Saturday, March 25, 2006

The Genesis

Saturday, March 26, 2006

Bill of Rights
Amendment I
Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.

Man will ultimately be governed by God or by tyrants. -Ben Franklin

At the very top of the scale of moral values [the intellectuals] place the possession of concrete advantages, of material power and the means by which they are procured; and they hold up to scorn the pursuit of truly spiritual advantages, of non-practical or disinterested values.

What constitutes, in Plato’s words, the “good life”?

As Gandhi said, “We must be the change we wish to see in the world.”

The creatures outside looked from pig to man, and from man to pig, and from pig to man again; but already it was impossible to say which was which." George Orwell, Animal Farm

I see in the near future a crisis approaching that unnerves me and causes me to tremble for the safety of my country . . . corporations have been enthroned and an era of corruption in high places will follow, and the money of the country will endeavor to prolong its reign by working upon the prejudices of the people until all wealth is aggregated in a few hands and the Republic is destroyed. I feel at this moment more anxiety for the safety of my country than ever before, even in the midst of war.
-- Abraham Lincoln, November 21, 1864

3 January 2006
From: State of War: the Secret History of the CIA and the Bush Administration, James Risen, published 3 January 2006, pp. 42-60.
Hayden wanted the American public to know that the NSA was abiding the rules.
"Could there be abuses? Of course, there could, but I am here looking you and the American people in the eye and saying there are not," Hayden told CNN. "After Church and Pike, on this question, the ball and strike count on the agency is no balls and two strikes," Hayden added. "We don't take any pitches that are close to the strike zone. We are very, very careful. We can't go back to the American people with, 'Oh, well, we're sorry for this one, too.' We don't get close to the Fourth Amendment.
Hayden gave speeches. He went on television, and he talked to newspaper reporters and to authors writing books about the agency. He even hosted off-the-record dinners for the press at his horne at Fort Meade. A key element of Hayden's case was his argument that the NSA was struggling to cope with the rapid pace of change in an age of information overload, a new world of cell phones and Black-Berries and Internet telephone calls. The NSA was collecting more communications than anyone could ever listen to; even its supercomputers, with artificial-intelligence software, had trouble sorting the wheat from the chaff. Downplaying the NSA's capabilities, Hayden liked to say that the NSA was once an information-age organization in the industrial age, and now it was an information-age organization in the information age. It was losing its competitive edge. Commercially available communications technology was catching up. Hayden's implicit message was that the NSA was too archaic, maybe even too incompetent, to spy on America. Hayden didn't say that the NSA was a toothless giant, but he certainly wanted everyone to believe that the NSA was not to be feared.
"Despite what you've seen on television, our agency doesn't do alien autopsies, track the location of your automobile by satellite, nor do we have a squad of assassins," Hayden said reassuringly in a speech at American University in Washington in 2000. "The best 1 can hope for now is to wipe away some of the mystique surrounding the National Security Agency."
But that was Michael Hayden before 9/11.
Since the attacks, the NSA, with Hayden at the helm until 2005, has been transformed by the Bush administration, in ways that Hayden and other administration officials don't want to talk about. In fact, for the first time since the Watergate-era abuses, the NSA is spying on Americans again, and on a large scale.
The Bush administration has swept aside nearly thirty years of rules and regulations and has secretly brought the NSA back into the business of domestic espionage. The NSA is now eavesdropping on as many as five hundred people in the United States at any given time and it potentially has access to the phone calls and e-mails of millions more. It does this without court-approved search warrants and with little independent oversight.
President Bush has secretly authorized the NSA to monitor and eavesdrop on large volumes of telephone calls, e-mail messages, and other Internet traffic inside the United States to search for potential evidence of terrorist activity, without search warrants or any new laws that would permit such domestic intelligence collection. Under a secret presidential order signed in early 2002, only months after the September 11 attacks, President Bush has given the NSA the ability to conduct surveillance on communications inside the United States. The secret decision by the president has opened up America's domestic telecommunications network to the NSA in unprecedented and deeply troubling new ways, and represents a radical shift in the accepted policies and practices of the modern U.S. intelligence community.
The NSA is now tapping into the heart of the nation's telephone network through direct access to key telecommunications switches that carry many of America's daily phone calls and e-mail messages. Several government officials who know about the NSA operation have come forward to talk about it because they are deeply troubled by it, and they believe that by keeping silent they would become complicit in it. They strongly believe that the president's secret order is in violation of the Fourth Amendment of the Constitution, which prohibits unreasonable searches, and some of them believe that an investigation should be launched into the way the Bush administration has turned the intelligence community's most powerful tools against the American people.
One government lawyer who is aware of the NSA domestic surveillance operation told reporter Eric Lichtblau that the very few people at the Justice Department who are aware of its existence simply refer to it as "the Program." It may be the largest domestic spying operation since the 1960s, larger than anything conducted by the FBI or CIA inside the United States since the Vietnam War.
In order to overturn the system established by FISA in 1978, and bring the NSA back into domestic wiretaps without court approval, administration lawyers have issued a series of secret legal opinions, similar to those written in support of the harsh interrogation tactics used on detainees captured in Iraq and Afghanistan. The Bush administration legal opinions that supported the use of harsh interrogation techniques on al Qaeda detainees have, of course, proven controversial, drawing complaints from allies, objections from civil liberties advocates, and court challenges. The administration faced its first serious legal rebuke in June 2004 when the U.S. Supreme Court rejected the administration's effort to hold "enemy combatants" without a hearing. The court warned that "a state of war is not a blank check for the president."
The same could be said about the Program. Yet the NSA domestic spying operation has remained secret, and so the legal opinions and other documents related to the NSA program are still classified.
The administration apparently has several legal opinions to support the NSA operation, written by lawyers at the White House, the CIA, the NSA, and the Justice Department. They all rely heavily on a broad interpretation of Article Two of the Constitution, which grants power to the president as commander in chief of the armed forces. Relying largely on those constitutional powers, Congress passed a resolution just days after the September 11 attacks granting the president the authority to wage a global war on terrorism, and Bush administration lawyers later decided that the war resolution provided the legal basis they needed to support the NSA operation to eavesdrop on American citizens.
While the Bush administration has never publicly discussed the NSA operation, the Justice Department did hint at the administration's thinking on domestic spying in a little-noticed legal brief in an unrelated court case in 2002. That brief said that "the Constitution vests in the president inherent authority to conduct warrantless intelligence surveillance (electronic or otherwise) of foreign powers or their agents, and Congress cannot by statute extinguish that constitutional authority." The search for foreign "agents" has led the NSA to peer into domestic streams of data.
Debate within the government about the moral and legal issues involved in the NSA operation has been extremely limited because only a handful of high-ranking government officials are aware of the existence of the eavesdropping program. "It was a closed program," said one very senior administration official. "People normally in the chain didn't have access to it."
At the Justice Department, then-Attorney General John Ashcroft was one of the few people informed, and he then brought in a small, select group of like-minded conservative lawyers to help craft some of the legal opinions to buttress the Program. They may have been some of the same lawyers involved in the legal opinions supporting the harsh interrogation techniques.
The NSA eavesdropping operation has been hidden inside a "special access program," a level of secrecy reserved for the government's most sensitive covert operations. "This is the biggest secret I know about," said one official who was deeply troubled by what he knew.
Bush administration officials justify the presidential order by arguing that existing rules curbing the domestic powers of the NSA and CIA impeded the United States in detecting and preventing terrorist attacks. They say that the NSA domestic spying operation is critical to the global war on terrorism, although they offer few specifics. They have not explained why any terrorist would be so naive as to assume that his electronic communication was impossible to intercept.
The small handful of experts on national security law within the government who know about the NSA program say they believe it has made a mockery of the public debate over the Patriot Act. The Patriot Act of 2001 has been widely criticized for giving the government too much power to engage in secret searches and to spy on suspects, and even some Republicans chafed at the idea of giving the government still more surveillance powers under an extended and expanded version. The Patriot Act has increased the ability of the nation's intelligence and law-enforcement agencies to monitor conversations and Internet traffic by terrorist suspects with the approval of the special FISA court. But it still requires the FBI to obtain search warrants from the FISA court each time it wants to eavesdrop on a telephone conversation, e-mail message, or other form of communication within the United States. In order to obtain a warrant from the FISA court, the FBI must present evidence to show that the target is linked to a terrorist organization or other foreign agent or power. Even then, the FBI has, in comparison with the NSA, relatively limited technological resources and doesn't have the ability to monitor huge telecommunications networks. It lacks NSA's banks of supercomputers at Fort Meade, believed to be home to the greatest concentration of computing power in the world.
The Patriot Act has given no new powers to the NSA. The Bush administration purposely did not seek congressional approval for the NSA operation, apparently because the White House recognized that it would be too controversial and would almost certainly be rejected. "There is nothing explicit in the Patriot Act for NSA," said one former congressional aide who was involved in the drafting of the Patriot Act, but who was unaware of the NSA operation. "Their surveillance is supposed to be directed outside the United States."
It is now clear that the White House went through the motions of the public debate over the Patriot Act, all the while knowing that the intelligence community was secretly conducting a far more aggressive domestic surveillance campaign. "This goes way beyond the Patriot Act," said one former official familiar with the NSA operation.
President Bush's secret order has given the NSA the freedom to employ extremely powerful computerized search programs -- originally intended to scan foreign communications -- in order to scrutinize large volumes of American communications. It is difficult to know the precise size of the NSA operation, but one indication of its large scale is the fact that administration officials say that one reason they decided not to seek court-approved search warrants for the NSA operation was that the volume of telephone calls and e-mails being monitored was so big that it would be impossible to get speedy court approval for all of them. It is certainly true that when the FISA court was created, Congress never envisioned that the NSA would be involved in a massive eavesdropping operation inside the United States. No one in the 1970s could have predicted the enormous growth of telecommunications traffic in the United States, or the degree to which Americans would become addicted to digital, electronic communications. Today, industry experts estimate that approximately 9 trillion e-mails are sent in the United States each year. Americans make nearly a billion cell phone calls and well over a billion land line calls each day.
NSA's technical prowess, coupled with its long-standing relationships with the nation's major telecommunications companies, has made it easy for the agency to eavesdrop on large numbers of people in the United States without their knowledge. Following President Bush's order, U.S. intelligence officials secretly arranged with top officials of major telecommunications companies to gain access to large telecommunications switches carrying the bulk of America's phone calls. The NSA also gained access to the vast majority of American e-mail traffic that flows through the U.S. telecommunications system. The identities of the companies involved have been kept secret. Unknown to most Americans, the NSA has extremely close relationships with both the telecommunications and computer industries, according to several government officials. Only a very few top executives in each corporation are aware of such relationships or know about the willingness of the corporations to cooperate on intelligence matters.
The main rationale behind the Program, officials said, was that existing rules curbing the domestic powers of the NSA and CIA had left gaps in the ability of the United States to detect and prevent terrorist attacks. They say that one such gap had opened up because many purely international communications -- telephone calls and e-mail messages from the Middle East to Asia, for example -- end up going through telecommunications switches that are physically based in the United States. As a result, the rules that limit domestic intelligence gathering by the NSA have meant that such international calls could not be monitored, since they were transiting the United States. Some phone calls and e-mail traffic among terrorists operating overseas were being missed by American counterterrorism investigators.
The new presidential order has given the NSA direct access to those U.S.-based telecommunications switches through "back doors." Under the authority of the presidential order, a small group of officials at NSA now monitors telecommunications activity through these domestic switches, searching for terrorism-related intelligence.
To understand how the Bush administration is spying on the American people, it is important to know a few basics about the U.S. telecommunications network. The telephone network today is digital and computerized, but is still built around a switching system that routes calls from city to city, or country to country, as efficiently and quickly as possible.
In addition to handling telephone calls from, say, Los Angeles to New York, the switches also act as gateways into and out of the United States for international telecommunications. A large volume of purely international telephone calls -- calls that do not begin or end in America -- also now travel through switches based in the United States. Telephone calls from Asia to Europe, for example, may go through the United States-based switches. This so-called transit traffic has dramatically increased in recent years as the telephone network has become increasingly globalized. Computerized systems determine the most efficient routes for digital "packets" of electronic communications depending on the speed and congestion on the networks, not necessarily on the shortest line between two points. Such random global route selection means that the switches carrying calls from Cleveland to Chicago, for example, may also be carrying calls from Islamabad to Jakarta. In fact, it is now difficult to tell where the domestic telephone system ends and the international network begins.
In the years before 911, the NSA apparently recognized that the remarkable growth in transit traffic was becoming a major issue that had never been addressed by FISA or the other 1970s-era rules and regulations governing the U.S. intelligence community. Now that foreign calls were being routed through switches that were physically on American soil, eavesdropping on those calls might be a violation of the regulations and laws restricting the NSA from spying inside the United States.
But transit traffic also presented a major opportunity. If the NSA could gain access to the American switches, it could easily monitor millions of foreign telephone calls, and do so much more consistently and effectively than it could overseas, where it had to rely on spy satellites and listening stations to try to vacuum up telecommunications signals as they bounced through the air. Of course, that would mean NSA would also have direct access to the domestic telephone network as well.
Any debate within the NSA about the legalities of monitoring transit traffic became moot after 9/11. President Bush was determined to sweep away the peacetime rules that had curbed the activities of the U.S. intelligence community since the 1970s, and he readily agreed to give the NSA broad new powers. The Bush administration's answer has been to place the NSA right into the middle of the American communications bloodstream by giving the agency the secret "trapdoors" into the switching system. One outside expert on communications privacy who previously worked at the NSA said that the United States government has recently been quietly encouraging the telecommunications industry to increase the amount of international communications traffic that is routed through American-based switches. It appears that at least one motive for doing so may be to bring more international calls under NSA scrutiny.
According to government officials, some of the most critical switches are in the New York area, a key intersection between the domestic and international telecommunications networks. Switching facilities in the region feed out to telecommunications cables that dive into the Atlantic Ocean bound for Europe and beyond. The NSA now apparently has access into those switches, allowing it to monitor telecommunications traffic as it enters and exits the United States.
In addition, the NSA has the ability to conduct surveillance on the e-mail of virtually any American it chooses to target. One of the secrets of the Internet is that its infrastructure is dominated by the United States, and that much of the world's e-mail traffic, at one time or another, flows through telecommunications networks that are physically on American soil. E-mail between Germany and Italy, for example, or Pakistan and Yemen, is often routed through America. The secret presidential order has given the NSA the freedom to peruse that international e-mail traffic -- along with the e-mail of millions of Americans.
In the Program, the NSA is eavesdropping both on transit traffic -- calls from one foreign location to another that are routed through the United States by international telecommunications systems -- and on telephone calls and e-mail between people inside the United States and others overseas. Officials who defend the Program claim that the NSA tries to minimize the amount of purely domestic telephone and Internet traffic among American citizens that it monitors, to avoid violating the privacy rights of U.S. citizens. But there is virtually no independent oversight of NSA's use of its new power. With its direct access to the U.S. telecommunications system, there seems to be no physical or logistical obstacle to prevent the NSA from eavesdropping on anyone in the United States that it chooses.
NSA also claims that it is eavesdropping only on people suspected of having links to terrorism, but there is no way to confirm exactly who in the United States is being monitored by the agency. According to officials familiar with the NSA operation, it was launched in 2002 after the CIA began to capture high-ranking al Qaeda operatives overseas. At the time of their capture, the CIA also seized their computers, cell phones, and personal phone directories and flew them to the United States for examination.
As the al Qaeda operatives began to fall into American hands, their seized laptops, cell phones, and directories led to the discovery of telephone numbers and e-mail addresses of people with whom they had communicated all around the world. The CIA turned those names, addresses, and numbers over to the NSA, which then began monitoring those numbers, as well as the numbers of anyone in contact with them, and so on outward in an expanding network of phone numbers and Internet addresses, both in the United States and overseas.
In the Program, the NSA determines, on its own, which telephone numbers and e-mail addresses to monitor. The NSA doesn't have to get approval from the White House, the Justice Department, or anyone else in the Bush administration before it begins eavesdropping on a specific phone line inside the United States. Instead, it has set up its own internal checklist to determine whether there is "probable cause" to begin surveillance. The Bush administration argues that the NSA checklist substitutes for the determination of probable cause in a court of law, but neither federal prosecutors nor other Justice Department attorneys even review the case of a suspect before the NSA begins to listen to his or her phone lines. Occasionally, top Justice Department officials audit the NSA program, but the NSA unilaterally decides on whom to spy. Bush's executive order gives the NSA broad latitude to decide what might constitute a suspicious phone number or e-mail address.
The existence of the Program has been kept so secret that senior Bush administration officials have gone to great lengths to hide the origins of the intelligence it gathers. When the NSA finds potentially useful intelligence in the U.S.-based telecommunications switches, it is "laundered" before it is widely distributed to case officers at the CIA or special agents of the FBI, officials said. Reports are said not to identify that the intelligence came from intercepts of U.S.-based telecommunications.
Bush administration officials offer conflicting information about whether intelligence gathered from the warrantless wiretaps is being used in criminal cases inside the United States. One senior administration official insisted that it never has been used in a criminal trial, but other top officials argued that the eavesdropping program has proved valuable in domestic terrorism investigations. Actually, both statements may be true. It appears that the NSA wiretaps are being used to identify suspects in the United States. But because the intelligence based on the warrantless wiretaps would almost certainly not be admissible in an American court, it is possible that the Bush administration is not attempting to take those cases to trial. Several high-profile terrorism-related cases since 9/11 have ended in plea bargains and out-of-court settlements; few have actually gone to trial. One reason for that legal strategy may be that the administration is fearful of getting caught conducting illegal surveillance operations.
The government has a number of ways to cover up the NSA's role in the domestic surveillance of people inside the United States. In some instances, the government seeks FISA court approval for wiretaps on individuals who have already been secretly subjected to warrantless eavesdropping by the NSA.
The Bush administration justifies that procedure by saying that the government obtains search warrants if it wants to eavesdrop on the purely domestic telephone calls -- between two phones inside the United States -- of the individuals under surveillance through the NSA program. Since the NSA is supposed to focus on international "transit traffic" and telephone calls and e-mail messages between someone in the United States and someone overseas, government officials say that they seek FISA warrants when they decide to go further to monitor all of the communications of an individual suspect.
But that process of obtaining a search warrant is clearly tainted.
The Bush administration is obtaining FISA court approval for wiretaps at least in part on the basis of information gathered from the earlier warrantless eavesdropping. The government is apparently following that practice with increasing frequency; by the estimate of two lawyers, some 10 percent to 20 percent of the search warrants issued by the secret FISA court now grow out of information generated by the NSA's domestic surveillance program.
Bush administration officials say that the NSA is using the Program to conduct surveillance on the telephone and e-mail communications of about seven thousand people overseas. They also acknowledge that the NSA is targeting the communications of about five hundred people inside the United States. Each one of those individuals is likely to make several phone calls and send several e-mails each day, which could mean that the NSA is eavesdropping on thousands of telephone calls, e-mail messages, and other communications inside the United States on a daily basis. Over time, the NSA has certainly eavesdropped on millions of telephone calls and e-mail messages on American soil.
The expansion of NSA's role from spying on foreigners to conducting domestic surveillance has implications that are sure to provoke objections from civil liberties advocates. Even some senior officials within the administration have raised questions about the Program's legality. Government officials who were aware of the surveillance program "just assumed that something illegal was going on," said one Justice Department official. "People just looked the other way because they didn't want to know what was going on."
Some senior Bush administration officials learned the outlines of the NSA operation but were never officially briefed and were stunned that the White House and Justice Department would approve the domestic spying. "This is really a sea change," said a former senior law enforcement official who questioned both its legal and public-policy aspects. "It's almost a mainstay of this country that the NSA only does foreign searches."
After President Bush signed the secret order authorizing the NSA eavesdropping operation, the Bush administration quietly notified the chief judge on the secret FISA court that approves national security wiretaps. That judge was then-U.S. District Court Judge Royce C. Lamberth, a genial, rotund Texan and a Republican. The administration didn't ask for his approval, and he didn't stand in the way when the government decided not to seek search warrants for the NSA program.
The NSA operation was scaled back, at least briefly, in the spring of2004 when the federal judge who succeeded Lamberth as chief of the FISA court raised questions about how the NSA program was being used to generate intelligence. The concerns raised by District Court Judge Colleen Kollar-Kotelly clearly rattled the Bush administration. One official said he believed that the Program was effectively halted for about three weeks. Other top administration officials suggested that they abandoned some of the most aggressive techniques used in the NSA surveillance operation after the judge complained.
Some congressional leaders have been notified about the Program, but only in extraordinarily secret fashion and only in ways that guarantee they feel constrained from raising objections to it. Even when one lawmaker did secretly raise concerns, he was ignored by the White House. In 2002, soon after the NSA operation began, top congressional leaders from both political parties were brought to Vice President Dick Cheney's White House office and were briefed about it by Cheney, Hayden, and then-CIA director George Tenet. The congressional leaders, including Democratic Senator Bob Graham of Florida and Republican Senator Richard Shelby of Alabama, at the time the chairman and vice chairman of the Senate Select Committee on Intelligence, respectively, were not permitted to bring staff members to the meeting and were told not to discuss the matter with anyone else. It was difficult for the congressional leaders to ask any questions about the Program, because they were unable to ask their staff to do any research or oversight of the NSA operation. The congressional leaders apparently knew only what Cheney and other top administration officials told them about the Program.
Later, after new lawmakers took over the intelligence committees, only one congressional leader, Senator Jay Rockefeller, a Democrat of West Virginia, raised any concerns with the White House. After he was first briefed on the matter in early 2003, Senator Rockefeller wrote a letter to Cheney saying that he was troubled by the NSA operation and its potential for the abuse of the civil liberties of American citizens.
Rockefeller told the White House in advance that he was planning to write the letter raising objections. In response, he was told by administration officials that he had to write the letter himself. Rockefeller followed the directions and handed over the letter, but there is no evidence that he ever received a response from Cheney.
The few other Democrats who have been briefed on the operation have fallen into line with the White House, perhaps intimidated by the broad public support for tough counterterrorism measures following 9/11. But at least one other senior Democrat who was briefed later regretted accepting the administration's decision to launch the operation and realized that the White House had trapped the congressional leaders. By giving the lawmakers secret briefings with no staff present and then demanding that they never discuss the matter with anyone, the congressional leaders were paralyzed. As time wore on, it became increasingly difficult for Democrats to protest the operation, since the White House could argue that they had been receiving briefings for years and had barely complained.
One government lawyer said he went to a congressional official in 2004 to reveal what he knew about the NSA eavesdropping operation because he believed that it was unconstitutional. But nothing happened as a result of his congressional contacts. He did not know that congressional leaders had already been notified.
Apart from the very small number of senior senators and congressmen who have been briefed by the White House on the NSA program, most members of Congress believe that FISA ended, once and for all, the right of the government to conduct secret wiretaps inside the United States without search warrants or court approval. Some experts in national security law say that past presidents have periodically -- and very quietly -- asserted that despite FISA, they reserved the right to order warrantless wiretaps in the United States under extreme circumstances for national security purposes. But that never became an issue with Congress in the past, because until now, no president has ever actually exercised that authority since FISA became law.
The legal opinions supporting the NSA operation followed secret deliberations over expanding the NSA's role. For example, just days after the September 11, 2001 attacks, John Yoo, a Justice Department lawyer in the Office of Legal Counsel, wrote an internal memorandum that argued that the government might use "electronic surveillance techniques and equipment that are more powerful and sophisticated than those available to law enforcement agencies in order to intercept telephonic communications and observe the movement of persons but without obtaining warrants for such uses." Yoo noted that while such actions could raise constitutional issues, in the face of devastating terrorist attacks, he wrote, "the government may be justified in taking measures which in less troubled conditions could be seen as infringements of individual liberties."
But that was not an argument that the Bush administration wanted to test openly in Congress. Seeking congressional approval was viewed as politically risky because the proposal would be certain to face intense opposition from civil liberties groups. In order to support the White House decision not to seek new legislation to support the NSA operation, administration lawyers secretly argued that new laws were unnecessary because the post-9/11 congressional resolution on the war on terror provided ample authorization.
In the end, the administration's justifications for the NSA domestic surveillance operation fail to explain adequately why it would not be possible to conduct surveillance of terrorist suspects with court­approved search warrants under the FISA rules. Several government officials said they have not had any trouble obtaining search warrants for wiretaps from the FISA court since the September 11 attacks. The number of warrants approved by the court doubled between 2001 and 2003, when more than 1,700 foreign intelligence warrants were executed, according to the Justice Department. The government has also not had any difficulty in keeping those court­approved wiretaps secret. In the most sensitive cases, the wiretap requests can be handled under such tight security that knowledge of them is restricted to the highest levels of the executive branch on a need-to-know basis.
During the public debate over the Patriot Act, Bush administration officials noted reassuringly that the legislation would not expand the powers of the NSA, as if to underscore their argument that privacy concerns over the Patriot Act were being exaggerated by critics of the legislation. Even Yoo made the point, in an op-ed piece in the Wall Street Journal that the Patriot Act's critics had a cartoonish view of the law. "Civil libertarians would have us believe that the Patriot Act allows CIA and NSA agents to roam freely through the country detaining anyone they please," Yoo wrote. "Nothing could be further from the truth."
One of the most worrisome aspects of the NSA's move into domestic surveillance is that it appears to be part of a broader series of policies and procedures put in place by the Bush administration that threaten to erode civil liberties in the United States. Across the administration, many questionable actions taken in the heat of the moment after the September 11attacks have quietly become more permanent, lowering the bar on what is acceptable when it comes to the government's ability to intrude into the personal lives of average Americans. For example, in 2002 the U.S. military expanded its role inside the country with the creation of the new Northern Command, the first military command in recent history that is designed to protect the U.S. homeland. The creation of Northern Command has already raised the specter of military intelligence agents operating on U.S. soil, permanently developing new links with local law enforcement agencies, particularly those near large military bases. Few objections have been raised.
Since the Program was instituted, Hayden has been rewarded by President Bush. In 2005, Hayden was named deputy director of national intelligence, making him the top lieutenant to John Negroponte, the director of national intelligence, the top intelligence post created by the post-9/11 intelligence reforms. During his Senate confirmation hearings for his new position, Hayden was never asked publicly about the NSA's covert domestic intelligence program.
In private, he has been defensive about his role in domestic spying. Hayden has said that the operations being conducted by NSA are "legal, appropriate, and effective" as part of the war on terrorism. He has little else to say, other than that the matter is "intensely operational." The Program was still active in late 2005, several officials said.

The following report was written by me in 2003. It's predecessor "The Euro-Asian Alliance: Shifts in the Global Balance of Power" would have been included were I able to retrieve it.

“The Euro-Asian Alliance: Shifts in the Global Balance of Power”, makes the case for a cooperative effort between France, Germany, Russia and China, “to create a rival power center capable of opposing the execution of detrimental foreign policy by the United States”. The greatest threat of such a cooperative alliance is the possibility of its expansion throughout the globe and utilization of covert terror operations to achieve its objectives. This threat concept is called GUTRUSH or Globally United Terror Response to United States Hegemony. The likelihood of a GUTRUSH initiative is strong when consideration is given to the expanding political, economic and military relationships of the Euro-Asian Alliance members with countries that pose potential nuclear and/or terror threats to U.S. interests. Only ignorance and hubris could allow anyone to believe that countries many years older than the U.S. would not resort to cooperative terror operations if world opinion, international law and U.N. resolutions did not protect their interests. In many parts of the world, the U.S. is viewed as a deaf bully, unwilling to hear or listen to any other countries opinion. This fact and the perception that the U.S. unfairly supports Israel through a biased and prejudiced foreign policy gives America’s enemies more than one thing in common, more than one motive in common and forces them to be creative in their responses to U.S. hegemony.

Concerning the EU, the CIA’s, 2003, Unclassified Report to Congress on the Acquisition of Technology Relating to Weapons of Mass Destruction, states the following. “Iran continued to successfully procure dual use goods and materials from Europe. In addition, several Western European countries remained willing to negotiate Advanced Conventional Weapons sales to Libya, India, Pakistan and other countries to preserve their domestic defense industries. North Korea approached Western European entities to obtain acquisitions for its uranium enrichment program.” This information makes it quite evident that Europe does not share the United States “axis of evil” philosophy.

EU members certainly consider their Islamic population and geographic proximity to Islamic countries. According to former career CIA agent, Robert Baer, in his book, “See No Evil”; “It didn’t take a sophisticated intelligence organization to figure out that Europe, our traditional ally in the war against bad guys, had become a hothouse of Islamic fundamentalism”. Spain and Turkey have already suffered significant terror attacks for their support of the US‘s war in Iraq. It is reasonable to believe other European countries have given these potentials careful consideration.

We have also seen the terrorists express their appreciation for a European policy of non-intervention in the US led war in Iraq. A blatant display of such appreciation occurred when terrorist released their hostages after learning that they were French. In the meantime, American hostages continue to be beheaded with rapidity. In these base physical actions the implied understanding between Europe and the terrorists is one of cooperation. The following facts also make a strong case for the likelihood of European involvement in Operation GUTRUSH. Much of the planning for the 9/11 attacks took place in Europe. If nothing else this indicates a level of comfort that violently anti-American terrorists feel in the European environment. No terrorist attacks have occurred in France or Germany since the beginning of Operation Iraqi Freedom. This indicates that the terrorists believe any possible statement they could make in these countries is not worth jeopardizing the current relationship, whatever that relationship may be. Shortly after the 9/11 attacks took place a French author published a number one bestseller that stated the Pentagon was hit by a missile and not an airplane. The implication is that America purposely struck its own Department of Defense for political purposes. That such an accusation reached bestseller status indicates that its theme was popular and/or was intended to be so. The challenges in US-French relations since 2001 are well documented.

We can imagine that the French are throwing temper tantrums like misbehaving children whose greatest threat is to our eardrums or we can believe that the French, who have survived two World Wars and heavy attacks by foreign troops on their own soil, have made contingency plans. If the latter is true, then GUTRUSH, a Globally United Terror Response to United States Hegemony, may be considered a viable option by the French and other EU members for protecting their interests. Once we understand how our former allies could feel pushed far enough into a corner to participate in a GUTRUSH it is that much easier to envision participation by Russia and China. The key to a effective GUTRUSH is that world powers like the EU, Russia and China, who have already voiced their displeasure, discontent, and desire to limit US hegemony, begin proactively enhancing the economic, political and military apparatus of second tier or perimeter nation states outside the Alliance.

In the CIA’s, 2003, Unclassified Report to Congress on the Acquisition of Weapons of Mass Destruction, the CIA expresses continuing concern about Chinese nuclear cooperation with Iran and Pakistan. China has offered significant assistance to Pakistan and Iran on ballistic missile related projects. Thanks to Chinese assistance Pakistan has moved toward domestic serial production of Short Range and Medium Range solid propellant ballistic missiles. Chinese entity ballistic missile related assistance helped Iran move toward it’s goal of becoming self-sufficient in the production of ballistic missiles. In addition, firms in China provided dual-use missile-related items, raw material, and/or assistance to several other countries of proliferation concern-such as Iran, Libya and North Korea. Chinese firms are still providing dual-use chemical weapons related equipment and technology to Iran, as well as, Advanced Conventional Weapons to Pakistan and Iran.

According to the Secretary of Defense’s, 2003, “Annual Report on the Military Power of The People’s Republic of China”, Beijing apparently believes that the US poses a significant long-term challenge. China’s leaders have asserted that the US seeks to maintain a dominant geostrategic position by containing the growth of Chinese power, ultimately “dividing” and “Westernizing” China, and preventing a resurgence of Russian power. Beijing has interpreted the strengthened US-Japan security alliance, increased US presence in the Asia-Pacific region-including Central Asia—and efforts to expand NATO as manifestations of Washington’s strategy. While seeking a stable relationship with Washington, Beijing will continue to seek opportunities to diminish US regional influence.

The PLA’s (People’s Liberation Army) strategy places a strong emphasis on surprise. Their writings indicate a number of methodologies that could enhance the success of surprise, including strategic and operational deception, electronic warfare, and wearing down or desensitizing and opponents’ political and military leadership. At least one objective would be to reduce indications and warning of military action. For there to be no indications via satellite or humint would require that the PLA does not move. Subsidizing covert terror attacks through jihaddi organization would allow for that while providing the ultimate surprise.

Most interesting in this Department of Defense report are the following sentences. “Beijing apparently believes that the US poses a significant long-term challenge. China’s leaders have asserted that the US seeks to maintain a dominant geostrategic position by containing the growth of Chinese power, ultimately “dividing” and “Westernizing” China, and preventing a resurgence of Russian power.” What’s interesting in this analysis, if accurate, is that it states clearly that China and Russia have the same geostrategic national security interests.

To prevent the resurgence of Russian power the US is determined to divide and Westernize China. That is another way of stating what the Chinese believe regarding US policy and strategy in the region. The word “divide” is a direct assault on what China considers the most essential condition for its national survival and development…”national unity”. That makes the US the number one security threat and concern of Chinese policymakers and intelligence heads. The US may want to ask itself the following question and carefully consider the answer. What are the implications of Chinese and Russian participation in a Globally United Terror Response to United States Hegemony (GUTRUSH) if China places its own sovereignty and stability second to “national unity” under a Marxist/Maoist government?

This brings us to the final and perhaps most important nation in the Euro-Asian Alliance’s push into a GUTRUSH, Russia. Many in US intelligence understand the formidability of the KGB far better than the author. With that in mind it is quite doubtful that KGB spy Vladimir Putin reflects fondly upon his Soviet Republic’s Cold War losses as he decides upon Russian foreign policy. As documented in “The Euro-Asian Alliance: Shifts in the Global Balance of Power”, the result of a 2003 meeting between Chinese Foreign Minister Li Zhaoxing and Russian Foreign Minister Ivanov resulted in the following statements out of China’s Ministry for Foreign Affairs.

Regarding President Hu Jintao and President Putin,

“They emphasized that whatever changes the international situation may undergo, China and Russia will give priority to bilateral relations in their respective foreign policies and their policy of deepening and developing bilateral strategic coordination in various fields will remain intact, and that the mechanism of high level contacts and the cooperation between the two countries will continue to be intensified.”

Foreign Ministry Comrades Ivanov and Jintao agree on many things including “the Iraqi issue, North Korea nuclear issue and other international issues.”

Whatever Vladimir Putin is thinking in regards to the Old Cold War, the United States and the future of Russia, China is on board. Not only is China on board diplomatically and politically but there is a few billion dollars in Chinese currency getting on board every year for Russian military training and hardware.

As we continue delving into the concept of GUTRUSH and analyzing the thoughts, feelings, actions and statements of the Euro-Asian Alliance it becomes apparent that the concept may already have moved into reality. The most likely brain center for GUTRUSH would be in Russia. China’s foreign policy appears to be one of deception, especially the appearance of amicability for purposes of economic gain. The EU is an ally of the US through NATO and other institutions, thus making it to risky a location to support the GUTRUSH brain center. Russia, on the other hand, has had a head start since it has been going head to head with the US for decades. One captured Russian spy said that the dissolution of the USSR was actually a KGB operation. It would be interesting to know exactly what he meant.

According to the CIA’s Unclassified Report to Congress on the Acquisition of Technology Relating to Weapons of Mass Destruction, Russia is an active player. Russia has assisted Iran in building the Bushehr Nuclear Power Plant. In relation to ballistic missile related goods and technical know how Russia has supplied Iran, India and China. Russian entities remain a key source of equipment, chemicals and expertise for countries of concern with active Chemical and Biological Weapons programs. Russia continues to be a major supplier of conventional arms. As of November 2000 Russian officials stated that they saw Iran as potentially being Russia’s third largest conventional weapons customer behind China and India. Other customers are Libya and Sudan.

A pattern has definitely developed. The Euro-Asian Alliance of the EU, Russia and China has been established. The relationships between all of the Alliance members are far superior to any alliance member’s relations with the US. The Alliance members have all experienced financial losses as a result of US unilateral action in Iraq. The Alliance members are all supporting Iran and North Korea both of which happen to be the two remaining countries in the US’s “axis of evil”. This support includes the procurement and development of Weapons of Mass Destruction. In essence, the Euro-Asian Alliance members are doing everything in their power to support countries that the US has identified as a proliferation and/or terrorist threat. The only thing the Alliance hasn’t done is make the following announcement.

“We the Euro-Asian Alliance will begin actively and directly supporting terrorist operations against the United States of America. We will begin by providing covert financing and operational strategy to terrorist attacks on the U.S. in Iraq and Afghanistan. We will then begin covertly attacking US assets throughout the Middle East and Eurasian continent. These attacks will certainly occur on Alliance members’ soil primarily impacting US interests while causing minimal collateral damage to Alliance members. This collateral damage will be small enough so as not to impact Alliance infrastructure, yet large enough to exacerbate anti-US sentiment. Initially these attacks will be carried out only through jihaddis whom the alliance will support through a multi-layered splinter cell structure. The actual executors of the attacks will have no inkling of Alliance support. Then on a selective basis attacks on US interests will be carried out by elite members of Alliance intelligence organizations within the framework and footprint of a typical jihaddi operation. As the US begins to find itself reeling to and fro from vast number of attacks on its international interests the Alliance will begin initiating Operation Nightmare Scenario (ONS) on US soil.”

The Euro-Asian Alliance may not have spoken these words and perhaps they have not even considered the thought. Nevertheless, the potential for a GUTRUSH cannot be ignored. This is especially so considering that a GUTRUSH may appear to be the most effective method for the Euro-Asian Alliance to achieve its goals while maintaining plausible deniability. These goals would be to see the United States consumed by conflict in Iraq, Afghanistan and elsewhere. Such consumption would allow Alliance members to pursue their goals with less opposition from the US. The ultimate goals of the Euro-Asian Alliance are a unified, militarily modernized EU capable of opposing unilateral US policy, a resurgent Russia, a united China, and strong nuclear powered neighbors in Iran, North Korea, India and Pakistan. These are just a few of the Alliance’s possible interests. A covert GUTRUSH could mutate into a push to get the US out of the Eurasian continent. This could further mutate into attacks on US interests in Canada, North and South America as the GUTRUSH expands. Ultimately, in Operation Nightmare Scenario (ONS), the EAA GUTRUSH will begin using the powers of space, the Galileo Satellite Network and the internet, as well as diplomatic pouches and NATO intelligence to achieve its goals.

The reality is that there is nothing with so devastating a potential to US National Security as a Globally United Terror Response to United States Hegemony (GUTRUSH). Therefore, it demands serious consideration.

Recent developments including news about Russian moles in Centcom providing military intelligence to Saddam Hussein may confirm some of the theories contained in this 2003 report.

1 comment:

James F. Marino said...

I can tell you for a fact that
much of what Hayden said here is a lie. The NSA can and does track
us by of its array of satellites.

Not only can it track cars, it can also track humans by way of the electricity that our brainwaves give off. This electricity known as
EMF or electromagnetic flux is singularly identifiable to every human on this planet.

And the NSA has the EMF of every American contained within its vast database which means that we are ALL in this system!

The NSA's digitial computers are at least 15 years ahead of our own and can easily watch the rougly 300, 000 million people that we have in this country.

Moreover, not only are we being watched, our thoughts are being scanned by way of the NSA's remote neural monitoring technology, which
can not only decode our subvocalized thoughts but also insert their own thoughts into our minds by way of satellite induced voice to skull contact otherwise know as Synthetic Telepathy.

Hayden's attempts to leave Americans with the impression that the NSA is barely coping in this
hi tech day and age is a black propaganda smokescreen to once again mislead and misdirect the American people.

The NSA's technology is cutting edge. And it is capable of not only reading the minds of the American people but also influencing them.

We are talking about satellites that can hone in on you by way of your EMF and they murder you by sending a proton beam directly into your body to fry your central nervous system -- and it can all be done within a matter of seconds.

This is terrifying stuff we are talking about here. George Orwell's 1984, but this its for real.

And as usual the American people are clueless as ever...

http://www.9-11themotherofallblackoperations.blogspot.com/