!! History Commons Alert, Exciting News

Context of 'March 8, 2008: Bush Vetoes Bill Outlawing Torture by CIA'

This is a scalable context timeline. It contains events related to the event March 8, 2008: Bush Vetoes Bill Outlawing Torture by CIA. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 2 of 7 (696 events)
previous | 1, 2, 3, 4, 5, 6, 7 | next

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Timeline Tags: Civil Liberties

Many of the Bojinka plotters are arrested in the Philippines and then let go. On April 1, the Philippines police arrest six foreigners, who are from Jordan, Syria, Lebanon, Oman, and the United Arab Emirates. They seize a cache of weapons and explosives in their apartments. It is announced the men have ties to Sheikh Omar Abdul-Rahman and Ramzi Yousef and that they are being charged with stockpiling illegal firearms. [New York Times, 4/3/1995; New York Times, 4/8/1995; South China Morning Post, 12/19/1995] On December 30, 15 more suspects are arrested. This group is made up of Iraqi, Sudanese, Saudi, and Pakistani nationals. They are found with guns and explosives. One of them is identified as Ramzi Yousef’s twin brother Abd al-Karim Yousef, who had been using the alias Adel Anon. [New York Times, 12/31/1995] Philippine authorities claim that not only were these men involved in the Bojinka plot (see January 6, 1995), but they were also planning to assassinate President Fidel Ramos and commanders of the Philippines army and national police. [CNN, 1/3/1996] Edwin Angeles had been an undercover operative posing as a top leader in the Abu Sayyaf militant group (see Late 1994-January 1995 and Early February 1995), and now he leads the investigation to capture these men based on what he knew about them when he was in Abu Sayyaf. However, he later claims that not all of them were guilty and that some of them were framed by the planting of weapons and other evidence. He goes public with this complaint in early 1996. All of the men are released on bail and then all of them jump bail. Some flee the Philippines while others stay and go into hiding. [Philippine Daily Inquirer, 7/10/2001; Contemporary Southeast Asia, 12/1/2002] It is not known what happens to most of these men after their release. But one of the men arrested in March 1995, Hadi Yousef Alghoul, will be arrested in the Philippines again in late 2001. He will be found with nearly 300 sticks of dynamite and accused of involvement in other plots as well (see December 26, 2001). In 2003, it will be reported that Abd al-Karim Yousef was recently traveling with Khalid Shaikh Mohammed (KSM), and in the wake of KSM’s 2003 arrest he is capable of taking over as al-Qaeda’s operational commander. [Washington Post, 3/4/2003; Time, 3/8/2003] It has not been explained why the Philippines did not turn him over to the US, since the US had put out an alert for him in March 1995, shortly after his brother Ramzi Yousef was arrested. [New York Times, 3/20/1995]

Entity Tags: Hadi Yousef Alghoul, Edwin Angeles, Omar Abdul-Rahman, Abd al-Karim Yousef, Ramzi Yousef

Timeline Tags: Complete 911 Timeline

Newsday reports, “Some crucial computer evidence against notorious terrorist suspect Ramzi Yousef has been destroyed, and the FBI has begun an investigation into whether the CIA is responsible…” After the Bojinka plot was foiled in the Philippines (see January 6, 1995), a computer hard drive and several floppy discs were discovered in Yousef’s Manila apartment and found to contain a great deal of useful evidence. Pictures and phone numbers recovered from the hard drive led to the arrest of another Bojinka plotter just days later (see January 7-11, 1995). The computer files were copied by Philippine authorities and then turned over to the CIA. The CIA then “provided the FBI with a summary of the files, indicating they contained detailed information about Yousef’s coconspirators in the United States and overseas, including their names, addresses and in some cases, even phone numbers.… But when the CIA turned over the actual computer and disks, Justice Department experts determined that at least three separate computer deletion programs had been used to erase some of the data, law-enforcement sources said.” One US law-enforcement official complains, “We had teams of investigators frothing at the mouth to get at Yousef’s network. And we get handed an empty computer. It’s as if we’d been tracking a serial killer and someone intentionally shredded the investigative file.” Officials believe it is not likely the files will ever be recovered. Newsday reports that “The FBI is investigating whether CIA agents or their operatives intentionally destroyed the evidence.” Since Philippine authorities made copies of the files, the FBI has tried to get copies directly from them, but without success. [Newsday, 4/16/1995] A search of the Lexis Nexus database shows no follow up to this story. But only three Bojinka plotters—Ramzi Yousef, Abdul Hakim Murad, and Wali Khan Amin Shah—are arrested in the years before 9/11, and the rest of the network goes free.

Entity Tags: Federal Bureau of Investigation, Philippines, Ramzi Yousef, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

Abdul Hakim Murad is in a US prison awaiting trial for his alleged role in the Bojinka plot (see January 6, 1995). Told about the Oklahoma City bombing that took place earlier in the day (see 8:35 a.m. - 9:02 a.m. April 19, 1995), he immediately takes credit for the bombing on behalf of his associate Ramzi Yousef. However, Yousef, also in US custody at the time, makes no such claim (see 10:00 a.m. April 19, 1995 and After). An FBI report detailing Murad’s claim will be submitted to FBI headquarters the next day. [Lance, 2006, pp. 163-164] A Philippine undercover operative will later claim that Terry Nichols, who will be convicted for a major role in the Oklahoma City bombing, met with Murad, Yousef, and others in the Philippines in 1994, and discussed blowing up a building in Oklahoma and several other locations (see Late 1992-Early 1993 and Late 1994). Counterterrorism “tsar” Richard Clarke will later comment: “Could [Yousef] have been introduced to [Nichols]? We do not know, despite some FBI investigation. We do know that Nichols’s bombs did not work before his Philippine stay and were deadly when he returned.” [Clarke, 2004, pp. 127] Mike Johnston, a lawyer representing the Oklahoma City bombing victims’ families, will later comment: “Why should Murad be believed? For one thing, Murad made his ‘confession’ voluntarily and spontaneously. Most important, Murad tied Ramzi Yousef to the Oklahoma City bombing long before Terry Nichols was publicly identified as a suspect.” [Insight, 6/22/2002] Also on this day, Mohammed Jamal Khalifa, an associate of Yousef and Murad who is being held in the US, is moved from a low security prison to a maximum security prison. [Lance, 2006, pp. 164] But despite these potential links to Muslim militants, only five days after the Oklahoma City bombing the New York Times will report, “Federal officials said today that there was no evidence linking people of the Muslim faith or of Arab descent to the bombing here.” [New York Times, 4/24/1995] Murad’s claim apparently will not be reported in any newspaper until two years later [Rocky Mountain News, 6/17/1995] , when lawyers for Nichols’s bombing partner, Timothy McVeigh, tell reporters that their defense strategy will be to claim that the bombing was the work of “foreign terrorists” led by “a Middle Eastern bombing engineer.” The lawyers will claim that the bombing was “contracted out” through an Iraqi intelligence base in the Philippines, and it is “possible that those who carried out the bombing were unaware of the true sponsor.” The lawyers also say it is possible, though less likely, that the bombing was carried out by right-wing white supremacists, perhaps from the Elohim City compound (see 1973 and After, 1983, 1992 - 1995, October 12, 1993 - January 1994, August 1994 - March 1995, September 12, 1994 and After, November 1994, February 1995, and April 5, 1995). [New York Times, 3/26/1997] The claims of foreign involvement will be discredited (see 10:00 a.m. April 19, 1995 and After).

Entity Tags: Ramzi Yousef, Richard A. Clarke, Mohammed Jamal Khalifa, Elohim City, Federal Bureau of Investigation, Mike Johnston, Abdul Hakim Murad, Timothy James McVeigh, Terry Lynn Nichols

Timeline Tags: Complete 911 Timeline, US Domestic Terrorism

A Syrian suspected of involvement in the al-Qaeda Bojinka plot is granted asylum in Australia even though the Australian government is aware of some of his apparent terrorism ties. Ahmad al-Hamwi, a.k.a. Omar Abu Omar, was head of the International Relations and Information Center (IRIC) from 1993 to 1995, a charity front closely tied to the failed Bojinka plot (see January 6, 1995). In 1995, Philippine investigators determined that most of the funding for the plot went through a bank account controlled by al-Hamwi. [Institute of Defense and Strategic Studies, 3/7/2003 pdf file] At the same time, he was roommates with Mohammed Jamal Khalifa, bin Laden’s brother-in-law, and married the sister of one of Khalifa’s Philippine wives. He worked closely with Khalifa in the IRIC until Khalifa was forced to leave the country in late 1994 (see December 1, 1994). [Australian, 4/8/2006] Shortly after the Bojinka plot is foiled by Philippines authorities in early 1995, the IRIC is shut down and al-Hamwi is brought in for questioning. However, he is let go and travels to Australia in July 1995 then immediately applies for asylum there. The Australian asylum review board is aware of the following things:
bullet He was interrogated by Philippines intelligence and questioned about his ties to WTC bomber Ramzi Yousef and the Bojinka plot to kill the Pope.
bullet He tells the review board that he was interrogated by a senior officer with direct ties to the Philippine president
bullet He came into Australia using a fake Dutch passport and has two fake Syrian passports.
bullet He has ties to Khalifa, who had been convicted of funding a bombing in Jordan.
bullet He is a longtime member of the militant group the Muslim Brotherhood.
But incredibly, in June 1996 he is granted him asylum on the grounds that he could be persecuted in Syria due to his ties to the Brotherhood. [Refugee Review Tribunal, 6/26/1996; Australian, 4/8/2006] In 2006, it will be reported that he is still living openly in Australia. Further, Philippines intelligence alleges that he came to the Philippines after having been banned from Turkey for his suspected involvement in a 1986 bombing there. It is not clear how the Australian government missed information like this, or if they just ignored it. [Australian, 4/8/2006] In the wake of these 2006 reports, the Australian government will claim to be investigating his status. Yet there have been no reports that he has been arrested or had his residency revoked since then. [Australian, 4/10/2006; Age (Melbourne), 4/10/2006]

Entity Tags: Refugee Review Tribunal, Operation Bojinka, International Relations and Information Center, Ahmad al-Hamwi, Muslim Brotherhood, Mohammed Jamal Khalifa

Timeline Tags: Complete 911 Timeline

Norma McCorvey.Norma McCorvey. [Source: Famous Why (.com)]Norma McCorvey, who under the pseudonym “Jane Roe” successfully mounted a challenge to the federal government’s ban on abortion that resulted in the 1973 Roe v. Wade decision (see January 22, 1973), has recanted her support for most abortions, according to the anti-abortion organization Operation Rescue (OR—see 1986). McCorvey has quit her job at a women’s medical clinic and joined the group, OR officials say. Her switch is apparently triggered by her recent baptism by OR leader Reverend Flip Benham. According to news reports, the organization “regards as a coup McCorvey’s defection after years as a symbol of a woman’s right to abortion.” Bill Price of Texans United for Life says, “The poster child has jumped off the poster.” McCorvey still supports the right to abortions in the first three months of pregnancy, a position fundamentally at odds with Operation Rescue doctrine. McCorvey also acknowledges that she is a lesbian and that she is uncomfortable with many aspects of conservative Christian life. [Newport News Daily Press, 8/18/1995; Newsweek, 8/21/1995]

Entity Tags: Philip (“Flip”) Benham, Norma McCorvey, Operation Rescue, Bill Price

Timeline Tags: US Health Care, Domestic Propaganda

Defense counsel for El Sayyid Nosair, one of the militants accused in the “Landmarks” bomb plot (see June 24, 1993) along with the “Blind Sheikh,” Sheikh Omar Abdul Rahman, applies for a missing witness instruction for double agent Ali Mohamed. The counsel, Roger Stavis, believes that it would benefit his client to have Mohamed testify, because Mohamed worked for militants connected to Abdul-Rahman as well as the FBI (see 1990), CIA (see 1984), and US army (see 1986). Therefore, Stavis might be able to use Nosair’s connection with Mohamed to convince the jury that Nosair was acting on the instructions of an agent of the US government. Stavis has been attempting to contact Mohamed with no success for some time, although the prosecution is in contact with him where he lives in California (see December 1994-January 1995). Under federal law, a trial judge can give a missing witness instruction if one party at a trial wants a witness to testify but cannot find him, whereas the other party can find him but does not seem to want him to testify. Based on such an instruction, the jury can then decide that the party that could find him, but did not get him to testify, did so deliberately because it thought the testimony would be damaging to it. Author Peter Lance will later comment that, given the circumstances, “Stavis had every right to expect that jury charge,” but Judge Michael Mukasey merely responds, “I don’t think a missing witness charge on that gentleman is warranted and I am not going to give one.” Lance will comment that by failing to grant the missing witness instruction, Mukasey helps “bury the significance” of Mohamed, and conceal his role in Islamic militancy from the public. [Lance, 2006, pp. 208; Raw Story, 9/25/2007] President Bush will later appoint Mukasey to be the US attorney general (see November 8, 2007).

Entity Tags: Michael Mukasey, El Sayyid Nosair, Peter Lance, Roger Stavis, Ali Mohamed

Timeline Tags: Complete 911 Timeline

Melissa Boyle Mahle.Melissa Boyle Mahle. [Source: Publicity photo]According to a later account by CIA agent Melissa Boyle Mahle, “a tidbit received late in the year revealed the location” Khalid Shaikh Mohammed (KSM) in Qatar (see 1992-1996). [Mahle, 2005, pp. 247-248] This presumably is information the FBI learned in Sudan that KSM was traveling to Qatar (see Shortly Before October 1995). However, US intelligence should also have been aware that KSM’s nephew Ramzi Yousef attempted to call him in Qatar in February 1995 while Yousef was in US custody (see After February 7, 1995-January 1996). Mahle is assigned to verify KSM’s identity. She claims that at the time the CIA is aware of KSM’s involvement in the Bojinka plot in the Philippines (see January 6, 1995) and in the 1993 WTC bombing (see February 26, 1993) She is able to match his fingerprints with a set of fingerprints the CIA already has in their files. [Guardian, 3/31/2005] By October 1995, the FBI tracks KSM to a certain apartment building in Qatar. Then, using high-technology surveillance, his presence in the building is confirmed. [Miniter, 2003, pp. 85-86] Mahle argues that KSM should be rendered out of the country in secret. The US began rendering terrorist suspects in 1993 (see 1993), and a prominent Egyptian extremist is rendered by the CIA in September 1995 (see September 13, 1995). She argues her case to CIA headquarters and to the highest reaches of the NSA, but is overruled. [Guardian, 3/31/2005] Instead, the decision is made to wait until KSM can be indicted in a US court and ask Qatar to extradite him to the US. Despite the surveillance on KSM, he apparently is able to leave Qatar and travel to Brazil with bin Laden and then back to Qatar at the end of 1995 (see December 1995). KSM will be indicted in early 1996, but he will escape from Qatar a few months later (see January-May 1996).

Entity Tags: Ramzi Yousef, Khalid Shaikh Mohammed, Melissa Boyle Mahle, National Security Agency, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A suicide bombing destroys the police station in the town of Rijeka, Croatia, wounding 29 people. The Egyptian militant group Al-Gama’a al-Islamiyya takes credit for the bombing, saying it is revenge for the abduction of Al-Gama’a al-Islamiyya leader Talaat Fouad Qassem in Croatia the month before (see September 13, 1995). The Croatians will later determine that the mastermind, Hassan al-Sharif Mahmud Saad, and the suicide bomber were both tied to Al-Gama’a al-Islamiyya. They also were tied to the Islamic Cultural Institute in Milan, Italy, which in turn has ties to many militant attacks, some committed Ramzi Yousef (see 1995-1997). CIA soon discovers that the suicide bomber also worked for the Third World Refugee Center charity front (see January 1996). [Kohlmann, 2004, pp. 153-155] In 1999, the FBI’s Bojinka investigation will notice that Khalid Shaikh Mohammed (KSM) was believed to be in neighboring Bosnia at the time and that the timing device of the bomb (a modified Casio watch) closely resembled those used by KSM and his nephew Yousef in the Bojinka plot (see January 6, 1995). Presumably, this would have increased the importance of catching KSM. [9/11 Commission, 7/24/2004, pp. 489]

Entity Tags: Third World Relief Agency, Ramzi Yousef, Khalid Shaikh Mohammed, Al-Gama’a al-Islamiyya, Federal Bureau of Investigation, Hassan al-Sharif Mahmud Saad, Talaat Fouad Qassem, Islamic Cultural Institute

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Sheila E. Witnall, the secretary of the Air Force, declassifies all Air Force accident reports prior to January 25, 1956. The declassification includes the 1948 crash of the B-29 bomber that killed nine of 13 crew members during a secret “Project Banshee” mission (see October 6, 1948). The formerly classified reports had been at the heart of the case of US v Reynolds (see March 9, 1953) that sparked the so-called “state secrets” privilege. Four years after the declassification, the daughter of one of the slain civilians on board, Judy Palya Loether, finds the accident report on the Internet; the discovery spurs her to begin looking into the circumstances of her father’s death, and ultimately will result in a second lawsuit being filed on behalf of the families of the slain crewmen (see February 26, 2003). [Siegel, 2008, pp. 205-208]

Entity Tags: Project Banshee, Sheila E. Witnall, Judy Palya Loether, US Department of the Air Force

Timeline Tags: Civil Liberties

Congress passes a military budget that includes a section requiring the Pentagon to discharge all HIV-positive soldiers, regardless of their overall health. When President Clinton signs the bill, he issues a signing statement declaring he has “concluded that this discriminatory provision is unconstitutional.” He urges Congress to repeal the statute, and says he will refuse to allow the Justice Department to defend the law in court if an HIV-positive soldier sues the government. However, Clinton’s legal team, including the Justice Department’s head of the Office of Legal Counsel, Walter Dellinger, and White House counsel Jack Quinn, tells reporters that while Clinton believes the provision is unconstitutional, he cannot refuse to enforce it because no court ruling has supported his view. Until a court intervenes, the president is bound by Congress’s decision. “When the president’s obligation to execute laws enacted by Congress is in tension with his responsibility to act in accordance to the Constitution, questions arise that really go to the very heart of the system, and the president can decline to comply with the law, in our view, only where there is a judgment that the Supreme Court has resolved the issue.” [Savage, 2007, pp. 235-236]

Entity Tags: Office of Legal Counsel (DOJ), Jack Quinn, Walter Dellinger, William Jefferson (“Bill”) Clinton, US Supreme Court, US Department of Justice

Timeline Tags: Civil Liberties

Law professor John Yoo writes a lengthy essay for the California Law Review entitled “The Continuation of Politics by Other Means: The Original Understanding of War Powers,” in which he argues that the Founding Fathers intended to empower presidents to launch wars without Congressional permission. Yoo has clerked for conservative judge Laurence Silberman and equally conservative Supreme Court Justice Clarence Thomas, and served for a year as counsel to then-Senate Judiciary Committee Chairman Orrin Hatch (R-UT). He has become a regular speaker at Federalist Society events, the informal but influential group of conservative lawyers, judges, and legal scholars who will come to have so much influence in the Bush administration. You argues that for generations, Constitutional scholars have misread the Constitution: the Founders actually supported, not repudiated, the British model of executive power that gave the king the sole power of declaring war and committing forces to battle. The Constitution’s granting of the legislature—Congress—the power to “declare war” is merely, Yoo writes, a reference to the ceremonial role of deciding whether to proclaim the existence of a conflict as a diplomatic detail. The Founders always intended the executive branch to actually declare and commence war, he writes. Most other Constitutional scholars will dismiss Yoo’s arguments, citing notes from the Constitutional Convention that show the Founders clearly intended Congress, not the president, to decide whether to commit the country to war. One of those Founders, James Madison, wrote in 1795 that giving a president the unilateral ability to declare war “would have struck, not only at the fabric of the Constitution, but at the foundation of all well organized and well checked governments. The separation of the power of declaring war from that of conducting it, is wisely contrived to exclude the danger of its being declared for the sake of its being conducted.” [Savage, 2007, pp. 80-81] Yoo will go on to join the Bush administration’s Office of Legal Counsel, and write numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002).

Entity Tags: Federalist Society, John C. Yoo

Timeline Tags: Civil Liberties

Former Defense Secretary Dick Cheney, speaking at an awards ceremony for the Gerald R. Ford Foundation, tells listeners that he intends to do whatever he can to “restore” the power of the presidency. If he ever returns to Washington, he says he will roll back what he calls “unwise” limits on the presidency imposed after the Vietnam War and Watergate. “I clearly do believe, and have spoken directly about the importance of a strong president,” he says. “I think there have been times in the past, oftentimes in response to events such as Watergate or the war in Vietnam, where Congress has begun to encroach upon the powers and responsibilities of the president: that it was important to try to go back and restore that balance.” [Savage, 2007, pp. 9]

Entity Tags: Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

Ramzi Yousef and two other defendants, Abdul Hakim Murad and Wali Khan Amin Shah, are convicted of crimes relating to Operation Bojinka (see January 6, 1995). [CNN, 9/5/1996] In the nearly 6,000-page transcript of the three-month Bojinka trial, there is not a single mention of the “second wave” of Bojinka that closely paralleled the 9/11 plot. Interrogations by Philippine investigator Colonel Rodolfo Mendoza had exposed the details of this plot quite clearly (see January 20, 1995 and February-Early May 1995). However, not only does the FBI not call Mendoza to testify, but his name is not even mentioned in the trial, not even by his assistant, who does testify. “The FBI seemed to be going out of its way to avoid even a hint of the plot that was ultimately carried out on 9/11,” author Peter Lance will later note. [Lance, 2003, pp. 350-51] Murad was extensively tortured during his imprisonment in the Philippines (see After January 6, 1995), and some observers such as law professor Alan Dershowitz will assert that Murad’s case proves the reliability of torture, claiming that Murad’s torture prevented a major disaster. However, others disagree. Law professor Stephanie Athey, in her examination of the case, will write in 2007 that Murad’s torture actually produced little useful information. A computer found in Murad’s apartment held key details of the plot (see January 7-11, 1995 and Spring 1995). CIA agent Michael Scheuer will later say that the information collected from Murad’s apartment, not the information gleaned from Murad’s torture, provided actual useful intelligence. [Vanity Fair, 12/16/2008]

Entity Tags: Rodolfo Mendoza, Ramzi Yousef, Abdul Hakim Murad, Alan M. Dershowitz, Federal Bureau of Investigation, Michael Scheuer, Operation Bojinka, Stephanie Athey, Wali Khan Amin Shah

Timeline Tags: Complete 911 Timeline

A lieutenant general meets with Qwest CEO Joe Nacchio and Dean Wandry, who heads Qwest’s government business unit. According to documents filed in 2006 by Nacchio concerning his trial on insider trading charges (see October 12, 2007), the general “told Mr. Wandry that he ran the largest telecom operation in the world, he had looked at Qwest’s network, and he wanted to use it for government purposes.” The general in question could be NSA Director Kenneth Minihan, who will be replaced in 1999 by another lieutenant general, Michael Hayden, but neither Minihan nor Hayden will comment on the allegation. Many former intelligence officials will say that it is likely Minihan who met with Nacchio and Wandry. Nacchio’s court documents indicate that he and Wandry agree to work with the general. Nacchio is not allowed to announce the contract publicly, but according to the court documents, he “understood at the time this was the beginning of a relationship which had enormous potential for future work. This proves increasingly true as time went on.” By 1999 Qwest is working extensively with the NSA. Minihan is particularly concerned about the potential of “cyberwarfare” by foreign governments, terrorist organizations, drug cartels, and organized crime, a prospect which he felt the NSA is unprepared. He particularly worries about Russia and China; in June 1998, he will testify are training personnel in potential cyber-attacks. “These opportunists, enabled by the explosion of technology and the availability of inexpensive, secure means of communication, pose a significant threat to the interests of the United States and its allies,” Minihan will state. In 2007, a former senior NSA official will say that the agency felt those groups knew US privacy laws all too well and were capable of using those laws against the NSA and other intelligence agencies. He will say, “There was such a nuanced understanding of how to tie us in knots and use American law against us, that there were certainly pockets of people saying, ‘We’ve got to be assertive; we’ve got to be more aggressive on this.’” Hayden, Minihan’s successor, will be particularly willing to push agency operations to the edge of legality. After 9/11, Hayden will say, “We’re pretty aggressive within the law. As a professional, I’m troubled if I’m not using the full authority allowed by law.” [National Journal, 11/2/2007] The NSA will approach Qwest will a similar offer in the months before 9/11 (see February 2001).

Entity Tags: Michael Hayden, Dean Wandry, Kenneth Minihan, National Security Agency, Joe Nacchio, Qwest

Timeline Tags: Civil Liberties

Dietrich Snell.Dietrich Snell. [Source: Morris Mac Matzen/ Associated Press]Abdul Hakim Murad, a conspirator in the 1995 Bojinka plot with Ramzi Yousef, Khalid Shaikh Mohammed (KSM), and others, was convicted in 1996 of his role in the Bojinka plot (see January 6, 1995). He is about to be sentenced for that crime. He offers to cooperate with federal prosecutors in return for a reduction in his sentence, but prosecutors turn down his offer. Dietrich Snell, the prosecutor who convicted Murad, will say after 9/11 that he does not remember any such offer. But court papers and others familiar with the case later confirm that Murad does offer to cooperate at this time. Snell will claim he only remembers hearing that Murad had described an intention to hijack a plane and fly it into CIA headquarters. However, in 1995 Murad had confessed to Philippine investigators that this would have been only one part of a larger plot to crash a number of airplanes into prominent US buildings, including the World Trade Center and the Pentagon, a plot that KSM later will adjust and turn into the 9/11 plot (see January 20, 1995) (see February-Early May 1995). While Philippine investigators claim this information was passed on to US intelligence, it’s not clear just which US officials may have learned this information and what they did with it, if anything. [New York Daily News, 9/25/2001] Murad is sentenced in May 1998 and given life in prison plus 60 years. [Albany Times-Union, 9/22/2002] After 9/11, Snell will go on to become Senior Counsel and a team leader for the 9/11 Commission. Author Peter Lance later calls Snell “one of the fixers, hired early on to sanitize the Commission’s final report.” Lance says Snell ignored evidence presented to the Commission that shows direct ties between the Bojinka plot and 9/11, and in so doing covers up Snell’s own role in the failure to make more use of evidence learned from Murad and other Bojinka plotters. [FrontPage Magazine, 1/27/2005]

Entity Tags: Ramzi Yousef, World Trade Center, Dietrich Snell, Khalid Shaikh Mohammed, 9/11 Congressional Inquiry, Abdul Hakim Murad, Operation Bojinka, Pentagon

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

FBI reward notice for Khalid Shaikh Mohammed.FBI reward notice for Khalid Shaikh Mohammed. [Source: FBI]Islamic militant Ramzi Yousef is sentenced to 240 years for his role in the 1993 WTC bombing. At the same time, prosecutors unseal an indictment against Khalid Shaikh Mohammed (KSM) for participating with Yousef in the 1995 Operation Bojinka plot (see January 6, 1995). In unsealing this, US Attorney Mary Jo White calls KSM a “major player” and says he is believed to be a relative of Yousef. [Washington Post, 1/9/1998] The US announces a $2 million reward for his capture in 1998 and wanted posters with his picture are distributed. [New York Times, 6/5/2002] This contradicts the FBI’s claim after 9/11 that they did not realize he was a major terrorist before 9/11. [US Congress, 12/11/2002] For instance, a senior FBI official later says, “He was under everybody’s radar. We don’t know how he did it. We wish we knew.… He’s the guy nobody ever heard of.” [Los Angeles Times, 12/22/2002] However, another official says, “We have been after him for years, and to say that we weren’t is just wrong. We had identified him as a major al-Qaeda operative before September 11.” [New York Times, 9/22/2002] Yet strangely, despite knowing KSM is a major al-Qaeda operations planner and putting out a large reward for his capture at this time, there is no worldwide public manhunt for him as there successfully was for his nephew Ramzi Yousef. KSM’s name remains obscure and he isn’t even put on the FBI’s Most Wanted Terrorists list until one month after 9/11. [Lance, 2003, pp. 327-30]

Entity Tags: Ramzi Yousef, Khalid Shaikh Mohammed, Mary Jo White, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The US enacts a law banning torture or abuse by any government official or employee. Title 18 of the US Code, Chapter 113C, Section 2340 bans US officials anywhere in the world from intentionally inflicting “severe physical or mental pain or suffering” upon another person in their control. Violation of this statute would earn the convicted official up to 20 years in prison; if a detainee dies as a result of the abuse, the convicted official can be sentenced to death. Any American official who conspires to have a prisoner abused is subject to the same penalties. [Legal Information Institute, 1/26/1998; Savage, 2007, pp. 155]

Timeline Tags: Torture of US Captives

Khalid Shaikh Mohammed (KSM) is almost caught in Brazil. Apparently, the Malaysian government discovers that KSM is in the country using an alias and an Egyptian passport, and that he has obtained a Brazilian visa. So on June 25, 1998, the US asks Brazil to help capture him. A former US official will later say, “We were fairly convinced… that he was there” in the town of Foz de Iguazu, a criminal haven that he had visited at least once before (see December 1995). [Los Angeles Times, 12/22/2002; Knight Ridder, 3/13/2003] However, KSM gets away. Time magazine reporter Tim McGirk will later claim, “They almost nailed him in Brazil. They knew that he’d left from Malaysia to Brazil….” [National Public Radio, 3/3/2003] “He had supposedly gone there to promote Konsonjaya, a Malaysian company that secretly funded Muslim rebels in Southeast Asia.” [Playboy, 6/1/2005] Konsonjaya was the front company used for the Bojinka plot in 1995 (see January 6, 1995 and June 1994), and it supposedly dealt in Sudanese honey and palm oil. [Los Angeles Times, 2/7/2002; Financial Times, 2/15/2003] The Telegraph, in an apparent reference to Konsonjaya, will later report that KSM “acted as financier and coordinator, through another [Malaysian company] which traded Sudanese honey. He traveled widely, including at least one trip to Brazil….” [Daily Telegraph, 3/2/2003] The honey distribution business had a base in Karachi, Pakistan, and employed KSM’s nephew Ali Abdul Aziz Ali (a.k.a. Ammar al-Baluchi). [US Department of Defense, 4/12/2007, pp. 17 pdf file] It is remarkable that KSM would be connected to this company in 1998, considering that the company’s records were introduced as evidence in a public trial of some Bojinka plotters in 1996. [Los Angeles Times, 2/7/2002]

Entity Tags: Khalid Shaikh Mohammed, Konsonjaya, Ali Abdul Aziz Ali

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right).Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right). [Source: Associated Press]Two US embassies in Africa are bombed within minutes of each other. At 10:35 a.m., local time, a suicide car bomb attack in Nairobi, Kenya, kills 213 people, including 12 US nationals, and injures more than 4,500. Mohamed al-Owhali and someone known only as Azzam are the suicide bombers, but al-Owhali runs away at the last minute and survives. Four minutes later, a suicide car bomb attack in Dar es Salaam, Tanzania, kills 11 and injures 85. Hamden Khalif Allah Awad is the suicide bomber there. The attacks will be blamed on al-Qaeda. [PBS Frontline, 2001; United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001] The Tanzania death toll is low because, remarkably, the attack takes place on a national holiday so the US embassy there is closed. [Miller, Stone, and Mitchell, 2002, pp. 195] The attack shows al-Qaeda has a capability for simultaneous attacks. The Tanzania bombing appears to have been a late addition, as one of the arrested bombers will allegedly tell US agents that it was added to the plot only about 10 days in advance. [United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001] A third attack against the US embassy in Uganda does not take place due to a last-minute delay (see August 7, 1998). [Associated Press, 9/25/1998] August 7, 1998, is the eighth anniversary of the arrival of US troops in Saudi Arabia and some people will speculate that this is the reason for the date of the bombings. [Gunaratna, 2003, pp. 46] In the 2002 book The Cell, reporters John Miller, Michael Stone, and Chris Mitchell will write: “What has become clear with time is that facets of the East Africa plot had been known beforehand to the FBI, the CIA, the State Department, and to Israeli and Kenyan intelligence services.… [N]o one can seriously argue that the horrors of August 7, 1998, couldn’t have been prevented.” They will also comment, “Inexplicable as the intelligence failure was, more baffling still was that al-Qaeda correctly presumed that a major attack could be carried out by a cell that US agents had already uncovered.” [Miller, Stone, and Mitchell, 2002, pp. 195, 206] After 9/11, it will come to light that three of the alleged hijackers, Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi, had some involvement in the bombings (see October 4, 2001, Late 1999, and 1993-1999) and that the US intelligence community was aware of this involvement by late 1999 (see December 15-31, 1999), if not before.

Entity Tags: Salem Alhazmi, Nawaf Alhazmi, Mohamed al-Owhali, Hamden Khalif Allah Awad, Khalid Almihdhar, Al-Qaeda, Azzam

Timeline Tags: Complete 911 Timeline

9/11 mastermind Khalid Shaikh Mohammed (KSM) lived in the Philippines for much of 1994 and took part in the failed Bojinka plot to assassinate Pope John Paul II and crash a dozen airplanes (see January 6, 1995). In the years after this, he makes repeated visits to the Philippines, as well as neighboring Malaysia. [Los Angeles Times, 9/1/2002] KSM returns to the Philippines in September 1998 and stays to organize the assassination of Pope John Paul II, who is due to visit the country in January 1999. KSM is seen at a nightclub in Manila in early 1999. [Gunaratna, 2003, pp. xxv] But the Pope’s visit is canceled; it isn’t known if the cancellation is due to security concerns or not. That same year, the FBI alerts Philippine intelligence that KSM has returned to that country to visit an old girlfriend. However, he disappears before agents arrive to arrest him. Further details on how he was traced there or how he got away have not been made public. [Los Angeles Times, 9/1/2002; London Times, 11/10/2002] KSM will continue to return to the Philippines occasionally. There are even “credible reports” that he is seen there in the summer of 2002. [Los Angeles Times, 9/1/2002; Knight Ridder, 9/9/2002]

Entity Tags: Federal Bureau of Investigation, John Paul II, Khalid Shaikh Mohammed, Operation Bojinka

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Counterterrorism expert Rohan Gunaratna will later write that after the US embassy bombings (see 10:35-10:39 a.m., August 7, 1998), surveillance of al-Qaeda is stepped up around the world. “One intelligence officer attached to the French embassy in Islamabad, [Pakistan], urged his counterparts in foreign missions in Pakistan to detail the recipients of phone calls made by… al-Qaeda leader Abu Zubaida, then living in Peshawar, to individuals in their various countries.” As a result, “several governments [launch] investigations of their own.” [Gunaratna, 2003, pp. 245] A close associate of Zubaida in Peshawar at this time is Khalil Deek, who is actually a mole for the Jordanian government (see 1998-December 11, 1999). One such investigation is launched by the Philippine government on October 16, 1998, after being asked by French intelligence to gather intelligence on people in the Philippines in contact with Zubaida. Code named CoPlan Pink Poppy, the investigation reveals connections between al-Qaeda and the Moro Islamic Liberation Front (MILF), a Philippine militant group. On December 16, 1999, Abdesselem Boulanouar and Zoheir Djalili, two French Algerians belonging to the Algerian al-Qaeda affiliate the Salafist Group for Call and Combat (GSPC), are arrested due to information learned from monitoring Zubaida’s calls to the Philippines. Boulanouar is arrested at an airport carrying a terrorist training manual he admitted writing for the MILF. Both men also are arrested carrying explosive devices. French intelligence says Boulanouar had ties to Ahmed Ressam (see December 14, 1999), and like Ressam, may have been planning to carry out attacks at the turn of the millennium. He will be deported to France and imprisoned on terrorism related charges. CoPlan Pink Poppy will be canceled in 2000 for lack of funds. [Gulf News, 3/14/2000; Ressa, 2003, pp. 132-133; Gunaratna, 2003, pp. 245] However, while details are murky, it appears other governments continue to monitor Zubaida’s calls. Around the same time as the Philippines arrests, one militant in Jordan is even arrested while still in the middle of a phone call to Zubaida (see November 30, 1999). US intelligence will remain intensely focused on Zubaida before 9/11 (see Late March-Early April 2001 and May 30, 2001), and just days before 9/11 the NSA will monitor calls Zubaida is making to the US (see Early September 2001). It appears his calls will continue to be monitored after 9/11 as well (see October 8, 2001).

Entity Tags: Khalil Deek, Zoheir Djalili, Moro Islamic Liberation Front, Direction Générale de la Sécurité Extérieure, Abdesselem Boulanouar, Philippines, Abu Zubaida, Al-Qaeda, Ahmed Ressam, Salafist Group for Preaching and Combat

Timeline Tags: Complete 911 Timeline

Princess Diana at a mine field in Angola in 1997.Princess Diana at a mine field in Angola in 1997. [Source: Tim Graham / Corbis]The NSA admits that US intelligence agencies possess 1,056 pages of classified information regarding Britain’s Princess Diana. British tabloids portray the documents as rife with salacious information on Diana’s “most intimate love secrets” about her relationship with Egyptian billionaire Dodi al-Fayed, but the actual documentation may not be so lurid. The NSA recently denied a Freedom of Information request from the Internet news service APB Online about information it has collected on Diana, who died in a tragic car accident in 1997. (It is unclear whether US intelligence has any unreleased information about the circumstances of Diana’s death. [APB Online, 11/30/1998; Washington Post, 12/12/1998] The NSA has denied monitoring Diana on the night of her death, an allegation raised by The Observer in 2006.) [MSNBC, 12/11/2006] In the two-page letter denying the request, the NSA admits to possessing a “Diana file,” but refuses to divulge what is in that file. A US intelligence official says the information is made up of conversations between other people who mentioned Diana; the references to Diana in those intercepted conversations are “incidental.” The official says Diana was never a particular target of the NSA’s Echelon surveillance program. However, the NSA has classified 124 pages of the “Diana documents” as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security.” According to a recent report by the European Parliament, the NSA routinely monitors virtually “all e-mail, telephone and fax communications… within Europe” (see July 11, 2001). Intelligence expert Steven Aftergood of the Federation of American Scientists says “the US and our allies promiscuously collect electronic communications around the world. Whether the descriptions of Echelon are accurate or not, that much is definitely true.” Some believe that lurid snippets of information leaked to the British press regarding Diana’s affair with Fayed, and her ambivalent relationship with Prince Charles, may have come from Echelon wiretaps and surveillance. Another FAS scientist, John Pike, says the NSA and other US intelligence agencies may have been monitoring Diana to protect her from terrorist attacks. Pike says it is also possible she may have been monitored because of her involvement in banning land mines, a position opposed by the Pentagon. [APB Online, 11/30/1998; Washington Post, 12/12/1998] Former NSA official Wayne Madsen will say in 2000, “[W]hen NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?” [CBS News, 2/27/2000] In August 1999, the NSA will deny another Freedom of Information request about its “Diana file” from the British newspaper The Guardian. [Guardian, 8/6/1999]

Entity Tags: Steven Aftergood, Prince Charles, The Guardian, John Pike, Dodi al-Fayed, Echelon, Federation of American Scientists (FAS), National Security Agency, Princess Diana

Timeline Tags: Civil Liberties

Richard Barlow, a former intelligence analyst who was repeatedly fired for correctly claiming that Pakistan had a nuclear weapons program (see 1981-1982, August 1987-1988 and August 4, 1989), is awarded a total of $1 million by President Bill Clinton in compensation for the treatment he received. However, Barlow does not receive the money, as the settlement has to be ratified by Congress. When it runs into procedural problems, it is moved to the Court of Federal Claims to be reviewed. After Clinton is replaced by George W. Bush, CIA Director George Tenet and NSA Director Michael Hayden assert the government’s “state secrets privilege” (see March 9, 1953) over Barlow’s entire legal claim, causing it to collapse due to lack of evidence. [Guardian, 10/13/2007]

Entity Tags: William Jefferson (“Bill”) Clinton, Richard Barlow, National Security Agency, Michael Hayden, Court of Federal Claims, Central Intelligence Agency, George J. Tenet

Timeline Tags: A. Q. Khan's Nuclear Network

It has been widely assumed in media reports that US intelligence did not connect al-Qaeda leader Hambali to the Bojinka plot (see January 6, 1995) before 9/11. However, the 9/11 Commission will mention in a footnote, “Hambali also was one of the founders of Konsonjaya, a Malaysian company run by close associate of Wali Khan [Amin Shah]. FBI report, Manila air investigation, May 23, 1999.” [9/11 Commission, 7/24/2004, pp. 489] The Christian Science Monitor will later note, “Konsonjaya was not just supplying money. It also coordinating the Bojinka plotters” (see June 1994). [Christian Science Monitor, 2/14/2002] In the spring of 1995, Philippine Colonel Rodolfo Mendoza gave the US a chart he made of the Bojinka plotters, and Konsonjaya was centrally featured in it (see Spring 1995). He later said, “It was sort of their nerve center.” [Christian Science Monitor, 2/14/2002] Shortly after Ramzi Yousef’s Manila apartment was broken into, documents found there connected Konsonjaya with the “Ladin International” company in Sudan, an obvious bin Laden front. An FBI memo at the time noted the connection. [Lance, 2003, pp. 303] Hambali’s photograph was also found on Yousef’s computer. [New Straits Times, 2/2/2002] In 1996, the company’s records were introduced as evidence in a public trial of some Bojinka plotters, and in 1998, Khalid Shaikh Mohammed was nearly caught in Brazil while using Konsonjaya as his business cover (see June 1998). So it’s not clear why it took the FBI four years to learn about Hambali, but that still means they were aware of who he was prior to the January 2000 al-Qaeda summit in Malaysia attended by Hambali and two 9/11 hijackers (see January 5-8, 2000). But apparently the connection will not be made.

Entity Tags: Wali Khan Amin Shah, Konsonjaya, Hambali, Federal Bureau of Investigation, Ramzi Yousef, Ladin International

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

CIA Director George Tenet tells a closed session of Congress, “We have seen numerous reports that bin Laden and his associates are planning terrorist attacks against US officials and facilities in a variety of locations, including in the US.” [Coll, 2004, pp. 454] However, six months later and after a well-publicized attempted al-Qaeda attack on the Los Angeles airport (see December 14, 1999), he will not mention in an open session that bin Laden has the capability to stage attacks inside the US (see February 2, 2000).

Entity Tags: Osama bin Laden, US Congress, George J. Tenet

Timeline Tags: Complete 911 Timeline

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

Diana Dean.Diana Dean. [Source: Seattle Times]Al-Qaeda operative Ahmed Ressam is arrested in Port Angeles, Washington, attempting to enter the US with components of explosive devices. One hundred and thirty pounds of bomb-making chemicals and detonator components are found inside his rental car. He subsequently admits he planned to bomb Los Angeles International Airport on December 31, 1999. [New York Times, 12/30/2001] Alert border patrol agent Diana Dean stops him; she and other agents nationwide had been warned recently to look for suspicious activity. Ressam’s bombing would have been part of a wave of attacks against US targets over the New Year’s weekend (see December 15-31, 1999). He is later connected to al-Qaeda and convicted. [US Congress, 9/18/2002; PBS Frontline, 10/3/2002]

Entity Tags: Diana Dean, Ahmed Ressam, Los Angeles International Airport, Al-Qaeda

Timeline Tags: Complete 911 Timeline

From left to right: Mokhtar Haouari, Abdelmajid Dahoumane, Abdel Ghani Meskini. The picture of Meskini is from an ATM camera.From left to right: Mokhtar Haouari, Abdelmajid Dahoumane, Abdel Ghani Meskini. The picture of Meskini is from an ATM camera. [Source: Public domain, public domain, and Seattle Times]In the wake of the arrest of Ahmed Ressam (see December 14, 1999), FBI investigators work frantically to uncover more millennium plots before the end of the year. US authorities also make a number of arrests.
bullet A telephone number found in Ressam’s pocket leads to Abdel Ghani Meskini, an Algerian living in New York City who had gone to Seattle to meet Ressam. Meskini is monitored and arrested in New York on December 30.
bullet One of Ressam’s credit cards leads to the arrest of Mokhtar Haouari, an Algerian living in Montreal, Canada. Meskini later cooperates with US investigators and is never charged, while Haouari will be sentenced to 24 years in prison. [Time, 2/7/2000; CNN, 1/16/2002; Wright, 2006, pp. 298]
bullet Another Algerian associate of Ressam’s, Abdelmajid Dahoumane, escapes to Afghanistan, but will eventually be caught by the Algerian government and convicted in Algeria. [PBS Frontline, 10/25/2001]
bullet Investigators believe that Mohamedou Ould Slahi, an al-Qaeda operative whose cousin is a top al-Qaeda leader, went to Canada to give the go-ahead for Ressam’s attack. Slahi is arrested several times overseas, but never charged (see January-April 2000). [CNN, 3/6/2002]
bullet Khalid Deek, a US citizen, is arrested around this time for masterminding another al-Qaeda millennnium plot (see December 11, 1999). But counterterrorism expert Rita Katz will later say Deek was a suspected mastermind of Ressam’s Los Angeles airport plot, too. [Orange County Register, 9/12/2005] Deek’s name and phone number is found in Ressam’s telephone book. Ressam knew Deek from bin Laden training camps in Afghanistan. Both of them, like most of Ressam’s group, have links to the GIA, an Algerian militant group associated with al-Qaeda. [Newsweek (International), 3/13/2000]
Others escape the US after hearing media reports of Ressam’s arrest. However, enough people are caught to stop additional millennium attacks. Counterterrorism “tsar” Richard Clarke later says, “I think a lot of the FBI leadership for the first time realized that… there probably were al-Qaeda people in the United States. They realized that only after they looked at the results of the investigation of the millennium bombing plot.” [PBS Frontline, 10/3/2002] Yet Clinton’s National Security Adviser Sandy Berger later claims that the FBI will still repeatedly assure the Clinton White House until Clinton leaves office that al-Qaeda lacks the ability to launch a domestic strike (see 2000).

Entity Tags: Mohamedou Ould Slahi, Sandy Berger, Khalil Deek, Mokhtar Haouari, Groupe Islamique Armé, Abdel Ghani Meskini, Al-Qaeda, Federal Bureau of Investigation, Richard A. Clarke, Ahmed Ressam

Timeline Tags: Complete 911 Timeline

The FBI misses a chance to learn about Zacarias Moussaoui after a raid in Dublin, Ireland. On December 14, 1999, Ahmed Ressam was arrested trying to smuggle explosives into the US (see December 14, 1999). On December 21, Irish police arrest Hamid Aich and several other North African immigrants living in Dublin. [New York Times, 1/22/2000] During the arrests, police seize a large amount of documents relating to citizenship applications, identities, credit cards, and airplane tickets. A diagram of an electrical switch that could be used for a bomb is found that is identical to a diagram found in Ressam’s apartment in Vancouver, Canada. [Irish Times, 7/31/2002] The suspects are released about a day later, but, “Within days, authorities in Ireland and the United States began to realize that they might have missed a chance to learn more about a terrorist network.” [New York Times, 1/22/2000] It is discovered that Aich lived with Ressam in Montreal, and then later lived with him in Vancouver. Investigators conclude there has been an al-Qaeda cell in Dublin since the early 1990s, when the charity Mercy International opened an office there (this charity has several known al-Qaeda connections by this time (see 1988-Spring 1995 and Late 1996-August 20, 1998) and also an alleged CIA connection (see 1989 and After)). The cell is mainly involved in providing travel and identity documents for other cells committing violent acts. Investigators also connect Aich to the Islamic Jihad. But the US and Canada do not seek Aich’s extradition, and instead have the Irish police keep him under surveillance. He will escape from Ireland shortly before 9/11 (see June 3, 2001-July 24, 2001). [New York Times, 1/22/2000; Irish Times, 7/31/2002] Apparently, many of the documents seized in the raid will only be closely examined after 9/11. Documents will show that in 1999 and 2000, Mustafa Ahmed al-Hawsawi, a top al-Qaeda financier, worked with the Dublin cell to finance Moussaoui’s international travel. Aich made travel arrangements and possibly provided fake identification for Moussaoui. [Fox News, 7/30/2002; Irish Times, 7/31/2002] Presumably, had these links been discovered after the 1999 raid instead of after 9/11, events could have gone very differently when Moussaoui was arrested in the US in August 2001 (see August 16, 2001).

Entity Tags: Zacarias Moussaoui, Al-Qaeda, Mercy International, Islamic Jihad, Hamid Aich, Ahmed Ressam, Federal Bureau of Investigation, Mustafa Ahmed al-Hawsawi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Earlier in December, the CIA estimated that al-Qaeda would launch between five and 15 attacks against American targets around the world over the New Year’s weekend, and that several targets would likely be inside the US (see December 8, 1999). Since late 1999, there has been intelligence that targets in Washington and New York would be attacked at this time. [US Congress, 9/18/2002] There in fact are a number of planned attacks, including bomb attacks on the Boston and Los Angeles airports (see December 14, 1999 and December 15-31, 1999), a hotel in Jordan (see November 30, 1999), and a naval ship in Yemen (see January 3, 2000). However, all of the attacks are foiled, thanks to alerts and luck. [Washington Post, 1/20/2002]

Entity Tags: Central Intelligence Agency, Al-Qaeda, Osama bin Laden

Timeline Tags: Complete 911 Timeline

In the wake of disrupting Ahmed Ressam’s millennium bomb plot at the end of 1999 and arresting his cohorts (see December 14, 1999) (see December 15-31, 1999), US intelligence remains concerned that al-Qaeda sleeper cells remain in the US (see March 10, 2000). However, Clinton’s National Security Adviser Sandy Berger later claims that the FBI still repeatedly assures the Clinton White House that al-Qaeda lacks the ability to launch a domestic strike. [New York Times, 9/22/2002] He says, “Until the very end of our time in office, the view we received from the [FBI] was that al-Qaeda had limited capacity to operate in the US and any presence here was under surveillance.” No analysis is done before 9/11 to investigate just how big that presence might be. [Washington Post, 9/20/2002]

Entity Tags: Federal Bureau of Investigation, Al-Qaeda, Sandy Berger, Central Intelligence Agency, Clinton administration

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Attendees of the Malaysian summit. Top row, from left: Nawaf Alhazmi, Khalid Almihdhar, Khalid Shaikh Mohammed. Middle row, from left: Khallad bin Attash, Abd al-Rahim al-Nashiri, Hambali. Bottom row, from left: Yazid Sufaat, Ramzi bin al-Shibh, Abu Bara al-Taizi. Attendees of the Malaysian summit. Top row, from left: Nawaf Alhazmi, Khalid Almihdhar, Khalid Shaikh Mohammed. Middle row, from left: Khallad bin Attash, Abd al-Rahim al-Nashiri, Hambali. Bottom row, from left: Yazid Sufaat, Ramzi bin al-Shibh, Abu Bara al-Taizi. [Source: FBI]About a dozen of Osama bin Laden’s trusted followers hold a secret, “top-level al-Qaeda summit” in the city of Kuala Lumpur, Malaysia. [CNN, 8/30/2002; San Diego Union-Tribune, 9/27/2002] According to an unnamed senior CIA official, before the summit started, the CIA learned that “11 young guys” were going to attend, and “young guys” is slang for operatives traveling. [Bamford, 2008, pp. 18] Plans for the October 2000 bombing of the USS Cole (see October 12, 2000) and the 9/11 attacks are discussed. [USA Today, 2/12/2002; CNN, 8/30/2002] At the request of the CIA, the Malaysian Secret Service monitors the summit and then passes the information on to the US (see January 5-8, 2000 and Shortly After). Attendees of the summit are said to include:
Nawaf Alhazmi and Khalid Almihdhar - The CIA and FBI will later miss many opportunities to foil the 9/11 plot through Alhazmi and Almihdhar and the knowledge of their presence at this summit. The CIA already knows many details about these two by the time the summit begins (see January 2-4, 2000), and tracked Almihdhar as he traveled to it (see January 2-5, 2000).
Yazid Sufaat - Sufaat is a Malaysian who owns the condominium where the summit is held. He is also a trained biologist and is said to be a leading figure in al-Qaeda’s attempts to get a biological or chemical weapon. [New York Times, 1/31/2002; Newsweek, 6/2/2002] Malaysian officials also recognize Sufaat from summit surveillance photos, as he is a long-time Malaysian resident (see Shortly After January 8, 2000). [New Straits Times, 2/10/2002] A possibility to expose the 9/11 plot through Sufaat’s presence at this summit will later be missed in September 2000 (see September-October 2000). Sufaat will travel to Afghanistan in June 2001 and be arrested by Malaysian authorities when he returns to Malaysia in late 2001 (see December 19, 2001). [Australian, 12/24/2002] He will be released in 2008 (see December 4, 2008).
Hambali - An Indonesian militant known as Hambali, or Nurjaman Riduan Isamuddin [BBC, 8/15/2003] , was heavily involved in the Bojinka plot, an early version of the 9/11 plot (see January 6, 1995 and June 1994). [CNN, 3/14/2002; CNN, 8/30/2002] The FBI was aware of who he was and his connections to the Bojinka plot at least by 1999 and identified a photograph of him by that time (see May 23, 1999). He will be arrested by Thai authorities in August 2003 (see August 12, 2003). [CNN, 8/14/2003; CBS News, 8/15/2003] Malaysian officials recognize Hambali from summit surveillance photos, as he is a long-time Malaysian resident. But the US does not tell them of his Bojinka connections, so they will not know to arrest him after the summit is over (see Shortly After January 8, 2000). [New Straits Times, 2/10/2002]
Khalid Shaikh Mohammed - Mohammed is sometimes referred to as “KSM,” an al-Qaeda leader and the alleged “mastermind” of the 9/11 attacks. The US has known KSM is an Islamic militant since the exposure of Operation Bojinka in January 1995 (see January 6, 1995), and knows what he looks like. US officials will state that they only realized the summit was important in 2001, but the presence of KSM should have proved its importance. [Los Angeles Times, 2/2/2002] Although the possible presence of KSM at this summit will be disputed by US officials, one counterterrorism expert will testify before the 9/11 Commission in 2003 that he has access to transcripts of KSM’s interrogations since his capture, and that KSM has admitted leading this summit and telling the attendees about a planes-as-weapons plot targeting the US (see July 9, 2003). [Newsweek, 7/9/2003; New York Post, 7/10/2003] Many other media reports will identify him as being there. [Independent, 6/6/2002; CNN, 8/30/2002; CNN, 11/7/2002; Canadian Broadcasting Corporation, 10/29/2003] For instance, according to Newsweek: “Mohammed’s presence would make the intelligence failure of the CIA even greater. It would mean the agency literally watched as the 9/11 scheme was hatched—and had photographs of the attack’s mastermind… doing the plotting.” [Newsweek, 7/9/2003] In Hambali’s 2008 Guantanamo file, it will be mentioned that KSM stays a week at Sufaat’s condominium with Alhazmi and Almihdhar, which would seem to make clear that KSM is there for the entire duration of the summit (see Early January 2000). [US Department of Defense, 10/30/2008]
Khallad bin Attash - Khallad bin Attash, a “trusted member of bin Laden’s inner circle,” is in charge of bin Laden’s bodyguards, and serves as bin Laden’s personal intermediary at least for the USS Cole bombing. [Newsweek, 9/20/2001 pdf file] He is also thought to be a “mastermind” of that attack. Attash is reportedly planning to be one of the 9/11 hijackers, but will be unable to get a US visa. [9/11 Commission, 6/16/2004, pp. 8] US intelligence had been aware of his identity as early as 1995. [US Congress, 9/18/2002] A possibility to expose the 9/11 plot through bin Attash’s presence at this summit will be missed in January 2001 (see January 4, 2001). Bin Attash had been previously arrested in Yemen for suspected terror ties, but was let go (see Summer 1999). [Contemporary Southeast Asia, 12/1/2002] He will be captured in Pakistan by the US in April 2003 (see April 29, 2003). In 2008, Newsweek will report that bin Attash confessed during interrogation that, while staying at Sufaat’s condominium, he and Alhazmi talked “about the possibility of hijacking planes and crashing them or holding passengers as hostages.” [Newsweek, 12/16/2008]
Abd al-Rahim al-Nashiri - Al-Nashiri is one of al-Qaeda’s top field commanders and operates out of Malaysia while 9/11 is being prepared. [Los Angeles Times, 10/10/2001; Gunaratna, 2003, pp. 188; Graham and Nussbaum, 2004, pp. 59] He was involved in an arms smuggling plot (see 1997) and the East African embassy bombings (see August 22-25 1998), in which his cousin was martyred (see 10:35-10:39 a.m., August 7, 1998). He also organized the attack against the USS The Sullivans (see January 3, 2000), and will be involved in the attacks against the USS Cole (see October 12, 2000) and the Limburg (see October 6, 2002). He will be arrested in the United Arab Emirates in November 2002 (see Early October 2002). An al-Qaeda operative identified a photo of al-Nashiri for the FBI in late 1998 (see August 22-25 1998). [9/11 Commission, 7/24/2004, pp. 152-3] (Note: in the sources, al-Nashiri is referred to by two of his aliases: Muhammad Omar al-Harazi and Al Safani.) [CNN, 12/11/2000; Central Intelligence Agency, 9/6/2006]
Ramzi bin al-Shibh - Investigators believe he wants to be the 20th 9/11 hijacker. His presence at the summit may not be realized until after 9/11, despite the fact that US intelligence has a picture of him next to bin Attash, and has video footage of him. [Newsweek, 11/26/2001; Washington Post, 7/14/2002; Time, 9/15/2002; Die Zeit (Hamburg), 10/1/2002; CNN, 11/7/2002] German police will have credit card receipts indicating bin al-Shibh is in Malaysia at this time. [Los Angeles Times, 9/1/2002] Ulrich Kersten, director of Germany’s federal anticrime agency, the Bundeskriminalamt, will later say, “There are indications that Ramzi bin al-Shibh was in Kuala Lumpur for the meeting.” [New York Times, 8/24/2002] Another account noting he was photographed at the summit will further note that he enters and leaves Thailand three times in the first three weeks of January 2000. [Los Angeles Times, 10/17/2001] Anonymous Malaysian officials will later claim he is at the summit, but US officials will deny it. Two local militants who serve as drivers for the attendees will later be arrested in Malaysia. They will be shown photos of the attendees, and confirm that bin al-Shibh was at the summit. [Associated Press, 9/20/2002] One account will say he is recognized at the time of the summit, which makes it hard to understand why he is not tracked back to Germany and the Hamburg cell with Mohamed Atta and other 9/11 hijackers. [Der Spiegel (Hamburg), 10/1/2002] Another opportunity to expose the 9/11 plot through bin al-Shibh’s presence at this summit will be missed in June. It appears bin al-Shibh and Almihdhar are directly involved in the attack on the USS Cole in October 2000 (see October 10-21, 2000). [Guardian, 10/15/2001; Washington Post, 7/14/2002; Newsweek, 9/4/2002]
Salem Alhazmi - Alhazmi, a 9/11 hijacker and brother of Nawaf Alhazmi, is possibly at the summit, although very few accounts will mention it. [Australian, 12/24/2002] US intelligence intercepts from before the summit indicate that he at least had plans to attend. [US Congress, 7/24/2003, pp. 51 pdf file]
Abu Bara al-Taizi (a.k.a. Zohair Mohammed Said) - A Yemeni al-Qaeda operative, al-Taizi is reportedly meant to be one of the 9/11 hijackers, but will be unable to enter the US due to greater scrutiny for Yemenis. [9/11 Commission, 6/16/2004, pp. 8] Al-Taizi will be captured in Pakistan in February 2002, and then sent to the US prison in Guantanamo a few months later (see February 7, 2002). According to his 2008 Guantanamo file, he traveled from Afghanistan to Malaysia with bin Attash about two weeks before the summit. Bin Attash was missing a leg, and he had a prosthetic leg fitted and then stayed in the hospital to recover from the surgery. Bin Attash and al-Taizi stay at Sufaat’s house for the duration of the summit. Al-Taizi then flies to Yemen to visit his family there. [US Department of Defense, 10/25/2008]
Others - Unnamed members of the Egyptian-based Islamic Jihad are also said to be at the summit. [Cox News Service, 10/21/2001] Islamic Jihad merged with al-Qaeda in February 1998. [ABC News, 11/17/2001] However, according to the Wall Street Journal, bin Attash and Fahad al-Quso are suspected of being Islamic Jihad members at one point, so this may just be a reference to them. [Wall Street Journal, 10/8/2001] Note that there are a total of 10 names mentioned above, and it will be reported that the CIA learned that 11 operatives were to attend, so either not all of them make it, or some names of attendees will remain unknown.
Summit Associates - The following individuals are probably not at the summit meetings, but are in the region and assisting or linked with the attendees at this time:
Fahad Al-Quso - Al-Quso is a top al-Qaeda operative who is involved in the bombing of the USS Cole. Some sources will indicate al-Quso is present in Malaysia, and a person who looks like him will later be seen in a photograph of the meeting (see June 11, 2001). [Newsweek, 9/20/2001 pdf file] However, other sources will say al-Quso did not reach Kuala Lumpur, but met with bin Attash around this time in Bangkok, Thailand (see January 5-6, 2000 and January 8-15, 2000). [9/11 Commission, 7/24/2004, pp. 159; Wright, 2006, pp. 330] Although al-Quso apparently is not at the summit, there are a series of phone calls during the time of the summit between his hotel in Bangkok, a phone booth near the condominium where the summit is held, and his family home in Yemen (see (January 5-8, 2000)). Al-Quso will be arrested by Yemeni authorities in the fall of 2000 (see Late October-Late November 2000), but the FBI will not be given a chance to fully interrogate him before 9/11. He will escape from prison in 2003. [CNN, 5/15/2003]
Ahmad Sajuli Abdul Rahman - An operative of Jemaah Islamiyah, al-Qaeda’s Southeast Asian affiliate, Sajuli takes the visiting Arabs around Kuala Lumpur, but apparently does not attend the summit meetings. [US Congress, 10/17/2002] According to the later Guantanamo file of summit attendee al-Taizi, one of the attendees Sajuli escorts around town is future 9/11 hijacker Khalid Almihdhar. Sajuli also helps arrange al-Taizi’s transportation at the end of the summit. [US Department of Defense, 10/25/2008] Sajuli will be arrested in Malaysia in December 2001 (see December 29, 2001).
Ahmad Hikmat Shakir - A suspected al-Qaeda agent of Iraqi nationality, Shakir is a greeter at Kuala Lumpur airport. He meets Almihdhar there and travels with him to the apartment where the summit is held, but he probably does not attend the summit meetings. [Associated Press, 10/2/2002; Newsweek, 10/7/2002; Australian, 12/24/2002; Knight Ridder, 6/12/2004] After 9/11, he will be linked to the 1993 World Trade Center bombing and the 1995 Bojinka plot. Jordan will arrest him and let him go after the US says it doesn’t want to take custody of him (see September 17, 2001).
Dhiren Barot - Dhiren Barot (a.k.a. Abu Eissa al-Hindi) is a British citizen of Indian descent. According to a 2006 Observer article, Barot “is not believed to have been present” at the summit meetings. However, he does go to Kuala Lumpur during the time of the summit with summit attendee bin Attash. And shortly after the summit, Barot holds meetings with Hambali. It will later be reported that Barot is sent by KSM to New York City in early 2001 to case potential targets there, although whether this is part of the 9/11 plot or some other plot is unclear (see May 30, 2001). Barot will be arrested in 2004 in Britain for plotting attacks there, and sentenced to 30 years in prison (see August 3, 2004). [Observer, 12/12/2006]
Another Unnamed Local Militant - Malaysian officials will say that two local Jemaah Islamiyah act as drivers for the attendees. These drivers apparently have no idea who the attendees are or what they are doing; they are just tasked to drive them around. In a 2002 Associated Press article, officials will not name these drivers, but will say that they are among the dozens of alleged Jemaah Islamiyah militants arrested in December 2001 and January 2002. Since Sajuli mentioned above is arrested at that time, he presumably is one of these drivers. It is not known who the other driver is. (Sufaat will be arrested at that time as well, but the Associated Press article will make clear Sufaat is not one of the drivers.) [Associated Press, 9/20/2002]
Probably Not Involved: Mohamed al-Khatani - A Saudi, he allegedly will confess to attending the summit while being held in the US Guantanamo prison (see July 2002). He apparently will unsuccessfully attempt to enter the US in August 2001 to join the 9/11 plot (see August 4, 2001). However, al-Khatani will later recant his testimony and say he lied to avoid torture (see October 26, 2006). Furthermore, his 2008 Guantanamo file, leaked to the public in 2011, contains no hint of him even possibly attending the summit. The contents of the file must be treated with extreme caution, especially since he is repeatedly and brutally tortured (see August 8, 2002-January 15, 2003 and January 14, 2009). But according to the general narrative of the file, al-Khatani had no involvement with Islamist militancy in early 2000, only starts to get involved with militants in mid-2000, and first attends a militant training camp in Afghanistan in late 2000. [US Department of Defense, 10/30/2008]

Entity Tags: Hambali, Abu Bara al-Taizi, Dhiren Barot, Central Intelligence Agency, Ahmad Hikmat Shakir, Ahmad Sajuli Abdul Rahman, Al-Qaeda, Abd al-Rahim al-Nashiri, Islamic Jihad, Jemaah Islamiyah, Fahad al-Quso, Khalid Shaikh Mohammed, Ulrich Kersten, Yazid Sufaat, Khalid Almihdhar, Ramzi bin al-Shibh, Salem Alhazmi, Mohamed al-Khatani, Malaysian Secret Service, Khallad bin Attash, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The US knows that Hambali has ties to the 1995 Bojinka plot (see January 6, 1995) but apparently fails to share this information with Malaysian authorities, who therefore miss a chance to arrest him. By 1999, the US determined that Hambali was one of the founders of Konsonjaya, a front company central to funding the Bojinka plot (see May 23, 1999). US investigators also found a photograph of him on Ramzi Yousef’s computer in 1995, further tying him to the Bojinka plot. [New Straits Times, 2/2/2002] In January 2000, Malaysian intelligence monitors an al-Qaeda summit meeting at the request of the CIA (see January 5-8, 2000). Malaysian intelligence recognize Hambali and Yazid Sufaat from photos of the meeting; both are long-time residents in Malaysia. However, because the US does not share the information about Hambali, the Malaysians decide not to arrest or question Hambali and Sufaat since they are not aware either man has any criminal ties. [New Straits Times, 2/10/2002] As a result, Malaysian authorities fail to learn more about this summit meeting, which was attended by two 9/11 hijackers. The US also fails to follow up with Hambali, despite their knowledge of him.

Entity Tags: Ramzi Yousef, Hambali, Yazid Sufaat

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Judy Palya Loether.Judy Palya Loether. [Source: SecrecyFilm (.com)]Judy Palya Loether, the daughter of a civilian engineer killed in a 1948 plane crash while on a secret government mission (see October 6, 1948), reads over the voluminous reports of the accident that claimed her father’s life. The reports, now declassified (see January 1996), had been at the heart of a landmark lawsuit that gave judicial recognition to the government’s “state secrets” privilege (see March 9, 1953). Loether is shocked to find that the reports contain nothing that could be construed as military or tactical secrets of any kind, though for decades the government has insisted that they could not be revealed, even to a judge (see October 18, 1948, July 26, 1950, August 7-8, 1950, September 21, 1950, and October 19, 1951). What they do contain is a compendium of witness statements and expert findings that indicate a number of mistakes and errors led to the crash. Loether begins contacting the families of the widows who had filed the original lawsuit against the government (seeJune 21, 1949) to share her findings. [Siegel, 2008, pp. 210-211] Loether is confused and angered over the contents of the reports, and the government’s response to the lawsuit. She cannot understand why the government pressed so hard to keep the reports classified, knowing that they contained no sensitive information about the secret missile program, and is particularly troubled by the fact that at least two senior government officials signed affidavits affirming the reports’ inclusion of such information while knowing that the reports contained nothing of the sort. She wonders if government officials had perhaps decided to lie about the reports in order to establish some sort of state secrets privilege. In September 2002, lawyers Wilson Brown and Jeff Almeida, retained by Loether and others who lost family members in the crash, come to the same conclusion. As Almeida will say to Brown: “I’ve read this report. There’s nothing in there.” [Siegel, 2008, pp. 219] As time goes on, Loether and her colleagues files a second lawsuit seeking to overturn the first Supreme Court verdict (see February 26, 2003).

Entity Tags: Wilson Brown, Jeff Almeida, Judy Palya Loether

Timeline Tags: Civil Liberties

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

Hijacker Nawaf Alhazmi and one of his associates, Mohdar Abdullah, go to Los Angeles airport with hijacker Khalid Almihdhar, who is returning to the Middle East via Germany (see June 10, 2000). [9/11 Commission, 7/24/2004, pp. 222] Together with a third man, Alhazmi and Abdullah shoot videocamera footage there. They appear to be scouting out the airport and record secretly near the security area. The identity of the third man is not known, but he may be Khallam, an associate of Alhazmi and Almihdhar’s who they met the day before (see June 9, 2000). Al-Qaeda had plotted to bomb Los Angeles Airport not long before (see December 14, 1999). The tapes, which are not found until Abdullah is deported, will cause the FBI to re-start their investigation of him in 2006. [US District Court, Southern District of California, 10/29/2004 pdf file; MSNBC, 9/8/2006]

Entity Tags: Mohdar Abdullah, Federal Bureau of Investigation, Nawaf Alhazmi, Khallam

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

John Yoo, an associate law professor at the University of California at Berkeley, makes a presentation at a Cato Institute seminar on executive power. Yoo, who will go on to become one of the Bush administration’s primary advocates of unchecked executive power (see March 1996), accuses the Clinton administration of upending the Constitution to give the executive branch unwarranted authority (see March 24 - Mid-June, 1999). “[T]he Clinton administration has undermined the balance of powers that exist in foreign affairs, and [they] have undermined principles of democratic accountability that executive branches have agreed upon well to the Nixon administration,” he says. Regarding the Clinton administration’s stretched interpretation of the Anti-Ballistic Missile Treaty (see June 2000), Yoo says that the Clinton “legal arguments are so outrageous, they’re so incredible, that they actually show, I think, a disrespect for the idea of law, by showing how utterly manipulatible it is.” [Savage, 2007, pp. 67]

Entity Tags: Bush administration (43), John C. Yoo, Nixon administration, Clinton administration

Timeline Tags: Civil Liberties

The US intelligence community has been monitoring al-Qaeda telephone communications to and from a communications hub in Yemen since the late 1990s (see Late August 1998). The CIA intercepts an al-Qaeda operative say in a monitored phone call that bin Laden is planning a “Hiroshima-type event” against the US. Failed millennium bomber Ahmed Ressam, who is arrested in late 1999 (see December 14, 1999), confirms at the time that al-Qaeda is preparing such an attack. [New York Times, 10/14/2001; PBS, 10/3/2002] This sets off an immediate but unsuccessful search for further evidence. Shortly after 9/11, the New York Times will report that “intelligence officials now acknowledge that they never imagined that Mr. bin Laden’s organization had the ability to kill thousands of people in coordinated attacks on the American homeland. Looking back through the prism of Sept. 11, officials now say that the intercepted message was a telling sign of a drastic shift in the ambitions and global reach of al-Qaeda during the last three years.” [New York Times, 10/14/2001] There apparently is another intercepted message talking about a “Hiroshima” event in the summer of 2001 (see Summer 2001).

Entity Tags: Al-Qaeda, Ahmed Ressam, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

October 12, 2000: USS Cole Bombed by Al-Qaeda

Damage to the USS Cole.Damage to the USS Cole. [Source: Department of Defense]The USS Cole is bombed in the Aden, Yemen harbor by two al-Qaeda militants, Hassan al-Khamri and Ibrahim al-Thawar (a.k.a. Nibras). Seventeen US soldiers are killed and 30 are wounded. The CIA will later conclude that with just slightly more skilled execution, the attack would have killed 300 and sunk the ship. [ABC News, 10/13/2000; Coll, 2004, pp. 532; 9/11 Commission, 7/24/2004, pp. 191] The Islamic Army of Aden (IAA) immediately takes credit for the attack. This is a Yemen-based Muslim militant group widely believed to have close ties to al-Qaeda (see 1996-1997 and After). [Guardian, 10/14/2000] The IAA statement is released by its spokesman, Abu Hamza al-Masri (see Early 1997, (June 1998), and December 28, 1998 and After). Abu Hamza says that the attack was timed to mark the anniversary of the execution of the IAA’s former commander (see October 17, 1999). [O'Neill and McGrory, 2006, pp. 184] The prime minister of Yemen at the time of the bombing will say shortly after 9/11, “The Islamic Army was part of al-Qaeda.” [Guardian, 10/13/2001] The US soon learns the names of some al-Qaeda operatives involved in the attack, including Khalid Shaikh Mohammed, Tawfiq bin Attash and Fahad al-Quso (see Early December 2000), and Abd al-Rahim al-Nashiri (see November-December 2000). 9/11 hijackers Ramzi bin al-Shibh (see October 10-21, 2000) and Khalid Almihdhar (see Around October 12, 2000) may also have been involved. This is a repeat of a previously attempted attack, against the USS The Sullivans, which failed and was apparently undetected (see January 3, 2000). [Los Angeles Times, 12/22/2002] The 9/11 Commission will later say the Cole bombing “was a full-fledged al-Qaeda operation, supervised directly by bin Laden. He chose the target and location of the attack, selected the suicide operatives, and provided the money needed to purchase explosives and equipment.” [9/11 Commission, 7/24/2004, pp. 190]

Entity Tags: Khalid Shaikh Mohammed, Khallad bin Attash, Ramzi bin al-Shibh, Islamic Army of Aden, USS Cole, Osama bin Laden, Ibrahim al-Thawar, Khalid Almihdhar, Fahad al-Quso, Abd al-Rahim al-Nashiri, Hassan al-Khamri, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The US puts out an international arrest warrant for Khalid Shaikh Mohammed (KSM). The warrant seeks KSM in connection with the 1995 Bojinka plot (see January 6, 1995). [Knight Ridder, 3/13/2003] It is not clear why the US waited so long to issue this warrant, considering that the US connected him to a major terrorist act back in 1993 (see March 20, 1993), learned he was a major figure in the Bojinka plot in 1995 (see After February 7, 1995-January 1996), secretly indicted him in January 1996, and placed a $2 million reward on his head in January 1998 (see January 8, 1998).

Entity Tags: Khalid Shaikh Mohammed

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). [Truthout (.org), 1/17/2006] In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. [New York Times, 12/16/2007]

Entity Tags: Bush administration (43), National Security Agency

Timeline Tags: Civil Liberties

Damaged cars from the Christmas Eve bombings.Damaged cars from the Christmas Eve bombings. [Source: SBS Dateline]Al-Qaeda affiliate Jemaah Islamiyah (JI) sets off two series of bombs, first in Indonesia, then in the Philippines. The Christmas Eve attacks in Indonesia comprise a series of 38 bombings in 11 cities and are directed against churches. Nineteen people are killed and over a hundred injured. [Asia Times, 10/8/2004] The attacks in the Philippines kill 22 and injure 120 in the country’s capital, Manila. The operation, involving attacks on a train, a bus, an abandoned petrol station, an airport car park, and a park, is apparently carried out by Indonesian JI operative Fathur Rohman Al-Ghozi. [BBC, 2/27/2002] Many militants are arrested after the attacks. The investigation leads to JI and al-Qaeda leader Hambali, a veteran Islamic fighter who was involved in the Bojinka plot (see January 6, 1995), is tied to 9/11 mastermind Khalid Shaikh Mohammed (see June 1994), and attended an al-Qaeda Malaysia summit in 2000, which was monitored by Malaysia intelligence and the CIA (see January 5-8, 2000). Although Hambali, an Indonesian, has lived in Malaysia since the mid-1990s, the authorities cannot find him and say that he has fled to Saudi Arabia (see January 2001 and after). [Jakarta Post, 2/7/2001] JI’s spiritual leader, Abu Bakar Bashir, is also arrested, but then released. [CNN, 2/26/2004] Hambali will finally be captured in August 2003 in Thailand (see August 12, 2003). In February 2001, evidence will come out suggesting links between some of the bombers and the Indonesian military (see February 20, 2001).

Entity Tags: Jemaah Islamiyah, Hambali, Fathur Rohman al-Ghozi, Abu Bakar Bashir

Timeline Tags: Alleged Use of False Flag Attacks, Complete 911 Timeline

According to reporter and author Charlie Savage, the White House staff quickly coalesces into two camps: “Bush People[,] mostly personal friends of the new president who shared his inexperience in Washington,” which includes President Bush’s top legal counsels, Alberto Gonzales and Harriet Miers, both corporate lawyers in Texas before joining Bush in Washington. The second group is “Cheney People—allies from [Vice-President Dick] Cheney’s earlier stints in the federal government (see May 25, 1975, November 18, 1980, 1981-1992, 1989, and June 1996) who were deeply versed in Washington-level issues, a familiarity that would allow their views to dominate internal meetings. These included [Defense Secretary Donald] Rumsfeld and other cabinet secretaries, key deputies throughout the administration, and David Addington, Cheney’s longtime aide who would become a chief architect of the administration’s legal strategy in the war on terrorism” (see July 1, 1992 and (After 10:00 a.m.) September 11, 2001). Savage will observe, “Given the stark contrast in experience between Cheney and Bush, it was immediately clear to observers of all political stripes that Cheney would possess far more power than had any prior vice president.”
'Unprecedented' Influence - Cheney will certainly have “unprecedented” influence, according to neoconservative publisher William Kristol, who himself had served as former Vice President Dan Quayle’s chief of staff. “The question to ask about Cheney,” Kristol will write, is “will he be happy to be a very trusted executor of Bush’s policies—a confidant and counselor who suggests personnel and perhaps works on legislative strategy, but who really doesn’t try to change Bush’s mind about anything? Or will he actually, substantively try to shape administration policy in a few areas, in a way that it wouldn’t otherwise be going?”
Expanding the Power of the Presidency - Cheney will quickly answer that question, Savage will write, by attempting to “expand the power of the presidency.” Savage will continue: “He wanted to reduce the authority of Congress and the courts and to expand the ability of the commander in chief and his top advisers to govern with maximum flexibility and minimum oversight. He hoped to enlarge a zone of secrecy around the executive branch, to reduce the power of Congress to restrict presidential action, to undermine limits imposed by international treaties, to nominate judges who favored a stronger presidency, and to impose greater White House control over the permanent workings of government. And Cheney’s vision of expanded executive power was not limited to his and Bush’s own tenure in office. Rather, Cheney wanted to permanently alter the constitutional balance of American government, establishing powers that future presidents would be able to wield as well.” [Savage, 2007, pp. 7-9] Larry Wilkerson, the chief of staff for Secretary of State Colin Powell, will say after leaving the administration: “We used to say about both [Defense Secretary Donald Rumsfeld’s office] and the vice president’s office that they were going to win nine out of 10 battles, because they were ruthless, because they have a strategy, because they never, never deviate from that strategy. They make a decision, and they make it in secret, and they make it in a different way than the rest of the bureaucracy makes it, and then suddenly, foist it on the government—and the rest of the government is all confused.” [Unger, 2007, pp. 299]
Signing Statements to Reshape Legislation, Expand Presidential Power - To that end, Cheney ensures that all legislation is routed through his office for review before it reaches Bush’s desk. Addington goes through every bill for any new provisions that conceivably might infringe on the president’s power as Addington interprets it, and drafts signing statements for Bush to sign. In 2006, White House counsel Bradford Berenson will reflect: “Signing statements unite two of Addington’s passions. One is executive power. And the other is the inner alleyways of bureaucratic combat. It’s a way to advance executive power through those inner alleyways.… So he’s a vigorous advocate of signing statements and including important objections in signing statements. Most lawyers in the White House regard the bill review process as a tedious but necessary bureaucratic aspect of the job. Addington regarded it with relish. He would dive into a 200-page bill like it was a four-course meal.” It will not be long before White House and Justice Department lawyers begin vetting legislation themselves, with Addington’s views in mind. “You didn’t want to miss something,” says a then-lawyer in the White House. [Savage, 2007, pp. 236]

Entity Tags: David S. Addington, Bradford Berenson, Alberto R. Gonzales, Charlie Savage, William Kristol, Richard (“Dick”) Cheney, Donald Rumsfeld, Bush administration (43), Harriet E. Miers, George W. Bush, Lawrence Wilkerson

Timeline Tags: Civil Liberties

The Bush administration’s legal team meets for the first time. The head of the group, White House counsel Alberto Gonzales, is well known as a staunchly loyal aide to President Bush, and has long ensured that Bush receives the legal opinions he wants. While Bush was governor of Texas, Gonzales routinely prepared briefings for him on death row prisoners appealing for clemency, briefings that usually left out mitigating circumstances that might have led Bush to consider waiving the death penalty. Bush was pleased at Gonzales’s approach, and the White House legal team will quickly come to understand that that same approach will be used in its legal work. One young team member is Bradford Berenson, who made his reputation working with the Bush-Cheney campaign in its fight to win the disputed 2000 presidential election. Berenson is one of eight White House associate counsels. Gonzales tells the gathered counsels and legal staff that most of their work will be in handling the everyday legal tasks generated by the White House, reviewing speeches and letters, making judgments on ethical issues, and the like. But, according to Gonzales, Bush has personally instructed him to give his team two missions as their top priority.
Appoint Conservatives to Judiciary Positions - One is to find as many conservatives as they can to fill the numerous vacancies on the federal courts, vacancies left unfilled because of Senate Republicans’ refusal to schedule hearings for Clinton nominees. Now, Gonzales tells the legal team, they are to find as many conservative “judicial restraint”-minded lawyers as there are judgeships to be filled, and to get them confirmed as quickly as possible. This is an unsurprising mission, as most in the room expect the Republicans to lose control of Congress in 2002—as, historically, most parties who control the executive branch do in midterm elections—and therefore have only a limited time in which to get nominees named, vetted, and confirmed by friendly Congressional Republicans.
Find Ways to Expand Presidential Power - Gonzales’s second mission is more puzzling. The lawyers are to constantly look for ways to expand presidential power, he tells them. Bush has told his senior counsel that under previous administrations, the power of the presidency has eroded dramatically. (Ironically, some of the losses of executive power came due to the Republican-led investigation of former President Clinton’s involvement in Whitewater and his affair with a White House intern, when Secret Service bodyguards and White House attorneys were compelled to testify about their communications with the president, and Congressional Republicans issued subpoenas and demanded information from the White House.) It is time to turn back the tide, Gonzales tells his team, and not only regain lost ground, but expand presidential power whenever the opportunity presents itself. Berenson will later recall Gonzales telling them that they are “to make sure that [Bush] left the presidency in better shape than he found it.” Berenson will later remark: “Well before 9/11, it was a central part of the administration’s overall institutional agenda to strengthen the presidency as a whole. In January 2001, the Clinton scandals and the resulting impeachment were very much in the forefront of everyone’s mind. Nobody at that point was thinking about terrorism or the national security side of the house.” Berenson does not learn until much later that much of the direction they have received has come, not from President Bush, but from Vice President Cheney and his legal staff, particularly his chief counsel, David Addington. [Savage, 2007, pp. 70-75]

Entity Tags: David S. Addington, Alberto R. Gonzales, Bush administration (43), Richard (“Dick”) Cheney, Bradford Berenson, George W. Bush

Timeline Tags: Civil Liberties

The NSA asks Qwest, a major US telecommunications firm and a cutting-edge provider of high-tech wireless and Internet connectivity, to reveal information about its customers and their phone calls. Qwest’s CEO, Joe Nacchio, refuses after meeting with NSA officials and deciding that the program is illegal without court orders (see February 27, 2001). The NSA refuses to seek court authorization for its wiretaps and electronic surveillance. The NSA will renew its request from Qwest after the 9/11 attacks, and will also ask the firm to help it track suspected terrorists. Other telecommunications firms such as Verizon, AT&T, and BellSouth, will comply with the NSA’s requests (see February 2001 and Beyond).
Fears of a 'Digital Pearl Harbor' - According to a former White House official, the NSA’s primary purpose before 9/11 is to watch for computer hackers and foreign-government agents trying to hack into the government’s computer information systems, particularly those within the Defense Department. Government officials fear a “digital Pearl Harbor” if hackers were ever to seize control of those systems or other key US infrastructures. The former official will say in 2007 that the NSA’s proposal to Qwest is, “Can you build a private version of Echelon and tell us what you see?” Echelon is the NSA’s enormous signals intelligence (SIGINT) network used by the agency and its counterparts in Australia, Canada, New Zealand, and Britain. Qwest is constructing a high-speed network for phone and Internet traffic, and the NSA wants Qwest to keep records of its customers’ transactions for it. The NSA, another source will say, wants to analyze call, e-mail, and other transmissions’ traffic patters for signs of suspicious activity. The White House official will say that telecom firms such as Qwest “have an enormous amount of intelligence-gathering” capability. They don’t have to target individual customers to “look for wacky behavior,” or “groups communicating with each other in strange patterns.” Such information could augment intelligence that the NSA and other agencies were gathering from other sources, and enable the NSA to collect the information it wants without violating laws prohibiting it and other intelligence agencies from directly gathering data on US citizens.
Ill Will from NSA - Nacchio’s refusal to go along with the NSA’s request garners it some ill will among the US intelligence community, the former White House official will say. Nacchio will contend that because of his refusal, the NSA denied Qwest a lucrative government contract. A former high-level intelligence official will add that other telecom companies had little problem agreeing to the NSA’s requests. Nacchio believes that the NSA’s request is illegal under the Telecommunications Act without court orders; the former White House official will acknowledge that it might violate the 1986 Electronic Communications Privacy Act. After 9/11, that law will be amended by the USA Patriot Act to give the government more room to monitor US citizens.
Qwest, Other Telecom Firms Cooperative with Other Agencies - Qwest is apparently less reluctant to share other information with the Pentagon. Qwest began sharing its technology and information as far back as 1997 (see 1997). In May 2001, Commerce Secretary Don Evans will tell the Senate Appropriations Committee that his department helped persuade Qwest to “share proprietory information with the Defense Department to evaluate the vulnerability of its network.” Qwest, which serves the Rocky Mountain and West Coast regions of the country, covers the areas that house some of the military’s most important command-and-control facilities, including the US Strategic Command. In the 1990s, Qwest began actively pursuing contracts with the Defense Department to build more modern, private, secure networks for defense and intelligence agencies. [National Journal, 11/2/2007]
Meetings with Bush Officials - In court documents filed in 2006 to challenge his prosecution for insider trading and, in heavily redacted form, released to the public in 2007, Nacchio will indicate that telecom executives met frequently with Bush administration officials before 9/11, including Deputy Defense Secretary Paul Wolfowitz, National Security Adviser Condoleezza Rice, NSA Director Michael Hayden, and counterterrorism “tsar” Richard Clarke. Many telecom firms are working closely with the government to develop highly classified operations, including joint networks to which the government will have unfettered access. The future director of national intelligence, Mike McConnell, works with telecom firms to expand the cooperation between the telecom industry and the federal government. [Salon, 10/15/2007]

Entity Tags: Condoleezza Rice, US Department of Defense, Bush administration (43), Verizon Communications, AT&T, US Department of Commerce, Senate Appropriations Committee, US Strategic Command, BellSouth, Donald L. Evans, Echelon, Richard A. Clarke, Qwest, Mike McConnell, National Security Agency, Joe Nacchio, Paul Wolfowitz

Timeline Tags: Civil Liberties

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Timeline Tags: Civil Liberties

Al- Qaeda leader Hambali.Al- Qaeda leader Hambali. [Source: Virtual Information Center]In April 2001, the Malaysian government connects al-Qaeda leader Hambali with a gun-smuggling syndicate, and as a result police place an all points bulletin for him. A month later, Hambali is connected to a botched bank robbery also in Malaysia. Twenty-six members of the Malaysian militant group Kumpulan Militan Malaysia (KMM) are arrested and questioned about the robbery. Authorities discover the group has been responsible for a number of attacks, including the bombing of a Hindu temple, and that Hambali is a top leader. [New Straits Times, 2/10/2002; New Straits Times, 8/16/2003] A photograph of Hambali is found in a raid at this time, and is matched with a photo of him discovered in 1995 on Ramzi Yousef’s computer that contained files detailing the Bojinka plot (see January 6, 1995). [New Straits Times, 2/2/2002] His picture appears in the media no later than mid-August. [New Straits Times, 8/18/2001; New Straits Times, 9/9/2001] The US is already aware of Hambali’s involvement in the Bojinka plot (see May 23, 1999). However, this new evidence of Hambali’s importance does not lead to any renewed focus on the January 2000 al-Qaeda summit attended by Hambali and two of the 9/11 hijackers that was monitored by Malaysian intelligence (see January 5-8, 2000).

Entity Tags: Kumpulan Militan Malaysia, Hambali, Malaysian Secret Service

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing.One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing. [Source: Matt Crypto / Public domain]The BBC reports on advances in electronic surveillance. The US’s global surveillance program, Echelon, has become particularly effective in monitoring mobile phones, recording millions of calls simultaneously and checking them against a powerful search engine designed to pick out key words that might represent a security threat. Laser microphones can pick up conversations from up to a kilometer away by monitoring window vibrations. If a bug is attached to a computer keyboard, it is possible to monitor exactly what is being keyed in, because every key on a computer has a unique sound when depressed. [BBC, 4/4/2001] Furthermore, a BBC report on a European Union committee investigation into Echelon one month later notes that the surveillance network can sift through up to 90 percent of all Internet traffic, as well as monitor phone conversations, mobile phone calls, fax transmissions, net browsing history, satellite transmissions and so on. Even encryption may not help much. The BBC suggests that “it is likely that the intelligence agencies can crack open most commercially available encryption software.” [BBC, 5/29/2001]

Entity Tags: Echelon, British Broadcasting Corporation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Ahmed Ressam as pictured in his Canadian passport.Ahmed Ressam as pictured in his Canadian passport. [Source: FBI]Ahmed Ressam is convicted in the spring of 2001 for attempting to bomb the Los Angeles International Airport (see December 14, 1999). Facing the likelihood of life in prison, he starts cooperating with authorities in an attempt to reduce his sentence. On this day, he details his experiences in al-Qaeda training camps and his many dealings with top al-Qaeda deputy Abu Zubaida. According to FBI notes from Ressam’s interrogation, Zubaida asked Ressam to send him six original Canadian passports to help Zubaida “get people to America” (see May 2001 and May 2001). Zubaida “wanted an operation in the US” and talked about the need to get explosives into the US for this operation, but Ressam makes it clear this was a separate plot from the one he was involved with. Notes from this day further explain that Ressam doesn’t know if any explosives made it into the US because once an operation is initiated, operators are not supposed to talk about it to anyone. [Calgary Herald, 4/3/2002; Newsweek, 4/28/2005] Zubaida told this to Ressam in 1999, but also indicated that he is willing to wait a year or more to make sure the plot comes to fruition successfully. [Tenet, 2007, pp. 146]
Similarity to 9/11 Attacks - There’s no concrete evidence that Ressam knows any detail of the 9/11 attacks. [Newsweek, 4/28/2005] However, Fox News will later report that roughly around this time Ressam testifies “that attack plans, including hijackings and attacks on New York City targets, [are] ongoing.” [Fox News, 5/17/2002] Questioned shortly after 9/11, Ressam will point out that given what he’s already told his US interrogators, the 9/11 attacks should not be surprising. He notes that he’d described how Zubaida talked “generally of big operations in [the] US with big impact, needing great preparation, great perseverance, and willingness to die.” Ressam had told of “plans to get people hired at airports, of blowing up airports, and airplanes.” [Newsweek, 4/28/2005]
Sharing the Warning - The CIA learns of this warning in June. [Tenet, 2007, pp. 146] Ressam will repeat some of this in a public trial in July (see July 8, 2001). Apparently, the FBI also waits until July to share the information from this debriefing with most other intelligence agencies, the INS, Customs Service, and the State Department. Ressam’s warnings will first be mentioned to Bush in his now famous August 6, 2001 briefing (see August 6, 2001), but as Newsweek will note, “The information from Ressam that was contained in [Bush’s] PDB [is] watered down and seem[s] far more bland than what the Algerian terrorist was actually telling the FBI.” Zubaida’s second plot will be boiled down to one sentence in the PDB: “Ressam also said that in 1998 Abu Zubaida was planning his own US attack.” [Newsweek, 4/28/2005]

Entity Tags: George W. Bush, Ahmed Ressam, Los Angeles International Airport, Federal Bureau of Investigation, Abu Zubaida

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

On June 3, 2001, a British newspaper reveals that Hamid Aich, who is on the FBI’s international wanted list, is living in Dublin where he is applying for asylum. [Mirror, 2/18/2001; News of the World, 6/3/2001] Irish intelligence has been monitoring Aich’s movements since 1997, when authorities tied him to the mass murder of 77 tourists in Luxor, Egypt (see November 18, 1997). [Mirror, 10/17/2001; Daily Telegraph, 11/8/2001] He has since been linked to a number of militant groups (see, e.g., December 14, 1999). It is believed that between 1999 and 2001, Aich assisted 22 Islamic terrorist organizations, and even funded non-Islamic groups, for instance giving $200,000 to the ETA, a separatist group in the Basque region of Spain. Aich was also the director of Mercy International’s Ireland branch. (This charity has several known al-Qaeda connections by this time (see 1988-Spring 1995 and Late 1996-August 20, 1998).) Despite these connections, he will continue to live openly in Dublin after the newspaper discloses his location. [Mirror, 9/17/2001] Irish authorities only publicly say, “Aich’s case is at a very delicate stage.” [News of the World, 6/3/2001] Then, on July 24, he leaves Ireland using a false passport. The FBI, which took no action against him while he was living in Dublin, is reportedly “furious” with Irish police for allowing him to escape. He has not been heard of since, and he has not been included in any known lists of wanted al-Qaeda leaders. It is believed that Aich eventually ends up in Afghanistan. After 9/11, Aich will be described as “one of the FBI’s chief targets” and “one of bin Laden’s most trusted men” who ranks seventh in al-Qaeda’s hierarchy. [Mirror, 9/17/2001]

Entity Tags: Hamid Aich, Zacarias Moussaoui, Federal Bureau of Investigation, Mercy International, Al-Qaeda, Ahmed Ressam

Timeline Tags: Complete 911 Timeline

Documentation used by Mustafa Ahmed al-Hawsawi in the United Arab Emirates.Documentation used by Mustafa Ahmed al-Hawsawi in the United Arab Emirates. [Source: US District Court for the Eastern District of Virginia, Alexandria Division]Mustafa Ahmed al-Hawsawi assists four hijackers transiting Dubai, United Arab Emirates, on their way to the US: Fayez Ahmed Banihammad, Salem Alhazmi, Abdulaziz Alomari, and Saeed Alghamdi. Banihammad stays at al-Hawsawi’s flat in nearby Sharjah for two or three weeks and they open bank accounts together (see June 25, 2001 and Early August-August 22, 2001), and al-Hawsawi recognizes Alghamdi and Alhazmi from Afghanistan. He coordinates their arrival dates in telephone conversations with Mohamed Atta (see Late June-August, 2001) and then purchases tickets for them, paying for Alomari and Alhazmi. Al-Hawsawi provides this information to the US under interrogation, which is considered by some to make it unreliable (see June 16, 2004), and then again before a military tribunal in Guantanamo Bay to determine his combat status (see March 9-April 28, 2007). [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006 pdf file; US department of Defense, 3/21/2007 pdf file] It is unclear who assisted the nine muscle hijackers who transited Dubai before this: Waleed Alshehri, Satam Al Suqami, Ahmed Alghamdi, Maqed Moqed, Hamza Alghamdi, Mohand Alshehri, Ahmed Alnami, Ahmed Alhaznawi, and Wail Alshehri (see April 11-June 28, 2001 and April 23-June 29, 2001).

Entity Tags: Salem Alhazmi, Saeed Alghamdi, Mustafa Ahmed al-Hawsawi, Mohamed Atta, Abdulaziz Alomari, Fayez Ahmed Banihammad

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

John Miller.John Miller. [Source: FBI]ABC News reporter John Miller gives a speech in which he discusses the growing indications that al-Qaeda leader Osama bin Laden has plans to carry out an attack in the United States. Miller gives his speech at the annual conference of the International Association of Bomb Technicians and Investigators. [Miller, Stone, and Mitchell, 2002, pp. 286-287] The conference, held in Albuquerque, New Mexico, from June 24 to June 30, is attended by around 700 law enforcement officers from around the world. [Sandia LabNews, 6/15/2001] Miller will later explain some of the thinking behind his claim that bin Laden could be planning an attack in the US. “At that time,” he will write, “US authorities were divided over where bin Laden would strike next. Most officials believed that he was aiming at ‘soft’ US targets overseas, based on his past actions and electronic phone intercepts of al-Qaeda members around the world.” Other officials, though, taking into account al-Qaeda operative Ahmed Ressam’s failed plot to blow up Los Angeles International Airport on December 31, 1999 (see December 14, 1999), believe his next attack will take place on US soil. Miller will write that a “spike in phone traffic among suspected al-Qaeda members in the early part of the summer, as well as debriefings of Ressam,” have convinced investigators that bin Laden is planning “a significant operation” and he is “planning it soon.” Furthermore, he will comment, “[N]o one working on the problem seemed to doubt bin Laden’s intentions to target Americans.” [Miller, Stone, and Mitchell, 2002, pp. 287] Miller has been a correspondent for ABC News, with a primary focus on terrorism, since 1995. Notably, he interviewed bin Laden in Afghanistan in May 1998 (see May 28, 1998). Before joining ABC News, he spent many years as a television crime reporter in New York, and between 1994 and 1995 served as deputy police commissioner of New York City. [ABC News, 5/28/1998; Cincinnati Enquirer, 1/16/2002; Federal Bureau of Investigation, 8/23/2005; Hollywood Reporter, 10/17/2011]

Entity Tags: John Miller, Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In July 2001, NSA director Michael Hayden tells a reporter that the NSA does not monitor any US citizens without court warrants from the Foreign Intelligence Surveillance Court (FISC). “We don’t do anything willy-nilly,” Hayden says. “We’re a foreign intelligence agency. We try to collect information that is of value to American decision-makers, to protect American values, America—and American lives. To suggest that we’re out there, on our own, renegade, pulling in random communications, is—is simply wrong. So everything we do is for a targeted foreign intelligence purpose. With regard to the—the question of industrial espionage, no. Period. Dot. We don’t do that.” When asked how Americans could verify that, Hayden says that they should simply trust the NSA to police and monitor itself, along with oversight from the White House and from Congress. However, it will later come to light that the NSA began illegally monitoring US citizens from the start of the Bush administration (see Spring 2001). A former NSA official will later dispute Hayden’s account. “What do you expect him to say?” the official says. “He’s got to deny it. I agree. We weren’t targeting specific people, which is what the President’s executive order does. However, we did keep tabs on some Americans we caught if there was an interest [by the White House.] That’s not legal. And I am very upset that I played a part in it.” [Truthout (.org), 1/17/2006] Hayden also denies persistent allegations from European government officials that the agency has engaged in economic espionage to help American companies against European competitors (see April 4, 2001). In March 2001, the American Civil Liberties Union’s Barry Steinhardt says that “since there is no real check on [the NSA], there is no way to know” if they are following the law. Steinhardt says that Congress is the only real check on possible NSA abuses, but it has consistently failed to exercise any sort of aggressive oversight on the agency. [CNN, 3/31/2001]

Entity Tags: National Security Agency, Barry Steinhardt, Michael Hayden, American Civil Liberties Union

Timeline Tags: Civil Liberties

Glyn Ford.Glyn Ford. [Source: British Labour Party]The European Parliament releases its final report on its findings about the secretive US surveillance program known as Echelon. The report, two years in the making, exhaustively details many of Echelon’s surveillance capabilities, and lists many of Echelon’s surveillance stations around the world. One of the more interesting sections of the report concerns its apparent use on behalf of US corporations. According to the report, Echelon—operated by the NSA as a highly classified surveillance program ostensibly for tracking terrorist threats and activities by nations hostile to the West—is also being used for corporate and industrial espionage, with information from the program being turned over to US corporations for their financial advantage. The report gives several instances of Echelon’s use by corporations. One is the use of Echelon to “lift… all the faxes and phone calls” between the European aircraft manufacturer Airbus and Saudi Arabian Airlines; that information was used by two American companies, Boeing and McDonnell Douglas, to outflank Airbus and win a $6 billion contract. The report also alleges that the French company Thomson-CSF lost a $1.3 billion satellite deal to Raytheon the same way. Glyn Ford, the MP who commissioned the report, says he doesn’t have a problem with Echelon itself, but in the way it is being used. “Now, you know, if we’re catching the bad guys, we’re completely in favor of that… What we’re concerned about is that some of the good guys in my constituency don’t have jobs because US corporations got an inside track on—on some global deal.” [Washington Post, 11/14/1999; CBS News, 2/27/2000; BBC, 7/6/2000; European Parliament, 7/11/2001] In 1977, the US government began providing Echelon-based intelligence to US corporations (see 1977). In April 2001, New Zealand journalist Nicky Hager testified about Echelon’s use by US allies for corporate and economic purposes (see April 2001), and former CIA director James Woolsey confirmed that US surveillance programs were used to benefit US corporations (see March 2000).

Entity Tags: US Department of Commerce, Thomson-CSF, Saudi Arabian Airlines, Glyn Ford, McDonnell Douglas, Central Intelligence Agency, Boeing Company, Echelon, Airbus, European Parliament, National Security Agency

Timeline Tags: Civil Liberties

President Bush at his Crawford, Texas, ranch on August 6, 2001. Advisors wait with classified briefings.President Bush at his Crawford, Texas, ranch on August 6, 2001. Advisors wait with classified briefings. [Source: White House]President Bush receives a classified presidential daily briefing (PDB) at his Crawford, Texas ranch indicating that Osama bin Laden might be planning to hijack commercial airliners. The PDB provided to him is entitled, “Bin Laden Determined to Strike in US.” The entire briefing focuses on the possibility of terrorist attacks inside the US. [New York Times, 5/15/2002; Newsweek, 5/27/2002] The analysts who drafted the briefing will say that they drafted it on the CIA’s initiative (see July 13, 2004), whereas in 2004 Bush will state that he requested a briefing on the topic due to threats relating to a conference in Genoa, Italy, in July 2001, where Western intelligence agencies believed Osama bin Laden was involved in a plot to crash an airplane into a building to kill Bush and other leaders (see April 13, 2004). The analysts will later explain that they saw it as an opportunity to convey that the threat of an al-Qaeda attack in the US was both current and serious. [9/11 Commission, 7/24/2004, pp. 260] The existence of this briefing is kept secret, until it is leaked in May 2002, causing a storm of controversy (see May 15, 2002). While National Security Adviser Condoleezza Rice will claim the memo is only one and a half pages long, other accounts state it is 11 1/2 pages instead of the usual two or three. [New York Times, 5/15/2002; Newsweek, 5/27/2002; Die Zeit (Hamburg), 10/1/2002] A page and a half of the contents will be released on April 10, 2004; this reportedly is the full content of the briefing. [Washington Post, 4/10/2004] The briefing, as released, states as follows (note that the spelling of certain words are corrected and links have been added):
bullet Clandestine, foreign government, and media reports indicate bin Laden since 1997 has wanted to conduct terrorist attacks in the US (see December 1, 1998). Bin Laden implied in US television interviews in 1997 and 1998 that his followers would follow the example of World Trade Center bomber Ramzi Yousef and “bring the fighting to America” (see May 26, 1998).
bullet After US missile strikes on his base in Afghanistan in 1998, bin Laden told followers he wanted to retaliate in Washington, according to a -REDACTED-service (see December 21, 1998).
bullet An Egyptian Islamic Jihad (EIJ) operative told -REDACTED- service at the same time that bin Laden was planning to exploit the operative’s access to the US to mount a terrorist strike.
bullet The millennium plotting in Canada in 1999 may have been part of bin Laden’s first serious attempt to implement a terrorist strike in the US. Convicted plotter Ahmed Ressam has told the FBI that he conceived the idea to attack Los Angeles International Airport himself (see December 14, 1999), but that bin Laden lieutenant Abu Zubaida encouraged him and helped facilitate the operation. Ressam also said that in 1998 Abu Zubaida was planning his own US attack (see Late March-Early April 2001 and May 30, 2001).
bullet Ressam says bin Laden was aware of the Los Angeles operation.
bullet Although bin Laden has not succeeded, his attacks against the US Embassies in Kenya and Tanzania in 1998 (see 10:35-10:39 a.m., August 7, 1998) demonstrate that he prepares operations years in advance and is not deterred by setbacks. Bin Laden associates surveyed our embassies in Nairobi and Dar es Salaam as early as 1993 (see Late 1993-Late 1994), and some members of the Nairobi cell planning the bombings were arrested and deported in 1997.
bullet Al-Qaeda members—including some who are US citizens—have resided in or traveled to the US for years, and the group apparently maintains a support structure that could aid attacks (see January 25, 2001). Two al-Qaeda members found guilty in the conspiracy to bomb our embassies in East Africa were US citizens (see September 15, 1998), and a senior EIJ member lived in California in the mid-1990s (see November 1989 and September 10, 1998).
bullet A clandestine source said in 1998 that a bin Laden cell in New York was recruiting Muslim-American youth for attacks (see October-November 1998).
bullet “We have not been able to corroborate some of the more sensational threat reporting, such as that from a [REDACTED] service in 1998 saying that bin Laden wanted to hijack a US aircraft to gain the release of ‘Blind Sheikh’ Omar Abdul-Rahman and other US-held extremists” (see 1998, December 4, 1998, and May 23, 2001). [9/11 Commission, 7/24/2004, pp. 223] According to the Washington Post, this information came from a British service. [Washington Post, 5/18/2002]
bullet Nevertheless, FBI information since that time indicates patterns of suspicious activity in this country consistent with preparations for hijackings or other types of attacks, including recent surveillance of federal buildings in New York (see May 30, 2001).
bullet The FBI is conducting approximately 70 full-field investigations throughout the US that it considers bin Laden-related (see August 6, 2001). CIA and the FBI are investigating a call to our embassy in the UAE in May saying that a group or bin Laden supporters was in the US planning attacks with explosives (see May 16-17, 2001). [9/11 Commission, 7/24/2004, pp. 223]
In retrospect, the briefing is remarkable for the many warnings that apparently are not included (see for instance, from the summer of 2001 prior to August alone: May 2001, June 2001, June 12, 2001, June 19, 2001, Late Summer 2001, July 2001, July 16, 2001, Late July 2001, Late July 2001, Summer 2001, June 30-July 1, 2001, July 10, 2001, and Early August 2001). According to one account, after the PDB has been given to him, Bush tells the CIA briefer, “You’ve covered your ass now” (see August 6, 2001). Incredibly, the New York Times later reports that after being given the briefing, Bush “[breaks] off from work early and [spends] most of the day fishing.” [New York Times, 5/25/2002] In 2002 and again in 2004, National Security Adviser Rice will incorrectly claim under oath that the briefing only contained historical information from 1998 and before (see May 16, 2002 and April 8, 2004).

Entity Tags: George W. Bush, Islamic Jihad, Omar Abdul-Rahman, Federal Bureau of Investigation, Los Angeles International Airport, Condoleezza Rice, Abu Zubaida, Al-Qaeda, World Trade Center, Central Intelligence Agency, 9/11 Commission, Ahmed Ressam, Ramzi Yousef, Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Margaret Gillespie, an FBI agent detailed to the CIA who has just found out that future 9/11 hijacker Khalid Almihdhar is in the US (see August 21-22, 2001), suggests asking failed Millennium bomber Ahmed Ressam whether he recognizes Almihdhar, but the proposal is not acted on. Ressam was arrested on his way to bomb Los Angeles airport (see December 14, 1999), but has been co-operating with the US government against al-Qaeda (see May 30, 2001). Gillespie makes the suggestion in an e-mail to Tom Wilshire, a CIA representative to the FBI. It is unclear what Wilshire does with the suggestion, but Ressam is not interviewed. When shown photos of Almihdhar after 9/11, Ressam will not recognize him. The FBI also fails to ask Ressam about Zacarias Moussaoui before 9/11, but shortly after 9/11 Ressam will identity Moussaoui as a person that attended al-Qaeda’s camps in Afghanistan (see Late August-Early September 2001). [9/11 Commission, 7/24/2004, pp. 275-6, 541]

Entity Tags: Zacarias Moussaoui, Tom Wilshire, Khalid Almihdhar, Ahmed Ressam, Margaret Gillespie, Central Intelligence Agency, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The FBI fails to ask Ahmed Ressam, an al-Qaeda operative arrested during the Millennium alert (see December 14, 1999), whether he can identify Zacarias Moussaoui. Agents in Seattle holding Ressam receive a general notification about the Moussaoui case, but it lacks urgency and they do not follow up on it with Ressam (see September 4, 2001). When asked shortly after 9/11, Ressam will say he recognizes Moussaoui from al-Qaeda’s training camps in Afghanistan. The 9/11 Commission will conclude that had Ressam been shown photos of Moussaoui and identified him before 9/11, the FBI would have been able to search his belongings. The belongings contain enough information to potentially prevent 9/11 (see August 16, 2001). The FBI also fails to ask Ressam whether he recognizes Khalid Almihdhar at this time, although Ressam has never met Almihdhar and will not identify him after 9/11 (see August 21, 2001). [Sunday Times (London), 2/3/2002; 9/11 Commission, 7/24/2004, pp. 275-6, 541]

Entity Tags: Ahmed Ressam, FBI Headquarters, Federal Bureau of Investigation, Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Patrick Philbin.Patrick Philbin. [Source: Daylife (.com)]Patrick Philbin joins the Justice Department’s Office of Legal Counsel (OLC). Philbin is an old friend and colleague of the OLC’s John Yoo; both graduated from Yale and both clerked for Judge Laurence Silberman and Supreme Court Justice Clarence Thomas. Philbin has no experience in the legalities surrounding national security issues; he spent the 1990s working for a corporate law firm helping telecommunications companies sue the Federal Communications Commission. Philbin joins the OLC with the expectation of working solely with administrative law. But after the 9/11 attacks, he will be asked to help Yoo handle the unexpected raft of national security issues. His first real work in the area of national security will be his finding (see November 6, 2001) that the president has untrammeled power to order the establishment of military commissions (see Late October 2001 and November 13, 2001). [Savage, 2007, pp. 136]

Entity Tags: John C. Yoo, US Department of Justice, Patrick F. Philbin, Office of Legal Counsel (DOJ)

Timeline Tags: Civil Liberties

Ali Saleh Kahlah al-Marri, from Qatar but a legal US resident, arrives in the US with his wife and five children, reportedly to pursue a master’s degree in computer science at Bradley University in Peoria, Illinois. [Peoria Journal Star, 12/19/2001; New York Times, 6/21/2004] Al-Marri appears to have been sent to the US by 9/11 mastermind Khalid Shaikh Mohammed (KSM). During his interrogation, KSM will identify al-Marri as “the point of contact for al-Qaeda operatives arriving in the US for September 11 follow-on operations.” He will describe al-Marri as “the perfect sleeper agent because he has studied in the United States, had no criminal record, and had a family with whom he could travel.” [Newsweek, 6/15/2003] However, there are doubts about the reliability of KSM’s interrogation, which is believed that have been obtained through the use of torture (see June 16, 2004). Al-Marri also lived in Illinois for part of 2000 under a different name. [New York Daily News, 1/11/2003] He is apparently related to Mohamed al-Khatani, who attempted to enter the US in August 2001 to join the 9/11 plot (see July 2002). [New York Times, 6/21/2004] In December 2001, al-Marri will be detained as a material witness to the 9/11 attacks (see December 12, 2001).

Entity Tags: Mohamed al-Khatani, Khalid Shaikh Mohammed, Ali Saleh Kahlah al-Marri

Timeline Tags: Torture of US Captives, Complete 911 Timeline

An Echelon station in Menwith Hill, Britain.An Echelon station in Menwith Hill, Britain. [Source: BBC]By the 1980s, a high-tech global electronic surveillance network shared between the US, Britain, Canada, Australia, and New Zealand is gathering intelligence all over the world. The BBC describes Echelon’s power as “astounding,” and elaborates: “Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. They are looking for evidence of international crime, like terrorism.” [BBC, 11/3/1999] One major focus for Echelon before 9/11 is al-Qaeda. For instance, one account mentions Echelon intercepting al-Qaeda communications in Southeast Asia in 1996 (see Before September 11, 2001). A staff member of the National Security Council who regularly attends briefings on bin Laden states, “We are probably tapped into every hotel room in Pakistan. We can listen in to just about every phone call in Afghanistan.” However, he and other critics will claim one reason why US intelligence failed to stop terrorism before 9/11 was because there was too much of a focus on electronic intelligence gathering and not enough focus on human interpretation of that vast data collection. [Toronto Star, 2/2/2002]

Entity Tags: United Kingdom, United States, Osama bin Laden, Echelon, National Security Council, Canada, Australia, Al-Qaeda, New Zealand

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

The Sphinx Trading sign.The Sphinx Trading sign. [Source: National Geographic]Some of the 9/11 hijackers rent mailboxes from a company called Sphinx Trading, which was also used by ‘Blind Sheikh’ Omar Abdul-Rahman and at least one of his associates. The mailboxes are located in Jersey City, New Jersey, four doors down from the mosque where Abdul-Rahman was imam in the early 1990s. El Sayyid Nosair, who assassinated Rabbi Meir Kahane and was linked to the Islamic militant cell Abdul-Rahman headed (see November 5, 1990 and December 7, 1991), also had a mailbox there before he was arrested in 1990. Sphinx Trading is owned by Waleed al-Noor, who was named an unindicted co-conspirator at the ‘Landmarks’ bomb plot trial (see June 24, 1993). The hijackers will later obtain fake IDs from al-Noor’s partner, Mohamed el-Atriss. The names of the hijackers who had mailboxes there are never given, but in the summer of 2001 el-Atriss interacts with hijackers Nawaf Alhazmi, Abdulaziz Alomari, Khalid Almihdhar, and Hani Hanjour (see (July-August 2001)), at least. [New York Times, 6/25/2003; Newark Star-Ledger, 10/20/2003; Lance, 2006, pp. 372-4; Bergen Record, 9/11/2006] An FBI agent will later comment: “The fact that this location was where Almihdhar, in particular, got his bogus credentials, is not only shocking, it makes me angry. The [Joint Terrorist Task Force] in the [New York Office] had this location back in 1991. In the mid-90s they listed al-Noor, the coowner, as a coconspirator, unindicted in the plot to blow up bridges and tunnels. And now we find out that this is the precise location where the most visible of all the hijackers in the US got his ID? Incredible. All the Bureau’s New York Office had to do was sit on that place over the years and they would have broken right into the 9/11 plot.” [Lance, 2006, pp. 373]

Entity Tags: Hani Hanjour, El Sayyid Nosair, Waleed al-Noor, Sphinx Trading, Omar Abdul-Rahman, Nawaf Alhazmi, Mohamed el-Atriss, Khalid Almihdhar, Abdulaziz Alomari

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

All the alleged 9/11 hijackers reportedly check in at the airports from where they board Flights 11, 175, 77, and 93. [9/11 Commission, 7/24/2004, pp. 1-4; 9/11 Commission, 8/26/2004, pp. 27, 89, 93] Since 1998, the FAA has required air carriers to implement a program called the Computer Assisted Passenger Prescreening System (CAPPS). This identifies those passengers who might be a security risk, based upon suspicious behavior such as buying one-way tickets or paying with cash. CAPPS also randomly assigns some passengers to receive additional security scrutiny. If a particular passenger has been designated as a “selectee,” this information is transmitted to the airport’s check-in counter, where a code is printed on their boarding pass. At the airport’s security checkpoints, selectees are subjected to additional security measures. [US News and World Report, 4/1/2002; 9/11 Commission, 1/27/2004; US Congress, 3/17/2004; 9/11 Commission, 8/26/2004, pp. 2, 85] Their baggage is to be screened for explosives or held off the plane until they have boarded. Supposedly, the thinking behind this is that someone smuggling a bomb onto a plane won’t get onto that same flight. According to the 9/11 Commission, nine of the 19 hijackers are flagged by the CAPPS system before boarding Flights 11, 175, 77, and 93. [Washington Post, 1/28/2004; 9/11 Commission, 7/24/2004, pp. 84; United States of America v. Zacarias Moussaoui, a/k/a Shaqil, a/k/a Abu Khalid al Sahrawi, Defendant, 3/6/2006] In addition, Mohamed Atta was selected when he checked in at the airport in Portland, for his earlier connecting flight to Boston (see 5:33 a.m.-5:40 a.m. September 11, 2001). All of the hijackers subsequently pass through security checkpoints before boarding their flights. [9/11 Commission, 7/24/2004, pp. 1-4]

Entity Tags: Federal Aviation Administration, Computer Assisted Passenger Prescreening System

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

David Addington.David Addington. [Source: David Bohrer / White House]According to an in-depth examination by the Washington Post, within hours of the 9/11 attacks, Vice President Dick Cheney begins working to secure additional powers for the White House. Cheney had plans in place to begin acquiring these powers for the executive branch before the attacks, but had not begun to execute them.
Gathering the Team - David Addington, Cheney’s general counsel and legal adviser, had been walking home after having to leave the now-evacuated Eisenhower Executive Office Building. He receives a message from the White House telling him to turn around, because the vice president needs him. After Addington joins Cheney in the Presidential Emergency Operations Center (PEOC) below the East Wing of the White House, the pair reportedly begin “contemplating the founding question of the legal revolution to come: What extraordinary powers will the president need for his response?” Later in the day, Addington connects by secure video with Timothy Flanigan, the deputy White House counsel, who is in the White House Situation Room. John Yoo, the deputy chief of the Office of Legal Counsel, is also patched in from the Justice Department’s command center. White House counsel Alberto Gonzales joins them later. This forms the core legal team that Cheney will oversee after the terrorist attacks. Associate White House counsel Bradford Berenson will later recall: “Addington, Flanigan and Gonzales were really a triumvirate. [Yoo] was a supporting player.” Addington dominates the group. Gonzales is there primarily because of his relationship with President Bush. He is not, Yoo will later recall, “a law-of-war expert and [doesn’t] have very developed views.” Along with these allies, Cheney will provide what the Washington Post calls “the rationale and political muscle to drive far-reaching legal changes through the White House, the Justice Department, and the Pentagon,” which will free the president to fight the war on terror, “as he saw fit.”
Drafting the AUMF - The team begins drafting the document that will become the Authorization to Use Military Force (AUMF—see October 10, 2002) passed by Congress for the assault on Afghanistan. In the words of the group, the president is authorized “to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States.”
Extraordinarily Broad Language - The language is extraordinarily broad; Yoo will later explain that they chose such sweeping language because “this war was so different, you can’t predict what might come up.” The AUMF draft is the first of numerous attempts to secure broad powers for the presidency, most justified by the 9/11 attacks. The Washington Post will later report, “In fact, the triumvirate knew very well what would come next: the interception—without a warrant—of communications to and from the United States” (see September 25, 2001). [CNN, 9/11/2001; CNN, 9/12/2001; Unger, 2007, pp. 220-221; Washington Post, 6/24/2007]

Entity Tags: Richard (“Dick”) Cheney, John C. Yoo, Timothy E. Flanigan, Craig Unger, Bradford Berenson, David S. Addington, Alberto R. Gonzales

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Congress explicitly refuses to grant the Bush administration the authority to conduct warrantless wiretaps and surveillance operations against US citizens in its resolution authorizing the use of military force (AUMF) against terrorists (see September 14-18, 2001). Tom Daschle (D-SD), the Senate Majority Leader, will write in December 2005 (after his ouster from Congress in November 2004) that the White House and the Justice Department will claim, falsely, that the AUMF grants the right for the NSA to conduct such a program (see Early 2002 and December 15, 2005). Instead, Daschle will write, the NSA merely usurps the authority, with the president’s approval, to conduct such an extralegal surveillance program (see December 21-22, 2005). [Washington Post, 12/22/2005]
Administration Efforts to Rewrite AUMF - In an op-ed for the Washington Post, Daschle will observe that the AUMF authorizes Bush “to use all necessary and appropriate force against those nations, organizations or persons” who “planned, authorized, committed or aided” the 9/11 attacks. But, Daschle will write, “Literally minutes before the Senate cast its vote, the administration sought to add the words ‘in the United States and’ after ‘appropriate force’ in the agreed-upon text. This last-minute change would have given the president broad authority to exercise expansive powers not just overseas—where we all understood he wanted authority to act—but right here in the United States, potentially against American citizens. I could see no justification for Congress to accede to this extraordinary request for additional authority. I refused.”
No Vote for Domestic Surveillance - Daschle will also write that the White House attempted to add draft language to the AUMF resolution that would give the administration new and sweeping authority to use force to “deter and pre-empt any future acts of terrorism or aggression against the United States,” even against nations and organizations not responsible for the 9/11 attacks. Bush officials such as Vice President Dick Cheney will claim that the AUMF “granted authority by the Congress to use all means necessary to take on the terrorists, and that’s what we’ve done.” But Daschle will write that Cheney is mistaken. “As Senate majority leader at the time, I helped negotiate that law with the White House counsel’s office over two harried days. I can state categorically that the subject of warrantless wiretaps of American citizens never came up. I did not and never would have supported giving authority to the president for such wiretaps. I am also confident that the 98 senators who voted in favor of authorization of force against al-Qaeda did not believe that they were also voting for warrantless domestic surveillance.” On September 12, six days before the September 18 AUMF vote, Bush officials demand that Congress authorize the use of military force to, in their words, “deter and pre-empt any future acts of terrorism or aggression against the United States.” But Congress refuses, feeling that the request is “too broad and ill defined.” Instead, on September 14, Congress choses to use language that authorizes Bush to use “all necessary and appropriate force against those nations, organizations or persons [the president] determines planned, authorized, committed or aided” the 9/11 attacks. Daschle later writes, “With this language, Congress denied the president the more expansive authority he sought and insisted that his authority be used specifically against Osama bin Laden and al-Qaeda.… The shock and rage we all felt in the hours after the attack were still fresh. America was reeling from the first attack on our soil since Pearl Harbor. We suspected thousands had been killed, and many who worked in the World Trade Center and the Pentagon were not yet accounted for. Even so, a strong bipartisan majority could not agree to the administration’s request for an unprecedented grant of authority.” Instead, Daschle will write, the administration simply takes the authority anyway, and will argue in hindsight that the AUMF actually gives the administration the right to wiretap US citizens. However, Daschle will write, “at the time, the administration clearly felt they [didn’t have the authority] or it wouldn’t have tried to insert the additional language.”
Breeding 'Fear and Suspicion' - He concludes, “[T]here are right and wrong ways to defeat terrorists, and that is a distinction this administration has never seemed to accept. Instead of employing tactics that preserve Americans’ freedoms and inspire the faith and confidence of the American people, the White House seems to have chosen methods that can only breed fear and suspicion. If the stories in the media over the past week are accurate [detailing the breadth and apparent illegality of the NSA program], the president has exercised authority that I do not believe is granted to him in the Constitution, and that I know is not granted to him in the law that I helped negotiate with his counsel and that Congress approved in the days after Sept. 11. For that reason, the president should explain the specific legal justification for his authorization of these actions, Congress should fully investigate these actions and the president’s justification for them, and the administration should cooperate fully with that investigation. In the meantime, if the president believes the current legal architecture of our country is insufficient for the fight against terrorism, he should propose changes to our laws in the light of day. That is how a great democracy operates. And that is how this great democracy will defeat terrorism.” [Washington Post, 12/23/2005]

Entity Tags: National Security Agency, Al-Qaeda, Bush administration (43), Washington Post, Tom Daschle, US Department of Justice, Osama bin Laden, Authorization to Use Military Force (AUMF), Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

NSA director Michael Hayden addresses the NSA in a global videoconference, saying that the NSA, like other government agencies, will have to do more to protect the country from further terrorist attacks. The challenge, he says, is to balance Americans’ security with civil liberties, “to keep America free by making Americans feel safe again.” Hayden will say in a 2006 speech reflecting on that videoconference (see January 23, 2006) that US citizens operate under misconceptions about the NSA’s capabilities—that while citizens believe the NSA has a global electronic surveillance network that can, and does, spy on citizens willy-nilly, in reality the NSA is understaffed and unprepared to handle the technological advances of the last decade. Hayden will say that with more extensive domestic surveillance of US citizens and foreign visitors, the NSA could have caught some of the 9/11 hijackers before they were able to put their plan into motion. The standards by which US citizens and foreign visitors are monitored must change, Hayden believes.
Expansion of NSA Surveillance Powers - Using Ronald Reagan’s 1981 executive order 12333 (see December 4, 1981), Hayden expands the NSA’s domestic surveillance practices to eavesdrop, sometimes without court approval, on selected international calls made by US citizens. Though Hayden’s expansion of NSA surveillance is not directly authorized by President Bush, and is not the same program as authorized by Bush’s secret executive order of 2002 (see Early 2002), Hayden will later say that this expansion is based on the intelligence community’s assessment “of a serious and continuing threat to the homeland.” Hayden’s program is reviewed and approved by lawyers at the NSA, the Justice Department, and the White House, as well as Attorney General John Ashcroft. [Michael Hayden, 1/23/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, US Department of Justice, National Security Agency, John Ashcroft, George W. Bush, Bush administration (43), Ronald Reagan, Michael Hayden

Timeline Tags: Civil Liberties

The US Congress adopts a joint resolution, the Authorization for Use of Military Force (AUMF), that determines that “the president is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons.” Congress also states that the “grave acts of violence” committed on the US “continue to pose an unusual and extraordinary threat to [its] national security and foreign policy.” [US Congress, 9/14/2001] President Bush signs the resolution into law on September 18. [White House, 9/18/2001] The passage of the AUMF served another purpose: to extend presidential power. While the Defense Department and the Joint Chiefs of Staff intended the AUMF to define the conflict in narrow terms, and authorize the US to move militarily against al-Qaeda and its confederates, and the Taliban, Vice President Dick Cheney and his chief of staff, David Addington, had a larger goal. Attorney Scott Horton, who has written two major studies on interrogation of terrorism suspects for the New York City Bar Association, says in 2005 that Cheney and Addington “really wanted [the AUMF defined more broadly], because it provided the trigger for this radical redefinition of presidential power.” Addington helped draft a Justice Department opinion in late 2001, written by lawyer John Yoo (see Late September 2001), that asserted Congress cannot “place any limits on the president’s determinations as to any terrorist threat, the amount of military force to be used in response, or the method, timing, and nature of the response.” [US News and World Report, 5/21/2006]

Entity Tags: US Department of Defense, Taliban, Scott Horton, Joint Chiefs of Staff, Richard (“Dick”) Cheney, David S. Addington, George W. Bush, John C. Yoo, Al-Qaeda, Authorization to Use Military Force (AUMF)

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

A self-styled White House “war council” begins meeting shortly after the 9/11 attacks, to discuss the administration’s response to the attacks and the methods it will use (see (After 10:00 a.m.) September 11, 2001). The ad hoc group is composed of White House counsel Alberto Gonzales, Justice Department lawyer John Yoo, Pentagon chief counsel William J. Haynes, and the chief aide to Vice President Dick Cheney, David Addington. According to Jack Goldsmith, who will become head of the Justice Department’s Office of Legal Counsel (OLC) in 2003 (see October 6, 2003), the four believe that the administration’s biggest obstacle to responding properly to the 9/11 attacks is the body of domestic and international law that arose in the 1970s to constrain the president’s powers after the criminal excesses of Richard Nixon’s White House. Chief among these restraints is the Foreign Intelligence Surveillance Act (FISA) of 1978 (see 1978). Though Addington tends to dominate the meetings with his imposing physical presence and aggressive personality, Yoo is particularly useful to the group; the head of the OLC, Jay Bybee (whom Goldsmith will replace) has little experience with national security issues, and delegates much of the responsibility for that subject to Yoo, even giving him the authority to draft opinions that are binding on the entire executive branch. Yoo agrees wholeheartedly with Addington, Gonzales, and Cheney about the need for vastly broadened presidential powers. According to Goldsmith, Yoo is seen as a “godsend” for the White House because he is eager to draft legal opinions that would protect Bush and his senior officials from any possible war crimes charges. However, Yoo’s direct access to Gonzales angers Attorney General John Ashcroft, who feels that the “war council” is usurping legal and policy decision-making powers that are legally his own. [New York Times Magazine, 9/9/2007] In 2009, Goldsmith will say, “[I]it was almost as if they [Cheney and Addington] were interested in expanding executive power for its own sake.” [Vanity Fair, 2/2009]

Entity Tags: Richard (“Dick”) Cheney, William J. Haynes, Richard M. Nixon, Office of Legal Counsel (DOJ), Jay S. Bybee, Jack Goldsmith, John C. Yoo, Bush administration (43), Foreign Intelligence Surveillance Act, Alberto R. Gonzales, David S. Addington

Timeline Tags: Civil Liberties

Police in Qatar arrest Ahmad Hikmat Shakir. US intelligence is very interested in Shakir, partly because he comes from Iraq and thus might be connected to the Iraqi government of Saddam Hussein, and partly because he was seen at the January 2000 al-Qaeda summit in Malaysia attended by at least two of the 9/11 hijackers (see January 5-8, 2000). A search of Shakir’s apartment in Qatar yields a “treasure trove” of information, including telephone records linking him to suspects in the 1993 World Trade Center bombing (see February 26, 1993) and the 1995 Bojinka plot (see January 6, 1995). Yet, according to a senior Arab intelligence official, when the Qataris ask the US if they want to take custody of him, the US says no. He goes Jordan on October 21 instead. (Accounts differ as to whether Qatar releases him and Jordan captures him or whether Qatar sends him there.) Newsweek implies that the US expects Jordan will torture Shakir and share what they learn. The US is not allowed to directly question him. Three months later, he is “inexplicably released by Jordanian authorities” and vanishes. He has not been caught since. [Newsweek, 12/5/2001; Newsweek, 9/30/2002]

Entity Tags: Saddam Hussein, Ahmad Hikmat Shakir, Jordan

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In a memo, responding to a request from Deputy White House Counsel Timothy E. Flanigan, Justice Department lawyer John C. Yoo provides legal advice on “the legality of the use of military force to prevent or deter terrorist activity inside the United States.” He addresses the question of how the Fourth Amendment to the US Constitution applies to the use of “deadly force” by the military “in a manner that endangered the lives of United States citizens.” The Fourth Amendment requires the government to have some objective suspicion of criminal activity before it can infringe on an individual’s liberties, such as the right to privacy or the freedom of movement. Yoo writes that in light of highly destructive terrorist attacks, “the government may be justified in taking measures which in less troubled conditions could be seen as infringements of individual liberties.” If the president determines the threat of terrorism high enough to deploy the military inside US territory, then, Yoo writes, “we think that the Fourth Amendment should be no more relevant than it would be in cases of invasion or insurrection.” [New York Times, 10/24/2004] A month later, the Justice Department will issue a similar memo (see October 23, 2001).

Entity Tags: John C. Yoo, Timothy E. Flanigan, US Department of Justice

Timeline Tags: Torture of US Captives, Civil Liberties

Less than two weeks after 9/11, White House counsel Alberto Gonzales sets up an interagency group to design a strategy for prosecuting terrorists, and specifically asks it to suggest military commissions as one viable option for prosecution of suspected terrorists.
Membership - The initial participants include Gonzales; White House lawyer Timothy Flanigan; Pentagon general counsel William Haynes; the vice president’s chief counsel, David Addington; National Security Council lawyer John Bellinger; and State Department lawyer Pierre-Richard Prosper, a former career prosecutor who now serves as State’s ambassador at large for war crimes issues and who will head the group.
Various Options - The group spends a month in a windowless conference room at State, bringing in experts from around the government, including military lawyers and Justice Department lawyers. The Justice Department advocates regular trials in civilian courts, such as the trials of the 1993 World Trade Center bombers (see February 26, 1993). However, many in the group object, noting that terrorist trials in regular courthouses on US soil pose security risks. The military lawyers propose courts-martial, which can take place anywhere in the world and would have military protection. A third option, military commissions, would offer the security of courts-martial without the established rules of evidence and procedure courts-martial have; setting up such a system might offer more flexibility in trying suspected terrorists, but many in the group wonder if President Bush would require Congressional authorization. Prosper will later recall, “We were going to go after the people responsible for the attacks, and the operating assumption was that we would capture a significant number of al-Qaeda operatives.” In addition to the use of military commissions, the group begins to work out three other options: ordinary criminal trials, military courts-martial, and tribunals with a mixed membership of civilians and military personnel. The option of a criminal trial by an ordinary federal court is quickly brushed aside for logistical reasons, according to Prosper. “The towers were still smoking, literally. I remember asking: Can the federal courts in New York handle this? It wasn’t a legal question so much as it was logistical. You had 300 al-Qaeda members, potentially. And did we want to put the judges and juries in harm’s way?” Despite the interagency group’s willingness to study the option of military commissions, lawyers at the White House, according to reporter Tim Golden, grow impatient with the group. Some of its members are seen to have “cold feet.” [New York Times, 10/24/2004; Savage, 2007, pp. 135]
Parallel Process at White House - Unbeknownst to Prosper’s group, the White House is crafting its own version of military commissions or tribunals (see Late October 2001). When President Bush issues his executive order creating military tribunals (see November 13, 2001), Prosper and his group will first learn about it by watching the nightly news. [Savage, 2007, pp. 138]

Entity Tags: US Department of Justice, US Department of State, William J. Haynes, Timothy E. Flanigan, Pierre-Richard Prosper, John Bellinger, Beth Nolan, Alberto R. Gonzales, Scott McClellan, Jay S. Bybee, John Ashcroft, David S. Addington

Timeline Tags: Torture of US Captives, Civil Liberties

John Yoo.John Yoo. [Source: University of California, Berkeley]In a secret 15-page memo to Deputy White House Counsel Timothy Flanigan, Justice Department lawyer John Yoo, a deputy in the Office of Legal Counsel, reasons that it is “beyond question that the president has the plenary constitutional power to take such military actions as he deems necessary and appropriate to respond to the terrorist attacks” of 9/11. Those actions can be extensive. “The president may deploy military force preemptively against terrorist organizations or the states that harbor or support them,” Yoo writes, “whether or not they can be linked to the specific terrorist incidents of Sept. 11.… Force can be used both to retaliate for those attacks, and to prevent and deter future assaults on the nation. Military actions need not be limited to those individuals, groups, or states that participated in the attacks on the World Trade Center and the Pentagon.” The memo is solicited and overseen by White House lawyers.
Power Derives from Constitution, Congressional Authorization for War - This power of the president, Yoo states, rests both on the US Congress’ Joint Resolution of September 14 (see September 14-18, 2001) and on the War Powers Resolution of 1973. “Neither statute, however, can place any limits on the president’s determinations as to any terrorist threat, the amount of military force to be used in response, or the method, timing, and nature of the response. These decisions, under our Constitution, are for the president alone to make.” (Most experts believe that the Constitution strictly limits the president’s power to declare and conduct war—see 1787).
Power More Extensive than Congress Authorized - Yoo argues further that the September 14 resolution does not represent the limits to the president’s authority. “We think it beyond question” that Congress cannot “place any limits on the president’s determinations as to any terrorist threat, the amount of military force to be used in response, or the method, timing, and nature of the response. These decisions, under our Constitution, are for the president alone to make.” Congress’s “Joint Resolution is somewhat narrower than the president’s constitutional authority,” Yoo writes, as it “does not reach other terrorist individuals, groups, or states which cannot be determined to have links to the September 11 attacks.” The president’s broad power can be used against selected individuals suspected of posing a danger to the US, even though it may be “difficult to establish, by the standards of criminal law or even lower legal standards, that particular individuals or groups have been or may be implicated in attacks on the United States.” Yoo concludes: “[W]e do not think that the difficulty or impossibility of establishing proof to a criminal law standard (or of making evidence public) bars the president from taking such military measures as, in his best judgment, he thinks necessary or appropriate to defend the United States from terrorist attacks. In the exercise of his plenary power to use military force, the president’s decisions are for him alone and are unreviewable.”
'Unenumerated' Presidential Powers - Yoo even asserts that the president has more power than his memo claims: “[T]he president’s powers include inherent executive powers that are unenumerated in the Constitution,” including but not limited to the power to take the country to war without Congressional input. [US Department of Justice, 9/25/2001; Savage, 2007, pp. 121-122]
Memo Remains Secret for Three Years - The contents of this memo are not disclosed until mid-December 2004. [Newsweek, 12/18/2004; Newsweek, 12/27/2004]

Entity Tags: John C. Yoo, Bush administration (43), US Department of Justice, Office of Legal Counsel (DOJ), Timothy E. Flanigan

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Events Leading to Iraq Invasion, Civil Liberties

Mohamed Abdi, a 44-year-old Somali immigrant whose phone number was found in a car belonging to one the 9/11 hijackers, is detained without bail in Alexandria, Va. On September 12, 2001, FBI investigators discovered a car registered to 9/11 hijacker Nawaf Alhazmi at Dulles Airport (see September 11-13, 2001). In the car, they found a Washington-area map with the name “Mohumad” and a Virginia phone number belonging to Mohamed Abdi. At the court hearing, an FBI investigator says that Abdi has not explained the finding and is suspected of being linked to the hijackers. FBI Special Agent Kevin W. Ashby also testifies that an article on Ahmed Ressam was found in Abdi’s clothing. Ressam was convicted of trying to bomb Los Angeles Airport in 2000 (see December 14, 1999). According to press reports, Abdi is not cooperating with police. He came to the United States in 1993 as a refugee. He later brought his wife and four children to the US and obtained US citizenship. Shortly after his arrival, Abdi worked for Caterair, a food service company at Reagan National Airport. At the time of his arrest, Abdi had been working as a low-paid security guard for Burns Security for seven years. Burns does not provide airport security services, however, a Burns subsidiary called Globe Aviation Services provides screening services at several US airports, including the American Airlines concourse at Boston’s Logan Airport, from which one of the hijacked flights took off (see October 10, 2001). Abdi, who has had financial difficulties for some time, is charged with check forgery. He is accused of forging his landlord’s signature to obtain a government housing subsidy. No terrorism charges are filed. [US District Court Eastern District of Virginia, 9/23/2001 pdf file; Washington Post, 9/27/2001 pdf file; Human Events, 10/15/2001; Human Events, 10/15/2001] In January 2002, Abdi will receive a four-month sentence for forgery. Any link he may have had with the hijackers will remain unclear. [Washington Post, 1/12/2002]

Entity Tags: Washington Dulles International Airport, Ronald Reagan Washington National Airport, Nawaf Alhazmi, Logan International Airport, Mohamed Abdi, Globe Aviation Services Corp., Federal Bureau of Investigation, Burns Security

Timeline Tags: Complete 911 Timeline

Lt. Col. Stuart Couch.Lt. Col. Stuart Couch. [Source: Wall Street Journal]Mohamedou Ould Slahi, a Mauritanian businessman and alleged liaison between Islamic radicals in Hamburg and Osama bin Laden with foreknowledge of the 9/11 plot (see 1999 and January-April 2000), is arrested in Mauritania by secret police, his family says. By December, he will be in US custody. He will later be housed at a secret CIA facility within Camp Echo at the Guantanamo Bay Naval Station. [Washington Post, 12/17/2004] In 2007, it will be reported that one of Slahi’s prosecutors, Lt. Col. Stuart Couch, has refused to continue to prosecute Slahi after learning details of Slahi’s tortures at Guantanamo. [Wall Street Journal, 3/31/2007] The Nation will later report, “Aside from the beatings, waterboarding, stress positions, and sexual degradation that have been the norm at Guantanamo, Slahi was taunted with details of his mother’s incarceration and rape in an elaborate hoax by an officer who claimed to be representing the White House.” While Couch believes Slahi is a high-level al-Qaeda operative, he also believes the much of the evidence against him is not credible because of the methods used to obtain it. [Nation, 4/4/2007]

Entity Tags: Stuart Couch, Mohamedou Ould Slahi

Timeline Tags: Torture of US Captives, Complete 911 Timeline

According to author Ronald Kessler’s November 2007 book The Terrorist Watch, the NSA’s domestic surveillance program begins around two weeks after the 9/11 attacks, when President Bush meets with NSA director Michael Hayden and other NSA officials in the Oval Office. According to chief of staff Andrew Card, in attendance, Bush asks, “What tools do we need to fight the war on terror?” Hayden suggests revamping NSA guidelines to allow the agency to wiretap domestic phone calls and intercept e-mails to and from terror suspects if one end of the communication is overseas. Kessler gives the following rather lurid example: “Thus, if [Osama] bin Laden were calling the US to order the detonation of a nuclear device, and the person he called began making overseas calls, NSA could listen in to those calls as well as to bin Laden’s original call.” Kessler is a chief correspondent for the extremist conservative Web site NewsMax; his assertion is disputed by evidence suggesting that the domestic surveillance program began well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Kessler, 2007, pp. 130]

Entity Tags: National Security Agency, Andrew Card, Michael Hayden, Ronald Kessler, George W. Bush

Timeline Tags: Civil Liberties

NSA Director Michael Hayden briefs the House Intelligence Committee on the NSA’s efforts to combat terrorism. Though the NSA is already working on a domestic wiretapping program to spy, without warrants, on US citizens (see Early 2002), Hayden does not mention the program to the committee members, but merely discusses the ramifications of President Reagan’s Executive Order 12333 (see December 4, 1981 and September 13, 2001) on NSA functions. He does not mention that Reagan’s executive order forbids warrantless surveillance of US citizens “unless the Attorney General has determined in each case that there is probable cause to believe that the technique is directed against a foreign power or an agent of a foreign power.” On October 11, committee member Nancy Pelosi (D-CA) will write to Hayden expressing her concerns about the warrantless nature of the NSA wiretaps (see October 11, 2001). [Washington Post, 1/4/2006]

Entity Tags: National Security Agency, House Intelligence Committee, Michael Hayden, Nancy Pelosi, Terrorist Surveillance Program, Ronald Reagan

Timeline Tags: Civil Liberties

The Justice Department’s John Yoo, an official in the Office of Legal Counsel (OLC), issues a secret opinion regarding legal statutes governing the use of certain interrogation techniques. The opinion will not be made public; its existence will not be revealed until October 18, 2007, when future OLC head Steven Bradbury will note its existence as part of an American Civil Liberties Union (ACLU) lawsuit. [American Civil Liberties Union [PDF], 1/28/2009 pdf file]

Entity Tags: US Department of Justice, American Civil Liberties Union, John C. Yoo, Office of Legal Counsel (DOJ), Steven Bradbury

Timeline Tags: Civil Liberties

President Bush sends a letter to Congress informing legislators that he has ordered US armed forces into combat against the Taliban (see October 7, 2001). Bush does not rely on Congress’s Authorization for Use of Military Force (AUMF—see September 14-18, 2001), but instead asserts his unilateral authority as president to take the country into war. “I have taken these actions pursuant to my constitutional authority to conduct US foreign relations as commander in chief and chief executive,” he writes (see 1787). His letter goes on to express his appreciation to Congress for its “support” in his decision to begin a war against a foreign entity. [Savage, 2007, pp. 127-128]

Entity Tags: Taliban, George W. Bush

Timeline Tags: Civil Liberties

The FBI releases a list of its 22 most wanted terrorists. The US government offers up to $5 million for information leading to the capture of anyone of the list. The men are:
bullet Al-Qaeda leaders Osama bin Laden, who was indicted by a grand jury in 1998 (see June 8, 1998), Ayman al-Zawahiri, linked to a 1995 bombing in Pakistan (see November 19, 1995), and Mohammed Atef, who provided training to Somali fighters before the Black Hawk Down incident (see Late 1992-October 1993);
bullet Khalid Shaikh Mohammed (KSM), for his role in the 1995 Bojinka plot (see January 6, 1995). KSM is actually the mastermind of 9/11, although the US intelligence community has allegedly not yet pieced this information together (see (November 7, 2001));
bullet Several other operatives suspected of involvement in the 1998 US embassy bombings in Africa (see 10:35-10:39 a.m., August 7, 1998): Fazul Abdullah Mohammed (see August 2, 2008), Mustafa Fadhil, Usama al-Kini (a.k.a. Fahid Muhammad Ally Msalam (see August 6-7, 1998)), Ahmed Khalfan Ghailani (see July 25-29, 2004), Sheikh Ahmed Salim Swedan (see July 11, 2002), Abdullah Ahmed Abdullah (see September 10, 2002), Anas al-Liby (see January 20, 2002- March 20, 2002), Saif al-Adel (see Spring 2002), Ahmed Mohammed Hamed Ali, and Mushin Musa Matwalli Atwah (see April 12, 2006);
bullet Abdul Rahman Yasin, a US-Iraqi involved in the 1993 World Trade Center bombing (see March 4-5,1993);
bullet Ahmed Ibrahim Al-Mughassil, Ali Saed Bin Ali El-Houri, Ibrahim Salih Mohammed Al-Yacoub, and Abdelkarim Hussein Mohamed Al-Nasser, for their alleged part in the 1996 Khobar Towers bombing in Saudi Arabia (see June 25, 1996);
bullet Imad Mugniyah, Hassan Izz-Al-Din, and Ali Atwa for the hijacking of TWA Flight 847 in June 1985. [CNN, 10/10/2001]

Entity Tags: Mohammed Atef, Mushin Musa Matwalli Atwah, Mustafa Fadhil, Osama bin Laden, Saif al-Adel, Khalid Shaikh Mohammed, Usama al-Kini, Sheikh Ahmed Salim Swedan, Imad Mugniyah, Mohammed Hamed Ali, Hassan Izz-Al-Din, Abdullah Ahmed Abdullah, Abdul Rahman Yasin, Abdelkarim Hussein Mohamed Al-Nasser, Ahmed Ibrahim Al-Mughassil, Ahmed Khalfan Ghailani, Ibrahim Salih Mohammed Al-Yacoub, Ali Saed Bin Ali El-Houri, Fazul Abdullah Mohammed, Federal Bureau of Investigation, Ali Atwa, Ayman al-Zawahiri, Anas al-Liby

Timeline Tags: Complete 911 Timeline

Nancy Pelosi.Nancy Pelosi. [Source: US Congress]House Minority Leader Nancy Pelosi (D-CA) writes to NSA Director Michael Hayden questioning the nature and extent of the apparently illegal warrantless wiretapping of US citizens by the agency. Pelosi and other members of the House Intelligence Committee were briefed on October 1, 2001, by Hayden, whose agency began conducting surveillance against US citizens after the 9/11 attacks (see After September 11, 2001). Pelosi will release the letter on January 6, 2006, three weeks after the New York Times revealed that the NSA had been conducting electronic surveillance of US citizens without warrants since at least 2002 (see December 15, 2005.) Pelosi’s office will also release Hayden’s response, but almost the entire letter from Hayden is redacted.
Letter to Hayden - Pelosi writes in part, “[Y]ou indicated [in the briefing] that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance under the Foreign Intelligence Surveillance Act and related statutes, orders, regulations, and guidelines.… For several reasons, including what I consider to be an overly broad interpretation of President Bush’s directive of October 5 on sharing with Congress ‘classified or sensitive law enforcement information’ it has not been possible to get answers to my questions. Without those answers, the concerns I have about what you said on the First can not be resolved, and I wanted to bring them to your attention directly. You indicated that you were treating as a matter of first impression, [redacted ] being of foreign intelligence interest. As a result, you were forwarding the intercepts, and any information [redacted ] without first receiving a request for that identifying information to the Federal Bureau of Investigation. Although I may be persuaded by the strength of your analysis [redacted ] I believe you have a much more difficult case to make [redacted ] Therefore, I am concerned whether, and to what extent, the National Security Agency has received specific presidential authorization for the operations you are conducting. Until I understand better the legal analysis regarding the sufficiency of the authority which underlies your decision on the appropriate way to proceed on this matter, I will continue to be concerned.” The only portion of Hayden’s October 18 reply regarding Pelosi’s concerns that has not been redacted reads, “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” In January 2006, an NSA official will say that Pelosi’s concerns were adequately addressed in Hayden’s reply, and in a private briefing shortly thereafter. [Washington Post, 1/4/2006; Nancy Pelosi, 1/6/2006]
Pelosi Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). Pelosi is apparently unaware of any of this.

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi

Timeline Tags: Civil Liberties

NSA Director Michael Hayden responds to an October 11 letter from Representative Nancy Pelosi (see October 11, 2001), expressing concerns about the NSA’s post-9/11 surveillance expansion (see After September 11, 2001) that Hayden outlined for the House Intelligence Committee on October 1 (see October 1, 2001), and asking whether the president authorized it. The substance of Hayden’s October 18 reply will be redacted, except for this statement: “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” [Nancy Pelosi, 1/6/2006] A January 4, 2006 report in the Washington Post will cite “intelligence official close to Hayden” as saying that “[Hayden’s] appearance on Oct. 1, 2001, before the House committee had been to discuss Executive Order 12333, and not the new NSA program,” and that “Pelosi’s concerns had been answered in writing and again several weeks later during a private briefing.” [Washington Post, 1/4/2006] In a January 23, 2006 public briefing, Hayden will say, “September 2001, I asked to update the Congress on what NSA had been doing, and I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities,” and, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” [Michael Hayden, 1/23/2006]
Nature of Hayden's EO 12333 Surveillance Program - The full scope of Hayden’s surveillance program is unclear, but some sources indicate it includes the wholesale collection and data-mining of phone records provided by telecom companies and placement of pen registers (call trackers) on domestic phone numbers (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, October 2001), and October 31, 2001). Some sources indicate the NSA began large-scale domestic surveillance activities prior to the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi, National Security Agency

Timeline Tags: Civil Liberties

John Yoo, a deputy assistant attorney general in the Justice Department’s Office of Legal Counsel, and OLC special counsel Robert Delahunty issue a joint memo to White House counsel Alberto Gonzales. The memo claims that President Bush has sweeping extraconstitutional powers to order military strikes inside the US if he says the strikes are against suspected terrorist targets. In the days following the 9/11 attacks, Gonzales asked if Bush could legally order the military to combat potential terrorist activity within the US. The memo is first revealed to exist seven years later (see April 2, 2008) after future OLC head Steven Bradbury acknowledges its existence to the American Civil Liberties Union; it will be released two months after the Bush administration leaves the White House (see March 2, 2009). [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009]
Granting Extraordinary, Extraconstitutional Authority to Order Military Actions inside US - Yoo and Delahunty’s memo goes far past the stationing of troops to keep watch at airports and around sensitive locations. Instead, the memo says that Bush can order the military to conduct “raids on terrorist cells” inside the US, and even to seize property. “The law has recognized that force (including deadly force) may be legitimately used in self-defense,” they write. In 2009, Reuters will write, “The US military could have kicked in doors to raid a suspected terrorist cell in the United States without a warrant” under the findings of the OLC memo. “We do not think that a military commander carrying out a raid on a terrorist cell would be required to demonstrate probable cause or to obtain a warrant,” Yoo and Delahunty write. [US Department of Justice, 10/23/2001 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009] The memo reasons that since 9/11, US soil can be legally construed as being a battlefield, and Congress has no power to restrict the president’s authority to confront enemy tactics on a battlefield. [Savage, 2007, pp. 131]
No Constitutional or Other Legal Protections - “[H]owever well suited the warrant and probable cause requirements may be as applied to criminal investigations or to other law enforcement activities, they are unsuited to the demands of wartime and the military necessity to successfully prosecute a war against an enemy. [Rather,] the Fourth Amendment does not apply to domestic military operations designed to deter and prevent foreign terrorist attacks.” Any objections based on the Fourth Amendment’s ban on unreasonable search and seizures would be invalid since whatever possible infringement on privacy would be trumped by the need to protect the nation from injury by deadly force. The president is “free from the constraints of the Fourth Amendment.” The Posse Comitatus Act, which bars the military from operating inside the US for law enforcement purposes, is also moot, the memo says, because the troops would be acting in a national security function, not as law enforcement. [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009; Ars Technica, 3/2/2009] There are virtually no restrictions on the president’s ability to use the military because, Yoo and Delahunty write, the nation is in a “state of armed conflict.” The scale of violence, they argue, is unprecedented and “legal and constitutional rules” governing law enforcement, even Constitutional restrictions, no longer apply. The US military can be used for “targeting and destroying” hijacked airplanes, they write, or “attacking civilian targets, such as apartment buildings, offices, or ships where suspected terrorists were thought to be.” The memo says, “Military action might encompass making arrests, seizing documents or other property, searching persons or places or keeping them under surveillance, intercepting electronic or wireless communications, setting up roadblocks, interviewing witnesses, or searching for suspects.” [Newsweek, 3/2/2009] Yoo writes that the Justice Department’s criminal division “concurs in our conclusion” that federal criminal laws do not apply to the military during wartime. The criminal division is headed by Michael Chertoff, who will become head of the Department of Homeland Security. [Washington Post, 4/4/2008]
Sweeping Away Constitutional Rights - Civil litigator Glenn Greenwald will later note that the memo gives legal authorization for President Bush to deploy the US military within US borders, to turn it against foreign nationals and US citizens alike, and to render the Constitution’s limits on power irrelevant and non-functional. Greenwald will write, “It was nothing less than an explicit decree that, when it comes to presidential power, the Bill of Rights was suspended, even on US soil and as applied to US citizens.”
Justifying Military Surveillance - Greenwald will note that the memo also justifies the administration’s program of military surveillance against US citizens: “[I]t wasn’t only a decree that existed in theory; this secret proclamation that the Fourth Amendment was inapplicable to what the document calls ‘domestic military operations’ was, among other things, the basis on which Bush ordered the NSA, an arm of the US military, to turn inwards and begin spying—in secret and with no oversight—on the electronic communications (telephone calls and emails) of US citizens on US soil” (see December 15, 2005 and Spring 2004). “If this isn’t the unadorned face of warped authoritarian extremism,” Greenwald will ask, “what is?” [Salon, 3/3/2009] If the president decides to use the military’s spy agency to collect “battlefield intelligence” on US soil, no law enacted by Congress can regulate how he goes about collecting that information, including requiring him to get judicial warrants under the Foreign Intelligence Surveillance Act (FISA). In 2007, Yoo will say in an interview: “I think there’s a law greater than FISA, which is the Constitution, and part of the Constitution is the president’s commander in chief power. Congress can’t take away the president’s powers in running war.” [Savage, 2007, pp. 131; PBS Frontline, 5/15/2007] Cheney and Addington will push the NSA to monitor all calls and e-mails, including those beginning and ending on US soil, but the NSA will balk. Domestic eavesdropping without warrants “could be done and should be done,” Cheney and Addington argue, but the NSA’s lawyers are fearful of the legal repercussions that might follow once their illegal eavesdropping is exposed, with or without the Justice Department’s authorization. The NSA and the White House eventually reach a compromise where the agency will monitor communications going in and out of the US, but will continue to seek warrants for purely domestic communications (see Spring 2001, After September 11, 2001, and October 2001). [Savage, 2007, pp. 131]
Military Use Considered - In 2009, a former Bush administration lawyer will tell a reporter that the memo “gave rise to the Justice Department discussing with the Defense Department whether the military could be used to arrest people and detain people inside the United States. That was considered but rejected on at least one occasion.” The lawyer will not give any indication of when this will happen, or to whom. Under the proposal, the suspects would be held by the military as “enemy combatants.” The proposal will be opposed by the Justice Department’s criminal division and other government lawyers and will ultimately be rejected; instead, the suspects will be arrested under criminal statutes. [Los Angeles Times, 3/3/2009]

Entity Tags: Steven Bradbury, US Department of Homeland Security, US Department of Defense, Robert J. Delahunty, Office of Legal Counsel (DOJ), Bush administration (43), Michael Chertoff, Alberto R. Gonzales, National Security Agency, American Civil Liberties Union, Glenn Greenwald, George W. Bush, US Department of Justice, John C. Yoo

Timeline Tags: Civil Liberties

Vice President Dick Cheney summons the chairmen and ranking members of the Senate and House Intelligence Committees to the White House for a classified briefing on the secret NSA warrantless wiretapping program (see Early 2002). Cheney makes it clear to the lawmakers that he is merely informing them about the program, and not seeking their approval. [Washington Post, 12/18/2005] Officials later say that under any of the previous presidents, such a meeting of this import would involve the president. But the four lawmakers are hustled away from the Oval Office. Instead, “[w]e met in the vice president’s office,” Bob Graham (D-FL), the chairman of the Senate Intelligence Committee, later recalls. President Bush has already told Graham that “the vice president should be your point of contact in the White House.” Cheney, according to the president, “has the portfolio for intelligence activities.” [Washington Post, 6/24/2007] The leaders are briefed by Cheney, CIA Director George Tenet, and NSA Director Michael Hayden. The Congressional leaders will later mostly refuse to comment publicly about what they do and do not learn about the program, even after it is revealed to the public (see December 15, 2005). In 2003, when Senator John D. Rockefeller ascends to the Democratic leadership of the Senate committee, and is himself briefed on the program, he will write to Cheney expressing his concerns over it (see July 17, 2003). [New York Times, 12/15/2005]
'No Discussion about Expanding' NSA Wiretapping - In December 2005, after the program is revealed to the public, one of the Congressmen present at the briefings, Graham, the then-chairman of the Senate Intelligence Committee, will discuss his knowledge of the program. In contradiction to the characterizations of Bush and other White House officials, Graham will say that he recalls “no discussion about expanding [NSA eavesdropping] to include conversations of US citizens or conversations that originated or ended in the United States,” and knew nothing of Bush’s intention to ignore the Foreign Intelligence Surveillance Court (also known as the FISA court). “I came out of the room with the full sense that we were dealing with a change in technology but not policy,” Graham will recall, using new methodologies to intercept overseas calls that passed through US switches. He thought that NSA eavesdropping would continue to be limited to “calls that initiated outside the United States, had a destination outside the United States but that transferred through a US-based communications system.” Instead, Graham will say, it now seems that Bush decided to go “beyond foreign communications to using this as a pretext for listening to US citizens’ communications. There was no discussion of anything like that in the meeting with Cheney.” A senior intelligence official, who refuses to reveal his identity but says he is speaking with the permission of the White House, will accuse Graham of “misremembering the briefings,” which he will call “very, very comprehensive.” The official will refuse to discuss the briefings in any but the most general terms, but will say they were intended “to make sure the Hill knows this program in its entirety, in order to never, ever be faced with the circumstance that someone says, ‘I was briefed on this but I had no idea that—’ and you can fill in the rest.” Graham will characterize the official’s description as saying: “[W]e held a briefing to say that nothing is different.… Why would we have a meeting in the vice president’s office to talk about a change and then tell the members of Congress there is no change?” House Minority Leader Nancy Pelosi (D-CA), who was also present at the meeting as the ranking Democrat on the House Intelligence Committee, will say the briefing described “President Bush’s decision to provide authority to the National Security Agency to conduct unspecified activities.” She will note that she “expressed my strong concerns” but did not go into detail. [Washington Post, 12/18/2005]
Lawmakers Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). In the briefing, Cheney informs the lawmakers of none of this.

Entity Tags: Richard (“Dick”) Cheney, Senate Intelligence Committee, Nancy Pelosi, John D. Rockefeller, House Intelligence Committee, Daniel Robert (“Bob”) Graham, George J. Tenet, George W. Bush, Michael Hayden, National Security Agency

Timeline Tags: Civil Liberties

October 26, 2001: USA Patriot Act Becomes Law

President Bush signs the Patriot Act into law.President Bush signs the Patriot Act into law. [Source: White House]President Bush signs the USA Patriot Act (see October 2, 2001) into law. The act’s provisions include:
bullet 1) Non-citizens can be detained and deported if they provide “assistance” for lawful activities of any group the government chooses to call a terrorist organization. Under this provision the secretary of state can designate any group that has ever engaged in violent activity as a terrorist organization. Representative Patsy Mink (D-HI) notes that in theory supporters of Greenpeace could now be convicted for supporting terrorism. [San Francisco Chronicle, 11/12/2001]
bullet 2) Immigrants can be detained indefinitely, even if they are found not to have any links to terrorism. They can be detained indefinitely for immigration violations or if the attorney general decides their activities pose a danger to national security. They need never be given a trial or even a hearing on their status. [San Francisco Chronicle, 9/8/2002]
bullet 3) Internet service providers can be ordered to reveal the websites and e-mail addresses that a suspect has communicated to or visited. The FBI need only inform a judge that the information is relevant to an investigation. [Village Voice, 11/26/2001; San Francisco Chronicle, 9/8/2002]
bullet 4) The act “lays the foundation for a domestic intelligence-gathering system of unprecedented scale and technological prowess.” [Washington Post, 11/4/2001] It allows the government to access confidential credit reports, school records, and other records, without consent or notification. [San Francisco Chronicle, 9/8/2002] All of this information can now be given to the CIA, in violation of the CIA’s mandate prohibiting it from spying within the US. [Village Voice, 11/26/2001]
bullet 5) Financial institutions are encouraged to disclose possible violations of law or “suspicious activities” by any client. The institution is prohibited from notifying the person involved that it made such a report. The term “suspicious” is not defined, so it is up to the financial institutions to determine when to send such a report.
bullet 6) Federal agents can easily obtain warrants to review a library patron’s reading and computer habits (see January 2002). [Village Voice, 2/22/2002] Section 215 allows the FBI to ask the Foreign Intelligence Surveillance Court (FISC) for an order to obtain documents relating to counterterrorism investigations without meeting the usual standard of legal “probable cause” that a crime may have been committed. Senator Russ Feingold (D-WI—see October 9, 2001) says that Section 215 can allow the FBI to “go on a fishing expedition and collect information on virtually anyone.” Librarians will make Section 215 the centerpiece of their objections to the Patriot Act, arguing that the government can now “sweep up vast amounts of information about people who are not suspected of a crime.” In 2005, one librarian will say, “It reminds me of the Red Scare of the 1950s.” However, some FBI officials find it easier to use provisions of Section 505, which expands the usage of so-called “national security letters” (see November 28, 2001). [Roberts, 2008, pp. 39-40]
bullet 7) The government can refuse to reveal how evidence is collected against a suspected terrorist defendant. [Tampa Tribune, 4/6/2003]
Passes with No Public Debate - The law passes without public debate. [Village Voice, 11/9/2001; Village Voice, 11/26/2001] Even though it ultimately took six weeks to pass the law, there were no hearings or congressional debates. [Salon, 3/24/2003] Congressman Barney Frank (D-MA) says: “This was the least democratic process for debating questions fundamental to democracy I have ever seen. A bill drafted by a handful of people in secret, subject to no committee process, comes before us immune from amendment” (see October 2-4, 2001 and October 24, 2001). [Village Voice, 11/9/2001] Only 66 congresspeople, and one senator, Feingold, vote against it. Few in Congress are able to read summaries, let alone the fine print, before voting on it. [Los Angeles Times, 10/30/2001] Feingold says, “The new law goes into a lot of areas that have nothing to do with terrorism and have a lot to do with the government and the FBI having a wish list of things they want to do.” [Village Voice, 11/9/2001] Supporters of the act point out that some of its provisions will expire in four years, but in fact most provisions will not expire. [Chicago Tribune, 11/1/2001]
Mounting Opposition - One year later, criticism of the law will grow. [San Francisco Chronicle, 9/8/2002] Dozens of cities will later pass resolutions criticizing the Patriot Act (see January 12, 2003).

Entity Tags: George W. Bush, USA Patriot Act, Foreign Intelligence Surveillance Court, US Congress, Patsy Mink, Russell D. Feingold, Barney Frank

Timeline Tags: Complete 911 Timeline, Civil Liberties

White House lawyers have become impatient with the interagency group’s (see Shortly Before September 23, 2001) less than full endorsement of the use of military commissions to try suspected terrorists. By late October, Timothy E. Flanigan takes the task of designing a strategy for prosecuting terrorists away from the group and proceeds to focus on military commissions as the only preferable option. The White House lawyers now work more in secret, excluding many agencies and most of the government’s experts in military and international law, but together with the lawyers of the Office of Legal Counsel (OLC), with the intention of drafting a presidential military order. [New York Times, 10/24/2004] There is a remarkable secrecy surrounding the drafting process (see November 11-13, 2001). Both Attorney General John D. Ashcroft and his deputy, Larry D. Thompson, are closely consulted. But the head of the Justice Department’s Criminal Division, Michael Chertoff is kept out of the loop. Secretary of Defense Donald H. Rumsfeld is informed through his general counsel, William J. Haynes. Other Pentagon experts, however, are excluded. [New York Times, 10/24/2004] When the order is signed (see November 13, 2001), many express surprise. “That came like a bolt from the blue,” a former Pentagon official says. “Neither I nor anyone I knew had any insight, any advance knowledge, or any opportunity to comment on the president’s military order.” [Guardian, 6/9/2004] “I can’t tell you how compartmented things were,” retired Rear Adm. Donald J. Guter, the Navy’s Judge Advocate General, later recalls. “This was a closed administration.” [New York Times, 10/24/2004]

Entity Tags: Larry D. Thompson, John Ashcroft, Michael Chertoff, Donald J. Guter, Donald Rumsfeld, William J. Haynes

Timeline Tags: Torture of US Captives, Civil Liberties

John Yoo, the Justice Department’s (DOJ) Office of Legal Counsel (OLC) deputy assistant attorney general, sends a classified memo to Attorney General John Ashcroft justifying warrantless surveillance of US persons. The National Security Agency (NSA)‘s domestic surveillance authorized by President Bush (see October 4, 2001, Early 2002, and December 15, 2005) will come to be publicly referred to as the President’s Surveillance Program (PSP). This is not the first Yoo memo supporting warrantless surveillance (see September 25, 2001), but a 2009 report on the PSP jointly issued by the inspectors general (IGs) of the Department of Defense (DOD), DOJ, CIA, National Security Agency (NSA), and Office of the Director of National Intelligence (ODNI) will refer to it as “[t]he first OLC opinion directly supporting the legality of the PSP.” The IGs’ report will quote from and comment on the memo, noting that “deficiencies in Yoo’s memorandum identified by his successors in the Office of Legal Counsel and the Office of the Deputy Attorney General later became critical to DOJ’s decision to reassess the legality of the program in 2003.” According to the IGs’ report, Yoo asserts that warrantless surveillance is constitutional as long as it is “reasonable” under the Fourth Amendment, which only protects against “unreasonable searches and siezures.” On this point, the IGs’ report will note that Yoo’s successors were troubled by his failure to discuss the Supreme Court’s decision in Youngstown Sheet & Tube Co. v. Sawyer (1952), which found the president’s wartime authority to be limited. His memo does acknowledge that the Foreign Intelligence Surveillance Act (FISA) “purports to be the exclusive statutory means for conducting electronic surveillance for foreign intelligence,” but asserts that it is only a “safe harbor for electronic surveillance” because it cannot “restrict the president’s ability to engage in warrantless searches that protect the national security.” Yoo also writes that Congress has not “made a clear statement in FISA that it sought to restrict presidential authority to conduct warrantless searches in the national security area.” The IGs’ report will state that Yoo’s successors considered this problematic because Yoo has omitted discussion of the fact that FISA explicitly authorizes the president to conduct warrantless surveillance during the first 15 days following a declaration of war by Congress, which they considered an expression of Congress’s intent to restrict warrantless surveillance to a limited period of time and specific circumstances. The IGs’ report will also state that Yoo’s memo discusses “the legal rationale for Other Intelligence Activities authorized as part of the PSP,” and that Yoo concludes, “[W]e do not believe that Congress may restrict the president’s inherent constitutional powers, which allow him to gather intelligence necessary to defend the nation from direct attack.” The IGs’ report will say that “Yoo’s discussion of some of the Other Intelligence Activities did not accurately describe the scope of these activities,” and that Yoo’s successors considered his discussion of these other activities to be “insufficient and presenting a serious impediment to recertification of the program as to form and legality.” [Inspectors General, 7/10/2009, pp. pp. 11-13]
Memo's Existence Revealed by ACLU Lawsuit - On December 15, 2005, the New York Times will report that Bush authorized an NSA warrantless domestic surveillance program after the 9/11 attacks (see December 15, 2005). The American Civil Liberties Union (ACLU) will request records pertaining to the program under the Freedom of Information Act (FOIA) and then sue the Justice Department for the release of records. The existence of Yoo’s November 2 memo will first be revealed in an October 19, 2007 deposition filed by then head of the OLC Steven Bradbury in response to the ACLU lawsuit, which says that it “[concerns] the legality of certain communications intelligence activities.” After the 2009 release of the IGs’ report the ACLU will notify the court and the government will agree to reprocess four OLC memos, including Yoo’s November 2 memo. This memo and a May 6, 2004 memo by Yoo’s OLC successor Jack Goldsmith that disputes many of Yoo’s conclusions will be released in heavily redacted form on March 18, 2011. [ACLU.org, 2/7/2006; United States District Court of DC, 10/19/2007; American Civil Liberties Union, 3/19/2011]
Constitutional Experts Dispute Yoo's Legal Rationale - Numerous authorities on the law will question or reject the legal bases for warrantless domestic surveillance. In 2003, Yoo will leave the OLC. Goldsmith will begin a review of the PSP, after which he will conclude it is probably illegal in some respects and protest, within the executive branch, its continuation (see Late 2003-Early 2004 and December 2003-June 2004). Following the public disclosure of its existence, a January 5, 2006 report by the Congressional Research Service will find it to be of dubious legality (see January 5, 2006). On January 19, 2006, the DOJ will issue a 42-page white paper laying out the legal bases for the program (see January 19, 2006). These bases will be reviewed and rejected by 14 constitutional scholars and former government officials in a joint letter to Congress on February 2, 2006. [al [PDF], 2/2/2006 pdf file] The American Bar Association will adopt a resolution on February 13, 2006 that rejects DOJ’s arguments and calls on Congress to investigate the program. [Delegates, 2/13/2006 pdf file] On August 17, 2006, in the case ACLU v. NSA, US district judge Anna Diggs Taylor will reject the government’s invocation of the “state secrets privilege” and its argument that plaintiffs’ lack standing due to their being unable to prove they were surveilled, and will rule that warrantless surveillance is in violation of “the separation of powers doctrine, the Administrative Procedures Act, the First and Fourth Amendments to the United States Constitution, the FISA, and Title III” (see August 17, 2006). Taylor’s ruling will be overturned on appeal, on the grounds that the plaintiffs lack standing as they cannot prove that surveillance has occurred. In another case, Al Haramain v. Barack Obama, the government will make the same arguments, but US district judge Vaughn Walker will reject these and conclude in 2010 that illegal surveillance occurred (see March 31, 2010). [Al-Haramain v. Obama, 3/31/2010]

Entity Tags: Steven Bradbury, Vaughn Walker, Ronald Dworkin, George W. Bush, John C. Yoo, American Bar Association, Office of Legal Counsel (DOJ), American Civil Liberties Union, John Ashcroft, Anna Diggs Taylor, US Department of Justice

Timeline Tags: Civil Liberties

In conjunction with the Federalist Society, the Heritage Foundation publishes a legal paper that appears to reflect much of the thinking at this time of prominent White House and Justice Department lawyers. The paper espouses the use of military commissions, arguing that this will offer the government several advantages. “In particular,” the paper’s authors argue, “trials before military tribunals need not be open to the general public and they may be conducted on an expedited basis, permitting the quick resolution of individual cases and avoiding the disclosure of highly sensitive intelligence material, which would have to be made public in an ordinary criminal trial.” The disadvantage of a normal trial would be that they would be limited by constitutional rules with regard to “what can be done to protect classified information.” In addition, in “federal district courts, the government has an obligation under Article III and the Sixth Amendment to conduct a ‘public trial’ and present to the jury, in open court, the facts on which it is relying to establish a defendant’s guilt.” But the authors do acknowledge that “[t]he use of military commissions with respect to individuals not regularly enrolled in a military force, represents a clear departure from normal legal processes and some of America’s most fundamental judicial traditions.” Surprisingly, the Geneva Conventions of 1949 are not mentioned even once. Almost in passing, the authors suggest an option that is to become reality. “[I]t is likely,” they write, “that the Supreme Court would allow the trial overseas by military commission of al-Qaeda members captured in Afghanistan, regardless of how it would treat defendants in this country.” [Rivkin, Casey, and Bartram, 11/5/2001; Rivkin, Casey, and Bartram, 11/5/2001] It is an indication that by this time the government contemplates using the US Naval Station at Guantanamo Bay, which is formally on Cuban soil, to accommodate suspected al-Qaeda and Taliban detainees.

Entity Tags: US Department of Justice, Geneva Conventions, Heritage Foundation, Federalist Society, Bush administration (43)

Timeline Tags: Torture of US Captives

The Geneva Conventions are mentioned in a memo issued the day after the publication of the Heritage Foundation paper (see November 5, 2001), but only to suggest that suspected terrorists should not be entitled to the rights enclosed in them. Patrick F. Philbin, a deputy in the OLC, sends a confidential 35-page memo to the White House legal counsel Gonzales, arguing that the president, as Commander-in-Chief, has “inherent authority” to establish military commissions without authorization from the US Congress. The 9/11 attacks are themselves “plainly sufficient” to justify the application of the laws of war. Furthermore, putting terrorists on trial under the laws of war, “does not mean,” according to Philbin, “that terrorists will receive the protections of the Geneva Conventions or the rights that laws of war accord to lawful combatants.” The Philbin memo will serve as a basis for a Presidential order (see November 13, 2001) establishing the option of military commissions, which will be drafted by Deputy White House Counsel Timothy E. Flanigan and David S. Addington, the legal counsel to Vice President Cheney. [New York Times, 10/24/2004]

Entity Tags: Patrick F. Philbin, Alberto R. Gonzales

Timeline Tags: Torture of US Captives

William J. Haynes.William J. Haynes. [Source: US Defense Department]William J. Haynes, Defense Secretary Donald Rumsfeld’s general counsel, shows a draft of a presidential order establishing military commissions to Colonel Lawrence J. Morris, a judge advocate general (JAG) attorney with strong experience in military justice and the laws of war. Morris heads a Pentagon legal team that has so far been excluded from the discussion on how suspected terrorists should be prosecuted. Col. Morris is given just 30 minutes to read the draft but is not allowed to keep a copy or even take notes. The next day, the Army’s Judge Advocate General, Major General Thomas J. Romig, hastily convenes a meeting of Pentagon lawyers to prepare suggestions for improvement, with an eye on bringing the order closer to existing military legal standards. The final order, however, includes none of the lawyer’s recommendations. “They hadn’t changed a thing,” a military official will later recall. [New York Times, 10/24/2004; Savage, 2007, pp. 138]

Entity Tags: Lawrence J. Morris, William J. Haynes

Timeline Tags: Torture of US Captives, Civil Liberties

Vice President Cheney leads a meeting at the White House to put the finishing touches on a draft presidential order establishing military commissions (see Late October 2001 and November 9, 2001). The meeting includes Attorney General John Ashcroft, Defense Department chief counsel William J. Haynes, and several White House lawyers, but leaves out senior officials of the State Department and the National Security Council. Cheney has decided to tell neither National Security Adviser Condoleezza Rice nor Secretary of State Colin Powell about the order until it has already been signed. Cheney has also told no one in the interagency working group ostensibly formulating the administration’s approach to prosecuting terrorists (see Shortly Before September 23, 2001). Ashcroft angrily dissents from Cheney’s plan to give the White House sole authority over the commissions, and invokes his authority as the nation’s top law enforcement official to demand that the Justice Department be given a say in the decision. Cheney overrules Ashcroft’s objections. He will discuss the draft with President Bush over lunch a few days later (see November 11-13, 2001). [New York Times, 10/24/2004; Savage, 2007, pp. 138]

Entity Tags: William J. Haynes, Colin Powell, George W. Bush, John Ashcroft, Condoleezza Rice, Richard (“Dick”) Cheney

Timeline Tags: Torture of US Captives, Civil Liberties

At a private lunch meeting, Vice President Cheney presents President Bush with a four-page memo, written in strict secrecy by lawyer John Yoo of the Justice Department’s Office of Legal Counsel (see November 6-10, 2001), and a draft executive order that establishes military commissions for the trial of suspected terrorists (see November 10, 2001). The legal brief mandates that foreign terrorism suspects held in US custody have no access to any courts whatsoever, civil, criminal, military, domestic, or foreign. They can be detained indefinitely without charges. If they are to be tried, they can be tried in closed “military commissions.” [White House, 11/13/2001; Savage, 2007, pp. 138; Washington Post, 6/24/2007]
Military Commissions Suitable to 'Unitary Executive' Agenda - According to author Craig Unger, military commissions are a key element of Cheney’s drive towards a “unitary executive,” the accretion of governmental powers to the presidency at the expense of the legislative and judicial branches. Federal trials for terror suspects would put them under all the legal procedures provided under the US judicial system, an unacceptable alternative. Military courts-martial would give them the rights granted by the Geneva Conventions. Military commissions, however, are essentially tribunals operating outside of both civilian and military law. Defendants have few rights. Secret evidence can be admitted without being disclosed to the defendants. Hearsay and coerced testimony are admissible. Prisoners can be held indefinitely. [Unger, 2007, pp. 221-222]
No Bureaucratic Footprints - After Bush peruses the memo and the draft order, Cheney takes them back with him to his office. After leaving Bush, Cheney takes extraordinary steps to ensure that no evidence of his involvement remains. The order passes from Cheney to his chief counsel David Addington, and then to associate White House counsel Bradford Berenson. At Berenson, the provenance of the order breaks, as no one tells him of its origin. Berenson rushes the order to deputy staff secretary Stuart Bowen with instructions to prepare it for signature immediately, without advance distribution to Bush’s top advisers. Bowen objects, saying that he had handled thousands of presidential documents without ever sidestepping the strict procedures governing coordination and review. Bowen relents only after being subjected to what he will later recall as “rapid, urgent persuasion” that Bush is standing by to sign and that the order is too sensitive to delay. Berenson will later say he understood that “someone had briefed” Bush “and gone over it” already. “I don’t know who that was.” When it is returned to Bush’s office later in the day, Bush signs it immediately (see November 13, 2001). Virtually no one else has seen the text of the memo. The Cheney/Yoo proposal has become a military order from the commander in chief.
Dodging Proper Channels - The government has had an interagency working group, headed by Pierre Prosper, the ambassador at large for war crimes, working on the same question (see Shortly Before September 23, 2001). But Cheney and Addington have refused to have any contact with Prosper’s group; one of Cheney’s team later says, “The interagency [group] was just constipated.” Cheney leapfrogged over Prosper’s group with their own proposal, performing an adroit bureaucratic move that puts their proposal in place without any oversight whatsoever, and cutting Prosper’s group entirely out of the process. When the news of the order is broadcast on CNN, Secretary of State Colin Powell demands, “What the hell just happened?” An angry Condoleezza Rice, the president’s national security adviser, sends an aide to find out. Virtually no one, even witnesses to the presidential signing, know that Cheney promulgated the order. In 2007, Washington Post reporters Barton Gellman and Jo Becker will call the episode “a defining moment in Cheney’s tenure” as vice president. Cheney has little Constitutional power, but his deft behind-the-scenes manuevering and skilled bureaucratic gamesmanship enable him to pull off coups like this one, often leaving even the highest White House officials none the wiser. “[H]e has found a ready patron in George W. Bush for edge-of-the-envelope views on executive supremacy that previous presidents did not assert,” the reporters write. [White House, 11/13/2001; Unger, 2007, pp. 221-222; Washington Post, 6/24/2007]
Quiet Contravening of US Law - Six years later, Unger will observe that few inside or outside Washington realize that Cheney has, within a matter of days, contravened and discarded two centuries of American law. He has given the president, in the words of former Justice Department lawyer Bruce Fein, “the functions of judge, jury, and prosecutor in the trial of war crimes [and] the authority to detain American citizens as enemy combatants indefinitely… a frightening power indistinguishable from King Louis XIV’s execrated lettres de cachet that occasioned the storming of the Bastille.” [Unger, 2007, pp. 223-224]

Entity Tags: Stuart W. Bowen, Office of Legal Counsel (DOJ), Richard (“Dick”) Cheney, US Department of Justice, John C. Yoo, David S. Addington, George W. Bush, Barton Gellman, Bradford Berenson, Jo Becker, Bruce Fein, Condoleezza Rice, Craig Unger, Colin Powell, Pierre-Richard Prosper

Timeline Tags: Civil Liberties

President Bush issues a three-page executive order authorizing the creation of military commissions to try non-citizens alleged to be involved in international terrorism (see November 10, 2001). The president will decide which defendants will be tried by military commissions. Defense Secretary Rumsfeld will appoint each panel and set its rules and procedures, including the level of proof needed for a conviction. A two-thirds vote is needed to convict a defendant and impose a sentence, including life imprisonment or death. Only the president or the secretary of defense has the authority to overturn a decision. There is no provision for an appeal to US civil courts, foreign courts, or international tribunals. Nor does the order specify how many judges are to preside on a tribunal or what qualifications they must have. [US Department of Defense, 11/13/2001; Washington Post, 11/14/2001; New York Times, 10/24/2004]
Questionable Rule of Evidence Adopted - The order also adopts a rule of evidence stemming from the 1942 Supreme Court case of United States v. Quirin that says evidence shall be admitted “as would… have probative value to a reasonable person.” This rule, according to Judge Evan J. Wallach, “was repeatedly used [in World War II and in the post-war tribunals] to admit evidence of a quality or obtained in a manner which would make it inadmissible under the rules of evidence in both courts of the United States or courts-martial conducted by the armed forces of the United States.” [Wallach, 9/29/2004] Evidence derived from torture, for example, could theoretically be admitted. It should be noted that the order is unprecedented among presidential directives in that it takes away some individuals’ most basic rights, while claiming to have the power of law, with the US Congress not having been so much as consulted.
Specifics Left to Rumsfeld - Bush’s executive order contains few specifics about how the commissions will actually function. Bush will delegate that task to Rumsfeld, although, as with the order itself, White House lawyers will actually make the decision to put Rumsfeld in charge, and Bush will merely sign off on the decision (see March 21, 2002). [Savage, 2007, pp. 138]
Dispute over Trial Procedures - During the next few years, lawyers will battle over the exact proceedings of the trials before military commissions, with many of the military lawyers arguing for more rights for the defendants and with Defense Department chief counsel William J. Haynes, and Justice Department and White House lawyers (including White House counsel Alberto Gonzales, vice presidential counsel David Addington, and Gonzales’ deputy Timothy Flanigan) taking a more restrictive line. [New York Times, 10/24/2004]
Out of the Loop - Both National Security Adviser Condoleezza Rice and Secretary of State Colin Powell were left outside of the circle during the drafting of this directive (see November 6, 2001 and November 9, 2001). Rice is reportedly angry about not being informed. [New York Times, 10/24/2004]
Serious 'Process Failure' - National Security Council legal adviser John Bellinger will later call the authorization a “process failure” with serious long-term consequences (see February 2009).

Entity Tags: George W. Bush, John Bellinger, Donald Rumsfeld, Colin Powell, Condoleezza Rice, David S. Addington, Alberto R. Gonzales, William J. Haynes, Timothy E. Flanigan

Timeline Tags: Torture of US Captives, Civil Liberties

In a speech to the US Chamber of Commerce, Vice President Cheney tells his audience that terror suspects do not deserve to be treated as prisoners of war. Cheney is laying the groundwork for the general acceptance of President Bush’s order that terror suspects are to be denied access to the US judicial system (see November 13, 2001). Asked about Bush’s proposed military tribunals for dealing with charges against suspected terrorists, Cheney says that according to Bush’s order, he and he alone will decide whether a suspect is tried in a military tribunal. Cheney continues: “Now some people say, ‘Well, gee, that’s a dramatic departure from traditional jurisprudence in the United States.’ It is, but there’s precedents for it.… The basic proposition here is that somebody who comes into the United States of America illegally, who conducts a terrorist operation killing thousands of innocent Americans, men, women, and children, is not a lawful combatant. They don’t deserve to be treated as a prisoner of war. They don’t deserve the same guarantees and safeguards that would be used for an American citizen going through the normal judicial process. This—they will have a fair trial, but it’ll be under the procedures of a military tribunal and rules and regulations to be established in connection with that. We think it’s the appropriate way to go. We think it’s—guarantees that we’ll have the kind of treatment of these individuals that we believe they deserve.” [White House, 11/14/2001] Many in the administration are disturbed at Cheney’s remarks, as Bush has not yet publicly made this decision (see November 13, 2001). [Washington Post, 6/24/2007]

Entity Tags: George W. Bush, Richard (“Dick”) Cheney, Bush administration (43)

Timeline Tags: Torture of US Captives

President Bush’s order to establish military tribunals, or commissions, to try suspected terrorists (see November 13, 2001) is defended by Vice President Cheney, who tells reporters that the suspects subjected to such tribunals “don’t deserve to be treated as prisoners of war. They don’t deserve the same guarantees and safeguards we use for an American citizen.” Law professor Douglas Kmiec agrees. “This is the answer for what we’re dealing with: unlawful belligerents who do not come within our constitutional structure,” he says. “The president’s order is not extraordinary when one places it in the context of historic military campaigns.” Civil libertarians and administration critics disagree. Representative John Conyers (D-MI) says military commissions are based on the “thinnest legal precedents” and would “antagonize our allies and alienate the many legal immigrants in this country.” Law professor Anne-Marie Slaughter notes: “President Bush has said this is a war to bring terrorists to justice. So the real question is, what’s justice? That requires a fair trial and proof beyond a reasonable doubt, and that is not the aim of a military tribunal.” A better option, she says, would be convening an international war crimes tribunal. And law professor Joshua Rosenkranz says: “There is a natural temptation to hunker down whenever we are in crisis. But there is a danger that this hysteria-driven effort to protect to ourselves is weakening the foundations of our democracy.” [USA Today, 11/15/2001]

Entity Tags: Richard (“Dick”) Cheney, Anne-Marie Slaughter, Douglas Kmiec, Joshua Rosenkranz, John Conyers, George W. Bush

Timeline Tags: Civil Liberties

The UN Special Rapporteur on the Independence of Judges and Lawyers, Param Cumaraswamy, sends an urgent appeal to Washington regarding President Bush’s November 13 military order (see November 13, 2001). [BBC Radio 4, 7/13/2003]

Entity Tags: Param Cumaraswamy, Colin Powell, George W. Bush

Timeline Tags: Torture of US Captives

Scorching criticism of President Bush’s Executive Order (see November 13, 2001) comes from the Center for National Security Studies, which says it “violates separation of powers as the creation of military commissions has not been authorized by the Congress and is outside the president’s constitutional powers.” The order is also an “unconstitutional attempt to suspend the writ of habeas corpus.” [Center for National Security Studies, 11/19/2001] Law professor Kathleen Clark similarly states: “These military tribunals are troubling in many respects, particularly in their denial of basic due process protection for defendants. But even apart from this question of civil liberties, this presidential order is unconstitutional because the president lacks the authority under the constitution and statutory law to create this kind of court.” [Center for Democracy and Technology, 11/19/2001]

Entity Tags: Kathleen Clark, Center for National Security Studies

Timeline Tags: Torture of US Captives, Civil Liberties

Justice Department lawyer John Yoo, an official with the Office of Legal Counsel (OLC), issues a classified memo to White House counsel Alberto Gonzales. The contents of the memo will remain secret, but its existence will be revealed in a June 2007 deposition filed in the course of an American Civil Liberties Union (ACLU) lawsuit. The memo is known to cover the War Crimes Act, the Hague Convention, the Geneva Conventions, the federal criminal code, and detainee treatment. [American Civil Liberties Union [PDF], 1/28/2009 pdf file] It is co-authored by OLC special counsel Robert Delahunty. [ProPublica, 4/16/2009]

Entity Tags: Robert J. Delahunty, American Civil Liberties Union, Office of Legal Counsel (DOJ), John C. Yoo, US Department of Justice

Timeline Tags: Civil Liberties

Salim Hamdan is captured in Afghanistan. [Guantanamo Military Commissions, 11/20/2007 pdf file] Hamdan is an Arab who has lived in Afghanistan for some time and has some knowledge about al-Qaeda and its operations there. He will later become well known after he is transferred to Guantanamo and engages in a series of legal battles to gain his freedom (see November 8, 2004 and June 30, 2006). [USA Today, 7/24/2008; Reuters, 7/24/2008] At some point, he is handed over to the FBI. However, agents for the bureau do not read him his Miranda rights. “Our policy at the time was not to read Miranda rights,” FBI special agent Robert Fuller will say in testimony at a US military commission hearing for Hamdan. Reuters will later write, “Similar warnings must be given to suspects in US military custody, and suspects overseas who may face US charges commonly receive warnings.” FBI special agent Stewart Kelley will say, “If they are a suspect, and they are detained, a Miranda is usually given.” [Reuters, 7/24/2008]

Entity Tags: Federal Bureau of Investigation, Salim Ahmed Hamdan, Stewart Kelley, Robert Fuller

Timeline Tags: Torture of US Captives

Salim Hamdan, a detainee with some knowledge about al-Qaeda who was captured in late November, takes FBI agents on two tours of facilities associated with al-Qaeda in Afghanistan. Hamdan and the agents twice drive around Kandahar in the months after his capture and he points out compounds owned by Osama bin Laden, including Tarnak Farms, and guest houses where al-Qaeda members could safely stay, which the agents take pictures of. Robert Fuller, one of the agents who accompanies Hamdan, will later say: “The first compound, when we arrived to it, it was destroyed. No roof was left.” The second compound is intact, and “in great shape,” according to Fuller. Hamdan also tells the FBI of his time at a training camp, but says he only stayed for a month and then returned to a guest house to be with his family. In addition, he identifies several high-ranking al-Qaeda officials and describes visits by bin Laden and other al-Qaeda figures to the camp. They gave speeches and “offered words of encouragement,” according to FBI agent Craig Donnachie. [USA Today, 7/24/2008; Reuters, 7/24/2008] Despite this co-operation, Hamdan will be transferred to Guantanamo, held there for years, and prosecuted in a military commission (see June 30, 2006).

Entity Tags: Robert Fuller, Craig Donnachie, Salim Ahmed Hamdan, Federal Bureau of Investigation

Timeline Tags: Torture of US Captives

Page 2 of 7 (696 events)
previous | 1, 2, 3, 4, 5, 6, 7 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike