!! History Commons Alert, Exciting News

Context of 'January 18, 2001: Overstaying Visa No Obstacle for 9/11 Hijacker Alshehhi When Reentering US'

This is a scalable context timeline. It contains events related to the event January 18, 2001: Overstaying Visa No Obstacle for 9/11 Hijacker Alshehhi When Reentering US. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

The 9/11 Commission, relying on a CIA report, will later say that three of the men involved in the 1993 World Trade Center bombing travel on Saudi passports containing an indicator of possible Islamist extremism. [9/11 Commission, 8/21/2004, pp. 46-47, 61 pdf file] Author James Bamford will say that it is a “secret coded indicator, placed there by the Saudi government, warning of a possible terrorist affiliation.” [Bamford, 2008, pp. 58-59] It is unclear what the indicator looks like precisely and who the men are. However, Ahmad Ajaj, an associate of lead bomber Ramzi Yousef, does have a Saudi passport. Some of the 9/11 hijackers will later use Saudi passports with the same indicator (see October 28, 2000, June 1, 2001, and June 13, 2001, and November 2, 2007). [9/11 Commission, 8/21/2004, pp. 46-47, 61 pdf file]

Entity Tags: Ahmad Ajaj

Timeline Tags: Complete 911 Timeline

Osama bin Laden’s brother-in-law, Mohammed Jamal Khalifa, helps fund a militant group in Yemen that will later take credit for the 2000 USS Cole bombing. The group, the Islamic Army of Aden, is apparently formed in 1996 or 1997, but is not heard from until May 1998, when it issues the first of a series of political statements. The group will kidnap 16 mainly British tourists in December 1998 and four of the tourists will be killed during a shootout with police. The remaining hostages are rescued. [Yemen Gateway, 1/1999] Evidence ties Khalifa to the 1995 Bojinka plot and other violent acts, though he has denied all allegations that he is linked to terrorist groups. Vincent Cannistraro, former head of the CIA’s Counterterrorist Center, later claims that not only did Khalifa fund the Islamic Army of Aden, but that 9/11 hijacker Khalid Almihdhar had ties to the group as well. (A San Diego friend of Almihdhar’s will later say that Almihdhar told him he was a member of the group (see Around October 12, 2000).) [Wall Street Journal, 9/19/2001] Cannistraro further notes that Khalifa went on to form the group after being deported from the US in 1995. “He should never have been allowed to leave US custody.” [San Francisco Chronicle, 10/24/2001] The group praises bin Laden and uses a training camp reportedly established by him in southern Yemen. But the group is more clearly tied to Sheikh Abu Hamza al-Masri, a handless, one-eyed Afghan war veteran living and preaching openly in London. [Washington Post, 9/23/2001]

Entity Tags: Vincent Cannistraro, Abu Hamza al-Masri, Islamic Army of Aden, Mohammed Jamal Khalifa, Khalid Almihdhar

Timeline Tags: Complete 911 Timeline

The Vienna, Virginia, house where Waleed Alshehri and Ahmed Alghamdi lived.The Vienna, Virginia, house where Waleed Alshehri and Ahmed Alghamdi lived. [Source: Paul Sperry]Diane and John Albritton later say they call the CIA and police several times this year to report suspicious activity at a neighbor’s home, but authorities fail to respond. [New York Daily News, 9/15/2001; MSNBC, 9/23/2001] A man named Waleed Alshehri, allegedly one of the 9/11 hijackers, is renting the house on Orrin Street in Vienna, Virginia, at the time (three blocks from a CIA facility). [Associated Press, 9/15/2001] He makes his neighbors nervous. “There were always people coming and going,” said Diane Albritton. “Arabic people. Some of them never uttered a word; I don’t know if they spoke English. But they looked very focused. We thought they might be dealing drugs, or illegal immigrants.” [New York Times, 9/15/2001] A man named Ahmed Alghamdi, allegedly another one of the hijackers, lived at the same address until July 2000. [WorldNetDaily, 9/14/2001; Fox News, 6/6/2002] Shortly after 9/11, it was reported that Waleed Alshehri lived with Ahmed Alghamdi in Florida for seven months in 1997. [Daily Telegraph, 9/20/2001] Albritton says they observed a van parked outside the home at all hours of the day and night. A Middle Eastern man appeared to be monitoring a scanner or radio inside the van. Another neighbor says, “We thought it was a drug house. All the cars parked on the street were new BMWs, new Mercedes. People were always walking around out front with cell phones.” There were frequent wild parties, numerous complaints to authorities, and even a police report about a woman shooting a gun into the air during a party. [WorldNetDaily, 9/14/2001] Other neighbors also called the police about the house. [Associated Press, 9/14/2001] “Critics say [the case] could have made a difference [in stopping 9/11] had it been handled differently.” Standard procedures require the CIA to notify the FBI of such domestic information. However, FBI officials have not been able to find any record that the CIA shared the information. [Fox News, 6/6/2002] FBI Director Mueller has said “the hijackers did all they could to stay below our radar.” [US Congress, 5/8/2002] Although Fox News, based on information from the CIA and FBI, will still be reporting that these two men are the hijackers of the same name in the summer of 2002, the 9/11 Commission will say that these two hijackers first entered the US in the spring of 2001 (see April 23-June 29, 2001). [Fox News, 6/6/2002; 9/11 Commission, 7/24/2004, pp. 527-8]

Entity Tags: Diane Albritton, Federal Bureau of Investigation, John Albritton, Robert S. Mueller III, Ahmed Alghamdi, Central Intelligence Agency, Waleed Alshehri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Abu Bara al-Taizi.Abu Bara al-Taizi. [Source: Defense Department]A group of al-Qaeda operatives receives advanced training at the Mes Aynak camp in Afghanistan. The large group includes 9/11 hijackers Nawaf Alhazmi and Khalid Almihdhar (see November/December 1999), al-Qaeda commander Khallad bin Attash, would-be 9/11 hijacker Abu Bara al-Taizi (a.k.a. Zohair Mohammed Said), USS Cole bomber Ibrahim al-Thawar (a.k.a. Nibras), an operative who leads a series of suicide bombings in Riyadh in 2003, and another who is involved against the 2002 attack against a ship called the Limburg (see October 6, 2002). According to statements by detainees, the course focuses on physical fitness, firearms, close quarters combat, shooting from a motorcycle, and night operations. Osama bin Laden and Khalid Shaikh Mohammed (KSM) apparently visit the camp during the course. [9/11 Commission, 7/24/2004, pp. 157; Office of the Director of National Intelligence, 9/6/2006, pp. 12 pdf file] Candidate hijacker Abderraouf Jdey, a Canadian passport holder, may also be present at this training course. [9/11 Commission, 7/24/2004, pp. 527] Also, in early December, KSM gives special hijacking training to Alhazmi, bin Attash, and al-Taizi (see Early December 1999).

Entity Tags: Osama bin Laden, Nawaf Alhazmi, Khallad bin Attash, Khalid Almihdhar, Abderraouf Jdey, Abu Bara al-Taizi, Khalid Shaikh Mohammed, Ibrahim al-Thawar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijacker Khalid Almihdhar tells another operative that al-Qaeda is planning a ship-bombing attack. The US will learn this from a detainee interviewed in December 2001. The detainee will say that Almihdhar informed him that al-Qaeda operative Abd al-Rahim al-Nashiri was the plot’s originator. [9/11 Commission, 7/24/2004, pp. 491] Al-Nashiri discussed the ship bombing attack in a telephone call made in late 1998. The call may have been to the al-Qaeda communications hub at which Almihdhar lived and may also have been picked up by the US (see (Mid-August 1998)). Al-Qaeda soon attempts to attack the USS The Sullivans in Aden, Yemen, but the plan fails (see January 3, 2000). Almihdhar, who will be accused of participating in the plot to bomb the USS Cole in Yemen (see October 12, 2000, Early October 2001 and October 4, 2001), travels to Yemen shortly before the attack on the Sullivans (see November/December 1999) and apparently leaves one day after it (see January 2-5, 2000).

Entity Tags: Abd al-Rahim al-Nashiri, Khalid Almihdhar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mohdar Abdullah.Mohdar Abdullah. [Source: San Diego Union-Tribune]Mohdar Abdullah, a friend of future 9/11 hijackers Nawaf Alhazmi and Khalid Almihdhar when they live in San Diego, allegedly learns about the hijackers’ attack plans in early 2000. Abdullah helps Alhazmi and Almihdhar adjust to life in the US when they first arrive in San Diego. Abdullah speaks English well, and Alhazmi only speaks a little English and Almihdhar virtually none at all.
Alleged Prison Confessions - While imprisoned in the US in 2003 on minor charges, Abdullah will reportedly brag to other prisoners that he knew the two hijackers were planning a terrorist attack (see September 2003-May 21, 2004). According to one prisoner, Abdullah claims he had been told by an unnamed individual that Alhazmi and Almihdhar would be arriving in Los Angeles to carry out an attack before they arrived there on January 15, 2000 (see January 15, 2000). According to another prisoner, Abdullah claims that after Alhazmi and Almihdhar arrived in San Diego, they told him they planned to fly an airplane into a building and they invited him to join in the attack. Abdullah’s prison boasts will not be completely verified by the FBI. However, Abdullah will admit to the FBI that he knew of the hijackers’ extremist beliefs and that he was involved in the Islamic Army of Aden, a militant group in Yemen with al-Qaeda ties (see 1996-1997 and After and Around October 12, 2000). The 9/11 Commission will later comment, “Abdullah clearly was sympathetic to those extremist views.” [9/11 Commission, 7/24/2004, pp. 218-219]
Distantly Related to Almihdhar? - Abdullah is a Yemeni citizen, and after 9/11, it will be reported that the name in his Yemeni passport is actually Mohammed al-Mihdhar. Authorities don’t believe he is closely related to Khalid Almihdhar, but he could belong to the same tribe or clan. [San Diego Union-Tribune, 10/21/2001] There is evidence that Abdullah cases the Los Angeles airport in June 2000 with Alhazmi (see June 10, 2000), and he appears to know about the timing of the 9/11 attacks several weeks in advance (see Late August-September 10, 2001).

Entity Tags: Islamic Army of Aden, Nawaf Alhazmi, Khalid Almihdhar, Mohdar Abdullah

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The USS The Sullivans.The USS The Sullivans. [Source: US Navy]An al-Qaeda attack on USS The Sullivans in Yemen’s Aden harbor fails when their boat filled with explosives sinks. This is one of a series of failed al-Qaeda attacks planned to take place around the turn of the millennium (see December 31, 1999-January 1, 2000). But the attack remains undiscovered, and a duplication of the attack by the same people will successfully hit the USS Cole in October 2000 (see October 12, 2000). [PBS Frontline, 10/3/2002] The US will first learn of the planned The Sullivans attack when interrogating a suspect in the Cole bombing in early November 2000. [New York Times, 11/10/200]

Entity Tags: USS Cole, USS The Sullivans, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Attendees of the Malaysian summit. Top row, from left: Nawaf Alhazmi, Khalid Almihdhar, Khalid Shaikh Mohammed. Middle row, from left: Khallad bin Attash, Abd al-Rahim al-Nashiri, Hambali. Bottom row, from left: Yazid Sufaat, Ramzi bin al-Shibh, Abu Bara al-Taizi. Attendees of the Malaysian summit. Top row, from left: Nawaf Alhazmi, Khalid Almihdhar, Khalid Shaikh Mohammed. Middle row, from left: Khallad bin Attash, Abd al-Rahim al-Nashiri, Hambali. Bottom row, from left: Yazid Sufaat, Ramzi bin al-Shibh, Abu Bara al-Taizi. [Source: FBI]About a dozen of Osama bin Laden’s trusted followers hold a secret, “top-level al-Qaeda summit” in the city of Kuala Lumpur, Malaysia. [CNN, 8/30/2002; San Diego Union-Tribune, 9/27/2002] According to an unnamed senior CIA official, before the summit started, the CIA learned that “11 young guys” were going to attend, and “young guys” is slang for operatives traveling. [Bamford, 2008, pp. 18] Plans for the October 2000 bombing of the USS Cole (see October 12, 2000) and the 9/11 attacks are discussed. [USA Today, 2/12/2002; CNN, 8/30/2002] At the request of the CIA, the Malaysian Secret Service monitors the summit and then passes the information on to the US (see January 5-8, 2000 and Shortly After). Attendees of the summit are said to include:
Nawaf Alhazmi and Khalid Almihdhar - The CIA and FBI will later miss many opportunities to foil the 9/11 plot through Alhazmi and Almihdhar and the knowledge of their presence at this summit. The CIA already knows many details about these two by the time the summit begins (see January 2-4, 2000), and tracked Almihdhar as he traveled to it (see January 2-5, 2000).
Yazid Sufaat - Sufaat is a Malaysian who owns the condominium where the summit is held. He is also a trained biologist and is said to be a leading figure in al-Qaeda’s attempts to get a biological or chemical weapon. [New York Times, 1/31/2002; Newsweek, 6/2/2002] Malaysian officials also recognize Sufaat from summit surveillance photos, as he is a long-time Malaysian resident (see Shortly After January 8, 2000). [New Straits Times, 2/10/2002] A possibility to expose the 9/11 plot through Sufaat’s presence at this summit will later be missed in September 2000 (see September-October 2000). Sufaat will travel to Afghanistan in June 2001 and be arrested by Malaysian authorities when he returns to Malaysia in late 2001 (see December 19, 2001). [Australian, 12/24/2002] He will be released in 2008 (see December 4, 2008).
Hambali - An Indonesian militant known as Hambali, or Nurjaman Riduan Isamuddin [BBC, 8/15/2003] , was heavily involved in the Bojinka plot, an early version of the 9/11 plot (see January 6, 1995 and June 1994). [CNN, 3/14/2002; CNN, 8/30/2002] The FBI was aware of who he was and his connections to the Bojinka plot at least by 1999 and identified a photograph of him by that time (see May 23, 1999). He will be arrested by Thai authorities in August 2003 (see August 12, 2003). [CNN, 8/14/2003; CBS News, 8/15/2003] Malaysian officials recognize Hambali from summit surveillance photos, as he is a long-time Malaysian resident. But the US does not tell them of his Bojinka connections, so they will not know to arrest him after the summit is over (see Shortly After January 8, 2000). [New Straits Times, 2/10/2002]
Khalid Shaikh Mohammed - Mohammed is sometimes referred to as “KSM,” an al-Qaeda leader and the alleged “mastermind” of the 9/11 attacks. The US has known KSM is an Islamic militant since the exposure of Operation Bojinka in January 1995 (see January 6, 1995), and knows what he looks like. US officials will state that they only realized the summit was important in 2001, but the presence of KSM should have proved its importance. [Los Angeles Times, 2/2/2002] Although the possible presence of KSM at this summit will be disputed by US officials, one counterterrorism expert will testify before the 9/11 Commission in 2003 that he has access to transcripts of KSM’s interrogations since his capture, and that KSM has admitted leading this summit and telling the attendees about a planes-as-weapons plot targeting the US (see July 9, 2003). [Newsweek, 7/9/2003; New York Post, 7/10/2003] Many other media reports will identify him as being there. [Independent, 6/6/2002; CNN, 8/30/2002; CNN, 11/7/2002; Canadian Broadcasting Corporation, 10/29/2003] For instance, according to Newsweek: “Mohammed’s presence would make the intelligence failure of the CIA even greater. It would mean the agency literally watched as the 9/11 scheme was hatched—and had photographs of the attack’s mastermind… doing the plotting.” [Newsweek, 7/9/2003] In Hambali’s 2008 Guantanamo file, it will be mentioned that KSM stays a week at Sufaat’s condominium with Alhazmi and Almihdhar, which would seem to make clear that KSM is there for the entire duration of the summit (see Early January 2000). [US Department of Defense, 10/30/2008]
Khallad bin Attash - Khallad bin Attash, a “trusted member of bin Laden’s inner circle,” is in charge of bin Laden’s bodyguards, and serves as bin Laden’s personal intermediary at least for the USS Cole bombing. [Newsweek, 9/20/2001 pdf file] He is also thought to be a “mastermind” of that attack. Attash is reportedly planning to be one of the 9/11 hijackers, but will be unable to get a US visa. [9/11 Commission, 6/16/2004, pp. 8] US intelligence had been aware of his identity as early as 1995. [US Congress, 9/18/2002] A possibility to expose the 9/11 plot through bin Attash’s presence at this summit will be missed in January 2001 (see January 4, 2001). Bin Attash had been previously arrested in Yemen for suspected terror ties, but was let go (see Summer 1999). [Contemporary Southeast Asia, 12/1/2002] He will be captured in Pakistan by the US in April 2003 (see April 29, 2003). In 2008, Newsweek will report that bin Attash confessed during interrogation that, while staying at Sufaat’s condominium, he and Alhazmi talked “about the possibility of hijacking planes and crashing them or holding passengers as hostages.” [Newsweek, 12/16/2008]
Abd al-Rahim al-Nashiri - Al-Nashiri is one of al-Qaeda’s top field commanders and operates out of Malaysia while 9/11 is being prepared. [Los Angeles Times, 10/10/2001; Gunaratna, 2003, pp. 188; Graham and Nussbaum, 2004, pp. 59] He was involved in an arms smuggling plot (see 1997) and the East African embassy bombings (see August 22-25 1998), in which his cousin was martyred (see 10:35-10:39 a.m., August 7, 1998). He also organized the attack against the USS The Sullivans (see January 3, 2000), and will be involved in the attacks against the USS Cole (see October 12, 2000) and the Limburg (see October 6, 2002). He will be arrested in the United Arab Emirates in November 2002 (see Early October 2002). An al-Qaeda operative identified a photo of al-Nashiri for the FBI in late 1998 (see August 22-25 1998). [9/11 Commission, 7/24/2004, pp. 152-3] (Note: in the sources, al-Nashiri is referred to by two of his aliases: Muhammad Omar al-Harazi and Al Safani.) [CNN, 12/11/2000; Central Intelligence Agency, 9/6/2006]
Ramzi bin al-Shibh - Investigators believe he wants to be the 20th 9/11 hijacker. His presence at the summit may not be realized until after 9/11, despite the fact that US intelligence has a picture of him next to bin Attash, and has video footage of him. [Newsweek, 11/26/2001; Washington Post, 7/14/2002; Time, 9/15/2002; Die Zeit (Hamburg), 10/1/2002; CNN, 11/7/2002] German police will have credit card receipts indicating bin al-Shibh is in Malaysia at this time. [Los Angeles Times, 9/1/2002] Ulrich Kersten, director of Germany’s federal anticrime agency, the Bundeskriminalamt, will later say, “There are indications that Ramzi bin al-Shibh was in Kuala Lumpur for the meeting.” [New York Times, 8/24/2002] Another account noting he was photographed at the summit will further note that he enters and leaves Thailand three times in the first three weeks of January 2000. [Los Angeles Times, 10/17/2001] Anonymous Malaysian officials will later claim he is at the summit, but US officials will deny it. Two local militants who serve as drivers for the attendees will later be arrested in Malaysia. They will be shown photos of the attendees, and confirm that bin al-Shibh was at the summit. [Associated Press, 9/20/2002] One account will say he is recognized at the time of the summit, which makes it hard to understand why he is not tracked back to Germany and the Hamburg cell with Mohamed Atta and other 9/11 hijackers. [Der Spiegel (Hamburg), 10/1/2002] Another opportunity to expose the 9/11 plot through bin al-Shibh’s presence at this summit will be missed in June. It appears bin al-Shibh and Almihdhar are directly involved in the attack on the USS Cole in October 2000 (see October 10-21, 2000). [Guardian, 10/15/2001; Washington Post, 7/14/2002; Newsweek, 9/4/2002]
Salem Alhazmi - Alhazmi, a 9/11 hijacker and brother of Nawaf Alhazmi, is possibly at the summit, although very few accounts will mention it. [Australian, 12/24/2002] US intelligence intercepts from before the summit indicate that he at least had plans to attend. [US Congress, 7/24/2003, pp. 51 pdf file]
Abu Bara al-Taizi (a.k.a. Zohair Mohammed Said) - A Yemeni al-Qaeda operative, al-Taizi is reportedly meant to be one of the 9/11 hijackers, but will be unable to enter the US due to greater scrutiny for Yemenis. [9/11 Commission, 6/16/2004, pp. 8] Al-Taizi will be captured in Pakistan in February 2002, and then sent to the US prison in Guantanamo a few months later (see February 7, 2002). According to his 2008 Guantanamo file, he traveled from Afghanistan to Malaysia with bin Attash about two weeks before the summit. Bin Attash was missing a leg, and he had a prosthetic leg fitted and then stayed in the hospital to recover from the surgery. Bin Attash and al-Taizi stay at Sufaat’s house for the duration of the summit. Al-Taizi then flies to Yemen to visit his family there. [US Department of Defense, 10/25/2008]
Others - Unnamed members of the Egyptian-based Islamic Jihad are also said to be at the summit. [Cox News Service, 10/21/2001] Islamic Jihad merged with al-Qaeda in February 1998. [ABC News, 11/17/2001] However, according to the Wall Street Journal, bin Attash and Fahad al-Quso are suspected of being Islamic Jihad members at one point, so this may just be a reference to them. [Wall Street Journal, 10/8/2001] Note that there are a total of 10 names mentioned above, and it will be reported that the CIA learned that 11 operatives were to attend, so either not all of them make it, or some names of attendees will remain unknown.
Summit Associates - The following individuals are probably not at the summit meetings, but are in the region and assisting or linked with the attendees at this time:
Fahad Al-Quso - Al-Quso is a top al-Qaeda operative who is involved in the bombing of the USS Cole. Some sources will indicate al-Quso is present in Malaysia, and a person who looks like him will later be seen in a photograph of the meeting (see June 11, 2001). [Newsweek, 9/20/2001 pdf file] However, other sources will say al-Quso did not reach Kuala Lumpur, but met with bin Attash around this time in Bangkok, Thailand (see January 5-6, 2000 and January 8-15, 2000). [9/11 Commission, 7/24/2004, pp. 159; Wright, 2006, pp. 330] Although al-Quso apparently is not at the summit, there are a series of phone calls during the time of the summit between his hotel in Bangkok, a phone booth near the condominium where the summit is held, and his family home in Yemen (see (January 5-8, 2000)). Al-Quso will be arrested by Yemeni authorities in the fall of 2000 (see Late October-Late November 2000), but the FBI will not be given a chance to fully interrogate him before 9/11. He will escape from prison in 2003. [CNN, 5/15/2003]
Ahmad Sajuli Abdul Rahman - An operative of Jemaah Islamiyah, al-Qaeda’s Southeast Asian affiliate, Sajuli takes the visiting Arabs around Kuala Lumpur, but apparently does not attend the summit meetings. [US Congress, 10/17/2002] According to the later Guantanamo file of summit attendee al-Taizi, one of the attendees Sajuli escorts around town is future 9/11 hijacker Khalid Almihdhar. Sajuli also helps arrange al-Taizi’s transportation at the end of the summit. [US Department of Defense, 10/25/2008] Sajuli will be arrested in Malaysia in December 2001 (see December 29, 2001).
Ahmad Hikmat Shakir - A suspected al-Qaeda agent of Iraqi nationality, Shakir is a greeter at Kuala Lumpur airport. He meets Almihdhar there and travels with him to the apartment where the summit is held, but he probably does not attend the summit meetings. [Associated Press, 10/2/2002; Newsweek, 10/7/2002; Australian, 12/24/2002; Knight Ridder, 6/12/2004] After 9/11, he will be linked to the 1993 World Trade Center bombing and the 1995 Bojinka plot. Jordan will arrest him and let him go after the US says it doesn’t want to take custody of him (see September 17, 2001).
Dhiren Barot - Dhiren Barot (a.k.a. Abu Eissa al-Hindi) is a British citizen of Indian descent. According to a 2006 Observer article, Barot “is not believed to have been present” at the summit meetings. However, he does go to Kuala Lumpur during the time of the summit with summit attendee bin Attash. And shortly after the summit, Barot holds meetings with Hambali. It will later be reported that Barot is sent by KSM to New York City in early 2001 to case potential targets there, although whether this is part of the 9/11 plot or some other plot is unclear (see May 30, 2001). Barot will be arrested in 2004 in Britain for plotting attacks there, and sentenced to 30 years in prison (see August 3, 2004). [Observer, 12/12/2006]
Another Unnamed Local Militant - Malaysian officials will say that two local Jemaah Islamiyah act as drivers for the attendees. These drivers apparently have no idea who the attendees are or what they are doing; they are just tasked to drive them around. In a 2002 Associated Press article, officials will not name these drivers, but will say that they are among the dozens of alleged Jemaah Islamiyah militants arrested in December 2001 and January 2002. Since Sajuli mentioned above is arrested at that time, he presumably is one of these drivers. It is not known who the other driver is. (Sufaat will be arrested at that time as well, but the Associated Press article will make clear Sufaat is not one of the drivers.) [Associated Press, 9/20/2002]
Probably Not Involved: Mohamed al-Khatani - A Saudi, he allegedly will confess to attending the summit while being held in the US Guantanamo prison (see July 2002). He apparently will unsuccessfully attempt to enter the US in August 2001 to join the 9/11 plot (see August 4, 2001). However, al-Khatani will later recant his testimony and say he lied to avoid torture (see October 26, 2006). Furthermore, his 2008 Guantanamo file, leaked to the public in 2011, contains no hint of him even possibly attending the summit. The contents of the file must be treated with extreme caution, especially since he is repeatedly and brutally tortured (see August 8, 2002-January 15, 2003 and January 14, 2009). But according to the general narrative of the file, al-Khatani had no involvement with Islamist militancy in early 2000, only starts to get involved with militants in mid-2000, and first attends a militant training camp in Afghanistan in late 2000. [US Department of Defense, 10/30/2008]

Entity Tags: Hambali, Abu Bara al-Taizi, Dhiren Barot, Central Intelligence Agency, Ahmad Hikmat Shakir, Ahmad Sajuli Abdul Rahman, Al-Qaeda, Abd al-Rahim al-Nashiri, Islamic Jihad, Jemaah Islamiyah, Fahad al-Quso, Khalid Shaikh Mohammed, Ulrich Kersten, Yazid Sufaat, Khalid Almihdhar, Ramzi bin al-Shibh, Salem Alhazmi, Mohamed al-Khatani, Malaysian Secret Service, Khallad bin Attash, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Hamza Alghamdi.Hamza Alghamdi. [Source: FBI]Raed Hijazi, Nabil al-Marabh’s former Boston roommate, is tried and convicted in Jordan for his role in planned millennium bombings in that country. (Hijazi is tried in absentia since he has yet to be arrested, but will later be retried in person and reconvicted.) In the wake of the trial, Jordanian officials send information to US investigators that shows Nabil al-Marabh and future 9/11 hijacker Hamza Alghamdi are associates of Hijazi. The Washington Post will report, “An FBI document circulated among law enforcement agencies [just after 9/11] noted that Hijazi, who is in a Jordanian jail, had shared a telephone number with [9/11] hijacker, Hamza Alghamdi.” Apparently this document is created when Jordan sends the US this information in late 2000. [Washington Post, 9/21/2001] The Boston Globe will later report that an FBI investigation found that “al-Marabh had, in the report’s language, a ‘telephone connection’ with one of the suspected hijackers, according to a federal source involved in the investigation. However, the source was uncertain whether the connection involved telephone conversations between al-Marabh and the unidentified suspect, or whether it involved their sharing a telephone number.” This is a probable reference to the same FBI report mentioning the Alghamdi-Hijazi phone link, especially since the same Globe article mentions that around the this time al-Marabh tells his coworkers that the FBI has been asking him about his links to bin Laden (see Late August 2000). [Boston Globe, 10/15/2001] It appears that Alghamdi is not put on any kind of watch list and will not be stopped when he will arrive in the US by January 2001 (see January or July 28, 2001) nor again on May 23, 2001 (see April 23-June 29, 2001). The 9/11 Commission Final Report will fail to mention any investigation into Alghamdi and will give no hint that his name was known to US authorities before 9/11.

Entity Tags: Nabil al-Marabh, Jordan, Federal Bureau of Investigation, Raed Hijazi, Hamza Alghamdi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Before the bombing of the USS Cole in Aden, Yemen, Ramzi bin al-Shibh makes two trips to Yemen’s capital, Sana’a, and will later be said to play a role in the attack. Although bin al-Shibh is never named as a certain participant in the operation, he flies from Frankfurt, Germany, to Dubai, United Arab Emirates (UAE), on October 10, 2000. The next day, he flies from Dubai to Sana’a, putting him there one day before the bombing (see October 12, 2000). He flies from Sana’a to Dubai on October 21, and where he goes from there is not certain. [Los Angeles Times, 10/24/2001; Khan, 8/11/2002 pdf file; Australian, 12/24/2002; McDermott, 2005, pp. 209] Bin al-Shibh was also in Yemen for about four weeks up until a month before the bombing (see August-September 2000). Note also that the CIA is working with the Dubai airport to track all suspected militants passing through it, although it is not known if bin al-Shibh is suspected at this time (see 1999). He apparently attended an al-Qaeda summit with the other commanders of the ship-bombing operation in 2000 (see January 5-8, 2000) and some media reports indicate an application for a US visa he makes after the attack is rejected due to concerns about his involvement in the bombing. For example, the Los Angeles Times, based on conversations with law enforcement officials, will report that bin al-Shibh is “linked to the terrorist attack in Yemen on the US Navy destroyer Cole.[Los Angeles Times, 10/21/2001] Newsweek, the BBC, and Al Jazeera journalist Yosri Fouda will also report similar statements by law enforcement officials (see May 17, 2000-May 2001). [Newsweek, 11/26/2001; BBC, 9/14/2002; TBS Journal, 10/2002] One of the 9/11 hijackers, Khalid Almihdhar, may also be involved in the bombing (see Around October 12, 2000).

Entity Tags: Ramzi bin al-Shibh

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Damage to the USS Cole, shown in dry dock.Damage to the USS Cole, shown in dry dock. [Source: US Navy]9/11 hijacker Khalid Almihdhar is in Yemen when the USS Cole is attacked in Aden harbor there (see October 12, 2000), and is reported to have had a role in the bombing. Almihdhar leaves shortly after the attack, together with al-Qaeda operative Khallad bin Attash. [McDermott, 2005, pp. 209] Bin Attash is quickly identified as one of the masterminds of the operation (see Late October-Late November 2000). Almihdhar will subsequently be accused of participating in the operation by the prime ministers of Yemen and Britain (see Early October 2001 and October 4, 2001). The Yemeni militant group Islamic Army of Aden takes credit for the bombing, and a friend of Almihdhar in San Diego will later say that Almihdhar told him he was a member of that group (see Early 2000). The Cole attack was a repeat of a failed attempt to bomb the USS The Sullivans (see January 3, 2000), of which Almihdhar had foreknowledge (see Late 1999). Almihdhar, who trained with the Cole bombers (see Late 1999) and attended an apparent planning session for the operation (see January 5-8, 2000), may also be involved in a later ship-bombing operation in Singapore (see June 2001). Ramzi bin al-Shibh, a close associate of the hijackers, also leaves Yemen around this time and is also suspected of involvement in the bombing (see October 10-21, 2000).

Entity Tags: Islamic Army of Aden, Khalid Almihdhar, Khallad bin Attash

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Using new passports obtained three weeks previously (see October 3, 2000), future 9/11 hijackers Waleed and Wail Alshehri obtain tourist visas to the US. [US Department of State, 10/24/2000; US Department of State, 10/24/2000] The visas are issued by Shayna Steinger, a consular official at the US consulate in Jeddah, Saudi Arabia, who apparently issues the 9/11 hijackers with 12 visas (see July 1, 2000). [9/11 Commission, 12/30/2002, pp. 2; Office of the Inspector General (US Department of State), 1/30/2003] The Alshehris make several errors in the applications, which should normally lead to them being rejected. They only give their employer’s/school’s address as “South city” and the address they will be staying at as “Wasantwn,” although they do not specify whether this is the city or the state. They also say they will stay for four to six months, although it is unclear how they will support themselves during this time, and on Wail’s application form Steinger does not even bother to complete the section on checking the applicant has the necessary funds. In addition, the Alshehris say they will arrive in the US “after two weeks”—presumably meaning two weeks after the visa’s application was filed. However, according to the 9/11 Commission Report, Waleed will arrive on April 23, 2001 and Wail will arrive on June 8, 2001 (see April 23-June 29, 2001). They appear to receive their visas on the same day they apply for them. [US Department of State, 10/24/2000; US Department of State, 10/24/2000; National Review, 10/9/2002] The 9/11 Commission will say that their passports may have fraudulent features, presumably related to travel stamps, although this is not certain. [9/11 Commission, 7/24/2004, pp. 563-4]

Entity Tags: Wail Alshehri, Waleed Alshehri, Shayna Steinger, US Consulate, Jeddah, Saudi Arabia Office

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

After leaving Yemen following the bombing of the USS Cole (see Around October 12, 2000), 9/11 hijacker Khalid Almihdhar travels to various countries in Asia.
bullet He is reportedly in Malaysia in October (see October 2000);
bullet From late 2000 to February 2001 he stays with his cousin in Mecca, Saudi Arabia (see Late 2000-February 2001);
bullet He then returns to Yemen, to stay with his family at an al-Qaeda communications hub monitored by US intelligence (see February 2001, Late August 1998, and (Mid-June-Mid-July 2000));
bullet Following this, he goes to Afghanistan;
bullet There are some reports he travels to the United Arab Emirates in June (see June 2001);
bullet He is also said to be in Malaysia again in June (see June 2001);
bullet Finally, he goes to stay with his cousin in Mecca, Saudi Arabia, for another month. Before flying to New York (see July 4, 2001), Almihdhar tells his cousin that Osama bin Laden is planning five attacks on the US and asks the cousin to watch over his family, because he has a job to do (see Between June 1 and July 4, 2001). [9/11 Commission, 7/24/2004, pp. 237; 9/11 Commission, 8/21/2004, pp. 137 pdf file]
After 9/11, there will be speculation that during this period Almihdhar is coordinating the arrival of the other muscle hijackers. According to FBI Director Robert Mueller, this would his explain his stay in Saudi Arabia and his return only after all the other hijackers had arrived. [US Congress, 9/26/2002] However, there is some evidence suggesting that Almihdhar may have visited the US in this time frame, perhaps using a passport in a false name (see June 10, 2000).

Entity Tags: Khalid Almihdhar, Robert S. Mueller III

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Ahmed Alhaznawi in a video released in 2002.Ahmed Alhaznawi in a video released in 2002. [Source: Al Jazeera]9/11 Hijacker Ahmed Alhaznawi receives a new passport in Saudi Arabia. It is unknown exactly when Alhaznawi receives this passport, but he uses it to apply for a US visa on November 12, 2000 (see November 12, 2000), so it must be before that. According to the 9/11 Commission, the passport may contain an “indicator of extremism” that is “associated with al-Qaeda.” However, although it is certain some of the other hijackers have such indicator in their passports, it is not certain that Alhaznawi does. The commission will merely say that there “is reason to believe” his passport may contain such indicator and note that it was “issued in the same Saudi passport office” that issued passports with the indicator to some of the other hijackers. [9/11 Commission, 7/24/2004, pp. 564; 9/11 Commission, 8/21/2004, pp. 9, 15, 33 pdf file] According to author James Bamford, the indicator is a “secret coded indicator, placed there by the Saudi government, warning of a possible terrorist affiliation.” [Bamford, 2008, pp. 58-59] The Saudi government reportedly uses this indicator to track some of the Saudi hijackers before 9/11 “with precision” (see November 2, 2007).

Entity Tags: Ahmed Alhaznawi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Stills from martyr videos recorded in March 2001. From top to bottom: Ahmed Alhaznawi, Abdulaziz Alomari, Saeed Alghamdi, Wail Alshehri, and Hamza Alghamdi. The backgrounds were digitally inserted later.
Stills from martyr videos recorded in March 2001. From top to bottom: Ahmed Alhaznawi, Abdulaziz Alomari, Saeed Alghamdi, Wail Alshehri, and Hamza Alghamdi. The backgrounds were digitally inserted later. [Source: Al-Jazeera]Supposedly, all 13 of the “muscle” hijackers record a farewell video before leaving training in Kandahar, Afghanistan, around this time. [CBS News, 10/9/2002] Several will be released after 9/11. A video of Ahmed Alhaznawi will be shown by the Al Jazeera television network in April 2002. In it, he pledges to give his life to “martyrdom” and swears to send a “bloodied message” to Americans by attacking them in their “heartland” (see April 15, 2002). [Guardian, 4/16/2002] In September 2002, Al Jazeera will show a similar farewell video of Abdulaziz Alomari. [Associated Press, 9/9/2002] Alomari states, “God praise everybody who trained and helped me, namely the leader Sheik Osama bin Laden” (see September 9, 2002). [Washington Post, 9/11/2002] Also in September 2002, some images broadcast on Al Jazeera will suggest that al-Qaeda has martyr videos for nearly all of the 9/11 hijackers (see September 9, 2002). Saeed Alghamdi’s video will be released in September 2003. In it, he will mention that the video was recorded in late December 2000 (see September 12, 2003). Wail Alshehri and Hamza Alghamdi’s videos will be released in September 2006 (see September 7, 2006). [Associated Press, 9/7/2006] Ahmed Alghamdi’s video will be released in September 2008 (see September 19, 2008).

Entity Tags: Mohand Alshehri, Osama bin Laden, Salem Alhazmi, Satam Al Suqami, Waleed Alshehri, Majed Moqed, Wail Alshehri, Fayez Ahmed Banihammad, Hamza Alghamdi, Abdulaziz Alomari, Ahmed Alghamdi, Saeed Alghamdi, Ahmed Alhaznawi, Ahmed Alnami

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Documents obtained by Nawaf Alhazmi, Khalid Almihdhar, and Salem Alhazmi indicate that they are in the New Jersey / New York area at this time, although the cards may be later fakes. All three hijackers obtain USA ID cards whose expiry date is December 30, 2006. [9/11 Commission, 8/21/2004, pp. 191-2 pdf file; US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006] USAID Systems, the Florida firm that manufactured the system through which the cards were issued, will later tell Time magazine that Almihdhar’s card was issued exactly six years before its expiration date. [Time, 8/29/2005] However, according to the FBI and the 9/11 Commission, Nawaf Alhazmi is in Arizona (see December 12, 2000-March 2001), and Salem Alhazmi and Khalid Almihdhar are in the Middle East at this time (see June 10, 2000, Late October 2000-July 4, 2001, and April 23-June 29, 2001). Almihdhar’s card later proves to be a forgery, and may therefore not have been issued on this date. The Alhazmi brothers’ cards may also be forgeries (see (July-August 2001))

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi, Salem Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Future 9/11 hijacker Mohamed Atta makes a short trip to Spain and Germany. On January 4, 2001, he flies from Miami, Florida, to Madrid, Spain. He has allegedly been in the US since June 3, 2000, learning to fly in Florida with fellow 9/11 hijacker Marwan Alshehhi. [Miami Herald, 9/22/2001] Spanish authorities will later say Atta meets Barakat Yarkas, head of a Spanish al-Qaeda cell, on the trip. After Yarkas is arrested in late 2001, an interview with him by a high court judge will indicate that “numerous lines to Sept. 11 principals passed through [him].” [Boston Globe, 8/4/2002] Atta also makes a brief visit to Hamburg, Germany, at this time. One college student acquiantance of his, an Egyptian named Nader el-Abd, will later recall seeing Atta at this time. “I asked him where he had been,” el-Abd will say. “He said he was looking for somewhere to do his PhD.” [Fouda and Fielding, 2003, pp. 133-134] Atta returns to the US on January 10 (see January 10, 2001). He will make a second trip to Spain in July of this year (see July 8-19, 2001).

Entity Tags: Nader el-Abd, Barakat Yarkas, Mohamed Atta

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Atta’s immigration record for his arrival on January 10, 2001, after alteration in early May.Atta’s immigration record for his arrival on January 10, 2001, after alteration in early May. [Source: 9/11 Commission]The Miami Herald will report: “INS documents, matched against an FBI alert given to German police, show two men named Mohamed Atta [arrive] in Miami on January 10, each offering different destination addresses to INS agents, one in Nokomis, near Venice, the other at a Coral Springs condo. He (they?) is admitted, despite having overstayed his previous visa by a month. The double entry could be a paperwork error, or confusion over a visa extension. It could be Atta arrived in Miami, flew to another country like the Bahamas, and returned the same day. Or it could be that two men somehow cleared immigration with the same name using the same passport number.” [Miami Herald, 9/22/2001] Officials will later call this a bureaucratic snafu, and insist that only one Atta entered the US on this date. [Associated Press, 10/28/2001] In addition, while Atta arrives on a tourist visa, he tells immigration inspectors that he is taking flying lessons in the US, which requires an M-1 student visa. [Washington Post, 10/28/2001] The fact that he had overstayed his visa by over a month on a previous visit also does not cause a problem. [Los Angeles Times, 9/27/2001] The INS will later defend its decision, but “immigration experts outside the agency dispute the INS position vigorously.” For instance, Stephen Yale-Loehr, co-author of a 20-volume treatise on immigration law, will assert: “They just don’t want to tell you they blew it. They should just admit they made a mistake.” [Washington Post, 10/28/2001]

Entity Tags: Federal Bureau of Investigation, Mohamed Atta, Stephen Yale-Loehr

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Future 9/11 hijacker Marwan Alshehhi flies from the US to Casablanca, Morocco, and back, for reasons unknown. He is able to reenter the US without trouble, despite having overstayed his previous visa by about five weeks (see January 18, 2001). [Los Angeles Times, 9/27/2001; US Department of Justice, 5/20/2002] Mohamed Atta’s cell phone is used on January 2 to call the Moroccan embassy in Washington, DC. Abdelghani Mzoudi, a Hamburg associate, is also in Morocco at the same time as Alshehhi, but there is no documentation of them meeting there. [9/11 Commission, 7/24/2004, pp. 17]

Entity Tags: Mohamed Atta, Abdelghani Mzoudi, Marwan Alshehhi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Marwan Alshehhi.Marwan Alshehhi. [Source: FBI]Future 9/11 hijacker Marwan Alshehhi is able to reenter the US without trouble, after a brief, mysterious trip to Morocco (see January 11-18, 2001), despite having overstayed his previous visa by about five weeks. [Los Angeles Times, 9/27/2001; US Department of Justice, 5/20/2002]

Entity Tags: Marwan Alshehhi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Hijackers Hamza Alghamdi and Mohamed Alshehri rent a post office box in Delray Beach, Florida. The timing is uncertain. Some reports indicate this occurs in January, which would be several months before they arrive in the US according to the FBI and 9/11 Commission (see April 23-June 29, 2001). [Washington Post, 9/30/2001; US Congress, 9/26/2002; Minneapolis St. Paul City Pages, 6/30/2004; 9/11 Commission, 7/24/2004, pp. 528] However, a document used as evidence at the trial of Zacarias Moussaoui will say the mailbox is actually rented on July 28, 2001. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 7 pdf file]

Entity Tags: Hamza Alghamdi, Mohand Alshehri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The National Security Agency seeks the assistance of global telecommunications corporation AT&T to help it set up a domestic call monitoring site to eavesdrop on US citizens’ phone communications, according to court papers filed in June 2006 as part of a lawsuit against AT&T (see October 2001). The NSA is expressly forbidden from spying on US citizens within US borders unless authorized by the Foreign Surveillance Intelligence Court (FISC) (see 1978). When the NSA program, which wiretaps phone and email communications often without court warrants, becomes public knowledge well over four years later (see December 15, 2005), President Bush, NSA Director Michael Hayden, and other White House and government officials will assert that the program was set up in response to the September 11, 2001 terrorist attacks. If the claims made in the lawsuit are accurate, these assertions are provably false. “The Bush administration asserted this became necessary after 9/11,” lawyer Carl Mayer will claim in 2006. “This undermines that assertion.” Unbeknownst to most Americans, the NSA is operating a secret “data mining” operation that, by 2006, will have compiled phone records and contact information on millions of domestic phone and email communications. The NSA project is code-named “Project Groundbreaker,” and is ostensibly an above-board attempt announced in June 2000 to have AT&T and other firms help modernize its technological capabilities. The project originally seeks to have AT&T build a network operations center that duplicates AT&T’s facility in Bedminster, New Jersey; this plan will be altered when the NSA decides it will be better served by acquiring the monitoring technology itself. The agency is seeking bids for a project to “modernize and improve its information technology infrastructure,” including the privatization of its “non-mission related” systems support. [TechWeb, 6/13/2000; Bloomberg, 6/30/2006] Groundbreaker’s privatization project is expected to provide up to $5 billion in government contracts to various private firms such as AT&T, Computer Sciences Corporation, and OAO Corporation, [Computerworld, 12/4/2000; Government Executive, 9/1/2001] and up to 750 NSA employees will become private contractors. Hayden, who has aggressively instituted a corporate management protocol to enhance productivity and has brought in numerous senior managers and agency executives from private defense firms, is a strong proponent of privatizing and outsourcing much of the NSA’s technological operations, and in 2001 will say that he wants the agency to focus on its primary task of breaking codes and conducting surveillance. Hayden does not admit that Groundbreaker is part of a larger NSA domestic surveillance program, [Government Executive, 9/1/2001] and publicly, NSA officials say that the project is limited to administrative and logistics functions. [Computerworld, 12/4/2000] The covert data mining portion of the project is code-named “Pioneer.” A former, unnamed employee of the NSA, [Bloomberg, 6/30/2006] and a former AT&T technician, Mark Klein, will provide the key information about Groundbreaker (see Late 2002, July 7, 2009 and December 15-31, 2005). Klein will say in 2006 that he saw the NSA construct a clandestine area within its switching center in San Francisco, and saw NSA technicians shunt fiber optic cable carrying Internet traffic into that area, which contains a large data bank and secret data mining hardware (see April 6, 2006). Klein will say he knew that the NSA built other such facilities in other switching locations. He will go on to say that the NSA did not work with just AT&T traffic; when AT&T’s network connected with other networks, the agency acquired access to that traffic as well. [Democracy Now!, 5/12/2006] The information about AT&T and the NSA will become public knowledge after the 2006 filing of a lawsuit against AT&T and other telecommunications firms (see May 12, 2006 and June 26, 2006).

Entity Tags: Mark Klein, Michael Hayden, George W. Bush, Foreign Intelligence Surveillance Court, Bush administration (43), Carl Mayer, Computer Sciences Corporation, AT&T, National Security Agency, OAO Corporation

Timeline Tags: Civil Liberties

Satam Al Suqami.Satam Al Suqami. [Source: FBI]In the wake of the foiled al-Qaeda plot to blow up hotels in Jordan during the millennium celebrations, Jordan gives tips to the US that launch a Customs investigation into one of the plotters, Raed Hijazi, and his US connections. “Customs agents for months traced money flowing from several Boston banks to banks overseas, where officials believe the funds were intended for bin Laden’s network.” In September and October 2000, Jordanian officials gave US investigators evidence of financial transactions connecting Raed Hijazi, Nabil al-Marabh, and future 9/11 hijacker Hamza Alghamdi (see September 2000; October 2000). By spring 2001, Custom agents further connect al-Marabh and Hijazi to financial deals with future 9/11 hijackers Ahmed Alghamdi and Satam Al Suqami. The Washington Post will later note, “These various connections not only suggest that investigators are probing ties between bin Laden and the hijackers, but also that federal authorities knew about some of those associations long before the bombings.” [Washington Post, 9/21/2001] It appears that the money flowed from al-Marabh to Alghamdi and Al Suqami. [Cox News Service, 10/16/2001; ABC News 7 (Chicago), 1/31/2002] While accounts of these connections to Alghamdi and Al Suqami will be widely reported in the media in the months after 9/11, a Customs Service spokesman will say he can neither confirm nor deny the existence of the inquiry. [New York Times, 9/18/2001] It appears that the two hijackers are not put on any kind of watch list and are not stopped when they arrive in the US on April 23, 2001, and May 2, 2001, respectively (see April 23-June 29, 2001). British newspapers will note that Alghamdi was one of several hijackers who should have been “instantly ‘red-flagged’ by British intelligence” but in fact is not when he passes through Britain sometime in early 2001 (see January-June 2001). The 9/11 Commission Final Report will fail to mention the Customs investigation and will give no hint that these hijackers’ names were known in the US before 9/11.

Entity Tags: Satam Al Suqami, Raed Hijazi, 9/11 Commission, Nabil al-Marabh, US Customs Service, Jordan, Ahmed Alghamdi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A poor photocopy of Nawaf Alhazmi’s US driver’s license.A poor photocopy of Nawaf Alhazmi’s US driver’s license. [Source: FBI]9/11 hijacker Nawaf Alhazmi is stopped by an Oklahoma police officer for speeding. He is stopped while traveling east on interstate highway 40, near Clinton, Oklahoma. It is likely he is with Hani Hanjour and the two are driving across the US, because they moved out of an apartment in Arizona the day before and will be seen in Virginia several days later (see December 12, 2000-March 2001 and March 2001 and After). [Federal Bureau of Investigation, 10/2001, pp. 131-132 pdf file; Daily Oklahoman, 1/20/2002] Alhazmi’s license information is run through a computer to determine whether there are any warrants for his arrest. There are none, so he is issued a ticket and sent on his way. He is driving the Toyota Corolla that he bought in San Diego the year before (see March 25, 2000). The CIA has known that Alhazmi is an al-Qaeda operative possibly living in the US since March 2000, but has failed to share this knowledge with other agencies. [Daily Oklahoman, 1/20/2002; Newsweek, 6/2/2002] Police do not check his immigration status, which would require a call to an Law Enforcement Support Center hotline. Had such a call been made, it would have revealed he had been in the US illegally since January 2001. [US Congress, 9/20/2002; GovExec, 3/16/2004] This incident is added to the NCIC, a widely used nationwide police database (see September 5, 2001). [Federal Bureau of Investigation, 10/2001, pp. 131 pdf file]

Entity Tags: National Crime Information Center, Hani Hanjour, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The muscle hijackers arrive in Dubai on their way to the US (see April 23-June 29, 2001):
bullet April 11: It is not known when Ahmed Alghamdi first arrives in Dubai, but he leaves on April 8, traveling to an unknown destination, and returns on April 11;
bullet April 12: Satam al Suqami arrives in the United Arab Emirates from Malaysia (see April 1-May 27, 2001);
bullet May 7, 2001: Ahmed Alhaznawi arrives in Abu Dhabi from Karachi by plane;
bullet May 13: Ahmed Alnami arrives in the United Arab Emirates by plane from Saudi Arabia;
bullet May 26: Hamza Alghamdi enters the United Arab Emirates;
bullet May 27: Abdulaziz Alomari arrives in Dubai from Malaysia (see April 1-May 27, 2001);
bullet June 1: It is not known when Wail Alshehri first arrives in Dubai, but he leaves on May 29, traveling to an unknown destination, and returns on June 1 with Ahmed Alhaznawi, who previously arrived on May 7, but must have left in the meantime;
bullet June 12: Saeed Alghamdi arrives in the United Arab Emirates from Saudi Arabia;
bullet June 28: Salem Alhazmi arrives in the United Arab Emirates from Saudi Arabia. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 42-50 pdf file]
The hijackers typically remain in Dubai for a few weeks before moving on to the US (see April 23-June 29, 2001). While in Dubai the hijackers purchase traveler’s checks:
bullet April 28: Majed Moqed purchases $2,980 in MasterCard travelers’ checks from the Thomas Cook Exchange in the nearby emirate of Sharjah;
bullet May 27, 2001: Ahmed Alnami purchases $10,000 of American Express travelers’ checks and Hamza Alghamdi purchases the same amount of Visa travelers’ checks in Dubai;
bullet June 6, 2001: Ahmed Alhaznawi purchases $3,000 of American Express travelers’ checks in Dubai;
bullet June 7, 2001: Wail Alshehri purchases $14,000 of American Express travelers’ checks in Sharjah;
bullet June 24: Fayez Ahmed Banihammad purchases $4,000 of Thomas Cook travelers’ checks in Sharjah. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 44-48 pdf file]
In addition, Wail Alshehri obtains an international driving permit in Sharjah on June 5. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 47 pdf file] Some of these hijackers are assisted by plot facilitator Mustafa Ahmed al-Hawsawi (see Early-Late June, 2001). It is not clear who helps the others, although Dubai-based Ali Abdul Aziz Ali previously assisted some of the hijackers (see June 29, 2000-September 18, 2000), and Saeed Sheikh, who has Dubai connections, may also assist some of them (see Early August 2001). In addition, Victor Bout, an arms dealer who flies shipments for al-Qaeda and the Taliban through the UAE, is based in Sharjah (see Mid-1996-October 2001).

Entity Tags: Satam Al Suqami, Wail Alshehri, Ahmed Alhaznawi, Abdulaziz Alomari, Ahmed Alghamdi, Salem Alhazmi, Saeed Sheikh, Victor Bout, Mustafa Ahmed al-Hawsawi, Saeed Alghamdi, Ali Abdul Aziz Ali, Fayez Ahmed Banihammad, Ahmed Alnami, Majed Moqed, Hamza Alghamdi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Ahmed Alnami receives a new passport from Saudi Arabia. According to the 9/11 Commission, the passport may contain an “indicator of extremism” that is “associated with al-Qaeda.” However, although it is certain some of the other hijackers have such indicator in their passports, it is not certain that Alnami does. The commission will merely say that there “is reason to believe” his passport may contain such indicator and note that it was “issued in the same Saudi passport office” that issued passports with the indicator to some of the other hijackers. In addition, Alnami obtains two passports before 9/11 (see also November 6, 1999), and it is not clear whether the commission thinks both of the passports have the indicator, or just one of them. [9/11 Commission, 7/24/2004, pp. 564; 9/11 Commission, 8/21/2004, pp. 9, 21, 33 pdf file] According to author James Bamford, the indicator is a “secret coded indicator, placed there by the Saudi government, warning of a possible terrorist affiliation.” [Bamford, 2008, pp. 58-59] The Saudi government reportedly uses this indicator to track some of the Saudi hijackers before 9/11 “with precision” (see November 2, 2007).

Entity Tags: Ahmed Alnami

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mohand Alshehri, apparently in Afghanistan.Mohand Alshehri, apparently in Afghanistan. [Source: As Sahab]Some of the “muscle hijackers” transit London when traveling between Dubai, United Arab Emirates, and the US (see April 11-June 28, 2001 and April 23-June 29, 2001):
bullet Satam al Suqami and Waleed Alshehri leave Dubai on April 22, change planes in London, and arrive in Orlando the next day.
bullet Majed Moqed and Ahmed Alghamdi fly from Dubai via London to Washington on May 2.
bullet Hamza Alghamdi, Ahmed Alnami, and Mohand Alshehri pass through London on their way from Dubai to Miami on May 28.
bullet Ahmed Alhaznawi and Wail Alshehri travel from Dubai to Miami via London on June 8.
bullet Fayez Ahmed Banihammad and Saeed Alghamdi transit London en route from Dubai to Orlando on June 27. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 42-50 pdf file]
There are also some reports that some of the hijackers spend more time in Britain (see January-June 2001 and June 2001). Ahmed Alghamdi is later said to have been on a British watch list and the Sunday Herald will say that he should have been “instantly ‘red-flagged’ by British intelligence” as he passed through Britain. Alghamdi was linked by the FBI to Raed Hijazi, an associate of Osama bin Laden in prison in Jordan for plotting a bombing campaign there, so the British may have watchlisted him based on information from the US. Two other hijackers that may have been on the British watch list are Satam al Suqami and Hamza Alghamdi, who were investigated by US customs together with Ahmed Alghamdi. If Ahmed Alghamdi was watchlisted based on US information, the names of the other two hijackers may have been passed to the British along with his name. Al Suqami and Ahmed Alghamdi are connected to both Hijazi and one of his associates, Nabil al-Marabh, and are reported to be under investigation, starting between autumn 2000 and spring 2001, by US customs and the FBI (see September 2000, Spring 2001 and September 11, 2001). A British intelligence source will say: “There is no way that MI5 and MI6 should have missed these guys. Britain has a history of having Islamic extremists in the country. We should have been watching them.” [Sunday Herald (Glasgow), 9/30/2001] Alghamdi appears to have been questioned about bin Laden after arriving in the US from London, but he is not stopped from entering the country (see May 2, 2001). According to The Times, the identities of some of the men are in question: “Officials hope that the inquiries in Britain will disclose the true identities of the suicide team. Some are known to have arrived in Britain using false passports and fake identities that they kept for the hijack. There are serious question marks over the identities of at least four of the visitors to Britain.” [London Times, 9/26/2001]

Entity Tags: Saeed Alghamdi, Wail Alshehri, Mohand Alshehri, Majed Moqed, Fayez Ahmed Banihammad, Waleed Alshehri, Ahmed Alghamdi, Ahmed Alhaznawi, Ahmed Alnami, Hamza Alghamdi, Satam Al Suqami

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

This Ahmed Al-Haznawi picture is a photocopy of his 2001 US visa application.This Ahmed Al-Haznawi picture is a photocopy of his 2001 US visa application. [Source: 9/11 Commission]The 13 hijackers commonly known as the “muscle” allegedly first arrive in the US. The muscle provides the brute force meant to control the hijacked passengers and protect the pilots. [Washington Post, 9/30/2001] Yet, according to the 9/11 Commission, these men “were not physically imposing,” with the majority of them between 5 feet 5 and 5 feet 7 tall, “and slender in build.” [9/11 Commission, 6/16/2004, pp. 8] According to FBI Director Mueller, they all pass through Dubai, United Arab Emirates, and their travel was probably coordinated from abroad by Khalid Almihdhar. [US Congress, 9/26/2002] However, some information contradicts their official arrival dates:
bullet April 23: Waleed Alshehri and Satam Al Suqami arrive in Orlando, Florida. Suqami in fact arrived before February 2001. A man named Waleed Alshehri lived with a man named Ahmed Alghamdi in Virginia and Florida between 1997 and 2000. However, it is not clear whether they were the hijackers or just people with the same name (see 1999). [Daily Telegraph, 9/20/2001] Alshehri appears quite Americanized in the summer of 2001, frequently talking with an apartment mate about football and baseball, even identifying himself a fan of the Florida Marlins baseball team. [Associated Press, 9/21/2001]
bullet May 2: Majed Moqed and Ahmed Alghamdi arrive in Washington. Both actually arrived by mid-March 2001. A man named Ahmed Alghamdi lived with a man named Waleed Alshehri in Florida and Virginia between 1997 and 2000. However, it is not clear whether they were the hijackers or just people with the same name (see 1999). [Daily Telegraph, 9/20/2001] Alghamdi apparently praises Osama bin Laden to Customs officials while entering the country and Moqed uses an alias (see May 2, 2001).
bullet May 28: Mohand Alshehri, Hamza Alghamdi, and Ahmed Alnami allegedly arrive in Miami, Florida. Alnami may have a suspicious indicator of terrorist affiliation in his passport (see April 21, 2001), but this is apparently not noticed by US authorities. The precise state of US knowledge about the indicator at this time is not known (see Around February 1993). The CIA will learn of it no later than 2003, but will still not inform immigration officials then (see February 14, 2003). According to other reports, however, both Mohand Alshehri and Hamza Alghamdi may have arrived by January 2001 (see January or July 28, 2001).
bullet June 8: Ahmed Alhaznawi and Wail Alshehri arrive in Miami, Florida. Alhaznawi may have a suspicious indicator of terrorist affiliation in his passport (see Before November 12, 2000), but this is apparently not noticed by US authorities.
bullet June 27: Fayez Banihammad and Saeed Alghamdi arrive in Orlando, Florida.
bullet June 29: Salem Alhazmi and Abdulaziz Alomari allegedly arrive in New York. According to other reports, however, Alhazmi arrived before February 2001. Alhazmi has a suspicious indicator of terrorist affiliation in his passport (see June 16, 2001), but this is apparently not noticed by US authorities.
After entering the US (or, perhaps, reentering), the hijackers arriving at Miami and Orlando airports settle in the Fort Lauderdale, Florida, area along with Mohamed Atta, Marwan Alshehhi, and Ziad Jarrah. The hijackers, arriving in New York and Virginia, settle in the Paterson, New Jersey, area along with Nawaf Alhazmi and Hani Hanjour. [US Congress, 9/26/2002] Note the FBI’s early conclusion that 11 of these muscle men “did not know they were on a suicide mission.” [Observer, 10/14/2001] CIA Director Tenet’s later claim that they “probably were told little more than that they were headed for a suicide mission inside the United States” [US Congress, 6/18/2002] and reports that they did not know the exact details of the 9/11 plot until shortly before the attack [CBS News, 10/9/2002] are contradicted by video confessions made by all of them in March 2001 (see (December 2000-March 2001)).

Entity Tags: Marwan Alshehhi, Mohand Alshehri, Majed Moqed, Mohamed Atta, Ziad Jarrah, Saeed Alghamdi, Khalid Almihdhar, Waleed Alshehri, Wail Alshehri, Satam Al Suqami, Nawaf Alhazmi, Hani Hanjour, Salem Alhazmi, George J. Tenet, Hamza Alghamdi, Abdulaziz Alomari, Ahmed Alhaznawi, Ahmed Alghamdi, Fayez Ahmed Banihammad, Federal Bureau of Investigation, Ahmed Alnami

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijacker Mohamed Atta is stopped at a random inspection near Fort Lauderdale, Florida, and given a citation for having no driver’s license. He will get a new Florida driver’s license on May 5. However, he will fail to show up for his May 28 court hearing, and a warrant will be issued for his arrest on June 4 (see June 4, 2001). [Wall Street Journal, 10/16/2001; Australian Broadcasting Corporation, 11/12/2001; St. Petersburg Times, 12/14/2001] Police do not check his immigration status, which would require a call to a Law Enforcement Support Center hotline. Had such a call been made, it would have revealed Atta had overstayed his visa. [GovExec, 3/16/2004] An FBI timeline compiled after 9/11 does not mention whether this incident is entered into the NCIC, a nationwide police database. [Federal Bureau of Investigation, 10/2001, pp. 138 pdf file] Curiously, on the day of 9/11, a woman claiming to be Atta’s wife will go to a Florida courthouse and attempt to clear this from Atta’s record, but Atta did not have a wife (see September 11, 2001).

Entity Tags: Mohamed Atta

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The Washington Post will later report, “In May 2001, the CIA learned supporters of bin Laden were planning to infiltrate the United States; that seven were on their way to the United States, Canada and Britain; that his key operatives ‘were disappearing while others were preparing for martyrdom,’ and that bin Laden associates ‘were planning attacks in the United States with explosives.’” [US Congress, 9/18/2002; Washington Post, 9/19/2002] This information may be related to a warning given by captured al-Qaeda operative Ahmed Ressam this month that al-Qaeda leader Abu Zubaida is seeking Canadian passports for himself and five other top militants in order to plant explosives in US cities (see May 30, 2001 and May 2001). [Calgary Herald, 4/3/2002] It is not known if the seven traveling to the US, Canada, and Britain refer to any of the 9/11 hijackers, but 11 of the hijackers travel to the US in May and June (see April 23-June 29, 2001), stopping in Britain along the way (see January-June 2001). Investigators will later say that they are not sure if the aliases Zubaida wanted on the Canadian passports could have been used by some of the 9/11 hijackers. [Calgary Herald, 4/3/2002]

Entity Tags: Abu Zubaida, Al-Qaeda, Osama bin Laden, Central Intelligence Agency, Ahmed Ressam

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Adnan Shukrijumah.Adnan Shukrijumah. [Source: FBI]Mohamed Atta, Adnan Shukrijumah, and another man go to the Miami District Immigration Office to request a visa extension for the third man, whose identity is not known but who is believed to be Ziad Jarrah. The man received only a six-month visa, while Atta received one for eight months after returning from Europe in January 2001 (see January 10, 2001). The inspector rejects the request, and instead decides that Atta was given an incorrect length of stay and rolls back his visa’s expiry date to July 9, 2001. Atta is quiet and polite throughout and even thanks her at the end, despite his visa having been shortened by two months. [9/11 Commission, 8/21/2004, pp. 22-3 pdf file]
Shukrijumah - After 9/11, both Mohamed Atta and Adnan Shukrijumah are identified by the immigration officer as two of the men who visited her office. Upon seeing Shukrijumah’s photo, she will say that she is “75 percent sure” it is him, and will provide a description that matches his profile. At this time, Shukrijumah is being investigated by the FBI and is thought to be a well-connected al-Qaeda operative (see November 2000-Spring 2002, (Spring 2001), April-May 2001, and March 21, 2003 and After). Atta and Marwan Alshehhi also attend a Florida mosque run by Shukrijumah’s father (see 2000-2001). An FBI informant sees both Atta and Adnan Shukrijumah at the mosque in early 2001, but he is unable to get close to them (see Early 2001).
Is Jarrah the Third Man? - The immigration officer will not be able to identify the third man. The 9/11 Commission will believe that he was Ziad Jarrah. Jarrah entered the US in January 2001 with a six-month tourist visa, left the States in February, and then returned as a business visitor with a visa for three and a half months (see March 30-April 13, 2001). Another reason to believe that this third man may have been Jarrah is that Atta and Jarrah are known to have been together on this date, for DMV records show that the two obtained drivers’ licenses later in the day. [9/11 Commission, 8/21/2004, pp. 40-1 pdf file]

Entity Tags: Mohamed Atta, Ziad Jarrah, Adnan Shukrijumah

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Waleed Alshehri.Waleed Alshehri. [Source: US District Court for the Eastern District of Virginia, Alexandria Division]9/11 hijackers Satam Al Suqami and Waleed Alshehri attempt to enter the Bahamas, but are refused entry because they do not have visas. They fly from Fort Lauderdale, Florida, to Freeport, Bahamas, where they have a hotel reservation for three nights, but are turned away by the local authorities and have to return to the US. The 9/11 Commission will speculate that the trip is an unsuccessful attempt to extend Al Suqami’s visa, which is due to expire within days (see May 20, 2001). However, as they are refused entry to the Bahamas, they are regarded as never having left the US and Al Suqami is not given an extension to his permitted length of stay when he returns to Florida. Alshehri is stopped by US customs during pre-clearance in the Bahamas, but he is not searched and his luggage is not X-rayed; the inspection lasts one minute. There is an error regarding Alshehri’s port of departure on his INS record which indicates that he leaves from Fall River, Massachusetts, not Fort Lauderdale, Florida. The two hand over their departure records when they leave, but, since they do not enter the Bahamas, they do not receive new arrival records when they return to the US. This causes INS records to incorrectly indicate that the two are outside the country from this date until 9/11. [9/11 Commission, 8/21/2004, pp. 23, 41 pdf file]

Entity Tags: US Immigration and Naturalization Service, Satam Al Suqami, Waleed Alshehri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijacker Satam Al Suqami becomes an illegal overstay on this day. He entered the US on April 23 (see April 23-June 29, 2001) and was allowed to stay for 30 days, so, according to the 9/11 Commission, his permission to remain in the US expires on this day. He remains in illegal status until 9/11. [9/11 Commission, 8/21/2004, pp. 8, 21, 23 pdf file] Hijackers Mohamed Atta and Marwan Alshehhi also overstayed their visas at times (see January 10, 2001 and January 18, 2001). At least one more of the hijackers, Khalid Almihdhar, lied on his visa application form, meaning he was in the US illegally (see August 29, 2001).

Entity Tags: Satam Al Suqami

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Jemaah Islamiyah operative Faiz abu Baker Bafana.Jemaah Islamiyah operative Faiz abu Baker Bafana. [Source: Channel News Asia]9/11 hijacker Khalid Almihdhar makes another visit to Kuala Lumpur, Malaysia, to continue planning for an attack on a US warship in Singapore (see October 2000). He asks Faiz abu Baker Bafana, an operative for the al-Qaeda-linked Jemaah Islamiyah (JI) group, for more information about the operation and for a proposed budget. Almihdhar was apparently involved in the attacks on the USS The Sullivans and USS Cole in Yemen (see Late 1999 and Around October 12, 2000). Bafana then begins meeting with two other bin Laden operatives to discuss the Singapore operation and an attack that is being planned for Manila. They end up only meeting twice, because by the second meeting Bafana believes he is under surveillance by Malaysian intelligence. [US District Court for the Eastern District of Virginia, Alexandria Division, 3/8/2006; US District Court for the Eastern District of Virginia, Alexandria Division, 3/8/2006] JI has been under increased surveillance from the authorities in Southeast Asia since a series of bomb attacks at the end of 2000 (see December 24-30, 2000 and January 2001 and after). Malaysian intelligence also monitored an al-Qaeda summit held in Kuala Lumpur, Malaysia, which Almihdhar and JI leader Hambali attended (see January 5-8, 2000 and January 5-8, 2000 and Shortly After). If Malaysian intelligence did monitor this meeting, they had an opportunity to recognize Almihdhar from their earlier surveillance of the 2000 al-Qaeda summit, but it is not known if they did so.

Entity Tags: Jemaah Islamiyah, Malaysian Secret Service, Faiz abu Baker Bafana, Khalid Almihdhar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A warrant is issued for the arrest of Mohamed Atta in the state of Florida. On April 26, Atta had been stopped in a random inspection near Fort Lauderdale, Florida, and given a citation for having no driver’s license (see April 26, 2001). He failed to show up for his May 28 court hearing, resulting in the arrest warrant. After this, Atta will fly all over the US using his real name, and even flies to Spain and back in July (see July 8-19, 2001), but is never stopped or questioned. The police apparently never try to find him. [Wall Street Journal, 10/16/2001; Australian Broadcasting Corporation, 11/12/2001] Atta will be stopped for speeding in July, but apparently his arrest warrant will not have been added to the police database by then (see July 5, 2001). Three other future 9/11 hijackers are also stopped for speeding in the US (see April 1, 2001, August 1, 2001, and September 9, 2001). Curiously, on the day of 9/11, a woman claiming to be Atta’s wife will go to a Florida courthouse and attempt to clear this from Atta’s record, but Atta does not have a wife (see September 11, 2001).

Entity Tags: Mohamed Atta

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Saeed Alghamdi.Saeed Alghamdi. [Source: US District Court for the Eastern District of Virginia, Alexandria Division]9/11 hijacker Saeed Alghamdi is seen in a Florida hotel by the manager before he is said to enter the US. Although the 9/11 Commission will say he arrives in America on June 27 (see April 23-June 29, 2001), the manager of the Deluxe Inn in Dania, Florida, will tell the FBI that he stays there for these three nights from June 11-14 together with fellow hijackers Mohamed Atta, Ahmed Alnami, and Marwan Alshehhi, who completed the registration forms. [Federal Bureau of Investigation, 10/2001, pp. 157 pdf file]

Entity Tags: Saeed Alghamdi, Mohamed Atta, Ahmed Alnami, Marwan Alshehhi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijacker Salem Alhazmi receives a new passport in Saudi Arabia. According to the 9/11 Commission, the passport contains an “indicator of extremism” that is “associated with al-Qaeda.” [9/11 Commission, 8/21/2004, pp. 9, 25, 33 pdf file] According to author James Bamford, this is a “secret coded indicator, placed there by the Saudi government, warning of a possible terrorist affiliation.” [Bamford, 2008, pp. 58-59] Alhazmi’s previous passport contained the same indicator (see April 4, 1999). The Saudi government will reportedly use this indicator to track Alhazmi and other Saudi hijackers before 9/11 “with precision” (see November 2, 2007).

Entity Tags: Salem Alhazmi

Timeline Tags: Complete 911 Timeline

9/11 hijacker Salem Alhazmi leaves Saudi Arabia. The precise date is unknown, although it must be some time between June 20, when he obtains a US visa in Jeddah (see June 20, 2001) and June 29, when he arrives in the US from the United Arab Emirates (see April 23-June 29, 2001). [9/11 Commission, 8/21/2004, pp. 25-27 pdf file] According to the 9/11 Commission, Alhazmi has a passport containing an indicator of Islamic extremism (see June 20, 2001). Such indicators are used by the Saudi authorities to track some of the hijackers before 9/11 (see November 2, 2007).

Entity Tags: Salem Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Photo and signature from Mustafa Ahmed al-Hawsawi’s passport.Photo and signature from Mustafa Ahmed al-Hawsawi’s passport. [Source: US District Court for the Eastern District of Virginia, Alexandria Division]9/11 hijacker Mohamed Atta makes several calls to plot facilitator Mustafa Ahmed al-Hawsawi to coordinate the arrival in the US of four muscle hijackers (see April 23-June 29, 2001) and one candidate hijacker (see August 4, 2001) al-Hawsawi is assisting in the United Arab Emirates. Al-Hawsawi is in contact with Atta both before tickets are purchased, to learn where the hijackers are traveling, and after the hijackers arrive, to check whether they have made it through immigration. Atta and two other hijackers also call al-Hawsawi later to make arrangements for returning unspent money (see September 5-10, 2001). [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006 pdf file; US department of Defense, 3/21/2007 pdf file]

Entity Tags: Mohamed Atta, Mustafa Ahmed al-Hawsawi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Nawaf Alhazmi’s USA ID card, recovered from the Pentagon crash site.Nawaf Alhazmi’s USA ID card, recovered from the Pentagon crash site. [Source: US District Court for the Eastern District of Virginia, Alexandria Division] (click image to enlarge)Khalid Almihdhar obtains a fake USA ID card from forger Mohamed el-Atriss. Abdulaziz Alomari also obtains fake ID, an international driver’s license, from el-Atriss, and some of the other hijackers may do as well. [National Public Radio, 8/20/2002; New York Times, 6/25/2003; Lance, 2006, pp. 372-3; Bergen Record, 9/11/2006] USA ID cards are not issued by governmental organizations, as are passports and driver’s licenses, for example. They are marketed by the manufacturer as being suitable for frequent customers to small businesses, such as VIP diners at a restaurant, gym members, and visitors to a check cashing store. [Usaidsystems (.com), 7/1/2007] El-Atriss, who is called seven times by Hani Hanjour and also by another unknown hijacker, is an associate of Waleed al-Noor, a co-conspirator in the 1993 ‘Landmarks’ bomb plot (see June 24, 1993), and will be sentenced to six months in jail after 9/11 despite being of assistance to the FBI (see Before September 11, 2001, September 13, 2001-Mid 2002, and November 2002-June 2003). [Associated Press, 7/3/2003; Lance, 2006, pp. 372-3; Bergen Record, 9/11/2006] An image of Almihdhar’s card, which gives his address as a hotel where he stayed for two nights after returning to the US a few days before, will be reproduced in the 9/11 Commission’s Terrorism Travel Monograph, but the Commission will fail to point out it was a fake. [9/11 Commission, 8/21/2004, pp. 192 pdf file; US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 52 pdf file] Five other hijackers obtain USA ID cards around this time: Nawaf Alhazmi, Salem Alhazmi, Abdulaziz Alomari, Majed Moqed, and Ahmed Alghamdi. [9/11 Commission, 8/21/2004, pp. 27-29, 31-32, 34-44 pdf file] Almihdhar’s card is similar to some of these hijackers’ USA ID cards, indicating they may also be fake, although this is not certain. Nawaf Alhazmi’s USA ID card contains the same hotel address and the same expiry date as Almihdhar’s card. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006] Salem Alhazmi’s card contains the same expiry date, indicating it was issued at a time Salem Alhazmi was out of the country (see April 23-June 29, 2001). In addition, the serial numbers are similar: the number of Salem Alhazmi’s card, which was supposedly issued on July 1 or 2, is 3408826-A, whereas the number of Almihdhar’s card, which the 9/11 Commission says was issued eight or nine days later, is 3408825-A. [9/11 Commission, 8/21/2004, pp. 192 pdf file; Time, 8/29/2005] The fake document for Alomari is purchased from el-Atriss’ All Service Plus business in Paterson, New Jersey, by fellow hijacker Nawaf Alhazmi. [CBS News, 7/31/2002; US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 61 pdf file; Bergen Record, 9/11/2006]

Entity Tags: Khalid Almihdhar, Abdulaziz Alomari, Majed Moqed, Mohamed el-Atriss, Salem Alhazmi, Ahmed Alghamdi, Nawaf Alhazmi, Hani Hanjour

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijacker Khalid Almihdhar reenters the US. The CIA and FBI have recently been showing interest in him, but have still failed to place him on a watch list of US-designated terrorists. Had he been placed on a watch list by this date, he would have been stopped and possibly detained as he tried to enter the US. He enters on a new US visa obtained in Jeddah, Saudi Arabia, on June 13, 2001. [US Congress, 7/24/2003, pp. 169 pdf file]
Invalid Passport, Indicator of Terrorist Affiliation - His passport is invalid, as it lacks an expiry date. However, his passport does contain an indicator that he is a terrorist, an indicator used by the Saudi authorities to track his movements (see June 1, 2001 and July 4, 2001), but this indicator is not recognized by US officials. The precise state of US knowledge about the indicator at this time is not known (see Around February 1993). The CIA will learn of it no later than 2003, but will still not inform immigration officials then (see February 14, 2003). [9/11 Commission, 8/21/2004, pp. 27 pdf file] His visa application said that he had not previously been to the US, which is not true (see January 15, 2000), so his entry is illegal. [US Department of Justice, 11/2004, pp. 351 pdf file]
'Muscle' Have Already Arrived - The FBI will note that he returns just days after the last of the hijacker “muscle” has entered the US, and will speculate that he returns because his job in bringing them over is finished. [US Congress, 7/24/2003, pp. 169 pdf file]
Source: Lists WTC as Destination - According to a stipulation introduced at the trial of Zacarias Moussaoui, he lists the Marriot Hotel in the World Trade Center complex as his destination, but does not stay there that night. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 52 pdf file]

Entity Tags: US Consulate, Jeddah, Saudi Arabia Office, Khalid Almihdhar, Federal Bureau of Investigation, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijacker Mohamed Atta is pulled over for speeding in Delray Beach, Florida, but is only given a warning. On June 4, a Florida warrant was issued for Atta’s arrest, as he skipped court following a previous traffic offense (see June 4, 2001), but the warrant apparently has not yet been entered in a police database, so the police officer does not know this. [St. Petersburg Times, 12/14/2001; GovExec, 3/16/2004] Police do not check his immigration status, which would require a call to a Law Enforcement Support Center hotline. Had such a call been made, it would have revealed Atta had overstayed his visa. [GovExec, 3/16/2004] Sen. Bob Graham (D-FL) will later comment about this and the failure to red flag Ziad Jarrah when he also gets a ticket (see September 9, 2001), “Had local law enforcement been able to run the names of Jarrah and Atta against a watch list, it is likely that they would have been arrested and detained, and at least one team of hijackers would no longer have had a pilot.” [Graham and Nussbaum, 2004, pp. 37] An FBI timeline compiled after 9/11 does not mention if this incident is entered into the NCIC, a nationwide police database. [Federal Bureau of Investigation, 10/2001, pp. 177 pdf file]

Entity Tags: Daniel Robert (“Bob”) Graham, Mohamed Atta

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Some al-Qaeda operatives hold a meeting in northern Spain to finalize plans for the 9/11 attacks. Those allegedly present are listed below. The first two operatives listed are definitely present; it is less certain that the others are there:
bullet Future 9/11 hijacker Mohamed Atta. [El Mundo (Madrid), 9/30/2001]
bullet Ramzi bin al-Shibh, an associate of Atta from Hamburg, arrives in Spain on July 9, and stays until July 16. Spanish authorities are notified of his arrival in the country by German intelligence (see (Around July 9, 2001)). [New York Times, 5/1/2002]
bullet Some reports say that 9/11 hijacker Marwan Alshehhi attends, although if he does, he may use a false identity, as US immigration has no records of his departure or return. [El Mundo (Madrid), 9/30/2001; US Department of Justice, 5/20/2002]
bullet The Spanish newspaper La Vanguardia will later report that 9/11 hijackers Waleed and Wail Alshehri meet Atta on July 16. [Associated Press, 9/27/2001] However, there will be no mention of them attending the meeting in some other accounts. For example, their attendance will not be mentioned in the relevant section of the 9/11 Commission Report. [9/11 Commission, 7/24/2004, pp. 243-5]
bullet Amer el-Azizi. [Wall Street Journal, 4/7/2004; Associated Press, 1/23/2005] El-Azizi, who seems to have made preparations for the meeting, is under surveillance at this time, as Spanish authorities are listening in on his phone calls. [Wall Street Journal, 3/19/2004] Calls possibly related to the meeting’s organization were overheard (see Before July 8, 2001). [Los Angeles Times, 4/14/2004; Los Angeles Times, 4/29/2004] Spanish judge Baltasar Garzon will later indict el-Azizi for helping plan 9/11 and say that he assisted the plotters by arranging accommodation for them and acting as a courier. However, US officials will be less certain of his involvement. [Associated Press, 1/23/2005] His arrest shortly after 9/11 will be frustrated by Spanish intelligence (see October 2001 and Shortly After November 21, 2001) and he will go on to be involved in the 2004 Madrid bombings (see Before March 11, 2004 and 7:37-7:42 a.m., March 11, 2004).
bullet Barakat Yarkas, head of an al-Qaeda-linked cell in Spain. [New York Times, 11/20/2001; Los Angeles Times, 1/14/2003]
bullet Mohammed Belfatmi. Belfatmi is an associate of Yarkas, and lives near the hotels where Atta and bin al-Shibh stay. He will flee Europe just before 9/11 with Said Bahaji, a member of the al-Qaeda cell in Hamburg (see September 3-5, 2001). [Los Angeles Times, 1/14/2003; BBC Worldwide Monitoring, 12/2/2004]
bullet Mamoun Darkazanli and Mohammed Haydar Zammar, associates of Atta’s from Germany.
bullet Al Jazeera reporter Tayseer Allouni.
bullet Said Bahaji, a member of the al-Qaeda cell in Hamburg. According to Spanish investigators, Bahaji is with Atta the entire time, and they both stay at the Monica Hotel. [Fouda and Fielding, 2003, pp. 137]
bullet 9/11 mastermind Khalid Shaikh Mohammed (KSM). In 2002, Al Jazeera journalist Yosri Fouda will allegedly interview bin al-Shibh and KSM together before either of them are arrested (see April, June, or August 2002). Neither bin al-Shibh nor KSM will discuss any details of the meeting with Fouda, including who attended. KSM will neither confirm nor deny he was there. However, in a 2003 book, Fouda will claim that, according to Spanish investigators, the initial attendees are Atta, bin al-Shibh, Bahaji, and a fourth man who might be KSM. They are later joined by Alshehhi and two unnamed others. [Fouda and Fielding, 2003, pp. 137]
However, there is a parallel meeting in Granada, in the south of Spain, at this time, and Yarkas, Darkazanli, Zammar, and Allouni may only be at that meeting, and may not meet Atta and bin al-Shibh in person (see July 6, 2001 and Shortly After). [New York Times, 11/20/2001; Los Angeles Times, 1/14/2003] After being captured, bin al-Shibh will deny meeting anyone other than Atta while in Spain. [9/11 Commission, 7/24/2004, pp. 243-5] However, questions will be raised about the quality of information obtained from detainees due to the methods—including torture—used to extract it (see June 16, 2004). The movements of Atta and his associates in Spain are apparently mirrored by those of FBI agents John O’Neill and Mark Rossini (see July 5-16, 2001).

Entity Tags: Mamoun Darkazanli, Wail Alshehri, Marwan Alshehhi, Khalid Shaikh Mohammed, Mohamed Atta, Mohammed Haydar Zammar, Amer el-Azizi, Yosri Fouda, Mohammed Belfatmi, Tayseer Allouni, Ramzi bin al-Shibh, Said Bahaji, Barakat Yarkas

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijacker pilot Hani Hanjour is pulled over for speeding on South George Mason Drive in Arlington, Virginia, for going 50-55 miles per hour in a 30 mph zone. He is driving a Chevrolet van rented two days before from Borough Jeep Chrysler in Wayne, New Jersey. He has a Florida driver’s license that gives his address as Miramar, Florida, where he lived in the mid-1990s (see Spring 1996). [CNN, 9/26/2001; CNN, 1/9/2002; Washington Post, 1/9/2002; US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006 pdf file] However, according to the 9/11 Commission, he did not have a Florida driver’s license, although he did have a Florida ID card. [9/11 Commission, 8/21/2004, pp. 32 pdf file] Three weeks after the stop, Hanjour sends Arlington General District Court a money order for the $70 and $30 court costs. [Washington Post, 1/9/2002] Three other plot leaders are also stopped for speeding in the US (see April 1, 2001).

Entity Tags: Hani Hanjour, 9/11 Commission

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijacker Mohamed Atta’s rental car is queried by police in Broward County, Florida. This incident is added to the NCIC, a widely used nationwide police database. [Federal Bureau of Investigation, 10/2001, pp. 204 pdf file] On June 4, a Florida warrant was issued for Atta’s arrest, as he skipped court following a previous traffic offense (see June 4, 2001). It is not clear why the existing arrest warrant does not raise a red flag, since he rented the car in his own name.

Entity Tags: Mohamed Atta, National Crime Information Center

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A letter that Zacarias Moussaoui had in his possession when he was arrested. It is signed by Yazid Sufaat, whose apartment was used for a 9/11 planning meeting in January 2000 that was monitored by the authorities.A letter that Zacarias Moussaoui had in his possession when he was arrested. It is signed by Yazid Sufaat, whose apartment was used for a 9/11 planning meeting in January 2000 that was monitored by the authorities. [Source: US District Court for the Eastern District of Virginia, Alexandria Division] (click image to enlarge)After Zacarias Moussaoui is arrested, the FBI wishes to search his possessions (see August 16, 2001 and August 23-27, 2001). According to a presentation made by FBI agent Aaron Zebley at Moussaoui’s trial, the belongings are sufficient to potentially connect Moussaoui to eleven of the 9/11 hijackers: Mohamed Atta, Marwan Alshehhi, Ziad Jarrah, Hani Hanjour, Khalid Almihdhar, Nawaf Alhazmi, Fayez Banihammad, Ahmed Alhaznawi, Hamza Alghamdi, Satam Al Suqami, and Waleed Alshehri. The connections would be made, for example, through Ramzi bin al-Shibh, who spoke with Moussaoui on the telephone and wired him money (see July 29, 2001-August 3, 2001), and who was linked to three of the hijacker pilots from their time in Germany together (see November 1, 1998-February 2001). Bin al-Shibh also received money from Mustafa Ahmed al-Hawsawi, who was connected to hijacker Fayez Ahmed Banihammad (see June 25, 2001). [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006] Moussaoui’s notebook contained two recognizable control numbers for the Western Union wire transfers from bin al-Shibh and, according to McClatchy newspapers, a check on these numbers “would probably have uncovered other wires in the preceding days” to bin al-Shibh from al-Hawsawi. [McClatchy Newspapers, 9/11/2007] The discovery of the eleven hijackers could potentially have led to the discovery of some or all of the remaining eight plot members, as they were brothers (Wail and Waleed Alshehri, Nawaf and Salem Alhazmi), opened bank accounts together (see May 1-July 18, 2001 and June 27-August 23, 2001), lived together (see March 2001-September 1, 2001), obtained identity documents together (see April 12-September 7, 2001 and August 1-2, 2001), arrived in the US together (see April 23-June 29, 2001), and booked tickets on the same four flights on 9/11 (see August 25-September 5, 2001).

Entity Tags: Saeed Alghamdi, Salem Alhazmi, Satam Al Suqami, Waleed Alshehri, Zacarias Moussaoui, Ziad Jarrah, Wail Alshehri, Mohand Alshehri, Nawaf Alhazmi, Marwan Alshehhi, Ahmed Alhaznawi, Ahmed Alghamdi, Mohamed Atta, Fayez Ahmed Banihammad, Abdulaziz Alomari, Hani Hanjour, Hamza Alghamdi, Ahmed Alnami, Majed Moqed, Khalid Almihdhar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

All the 9/11 hijackers book their flights for September 11, 2001, using their apparent real names. The total cost of the tickets is in excess of $30,000:
bullet August 25: Khalid Almihdhar, who was watchlisted two days previously (see August 23, 2001), and Majed Moqed book tickets for American Airlines flight 77 using the AA.com website. They are collected from the American Airlines ticket counter at Baltimore Washington International Airport on September 5. The tickets were not mailed, because the shipping address did not match the credit card address. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 72, 74 pdf file]
bullet August 26: Wail Alshehri buys a ticket for American Airlines flight 11 over the phone with his debit card. His brother Waleed buys a ticket for the same flight at the AA.com website using his debit card. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006 pdf file; US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 72 pdf file]
bullet August 27: Nawaf Alhazmi, who was watchlisted four days before (see August 23, 2001), buys tickets for himself and his brother Salem for American Airlines flight 77 through Travelocity from a Kinkos computer in Laurel, Maryland, using his debit card (see August 25-27, 2001). [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006 pdf file; US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 72 pdf file]
bullet August 27: Saeed Alghamdi uses his debit card to purchase tickets for United Airlines flight 93 for himself and Ahmed Alnami from the UA.com website. The tickets are not paid for until September 5, 2001, due to a problem with the debit card. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 72 pdf file]
bullet August 27: Fayez Ahmed Banihammad uses his visa card to purchase tickets for himself and Mohamed Alshehri for United Airlines flight 175 over the telephone. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 72-73 pdf file; US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006 pdf file]
bullet August 28: Mohamed Atta uses his debit card to buy tickets for American Airlines flight 11 for himself and Abdulaziz Alomari from the AA.com website. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006 pdf file]
bullet August 28: Waleed Alshehri purchases a ticket for Satam Al Suqami for American Airlines flight 11 in person from the company’s counter at Fort Lauderdale Airport. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 73 pdf file]
bullet August 28: Marwan Alshehhi purchases a ticket for United Airlines flight 175 from the company’s counter at Miami International Airport. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006 pdf file; US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 73 pdf file]
bullet August 29: Hamza Alghamdi books tickets for himself and Ahmed Alghamdi for United Airlines flight 175 from the UA.com website. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006 pdf file]
bullet August 29: Ahmed Alhaznawi creates a new e-mail account and Travelocity.com account and uses them to book a ticket for himself on United Airlines flight 93. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006 pdf file; US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 74 pdf file]
bullet August 30: Ziad Jarrah purchases a ticket for himself for United Airlines flight 93 from the UA website. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006 pdf file]
bullet August 31: Hani Hanjour purchases a ticket for American Airlines flight 77 from ATS Advanced Travel Services in Totowa, New Jersey, paying in cash. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006 pdf file]
At least five tickets are one way only. [Los Angeles Times, 9/18/2001] There are numerous connections between the hijackers booked on the four flights by this point:
bullet Hijackers on different 9/11 flights arrived in the US on the same plane. For example, Salem Alhazmi (Flight 77) arrived with Abdulaziz Alomari (Flight 11), and Fayez Ahmed Banihammad (Flight 175) arrived with Saeed Alghamdi (Flight 93) (see April 23-June 29, 2001);
bullet Two of the pilots, Mohamed Atta and Marwan Alshehhi, train and live together, and have a joint bank account (see (Mid-July 2000 - Early January 2001), July 6-December 19, 2000, and June 28-July 7, 2000);
bullet Hijackers from different planes open bank accounts together (see May 1-July 18, 2001 and June 27-August 23, 2001); and
bullet The hijackers obtain identity documents together (see April 12-September 7, 2001 and August 1-2, 2001).
Six hijackers also provide the same phone number and three use the same address. [Miami Herald, 9/22/2001]

Entity Tags: Ahmed Alnami, Fayez Ahmed Banihammad, Hamza Alghamdi, Khalid Almihdhar, Ahmed Alhaznawi, Hani Hanjour, Marwan Alshehhi, Majed Moqed, Ahmed Alghamdi, Wail Alshehri, Mohamed Atta, Ziad Jarrah, Waleed Alshehri, Abdulaziz Alomari, Satam Al Suqami, Nawaf Alhazmi, Salem Alhazmi, Mohand Alshehri, Saeed Alghamdi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

FBI headquarters agents Dina Corsi and Rod Middleton contact Justice Department lawyer Sherry Sabol to ask her opinion on the search for 9/11 hijacker Khalid Almihdhar, but Sabol will later say that Corsi misrepresents her advice to other agents. Corsi contacts Sabol, an attorney at the national security law unit, to ask her about legal restrictions on the search for Almihdhar, because of an argument she has had with New York agent Steve Bongardt about whether the search should be an intelligence or criminal investigation (see August 28, 2001 and August 28, 2001). Corsi will later tell Bongardt that Sabol told her that the information needed for the investigation cannot be passed on to criminal agents at the FBI, only intelligence agents, and that if Almihdhar is located, a criminal agent cannot be present at an interview. [US Department of Justice, 11/2004, pp. 307-8 pdf file] Corsi’s understanding of the issue is wrong, and the “wall,” which restricted the passage of some intelligence information to criminal agents at the FBI, does not prevent the information in question being shared with criminal agents (see August 29, 2001). The 9/11 Commission will comment that Corsi “appears to have misunderstood the complex rules that could apply to the situation.” [9/11 Commission, 7/24/2004, pp. 271] In addition, Sabol will later insist that her advice was very different than what Corsi claims it is. She will deny saying a criminal agent could not interview Almihdhar, arguing that she would not have given such inaccurate advice. She will also say the caveat on the intelligence information from the NSA would not have stopped criminal agents getting involved and, in any case, the NSA would have waived the caveat if asked. (Note: the NSA did so at Corsi’s request just one day earlier (see August 27-28, 2001), but presumably Corsi does not tell Sabol this.) [9/11 Commission, 7/24/2004, pp. 271] Larry Parkinson, the FBI’s general counsel at this time, will later say there was no legal bar to a criminal agent being present at an interview and that he would be shocked if Sabol had actually told Corsi this. [9/11 Commission, 2/24/2004] Furthermore, Corsi apparently does not tell Sabol that Almihdhar is in the US illegally. The illegal entry is a crime and means criminal FBI agents can search for him (see August 29, 2001).

Entity Tags: Steve Bongardt, Sherry Sabol, Usama bin Laden Unit (FBI), Larry Parkinson, Khalid Almihdhar, Dina Corsi, FBI Headquarters, FBI New York Field Office, National Security Law Unit, Rod Middleton

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Although the FBI is aware that 9/11 hijacker Khalid Almihdhar lied in an application for a visa on which he entered the US the previous month (see July 4, 2001), it does not fully realize that this means his entry into the US was illegal. If the FBI realized this, it would be able to open a criminal investigation to locate Almihdhar, instead of an intelligence investigation. The New York office, which conducts the search for him, would have preferred a criminal investigation, as more agents could have worked on it, possibly allowing the office to locate Almihdhar before and stop 9/11. The Justice Department’s Office of Inspector General will remark after 9/11: “Thus, there was a clear basis to charge Almihdhar criminally with false statements or visa fraud. Significantly, this information had been provided to the FBI without the restrictive caveats placed on NSA reports and other intelligence information. As a result, if Almihdhar had been found, he could have been arrested and charged with a criminal violation based on the false statements on his visa application. However, the FBI did not seem to notice this when deciding whether to use criminal or intelligence resources to locate Almihdhar.” Almihdhar’s passport also lacks an expiry date and he is a terrorist posing as a tourist (see July 4, 2001). [US Department of Justice, 11/2004, pp. 351 pdf file]

Entity Tags: Usama bin Laden Unit (FBI), Khalid Almihdhar, Dina Corsi, Steve Bongardt, FBI New York Field Office, FBI Headquarters

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Ziad Jarrah.Ziad Jarrah. [Source: CNN]9/11 hijacker Ziad Jarrah is stopped in Maryland for speeding, ticketed, and released. No red flags show up when his name is run through the computer by the state police, even though he already had been questioned in January 2001 in the United Arab Emirates (UAE) at the request of the CIA for “suspected involvement in terrorist activities” (see January 30, 2001) Baltimore’s mayor has criticized the CIA for not informing them that Jarrah was on the CIA’s watch list. [South Florida Sun-Sentinel, 12/13/2001; Associated Press, 12/14/2001] Sen. Bob Graham (D-FL) will later make reference to Jarrah’s detention in the UAE and the fact that an arrest warrant had been put out for Mohamed Atta (see June 4, 2001), and comment, “Had local law enforcement been able to run the names of Jarrah and Atta against a watch list, it is likely that they would have been arrested and detained, and at least one team of hijackers would no longer have had a pilot.” [Graham and Nussbaum, 2004, pp. 37] Three other hijackers are also stopped for speeding while they are in the US (see April 26, 2001).

Entity Tags: Central Intelligence Agency, Ziad Jarrah

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijacker Mohamed Atta’s “wife” attempts to clear Atta’s driving record. On April 26, 2001, Atta was issued a citation for driving without a license (see April 26, 2001). Because he failed to show up for a hearing, an arrest warrant was issued for him on June 4, 2001 (see June 4, 2001). According to an FBI report on hijacker activities after 9/11, “A woman claiming to be Atta’s wife arrived at Broward County Courthouse on September 11, 2001 and attempted to clear his record.” [Federal Bureau of Investigation, 4/19/2002] There will be no known reports of Atta having a wife, although he may have gotten engaged once (see October 1999). A search of article databases shows that Atta’s name is first mentioned in the media on September 12. [Knight Ridder Newspapers, 9/12/2001] The FBI makes no further mention of who this woman may be or what her motive may be, and this incident will not be reported by the media.

Entity Tags: Mohamed Atta

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A section from Rumsfeld’s notes, dictated to Stephen Cambone.A section from Rumsfeld’s notes, dictated to Stephen Cambone. [Source: Defense Department] (click image to enlarge)Stephen Cambone, the Principal Deputy Undersecretary of Defense for Policy, makes the following note for Defense Secretary Rumsfeld at an emergency policy meeting, “AA 77—3 indiv have been followed since Millennium + Cole. 1 guy is assoc of Cole bomber. 2 entered US in early July (2 of 3 pulled aside and interrogated?).” Although four of the subsequently alleged Flight 77 hijackers were known to the authorities in connection with terrorism before 9/11, it appears that the three referred to here as being followed are Nawaf Alhazmi, Khalid Almihdhar, and Salem Alhazmi, due to their ties to an al-Qaeda Malaysia summit around the Millennium (see January 5-8, 2000) and ties to the USS Cole bombing (see October 12, 2000). Nawaf Alhazmi and Khalid Almihdhar initially arrived in the US shortly before or after the Millennium plot was due to come to fruition (see November 1999 and January 15, 2000), even entering at Los Angeles Airport (LAX), a target of the plot. If the note is literally correct that some US authorities were following these three since the Millennium, this would contradict the 9/11 Commission’s position that the trail of the three was lost shortly after the Millennium. The comment that one of the hijackers is an associate of a Cole bomber could refer to photos the CIA had before 9/11 identifying Almihdhar standing next to Cole bomber Fahad al-Quso (see Early December 2000) or photos of him standing next to Cole bomber Khallad bin Attash (see January 4, 2001). The note’s mention that two of them entered the US in July is also accurate, as Salem Alhazmi entered the US on June 29 (see April 23-June 29, 2001) and Khalid re-entered on July 4 (see July 4, 2001). [US Department of Defense, 9/11/2001 pdf file; US Department of Defense, 2/6/2006 pdf file] Earlier in the day, Cambone took notes for Rumsfeld that indicate Rumsfeld is keen to move against Iraq following the 9/11 attacks, even though he was aware there may be no connection between Iraq and 9/11 (see (2:40 p.m.) September 11, 2001). [US Department of Defense, 9/11/2001 pdf file; Guardian, 2/24/2006]

Entity Tags: Khalid Almihdhar, Stephen A. Cambone, Salem Alhazmi, Nawaf Alhazmi, Donald Rumsfeld

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The FBI dramatically escalates its warrantless wiretaps of US citizens, most without the proper paperwork or oversight. The public will not learn of the FBI wiretapping program until October 2005, when classified documents will be made available to the Electronic Privacy Information Center (EPIC), an advocacy group that will sue the Justice Department for records relating to the Patriot Act. According to those documents, which are heavily redacted, the FBI conducts clandestine surveillance on some US residents for 18 months and even longer. The FBI will also internally investigate at least 287 violations of its use of secret surveillance against US citizens. One target will be kept under surveillance for over five years, including a 15-month stretch where the FBI fails to notify Justice Department lawyers after the subject moves from New York to Detroit. According to an FBI investigation, that delay is a violation of department guidelines and will prevent the department “from exercising its responsibility for oversight and approval of an ongoing foreign counterintelligence investigation of a US person.” Other cases involve agents obtaining e-mails after warrants expire, seizing bank records without authorization, and conducting improper “unconsented physical search(es).” EPIC’s general counsel, David Sobel, will say in October 2005 that the classified documents indicate possible misconduct by the FBI in counterintelligence investigations, and highlight the need for greater congressional oversight of clandestine surveillance within the United States. “We’re seeing what might be the tip of the iceberg at the FBI and across the intelligence community,” Sobel will say. “It indicates that the existing mechanisms do not appear adequate to prevent abuses or to ensure the public that abuses that are identified are treated seriously and remedied.” The FBI will counter by insisting that all of the infractions are minor, mostly what it calls administrative errors, and that any information obtained improperly is quarantined and eventually destroyed. One senior FBI official will say, “Every investigator wants to make sure that their investigation is handled appropriately, because they’re not going to be allowed to keep information that they didn’t have the proper authority to obtain. But that is a relatively uncommon occurrence. The vast majority of the potential [violations] reported have to do with administrative timelines and time frames for renewing orders.” Catherine Lotrionte, the counsel for the President’s Foreign Intelligence Advisory Board, which is tasked with overseeing the FBI’s domestic surveillance operations, will refuse to disclose any details of any of the FBI violations, saying most of its work is classified and covered by executive privilege. The surveillance operations are conducted under the aegis of the Foreign Intelligence Surveillance Act (see 1978), whose threshold for such surveillance is lower than for criminal warrants. In 2004 alone, over 1,700 new cases will be opened by the secret Foreign Intelligence Surveillance Court. [Washington Post, 10/24/2005] Though Bush officials eventually admit to beginning surveillance of US citizens after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Issuetsdeah, Federal Bureau of Investigation, Catherine Lotrionte, Electronic Privacy Information Center, David Sobel, US Department of Justice, Foreign Intelligence Surveillance Court

Timeline Tags: Civil Liberties

A self-styled White House “war council” begins meeting shortly after the 9/11 attacks, to discuss the administration’s response to the attacks and the methods it will use (see (After 10:00 a.m.) September 11, 2001). The ad hoc group is composed of White House counsel Alberto Gonzales, Justice Department lawyer John Yoo, Pentagon chief counsel William J. Haynes, and the chief aide to Vice President Dick Cheney, David Addington. According to Jack Goldsmith, who will become head of the Justice Department’s Office of Legal Counsel (OLC) in 2003 (see October 6, 2003), the four believe that the administration’s biggest obstacle to responding properly to the 9/11 attacks is the body of domestic and international law that arose in the 1970s to constrain the president’s powers after the criminal excesses of Richard Nixon’s White House. Chief among these restraints is the Foreign Intelligence Surveillance Act (FISA) of 1978 (see 1978). Though Addington tends to dominate the meetings with his imposing physical presence and aggressive personality, Yoo is particularly useful to the group; the head of the OLC, Jay Bybee (whom Goldsmith will replace) has little experience with national security issues, and delegates much of the responsibility for that subject to Yoo, even giving him the authority to draft opinions that are binding on the entire executive branch. Yoo agrees wholeheartedly with Addington, Gonzales, and Cheney about the need for vastly broadened presidential powers. According to Goldsmith, Yoo is seen as a “godsend” for the White House because he is eager to draft legal opinions that would protect Bush and his senior officials from any possible war crimes charges. However, Yoo’s direct access to Gonzales angers Attorney General John Ashcroft, who feels that the “war council” is usurping legal and policy decision-making powers that are legally his own. [New York Times Magazine, 9/9/2007] In 2009, Goldsmith will say, “[I]it was almost as if they [Cheney and Addington] were interested in expanding executive power for its own sake.” [Vanity Fair, 2/2009]

Entity Tags: Richard (“Dick”) Cheney, William J. Haynes, Richard M. Nixon, Office of Legal Counsel (DOJ), Jay S. Bybee, Jack Goldsmith, John C. Yoo, Bush administration (43), Foreign Intelligence Surveillance Act, Alberto R. Gonzales, David S. Addington

Timeline Tags: Civil Liberties

Former AT&T employee Mark Klein.Former AT&T employee Mark Klein. [Source: PBS]The National Security Agency, as part of its huge, covert, and possibly illegal wiretapping program directed at US citizens (see Spring 2001 and After September 11, 2001), begins collecting telephone records of tens of millions of Americans, using data provided by telecommunications firms such as AT&T, Verizon, and BellSouth (see February 5, 2006). The media will not report on this database until May 2006 (see May 11, 2006). The program collects information on US citizens not suspected of any crime or any terrorist connections. Although informed sources say the NSA is not listening to or recording actual conversations, the agency is using the data to analyze calling patterns in an effort to detect terrorist activity. “It’s the largest database ever assembled in the world,” says one anonymous source. The NSA intends “to create a database of every call ever made.” As a result, the NSA has detailed records of the phone activities of tens of millions of US citizens, from local calls to family and friends to international calls. The three telecommunications companies are working with the NSA in part under the Communications Assistance Act for Law Enforcement (CALEA) (see January 1, 1995 and June 13, 2006) and in part under contract to the agency.
Surveillance Much More Extensive Than Acknowledged - The wiretapping program, which features electronic surveillance of US citizens without court warrants or judicial oversight, is far more extensive than anything the White House or the NSA has ever publicly acknowledged. President Bush will repeatedly insist that the NSA focuses exclusively on monitoring international calls where one of the call participants is a known terrorist suspect or has a connection to terrorist groups (see December 17, 2005 and May 11, 2006), and he and other officials always insist that domestic calls are not monitored. This will be proven false. The NSA has become expert at “data mining,” sifting through reams of information in search of patterns. The warrantless wiretapping database is one source of information for the NSA’s data mining. As long as the NSA does not collect “personal identifiers”—names, Social Security numbers, street addresses, and the like—such data mining is legal. But the actual efficacy of the wiretapping program in learning about terrorists and possibly preventing terrorist attacks is unclear at best. And many wonder if the NSA is not repeating its activities from the 1950s and 1960s, when it conducted “Operation Shamrock” (see 1945-1975), a 20-year program of warrantless wiretaps of international phone calls at the behest of the CIA and other intelligence agencies. Operation Shamrock, among other things, led to the 1978 passage of the Foreign Intelligence Surveillance Act (see 1978). [USA Today, 5/11/2006] In May 2006, former NSA director Bobby Ray Inman will say, “[T]his activity is not authorized” (see May 12, 2006). [Democracy Now!, 5/12/2006]
Secret Data Mining Center - In May 2006, retired AT&T technician Mark Klein, a 22-year veteran of the firm, will file a court affidavit saying that he saw the firm construct a secret data-mining center in its San Francisco switching center that would let the NSA monitor domestic and international communications (see January 2003). And former AT&T workers say that, as early as 2002, AT&T has maintained a secret area in its Bridgeton, Missouri, facility that is likely being used for NSA surveillance (see Late 2002-Early 2003).
Domestic Surveillance Possibly Began Before 9/11 - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, Verizon Communications, Mark Klein, George W. Bush, AT&T, BellSouth, Central Intelligence Agency, Communications Assistance for Law Enforcement Act (CALEA), Foreign Intelligence Surveillance Act, Qwest, National Security Agency

Timeline Tags: Civil Liberties

In a key speech about al-Qaeda’s responsibility for the 9/11 attacks, British Prime Minister Tony Blair says that one of the hijackers played a “key role” in the 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). Though he doesn’t specify which one, he does say the individual was one of the three hijackers who were quickly identified after 9/11 as known al-Qaeda associates (see 9:53 p.m. September 11, 2001) and someone who had also played an important role in the USS Cole attacks (see October 14-Late November, 2000). [UK Prime Minister, 10/4/2001] Blair’s description of this hijacker as being involved in the USS Cole and African Embassy attacks strongly suggests the person he is referring to is Khalid Almihdhar. Almihdhar allegedly had a hand in the Cole attack (see Early October 2001) and had links to one of the captured embassy bombers, Mohamed al-Owhali. Before the Cole attacks, al-Owhali stayed at an al-Qaeda communications hub in Yemen run by Almihdhar’s father-in-law (see February 2001 and After). Additionally, al-Owhali met an al-Qaeda operative in Pakistan by the name of Khalid, although this may have been Khallad (aka Tawfiq bin Attash), or even Khalid Shaikh Mohammed. [United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001; Guardian, 10/5/2001; CNN, 10/16/2001; Burke, 2004, pp. 174; 9/11 Commission, 7/24/2004, pp. 222; Wright, 2006, pp. 309] It is also possible that the person alluded to in Blair’s speech is Nawaf Alhazmi, who also had connections to the embassy bombings (see 1993-1999).

Entity Tags: Khallad bin Attash, Tony Blair, Salem Alhazmi, Khalid Almihdhar, Khalid Shaikh Mohammed, Ahmed al-Hada, Nawaf Alhazmi, Mohamed al-Owhali

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The man in the picture on the left is supposed to be bin Laden in October 2001. The picture on the right is undisputendly bin Laden in DecemberThe man in the picture on the left is supposed to be bin Laden in October 2001. The picture on the right is undisputendly bin Laden in December [Source: Reuters]Following the release of a home video in which Osama bin Laden apparently confesses to involvement in 9/11 (see Mid-November 2001), some commentators question its authenticity, as a number of strange facts about the video soon emerge. For example, all previous videos had been made with the consent of bin Laden, and usually released to the Arabic television channel Al Jazeera. This video was supposedly recorded without his knowledge, found in a house in Afghanistan, and then passed to the CIA by an unknown person or group. Experts point out that it would be possible to fake such a video. So many people doubt the video’s authenticity that President Bush soon makes a statement, saying it was “preposterous for anybody to think this tape was doctored. Those who contend it’s a farce or a fake are hoping for the best about an evil man.” [Guardian, 12/15/2001] Some commentators will suggest that the person thought to be bin Laden is not actually the al-Qaeda leader. For example, arabist Kevin Barrett will say that the person in the video is “at least 40 or 50 pounds heavier, and his facial features [are] obviously different.” [Capital Times (Madison), 2/14/2006] The man said to be bin Laden also makes some questionable statements in the video:
bullet “I was thinking that the fire from the gas in the plane would melt the iron structure of the building…” [US Department of Defense, 12/13/2001 pdf file] The jet fuel spilled from the planes burned up about 10 minutes after impact (see 8:57 a.m. September 11, 2001), the towers’ structure did not melt (see September 12, 2001-February 2002), and the towers were not made of iron, but steel. [National Institute of Standards and Technology, 9/2005, pp. 6] Bin Laden had studied civil engineering at university and had experience as a construction contractor. [Burke, 2004, pp. 47; Laden, 2005, pp. xii-xiii] It is unclear why he would think the towers were made of iron.
bullet “We did not reveal the operation to [the brothers who conducted the operation] until they are there and just before they boarded the planes.” [US Department of Defense, 12/13/2001 pdf file] All the hijackers purchased tickets for the 9/11 flights about two weeks in advance (see August 25-September 5, 2001). The six plot leaders had flight training (see July 6-December 19, 2000, (June 28-December 2000), January-February 2001, and May 5 and 10, 2000), and some of the other 13 are thought to have assisted with target surveillance and casing flights (see May 24-August 14, 2001, August 1, 2001, June 2001 and August 2001).
bullet “Those who were trained to fly didn’t know the others. One group of people did not know the other group.” [US Department of Defense, 12/13/2001 pdf file] The opposite is true: the pilots intermingled with the muscle and the teams for the various planes mixed (see April 23-June 29, 2001, April 12-September 7, 2001, and June 27-August 23, 2001).
There are reports that bin Laden had from four to ten look-alike doubles at the time. [Agence France-Presse, 10/7/2001; London Times, 11/19/2001]

Entity Tags: Bush administration (43), Kevin Barrett, Central Intelligence Agency, George W. Bush, Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

When al-Qaeda logistics manager Abu Zubaida is arrested in late March 2002 (see March 28, 2002), his computer is searched. According to the Washington Post: “When agents found Zubaida’s laptop computer, a senior law enforcement source said, they discovered that the vast majority of people he had been communicating with were being monitored under FISA warrants or international spying efforts. ‘Finally, we got some comfort’ that surveillance efforts were working, said a government official familiar with Zubaida’s arrest.” The fact some of his contacts are monitored under FISA warrants indicates that they are in the US, as FISA warrants are only used for US targets (see 1978). The monitoring of Abu Zubaida’s communications began in the mid-1990s, at the latest (see (Mid-1996) and October 1998 and After), and continued after 9/11 (see October 8, 2001). [Washington Post, 2/9/2006] Some will later suggest that Zubaida may have had mental problems (see Shortly After March 28, 2002), but this apparently did not stop him from being a key al-Qaeda contact point. FBI agent Dan Coleman, an expert on al-Qaeda, will later say that the FBI “all knew he was crazy, and they knew he was always on the damn phone.” [Washington Post, 12/18/2007] Vincent Cannistraro, former head of the CIA’s Counter Terrorism Center, says of Zubaida shortly after Zubaida’s capture, “He was the guy that had the direct contact with prominent al-Qaeda cell leaders abroad, and he knew where they all were. He would have been the guy co-ordinating new attacks.” [Observer, 4/7/2002]

Entity Tags: Dan Coleman, Vincent Cannistraro, Abu Zubaida

Timeline Tags: Complete 911 Timeline

The CIA produces a report entitled “A Reference Guide to Terrorist Passports.” The report discusses a suspicious indicator of terrorist affiliation that was contained in the passports of at least three of the 9/11 hijackers, possibly more. The indicator was placed there deliberately by the Saudi government, which used such indicators to track suspected radicals (see November 2, 2007). However, this report is classified and is not disseminated, meaning that if a radical were to arrive at a US port with a passport indicating he was a terrorist, an immigration official would be unable to recognize the indicator and would admit him. Over a year after this report is completed, the 9/11 Commission will show a passport bearing this indicator to one of the immigration officials who admitted 9/11 hijacker Khalid Almihdhar to the US, but she will still be unable to recognize the indicator. [9/11 Commission, 8/21/2004, pp. 25, 27, 41 pdf file]

Entity Tags: Central Intelligence Agency, 9/11 Commission

Timeline Tags: Complete 911 Timeline

A sample page from Mark Klein’s AT&T documentation.A sample page from Mark Klein’s AT&T documentation. [Source: Mark Klein / Seattle Times]Senior AT&T technician Mark Klein (see July 7, 2009), gravely concerned by the National Security Agency (NSA) spying operation going on in AT&T’s San Francisco facility (see October 2003) and now in possession of documents which prove the nature and scope of the telecommunications surveillance activities (see Fall 2003 and Late 2003), writes a memo summarizing his findings and conclusions. He appends eight pages of the unclassified documents he has in his possession, along with two photographs and some material from the Internet which documents the sophisticated surveillance equipment being used to gather data from AT&T’s electronic transmissions. The NSA and AT&T were, he later says, “basically sweeping up, vacuum-cleaning the Internet through all the data, sweeping it all into this secret room.… It’s the sort of thing that very intrusive, repressive governments would do, finding out about everybody’s personal data without a warrant. I knew right away that this was illegal and unconstitutional, and yet they were doing it.… I think I’m looking at something Orwellian. It’s a government, many-tentacled operation to gather daily information on what everybody in the country is doing. Your daily transactions on the Internet can be monitored with this kind of system, not just your Web surfing. All kinds of business that people do on the Internet these days—your bank transactions, your email, everything—it sort of opens a window into your entire private life, and that’s why I thought of the term ‘Orwellian.’ As you know, in [George] Orwell’s story [1984], they have cameras in your house, watching you. Well, this is the next best thing.… So I was not only angry about it; I was also scared, because I knew this authorization came from very high up—not only high up in AT&T, but high up in the government. So I was in a bit of a quandary as to what to do about it, but I thought this should be halted.”
Gathering 'the Entire Data Stream' - In his memo, Klein concludes that the NSA is using “splitter” equipment to copy “the entire data stream [emphasis in the original] and sent it to the [NSA’s] secret room for further analysis.” Klein writes that the splitters actually “split off a percentage of the light signal [from the fiber optic circuits] so it can be examined. This is the purpose of the special cabinet… circuits are connected into it, the light signal is split into two signals, one of which is diverted to the ‘secret room.’ The cabinet is totally unnecessary for the circuit to perform—in fact, it introduces problems since the signal level is reduced by the splitter—its only purpose is to enable a third party [the NSA] to examine the data flowing between sender and recipient on the Internet.” (Emphasis in the original.) In his book, Klein will explain that “each separate signal,” after being split, “contains all the information, nothing is lost, so in effect the entire data stream has been copied.” He will continue: “What screams out at you when examining this physical arrangement is that the NSA was vacuuming up everything flowing in the Internet stream: email, Web browsing, voice-over-Internet phone calls, pictures, streaming video, you name it. The splitter has no intelligence at all, it just makes a blind copy.” Klein later explains to a reporter: “The signals that go across fiber optics are laser light signals. It’s light basically that runs through a fiber optic, which is a clear glass fiber, and it has to be at a certain level for the routers to see the light and interpret the data correctly. If the light gets too low, just as if you get a weak flashlight with bad batteries, at a certain point it doesn’t work. If the light level drops too low, the router starts dropping bits and getting errors, and eventually you get loss of signal, and it just doesn’t work at all.… The effect of the splitter is to reduce the strength of the signal, and that may or may not cause a problem, depending on how much the signal is reduced.” A telecommunications company would not, as a rule, use such a splitter on its backbone Internet traffic because of the risk of degraded signal quality. “You want to have as few connections on your main data lines as possible,” Klein will say, “because each connection reduces the signal strength, and a splitter is a connection, and if you can avoid that, all the better.”
Inherently Illegal - Klein will explain that there is no way these activities are legal: “There could not possibly be a legal warrant for this, since according to the Fourth Amendment, warrants have to be specific, ‘particularly describing the place to be searched and the persons or things to be seized.’ It was also a blatant violation of the 1978 Foreign Intelligence Surveillance Act [FISA—see 1978], which calls for specific warrants as required by the Fourth Amendment. This was a massive blind copying of the communications of millions of people, foreign and domestic, randomly mixed together. From a legal standpoint, it does not matter what they claim to throw away later in their secret rooms, the violation has already occurred at the splitter.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 37, 119-133]
The Narus STA 6400 - Klein discusses one key piece of equipment in the NSA’s secret room, the Narus STA 6400 (see Late 2003). Narus is a firm that routinely sells its equipment not only to telecom firms such as AT&T, “but also to police, military, and intelligence officials” (see November 13-14, 2003). Quoting an April 2000 article in Telecommunications magazine, Klein writes that the STA 6400 is a group of signal “traffic analyzers that collect network and customer usage information in real time directly from the message.… These analyzers sit on the message pipe into the ISP [Internet Service Provider] cloud rather than tap into each router or ISP device.” Klein quotes a 1999 Narus press release that says its Semantic Traffic Analysis (STA) technology “captures comprehensive customer usage data… and transforms it into actionable information… [it] is the only technology that provides complete visibility for all Internet applications.” The Narus hardware allows the NSA “to look at the content of every data packet going by, not just the addressing information,” Klein will later write.
A 'Dream Machine for a Police State' - Klein later writes of the Narus STA 6400: “It is the dream machine of a police state, one that even George Orwell could not imagine. Not only does it enable the government to see what millions of people are saying and doing every day, but it can build up a database which reveals the connections among social groups—who’s calling and emailing whom. Such a device can easily be turned against all dissident protest groups, and even the Democratic and Republican parties, with devastating effect. And it’s in the hands of the executive power, in total secrecy.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; Klein, 2009, pp. 37-40] In support of the memo and an ensuing lawsuit against AT&T (see January 31, 2006), Klein will later write: “Despite what we are hearing, and considering the public track record of this administration, I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or is otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” [Wired News, 4/7/2006]

Entity Tags: National Security Agency, Narus, Mark Klein, Foreign Intelligence Surveillance Act, AT&T

Timeline Tags: Civil Liberties

Jonathan Alter.Jonathan Alter. [Source: Publicity photo via Greater Talent Network]Reporter and political pundit Jonathan Alter writes that President Bush’s attempt to kill the New York Times domestic wiretapping story (see December 15, 2005 and December 6, 2005), which the Times delayed for over a year at the White House’s request, is not an attempt to protect national security, as Bush will say in his response to the article (see December 17, 2005), but “because he knew that it would reveal him as a law-breaker.” Alter continues, “He insists he had ‘legal authority derived from the Constitution and Congressional resolution authorizing force.’ But the Constitution explicitly requires the president to obey the law. And the post-9/11 congressional resolution authorizing ‘all necessary force’ in fighting terrorism was made in clear reference to military intervention. It did not scrap the Constitution and allow the president to do whatever he pleased in any area in the name of fighting terrorism.” Alter is puzzled that Bush felt the need for the program when the 1978 Foreign Intelligence Surveillance Act (see 1978) “allows the government to eavesdrop on its own, then retroactively justify it to the court, essentially obtaining a warrant after the fact.” Alter says that only four of “tens of thousands” of FISA requests have ever been rejected, and, “There was no indication the existing system was slow—as the president seemed to claim in his press conference—or in any way required extra-constitutional action.” He concludes: “[Bush] knew publication would cause him great embarrassment and trouble for the rest of his presidency. It was for that reason—and less out of genuine concern about national security—that George W. Bush tried so hard to kill the New York Times story. …We’re seeing clearly now that Bush thought 9/11 gave him license to act like a dictator, or in his own mind, no doubt, like Abraham Lincoln during the Civil War.” [Newsweek, 12/21/2005]

Entity Tags: Abraham Lincoln, Bush administration (43), National Security Agency, New York Times, George W. Bush, Foreign Intelligence Surveillance Court, Foreign Intelligence Surveillance Act, Jonathan Alter

Timeline Tags: Civil Liberties

Chart showing NSA surveillance network.Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” [New York Times, 12/24/2005]

Entity Tags: US Department of Defense, US Department of Justice, Total Information Awareness, New York Times, US Department of Homeland Security, Computer Assisted Passenger Prescreening System, Bush administration (43), Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, George W. Bush, National Security Agency, Phil Karn

Timeline Tags: Civil Liberties

In a public speech, former National Security Agency chief Michael Hayden claims that everything the NSA does is with authorization from the White House, specifically the warrantless wiretapping program that spies on US citizens (see Early 2002). “I didn’t craft the authorization,” he says. “I am responding to a lawful order.” Hayden claims that while the NSA continues to use court warrants from the Foreign Intelligence Surveillance Court (FISC), technological advances and terrorist threats have made the law that created and supports FISC, the Foreign Intelligence Surveillance Act of 1978 (see 1978), obsolete. Therefore, the NSA has carried out domestic surveillance operations with or without FISC warrants. Hayden says the warrantless surveillance operations are “operationally more relevant, operationally more effective” than anything FISA can handle. Hayden repeatedly denies, in the face of reams of evidence collected by journalists and others to the contrary, that the NSA is spying on domestic antiwar groups and religious organizations like the Quakers who publicly advocate nonviolence and peace. [Michael Hayden, 1/23/2006]

Entity Tags: Foreign Intelligence Surveillance Court, Al-Qaeda, Foreign Intelligence Surveillance Act, Religious Society of Friends (Quakers), Terrorist Surveillance Program, National Press Club, Bush administration (43), National Security Agency, Michael Hayden, George W. Bush

Timeline Tags: Civil Liberties

In his State of the Union address, President Bush insists that his authority to wiretap Americans’ phones without warrants (see December 15, 2005 and December 18, 2005) is validated by previous administrations’ actions, saying that “previous presidents have used the same constitutional authority I have.” He fails to note that those presidents authorized warrantless wiretaps before court orders were required for such actions (see June 19, 1972 and 1973). Since the Foreign Intelligence Surveillance Act passed (see 1978), no president except Bush has ever defied the law. Law professor David Cole calls Bush’s assertion of authority “either intentionally misleading or downright false.” Fellow law professor Richard Epstein predicts that the Supreme Court will strike down any such assertions, if it ever addresses the issue. “I find every bit of this legal argument disingenuous,” he says. Even many conservatives refuse to support Bush, with columnist George Will calling his arguments “risible” and a “monarchical doctrine” that is “refuted by the plain text of the Constitution.” David Keene, the chairman of the American Conservative Union, says the legal powers claimed by Bush and his officials can be used to justify anything: “Their argument is extremely dangerous.… The American system was set up on the assumption that you can’t rely on the good will of people with power.” Conservative activist Grover Norquist says flatly, “There is no excuse for violating the rule of law.” And former Justice Department official Bruce Fein says Bush and his officials have “a view that would cause the Founding Fathers to weep. The real conservatives are the ones who treasure the original understanding of the Constitution, and clearly this is inconsistent with the separation of powers.” Even former George H. W. Bush official Brent Scowcroft says that Bush’s interpretation of the Constitution is “fundamentally in error.” [Savage, 2007, pp. 203-204]

Entity Tags: David D. Cole, Brent Scowcroft, American Conservative Union, Bruce Fein, Richard Epstein, Grover Norquist, Foreign Intelligence Surveillance Act, David Keene, George Will, George W. Bush

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group and a reporter to expose the collusion of AT&T and the National Security Agency in pushing the government’s illegal surveillance program (see Early January 2006 and January 23, 2006 and After), contacts the office of Senator Dianne Feinstein (D-CA) at the advice of Electronic Frontier Foundation lawyer Kevin Bankston. Klein talks to Feinstein’s chief attorney in Washington, DC, Steven Cash. Klein will later write: “I instinctively recoiled at the thought of trying to approach her as my memory of her record told me she was no friend of civil liberties, though she plays one on TV. My instinct was not wrong.” After an initial discussion with Cash, Klein emails him his packet of documentation (see December 31, 2005). On the afternoon of February 3, Cash calls Klein and says he is very interested in his story, though Feinstein’s staff rates the probability of the NSA performing illegal acts at somewhere around “50-50,” according to Klein. Cash promises to get back in touch with Klein on February 6, but fails to do so. Neither Klein nor his attorneys (see Early January 2006) are able to talk to anyone on Feinstein’s staff from here on. Klein later writes: “The silent message was unmistakable: the senator did not want to sully her political skirts by having contact with a whistleblower. And this was a foretaste of her behavior and voting for the next two and a half years. At every turn, she was there pushing for immunity for the telecom companies in the Senate Intelligence and Judiciary Committees; peddling her toothless restatement of the ‘exclusive means’ clause of FISA [the Foreign Intelligence Surveillance Act—see 1978] as a substitute for any confrontation with the president over ongoing illegal NSA spying; ushering former NSA Director Michael Hayden through his nomination for CIA director; and backing Michael Mukasey as a clone replacement for the resigning Attorney General [Alberto] Gonzales. Moreover, this ultimately turned out to be the attitude of virtually the entire Democratic Party leadership, not to mention the Republicans.” Klein will explain that FISA’s “exclusive means” clause states that FISA should be the “exclusive means” for the federal government to conduct surveillance. Congress’s duty under the law was, Klein will state, to enforce the law against President Bush, “who openly flouted the law.” Instead, Klein will claim, Feinstein uses the “exclusive means” clause to protect the Bush administration and the telecom firms. [Klein, 2009, pp. 57-60]

Entity Tags: Electronic Frontier Foundation, AT&T, Dianne Feinstein, Mark Klein, National Security Agency, Steven Cash, Kevin Bankston

Timeline Tags: Civil Liberties

The Al Haramain Islamic Foundation, a now-defunct Saudi Arabian charitable organization that once operated in Oregon, sues the Bush administration [Associated Press, 2/28/2006] over what it calls illegal surveillance of its telephone and e-mail communications by the National Security Agency, the so-called Terrorist Surveillance Program. The lawsuit may provide the first direct evidence of US residents and citizens being spied upon by the Bush administration’s secret eavesdropping program, according to the lawsuit (see December 15, 2005). According to a source familiar with the case, the NSA monitored telephone conversations between Al Haramain’s director, then in Saudi Arabia, and two US citizens working as lawyers for the organization and operating out of Washington, DC. The lawsuit alleges that the NSA violated the Foreign Intelligence Surveillance Act (see 1978), the US citizens’ Fourth Amendment rights, and the attorney-client privilege. FISA experts say that while they are unfamiliar with the specifics of this lawsuit, they question whether a FISA judge would have allowed surveillance of conversations between US lawyers and their client under the circumstances described in the lawsuit. Other lawsuits have been filed against the Bush administration over suspicions of illegal government wiretapping, but this is the first lawsuit to present classified government documents as evidence to support its contentions. The lawsuit alleges that the NSA illegally intercepted communications between Al Haramain officer Suliman al-Buthe in Saudi Arabia, and its lawyers Wendell Belew and Asim Ghafoor in Washington. One of its most effective pieces of evidence is a document accidentally turned over to the group by the Treasury Department, dated May 24, 2004, that shows the NSA did indeed monitor conversations between Al Haramain officials and lawyers. When Al Haramain officials received the document in late May, 2004, they gave a copy to the Washington Post, whose editors and lawyers decided, under threat of government prosecution, to return the document to the government rather than report on it (see Late May, 2004). [Washington Post, 3/2/2006; Washington Post, 3/3/2006] Lawyer Thomas Nelson, who represents Al Haramain and Belew, later recalls he didn’t realize what the organization had until he read the New York Times’s December 2005 story of the NSA’s secret wiretapping program (see December 15, 2005). “I got up in the morning and read the story, and I thought, ‘My god, we had a log of a wiretap and it may or may not have been the NSA and on further reflection it was NSA,’” Nelson will recall. “So we decided to file a lawsuit.” Nelson and other lawyers were able to retrieve one of the remaining copies of the document, most likely from Saudi Arabia, and turned it over to the court as part of their lawsuit. [Wired News, 3/5/2007]
Al Haramain Designated a Terrorist Organization - In February 2004, the Treasury Department froze the organization’s US financial assets pending an investigation, and in September 2004, designated it a terrorist organization, citing ties to al-Qaeda and alleging financial ties between Al Haramain and the 1998 bombings of two US embassies in Africa (see 10:35-10:39 a.m., August 7, 1998). The organization was disbanded by the Saudi Arabian government in June 2004 and folded into an “umbrella” private Saudi charitable organization, the Saudi National Commission for Relief and Charity Work Abroad (see March 2002-September 2004). In February 2005, the organization was indicted for conspiring to funnel money to Islamist fighters in Chechnya. The charges were later dropped. [US Treasury Department, 9/9/2004; Washington Post, 3/2/2006] The United Nations has banned the organization, saying it has ties to the Taliban. [United Nations, 7/27/2007]
Challenging Designation - In its lawsuit, Al Haramain is also demanding that its designation as a terrorist organization be reversed. It says it can prove that its financial support for Chechen Muslims was entirely humanitarian, with no connections to terrorism or violence, and that the Treasury Department has never provided any evidence for its claims that Al Haramain is linked to al-Qaeda or has funded terrorist activities. [Associated Press, 8/6/2007] The lawsuit also asks for $1 million in damages, and the unfreezing of Al Haramain’s US assets. [Associated Press, 8/5/2007]
Administration Seeks to Have Lawsuit Dismissed - The Bush administration will seek to have the lawsuit thrown out on grounds of national security and executive privilege (see Late 2006-July 2007, Mid-2007).

Entity Tags: Wendell Belew, Suliman al-Buthe, Taliban, Washington Post, United Nations, Saudi National Commission for Relief and Charity Work Abroad, US Department of the Treasury, National Security Agency, Thomas Nelson, Foreign Intelligence Surveillance Act, Al Haramain Islamic Foundation, Al-Qaeda, Al Haramain Islamic Foundation (Oregon branch), Foreign Intelligence Surveillance Court, Asim Ghafoor, Bush administration (43)

Timeline Tags: Civil Liberties

USA Today headline.USA Today headline. [Source: CBS News]USA Today reports that “[t]he National Security Agency (NSA) has been secretly collecting the phone call records of tens of millions of Americans, using data provided by the nation’s three biggest telecommunications providers, AT&T, Verizon, and BellSouth,” according to “people with direct knowledge of the arrangement.” None of the sources would allow USA Today to identify them by name, job, or affiliation. The USA Today story claims that the NSA program “does not involve the NSA listening to or recording conversations,” but does use “the data to analyze calling patterns in an effort to detect terrorist activity,” according to their sources. One source says that the NSA program is compiling “the largest database ever assembled in the world,” with the goal of creating “a database of every call ever made” within US borders. President Bush has said that the NSA program is focused exclusively on international calls, and for the calls to be recorded, “one end of the communication must be outside the United States.” However, this is now shown not to be the case (see January 16, 2004). A US intelligence official says that the NSA program is not recording the actual phone calls themselves, but is collecting what he calls “external” data about the communications to allow the agency to emply “social network analysis” for insight into how terrorist networks are connected with one another. Another large telecommunications company, Qwest, has refused to help the NSA eavesdrop on customer calls (see February 2001, February 2001 and Beyond, and February 27, 2001). USA Today’s sources say that the NSA eavesdropping program began after the 9/11 attacks, a claim that is not bolstered by the facts (see 1997, February 27, 2000, February 27, 2000, December 2000, February 2001, February 2001, February 2001 and Beyond, February 2001, Spring 2001, April 2001, April 4, 2001, July 2001, Before September 11, 2001, and Early 2002). The sources say that the three companies agreed to provide “call-detail records,” lists of their customers’ calling histories, and updates, which would allow the agency to track citizens’ calling habits. In return, the sources say, the NSA offered to pay the firms for their cooperation. After the three firms agreed to help the agency, USA Today writes, “the NSA’s domestic program began in earnest” (see After September 11, 2001, After September 11, 2001, October 2001, September 2002, and Spring 2004). NSA spokesman Don Weber says the agency is operating strictly “within the law,” but otherwise refuses to comment. Former US prosecutor Paul Butler says that the Foreign Intelligence Surveillance Act (FISA), which governs surveillance operations by US intelligence agencies, “does not prohibit the government from doing data mining” (see 1978). White House press spokesman Dana Perino says, “There is no domestic surveillance without court approval,” and all surveillance activities undertaken by government agencies “are lawful, necessary, and required for the pursuit of al-Qaeda and affiliated terrorists.” All government-sponsored intelligence activities “are carefully reviewed and monitored,” she adds, and says that “all appropriate members of Congress have been briefed on the intelligence efforts of the United States” (see October 11, 2001 and October 25, 2001 and November 14, 2001). Don Weber, a senior spokesman for the NSA, refuses to discuss the agency’s operations, saying: “Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues; therefore, we have no information to provide. However, it is important to note that NSA takes its legal responsibilities seriously and operates within the law.” All three firms released similar comments saying that they would not discuss “matters of national security,” but were complying with the law in their alleged cooperation with the NSA. The Electronic Frontier Foundation (EFF) is suing AT&T for what it calls its complicity in the NSA’s “illegal” domestic surveillance program (see January 31, 2006). [USA Today, 5/11/2006]

Entity Tags: Verizon Communications, USA Today, Qwest, Paul Butler, Foreign Intelligence Surveillance Act, Jane Harman, AT&T, BellSouth, National Security Agency, Dana Perino, Don Weber

Timeline Tags: Civil Liberties

Civil liberties lawyer and columnist Glenn Greenwald states that the recent Supreme Court ruling in Hamdan v. Rumsfeld (see June 30, 2006), finding that the Bush administration’s Guantanamo Bay military commissions violate both federal law and the Geneva Conventions, also proves that the NSA’s warrantless wiretapping program is illegal (see December 15, 2005). “To arrive at its decision,” Greenwald writes, “the Court emphatically rejected the administration’s radical theories of executive power, and in doing so, rendered entirely discredited the administration’s only defenses for eavesdropping on Americans without the warrants required by law. Actual compliance with the Court’s ruling, then, compels the administration to immediately cease eavesdropping on Americans in violation of FISA,” the Foreign Intelligence Surveillance Act (see 1978). “If the administration continues these programs now, then they are openly defying the Court and the law with a brazeness and contempt for the rule of law that would be unprecedented even for them.” Greenwald notes that FISA prohibits any surveillance of American citizens without judicial approval and oversight. The Bush administration has already admitted to conducting just such surveillance (see December 17, 2005 and December 21, 2005), and President Bush has even stated his intention to expand the program (see December 19, 2005). The Justice Department and a number of administration officials have attempted to claim the NSA surveillance program is both legal and necessary (see December 19, 2005, December 19, 2005, December 21-22, 2005, and Early 2006); Greenwald writes that the Hamdan decision “decimated” those claims, a conclusion shared by a number of legal experts (see January 9, 2006). Moreover, he writes, there is no remaining excuse for Democratic senators not to endorse Senator Russ Feingold’s resolution to censure Bush for violating FISA (see March 12, 2006 and After). The argument advanced by, among others, Senator Barack Obama (D-IL), that Bush believed he was complying with the law because his lawyers told him he was in compliance, is no longer relevant in light of Hamdan, Greenwald argues. “[T]here is no longer any good faith basis left for violating FISA. Ongoing warrantless eavesdropping can only be ordered by the president with a deliberate intent to break the law. After Hamdan, there are no more excuses left for the president to violate FISA, and there is therefore no more excuse left for Democratic senators to refuse to take a stand with Sen. Feingold against the administration’s lawbreaking.” Bush has two clear choices, Greenwald writes: either to comply with FISA or openly defy the Supreme Court. “If we are a country that continues to operate under the rule of law, compliance with the Supreme Court’s ruling compels the immediate cessation of the president’s warrantless eavesdropping program, as well as what are undoubtedly the other, still-secret programs prohibited by law but which have been justified by these same now-rejected theories of unlimited executive power. Put simply, after Hamdan, there are no more excuses left for the president’s refusal to comply with the law.” [Crooks and Liars, 7/8/2006]

Entity Tags: Geneva Conventions, Barack Obama, Bush administration (43), Foreign Intelligence Surveillance Act, Glenn Greenwald, US Department of Justice, US Supreme Court, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Federal district court judge Anna Diggs Taylor rules that the NSA’s warrantless wiretapping program (see Early 2002) is unconstitutional and orders it ended. She amends her ruling to allow the program to continue while the Justice Department appeals her decision. The decision is a result of a lawsuit filed by the American Civil Liberties Union (ACLU) and other civil liberties groups. Taylor rules that the NSA program violates US citizens’ rights to privacy and free speech, the Constitutional separation of powers among the three branches of government, and the Foreign Intelligence Surveillance Act (see 1978). Taylor writes: “It was never the intent of the framers to give the president such unfettered control, particularly where his actions blatantly disregard the parameters clearly enumerated in the Bill of Rights. There are no hereditary Kings in America and no powers not created by the Constitution. So all ‘inherent powers’ must derive from that Constitution.” [Verdict in ACLU et al v. NSA et al, 8/17/2006 pdf file; Washington Post, 8/18/2006] The program “violates the separation of powers doctrine, the Administrative Procedures Act, the First and Fourth amendments to the United States Constitution, the FISA and Title III,” Taylor writes, and adds, “[T]he president of the United States… has undisputedly violated the Fourth in failing to procure judicial orders.” [CNN, 8/17/2006]
Judge Lets One Portion Stand - Taylor rejects one part of the lawsuit that seeks information about the NSA’s data mining program (see October 2001), accepting the government’s argument that to allow that portion of the case to proceed would reveal state secrets (see March 9, 1953). Other lawsuits challenging the program are still pending. Some legal scholars regard Taylor’s decision as poorly reasoned: national security law specialist Bobby Chesney says: “Regardless of what your position is on the merits of the issue, there’s no question that it’s a poorly reasoned decision. The opinion kind of reads like an outline of possible grounds to strike down the program, without analysis to fill it in.” The White House and its Republican supporters quickly attack Taylor, who was appointed to the bench by then-President Jimmy Carter, as a “liberal judge” who is trying to advance the agenda of Congressional Democrats and “weaken national security.” For instance, Senator Mike DeWine (R-OH) says that halting the program “would hamper our ability to foil terrorist plots.” [Washington Post, 8/18/2006]
Democrats, Civil Libertarians Celebrate Ruling - But Democrats defend the ruling. For instance, Senator John Kerry (D-MA) says the ruling provides a much-needed check on the unfettered power of the Bush White House. “[N]o one is above the law,” says Kerry. [Washington Post, 8/18/2006] Lawyers for some of the other cases against the NSA and the Bush administration laud the decision as giving them vital legal backing for their own court proceedings. “We now have a ruling on the books that upholds what we’ve been saying all along: that this wiretapping program violates the Constitution,” says Kevin Bankston, who represents the Electronic Frontier Foundation (EFF) in its class-action case against AT&T for its role in the NSA’s surveillance program (see January 31, 2006). [Washington Post, 8/18/2006] Legal expert and liberal commentator Glenn Greenwald writes that Taylor’s ruling “does not, of course, prohibit eavesdropping on terrorists; it merely prohibits illegal eavesdropping in violation of FISA. Thus, even under the court’s order, the Bush administration is free to continue to do all the eavesdropping on terrorists it wants to do. It just has to cease doing so using its own secretive parameters, and instead do so with the oversight of the FISA court—just as all administrations have done since 1978, just as the law requires, and just as it did very recently when using surveillance with regard to the [British] terror plot. Eavesdropping on terrorists can continue in full force. But it must comply with the law.” Greenwald writes: “[T]he political significance of this decision cannot be denied. The first federal court ever to rule on the administration’s NSA program has ruled that it violates the constitutional rights of Americans in several respects, and that it violates criminal law. And in so holding, the court eloquently and powerfully rejected the Bush administration’s claims of unchecked executive power in the area of national security.” [Salon, 8/17/2006]
White House Refuses to Comply - The Bush administration refuses to comply with Taylor’s ruling, asserting that the program is indeed legal and a “vital tool” in the “war on terrorism.” It will quickly file an appeal, and law professors on both sides of the issue predict that Taylor’s ruling will be overturned. [Savage, 2007, pp. 206]
Lawsuit Ends with White House 'Compromise' - The lawsuit will end when the White House announces a “compromise” between the wiretapping program and FISC (see January 17, 2007).

Entity Tags: John Kerry, Kevin Bankston, Mike DeWine, US Department of Justice, Peter Hoekstra, Glenn Greenwald, National Security Agency, George W. Bush, James Earl “Jimmy” Carter, Jr., Foreign Intelligence Surveillance Act, Alberto R. Gonzales, American Civil Liberties Union, AT&T, Anna Diggs Taylor, Bush administration (43), Bobby Chesney, Foreign Intelligence Surveillance Court, Electronic Frontier Foundation

Timeline Tags: Civil Liberties

The Protect America Act (PAA) (see August 5, 2007), an amendment to the Foreign Intelligence Surveillance Act (FISA—see 1978), is introduced in Congress. With limited debate and no committee hearings, it passes both houses with substantial majorities. [US Senate, 8/5/2007; Boston Globe, 8/6/2007; House Judiciary Committee, 9/18/2007 pdf file] Congressional Democrats quickly capitulate on the bill, submitting to what the Washington Post later calls “a high-pressure campaign by the White House to change the nation’s wiretap law, in which the administration capitalized on Democrats’ fears of being branded weak on terrorism and on Congress’s desire to act on the issue before its August recess.” [Washington Post, 8/5/2007] Indeed, one Republican senator, Trent Lott, warns during the initial debate that lawmakers should pass the law quickly and get out of Washington before they could be killed in a terrorist attack (see August 2, 2007). McConnell tells the Senate, “Al-Qaeda is not going on vacation this month.” And Democrat Joseph Lieberman (D-CT), a supporter of the bill, told his colleagues: “We’re at war. The enemy wants to attack us. This is not the time to strive for legislative perfection.” [Slate, 8/6/2007]
Some Democrats Unhappy - One Democratic lawmaker responds angrily: “There are a lot of people who felt we had to pass something. It was tantamount to being railroaded.” Many House Democrats feel betrayed by the White House; Democratic leaders had reached what they believed was a deal on the bill with the Director of National Intelligence, Mike McConnell, only to have the White House throw out the deal and present a new list of conditions at the last minute. Both McConnell and the White House deny that any such deal was reached. Jan Schakowsky (D-IL), a member of the House Intelligence Committee, says, “I think the White House didn’t want to take ‘yes’ for an answer from the Democrats.” Representative Jerrold Nadler (R-NY) says lawmakers were “stampeded by fear-mongering and deception” into voting for the bill. Fellow House Democrat Jane Harman (D-CA) warns that the PAA will lead to “potential unprecedented abuse of innocent Americans’ privacy.” [Washington Post, 8/5/2007] The ACLU’s Caroline Fredrickson has a succinct explanation of why the Democrats folded so quickly: “Whenever the president says the word terrorism, they roll over and play dead.” [Slate, 8/6/2007]
AT&T Whistleblower: Democratic Leadership Colluded in Passing PAA - AT&T whistleblower Mark Klein (see July 7, 2009 and December 15-31, 2005) will later write that the Democrats played a far more active role in getting the PAA passed than others acknowledge. He will quote a 2008 column by liberal civil liberties advocate Glenn Greenwald, who will write: “[I]n 2006, when the Congress was controlled by [then-Senate Majority Leader] Bill Frist [R-TN] and [then-House Speaker] Denny Hastert [R-IL], the administration tried to get a bill passed legalizing warrantless eavesdropping and telecom amnesty, but was unable. They had to wait until the Congress was controlled by [House Majority Leader] Steny Hoyer [D-MD], [House Speaker] Nancy Pelosi [D-CA], and [Senate Majority Leader] Harry Reid [D-NV] to accomplish that.” According to Klein, once the Democrats took control of Congress in January 2007, they engaged in “pure theater, posturing as opponents of the illegal NSA program while seeking a way to protect the president.” The few principled Democrats to actively oppose the legislation, such as Senator Christopher Dodd (D-CT), were, Klein will write, “hamstrung by their own leadership.” The PAA passage was accompanied by refusals from the Democratic leaders of “the relevant Intelligence and Judiciary Committees, which were now led by Democrats such as [John D.] Rockefeller, [Dianne] Feinstein (see February 1-6, 2006), and [Patrick] Leahy in the Senate, and John Conyers and Sylvestre Reyes in the House,” who “quickly decided not to launch any serious investigations into the NSA spying.” Klein will later add that at the time of the PAA passage, he was unaware of how thoroughly Democrats had been briefed on the NSA program (see October 1, 2001, October 11, 2001, October 25, 2001 and November 14, 2001, July 17, 2003, and March 10, 2004), “and thus were in on the secret but took no action to stop it.” [Salon, 6/19/2008; Klein, 2009, pp. 86-87]

Entity Tags: Trent Lott, Mike McConnell, Protect America Act, Joseph Lieberman, Mitch McConnell, Jane Harman, Jerrold Nadler, Caroline Fredrickson, Bush administration (43), Jan Schakowsky, House Intelligence Committee

Timeline Tags: Civil Liberties

Mitch McConnell.Mitch McConnell. [Source: US Senate]President Bush signs the controversial Protect America Act (PAA) into law. The bill, which drastically modifies the Foreign Intelligence Surveillance Act (FISA) of 1978 (see 1978), was sponsored by two Senate Republicans, Mitch McConnell (R-KY) and Christopher Bond (R-MO), but written by the Bush administration’s intelligence advisers. [US Senate, 8/5/2007; Washington Post, 8/5/2007] It passed both houses of Congress with little debate and no hearings (see August 1-4, 2007). “This more or less legalizes the NSA [domestic surveillance] program,” says Kate Martin, director of the Center for National Security Studies. [New York Times, 8/6/2007] Slate’s Patrick Radden Keefe adds ominously, “The Foreign Intelligence Surveillance Act is now dead, and it’s never coming back.” [Slate, 8/6/2007] The PAA expires in six months, the only real concession Congressional Democrats were able to secure. Though the Bush administration and its allies in Congress insist that the law gives the government “the essential tools it needs” to conduct necessary surveillance of foreign-based terrorists while protecting Americans’ civil liberties, many Democrats and civil liberties organizations say the bill allows the government to wiretap US residents in communication with overseas parties without judiciary or Congressional oversight. Bush calls the bill “a temporary, narrowly focused statute to deal with the most immediate shortcomings in the law” that needs to be expanded and made permanent by subsequent legislation. The administration says that the lack of judiciary oversight in the new law will be adequately covered by “internal bureaucratic controls” at the National Security Agency. [Associated Press, 8/5/2007; Washington Post, 8/5/2007]
Reining in FISA - The PAA allows FISA to return “to its original focus on protecting the rights of Americans, while not acting as an obstacle to conducting foreign intelligence surveillance on foreign targets located overseas.” Before the PAA, the White House says, FISA created unnecessary obstacles in allowing US intelligence to “gain real-time information about the intent of our enemies overseas,” and “diverted scarce resources that would be better spent safeguarding the civil liberties of people in the United States, not foreign terrorists who wish to do us harm.” The PAA no longer requires the government to obtain FISA warrants to monitor “foreign intelligence targets located in foreign countries” who are contacting, or being contacted by, US citizens inside US borders. FISA will continue to review the procedures used by US intelligence officials in monitoring US citizens and foreign contacts by having the attorney general inform the FISA Court of the procedures used by the intelligence community to determine surveillance targets are outside the United States.”
Allows Third Parties to Assist in Surveillance, Grants Immunity - The PAA also allows the director of national intelligence and the attorney general to secure the cooperation of “third parties,” particularly telecommunications firms and phone carriers, to “provide the information, facilities, and assistance necessary to conduct surveillance of foreign intelligence targets located overseas.” It provides these firms with immunity from any civil lawsuits engendered by such cooperation.
Short Term Legislation - The White House says that Congress must pass further legislation to give telecommunications firms permanent and retroactive immunity against civil lawsuits arising from their cooperation with the government’s domestic surveillance program. [White House, 8/6/2006]
Temporary Suspension of the Constitution? - Representative Rush Holt (D-NJ), a member of the House Intelligence Committee, says: “I’m not comfortable suspending the Constitution even temporarily. The countries we detest around the world are the ones that spy on their own people. Usually they say they do it for the sake of public safety and security.” [Washington Post, 8/5/2007]

Entity Tags: Christopher (“Kit”) Bond, National Security Agency, Foreign Intelligence Surveillance Act, George W. Bush, Foreign Intelligence Surveillance Court, Mitch McConnell, Al-Qaeda, Terrorist Surveillance Program, Kate Martin, Patrick Radden Keefe, Rush Holt, Protect America Act

Timeline Tags: Civil Liberties

Director of National Intelligence Michael McConnell says that the 9/11 hijackers could not be monitored in the US because they did not commit any crimes. He says in a speech: “[I]f Mohamed Atta had been in Pakistan and we were tracking him, some way to track him—he went to Turkey, went to Europe, got over to Canada, we’d track him as foreign intelligence target, and he crosses into the United States, he’s now a US person; he gets all of the rights and privileges that you get. He’s invisible to your intelligence community. As long as he doesn’t break the law, law enforcement can’t conduct surveillance because they don’t have a probable cause. Al-Qaeda recognized that and that is why 9/11 happened in my view.” [Director of National Intelligence, 1/17/2008 pdf file] The 9/11 hijackers committed various offenses for which they could have been arrested in the US, such as lying on visa application forms (see August 29, 2001), overstaying their visas (see January 18, 2001, May 20, 2001 and January 10, 2001), driving without a license (note: a warrant for Mohamed Atta’s arrest was even issued in the summer of 2001—see June 4, 2001), and having a known role in blowing up the USS Cole, thereby murdering 17 US servicemen (see Around October 12, 2000). The Foreign Intelligence Surveillance Act was also specifically designed so that the FBI and other agencies could monitor agents of foreign powers in the US even if they did not commit a crime (see 1978).

Entity Tags: Foreign Intelligence Surveillance Act, Federal Bureau of Investigation, Mike McConnell, Mohamed Atta, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

President Bush again demands that Congress reinstate the Protect America Act (PAA) (see August 5, 2007), with new provisions providing the nation’s telecommunications industry retroactive legal immunity from criminal and civil prosecution for possible crimes committed in the administration’s domestic wiretapping program (see May 12, 2006). Bush says that without such immunity, US telecom firms will be reluctant to help the administration spy on potential terrorists. The PAA is a central part of the legislative update of the 1978 Foreign Intelligence Surveillance Act (FISA) (see 1978) which mandates that any wiretaps must receive the approval of the FISA Court. Bush insists that he will veto an update to FISA without the immunity provisions, even as he asserts the country is at risk of further terrorist attacks without the FISA updates, and after letting the PAA lapse without signing an extension of the legislation into law. However, Bush blames Congress for not passing the FISA update with an immunity clause: “Congress’ failure to pass this legislation was irresponsible,” he says. “In other words, the House’s refusal to act is undermining our ability to get cooperation from private companies. And that undermines our efforts to protect us from terrorist attack.” He explains why the Democrats don’t want his bill: “House leaders are blocking this legislation, and the reason can be summed up in three words: class action lawsuits.” A spokesman for Congressional Democrats retorts: “They cannot have it both ways. If it is true that the expiration of the [surveillance law] has caused gaps in intelligence, then it was irresponsible for the president and Congressional Republicans to openly oppose an extension of the law.”
Democrats Put Trial Lawyers Before National Security? - Bush says: “The Senate bill would prevent plaintiffs’ attorneys from suing companies believed to have helped defend America after the 9/11 attacks. More than 40 of these lawsuits have been filed, seeking hundreds of billions of dollars in damages from these companies.… It is unfair and unjust to threaten these companies with financial ruin only because they are believed to have done the right thing and helped their country.” The lawsuits (see June 26, 2006) seek damages based upon violations of FISA, the Wiretap Act, the Communications Act, and the Stored Communications Act, among other laws. Bob Edgar of Common Cause says neither money nor punishment is the issue: “Innocent Americans who have had their rights violated by the telecoms deserve their day in court. If these companies did nothing wrong, then they have nothing to fear.” Bush is apparently attempting to refocus the issue as an attack on trial lawyers—traditionally a group supportive of Democrats—in saying: “Members of the House have a choice to make: They can empower the trial bar—or they can empower the intelligence community. They can help class action trial lawyers sue for billions of dollars—or they can help our intelligence officials protect millions of lives. They can put our national security in the hands of plaintiffs’ lawyers—or they can entrust it to the men and women of our government who work day and night to keep us safe.” House member John Conyers (D-MI) calls such characterizations “irresponsible” and “inaccurate.” [CBS News, 2/23/2008]

Entity Tags: Protect America Act, John Conyers, Foreign Intelligence Surveillance Court, Mike McConnell, George W. Bush, Michael Mukasey, Common Cause, Bob Edgar, Foreign Intelligence Surveillance Act, Dana Rohrbacher

Timeline Tags: Civil Liberties

A new investigation modeled on the Church Committee, which investigated government spying (see April, 1976) and led to the passage of the Foreign Intelligence Surveillance Act (FISA - see 1978) in the 1970s, is proposed. The proposal follows an amendment to wiretapping laws that immunizes telecommunications companies from prosecution for illegally co-operating with the NSA. A detailed seven-page memo is drafted outlining the proposed inquiry by a former senior member of the original Church Committee.
Congressional Investigative Body Proposed - The idea is to have Congress appoint an investigative body to discover the full extent of what the Bush White House did in the war on terror that may have been illegal and then to implement reforms aimed at preventing future abuses—and perhaps to bring accountability for wrongdoing by Bush officials. Key issues to investigate include:
bullet The NSA’s domestic surveillance activities;
bullet The CIA’s use of rendition and torture against terrorist suspects;
bullet The U.S. government’s use of military assets—including satellites, Pentagon intelligence agencies, and U2 surveillance planes—for a spying apparatus that could be used against people in the US; and
bullet The NSA’s use of databases and how its databases, such as the Main Core list of enemies, mesh with other government lists, such as the no-fly list. A deeper investigation should focus on how these lists feed on each other, as well as the government’s “inexorable trend towards treating everyone as a suspect,” says Barry Steinhardt, the director of the Program on Technology and Liberty for the American Civil Liberties Union (ACLU).
Proposers - The proposal is a product of talks between civil liberties advocates and aides to Democratic leaders in Congress. People consulted about the committee include aides to House Speaker Nancy Pelosi (D-CA) and Judiciary Committee chairman John Conyers (D-MI). The civil liberties organizations include the ACLU, the Center for Democracy and Technology, and Common Cause. However, some Democrats, such as Pelosi, Senate Intelligence Committee chairman John D. Rockefeller (D-WV), and former House Intelligence chairwoman Jane Harman (D-CA), approved the Bush administration’s operations and would be made to look bad by such investigation.
Investigating Bush, Clinton Administrations - In order that the inquiry not be called partisan, it is to have a scope going back beyond the start of the Bush administration to include the administrations of Bill Clinton, George H. W. Bush, and Ronald Reagan. The memo states that “[t]he rise of the ‘surveillance state’ driven by new technologies and the demands of counter-terrorism did not begin with this administration.” However, the author later says in interviews that the scope of abuse under George W. Bush would likely be an order of magnitude greater than under preceding presidents.
'Imagine What We Don't Know' - Some of the people involved in the discussions comment on the rationale. “If we know this much about torture, rendition, secret prisons, and warrantless wiretapping despite the administration’s attempts to stonewall, then imagine what we don’t know,” says a senior Democratic congressional aide who is familiar with the proposal. Steinhardt says: “You have to go back to the McCarthy era to find this level of abuse. Because the Bush administration has been so opaque, we don’t know [the extent of] what laws have been violated.” “It’s not just the ‘Terrorist Surveillance Program,’” says Gregory Nojeim from the Center for Democracy and Technology. “We need a broad investigation on the way all the moving parts fit together. It seems like we’re always looking at little chunks and missing the big picture.”
Effect on Presidential Race Unknown - It is unknown how the 2008 presidential race may affect whether the investigation ever begins, although some think that Democratic candidate Barack Obama (D-IL), said to favor open government, might be more cooperative with Congress than his Republican opponent John McCain (R-AZ). However, a participant in the discussions casts doubt on this: “It may be the last thing a new president would want to do.” [Salon, 7/23/2008]

Entity Tags: Nancy Pelosi, Gregory Nojeim, Center for Democracy and Technology, American Civil Liberties Union, Barry Steinhardt, Bush administration (43), Common Cause, Jane Harman

Timeline Tags: Civil Liberties, Inslaw and PROMIS

President Bush signs the FISA Amendments Act of 2008 (FAA), a revamping and expansion of the original Foreign Intelligence Surveillance Act (see 1978). The legislation passed the House by a sweeping 293 to 129 votes, with most Democratic Congressional leaders supporting it over the opposition of the more liberal and civil liberties-minded Democrats. Republicans were almost unanimously supportive of the bill. Though Democratic Senators Russell Feingold (D-WI) and Christopher Dodd (D-CT) managed to delay the bill’s passage through the Senate, their attempt to modify the bill was thwarted by a 66-32 margin. (Dodd credits AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) as one of the very few people to make the public aware of the illegal NSA wiretapping program, which the FISA amendment would protect. Without Klein, Dodd states, “this story might have remained secret for years and years, causing further erosion of our rights.”) Senator Barack Obama (D-IL), the party’s presumptive presidential nominee, gave his qualified support to the bill, stating: “Given the legitimate threats we face, providing effective intelligence collection tools with appropriate safeguards is too important to delay. So I support the compromise, but do so with a firm pledge that as president, I will carefully monitor the program.” Obama had opposed an earlier Senate version that would have given “blanket immunity” to the telecommunications companies for their participation in the illegal NSA wiretapping program (see December 15, 2005). House Speaker Nancy Pelosi (D-CA), who organized Democratic support for the bill in the House, said that she supported the bill primarily because it rejects Bush’s argument that a wartime chief executive has the “inherent authority” to conduct some surveillance activity he considers necessary to fight terrorism. It restores the legal notion that the FISA law is the exclusive rule on government spying, she said, and added: “This is a democracy. It is not a monarchy.” Feingold, however, said that the bill granted “retroactive immunity to the telecommunications companies that may have engaged in President Bush’s illegal wiretapping program.” The amendments restore many of the provisions of the expired Protect America Act (PAA—see August 5, 2007) that drastically modify the original FISA legislation and grant the government broad new surveillance powers. Like the PAA, the FAA grants “third parties” such as telecommunications firms immunity from prosecution for engaging in illegal surveillance of American citizens if they did so in partnership with government agencies such as the National Security Agency (NSA). [Washington Post, 6/20/2008; CNN, 6/26/2008; US Senate, 7/9/2008; White House, 7/10/2008; Klein, 2009, pp. 95-97] Senate Majority Leader Harry Reid (D-NV) actually refused to honor a “hold” placed on the bill by Dodd, a highly unusual move. Klein will later note that Reid has in the past always honored holds placed on legislation by Republicans, even if Democrats were strongly supportive of the legislation being “held.” Klein will write that Pelosi crafted a “showpiece” FISA bill without the immunity provisions, garnering much praise for her from civil liberties organizations; however, Pelosi’s colleague House Majority Leader Steny Hoyer (D-MD) had secretly worked with the White House to craft a bill that preserved immunity for telecoms, and on June 10, Pelosi “rammed” that bill through the House. The final bill actually requires the judiciary to dismiss lawsuits brought against telecom firms if those firms can produce evidence that they had worked in collusion with the NSA. Feingold later observes that the final bill is not a “compromise, it is a capitulation.” [Klein, 2009, pp. 101-103] Klein will write that Democrats and Republicans have worked together to “unw[ind] one of the main reforms of the post-Watergate era and accepted the outrageous criminal rationalizations of [President] Nixon himself.” Klein will quote Nixon as saying, “If the president does it, that means it’s not illegal” (see April 6, 1977), and will say that is “the essence of the FISA ‘compromise’” and turned Congress into the White House’s “rubber stamp.… It is the twisted judicial logic of a dictatorship.” [Klein, 2009, pp. 107]

Entity Tags: Nancy Pelosi, Foreign Intelligence Surveillance Act, FISA Amendments Act of 2008, Christopher Dodd, Barack Obama, George W. Bush, Mark Klein, Russell D. Feingold, Richard M. Nixon, Harry Reid, Steny Hoyer, National Security Agency, Protect America Act

Timeline Tags: Civil Liberties

Judge Vaughn Walker rules that “sufficient facts” exist to keep alive a lawsuit brought by the defunct Islamic charity Al Haramain, which alleges it was subjected to illegal, warrantless wiretapping by the US government (see February 28, 2006). The lawsuit centers on a Top Secret government document accidentally disclosed to plaintiffs’ lawyers Wendell Belew and Asim Ghafoo that allegedly proves the claim of illegal wiretapping; previous court rulings forced Belew and Ghafoo to return the document to the government and prohibited its use in the lawsuit. The lawsuit is widely viewed as a test case to decide in court whether the Bush administration abused its power by authorizing a secret domestic spying program (see Spring 2004 and December 15, 2005). Jon Eisenberg, the lawyer for Belew and Ghafoo, says it does not matter whether the case pertains to the Bush administration or the incoming Obama administration. “I don’t want President Obama to have that power any more than I do President Bush,” he says. Because the lawsuit contains sufficient evidence even without the Top Secret document, Walker rules, it can continue. “The plaintiffs have alleged sufficient facts to withstand the government’s motion to dismiss,” he writes. Therefore, he adds, the law demands that they be allowed to review the classified document, and others, to determine whether the lawyers were spied on illegally and whether Bush’s spy program was unlawful. “To be more specific, the court will review the sealed document ex parte and in camera,” Walker writes. “The court will then issue an order regarding whether plaintiffs may proceed—that is, whether the sealed document establishes that plaintiffs were subject to electronic surveillance not authorized by FISA” (the Foreign Intelligence Surveillance Act—see 1978). [Wired News, 1/5/2009]

Entity Tags: Vaughn Walker, Al Haramain Islamic Foundation, Asim Ghafoo, Jon Eisenberg, Bush administration (43), Wendell Belew, Foreign Intelligence Surveillance Act, Obama administration

Timeline Tags: Civil Liberties

Constitutional lawyer and author Bruce Fein, a former official in the Justice Department under Ronald Reagan, writes that if President Obama wants to “restore the rule of law and to prevent future wrongdoing by high-level government officials,” he “should investigate, among others, former President George W. Bush, former Vice President Dick Cheney, former Defense Secretary Donald Rumsfeld, former Attorney General John Ashcroft, former White House counsel and Attorney General Alberto Gonzales, and former White House political adviser Karl Rove. The crimes to be investigated should include complicity in torture, illegal surveillance, illegal detention, perjury, obstruction of justice, and contempt of Congress. Prosecutions should follow if the evidence convinces a grand jury to indict.” Fein states that “[t]he best way to deter government criminality and to teach citizens the rule of law is to punish the perpetrators who are unanimously found guilty beyond a reasonable doubt by independent and impartial jurors.”
FBI, CIA Feared Prosecution for Torture - He notes that the FBI refused to participate in “enhanced interrogation techniques,” including waterboarding, for fear of being charged with war crimes. And the CIA required specific legal opinions from the Bush Justice Department—the so-called “golden shield” (see August 1, 2002)—and specific presidential authorization before it would allow its agents to torture detainees. And the White House ordered an end to waterboarding after it was warned that such tactics left its officials open to charges of torture and war crimes.
Attorney General Feared Prosecution under FISA - He goes on to note that Justice Department officials such as acting Attorney General James Comey “balked at approving… Bush’s warrantless surveillance program without modification in March 2004 probably because he feared criminal prosecution under the Foreign Intelligence Surveillance Act” (see 1978).
'Unpunished Lawlessness by Government Officials Invites Lawlessness Generally' - Fein asserts that “unpunished lawlessness by government officials invites lawlessness generally.” He quotes former Supreme Court Justice Louis Brandeis: “Decency, security, and liberty alike demand that government officials shall be subjected to the same rules of conduct that are commands to the citizen. In a government of laws, existence of the government will be imperiled if it fails to observe the law scrupulously. Our government is the potent, the omnipresent teacher. For good or for ill, it teaches the whole people by its example. Crime is contagious. If the government becomes a lawbreaker, it breeds contempt for law; it invites every man to become a law unto himself; it invites anarchy.” The best way to deter criminal behavior, he says, is to prosecute alleged criminals, and that process must start with government officials. [Washington Times, 1/20/2009]

Entity Tags: Bruce Fein

Timeline Tags: Civil Liberties

The cover of Mark Klein’s ‘Wiring Up the Big Brother Machine… and Fighting It.’The cover of Mark Klein’s ‘Wiring Up the Big Brother Machine… and Fighting It.’ [Source: BookSurge / aLibris (.com)]Former AT&T technician Mark Klein self-publishes his book, Wiring Up the Big Brother Machine… and Fighting It. In his acknowledgements, Klein writes that he chose to self-publish (through BookSurge, a pay-to-publish venue) because “[t]he big publishers never called me,” and the single small publishing house that offered to publish his book added “an unacceptable requirement to cut core material.” Klein based his book on his experiences as an AT&T engineer at the telecom giant’s San Francisco facility, where he primarily worked with AT&T’s Internet service. In 2002 and 2003, Klein witnessed the construction of of a “secret room,” a facility within the facility that was used by the National Security Agency (NSA) to gather billions of email, telephone, VoIP (voice over Internet Protocol), and text messages, most of which were sent by ordinary Americans. The NSA did its electronic surveillance, Klein writes, secretly and without court warrants. Klein describes himself as “wiring up the Big Brother machine,” and was so concerned about the potential illegality and constitutional violations of the NSA’s actions (with AT&T’s active complicity) that he retained a number of non-classified documents proving the extent of the communications “vacuuming” being done. Klein later used those documents to warn a number of reporters, Congressional members, and judges of what he considered a horrific breach of Americans’ right to privacy. [Klein, 2009, pp. 9-11, 21-24, 33, 35, 38, 40] In 2007, Klein described his job with the firm as “basically to keep the systems going. I worked at AT&T for 22 and a half years. My job was basically to keep the systems going. They were computer systems, network communication systems, Internet equipment, Voice over Internet [Protocol (VoIP)] equipment. I tested circuits long distance across the country. That was my job: to keep the network up.” He explained why he chose to become a “whistleblower:” “Because I remember the last time this happened.… I did my share of anti-war marches when that was an active thing back in the ‘60s, and I remember the violations and traffic transgressions that the government pulled back then for a war that turned out to be wrong, and a lot of innocent people got killed over it. And I’m seeing all this happening again, only worse. When the [NSA] got caught in the ‘70s doing domestic spying, it was a big scandal, and that’s why Congress passed the FISA [Foreign Intelligence Surveillance Act] law, as you know, to supposedly take care of that (see 1978). So I remember all that. And the only way any law is worth anything is if there’s a memory so that people can say: ‘Wait a minute. This happened before.’ And you’ve got to step forward and say: ‘I remember this. This is the same bad thing happening again, and there should be a halt to it.’ And I’m a little bit of that institutional memory in the country; that’s all.” [PBS Frontline, 5/15/2007]

Entity Tags: National Security Agency, AT&T, BookSurge, Mark Klein

Timeline Tags: Civil Liberties

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike