The Center for Grassroots Oversight

This page can be viewed at http://www.historycommons.org/context.jsp?item=a99samitmaltbieargue&scale=5


Context of '1999: FBI Headquarters Delays Check on Terrorist Trainer for 9 Months, Tries to Block Warning for National Guard'

This is a scalable context timeline. It contains events related to the event 1999: FBI Headquarters Delays Check on Terrorist Trainer for 9 Months, Tries to Block Warning for National Guard. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 17 (1696 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17 | next

Brehon B. Somervell.Brehon B. Somervell. [Source: Public domain]Construction begins on the Pentagon. The structure was conceived at the request of Brigadier General Brehon B. Somervell in 1941, in order to provide a temporary solution to the growing US War Department’s critical shortage of space. The groundbreaking ceremony takes place on September 11, 1941. (Fine 1972, pp. 265-266, 348-351, 431-432, 434; Harte and Pruitt 1/16/2018) Exactly 60 years later, Flight 77 will crash into the Pentagon as part of the 9/11 attacks (see 9:37 a.m. September 11, 2001).

Sherwood F. Moran (right) interrogating a Japanese prisoner during the battle of Guadalcanal.Sherwood F. Moran (right) interrogating a Japanese prisoner during the battle of Guadalcanal. [Source: Associated Press]Marine interrogator Major Sherwood F. Moran writes an informal memo for use by other interrogators. Moran is a legendary figure among Marines, renowned for his ability to coax information from the most reluctant or resistant Japanese captive, even during the height of battle, and often using his knowledge of, and respect for, Japanese culture to his advantage. His memo will remain relatively unknown outside the Marine Corps until the summer of 2003, when it will be included in the archives of the Marine Corps Interrogator Translator Teams Association. The memo, titled “Suggestions for Japanese Interpreters Based on Work in the Field,” is remarkable for its insistence that treating prisoners with humanity and respect works far better than “harsh” interrogation methods. Author Ulrich Straus, an expert on Japanese POWs held in US captivity during World War II, will later write that Moran “was a particularly effective interrogator because he treated each prisoner as another human rather than as the enemy.” In 2005, after the Abu Ghraib scandals become media fodder, military historian Stephen Budiansky will write: “Six months before the abuses at Abu Ghraib prison broke into public view, a small and fairly obscure private association of United States Marine Corps members posted on its Web site a document on how to get enemy POWs to talk. The document described a situation very similar to the one the United States faces in the insurgencies in Iraq and Afghanistan: a fanatical and implacable enemy, intense pressure to achieve quick results, a brutal war in which the old rules no longer seem to apply.… Moran, the report’s author, noted that despite the complexities and difficulties of dealing with an enemy from such a hostile and alien culture, some American interrogators consistently managed to extract useful information from prisoners. The successful interrogators all had one thing in common in the way they approached their subjects. They were nice to them. Moran was writing in 1943, and he was describing his own, already legendary methods of interrogating Japanese prisoners of war. More than a half century later his report remains something of a cult classic for military interrogators.” (David R. Moran 2005)
Human-to-Human Attitude - Moran writes that the best interrogators (whom he says should consider themselves “interviewers”) become “wooers” of their captives, coaxing information rather than attempting to force confessions. Most important, Moran writes, is the interrogator’s attitude towards his prisoner. “Many people, I suppose, would on first thought think ‘attitude’ had nothing to do with it; that all one needs is a knowledge of the language, then shoot out questions, and expect and demand a reply,” he writes. “Of course that is a very unthinking and naive point of view.” Just as important, Moran writes, is a sympathy and understanding of the captive’s culture. A superior or demeaning attitude breeds nothing but antagonism and resistance.
Speaking the Language of the Captive - Almost as important, Moran notes, is the interrogator’s ability to speak directly to the captive in his own language, without the need for translators. An interrogator should speak the language fluently and idiomatically, or, when that is not possible, to at least have some command over common phrases. “After all, the first and most important victory for the interviewer to try to achieve is to get into the mind and into the heart of the person being interviewed,” he writes.
Hidden System - Fellow feelings and warm sympathy towards the captive are necessary, but not the entire package. While the captive, or an outside observer, might believe that the interrogator is merely indulging in friendly chit-chat, the interrogator must have an agenda and a plan in place at all times. “[I]n the workings of your mind you must be a model of system,” Moran says. “You must know exactly what information you want, and come back to it repeatedly. Don’t let your warm human interest, your genuine interest in the prisoner, cause you to be sidetracked by him! You should be hard-boiled but not half-baked. Deep human sympathy can go with a business-like, systematic, and ruthlessly persistent approach.”
Short-Circuiting Patriotic Defensiveness - To emphasize that your side, your nation, or your culture is superior—in essence, the “conquerors” of the captive’s military or his nation—is counterproductive, Moran writes. “To emphasize that we are enemies, to emphasize that he is in the presence of his conqueror, etc., puts him psychologically in the position of being on the defensive, and that because he is talking to a most-patient enemy and conqueror he has no right and desire to tell anything,” he writes.
Breaking Recalcitrant Prisoners - Sometimes even the best interrogators come up against recalcitrant prisoners who flatly refuse, for patriotic reasons or what Moran calls “conscientious scruples,” to give any information. In these cases, Moran writes, harsh or physical techniques of intelligence extraction are counterproductive. Instead, he writes, with his Japanese captives he is often able to shame the prisoner into cooperating. Reminding the captive that he has been treated humanely, has been treated with kindness and courtesy, implies a quid pro quo—not the threat of having this treatment withdrawn if cooperation is not forthcoming, but a matter of the captive returning the interrogator’s courtesy with information. (Moran 7/17/1943 pdf file)

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). (Campbell 7/25/2000) The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). (Ponder 5/13/2006) The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. (Campbell 7/25/2000) (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) (Ponder 5/13/2006) In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” (Campbell 7/25/2000) The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” (Church Committee 4/23/1976) Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” (Ponder 5/13/2006) Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. (Campbell 7/25/2000)
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

In the aftermath of World War II, Japanese officer Yukio Asano is charged by a US war crimes tribunal for torturing a US civilian. Asano had used the technique of “waterboarding” on the prisoner (see 1800 and After). The civilian was strapped to a stretcher with his feet in the air and head towards the floor, and water was poured over his face, causing him to gasp for air until he agreed to talk. Asano is convicted and sentenced to 15 years of hard labor. Other Japanese officers and soldiers are also tried and convicted of war crimes that include waterboarding US prisoners. “All of these trials elicited compelling descriptions of water torture from its victims, and resulted in severe punishment for its perpetrators,” reporter Evan Wallach will later write. In 2006, Senator Edward Kennedy (D-MA), discussing allegations of US waterboarding of terror suspects, will say in regards to the Asano case, “We punished people with 15 years of hard labor when waterboarding was used against Americans in World War II.” (Pincus 10/5/2006; Weiner 11/3/2007)

The first “Zippe-type” gas centrifuge, named after one of its main developers, German scientist Gernot Zippe, is produced. The centrifuge uses duralumin rotors. Centrifuge rotors are thin-walled tubes that spin at high speeds producing enriched uranium 235. Centrifuge rotors are highly sensitive and must be made from specialized high-strength material. (Albright 10/9/2003)

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, (New York Times 12/16/2005) The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. (Ensor 3/31/2001) After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. (New York Times 12/16/2005)

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. (U. S. v. Reynolds 3/9/1953; Siegel 2008, pp. 171-176)
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” (Siegel 2008, pp. ix-x)

Cover art for the 1966 film ‘Lost Command,’ based on the book ‘Les Centurions.’Cover art for the 1966 film ‘Lost Command,’ based on the book ‘Les Centurions.’ [Source: Cinema Forever (.com)]The French novel Les Centurions, by Jean Larteguy, features an early version of the so-called “ticking time bomb” scenario, in which torture is used to force critical information from a prisoner. The book, set during France’s occupation of Algeria, features a hero who beats up a female Arab dissident in order to learn the location of bombs planted throughout the city of Algiers. The hero uses the information gleaned from the beating of the woman to find and defuse the bombs. The book will be made into a 1966 film, Lost Command, starring Anthony Quinn. (Cinema Forever 2009; Temple-Raston 5/5/2009)

The CIA’s Technical Services Division (TSD) considers plans to undermine Fidel Castro’s charismatic appeal by sabotaging his speeches. At one point, there is discussion of spraying Castro’s broadcasting studio with a hallucinogenic chemical. The plan is taken of the shelf because the chemical is deemed unreliable. During this period, the TSD laces a box of cigars with a chemical that would produce temporary disorientation, hoping that he will smoke one of the cigars before giving a speech. In another instance, the TSD comes up with a scheme to dust Castro’s shoes with thallium salts during a trip outside of Cuba. The salts would cause his beard to fall out. The plan is abandoned when Castro cancels the trip. (US Congress 12/18/1975)

The CIA works with a high-level Cuban official, codenamed “AM/LASH,” on a plan to assassinate Fidel Castro and overthrow his government. In June 1965, the CIA ends its contact with AM/LASH and his associates, citing security concerns. (US Congress 12/18/1975; Central Intelligence Agency Inspector General 1/1996)

The CIA’s Task Force W devises two plans to assassinate Fidel Castro. The first one, involving an exploding sea shell that would be placed where Castro regularly dives, is dismissed by the CIA’s Technical Services Division (TSD) as impractical. In the second plan, James Donovan (who has been negotiating with Castro for the release of prisoners taken during the Bay of Pigs operation) would present Castro with a contaminated diving suit. TSD decides to give the plan a try. It purchases a diving suit and laces its breathing apparatus with tubercule bacillus. The suit itself is dusted with a fungus that is known to cause a chronic skin disease. But the suit never leaves the laboratory. (US Congress 12/18/1975; Central Intelligence Agency Inspector General 1/1996)

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” (Poole 8/15/2000; Ponder 5/13/2006) MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. (Bamford 1983; Ponder 5/13/2006)

The Washington Post runs a front-page photo of a US soldier supervising the waterboarding of a captured North Vietnamese soldier. The caption says the technique induced “a flooding sense of suffocation and drowning, meant to make him talk.” Because of the photo, the US Army initiates an investigation, and the soldier is court-martialed and convicted of torturing a prisoner. (Weiner 11/3/2007)

Dan Hill.Dan Hill. [Source: Amanda Gordon / Bloomberg]Dan Hill, a US Army Ranger who is undergoing officer training, comes up with a hypothetical plan by which the Soviet Union could start a nuclear war with the United States, which involves a suicide pilot crashing a military transport plane into the US Capitol building in Washington, DC.
Trainees Tasked with Imagining How to Start a World War - After his tour in Vietnam came to an end in mid-1969, Hill was chosen for the career officer training program at Fort Benning, Georgia. He is currently taking a course in nuclear weapons deployment. Toward the end of the semester, he is given the assignment of imagining he is a Soviet premier who wants to start World War III against the US. Hill and his fellow trainees are told to prepare a written plan, describing how they would initiate the war.
Plan Involves Crashing Plane into Capitol Building - Hill comes up with a plan, which he gives the code name “State of the Union.” It involves recruiting and training a suicide pilot, obtaining a C-47 transport plane, and filling it with explosives. Then, as journalist and author James B. Stewart will describe: “On the night of the State of the Union, the pilot would fly the plane straight into the Capitol building, through the rotunda, and into the House of Representatives, where the bombs on the plane would be set to explode. He’d take out the president, his cabinet, the members of the Supreme Court, the Joint Chiefs of Staff, and most senators and representatives. At that moment, the Soviet Union would unleash its nuclear missiles.” According to Hill, everyone in the US would be “watching TV, there’s no air defense around the Capitol; by the time anyone realized an aircraft was near, it would be too late.”
Commander Questions Hill about His Plan - On the Monday after Hill submits his plan, a lieutenant colonel in intelligence stops him on his way to class and says, “I’ve got some people who would like to talk to you.” Hill is taken to a room where Major General John Carley, the assistant commander of the infantry school, is waiting, along with six men in uniform and several other men who are dressed in dark suits, all of them looking serious. Carley is holding Hill’s paper and asks, “How did you come up with this?” Hill replies, “This is my area of expertise,” and explains that he has been trained in unconventional warfare, counterterrorism, the use of explosives, and demolition. He is then questioned for almost an hour about his plan. Finally, Carley says, “We’d prefer you forget you ever did this.” Hill agrees to do so and is then dismissed.
Hill Informs Friend about His Plan - Hill writes to his friend Rick Rescorla, who has also served in the Army, about the incident. In his reply, Rescorla writes: “You evil-minded b_stard! When you have these thoughts, don’t publicize them to anyone. The plan is tactically and technically proficient; it makes sense, but only to people like you and me. To the rest of the world, it looks like the workings of a deviant mind. This kind of thing terrifies people.” (Stewart 2002, pp. 152-153) Rescorla will subsequently work as the head of security for a company at the World Trade Center. (Stewart 2/11/2002) While he is in that position, he will be drawing from Hill’s plan when, after the 1993 bombing, he determines that terrorists will likely target the WTC again by crashing a cargo plane into it (see Shortly After February 26, 1993). (Stewart 2002, pp. 193-194) Hill will learn that, shortly after his meeting with Carley, enhanced air defenses were installed for Washington. He will therefore think that some good may have come from the meeting. (Stewart 2002, pp. 153)

Roger Ailes, the senior media consultant for the Nixon administration (see 1968), writes, or helps write, a secret memo for President Nixon and fellow Republicans outlining a plan for conservatives to “infiltrate and neutralize” the mainstream American media. The document will not be released until 2011; experts will call it the “intellectual forerunner” to Fox News, which Ailes will launch as a “fair and balanced” news network in 1996 (see October 7, 1996). John Cook, the editor of the online news and commentary magazine Gawker, will call the document the outline of a “nakedly partisan… plot by Ailes and other Nixon aides to circumvent the ‘prejudices of network news’ and deliver ‘pro-administration’ stories to heartland television viewers.” The document is entitled “A Plan for Putting the GOP on TV News.” Ailes, currently the owner of REA Productions and Ailes Communications Inc., works for the Nixon White House as a media consultant; he will serve the same function for President George H.W. Bush during his term. Ailes is a forceful advocate for using television to shape the message of the Nixon administration and of Republican policies in general. He frequently suggests launching elaborately staged events to entice favorable coverage from television reporters, and uses his contacts at the news networks to head off negative publicity. Ailes writes that the Nixon White House should run a partisan, pro-Republican media operation—essentially a self-contained news production organization—out of the White House itself. He complains that the “liberal media” “censors” the news to portray Nixon and his administration in a negative light. Cook will say the plan “reads today like a detailed precis for a Fox News prototype.” The initial idea may have originated with Nixon chief of staff H.R. Haldeman, but if so, Ailes expands and details the plan far beyond Haldeman’s initial seed of an idea. (Roger Ailes 1970; Cook 6/30/2011) In 2011, Rolling Stone journalist Tim Dickinson will write: “This is an astounding find. It underscores Ailes’s early preoccupation with providing the GOP with a way to do an end run around skeptical journalists.” (Dickinson 7/1/2011)
Focus on Television - Ailes insists that any such media plan should focus on television and not print. Americans are “lazy,” he writes, and want their thinking done for them: “Today television news is watched more often than people read newspapers, than people listen to the radio, than people read or gather any other form of communication. The reason: People are lazy. With television you just sit—watch—listen. The thinking is done for you.” Ailes says the Nixon administration should create its own news network “to provide pro-administration, videotape, hard news actualities to the major cities of the United States.” Other television news outlets such as NBC News, ABC News, CBS News, and PBS News, are “the enemy,” he writes, and suggests going around them by creating packaged, edited news stories and interviews directly to local television stations. (Years later, these kinds of “news reports” will be called “video news releases,” or VNRs, and will routinely be used by the George W. Bush administration and others—see March 15, 2004, May 19, 2004, March 2005, and March 13, 2005. They will be outlawed in 2005—see May 2005.) “This is a plan that places news of importance to localities (senators and representatives are newsmakers of importance to their localities) on local television news programs while it is still news. It avoids the censorship, the priorities, and the prejudices of network news selectors and disseminators.” Ailes and his colleagues include detailed cost analyses and production plans for such news releases. In a side note on the document, Ailes writes: “Basically a very good idea. It should be expanded to include other members of the administration such as cabinet involved in activity with regional or local interest. Also could involve GOP governors when in DC. Who would purchase equipment and run operation—White House? RNC [Republican National Committee]? Congressional caucus? Will get some flap about news management.”
Dirty Tricks - Ailes suggests planting “volunteers” within the Wallace campaign, referring to segregationist George Wallace (D-AL), whose third-party candidacy in 1968 almost cost Nixon the presidency. Ailes knows Wallace is planning a 1972 run as well, and is apparently suggesting a “mole” to either gather intelligence, carry out sabotage, or both. (Wallace’s plans for another run will be cut short by an assassination attempt—see May 15, 1972.) Ailes also suggests having his firm film interviews with Democrats who support Nixon’s Vietnam policies, such as Senators John Stennis (D-MS) and John McClellan (D-AR). Though Stennis and McClellan would believe that the interviews were for actual news shows, they would actually be carried out by Ailes operatives and financed by a Nixon campaign front group, the “Tell it to Hanoi Committee.” In June 1970, someone in the Nixon administration scuttles the plan, writing: “[T]he fact that this presentation is White House directed, unbeknownst to the Democrats on the show, presents the possibility of a leak that could severely embarrass the White House and damage significantly its already precarious relationship with the Congress. Should two powerful factors like Stennis and McClellan discover they are dupes for the administration the scandal could damage the White House for a long time to come.”
Volunteers to Head Program - Ailes writes that he wants to head any such “news network,” telling Haldeman: “Bob—if you decide to go ahead we would as a production company like to bid on packaging the entire project. I know what has to be done and we could test the feasibility for 90 days without making a commitment beyond that point.” Haldeman will grant Ailes’s request in November 1970, and will give the project a name: “Capitol News Service.” Haldeman will write: “With regard to the news programming effort as proposed last summer, Ailes feels this is a good idea and that we should be going ahead with it. Haldeman suggested the name ‘Capitol News Service’ and Ailes will probably be doing more work in this area.” Documents fail to show whether the “Capitol News Service” is ever actually implemented. (Roger Ailes 1970; Cook 6/30/2011)
Television News Incorporated - Ailes will be fired from the Nixon administration in 1971; he will go on to start a similar private concern, “Television News Incorporated” (TVN—see 1971-1975), an ideological and practical predecessor to Fox News. Dickinson will write: “More important, [the document] links the plot to create what would become Television News Incorporated—the Ailes-helmed ‘fair and balanced’ mid-1970s precursor to Fox News—to the Nixon White House itself.” (Cook 6/30/2011; Dickinson 7/1/2011) A former business colleague of Ailes’s will say in 2011: “Everything Roger wanted to do when he started out in politics, he’s now doing 24/7 with his network [Fox News]. It’s come full circle.” (Dickinson 5/25/2011)

President Nixon meets with FBI Director J. Edgar Hoover, CIA Director Richard Helms, and the heads of the NSA and DIA to discuss a proposed new domestic intelligence system. His presentation is prepared by young White House aide Tom Charles Huston (derisively called “Secret Agent X-5” behind his back by some White House officials). The plan is based on the assumption that, as Nixon says, “hundreds, perhaps thousands, of Americans—mostly under 30—are determined to destroy our society.” Nixon complains that the various US intelligence agencies spend as much time battling with one another over turf and influence as they do working to locate threats to national security both inside and outside of the country. The agencies need to prove the assumed connections between the antiwar demonstrators and Communists. The group in Nixon’s office will now be called the “Interagency Committee on Intelligence,” Nixon orders, with Hoover chairing the new ad hoc group, and demands an immediate “threat assessment” about domestic enemies to his administration. Huston will be the White House liaison. Historian Richard Reeves will later write: “The elevation of Huston, a fourth-level White House aide, into the company of Hoover and Helms was a calculated insult. Nixon was convinced that both the FBI and the CIA had failed to find the links he was sure bound domestic troubles and foreign communism. But bringing them to the White House was also part of a larger Nixon plan. He was determined to exert presidential control over the parts of the government he cared most about—the agencies dealing with foreign policy, military matters, intelligence, law, criminal justice, and general order.” (Reeves 2001, pp. 229-230)

President Nixon approves the “Huston Plan” for greatly expanding domestic intelligence-gathering by the FBI, CIA and other agencies. Four days later he rescinds his approval. (Washington Post 2008) Nixon aide Tom Charles Huston comes up with the plan, which involves authorizing the CIA, FBI, NSA, and military intelligence agencies to escalate their electronic surveillance of “domestic security threats” in the face of supposed threats from Communist-led youth agitators and antiwar groups (see June 5, 1970). The plan would also authorize the surreptitious reading of private mail, lift restrictions against surreptitious entries or break-ins to gather information, plant informants on college campuses, and create a new, White House-based “Interagency Group on Domestic Intelligence and Internal Security.” Huston’s Top Secret memo warns that parts of the plan are “clearly illegal.” Nixon approves the plan, but rejects one element—that he personally authorize any break-ins. Nixon orders that all information and operations to be undertaken under the new plan be channeled through his chief of staff, H. R. Haldeman, with Nixon deliberately being left out of the loop. The first operations to be undertaken are using the Internal Revenue Service to harass left-wing think tanks and charitable organizations such as the Brookings Institution and the Ford Foundation. Huston writes that “[m]aking sensitive political inquiries at the IRS is about as safe a procedure as trusting a whore,” since the administration has no “reliable political friends at IRS.” He adds, “We won’t be in control of the government and in a position of effective leverage until such time as we have complete and total control of the top three slots of the IRS.” Huston suggests breaking into the Brookings Institute to find “the classified material which they have stashed over there,” adding: “There are a number of ways we could handle this. There are risks in all of them, of course; but there are also risks in allowing a government-in-exile to grow increasingly arrogant and powerful as each day goes by.” (Reeves 2001, pp. 235-236) In 2007, author James Reston Jr. will call the Huston plan “arguably the most anti-democratic document in American history… a blueprint to undermine the fundamental right of dissent and free speech in America.” (Reston 2007, pp. 102)

After President Nixon approves of the so-called “Huston Plan” to implement a sweeping new domestic intelligence and internal security apparatus (see July 14, 1970), FBI director J. Edgar Hoover brings the plan’s author, White House aide Tom Charles Huston (see June 5, 1970), into his office and vents his disapproval. The “old ways” of unfettered wiretaps, political infiltration, and calculated break-ins and burglaries are “too dangerous,” he tells Huston. When, not if, the operations are revealed to the public, they will open up scrutiny of US law enforcement and intelligence agencies, and possibly reveal other, past illegal domestic surveillance operations that would embarrass the government. Hoover says he will not share FBI intelligence with other agencies, and will not authorize any illegal activities without President Nixon’s personal, written approval. The next day, Nixon orders all copies of the decision memo collected, and withdraws his support for the plan. (Reeves 2001, pp. 236-237) W. Mark Felt, the deputy director of the FBI, later calls Huston “a kind of White House gauleiter over the intelligence community.” Washington Post reporter Bob Woodward will note that the definition of “gauleiter” is, according to Webster’s Dictionary, “the leader or chief officoal of a political district under Nazi control.” (Woodward 2005, pp. 33-34)

Book cover of the Pentagon Papers.Book cover of the Pentagon Papers. [Source: Daniel Ellsberg]The New York Times receives a huge amount of secret Defense Department documents and memos that document the covert military and intelligence operations waged by previous administrations in Vietnam (see January 15, 1969). The documents are leaked by Daniel Ellsberg, a former Defense Department official who worked in counterintelligence and later for the RAND Corporation while remaining an active consultant to the government on Vietnam. Ellsberg, a former aide to Secretary of State and National Security Adviser Henry Kissinger and a member of the task force that produced the Defense Department documents, has, over his tenure as a senior government official, become increasingly disillusioned with the actions of the US in Vietnam. (Herda 1994) The documents are given to Times reporter Neil Sheehan by Ellsberg (see May 1969). (Bernstein and Woodward 1974, pp. 313)
Ellsberg Tried to Interest Senators - After he and his friend Anthony Russo had copied the documents (see September 29, 1969), Ellsberg had spent months attempting to persuade several antiwar senators, including William Fulbright (D-AR), Charles Mathias Jr (R-MD), George McGovern (D-SD), and Paul “Pete” McCloskey (R-CA), to enter the study into the public record, all to no avail. But McGovern suggested that Ellsberg provide copies of the documents either to the New York Times or the Washington Post. Ellsberg knew Sheehan in Vietnam, and decided that the Times reporter was his best chance for making the documents public. (Reeves 2001, pp. 333; Moran 2007) Ellsberg originally gave copies of the documents—later dubbed the “Pentagon Papers”—to Phil Geyelin of the Washington Post, but the Post’s Katherine Graham and Ben Bradlee decided not to publish any of the documents. Ellsberg then gave a copy to Sheehan.
Documents Prove White House Deceptions - The documents include information that showed former President Dwight D. Eisenhower had made a secret commitment to help the French defeat the insurgents in Vietnam. They also show that Eisenhower’s successor, John F. Kennedy, had used a secret “provocation strategy” to escalate the US’s presence into a full-blown war that eventually led to the infamous Gulf of Tonkin incident. The documents also show that Kennedy’s successor, Lyndon Johnson, had planned from the outset of his presidency to expand the war (Spartacus Schoolnet 8/2007) , and show how Johnson secretly paved the way for combat troops to be sent to Vietnam, how he had refused to consult Congress before committing both ground and air forces to war, and how he had secretly, and illegally, shifted government funds from other areas to fund the war. Finally, the documents prove that all three presidents had broken Constitutional law in bypassing Congress and sending troops to wage war in Vietnam on their own authority. (Herda 1994)
Times Publishes Against Legal Advice - The Times will begin publishing them in mid-June 1971 (see June 13, 1971) after putting Sheehan and several other reporters up in the New York Hilton to sift through the mountain of photocopies and the senior editors, publishers, and lawyers argued whether or not to publish such a highly classified set of documents. The management will decide, against the advice of its lawyers, to publish articles based on the documents as well as excerpts from the documents themselves. (Moran 2007)

The US Supreme Court, in what becomes informally known as the “Keith case,” upholds, 8-0, an appellate court ruling that strikes down warrantless surveillance of domestic groups for national security purposes. The Department of Justice had wiretapped, without court warrants, several defendants charged with destruction of government property; those wiretaps provided key evidence against the defendants. Attorney General John Mitchell refused to disclose the source of the evidence pursuant to the “national security” exception to the Omnibus Crime Control and Safe Streets Act of 1968. The courts disagreed, and the government appealed the decision to the Supreme Court, which upheld the lower courts’ rulings against the government in a unanimous verdict. The Court held that the wiretaps were an unconstitutional violation of the Fourth Amendment, establishing the judicial precedent that warrants must be obtained before the government can wiretap a US citizen. (US Supreme Court 6/19/1972; Bernstein and Woodward 1974, pp. 258-259) Critics of the Nixon administration have long argued that its so-called “Mitchell Doctrine” of warrantlessly wiretapping “subversives” has been misused to spy on anyone whom Nixon officials believe may be political enemies. (Bernstein and Woodward 1974, pp. 258-259) As a result of the Supreme Court’s decision, Congress passes the Foreign Intelligence Surveillance Act. (Conyers 5/14/2003)
Opinion of Justice Powell - Writing for the Court, Justice Lewis Powell observes: “History abundantly documents the tendency of Government—however benevolent and benign its motives—to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the government attempts to act under so vague a concept as the power to protect ‘domestic security.’ Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent.” (US Supreme Court 6/19/1972)
Justice Department Wiretapped Reporters, Government Officials - In February 1973, the media will report that, under the policy, the Justice Department had wiretapped both reporters and Nixon officials themselves who were suspected of leaking information to the press (see May 1969 and July 26-27, 1970), and that some of the information gleaned from those wiretaps was given to “Plumbers” E. Howard Hunt and G. Gordon Liddy for their own political espionage operations. (Bernstein and Woodward 1974, pp. 258-259)
Conyers Hails Decision 30 Years Later - In 2003, Representative John Conyers (D-MI) will say on the floor of the House: “Prior to 1970, every modern president had claimed ‘inherent Executive power’ to conduct electronic surveillance in ‘national security’ cases without the judicial warrant required in criminal cases by the Fourth Amendment to the Constitution. Then Attorney General John Mitchell, on behalf of President Richard Nixon sought to wiretap several alleged ‘domestic’ terrorists without warrants, on the ground that it was a national security matter. Judge [Damon] Keith rejected this claim of the Sovereign’s inherent power to avoid the safeguard of the Fourth Amendment. He ordered the government to produce the wiretap transcripts. When the Attorney General appealed to the US Supreme Court, the Court unanimously affirmed Judge Keith. The Keith decision not only marked a watershed in civil liberties protection for Americans. It also led directly to the current statutory restriction on the government’s electronic snooping in national security cases.” (Conyers 5/14/2003)

CIA Counterintelligence Director James Angleton.CIA Counterintelligence Director James Angleton. [Source: CI Centre.com]CIA Director James Schlesinger orders an internal review of CIA surveillance operations against US citizens. The review finds dozens of instances of illegal CIA surveillance operations against US citizens dating back to the 1950s, including break-ins, wiretaps, and the surreptitious opening of personal mail. The earlier surveillance operations were not directly targeted at US citizens, but against “suspected foreign intelligence agents operating in the United States.” Schlesinger is disturbed to find that the CIA is currently mounting illegal surveillance operations against antiwar protesters, civil rights organizations, and political “enemies” of the Nixon administration. In the 1960s and early 1970s, CIA agents photographed participants in antiwar rallies and other demonstrations. The CIA also created a network of informants who were tasked to penetrate antiwar and civil rights groups and report back on their findings. At least one antiwar Congressman was placed under surveillance, and other members of Congress were included in the agency’s dossier of “dissident Americans.” As yet, neither Schlesinger nor his successor, current CIA Director William Colby, will be able to learn whether or not Schlesinger’s predecessor, Richard Helms, was asked by Nixon officials to perform such illegal surveillance, though both Schlesinger and Colby disapproved of the operations once they learned of them. Colby will privately inform the heads of the House and Senate Intelligence Committees of the domestic spying engaged in by his agency. The domestic spying program was headed by James Angleton, who is still serving as the CIA’s head of counterintelligence operations, one of the most powerful and secretive bureaus inside the agency. It is Angleton’s job to maintain the CIA’s “sources and methods of intelligence,” including the prevention of foreign “moles” from penetrating the CIA. But to use counterintelligence as a justification for the domestic spying program is wrong, several sources with first-hand knowledge of the program will say in 1974. “Look, that’s how it started,” says one. “They were looking for evidence of foreign involvement in the antiwar movement. But that’s not how it ended up. This just grew and mushroomed internally.” The source continues, speaking hypothetically: “Maybe they began with a check on [Jane] Fonda. They began to check on her friends. They’d see her at an antiwar rally and take photographs. I think this was going on even before the Huston plan” (see July 26-27, 1970 and December 21, 1974). “This wasn’t a series of isolated events. It was highly coordinated. People were targeted, information was collected on them, and it was all put on [computer] tape, just like the agency does with information about KGB agents. Every one of these acts was blatantly illegal.” Schlesinger begins a round of reforms in the CIA, a program continued by Colby. (Hersh 12/22/1974 pdf file)

Former CIA director Richard Helms.Former CIA director Richard Helms. [Source: Search.com]Former CIA director Richard Helms indirectly confirms the involvement of the Nixon administration in his agency’s illegal domestic surveillance operations during his testimony before the Senate Watergate investigative committee. Helms tells the committee that he was told by Nixon’s Foreign Intelligence Advisory Board that the CIA could “make a contribution” in domestic intelligence operations. “I pointed out to them very quickly that it could not, there was no way,” Helms testifies. “But this was a matter that kept coming up in the context of feelers: Isn’t there somebody else who can take on these things if the FBI isn’t doing them as well as they should, as there are no other facilities?” (FBI director J. Edgar Hoover’s opposition to the idea of spying on US citizens for Nixon’s political purposes is well documented.) CIA officials say that, despite Helms’s testimony, Helms began the domestic spying program as asked, in the beginning to investigate beliefs that the antiwar movement was permeated by foreign intelligence agents in 1969 and 1970. “It started as a foreign intelligence operation and it bureaucratically grew,” one source says in 1974. “That’s really the answer.” The CIA “simply began using the same techniques for foreigners against new targets here.” The source will say James Angleton, the CIA’s director of counterintelligence (see 1973), began recruiting double agents inside the antiwar and civil rights organizations, and sending in “ringers” to penetrate the groups and report back to the CIA. “It was like a little FBI operation.” Angleton reportedly believes that both the protest groups and the US media are riddled with Soviet intelligence agents, and acts accordingly to keep those groups and organizations under constant watch. One source will say Angleton has a “spook mentality.” Another source will say that Angleton’s counterintelligence bureau is “an independent power in the CIA. Even people in the agency aren’t allowed to deal directly with the CI [counterintelligence] people. Once you’re in it, you’re in it for life.” (Hersh 12/22/1974 pdf file)

Richard Nixon announcing his resignation to the country.Richard Nixon announcing his resignation to the country. [Source: American Rhetoric.com]President Richard Nixon, forced to resign because of the Watergate scandal, begins his last day in office. The morning is marked by “burn sessions” in several rooms of the White House, where aides burn what author Barry Werth calls “potentially troublesome documents” in fireplaces. Nixon’s chief of staff, Alexander Haig, is preparing for the transition in his office, which is overflowing with plastic bags full of shredded documents. Haig says all of the documents are duplicates. Haig presents Nixon with a one-line letter of resignation—“I hereby resign the office of president of the United States”—and Nixon signs it without comment. Haig later describes Nixon as “haggard and ashen,” and recalls, “Nothing of a personal nature was said… By now, there was not much that could be said that we did not already understand.” Nixon gives his resignation speech at 9 p.m. (Nixon 8/8/1974; Nixon 8/8/1974; American Rhetoric 2001; Werth 2006, pp. 3-8) On August 7, Haig told Watergate special prosecutor Leon Jaworski that Congress would certainly pass a resolution halting any legal actions against Nixon. But, watching Nixon’s televised resignation speech, Jaworski thinks, “Not after that speech, Al.” Nixon refuses to accept any responsibility for any of the myriad crimes and illicit actions surrounding Watergate, and merely admits to some “wrong” judgments. Without some expression of remorse and acceptance of responsibility, Jaworski doubts that Congress will do anything to halt any criminal actions against Nixon. (Werth 2006, pp. 30-31) Instead of accepting responsibility, Nixon tells the nation that he must resign because he no longer has enough support in Congress to remain in office. To leave office before the end of his term “is abhorrent to every instinct in my body,” he says, but “as president, I must put the interests of America first.” Jaworski makes a statement after the resignation speech, declaring that “there has been no agreement or understanding of any sort between the president or his representatives and the special prosecutor relating in any way to the president’s resignation.” Jaworski says that his office “was not asked for any such agreement or understanding and offered none.” (Kilpatrick 8/9/1974)

Ford delivering the televised address in which he announces the pardon of Nixon.Ford delivering the televised address in which he announces the pardon of Nixon. [Source: Gerald R. Ford Library and Museum]At 11:01 a.m., President Ford delivers a statement announcing the pardon of former President Richard Nixon to a bank of television cameras and reporters. He calls Watergate and Nixon’s travails “an American tragedy in which we have all played a part.” He says that to withhold a pardon would subject Nixon, and the country, to a drawn-out legal proceeding that would take a year or more, and “[u]gly passions would again be aroused.” The American people would be even more polarized, and the opinions of foreign nations towards the US would sink even further as the highly public testimonies and possible trial of Nixon played out on television and in the press. It is doubtful that Nixon could ever receive a fair trial, Ford says. But Nixon’s fate is not Ford’s ultimate concern, he says, but the fate of the country. His duty to the “laws of God” outweigh his duty to the Constitution, Ford says, and he must “be true to my own convictions and my own conscience. My conscience tells me clearly and certainly that I cannot continue to prolong the bad dreams that continue to reopen a chapter that is closed.… [O]nly I, as president, have the constitutional power to firmly shut and seal this book.… I do believe with all my heart and mind and spirit that I, not as president, but as a humble servant of God, will receive justice without mercy if I fail to show mercy.” Nixon and his family have “suffered enough,” Ford continues, “and will continue to suffer no matter what I do.” Thereby, Ford proclaims a “full, free and absolute pardon upon Richard Nixon for all offenses against the United States which he… has committed or may have committed or taken part in” duiring his presidency. On camera, Ford signs the pardon document. (Werth 2006, pp. 320-321)

President Ford names outgoing chief of staff Alexander Haig to be supreme allied commander in Europe, provoking an outcry in Congress and unprecedented demands that Haig be confirmed for the post by the Senate Armed Services Committee. Senator William Proxmire (D-WI) says, “I’d like to put him under oath to learn his role in the Nixon pardon” (see September 8, 1974). Haig will not be compelled to testify before the committee, but he weathers another scare, this one from inside the White House. Haig is told by former Nixon White House lawyer Fred Buzhardt, who now works for Ford, that the group preparing Ford for his upcoming House testimony on the pardon (see Mid-October 1974) has “prepared sworn testimony for the president that could very well result in your indictment,” as Haig will later write. Haig storms to the White House, reads the testimony, and demands an immediate audience with Ford. White House staffers refuse him. Haig then threatens to announce his knowledge of “a secret effort by Ford people to hurry Nixon out of the presidency behind Ford’s back.” Haig gets the meeting. He learns that Ford has not read the testimony, and decides that Buzhardt’s threat is hollow. (Werth 2006, pp. 335-336)

President Ford testifies before a House subcommittee about his pardon of President Nixon (see September 8, 1974). When told, “People question whether or not in fact there was a deal” between Nixon and Ford—the presidency traded for a pardon—Ford replies, “There was no deal, period, under no circumstances.” (Werth 2006, pp. 333) Ford’s testimony is “only the second time in history that the president had ever done that,” Deputy Chief of Staff Dick Cheney will later recall, marveling at Ford’s near-unprecedented agreement. Cheney is incorrect; not only did Abraham Lincoln testify before the House Judiciary Committee in 1862 about a news leak, but both George Washington and Woodrow Wilson had also testified before Congress. (Dubose and Bernstein 2006, pp. 28)

Nelson Rockefeller is sworn in as vice president (see August 20, 1974). (Rockefeller Family Archives 6/7/2007)
Bad Blood and Confirmation Difficulties - Rockefeller has trouble even before taking office. Branded as a liberal by many in the Republican Party, and winning as many enemies as friends with his outsized ego and gladhanding demeanor, Rockefeller garnered swift and obdurate resistance particularly from the right wing both outside the White House (see August 24, 1974) and in (see September 21, 1974 and After). During the Senate’s confirmation hearings, many Democrats and some Republicans relished forcing Rockefeller, one of the wealthiest men in the country, to open his finances to public scrutiny. Even President Ford privately expresses his astonishment. “Can you imagine?” he asked during the hearings. “Nelson lost $30 million in one year and it didn’t make any difference.” When it was revealed that Rockefeller had given huge personal contributions to lawmakers and government officials—including Secretary of State Henry Kissinger—in the form of “loans” that never needed repaying, the Senate hearings became even more inquisitorial. The hearings dragged on for months until Ford personally intervened, telling House and Senate leaders that it was “in the national interest that you confirm Rockefeller, and I’m asking you to move as soon as possible.” (US Senate 7/7/2007)
Cheney Wanted Reagan - Deputy Chief of Staff Dick Cheney, far more conservative than either Ford or Rockefeller, opposes Rockefeller’s influence from the start, and works with his boss, Chief of Staff Donald Rumsfeld, to minimize Rockefeller’s influence. In 1986, Cheney will say that Ford “should have thought of Ronald Reagan as vice president in the summer of 1974, if you are talking strictly in political terms.” (Dubose and Bernstein 2006, pp. 38)
Domestic Squabbles - Both Ford and Rockefeller want the new vice president to be what Ford calls “a full partner” in his administration, particularly on domestic issues. Ford appoints him to chair the Domestic Council, but behind the scenes, Rockefeller’s implacable enemy, Rumsfeld, who sees Rockefeller as a “New Deal” economic liberal, blocks his influence at every term, both from personal and ideological dislike and from a desire to keep power in the White House to himself and his small, close-knit aides. (Cheney, ever attentive to indirect manipulations, inflames Rumsfeld’s dislike of Rockefeller even further by suggesting to his nakedly ambitious boss that if Rockefeller was too successful in implementing domestic policy, he would be perceived as “the man responsible for drafting the agenda of 1976,” thus limiting Rumsfeld’s chances of being named vice president in Ford’s re-election campaign (see November 4, 1975 and After). When Rockefeller tries to implement Ford’s suggested policy that domestic policymakers report to Ford through Rockefeller, Rumsfeld interferes. When Rockefeller names one of his trusted assistants, James Cannon, to head the Domestic Council, Rumsfeld slashes the Council’s budget almost to zero. When Rockefeller proposes a $100 billion Energy Independence Authority, with the aim to reduce and perhaps even end the nation’s dependency on foreign energy sources, Rumsfeld joins Ford’s economic and environmental advisers to block its creation. When Rockefeller proposes an idea for the president to Rumsfeld, Rumsfeld hands it off to Cheney, who ensures that it dies a quiet, untraceable bureaucratic death.
Rockefeller Neutralized - Cheney later recalls that Rockefeller “came to a point where he was absolutely convinced that Don Rumsfeld and myself were out to scuttle whatever new initiatives he could come up with.” Rumsfeld and other Ford staffers ensure that Rockefeller is not involved in key policy meetings; when Ford proposes large cuts in federal taxes and spending, Rockefeller complains, “This is the most important move the president has made, and I wasn’t even consulted.” Asked what he is allowed to do as vice president, Rockefeller answers: “I go to funerals. I go to earthquakes.” He says, only half sardonically, that redesigning the vice-presidential seal is “the most important thing I’ve done.” (Dubose and Bernstein 2006, pp. 38-39; US Senate 7/7/2007)
Following in Rockefeller's Footsteps - Ironically, when Cheney becomes vice president in 2001, he uses what Rockefeller intended to do as a model for his own, extremely powerful vice presidency. James Cannon, who came into the Ford administration with Rockefeller, will marvel in 2006, “Cheney is now doing what he and Rumsfeld blocked Rockefeller from doing—influencing policy.” (Dubose and Bernstein 2006, pp. 39-40)

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” (Hersh 12/22/1974 pdf file)

Vice President Nelson Rockefeller (see December 19, 1974 and After) is instrumental in keeping Senate Democrats from finding out too much about the intelligence community’s excesses. When the New York Times reveals the existence of a decades-old illegal domestic surveillance program run by the CIA (see December 21, 1974), President Ford heads off calls from Democrats to investigate the program by appointing the “Rockefeller Commission” to investigate in the Democrats’ stead. Senate Democrats, unimpressed with the idea, create the Church Committee to investigate the intelligence community (see April, 1976). Rockefeller is adept at keeping critical documents out of the hands of the Church Committee and the press. When Senator Frank Church asks for materials from the White House, he is told that the Rockefeller Commission has them; when he asks Rockefeller for the papers, he is told that he cannot have them because only the president can authorize access. One Church aide later calls Rockefeller “absolutely brilliant” in denying them access in a friendly manner. “He winked and smiled and said, ‘Gee, I want to help you but, of course I can’t—not until we’ve finished our work and the president approves it,’” the aide recalls. Senator John Tower (R-TX), the vice chairman of the committee, will later reflect, “We were very skillfully finessed.” But even Rockefeller, who has his own history of involvement with the CIA, is taken aback at the excesses of the CIA, particularly its history of assassinating foreign leaders. Rockefeller will eventually turn that information over to the Church Committee, giving that body some of the most explosive evidence as yet made public against the agency. (US Senate 7/7/2007)

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. (Dubose and Bernstein 2006, pp. 36-37) Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” (Dubose and Bernstein 2006, pp. 34-35)

The Senate Select Committee to Study Governmental Operations releases its report, “Alleged Assassination Plots Involving Foreign Leaders,” which finds “concrete evidence of at least eight plots involving the CIA to assassinate Fidel Castro from 1960 to 1965.” (US Congress 12/18/1975)

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). (Spartacus Educational 2/16/2006) The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. (Haines 1/20/2003)
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” (Spartacus Educational 2/16/2006) The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” (Haines 1/20/2003)

President Ford issues Executive Order 11905, which limits the power of the CIA, the NSA, and military intelligence to engage in surveillance of US citizens. Perhaps its most well-known provision is a total ban on “political assassinations” by US government personnel. (Gerald R. Ford 2/18/1976; Roberts 2008, pp. 38) The provision is sparked by the Church Commission’s finding (see April, 1976) that assassination is “unacceptable in our society,” and a political embarassment, especially botched attempts such as the CIA’s efforts to kill Cuba’s Fidel Castro. (Grant J. Lilly 4/6/2006)

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) (Mooney 11/5/2001; History Matters Archive 3/27/2002; Assassination Archives and Research Center 11/23/2002)
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. (Spartacus Educational 12/18/2002)
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. (Assassination Archives and Research Center 11/23/2002)
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” (Haines 1/20/2003)

Advertisement for Nixon/Frost interviews.Advertisement for Nixon/Frost interviews. [Source: Bamboo Trading (.com)]Former President Richard Nixon, generally acknowledged as having bested his interviewer David Frost in the first rounds of interviews (see April 6, 1977), now defends his support for the infamous Huston Plan, admitted by the plan’s author himself to be illegal in its breathtaking contempt for civil liberties and the rule of Constitutional law. Former Watergate prosecutor Philip Lacovara had told Frost’s aide James Reston Jr. that it was surprising Huston was not taken out and shot. Reston will write acidly: “Not only was Tom Charles Huston not taken out and shot, the plan was calmly considered and signed by Nixon, and was in force for a week, until J. Edgar Hoover objected on territorial rather than philosophical grounds (see July 26-27, 1970). Only then was approval rescinded (although many felt it remained in effect under the code name COINTELPRO).” Reston will write that, during this interview, Nixon paints a picture of an America engulfed in armed insurrection, a portrait so convincing that the Huston Plan actually seems a rational response. Frost fails to press the point that the antiwar protests were largely nonviolent and not a threat to national security. (Reston 2007, pp. 102-105) Frost does ask that if this was indeed so vital to national security, why not ask Congress to make such acts legal? “In theory,” Nixon replies, “this would be perfect, but in practice, it won’t work.” It would merely alert the targeted dissenters and raise a public outcry. (Time 5/30/1977) This part of the interview sessions will be aired on May 19, 1977. (Landmark Cases 8/28/2007)

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. (Tien 9/27/2001; Legal Information Institute 11/30/2004) On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. (US Senate 9/14/2001; Senator Jane Harman 2/1/2006)

H. R. Haldeman’s “The Ends of Power.”H. R. Haldeman’s “The Ends of Power.” [Source: Amazon (.com)]Former Nixon aide H. R. Haldeman, in his autobiography The Ends of Power, advances his own insider theory of the genesis of the Watergate burglaries (see July 26-27, 1970). Haldeman, currently serving a one-year prison sentence for perjuring himself during his testimony about the Watergate cover-up, became so angered while watching David Frost interview former President Nixon, and particularly Nixon’s attempts to pin the blame for Watergate on Haldeman and fellow aide John Ehrlichman (see April 15, 1977), that he decided to write the book to tell his version of events. Some of his assertions:
Nixon, Colson Behind 'Plumbers;' Watergate Burglary 'Deliberately Sabotaged' - He writes that he believes then-President Nixon ordered the operation that resulted in the burglaries and surveillance of the Democratic National Committee (DNC) headquarters because he and Charles Colson, the aide who supervised the so-called “Plumbers” (see Late June-July 1971), were both “infuriated with [DNC chairman Lawrence] O’Brien’s success in using the ITT case against them” (see February 22, 1972). Colson, whom Haldeman paints as Nixon’s “hit man” who was the guiding spirit behind the “Plumbers,” then recruited another White House aide, E. Howard Hunt, who brought in yet another aide, G. Gordon Liddy. Haldeman goes into a more interesting level of speculation: “I believe the Democratic high command knew the break-in was going to take place, and let it happen. They may even have planted the plainclothesman who arrested the burglars. I believe that the CIA monitored the Watergate burglars throughout. And that the overwhelming evidence leads to the conclusion that the break-in was deliberately sabotaged.” O’Brien calls Haldeman’s version of events “a crock.” As for Haldeman’s insinuations that the CIA might have been involved with the burglaries, former CIA director Richard Helms says, “The agency had nothing to do with the Watergate break-in.” Time magazine’s review of the book says that Haldeman is more believable when he moves from unverifiable speculation into provable fact. One such example is his delineation of the conspiracy to cover up the burglaries and the related actions and incidents. Haldeman writes that the cover-up was not a “conspiracy” in the legal sense, but was “organic,” growing “one step at a time” to limit political damage to the president.
Story of Kennedy Ordering Vietnamese Assassination Actually True - He suggests that the evidence Hunt falsified that tried to blame former president John F. Kennedy of having then-South Vietnamese President Ngo Dinh Diem assassination (see Mid-September 1971) may have pointed to the actual truth of that incident, hinting that Kennedy may have ordered the assassination after all.
US Headed Off Two Potentially Catastrophic Nuclear Incidents with USSR, China - He also writes of a previously unsuspected incident where Nixon and other US officials convinced the Soviets not to attack Chinese nuclear sites. And Haldeman tells of a September 1970 incident where the US managed to head off a second Cuban Missile Crisis. Both stories of US intervention with the Soviets are strongly denied by both of Nixon’s Secretaries of State, Henry Kissinger, and William Rogers.
Duality of Nixon's Nature - Haldeman says that while Nixon carried “greatness in him,” and showed strong “intelligence, analytical ability, judgment, shrewdness, courage, decisiveness and strength,” he was plagued by equally powerful flaws. Haldeman writes that Nixon had a “dirty, mean, base side” and “a terrible temper,” and describes him as “coldly calculating, devious, craftily manipulative… the weirdest man ever to live in the White House.” For himself, Haldeman claims to have always tried to give “active encouragement” to the “good” side of Nixon and treat the “bad” side with “benign neglect.” He often ignored Nixon’s “petty, vindictive” orders, such as giving mass lie detector tests to employees of the State Department as a means of finding security leaks. He writes that while he regrets not challenging Nixon more “frontally” to counter the president’s darker impulses, he notes that other Nixon aides who had done so quickly lost influence in the Oval Office. Colson, on the other hand, rose to a high level of influence by appealing to Nixon’s darker nature. Between the two, Haldeman writes, the criminal conspiracy of Watergate was created. (Colson disputes Haldeman’s depiction of his character as well as the events of the conspiracy.) Haldeman himself never intended to do anything illegal, denies any knowledge of the “Gemstone” conspiracy proposal (see January 29, 1972), and denies ordering his aide Gordon Strachan to destroy evidence (see June 18-19, 1972).
Reconstructing the 18 1/2 Minute Gap - Haldeman also reconstructs the conversation between himself and Nixon that was erased from the White House tapes (see June 23, 1972 and July 13-16, 1973). Time notes that Haldeman reconstructs the conversation seemingly to legally camouflage his own actions and knowledge, “possibly to preclude further legal charges against him…” According to Haldeman’s reconstruction, Nixon said, “I know one thing. I can’t stand an FBI interrogation of Colson… Colson can talk about the president, if he cracks. You know I was on Colson’s tail for months to nail Larry O’Brien on the [Howard] Hughes deal (see April 30 - May 1, 1973; O’Brien had worked for Hughes, and Nixon was sure O’Brien had been involved in illegalities). Colson told me he was going to get the information I wanted one way or the other. And that was O’Brien’s office they were bugging, wasn’t it? And who’s behind it? Colson’s boy Hunt. Christ. Colson called [deputy campaign chief Jeb Magruder] and got the whole operation started. Right from the g_ddamn White House… I just hope the FBI doesn’t check the office log and put it together with that Hunt and Liddy meeting in Colson’s office.” Time writes, “If the quotes are accurate, Nixon is not only divulging his own culpability in initiating the bugging but is also expressing a clear intent to keep the FBI from learning about it. Thus the seeds of an obstruction of justice have been planted even before the celebrated June 23 ‘smoking gun’ conversation, which ultimately triggered Nixon’s resignation from office.” Haldeman says he isn’t sure who erased the tape, but he believes it was Nixon himself. Nixon intended to erase all the damning evidence from the recordings, but since he was, Haldeman writes, “the least dexterous man I have ever known,” he quickly realized that “it would take him ten years” to erase everything.
'Smoking Gun' Allegations - Haldeman also makes what Time calls “spectacular… but unverified” allegations concerning the June 23, 1972 “smoking gun” conversations (see June 23, 1972). The focus of that day’s discussion was how the White House could persuade the CIA to head off the FBI’s investigation of the Watergate burglary. The tape proved that Nixon had indeed attempted to block the criminal investigation into Watergate, and feared that the money found on the burglars would be traced back to his own re-election campaign committee. Haldeman writes that he was confused when Nixon told him to tell the CIA, “Look, the problem is that this will open up the whole Bay of Pigs thing again.” When Haldeman asked Helms to intercede with the FBI, and passed along Nixon’s warning that “the Bay of Pigs may be blown,” Helms’s reaction, Haldeman writes, was electric. “Turmoil in the room, Helms gripping the arms of his chair, leaning forward and shouting, ‘The Bay of Pigs had nothing to do with this. I have no concern about the Bay of Pigs.’” Haldeman writes, “I was absolutely shocked by Helms‘[s] violent reaction. Again I wondered, what was such dynamite in the Bay of Pigs story?” Haldeman comes to believe that the term “Bay of Pigs” was a reference to the CIA’s secret attempts to assassinate Cuban dictator Fidel Castro. The CIA had withheld this info from the Warren Commission, the body that investigated the assassination of President Kennedy, and Haldeman implies that Nixon was using the “Bay of Pigs thing” as some sort of blackmail threat over the CIA. Haldeman also hints, very vaguely, that Nixon, when he was vice president under Dwight D. Eisenhower, was a chief instigator of the actual Bay of Pigs invasion. (Time notes that while Vice President Nixon probably knew about the plans, “he certainly had not been their author.”)
Other Tidbits - Haldeman writes that Nixon’s taping system was created to ensure that anyone who misrepresented what Nixon and others said in the Oval Office could be proven wrong, and that Nixon had Kissinger particularly in mind. Nixon kept the tapes because at first he didn’t believe he could be forced to give them up, and later thought he could use them to discredit former White House counsel John Dean. He says Nixon was wrong in asserting that he ordered Haldeman to get rid of the tapes. Haldeman believes the notorious “deep background” source for Washington Post reporters Carl Bernstein and Bob Woodward was actually Fred Fielding, Dean’s White House deputy. Interestingly, Haldeman apparently discovered the real identity of “Deep Throat” in 1972 to be senior FBI official W. Mark Felt (see October 19, 1972). It is unclear why Haldeman now writes that Fielding, not Felt, was the Post source.
Not a Reliable Source - Time notes that Haldeman’s book is far from being a reliable source of information, characterizing it as “badly flawed, frustratingly vague and curiously defensive,” and notes that “[m]any key sections were promptly denied; others are clearly erroneous.” Time concludes, “Despite the claim that his aim was finally to ‘tell the truth’ about the scandal, his book is too self-protective for that.” And it is clear that Haldeman, though he writes how the cover-up was “morally and legally the wrong thing to do—so it should have failed,” has little problem being part of such a criminal conspiracy. The biggest problem with Watergate was not that it was illegal, he writes, but that it was handled badly. He writes, “There is absolutely no doubt in my mind today that if I were back at the starting point, faced with the decision of whether to join up, even knowing what the ultimate outcome would be, I would unhesitatingly do it.” (Time 2/27/1978; Spartacus Schoolnet 8/2007)

A photograph of Theodore ‘Ted’ Kaczynski, taken in 1968 while Kaczynski was a young faculty member at the University of California at Berkeley.A photograph of Theodore ‘Ted’ Kaczynski, taken in 1968 while Kaczynski was a young faculty member at the University of California at Berkeley. [Source: George M. Bergman / Wikimedia]An unmailed package is found in a car park at the University of Illinois, Chicago, and brought to Northwestern University in Evanston, Illinois, because of its return address; the addressee now teaches at Rensselaer Polytechnic Institute in Troy, New York. Buckley Crist, the material sciences professor named in the return address on the package cannot identify it, and turns it over to campus security. When Northwestern police officer Terry Marker opens it, it explodes, injuring him slightly. The package contains a pipe bomb packed in a carved wooden box. (BBC 11/12/1987; Lardner and Adams 4/14/1996; Washington Post 1998) The bomb is made of a nine-inch pipe filled with explosive powders and triggered by a nail held by rubber bands that strikes and ignites match heads when the box is opened. (World of Forensic Science 1/1/2005) The package contains 10 $1 commemorative Eugene O’Neill stamps on its outer wrapper. Authorities will later speculate that the bomber may have chosen the O’Neill stamps because the playwright was an ardent supporter of anarchists. (Goldston 5/28/1995) The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). It is believed to be Kaczynski’s first bomb. (Perez-Pena 4/7/1996)

A young Fauzi Hasbi.A young Fauzi Hasbi. [Source: SBS Dateline]Fauzi Hasbi, the son of a separatist leader in the Indonesian province of Aceh, is captured by an Indonesian military special forces unit in 1979 and soon becomes a mole for the Indonesian government. Hasbi becomes a leader in the separatist Free Aceh Movement (GAM), and he also plays a long-time role in Jemaah Islamiyah, an al-Qaeda affiliate. For many years, he literally lives next door to Jemaah Islamiyah leaders Abu Bakar Bashir and Hambali (see April 1991-Late 2000). In 2005, the Australian television program SBS Dateline will present documents that it claims “prove beyond doubt that Fauzi Hasbi had a long association with the [Indonesian] military.” For instance, military documents dating from 1990 and 1995 give him specific spying tasks. (SBS Dateline 10/12/2005) In February 2001, the Indonesian magazine Tempo documents some of Hasbi’s links to the Indonesian military, after he has been linked to a major role the Christmas bombings in Indonesia two months earlier (see December 24-30, 2000 and February 20, 2001). He admits to having some ties to certain high-ranking military figures and says he has had a falling out with GAM, but denies being a traitor to any militant group. (Tempo 2/20/2001; Tempo 2/27/2001) Yet even after this partial exposure, he continues to pose as an Islamist militant for the military. A 2002 document shows that he is even assigned the job of special agent for BIN, Indonesia’s intelligence agency. (SBS Dateline 10/12/2005) A December 2002 report by a US think tank, the International Crisis Group, details his role as a government mole. He and two of his associates are abducted and killed in mysterious circumstances in the Indonesian city of Ambon on February 22, 2003. Seven suspects, including an Indonesian policeman, later admit to the killings but their motive for doing so remains murky. (Agence France-Presse 5/22/2003)

A graduate student at Northwestern University in Evanston, Illinois, John Harris, is injured when he opens a box left at the University’s Technological Institute. The box contains a bomb that explodes when opened. Harris suffers minor cuts and burns. (BBC 11/12/1987; Washington Post 1998) Authorities recognize fundamental similarities between this and a previous Northwestern University bombing (see May 25-26, 1978). This bomb is quite similar in construction to that one, though more sophisticated in construction and design. It consists of a cigar box and a pipe bomb, triggered by a battery-operated filament that ignites explosive powders. (World of Forensic Science 1/1/2005) However, the package contains a number of small, finger-sized pieces of wood glued to its outer container. (Goldston 5/28/1995) The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see May 25-26, 1978 and April 3, 1996).

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). (Jimmy Carter 5/23/1979) The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). (Walden 12/28/2005) While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), (Think Progress 12/20/2005) the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. (Jimmy Carter 5/23/1979; 50 U.S.C. 1802(a); Think Progress 12/20/2005) The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. (Federal Register 2/4/2006)

A parcel mailed from Chicago catches fire in a mailbag aboard American Airlines Flight 444 from Chicago to Washington, DC. The package contains a bomb which was apparently constructed to explode inside the cargo hold. Twelve passengers are treated for smoke inhalation; the flight conducts an emergency landing at Dulles Airport near Washington. (BBC 11/12/1987; Washington Post 1998) The bomb does not ignite because instead of explosive powder, it contains barium nitrate, a powder often used to create green smoke in fireworks. (World of Forensic Science 1/1/2005) The bombing is later shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). After the airline bombing and the subsequent bombing of a United Airlines executive (see June 10, 1980), the FBI ties the previous bombings (see May 25-26, 1978 and May 9, 1979) to this one and code-names the file UNABOM, for “UNiversity and Airline BOMber.” The media will soon dub the unknown assailant the “Unabomber.” (Schwartz and Kovaleski 4/4/1996; World of Forensic Science 1/1/2005) Kaczynski will later express regret for trying to bomb the plane (see April 24, 1995).

Due to apparent problems with the use of intelligence information in criminal proceedings, a set of procedures that later becomes known as the “wall” begins to take shape. The FBI, which performs both criminal and counterintelligence functions, normally obtains two types of warrants: criminal warrants and warrants under the recently passed Foreign Intelligence Surveillance Act (FISA). FISA warrants are thought to be easier to obtain, as the FBI only has to show that there is probable cause to believe the subject is a foreign power or an agent of one. Sometimes a case begins as an intelligence investigation, but results in a criminal prosecution. In court the defense can then argue that the government has abused FISA and obtained evidence by improperly using the lower standard, so any evidence obtained under FISA should not be allowed in court. Although the government can use information it happens to obtain under a FISA warrant for a criminal prosecution, if the purpose of obtaining information under a FISA warrant is for a criminal prosecution, this is in violation of the Fourth Amendment’s prohibition against warrantless searches. To combat this apparent problem, the special FISA Court decides that for a warrant under FISA to be granted, collecting intelligence information must be the primary purpose, although such information can be used in a criminal investigation provided the criminal investigation does not become the primary purpose of the surveillance or search. As a result of these procedures, when the FBI is conducting an intelligence investigation and uncovers evidence of criminal activity, it no longer consults local United States Attorneys’ Offices, but prosecutors within the Justice Department’s Criminal Division. The prosecutors then decide when the local attorney’s office should become involved. (US Department of Justice 11/2004, pp. 21-24 pdf file) The wall will be extended in the 1990s (see July 19, 1995) and will be much criticized before and after 9/11 (see July 1999 and April 13, 2004).

In his Lake Forest, Illinois, home, United Airlines president Percy Wood opens a package that apparently contains a book. It contains both a book and a bomb in the book’s hollowed-out pages. It explodes, causing Wood to suffer cuts and bruises. The initials “FC” are found etched on, or punched into, a piece of pipe from the bomb. (BBC 11/12/1987; Washington Post 1998; World of Forensic Science 1/1/2005) The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). “FC” will later be found to stand for “Freedom Club.” (Booth 1/23/1998; World of Forensic Science 1/1/2005) Authorities will later speculate that Wood may have been targeted in part because of Kaczynski’s strange fascination with wood; he often uses wood in the construction of his bombs. The hollowed-out book, Ice Brothers, is published by Arbor House, whose symbol is a tree leaf. (Lawrence 4/25/1995) The package contains a note asking Wood to read the enclosed book, and noting, “You will find it of great social significance.” The author of Ice Brothers, Sloan Wilson, also wrote The Man in the Gray Flannel Suit, which, according to a 1959 biography of Wilson, “was the definitive epithet for the commuting suburbanite, the status-hungry conformist from Madison Avenue.” Like an earlier bomb (see May 25-26, 1978), this bomb’s package is mailed using postage stamps commemorating the playwright Eugene O’Neill; authorities will speculate that Kaczynski may have chosen the stamps because of O’Neill’s ardent support of anarchists. (Goldston 5/28/1995)

A maintenance worker at the University of Utah in Salt Lake City finds a bomb in a business classroom. The device is defused by the local bomb squad and no one is injured. (BBC 11/12/1987; Washington Post 1998) The bomb will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996).

A parcel addressed to the head of the Vanderbilt University computer science department, Patrick Fischer, explodes, injuring Fischer’s secretary, Janet Smith. The package was originally sent to Fischer at Pennsylvania State University but was later forwarded to Nashville, Tennessee, where Vanderbilt University is located and where Fischer now teaches. (BBC 11/12/1987; Washington Post 1998) Fischer will later describe Smith’s injuries as “nasty lacerations,” and will say, “She made a full recovery, but it was very traumatic for her.” The bomb itself consists of smokeless powder and a large number of match heads. The package has a false return address, stating it comes from LeRoy Bearnson, a professor of electrical engineering at Utah’s Brigham Young University. Bearnson will later say, “I suppose the guy didn’t care which way it went or who got blown up.” FBI agent Oliver “Buck” Revell, who takes part in early phases of the bomb investigation, will later say: “He might pick out an individual, but the person was still a symbolic target to him. I suspect that once he targeted the university research system, it didn’t matter that much who received it. I suspect he felt the country would pick up the symbolism.” The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). When Fischer, along with the rest of the country, learns of Kaczynski’s identity, he will try to find connections between himself and Kaczynski, and come up with only the most tenuous of relationships: Fischer studied at the Massachusetts Institute of Technology (MIT) while Kaczynski studied at nearby Harvard, and Fischer may have shared a Harvard math class with Kaczynski. He also spent time in Salt Lake City, a city with which Kaczynski is familiar. “The agents made it very clear that I was the target,” Fischer will later say. “I still have no idea why, except my feeling is that he chose names at random with certain associations.” (Lardner and Adams 4/14/1996)

An electrical engineering and computer science professor with the University of California at Berkeley, Diogenes Angelakos, picks up what he believes is a turpentine can, left in a common room in the computer science building during construction work. The can, a green, gallon-sized container, has wires dangling from it and a clock-dial attached to the wires. The device is a pipe bomb. It explodes, temporarily blinding Angelakos and severely burning his right hand. (BBC 11/12/1987; Thomas 11/27/1993; Lardner and Adams 4/14/1996; Washington Post 1998) The injuries to his hand and arm prevent him from effectively caring for his wife Helen in her final days; she will die a month later of terminal cancer. “I went to her funeral with my arm in a sling,” Angelakos will later recall. (Thomas 11/27/1993) The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski once worked as a professor at UC-Berkeley.

The Port Authority of New York and New Jersey holds a drill at the World Trade Center based on the scenario of a plane crashing into one of the Twin Towers. Numerous agencies participate in the drill, which is held on a Sunday. As well as the Port Authority, these include the New York City Fire Department, the New York City Police Department, and the Emergency Medical Services. Guy Tozzoli, the director of the Port Authority’s World Trade Department, will describe the drill during a legislative hearing in 1993 (see (March 29, 1993)). He will recall that the Port Authority simulates the “total disaster” of “the airplane hitting the building” and participants simulate “blood coming out of people.” He will add that the drill is “a real preparation for a disaster.” (Rayman 11/12/2001; Dwyer and Flynn 2005, pp. 58-59) (During the hearing, Tozzoli will mistakenly recall the drill being conducted in the late 1970s, but it is in fact held in November 1982. (Dwyer and Flynn 2005, pp. 274) ) The drill follows an incident in 1981, when an Argentine aircraft came within 90 seconds of crashing into the WTC’s North Tower as a result of having problems communicating with air traffic controllers (see February 20, 1981). Asked about the drill shortly after 9/11, Tozzoli will say it was held “just to have people trained within the city for that particular scenario [of a plane hitting the WTC].” The 1982 exercise appears to be the last “joint drill involving all the emergency responders” held at the WTC prior to the 9/11 attacks, 19 years later, according to New York Times reporters Jim Dwyer and Kevin Flynn. (Rayman 11/12/2001; Dwyer and Flynn 2005, pp. 59)

Youssef Nada.Youssef Nada. [Source: Zuma Press/ NewsCom]In November 2001, Swiss investigators will search the home of Youssef Nada, the leader of Al Taqwa Bank, a Swiss bank that had just been shut down by the US and the UN for alleged ties to al-Qaeda, Hamas, and other radical militant groups (see November 7, 2001). Nada and other Al Taqwa directors are prominent members of the Muslim Brotherhood. Newsweek will say, “The Brotherhood, founded in Egypt in 1928 as a religious and quasi-political counterweight to the corrupt and increasingly decadent royalist and colonial governments dominating the Islamic world, always has had two faces: one a peaceful public, proselytizing and social-welfare oriented wing; the other a clandestine, paramilitary wing.… Intelligence and law-enforcement officials say that while some branches and elements of the Brotherhood, such as the offshoots now operating in Egypt and Syria, have pledged to work for their goal of a worldwide Islamic caliphate using peaceful means and electoral politics, the Brotherhood has also spun off many—if not most—of the more violent local and international groups devoted to the cause of Islamic holy war.” Such offshoots will include al-Qaeda and Hamas. (Isikoff and Hosenball 12/24/2004) Swiss investigators discover a 14-page document from December 1982 entitled “The Project.” Nada claims not to know who wrote the document or how he came to have it, and he says he disagrees with most of the contents. The document details a strategic plan whose ultimate goal is “the establishment of the reign of God over the entire world.” The document begins, “This report presents a global vision of an international strategy of Islamic policy.” It recommends to “study of the centers of power locally and worldwide, and the possibilities of placing them under influence,” to contact and support new holy war movements anywhere in the world, to support holy war in Palestine, and “nurtur[e] the sentiment of rancor with regard to Jews.” Swiss investigators who analyze the document will later write that the strategy aims to achieve “a growing influence over the Muslim world. It is pointed out that the [Muslim Brotherhood] doesn’t have to act in the name of the Brotherhood, but can infiltrate existing entities. They can thus avoid being located and neutralized.” The document also advocates creating a network of religious, educational, and charitable institutions in Europe and the US to increase influence there. (Unknown 12/1982; Besson 10/6/2005)

CSA members outside their Arkansas compound. Some CSA members also belong to the Elohim City community.CSA members outside their Arkansas compound. Some CSA members also belong to the Elohim City community. [Source: GifS (.com)]Three white supremacists living in the Elohim City, Oklahoma, compound (see 1973 and After) visit Oklahoma City and make plans to blow up the Murrah Federal Building there. The three are: James Ellison, the leader of the Covenant, Sword, and Arm of the Lord (CSA) who will be arrested in 1985 after a four-day standoff with federal authorities; Kerry Noble; and Richard Wayne Snell, who will be executed for murdering a black police officer and a businessman he erroneously believed to be Jewish (see 9:00 p.m. April 19, 1995). All three men have close ties to the neo-Nazi Aryan Nations (see Early 1970s). The evidence of their plan is released during the investigation of the 1995 Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995), and is collated by former US prosecutor Steven N. Snyder, who once worked out of the Fort Smith, Arkansas District Attorney’s office. The plan involves parking a van or trailer in front of the building and exploding it with rockets detonated by a timer. Snyder will come across the information on the bombing plot while preparing for the trial of a sedition case against a 14-man group of white supremacists, 10 of whom are charged with planning to overthrow the government. (All 14 will be acquitted in a 1988 trial—see Late 1987 - April 8, 1998.) Snyder will get the information from Ellison, who provides information to him as part of his role as chief witness for the prosecution. The other defendants in the trial, many of whom are believed to have had some connection to the bombing plot, will be Richard Butler, the head of Aryan Nations; Robert E. Miles, a former Klansman who heads the Mountain Church of Jesus Christ the Saviour in Cohoctah, Michigan; and Louis R. Beam Jr., a former grand dragon of the Texas Ku Klux Klan and “ambassador at large” of the Aryan Nations. Ellison will tell Snyder that in July 1983, he attends a meeting of extremist groups in Hayden Lake, Idaho, the location of the Aryan Nations headquarters, where he informs them of the death of fellow white supremacist Gordon Kahl in a gun battle with law enforcement agents in Arkansas (see March 13 - June 3, 1983). Snyder’s notes of Ellison’s statement read, “Kahl was the catalyst that made everyone come forth and change the organizations from thinkers to doers.” According to Ellison, the leaders of the various supremacist groups discuss how to overthrow the federal government, using as a sourcebook the novel The Turner Diaries (see 1978), which tells of a successful move by white supremacists to overthrow the government and then commit genocide against Jews and blacks. Ellison will tell Snyder that he volunteers to assassinate federal officials in Arkansas as part of the plot. The leaders discuss blowing up the Murrah Building in Oklahoma City, other federal buildings, and the Dallas office of a Jewish organization. According to Ellison’s trial testimony, in October 1983 Snell and another participant, Steve Scott, “asked me to design a rocket launcher that could be used to destroy these buildings from a distance.” Of Snell, Ellison will testify: “On one of the trips when I was with Wayne, he took me to some of the buildings and asked me to go in the building and check the building out. This kind of thing.” Ellison will tell Snyder that at Snell’s request, he surveills the Murrah Building to assess what it would take to damage and destroy it. He makes preliminary sketches and drawings. According to the preliminary plans, rocket launchers are to be “placed in a trailer or a van so that it could be driven up to a given spot, parked there, and a timed detonating device could be triggered so that the driver could walk away and leave the vehicle set in position, and he would have time to clear the area before any of the rockets launched.… And I was asked to make it so it would fit in either a trailer or a van or a panel truck.” Synder will later say that Snell is embittered towards the government because of the IRS, which took him to court and seized property from him for failure to pay taxes. But, Snyder will add, “you can’t be sure about any of this, because a federal raid, to a lot of these people, is any time the postman brings the mail.” Ellison will be taken into custody after a four-day standoff with state and federal authorities in 1985, only convinced to surrender after white supremacist Robert Millar talks him into giving up (see 1973 and After). Ellison will be convicted of racketeering charges and sentenced to 20 years in prison. He will enter the federal witness protection program until completing his parole and leaving the program on April 21, 1995, two days after the Oklahoma City bombing. (Thomas and Smothers 5/20/1995; Anti-Defamation League 8/9/2002; Nicole Nichols 2003)

The October 1983 bombing of US Marine barracks in Beirut, Lebanon.The October 1983 bombing of US Marine barracks in Beirut, Lebanon. [Source: US Marine Corps.]In June 1982, Israel invaded Lebanon and US Marines were sent to Lebanon as a peacekeeping force in September 1982. On April 18, 1983, the US embassy in Beirut, Lebanon, is bombed by a suicide truck attack, killing 63 people. On October 23, 1983, a Marine barracks in Beirut is bombed by another suicide truck attack, killing 241 Marines. In February 1984, the US military will depart Lebanon. The radical militant group Islamic Jihad will take credit for both attacks (note that this is not the group led by Ayman al-Zawahiri). The group is believed to be linked to Hezbollah. Prior to this year, attacks of this type were rare. But the perceived success of these attacks in getting the US to leave Lebanon will usher in a new era of suicide attacks around the world. The next two years in particular will see a wave of such attacks in the Middle East, many of them committed by the radical militant group Hezbollah. (US Congress 7/24/2003; US Congress 7/24/2003 pdf file) The Beirut bombings will also inspire Osama bin Laden to believe that the US can be defeated by suicide attacks. For instance, he will say in a 1998 interview: “We have seen in the last decade the decline of the American government and the weakness of the American soldier who is ready to wage Cold Wars and unprepared to fight long wars. This was proven in Beirut when the Marines fled after two explosions.” (Laden 5/28/1998) In 1994, he will hold a meeting with a top Hezbollah leader (see Shortly After February 1994) and arrange for some of his operatives to be trained in the truck bombing techniques that were used in Beirut. (9/11 Commission 7/24/2004, pp. 48)

555 Grove Street, Herndon, Virginia. This is the location of the SAAR Foundation/Safa Group and many related businesses.555 Grove Street, Herndon, Virginia. This is the location of the SAAR Foundation/Safa Group and many related businesses. [Source: Paul Sperry]The SAAR Foundation is incorporated in Herndon, Virginia, just outside Washington. It will become an umbrella organization for a cluster of over 100 charities, think tanks, and businesses known as the SAAR network. In 2002, the US government will raid the SAAR network looking for ties to the Al Taqwa Bank and the Muslim Brotherhood (see March 20, 2002). (Farah 2004, pp. 153)

Bin Laden first works for Maktab al-Khidamat from this building in Peshawar, a former British government guesthouse.Bin Laden first works for Maktab al-Khidamat from this building in Peshawar, a former British government guesthouse. [Source: PBS]Bin Laden moves to Peshawar, a Pakistani town bordering Afghanistan, and helps run a front organization for the mujaheddin known as Maktab al-Khidamat (MAK), which funnels money, arms, and fighters from the outside world into the Afghan war. (Weaver 1/24/2000) “MAK [is] nurtured by Pakistan’s state security services, the Inter-Services Intelligence agency, or ISI, the CIA’s primary conduit for conducting the covert war against Moscow’s occupation.” (Moran 8/24/1998) Bin Laden becomes closely tied to the warlord Gulbuddin Hekmatyar, and greatly strengthens Hekmatyar’s opium smuggling operations. (Maurus and Rock 9/14/2001) Hekmatyar, who also has ties with bin Laden, the CIA, and drug running, has been called “an ISI stooge and creation.” (Erikson 11/15/2001) MAK is also known as Al-Kifah and its branch in New York is called the Al-Kifah Refugee Center. This branch will play a pivotal role in the 1993 WTC bombing and also has CIA ties (see January 24, 1994).

Detective Sergeant Peter Caram, the head of the New York Port Authority’s Terrorist Intelligence Unit, has been directed by the assistant superintendent of the Port Authority Police Department to compile a report on the vulnerability of the WTC to a terrorist attack. Having previously worked at the WTC Command, Caram has exclusive knowledge of some of the center’s security weaknesses. On this day he issues his four-page report, titled “Terrorist Threat and Targeting Assessment: World Trade Center.” It looks at the reasoning behind why the WTC might be singled out for attack, and identifies three areas of particular vulnerability: the perimeter of the WTC complex, the truck dock entrance, and the subgrade area (the lower floors below ground level). Caram specifically mentions that terrorists could use a car bomb in the subgrade area—a situation similar to what occurs in the 1993 bombing (see February 26, 1993). (Caram 2001, pp. 5, 84-85; New York County Supreme Court 1/20/2004) This is the first of several reports during the 1980s, identifying the WTC as a potential terrorist target.

Makhtab al-Khidamat offices in the US in the late 1980s. Some of the offices in fact were represented by single individuals.Makhtab al-Khidamat offices in the US in the late 1980s. Some of the offices in fact were represented by single individuals. [Source: National Geographic] (click image to enlarge)Sheikh Abdullah Azzam, bin Laden’s mentor, makes repeated trips to the US and other countries, building up his Pakistan-based organization, Maktab al-Khidamat (MAK), or “Services Office” in English. It is also known as Al-Kifah, which means “struggle.” Azzam founded the Al-Kifah/MAK in 1984 (see Late 1984). Branches open in over 30 US cities, as Muslim-Americans donate millions of dollars to support the Afghan war against the Soviet Union. The most important branch, called the Al-Kifah Refugee Center, opens in Brooklyn, New York (see 1986-1993). Azzam is assassinated in a car bomb attack in late 1989 (see November 24, 1989). Bin Laden soon takes over the organization, which effectively morphs into al-Qaeda. His followers take over the US offices and they become financial conduits for al-Qaeda operations. (Lance 2003, pp. 40-41)

A University of California, Berkeley graduate student, John E. Hauser, picks up a package in the university’s computer science lab. The package is a bomb made up of ammonium nitrate and aluminum powder. It explodes, costing Hauser four fingers from his right hand and severing arteries. (BBC 11/12/1987; Lardner and Adams 4/14/1996; Washington Post 1998) The bomb has apparently been in the lab for two or three days, left on top of a stack of three-ring binders. Hauser thought it was a file box for another student’s computer cards, and picked it up intending to identify its owner. Upon opening it, he hears an odd buzzing sound, then the bomb detonates. Ironically, the victim of a previous bombing, Professor Diogenes Angelakos (see July 2, 1982), hears the explosion, rushes to offer assistance, and ties a tourniquet around Hauser’s arm. Hauser will lose much of the use of his right arm, and will be forced to abandon his dreams of becoming an Air Force fighter pilot and perhaps an astronaut. He will later say, “There is not a day that goes by when I’m not reminded that I don’t have full use of my right hand… from trying to play racquetball to trying to pick up my daughter.” Of the bombing, Hauser will say, “This was as much a target of opportunity as anything else.” The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski once worked as a professor at UC-Berkeley. Both this bombing and the previous one are in Cory Hall, a building close to where Kaczynski once taught. Captain Bill Foley of the Berkeley campus police will later say: “He taught in Campbell Hall and had offices in one of our temporary buildings. If you did a triangle between Campbell and that temporary building you would hit Cory Hall at peak of the triangle.” Cory Hall also houses the engineering and computer science departments, known to be favorite targets of the Unabomber. (Thomas 11/27/1993; Lardner and Adams 4/14/1996) This bomb is more powerful than earlier Unabomber constructions, using a mix of ammonium nitrate and aluminum powder to cause the explosion. The bomb’s shrapnel consists of tacks, nails, and bits of lead. Stamped on the end seal of the bomb’s pipe are the initials “FC,” which will later be found to stand for “Freedom Club.” (World of Forensic Science 1/1/2005)

A suspicious package mailed to the Auburn, Washington, headquarters of the Boeing Aircraft Company is opened and safely disarmed by the local bomb squad. (BBC 11/12/1987; Washington Post 1998) The package containing a pipe bomb gets lost in Boeing’s internal mail system; the package is in the process of being returned to the apparent sender before it draws the attention of Boeing employees, who call the bomb squad. (Lardner and Adams 4/14/1996) The bomb will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski tried to destroy a Boeing aircraft with another bomb six years ago (see November 15, 1979). Like earlier bombs, this bomb contains the initials “FC” engraved on a metal component; authorities will later learn that “FC” stands for “Freedom Club.” (World of Forensic Science 1/1/2005)

Charles Schnabolk.Charles Schnabolk. [Source: Institute for Design Professionals]While the Office of Special Planning is still working on its report about the vulnerability of the World Trade Center to terrorist attack, the New York Port Authority hired security consultant Charles Schnabolk to also review the center’s security systems. (Reeves 10/12/2001; New York County Supreme Court 1/20/2004) Schnabolk was involved in designing the original security system when the WTC complex was built. (Institue for Design Professionals 2009; The Security Design Group 2010) This month his secret report, titled “Terrorism Threat Perspective and Proposed Response for the World Trade Center” is released. It sets out four levels of possible terrorism against the center, and gives examples of each: ”(1) PREDICTABLE—Bomb threats; (2) PROBABLE—Bombing attempts, computer crime; (3) POSSIBLE—Hostage taking; (4) CATASTROPHIC—Aerial bombing, chemical agents in water supply or air conditioning (caused by agents of a foreign government or a programmed suicide).” Similar to other reports in the mid-1980s, it also warns that the WTC “is highly vulnerable through the parking lot.” (Reeves 10/12/2001; New York County Supreme Court 1/20/2004)

After assessing the security of New York Port Authority facilities, the Office of Special Planning (OSP), the Port Authority’s own antiterrorist task force, releases a report called “Counter-Terrorism Perspectives: The World Trade Center.” For security purposes, only seven copies are made, being hand-delivered and signed for by its various recipients, including the executive director of the Port Authority, the superintendent of the Port Authority Police, and the director of the World Trade Department. (New York Court of Appeals 2/16/1999; Solnik 1/5/2000) Because of the WTC’s visibility, symbolic value, and it being immediately recognizable to people from around the world, the report concludes that the center is a “most attractive terrorist target.” (New York County Supreme Court 1/20/2004) The report, which is 120 pages long, lists various possible methods of attacking the center. (New York Court of Appeals 2/16/1999; Caram 2001, pp. 103; Barrett and Collins 2006, pp. 87) One of these is that a “time bomb-laden vehicle could be driven into the WTC and parked in the public parking area.… At a predetermined time, the bomb could be exploded in the basement.” (Glanz and Lipton 2004, pp. 227) As a Senate Committee Report will find in August 1993, “The specifics of the February 26, 1993 bombing at the World Trade Center garage were almost identical to those envisioned in the [OSP] report.” (New York Court of Appeals 2/16/1999) Due to the Port Authority’s failure to adequately implement the OSP’s recommendations, the report will be crucial evidence in a successful civil trial against it in October 2005, charging negligence in failing to prevent the 1993 bombing. (Mumma 10/26/2005; Hartocollis 10/27/2005; Hoban 2/18/2006) As of mid-2006, the other possible methods of attacking the WTC listed in the report remain undisclosed.

In Ann Arbor, Michigan, research assistant Nicklaus Suino of the University of Michigan suffers burns and shrapnel wounds when he opens a package bomb at the home of psychology professor James V. McConnell. (BBC 11/12/1987; Washington Post 1998) The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). McConnell may be one of Kaczynski’s most personal targets. McConnell is a rich, flamboyant, and somewhat eccentric professor who espouses controversial theories about human behavior modification based on his research with flatworms. McConnell taught at the University of Michigan when Kaczynski was taking graduate courses in mathematics there. The package mailed to McConnell’s house comes with a one-page letter taped to the top, bearing a Salt Lake City postmark and reading in part: “I’d like you to read this book. Everybody in your position should read this book.” McConnell asks Suino to open it. The resulting explosion injures Suino; McConnell escapes with slight, temporary hearing loss but is profoundly shaken by the incident. (Lardner and Adams 4/14/1996)

Hugh C. Scrutton.Hugh C. Scrutton. [Source: Washington Post]In Sacramento, California, Hugh C. Scrutton is killed when he tries to remove what looks to be a road hazard from the parking lot—a block of wood with nails protruding from it inside a paper bag—behind his computer rental shop. The “hazard” is actually a bomb (BBC 11/12/1987; Goldston 5/28/1995; Washington Post 1998; World of Forensic Science 1/1/2005) consisting of three 10-inch pipes filled with a mixture of potassium sulfate, potassium chloride, ammonium nitrate, and aluminum powder. The bomb contains shrapnel consisting of sharp chunks of metal, nails, and splinters. It explodes with enormous force, killing Scrutton almost instantly. (World of Forensic Science 1/1/2005) Like earlier bombs, this bomb contains the initials “FC” engraved on a metal component; authorities later learn that “FC” stands for “Freedom Club.” (World of Forensic Science 1/1/2005) The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). In 1967, Scrutton took a summer math course at the University of California at Berkeley while Kaczynski taught mathematics there; it is not known whether the two crossed paths during that time. (Lardner and Adams 4/14/1996)

Chechen rebel leader Ibn KhattabChechen rebel leader Ibn Khattab [Source: Associated Press]Osama bin Laden and Chechen rebel leader Ibn Khattab are, as a CIA officer puts it, “intricately tied together” in a number of ways. Their relationship apparently begins in the mid-1980s, when Ibn Khattab goes to fight in Afghanistan and reportedly meets bin Laden there. It ends in March 2002 with Khattab’s death (see March 19, 2002). (BBC 4/26/2002; De Waal 5/1/2002; LaFraniere 4/26/2003; US District Court for the Eastern District of Virginia, Alexandria Division 7/31/2006 pdf file)
bullet They share fundraising and recruiting networks. For example, a Florida cell of radical Sunnis that is monitored by the FBI starting in 1993 is involved with both organizations (see (October 1993-November 2001)). Radical London imam Abu Qatada raises money for jihad in Chechnya (see 1995-February 2001 and February 2001) and is a key figure in al-Qaeda-related terrorism who is in communication with al-Qaeda logistics manager Abu Zubaida. (BBC 3/23/2004; Nasiri 2006, pp. 273) The Finsbury Park mosque of fellow London imam Abu Hamza al-Masri is used as a conduit for funds for both jihad in Chechnya and bin Laden’s Darunta camp in Afghanistan (see March 1999 and March 2000-February 2001);
bullet Bin Laden sends hundreds of fighters to help the Chechen cause, and this is publicly revealed no later than August 2000 (see May 2000);
bullet The two leaders debate strategy; (Tumelty 1/26/2006) and
bullet Ibn Khattab establishes camps for trainees sent to him by bin Laden, and the US is aware of this no later than October 1998 (see October 16, 1998).
Despite bin Laden’s contribution to the Chechen effort, he does not have control of operations there. (Tumelty 1/26/2006) Zacarias Moussaoui will later be linked to Khattab (see August 22, 2001).

Following the release of the Office of Special Planning’s (OSP) report, which called the WTC a “most attractive terrorist target” (see November 1985), the New York Port Authority, which owns the center, seeks a second opinion on the OSP’s recommendations. At a cost of approximately $100,000, it hires the Science Applications International Corporation (SAIC) to review the general security of the WTC. SAIC states in its report that the attractiveness of the WTC’s public areas to terrorists is “very high.” Like the OSP, SAIC pays particular attention to the underground levels of the center and describes a possible attack scenario much like what occurs in the 1993 bombing. (Caram 2001, pp. 105-106; New York County Supreme Court 1/20/2004)

Antonin Scalia.Antonin Scalia. [Source: Oyez.org]Appeals court judge Antonin Scalia is sworn in as an Associate Justice of the US Supreme Court. (Legal Information Institute 7/30/2007) Although Scalia is an ardent social conservative, with strongly negative views on such issues as abortion and homosexual rights, Scalia and Reagan administration officials both have consistently refused to answer questions about his positions on these issues, as President Reagan did at his June announcement of Scalia’s nomination. (Ronald Reagan Presidential Library 6/17/1986) Scalia’s nomination is, in the words of Justice Department official Terry Eastland, “no better example of how a president should work in an institutional sense in choosing a nominee….” Eastland advocates the practice of a president seeking a judiciary nominee who has the proper “judicial philosophy.” A president can “influence the direction of the courts through his appointments” because “the judiciary has become more significant in our politics,” meaning Republican politics. (Dean 2007, pp. 132) Scalia is the product of a careful search by Attorney General Edwin Meese and a team of Justice Department officials who wanted to find the nominee who would most closely mirror Reagan’s judicial and political philosophy (see 1985-1986).

Eugene Hasenfus sits among the weapons captured from his downed cargo plane. His Sandinista captors surround him.Eugene Hasenfus sits among the weapons captured from his downed cargo plane. His Sandinista captors surround him. [Source: Nancy McGirr / Reuters / Corbis]A CIA C-123 transport plane (see November 19, 1985) is shot down in southern Nicaragua by a Sandinista soldier wielding a surface-to-air missile. The transport plane left an airfield in El Salvador with arms and other supplies intended for the Nicaraguan Contras. Three crew members—US pilots William Cooper and Wallace Sawyer, Jr, and an unidentified Latin American—die in the crash, but one, a “cargo kicker” named Eugene Hasenfus, ignores CIA orders and parachutes to safety—and capture by the Sandinistas. Hasenfus is a construction worker from Wisconsin who signed on to do temporary work with CIA contractors, and has no intention of “going down with the plane.” The next day, newspapers around the world run stories with Hasenfus’s face peering out from their front pages.
Reveals US's Arming of Contras - The Hasenfus shoot-down will break the news of the Reagan administration’s secret arming of the Contras in their attempt to bring down the democratically elected Socialist government of Nicaragua. (New York Times 11/19/1987; Final Report of the Independent Counsel for Iran/Contra Matters: Chapter 25: United States v. Elliott Abrams: November 1986 8/4/1993; Dubose and Bernstein 2006, pp. 64)
Damage Control - Assistant Secretary of State Elliott Abrams (see Late 1985 and After) is the designated US spokesman on the Hasenfus shootdown. Abrams coordinates with his fellow Contra supporters, the NSC’s Oliver North and the CIA’s Alan Fiers, and with the US Ambassador to El Salvador, Edwin Corr, on how to handle the situation. Between the three, they coordinate a denial from the Salvadoran military about any Salvadoran or US involvement in the Hasenfus flight. As for themselves, they agree not to flatly lie about anything, because they cannot be sure of what Hasenfus will say, but they agree to remain as quiet as possible and hope the media sensation surrounding Hasenfus dies down with little long-term effect. According to notes taken by Corr during one meeting, everyone knows that a leak—“eventually someone in USG [the US government] will finally acknowledge some ‘winking.’ Salv role now more public”—is inevitable. It is eventually decided that the Contras themselves will take all responsibility for the flight. Fiers worries that the flight will be connected to previous humanitarian aid supplied to the Contras (see October 1985). They also confirm that Felix Rodriguez, North’s liaison to the Contras in Central America (see Mid-September 1985), is in Miami, hiding from the press. Hasenfus will later acknowledge making at least ten supply flights into Nicaragua (see October 9, 1986). (Final Report of the Independent Counsel for Iran/Contra Matters: Chapter 25: United States v. Elliott Abrams: November 1986 8/4/1993)

Radical Muslim leader Sheikh Omar Abdul-Rahman obtains his first US visa via the CIA. A State Department official will later discover this was the first of six US visas given to him between 1986 and 1990. All are approved by CIA agents acting as consular officers at US embassies in Sudan and Egypt. “The CIA officers claimed they didn’t know the sheikh was one of the most notorious political figures in the Middle East and a militant on the State Department’s list of undesirables.” But one top New York investigator will later say, “Left with the choice between pleading stupidity or else admitting deceit, the CIA went with stupidity.” (Quinn-Judge and Sennott 2/3/1995; Friedman 3/17/1995) Abdul-Rahman uses the visas to attend conferences of Islamic students in the US. Then he visits Pakistan, where he preaches at Peshawar, visits the Saudi embassy in Islamabad, and is “lionized at receptions heavily attended by Americans.” He plays a prominent role in recruiting mujaheddin fighters to fight against the Soviets in Afghanistan. (Kepel 2002, pp. 300) In 1989, Abdul-Rahman is arrested in Egypt and held under very closely guarded house arrest, but he manages to escape one year later, possibly by being smuggled out of his house in a washing machine. The CIA gives him another US visa and he moves to the US (see July 1990). (Bernstein 1/8/1995) Journalist Simon Reeve will claim in his 1999 book The New Jackals that, “The CIA, it is now clear, arranged the visa[s] to try and befriend the Sheikh in advance of a possible armed fundamentalist revolution in Egypt.” According to a retired CIA official, the CIA recalled mistakes made with the Ayatollah Khomeini in Iran and were trying to win Abdul-Rahman’s trust. (Reeve 1999, pp. 60)

Dave Frasca, who will later go on to play a key role in the FBI’s failure to get a warrant to search Zacarias Moussaoui’s belongings before 9/11 (see August 21, 2001 and August 29, 2001), joins the FBI. Frasca initially works at the bureau’s Newark, New Jersey, field office. It is unclear what cases he works on in the first three years of his employment, but they are not related to counterterrorism. (US Department of Justice 11/2004, pp. 123 pdf file)

The FBI’s sketch of the as-yet-unidentified ‘Unabomber.’The FBI’s sketch of the as-yet-unidentified ‘Unabomber.’ [Source: FBI]Gary Wright, the owner of CAAMS Inc., a Salt Lake City, Utah, computer shop, is injured when he attempts to remove a “road hazard” at the rear entrance of his shop. The “hazard” is actually a bomb, similar to one that killed another computer shop owner in Sacramento, California, over a year ago (see December 11, 1985). A secretary saw a man wearing a hooded sweatshirt and sunglasses leave the bag containing the bomb; she becomes the first eyewitness in what will later become the “Unabomber” investigation (see April 3, 1996). (BBC 11/12/1987; Washington Post 1998) The “Unabomber” is improving his skills; this bomb contains a more sophisticated triggering device than earlier constructions. (World of Forensic Science 1/1/2005) Almost six years ago, Theodore “Ted” Kaczynski, the so-called “Unabomber,” planted another bomb in Salt Lake City (see October 8, 1981). But for now, the FBI has no knowledge of Kaczynski’s identity. It has, however, found what it calls “an absolute link” between the Wright bombing and the “Unabom” serial bombings that have been going on since 1978 (see May 25-26, 1978). Federal bomb expert Ron Wolters says the bombs in the different cases display a high level of similarity. Police describe the as-yet-unidentified bomber as a disgruntled academician or computer worker. (Chicago Sun-Times 2/24/1987)

Richard Secord receives whispered advice from his attorney, Thomas Green, during his testimony.Richard Secord receives whispered advice from his attorney, Thomas Green, during his testimony. [Source: Bettmann / Corbis]Public testimony begins in the joint House and Senate investigations of the Iran-Contra affair. General Richard Secord (see November 19, 1985) is the first witness (see May 5, 1987). (New York Times 11/19/1987)
'Hero's Angle' - The televised hearing area in Room 325 of the Senate Office Building, built to accommodate over two dozen committee members, their staff, witnesses, lawyers, and television reporters and camera operators, features a series of two-tiered stages. Film director Steven Spielberg will later tell Senate counsel Arthur Liman that from a visual viewpoint, the staging is a terrible mistake; the witnesses appear on television “at the hero’s angle, looking up as though from a pit at the committees, who resembled two rows of judges at the Spanish Inquisition.” Authors Lou Dubose and Jake Bernstein will note with some sardonicism that the committee’s two lawyers could not have been better choices to play television villains. Liman is “a nasal-voiced New York ethnic with ‘spaghetti hair,’” and House counsel John Nields is “a balding lawyer with long locks down to his collar who couldn’t keep his distaste for the witnesses from creeping into his voice.”
Opening Statements; Cheney Blames Congress, Not the White House - The hearings open with the usual long-winded opening statements from the various committee members. Representative Dick Cheney (R-WY), the leader of the Republican hardline contingent, makes it clear from the outset where he intends to go in the investigation. “Some will argue that these events justify the imposition of additional restrictions on presidents to prohibit the possibility of similar occurrences in the future,” he says. “In my opinion, this would be a mistake. In completing our task, we should seek above all to find ways to strengthen the capacity of future presidents and future Congresses to meet the often dangerous and difficult challenges that are bound to rise in the years ahead.” He then introduces his counter-argument: Congress’s dithering, not the Reagan administration’s clear violation of the law, is the crux of the problem with the Iran-Contra affair. “One important question to be asked is to what extent did the lack of a clear-cut policy by the Congress contribute to the events we will be exploring in the weeks ahead?” Cheney and his colleagues will argue that because Congress had supported the Contras in the past, its decision not to continue that support was an unforgivable breach, “a form of actionable negligence,” in Dubose and Bernstein’s words, that made it necessary for the Reagan administration to establish “a parallel support network as a ‘bridging’ mechanism until Congress could be brought around to a sensible policy.” Oliver North will echo this concept in his own testimony (see July 7-10, 1987), driving committee Vice Chairman Warren Rudman (R-NH) to retort: “The American people have the Constitutional right to be wrong. And what Ronald Reagan thinks, or what Oliver North thinks or what I think or what anybody else thinks makes not a whit if the American people say, ‘Enough.’” (Dubose and Bernstein 2006, pp. 72-75)

Michael Springmann.Michael Springmann. [Source: Michael Springmann]Michael Springmann, head US consular official in Jeddah, Saudi Arabia, later claims that during this period he is “repeatedly ordered… to issue [more than 100] visas to unqualified applicants.” He turns them down, but is repeatedly overruled by superiors. (BBC 11/6/2001; Freedberg 11/25/2001) In one case, two Pakistanis apply for visas to attend a trade show in the US, but they are unable to name the trade show or city in which it will be held. When Springmann denies them a visa, he gets “an almost immediate call from a CIA case officer, hidden in the commercial section [of the consulate], that I should reverse myself and grant these guys a visa.” Springmann refuses, but the decision is reversed by the chief of the consular section. Springmann realizes that even the ambassador, Walter Cutler, is aware of the situation, which becomes “more brazen and blatant” as time goes on. On one occasion Springmann is even told, “If you want a job in the State Department in future, you will change your mind.” (CBC Radio One 7/3/2002; Trento 2005, pp. 344-6) Springmann loudly complains to numerous government offices, but no action is taken. He is fired and his files on these applicants are destroyed. He later learns that recruits from many countries fighting for bin Laden against Russia in Afghanistan were funneled through the Jeddah office to get visas to come to the US, where the recruits would travel to train for the Afghan war. According to Springmann, the Jeddah consulate was run by the CIA and staffed almost entirely by intelligence agents. This visa system may have continued at least through 9/11, and 11 of the 19 9/11 hijackers received their visas through Jeddah (see November 2, 1997-June 20, 2001), possibly as part of this program (see October 9, 2002 and October 21, 2002). (BBC 11/6/2001; Freedberg 11/25/2001; CBC Radio One 7/3/2002; Gedda 7/17/2002 pdf file; Fox News 7/18/2002)

The flag of the Branch Davidians.The flag of the Branch Davidians. [Source: Wikimedia]Vernon Wayne Howell, a Texas musician and a member of the Branch Davidian sect of Seventh-day Adventists, forcibly installs himself as the leader of the Branch Davidian sect near Waco, Texas. Howell is a self-described loner and dyslexic who dropped out of high school, but taught himself the Bible, memorizing most of it by age 12. He was expelled from the Church of Seventh-day Adventists in 1979 for being a bad influence on the church’s young people, and in 1981 joined the Waco group of Branch Davidians in its 77-acre compound, “Mount Carmel,” on the outskirts of the city. Howell had an affair with the leader of the group, self-described prophetess Lois Roden, some 30 years older than himself.
Power Struggle - After Roden died, Howell began a lengthy struggle for control of the group with Roden’s son George Roden. In late 1987, Roden digs up the body of a member, Anna Hughes, and issues a challenge to Howell: the one who could raise her from the dead is the one to lead the community. Instead, Howell asks the local authorities to charge Roden with abusing a corpse. On November 3, Howell returns to the Mt. Carmel compound with seven male followers, all dressed in camouflage and bearing assault rifles, hunting rifles, shotguns, and ammunition. The two groups engage in a gunfight; during the exchange, Roden is shot in the chest and hands. Howell and his followers will be tried for attempted murder, but the others will be acquitted and Howell’s trial will end in a mistrial. In 1989, Roden will try to murder a man with an axe, and will be committed to a mental instutition for the rest of his life. By 1990, Howell will have established himself as the leader of the Waco Branch Davidians, and will legally change his name to David Koresh, explaining that he believes he is now the head of the Biblical House of David. Koresh is a Hebrew translation of “Cyrus,” the Persian king who allowed the Jews held captive in Babylon to return to Israel. (Applebome 3/1/1993; England and McCormick 3/3/1993; Dean M. Kelley 5/1995; PBS Frontline 10/1995)
Adventists Join Koresh at Waco Compound - Seventh-day Adventists and others from around the world will journey to Waco to join the Davidians, who all told number somewhere around 75. According to a multi-part series by the Waco Tribune-Herald based on the recollections and observations of former members (see February 27 - March 3, 1993), the Davidians gather at the compound to “await the end of the world.” The members believe that Koresh alone can open the so-called “Seven Seals” of Biblical prophecy, which will trigger the Apocalypse, destroy the world as we know it, and propel Koresh and his followers into heaven. The compound is heavily armed. (England and McCormick 3/3/1993) Most of the Davidians live communally in an L-shaped compound of beige buildings. A few of the more elderly members live in a trailer four miles from the main compound. The trailer has more amenities than the main building, which lacks central heating and indoor plumbing. The men live separately from the women and children. Members rise early, breakfasting together in a large cafeteria and then going to work. Some of the men have jobs in the Waco area, and many stay, working on what sect member Paul Fatta will describe as a three-year renovation of the compound but what law enforcement officials say is a network of tunnels and bunkers. The children are home-schooled by the women. (Hinds 3/6/1993)
Former Member: Koresh Brought Apocalyptic Mindset, Violence to Group - According to Davidian David Bunds, who will later leave the group, Koresh, or Howells as he is known, was something of a destabilizing factor from the time of his arrival. Bunds will later say: “We were a very reserved, very conservative group. There were no emotional displays. Then along came Vernon Howell. I remember my father said one day, ‘Well, that guy sounds like he’s going to end up saying he’s a prophet the way he’s acting.’” Bunds will later say that while he was enthralled for a time by Koresh’s personality and his apocalyptic preaching, he became increasingly disturbed at his insistence on having multiple “wives,” his stockpiling of more and more weapons, and the increasingly violent methods of “discipline” being meted out to “disobedient” children and adults alike (adults, Bunds and other “defectors” will later say, are physically beaten by Koresh’s cadre of militantly loyal “Mighty Men”). Bunds will be forced out of the group after questioning Koresh’s Biblical interpretations, and for taking a sect member as his wife against Koresh’s wishes. (Conway and Siegelman 1995, pp. 244-246)
Federal Raid, Siege - The Waco Branch Davidians will kill four federal agents attempting to arrest Koresh on gun and sexual abuse charges (see 5:00 A.M. - 9:30 A.M. February 28, 1993); most of them, including Koresh, will die in a fiery conflagration after a 51-day standoff (see April 19, 1993). After the February 1993 raid, Waco Chamber of Commerce president Jack Stewart will say: “The sad part about this group is that it has evolved from the peaceful, pastoral group that it started as in the 1930s. Only since this most recent leader have they begun to acquire some of the weaponry and attitudes that they have.” (Applebome 3/1/1993)

Zahid Shaikh Mohammed, the brother of 9/11 mastermind Khalid Shaikh Mohammed (KSM), works as the head of the Pakistani branch of the charity Mercy International. A book published in 1999 will allege that this charity, based in the US and Switzerland, was used by the CIA to funnel money to Muslim militants fighting against US enemies in places such as Bosnia and Afghanistan (see 1989 and After). It is not known when Zahid got involved with the charity, but he is heading its Pakistani branch by 1988, when his nephew Ramzi Yousef first goes to Afghanistan (see Late 1980s). (Reeve 1999, pp. 120) In the spring of 1993, US investigators raid Zahid’s house while searching for Yousef (see Spring 1993). Documents and pictures are found suggesting close links and even a friendship between Zahid and Osama bin Laden. Photos and other evidence also show close links between Zahid, KSM, and government officials close to Nawaf Sharif, who is prime minister of Pakistan twice in the 1990s. The investigators also discover that Zahid was seen talking to Pakistani President Farooq Ahmad Khan Leghari during a Mercy International ceremony in February 1993. (Reeve 1999, pp. 48-49, 120) But despite the raid, Zahid apparently keeps his job until about February 1995, when Yousef is arrested in Pakistan (see February 7, 1995). Investigators learn Yousef had made a phone call to the Mercy office, and there is an entry in Yousef’s seized telephone directory for a Zahid Shaikh Mohammed. Pakistani investigators raid the Mercy office, but Zahid has already fled. (Iqbal 4/11/1995; Pallister and Wilson 9/26/2001; McDermott 2005, pp. 154, 162) It is unclear what subsequently happens to Zahid. In 1999 it will be reported that he is believed to be in Kuwait, but in 2002 the Kuwaiti government will announce he is a member of al-Qaeda, so presumably he is no longer welcome there. (Reeve 1999, pp. 48; McDermott 9/1/2002) Mercy International’s Kenya branch will later be implicated in the 1998 US embassy bombing in that country, as will KSM, Zahid’s brother (see Late August 1998).

Entrance to Fort Riley, Kansas.Entrance to Fort Riley, Kansas. [Source: US Military (.com)]Terry Nichols, a 33-year-old Michigan farmer and house husband described as “aimless” by his wife Lana, joins the US Army in Detroit. He is the oldest recruit in his platoon and his fellow recruits call him “Grandpa.” During basic training at Fort Benning, Georgia, Nichols meets fellow recruits Timothy McVeigh (see 1987-1988), who joined the Army in Buffalo, New York, and Arizona native Michael Fortier. All three share an interest in survivalism, guns, and hating the government, particularly Nichols and McVeigh; unit member Robin Littleton later recalls, “Terry and Tim in boot camp went together like magnets.” For McVeigh, Nichols is like the older brother he never had; for Nichols, he enjoys taking McVeigh under his wing. Nichols also tells McVeigh about using ammonium nitrate to make explosives he and his family used to blow up tree stumps on the farm. The three are members of what the Army calls a “Cohort,” or Cohesion Operation Readiness and Training unit, which generally keeps soldiers together in the same unit from boot camp all the way through final deployment. It is in the Army that McVeigh and Nichols become enamored of the novel The Turner Diaries (see 1978), which depicts a United States racially “cleansed” of minorities and other “undesirables” (McVeigh is already familiar with the novel—see 1987-1988). All three are sent to the 11 Bravo Infantry division in Fort Riley, Kansas, where they are finally separated into different companies; McVeigh goes to tank school, where he learns to operate a Bradley fighting vehicle as well as becoming an outstanding marksman. (McFadden 5/4/1995; Rimer 5/28/1995; Stickney 1996, pp. 91-95; PBS Frontline 1/22/1996; Serrano 1998, pp. 30; Nicole Nichols 2003) McVeigh later says he joined the Army because he was disillusioned with the “I am better than you because I have more money” mindset some people have, and because he was taken with the Army’s advertisement that claimed, “We do more before 9 a.m. than most people do all day.” (PBS Frontline 1/22/1996) Fellow unit member Specialist Ted Thorne will later recall: “Tim and I both considered ourselves career soldiers. We were going to stay in for the 20-plus years, hopefully make sergeant major. It was the big picture of retirement.” (Serrano 1998, pp. 31)
Nichols Leaves Army, Tells of Plans to Form 'Own Military Organization' - In the spring of 1989, Nichols, who planned on making a career of military service, leaves the Army due to issues with an impending divorce and child care, but his friendship with McVeigh persists. Fellow soldier Glen Edwards will later say that he found Nichols’s choice to serve in the Army unusual, considering his virulent hatred of the US government: “He said the government made it impossible for him to make a living as a farmer. I thought it strange that a 32-year-old man would be complaining about the government, yet was now employed by the government. Nichols told me he signed up to pull his 20 years and get a retirement pension.” Before Nichols leaves, he tells Edwards that he has plans for the future, and Edwards is welcome to join in. Edwards will later recall, “He told me he would be coming back to Fort Riley to start his own military organization” with McVeigh and Fortier. “He said he could get any kind of weapon and any equipment he wanted. I can’t remember the name of his organization, but he seemed pretty serious about it.” (Rimer 5/28/1995; Stickney 1996, pp. 96, 101)
McVeigh Continues Army Career, Described as 'Strange,' 'Racist,' but 'Perfect Soldier' - McVeigh does not leave the Army so quickly. He achieves the rank of sergeant and becomes something of a “model soldier.” He plans on becoming an Army Ranger. However, few get to know him well; only his closest friends, such as Nichols, know of his passion for firearms, his deep-seated racism, or his hatred for the government. McVeigh does not see Nichols during the rest of his Army stint, but keeps in touch through letters and phone calls. Friends and fellow soldiers will describe McVeigh as a man who attempts to be the “perfect soldier,” but who becomes increasingly isolated during his Army career; the New York Times will describe him as “retreating into a spit-and-polish persona that did not admit nights away from the barracks or close friendships, even though he was in a ‘Cohort’ unit that kept nearly all the personnel together from basic training through discharge.” His friends and colleagues will recall him as being “strange and uncommunicative” and “coldly robotic,” and someone who often gives the least desirable assignments to African-American subordinates, calling them “inferior” and using racial slurs. An infantryman in McVeigh’s unit, Marion “Fritz” Curnutte, will later recall: “He played the military 24 hours a day, seven days a week. All of us thought it was silly. When they’d call for down time, we’d rest, and he’d throw on a ruck sack and walk around the post with it.” A fellow soldier, Todd Regier, will call McVeigh an exemplary soldier, saying: “As far as soldiering, he never did anything wrong. He was always on time. He never got into trouble. He was perfect. I thought he would stay in the Army all his life. He was always volunteering for stuff that the rest of us wouldn’t want to do, guard duties, classes on the weekend.” Sergeant Charles Johnson will later recall, “He was what we call high-speed and highly motivated.” McVeigh also subscribes to survivalist magazines and other right-wing publications, such as Guns & Ammo and his favorite, Soldier of Fortune (SoF), and keeps an arsenal of weapons in his home (see November 1991 - Summer 1992). Regier will later tell a reporter: “He was real different. Kind of cold. He wasn’t enemies with anyone. He was kind of almost like a robot. He never had a date when I knew him in the Army. I never saw him at a club. I never saw him drinking. He never had good friends. He was a robot. Everything was for a purpose.” (McFadden 5/4/1995; Stickney 1996, pp. 86; Serrano 1998, pp. 30; Nicole Nichols 2003) McVeigh is taken with the increasing number of anti-government articles and advertisements in SoF, particularly the ones warning about what it calls the impending government imposition of martial law and tyranny, and those telling readers how to build bombs and other items to use in “defending” themselves from government aggression. (Serrano 1998, pp. 27-28) McVeigh is not entirely “by the book”; he knows his friend Michael Fortier is doing drugs, but does not report him to their superior officers. (PBS Frontline 1/22/1996) McVeigh is promoted to sergeant faster than his colleagues; this is when he begins assigning the undesirable tasks to the four or five black specialists in the group, tasks that would normally be performed by privates. “It was well known, pretty much throughout the platoon, that he was making the black specialists do that work,” Regier will recall. “He was a racist. When he talked he’d mention those words, like n_gger. You pretty much knew he was a racist.” The black soldiers complain to a company commander, earning McVeigh a reprimand. Sergeant Anthony Thigpen will later confirm Regier’s account, adding that McVeigh generally refuses to socialize with African-Americans, and only reluctantly takes part in company functions that include non-whites. Captain Terry Guild will later say McVeigh’s entire company has problems with racial polarization, “[a]nd his platoon had some of the most serious race problems. It was pretty bad.” In April 1989, McVeigh is sent to Germany for two weeks for a military “change-up program.” While there, he is awarded the German equivalent of the expert infantryman’s badge. In November 1989, he goes home for Thanksgiving with Fortier, and meets Fortier’s mother Irene. In late 1990, McVeigh signs a four-year reenlistment agreement with the Army. (McFadden 5/4/1995)
McVeigh Goes on to Serve in Persian Gulf War - McVeigh will serve two tours of duty in the Persian Gulf War, serving honorably and winning medals for his service (see January - March 1991 and After). Nichols and McVeigh will later be convicted of planning and executing the Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995).

The notes from al-Qaeda’s formation meeting. The short lines on the right side are the list of attendees.The notes from al-Qaeda’s formation meeting. The short lines on the right side are the list of attendees. [Source: CNN]Osama bin Laden conducts two meetings to discuss “the establishment of a new military group,” according to notes that will be found later. Notes will reveal the group is initially called al-Qaeda al-Askariya, which roughly translates to “the military base.” But the name will soon shorten to just al-Qaeda, meaning “the base” or “the foundation.” (Solomon 2/19/2003; Wright 2006, pp. 131-134) With the Soviets in the process of withdrawing from Afghanistan, it is proposed to create the new group to keep military jihad, or holy war, alive after the Soviets are gone. The notes don’t specify what the group will do exactly, but they conclude, “Initial estimate, within six months of al-Qaeda [founding], 314 brothers will be trained and ready.” In fact, al-Qaeda will remain smaller than this for years to come. Fifteen people attend these two initial meetings. (Wright 2006, pp. 131-134) In addition to bin Laden, other attendees include:
bullet Ayman Al-Zawahiri, the head of the Egyptian militant group Islamic Jihad. (Wright 9/9/2002)
bullet Mohammed Atef, a.k.a. Abu Hafs.
bullet Mamdouh Mahmud Salim, a.k.a. Abu Hajer.
bullet Jamal al-Fadl.
bullet Wael Hamza Julaidan.
bullet Mohammed Loay Bayazid, a US citizen, who is notetaker for the meetings. (Wright 2006, pp. 131-134)
Al-Fadl will reveal details about the meetings to US investigators in 1996 (see June 1996-April 1997). Notes to the meeting will be found in Bosnia in early 2002. (Wright 9/9/2002) It will take US intelligence years even to realize a group named al-Qaeda exists; the first known incidence of US intelligence being told the name will come in 1993 (see May 1993).

James Nichols, a Michigan farmer, anti-government white separatist, and the brother of Terry Nichols (see March 24, 1988 - Late 1990), formulates a plan to use a “megabomb” to destroy an Oklahoma City federal building; an unnamed FBI informant will later tell the FBI that James Nichols specifically indicates the Murrah Federal Building. Nichols, who says he is upset over the US’s “role” in the terrorist bombing of Pan Am Flight 103, shares the plan with the informant, who will swear to the information in 1995, after James’s brother Terry Nichols is arrested for helping destroy the Murrah Building (see 8:35 a.m. - 9:02 a.m. April 19, 1995). “[James] Nichols… made a specific reference to a federal building in Oklahoma City and began looking through the toolshed and workbench for a newspaper clipping depicting the Oklahoma City building,” the informant will say, according to an FBI affidavit. Nichols is unable to find the newspaper clipping, the informant will say, and instead draws a diagram remarkably similar to the Murrah Building. Nichols “later located a newspaper article containing a reference to the Federal Building in Oklahoma City and showed it” to the informer, the affidavit says. The informer is a regular visitor to the Nichols farm. (Thomas 6/13/1995; Nicole Nichols 2003) James Nichols routinely stamps US currency with red ink in a protest against the government, and calls his neighbors “sheeple” for obeying authority “like livestock.” A neighbor, Dan Stomber, will recall Nichols criticizing him and others for using drivers’ licences and Social Security cards, and for voting and paying taxes. “He said we were all puppets and sheeple,” Stomber will tell a reporter. “That was the first time I ever heard that word.” Stomber will not recall Nichols discussing any plans to bomb any federal buildings. (Rimer and Bennet 4/24/1995) After the Oklahoma City bombing, a friend of Nichols, an Indiana seed dealer named Dave Shafer, will tell authorities that Nichols showed him a diagram of a building remarkably similar to the Murrah Building, still under construction at the time, and said that building would be an excellent target. Shafer will say that he thought Nichols was joking. (Serrano 1998, pp. 110) It is possible that Shafer and the unnamed FBI informant are the same person. Five years ago, a group of white supremacists had conceived of a plan to destroy the Murrah Building (see 1983).

Mercy International USA’s logo.Mercy International USA’s logo. [Source: Mercy International USA]The 1999 book Dollars for Terror will allege that in 1989, Mercy International, a “subsidiary of the Muslim Brotherhood, was able to establish its headquarters in the United States, in the state of Michigan, with the assistance of the CIA. The Agency provided significant logistical and financial support to this ‘humanitarian’ organization, enabling it to act clandestinely in the various Balkan conflicts as well as within the Muslim communities of several Russian republics.” (Labeviere 1999, pp. 364) Mercy International will later be tied to al-Qaeda in a number of ways. For instance, in the mid-1990s its Pakistan branch will be headed by Zahid Shaikh Mohammed, brother of 9/11 mastermind Khalid Shaikh Mohammed (see 1988-Spring 1995). (McDermott 9/1/2002) Its Kenya branch will be tied to the 1998 US embassy bombing there. Its Philippine branch is tied to Mohammed Jamal Khalifa, bin Laden’s brother-in-law. (Burr and Collins 2006, pp. 128, 188-189) Branches of this charity in different countries have slightly different names such as Mercy International-USA and Mercy International Relief Agency, and it has been claimed that the US branch has no connection with the terrorism-related branches. However, a 2003 article will draw links between the US branch and other branches. (Epstein and Schmidt 9/4/2003)

Although the Soviets withdraw from Afghanistan in February 1989 (see February 15, 1989), the CIA continues to support the mujaheddin because the Soviet-allied Communist government stays in power in Kabul. Apparently, the CIA and the Saudi government continue to fund the mujaheddin at least until December 1990, although it could be longer because the Communist government remains in power in Kabul until 1992. The “Blind Sheikh,” Sheikh Omar Abdul-Rahman, reportedly has been working with the CIA in the 1980s to help unite the mujaheddin factions fighting each other (see Late 1980s). The Village Voice will later report that according to a “very high-ranking Egyptian official,” Abdul-Rahman continues to work with the CIA after moving to Brooklyn in July 1990 (see July 1990). He “work[s] closely with the CIA, helping to channel a steady flow of money, men, and guns to mujaheddin bases in Afghanistan and Pakistan.” But despite working with the CIA, Abdul-Rahman still considers the US the “Great Satan” and does not try to hide this. In one radio broadcast, he says that “Americans are descendants of apes and pigs who have been feeding from the dining tables of the Zionists, Communism, and colonialism.” Matti Steinberg, an expert on Islamic fundamentalism, says that Abdul-Rahman’s “long-term goal is to weaken US society and to show Arab rulers that the US is not an invulnerable superpower.” The Egyptian official will later complain, “We begged America not to coddle the sheikh.” (Friedman 3/30/1993)

Members of Egyptian militant group Al-Gama’a al-Islamiyya, whose spiritual head is the ‘Blind Sheikh,’ Sheikh Omar Abdul-Rahman, hold a series of secret meetings with US officials at the American embassy in Cairo. The meetings are initiated by Al-Gama’a al-Islamiyya, which wants to co-operate with the US, because it thinks the US is co-operating with and supporting the Muslim Brotherhood in Egypt. At the meetings, representatives of the group tell the US:
bullet Al-Gama’a al-Islamiyya has between 150,000 and 200,000 members;
bullet One of the representatives at the meetings sat on Al-Gama’a al-Islamiyya’s shura, or leadership council, between 1981 and 1988. The 11 members of the group’s shura are named at the meetings, as is its operational commander;
bullet Al-Gama’a al-Islamiyya thinks highly of Saudi Arabian King Fahd, but believes he should take a stronger line against Iran. However, Abdul-Rahman met an Iranian delegation in Pakistan in autumn 1988;
bullet The group will not attack US diplomats;
bullet Abdul-Rahman travels to the US yearly, and also travels to Britain;
bullet The group is not as secret and violent as represented by the Egyptian government and has undergone a “change in thinking,” becoming concerned about its radical and violent image.
Embassy officials are skeptical about some of the claims, as the group’s representatives reveal more than the officials think is prudent. One year after the meetings, Abdul-Rahman will be issued a US visa by a CIA officer and move to the US (see July 1990). (US Embassy in Cairo 4/25/1989 pdf file; US Embassy in Cairo 5/3/1989 pdf file)

Ali Mohamed, a spy for bin Laden working in the US military, trains Islamic radicals in the New York area. Mohamed is on active duty at Fort Bragg, North Carolina, at the time, but he regularly comes to Brooklyn on the weekends to train radicals at the Al-Kifah Refugee Center, a charity connected to both bin Laden and the CIA. Lawyer Roger Savis will later say, “He came quite often and became a real presence in that [Al-Kifah] office, which later metastasized into al-Qaeda.… He would bring with him a satchel full of military manuals and documents. It was Ali Mohamed who taught the men how to engage in guerrilla war. He would give courses in how to make bombs, how to use guns, how to make Molotov cocktails.” Mohamed’s gun training exercises take place at five different shooting ranges. One series of shooting range sessions in July 1989 is monitored by the FBI (Mohamed apparently is not at those particular sessions in person) (see July 1989). Mohamed’s trainees include most of the future bombers of the World Trade Center in 1993. (Lance 2006, pp. 47-49)

One of the Calverton surveillance photographs introduced as evidence in court (note that some faces have been blurred out).One of the Calverton surveillance photographs introduced as evidence in court (note that some faces have been blurred out). [Source: National Geographic]FBI agents photograph Islamic radicals shooting weapons at the Calverton Shooting Range on Long Island, New York. The radicals are secretly monitored as they shoot AK-47 assault rifles, semiautomatic handguns, and revolvers for four successive weekends. The use of weapons such as AK-47’s is illegal in the US, but this shooting range is known to be unusually permissive. Ali Mohamed is apparently not at the range but has been training the five men there: El Sayyid Nosair, Mahmud Abouhalima, Mohammed Salameh, Nidal Ayyad, and Clement Rodney Hampton-El. Nosair will assassinate Rabbi Meir Kahane one year later (see November 5, 1990) and the others, except Hampton-El, will be convicted of the 1993 World Trade Center bombing (see February 26, 1993), while Hampton-El will be convicted for a role in the “Landmarks” bombing plot (see June 24, 1993). Some FBI agents have been assigned to watch some Middle Eastern men who are frequenting the Al-Kifah Refugee Center in Brooklyn. Each weekend, Mohamed’s trainees drive from Al-Kifah to the shooting range and a small FBI surveillance team follows them. The FBI has been given a tip that some Palestinians at Al-Kifah are planning violence targeting Atlantic City casinos. By August, the casino plot will have failed to materialize and the surveillance, including that at the shooting range, will have come to an end. Author Peter Lance will later comment that the reason why the FBI failed to follow up the shooting sessions is a “great unanswered question.” (Lance 2003, pp. 29-33; New York Times 10/5/2003)

In a military journal, William S. Lind, a defense intellectual, and several officers warn that the US must transform its military to fight a new kind of war they call “fourth-generation warfare” or “4GW.” Unlike previous types of warfare relying on massive firepower and centralized command structures, 4GW will resemble terrorism and guerrilla warfare and could emerge from non-Western areas like the Islamic world. They write: “The fourth generation battlefield is likely to include the whole of the enemy’s society. Such dispersion, coupled with what seems likely to be increased importance for actions by very small groups of combatants, will require even the lowest level to operate flexibly on the basis of the commander’s intent. Second is decreasing dependence on centralized logistics. Dispersion, coupled with increased value placed on tempo, will require a high degree of ability to live off the land and the enemy. Third is more emphasis on maneuver. Mass, of men or fire power, will no longer be an overwhelming factor. In fact, mass may become a disadvantage as it will be easy to target. Small, highly maneuverable, agile forces will tend to dominate. Fourth is a goal of collapsing the enemy internally rather than physically destroying him. Targets will include such things as the population’s support for the war and the enemy’s culture. Correct identification of enemy strategic centers of gravity will be highly important. In broad terms, fourth-generation warfare seems likely to be widely dispersed and largely undefined; the distinction between war and peace will be blurred to the vanishing point.… A fourth generation may emerge from non-Western cultural traditions, such as Islamic or Asiatic traditions. The fact that some non-Western areas, such as the Islamic world, are not strong in technology may lead them to develop a fourth generation through ideas rather than technology.” (Lind et al. 10/1989) After 9/11, this article and others developing similar ideas on the need for a smaller, more agile military, will be called remarkably prescient. New York Times columnist Bill Keller will comment: “The fourth-generation threat sounds, when you read this text today, uncannily like al-Qaeda. The authors suggested the threat would emerge from a non-Western culture like Islam, that it might be stateless, that, lacking modern means, its warriors would infiltrate our society and use our own technology against us, that they would regard our whole civilization as a battlefield. Fourth-generation warriors would ‘use a free society’s freedom and openness, its greatest strengths, against it.’” (Perry 9/29/2001; Gould and Spinney 10/9/2001; Vest 12/2001; Keller 3/10/2002) This article and others with a similar orientation will be praised in an article by “Abu ‘Ubeid Al-Qurashi,” reportedly the pseudonym of an Osama bin Laden aide and al-Qaeda theorist. He will say: “In 1989, some American military experts predicted a fundamental change in the future form of warfare.… [F]ourth-generation wars have already occurred and […] the superiority of the theoretically weaker party has already been proven; in many instances, nation-states have been defeated by stateless nations.… The time has come for the Islamic movements facing a general crusader offensive to internalize the rules of fourth-generation warfare.” (MEMRI Special Dispatch 2/10/2002; Wheeler 12/24/2002; Lind 4/7/2003)

Ali Mohamed’s US passport, issued in 1989.Ali Mohamed’s US passport, issued in 1989. [Source: US Justice Department] (click image to enlarge)Ali Mohamed is honorably discharged from the US Army with commendations in his file, including one for “patriotism, valor, fidelity, and professional excellence.” He remains in the Army Reserves for the next five years. (Weiser and Risen 12/1/1998; Sullivan and Neff 10/21/2001) A US citizen by this time, he will spend much of his time after his discharge in Santa Clara, California, where his wife still resides. He will try but fail to get a job as an FBI interpreter, will work as a security guard, and will run a computer consulting firm out of his home. (Williams and McCormick 9/21/2001)

Dave Frasca, who will later go on to play a key role in the FBI’s failure to get a warrant to search Zacarias Moussaoui’s belongings before 9/11 (see August 21, 2001 and August 29, 2001), starts to work on counterterrorism issues at the FBI’s Newark, New Jersey, field office. Frasca joined the FBI three years previously (see 1987), but has worked on other, unknown issues before this. (US Department of Justice 11/2004, pp. 123 pdf file)

Sheikh Omar Abdul-Rahman.Sheikh Omar Abdul-Rahman. [Source: FBI]Despite being on a US terrorist watch list for three years, radical Muslim leader Sheikh Omar Abdul-Rahman enters the US on a “much-disputed” tourist visa issued by an undercover CIA agent. (Friedman 3/30/1993; Weaver 5/1996; Lance 2003, pp. 42) Abdul-Rahman was heavily involved with the CIA and Pakistani ISI efforts to defeat the Soviets in Afghanistan, and became famous traveling all over the world for five years recruiting new fighters for the Afghan war. The CIA gave him visas to come to the US starting in 1986 (see December 15, 1986-1989) . However, he never hid his prime goals to overthrow the governments of the US and Egypt. (Weaver 5/1996) FBI agent Tommy Corrigan will later say that prior to Abdul-Rahman’s arrival, “terrorism for all intents and purposes didn’t exist in the United States. But [his] arrival in 1990 really stoke the flames of terrorism in this country. This was a major-league ballplayer in what at the time was a minor-league ballpark. He was… looked up to worldwide. A mentor to bin Laden, he was involved with the MAK over in Pakistan.” The charity front Maktab al-Khidamat (MAK) is also known as Al-Kifah, and it has a branch in Brooklyn known as the Al-Kifah Refugee Center. The head of that branch, Mustafa Shalabi, picks up Abdul-Rahman at the airport when he first arrives and finds an apartment for him. Abdul-Rahman soon begins preaching at Al Farouq mosque, which is in the same building as the Al-Kifah office, plus two other locals mosques, Abu Bakr and Al Salaam. (Lance 2006, pp. 53) He quickly turns Al-Kifah into his “de facto headquarters.” (Weaver 5/1996) He is “infamous throughout the Arab world for his alleged role in the assassination of Egyptian president Anwar Sadat.” Abdul-Rahman immediately begins setting up a militant Islamic network in the US. (Friedman 3/30/1993) He is believed to have befriended bin Laden while in Afghanistan, and bin Laden secretly pays Abdul-Rahman’s US living expenses. (Weaver 5/1996; ABC News 8/16/2002) For the next two years, Abdul-Rahman will continue to exit and reenter the US without being stopped or deported, even though he is still on the watch list (see Late October 1990-October 1992).

In July 1990, the “Blind Sheikh,” Sheikh Omar Abdul-Rahman, was mysteriously able to enter the US and remain there despite being a well known public figure and being on a watch list for three years (see July 1990).
bullet In late October 1990, he travels to London, so he is out of the US when one of his followers assassinates the Zionist rabbi Meir Kahane on November 5, 1990 (see November 5, 1990). He returns to the US in mid-November under the name “Omar Ahmed Rahman” and again has no trouble getting back in despite still being on the watch list. (Duke 7/13/1993)
bullet The State Department revokes his US visa on November 17 after the FBI informs it that he is in the US. (McKinley 12/16/1990)
bullet In December 1990, Abdul-Rahman leaves the US again to attend an Islamic conference in Copenhagen, Denmark. He returns nine days later and again has no trouble reentering, despite not even having a US visa at this point. (Duke 7/13/1993)
bullet On December 16, 1990, the New York Times publishes an article titled, “Islamic Leader on US Terrorist List Is in Brooklyn,” which makes his presence in the US publicly known. The Immigration and Nationalization Service (INS) is said to be investigating why he has not been deported already. (McKinley 12/16/1990)
bullet Yet in April 1991, the INS approves his application for permanent residence.
bullet He then leaves the US again in June 1991 to go on the religious hajj to Mecca, Saudi Arabia, and returns on July 31, 1991. INS officials identify him coming in, but let him in anyway. (Mitchell 4/24/1993; Duke 7/13/1993)
bullet In June 1992, his application for political asylum will be turned down and his permanent residence visa revoked. But INS hearings on his asylum bid are repeatedly delayed and still have not taken place when the WTC is bombed in February 1993 (see February 26, 1993). (Lance 2003, pp. 105-106)
bullet Abdul-Rahman then goes to Canada around October 1992 and returns to the US yet again. The US and Canada claim to have no documentation on his travel there, but numerous witnesses in Canada see him pray and lecture there. Representative Charles Schumer (D-NY) says, “Here they spent all this time trying to get him out. He goes to Canada and gives them the perfect reason to exclude him and they don’t.”
bullet After the WTC bombing, the US could detain him pending his deportation hearing but chooses not to, saying it would be too costly to pay for his medical bills. (Mitchell 4/24/1993)
Abdul-Rahman will be involved in the follow up “Landmarks” plot (see June 24, 1993) before finally being arrested later in 1993. It will later be alleged that he was protected by the CIA. In 1995, the New York Times will comment that the link between Abdul-Rahman and the CIA “is a tie that remains muddy.” (MacFarquhar 10/2/1995)

Meir Kahane.Meir Kahane. [Source: Publicity photo]Egyptian-American El Sayyid Nosair assassinates controversial right-wing Zionist leader Rabbi Meir Kahane. Kahane’s organization, the Jewish Defense League, was linked to dozens of bombings and is ranked by the FBI as the most lethal domestic militant group in the US at the time. Nosair is captured after a police shoot-out. (Friedman 3/30/1993) Within hours, overwhelming evidence suggests that the assassination was a wide conspiracy but the US government will immediately declare that Nosair was a lone gunman and ignore the evidence suggesting otherwise (see November 5, 1990 and After). Nosair will later be acquitted of Kahane’s murder (though he will be convicted of lesser charges) as investigators continue to ignore most of the evidence in his case which links to a wider conspiracy (see December 7, 1991). Nosair is connected to al-Qaeda through his job at the Al-Kifah Refugee Center, an al-Qaeda front (see 1986-1993). A portion of Nosair’s defense fund will be paid for by bin Laden, although this will not be discovered until some time later. (Miller, Stone, and Mitchell 8/16/2002; Lance 2003, pp. 34-37)

Invesigators remove boxes of evidence from El Sayyid Nosair’s residence hours after the assassination.Invesigators remove boxes of evidence from El Sayyid Nosair’s residence hours after the assassination. [Source: National Geographic]US government agencies cover up evidence of a conspiracy in the wake of El Sayyid Nosair’s assassination of controversial right-wing Zionist leader Rabbi Meir Kahane (see November 5, 1990). Nosair is captured a few blocks from the murder site after a police shoot-out. An FBI informant says he saw Nosair meeting with Muslim leader Sheikh Omar Abdul-Rahman a few days before the attack, and evidence indicating a wider plot with additional targets is quickly found. (Friedman 3/30/1993) Later that night, police arrive at Nosair’s house and find a pair of Middle Eastern men named Mahmud Abouhalima and Mohammed Salameh there. They are taken in for questioning. Additionally, police collect a total of 47 boxes of evidence from Nosair’s house, including: (Lance 2003, pp. 34-35)
bullet Thousands of rounds of ammunition.
bullet Maps and drawings of New York City landmarks, including the World Trade Center.
bullet Documents in Arabic containing bomb making formulas, details of an Islamic militant cell, and mentions of the term “al-Qaeda.”
bullet Recorded sermons by Sheikh Omar Abdul-Rahman in which he encourages his followers to “destroy the edifices of capitalism” and destroy “the enemies of Allah” by “destroying their… high world buildings.”
bullet Tape-recorded phone conversations of Nosair reporting to Abdul-Rahman about paramilitary training, and even discussing bomb-making manuals.
bullet Videotaped talks that Ali Mohamed delivered at the John F. Kennedy Special Warfare Center at Fort Bragg, North Carolina.
bullet Top secret manuals also from Fort Bragg. There are even classified documents belonging to the US Joint Chiefs of Staff and the Commander in Chief of the Army’s Central Command. These manuals and documents had clearly come from Mohamed, who completed military service at Fort Bragg the year before and frequently stayed in Nosair’s house.
bullet A detailed and top secret plan for Operation Bright Star, a special operations training exercise simulating an attack on Baluchistan, a part of Pakistan between Afghanistan and the Arabian Sea. (Sullivan and Neff 10/21/2001; Sullivan and Neff 11/13/2001; Waldman 11/26/2001; Miller, Stone, and Mitchell 8/16/2002; Lance 2003, pp. 34-35)
bullet Also within hours, two investigators will connect Nosair with surveillance photographs of Mohamed giving weapons training to Nosair, Abouhalima, Salameh, and others at a shooting range the year before (see July 1989). (Lance 2003, pp. 34-35) But, ignoring all of this evidence, still later that evening, Joseph Borelli, the New York police department’s chief detective, will publicly declare the assassination the work of a “lone deranged gunman.” He will further state, “I’m strongly convinced that he acted alone.… He didn’t seem to be part of a conspiracy or any terrorist organization.” The 9/11 Congressional Inquiry will later conclude, “The [New York Police Department] and the District Attorney’s office… reportedly wanted the appearance of speedy justice and a quick resolution to a volatile situation. By arresting Nosair, they felt they had accomplished both.” (Friedman 3/30/1993; Lance 2003, pp. 34-36) Abouhalima and Salameh are released, only to be later convicted for participating in the 1993 bombing of the World Trade Center. Investigators will later find in Nosair’s possessions a formula for a bomb almost identical to one used in the WTC bombing. (Friedman 3/17/1995) As one FBI agent will later put it, “The fact is that in 1990, myself and my detectives, we had in our office in handcuffs, the people who blew up the World Trade Center in ‘93. We were told to release them.” The 47 boxes of evidence collected at Nosair’s house that evening are stored away, inaccessible to prosecutors and investigators. The documents found will not be translated until after the World Trade Center bombing. Nosair will later be acquitted of Kahane’s murder (though he will be convicted of lesser charges), as investigators will continue to ignore all evidence that could suggest Nosair did not act alone (see December 7, 1991). (Miller, Stone, and Mitchell 8/16/2002; Lance 2003, pp. 34-37) District Attorney Robert Morgenthau, who prosecuted the case, will later speculate the CIA may have encouraged the FBI not to pursue any other leads. Nosair worked at the Al-Kifah Refugee Center which was closely tied to covert CIA operations in Afghanistan (see Late 1980s and After). (Friedman 3/17/1995)

Counterterrorism expert Rohan Gunaratna will later write that Khalid Shaikh Mohammed (KSM) first “earned his spurs” in al-Qaeda by serving as one of Osama bin Laden’s first bodyguards. Then, in 1991, bin Laden sends KSM to the Philippines where he trains members of the militant groups Abu Sayyaf and the Moro Islamic Liberation Front (MILF) in bomb making and assassination. He works with bin Laden’s brother-in-law Mohammed Jamal Khalifa to establish an operational base there and also in Malaysia. Presumably he also works with his nephew Ramzi Yousef, who trains Abu Sayyaf militants the same year (see December 1991-May 1992). Gunaratna says that “After proving himself an outstanding organizer, [KSM] was given substantial operational authority and autonomy by bin Laden.” However, KSM’s work with the Abu Sayyaf and MILF is soon discovered and he “has been on the run since 1991.” KSM will return with Yousef to the Philippines in 1994 to exploit the network they built and develop the Bojinka plot (see January 6, 1995). (Gunaratna 2003, pp. xxiv-xxix)

One of the many air strikes launched against Iraqi targets during Operation Desert Storm.One of the many air strikes launched against Iraqi targets during Operation Desert Storm. [Source: US Air Force]The US launches a massive air assault against Iraq in retaliation for that country’s invasion of Kuwait (see August 2, 1990). The air assault begins the day after a UN deadline for Iraq’s withdrawal from Kuwait expires (see November 29, 1990). F-117 Stealth bombers hit Baghdad with an array of high-tech bombs and missiles; many of the explosions are televised live, or on briefly delayed feeds, on CNN, which launches virtually 24-hour coverage of the air strikes. In the first 48 hours of the war, 2,107 combat missions drop more than 5,000 tons of bombs on Baghdad alone, nearly twice the amount that incinerated Dresden in World War II.
'Thunder and Lightning of Desert Storm' - US Army General Norman Schwarzkopf, chief of the US Central Command (CENTCOM), announces the beginning of hostilities by transmitting the following: “Soldiers, sailors, airmen and Marines of the United States Central Command, this morning at 0300, we launched Operation Desert Storm, an offensive campaign that will enforce the United Nation’s resolutions that Iraq must cease its rape and pillage of its weaker neighbor and withdraw its forces from Kuwait. My confidence in you is total. Our cause is just! Now you must be the thunder and lightning of Desert Storm. May God be with you, your loved ones at home, and our country.” (US Navy 9/17/1997)
Initial Attacks Obliterate Iraqi Navy, Much of Air Force, Many Ground Installations - The attack begins with an assault of over 100 Tomahawk land attack missiles (TLAMs) launched from US naval vessels in the Persian Gulf and Red Sea, and attack helicopter strikes on Iraqi radar installations near the Iraq-Saudi Arabian border. The assaults destroy much of Iraq’s air defense and command-and-control capabilities. The missile assault is quickly followed by fighter, bomber, and assault helicopter strikes which continue pounding at Iraqi government buildings, power stations, dams, military sites, radio and television stations, and several of Saddam Hussein’s palaces. The strikes essentially obliterate the Iraqi Navy, and drastically cripple the Iraqi Air Force. (Between 115 and 140 aircraft and crews of the Iraqi Air Force flees to Iran over the course of the war, a move that surprises US commanders, who expected the aircraft and their crews to attempt to flee to Jordan, not Iran. The Iranians will never give Iraq back its aircraft, and will not release Iraqi air crews for years to come.) A US Navy review later calls the combined Navy-Marine air campaign, conducted in concert with US Air Force strikes, “successful beyond the most optimistic expectations.” The Navy later reports that “allied air forces dropped over 88,500 tons of ordnance on the battlefield.” (US Navy 9/17/1997; NationMaster 12/23/2007) Iraqi anti-aircraft counterattacks are surprisingly effective, downing around 75 US and British aircraft in the first hours of attacks. The US media does not widely report these downings, nor does it give much attention to the dozens of pilots and air crew captured as POWs. (NationMaster 12/23/2007)
'The Mother of All Battles' - Five hours after the first attacks, Baghdad state radio broadcasts a voice identified as Saddam Hussein. Hussein tells his people that “The great duel, the mother of all battles has begun. The dawn of victory nears as this great showdown begins.” (NationMaster 12/23/2007)
US Embassy Helped Locate Targets for Air Strikes - Deputy Chief of Mission Joseph Wilson, the last American to leave Baghdad (see January 12, 1991), and his staff provided critical assistance to the US battle planners in choosing their initial targets. Over the months, Wilson and his staff developed a “hostage tracking system,” monitoring and recording the movements of the American hostages as they were transferred from site to site to be used as human shields in the event of a US strike (see August 4, 1990 and August 8, 1990). Wilson and his staff were able to identify some 55 sites that were being used around the country, presumably some of the most critical military and infrastructure sites in Iraq. Wilson gave that information to the Pentagon. He will later write, “I was gratified when several months later, on the first night of Desert Storm, long after the hostages had been released, many of those sites were ones hit by American bombs.” (Wilson 2004, pp. 141)

Billy Waugh.Billy Waugh. [Source: Billy Waugh]The CIA monitors bin Laden in Khartoum, Sudan, where he has just moved (see Summer 1991). Billy Waugh, an independent contractor working for the CIA, moves to Khartoum and is given the task of spying on him. Waugh is a legendary fighter already in his sixties who has performed special operations for the US Army and CIA for many years and will continue to do so until he is in his seventies. The Associated Press will later report that Waugh “played a typecast role as an aging American fitness enthusiast and would regularly jog past bin Laden’s home. He said he often came face-to-face with bin Laden, who undoubtedly knew the CIA was tailing him. Neither said anything, but Waugh recalled exchanging pleasantries with bin Laden’s Afghan guards.” (Waugh and Keown 2004, pp. 121; Kaczor 6/4/2005) Waugh will later recall, “I was on a tracking team in Sudan keeping track of [bin Laden] in his early days as a possible terrorist network leader. Our CIA Chief of Station there told me upon arrival that [he] was one of our targets, that he was a wealthy Saudi financier and possible supporter of the terrorist outfit called al-Qaeda. He ran companies there and even owned an entire street block in the al-Riyadh section of the city.… At the time of our surveillance operations against him in 1991-92, [he] was not a particularly high priority, though evidence was gathering about him. At the time, it would have been very easy to take him out.” Waugh also claims that he saw bin Laden “in the mountains of the Pakistan/Afghanistan border in the late 1980’s when we were training the [mujaheddin] resistance.” (Peterson 6/2005)

US troops in Saudi Arabia in the 1990s.US troops in Saudi Arabia in the 1990s. [Source: PBS]As the Gulf War against Iraq ends, the US stations some 15,000-20,000 soldiers in Saudi Arabia permanently. (Hiro 2/15/1999) President George H. W. Bush falsely claims that all US troops have withdrawn. (Prins 12/21/2001) The US troop’s presence is not admitted until 1995, and there has never been an official explanation as to why they remained. The Nation postulates that they are stationed there to prevent a coup. Saudi Arabia has an incredible array of high-tech weaponry, but lacks the expertise to use it and it is feared that Saudi soldiers may have conflicting loyalties. In 1998, bin Laden will say in a fatwa: “For more than seven years the United States has been occupying the lands of Islam in the holiest of places, the Arabian peninsula, plundering its riches, dictating to its rulers, humiliating its people, terrorizing its neighbors, and turning its bases in the peninsula into a spearhead through which to fight the neighboring Muslim peoples” (see February 22, 1998). (Hiro 2/15/1999) US troops will finally leave in 2003, shortly after the start of the Iraq war and the construction of new military bases in other Persian Gulf countries (see April 30-August 26, 2003).

Hambali, an important future al-Qaeda leader, moves to the village of Sungai Manggis, Malaysia, about an hour north of the capital of Kuala Lumpur. Hambali is from nearby Indonesia and fought in Afghanistan with Osama bin Laden in the late 1980s. He starts off poor, working at odd jobs, but soon is frequently traveling and has many overseas visitors. Intriguingly, Hambali’s landlord will later say of Hambali’s visitors, “Some looked Arab and others white.” Hambali plays a major role in the 1995 Bojinka plot in the Philippines (see January 6, 1995), and after that plot is foiled he continues to live in his simple Sungai Manggis house. (Elegant 4/1/2002; McDermott 9/1/2002) Living near Hambali in this village are other regional Islamist militant leaders such as Abdullah Sungkar, Imam Samudra (allegedly a key figure in the 2000 Christmas bombings (see December 24-30, 2000) and the 2002 Bali bombings (see October 12, 2002)), Abu Bakar Bashir, the spiritual leader of the al-Qaeda affiliate Jemaah Islamiyah, and Abu Jibril. So many militants live in this village that it becomes known as “Terror HQ” to intelligence agencies. Sungkar and Bashir are considered the two most well-known militant leaders in Southeast Asia at the time (Sungkar dies of old age in 1999). Hambali’s house is directly across from Bashir’s and they are considered friends. (Widjajanto and Fibri 10/29/2002; Ressa 2003) Interestingly, Fauzi Hasbi, an Indonesian government mole posing as a militant leader, lives next door to Bashir as well. (SBS Dateline 10/12/2005) Despite his role in the Bojinka plot, Hambali continues to live there very openly. Beginning in March 1995, just two months after the plot was foiled, Hambali throws his first feast for several hundred guests to mark a Muslim holiday. This becomes an annual party. He also sometimes travels to Indonesia. (Elegant 4/1/2002) By May 1999, if not earlier, the FBI connects Hambali to the Bojinka plot (see May 23, 1999). In January 2000, he attends a key al-Qaeda summit in nearby Kuala Lumpur. The CIA gets pictures and video footage of him at the meeting and already has pictures of him from a computer linked to the Bojinka plot (see January 5-8, 2000 and January 5, 2000). However, there is no apparent effort to apprehend him, extradite him, or even put him on a public wanted list. He continues to live in Sungai Manggis until at least late 2000. (Conboy 2003)

Elfatih Hassanein (center).Elfatih Hassanein (center). [Source: Magyar Iszlam]In 1987, a Sudanese man named Elfatih Hassanein found the Third World Relief Agency (TWRA). By mid-1991, Bosnian President Izetbegovic contacts Hassanein, who he has known since the 1970s. The two men agree to turn TWRA from an obscure charity into what the Washington Post will later call “the chief broker of black-market weapons deals by Bosnia’s Muslim-led government and the agent of money and influence in Bosnia for Islamic movements and governments around the world.” A banker in Vienna will later call Hassanein the “bagman” for Izetbegovic. “If the Bosnian government said we need flour, he ran after flour. If they said we need weapons, he ran after weapons.” (Pomfret 9/22/1996; Schindler 2007, pp. 148) The TWRA is controlled by a committee composed of Hassanein and:
bullet Hasan Cengic. He is in charge of arming a Bosnian militia run by the SDA party (see June 1991).
bullet Irfan Ljevakovic.
bullet Husein Zivalj.
bullet Dervis Djurdjevic.
All of them are important members of Izetbegovic’s SDA party, and all but Ljevakovic were codefendants with Izetbegovic in a 1983 trial. Most payments require the approval of three of the five, except for amounts greater than $500,000, in which case Izetbegovic has to give approval. The corruption from these higher-ups is said to be incredible, with up to half of all money passing through the TWRA going into their pockets. (Schindler 2007, pp. 148-152) The TWRA is based in Vienna, Austria, and Izetbegovic personally guarantees Hassanein’s credentials with banks there. Soon, machine guns, missiles and other weapons are being shipped into Bosnia in containers marked as humanitarian aid. Hassanein is a member of Sudan’s government party and a follower of top Sudanese leader Hassan al-Turabi. Just like al-Turabi, he works with bin Laden and the “Blind Sheikh,” Sheikh Omar Abdul-Rahman. He becomes the main agent in Europe for marketing and selling video and audio tapes of Abdul-Rahman’s sermons. In March 1992, the Sudanese government gives him a diplomatic passport and he uses it to illegally transport large amounts of cash from Austria into Bosnia without being searched. (Burr and Collins 2006, pp. 140-141) The Saudi Arabian government is the biggest contributor to TWRA, but many other governments give money to it too, such as Sudan, Iran, Pakistan, Brunei, Turkey, and Malaysia. Bin Laden is also a major contributor. (Pomfret 9/22/1996) Author John Schindler will later note, “Relations between bin Laden and TWRA were close, not least because during the Bosnian war the al-Qaeda leadership was based in Khartoum, Sudan, under the protection of the Sudanese Islamist regime that was the ultimate backer of Hassanein and his firm.” TWRA also works closely with the International Islamic Relief Organization (IIRO) and most other charity fronts in Bosnia. (Schindler 2007, pp. 151-152) A later study by the Bosnian government with help from Western intelligence agencies will determine that at least $2.5 billion passed through the TWRA to Bosnia between 1992 and 1995. The study will call the TWRA “a group of Bosnian Muslim wartime leaders who formed an illegal, isolated ruling oligarchy, comprising three to four hundred ‘reliable’ people in the military commands, the diplomatic service, and a number of religious dignitaries.… It was this organization, not the Government [of Bosnia], that controlled all aid that Islamic countries donated to the Bosnian Muslims throughout the war.” (Schindler 2007, pp. 149-150)

A young Hani Hanjour.
A young Hani Hanjour. [Source: FBI]Future 9/11 hijacker Hani Hanjour first arrives in the US on October 3, 1991. (US Congress 9/26/2002; 9/11 Commission 7/24/2004, pp. 520) Some media accounts have him entering the country in 1990. He apparently is the first hijacker to enter the US. (Cloud 9/24/2001; O'Meilia 10/15/2001; Yardley and Thomas 6/19/2002) He takes an English course in Tucson, Arizona until early 1992. There are some important al-Qaeda operatives currently living in Tucson. However, it is not known if Hanjour has contact with them at this time, or even when he first develops his radical militant beliefs. According to Hanjour’s eldest brother Abulrahman, Hani stays in Arizona for three months then returns to Saudi Arabia, where he spends the next five years managing his family’s lemon and date farm. (Goldstein, Sun, and Lardner 10/15/2001) FBI Director Robert Mueller also reports his stay as lasting three months. (US Congress 9/26/2002) However, the FBI tells one person that Hanjour may have stayed in the US for as long as 15 months. (Fainaru and Ibrahim 9/10/2002)

Ramzi Yousef, the future bomber of the WTC in 1993, stays in the Philippines and trains militants there in bomb-making. According to Philippine intelligence documents, Yousef had developed expertise in bomb-making and worked at a training camp at Khost, Afghanistan, teaching bomb-making for militants connected to bin Laden. But bin Laden dispatches him to the Philippines, where he trains about 20 militants belonging to the Abu Sayyaf group. Abu Sayyaf is heavily penetrated by Philippine undercover operatives at this time, especially Edwin Angeles, an operative who is the second in command of the group. Angeles will later recall that Yousef is introduced to him at this time as an “emissary from bin Laden.” (Abuza 9/1/2005 pdf file) Angeles also claims Yousef decided to use the Philippines as a “launching pad” for terrorist acts around the world. (Kocieniewski 9/6/1996) One of Abu Sayyaf’s top leaders will later recall that Yousef also brings a significant amount of money to help fund the group. (Dinampo 1/22/2007; CNN 1/31/2007) A flow chart of Yousef’s associates prepared in early 1995 by Angeles’ Philippines handler Rodolfo Mendoza shows a box connected to Abu Sayyaf labeled “20 trainees/recruits.” So presumably the Philippine government is aware of this information by then, but it is not known when they warned the US about it (see Spring 1995). Yousef will also later admit to planning the 1993 WTC bombing at an Abu Sayyaf base, which most likely takes place at this time (see Early 1992). The ties between Yousef and Abu Sayyaf will grow stronger, culminating in the 1995 Bojinka plot (see January 6, 1995), an early version of the 9/11 plot.

El Sayyid Nosair.El Sayyid Nosair. [Source: FBI]El-Sayyid Nosair is acquitted of killing Meir Kahane (see November 5, 1990), leader of the Jewish Defense League, but convicted of firearms offenses connected with his shooting of two witnesses during his attempt to flee. The judge will declare that the acquittal verdict “defie[s] reason” and sentence Nosair to 22 years by applying maximum sentences to his convictions on the other charges. (Friedman 3/30/1993; Marshall 11/1/1998; Lance 2003, pp. 65) The prosecution of Nosair was hobbled by the US government’s absolute refusal to acknowledge the possibility that the murder was anything other than the work of a “lone deranged gunman” despite information gained during the course of the investigation provided by an FBI operative that he had “very close” ties to the radical imam Sheikh Omar Abdul-Rahman. Many boxes of evidence that could have sealed Nosair’s guilt on the murder charge and also shown evidence of a larger conspiracy were not allowed as evidence. (Friedman 3/30/1993; Miller, Stone, and Mitchell 2002, pp. 44-46) A portion of Nosair’s defense fund is paid for by bin Laden, but this will not be discovered until some time later. (Miller, Stone, and Mitchell 8/16/2002) District Attorney Robert Morgenthau, who prosecuted the case, will later speculate the CIA may have encouraged the FBI not to pursue any other leads. Nosair worked at the Al-Kifah Refugee Center which was closely tied to covert CIA operations in Afghanistan (see Late 1980s and After). (Friedman 3/17/1995)

The Pentagon helps bring thousands of mujaheddin and other Islamic militants from Central Asia into Europe to fight alongside the Bosnian Muslims against the Serbs. (Wiebes 2003; O'Neill 9/6/2003) Bin Laden plays a key organizing role. (Meyer and Rempe 10/7/2001) As a result, the Balkans become a “safe haven” and “staging area” for Islamist terrorism. (Priest 11/30/1995; Meyer and Rempe 10/7/2001)

Apparently the bin Laden guest house where Yousef lived.Apparently the bin Laden guest house where Yousef lived. [Source: National Geographic]According to Pakistani investigators, Ramzi Yousef spends most of this time at the Beit Ashuhada guesthouse (translated as House of Martyrs) in Peshawar, Pakistan, which is funded by Osama bin Laden. Pakistani investigators reveal this bin Laden-Yousef connection to US intelligence in March 1995. The CIA will publicly reveal this in 1996. (Central Intelligence Agency 1996 pdf file; Tenet 2007, pp. 100) While living there, Yousef receives help and financing from two unnamed senior al-Qaeda representatives. (Reeve 1999, pp. 47) Yousef will be arrested at another nearby bin Laden safe house in February 1995 (see February 7, 1995) with bin Laden’s address found in his pocket. (Bone and Road 10/18/1997) During these years, Yousef takes long trips to the US in preparation of the WTC bombing (see February 26, 1993) and the Philippines, where several plots are developed (see January 6, 1995). He also uses an al-Qaeda influenced mosque in Milan, Italy, as a logistical base (see 1995-1997).

Paul Wolfowitz.Paul Wolfowitz. [Source: Boston Globe]A draft of the Defense Department’s new post-Cold War strategy, the Defense Planning Guidance (DPG), causes a split among senior department officials and is criticized by the White House. The draft, prepared by defense officials Zalmay Khalilzad and Lewis “Scooter” Libby under the supervision of Undersecretary of Defense Paul Wolfowitz, says that the US must become the world’s single superpower and must take aggressive action to prevent competing nations—even allies such as Germany and Japan—from challenging US economic and military supremacy. (Tyler 5/23/1992; Rupert and Solomon 2005, pp. 122; Scoblic 2008, pp. 165) The views in the document will become known informally as the “Wolfowitz Doctrine.” Neoconservative Ben Wattenberg will say that its core thesis is “to guard against the emergence of hostile regional superpowers, for example, Iraq or China.” He will add: “America is No. 1. We stand for something decent and important. That’s good for us and good for the world. That’s the way we want to keep it.” (Utley 8/24/2001) The document hails what it calls the “less visible” victory at the end of the Cold War, which it defines as “the integration of Germany and Japan into a US-led system of collective security and the creation of a democratic ‘zone of peace.’” It also asserts the importance of US nuclear weapons: “Our nuclear forces also provide an important deterrent hedge against the possibility of a revitalized or unforeseen global threat, while at the same time helping to deter third party use of weapons of mass destruction through the threat of retaliation.” (Tyler 3/8/1992) The document states, “We must maintain the mechanism for deterring potential competitors from even aspiring to a larger regional or global role.” (Tyler 3/8/1992) In 2007, author Craig Unger will write that deterring “potential competitors” from aspiring to a larger role means “punishing them before they can act.” (Unger 2007, pp. 116)
US Not Interested in Long-Term Alliances - The document, which says the US cannot act as the world’s policeman, sees alliances among European nations such as Germany and France (see May 22, 1992) as a potential threat to US supremacy, and says that any future military alliances will be “ad hoc” affairs that will not last “beyond the crisis being confronted, and in many cases carrying only general agreement over the objectives to be accomplished.… [T]he sense that the world order is ultimately backed by the US will be an important stabilizing factor.” (Tyler 5/23/1992) Conspicuously absent is any reference to the United Nations, what is most important is “the sense that the world order is ultimately backed by the US… the United States should be postured to act independently when collective action cannot be orchestrated” or in a crisis that demands quick response. (Tyler 3/8/1992) Unger will write of Wolfowitz’s “ad hoc assemblies:” “Translation: in the future, the United States, if it liked, would go it alone.” (Unger 2007, pp. 116)
Preventing the Rise of Any Global Power - “[W]e endeavor to prevent any hostile power from dominating a region whose resources would, under consolidated control, be sufficient to generate global power. These regions include Western Europe, East Asia, the territory of the former Soviet Union and Southwest Asia.” The document advocates “a unilateral US defense guarantee” to Eastern Europe, “preferably in cooperation with other NATO states,” and foresees use of American military power to preempt or punish use of nuclear, biological or chemical weapons, “even in conflicts that otherwise do not directly engage US interests.” (Gellman 3/11/1992)
Containing Post-Soviet Threats - The document says that the US’s primary goal is “to prevent the re-emergence of a new rival, either on the territory of the former Soviet Union or elsewhere, that poses a threat on the order of that posed formerly by the Soviet Union.” It adds, “This is a dominant consideration underlying the new regional defense strategy and requires that we endeavor to prevent any hostile power from dominating a region whose resources would, under consolidated control, be sufficient to general global power.” In the Middle East and Southwest Asia, “our overall objective is to remain the predominant outside power in the region and preserve US and Western access to the region’s oil.” The document also asserts that the US will act to restrain what it calls India’s “hegemonic aspirations” in South Asia (Tyler 5/23/1992) , and warns of potential conflicts, perhaps requiring military intervention, arising in Cuba and China. “The US may be faced with the question of whether to take military steps to prevent the development or use of weapons of mass destruction,” it states, and notes that these steps may include pre-empting an impending attack with nuclear, chemical or biological weapons, “or punishing the attackers or threatening punishment of aggressors through a variety of means,” including attacks on the plants that manufacture such weapons. It advocates the construction of a new missile defense system to counter future threats from nuclear-armed nations. (Tyler 3/8/1992)
Reflective of Cheney, Wolfowitz's Views - Senior Pentagon officials say that while the draft has not yet been approved by either Dick Cheney or Wolfowitz, both played substantial roles in its creation and endorse its views. “This is not the piano player in the whorehouse,” one official says.
Democrats Condemn Policy Proposal - Senator Robert Byrd (D-WV), an advocate of a reduction in military spending, calls the document “myopic, shallow and disappointing,” adding: “The basic thrust of the document seems to be this: We love being the sole remaining superpower in the world.” Senator Joseph Biden (D-DE) attacks what he sees as the document’s emphasis on unilateral military action, and ridicules it as “literally a Pax Americana.” Pentagon officials will dispute characterizations that the policy flatly rejects any idea of multilateral military alliances. One defense official says, “What is just dead wrong is this notion of a sole superpower dominating the rest of the world.” (Tyler 3/8/1992; Gellman 3/11/1992)
Abandoned, Later Resurrected - Wolfowitz’s draft will be heavily revised and much of its language dropped in a later revision (see May 22, 1992) after being leaked to the media (see March 8, 1992). Cheney and Wolfowitz’s proposals will receive much more favorable treatment from the administration of George W. Bush (see August 21, 2001).

Page 1 of 17 (1696 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17 | next

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike