!! History Commons Alert, Exciting News

Context of 'February 23-August 16, 2001: Moussaoui and 9/11 Hijackers Engage in Parallel Conduct'

This is a scalable context timeline. It contains events related to the event February 23-August 16, 2001: Moussaoui and 9/11 Hijackers Engage in Parallel Conduct. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 22 (2195 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22 | next

The German Reich Ministry of Justice issues a secret memo following a meeting of several Justice Ministry lawyers and public prosecutors with senior Gestapo officers. The participants discuss the fact that Germany has been on a war footing for years, and the leaders’ worry that the citizenry is riddled with sleeper cells of subversives. The solution: detaining and torturing subversives. It is unclear whether torture will be used to terrorize other subversives, to extract information, or produce confessions. German law enforcement officials are balky at applying “more rigorous interrogation” techniques. Though some judges seem unmoved by defendants appearing in court with obvious marks of torture upon their bodies, the law enforcement officers are bureaucrats in a system that has always respected the rule of law and the Hitler government was originally elected on a law-and-order platform. The memo is the product of the top officials in the Gestapo and Justice Ministry, and lays out detailed instructions as to when torture techniques can be applied, the specific equipment used in such interrogations, and how many times particular techniques could be used on certain categories of detainees. Perhaps most importantly, the memo promises immunity from prosecution to any German interrogator who follows the rules as laid down in the memo.
Specific Instructions - It reads in part: “At present, we thus have a situation which cannot continue: a deficient sense of what is right on the part of judicial officers; an undignified position for police officers, who try to help matters by foolish denials [that torture has taken place in court proceedings].… [I]nterrogations of this kind [torture] may be undertaken in cases where charges involve the immediate interests of the state.… chiefly treason and high treason. Representatives of the Gestapo expressed the opinion that a more rigorous interrogation could also be considered in cases of Jehovah’s Witnesses, explosives, and sabotage.… As a general principle, in more rigorous interrogations only blows with a club on the buttocks are permissible, up to 25 such blows. The number is to be determined in advance by the Gestapo.… Beginning with the tenth blow, a physician must be present. A standard club will be designated, to eliminate all irregularities.” Gestapo Headquarters in Berlin must give permission for more “rigorous interrogation[s],” the memo continues.
Drawing Parallels to Bush Administration Torture - The memo will be the subject of a 2009 article by Shayana Kadidal, the senior managing attorney of the Guantanamo project at the Center for Constitutional Rights. Kadidal will draw parallels between the Nazi torture authorization and similar legal justifications issued by the American government after the 9/11 attacks (see March 2, 2009 and April 21, 2009). Kadidal will write: “I realize that, as a matter of principle, there is a strong bias against making Nazi analogies to any events happening in our modern world.… But here we have: (1) a system set up to allow torture on certain specific individual detainees, (2) specifying standardized equipment for the torture (apparently down to the exact length of the club to be used), along with physician participation to ensure survival of the victim for the more several applications, (3) requiring prior approval of the use of torture from the central authorities in the justice department and intelligence agency in the capital, so as to ensure that (6) the local field officers actually carrying out the abuse are immune from prosecution.” [Huffington Post, 4/21/2009]

Entity Tags: Gestapo, Shayana Kadidal, German Reich Ministry of Justice

Timeline Tags: Torture of US Captives

Sherwood F. Moran (right) interrogating a Japanese prisoner during the battle of Guadalcanal.Sherwood F. Moran (right) interrogating a Japanese prisoner during the battle of Guadalcanal. [Source: Associated Press]Marine interrogator Major Sherwood F. Moran writes an informal memo for use by other interrogators. Moran is a legendary figure among Marines, renowned for his ability to coax information from the most reluctant or resistant Japanese captive, even during the height of battle, and often using his knowledge of, and respect for, Japanese culture to his advantage. His memo will remain relatively unknown outside the Marine Corps until the summer of 2003, when it will be included in the archives of the Marine Corps Interrogator Translator Teams Association. The memo, titled “Suggestions for Japanese Interpreters Based on Work in the Field,” is remarkable for its insistence that treating prisoners with humanity and respect works far better than “harsh” interrogation methods. Author Ulrich Straus, an expert on Japanese POWs held in US captivity during World War II, will later write that Moran “was a particularly effective interrogator because he treated each prisoner as another human rather than as the enemy.” In 2005, after the Abu Ghraib scandals become media fodder, military historian Stephen Budiansky will write: “Six months before the abuses at Abu Ghraib prison broke into public view, a small and fairly obscure private association of United States Marine Corps members posted on its Web site a document on how to get enemy POWs to talk. The document described a situation very similar to the one the United States faces in the insurgencies in Iraq and Afghanistan: a fanatical and implacable enemy, intense pressure to achieve quick results, a brutal war in which the old rules no longer seem to apply.… Moran, the report’s author, noted that despite the complexities and difficulties of dealing with an enemy from such a hostile and alien culture, some American interrogators consistently managed to extract useful information from prisoners. The successful interrogators all had one thing in common in the way they approached their subjects. They were nice to them. Moran was writing in 1943, and he was describing his own, already legendary methods of interrogating Japanese prisoners of war. More than a half century later his report remains something of a cult classic for military interrogators.” [David R. Moran, 2005]
Human-to-Human Attitude - Moran writes that the best interrogators (whom he says should consider themselves “interviewers”) become “wooers” of their captives, coaxing information rather than attempting to force confessions. Most important, Moran writes, is the interrogator’s attitude towards his prisoner. “Many people, I suppose, would on first thought think ‘attitude’ had nothing to do with it; that all one needs is a knowledge of the language, then shoot out questions, and expect and demand a reply,” he writes. “Of course that is a very unthinking and naive point of view.” Just as important, Moran writes, is a sympathy and understanding of the captive’s culture. A superior or demeaning attitude breeds nothing but antagonism and resistance.
Speaking the Language of the Captive - Almost as important, Moran notes, is the interrogator’s ability to speak directly to the captive in his own language, without the need for translators. An interrogator should speak the language fluently and idiomatically, or, when that is not possible, to at least have some command over common phrases. “After all, the first and most important victory for the interviewer to try to achieve is to get into the mind and into the heart of the person being interviewed,” he writes.
Hidden System - Fellow feelings and warm sympathy towards the captive are necessary, but not the entire package. While the captive, or an outside observer, might believe that the interrogator is merely indulging in friendly chit-chat, the interrogator must have an agenda and a plan in place at all times. “[I]n the workings of your mind you must be a model of system,” Moran says. “You must know exactly what information you want, and come back to it repeatedly. Don’t let your warm human interest, your genuine interest in the prisoner, cause you to be sidetracked by him! You should be hard-boiled but not half-baked. Deep human sympathy can go with a business-like, systematic, and ruthlessly persistent approach.”
Short-Circuiting Patriotic Defensiveness - To emphasize that your side, your nation, or your culture is superior—in essence, the “conquerors” of the captive’s military or his nation—is counterproductive, Moran writes. “To emphasize that we are enemies, to emphasize that he is in the presence of his conqueror, etc., puts him psychologically in the position of being on the defensive, and that because he is talking to a most-patient enemy and conqueror he has no right and desire to tell anything,” he writes.
Breaking Recalcitrant Prisoners - Sometimes even the best interrogators come up against recalcitrant prisoners who flatly refuse, for patriotic reasons or what Moran calls “conscientious scruples,” to give any information. In these cases, Moran writes, harsh or physical techniques of intelligence extraction are counterproductive. Instead, he writes, with his Japanese captives he is often able to shame the prisoner into cooperating. Reminding the captive that he has been treated humanely, has been treated with kindness and courtesy, implies a quid pro quo—not the threat of having this treatment withdrawn if cooperation is not forthcoming, but a matter of the captive returning the interrogator’s courtesy with information. [Moran, 7/17/1943 pdf file]

Entity Tags: US Marine Corps, Ulrich Straus, Stephen Budiansky, Sherwood F. Moran, Marine Corps Interrogator Translator Teams Association

Timeline Tags: Torture of US Captives

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

In the aftermath of World War II, Japanese officer Yukio Asano is charged by a US war crimes tribunal for torturing a US civilian. Asano had used the technique of “waterboarding” on the prisoner (see 1800 and After). The civilian was strapped to a stretcher with his feet in the air and head towards the floor, and water was poured over his face, causing him to gasp for air until he agreed to talk. Asano is convicted and sentenced to 15 years of hard labor. Other Japanese officers and soldiers are also tried and convicted of war crimes that include waterboarding US prisoners. “All of these trials elicited compelling descriptions of water torture from its victims, and resulted in severe punishment for its perpetrators,” reporter Evan Wallach will later write. In 2006, Senator Edward Kennedy (D-MA), discussing allegations of US waterboarding of terror suspects, will say in regards to the Asano case, “We punished people with 15 years of hard labor when waterboarding was used against Americans in World War II.” [Washington Post, 10/5/2006; National Public Radio, 11/3/2007]

Entity Tags: Yukio Asano, Evan Wallach, Edward M. (“Ted”) Kennedy

Timeline Tags: Torture of US Captives

A B-29 bomber similar to the one that crashed in Georgia.A B-29 bomber similar to the one that crashed in Georgia. [Source: Global Security (.org)]A test flight for the Air Force’s Project Banshee, located at Robins Air Force Base in Georgia, is set for 8:30 a.m. Banshee is an attempt begun in 1946 to develop and deploy a long-range missile ahead of both the Soviet Union and rival US military branches. The airplane used in the test flight crashes less than an hour into its flight, killing 9 of the 13 aboard.
Maintenance Problems - The plane assigned for the flight is a B-29 Stratofortress, a bomber made famous by its delivery of the atomic bombs to Hiroshima and Nagasaki at the end of World War II. B-29s are notoriously difficult to fly and maintain: their four wing-mounted engines almost routinely overheat and catch fire, causing engine shutdowns, sudden drops in altitude, and, often, crashes. The engines’ eighteen cylinders lack sufficient airflow to keep them cool, and the overheating often causes the crankcases, made of light but highly flammable magnesium, to burst into flames. Like so many of its brethren, the plane has suffered its share of maintenance issues, and is flying without numerous recommended maintenance and repair tasks being performed. Just five days before, it had been designated “red cross”—grounded and unfit for service. It was allowed to fly through an “exceptional release” signed by the squadron commander.
Crew Difficulties - The flight is moved back to the afternoon after some crew members fail to show up on time, and to allow last-minute repairs to be made. By takeoff, the flight crew is assembled: Captain Ralph Erwin; co-pilot Herbert W. Moore; flight engineer Earl Murrhee; First Lieutenant Lawrence Pence, Jr, the navigator; Sergeant Walter Peny, the left scanner; Sergeant Jack York, the right scanner; Sergeant Melvin Walker, the radio operator; and Sergeant Derwood Irvin, manning the bombsight and autopilot. The crew is joined by civilian engineers assigned to Banshee: Al Palya and Robert Reynolds from RCA, William Brauner and Eugene Mechler from the Franklin Institute, and Richard Cox from the Air Force’s Air Materiel Command. In violation of standard procedure, none of the crew or the civilians are briefed on emergency procedures, though Murrhee will later say that the crew were all familiar with the procedures; he is not so sure about the civilians, though he knows Palya and Reynolds have flown numerous test flights before. In another violation of Air Force regulations, none of the flight crew have worked together before. As author Barry Siegel will note in 2008, “The pilot, copilot, and engineer had never shared the same cockpit before.”
Engine Fire and Crash - Less than an hour into the flight, one engine catches fire and two others lose power, due to a combination of maintenance failures and pilot errors. The civilians have some difficulty getting into their parachutes as Erwin and Moore attempt to regain control of the aircraft. Four of the crew and civilians manage to parachute from the plane, but most remain on board as the airplane spirals into the ground on the edge of the Okefenokee Swamp, near Waycross, Georgia. Crew members Moore, Murrhee, and Peny survive, as does a single civilian, Mechler. Four others either jump at too low an altitude or die when their chutes foul the airplane; the other five never manage to leave the plane and die on impact.
Widows File Suit - Several of the civilians’ widows will file suit against the US Air Force, asserting that their husbands died because of Air Force negligence (see June 21, 1949). Their lawsuit will eventually become US v. Reynolds, a landmark Supreme Court case and the underpinning for the government’s claims of state secrets privilege (see March 9, 1953). [Siegel, 2008, pp. 3, 14-17, 33-49]

Entity Tags: Derwood Irvin, Barry Siegel, US Department of the Air Force, Walter Peny, William Brauner, Air Materiel Command, Richard Cox, Ralph Erwin, Robert Reynolds, Al Palya, Radio Corporation of America, Eugene Mechler, Earl Murrhee, Franklin Institute, Project Banshee, Melvin Walker, Lawrence Pence, Jr, Herbert W. Moore, Jr, Jack York

Timeline Tags: Civil Liberties

A three-judge federal appeals court unanimously rejects the government’s claim of unfettered executive privilege and secrecy in regards to classified documents (see October 19, 1951). In an opinion written by Judge Albert Maris, the court finds that the government’s claim that the judiciary can never compel the executive branch to turn over classified documents to be without legal merit. The plaintiffs in the case, three widows who lost their husbands in the crash of a B-29 bomber carrying classified materials (see June 21, 1949), had a compelling need for the documents in question, the downed B-29 accident reports, to further their case, Maris writes (see October 12, 1950).
No Legal Basis for Claim of Privilege - Maris goes further than the parameters of the single lawsuit, writing: “[W]e regard the recognition of such a sweeping privilege… as contrary to a sound public policy. The present cases themselves indicate the breadth of the claim of immunity from disclosure which one government department head has already made. It is but a small step to assert a privilege against any disclosure of records merely because they might prove embarrassing to government officials. Indeed, it requires no great flight of imagination to realize that if the government’s contentions in these cases were affirmed, the privilege against disclosure might gradually be enlarged… until as is the case in some nations today, it embraced the whole range of government activities.… We need to recall in this connection the words of [Revolution-era jurist] Edward Livingston: ‘No nation ever yet found any inconvenience from too close an inspection into the conduct of its officers, but many have been brought to ruin, and reduced to slavery, by suffering gradual imposition and abuses, which were imperceptible, only because the means of publicity had not been secured.’” He also quotes Revolutionary War figure Patrick Henry, who said, “[T]o cover with the veil of secrecy the common routine of business is an abomination in the eyes of every intelligent man and every friend to his country.”
Rejecting Claim of 'State Secrets' - Maris is even less respectful of the government’s claim of a “state secrets” privilege. He notes that the government did not make that claim until well into the lawsuit proceedings (see October 19, 1951), indicating that it was a “fallback” argument used after the original government arguments had failed. Maris is also troubled, as author Barry Siegel later writes, in the government’s “assertion of unilateral executive power, free from judicial review, to decide what qualified as secret.” The lower court judge’s ruling that he alone should be given the documents for review adequately protected the government’s security interests, Maris writes: “[But] the government contends that it is within the sole province of the secretary of the Air Force to determine whether any privileged material is contained in the documents and that his determination of this question must be accepted by the district court without any independent consideration.… We cannot accede to this proposition. On the contrary, we are satisfied that a claim of privilege against disclosing evidence… involves a justiciable question, traditionally within the competence of the courts.… To hold that the head of an executive department of the government in a [law]suit to which the United States is a party may conclusively determine the government’s claim of privilege is to abdicate the judicial function to infringe the independent province of the judiciary as laid down by the Constitution.”
Fundamental Principle of Checks and Balances - Maris continues: “The government of the United States is one of checks and balances. One of the principal checks is furnished by the independent judiciary which the Constitution established. Neither the executive nor the legislative branch of the government may constitutionally encroach upon the field which the Constitution has reserved for the judiciary.… Nor is there any danger to the public interest in submitting the question of privilege to the decision of the courts. The judges of the United States are public officers whose responsibilities under the Constitution is just as great as that of the heads of the executive departments.”
Government Appeal - The Justice Department will appeal the ruling to the US Supreme Court (see March 1952 and March 9, 1953). [Siegel, 2008, pp. 153-156]

Entity Tags: Albert Maris, US Department of Justice, Barry Siegel, US Supreme Court

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Lawyers make their opening arguments before the Supreme Court in the case of US v Reynolds, the lawsuit that finds the government had no overarching right to unilaterally refuse to deliver classified documents in the course of a wrongful death lawsuit against the government (see December 11, 1951). The government has appealed the appellate court ruling to the Supreme Court (see March 1952). Because four of the nine justices had voted not to hear the case—in essence to let the appellate court ruling stand—the defense is cautiously optimistic about the Court’s decision.
Judiciary Has No Right to Interfere with Powers of the Executive, Government Argues - Acting Solicitor General Robert Stern tells the Court that the appellate judges’ decision, written by Judge Albert Maris, “is an unwarranted interference with the powers of the executive,” and that the decision forced the government to choose “whether to disclose public documents contrary to the public interest [or] to suffer the public treasury to be penalized” (a reference to the decision to award the plaintiffs monetary damages—see October 12, 1950). The judiciary “lack[s] power to compel disclosure by means of a direct demand [as well as] by the indirect method of an order against the United States, resulting in judgment when compliance is not forthcoming.”
Executive Has No Right to Unilaterally Withhold Information, Defense Counters - Stern’s arguments are countered by those of the plaintiffs’ lawyer, Charles Biddle, who writes, “We could rest our case with confidence on the clear opinion of Judge Maris,” but continues by arguing that if the government asserts a claim of executive privilege on the basis of national security, it must make the documents available to the Court for adjudication, or at least provide enough information for the Court to judge whether the documents present in fact a threat to national security if disclosed. This is particularly true, Biddle argues, “where there is no showing that the documents in question contain any military secret” (Biddle is unaware that the documents’ classification status had been reduced two years before—see September 14, 1950). “The basic question here is whether those in charge of the various departments of the government may refuse to produce documents properly demanded… in a case where the government is a party (see June 21, 1949), simply because the officials themselves think it would be better to keep them secret, and this without the Courts having any power to question the propriety of such decision.… In other words, say the officials, we will tell you only what we think it is in the public interest that you should know. And furthermore, we may withhold information not only about military or diplomatic secrets, but we may also suppress documents which concern merely the operation of the particular department if we believe it would be best, for purposes of efficiency or morale, that no one outside of the department, not even the Court, should see them.”
No Basis for Claims of Military Secrets - Biddle argues that because of responses he has received to his demands over the course of this lawsuit, he is relatively sure there are no military secrets contained within them. “[T]he proof is to the contrary,” he says, and goes on to say that had the Air Force disclosed from the outset that the plane crash, the fatal accident that sparked the original lawsuit (see October 6, 1948), was probably caused by pilot error and not by random chance, the plaintiffs may have never needed to ask for the disclosure of the documents in question, the accident reports on the crash (see October 18, 1948). “The secretary [of the Air Force]‘s formal claim of privilege said that the plane at the time was engaged in a secret mission and that it carried confidential equipment,” Biddle says, “but nowhere was it asserted that either had anything to do with the accident. The whole purpose of the demand by the respondents was for the purpose of finding out what caused the accident.… They were not in the least interested in the secret mission or equipment.” [Siegel, 2008, pp. 165-170]

Entity Tags: US Supreme Court, Albert Maris, Robert Stern, US Department of the Air Force, Charles Biddle

Timeline Tags: Civil Liberties

In their regular Saturday conference, the nine Supreme Court justices discuss the issues and arguments surrounding US v Reynolds (see October 21, 1952). According to the notes from the discussion, Chief Justice Fred Vinson, a strong advocate for expansive executive powers (see March 1952), says the case “boils down to Executive Branch determine privilege.” Other notes by Justice William O. Douglas suggest that Vinson isn’t convinced that the US must “be forced to pay for exercising its privilege” (see October 12, 1950). A straw vote taken at the end of the discussion shows five justices in favor of the government’s position to unilaterally withhold classified documents—overturning the appellate court decision (see December 11, 1951), and four in favor of allowing the decision to stand. [Siegel, 2008, pp. 171]

Entity Tags: Fred Vinson, US Supreme Court, William O. Douglas

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

One of a number of semi-official ‘Christian Identity’ logos.One of a number of semi-official ‘Christian Identity’ logos. [Source: KingIdentity (.com)]The “Christian Identity” theology, formerly a fairly benign expression of what is known as “British-Israelism” or “Anglo-Israelism,” begins to spread throughout the US and Canada, particularly on the west coasts of these nations. This belief holds that white Americans and Canadians are the real descendants of the Biblical tribes of Israel. In 2003, author Nicole Nichols, an expert on far-right racist and religious groups in America, will define the concept of “Christian Identity” as practiced by many white supremacist and separatist groups. Christian Identity is not an organization, she will write, but an ideology that many organizations have adopted in some form or fashion. Christian Identity “elevates white supremacy and separatism to a Godly ideal,” she will write, calling it “the ideological fuel that fires much of the activity of the racist far right.” According to Christian Identity theology, Jews are neither the “true Israelites” nor the true “chosen people” of God; instead, Christian Identity proponents claim, Jews are descended from an Asiatic people known as the Khazars, who settled near the Black Sea during the Middle Ages. [Nicole Nichols, 2003; Anti-Defamation League, 2005; Ontario Consultants on Religious Tolerance, 5/30/2006] In 2005, the Ontario Consultants on Religious Tolerance will write, “Followers tend to be involved in political movements opposing gun control, equal rights to gays and lesbians, and militia movements,” and quote Michael Barkun, an expert on radical-right groups, as saying, “This virulent racist and anti-Semitic theology… is prevalent among many right-wing extremist groups and has been called the ‘glue’ of the racist right.” [Ontario Consultants on Religious Tolerance, 5/30/2006]
Beginnings; 'The Protocols of the Elders of Zion' - In the 1920s, William J. Cameron, editor of the Dearborn Independent weekly newspaper, popularized the anti-Semitic hoax manuscript called “The Protocols of the Elders of Zion,” which purported to detail the “secret teachings” of Judaism, including the planned takeover of the world’s governments, the subjugation of non-Semitic races, and the bizarre, cannibalistic rituals supposedly practiced by Jews. [Anti-Defamation League, 2005]
Wesley Swift and 'Mud People' - In the 1940s, a former Methodist minister, Wesley Swift, started his own church, later known as the Church of Jesus Christ Christian. Swift had deep ties to a number of radical right-wing groups including the Ku Klux Klan; Swift and his associates set the stage for the mutation of the Christian Identity into a loosely organized set of virulently anti-Semitic, racist belief systems that will come to be grouped together under the “Christian Identity” rubric. Swift himself taught that only the white race was created in the form of God, while Asian and African races were created from the “beasts of the fields,” and thusly are subhuman creations. In Swift’s version of Genesis, Eve, the wife of the first “true” man Adam, was seduced by The Serpent, who masqeueraded as a white man. Eve bore a son, Cain, who is the actual father of the Jewish people. This reinterpretation, sometimes called the “two-seed” or “seedliner” theory, supports the Christian Identity propensity to demonize Jews, whom Swift and others labeled the “spawn of Satan.” Today’s white Europeans and their American and Canadian descendants, Swift taught, are descended from the “true son” of Adam and Eve, Abel, and are the actual “chosen people” of God. Some Christian Identity adherents go even farther, claiming that subhuman “pre-Adamic” races existed and “spawned” the non-white races of the world, which they label “mud people.” [Nicole Nichols, 2003; Anti-Defamation League, 2005]
Permeates Racist, Far-Right Groups - By the 1960s, a new group of Christian Identity leaders emerges to spread the Identity theology through the radical, racist right in America and Canada, popularizing the once-obscure ideology. Most prominent among them are three disciples of Swift: James K. Warner, William Potter Gale, and Richard Butler. Warner, who will move to Louisiana and play a leading role in the fight against civil rights, founds the Christian Defense League and the New Christian Crusade Church. Gale, an early leader of the Christian Defense League and its paramilitary arm, the California Rangers, goes on to found the Posse Comitatus (see 1969), the group that will help bring about the sovereign citizen movement. Gale will later found the Committee of the States and serve as the “chief of staff” of its “unorganized militia.” Butler moves Swift’s Church of Jesus Christ Christian to Idaho and recasts it as the neo-Nazi group Aryan Nations (see Early 1970s). Under the leadership of Butler, Gale, Warner, and others, Christian Identity soon permeates most of the major far-right movements, including the Klan and a racist “skinhead” organization known as the Hammerskins. It also penetrates many extreme anti-government activist groups. The Anti-Defamation League will write, “The resurgence of right-wing extremism in the 1990s following the Ruby Ridge (see August 31, 1992) and Waco standoffs (see April 19, 1993) further spread Identity beliefs.” [Anti-Defamation League, 2005] Nichols will write: “Christian Identity enclaves provide a trail of safe havens for movement activists, stretching from Hayden Lake in northern Idaho (the Aryan Nations stronghold) to Elohim City on the Oklahoma/Arkansas border (see 1973 and After). Many white supremacists on the run from federal authorities have found shelter and support from Christian Identity followers.” Some organizations such as the Montana Militia are headed by Identity adherents, but do not as a group promote the theology. [Nicole Nichols, 2003; Anti-Defamation League, 2005]
Bringing Forth the Apocalypse - Many Christian Identity adherents believe that the Biblical Apocalypse—the end of the world as it is currently known and the final ascendancy of select Christians over all others—is coming soon. Unlike some Christians, Identity adherents do not generally believe in the “rapture,” or the ascendancy of “saved” Christians to Heaven before the Apocalypse ensues; instead, Identity followers believe Jesus Christ will return to Earth only after the time of the “Tribulation,” a great battle between good and evil, which will set the stage for the return of Christ and the final transformation of the world. Identity followers believe it is their duty to prepare for the Apocalypse, and some believe it is their duty to help bring it about. They tend to cast the Apocalypse in racial terms—whites vs. nonwhites. Identity adherents believe that worldly institutions will collapse during the “end times,” and therefore tend to distrust such institutions, making Identity theology appealing to anti-government ideologies of groups such as militia, “Patriot,” and sovereign citizens groups. [Anti-Defamation League, 2005]
21st Century Identity - In the 21st century, Christian Identity groups are strongest in the Pacific Northwest of America and Canada, and the US Midwest, though Identity churches can be found throughout the US and in other parts of Canada. Identity churches also exist in, among other nations, Ireland, Great Britain, Australia, and South Africa (see June 25, 2003). The Anti-Defamation League will write: “Yet while spread far it is also spread thin. Estimates of the total number of believers in North America vary from a low of 25,000 to a high of 50,000; the true number is probably closer to the low end of the scale. Given this relatively small following, its extensive penetration of the far right is all the more remarkable.” [Anti-Defamation League, 2005]
Identity Violence - Identity adherents commit a number of violent acts, often against government and/or financial institutions, in an outsized proportion to their small numbers. In 1983, Identity adherent Gordon Kahl kills two US Marshals who attempt to arrest him on a parole violation, and kills an Arkansas sheriff before finally being gunned down by authorities (see February 13, 1983 and After). The white supremacist terrorist group The Order (see Late September 1983) contains a number of Identity members, including David Tate, who kills a Missouri Highway Patrol officer while attempting to flee to an Identity survivalist compound (see April 15, 1985). During the 1980s, small Identity groups such as The New Order (or The Order II) and the Arizona Patriots commit bombings and armored car robberies. After the Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995), Identity minister Willie Ray Lampley attempts a number of bombings (see November 9, 1995). In 1996, the Montana Freeman, led by Identity members, “stands off” federal authorities for 81 days (see March 25, 1996). Between 1996 and 1998, Eric Robert Rudolph, who has connections to Identity ministers such as Nord Davis and Dan Gayman, bombs an Atlanta gay bar (see February 21, 1997), several abortion clinics (see October 14, 1998), and the Atlanta Summer Olympics (see July 27, 1996 and After). In 1999, Identity member and former Aryan Nations security guard Buford Furrow goes on a shooting spree at a Jewish community center in Los Angeles (see August 10, 1999). [Anti-Defamation League, 2005]

The CIA’s Technical Services Division (TSD) considers plans to undermine Fidel Castro’s charismatic appeal by sabotaging his speeches. At one point, there is discussion of spraying Castro’s broadcasting studio with a hallucinogenic chemical. The plan is taken of the shelf because the chemical is deemed unreliable. During this period, the TSD laces a box of cigars with a chemical that would produce temporary disorientation, hoping that he will smoke one of the cigars before giving a speech. In another instance, the TSD comes up with a scheme to dust Castro’s shoes with thallium salts during a trip outside of Cuba. The salts would cause his beard to fall out. The plan is abandoned when Castro cancels the trip. [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, Technical Services Division (TSD)

Timeline Tags: US-Cuba (1959-2005)

The CIA works with a high-level Cuban official, codenamed “AM/LASH,” on a plan to assassinate Fidel Castro and overthrow his government. In June 1965, the CIA ends its contact with AM/LASH and his associates, citing security concerns. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Timeline Tags: US-Cuba (1959-2005)

The CIA’s Task Force W devises two plans to assassinate Fidel Castro. The first one, involving an exploding sea shell that would be placed where Castro regularly dives, is dismissed by the CIA’s Technical Services Division (TSD) as impractical. In the second plan, James Donovan (who has been negotiating with Castro for the release of prisoners taken during the Bay of Pigs operation) would present Castro with a contaminated diving suit. TSD decides to give the plan a try. It purchases a diving suit and laces its breathing apparatus with tubercule bacillus. The suit itself is dusted with a fungus that is known to cause a chronic skin disease. But the suit never leaves the laboratory. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Entity Tags: Technical Services Division (TSD), James Donovan, Fidel Castro

Timeline Tags: US-Cuba (1959-2005)

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]

Entity Tags: Malcolm Little, Central Intelligence Agency, Church Committee, Lew Allen, National Security Agency, Martin Luther King, Jr., Office of Security Services, Joan Baez

Timeline Tags: Civil Liberties

The Washington Post runs a front-page photo of a US soldier supervising the waterboarding of a captured North Vietnamese soldier. The caption says the technique induced “a flooding sense of suffocation and drowning, meant to make him talk.” Because of the photo, the US Army initiates an investigation, and the soldier is court-martialed and convicted of torturing a prisoner. [National Public Radio, 11/3/2007]

Entity Tags: Washington Post, US Department of the Army

Timeline Tags: Torture of US Captives

The logo of the Posse Comitatus.The logo of the Posse Comitatus. [Source: Underground News Network]The Posse Comitatus, an anti-Semitic, right-wing “Christian Identity” organization (see 1960s and After), is founded by retired dry-cleaning executive Henry L. Beach in Portland, Oregon, who calls his organization the Sherriff’s Posse Comitatus (SPC) or Citizen’s Law Enforcement Research Committee (CLERC). Beach has supported Nazism since the 1930s, and formerly led a neo-Nazi organization called the Silver Shirts (see January 31, 1933). The Posse Comitatus is quickly taken over by William Potter Gale, a retired Army colonel who founded a similar organization called the US Christian Posse Association in Glendale, California, and manages to roll the two groups, and a few other loosely organized entities, into one. The Posse Comitatus dedicates itself to survivalism, vigilantism, and anti-government activities; its bylaws state that no federal or state governmental entity has any legal standing, and only county and town governments are legitimate. Furthermore, the organization believes that the entire federal government is controlled by Jews, and as such has no authority over whites. Beach’s original Posse manual states, “[O]fficials of government who commit criminal acts or who violate their oath of office… shall be removed by the posse to the most populated intersection of streets in the township and, at high noon, be hung by the neck, the body remaining until sundown as an example to those who would subvert the law.” According to a 1986 advisory published by the IRS, “members associated with some of the Posse groups wear tiny gold hangmen’s nooses on their lapels.” Posse members refuse to pay taxes whenever they can get away with it, and ignore laws that they feel cannot be enforced by “the enemy.” Instead, they claim to abide by a “common law,” defined as a set of principles that they themselves create and change at will. The organization begins making inroads into the farm communities of the Northwest and Upper Midwest after federal mismanagement of agricultural policies threatens the livelihood of many area farmers; the Posse tells them, “Farmers are victims of a Jewish-controlled government and banking system, federal taxes are illegal and loans need not be repaid.” Some area farmers embrace the message, and the Posse begins heavily recruiting in Michigan. [Ian Geldard, 2/19/1995; Nicole Nichols, 2003]
Anti-Government, Anti-Tax Ideology - The Posse Comitatus believes that the federal and state governments are inherently illegal and have no authority whatsoever; the highest elected official of the land, it says, is the county sheriff, who can form juries and call out “posses” of citizens to enforce the law as necessary. The movement strongly opposes paying taxes, particularly to the Internal Revenue Service (IRS), and considers money issued by the Federal Reserve System as illegal. It says that the Constitution’s 16th Amendment, which gave Congress the right to tax citizens’ incomes, was illegally ratified and therefore unconstitutional; moreover, it says, careful examination of federal law tells it that income taxes are entirely voluntary. The Federal Reserve System is, as one Posse publication puts it, “a private monopoly which neither the people nor the states authorized in the Constitution.” The Federal Reserve’s printed money violates the Constitution. Some, but not all, Posse Comitatus members also express racist and separatist views similar to those of Christian Identity believers (see 1960s and After); these members say that the Federal Reserve is controlled by a small cabal of international Jewish bankers who intend to destroy the American economy. [Mark Pitcavage, 5/6/1996; US Constitution: Sixteenth Amendment, 2011; Anti-Defamation League, 2011] Posse Comitatus members use the threat of violence, and sometimes actual violence, to express their anti-tax and anti-government ideologies (see 1972 and 1974).
Township Movement - The Posse spawns a directly related ideology, the “township movement,” led in part by Utah resident Walt P. Mann. Township advocates advocate setting up small sovereign communities that are answerable only to themselves. The Posse will set up a “constitutional township” on a 1,400-acre plot in Wisconsin and name it “Tigerton Dells,” posting signs that say, “Federal Agents Keep out; Survivors will be Prosecuted.” Tigerton Dells will appoint its own judges and foreign ambassadors before federal authorities seize the property (see 1984).
Movement Spreads throughout Northwest, Plains States - By 1976, an FBI report says that the Posse Comitatus movement will consist of up to 50,000 adherents throughout the Northwest and Great Plains states. The center of the movement is at Tigerton Dells; Posse members there will disrupt local government meetings and assault public officials. The farm crisis of the early 1980s will allow the Posse to begin converting angry, frightened farmers throughout the region. In 1996, the Anti-Defamation League’s Mark Pitcavage will write, “The Posse offered up targets for people to blame: the courts, the money system, the federal government, the Jews.”
Waging Legal Battles - While some Posse members offer violence to law enforcement and public officials (see February 13, 1983 and After), most of their battles with the government take place in court. Posse members most frequently use two common legal strategems: filing frivolous liens on the properties of public officials who oppose or anger them, particularly IRS agents, and flooding the courts with a barrage of legal documents, filings, motions, and appeals. The liens carry no legal weight but sometimes damage the recipients’ credit scores and interfere with the recipients’ ability to buy or sell property. The court documents, often written in arcane, archaic, and contradictory legal language, clog the court system and frustate judges and prosecutors. A related tactic is the establishment of “common law courts,” vigilante courts that often threaten public officials. [Mark Pitcavage, 5/6/1996]
Inspiration to Other Groups - The Posse Comitatus’s ideology will inspire other anti-government groups, such as the Montana Freemen (see 1993-1994).

Entity Tags: US Federal Reserve, William Potter Gale, Walt P. Mann, Internal Revenue Service, Posse Comitatus, Federal Bureau of Investigation, Henry L. Beach, Mark Pitcavage, Sherriff’s Posse Comitatus, US Christian Posse Association

Timeline Tags: Domestic Propaganda, US Domestic Terrorism

Dan Hill.Dan Hill. [Source: Amanda Gordon / Bloomberg]Dan Hill, a US Army Ranger who is undergoing officer training, comes up with a hypothetical plan by which the Soviet Union could start a nuclear war with the United States, which involves a suicide pilot crashing a military transport plane into the US Capitol building in Washington, DC.
Trainees Tasked with Imagining How to Start a World War - After his tour in Vietnam came to an end in mid-1969, Hill was chosen for the career officer training program at Fort Benning, Georgia. He is currently taking a course in nuclear weapons deployment. Toward the end of the semester, he is given the assignment of imagining he is a Soviet premier who wants to start World War III against the US. Hill and his fellow trainees are told to prepare a written plan, describing how they would initiate the war.
Plan Involves Crashing Plane into Capitol Building - Hill comes up with a plan, which he gives the code name “State of the Union.” It involves recruiting and training a suicide pilot, obtaining a C-47 transport plane, and filling it with explosives. Then, as journalist and author James B. Stewart will describe: “On the night of the State of the Union, the pilot would fly the plane straight into the Capitol building, through the rotunda, and into the House of Representatives, where the bombs on the plane would be set to explode. He’d take out the president, his cabinet, the members of the Supreme Court, the Joint Chiefs of Staff, and most senators and representatives. At that moment, the Soviet Union would unleash its nuclear missiles.” According to Hill, everyone in the US would be “watching TV, there’s no air defense around the Capitol; by the time anyone realized an aircraft was near, it would be too late.”
Commander Questions Hill about His Plan - On the Monday after Hill submits his plan, a lieutenant colonel in intelligence stops him on his way to class and says, “I’ve got some people who would like to talk to you.” Hill is taken to a room where Major General John Carley, the assistant commander of the infantry school, is waiting, along with six men in uniform and several other men who are dressed in dark suits, all of them looking serious. Carley is holding Hill’s paper and asks, “How did you come up with this?” Hill replies, “This is my area of expertise,” and explains that he has been trained in unconventional warfare, counterterrorism, the use of explosives, and demolition. He is then questioned for almost an hour about his plan. Finally, Carley says, “We’d prefer you forget you ever did this.” Hill agrees to do so and is then dismissed.
Hill Informs Friend about His Plan - Hill writes to his friend Rick Rescorla, who has also served in the Army, about the incident. In his reply, Rescorla writes: “You evil-minded b_stard! When you have these thoughts, don’t publicize them to anyone. The plan is tactically and technically proficient; it makes sense, but only to people like you and me. To the rest of the world, it looks like the workings of a deviant mind. This kind of thing terrifies people.” [Stewart, 2002, pp. 152-153] Rescorla will subsequently work as the head of security for a company at the World Trade Center. [New Yorker, 2/11/2002] While he is in that position, he will be drawing from Hill’s plan when, after the 1993 bombing, he determines that terrorists will likely target the WTC again by crashing a cargo plane into it (see Shortly After February 26, 1993). [Stewart, 2002, pp. 193-194] Hill will learn that, shortly after his meeting with Carley, enhanced air defenses were installed for Washington. He will therefore think that some good may have come from the meeting. [Stewart, 2002, pp. 153]

Entity Tags: Rick Rescorla, John Carley, Daniel J. Hill

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Early 1970s: Idaho Racist Founds Aryan Nations

The Aryan Nations logo.The Aryan Nations logo. [Source: Southern Poverty Law Center]Aerospace engineer and white racist Richard Butler, who departed California in the early 1970s and moved into a rural farmhouse in Hayden Lake, Idaho, founds and develops one of the nation’s most notorious and violent white separatist groups, the Aryan Nations. Butler’s 20-acre farmhouse becomes the compound for the group and its affiliated church, the Church of Jesus Christ Christian; Butler and his nascent organization envision a “whites-only” “homeland” in the Pacific Northwest. At age 11, Butler read a serialized novel in Liberty Magazine, depicting the takeover of the US by “race-mixing Bolsheviks” that deeply impressed him. As a young man, he worked as an aeronautical engineer in India, where he was fascinated by the Indian caste structure and the concept of racial purity. In 1941 he left a Los Angeles church after concluding that the preacher was spreading Communist doctrine. During World War II, as an Army engineer, he became fascinated by the German military, and later recalls that he “was thrilled to see the movies of the marching Germans.… In those days, all we knew was that Hitler hated communists, and so did my folks—as we did as teenagers.” In the 1950s, Butler was enthralled by radio broadcasts of then-Senator Joseph McCarthy (R-WI) and his “Red scare” accusations, and sent money to support McCarthy’s political campaigns. During that time, Butler met William Potter Gale, another white supremacist who went on to found the Posse Comitatus (see 1969). Butler held a high position in the Christian Defense League, an organization founded by the Reverend Wesley Swift and described by the Southern Poverty Law Center (SPLC) as “virulently anti-Semitic,” until 1965, and shortly thereafter became a mail-order “ordained minister” of Christian Identity, a white supremacist offshoot of the Christian church (see 1960s and After). Butler buys the farmhouse in Hayden Lake and founds his own “Christian Posse Comitatus,” and thereafter founds the Church of Jesus Christ Christian. The two groups merge into what later becomes known as Aryan Nations. [Washington Post, 6/2/2003; Southern Poverty Law Center, 2010; Southern Poverty Law Center, 2010]

Entity Tags: William Potter Gale, Wesley Swift, Joseph McCarthy, Richard Girnt Butler, Church of Jesus Christ Christian, Posse Comitatus, Christian Defense League, Aryan Nations, Southern Poverty Law Center

Timeline Tags: US Domestic Terrorism

President Nixon meets with FBI Director J. Edgar Hoover, CIA Director Richard Helms, and the heads of the NSA and DIA to discuss a proposed new domestic intelligence system. His presentation is prepared by young White House aide Tom Charles Huston (derisively called “Secret Agent X-5” behind his back by some White House officials). The plan is based on the assumption that, as Nixon says, “hundreds, perhaps thousands, of Americans—mostly under 30—are determined to destroy our society.” Nixon complains that the various US intelligence agencies spend as much time battling with one another over turf and influence as they do working to locate threats to national security both inside and outside of the country. The agencies need to prove the assumed connections between the antiwar demonstrators and Communists. The group in Nixon’s office will now be called the “Interagency Committee on Intelligence,” Nixon orders, with Hoover chairing the new ad hoc group, and demands an immediate “threat assessment” about domestic enemies to his administration. Huston will be the White House liaison. Historian Richard Reeves will later write: “The elevation of Huston, a fourth-level White House aide, into the company of Hoover and Helms was a calculated insult. Nixon was convinced that both the FBI and the CIA had failed to find the links he was sure bound domestic troubles and foreign communism. But bringing them to the White House was also part of a larger Nixon plan. He was determined to exert presidential control over the parts of the government he cared most about—the agencies dealing with foreign policy, military matters, intelligence, law, criminal justice, and general order.” [Reeves, 2001, pp. 229-230]

Entity Tags: Richard Reeves, Tom Charles Huston, Central Intelligence Agency, Defense Intelligence Agency, Federal Bureau of Investigation, J. Edgar Hoover, Richard M. Nixon, Richard Helms, National Security Agency

Timeline Tags: Civil Liberties, Nixon and Watergate

President Nixon approves the “Huston Plan” for greatly expanding domestic intelligence-gathering by the FBI, CIA and other agencies. Four days later he rescinds his approval. [Washington Post, 2008] Nixon aide Tom Charles Huston comes up with the plan, which involves authorizing the CIA, FBI, NSA, and military intelligence agencies to escalate their electronic surveillance of “domestic security threats” in the face of supposed threats from Communist-led youth agitators and antiwar groups (see June 5, 1970). The plan would also authorize the surreptitious reading of private mail, lift restrictions against surreptitious entries or break-ins to gather information, plant informants on college campuses, and create a new, White House-based “Interagency Group on Domestic Intelligence and Internal Security.” Huston’s Top Secret memo warns that parts of the plan are “clearly illegal.” Nixon approves the plan, but rejects one element—that he personally authorize any break-ins. Nixon orders that all information and operations to be undertaken under the new plan be channeled through his chief of staff, H. R. Haldeman, with Nixon deliberately being left out of the loop. The first operations to be undertaken are using the Internal Revenue Service to harass left-wing think tanks and charitable organizations such as the Brookings Institution and the Ford Foundation. Huston writes that “[m]aking sensitive political inquiries at the IRS is about as safe a procedure as trusting a whore,” since the administration has no “reliable political friends at IRS.” He adds, “We won’t be in control of the government and in a position of effective leverage until such time as we have complete and total control of the top three slots of the IRS.” Huston suggests breaking into the Brookings Institute to find “the classified material which they have stashed over there,” adding: “There are a number of ways we could handle this. There are risks in all of them, of course; but there are also risks in allowing a government-in-exile to grow increasingly arrogant and powerful as each day goes by.” [Reeves, 2001, pp. 235-236] In 2007, author James Reston Jr. will call the Huston plan “arguably the most anti-democratic document in American history… a blueprint to undermine the fundamental right of dissent and free speech in America.” [Reston, 2007, pp. 102]

Entity Tags: US Department of Defense, National Security Agency, Richard M. Nixon, Brookings Institution, Central Intelligence Agency, Federal Bureau of Investigation, Ford Foundation, Internal Revenue Service, Tom Charles Huston, James Reston, Jr

Timeline Tags: Civil Liberties, Nixon and Watergate

July 26-27, 1970: Nixon Rejects Huston Plan

After President Nixon approves of the so-called “Huston Plan” to implement a sweeping new domestic intelligence and internal security apparatus (see July 14, 1970), FBI director J. Edgar Hoover brings the plan’s author, White House aide Tom Charles Huston (see June 5, 1970), into his office and vents his disapproval. The “old ways” of unfettered wiretaps, political infiltration, and calculated break-ins and burglaries are “too dangerous,” he tells Huston. When, not if, the operations are revealed to the public, they will open up scrutiny of US law enforcement and intelligence agencies, and possibly reveal other, past illegal domestic surveillance operations that would embarrass the government. Hoover says he will not share FBI intelligence with other agencies, and will not authorize any illegal activities without President Nixon’s personal, written approval. The next day, Nixon orders all copies of the decision memo collected, and withdraws his support for the plan. [Reeves, 2001, pp. 236-237] W. Mark Felt, the deputy director of the FBI, later calls Huston “a kind of White House gauleiter over the intelligence community.” Washington Post reporter Bob Woodward will note that the definition of “gauleiter” is, according to Webster’s Dictionary, “the leader or chief officoal of a political district under Nazi control.” [Woodward, 2005, pp. 33-34]

Entity Tags: W. Mark Felt, Tom Charles Huston, J. Edgar Hoover, Federal Bureau of Investigation, Central Intelligence Agency, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

The US Supreme Court, in what becomes informally known as the “Keith case,” upholds, 8-0, an appellate court ruling that strikes down warrantless surveillance of domestic groups for national security purposes. The Department of Justice had wiretapped, without court warrants, several defendants charged with destruction of government property; those wiretaps provided key evidence against the defendants. Attorney General John Mitchell refused to disclose the source of the evidence pursuant to the “national security” exception to the Omnibus Crime Control and Safe Streets Act of 1968. The courts disagreed, and the government appealed the decision to the Supreme Court, which upheld the lower courts’ rulings against the government in a unanimous verdict. The Court held that the wiretaps were an unconstitutional violation of the Fourth Amendment, establishing the judicial precedent that warrants must be obtained before the government can wiretap a US citizen. [US Supreme Court, 6/19/1972; Bernstein and Woodward, 1974, pp. 258-259] Critics of the Nixon administration have long argued that its so-called “Mitchell Doctrine” of warrantlessly wiretapping “subversives” has been misused to spy on anyone whom Nixon officials believe may be political enemies. [Bernstein and Woodward, 1974, pp. 258-259] As a result of the Supreme Court’s decision, Congress passes the Foreign Intelligence Surveillance Act. [John Conyers, 5/14/2003]
Opinion of Justice Powell - Writing for the Court, Justice Lewis Powell observes: “History abundantly documents the tendency of Government—however benevolent and benign its motives—to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the government attempts to act under so vague a concept as the power to protect ‘domestic security.’ Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent.” [US Supreme Court, 6/19/1972]
Justice Department Wiretapped Reporters, Government Officials - In February 1973, the media will report that, under the policy, the Justice Department had wiretapped both reporters and Nixon officials themselves who were suspected of leaking information to the press (see May 1969 and July 26-27, 1970), and that some of the information gleaned from those wiretaps was given to “Plumbers” E. Howard Hunt and G. Gordon Liddy for their own political espionage operations. [Bernstein and Woodward, 1974, pp. 258-259]
Conyers Hails Decision 30 Years Later - In 2003, Representative John Conyers (D-MI) will say on the floor of the House: “Prior to 1970, every modern president had claimed ‘inherent Executive power’ to conduct electronic surveillance in ‘national security’ cases without the judicial warrant required in criminal cases by the Fourth Amendment to the Constitution. Then Attorney General John Mitchell, on behalf of President Richard Nixon sought to wiretap several alleged ‘domestic’ terrorists without warrants, on the ground that it was a national security matter. Judge [Damon] Keith rejected this claim of the Sovereign’s inherent power to avoid the safeguard of the Fourth Amendment. He ordered the government to produce the wiretap transcripts. When the Attorney General appealed to the US Supreme Court, the Court unanimously affirmed Judge Keith. The Keith decision not only marked a watershed in civil liberties protection for Americans. It also led directly to the current statutory restriction on the government’s electronic snooping in national security cases.” [John Conyers, 5/14/2003]

Entity Tags: Lewis Powell, US Supreme Court, John Mitchell, E. Howard Hunt, US Department of Justice, G. Gordon Liddy, ’Plumbers’, Damon Keith, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

CIA Counterintelligence Director James Angleton.CIA Counterintelligence Director James Angleton. [Source: CI Centre.com]CIA Director James Schlesinger orders an internal review of CIA surveillance operations against US citizens. The review finds dozens of instances of illegal CIA surveillance operations against US citizens dating back to the 1950s, including break-ins, wiretaps, and the surreptitious opening of personal mail. The earlier surveillance operations were not directly targeted at US citizens, but against “suspected foreign intelligence agents operating in the United States.” Schlesinger is disturbed to find that the CIA is currently mounting illegal surveillance operations against antiwar protesters, civil rights organizations, and political “enemies” of the Nixon administration. In the 1960s and early 1970s, CIA agents photographed participants in antiwar rallies and other demonstrations. The CIA also created a network of informants who were tasked to penetrate antiwar and civil rights groups and report back on their findings. At least one antiwar Congressman was placed under surveillance, and other members of Congress were included in the agency’s dossier of “dissident Americans.” As yet, neither Schlesinger nor his successor, current CIA Director William Colby, will be able to learn whether or not Schlesinger’s predecessor, Richard Helms, was asked by Nixon officials to perform such illegal surveillance, though both Schlesinger and Colby disapproved of the operations once they learned of them. Colby will privately inform the heads of the House and Senate Intelligence Committees of the domestic spying engaged in by his agency. The domestic spying program was headed by James Angleton, who is still serving as the CIA’s head of counterintelligence operations, one of the most powerful and secretive bureaus inside the agency. It is Angleton’s job to maintain the CIA’s “sources and methods of intelligence,” including the prevention of foreign “moles” from penetrating the CIA. But to use counterintelligence as a justification for the domestic spying program is wrong, several sources with first-hand knowledge of the program will say in 1974. “Look, that’s how it started,” says one. “They were looking for evidence of foreign involvement in the antiwar movement. But that’s not how it ended up. This just grew and mushroomed internally.” The source continues, speaking hypothetically: “Maybe they began with a check on [Jane] Fonda. They began to check on her friends. They’d see her at an antiwar rally and take photographs. I think this was going on even before the Huston plan” (see July 26-27, 1970 and December 21, 1974). “This wasn’t a series of isolated events. It was highly coordinated. People were targeted, information was collected on them, and it was all put on [computer] tape, just like the agency does with information about KGB agents. Every one of these acts was blatantly illegal.” Schlesinger begins a round of reforms in the CIA, a program continued by Colby. [New York Times, 12/22/1974 pdf file]

Entity Tags: William Colby, Senate Intelligence Committee, Richard Helms, James Angleton, Jane Fonda, Nixon administration, Central Intelligence Agency, James R. Schlesinger, House Intelligence Committee

Timeline Tags: Civil Liberties

Former CIA director Richard Helms.Former CIA director Richard Helms. [Source: Search.com]Former CIA director Richard Helms indirectly confirms the involvement of the Nixon administration in his agency’s illegal domestic surveillance operations during his testimony before the Senate Watergate investigative committee. Helms tells the committee that he was told by Nixon’s Foreign Intelligence Advisory Board that the CIA could “make a contribution” in domestic intelligence operations. “I pointed out to them very quickly that it could not, there was no way,” Helms testifies. “But this was a matter that kept coming up in the context of feelers: Isn’t there somebody else who can take on these things if the FBI isn’t doing them as well as they should, as there are no other facilities?” (FBI director J. Edgar Hoover’s opposition to the idea of spying on US citizens for Nixon’s political purposes is well documented.) CIA officials say that, despite Helms’s testimony, Helms began the domestic spying program as asked, in the beginning to investigate beliefs that the antiwar movement was permeated by foreign intelligence agents in 1969 and 1970. “It started as a foreign intelligence operation and it bureaucratically grew,” one source says in 1974. “That’s really the answer.” The CIA “simply began using the same techniques for foreigners against new targets here.” The source will say James Angleton, the CIA’s director of counterintelligence (see 1973), began recruiting double agents inside the antiwar and civil rights organizations, and sending in “ringers” to penetrate the groups and report back to the CIA. “It was like a little FBI operation.” Angleton reportedly believes that both the protest groups and the US media are riddled with Soviet intelligence agents, and acts accordingly to keep those groups and organizations under constant watch. One source will say Angleton has a “spook mentality.” Another source will say that Angleton’s counterintelligence bureau is “an independent power in the CIA. Even people in the agency aren’t allowed to deal directly with the CI [counterintelligence] people. Once you’re in it, you’re in it for life.” [New York Times, 12/22/1974 pdf file]

Entity Tags: Senate Watergate Investigative Committee, Richard Helms, J. Edgar Hoover, James Angleton, Issuetsdeah

Timeline Tags: Civil Liberties, Nixon and Watergate

Nelson Rockefeller is sworn in as vice president (see August 20, 1974). [Rockefeller Family Archives, 6/7/2007]
Bad Blood and Confirmation Difficulties - Rockefeller has trouble even before taking office. Branded as a liberal by many in the Republican Party, and winning as many enemies as friends with his outsized ego and gladhanding demeanor, Rockefeller garnered swift and obdurate resistance particularly from the right wing both outside the White House (see August 24, 1974) and in (see September 21, 1974 and After). During the Senate’s confirmation hearings, many Democrats and some Republicans relished forcing Rockefeller, one of the wealthiest men in the country, to open his finances to public scrutiny. Even President Ford privately expresses his astonishment. “Can you imagine?” he asked during the hearings. “Nelson lost $30 million in one year and it didn’t make any difference.” When it was revealed that Rockefeller had given huge personal contributions to lawmakers and government officials—including Secretary of State Henry Kissinger—in the form of “loans” that never needed repaying, the Senate hearings became even more inquisitorial. The hearings dragged on for months until Ford personally intervened, telling House and Senate leaders that it was “in the national interest that you confirm Rockefeller, and I’m asking you to move as soon as possible.” [US Senate, 7/7/2007]
Cheney Wanted Reagan - Deputy Chief of Staff Dick Cheney, far more conservative than either Ford or Rockefeller, opposes Rockefeller’s influence from the start, and works with his boss, Chief of Staff Donald Rumsfeld, to minimize Rockefeller’s influence. In 1986, Cheney will say that Ford “should have thought of Ronald Reagan as vice president in the summer of 1974, if you are talking strictly in political terms.” [Dubose and Bernstein, 2006, pp. 38]
Domestic Squabbles - Both Ford and Rockefeller want the new vice president to be what Ford calls “a full partner” in his administration, particularly on domestic issues. Ford appoints him to chair the Domestic Council, but behind the scenes, Rockefeller’s implacable enemy, Rumsfeld, who sees Rockefeller as a “New Deal” economic liberal, blocks his influence at every term, both from personal and ideological dislike and from a desire to keep power in the White House to himself and his small, close-knit aides. (Cheney, ever attentive to indirect manipulations, inflames Rumsfeld’s dislike of Rockefeller even further by suggesting to his nakedly ambitious boss that if Rockefeller was too successful in implementing domestic policy, he would be perceived as “the man responsible for drafting the agenda of 1976,” thus limiting Rumsfeld’s chances of being named vice president in Ford’s re-election campaign (see November 4, 1975 and After). When Rockefeller tries to implement Ford’s suggested policy that domestic policymakers report to Ford through Rockefeller, Rumsfeld interferes. When Rockefeller names one of his trusted assistants, James Cannon, to head the Domestic Council, Rumsfeld slashes the Council’s budget almost to zero. When Rockefeller proposes a $100 billion Energy Independence Authority, with the aim to reduce and perhaps even end the nation’s dependency on foreign energy sources, Rumsfeld joins Ford’s economic and environmental advisers to block its creation. When Rockefeller proposes an idea for the president to Rumsfeld, Rumsfeld hands it off to Cheney, who ensures that it dies a quiet, untraceable bureaucratic death.
Rockefeller Neutralized - Cheney later recalls that Rockefeller “came to a point where he was absolutely convinced that Don Rumsfeld and myself were out to scuttle whatever new initiatives he could come up with.” Rumsfeld and other Ford staffers ensure that Rockefeller is not involved in key policy meetings; when Ford proposes large cuts in federal taxes and spending, Rockefeller complains, “This is the most important move the president has made, and I wasn’t even consulted.” Asked what he is allowed to do as vice president, Rockefeller answers: “I go to funerals. I go to earthquakes.” He says, only half sardonically, that redesigning the vice-presidential seal is “the most important thing I’ve done.” [Dubose and Bernstein, 2006, pp. 38-39; US Senate, 7/7/2007]
Following in Rockefeller's Footsteps - Ironically, when Cheney becomes vice president in 2001, he uses what Rockefeller intended to do as a model for his own, extremely powerful vice presidency. James Cannon, who came into the Ford administration with Rockefeller, will marvel in 2006, “Cheney is now doing what he and Rumsfeld blocked Rockefeller from doing—influencing policy.” [Dubose and Bernstein, 2006, pp. 39-40]

Entity Tags: Ronald Reagan, Nelson Rockefeller, Richard (“Dick”) Cheney, Ford administration, Donald Rumsfeld, Gerald Rudolph Ford, Jr, Henry A. Kissinger, James Cannon

Timeline Tags: Nixon and Watergate

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Vice President Nelson Rockefeller (see December 19, 1974 and After) is instrumental in keeping Senate Democrats from finding out too much about the intelligence community’s excesses. When the New York Times reveals the existence of a decades-old illegal domestic surveillance program run by the CIA (see December 21, 1974), President Ford heads off calls from Democrats to investigate the program by appointing the “Rockefeller Commission” to investigate in the Democrats’ stead. Senate Democrats, unimpressed with the idea, create the Church Committee to investigate the intelligence community (see April, 1976). Rockefeller is adept at keeping critical documents out of the hands of the Church Committee and the press. When Senator Frank Church asks for materials from the White House, he is told that the Rockefeller Commission has them; when he asks Rockefeller for the papers, he is told that he cannot have them because only the president can authorize access. One Church aide later calls Rockefeller “absolutely brilliant” in denying them access in a friendly manner. “He winked and smiled and said, ‘Gee, I want to help you but, of course I can’t—not until we’ve finished our work and the president approves it,’” the aide recalls. Senator John Tower (R-TX), the vice chairman of the committee, will later reflect, “We were very skillfully finessed.” But even Rockefeller, who has his own history of involvement with the CIA, is taken aback at the excesses of the CIA, particularly its history of assassinating foreign leaders. Rockefeller will eventually turn that information over to the Church Committee, giving that body some of the most explosive evidence as yet made public against the agency. [US Senate, 7/7/2007]

Entity Tags: John Tower, Church Committee, Nelson Rockefeller, Central Intelligence Agency, Frank Church, Gerald Rudolph Ford, Jr, ’Rockefeller Commission’

Timeline Tags: Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” [Dubose and Bernstein, 2006, pp. 34-35]

Entity Tags: Seymour Hersh, US Department of Defense, Ford administration, Edward Levi, Donald Rumsfeld, Church Committee, Richard (“Dick”) Cheney, Philip Buchan, New York Times, Gerald Rudolph Ford, Jr

Timeline Tags: Civil Liberties

The Senate Select Committee to Study Governmental Operations releases its report, “Alleged Assassination Plots Involving Foreign Leaders,” which finds “concrete evidence of at least eight plots involving the CIA to assassinate Fidel Castro from 1960 to 1965.” [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, US Congress

Timeline Tags: US-Cuba (1959-2005)

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]

Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News

Timeline Tags: Civil Liberties

President Ford issues Executive Order 11905, which limits the power of the CIA, the NSA, and military intelligence to engage in surveillance of US citizens. Perhaps its most well-known provision is a total ban on “political assassinations” by US government personnel. [Gerald R. Ford, 2/18/1976; Roberts, 2008, pp. 38] The provision is sparked by the Church Commission’s finding (see April, 1976) that assassination is “unacceptable in our society,” and a political embarassment, especially botched attempts such as the CIA’s efforts to kill Cuba’s Fidel Castro. [Grant J. Lilly, 4/6/2006]

Entity Tags: Church Commission, Gerald Rudolph Ford, Jr, National Security Agency, Central Intelligence Agency

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Advertisement for Nixon/Frost interviews.Advertisement for Nixon/Frost interviews. [Source: Bamboo Trading (.com)]Former President Richard Nixon, generally acknowledged as having bested his interviewer David Frost in the first rounds of interviews (see April 6, 1977), now defends his support for the infamous Huston Plan, admitted by the plan’s author himself to be illegal in its breathtaking contempt for civil liberties and the rule of Constitutional law. Former Watergate prosecutor Philip Lacovara had told Frost’s aide James Reston Jr. that it was surprising Huston was not taken out and shot. Reston will write acidly: “Not only was Tom Charles Huston not taken out and shot, the plan was calmly considered and signed by Nixon, and was in force for a week, until J. Edgar Hoover objected on territorial rather than philosophical grounds (see July 26-27, 1970). Only then was approval rescinded (although many felt it remained in effect under the code name COINTELPRO).” Reston will write that, during this interview, Nixon paints a picture of an America engulfed in armed insurrection, a portrait so convincing that the Huston Plan actually seems a rational response. Frost fails to press the point that the antiwar protests were largely nonviolent and not a threat to national security. [Reston, 2007, pp. 102-105] Frost does ask that if this was indeed so vital to national security, why not ask Congress to make such acts legal? “In theory,” Nixon replies, “this would be perfect, but in practice, it won’t work.” It would merely alert the targeted dissenters and raise a public outcry. [Time, 5/30/1977] This part of the interview sessions will be aired on May 19, 1977. [Landmark Cases, 8/28/2007]

Entity Tags: David Frost, Philip Lacovara, J. Edgar Hoover, Tom Charles Huston, Richard M. Nixon, James Reston, Jr

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

H. R. Haldeman’s “The Ends of Power.”H. R. Haldeman’s “The Ends of Power.” [Source: Amazon (.com)]Former Nixon aide H. R. Haldeman, in his autobiography The Ends of Power, advances his own insider theory of the genesis of the Watergate burglaries (see July 26-27, 1970). Haldeman, currently serving a one-year prison sentence for perjuring himself during his testimony about the Watergate cover-up, became so angered while watching David Frost interview former President Nixon, and particularly Nixon’s attempts to pin the blame for Watergate on Haldeman and fellow aide John Ehrlichman (see April 15, 1977), that he decided to write the book to tell his version of events. Some of his assertions:
Nixon, Colson Behind 'Plumbers;' Watergate Burglary 'Deliberately Sabotaged' - He writes that he believes then-President Nixon ordered the operation that resulted in the burglaries and surveillance of the Democratic National Committee (DNC) headquarters because he and Charles Colson, the aide who supervised the so-called “Plumbers” (see Late June-July 1971), were both “infuriated with [DNC chairman Lawrence] O’Brien’s success in using the ITT case against them” (see February 22, 1972). Colson, whom Haldeman paints as Nixon’s “hit man” who was the guiding spirit behind the “Plumbers,” then recruited another White House aide, E. Howard Hunt, who brought in yet another aide, G. Gordon Liddy. Haldeman goes into a more interesting level of speculation: “I believe the Democratic high command knew the break-in was going to take place, and let it happen. They may even have planted the plainclothesman who arrested the burglars. I believe that the CIA monitored the Watergate burglars throughout. And that the overwhelming evidence leads to the conclusion that the break-in was deliberately sabotaged.” O’Brien calls Haldeman’s version of events “a crock.” As for Haldeman’s insinuations that the CIA might have been involved with the burglaries, former CIA director Richard Helms says, “The agency had nothing to do with the Watergate break-in.” Time magazine’s review of the book says that Haldeman is more believable when he moves from unverifiable speculation into provable fact. One such example is his delineation of the conspiracy to cover up the burglaries and the related actions and incidents. Haldeman writes that the cover-up was not a “conspiracy” in the legal sense, but was “organic,” growing “one step at a time” to limit political damage to the president.
Story of Kennedy Ordering Vietnamese Assassination Actually True - He suggests that the evidence Hunt falsified that tried to blame former president John F. Kennedy of having then-South Vietnamese President Ngo Dinh Diem assassination (see Mid-September 1971) may have pointed to the actual truth of that incident, hinting that Kennedy may have ordered the assassination after all.
US Headed Off Two Potentially Catastrophic Nuclear Incidents with USSR, China - He also writes of a previously unsuspected incident where Nixon and other US officials convinced the Soviets not to attack Chinese nuclear sites. And Haldeman tells of a September 1970 incident where the US managed to head off a second Cuban Missile Crisis. Both stories of US intervention with the Soviets are strongly denied by both of Nixon’s Secretaries of State, Henry Kissinger, and William Rogers.
Duality of Nixon's Nature - Haldeman says that while Nixon carried “greatness in him,” and showed strong “intelligence, analytical ability, judgment, shrewdness, courage, decisiveness and strength,” he was plagued by equally powerful flaws. Haldeman writes that Nixon had a “dirty, mean, base side” and “a terrible temper,” and describes him as “coldly calculating, devious, craftily manipulative… the weirdest man ever to live in the White House.” For himself, Haldeman claims to have always tried to give “active encouragement” to the “good” side of Nixon and treat the “bad” side with “benign neglect.” He often ignored Nixon’s “petty, vindictive” orders, such as giving mass lie detector tests to employees of the State Department as a means of finding security leaks. He writes that while he regrets not challenging Nixon more “frontally” to counter the president’s darker impulses, he notes that other Nixon aides who had done so quickly lost influence in the Oval Office. Colson, on the other hand, rose to a high level of influence by appealing to Nixon’s darker nature. Between the two, Haldeman writes, the criminal conspiracy of Watergate was created. (Colson disputes Haldeman’s depiction of his character as well as the events of the conspiracy.) Haldeman himself never intended to do anything illegal, denies any knowledge of the “Gemstone” conspiracy proposal (see January 29, 1972), and denies ordering his aide Gordon Strachan to destroy evidence (see June 18-19, 1972).
Reconstructing the 18 1/2 Minute Gap - Haldeman also reconstructs the conversation between himself and Nixon that was erased from the White House tapes (see June 23, 1972 and July 13-16, 1973). Time notes that Haldeman reconstructs the conversation seemingly to legally camouflage his own actions and knowledge, “possibly to preclude further legal charges against him…” According to Haldeman’s reconstruction, Nixon said, “I know one thing. I can’t stand an FBI interrogation of Colson… Colson can talk about the president, if he cracks. You know I was on Colson’s tail for months to nail Larry O’Brien on the [Howard] Hughes deal (see April 30 - May 1, 1973; O’Brien had worked for Hughes, and Nixon was sure O’Brien had been involved in illegalities). Colson told me he was going to get the information I wanted one way or the other. And that was O’Brien’s office they were bugging, wasn’t it? And who’s behind it? Colson’s boy Hunt. Christ. Colson called [deputy campaign chief Jeb Magruder] and got the whole operation started. Right from the g_ddamn White House… I just hope the FBI doesn’t check the office log and put it together with that Hunt and Liddy meeting in Colson’s office.” Time writes, “If the quotes are accurate, Nixon is not only divulging his own culpability in initiating the bugging but is also expressing a clear intent to keep the FBI from learning about it. Thus the seeds of an obstruction of justice have been planted even before the celebrated June 23 ‘smoking gun’ conversation, which ultimately triggered Nixon’s resignation from office.” Haldeman says he isn’t sure who erased the tape, but he believes it was Nixon himself. Nixon intended to erase all the damning evidence from the recordings, but since he was, Haldeman writes, “the least dexterous man I have ever known,” he quickly realized that “it would take him ten years” to erase everything.
'Smoking Gun' Allegations - Haldeman also makes what Time calls “spectacular… but unverified” allegations concerning the June 23, 1972 “smoking gun” conversations (see June 23, 1972). The focus of that day’s discussion was how the White House could persuade the CIA to head off the FBI’s investigation of the Watergate burglary. The tape proved that Nixon had indeed attempted to block the criminal investigation into Watergate, and feared that the money found on the burglars would be traced back to his own re-election campaign committee. Haldeman writes that he was confused when Nixon told him to tell the CIA, “Look, the problem is that this will open up the whole Bay of Pigs thing again.” When Haldeman asked Helms to intercede with the FBI, and passed along Nixon’s warning that “the Bay of Pigs may be blown,” Helms’s reaction, Haldeman writes, was electric. “Turmoil in the room, Helms gripping the arms of his chair, leaning forward and shouting, ‘The Bay of Pigs had nothing to do with this. I have no concern about the Bay of Pigs.’” Haldeman writes, “I was absolutely shocked by Helms‘[s] violent reaction. Again I wondered, what was such dynamite in the Bay of Pigs story?” Haldeman comes to believe that the term “Bay of Pigs” was a reference to the CIA’s secret attempts to assassinate Cuban dictator Fidel Castro. The CIA had withheld this info from the Warren Commission, the body that investigated the assassination of President Kennedy, and Haldeman implies that Nixon was using the “Bay of Pigs thing” as some sort of blackmail threat over the CIA. Haldeman also hints, very vaguely, that Nixon, when he was vice president under Dwight D. Eisenhower, was a chief instigator of the actual Bay of Pigs invasion. (Time notes that while Vice President Nixon probably knew about the plans, “he certainly had not been their author.”)
Other Tidbits - Haldeman writes that Nixon’s taping system was created to ensure that anyone who misrepresented what Nixon and others said in the Oval Office could be proven wrong, and that Nixon had Kissinger particularly in mind. Nixon kept the tapes because at first he didn’t believe he could be forced to give them up, and later thought he could use them to discredit former White House counsel John Dean. He says Nixon was wrong in asserting that he ordered Haldeman to get rid of the tapes. Haldeman believes the notorious “deep background” source for Washington Post reporters Carl Bernstein and Bob Woodward was actually Fred Fielding, Dean’s White House deputy. Interestingly, Haldeman apparently discovered the real identity of “Deep Throat” in 1972 to be senior FBI official W. Mark Felt (see October 19, 1972). It is unclear why Haldeman now writes that Fielding, not Felt, was the Post source.
Not a Reliable Source - Time notes that Haldeman’s book is far from being a reliable source of information, characterizing it as “badly flawed, frustratingly vague and curiously defensive,” and notes that “[m]any key sections were promptly denied; others are clearly erroneous.” Time concludes, “Despite the claim that his aim was finally to ‘tell the truth’ about the scandal, his book is too self-protective for that.” And it is clear that Haldeman, though he writes how the cover-up was “morally and legally the wrong thing to do—so it should have failed,” has little problem being part of such a criminal conspiracy. The biggest problem with Watergate was not that it was illegal, he writes, but that it was handled badly. He writes, “There is absolutely no doubt in my mind today that if I were back at the starting point, faced with the decision of whether to join up, even knowing what the ultimate outcome would be, I would unhesitatingly do it.” [Time, 2/27/1978; Spartacus Schoolnet, 8/2007]

Entity Tags: Fred F. Fielding, William P. Rogers, E. Howard Hunt, Democratic National Committee, David Frost, Charles Colson, W. Mark Felt, Bob Woodward, Carl Bernstein, US Department of State, Lawrence O’Brien, Richard Helms, John Dean, Jeb S. Magruder, Howard Hughes, Henry A. Kissinger, Gordon Strachan, Dwight Eisenhower, Richard M. Nixon, H.R. Haldeman, John F. Kennedy

Timeline Tags: Nixon and Watergate

A photograph of Theodore ‘Ted’ Kaczynski, taken in 1968 while Kaczynski was a young faculty member at the University of California at Berkeley.A photograph of Theodore ‘Ted’ Kaczynski, taken in 1968 while Kaczynski was a young faculty member at the University of California at Berkeley. [Source: George M. Bergman / Wikimedia]An unmailed package is found in a car park at the University of Illinois, Chicago, and brought to Northwestern University in Evanston, Illinois, because of its return address; the addressee now teaches at Rensselaer Polytechnic Institute in Troy, New York. Buckley Crist, the material sciences professor named in the return address on the package cannot identify it, and turns it over to campus security. When Northwestern police officer Terry Marker opens it, it explodes, injuring him slightly. The package contains a pipe bomb packed in a carved wooden box. [BBC, 11/12/1987; Washington Post, 4/14/1996; Washington Post, 1998] The bomb is made of a nine-inch pipe filled with explosive powders and triggered by a nail held by rubber bands that strikes and ignites match heads when the box is opened. [World of Forensic Science, 1/1/2005] The package contains 10 $1 commemorative Eugene O’Neill stamps on its outer wrapper. Authorities will later speculate that the bomber may have chosen the O’Neill stamps because the playwright was an ardent supporter of anarchists. [Knight Ridder, 5/28/1995] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). It is believed to be Kaczynski’s first bomb. [New York Times, 4/7/1996]

Entity Tags: Terry Marker, Northwestern University, Theodore J. (“Ted”) Kaczynski, Buckley Crist

Timeline Tags: US Domestic Terrorism

A young Fauzi Hasbi.A young Fauzi Hasbi. [Source: SBS Dateline]Fauzi Hasbi, the son of a separatist leader in the Indonesian province of Aceh, is captured by an Indonesian military special forces unit in 1979 and soon becomes a mole for the Indonesian government. Hasbi becomes a leader in the separatist Free Aceh Movement (GAM), and he also plays a long-time role in Jemaah Islamiyah, an al-Qaeda affiliate. For many years, he literally lives next door to Jemaah Islamiyah leaders Abu Bakar Bashir and Hambali (see April 1991-Late 2000). In 2005, the Australian television program SBS Dateline will present documents that it claims “prove beyond doubt that Fauzi Hasbi had a long association with the [Indonesian] military.” For instance, military documents dating from 1990 and 1995 give him specific spying tasks. [SBS Dateline, 10/12/2005] In February 2001, the Indonesian magazine Tempo documents some of Hasbi’s links to the Indonesian military, after he has been linked to a major role the Christmas bombings in Indonesia two months earlier (see December 24-30, 2000 and February 20, 2001). He admits to having some ties to certain high-ranking military figures and says he has had a falling out with GAM, but denies being a traitor to any militant group. [Tempo, 2/20/2001; Tempo, 2/27/2001] Yet even after this partial exposure, he continues to pose as an Islamist militant for the military. A 2002 document shows that he is even assigned the job of special agent for BIN, Indonesia’s intelligence agency. [SBS Dateline, 10/12/2005] A December 2002 report by a US think tank, the International Crisis Group, details his role as a government mole. He and two of his associates are abducted and killed in mysterious circumstances in the Indonesian city of Ambon on February 22, 2003. Seven suspects, including an Indonesian policeman, later admit to the killings but their motive for doing so remains murky. [Agence France-Presse, 5/22/2003]

Entity Tags: Tentara Nasional Indonesia, Jemaah Islamiyah, Free Aceh Movement, Badan Intelijen Negara, Fauzi Hasbi

Timeline Tags: Complete 911 Timeline

A graduate student at Northwestern University in Evanston, Illinois, John Harris, is injured when he opens a box left at the University’s Technological Institute. The box contains a bomb that explodes when opened. Harris suffers minor cuts and burns. [BBC, 11/12/1987; Washington Post, 1998] Authorities recognize fundamental similarities between this and a previous Northwestern University bombing (see May 25-26, 1978). This bomb is quite similar in construction to that one, though more sophisticated in construction and design. It consists of a cigar box and a pipe bomb, triggered by a battery-operated filament that ignites explosive powders. [World of Forensic Science, 1/1/2005] However, the package contains a number of small, finger-sized pieces of wood glued to its outer container. [Knight Ridder, 5/28/1995] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see May 25-26, 1978 and April 3, 1996).

Entity Tags: Theodore J. (“Ted”) Kaczynski, Northwestern University, John Harris

Timeline Tags: US Domestic Terrorism

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

A parcel mailed from Chicago catches fire in a mailbag aboard American Airlines Flight 444 from Chicago to Washington, DC. The package contains a bomb which was apparently constructed to explode inside the cargo hold. Twelve passengers are treated for smoke inhalation; the flight conducts an emergency landing at Dulles Airport near Washington. [BBC, 11/12/1987; Washington Post, 1998] The bomb does not ignite because instead of explosive powder, it contains barium nitrate, a powder often used to create green smoke in fireworks. [World of Forensic Science, 1/1/2005] The bombing is later shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). After the airline bombing and the subsequent bombing of a United Airlines executive (see June 10, 1980), the FBI ties the previous bombings (see May 25-26, 1978 and May 9, 1979) to this one and code-names the file UNABOM, for “UNiversity and Airline BOMber.” The media will soon dub the unknown assailant the “Unabomber.” [Washington Post, 4/4/1996; World of Forensic Science, 1/1/2005] Kaczynski will later express regret for trying to bomb the plane (see April 24, 1995).

Entity Tags: Washington Dulles International Airport, Theodore J. (“Ted”) Kaczynski, Federal Bureau of Investigation

Timeline Tags: US Domestic Terrorism

1980: Afghan Fighters Begin Training in US

Some fighters opposing the Soviets in Afghanistan begin training in the US. According to journalist John Cooley, the training is done by Navy Seals and Green Beret officers who have taken draconian secrecy oaths. Key Pakistani officers are trained, as well as some senior Afghan mujaheddin. Much of the training takes place in Camp Peary, near Williamsburg, Virginia, which is said to be the CIA’s main location for training spies and assets. Other training takes place at Fort Bragg, North Carolina, Harvey Point, North Carolina, and Fort A. P. Hill, Virginia. Subjects are trained in how to detect explosives, surveillance, how to recruit new agents, how to run paramilitary operations, and more. They are taught to use many different weapons as well, including remote-controlled mines and bombs, and sophisticated timers and explosives. Cooley claims that “apparently [no] Arab or other foreign volunteers” are trained in the US. [Cooley, 2002, pp. 70-72] However, in the late 1980s, US consular official Michael Springmann will notice fighters from many Middle Eastern nations are getting US visas, apparently to train in the US for the Afghan war (see September 1987-March 1989). Additionally, more training takes place in other countries. For instance, Cooley will note, “By the end of 1980, US military trainers were sent to Egypt to impart the skills of the US Special Forces to those Egyptians who would, in turn, pass on the training to the Egyptian volunteers flying to the aid of the mujaheddin in Afghanistan.” Cooley will further note, “Time and time again, these same techniques reappear among the Islamist insurgents in Upper Egypt and Algeria, since the ‘Afghani’ Arab veterans began returning there in the late 1980s and early 1990s.” [Cooley, 2002, pp. 70-72] It is not known how long these training programs continue.

Entity Tags: Green Berets, Central Intelligence Agency, Michael Springmann, Navy Seals

Timeline Tags: Complete 911 Timeline, War in Afghanistan

Nabih Berri in 1982.Nabih Berri in 1982. [Source: Reza / Corbis]Nabih Berri takes over the Amal Militia, a Shi’a Lebanese paramilitary organization, and tries to build it up as a power base for himself. Although not a fundamentalist Muslim, Berri allies himself with the new regime in Iran and Hezbollah, a fundamentalist Lebanese Shi’a party backed by Iran. Berri also manages to convince Syrian authorities that he will represent their interests in Lebanon and comes to a similar arrangement with the Ba’ath party in Iraq. This is a difficult balance for Berri to keep, as journalists Joe and Susan Trento will later point out, “If he displeased the Iranian mullahs who controlled the supply of money to Hezbollah in Lebanon, he would lose his grip on power.” Former intelligence officer Michael Pilgrim will comment, “Berri was targeted for CIA recruitment and so were members of his militia… I think it’s safe to say we financed his early trips to Iran.” He also commences relationships with the Drug Enforcement Agency and Defense Intelligence Agency. Unsurprisingly, some of the consequences of this are bad for the US, and the Trentos will comment: “The relationship would end in a series of deadly disasters for members of our armed services and the CIA. According to US intelligence officials who served in Lebanon at the time, Berri kept the peace with [Iran] and the Shi’a by allowing them to attack Westerners in his Amal-controlled territory. To prove his loyalty to the Shi’a and keep the alliance that was essential to his power base, he failed to pass on intelligence to the United States.” Based on interviews with former intelligence officers and associates of Berri, the Trentos will conclude that he facilitated attacks on the US by Hezbollah by allowing their operatives to pass Amal checkpoints without warning the US, for example before attacks on the US embassy and Marine barracks in 1983 in which hundreds die (see April 18-October 23, 1983). [Trento and Trento, 2006, pp. 74-77]

Entity Tags: Nabih Berri, Michael Pilgrim, Drug Enforcement Administration, Hezbollah, Amal, Defense Intelligence Agency, Central Intelligence Agency

Timeline Tags: US confrontation with Iran, Complete 911 Timeline

In his Lake Forest, Illinois, home, United Airlines president Percy Wood opens a package that apparently contains a book. It contains both a book and a bomb in the book’s hollowed-out pages. It explodes, causing Wood to suffer cuts and bruises. The initials “FC” are found etched on, or punched into, a piece of pipe from the bomb. [BBC, 11/12/1987; Washington Post, 1998; World of Forensic Science, 1/1/2005] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). “FC” will later be found to stand for “Freedom Club.” [Washington Post, 1/23/1998; World of Forensic Science, 1/1/2005] Authorities will later speculate that Wood may have been targeted in part because of Kaczynski’s strange fascination with wood; he often uses wood in the construction of his bombs. The hollowed-out book, Ice Brothers, is published by Arbor House, whose symbol is a tree leaf. [Associated Press, 4/25/1995] The package contains a note asking Wood to read the enclosed book, and noting, “You will find it of great social significance.” The author of Ice Brothers, Sloan Wilson, also wrote The Man in the Gray Flannel Suit, which, according to a 1959 biography of Wilson, “was the definitive epithet for the commuting suburbanite, the status-hungry conformist from Madison Avenue.” Like an earlier bomb (see May 25-26, 1978), this bomb’s package is mailed using postage stamps commemorating the playwright Eugene O’Neill; authorities will speculate that Kaczynski may have chosen the stamps because of O’Neill’s ardent support of anarchists. [Knight Ridder, 5/28/1995]

Entity Tags: Percy Wood, Theodore J. (“Ted”) Kaczynski

Timeline Tags: US Domestic Terrorism

A federal court rules that because of the government’s “state secrets” privilege (see March 9, 1953), a civilian plaintiff suing the US Navy over a contractual agreement cannot even access “non-privileged,” or unclassified, information from the Navy because to do so might “threaten disclosure” of material that goes against “the overriding interest of the United States… preservation of its state secrets privilege precludes any further attempt to pursue litigation.” [Siegel, 2008, pp. 196-197]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

A maintenance worker at the University of Utah in Salt Lake City finds a bomb in a business classroom. The device is defused by the local bomb squad and no one is injured. [BBC, 11/12/1987; Washington Post, 1998] The bomb will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996).

Entity Tags: Theodore J. (“Ted”) Kaczynski, University of Utah

Timeline Tags: US Domestic Terrorism

The winter issue of Kivunim, a “A Journal for Judaism and Zionism,” publishes “A Strategy for Israel in the Nineteen Eighties” by Oded Yinon. The paper, published in Hebrew, rejects the idea that Israel should carry through with the Camp David accords and seek peace. Instead, Yinon suggests that the Arab States should be destroyed from within by exploiting their internal religious and ethnic tensions: “Lebanon’s total dissolution into five provinces serves as a precedent for the entire Arab world including Egypt, Syria, Iraq, and the Arabian peninsula and is already following that track. The dissolution of Syria and Iraq later on into ethnically or religiously unique areas such as in Lebanon, is Israel’s primary target on the Eastern front in the long run, while the dissolution of the military power of those states serves as the primary short term target. Syria will fall apart, in accordance with its ethnic and religious structure, into several states such as in present day Lebanon.” [Kivunim, 2/1982]

Entity Tags: Oded Yinon

Timeline Tags: Alleged Use of False Flag Attacks

A parcel addressed to the head of the Vanderbilt University computer science department, Patrick Fischer, explodes, injuring Fischer’s secretary, Janet Smith. The package was originally sent to Fischer at Pennsylvania State University but was later forwarded to Nashville, Tennessee, where Vanderbilt University is located and where Fischer now teaches. [BBC, 11/12/1987; Washington Post, 1998] Fischer will later describe Smith’s injuries as “nasty lacerations,” and will say, “She made a full recovery, but it was very traumatic for her.” The bomb itself consists of smokeless powder and a large number of match heads. The package has a false return address, stating it comes from LeRoy Bearnson, a professor of electrical engineering at Utah’s Brigham Young University. Bearnson will later say, “I suppose the guy didn’t care which way it went or who got blown up.” FBI agent Oliver “Buck” Revell, who takes part in early phases of the bomb investigation, will later say: “He might pick out an individual, but the person was still a symbolic target to him. I suspect that once he targeted the university research system, it didn’t matter that much who received it. I suspect he felt the country would pick up the symbolism.” The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). When Fischer, along with the rest of the country, learns of Kaczynski’s identity, he will try to find connections between himself and Kaczynski, and come up with only the most tenuous of relationships: Fischer studied at the Massachusetts Institute of Technology (MIT) while Kaczynski studied at nearby Harvard, and Fischer may have shared a Harvard math class with Kaczynski. He also spent time in Salt Lake City, a city with which Kaczynski is familiar. “The agents made it very clear that I was the target,” Fischer will later say. “I still have no idea why, except my feeling is that he chose names at random with certain associations.” [Washington Post, 4/14/1996]

Entity Tags: Theodore J. (“Ted”) Kaczynski, Janet Smith, LeRoy Bearnson, Patrick Fischer, Vanderbilt University, Oliver (“Buck”) Revell

Timeline Tags: US Domestic Terrorism

An electrical engineering and computer science professor with the University of California at Berkeley, Diogenes Angelakos, picks up what he believes is a turpentine can, left in a common room in the computer science building during construction work. The can, a green, gallon-sized container, has wires dangling from it and a clock-dial attached to the wires. The device is a pipe bomb. It explodes, temporarily blinding Angelakos and severely burning his right hand. [BBC, 11/12/1987; Washington Post, 11/27/1993; Washington Post, 4/14/1996; Washington Post, 1998] The injuries to his hand and arm prevent him from effectively caring for his wife Helen in her final days; she will die a month later of terminal cancer. “I went to her funeral with my arm in a sling,” Angelakos will later recall. [Washington Post, 11/27/1993] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski once worked as a professor at UC-Berkeley.

Entity Tags: Diogenes Angelakos, Theodore J. (“Ted”) Kaczynski, University of California at Berkeley, Helen Angelakos

Timeline Tags: US Domestic Terrorism

President Reagan agrees “in principle” to send a small number of Marines to Lebanon as a peacekeeping force to keep a modicum of order in the ongoing civil war. The Marines will arrive in Lebanon on August 25, and will find themselves in the middle of bloody factional fighting between several Lebanese groups as well as Israeli invasion forces. [PBS, 2000] In October 1983, 241 Marines will die when a suicide bomber attacks their barracks (see April 18-October 23, 1983).

Entity Tags: Ronald Reagan

Timeline Tags: Iran-Contra Affair

In the second of two rulings in the case of Halkin v Helms, the judiciary comes down squarely on the side of the US government against charges of illegal surveillance and wiretapping leveled against American anti-war protesters. The district and appellate courts uphold the federal government’s “state secrets” claim as codified in US v Reynolds (see March 9, 1953), thereby denying the plaintiffs the right to see government information that they claim would prove their case. The DC Court of Appeals writes that the federal courts do not have any constitutional role as “continuing monitors of the wisdom and soundness of Executive action,” and instead the courts “should accord utmost deference to executive assertions of privilege on grounds of military or diplomatic secrets… courts need only be satisfied that there is a reasonable danger” that military secrets might be exposed. [Siegel, 2008, pp. 196-196]

Timeline Tags: Civil Liberties

The Port Authority of New York and New Jersey holds a drill at the World Trade Center based on the scenario of a plane crashing into one of the Twin Towers. Numerous agencies participate in the drill, which is held on a Sunday. As well as the Port Authority, these include the New York City Fire Department, the New York City Police Department, and the Emergency Medical Services. Guy Tozzoli, the director of the Port Authority’s World Trade Department, will describe the drill during a legislative hearing in 1993 (see (March 29, 1993)). He will recall that the Port Authority simulates the “total disaster” of “the airplane hitting the building” and participants simulate “blood coming out of people.” He will add that the drill is “a real preparation for a disaster.” [Newsday, 11/12/2001; Dwyer and Flynn, 2005, pp. 58-59] (During the hearing, Tozzoli will mistakenly recall the drill being conducted in the late 1970s, but it is in fact held in November 1982. [Dwyer and Flynn, 2005, pp. 274] ) The drill follows an incident in 1981, when an Argentine aircraft came within 90 seconds of crashing into the WTC’s North Tower as a result of having problems communicating with air traffic controllers (see February 20, 1981). Asked about the drill shortly after 9/11, Tozzoli will say it was held “just to have people trained within the city for that particular scenario [of a plane hitting the WTC].” The 1982 exercise appears to be the last “joint drill involving all the emergency responders” held at the WTC prior to the 9/11 attacks, 19 years later, according to New York Times reporters Jim Dwyer and Kevin Flynn. [Newsday, 11/12/2001; Dwyer and Flynn, 2005, pp. 59]

Entity Tags: Guy Tozzoli, New York City Police Department, Port Authority of New York and New Jersey, New York City Fire Department

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Youssef Nada.Youssef Nada. [Source: Zuma Press/ NewsCom]In November 2001, Swiss investigators will search the home of Youssef Nada, the leader of Al Taqwa Bank, a Swiss bank that had just been shut down by the US and the UN for alleged ties to al-Qaeda, Hamas, and other radical militant groups (see November 7, 2001). Nada and other Al Taqwa directors are prominent members of the Muslim Brotherhood. Newsweek will say, “The Brotherhood, founded in Egypt in 1928 as a religious and quasi-political counterweight to the corrupt and increasingly decadent royalist and colonial governments dominating the Islamic world, always has had two faces: one a peaceful public, proselytizing and social-welfare oriented wing; the other a clandestine, paramilitary wing.… Intelligence and law-enforcement officials say that while some branches and elements of the Brotherhood, such as the offshoots now operating in Egypt and Syria, have pledged to work for their goal of a worldwide Islamic caliphate using peaceful means and electoral politics, the Brotherhood has also spun off many—if not most—of the more violent local and international groups devoted to the cause of Islamic holy war.” Such offshoots will include al-Qaeda and Hamas. [Newsweek, 12/24/2004] Swiss investigators discover a 14-page document from December 1982 entitled “The Project.” Nada claims not to know who wrote the document or how he came to have it, and he says he disagrees with most of the contents. The document details a strategic plan whose ultimate goal is “the establishment of the reign of God over the entire world.” The document begins, “This report presents a global vision of an international strategy of Islamic policy.” It recommends to “study of the centers of power locally and worldwide, and the possibilities of placing them under influence,” to contact and support new holy war movements anywhere in the world, to support holy war in Palestine, and “nurtur[e] the sentiment of rancor with regard to Jews.” Swiss investigators who analyze the document will later write that the strategy aims to achieve “a growing influence over the Muslim world. It is pointed out that the [Muslim Brotherhood] doesn’t have to act in the name of the Brotherhood, but can infiltrate existing entities. They can thus avoid being located and neutralized.” The document also advocates creating a network of religious, educational, and charitable institutions in Europe and the US to increase influence there. [Unknown, 12/1982; Le Temps (Geneva), 10/6/2005]

Entity Tags: Muslim Brotherhood

Timeline Tags: Complete 911 Timeline

CSA members outside their Arkansas compound. Some CSA members also belong to the Elohim City community.CSA members outside their Arkansas compound. Some CSA members also belong to the Elohim City community. [Source: GifS (.com)]Three white supremacists living in the Elohim City, Oklahoma, compound (see 1973 and After) visit Oklahoma City and make plans to blow up the Murrah Federal Building there. The three are: James Ellison, the leader of the Covenant, Sword, and Arm of the Lord (CSA) who will be arrested in 1985 after a four-day standoff with federal authorities; Kerry Noble; and Richard Wayne Snell, who will be executed for murdering a black police officer and a businessman he erroneously believed to be Jewish (see 9:00 p.m. April 19, 1995). All three men have close ties to the neo-Nazi Aryan Nations (see Early 1970s). The evidence of their plan is released during the investigation of the 1995 Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995), and is collated by former US prosecutor Steven N. Snyder, who once worked out of the Fort Smith, Arkansas District Attorney’s office. The plan involves parking a van or trailer in front of the building and exploding it with rockets detonated by a timer. Snyder will come across the information on the bombing plot while preparing for the trial of a sedition case against a 14-man group of white supremacists, 10 of whom are charged with planning to overthrow the government. (All 14 will be acquitted in a 1988 trial—see Late 1987 - April 8, 1998.) Snyder will get the information from Ellison, who provides information to him as part of his role as chief witness for the prosecution. The other defendants in the trial, many of whom are believed to have had some connection to the bombing plot, will be Richard Butler, the head of Aryan Nations; Robert E. Miles, a former Klansman who heads the Mountain Church of Jesus Christ the Saviour in Cohoctah, Michigan; and Louis R. Beam Jr., a former grand dragon of the Texas Ku Klux Klan and “ambassador at large” of the Aryan Nations. Ellison will tell Snyder that in July 1983, he attends a meeting of extremist groups in Hayden Lake, Idaho, the location of the Aryan Nations headquarters, where he informs them of the death of fellow white supremacist Gordon Kahl in a gun battle with law enforcement agents in Arkansas (see March 13 - June 3, 1983). Snyder’s notes of Ellison’s statement read, “Kahl was the catalyst that made everyone come forth and change the organizations from thinkers to doers.” According to Ellison, the leaders of the various supremacist groups discuss how to overthrow the federal government, using as a sourcebook the novel The Turner Diaries (see 1978), which tells of a successful move by white supremacists to overthrow the government and then commit genocide against Jews and blacks. Ellison will tell Snyder that he volunteers to assassinate federal officials in Arkansas as part of the plot. The leaders discuss blowing up the Murrah Building in Oklahoma City, other federal buildings, and the Dallas office of a Jewish organization. According to Ellison’s trial testimony, in October 1983 Snell and another participant, Steve Scott, “asked me to design a rocket launcher that could be used to destroy these buildings from a distance.” Of Snell, Ellison will testify: “On one of the trips when I was with Wayne, he took me to some of the buildings and asked me to go in the building and check the building out. This kind of thing.” Ellison will tell Snyder that at Snell’s request, he surveills the Murrah Building to assess what it would take to damage and destroy it. He makes preliminary sketches and drawings. According to the preliminary plans, rocket launchers are to be “placed in a trailer or a van so that it could be driven up to a given spot, parked there, and a timed detonating device could be triggered so that the driver could walk away and leave the vehicle set in position, and he would have time to clear the area before any of the rockets launched.… And I was asked to make it so it would fit in either a trailer or a van or a panel truck.” Synder will later say that Snell is embittered towards the government because of the IRS, which took him to court and seized property from him for failure to pay taxes. But, Snyder will add, “you can’t be sure about any of this, because a federal raid, to a lot of these people, is any time the postman brings the mail.” Ellison will be taken into custody after a four-day standoff with state and federal authorities in 1985, only convinced to surrender after white supremacist Robert Millar talks him into giving up (see 1973 and After). Ellison will be convicted of racketeering charges and sentenced to 20 years in prison. He will enter the federal witness protection program until completing his parole and leaving the program on April 21, 1995, two days after the Oklahoma City bombing. [New York Times, 5/20/1995; Anti-Defamation League, 8/9/2002; Nicole Nichols, 2003]

Entity Tags: Louis R. Beam, Jr, James Ellison, Gordon Kahl, Elohim City, Covenant, Sword, and Arm of the Lord, Aryan Nations, Kerry Noble, Murrah Federal Building, Richard Girnt Butler, Robert Millar, Steve Scott, Steven N. Snyder, Richard Wayne Snell, Robert E. Miles

Timeline Tags: US Domestic Terrorism

Gordon Kahl, an anti-tax protester, Posse Comitatus member (see 1967 - 1973 and 1975 - 1981), and federal fugitive who killed two US Marshals in a February shootout in North Dakota (see February 13, 1983 and After), arrives at a farm in Mountain Home, Arkansas. The farm owner, Arthur Russell, is a member of another white supremacist organization, the Covenant, Sword, and Arm of the Lord (CSA), and willingly hides Kahl, who is facing a second warrant for his arrest issued March 11. Kahl spends two months hiding at Russell’s farmhouse, studying the Bible, watching television, and spending time with Russell’s daughter Karen. While Kahl is in hiding, his family and colleagues in the Posse who were involved in the shootout are tried in May 1983; his son Yorie Kahl and colleague Scott Faul are convicted of second-degree murder and six other related charges; David Broer is convicted of conspiracy and of harboring a fugitive; and his wife Joan Kahl is acquitted of conspiracy and harboring a fugitive.
FBI Learns of Kahl's Whereabouts - In late May, after the convictions, Kahl leaves the Russell farm with his CSA friend Leonard Ginter and Ginter’s wife Norma. Ginter, an unemployed carpenter, belongs to a small anti-government group called Americans for Constitutional Enforcement, but is not too ideologically rigid not to accept food stamps for himself and his wife. Kahl and the Ginters drive to Smithville, Arkansas, a tiny Ozark town where the Ginters have a concrete house with a vegetable patch and a chicken pen. After Kahl leaves, Karen Russell calls the FBI and informs them of his whereabouts.
Final Confrontation - On June 3, FBI agent James Blasingame organizes a group of US Marshals and local lawmen at the Lawrence County courthouse to plan how best to apprehend Kahl and the Ginters. Twenty-eight law enforcement officials, including 15 US Marshals, six FBI agents, three state police officers, and four county lawmen descend on the Ginter home. While en route, they encounter Ginter, driving away from the house in a car with a rifle in the backseat; he has a cocked and loaded pistol in his lap. Ginter is apprehended without incident, but lies to the police, saying Kahl is not at the house. Unfortunately, the officials believe his story. At the officials’ request, Ginter drives back to the house, with five officials behind. Ginter parks his car, as do the officials; Ginter gets out and shouts: “Norma, come out. The FBI wants to talk to you.” He emphasizes the word “FBI” as loudly as possible, alerting Kahl to their presence. Norma Ginter comes out and is escorted away. Lawrence County Sheriff Gene Matthews, departing from the plan, enters the house through a utility room off the garage, with US Marshal James Hall and Arkansas State Police investigator Ed Fitzpatrick following him. Kahl is waiting in the kitchen, armed with a formidable Ruger Mini-14 assault rifle. When Matthews enters the kitchen, the two men see each other and open fire simultaneously; Kahl wounds Matthews fatally with two shots to the chest and Matthews kills Kahl with a bullet to the head. Hall and Fitzpatrick, unsure of what has happened, begin firing wildly, striking Matthews with buckshot. Matthews manages to get to a police cruiser before collapsing, and gasps, “I got him.” But the other officials are unsure if Kahl is actually dead, and if others may be in the house as well. They open fire on the house and let loose a barrage of tear gas. They then set the house afire with a can of diesel fuel; the fire ignites several thousand rounds of ammunition stored inside the house and the house is all but gutted by the conflagration. Eventually, officials are able to enter the house and find what remains of Kahl’s body in the kitchen. Posse Comitatus leader William Potter Gale, asked by a reporter about Kahl’s death, says that Kahl was murdered for helping farmers and belonging to the group. Another Posse member, Richard Wayne Snell, will later claim that Matthews had been killed by FBI agents after interrupting them during their torture of Kahl. [Southern Poverty Law Center, 12/2001; Levitas, 2002, pp. 217-220; Anti-Defamation League, 2011]
Episode Destabilizes Posse Comitatus - The Kahl episode receives national attention and helps destabilize the Posse Comitatus (see 1984). The media quickly learns of Kahl’s racist and anti-Semitic past, and reprints a letter he wrote the same night he killed the marshals and later sent to reporters. In his letter, Kahl announced that it was time to begin killing Jews: “We are engaged in a struggle to the death between the people of the Kingdom of God, and the Kingdom of Satan. We are a conquered and occupied nation; conquered and occupied by the Jews, and their hundreds or maybe thousands of front organizations doing their un-Godly work. They have two objectives in their goal of ruling the world. Destroy Christianity and the White race. Neither can be accomplished by itself, they stand or fall together.” In an attempt to exonerate his son and Faul, Kahl took credit for all the fatal shots. Kahl’s espousal of violence and anti-Semitism causes a backlash when some Posse Comitatus members attempt to portray him as a martyr. [Southern Poverty Law Center, 12/2001; Levitas, 2002, pp. 217-220]

Entity Tags: Ed Fitzpatrick, Scott Faul, William Potter Gale, David Broer, Arthur Russell, Americans for Constitutional Enforcement, Richard Wayne Snell, Posse Comitatus, Yorie Kahl, Leonard Ginter, James Blasingame, Gordon Kahl, Gene Matthews, Covenant, Sword, and Arm of the Lord, Norma Ginter, James Hall, Karen Russell, Joan Kahl

Timeline Tags: US Domestic Terrorism

The October 1983 bombing of US Marine barracks in Beirut, Lebanon.The October 1983 bombing of US Marine barracks in Beirut, Lebanon. [Source: US Marine Corps.]In June 1982, Israel invaded Lebanon and US Marines were sent to Lebanon as a peacekeeping force in September 1982. On April 18, 1983, the US embassy in Beirut, Lebanon, is bombed by a suicide truck attack, killing 63 people. On October 23, 1983, a Marine barracks in Beirut is bombed by another suicide truck attack, killing 241 Marines. In February 1984, the US military will depart Lebanon. The radical militant group Islamic Jihad will take credit for both attacks (note that this is not the group led by Ayman al-Zawahiri). The group is believed to be linked to Hezbollah. Prior to this year, attacks of this type were rare. But the perceived success of these attacks in getting the US to leave Lebanon will usher in a new era of suicide attacks around the world. The next two years in particular will see a wave of such attacks in the Middle East, many of them committed by the radical militant group Hezbollah. [US Congress, 7/24/2003; US Congress, 7/24/2003 pdf file] The Beirut bombings will also inspire Osama bin Laden to believe that the US can be defeated by suicide attacks. For instance, he will say in a 1998 interview: “We have seen in the last decade the decline of the American government and the weakness of the American soldier who is ready to wage Cold Wars and unprepared to fight long wars. This was proven in Beirut when the Marines fled after two explosions.” [ABC News, 5/28/1998] In 1994, he will hold a meeting with a top Hezbollah leader (see Shortly After February 1994) and arrange for some of his operatives to be trained in the truck bombing techniques that were used in Beirut. [9/11 Commission, 7/24/2004, pp. 48]

Entity Tags: Hezbollah, Islamic Jihad Organization, Ayman al-Zawahiri, Osama bin Laden

Timeline Tags: Complete 911 Timeline

The Supreme Court rules in INS v. Chadha that Congress has no right to issue what it calls “legislative vetoes,” essentially provisions passed by Congress giving the executive branch specific powers but with Congress reserving the right to veto specific decisions by the executive branch if it does not approve of the decisions made by the executive. Congress had relied on such “legislative vetoes” for years to curb the expanding power of the president. The Court strikes down hundreds of these “legislative vetoes” throughout federal law. Congress quickly schedules hearings to decide how to respond to the Court’s ruling. White House attorney John Roberts (see September 29, 2005), a young, fast-rising conservative, is one of a team of lawyers assigned to review the administration’s upcoming testimony before Congress. Some of the lawyers want to push Congress to place independent agencies such as the Federal Trade Commission (FTC) and Food and Drug Administration (FDA) under White House control—part of the evolving “unitary executive” theory of presidential power (see April 30, 1986). Roberts writes: “With respect to independent agencies… the time may be ripe to reconsider the existence of such entities, and take action to bring them back within the executive branch.… I agree that the time is ripe to reconsider the Constitutional anomaly of independent agencies… More timid souls may, however, desire to see this deleted as provocative.” [Savage, 2007, pp. 256-257]

Entity Tags: Reagan administration, Food and Drug Administration, Federal Trade Commission, John G. Roberts, Jr, US Supreme Court

Timeline Tags: Civil Liberties

July 29, 1983: SAAR Network Is Founded

555 Grove Street, Herndon, Virginia. This is the location of the SAAR Foundation/Safa Group and many related businesses.555 Grove Street, Herndon, Virginia. This is the location of the SAAR Foundation/Safa Group and many related businesses. [Source: Paul Sperry]The SAAR Foundation is incorporated in Herndon, Virginia, just outside Washington. It will become an umbrella organization for a cluster of over 100 charities, think tanks, and businesses known as the SAAR network. In 2002, the US government will raid the SAAR network looking for ties to the Al Taqwa Bank and the Muslim Brotherhood (see March 20, 2002). [Farah, 2004, pp. 153]

Entity Tags: SAAR Foundation

Timeline Tags: Complete 911 Timeline

Young White House attorney John Roberts (see September 29, 2005), an advocate of expanded presidential powers (see June-July 1983), is selected to respond to a letter from retired Supreme Court Justice Arthur Goldberg. The former justice is commenting on the Reagan administration’s decision to unilaterally invade the tiny Caribbean island nation of Grenada. Goldberg wrote that President Reagan probably did violate the Constitution by sending troops to Grenada without Congressional approval, and in that sense has left himself open to impeachment. However, he added, the invasion had succeeded in establishing democracy in that nation. Therefore Reagan’s actions should be compared to those of President Abraham Lincoln during the Civil War, because, like Lincoln, he “acted in good faith and in the belief that this served our national interest” (see April 12 - July 1861). Drafting the letter for Reagan’s signature, Roberts thanks Goldberg for his defense of Reagan but insists that the invasion was perfectly legal. The president, Roberts writes, has “inherent authority in international affairs to defend American lives and interests and, as commander in chief, to use the military when necessary in discharging these responsibilities.” [Savage, 2007, pp. 257]

Entity Tags: Reagan administration, John G. Roberts, Jr, Arthur Goldberg, Ronald Reagan

Timeline Tags: Civil Liberties

Bin Laden first works for Maktab al-Khidamat from this building in Peshawar, a former British government guesthouse.Bin Laden first works for Maktab al-Khidamat from this building in Peshawar, a former British government guesthouse. [Source: PBS]Bin Laden moves to Peshawar, a Pakistani town bordering Afghanistan, and helps run a front organization for the mujaheddin known as Maktab al-Khidamat (MAK), which funnels money, arms, and fighters from the outside world into the Afghan war. [New Yorker, 1/24/2000] “MAK [is] nurtured by Pakistan’s state security services, the Inter-Services Intelligence agency, or ISI, the CIA’s primary conduit for conducting the covert war against Moscow’s occupation.” [MSNBC, 8/24/1998] Bin Laden becomes closely tied to the warlord Gulbuddin Hekmatyar, and greatly strengthens Hekmatyar’s opium smuggling operations. [Le Monde (Paris), 9/14/2001] Hekmatyar, who also has ties with bin Laden, the CIA, and drug running, has been called “an ISI stooge and creation.” [Asia Times, 11/15/2001] MAK is also known as Al-Kifah and its branch in New York is called the Al-Kifah Refugee Center. This branch will play a pivotal role in the 1993 WTC bombing and also has CIA ties (see January 24, 1994).

Entity Tags: Osama bin Laden, Gulbuddin Hekmatyar, Central Intelligence Agency, Maktab al-Khidamat, Pakistan Directorate for Inter-Services Intelligence

Timeline Tags: Complete 911 Timeline, War in Afghanistan

Detective Sergeant Peter Caram, the head of the New York Port Authority’s Terrorist Intelligence Unit, has been directed by the assistant superintendent of the Port Authority Police Department to compile a report on the vulnerability of the WTC to a terrorist attack. Having previously worked at the WTC Command, Caram has exclusive knowledge of some of the center’s security weaknesses. On this day he issues his four-page report, titled “Terrorist Threat and Targeting Assessment: World Trade Center.” It looks at the reasoning behind why the WTC might be singled out for attack, and identifies three areas of particular vulnerability: the perimeter of the WTC complex, the truck dock entrance, and the subgrade area (the lower floors below ground level). Caram specifically mentions that terrorists could use a car bomb in the subgrade area—a situation similar to what occurs in the 1993 bombing (see February 26, 1993). [Caram, 2001, pp. 5, 84-85; New York County Supreme Court, 1/20/2004] This is the first of several reports during the 1980s, identifying the WTC as a potential terrorist target.

Entity Tags: World Trade Center, Peter Caram

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Peter Goldmark.Peter Goldmark. [Source: Environmental Defense Fund]Peter Goldmark, the executive director of the New York Port Authority, is concerned that, in light of terrorist attacks occurring around the world (see April 18-October 23, 1983), Port Authority facilities, including the World Trade Center, could become terrorist targets. [Associated Press, 9/28/2005; New York Times, 10/27/2005] He therefore creates a unit called the Office of Special Planning (OSP) to evaluate the vulnerabilities of all Port Authority facilities and present recommendations to minimize the risks of attack. The OSP is staffed by Port Authority police and civilian workers, and is headed by Edward O’Sullivan, who has experience in counterterrorism from earlier careers in the Navy and Marine Corps. In carrying out its work, the OSP will consult with such US agencies as the FBI, CIA, Secret Service, NSA, and Defense Department. It will also consult with security officials from other countries that have gained expertise in combating terrorism, such as England, France, Italy, and Israel. [Glanz and Lipton, 2004, pp. 226; New York County Supreme Court, 1/20/2004] According to Peter Caram, head of the Port Authority’s Terrorist Intelligence Unit, the OSP will develop “an expertise unmatched in the United States.” [Caram, 2001, pp. 12] In 1985 it will issue a report called “Counter-Terrorism Perspectives: The World Trade Center” (see November 1985). [New York Court of Appeals, 2/16/1999] It will exist until 1987. [Village Voice, 1/5/2000]

Entity Tags: Office of Special Planning, Peter Goldmark, Port Authority of New York and New Jersey

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Young conservative White House lawyer John Roberts (see September 29, 2005), an advocate of expanded presidential powers (see June-July 1983 and October 1983), advises senior Reagan officials that the White House should challenge the 1978 Presidential Records Act. To Roberts’s mind, the law goes much too far in requiring that presidential papers be considered government property and should, with some exceptions, be released to the public 12 years after a president leaves office. The law infringes on the right of a president to keep information secret, Roberts argues. Later, he will argue that the 12-year rule is far too brief and, as it would “inhibit the free flow of candid advice and recommendations within the White House,” is unconstitutional. [Savage, 2007, pp. 258]

Entity Tags: Reagan administration, John G. Roberts, Jr, Presidential Records Act

Timeline Tags: Civil Liberties

Young conservative White House lawyer John Roberts (see September 29, 2005), an advocate of expanded presidential powers (see June-July 1983 and October 1983), expands on his previous argument that the president’s papers and documents should remain secret and unavailable to the public (see February 13, 1984). Roberts writes that the Reagan administration should oppose a bill pending in Congress that would make the National Archives a separate agency, independent of the White House. Roberts writes that the “legislation could grant the archivist [the head of the National Archives] some independence from presidential control, with all the momentous constitutional consequences that would entail.” Others in the White House disagree with Roberts, and the administration does not oppose the bill. Roberts suggests that President Reagan attach a signing statement to the bill making it clear that Reagan has the power to fire the archivist if he/she tries to disobey the White House in releasing a presidential document. [Savage, 2007, pp. 258]

Entity Tags: National Archives and Records Administration, Reagan administration, John G. Roberts, Jr

Timeline Tags: Civil Liberties

Alan Berg.Alan Berg. [Source: Denver Post]Alan Berg, a Jewish, progressive talk show host for Denver’s KOA 850 AM Radio, is gunned down in his driveway as he is stepping out of his car. The murder is carried out by members of the violent white-supremacist group The Order (see Late September 1983), a splinter group of the Aryan Nations white nationalist movement. Berg, who was described as often harsh and abrasive, regularly confronted right-wing and militia members on his show. Federal investigators learn that The Order’s “hit list” includes Berg, television producer Norman Lear, a Kansas federal judge, and Morris Dees, a civil rights lawyer and co-founder of the Southern Poverty Law Center (SPLC). Radio producer Anath White later says that some of Berg’s last shows were particularly rancorous, involving confrontational exchanges with anti-Semitic members of the Christian Identity movement (see 1960s and After). “That got him on the list and got him moved up the list to be assassinated,” White will say. [HistoryLink, 12/6/2006; Rocky Mountain News, 5/1/2007; Denver Post, 6/18/2009]
Preparing for the Murder - Order leader Robert Jay Mathews had already sent a colleague to Denver to determine if Berg was a viable target (see May 17, 1984). The four members of the assassination team—Mathews, Bruce Pierce, David Lane, and Richard Scutari—assemble at a local Motel 6 to review their plans. Pierce, the assassin, has brought a .45 caliber Ingram MAC-10 submachine gun for the job. All four men begin to surveill Berg’s townhouse.
Gunned Down - At 9:21 p.m., Berg drives his Volkswagen Beetle into his driveway. Lane, the driver, pulls up behind him. Mathews leaps out of the car and opens the rear door for Pierce, who jumps out and runs up the driveway. Berg exits his vehicle with a bag of groceries. Pierce immediately opens fire with his submachine gun, pumping either 12 or 13 bullets into Berg’s face and body before the gun jams. (Sources claim both figures of bullet wounds in Berg as accurate.) Pierce and Mathews get back into their car, rush back to the Motel 6, gather their belongings, and leave town. Three of the four members of the “hit squad” will soon be apprehended, charged, and convicted. Pierce is sentenced to 252 years in prison, including time for non-related robberies, and will die in prison in 2010; Lane is given 150 years, and will die in prison in 2007. Neither man is prosecuted for murder, as the evidence will be determined to be inconclusive; rather, they will be charged with violating Berg’s civil rights. Scutari, accused of serving as a lookout for Pierce, and Jean Craig, accused of collecting information on Berg for the murder, will both be acquitted of culpability in the case, but will be convicted of other unrelated crimes. Mathews will not be charged due to lack of evidence of his participation; months later, he will die in a confrontation with law enforcement officials (see December 8, 1984). [Rocky Mountain News, 5/1/2007; Denver Post, 6/18/2009; Denver Post, 8/17/2010] In sentencing Pierce to prison, Judge Richard Matsch will say of the murder, “The man [Berg] was killed for who he was, what he believed in, and what he said and did, and that crime strikes at the very core of the Constitution.” [Denver Post, 8/17/2010]
Re-Enacting a Fictional Murder? - Some will come to believe that the assassins may have attempted to re-enact the fictional murder of a Jewish talk-show host depicted in The Turner Diaries (see 1978). [Rocky Mountain News, 5/1/2007; The Moderate Voice, 11/30/2007]
'Opening Shot ... of a Truly Revolutionary Radical Right' - Mark Potok of the SPLC will characterize Berg’s murder as an early event leading to the 1995 Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995). “In a sense, it was one of the opening shots of a truly revolutionary radical right,” Potok will say, “perfectly willing to countenance the mass murder of American civilians for their cause.” [Denver Post, 6/18/2009] Berg’s ex-wife, Judith Berg, will travel around the country in the years after her ex-husband’s murder, speaking about what she calls the “disease and anatomy of hate,” a sickness that can infect people so strongly that they commit horrible crimes. In 2007, she will tell a reporter that Berg’s murder was a watershed event that inspired more hate-movement violence. “What happened to Alan in the grown-up world has reached into the youth culture,” she will say. “It opened the door to an acceptance of violence as a means of acting on hate.… While our backs are turned toward overseas, hate groups are having a heyday. People are very unhappy; they’re out of work and jobs are scarce. They’re ripe for joining extremist groups. We need to understand what happened to make sure it doesn’t happen again.” [Rocky Mountain News, 5/1/2007] White later says of Pierce, Lane, and their fellows: “It’s left me to wonder what makes somebody like this. I think these people didn’t have much opportunity in their lives and scapegoat. They blame others for not making it.” [Denver Post, 8/17/2010]

Entity Tags: Norman Lear, Robert Jay Mathews, Richard Scutari, Morris Dees, Richard P. Matsch, Mark Potok, Jean Margaret Craig, Judith Berg, Alan Berg, Anath White, Aryan Nations, Bruce Carroll Pierce, David Edan Lane, KOA 850 AM Radio, The Order

Timeline Tags: US Domestic Terrorism

The DC Court of Appeals rejects a claim by civilian plaintiffs to force the government to disclose classified information as part of a lawsuit, citing the “state secrets” privilege (see March 9, 1953). Furthermore, the court broadens the definition of “state secrets” to include “disclosure of intelligence-gathering methods or capabilities and disruption of diplomatic relations.” [Siegel, 2008, pp. 197]

Timeline Tags: Civil Liberties

Makhtab al-Khidamat offices in the US in the late 1980s. Some of the offices in fact were represented by single individuals.Makhtab al-Khidamat offices in the US in the late 1980s. Some of the offices in fact were represented by single individuals. [Source: National Geographic] (click image to enlarge)Sheikh Abdullah Azzam, bin Laden’s mentor, makes repeated trips to the US and other countries, building up his Pakistan-based organization, Maktab al-Khidamat (MAK), or “Services Office” in English. It is also known as Al-Kifah, which means “struggle.” Azzam founded the Al-Kifah/MAK in 1984 (see Late 1984). Branches open in over 30 US cities, as Muslim-Americans donate millions of dollars to support the Afghan war against the Soviet Union. The most important branch, called the Al-Kifah Refugee Center, opens in Brooklyn, New York (see 1986-1993). Azzam is assassinated in a car bomb attack in late 1989 (see November 24, 1989). Bin Laden soon takes over the organization, which effectively morphs into al-Qaeda. His followers take over the US offices and they become financial conduits for al-Qaeda operations. [Lance, 2003, pp. 40-41]

Entity Tags: Osama bin Laden, Al-Kifah Refugee Center, Maktab al-Khidamat, Al-Qaeda, Abdullah Azzam

Timeline Tags: Complete 911 Timeline

David Tate, one of two members of the now-defunct white supremacist group The Order to escape the government’s massive prosecution of its members (see Late December 1984 - April 1985), is stopped by two Missouri state troopers conducting random vehicle and license checks. He is trying to flee to a Christian Identity (see 1960s and After) survivalist compound called the Covenant, the Sword, and the Arm of the Lord (CSA). Tate opens fire on the two officers with a MAC-10 submachine gun, killing one and critically wounding the other. He is captured five days later hiding in a city park in Arkansas. He will be convicted of assault and murder, and sentenced to life without parole. Federal authorities will use the Tate incident to arrest the CSA leadership (see 1983); the organization will soon fold. [Anti-Defamation League, 2005; HistoryLink, 12/6/2006]

Entity Tags: David Charles Tate, The Order

Timeline Tags: US Domestic Terrorism

A University of California, Berkeley graduate student, John E. Hauser, picks up a package in the university’s computer science lab. The package is a bomb made up of ammonium nitrate and aluminum powder. It explodes, costing Hauser four fingers from his right hand and severing arteries. [BBC, 11/12/1987; Washington Post, 4/14/1996; Washington Post, 1998] The bomb has apparently been in the lab for two or three days, left on top of a stack of three-ring binders. Hauser thought it was a file box for another student’s computer cards, and picked it up intending to identify its owner. Upon opening it, he hears an odd buzzing sound, then the bomb detonates. Ironically, the victim of a previous bombing, Professor Diogenes Angelakos (see July 2, 1982), hears the explosion, rushes to offer assistance, and ties a tourniquet around Hauser’s arm. Hauser will lose much of the use of his right arm, and will be forced to abandon his dreams of becoming an Air Force fighter pilot and perhaps an astronaut. He will later say, “There is not a day that goes by when I’m not reminded that I don’t have full use of my right hand… from trying to play racquetball to trying to pick up my daughter.” Of the bombing, Hauser will say, “This was as much a target of opportunity as anything else.” The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski once worked as a professor at UC-Berkeley. Both this bombing and the previous one are in Cory Hall, a building close to where Kaczynski once taught. Captain Bill Foley of the Berkeley campus police will later say: “He taught in Campbell Hall and had offices in one of our temporary buildings. If you did a triangle between Campbell and that temporary building you would hit Cory Hall at peak of the triangle.” Cory Hall also houses the engineering and computer science departments, known to be favorite targets of the Unabomber. [Washington Post, 11/27/1993; Washington Post, 4/14/1996] This bomb is more powerful than earlier Unabomber constructions, using a mix of ammonium nitrate and aluminum powder to cause the explosion. The bomb’s shrapnel consists of tacks, nails, and bits of lead. Stamped on the end seal of the bomb’s pipe are the initials “FC,” which will later be found to stand for “Freedom Club.” [World of Forensic Science, 1/1/2005]

Entity Tags: Theodore J. (“Ted”) Kaczynski, University of California at Berkeley, John E. Hauser, Diogenes Angelakos

Timeline Tags: US Domestic Terrorism

A suspicious package mailed to the Auburn, Washington, headquarters of the Boeing Aircraft Company is opened and safely disarmed by the local bomb squad. [BBC, 11/12/1987; Washington Post, 1998] The package containing a pipe bomb gets lost in Boeing’s internal mail system; the package is in the process of being returned to the apparent sender before it draws the attention of Boeing employees, who call the bomb squad. [Washington Post, 4/14/1996] The bomb will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski tried to destroy a Boeing aircraft with another bomb six years ago (see November 15, 1979). Like earlier bombs, this bomb contains the initials “FC” engraved on a metal component; authorities will later learn that “FC” stands for “Freedom Club.” [World of Forensic Science, 1/1/2005]

Entity Tags: Theodore J. (“Ted”) Kaczynski, Boeing Company

Timeline Tags: US Domestic Terrorism

Charles Schnabolk.Charles Schnabolk. [Source: Institute for Design Professionals]While the Office of Special Planning is still working on its report about the vulnerability of the World Trade Center to terrorist attack, the New York Port Authority hired security consultant Charles Schnabolk to also review the center’s security systems. [UExpress (.com), 10/12/2001; New York County Supreme Court, 1/20/2004] Schnabolk was involved in designing the original security system when the WTC complex was built. [Institue for Design Professionals, 2009; The Security Design Group, 2010] This month his secret report, titled “Terrorism Threat Perspective and Proposed Response for the World Trade Center” is released. It sets out four levels of possible terrorism against the center, and gives examples of each: ”(1) PREDICTABLE—Bomb threats; (2) PROBABLE—Bombing attempts, computer crime; (3) POSSIBLE—Hostage taking; (4) CATASTROPHIC—Aerial bombing, chemical agents in water supply or air conditioning (caused by agents of a foreign government or a programmed suicide).” Similar to other reports in the mid-1980s, it also warns that the WTC “is highly vulnerable through the parking lot.” [UExpress (.com), 10/12/2001; New York County Supreme Court, 1/20/2004]

Entity Tags: Charles Schnabolk, World Trade Center

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

After assessing the security of New York Port Authority facilities, the Office of Special Planning (OSP), the Port Authority’s own antiterrorist task force, releases a report called “Counter-Terrorism Perspectives: The World Trade Center.” For security purposes, only seven copies are made, being hand-delivered and signed for by its various recipients, including the executive director of the Port Authority, the superintendent of the Port Authority Police, and the director of the World Trade Department. [New York Court of Appeals, 2/16/1999; Village Voice, 1/5/2000] Because of the WTC’s visibility, symbolic value, and it being immediately recognizable to people from around the world, the report concludes that the center is a “most attractive terrorist target.” [New York County Supreme Court, 1/20/2004] The report, which is 120 pages long, lists various possible methods of attacking the center. [New York Court of Appeals, 2/16/1999; Caram, 2001, pp. 103; Barrett and Collins, 2006, pp. 87] One of these is that a “time bomb-laden vehicle could be driven into the WTC and parked in the public parking area.… At a predetermined time, the bomb could be exploded in the basement.” [Glanz and Lipton, 2004, pp. 227] As a Senate Committee Report will find in August 1993, “The specifics of the February 26, 1993 bombing at the World Trade Center garage were almost identical to those envisioned in the [OSP] report.” [New York Court of Appeals, 2/16/1999] Due to the Port Authority’s failure to adequately implement the OSP’s recommendations, the report will be crucial evidence in a successful civil trial against it in October 2005, charging negligence in failing to prevent the 1993 bombing. [Bloomberg, 10/26/2005; New York Times, 10/27/2005; New York Times, 2/18/2006] As of mid-2006, the other possible methods of attacking the WTC listed in the report remain undisclosed.

Entity Tags: Office of Special Planning, World Trade Center, World Trade Department, Port Authority of New York and New Jersey

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In Ann Arbor, Michigan, research assistant Nicklaus Suino of the University of Michigan suffers burns and shrapnel wounds when he opens a package bomb at the home of psychology professor James V. McConnell. [BBC, 11/12/1987; Washington Post, 1998] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). McConnell may be one of Kaczynski’s most personal targets. McConnell is a rich, flamboyant, and somewhat eccentric professor who espouses controversial theories about human behavior modification based on his research with flatworms. McConnell taught at the University of Michigan when Kaczynski was taking graduate courses in mathematics there. The package mailed to McConnell’s house comes with a one-page letter taped to the top, bearing a Salt Lake City postmark and reading in part: “I’d like you to read this book. Everybody in your position should read this book.” McConnell asks Suino to open it. The resulting explosion injures Suino; McConnell escapes with slight, temporary hearing loss but is profoundly shaken by the incident. [Washington Post, 4/14/1996]

Entity Tags: Theodore J. (“Ted”) Kaczynski, James V. McConnell, Nicklaus Suino, University of Michigan

Timeline Tags: US Domestic Terrorism

Hugh C. Scrutton.Hugh C. Scrutton. [Source: Washington Post]In Sacramento, California, Hugh C. Scrutton is killed when he tries to remove what looks to be a road hazard from the parking lot—a block of wood with nails protruding from it inside a paper bag—behind his computer rental shop. The “hazard” is actually a bomb [BBC, 11/12/1987; Knight Ridder, 5/28/1995; Washington Post, 1998; World of Forensic Science, 1/1/2005] consisting of three 10-inch pipes filled with a mixture of potassium sulfate, potassium chloride, ammonium nitrate, and aluminum powder. The bomb contains shrapnel consisting of sharp chunks of metal, nails, and splinters. It explodes with enormous force, killing Scrutton almost instantly. [World of Forensic Science, 1/1/2005] Like earlier bombs, this bomb contains the initials “FC” engraved on a metal component; authorities later learn that “FC” stands for “Freedom Club.” [World of Forensic Science, 1/1/2005] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). In 1967, Scrutton took a summer math course at the University of California at Berkeley while Kaczynski taught mathematics there; it is not known whether the two crossed paths during that time. [Washington Post, 4/14/1996]

Entity Tags: Hugh Scrutton, Theodore J. (“Ted”) Kaczynski, University of California at Berkeley

Timeline Tags: US Domestic Terrorism

Soliman Biheiri.Soliman Biheiri. [Source: US Immigrations and Customs]BMI Inc., a real estate investment firm based in Secaucus, New Jersey, is formed in 1986. Former counterterrorism “tsar” Richard Clarke will state in 2003, “While BMI [has] held itself out publicly as a financial services provider for Muslims in the United States, its investor list suggests the possibility this facade was just a cover to conceal terrorist support. BMI’s investor list reads like a who’s who of designated terrorists and Islamic extremists.” Investors in BMI include: [US Congress, 10/22/2003]
bullet Soliman Biheiri. He is the head of BMI for the duration of the company’s existence. US prosecutors will later call him the US banker for the Muslim Brotherhood, a banned Egyptian militant group. Biheiri’s computer will eventually be searched and found to have contact information for Ghaleb Himmat and Youssef Nada, leaders of the Al Taqwa Bank, which is founded two years after BMI (see 1988). After 9/11, the US and UN will designate both Himmat and Nada and the Al Taqwa Bank as terrorist financiers, and the bank will be shut down (see November 7, 2001). US prosecutors say there are other ties between BMI and Al Taqwa, including financial transactions. Biheiri also has close ties with Yousuf Abdullah Al-Qaradawi. Qaradawi is said to be a high-ranking member of the Muslim Brotherhood, a shareholder in Al Taqwa, and has made statements supporting suicide bombings against Israel. In 2003, US investigators will accuse Biheiri of ties to terrorist financing. He will be convicted of immigration violations and lying to a federal agent (see June 15, 2003). [Wall Street Journal, 9/15/2003; Forward, 10/17/2003] Biheiri will be convicted of immigration fraud in 2003 and then convicted of lying to federal investigators in 2004 (see June 15, 2003).
bullet Abdullah Awad bin Laden, a nephew of Osama bin Laden. He invests about a half-million dollars in BMI real estate ventures, earning a profit of $70,000. For most of the 1990s he runs the US branch of a Saudi charity called World Assembly of Muslim Youth (WAMY). He is investigated by the FBI in 1996 (see February-September 11, 1996), and WAMY will be raided by US agents in 2004 (see June 1, 2004). The raid is apparently part of a larger investigation into terrorism financing. In 2001, at least two of the 9/11 hijackers will live three blocks away from the WAMY office (see March 2001 and After). [Wall Street Journal, 9/15/2003; Washington Post, 4/19/2004]
bullet Nur and Iman bin Laden, two female relatives of Osama bin Laden. Abdullah Awad bin Laden will invest some of their money in a BMI real estate project. While their bin Laden family ties are intriguing, neither have been accused of any knowing connections to terrorist financing. [Washington Post, 4/19/2004]
bullet Mousa Abu Marzouk. He has identified himself as a top leader of Hamas. The US declares him a terrorist in 1995 (see July 5, 1995-May 1997). BMI makes at least two transactions with Marzouk after he is declared a terrorist. [Wall Street Journal, 9/15/2003]
bullet Yassin al-Qadi, a Saudi multimillionaire. His lawyers will later claim he has no terrorism ties and had only a passing involvement with BMI and liquidated his investment in it in 1996. However, another company operating from the same office as BMI is called Kadi International Inc. and lists its president as al-Qadi. Al-Qadi is also a major investor in the suspect computer company Ptech (see 1994; 1999-After October 12, 2001). Al-Qadi and BMI head Biheiri have financial dealings with Yaqub Mirza, a Pakistani who manages a group of Islamic charities in Virginia known as the SAAR network (see July 29, 1983). These charities will be raided in March 2002 on suspicions of terrorism ties (see March 20, 2002). Shortly after 9/11, the US will officially declare al-Qadi a terrorist financier (see October 12, 2001). [Wall Street Journal, 9/15/2003]
bullet Saleh Kamel. BMI allegedly receives a $500,000 investment from the Dallah Al-Baraka banking conglomerate, which is headed by Kamel. For many years before 9/11, Omar al-Bayoumi, an associate of 9/11 hijackers Khalid Almihdhar and Nawaf Alhazmi, will receive a salary from Dallah, despite apparently doing no work. Some will accuse al-Bayoumi of involvement in funding the 9/11 plot, but that remains to been proven (see August 1994-July 2001). Kamel reportedly founded a Sudanese Islamic bank which housed accounts for senior al-Qaeda operatives. He is a multi-billionaire heavily involved in promoting Islam, and his name appears on the Golden Chain, a list of early al-Qaeda supporters (see 1988-1989). He denies supporting terrorism. [US Congress, 10/22/2003; Wall Street Journal, 6/21/2004]
bullet The Kuwait Finance House. According to Clarke, this organization is alleged to be a BMI investor and the “financial arm of the Muslim Brotherhood in Kuwait. Several al-Qaeda operatives have allegedly been associated with the Kuwaiti Muslim Brotherhood, including Khalid Shaikh Mohammed, Suliman abu Ghaith, Wadih El-Hage, and Ramzi Yousef.” In 2003, an apparent successor entity to the Kuwait Finance House will be designated as a terrorist entity by the US. A lawyer for the Kuwait Finance House will later say the bank has never let its accounts be used for terrorism. [Wall Street Journal, 9/15/2003; US Congress, 10/22/2003; Wall Street Journal, 4/20/2005]
bullet Tarek Swaidan. He is a Kuwaiti, an associate of al-Qadi, and a leading member of the Kuwaiti branch of the Muslim Brotherhood. It is unknown if he has made any denials about his alleged associations. [Wall Street Journal, 9/15/2003]
bullet Abdurahman Alamoudi. For many years he runs the American Muslim Council, a lobby group founded by a top Muslim Brotherhood figure. US prosecutors say he also is in the Brotherhood, and has alleged ties to Hamas. In 2004, the US will sentence him to 23 years in prison for illegal dealings with Libya (see October 15, 2004). [Wall Street Journal, 6/21/2004; Washington Post, 10/16/2004]
bullet The International Islamic Relief Organization (IIRO) and the Muslim World League, closely connected Saudi charities suspected of financing terrorism. They give BMI $3.7 million out of a $10 million endowment from unknown Saudi donors. The Financial Times will later note, “While it is not clear whether that money came from the Saudi government, [a 2003] affidavit quotes a CIA report that says the Muslim World League ‘is largely financed by the government of Saudi Arabia.’” Both organizations consistently deny any support of terrorism financing, but in early 2006 it will be reported that US officials continue to suspect them of such support (see January 15, 2006). [Financial Times, 8/21/2003] In 1992, a branch of the IIRO gives $2.1 million to BMI Inc. to invest in real estate. The money disappears from BMI’s books. In October 1999, BMI goes defunct after it is unable to repay this money to the IIRO branch. The IIRO branch gives BMI the rest of the $3.7 million between 1992 and 1998. BMI will use the money to buy real estate (see 1992). Eventually, some of this money will be given to Hamas operatives in the West Bank and spent on violent actions against Israel. This will eventually lead to legal action in the US and a seizure of some of the money. [Wall Street Journal, 11/26/2002; Washington Post, 8/20/2003; Washington Times, 3/26/2004; Washington Post, 4/19/2004] By 1992, BMI has projected revenues in excess of $25 million, based largely on their real estate investments in the US. [US Congress, 10/22/2003] In early 1999, months before BMI goes defunct, the FBI hears evidence potentially tying BMI to the 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998), but an investigation into this will not be pursued (see Early 1999). It should be noted that BMI had many investors, and presumably most BMI investors would have had no suspicions that their money might be used to fund terrorism or other types of violence.

Entity Tags: Iman bin Laden, International Islamic Relief Organization, Muslim World League, Kuwait Finance House, Nur bin Laden, Mousa Abu Marzouk, Abdurahman Alamoudi, Richard A. Clarke, Soliman Biheiri, Abdullah Awad bin Laden, Yousuf Abdullah Al-Qaradawi, Tarek Swaidan, Yassin al-Qadi, Saleh Abdullah Kamel

Timeline Tags: Complete 911 Timeline

Following the release of the Office of Special Planning’s (OSP) report, which called the WTC a “most attractive terrorist target” (see November 1985), the New York Port Authority, which owns the center, seeks a second opinion on the OSP’s recommendations. At a cost of approximately $100,000, it hires the Science Applications International Corporation (SAIC) to review the general security of the WTC. SAIC states in its report that the attractiveness of the WTC’s public areas to terrorists is “very high.” Like the OSP, SAIC pays particular attention to the underground levels of the center and describes a possible attack scenario much like what occurs in the 1993 bombing. [Caram, 2001, pp. 105-106; New York County Supreme Court, 1/20/2004]

Entity Tags: World Trade Center, Science Applications International Corporation (SAIC), Port Authority of New York and New Jersey

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Antonin Scalia.Antonin Scalia. [Source: Oyez.org]Appeals court judge Antonin Scalia is sworn in as an Associate Justice of the US Supreme Court. [Legal Information Institute, 7/30/2007] Although Scalia is an ardent social conservative, with strongly negative views on such issues as abortion and homosexual rights, Scalia and Reagan administration officials both have consistently refused to answer questions about his positions on these issues, as President Reagan did at his June announcement of Scalia’s nomination. [Ronald Reagan Presidential Library, 6/17/1986] Scalia’s nomination is, in the words of Justice Department official Terry Eastland, “no better example of how a president should work in an institutional sense in choosing a nominee….” Eastland advocates the practice of a president seeking a judiciary nominee who has the proper “judicial philosophy.” A president can “influence the direction of the courts through his appointments” because “the judiciary has become more significant in our politics,” meaning Republican politics. [Dean, 2007, pp. 132] Scalia is the product of a careful search by Attorney General Edwin Meese and a team of Justice Department officials who wanted to find the nominee who would most closely mirror Reagan’s judicial and political philosophy (see 1985-1986).

Entity Tags: Ronald Reagan, Edwin Meese, Antonin Scalia, Terry Eastland, US Department of Justice

Timeline Tags: Civil Liberties

Radical Muslim leader Sheikh Omar Abdul-Rahman obtains his first US visa via the CIA. A State Department official will later discover this was the first of six US visas given to him between 1986 and 1990. All are approved by CIA agents acting as consular officers at US embassies in Sudan and Egypt. “The CIA officers claimed they didn’t know the sheikh was one of the most notorious political figures in the Middle East and a militant on the State Department’s list of undesirables.” But one top New York investigator will later say, “Left with the choice between pleading stupidity or else admitting deceit, the CIA went with stupidity.” [Boston Globe, 2/3/1995; New York Magazine, 3/17/1995] Abdul-Rahman uses the visas to attend conferences of Islamic students in the US. Then he visits Pakistan, where he preaches at Peshawar, visits the Saudi embassy in Islamabad, and is “lionized at receptions heavily attended by Americans.” He plays a prominent role in recruiting mujaheddin fighters to fight against the Soviets in Afghanistan. [Kepel, 2002, pp. 300] In 1989, Abdul-Rahman is arrested in Egypt and held under very closely guarded house arrest, but he manages to escape one year later, possibly by being smuggled out of his house in a washing machine. The CIA gives him another US visa and he moves to the US (see July 1990). [New York Times, 1/8/1995] Journalist Simon Reeve will claim in his 1999 book The New Jackals that, “The CIA, it is now clear, arranged the visa[s] to try and befriend the Sheikh in advance of a possible armed fundamentalist revolution in Egypt.” According to a retired CIA official, the CIA recalled mistakes made with the Ayatollah Khomeini in Iran and were trying to win Abdul-Rahman’s trust. [Reeve, 1999, pp. 60]

Entity Tags: Central Intelligence Agency, Omar Abdul-Rahman, Simon Reeve

Timeline Tags: Complete 911 Timeline

Dave Frasca, who will later go on to play a key role in the FBI’s failure to get a warrant to search Zacarias Moussaoui’s belongings before 9/11 (see August 21, 2001 and August 29, 2001), joins the FBI. Frasca initially works at the bureau’s Newark, New Jersey, field office. It is unclear what cases he works on in the first three years of his employment, but they are not related to counterterrorism. [US Department of Justice, 11/2004, pp. 123 pdf file]

Entity Tags: David Frasca, Federal Bureau of Investigation

Timeline Tags: 9/11 Timeline, Misc Entries

The FBI’s sketch of the as-yet-unidentified ‘Unabomber.’The FBI’s sketch of the as-yet-unidentified ‘Unabomber.’ [Source: FBI]Gary Wright, the owner of CAAMS Inc., a Salt Lake City, Utah, computer shop, is injured when he attempts to remove a “road hazard” at the rear entrance of his shop. The “hazard” is actually a bomb, similar to one that killed another computer shop owner in Sacramento, California, over a year ago (see December 11, 1985). A secretary saw a man wearing a hooded sweatshirt and sunglasses leave the bag containing the bomb; she becomes the first eyewitness in what will later become the “Unabomber” investigation (see April 3, 1996). [BBC, 11/12/1987; Washington Post, 1998] The “Unabomber” is improving his skills; this bomb contains a more sophisticated triggering device than earlier constructions. [World of Forensic Science, 1/1/2005] Almost six years ago, Theodore “Ted” Kaczynski, the so-called “Unabomber,” planted another bomb in Salt Lake City (see October 8, 1981). But for now, the FBI has no knowledge of Kaczynski’s identity. It has, however, found what it calls “an absolute link” between the Wright bombing and the “Unabom” serial bombings that have been going on since 1978 (see May 25-26, 1978). Federal bomb expert Ron Wolters says the bombs in the different cases display a high level of similarity. Police describe the as-yet-unidentified bomber as a disgruntled academician or computer worker. [Chicago Sun-Times, 2/24/1987]

Entity Tags: CAAMS Inc, Theodore J. (“Ted”) Kaczynski, Ron Wolters, Gary Wright

Timeline Tags: US Domestic Terrorism

April 1987: Hamid Gul Becomes Head of ISI

Hamid Gul serving as a Pakistani military officer in the 1980’s.Hamid Gul serving as a Pakistani military officer in the 1980’s. [Source: PBS / Nova]Gen. Hamid Gul is made head of Pakistan’s ISI. [Yousaf and Adkin, 1992, pp. 91-92] General Gul is a favorite of CIA Station Chief Milt Bearden and US ambassador to Pakistan Arnie Raphel, who view him as an ally and a potential national leader of Pakistan. [Bearden and Risen, 2003, pp. 301] According to Bearden, however, he will later (sometime after 1990) turn against the US. [Bearden and Risen, 2003, pp. 358, 523-524] Evidence will later appear that in the late 1990s Gul is somehow able to give the Taliban advanced warning of US attempts to assassinate bin Laden with missile strikes (see July 1999). In 2004, allegations will appear in the US media that Gul was a key participant in the 9/11 plot and “bin Laden’s master planner” (see July 22, 2004).

Entity Tags: Milt Bearden, Pakistan Directorate for Inter-Services Intelligence, Mark Adkin, Arnie Raphel, Hamid Gul

Timeline Tags: Complete 911 Timeline

Robert Bork.Robert Bork. [Source: National Constitution Center]The controversial nomination of conservative judge Robert Bork to the Supreme Court is defeated in the US Senate. Bork is denied a seat on the Court in a 58-42 vote, because his views are thought to be extremist and even some Republicans vote against him.
'Right-Wing Zealot' - Bork, nominated by President Reagan as one of the sitting judges who most completely reflects Reagan’s judiciary philosophy (see 1985-1986), is characterized even by administration officials as a “right-wing zealot.” Reagan also wants a nominee to placate the hard right over their disaffection caused by the brewing Iran-Contra scandal. However, to make him more palatable for the majority of Americans, Reagan officials attempt to repackage Bork as a moderate conservative. Senate Judiciary Committee member Edward Kennedy (D-MA) attacks Bork’s political philosophy, saying before the committee hearings: “[In Bork’s America] women would be forced into back alley abortions, blacks would sit at segregated lunch counters, rogue police could break down citizens’ doors in midnight raids, schoolchildren could not be taught about evolution, writers and artists could be censored at the whim of government, and the doors of the federal courts would be shut on the fingers of millions of citizens for whom the judiciary is the—and is often the only—protector of the individual rights that are the heart of our democracy.… No justice would be better than this injustice.” Kennedy’s words provoke complaint, but the characterization of Bork is based on his lengthy record of court verdicts and his large body of judicial writings.
Racial Equality Issues - Although there is no evidence to suggest that Bork is himself a racist, former Nixon White House counsel John Dean will write that “his positions on civil rights were an anathema to all who cared about equality in America.” Constitutional law professor Herman Schwartz will write in 2004, “Bork condemned the Fourteenth Amendment’s Equal Protection Clause decisions outlawing the poll tax (to him it was just ‘a very small tax’), the decision establishing the one-person, one-vote principle, abolishing school segregation in the District of Columbia, barring courts from enforcing racially restrictive housing covenants, preventing a state from sterilizing certain criminals or interfering with the right to travel, and prohibiting discrimination against out-of-wedlock children…. Bork’s hostility to governmental action on behalf of minorities did not stop with his critique of court action. In 1963 he criticized a section of the proposed Civil Rights Act of 1964 that required white businesses to serve blacks as resting on a principle of ‘unsurpassed ugliness.’”
Ready to Fight - The Reagan administration understands that Bork’s nomination is opposed; on July 1, the day of his announced nomination, the media reports that Reagan will try to ensure Bork’s confirmation by waging an “active campaign.” Even Senate-savvy James Baker, Reagan’s chief of staff, is uncertain about Bork’s chances at being confirmed, and further worries that even if Bork wins the fight, the cost to Reagan’s political capital will be too high.
His Own Worst Enemy - Conservatives Justice Department official Terry Eastland will later say Senate Democrats sabotage Bork’s chances at faring well in the confirmation hearings, even positioning his table to ensure the least favorable angles for Bork on television. However, the public’s opinion of Bork is unfavorable, and Dean will write: “[I]t was not the position of his chair in the hearing room that made Bork look bad, but rather his arrogance, his hubris, and his occasional cold-bloodedness, not to mention his equivocations and occasional ‘confirmation conversions,’ where he did what no one else could do. He made himself a terrible witness who did not appear to be truthful.” The confirmation conversions even surprise some of his supporters, as Bork abandons his previous stances that the First Amendment only applies to political speech, and the Fourteenth Amendment’s equal protection clause does not apply to women. The Senate Judiciary Committee passes Bork’s nomination along to the full Senate, where Bork is defeated 58-42.
The Verb 'To Bork' - In 2007, Dean will write, “Bork’s defeat made him both a martyr and a verb,” and quotes conservative pundit William Safire as writing that “to bork” someone means to viciously attack a political figure, particularly by misrepresenting that figure in the media. [Dean, 2007, pp. 137-143]

Entity Tags: Herman Schwartz, US Department of Justice, Gregory Peck, Edward M. (“Ted”) Kennedy, US Supreme Court, William Safire, Ronald Reagan, James A. Baker, Senate Judiciary Committee, Terry Eastland, Robert Bork, John Dean

Timeline Tags: Civil Liberties

Michael Springmann.Michael Springmann. [Source: Michael Springmann]Michael Springmann, head US consular official in Jeddah, Saudi Arabia, later claims that during this period he is “repeatedly ordered… to issue [more than 100] visas to unqualified applicants.” He turns them down, but is repeatedly overruled by superiors. [BBC, 11/6/2001; St. Petersburg Times, 11/25/2001] In one case, two Pakistanis apply for visas to attend a trade show in the US, but they are unable to name the trade show or city in which it will be held. When Springmann denies them a visa, he gets “an almost immediate call from a CIA case officer, hidden in the commercial section [of the consulate], that I should reverse myself and grant these guys a visa.” Springmann refuses, but the decision is reversed by the chief of the consular section. Springmann realizes that even the ambassador, Walter Cutler, is aware of the situation, which becomes “more brazen and blatant” as time goes on. On one occasion Springmann is even told, “If you want a job in the State Department in future, you will change your mind.” [CBC Radio One, 7/3/2002; Trento, 2005, pp. 344-6] Springmann loudly complains to numerous government offices, but no action is taken. He is fired and his files on these applicants are destroyed. He later learns that recruits from many countries fighting for bin Laden against Russia in Afghanistan were funneled through the Jeddah office to get visas to come to the US, where the recruits would travel to train for the Afghan war. According to Springmann, the Jeddah consulate was run by the CIA and staffed almost entirely by intelligence agents. This visa system may have continued at least through 9/11, and 11 of the 19 9/11 hijackers received their visas through Jeddah (see November 2, 1997-June 20, 2001), possibly as part of this program (see October 9, 2002 and October 21, 2002). [BBC, 11/6/2001; St. Petersburg Times, 11/25/2001; CBC Radio One, 7/3/2002; Associated Press, 7/17/2002 pdf file; Fox News, 7/18/2002]

Entity Tags: Central Intelligence Agency, US Consulate, Jeddah, Saudi Arabia Office, Michael Springmann

Timeline Tags: Complete 911 Timeline, War in Afghanistan

Fawaz Younis, a Lebanese militant associated with the Amal militia, a Shiite organization that is influential in Lebanon at this time, is arrested in international waters near Cyprus on September 14, 1987, during a joint FBI-CIA operation. However, US authorities fail to ask him about activities in Lebanon, such as the murders of CIA officers, kidnappings of US citizens who will later be part of an arms-for-hostages deal with Iran (see Late May, 1986), and an attack on the US Marine barracks in Beirut, where over 200 people were killed (see April 18-October 23, 1983). Authors Joe and Susan Trento will write, “The key to all these unasked questions may be that those in charge did not want to know the answers.” For example, Younis is not asked about cooperation between the Amal group, which had a covert relationship with the CIA, and Hezbollah in the bombings. One possible reason for this is that Amal head Nabih Berri has “full knowledge of the arms-for-hostages deal,” an aspect of the Iran-Contra scandal. After Younis is released in 2005, the Trentos will interview him and he will say that Amal was co-responsible for the attacks: “Nothing happened in areas we controlled without Amal’s cooperation.” He will also say that Berri ordered some of the hijackings and that he cannot understand “why the United States allowed him to get away with it.” In addition, he will comment, “Privately, people in our government will say we cannot act [against Islamic militancy] in Lebanon because Nabih Berri is a valuable US intelligence asset,” and, “That lack of action is seen by the Hezbollah as evidence of America’s lack of seriousness and resolve in the war on terror.” Regarding 9/11, he will say, “I have no doubt that our experience in breaking through airport security, developing sources and help among airport staff, was information that Hezbollah passed on to al-Qaeda.” [Trento and Trento, 2006, pp. 213, 215-7]

Entity Tags: Susan Trento, Nabih Berri, Joseph Trento, Central Intelligence Agency, Fawaz Younis, Al-Qaeda, Hezbollah, Amal

Timeline Tags: Alleged Use of False Flag Attacks, Complete 911 Timeline, Iran-Contra Affair

Richard Butler, the head of the white separatist and neo-Nazi organization Aryan Nations (see Early 1970s), is indicted, along with 12 of his followers and fellow racists, by a federal grand jury for seditious conspiracy to overthrow the government by violence, conspiring to kill federal officials, and transporting stolen money across state lines. The sedition was allegedly developed at a 1983 Aryan Nations Congress meeting (see 1981 and After). The case is tried in Fort Smith, Arkansas, before an all-white jury. The goverment is unable to prove the case, and Butler and his fellow defendants are all acquitted. The judge refuses to accept the jury’s statement that it is deadlocked on two counts, a ruling that leads to the blanket acquittals. Other white supremacists acquitted in the trial are Louis Beam (see February 1992), Richard Wayne Snell (see 9:00 p.m. April 19, 1995), and Robert Miles. US Attorney J. Michael Fitzhugh says he believes the prosecution proved its case, but “we accept the verdict of the jury.” Six of the defendants are serving prison terms for other crimes. The prosecution says Butler, Beam, Miles, and the other 10 defendants had robbed banks and armored trucks of $4.1 million, including about $1 million that still is missing. The defense countered that the prosecution’s case was based on conspiracy theories given by the prosecution’s chief witness, James Ellison, an Arkansas white supremacist serving 20 years for racketeering. During the proceedings, Butler undergoes quadruple bypass surgery and a second surgery to unblock his carotid artery, all at government expense. [Associated Press, 4/8/1998; Southern Poverty Law Center, 2010; Southern Poverty Law Center, 2010] Some time after the trial, one of the jurors marries one of the defendants, David McGuire. [Kaplan, 2000, pp. 19]

Entity Tags: Richard Wayne Snell, Robert Miles, Richard Girnt Butler, James Ellison, Louis R. Beam, Jr, J. Michael Fitzhugh, Aryan Nations, David McGuire

Timeline Tags: US Domestic Terrorism

Zahid Shaikh Mohammed, the brother of 9/11 mastermind Khalid Shaikh Mohammed (KSM), works as the head of the Pakistani branch of the charity Mercy International. A book published in 1999 will allege that this charity, based in the US and Switzerland, was used by the CIA to funnel money to Muslim militants fighting against US enemies in places such as Bosnia and Afghanistan (see 1989 and After). It is not known when Zahid got involved with the charity, but he is heading its Pakistani branch by 1988, when his nephew Ramzi Yousef first goes to Afghanistan (see Late 1980s). [Reeve, 1999, pp. 120] In the spring of 1993, US investigators raid Zahid’s house while searching for Yousef (see Spring 1993). Documents and pictures are found suggesting close links and even a friendship between Zahid and Osama bin Laden. Photos and other evidence also show close links between Zahid, KSM, and government officials close to Nawaf Sharif, who is prime minister of Pakistan twice in the 1990s. The investigators also discover that Zahid was seen talking to Pakistani President Farooq Ahmad Khan Leghari during a Mercy International ceremony in February 1993. [Reeve, 1999, pp. 48-49, 120] But despite the raid, Zahid apparently keeps his job until about February 1995, when Yousef is arrested in Pakistan (see February 7, 1995). Investigators learn Yousef had made a phone call to the Mercy office, and there is an entry in Yousef’s seized telephone directory for a Zahid Shaikh Mohammed. Pakistani investigators raid the Mercy office, but Zahid has already fled. [United Press International, 4/11/1995; Guardian, 9/26/2001; McDermott, 2005, pp. 154, 162] It is unclear what subsequently happens to Zahid. In 1999 it will be reported that he is believed to be in Kuwait, but in 2002 the Kuwaiti government will announce he is a member of al-Qaeda, so presumably he is no longer welcome there. [Reeve, 1999, pp. 48; Los Angeles Times, 9/1/2002] Mercy International’s Kenya branch will later be implicated in the 1998 US embassy bombing in that country, as will KSM, Zahid’s brother (see Late August 1998).

Entity Tags: Ramzi Yousef, Zahid Shaikh Mohammed, Khalid Shaikh Mohammed, Mercy International

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Entrance to Fort Riley, Kansas.Entrance to Fort Riley, Kansas. [Source: US Military (.com)]Terry Nichols, a 33-year-old Michigan farmer and house husband described as “aimless” by his wife Lana, joins the US Army in Detroit. He is the oldest recruit in his platoon and his fellow recruits call him “Grandpa.” During basic training at Fort Benning, Georgia, Nichols meets fellow recruits Timothy McVeigh (see 1987-1988), who joined the Army in Buffalo, New York, and Arizona native Michael Fortier. All three share an interest in survivalism, guns, and hating the government, particularly Nichols and McVeigh; unit member Robin Littleton later recalls, “Terry and Tim in boot camp went together like magnets.” For McVeigh, Nichols is like the older brother he never had; for Nichols, he enjoys taking McVeigh under his wing. Nichols also tells McVeigh about using ammonium nitrate to make explosives he and his family used to blow up tree stumps on the farm. The three are members of what the Army calls a “Cohort,” or Cohesion Operation Readiness and Training unit, which generally keeps soldiers together in the same unit from boot camp all the way through final deployment. It is in the Army that McVeigh and Nichols become enamored of the novel The Turner Diaries (see 1978), which depicts a United States racially “cleansed” of minorities and other “undesirables” (McVeigh is already familiar with the novel—see 1987-1988). All three are sent to the 11 Bravo Infantry division in Fort Riley, Kansas, where they are finally separated into different companies; McVeigh goes to tank school, where he learns to operate a Bradley fighting vehicle as well as becoming an outstanding marksman. [New York Times, 5/4/1995; New York Times, 5/28/1995; Stickney, 1996, pp. 91-95; PBS Frontline, 1/22/1996; Serrano, 1998, pp. 30; Nicole Nichols, 2003] McVeigh later says he joined the Army because he was disillusioned with the “I am better than you because I have more money” mindset some people have, and because he was taken with the Army’s advertisement that claimed, “We do more before 9 a.m. than most people do all day.” [PBS Frontline, 1/22/1996] Fellow unit member Specialist Ted Thorne will later recall: “Tim and I both considered ourselves career soldiers. We were going to stay in for the 20-plus years, hopefully make sergeant major. It was the big picture of retirement.” [Serrano, 1998, pp. 31]
Nichols Leaves Army, Tells of Plans to Form 'Own Military Organization' - In the spring of 1989, Nichols, who planned on making a career of military service, leaves the Army due to issues with an impending divorce and child care, but his friendship with McVeigh persists. Fellow soldier Glen Edwards will later say that he found Nichols’s choice to serve in the Army unusual, considering his virulent hatred of the US government: “He said the government made it impossible for him to make a living as a farmer. I thought it strange that a 32-year-old man would be complaining about the government, yet was now employed by the government. Nichols told me he signed up to pull his 20 years and get a retirement pension.” Before Nichols leaves, he tells Edwards that he has plans for the future, and Edwards is welcome to join in. Edwards will later recall, “He told me he would be coming back to Fort Riley to start his own military organization” with McVeigh and Fortier. “He said he could get any kind of weapon and any equipment he wanted. I can’t remember the name of his organization, but he seemed pretty serious about it.” [New York Times, 5/28/1995; Stickney, 1996, pp. 96, 101]
McVeigh Continues Army Career, Described as 'Strange,' 'Racist,' but 'Perfect Soldier' - McVeigh does not leave the Army so quickly. He achieves the rank of sergeant and becomes something of a “model soldier.” He plans on becoming an Army Ranger. However, few get to know him well; only his closest friends, such as Nichols, know of his passion for firearms, his deep-seated racism, or his hatred for the government. McVeigh does not see Nichols during the rest of his Army stint, but keeps in touch through letters and phone calls. Friends and fellow soldiers will describe McVeigh as a man who attempts to be the “perfect soldier,” but who becomes increasingly isolated during his Army career; the New York Times will describe him as “retreating into a spit-and-polish persona that did not admit nights away from the barracks or close friendships, even though he was in a ‘Cohort’ unit that kept nearly all the personnel together from basic training through discharge.” His friends and colleagues will recall him as being “strange and uncommunicative” and “coldly robotic,” and someone who often gives the least desirable assignments to African-American subordinates, calling them “inferior” and using racial slurs. An infantryman in McVeigh’s unit, Marion “Fritz” Curnutte, will later recall: “He played the military 24 hours a day, seven days a week. All of us thought it was silly. When they’d call for down time, we’d rest, and he’d throw on a ruck sack and walk around the post with it.” A fellow soldier, Todd Regier, will call McVeigh an exemplary soldier, saying: “As far as soldiering, he never did anything wrong. He was always on time. He never got into trouble. He was perfect. I thought he would stay in the Army all his life. He was always volunteering for stuff that the rest of us wouldn’t want to do, guard duties, classes on the weekend.” Sergeant Charles Johnson will later recall, “He was what we call high-speed and highly motivated.” McVeigh also subscribes to survivalist magazines and other right-wing publications, such as Guns & Ammo and his favorite, Soldier of Fortune (SoF), and keeps an arsenal of weapons in his home (see November 1991 - Summer 1992). Regier will later tell a reporter: “He was real different. Kind of cold. He wasn’t enemies with anyone. He was kind of almost like a robot. He never had a date when I knew him in the Army. I never saw him at a club. I never saw him drinking. He never had good friends. He was a robot. Everything was for a purpose.” [New York Times, 5/4/1995; Stickney, 1996, pp. 86; Serrano, 1998, pp. 30; Nicole Nichols, 2003] McVeigh is taken with the increasing number of anti-government articles and advertisements in SoF, particularly the ones warning about what it calls the impending government imposition of martial law and tyranny, and those telling readers how to build bombs and other items to use in “defending” themselves from government aggression. [Serrano, 1998, pp. 27-28] McVeigh is not entirely “by the book”; he knows his friend Michael Fortier is doing drugs, but does not report him to their superior officers. [PBS Frontline, 1/22/1996] McVeigh is promoted to sergeant faster than his colleagues; this is when he begins assigning the undesirable tasks to the four or five black specialists in the group, tasks that would normally be performed by privates. “It was well known, pretty much throughout the platoon, that he was making the black specialists do that work,” Regier will recall. “He was a racist. When he talked he’d mention those words, like n_gger. You pretty much knew he was a racist.” The black soldiers complain to a company commander, earning McVeigh a reprimand. Sergeant Anthony Thigpen will later confirm Regier’s account, adding that McVeigh generally refuses to socialize with African-Americans, and only reluctantly takes part in company functions that include non-whites. Captain Terry Guild will later say McVeigh’s entire company has problems with racial polarization, “[a]nd his platoon had some of the most serious race problems. It was pretty bad.” In April 1989, McVeigh is sent to Germany for two weeks for a military “change-up program.” While there, he is awarded the German equivalent of the expert infantryman’s badge. In November 1989, he goes home for Thanksgiving with Fortier, and meets Fortier’s mother Irene. In late 1990, McVeigh signs a four-year reenlistment agreement with the Army. [New York Times, 5/4/1995]
McVeigh Goes on to Serve in Persian Gulf War - McVeigh will serve two tours of duty in the Persian Gulf War, serving honorably and winning medals for his service (see January - March 1991 and After). Nichols and McVeigh will later be convicted of planning and executing the Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995).

Entity Tags: Ted Thorne, Terry Guild, Todd Regier, Terry Lynn Nichols, Robin Littleton, Michael Joseph Fortier, Charles Johnson, Glen Edwards, Marion (“Fritz”) Curnutte, Anthony Thigpen, Timothy James McVeigh, US Department of the Army

Timeline Tags: US Domestic Terrorism

August 11-20, 1988: Bin Laden Forms Al-Qaeda

The notes from al-Qaeda’s formation meeting. The short lines on the right side are the list of attendees.The notes from al-Qaeda’s formation meeting. The short lines on the right side are the list of attendees. [Source: CNN]Osama bin Laden conducts two meetings to discuss “the establishment of a new military group,” according to notes that will be found later. Notes will reveal the group is initially called al-Qaeda al-Askariya, which roughly translates to “the military base.” But the name will soon shorten to just al-Qaeda, meaning “the base” or “the foundation.” [Associated Press, 2/19/2003; Wright, 2006, pp. 131-134] With the Soviets in the process of withdrawing from Afghanistan, it is proposed to create the new group to keep military jihad, or holy war, alive after the Soviets are gone. The notes don’t specify what the group will do exactly, but they conclude, “Initial estimate, within six months of al-Qaeda [founding], 314 brothers will be trained and ready.” In fact, al-Qaeda will remain smaller than this for years to come. Fifteen people attend these two initial meetings. [Wright, 2006, pp. 131-134] In addition to bin Laden, other attendees include:
bullet Ayman Al-Zawahiri, the head of the Egyptian militant group Islamic Jihad. [New Yorker, 9/9/2002]
bullet Mohammed Atef, a.k.a. Abu Hafs.
bullet Mamdouh Mahmud Salim, a.k.a. Abu Hajer.
bullet Jamal al-Fadl.
bullet Wael Hamza Julaidan.
bullet Mohammed Loay Bayazid, a US citizen, who is notetaker for the meetings. [Wright, 2006, pp. 131-134]
Al-Fadl will reveal details about the meetings to US investigators in 1996 (see June 1996-April 1997). Notes to the meeting will be found in Bosnia in early 2002. [New Yorker, 9/9/2002] It will take US intelligence years even to realize a group named al-Qaeda exists; the first known incidence of US intelligence being told the name will come in 1993 (see May 1993).

Entity Tags: Osama bin Laden, Mohammed Loay Bayazid, Mohammed Atef, Wael Hamza Julaidan, Jamal al-Fadl, Al-Qaeda, Mamdouh Mahmud Salim, Ayman al-Zawahiri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, War in Afghanistan

Courtroom sketch of Lana Padilla.Courtroom sketch of Lana Padilla. [Source: Lawrence Journal-World]Michigan realtor Lana Padilla files for divorce from her husband Terry Nichols. Padillla, frustrated with her husband’s tendency to drift from job to job, was disappointed in his failure to commit to an Army career (see March 24, 1988 - Late 1990) and tired of trying to motivate him to begin a career. Padilla decides to move from their home in Michigan to Las Vegas, where the real estate market is booming. The divorce will be finalized in July 1989. [PBS Frontline, 1/22/1996; Serrano, 1998, pp. 72-74]

Entity Tags: Lana Padilla, Terry Lynn Nichols

Timeline Tags: US Domestic Terrorism

James Nichols, a Michigan farmer, anti-government white separatist, and the brother of Terry Nichols (see March 24, 1988 - Late 1990), formulates a plan to use a “megabomb” to destroy an Oklahoma City federal building; an unnamed FBI informant will later tell the FBI that James Nichols specifically indicates the Murrah Federal Building. Nichols, who says he is upset over the US’s “role” in the terrorist bombing of Pan Am Flight 103, shares the plan with the informant, who will swear to the information in 1995, after James’s brother Terry Nichols is arrested for helping destroy the Murrah Building (see 8:35 a.m. - 9:02 a.m. April 19, 1995). “[James] Nichols… made a specific reference to a federal building in Oklahoma City and began looking through the toolshed and workbench for a newspaper clipping depicting the Oklahoma City building,” the informant will say, according to an FBI affidavit. Nichols is unable to find the newspaper clipping, the informant will say, and instead draws a diagram remarkably similar to the Murrah Building. Nichols “later located a newspaper article containing a reference to the Federal Building in Oklahoma City and showed it” to the informer, the affidavit says. The informer is a regular visitor to the Nichols farm. [New York Times, 6/13/1995; Nicole Nichols, 2003] James Nichols routinely stamps US currency with red ink in a protest against the government, and calls his neighbors “sheeple” for obeying authority “like livestock.” A neighbor, Dan Stomber, will recall Nichols criticizing him and others for using drivers’ licences and Social Security cards, and for voting and paying taxes. “He said we were all puppets and sheeple,” Stomber will tell a reporter. “That was the first time I ever heard that word.” Stomber will not recall Nichols discussing any plans to bomb any federal buildings. [New York Times, 4/24/1995] After the Oklahoma City bombing, a friend of Nichols, an Indiana seed dealer named Dave Shafer, will tell authorities that Nichols showed him a diagram of a building remarkably similar to the Murrah Building, still under construction at the time, and said that building would be an excellent target. Shafer will say that he thought Nichols was joking. [Serrano, 1998, pp. 110] It is possible that Shafer and the unnamed FBI informant are the same person. Five years ago, a group of white supremacists had conceived of a plan to destroy the Murrah Building (see 1983).

Entity Tags: Terry Lynn Nichols, Murrah Federal Building, Federal Bureau of Investigation, Dave Shafer, James Nichols, Dan Stomber

Timeline Tags: US Domestic Terrorism

Mercy International USA’s logo.Mercy International USA’s logo. [Source: Mercy International USA]The 1999 book Dollars for Terror will allege that in 1989, Mercy International, a “subsidiary of the Muslim Brotherhood, was able to establish its headquarters in the United States, in the state of Michigan, with the assistance of the CIA. The Agency provided significant logistical and financial support to this ‘humanitarian’ organization, enabling it to act clandestinely in the various Balkan conflicts as well as within the Muslim communities of several Russian republics.” [Labeviere, 1999, pp. 364] Mercy International will later be tied to al-Qaeda in a number of ways. For instance, in the mid-1990s its Pakistan branch will be headed by Zahid Shaikh Mohammed, brother of 9/11 mastermind Khalid Shaikh Mohammed (see 1988-Spring 1995). [Los Angeles Times, 9/1/2002] Its Kenya branch will be tied to the 1998 US embassy bombing there. Its Philippine branch is tied to Mohammed Jamal Khalifa, bin Laden’s brother-in-law. [Burr and Collins, 2006, pp. 128, 188-189] Branches of this charity in different countries have slightly different names such as Mercy International-USA and Mercy International Relief Agency, and it has been claimed that the US branch has no connection with the terrorism-related branches. However, a 2003 article will draw links between the US branch and other branches. [National Review, 9/4/2003]

Entity Tags: Central Intelligence Agency, Mercy International, Mohammed Jamal Khalifa, Zahid Shaikh Mohammed, Muslim Brotherhood

Timeline Tags: Complete 911 Timeline

A convoy of Soviet tanks leaving Afghanistan.A convoy of Soviet tanks leaving Afghanistan. [Source: National Geographic]Soviet forces withdraw from Afghanistan, in accordance with an agreement signed the previous year (see April 1988). However, Afghan communists retain control of Kabul, the capital, until April 1992. [Washington Post, 7/19/1992] It is estimated that more than a million Afghans (eight per cent of the country’s population) were killed in the Soviet-Afghan War, and hundreds of thousands had been maimed by an unprecedented number of land mines. Almost half of the survivors of the war are refugees. [New Yorker, 9/9/2002] Richard Clarke, a counterterrorism official during the Reagan and George H. W. Bush administrations and the counterterrorism “tsar” by 9/11, will later say that the huge amount of US aid provided to Afghanistan drops off drastically as soon as the Soviets withdraw, abandoning the country to civil war and chaos. The new powers in Afghanistan are tribal chiefs, the Pakistani ISI, and the Arab war veterans coalescing into al-Qaeda. [Clarke, 2004, pp. 52-53]

Entity Tags: Al-Qaeda, Pakistan Directorate for Inter-Services Intelligence, Richard A. Clarke

Timeline Tags: 9/11 Timeline, War in Afghanistan

Although the Soviets withdraw from Afghanistan in February 1989 (see February 15, 1989), the CIA continues to support the mujaheddin because the Soviet-allied Communist government stays in power in Kabul. Apparently, the CIA and the Saudi government continue to fund the mujaheddin at least until December 1990, although it could be longer because the Communist government remains in power in Kabul until 1992. The “Blind Sheikh,” Sheikh Omar Abdul-Rahman, reportedly has been working with the CIA in the 1980s to help unite the mujaheddin factions fighting each other (see Late 1980s). The Village Voice will later report that according to a “very high-ranking Egyptian official,” Abdul-Rahman continues to work with the CIA after moving to Brooklyn in July 1990 (see July 1990). He “work[s] closely with the CIA, helping to channel a steady flow of money, men, and guns to mujaheddin bases in Afghanistan and Pakistan.” But despite working with the CIA, Abdul-Rahman still considers the US the “Great Satan” and does not try to hide this. In one radio broadcast, he says that “Americans are descendants of apes and pigs who have been feeding from the dining tables of the Zionists, Communism, and colonialism.” Matti Steinberg, an expert on Islamic fundamentalism, says that Abdul-Rahman’s “long-term goal is to weaken US society and to show Arab rulers that the US is not an invulnerable superpower.” The Egyptian official will later complain, “We begged America not to coddle the sheikh.” [Village Voice, 3/30/1993]

Entity Tags: Central Intelligence Agency, Omar Abdul-Rahman, Matti Steinberg

Timeline Tags: Complete 911 Timeline, War in Afghanistan

Dick Cheney’s official photo as Secretary of Defense.Dick Cheney’s official photo as Secretary of Defense. [Source: US Department of Defense]Former Representative Dick Cheney (R-WY) becomes secretary of defense under President George H. W. Bush. [US Department of Defense, 11/24/2005] Cheney is the second choice; Bush’s first consideration, former Texas senator John Tower, lost key Senate support when details of his licentious lifestyle and possible alcoholism became known. Cheney was the choice of, among others, Vice President Dan Quayle and National Security Adviser Brent Scowcroft, who both feel that Bush needs someone in the position fast, and the best way to have someone move through the confirmation process is to have someone from Congress. Although Cheney never served in the military, and managed to dodge service during the Vietnam War with five student deferments, he has no skeletons in his closet like Tower’s, and he has the support of Congressional hawks. His confirmation hearings are little more than a formality.
Cheney Leaves the House, Gingrich Steps In - Cheney’s House colleague, Republican Mickey Edwards, later reflects, “The whole world we live in would be totally different if Dick Cheney had not been plucked from the House to take the place of John Tower.” Cheney was “in line to become the [GOP’s] leader in the House and ultimately the majority leader and speaker,” Edwards will say. “If that [had] happened, the whole Gingrich era wouldn’t have happened.” Edwards is referring to Newt Gingrich (R-GA), the future speaker of the House who, in authors Lou Dubose and Jake Bernstein’s own reflections, “ushered in fifteen years of rancorous, polarized politics.” While Cheney is as partisan as Gingrich, he is not the kind of confrontational, scorched-earth politician Gingrich is. According to Edwards, no one can envision Cheney moving down the same road as Gingrich will.
Successful Tenure - As the Pentagon’s civilian chief, many will reflect on Cheney’s tenure as perhaps his finest hour as a public servant. “I saw him for four years as [defense secretary]. He was one of the best executives the Department of Defense had ever seen,” later says Larry Wilkerson, who will serve in the Bush-Cheney administration as chief of staff to Secretary of State Colin Powell. “He made decisions. Contrast that with the other one I saw [Clinton Secretary of Defense Lester Aspin], who couldn’t make a decision if it slapped him in the face.” Cheney will preside over a gradual reduction in forces stationed abroad—a reduction skillfully managed by the Chairman of the Joint Chiefs of Staff, Colin Powell.
Bringing Aboard the Neoconservatives - Cheney asks one of Tower’s putative hires, Paul Wolfowitz, to stay; Wolfowitz, with fellow Pentagon neoconservatives Lewis “Scooter” Libby and Zalmay Khalilzad, will draft the Pentagon’s 1992 Defense Planning Guide (DPG) (see February 18, 1992), a harshly neoconservative proposal that envisions the US as the world’s strongman, dominating every other country and locking down the Middle East oil reserves for its own use. Though the DPG is denounced by President Bush, Cheney supports it wholeheartedly, even issuing it under his own name. “He took ownership in it,” Khalilzad recalls. Cheney also brings in his aide from the Iran-Contra hearings, David Addington (see Mid-March through Early April, 1987), another neoconservative who shares Cheney’s view of almost unlimited executive power at the expense of the judicial and legislative branches. [Dubose and Bernstein, 2006, pp. 87-95]

Entity Tags: Lester Aspin, George Herbert Walker Bush, David S. Addington, Dan Quayle, Colin Powell, Brent Scowcroft, Jake Bernstein, Lawrence Wilkerson, Richard (“Dick”) Cheney, John Tower, Newt Gingrich, Zalmay M. Khalilzad, Mickey Edwards, Lewis (“Scooter”) Libby, Lou Dubose, Paul Wolfowitz

Timeline Tags: US Military

Members of Egyptian militant group Al-Gama’a al-Islamiyya, whose spiritual head is the ‘Blind Sheikh,’ Sheikh Omar Abdul-Rahman, hold a series of secret meetings with US officials at the American embassy in Cairo. The meetings are initiated by Al-Gama’a al-Islamiyya, which wants to co-operate with the US, because it thinks the US is co-operating with and supporting the Muslim Brotherhood in Egypt. At the meetings, representatives of the group tell the US:
bullet Al-Gama’a al-Islamiyya has between 150,000 and 200,000 members;
bullet One of the representatives at the meetings sat on Al-Gama’a al-Islamiyya’s shura, or leadership council, between 1981 and 1988. The 11 members of the group’s shura are named at the meetings, as is its operational commander;
bullet Al-Gama’a al-Islamiyya thinks highly of Saudi Arabian King Fahd, but believes he should take a stronger line against Iran. However, Abdul-Rahman met an Iranian delegation in Pakistan in autumn 1988;
bullet The group will not attack US diplomats;
bullet Abdul-Rahman travels to the US yearly, and also travels to Britain;
bullet The group is not as secret and violent as represented by the Egyptian government and has undergone a “change in thinking,” becoming concerned about its radical and violent image.
Embassy officials are skeptical about some of the claims, as the group’s representatives reveal more than the officials think is prudent. One year after the meetings, Abdul-Rahman will be issued a US visa by a CIA officer and move to the US (see July 1990). [US Embassy in Cairo, 4/25/1989 pdf file; US Embassy in Cairo, 5/3/1989 pdf file]

Entity Tags: Al-Gama’a al-Islamiyya, United States, Omar Abdul-Rahman, US Embassy in Cairo

Timeline Tags: Complete 911 Timeline

A Philippine government undercover operative later says that bomber Ramzi Yousef comes to the Philippines at this time to set up a new base for bin Laden. The operative, Edwin Angeles, is posing as a member of the militant group the Moro Islamic Liberation Front (MILF). Angeles will later claim that Yousef approaches him as the “personal envoy” of bin Laden and is looking to set up a new base of operations on the rebellious Muslim island of Mindanao. Bin Laden’s brother-in-law Mohammed Jamal Khalifa is already in the Philippines setting up charity fronts. These early contacts will contribute to the creation of the Abu Sayyaf, an offshoot of the MILF that Angeles will join. [Philippine Daily Inquirer, 7/10/2001] Yousef had been studying electrical engineering in Wales until 1989. He first went to Afghanistan in 1988 to learn bomb making at a bin Laden camp (see Late 1980s). After graduating, he moved to Afghanistan, where his father, two of his brothers, and his uncle Khalid Shaikh Mohammed are already fighting with bin Laden. [London Times, 10/18/1997] Yousef will frequently return to the Philippines to train and plot attacks (see December 1991-May 1992).

Entity Tags: Mohammed Jamal Khalifa, Khalid Shaikh Mohammed, Ramzi Yousef, Edwin Angeles

Timeline Tags: Complete 911 Timeline

Ahmed Chalabi, the charismatic, MIT-educated head of Jordan’s Petra Bank, flees to London before charges can be filed against him in regards to the collapse of his bank (see August 2, 1989 and April 9, 1992). Unworried about the Jordanian charges, Chalabi, whose formerly wealthy family fled Iraq in 1958, establishes a loose grouping of Iraqi exiles called the Iraqi National Congress, with the aim of overthrowing Iraqi dictator Saddam Hussein. Chalabi has already forged ties with some US neoconservatives like Albert Wohlstetter and Richard Perle. Now he begins cultivating ties with other influential neoconservatives such as Paul Wolfowitz, James Woolsey, Douglas Feith, and Perle’s protege, David Wurmser. Chalabi makes the rounds of the symposia and conferences, and wins new allies in pro-Israeli think tanks such as the Jewish Institute for National Security Affairs (JINSA) and the Washington Institute for Near East Policy (WINEP). Chalabi’s appeal to the neoconservatives is directly linked to his support for Israel as a regional power. The new Iraq he will build, he promises, will have strong relations with Israel. He even declares his intention to rebuild the oil pipeline from Kirkuk to Haifa, which has been inoperative since the 1940s. The neoconservatives ignore his close ties with the Iranian Shi’ite theocracy, as well as the Petra Bank’s funding of the Lebanese Shi’ite militia Amal. Instead, the neoconservatives view Chalabi as a potential savior of the Middle East. Patrick Clawson of WINEP says, “He could be Iraq’s national leader.” [Unger, 2007, pp. 123-125]

Entity Tags: Jewish Institute for National Security Affairs, Albert Wohlstetter, Ahmed Chalabi, David Wurmser, Douglas Feith, Iraqi National Congress, Paul Wolfowitz, James Woolsey, Saddam Hussein, Washington Institute for Near East Policy, Patrick Clawson

Timeline Tags: Neoconservative Influence

In a military journal, William S. Lind, a defense intellectual, and several officers warn that the US must transform its military to fight a new kind of war they call “fourth-generation warfare” or “4GW.” Unlike previous types of warfare relying on massive firepower and centralized command structures, 4GW will resemble terrorism and guerrilla warfare and could emerge from non-Western areas like the Islamic world. They write: “The fourth generation battlefield is likely to include the whole of the enemy’s society. Such dispersion, coupled with what seems likely to be increased importance for actions by very small groups of combatants, will require even the lowest level to operate flexibly on the basis of the commander’s intent. Second is decreasing dependence on centralized logistics. Dispersion, coupled with increased value placed on tempo, will require a high degree of ability to live off the land and the enemy. Third is more emphasis on maneuver. Mass, of men or fire power, will no longer be an overwhelming factor. In fact, mass may become a disadvantage as it will be easy to target. Small, highly maneuverable, agile forces will tend to dominate. Fourth is a goal of collapsing the enemy internally rather than physically destroying him. Targets will include such things as the population’s support for the war and the enemy’s culture. Correct identification of enemy strategic centers of gravity will be highly important. In broad terms, fourth-generation warfare seems likely to be widely dispersed and largely undefined; the distinction between war and peace will be blurred to the vanishing point.… A fourth generation may emerge from non-Western cultural traditions, such as Islamic or Asiatic traditions. The fact that some non-Western areas, such as the Islamic world, are not strong in technology may lead them to develop a fourth generation through ideas rather than technology.” [Marine Corps Gazette, 10/1989] After 9/11, this article and others developing similar ideas on the need for a smaller, more agile military, will be called remarkably prescient. New York Times columnist Bill Keller will comment: “The fourth-generation threat sounds, when you read this text today, uncannily like al-Qaeda. The authors suggested the threat would emerge from a non-Western culture like Islam, that it might be stateless, that, lacking modern means, its warriors would infiltrate our society and use our own technology against us, that they would regard our whole civilization as a battlefield. Fourth-generation warriors would ‘use a free society’s freedom and openness, its greatest strengths, against it.’” [CounterPunch, 9/29/2001; Hindu, 10/9/2001; Atlantic Monthly, 12/2001; New York Times Magazine, 3/10/2002] This article and others with a similar orientation will be praised in an article by “Abu ‘Ubeid Al-Qurashi,” reportedly the pseudonym of an Osama bin Laden aide and al-Qaeda theorist. He will say: “In 1989, some American military experts predicted a fundamental change in the future form of warfare.… [F]ourth-generation wars have already occurred and […] the superiority of the theoretically weaker party has already been proven; in many instances, nation-states have been defeated by stateless nations.… The time has come for the Islamic movements facing a general crusader offensive to internalize the rules of fourth-generation warfare.” [MEMRI Special Dispatch, 2/10/2002; Insight on the News, 12/24/2002; American Conservative, 4/7/2003]

Entity Tags: William Lind, Al-Qaeda, Bill Keller

Timeline Tags: US Military

Ali Mohamed’s US passport, issued in 1989.Ali Mohamed’s US passport, issued in 1989. [Source: US Justice Department] (click image to enlarge)Ali Mohamed is honorably discharged from the US Army with commendations in his file, including one for “patriotism, valor, fidelity, and professional excellence.” He remains in the Army Reserves for the next five years. [New York Times, 12/1/1998; Raleigh News and Observer, 10/21/2001] A US citizen by this time, he will spend much of his time after his discharge in Santa Clara, California, where his wife still resides. He will try but fail to get a job as an FBI interpreter, will work as a security guard, and will run a computer consulting firm out of his home. [San Francisco Chronicle, 9/21/2001]

Entity Tags: US Department of the Army, Ali Mohamed

Timeline Tags: Complete 911 Timeline

Page 1 of 22 (2195 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike