!! History Commons Alert, Exciting News

Context of '6:45 a.m. September 11, 2001: Connecting Flight for Two 9/11 Hijackers Arrives in Boston'

This is a scalable context timeline. It contains events related to the event 6:45 a.m. September 11, 2001: Connecting Flight for Two 9/11 Hijackers Arrives in Boston. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 7 (668 events)
previous | 1, 2, 3, 4, 5, 6, 7 | next

The German Reich Ministry of Justice issues a secret memo following a meeting of several Justice Ministry lawyers and public prosecutors with senior Gestapo officers. The participants discuss the fact that Germany has been on a war footing for years, and the leaders’ worry that the citizenry is riddled with sleeper cells of subversives. The solution: detaining and torturing subversives. It is unclear whether torture will be used to terrorize other subversives, to extract information, or produce confessions. German law enforcement officials are balky at applying “more rigorous interrogation” techniques. Though some judges seem unmoved by defendants appearing in court with obvious marks of torture upon their bodies, the law enforcement officers are bureaucrats in a system that has always respected the rule of law and the Hitler government was originally elected on a law-and-order platform. The memo is the product of the top officials in the Gestapo and Justice Ministry, and lays out detailed instructions as to when torture techniques can be applied, the specific equipment used in such interrogations, and how many times particular techniques could be used on certain categories of detainees. Perhaps most importantly, the memo promises immunity from prosecution to any German interrogator who follows the rules as laid down in the memo.
Specific Instructions - It reads in part: “At present, we thus have a situation which cannot continue: a deficient sense of what is right on the part of judicial officers; an undignified position for police officers, who try to help matters by foolish denials [that torture has taken place in court proceedings].… [I]nterrogations of this kind [torture] may be undertaken in cases where charges involve the immediate interests of the state.… chiefly treason and high treason. Representatives of the Gestapo expressed the opinion that a more rigorous interrogation could also be considered in cases of Jehovah’s Witnesses, explosives, and sabotage.… As a general principle, in more rigorous interrogations only blows with a club on the buttocks are permissible, up to 25 such blows. The number is to be determined in advance by the Gestapo.… Beginning with the tenth blow, a physician must be present. A standard club will be designated, to eliminate all irregularities.” Gestapo Headquarters in Berlin must give permission for more “rigorous interrogation[s],” the memo continues.
Drawing Parallels to Bush Administration Torture - The memo will be the subject of a 2009 article by Shayana Kadidal, the senior managing attorney of the Guantanamo project at the Center for Constitutional Rights. Kadidal will draw parallels between the Nazi torture authorization and similar legal justifications issued by the American government after the 9/11 attacks (see March 2, 2009 and April 21, 2009). Kadidal will write: “I realize that, as a matter of principle, there is a strong bias against making Nazi analogies to any events happening in our modern world.… But here we have: (1) a system set up to allow torture on certain specific individual detainees, (2) specifying standardized equipment for the torture (apparently down to the exact length of the club to be used), along with physician participation to ensure survival of the victim for the more several applications, (3) requiring prior approval of the use of torture from the central authorities in the justice department and intelligence agency in the capital, so as to ensure that (6) the local field officers actually carrying out the abuse are immune from prosecution.” [Huffington Post, 4/21/2009]

Entity Tags: Gestapo, Shayana Kadidal, German Reich Ministry of Justice

Timeline Tags: Torture of US Captives

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

A B-29 bomber similar to the one that crashed in Georgia.A B-29 bomber similar to the one that crashed in Georgia. [Source: Global Security (.org)]A test flight for the Air Force’s Project Banshee, located at Robins Air Force Base in Georgia, is set for 8:30 a.m. Banshee is an attempt begun in 1946 to develop and deploy a long-range missile ahead of both the Soviet Union and rival US military branches. The airplane used in the test flight crashes less than an hour into its flight, killing 9 of the 13 aboard.
Maintenance Problems - The plane assigned for the flight is a B-29 Stratofortress, a bomber made famous by its delivery of the atomic bombs to Hiroshima and Nagasaki at the end of World War II. B-29s are notoriously difficult to fly and maintain: their four wing-mounted engines almost routinely overheat and catch fire, causing engine shutdowns, sudden drops in altitude, and, often, crashes. The engines’ eighteen cylinders lack sufficient airflow to keep them cool, and the overheating often causes the crankcases, made of light but highly flammable magnesium, to burst into flames. Like so many of its brethren, the plane has suffered its share of maintenance issues, and is flying without numerous recommended maintenance and repair tasks being performed. Just five days before, it had been designated “red cross”—grounded and unfit for service. It was allowed to fly through an “exceptional release” signed by the squadron commander.
Crew Difficulties - The flight is moved back to the afternoon after some crew members fail to show up on time, and to allow last-minute repairs to be made. By takeoff, the flight crew is assembled: Captain Ralph Erwin; co-pilot Herbert W. Moore; flight engineer Earl Murrhee; First Lieutenant Lawrence Pence, Jr, the navigator; Sergeant Walter Peny, the left scanner; Sergeant Jack York, the right scanner; Sergeant Melvin Walker, the radio operator; and Sergeant Derwood Irvin, manning the bombsight and autopilot. The crew is joined by civilian engineers assigned to Banshee: Al Palya and Robert Reynolds from RCA, William Brauner and Eugene Mechler from the Franklin Institute, and Richard Cox from the Air Force’s Air Materiel Command. In violation of standard procedure, none of the crew or the civilians are briefed on emergency procedures, though Murrhee will later say that the crew were all familiar with the procedures; he is not so sure about the civilians, though he knows Palya and Reynolds have flown numerous test flights before. In another violation of Air Force regulations, none of the flight crew have worked together before. As author Barry Siegel will note in 2008, “The pilot, copilot, and engineer had never shared the same cockpit before.”
Engine Fire and Crash - Less than an hour into the flight, one engine catches fire and two others lose power, due to a combination of maintenance failures and pilot errors. The civilians have some difficulty getting into their parachutes as Erwin and Moore attempt to regain control of the aircraft. Four of the crew and civilians manage to parachute from the plane, but most remain on board as the airplane spirals into the ground on the edge of the Okefenokee Swamp, near Waycross, Georgia. Crew members Moore, Murrhee, and Peny survive, as does a single civilian, Mechler. Four others either jump at too low an altitude or die when their chutes foul the airplane; the other five never manage to leave the plane and die on impact.
Widows File Suit - Several of the civilians’ widows will file suit against the US Air Force, asserting that their husbands died because of Air Force negligence (see June 21, 1949). Their lawsuit will eventually become US v. Reynolds, a landmark Supreme Court case and the underpinning for the government’s claims of state secrets privilege (see March 9, 1953). [Siegel, 2008, pp. 3, 14-17, 33-49]

Entity Tags: Derwood Irvin, Barry Siegel, US Department of the Air Force, Walter Peny, William Brauner, Air Materiel Command, Richard Cox, Ralph Erwin, Robert Reynolds, Al Palya, Radio Corporation of America, Eugene Mechler, Earl Murrhee, Franklin Institute, Project Banshee, Melvin Walker, Lawrence Pence, Jr, Herbert W. Moore, Jr, Jack York

Timeline Tags: Civil Liberties

A three-judge federal appeals court unanimously rejects the government’s claim of unfettered executive privilege and secrecy in regards to classified documents (see October 19, 1951). In an opinion written by Judge Albert Maris, the court finds that the government’s claim that the judiciary can never compel the executive branch to turn over classified documents to be without legal merit. The plaintiffs in the case, three widows who lost their husbands in the crash of a B-29 bomber carrying classified materials (see June 21, 1949), had a compelling need for the documents in question, the downed B-29 accident reports, to further their case, Maris writes (see October 12, 1950).
No Legal Basis for Claim of Privilege - Maris goes further than the parameters of the single lawsuit, writing: “[W]e regard the recognition of such a sweeping privilege… as contrary to a sound public policy. The present cases themselves indicate the breadth of the claim of immunity from disclosure which one government department head has already made. It is but a small step to assert a privilege against any disclosure of records merely because they might prove embarrassing to government officials. Indeed, it requires no great flight of imagination to realize that if the government’s contentions in these cases were affirmed, the privilege against disclosure might gradually be enlarged… until as is the case in some nations today, it embraced the whole range of government activities.… We need to recall in this connection the words of [Revolution-era jurist] Edward Livingston: ‘No nation ever yet found any inconvenience from too close an inspection into the conduct of its officers, but many have been brought to ruin, and reduced to slavery, by suffering gradual imposition and abuses, which were imperceptible, only because the means of publicity had not been secured.’” He also quotes Revolutionary War figure Patrick Henry, who said, “[T]o cover with the veil of secrecy the common routine of business is an abomination in the eyes of every intelligent man and every friend to his country.”
Rejecting Claim of 'State Secrets' - Maris is even less respectful of the government’s claim of a “state secrets” privilege. He notes that the government did not make that claim until well into the lawsuit proceedings (see October 19, 1951), indicating that it was a “fallback” argument used after the original government arguments had failed. Maris is also troubled, as author Barry Siegel later writes, in the government’s “assertion of unilateral executive power, free from judicial review, to decide what qualified as secret.” The lower court judge’s ruling that he alone should be given the documents for review adequately protected the government’s security interests, Maris writes: “[But] the government contends that it is within the sole province of the secretary of the Air Force to determine whether any privileged material is contained in the documents and that his determination of this question must be accepted by the district court without any independent consideration.… We cannot accede to this proposition. On the contrary, we are satisfied that a claim of privilege against disclosing evidence… involves a justiciable question, traditionally within the competence of the courts.… To hold that the head of an executive department of the government in a [law]suit to which the United States is a party may conclusively determine the government’s claim of privilege is to abdicate the judicial function to infringe the independent province of the judiciary as laid down by the Constitution.”
Fundamental Principle of Checks and Balances - Maris continues: “The government of the United States is one of checks and balances. One of the principal checks is furnished by the independent judiciary which the Constitution established. Neither the executive nor the legislative branch of the government may constitutionally encroach upon the field which the Constitution has reserved for the judiciary.… Nor is there any danger to the public interest in submitting the question of privilege to the decision of the courts. The judges of the United States are public officers whose responsibilities under the Constitution is just as great as that of the heads of the executive departments.”
Government Appeal - The Justice Department will appeal the ruling to the US Supreme Court (see March 1952 and March 9, 1953). [Siegel, 2008, pp. 153-156]

Entity Tags: Albert Maris, US Department of Justice, Barry Siegel, US Supreme Court

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Lawyers make their opening arguments before the Supreme Court in the case of US v Reynolds, the lawsuit that finds the government had no overarching right to unilaterally refuse to deliver classified documents in the course of a wrongful death lawsuit against the government (see December 11, 1951). The government has appealed the appellate court ruling to the Supreme Court (see March 1952). Because four of the nine justices had voted not to hear the case—in essence to let the appellate court ruling stand—the defense is cautiously optimistic about the Court’s decision.
Judiciary Has No Right to Interfere with Powers of the Executive, Government Argues - Acting Solicitor General Robert Stern tells the Court that the appellate judges’ decision, written by Judge Albert Maris, “is an unwarranted interference with the powers of the executive,” and that the decision forced the government to choose “whether to disclose public documents contrary to the public interest [or] to suffer the public treasury to be penalized” (a reference to the decision to award the plaintiffs monetary damages—see October 12, 1950). The judiciary “lack[s] power to compel disclosure by means of a direct demand [as well as] by the indirect method of an order against the United States, resulting in judgment when compliance is not forthcoming.”
Executive Has No Right to Unilaterally Withhold Information, Defense Counters - Stern’s arguments are countered by those of the plaintiffs’ lawyer, Charles Biddle, who writes, “We could rest our case with confidence on the clear opinion of Judge Maris,” but continues by arguing that if the government asserts a claim of executive privilege on the basis of national security, it must make the documents available to the Court for adjudication, or at least provide enough information for the Court to judge whether the documents present in fact a threat to national security if disclosed. This is particularly true, Biddle argues, “where there is no showing that the documents in question contain any military secret” (Biddle is unaware that the documents’ classification status had been reduced two years before—see September 14, 1950). “The basic question here is whether those in charge of the various departments of the government may refuse to produce documents properly demanded… in a case where the government is a party (see June 21, 1949), simply because the officials themselves think it would be better to keep them secret, and this without the Courts having any power to question the propriety of such decision.… In other words, say the officials, we will tell you only what we think it is in the public interest that you should know. And furthermore, we may withhold information not only about military or diplomatic secrets, but we may also suppress documents which concern merely the operation of the particular department if we believe it would be best, for purposes of efficiency or morale, that no one outside of the department, not even the Court, should see them.”
No Basis for Claims of Military Secrets - Biddle argues that because of responses he has received to his demands over the course of this lawsuit, he is relatively sure there are no military secrets contained within them. “[T]he proof is to the contrary,” he says, and goes on to say that had the Air Force disclosed from the outset that the plane crash, the fatal accident that sparked the original lawsuit (see October 6, 1948), was probably caused by pilot error and not by random chance, the plaintiffs may have never needed to ask for the disclosure of the documents in question, the accident reports on the crash (see October 18, 1948). “The secretary [of the Air Force]‘s formal claim of privilege said that the plane at the time was engaged in a secret mission and that it carried confidential equipment,” Biddle says, “but nowhere was it asserted that either had anything to do with the accident. The whole purpose of the demand by the respondents was for the purpose of finding out what caused the accident.… They were not in the least interested in the secret mission or equipment.” [Siegel, 2008, pp. 165-170]

Entity Tags: US Supreme Court, Albert Maris, Robert Stern, US Department of the Air Force, Charles Biddle

Timeline Tags: Civil Liberties

In their regular Saturday conference, the nine Supreme Court justices discuss the issues and arguments surrounding US v Reynolds (see October 21, 1952). According to the notes from the discussion, Chief Justice Fred Vinson, a strong advocate for expansive executive powers (see March 1952), says the case “boils down to Executive Branch determine privilege.” Other notes by Justice William O. Douglas suggest that Vinson isn’t convinced that the US must “be forced to pay for exercising its privilege” (see October 12, 1950). A straw vote taken at the end of the discussion shows five justices in favor of the government’s position to unilaterally withhold classified documents—overturning the appellate court decision (see December 11, 1951), and four in favor of allowing the decision to stand. [Siegel, 2008, pp. 171]

Entity Tags: Fred Vinson, US Supreme Court, William O. Douglas

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

The CIA’s Technical Services Division (TSD) considers plans to undermine Fidel Castro’s charismatic appeal by sabotaging his speeches. At one point, there is discussion of spraying Castro’s broadcasting studio with a hallucinogenic chemical. The plan is taken of the shelf because the chemical is deemed unreliable. During this period, the TSD laces a box of cigars with a chemical that would produce temporary disorientation, hoping that he will smoke one of the cigars before giving a speech. In another instance, the TSD comes up with a scheme to dust Castro’s shoes with thallium salts during a trip outside of Cuba. The salts would cause his beard to fall out. The plan is abandoned when Castro cancels the trip. [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, Technical Services Division (TSD)

Timeline Tags: US-Cuba (1959-2005)

The CIA works with a high-level Cuban official, codenamed “AM/LASH,” on a plan to assassinate Fidel Castro and overthrow his government. In June 1965, the CIA ends its contact with AM/LASH and his associates, citing security concerns. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Timeline Tags: US-Cuba (1959-2005)

The CIA’s Task Force W devises two plans to assassinate Fidel Castro. The first one, involving an exploding sea shell that would be placed where Castro regularly dives, is dismissed by the CIA’s Technical Services Division (TSD) as impractical. In the second plan, James Donovan (who has been negotiating with Castro for the release of prisoners taken during the Bay of Pigs operation) would present Castro with a contaminated diving suit. TSD decides to give the plan a try. It purchases a diving suit and laces its breathing apparatus with tubercule bacillus. The suit itself is dusted with a fungus that is known to cause a chronic skin disease. But the suit never leaves the laboratory. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Entity Tags: Technical Services Division (TSD), James Donovan, Fidel Castro

Timeline Tags: US-Cuba (1959-2005)

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]

Entity Tags: Malcolm Little, Central Intelligence Agency, Church Committee, Lew Allen, National Security Agency, Martin Luther King, Jr., Office of Security Services, Joan Baez

Timeline Tags: Civil Liberties

The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). [Federation of American Scientists, 7/17/1997]

Entity Tags: National Security Agency, Echelon, Rhyolite, Chalet, Government Communications Headquarters, Owen Lewis, Canyon

Timeline Tags: Civil Liberties

July 26-27, 1970: Nixon Rejects Huston Plan

After President Nixon approves of the so-called “Huston Plan” to implement a sweeping new domestic intelligence and internal security apparatus (see July 14, 1970), FBI director J. Edgar Hoover brings the plan’s author, White House aide Tom Charles Huston (see June 5, 1970), into his office and vents his disapproval. The “old ways” of unfettered wiretaps, political infiltration, and calculated break-ins and burglaries are “too dangerous,” he tells Huston. When, not if, the operations are revealed to the public, they will open up scrutiny of US law enforcement and intelligence agencies, and possibly reveal other, past illegal domestic surveillance operations that would embarrass the government. Hoover says he will not share FBI intelligence with other agencies, and will not authorize any illegal activities without President Nixon’s personal, written approval. The next day, Nixon orders all copies of the decision memo collected, and withdraws his support for the plan. [Reeves, 2001, pp. 236-237] W. Mark Felt, the deputy director of the FBI, later calls Huston “a kind of White House gauleiter over the intelligence community.” Washington Post reporter Bob Woodward will note that the definition of “gauleiter” is, according to Webster’s Dictionary, “the leader or chief officoal of a political district under Nazi control.” [Woodward, 2005, pp. 33-34]

Entity Tags: W. Mark Felt, Tom Charles Huston, J. Edgar Hoover, Federal Bureau of Investigation, Central Intelligence Agency, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

The US Supreme Court, in what becomes informally known as the “Keith case,” upholds, 8-0, an appellate court ruling that strikes down warrantless surveillance of domestic groups for national security purposes. The Department of Justice had wiretapped, without court warrants, several defendants charged with destruction of government property; those wiretaps provided key evidence against the defendants. Attorney General John Mitchell refused to disclose the source of the evidence pursuant to the “national security” exception to the Omnibus Crime Control and Safe Streets Act of 1968. The courts disagreed, and the government appealed the decision to the Supreme Court, which upheld the lower courts’ rulings against the government in a unanimous verdict. The Court held that the wiretaps were an unconstitutional violation of the Fourth Amendment, establishing the judicial precedent that warrants must be obtained before the government can wiretap a US citizen. [US Supreme Court, 6/19/1972; Bernstein and Woodward, 1974, pp. 258-259] Critics of the Nixon administration have long argued that its so-called “Mitchell Doctrine” of warrantlessly wiretapping “subversives” has been misused to spy on anyone whom Nixon officials believe may be political enemies. [Bernstein and Woodward, 1974, pp. 258-259] As a result of the Supreme Court’s decision, Congress passes the Foreign Intelligence Surveillance Act. [John Conyers, 5/14/2003]
Opinion of Justice Powell - Writing for the Court, Justice Lewis Powell observes: “History abundantly documents the tendency of Government—however benevolent and benign its motives—to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the government attempts to act under so vague a concept as the power to protect ‘domestic security.’ Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent.” [US Supreme Court, 6/19/1972]
Justice Department Wiretapped Reporters, Government Officials - In February 1973, the media will report that, under the policy, the Justice Department had wiretapped both reporters and Nixon officials themselves who were suspected of leaking information to the press (see May 1969 and July 26-27, 1970), and that some of the information gleaned from those wiretaps was given to “Plumbers” E. Howard Hunt and G. Gordon Liddy for their own political espionage operations. [Bernstein and Woodward, 1974, pp. 258-259]
Conyers Hails Decision 30 Years Later - In 2003, Representative John Conyers (D-MI) will say on the floor of the House: “Prior to 1970, every modern president had claimed ‘inherent Executive power’ to conduct electronic surveillance in ‘national security’ cases without the judicial warrant required in criminal cases by the Fourth Amendment to the Constitution. Then Attorney General John Mitchell, on behalf of President Richard Nixon sought to wiretap several alleged ‘domestic’ terrorists without warrants, on the ground that it was a national security matter. Judge [Damon] Keith rejected this claim of the Sovereign’s inherent power to avoid the safeguard of the Fourth Amendment. He ordered the government to produce the wiretap transcripts. When the Attorney General appealed to the US Supreme Court, the Court unanimously affirmed Judge Keith. The Keith decision not only marked a watershed in civil liberties protection for Americans. It also led directly to the current statutory restriction on the government’s electronic snooping in national security cases.” [John Conyers, 5/14/2003]

Entity Tags: Lewis Powell, US Supreme Court, John Mitchell, E. Howard Hunt, US Department of Justice, G. Gordon Liddy, ’Plumbers’, Damon Keith, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

CIA Counterintelligence Director James Angleton.CIA Counterintelligence Director James Angleton. [Source: CI Centre.com]CIA Director James Schlesinger orders an internal review of CIA surveillance operations against US citizens. The review finds dozens of instances of illegal CIA surveillance operations against US citizens dating back to the 1950s, including break-ins, wiretaps, and the surreptitious opening of personal mail. The earlier surveillance operations were not directly targeted at US citizens, but against “suspected foreign intelligence agents operating in the United States.” Schlesinger is disturbed to find that the CIA is currently mounting illegal surveillance operations against antiwar protesters, civil rights organizations, and political “enemies” of the Nixon administration. In the 1960s and early 1970s, CIA agents photographed participants in antiwar rallies and other demonstrations. The CIA also created a network of informants who were tasked to penetrate antiwar and civil rights groups and report back on their findings. At least one antiwar Congressman was placed under surveillance, and other members of Congress were included in the agency’s dossier of “dissident Americans.” As yet, neither Schlesinger nor his successor, current CIA Director William Colby, will be able to learn whether or not Schlesinger’s predecessor, Richard Helms, was asked by Nixon officials to perform such illegal surveillance, though both Schlesinger and Colby disapproved of the operations once they learned of them. Colby will privately inform the heads of the House and Senate Intelligence Committees of the domestic spying engaged in by his agency. The domestic spying program was headed by James Angleton, who is still serving as the CIA’s head of counterintelligence operations, one of the most powerful and secretive bureaus inside the agency. It is Angleton’s job to maintain the CIA’s “sources and methods of intelligence,” including the prevention of foreign “moles” from penetrating the CIA. But to use counterintelligence as a justification for the domestic spying program is wrong, several sources with first-hand knowledge of the program will say in 1974. “Look, that’s how it started,” says one. “They were looking for evidence of foreign involvement in the antiwar movement. But that’s not how it ended up. This just grew and mushroomed internally.” The source continues, speaking hypothetically: “Maybe they began with a check on [Jane] Fonda. They began to check on her friends. They’d see her at an antiwar rally and take photographs. I think this was going on even before the Huston plan” (see July 26-27, 1970 and December 21, 1974). “This wasn’t a series of isolated events. It was highly coordinated. People were targeted, information was collected on them, and it was all put on [computer] tape, just like the agency does with information about KGB agents. Every one of these acts was blatantly illegal.” Schlesinger begins a round of reforms in the CIA, a program continued by Colby. [New York Times, 12/22/1974 pdf file]

Entity Tags: William Colby, Senate Intelligence Committee, Richard Helms, James Angleton, Jane Fonda, Nixon administration, Central Intelligence Agency, James R. Schlesinger, House Intelligence Committee

Timeline Tags: Civil Liberties

Former CIA director Richard Helms.Former CIA director Richard Helms. [Source: Search.com]Former CIA director Richard Helms indirectly confirms the involvement of the Nixon administration in his agency’s illegal domestic surveillance operations during his testimony before the Senate Watergate investigative committee. Helms tells the committee that he was told by Nixon’s Foreign Intelligence Advisory Board that the CIA could “make a contribution” in domestic intelligence operations. “I pointed out to them very quickly that it could not, there was no way,” Helms testifies. “But this was a matter that kept coming up in the context of feelers: Isn’t there somebody else who can take on these things if the FBI isn’t doing them as well as they should, as there are no other facilities?” (FBI director J. Edgar Hoover’s opposition to the idea of spying on US citizens for Nixon’s political purposes is well documented.) CIA officials say that, despite Helms’s testimony, Helms began the domestic spying program as asked, in the beginning to investigate beliefs that the antiwar movement was permeated by foreign intelligence agents in 1969 and 1970. “It started as a foreign intelligence operation and it bureaucratically grew,” one source says in 1974. “That’s really the answer.” The CIA “simply began using the same techniques for foreigners against new targets here.” The source will say James Angleton, the CIA’s director of counterintelligence (see 1973), began recruiting double agents inside the antiwar and civil rights organizations, and sending in “ringers” to penetrate the groups and report back to the CIA. “It was like a little FBI operation.” Angleton reportedly believes that both the protest groups and the US media are riddled with Soviet intelligence agents, and acts accordingly to keep those groups and organizations under constant watch. One source will say Angleton has a “spook mentality.” Another source will say that Angleton’s counterintelligence bureau is “an independent power in the CIA. Even people in the agency aren’t allowed to deal directly with the CI [counterintelligence] people. Once you’re in it, you’re in it for life.” [New York Times, 12/22/1974 pdf file]

Entity Tags: Senate Watergate Investigative Committee, Richard Helms, J. Edgar Hoover, James Angleton, Issuetsdeah

Timeline Tags: Civil Liberties, Nixon and Watergate

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Vice President Nelson Rockefeller (see December 19, 1974 and After) is instrumental in keeping Senate Democrats from finding out too much about the intelligence community’s excesses. When the New York Times reveals the existence of a decades-old illegal domestic surveillance program run by the CIA (see December 21, 1974), President Ford heads off calls from Democrats to investigate the program by appointing the “Rockefeller Commission” to investigate in the Democrats’ stead. Senate Democrats, unimpressed with the idea, create the Church Committee to investigate the intelligence community (see April, 1976). Rockefeller is adept at keeping critical documents out of the hands of the Church Committee and the press. When Senator Frank Church asks for materials from the White House, he is told that the Rockefeller Commission has them; when he asks Rockefeller for the papers, he is told that he cannot have them because only the president can authorize access. One Church aide later calls Rockefeller “absolutely brilliant” in denying them access in a friendly manner. “He winked and smiled and said, ‘Gee, I want to help you but, of course I can’t—not until we’ve finished our work and the president approves it,’” the aide recalls. Senator John Tower (R-TX), the vice chairman of the committee, will later reflect, “We were very skillfully finessed.” But even Rockefeller, who has his own history of involvement with the CIA, is taken aback at the excesses of the CIA, particularly its history of assassinating foreign leaders. Rockefeller will eventually turn that information over to the Church Committee, giving that body some of the most explosive evidence as yet made public against the agency. [US Senate, 7/7/2007]

Entity Tags: John Tower, Church Committee, Nelson Rockefeller, Central Intelligence Agency, Frank Church, Gerald Rudolph Ford, Jr, ’Rockefeller Commission’

Timeline Tags: Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” [Dubose and Bernstein, 2006, pp. 34-35]

Entity Tags: Seymour Hersh, US Department of Defense, Ford administration, Edward Levi, Donald Rumsfeld, Church Committee, Richard (“Dick”) Cheney, Philip Buchan, New York Times, Gerald Rudolph Ford, Jr

Timeline Tags: Civil Liberties

The Senate Select Committee to Study Governmental Operations releases its report, “Alleged Assassination Plots Involving Foreign Leaders,” which finds “concrete evidence of at least eight plots involving the CIA to assassinate Fidel Castro from 1960 to 1965.” [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, US Congress

Timeline Tags: US-Cuba (1959-2005)

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]

Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News

Timeline Tags: Civil Liberties

President Ford issues Executive Order 11905, which limits the power of the CIA, the NSA, and military intelligence to engage in surveillance of US citizens. Perhaps its most well-known provision is a total ban on “political assassinations” by US government personnel. [Gerald R. Ford, 2/18/1976; Roberts, 2008, pp. 38] The provision is sparked by the Church Commission’s finding (see April, 1976) that assassination is “unacceptable in our society,” and a political embarassment, especially botched attempts such as the CIA’s efforts to kill Cuba’s Fidel Castro. [Grant J. Lilly, 4/6/2006]

Entity Tags: Church Commission, Gerald Rudolph Ford, Jr, National Security Agency, Central Intelligence Agency

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Interviewer David Frost has a difficult time with his subject, former President Richard Nixon, in the day’s early questioning (see April 6, 1977). Frost attempts to recoup with a line of questioning suggested by his adviser James Reston, Jr., one used in the trial of former Nixon aide John Ehrlichman (see January 1, 1975). Were there no limits to what a president can do, even if the president wants to do something plainly illegal? he asks. Could he do anything despite the law? Burglary? Forgery? Even murder? “If the president does it, that means it’s not illegal,” Nixon retorts. “Never had his imperialism been so baldly stated,” Reston will later reflect. Frost asks if the dividing line between, for example, a police burglary and the murder of an antiwar protester is only the president’s judgment? Nixon agrees, and adds: “There’s nothing specific that the Constitution contemplates in that respect. I haven’t read every word, every jot and every tittle, but I do know this: That it has been, however, argued that as far as a president is concerned, that in war time, a president does have certain extraordinary powers which would make acts that would otherwise be unlawful, lawful if undertaken for the purpose of preserving the nation and the Constitution, which is essential for the rights we’re all talking about.” [Time, 5/30/1977; Reston, 2007, pp. 102-105; Landmark Cases, 8/28/2007]

Entity Tags: Richard M. Nixon, David Frost, James Reston, Jr, John Ehrlichman

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

About 500 Iranian students take over the American Embassy in Tehran and hold 52 Americans hostage for 444 days. The Mujahedeen-e Khalq (MEK) is one of the groups that supports the take-over. [US Department of State, 4/30/2003; PBS, 1/15/2006]

Entity Tags: People’s Mujahedin of Iran

Timeline Tags: US confrontation with Iran, Iran-Contra Affair

Michael Barnes.Michael Barnes. [Source: Covington and Burling]Representative Michael Barnes (D-MD) is targeted by the NSA’s Echelon satellite surveillance program on orders from Reagan administration officials. Barnes, an outspoken opponent of Reagan’s Central American policies, had phone conversations with Nicaraguan officials intercepted and recorded, including one conversation between Barnes and the foreign minister of Nicaragua. Barnes learns of the surveillance after White House officials, apparently attempting to discredit Barnes, leaks transcripts of the taped conversations to reporters. CIA director William Casey shows Barnes a Nicaraguan embassy cable reporting a meeting between embassy staff and one of Barnes’s aides; Casey demands that Barnes fire the aide. Barnes refuses, noting that the aide had visited the embassy on legitimate business concerning international affairs. Barnes will say in 1995, “I was aware that NSA monitored international calls, that it was a standard part of intelligence gathering. But to use it for domestic political purposes is absolutely outrageous and probably illegal.” Former senator Dennis DeConcini (R-AZ) says he worries about the NSA spying on US citizens: “It has always worried me. What if that is used on American citizens? It is chilling. Are they listening to my private conversations on my telephone?” [Patrick S. Poole, 8/15/2000]

Entity Tags: Michael D. Barnes, Reagan administration, William Casey, National Security Agency, Dennis DeConcini, Echelon

Timeline Tags: Civil Liberties

A federal court rules that because of the government’s “state secrets” privilege (see March 9, 1953), a civilian plaintiff suing the US Navy over a contractual agreement cannot even access “non-privileged,” or unclassified, information from the Navy because to do so might “threaten disclosure” of material that goes against “the overriding interest of the United States… preservation of its state secrets privilege precludes any further attempt to pursue litigation.” [Siegel, 2008, pp. 196-197]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

In the second of two rulings in the case of Halkin v Helms, the judiciary comes down squarely on the side of the US government against charges of illegal surveillance and wiretapping leveled against American anti-war protesters. The district and appellate courts uphold the federal government’s “state secrets” claim as codified in US v Reynolds (see March 9, 1953), thereby denying the plaintiffs the right to see government information that they claim would prove their case. The DC Court of Appeals writes that the federal courts do not have any constitutional role as “continuing monitors of the wisdom and soundness of Executive action,” and instead the courts “should accord utmost deference to executive assertions of privilege on grounds of military or diplomatic secrets… courts need only be satisfied that there is a reasonable danger” that military secrets might be exposed. [Siegel, 2008, pp. 196-196]

Timeline Tags: Civil Liberties

Margaret Thatcher.Margaret Thatcher. [Source: UK Parliament]British prime minister Margaret Thatcher, displeased with two of her ministers for challenging her on unidentified policy matters, requests that they be placed under electronic surveillance. Because it is illegal for British intelligence to monitor its own citizens, the operation is handed over to the CSE, Canada’s national security agency. [Daily Iowan, 1/19/2006; Janczewski and Colarik, 2007, pp. 454] According to former CSE spy Mike Frost, who will publicly discuss the matter in 2000, Thatcher “had two ministers that she said ‘…weren’t onside.’” Thatcher, says Frost, “wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers.” Why CSE and not British intelligence? Because for the British to monitor their own government members would be illegal—so instead, they farm out such activities to their allies. “The British Parliament now have total deniability,” Frost says. “They didn’t do anything. They know nothing about it. Of course they didn’t do anything; we did it for them.” Frost will say there is no way to pin any blame or criminal charges on anyone in the British government. “The British Parliament now has total deniability,” Frost says. “They didn’t do anything… we did it for them.” [ZDNet, 2/25/2000; CBS News, 2/27/2000]

Entity Tags: Communications Security Establishment, Mike Frost, Government Communications Headquarters, Margaret Thatcher

Timeline Tags: Civil Liberties

The DC Court of Appeals rejects a claim by civilian plaintiffs to force the government to disclose classified information as part of a lawsuit, citing the “state secrets” privilege (see March 9, 1953). Furthermore, the court broadens the definition of “state secrets” to include “disclosure of intelligence-gathering methods or capabilities and disruption of diplomatic relations.” [Siegel, 2008, pp. 197]

Timeline Tags: Civil Liberties

Antonin Scalia.Antonin Scalia. [Source: Oyez.org]Appeals court judge Antonin Scalia is sworn in as an Associate Justice of the US Supreme Court. [Legal Information Institute, 7/30/2007] Although Scalia is an ardent social conservative, with strongly negative views on such issues as abortion and homosexual rights, Scalia and Reagan administration officials both have consistently refused to answer questions about his positions on these issues, as President Reagan did at his June announcement of Scalia’s nomination. [Ronald Reagan Presidential Library, 6/17/1986] Scalia’s nomination is, in the words of Justice Department official Terry Eastland, “no better example of how a president should work in an institutional sense in choosing a nominee….” Eastland advocates the practice of a president seeking a judiciary nominee who has the proper “judicial philosophy.” A president can “influence the direction of the courts through his appointments” because “the judiciary has become more significant in our politics,” meaning Republican politics. [Dean, 2007, pp. 132] Scalia is the product of a careful search by Attorney General Edwin Meese and a team of Justice Department officials who wanted to find the nominee who would most closely mirror Reagan’s judicial and political philosophy (see 1985-1986).

Entity Tags: Ronald Reagan, Edwin Meese, Antonin Scalia, Terry Eastland, US Department of Justice

Timeline Tags: Civil Liberties

Zahid Shaikh Mohammed, the brother of 9/11 mastermind Khalid Shaikh Mohammed (KSM), works as the head of the Pakistani branch of the charity Mercy International. A book published in 1999 will allege that this charity, based in the US and Switzerland, was used by the CIA to funnel money to Muslim militants fighting against US enemies in places such as Bosnia and Afghanistan (see 1989 and After). It is not known when Zahid got involved with the charity, but he is heading its Pakistani branch by 1988, when his nephew Ramzi Yousef first goes to Afghanistan (see Late 1980s). [Reeve, 1999, pp. 120] In the spring of 1993, US investigators raid Zahid’s house while searching for Yousef (see Spring 1993). Documents and pictures are found suggesting close links and even a friendship between Zahid and Osama bin Laden. Photos and other evidence also show close links between Zahid, KSM, and government officials close to Nawaf Sharif, who is prime minister of Pakistan twice in the 1990s. The investigators also discover that Zahid was seen talking to Pakistani President Farooq Ahmad Khan Leghari during a Mercy International ceremony in February 1993. [Reeve, 1999, pp. 48-49, 120] But despite the raid, Zahid apparently keeps his job until about February 1995, when Yousef is arrested in Pakistan (see February 7, 1995). Investigators learn Yousef had made a phone call to the Mercy office, and there is an entry in Yousef’s seized telephone directory for a Zahid Shaikh Mohammed. Pakistani investigators raid the Mercy office, but Zahid has already fled. [United Press International, 4/11/1995; Guardian, 9/26/2001; McDermott, 2005, pp. 154, 162] It is unclear what subsequently happens to Zahid. In 1999 it will be reported that he is believed to be in Kuwait, but in 2002 the Kuwaiti government will announce he is a member of al-Qaeda, so presumably he is no longer welcome there. [Reeve, 1999, pp. 48; Los Angeles Times, 9/1/2002] Mercy International’s Kenya branch will later be implicated in the 1998 US embassy bombing in that country, as will KSM, Zahid’s brother (see Late August 1998).

Entity Tags: Ramzi Yousef, Zahid Shaikh Mohammed, Khalid Shaikh Mohammed, Mercy International

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Strom Thurmond.Strom Thurmond. [Source: US Government]Former Lockheed software manager Margaret Newsham, who worked at the Menwith Hill facility of the NSA’s Echelon satellite surveillance operation in 1979, says she heard a real-time phone intercept of conversations involving senator Strom Thurmond (R-SC). She was shocked, she recalls, because she thought only foreign communications were being monitored. Newsham, who was fired from Lockheed after she filed a whistleblower lawsuit alleging fraud and waste, tells the chairman of the House Intelligence Committee, Louis Stokes (D-OH), of the overheard conversations. In July, Capital Hill staffers will leak the story to the Cleveland Plain Dealer. Thurmond says he doesn’t believe Newsham’s story, but his office admits that it has previously received reports that Thurmond had been a target of NSA surveillance. Thurmond will decline to press for an investigation, and the reason for the surveillance has never been revealed. [CBS News, 2/27/2000; Patrick S. Poole, 8/15/2000]

Entity Tags: Strom Thurmond, National Security Agency, House Intelligence Committee, Louis Stokes, Echelon, Cleveland Plain Dealer, Lockheed Martin Corporation, Margaret Newsham

Timeline Tags: Civil Liberties

Mercy International USA’s logo.Mercy International USA’s logo. [Source: Mercy International USA]The 1999 book Dollars for Terror will allege that in 1989, Mercy International, a “subsidiary of the Muslim Brotherhood, was able to establish its headquarters in the United States, in the state of Michigan, with the assistance of the CIA. The Agency provided significant logistical and financial support to this ‘humanitarian’ organization, enabling it to act clandestinely in the various Balkan conflicts as well as within the Muslim communities of several Russian republics.” [Labeviere, 1999, pp. 364] Mercy International will later be tied to al-Qaeda in a number of ways. For instance, in the mid-1990s its Pakistan branch will be headed by Zahid Shaikh Mohammed, brother of 9/11 mastermind Khalid Shaikh Mohammed (see 1988-Spring 1995). [Los Angeles Times, 9/1/2002] Its Kenya branch will be tied to the 1998 US embassy bombing there. Its Philippine branch is tied to Mohammed Jamal Khalifa, bin Laden’s brother-in-law. [Burr and Collins, 2006, pp. 128, 188-189] Branches of this charity in different countries have slightly different names such as Mercy International-USA and Mercy International Relief Agency, and it has been claimed that the US branch has no connection with the terrorism-related branches. However, a 2003 article will draw links between the US branch and other branches. [National Review, 9/4/2003]

Entity Tags: Central Intelligence Agency, Mercy International, Mohammed Jamal Khalifa, Zahid Shaikh Mohammed, Muslim Brotherhood

Timeline Tags: Complete 911 Timeline

Ali Mohamed’s US passport, issued in 1989.Ali Mohamed’s US passport, issued in 1989. [Source: US Justice Department] (click image to enlarge)Ali Mohamed is honorably discharged from the US Army with commendations in his file, including one for “patriotism, valor, fidelity, and professional excellence.” He remains in the Army Reserves for the next five years. [New York Times, 12/1/1998; Raleigh News and Observer, 10/21/2001] A US citizen by this time, he will spend much of his time after his discharge in Santa Clara, California, where his wife still resides. He will try but fail to get a job as an FBI interpreter, will work as a security guard, and will run a computer consulting firm out of his home. [San Francisco Chronicle, 9/21/2001]

Entity Tags: US Department of the Army, Ali Mohamed

Timeline Tags: Complete 911 Timeline

A lawsuit against the FBI’s investigation of a sixth-grade boy and his school project to create an “encyclopedia of the world” is stopped when an appeals court rules that the agency is shielded by the “state secrets” privilege (see March 9, 1953). Unable to secure information from the FBI as to why it investigated him, the child had therefore “failed to sustain his burden of proof [and] the cause of action was properly dismissed.” [Siegel, 2008, pp. 197]

Entity Tags: Federal Bureau of Investigation

Timeline Tags: Civil Liberties

Mujaheddin battalions in formation during the Bosnia war. More details are unknown.Mujaheddin battalions in formation during the Bosnia war. More details are unknown. [Source: History Channel]Saudi multimillionaire Yassin al-Qadi forms the Muwafaq Foundation (also known as Blessed Relief). The Muwafaq Foundation is a charitable trust registered in Jersey, an island off the coast of Britain with lenient charity regulations. [Burr and Collins, 2006, pp. 121-123] Al-Qadi is said to be the chief investor, donating about $15 to $20 million for the charity from his fortune. He also persuades members of very rich and powerful Saudi families to help out. [Chicago Tribune, 10/29/2001] The foundation’s board of directors will later be called “the creme de la creme of Saudi society.” [New York Times, 10/13/2001] Saudi billionaire Khalid bin Mahfouz’s legal team will later state that bin Mahfouz “was the principal donor to the foundation at its inception in 1991 but was not involved in the running of the charity.” They also will state that the foundation was purely humanitarian and had no terrorist ties. [Bin Mahfouz Info, 11/22/2005] The Muwafaq Foundation opens offices in several African countries, but it is soon suspected of providing funds for Islamic extremists. For instance, in 1992 it opens an office in Mogadishu, Somalia, at a time when al-Qaeda is assisting militants fighting US soldiers there (see October 3-4, 1993). Burr and Collins will claim “its purpose [there] consisted of transporting weapons and ammunition to Islamists in the city.” But most of the foundation’s work appears to center on Bosnia. It opens an office in neighboring Croatia in 1992, the same year the Bosnian war begins, and then in Sarajevo, Bosnia, a year later. By June 1993, group of mujaheddin fighting in the Zenica region of Bosnia form the Al Muwafaq Brigade. It consists of about 750 Afghan-Arabs and has Iranian advisers. According to Burr and Collins, it soon becomes well known in the region that the Muwafaq Foundation is funding the Al Muwafaq Brigade and at least one camp in Afghanistan training mujaheddin to fight in Bosnia. One member of the brigade is Ahmed Ressam, who will later be arrested in an al-Qaeda plot to blow up the Los Angeles airport (see December 14, 1999). In July 1995, a US Foreign Broadcast Information Service report indicates that the Muwafaq Foundation’s office in Zagreb, Croatia, is a bin Laden front. In early 1996, bin Laden will mention in an interview that he supports the “Muwafaq Society” in Zagreb. However, al-Qadi denies any ties to fighting mujaheddin. The brigade apparently disbands after the war ends in 1995 and the Muwafaq Foundation will close its Bosnia office by 1998. [Burr and Collins, 2006, pp. 121-123, 137-138] A secret 1996 CIA report will claim that Muwafaq has ties to the al-Gama’a al-Islamiyya militant group and helps fund mujaheddin fighting in Bosnia and at least one training camp in Afghanistan (see January 1996). The US will declare al-Qadi a terrorist financier shortly after 9/11 but has never taken any action against the Muwafaq Foundation (see 1995-1998).

Entity Tags: Yassin al-Qadi, Khalid bin Mahfouz, Muwafaq Foundation, Al Muwafaq Brigade, Osama bin Laden, Ahmed Ressam

Timeline Tags: Complete 911 Timeline

A US appellate court refuses to find a number of military contractors liable in the death of Earl Patton Ryals, who died with 36 of his fellow crewmen in the Iraqi attack on the USS Stark (see May 17, 1987 and After). Ryals’s estate claims that he and his fellows died in part because of negligence on the part of the contractors who designed, manufactured, tested, and marketed the weapons system on board the Stark, including the Phalanx anti-missile system. In turning down the estate’s claim, the court cites the government’s “state secrets” privilege (see March 9, 1953), saying that the facts of the issue could not be resolved without examining classified Navy documents. And even without this reason, the court rules, Ryals’s estate cannot see the documents because the case presents “a political question” about military decision-making that is not subject to judicial review. [Zuckerbraun v. General Dynamics Corp., 6/13/1991; Siegel, 2008, pp. 197-198] A year later, a similar case will be dismissed on the grounds that a trial might conceivably reveal “state secrets” (see September 16, 1992).

Entity Tags: Earl Patton Ryals, US Department of the Navy

Timeline Tags: Civil Liberties

Fateh Kamel.Fateh Kamel. [Source: Radio Canada]The Al-Kifah Refugee Center in Brooklyn has an office in Zagreb, Croatia, also called the Al-Kifah Refugee Center, and the links between the two are very close. Both are connected to Maktab al-Khidamat/Al-Kifah in Pakistan, which is an al-Qaeda charity front. Hassan Hakim, deputy director of the Zagreb office, says his office is linked only to the Brooklyn office. This is important because the Zagreb office is closely involved in assisting mujaheddin in the Bosnian war and the Brooklyn office is closely linked to the CIA, suggesting the CIA could be assisting the Bosnia mujaheddin through the relationship between Brooklyn and Zagreb offices. [Washington Post, 8/3/1993; Kohlmann, 2004, pp. 41] The Zagreb office will remain open after the Brooklyn office is closed in the wake of the 1993 WTC bombing (see February 26, 1993), as all of the bombers were connected to that office. A Washington Post journalist who visits it in August 1993 describes it as being “housed in a modern, two-story building staffed by Arabs who identified themselves as Algerians.” [Washington Post, 8/3/1993] Like the Brooklyn office, the Zagreb office appears to be staffed with many militants involved in illegal activities:
bullet Fateh Kamel will reportedly be involved in many attacks and is considered a leader for Ahmed Ressam, who will attempt to bomb the Los Angeles airport (see December 14, 1999).
bullet Lionel Dumont is involved in numerous al-Qaeda plots, even as far afield as Japan.
bullet Hocine Senoussaoui is connected with Al-Gama’a al-Islamiyya and the GIA and will be arrested in France in 1996. [Kohlmann, 2004, pp. 164, 186, 189, 195]
bullet Kamar Eddine Kherbane, head of the Zagreb office, is a known al-Qaeda operative as well as a leader of an Algerian extremist group, and allegedly will be involved in the 9/11 attacks (see September 18-20, 2001).
bullet Hassan Hakim. A 1996 CIA report will say that he is a senior member of Algerian extremist groups and was arrested in France for weapons smuggling in July 1994.
bullet In 1996, a CIA report will say that an Algerian national connected to the Zagreb office is “preparing for an unspecified terrorist attack in Europe…” [Central Intelligence Agency, 1/1996]

Entity Tags: Lionel Dumont, Hocine Senoussaoui, Hassan Hakim, Kamer Eddine Kherbane, Al-Kifah Refugee Center, Fateh Kamel, Maktab al-Khidamat

Timeline Tags: Complete 911 Timeline

Osama Basnan.Osama Basnan. [Source: Fox News]US authorities discover a connection between Osama Basnan, who is later alleged to associate with 9/11 hijackers Khalid Almihdhar and Nawaf Alhazmi (see April 1998 and December 4, 1999), and Eritrean Islamic Jihad (EIJ). The US will connect EIJ to bin Laden in 1996 and the FBI will become aware that a high-level EIJ member sits on al-Qaeda’s Shura council. The State Department gives the FBI a box of documents recovered from an abandoned car in May 1992. The documents are in Arabic and one of them is a newsletter addressed to EIJ supporters reporting news about the EIJ council. The newsletter is marked “confidential.” In addition, the box contains letters addressed to Basnan discussing plans to import used cars into the US. The FBI opens a counterterrorism investigation on the EIJ, but finds little, closing it in December of the same year. [US Congress, 7/24/2003, pp. 176-7 pdf file]

Entity Tags: Eritrean Islamic Jihad, Osama Basnan, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A federal appeals court upholds the dismissal of a lawsuit filed on behalf of 23 Navy sailors killed in the attack on the USS Stark (see May 17, 1987 and After) against a number of defense contractors. A similar lawsuit on behalf of one of the sailors killed in the attack was dismissed a year before (see June 13, 1991). This time the plaintiffs file over 2,500 pages of unclassified documentary evidence supporting their claims that the contractors were negligent in their design and implementation of the weapons systems aboard the Stark. The appeals court finds that regardless of the amount of evidence entered, to allow the trial would be to potentially infringe on the US government’s “state secrets” privilege (see March 9, 1953). “[N]o amount of effort could safeguard the privileged information,” the court rules. The court adds that “classified and unclassified information cannot always be separated, and therefore courts must restrict access not only to classified material, but to “those pieces of evidence” that “press so closely upon highly sensitive material that they create a hgh risk of inadvertent or indirect disclosures.” [Siegel, 2008, pp. 198]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

Mamoun Darkazanli several years after 9/11.Mamoun Darkazanli several years after 9/11. [Source: Reuters]According to CIA documents, US intelligence first becomes aware of Mamoun Darkazanli at this time, when a person arrested in Africa carrying false passports and counterfeit money is found with Darkazanli’s telephone number. Darkazanli is a Syrian businessman residing in Germany. The CIA carefully scrutinizes Darkazanli and his business dealings, but authorities are not able to make a case against him. [US Congress, 7/24/2003, pp. 185 pdf file] Many will later claim that Darkazanli is a member of the Hamburg al-Qaeda cell. He will associate with 9/11 hijackers Mohamed Atta, Marwan Alshehhi, and others (see October 9, 1999).

Entity Tags: Central Intelligence Agency, Mamoun Darkazanli

Timeline Tags: Complete 911 Timeline

The 9/11 Commission, relying on a CIA report, will later say that three of the men involved in the 1993 World Trade Center bombing travel on Saudi passports containing an indicator of possible Islamist extremism. [9/11 Commission, 8/21/2004, pp. 46-47, 61 pdf file] Author James Bamford will say that it is a “secret coded indicator, placed there by the Saudi government, warning of a possible terrorist affiliation.” [Bamford, 2008, pp. 58-59] It is unclear what the indicator looks like precisely and who the men are. However, Ahmad Ajaj, an associate of lead bomber Ramzi Yousef, does have a Saudi passport. Some of the 9/11 hijackers will later use Saudi passports with the same indicator (see October 28, 2000, June 1, 2001, and June 13, 2001, and November 2, 2007). [9/11 Commission, 8/21/2004, pp. 46-47, 61 pdf file]

Entity Tags: Ahmad Ajaj

Timeline Tags: Complete 911 Timeline

Bomb damage in underground levels of the WTC in 1993.Bomb damage in underground levels of the WTC in 1993. [Source: Najlah Feanny/ Corbis]An attempt to topple the World Trade Center in New York City fails, but six people are killed and over 1,000 injured in the misfired blast. The explosion is caused by the detonation of a truck bomb in the underground parking garage. An FBI explosives expert will later state, “If they had found the exact architectural Achilles’ heel or if the bomb had been a little bit bigger, not much more, 500 pounds more, I think it would have brought her down.” Ramzi Yousef, who has close ties to Osama bin Laden, organizes the attempt. [Village Voice, 3/30/1993; US Congress, 2/24/1998] The New York Times will report on Emad Salem, an undercover agent who will be the key government witness in the trial against Yousef. Salem will testify that the FBI knew about the attack beforehand and told him it would thwart the attack by substituting a harmless powder for the explosives. However, an FBI supervisor called off this plan and the bombing was not stopped. [New York Times, 10/28/1993] Other suspects were ineptly investigated before the bombing as early as 1990. Several of the bombers were trained by the CIA to fight in the Afghan war and the CIA will conclude, in internal documents, that it was “partly culpable” for this bombing (see January 24, 1994). [Independent, 11/1/1998] 9/11 mastermind Khalid Shaikh Mohammed is an uncle of Yousef and also has a role in the bombing (see March 20, 1993). [Independent, 6/6/2002; Los Angeles Times, 9/1/2002] One of the bombers even leaves a message, which will be found by investigators, stating, “Next time, it will be very precise.” [Associated Press, 9/30/2001]

Entity Tags: Khalid Shaikh Mohammed, Federal Bureau of Investigation, Ramzi Yousef, Osama bin Laden, World Trade Center, Emad Salem, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Informant Emad Salem, pictured bent over in a green shirt, enables the FBI to take surveillance footage like this of the plotters making a bomb.Informant Emad Salem, pictured bent over in a green shirt, enables the FBI to take surveillance footage like this of the plotters making a bomb. [Source: National Geographic]Eight people are arrested, foiling a plot to bomb several New York City landmarks. The targets were the United Nations building, 26 Federal Plaza, and the Lincoln and Holland tunnels. This is known as the “Landmarks” or “Day of Terror” plot. The plotters are connected to Ramzi Yousef and the “Blind Sheikh,” Sheikh Omar Abdul-Rahman. If the bombing, planned for later in the year, had been successful, thousands would have died. An FBI informant named Emad Salem had infiltrated the group, gathering information that leads to arrests of the plotters (see April 23, 1993). [US Congress, 7/24/2003] Abdul-Rahman will eventually be sentenced to life in prison for a role in the plot. Nine others will be given long prison terms, including Ibrahim El-Gabrowny and Clement Rodney Hampton-El. [New York Times, 1/18/1996] Siddig Siddig Ali, who was possibly the main force behind the plot (see April 23, 1993), will eventually be sentenced to only 11 years in prison because he agreed to provide evidence on the other suspects [New York Times, 10/16/1999]

Entity Tags: Ramzi Yousef, Siddig Siddig Ali, Ibrahim El-Gabrowny, Clement Rodney Hampton-El, Emad Salem, Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline

A UN vehicle burning in Mogadishu, Somalia, on October 3, 1993.A UN vehicle burning in Mogadishu, Somalia, on October 3, 1993. [Source: CNN]Eighteen US soldiers are killed in Mogadishu, Somalia, in a spontaneous gun battle following an attempt by US Army Rangers and Delta Force to snatch two assistants of a local warlord; the event later becomes the subject of the movie Black Hawk Down. A 1998 US indictment will charge Osama bin Laden and his followers with training the attackers. [PBS Frontline, 10/3/2002]
Rocket Propelled Grenades - While rocket-propelled grenades (RPGs) are not usually effective against helicopters, the fuses on the RPGs fired by the Somalis against US helicopters are modified so that they explode in midair. During the Soviet-Afghan War, bin Laden associates had learned from the US and British that, although it is hard to score a direct hit on a helicopter’s weak point—its tail rotor—a grenade on an adjusted fuse exploding in midair can spray a tail rotor with shrapnel, causing a helicopter to crash. [Los Angeles Times, 2/25/2002]
Possibly Trained by Al-Qaeda - For months, many al-Qaeda operatives had been traveling to Somalia and training militants in an effort to oppose the presence of US soldiers there. Even high-ranking al-Qaeda leaders like Mohammed Atef were directly involved (see Late 1992-October 1993).
Comment by Bin Laden - In a March 1997 interview, bin Laden will say of the Somalia attack, “With Allah’s grace, Muslims over there cooperated with some Arab mujaheddin who were in Afghanistan… against the American occupation troops and killed large numbers of them.” [CNN, 4/20/2001]
Some Al-Qaeda Operatives Leave Somalia after Battle - Al-Qaeda operative L’Houssaine Kherchtou, who supports the organization’s operations in Somalia, will later say that he was told this event also led at least some al-Qaeda members to flee Somalia. “They told me that they were in a house in Mogadishu and one of the nights one of the helicopters were shot, they heard some shooting in the next house where they were living, and they were scared, and the next day they left because they were afraid that they will be caught by the Americans.” [Bergen, 2006, pp. 141]

Entity Tags: L’Houssaine Kherchtou, Mohammed Atef, Osama bin Laden, Pakistan Directorate for Inter-Services Intelligence

Timeline Tags: Complete 911 Timeline

In late 1993, bin Laden asks Ali Mohamed to scout out possible US, British, French, and Israeli targets in Nairobi, Kenya. Mohamed will later confess that in December 1993, “I took pictures, drew diagrams and wrote a report.” Then he travels to Sudan, where bin Laden and his top advisers review Mohamed’s work. In 1994, Mohamed claims that “bin Laden look[s] at a picture of the American Embassy and point[s] to where a truck could go as a suicide bomber.” A truck will follow bin Laden’s directions and crash into the embassy in 1998. Mohamed seems to spend considerable time in Nairobi working with the cell he set up there and conducting more surveillance. He also is sent to the East African nation of Djibouti to scout targets there, and is asked to scout targets in the West African nation of Senegal. [Los Angeles Times, 10/21/2000; Chicago Tribune, 12/11/2001; LA Weekly, 5/24/2002; 9/11 Commission, 6/16/2004] Much of his work seems to be done together with Anas al-Liby, a top al-Qaeda leader with a mysterious link to Western intelligence agencies similar to Mohamed’s. In 1996, British intelligence will pay al-Liby to assassinate Libyan leader Colonel Mu’ammar al-Qadhafi (see 1996), and then will let him live openly in Britain until 2000 (see Late 1995-May 2000). Al-Liby is said to be a “computer wizard” known for “working closely” with Mohamed. [New York Times, 2/13/2001; New York Times, 4/5/2001] L’Houssaine Kherchtou, an al-Qaeda member who later turns witness for a US trial (see September 2000), was trained in surveillance techniques in Pakistan by Mohamed in 1992. Kherchtou will claim he later comes across Mohamed in 1994 in Nairobi. Mohamed, Anas al-Liby, and a relative of al-Liby’s use Kherchtou’s apartment for surveillance work. Kherchtou sees al-Liby with a camera about 500 meters from the US embassy. [Washington File, 2/22/2001] Mohamed returns to the US near the end of 1994 after an FBI agent phones him in Nairobi and asks to speak to him about an upcoming trial. [Washington File, 2/22/2001]

Entity Tags: Ali Mohamed, L’Houssaine Kherchtou, Anas al-Liby, Federal Bureau of Investigation, Osama bin Laden

Timeline Tags: Complete 911 Timeline

The British newspaper The Independent publishes the first interview of Osama bin Laden in Western countries. Veteran journalist Robert Fisk interviews bin Laden in Sudan, where bin Laden is ostensibly living a peaceful life. Fisk does note that the “Western embassy circuit in Khartoum has suggested that some of the ‘Afghans’ whom this Saudi entrepreneur flew to Sudan are now busy training for further jihad wars in Algeria, Tunisia and Egypt,” but generally bin Laden is portrayed as a former mujaheddin fighter turned peaceful businessman. This is reflected in the title of the article: “Anti-Soviet Warrior Puts His Army on the Road to Peace.” Bin Laden talks some about his role in the Soviet-Afghan war, boasting that he helped thousands of mujaheddin go there to fight. Fisk comments, “When the history of the Afghan resistance movement is written, Mr. bin Laden’s own contribution to the mujaheddin - and the indirect result of his training and assistance - may turn out to be a turning-point in the recent history of militant fundamentalism…” Fisk tells bin Laden that his name has recently been mentioned by Muslim fighters in Bosnia. Bin Laden acknowledges his influence there, but complains about how difficult it is for fighters to cross into Bosnia. [Independent, 12/6/1993]

Entity Tags: Robert Fisk, Osama bin Laden

Timeline Tags: Complete 911 Timeline

The London-based Advice and Reformation Committee (ARC) establishes a secure system for communications between Saudi Arabia and London for Osama bin Laden. The system is set up by Denver resident Lujain al-Imam, wife of London-based Islamic activist Mohammad al-Massari, at his request. The calls are routed from Saudi Arabia to Britain through Denver, Colorado, using toll-free lines established for US servicemen during the Gulf War, in order to stop the Saudi government from intercepting the messages. After the system is set up, bin Laden calls al-Massari to thank him. It is not known how long the phone system is used. However, in late 2001 al-Imam will say that some of the people involved in setting up the system are still in the Denver area, but she will not name them. [Scripps Howard News Service, 11/12/2001]
Who Else Is in Denver? - The ARC is widely considered bin Laden’s publicity office. ARC head Khalid al-Fawwaz will be indicted for his involvement in the US embassy bombings in 1998 (see 10:35-10:39 a.m., August 7, 1998 and August 21, 2001). Denver-based radical publisher Homaidan al-Turki begins to be investigated over suspicions he is involved in terrorism in 1995, although it is unclear whether this is related to the Saudi Arabia-Britain phone lines. [Associated Press, 8/31/2006] Another likely suspect for this communications hub would be Ziyad Khaleel. He lives in Denver in the early 1990s until about 1994, and is vice president of the Denver Islamic Society. In 1998, he will work with al-Fawwaz to buy a satellite phone for bin Laden (see November 1996-Late August 1998). [Denver Post, 1/27/1991; St. Louis Post-Dispatch, 1/22/2003] It seems likely Khaleel is in contact with Anwar al-Awlaki at this time, since al-Awlaki works as an imam for the Denver Islamic Society from 1994 to 1996. In 1999, al-Awlaki will be investigated by the FBI for his links to Khaleel (see June 1999-March 2000). He will go on to be the imam for a couple of the future 9/11 hijackers in San Diego, California, and then will become a prominent radical in Yemen. [New York Times, 5/8/2010]

Entity Tags: Mohammed al-Massari, Lujain al-Imam, Advice and Reformation Committee, Anwar al-Awlaki, Osama bin Laden, Homaidan al-Turki, Ziyad Khaleel

Timeline Tags: Complete 911 Timeline

A young Indonesian nicknamed Hambali forms a front company that ties al-Qaeda figures to the Bojinka plot (see January 6, 1995), an early version of the 9/11 plot. Hambali had fought in Afghanistan in the late 1980’s, repeatedly met with bin Laden there, and allied himself to bin Laden’s cause. In 1994, Hambali, living in a village north of Kuala Lumpur, Malaysia, began frequently receiving visitors. According to his landlord, “Some looked Arab and others white.” There has been no explanation who these “white” visitors may have been. Hambali had been very poor prior to this time, but he is suddenly “flush with newfound cash” brought by the visitors. In June 1994, he founds a front company called Konsonjaya with Wali Khan Amin Shah, a key Bojinka plotter, and both their names are listed on the eight-person board of directors. Shah fought with bin Laden in Afghanistan, and bin Laden will even admit knowing him and praise him in an 1998 interview (see May 28, 1998). Philippine police phone taps show that frequent calls are made from the Konsonjaya offices in Malaysia to the Philippines offices of Mohammed Jamal Khalifa, bin Laden’s brother-in-law who is also believed to be part of the Bojinka plot (see 1994). [Time, 4/1/2002] A Malaysian official will later say that Hambali spends time in the Philippines with Shah and bomber Ramzi Yousef in 1994 as they plan the Bojinka plot. [Washington Post, 2/3/2002] Mohammed Amin al-Ghafari, another Konsonjaya director, makes frequent trips from Malaysia to the Philippines while planning for the Bojinka plot is under way, and he is later believed to play a key role in financing the plot. In early 1995, after the Bojinka plot is broken up, one of the arrested Bojinka plotters will confess to Konsonjaya’s role in the plot (see February-Early May 1995) and a Philippine investigator’s flow chart of the Bojinka plotters and their connections will prominently include Konsonjaya (see Spring 1995). However, neither the Philippine nor US government appears interested in capturing Hambali, al-Ghafari, or the others involved in Konsonjaya before 9/11. [Los Angeles Times, 6/24/2002; Contemporary Southeast Asia, 12/1/2002] Hambali will continue to live openly in Malaysia, even throwing a party every year for hundreds of people (see April 1991-Late 2000). He will go on to plan other al-Qaeda attacks and will attend a key planning meeting for the 9/11 plot in 2000 (see January 5-8, 2000). [Time, 4/1/2002] Al-Ghafari will finally be deported in 2002 after years of police protection (see October 8-November 8, 2002).

Entity Tags: Wali Khan Amin Shah, Ramzi Yousef, Mohammed Amin al-Ghafari, Konsonjaya, Hambali, Mohammed Jamal Khalifa, Operation Bojinka

Timeline Tags: Complete 911 Timeline

Sam Karmilowicz, a security officer at the US embassy in Manila, Philippines, will later claim that on September 18, 1994 the embassy receives a call from an anonymous person speaking with a Middle Eastern accent that there is a plot to assassinate President Clinton, who is scheduled to visit Manila from November 12 through 14, 1994. The caller says that a Pakistani businessman named Tariq Javed Rana is one of the leaders of the plot. Further, Rana is using counterfeit US money to help pay for the plot. An interagency US security team is immediately notified and begins investigating the threat. A few weeks later, Karmilowicz is told by members of this team that the plot was a hoax. Clinton comes to the Philippines as scheduled and no attack takes place. [CounterPunch, 3/9/2006] However, bomber Ramzi Yousef moved to the Philippines in early 1994, along with his uncle Khalid Shaikh Mohammed (KSM) and associate Wali Khan Amin Shah. [Los Angeles Times, 9/1/2002] Yousef will later confess to FBI agents that he planned to assassinate Clinton by blowing up his motorcade with a missile or explosives, but gave up because the security was so tight. Shah will also confess to this plot and add that the order to kill Clinton came from bin Laden. [Guardian, 8/26/1998] CNN will report in 1998, “The United States was aware of the planned attempt before the president left for the Philippines and as a result, security around the president was intensified.” [CNN, 8/25/1998] Secret Service sources will later report that large sums of counterfeit US currency were entering the Philippines during the time of the plot. Karmilowicz will conclude that the warning about the assassination was accurate and that Tariq Rana was involved in the plot. CNN reporter Maria Ressa will later tell Karmilowicz that her sources in the Philippine intelligence and police believe that Rana is a close associate of Yousef and KSM. Additionally, her sources believe Rana is connected to the Pakistani ISI. [CounterPunch, 3/9/2006] Rana will be monitored by Philippines police and eventually arrested in April 1995 (see December 1994-April 1995).

Entity Tags: Pakistan Directorate for Inter-Services Intelligence, Khalid Shaikh Mohammed, Osama bin Laden, Ramzi Yousef, US intelligence, Tariq Javed Rana, Sam Karmilowicz, Maria Ressa, Wali Khan Amin Shah, William Jefferson (“Bill”) Clinton

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mohammed Jamal Khalifa, bin Laden’s brother-in-law, is in the Netherlands at this time. He meets with representatives of:
bullet The Muwafaq Foundation, a Saudi funded charity operating from the town of Breda, Netherlands.
bullet The Egyptian militant group Al-Gama’a al-Islamiyya (the Islamic Group), led by Sheikh Omar Abdul-Rahman.
bullet The Islamic Salvation Front (FIS), an outlawed Islamist political party in Algeria.
What happens in Khalifa’s meetings is unknown, but the next month he opens a branch of the Muwafaq Foundation in the Philippines. [Gunaratna, 2003, pp. 168, 194, 342] Saudi multimillionaire Yassin al-Qadi is believed to be the chief funder of Muwafaq; the US will pronounce him a terrorist financier shortly after 9/11 (see October 12, 2001). The US will later claim Muwafaq funded the Abu Sayyaf militant group in the Philippines (see 1995-1998). A secret 1996 CIA report will claim that Muwafaq has ties to Al-Gama’a al-Islamiyya and helps fund mujaheddin fighting in Bosnia (see 1991-1995) and at least one training camp in Afghanistan (see January 1996).

Entity Tags: Mohammed Jamal Khalifa, Al-Gama’a al-Islamiyya, Islamic Salvation Front, Muwafaq Foundation, Yassin al-Qadi

Timeline Tags: Complete 911 Timeline

Bin Laden’s brother-in-law Mohammed Jamal Khalifa was arrested in the US in mid-December 1994 (see December 16, 1994-May 1995), and as he is held the evidence tying him to terrorism continues to grow:
bullet One week after his arrest, the State Department tells the immigration judge handling Khalifa’s case that he had “engaged in serious terrorist offenses” and that his release “would endanger US national security.” [Lance, 2006, pp. 158-159]
bullet In early January, police in the Philippines uncover the Bojinka plot, involving associates of Khalifa. A Philippine investigator makes a chart connecting the Bojinka figures and places Khalifa in the middle of it (see Spring 1995). The plot, if successful, would have killed thousands while also assassinating the Pope (see January 6, 1995). Meanwhile, The FBI translates literature in Khalifa’s luggage advocating training in assassination, explosives, and weapons, including discussions of the “wisdom of bombing churches and murdering Catholic priests.” [New York Times, 5/2/2002; Lance, 2003, pp. 233-35]
bullet Phone numbers to Khalifa’s Philippine charity fronts are found on bomber Ramzi Yousef’s laptop seized in early January 1995 as the Bojinka plot is exposed. Khalifa’s business card is found in the apartment Yousef was staying in as well. [Lance, 2006, pp. 158-159, 203]
bullet Bojinka plotter Wali Khan Amin Shah is arrested in early January 1995. He is found with multiple phone numbers for Khalifa. [Stephen Handelman, 7/31/1996; Lance, 2006, pp. 158-159]
bullet When Yousef is arrested in February 1995 (see February 7, 1995), he will be asked about Khalifa’s business card found in his apartment. According to an FBI report issued at the time, Yousef claims that he did not personally know Khalifa, but had been given the card by fellow Bojinka plotter Wali Khan Amin Shah as a contact in case he needed help. He also says that he is aware that Khalifa is a relative of Osama bin Laden. [Lance, 2006, pp. 203]
bullet In February and March, Philippine interrogation of one Bojinka plotter uncovers a planned second wave of attacks that would involve flying airplanes into US buildings, including the World Trade Center, CIA headquarters, and the Pentagon (see February-Early May 1995). This will eventually evolve into the 9/11 attacks. US investigators are notified about this sometime in the spring of 1995 (see Spring 1995).
bullet On April 1, Philippine authorities arrest six men and announce they are connected to Khalifa and Bojinka plotters such as Ramzi Yousef (see April 1, 1995-Early 1996). The Philippine Interior Secretary calls Khalifa a key figure in Islamic extremist efforts. [Associated Press, 4/16/1995]
bullet The Associated Press reports that Khalifa is believed to be “a key figure in efforts to recruit new members of the Abu Sayyaf group.” On April 4, the Abu Sayyaf raid a Christian town called Ipil and kill over fifty people in what is the group’s largest and most brutal terrorist attack (see April 4, 1995). This increases the importance of Khalifa’s ties with them. [Associated Press, 4/16/1995]
bullet Khalifa is accused by Yemen, Egypt, and Algeria of financing subversion in those countries. [Associated Press, 4/16/1995]
Despite all this evidence, Khalifa will soon be deported to Jordan for retrial there (see May 3, 1995-August 31, 1995), even though the key witness against him has already recanted. He will be found innocent and set free (see July 19, 1995).

Entity Tags: Mohammed Jamal Khalifa, Abu Sayyaf, Osama bin Laden, Federal Bureau of Investigation, US Department of State, Wali Khan Amin Shah, Philippines, Mohammed Loay Bayazid, Ramzi Yousef

Timeline Tags: Complete 911 Timeline

The Communications Assistance for Law Enforcement Act (CALEA) takes effect. CALEA obliges telecommunications providers such as AT&T to give law enforcement agencies and US intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks. In more recent years, the law will be expanded to give law enforcement and intelligence agencies similar abilities to monitor Internet usage by US citizens. [Federal Communications Commission, 2/21/2007]

Entity Tags: Communications Assistance for Law Enforcement Act (CALEA), AT&T

Timeline Tags: Civil Liberties

One of Ramzi Yousef’s timers seized by Philippines police in January 1995.One of Ramzi Yousef’s timers seized by Philippines police in January 1995. [Source: Peter Lance]Responding to an apartment fire, Philippine investigators uncover an al-Qaeda plot to assassinate the Pope that is scheduled to take place when he visits the Philippines one week later. While investigating that scheme, they also uncover Operation Bojinka, planned by the same people: 1993 WTC bomber Ramzi Yousef and 9/11 mastermind Khalid Shaikh Mohammed (KSM). [Independent, 6/6/2002; Los Angeles Times, 6/24/2002; Los Angeles Times, 9/1/2002] Many initial reports after 9/11 will claim the fire was accidental and the police discovery of it was a lucky break, but in 2002 the Los Angeles Times will report that the police started the fire on purpose as an excuse to look around the apartment. In the course of investigating the fire, one of the main plotters, Abdul Hakim Murad, is arrested. [Los Angeles Times, 9/1/2002] The plot has two main components. On January 12, Pope John Paul II is scheduled to visit Manila and stay for five days. A series of bombs along his parade route would be detonated by remote control, killing thousands, including the Pope. Yousef’s apartment is only 500 feet from the residence where the Pope will be staying. [Reeve, 1999, pp. 78; Lance, 2006, pp. 138] Then, starting January 21, a series of bombs would be placed on airplanes. [Insight, 5/27/2002] Five men, Yousef, Wali Khan Amin Shah, Abdul Hakim Murad, Abd al-Karim Yousef (a.k.a., Adel Anon, Yousef’s twin brother), and Khalid Al-Shaikh (thought to be an alias for KSM) would depart to different Asian cities and place a timed bomb on board during the first leg of passenger planes traveling to Los Angeles, San Francisco, Honolulu, and New York. They would then transfer to another flight and place a second bomb on board that flight. In all, 11 to 12 planes would blow up in a two day period over the Pacific. If successful, some 4,000 people would have been killed. [Agence France-Presse, 12/8/2001; Insight, 5/27/2002; Contemporary Southeast Asia, 12/1/2002] According to another account, some of the bombs would be timed to go off weeks or even months later. Presumably worldwide air travel could be interrupted for months. [Lance, 2003, pp. 260-61] A second wave of attacks involving crashing airplanes into buildings in the US would go forward later, once the pilots are trained for it (see February-Early May 1995).

Entity Tags: Abd al-Karim Yousef, Khalid Shaikh Mohammed, Ramzi Yousef, Wali Khan Amin Shah, Operation Bojinka, Al-Qaeda, Abdul Hakim Murad

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Following his arrest after the Bojinka plot was shut down by Philippine police (see January 6, 1995), Abdul Hakim Murad is allegedly tortured. He is reportedly subjected to sleep and food deprivation in the first few hours, and his lawyer will also claim that he is subjected to electric shocks, force-fed, and waterboarded. However, according to author Peter Lance, “these techniques only cause[d] Murad to stonewall.” The interrogation is then turned over to Colonel Rodolfo Mendoza of the Philippine police, who elicits information from Murad using two methods: First, Mendoza ensures that he is extremely hungry when the first interrogation starts, and takes a McDonald’s hamburger, French fries, and a Coke into the interrogation room, placing them in front of Murad. Mendoza says that he must give him some additional information before he can eat. Secondly, Mendoza threatens him by saying that he could be handed over to the Mossad, and claims that fellow Bojinka conspirator Wali Khan Amin Shah is already in their hands, even though Shah is still a fugitive (see January 13, 1995). These techniques are much more successful and Murad provides a good deal of additional information (see January 20, 1995, February 1995-1996, and February-Early May 1995). [Lance, 2006, pp. 181-3]

Entity Tags: Abdul Hakim Murad, Peter Lance, Rodolfo Mendoza

Timeline Tags: Torture of US Captives, Complete 911 Timeline

Colonel Rodolfo Mendoza.Colonel Rodolfo Mendoza. [Source: Australian Broadcasting Corporation]As Colonel Mendoza, the Philippines investigator, continues to interrogate Operation Bojinka plotter Abdul Hakim Murad, details of a post-Bojinka “second wave” emerge. Author Peter Lance calls this phase “a virtual blueprint of the 9/11 attacks.” Murad reveals a plan to hijack commercial airliners at some point after the effect of Bojinka dies down. Murad himself had been training in the US for this plot. He names the ten or so buildings that would be targeted for attack:
bullet CIA headquarters.
bullet The Pentagon.
bullet An unidentified nuclear power plant.
bullet The Transamerica Tower in San Francisco.
bullet The Sears Tower in Chicago.
bullet The World Trade Center.
bullet John Hancock Tower in Boston.
bullet US Congress.
bullet The White House. [Washington Post, 12/30/2001; Lance, 2003, pp. 278-280; Playboy, 6/1/2005]
Murad continues to reveal more information about this plot until he is handed over to the FBI in April (see April-May 1995). He also mentions that ten suicide pilots have already been chosen and are training in the US (see February 1995-1996). Mendoza uses what he learns from Murad and other sources to make a flow chart connecting many key al-Qaeda figures together (see Spring 1995). Philippine authorities later claim that they provide all of this information to US authorities, but the US fails to follow up on any of it. [Lance, 2003, pp. 303-4] Sam Karmilowicz, a security official at the US embassy in Manila, Philippines during this time period, will later claim that just before Murad was deported to the US in early May, he picked up an envelope containing all that the Philippine government had learned from Murad. He then sent the envelope to a US Justice Department office in New York City. He believes Mike Garcia and Dietrich Snell, assistant US attorneys who will later prosecute Murad, almost certainly had access to this evidence (see Early 1998). [CounterPunch, 3/9/2006]

Entity Tags: Al-Qaeda, Ramzi Yousef, Rodolfo Mendoza, Hambali, Peter Lance, Dietrich Snell, Khalid Shaikh Mohammed, Mohammed Jamal Khalifa, Mike Garcia, Abdul Hakim Murad

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Ramzi Yousef apprehended.Ramzi Yousef apprehended. [Source: Public domain]Ramzi Yousef is arrested in Pakistan, in a safe house owned by Osama bin Laden (see February 1992-February 7, 1995). At the time, Yousef’s uncle Khalid Shaikh Mohammed is staying in the same building and brazenly gives an interview to Time magazine as “Khalid Sheikh,” describing Yousef’s capture. [Lance, 2003, pp. 328] Yousef had recruited Istaique Parker to implement a limited version of Operation Bojinka, but Parker got cold feet and instead turned in Yousef (see February 3-7, 1995). [Lance, 2003, pp. 284-85] Robert I. Friedman, writing for New York magazine, will later report that at this time the CIA “fought with the FBI over arresting Yousef in Pakistan—the CIA reportedly wanted to continue tracking him—and President Clinton was forced to intervene.” [New York Magazine, 3/17/1995] Yousef is rendered to the US the next day and makes a partial confession while flying there (see February 8, 1995).

Entity Tags: Ramzi Yousef, Operation Bojinka, Federal Bureau of Investigation, Istaique Parker, Central Intelligence Agency, Khalid Shaikh Mohammed, Clinton administration

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Timeline Tags: Civil Liberties

The flow chart made by Colonel Mendoza.The flow chart made by Colonel Mendoza. [Source: Peter Lance] (click image to enlarge)Philippines investigator Colonel Rodolfo Mendoza makes a remarkably accurate flow chart connecting many key operators in the Bojinka plot, and sends it to US investigators. The chart is based on what he is learning from interrogating Bojinka plotter Abdul Hakim Murad (see February-Early May 1995), while also drawing on a terrorism report he recently finished (see December 15, 1994) and debriefings of a key undercover operative (see Early February 1995). The chart identifies the following key organizations as being involved in the plot:
bullet Al-Harakat al-Islamiya. Meaning “Islamic Movement,” this is an apparently meaningless group name used by Ramzi Yousef and others to disguise their connections to al-Qaeda. Yousef also sometimes uses the equally meaningless name “The Liberation Army.”
bullet The Abu Sayyaf. This Philippine Muslim militant group is believed to help with the Bojinka plot that is also penetrated by Philippine intelligence (see Late 1994-January 1995). The chart mentions 20 Abu Sayyaf operatives trained by Yousef in 1992 (see December 1991-May 1992). [Lance, 2003, pp. 303-4]
bullet IRIC (International Research and Information Center). Most of the money for Bojinka is believed to flow through this charity front. The chart names the only three employees: Mohammed Jamal Khalifa (bin Laden’s brother-in-law), Abu Omar (whose real name is Ahmad al-Hamwi (see 1995 and After), and Dr. Zubair. Mendoza’s 1994 report names Abdul Salam Zubair as an Iraqi working as Khalifa’s assistant in running a number of charity fronts. [Japan Economic Newswire, 4/24/1995; Lance, 2003, pp. 303-4]
bullet Konsonjaya. Money for the Bojinka plot also flows through this Malaysian business front (see June 1994). Amien Mohammed (real name: Mohammed Amin al-Ghafari) is named and is one of the company directors. There is a link to Wali Khan Amin Shah, another company director. Hambali, a major al-Qaeda figure, is also a company director but is not included in the chart.
The chart also mentions many other key figures in the plot:
bullet Osama bin Laden, who is connected to the IRIC and Yousef’s group.
bullet “Usama Asmorai / Wali K” is Wali Khan Amin Shah.
bullet “Yousef / Adam Ali / A Basit” is Ramzi Yousef.
bullet “Salem Ali / Mohmad” is Khalid Shaikh Mohammed (KSM).
bullet Abdul Hakin Murad. [Lance, 2003, pp. 303-4]
bullet “Ibrahim Muneer / Munir.” Ibrahim Munir, a rich Saudi Arabian businessman, has close ties to bin Laden. He came to the Philippines in November and witnesses say he was Yousef’s constant companion. In 2003, it will be reported he is still wanted by authorities. [Miller, Stone, and Mitchell, 2002, pp. 139; Ressa, 2003, pp. 20]
bullet The names in hexagonal boxes are the girlfriends of the plotters. Some Bojinka money is transferred in their names.
However, despite the accurate information in this chart, only Shah, Yousef, and Murad will be caught before 9/11. Khalifa is actually in US custody at the time the US is given this chart (see December 16, 1994-May 1995), but he is allowed to be deported a short time later (see April 26-May 3, 1995). The US also learns about a connection between Konsonjaya and bin Laden by searching Yousef’s apartment. But the other Konsonjaya directors, including Hambali, will not be apprehended, and the IRIC will be allowed to continue functioning with the same staff after being taken over by another charity front connected to Khalifa (see 1995 and After). [Lance, 2003, pp. 303-4]

Entity Tags: Rodolfo Mendoza, Ramzi Yousef, Mohammed Jamal Khalifa, Wali Khan Amin Shah, Khalid Shaikh Mohammed, Ahmad al-Hamwi, Abu Sayyaf, Abdul Salam Zubair, Konsonjaya, Hambali, Abdul Hakim Murad, International Relations and Information Center, Ibrahim Munir

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Richmor Aviation logo.Richmor Aviation logo. [Source: Richmor Aviation]The FBI interrogates Bojinka plotter Abdul Hakim Murad and learns that 9/11 mastermind Khalid Shaikh Mohammed (KSM) has been in the US and is planning to return for flight training. Murad had already been interrogated in the Philippines by Colonel Rodolfo Mendoza (see February-Early May 1995). The Associated Press will say that KSM “had traveled to Israel and the United States, according to [Mendoza’s] report.” Further, Murad met KSM several times in Pakistan in 1993, and “their conversations focused mainly on aircraft because of Mohammed’s intense interest in pilot training, Mendoza quoted Murad as saying.” [Associated Press, 6/25/2002] After Murad is handed over to the FBI around April, along with Mendoza’s report on him, he repeats much the same information to the FBI and adds more details about a man he calls Abdul Majid (which Mendoza had already learned was one of KSM’s many aliases). [Associated Press, 6/25/2002; Knight Ridder, 9/9/2002] An FBI account of his April 1995 interrogation dated May 11, 1995, states, “Murad also advised that Majid had a United States visa and was planning to travel to the US sometime in the near future. Murad stated that he thought that Majid might go to the Richmor Flying School in Albany, New York, because Majid seemed interested in obtaining his pilots license and Murad suggested the Richmor Flying School.” [Associated Press, 6/25/2002; Lance, 2006, pp. 501-502] Despite this warning, apparently KSM will still be able to travel to the US, because in the summer of 2001 an al-Qaeda operative will reveal that KSM visited the US at least through the summer of 1998 (see Summer 1998).

Entity Tags: Rodolfo Mendoza, Richmor Aviation, Abdul Hakim Murad, Khalid Shaikh Mohammed, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The Alfred P. Murrah Building after being bombed.The Alfred P. Murrah Building after being bombed. [Source: CBS News]A truck bomb destroys the Alfred P. Murrah Federal Building in Oklahoma City, killing 168 people in America’s worst domestic terrorist attack. Timothy McVeigh, later convicted in the bombing, has ideological roots both in the Patriot world and among neo-Nazis like William Pierce, whose novel, The Turner Diaries (see 1978), served as a blueprint for the attack. [Washington Post, 4/20/1995; Southern Poverty Law Center, 6/2001; Clarke, 2004, pp. 127] Initially, many believe that no American set off the bomb, and suspect Islamist terrorists of actually carrying out the bombing (see 10:00 a.m. April 19, 1995 and After). Their suspicions prove groundless. Investigators will find that the bomb is constructed of some 5,000 pounds of ammonium nitrate and fuel oil, carried in 20 or so blue plastic 55-gallon barrels arranged inside a rented Ryder truck (see April 15, 1995). The bomb is detonated by a slow-burning safety fuse, most likely lit by hand. The fuse is attached to a much faster-burning detonation cord (“det cord”) which ignites the fertilizer and fuel-oil mixture. [New York Times, 4/27/1995] The Murrah Federal Building houses a number of federal agencies, including offices for the Bureau of Alcohol, Tobacco and Firearms (BATF); the Social Security Administration; the Housing and Urban Development (HUD), Veterans Affairs, and Agriculture departments; and the Secret Service. [Washington Post, 4/20/1995] It encompasses an entire city block, between 5th and 4th Streets and Harvey and Robinson Streets, and features a U-shaped, indented drive on 5th that allows for quick pickup and delivery parking. The entire building’s facade on this side is made of glass, allowing passersby to see into the offices in the building, as well as into the America’s Kids day care center on the second floor, which by this time is filling with children. It is in this driveway that McVeigh parks his truck. [Serrano, 1998, pp. 99-102]
Entering the City - McVeigh drives into Oklahoma City, entering around 8:30 a.m. from his overnight stop in Ponca City, Oklahoma; the details reported of his entrance into the city vary (see 7:00 a.m. - 8:35 a.m., April 19, 1995). At 8:55 a.m., a security camera captures the Ryder truck as it heads towards downtown Oklahoma City [Douglas O. Linder, 2006] , a sighting bolstered by three people leaving the building who later say they saw the truck parked in front of the Murrah Building around this time. At 8:57, a security camera captures an image of McVeigh’s Ryder truck being parked outside the Murrah Building in a handicapped zone. One survivor of the blast, Marine recruiter Michael Norfleet, later recalls seeing the Ryder truck parked just outside the building next to the little circle drive on 5th Street leading up to the main entrance of the building. Norfleet had parked his black Ford Ranger in front of the Ryder.
McVeigh Lights Fuses - McVeigh drives the Ryder truck west past the Murrah Building on NW Fourth Street, turns north on a one-way street, and turns right on Fifth Street. He pulls the truck over and parks near the Firestone store, next to a chain-link fence. He then lights the five-minute fuses from inside the cab (see 8:15 a.m. and After, April 18, 1995), sets the parking brake, drops the key behind the seat, opens the door, locks the truck, exits, and shuts the door behind him. A man later claims to have hit his brakes to avoid someone matching McVeigh’s description as he crossed Fifth Street around 9:00 a.m. McVeigh walks quickly toward a nearby YMCA building where he has hidden his getaway car, a battered yellow Mercury Marquis (see April 13, 1995), in the adjoining alleyway, crossing Robinson Street and crossing another street to get to the alleyway. He begins to jog as he approaches his car. He later says he remembers a woman looking at him as she is walking down the steps to enter the building; he will describe her as white, in her mid-30s, with dirty blonde hair. According to McVeigh’s own recollection, he is about 20 feet into the alley when the bomb goes off. [Stickney, 1996, pp. 184-185; PBS Frontline, 1/22/1996; Serrano, 1998, pp. 158; Douglas O. Linder, 2006; The Oklahoman, 4/2009]
Truck Explodes - At 9:02 a.m., the truck explodes, destroying most of the Murrah Building and seriously damaging many nearby buildings. Eventually, it will be determined that 168 people die in the blast, including 19 children. Over 500 are injured. The children are in the second-story day care center just above the parking space where McVeigh leaves the Ryder truck. McVeigh will later tell his biographers that he is lifted off his feet by the power of the blast.
Devastation and Death - When the bomb detonates, the day care center and the children plummet into the basement. The building, constructed with large glass windows, collapses, sending a wave of flying glass shards and debris into the building and the surrounding area. The oldest victim is 73-year-old Charles Hurlbert, who has come to the Social Security office on the first floor. Hurlbert’s wife Jean, 67, also dies in the blast. The youngest victim is four-month-old Gabeon Bruce, whose mother is also in the Social Security office. One victim, Rebecca Anderson, is a nurse who runs towards the building to render assistance. She never makes it to the building; she is struck in the head by a piece of falling debris and will die in a hospital four days after the blast. Her heart and kidneys will be transplanted into survivors of the bombing. [Denver Post, 6/3/1997; New York Times, 6/3/1997; Serrano, 1998, pp. 153-154; Oklahoma City Journal Record, 3/29/2001] Sherri Sparks, who has friends still unaccounted for in the building, tells a reporter in the hours after the blast, “Oh, I can’t stand the thought of… those innocent children, sitting there playing, thinking they’re safe, and then this happens.” The explosion leaves a 30-foot-wide, 8-foot-deep crater in the street that is covered by the wreckage of the building’s upper floors. The north face of the nine-story building collapses entirely. [Washington Post, 4/20/1995; Washington Post, 4/22/1995] Mary Heath, a psychologist who works about 20 blocks from the Murrah Building, says the blast “shook the daylights out of things—it scared us to death. We felt the windows shake before we heard the noise.” In a neighboring building, a Water Resources Board meeting is just commencing; the audiotape of the meeting captures the sound of the blast (see 9:02 a.m. and After, April 19, 1995). [Washington Post, 4/20/1995; The Oklahoman, 4/2009] Norfleet, trapped in the Marine Corps office, is thrown into a wall by the explosion. His skull is fractured, and a shard of glass punctures his right eye. Three separate arteries are pierced, and Norfleet begins bleeding heavily. Two supply sergeants in the office are far less injured; Norfleet asks one, “How bad am I hurt?” and one replies, “Sir, you look really bad.” One of the two begins giving Norfleet first aid; Norfleet later recalls: “He immediately went into combat mode and started taking care of me. He laid me on a table and he started looking for bandages to administer first aid. And while I was laying on that table, I just knew that I was losing strength and that if I stayed in the building, I would die.” Norfleet wraps a shirt around his head and face to slow the bleeding, and the two sergeants help him to the stairs, through the fallen rubble, and eventually out. Norfleet will later say that he follows “a blood trail of somebody that had gone down the steps before me” to get outside, where he is quickly put into an ambulance. He loses almost half his body’s blood supply and his right eye. He will never fly again, and will soon be discharged for medical incapacity. [Serrano, 1998, pp. 161-162] Eighteen-month-old Phillip Allen, called “P.J.” by his parents, miraculously survives the blast. The floor gives way beneath him and he plunges 18 feet to land on the stomach of an adult worker on the floor below, Calvin Johnson. Landing on Johnson’s stomach saves P.J.‘s life. Johnson is knocked unconscious by the blast and by the impact of the little boy falling on him, but when he awakes, he carries the toddler to safety. P.J.‘s grandfather calls the child “Oklahoma’s miracle kid,” and media reports use the label when retelling the story of the miraculous rescue. P.J. is one of six children in the day care center to survive the blast. [Stickney, 1996, pp. 275-277] Some people later report their belief that the Murrah Building was rocked by a second explosion just moments after the first one, the second coming from a secure area managed by the Bureau of Alcohol, Tobacco and Firearms (BATF) that illegally stored explosives. Law professor Douglas O. Linder will later write, “Both seismic evidence and witness testimony supports the ‘two blast theory.’” [Douglas O. Linder, 2006] That theory is later disputed (see After 9:02 a.m. April 19, 1995).
Explosion's Effects Felt Miles Away - Buildings near the Murrah are also damaged, seven severely, including the Journal Record newspaper building, the offices of Southwestern Bell, the Water Resources Board, an Athenian restaurant, the YMCA, a post office building, and the Regency Tower Hotel. Two Water Resources Board employees and a restaurant worker are killed in the blast. The Journal Record building loses its roof. Assistant Fire Chief Jon Hansen later recalls, “The entire block looked like something out of war-torn Bosnia.” Every building within four blocks of the Murrah suffers some effects. A United Parcel Service truck 10 miles away has its windows shattered by the blast. Cars in parking lots around the area catch fire and burn. Millions of sheets of paper, and an innumerable number of glass shards, shower down for hundreds of feet around the building. [Stickney, 1996, pp. 28-30]
Truck Axle Crushes Nearby Car - Richard Nichols (no relation to bomber Timothy McVeigh’s co-conspirator Terry Nichols), a maintenance worker standing with his wife a block and a half away from the Murrah Building, is spun around by the force of the blast. They throw open the back door of their car and begin taking their young nephew Chad Nichols out of the back seat, when Richard sees a large shaft of metal hurtling towards them. The “humongous object… spinning like a boomerang,” as Richard later describes it, hits the front of their Ford Festiva, smashing the windshield, crushing the front end, driving the rear end high into the air, and sending the entire car spinning backwards about 10 feet. Chad is not seriously injured. The metal shaft is the rear axle of the Ryder truck. Later, investigators determine that it weighs 250 pounds and was blown 575 feet from where the truck was parked. Governor Frank Keating (R-OK) points out the axle to reporters when he walks the scene a day or so later, causing some media outlets to incorrectly report that Keating “discovered” the axle. The scene will take investigators days to process for evidence. [Stickney, 1996, pp. 32; New York Times, 6/3/1997; Serrano, 1998, pp. 187-189]
First Responders Begin Arriving - Within minutes, survivors begin evacuating the building, and first responders appear on the scene (see 9:02 a.m. - 10:35 a.m. April 19, 1995).
McVeigh's Getaway - McVeigh flees the bomb site in his Mercury getaway car (see 9:02 a.m. and After, April 19, 1995), but is captured less than 90 minutes later (see 9:03 a.m. -- 10:17 a.m. April 19, 1995).

Mohammed Haydar Zammar.Mohammed Haydar Zammar. [Source: Knut Mueller]Turkish intelligence informs Germany’s domestic intelligence service that Mohammed Haydar Zammar is a radical militant who has been traveling to trouble spots around the world. Zammar has already made more than 40 journeys to places like Bosnia and Chechnya, and in 1996 he pledges his allegiance to al-Qaeda during a trip to Afghanistan (see 1991-1996). Turkey explains that Zammar is running a dubious travel agency in Hamburg, organizing flights for radical militants to Afghanistan. As a result, by early 1997, German intelligence will launch Operation Zartheit (Operation Tenderness), an investigation of Islamic militants in the Hamburg area. The Germans will use a full range of intelligence techniques, including wiretaps and informants. [Stern, 8/13/2003; Vanity Fair, 11/2004] Operation Zartheit will run for at least three years and connect Zammar to many of the 9/11 plotters (see March 1997-Early 2000).

Entity Tags: Mohammed Haydar Zammar, Bundesamt fur Verfassungsschutz

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Law professor John Yoo writes a lengthy essay for the California Law Review entitled “The Continuation of Politics by Other Means: The Original Understanding of War Powers,” in which he argues that the Founding Fathers intended to empower presidents to launch wars without Congressional permission. Yoo has clerked for conservative judge Laurence Silberman and equally conservative Supreme Court Justice Clarence Thomas, and served for a year as counsel to then-Senate Judiciary Committee Chairman Orrin Hatch (R-UT). He has become a regular speaker at Federalist Society events, the informal but influential group of conservative lawyers, judges, and legal scholars who will come to have so much influence in the Bush administration. You argues that for generations, Constitutional scholars have misread the Constitution: the Founders actually supported, not repudiated, the British model of executive power that gave the king the sole power of declaring war and committing forces to battle. The Constitution’s granting of the legislature—Congress—the power to “declare war” is merely, Yoo writes, a reference to the ceremonial role of deciding whether to proclaim the existence of a conflict as a diplomatic detail. The Founders always intended the executive branch to actually declare and commence war, he writes. Most other Constitutional scholars will dismiss Yoo’s arguments, citing notes from the Constitutional Convention that show the Founders clearly intended Congress, not the president, to decide whether to commit the country to war. One of those Founders, James Madison, wrote in 1795 that giving a president the unilateral ability to declare war “would have struck, not only at the fabric of the Constitution, but at the foundation of all well organized and well checked governments. The separation of the power of declaring war from that of conducting it, is wisely contrived to exclude the danger of its being declared for the sake of its being conducted.” [Savage, 2007, pp. 80-81] Yoo will go on to join the Bush administration’s Office of Legal Counsel, and write numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002).

Entity Tags: Federalist Society, John C. Yoo

Timeline Tags: Civil Liberties

In 1996, al-Qaeda assumes control of Ariana Airlines, Afghanistan’s national airline, for use in its illegal trade network. Passenger flights become few and erratic, as planes are used to fly drugs, weapons, gold, and personnel, primarily between Afghanistan, the United Arab Emirates (UAE), and Pakistan. The Emirate of Sharjah, in the UAE, becomes a hub for al-Qaeda drug and arms smuggling. Typically, “large quantities of drugs” are flown from Kandahar, Afghanistan, to Sharjah, and large quantities of weapons are flown back to Afghanistan. [Los Angeles Times, 11/18/2001] About three to four flights run the route each day. Many weapons come from Victor Bout, a notorious Russian arms dealer based in Sharjah. [Los Angeles Times, 1/20/2002] Afghan taxes on opium production are paid in gold, and then the gold bullion is flown to Dubai, UAE, and laundered into cash. [Washington Post, 2/17/2002] Taliban officials regularly provide militants with false papers identifying them as Ariana Airlines employees so they can move freely around the world. For instance, one flight on a Ariana small plane in 2000 lists 33 crew members. A former National Security Council official later claims the US is well aware at the time that al-Qaeda agents regularly fly on Ariana Airlines. (However, US intelligence will not learn of the widespread use of forged Ariana IDs until after 9/11.) The CIA learns of Bout’s connection to Ariana and the Taliban in 1998, but takes no action (see 1998). The US presses the UAE for tighter banking controls, but moves “delicately, not wanting to offend an ally in an already complicated relationship,” and little changes by 9/11. [Los Angeles Times, 11/18/2001; Farah and Braun, 2007, pp. 139] Much of the money for the 9/11 hijackers flows though these Sharjah, UAE, channels. There also are reports suggesting that Ariana Airlines might have been used to train Islamic militants as pilots. The illegal use of Ariana Airlines helps convince the United Nations to impose sanctions against Afghanistan in 1999, but the sanctions lack teeth and do not stop the airline. A second round of sanctions finally stops foreign Ariana Airlines flights, but its charter flights and other charter services keep the illegal network running. [Los Angeles Times, 11/18/2001] About nine of the 9/11 hijackers work at the Kandahar airport in 2000, which is Ariana’s main hub (see Summer 2000).

Entity Tags: Taliban, United Arab Emirates, United Nations, Al-Qaeda, Ariana Airlines, Victor Bout

Timeline Tags: Complete 911 Timeline

The French intelligence service Direction Générale de la Sécurité Extérieure (DGSE) is aware that radical Muslims appear to be traveling through Turkey on their way to training in a third country, presumably Afghanistan. DGSE informer Omar Nasiri will later comment: “[T]he DGSE had noticed a lot of men were disappearing from France, men who were under surveillance. They would attend the radical mosques every day and then, suddenly, they were gone. They went to Turkey and disappeared. A few months later they would be back at the mosques in France, but no one knew where they had been in the meantime. The DGSE thought they were at the training camps.” [Nasiri, 2006, pp. 96] Turkish intelligence is also aware militants transit Turkey at this time and informs German intelligence (see 1996). Several of the 9/11 hijackers will also transit Turkey (see Late November-Early December 1999).

Entity Tags: Direction Générale de la Sécurité Extérieure, Omar Nasiri

Timeline Tags: Complete 911 Timeline

Ramzi Yousef and two other defendants, Abdul Hakim Murad and Wali Khan Amin Shah, are convicted of crimes relating to Operation Bojinka (see January 6, 1995). [CNN, 9/5/1996] In the nearly 6,000-page transcript of the three-month Bojinka trial, there is not a single mention of the “second wave” of Bojinka that closely paralleled the 9/11 plot. Interrogations by Philippine investigator Colonel Rodolfo Mendoza had exposed the details of this plot quite clearly (see January 20, 1995 and February-Early May 1995). However, not only does the FBI not call Mendoza to testify, but his name is not even mentioned in the trial, not even by his assistant, who does testify. “The FBI seemed to be going out of its way to avoid even a hint of the plot that was ultimately carried out on 9/11,” author Peter Lance will later note. [Lance, 2003, pp. 350-51] Murad was extensively tortured during his imprisonment in the Philippines (see After January 6, 1995), and some observers such as law professor Alan Dershowitz will assert that Murad’s case proves the reliability of torture, claiming that Murad’s torture prevented a major disaster. However, others disagree. Law professor Stephanie Athey, in her examination of the case, will write in 2007 that Murad’s torture actually produced little useful information. A computer found in Murad’s apartment held key details of the plot (see January 7-11, 1995 and Spring 1995). CIA agent Michael Scheuer will later say that the information collected from Murad’s apartment, not the information gleaned from Murad’s torture, provided actual useful intelligence. [Vanity Fair, 12/16/2008]

Entity Tags: Rodolfo Mendoza, Ramzi Yousef, Abdul Hakim Murad, Alan M. Dershowitz, Federal Bureau of Investigation, Michael Scheuer, Operation Bojinka, Stephanie Athey, Wali Khan Amin Shah

Timeline Tags: Complete 911 Timeline

Senior al-Qaeda operatives establish a front company called Maram in Istanbul, Turkey, as a travel agency and import-export business. Investigators will later say they suspect that the company may be involved in efforts to obtain material for nuclear weapons and that it provides money and other assistance to radicals traveling between Europe and training camps in Afghanistan. Turkish intelligence and several foreign agencies are aware that militants transit Turkey at this time and some of them are under surveillance (see 1996, 1995-2000, and Mid-1996), but it is unclear whether Maram itself is monitored. The company, which receives a donation of US$ 1.25 million from Saudi businessman Yassin al-Qadi (see January-August 1998), is established by Mamdouh Mahmud Salim, one of al-Qaeda’s founding members (see August 11-20, 1988), who is said to have a history of moving money and shopping for weapons for the organization. A few months later he transfers shares in the company to two other men. One is Wael Hamza Julaidan, a Saudi businessman also said to be a founder of al-Qaeda; the US will officially designate Julaidan a financial supporter of al-Qaeda in 2002 (see September 6, 2002). The other transferee is Mohammed Bayazid, another founder of al-Qaeda and a US citizen who was arrested in the US in 1994 and then let go (see December 16, 1994). [New York Times, 9/19/2002] For a time before November 1998, toll records for the Illinois office of the Benevolence International Foundation (BIF) show telephone contact with a number in Turkey associated with Bayazid. Phone records indicate Bayazid moves to Turkey around April 1998. [USA v. Benevolence International Foundation and Enaam M. Arnaout, 4/29/2002, pp. 16-17 pdf file] US intelligence has been interested in BIF’s ties to al-Qaeda since at least 1993 (see 1993 and 1998), but apparently misses its links to Maram while the company is still open. After Salim is arrested in Germany in 1998 (see September 16, 1998), the company clears out its offices. A neighbor says, “I just came one morning and saw the office was empty. Nobody knows what happen[ed].” [New York Times, 9/19/2002]

Entity Tags: Mohammed Loay Bayazid, Wael Hamza Julaidan, Maram, Al-Qaeda, Mamdouh Mahmud Salim

Timeline Tags: Complete 911 Timeline

US intelligence begins monitoring telephones connected to the Kenyan branch of the charity Mercy International. By mid-1996, US intelligence began wiretapping telephones belonging to Wadih El-Hage, an al-Qaeda operative living in Nairobi, Kenya, and the NSA is also monitoring bin Laden’s satellite phone. By the end of 1996, the number of monitored phones in Kenya increases to five, and two of those are to Mercy International’s offices. What led investigators to this charity is unknown, and details of the calls have never been revealed. [New York Times, 1/13/2001] The Mercy International office will be raided shortly after the 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998), and incriminating files belonging to El-Hage will be found there (see October 1997). It will be discovered that the office worked closely with al-Qaeda. For instance, it issued identity cards for al-Qaeda leaders Ali Mohamed, Mohammed Atef, and even bin Laden himself. [Bergen, 2001, pp. 140; Financial Times, 11/28/2001] An al-Qaeda defector, L’Houssaine Kherchtou, will testify in a 2001 trial that al-Qaeda was heavily interacting with Mercy International’s Kenya branch, and a number of employees there, including the manager and accountant, were actually al-Qaeda operatives. [United State of America v. Usama bin Laden, et al., Day 8, 2/21/2001] A receipt dated just two weeks before the embassy bombings made a reference to “getting the weapons from Somalia.” [New York Times, 1/22/2000] Most crucially, there were a number of calls between Mercy director Ahmad Sheik Adam and bin Laden. [East African, 2/16/2000] And Adam’s mobile phone was used 12 times by El-Hage to speak to bin Laden or his associates. Presumably, such calls would have drawn obvious attention to the Kenya al-Qaeda cell and their embassy attack plans, yet none of the cell members were arrested until after the attack. The Kenya branch of Mercy International will be shut down by the end of 1998, but in 2001 it will be reported that Adam continues to live in Kenya and has not been arrested. [Agence France-Presse, 12/17/1998; BBC, 1/3/2001]

Entity Tags: US intelligence, Wadih El-Hage, Osama bin Laden, Ahmad Sheik Adam, Mercy International, National Security Agency, L’Houssaine Kherchtou

Timeline Tags: Complete 911 Timeline

Starting in 1997, the FBI constructs a sophisticated surveillance system that can perform near-instantaneous wiretaps on almost any telephone, cell phone, and Internet communications device, according to documents declassified in August 2007. The system is called the Digital Collection System Network, or DCSNet. It connects FBI wiretapping rooms to switches controlled by land-line operators, Internet-telephony companies, and cellular providers. The documents show that DCSNet is, in reporter Ryan Singel’s words, “far more intricately woven into the nation’s telecom infrastructure than observers suspected.” Steven Bellovin, a computer science professor and surveillance expert, calls DCSNet a “comprehensive wiretap system that intercepts wire-line phones, cellular phones, SMS [short message service, a protocol allowing mobile devices to exchange text messages], and push-to-talk systems.” The system is an entire suite of software that together collects, sifts, and stores phone numbers, phone calls, and text messages. The system directly connects FBI wiretapping offices around the country to a sprawling private communications network. DCSNet is composed of three main clients:
bullet The DCS-3000, also called “Red Hook,” handles pen-registers and trap-and-traces, a type of surveillance that collects signaling information but not communications content.
bullet The DCS-6000, or “Digital Storm,” captures and collects the content—the spoken or written communications—of phone calls and text messages.
bullet The most classified system of the three, the DCS-5000, is used for wiretaps targeting spies or terrorists.
Between the three, the system can allow FBI agents to monitor recorded phone calls and messages in real time, create master wiretap files, send digital recordings to translators, track the location of targets in real time using cell-tower information, and stream intercepts to mobile surveillance vans. The entire system is operated through a private, secure and self-contained backbone that is run for the government by Sprint. Singel gives the following example: “The network allows an FBI agent in New York, for example, to remotely set up a wiretap on a cell phone based in Sacramento, California, and immediately learn the phone’s location, then begin receiving conversations, text messages and voicemail pass codes in New York. With a few keystrokes, the agent can route the recordings to language specialists for translation.” Dialed numbers are subjected to data mining, including so-called “link analysis.” The precise number of US phones being monitored and recorded in this way is classified.
Genesis of DCSNet - The system was made possible by the 1994 Communications Assistance for Law Enforcement Act (CALEA) (see January 1, 1995), which mandated that telecom providers must build “backdoors” in US telephone switches to be used by government wiretappers. CALEA also ordered telecom firms to install only switching equipment that met detailed wiretapping standards. Before CALEA, the FBI would bring a wiretap warrant to a particular telecom, and that firm would itself create a tap. Now, the FBI logs in directly to the telecom networks and monitors a surveillance target itself through DCSNet. FBI special agent Anthony DiClemente, chief of the Data Acquisition and Intercept Section of the FBI’s Operational Technology Division, says the DCS was originally intended in 1997 to be a temporary solution, but has grown into a full-featured CALEA-collection software suite. “CALEA revolutionizes how law enforcement gets intercept information,” he says. “Before CALEA, it was a rudimentary system that mimicked Ma Bell.” Now, under CALEA, phone systems and Internet service providers have been forced to allow DCSNet to access almost all of its data (see 1997-August 2007 and After).
Security Breaches - The system is vulnerable to hacking and security breaches (see 2003). [Wired News, 8/29/2007]

Entity Tags: Steven Bellovin, Ryan Singel, Federal Bureau of Investigation, Anthony DiClemente, Operational Technology Division (FBI), Communications Assistance for Law Enforcement Act (CALEA), Digital Collection System, Data Acquisition and Intercept Section (FBI), Sprint/Nextel

Timeline Tags: Civil Liberties

Apparently, this is news video of Mohammed Haydar Zammar taken shortly after 9/11.Apparently, this is news video of Mohammed Haydar Zammar taken shortly after 9/11. [Source: UE-TV]An investigation of al-Qaeda contacts in Hamburg by the Office for the Protection of the Constitution (BfV), Germany’s domestic intelligence service, begins at least by this time (Germany refuses to disclose additional details). The investigation is called Operation Zartheit (Operation Tenderness), and it was started by a tip about Mohammed Haydar Zammar from Turkish intelligence (see 1996). [New York Times, 1/18/2003]
Zammar Linked to Hamburg 9/11 Cell and Bin Laden - It is later believed that Zammar, a German of Syrian origin, is a part of the Hamburg al-Qaeda cell. [Los Angeles Times, 1/14/2003] Zammar will later claim that he recruited 9/11 hijacker Mohamed Atta and others into the cell. [Washington Post, 6/12/2002] German intelligence is aware that he was personally invited to Afghanistan by bin Laden. [Frankfurter Allgemeine Zeitung (Frankfurt), 2/2/2003] The investigation into Zammar allegedly stops in early 2000, after investigators conclude they don’t have enough evidence to convict him of any crime. [Der Spiegel (Hamburg), 11/21/2005]
CIA Involved with Zammar Operation - Vanity Fair will later claim that “A lone CIA agent, the Germans disclose, attempted to work alongside them” in Operation Zartheit, but German “requests for greater information and cooperation from the CIA, they claim, came to naught.” [Vanity Fair, 11/2004] This CIA agent is probably Thomas Volz, who is the CIA’s undercover agent in Hamburg at the time (see December 1999).

Entity Tags: Mohammed Haydar Zammar, Thomas Volz, Mohamed Atta, Central Intelligence Agency, Al-Qaeda, Ansaldo Energia, Osama bin Laden, Barakat Yarkas

Timeline Tags: Complete 911 Timeline

Some time after he is appointed CIA Director (see July 11, 1997), but before 9/11, George Tenet negotiates a series of agreements with telecommunications and financial institutions “to get access to certain telephone, Internet, and financial records related to ‘black’ intelligence operations.” The arrangements are made personally by the companies’ CEOs and Tenet, who plays “the patriot card” to get the information. The arrangement involves the CIA’s National Resources Division, which has at least a dozen offices in the US. The Division’s main aim is to recruit people in the US to spy abroad. However, in this case the Division makes arrangements so that other intelligence agencies, such as the NSA, can access the information and records the CEOs agree to provide. [Woodward, 2006, pp. 323-5] There is a history of co-operation between the CIA’s National Resources Division and the NSA. For example, Monte Overacre, a CIA officer assigned to the Division’s San Diego office in the early 1990s, said that he worked with the NSA there, obtaining information about foreign telecommunications programs and passing it on to the Technology Management Office, a joint venture between the two agencies. [Mother Jones, 1/1998] One US official will say that the arrangements only give the CIA access to the companies’ passive databanks. However, reporter Bob Woodward will say that the programme raises “serious civil liberties questions and also demonstrate[d] that the laws had not kept pace with the technology.” [Woodward, 2006, pp. 324-5] There will be an interagency argument about the program after 9/11 (see (2003 and After)).

Entity Tags: Monte Overacre, National Security Agency, Central Intelligence Agency, CIA Technology Management Office, Bob Woodward, George J. Tenet, CIA National Resources Division

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Al Haramain Islamic Foundation’s main office in Riyadh, Saudi Arabia.Al Haramain Islamic Foundation’s main office in Riyadh, Saudi Arabia. [Source: Bilal Qabalan / Agence France-Presse / Getty Images]Wadih El-Hage has been bin Laden’s personal secretary since the early 1990s. When US agents raid his house in Nairobi, Kenya, they seize his address book (see August 21, 1997), which contains the names and phone numbers for many other al-Qaeda operatives. [CNN, 5/25/2001] The names discovered in the book include:
bullet Ali Mohamed, the al-Qaeda double agent living in California. US investigators are already tapping his California phone and have been tapping calls between him and El-Hage since at least 1996 (see April 1996).
bullet Mamoun Darkazanli. He is a Syrian-born businessman living in Hamburg, Germany, who has contacts with Mohamed Atta’s al-Qaeda cell in the same city. Darkazanli’s name and phone number are listed, and El-Hage even has a business card listing El-Hage’s address in Texas and Darkazanli’s address in Hamburg (see Late 1998).
bullet Ghassan Dahduli. He works at two US non-profit organizations, the Islamic Association for Palestine and InfoCom. Both organizations will be shut down for supporting terrorist networks (see September 16, 1998-September 5, 2001).
bullet Salah al-Rajhi (see Shortly After August 21, 1997). He and his brother of Sulaiman Abdul Aziz al-Rajhi, are billionaires and jointly own the Al-Rajhi Banking & Investment Corp. Sulaiman started a network of organizations in Herndon, Virginia known as the SAAR network (named for the four initials in his name). This network will be raided by US officials in 2002 for suspected terrorist funding ties (see March 20, 2002). [Newsweek, 12/9/2002]
bullet Ihab Ali Nawawi, an al-Qaeda operative living in Florida. He is referred to as “Ihab Ali” and his location in Tampa, Florida, is mentioned. He will not be arrested until May 1999 (see May 18, 1999). [United States of America v. Usama Bin Laden, et al., Day 39, 5/3/2001]
bullet Essam Marzouk. He is linked to both al-Qaeda and Islamic Jihad and is living in Vancouver, Canada at the time. He will later train the 1998 embassy bombers. It is unclear if the link to Marzouk is shared with Canadian intelligence (see Shortly After August 21, 1997). [National Post, 3/19/2002]
bullet Essam al Ridi. He is a US citizen and a pilot who helped bin Laden buy an airplane in the US in the early 1990s (see Early 1993). He appears to have no militant ties after that. In late 1999, US prosecutors will contact al Ridi where he is living in Bahrain and convince him to testify against El-Hage and others involved in the 1998 embassy bombings (see 10:35-10:39 a.m., August 7, 1998). [CNN, 7/2/2002]
bullet Farid Adlouni. He is a civil engineer living in Lake Oswego, Oregon. In 1996 and 1997, El-Hage calls Adlouni in Oregon 72 times, sometimes just before or after meeting with bin Laden. Adlouni’s home phone and fax numbers are be found in two personal phone directories and one notebook kept by El-Hage (see Shortly After August 21, 1997). Earlier in 1997, El-Hage also sent him a fax written by al-Qaeda leader Mohammed Atef (see Febuary 25, 1997). Records show that El-Hage has extensive dealings with Adlouni, mostly by selling gems El-Hage bought in Africa for a better price in the US. The FBI interviews Adlouni twice in late 1997, but he is not arrested. As of 2002, it will be reported that he continues to live in Oregon and remains a “person of interest” and subject of investigation by the FBI. [Oregonian, 9/13/2002]
bullet Khalid al-Fawwaz. He is al-Qaeda’s de facto press secretary in London. El-Hage gives al-Fawwaz’s correct name, London phone number, and street address, but lists him as living in Texas. Presumably this is a slight attempt at subterfuge. [United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001]
bullet A business card in the name Mamdouh M. Salim is found. This is a reference to Mamdouh Mahmud Salim, a known al-Qaeda leader. [United States of America v. Usama Bin Laden, et al., Day 37, 5/1/2001]
bullet A business card belonging to Mansour al-Kadi is found. [New Yorker, 4/21/2008] Al-Kadi is the Deputy General of the Al Haramain Islamic Foundation, a suspect Saudi charity closely linked to the Saudi government. Al-Kadi will be fired in early 2004 and the entire foundation will be shut down several months later (see March 2002-September 2004). The Treasury Department will later say that Al Haramain has a role in the 1998 African embassy bombings (see Autumn 1997). [US Treasury Department, 9/9/2004]
bullet Several business cards relating to the International Islamic Relief Organization (IIRO). A 1996 CIA report connected the IIRO to terrorist funding, but the IIRO will not be prosecuted due to its close ties to the Saudi government (see January 1996 and October 12, 2001). [Newsweek, 12/9/2002]
bullet According to author Douglas Farah, the address book is “full of the names of diamond dealers and jewelers, often including the purchaser’s home phone number.” This suggests al-Qaeda could be profiting from the diamond trade in Africa. [Farah, 2004, pp. 64-65]
But Farah also will note in 2004 that many of the leads from El-Hage’s address book and other documents discovered around the same time are not fully explored. In fact, he says that “Most of El-Hage’s notebooks, written in Arabic, have still not been translated into English.” [Farah, 2004, pp. 64-65]

Entity Tags: Ihab Ali Nawawi, International Islamic Relief Organization, Mamdouh Mahmud Salim, Khalid al-Fawwaz, Mamoun Darkazanli, Ghassan Dahduli, Farid Adlouni, Ali Mohamed, Essam Marzouk, Essam al Ridi, Wadih El-Hage, Salah al-Rajhi, Mansour al-Kadi, Al Haramain Islamic Foundation

Timeline Tags: Complete 911 Timeline

Tourists in Luxor, Egypt, cower as militants begin firing on them.Tourists in Luxor, Egypt, cower as militants begin firing on them. [Source: BBC]Fifty-eight foreign tourists are killed in Luxor, Egypt. Six radical militants attack an ancient Egyptian temple with machine guns before finally being killed by Egyptian police. The attack is the peak of a campaign to destroy the Egyptian tourism industry that had begun five years before. Thirty-four foreigners and 1,200 Egyptians were killed in the previous attacks. Al-Gama’a al-Islamiyya (the Islamic Group) takes credit for the attack. This group was founded in the late 1970s by Sheik Omar Abdul-Rahman. The militants are ultimately hoping to destabilize the Egyptian economy and overthrow the government. However, the attacks backfire, alienating many Egyptians. This will be the last serious militant attack in Egypt before 9/11. [New York Times, 11/18/1997; New York Times, 11/18/1997; Los Angeles Times, 10/26/2001] The Egyptian militant group Islamic Jihad is also thought to be involved. In 1999, Ayman al-Zawahiri, leader of Islamic Jihad and al-Qaeda’s second in command, will be convicted in absentia for his role in this attack and other attacks. [BBC, 9/27/2004] Also in 1999, the Egyptian government will claim it has determined that bin Laden helped finance the attack. [BBC, 5/13/1999]

Entity Tags: Al-Gama’a al-Islamiyya, Ayman al-Zawahiri, Islamic Jihad

Timeline Tags: Complete 911 Timeline

Dietrich Snell.Dietrich Snell. [Source: Morris Mac Matzen/ Associated Press]Abdul Hakim Murad, a conspirator in the 1995 Bojinka plot with Ramzi Yousef, Khalid Shaikh Mohammed (KSM), and others, was convicted in 1996 of his role in the Bojinka plot (see January 6, 1995). He is about to be sentenced for that crime. He offers to cooperate with federal prosecutors in return for a reduction in his sentence, but prosecutors turn down his offer. Dietrich Snell, the prosecutor who convicted Murad, will say after 9/11 that he does not remember any such offer. But court papers and others familiar with the case later confirm that Murad does offer to cooperate at this time. Snell will claim he only remembers hearing that Murad had described an intention to hijack a plane and fly it into CIA headquarters. However, in 1995 Murad had confessed to Philippine investigators that this would have been only one part of a larger plot to crash a number of airplanes into prominent US buildings, including the World Trade Center and the Pentagon, a plot that KSM later will adjust and turn into the 9/11 plot (see January 20, 1995) (see February-Early May 1995). While Philippine investigators claim this information was passed on to US intelligence, it’s not clear just which US officials may have learned this information and what they did with it, if anything. [New York Daily News, 9/25/2001] Murad is sentenced in May 1998 and given life in prison plus 60 years. [Albany Times-Union, 9/22/2002] After 9/11, Snell will go on to become Senior Counsel and a team leader for the 9/11 Commission. Author Peter Lance later calls Snell “one of the fixers, hired early on to sanitize the Commission’s final report.” Lance says Snell ignored evidence presented to the Commission that shows direct ties between the Bojinka plot and 9/11, and in so doing covers up Snell’s own role in the failure to make more use of evidence learned from Murad and other Bojinka plotters. [FrontPage Magazine, 1/27/2005]

Entity Tags: Ramzi Yousef, World Trade Center, Dietrich Snell, Khalid Shaikh Mohammed, 9/11 Congressional Inquiry, Abdul Hakim Murad, Operation Bojinka, Pentagon

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A photocopy of Fazul Abdullah Mohammed’s Comoros passport in Sudan’s intelligence files.A photocopy of Fazul Abdullah Mohammed’s Comoros passport in Sudan’s intelligence files. [Source: Richard Miniter]Gutbi al-Mahdi, head of Sudan’s intelligence agency, sends a letter to David Williams, an FBI station chief. It reads, “I would like to express my sincere desire to start contacts and cooperation between our service and the FBI. I would like to take this opportunity with pleasure to invite you to visit our country. Otherwise, we could meet somewhere else.” Apparently the FBI is very eager to accept the offer and gain access to Sudan’s files on bin Laden and his associates. The US had been offered the files before (see March 8, 1996-April 1996; April 5, 1997), but the US position was that Sudan’s offers were not serious since Sudanese leader Hassan al-Turabi was ideologically close to bin Laden. But al-Turabi has lost power to moderates by this time, and in fact he is placed under arrest in 1998. There is a political battle between US agencies over the Sudanese offer, and in the end the State Department forbids any contact with al-Mahdi. On June 24, 1998, Williams is obliged to reply, “I am not currently in a position to accept your kind invitation.” Al-Madhi later will complain, “If they had taken up my offer in February 1998, they could have prevented the [US embassy] bombings.” Tim Carney, US ambassador to Sudan until 1997, will say, “The US failed to reciprocate Sudan’s willingness to engage us on serious questions of terrorism. We can speculate that this failure had serious implications - at the least for what happened at the US Embassies in 1998. In any case, the US lost access to a mine of material on bin Laden and his organization.” One of the plotters in the bombings is Fazul Abdullah Mohammed (a.k.a. Haroun Fazul), who is living in Sudan but making trips to Kenya to participate in the bombing preparations. Sudan has files on him and continues to monitor him. Sudan also has files on Saif al-Adel, another embassy bomber who has yet to be captured. Sudan also has files on Wadih El-Hage and Mamdouh Mahmoud Salim, both of whom have contact with members of the Hamburg al-Qaeda cell (see September 16, 1998; Late 1998; 1993). Salim even attends the same small Hamburg mosque as 9/11 hijackers Mohamed Atta and Marwan Alshehhi. Vanity Fair magazine will suggest that if al-Madhi’s offer had been properly followed up, both the embassy bombings and the 9/11 attacks could have been foiled. [Vanity Fair, 1/2002] It is later revealed that the US was wiretapping bin Laden in Sudan on their own (see Early 1990s).

Entity Tags: Wadih El-Hage, Saif al-Adel, Tim Carney, US Department of State, Gutbi Al-Mahdi, Fazul Abdullah Mohammed, David Williams, Al-Qaeda, Federal Bureau of Investigation, Sudan, Osama bin Laden, Hassan al-Turabi, Mamdouh Mahmud Salim

Timeline Tags: Complete 911 Timeline

Osama Basnan, a Saudi living in California, claims to write a letter to Saudi Arabian Prince Bandar bin Sultan and his wife, Princess Haifa bint Faisal, asking for financial help because his wife needs thyroid surgery. The Saudi embassy sends Basnan $15,000 and pays the surgical bill. However, according to University of California at San Diego hospital records, Basnan’s wife, Majeda Dweikat, is not treated until April 2000. [Los Angeles Times, 11/24/2002] Basnan will later come under investigation for possibly using some of this money to support two of the 9/11 hijackers who arrive in San Diego (see November 22, 2002), although the 9/11 Commission will conclude that evidence does not support these charges. [9/11 Commission, 6/16/2004]

Entity Tags: Osama bin Laden, Saudi Arabia, Osama Basnan, Haifa bint Faisal, Majeda Dweikat, Federal Bureau of Investigation, Bandar bin Sultan, 9/11 Commission, Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Top: Bin Laden, surrounded by security, walking to the press conference. Bottom: the three journalists attending the press conference sit next to bin Laden.Top: Bin Laden, surrounded by security, walking to the press conference. Bottom: the three journalists attending the press conference sit next to bin Laden. [Source: CNN]Bin Laden discusses “bringing the war home to America,” in a press conference from Khost, Afghanistan. [US Congress, 9/18/2002] Bin Laden holds his first and only press conference to help publicize the fatwa he published several months before. Referring to the group that signed the fatwa, he says, “By God’s grace, we have formed with many other Islamic groups and organizations in the Islamic world a front called the International Islamic Front to do jihad against the crusaders and Jews.” He adds later, “And by God’s grace, the men… are going to have a successful result in killing Americans and getting rid of them.” [CNN, 8/20/2002] He also indicates the results of his jihad will be “visible” within weeks. [US Congress, 7/24/2003] Two US embassies will be bombed in August (see 10:35-10:39 a.m., August 7, 1998). Bin Laden sits next to Ayman al-Zawahiri and Mohammed Atef during the press conference. Two Pakistani journalists and one Chinese journalist attends. But event never gets wide exposure because no independent videotaping is allowed (however, in 2002 CNN will obtain video footage of the press conference seized after the US conquered Afghanistan in late 2001). Pakistani journalist Ismail Khan attends and will later recall, “We were given a few instructions, you know, on how to photograph and only take a picture of Osama and the two leaders who were going to sit close by him. Nobody else.” Two sons of Sheikh Omar Abdul-Rahman attend and distribute what they claim is the will or fatwa of their father (see May 1998), who has been sentenced to life in prison in the US. Journalist Peter Bergen will later comment that the significance of the sons’ presence at the press conference “can’t be underestimated” because it allows bin Laden to benefit from Abdul-Rahman’s high reputation amongst radical militants. Bergen also later says the press conference is a pivotal moment for al-Qaeda. “They’re going public. They’re saying, ‘We’re having this war against the United States.’” [CNN, 8/20/2002] The specific comment by bin Laden about “bringing the war home to America” will be mentioned in the August 2001 memo given to President Bush entitled “Bin Laden Determined to Strike in US” (see August 6, 2001).

Entity Tags: Osama bin Laden, Ismail Khan, Ayman al-Zawahiri, Ahmad Abdul-Rahman, Mohammed Atef, Mohammed Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

During his interview with John Miller, bin Laden is positioned in front of East Africa on a map, and US embassies will be bombed in East Africa several months later. Bin Laden has considered it his religious duty to give warning before attacks and thus has left clues like this.During his interview with John Miller, bin Laden is positioned in front of East Africa on a map, and US embassies will be bombed in East Africa several months later. Bin Laden has considered it his religious duty to give warning before attacks and thus has left clues like this. [Source: CNN]In an interview with ABC News reporter John Miller, Osama bin Laden indicates he may attack a US military passenger aircraft using antiaircraft missiles. Bin Laden says: “We are sure of our victory. Our battle with the Americans is larger than our battle with the Russians.… We predict a black day for America and the end of the United States as United States, and will be separate states, and will retreat from our land and collect the bodies of its sons back to America.” In the subsequent media coverage, Miller will repeatedly refer to bin Laden as “the world’s most dangerous terrorist,” and “the most dangerous man in the world.” [ABC News, 5/28/1998; ABC News, 6/12/1998; Esquire, 2/1999; US Congress, 7/24/2003] The book The Looming Tower by Lawrence Wright will later note, “Looming behind his head was a large map of Africa, an unremarked clue.” [Wright, 2006, pp. 264] Bin Laden admits to knowing Wali Khan Amin Shah, one of the Bojinka plotters (see June 1996), but denies having met Bojinka plotter Ramzi Yousef or knowing about the plot itself. [PBS Frontline, 10/3/2002] A Virginia man named Tarik Hamdi (see March 20, 2002) helped set up Miller’s interview. He goes with Miller to Afghanistan and gives bin Laden a new battery for his satellite phone (see November 1996-Late August 1998). Vincent Cannistraro, former head of the CIA’s Counterterrorist Center, will later claim that this battery was somehow bugged to help the US monitor bin Laden. [Newsweek, 8/10/2005] In 2005, Miller will become the FBI’s assistant director of the Office of Public Affairs. [All Headline News, 8/24/2005]

Entity Tags: John Miller, Operation Bojinka, Osama bin Laden, Vincent Cannistraro, Wali Khan Amin Shah, Tarik Hamdi, Ramzi Yousef

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

An unknown Saudi benefactor pays a Saudi, Saad Al-Habeeb, to buy a building in San Diego, California, for a new Kurdish community mosque, the Kurdish Community Islamic Center. However, the approximately $500,000 will only be given on the condition that Omar al-Bayoumi be installed as the building’s maintenance manager with a private office at the mosque. After taking the job, al-Bayoumi rarely shows up for work. [Newsweek, 11/24/2002; San Diego Magazine, 9/2003] This means he has two jobs at once. The people in the mosque eventually begin a move to replace al-Bayoumi, but he moves to Britain in July 2001 before this can happen. [Newsweek, 11/24/2002] An anonymous federal investigator states, “Al-Bayoumi came here, set everything up financially, set up the San Diego [al-Qaeda] cell and set up the mosque.” An international tax attorney notes that anyone handling business for a mosque or a church could set it up as a tax-exempt charitable organization “and it can easily be used for money laundering.” [San Diego Union-Tribune, 10/27/2001; San Diego Union-Tribune, 10/22/2002]

Entity Tags: Omar al-Bayoumi, Saad Al-Habeeb

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Thieves snatch a passport from a car driven by a US tourist in Barcelona, Spain, which later finds its way into the hands of would-be hijacker Ramzi Bin al-Shibh. Bin al-Shibh allegedly uses the name on the passport in the summer of 2001 as he wires money to pay flight school tuition for Zacarias Moussaoui in Oklahoma (see July 29, 2001-August 3, 2001). After 9/11, investigators will believe the movement of this passport shows connections between the 9/11 plotters in Germany and a support network in Spain, made up mostly by ethnic Syrians. “Investigators believe that the Syrians served as deep-cover mentors, recruiters, financiers and logistics providers for the hijackers—elite backup for an elite attack team.” [Los Angeles Times, 1/14/2003] Mohamed Atta travels to Spain twice or three times in 2001 (see January 4-10, 2001, July 8-19, 2001, and September 5, 2001), perhaps to make contact with members of this Spanish support team.

Entity Tags: Mohamed Atta, Ramzi bin al-Shibh, Zacarias Moussaoui

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right).Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right). [Source: Associated Press]Two US embassies in Africa are bombed within minutes of each other. At 10:35 a.m., local time, a suicide car bomb attack in Nairobi, Kenya, kills 213 people, including 12 US nationals, and injures more than 4,500. Mohamed al-Owhali and someone known only as Azzam are the suicide bombers, but al-Owhali runs away at the last minute and survives. Four minutes later, a suicide car bomb attack in Dar es Salaam, Tanzania, kills 11 and injures 85. Hamden Khalif Allah Awad is the suicide bomber there. The attacks will be blamed on al-Qaeda. [PBS Frontline, 2001; United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001] The Tanzania death toll is low because, remarkably, the attack takes place on a national holiday so the US embassy there is closed. [Miller, Stone, and Mitchell, 2002, pp. 195] The attack shows al-Qaeda has a capability for simultaneous attacks. The Tanzania bombing appears to have been a late addition, as one of the arrested bombers will allegedly tell US agents that it was added to the plot only about 10 days in advance. [United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001] A third attack against the US embassy in Uganda does not take place due to a last-minute delay (see August 7, 1998). [Associated Press, 9/25/1998] August 7, 1998, is the eighth anniversary of the arrival of US troops in Saudi Arabia and some people will speculate that this is the reason for the date of the bombings. [Gunaratna, 2003, pp. 46] In the 2002 book The Cell, reporters John Miller, Michael Stone, and Chris Mitchell will write: “What has become clear with time is that facets of the East Africa plot had been known beforehand to the FBI, the CIA, the State Department, and to Israeli and Kenyan intelligence services.… [N]o one can seriously argue that the horrors of August 7, 1998, couldn’t have been prevented.” They will also comment, “Inexplicable as the intelligence failure was, more baffling still was that al-Qaeda correctly presumed that a major attack could be carried out by a cell that US agents had already uncovered.” [Miller, Stone, and Mitchell, 2002, pp. 195, 206] After 9/11, it will come to light that three of the alleged hijackers, Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi, had some involvement in the bombings (see October 4, 2001, Late 1999, and 1993-1999) and that the US intelligence community was aware of this involvement by late 1999 (see December 15-31, 1999), if not before.

Entity Tags: Salem Alhazmi, Nawaf Alhazmi, Mohamed al-Owhali, Hamden Khalif Allah Awad, Khalid Almihdhar, Al-Qaeda, Azzam

Timeline Tags: Complete 911 Timeline

Al-Qaeda’s communications hub in Sana’a, Yemen.Al-Qaeda’s communications hub in Sana’a, Yemen. [Source: PBS NOVA]The investigation of the East Africa embassy bombings (see 10:35-10:39 a.m., August 7, 1998) led to the discovery of the phone number of an al-Qaeda communications hub in Sana’a, Yemen (see August 4-25, 1998). The hub is run by an al-Qaeda veteran named Ahmed al-Hada, who is helped by his son Samir and is related to many other al-Qaeda operatives in Yemen and elsewhere. He is also the father in law of 9/11 hijacker Khalid Almihdhar, whose wife, Hoda al-Hada, lives at the hub with their children. [Newsweek, 6/2/2002; Die Zeit (Hamburg), 10/1/2002; MSNBC, 7/21/2004; Suskind, 2006, pp. 94; Wright, 2006, pp. 277, 309, 343, 378] Several of Ahmed al-Hada’s relatives die fighting for al-Qaeda before 9/11, a fact known to US intelligence. [Los Angeles Times, 12/21/2005; Guardian, 2/15/2006] The NSA may already be aware of the phone number, as they have been intercepting Osama bin Laden’s communications for some time (see November 1996-Late August 1998) and, according to Newsweek, “some” of bin Laden’s 221 calls to Yemen are to this phone number. [Newsweek, 2/18/2002; Sunday Times (London), 3/24/2002; Media Channel, 9/5/2006] The US intelligence community now begins a joint effort to monitor the number. The NSA and CIA jointly plant bugs inside the house, tap the phones, and monitor visitors with spy satellites. [Mirror, 6/9/2002; Wright, 2006, pp. 343; New Yorker, 7/10/2006 pdf file] US intelligence also learns that the communications hub is an al-Qaeda “logistics center,” used by agents around the world to communicate with each other and plan attacks. [Newsweek, 6/2/2002] The joint effort enables the FBI to map al-Qaeda’s global organization (see Late 1998-Early 2002) and at least three of the hijackers use the number, enabling the NSA to intercept their communications and find out about an important al-Qaeda meeting in Malaysia (see December 29, 1999 and January 5-8, 2000 and Early 2000-Summer 2001). It appears al-Qaeda continues to use this phone line until Samir al-Hada dies resisting arrest in early 2002 (see February 13, 2002).

Entity Tags: National Security Agency, Federal Bureau of Investigation, Samir al-Hada, Khalid Almihdhar, Central Intelligence Agency, Osama bin Laden, Hoda al-Hada, Ahmed al-Hada

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Omar al-Bayoumi.Omar al-Bayoumi. [Source: Saudi Government via Al Arabiya]The FBI conducts a counterterrorism inquiry on Omar al-Bayoumi, suspected al-Qaeda advance man, and possible Saudi agent. The FBI discovers he has been in contact with several people also under investigation. [US Congress, 7/24/2003 pdf file] The FBI is given a tip that he was sent a suspicious package filled with wire from the Middle East, and that large numbers of Arab men routinely meet in his apartment. His landlord notices that he switches from driving a beat up old car to a new Mercedes. [Newsweek, 7/28/2003] According to the 9/11 Congressional Inquiry, the FBI notes that al-Bayoumi has “access to seemingly unlimited funding from Saudi Arabia.” For instance, an FBI source identifies him as a person who has delivered about $500,000 from Saudi Arabia to buy a mosque in June 1998 (see June 1998). However, the FBI closes the inquiry “for reasons that remain unclear .” [US Congress, 7/24/2003 pdf file] Also in 1999, al-Bayoumi is working as an employee of the Saudi company Dallah Avco but apparently is doing no work. Someone in the company tries to fire him and sends a note to the Saudi government about this, since the company is so closely tied to the government. However, Mohammed Ahmed al-Salmi, the Director General of Civil Aviation, replies that it is “extremely urgent” his job is renewed “as quickly as possible,” and so he keeps his job. [Wall Street Journal, 8/11/2003]

Entity Tags: Mohammed Ahmed al-Salmi, Omar al-Bayoumi, Federal Bureau of Investigation, Dallah Avco

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Patrick FitzgeraldPatrick Fitzgerald [Source: Publicity photo]Ali Mohamed is finally arrested after testifying at a grand jury hearing. The arrest is officially kept secret, but the media will report it one month later. [New York Times, 10/30/1998] Patrick Fitzgerald is on the prosecutor team that subpoenaed Mohamed to appear, but apparently he and the other prosecutors know very little about Mohamed. Fitzgerald blames this on a legal “wall” between intelligence gathering and criminal prosecution. He later will relate what happened on the day Mohamed testified: “Ali Mohamed lied in that grand jury proceeding and left the courthouse to go to his hotel, followed by FBI agents, but not under arrest. He had imminent plans to fly to Egypt. It was believed [by the prosecutors] at the time that Mohamed lied and that he was involved with the al-Qaeda network but Mohamed had not by then been tied to the [embassy] bombings. The decision had to be made at that moment whether to charge Mohamed with false statements. If not, Mohamed would leave the country. That difficult decision had to be made without knowing or reviewing the intelligence information on the other side of the ‘wall.’ It was ultimately decided to arrest Mohamed that night in his hotel room [and he was arrested]. [The prosecution] team got lucky but we never should have had to rely on luck. The prosecution team later obtained access to the intelligence information, including documents obtained from an earlier search of Mohamed’s home by the intelligence team on the other side of ‘the wall.’ Those documents included direct written communications with al-Qaeda members and a library of al-Qaeda training materials that would have made the decision far less difficult. (We could only obtain that access after the arrest with the specific permission of the Attorney General of the United States, based upon the fact that we had obligations to provide the defendant with discovery materials and because the intelligence investigation of Mohamed had effectively ended.)… Mohamed [later] stated that had he not been arrested on that day in September 1998, he had intended to travel to Afghanistan to rejoin Osama bin Laden. Thus, while the right decision to arrest was made partly in the dark, the ‘wall’ could easily have caused a different decision that September evening that would have allowed a key player in the al-Qaeda network to escape justice for the embassy bombing in Kenya and rejoin Osama bin Laden in a cave in Afghanistan, instead of going to federal prison.” [US Congress, 10/21/2003] Mohamed’s associate Khaled Abu el-Dahab, now living in Egypt, wil hear of Mohamed’s arrest and attempt to leave the country, but will be arrested in October 1998. He will be put on trial there and sentenced to 15 years in prison (see 1999). [San Francisco Chronicle, 11/21/2001]

Entity Tags: Ali Mohamed, Federal Bureau of Investigation, Khaled Abu el-Dahab, Patrick J. Fitzgerald

Timeline Tags: Complete 911 Timeline

Wadih El Hage.Wadih El Hage. [Source: FBI]On September 15, 1998, Wadih El-Hage is arrested in the US after appearing before a US grand jury. A US citizen, he had been bin Laden’s personal secretary. He will later be convicted for a role in the 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998). [New York Times, 9/18/1998]

Entity Tags: Wadih El-Hage

Timeline Tags: Complete 911 Timeline

On September 15, 1998, bin Laden’s former personal secretary Wadih El-Hage is arrested in the US (see September 15, 1998). His address book had been discovered in 1997 (see Shortly After August 21, 1997), but apparently after his arrest investigators pursue new leads from it. One name in the book is Ghassan Dahduli. Both El-Hage and Dahduli lived in Tucson, Arizona in the late 1980s. Dahduli ran an Islamic Association for Palestine (IAP) office from the same Tucson mosque that El-Hage attended. Dahduli moved to Richardson, Texas, with the IAP office in 1990, around the time El-Hage moved to Arlington, Texas. Both towns are in the Dallas-Fort Worth area. El-Hage lived in Africa for much of the 1990s, but by 1998 he was back in Texas and he was seen in a Texas restaurant with Dahduli. The IAP, InfoCom, and Holy Land Foundation all have offices next to each other, and all have been accused of being fronts for Hamas. Dahduli worked at both the IAP and InfoCom. [Dallas Morning News, 9/23/2001; Nation, 12/24/2001] Based on the connection between Dahduli and El-Hage and other information, the FBI opens up a criminal investigation into all three organizations in 1999. They determine that Hamas leader Mousa Abu Marzouk invested $150,000 in InfoCom in 1992, and his wife Nadia Marzouk invested $250,000 in 1993. On September 25, 2000, federal agents confront Dahduli in a shopping center parking lot and threaten to deport him, but offer to not do so if he agrees to become an informant on these organizations. Dahduli refuses and publicizes the offer to turn informant, even putting information about it on the Internet. He applies for political asylum in the US. [Nation, 12/24/2001; Dallas Morning News, 12/20/2002] In early 2001, the Dallas Morning News begins publishing stories about InfoCom and its suspected ties to Hamas. Apparently, some combination of the Dahduli-El-Hage link, media pressure, and the investments of Marzouk and his wife prompts the FBI to raid InfoCom on September 5, 2001, one week before 9/11 (see September 5-8, 2001). It will be the only significant action the US government takes against a Muslim charity in the US before 9/11. [Columbia Journalism Review, 1/2002] Shortly after 9/11, Dahduli will be arrested and questioned. He will be deported to Jordan in December 2001. [Nation, 12/24/2001]

Entity Tags: Wadih El-Hage, Mousa Abu Marzouk, Nadia Marzouk, Islamic Association for Palestine, InfoCom Corporation

Timeline Tags: Complete 911 Timeline

The arrest of al-Qaeda leader Mamdouh Mahmud Salim (a.k.a. Abu Hajer) points US and German investigators to Mohammed Haydar Zammar, a member of the al-Qaeda cell in Hamburg, Germany, with a few of the future 9/11 hijackers. Salim is arrested on September 16, 1998, in Munich, Germany (see September 16, 1998). He is believed to be al-Qaeda’s financial chief, and is one of al-Qaeda’s founding members (see August 11-20, 1988). After Salim’s arrest, both German and US intelligence investigate his contacts in Germany and discover a link to Zammar. Zammar is already being investigated and monitored by the Office for the Protection of the Constitution (BfV), Germany’s domestic intelligence service (see March 1997-Early 2000). [Der Spiegel (Hamburg), 12/12/2005] Presumably, the link between Zammar and Salim should increase the urgency of the German investigation. It is unknown when US intelligence begins monitoring Zammar, but the US will discover important links between Zammar and al-Qaeda in the summer of 1999 (see Summer 1999). US and German investigators also discover a link between Salim and Mamoun Darkazanli, a Hamburg associate of Zammar’s, and they monitor him as well (see Late 1998).

Entity Tags: Mamdouh Mahmud Salim, Mohammed Haydar Zammar, Mamoun Darkazanli, Bundesamt fur Verfassungsschutz, Al-Qaeda, US intelligence

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Counterterrorism expert Rohan Gunaratna will later write that after the US embassy bombings (see 10:35-10:39 a.m., August 7, 1998), surveillance of al-Qaeda is stepped up around the world. “One intelligence officer attached to the French embassy in Islamabad, [Pakistan], urged his counterparts in foreign missions in Pakistan to detail the recipients of phone calls made by… al-Qaeda leader Abu Zubaida, then living in Peshawar, to individuals in their various countries.” As a result, “several governments [launch] investigations of their own.” [Gunaratna, 2003, pp. 245] A close associate of Zubaida in Peshawar at this time is Khalil Deek, who is actually a mole for the Jordanian government (see 1998-December 11, 1999). One such investigation is launched by the Philippine government on October 16, 1998, after being asked by French intelligence to gather intelligence on people in the Philippines in contact with Zubaida. Code named CoPlan Pink Poppy, the investigation reveals connections between al-Qaeda and the Moro Islamic Liberation Front (MILF), a Philippine militant group. On December 16, 1999, Abdesselem Boulanouar and Zoheir Djalili, two French Algerians belonging to the Algerian al-Qaeda affiliate the Salafist Group for Call and Combat (GSPC), are arrested due to information learned from monitoring Zubaida’s calls to the Philippines. Boulanouar is arrested at an airport carrying a terrorist training manual he admitted writing for the MILF. Both men also are arrested carrying explosive devices. French intelligence says Boulanouar had ties to Ahmed Ressam (see December 14, 1999), and like Ressam, may have been planning to carry out attacks at the turn of the millennium. He will be deported to France and imprisoned on terrorism related charges. CoPlan Pink Poppy will be canceled in 2000 for lack of funds. [Gulf News, 3/14/2000; Ressa, 2003, pp. 132-133; Gunaratna, 2003, pp. 245] However, while details are murky, it appears other governments continue to monitor Zubaida’s calls. Around the same time as the Philippines arrests, one militant in Jordan is even arrested while still in the middle of a phone call to Zubaida (see November 30, 1999). US intelligence will remain intensely focused on Zubaida before 9/11 (see Late March-Early April 2001 and May 30, 2001), and just days before 9/11 the NSA will monitor calls Zubaida is making to the US (see Early September 2001). It appears his calls will continue to be monitored after 9/11 as well (see October 8, 2001).

Entity Tags: Khalil Deek, Zoheir Djalili, Moro Islamic Liberation Front, Direction Générale de la Sécurité Extérieure, Abdesselem Boulanouar, Philippines, Abu Zubaida, Al-Qaeda, Ahmed Ressam, Salafist Group for Preaching and Combat

Timeline Tags: Complete 911 Timeline

The Marienstrasse building.The Marienstrasse building. [Source: Associated Press]Future 9/11 hijacker Mohamed Atta, al-Qaeda operatives Said Bahaji and Ramzi Bin al-Shibh, and others in the al-Qaeda Hamburg cell move into a four bedroom apartment at 54 Marienstrasse, in Hamburg, Germany, and some of them stay there until February 2001. Investigators will later believe this move marks the formation of the Hamburg al-Qaeda cell. [Los Angeles Times, 1/27/2002; New York Times, 9/10/2002] Up to six men at a time live at the apartment, including, at times, 9/11 hijacker Marwan Alshehhi and cell member Zakariya Essabar. Alshehhi moves out after the first month; it is unclear why. [New York Times, 9/15/2001] During the 28 months Atta’s name is on the apartment lease, 29 Middle Eastern or North African men register the apartment as their home address.
Surveillance of Bahaji - From the very beginning, the apartment is under surveillance by German intelligence, because of investigations into businessman Mamoun Darkazanli that connect to Bahaji. [Washington Post, 10/23/2001] The Germans also suspect connections between Bahaji and al-Qaeda operative Mohammed Haydar Zammar. [Los Angeles Times, 9/1/2002] Bahaji is directly monitored for at least part of 1998, but German officials will not disclose when the probe began or ends. This investigation is dropped for lack of evidence (see (Late 1998)). [Associated Press, 6/22/2002; Los Angeles Times, 9/1/2002] Bahaji moves out in July 1999 and gets married a few months later (see October 9, 1999). [Der Spiegel (Hamburg), 8/29/2011]
Surveillance of El Motassadeq - German intelligence monitors the apartment off and on for months, and wiretaps Mounir El Motassadeq, an associate of the apartment-mates who will later be convicted for assisting the 9/11 plot, but apparently it does not find any indication of suspicious activity (see August 29, 1998). [Chicago Tribune, 9/5/2002]
Surveillance of Zammar - Zammar, a talkative man who has trouble keeping secrets, does not live at the apartment, but he is a frequent visitor to the many late night meetings there. [Miller, Stone, and Mitchell, 2002, pp. 259-60; Los Angeles Times, 9/1/2002; Chicago Tribune, 9/5/2002] He even lives in the apartment for a time in February 1999 (see February 1999). Zammar is the focus of an investigation that began in 1997 and continues until early 2000 (see March 1997-Early 2000). Interest in monitoring him increases in late 1998 (see October 2, 1998).
Surveillance of Atta - The CIA also allegedly starts monitoring Atta in early 2000 while he is living at the apartment, and does not tell Germany of the surveillance (see January-May 2000). Atta leaves Germany to live in the US in June 2000 (see June 3, 2000).
No Direct German Surveillance of the Apartment? - Yet, even though people like Zammar who frequently phone and visit the apartment are monitored, German officials will later claim that the apartment itself is never bugged. An unnamed senior German security official will later say that some surveillance of associated people gives “the impression that the people living there were fanatical believers. At the BfV [Germany’s domestic intelligence agency], we had to decide whether to ask permission to place a wiretap on the line at 54 Marienstrasse itself. We discussed this every day.” But he will claim that they ultimately decide they will not be able to get legal permission for a wiretap because there is no evidence that the apartment’s occupants are breaking any laws. [Vanity Fair, 11/2004] This claim that the apartment was not directly monitored seems contradicted by reports that Bahaji was the target of a surveillance investigation when he was living in the Marienstrasse apartment in late 1998 (see (Late 1998)).
What Would More Surveillance Have Uncovered? - It will later be clear that investigators could have found evidence if they looked more thoroughly. For instance, one visitor will recall Atta and others discussing attacking the US. [Knight Ridder, 9/9/2002] 9/11 mastermind Khalid Shaikh Mohammed is in Hamburg several times in 1999 and comes to the apartment. However, although there is a $2 million reward for Mohammed since 1998, the US apparently fails to tell Germany what it knows about him (see 1999). [Newsweek, 9/4/2002; New York Times, 11/4/2002] 9/11 Hijacker Waleed Alshehri also apparently stays at the apartment “at times.” [Washington Post, 9/14/2001; Washington Post, 9/16/2001] Remarkably, shortly after 9/11, the German government will claim it knew little about the Hamburg al-Qaeda cell before 9/11, and nothing directed it towards the Marienstrasse apartment. [Daily Telegraph, 11/24/2001]

Entity Tags: Mamoun Darkazanli, Khalid Shaikh Mohammed, Said Bahaji, Marwan Alshehhi, Central Intelligence Agency, Mohamed Atta, Mounir El Motassadeq, Al-Qaeda, Mohammed Haydar Zammar, Zakariya Essabar, Ramzi bin al-Shibh, Bundesamt fur Verfassungsschutz

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Satam Al Suqami.Satam Al Suqami. [Source: US District Court for the Eastern District of Virginia, Alexandria Division]On August 11, 1998, 9/11 hijacker Satam Al Suqami is issued a Saudi Arabian passport. [Federal Bureau of Investigation, 10/2001, pp. 29 pdf file] This passport will allegedly be discovered in the wreckage of the 9/11 attacks in New York (see After 8:46 a.m. September 11, 2001), allowing investigators an unusually detailed glimpse into the movements of one of the hijackers. While a majority of the hijackers seem to have traveled little prior to coming to the US, Al Suqami travels widely:
bullet November 5, 1998: He enters and departs Jordan, enters Syria.
bullet November 11, 1998: departs Syria; enters and departs Jordan.
bullet November 12, 1998: enters Saudi Arabia.
bullet February 19, 1999: enters Saudi Arabia.
bullet February 24, 1999: enters and departs Jordan; enters Syria.
bullet February 25, 1999: departs Saudi Arabia.
bullet March 7, 1999: departs Syria.
bullet March 8, 1999: enters Jordan.
bullet May 13, 1999: departs Bahrain.
bullet May 15, 1999: enters Saudi Arabia.
bullet January 18, 2000: enters United Arab Emirates (UAE).
bullet April 4, 2000: enters UAE.
bullet April 6, 2000: departs UAE.
bullet April 7, 2000: enters Egypt.
bullet April 18, 2000: departs Oman, enters UAE.
bullet July 11, 2000: departs Egypt.
bullet July 12, 2000: enters Malaysia. [Federal Bureau of Investigation, 10/2001, pp. 33, 37-39, 42, 59-62, 75 pdf file]
On September 24, 2000, Al Suqami enters Turkey and stays there for most of the next six months (see September 24, 2000-April 1, 2001). Then he will travel to Malaysia again before finally flying to the US. The above records are obviously incomplete as there are sometimes records of him leaving a country without entering it or vice versa. His travels to Afghanistan and Pakistan are also not mentioned, as there was probably an effort to keep them out of his passport. In 2007, al-Qaeda leader Luai Sakra will claim that Al Suqami was not just another hijacker but led a group of the hijackers. The release of Al Suqami’s passport records in 2008 will help corroborate that claim. [London Times, 11/25/2007]

Entity Tags: Luai Sakra, Satam Al Suqami

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Princess Diana at a mine field in Angola in 1997.Princess Diana at a mine field in Angola in 1997. [Source: Tim Graham / Corbis]The NSA admits that US intelligence agencies possess 1,056 pages of classified information regarding Britain’s Princess Diana. British tabloids portray the documents as rife with salacious information on Diana’s “most intimate love secrets” about her relationship with Egyptian billionaire Dodi al-Fayed, but the actual documentation may not be so lurid. The NSA recently denied a Freedom of Information request from the Internet news service APB Online about information it has collected on Diana, who died in a tragic car accident in 1997. (It is unclear whether US intelligence has any unreleased information about the circumstances of Diana’s death. [APB Online, 11/30/1998; Washington Post, 12/12/1998] The NSA has denied monitoring Diana on the night of her death, an allegation raised by The Observer in 2006.) [MSNBC, 12/11/2006] In the two-page letter denying the request, the NSA admits to possessing a “Diana file,” but refuses to divulge what is in that file. A US intelligence official says the information is made up of conversations between other people who mentioned Diana; the references to Diana in those intercepted conversations are “incidental.” The official says Diana was never a particular target of the NSA’s Echelon surveillance program. However, the NSA has classified 124 pages of the “Diana documents” as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security.” According to a recent report by the European Parliament, the NSA routinely monitors virtually “all e-mail, telephone and fax communications… within Europe” (see July 11, 2001). Intelligence expert Steven Aftergood of the Federation of American Scientists says “the US and our allies promiscuously collect electronic communications around the world. Whether the descriptions of Echelon are accurate or not, that much is definitely true.” Some believe that lurid snippets of information leaked to the British press regarding Diana’s affair with Fayed, and her ambivalent relationship with Prince Charles, may have come from Echelon wiretaps and surveillance. Another FAS scientist, John Pike, says the NSA and other US intelligence agencies may have been monitoring Diana to protect her from terrorist attacks. Pike says it is also possible she may have been monitored because of her involvement in banning land mines, a position opposed by the Pentagon. [APB Online, 11/30/1998; Washington Post, 12/12/1998] Former NSA official Wayne Madsen will say in 2000, “[W]hen NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?” [CBS News, 2/27/2000] In August 1999, the NSA will deny another Freedom of Information request about its “Diana file” from the British newspaper The Guardian. [Guardian, 8/6/1999]

Entity Tags: Steven Aftergood, Prince Charles, The Guardian, John Pike, Dodi al-Fayed, Echelon, Federation of American Scientists (FAS), National Security Agency, Princess Diana

Timeline Tags: Civil Liberties

Shortly after an August 1998 US missile strike on Afghanistan (see August 20, 1998), bin Laden stops using his satellite phone, correctly deciding that it was being monitored by US intelligence (see Late August 1998). According to counterterrorism expert Rohan Gunaratna, al-Qaeda quickly “developed a system to deceive those monitoring his calls. [But] Western security and intelligence agencies were soon able to monitor the new system, which was based on transferring international calls within safe houses in Pakistan to make them seem like domestic calls.” Other al-Qaeda leaders such as Abu Zubaida will be frequently monitored as they make calls using this new system (see October 1998 and After). Gunaratna later claims to have learned this from a confidential source in a “communications monitoring agency” in Western Europe. [Gunaratna, 2003, pp. 15-16, 3291] It is not known how long it took until al-Qaeda realized this new system was compromised, but there are accounts of bin Laden and Zubaida’s calls being monitored days before 9/11 (see Early September 2001, September 9, 2001, and Early September 2001).

Entity Tags: Osama bin Laden, Abu Zubaida

Timeline Tags: Complete 911 Timeline

Mohammed Shawqui Islambouli.Mohammed Shawqui Islambouli. [Source: Public domain]On December 4, 1998, an item in President Clinton’s Presidential Daily Briefing (PDB) is titled, “Bin Laden Preparing to Hijack US Aircraft and Other Attacks.” The PDB says “Bin Laden and is allies are preparing for attacks in the US, including an aircraft hijacking to obtain the release of Sheikh Omar Abdul-Rahman, Ramzi Yousef, and Muhammad Sadiq ‘Awda. One source quoted a senior member of Al-Gama’a al-Islamiyya (IG) saying that, as of late October, the IG had completed planning for an operation in the US on behalf of bin Laden, but that the operation was on hold. A senior bin Laden operative from Saudi Arabia was to visit IG counterparts in the US soon thereafter to discuss options-perhaps including an aircraft hijacking.” The same source says bin Laden may implement plans to hijack US aircraft before the start of the Muslim holy month of Ramadan on December 20 and that two members of the operational team had evaded security checks in a recent trial run at a New York airport. A possible different source says that in late September, Mohammed Shawqui Islambouli, brother of the assassin of Egyptian President Anwar Sadat and described in the PDB as an IG leader, was planning to hijack a US airliner during the “next couple of weeks” to free Abdul-Rahman and other prisoners. The PDB also says that “some members of the bin Laden network have received hijack training, according to various sources, but no group directly tied to bin Laden’s al-Qaeda organization has ever carried out an aircraft hijacking. Bin Laden could be weighing other types of operations against US aircraft.” The PDB mentions other bin Laden related threats, including recent reports that the IG has obtained surface-to-air missiles and intends to move them from Yemen to Saudi Arabia to shoot down aircraft. [Washington Post, 7/18/2004; 9/11 Commission, 7/24/2004, pp. 128-130] The private intelligence group Stratfor will later say that, in addition to his ties with IG, Islambouli worked with bin Laden in the Maktab al-Khidamat charity front in Pakistan and is believed to have lived in Afghanistan in the 1990s as “part of the group of key Egyptian advisers surrounding bin Laden.” Islambouli will formally join with al-Qaeda in 2006. [Stratfor, 8/10/2006] In early 1998, the CIA ignored information from a recently retired CIA agent that claimed 9/11 mastermind Khalid Shaikh Mohammed was in a terrorist cell with Islambouli, both were experts on plane hijackings, and were planning to hijack planes (see Early 1998). Perhaps not coincidentally, on this same day, CIA Director George Tenet issues a “declaration of war” against al-Qaeda in a memo to the US intelligence community (see December 4, 1998). Also on this day, counterterrorism “tsar” Richard Clarke holds a meeting of his interagency Counterterrorism and Security Group (CSG) to discuss the threat. The group agrees that New York City airports should go on a maximum security alert that weekend and security should be boosted at other East Coast airports. The FBI, FAA, and New York City Police Department get versions of the PDB report. Later in December and again in January 1999 the source says the hijacking has been postponed because two operatives have been arrested in Washington or New York. But the FBI is unable to find any information to support the threat nor is it able to verify any arrests similar to what the source described, and the source remains mysterious. The high alert in New York airports is canceled by the end of January. [9/11 Commission, 7/24/2004, pp. 128-130] This PDB will be mentioned in President Bush’s famous August 6, 2001 PDB, but mentions that US officials “have not been able to corroborate” the plot (see August 6, 2001).

Entity Tags: Federal Bureau of Investigation, William Jefferson (“Bill”) Clinton, Federal Aviation Administration, Al-Gama’a al-Islamiyya, Richard A. Clarke, Counterterrorism and Security Group, Ramzi Yousef, Omar Abdul-Rahman, Mohammed Shawqui Islambouli, Muhammad Sadiq ‘Awda, Osama bin Laden, New York City Police Department, Maktab al-Khidamat

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In a Time magazine cover story entitled “The Hunt for Osama,” it is reported that intelligence sources “have evidence that bin Laden may be planning his boldest move yet—a strike on Washington or possibly New York City in an eye-for-an-eye retaliation. ‘We’ve hit his headquarters, now he hits ours,’ says a State Department aide.” [Time, 12/21/1998]

Entity Tags: Osama bin Laden

Timeline Tags: Complete 911 Timeline

On top is El-Hage’s business card for his fake charity, Help Africa People. Below is his card for his business Anhar Trading. On the lower left is a US address and on the lower right is Darkazanli’s address in Germany.On top is El-Hage’s business card for his fake charity, Help Africa People. Below is his card for his business Anhar Trading. On the lower left is a US address and on the lower right is Darkazanli’s address in Germany. [Source: CNN]The CIA first became interested in Mamoun Darkazanli in 1993 (see 1993). The FBI shows interest in Darkazanli after al-Qaeda operatives Wadih El Hage and Mamdouh Mahmud Salim (a.k.a. Abu Hajer) are arrested in late 1998 (see September 16, 1998-September 5, 2001 and September 16, 1998). According to FBI documents, Darkazanli’s fax and telephone numbers are discovered in El Hage’s address book. Darkazanli’s Deutsche Bank account number is found in the book as well. [CNN, 10/16/2001] El-Hage had created a number of shell companies as fronts for al-Qaeda activities, and one of these uses the address of Darkazanli’s apartment. [Chicago Tribune, 11/17/2002] Further, El-Hage’s business card shows Darkazanli’s Hamburg address. The FBI also discovers that Darkazanli has power of attorney over a bank account belonging to Salim, a high-ranking al-Qaeda member. El Hage will later be convicted for his role in the 1998 US embassy bombings, and Salim will remain in US custody. [New York Times, 6/20/2002; US Congress, 7/24/2003, pp. 157 pdf file] By this time, Darkazanli is associating with members of the Hamburg al-Qaeda cell, and may be a member of the cell himself.

Entity Tags: Wadih El-Hage, Mamoun Darkazanli, Mamdouh Mahmud Salim, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline

Page 1 of 7 (668 events)
previous | 1, 2, 3, 4, 5, 6, 7 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike