Total Terror Plots*

Total Page:16

File Type:pdf, Size:1020Kb

Total Terror Plots* NSA DATA COLLECTION PROGRAM: THE CHALLENGE OF ASSESING EFFECTIVENESS Item Type text; Electronic Thesis Authors DEIBEL, CHARLES LOUIS, II Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 28/09/2021 10:48:12 Item License http://rightsstatements.org/vocab/InC/1.0/ Link to Item http://hdl.handle.net/10150/613829 NSA DATA COLLECTION PROGRAM: THE CHALLENGE OF ASSESING EFFECTIVENESS By CHARLES LOUIS DEIBEL II ____________________ A Thesis Submitted to The Honors College In Partial Fulfillment of the Bachelors degree With Honors in Political Science THE UNIVERSITY OF ARIZONA M A Y 2 0 1 6 Approved by: ____________________________ Dr. John Tidd School of Government and Public Policy Abstract The National Security Agency (NSA) has played a key role in the United States Government’s counterterror program since September 11. Over the last 15 years, the NSA has faced considerable controversy regarding its counterterrorism data collection program and the legal authority behind it. This paper, however, is concerned with whether or not that program has been effective in preventing Islamist related or inspired terror attacks inside the United States. As NSA capabilities and authorities have expanded since 9/11, has it been effective in helping to prevent attacks in the U.S.? Definitively answering this question is extremely difficult, given significant challenges regarding the amount and quality of public information concerning NSA’s involvement in prevented terror attacks. Yet, this does not mean that some preliminary conclusions cannot be made regarding NSA’s involvement in counterterror cases. A review of two separate data-sets that catalog Islamist inspired or related terror plots, has permitted certain inferences regarding NSA’s involvement in particular cases. This effort has nonetheless highlighted the difficulties faced by public researchers in studying a clandestine agency’s implementation of policy. Introduction The terrorist attacks of 9/11 significantly changed the landscape of America’s national security policies. Our country became faced with a new, challenging threat that was unlike anything we had faced in our past. In the weeks following 9/11, in an effort to combat this new threat, President Bush authorized the National Security Agency to initiate the classified “President’s Surveillance Program” (PSP).1 The main goal of this 1 Unclassified Report on the President’s Surveillance Program, 1 program was to help the federal government prevent terrorist attacks by radical, extremist groups against the U.S. homeland. The intention of the PSP was for the NSA to intercept different forms of electronic communication between known and suspected terrorist groups and individuals in the United States.2 Shortly following the inception of the PSP, Congress passed H.R. 3162, the “Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act,” a.k.a. “The USA PATRIOT Act”3. This new law, mostly an amendment to the “Foreign Intelligence Surveillance Act” (FISA) of 1978, expanded the government’s search and seizure authority and eliminated many legal and bureaucratic impediments to the sharing of information.4 In essence, it attempted to give the law enforcement and intelligence communities more robust tools in order to combat terrorism.5 With these new laws and authorizations, the NSA started carrying out what would be at times a highly controversial data collection program*. While much discussion has focused on whether this program, and the NSA’s implementation of it, are right or wrong, much less effort has focused on whether it has been an effective policy. This paper will focus on the effectiveness of the NSA’s data collection program with respect to preventing Islamist related or inspired terrorist attacks in the United States. Highlighting this issue is vital to the debate over whether the federal government has made the right decisions in regards to how the program might affect such 2 Ibid. 3 Robert P. Abele, A User’s Guide to the USA PATRIOT Act (Lanham: University Press of America, Inc., 2005), 23. 4 Eric A. Posner and Adrian Vermuele, Terror in the Balance: Security, Liberty, and the Courts (New York: Oxford University Press, 2007), 7-8. 5 Howard Ball, The USA PATRIOT Act (Santa Barbara: ABC-CLIO, 2004), 50. * While NSA collects a wide variety of information, the term “data collection program” will refer to its post-September 11 efforts to acquire intelligence regarding foreign terrorist operations. 2 related issues as privacy and civil liberties. If the effectiveness of the policy can be empirically measured, it can help inform both elected officials and the public as to the actual impact of this policy. Measuring the effectiveness of a given national security policy can not only shed light on the policy in question, but can also add substance to the debate over balancing civil liberties against security. More broadly, an attempt to measure effectiveness of the program will help to illustrate what we can know, and not know, about certain classified programs and policies. An honest, transparent debate between the public and the government about policy is a hallmark of the democratic system in the U.S., and studying national security policy academically can help remove partisan biases from the equation. An honest search for the facts is truly important in informing the public and policy makers, but given the clandestine nature of our country’s intelligence community and some federal law enforcement activities, finding vital information to answering certain questions becomes extremely difficult. It is not as if the information does not exist; most of it is just not available to the public. Even with this information gap, however, one can still paint a general picture to infer the effectiveness of certain national security policies. Much of the current controversy regarding the NSA’s data collection program, and the USA PATRIOT Act generally, revolves around the debate over whether these laws and policies to hinder terrorist’s ability to execute terrorist attacks in the United States have come at the cost civil liberties.6 This debate is crucial and its importance cannot be understated. Much of the literature regarding the NSA programs and the USA PATRIOT Act focuses on this, but this paper is concerned with the following question: 6 C. William Michaels, No Greater Threat: America After September 11 and the Rise of a National Security State (New York: Algora Publishing, 2002), 48-50. 3 has the NSA been effective in executing its goal of directly preventing, or assisting in the prevention of, terrorist attacks in the U.S. through its data collection program and thus, helped save American lives and property? There are many different criteria that can be used when attempting to evaluate a specific policy. Measuring the effectiveness of the NSA’s data collection program could be done in a couple ways. Michael Kraft and Scott Furlong highlight four criteria that are of critical consideration: effectiveness, efficiency, equity, and political feasibility.7 An economic cost-benefit analysis could be done to show if the benefits of the program outweigh the costs. But the focus of this paper is not on the monetary or physical costs of the program. While the budgetary costs are an important consideration in regards to a specific policy, that discussion does not pertain to whether that policy has achieved its intended goals. Likewise, it is extremely difficult to measure empirically the benefits of a prevented terrorist attack. One cannot easily measure the number of lives, or the amount of property, saved from a prevented terrorist attack, though the government has made calculations as to the value of a life.8 That is why this paper will not attempt a cost- benefit analysis, but will assess effectiveness as measured by the number of terrorist attacks prevented primarily by the NSA’s data collection, or terrorist attacks prevented where the NSA assisted in the investigation. Even this measurement is not fully comprehensive, as will be discussed in detail later. The NSA does not work in a vacuum, and it is usually not a lead investigator in terrorism cases. That means that law enforcement and intelligence agencies, like the FBI 7 Michael E. Kraft and Scott R. Furlong, Public Policy: Politics, Analysis, and Alternatives, (Washington D.C., CQ Press, 2007), 26. 8 Ibid, 162. 4 and CIA, rely on the NSA in helping them with ongoing investigations. While research for this cannot say with certainty whether or not the NSA’s data collection program is effective due to some significant challenges and issues, there is enough information available to draw at least some preliminary conclusions. Controversy and legality aside, this paper will explore the hypothesis that NSA’s data collection program has been effective in helping to prevent terrorist attacks since 9/11. Variables When attempting to assess a government policy or program it is essential to clearly describe the policy and its impact on the public problem it is seeking to address. For the purpose of this paper, the policy (the independent variable) will be the expanding robustness of NSA’s data collection program, from shortly after 9/11 to the present day. The impact (the dependent variable) will be the growth in the NSA’s program’s effectiveness in helping to prevent Islamist related or inspired terrorist attacks inside the United States. With respect to the independent variable, the NSA’s data collection program is not unique in the U.S. government. While the USA PATRIOT Act and the NSA Programs have received the most attention and criticism in regards to federal surveillance following 9/11, they are by no means the “be all, end all” of federal data collection and analysis.
Recommended publications
  • The Regime Change Consensus: Iraq in American Politics, 1990-2003
    THE REGIME CHANGE CONSENSUS: IRAQ IN AMERICAN POLITICS, 1990-2003 Joseph Stieb A dissertation submitted to the faculty at the University of North Carolina at Chapel Hill in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of History in the College of Arts and Sciences. Chapel Hill 2019 Approved by: Wayne Lee Michael Morgan Benjamin Waterhouse Daniel Bolger Hal Brands ©2019 Joseph David Stieb ALL RIGHTS RESERVED ii ABSTRACT Joseph David Stieb: The Regime Change Consensus: Iraq in American Politics, 1990-2003 (Under the direction of Wayne Lee) This study examines the containment policy that the United States and its allies imposed on Iraq after the 1991 Gulf War and argues for a new understanding of why the United States invaded Iraq in 2003. At the core of this story is a political puzzle: Why did a largely successful policy that mostly stripped Iraq of its unconventional weapons lose support in American politics to the point that the policy itself became less effective? I argue that, within intellectual and policymaking circles, a claim steadily emerged that the only solution to the Iraqi threat was regime change and democratization. While this “regime change consensus” was not part of the original containment policy, a cohort of intellectuals and policymakers assembled political support for the idea that Saddam’s personality and the totalitarian nature of the Baathist regime made Iraq uniquely immune to “management” strategies like containment. The entrenchment of this consensus before 9/11 helps explain why so many politicians, policymakers, and intellectuals rejected containment after 9/11 and embraced regime change and invasion.
    [Show full text]
  • Table of Contents Acknowledgements
    The Data Privacy/National Security Balancing Paradigm as Applied In The U.S.A. and Europe: Achieving an Acceptable Balance Paul Raphael Murray, B.A. H.Dip in Ed. LL.B. LL.M Ph.D. (NUI) Submitted for the Degree of Doctor in Philosophy at Trinity College, Dublin School of Law August 2017 Declaration and Online Access I declare that this thesis has not been submitted as an exercise for a degree at this or any other university and it is entirely my own work. I agree to deposit this thesis in the University’s open access institutional repository or allow the library to do so on my behalf, subject to Irish Copyright Legislation and Trinity College Library conditions of use and acknowledgement. Paul Raphael Murray Acknowledgements I would like to record my thanks to my Supervisor, Professor Neville Cox, School of Law, and Dean of Graduate Studies, Trinity College, Dublin, for his help and guidance. i ii Abstract The Data Privacy/National Security Balancing Paradigm as Applied In The U.S.A. and Europe: Achieving an Acceptable Balance Paul Raphael Murray The overall research question addressed in this thesis is the data privacy/national security balancing paradigm, and the contrasting ways in which this operates in Europe and the U.S. Within this framework, the influences causing the balance to shift in one direction or another are examined: for example, the terrorist attacks on two U.S. cities in 2001 and in various countries in Europe in the opening decade of the new millennium, and the revelations by Edward Snowden in 2013 of the details of U.S.
    [Show full text]
  • 2003 Iraq War: Intelligence Or Political Failure?
    2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? A Thesis submitted to the Faculty of The School of Continuing Studies and of The Graduate School of Arts and Sciences in partial fulfillment of the requirements for the degree of Master of Arts in Liberal Studies By Dione Brunson, B.A. Georgetown University Washington, D.C. April, 2011 DISCLAIMER THE VIEWS EXPRESSED IN THIS ACADEMIC RESEARCH PAPER ARE THOSE OF THE AUTHOR AND DO NOT REFLECT THE OFFICIAL POLICIES OR POSITIONS OF THE U.S. GOVERNMENT, DEPARTMENT OF DEFENSE, OR THE U.S. INTELLIGENCE COMMUNITY. ALL INFORMATION AND SOURCES FOR THIS PAPER WERE DRAWN FROM OPEN SOURCE MATERIALS. ii 2003 IRAQ WAR: INTELLIGENCE OR POLITICAL FAILURE? Dione Brunson, B.A. MALS Mentor: Ralph Nurnberger, Ph.D. ABSTRACT The bold U.S. decision to invade Iraq in 2003 was anchored in intelligence justifications that would later challenge U.S. credibility. Policymakers exhibited unusual bureaucratic and public dependencies on intelligence analysis, so much so that efforts were made to create supporting information. To better understand the amplification of intelligence, the use of data to justify invading Iraq will be explored alongside events leading up to the U.S.-led invasion in 2003. This paper will examine the use of intelligence to invade Iraq as well as broader implications for politicization. It will not examine the justness or ethics of going to war with Iraq but, conclude with the implications of abusing intelligence. iii ACKNOWLEDGMENTS Thank you God for continued wisdom. Thank you Dr. Nurnberger for your patience. iv DEDICATION This work is dedicated to Mom and Dad for their continued support.
    [Show full text]
  • The Path to 9/11 | Vanity Fair
    The Path to 9/11 | Vanity Fair https://www.vanityfair.com/news/2004/11/path-to-9-11-200411 Sign In Subscribe The Price of Failure THE PATH TO 9/11: LOST WARNINGS AND FATAL ERRORS By the time the hijackers made their way into the U.S., memos, photographs, and intercepts had sounded alarms inside the C.I.A., White House, F.B.I., and European intelligence services. Could better cooperation have stopped the attacks? Ned Zeman, David Wise, David Rose, and Bryan Burrough show how the hideous “Planes Operation” took shape as the C.I.A.’s bin Laden point man, Mike Scheuer, counterterrorism czar Richard Clarke, the F.B.I.’s John MacGaffin, and others fought—yet couldn’t work together—to prevent it. BY NED ZEMAN, DAVID WISE, DAVID ROSE, AND BRYAN BURROUGH ! " # DECEMBER 19, 2008 12:00 AM ith his salt-and-pepper hair, white shirt, and sensible shoes, Mike Scheuer, 44, looked like a rumpled academician, or maybe a consultant for one of the many defense contractors [#image: /photos/54cbf62044a199085e88c698]sprinkled around the W Washington Beltway. In reality, his job was considerably more interesting. Starting in 1996, he was the man the C.I.A. had assigned to hunt down, capture, or kill Osama bin Laden. Of all the agency’s far-flung stations—from Moscow to Prague to Beijing—Scheuer’s was unique. Known among the spooks as a “virtual station,” it was not overseas but near the C.I.A. headquarters, in Langley, Virginia, eight miles west of Washington. 3 ARTICLES LEFT Subscribe Sign In 1 of 53 11/11/18, 17:18 The Path to 9/11 | Vanity Fair https://www.vanityfair.com/news/2004/11/path-to-9-11-200411 The station was the first to target an individual rather than a country.
    [Show full text]
  • The NSA Is on the Line -- All of Them
    The NSA is on the line -- all of them An intelligence expert predicts we'll soon learn that cellphone and Internet companies also cooperated with the National Security Agency to eavesdrop on us. By Kim Zetter, Salon.com May. 15, 2006 | When intelligence historian those safeguards had little effect in preventing Matthew Aid read the USA Today story last at least three telecommunications companies Thursday about how the National Security from repeating history. Agency was collecting millions of phone call records from AT&T, Bell South and Verizon for Aid, who co-edited a book in 2001 on signals a widespread domestic surveillance program intelligence during the Cold War, spent a designed to root out possible terrorist activity in decade conducting more than 300 interviews the United States, he had to wonder whether with former and current NSA employees for his the date on the newspaper wasn't 1976 instead new history of the agency, the first volume of of 2006. which will be published next year. Jeffrey Richelson, a senior fellow at the National Aid, a visiting fellow at George Washington Security Archive, calls Aid the top authority on University's National Security Archive, who has the NSA, alongside author James Bamford. just completed the first book of a three-volume history of the NSA, knew the nation's Aid spoke with Salon about how the NSA has bicentennial marked the year when secrets learned to maneuver around Congress and the surrounding another NSA domestic Department of Justice to get what it wants. He surveillance program, code-named Project compared the agency's current data mining to Shamrock, were exposed.
    [Show full text]
  • Location, Event&Q
    # from what/ where which how why who for MOBILE versi on click here when who who where when index source "location, event" "phys, pol, med, doc" detail physical detail political name "9/11 Truth Interactive Spreadsheet Click on dow n arrow to sort / filter, click again to undo." Top 100 / compilations entity entity detail country / state date Item .. right-click on li nk to open in new tab 1 "Francis, Stephen NFU" WTC physical Controlled demolition Explosive experts "Overwhelming evidence indicates that a combination of n uclear, thermitic and conventional explosives were used in a controlled demoliti on of the WTC on 9/11. Nanothermite contributed but does not have sufficient det onation velocity to pulverize the WTC into dust. Architects & Engineers for 9/11 Truth is leading gatekeeper trying to deflect Israel's role. See Cozen O'Connor 9/11 lawsuit." pic "9/11 Truth, anti-Zionists" Engineers / Scie ntists "U.S., Israel, SA, Britain" 2 "Francis, Stephen NFU" "WTC, Pentagon, PA" political False flag Cabal "The cabal: U.S., Britain, Saudi Arabia and Israel execu ted the 9/11 false flag attack in order to usher in a new 'war on terror' along with the Iraq and Afghanistan wars and fullfil the PNAC's 'Full Spectrum Dominan ce' of the Middle East and its resources ... all have roots that go back to Zion ist / Nazi Germany, the Cold War ... 9/11 was a planned step." lnk Intel ag encies "Cabal: US, UK, Israel & SA" Mossad / Sayeret Matkal "U.S., Israel, S A, Britain" 3 "Fox, Donald" WTC 1-2 physical "Mini Neutron, Fissionless Fusio n" Controlled demolition "VeteransToday: Fox, Kuehn, Prager, Vike n,Ward, Cimono & Fetzer on mini neutron bombs discuss all major WTC theories micr o nuke (neutron) most promising comparatively low blast effects, a quick blast o f radiation that doesn't linger, a series of shape charged mini-neutron bombs we re detonated from top to bottom to simulate a free fall collapse.
    [Show full text]
  • CQR Government Surveillance
    Published by CQ Press, an Imprint of SAGE Publications, Inc. www.cqresearcher.com Government Surveillance Is government spying on Americans excessive? ow tightly the government should keep tabs on citizens has long been fiercely debated. But con - cern about surveillance intensified in June after H National Security Agency computer specialist Edward Snowden revealed classified details of agency electronic snooping programs. Civil liberties advocates, lawmakers and others Demonstrators in Berlin, Germany, protest on July 27 also have cited growing unease with other surveillance measures, against the sweeping U.S. electronic surveillance operations revealed in June by National Security including the use of unmanned “drone” aircraft and tiny video Agency computer specialist Edward Snowden (shown on placard). Many Germans were outraged at reports that the super-secret spy agency had collected data cameras. Congress, along with state and local governments, is ex - on German citizens, including emails. pected to take up a variety of bills this fall to protect privacy and increase transparency about government activities. But the Obama I THIS REPORT N administration maintains that internal safeguards — including a THE ISSUES ....................719 S federal civil liberties oversight board created in 2004 — have pre - BACKGROUND ................725 I vented the federal government from becoming “Big Brother.” CHRONOLOGY ................727 D CURRENT SITUATION ........730 E CQ Researcher • Aug. 30, 2013 • www.cqresearcher.com AT ISSUE ........................733 Volume 23, Number 30 • Pages 717-740 OUTLOOK ......................734 RECIPIENT OF SOCIETY OF PROFESSIONAL JOURNALISTS AWARD FOR BIBLIOGRAPHY ................738 EXCELLENCE N AMERICAN BAR ASSOCIATION SILVER GAVEL AWARD THE NEXT STEP ..............739 GOVERNMENT SURVEILLANCE Aug. 30, 2013 THE ISSUES OUTLOOK Volume 23, Number 30 • Is government surveil - More Cameras MANAGING EDITOR: Thomas J.
    [Show full text]
  • An Inadequate Limitation?
    GOVERNMENT DISCRETION IN THE AGE OF BULK DATA COLLECTION: AN INADEQUATE LIMITATION? JULIAN SANCHEZ* There are about 3,500 wiretap orders issued every year, at the federal and state levels combined for all criminal investigations.1 When one company, such as Facebook, has on the order of tens of thousands of accounts flagged for content interception under foreign intelligence orders,2 the appropriate benchmark is not “millions,” but what we do in other contexts. Even that number is incomplete because much of the gov- ernment’s collection of Internet content is not happening through PRISM.3 There is also the other component of section 7024—the “upstream” collection off the Internet backbone,5 as well as overseas collection under the authority of Executive Order 12,333.6 This is not part of FISA, which only covers col- * Senior Fellow, Cato Institute. This essay was adapted from remarks given at the 2014 Federalist Society Annual Student Symposium at the University of Florida in Gainesville, Florida. 1. ADMIN. OFFICE OF THE U.S. COURTS, WIRETAP REPORT 2013 (2014), available at http://www.uscourts.gov/Statistics/WiretapReports/wiretap-report-2013.aspx [http://perma.cc/ASG5-7T6G]. 2. See Global Government Requests Reports, FACEBOOK, https://www.facebook.com /about/government_requests [http://perma.cc/595L-XTV6] (last visited July 28, 2014) (reporting government data requests by country from the first six months of 2013, ending on June 30). 3. Stephen Braun et. al, PRISM Is Just Part of a Much Larger, Scarier Government Surveillance Program, BUSINESS INSIDER (Jun. 15, 2013, 9:54 AM), http:// www.businessinsider.com/prism-is-just-the-start-of-nsa-spying-2013-6 [http://perma.cc/5BH8-AE82] (noting that PRISM is “a relatively small part of a much more expansive and intrusive eavesdropping effort”).
    [Show full text]
  • Timeline of US Govt. Surveillance & Spying
    The history of United States government domestic surveillance and spying is long. Over the years, the US government has launched covert and illegal projects whose purpose among other is to "expose, disrupt, misdirect, discredit, or otherwise neutralize" movements for justice and freedom. Launched in March 2008, the LAPD Suspicious Activity Reporting (SAR) – Special Order 1 and iWATCH “See Something, Say Something” Program is one such open assault on people’s privacy and freedom, done under the pretext of “national security and the war on terror”. 1798: Congress passes four laws which come to be known collectively as the Alien and Sedition Acts: o June 17, 1798: The Naturalization Act increases the amount of time necessary for immigrants to become naturalized citizens in the United States from five to fourteen years; 1 o June 24, 1798: The Alien Friends Act authorizes the president to deport any resident alien considered "dangerous to the peace and safety of the United States;”2 o July 5, 1798: The Alien Enemies Act authorizes the president to apprehend and deport resident aliens if their home countries are at war with the United States of America. This includes aliens who are not chargeable with actual hostility or other crime against the public safety;3 o July 13, 1798: The Sedition Act makes it a crime to "oppose any measure or measures of the government" as well as to publish "false, scandalous, and malicious writing" against the government or its officials. The Act is intended to stifle dissent.4 April 12, 1917: President Wilson persuades Congress to declare war on Germany and enter World War 1, but the American public is wary of the financial and military cost.
    [Show full text]
  • Current Events and the Constitution: Snowden and the NSA
    Educating Young People about the Constitution Current Events and the Constitution: Snowden and the NSA A mere nine months ago no one knew the name Edward Snowden. Now not a week goes by without a news story related to his revelations about the National Security Agency (NSA). No doubt your class has already begun to ponder the implications of NSA information gathering and what it says about our system of governance. Does the executive branch, which controls the NSA through the Department of Defense, have too much power? How do we resolve the tension between liberty and security? Is Snowden, who released classified information, a traitor or a whistleblower? Were his actions morally justified? While the Snowden affair is too large to cover in its entirety (please look at some of the resources below for a great roundup), from a constitutional standpoint one of the most relevant aspects of the debate over his actions is the tension between the executive's war powers and civil liberties. There are numerous restrictions on the president using the power of the military on American civilians. The Third Amendment, for example, forbids the peacetime quartering of soldiers in domestic homes, and the Posse Comitatus Act of 1878 forbids the federal government from employing military personnel to enforce U.S. domestic law. Similarly, U.S. law prohibits intelligence agencies from targeting American citizens. The National Security Act of 1947, which established the Central Intelligence Agency (CIA), explicitly prohibited the agency from having "police, subpoena, law‐enforcement powers, or internal security functions." The intelligence agency reforms that emerged post‐Watergate required special court authorizations for surveillance of U.S.
    [Show full text]
  • America's Alleged Intelligence Failure in The
    University of Calgary PRISM: University of Calgary's Digital Repository Graduate Studies The Vault: Electronic Theses and Dissertations 2017 America’s Alleged Intelligence Failure in the Prelude to Operation Iraqi Freedom: A Study of Analytic Factors Cake, Timothy Cake, T. (2017). America’s Alleged Intelligence Failure in the Prelude to Operation Iraqi Freedom: A Study of Analytic Factors (Unpublished doctoral thesis). University of Calgary, Calgary, AB. doi:10.11575/PRISM/24784 http://hdl.handle.net/11023/3688 doctoral thesis University of Calgary graduate students retain copyright ownership and moral rights for their thesis. You may use this material in any way that is permitted by the Copyright Act or through licensing that has been assigned to the document. For uses that are not allowable under copyright legislation or licensing, you are required to seek permission. Downloaded from PRISM: https://prism.ucalgary.ca UNIVERSITY OF CALGARY America’s Alleged Intelligence Failure in the Prelude to Operation Iraqi Freedom: A Study of Analytic Factors by Timothy Cake A DISSERTATION SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY GRADUATE PROGRAM IN MILITARY, SECURITY, AND STRATEGIC STUDIES CALGARY, ALBERTA APRIL, 2017 © Timothy Cake 2017 ABSTRACT In the prelude to Operation Iraqi Freedom (OIF), notables in the G. W. Bush administration declared Iraq to be an existential threat as it had weapons of mass destruction (WMD) and connections to transnational terrorist groups. After the 2003 invasion of that state, coalition forces engaged in a search effort that found no significant evidence of WMD.
    [Show full text]
  • CONGRESSIONAL RECORD—SENATE, Vol. 154, Pt. 1 January 25, 2008 Mr
    868 CONGRESSIONAL RECORD—SENATE, Vol. 154, Pt. 1 January 25, 2008 Mr. WHITEHOUSE. Madam Presi- This is a very controversial and dif- we are going after the bad guys, and we dent, I appreciate very much the argu- ficult subject. Frankly, nearly every- have a right to do that. And we did this ments made by the very distinguished one, with the possible exception of the program because the process that had Senator from Missouri, who is also the chairman and ranking member or been set up because of abuses with re- vice chairman of the Intelligence Com- maybe one or two others on the Intel- spect to eavesdropping and spying on mittee and possesses great experience ligence Committee, knows very little American citizens decades ago, that in this area. My point, though, is that about that which we are discussing. process was way too cumbersome, took all these arguments are for naught if Let me put up a photograph of a far too much time, and we needed to the simple courtesy of a Senator being door. This is a door in San Francisco, streamline that. That is a paraphrase. allowed to vote on his amendment is CA, a rather unremarkable photograph But there was an admission that this not honored. of a door. This is a door that is in program existed and no additional This particular amendment being AT&T’s central offices in San Fran- legal authority needed to empower the nongermane postcloture means it may cisco. A courageous employee of AT&T President to do it.
    [Show full text]