hua Di, Eileen Preisser, Condoleezza Rice, Land Information Warfare Activity, Curt Weldon, Louis J. Freeh, China

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Gen. Pete Schoomaker.Gen. Pete Schoomaker. [Source: US Defense Department]A data mining program called Able Danger was set up by US Special Operations Command (SOCOM) in late 1998. It had been collecting data mostly on Bosnia and China (see Late December 1998). But at this time, it begins collecting data on al-Qaeda. [Government Security News, 9/2005] At least some of the data is collected on behalf of Maj. Gen. Geoffrey Lambert, the J3 at US Special Operations Command. [US Congress. Senate. Committee on Judiciary, 9/21/2005] Eleven intelligence employees are directly involved in Able Danger’s work. Six are with SOCOM’s Able Danger unit. Four more, including Dr. Eileen Preisser and Maj. Eric Kleinsmith, are with the US Army’s Land Information Warfare Activity (LIWA), which joins the effort in December 1999. LIWA had been conducing data mining already on a wide variety of topics, including international drug cartels, corruption in Russia and Serbia, terrorist linkages in the Far East, and the proliferation of sensitive military technology to China (see April 2000). [Norristown Times Herald, 6/19/2005; Government Security News, 8/2005; New York Times, 8/9/2005; St. Petersburg Times, 8/10/2005; Bergen Record, 8/14/2005; Government Security News, 9/2005; US Congress, 9/21/2005; US Congress. Senate. Committee on Judiciary, 9/21/2005] Lt. Col. Anthony Shaffer, running a military unit called Stratus Ivy in the Defense Intelligence Agency (DIA), will also take part in the effort. According to Shaffer, Stratus Ivy is tasked “to take on ‘out of the box’ ideas, and develop them into real intelligence operations.” So the goal is to use the information gathered by Able Danger to conduct real operations against al-Qaeda targets. [US Congress, 2/15/2006 pdf file] Using computers, the unit collects huge amounts of data in a technique called “data mining.” They get information from such sources as al-Qaeda Internet chat rooms, news accounts, web sites, and financial records. Using sophisticated software, they compare this with government records such as visa applications by foreign tourists, to find any correlations and depict these visually. [Bergen Record, 8/14/2005; Government Security News, 9/2005] The program will be shut down early in 2001 (see January-March 2001).

Entity Tags: Geoffrey Lambert, Anthony Shaffer, Eric Kleinsmith, Russia, Special Operations Command, Hugh Shelton, Al-Qaeda, Curt Weldon, Peter J. Schoomaker, Bosnia, China, Able Danger, Eileen Preisser

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

A blurry photograph of a 2005 reconstruction of the pre-9/11 Able Danger chart showing Mohamed Atta and others.A blurry photograph of a 2005 reconstruction of the pre-9/11 Able Danger chart showing Mohamed Atta and others. [Source: C-SPAN]A US Army intelligence program called Able Danger identifies five al-Qaeda terrorist cells; one of them has connections to Brooklyn, New York and will become informally known as the “Brooklyn” cell by the Able Danger team. This cell includes 9/11 hijacker leader Mohamed Atta, and three other 9/11 hijackers: Marwan Alshehhi, Khalid Almihdhar, and Nawaf Alhazmi. According to a former intelligence officer who claims he worked closely with Able Danger, the link to Brooklyn is not based upon any firm evidence, but computer analysis that established patterns in links between the four men. “[T]he software put them all together in Brooklyn.” [New York Times, 8/9/2005; Washington Times, 8/22/2005; Fox News, 8/23/2005; Government Security News, 9/2005] However, that does not necessarily imply them being physically present in Brooklyn. A lawyer later representing members of Able Danger states, “At no time did Able Danger identify Mohamed Atta as being physically present in the United States.” Furthermore, “No information obtained at the time would have led anyone to believe criminal activity had taken place or that any specific terrorist activities were being planned.” [CNN, 9/21/2005; US Congress, 9/21/2005] James D. Smith, a contractor working with the unit, discovers Mohamed Atta’s link to al-Qaeda. [WTOP Radio 103.5 (Washington), 9/1/2005] Smith has been using advanced computer software and analysing individuals who are going between mosques. He has made a link between Mohamed Atta and Sheikh Omar Abdul-Rahman, ringleader of the 1993 bombing of the World Trade Center. [Fox News, 8/28/2005; Government Security News, 9/2005] Atta is said to have some unspecified connection to the Al Farouq mosque in Brooklyn, a hotbed of anti-American sentiment once frequented by Abdul-Rahman, which also contained the notorious Al-Kifah Refugee Center. [Times Herald (Norristown), 9/22/2005] Smith obtained Atta’s name and photograph through a private researcher in California who was paid to gather the information from contacts in the Middle East. [New York Times, 8/22/2005] Lt. Col. Anthony Shaffer claims the photo is not the well-known menacing Florida driver’s license photo of Atta. “This is an older, more grainy photo we had of him. It was not the best picture in the world.” It is said to contain several names or aliases for Atta underneath it. [Jerry Doyle Show, 9/20/2005; Chicago Tribune, 9/28/2005] LIWA analysts supporting Able Danger make a chart, which Shaffer describes in a radio interview as, “A chart probably about a 2x3 which had essentially five clusters around the center point which was bin Laden and his leadership.” [Savage Nation, 9/16/2005] The 9/11 Commission later claims that Atta only enters the United States for the first time several months later, in June 2000 (see June 3, 2000). [9/11 Commission, 7/24/2004, pp. 224] However, investigations in the months after 9/11 find that Mohamed Atta and another of the hijackers rented rooms in Brooklyn around this time (see Spring 2000). Other newspaper accounts have the CIA monitoring Atta starting in January 2000, while he is living in Germany (see January-May 2000). Atta, Alshehhi, Almihdhar, Alhazmi and other hijackers have connections to associates of Sheikh Abdul-Rahman (see Early 2000-September 10, 2001).

Entity Tags: Al-Kifah Refugee Center, Al-Qaeda, El Farouq, Khalid Almihdhar, Mohamed Atta, Able Danger, Omar Abdul-Rahman, Nawaf Alhazmi, Marwan Alshehhi, Al Farouq Mosque

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The 9/11 hijackers have links to several people associated with “Blind Sheikh” Omar Abdul-Rahman, the spiritual head of the group that bombed the World Trade Center in 1993. Abdul-Rahman has been in prison since the mid-1990s.
bullet 9/11 hijackers Khalid Almihdhar and Nawaf Alhazmi attend a mosque in San Diego that is visited by an unnamed associate of Abdul-Rahman who is under investigation by the Los Angeles FBI (see June 1999-March 2000);
bullet The mosque is also attended by Osama Basnan, who threw a party for Abdul-Rahman in 1992 (see Spring 2000);
bullet 9/11 hijacker Mohamed Atta is seen with Adnan Shukrijumah, son of Abdul-Rahman’s former translator (see May 2, 2001) and Atta and hijacker Marwan Alshehhi may attend a mosque run by his father (see 2000-2001);
bullet Hijacker Mohand Alshehri is seen near the Minnesota clinic where Abdul-Rahman is being held (see August 2001);
bullet Some hijackers have the same mailing address as Abdul-Rahman and at least one of his associates (see Before September 11, 2001);
bullet Khalid Almihdhar and other hijackers obtain false ID cards from Mohamed el-Atriss, an associate of an unindicted co-conspirator at Abdul-Rahman’s trial (see (July-August 2001)); [Lance, 2006, pp. 373]
bullet In addition, people attending a Bronx mosque are warned to stay away from lower Manhattan on 9/11 (see Early September 2001).
In early 2000, the Able Danger data-mining program apparently identifies Atta, Alshehhi, Alhazmi, and Almihdhar as members of al-Qaeda through their associations with people linked to Abdul-Rahman (see January-February 2000).

Entity Tags: Mohamed el-Atriss, Adnan Shukrijumah, Omar Abdul-Rahman, Osama Basnan, Mohand Alshehri, Mohamed Atta, Nawaf Alhazmi, Marwan Alshehhi, Khalid Almihdhar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

Mohamed Atta and another of the 9/11 hijackers (presumably Marwan Alshehhi) rent rooms in New York City, according to a federal investigator. These rooms are in the Bronx and Brooklyn. Following 9/11, Atta is traced back to Brooklyn by a parking ticket issued to a rental car he was driving. However, immigration records have Mohamed Atta entering the US for the first time on June 3, 2000 (see June 3, 2000). The Associated Press article on this subject does not specify if Atta first stayed in New York before or after that date. [Associated Press, 12/8/2001] According to a brief mention in the 9/11 Commission’s final report, in the month of June, “As [Atta and Marwan Alshehhi] looked at flight schools on the East Coast, [they] stayed in a series of short-term rentals in New York City.” [9/11 Commission, 7/24/2004, pp. 224; Washington Post, 8/13/2005] Earlier in 2000, a US Army intelligence program called Able Danger identified an al-Qaeda terrorist cell based in Brooklyn, of which Atta is a member (see January-February 2000). Also, a number of eyewitnesses later report seeing Atta in Maine and Florida before this official arrival date (see April 2000; Late April-Mid-May 2000).

Entity Tags: Able Danger, Mohamed Atta, Marwan Alshehhi, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A 1999 study by the US Army’s Land Information Warfare Activity (LIWA) to look into possible Chinese front companies in the US seeking technology for the Chinese military created controversy and was ordered destroyed in November 1999 (see Mid-1999-November 1999). However, apparently Rep. Curt Weldon (R-PA) protests, and the issue finally comes to a head during this month. One result of this controversy will be what Major Erik Kleinsmith will later call “severely restricted” support for Able Danger, including a temporary end to LIWA support (see April 2000) In an April 14, 2000 memorandum from the legal counsel in the Office of the Joint Chiefs of Staff, Captain Michael Lohr writes that the concern over the LIWA data mining study raises privacy concerns: “Preliminary review of subject methodology raised the possibility that LIWA ‘data mining’ would potentially access both foreign intelligence (FI) information and domestic information relating to US citizens (i.e. law enforcement, tax, customs, immigration, etc.… I recognize that an argument can be made that LIWA is not ‘collecting’ in the strict sense (i.e. they are accessing public areas of the Internet and non-FI federal government databases of already lawfully collected information). This effort would, however, have the potential to pull together into a single database a wealth of privacy-protected US citizen information in a more sweeping and exhaustive manner than was previously contemplated.” Additionally, the content of the study is another reason why it caused what Weldon calls a “wave of controversy.” The study had connected future National Security Adviser and Secretary of State Condoleezza Rice, former Defense Secretary William Perry, and other prominent US citizens to business transactions with Chinese military officials.(see Mid-1999-November 1999). [New York Post, 8/27/2005; Office of Congressman Curt Weldon, 9/17/2005; US Congress, 9/21/2005; Washington Times, 9/22/2005; Washington Times, 10/9/2005] One article on the subject will comment, “Sources familiar with Able Danger say the project was shut down because it could have led to the exposure of a separate secret data mining project focusing on US citizens allegedly transferring super-sensitive US technology illegally to the Chinese government.” [WTOP Radio 103.5 (Washington), 9/1/2005] A massive destruction of data from Able Danger and LIWA’s data mining efforts will follow, one month later (see May-June 2000).

Entity Tags: Michael Lohr, Land Information Warfare Activity, Able Danger, Condoleezza Rice, William Perry, Curt Weldon

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Erik Kleinsmith.Erik Kleinsmith. [Source: C-SPAN]Maj. Eric Kleinsmith, chief of intelligence for the Land Information Warfare Activity (LIWA) unit, is ordered to destroy data and documents related to a military intelligence program set up to gather information about al-Qaeda. The program, called Able Danger, has identified Mohamed Atta and three other future hijackers as potential threats (see January-February 2000). According to Kleinsmith, by April 2000 it has collected “an immense amount of data for analysis that allowed us to map al-Qaeda as a worldwide threat with a surprisingly significant presence within the United States.”(see January-February 2000) [Fox News, 9/21/2005; New York Times, 9/22/2005] The data is being collected on behalf of Maj. Gen. Geoffrey Lambert, the J3 at US Special Operations Command, who is said to be extremely upset when he learns that the data had been destroyed without his knowledge or consent. [US Congress. Senate. Committee on Judiciary, 9/21/2005] Around this time, a separate LIWA effort showing links between prominent US citizens and the Chinese military has been causing controversy, and apparently this data faces destruction as well (see April 2000). The data and documents have to be destroyed in accordance with Army regulations prohibiting the retention of data about US persons for longer than 90 days, unless it falls under one of several restrictive categories. However, during a Senate Judiciary Committee public hearing in September 2005, a Defense Department representative admits that Mohamed Atta was not considered a US person. The representative also acknowledges that regulations would have probably allowed the Able Danger information to be shared with law enforcement agencies before its destruction. Asked why this was not done, he responds, “I can’t tell you.” [CNET News, 9/21/2005] The order to destroy the data and documents is given to Kleinsmith by Army Intelligence and Security Command General Counsel Tony Gentry, who jokingly tells him, “Remember to delete the data—or you’ll go to jail.” [Government Executive, 9/21/2005] The quantity of information destroyed is later described as “2.5 terabytes,” about as much as one-fourth of all the printed materials in the Library of Congress. [Associated Press, 9/16/2005] Other records associated with the unit are allegedly destroyed in March 2001 and spring 2004 (see Spring 2004). [Associated Press, 9/21/2005; US Congress, 9/21/2005; Fox News, 9/24/2005]

Entity Tags: Able Danger, Eric Kleinsmith, Al-Qaeda, Land Information Warfare Activity, Mohamed Atta, Tony Gentry, Geoffrey Lambert

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The Justice Department’s Office of Intelligence Policy and Review (OIPR), which helps obtain warrants under the Foreign Intelligence Surveillance Act (FISA), discovers errors in several al-Qaeda related FISA applications under a counterterrorist program called “Catcher’s Mitt.” The OIPR verbally notifies the FISA Court of the errors, which are mostly in affidavits submitted by supervisory special agents at field offices. Then, in September and October 2000, the OIPR submits two pleadings to the court regarding approximately 75-100 applications with errors starting in July 1997. Many of the errors concern misleading statements about the nature of collaboration between criminal and intelligence agents. Most of these applications stated that the FBI New York field office, where the I-49 squad focusing on al-Qaeda was based (see January 1996 and Late 1998-Early 2002), had separate teams of agents handling criminal and intelligence investigations. But in actual fact the I-49 agents intermingled with criminal agents working on intelligence cases and intelligence agents working on criminal cases. Therefore, contrary to what the FISA Court has been told, agents working on a criminal investigation have had unrestricted access to information from a parallel intelligence investigation—a violation of the so-called “wall,” the set of bureaucratic procedures designed to separate criminal and intelligence investigations (see July 19, 1995). [Newsweek, 5/27/2002; Newsweek, 3/29/2004; US Department of Justice, 11/2004, pp. 36-37 pdf file] The information about al-Qaeda in these cases is also shared with assistant US attorneys without FISA permission being sought or granted first. Other errors include the FBI director wrongly asserting that the target of a FISA application was not under criminal investigation, omissions of material facts about a prior relationship between the FBI and a target, and an interview of a target by an assistant US attorney. [Foreign Intelligence Surveillance Court, 5/17/2002] This leads the FISA Court to impose new requirements regarding the “wall” (see October 2000). Similar problems will be found in FISA applications for surveillance of Hamas operatives (see March 2001).

Entity Tags: Office of Intelligence Policy and Review, US Department of Justice, Foreign Intelligence Surveillance Court, I-49, Foreign Intelligence Surveillance Act, FBI New York Field Office, Federal Bureau of Investigation, Catcher’s Mitt

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A portion of Mohamed Atta’s US visa obtained in May 2000.
A portion of Mohamed Atta’s US visa obtained in May 2000. [Source: 9/11 Commission]9/11 hijacker Mohamed Atta supposedly arrives in the US for the first time, flying from Prague to Newark on a tourist visa issued May 18 in Berlin. [Miami Herald, 9/22/2001; Australian Broadcasting Corporation, 11/12/2001] Official investigations will late assume that this is the first time Atta was in the US. However, there are reports that he was in the US before this (see September 1999, April 2000, and Late April-Mid-May 2000).

Entity Tags: Mohamed Atta

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

FISA court judge Royce Lamberth was angry with the FBI over misleading statements made in FISA wiretap applications.FISA court judge Royce Lamberth was angry with the FBI over misleading statements made in FISA wiretap applications. [Source: Public domain]While monitoring foreign terrorists in the US, the FBI listens to calls made by suspects as a part of an operation called Catcher’s Mitt, which is curtailed at this time due to misleading statements by FBI agents. It is never revealed who the targets of the FBI’s surveillance are under this operation, but below are some of the terrorism suspects under investigation in the US at the time:
bullet Imran Mandhai, Shuyeb Mossa Jokhan and Adnan El Shukrijumah in Florida. They are plotting a series of attacks there, but Mandhai and Jokhan are brought in for questioning by the FBI and surveillance of them stops in late spring (see November 2000-Spring 2002 and May 2, 2001);
bullet Another Florida cell connected to Blind Sheikh Omar Abdul-Rahman. The FBI has been investigating it since 1993 (see (October 1993-November 2001));
bullet Al-Qaeda operatives in Denver (see March 2000);
bullet A Boston-based al-Qaeda cell involving Nabil al-Marabh and Raed Hijazi. Cell members provide funding to terrorists, fight abroad, and are involved in document forging (see January 2001, Spring 2001, and Early September 2001);
bullet Fourteen of the hijackers’ associates the FBI investigates before 9/11. The FBI is still investigating four of these people while the hijackers associate with them; [US Congress, 7/24/2003, pp. 169 pdf file]
bullet Hamas operatives such as Mohammed Salah in Chicago. Salah invests money in the US and sends it to the occupied territories to fund attacks (see June 9, 1998).
When problems are found with the applications for the wiretap warrants, an investigation is launched (see Summer-October 2000), and new requirements for warrant applications are put in place (see October 2000). From this time well into 2001, the FBI is forced to shut down wiretaps of al-Qaeda-related suspects connected to the 1998 US embassy bombings and Hamas (see March 2001 and April 2001). One source familiar with the case says that about 10 to 20 al-Qaeda related wiretaps have to be shut down and it becomes more difficult to get permission for new FISA wiretaps. Newsweek notes, “The effect [is] to stymie terror surveillance at exactly the moment it was needed most: requests from both Phoenix [with the Ken Williams memo (see July 10, 2001)] and Minneapolis [with Zacarias Moussaoui’s arrest] for wiretaps [will be] turned down [by FBI superiors],” (see August 21, 2001 and August 28, 2001). [Newsweek, 5/27/2002] Robert Wright is an FBI agent who led the Vulgar Betrayal investigation looking into allegations that Saudi businessman Yassin al-Qadi helped finance the embassy bombings, and other matters. In late 2002, he will claim to discover evidence that some of the FBI intelligence agents who stalled and obstructed his investigation were the same FBI agents who misrepresented the FISA petitions. [Judicial Watch, 9/11/2002]

Entity Tags: Royce Lamberth, Shuyeb Mossa Jokhan, Catcher’s Mitt, Robert G. Wright, Jr., Zacarias Moussaoui, Raed Hijazi, Mohammad Salah, Federal Bureau of Investigation, Al-Qaeda, Adnan Shukrijumah, Central Intelligence Agency, Nabil al-Marabh, Ken Williams, Imran Mandhai, Foreign Intelligence Surveillance Act

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

On three occasions, military lawyers force members of Able Danger to cancel scheduled meetings with the FBI at the last minute. Able Danger officials want to share information about the Brooklyn al-Qaeda cell they believe they’ve discovered which includes Mohamed Atta and other hijackers (see January-February 2000). The exact timing of these meetings remains unclear, but they appear to happen around the time military lawyers tell Able Danger they are not allowed to pursue Mohamed Atta and other figures (see September 2000) . [Government Security News, 9/2005] In 2005, it will be reported that Lieutenant Colonel Anthony Shaffer contacted FBI agent Xanthig Magnum in attempts to set up these meetings. Magnum is willing to testify about her communications with Shaffer, but apparently she has not yet been able to do so. [Fox News, 8/28/2005] Shaffer will later elaborate that the meetings were set up around early summer. Col. Worthington, then head of Able Danger, is one of the Special Operations Command (SOCOM) officials scheduled to meet with FBI Counterterrorism agents. Shaffer ater claims the meetings were cancelled because “SOCOM lawyers would not permit the sharing of the US person information regarding terrorists located domestically due to ‘fear of potential blowback’ should the FBI do something with the information and something should go wrong. The lawyers were worried about another ‘Waco’ situation (see April 19, 1993). The critical counterterrorism information is never passed from SOCOM to the FBI before 9-11; this information did include the original data regarding Atta and the terrorist cells in New York and the DC area.” [US Congress, 2/15/2006 pdf file] Representative Curt Weldon (R-PA), who in 2005 helps bring to light the existence of the program, says, “Obviously, if we had taken out that cell, 9/11 would not have occurred and, certainly, taking out those three principal players in that cell would have severely crippled, if not totally stopped, the operation that killed 3,000 people in America.” [Government Security News, 8/2005]

Entity Tags: Xanthig Magnum, Mohamed Atta, Special Operations Command, Curt Weldon, Federal Bureau of Investigation, Able Danger, Anthony Shaffer

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Lieutenant Colonel Anthony Shaffer will later claim that Captain Scott Phillpott, leader of the Able Danger program, briefs General Peter Schoomaker, head of Special Operations Command (SOCOM), that Able Danger has uncovered information of increased al-Qaeda “activity” in Aden harbor, Yemen. Shaffer, plus two other officials familiar with Able Danger later tell the New York Post that this warning was gleaned through a search of bin Laden’s business ties. Shaffer later recalls, “Yemen was elevated by Able Danger to be one of the top three hot spots for al-Qaeda in the entire world.” This warning, plus another possibly connected warning from Defense Intelligence Agency (DIA) analyst Kie Fallis (see May 2000-Late September 2000), go unheeded and no official warning is issued. The USS Cole is attacked by al-Qaeda terrorists in Aden harbor in October 2000 (see October 12, 2000). Shaffer later claims that Phillpott tells the 9/11 Commission about this warning in 2004 to show that Able Danger could have had a significant impact, but the Commission’s findings fail to mention the warning, or in fact anything else about Able Danger (see July 12, 2004). [New York Post, 9/17/2005; Jerry Doyle Show, 9/20/2005] Representative Curt Weldon (R-PA) will similarly tell Fox News: “[T]wo weeks before the attack on the Cole, in fact, two days before the attack on the Cole, [Able Danger] saw an increase of activity that led them to say to the senior leadership in the Pentagon at that time, in the Clinton administration, there’s something going to happen in Yemen and we better be on high alert, but it was discounted. That story has yet to be told to the American people.” [Fox News, 10/8/2005]

Entity Tags: Scott Phillpott, Peter J. Schoomaker, Curt Weldon, Al-Qaeda, Able Danger, Clinton administration, Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The Foreign Intelligence Surveillance (FISA) Court implements new rules requiring any FBI employee who sees FISA-obtained materials or other FISA-derived intelligence to sign a certification acknowledging that the court’s approval is needed before the information is disseminated to criminal investigators. This comes after the FISA Court was informed that approximately 100 FISA applications submitted by the FBI had misrepresented how criminal and intelligence agents were working together in the Catcher’s Mitt program (see Summer 2000-September 11, 2001 and Summer-October 2000). The new rules also require that the CIA and NSA place a caveat on all FISA-derived intelligence sent to the bureau. In an effort to speed up inter-agency reporting, the NSA will reportedly go a step further, placing caveats on all information it sends to the FBI. The caveats warn that the information being sent might be FISA-derived and that an intelligence agent wishing to pass it to a criminal agent must first obtain assurance from the NSA that the intelligence is not FISA-derived. [US Department of Justice, 11/2004, pp. 37-38 pdf file]

Entity Tags: Foreign Intelligence Surveillance Court, National Security Agency, Federal Bureau of Investigation, Catcher’s Mitt, Foreign Intelligence Surveillance Act

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Global Objectives, a British banking compliance company, identifies fifteen of the 9/11 hijackers as high-risk people and establishes profiles for them. The hijackers are regarded as high-risk for loans because they are linked to Osama bin Laden, suspected terrorists, or associates of terrorists. The list of high-risk people maintained by Global Objectives is available to dozens of banks and the hijackers’ files contain their dates and places of birth, aliases, and associates. It is unclear which fifteen hijackers are considered high-risk. It is also unknown if any Western intelligence agencies access this database before 9/11. [Associated Press, 2/21/2002] According to the 9/11 Commission, US intelligence is only aware of three of the 9/11 hijackers, Nawaf Alhazmi, Salem Alhazmi, and Khalid Almihdhar, before the attacks. [9/11 Commission, 7/24/2004, pp. 181-2] However, media reports will suggest US intelligence agencies may have been aware of another six: Ziad Jarrah (see January 30, 2000); Marwan Alshehhi (see March 1999 and January-February 2000); Mohamed Atta (see January-May 2000 and January-February 2000); and Ahmed Alghamdi, Satam al Suqami, and Hamza Alghamdi (see September 2000 and Spring 2001).

Entity Tags: Saeed Alghamdi, Salem Alhazmi, Satam Al Suqami, Waleed Alshehri, Nawaf Alhazmi, Ziad Jarrah, Wail Alshehri, Mohand Alshehri, Ahmed Alnami, Marwan Alshehhi, Ahmed Alghamdi, Abdulaziz Alomari, Fayez Ahmed Banihammad, Hamza Alghamdi, Hani Hanjour, Mohamed Atta, Majed Moqed, Khalid Almihdhar, Ahmed Alhaznawi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). [Truthout (.org), 1/17/2006] In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. [New York Times, 12/16/2007]

Entity Tags: Bush administration (43), National Security Agency

Timeline Tags: Civil Liberties

A secret military intelligence unit called Able Danger, which is tasked with assembling information about al-Qaeda networks around the world, is shut down. Some accounts say the program is shut down in January, some say February, and some say March. [Norristown Times Herald, 6/19/2005; Times Herald (Norristown), 9/12/2005; US Congress, 9/21/2005] The unit has identified Mohamed Atta and three other 9/11 hijackers as members of an al-Qaeda cell operating in the United States (see January-February 2000). According to James D. Smith, a Pentagon contractor involved with the unit, the inspector general shuts down the operation “because of a claim that we were collecting information on US citizens,” and it is illegal for the military to do this. [WTOP Radio 103.5 (Washington), 9/1/2005] Others familiar with the unit later say it is closed down because it might have led to the exposure of another data mining project that was investigating US citizens allegedly illegally transferring sensitive US technology to the Chinese government. [WTOP Radio 103.5 (Washington), 9/1/2005] Lt. Col. Anthony Shaffer blames the change in leadership brought by the new Bush administration. “Once the four star [General Schoomaker] went away, it was pretty much like the world closing around us [Schoomaker retired in November 2000, but returned as Army Chief of Staff in 2003]. There was no political will to continue this at that point in time. Plus, my direct leadership: Colonel [Jerry] York and General [Bob] Harding had moved on as well. Therefore, I had a new chain of command above me. They were very risk adverse. This [Able Danger] operation, as with other operations which were very high risk / high gain, some of which are still ongoing—seemed to not be appreciated by the incoming leadership.” [American Forces Press Service, 6/17/2003; Government Security News, 9/2005] For example, Shaffer will say that Col. Mary Moffitt, who replaces Col. Gerry York around this time (“spring 2001”), “dismantled the Defense [human intelligence] support to Able Danger just months before the 9-11 attacks… [and ] became focused on shutting down our support to Able Danger under the guise of ‘reorganization’ and in the end, disestablished Stratus Ivy [the unit Shaffer headed] and its cutting edge focus.” [US Congress, 2/15/2006 pdf file]

Entity Tags: James D. Smith, Mary Moffitt, Al-Qaeda, Able Danger

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The NSA asks Qwest, a major US telecommunications firm and a cutting-edge provider of high-tech wireless and Internet connectivity, to reveal information about its customers and their phone calls. Qwest’s CEO, Joe Nacchio, refuses after meeting with NSA officials and deciding that the program is illegal without court orders (see February 27, 2001). The NSA refuses to seek court authorization for its wiretaps and electronic surveillance. The NSA will renew its request from Qwest after the 9/11 attacks, and will also ask the firm to help it track suspected terrorists. Other telecommunications firms such as Verizon, AT&T, and BellSouth, will comply with the NSA’s requests (see February 2001 and Beyond).
Fears of a 'Digital Pearl Harbor' - According to a former White House official, the NSA’s primary purpose before 9/11 is to watch for computer hackers and foreign-government agents trying to hack into the government’s computer information systems, particularly those within the Defense Department. Government officials fear a “digital Pearl Harbor” if hackers were ever to seize control of those systems or other key US infrastructures. The former official will say in 2007 that the NSA’s proposal to Qwest is, “Can you build a private version of Echelon and tell us what you see?” Echelon is the NSA’s enormous signals intelligence (SIGINT) network used by the agency and its counterparts in Australia, Canada, New Zealand, and Britain. Qwest is constructing a high-speed network for phone and Internet traffic, and the NSA wants Qwest to keep records of its customers’ transactions for it. The NSA, another source will say, wants to analyze call, e-mail, and other transmissions’ traffic patters for signs of suspicious activity. The White House official will say that telecom firms such as Qwest “have an enormous amount of intelligence-gathering” capability. They don’t have to target individual customers to “look for wacky behavior,” or “groups communicating with each other in strange patterns.” Such information could augment intelligence that the NSA and other agencies were gathering from other sources, and enable the NSA to collect the information it wants without violating laws prohibiting it and other intelligence agencies from directly gathering data on US citizens.
Ill Will from NSA - Nacchio’s refusal to go along with the NSA’s request garners it some ill will among the US intelligence community, the former White House official will say. Nacchio will contend that because of his refusal, the NSA denied Qwest a lucrative government contract. A former high-level intelligence official will add that other telecom companies had little problem agreeing to the NSA’s requests. Nacchio believes that the NSA’s request is illegal under the Telecommunications Act without court orders; the former White House official will acknowledge that it might violate the 1986 Electronic Communications Privacy Act. After 9/11, that law will be amended by the USA Patriot Act to give the government more room to monitor US citizens.
Qwest, Other Telecom Firms Cooperative with Other Agencies - Qwest is apparently less reluctant to share other information with the Pentagon. Qwest began sharing its technology and information as far back as 1997 (see 1997). In May 2001, Commerce Secretary Don Evans will tell the Senate Appropriations Committee that his department helped persuade Qwest to “share proprietory information with the Defense Department to evaluate the vulnerability of its network.” Qwest, which serves the Rocky Mountain and West Coast regions of the country, covers the areas that house some of the military’s most important command-and-control facilities, including the US Strategic Command. In the 1990s, Qwest began actively pursuing contracts with the Defense Department to build more modern, private, secure networks for defense and intelligence agencies. [National Journal, 11/2/2007]
Meetings with Bush Officials - In court documents filed in 2006 to challenge his prosecution for insider trading and, in heavily redacted form, released to the public in 2007, Nacchio will indicate that telecom executives met frequently with Bush administration officials before 9/11, including Deputy Defense Secretary Paul Wolfowitz, National Security Adviser Condoleezza Rice, NSA Director Michael Hayden, and counterterrorism “tsar” Richard Clarke. Many telecom firms are working closely with the government to develop highly classified operations, including joint networks to which the government will have unfettered access. The future director of national intelligence, Mike McConnell, works with telecom firms to expand the cooperation between the telecom industry and the federal government. [Salon, 10/15/2007]

Entity Tags: Condoleezza Rice, US Department of Defense, Bush administration (43), Verizon Communications, AT&T, US Department of Commerce, Senate Appropriations Committee, US Strategic Command, BellSouth, Donald L. Evans, Echelon, Richard A. Clarke, Qwest, Mike McConnell, National Security Agency, Joe Nacchio, Paul Wolfowitz

Timeline Tags: Civil Liberties

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Timeline Tags: Civil Liberties

A surveillance program known as Catcher’s Mitt is curtailed, and ten to twenty al-Qaeda wiretaps, as well as some Hamas wiretaps, are not renewed. This follows the discovery of errors in applications for warrants under the Foreign Intelligence Surveillance Act (FISA) related to both al-Qaeda and Hamas and the introduction of new procedures (see Summer 2000-September 11, 2001, Summer-October 2000, October 2000, and March 2001). [New York Times, 9/19/2001; Newsweek, 5/27/2002; Newsweek, 3/29/2004] In addition, other similar programs such as Able Danger and Monarch Passage are shut down at the same time (see (February-March 2001) and January-March 2001).

Entity Tags: Al-Qaeda, Foreign Intelligence Surveillance Act, Catcher’s Mitt, Hamas

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing.One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing. [Source: Matt Crypto / Public domain]The BBC reports on advances in electronic surveillance. The US’s global surveillance program, Echelon, has become particularly effective in monitoring mobile phones, recording millions of calls simultaneously and checking them against a powerful search engine designed to pick out key words that might represent a security threat. Laser microphones can pick up conversations from up to a kilometer away by monitoring window vibrations. If a bug is attached to a computer keyboard, it is possible to monitor exactly what is being keyed in, because every key on a computer has a unique sound when depressed. [BBC, 4/4/2001] Furthermore, a BBC report on a European Union committee investigation into Echelon one month later notes that the surveillance network can sift through up to 90 percent of all Internet traffic, as well as monitor phone conversations, mobile phone calls, fax transmissions, net browsing history, satellite transmissions and so on. Even encryption may not help much. The BBC suggests that “it is likely that the intelligence agencies can crack open most commercially available encryption software.” [BBC, 5/29/2001]

Entity Tags: Echelon, British Broadcasting Corporation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Future 9/11 hijacker Khalid Almihdhar obtains a second US visa from the US consulate in Jeddah, Saudi Arabia. [9/11 Commission, 8/21/2004, pp. 24-25 pdf file] The visa is issued by Shayna Steinger, a consular official who apparently issues the future 9/11 hijackers with 12 visas (see July 1, 2000). [9/11 Commission, 12/30/2002, pp. 2; Office of the Inspector General (US Department of State), 1/30/2003] Almihdhar’s passport, which was issued two weeks previously (see June 1, 2001), lacks an expiry date, but contains an indicator of possible terrorist affiliation used by the Saudi authorities to track suspected radicals (see November 2, 2007). His application form is incomplete, as it lists his occupation as “businessman,” but does not give his employer’s name and address.
Lies on Application Form - The form, which is submitted through the Visa Express program (see May 2001), meaning Almihdhar is not interviewed, contains two lies: Almihdhar says he has never received an American visa or traveled to the US, whereas he received a visa in 1999 (see April 3-7, 1999) and traveled to the US on it in 2000 (see January 15, 2000). As Almihdhar’s first visa was also issued by the Jeddah consulate, through which the CIA sent radical Arabs to the US for training during the Soviet-Afghan war (see September 1987-March 1989), consular officials could discover he is lying, but information about prior visas issuances is not automatically displayed to them.
Known Terrorist - By this time, several intelligence agencies are aware that Almihdhar is an al-Qaeda operative; for example, the CIA (see 9:30 a.m. - 4:00 p.m. January 5, 2000), NSA (see December 29, 1999), FBI (see January 5-6, 2000), a US Army intelligence program (see January-February 2000), the Saudi General Intelligence Presidency (see 1997), Malaysian Special Branch (see January 5-8, 2000), and an intelligence service in the United Arab Emirates (see January 2-5, 2000)).
Parallels to Case of Blind Sheikh - Almihdhar will re-enter the US on the visa three weeks later (see July 4, 2001). The 9/11 Commission will find that the series of missteps preceding the issuance of visas to Almihdhar and the other future 9/11 hijackers has some “eerie parallels” to the “series of exceptional failures” that led to US visas being issued to the “Blind Sheikh,” Sheikh Omar Abdul-Rahman (see December 15, 1986-1989 and July 1990). [9/11 Commission, 8/21/2004, pp. 24-27, 33, 49 pdf file]

Entity Tags: Khalid Almihdhar, Shayna Steinger, US Consulate, Jeddah, Saudi Arabia Office

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In July 2001, NSA director Michael Hayden tells a reporter that the NSA does not monitor any US citizens without court warrants from the Foreign Intelligence Surveillance Court (FISC). “We don’t do anything willy-nilly,” Hayden says. “We’re a foreign intelligence agency. We try to collect information that is of value to American decision-makers, to protect American values, America—and American lives. To suggest that we’re out there, on our own, renegade, pulling in random communications, is—is simply wrong. So everything we do is for a targeted foreign intelligence purpose. With regard to the—the question of industrial espionage, no. Period. Dot. We don’t do that.” When asked how Americans could verify that, Hayden says that they should simply trust the NSA to police and monitor itself, along with oversight from the White House and from Congress. However, it will later come to light that the NSA began illegally monitoring US citizens from the start of the Bush administration (see Spring 2001). A former NSA official will later dispute Hayden’s account. “What do you expect him to say?” the official says. “He’s got to deny it. I agree. We weren’t targeting specific people, which is what the President’s executive order does. However, we did keep tabs on some Americans we caught if there was an interest [by the White House.] That’s not legal. And I am very upset that I played a part in it.” [Truthout (.org), 1/17/2006] Hayden also denies persistent allegations from European government officials that the agency has engaged in economic espionage to help American companies against European competitors (see April 4, 2001). In March 2001, the American Civil Liberties Union’s Barry Steinhardt says that “since there is no real check on [the NSA], there is no way to know” if they are following the law. Steinhardt says that Congress is the only real check on possible NSA abuses, but it has consistently failed to exercise any sort of aggressive oversight on the agency. [CNN, 3/31/2001]

Entity Tags: National Security Agency, Barry Steinhardt, Michael Hayden, American Civil Liberties Union

Timeline Tags: Civil Liberties

Glyn Ford.Glyn Ford. [Source: British Labour Party]The European Parliament releases its final report on its findings about the secretive US surveillance program known as Echelon. The report, two years in the making, exhaustively details many of Echelon’s surveillance capabilities, and lists many of Echelon’s surveillance stations around the world. One of the more interesting sections of the report concerns its apparent use on behalf of US corporations. According to the report, Echelon—operated by the NSA as a highly classified surveillance program ostensibly for tracking terrorist threats and activities by nations hostile to the West—is also being used for corporate and industrial espionage, with information from the program being turned over to US corporations for their financial advantage. The report gives several instances of Echelon’s use by corporations. One is the use of Echelon to “lift… all the faxes and phone calls” between the European aircraft manufacturer Airbus and Saudi Arabian Airlines; that information was used by two American companies, Boeing and McDonnell Douglas, to outflank Airbus and win a $6 billion contract. The report also alleges that the French company Thomson-CSF lost a $1.3 billion satellite deal to Raytheon the same way. Glyn Ford, the MP who commissioned the report, says he doesn’t have a problem with Echelon itself, but in the way it is being used. “Now, you know, if we’re catching the bad guys, we’re completely in favor of that… What we’re concerned about is that some of the good guys in my constituency don’t have jobs because US corporations got an inside track on—on some global deal.” [Washington Post, 11/14/1999; CBS News, 2/27/2000; BBC, 7/6/2000; European Parliament, 7/11/2001] In 1977, the US government began providing Echelon-based intelligence to US corporations (see 1977). In April 2001, New Zealand journalist Nicky Hager testified about Echelon’s use by US allies for corporate and economic purposes (see April 2001), and former CIA director James Woolsey confirmed that US surveillance programs were used to benefit US corporations (see March 2000).

Entity Tags: US Department of Commerce, Thomson-CSF, Saudi Arabian Airlines, Glyn Ford, McDonnell Douglas, Central Intelligence Agency, Boeing Company, Echelon, Airbus, European Parliament, National Security Agency

Timeline Tags: Civil Liberties

An Echelon station in Menwith Hill, Britain.An Echelon station in Menwith Hill, Britain. [Source: BBC]By the 1980s, a high-tech global electronic surveillance network shared between the US, Britain, Canada, Australia, and New Zealand is gathering intelligence all over the world. The BBC describes Echelon’s power as “astounding,” and elaborates: “Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. They are looking for evidence of international crime, like terrorism.” [BBC, 11/3/1999] One major focus for Echelon before 9/11 is al-Qaeda. For instance, one account mentions Echelon intercepting al-Qaeda communications in Southeast Asia in 1996 (see Before September 11, 2001). A staff member of the National Security Council who regularly attends briefings on bin Laden states, “We are probably tapped into every hotel room in Pakistan. We can listen in to just about every phone call in Afghanistan.” However, he and other critics will claim one reason why US intelligence failed to stop terrorism before 9/11 was because there was too much of a focus on electronic intelligence gathering and not enough focus on human interpretation of that vast data collection. [Toronto Star, 2/2/2002]

Entity Tags: United Kingdom, United States, Osama bin Laden, Echelon, National Security Council, Canada, Australia, Al-Qaeda, New Zealand

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Abdulaziz Alomari (a passport stamp overlaps part of his face).Abdulaziz Alomari (a passport stamp overlaps part of his face). [Source: FBI]Having spent the previous night at the Comfort Inn in Portland, Maine (see September 10, 2001), hijackers Mohamed Atta and Abdulaziz Alomari check out at 5:33 a.m. and drive their rented Nissan to the nearby Portland International Jetport Airport, entering its parking lot at 5:40 a.m. The FBI will later seize their car there. [Observer, 9/16/2001; Portland Press Herald, 10/5/2001; Federal Bureau of Investigation, 10/5/2001; Newsday, 4/17/2006] Their flight is due to take off for Boston at 6:00 a.m. (see (6:00 a.m.) September 11, 2001). The Boston Globe points out, “Any significant delay would foil [Atta’s] big plans for the day.” [Boston Globe, 9/16/2001] The 9/11 Commission later concludes: “The Portland detour almost prevented Atta and Omari from making Flight 11 out of Boston.” [9/11 Commission, 6/16/2004]

Entity Tags: Abdulaziz Alomari, Portland International Jetport, Mohamed Atta

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Michael Tuohey.Michael Tuohey. [Source: CNN]9/11 hijackers Mohamed Atta and Abdulaziz Alomari check in at the US Airways counter at Portland International Jetport. [Portland Press Herald, 10/5/2001; Federal Bureau of Investigation, 10/5/2001] They are wearing ties and jackets. Atta checks in two bags, Alomari none. Atta is randomly selected for additional security scrutiny by the FAA’s Computer Assisted Passenger Prescreening System (CAPPS) (see (6:20 a.m.-7:48 a.m.) September 11, 2001). However, the only consequence is that his checked bags will be held off the plane until it is confirmed that he has boarded. [9/11 Commission, 7/24/2004, pp. 1; 9/11 Commission, 8/26/2004, pp. 2; CNN, 3/3/2006] Noting that their flight is soon due to leave, the ticket agent who checks them in, Michael Tuohey, says, “You’re cutting it close.” [Portland Press Herald, 3/6/2005] Tuohey thinks the pair seems unusual. He notices they both have $2,500 first-class, one-way tickets. He later comments, “You don’t see many of those.” Atta looks “like a walking corpse. He looked so angry.” In contrast, Tuohey will say, Alomari can barely speak English and has “a goofy smile, I can’t believe he knew he was going to die that day.” Tuohey will later recount, “I thought they looked like two Arab terrorists but then I berated myself for the stereotype and did nothing.” [Philadelphia Daily News, 2/24/2005; Mirror, 9/11/2005; CNN, 3/3/2006] Atta becomes angry when Tuohey informs him he will have to check in again in Boston. He complains that he was assured he would have a “one-step check-in.” [9/11 Commission, 8/26/2004, pp. 2; Associated Press, 3/7/2005] Tuohey will be recalled to work later in the day to speak to an FBI agent about his encounter with Atta and Alomari. He is shown video footage of them passing through the airport’s security checkpoint upstairs (see (Between 5:45 a.m. and 5:53 a.m.) September 11, 2001). Although recognizing the two men, he notices that in the video they are no longer wearing the jackets and ties they’d had on when checking in just minutes before. He assumes they must have taken these off and tucked them into their carry-on baggage. He is also informed that the security camera behind his own desk, which should have captured the two hijackers, has in fact been out of order for some time. [Portland Press Herald, 3/6/2005; CNN, 3/3/2006]

Entity Tags: Federal Aviation Administration, Computer Assisted Passenger Prescreening System, Mohamed Atta, Portland International Jetport, Abdulaziz Alomari, Michael Tuohey

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

All the alleged 9/11 hijackers reportedly check in at the airports from where they board Flights 11, 175, 77, and 93. [9/11 Commission, 7/24/2004, pp. 1-4; 9/11 Commission, 8/26/2004, pp. 27, 89, 93] Since 1998, the FAA has required air carriers to implement a program called the Computer Assisted Passenger Prescreening System (CAPPS). This identifies those passengers who might be a security risk, based upon suspicious behavior such as buying one-way tickets or paying with cash. CAPPS also randomly assigns some passengers to receive additional security scrutiny. If a particular passenger has been designated as a “selectee,” this information is transmitted to the airport’s check-in counter, where a code is printed on their boarding pass. At the airport’s security checkpoints, selectees are subjected to additional security measures. [US News and World Report, 4/1/2002; 9/11 Commission, 1/27/2004; US Congress, 3/17/2004; 9/11 Commission, 8/26/2004, pp. 2, 85] Their baggage is to be screened for explosives or held off the plane until they have boarded. Supposedly, the thinking behind this is that someone smuggling a bomb onto a plane won’t get onto that same flight. According to the 9/11 Commission, nine of the 19 hijackers are flagged by the CAPPS system before boarding Flights 11, 175, 77, and 93. [Washington Post, 1/28/2004; 9/11 Commission, 7/24/2004, pp. 84; United States of America v. Zacarias Moussaoui, a/k/a Shaqil, a/k/a Abu Khalid al Sahrawi, Defendant, 3/6/2006] In addition, Mohamed Atta was selected when he checked in at the airport in Portland, for his earlier connecting flight to Boston (see 5:33 a.m.-5:40 a.m. September 11, 2001). All of the hijackers subsequently pass through security checkpoints before boarding their flights. [9/11 Commission, 7/24/2004, pp. 1-4]

Entity Tags: Federal Aviation Administration, Computer Assisted Passenger Prescreening System

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

During this period, all five Flight 11 hijackers check in at Boston’s Logan Airport and board their plane, bound for Los Angeles. The FAA has a program in place called the Computer Assisted Passenger Prescreening System (CAPPS), which is designed to identify those passengers most likely requiring additional scrutiny by airport security (see (6:20 a.m.-7:48 a.m.) September 11, 2001). Ticket records will show that CAPPS selects three of the Flight 11 hijackers at Logan: Since Waleed Alshehri checks no bags his selection has no consequences; Wail Alshehri and Satam Al Suqami have their bags scanned for explosives, but are not stopped. All five hijackers would need to pass through a security checkpoint to reach the departure gate for their flight. Each would have been screened as they walked through a metal detector calibrated to detect items with at least the metal content of a small-caliber handgun. If they’d set this off, they would have been screened with a handheld metal detector. An X-ray machine would have screened their carry-on luggage. However, Logan Airport has no video surveillance of its security checkpoints (see 1991-2000), so there is no documentary evidence of exactly when they pass through them, or if alarms are triggered. According to the 9/11 Commission, none of the checkpoint supervisors later recall seeing any of the Flights 11 hijackers, or report anything suspicious having occurred. [9/11 Commission, 1/27/2004; 9/11 Commission, 7/24/2004, pp. 1-2; 9/11 Commission, 8/26/2004, pp. 5-6] However, a WorldNetDaily article will claim that some Logan staff members recall seeing Mohamed Atta (see (6:50 a.m.-7:40 a.m.) September 11, 2001). [WorldNetDaily, 9/21/2001] The Boston Globe will later comment, “aviation specialists have said it is unlikely that more rigorous attention to existing rules would have thwarted the 10 hijackers who boarded two jets at Logan on Sept. 11. At the time, the knives and box-cutters they were carrying were permitted.” [Boston Globe, 10/17/2001]

Entity Tags: Satam Al Suqami, Computer Assisted Passenger Prescreening System, Wail Alshehri, Federal Aviation Administration, Logan International Airport, Waleed Alshehri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

According to the 9/11 Commission, between 7:03 a.m. and 7:39 a.m. the four alleged Flight 93 hijackers check in at the United Airlines ticket counter at Newark (New Jersey) Liberty International Airport. Only Ahmad Alhaznawi is selected for additional scrutiny by airport security under the FAA’s CAPPS program (see (6:20 a.m.-7:48 a.m.) September 11, 2001). The only consequence is that his checked bag is screened for explosives, and not loaded onto the plane until it is confirmed that he has boarded. [9/11 Commission, 1/27/2004; 9/11 Commission, 7/24/2004, pp. 4; 9/11 Commission, 8/26/2004, pp. 35] On their way to boarding the plane, all four would pass through a security checkpoint, which has three walk-through metal detectors, two X-ray machines, and explosive trace detection equipment. [9/11 Commission, 8/26/2004, pp. 97] The 9/11 Commission later claims Newark Airport has no video cameras monitoring its security checkpoints, so there is no documentary evidence showing when the hijackers passed through the checkpoint or what alarms may have been triggered. [9/11 Commission, 7/24/2004, pp. 4; 9/11 Commission, 8/26/2004, pp. 35] However, Michael Taylor, the president of a security company, who has done consulting work for the New York Port Authority (which operates the airport), claims that Newark does use security cameras at the time of 9/11. [Boston Herald, 9/29/2001] All of the screeners on duty at the checkpoint are subsequently interviewed, and none report anything unusual or suspicious having occurred. [9/11 Commission, 7/24/2004, pp. 4; 9/11 Commission, 8/26/2004, pp. 35] The 9/11 Commission later concludes that the passports of Ahmad Alhaznawi and fellow Flight 93 hijacker Ahmed Alnami have suspicious indicators and could have been linked to al-Qaeda, but it does not elaborate on this. [Baltimore Sun, 1/27/2004]

Entity Tags: Ahmed Alnami, Al-Qaeda, Newark International Airport, Federal Aviation Administration, Ahmed Alhaznawi, United Airlines, Computer Assisted Passenger Prescreening System

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Hijackers in a Dulles Airport, Washington, security checkpoint, from left to right: Nawaf Alhazmi gets searched, Khalid Almihdhar, and Hani Hanjour.Hijackers in a Dulles Airport, Washington, security checkpoint, from left to right: Nawaf Alhazmi gets searched, Khalid Almihdhar, and Hani Hanjour. [Source: FBI] (click image to enlarge)Around 7:15 a.m., Flight 77 hijackers Majed Moqed and Khalid Almihdhar check in at the American Airlines ticket counter at Washington’s Dulles International Airport. [9/11 Commission, 7/24/2004, pp. 2-3; 9/11 Commission, 8/26/2004, pp. 27] The FAA has a computer system in place, called CAPPS, which identifies those passengers most likely requiring additional scrutiny by airport security (see (6:20 a.m.-7:48 a.m.) September 11, 2001). CAPPS selects both men, but the only consequence is that Moqed’s luggage is not loaded onto Flight 77 until after his boarding is confirmed. [9/11 Commission, 1/27/2004; 9/11 Commission, 8/26/2004, pp. 27-28] Dulles Airport has surveillance cameras monitoring its security checkpoints, and video later viewed by the 9/11 Commission shows the two passing through the Main Terminal’s west security screening checkpoint at 7:18 a.m. When they go through, their carry-on bags fail to set off any alarms, but both men set off the alarm when they pass through the first metal detector. They are directed to a second metal detector, where Almihdhar passes, but Moqed fails again. He is subjected to a personal screening with a metal detection hand wand. This time he is cleared and permitted to pass through the checkpoint. [9/11 Commission, 1/27/2004; 9/11 Commission, 7/24/2004, pp. 3] The other three Flight 77 hijackers pass through the security checkpoint about 20 minutes later (see (7:25 a.m.-7:36 a.m.) September 11, 2001). The 9/11 Commission later concludes that Almihdhar’s passport was “suspicious” and could have been linked to al-Qaeda, but it does not explain why or how. [Baltimore Sun, 1/27/2004]

Entity Tags: Federal Aviation Administration, Computer Assisted Passenger Prescreening System, Al-Qaeda, Khalid Almihdhar, American Airlines, Majed Moqed

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Hijacker brothers Salem (white shirt) and Nawaf Alhazmi (dark shirt) pass through security in Dulles Airport in Washington.Hijacker brothers Salem (white shirt) and Nawaf Alhazmi (dark shirt) pass through security in Dulles Airport in Washington. [Source: FBI] (click image to enlarge)Flight 77 hijacker Hani Hanjour checks in at the American Airlines ticket counter at Washington’s Dulles International Airport some time between 7:25 a.m. and 7:35 a.m., the 9/11 Commission will later estimate. (American Airlines will be unable to locate information confirming his check-in time.) [9/11 Commission, 8/26/2004, pp. 93]
Hanjour Almost Stopped? - Hanjour is selected for additional scrutiny by airport security under the FAA’s CAPPS program (see (6:20 a.m.-7:48 a.m.) September 11, 2001), but this has no consequences. [9/11 Commission, 1/27/2004; 9/11 Commission, 7/24/2004, pp. 3; 9/11 Commission, 8/26/2004, pp. 27-28] In 2003, former CIA official Vincent Cannistraro will claim: “This person goes through the metal detection machine and it starts buzzing.… They call the person out so that they can do a hand search. Just as the person was beginning to do that, a pretty woman walks by and the guard looks at her and waves the guy on. Well, that person happened to be Hani Hanjour, and he basically had box cutters and razor blades in his pockets.” [Fouda and Fielding, 2003, pp. 143] It is unclear how Cannistraro may have known this, and presumably he is speculating as to what Hanjour has in his pockets.
Alhazmi Brothers Seem Suspicious - The final two Flight 77 hijackers, brothers Nawaf and Salem Alhazmi, check in at approximately 7:29 a.m. The customer service representative makes both of them CAPPS selectees, because one of them cannot provide photo identification and seems unable to understand English, and he finds both of them suspicious. However, the only consequence is that Salem Alhazmi’s luggage is not loaded onto the plane until it is confirmed that he has boarded. Surveillance cameras monitor the security checkpoints at Dulles Airport. According to the 9/11 Commission’s review of security footage, Hanjour passes through the main terminal’s west security screening checkpoint at 7:35 a.m. He proceeds through the metal detector without setting off the alarm, and his two carry-on bags set off no alarms when placed on the X-ray belt. The Alhazmis arrive at the same checkpoint a minute later. Salem Alhazmi successfully clears the metal detector and is permitted through the checkpoint. Nawaf Alhazmi sets off the alarms for both the first and second metal detectors, and is subsequently subjected to a personal screening with a metal detection hand wand before being passed. His shoulder bag is swiped by an explosive trace detector and returned without further inspection. [9/11 Commission, 1/27/2004; 9/11 Commission, 7/24/2004, pp. 3; 9/11 Commission, 8/26/2004, pp. 27-28] Immediately after the attacks, when the FAA’s local civil aviation security office investigates the security screening at Dulles on 9/11, it will find the airport’s screeners recall nothing out of the ordinary, and cannot recall any of the passengers they screened having been CAPPS selectees. [9/11 Commission, 7/24/2004, pp. 3; 9/11 Commission, 8/26/2004, pp. 93] The 9/11 Commission will later conclude that the Alhazmi brothers’ passports are “suspicious” and could have been linked to al-Qaeda, but it will not explain why or how. [Baltimore Sun, 1/27/2004]

Entity Tags: Vincent Cannistraro, Hani Hanjour, Federal Aviation Administration, Computer Assisted Passenger Prescreening System, Al-Qaeda, Nawaf Alhazmi, Washington Dulles International Airport, American Airlines, Salem Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

When a housekeeper at the Park Inn in Boston, where 9/11 hijackers Wail and Waleed Alshehri stayed before the attacks, attempts to clean their room, a “male of foreign descent” tells her she should not clean it yet and should return in the early afternoon, as someone is still asleep there. The hijackers are thought to have left the hotel and checked in for their flights several hours previously (see (6:20 a.m.-7:48 a.m.) September 11, 2001). The male’s identity is unknown and the housekeeper’s story appears to confuse the FBI, as an entry about it in an FBI timeline drafted after the attacks ends with five question marks. [Federal Bureau of Investigation, 10/2001, pp. 292 pdf file]

Entity Tags: Wail Alshehri, Waleed Alshehri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

An illustration of the NIMD dataflow.An illustration of the NIMD dataflow. [Source: LibertyThink.com] (click image to enlarge)Shortly after the 9/11 attacks, the NSA awards $64 million in research contracts for a program called Novel Intelligence from Massive Data (NIMD). [New York Times, 5/21/2003; National Journal, 1/20/2006] NIMD is one of several cutting-edge data mining technologies that not only has the capability of finding keywords among millions of electronically monitored communications, but can find hidden relationships among data points, and even critique the thinking and biases of a particular analyst and suggest alternative hypotheses differing from the human analysts’ conclusion. Like other data-mining technologies, the NSA will steadfastly refuse to discuss whether NIMD is used to analyze data from domestic surveillance operations. NIMD is designed as an preliminary sort program, to keep human analysts from becoming overwhelmed by raw data. In essence, NIMD is an early-warning system. “NIMD funds research to…help analysts deal with information-overload, detect early indicators of strategic surprise, and avoid analytic errors,” according to the “Call for 2005 Challenge Workshop Proposals” released by the Advanced Research and Development Activity (ARDA). ARDA was founded in 1998 to create, design, and field new technologies for US intelligence agencies, particularly the NSA. A selected few Congressional lawmakers (see January 18, 2006) were informed that the warrantless surveillance program authorized by President George W. Bush (see Early 2002) was designed to be an early-warning system for possible terrorist attacks or plans. Assistant Attorney General William Moschella will inform the top Democrats and Republicans on the House and Senate Intelligence committees in December 2002 that the “president determined that it was necessary following September 11 to create an early-warning detection system” to prevent more attacks. He will justify the use of programs such as NIMD by claiming, as NSA director Michael Hayden and other administration officials have repeatedly claimed, that the Foreign Intelligence Surveillance Act (FISA), which allows the government to obtain warrants to conduct domestic eavesdropping or wiretapping, “could not have provided the speed and agility required for the early-warning detection system.” Many experts outside of the Bush administration feel that NIMD and other programs do not have to operate outside of the Foreign Intelligence Surveillance Act (FISA) because of limitations in the law, but because of the fact that the programs cannot meet the law’s minimum requirements for surveillance. FISA requires that any such surveillance must have a probable cause that the target is a terrorist. NIMD has no such threshold. Steven Aftergood, an expert on intelligence and government secrecy with the Federation of American Scientists, will say in 2006, “Logistically speaking, the early-warning approach may involve a significant increase in the number of surveillance actions. It may be that neither the Justice Department nor the [Foreign Intelligence Surveillance Court, which approves wiretapping warrants] is prepared to prepare and process several thousand additional FISA applications per year, beyond the 1,700 or so approved in 2004.” [National Journal, 1/20/2006] Some experts will later express the opinion that NIMD is the controversial Total Information Awareness program in a slightly different form (see February 2003 and September 2002).

Entity Tags: Senate Intelligence Committee, US Department of Justice, Total Information Awareness, William E. Moschella, Tom Armour, Novel Intelligence from Massive Data, Steven Aftergood, Michael Hayden, National Security Agency, Advanced Capabilities for Intelligence Analysis, Advanced Research and Development Activity, John Poindexter, Foreign Intelligence Surveillance Act, George W. Bush, Federation of American Scientists (FAS), House Intelligence Committee

Timeline Tags: Civil Liberties

NSA director Michael Hayden addresses the NSA in a global videoconference, saying that the NSA, like other government agencies, will have to do more to protect the country from further terrorist attacks. The challenge, he says, is to balance Americans’ security with civil liberties, “to keep America free by making Americans feel safe again.” Hayden will say in a 2006 speech reflecting on that videoconference (see January 23, 2006) that US citizens operate under misconceptions about the NSA’s capabilities—that while citizens believe the NSA has a global electronic surveillance network that can, and does, spy on citizens willy-nilly, in reality the NSA is understaffed and unprepared to handle the technological advances of the last decade. Hayden will say that with more extensive domestic surveillance of US citizens and foreign visitors, the NSA could have caught some of the 9/11 hijackers before they were able to put their plan into motion. The standards by which US citizens and foreign visitors are monitored must change, Hayden believes.
Expansion of NSA Surveillance Powers - Using Ronald Reagan’s 1981 executive order 12333 (see December 4, 1981), Hayden expands the NSA’s domestic surveillance practices to eavesdrop, sometimes without court approval, on selected international calls made by US citizens. Though Hayden’s expansion of NSA surveillance is not directly authorized by President Bush, and is not the same program as authorized by Bush’s secret executive order of 2002 (see Early 2002), Hayden will later say that this expansion is based on the intelligence community’s assessment “of a serious and continuing threat to the homeland.” Hayden’s program is reviewed and approved by lawyers at the NSA, the Justice Department, and the White House, as well as Attorney General John Ashcroft. [Michael Hayden, 1/23/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, US Department of Justice, National Security Agency, John Ashcroft, George W. Bush, Bush administration (43), Ronald Reagan, Michael Hayden

Timeline Tags: Civil Liberties

The US Congress adopts a joint resolution, the Authorization for Use of Military Force (AUMF), that determines that “the president is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons.” Congress also states that the “grave acts of violence” committed on the US “continue to pose an unusual and extraordinary threat to [its] national security and foreign policy.” [US Congress, 9/14/2001] President Bush signs the resolution into law on September 18. [White House, 9/18/2001] The passage of the AUMF served another purpose: to extend presidential power. While the Defense Department and the Joint Chiefs of Staff intended the AUMF to define the conflict in narrow terms, and authorize the US to move militarily against al-Qaeda and its confederates, and the Taliban, Vice President Dick Cheney and his chief of staff, David Addington, had a larger goal. Attorney Scott Horton, who has written two major studies on interrogation of terrorism suspects for the New York City Bar Association, says in 2005 that Cheney and Addington “really wanted [the AUMF defined more broadly], because it provided the trigger for this radical redefinition of presidential power.” Addington helped draft a Justice Department opinion in late 2001, written by lawyer John Yoo (see Late September 2001), that asserted Congress cannot “place any limits on the president’s determinations as to any terrorist threat, the amount of military force to be used in response, or the method, timing, and nature of the response.” [US News and World Report, 5/21/2006]

Entity Tags: US Department of Defense, Taliban, Scott Horton, Joint Chiefs of Staff, Richard (“Dick”) Cheney, David S. Addington, George W. Bush, John C. Yoo, Al-Qaeda, Authorization to Use Military Force (AUMF)

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

A self-styled White House “war council” begins meeting shortly after the 9/11 attacks, to discuss the administration’s response to the attacks and the methods it will use (see (After 10:00 a.m.) September 11, 2001). The ad hoc group is composed of White House counsel Alberto Gonzales, Justice Department lawyer John Yoo, Pentagon chief counsel William J. Haynes, and the chief aide to Vice President Dick Cheney, David Addington. According to Jack Goldsmith, who will become head of the Justice Department’s Office of Legal Counsel (OLC) in 2003 (see October 6, 2003), the four believe that the administration’s biggest obstacle to responding properly to the 9/11 attacks is the body of domestic and international law that arose in the 1970s to constrain the president’s powers after the criminal excesses of Richard Nixon’s White House. Chief among these restraints is the Foreign Intelligence Surveillance Act (FISA) of 1978 (see 1978). Though Addington tends to dominate the meetings with his imposing physical presence and aggressive personality, Yoo is particularly useful to the group; the head of the OLC, Jay Bybee (whom Goldsmith will replace) has little experience with national security issues, and delegates much of the responsibility for that subject to Yoo, even giving him the authority to draft opinions that are binding on the entire executive branch. Yoo agrees wholeheartedly with Addington, Gonzales, and Cheney about the need for vastly broadened presidential powers. According to Goldsmith, Yoo is seen as a “godsend” for the White House because he is eager to draft legal opinions that would protect Bush and his senior officials from any possible war crimes charges. However, Yoo’s direct access to Gonzales angers Attorney General John Ashcroft, who feels that the “war council” is usurping legal and policy decision-making powers that are legally his own. [New York Times Magazine, 9/9/2007] In 2009, Goldsmith will say, “[I]it was almost as if they [Cheney and Addington] were interested in expanding executive power for its own sake.” [Vanity Fair, 2/2009]

Entity Tags: Richard (“Dick”) Cheney, William J. Haynes, Richard M. Nixon, Office of Legal Counsel (DOJ), Jay S. Bybee, Jack Goldsmith, John C. Yoo, Bush administration (43), Foreign Intelligence Surveillance Act, Alberto R. Gonzales, David S. Addington

Timeline Tags: Civil Liberties


Tom Ridge.
Tom Ridge. [Source: US State Department]President Bush announces the new cabinet-level Office of Homeland Security, to be led by Pennsylvania Governor Tom Ridge. [Associated Press, 8/19/2002] Accepting the post, Ridge says, “Liberty is the most precious gift we offer our citizens.” Responding to this comment, the Village Voice opines, “Could Tom Ridge have said anything scarier or more telling as he accepted the post of homeland security czar? Trying to strike the bell of liberty, he sounds its death knell, depicting government not as the agent of the people’s will, but as an imperious power with the authority to give us our democratic freedoms. Which means, of course, that it can also take them away.” [Village Voice, 9/11/2002] In November 2002, Ridge will become secretary of a new Homeland Security Department (see November 25, 2002).

Entity Tags: US Department of Homeland Security, Tom Ridge, George W. Bush

Timeline Tags: Complete 911 Timeline, Civil Liberties

John Yoo, a deputy assistant attorney general in the Department of Justice (DOJ) Office of Legal Counsel (OLC), issues a legal opinion that says the US can conduct electronic surveillance against its citizens without probable cause or warrants. According to the memo, the opinion was drafted in response to questions about whether it would be constitutional to amend the Foreign Intelligence Surveillance Act (FISA) to state that searches may be approved when foreign intelligence collection is “a purpose” of the search, rather than “the purpose.” Yoo finds this would be constitutional, but goes further. He asserts that FISA is potentially in conflict with the Constitution, stating, “FISA itself is not required by the Constitution, nor is it necessarily the case that its current standards match exactly to Fourth Amendment standards.” Citing Vernonia School Dist. 47J v. Acton, in which the Supreme Court found that warrantless searches of students were permissible, Yoo argues that “reasonableness” and “special needs” are also the standards according to which warrantless monitoring of the private communications of US persons is permissible. According to Yoo, the Fourth Amendment requirement for probable cause and warrants prior to conducting a search pertain primarily to criminal investigations, and in any case cannot be construed to restrict presidential responsibility and authority concerning national security. Yoo further argues that in the context of the post-9/11 world, with the threat posed by terrorism and the military nature of the fight against terrorism, warrantless monitoring of communications is reasonable. Some information indicates the NSA began a broad program involving domestic surveillance prior to the 9/11 attacks, which contradicts the claim that the program began after, and in response to, the attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [US Department of Justice, 9/25/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Inspectors General, 7/10/2009]
Yoo Memo Used to Support Legality of Warrantless Surveillance - Yoo’s memo will be cited to justify the legality of the warrantless domestic surveillance program authorized by President Bush in October 2001 (see October 4, 2001). NSA Director General Michael Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general.” The various post-9/11 NSA surveillance activities authorized by Bush will come to be referred to as the President’s Surveillance Program (PSP), and the first memo directly supporting the program’s legality will be issued by Yoo on November 2, 2001, after the program has been initiated (see November 2, 2001). Many constitutional authorities will reject Yoo’s legal rationale. [Michael Hayden, 1/23/2006]
Yoo Memo Kept Secret from Bush Officials Who Might Object - According to a report by Barton Gellman and Jo Becker in the Washington Post, the memo’s “authors kept it secret from officials who were likely to object,” including ranking White House national security counsel John Bellinger, who reports to National Security Adviser Condoleezza Rice. Bellinger’s deputy, Bryan Cunningham, will tell the Post that Bellinger would have recommended having the program vetted by the Foreign Intelligence Surveillance Court, which oversees surveillance under FISA. Gellman and Becker quote a “senior government lawyer” as saying that Vice President Dick Cheney’s attorney, David Addington, had “open contempt” for Bellinger, and write that “more than once he accused Bellinger, to his face, of selling out presidential authority for good ‘public relations’ or bureaucratic consensus.” [Washington Post, 6/24/2007]

Entity Tags: US Department of Justice, John Bellinger, National Security Agency, Bryan Cunningham, Condoleezza Rice, David S. Addington, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Office of Legal Counsel (DOJ), John C. Yoo, George W. Bush, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

According to author Ronald Kessler’s November 2007 book The Terrorist Watch, the NSA’s domestic surveillance program begins around two weeks after the 9/11 attacks, when President Bush meets with NSA director Michael Hayden and other NSA officials in the Oval Office. According to chief of staff Andrew Card, in attendance, Bush asks, “What tools do we need to fight the war on terror?” Hayden suggests revamping NSA guidelines to allow the agency to wiretap domestic phone calls and intercept e-mails to and from terror suspects if one end of the communication is overseas. Kessler gives the following rather lurid example: “Thus, if [Osama] bin Laden were calling the US to order the detonation of a nuclear device, and the person he called began making overseas calls, NSA could listen in to those calls as well as to bin Laden’s original call.” Kessler is a chief correspondent for the extremist conservative Web site NewsMax; his assertion is disputed by evidence suggesting that the domestic surveillance program began well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Kessler, 2007, pp. 130]

Entity Tags: National Security Agency, Andrew Card, Michael Hayden, Ronald Kessler, George W. Bush

Timeline Tags: Civil Liberties

Former AT&T employee Mark Klein.Former AT&T employee Mark Klein. [Source: PBS]The National Security Agency, as part of its huge, covert, and possibly illegal wiretapping program directed at US citizens (see Spring 2001 and After September 11, 2001), begins collecting telephone records of tens of millions of Americans, using data provided by telecommunications firms such as AT&T, Verizon, and BellSouth (see February 5, 2006). The media will not report on this database until May 2006 (see May 11, 2006). The program collects information on US citizens not suspected of any crime or any terrorist connections. Although informed sources say the NSA is not listening to or recording actual conversations, the agency is using the data to analyze calling patterns in an effort to detect terrorist activity. “It’s the largest database ever assembled in the world,” says one anonymous source. The NSA intends “to create a database of every call ever made.” As a result, the NSA has detailed records of the phone activities of tens of millions of US citizens, from local calls to family and friends to international calls. The three telecommunications companies are working with the NSA in part under the Communications Assistance Act for Law Enforcement (CALEA) (see January 1, 1995 and June 13, 2006) and in part under contract to the agency.
Surveillance Much More Extensive Than Acknowledged - The wiretapping program, which features electronic surveillance of US citizens without court warrants or judicial oversight, is far more extensive than anything the White House or the NSA has ever publicly acknowledged. President Bush will repeatedly insist that the NSA focuses exclusively on monitoring international calls where one of the call participants is a known terrorist suspect or has a connection to terrorist groups (see December 17, 2005 and May 11, 2006), and he and other officials always insist that domestic calls are not monitored. This will be proven false. The NSA has become expert at “data mining,” sifting through reams of information in search of patterns. The warrantless wiretapping database is one source of information for the NSA’s data mining. As long as the NSA does not collect “personal identifiers”—names, Social Security numbers, street addresses, and the like—such data mining is legal. But the actual efficacy of the wiretapping program in learning about terrorists and possibly preventing terrorist attacks is unclear at best. And many wonder if the NSA is not repeating its activities from the 1950s and 1960s, when it conducted “Operation Shamrock” (see 1945-1975), a 20-year program of warrantless wiretaps of international phone calls at the behest of the CIA and other intelligence agencies. Operation Shamrock, among other things, led to the 1978 passage of the Foreign Intelligence Surveillance Act (see 1978). [USA Today, 5/11/2006] In May 2006, former NSA director Bobby Ray Inman will say, “[T]his activity is not authorized” (see May 12, 2006). [Democracy Now!, 5/12/2006]
Secret Data Mining Center - In May 2006, retired AT&T technician Mark Klein, a 22-year veteran of the firm, will file a court affidavit saying that he saw the firm construct a secret data-mining center in its San Francisco switching center that would let the NSA monitor domestic and international communications (see January 2003). And former AT&T workers say that, as early as 2002, AT&T has maintained a secret area in its Bridgeton, Missouri, facility that is likely being used for NSA surveillance (see Late 2002-Early 2003).
Domestic Surveillance Possibly Began Before 9/11 - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, Verizon Communications, Mark Klein, George W. Bush, AT&T, BellSouth, Central Intelligence Agency, Communications Assistance for Law Enforcement Act (CALEA), Foreign Intelligence Surveillance Act, Qwest, National Security Agency

Timeline Tags: Civil Liberties

President Bush issues a directive authorizing the National Security Agency (NSA) to operate a warrantless domestic surveillance program. Author/journalist Jane Mayer will report in 2011, “[O]n October 4, 2001, Bush authorized the policy, and it became operational by October 6th,” and, “[t]he new policy, which lawyers in the Justice Department justified by citing President Bush’s executive authority as commander in chief, contravened a century of constitutional case law.” Mayer will interview NSA whistleblower Thomas Drake for her article and quote him as saying that, following the October 4 directive, “strange things were happening. Equipment was being moved. People were coming to me and saying, ‘We’re now targeting our own country!’” Bush’s directive is based on a legal opinion drafted by Department of Justice Office of Legal Counsel Deputy Attorney General John Yoo (see September 25, 2001). [New Yorker, 5/23/2011]
Conflicting Information regarding Date of First Authorization - The existence of the NSA’s domestic surveillance program will first be made public in December 2005, following reporting by the New York Times that will cite “[n]early a dozen current and former officials” (see December 15, 2005). The Times article will state that in 2002, “[m]onths after the Sept. 11 attacks,” Bush signed an executive order authorizing the NSA to monitor domestic phone calls, including those of US citizens and permanent residents, if one end of the call was outside the country. The Times article also mentions an NSA “‘special collection program’ [that] began soon after the Sept. 11 attacks, as it looked for new tools to attack terrorism.” The difference between the October 4, 2001 directive and the 2002 executive order referred to by the Times is unclear. [New York Times, 12/16/2005]
Other Sources for October Directive - Other sources, including Bush, NSA Director General Michael Hayden, and the inspectors general of five separate agencies, will later refer to a presidential order having been given in “October,” or “weeks” after the 9/11 attacks, and say that, subsequent to this order, international calls of US persons are targeted for content-monitoring. Following the publication of the Times article, Bush will say in a December 17, 2005 radio address: “In the weeks following the terrorist attacks on our nation, I authorized the National Security Agency, consistent with US law and the Constitution, to intercept the international communications of people with known links to al-Qaeda and related terrorist organizations. Before we intercept these communications, the government must have information that establishes a clear link to these terrorist networks” (see December 17, 2005). This presidential authorization was based on a legal opinion drafted by Department of Justice Office of Legal Counsel attorney John Yoo (see October 18, 2001). [WhiteHouse(.gov), 12/17/2005] Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001,” which is when he “gathered key members of the NSA workforce… [and] introduced [the NSA’s] new operational authority to them.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general,” and that “the three most senior and experienced lawyers in NSA… supported the lawfulness of this program.” [Michael Hayden, 1/23/2006] In a July 10, 2009 jointly-issued report, the inspectors general of the Department of Defense, Department of Justice, CIA, NSA, and Office of the Director of National Intelligence will refer to the “President’s Surveillance Program” (PSP) and “the program’s inception in October 2001.” The report will say: “One of the activities authorized as part of the PSP was the interception of the content of communications into and out of the United States where there was a reasonable basis to conclude that one party to the communication was a member of al-Qaeda or related terrorist organizations.… The attorney general subsequently publicly acknowledged the fact that other intelligence activities were also authorized under the same presidential authorization, but the details of those activities remain classified.” [Inspectors General, 7/10/2009] Citing “a senior administration official,” the Washington Post will report on January 4, 2006: “The secret NSA program… was authorized in October 2001.… The president and senior aides have publicly discussed various aspects of the program, but neither the White House, the NSA, nor the office of the director of national intelligence would say what day the president authorized it.” [Washington Post, 1/4/2006]

Entity Tags: US Department of Justice, Thomas Drake, US Department of Defense, Office of Legal Counsel (DOJ), Office of the Director of National Intelligence, Michael Hayden, National Security Agency, George W. Bush, Central Intelligence Agency, John C. Yoo, Jane Mayer

Timeline Tags: Civil Liberties

Dr. Eileen Preisser testifies before a congressional briefing. Dr. Preisser was one of four analysts in the US Army’s Land Information Warfare Activity (LIWA) supporting Able Danger in late 1999 and 2000 (see Fall 1999). While her testimony remains classified, the next day, Representative Christopher Shays (R-CT) gives a brief summary: “In a briefing we had yesterday, we had Eileen [Preisser], who argues that we don’t have the data we need because we don’t take all the public data that is available and mix it with the security data. And just taking public data, using, you know, computer systems that are high-speed and able to digest, you know, literally floors’ worth of material, she can take relationships that are seven times removed, seven units removed, and when she does that, she ends up with relationships to the bin Laden group where she sees the purchase of chemicals, the sending of students to universities. You wouldn’t see it if you isolated it there, but if that unit is connected to that unit, which is connected to that unit, which is connected to that unit, you then see the relationship. So we don’t know ultimately the authenticity of how she does it, but when she does it, she comes up with the kind of answer that you have just asked, which is a little unsettling.” [US Congress. House. Committee on Government Reform. Subcommittee on National Security, Veterans Affairs and International Relations, 10/12/2001] Note that according to some media accounts, the CIA monitored Mohamed Atta purchasing large quantities of chemicals in Germany in the spring of 2000 (see January-May 2000). Atta also sends a series of e-mails to the US in the spring of 2000, inquiring about flight school opportunities for himself and a “small group” of his associates (see January-March 2000). Dr. Preisser is apparently willing to testify about her role in how Able Danger uncovered Atta’s name, but in September 2005 she is prohibited from publicly testifying before Congress (see September 21, 2005).

Entity Tags: Al-Qaeda, Christopher Shays, Eileen Preisser

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

NSA Director Michael Hayden responds to an October 11 letter from Representative Nancy Pelosi (see October 11, 2001), expressing concerns about the NSA’s post-9/11 surveillance expansion (see After September 11, 2001) that Hayden outlined for the House Intelligence Committee on October 1 (see October 1, 2001), and asking whether the president authorized it. The substance of Hayden’s October 18 reply will be redacted, except for this statement: “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” [Nancy Pelosi, 1/6/2006] A January 4, 2006 report in the Washington Post will cite “intelligence official close to Hayden” as saying that “[Hayden’s] appearance on Oct. 1, 2001, before the House committee had been to discuss Executive Order 12333, and not the new NSA program,” and that “Pelosi’s concerns had been answered in writing and again several weeks later during a private briefing.” [Washington Post, 1/4/2006] In a January 23, 2006 public briefing, Hayden will say, “September 2001, I asked to update the Congress on what NSA had been doing, and I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities,” and, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” [Michael Hayden, 1/23/2006]
Nature of Hayden's EO 12333 Surveillance Program - The full scope of Hayden’s surveillance program is unclear, but some sources indicate it includes the wholesale collection and data-mining of phone records provided by telecom companies and placement of pen registers (call trackers) on domestic phone numbers (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, October 2001), and October 31, 2001). Some sources indicate the NSA began large-scale domestic surveillance activities prior to the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi, National Security Agency

Timeline Tags: Civil Liberties

John Yoo, a deputy assistant attorney general in the Justice Department’s Office of Legal Counsel, and OLC special counsel Robert Delahunty issue a joint memo to White House counsel Alberto Gonzales. The memo claims that President Bush has sweeping extraconstitutional powers to order military strikes inside the US if he says the strikes are against suspected terrorist targets. In the days following the 9/11 attacks, Gonzales asked if Bush could legally order the military to combat potential terrorist activity within the US. The memo is first revealed to exist seven years later (see April 2, 2008) after future OLC head Steven Bradbury acknowledges its existence to the American Civil Liberties Union; it will be released two months after the Bush administration leaves the White House (see March 2, 2009). [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009]
Granting Extraordinary, Extraconstitutional Authority to Order Military Actions inside US - Yoo and Delahunty’s memo goes far past the stationing of troops to keep watch at airports and around sensitive locations. Instead, the memo says that Bush can order the military to conduct “raids on terrorist cells” inside the US, and even to seize property. “The law has recognized that force (including deadly force) may be legitimately used in self-defense,” they write. In 2009, Reuters will write, “The US military could have kicked in doors to raid a suspected terrorist cell in the United States without a warrant” under the findings of the OLC memo. “We do not think that a military commander carrying out a raid on a terrorist cell would be required to demonstrate probable cause or to obtain a warrant,” Yoo and Delahunty write. [US Department of Justice, 10/23/2001 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009] The memo reasons that since 9/11, US soil can be legally construed as being a battlefield, and Congress has no power to restrict the president’s authority to confront enemy tactics on a battlefield. [Savage, 2007, pp. 131]
No Constitutional or Other Legal Protections - “[H]owever well suited the warrant and probable cause requirements may be as applied to criminal investigations or to other law enforcement activities, they are unsuited to the demands of wartime and the military necessity to successfully prosecute a war against an enemy. [Rather,] the Fourth Amendment does not apply to domestic military operations designed to deter and prevent foreign terrorist attacks.” Any objections based on the Fourth Amendment’s ban on unreasonable search and seizures would be invalid since whatever possible infringement on privacy would be trumped by the need to protect the nation from injury by deadly force. The president is “free from the constraints of the Fourth Amendment.” The Posse Comitatus Act, which bars the military from operating inside the US for law enforcement purposes, is also moot, the memo says, because the troops would be acting in a national security function, not as law enforcement. [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009; Ars Technica, 3/2/2009] There are virtually no restrictions on the president’s ability to use the military because, Yoo and Delahunty write, the nation is in a “state of armed conflict.” The scale of violence, they argue, is unprecedented and “legal and constitutional rules” governing law enforcement, even Constitutional restrictions, no longer apply. The US military can be used for “targeting and destroying” hijacked airplanes, they write, or “attacking civilian targets, such as apartment buildings, offices, or ships where suspected terrorists were thought to be.” The memo says, “Military action might encompass making arrests, seizing documents or other property, searching persons or places or keeping them under surveillance, intercepting electronic or wireless communications, setting up roadblocks, interviewing witnesses, or searching for suspects.” [Newsweek, 3/2/2009] Yoo writes that the Justice Department’s criminal division “concurs in our conclusion” that federal criminal laws do not apply to the military during wartime. The criminal division is headed by Michael Chertoff, who will become head of the Department of Homeland Security. [Washington Post, 4/4/2008]
Sweeping Away Constitutional Rights - Civil litigator Glenn Greenwald will later note that the memo gives legal authorization for President Bush to deploy the US military within US borders, to turn it against foreign nationals and US citizens alike, and to render the Constitution’s limits on power irrelevant and non-functional. Greenwald will write, “It was nothing less than an explicit decree that, when it comes to presidential power, the Bill of Rights was suspended, even on US soil and as applied to US citizens.”
Justifying Military Surveillance - Greenwald will note that the memo also justifies the administration’s program of military surveillance against US citizens: “[I]t wasn’t only a decree that existed in theory; this secret proclamation that the Fourth Amendment was inapplicable to what the document calls ‘domestic military operations’ was, among other things, the basis on which Bush ordered the NSA, an arm of the US military, to turn inwards and begin spying—in secret and with no oversight—on the electronic communications (telephone calls and emails) of US citizens on US soil” (see December 15, 2005 and Spring 2004). “If this isn’t the unadorned face of warped authoritarian extremism,” Greenwald will ask, “what is?” [Salon, 3/3/2009] If the president decides to use the military’s spy agency to collect “battlefield intelligence” on US soil, no law enacted by Congress can regulate how he goes about collecting that information, including requiring him to get judicial warrants under the Foreign Intelligence Surveillance Act (FISA). In 2007, Yoo will say in an interview: “I think there’s a law greater than FISA, which is the Constitution, and part of the Constitution is the president’s commander in chief power. Congress can’t take away the president’s powers in running war.” [Savage, 2007, pp. 131; PBS Frontline, 5/15/2007] Cheney and Addington will push the NSA to monitor all calls and e-mails, including those beginning and ending on US soil, but the NSA will balk. Domestic eavesdropping without warrants “could be done and should be done,” Cheney and Addington argue, but the NSA’s lawyers are fearful of the legal repercussions that might follow once their illegal eavesdropping is exposed, with or without the Justice Department’s authorization. The NSA and the White House eventually reach a compromise where the agency will monitor communications going in and out of the US, but will continue to seek warrants for purely domestic communications (see Spring 2001, After September 11, 2001, and October 2001). [Savage, 2007, pp. 131]
Military Use Considered - In 2009, a former Bush administration lawyer will tell a reporter that the memo “gave rise to the Justice Department discussing with the Defense Department whether the military could be used to arrest people and detain people inside the United States. That was considered but rejected on at least one occasion.” The lawyer will not give any indication of when this will happen, or to whom. Under the proposal, the suspects would be held by the military as “enemy combatants.” The proposal will be opposed by the Justice Department’s criminal division and other government lawyers and will ultimately be rejected; instead, the suspects will be arrested under criminal statutes. [Los Angeles Times, 3/3/2009]

Entity Tags: Steven Bradbury, US Department of Homeland Security, US Department of Defense, Robert J. Delahunty, Office of Legal Counsel (DOJ), Bush administration (43), Michael Chertoff, Alberto R. Gonzales, National Security Agency, American Civil Liberties Union, Glenn Greenwald, George W. Bush, US Department of Justice, John C. Yoo

Timeline Tags: Civil Liberties

Vice President Dick Cheney summons the chairmen and ranking members of the Senate and House Intelligence Committees to the White House for a classified briefing on the secret NSA warrantless wiretapping program (see Early 2002). Cheney makes it clear to the lawmakers that he is merely informing them about the program, and not seeking their approval. [Washington Post, 12/18/2005] Officials later say that under any of the previous presidents, such a meeting of this import would involve the president. But the four lawmakers are hustled away from the Oval Office. Instead, “[w]e met in the vice president’s office,” Bob Graham (D-FL), the chairman of the Senate Intelligence Committee, later recalls. President Bush has already told Graham that “the vice president should be your point of contact in the White House.” Cheney, according to the president, “has the portfolio for intelligence activities.” [Washington Post, 6/24/2007] The leaders are briefed by Cheney, CIA Director George Tenet, and NSA Director Michael Hayden. The Congressional leaders will later mostly refuse to comment publicly about what they do and do not learn about the program, even after it is revealed to the public (see December 15, 2005). In 2003, when Senator John D. Rockefeller ascends to the Democratic leadership of the Senate committee, and is himself briefed on the program, he will write to Cheney expressing his concerns over it (see July 17, 2003). [New York Times, 12/15/2005]
'No Discussion about Expanding' NSA Wiretapping - In December 2005, after the program is revealed to the public, one of the Congressmen present at the briefings, Graham, the then-chairman of the Senate Intelligence Committee, will discuss his knowledge of the program. In contradiction to the characterizations of Bush and other White House officials, Graham will say that he recalls “no discussion about expanding [NSA eavesdropping] to include conversations of US citizens or conversations that originated or ended in the United States,” and knew nothing of Bush’s intention to ignore the Foreign Intelligence Surveillance Court (also known as the FISA court). “I came out of the room with the full sense that we were dealing with a change in technology but not policy,” Graham will recall, using new methodologies to intercept overseas calls that passed through US switches. He thought that NSA eavesdropping would continue to be limited to “calls that initiated outside the United States, had a destination outside the United States but that transferred through a US-based communications system.” Instead, Graham will say, it now seems that Bush decided to go “beyond foreign communications to using this as a pretext for listening to US citizens’ communications. There was no discussion of anything like that in the meeting with Cheney.” A senior intelligence official, who refuses to reveal his identity but says he is speaking with the permission of the White House, will accuse Graham of “misremembering the briefings,” which he will call “very, very comprehensive.” The official will refuse to discuss the briefings in any but the most general terms, but will say they were intended “to make sure the Hill knows this program in its entirety, in order to never, ever be faced with the circumstance that someone says, ‘I was briefed on this but I had no idea that—’ and you can fill in the rest.” Graham will characterize the official’s description as saying: “[W]e held a briefing to say that nothing is different.… Why would we have a meeting in the vice president’s office to talk about a change and then tell the members of Congress there is no change?” House Minority Leader Nancy Pelosi (D-CA), who was also present at the meeting as the ranking Democrat on the House Intelligence Committee, will say the briefing described “President Bush’s decision to provide authority to the National Security Agency to conduct unspecified activities.” She will note that she “expressed my strong concerns” but did not go into detail. [Washington Post, 12/18/2005]
Lawmakers Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). In the briefing, Cheney informs the lawmakers of none of this.

Entity Tags: Richard (“Dick”) Cheney, Senate Intelligence Committee, Nancy Pelosi, John D. Rockefeller, House Intelligence Committee, Daniel Robert (“Bob”) Graham, George J. Tenet, George W. Bush, Michael Hayden, National Security Agency

Timeline Tags: Civil Liberties

Concerned that NSA post-9/11 surveillance operations violated the US Constitution, a senior NSA official reports on the program to House Intelligence Committee staff (see Before October 31, 2001), then retires. William Binney, a crypto-mathematician, had served in the NSA for 36 years. In 1997 he was made technical director of the World Geopolitical and Military Analysis Reporting Group, a 6000-employee unit that focused on signals intelligence (SIGINT) reporting and analysis. In the last part of his NSA career, Binney focused on dealing with the NSA’s problem of information overload, co-founding the Signals Intelligence Automation Research Center (SARC) and leading a 20-member team to develop a data-mining and analysis program called ThinThread. This program made it possible to “correlate data from financial transactions, travel records, Web searches, GPS equipment, and any other ‘attributes’ that an analyst might find useful,” and “could chart relationships among people in real time.” Unlike the NSA’s existing centralized data processing systems, ThinThread was able to identify useful or useless data as it was collected, reducing the overload problem. However, though it targeted foreign communications, ThinThread also intercepted those of Americans, and “continued documenting signals when a trail crossed into the US.” Binney incorporated measures to protect privacy, but NSA lawyers still considered the program too invasive, according to a 2011 article by Jane Mayer based on interviews with Binney and another NSA whistleblower, Thomas Drake. In 1999, NSA Director General Michael Hayden decided to fund a rival program, Trailblazer, which would be developed by defense contractors (see Late 1999). Trailblazer will be abandoned in 2006 as unworkable, after costing $1.2 billion (see January 2006). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012] In 2002, three NSA whistleblowers—Edward Loomis, J. Kirk Wiebe, and Binney—will ask the Pentagon to investigate the NSA for wasting “millions and millions of dollars” on Trailblazer. [Nation, 3/26/2013]
Post-9/11 NSA Surveillance Expansion - Binney will tell Mayer that, after the 9/11 attacks, his people began coming to him, saying things like: “They’re getting billing records on US citizens! They’re putting pen registers [call logs] on everyone in the country!” James Bamford will interview Binney in 2012 and write, “At the outset the program recorded 320 million calls a day, [Binney] says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” Binney has not been personally “read in” to this domestic surveillance program, but some members of his SARC team have, as their knowledge of ThinThread code was needed to set it up. Binney became convinced elements of ThinThread were being used, but without privacy protections, meaning US persons could be targeted. Soon after learning these things, Binney takes his concerns to the House Intelligence Committee (see Before October 31, 2001), and retires on October 31. He will tell Mayer, “I couldn’t be an accessory to subverting the Constitution.” Other sources support Binney’s account of this NSA data-mining and monitoring program (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, and October 2001). However, the claim that NSA domestic surveillance was initiated only after, and in response to, 9/11 is contradicted by information indicating that domestic monitoring programs and activities were established and conducted prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012]
ThinThread 'Would Likely Have Prevented 9/11' - Despite ThinThread’s capacity to collect actionable intelligence, Hayden vetoed the idea of deploying the system three weeks before 9/11, in August 2001. According to the Loomis, Wiebe, and Binney, this decision “left the NSA without a system to analyze the trillions of bits of foreign SIGINT flowing over the Internet at warp speed, as ThinThread could do.” During the summer of 2001, when “the system was blinking red,” according to CIA Director George Tenet, the NSA “failed to detect critical phone and e-mail communications that could have tipped US intelligence to al-Qaeda’s plans to attack.” [Nation, 3/26/2013]

Entity Tags: Edward Loomis, World Geopolitical and Military Analysis Reporting Group, J. Kirk Wiebe, William Binney, Thomas Drake, House Intelligence Committee, James Bamford, Trailblazer, Jane Mayer, National Security Agency, Signals Intelligence Automation Research Center, Michael Hayden, Thinthread

Timeline Tags: Civil Liberties

John Yoo, the Justice Department’s (DOJ) Office of Legal Counsel (OLC) deputy assistant attorney general, sends a classified memo to Attorney General John Ashcroft justifying warrantless surveillance of US persons. The National Security Agency (NSA)‘s domestic surveillance authorized by President Bush (see October 4, 2001, Early 2002, and December 15, 2005) will come to be publicly referred to as the President’s Surveillance Program (PSP). This is not the first Yoo memo supporting warrantless surveillance (see September 25, 2001), but a 2009 report on the PSP jointly issued by the inspectors general (IGs) of the Department of Defense (DOD), DOJ, CIA, National Security Agency (NSA), and Office of the Director of National Intelligence (ODNI) will refer to it as “[t]he first OLC opinion directly supporting the legality of the PSP.” The IGs’ report will quote from and comment on the memo, noting that “deficiencies in Yoo’s memorandum identified by his successors in the Office of Legal Counsel and the Office of the Deputy Attorney General later became critical to DOJ’s decision to reassess the legality of the program in 2003.” According to the IGs’ report, Yoo asserts that warrantless surveillance is constitutional as long as it is “reasonable” under the Fourth Amendment, which only protects against “unreasonable searches and siezures.” On this point, the IGs’ report will note that Yoo’s successors were troubled by his failure to discuss the Supreme Court’s decision in Youngstown Sheet & Tube Co. v. Sawyer (1952), which found the president’s wartime authority to be limited. His memo does acknowledge that the Foreign Intelligence Surveillance Act (FISA) “purports to be the exclusive statutory means for conducting electronic surveillance for foreign intelligence,” but asserts that it is only a “safe harbor for electronic surveillance” because it cannot “restrict the president’s ability to engage in warrantless searches that protect the national security.” Yoo also writes that Congress has not “made a clear statement in FISA that it sought to restrict presidential authority to conduct warrantless searches in the national security area.” The IGs’ report will state that Yoo’s successors considered this problematic because Yoo has omitted discussion of the fact that FISA explicitly authorizes the president to conduct warrantless surveillance during the first 15 days following a declaration of war by Congress, which they considered an expression of Congress’s intent to restrict warrantless surveillance to a limited period of time and specific circumstances. The IGs’ report will also state that Yoo’s memo discusses “the legal rationale for Other Intelligence Activities authorized as part of the PSP,” and that Yoo concludes, “[W]e do not believe that Congress may restrict the president’s inherent constitutional powers, which allow him to gather intelligence necessary to defend the nation from direct attack.” The IGs’ report will say that “Yoo’s discussion of some of the Other Intelligence Activities did not accurately describe the scope of these activities,” and that Yoo’s successors considered his discussion of these other activities to be “insufficient and presenting a serious impediment to recertification of the program as to form and legality.” [Inspectors General, 7/10/2009, pp. pp. 11-13]
Memo's Existence Revealed by ACLU Lawsuit - On December 15, 2005, the New York Times will report that Bush authorized an NSA warrantless domestic surveillance program after the 9/11 attacks (see December 15, 2005). The American Civil Liberties Union (ACLU) will request records pertaining to the program under the Freedom of Information Act (FOIA) and then sue the Justice Department for the release of records. The existence of Yoo’s November 2 memo will first be revealed in an October 19, 2007 deposition filed by then head of the OLC Steven Bradbury in response to the ACLU lawsuit, which says that it “[concerns] the legality of certain communications intelligence activities.” After the 2009 release of the IGs’ report the ACLU will notify the court and the government will agree to reprocess four OLC memos, including Yoo’s November 2 memo. This memo and a May 6, 2004 memo by Yoo’s OLC successor Jack Goldsmith that disputes many of Yoo’s conclusions will be released in heavily redacted form on March 18, 2011. [ACLU.org, 2/7/2006; United States District Court of DC, 10/19/2007; American Civil Liberties Union, 3/19/2011]
Constitutional Experts Dispute Yoo's Legal Rationale - Numerous authorities on the law will question or reject the legal bases for warrantless domestic surveillance. In 2003, Yoo will leave the OLC. Goldsmith will begin a review of the PSP, after which he will conclude it is probably illegal in some respects and protest, within the executive branch, its continuation (see Late 2003-Early 2004 and December 2003-June 2004). Following the public disclosure of its existence, a January 5, 2006 report by the Congressional Research Service will find it to be of dubious legality (see January 5, 2006). On January 19, 2006, the DOJ will issue a 42-page white paper laying out the legal bases for the program (see January 19, 2006). These bases will be reviewed and rejected by 14 constitutional scholars and former government officials in a joint letter to Congress on February 2, 2006. [al [PDF], 2/2/2006 pdf file] The American Bar Association will adopt a resolution on February 13, 2006 that rejects DOJ’s arguments and calls on Congress to investigate the program. [Delegates, 2/13/2006 pdf file] On August 17, 2006, in the case ACLU v. NSA, US district judge Anna Diggs Taylor will reject the government’s invocation of the “state secrets privilege” and its argument that plaintiffs’ lack standing due to their being unable to prove they were surveilled, and will rule that warrantless surveillance is in violation of “the separation of powers doctrine, the Administrative Procedures Act, the First and Fourth Amendments to the United States Constitution, the FISA, and Title III” (see August 17, 2006). Taylor’s ruling will be overturned on appeal, on the grounds that the plaintiffs lack standing as they cannot prove that surveillance has occurred. In another case, Al Haramain v. Barack Obama, the government will make the same arguments, but US district judge Vaughn Walker will reject these and conclude in 2010 that illegal surveillance occurred (see March 31, 2010). [Al-Haramain v. Obama, 3/31/2010]

Entity Tags: Steven Bradbury, Vaughn Walker, Ronald Dworkin, George W. Bush, John C. Yoo, American Bar Association, Office of Legal Counsel (DOJ), American Civil Liberties Union, John Ashcroft, Anna Diggs Taylor, US Department of Justice

Timeline Tags: Civil Liberties

The National Security Agency begins sending data—consisting of telephone numbers, e-mail addresses, and names—to the FBI that was obtained through surveillance of international communications originating within the US (see After September 11, 2001 and October 2001). The NSA sends so much data, in fact, that hundreds of agents are needed to investigate the thousands of tips per month that the data is generating. However, virtually all of this information leads to dead ends and/or innocent people. FBI officials repeatedly complain that the unfiltered information is bogging down the bureau: according to over a dozen current and former law enforcement and counterterrorism officials, the flood of tips provide them and their colleagues with very few real leads against terrorism suspect. Instead, the NSA data diverts agents from more productive work. Some FBI officials view the NSA data as pointless and likely illegal intrusions on citizens’ privacy. Initially, FBI director Robert Mueller asks senior administration officials “whether the program had a proper legal foundation,” but eventually defers to Justice Department legal opinions. One former FBI agent will later recall, “We’d chase a number, find it’s a schoolteacher with no indication they’ve ever been involved in international terrorism—case closed. After you get a thousand numbers and not one is turning up anything, you get some frustration.” A former senior prosecutor will add, “It affected the FBI in the sense that they had to devote so many resources to tracking every single one of these leads, and, in my experience, they were all dry leads. A trained investigator never would have devoted the resources to take those leads to the next level, but after 9/11, you had to.” Former NSA director Bobby Ray Inman says that the problem between the FBI and the NSA may stem in part from their very different approaches. Signals intelligence, the technical term for the NSA’s communications intercepts, rarely produces “the complete information you’re going to get from a document or a witness” in a traditional FBI investigation, he says. And many FBI officials are uncomfortable with the NSA’s domestic operations, since by law the NSA is precluded from operating inside US borders except under very specific circumstances. [New York Times, 1/17/2006]

Entity Tags: Federal Bureau of Investigation, National Security Agency, Bobby Ray Inman, Robert S. Mueller III

Timeline Tags: Complete 911 Timeline, Civil Liberties

Sometime in early 2002, President Bush signs a secret executive order authorizing the National Security Agency (NSA) to wiretap phone conversations and read e-mails to and from US citizens. The order extends an operation set into motion at least as early as October 2001 to begin wiretapping US citizens’ phones in a response to the 9/11 attacks. When the program is revealed by the US media in late 2005 (see December 15, 2005), Bush and his officials will say the program is completely legal, though it ignores the requirements of the Foreign Intelligence Surveillance Act (FISA) that requires the government to obtain court-issued warrants to mount surveillance against US citizens. They will insist that only those suspected of having ties to al-Qaeda are monitored, and only when those individuals make or receive international communications. [New York Times, 12/15/2005; Washington Post, 12/22/2005; Newsweek, 12/22/2008] Bush’s order authorizes the NSA to monitor international telephone conversations and international e-mails of hundreds, and perhaps thousands, of US citizens without court warrants, in an effort to track what officials call “dirty numbers” linked to al-Qaeda. When the program is finally revealed by the New York Times over three years later (see December 15, 2005), officials will say that the NSA still seeks warrants to monitor domestic communications. But there is little evidence of this (see, for example, Spring 2001). The presidential order is a radical shift in US surveillance and intelligence-gathering policies, and a major realignment for the NSA, which is mandated to only conduct surveillance abroad. Some officials believe that the NSA’s domestic eavesdropping crosses constitutional limits on legal searches. “This is really a sea change,” a former senior official who specializes in national security law will say in December 2005. “It’s almost a mainstay of this country that the NSA only does foreign searches.” [New York Times, 12/15/2005] Some sources indicate that NSA domestic surveillance activities, such as data-mining, the use of information concerning US persons intercepted in foreign call monitoring, and possibly direct surveillance of US persons, took place prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: George W. Bush, Al-Qaeda, Foreign Intelligence Surveillance Court, National Security Agency

Timeline Tags: Civil Liberties

The Justice Department’s Patrick Philbin sends a classified memo to Attorney General John Ashcroft. The memo’s contents will not be divulged, but the American Civil Liberties Union (ACLU) will later learn that it regards Ashcroft’s review of the Terrorist Surveillance Program (TSP—see March 2002). [American Civil Liberties Union [PDF], 1/28/2009 pdf file] The memo contains a legal review by Ashcroft of President Bush’s order authorizing the TSP, the Bush administration’s name for its warrantless wiretapping program. The review is requested before one of the 45-day reauthorizations by the president as required by law. [ProPublica, 4/16/2009]

Entity Tags: US Department of Justice, Patrick F. Philbin, Terrorist Surveillance Program, American Civil Liberties Union, John Ashcroft

Timeline Tags: Civil Liberties

Vice Admiral John Poindexter testifying before Congress in the Iran Contra hearings in 1987.Vice Admiral John Poindexter testifying before Congress in the Iran Contra hearings in 1987. [Source: Associated Press]Vice Admiral John Poindexter begins running a shadowy new government agency called the Information Awareness Office. [New York Times, 2/13/2002; Federal Computer Week, 10/17/2002] Poindexter, formerly President Reagan’s National Security Adviser, is known for his five felony convictions of lying to Congress, destroying documents, and obstructing Congress in its investigation of his role in the mid-1980s Iran-Contra affair. Later his convictions were overturned on a technicality. [Los Angeles Times, 11/17/2002] Far from apologizing, Poindexter said it was his duty to lie to Congress. [Newsday, 12/1/2002] The New York Times notes that his new agency “is developing technologies to give federal officials instant access to vast new surveillance and information-analysis systems.” The new office is part of DARPA, the Defense Advanced Research Projects Agency. Poindexter was also known for his controversial role in shifting control of computer security to the military in the 1980s. Says Marc Rotenberg, former counsel for the Senate Judiciary Committee, “It took three administrations and both political parties over a decade to correct those mistakes.” [New York Times, 2/13/2002] Surprisingly, Poindexter’s appointment is little noticed until later in 2002 when the Total Information Awareness program is revealed (see March 2002; November 9, 2002). Incidentally, several others involved in the Iran-Contra affair also find jobs in the Bush Administration, including Elliott Abrams, John Negroponte, and Otto Reich. [Observer, 12/8/2002]

Entity Tags: Total Information Awareness, Defense Advanced Research Projects Agency, John Poindexter

Timeline Tags: Civil Liberties, Iran-Contra Affair


This partial image from a Total Information Awareness slide presentation shows types of data that will be collected. Note that
even “gait” - the way one walks, will be analyzed.
This partial image from a Total Information Awareness slide presentation shows types of data that will be collected. Note that even “gait” - the way one walks, will be analyzed. [Source: DARPA]The US military internally announces the creation of a new global data collection system called Total Information Awareness. The existence of this program is not reported until August 2002 [Wired News, 8/7/2002] , and not widely known until November 2002 (see November 9, 2002). Interestingly, the early accounts of this program suggest its budget is a “significant amount” of $96 million [Federal Computer Week, 10/17/2002] , and not the $10 million later reported. [Guardian, 11/23/2002] It is also reported that “parts” of the program “are already operational” whereas later it is said to be only in the conceptual stages of development. [Federal Computer Week, 10/17/2002]

Entity Tags: Total Information Awareness, US Department of Defense

Timeline Tags: Civil Liberties

Larry Thompson.
Larry Thompson. [Source: White House]Serious tensions develop between the FBI and Operation Greenquest investigators in the wake of the Greenquest raid on the SAAR network in March 2002 (see After March 20, 2002). The Customs Department launched Greenquest, an investigation into the financing of al-Qaeda and similar groups, weeks after 9/11. In June 2002, the Washington Post will headline an article, “Infighting Slows Hunt for Hidden al-Qaeda Assets.” [Washington Post, 6/18/2002]
FBI Wants Control of Greenquest - With the creation of the new Department of Homeland Security (see November 25, 2002), the FBI and its parent agency the Justice Department are given a chance to gain total control over Operation Greenquest. Newsweek reports, “Internally, FBI officials have derided Greenquest agents as a bunch of ‘cowboys’ whose actions have undermined more important, long-range FBI investigations into terrorist financing.” Meanwhile: “The FBI-Justice move, pushed by [Justice Department] Criminal Division chief Michael Chertoff and Deputy Attorney General Larry Thompson, has enraged Homeland Security officials.… They accuse the [FBI] of sabotaging Greenquest investigations—by failing to turn over critical information to their agents—and trying to obscure a decade-long record of lethargy in which FBI offices failed to aggressively pursue terror-finance cases. ‘They [the FBI] won’t share anything with us,’ [says] a Homeland Security official. ‘Then they go to the White House and they accuse us of not sharing. If they can’t take it over, they want to kill it.’”
Derails Greenquest's Investigation into Firm with Terrorist Ties - This battle has a large effect on the investigation into Ptech, a Boston-based computer company with ties to suspected terrorist financiers. When Ptech whistleblowers approach the FBI, the FBI “apparently [does] little or nothing in response” (see Shortly After October 12, 2001 and May-December 5, 2002). Then Greenquest launches an investigation in Ptech, which culminates in a raid on the Ptech offices in December 2002 (see December 5, 2002). “After getting wind of the Greenquest probe, the FBI stepped in and unsuccessfully tried to take control of the case. The result, sources say, has been something of a train wreck.” [Newsweek, 4/9/2003]
Greenquest Based on Single FBI Agent's Investigations - Greenquest appears to have been heavily based on the pre-9/11 investigations of FBI agent Robert Wright. The New York Post will report in 2004: “After 9/11, Wright’s work was picked up by David Kane of the US Customs Service, who raided companies owned by [Yassin] al-Qadi, leading to al-Qadi’s designation as a ‘global terrorist’ and to money-laundering indictments of companies in Northern Virginia linked to al-Qadi and Soliman Biheiri (another Wright investigatee). The [Greenquest] indictments rely heavily on Wright’s work.” [New York Post, 7/14/2004]
FBI Will Win Battle for Greenquest - The FBI will eventually win the battle with Homeland Security and Customs, and Greenquest will cease to exist at the end of June 2003 (see May 13-June 30, 2003). [Newsweek, 4/9/2003]

Entity Tags: Operation Greenquest, Larry D. Thompson, Federal Bureau of Investigation, Michael Chertoff, Ptech Inc.

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

When al-Qaeda logistics manager Abu Zubaida is arrested in late March 2002 (see March 28, 2002), his computer is searched. According to the Washington Post: “When agents found Zubaida’s laptop computer, a senior law enforcement source said, they discovered that the vast majority of people he had been communicating with were being monitored under FISA warrants or international spying efforts. ‘Finally, we got some comfort’ that surveillance efforts were working, said a government official familiar with Zubaida’s arrest.” The fact some of his contacts are monitored under FISA warrants indicates that they are in the US, as FISA warrants are only used for US targets (see 1978). The monitoring of Abu Zubaida’s communications began in the mid-1990s, at the latest (see (Mid-1996) and October 1998 and After), and continued after 9/11 (see October 8, 2001). [Washington Post, 2/9/2006] Some will later suggest that Zubaida may have had mental problems (see Shortly After March 28, 2002), but this apparently did not stop him from being a key al-Qaeda contact point. FBI agent Dan Coleman, an expert on al-Qaeda, will later say that the FBI “all knew he was crazy, and they knew he was always on the damn phone.” [Washington Post, 12/18/2007] Vincent Cannistraro, former head of the CIA’s Counter Terrorism Center, says of Zubaida shortly after Zubaida’s capture, “He was the guy that had the direct contact with prominent al-Qaeda cell leaders abroad, and he knew where they all were. He would have been the guy co-ordinating new attacks.” [Observer, 4/7/2002]

Entity Tags: Dan Coleman, Vincent Cannistraro, Abu Zubaida

Timeline Tags: Complete 911 Timeline

Veteran AT&T technician Mark Klein (see July 7, 2009) is startled when he receives an email informing him and his colleagues that a representative from the National Security Agency (NSA) will soon arrive to conduct “some kind of business.” Klein works at the Geary Street facility in San Francisco, helping provide Internet, VoIP (voice over Internet Protocol), and data transport between the US and the Far East. Klein and his supervisor, Don Henry, soon learn that one of their colleagues, one of AT&T’s senior “field support specialists” whom Klein will only identify as “Ski,” is to be interviewed by the NSA for a security clearance. Ski is slated to begin working in an NSA-operated “secure facility” at AT&T’s Folsom Street facility in San Francisco. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 22-25] Klein later says of the NSA visit: “That struck me as a little odd to begin with, because I remember from back in the ‘70s, the NSA is not supposed to be doing domestic spying, so what were they doing in an AT&T company office? It struck me as odd, but I didn’t know anything more about it, so I just let it lie and waited for the guy to come.” Klein will later describe the NSA representative as “closemouthed and unsmiling, and he did his business.” Klein decides that the NSA visit was a one-time affair, and he thinks no more of it for the time being. [PBS Frontline, 5/15/2007]

Entity Tags: Mark Klein, AT&T, “Ski” (AT&T field support specialist), Don Henry, National Security Agency

Timeline Tags: Civil Liberties

In a successful attempt to “steal” some media coverage from FBI agent Coleen Rowley’s testimony and concurrent media blitz (see June 6, 2002), the Bush administration counters with a public relations event of its own. The same day that Rowley testifies, President Bush announces the proposed creation of the new, Cabinet-level Department of Homeland Security (DHS)—an agency proposed by Democrats and, up till now, one that Bush has vehemently opposed, preferring instead to make any such agency a subsidiary office within the White House. It will be the largest reorganization of the government since the implementation of the 1947 National Security Act, when the Defense Department, National Security Council (NSC), and CIA were created. To ensure that Rowley’s testimony does not dominate the headlines, Bush also gives an evening speech on prime-time television, again announcing the new department. In that speech, Bush calls the DHS the latest effort in the US’s “titanic struggle against terror.” In 2006, author and media critic Frank Rich will write that the announcement and speech “assur[e] that Rowley’s whistle-blowing would be knocked out of the lead position on the next day’s morning shows and newspapers.” DHS will not be officially activated for almost six months (see November 25, 2002), but the announcement and subsequent speech succeeds in driving Rowley’s testimony off the front pages and the television broadcasts. Rich will write that the announcement of the capture of alleged “dirty bomber” Jose Padilla (see June 10, 2002) four days later, even though Padilla had been in custody since May 8 (see May 8, 2002), further drives any mention or analysis of Rowley’s testimony out of the news. [White House, 6/6/2002; CNN, 6/7/2002; Rich, 2006, pp. 49-50]

Entity Tags: Frank Rich, Bush administration (43), Coleen Rowley, US Department of Homeland Security, George W. Bush

Timeline Tags: Complete 911 Timeline

The NSA’s enormous data mining program, Novel Intelligence from Massive Data (NIMD—see After September 11, 2001), closely resembles another data mining program, the Defense Department’s Total Information Awareness program (see March 2002). TIA, which will be suspended in 2003 after outcries from citizens and legal experts concerned over that program’s refusal to comply with fundamental Constitutional guarantees of privacy, was also designed as an early-warning system that not only compiled intelligence data, but mined through private financial databases for credit-card and other financial transactions. Six of the corporations and research institutions who win NIMD contracts also held contracts for the earlier TIA project. Much of their work with TIA duplicated the same aspects and protocols to be used by NIMD, including challenging analytic assumptions and building prototype data-mining devices. Both TIA and NIMD attempt to second-guess human analysts’ conclusions over a particular data schema by creating a database of what TIA creator John Poindexter once called “plausible futures,” or likely terrorism scenarios. NIMD is a creation of the Advanced Research and Development Activity agency (ARDA); another ARDA project, the Advanced Capabilities for Intelligence Analysis (ACIA) also envisions a similar database (see 2005). Though TIA focused more on counterterrorism than the more sweeping NIMD, the two projects coordinated closely with one another, according to former program manager Tom Armour, who worked in Poindexter’s office.
NIMD Survives In Other Agencies - Congress will eliminate funding for TIA and other Poindexter projects, but many of those projects, and related projects such as NIMD, do not disappear. Many are instead transferred to intelligence agencies such as the NSA. Although information about these projects is strictly classified, a former Army intelligence analyst familiar with the programs will confirm in 2006 that large elements of TIA were transferred to other agencies, where they will continue to be researched and implemented. It is highly likely that NIMD is an offshoot and outgrowth of TIA. Armour will say the two programs are specifically designed to analyze large amounts of phone and e-mail traffic: “That’s, in fact, what the interest is.” [National Journal, 1/20/2006]
Government 'Shell Game' - Steven Aftergood of the Federation of American Scientists says in 2004, “The whole congressional action looks like a shell game. There may be enough of a difference for them to claim TIA was terminated while for all practical purposes the identical work is continuing.” [Associated Press, 2/23/2004] Aftergood will note that NIMD has thrived in the shadows where TIA died of exposure: “Pursued with a minimal public profile and lacking a polarizing figure like Admiral Poindexter to galvanize opposition, NIMD has proceeded quietly even as TIA imploded.” [Defense Tech, 9/26/2003]

Entity Tags: Tom Armour, Total Information Awareness, Steven Aftergood, Novel Intelligence from Massive Data, John Poindexter, National Security Agency, Advanced Research and Development Activity, Federation of American Scientists (FAS), George W. Bush, Advanced Capabilities for Intelligence Analysis

Timeline Tags: Civil Liberties

Saxby Chambliss celebrates his victory over Max Cleland.Saxby Chambliss celebrates his victory over Max Cleland. [Source: USA Today]Incumbent Senator Max Cleland (D-GA) angrily defends himself against a television ad that implies he lacks patriotism. Cleland is a triple amputee, having lost both legs and an arm in a grenade explosion in Vietnam. The television ad is sponsored by the campaign of Saxby Chambliss, a House Republican who did not himself serve in Vietnam. The Chambliss ad puts pictures of Osama bin Laden and Saddam Hussein next to Cleland’s, and accuses Cleland of being soft on homeland security. Cleland favors the creation of a Department of Homeland Security (see November 25, 2002), but will not vote for a bill creating such an entity without an amendment guaranteeing labor rights for federal workers. Cleland has also advocated a more deliberate approach to dealing with Hussein instead of joining the push to invade Iraq, and favors the resumption of open UN inspections. “To put my picture up there with Saddam Hussein and Osama bin Laden and insinuate I’m not fighting hard enough for national security, I just find that this is an incredible low in Georgia politics,” Cleland says. Chambliss retorts, “Georgians deserve to know—all Americans deserve to know—why Max Cleland is more concerned with protecting federal bureaucracy, rules and regulations than creating a department that can respond effectively to future threats of terrorism.” [Associated Press, 10/11/2002; Unger, 2007, pp. 256] Zell Miller (D-GA), Cleland’s fellow Georgian senator, defends Cleland, calling the ad “disgraceful.… [Chambliss] should be ashamed.” Cleland campaign consultant Karl Struble calls the Chambliss ad campaign “some of the ugliest stuff I’ve ever seen.” Nevertheless, the ad is apparently effective; Chambliss makes up a relatively large deficit to defeat Cleland in the November elections. [PBS, 11/6/2002] In 2007, author Craig Unger will write that few voters in Georgia “realized [Cleland’s] views were similar to those held by the president’s father.” [Unger, 2007, pp. 256]

Entity Tags: US Department of Homeland Security, Craig Unger, Saxby Chambliss, Karl Struble, Zell Miller, Max Cleland

Timeline Tags: Domestic Propaganda


The original logo for the Total Information Awareness program. An eye from a Masonic pyramid appears to cast a beam over the world, with Muslim regions highlighted. [<a href=“http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2002/11/20/MN218568.DTL” target=_new>San Francisco Chronicle, 11/20/02</a>, <a href=“http://www.guardian.co.uk/Print/0,3858,4552953,00.html” target=_new>Guardian, 11/23/02</a>] The motto, Scientia Est Potentia, means “knowledge is power.” The logo is later removed from the department’s website. [<a href=“http://www.sunspot.net/news/nationworld/bal-spy1503,0,4325331.story?coll=bal-home-headlines” target=_new>Baltimore Sun, 1/5/03</a>]
The original logo for the Total Information Awareness program. An eye from a Masonic pyramid appears to cast a beam over the world, with Muslim regions highlighted. [San Francisco Chronicle, 11/20/02, Guardian, 11/23/02] The motto, Scientia Est Potentia, means “knowledge is power.” The logo is later removed from the department’s website. [Baltimore Sun, 1/5/03] [Source: DARPA]The New York Times exposes the existence of John Poindexter’s Total Information Awareness data collection program, begun in early 2002 (see Mid-January 2002; March 2002). [New York Times, 11/9/2002] Conservative columnist William Safire writes, “If the Homeland Security Act is not amended before passage, here is what will happen to you: Every purchase you make with a credit card, every magazine subscription you buy and medical prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you receive, every bank deposit you make, every trip you book and every event you attend—all these transactions and communications will go into what the Defense Department describes as ‘a virtual, centralized grand database.’ To this computerized dossier on your private life from commercial sources, add every piece of information that government has about you—passport application, driver’s license and bridge toll records, judicial and divorce records, complaints from nosy neighbors to the FBI, your lifetime paper trail plus the latest hidden camera surveillance—and you have the supersnoop’s dream: a ‘Total Information Awareness’ about every US citizen.” [New York Times, 11/14/2002] Poindexter says it will take years to realize his vision, but his office has already begun providing some technology to government agencies. [Washington Post, 11/12/2002] The existence of this program, and the fact that Poindexter is running it, causes concern for many on both the left and right. [USA Today, 1/16/2003] It is regularly called Orwellian, conjuring visions of 1984’s Big Brother, and even supporters admit it sounds Orwellian. [Newsweek, 11/15/2002; Los Angeles Times, 11/17/2002; Guardian, 11/23/2002; Newsday, 12/1/2002; New Yorker, 12/9/2002; BBC, 12/12/2002; Dallas Morning News, 12/16/2002; Baltimore Sun, 1/5/2003] The New York Times suggests, “Congress should shut down the program pending a thorough investigation.” [New York Times, 11/18/2002] Experts question not only its civil liberties implications, but also if it is even feasible. If it does work, would its database be swapped with errors that could not be removed? (see March 2002) [Mercury News (San Jose), 12/26/2002] However, many newspapers fail to report on the program at all, and ABC is the only network to report the story on prime time television. [ABC News, 11/16/2002; ABC News, 11/25/2002] Despite so many objections, the program is included in the Homeland Security bill (see November 25, 2002), and only later somewhat curbed by Congress (see January 23, 2003).

Entity Tags: John Poindexter, William Safire, Homeland Security Act, Total Information Awareness

Timeline Tags: Civil Liberties, Iran-Contra Affair

This Homeland Security department logo of an eye peeking
through a keyhole was copyrighted but apparently not used.
This Homeland Security department logo of an eye peeking through a keyhole was copyrighted but apparently not used. [Source: Public domain]President Bush signs legislation creating the Department of Homeland Security. Homeland Security Director Tom Ridge is promoted to secretary of homeland security. The department will consolidate nearly 170,000 workers from 22 agencies, including the Coast Guard, the Secret Service, the federal security guards in airports, and the Customs Service. [New York Times, 11/26/2002; Los Angeles Times, 11/26/2002] However, the FBI and CIA, the two most prominent anti-terrorism agencies, will not be part of it. [New York Times, 11/20/2002] The department wants to be active by March 1, 2003, but “it’s going to take years to integrate all these different entities into an efficient and effective organization.” [New York Times, 11/20/2002; Los Angeles Times, 11/26/2002] Some 9/11 victims’ relatives are angry over sections inserted into the legislation at the last minute. Airport screening companies will be protected from lawsuits filed by family members of 9/11 victims. Kristen Breitweiser, whose husband died in the World Trade Center, says: “We were down there lobbying last week and trying to make the case that this will hurt us, but they did it anyway. It’s just a slap in the face to the victims.” [New York Times, 11/26/2002] The legislation creating the new department contains sweeping new powers for the executive branch that go largely unremarked on by the media. The White House and the departments under its control can now withhold from the public vast amounts of information about “critical infrastructure,” such as emergency plans for major industrial sites, and makes the release of such information a criminal offense. The explanation is that keeping this information out of terrorist hands will prevent them from creating a “road map” for planning attacks; what is much less discussed is how little the public can now know about risky practices at industrial sites in their communities. [Savage, 2007, pp. 110]

Entity Tags: US Coast Guard, US Department of Homeland Security, US Customs Service, US Secret Service, George W. Bush, Kristen Breitweiser, Bush administration (43), Central Intelligence Agency, Federal Bureau of Investigation, Relatives of September 11 Victims, Tom Ridge

Timeline Tags: Complete 911 Timeline, Civil Liberties

An aerial view of the AT&T Easylink Service building in Bridgeton, Missouri, where the NSA allegedly has secret facilities.An aerial view of the AT&T Easylink Service building in Bridgeton, Missouri, where the NSA allegedly has secret facilities. [Source: USGS via Microsoft]On behalf of the National Security Agency (NSA), AT&T constructs a secret, highly secured room in its network operations center in Bridgeton, Missouri, used to conduct secret government wiretapping operations. This is a larger and more elaborate “data mining” center than the one AT&T has constructed in San Francisco (see January 2003). Salon’s Kim Zetter will later write that the Bridgeton facility “had the earmarks of a National Security Agency operation,” including a sophisticated “mantrap” entrance using retinal and fingerprint scanners. Sometime in early 2003, AT&T technician Mark Klein (see July 7, 2009) discusses the Bridgeton facility with a senior AT&T manager, whom he will only identify as “Morgan.” The manager tells Klein that he considers the Bridgeton facility “creepy,” very secretive and with access restricted to only a few personnel. Morgan tells Klein that the secure room at Bridgeton features a logo on the door, which Klein will describe as “the eye-on-the-pyramid logo which is on the back of the dollar bill—and that got my attention because I knew that was for awhile the logo of the Total Awareness Program” (TIA-see Mid-January 2002, March 2002 and November 9, 2002). Klein notes that the logo “became such a laughingstock that they [the US government] withdrew it.” However, neither Klein nor Morgan find the NSA secure room at Bridgeton amusing. In June 2006, two AT&T workers will tell Zetter that the 100 or so employees who work in the room are “monitoring network traffic” for “a government agency,” later determined to be the NSA. Only government officials or AT&T employees with top-secret security clearance are admitted to the room, which is secured with a biometric “mantrap” or highly sophisticated double door, secured with retinal and fingerprint scanners. The few AT&T employees allowed into the room have undergone exhaustive security clearance procedures. “It was very hush-hush,” one of the AT&T workers will recall. “We were told there was going to be some government personnel working in that room. We were told: ‘Do not try to speak to them. Do not hamper their work. Do not impede anything that they’re doing.’” (Neither of Zetter’s sources is Klein, who by the time Zetter’s article is published in 2006, will have made his concerns about the NSA and AT&T public.) The Bridgeton facility is the central “command center” for AT&T’s management of all routers and circuits carrying domestic and international Internet traffic. Hence, it is the ideal location for conducting surveillance or collecting data. AT&T controls about a third of all bandwidth carrying Internet traffic to and from homes and businesses throughout the US. The two employees, who both will leave AT&T to work with other telecommunications firms, will say they cannot be sure what kinds of activities actually take place within the secret room. The allegations follow those made by Klein, who after his retirement (see May 2004) will submit an affidavit stating his knowledge of other, similar facilities in San Francisco and other West Coast switching centers, whose construction and operations were overseen by the NSA (see January 16, 2004 and January 2003); the two AT&T employees say that the orders for the San Francisco facility came from Bridgeton. NSA expert Matthew Aid will say of the Bridgeton facility, “I’m not a betting man, but if I had to plunk $100 down, I’d say it’s safe that it’s NSA.” Aid will say the Bridgeton facility is most likely part of “what is obviously a much larger operation, or series of interrelated operations” combining foreign intelligence gathering with domestic eavesdropping and data collection. Former high-level NSA intelligence officer Russell Tice will say bluntly: “You’re talking about a backbone for computer communications, and that’s NSA.… Whatever is happening there with the security you’re talking about is a whole lot more closely held than what’s going on with the Klein case.” The kind of vetting that the Bridgeton AT&T employees underwent points to the NSA, both Aid and Tice will say; one of the two AT&T employees who will reveal the existence of the Bridgeton facility will add, “Although they work for AT&T, they’re actually doing a job for the government.” Aid will add that, while it is possible that the Bridgeton facility is actually a center for legal FBI operations, it is unlikely due to the stringent security safeguards in place: “The FBI, which is probably the least technical agency in the US government, doesn’t use mantraps. But virtually every area of the NSA’s buildings that contain sensitive operations require you to go through a mantrap with retinal and fingerprint scanners. All of the sensitive offices in NSA buildings have them.” The American Civil Liberties Union’s Jameel Jaffer will add that when the FBI wants information from a telecom such as AT&T, it would merely show up at the firm with a warrant and have a wiretap placed. And both the NSA and FBI can legally, with warrants, tap into communications data using existing technological infrastructure, without the need for such sophisticated surveillance and data-mining facilities as the ones in Bridgeton and San Francisco. Both AT&T and the NSA will refuse to comment on the facilities in Bridgeton, citing national security concerns. [Salon, 6/21/2006; Klein, 2009, pp. 28-30]

Entity Tags: Terrorist Surveillance Program, National Security Agency, Russell Tice, Matthew Aid, Federal Bureau of Investigation, Kim Zetter, Mark Klein, AT&T, Jameel Jaffer, “Morgan” (senior AT&T manager), American Civil Liberties Union

Timeline Tags: Civil Liberties

The NSA’s secret room in the AT&T switching center.The NSA’s secret room in the AT&T switching center. [Source: PBS]Veteran AT&T technician Mark Klein (see July 7, 2009) takes an informal tour of his company’s facility on San Francisco’s Folsom Street (see Late 2002), along with three other technicians from his Geary Street offices. The tour, Klein will later say, is to introduce the four technicians to the Folsom Street staff, “because they were obviously eventually planning to bring us over there.” Klein learns that the rumors of a “secret room” in the facility are true (see Fall 2002). The secret room is on the facility’s sixth floor and is being built to house some sort of equipment, but Klein is unsure exactly what that equipment might be. Klein and the others see the outer door of the secret room, and a workman working on the door “suddenly [began talking to Klein and his colleages in a] very low voice like he didn’t want to be overheard. He felt like this was something secret, you know, and he didn’t know much about it, and he was saying: ‘None of us can go in there. It’s all secret.’ This was not only an affront to the technicians; it was a violation of union rules, because they were obviously planning to install telecommunications equipment, which is supposed to be the jurisdiction of the union technicians. We had a contract. So the technicians were not only angry about this secret thing that they’re not let in on, but also the fact that there’s work there that they’re excluded from. And they were told nothing about it. So that was it.” Klein is further surprised to learn that only a single non-union technician (whom he only identifies as “Ski,” an AT&T “field support specialist” who has been granted a security clearance by the National Security Agency (NSA)), is allowed to work in the secure room. No union technicians are allowed in, even though the installation work being done is specifically contracted to the union workers. “The regular technician work force was not allowed in the room,” Klein will later state. Klein deduces that this secret room is the long-rumored NSA installation he has been hearing about. Moreover, he notes with some alarm that the room is next door to the 4ESS phone switch, “the traditional workhorse used for AT&T long-distance calls.” Klein will write, “Now my mental alarm bells were ringing, but for the moment there was nothing to do but take some mental notes, particularly since it was not clear exactly what they [the NSA and AT&T] were doing.” [Wired News, 4/7/2006; Democracy Now!, 5/12/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 26-28] Klein will explain that he chooses not to say anything about his concerns because he is “scared for several reasons, one being, well, this is obviously secret. This is obviously some federal government secret operation that they don’t want nosy people nosing around in, and if I started asking questions I could get into trouble. Furthermore, our jobs were in jeopardy anyway, because [we] were always getting wind that they were planning to close our previous office at Geary Street, and I didn’t need to give them an excuse to fire me. So I thought after thinking about it that the best thing to do is not to say anything and just watch it.” [PBS Frontline, 5/15/2007] He later learns that similar cabinets are being installed in AT&T centers in other cities, including Seattle, San Jose, Los Angeles, and San Diego (see Late 2003). [Wired News, 4/7/2006] The Folsom Street facility is apparently connected to a more central surveillance facility operated out of one of AT&T’s main command centers in Missouri (see Late 2002-Early 2003).

Entity Tags: Bush administration (43), AT&T, Electronic Frontier Foundation, Mark Klein, Terrorist Surveillance Program, “Ski” (AT&T field support specialist), National Security Agency

Timeline Tags: Civil Liberties

Congress imposes some limitations on the Total Information Awareness program (see March 2002; November 9, 2002). Research and development of the program would have to halt within 90 days of enactment of the bill unless the Defense Department submits a detailed report about the program. The research can also continue if Bush certifies that the report cannot be provided. Congress also okays use of the program internationally, but it cannot be used inside the US unless Congress passes new legislation specifically authorizing such use. [New York Times, 1/24/2003; Los Angeles Times, 2/19/2003] However, a bill to completely stop the program has yet to pass. [Mercury News (San Jose), 1/17/2003; Los Angeles Times, 2/19/2003] Several days earlier, Senator Charles Grassley (R-IA) alleged that the Justice Department and FBI are more extensively exploring the use of the Total Information Awareness program than they have previously acknowledged. [Associated Press, 1/21/2003; Washington Post, 1/22/2003] Contracts worth tens of millions of dollars have been signed with private companies to develop pieces of the program. [Associated Press, 2/12/2003] Salon also reports that the program “has now advanced to the point where it’s much more than a mere ‘research project’.” [Salon, 1/29/2003]

Entity Tags: Total Information Awareness, US Congress, US Department of Defense

Timeline Tags: Civil Liberties

Steven Aftergood of the Federation of American Scientists says that he is not sure that Congress’s public termination of the Total Information Awareness (TIA) project (see January 23, 2003) was as real and outrage-driven as it seemed at the time. “The whole congressional action looks like a shell game,” Aftergood says. “There may be enough of a difference for them to claim TIA was terminated while for all practical purposes the identical work is continuing.” While Congress terminated TIA with visible indignation, it also quietly funded the “National Foreign Intelligence Program,” and never identified which intelligence agency would do the work—which was also kept from the public eye. Congress did say that none of the research would be used against US citizens. No one in Congress will discuss how many of Poindexter’s programs survived, but knowledgeable sources will confirm that some 18 data-mining programs known as Evidence Extraction and Link Discovery in Poindexter’s research were preserved after TIA’s termination. These programs may well include the sprawling data mining program known as Novel Intelligence from Massive Data (NIMD) (see After September 11, 2001), though this cannot be confirmed. Former TIA chief John Poindexter’s vision of the technology behind NIMD envisioned software that can quickly analyze “multiple petabytes” of data. A single petabyte would fill the Library of Congress space for 18 million books more than 50 times, or could hold 40 pages of text for each of the more than 6.2 billion humans on Earth. Poindexter and his colleagues envisioned the program as handling a petabyte or more of data a month. [Associated Press, 2/23/2004] Concerns about the privacy rights of US citizens being damaged by the program are rife. “If they were to stick to strictly military-related research and development, there is less of an issue, but these technologies have much broader social implications,” says Barbara Simons, a computer scientist who is past president of the Association of Computing Machinery, an organization that has expressed concerns about TIA. [New York Times, 5/21/2003] At least one Senator is uncomfortable with the apparent resurgence of TIA. Jay Rockefeller (D-WV) will write Vice President Dick Cheney in June 2003 after receiving a briefing on the various secret surveillance programs (see July 17, 2003). Rockefeller will write, “As I reflected on the meeting today, John Poindexter’s TIA project sprung to mind, exacerbating my concern regarding the direction the administration is moving with regard to security, technology, and surveillance.” [National Journal, 1/20/2006]

Entity Tags: Steven Aftergood, Richard (“Dick”) Cheney, Total Information Awareness, Novel Intelligence from Massive Data, John D. Rockefeller, John Poindexter, Barbara Simons, Federation of American Scientists (FAS), Foreign Intelligence Surveillance Act, Association of Computing Machinery

Timeline Tags: Civil Liberties

Senator John D. Rockefeller.Senator John D. Rockefeller. [Source: ViewImages.com]John D. Rockefeller (D-WV), the ranking member of the Senate Intelligence Committee, learns of the secret NSA warrantless wiretapping program against US citizens (see Early 2002) in a secret briefing for himself, the chairman of the committee, and the chairman and ranking member of the House Intelligence Committee. Hours later, Rockefeller sends a handwritten letter to Vice President Cheney expressing his concerns about the potential illegality of the program, concerns he apparently expressed in the briefing as well. Rockefeller will not release the letter publicly until December 19, 2005, four days after the New York Times publishes an article revealing the program’s existence (see December 15, 2005). Disturbed both by the information he was given and the information that was obviously being withheld, Rockefeller writes in part: “Clearly the activities we discussed raise profound oversight issues.… Given the security restrictions associated with this information, and my inability to consult staff or counsel on my own [Cheney had prohibited Rockefeller and the three other lawmakers in the briefing from consulting with their staff experts], I feel unable to fully evaluate, much less endorse these activities. As I reflected on the meeting today, and the future we face, John Poindexter’s TIA [Total Information Awareness (see March 2002)] project sprung to mind, exacerbating my concern regarding the direction the administration is moving with regard to security, technology, and surveillance. Without more information and the ability to draw on any independent legal or technical expertise, I simply cannot satisfy lingering concerns raised by the briefing we received.” [Democratic Party, 12/19/2005; Savage, 2007, pp. 115] Rockefeller also notes that he is not at liberty to do anything about his concerns, since he is legally bound to obey the secrecy rules the White House has invoked, but he wants his concerns noted. [Savage, 2007, pp. 116] It is unclear whether Rockefeller ever receives a reply. Rockefeller is apparently unaware of evidence showing that domestic surveillance may have begun well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: New York Times, Richard (“Dick”) Cheney, John D. Rockefeller, John Poindexter, Total Information Awareness, National Security Agency

Timeline Tags: Civil Liberties

Senior AT&T technician Mark Klein (see July 7, 2009), working near the National Security Agency (NSA)‘s “secret room” in the firm’s Folsom Street, San Francisco facility (see October 2003), receives two documents pertaining to the equipment in that secret room. (In a 2007 interview with PBS, Klein will cite a third document as well, that he found lying on top of a router.) The two documents are entitled “SIMS Splitter Cut-In and Test Procedure Issue 2, 01/12/03” and “SIMS Splitter Cut-In and Test Procedure OSWF Training Issue 2 January 24, 2002.” “OSWF” stands for “On-Site Work Force.” As for “SIMS,” all Klein knows is that it is an acronym associated with the secret room. Reading over the documents, Klein realizes that they indicate the secret room contains a “splitter cabinet,” installed in February 2003 (see February 2003), containing “optical splitters” that “cut in” to signals sent through 16 “Peering Links” between AT&T and 16 other major carriers and Internet exchange points. He later recalls: “I brought them back to my desk, and when I started looking at it, I looked at it more, and I looked at it more, and finally it dawned on me sort of all at once, and I almost fell out of my chair, because this showed, first of all, what they had done, that they had taken working circuits, which had nothing to do with a splitter cabinet, and they had taken in particular what are called peering links which connect AT&T’s network with the other networks. It’s how you get the Internet, right? One network connects with another. So they took 16 high-speed peering links which go to places like Qwest [Communications] and Palo Alto Internet Exchange and places like that.… These circuits were working at one point, and the documents indicated in February 2003 they had cut into these circuits so that they could insert the splitter so that they can get the data flow from these circuits to go to the secret room. So this data flow meant that they were getting not only AT&T customers’ data flow; they were getting everybody else’s data flow, whoever else might happen to be communicating into the AT&T network from other networks. So it was turning out to be like a large chunk of the network, of the Internet.” The documents, he later says, name “the circuit IDs… the companies they belong to… [and] the cut date. And they were all in February [2003], when they were cut into the splitter” (see February 2003). The 16 carriers include ConXion, Verio, XO, Genuity, Qwest, PAIX (Palo Alto Internet Exchange), Allegiance, Abovenet, Global Crossing, C&W, UUNET, Level 3, Sprint, Telia, PSINet, and MAE West (the Metropolitan Area Exchange for AT&T’s Western region). In plain English, the splitter in the NSA room is duplicating the electronic data being sent through AT&T’s equipment, and sending the duplicated signals somewhere else, presumably to NSA computers for later processing. Klein is given the documents by a veteran AT&T technician who is preparing to retire. Klein, in a casual conversation with the colleague who gave him the documents, remarks, “It seems obvious to me, given that the secret room is next to the 4ESS (see January 2003), that they’re listening to phone calls.” Klein’s colleague shakes his head and says: “No, Internet.… I’ll show you.” (In 2007 Klein will learn from a telecommunications expert that since AT&T was transferring its long-distance telephone traffic onto Internet fiber cables, the splitter was most likely picking up both telephone and Internet traffic.) Klein’s colleague shows him the cabinet containing the splitters. Klein later tells a reporter: “[T]here were optical splitters, which basically were connected by fiber-optic cable down to the secret room on the sixth floor.… The analogy I can give you, which most people are familiar with is, say you get cable TV in your living room and then want to watch all the channels you get in the living room, you want to get all those same channels in your bedroom. So they install on the cable what they call a splitter, which splits off all the signals, duplicates of the same signals which go to the bedroom.… What the splitter does is make a duplicate copy of all the signals going across the fiber-optic cables.… We’re talking about billions and billions of bits of data going across every second, right? And it’s going into the router, and it’s coming back from the routers in that office. So what they do with the splitter is they intercept that data stream and make copies of all the data, and those copies go down on the cable to the secret room.” Klein confirms from his colleague and from the documents that show the splitters are connected directly to the equipment in the secret room. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 34-35]

Entity Tags: Genuity, UUNET, XO, Allegiance, Abovenet, AT&T, ConXion, Sprint/Nextel, Telia, Palo Alto Internet Exchange, MAE West, Level 3, Global Crossing, Mark Klein, National Security Agency, C&W, PSINet, Qwest

Timeline Tags: Civil Liberties

A portion of the outer door of AT&T’s Folsom Street facility.A portion of the outer door of AT&T’s Folsom Street facility. [Source: Wired News]Senior AT&T technician Mark Klein (see July 7, 2009), newly assigned to the company’s Folsom Street facility in San Francisco, is tasked to work at the seventh floor “Internet room,” where AT&T manages much of its domestic Internet traffic. Klein is intensely curious about the National Security Agency’s “secret room” on the sixth floor (see January 2003). The NSA room has two doors, both labeled “641A,” and is in reality what Klein will later term “a room within a room,” with the outer room filled with ordinary “computer equipment for mundane corporate uses.” He does not know what is in the inner “secret” room. Klein will later write, “While working in the outer room, you could walk around three sides of the secret room, which I measured to be about 24 by 48 feet.” An outer door leads from Room 641A to the 4ESS switchroom, which AT&T uses to manage its long-distance telephone communications. The rooms are connected by “row after row of equipment and a tangle of cabling going up and across the ceiling.” Klein learns that the NSA room is sometimes called “the SIMS room,” an acronym of which no one seems to know the meaning. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 32-34] Klein will later describe his job at the Folsom Street facility as working with the phone switch equipment on the sixth floor, “which handled the public’s telephone calls and was the workhorse of the phone system.… My main assignment was to oversee the Internet room, and that meant keeping it going. If there were any trouble calls, I had to answer them. If there’s any upgrading work to do, I had to either do it or arrange for others to do it in off hours. Just oversee the flow of work in the Internet room and watch things.” He also spends a tremendous amount of time on the seventh floor, “where the Internet room was.… That’s where there are a lot of Cisco routers, a lot of fiber-optic lines coming in and going out.” The Folsom Street facility serves the Bay Area as well as much of Western America. According to Klein: “There’s lots of Internet traffic, as you can imagine, that goes in and out of this office, probably hundreds of fiber-optic lines that go out, carrying billions—that’s billions with a ‘B’—billions of bits of data going in and out every second every day. So all the Web surfing you’re doing, whatever you’re doing on the Internet—the pictures, the video, the Voice over Internet—all that stuff’s going in and out of there. And then of course there’s also the traditional phone switch, which is doing what it’s been doing since before the Internet.… Handling millions and millions of phone calls, right. That’s its job.” [PBS Frontline, 5/15/2007]

Entity Tags: Mark Klein, AT&T, National Security Agency

Timeline Tags: Civil Liberties

9/11 Commission Executive Director Philip Zelikow.9/11 Commission Executive Director Philip Zelikow. [Source: Jurist]Philip Zelikow, the executive director of the 9/11 Commission, along with two members of the commission’s staff and an unnamed “representative of the executive branch,” meets at Bagram Air Base in Afghanistan with three individuals doing intelligence work for the US Defense Department. [CNN, 8/17/2005; Sacramento Bee, 11/24/2005] Among these is Lt. Col. Anthony Shaffer, an Army intelligence officer who worked closely with a military intelligence unit called Able Danger, which between fall 1999 and spring 2001 was tasked with assembling information about al-Qaeda networks around the world (see Fall 1999 and January-March 2001). According to Shaffer’s own later account, he gives the commission staff a detailed account of what Able Danger was, and tells them, “We found two of the three cells which conducted 9/11, to include [Mohamed] Atta.” At the end of the meeting, Philip Zelikow approaches him and says, “This is important. We need to continue this dialogue when we get back to the states.” [Government Security News, 9/2005] Following the meeting, Zelikow calls back to the 9/11 Commission’s headquarters in Washington to request that staff draft a document request, seeking information on Able Danger from the Department of Defense. [Thomas H. Kean and Lee H. Hamilton, 8/12/2005 pdf file] According to Anthony Shaffer, “My understanding from talking to another member of the press is that [Zelikow’s] call came into America at four o clock in the morning. He got people out of bed over this.” [Government Security News, 9/2005] Shaffer subsequently tries contacting Philip Zelikow in January 2004 (see Early January 2004). After it is revealed in the press that the commission, which includes no mention of Able Danger in its final report, had been briefed on the unit, spokesmen for commission members will insist that while they were informed of Able Danger at this time, they were not informed that it had identified Mohamed Atta or any other hijackers as threats. [New York Times, 8/10/2005] Head commissioners Thomas H. Kean and Lee H. Hamilton will later say in an official statement that a memorandum prepared by the commission staff after the meeting “does not record any mention of Mohamed Atta or any of the other future hijackers, or any suggestion that their identities were known to anyone at [Defense Department] before 9/11. Nor do any of the three Commission staffers who participated in the interview, or the executive branch lawyer, recall hearing any such allegation.” [Thomas H. Kean and Lee H. Hamilton, 8/12/2005 pdf file]

Entity Tags: Philip Zelikow, Mohamed Atta, US Department of Defense, Anthony Shaffer, 9/11 Commission, Able Danger

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Narus logo.Narus logo. [Source: Endace (.com)]Narus, a firm which manufactures telecommunications hardware, co-sponsors a technical conference in McLean, Virginia, titled “Intelligence Support Systems for Lawful Interception and Internet Surveillance.” As AT&T engineer Mark Klein (see July 7, 2009) will later write: “Police officials, FBI and DEA agents, and major telecommunications companies eager to cash in on the ‘war on terror’ had gathered in the hometown of the CIA to discuss their special problems. Among the attendees were AT&T, BellSouth, MCI, Sprint, and Verizon. Narus founder Dr. Ori Cohen gave a keynote speech.” Also speaking at the conference is William Crowley, the former deputy director of the National Security Agency (NSA). Narus is providing some of the key hardware components used in the NSA’s domestic surveillance program (see January 16, 2004). [PBS Frontline, 5/15/2007; Klein, 2009, pp. 39]

Entity Tags: Narus, AT&T, BellSouth, Mark Klein, Ori Cohen, Verizon Wireless, National Security Agency, MCI, Sprint/Nextel, William Crowley

Timeline Tags: Civil Liberties

In his proposed 2005 budget, President Bush proposes reducing the budget of the Assistance to Firefighters Grant Program (AFGP) from $750 million to $500 million. The budget allocates, in total, $27 billion for the nation’s first responders over the next four years. A Council on Foreign Relations study, based on surveys of emergency responder groups, shows that the minimum necessary to secure the US from a second major terrorist attack is around $94 billion—almost four times the amount approved by Bush. [Carter, 2004, pp. 20-21; White House, 4/3/2004; Federal Election Commission, 1/16/2008] Congress will manage to increase the funding for the program to $542 million. It had hoped to increase funding to around $900 million. [Center for American Progress, 8/25/2004; Charles Schumer, 9/22/2006]

Entity Tags: George W. Bush, Council on Foreign Relations

Timeline Tags: Complete 911 Timeline

Senior AT&T technician Mark Klein (see July 7, 2009), who is considering “blowing the whistle” on the National Security Agency’s secret data-mining operation being conducted with the complicity and participation of AT&T (see January 16, 2004), is troubleshooting a problem of “signal loss” caused by AT&T’s signals being routed through the NSA’s “splitter cabinet,” which “splits” part of the optical data flow from its normal route into the NSA’s computers, enabling the agency to monitor all of the Internet traffic going through Klein’s Folsom Street, San Francisco, facility (see October 2003). Klein learns from a fellow technician that AT&T is “getting the same problem in the other offices where splitters are going in.” Klein is stunned to learn that other AT&T facilities have NSA splitters. He learns from the other technician that the “other offices” are in, among other places, Atlanta, San Diego, San Jose, and Seattle. (Apparently neither Klein nor the other technician are aware of the NSA splitter at the central AT&T facility in Bridgeton, Missouri—see Late 2002-Early 2003). Klein will later write, “This thing was getting bigger and bigger.” Klein determines that the NSA splitter is causing the signal loss: “The company was degrading the signal quality of its network for the sake of the NSA.”
Visiting the Secret Room - Klein accompanies an AT&T field support specialist named Rick into the NSA’s “secret room” at the Folsom Street building, with the intention of repairing the splitter problem. Rick is one of the few AT&T technicians authorized to work in the room; he invites Klein to join him and Klein agrees. Klein watches Rick punch the entry code into the lock of Room 641A and follows him inside. Klein observes a large amount of hardware, most installed in what he will later call “standard cabinets used by the telecommunications industry,” along with a computer workstation and a set of storage lockers. Klein later says he spends no more than two minutes inside the secret room. He will recall: “[I]f I didn’t know that the NSA was involved, it would look like any other work space where telecom people work, with rows of cabinets with equipment inside them, humming.… [T]he odd thing about the whole room, of course, was that I couldn’t normally get in there, nor could any of the other union technicians. Only this one guy who had clearance from the NSA could get in there, so that changed the whole context of what this is about.” Shortly thereafter, Rick tells Klein and a group of employees that he has keys allowing him access to the other NSA secret rooms in AT&T’s offices in San Diego, San Jose, and Seattle. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 42-44]

Entity Tags: AT&T, “Rick” (AT&T field support specialist), Mark Klein, National Security Agency

Timeline Tags: Civil Liberties

Following an October 2003 meeting with three members of the 9/11 Commission’s staff (see October 21, 2003), Lt. Col. Anthony Shaffer tries contacting Philip Zelikow, the commission’s executive director, as requested by Zelikow himself. Shaffer is an Army intelligence officer who worked closely with a military intelligence unit called Able Danger, which identified Mohamed Atta and three other future 9/11 hijackers in early 2000 (see January-February 2000). He phones Zelikow’s number the first week of January 2004. The person who replies tells him, “I will talk to Dr. Zelikow and find out when he wants you to come in.” However, Shaffer receives no call back, so a week later he phones again. This time, the person who answers him says, “Dr. Zelikow tells me that he does not see the need for you to come in. We have all the information on Able Danger.” [Government Security News, 9/2005] Yet the commission doesn’t even receive the Able Danger documentation they had previously requested from the Defense Department until the following month (see February 2004). [Thomas H. Kean and Lee H. Hamilton, 8/12/2005 pdf file]

Entity Tags: Able Danger, Philip Zelikow, Philip Zelikow, 9/11 Commission, Anthony Shaffer

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A sample page from Mark Klein’s AT&T documentation.A sample page from Mark Klein’s AT&T documentation. [Source: Mark Klein / Seattle Times]Senior AT&T technician Mark Klein (see July 7, 2009), gravely concerned by the National Security Agency (NSA) spying operation going on in AT&T’s San Francisco facility (see October 2003) and now in possession of documents which prove the nature and scope of the telecommunications surveillance activities (see Fall 2003 and Late 2003), writes a memo summarizing his findings and conclusions. He appends eight pages of the unclassified documents he has in his possession, along with two photographs and some material from the Internet which documents the sophisticated surveillance equipment being used to gather data from AT&T’s electronic transmissions. The NSA and AT&T were, he later says, “basically sweeping up, vacuum-cleaning the Internet through all the data, sweeping it all into this secret room.… It’s the sort of thing that very intrusive, repressive governments would do, finding out about everybody’s personal data without a warrant. I knew right away that this was illegal and unconstitutional, and yet they were doing it.… I think I’m looking at something Orwellian. It’s a government, many-tentacled operation to gather daily information on what everybody in the country is doing. Your daily transactions on the Internet can be monitored with this kind of system, not just your Web surfing. All kinds of business that people do on the Internet these days—your bank transactions, your email, everything—it sort of opens a window into your entire private life, and that’s why I thought of the term ‘Orwellian.’ As you know, in [George] Orwell’s story [1984], they have cameras in your house, watching you. Well, this is the next best thing.… So I was not only angry about it; I was also scared, because I knew this authorization came from very high up—not only high up in AT&T, but high up in the government. So I was in a bit of a quandary as to what to do about it, but I thought this should be halted.”
Gathering 'the Entire Data Stream' - In his memo, Klein concludes that the NSA is using “splitter” equipment to copy “the entire data stream [emphasis in the original] and sent it to the [NSA’s] secret room for further analysis.” Klein writes that the splitters actually “split off a percentage of the light signal [from the fiber optic circuits] so it can be examined. This is the purpose of the special cabinet… circuits are connected into it, the light signal is split into two signals, one of which is diverted to the ‘secret room.’ The cabinet is totally unnecessary for the circuit to perform—in fact, it introduces problems since the signal level is reduced by the splitter—its only purpose is to enable a third party [the NSA] to examine the data flowing between sender and recipient on the Internet.” (Emphasis in the original.) In his book, Klein will explain that “each separate signal,” after being split, “contains all the information, nothing is lost, so in effect the entire data stream has been copied.” He will continue: “What screams out at you when examining this physical arrangement is that the NSA was vacuuming up everything flowing in the Internet stream: email, Web browsing, voice-over-Internet phone calls, pictures, streaming video, you name it. The splitter has no intelligence at all, it just makes a blind copy.” Klein later explains to a reporter: “The signals that go across fiber optics are laser light signals. It’s light basically that runs through a fiber optic, which is a clear glass fiber, and it has to be at a certain level for the routers to see the light and interpret the data correctly. If the light gets too low, just as if you get a weak flashlight with bad batteries, at a certain point it doesn’t work. If the light level drops too low, the router starts dropping bits and getting errors, and eventually you get loss of signal, and it just doesn’t work at all.… The effect of the splitter is to reduce the strength of the signal, and that may or may not cause a problem, depending on how much the signal is reduced.” A telecommunications company would not, as a rule, use such a splitter on its backbone Internet traffic because of the risk of degraded signal quality. “You want to have as few connections on your main data lines as possible,” Klein will say, “because each connection reduces the signal strength, and a splitter is a connection, and if you can avoid that, all the better.”
Inherently Illegal - Klein will explain that there is no way these activities are legal: “There could not possibly be a legal warrant for this, since according to the Fourth Amendment, warrants have to be specific, ‘particularly describing the place to be searched and the persons or things to be seized.’ It was also a blatant violation of the 1978 Foreign Intelligence Surveillance Act [FISA—see 1978], which calls for specific warrants as required by the Fourth Amendment. This was a massive blind copying of the communications of millions of people, foreign and domestic, randomly mixed together. From a legal standpoint, it does not matter what they claim to throw away later in their secret rooms, the violation has already occurred at the splitter.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 37, 119-133]
The Narus STA 6400 - Klein discusses one key piece of equipment in the NSA’s secret room, the Narus STA 6400 (see Late 2003). Narus is a firm that routinely sells its equipment not only to telecom firms such as AT&T, “but also to police, military, and intelligence officials” (see November 13-14, 2003). Quoting an April 2000 article in Telecommunications magazine, Klein writes that the STA 6400 is a group of signal “traffic analyzers that collect network and customer usage information in real time directly from the message.… These analyzers sit on the message pipe into the ISP [Internet Service Provider] cloud rather than tap into each router or ISP device.” Klein quotes a 1999 Narus press release that says its Semantic Traffic Analysis (STA) technology “captures comprehensive customer usage data… and transforms it into actionable information… [it] is the only technology that provides complete visibility for all Internet applications.” The Narus hardware allows the NSA “to look at the content of every data packet going by, not just the addressing information,” Klein will later write.
A 'Dream Machine for a Police State' - Klein later writes of the Narus STA 6400: “It is the dream machine of a police state, one that even George Orwell could not imagine. Not only does it enable the government to see what millions of people are saying and doing every day, but it can build up a database which reveals the connections among social groups—who’s calling and emailing whom. Such a device can easily be turned against all dissident protest groups, and even the Democratic and Republican parties, with devastating effect. And it’s in the hands of the executive power, in total secrecy.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; Klein, 2009, pp. 37-40] In support of the memo and an ensuing lawsuit against AT&T (see January 31, 2006), Klein will later write: “Despite what we are hearing, and considering the public track record of this administration, I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or is otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” [Wired News, 4/7/2006]

Entity Tags: National Security Agency, Narus, Mark Klein, Foreign Intelligence Surveillance Act, AT&T

Timeline Tags: Civil Liberties

The 9/11 Commission receives documents that it had requested from the Department of Defense, relating to a military intelligence unit called Able Danger, which had allegedly identified Mohamed Atta and three other 9/11 hijackers more than a year before the attacks. [New York Times, 8/9/2005; Times Herald (Norristown), 8/13/2005] The commission requested the documents in November 2003, after a meeting in Afghanistan with Lt. Col. Anthony Shaffer, an Army intelligence officer who had worked closely with the unit (see October 21, 2003). Some documents are given directly to the commission, others are available for review in a Department of Defense reading room, where commission staff make notes summarizing them. Some of the documents include diagrams of Islamic militant networks. However, an official statement later claims, “None of the documents turned over to the Commission mention Mohamed Atta or any of the other future hijackers. Nor do any of the staff notes on documents reviewed in the DOD reading room indicate that Mohamed Atta or any of the other future hijackers were mentioned in any of those documents.” [Thomas H. Kean and Lee H. Hamilton, 8/12/2005 pdf file; Washington Post, 8/13/2005] Shaffer responds, “I’m told confidently by the person who moved the material over, that the Sept. 11 commission received two briefcase-sized containers of documents. I can tell you for a fact that would not be one-twentieth of the information that Able Danger consisted of during the time we spent.” [Fox News, 8/17/2005]

Entity Tags: 9/11 Commission, US Department of Defense, Anthony Shaffer, Able Danger

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The Defense Intelligence Agency (DIA) in Washington, DC apparently destroys duplicate copies of documentation relating to a military intelligence unit called Able Danger, for unknown reasons. The documents had been maintained by one of the DIA’s employees, intelligence officer Anthony Shaffer. [US Congress, 9/21/2005] The Able Danger unit was established in fall 1999, to assemble information about al-Qaeda networks worldwide (see Fall 1999). Lt. Col. Anthony Shaffer had served as a liaison officer between the unit and the DIA. [New York Times, 8/17/2005; Guardian, 8/18/2005] Able Danger allegedly identified Mohamed Atta and three other future 9/11 hijackers more than a year before the attacks (see January-February 2000). Other records relating to the unit were destroyed in May and June 2000, and March 2001 (see May-June 2000). [US Congress, 9/21/2005; Fox News, 9/24/2005]

Entity Tags: Able Danger, Defense Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Chuck Rosenberg.Chuck Rosenberg. [Source: Associated Press / Charles Dharapak]Vice President Dick Cheney challenges objections to the White House’s secret, warrantless surveillance program (see Early 2002) by Justice Department officials. Cheney makes his objections during a meeting attended by high-level White House and Justice Department officials, but this does not come to light until a 2007 testimony by Deputy Attorney General James Comey (see May 15, 2007). [Washington Post, 6/7/2007] (Comey will step down from his post in mid-2005.) [Law.com, 4/21/2005] The White House meetings take place one day before White House officials journey to Attorney General John Ashcroft’s hospital room to try to force Ashcroft to give his approval for the NSA-managed surveillance program (see March 10-12, 2004). Ashcroft will refuse to give his approval. Cheney’s key role in leading what the Washington Post calls “a fierce internal battle over the legality of the warrantless surveillance program” is not known until Comey’s 2007 testimony. The White House meeting, held to discuss Justice Department objections to the NSA program, is attended by Cheney, White House counsel and future attorney general Alberto Gonzales, Cheney’s chief counsel David Addington, and others. Comey will testify that at the time, eight Justice Department officials are prepared to resign if the White House doesn’t back down on forcing the department to sign off on the program. Those officials include FBI director Robert Mueller, US attorney Chuck Rosenberg of the northern Virginia district, and Office of Legal Counsel head Jack Goldsmith. [Washington Post, 6/7/2007]

Entity Tags: Washington Post, US Department of Justice, Robert S. Mueller III, John Ashcroft, Alberto R. Gonzales, Chuck Rosenberg, David S. Addington, Richard (“Dick”) Cheney, James B. Comey Jr., Jack Goldsmith

Timeline Tags: Civil Liberties

Vice President Dick Cheney gives the Congressional leaders known as the “Gang of Eight”—the House speaker and House minority leader, the Senate majority and minority leaders, and the ranking members of the House and Senate intelligence committees—their first briefing on the NSA’s warrantless wiretapping program (see Early 2002). The Democratic leaders at the meeting are House Minority Leader Nancy Pelosi (D-CA), Senate Minority Leader Tom Daschle (D-SD), House Intelligence Committee ranking member Jane Harman (D-CA), and Senate Intelligence Committee ranking member John D. Rockefeller (D-WV). Daschle (D-SD) later recalls the meeting as superficial. Cheney “talked like it was something routine,” Daschle will say. “We really had no idea what it was about.” Unbeknownst to many of the Congressional leaders, White House and Justice Department leaders are locked in a sharp dispute over whether or not the program is legal and should be continued; Cheney is preparing to send White House counsel Alberto Gonzales and chief of staff Andrew Card to Attorney General John Ashcroft’s hospital room to persuade the gravely ill, heavily sedated Ashcroft to overrule acting Attorney General James Comey and reauthorize the program (see March 10-12, 2004). The briefing is designed to give the appearance of Congressional approval for the program. While most Republicans in the briefing give at least tacit approval of the program, some Democrats, as Daschle will recall, expressed “a lot of concerns” over the program’s apparent violation of fundamental Congressional rights. Pelosi later recalls that she “made clear my disagreement with what the White House was asking.” But administration officials such as Gonzales will later say (see July 24, 2007) that the eight Congressional leaders are in “consensus” in supporting the program, a characterization that is patently false (see July 25, 2007). Gonzales will also later testify that today’s briefing does not cover the NSA wiretapping program, later dubbed the “Terrorist Surveillance Program” (TSP), another apparent falsehood contradicted by Democratic senators such as Rockefeller and Russ Feingold, as well as testimony and notes on the hospital room visit made by FBI Director Robert Mueller and a memo from John Negroponte, the director of national intelligence. Many feel that Gonzales is using the moniker “Terrorist Surveillance Program,” not in use until December 2005, to play what reporter Michael Isikoff calls “verbal parsing” and “a semantic game”—since the NSA wiretapping program is not known by this name at the time of the Congressional briefing, Gonzales will imply that the briefing wasn’t about that program. [Newsweek, 8/6/2007; Klein, 2009, pp. 88]
Cheney, Gonzales: Democrats on Board with Illegal Program - In Angler: The Cheney Vice Presidency, a 2008 book by Washington Post reporter Barton Gellman, Gonzales will claim there is a “consensus in the room” among Democrats and Republicans alike, and according to Gellman’s reporting on Gonzales, “four Democrats and four Republicans, duly informed that the Justice Department had ruled something unlawful, said the White House should do it anyway.” Cheney will confirm this allegation during a December 2008 appearance on Fox News. [Klein, 2009, pp. 88]
Domestic Surveillance Began before 9/11? - Cheney fails to inform the lawmakers that the wiretapping program may have begun well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: Richard (“Dick”) Cheney, National Security Agency, Robert S. Mueller III, Terrorist Surveillance Program, Tom Daschle, US Department of Justice, Russell D. Feingold, Nancy Pelosi, John Negroponte, John D. Rockefeller, Alberto R. Gonzales, Andrew Card, Michael Isikoff, Bush administration (43), Jane Harman, James B. Comey Jr., “Gang of Eight”, John Ashcroft

Timeline Tags: Civil Liberties

After senior Justice Department officials object to the possible illegality of the National Security Agency’s secret domestic surveillance program, and refuse to sign off on its continued use, the program is suspended for several months while Justice Department officials conduct a secret audit of the program. Attorney General John Ashcroft will recertify the program at the end of the month (see Late March, 2004). The suspension is prompted by acting Attorney General James Comey’s refusal to approve the program when it comes up for its regular 45-day review, and a subsequent late-night hospital visit by White House officials Andrew Card and Alberto Gonzales to the hospital room of Attorney General John Ashcroft, where they unsuccessfully attempt to pressure Ashcroft, recuperating from surgery, to overrule Comey and approve the program (see March 10-12, 2004). Bush himself has personally reauthorized the program over 30 times since its inception after the 9/11 attacks (see Early 2002), and reauthorizes it himself after Comey and Ashcroft refuse to give it their approval. This reauthorization prompts a threat of mass resignations by Justice Department officials unless the program is brought under increased oversight. Bush will allow the Justice Department to recommend changes to the program, though those changes have never been made public. The Justice Department audits a selection of cases to see how the NSA is running the program, scrutinizing how NSA officials determine that they have probable cause to wiretap US citizens’ phones and e-mail accounts. The results of that audit have not been made public. When the program was first authorized by Bush’s executive order in early 2002, it was so secret that then-Deputy Attorney General Larry Thompson, who was active in most of the government’s most highly classified counterterrorism operations, was not given access to the program. That decision, among other elements of the program, led many Justice Department officials to worry that the program was operating outside of the Constitution and without proper oversight. Comey, Thompson’s successor, was eventually given authorization to take part in the program and to review intelligence data produced by it. Justice Department officials say that Comey takes part in overseeing the reforms that are put into place during the current audit. However, those reforms do not restrict the NSA’s authority to independently choose its eavesdropping targets, and NSA shift supervisors have the authority to decide for themselves whether there is enough evidence against a US citizen to warrant a secret wiretap. No one at the Justice Department or in the White House needs to be consulted before a wiretap is put into place. [New York Times, 12/31/2005]

Entity Tags: US Department of Justice, National Security Agency, Larry D. Thompson, Associated Press, James B. Comey Jr., John Ashcroft, Alberto R. Gonzales, George W. Bush, Andrew Card

Timeline Tags: Civil Liberties

Deputy Attorney General James Comey sends a classified memo to Attorney General John Ashcroft. The contents of the memo are kept secret, but the American Civil Liberties Union (ACLU) will later learn that it is a briefing and summary of the Office of Legal Counsel (OLC)‘s preliminary conclusions regarding the Terrorist Surveillance Program (see March 2002). [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: James B. Comey Jr., American Civil Liberties Union, Terrorist Surveillance Program, US Department of Justice, Office of Legal Counsel (DOJ), John Ashcroft

Timeline Tags: Civil Liberties

Page 1 of 3 (217 events)
previous | 1, 2, 3 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike