The Briefing Dates

I find the list of briefings on the domestic wiretap program as instructive for what it tells us about the program itself (and Bush’s dealings with Congress) as it is as proof that Gonzales is full of shit. In no particular order or structure, here are some thoughts:

Citizens and Voters Need Not Know

This document was declassified on May 17, 2006, before the midterm elections. But this is the first we’re hearing of it. I rather think that John Laesch would have liked to be able to tell voters that Denny Hastert had approved warrantless wiretapping of American citizens three times. I’m sure that Marcy Winograd would have liked to be able to tell voters that Jane Harman had signed off on wireless wiretapping on eight separate occasions. Why didn’t we get this list earlier? (Nevermind … I think I know the answer to that.)

See cboldt for this correction. This list has been available…

Venue

They started having briefings on the Hill after Risen and Lichtblau revealed the program on December 16, 20065. Perhaps that’s because (as Gonzales likes to repeat endlessly) Bush had confirmed the program and it no longer had to be secreted away inside the situation room.

Funding

They’ve conducted three briefings for leaders of defense appropriations subcommittees:

  • December 4, 2001, for Daniel Inouye (then-Chair of Senate Appropriations, Defense Subcommittee) and Ted Stevens (Ranking Member of the same subcommittee)
  • February 28, 2006, for Bill Young (then-Chair of House Appropriations, Defense Subcommittee) and John Murtha (Ranking Member of the same subcommittee)
  • May 11, 2006 for Young and Murtha again

I’m really curious about these briefings. How detailed were they (a particularly pertinent question since Murtha, Young, and Stevens are among the most corrupt members of Congress)? Why did the Senate get briefed once, close to the inception of the program, and the House get briefed almost five years later, when it was under fire (and when, because of Duke Cunningham, the Appropriations Defense Subcommittee was itself under fire)? I assume the program is funded out of some kind of black budget. So why brief the Appropriations leaders at all? Was there some kind of expenditure that was public, that needed approval?

image_print
  1. Anonymous says:

    Wow, you truly amaze me. I read the very same list of briefings and didn’t even come close.

    Thank you for the insight (& don’t stop).

  2. SaltinWound says:

    Thanks for emphasizing again how corrupt Murtha is. While we’re revisiting old Josh Marshall pieces, Jane Hamsher should really do a follow up on Murtha at some point. Her spirited (four part, was it?) defense of Murtha never made any sense. Our position should be that even Murtha is against this war, not that Murtha is some kind of hero.

  3. Anonymous says:

    The real issue is that the policy of the DOJ is now clearly to obstruct justice with respect to culpability arising out of the illegal program that was run between 2002-2004.
    This is the program over which Comey, Goldsmith and all threatened to resign.

    The Administration came into office with a plan to have its constitutionally repugnant plans behind a blanket of claims of National Security. Congress was cut out of oversite on the grounds sung so loudly to the press of leaks by Congressmen leading to these â€fig leaf†briefings in the first place.

    The irony is that Bush really didn’t know what was going on. I would have hated to have been the aide that informed him that warrants were not in fact being issued as he initially claimed.

    The constitutional issues, as I see it, pertain to Bush’s delegation of non-delegable powers. This is the reasonable pitfall of the executive privilege claims. The unknown is how this stands up to any judicial emergence of the theory of the â€unitary executive.â€
    And we know both Roberts and Alito have both publically signed off on some species of this theory.

    The headline: Duplicitous Gonzales Obstructs Investigation into Secret Domestic Surveillance.

  4. lysias says:

    I strongly suspect that the leak of those NSA intercepts after 9/11 that the administration blamed on Congress was in fact the work of the administration. That’s just the way Cheney operates.

    Remember, we learned in the four-part WaPo series on Cheney that there was a similar leak in Nov. 2001 that Cheney blamed on the State Department that almost certainly came from Cheney’s office. And Cheney’s office leaked the identity of Plame for political purposes. And Cheney’s office saw fit to exempt itself from security inspections.

  5. orionATL says:

    sometimes when i read analyses like this one, i just stare at the screen and wonder whether or not there is a bush administration functioning as one entity

    or whether â€the administration†is just a lot of powerful folk freelancing when they feel like it.

    cheney gets a bee in his bonnet; he initiates an action.

    rove gets a wild hair in his ass and he goes of a tear.

    rumsfeld does what he damn well pleases in iraq, and in the united states, too.

    is bush the quiet manager of all these goings on or is he just the clueless figurehead who gives the state of the union speech?

    unitary executive?

    not from a management standpoint apparently.

  6. jazz says:

    EW,

    You being an attorney should well understand the following: A quick way to bring Gonzo down is to file a bar complaint either in DC or Texas. Correct me if I am wrong but perjury is considered a moral turpitude offense under bar ethics and Gonzo could be disbarred for such as finding.

  7. JohnJ says:

    orionATL: â€is bush the quiet manager of all these goings on or is he just the clueless figurehead who gives the state of the union speech?â€

    The latter I suspect. I know a lot of people with personal experience that say â€dry drunkâ€. That is an untreated addict. One way to recreate those missing, drug induced, endorphins is exercise. Problem is that the relief is short lived and needs increasing levels. Does that describe any one we know’s activities?

  8. Anonymous says:

    Jazz you are correct that perjury is considered a crime of moral turpitude; but while EW is smarter than most other lawyers I know (self included) she is not an attorney.

    All the more impressive as she has a brilliant legal mind. EW have you considered teaming up with POGO or CREW? They litigate. At the least, you could have some productive meetings with them. FAS and EFF, too. I would love to see your talents put to use (indirectly) in the courts.

  9. grayslady says:

    Does attendance at these briefings necessarily indicate that the participants approved of the program? Also, as you pointed out with the Cheney briefing (which sounded mostly like a PR exercise), exactly what type of information were participants provided? I’m loathe to accuse either Democrats or Republicans who were briefed of acquiescing to anything if they were not receiving substantive information on what was really going on. And even if they knew exactly what was going on, what could they do about it without violating all these secrecy oaths they’re supposed to take? This whole intelligence secrecy issue seems right up Cheney’s alley. What could be better for keeping the American public in the dark?

  10. William Ockham says:

    ew,

    I think you are being unfair to Congressional leaders. To say that they approved of the warrantless wiretapping is a bit too strong. They were informed and failed to raise the alarm, but we should acknowledge that the Administration manipulated them shamelessly. Until we know the content of the briefings, we really won’t know their culpability. Still, I am appalled at their inaction after the NYT exposé.

  11. jazz says:

    Gary,

    Can you please provide a link to CREW.

    EW,

    I stand corrected. But you do have a great knowledge of the law

  12. richard says:

    Slightly OT: We keep hearing about Fredo’s perjury on the Ashcroft visit, but when are reporters going to charge hard on the other two bombshells that came up in his testimony: 1) The stripping of significant language from the new USA manual and 2) Giving Cheney and his minions direct DOJ access? The latter, in particular, should be front page.

  13. pol says:

    grayslady, I agree with you. We don’t have all of the facts. I want to get these creeps, too, but I don’t want to accuse Dems or Republicans for anything in which they weren’t possibly given all the information, or for which they can’t talk about because of security interests. We’re beginning to eat our own with no real justification whatsoever. Isn’t that what we’re fighting for — the truth?

  14. Anonymous says:

    A wee bit of speculation on where this matter is going.

    This from the new Cunningham, Cheney, CIFA chronology:

    â€November 30, 2005, USNORTHCOM JPEN deletes all TALON reportsâ€

    Is this around the time the NYT article came out?

    If this is the program nixed by Comey at al why was the information retained for 18 mos.
    If this is the case the program was ongoing in that the information was being utilized at for a significant time after it had been challenged in DOJ forcing concessions.

    The dissent must have continued until the deleting action took place and the TSP was amended again in January 2007 with respect to the necessity of FISA warrants. These things would not have happened without ongoing internal dissent.

    The bottom line: it appears Gonazles will rely upon is â€hey we agreed it was illegal and we cancelled it and deleted all the information after Comey’s objectionâ€, but this does not speak to the issue of ongoing internal DOJ dissent and the continuance of the data. We of course do not know when the operational aspects were shut down.

  15. lysias says:

    Dec. 16, 2005 is the date that comes to mind for the NYT article. But I imagine it would have been available in some form to people in the editorial offices for some time before it was actually published.

  16. Anonymous says:

    J Thomason

    No, they’re entirely distinct programs, one using technology the other not at all.

    THe CIFA program was just indpendent reports, some old fart calling a base saying, â€I saw six hippies hanging out in front of the base gate, wearing tiedies. I think they’re terrorists.†And that would go in a database, perhaps with names attached.

    Whereas the domestic wiretap program is stuff collected directly from the telecomm networks. THere is a database issue here, too (one of the probable sources of violation is that NSA kept data from non-terrorist citizens illegally). But it’s a different database.

  17. Anonymous says:

    Is Talon synonymous with CIFA Marcy? I was thinking Talon was one of Poindexter’s revived programs.

    The contextual bottom line I was seeing was using the need for Cheney to be aware of DOJ enforcement so he could come into compliance quickly in monitoring programs as an argument of why he was in the loop especially if the fruit of the â€set of intelligence activities†that Comey and Goldsmith objected to were destroyed or there was administrative difficulty in shutting this program down. Besides this the argument could be made that the channels were not clear between DOJ and the OVP supervising these programs and this was the error that prevented earlier checks of illegality.

    In any event I think the main point is that there must have been ongoing dissent within the DOJ about the TSP after the Ashcroft incident if the program was subsequently amended in Jan. 2007.

    My instincts may be wrong about this but this is where I think Gonzales is vulnerable. He lied about dissent because dissent would have played into the politial uproar about the program the President described. So rather than tell the truth he just said something like â€You know we are all on the same page. Nothing to see hear. We all agree it is legal. Move on to something else.†But the circumstances, especially the recent change claiming to bring the program into the warrant provisons of FISA, show that this was not true.

  18. Anonymous says:

    So in other words maybe CIFA/Talon though not technological is the â€set of intelligence activities†Gonzales now admits gave rise to internal dissent.

  19. cboldt says:

    On the narrow point of â€this is the first we’re hearing of it†(i.e., little publicity before the midterm elections). Marty Lederman said:

    Truly, this isn’t news. I â€obtained†the same document this evening. I did so by downloading it from the Web, where it has been available since it was released to the public on May 17, 2006.

    He links to a copy of the list of meetings, hosted by USA Today.

    See this May 2006 thread and
    this June 2006 paper (caution – 3.5 Mb pdf),
    each of which refers to the same USA Today location for the list of attendees.

  20. pseudonymous in nc says:

    One further point, that you hinted at but didn’t spell out:

    There were no briefings/meetings between the one that prompted Jay Rockefeller’s hand-written letter to Cheney and the March 10th G/8 meeting. Which means we ought to assume that TSP (let’s call it ’Total Surveillance Program’) was substantially the same at the time Comey refused to re-certify it.

  21. cboldt says:

    IIRC, the briefed Congresscritters were read the riot act as to the classified nature of the program, and risked being cut out of future briefings (at least), or being charged with illegal release of classified information if they â€raised the alarm.â€

  22. William Ockham says:

    cboldt,

    You are correct that one of the manipulative techniques that the Administration used was the threat of being charged with the illegal release of classified information. I am still disappointed by our representatives. They either have no courage or no convictions (or possibly neither).

  23. Anonymous says:

    EW-I found your post â€More Funny Business with Record Keeping†from July 2, 2007 which explains the relationship between Talon and CIFA. I appreciate your sending me out to do some more research. I am sure I am not able to see all these matters as discrete and deleting records of domestic surveillance on Nov. 30, 2005 right before the NYT article, an article held by the NYT for nearly a year until after the 2004 election, seems to me to be causally related.

    I suppose the relevant question now becomes whether there was a consolidating funtion within DHS or elsewhere which drew together CIFA/TALON, TSP, Eschelon and other data bases effectively creating a secret intelligence cadre of domestic data obtained both from legitimate and illegitimate sources?

  24. Carolyn in Baltimore says:

    Great work as usual, Marcy!

    Now I am seeing a need for all of the intelligence programs that are controversial – a chart of when started, when stopped, when revived secretly etc as well as brief summaries of their tech, intent, who is being spied on, who is involved, and what we suspect we don’t know yet.
    It is hard to keep all the illegal/subversive ways our gov’t is spying on us straight!

  25. Anonymous says:

    J Thomason

    Talon is completely separate, done under largely different laws, and managed through a different area of DOD. If they were going to cover up the domestic surveillance program, they would have secured the tap rooms in SF, not delete a completely unrelated database.

  26. John Lopresti says:

    Besides the conduit signals there is an airborne component, and technologies exist for various forms of aerial intercepts; for example the press reports of the US eliciting the ire of a certain Asian land when a US plane equipped to intercept cellphone relay antenna traffic landed in an unacceptable locale in an emergency in 2000. My guess during the NYC debacle was the US government focused all such aerial signal intercepting devices upon our own soil, since that was where the action was.

    And a few link updates, with appreciation for the list link repair: Laesch has a FL campaign 2008 site US House of Representatives campaign already; he should do like Marcy and add to the 2006 campaign site link an automatic forwarding to the currently active site. Marcy W’s campaign began a mere three months before the primary, and gathered over $400k; she won 38% of the vote; Harman endorsers withdrew support pell mell, and in unprecedented fashion the CAdem party convention began without the Dem Party’s endorsing Harman, Marcy W’s campaign having built amazing momentum quickly by that time. Her former website forwards the visitor to the new site, WinogradWatchdog. She had a funny remark in an interview that admitted she planned an ’08 run, based on the costliness of running the first time; their organization carried forward considerable debt. Yet, she speaks with a clearly resonant voice in her part of southern CA. And, yes, the homepage on her website has a picture of her with a dog, a feature sure to attract TNH readers.

  27. Anonymous says:

    Of course this had to exist. Not to be snarky EW but the analysis would not occur in the tap rooms and there would be an effort to consolidate both technological data and hard asset data for it to have any utility:

    â€ADVISE (Analysis, Dissemination, Visualization, Insight, and Semantic Enhancement) is a â€research and development program within the Department of Homeland Security (DHS), part of its three-year-old ’Threat and Vulnerability, Testing and Assessment’ portfolio. The TVTA received nearly $50 million in federal funding this year,†Mark Clayton reported in the February 9, 2006, Christian Science Monitor.

    ADVISE is â€at the core†of a â€massive computer system†â€being developed by the US government … that can collect huge amounts of data and, by linking far-flung information from blogs and e-mail to government records and intelligence reports, search for patterns of terrorist activity,†Clayton wrote.

    â€The system – parts of which are operational, parts of which are still under development – is already credited with helping to foil some plots. It is the federal government’s latest attempt to use broad data-collection and powerful analysis in the fight against terrorism. But,†Clayton wrote, â€by delving deeply into the digital minutiae of American life, the program is also raising concerns that the government is intruding too deeply into citizens’ privacy.â€

    http://www.sourcewatch.org/index.php?title=ADVISE

    In any event I could make this a live link if I had a menu of the editing code for the comments field for TypeKey. I would appreciate a reference in this respect so I could provide this courtesy.

  28. Mauimom says:

    Richard @ 12:59

    Slightly OT: We keep hearing about Fredo’s perjury on the Ashcroft visit, but when are reporters going to charge hard on the other two bombshells that came up in his testimony: 1) The stripping of significant language from the new USA manual and 2) Giving Cheney and his minions direct DOJ access? The latter, in particular, should be front page.

    I totally agree. Particularly the Cheney-DOJ part.

  29. lysias says:

    Did direct DOJ access for Cheney and his office mean that they could consult DOJ case files on computer?

  30. Anonymous says:

    acne 244 [url=http://burmanita08.za.pl]acne 244[/url]
    acne 749 [url=http://burmanita05.za.pl]acne 749[/url]
    acne 185 [url=http://burmanita05.za.pl]acne 185[/url]
    acne 1392 [url=http://burmanita08.za.pl]acne 1392[/url]
    acne 394 [url=http://burmanita06.za.pl]acne 394[/url]
    acne 1047 [url=http://burmanita07.za.pl]acne 1047[/url]
    acne 843 [url=http://burmanita07.za.pl]acne 843[/url]
    acne 1052 [url=http://burmanita08.za.pl]acne 1052[/url]
    acne 1453 [url=http://burmanita05.za.pl]acne 1453[/url]
    acne 586 [url=http://burmanita06.za.pl]acne 586[/url]
    acne 178 [url=http://burmanita06.za.pl]acne 178[/url]
    acne 889 [url=http://burmanita05.za.pl]acne 889[/url]
    acne 301 [url=http://burmanita05.za.pl]acne 301[/url]
    acne 277 [url=http://burmanita05.za.pl]acne 277[/url]
    acne 831 [url=http://burmanita07.za.pl]acne 831[/url]
    acne 1431 [url=http://burmanita07.za.pl]acne 1431[/url]
    acne 730 [url=http://burmanita06.za.pl]acne 730[/url]
    acne 266 [url=http://burmanita06.za.pl]acne 266[/url]
    acne 064 [url=http://burmanita08.za.pl]acne 064[/url]
    acne 902 [url=http://burmanita06.za.pl]acne 902[/url]
    acne 1156 [url=http://burmanita08.za.pl]acne 1156[/url]
    acne 1463 [url=http://burmanita07.za.pl]acne 1463[/url]
    acne 518 [url=http://burmanita06.za.pl]acne 518[/url]
    acne 1366 [url=http://burmanita06.za.pl]acne 1366[/url]
    acne 762 [url=http://burmanita06.za.pl]acne 762[/url]
    acne 942 [url=http://burmanita06.za.pl]acne 942[/url]
    acne 994 [url=http://burmanita06.za.pl]acne 994[/url]
    acne 1048 [url=http://burmanita08.za.pl]acne 1048[/url]
    acne 1038 [url=http://burmanita06.za.pl]acne 1038[/url]
    acne 1149 [url=http://burmanita05.za.pl]acne 1149[/url]
    acne 1058 [url=http://burmanita06.za.pl]acne 1058[/url]
    acne 474 [url=http://burmanita06.za.pl]acne 474[/url]
    acne 1167 [url=http://burmanita07.za.pl]acne 1167[/url]
    acne 694 [url=http://burmanita06.za.pl]acne 694[/url]
    acne 1047 [url=http://burmanita07.za.pl]acne 1047[/url]
    acne 941 [url=http://burmanita05.za.pl]acne 941[/url]
    acne 1101 [url=http://burmanita05.za.pl]acne 1101[/url]
    acne 488 [url=http://burmanita08.za.pl]acne 488[/url]
    acne 530 [url=http://burmanita06.za.pl]acne 530[/url]
    acne 1441 [url=http://burmanita05.za.pl]acne 1441[/url]

  31. Anonymous says:

    insurance 1107 [url=http://sureunsure01.za.pl]insurance 1107[/url]
    insurance 1142 [url=http://sureunsure02.bebto.com]insurance 1142[/url]
    insurance 1160 [url=http://sureunsure02.bebto.com]insurance 1160[/url]
    insurance 991 [url=http://sureunsure01.bebto.com]insurance 991[/url]
    insurance 126 [url=http://sureunsure08.friko.pl]insurance 126[/url]
    insurance 1040 [url=http://sureunsure02.bebto.com]insurance 1040[/url]
    insurance 1335 [url=http://sureunsure01.za.pl]insurance 1335[/url]
    insurance 228 [url=http://sureunsure08.friko.pl]insurance 228[/url]
    insurance 1157 [url=http://sureunsure07.friko.pl]insurance 1157[/url]
    insurance 708 [url=http://sureunsure08.friko.pl]insurance 708[/url]
    insurance 907 [url=http://sureunsure01.bebto.com]insurance 907[/url]
    insurance 1322 [url=http://sureunsure02.bebto.com]insurance 1322[/url]
    insurance 314 [url=http://sureunsure02.bebto.com]insurance 314[/url]
    insurance 288 [url=http://sureunsure08.friko.pl]insurance 288[/url]
    insurance 213 [url=http://sureunsure01.za.pl]insurance 213[/url]
    insurance 961 [url=http://sureunsure01.bebto.com]insurance 961[/url]
    insurance 620 [url=http://sureunsure02.bebto.com]insurance 620[/url]
    insurance 694 [url=http://sureunsure02.za.pl]insurance 694[/url]
    insurance 355 [url=http://sureunsure01.bebto.com]insurance 355[/url]
    insurance 1209 [url=http://sureunsure01.za.pl]insurance 1209[/url]
    insurance 1259 [url=http://sureunsure07.friko.pl]insurance 1259[/url]
    insurance 532 [url=http://sureunsure02.za.pl]insurance 532[/url]
    insurance 134 [url=http://sureunsure02.bebto.com]insurance 134[/url]
    insurance 290 [url=http://sureunsure02.bebto.com]insurance 290[/url]
    insurance 647 [url=http://sureunsure07.friko.pl]insurance 647[/url]
    insurance 716 [url=http://sureunsure02.bebto.com]insurance 716[/url]
    insurance 654 [url=http://sureunsure08.friko.pl]insurance 654[/url]
    insurance 268 [url=http://sureunsure02.za.pl]insurance 268[/url]
    insurance 1039 [url=http://sureunsure01.bebto.com]insurance 1039[/url]
    insurance 1388 [url=http://sureunsure02.bebto.com]insurance 1388[/url]
    insurance 716 [url=http://sureunsure02.bebto.com]insurance 716[/url]
    insurance 903 [url=http://sureunsure01.za.pl]insurance 903[/url]
    insurance 853 [url=http://sureunsure01.bebto.com]insurance 853[/url]
    insurance 390 [url=http://sureunsure08.friko.pl]insurance 390[/url]
    insurance 1422 [url=http://sureunsure08.friko.pl]insurance 1422[/url]
    insurance 1187 [url=http://sureunsure07.friko.pl]insurance 1187[/url]
    insurance 808 [url=http://sureunsure02.za.pl]insurance 808[/url]
    insurance 937 [url=http://sureunsure01.bebto.com]insurance 937[/url]
    insurance 037 [url=http://sureunsure01.bebto.com]insurance 037[/url]
    insurance 880 [url=http://sureunsure02.za.pl]insurance 880[/url]