Related by context. Frequent words. (Click for all words.) 49 torture memos 48 memos 48 Jamie Gorelick 48 NSA wiretapping 48 warrantless surveillance 46 Patriot Act 46 AUMF 45 NSA spying 45 REAL ID Act 45 NSLs 44 warrantless wiretapping program 44 Intelligence Committees 44 USA PATRIOT Act 44 warrantless wiretaps 44 memo 43 NSA surveillance 43 Philip Zelikow 43 Plame leak 43 FOIA 43 warrantless domestic 43 USA Patriot Act 43 PATRIOT Act 43 DoJ 42 warrantless eavesdropping 42 Terrorist Surveillance Program 42 OLC 42 counsel Alberto Gonzales 42 interrogation tapes 42 Combating Terrorism 42 Chertoff 42 Homeland Security 42 Counsel Alberto Gonzales 42 NSA 41 DOJ 41 declassifying 41 Whistleblower Protection Act 41 Ashcroft 41 Secure Fence Act 41 counterterrorism 41 Intelligence Committee 41 memos detailing 41 coercive interrogation techniques 41 Gorelick 41 Powers Resolution 41 DNI 41 CIA interrogations 41 cybersecurity 41 warrantless spying 40 declassification 40 DHS 40 Gramm Leach Bliley Act 40 Effective Death Penalty 40 Wiretapping 40 FISA 40 Ben Veniste 40 enhanced interrogation techniques 40 Homeland Security Presidential Directive 40 Nuclear Posture Review 40 von Spakovsky 40 National Intelligence Estimate 40 Zelikow 40 Military Commissions Act 40 ODNI 40 Brian Roehrkasse 40 Lichtblau 40 Posse Comitatus Act 40 Able Danger 39 Geneva Accords 39 Gramm Leach Bliley 39 Homeland Security DHS 39 Detainee Treatment Act 39 Doctrine 39 electronic eavesdropping 39 Yugoslav tribunal 39 National Counterterrorism 39 anti circumvention 39 Lord Goldsmith 39 Terrorist Threat Integration 39 AP Exclusive Terrorist 39 Foreign Intelligence Surveillance 39 CIA interrogation 39 Kollar Kotelly 39 AEDPA 39 counsel Fred Fielding 39 Michael Chertoff 39 OIRA 39 antiterrorism 39 detainee interrogations 39 Tatel 39 Valerie Plame affair 38 civil liberties protections 38 terrorist attacks 38 CIA interrogators 38 memoranda 38 adviser Fran Townsend 38 Terrorism Prevention 38 John Ashcroft 38 secrets privilege 38 coercive interrogations 38 interrogation methods 38 Intelligence Identities Protection