The Burglary (102 page)

Read The Burglary Online

Authors: Betty Medsger

BOOK: The Burglary
9.62Mb size Format: txt, pdf, ePub

26
Overnight, the FBI's mandate:
Lichtblau,
Bush's Law
, 81–90.

27
It was later discovered:
Shenon,
The Commission
, 245–48, 274.

28
By the time:
Shenon,
The Commission
, 364–69.

29
In the years before
9
/
11
: Philip Shenon, “Urging Swift Action, Panel Warns Deadlier Attacks Are Likely,”
New York Times
, July 22, 2004.

30
One FBI official:
Lichtblau,
Bush's Law
, 85–86.

31
The bureau's pre-
9
/
11
failures:
David Johnston and Neil A. Lewis, “Traces of Terror: The Congressional Hearings: Whistle-Blower Recounts Faults Inside the F.B.I.,”
New York Times
, June 7, 2002. Eric Lichtblau, “Report Details F.B.I.'s Failure on Two Hijackers,”
New York Times
, June 10, 2005. Lichtblau,
Bush's Law
, 121–23. Shenon,
Commission
, 48, 241–42. Philip Shenon, “The Terrible Missed Chance,”
Newsweek
, September 4, 2011.

32
“The problem was mostly”:
Shenon,
The Commission
, 270.

33
In some parts of the country:
Priest and Arkin,
Top Secret America
, 270–73. Aaronson,
The Terror Factory
, 42. Charlie Savage, “F.B.I. Scrutinized for Amassing Data on American Communities,”
New York Times
, October 20, 2011.

34
The expanded use:
Jerome P. Bjelopera, “The Federal Bureau of Investigation and Terrorism Investigations,” Congressional Research Service, April 24, 2013, 9–11. Priest and Arkin,
Top Secret America
, 134–135.

35
Agents could target:
Berman,
Domestic Intelligence
, 21–22.

36
Mukasey validated:
“A New Rush to Spy,” editorial,
New York Times
, August 22, 2008. “Another Invitation to Abuse,” editorial,
New York Times
, October 19, 2008. Charlie Savage, “Loosening of F.B.I. Rules Stirs Privacy Concerns,”
New York Times
, October 29, 2009.

37
Instead, the Obama administration:
“Backward at the FBI,” editorial,
New York Times
, June 18, 2001. Ernesto Londono, “Drones Cause ‘Growing Hatred of America,' Bipartisan Senate Panel Told,”
Washington Post
, April 23, 2013.

38
So were crucial:
Eric Lichtblau, “F.B.I. Said to Lag on Translating Terror Tapes,”
New York Times
, September 28, 2004.

39
In their series and book:
Dana Priest and William M. Arkin, “A Hidden World, Growing Beyond Control,” from “Top Secret America” series,
Washington Post
, July 19, 2010.

40
As large digital haystacks:
Lichtblau,
Bush's Law
, 85. Bjelopera, “The Federal Bureau of Investigation and Terrorism Investigations,” 26–27.

41
Assessing the impact:
Richard Clarke,
Frontline
interview, April 30, 2013.

42
“More is good”:
Jeff Stein, “FBI Cheating Confirmed by Justice Department,”
Washington Post
, September 27, 2010. “Investigation of Allegations of Cheating on the FBI's Domestic Investigations and Operations Guide (DIOG) Exam,” Inspector General, Department of Justice, September 2010.

43
For instance, available:
Bjelopera, “The Federal Bureau of Investigation and Terrorism Investigations,” 26. Marshall Curtis Erwin, “Intelligence Issues for Congress,” Congressional Research Service, April 23, 2013. “A Ticking Time Bomb: Counterterrorism Lessons from the U.S. Government's Failure to Prevent the Fort Hood Attack,” Special Report by Senate Committee on Homeland Security and Governmental Affairs, February 3, 2011, 7–89.

44
In the latter case:
Scott Shane, “Wide U.S. Failures Helped Airliner Plot, Panel Says,”
New York Times
, May 19, 2010.

45
The new FBI secrecy:
Eric Schmitt and Julia Preston, “Senators Say Case Indicates That Problems Persist in Agencies' Data Sharing,”
New York Times
, April 23, 2013.

27.
THE NSA FILES

1
The most startling aspect:
Glenn Greenwald, “NSA Collecting Phone Records of Millions of Verizon Customers Daily,”
Guardian
, June 5, 2013.

2
accessing all of it:
Barton Gellman and Laura Poitras, “U.S., British Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program,”
Washington Post
, June 6, 2013. Glenn Greenwald, “XKeystone: NSA Tool Collects ‘Nearly Everything a User Does on the Internet,' ”
Guardian
, July 31, 2013. Scott Shane and David E. Sanger, “Job Title Key to Inner Access Held by Snowden,”
New York Times
, June 30, 2013.

3
NSA's main partner:
Eric Lichtblau and Michael S. Schmidt, “Other Agencies Clamor for Data N.S.A. Compiles,”
New York Times
, August 3, 2013.

4
released to journalists:
Mirren Gidda, “Edward Snowden and the NSA Files—Timeline,”
Guardian
, July 25, 2013. Barton Gellman, Aaron Blake, and Greg Miller, “Edward Snowden Comes Forward as Source of NSA Leaks,”
Washington Post
, June 9, 2013.

5
“another capability”:
Nick Hopkins, Julian Borger, and Luke Harding, “GCHQ: Inside the Top Secret World of Britain's Biggest Spy Agency,”
Guardian
, August 1, 2013.

6
denied the reports:
Declan McCullagh, “NSA Spying Flap Extends to Contents of U.S. Phone Calls,” CNET News, June 15, 2013.

7
“clearly erroneous”:
Dan Roberts and Spencer Ackerman, “Clapper Under Pressure Despite Apology for ‘Erroneous' Statements to Congress,”
Guardian
, July 1, 2013.

8
“They can literally watch”:
Gellman and Poitras, “U.S., British Intelligence Mining.”

9
GCHQ created Tempora:
Nick Hopkins, Julian Borger, and Luke Harding, “GCHQ: Inside the Top Secret World of Britain's Biggest Spy Agency,”
Guardian
, August 1, 2013.

10
They can convey:
James Ball, Luke Harding, and Juliette Garside, “BT and Vodafone Among Telecoms Companies Passing Details to GCHQ,”
Guardian
, August 2, 2013.

11
“exploit any phone”:
Hopkins, Borger, and Harding, “GCHQ.”

12
“to tap directly into”:
Ibid.

13
a bipartisan group:
“A Bipartisan Warning on Surveillance,” editorial,
New York Times
, July 25, 2013.

14
James Sensenbrenner:
Jonathan Weisman, “Momentum Builds Against N.S.A.
Surveillance,”
New York Times
, July 28, 2013. Dan Roberts and Spencer Ackerman, “Anger Swells After NSA Phone Records Court Order Revelations,”
Guardian
, June 6, 2013. Timothy B. Lee, “Here's Why ‘Trust Us' Isn't Working for the NSA Any More,”
Washington Post
, July 30, 2013.

15
called Snowden a traitor:
Jillian Rayfield, “Dick Cheney Praises NSA Surveillance Program,”
Salon
, July 16, 2013. “Surveillance: Snowden Doesn't Rise to Traitor,” editorial,
New York Times
, June 11, 2013.

16
if it could quantify:
Spencer Ackerman and Dan Roberts, “NSA Surveillance: Lawmakers Urge Disclosure as Obama ‘Welcomes' Debate,”
Guardian
, June 9, 2013.

17
Boundless Informant:
Glenn Greenwald and Ewen MacAskill, “Boundless Informant: The NSA's Secret Tool to Track Global Surveillance Data,”
Guardian
, June 11, 2013.

18
repeatedly warning:
David A. Fahrenthold, “With NSA Revelations, Sen. Ron Wyden's Vague Warnings About Privacy Finally Become Clear,”
Washington Post
, July 28, 2013.

19
“We find ourselves”:
Senator Ron Wyden, address, Center for American Progress, July 23, 2013.

20
Church warned:
Glenn Greenwald, “Surveillance State Evils,”
Salon
, April 21, 2012.

21
become rubber stamps:
Eugene Raineson, “Edward Snowden's NSA Leaks Show We Need a Debate,”
Washington Post
, June 10, 2013.

22
parallel Supreme Court:
Eric Lichtblau, “In Secret, Court Vastly Broadens Powers of N.S.A.,”
New York Times
, July 6, 2013.

23
at thirty-eight embassies:
Laura Poitras, “NSA Spied on European Union Offices,”
Der Spiegel
, June 29, 2013. Ewen MacAskill and Julian Borger, “New NSA Leaks Show How US Is Bugging Its European Allies,”
Guardian
, June 30, 2013.

24
two London conferences:
Scott Shane and Ravi Somaiya, “New Leak Indicates Britain and U.S. Tracked Diplomats,”
New York Times
, June 16, 2013.

25
Germans reacted:
Stephen Castle, “Report of U.S. Spying Angers European Allies,”
New York Times
, June 30, 2013.

26
“The spying has reached”:
Claus Hecking and Stefan Schultz, “EU Official Questions Trade Negotiations,”
Der Spiegel
, June 30, 2013.

27
became defensive:
“The German Prism: Berlin Wants to Spy Too,”
Der Spiegel
, June 17, 2013. “ ‘Prolific Partner': German Intelligence Used NSA Spy Program,”
Der Spiegel
, July 20, 2013.

28
a criminal inquiry:
Michael Birnbaum, “European Anger over U.S. Spying Turns Inward,”
Washington Post
, July 17, 2013.

29
two totalitarian systems:
“Prism Spying ‘Attacks Basic Civil Rights,' ”
Der Spiegel
, June 11, 2013.

30
minimal benefit:
Dan Roberts, “Patriot Act Author Prepares Bill to Put NSA Bulk Collection ‘Out of Business,' ”
Guardian,
October 10, 2013.

31
digital address books:
Barton Gellman and Ashkan Soltani, “NSA Collects Millions of E-Mail Address Books Globally,”
Washington Post,
October 14, 2013.

32
protected by encryption:
James Ball, Julian Borger, and Glenn Greenwald, “Revealed: How US and UK Spy Agencies Defeat Internet Privacy and Security,”
Guardian,
September 5, 2013; Nicole Perlroth, Jeff Larson, and Scott Shane, “N.S.A. Able to Foil Basic Safeguards of Privacy on Web,” story published jointly by
New York Times
and
ProPublica,
September 5, 2013.

28.
QUESTIONS

1
His appointment:
Ungar,
FBI
, 48. Ackerman,
Young J. Edgar
, 1.

2
Stone had publicly:
Ackerman,
Young J. Edgar
, 6.

3
Hoover, the man:
Theoharis,
The FBI and American Democracy
, 24, 176. Ackerman,
Young J. Edgar
, 6.

4
The raids—lauded:
Theoharis,
The FBI and American Democracy
, 26–27. Schwarz and Huq,
Unchecked and Unbalanced
, 15. Ackerman,
Young J. Edgar
, 380.

5
When Palmer was:
Ackerman,
Young J. Edgar
, 354.

6
How was it possible:
Ibid., 6–7, 372.

7
The scar was etched:
Ibid., 5.

8
It was learned then:
Theoharis,
Spying on Americans
, 255n8. Theoharis,
The FBI and American Democracy
, 36. O'Reilly,
Hoover and the Un-Americans
, 18–19, 21.

9
The impulse to build:
Ackerman,
Young J. Edgar
, 379.

10
He was in the Senate:
Ibid., 360, 372.

11
New Yorker
writer:
Ibid., 375.

12
Years later, Hoover:
Ibid., 6.

13
But as he tells:
Ibid., 3.

14
“I'll take the job”:
Ungar,
FBI
, 48.

15
A few days after:
Ungar,
FBI
, 49. Ackerman,
Young J. Edgar
, 378. Lowenthal,
The Federal Bureau of Investigation
, 445.

16
Reformers were pleased:
Schwarz and Huq,
Unchecked and Unbalanced
, 210n10, from Alpheus Thomas Mason,
Harlan Fiske Stone: Pillar of the Law
, 149.

17
“They never stopped”:
David Williams, “ ‘They Never Stopped Watching Us': FBI Political Surveillance, 1924–1936,”
UCLA Historical Review
2 (1981). David Williams, “The Bureau of Investigation and Its Critics, 1919–1921: The Origins of Federal Political Surveillance,”
Journal of American History
68, no. 3 (December 1981).

Other books

A Well Pleasured Lady by Christina Dodd
Kissing Arizona by Elizabeth Gunn
Ember Learns (The Seeker) by Kellen, Ditter
Penelope by Beaton, M.C.
More Than Friends by Erin Dutton
The Spinster Bride by Jane Goodger
Deadly Dosage by Richards, Cheryl
Like a Fox by J.M. Sevilla
Dream of Me by Delilah Devlin