Friday, December 30, 2005

FindLaw's Writ - Dean: George W. Bush as the New Richard M. Nixon

FindLaw's Writ - Dean: George W. Bush as the New Richard M. Nixon: "George W. Bush as the New Richard M. Nixon: Both Wiretapped Illegally, and Impeachably; | Both Claimed That a President May Violate Congress' Laws to Protect | National Security | By JOHN W. DEAN | Friday, Dec. 30, 2005

On Friday, December 16, the New York Times published a major scoop by James Risen and Eric Lichtblau: They reported that Bush authorized the National Security Agency (NSA) to spy on Americans without warrants, ignoring the procedures of the Foreign Intelligence Surveillance Act (FISA)."
...

Then, on Saturday, December 17, in his radio broadcast, Bush admitted that the New York Times was correct - and thus conceded he had committed an impeachable offense.

There can be no serious question that warrantless wiretapping, in violation of the law, is impeachable. After all, Nixon was charged in Article II of his bill of impeachment with illegal wiretapping for what he, too, claimed were national security reasons.
...

Indeed, here, Bush may have outdone Nixon: Nixon's illegal surveillance was limited; Bush's, it is developing, may be extraordinarily broad in scope. First reports indicated that NSA was only monitoring foreign calls, originating either in the USA or abroad, and that no more than 500 calls were being covered at any given time. But later reports have suggested that NSA is "data mining" literally millions of calls - and has been given access by the telecommunications companies to "switching" stations through which foreign communications traffic flows.

In sum, this is big-time, Big Brother electronic surveillance.

Given the national security implications of the story, the Times said they had been sitting on it for a year. And now that it has broken, Bush has ordered a criminal investigation into the source of the leak. He suggests that those who might have felt confidence they would not be spied on, now can have no such confidence, so they may find other methods of communicating. Other than encryption and code, it is difficult to envision how. ...

No comments: