!! History Commons Alert, Exciting News

Context of '(6:50 a.m.-7:40 a.m.) September 11, 2001: 9/11 Hijacker Atta Observed at Boston’s Logan Airport Running Late for Plane?'

This is a scalable context timeline. It contains events related to the event (6:50 a.m.-7:40 a.m.) September 11, 2001: 9/11 Hijacker Atta Observed at Boston’s Logan Airport Running Late for Plane?. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

Virginia BuckinghamVirginia Buckingham [Source: Publicity photo]Data compiled by the Federal Aviation Administration (FAA) shows that over this period Boston’s Logan Airport has one of the worst records for security among major US airports. Flight 11 and Flight 175 depart from Logan on 9/11. While it is only America’s eighteenth busiest airport, it has the fifth highest number of security violations. FAA agents testing its passenger screening are able to get 234 guns and inert hand grenades and bombs past its checkpoint guards or through its X-ray machines. Though it is possible that the high number of violations is because the FAA tests more frequently at Logan than elsewhere, an official later quoted by the Boston Globe says lax security is the only explanation, as all checkpoints at every major airport are meant to be tested monthly. In contrast, Newark Airport, from where Flight 93 departs on 9/11, has an above average security record. Washington’s Dulles Airport, from where Flight 77 takes off, is below average, though not as bad as Logan. Officials familiar with security at Logan will, after 9/11, point to various flaws. For example, the State Police office has no video surveillance of the airport’s security checkpoints, boarding gates, ramp areas, or perimeter entrances. [Boston Globe, 9/26/2001] Security cameras had been put into use at most US airports in the mid-1980s. When Virginia Buckingham takes over as executive director of Massachusetts Port Authority in 1999, she is surprised at the lack of cameras at Logan, and orders them that year. Yet by 9/11, they still will not have been installed. [Boston Herald, 9/29/2001; Boston Globe, 9/30/2001] In spite of Logan’s poor security record, after 9/11 the Boston Globe will report, “[A]viation specialists have said it is unlikely that more rigorous attention to existing rules would have thwarted the 10 hijackers who boarded two jets at Logan on Sept. 11.” [Boston Globe, 10/17/2001]

Entity Tags: Newark International Airport, Washington Dulles International Airport, Virginia Buckingham, Federal Aviation Administration, Logan International Airport

Timeline Tags: Complete 911 Timeline

The Federal Aviation Administration (FAA) finds at least 136 security violations at Boston’s Logan Airport between 1997 and early 1999. Flights 11 and 175 will depart from Logan on 9/11. Massachusetts Port Authority, which operates the airport, is fined $178,000 for these breaches, which include failing to screen baggage properly and easy access to parked planes. In summer 1999, a teenager is able to climb over the airport’s security fence, walk two miles across the tarmac, board a 747, and fly on it to London. In September 1999, the Boston Globe finds that doors are often left open at the airport, making it possible for potentially anyone to gain access to planes on the ground. [Boston Globe, 9/12/2001; Washington Post, 9/12/2001] After 9/11, an analysis by the Boston Globe will conclude that Logan’s security record is “dismal” (see 1991-2000). [Boston Globe, 9/26/2001]

Entity Tags: Massachusetts Port Authority, Logan International Airport, Federal Aviation Administration

Timeline Tags: Complete 911 Timeline

Mary Carol Turano is appointed director of the Federal Aviation Administration’s Boston Civil Aviation Security Field Office (CASFO). This is the office that oversees security at Logan Airport, from where Flights 11 and 175 depart on 9/11. Yet Turano has little experience in airport security, and has not even begun the basic training that all FAA special agents must undergo. During her tenure, according to an agent who is assigned to Logan, staff that document security violations become frustrated, as she allows violations to accumulate without taking appropriate action. After 9/11, it will be revealed that she lacks the identification badge necessary for unescorted access to secure areas. An official familiar with airport security procedures will comment, “An organization does well what a commander checks, and how can you check what they do if you don’t have a ramp access badge?” Turano is subsequently reassigned. [Associated Press, 9/29/2001; Boston Globe, 9/29/2001; WBUR (Boston), 10/4/2001; Thomas, 2003, pp. 61; 9/11 Commission, 3/11/2004 pdf file] Logan Airport’s poor record for security continues while she heads CASFO (see 1991-2000 and 1997-September 1999).

Entity Tags: Boston Civil Aviation Security Field Office, Mary Carol Turano, Federal Aviation Administration

Timeline Tags: Complete 911 Timeline

9/11 hijackers Nawaf Alhazmi and Khalid Almihdhar pay $3,000 for a 1998 Toyota Corolla in San Diego. Three days later, the California vehicle registration is made in Almihdhar’s correct name, but a false San Diego address is used. In June 2000, Almihdhar will transfer ownership of the car to Alhazmi just before Almihdhar leaves the US. Alhazmi will buy insurance for the car in October 2000. [Federal Bureau of Investigation, 10/2001, pp. 55, 67, 90 pdf file; Cox News Service, 10/21/2001] Alhazmi will get a speeding ticket while driving the car through Oklahoma in April 2001 (see April 1, 2001). The car’s license plate will be queried by police in New Jersey in July 2001 (see July 7, 2001). The car will be found outside Dulles Airport in Washington one day after 9/11 (see September 11-13, 2001). However, shortly before 9/11, an FBI agent assigned to find out if Alhazmi and Almihdhar are in the US will fail to find any records relating to this car, even though information on Alhazmi’s ownership of the car is in nationwide police and motor vehicle databases. He will also fail to check vehicle registration and license plate databases (see September 4-5, 2001 and September 5, 2001).

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Timeline Tags: Civil Liberties

Alleged 9/11 hijacker Mohamed Atta is seen by at least two people, examining the security checkpoints at Logan International Airport in Boston—the airport at which he will board Flight 11 on September 11—but no action is taken when the witnesses report their concerns about his suspicious behavior. [Sullivan, 12/23/2013 pdf file; WCVB 5 (Boston), 10/6/2014]
Supervisor Sees Atta Filming a Security Checkpoint - Theresa Spagnuolo, a supervisor for Globe Aviation Services, sees a Middle Eastern man videotaping the main security checkpoint at the airport. The man, Spagnuolo will later describe, is between 5 feet 5 and 5 feet 6 tall, with one day’s beard growth. After 9/11, she will recognize him as Atta from photos she is shown by investigators and seeing Atta’s picture on television. Worried by the man’s behavior, she tells her supervisor, James Miller, what she has seen. Miller, though, says nothing can be done about her concerns because the man is in a public area. According to the New York Post, however, this is untrue. “[A]irport security had clear authority to investigate anybody surveilling a checkpoint,” it will state, “and [Atta’s] activity should have raised major red flags.” Shortly after 9/11, Miller will claim he has no recollection of this incident and his alleged conversation with Spagnuolo. [Bureau of Alcohol, Tobacco, and Firearms, 9/17/2001 pdf file; New York Post, 10/5/2014]
Technician Sees Two Men Behaving Suspiciously - Meanwhile, Stephen Wallace, an American Airlines technician, notices two Middle Eastern men acting suspiciously sometime between 8:00 a.m. and 9:30 a.m. outside the main security checkpoint. He sees one of the men taking photos, and recording video of the checkpoint and the flight information display screens. He sees the other man speaking loudly in Arabic on a cell phone. Wallace will describe the men as having a dark complexion and being of medium height or perhaps slightly less than medium height. The man he sees talking on a cell phone has “no chin and dead eyes,” he will say. After 9/11, he will identify this man as Atta from photos he is shown by investigators. Whether he will be able to identify the other suspicious man is unstated. The two men are dressed like they are from Miami, Florida, Wallace will say. Atta is wearing a shiny grey shirt while the other man is wearing a tan shirt with stripes and flowers on it. Both men are wearing new leather shoes but no socks. Wallace observes them behaving suspiciously for about 45 minutes.
Port Authority Employees Think the Men Are Speaking Portuguese - Wallace alerts a couple of Massachusetts Port Authority employees who are nearby. He tells them the men have been taking photos, recording video, and talking Arabic on the phone. However, the Port Authority employees are apparently unconcerned. They tell Wallace the two men are “okay” and are speaking Portuguese, not Arabic. Wallace, though, is sure the men have been talking in Arabic.
Technician Questions the Suspicious Men - Due to his concerns, Wallace eventually walks up to the men and questions them about their carry-on luggage. They have what he will describe as “brand new” pilot bags with them. One of the bags is open and Wallace sees three disposable cameras, a video camera, files, and a cell phone in it. He points to a kiosk display of items that are prohibited on planes and says, “You guys don’t have any of this stuff in your bags, do you?” In response, one of the men addresses the other and refers to Wallace using an Arabic swear word while gesturing toward the technician. The two men then nervously pack up their bags and hurry toward another security checkpoint.
State Trooper Takes No Action - Wallace follows them and, before they reach it, alerts a Massachusetts state trooper to them. [Bureau of Alcohol, Tobacco, and Firearms, 9/17/2001 pdf file; Merrill Corp., 7/17/2007 pdf file; New York Post, 10/5/2014] He tells the state trooper: “These two clowns are up to something. They’ve been taking videos and pictures down at the checkpoint.” However, nothing is done in response to his concerns. The men are not stopped, questioned, or asked for IDs. [WCVB 5 (Boston), 10/6/2014] Wallace is unsure if they subsequently get on a plane but he thinks they board a flight to Washington, DC.
Action Today Could Have Prevented 9/11, Expert Will Say - There are no security cameras at the airport’s security checkpoints (see 1991-2000 and September 29, 2001), and so no images of Atta and his companion are recorded. Brian Sullivan, a retired special agent and risk management specialist for the Federal Aviation Administration, will express frustration at the lack of response to the sightings of Atta today when he learns of this incident after 9/11. “I’m convinced that had action been taken after the sighting of Atta, the 9/11 attacks, at least at Logan, could have been deterred,” he will say. Referring to Atta, the New York Post will comment, “[T]he worst terrorist hijacker in history was allowed to waltz through security without anyone stopping him, asking his name, checking his ticket, taking a picture, looking at his driver’s license or passport, opening his bags, or patting him down.” [Bureau of Alcohol, Tobacco, and Firearms, 9/17/2001 pdf file; Merrill Corp., 7/17/2007 pdf file; New York Post, 10/5/2014] Atta will again be seen behaving suspiciously at Logan Airport on September 9 (see September 9, 2001). [PBS, 1/17/2002; Associated Press, 5/28/2002; Guardian, 7/5/2002]

Entity Tags: James Miller (Globe Aviation Services), Massachusetts Port Authority, Brian Sullivan, Stephen Wallace, Mohamed Atta, Theresa Spagnuolo

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

An identity card of Mustafa Ahmed al-Hawsawi used in some of these transactions.An identity card of Mustafa Ahmed al-Hawsawi used in some of these transactions. [Source: US District Court for the Eastern District of Virginia, Alexandria Division]The hijackers in the US return money to Mustafa Ahmed al-Hawsawi, one of their facilitators in the United Arab Emirates:
bullet September 4: Hijacker Mohamed Atta sends al-Hawsawi a FedEx package from Florida. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006 pdf file] The package contains hijacker Fayez Ahmed Banihammad’s ATM card and checkbook. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 10 pdf file] The FedEx bill will be found shortly after 9/11 in the trash at the hotel Atta stays at on the night before 9/11 (see September 11-13, 2001);
bullet September 5: $8,000 is wired from Banihammad’s SunTrust bank account to his bank account in the United Arab Emirates, to which al-Hawsawi has access (see June 25, 2001);
bullet September 8: Mohamed Atta sends $2,860 to “Mustafa Ahmed” from a Western Union office in Laurel, Maryland;
bullet September 8: Later that day Atta sends another $5,000 to “Mustafa Ahmed” from another Western Union office in the same town;
bullet September 9: Hijacker Waleed Alshehri sends $5,000 to “Ahamad Mustafa” from a Western Union office at Logan Airport in Boston;
bullet September 10: Hijacker Marwan Alshehhi sends $5,400 to “Mustafa Ahmad” from a Western Union office at the Greyhound Bus Station in Boston;
bullet September 10: Hijackers Nawaf Alhazmi and Hani Hanjour use the name “Rawf Al Dog” to send an express mail package from Laurel, Maryland, to Sharjah, United Arab Emirates. When the FBI intercepts the package at Dulles Airport after 9/11, they find it contains the debit card and PIN for Khalid Almihdhar’s First Union Bank account, which has a balance of $9,838.31. [MSNBC, 12/11/2001; US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 75 pdf file; US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 76 pdf file]
Atta, Alshehhi, and Alshehri also call al-Hawsawi at this time to give him the numbers for the money they are sending. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 10 pdf file] Although al-Hawsawi admits receiving this money in a substitution for testimony at the trial of Zacarias Moussaoui in 2006 and again at a Guantanamo Bay hearing (see March 21, 2007), some detainees are apparently subjected to torture, which has led some to doubt the reliability and validity of their statements (see June 16, 2004). [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 10 pdf file; US department of Defense, 3/21/2007 pdf file]

Entity Tags: Marwan Alshehhi, Khalid Almihdhar, Mustafa Ahmed al-Hawsawi, Fayez Ahmed Banihammad, Mohamed Atta, Hani Hanjour, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

At Boston’s Logan Airport, during the morning, businesswoman Jan Shineman is checking in for Flight 11 to Los Angeles, when she notices a man resembling 9/11 hijacker Mohamed Atta behaving suspiciously. She later recalls him wearing “summery, holiday-type clothes… and he had no baggage, just a folder with a notebook.” She sees him again at the gate for Flight 11, “taking notes, watching the pilots in the cockpit through the window by the gate. They were running through their pre-flight checks.” She decides, “if he had boarded I would have told the captain about him, he was so odd and frightening.” [Guardian, 7/5/2002; Corbin, 2003, pp. 229] Atta will return to Logan Airport and board Flight 11 to Los Angeles on 9/11. [9/11 Commission, 7/24/2004, pp. 1-2]

Entity Tags: Jan Shineman, Mohamed Atta, Logan International Airport

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Hijacker Abdulaziz Alomari using an ATM in Portland, Maine, on September 10, at 8:41 p.m. Mohamed Atta can be seen further back in the first and last image.
Hijacker Abdulaziz Alomari using an ATM in Portland, Maine, on September 10, at 8:41 p.m. Mohamed Atta can be seen further back in the first and last image. [Source: FBI]9/11 hijackers Mohamed Atta and Abdulaziz Alomari arrive in Portland, Maine, where they spend the night. In October 2001, the FBI will release detailed information and photographs of the two hijackers in the town in an apparent attempt to find out from the public more about what they were doing there. According to the FBI, the pair leave Boston in the afternoon in a blue Nissan Altima and drive to South Portland, where they check into a Comfort Inn around 5:45 p.m. They are caught on security cameras visiting a gas station, two ATMs, and shopping at a Wal-Mart. The next morning they fly back to Boston, where they board the airplane they will hijack. [South Florida Sun-Sentinel, 9/28/2001; Boston Herald, 10/5/2001; Portland Press Herald, 10/5/2001; Australian Broadcasting Corporation, 11/12/2001] In September 2002, the New York Times speculates, “There have been many theories [for going to Portland]: that they made contact with a confederate in Portland who gave them the final go-ahead, or more likely, that by arriving on a connecting flight, they would avoid the security check in Boston. None of those explanations seems entirely satisfactory, given the risk….” [New York Times, 9/11/2002] The 9/11 Commission will later speculate that the most “plausible theory” is that the hijackers make the trip so as to help avoid suspicion that might be created from all ten hijackers departing on Boston flights arriving in the Boston airport at roughly the same time. [Washington Post, 2/13/2005]

Entity Tags: Mohamed Atta, Abdulaziz Alomari, Comfort Inn, 9/11 Commission, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Chris Lyons, a newspaper delivery driver, sees four or five Middle Eastern men near the entrance of Portland airport, from where alleged hijackers Mohamed Atta and Abdulaziz Alomari will later take a plane to Boston (see (6:00 a.m.) September 11, 2001). The men are speaking Arabic among themselves and hauling about ten suitcases into the airport. Lyons later says they “stuck out because usually no one is around at that hour.” After 9/11, local police will say they don’t think the men are connected to the attacks. However, Lyons is concerned that they might have been “support people,” because, he says, “It’s just too much of a coincidence that this group of businessmen was leaving Portland the morning of the terrorist attacks.” [Portland Press Herald, 9/22/2001; Portland Press Herald, 10/21/2001]

Entity Tags: Chris Lyons, Portland International Jetport

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Abdulaziz Alomari (a passport stamp overlaps part of his face).Abdulaziz Alomari (a passport stamp overlaps part of his face). [Source: FBI]Having spent the previous night at the Comfort Inn in Portland, Maine (see September 10, 2001), hijackers Mohamed Atta and Abdulaziz Alomari check out at 5:33 a.m. and drive their rented Nissan to the nearby Portland International Jetport Airport, entering its parking lot at 5:40 a.m. The FBI will later seize their car there. [Observer, 9/16/2001; Portland Press Herald, 10/5/2001; Federal Bureau of Investigation, 10/5/2001; Newsday, 4/17/2006] Their flight is due to take off for Boston at 6:00 a.m. (see (6:00 a.m.) September 11, 2001). The Boston Globe points out, “Any significant delay would foil [Atta’s] big plans for the day.” [Boston Globe, 9/16/2001] The 9/11 Commission later concludes: “The Portland detour almost prevented Atta and Omari from making Flight 11 out of Boston.” [9/11 Commission, 6/16/2004]

Entity Tags: Abdulaziz Alomari, Portland International Jetport, Mohamed Atta

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Michael Tuohey.Michael Tuohey. [Source: CNN]9/11 hijackers Mohamed Atta and Abdulaziz Alomari check in at the US Airways counter at Portland International Jetport. [Portland Press Herald, 10/5/2001; Federal Bureau of Investigation, 10/5/2001] They are wearing ties and jackets. Atta checks in two bags, Alomari none. Atta is randomly selected for additional security scrutiny by the FAA’s Computer Assisted Passenger Prescreening System (CAPPS) (see (6:20 a.m.-7:48 a.m.) September 11, 2001). However, the only consequence is that his checked bags will be held off the plane until it is confirmed that he has boarded. [9/11 Commission, 7/24/2004, pp. 1; 9/11 Commission, 8/26/2004, pp. 2; CNN, 3/3/2006] Noting that their flight is soon due to leave, the ticket agent who checks them in, Michael Tuohey, says, “You’re cutting it close.” [Portland Press Herald, 3/6/2005] Tuohey thinks the pair seems unusual. He notices they both have $2,500 first-class, one-way tickets. He later comments, “You don’t see many of those.” Atta looks “like a walking corpse. He looked so angry.” In contrast, Tuohey will say, Alomari can barely speak English and has “a goofy smile, I can’t believe he knew he was going to die that day.” Tuohey will later recount, “I thought they looked like two Arab terrorists but then I berated myself for the stereotype and did nothing.” [Philadelphia Daily News, 2/24/2005; Mirror, 9/11/2005; CNN, 3/3/2006] Atta becomes angry when Tuohey informs him he will have to check in again in Boston. He complains that he was assured he would have a “one-step check-in.” [9/11 Commission, 8/26/2004, pp. 2; Associated Press, 3/7/2005] Tuohey will be recalled to work later in the day to speak to an FBI agent about his encounter with Atta and Alomari. He is shown video footage of them passing through the airport’s security checkpoint upstairs (see (Between 5:45 a.m. and 5:53 a.m.) September 11, 2001). Although recognizing the two men, he notices that in the video they are no longer wearing the jackets and ties they’d had on when checking in just minutes before. He assumes they must have taken these off and tucked them into their carry-on baggage. He is also informed that the security camera behind his own desk, which should have captured the two hijackers, has in fact been out of order for some time. [Portland Press Herald, 3/6/2005; CNN, 3/3/2006]

Entity Tags: Federal Aviation Administration, Computer Assisted Passenger Prescreening System, Mohamed Atta, Portland International Jetport, Abdulaziz Alomari, Michael Tuohey

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Abdulaziz Alomari, right, and Mohamed Atta, left (in dark shirt), passing through security in the Portland, Maine, airport. Note the different times on the two time stamps, one in the middle, one at the bottom.Abdulaziz Alomari, right, and Mohamed Atta, left (in dark shirt), passing through security in the Portland, Maine, airport. Note the different times on the two time stamps, one in the middle, one at the bottom. [Source: FBI]Minutes after arriving at the Portland airport, hijackers Mohamed Atta and Abdulaziz Alomari pass through the airport’s single security checkpoint, on the way to boarding their 6 a.m. flight to Boston. The checkpoint has a surveillance camera pointing at it, which captures them as they go through. [Time, 9/24/2001; 9/11 Commission, 8/26/2004, pp. 2-3] Some reports say the pair passes through at 5:53 a.m. [Associated Press, 9/14/2001; New York Times, 9/14/2001; Washington Post, 9/14/2001] Other reports put it earlier, at 5:45 a.m. [Portland Press Herald, 10/5/2001; Federal Bureau of Investigation, 10/5/2001; 9/11 Commission, 8/26/2004, pp. 3] Strangely, when stills from the surveillance camera are later publicly released, they show two time stamps, one of 5:45 and another of 5:53. [Guardian, 9/21/2001; Federal Bureau of Investigation, 10/4/2001] When they’d checked in just minutes earlier, Atta and Alomari were observed wearing ties and jackets (see 5:43 a.m. September 11, 2001). But in the security video footage, they have just open-necked shirts, with no jackets or ties. [Philadelphia Daily News, 2/24/2005; Portland Press Herald, 3/6/2005; CNN, 3/3/2006]

Entity Tags: Portland International Jetport, Mohamed Atta, Abdulaziz Alomari

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijackers Mohamed Atta and Abdulaziz Alomari’s flight from Portland to Boston takes off. [Federal Bureau of Investigation, 10/4/2001] Their plane, Colgan Air Flight 5930, is a 19-seat Beechcraft 1900. [Federal Bureau of Investigation, 2001; 9/11 Commission, 8/26/2004, pp. 3] Fellow passengers Vincent Meisner and Roger Quirion will later say Atta and Alomari board separately, keep quiet, and do not draw attention to themselves. [Chicago Sun-Times, 9/16/2001; Washington Post, 9/16/2001] Quirion, says: “They struck me as business travelers. They were sitting down, talking, seems like they were going over some paperwork.” [CBS News, 10/12/2001]

Entity Tags: Mohamed Atta, Abdulaziz Alomari, Vincent Meisner, Roger Quirion

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

All the alleged 9/11 hijackers reportedly check in at the airports from where they board Flights 11, 175, 77, and 93. [9/11 Commission, 7/24/2004, pp. 1-4; 9/11 Commission, 8/26/2004, pp. 27, 89, 93] Since 1998, the FAA has required air carriers to implement a program called the Computer Assisted Passenger Prescreening System (CAPPS). This identifies those passengers who might be a security risk, based upon suspicious behavior such as buying one-way tickets or paying with cash. CAPPS also randomly assigns some passengers to receive additional security scrutiny. If a particular passenger has been designated as a “selectee,” this information is transmitted to the airport’s check-in counter, where a code is printed on their boarding pass. At the airport’s security checkpoints, selectees are subjected to additional security measures. [US News and World Report, 4/1/2002; 9/11 Commission, 1/27/2004; US Congress, 3/17/2004; 9/11 Commission, 8/26/2004, pp. 2, 85] Their baggage is to be screened for explosives or held off the plane until they have boarded. Supposedly, the thinking behind this is that someone smuggling a bomb onto a plane won’t get onto that same flight. According to the 9/11 Commission, nine of the 19 hijackers are flagged by the CAPPS system before boarding Flights 11, 175, 77, and 93. [Washington Post, 1/28/2004; 9/11 Commission, 7/24/2004, pp. 84; United States of America v. Zacarias Moussaoui, a/k/a Shaqil, a/k/a Abu Khalid al Sahrawi, Defendant, 3/6/2006] In addition, Mohamed Atta was selected when he checked in at the airport in Portland, for his earlier connecting flight to Boston (see 5:33 a.m.-5:40 a.m. September 11, 2001). All of the hijackers subsequently pass through security checkpoints before boarding their flights. [9/11 Commission, 7/24/2004, pp. 1-4]

Entity Tags: Federal Aviation Administration, Computer Assisted Passenger Prescreening System

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

During this period, all five Flight 11 hijackers check in at Boston’s Logan Airport and board their plane, bound for Los Angeles. The FAA has a program in place called the Computer Assisted Passenger Prescreening System (CAPPS), which is designed to identify those passengers most likely requiring additional scrutiny by airport security (see (6:20 a.m.-7:48 a.m.) September 11, 2001). Ticket records will show that CAPPS selects three of the Flight 11 hijackers at Logan: Since Waleed Alshehri checks no bags his selection has no consequences; Wail Alshehri and Satam Al Suqami have their bags scanned for explosives, but are not stopped. All five hijackers would need to pass through a security checkpoint to reach the departure gate for their flight. Each would have been screened as they walked through a metal detector calibrated to detect items with at least the metal content of a small-caliber handgun. If they’d set this off, they would have been screened with a handheld metal detector. An X-ray machine would have screened their carry-on luggage. However, Logan Airport has no video surveillance of its security checkpoints (see 1991-2000), so there is no documentary evidence of exactly when they pass through them, or if alarms are triggered. According to the 9/11 Commission, none of the checkpoint supervisors later recall seeing any of the Flights 11 hijackers, or report anything suspicious having occurred. [9/11 Commission, 1/27/2004; 9/11 Commission, 7/24/2004, pp. 1-2; 9/11 Commission, 8/26/2004, pp. 5-6] However, a WorldNetDaily article will claim that some Logan staff members recall seeing Mohamed Atta (see (6:50 a.m.-7:40 a.m.) September 11, 2001). [WorldNetDaily, 9/21/2001] The Boston Globe will later comment, “aviation specialists have said it is unlikely that more rigorous attention to existing rules would have thwarted the 10 hijackers who boarded two jets at Logan on Sept. 11. At the time, the knives and box-cutters they were carrying were permitted.” [Boston Globe, 10/17/2001]

Entity Tags: Satam Al Suqami, Computer Assisted Passenger Prescreening System, Wail Alshehri, Federal Aviation Administration, Logan International Airport, Waleed Alshehri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

According to an article on the conservative news website WorldNetDaily, alleged lead 9/11 hijacker Mohamed Atta almost misses Flight 11 and has to rush to the departure gate at Boston’s Logan Airport. The article is based on the account of an unnamed American Airlines employee at Logan, and claims Atta is running late because his connecting flight from Portland was delayed (see (6:00 a.m.) September 11, 2001). However, the 9/11 Commission claims that this plane was “on time,” and says Atta is observed at Logan with Abdulaziz Alomari, asking for directions in a parking lot (see 6:45 a.m. September 11, 2001). The employee says that at the baggage check-in, when asked security questions, Atta claims he does not speak English. A supervisor is called for, who just sends him towards the departure gate, as it is close to his plane’s take-off time. Atta rushes through the security checkpoint, then down to the gate, where he shows up perspiring. The employee comments, “The nitwit. You know, they’d been planning it for five years, and he’s running late for the flight.” An American Airlines spokeswoman will refuse to comment on this account, saying all American employees have been ordered not to speak to the press. [WorldNetDaily, 9/21/2001; 9/11 Commission, 8/26/2004, pp. 3, 5]

Entity Tags: Mohamed Atta, Logan International Airport

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

According to the 9/11 Commission, between 7:03 a.m. and 7:39 a.m. the four alleged Flight 93 hijackers check in at the United Airlines ticket counter at Newark (New Jersey) Liberty International Airport. Only Ahmad Alhaznawi is selected for additional scrutiny by airport security under the FAA’s CAPPS program (see (6:20 a.m.-7:48 a.m.) September 11, 2001). The only consequence is that his checked bag is screened for explosives, and not loaded onto the plane until it is confirmed that he has boarded. [9/11 Commission, 1/27/2004; 9/11 Commission, 7/24/2004, pp. 4; 9/11 Commission, 8/26/2004, pp. 35] On their way to boarding the plane, all four would pass through a security checkpoint, which has three walk-through metal detectors, two X-ray machines, and explosive trace detection equipment. [9/11 Commission, 8/26/2004, pp. 97] The 9/11 Commission later claims Newark Airport has no video cameras monitoring its security checkpoints, so there is no documentary evidence showing when the hijackers passed through the checkpoint or what alarms may have been triggered. [9/11 Commission, 7/24/2004, pp. 4; 9/11 Commission, 8/26/2004, pp. 35] However, Michael Taylor, the president of a security company, who has done consulting work for the New York Port Authority (which operates the airport), claims that Newark does use security cameras at the time of 9/11. [Boston Herald, 9/29/2001] All of the screeners on duty at the checkpoint are subsequently interviewed, and none report anything unusual or suspicious having occurred. [9/11 Commission, 7/24/2004, pp. 4; 9/11 Commission, 8/26/2004, pp. 35] The 9/11 Commission later concludes that the passports of Ahmad Alhaznawi and fellow Flight 93 hijacker Ahmed Alnami have suspicious indicators and could have been linked to al-Qaeda, but it does not elaborate on this. [Baltimore Sun, 1/27/2004]

Entity Tags: Ahmed Alnami, Al-Qaeda, Newark International Airport, Federal Aviation Administration, Ahmed Alhaznawi, United Airlines, Computer Assisted Passenger Prescreening System

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

An unnamed gate agent at Logan Airport in Boston calls Donald Bennett, the crew chief for Flight 11, and asks him if the two suitcases of a passenger who has just boarded the plane have arrived from US Airways. Bennett replies that the suitcases, which belong to lead 9/11 hijacker Mohamed Atta, have arrived, but Flight 11’s baggage compartment has already been locked for departure, so they will not be loaded. Atta flew from Portland to Boston on a Colgan Air flight operated for US Airways (see (6:00 a.m.) September 11, 2001). American Airlines baggage expediter Philip Depasquale will later claim that bags from US Airways are always late, and so this problem is a common occurrence. The luggage is turned over to Depasquale to have it sent to Los Angeles on another flight. According to Salvatore Misuraca, a ramp service manager for American Airlines at Logan Airport, gate agents do not usually call about a bag unless the passenger that owns it has specifically asked about it, to ensure that their bags have been put on their flight. Atta’s luggage will remain at Logan Airport and be found after the attacks, revealing important clues (see September 11-13, 2001). [Federal Bureau of Investigation, 9/11/2001; Federal Bureau of Investigation, 9/17/2001; 9/11 Commission, 2/10/2004]

Entity Tags: Salvatore P. Misuraca, Philip Depasquale, Logan International Airport, Mohamed Atta, Donald Bennett, American Airlines

Timeline Tags: Complete 911 Timeline

When a housekeeper at the Park Inn in Boston, where 9/11 hijackers Wail and Waleed Alshehri stayed before the attacks, attempts to clean their room, a “male of foreign descent” tells her she should not clean it yet and should return in the early afternoon, as someone is still asleep there. The hijackers are thought to have left the hotel and checked in for their flights several hours previously (see (6:20 a.m.-7:48 a.m.) September 11, 2001). The male’s identity is unknown and the housekeeper’s story appears to confuse the FBI, as an entry about it in an FBI timeline drafted after the attacks ends with five question marks. [Federal Bureau of Investigation, 10/2001, pp. 292 pdf file]

Entity Tags: Wail Alshehri, Waleed Alshehri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

One page of a torn up 757 cockpit poster used by the hijackers. It was found in a trash compactor at the Days Inn, near the Newark Airport.One page of a torn up 757 cockpit poster used by the hijackers. It was found in a trash compactor at the Days Inn, near the Newark Airport. [Source: FBI]Investigators find a remarkable number of possessions left behind by the hijackers:
bullet Two of Mohamed Atta’s bags are found on 9/11. They contain a handheld electronic flight computer, a simulator procedures manual for Boeing 757 and 767 aircraft, two videotapes relating to “air tours” of the Boeing 757 and 747 aircraft, a slide-rule flight calculator, a copy of the Koran, Atta’s passport, his will, his international driver’s license, a religious cassette tape, airline uniforms, a letter of recommendation, “education related documentation” and a note (see September 28, 2001) to other hijackers on how to mentally prepare for the hijacking. [Sydney Morning Herald, 9/15/2001; Boston Globe, 9/18/2001; Independent, 9/29/2001; Associated Press, 10/5/2001] Author Terry McDermott will later comment, “Atta’s bag contained nearly every important document in his life… If you wanted to leave a roadmap for investigators to follow, the suitcase was a pretty good place to start.” [McDermott, 2005, pp. 306]
bullet Marwan Alshehhi’s rental car is discovered at Boston’s Logan Airport containing an Arabic language flight manual, a pass giving access to restricted areas at the airport, documents containing a name on the passenger list of one of the flights, and the names of other suspects. The name of the flight school where Atta and Alshehhi studied, Huffman Aviation, is also found in the car. [Los Angeles Times, 9/13/2001]
bullet A car registered to Nawaf Alhazmi is found at Washington’s Dulles Airport on September 12. This is the same car he bought in San Diego in early 2000 (see March 25, 2000). Inside is a copy of Atta’s letter to the other hijackers, a cashier’s check made out to a flight school in Phoenix, four drawings of the cockpit of a 757 jet, a box cutter-type knife, maps of Washington and New York, and a page with notes and phone numbers. [Arizona Daily Star, 9/28/2001; Cox News Service, 10/21/2001; Die Zeit (Hamburg), 10/1/2002] The name and phone number of Osama Awadallah, a friend of Alhazmi and Khalid Almihdhar in San Diego, is also found on a scrap of paper in the car (see September 12, 2001 and After). [CNN, 2/1/2002]
bullet A rental car is found in an airport parking lot in Portland, Maine. Investigators are able to collect fingerprints and hair samples for DNA analysis. [Portland Press Herald, 10/14/2001]
bullet A Boston hotel room contains airplane and train schedules. [Sydney Morning Herald, 9/15/2001]
bullet FBI agents carry out numerous garbage bags of evidence from a Florida apartment where Saeed Alghamdi lived. [CNN, 9/17/2001]
bullet Two days before 9/11, a hotel owner in Deerfield Beach, Florida, finds a box cutter left in a hotel room used by Marwan Alshehhi and two unidentified men. The owner checks the nearby trash and finds a duffel bag containing Boeing 757 manuals, three illustrated martial arts books, an 8-inch stack of East Coast flight maps, a three-ring binder full of handwritten notes, an English-German dictionary, an airplane fuel tester, and a protractor. The FBI seizes all the items when they are notified on September 12 (except the binder of notes, which the owner apparently threw away). [Miami Herald, 9/16/2001; Associated Press, 9/16/2001]
bullet In an apartment rented by Ziad Jarrah and Ahmed Alhaznawi, the FBI finds a notebook, videotape, and photocopies of their passports. [Miami Herald, 9/15/2001]
bullet In a bar the night before 9/11, after making predictions of a attack on America the next day, the hijackers leave a business card and a copy of the Koran at the bar. The FBI also recovers the credit card receipts from when they paid for their drinks and lap dances. [Associated Press, 9/14/2001]
bullet A September 13 security sweep of Boston airport’s parking garage uncovers items left behind by the hijackers: a box cutter, a pamphlet written in Arabic, and a credit card. [Washington Post, 9/16/2001]
bullet A few hours after the attacks, suicide notes that some of the hijackers wrote to their parents are found in New York. Credit card receipts showing that some of the hijackers paid for flight training in the US are also found. [Los Angeles Times, 9/13/2001]
bullet A FedEx bill is found in a trash can at the Comfort Inn in Portland, Maine, where Atta stayed the night before 9/11. The bill leads to Dubai, United Arab Emirates, allowing investigators to determine much of the funding for 9/11. [Newsweek, 11/11/2001; London Times, 12/1/2001]
bullet A bag hijackers Alhazmi and Almihdhar left at a mosque in Laurel, Maryland, is found on September 12. The bag contains flight logs and even receipts from flight schools from San Diego the year before (see September 9, 2001).
bullet On 9/11, in a Days Inn hotel room in Newark, New Jersey, investigators find used plane tickets for Saeed Alghamdi, Ahmed Alhaznawi, Ziad Jarrah, and Ahmed Alnami. The tickets are all from a Spirit Continental Airlines flight from Ft. Lauderdale, Florida, to Newark on September 7. Also, flight manuals for Boeing 757 and 767 airplanes are found in English and Arabic. [Investigative Services Division, FBI Headquarters, 4/19/2002]
The hijackers past whereabouts can even be tracked by their pizza purchases. An expert points out: “Most people pay cash for pizza. These [hijackers] paid with a credit card. That was an odd thing.” [San Diego Union-Tribune, 9/3/2002] “In the end, they left a curiously obvious trail—from martial arts manuals, maps, a Koran, Internet and credit card fingerprints. Maybe they were sloppy, maybe they did not care, maybe it was a gesture of contempt of a culture they considered weak and corrupt.” [Miami Herald, 9/22/2001] The New Yorker quotes a former high-level intelligence official as saying: “Whatever trail was left was left deliberately—for the FBI to chase” (see Late September 2001). [New Yorker, 10/8/2001]

Entity Tags: Huffman Aviation, Federal Bureau of Investigation, Washington Dulles International Airport, Marwan Alshehhi, Ahmed Alhaznawi, Ahmed Alnami, Mohamed Atta, Saeed Alghamdi, Osama Awadallah, Nawaf Alhazmi, Terry McDermott, Ziad Jarrah

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

On September 12, 2001, 9/11 hijacker Nawaf Alhazmi’s 1988 Toyota Corolla is found at a parking lot near Washington, DC. Alhazmi and fellow hijacker Khalid Almihdhar bought the car in San Diego in March 2000 (see March 25, 2000). [Los Angeles Times, 9/27/2001] Various items are found in the car (see September 11-13, 2001), including an old telephone number of Osama Awadallah. Alhazmi knew Awadallah when he lived in San Diego in 2000. Awadallah’s San Diego house is searched soon thereafter, and photos, videos, and articles relating to Osama bin Laden are found. Investigators also discover that copies of bin Laden’s fatwas (religious edicts) and other similar materials were distributed by people living in the house. [9/11 Commission, 7/24/2004, pp. 219-220] Awadallah worked with Alhazmi at a San Diego gas station with a number of radical Islamists (see Autumn 2000). A witness claims that one day before 9/11, he seemed to be celebrating the upcoming 9/11 attacks at the gas station, telling co-workers, “it is finally going to happen” (see Late August-September 10, 2001). Authorities will never develop enough evidence to charge Awadallah with any serious crime, and he will be deported in 2006 after a long legal battle (see May 4, 2006).

Entity Tags: Osama bin Laden, Khalid Almihdhar, Nawaf Alhazmi, Osama Awadallah

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mohamed Abdi, a 44-year-old Somali immigrant whose phone number was found in a car belonging to one the 9/11 hijackers, is detained without bail in Alexandria, Va. On September 12, 2001, FBI investigators discovered a car registered to 9/11 hijacker Nawaf Alhazmi at Dulles Airport (see September 11-13, 2001). In the car, they found a Washington-area map with the name “Mohumad” and a Virginia phone number belonging to Mohamed Abdi. At the court hearing, an FBI investigator says that Abdi has not explained the finding and is suspected of being linked to the hijackers. FBI Special Agent Kevin W. Ashby also testifies that an article on Ahmed Ressam was found in Abdi’s clothing. Ressam was convicted of trying to bomb Los Angeles Airport in 2000 (see December 14, 1999). According to press reports, Abdi is not cooperating with police. He came to the United States in 1993 as a refugee. He later brought his wife and four children to the US and obtained US citizenship. Shortly after his arrival, Abdi worked for Caterair, a food service company at Reagan National Airport. At the time of his arrest, Abdi had been working as a low-paid security guard for Burns Security for seven years. Burns does not provide airport security services, however, a Burns subsidiary called Globe Aviation Services provides screening services at several US airports, including the American Airlines concourse at Boston’s Logan Airport, from which one of the hijacked flights took off (see October 10, 2001). Abdi, who has had financial difficulties for some time, is charged with check forgery. He is accused of forging his landlord’s signature to obtain a government housing subsidy. No terrorism charges are filed. [US District Court Eastern District of Virginia, 9/23/2001 pdf file; Washington Post, 9/27/2001 pdf file; Human Events, 10/15/2001; Human Events, 10/15/2001] In January 2002, Abdi will receive a four-month sentence for forgery. Any link he may have had with the hijackers will remain unclear. [Washington Post, 1/12/2002]

Entity Tags: Washington Dulles International Airport, Ronald Reagan Washington National Airport, Nawaf Alhazmi, Logan International Airport, Mohamed Abdi, Globe Aviation Services Corp., Federal Bureau of Investigation, Burns Security

Timeline Tags: Complete 911 Timeline

The first page of a letter attributed to Mohamed Atta.The first page of a letter attributed to Mohamed Atta. [Source: Federal Bureau of Investigation]The text of a handwritten, five-page document found in Mohamed Atta’s luggage is made public. [Federal Bureau of Investigation, 9/28/2001; Washington Post, 9/28/2001; Observer, 9/30/2001] The next day, the London Independent will strongly question if the note is genuine. It points out that the “note suggests an almost Christian view of what the hijackers might have felt,” and is filled with “weird” comments that Muslims would never say, such as “the time of fun and waste is gone.” If the note “is genuine, then the [hijackers] believed in a very exclusive version of Islam—or were surprisingly unfamiliar with their religion.” [Independent, 9/29/2001] Another copy of the document was discovered in a vehicle parked by a Flight 77 hijacker at Washington’s Dulles airport. A third copy of essentially the same document was found in the wreckage of Flight 93. Therefore, the letter neatly ties most of the hijackers together. [CBS News, 9/28/2001] The Guardian comments, “The finds are certainly very fortunate, though some might think them a little too fortunate.” [Guardian, 10/1/2001]

Entity Tags: Mohamed Atta, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

It is reported that Boston’s Logan Airport has no cameras in its terminals, gate areas, or concourses. It is possibly the only major airport in the US not to have such cameras. The two other airports used by the hijackers to launch the 9/11 attacks had security cameras, but only some footage of the hijackers in the Washington airport is leaked to the press in 2004. [Boston Herald, 9/29/2001] It was previously reported that FBI agents had “examined footage from dozens of cameras at the three airports [including Logan] where the terrorists boarded the aircraft.” [Los Angeles Times, 9/13/2001]

Entity Tags: Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline

Journalist Seymour Hersh will write in the New Yorker in late September 2001, “After more than two weeks of around-the-clock investigation into the September 11th attacks on the World Trade Center and the Pentagon, the American intelligence community remains confused, divided, and unsure about how the terrorists operated, how many there were, and what they might do next. It was that lack of solid information, government officials told me, that was the key factor behind the Bush Administration’s decision last week not to issue a promised white paper listing the evidence linking Osama bin Laden’s organization to the attacks” (see September 23-24, 2001). An unnamed senior official tells Hersh, “One day we’ll know, but at the moment we don’t know.” Hersh further reports, “It is widely believed that the terrorists had a support team, and the fact that the FBI has been unable to track down fellow-conspirators who were left behind in the United States is seen as further evidence of careful planning. ‘Look,’ one person familiar with the investigation said. ‘If it were as simple and straightforward as a lucky one-off oddball operation, then the seeds of confusion would not have been sown as they were.’” The hijackers left a surprisingly obvious trail of clues, even regularly paying for delivered pizzas using credit cards in their own name (see September 11-13, 2001). Hersh further reports, “Many of the investigators believe that some of the initial clues that were uncovered about the terrorists’ identities and preparations, such as flight manuals, were meant to be found. A former high-level intelligence official told me, ‘Whatever trail was left was left deliberately—for the FBI to chase.’” [New Yorker, 10/8/2001] Many newspaper reports in late September 2001 indicate doubt over the identities of many hijackers (see September 16-23, 2001). The 9/11 Congressional Inquiry’s 2003 report will strongly suggest that the hijackers at least had numerous accomplices in the US (see July 24, 2003). But the 9/11 Commission’s 2004 report will downplay any suggestions of US accomplices and will indicate no doubts about the hijackers’ identities. [9/11 Commission, 7/24/2004, pp. 231, 238-9]

Entity Tags: Federal Bureau of Investigation, Seymour Hersh

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Former AT&T employee Mark Klein.Former AT&T employee Mark Klein. [Source: PBS]The National Security Agency, as part of its huge, covert, and possibly illegal wiretapping program directed at US citizens (see Spring 2001 and After September 11, 2001), begins collecting telephone records of tens of millions of Americans, using data provided by telecommunications firms such as AT&T, Verizon, and BellSouth (see February 5, 2006). The media will not report on this database until May 2006 (see May 11, 2006). The program collects information on US citizens not suspected of any crime or any terrorist connections. Although informed sources say the NSA is not listening to or recording actual conversations, the agency is using the data to analyze calling patterns in an effort to detect terrorist activity. “It’s the largest database ever assembled in the world,” says one anonymous source. The NSA intends “to create a database of every call ever made.” As a result, the NSA has detailed records of the phone activities of tens of millions of US citizens, from local calls to family and friends to international calls. The three telecommunications companies are working with the NSA in part under the Communications Assistance Act for Law Enforcement (CALEA) (see January 1, 1995 and June 13, 2006) and in part under contract to the agency.
Surveillance Much More Extensive Than Acknowledged - The wiretapping program, which features electronic surveillance of US citizens without court warrants or judicial oversight, is far more extensive than anything the White House or the NSA has ever publicly acknowledged. President Bush will repeatedly insist that the NSA focuses exclusively on monitoring international calls where one of the call participants is a known terrorist suspect or has a connection to terrorist groups (see December 17, 2005 and May 11, 2006), and he and other officials always insist that domestic calls are not monitored. This will be proven false. The NSA has become expert at “data mining,” sifting through reams of information in search of patterns. The warrantless wiretapping database is one source of information for the NSA’s data mining. As long as the NSA does not collect “personal identifiers”—names, Social Security numbers, street addresses, and the like—such data mining is legal. But the actual efficacy of the wiretapping program in learning about terrorists and possibly preventing terrorist attacks is unclear at best. And many wonder if the NSA is not repeating its activities from the 1950s and 1960s, when it conducted “Operation Shamrock” (see 1945-1975), a 20-year program of warrantless wiretaps of international phone calls at the behest of the CIA and other intelligence agencies. Operation Shamrock, among other things, led to the 1978 passage of the Foreign Intelligence Surveillance Act (see 1978). [USA Today, 5/11/2006] In May 2006, former NSA director Bobby Ray Inman will say, “[T]his activity is not authorized” (see May 12, 2006). [Democracy Now!, 5/12/2006]
Secret Data Mining Center - In May 2006, retired AT&T technician Mark Klein, a 22-year veteran of the firm, will file a court affidavit saying that he saw the firm construct a secret data-mining center in its San Francisco switching center that would let the NSA monitor domestic and international communications (see January 2003). And former AT&T workers say that, as early as 2002, AT&T has maintained a secret area in its Bridgeton, Missouri, facility that is likely being used for NSA surveillance (see Late 2002-Early 2003).
Domestic Surveillance Possibly Began Before 9/11 - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, Verizon Communications, Mark Klein, George W. Bush, AT&T, BellSouth, Central Intelligence Agency, Communications Assistance for Law Enforcement Act (CALEA), Foreign Intelligence Surveillance Act, Qwest, National Security Agency

Timeline Tags: Civil Liberties

Sometime in early 2002, President Bush signs a secret executive order authorizing the National Security Agency (NSA) to wiretap phone conversations and read e-mails to and from US citizens. The order extends an operation set into motion at least as early as October 2001 to begin wiretapping US citizens’ phones in a response to the 9/11 attacks. When the program is revealed by the US media in late 2005 (see December 15, 2005), Bush and his officials will say the program is completely legal, though it ignores the requirements of the Foreign Intelligence Surveillance Act (FISA) that requires the government to obtain court-issued warrants to mount surveillance against US citizens. They will insist that only those suspected of having ties to al-Qaeda are monitored, and only when those individuals make or receive international communications. [New York Times, 12/15/2005; Washington Post, 12/22/2005; Newsweek, 12/22/2008] Bush’s order authorizes the NSA to monitor international telephone conversations and international e-mails of hundreds, and perhaps thousands, of US citizens without court warrants, in an effort to track what officials call “dirty numbers” linked to al-Qaeda. When the program is finally revealed by the New York Times over three years later (see December 15, 2005), officials will say that the NSA still seeks warrants to monitor domestic communications. But there is little evidence of this (see, for example, Spring 2001). The presidential order is a radical shift in US surveillance and intelligence-gathering policies, and a major realignment for the NSA, which is mandated to only conduct surveillance abroad. Some officials believe that the NSA’s domestic eavesdropping crosses constitutional limits on legal searches. “This is really a sea change,” a former senior official who specializes in national security law will say in December 2005. “It’s almost a mainstay of this country that the NSA only does foreign searches.” [New York Times, 12/15/2005] Some sources indicate that NSA domestic surveillance activities, such as data-mining, the use of information concerning US persons intercepted in foreign call monitoring, and possibly direct surveillance of US persons, took place prior to 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: George W. Bush, Al-Qaeda, Foreign Intelligence Surveillance Court, National Security Agency

Timeline Tags: Civil Liberties


This partial image from a Total Information Awareness slide presentation shows types of data that will be collected. Note that
even “gait” - the way one walks, will be analyzed.
This partial image from a Total Information Awareness slide presentation shows types of data that will be collected. Note that even “gait” - the way one walks, will be analyzed. [Source: DARPA]The US military internally announces the creation of a new global data collection system called Total Information Awareness. The existence of this program is not reported until August 2002 [Wired News, 8/7/2002] , and not widely known until November 2002 (see November 9, 2002). Interestingly, the early accounts of this program suggest its budget is a “significant amount” of $96 million [Federal Computer Week, 10/17/2002] , and not the $10 million later reported. [Guardian, 11/23/2002] It is also reported that “parts” of the program “are already operational” whereas later it is said to be only in the conceptual stages of development. [Federal Computer Week, 10/17/2002]

Entity Tags: Total Information Awareness, US Department of Defense

Timeline Tags: Civil Liberties

New York Times headline from article revealing NSA surveillance.New York Times headline from article revealing NSA surveillance. [Source: CBS News]The New York Times reveals that after the 9/11 attacks, President Bush granted the National Security Agency (NSA) secret authorization to eavesdrop on Americans and others inside the US without going through the Foreign Intelligence Surveillance Act (FISA) court to obtain legal warrants (see Early 2002. The administration justifies its actions by claiming such eavesdropping, which includes wiretapping phones and reading e-mails, is necessary to find evidence of terrorist activities, and says the nation needs the program after the 9/11 attacks exposed deficiencies in the US intelligence community’s information gathering process, and because of what they characterize as the “handcuffing” of US intelligence agencies by restrictive laws. The Times has had the article for over a year; the White House prevailed on the Times not to publish its findings for that time, arguing that publication would jeopardize continuing investigations and warn potential terrorists that they were under scrutiny. Many believe that the White House wanted to delay the publication of the article until well after the 2004 presidential elections. The Times delayed publication for over a year, and agreed to suppress some information that administration officials say could be useful to terrorists. (Less than two weeks before the article is published, Bush tries to convince the Times not to print the article at all: see December 6, 2005.) Two days after the Times publishes its article, Bush will acknowledge the order, and accuse the Times of jeopardizing national security (see December 17, 2005). The NSA program eavesdrops without warrants on up to 500 people in the US at any given time, officials say; the overall numbers have likely reached into the thousands. Overseas, up to 7,000 people suspected of terrorist ties are being monitored. Officials point to the discovery of a plot by Ohio trucker and naturalized US citizen and alleged al-Qaeda supporter Iyman Faris to bring down the Brooklyn Bridge with blowtorches as evidence of the program’s efficacy. They also cite the disruption of an al-Qaeda plot to detonate fertilizer bombs outside of British pubs and train stations by the program. But, officials say, most people targeted by the NSA for warrantless wiretapping have never been charged with a crime, and many are targeted because of questionable evidence and groundless suspicion. Many raise an outcry against the program, including members of Congress, civil liberties groups, immigrant rights groups, and others who insist that the program undermines fundamental Constitutional protections of US citizens’ civil liberties and rights to privacy. Several other government programs to spy on Americans have been challenged, including the Federal Bureau of Investigation (FBI)‘s surveillance of US citizens’ library and Internet usage, the monitoring of peaceful antiwar protests, and the proposed use of public and private databases to hunt for terrorist links. In 2004, the Supreme Court overturned the administration’s claim that so-called “enemy detainees” were not entitled to judicial review of their indefinite detentions. Several senior officials say that when the warrantless wiretapping program began, it operated with few controls and almost no oversight outside of the NSA itself. The agency is not required to seek the approval of the Justice Department or anyone else outside the FISA court for its surveillance operations. Some NSA officials wanted nothing to do with a program they felt was patently illegal, according to a former senior Bush administration official. Internal concerns about the program prompted the Bush administration to briefly suspend the program while Justice Department officials audited it and eventually provided some guidelines for its operations. A complaint from Judge Colleen Kollar-Kotelly, the federal judge who oversees the FISA Court, helped spur the suspension, according to officials. Kollar-Kotelly questioned whether information obtained under the program was being improperly used as the basis for FISA wiretap warrant requests from the Justice Department. Some government lawyers say that the Justice Department may have deliberately misled Kollar-Kotelly and the FISA court about the program in order to keep the program under wraps. The judge insisted to Justice Department officials that any material gathered under the program not be used in seeking wiretap warrants from her court. The question also arose in the Faris case, when senior Justice Department officials worried that evidence obtained by warrantless wiretapping by the NSA of Faris could be used in court without having to lie to the court about its origins. [New York Times, 12/15/2005]

Entity Tags: US Supreme Court, George W. Bush, US Department of Justice, Iyman Faris, National Security Agency, New York Times, Al-Qaeda, Foreign Intelligence Surveillance Court, Colleen Kollar-Kotelly

Timeline Tags: Civil Liberties

After the NSA’s warrantless wiretapping program is revealed (see Early 2002 and December 15, 2005), some commentators criticize the program. Americans have fundamental Constitutional protections that are enforceable in court whether their conversations are domestic or international, says law scholar Geoffrey Stone. Stone says that President Bush’s emphasis that NSA wiretapping only takes place on US calls to overseas phones or overseas e-mails “is no different, as far as the law is concerned, from saying we only do it on Tuesdays.” Former FBI national security law chief Michael Woods, who served in the position when Bush signed the NSA directive, calls the program “very dangerous.” Though Woods says the program was justifiable in the immediate aftermath of 9/11, “[By now] we ought to be past the time of emergency responses. We ought to have more considered views now…. We have time to debate a legal regime and what’s appropriate.” [Washington Post, 12/18/2005] Kate Martin, director of the Center for National Security Studies, says the secret order may amount to Bush authorizing criminal activity in direct violation of FISA. “This is as shocking a revelation as we have ever seen from the Bush administration,” she says. “It is, I believe, the first time a president has authorized government agencies to violate a specific criminal prohibition and eavesdrop on Americans.” The American Civil Liberties Union’s Caroline Frederickson says of the program, “It’s clear that the administration has been very willing to sacrifice civil liberties in its effort to exercise its authority on terrorism, to the extent that it authorizes criminal activity.” [Washington Post, 12/16/2005]

Entity Tags: Center for National Security Studies, Geoffrey Stone, American Civil Liberties Union, National Security Agency, Caroline Frederickson

Timeline Tags: Civil Liberties

Chart showing NSA surveillance network.Chart showing NSA surveillance network. [Source: NSA Watch] (click image to enlarge)The National Security Agency has built a far larger database of information collected from warrantless surveillance of telephone and Internet communications to and from US citizens than the NSA or the Bush administration has acknowledged (see October 2001). On December 15, the New York Times exposed the NSA’s program (see December 15, 2005), which was authorized by President Bush in early 2002 (see Early 2002), but which actually began far earlier (see Spring 2001). The NSA built its database with the cooperation of several major American telecommunications firms (see June 26, 2006), and much of the information was mined directly into the US telecommunications system’s major connections. Many law enforcement and judicial officials question the legality of the program (see May 12, 2006 and December 18, 2005), and many say the program goes beyond the bounds of the Foreign Intelligence Surveillance Act (see 1978). One question is whether the FISA Court, or FISC, can authorize monitoring of international communications that pass through US-based telephonic “switches,” which handle much of the US’s electronic communications traffic. “There was a lot of discussion about the switches” in conversations with FISC, says a Justice Department official. “You’re talking about access to such a vast amount of communications, and the question was, How do you minimize something that’s on a switch that’s carrying such large volumes of traffic? The court was very, very concerned about that.” While Bush and his officials have insisted that the warrantless wiretaps only target people with known links to al-Qaeda, they have not acknowledged that NSA technicials have not only eavesdropped on specific conversations between people with no known links to terrorism, but have combed through huge numbers of electronic communications in search of “patterns” that might point to terrorism suspects. Such “pattern analysis” usually requires court warrants before surveillance can begin, but in many cases, no such warrants have been obtained or even requested. Other, similar data-mining operations, such as the Total Information Awareness program, developed by the Defense Department to track terror suspects (see March 2002), and the Department of Homeland Security’s CAPPS program, which screened airline passengers (see (6:20 a.m.-7:48 a.m.) September 11, 2001), were subjected to intense public scrutiny and outrage, and were publicly scrapped. The Bush administration has insisted that it has no intention of scrapping the NSA’s warrantless wiretapping program, because, as its officials have said, it is necessary to identify and track terrorism suspects and foil terrorist plots before they can be hatched. Administration officials say that FISC is not quick enough to respond to its need to respond to potential terrorist acts. A former technology manager at a major telecommunications company says that after 9/11, the leading telecom firms have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists. “All that data is mined with the cooperation of the government and shared with them, and since 9/11, there’s been much more active involvement in that area,” says the former manager. “If they get content, that’s useful to them too, but the real plum is going to be the transaction data and the traffic analysis. Massive amounts of traffic analysis information—who is calling whom, who is in Osama Bin Laden’s circle of family and friends—is used to identify lines of communication that are then given closer scrutiny.” And, according to a government expert on communications privacy who used to work at the NSA, says that in the last few years, the government has quietly encouraged the telecom firms to rout more international traffic through its US-based switches so it can be monitored. Such traffic is not fully addressed by 1970s-era laws that were written before the onset of modern communications technology; neither does FISA adequately address the issues surrounding that technology. Computer engineer Phil Karn, who works for a major West Coast telecom firm, says access to those switches is critical: “If the government is gaining access to the switches like this, what you’re really talking about is the capability of an enormous vacuum operation to sweep up data.” [New York Times, 12/24/2005]

Entity Tags: US Department of Defense, US Department of Justice, Total Information Awareness, New York Times, US Department of Homeland Security, Computer Assisted Passenger Prescreening System, Bush administration (43), Foreign Intelligence Surveillance Act, Foreign Intelligence Surveillance Court, George W. Bush, National Security Agency, Phil Karn

Timeline Tags: Civil Liberties

The Justice Department (DOJ) issues a 42-page “white paper” detailing its arguments that the National Security Agency’s warrantless wiretapping program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006) is legal. The DOJ reiterates two previous arguments (see December 19, 2005 and December 21-22, 2005)—that Congress implicitly authorized the program in 2001 when it authorized the Bush administration to begin military actions against al-Qaeda (see September 14-18, 2001), and that the president has the authority as commander in chief to conduct such a program—even though these arguments have been thoroughly refuted (see January 9, 2006) and overridden by the Supreme Court’s recent Hamdan v. Rumsfeld ruling (see December 15, 2005 and July 8, 2006). In its paper, the DOJ declares that if necessary, it will attack the legality of the Foreign Intelligence Surveillance Act (FISA) in order to stop that law from “imped[ing]” the president’s power to order domestic surveillance. In essence, according to columnist and civil liberties lawyer Glenn Greenwald, the DOJ is asserting that the president’s powers are limitless as long as he or she declares a given action necessary to battle terrorism. “Because the president has determined that the NSA activities are necessary to the defense of the United States from a subsequent terrorist attack in the armed conflict with al-Qaeda, FISA would impermissibly interfere with the president’s most solemn constitutional obligation—to defend the United States against foreign attack,” the DOJ claims. Neither Congress nor the court system has the right to limit or even review the president’s powers, according to the DOJ. Greenwald calls the DOJ’s argument “a naked theory of limitless presidential power.” In fact, Greenwald argues, the DOJ is asserting that FISA itself is unconstitutional, because no law can in any way limit the president’s power to conduct foreign policy or protect the nation’s security. The document is part of a larger Bush administration defense of the USA Patriot Act, and part of the administration’s push to convince Congress to reauthorize that legislation. Attorney General Alberto Gonzales sends the document to Congress. Justice Department official Steven Bradbury says, “When it comes to responding to external threats to the country… the government would like to have a single executive who could act nimbly and agilely.” [US Department of Justice, 1/19/2006 pdf file; Glenn Greenwald, 1/20/2006; Washington Post, 1/20/2006]
Dubious Legality - The program has already been found to be of questionable legality by two reports recently released by the nonpartisan Congressional Research Service (see January 5, 2006 and January 18, 2006). And author James Bamford, a US intelligence expert who has written extensively about the NSA, says that the Justice Department’s arguments are specious in light of Congress’s clear intent in its 1978 passage of FISA to block warrantless wiretapping, and its demonstrated lack of intent to allow any such operations within US borders in the October 2001 legislation. “You could review the entire legislative history in the authorization to use military force and I guarantee you won’t find one word about electronic surveillance,” he says. “If you review the legislative history of FISA, you will find Attorney General Griffin Bell testifying before the intelligence committee saying this was specifically passed to prevent a president from claiming inherent presidential powers to do this again.” [Washington Post, 1/20/2006]
Self-Contradictory Justifications - In 2007, author and reporter Charlie Savage will write of the “shaky foundation” supporting the administration’s “two-pronged attacks on critics of the wiretapping program and the Patriot Act,” which some officials have claimed authorizes the program. “Beneath the simplistic rhetoric, the administration’s position was self-contradicting,” Savage will write. If Bush has the inherent presidential authority to order warrantless wiretapping, then he needs no authorization from the Patriot Act or any other legislation. But if Congress is endangering the nation by delaying in reauthorizing the Patriot Act and thusly not rendering the program legal, then the wiretapping program is illegal after all. The memo attempts to “paper… over” this problem by claiming that, while Bush has the inherent authority to do whatever he feels is necessary to protect the country, the Patriot Act’s extra police powers are still necessary in “contexts unrelated to terrorism.” Savage will write, “In other words, the administration’s own position, hidden in the fine print, was that the Patriot Act was superfluous and irrelevant to the war on terrorism—a somewhat absurd stance made necessary by their desire to say the wiretapping program was legal.” [Savage, 2007, pp. 315]
Failure to Address Probable Beginning of Program Before Attacks - The Justice Department says nothing about the program apparently beginning well before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, July 2001, and Early 2002).

Entity Tags: National Security Agency, James Bamford, Steven Bradbury, US Department of Justice, Griffin Bell, Senate Judiciary Committee, Glenn Greenwald, Foreign Intelligence Surveillance Act, Alberto R. Gonzales, Arlen Specter, George W. Bush, Congressional Research Service, Charlie Savage

Timeline Tags: Civil Liberties

Senator Russell Feingold (D-WI) tells reporters that he intends to push through legislation that would censure President Bush because of his domestic surveillance program (see February 2001, Spring 2001, After September 11, 2001, After September 11, 2001, October 2001, Early 2002, September 2002, Late 2003-Early 2004, April 19-20, 2004, June 9, 2005, June 9, 2005, December 15, 2005, December 17, 2005, December 19, 2005, December 24, 2005, January 5, 2006, January 18, 2006, January 18, 2006, January 23, 2006, and January 30, 2006). “What the president did by consciously and intentionally violating the Constitution and laws of this country with this illegal wiretapping has to be answered,” Feingold tells an interviewer. “Proper accountability is a censuring of the president, saying, ‘Mr. President, acknowledge that you broke the law, return to the law, return to our system of government.‘… The president has broken the law and, in some way, he must be held accountable.… Congress has to reassert our system of government, and the cleanest and the most efficient way to do that is to censure the president. And, hopefully, he will acknowledge that he did something wrong.” Senate Majority Leader Bill Frist (R-TN) calls Feingold’s proposal “a crazy political move.” The Senate Intelligence Committee, following the Bush administration’s lead, has rejected some Democrats’ call for a full investigation of the surveillance program (see February 1-6, 2006). Instead, the committee has adopted a Republican plan for a seven-member subcommittee to conduct oversight. Feingold says his censure motion is not “a harsh approach, and it’s one that I think should lead to bipartisan support.” Frist, however, says: “I think it, in part, is a political move because here we are, the Republican Party, the leadership in the Congress, supporting the president of the United States as commander in chief who is out there fighting al-Qaeda and the Taliban and Osama bin Laden and the people who have sworn—have sworn—to destroy Western civilization and all the families listening to us.… The signal that it sends that there is in any way a lack of support for our commander in chief who is leading us with a bold vision in a way that we know is making our homeland safer is wrong. And it sends a perception around the world.” Only once in history has a president been censured by Congress: Andrew Jackson in 1834. In the House, Representative John Conyers (D-MI) is exploring the idea of introducing impeachment legislation against Bush. [New York Times, 3/12/2006; Associated Press, 3/12/2006] Feingold says on the Senate floor: “The president has violated the law and Congress must respond. A formal censure by Congress is an appropriate and responsible first step to assure the public that when the president thinks he can violate the law without consequences, Congress has the will to hold him accountable.” Most Congressional Democrats want nothing to do with either Feingold’s or Conyers’s legislative ideas, and some Republicans seem to be daring Democrats to vote for the proposal. Vice President Dick Cheney tells a Republican audience in Feingold’s home state of Wisconsin, “Some Democrats in Congress have decided the president is the enemy.” Democratic leaders in the Senate thwart an immediate vote as requested by Frist, and Senator Richard Durbin (D-IL) says he is not sure the proposal will ever come to a vote. Senate Minority Leader Harry Reid (D-NV) says he does not support it and has not read it. Senator Joseph Lieberman (D-CT) makes a similar assertion. In the House, Minority Leader Nancy Pelosi (D-CA) refuses to support such a proposal, saying in a statement that she “understands Senator Feingold’s frustration that the facts about the NSA domestic surveillance program have not been disclosed appropriately to Congress. Both the House and the Senate must fully investigate the program and assign responsibility for any laws that may have been broken.” [Associated Press, 3/14/2006] Former Nixon aide John Dean testifies in support of Feingold’s censure motion (see March 31, 2006). However, the censure motion, lacking support from Democratic leaders and being used by Republicans as a means to attack Democrats’ patriotism, never comes to a vote. [Klein, 2009, pp. 84]

Entity Tags: Joseph Lieberman, George W. Bush, Bush administration (43), Bill Frist, Harry Reid, John Dean, Russell D. Feingold, Senate Intelligence Committee, Richard (“Dick”) Durbin, Richard (“Dick”) Cheney, Nancy Pelosi, John Conyers

Timeline Tags: Civil Liberties

Retired AT&T technician and incipient whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) issues his first press release, summarizing his knowledge of AT&T’s complicity with the National Security Agency (NSA) in that agency’s illegal domestic wiretapping program (see December 31, 2005). Klein has given documentation supporting his claims to the Electronic Frontier Foundation (EFF) in support of that organization’s lawsuit against AT&T (see January 31, 2006). Klein’s press release tells of the NSA’s “secret room” in AT&T’s Folsom Street, San Francisco, facility (see January 2003) and reveals for the first time the NSA’s use of the Narus STA 6400 to comb through the wiretapped data (see January 16, 2004). The release reads in part: “Based on my understanding of the connections and equipment at issue, it appears the NSA is capable of conducting what amounts to vacuum-cleaner surveillance of all the data crossing the Internet—whether that be people’s email, Web surfing, or any other data. Given the public debate about the constitutionality of the Bush administration’s spying on US citizens without obtaining a FISA warrant (see December 18, 2005, December 20, 2005, December 21, 2005, December 21, 2005, December 25, 2005, January 5, 2006, January 10, 2006, January 18, 2006, January 18, 2006, and January 31, 2006), I think it is critical that this information be brought out into the open, and that the American people be told the truth about the extent of the administration’s warrantless surveillance practices, particularly as it relates to the Internet. Despite what we are hearing (see December 19, 2005, December 19, 2005, December 21-22, 2005, and January 19, 2006), and considering the public track record of this administration (see December 24, 2005, Early 2006, January 23, 2006, January 25-26, 2006, and February 2, 2006), I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” Klein issues the press release in part to give himself some publicity, and the protection from government harassment such publicity might entail (see February 11, 2006 and After). [Wired News, 4/7/2006; Wired News, 4/7/2006; Klein, 2009, pp. 66-67]

Entity Tags: Electronic Frontier Foundation, AT&T, Bush administration (43), National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

Bobby Ray Inman.Bobby Ray Inman. [Source: DefenseTech.org]Former NSA director Bobby Ray Inman says that the secret NSA program to wiretap US citizens’ phone and e-mail conversations without court warrants (see After September 11, 2001) “is not authorized.” President Bush authorized the secret wiretapping over four years ago (see Early 2002), a program only revealed at the end of 2005 (see December 15, 2005). Since the program was revealed, it has created tremendous controversy over its possible illegality and its encroachment on fundamental American civil liberties. Bush and other White House officials have repeatedly asserted that the program is legal, mainly because Bush and his officials assert that the president has the authority to implement such a program (see December 15, 2005); Bush also insists, as recently as the day before Inman’s statement, that the program is only being used to spy on terrorists and the privacy of US citizens is being “fiercely protected,” a statement that does not jibe with the facts. [Democracy Now!, 5/12/2006]

Entity Tags: National Security Agency, Al-Qaeda, Bobby Ray Inman, Bush administration (43), George W. Bush

Timeline Tags: Civil Liberties

Lawyers file court documents alleging that the National Security Agency (NSA) worked with AT&T to set up a domestic wiretapping site seven months before the 9/11 attacks. The papers are filed as part of a lawsuit, McMurray v. Verizon Communications, which cites as plaintiffs AT&T, Verizon, and BellSouth customers whose privacy was allegedly violated by the NSA warrantless wiretapping program (see May 12, 2006); it also alleges that the firms, along with the NSA and President Bush, violated the Telecommunications Act of 1934 and the US Constitution. AT&T, Verizon, and BellSouth have been accused of working with the NSA to set up domestic call monitoring sites (see October 2001). Evidence that the NSA set up domestic surveillance operations at least seven months before the 9/11 attacks is at the core of the lawsuit (see Spring 2001). The suit is similar to one filed against AT&T by the Electronic Frontier Foundation (EFF—see January 31, 2006) and other such lawsuits. A lawyer for the plaintiffs in McMurray, Carl Mayer, says: “The Bush administration asserted this [the warrantless wiretapping program] became necessary after 9/11. This undermines that assertion.” AT&T spokesman Dave Pacholczyk responds, “The US Department of Justice has stated that AT&T may neither confirm nor deny AT&T’s participation in the alleged NSA program because doing so would cause ‘exceptionally grave harm to national security’ and would violate both civil and criminal statutes.” Verizon has denied being asked by the NSA for its customer phone records, and has refused to confirm or deny “whether it has any relationship to the classified NSA program.” BellSouth spokesman Jeff Battcher says: “We never turned over any records to the NSA. We’ve been clear all along that they’ve never contacted us. Nobody in our company has ever had any contact with the NSA.” The NSA domestic wiretapping program is known as “Pioneer Groundbreaker,” a part of the larger “Project Groundbreaker” (see February 2001). According to Mayer and his fellow lawyer Bruce Afran, an unnamed former employee of AT&T provided them with information about NSA’s approach to AT&T. (That former employee will later be revealed as retired technician Mark Klein—see Late 2002, July 7, 2009, December 15-31, 2005, and April 6, 2006). The lawsuit is on a temporary hiatus while a judicial panel rules on a government request to assign all of the telecommunications lawsuits to a single judge. [Bloomberg, 6/30/2006]

Entity Tags: Verizon Wireless, US Department of Justice, National Security Agency, George W. Bush, Jeff Battcher, Bruce Afran, BellSouth, AT&T, Mark Klein, Carl Mayer, Electronic Frontier Foundation, Dave Pacholczyk

Timeline Tags: Civil Liberties

Hani Hanjour (left) and Majed Moqed (right) captured by surveillance video on September 5, 2001. Hani Hanjour (left) and Majed Moqed (right) captured by surveillance video on September 5, 2001. [Source: FBI]An FBI timeline of the 9/11 hijackers’ activities compiled in late 2001 and released this month indicates that considerable video footage of the hijackers has yet to be released. Most of the footage appears to come from surveillance video discovered after the 9/11 attacks. So far, the only known footage made public has been two video stills of Hani Hanjour and Majed Moqed using an ATM machine, one still each of Waleed Alshehri and Satam Al Suqami, several stills of Mohamed Atta and Abdulaziz Alomari in Portland the night before 9/11 (see September 10, 2001), and a few more stills and footage of several hijackers in airports on the morning of 9/11 (see (Between 5:45 a.m. and 5:53 a.m.) September 11, 2001 and 7:18 a.m. September 11, 2001). But the FBI’s timeline reveals video footage that has never even been publicly hinted at:
bullet Mohamed Atta used an ATM in Palm Beach, Florida, on July 19, 2001.
bullet Salem Alhazmi and Ahmed Alghamdi used an ATM in Alexandria, Virginia, on August 2.
bullet Hanjour and Mojed used a Kinko’s for half an hour in College Park, Maryland, on August 10.
bullet Moqed and Nawaf Alhazmi shopped at an Exxon gas station in Joppa, Maryland, on August 28.
bullet Waleed and Wail Alshehri wandered around a Target store in Fort Lauderdale, Florida, on September 4.
bullet Atta and Abdulaziz Alomari were in a Florida bank lobby on September 4, and the audio of Atta calling Saudi Arabia was even recorded in the process.
bullet Fayez Ahmed Banihammad used an ATM on September 7 in Deerfield Beach, Florida.
bullet Salem Alhazmi was at the Falls Church DMV on September 7. Low quality surveillance video at the Milner Hotel in Boston showed Marwan Alshehhi and possibly Mohand Alshehri on multiple occasions in the days just before 9/11.
bullet Ziad Jarrah and possibly Saeed Alghamdi were videotaped using a Kinko’s for about an hour near Newark on September 10. [Federal Bureau of Investigation, 10/2001 pdf file]
bullet Additionally, an FBI document will later be made public that indicates there is footage of Saeed Alghamdi entering the Marriott Hotel at the Newark International Airport on September 8, carrying a black roll along bag (he will not have any checked luggage on 9/11).
bullet This same document indicates Ziad Jarrah is also seen on videotape shortly after midnight on September 8 at the same Marriott Hotel, making credit card and cash payments for two hotel rooms. He is accompanied by two young men, who most likely are Saeed Alghamdi and Ahmed Alnami. [Investigative Services Division, FBI Headquarters, 4/19/2002]

Entity Tags: Saeed Alghamdi, Wail Alshehri, Waleed Alshehri, Ziad Jarrah, Salem Alhazmi, Nawaf Alhazmi, Mohamed Atta, Federal Bureau of Investigation, Abdulaziz Alomari, Mohand Alshehri, Ahmed Alghamdi, Fayez Ahmed Banihammad, Ahmed Alnami, Marwan Alshehhi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike