{"id":67179,"date":"2006-01-15T00:00:00","date_gmt":"2006-01-15T00:00:00","guid":{"rendered":"https:\/\/new.dedefensa.org\/index.php\/2006\/01\/15\/gw-est-il-un-petit-devin-qui-savait-avant-911-quil-devrait-espionner-des-americains-a-cause-de-911\/"},"modified":"2006-01-15T00:00:00","modified_gmt":"2006-01-15T00:00:00","slug":"gw-est-il-un-petit-devin-qui-savait-avant-911-quil-devrait-espionner-des-americains-a-cause-de-911","status":"publish","type":"post","link":"https:\/\/new.dedefensa.org\/index.php\/2006\/01\/15\/gw-est-il-un-petit-devin-qui-savait-avant-911-quil-devrait-espionner-des-americains-a-cause-de-911\/","title":{"rendered":"GW est-il un petit devin qui savait avant 9\/11 qu&rsquo;il devrait espionner des Am\u00e9ricains \u00e0 cause de 9\/11?"},"content":{"rendered":"<p><p>Jason Leopold analyse dans <a href=\"http:\/\/www.truthout.org\/docs_2006\/011306Z.shtml\" class=\"gen\">un article pour Truthout<\/a> du 13 janvier une question troublante dans le cadre du scandale des \u00e9coutes de communications d&rsquo;Am\u00e9ricains par la NSA. Il semble en effet qu&rsquo;un ordre, implicite ou pas c&rsquo;est selon, d&rsquo;effectuer certaines \u00e9coutes \u00e9lectroniques de communication de citoyens am\u00e9ricains ait \u00e9t\u00e9 donn\u00e9 par l&rsquo;administration GW peu apr\u00e8s l&rsquo;entr\u00e9e en fonction de Bush, avant l&rsquo;attaque du 11 septembre. GW Bush a toujours justifi\u00e9 ces \u00e9coutes par l&rsquo;attaque du 11 septembre et ses cons\u00e9quences (et, au niveau de ce qu&rsquo;il juge \u00eatre de la l\u00e9galit\u00e9 de ses \u00e9coutes, par les War Powers vot\u00e9s par le Congr\u00e8s apr\u00e8s 9\/11 et \u00e0 cause de 9\/11).<\/p>\n<\/p>\n<p><p>\tJason Leopold \u00e9tudie l&rsquo;affaire du point de vue l\u00e9gal, cherchant notamment \u00e0 renforcer le constat de l&rsquo;ill\u00e9galit\u00e9 des \u00e9coutes du fait de ces \u00e9coutes pr\u00e9-9\/11. Il signale que le fait des \u00e9coutes pr\u00e9-9\/11 appara\u00eet mentionn\u00e9 dans le livre de James Risen, le journaliste \u00e0 la base de l&rsquo;article du New York <em>Times<\/em> du 17 d\u00e9cembre 2005 qui a fait \u00e9clater l&rsquo;affaire: \u00ab <em>James Risen, author of the book State of War&rsquo; and credited with first breaking the story about the NSA&rsquo;s domestic surveillance operations, said President Bush personally authorized a change in the agency&rsquo;s long-standing policies shortly after he was sworn in in 2001.<\/em><\/p>\n<\/p>\n<p><p>\t\u00bb <em>The president personally and directly authorized new operations, like the NSA&rsquo;s domestic surveillance program, that almost certainly would never have been approved under normal circumstances and that raised serious legal or political questions, Risen wrote in the book. Because of the fevered climate created throughout the government by the president and his senior advisers, Bush sent signals of what he wanted done, without explicit presidential orders and the most ambitious got the message.<\/em> \u00bb<\/p>\n<\/p>\n<p><p>\tJason Leopold signale d&rsquo;autres pr\u00e9cisions, notamment des t\u00e9moignages de professionnels des t\u00e9l\u00e9communications: \u00ab <em>According to the online magazine Slate, an unnamed official in the telecom industry said NSA&rsquo;s efforts to obtain call details go back to early 2001, predating the 9\/11 attacks and the president&rsquo;s now celebrated secret executive order. The source reports that the NSA approached U.S. carriers and asked for their cooperation in a data-mining&rsquo; operation, which might eventually cull millions&rsquo; of individual calls and e-mails.<\/em> \u00bb<\/p>\n<\/p>\n<p><p>\tUne question int\u00e9ressante, que n&rsquo;aborde pas directement Leopold, est celle de savoir pourquoi l&rsquo;administration GW a ordonn\u00e9 (sugg\u00e9r\u00e9 conviendrait mieux) de telles \u00e9coutes peu apr\u00e8s son entr\u00e9e en fonction et avant l&rsquo;attaque du 11 septembre. Ces sp\u00e9culations ont toutes les chances de renforcer les soup\u00e7ons de ceux qui jugent que l&rsquo;attaque du 11 septembre n&rsquo;est pas survenue comme une compl\u00e8te surprise pour l&rsquo;administration, et, au-del\u00e0, de renforcer les hypoth\u00e8ses et th\u00e9ories de complots qui sont d\u00e9velopp\u00e9es autour de cette attaque.<\/p>\n<\/p>\n<p><\/p>\n<p><p>\tMis en ligne le 15 janvier 2006 \u00e0 06H00<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jason Leopold analyse dans un article pour Truthout du 13 janvier une question troublante dans le cadre du scandale des \u00e9coutes de communications d&rsquo;Am\u00e9ricains par la NSA. Il semble en effet qu&rsquo;un ordre, implicite ou pas c&rsquo;est selon, d&rsquo;effectuer certaines \u00e9coutes \u00e9lectroniques de communication de citoyens am\u00e9ricains ait \u00e9t\u00e9 donn\u00e9 par l&rsquo;administration GW peu apr\u00e8s&hellip;&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2],"tags":[354,370,4926,4915,4916,4981,4982],"class_list":["post-67179","post","type-post","status-publish","format-standard","hentry","category-bloc-notes","tag-354","tag-370","tag-complot","tag-ecoutes","tag-illegales","tag-leopold","tag-risen"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/posts\/67179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/comments?post=67179"}],"version-history":[{"count":0,"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/posts\/67179\/revisions"}],"wp:attachment":[{"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/media?parent=67179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/categories?post=67179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.dedefensa.org\/index.php\/wp-json\/wp\/v2\/tags?post=67179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}