!! History Commons Alert, Exciting News

Context of 'August 24, 2004: National Archives Official: Government Putting Nation at Risk by Classifying Too Much Information'

This is a scalable context timeline. It contains events related to the event August 24, 2004: National Archives Official: Government Putting Nation at Risk by Classifying Too Much Information. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 5 (449 events)
previous | 1, 2, 3, 4, 5 | next

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

President Ronald Reagan issues Executive Order 12333, which directs the US intelligence community to provide foreign intelligence data to the White House. The order reads in part, “[A]gencies are not authorized to use such techniques as electronic surveillance, unconsented physical searches, mail surveillance, physical surveillance, or monitoring devices unless they are in accordance with procedures established by the head of the agency concerned and approved by the Attorney General.” It establishes rules of conduct for the intelligence agencies, and mandates a certain level of Congressional oversight. [Executive Order 12333 -- United States intelligence activities, 4/5/2007] It also establishes the basis for what are later called “National Security Letters.” These NSLs, originally envisioned for use to compile information in hunts for foreign criminals and suspected terrorists, will later be used by the administration of George W. Bush to order US booksellers, librarians, employers, Internet providers, and others to turn over records and information they compile on US citizens, with strict adjuncts against allowing those targeted for surveillance to know about the NSLs and with virtually no government oversight (see October 25, 2005). [Washington Post, 11/6/2005] It does not, as some have later asserted, directly prohibit the assassination of targeted foreign subjects—i.e. terrorist suspects and even foreign leaders—though it does restrict the use of assassination by US government operatives to certain very restricted circumstances centered around critical aspects of national security. [Parks, 11/2/1989 pdf file]

Entity Tags: Ronald Reagan, George W. Bush, National Security Letters, Bush administration (43)

Timeline Tags: Civil Liberties

Hamilton and Cheney hold a press conference together about the Iran-Contra Affair investigation on June 19, 1987.Hamilton and Cheney hold a press conference together about the Iran-Contra Affair investigation on June 19, 1987. [Source: J. Scott Applewhite]Future 9/11 Commission vice chairman Lee Hamilton (D-IN), at this time chairman of the House Intelligence Committee, fails to properly investigate Iran-Contra allegations. He learns of press reports indicating that the Reagan administration is illegally funneling weapons and money to the anti-Communist rebels in Nicaragua, but when the White House denies the story, Hamilton believes it. Hamilton will later acknowledge that he has been gullible, and will say of his political style, “I don’t go for the jugular.” It is during the Iran-Contra investigation that Hamilton becomes friends with Dick Cheney, at this time a Republican congressman. [Shenon, 2008, pp. 33] Cheney is the ranking Republican on the House Intelligence Committee and so must work closely with Hamilton, including on the Iran-Contra investigation. [PBS, 6/20/2006] Hamilton calls Cheney “Dick” and they will remain friends even after Cheney becomes vice president in 2001 and Hamilton, as vice chairman of the 9/11 Commission, begins to investigate Cheney’s actions as a part of the Commission’s work. [Shenon, 2008, pp. 33] Hamilton will also fail to properly investigate “October Surprise” allegations (see 1992-January 1993).

Entity Tags: Lee Hamilton

Timeline Tags: US confrontation with Iran, Complete 911 Timeline, 9/11 Timeline, Iran-Contra Affair

Unaware of the White House machinations with Iran and the Nicaraguan Contras (see 1984, May 1984, October 10, 1984, November 19, 1985, December 6, 1985, Mid-1980s, April 4, 1986, May 29, 1986, and June 11, 1986), Congress approves a $100 million appropriation for military and non-arms aid to the Contras. [New York Times, 11/19/1987]

Entity Tags: Reagan administration, Contras

Timeline Tags: Iran-Contra Affair

Ronald Reagan speaks to the nation.Ronald Reagan speaks to the nation. [Source: Bettmann / Corbis]President Reagan addresses the nation on the Iran-Contra issue (see October 5, 1986 and November 3, 1986). “I know you’ve been reading, seeing, and hearing a lot of stories the past several days attributed to Danish sailors (see Early November, 1986), unnamed observers at Italian ports and Spanish harbors, and especially unnamed government officials of my administration,” he says. “Well, now you’re going to hear the facts from a White House source, and you know my name.” But despite his direct introduction, Reagan presents the same half-truths, denials, and outright lies that his officials have been providing to Congress and the press (see Mid-October, 1986 and November 10, 1986 and After).
'Honorable' Involvement - He admits to an 18-month “secret diplomatic initiative” with Iran, for several “honorable” reasons: to renew relations with that nation, to bring an end to the Iran-Iraq war, to eliminate Iran’s sponsorship of terrorism, and to effect the release of the US hostages being imprisoned by Hezbollah. He calls the press reports “rumors,” and says, “[L]et’s get to the facts.”
Falsehoods Presented as Facts - The US has not swapped weapons to Iran for hostages, Reagan asserts. However, evidence suggests otherwise (see January 28, 1981, 1983, 1985, May 1985, June 11, 1985, July 3, 1985, July 8, 1985, August 6, 1985, September 15, 1985, December 6, 1985, December 12, 1985, Mid-1980s, January 7, 1986, January 17, 1986, Late May, 1986, September 19, 1986, and Early October-November, 1986). Reagan also claims the US has not “trafficked with terrorists,” although Iran is listed as a sponsor of terrorism by the State Department. It “has not swapped boatloads or planeloads of American weapons for the return of American hostages. And we will not.” Reports of Danish and Spanish vessels carrying secret arms shipments, of Italian ports employed to facilitate arms transfers, and of the US sending spare parts and weapons for Iranian combat aircraft, all are “quite exciting, but… not one of them is true.” Reagan does admit to his authorization of “the transfer of small amounts of defensive weapons and spare parts for defensive systems to Iran,” merely as a gesture of goodwill. “These modest deliveries, taken together, could easily fit into a single cargo plane,” he says. (In reality, the US has already sent over 1,000 missiles to Iran over the course of a number of shipments.) He says the US made it clear to Iran that for any dialogue to continue, it must immediately cease its support of Hezbollah and other terrorist groups, and to facilitate the release of US hostages held by that group in Lebanon. Evidence exists, Reagan says, of the Iranians ramping down their support of terrorism. And some hostages have already been freed, a true statement, though he fails to mention that others have been taken.
Admission of May Meeting - Reagan admits that former National Security Adviser Robert McFarlane met with Iranian officials (see Late May, 1986). According to Reagan, McFarlane went to Iraq “to open a dialog, making stark and clear our basic objectives and disagreements.” He presents no further information about the meeting, except that the talks were “civil” and “American personnel were not mistreated.”
Exposure Risks Undermining Efforts to Facilitate Peace - The public disclosure of these “honorable” negotiations has put the entire US efforts to broker peace between Iran and Iraq in jeopardy, he says. In negotiations such as these, there is “a basic requirement for discretion and for a sensitivity to the situation in the nation we were attempting to engage.”
Reagan Says Congress Not Lied to - Reagan says that there is no truth to the stories that his officials ever lied to members of Congress about the Iranian negotiations (see Mid-October, 1986). The members of Congress who needed to know about the negotiations were informed, as were the “appropriate Cabinet officers” and others “with a strict need to know.” Since the story has now broken, “the relevant committees of Congress are being, and will be, fully informed.” [Ronald Reagan Presidential Library, 11/13/1986; Dubose and Bernstein, 2006, pp. 65-66]

Entity Tags: US Congress, Robert C. McFarlane, Hezbollah, Contras, Ronald Reagan, US Department of State

Timeline Tags: Iran-Contra Affair

Ali Mohamed’s US passport, issued in 1989.Ali Mohamed’s US passport, issued in 1989. [Source: US Justice Department] (click image to enlarge)Ali Mohamed is honorably discharged from the US Army with commendations in his file, including one for “patriotism, valor, fidelity, and professional excellence.” He remains in the Army Reserves for the next five years. [New York Times, 12/1/1998; Raleigh News and Observer, 10/21/2001] A US citizen by this time, he will spend much of his time after his discharge in Santa Clara, California, where his wife still resides. He will try but fail to get a job as an FBI interpreter, will work as a security guard, and will run a computer consulting firm out of his home. [San Francisco Chronicle, 9/21/2001]

Entity Tags: US Department of the Army, Ali Mohamed

Timeline Tags: Complete 911 Timeline

As tensions escalate between the US and Iraq, Iraqi officials circulate a note to all the embassies in Baghdad, directing them to register all of the civilians in their care with the authorities. Failure to comply can result in execution, the note implies. Such registration can only be done in person at Iraqi governmental offices; Deputy Chief of Mission Joseph Wilson, the ranking US diplomat in Baghdad, knows that bringing American citizens in for registration may well result in those Americans being taken hostage. He is housing some 60 Americans at the ambassador’s residence for their protection. He will later write: “It was clearly a way for the Iraqis to replenish their stock of hostages. The choice, theoretically, was either to turn over Americans or to defy the note and risk execution.” Instead of making the choice, Wilson uses the order to publicly defy the Iraqis. He schedules a press conference and has a Marine make him a hangman’s noose. Wearing the noose, he tells reporters that if Saddam Hussein “wants to execute me for keeping Americans from being taken hostage, I will bring my own f_cking rope.” The press conference, like all of the embassy press conferences, is off the record, but journalists release the story anyway. A garbled, erroneous version from a French news outlet has the Iraqis planning to hang Wilson by sundown. Iraqi Foreign Minister Tariq Aziz, angered and embarrassed by the press coverage, attempts to dress down Wilson that evening, but Wilson refuses to back down. Instead, the Iraqis withdraw the request. Soon after, President Bush sends Wilson a cable lauding his courage and his outspokeness (see November 29, 1990). [Wilson, 2004, pp. 153-154; Unger, 2007, pp. 311] Conservative columnist Robert Novak co-writes a piece about Wilson that says, “He shows the stuff of heroism.” Novak will later reveal the covert CIA status of Wilson’s wife, Valerie Plame Wilson, as an act of political retaliation (see July 14, 2003). [Wilson, 2004, pp. 153-154]

Entity Tags: Tariq Aziz, Joseph C. Wilson, Robert Novak, Saddam Hussein, George Herbert Walker Bush

Timeline Tags: Events Leading to Iraq Invasion, US-Iraq 1980s

In 1992, a House of Representatives task force chaired by Lee Hamilton (D-NH) conducts a ten-month investigation into the “October Surprise”—an alleged Republican plot to delay the release of US hostages held in Iran in 1980 until after that year’s US presidential election. The investigation concludes in 1993 that there is “no credible evidence” of any such plot. But Robert Parry, a journalist writing for the Associated Press and Newsweek, gains access to the stored records of Hamilton’s task force. He finds clear evidence of a major cover up. For instance, William Casey, CIA Director in the early 1980s, was alleged to have been involved in the plot, and Hamilton’s investigators discovered a CIA created index of Casey’s papers made after Casey’s death in 1987. When investigators searched Casey’s possessions, they found all the papers mentioned in the index, except for all the ones relevant to the alleged October Surprise plot. But the disappearance of such evidence was not mentioned in Hamilton’s findings. [Scott, 2007, pp. 101] In addition, an official Russian intelligence report placing Casey in Europe in order to arrange a politically favorable outcome to the hostage crisis arrived in Washington shortly before Hamilton’s task force issued their conclusions, but this Russian information was not mentioned by the task force. [Scott, 2007, pp. 106-107] Hamilton will later be appointed co-chair of the 9/11 Commission (see December 11, 2002).

Entity Tags: Lee Hamilton, William Casey, Robert Parry

Timeline Tags: Complete 911 Timeline

The New York Times headline on March 8, 1992.The New York Times headline on March 8, 1992. [Source: Public domain]The Defense Planning Guidance, “a blueprint for the department’s spending priorities in the aftermath of the first Gulf War and the collapse of the Soviet Union,” is leaked to the New York Times. [New York Times, 3/8/1992; Newsday, 3/16/2003] The document will cause controversy, because it hasn’t yet been “scrubbed” to replace candid language with euphemisms. [New York Times, 3/10/1992; New York Times, 3/11/1992; Observer, 4/7/2002] The document argues that the US dominates the world as sole superpower, and to maintain that role, it “must maintain the mechanisms for deterring potential competitors from even aspiring to a larger regional or global role.” [New York Times, 3/8/1992; New York Times, 3/8/1992] As the Observer summarizes it: “America’s friends are potential enemies. They must be in a state of dependence and seek solutions to their problems in Washington.” [Observer, 4/7/2002] The document is mainly written by Paul Wolfowitz and I. Lewis “Scooter” Libby, who hold relatively low posts at this time, but become deputy defense secretary and Vice President Dick Cheney’s chief of staff, respectively, under President George W. Bush. [Newsday, 3/16/2003] The authors conspicuously avoid mention of collective security arrangements through the United Nations, instead suggesting the US “should expect future coalitions to be ad hoc assemblies, often not lasting beyond the crisis being confronted.” [New York Times, 3/8/1992] They call for “punishing” or “threatening punishment” against regional aggressors before they act. [Harper's, 10/2002] Interests to be defended preemptively include “access to vital raw materials, primarily Persian Gulf oil, proliferation of weapons of mass destruction and ballistic missiles, [and] threats to US citizens from terrorism.” The section describing US interests in the Middle East states that the “overall objective is to remain the predominant outside power in the region and preserve US and Western access to the region’s oil… deter further aggression in the region, foster regional stability, protect US nationals and property, and safeguard… access to international air and seaways.” [New York Times, 3/8/1992] Senator Lincoln Chafee (R-RI) will later say, “It is my opinion that [George W. Bush’s] plan for preemptive strikes was formed back at the end of the first Bush administration with that 1992 report.” [Newsday, 3/16/2003] In response to the controversy, the US will release an updated version of the document in May 1992, which stresses that the US will work with the United Nations and its allies. [Washington Post, 5/24/1992; Harper's, 10/2002]

Entity Tags: Lewis (“Scooter”) Libby, Lincoln Chafee, United States, Soviet Union, Paul Wolfowitz

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion, US International Relations, Neoconservative Influence

In late 1993, bin Laden asks Ali Mohamed to scout out possible US, British, French, and Israeli targets in Nairobi, Kenya. Mohamed will later confess that in December 1993, “I took pictures, drew diagrams and wrote a report.” Then he travels to Sudan, where bin Laden and his top advisers review Mohamed’s work. In 1994, Mohamed claims that “bin Laden look[s] at a picture of the American Embassy and point[s] to where a truck could go as a suicide bomber.” A truck will follow bin Laden’s directions and crash into the embassy in 1998. Mohamed seems to spend considerable time in Nairobi working with the cell he set up there and conducting more surveillance. He also is sent to the East African nation of Djibouti to scout targets there, and is asked to scout targets in the West African nation of Senegal. [Los Angeles Times, 10/21/2000; Chicago Tribune, 12/11/2001; LA Weekly, 5/24/2002; 9/11 Commission, 6/16/2004] Much of his work seems to be done together with Anas al-Liby, a top al-Qaeda leader with a mysterious link to Western intelligence agencies similar to Mohamed’s. In 1996, British intelligence will pay al-Liby to assassinate Libyan leader Colonel Mu’ammar al-Qadhafi (see 1996), and then will let him live openly in Britain until 2000 (see Late 1995-May 2000). Al-Liby is said to be a “computer wizard” known for “working closely” with Mohamed. [New York Times, 2/13/2001; New York Times, 4/5/2001] L’Houssaine Kherchtou, an al-Qaeda member who later turns witness for a US trial (see September 2000), was trained in surveillance techniques in Pakistan by Mohamed in 1992. Kherchtou will claim he later comes across Mohamed in 1994 in Nairobi. Mohamed, Anas al-Liby, and a relative of al-Liby’s use Kherchtou’s apartment for surveillance work. Kherchtou sees al-Liby with a camera about 500 meters from the US embassy. [Washington File, 2/22/2001] Mohamed returns to the US near the end of 1994 after an FBI agent phones him in Nairobi and asks to speak to him about an upcoming trial. [Washington File, 2/22/2001]

Entity Tags: Ali Mohamed, L’Houssaine Kherchtou, Anas al-Liby, Federal Bureau of Investigation, Osama bin Laden

Timeline Tags: Complete 911 Timeline

’Germany Unified and Europe Transformed: A Study in Statecraft,’ by Philip Zelikow and Condoleezza Rice.’Germany Unified and Europe Transformed: A Study in Statecraft,’ by Philip Zelikow and Condoleezza Rice. [Source: Harvard University Press]Future National Security Adviser and Secretary of State Condoleezza Rice and Philip Zelikow, who, as executive director of the 9/11 Commission, will investigate her performance in the run-up to 9/11, co-author a book about the implications of German reunification. The two had worked together on the National Security Council in the 1980s and early 90s, but are both now working at universities. Zelikow is a professor at the Kennedy School of Government at Harvard University, and Rice is the provost at Stanford. The book, entitled Germany Unified and Europe Transformed: A Study in Statecraft, is mostly written by Zelikow, who is, in author Philip Shenon’s words, “pleased to share credit with such an obvious up-and-comer as Rice.” [Shenon, 2008, pp. 40-41]

Entity Tags: Condoleezza Rice, Philip Shenon, Philip Zelikow

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Oil company Unocal signs an $8 billion deal with Turkmenistan to construct two pipelines (one for oil, one for gas), as part of a larger plan for two pipelines intended to transport oil and gas from Turkmenistan through Afghanistan and into Pakistan. Before proceeding further, however, Unocal needs to execute agreements with Pakistan and Afghanistan; Pakistan and Ahmed Shah Massoud’s government in Afghanistan, however, have already signed a pipeline deal with an Argentinean company. Henry Kissinger, hired as speaker for a special dinner in New York to announce the Turkmenistan pipeline deal, says the Unocal plan represents a “triumph of hope over experience.” Unocal will later open an office in Kabul, weeks after the Taliban capture of the capital in late 1996 and will interact with the Taliban, seeking support for its pipeline until at least December 1997. [Coll, 2004, pp. 301-13, 329, 338, 364-66]

Entity Tags: Ahmed Shah Massoud, Unocal, Taliban, Turkmenistan, Pakistan, Afghanistan, Henry A. Kissinger

Timeline Tags: Complete 911 Timeline

Prior to this year, US intelligence has been uncertain whether Khalid Shaikh Mohammed (KSM) is connected to al-Qaeda. But this changes when a foreign government shares information that bin Laden and KSM had traveled together to a foreign country the previous year. [US Congress, 7/24/2003] The country may have been Brazil, since it has been reported that KSM and bin Laden traveled to Brazil together in 1995 (see December 1995).

Entity Tags: US intelligence, Osama bin Laden, Khalid Shaikh Mohammed, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Law professor John Yoo writes a lengthy essay for the California Law Review entitled “The Continuation of Politics by Other Means: The Original Understanding of War Powers,” in which he argues that the Founding Fathers intended to empower presidents to launch wars without Congressional permission. Yoo has clerked for conservative judge Laurence Silberman and equally conservative Supreme Court Justice Clarence Thomas, and served for a year as counsel to then-Senate Judiciary Committee Chairman Orrin Hatch (R-UT). He has become a regular speaker at Federalist Society events, the informal but influential group of conservative lawyers, judges, and legal scholars who will come to have so much influence in the Bush administration. You argues that for generations, Constitutional scholars have misread the Constitution: the Founders actually supported, not repudiated, the British model of executive power that gave the king the sole power of declaring war and committing forces to battle. The Constitution’s granting of the legislature—Congress—the power to “declare war” is merely, Yoo writes, a reference to the ceremonial role of deciding whether to proclaim the existence of a conflict as a diplomatic detail. The Founders always intended the executive branch to actually declare and commence war, he writes. Most other Constitutional scholars will dismiss Yoo’s arguments, citing notes from the Constitutional Convention that show the Founders clearly intended Congress, not the president, to decide whether to commit the country to war. One of those Founders, James Madison, wrote in 1795 that giving a president the unilateral ability to declare war “would have struck, not only at the fabric of the Constitution, but at the foundation of all well organized and well checked governments. The separation of the power of declaring war from that of conducting it, is wisely contrived to exclude the danger of its being declared for the sake of its being conducted.” [Savage, 2007, pp. 80-81] Yoo will go on to join the Bush administration’s Office of Legal Counsel, and write numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002).

Entity Tags: Federalist Society, John C. Yoo

Timeline Tags: Civil Liberties

A lieutenant general meets with Qwest CEO Joe Nacchio and Dean Wandry, who heads Qwest’s government business unit. According to documents filed in 2006 by Nacchio concerning his trial on insider trading charges (see October 12, 2007), the general “told Mr. Wandry that he ran the largest telecom operation in the world, he had looked at Qwest’s network, and he wanted to use it for government purposes.” The general in question could be NSA Director Kenneth Minihan, who will be replaced in 1999 by another lieutenant general, Michael Hayden, but neither Minihan nor Hayden will comment on the allegation. Many former intelligence officials will say that it is likely Minihan who met with Nacchio and Wandry. Nacchio’s court documents indicate that he and Wandry agree to work with the general. Nacchio is not allowed to announce the contract publicly, but according to the court documents, he “understood at the time this was the beginning of a relationship which had enormous potential for future work. This proves increasingly true as time went on.” By 1999 Qwest is working extensively with the NSA. Minihan is particularly concerned about the potential of “cyberwarfare” by foreign governments, terrorist organizations, drug cartels, and organized crime, a prospect which he felt the NSA is unprepared. He particularly worries about Russia and China; in June 1998, he will testify are training personnel in potential cyber-attacks. “These opportunists, enabled by the explosion of technology and the availability of inexpensive, secure means of communication, pose a significant threat to the interests of the United States and its allies,” Minihan will state. In 2007, a former senior NSA official will say that the agency felt those groups knew US privacy laws all too well and were capable of using those laws against the NSA and other intelligence agencies. He will say, “There was such a nuanced understanding of how to tie us in knots and use American law against us, that there were certainly pockets of people saying, ‘We’ve got to be assertive; we’ve got to be more aggressive on this.’” Hayden, Minihan’s successor, will be particularly willing to push agency operations to the edge of legality. After 9/11, Hayden will say, “We’re pretty aggressive within the law. As a professional, I’m troubled if I’m not using the full authority allowed by law.” [National Journal, 11/2/2007] The NSA will approach Qwest will a similar offer in the months before 9/11 (see February 2001).

Entity Tags: Michael Hayden, Dean Wandry, Kenneth Minihan, National Security Agency, Joe Nacchio, Qwest

Timeline Tags: Civil Liberties

Former US ambassador Joe Wilson and CIA officer Valerie Plame meet for the first time at a reception held at the Turkish ambassador’s residence. Wilson is a political adviser to the Commander in Chief of the US Armed Forces in Europe. Plame describes herself as an “energy executive living in Brussels.” Wilson and Plame will marry a year later and will become involved in the “Plame Affair,” when Plame’s affiliation with the CIA is disclosed in the media (see July 14, 2003). After her marriage, Plame will generally be referred to by the name Plame Wilson. Wilson, who is accompanied by General James Jamerson, is there to receive an award from the American-Turkish Council. The reason for Plame’s presence there is not known. [Wilson, 2004, pp. 239-242, 273] However, the American-Turkish Council will later be said to be involved in the smuggling of nuclear weapons material to Turkey and other countries (see Late 1990s-Early 2001 and Mid-Late 1990s), and Plame’s job at the CIA is in its non-proliferation section (see Late February 1999), so she may be there for operational reasons. [Sunday Times (London), 1/6/2008; Sunday Times (London), 1/27/2008]

Entity Tags: James Jamerson, American-Turkish Council, Valerie Plame Wilson, Joseph C. Wilson

Timeline Tags: A. Q. Khan's Nuclear Network, Niger Uranium and Plame Outing

A son of Sheikh Omar Abdul-Rahman, the al-Qaeda leader convicted in 1995 of conspiring to blow up tunnels and other New York City landmarks, is heard to say that the best way to free his father from a US prison might be to hijack an American plane and exchange the hostages. This will be mentioned in President Bush’s August 2001 briefing titled “Bin Laden Determined to Strike in US” (see August 6, 2001). [Washington Post, 5/18/2002] It may be the warning was discovered by reporters at bin Laden’s press conference this month, since two of Abdul-Rahman’s sons are there and speak in belligerent tones (see May 26, 1998 and May 1998). A similar warning will be discovered in May 2001, but will not be mentioned in Bush’s briefing (see May 23, 2001).

Entity Tags: George W. Bush, Ahmad Abdul-Rahman, Al-Qaeda, Omar Abdul-Rahman, Mohammed Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

President Clinton creates the new post of National Coordinator for Security, Infrastructure, Protection, and Counterterrorism. He names Richard Clarke for the job, and due to the length of the title, Clarke soon becomes known as the counterterrorism “tsar.” [New York Times, 5/23/1998; Washington Post, 4/2/2000] This position is outlined in a new presidential directive on counterterrorism, Presidential Decision Directive 62 (PDD-62), which also outlines goals of fighting terrorism and attempts to strengthen interagency coordination of counterterrorism efforts. [9/11 Commission, 3/24/2004] Clarke, who had been working on terrorism issues since the start of the Clinton administration, has more symbolic than actual power in the new position. For instance, he only has a staff of 12, compared to a staff of hundreds for the drug “tsar,” and by law he is not allowed to order law enforcement agents, soldiers, or spies to do anything. He does not have any control over budgets. But he is allowed to sit on Cabinet level meetings that involve terrorism. [Clarke, 2004, pp. 170; 9/11 Commission, 7/24/2004, pp. 101] Clarke has a long record of prior government service, beginning in 1973 as a nuclear weapons analyst in the Office of the Secretary of Defense. [CBS News, 3/30/2004] He came to prominence in the Reagan administration as the deputy assistant secretary of state for intelligence from 1985 to 1989. Having left the State Department in 1992, he has spent the past six years on the National Security Council staff. [Washington Post, 3/13/2003; BBC, 3/22/2004; Associated Press, 3/27/2004] After 9/11 Clarke will become well known for his criticisms of the George W. Bush administration (see March 21, 2004 and March 24, 2004), but some who know him consider him to be politically conservative. [Boston Globe, 3/29/2004] According to the Washington Post, many within the Clinton administration view Clarke as a hawk. [Washington Post, 3/23/2004] Robert Gelbard, who worked with him at the State Department in the early 1990s, says he is “no liberal. He is very hawkish.” [US News and World Report, 4/5/2004] Vince Cannistraro, a former CIA official who worked with Clarke in the 1980s, says, “You can’t accuse him of being passive or too liberal on foreign policy.” [Washington Post, 3/23/2004] At the time of the 2000 election he will be a registered Republican, and he votes that year for John McCain in the Republican presidential primary. [New York Times, 3/23/2004; Salon, 3/24/2004; Time, 4/5/2004] Larry DiCara, the former president of the Boston City Council who knew Clarke when he was younger, later recalls: “He was fiercely conservative at a time when just about everyone in Boston was a Democrat.… I’m amazed he worked for [President] Clinton.” Clarke, however, will later praise Clinton, and in an interview in 2002 will describe himself as “not a partisan figure.” [Boston Globe, 3/29/2004]

Entity Tags: Vincent Cannistraro, Larry DiCara, Robert Gelbard, Richard A. Clarke, William Jefferson (“Bill”) Clinton

Timeline Tags: Complete 911 Timeline

Top: Bin Laden, surrounded by security, walking to the press conference. Bottom: the three journalists attending the press conference sit next to bin Laden.Top: Bin Laden, surrounded by security, walking to the press conference. Bottom: the three journalists attending the press conference sit next to bin Laden. [Source: CNN]Bin Laden discusses “bringing the war home to America,” in a press conference from Khost, Afghanistan. [US Congress, 9/18/2002] Bin Laden holds his first and only press conference to help publicize the fatwa he published several months before. Referring to the group that signed the fatwa, he says, “By God’s grace, we have formed with many other Islamic groups and organizations in the Islamic world a front called the International Islamic Front to do jihad against the crusaders and Jews.” He adds later, “And by God’s grace, the men… are going to have a successful result in killing Americans and getting rid of them.” [CNN, 8/20/2002] He also indicates the results of his jihad will be “visible” within weeks. [US Congress, 7/24/2003] Two US embassies will be bombed in August (see 10:35-10:39 a.m., August 7, 1998). Bin Laden sits next to Ayman al-Zawahiri and Mohammed Atef during the press conference. Two Pakistani journalists and one Chinese journalist attends. But event never gets wide exposure because no independent videotaping is allowed (however, in 2002 CNN will obtain video footage of the press conference seized after the US conquered Afghanistan in late 2001). Pakistani journalist Ismail Khan attends and will later recall, “We were given a few instructions, you know, on how to photograph and only take a picture of Osama and the two leaders who were going to sit close by him. Nobody else.” Two sons of Sheikh Omar Abdul-Rahman attend and distribute what they claim is the will or fatwa of their father (see May 1998), who has been sentenced to life in prison in the US. Journalist Peter Bergen will later comment that the significance of the sons’ presence at the press conference “can’t be underestimated” because it allows bin Laden to benefit from Abdul-Rahman’s high reputation amongst radical militants. Bergen also later says the press conference is a pivotal moment for al-Qaeda. “They’re going public. They’re saying, ‘We’re having this war against the United States.’” [CNN, 8/20/2002] The specific comment by bin Laden about “bringing the war home to America” will be mentioned in the August 2001 memo given to President Bush entitled “Bin Laden Determined to Strike in US” (see August 6, 2001).

Entity Tags: Osama bin Laden, Ismail Khan, Ayman al-Zawahiri, Ahmad Abdul-Rahman, Mohammed Atef, Mohammed Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right).Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right). [Source: Associated Press]Two US embassies in Africa are bombed within minutes of each other. At 10:35 a.m., local time, a suicide car bomb attack in Nairobi, Kenya, kills 213 people, including 12 US nationals, and injures more than 4,500. Mohamed al-Owhali and someone known only as Azzam are the suicide bombers, but al-Owhali runs away at the last minute and survives. Four minutes later, a suicide car bomb attack in Dar es Salaam, Tanzania, kills 11 and injures 85. Hamden Khalif Allah Awad is the suicide bomber there. The attacks will be blamed on al-Qaeda. [PBS Frontline, 2001; United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001] The Tanzania death toll is low because, remarkably, the attack takes place on a national holiday so the US embassy there is closed. [Miller, Stone, and Mitchell, 2002, pp. 195] The attack shows al-Qaeda has a capability for simultaneous attacks. The Tanzania bombing appears to have been a late addition, as one of the arrested bombers will allegedly tell US agents that it was added to the plot only about 10 days in advance. [United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001] A third attack against the US embassy in Uganda does not take place due to a last-minute delay (see August 7, 1998). [Associated Press, 9/25/1998] August 7, 1998, is the eighth anniversary of the arrival of US troops in Saudi Arabia and some people will speculate that this is the reason for the date of the bombings. [Gunaratna, 2003, pp. 46] In the 2002 book The Cell, reporters John Miller, Michael Stone, and Chris Mitchell will write: “What has become clear with time is that facets of the East Africa plot had been known beforehand to the FBI, the CIA, the State Department, and to Israeli and Kenyan intelligence services.… [N]o one can seriously argue that the horrors of August 7, 1998, couldn’t have been prevented.” They will also comment, “Inexplicable as the intelligence failure was, more baffling still was that al-Qaeda correctly presumed that a major attack could be carried out by a cell that US agents had already uncovered.” [Miller, Stone, and Mitchell, 2002, pp. 195, 206] After 9/11, it will come to light that three of the alleged hijackers, Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi, had some involvement in the bombings (see October 4, 2001, Late 1999, and 1993-1999) and that the US intelligence community was aware of this involvement by late 1999 (see December 15-31, 1999), if not before.

Entity Tags: Salem Alhazmi, Nawaf Alhazmi, Mohamed al-Owhali, Hamden Khalif Allah Awad, Khalid Almihdhar, Al-Qaeda, Azzam

Timeline Tags: Complete 911 Timeline

Patrick FitzgeraldPatrick Fitzgerald [Source: Publicity photo]Ali Mohamed is finally arrested after testifying at a grand jury hearing. The arrest is officially kept secret, but the media will report it one month later. [New York Times, 10/30/1998] Patrick Fitzgerald is on the prosecutor team that subpoenaed Mohamed to appear, but apparently he and the other prosecutors know very little about Mohamed. Fitzgerald blames this on a legal “wall” between intelligence gathering and criminal prosecution. He later will relate what happened on the day Mohamed testified: “Ali Mohamed lied in that grand jury proceeding and left the courthouse to go to his hotel, followed by FBI agents, but not under arrest. He had imminent plans to fly to Egypt. It was believed [by the prosecutors] at the time that Mohamed lied and that he was involved with the al-Qaeda network but Mohamed had not by then been tied to the [embassy] bombings. The decision had to be made at that moment whether to charge Mohamed with false statements. If not, Mohamed would leave the country. That difficult decision had to be made without knowing or reviewing the intelligence information on the other side of the ‘wall.’ It was ultimately decided to arrest Mohamed that night in his hotel room [and he was arrested]. [The prosecution] team got lucky but we never should have had to rely on luck. The prosecution team later obtained access to the intelligence information, including documents obtained from an earlier search of Mohamed’s home by the intelligence team on the other side of ‘the wall.’ Those documents included direct written communications with al-Qaeda members and a library of al-Qaeda training materials that would have made the decision far less difficult. (We could only obtain that access after the arrest with the specific permission of the Attorney General of the United States, based upon the fact that we had obligations to provide the defendant with discovery materials and because the intelligence investigation of Mohamed had effectively ended.)… Mohamed [later] stated that had he not been arrested on that day in September 1998, he had intended to travel to Afghanistan to rejoin Osama bin Laden. Thus, while the right decision to arrest was made partly in the dark, the ‘wall’ could easily have caused a different decision that September evening that would have allowed a key player in the al-Qaeda network to escape justice for the embassy bombing in Kenya and rejoin Osama bin Laden in a cave in Afghanistan, instead of going to federal prison.” [US Congress, 10/21/2003] Mohamed’s associate Khaled Abu el-Dahab, now living in Egypt, wil hear of Mohamed’s arrest and attempt to leave the country, but will be arrested in October 1998. He will be put on trial there and sentenced to 15 years in prison (see 1999). [San Francisco Chronicle, 11/21/2001]

Entity Tags: Ali Mohamed, Federal Bureau of Investigation, Khaled Abu el-Dahab, Patrick J. Fitzgerald

Timeline Tags: Complete 911 Timeline

Wadih El Hage.Wadih El Hage. [Source: FBI]On September 15, 1998, Wadih El-Hage is arrested in the US after appearing before a US grand jury. A US citizen, he had been bin Laden’s personal secretary. He will later be convicted for a role in the 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998). [New York Times, 9/18/1998]

Entity Tags: Wadih El-Hage

Timeline Tags: Complete 911 Timeline

US intelligence learns al-Qaeda is trying to establish a cell within the US. There are indications that the organization might be trying to recruit US citizens. This apparently will be mentioned in President Bush’s August 6, 2001 briefing, which states, “A clandestine source said in 1998 that a bin Laden cell in New York was recruiting Muslim-American youth for attacks” (see August 6, 2001). In the next month, there is information that a terror cell in the United Arab Emirates is attempting to recruit a group of five to seven young men from the US to travel to the Middle East for training. This is part of a plan to strike a US domestic target. [US Congress, 9/18/2002; US Congress, 7/24/2003]

Entity Tags: Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

According to a US intelligence assessment, “[bin Laden] is actively planning against US targets and already may have positioned operatives for at least one operation.… Multiple reports indicate [he] is keenly interested in striking the US on its own soil… Al-Qaeda is recruiting operatives for attacks in the US but has not yet identified potential targets.” Later in the month, a classified document prepared by the CIA and signed by President Clinton states: “The intelligence community has strong indications that bin Laden intends to conduct or sponsor attacks inside the US.” [US Congress, 9/18/2002; Washington Post, 9/19/2002; US Congress, 7/24/2003 pdf file; US Congress, 7/24/2003] This warning will be mentioned in the August 2001 memo given to President Bush entitled “Bin Laden Determined to Strike in US” (see August 6, 2001).

Entity Tags: Al-Qaeda, William Jefferson (“Bill”) Clinton, Central Intelligence Agency, Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mohammed Shawqui Islambouli.Mohammed Shawqui Islambouli. [Source: Public domain]On December 4, 1998, an item in President Clinton’s Presidential Daily Briefing (PDB) is titled, “Bin Laden Preparing to Hijack US Aircraft and Other Attacks.” The PDB says “Bin Laden and is allies are preparing for attacks in the US, including an aircraft hijacking to obtain the release of Sheikh Omar Abdul-Rahman, Ramzi Yousef, and Muhammad Sadiq ‘Awda. One source quoted a senior member of Al-Gama’a al-Islamiyya (IG) saying that, as of late October, the IG had completed planning for an operation in the US on behalf of bin Laden, but that the operation was on hold. A senior bin Laden operative from Saudi Arabia was to visit IG counterparts in the US soon thereafter to discuss options-perhaps including an aircraft hijacking.” The same source says bin Laden may implement plans to hijack US aircraft before the start of the Muslim holy month of Ramadan on December 20 and that two members of the operational team had evaded security checks in a recent trial run at a New York airport. A possible different source says that in late September, Mohammed Shawqui Islambouli, brother of the assassin of Egyptian President Anwar Sadat and described in the PDB as an IG leader, was planning to hijack a US airliner during the “next couple of weeks” to free Abdul-Rahman and other prisoners. The PDB also says that “some members of the bin Laden network have received hijack training, according to various sources, but no group directly tied to bin Laden’s al-Qaeda organization has ever carried out an aircraft hijacking. Bin Laden could be weighing other types of operations against US aircraft.” The PDB mentions other bin Laden related threats, including recent reports that the IG has obtained surface-to-air missiles and intends to move them from Yemen to Saudi Arabia to shoot down aircraft. [Washington Post, 7/18/2004; 9/11 Commission, 7/24/2004, pp. 128-130] The private intelligence group Stratfor will later say that, in addition to his ties with IG, Islambouli worked with bin Laden in the Maktab al-Khidamat charity front in Pakistan and is believed to have lived in Afghanistan in the 1990s as “part of the group of key Egyptian advisers surrounding bin Laden.” Islambouli will formally join with al-Qaeda in 2006. [Stratfor, 8/10/2006] In early 1998, the CIA ignored information from a recently retired CIA agent that claimed 9/11 mastermind Khalid Shaikh Mohammed was in a terrorist cell with Islambouli, both were experts on plane hijackings, and were planning to hijack planes (see Early 1998). Perhaps not coincidentally, on this same day, CIA Director George Tenet issues a “declaration of war” against al-Qaeda in a memo to the US intelligence community (see December 4, 1998). Also on this day, counterterrorism “tsar” Richard Clarke holds a meeting of his interagency Counterterrorism and Security Group (CSG) to discuss the threat. The group agrees that New York City airports should go on a maximum security alert that weekend and security should be boosted at other East Coast airports. The FBI, FAA, and New York City Police Department get versions of the PDB report. Later in December and again in January 1999 the source says the hijacking has been postponed because two operatives have been arrested in Washington or New York. But the FBI is unable to find any information to support the threat nor is it able to verify any arrests similar to what the source described, and the source remains mysterious. The high alert in New York airports is canceled by the end of January. [9/11 Commission, 7/24/2004, pp. 128-130] This PDB will be mentioned in President Bush’s famous August 6, 2001 PDB, but mentions that US officials “have not been able to corroborate” the plot (see August 6, 2001).

Entity Tags: Federal Bureau of Investigation, William Jefferson (“Bill”) Clinton, Federal Aviation Administration, Al-Gama’a al-Islamiyya, Richard A. Clarke, Counterterrorism and Security Group, Ramzi Yousef, Omar Abdul-Rahman, Mohammed Shawqui Islambouli, Muhammad Sadiq ‘Awda, Osama bin Laden, New York City Police Department, Maktab al-Khidamat

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In a Time magazine cover story entitled “The Hunt for Osama,” it is reported that intelligence sources “have evidence that bin Laden may be planning his boldest move yet—a strike on Washington or possibly New York City in an eye-for-an-eye retaliation. ‘We’ve hit his headquarters, now he hits ours,’ says a State Department aide.” [Time, 12/21/1998]

Entity Tags: Osama bin Laden

Timeline Tags: Complete 911 Timeline

Yellowcake.Yellowcake. [Source: CBC]Pakistani nuclear scientist A. Q. Khan takes a trip to West Africa. Ostensibly, he is going to oversee the construction of the Hendrina Khan Hotel in Timbuktu, Mali, which he bought the year before and is named after his wife, but it is believed that is just a cover for nuclear-related business. He spends several days in Khartoum, Sudan, where he is spotted touring the al-Shifa factory, bombed by the US the year before in response to al-Qaeda bombings in Africa (see August 20, 1998). In 2006, intelligence sources in India and Israel will claim that Khan actually partly owns the factory. Khan then travels to N’Djamena, the capital of Chad, Timbuktu in Mali, and Niamey, the capital of Niger. Niger has considerable uranium deposits and had been a major supplier of yellowcake uranium to Pakistan in the 1970s. Khan returns to Sudan, where he meets with the Sudanese president, and then returns to Pakistan. He is accompanied by his top nuclear aides and a number of Pakistani generals, and all expenses on the trip are paid for by the Pakistani government.
CIA Investigates Khan Trip - CIA undercover agent Valerie Plame Wilson learns about the trip, and the CIA is so concerned that it launches an investigation, especially to find out if Khan could be buying yellowcake from Niger. Plame Wilson’s husband Joseph Wilson, a former National Security Council official and US ambassador to the nearby country of Gabon who has close ties to important politicians in Niger, and who who has just set up a private consulting firm with a focus on advising clients who want to do business in Africa, is approached by officials from the CIA’s National Resources Division (NR) to visit Niger. The agency asks Wilson, who already has a business trip planned to West Africa, to find out what he can about Khan’s trip.
Illicit Uranium Sales Highly Unlikely - Wilson concludes that illicit uranium sales are very unlikely since the French government tightly controls Niger’s uranium mines and uranium sales. However, Khan’s trip does raise concern that he could be working with Osama bin Laden, because of his interest in the al-Shifa factory in Sudan, and because of intelligence that the hotel he owns in Timbuktu was paid for by bin Laden as part of a cooperative deal between them. The CIA writes and distributes a report on the trip. (In 2004, the Senate Intelligence Committee will erroneously conclude that the CIA did not distribute the Wilson-Niger report—see July 9, 2004.) Wilson will keep this trip secret, even refusing to mention it in his 2004 memoir The Politics of Truth, presumably because he signed a confidentiality agreement with the CIA. In 2002, he will return to Niger to investigate if Saddam Hussein could be buying uranium in Niger (see February 21, 2002-March 4, 2002). That will lead to the eventual outing of his wife Plame Wilson’s status as a CIA agent. [Levy and Scott-Clark, 2007, pp. 283-285, 516; Wilson, 2007, pp. 358-360]

Entity Tags: Valerie Plame Wilson, Abdul Qadeer Khan, Osama bin Laden, Joseph C. Wilson

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network, Niger Uranium and Plame Outing

Former President George H. W. Bush, a former director of the CIA, speaks at the dedication ceremony of the new intelligence center bearing his name. In the course of his speech, Bush says: “We need more human intelligence. That means we need more protection for the methods we use to gather intelligence and more protection for our sources, particularly our human sources, people that are risking their lives for their country.… I have nothing but contempt and anger for those who betray the trust by exposing the name of our sources. They are, in my view, the most insidious, of traitors.” [Central Intelligence Agency, 4/26/1999] These remarks will later be unearthed in conjunction with the White House’s leaking of the identity of covert CIA agent Valerie Plame Wilson (see June 23, 2003, July 7, 2003, 8:30 a.m. July 8, 2003, July 8, 2003, 11:00 a.m. July 11, 2003, Late Afternoon, July 12, 2003, and Before July 14, 2003), and the publication of her name and status by conservative columnist Robert Novak (see July 14, 2003).

Entity Tags: George Herbert Walker Bush, Bush administration (43), Robert Novak, Central Intelligence Agency, Valerie Plame Wilson

Timeline Tags: Niger Uranium and Plame Outing

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

Diana Dean.Diana Dean. [Source: Seattle Times]Al-Qaeda operative Ahmed Ressam is arrested in Port Angeles, Washington, attempting to enter the US with components of explosive devices. One hundred and thirty pounds of bomb-making chemicals and detonator components are found inside his rental car. He subsequently admits he planned to bomb Los Angeles International Airport on December 31, 1999. [New York Times, 12/30/2001] Alert border patrol agent Diana Dean stops him; she and other agents nationwide had been warned recently to look for suspicious activity. Ressam’s bombing would have been part of a wave of attacks against US targets over the New Year’s weekend (see December 15-31, 1999). He is later connected to al-Qaeda and convicted. [US Congress, 9/18/2002; PBS Frontline, 10/3/2002]

Entity Tags: Diana Dean, Ahmed Ressam, Los Angeles International Airport, Al-Qaeda

Timeline Tags: Complete 911 Timeline

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). [Truthout (.org), 1/17/2006] In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. [New York Times, 12/16/2007]

Entity Tags: Bush administration (43), National Security Agency

Timeline Tags: Civil Liberties

Future 9/11 Commission Executive Director Philip Zelikow is not offered a job in the Bush administration, and returns to the Miller Center of Public Affairs at the University of Virginia to teach. Zelikow had worked on the transition team (see January 3, 2001), and thought he would receive an important position in the new administration. He told his friends he thought he was in line for the position of deputy national security adviser to Condoleezza Rice, with whom he had written a book in the mid-1990s (see 1995). Most people in the Bush administration admire his ability, but find him hard to work with. White House Chief of Staff Andrew Card will even describe Zelikow as a “bully” historian. Author Philip Shenon will later comment that Zelikow is “perplexed that his talents had not been recognized by the people who handed out the best jobs in the Bush administration.” After returning to university, Zelikow will lobby the White House to make the university where he works the official repository of its oral history. His point of contact at the White House is political adviser Karl Rove. [Shenon, 2008, pp. 42-44]

Entity Tags: Andrew Card, Karl C. Rove, Philip Shenon, Philip Zelikow

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Condoleezza Rice and Philip Zelikow.Condoleezza Rice and Philip Zelikow. [Source: Public domain]National Security Adviser Rice decides this day to retain Richard Clarke, counterterrorism “tsar” for the Clinton administration, and his staff. However, she downgrades his official position as National Coordinator for Counterterrorism. While he is still known as the counterterrorism “tsar,” he has less power and now reports to deputy secretaries instead of attending Cabinet-level meetings. He no longer is able to send memos directly to the president, or easily interact with Cabinet-level officials. [Clarke, 2004, pp. 227-30; Guardian, 3/25/2004] Clarke will not be able to meet with President Bush even a single time before 9/11 to discuss al-Qaeda (see January 25, 2001-September 10, 2001). In 2004, Rice will reveal that the person she tasks with considering changes to Clarke and his staff is Philip Zelikow, the future Executive Director of the 9/11 Commission. Zelikow recuses himself from those parts of the 9/11 Commission’s investigation directly relating to his role in this and other matters. However, 9/11 victims’ relatives are not satisfied. For instance, one relative says, “Zelikow has conflicts. I’m not sure that his recusal is sufficient. His fingerprints are all over that decision [to demote Clarke].” [United Press International, 4/9/2004]

Entity Tags: Philip Zelikow, Richard A. Clarke, Condoleezza Rice

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Counterterrorism “tsar” Richard Clarke submits a comprehensive plan to deal with al-Qaeda within days of President Bush’s inauguration (see January 25, 2001). He wants to meet with Bush directly to discuss it with him, but he is unable to do so before 9/11. Clarke will later recall, “I asked for a meeting with the president several times beginning, in fact, before [National Security Adviser] Rice even took office in the transition briefing. I said I have given this briefing to the vice president, I’ve given it to the secretary of state, I’ve given it now to you, I would like to give it to the president. And what I was told was I could brief the president on terrorism after the policy development process had been completed.” He does have one meeting with Bush before 9/11, but only to discuss cyber security because Clarke is planning to quit his current job to focus on that issue instead (see June 2001). When asked why he didn’t bring up al-Qaeda at that meeting, Clarke will reply, “Because I had been told by Dr. Rice and her deputy that this was a briefing on countering the cyber threats and not on al-Qaeda and that I would have my opportunity on al-Qaeda if I just held on, eventually they would get to it, probably in September.” [ABC News, 4/8/2004] The Bush administration had downgraded Clarke’s position in early January 2001 and he was no longer able to send memos directly to the president as he could during the Clinton administration (see January 3, 2001).

Entity Tags: Richard A. Clarke, George W. Bush, Condoleezza Rice

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Just after assuming the presidency, George W. Bush tells reporters, “We’re going to have a frank dialogue about a lot of issues, and I’m going to start by reminding that we know the difference between the executive branch and the legislative branch, but I do believe the president and the vice president can play a part, a strong part, in helping advance an American agenda.” [Congress Daily, 6/29/2007]

Entity Tags: George W. Bush, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

The NSA asks Qwest, a major US telecommunications firm and a cutting-edge provider of high-tech wireless and Internet connectivity, to reveal information about its customers and their phone calls. Qwest’s CEO, Joe Nacchio, refuses after meeting with NSA officials and deciding that the program is illegal without court orders (see February 27, 2001). The NSA refuses to seek court authorization for its wiretaps and electronic surveillance. The NSA will renew its request from Qwest after the 9/11 attacks, and will also ask the firm to help it track suspected terrorists. Other telecommunications firms such as Verizon, AT&T, and BellSouth, will comply with the NSA’s requests (see February 2001 and Beyond).
Fears of a 'Digital Pearl Harbor' - According to a former White House official, the NSA’s primary purpose before 9/11 is to watch for computer hackers and foreign-government agents trying to hack into the government’s computer information systems, particularly those within the Defense Department. Government officials fear a “digital Pearl Harbor” if hackers were ever to seize control of those systems or other key US infrastructures. The former official will say in 2007 that the NSA’s proposal to Qwest is, “Can you build a private version of Echelon and tell us what you see?” Echelon is the NSA’s enormous signals intelligence (SIGINT) network used by the agency and its counterparts in Australia, Canada, New Zealand, and Britain. Qwest is constructing a high-speed network for phone and Internet traffic, and the NSA wants Qwest to keep records of its customers’ transactions for it. The NSA, another source will say, wants to analyze call, e-mail, and other transmissions’ traffic patters for signs of suspicious activity. The White House official will say that telecom firms such as Qwest “have an enormous amount of intelligence-gathering” capability. They don’t have to target individual customers to “look for wacky behavior,” or “groups communicating with each other in strange patterns.” Such information could augment intelligence that the NSA and other agencies were gathering from other sources, and enable the NSA to collect the information it wants without violating laws prohibiting it and other intelligence agencies from directly gathering data on US citizens.
Ill Will from NSA - Nacchio’s refusal to go along with the NSA’s request garners it some ill will among the US intelligence community, the former White House official will say. Nacchio will contend that because of his refusal, the NSA denied Qwest a lucrative government contract. A former high-level intelligence official will add that other telecom companies had little problem agreeing to the NSA’s requests. Nacchio believes that the NSA’s request is illegal under the Telecommunications Act without court orders; the former White House official will acknowledge that it might violate the 1986 Electronic Communications Privacy Act. After 9/11, that law will be amended by the USA Patriot Act to give the government more room to monitor US citizens.
Qwest, Other Telecom Firms Cooperative with Other Agencies - Qwest is apparently less reluctant to share other information with the Pentagon. Qwest began sharing its technology and information as far back as 1997 (see 1997). In May 2001, Commerce Secretary Don Evans will tell the Senate Appropriations Committee that his department helped persuade Qwest to “share proprietory information with the Defense Department to evaluate the vulnerability of its network.” Qwest, which serves the Rocky Mountain and West Coast regions of the country, covers the areas that house some of the military’s most important command-and-control facilities, including the US Strategic Command. In the 1990s, Qwest began actively pursuing contracts with the Defense Department to build more modern, private, secure networks for defense and intelligence agencies. [National Journal, 11/2/2007]
Meetings with Bush Officials - In court documents filed in 2006 to challenge his prosecution for insider trading and, in heavily redacted form, released to the public in 2007, Nacchio will indicate that telecom executives met frequently with Bush administration officials before 9/11, including Deputy Defense Secretary Paul Wolfowitz, National Security Adviser Condoleezza Rice, NSA Director Michael Hayden, and counterterrorism “tsar” Richard Clarke. Many telecom firms are working closely with the government to develop highly classified operations, including joint networks to which the government will have unfettered access. The future director of national intelligence, Mike McConnell, works with telecom firms to expand the cooperation between the telecom industry and the federal government. [Salon, 10/15/2007]

Entity Tags: Condoleezza Rice, US Department of Defense, Bush administration (43), Verizon Communications, AT&T, US Department of Commerce, Senate Appropriations Committee, US Strategic Command, BellSouth, Donald L. Evans, Echelon, Richard A. Clarke, Qwest, Mike McConnell, National Security Agency, Joe Nacchio, Paul Wolfowitz

Timeline Tags: Civil Liberties

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Timeline Tags: Civil Liberties

The CIA issues repeated warnings that al-Qaeda leader Abu Zubaida may be planning an attack for the near future. One report cites a source indicating an attack on Israel, Saudi Arabia, or India. At this time, the CIA believes Zubaida was a major figure in the Millennium plots (see May 30, 2001). Counterterrorism “tsar” Richard Clarke relays these reports to National Security Adviser Rice. She is also briefed on Zubaida’s activities and the CIA’s efforts to locate him. [9/11 Commission, 7/24/2004, pp. 255; US District Court of Eastern Virginia, 5/4/2006, pp. 1 pdf file]

Entity Tags: Richard A. Clarke, Central Intelligence Agency, Condoleezza Rice, Abu Zubaida

Timeline Tags: Complete 911 Timeline

Nicky Hager.Nicky Hager. [Source: Rotorua District Council]New Zealand journalist Nicky Hager appears before a European Parliament investigative committee to testify about the US’s satellite surveillance program, Echelon (see July 11, 2001). Hager has discovered information about Echelon’s use by the New Zealand equivalent of the NSA, the Government Communication Security Bureau (GCSB). In researching Echelon’s use by the USA, Canada, Britain, Australia, and New Zealand, Hager learned of the extent of the system’s “capability to monitor the whole of governments, regional and international organizations, non-government organizations, companies and individuals throughout Europe.” Although Hager warns the committee not to focus exclusively on Echelon’s use for corporate benefits, he gives several examples of such uses in the South Pacific, including monitoring “deals to do with Japan… collecting intelligence on meat sales, which is very important for New Zealand… intelligence to do with oil prices… [and] a particularly large Japanese development project in the South Pacific where there was potential for New Zealand companies to win contracts. In other words, there were both macro-level and micro-level economic intelligence being collected.” Corporate executives routinely received such information, Hager testifies, and tells about “the fantastic amount of intelligence that was arriving, for example, monitoring international trade meetings.… From my sources, they said that whenever there was a GATT meeting or another major international meeting, there were hundreds of reports of the monitoring of the different delegations which were arriving in New Zealand and being shared between [British]/USA partners, and I have absolutely no doubt about that, because I have talked to people who saw it coming from the NSA.” [European Parliament, 4/24/2001]

Entity Tags: Government Communication Security Bureau, Echelon, National Security Agency, Nicky Hager, European Parliament

Timeline Tags: Civil Liberties

One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing.One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing. [Source: Matt Crypto / Public domain]The BBC reports on advances in electronic surveillance. The US’s global surveillance program, Echelon, has become particularly effective in monitoring mobile phones, recording millions of calls simultaneously and checking them against a powerful search engine designed to pick out key words that might represent a security threat. Laser microphones can pick up conversations from up to a kilometer away by monitoring window vibrations. If a bug is attached to a computer keyboard, it is possible to monitor exactly what is being keyed in, because every key on a computer has a unique sound when depressed. [BBC, 4/4/2001] Furthermore, a BBC report on a European Union committee investigation into Echelon one month later notes that the surveillance network can sift through up to 90 percent of all Internet traffic, as well as monitor phone conversations, mobile phone calls, fax transmissions, net browsing history, satellite transmissions and so on. Even encryption may not help much. The BBC suggests that “it is likely that the intelligence agencies can crack open most commercially available encryption software.” [BBC, 5/29/2001]

Entity Tags: Echelon, British Broadcasting Corporation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

The Washington Post will later report, “In May 2001, the CIA learned supporters of bin Laden were planning to infiltrate the United States; that seven were on their way to the United States, Canada and Britain; that his key operatives ‘were disappearing while others were preparing for martyrdom,’ and that bin Laden associates ‘were planning attacks in the United States with explosives.’” [US Congress, 9/18/2002; Washington Post, 9/19/2002] This information may be related to a warning given by captured al-Qaeda operative Ahmed Ressam this month that al-Qaeda leader Abu Zubaida is seeking Canadian passports for himself and five other top militants in order to plant explosives in US cities (see May 30, 2001 and May 2001). [Calgary Herald, 4/3/2002] It is not known if the seven traveling to the US, Canada, and Britain refer to any of the 9/11 hijackers, but 11 of the hijackers travel to the US in May and June (see April 23-June 29, 2001), stopping in Britain along the way (see January-June 2001). Investigators will later say that they are not sure if the aliases Zubaida wanted on the Canadian passports could have been used by some of the 9/11 hijackers. [Calgary Herald, 4/3/2002]

Entity Tags: Abu Zubaida, Al-Qaeda, Osama bin Laden, Central Intelligence Agency, Ahmed Ressam

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

On May 16, an anonymous person calls the US embassy in the United Arab Emirates and warns that bin Laden supporters have been in the US and are planning an attack in the US using “high explosives.” The caller mentions that operatives are infiltrating the US from Canada, but there is no mention of when or where the attack might occur. The next day, based on this warning, the first item on the agenda for counterterrorism “tsar” Richard Clarke’s interagency Counterterrorism Security Group (CSG) is entitled: “[Osama bin Laden]: Operation Planned in US.” The anonymous caller’s tip cannot be later corroborated. In July, the CIA will share the warning with the FBI, the INS, the US Customs Service, and the State Department. It will also be mentioned in the August 6, 2001 Presidential Daily Briefing given to President Bush (see August 6, 2001) and Bush will be told that the CIA and FBI are investigating it. But eventually, neither the CIA nor FBI is able to corraborate the information in the call. [US Congress, 9/18/2002; Washington Post, 9/19/2002; 9/11 Commission, 7/24/2004, pp. 255, 262, 535] There are some other possibly interlinked warnings this month also warning of an al-Qaeda plot to attack the US from Canada using explosives (see May 30, 2001, May 2001, and May 2001).

Entity Tags: White House, Osama bin Laden, Counterterrorism and Security Group, Richard A. Clarke, George W. Bush

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A Senior Executive Intelligence Brief (SEIB) sent to top White House officials is entitled, “Terrorist Groups Said Cooperating on US Hostage Plot.” It warns of a possible hostage plot against the US abroad to force to release of prisoners being held in the US, including Sheikh Omar Abdul-Rahman (see July 1990). The report notes operatives might hijack an aircraft or storm a US embassy overseas. SEIBs are typically based on the previous day’s President Daily Briefing (see January 20-September 10, 2001), so it is probable President Bush is given this information. [9/11 Commission, 7/24/2004, pp. 255-256, 533; US District Court of Eastern Virginia, 5/4/2006, pp. 2 pdf file] This report leads to an FAA warning to airlines noting the potential for “an airline hijacking to free terrorists incarcerated in the United States.” [9/11 Commission, 7/24/2004, pp. 255-256]

Entity Tags: George W. Bush, White House, Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Ahmed Ressam as pictured in his Canadian passport.Ahmed Ressam as pictured in his Canadian passport. [Source: FBI]Ahmed Ressam is convicted in the spring of 2001 for attempting to bomb the Los Angeles International Airport (see December 14, 1999). Facing the likelihood of life in prison, he starts cooperating with authorities in an attempt to reduce his sentence. On this day, he details his experiences in al-Qaeda training camps and his many dealings with top al-Qaeda deputy Abu Zubaida. According to FBI notes from Ressam’s interrogation, Zubaida asked Ressam to send him six original Canadian passports to help Zubaida “get people to America” (see May 2001 and May 2001). Zubaida “wanted an operation in the US” and talked about the need to get explosives into the US for this operation, but Ressam makes it clear this was a separate plot from the one he was involved with. Notes from this day further explain that Ressam doesn’t know if any explosives made it into the US because once an operation is initiated, operators are not supposed to talk about it to anyone. [Calgary Herald, 4/3/2002; Newsweek, 4/28/2005] Zubaida told this to Ressam in 1999, but also indicated that he is willing to wait a year or more to make sure the plot comes to fruition successfully. [Tenet, 2007, pp. 146]
Similarity to 9/11 Attacks - There’s no concrete evidence that Ressam knows any detail of the 9/11 attacks. [Newsweek, 4/28/2005] However, Fox News will later report that roughly around this time Ressam testifies “that attack plans, including hijackings and attacks on New York City targets, [are] ongoing.” [Fox News, 5/17/2002] Questioned shortly after 9/11, Ressam will point out that given what he’s already told his US interrogators, the 9/11 attacks should not be surprising. He notes that he’d described how Zubaida talked “generally of big operations in [the] US with big impact, needing great preparation, great perseverance, and willingness to die.” Ressam had told of “plans to get people hired at airports, of blowing up airports, and airplanes.” [Newsweek, 4/28/2005]
Sharing the Warning - The CIA learns of this warning in June. [Tenet, 2007, pp. 146] Ressam will repeat some of this in a public trial in July (see July 8, 2001). Apparently, the FBI also waits until July to share the information from this debriefing with most other intelligence agencies, the INS, Customs Service, and the State Department. Ressam’s warnings will first be mentioned to Bush in his now famous August 6, 2001 briefing (see August 6, 2001), but as Newsweek will note, “The information from Ressam that was contained in [Bush’s] PDB [is] watered down and seem[s] far more bland than what the Algerian terrorist was actually telling the FBI.” Zubaida’s second plot will be boiled down to one sentence in the PDB: “Ressam also said that in 1998 Abu Zubaida was planning his own US attack.” [Newsweek, 4/28/2005]

Entity Tags: George W. Bush, Ahmed Ressam, Los Angeles International Airport, Federal Bureau of Investigation, Abu Zubaida

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

German intelligence warns the CIA, Britain’s intelligence agency, and Israel’s Mossad that Middle Eastern militants are planning to hijack commercial aircraft to use as weapons to attack “American and Israeli symbols, which stand out.” A later article quotes unnamed German intelligence sources who state the information was coming from Echelon surveillance technology, and that British intelligence had access to the same warnings. However, there were other informational sources, including specific information and hints given to, but not reported by, Western and Near Eastern news media six months before 9/11. [Frankfurter Allgemeine Zeitung (Frankfurt), 9/11/2001; Washington Post, 9/14/2001; Fox News, 5/17/2002] According to a separate account, in the summer of 2001, German officials are aware that al-Qaeda is planning a major attack, but they don’t know the details (see Summer 2001).

Entity Tags: Echelon, Israel Institute for Intelligence and Special Tasks (Mossad), German intelligence community, UK Secret Intelligence Service (MI6), Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A CIA report says that a man named “Khaled” is actively recruiting people to travel to various countries, including the US, to stage attacks. CIA headquarters presume from the details of this report that Khaled is Khalid Shaikh Mohammed (KSM). On July 11, the individual source for this report is shown a series of photographs and identifies KSM as the person he called “Khaled.” [USA Today, 12/12/2002; 9/11 Commission, 7/24/2004, pp. 277, 533] This report also reveals that:
bullet Al-Qaeda operatives heading to the US would be “expected to establish contact with colleagues already living there.”
bullet KSM himself had traveled to the US frequently, and as recently as May 2001.
bullet KSM is a relative of bomber Ramzi Yousef.
bullet He appears to be one of bin Laden’s most trusted leaders.
bullet He routinely tells others that he can arrange their entry into the US as well. However, the CIA doesn’t find this report credible because they think it is unlikely that he would come to the US (in fact, it appears he had (see Summer 1998)). Nevertheless, they consider it worth pursuing. One agent replies, “If it is KSM, we have both a significant threat and an opportunity to pick him up.” In July, the source clarifies that the last time he can definitely place KSM in the US was in the summer of 1998 (see Summer 1998). The CIA disseminates the report to all other US intelligence agencies, military commanders, and parts of the Treasury and Justice Departments. The 9/11 Congressional Inquiry will later request that the CIA inform them how CIA agents and other agencies reacted to this information, but the CIA does not respond to this. [US Congress, 7/24/2003] It appears that KSM will send at least one and probably two operatives to the US after this time and before 9/11 (see August 4, 2001 and September 10, 2001). On July 23, 2001, the US consulate in Jeddah, Saudi Arabia will give KSM a US visa (he uses an alias but his actual photo appears on his application) (see July 23, 2001). Also, during this summer and as late as September 10, 2001, the NSA will intercept phone calls between KSM and Mohamed Atta, but the NSA will not share this information with any other agencies (see Summer 2001).

Entity Tags: Central Intelligence Agency, US Department of Justice, US Department of the Treasury, Khalid Shaikh Mohammed

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Scenes in the al-Qaeda recruitment video show operatives training at the al-Farouq camp in Afghanistan.Scenes in the al-Qaeda recruitment video show operatives training at the al-Farouq camp in Afghanistan. [Source: CBC]An al-Qaeda recruitment video created months earlier is made public. The video had been circling amongst radical militants, but appears on the news worldwide after a Kuwaiti newspaper gets a copy. The video celebrates the bombing of the USS Cole. Bin Laden appears on the video, and while he does not take credit for the bombing, others in the video do. Bin Laden says that Muslims have to leave countries that are ruled by “allies of Jews and Christians,” and join his cause to be “prepared” for holy war. In an address to Palestinians, he calls for “blood, blood and destruction, destruction.” He says, “We give you the good news that the forces of Islam are coming…” He also issues a call to arms: “Your brothers in Palestine are waiting for you; it’s time to penetrate America and Israel and hit them where it hurts the most.” He also tells his supporters to “slay the United States and Israel.” A similar video appeared shortly before the bombing of the USS Cole. [Associated Press, 6/20/2001; Associated Press, 6/20/2001; Newsweek, 7/22/2001; Washington Post, 9/11/2001] Intrest in the videotape will grow in the Muslim world in the months before the 9/11 attacks (see September 9, 2001).

Entity Tags: Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The three authors of the book Germs, Judith Miller (left), Stephen Engelberg (top), and William Broad (bottom). This was the book Miller was working on before 9/11; it was published several weeks after 9/11.The three authors of the book Germs, Judith Miller (left), Stephen Engelberg (top), and William Broad (bottom). This was the book Miller was working on before 9/11; it was published several weeks after 9/11. [Source: Publicity photo]New York Times reporter Judith Miller learns her government counterterrorism sources are worried that al-Qaeda is going to attack a US target on the Fourth of July holiday. There has been an increase in chatter about an impending attack. In 2005, Miller will recall, “Everyone in Washington was very spun-up in the counterterrorism world at that time. I think everybody knew that an attack was coming—everyone who followed this.… I got the sense that part of the reason that I was being told of what was going on was that the people in counterterrorism were trying to get the word to the president or the senior officials through the press, because they were not able to get listened to themselves.”
Conversation Overheard - She has a conversation with a still-anonymous top-level White House source who reveals there is some concern about a top-secret NSA intercept between two al-Qaeda operatives. She explains, “They had been talking to one another, supposedly expressing disappointment that the United States had not chosen to retaliate more seriously against what had happened to the [USS] Cole. And one al-Qaeda operative was overheard saying to the other, ‘Don’t worry; we’re planning something so big now that the US will have to respond.’ And I was obviously floored by that information. I thought it was a very good story: (1) the source was impeccable; (2) the information was specific, tying al-Qaeda operatives to, at least, knowledge of the attack on the Cole; and (3) they were warning that something big was coming, to which the United States would have to respond. This struck me as a major page one-potential story.”
Not Printed - Miller tells her editor Stephen Engelberg about the story the next day. But Engelberg says, “You have a great first and second paragraph. What’s your third?” Miller finds only one other source to confirm these details.
Yemen Connection - She later learns from her first source that the conversation occurred in Yemen. Though the telephone number is never disclosed, some circumstances suggest one of the parties taking part in the call may have been at the al-Qaeda communications hub in Sana’a, Yemen, that is monitored by US intelligence. One of the hijackers, Khalid Almihdhar, lives there with his wife and children (see Late August 1998), and communicates there will be forthcoming attacks to at least one family member (see Late October 2000-July 4, 2001). The hijackers in the US apparently call the Yemen hub around this time (see (August 2001)). On July 3, the CIA will request the arrest of Djamel Beghal (see July 3, 2001), an al-Qaeda operative whose calls to the hub are apparently being monitored at this time (see Before July 3, 2001).
Regrets - Miller later regrets not following through more because she “had a book coming out” as well as other stories and that there wasn’t a “sense of immediacy” about the information. In 2005, Engelberg will confirm Miller’s story and agree that he wanted more specifics before running the story. Engelberg also later wonders “maybe I made the wrong call,” asking, “More than once I’ve wondered what would have happened if we’d run the piece?” The New York Times has yet to mention the warning in all of their post-9/11 reporting and the 9/11 Commission has never mentioned anything about the warning either. In 2005, Miller will spend 85 days in jail for refusing to reveal a source and then leave the New York Times after widespread criticism about her reporting. [Columbia Journalism Review, 9/2005; AlterNet, 5/18/2006; Editor & Publisher, 5/18/2006]

Entity Tags: Stephen Engelberg, Al-Qaeda, Judith Miller

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In February 2002, it will be reported on the ABC News program Nightline that in July 2001, “Jordanian intelligence picked up an… alarming threat. ABC News has learned Jordan told US officials al-Qaeda was planning an attack on American soil.” [ABC News, 2/19/2002] It has been reported elsewhere that in late summer 2001, Jordan warns the US that aircraft will be used in a major attack inside the US, but it is not known if that is a separate warning or the same as this one (see Late Summer 2001). Also in late July, Jordan will offer the US to send its elite troops to Afghanistan to attack al-Qaeda, an offer the US turns down (see July 24, 2001). Also in July 2001, Jordan briefly detains and interrogates Mohammed Haydar Zammar, a member of the Hamburg cell with three of the 9/11 hijackers (see July 2001). Zammar appears to have foreknowledge of the 9/11 plot around this time (see August 2001).

Entity Tags: Jordan General Intelligence Department, Mohammed Haydar Zammar

Timeline Tags: Complete 911 Timeline

In 2002, Newsweek will report: “The White House acknowledged for the first time, [President] Bush was privately beginning to worry about the stream of terror warnings he was hearing that summer, most of them aimed at US targets abroad. On July 5, five days before the Phoenix memo (see July 10, 2001), Bush directed [Condoleezza] Rice to figure out what was going on domestically.” [Newsweek, 5/27/2002] In 2004, President Bush will explain why he requested this: “[T]he reason I did is because there had been a lot of threat intelligence from overseas. And part of it had to do with the Genoa [Italy] G8 conference that I was going to attend.” [US President, 4/19/2004] Though he does not mention it, the chief security concern at the late July 2001 conference he mentions is intelligence that al-Qaeda plans to fly an airplane into the conference. This threat is so widely reported before the conference (with some reports before July 5 (see June 13, 2001 and Mid-July 2001) that the attack is called off (see July 20-22, 2001). For instance, in late June, Time magazine mentioned a German intelligence report of an Osama bin Laden plot “to fly remote-controlled model aircraft packed with Semtex into the conference hall and blow the leaders of the industrialized world to smithereens” (see June 20, 2001). Bush will later claim that this request is specifically for the later-famous August 6, 2001 briefing entitled, “Bin Laden Determined to Strike in US” (see August 6, 2001), although the CIA analysts who draft it will deny this (see July 13, 2004). [US President, 4/19/2004]

Entity Tags: Osama bin Laden, Condoleezza Rice, George W. Bush, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Condoleezza Rice and George Tenet in the White House. This picture is actually taken on October 8, 2001, and President Bush is elsewhere in the room.Condoleezza Rice and George Tenet in the White House. This picture is actually taken on October 8, 2001, and President Bush is elsewhere in the room. [Source: Eric Draper / White House]CIA Director George Tenet finds the briefing that counterterrorism chief Cofer Black gave him earlier in the day (see July 10, 2001) so alarming that he calls National Security Adviser Condoleezza Rice from his car as he heads to the White House and says he needs to see her right away, even though he has regular weekly meetings with her. [Washington Post, 10/1/2006] Tenet and Black let a third CIA official, Richard Blee, who is responsible for Alec Station, the CIA’s bin Laden unit, brief Rice on the latest intelligence. Deputy National Security Adviser Stephen Hadley and counterterrorism “tsar” Richard Clarke are also present. [McClatchy Newspapers, 10/2/2006]
'Significant Attack' - Blee starts by saying, “There will be a significant terrorist attack in the coming weeks or months!” He argues that it is impossible to pick the specific day, saying Osama bin Laden “will attack when he believes the attack will be successful.” He mentions a range of threat information including:
bullet A warning related to Chechen leader Ibn Khattab (see (July 9, 2001)) and seven pieces of intelligence the CIA recently received indicating there would soon be a terrorist attack (see July 9-10, 2001);
bullet A mid-June statement by bin Laden to trainees that there would be an attack in the near future (see Mid-June 2001);
bullet Information that talks about moving toward decisive acts;
bullet Late-June information saying a “big event” was forthcoming;
bullet Two separate bits of information collected “a few days before the meeting” in which people predicted a “stunning turn of events” in the weeks ahead. This may be a reference to intercepts of calls in Yemen, possibly involving the father-in-law of 9/11 hijacker Khalid Almihdhar (see June 30-July 1, 2001).
Multiple, Simultaneous Attacks in US Possible - Blee says that the attacks will be “spectacular,” they will be designed to inflict mass casualties against US facilities and interests, there may be multiple, simultaneous attacks, and they may be in the US itself. He outlines the CIA’s efforts to disrupt al-Qaeda by spreading incorrect word that the attack plans have been compromised, in the hope that this will cause a delay in the attack. But he says this is not enough and that the CIA should go on the attack. Blee also discounts the possibility of disinformation, as bin Laden’s threats are known to the public in the Middle East and there will be a loss of face, funds, and popularity if they are not carried out. Blee urges that the US take a “proactive approach” by using the Northern Alliance. [Tenet, 2007, pp. 151-4] Author Bob Woodward will later write: “Black emphasize[s] that this amount[s] to a strategic warning, meaning the problem [is] so serious that it require[s] an overall plan and strategy. Second, this [is] a major foreign policy problem that need[s] to be addressed immediately. They need […] to take action that moment—covert, military, whatever—to thwart bin Laden. The United States ha[s] human and technical sources, and all the intelligence [is] consistent.” [Woodward, 2006, pp. 80; Washington Post, 10/1/2006] Richard Clarke expresses his agreement with the CIA about the threat’s seriousness, and Black says, “This country needs to go on a war footing now.”
Rice's Response - There are conflicting accounts about the CIA’s reading of Rice’s response. According to Woodward: “Tenet and Black [feel] they [are] not getting through to Rice. She [is] polite, but they [feel] the brush-off.” They leave the meeting frustrated, seeing little prospect for immediate action. Tenet and Black will both later recall the meeting as the starkest warning they gave the White House on al-Qaeda before 9/11 and one that could have potentially stopped the 9/11 attacks if Rice had acted on it (see July 10, 2001) and conveyed their urgency to President Bush. (Tenet is briefing Bush on a daily basis at this time, but he will later say that Rice has a much better rapport with the president.) Black will say, “The only thing we didn’t do was pull the trigger to the gun we were holding to her head.” [Woodward, 2006, pp. 80; Washington Post, 10/1/2006] Rice says that Bush will align his policy with the new realities and grant new authorities. Writing in 2007, Tenet will say that this response is “just the outcome I had expected and hoped for,” and recall that as they leave the meeting, Blee and Black congratulate each other on having got the administration’s attention. Nevertheless, Rice does not take the requested action until after 9/11. [Tenet, 2007, pp. 153-4]
Rice Concerned about Genoa - Clarke will recall in 2006 that Rice focuses on the possible threat to Bush at an upcoming summit meeting in Genoa, Italy (see June 13, 2001 and July 20-22, 2001). Rice and Bush have already been briefed about the Genoa warning by this time (see July 5, 2001). Rice also promises to quickly schedule a high-level White House meeting on al-Qaeda. However, that meeting does not take place until September 4, 2001 (see September 4, 2001). [McClatchy Newspapers, 10/2/2006] Rice also directs that Defense Secretary Donald Rumsfeld and Attorney General John Ashcroft be given the same briefing, and they receive it a short time later (see July 11-17, 2001).
Meeting Not Mentioned in 9/11 Commission Report - The meeting will not be mentioned in the 9/11 Commission Report (see August 4, 2002), and there will be controversy when it is fully revealed in 2006 (see September 29, 2006, September 30-October 3, 2006, and October 1-2, 2006).

Entity Tags: Richard Blee, Stephen J. Hadley, White House, Osama bin Laden, Richard A. Clarke, George J. Tenet, Al-Qaeda, Central Intelligence Agency, Cofer Black, Donald Rumsfeld, Condoleezza Rice, John Ashcroft

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

British intelligence agencies send a report to British Prime Minister Tony Blair and other top officials warning that al-Qaeda is in “the final stages” of preparing an attack in the West. The prediction is “based on intelligence gleaned not just from [British intelligence] but also from US agencies, including the CIA and the National Security Agency,” which cooperate with the British. “The contents of the July 16 warning would have been passed to the Americans, Whitehall sources confirmed.” The report states there is “an acute awareness” that the attack is “a very serious threat.” [London Times, 6/14/2002] This appears to be similar, but not identical, to a warning to British leaders from MI5, Britain’s domestic intelligence agency, 10 days earlier (see July 6, 2001).

Entity Tags: Central Intelligence Agency, Tony Blair, Al-Qaeda, National Security Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

CBS later reports, in a long story on another topic: “Just days after [Mohamed] Atta return[s] to the US from Spain, Egyptian intelligence in Cairo says it received a report from one of its operatives in Afghanistan that 20 al-Qaeda members had slipped into the US and four of them had received flight training on Cessnas. To the Egyptians, pilots of small planes didn’t sound terribly alarming, but they [pass] on the message to the CIA anyway, fully expecting Washington to request information. The request never [comes].” [CBS News, 10/9/2002] This appears to be just one of several accurate Egyptian warnings from their informants inside al-Qaeda. Around this time, word of the upcoming 9/11 attacks is spreading widely in the training camps in Afghanistan. For instance, in a recorded speech played at one of the camps, Osama bin Laden specifically urges trainees to pray for the success of an upcoming attack involving 20 martyrs (see Summer 2001).

Entity Tags: Al-Qaeda, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Jordanian intelligence (the GID) makes a communications intercept deemed so important that King Abdullah’s men relay it to Washington, probably through the CIA station in Amman. To make doubly sure the message gets through it is passed through an Arab intermediary to a German intelligence agent. The message states that a major attack, code named “The Big Wedding,” is planned inside the US and that aircraft will be used. “When it became clear that the information was embarrassing to Bush administration officials and congressmen who at first denied that there had been any such warnings before September 11, senior Jordanian officials backed away from their earlier confirmations.” The Christian Science Monitor will call the story “confidently authenticated” even though Jordan has backed away from it. [International Herald Tribune, 5/21/2002; Christian Science Monitor, 5/23/2002] It has been reported elsewhere that in July 2001, Jordan warns the US that al-Qaeda is planning an attack inside the US, but it is unknown if this is referring to the same warning or a separate one (see July 2001). In late July 2001, the king of Jordan will offer the US to send two battalions of Jordanian special forces to Afghanistan to eliminate al-Qaeda havens there (see July 24, 2001). Also in July 2001, Jordan briefly detains and interrogates Mohammed Haydar Zammar, who is a member of the Hamburg cell with three of the 9/11 hijackers (see July 2001). Zammar appears to have foreknowledge of the 9/11 plot around this time (see August 2001).

Entity Tags: Central Intelligence Agency, Bush administration (43), Mohammed Haydar Zammar, Jordan General Intelligence Department, Abdullah II ibn al-Hussein

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The Federal Reserve Board of Governors issues a non-routine supervisory letter to Federal Reserve banks, emphasizing the need to continue monitoring suspicious activity reports (SARs). The letter gives no explanation why it has been sent out at this particular time, but states, “Reserve banks must continue to conduct a thorough and timely review of all material SARs filed by supervised financial institutions in their districts.” It adds, “A periodic, comprehensive review of SARs will assist Reserve banks in identifying suspicious or suspected criminal activity occurring at or through supervised financial institutions; provide the information necessary to assess the procedures and controls used by the reporting institutions to identify, monitor, and report violations and suspicious illicit activities; and assist in the assessment of the adequacy of anti-money laundering programs.” [Spillenkothen, 8/2/2001] While the letter does not say if there are specific reasons why the banks should currently be watching for suspicious activities, William Bergman, an economist who works at the Federal Reserve Bank of Chicago from 1990 to 2004, will later point out, “Intelligence warnings on terrorism were rising significantly in mid-2001.” He will therefore question whether, “with terrorism and its financing already recognized as an important element of the national money laundering strategy,” this letter is “related to these warnings.” He will also point out, “negotiations between the Taliban and representatives of the United States over energy production issues in Afghanistan ended on August 2, 2001” (see August 2, 2001), and that, “Four days later, President Bush received a ‘PDB’—a presidential daily brief—with a headline warning that bin Laden was ‘determined to strike in US,’ and the body text of the PDB referred to ‘patterns of suspicious activity’” (see August 6, 2001). [Sanders Research Associates, 1/4/2006] When, in December 2003, Bergman asks the Board of Governors staff why it issued the August 2 letter, and if the letter was related to intelligence about heightened terrorist threats, he will receive no reply and subsequently be told he has “committed an egregious breach of protocol in calling the Board staff and asking the question.” [Veteran Affairs Whistleblowers Coalition, 5/14/2006] Also around this time, between June and August 2001, there is an unexplained surge in the amount of US currency in circulation (see June-August 2001). [Sanders Research Associates, 9/16/2005]

Entity Tags: William Bergman, Federal Reserve Board of Governors

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

President Bush spends most of August 2001 at his Crawford, Texas, ranch, nearly setting a record for the longest presidential vacation. While it is billed a “working vacation,” news organizations report that Bush is doing “nothing much” aside from his regular daily intelligence briefings. [ABC News, 8/3/2001; Washington Post, 8/7/2001; Salon, 8/29/2001] One such unusually long briefing at the start of his trip is a warning that bin Laden is planning to attack in the US (see August 6, 2001), but Bush spends the rest of that day fishing. By the end of his trip, Bush has spent 42 percent of his presidency at vacation spots or en route. [Washington Post, 8/7/2001] At the time, a poll shows that 55 percent of Americans say Bush is taking too much time off. [USA Today, 8/7/2001] Vice President Cheney also spends the entire month in a remote location in Wyoming. [Jackson Hole News and Guide, 8/15/2001]

Entity Tags: Osama bin Laden, George W. Bush, Richard (“Dick”) Cheney

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

President Bush at his Crawford, Texas, ranch on August 6, 2001. Advisors wait with classified briefings.President Bush at his Crawford, Texas, ranch on August 6, 2001. Advisors wait with classified briefings. [Source: White House]President Bush receives a classified presidential daily briefing (PDB) at his Crawford, Texas ranch indicating that Osama bin Laden might be planning to hijack commercial airliners. The PDB provided to him is entitled, “Bin Laden Determined to Strike in US.” The entire briefing focuses on the possibility of terrorist attacks inside the US. [New York Times, 5/15/2002; Newsweek, 5/27/2002] The analysts who drafted the briefing will say that they drafted it on the CIA’s initiative (see July 13, 2004), whereas in 2004 Bush will state that he requested a briefing on the topic due to threats relating to a conference in Genoa, Italy, in July 2001, where Western intelligence agencies believed Osama bin Laden was involved in a plot to crash an airplane into a building to kill Bush and other leaders (see April 13, 2004). The analysts will later explain that they saw it as an opportunity to convey that the threat of an al-Qaeda attack in the US was both current and serious. [9/11 Commission, 7/24/2004, pp. 260] The existence of this briefing is kept secret, until it is leaked in May 2002, causing a storm of controversy (see May 15, 2002). While National Security Adviser Condoleezza Rice will claim the memo is only one and a half pages long, other accounts state it is 11 1/2 pages instead of the usual two or three. [New York Times, 5/15/2002; Newsweek, 5/27/2002; Die Zeit (Hamburg), 10/1/2002] A page and a half of the contents will be released on April 10, 2004; this reportedly is the full content of the briefing. [Washington Post, 4/10/2004] The briefing, as released, states as follows (note that the spelling of certain words are corrected and links have been added):
bullet Clandestine, foreign government, and media reports indicate bin Laden since 1997 has wanted to conduct terrorist attacks in the US (see December 1, 1998). Bin Laden implied in US television interviews in 1997 and 1998 that his followers would follow the example of World Trade Center bomber Ramzi Yousef and “bring the fighting to America” (see May 26, 1998).
bullet After US missile strikes on his base in Afghanistan in 1998, bin Laden told followers he wanted to retaliate in Washington, according to a -REDACTED-service (see December 21, 1998).
bullet An Egyptian Islamic Jihad (EIJ) operative told -REDACTED- service at the same time that bin Laden was planning to exploit the operative’s access to the US to mount a terrorist strike.
bullet The millennium plotting in Canada in 1999 may have been part of bin Laden’s first serious attempt to implement a terrorist strike in the US. Convicted plotter Ahmed Ressam has told the FBI that he conceived the idea to attack Los Angeles International Airport himself (see December 14, 1999), but that bin Laden lieutenant Abu Zubaida encouraged him and helped facilitate the operation. Ressam also said that in 1998 Abu Zubaida was planning his own US attack (see Late March-Early April 2001 and May 30, 2001).
bullet Ressam says bin Laden was aware of the Los Angeles operation.
bullet Although bin Laden has not succeeded, his attacks against the US Embassies in Kenya and Tanzania in 1998 (see 10:35-10:39 a.m., August 7, 1998) demonstrate that he prepares operations years in advance and is not deterred by setbacks. Bin Laden associates surveyed our embassies in Nairobi and Dar es Salaam as early as 1993 (see Late 1993-Late 1994), and some members of the Nairobi cell planning the bombings were arrested and deported in 1997.
bullet Al-Qaeda members—including some who are US citizens—have resided in or traveled to the US for years, and the group apparently maintains a support structure that could aid attacks (see January 25, 2001). Two al-Qaeda members found guilty in the conspiracy to bomb our embassies in East Africa were US citizens (see September 15, 1998), and a senior EIJ member lived in California in the mid-1990s (see November 1989 and September 10, 1998).
bullet A clandestine source said in 1998 that a bin Laden cell in New York was recruiting Muslim-American youth for attacks (see October-November 1998).
bullet “We have not been able to corroborate some of the more sensational threat reporting, such as that from a [REDACTED] service in 1998 saying that bin Laden wanted to hijack a US aircraft to gain the release of ‘Blind Sheikh’ Omar Abdul-Rahman and other US-held extremists” (see 1998, December 4, 1998, and May 23, 2001). [9/11 Commission, 7/24/2004, pp. 223] According to the Washington Post, this information came from a British service. [Washington Post, 5/18/2002]
bullet Nevertheless, FBI information since that time indicates patterns of suspicious activity in this country consistent with preparations for hijackings or other types of attacks, including recent surveillance of federal buildings in New York (see May 30, 2001).
bullet The FBI is conducting approximately 70 full-field investigations throughout the US that it considers bin Laden-related (see August 6, 2001). CIA and the FBI are investigating a call to our embassy in the UAE in May saying that a group or bin Laden supporters was in the US planning attacks with explosives (see May 16-17, 2001). [9/11 Commission, 7/24/2004, pp. 223]
In retrospect, the briefing is remarkable for the many warnings that apparently are not included (see for instance, from the summer of 2001 prior to August alone: May 2001, June 2001, June 12, 2001, June 19, 2001, Late Summer 2001, July 2001, July 16, 2001, Late July 2001, Late July 2001, Summer 2001, June 30-July 1, 2001, July 10, 2001, and Early August 2001). According to one account, after the PDB has been given to him, Bush tells the CIA briefer, “You’ve covered your ass now” (see August 6, 2001). Incredibly, the New York Times later reports that after being given the briefing, Bush “[breaks] off from work early and [spends] most of the day fishing.” [New York Times, 5/25/2002] In 2002 and again in 2004, National Security Adviser Rice will incorrectly claim under oath that the briefing only contained historical information from 1998 and before (see May 16, 2002 and April 8, 2004).

Entity Tags: George W. Bush, Islamic Jihad, Omar Abdul-Rahman, Federal Bureau of Investigation, Los Angeles International Airport, Condoleezza Rice, Abu Zubaida, Al-Qaeda, World Trade Center, Central Intelligence Agency, 9/11 Commission, Ahmed Ressam, Ramzi Yousef, Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

According to journalist and author Ron Suskind, just after a CIA briefer presents President Bush with the later infamous PDB (Presidential Daily Briefing) item entitled “Bin Laden Determined to Strike in US” (see August 6, 2001), Bush tells the briefer, “You’ve covered your ass, now.” This account is from Suskind’s 2006 book The One Percent Doctrine, which is based largely on anonymous accounts from political insiders. In the book, after describing the presentation of the PDB, Suskind will write: “And, at an eyeball-to-eyeball intelligence briefing during this urgent summer, George W. Bush seems to have made the wrong choice. He looked hard at the panicked CIA briefer. ‘All right,’ he said. ‘You’ve covered your ass, now.’” [Suskind, 2006, pp. 2; Washington Post, 6/20/2006]

Entity Tags: Central Intelligence Agency, George W. Bush

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The CIA’s Presidential Daily Briefing (PDB) given to President Bush on this day (see August 6, 2001) contains the important line, “The FBI is conducting approximately 70 full field investigations throughout the US that it considers bin Laden-related.” Bush will state in 2004 that, based on this, “I was satisfied that some of the matters were being looked into.” National Security Adviser Rice will explain that since the FBI had 70 “full-field investigations under way of cells” in the US, “there was no recommendation [coming from the White House] that we do something about” the large number of warnings coming in. However, the number and content of the FBI investigations appears grossly exaggerated. The FBI later will reveal that the investigations are not limited to al-Qaeda and do not focus on al-Qaeda cells. Many were criminal investigations, which typically are not likely to help prevent future terrorist acts. An FBI spokesman will say the FBI does not know how that number got into Bush’s PDB. The 9/11 Commission will later conclude, “The 70 full-field investigations number was a generous calculation that included fund-raising investigations. It also counted each individual connected to an investigation as a separate full-field investigation. Many of these investigations should not have been included, such as the one that related to a dead person, four that concerned people who had been in long-term custody, and eight that had been closed well before August 6, 2001.” [Newsday, 4/10/2004; Associated Press, 4/11/2004; 9/11 Commission, 7/24/2004, pp. 262, 535]

Entity Tags: Al-Qaeda, Condoleezza Rice, Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Bush being briefed at his ranch on August 6, 2001.Bush being briefed at his ranch on August 6, 2001. [Source: Associated Press]On April 29, 2004, President Bush will testify before the 9/11 Commission, but almost no details of what he said will be publicly released. He testifies with Vice President Cheney, in private, not under oath, is not recorded, and the notes that the commissioners take are censored by the White House (see April 29, 2004). However, the 9/11 Commission will release a one paragraph summary of how Bush claims he responded to the Presidential Daily Briefing of August 6, 2001, entitled, “Bin Laden Determined to Strike in US” (see August 6, 2001). The Commission recalls, “The President told us the August 6 report was historical in nature. President Bush said the article told him that al-Qaeda was dangerous, which he said he had known since he had become President. The President said bin Laden had long been talking about his desire to attack America. He recalled some operational data on the FBI, and remembered thinking it was heartening that 70 investigations were under way (see August 6, 2001). As best he could recollect, [National Security Adviser] Rice had mentioned that the Yemenis’ surveillance of a federal building in New York had been looked into in May and June, but there was no actionable intelligence (see May 30, 2001). He did not recall discussing the August 6 report with the Attorney General or whether Rice had done so. He said that if his advisers had told him there was a cell in the United States, they would have moved to take care of it. That never happened.” The 9/11 Commission will conclude that they could find no evidence of any further discussions or actions taken by Bush and his top advisers in response to the briefing (see Between August 6 and September 10, 2001). [9/11 Commission, 7/24/2004, pp. 260]

Entity Tags: Condoleezza Rice, George W. Bush, 9/11 Commission

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The 9/11 Commission will later state that after the now famous “bin Laden Determined to Strike in US” memo is given to President Bush on August 6, 2001 (see August 6, 2001), “We have found no indication of any further discussion before September 11 among the president and his top advisers of the possibility of a threat of an al-Qaeda attack in the United States.” [Newsweek, 4/28/2005] 9/11 Commissioner Bob Kerrey will later state to CNN,“[B]y the way, there’s a credible case that the president’s own negligence prior to 9/11 at least in part contributed to the disaster in the first place.… [I]n the summer of 2001, the government ignored repeated warnings by the CIA, ignored, and didn’t do anything to harden our border security, didn’t do anything to harden airport country, didn’t do anything to engage local law enforcement, didn’t do anything to round up INS and consular offices and say we have to shut this down, and didn’t warn the American people. The famous presidential daily briefing on August 6, we say in the report that the briefing officers believed that there was a considerable sense of urgency and it was current. So there was a case to be made that wasn’t made.… The president says, if I had only known that 19 Islamic men would come into the United States of America and on the morning of 11 September hijack four American aircraft, fly two into the World Trade Center, one into the Pentagon, and one into an unknown Pennsylvania that crashed in Shanksville, I would have moved heaven and earth. That’s what he said. Mr. President, you don’t need to know that. This is an Islamic Jihadist movement that has been organized since the early 1990s, declared war on the United States twice, in ‘96 and ‘98. You knew they were in the United States. You were warned by the CIA. You knew in July they were inside the United States. You were told again by briefing officers in August that it was a dire threat. And what did you do? Nothing, so far as we could see on the 9/11 Commission.” [CNN, 11/8/2004]

Entity Tags: World Trade Center, Pentagon, Central Intelligence Agency, George W. Bush, Bob Kerrey, Al-Qaeda, 9/11 Commission, Bush administration (43), Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

CIA records show that CIA Director George Tenet briefed President Bush twice in August—once in Crawford, Texas, on August 17, and once in Washington, on August 31. [Washington Post, 4/15/2004] In Tenet’s 2007 book, he will briefly mention that “A few weeks after the August 6 PDB [titled ‘Bin Laden Determined to Strike in US’ (see August 6, 2001)] was delivered, I followed it to Crawford to make sure the president stayed current on events. That was my first visit to the ranch.” [Tenet, 2007, pp. 145] Later asked about what he told Bush at this meeting, Tenet will only say, “I held nothing back from the president. He understood our concerns about threats. He understood what we were doing around the world at the time.” [MSNBC, 5/7/2007] By the time of the second briefing, Tenet has been briefed about Zacarias Moussaoui’s arrest (see August 23, 2001), but, apparently, he fails to tell Bush about it. [Washington Post, 4/15/2004] In April 2004, Tenet will testify under oath before the 9/11 Commission that he had no direct communication with President Bush during the month of August. [New York Times, 4/15/2004] This is quickly discovered to be untrue. A CIA spokesperson will then claim, “He momentarily forgot [about the briefings]” (see April 14, 2004). [Washington Post, 4/15/2004] Tenet will personally brief Bush six more times before 9/11 and will still apparently fail to mention Moussaoui to him (see September 1-8, 2001).

Entity Tags: Zacarias Moussaoui, George J. Tenet, George W. Bush, 9/11 Commission

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

An Echelon station in Menwith Hill, Britain.An Echelon station in Menwith Hill, Britain. [Source: BBC]By the 1980s, a high-tech global electronic surveillance network shared between the US, Britain, Canada, Australia, and New Zealand is gathering intelligence all over the world. The BBC describes Echelon’s power as “astounding,” and elaborates: “Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. They are looking for evidence of international crime, like terrorism.” [BBC, 11/3/1999] One major focus for Echelon before 9/11 is al-Qaeda. For instance, one account mentions Echelon intercepting al-Qaeda communications in Southeast Asia in 1996 (see Before September 11, 2001). A staff member of the National Security Council who regularly attends briefings on bin Laden states, “We are probably tapped into every hotel room in Pakistan. We can listen in to just about every phone call in Afghanistan.” However, he and other critics will claim one reason why US intelligence failed to stop terrorism before 9/11 was because there was too much of a focus on electronic intelligence gathering and not enough focus on human interpretation of that vast data collection. [Toronto Star, 2/2/2002]

Entity Tags: United Kingdom, United States, Osama bin Laden, Echelon, National Security Council, Canada, Australia, Al-Qaeda, New Zealand

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Around this time, according to his own account, counterterrorism “tsar” Richard Clarke reaches the Secure Video Conferencing Center just off the main floor of the Situation Room in the West Wing of the White House. From there, he directs the response to the 9/11 attacks and stays in contact with other top officials through video links. Clarke claims that on video he can see Defense Secretary Donald Rumsfeld, CIA Director George Tenet, FBI Director Robert Mueller, FAA Administrator Jane Garvey, Deputy Attorney General Larry Thompson (filling in for the traveling Attorney General John Ashcroft), Deputy Secretary of State Richard Armitage (filling in for the traveling Secretary of State Colin Powell), and Vice Chairman of the Joint Chiefs of Staff Richard Myers (filling in for the traveling Chairman Henry Shelton). National Security Adviser Condoleezza Rice is with Clarke, but she lets him run the crisis response, deferring to his longer experience on terrorism matters. Clarke is also told by an aide, “We’re on the line with NORAD, on an air threat conference call.” [Clarke, 2004, pp. 2-4; Australian, 3/27/2004] According to the 9/11 Commission, logs indicate that Clarke’s video teleconference only begins at 9:25 a.m. (see 9:25 a.m. September 11, 2001), which is later than Clarke suggests, and CIA and FAA representatives only join it at 9:40 a.m. [9/11 Commission, 7/24/2004, pp. 36 and 462] Other accounts claim that, rather than being involved in Clarke’s teleconference at this time, Donald Rumsfeld is still in his office waiting for his intelligence briefing (see (Shortly After 9:03 a.m.) September 11, 2001), and Richard Myers is in a meeting on Capitol Hill (see (Shortly After 9:03 a.m.) September 11, 2001). [Armed Forces Radio And Television Service, 10/17/2001; Clarke, 2006, pp. 218-219] The 9/11 Commission claims that, “While important,” Clarke’s conference has “no immediate effect on the emergency defense efforts.” [9/11 Commission, 6/17/2004] Yet, as the Washington Post puts it, “everyone seems to agree” Clarke is the chief crisis manager on 9/11. [Washington Post, 3/28/2004] Even Clarke’s later opponent, National Security Adviser Rice, calls him 9/11’s “crisis management guy.” [United Press International, 4/9/2004] The conference is where the government’s emergency defense efforts are concentrated.

Entity Tags: Larry D. Thompson, North American Aerospace Defense Command, Richard B. Myers, Richard Armitage, John Ashcroft, Robert S. Mueller III, Richard A. Clarke, Henry Hugh Shelton, Jane Garvey, Donald Rumsfeld, 9/11 Commission, George J. Tenet, Colin Powell, Condoleezza Rice

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

White House press secretary Ari Fleischer tells reporters traveling with President Bush that the administration received no warnings of the terrorist attacks that occurred this morning. During a press briefing on Air Force One after the plane takes off from Barksdale Air Force Base (see 1:37 p.m. September 11, 2001), a reporter asks if Bush knows “anything more” about who is responsible for the attacks on the World Trade Center and the Pentagon. “That information is still being gathered and analyzed,” Fleischer replies. Fleischer is then asked, “Had there been any warnings that the president knew of?” to which he answers, simply, “No warnings.” He is then asked if Bush is “concerned about the fact that this attack of this severity happened with no warning?” In response, Fleischer changes the subject and fails to answer the question. In the coming days and weeks, senior administration officials, including Bush and Vice President Dick Cheney, will similarly say there was “no specific threat” of the kind of attack that happened today. [White House, 9/11/2001; New York Times, 5/18/2002] The 9/11 Commission Report, however, will note, “Most of the intelligence community recognized in the summer of 2001 that the number and severity of threat reports were unprecedented.” On August 6, Bush in fact received a Presidential Daily Brief that included an article titled, “Bin Laden Determined to Strike in US” (see August 6, 2001). [9/11 Commission, 7/24/2004, pp. 260, 262] All the same, Fleischer will say in May 2002 that the answer he gave to reporters today, stating that there were no warnings of the attacks, was appropriate. “Flying on Air Force One, with the destruction of the attacks still visible on the plane’s TV sets, the only way to interpret that question was that it related to the attacks that we were in the midst of,” he will say. [New York Times, 5/18/2002] And according to the 9/11 Commission Report, “Despite their large number, the threats received [in the summer of 2001] contained few specifics regarding time, place, method, or target.” The report will state, therefore, that the 9/11 Commission “cannot say for certain whether these reports, as dramatic as they were, related to the 9/11 attacks.” [9/11 Commission, 7/24/2004, pp. 262-263]

Entity Tags: George W. Bush, Ari Fleischer

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Shortly after the 9/11 attacks, the NSA expands surveillance operations, relying on its own authorities; some sources indicate this includes a massive domestic data mining and call tracking program, and some contend that it is illegal. In a 2006 public briefing, NSA Director Michael Hayden will say, “In the days after 9/11, NSA was using its authorities and its judgment to appropriately respond to the most catastrophic attack on the homeland in the history of the nation.” Following an October 1 briefing by Hayden to the House Intelligence Committee, Representative Nancy Pelosi (D-CA) will write to Hayden on October 11, saying, “[Y]ou indicated that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance” (see October 11, 2001). Some evidence indicates NSA domestic surveillance began even before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Nancy Pelosi, 1/6/2006; Michael Hayden, 1/23/2006]
No Connection to Bush-Authorized Warrantless Domestic Call Monitoring - In his 2006 remarks, Hayden will clearly distinguish between the expansion he initiates under his own authorities, and the warrantless monitoring of calls with one end outside the US authorized later by President Bush (see October 4, 2001), saying, “[E]xcept that they involved NSA, these [Hayden-authorized] programs were not related… to the authorization that the president has recently spoken about.” [Michael Hayden, 1/23/2006]
'Stellar Wind' Is Name of Hayden-Authorized Program - In 2012 interviews, former NSA official William Binney will indicate that “Stellar Wind” is the name of the surveillance program initiated by Hayden. [Wired News, 2/15/2012; Democracy Now!, 4/20/2012] Some sources will refer to the Bush-authorized eavesdropping as being part of the Stellar Wind program. [Newsweek, 12/22/2008]
Differing Views on Authority for Surveillance - In his 2006 briefing, Hayden will say the Fourth Amendment only protects Americans against “unreasonable search and seizure,” and that 9/11 changed what was to be considered “reasonable.” Specifically, if communications are believed to have “[i]nherent foreign intelligence value,” interception of these communications is reasonable. In addition to referring to Hayden’s “view of [his] authorities” as “expansive,” Pelosi’s letter will give another indication that the NSA’s new standard is significantly broader than it was previously, stating, “You indicated that you were treating as a matter of first impression, [redacted] being of foreign intelligence interest.” Hayden will publicly clarify in 2006 that the authority for the NSA’s operational expansion exists under an Executive Order issued by President Reagan, saying, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” And, he will say, “I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities” (see October 1, 2001). In her October 11 letter, Pelosi will also write of having concerns about the program that haven’t been resolved due to restrictions on information-sharing with Congress imposed by Bush (see October 11, 2001). Binney, who pioneered the development of certain NSA data mining and surveillance technologies, will come to believe that what the NSA is doing is unconstitutional; he will first take his concerns to Congress (see Before October 31, 2001) and then resign on October 31 (see October 31, 2001). [Nancy Pelosi, 1/6/2006; Michael Hayden, 1/23/2006]
Surveillance Involves Domestic Communications - In his 2006 remarks, Hayden will not say the NSA is only targeting foreign communications under his post-9/11 authorization. Rather, the context of his remarks will indicate he is referring to domestic communications. More specifically, Hayden will state: “If the US person information isn’t relevant, the data is suppressed. It’s a technical term we use; we call it ‘minimized.’ The individual is not even mentioned. Or if he or she is, he or she is referred to as ‘US Person Number One’ or ‘US Person Number Two.’ Now, inherent intelligence value. If the US person is actually the named terrorist, well, that could be a different matter.” Hayden will also reveal that information is being passed to the FBI, an investigative agency with a primarily domestic jurisdiction, saying, “[A]s another part of our adjustment, we also turned on the spigot of NSA reporting to FBI in, frankly, an unprecedented way.” [Michael Hayden, 1/23/2006] One of Pelosi’s statements in her letter to Hayden may indicate an aspect of the domestic component: “You indicated that you were treating as a matter of first impression, [redacted] being of foreign intelligence interest,” she will write. [Nancy Pelosi, 1/6/2006] In a 2011 interview with Jane Mayer published in the New Yorker, Binney will say the NSA was obtaining “billing records on US citizens” and “putting pen registers [call logs] on everyone in the country.” [New Yorker, 5/23/2011] And in a 2012 Wired article, NSA expert James Bamford will write that Binney “explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore. If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law. Instead it chose to put the wiretapping rooms at key junction points throughout the country—large, windowless buildings known as switches—thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US.” Binney’s account is supported by other sources (see October 2001). [Wired News, 2/15/2012]
Surveillance Program Is Massive - Bamford, citing Binney, will write: “Stellar Wind… included not just eavesdropping on domestic phone calls but the inspection of domestic email. At the outset the program recorded 320 million calls a day, he says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” It is unclear exactly when this level of surveillance began. According to whistleblower AT&T employee Mark Klein, construction of secret rooms splitting communications traffic does not begin until Fall 2002 (see Fall 2002). Bamford will write that Binney says, “[T]he taps in the secret rooms dotting the country are actually powered by highly sophisticated software programs that conduct ‘deep packet inspection,’ examining Internet traffic as it passes through the 10-gigabit-per-second cables at the speed of light.” [Wired News, 2/15/2012] Also, Binney’s remark to Jane Mayer that the NSA was “putting pen registers on everyone in the country” indicates the broad scope of the program. [New Yorker, 5/23/2011]

Entity Tags: Religious Society of Friends (Quakers), US Department of Justice, National Security Agency, George W. Bush, Michael Hayden, Al-Qaeda, Foreign Intelligence Surveillance Court, House Intelligence Committee, Nancy Pelosi, Ronald Reagan

Timeline Tags: Civil Liberties

NSA director Michael Hayden addresses the NSA in a global videoconference, saying that the NSA, like other government agencies, will have to do more to protect the country from further terrorist attacks. The challenge, he says, is to balance Americans’ security with civil liberties, “to keep America free by making Americans feel safe again.” Hayden will say in a 2006 speech reflecting on that videoconference (see January 23, 2006) that US citizens operate under misconceptions about the NSA’s capabilities—that while citizens believe the NSA has a global electronic surveillance network that can, and does, spy on citizens willy-nilly, in reality the NSA is understaffed and unprepared to handle the technological advances of the last decade. Hayden will say that with more extensive domestic surveillance of US citizens and foreign visitors, the NSA could have caught some of the 9/11 hijackers before they were able to put their plan into motion. The standards by which US citizens and foreign visitors are monitored must change, Hayden believes.
Expansion of NSA Surveillance Powers - Using Ronald Reagan’s 1981 executive order 12333 (see December 4, 1981), Hayden expands the NSA’s domestic surveillance practices to eavesdrop, sometimes without court approval, on selected international calls made by US citizens. Though Hayden’s expansion of NSA surveillance is not directly authorized by President Bush, and is not the same program as authorized by Bush’s secret executive order of 2002 (see Early 2002), Hayden will later say that this expansion is based on the intelligence community’s assessment “of a serious and continuing threat to the homeland.” Hayden’s program is reviewed and approved by lawyers at the NSA, the Justice Department, and the White House, as well as Attorney General John Ashcroft. [Michael Hayden, 1/23/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, US Department of Justice, National Security Agency, John Ashcroft, George W. Bush, Bush administration (43), Ronald Reagan, Michael Hayden

Timeline Tags: Civil Liberties

Khalil bin Laden at the Orlando, Florida, airport, about to be flown out of the country in the days after 9/11.Khalil bin Laden at the Orlando, Florida, airport, about to be flown out of the country in the days after 9/11. [Source: Lions Gate Films]Following a secret flight inside the US that is in violation of a national private airplane flight ban, members of the bin Laden family and Saudi royalty quietly depart the US. The flights are only publicly acknowledged after all the Saudis have left. [Boston Globe, 9/21/2001; New York Times, 9/30/2001] About 140 Saudis, including around 24 members of the bin Laden family, are passengers in these flights. The identities of most of these passengers are not known. However, some of the passengers include:
bullet The son of the Saudi Defense Minister Prince Sultan. Sultan is sued in August 2002 for alleged complicity in the 9/11 plot. [Tampa Tribune, 10/5/2001] He is alleged to have contributed at least $6 million since 1994 to four charities that finance al-Qaeda. [Vanity Fair, 10/2003]
bullet Khalil bin Laden. He has been investigated by the Brazilian government for possible terrorist connections. [Vanity Fair, 10/2003]
bullet Abdullah bin Laden and Omar bin Laden, cousins of bin Laden. Abdullah was the US director of the Muslim charity World Assembly of Muslim Youth (WAMY). The governments of India, Pakistan, Philippines, and Bosnia have all accused WAMY of funding terrorism. These two relatives were investigated by the FBI in 1996 (see February-September 11, 1996) in a case involving espionage, murder, and national security. Their case is reopened on September 19, right after they leave the country. [Vanity Fair, 10/2003] Remarkably, four of the 9/11 hijackers briefly lived in the town of Falls Church, Virginia, three blocks from the WAMY office headed by Abdullah bin Laden. [BBC, 11/6/2001]
bullet Saleh Ibn Abdul Rahman Hussayen. He is a prominent Saudi official who was in the same hotel as three of the hijackers the night before 9/11. He leaves on one of the first flights to Saudi Arabia before the FBI can properly interview him about this. [Washington Post, 10/2/2003]
bullet Akberali Moawalla. A Pakistani and business partner of Osama’s brother Yeslam bin Laden. In 2000, a transfer of over $250 million was made from a bank account belonging jointly to Moawalla and Osama bin Laden (see 2000). [Washington Post, 7/22/2004]
There is a later dispute regarding how thoroughly the Saudis are interviewed before they leave and who approves the flights. Counterterrorism “tsar” Richard Clarke says he agrees to the flights after the FBI assures him none of those on board has connections to terrorism and that it is “a conscious decision with complete review at the highest levels of the State Department and the FBI and the White House.” [US Congress, 9/3/2003] Clarke says the decision to approve the flights “didn’t get any higher than me.” [Hill, 5/18/2004] According to Vanity Fair, both the FBI and the State Department “deny playing any role whatsoever in the episode.” However, Dale Watson, the head of the FBI’s Counterterrorism Division, says the Saudis on the planes “[are] identified, but they [are] not subject to serious interviews or interrogations” before they leave. [Vanity Fair, 10/2003] An FBI spokesperson says the bin Laden relatives are only interviewed by the FBI “at the airport, as they [are] about to leave.” [National Review, 9/11/2002] There are claims that some passengers are not interviewed by the FBI at all. [Vanity Fair, 10/2003] Abdullah bin Laden, who stays in the US, says that even a month after 9/11, his only contact with the FBI is a brief phone call. [Boston Globe, 9/21/2001; New Yorker, 11/5/2001] The FBI official responsible for coordinating with Clarke is Assistant Director Michael Rolince, who is in charge of the Bureau’s International Terrorism Operations Section and assumes responsibility for the Saudi flights. Rolince decides that the Saudis can leave after their faces are matched to their passport photos and their names are run through various databases, including some watch lists, to check the FBI has no derogatory information about them.” [9/11 Commission, 8/21/2004, pp. 196-197, 209 pdf file] Numerous experts are surprised that the bin Ladens are not interviewed more extensively before leaving, pointing out that interviewing the relatives of suspects is standard investigative procedure. [National Review, 9/11/2002; Vanity Fair, 10/2003] MSNBC claims that “members of the Saudi royal family met frequently with bin Laden—both before and after 9/11” [MSNBC, 9/5/2003] , and many Saudi royals and bin Laden relatives are being sued for their alleged role in 9/11. The Boston Globe opines that the flights occur “too soon after 9/11 for the FBI even to know what questions to ask, much less to decide conclusively that each Saudi [royal] and bin Laden relative [deserve] an ‘all clear,’ never to be available for questions again.” [Boston Globe, 9/30/2003] Senator Charles Schumer (D-NY) says of the secret flights: “This is just another example of our country coddling the Saudis and giving them special privileges that others would never get. It’s almost as if we didn’t want to find out what links existed.” [New York Times, 9/4/2003] Judicial Watch will disclose FBI documents that say, “Osama bin Laden may have chartered one of the Saudi flights.” [Judicial Watch, 6/20/2007]

Entity Tags: Abdullah bin Laden, Al-Qaeda, Bush administration (43), Omar bin Laden, Bin Laden Family, Dale Watson, Charles Schumer, Michael Rolince, Richard A. Clarke, Federal Bureau of Investigation, Counterterrorism Division (FBI), Osama bin Laden, World Assembly of Muslim Youth, Sultan bin Abdul Aziz Al Saud, US Department of State, Khalil bin Laden, Saleh Ibn Abdul Rahman Hussayen

Timeline Tags: Complete 911 Timeline

On numerous occasions, key members of the Bush administration refer to 9/11 as an “opportunity.” [New Statesman, 12/16/2002]
bullet During a news conference on September 19, President Bush says: “[I]n terms of foreign policy and in terms of the world, this horrible tragedy has provided us with an interesting opportunity. One of the opportunities is in the Middle East.” He continues: “[T]his government, working with Congress, are going to seize the moment. Out of our tears, I said I see opportunity, and we will seek opportunity, positive developments from this horrible tragedy that has befallen our nation.” [White House, 9/19/2001]
bullet Secretary of Defense Donald Rumsfeld tells the New York Times: “[I]s it possible that what took place on September 11th… that maybe out of this tragedy comes opportunity? Maybe… the world will sufficiently register the danger that exists on the globe and have this event cause the kind of sense of urgency and offer the kind of opportunities that World War II offered, to refashion much of the world.” [New York Times, 10/12/2001]
bullet In March 2002, National Security Adviser Condoleezza Rice tells the New Yorker “that she had called together the senior staff people of the National Security Council and asked them to think seriously about ‘how do you capitalize on these opportunities’ to fundamentally change American doctrine, and the shape of the world, in the wake of September 11th.” [New Yorker, 4/1/2002] In a speech the following month, she says: “[I]f the collapse of the Soviet Union and 9/11 bookend a major shift in international politics, then this is a period not just of grave danger, but of enormous opportunity. Before the clay is dry again, America and our friends and our allies must move decisively to take advantage of these new opportunities. This is, then, a period akin to 1945 to 1947, when American leadership expanded the number of free and democratic states—Japan and Germany among the great powers—to create a new balance of power that favored freedom.” [White House, 4/29/2002]
bullet President Bush’s National Security Strategy, published in September 2002 (see September 20, 2002), states, “The events of September 11, 2001, fundamentally changed the context for relations between the United States and other main centers of global power, and opened vast, new opportunities.” [US President, 9/2002]
As early as the evening of 9/11 itself, Bush had referred to the political situation resulting from the attacks as a “great opportunity” (see (Between 9:30 p.m. and 10:00 p.m.) September 11, 2001). [Woodward, 2002, pp. 31-32]

Entity Tags: Donald Rumsfeld, George W. Bush, Condoleezza Rice

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Technical Sergeant James Tollack, an officer from McGuire Air Force Base in New Jersey, is tasked with transcribing tape recordings from September 11 of the operations floor at NORAD’s Northeast Air Defense Sector (NEADS) in Rome, New York. [9/11 Commission, 3/22/2004; 9/11 Commission, 7/29/2004; Farmer, 2009, pp. 274] On September 11, NEADS was responsible for coordinating the US military’s response to the hijackings. In a corner of its operations floor, four Dictaphone multi-channel tape recorders were recording every radio channel. [Vanity Fair, 8/1/2006; Shenon, 2008, pp. 203-204] Tollack will later say that NEADS Technical Sergeant Jeremy Powell maybe tells him that personnel at NEADS have already listened to the tapes prior to his arrival there.
Digital Recording Expert Spends Two Weeks Working on Transcripts - Tollack is the resident expert in digital voice recording systems at McGuire Air Force Base and also has experience of doing transcription work. He arrives at NEADS on September 20 and stays there for 11 to 14 days, leaving on either October 1 or October 4. His first day at NEADS is spent on orientation, and so September 21 is his first full day of transcribing. Tollack will later recall that Colonel Robert Marr, the battle commander at NEADS, probably advises him to only transcribe the tapes from September 11 up to around 10:15 a.m., which is about 10 minutes after the fourth hijacked plane, Flight 93, crashed in Pennsylvania. For his first few days at NEADS, Tollack spends 14 to 16 hours per day working on the task. He works at a desk on the operations floor, drafting notes by hand and then typing them out with the assistance of two secretaries.
Transcripts Needed for Investigations - Tollack works directly for Marr, and also reports to Lieutenant Colonel Dawne Deskins, the assistant director of the Sector Operations Control Center. Marr tells Tollack that the transcripts of the tapes are required for investigation purposes. General Ralph Eberhart, the commander of NORAD, tells Tollack the information is needed for a Congressional report or hearing (see (Between September 23 and September 24, 2001)).
Tollack's Work Not Reviewed - While Tollack is at NEADS, no one there reviews his work as he goes through the tapes. [9/11 Commission, 3/22/2004] On September 21, one of the tapes is damaged during the transcription process, causing information on it to be lost (see September 21, 2001). [North American Aerospace Defense Command, 9/21/2001]
9/11 Commission Not Initially Made Aware of NEADS Tapes - During its investigation of the September 11 attacks, the 9/11 Commission will only learn of the existence of the recordings of the NEADS operations floor in late October 2003 (see Late October 2003), and it subsequently subpoenas NORAD for the tapes (see November 6, 2003). Despite the efforts of Tollack, according to journalist and author Philip Shenon, by the time the Commission receives the tapes, around December 2003, NORAD has still “not prepared transcripts itself” of the tapes’ contents. [Kean and Hamilton, 2006, pp. 86-88; Shenon, 2008, pp. 203-208]

Entity Tags: Dawne Deskins, Jeremy Powell, James D. Tollack, Ralph Eberhart, Northeast Air Defense Sector, Robert Marr

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

John Yoo, a deputy assistant attorney general in the Department of Justice (DOJ) Office of Legal Counsel (OLC), issues a legal opinion that says the US can conduct electronic surveillance against its citizens without probable cause or warrants. According to the memo, the opinion was drafted in response to questions about whether it would be constitutional to amend the Foreign Intelligence Surveillance Act (FISA) to state that searches may be approved when foreign intelligence collection is “a purpose” of the search, rather than “the purpose.” Yoo finds this would be constitutional, but goes further. He asserts that FISA is potentially in conflict with the Constitution, stating, “FISA itself is not required by the Constitution, nor is it necessarily the case that its current standards match exactly to Fourth Amendment standards.” Citing Vernonia School Dist. 47J v. Acton, in which the Supreme Court found that warrantless searches of students were permissible, Yoo argues that “reasonableness” and “special needs” are also the standards according to which warrantless monitoring of the private communications of US persons is permissible. According to Yoo, the Fourth Amendment requirement for probable cause and warrants prior to conducting a search pertain primarily to criminal investigations, and in any case cannot be construed to restrict presidential responsibility and authority concerning national security. Yoo further argues that in the context of the post-9/11 world, with the threat posed by terrorism and the military nature of the fight against terrorism, warrantless monitoring of communications is reasonable. Some information indicates the NSA began a broad program involving domestic surveillance prior to the 9/11 attacks, which contradicts the claim that the program began after, and in response to, the attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [US Department of Justice, 9/25/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Inspectors General, 7/10/2009]
Yoo Memo Used to Support Legality of Warrantless Surveillance - Yoo’s memo will be cited to justify the legality of the warrantless domestic surveillance program authorized by President Bush in October 2001 (see October 4, 2001). NSA Director General Michael Hayden, in public remarks on January 23, 2006, will refer to a presidential authorization for monitoring domestic calls having been given prior to “early October 2001.” Hayden will also say, “The lawfulness of the actual authorization was reviewed by lawyers at the Department of Justice and the White House and was approved by the attorney general.” The various post-9/11 NSA surveillance activities authorized by Bush will come to be referred to as the President’s Surveillance Program (PSP), and the first memo directly supporting the program’s legality will be issued by Yoo on November 2, 2001, after the program has been initiated (see November 2, 2001). Many constitutional authorities will reject Yoo’s legal rationale. [Michael Hayden, 1/23/2006]
Yoo Memo Kept Secret from Bush Officials Who Might Object - According to a report by Barton Gellman and Jo Becker in the Washington Post, the memo’s “authors kept it secret from officials who were likely to object,” including ranking White House national security counsel John Bellinger, who reports to National Security Adviser Condoleezza Rice. Bellinger’s deputy, Bryan Cunningham, will tell the Post that Bellinger would have recommended having the program vetted by the Foreign Intelligence Surveillance Court, which oversees surveillance under FISA. Gellman and Becker quote a “senior government lawyer” as saying that Vice President Dick Cheney’s attorney, David Addington, had “open contempt” for Bellinger, and write that “more than once he accused Bellinger, to his face, of selling out presidential authority for good ‘public relations’ or bureaucratic consensus.” [Washington Post, 6/24/2007]

Entity Tags: US Department of Justice, John Bellinger, National Security Agency, Bryan Cunningham, Condoleezza Rice, David S. Addington, Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, Office of Legal Counsel (DOJ), John C. Yoo, George W. Bush, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

According to author Ronald Kessler’s November 2007 book The Terrorist Watch, the NSA’s domestic surveillance program begins around two weeks after the 9/11 attacks, when President Bush meets with NSA director Michael Hayden and other NSA officials in the Oval Office. According to chief of staff Andrew Card, in attendance, Bush asks, “What tools do we need to fight the war on terror?” Hayden suggests revamping NSA guidelines to allow the agency to wiretap domestic phone calls and intercept e-mails to and from terror suspects if one end of the communication is overseas. Kessler gives the following rather lurid example: “Thus, if [Osama] bin Laden were calling the US to order the detonation of a nuclear device, and the person he called began making overseas calls, NSA could listen in to those calls as well as to bin Laden’s original call.” Kessler is a chief correspondent for the extremist conservative Web site NewsMax; his assertion is disputed by evidence suggesting that the domestic surveillance program began well before the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Kessler, 2007, pp. 130]

Entity Tags: National Security Agency, Andrew Card, Michael Hayden, Ronald Kessler, George W. Bush

Timeline Tags: Civil Liberties

Former AT&T employee Mark Klein.Former AT&T employee Mark Klein. [Source: PBS]The National Security Agency, as part of its huge, covert, and possibly illegal wiretapping program directed at US citizens (see Spring 2001 and After September 11, 2001), begins collecting telephone records of tens of millions of Americans, using data provided by telecommunications firms such as AT&T, Verizon, and BellSouth (see February 5, 2006). The media will not report on this database until May 2006 (see May 11, 2006). The program collects information on US citizens not suspected of any crime or any terrorist connections. Although informed sources say the NSA is not listening to or recording actual conversations, the agency is using the data to analyze calling patterns in an effort to detect terrorist activity. “It’s the largest database ever assembled in the world,” says one anonymous source. The NSA intends “to create a database of every call ever made.” As a result, the NSA has detailed records of the phone activities of tens of millions of US citizens, from local calls to family and friends to international calls. The three telecommunications companies are working with the NSA in part under the Communications Assistance Act for Law Enforcement (CALEA) (see January 1, 1995 and June 13, 2006) and in part under contract to the agency.
Surveillance Much More Extensive Than Acknowledged - The wiretapping program, which features electronic surveillance of US citizens without court warrants or judicial oversight, is far more extensive than anything the White House or the NSA has ever publicly acknowledged. President Bush will repeatedly insist that the NSA focuses exclusively on monitoring international calls where one of the call participants is a known terrorist suspect or has a connection to terrorist groups (see December 17, 2005 and May 11, 2006), and he and other officials always insist that domestic calls are not monitored. This will be proven false. The NSA has become expert at “data mining,” sifting through reams of information in search of patterns. The warrantless wiretapping database is one source of information for the NSA’s data mining. As long as the NSA does not collect “personal identifiers”—names, Social Security numbers, street addresses, and the like—such data mining is legal. But the actual efficacy of the wiretapping program in learning about terrorists and possibly preventing terrorist attacks is unclear at best. And many wonder if the NSA is not repeating its activities from the 1950s and 1960s, when it conducted “Operation Shamrock” (see 1945-1975), a 20-year program of warrantless wiretaps of international phone calls at the behest of the CIA and other intelligence agencies. Operation Shamrock, among other things, led to the 1978 passage of the Foreign Intelligence Surveillance Act (see 1978). [USA Today, 5/11/2006] In May 2006, former NSA director Bobby Ray Inman will say, “[T]his activity is not authorized” (see May 12, 2006). [Democracy Now!, 5/12/2006]
Secret Data Mining Center - In May 2006, retired AT&T technician Mark Klein, a 22-year veteran of the firm, will file a court affidavit saying that he saw the firm construct a secret data-mining center in its San Francisco switching center that would let the NSA monitor domestic and international communications (see January 2003). And former AT&T workers say that, as early as 2002, AT&T has maintained a secret area in its Bridgeton, Missouri, facility that is likely being used for NSA surveillance (see Late 2002-Early 2003).
Domestic Surveillance Possibly Began Before 9/11 - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, Verizon Communications, Mark Klein, George W. Bush, AT&T, BellSouth, Central Intelligence Agency, Communications Assistance for Law Enforcement Act (CALEA), Foreign Intelligence Surveillance Act, Qwest, National Security Agency

Timeline Tags: Civil Liberties

Tony Blair presenting evidence on October 4, 2001.Tony Blair presenting evidence on October 4, 2001. [Source: Associated Press]British Prime Minister Tony Blair publicly presents a paper containing evidence that al-Qaeda is responsible for the 9/11 attacks. [Los Angeles Times, 10/4/2001; Los Angeles Times, 10/5/2001] Secretary of State Powell and other US officials had promised on September 23 that the US would present a paper containing such evidence. [Los Angeles Times, 9/24/2001] However, the US paper is never released (see September 23-24, 2001). Apparently, the British paper is meant to serve as a substitute. [New Yorker, 5/27/2002] It begins, “This document does not purport to provide a prosecutable case against Osama bin Laden in a court of law.” Nevertheless, it continues, “on the basis of all the information available [Her Majesty’s Government] is confident of its conclusions as expressed in this document.” [BBC, 10/4/2001] In his speech, Blair claims, “One of bin Laden’s closest lieutenants has said clearly that he helped with the planning of the September 11 attacks and admitted the involvement of the al-Qaeda organization” and that “there is other intelligence, we cannot disclose, of an even more direct nature indicating guilt” of al-Qaeda in the attacks. [CNN, 10/4/2001; Time, 10/5/2001] There has been no confirmation or details since of these claims. Even though most of the evidence in the British paper comes from the US, pre-attack warnings, such as the August 6, 2001 memo (see August 6, 2001) to Bush titled “Bin Laden Determined to Strike in US,” are not included. In fact, Blair’s paper states, “incorrectly, that no such information had been available before the attacks: ‘After 11 September we learned that, not long before, bin Laden had indicated he was about to launch a major attack on America.’” [New Yorker, 5/27/2002]

Entity Tags: Al-Qaeda, Colin Powell, Tony Blair, Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Nancy Pelosi.Nancy Pelosi. [Source: US Congress]House Minority Leader Nancy Pelosi (D-CA) writes to NSA Director Michael Hayden questioning the nature and extent of the apparently illegal warrantless wiretapping of US citizens by the agency. Pelosi and other members of the House Intelligence Committee were briefed on October 1, 2001, by Hayden, whose agency began conducting surveillance against US citizens after the 9/11 attacks (see After September 11, 2001). Pelosi will release the letter on January 6, 2006, three weeks after the New York Times revealed that the NSA had been conducting electronic surveillance of US citizens without warrants since at least 2002 (see December 15, 2005.) Pelosi’s office will also release Hayden’s response, but almost the entire letter from Hayden is redacted.
Letter to Hayden - Pelosi writes in part, “[Y]ou indicated [in the briefing] that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance under the Foreign Intelligence Surveillance Act and related statutes, orders, regulations, and guidelines.… For several reasons, including what I consider to be an overly broad interpretation of President Bush’s directive of October 5 on sharing with Congress ‘classified or sensitive law enforcement information’ it has not been possible to get answers to my questions. Without those answers, the concerns I have about what you said on the First can not be resolved, and I wanted to bring them to your attention directly. You indicated that you were treating as a matter of first impression, [redacted ] being of foreign intelligence interest. As a result, you were forwarding the intercepts, and any information [redacted ] without first receiving a request for that identifying information to the Federal Bureau of Investigation. Although I may be persuaded by the strength of your analysis [redacted ] I believe you have a much more difficult case to make [redacted ] Therefore, I am concerned whether, and to what extent, the National Security Agency has received specific presidential authorization for the operations you are conducting. Until I understand better the legal analysis regarding the sufficiency of the authority which underlies your decision on the appropriate way to proceed on this matter, I will continue to be concerned.” The only portion of Hayden’s October 18 reply regarding Pelosi’s concerns that has not been redacted reads, “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” In January 2006, an NSA official will say that Pelosi’s concerns were adequately addressed in Hayden’s reply, and in a private briefing shortly thereafter. [Washington Post, 1/4/2006; Nancy Pelosi, 1/6/2006]
Pelosi Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). Pelosi is apparently unaware of any of this.

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi

Timeline Tags: Civil Liberties

NSA Director Michael Hayden responds to an October 11 letter from Representative Nancy Pelosi (see October 11, 2001), expressing concerns about the NSA’s post-9/11 surveillance expansion (see After September 11, 2001) that Hayden outlined for the House Intelligence Committee on October 1 (see October 1, 2001), and asking whether the president authorized it. The substance of Hayden’s October 18 reply will be redacted, except for this statement: “In my briefing, I was attempting to emphasize that I used my authorities to adjust NSA’s collection and reporting.” [Nancy Pelosi, 1/6/2006] A January 4, 2006 report in the Washington Post will cite “intelligence official close to Hayden” as saying that “[Hayden’s] appearance on Oct. 1, 2001, before the House committee had been to discuss Executive Order 12333, and not the new NSA program,” and that “Pelosi’s concerns had been answered in writing and again several weeks later during a private briefing.” [Washington Post, 1/4/2006] In a January 23, 2006 public briefing, Hayden will say, “September 2001, I asked to update the Congress on what NSA had been doing, and I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities,” and, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” [Michael Hayden, 1/23/2006]
Nature of Hayden's EO 12333 Surveillance Program - The full scope of Hayden’s surveillance program is unclear, but some sources indicate it includes the wholesale collection and data-mining of phone records provided by telecom companies and placement of pen registers (call trackers) on domestic phone numbers (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, October 2001), and October 31, 2001). Some sources indicate the NSA began large-scale domestic surveillance activities prior to the 9/11 attacks (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Michael Hayden, House Intelligence Committee, Nancy Pelosi, National Security Agency

Timeline Tags: Civil Liberties

John Yoo, a deputy assistant attorney general in the Justice Department’s Office of Legal Counsel, and OLC special counsel Robert Delahunty issue a joint memo to White House counsel Alberto Gonzales. The memo claims that President Bush has sweeping extraconstitutional powers to order military strikes inside the US if he says the strikes are against suspected terrorist targets. In the days following the 9/11 attacks, Gonzales asked if Bush could legally order the military to combat potential terrorist activity within the US. The memo is first revealed to exist seven years later (see April 2, 2008) after future OLC head Steven Bradbury acknowledges its existence to the American Civil Liberties Union; it will be released two months after the Bush administration leaves the White House (see March 2, 2009). [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009]
Granting Extraordinary, Extraconstitutional Authority to Order Military Actions inside US - Yoo and Delahunty’s memo goes far past the stationing of troops to keep watch at airports and around sensitive locations. Instead, the memo says that Bush can order the military to conduct “raids on terrorist cells” inside the US, and even to seize property. “The law has recognized that force (including deadly force) may be legitimately used in self-defense,” they write. In 2009, Reuters will write, “The US military could have kicked in doors to raid a suspected terrorist cell in the United States without a warrant” under the findings of the OLC memo. “We do not think that a military commander carrying out a raid on a terrorist cell would be required to demonstrate probable cause or to obtain a warrant,” Yoo and Delahunty write. [US Department of Justice, 10/23/2001 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009] The memo reasons that since 9/11, US soil can be legally construed as being a battlefield, and Congress has no power to restrict the president’s authority to confront enemy tactics on a battlefield. [Savage, 2007, pp. 131]
No Constitutional or Other Legal Protections - “[H]owever well suited the warrant and probable cause requirements may be as applied to criminal investigations or to other law enforcement activities, they are unsuited to the demands of wartime and the military necessity to successfully prosecute a war against an enemy. [Rather,] the Fourth Amendment does not apply to domestic military operations designed to deter and prevent foreign terrorist attacks.” Any objections based on the Fourth Amendment’s ban on unreasonable search and seizures would be invalid since whatever possible infringement on privacy would be trumped by the need to protect the nation from injury by deadly force. The president is “free from the constraints of the Fourth Amendment.” The Posse Comitatus Act, which bars the military from operating inside the US for law enforcement purposes, is also moot, the memo says, because the troops would be acting in a national security function, not as law enforcement. [US Department of Justice, 10/23/2001 pdf file; American Civil Liberties Union [PDF], 1/28/2009 pdf file; New York Times, 3/2/2009; Reuters, 3/2/2009; Ars Technica, 3/2/2009] There are virtually no restrictions on the president’s ability to use the military because, Yoo and Delahunty write, the nation is in a “state of armed conflict.” The scale of violence, they argue, is unprecedented and “legal and constitutional rules” governing law enforcement, even Constitutional restrictions, no longer apply. The US military can be used for “targeting and destroying” hijacked airplanes, they write, or “attacking civilian targets, such as apartment buildings, offices, or ships where suspected terrorists were thought to be.” The memo says, “Military action might encompass making arrests, seizing documents or other property, searching persons or places or keeping them under surveillance, intercepting electronic or wireless communications, setting up roadblocks, interviewing witnesses, or searching for suspects.” [Newsweek, 3/2/2009] Yoo writes that the Justice Department’s criminal division “concurs in our conclusion” that federal criminal laws do not apply to the military during wartime. The criminal division is headed by Michael Chertoff, who will become head of the Department of Homeland Security. [Washington Post, 4/4/2008]
Sweeping Away Constitutional Rights - Civil litigator Glenn Greenwald will later note that the memo gives legal authorization for President Bush to deploy the US military within US borders, to turn it against foreign nationals and US citizens alike, and to render the Constitution’s limits on power irrelevant and non-functional. Greenwald will write, “It was nothing less than an explicit decree that, when it comes to presidential power, the Bill of Rights was suspended, even on US soil and as applied to US citizens.”
Justifying Military Surveillance - Greenwald will note that the memo also justifies the administration’s program of military surveillance against US citizens: “[I]t wasn’t only a decree that existed in theory; this secret proclamation that the Fourth Amendment was inapplicable to what the document calls ‘domestic military operations’ was, among other things, the basis on which Bush ordered the NSA, an arm of the US military, to turn inwards and begin spying—in secret and with no oversight—on the electronic communications (telephone calls and emails) of US citizens on US soil” (see December 15, 2005 and Spring 2004). “If this isn’t the unadorned face of warped authoritarian extremism,” Greenwald will ask, “what is?” [Salon, 3/3/2009] If the president decides to use the military’s spy agency to collect “battlefield intelligence” on US soil, no law enacted by Congress can regulate how he goes about collecting that information, including requiring him to get judicial warrants under the Foreign Intelligence Surveillance Act (FISA). In 2007, Yoo will say in an interview: “I think there’s a law greater than FISA, which is the Constitution, and part of the Constitution is the president’s commander in chief power. Congress can’t take away the president’s powers in running war.” [Savage, 2007, pp. 131; PBS Frontline, 5/15/2007] Cheney and Addington will push the NSA to monitor all calls and e-mails, including those beginning and ending on US soil, but the NSA will balk. Domestic eavesdropping without warrants “could be done and should be done,” Cheney and Addington argue, but the NSA’s lawyers are fearful of the legal repercussions that might follow once their illegal eavesdropping is exposed, with or without the Justice Department’s authorization. The NSA and the White House eventually reach a compromise where the agency will monitor communications going in and out of the US, but will continue to seek warrants for purely domestic communications (see Spring 2001, After September 11, 2001, and October 2001). [Savage, 2007, pp. 131]
Military Use Considered - In 2009, a former Bush administration lawyer will tell a reporter that the memo “gave rise to the Justice Department discussing with the Defense Department whether the military could be used to arrest people and detain people inside the United States. That was considered but rejected on at least one occasion.” The lawyer will not give any indication of when this will happen, or to whom. Under the proposal, the suspects would be held by the military as “enemy combatants.” The proposal will be opposed by the Justice Department’s criminal division and other government lawyers and will ultimately be rejected; instead, the suspects will be arrested under criminal statutes. [Los Angeles Times, 3/3/2009]

Entity Tags: Steven Bradbury, US Department of Homeland Security, US Department of Defense, Robert J. Delahunty, Office of Legal Counsel (DOJ), Bush administration (43), Michael Chertoff, Alberto R. Gonzales, National Security Agency, American Civil Liberties Union, Glenn Greenwald, George W. Bush, US Department of Justice, John C. Yoo

Timeline Tags: Civil Liberties

Vice President Dick Cheney summons the chairmen and ranking members of the Senate and House Intelligence Committees to the White House for a classified briefing on the secret NSA warrantless wiretapping program (see Early 2002). Cheney makes it clear to the lawmakers that he is merely informing them about the program, and not seeking their approval. [Washington Post, 12/18/2005] Officials later say that under any of the previous presidents, such a meeting of this import would involve the president. But the four lawmakers are hustled away from the Oval Office. Instead, “[w]e met in the vice president’s office,” Bob Graham (D-FL), the chairman of the Senate Intelligence Committee, later recalls. President Bush has already told Graham that “the vice president should be your point of contact in the White House.” Cheney, according to the president, “has the portfolio for intelligence activities.” [Washington Post, 6/24/2007] The leaders are briefed by Cheney, CIA Director George Tenet, and NSA Director Michael Hayden. The Congressional leaders will later mostly refuse to comment publicly about what they do and do not learn about the program, even after it is revealed to the public (see December 15, 2005). In 2003, when Senator John D. Rockefeller ascends to the Democratic leadership of the Senate committee, and is himself briefed on the program, he will write to Cheney expressing his concerns over it (see July 17, 2003). [New York Times, 12/15/2005]
'No Discussion about Expanding' NSA Wiretapping - In December 2005, after the program is revealed to the public, one of the Congressmen present at the briefings, Graham, the then-chairman of the Senate Intelligence Committee, will discuss his knowledge of the program. In contradiction to the characterizations of Bush and other White House officials, Graham will say that he recalls “no discussion about expanding [NSA eavesdropping] to include conversations of US citizens or conversations that originated or ended in the United States,” and knew nothing of Bush’s intention to ignore the Foreign Intelligence Surveillance Court (also known as the FISA court). “I came out of the room with the full sense that we were dealing with a change in technology but not policy,” Graham will recall, using new methodologies to intercept overseas calls that passed through US switches. He thought that NSA eavesdropping would continue to be limited to “calls that initiated outside the United States, had a destination outside the United States but that transferred through a US-based communications system.” Instead, Graham will say, it now seems that Bush decided to go “beyond foreign communications to using this as a pretext for listening to US citizens’ communications. There was no discussion of anything like that in the meeting with Cheney.” A senior intelligence official, who refuses to reveal his identity but says he is speaking with the permission of the White House, will accuse Graham of “misremembering the briefings,” which he will call “very, very comprehensive.” The official will refuse to discuss the briefings in any but the most general terms, but will say they were intended “to make sure the Hill knows this program in its entirety, in order to never, ever be faced with the circumstance that someone says, ‘I was briefed on this but I had no idea that—’ and you can fill in the rest.” Graham will characterize the official’s description as saying: “[W]e held a briefing to say that nothing is different.… Why would we have a meeting in the vice president’s office to talk about a change and then tell the members of Congress there is no change?” House Minority Leader Nancy Pelosi (D-CA), who was also present at the meeting as the ranking Democrat on the House Intelligence Committee, will say the briefing described “President Bush’s decision to provide authority to the National Security Agency to conduct unspecified activities.” She will note that she “expressed my strong concerns” but did not go into detail. [Washington Post, 12/18/2005]
Lawmakers Unaware of Pre-9/11 Surveillance - Though Bush officials eventually admit to beginning surveillance of US citizens only after the 9/11 attacks, that assertion is disputed by evidence suggesting that the domestic surveillance program began well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). In the briefing, Cheney informs the lawmakers of none of this.

Entity Tags: Richard (“Dick”) Cheney, Senate Intelligence Committee, Nancy Pelosi, John D. Rockefeller, House Intelligence Committee, Daniel Robert (“Bob”) Graham, George J. Tenet, George W. Bush, Michael Hayden, National Security Agency

Timeline Tags: Civil Liberties

A senior NSA official, having learned of the NSA’s post-9/11 domestic surveillance program and believing it to be illegal, takes his concerns to a staff member of the House Intelligence Committee. In a 2012 interview for Democracy Now!, William Binney, a former NSA technical director who served in the NSA for 36 years, will say that some of his staff had been recruited to work on the new program and told him of some of the things that were being done, which he believed were illegal. Binney will tell co-host Juan Gonzalez: “I immediately went to the Intelligence Committee, because… the intelligence committees were formed to have oversight over the intelligence community to make sure they didn’t monitor US citizens.… And the member of the staff that I went to went to Porter Goss, who was chairman of that committee at the time, and he referred her to General Hayden for any further. When it was the job of that committee to do the oversight on all this domestic spying, they weren’t doing it.” Soon after this, Binney retires from the NSA, due to his belief the NSA is violating the Constitution (see October 31, 2001). [Democracy Now!, 4/20/2012]

Entity Tags: Jane Mayer, House Intelligence Committee, William Binney, Michael Hayden, National Security Agency

Timeline Tags: Civil Liberties

Concerned that NSA post-9/11 surveillance operations violated the US Constitution, a senior NSA official reports on the program to House Intelligence Committee staff (see Before October 31, 2001), then retires. William Binney, a crypto-mathematician, had served in the NSA for 36 years. In 1997 he was made technical director of the World Geopolitical and Military Analysis Reporting Group, a 6000-employee unit that focused on signals intelligence (SIGINT) reporting and analysis. In the last part of his NSA career, Binney focused on dealing with the NSA’s problem of information overload, co-founding the Signals Intelligence Automation Research Center (SARC) and leading a 20-member team to develop a data-mining and analysis program called ThinThread. This program made it possible to “correlate data from financial transactions, travel records, Web searches, GPS equipment, and any other ‘attributes’ that an analyst might find useful,” and “could chart relationships among people in real time.” Unlike the NSA’s existing centralized data processing systems, ThinThread was able to identify useful or useless data as it was collected, reducing the overload problem. However, though it targeted foreign communications, ThinThread also intercepted those of Americans, and “continued documenting signals when a trail crossed into the US.” Binney incorporated measures to protect privacy, but NSA lawyers still considered the program too invasive, according to a 2011 article by Jane Mayer based on interviews with Binney and another NSA whistleblower, Thomas Drake. In 1999, NSA Director General Michael Hayden decided to fund a rival program, Trailblazer, which would be developed by defense contractors (see Late 1999). Trailblazer will be abandoned in 2006 as unworkable, after costing $1.2 billion (see January 2006). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012] In 2002, three NSA whistleblowers—Edward Loomis, J. Kirk Wiebe, and Binney—will ask the Pentagon to investigate the NSA for wasting “millions and millions of dollars” on Trailblazer. [Nation, 3/26/2013]
Post-9/11 NSA Surveillance Expansion - Binney will tell Mayer that, after the 9/11 attacks, his people began coming to him, saying things like: “They’re getting billing records on US citizens! They’re putting pen registers [call logs] on everyone in the country!” James Bamford will interview Binney in 2012 and write, “At the outset the program recorded 320 million calls a day, [Binney] says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” Binney has not been personally “read in” to this domestic surveillance program, but some members of his SARC team have, as their knowledge of ThinThread code was needed to set it up. Binney became convinced elements of ThinThread were being used, but without privacy protections, meaning US persons could be targeted. Soon after learning these things, Binney takes his concerns to the House Intelligence Committee (see Before October 31, 2001), and retires on October 31. He will tell Mayer, “I couldn’t be an accessory to subverting the Constitution.” Other sources support Binney’s account of this NSA data-mining and monitoring program (see After September 11, 2001, October 11, 2001, After September 11, 2001, Late September, 2001, and October 2001). However, the claim that NSA domestic surveillance was initiated only after, and in response to, 9/11 is contradicted by information indicating that domestic monitoring programs and activities were established and conducted prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [New Yorker, 5/23/2011; Wired News, 2/15/2012; Democracy Now!, 4/20/2012]
ThinThread 'Would Likely Have Prevented 9/11' - Despite ThinThread’s capacity to collect actionable intelligence, Hayden vetoed the idea of deploying the system three weeks before 9/11, in August 2001. According to the Loomis, Wiebe, and Binney, this decision “left the NSA without a system to analyze the trillions of bits of foreign SIGINT flowing over the Internet at warp speed, as ThinThread could do.” During the summer of 2001, when “the system was blinking red,” according to CIA Director George Tenet, the NSA “failed to detect critical phone and e-mail communications that could have tipped US intelligence to al-Qaeda’s plans to attack.” [Nation, 3/26/2013]

Entity Tags: Edward Loomis, World Geopolitical and Military Analysis Reporting Group, J. Kirk Wiebe, William Binney, Thomas Drake, House Intelligence Committee, James Bamford, Trailblazer, Jane Mayer, National Security Agency, Signals Intelligence Automation Research Center, Michael Hayden, Thinthread

Timeline Tags: Civil Liberties

John Yoo, the Justice Department’s (DOJ) Office of Legal Counsel (OLC) deputy assistant attorney general, sends a classified memo to Attorney General John Ashcroft justifying warrantless surveillance of US persons. The National Security Agency (NSA)‘s domestic surveillance authorized by President Bush (see October 4, 2001, Early 2002, and December 15, 2005) will come to be publicly referred to as the President’s Surveillance Program (PSP). This is not the first Yoo memo supporting warrantless surveillance (see September 25, 2001), but a 2009 report on the PSP jointly issued by the inspectors general (IGs) of the Department of Defense (DOD), DOJ, CIA, National Security Agency (NSA), and Office of the Director of National Intelligence (ODNI) will refer to it as “[t]he first OLC opinion directly supporting the legality of the PSP.” The IGs’ report will quote from and comment on the memo, noting that “deficiencies in Yoo’s memorandum identified by his successors in the Office of Legal Counsel and the Office of the Deputy Attorney General later became critical to DOJ’s decision to reassess the legality of the program in 2003.” According to the IGs’ report, Yoo asserts that warrantless surveillance is constitutional as long as it is “reasonable” under the Fourth Amendment, which only protects against “unreasonable searches and siezures.” On this point, the IGs’ report will note that Yoo’s successors were troubled by his failure to discuss the Supreme Court’s decision in Youngstown Sheet & Tube Co. v. Sawyer (1952), which found the president’s wartime authority to be limited. His memo does acknowledge that the Foreign Intelligence Surveillance Act (FISA) “purports to be the exclusive statutory means for conducting electronic surveillance for foreign intelligence,” but asserts that it is only a “safe harbor for electronic surveillance” because it cannot “restrict the president’s ability to engage in warrantless searches that protect the national security.” Yoo also writes that Congress has not “made a clear statement in FISA that it sought to restrict presidential authority to conduct warrantless searches in the national security area.” The IGs’ report will state that Yoo’s successors considered this problematic because Yoo has omitted discussion of the fact that FISA explicitly authorizes the president to conduct warrantless surveillance during the first 15 days following a declaration of war by Congress, which they considered an expression of Congress’s intent to restrict warrantless surveillance to a limited period of time and specific circumstances. The IGs’ report will also state that Yoo’s memo discusses “the legal rationale for Other Intelligence Activities authorized as part of the PSP,” and that Yoo concludes, “[W]e do not believe that Congress may restrict the president’s inherent constitutional powers, which allow him to gather intelligence necessary to defend the nation from direct attack.” The IGs’ report will say that “Yoo’s discussion of some of the Other Intelligence Activities did not accurately describe the scope of these activities,” and that Yoo’s successors considered his discussion of these other activities to be “insufficient and presenting a serious impediment to recertification of the program as to form and legality.” [Inspectors General, 7/10/2009, pp. pp. 11-13]
Memo's Existence Revealed by ACLU Lawsuit - On December 15, 2005, the New York Times will report that Bush authorized an NSA warrantless domestic surveillance program after the 9/11 attacks (see December 15, 2005). The American Civil Liberties Union (ACLU) will request records pertaining to the program under the Freedom of Information Act (FOIA) and then sue the Justice Department for the release of records. The existence of Yoo’s November 2 memo will first be revealed in an October 19, 2007 deposition filed by then head of the OLC Steven Bradbury in response to the ACLU lawsuit, which says that it “[concerns] the legality of certain communications intelligence activities.” After the 2009 release of the IGs’ report the ACLU will notify the court and the government will agree to reprocess four OLC memos, including Yoo’s November 2 memo. This memo and a May 6, 2004 memo by Yoo’s OLC successor Jack Goldsmith that disputes many of Yoo’s conclusions will be released in heavily redacted form on March 18, 2011. [ACLU.org, 2/7/2006; United States District Court of DC, 10/19/2007; American Civil Liberties Union, 3/19/2011]
Constitutional Experts Dispute Yoo's Legal Rationale - Numerous authorities on the law will question or reject the legal bases for warrantless domestic surveillance. In 2003, Yoo will leave the OLC. Goldsmith will begin a review of the PSP, after which he will conclude it is probably illegal in some respects and protest, within the executive branch, its continuation (see Late 2003-Early 2004 and December 2003-June 2004). Following the public disclosure of its existence, a January 5, 2006 report by the Congressional Research Service will find it to be of dubious legality (see January 5, 2006). On January 19, 2006, the DOJ will issue a 42-page white paper laying out the legal bases for the program (see January 19, 2006). These bases will be reviewed and rejected by 14 constitutional scholars and former government officials in a joint letter to Congress on February 2, 2006. [al [PDF], 2/2/2006 pdf file] The American Bar Association will adopt a resolution on February 13, 2006 that rejects DOJ’s arguments and calls on Congress to investigate the program. [Delegates, 2/13/2006 pdf file] On August 17, 2006, in the case ACLU v. NSA, US district judge Anna Diggs Taylor will reject the government’s invocation of the “state secrets privilege” and its argument that plaintiffs’ lack standing due to their being unable to prove they were surveilled, and will rule that warrantless surveillance is in violation of “the separation of powers doctrine, the Administrative Procedures Act, the First and Fourth Amendments to the United States Constitution, the FISA, and Title III” (see August 17, 2006). Taylor’s ruling will be overturned on appeal, on the grounds that the plaintiffs lack standing as they cannot prove that surveillance has occurred. In another case, Al Haramain v. Barack Obama, the government will make the same arguments, but US district judge Vaughn Walker will reject these and conclude in 2010 that illegal surveillance occurred (see March 31, 2010). [Al-Haramain v. Obama, 3/31/2010]

Entity Tags: Steven Bradbury, Vaughn Walker, Ronald Dworkin, George W. Bush, John C. Yoo, American Bar Association, Office of Legal Counsel (DOJ), American Civil Liberties Union, John Ashcroft, Anna Diggs Taylor, US Department of Justice

Timeline Tags: Civil Liberties

The National Security Agency begins sending data—consisting of telephone numbers, e-mail addresses, and names—to the FBI that was obtained through surveillance of international communications originating within the US (see After September 11, 2001 and October 2001). The NSA sends so much data, in fact, that hundreds of agents are needed to investigate the thousands of tips per month that the data is generating. However, virtually all of this information leads to dead ends and/or innocent people. FBI officials repeatedly complain that the unfiltered information is bogging down the bureau: according to over a dozen current and former law enforcement and counterterrorism officials, the flood of tips provide them and their colleagues with very few real leads against terrorism suspect. Instead, the NSA data diverts agents from more productive work. Some FBI officials view the NSA data as pointless and likely illegal intrusions on citizens’ privacy. Initially, FBI director Robert Mueller asks senior administration officials “whether the program had a proper legal foundation,” but eventually defers to Justice Department legal opinions. One former FBI agent will later recall, “We’d chase a number, find it’s a schoolteacher with no indication they’ve ever been involved in international terrorism—case closed. After you get a thousand numbers and not one is turning up anything, you get some frustration.” A former senior prosecutor will add, “It affected the FBI in the sense that they had to devote so many resources to tracking every single one of these leads, and, in my experience, they were all dry leads. A trained investigator never would have devoted the resources to take those leads to the next level, but after 9/11, you had to.” Former NSA director Bobby Ray Inman says that the problem between the FBI and the NSA may stem in part from their very different approaches. Signals intelligence, the technical term for the NSA’s communications intercepts, rarely produces “the complete information you’re going to get from a document or a witness” in a traditional FBI investigation, he says. And many FBI officials are uncomfortable with the NSA’s domestic operations, since by law the NSA is precluded from operating inside US borders except under very specific circumstances. [New York Times, 1/17/2006]

Entity Tags: Federal Bureau of Investigation, National Security Agency, Bobby Ray Inman, Robert S. Mueller III

Timeline Tags: Complete 911 Timeline, Civil Liberties

Zaab Sethna of the Iraqi National Congress (INC) arranges for Iraqi defector Adnan Ihsan Saeed al-Haideri to be interviewed by Judith Miller of the New York Times. Miller, who has known Chalabi for about eight years (see May 1, 2003), immediately flies out to Bangkok for the interview. Her story is published on December 20, just three days after Haideri told his story to a CIA agent who subjected him to a polygraph and determined Haideri’s story was a complete fabrication (see December 17, 2001). Miller’s front-page article, titled “An Iraqi defector tells of work on at least 20 hidden weapons sites,” reports: “An Iraqi defector who described himself as a civil engineer, said he personally worked on renovations of secret facilities for biological, chemical and nuclear weapons in underground wells, private villas and under the Saddam Hussein Hospital in Baghdad as recently as a year ago.” If verified, Miller notes, “his allegations would provide ammunition to officials within the Bush administration who have been arguing that Mr. Hussein should be driven from power partly because of his unwillingness to stop making weapons of mass destruction, despite his pledges to do so.” Sethna also contacts freelance journalist Paul Moran. Moran is a former employee of the INC and has been employed for years by the Rendon Group, a firm specializing in “perception management” and which helped develop the INC (see May 1991). Moran’s on-camera interview with Haideri is broadcast worldwide by the Australian Broadcasting Corp. [New York Times, 12/20/2001; SBS Dateline, 7/23/2003; New York Review of Books, 2/26/2004; Rolling Stone, 11/17/2005] Reporter Jonathan Landay will later say that he and others were skeptical from the outset: “There were some red flags that the New York Times story threw out immediately, which caught our eye, immediately. The first was the idea that a Kurd—the enemy of Saddam—had been allowed into his most top secret military facilities. I don’t think so. That was, for me, the biggest red flag. And there were others, like the idea that Saddam Hussein would put a biological weapons facility under his residence. I mean, would you put a biological weapons lab under your living room? I don’t think so.” Landay’s partner Warren Strobel will add, “The first rule of being an intelligence agent, or a journalist, and they’re really not that different, is you’re skeptical of defectors, because they have a reason to exaggerate. They want to increase their value to you. They probably want something from you. Doesn’t mean they’re lying, but you should be—journalists are supposed to be skeptical, right? And I’m afraid the New York Times reporter in that case and a lot of other reporters were just not skeptical of what these defectors were saying. Nor was the administration…” [PBS, 4/25/2007]

Entity Tags: Zaab Sethna, Warren Strobel, Jonathan Landay, Judith Miller, Paul Moran, Adnan Ihsan Saeed al-Haideri, Ahmed Chalabi, Saddam Hussein

Timeline Tags: Events Leading to Iraq Invasion

Sometime in early 2002, President Bush signs a secret executive order authorizing the National Security Agency (NSA) to wiretap phone conversations and read e-mails to and from US citizens. The order extends an operation set into motion at least as early as October 2001 to begin wiretapping US citizens’ phones in a response to the 9/11 attacks. When the program is revealed by the US media in late 2005 (see December 15, 2005), Bush and his officials will say the program is completely legal, though it ignores the requirements of the Foreign Intelligence Surveillance Act (FISA) that requires the government to obtain court-issued warrants to mount surveillance against US citizens. They will insist that only those suspected of having ties to al-Qaeda are monitored, and only when those individuals make or receive international communications. [New York Times, 12/15/2005; Washington Post, 12/22/2005; Newsweek, 12/22/2008] Bush’s order authorizes the NSA to monitor international telephone conversations and international e-mails of hundreds, and perhaps thousands, of US citizens without court warrants, in an effort to track what officials call “dirty numbers” linked to al-Qaeda. When the program is finally revealed by the New York Times over three years later (see December 15, 2005), officials will say that the NSA still seeks warrants to monitor domestic communications. But there is little evidence of this (see, for example, Spring 2001). The presidential order is a radical shift in US surveillance and intelligence-gathering policies, and a major realignment for the NSA, which is mandated to only conduct surveillance abroad. Some officials believe that the NSA’s domestic eavesdropping crosses constitutional limits on legal searches. “This is really a sea change,” a former senior official who specializes in national security law will say in December 2005. “It’s almost a mainstay of this country that the NSA only does foreign searches.” [New York Times, 12/15/2005] Some sources indicate that NSA domestic surveillance activities, such as data-mining, the use of information concerning US persons intercepted in foreign call monitoring, and possibly direct surveillance of US persons, took place prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: George W. Bush, Al-Qaeda, Foreign Intelligence Surveillance Court, National Security Agency

Timeline Tags: Civil Liberties

Joseph Wilson.Joseph Wilson. [Source: public domain]The CIA sends Joseph C. Wilson, a retired US diplomat, to Niger to investigate claims that Iraq had sought to purchase uranium from that country (see February 13, 2002). The CIA pays Wilson’s expenses for the trip, but does not pay him in any other respect. The identity of the party who requests the mission is later disputed. While Wilson will claim the trip was requested directly by Dick Cheney’s office, other sources will indicate that the CIA had decided (see February 19, 2002) that a delegation to Niger was needed in order to investigate questions raised by one of Dick Cheney’s aides (see (February 13, 2002)). [New York Times, 5/6/2003; Washington Post, 6/12/2003 pdf file; Independent, 6/29/2003; New York Times, 7/6/2003; US Congress, 7/7/2004]
Reason behind Request - Former CIA analyst Melvin Goodman will later note that “Wilson was asked to go to Niger for one specific purpose. It was the CIA’s idea to get Cheney off their backs. Cheney would not get off their backs about the yellowcake documents. They couldn’t get Cheney to stop pressing the issue. He insisted that was the proof of reconstitution of [Iraq’s nuclear] program.” [Dubose and Bernstein, 2006, pp. 214]
Normal Skepticism - Wilson goes into the situation with a healthy dose of skepticism. “My skepticism was the same as it would have been with any unverified intelligence report, because there is a lot of stuff that comes over the transom every day,” he will recall in 2006. Wilson knows nothing of the influence of the Pentagon neoconservatives (see July 8, 1996, January 26, 1998, July 1998, September 2000, Late December 2000 and Early January 2001, Shortly after January 20, 2001, and Shortly After September 11, 2001) or the growing rift in the intelligence community over the reports: “I was aware that the neocons had a growing role in government and that they were interested in Iraq,” he will recall. “But the administration had not articulated a policy at this stage.” He is not given a copy of the Niger documents before leaving for Africa, nor is he told of their history. “To the best of my knowledge, the documents were not in the possession of the [CIA] at the time I was briefed,” he will recall. “The discussion was whether or not this report could be accurate. During this discussion, everyone who knew something shared stuff about how the uranium business worked, and I laid out what I knew about the government in Niger, what information they could provide.” With this rather sketchy preparation, Wilson leaves for Niger. [Unger, 2007, pp. 240; Wilson, 2007, pp. 113] Wilson’s wife, senior CIA case officer Valerie Plame Wilson, will later write, “He figured that if the vice president had asked a serious and legitimate question, it deserved a serious answer and he would try to help find it.” [Wilson, 2007, pp. 111]
No Trouble Finding Information - Wilson, who knows the Nigerien government and many of its officials, has little trouble finding the information he needs in the following week. In 2006, he will recall: “Niger has a simplistic government structure. Both the minister of mines and the prime minister had gone through the mines. The French were managing partners of the international consortium [which handles Niger’s uranium]. The French mining company actually had its hands on the project. Nobody else in the consortium had operators on the ground.” Wilson also personally knows Wissam al-Zahawie, Iraq’s ambassador to the Vatican who supposedly negotiated the uranium deal with Niger (see February 1999). Wilson will later observe: “Wissam al-Zahawie was a world-class opera singer, and he went to the Vatican as his last post so he could be near the great European opera houses in Rome. He was not in the Ba’athist inner circle. He was not in Saddam [Hussein]‘s tribe. The idea that he would be entrusted with the super-secret mission to buy 500 tons of uranium from Niger is out of the question.” [Unger, 2007, pp. 240-241] Wilson meets with, among other officials, Niger’s former minister of mines, Mai Manga. As later reported by the Senate Intelligence Committee (see July 9, 2004), Manga tells Wilson “there were no sales outside of International Atomic Energy Agency (IAEA) channels since the mid-1980s,” and he “knew of no contracts signed between Niger and any rogue states for the sale of uranium.” Manga says a “French mining consortium controls Nigerien uranium mining and keeps the uranium very tightly controlled from the time it is mined until the time it is loaded onto ships in Benin for transport overseas,” and, “it would be difficult, if not impossible, to arrange a special shipment of uranium to a pariah state given these controls.” [CounterPunch, 11/9/2005]
Meeting with US Ambassador - Wilson arrives in Niger on February 26, two days after Marine General Carlton W. Fulford Jr.‘s meeting (see February 24, 2002) with Nigerien officials. Wilson first meets with US Ambassador to Niger Barbro Owens-Kirkpatrick, a veteran Foreign Service official, whom Wilson will later describe as “crisp” and well-informed. Over tea in the US Embassy offices in Niamey, Niger’s capital, Owens-Kirkpatrick tells Wilson that she has already concluded that the allegations of uranium sales to Iraq are unfounded. “She had already debunked them in her reports to Washington,” Wilson will later recall. “She said, yeah, she knew a lot about this particular report. She thought she had debunked it—and, oh, by the way, a four-star Marine Corps general had been down there as well—Carlton Fulford. And he had left satisfied there was nothing to report.” [Wilson, 2004, pp. 20-22]
Details of Alleged Uranium Production - Niger extracts uranium from two mines, both located in remote locations in the Sahara Desert. It takes well over a day to drive from the mines to Niamey. The mines are owned by a consortium of foreign companies and the Nigerien government, and managed by a French mining company, COGEMA. Because of a recent upswing in the production of Canadian uranium, Niger’s uranium is mined at a net loss, and its only customers are consortium members. Wilson will later write, “[T]he Nigerien government has sold no uranium outside the consortium for two decades.” If Iraq had bought 500 tons of uranium, as the story is told, that would have represented a 40 percent production increase. “There is no doubt,” Wilson will later write, “that such a significant shift from historic production schedules would have been absolutely impossible to hide from the other partners, and most certainly from the managing partner, COGEMA. Everyone involved would have known about it.” Any Nigerien government decision to produce such an amount of uranium would have involved numerous government officials and many well-documented meetings. Because the transaction would have been to a foreign country, Niger’s Foreign Ministry would also have been involved in the decision. To sell Iraq uranium during that time would have been a violation of international law and of UN sanctions against Iraq, a weighty decision that would have ultimately been made by the president of Niger in conjuction with the foreign minister and the minister of mines. Such a decision would have been published in the Nigerien equivalent of the Federal Register and would have dramatic tax and revenue implications. The unexpected huge infusion of cash from the sale would have had a strong impact on the Nigerien economy, and would have been much anticipated and talked about throughout the Nigerien business community. [Wilson, 2004, pp. 22-25]
Off-the-Books Production Virtually Impossible - It is conceivable that such an enormous operation could have been conducted entirely “off the books,” Wilson will write, but virtually impossible to pull off. True, a military junta was in power at the time of the alleged sale, one that felt no responsibility or accountability to the Nigerien people. But even a secret transaction would have been impossible to conceal. Such a transaction would have involved thousands of barrels of clandestinely shipped uranium, extensive and complex adjustments to shipping schedules, and other ramifications. “It simply could not have happened without a great many people knowing about it, and secrets widely known do not remain hidden for long. And again, COGEMA, as the managing partner, would have had to know and be complicit.” Add to that Niger’s dependence on US foreign economic aid and its unwillingness to threaten the loss of that aid by secretly shipping uranium to a country that the US considers a dangerous rogue nation. All told, Wilson concludes, the possibility of such a clandestine operation is remote in the extreme. [Wilson, 2004; Wilson, 2004]
1999 Meeting with Iraqi Official - While speaking with a US Embassy official, Wilson learns about a 1999 meeting between the embassy official and an Iraqi representative in Algiers, perhaps in concert with a similar meeting between Iraqi officials and Niger’s prime minister (see June 1999). [Wilson, 2004, pp. 27-28]
Confirmation that Allegations are Unrealistic - After spending several days talking with current government officials, former government officials, and people associated with the country’s uranium business, Wilson concludes the rumors are completely false. He will later call the allegations “bogus and unrealistic.” [Washington Post, 6/12/2003 pdf file; Knight Ridder, 6/13/2003; Independent, 6/29/2003; New York Times, 7/6/2003; CBS News, 7/11/2003; Vanity Fair, 1/2004; Wilson, 2004, pp. 20-28, 424; Vanity Fair, 5/2004, pp. 282; Wilson, 2007, pp. 113]

Entity Tags: Barbro Owens-Kirkpatrick, Wissam al-Zahawie, Carlton W. Fulford, COGEMA, Mai Manga, Valerie Plame Wilson, Muhammad Saeed al-Sahhaf, Melvin A. Goodman, Central Intelligence Agency, Richard (“Dick”) Cheney, Joseph C. Wilson

Timeline Tags: Events Leading to Iraq Invasion, Niger Uranium and Plame Outing

Vice President Dick Cheney’s office refuses to disclose information about trips taken by its employees that are paid for by private financiers. The rationale is that since the Office of the Vice President (OVP) is not strictly part of the executive branch (see 2003), it need not disclose the information under the laws applying to that branch of the federal government. From this time forward, Cheney’s office repeatedly responds to inquiries by the Office of Government Ethics with letters stating “that it is not obligated to file such disclosure forms for travel funded by non-federal sources,” Kate Sheppard and Bob Williams of the Center for Public Integrity will write in 2005. “The letters were signed by then-Counsel to the Vice President David Addington…. Addington writes that the Office of the Vice President is not classified as an agency of the executive branch and is therefore not required to issue reports on travel, lodging and related expenses funded by non-federal sources.” Judicial Watch’s Tom Fitton will say that Cheney and his staff believe “the vice president is a constitutional office that is not subject to the laws that others in the executive branch are.” [Center for Public Integrity, 11/16/2005]

Entity Tags: David S. Addington, Bob Williams, Center for Public Integrity, Judicial Watch, Kate Sheppard, Tom Filton, Office of the Vice President, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

This picture of US soldiers supervising the waterboarding of North Vietnamese prisoners was published in a US newspaper in 1968, resulting in an investigation and convictions.This picture of US soldiers supervising the waterboarding of North Vietnamese prisoners was published in a US newspaper in 1968, resulting in an investigation and convictions. [Source: Bettmann / Corbis]In 2007, it will be reported that the CIA used the controversial interrogation technique of waterboarding on at least three detainees. The Associated Press will claim the detainees are:
bullet Abu Zubaida, who is captured in March 2002 and tortured around May 2002 (see March 28, 2002 and Mid-May 2002 and After).
bullet Abd al-Rahim al-Nashiri, who is captured in November 2002 (see Early October 2002 and (November 2002)).
bullet Khalid Shaikh Mohammed (KSM), who is allegedly captured in early 2003 (see February 29 or March 1, 2003 and Shortly After February 29 or March 1, 2003). [Associated Press, 12/11/2007]
bullet NBC News will report a list of three that includes Hambali, who is captured in August 2003 (see August 12, 2003 and Shortly After August 12, 2003). NBC’s list also mentions KSM and Zubaida, but does not mention al-Nashiri. [MSNBC, 9/13/2007] In a 2007 book, former CIA Director George Tenet will hint that slightly more than three may have been waterboarded, writing, “The most aggressive interrogation techniques conducted by CIA personnel were applied to only a handful of the worst terrorists on the planet, including people who had planned the 9/11 attacks…” [Tenet, 2007, pp. 242] ABC News will claim in September 2007, “It is believed that waterboarding was used on fewer than five ‘high-value’ terrorist subjects…” [ABC News, 9/14/2007] Prior to 2002, waterboarding was classified by the US government as a form of torture, and treated as a serious criminal offense. US soldiers were court-martialled for waterboarding captives as recently as the Vietnam War. The technique is said to simulate death by drowning. [New Yorker, 8/6/2007] In the 1600s, King James I of England wrote about the torture his government was using and stated that waterboarding was the most extreme form of torture used, worse than the rack and thumbscrews. [Harper's, 12/15/2007] In 2007, it will be revealed that at least some of the interrogations of Zubaida and al-Nashiri were videotaped, and it is suspected by some that their waterboarding may have been taped (see Spring-Late 2002). These tapes will later be destroyed under controversial circumstances (see November 2005). A government official will later claim that waterboarding is no longer used after 2003. The CIA and US military will prohibit the use of waterboarding in 2006. [Associated Press, 12/11/2007]

Entity Tags: George J. Tenet, Central Intelligence Agency, Abd al-Rahim al-Nashiri, Hambali, Khalid Shaikh Mohammed, Abu Zubaida

Timeline Tags: Torture of US Captives, Complete 911 Timeline

The New York Post has a banner headline on May 16, 2002.The New York Post has a banner headline on May 16, 2002. [Source: New York Post]The Bush administration is embarrassed when the CBS Evening News reveals that President Bush had been warned about al-Qaeda domestic attacks in August 2001 (see August 6, 2001). [New York Times, 5/15/2002; Washington Post, 5/16/2002] CBS’s David Martin reports: “The president’s daily intelligence brief is delivered to the president each morning, often by the director of central intelligence himself. In the weeks before 9/11 it warned that an attack by Osama bin Laden could involve the hijacking of a US aircraft.” [McClellan, 2008, pp. 113] Bush had repeatedly said that he had “no warning” of any kind. Press secretary Ari Fleischer states unequivocally that while Bush had been warned of possible hijackings, “[t]he president did not—not—receive information about the use of airplanes as missiles by suicide bombers.” [New York Times, 5/15/2002; Washington Post, 5/16/2002] “Until the attack took place, I think it’s fair to say that no one envisioned that as a possibility.” [MSNBC, 9/18/2002] Fleischer claims the August memo was titled “Bin Laden Determined to Strike the US,” but the real title is soon found to end with “Strike in US” [Washington Post, 5/18/2002] The Guardian will state a few days later, “[T]he memo left little doubt that the hijacked airliners were intended for use as missiles and that intended targets were to be inside the US.” It further states that, “now, as the columnist Joe Conason points out in the current edition of the New York Observer, ‘conspiracy’ begins to take over from ‘incompetence’ as a likely explanation for the failure to heed—and then inform the public about—warnings that might have averted the worst disaster in the nation’s history.” [Guardian, 5/19/2002] Current deputy press secretary Scott McClellan will point out in 2008: “The [CBS] report left much open to question. Was it suggesting that the president had received info that should have led him to act? Was it just a possible warning sign, like many others that may have gone unheeded? Or was it something else, possibly a nonspecific bit of intelligence from years earlier?” McClellan will write that the uncertainty “mattered little to Democratic leaders in Congress. They saw an opportunity to attack the president’s strong suit—his leadership in the war on terrorism—and cut into his enormous popularity ahead of the midterm elections that coming November.” [McClellan, 2008, pp. 113]

Entity Tags: Bush administration (43), David Martin, Osama bin Laden, George W. Bush, Scott McClellan, Ari Fleischer, Joe Conason

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

National Security Adviser Condoleezza Rice holds a press conference to respond to the public leak (see May 15, 2002) of the title of President Bush’s August 6, 2001 Presidential Daily Brief item entitled “Bin Laden Determined to Strike in US” (see August 6, 2001).
Presidential Daily Brief - She asserts: “It was an analytic report that talked about [Osama bin Laden]‘s methods of operation, talked about what he had done historically, in 1997, in 1998.… I want to reiterate, it was not a warning. There was no specific time, place, or method mentioned.” [White House, 5/16/2002] In April 2004, Rice will testify under oath before the 9/11 Commission and repeatedly assert that it was “a historical memo… not threat reporting” (see April 8, 2004).
Comment by Philip Shenon - Author Philip Shenon will later comment, “She failed to mention, as would later be clear, that the PDB focused entirely on the possibility that al-Qaeda intended to strike within the United States; it cited relatively recent FBI reports of possible terrorist surveillance of government buildings in New York.” After rereading the transcript of the press conference, Shenon will call it a “remarkable document,” because “To many of the Commission’s staff, it offered proof of how, to Condoleezza Rice, everything is semantics. A threat is not a threat, a warning is not a warning, unless she says it is. The word historical appeared to have an especially broad definition to Rice. To her, a warning that was a few weeks or months old was of relatively little value because it was ‘historical.’”
Aircraft as Weapons - Rice also says, “I don’t think anybody could have predicted that these people would take an airplane and slam it into the World Trade Center, take another one and slam it into the Pentagon—that they would try to use an airplane as a missile.” However, various government agencies were well aware of the concept of planes as missiles, including the FBI (see August 27, 2001), the Defense Department (see April 17-26, 2001), and the White House itself (see June 20, 2001). Shenon will point out that this news conference occurs eight months after the attacks, yet Rice is “suggesting that in all that time, no one had bothered to tell her [of these reports].” [Shenon, 2008, pp. 213, 237-239]

Entity Tags: Philip Shenon, Condoleezza Rice

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

White House spokesman Ari Fleischer misstates the title of a key presidential daily brief item from August 2001 about al-Qaeda’s intentions to attack the US (see August 6, 2001). Fleischer says: “The president was aware that bin Laden, of course, as previous administrations have well known, that bin Laden was determined to strike the United States. In fact, the label on the president’s (presidential daily briefing) was ‘Bin Laden Determined to Strike the United States.’” [Fox News, 5/17/2002] Author Philip Shenon will later point out that “Fleischer had left out the title’s all-important preposition—‘in’ the United States.” [Shenon, 2008, pp. 214] The full title is “Bin Laden Determined to Strike in US.” [9/11 Commission, 7/24/2004, pp. 261] The Washington Post soon points out the misstatement: “White House press secretary Ari Fleischer told reporters yesterday […] the headline on the document was, ‘Bin Laden Determined to Strike the United States.’ But sources who have read the memo said the headline ended with the phrase ‘in US.’” [Washington Post, 5/19/2008]

Entity Tags: Philip Shenon, Ari Fleischer

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The Bush administration issues a remarkable series of terror warnings that many believe are politically motivated. Vice President Cheney warns it is “not a matter of if, but when” al-Qaeda will next attack the US. [CNN, 5/20/2002] Homeland Security Director Tom Ridge says the same thing. Defense Secretary Rumsfeld says terrorists will “inevitably” obtain weapons of mass destruction (see May 21, 2002). FBI Director Mueller says more suicide bombings are “inevitable.” [Washington Post, 5/22/2002] Authorities also issue separate warnings that al-Qaeda militants might target apartment buildings nationwide, banks, rail and transit systems, the Statue of Liberty, and the Brooklyn Bridge. USA Today titles an article, “Some Question Motives Behind Series of Alerts.” [USA Today, 5/24/2002] David Martin, CBS’s national security correspondent, says, “Right now they’re putting out all these warnings to change the subject from what was known prior to September 11 to what is known now.” It had been revealed the week before that Bush received a briefing in August 2001 entitled, “Bin Laden Determined to Strike in US” (see August 6, 2001). [Washington Post, 5/27/2002] Remarkably, even Press Secretary Ari Fleischer says the alerts were issued “as a result of all the controversy that took place last week.” [Washington Times, 5/22/2002; Village Voice, 5/23/2002] A retired CIA official reveals that the administration “made a political decision” to make any threat public, even those deemed to be hoaxes. In response to the alleged threat to New York, the former head of the FBI bureau there states that “there really isn’t any hard information.” [Rolling Stone, 9/21/2006 pdf file] Time notes, “Though uncorroborated and vague, the terror alerts were a political godsend for an administration trying to fend off a bruising bipartisan inquiry into its handling of the terrorist chatter last summer. After the wave of warnings, the Democratic clamor for an investigation into the government’s mistakes subsided.” [Time, 5/27/2002]

Entity Tags: Robert S. Mueller III, Richard (“Dick”) Cheney, Donald Rumsfeld, Tom Ridge, Ari Fleischer, Al-Qaeda, David Martin

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Domestic Propaganda

Defense Secretary Rumsfeld says that al-Qaeda operatives are in the US, and “they are very well-trained.” He also says that “terrorist networks have relationships with terrorist states that have weapons of mass destruction, and… they inevitably are going to get their hands on them, and they would not hesitate one minute in using them. That’s the world we live in.” [Suskind, 2006, pp. 121] His comments are part of a wave of ominous warnings by the Bush administration (see May 20-24, 2002) that come just days after it is reported that President Bush was given a warning before 9/11 entitled “Bin Laden Determined to Strike in US” (see August 6, 2001).

Entity Tags: Donald Rumsfeld

Timeline Tags: Complete 911 Timeline

In a speech, President Bush announces a “new” US policy of preemptive attacks: “If we wait for threats to fully materialize we will have waited too long. We must take the battle to the enemy, disrupt his plans and confront the worst threats before they emerge.” [New York Times, 6/2/2002] This preemptive strategy is included in a defensive strategic paper the next month (see July 13, 2002), and formally announced in September 2002 (see September 20, 2002). Despite the obvious parallels, the mainstream media generally fails to report that this “new” antiterrorism strategy was first proposed by Bush’s key administration officials in 1992 (see March 8, 1992) and has been continually advocated by the same people ever since. [New York Times, 9/20/2002; Washington Post, 9/21/2002; Guardian, 9/21/2002] Furthermore, State Department Director of Policy Planning Richard Haass originally drafted this new national security strategy. However, Condoleezza Rice had ordered that it be completely rewritten, reportedly wanting “something bolder.” The man responsible for this task was Philip Zelikow, who in 2003 will be appointed executive director of the 9/11 Commission (see Mid-December 2002-March 2003). [Mann, 2004, pp. 316-317]

Entity Tags: George W. Bush

Timeline Tags: Complete 911 Timeline

Richard Clarke, who was counterterrorism “tsar” in the run-up to 9/11, briefs the 9/11 Congressional Inquiry about counterterrorism before the attacks.
Clarke's Status - Normally, a White House official such as Clarke would not be allowed to testify before Congress, but the administration makes an exception for him, although the testimony is behind closed doors and is classified. In addition, Clarke is not placed under oath and is not even considered a witness before the inquiry, just a briefer. Clarke’s boss, National Security Adviser Condoleezza Rice, will not testify before the inquiry, and it is unable to obtain access to National Security Council files, which are privileged as they relate to advice given to the president.
Content of Briefing - House Intelligence Committee member Tim Roemer will say that Clarke is riveting during the six-hour briefing. According to author Philip Shenon, Roemer thinks that Clarke is “intelligent, articulate, seemingly candid in discussing his own failings as White House counterterrorism [‘tsar’].” Clarke will later be extremely critical of President George Bush and Rice (see March 21, 2004 and March 24, 2004), but now he is “coy about certain questions—especially about President Bush and Condoleezza Rice.” Shenon will add: “[I]f anyone knew whether Bush and Rice had reacted appropriately to the threats reaching the Oval office before 9/11, it was Clarke. Yet in front of these lawmakers, Clarke seemed unwilling to make any judgments about the president and Rice. He was certainly volunteering little about his bosses. He was still on the [National Security Council’s] payroll. Perhaps it was understandable that Clarke would want to hold his tongue for now.” [Shenon, 2008, pp. 195-196]
Later Positive Briefing about Administration's Record - Two months later, Clarke will give journalists a positive briefing about the Bush administration’s record on terrorism (see August 22, 2002).

Entity Tags: Richard A. Clarke, 9/11 Congressional Inquiry, Philip Shenon, Tim Roemer

Timeline Tags: Complete 911 Timeline

Philip Zelikow, who will later be appointed director of the 9/11 Commission (see Shortly Before January 27, 2003), makes public comments supporting the forthcoming invasion of Iraq. Zelikow says that “we’re now beginning to understand that we can’t wait for these folks to deliver the weapons of mass destruction and see what they do with them before we act.” He adds, “We’re beginning to understand that we might not want to give people like Saddam Hussein advance warning that we’re going to strike.” Zelikow will later help draft a policy paper used as justification for the invasion (see September 20, 2002) and will attempt to link Iraq to 9/11 when appointed to head the commission’s staff (see July 9, 2003, January 2004 and January 2004). [Shenon, 2008, pp. 128-129, 429]

Entity Tags: Philip Zelikow

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion, 9/11 Timeline

Page 1 of 5 (449 events)
previous | 1, 2, 3, 4, 5 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike