Showing posts with label Continuity of Government. Show all posts
Showing posts with label Continuity of Government. Show all posts

Sunday, August 24, 2008

PROMIS, Main Core and The Suspension Of The Republic, Itself

ARE YOU ON THE LIST?

In the spring of 2007, a retired senior official in the U.S. Justice Department sat before Congress and told a story so odd and ominous, it could have sprung from the pages of a pulp political thriller. It was about a principled bureaucrat struggling to protect his country from a highly classified program with sinister implications. Rife with high drama, it included a car chase through the streets of Washington, D.C., and a tense meeting at the White House, where the president's henchmen made the bureaucrat so nervous that he demanded a neutral witness be present.


The bureaucrat was James Comey, John Ashcroft's second-in-command at the Department of Justice during Bush's first term. Comey had been a loyal political foot soldier of the Republican Party for many years. Yet in his testimony before the Senate Judiciary Committee, he described how he had grown increasingly uneasy reviewing the Bush administration's various domestic surveillance and spying programs. Much of his testimony centered on an operation so clandestine he wasn't allowed to name it or even describe what it did. He did say, however, that he and Ashcroft had discussed the program in March 2004, trying to decide whether it was legal under federal statutes. Shortly before the certification deadline, Ashcroft fell ill with pancreatitis, making Comey acting attorney general, and Comey opted not to certify the program. When he communicated his decision to the White House, Bush's men told him, in so many words, to take his concerns and stuff them in an undisclosed location.


The Continuity of Governance program encompasses national emergency plans that would trigger the takeover of the country by extra-constitutional forces. In short, it's a road map for martial law. Comey refused to knuckle under, and the dispute came to a head on the cold night of March 10, 2004, hours before the program's authorization was to expire. At the time, Ashcroft was in intensive care at George Washington Hospital following emergency surgery. Apparently, at the behest of President Bush himself, the White House tried, in Comey's words, "to take advantage of a very sick man," sending Chief of Staff Andrew Card and then–White House counsel Alberto Gonzales on a mission to Ashcroft's sickroom to persuade the heavily doped attorney general to override his deputy. Apprised of their mission, Comey, accompanied by a full security detail, jumped in his car, raced through the streets of the capital, lights blazing, and "literally ran" up the hospital stairs to beat them there.


Minutes later, Gonzales and Card arrived with an envelope filled with the requisite forms. Ashcroft, even in his stupor, did not fall for their heavy-handed ploy. "I'm not the attorney general," Ashcroft told Bush's men. "There"—he pointed weakly to Comey—"is the attorney general." Gonzales and Card were furious, departing without even acknowledging Comey's presence in the room. The following day, the classified domestic spying program that Comey found so disturbing went forward at the demand of the White House—"without a signature from the Department of Justice attesting as to its legality," he testified.


What was the mysterious program that had so alarmed Comey? Political blogs buzzed for weeks with speculation. Though Comey testified that the program was subsequently readjusted to satisfy his concerns, one can't help wondering whether the unspecified alteration would satisfy constitutional experts, or even average citizens. Faced with push-back from his bosses at the White House, did he simply relent and accept a token concession? Two months after Comey's testimony to Congress, the New York Times reported a tantalizing detail: The program that prompted him "to threaten resignation involved computer searches through massive electronic databases." The larger mystery remained intact, however. "It is not known precisely why searching the databases, or data mining, raised such a furious legal debate," the article conceded.



ONE NATION, UNDER SURVEILLANCE
James Comey testifies before the Senate Judiciary Committee
(Photo: Getty Images)


Another clue came from a rather unexpected source: President Bush himself. Addressing the nation from the Oval Office in 2005 after the first disclosures of the NSA's warrantless electronic surveillance became public, Bush insisted that the spying program in question was reviewed "every 45 days" as part of planning to assess threats to "the continuity of our government."


Few Americans—professional journalists included—know anything about so-called Continuity of Government (COG) programs, so it's no surprise that the president's passing reference received almost no attention. COG resides in a nebulous legal realm, encompassing national emergency plans that would trigger the takeover of the country by extra-constitutional forces—and effectively suspend the republic. In short, it's a road map for martial law.


While Comey, who left the Department of Justice in 2005, has steadfastly refused to comment further on the matter, a number of former government employees and intelligence sources with independent knowledge of domestic surveillance operations claim the program that caused the flap between Comey and the White House was related to a database of Americans who might be considered potential threats in the event of a national emergency. Sources familiar with the program say that the government's data gathering has been overzealous and probably conducted in violation of federal law and the protection from unreasonable search and seizure guaranteed by the Fourth Amendment.


According to a senior government official who served with high-level security clearances in five administrations, "There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived 'enemies of the state' almost instantaneously." He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.





DESPERATE TIMES
Should another 9/11 occur, Continuity of Governance plans developed during the Cold War go into effect
(Photo: Getty Images)


Of course, federal law is somewhat vague as to what might constitute a "national emergency." Executive orders issued over the past three decades define it as a "natural disaster, military attack, [or] technological or other emergency," while Department of Defense documents include eventualities like "riots, acts of violence, insurrections, unlawful obstructions or assemblages, [and] disorder prejudicial to public law and order." According to one news report, even "national opposition to U.S. military invasion abroad" could be a trigger.


Let's imagine a harrowing scenario: coordinated bombings in several American cities culminating in a major blast—say, a suitcase nuke—in New York City. Thousands of civilians are dead. Commerce is paralyzed. A state of emergency is declared by the president. Continuity of Governance plans that were developed during the Cold War and aggressively revised since 9/11 go into effect. Surviving government officials are shuttled to protected underground complexes carved into the hills of Maryland, Virginia, and Pennsylvania. Power shifts to a "parallel government" that consists of scores of secretly preselected officials. (As far back as the 1980s, Donald Rumsfeld, then CEO of a pharmaceutical company, and Dick Cheney, then a congressman from Wyoming, were slated to step into key positions during a declared emergency.) The executive branch is the sole and absolute seat of authority, with Congress and the judiciary relegated to advisory roles at best. The country becomes, within a matter of hours, a police state.


In case of a wide-scale attack, the executive branch becomes the sole and absolute seat of authority. The country becomes, within a matter of hours, a police stateInterestingly, plans drawn up during the Reagan administration suggest this parallel government would be ruling under authority given by law to the Federal Emergency Management Agency, home of the same hapless bunch that recently proved themselves unable to distribute water to desperate hurricane victims. The agency's incompetence in tackling natural disasters is less surprising when one considers that, since its inception in the 1970s, much of its focus has been on planning for the survival of the federal government in the wake of a decapitating nuclear strike.


Under law, during a national emergency, FEMA and its parent organization, the Department of Homeland Security, would be empowered to seize private and public property, all forms of transport, and all food supplies. The agency could dispatch military commanders to run state and local governments, and it could order the arrest of citizens without a warrant, holding them without trial for as long as the acting government deems necessary. From the comfortable perspective of peaceful times, such behavior by the government may seem far-fetched. But it was not so very long ago that FDR ordered 120,000 Japanese Americans—everyone from infants to the elderly—be held in detention camps for the duration of World War II. This is widely regarded as a shameful moment in U.S. history, a lesson learned. But a long trail of federal documents indicates that the possibility of large-scale detention has never quite been abandoned by federal authorities. Around the time of the 1968 race riots, for instance, a paper drawn up at the U.S. Army War College detailed plans for rounding up millions of "militants" and "American negroes," who were to be held at "assembly centers or relocation camps." In the late 1980s, the Austin American-Statesman and other publications reported the existence of 10 detention camp sites on military facilities nationwide, where hundreds of thousands of people could be held in the event of domestic political upheaval. More such facilities were commissioned in 2006, when Kellogg Brown & Root—then a subsidiary of Halliburton—was handed a $385 million contract to establish "temporary detention and processing capabilities" for the Department of Homeland Security. The contract is short on details, stating only that the facilities would be used for "an emergency influx of immigrants, or to support the rapid development of new programs." Just what those "new programs" might be is not specified.


In the days after our hypothetical terror attack, events might play out like this: With the population gripped by fear and anger, authorities undertake unprecedented actions in the name of public safety. Officials at the Department of Homeland Security begin actively scrutinizing people who—for a tremendously broad set of reasons—have been flagged in Main Core as potential domestic threats. Some of these individuals might receive a letter or a phone call, others a request to register with local authorities. Still others might hear a knock on the door and find police or armed soldiers outside. In some instances, the authorities might just ask a few questions. Other suspects might be arrested and escorted to federal holding facilities, where they could be detained without counsel until the state of emergency is no longer in effect.


It is, of course, appropriate for any government to plan for the worst. But when COG plans are shrouded in extreme secrecy, effectively unregulated by Congress or the courts, and married to an overreaching surveillance state—as seems to be the case with Main Core—even sober observers must weigh whether the protections put in place by the federal government are becoming more dangerous to America than any outside threat.


Another well-informed source—a former military operative regularly briefed by members of the intelligence community—says this particular program has roots going back at least to the 1980s and was set up with help from the Defense Intelligence Agency. He has been told that the program utilizes software that makes predictive judgments of targets' behavior and tracks their circle of associations with "social network analysis" and artificial intelligence modeling tools.


"The more data you have on a particular target, the better [the software] can predict what the target will do, where the target will go, who it will turn to for help," he says. "Main Core is the table of contents for all the illegal information that the U.S. government has [compiled] on specific targets." An intelligence expert who has been briefed by high-level contacts in the Department of Homeland Security confirms that a database of this sort exists, but adds that "it is less a mega-database than a way to search numerous other agency databases at the same time."



CROWD CONTROL New Yorkers walk home on the afternoon of the September 11 attacks (Photo: Getty Images)


A host of publicly disclosed programs, sources say, now supply data to Main Core. Most notable are the NSA domestic surveillance programs, initiated in the wake of 9/11, typically referred to in press reports as "warrantless wiretapping."


In March, a front-page article in the Wall Street Journal shed further light onto the extraordinarily invasive scope of the NSA efforts: According to the Journal, the government can now electronically monitor "huge volumes of records of domestic e-mails and Internet searches, as well as bank transfers, credit card transactions, travel, and telephone records." Authorities employ "sophisticated software programs" to sift through the data, searching for "suspicious patterns." In effect, the program is a mass catalog of the private lives of Americans. And it's notable that the article hints at the possibility of programs like Main Core. "The [NSA] effort also ties into data from an ad-hoc collection of so-called black programs whose existence is undisclosed," the Journal reported, quoting unnamed officials. "Many of the programs in various agencies began years before the 9/11 attacks but have since been given greater reach."


"We're at the edge of a cliff," says Bruce Fein, a top justice official in the Reagan administration. "To a national emergency planner, everybody looks like a danger to stability. "The following information seems to be fair game for collection without a warrant: the e-mail addresses you send to and receive from, and the subject lines of those messages; the phone numbers you dial, the numbers that dial in to your line, and the durations of the calls; the Internet sites you visit and the keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards. All of this information is archived on government supercomputers and, according to sources, also fed into the Main Core database.


Main Core also allegedly draws on four smaller databases that, in turn, cull from federal, state, and local "intelligence" reports; print and broadcast media; financial records; "commercial databases"; and unidentified "private sector entities." Additional information comes from a database known as the Terrorist Identities Datamart Environment, which generates watch lists from the Office of the Director of National Intelligence for use by airlines, law enforcement, and border posts. According to the Washington Post, the Terrorist Identities list has quadrupled in size between 2003 and 2007 to include about 435,000 names. The FBI's Terrorist Screening Center border crossing list, which listed 755,000 persons as of fall 2007, grows by 200,000 names a year. A former NSA officer tells Radar that the Treasury Department's Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to Main Core, as does a Pentagon program that was created in 2002 to monitor antiwar protesters and environmental activists such as Greenpeace.



HERE'S LOOKING AT YOU
From your late-night e-mails and travel plans to phone records and financial transactions, the government finds you fascinating—and may consider you a potential enemy of the state
(Photo: Illustration by Brett Ryder)



If previous FEMA and FBI lists are any indication, the Main Core database includes dissidents and activists of various stripes, political and tax protesters, lawyers and professors, publishers and journalists, gun owners, illegal aliens, foreign nationals, and a great many other harmless, average people.


A veteran CIA intelligence analyst who maintains active high-level clearances and serves as an advisor to the Department of Defense in the field of emerging technology tells Radar that during the 2004 hospital room drama, James Comey expressed concern over how this secret database was being used "to accumulate otherwise private data on non-targeted U.S. citizens for use at a future time." Though not specifically familiar with the name Main Core, he adds, "What was being requested of Comey for legal approval was exactly what a Main Core story would be." A source regularly briefed by people inside the intelligence community adds: "Comey had discovered that President Bush had authorized NSA to use a highly classified and compartmentalized Continuity of Government database on Americans in computerized searches of its domestic intercepts. [Comey] had concluded that the use of that 'Main Core' database compromised the legality of the overall NSA domestic surveillance project."


If Main Core does exist, says Philip Giraldi, a former CIA counterterrorism officer and an outspoken critic of the agency, the Department of Homeland Security (DHS) is its likely home. "If a master list is being compiled, it would have to be in a place where there are no legal issues"—the CIA and FBI would be restricted by oversight and accountability laws—"so I suspect it is at DHS, which as far as I know operates with no such restraints." Giraldi notes that DHS already maintains a central list of suspected terrorists and has been freely adding people who pose no reasonable threat to domestic security. "It's clear that DHS has the mandate for controlling and owning master lists. The process is not transparent, and the criteria for getting on the list are not clear." Giraldi continues, "I am certain that the content of such a master list [as Main Core] would not be carefully vetted, and there would be many names on it for many reasons—quite likely including the two of us."


UNDER REAGAN In the 1980s, control of the FBI's "security index" was reportedly transferred to none other than FEMA (Photo: Getty Images)


Would Main Core in fact be legal? According to constitutional scholar Bruce Fein, who served as associate deputy attorney general under Ronald Reagan, the question of legality is murky: "In the event of a national emergency, the executive branch simply assumes these powers"—the powers to collect domestic intelligence and draw up detention lists, for example—"if Congress doesn't explicitly prohibit it. It's really up to Congress to put these things to rest, and Congress has not done so." Fein adds that it is virtually impossible to contest the legality of these kinds of data collection and spy programs in court "when there are no criminal prosecutions and [there is] no notice to persons on the president's 'enemies list.' That means if Congress remains invertebrate, the law will be whatever the president says it is—even in secret. He will be the judge on his own powers and invariably rule in his own favor."


Compared to PROMIS, Richard Nixon's enemies list or Senator Joe McCarthy's blacklist look downright crudeThe veteran CIA intelligence analyst notes that Comey's suggestion that the offending elements of the program were dropped could be misleading: "Bush [may have gone ahead and] signed it as a National Intelligence Finding anyway."


But even if we never face a national emergency, the mere existence of the database is a matter of concern. "The capacity for future use of this information against the American people is so great as to be virtually unfathomable," the senior government official says.
In any case, mass watch lists of domestic citizens may do nothing to make us safer from terrorism. Jeff Jonas, chief scientist at IBM, a world-renowned expert in data mining, contends that such efforts won't prevent terrorist conspiracies. "Because there is so little historical terrorist event data," Jonas tells Radar, "there is not enough volume to create precise predictions."


The overzealous compilation of a domestic watch list is not unique in postwar American history. In 1950, the FBI, under the notoriously paranoid J. Edgar Hoover, began to "accumulate the names, identities, and activities" of suspect American citizens in a rapidly expanding "security index," according to declassified documents. In a letter to the Truman White House, Hoover stated that in the event of certain emergency situations, suspect individuals would be held in detention camps overseen by "the National Military Establishment." By 1960, a congressional investigation later revealed, the FBI list of suspicious persons included "professors, teachers, and educators; labor-union organizers and leaders; writers, lecturers, newsmen, and others in the mass-media field; lawyers, doctors, and scientists; other potentially influential persons on a local or national level; [and] individuals who could potentially furnish financial or material aid" to unnamed "subversive elements." This same FBI "security index" was allegedly maintained and updated into the 1980s, when it was reportedly transferred to the control of none other than FEMA (though the FBI denied this at the time).


FEMA, however—then known as the Federal Preparedness Agency—already had its own domestic surveillance system in place, according to a 1975 investigation by Senator John V. Tunney of California. Tunney, the son of heavyweight boxing champion Gene Tunney and the inspiration for Robert Redford's character in the film The Candidate, found that the agency maintained electronic dossiers on at least 100,000 Americans that contained information gleaned from wide-ranging computerized surveillance. The database was located in the agency's secret underground city at Mount Weather, near the town of Bluemont, Virginia. The senator's findings were confirmed in a 1976 investigation by the Progressive magazine, which found that the Mount Weather computers "can obtain millions of pieces [of] information on the personal lives of American citizens by tapping the data stored at any of the 96 Federal Relocation Centers"—a reference to other classified facilities. According to the Progressive, Mount Weather's databases were run "without any set of stated rules or regulations. Its surveillance program remains secret even from the leaders of the House and the Senate."



JUST IN CASE The Miami Herald contended that Reagan loyalist Oliver North had spearheaded the development of a "secret contingency plan" (Photo: Getty Images)


Ten years later, a new round of government martial law plans came to light. A report in the Miami Herald contended that Reagan loyalist and Iran-Contra conspirator Colonel Oliver North had spearheaded the development of a "secret contingency plan,"—code-named REX 84—which called "for suspension of the Constitution, turning control of the United States over to FEMA, [and the] appointment of military commanders to run state and local governments." The North plan also reportedly called for the detention of upwards of 400,000 illegal aliens and an undisclosed number of American citizens in at least 10 military facilities maintained as potential holding camps.


North's program was so sensitive in nature that when Texas congressman Jack Brooks attempted to question North about it during the 1987 Iran-Contra hearings, he was rebuffed even by his fellow legislators. "I read in Miami papers and several others that there had been a plan by that same agency [FEMA] that would suspend the American Constitution," Brooks said. "I was deeply concerned about that and wondered if that was the area in which he [North] had worked." Senator Daniel Inouye, chairman of the Senate Select Committee on Iran, immediately cut off his colleague, saying, "That question touches upon a highly sensitive and classified area, so may I request that you not touch upon that, sir." Though Brooks pushed for an answer, the line of questioning was not allowed to proceed.


Wired magazine turned up additional damaging information, revealing in 1993 that North, operating from a secure White House site, allegedly employed a software database program called PROMIS (ostensibly as part of the REX 84 plan). PROMIS, which has a strange and controversial history, was designed to track individuals—prisoners, for example—by pulling together information from disparate databases into a single record. According to Wired, "Using the computers in his command center, North tracked dissidents and potential troublemakers within the United States. Compared to PROMIS, Richard Nixon's enemies list or Senator Joe McCarthy's blacklist look downright crude." Sources have suggested to Radar that government databases tracking Americans today, including Main Core, could still have PROMIS-based legacy code from the days when North was running his programs.


In the wake of 9/11, domestic surveillance programs of all sorts expanded dramatically. As one well-placed source in the intelligence community puts it, "The gloves seemed to come off." What is not yet clear is what sort of still-undisclosed programs may have been authorized by the Bush White House. Marty Lederman, a high-level official at the Department of Justice under Clinton, writing on a law blog last year, wondered, "How extreme were the programs they implemented [after 9/11]? How egregious was the lawbreaking?" Congress has tried, and mostly failed, to find out.



HISTORY'S LESSONS
Japanese Americans moved to internment camps in World War II


In July 2007 and again last August, Representative Peter DeFazio, a Democrat from Oregon and a senior member of the House Homeland Security Committee, sought access to the "classified annexes" of the Bush administration's Continuity of Government program. DeFazio's interest was prompted by Homeland Security Presidential Directive 20 (also known as NSPD-51), issued in May 2007, which reserves for the executive branch the sole authority to decide what constitutes a national emergency and to determine when the emergency is over. DeFazio found this unnerving.


But he and other leaders of the Homeland Security Committee, including Chairman Bennie Thompson, a Mississippi Democrat, were denied a review of the Continuity of Government classified annexes. To this day, their calls for disclosure have been ignored by the White House. In a press release issued last August, DeFazio went public with his concerns that the NSPD-51 Continuity of Government plans are "extra-constitutional or unconstitutional." Around the same time, he told the Oregonian: "Maybe the people who think there's a conspiracy out there are right."


None of the leading presidential candidates have been asked the question, "As president, will you continue aggressive domestic surveillance programs in the vein of the Bush administration?"Congress itself has recently widened the path for both extra-constitutional detentions by the White House and the domestic use of military force during a national emergency. The Military Commissions Act of 2006 effectively suspended habeas corpus and freed up the executive branch to designate any American citizen an "enemy combatant" forfeiting all privileges accorded under the Bill of Rights. The John Warner National Defense Authorization Act, also passed in 2006, included a last-minute rider titled "Use of the Armed Forces in Major Public Emergencies," which allowed the deployment of U.S. military units not just to put down domestic insurrections—as permitted under posse comitatus and the Insurrection Act of 1807—but also to deal with a wide range of calamities, including "natural disaster, epidemic, or other serious public health emergency, terrorist attack, or incident."


More troubling, in 2002, Congress authorized funding for the U.S. Northern Command, or NORTHCOM, which, according to Washington Post military intelligence expert William Arkin, "allows for emergency military operations in the United States without civilian supervision or control."


"We are at the edge of a cliff and we're about to fall off," says constitutional lawyer and former Reagan administration official Bruce Fein. "To a national emergency planner, everybody looks like a danger to stability. There's no doubt that Congress would have the authority to denounce all this—for example, to refuse to appropriate money for the preparation of a list of U.S. citizens to be detained in the event of martial law. But Congress is the invertebrate branch. They say, 'We have to be cautious.' The same old crap you associate with cowards. None of this will change under a Democratic administration, unless you have exceptional statesmanship and the courage to stand up and say, 'You know, democracies accept certain risks that tyrannies do not.'"



CREDIBLE WITNESS James Comey (Photo: Getty Images)


As of this writing, DeFazio, Thompson, and the other 433 members of the House are debating the so-called Protect America Act, after a similar bill passed in the Senate. Despite its name, the act offers no protection for U.S. citizens; instead, it would immunize from litigation U.S. telecom giants for colluding with the government in the surveillance of Americans to feed the hungry maw of databases like Main Core. The Protect America Act would legalize programs that appear to be unconstitutional.


Meanwhile, the mystery of James Comey's testimony has disappeared in the morass of election year coverage. None of the leading presidential candidates have been asked the questions that are so profoundly pertinent to the future of the country: As president, will you continue aggressive domestic surveillance programs in the vein of the Bush administration? Will you release the COG blueprints that Representatives DeFazio and Thompson were not allowed to read? What does it suggest about the state of the nation that the U.S. is now ranked by worldwide civil liberties groups as an "endemic surveillance society," alongside repressive regimes such as China and Russia? How can a democracy thrive with a massive apparatus of spying technology deployed against every act of political expression, private or public? (Radar put these questions to spokespeople for the McCain, Obama, and Clinton campaigns, but at press time had yet to receive any responses.)


These days, it's rare to hear a voice like that of Senator Frank Church, who in the 1970s led the explosive investigations into U.S. domestic intelligence crimes that prompted the very reforms now being eroded. "The technological capacity that the intelligence community has given the government could enable it to impose total tyranny," Church pointed out in 1975. "And there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know."


Christopher Ketcham writes for Harper's, GQ, and Mother Jones, among other publications

UPDATE

Since this article went to press, several documents have emerged to suggest the story has longer legs than we thought. Most troubling among these is an October 2001 Justice Department memo that detailed the extra-constitutional powers the U.S. military might invoke during domestic operations following a terrorist attack. In the memo, John Yoo, then deputy assistant attorney general, "concluded that the Fourth Amendment had no application to domestic military operations." (Yoo, as most readers know, is author of the infamous Torture Memo that, in bizarro fashion, rejiggers the definition of "legal" torture to allow pretty much anything short of murder.) In the October 2001 memo, Yoo refers to a classified DOJ document titled "Authority for Use of Military Force to Combat Terrorist Activities Within the United States." According to the Associated Press, "Exactly what domestic military action was covered by the October memo is unclear. But federal documents indicate that the memo relates to the National Security Agency's Terrorist Surveillance Program." Attorney General John Mukasey last month refused to clarify before Congress whether the Yoo memo was still in force.


Meanwhile, congressional sources tell Radar that Congressman Peter DeFazio has apparently abandoned his effort to get to the bottom of the White House COG classified annexes. Penny Dodge, DeFazio's chief of staff, says otherwise. "We will be sending a letter requesting a classified briefing soon," she told Radar this week.


This article is from the May/June issue of Radar Magazine..


Global Research Articles by Christopher Ketcham



(In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. I.U. has no affiliation whatsoever with the originator of this article nor is I.U endorsed or sponsored by the originator.)


The Nazis, Fascists and Communists were political parties before they became enemies of liberty and mass murderers.


Wednesday, May 14, 2008

Continutiy Of Government; The Show Down

Congress, the Bush Administration and Continuity of Government Planning--
The Showdown



Written by Peter Dale Scott
Thursday, 01 May 2008
In August 2007, Congressman Peter DeFazio, a member of the House Homeland Security Committee, told the House that he and the rest of his Committee had been barred from reviewing parts of National Security Presidential Directive 51, the White House supersecret plans to implement so-called "Continuity of Government" in the event of a mass terror attack or natural disaster. (1)

Norm Ornstein, of the conservative American Enterprise Institute, commented, "I cannot think of one good reason" for denial. Ornstein added, "I find it inexplicable and probably reflective of the usual, knee-jerk overextension of executive power that we see from this White House." (2)

The story, ignored by the mainstream press, involved more than the usual tussle between the legislative and executive branches of the U.S. Government. What was at stake was a contest between Congress's constitutional powers of oversight, and a set of policy plans that could be used to suspend or modify the constitution.

There is nothing wrong with disaster planning per se. Like all governments, the U.S. government must develop plans for the worst contingencies. But Congress has a right to be concerned about Continuity of Government (COG) plans refined by Dick Cheney and Donald Rumsfeld over the past quarter century, which journalists have described as involving suspension of the constitution. (3)


In the 1980s, a secret group of planners inside and outside the government were assigned, by an Executive Order, to develop a response to a nuclear attack in which the U.S. government had been decapitated, forcing an alternative to the constitutional rules of succession. Two of these planners were Dick Cheney, then a Congressman, and Donald Rumsfeld, then a private citizen and CEO of the G.D. Searle drug company.

"One of the awkward questions we faced was whether to reconstitute Congress after a nuclear attack.It was decided that no, it would be easier to operate without them," said one of the COG planners in the 1980s, who spoke to James Mann (The Rise of the Vulcans, 141-42). James Bamford reported the same remark in his book Pretext for War (p. 74).

After the end of the Cold War, the urgency of coming up with plans faded. The COG nuclear planning project "has less than six months to live," reported Tim Weiner of the New York Times. (April 17, 1994). Mann and Bamford concluded, wrongly, that all the COG planning of the Reagan era had been abandoned.

In fact, Reagan's Executive Order 12656, issued in 1988, remained in effect. The order states that Continuity of Government procedures are called for in the event of "any occurrence, including natural disaster, military attack, technological emergency, or other emergency, that seriously degrades or seriously threatens the national security of the United States." (4)

Under Clinton, some parts of the planning, presumably military, were continued by a group including Rumsfeld and others whose roster (according to Andrew Cockburn) was "filled almost exclusively with Republican hawks." Cockburn quotes one participant, a former Pentagon official, who said "They'd meet, do the exercise, but also sit around and castigate the Clinton administration in the most extreme way." (5)

According to the 9/11 Commission Report (p. 326; cf. p. 38), "Contingency plans for the continuity of government" were implemented on September 11, 2001. (6) But what measures were invoked remains unclear.

Some clues may be supplied by COG's past history. COG planning in the 1980s was handled by the Federal Emergency Management Agency and its controversial director, Louis Giuffrida. According to a Miami Herald article by Alfonso Chardy on July 5, 1987, Giuffrida's plans included "suspension of the Constitution," along with detailed arrangements for the declaration of martial law. (7)

Those suspicious of what COG means today have pointed to a number of post 9/11 steps to facilitate the implementation of martial law, including the creation of a new military command (NORTHCOM ) for the continental United States. They note also Homeland Security's strategic plan Endgame, whose stated goal is the creation of detention camps designed to "remove all removable aliens," including "potential terrorists."

Then in 2007 National Security Presidential Directive 51 (NSPD 51 ), issued by the White House, empowered the President to personally ensure "continuity of government" in the event of any "catastrophic emergency." (8) According to the Washington Post (May 10, 2007), this directive "formalizes a shift of authority," from the Department of Homeland Security to the White House, in establishing " a shadow government " after an emergency. (9) Congress has yet to hold a single hearing on NSPD 51. (10)

NSPD 51 contains "classified Continuity Annexes" which shall "be protected from unauthorized disclosure." Congressman DeFazio twice requested to see these Annexes, the second time in a letter cosigned by House Homeland Security Committee Chairman Bennie Thompson and Oversight Subcommittee Chairman Christopher Carney. It was these requests that the White House denied.

Without full disclosure, such suspicions will only fester and distract from the real issue: the role of Congress in constitutional government. In the event of national emergency, Congress must be at the heart of the defense of democratic government and American territory. It is reasonable for the citizenry to ask, "How do Continuity of Government plans preserve and protect the role of the popularly chosen branch of government?" The answer is, we simply don't know.

DeFazio's inability to get access to the NSPD Annexes is less than reassuring. If members of the Homeland Security Committee cannot enforce their right to read secret plans of the Executive Branch, then the systems of checks and balances established by the U.S. Constitution would seem to be failing.

To put it another way, if the White House is successful in frustrating DeFazio, then Continuity of Government planning has arguably already superseded the Constitution as a higher authority.

Will Congress insist on its right of review COG planning? The answer to this question will depend on discussion in the blogosphere, the degree of pressure exerted by the electorate on their representatives, and the questions asked the men and women who would be president.

Peter Dale Scott is the author of The Road to 9/11.

Notes.

1. Congressional Record, August 2, 2007. The text of National Security Presidential Directive 51 can be seen here.

2. Jeff Kosseff, The Oregonian, July 20, 2007.

3. Scott, The Road to 9/11, 183-87; citing Ross Gelbspan, Break-ins, Death Threats, and the FBI: The Covert War against the Central America Movement (Boston: South End Press, 1991), 184; Alfonso Chardy, Miami Herald, July 5, 1987.

4. The provisions of Executive Order 12656 of November 18, 1988, appear at 53 FR 47491, 3 CFR, 1988 Comp., p. 585, "Executive Order 12656-Assignment of Emergency Preparedness Responsibilities,". The Washington Post (Gellman and Schmidt, "Shadow Government Is at Work in Secret," March 1, 2002) later claimed, incorrectly, that Executive Order 12656 dealt only with "a nuclear attack."

5. Andrew Cockburn, Rumsfeld: His Rise, Fall, and Catastrophic Legacy (New York: Scribner, 2007), 88)

6. 9/11 Commission Report, 326, cf. 38; Scott, Road to 9/11, 220-29.

7. Alfonso Chardy, "Reagan Aides and the `Secret' Government," Miami Herald, July 5, 1987.

8. National Security Presidential Directive 51.

9. Spencer S. Hsu, "Bush Changes Continuity Plan: Administration, Not DHS, Would Run Shadow Government," Washington Post, May 10, 2007,

10. Lewis Seiler and Dan Hamburg, San Francisco Chronicle (February 4, 2008).



Peter Dale Scott is a frequent contributor to Global Research. Global Research Articles by Peter Dale Scott


(In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. I.U. has no affiliation whatsoever with the originator of this article nor is I.U endorsed or sponsored by the originator.)


The Nazis, Fascists and Communists were political parties before they became enemies of liberty and mass murderers.

Tuesday, May 29, 2007

A Scary Message From Ron Paul (Listen Up!)

"Continuity of Government"

A Threat to the Constitution

by U.S. Rep. Ron Paul

TAKE ACTION:

Please Call, Write, and Email your Congressman and Senators, asking that they oppose the "Continuity of Government" proposals and any resulting proposed Constitutional amendment.

Please Donate Now to help this project.

The COGC Proposal

The "Continuity of Government Commission" (COGC), spearheaded by the Brookings Institution and the American Enterprise Institute, recently issued proposals for the operation of Congress following a catastrophic terrorist attack. Specifically, COGC advocates a constitutional amendment calling for the appointment of individuals to the House of Representatives to fill the seats of dead or incapacitated members, a first in American history. An examination of the proposal reveals that it is both unnecessary and dangerous.

Note that COGC is "self-commissioned," its members being neither elected nor appointed by any government body. The biographies of the commissioners demonstrate that COGC is made up mostly of professional lobbyists. Of course COGC is well-intentioned, but the nation should know exactly who is trying to substitute their wisdom for that of James Madison, Alexander Hamilton, and other framers of the Constitution. I think most Americans would prefer that proposals to amend the Constitution come from elected lawmakers or grassroots efforts, not from think tanks and lobbyists.

One reading the COGC proposal cannot help but sense the familiar Washington conceit at work, a conceit that sees America as totally dependent on the workings of Capitol Hill. It is simply unthinkable to many in Washington that the American people might survive a period in which Congress did not pass any new laws. But the truth is that the federal state is not America. The American people have always been remarkably resilient in the face of emergencies, and individual states are far more equipped to deal with emergencies and fill congressional vacancies than COGC imagines.

COGC is Unnecessary

Every generation seems to labor under the delusion that it lives in the most dangerous and turbulent time in human history. COGC certainly proves this point. Its proposal provides doomsday scenarios designed to make us believe that the threat of modern terrorism poses a much greater risk to our government institutions than ever existed in the past. Yet is Congress really more vulnerable than it was at the height of the Cold War, when a single Soviet missile could have destroyed Washington? Surely Congress faced greater danger in 1814, when the British army actually invaded Washington, routed the city, and burned down the White House! Somehow the republic survived those much more perilous times without a constitutional amendment calling for the emergency appointment of Representatives.

The scenarios offered by the commission, while theoretically possible, are highly unlikely to disable Congress. Remember, a majority of members assemble together in one place only rarely; even during votes most members are not on the floor together at the same time

Inauguration ceremonies and State of the Union addresses often bring together a majority of members in the same place, but simple precautions could be taken to keep a sufficient number away from such events. Even a direct terrorist attack on the Pentagon failed to disrupt the operation of the Department of Defense. The COGC proposal exaggerates the likelihood that a terrorist strike on Washington would incapacitate the House of Representatives, and exaggeration is a bad reason to amend the Constitution.

Existing Constitutional Provisions are Adequate

It is important to understand that the Constitution already provides the framework for Congress to function after a catastrophic event. Article I section 2 grants the governors of the various states authority to hold special elections to fill vacancies in the House of Representatives. Article I section 4 gives Congress the authority to designate the time, manner, and place of such special elections if states should fail to act expeditiously following a national emergency. As Hamilton explains in Federalist 59, the "time, place, and manner" clause was specifically designed to address the kind of extraordinary circumstances imagined by COGC. Hamilton characterized authority over federal elections as shared between the states and Congress, with neither being able to control the process entirely.

COGC posits that states could not hold special elections quickly enough after a terrorist act to guarantee the functioning of Congress. But even COGC reports that the average length of House vacancies, following the death of a member until the swearing in of a successor after a special election, is only 126 days. Certainly this period could be shortened given the urgency created by a terrorist attack. We should not amend the Constitution simply to avoid having a reduced congressional body for a month or two.

In fact, Congress often goes months without passing significant legislation, and takes long breaks in August and December. If anything, legislation passed in the aftermath of a terrorist event is likely to be based on emotion, not reason. The terrible Patriot Act, passed only one month after September 11th by a credulous Congress, is evidence of this.

Also, advances in technology can be used to reduce the risk of a disruption in congressional continuity following an emergency. Members already carry Blackberry devices to maintain communications even if cut off from their offices. Similar technology can be used to allow remote electronic voting by members. Congress should focus on contingency plans that utilize technology, not a constitutional amendment.

States have a wide variety of electronic and telephonic technology at their disposal to speed up the process of special elections. Consider that popular television shows hold votes that poll millions of Americans in a single night! Yet COGC ignores alternatives to standard voting and incorrectly assumes that states will be in disarray and unable to hold elections for months.
COGC is Dangerous because the House Must Be Elected

At its heart, the COGC proposal is fundamentally at odds with the right of the people always to elect their members of the House of Representatives. The House must be elected. Even "temporary" appointees would be unacceptable, because the laws passed would be permanent.

The problems with appointment of "representatives" are obvious. COGC calls for a general constitutional amendment that gives Congress wide power to make rules for filling vacancies "in the event that a substantial number of members are killed or incapacitated." Such an amendment would be unavoidably vague, open to broad interpretation and abuse. In defining terms like "vacancy," "substantial," and "incapacitated," Congress or the courts would be setting a dangerous precedent for a more elastic constitutional framework. Members of Congress simply cannot appoint their colleagues; the conflict of interest is glaring.

Alternate proposals allowing state governors to appoint representatives from a list of successors nominated by members are no better. The House of Representatives represents the people, not the states. Single states often exhibit wide variations in political makeup even among voters of the same party. Appointment by governors, even though the successors represent the dead member’s party choice, could change the ideological composition of Congress contrary to the will of the people. Furthermore, voters choose an individual candidate, not a panel. They should not be required to consider the qualifications of a candidate’s potential successors.

COGC focuses on government legitimacy, arguing that a House of Representatives with only a handful of surviving members would not be seen as legitimate by the public. In fact the opposite is true: appointed "representatives" will never be seen as legitimate and in fact would not be legitimate. Without exception, every member of the House of Representatives has been elected by voters in the member’s district. Madison states in Federalist 52 that "The definition of the right of suffrage is very justly regarded as a fundamental article of republican government." The very legitimacy of the House of Representatives is based on its constitutional status as the most directly accountable federal body.

The House passes numerous laws, often by voice vote, with very few members present. The legitimacy of those laws is not called into question. Even a House made up of only five elected members would have more legitimacy, as the living continuation of the only elected entity in government, than a House composed of five surviving members and 430 appointees. Furthermore, even a decimated House membership would have to pass legislation with the concurrence of the Senate, which could be restored to full strength immediately by state governors.

Consider a scenario COGC forgot to mention. Imagine a terrorist strike kills a majority of members of the House of Representatives. 200 members survive, and 235 are appointed by state governors on a "temporary basis." This new body considers a bill that drastically increases taxes to pay for emergency measures, while suspending civil liberties and imposing martial law. The bill passes, with 195 elected members opposed and all 235 appointed members in favor. Only 5 elected members support the measure. Would the electorate consider this legislation legitimate? Hardly. Yet this is the type of outcome we must expect under the COGC proposal.

Conclusion

To quote Professor Charles Rice, a distinguished Professor Emeritus at Notre Dame Law School: "When it is not necessary to amend the Constitution, it is necessary not to amend the Constitution." We must not allow the understandable fears and passions engendered by the events of September 11th to compel a rushed and grievous injury to our system of government.

The Constitution is our best ally in times of relative crisis; it is precisely during such times we should hold to it most dearly. Rather than amending the Constitution, Congress should be meeting to discuss how to preserve our existing institutions- including an elected House- in the event of a terrorist attack. The Constitution already provides us with the framework, while technology gives states the ability organize elections quickly. The COGC proposal not only makes a mountain out of a molehill, but also acutely threatens the delicate balance of federal power established in the Constitution.

(In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. I.U. has no affiliation whatsoever with the originator of this article nor is I.U endorsed or sponsored by the originator.)

The Nazis, Fascists and Communists were political parties before they became enemies of liberty and mass murderers.

Wednesday, May 23, 2007

Be Very Afraid......


Is this Junior's "Enabling Act?"

Might as well get everything in order for the next attack.

National Security and Homeland Security Presidential Directive
White House News

NATIONAL SECURITY PRESIDENTIAL DIRECTIVE/NSPD 51

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE/HSPD-20

Subject: National Continuity Policy

Purpose

(1) This directive establishes a comprehensive national policy on the continuity of Federal Government structures and operations and a single National Continuity Coordinator responsible for coordinating the development and implementation of Federal continuity policies. This policy establishes "National Essential Functions," prescribes continuity requirements for all executive departments and agencies, and provides guidance for State, local, territorial, and tribal governments, and private sector organizations in order to ensure a comprehensive and integrated national continuity program that will enhance the credibility of our national security posture and enable a more rapid and effective response to and recovery from a national emergency.
Definitions

(2) In this directive:

(a) "Category" refers to the categories of executive departments and agencies listed in Annex A to this directive;

(b) "Catastrophic Emergency" means any incident, regardless of location, that results in extraordinary levels of mass casualties, damage, or disruption severely affecting the U.S. population, infrastructure, environment, economy, or government functions;

(c) "Continuity of Government," or "COG," means a coordinated effort within the Federal Government's executive branch to ensure that National Essential Functions continue to be performed during a Catastrophic Emergency;

(d) "Continuity of Operations," or "COOP," means an effort within individual executive departments and agencies to ensure that Primary Mission-Essential Functions continue to be performed during a wide range of emergencies, including localized acts of nature, accidents, and technological or attack-related emergencies;

(e) "Enduring Constitutional Government," or "ECG," means a cooperative effort among the executive, legislative, and judicial branches of the Federal Government, coordinated by the President, as a matter of comity with respect to the legislative and judicial branches and with proper respect for the constitutional separation of powers among the branches, to preserve the constitutional framework under which the Nation is governed and the capability of all three branches of government to execute constitutional responsibilities and provide for orderly succession, appropriate transition of leadership, and interoperability and support of the National Essential Functions during a catastrophic emergency;

(f) "Executive Departments and Agencies" means the executive departments enumerated in 5 U.S.C. 101, independent establishments as defined by 5 U.S.C. 104(1), Government corporations as defined by 5 U.S.C. 103(1), and the United States Postal Service;

(g) "Government Functions" means the collective functions of the heads of executive departments and agencies as defined by statute, regulation, presidential direction, or other legal authority, and the functions of the legislative and judicial branches;

(h) "National Essential Functions," or "NEFs," means that subset of Government Functions that are necessary to lead and sustain the Nation during a catastrophic emergency and that, therefore, must be supported through COOP and COG capabilities; and

(i) "Primary Mission Essential Functions," or "PMEFs," means those Government Functions that must be performed in order to support or implement the performance of NEFs before, during, and in the aftermath of an emergency.
Policy


(3) It is the policy of the United States to maintain a comprehensive and effective continuity capability composed of Continuity of Operations and Continuity of Government programs in order to ensure the preservation of our form of government under the Constitution and the continuing performance of National Essential Functions under all conditions.
Implementation Actions


(4) Continuity requirements shall be incorporated into daily operations of all executive departments and agencies. As a result of the asymmetric threat environment, adequate warning of potential emergencies that could pose a significant risk to the homeland might not be available, and therefore all continuity planning shall be based on the assumption that no such warning will be received. Emphasis will be placed upon geographic dispersion of leadership, staff, and infrastructure in order to increase survivability and maintain uninterrupted Government Functions. Risk management principles shall be applied to ensure that appropriate operational readiness decisions are based on the probability of an attack or other incident and its consequences.


(5) The following NEFs are the foundation for all continuity programs and capabilities and represent the overarching responsibilities of the Federal Government to lead and sustain the Nation during a crisis, and therefore sustaining the following NEFs shall be the primary focus of
the Federal Government leadership during and in the aftermath of an emergency that adversely affects the performance of Government Functions:

(a) Ensuring the continued functioning of our form of government under the Constitution, including the functioning of the three separate branches of government;

(b) Providing leadership visible to the Nation and the world and maintaining the trust and confidence of the American people;

(c) Defending the Constitution of the United States against all enemies, foreign and domestic, and preventing or interdicting attacks against the United States or its people, property, or interests;

(d) Maintaining and fostering effective relationships with foreign nations;

(e) Protecting against threats to the homeland and bringing to justice perpetrators of crimes or attacks against the United States or its people, property, or interests;

(f) Providing rapid and effective response to and recovery from the domestic consequences of an attack or other incident;

(g) Protecting and stabilizing the Nation's economy and ensuring public confidence in its financial systems; and

(h) Providing for critical Federal Government services that address the national health, safety, and welfare needs of the United States.


(6) The President shall lead the activities of the Federal Government for ensuring constitutional government. In order to advise and assist the President in that function, the Assistant to the President for Homeland Security and Counterterrorism (APHS/CT) is hereby designated as the National Continuity Coordinator. The National Continuity Coordinator, in coordination with the Assistant to the President for National

Security Affairs (APNSA), without exercising directive authority, shall coordinate the development and implementation of continuity policy for executive departments and agencies. The Continuity Policy Coordination Committee (CPCC), chaired by a Senior Director from the Homeland Security Council staff, designated by the National Continuity Coordinator, shall be the main day-to-day forum for such policy coordination.


(7) For continuity purposes, each executive department and agency is assigned to a category in accordance with the nature and characteristics of its national security roles and
responsibilities in support of the Federal Government's ability to sustain the NEFs. The Secretary of Homeland Security shall serve as the President's lead agent for coordinating overall
continuity operations and activities of executive departments and agencies, and in such role shall perform the responsibilities set forth for the Secretary in sections 10 and 16 of this directive.


(8) The National Continuity Coordinator, in consultation with the heads of appropriate executive departments and agencies, will lead the development of a National Continuity Implementation Plan (Plan), which shall include prioritized goals and objectives, a concept of operations, performance metrics by which to measure continuity readiness, procedures for continuity and incident management activities, and clear direction to executive department and agency continuity coordinators, as well as guidance to promote interoperability of Federal Government continuity programs and procedures with State, local, territorial, and tribal governments, and private sector owners and operators of critical infrastructure, as appropriate. The Plan shall be submitted to the President for approval not later than 90 days after the date of this directive.


(9) Recognizing that each branch of the Federal Government is responsible for its own continuity programs, an official designated by the Chief of Staff to the President shall ensure that the executive branch's COOP and COG policies in support of ECG efforts are appropriately coordinated with those of the legislative and judicial branches in order to ensure interoperability and allocate national assets efficiently to maintain a functioning Federal Government.


(10) Federal Government COOP, COG, and ECG plans and operations shall be appropriately integrated with the emergency plans and capabilities of State, local, territorial, and tribal governments, and private sector owners and operators of critical infrastructure, as appropriate, in order to promote interoperability and to prevent redundancies and conflicting lines of authority. The Secretary of Homeland Security shall coordinate the integration of Federal continuity plans and operations with State, local, territorial, and tribal governments, and private sector owners and operators of critical infrastructure, as appropriate, in order to provide for the delivery of essential services during an emergency.


(11) Continuity requirements for the Executive Office of the President (EOP) and executive departments and agencies shall include the following:

(a) The continuation of the performance of PMEFs during any emergency must be for a period up to 30 days or until normal operations can be resumed, and the capability to be fully operational at alternate sites as soon as possible after the occurrence of an emergency, but not later than 12 hours after COOP activation;

(b) Succession orders and pre-planned devolution of authorities that ensure the emergency delegation of authority must be planned and documented in advance in accordance with applicable law;

(c) Vital resources, facilities, and records must be safeguarded, and official access to them must be provided;

(d) Provision must be made for the acquisition of the resources necessary for continuity operations on an emergency basis;

(e) Provision must be made for the availability and redundancy of critical communications capabilities at alternate sites in order to support connectivity between
and among key government leadership, internal elements, other executive departments and agencies, critical partners, and the public;

(f) Provision must be made for reconstitution capabilities that allow for recovery from a catastrophic emergency and resumption of normal operations; and

(g) Provision must be made for the identification, training, and preparedness of personnel capable of relocating to alternate facilities to support the continuation of the performance of PMEFs.


(12) In order to provide a coordinated response to escalating threat levels or actual emergencies, the Continuity of Government Readiness Conditions (COGCON) system establishes executive branch continuity program readiness levels, focusing
on possible threats to the National Capital Region. The President will determine and issue the COGCON Level. Executive departments and agencies shall comply with the requirements and
assigned responsibilities under the COGCON program. During COOP activation, executive departments and agencies shall report their readiness status to the Secretary of Homeland Security or the Secretary's designee.


(13) The Director of the Office of Management and Budget shall:

(a) Conduct an annual assessment of executive department and agency continuity funding requests and performance data that are submitted by executive departments and agencies as part of the annual budget request process, in order to monitor progress in the implementation of the Plan and the execution of continuity budgets;

(b) In coordination with the National Continuity Coordinator, issue annual continuity planning guidance for the development of continuity budget requests; and

(c) Ensure that heads of executive departments and agencies prioritize budget resources for continuity capabilities, consistent with this directive.


(14) The Director of the Office of Science and Technology Policy shall:

(a) Define and issue minimum requirements for continuity communications for executive departments and agencies, in consultation with the APHS/CT, the APNSA, the Director of the Office of Management and Budget, and the Chief of Staff to the President;

(b) Establish requirements for, and monitor the development, implementation, and maintenance of, a comprehensive communications architecture to integrate continuity components, in consultation with the APHS/CT, the APNSA, the Director of the Office of Management and Budget, and the Chief of Staff to the President; and

(c) Review quarterly and annual assessments of continuity communications capabilities, as prepared pursuant to section 16(d) of this directive or otherwise, and report the results and recommended remedial actions to the National Continuity Coordinator.


(15) An official designated by the Chief of Staff to the President shall:

(a) Advise the President, the Chief of Staff to the President, the APHS/CT, and the APNSA on COGCON operational execution options; and

(b) Consult with the Secretary of Homeland Security in order to ensure synchronization and integration of continuity activities among the four categories of executive departments and agencies.


(16) The Secretary of Homeland Security shall:

(a) Coordinate the implementation, execution, and assessment of continuity operations and activities;

(b) Develop and promulgate Federal Continuity Directives in order to establish continuity planning requirements for executive departments and agencies;

(c) Conduct biennial assessments of individual department and agency continuity capabilities as prescribed by the Plan and report the results to the President through the APHS/CT;

(d) Conduct quarterly and annual assessments of continuity communications capabilities in consultation with an official designated by the Chief of Staff to the President;

(e) Develop, lead, and conduct a Federal continuity training and exercise program, which shall be incorporated into the National Exercise Program developed pursuant to Homeland Security Presidential Directive-8 of December 17, 2003 ("National Preparedness"), in consultation with an official designated by the Chief of Staff to the President;

(f) Develop and promulgate continuity planning guidance to State, local, territorial, and tribal governments, and private sector critical infrastructure owners and operators;

(g) Make available continuity planning and exercise funding, in the form of grants as provided by law, to State, local, territorial, and tribal governments, and private sector critical infrastructure owners and operators; and

(h) As Executive Agent of the National Communications System, develop, implement, and maintain a comprehensive continuity communications architecture.


(17) The Director of National Intelligence, in coordination with the Attorney General and the Secretary of Homeland Security, shall produce a biennial assessment of the foreign and domestic threats to the Nation's continuity of government.


(18) The Secretary of Defense, in coordination with the Secretary of Homeland Security, shall provide secure, integrated, Continuity of Government communications to the President, the Vice President, and, at a minimum, Category I executive departments and agencies.

(19) Heads of executive departments and agencies shall execute their respective department or agency COOP plans in response to a localized emergency and shall:

(a) Appoint a senior accountable official, at the Assistant Secretary level, as the Continuity Coordinator for the department or agency;

(b) Identify and submit to the National Continuity Coordinator the list of PMEFs for the department or agency and develop continuity plans in support of the NEFs and the continuation of essential functions under all conditions;

(c) Plan, program, and budget for continuity capabilities consistent with this directive;

(d) Plan, conduct, and support annual tests and training, in consultation with the Secretary of Homeland Security, in order to evaluate program readiness and ensure adequacy and viability of continuity plans and communications systems; and

(e) Support other continuity requirements, as assigned by category, in accordance with the nature and characteristics of its national security roles and responsibilities
General Provisions

(20) This directive shall be implemented in a manner that is consistent with, and facilitates effective implementation of, provisions of the Constitution concerning succession to the Presidency or the exercise of its powers, and the Presidential Succession Act of 1947 (3 U.S.C.

19), with consultation of the Vice President and, as appropriate, others involved. Heads of executive departments and agencies shall ensure that appropriate
support is available to the Vice President and others involved as necessary to be prepared at all times to implement those provisions.


(21) This directive:

(a) Shall be implemented consistent with applicable law and the authorities of agencies, or heads of agencies, vested by law, and subject to the availability of appropriations;

(b) Shall not be construed to impair or otherwise affect (i) the functions of the Director of the Office of Management and Budget relating to budget, administrative, and legislative proposals, or (ii) the authority of the Secretary of Defense over the Department of Defense, including the chain of command for military forces from the President, to the Secretary of Defense, to the commander of military forces, or military command and control procedures; and

(c) Is not intended to, and does not, create any rights or benefits, substantive or procedural, enforceable at law or in equity by a party against the United States, its
agencies, instrumentalities, or entities, its officers, employees, or agents, or any other person.


(22) Revocation. Presidential Decision Directive 67 of October 21, 1998 ("Enduring Constitutional Government and Continuity of Government Operations"), including all Annexes thereto, is hereby revoked.


(23) Annex A and the classified Continuity Annexes, attached hereto, are hereby incorporated into and made a part of this directive.

(24) Security. This directive and the information contained herein shall be protected from unauthorized disclosure, provided that, except for Annex A, the Annexes attached to this directive are classified and shall be accorded appropriate handling, consistent with applicable Executive Orders.

GEORGE W. BUSH


(In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. I.U. has no affiliation whatsoever with the originator of this article nor is I.U endorsed or sponsored by the originator.)

The Nazis, Fascists and Communists were political parties before they became enemies of liberty and mass murderers.