!! History Commons Alert, Exciting News

Context of 'Late May 2004: German Interior Minister Told CIA Has Wrongly Rendered German Citizen'

This is a scalable context timeline. It contains events related to the event Late May 2004: German Interior Minister Told CIA Has Wrongly Rendered German Citizen. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 19 (1868 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19 | next

The German Reich Ministry of Justice issues a secret memo following a meeting of several Justice Ministry lawyers and public prosecutors with senior Gestapo officers. The participants discuss the fact that Germany has been on a war footing for years, and the leaders’ worry that the citizenry is riddled with sleeper cells of subversives. The solution: detaining and torturing subversives. It is unclear whether torture will be used to terrorize other subversives, to extract information, or produce confessions. German law enforcement officials are balky at applying “more rigorous interrogation” techniques. Though some judges seem unmoved by defendants appearing in court with obvious marks of torture upon their bodies, the law enforcement officers are bureaucrats in a system that has always respected the rule of law and the Hitler government was originally elected on a law-and-order platform. The memo is the product of the top officials in the Gestapo and Justice Ministry, and lays out detailed instructions as to when torture techniques can be applied, the specific equipment used in such interrogations, and how many times particular techniques could be used on certain categories of detainees. Perhaps most importantly, the memo promises immunity from prosecution to any German interrogator who follows the rules as laid down in the memo.
Specific Instructions - It reads in part: “At present, we thus have a situation which cannot continue: a deficient sense of what is right on the part of judicial officers; an undignified position for police officers, who try to help matters by foolish denials [that torture has taken place in court proceedings].… [I]nterrogations of this kind [torture] may be undertaken in cases where charges involve the immediate interests of the state.… chiefly treason and high treason. Representatives of the Gestapo expressed the opinion that a more rigorous interrogation could also be considered in cases of Jehovah’s Witnesses, explosives, and sabotage.… As a general principle, in more rigorous interrogations only blows with a club on the buttocks are permissible, up to 25 such blows. The number is to be determined in advance by the Gestapo.… Beginning with the tenth blow, a physician must be present. A standard club will be designated, to eliminate all irregularities.” Gestapo Headquarters in Berlin must give permission for more “rigorous interrogation[s],” the memo continues.
Drawing Parallels to Bush Administration Torture - The memo will be the subject of a 2009 article by Shayana Kadidal, the senior managing attorney of the Guantanamo project at the Center for Constitutional Rights. Kadidal will draw parallels between the Nazi torture authorization and similar legal justifications issued by the American government after the 9/11 attacks (see March 2, 2009 and April 21, 2009). Kadidal will write: “I realize that, as a matter of principle, there is a strong bias against making Nazi analogies to any events happening in our modern world.… But here we have: (1) a system set up to allow torture on certain specific individual detainees, (2) specifying standardized equipment for the torture (apparently down to the exact length of the club to be used), along with physician participation to ensure survival of the victim for the more several applications, (3) requiring prior approval of the use of torture from the central authorities in the justice department and intelligence agency in the capital, so as to ensure that (6) the local field officers actually carrying out the abuse are immune from prosecution.” [Huffington Post, 4/21/2009]

Entity Tags: Gestapo, Shayana Kadidal, German Reich Ministry of Justice

Timeline Tags: Torture of US Captives

Sherwood F. Moran (right) interrogating a Japanese prisoner during the battle of Guadalcanal.Sherwood F. Moran (right) interrogating a Japanese prisoner during the battle of Guadalcanal. [Source: Associated Press]Marine interrogator Major Sherwood F. Moran writes an informal memo for use by other interrogators. Moran is a legendary figure among Marines, renowned for his ability to coax information from the most reluctant or resistant Japanese captive, even during the height of battle, and often using his knowledge of, and respect for, Japanese culture to his advantage. His memo will remain relatively unknown outside the Marine Corps until the summer of 2003, when it will be included in the archives of the Marine Corps Interrogator Translator Teams Association. The memo, titled “Suggestions for Japanese Interpreters Based on Work in the Field,” is remarkable for its insistence that treating prisoners with humanity and respect works far better than “harsh” interrogation methods. Author Ulrich Straus, an expert on Japanese POWs held in US captivity during World War II, will later write that Moran “was a particularly effective interrogator because he treated each prisoner as another human rather than as the enemy.” In 2005, after the Abu Ghraib scandals become media fodder, military historian Stephen Budiansky will write: “Six months before the abuses at Abu Ghraib prison broke into public view, a small and fairly obscure private association of United States Marine Corps members posted on its Web site a document on how to get enemy POWs to talk. The document described a situation very similar to the one the United States faces in the insurgencies in Iraq and Afghanistan: a fanatical and implacable enemy, intense pressure to achieve quick results, a brutal war in which the old rules no longer seem to apply.… Moran, the report’s author, noted that despite the complexities and difficulties of dealing with an enemy from such a hostile and alien culture, some American interrogators consistently managed to extract useful information from prisoners. The successful interrogators all had one thing in common in the way they approached their subjects. They were nice to them. Moran was writing in 1943, and he was describing his own, already legendary methods of interrogating Japanese prisoners of war. More than a half century later his report remains something of a cult classic for military interrogators.” [David R. Moran, 2005]
Human-to-Human Attitude - Moran writes that the best interrogators (whom he says should consider themselves “interviewers”) become “wooers” of their captives, coaxing information rather than attempting to force confessions. Most important, Moran writes, is the interrogator’s attitude towards his prisoner. “Many people, I suppose, would on first thought think ‘attitude’ had nothing to do with it; that all one needs is a knowledge of the language, then shoot out questions, and expect and demand a reply,” he writes. “Of course that is a very unthinking and naive point of view.” Just as important, Moran writes, is a sympathy and understanding of the captive’s culture. A superior or demeaning attitude breeds nothing but antagonism and resistance.
Speaking the Language of the Captive - Almost as important, Moran notes, is the interrogator’s ability to speak directly to the captive in his own language, without the need for translators. An interrogator should speak the language fluently and idiomatically, or, when that is not possible, to at least have some command over common phrases. “After all, the first and most important victory for the interviewer to try to achieve is to get into the mind and into the heart of the person being interviewed,” he writes.
Hidden System - Fellow feelings and warm sympathy towards the captive are necessary, but not the entire package. While the captive, or an outside observer, might believe that the interrogator is merely indulging in friendly chit-chat, the interrogator must have an agenda and a plan in place at all times. “[I]n the workings of your mind you must be a model of system,” Moran says. “You must know exactly what information you want, and come back to it repeatedly. Don’t let your warm human interest, your genuine interest in the prisoner, cause you to be sidetracked by him! You should be hard-boiled but not half-baked. Deep human sympathy can go with a business-like, systematic, and ruthlessly persistent approach.”
Short-Circuiting Patriotic Defensiveness - To emphasize that your side, your nation, or your culture is superior—in essence, the “conquerors” of the captive’s military or his nation—is counterproductive, Moran writes. “To emphasize that we are enemies, to emphasize that he is in the presence of his conqueror, etc., puts him psychologically in the position of being on the defensive, and that because he is talking to a most-patient enemy and conqueror he has no right and desire to tell anything,” he writes.
Breaking Recalcitrant Prisoners - Sometimes even the best interrogators come up against recalcitrant prisoners who flatly refuse, for patriotic reasons or what Moran calls “conscientious scruples,” to give any information. In these cases, Moran writes, harsh or physical techniques of intelligence extraction are counterproductive. Instead, he writes, with his Japanese captives he is often able to shame the prisoner into cooperating. Reminding the captive that he has been treated humanely, has been treated with kindness and courtesy, implies a quid pro quo—not the threat of having this treatment withdrawn if cooperation is not forthcoming, but a matter of the captive returning the interrogator’s courtesy with information. [Moran, 7/17/1943 pdf file]

Entity Tags: US Marine Corps, Ulrich Straus, Stephen Budiansky, Sherwood F. Moran, Marine Corps Interrogator Translator Teams Association

Timeline Tags: Torture of US Captives

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

A B-29 bomber similar to the one that crashed in Georgia.A B-29 bomber similar to the one that crashed in Georgia. [Source: Global Security (.org)]A test flight for the Air Force’s Project Banshee, located at Robins Air Force Base in Georgia, is set for 8:30 a.m. Banshee is an attempt begun in 1946 to develop and deploy a long-range missile ahead of both the Soviet Union and rival US military branches. The airplane used in the test flight crashes less than an hour into its flight, killing 9 of the 13 aboard.
Maintenance Problems - The plane assigned for the flight is a B-29 Stratofortress, a bomber made famous by its delivery of the atomic bombs to Hiroshima and Nagasaki at the end of World War II. B-29s are notoriously difficult to fly and maintain: their four wing-mounted engines almost routinely overheat and catch fire, causing engine shutdowns, sudden drops in altitude, and, often, crashes. The engines’ eighteen cylinders lack sufficient airflow to keep them cool, and the overheating often causes the crankcases, made of light but highly flammable magnesium, to burst into flames. Like so many of its brethren, the plane has suffered its share of maintenance issues, and is flying without numerous recommended maintenance and repair tasks being performed. Just five days before, it had been designated “red cross”—grounded and unfit for service. It was allowed to fly through an “exceptional release” signed by the squadron commander.
Crew Difficulties - The flight is moved back to the afternoon after some crew members fail to show up on time, and to allow last-minute repairs to be made. By takeoff, the flight crew is assembled: Captain Ralph Erwin; co-pilot Herbert W. Moore; flight engineer Earl Murrhee; First Lieutenant Lawrence Pence, Jr, the navigator; Sergeant Walter Peny, the left scanner; Sergeant Jack York, the right scanner; Sergeant Melvin Walker, the radio operator; and Sergeant Derwood Irvin, manning the bombsight and autopilot. The crew is joined by civilian engineers assigned to Banshee: Al Palya and Robert Reynolds from RCA, William Brauner and Eugene Mechler from the Franklin Institute, and Richard Cox from the Air Force’s Air Materiel Command. In violation of standard procedure, none of the crew or the civilians are briefed on emergency procedures, though Murrhee will later say that the crew were all familiar with the procedures; he is not so sure about the civilians, though he knows Palya and Reynolds have flown numerous test flights before. In another violation of Air Force regulations, none of the flight crew have worked together before. As author Barry Siegel will note in 2008, “The pilot, copilot, and engineer had never shared the same cockpit before.”
Engine Fire and Crash - Less than an hour into the flight, one engine catches fire and two others lose power, due to a combination of maintenance failures and pilot errors. The civilians have some difficulty getting into their parachutes as Erwin and Moore attempt to regain control of the aircraft. Four of the crew and civilians manage to parachute from the plane, but most remain on board as the airplane spirals into the ground on the edge of the Okefenokee Swamp, near Waycross, Georgia. Crew members Moore, Murrhee, and Peny survive, as does a single civilian, Mechler. Four others either jump at too low an altitude or die when their chutes foul the airplane; the other five never manage to leave the plane and die on impact.
Widows File Suit - Several of the civilians’ widows will file suit against the US Air Force, asserting that their husbands died because of Air Force negligence (see June 21, 1949). Their lawsuit will eventually become US v. Reynolds, a landmark Supreme Court case and the underpinning for the government’s claims of state secrets privilege (see March 9, 1953). [Siegel, 2008, pp. 3, 14-17, 33-49]

Entity Tags: Derwood Irvin, Barry Siegel, US Department of the Air Force, Walter Peny, William Brauner, Air Materiel Command, Richard Cox, Ralph Erwin, Robert Reynolds, Al Palya, Radio Corporation of America, Eugene Mechler, Earl Murrhee, Franklin Institute, Project Banshee, Melvin Walker, Lawrence Pence, Jr, Herbert W. Moore, Jr, Jack York

Timeline Tags: Civil Liberties

Initial Associated Press reports of a crash in Georgia of a B-29 that had been on a test flight for the Air Force’s secret Project Banshee (see October 6, 1948) acknowledge that “the plane had been on a mission testing secret electronic equipment which RCA developed and built under an Air Force contract… Full details of the plane’s mission were not disclosed.… The Air Force would say only that the bomber was engaged in ‘electronic research on different types of radar…’” Local papers have a bit more detail, with survivor accounts hinting at confusion and some contradictions between their versions of events and that being given out by official Air Force spokesmen. Later reports from the Air Force will downplay the B-29’s involvement in Project Banshee. [Siegel, 2008, pp. 56-58]

Entity Tags: Associated Press, US Department of the Air Force, Radio Corporation of America, Project Banshee

Timeline Tags: Civil Liberties

The Army Air Force’s Air Materiel Command receives the initial report on an investigation of a B-29 crash in Georgia (see October 6, 1948). Perceptions of the crash are colored by the fact that the bomber was carrying equipment from Project Banshee, a secret Air Force missile development initiative. The initial report is meticulously factual, providing an almost minute-by-minute account of the events preceding the crash as told by the four survivors and intensive examination of the debris. The report concludes that it would benefit future B-29 pilots to have more training on flying the plane when it has lost both engines on one wing, and a general recommendation that the pilot and crew should give civilian passengers better instruction in emergency procedures. Though the report is circumspect in the extreme in finding fault with the pilot and military personnel for the crash, and gives only vague and generalized recommendations to help prevent future crashes, the Air Force will heatedly deny that the pilots or crew could have been in any way responsible for the crash. In 2008, reporter Barry Siegel will write, “Years later, this particular claim, in fact Air Materiel Command’s entire position, would cause various veteran aviators to hoot.” Pilot error causing the crash is obvious, they will conclude. [Siegel, 2008, pp. 62-65]

Entity Tags: US Department of the Air Force, Barry Siegel, Air Materiel Command, Project Banshee

Timeline Tags: Civil Liberties

Frank Folsom, the executive vice president of the Radio Corporation of America’s RCA Victor Division, writes a letter to General Hoyt Vandenberg, the commander of the US Air Force. Folsom is inquiring about the deaths of two RCA employees in a recent B-29 crash in Georgia (see October 6, 1948). The plane had been on a secret test mission for the Air Force’s Project Banshee, a missile development project in which RCA is heavily involved. Folsom believes that the Air Force is downplaying the likelihood that pilot error caused the crash (see October 18, 1948), and tells Vandenberg that “certain steps will [need to be taken] if we are to participate in the future in Air Force flight test programs.” Folsom wants more pay and compensation for RCA employees participating in Air Force test programs, as well as newer and safer airplanes to be used in the test flights and a higher caliber of test pilots and crew members. Perhaps the portion of the letter that causes the most consternation among Air Force officials is Folsom’s request to read over the official accident reports. “When a crash has occurred, a copy of the official report… must be made available promptly to us,” he writes. “Needless to say, the report will not be disclosed except to those who are directly concerned.” Folsom’s letter will spark a new round of Air Force investigations into the crash, in hopes of mollifying Folsom. However, the report from this investigation will be classified at the highest level of security and not provided to RCA. Additionally, though the second investigation will find a strong likelihood of pilot error causing the crash, the Air Force will not admit any such findings to RCA. [Siegel, 2008, pp. 65-80] These accident reports will play a key role in the lawsuit filed against the US government by three widows of killed crew members (see June 21, 1949 and August 7-8, 1950).

Entity Tags: Hoyt Vandenberg, Frank Folsom, Project Banshee, Radio Corporation of America, US Department of the Air Force

Timeline Tags: Civil Liberties

Phyllis Brauner and Elizabeth Palya, who both lost their husbands in the “Project Banshee” B-29 crash (see October 6, 1948), file a civil action lawsuit against the US government in regards to the crash. The lawsuit claims that the US Air Force, in the person of the pilot and military crew members of the B-29, caused the deaths of their civilian husbands by “the negligence and wrongful acts and omissions of the officers and employees” of the US. The widows’ lawyer, Charles Biddle, asks the government for $300,000 per family. A third widow, Patricia Reynolds, will join the lawsuit in September 1949. One of the biggest issues surrounding the case is the lawsuit’s request that Biddle and his lawyers be given access to the official accident reports, which the government will claim cannot be revealed because they may contain classified information (see October 18, 1948 and August 7-8, 1950). Biddle’s promise that no one else will see the reports makes no impression on the government’s lawyers. [Siegel, 2008, pp. 100-101]

Entity Tags: Elizabeth Palya, Charles Biddle, Patricia Reynolds, Phyllis Brauner, US Department of the Air Force, Project Banshee

Timeline Tags: Civil Liberties

A federal judge orders the Air Force to turn over copies of its classified accident reports about a B-29 crash (see October 6, 1948) as part of a lawsuit filed by three of the widows of crew members killed in the crash (see June 21, 1949). Claiming that the reports may contain classified information about a secret missile development project, Project Banshee, the Air Force not only refuses to turn over the accident reports to the widows’ lawyer, it refuses to allow even the attorney general to view the documents (see August 7-8, 1950). The lawyer for the widows, Charles Biddle, will continue to press for the release of the accident reports. [Siegel, 2008, pp. 120-123]

Entity Tags: Charles Biddle, Project Banshee, US Department of the Air Force

Timeline Tags: Civil Liberties

The Air Force refuses to meet the court-imposed deadline to turn over accident reports of a 1948 B-29 crash in Georgia (see October 6, 1948) to the plaintiffs in a lawsuit against the government (see July 26, 1950). Instead, the Justice Department argues before the court that because the accident reports might contain “state secrets” that might imperil “national security” if made available to anyone outside the Air Force, the reports cannot be made available. “[T]he aircraft in question, together with the personnel on board, were engaged in a highly secret mission of the Air Force,” the government lawyers argue. “The airplane likewise carried confidential equipment on board and any disclosure of its mission or information concerning its operation or performance would be prejudicial to this department and would not be in the public interest.” Such a claim—that the production of the reports would “seriously hamper national security”—renders the reports “beyond judicial authority,” the Justice Department lawyers claim. [Siegel, 2008, pp. 124-126]

Entity Tags: US Department of the Air Force, US Department of Justice

Timeline Tags: Civil Liberties

Weeks after the Justice Department refused to make accident reports of a 1948 B-29 crash (see October 6, 1948) available to the plaintiffs in an ongoing wrongful death lawsuit against the government (see July 26, 1950) because the reports are so highly classified that their disclosure might “seriously hamper national security” (see July 26, 1950 and August 7-8, 1950), the Air Force, in a routine review, drastically lowers the classification of the accident reports from top-level “Secret” to third-level “Restricted.” Whereas “Secret” documents supposedly contain information that “might endanger national security” if revealed, “Restricted” documents are “for official use only” and should not be disclosed “for reasons of administrative privacy.” The Air Force apparently no longer considers the documents a threat to national security. However, neither the plaintiffs’ lawyers, the judge hearing the lawsuit, or even the Justice Department lawyers are aware of the reports’ reduction in status. They continue to argue the merits of releasing the reports as if they are still highly classified. [Siegel, 2008, pp. 133]

Entity Tags: US Department of the Air Force, US Department of Justice

Timeline Tags: Civil Liberties

Federal judge William H. Kirkpatrick rules that the US government must turn over the disputed, and supposedly highly classified (see September 14, 1950), accident reports from a 1948 B-29 crash (see October 6, 1948)—not to the plaintiffs in the lawsuit over the crash (see July 26, 1950), but to Kirkpatrick himself. He wishes to review the reports to determine if they contain any information that might threaten national security, and, before turning the documents over to the plaintiffs’ lawyers, will personally remove that information. In mid-October, when the government again refuses to turn over the documents, Kirkpatrick will find in favor of the plaintiffs (see October 12, 1950). [Siegel, 2008, pp. 133-134]

Entity Tags: US Department of Justice, William H. Kirkpatrick

Timeline Tags: Civil Liberties

Federal judge William H. Kirkpatrick rules in favor of the plaintiffs in a wrongful death lawsuit against the US government (see October 6, 1948, June 21, 1949, and July 26, 1950), after the government refuses to turn over classified accident reports that have a direct bearing on the plaintiffs’ case (see September 21, 1950). Judge Kirkpatrick orders the government to pay the plaintiffs, three widows who lost their husbands in a 1948 plane crash, a total of $225,000. The plaintiffs’ lawyer, Charles Biddle, expects the government to balk at paying out the money, and to instead continue to challenge the court’s attempt to compel it to turn over the accident reports (see October 19, 1951). [Siegel, 2008, pp. 134-139]

Entity Tags: Charles Biddle, William H. Kirkpatrick

Timeline Tags: Civil Liberties

The government, represented by a team of Justice Department lawyers, appeals the recent ruling against it in the ‘Banshee’ B-29 plane crash lawsuit (see June 21, 1949). In the Third US Circuit Appeals Court, the government argues that the lower court had no business demanding that the Air Force turn over classified accident reports about the crash, because the reports may contain information that would potentially compromise national security (see October 12-18, 1948 and September 14, 1950). The government had twice defied court orders to produce the documents, and as a result had lost the lawsuit (see October 12, 1950). The Justice Department’s arguments come down to the assertion that the judiciary has no constitutional right to compel the executive branch to turn over documents it considers privileged. In 2008, author Barry Siegel will write, “For the first time in the B-29 litigation, the government directly argued that the judiciary could not review [the government’s] claim of privilege.” The lawyer for the plaintiffs, Charles Biddle, counters that the executive branch has no such sweeping claim of privilege, and that a judge should be allowed to review documents in dispute to determine both their bearing on a case and the possibility that releasing those documents could jeopardize national security (see September 21, 1950). Three weeks later, the appeals court will rule unanimously against the government (see December 11, 1951). [Siegel, 2008, pp. 149-153]

Entity Tags: US Department of Justice, Charles Biddle, Barry Siegel

Timeline Tags: Civil Liberties

A three-judge federal appeals court unanimously rejects the government’s claim of unfettered executive privilege and secrecy in regards to classified documents (see October 19, 1951). In an opinion written by Judge Albert Maris, the court finds that the government’s claim that the judiciary can never compel the executive branch to turn over classified documents to be without legal merit. The plaintiffs in the case, three widows who lost their husbands in the crash of a B-29 bomber carrying classified materials (see June 21, 1949), had a compelling need for the documents in question, the downed B-29 accident reports, to further their case, Maris writes (see October 12, 1950).
No Legal Basis for Claim of Privilege - Maris goes further than the parameters of the single lawsuit, writing: “[W]e regard the recognition of such a sweeping privilege… as contrary to a sound public policy. The present cases themselves indicate the breadth of the claim of immunity from disclosure which one government department head has already made. It is but a small step to assert a privilege against any disclosure of records merely because they might prove embarrassing to government officials. Indeed, it requires no great flight of imagination to realize that if the government’s contentions in these cases were affirmed, the privilege against disclosure might gradually be enlarged… until as is the case in some nations today, it embraced the whole range of government activities.… We need to recall in this connection the words of [Revolution-era jurist] Edward Livingston: ‘No nation ever yet found any inconvenience from too close an inspection into the conduct of its officers, but many have been brought to ruin, and reduced to slavery, by suffering gradual imposition and abuses, which were imperceptible, only because the means of publicity had not been secured.’” He also quotes Revolutionary War figure Patrick Henry, who said, “[T]o cover with the veil of secrecy the common routine of business is an abomination in the eyes of every intelligent man and every friend to his country.”
Rejecting Claim of 'State Secrets' - Maris is even less respectful of the government’s claim of a “state secrets” privilege. He notes that the government did not make that claim until well into the lawsuit proceedings (see October 19, 1951), indicating that it was a “fallback” argument used after the original government arguments had failed. Maris is also troubled, as author Barry Siegel later writes, in the government’s “assertion of unilateral executive power, free from judicial review, to decide what qualified as secret.” The lower court judge’s ruling that he alone should be given the documents for review adequately protected the government’s security interests, Maris writes: “[But] the government contends that it is within the sole province of the secretary of the Air Force to determine whether any privileged material is contained in the documents and that his determination of this question must be accepted by the district court without any independent consideration.… We cannot accede to this proposition. On the contrary, we are satisfied that a claim of privilege against disclosing evidence… involves a justiciable question, traditionally within the competence of the courts.… To hold that the head of an executive department of the government in a [law]suit to which the United States is a party may conclusively determine the government’s claim of privilege is to abdicate the judicial function to infringe the independent province of the judiciary as laid down by the Constitution.”
Fundamental Principle of Checks and Balances - Maris continues: “The government of the United States is one of checks and balances. One of the principal checks is furnished by the independent judiciary which the Constitution established. Neither the executive nor the legislative branch of the government may constitutionally encroach upon the field which the Constitution has reserved for the judiciary.… Nor is there any danger to the public interest in submitting the question of privilege to the decision of the courts. The judges of the United States are public officers whose responsibilities under the Constitution is just as great as that of the heads of the executive departments.”
Government Appeal - The Justice Department will appeal the ruling to the US Supreme Court (see March 1952 and March 9, 1953). [Siegel, 2008, pp. 153-156]

Entity Tags: Albert Maris, US Department of Justice, Barry Siegel, US Supreme Court

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

The Justice Department appeals the ruling of the US Appeals Court in the B-29 “Banshee” case (see December 11, 1951). The appellate judges found that the executive branch of government could not unilaterally refuse to hand over classified documents requested during the course of a trial, and justify its decision merely by its own say-so (see October 12, 1950). Solicitor General Philip Perlman argues that the appellate ruling erroneously interprets the law “so as to permit encroachments by the judiciary on an area committed by the Constitution to executive discretion.” The claim of “state secrets,” “executive privilege,” and, ultimately, “national security” must trump judicial concerns, Perlman argues, and he goes on to say that the judiciary should not be allowed to “substitute its judgment for the judgment of the executive.” The case will be labeled United States of America v. Patricia Reynolds, Phyllis Brauner, and Elizabeth Palya, and will usually be shortened to the more colloquial US v. Reynolds.
The Vinson Court - In 2008, author Barry Siegel, in his book Claim of Privilege, will note that the recent ascension of Fred Vinson as the Supreme Court’s Chief Justice does not bode well for the plaintiffs in the case. President Truman placed Vinson, whom Siegel calls Truman’s “poker and drinking buddy,” as Chief Justice to try to achieve consensus between the two contentious blocs of justices on the Court. Siegel notes that Vinson is widely considered an intellectual and legal lightweight, with a tendency to take the side of the government on issues in which he lacks a full understanding. Siegel will write that in many instances, Vinson functions “as part of the executive branch.”
'Dennis' Case Preview of Court's Tendency to Favor Executive Branch - Vinson had written the opinion in a 1951 ruling, Dennis et al v. United States, where the Court had upheld a lower court ruling that twelve acknowledged American Communists were sent to jail under the Smith Act—not for breaking the law, but for “teaching and advocating,” in the words of the original indictment. Siegel will call that ruling “the nadir of the Vinson Court.” According to Siegel, the Dennis ruling showed the Court’s predisposition to give the government, and particularly the executive branch, plenty of leeway in its findings in subsequent cases such as Reynolds. [Siegel, 2008, pp. 157-162]

Entity Tags: Fred Vinson, Elizabeth Palya, US Supreme Court, US Department of Justice, Barry Siegel, Harry S. Truman, Phyllis Brauner, Philip Perlman, Patricia Reynolds

Timeline Tags: Civil Liberties

The US Supreme Court rules that the federal government cannot seize the nation’s steel mills. In April, President Truman, fearing a nationwide strike that could impact the US war effort in Korea, ordered the seizure of all US steel mills; the lawsuit that resulted, Youngstown Sheet & Tube Co. v. Sawyer, quickly made its way to the Supreme Court.
Rejection of 'Inherent Powers' Claim - During oral arguments, the justices grilled Acting Attorney General Philip Perlman, demanding to know what statutes he had relied on for his arguments and asserting that the president had limitations both on his emergency wartime powers and on his ability to claim that he is the “sole judge” of the existence of, and remedies for, an emergency. The justices are not convinced by the government’s arguments for the president’s “inherent powers.” They are also troubled by repeated refusals of the government to provide facts and documentary backing for its legal arguments, and its reliance instead on claims of “national security.” The attorney for the steel industry, John Davis, quoted Thomas Jefferson in his argument: “In questions of power, let no more be said of confidence in man, but bind him down from mischief by the chains of the Constitution.” Justice William O. Douglas noted that if the government’s claims were valid, there would be “no more need for Congress.”
Court Rejects Argument - In a 6-3 vote, the Court rules that the president has no inherent power to seize the steel mills. Writing for the majority, Justice Hugo Black states: “In the framework of our Constitution, the president’s power to see that the laws are faithfully executed refutes the idea that he is to be a lawmaker.… The founders of this nation entrusted the lawmaking power to the Congress alone in both good and bad times.… This is a job for the nation’s lawmakers.” In a concurring opinion, Justice Robert Jackson writes, “No penance would ever expiate the sin against free government of holding that a president can escape control of executive powers by law through assuming his military role.” In his dissent, Chief Justice Fred Vinson (see March 1952) argues that “the gravity of the emergency” overrides the Constitutional arguments accepted by the majority of the Court. “Those who suggest that this is a case involving extraordinary powers should be mindful that these are extraordinary times. A world not yet recovered from the devastation of World War II has been forced to face the threat of another and more terrifying global conflict.” [Savage, 2007, pp. 123; Siegel, 2008, pp. 163-164] In 2007, reporter and author Charlie Savage will observe that the Youngstown decision “turned out to be only a pause in the movement toward an increasingly authoritarian presidency.” [Savage, 2007, pp. 19]

Entity Tags: William O. Douglas, John Davis, Hugo Black, Charlie Savage, Fred Vinson, Harry S. Truman, Philip Perlman, US Supreme Court

Timeline Tags: Civil Liberties

Lawyers make their opening arguments before the Supreme Court in the case of US v Reynolds, the lawsuit that finds the government had no overarching right to unilaterally refuse to deliver classified documents in the course of a wrongful death lawsuit against the government (see December 11, 1951). The government has appealed the appellate court ruling to the Supreme Court (see March 1952). Because four of the nine justices had voted not to hear the case—in essence to let the appellate court ruling stand—the defense is cautiously optimistic about the Court’s decision.
Judiciary Has No Right to Interfere with Powers of the Executive, Government Argues - Acting Solicitor General Robert Stern tells the Court that the appellate judges’ decision, written by Judge Albert Maris, “is an unwarranted interference with the powers of the executive,” and that the decision forced the government to choose “whether to disclose public documents contrary to the public interest [or] to suffer the public treasury to be penalized” (a reference to the decision to award the plaintiffs monetary damages—see October 12, 1950). The judiciary “lack[s] power to compel disclosure by means of a direct demand [as well as] by the indirect method of an order against the United States, resulting in judgment when compliance is not forthcoming.”
Executive Has No Right to Unilaterally Withhold Information, Defense Counters - Stern’s arguments are countered by those of the plaintiffs’ lawyer, Charles Biddle, who writes, “We could rest our case with confidence on the clear opinion of Judge Maris,” but continues by arguing that if the government asserts a claim of executive privilege on the basis of national security, it must make the documents available to the Court for adjudication, or at least provide enough information for the Court to judge whether the documents present in fact a threat to national security if disclosed. This is particularly true, Biddle argues, “where there is no showing that the documents in question contain any military secret” (Biddle is unaware that the documents’ classification status had been reduced two years before—see September 14, 1950). “The basic question here is whether those in charge of the various departments of the government may refuse to produce documents properly demanded… in a case where the government is a party (see June 21, 1949), simply because the officials themselves think it would be better to keep them secret, and this without the Courts having any power to question the propriety of such decision.… In other words, say the officials, we will tell you only what we think it is in the public interest that you should know. And furthermore, we may withhold information not only about military or diplomatic secrets, but we may also suppress documents which concern merely the operation of the particular department if we believe it would be best, for purposes of efficiency or morale, that no one outside of the department, not even the Court, should see them.”
No Basis for Claims of Military Secrets - Biddle argues that because of responses he has received to his demands over the course of this lawsuit, he is relatively sure there are no military secrets contained within them. “[T]he proof is to the contrary,” he says, and goes on to say that had the Air Force disclosed from the outset that the plane crash, the fatal accident that sparked the original lawsuit (see October 6, 1948), was probably caused by pilot error and not by random chance, the plaintiffs may have never needed to ask for the disclosure of the documents in question, the accident reports on the crash (see October 18, 1948). “The secretary [of the Air Force]‘s formal claim of privilege said that the plane at the time was engaged in a secret mission and that it carried confidential equipment,” Biddle says, “but nowhere was it asserted that either had anything to do with the accident. The whole purpose of the demand by the respondents was for the purpose of finding out what caused the accident.… They were not in the least interested in the secret mission or equipment.” [Siegel, 2008, pp. 165-170]

Entity Tags: US Supreme Court, Albert Maris, Robert Stern, US Department of the Air Force, Charles Biddle

Timeline Tags: Civil Liberties

In their regular Saturday conference, the nine Supreme Court justices discuss the issues and arguments surrounding US v Reynolds (see October 21, 1952). According to the notes from the discussion, Chief Justice Fred Vinson, a strong advocate for expansive executive powers (see March 1952), says the case “boils down to Executive Branch determine privilege.” Other notes by Justice William O. Douglas suggest that Vinson isn’t convinced that the US must “be forced to pay for exercising its privilege” (see October 12, 1950). A straw vote taken at the end of the discussion shows five justices in favor of the government’s position to unilaterally withhold classified documents—overturning the appellate court decision (see December 11, 1951), and four in favor of allowing the decision to stand. [Siegel, 2008, pp. 171]

Entity Tags: Fred Vinson, US Supreme Court, William O. Douglas

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

One of a number of semi-official ‘Christian Identity’ logos.One of a number of semi-official ‘Christian Identity’ logos. [Source: KingIdentity (.com)]The “Christian Identity” theology, formerly a fairly benign expression of what is known as “British-Israelism” or “Anglo-Israelism,” begins to spread throughout the US and Canada, particularly on the west coasts of these nations. This belief holds that white Americans and Canadians are the real descendants of the Biblical tribes of Israel. In 2003, author Nicole Nichols, an expert on far-right racist and religious groups in America, will define the concept of “Christian Identity” as practiced by many white supremacist and separatist groups. Christian Identity is not an organization, she will write, but an ideology that many organizations have adopted in some form or fashion. Christian Identity “elevates white supremacy and separatism to a Godly ideal,” she will write, calling it “the ideological fuel that fires much of the activity of the racist far right.” According to Christian Identity theology, Jews are neither the “true Israelites” nor the true “chosen people” of God; instead, Christian Identity proponents claim, Jews are descended from an Asiatic people known as the Khazars, who settled near the Black Sea during the Middle Ages. [Nicole Nichols, 2003; Anti-Defamation League, 2005; Ontario Consultants on Religious Tolerance, 5/30/2006] In 2005, the Ontario Consultants on Religious Tolerance will write, “Followers tend to be involved in political movements opposing gun control, equal rights to gays and lesbians, and militia movements,” and quote Michael Barkun, an expert on radical-right groups, as saying, “This virulent racist and anti-Semitic theology… is prevalent among many right-wing extremist groups and has been called the ‘glue’ of the racist right.” [Ontario Consultants on Religious Tolerance, 5/30/2006]
Beginnings; 'The Protocols of the Elders of Zion' - In the 1920s, William J. Cameron, editor of the Dearborn Independent weekly newspaper, popularized the anti-Semitic hoax manuscript called “The Protocols of the Elders of Zion,” which purported to detail the “secret teachings” of Judaism, including the planned takeover of the world’s governments, the subjugation of non-Semitic races, and the bizarre, cannibalistic rituals supposedly practiced by Jews. [Anti-Defamation League, 2005]
Wesley Swift and 'Mud People' - In the 1940s, a former Methodist minister, Wesley Swift, started his own church, later known as the Church of Jesus Christ Christian. Swift had deep ties to a number of radical right-wing groups including the Ku Klux Klan; Swift and his associates set the stage for the mutation of the Christian Identity into a loosely organized set of virulently anti-Semitic, racist belief systems that will come to be grouped together under the “Christian Identity” rubric. Swift himself taught that only the white race was created in the form of God, while Asian and African races were created from the “beasts of the fields,” and thusly are subhuman creations. In Swift’s version of Genesis, Eve, the wife of the first “true” man Adam, was seduced by The Serpent, who masqeueraded as a white man. Eve bore a son, Cain, who is the actual father of the Jewish people. This reinterpretation, sometimes called the “two-seed” or “seedliner” theory, supports the Christian Identity propensity to demonize Jews, whom Swift and others labeled the “spawn of Satan.” Today’s white Europeans and their American and Canadian descendants, Swift taught, are descended from the “true son” of Adam and Eve, Abel, and are the actual “chosen people” of God. Some Christian Identity adherents go even farther, claiming that subhuman “pre-Adamic” races existed and “spawned” the non-white races of the world, which they label “mud people.” [Nicole Nichols, 2003; Anti-Defamation League, 2005]
Permeates Racist, Far-Right Groups - By the 1960s, a new group of Christian Identity leaders emerges to spread the Identity theology through the radical, racist right in America and Canada, popularizing the once-obscure ideology. Most prominent among them are three disciples of Swift: James K. Warner, William Potter Gale, and Richard Butler. Warner, who will move to Louisiana and play a leading role in the fight against civil rights, founds the Christian Defense League and the New Christian Crusade Church. Gale, an early leader of the Christian Defense League and its paramilitary arm, the California Rangers, goes on to found the Posse Comitatus (see 1969), the group that will help bring about the sovereign citizen movement. Gale will later found the Committee of the States and serve as the “chief of staff” of its “unorganized militia.” Butler moves Swift’s Church of Jesus Christ Christian to Idaho and recasts it as the neo-Nazi group Aryan Nations (see Early 1970s). Under the leadership of Butler, Gale, Warner, and others, Christian Identity soon permeates most of the major far-right movements, including the Klan and a racist “skinhead” organization known as the Hammerskins. It also penetrates many extreme anti-government activist groups. The Anti-Defamation League will write, “The resurgence of right-wing extremism in the 1990s following the Ruby Ridge (see August 31, 1992) and Waco standoffs (see April 19, 1993) further spread Identity beliefs.” [Anti-Defamation League, 2005] Nichols will write: “Christian Identity enclaves provide a trail of safe havens for movement activists, stretching from Hayden Lake in northern Idaho (the Aryan Nations stronghold) to Elohim City on the Oklahoma/Arkansas border (see 1973 and After). Many white supremacists on the run from federal authorities have found shelter and support from Christian Identity followers.” Some organizations such as the Montana Militia are headed by Identity adherents, but do not as a group promote the theology. [Nicole Nichols, 2003; Anti-Defamation League, 2005]
Bringing Forth the Apocalypse - Many Christian Identity adherents believe that the Biblical Apocalypse—the end of the world as it is currently known and the final ascendancy of select Christians over all others—is coming soon. Unlike some Christians, Identity adherents do not generally believe in the “rapture,” or the ascendancy of “saved” Christians to Heaven before the Apocalypse ensues; instead, Identity followers believe Jesus Christ will return to Earth only after the time of the “Tribulation,” a great battle between good and evil, which will set the stage for the return of Christ and the final transformation of the world. Identity followers believe it is their duty to prepare for the Apocalypse, and some believe it is their duty to help bring it about. They tend to cast the Apocalypse in racial terms—whites vs. nonwhites. Identity adherents believe that worldly institutions will collapse during the “end times,” and therefore tend to distrust such institutions, making Identity theology appealing to anti-government ideologies of groups such as militia, “Patriot,” and sovereign citizens groups. [Anti-Defamation League, 2005]
21st Century Identity - In the 21st century, Christian Identity groups are strongest in the Pacific Northwest of America and Canada, and the US Midwest, though Identity churches can be found throughout the US and in other parts of Canada. Identity churches also exist in, among other nations, Ireland, Great Britain, Australia, and South Africa (see June 25, 2003). The Anti-Defamation League will write: “Yet while spread far it is also spread thin. Estimates of the total number of believers in North America vary from a low of 25,000 to a high of 50,000; the true number is probably closer to the low end of the scale. Given this relatively small following, its extensive penetration of the far right is all the more remarkable.” [Anti-Defamation League, 2005]
Identity Violence - Identity adherents commit a number of violent acts, often against government and/or financial institutions, in an outsized proportion to their small numbers. In 1983, Identity adherent Gordon Kahl kills two US Marshals who attempt to arrest him on a parole violation, and kills an Arkansas sheriff before finally being gunned down by authorities (see February 13, 1983 and After). The white supremacist terrorist group The Order (see Late September 1983) contains a number of Identity members, including David Tate, who kills a Missouri Highway Patrol officer while attempting to flee to an Identity survivalist compound (see April 15, 1985). During the 1980s, small Identity groups such as The New Order (or The Order II) and the Arizona Patriots commit bombings and armored car robberies. After the Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995), Identity minister Willie Ray Lampley attempts a number of bombings (see November 9, 1995). In 1996, the Montana Freeman, led by Identity members, “stands off” federal authorities for 81 days (see March 25, 1996). Between 1996 and 1998, Eric Robert Rudolph, who has connections to Identity ministers such as Nord Davis and Dan Gayman, bombs an Atlanta gay bar (see February 21, 1997), several abortion clinics (see October 14, 1998), and the Atlanta Summer Olympics (see July 27, 1996 and After). In 1999, Identity member and former Aryan Nations security guard Buford Furrow goes on a shooting spree at a Jewish community center in Los Angeles (see August 10, 1999). [Anti-Defamation League, 2005]

The CIA’s Technical Services Division (TSD) considers plans to undermine Fidel Castro’s charismatic appeal by sabotaging his speeches. At one point, there is discussion of spraying Castro’s broadcasting studio with a hallucinogenic chemical. The plan is taken of the shelf because the chemical is deemed unreliable. During this period, the TSD laces a box of cigars with a chemical that would produce temporary disorientation, hoping that he will smoke one of the cigars before giving a speech. In another instance, the TSD comes up with a scheme to dust Castro’s shoes with thallium salts during a trip outside of Cuba. The salts would cause his beard to fall out. The plan is abandoned when Castro cancels the trip. [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, Technical Services Division (TSD)

Timeline Tags: US-Cuba (1959-2005)

The CIA works with a high-level Cuban official, codenamed “AM/LASH,” on a plan to assassinate Fidel Castro and overthrow his government. In June 1965, the CIA ends its contact with AM/LASH and his associates, citing security concerns. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Timeline Tags: US-Cuba (1959-2005)

The CIA’s Task Force W devises two plans to assassinate Fidel Castro. The first one, involving an exploding sea shell that would be placed where Castro regularly dives, is dismissed by the CIA’s Technical Services Division (TSD) as impractical. In the second plan, James Donovan (who has been negotiating with Castro for the release of prisoners taken during the Bay of Pigs operation) would present Castro with a contaminated diving suit. TSD decides to give the plan a try. It purchases a diving suit and laces its breathing apparatus with tubercule bacillus. The suit itself is dusted with a fungus that is known to cause a chronic skin disease. But the suit never leaves the laboratory. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Entity Tags: Technical Services Division (TSD), James Donovan, Fidel Castro

Timeline Tags: US-Cuba (1959-2005)

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]

Entity Tags: Malcolm Little, Central Intelligence Agency, Church Committee, Lew Allen, National Security Agency, Martin Luther King, Jr., Office of Security Services, Joan Baez

Timeline Tags: Civil Liberties

The NSA launches the first of seven satellites, code-named “Canyon,” that can pick up various types of voice and data traffic from Earth orbit. Canyon will lead to a more sophisticated satellite intelligence system, code-named “Rhyolite” (later “Aquacade”—see Early 1970s). [Federation of American Scientists, 7/17/1997]

Entity Tags: Rhyolite, National Security Agency, Canyon

Timeline Tags: Civil Liberties

The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). [Federation of American Scientists, 7/17/1997]

Entity Tags: National Security Agency, Echelon, Rhyolite, Chalet, Government Communications Headquarters, Owen Lewis, Canyon

Timeline Tags: Civil Liberties

July 26-27, 1970: Nixon Rejects Huston Plan

After President Nixon approves of the so-called “Huston Plan” to implement a sweeping new domestic intelligence and internal security apparatus (see July 14, 1970), FBI director J. Edgar Hoover brings the plan’s author, White House aide Tom Charles Huston (see June 5, 1970), into his office and vents his disapproval. The “old ways” of unfettered wiretaps, political infiltration, and calculated break-ins and burglaries are “too dangerous,” he tells Huston. When, not if, the operations are revealed to the public, they will open up scrutiny of US law enforcement and intelligence agencies, and possibly reveal other, past illegal domestic surveillance operations that would embarrass the government. Hoover says he will not share FBI intelligence with other agencies, and will not authorize any illegal activities without President Nixon’s personal, written approval. The next day, Nixon orders all copies of the decision memo collected, and withdraws his support for the plan. [Reeves, 2001, pp. 236-237] W. Mark Felt, the deputy director of the FBI, later calls Huston “a kind of White House gauleiter over the intelligence community.” Washington Post reporter Bob Woodward will note that the definition of “gauleiter” is, according to Webster’s Dictionary, “the leader or chief officoal of a political district under Nazi control.” [Woodward, 2005, pp. 33-34]

Entity Tags: W. Mark Felt, Tom Charles Huston, J. Edgar Hoover, Federal Bureau of Investigation, Central Intelligence Agency, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

CIA Counterintelligence Director James Angleton.CIA Counterintelligence Director James Angleton. [Source: CI Centre.com]CIA Director James Schlesinger orders an internal review of CIA surveillance operations against US citizens. The review finds dozens of instances of illegal CIA surveillance operations against US citizens dating back to the 1950s, including break-ins, wiretaps, and the surreptitious opening of personal mail. The earlier surveillance operations were not directly targeted at US citizens, but against “suspected foreign intelligence agents operating in the United States.” Schlesinger is disturbed to find that the CIA is currently mounting illegal surveillance operations against antiwar protesters, civil rights organizations, and political “enemies” of the Nixon administration. In the 1960s and early 1970s, CIA agents photographed participants in antiwar rallies and other demonstrations. The CIA also created a network of informants who were tasked to penetrate antiwar and civil rights groups and report back on their findings. At least one antiwar Congressman was placed under surveillance, and other members of Congress were included in the agency’s dossier of “dissident Americans.” As yet, neither Schlesinger nor his successor, current CIA Director William Colby, will be able to learn whether or not Schlesinger’s predecessor, Richard Helms, was asked by Nixon officials to perform such illegal surveillance, though both Schlesinger and Colby disapproved of the operations once they learned of them. Colby will privately inform the heads of the House and Senate Intelligence Committees of the domestic spying engaged in by his agency. The domestic spying program was headed by James Angleton, who is still serving as the CIA’s head of counterintelligence operations, one of the most powerful and secretive bureaus inside the agency. It is Angleton’s job to maintain the CIA’s “sources and methods of intelligence,” including the prevention of foreign “moles” from penetrating the CIA. But to use counterintelligence as a justification for the domestic spying program is wrong, several sources with first-hand knowledge of the program will say in 1974. “Look, that’s how it started,” says one. “They were looking for evidence of foreign involvement in the antiwar movement. But that’s not how it ended up. This just grew and mushroomed internally.” The source continues, speaking hypothetically: “Maybe they began with a check on [Jane] Fonda. They began to check on her friends. They’d see her at an antiwar rally and take photographs. I think this was going on even before the Huston plan” (see July 26-27, 1970 and December 21, 1974). “This wasn’t a series of isolated events. It was highly coordinated. People were targeted, information was collected on them, and it was all put on [computer] tape, just like the agency does with information about KGB agents. Every one of these acts was blatantly illegal.” Schlesinger begins a round of reforms in the CIA, a program continued by Colby. [New York Times, 12/22/1974 pdf file]

Entity Tags: William Colby, Senate Intelligence Committee, Richard Helms, James Angleton, Jane Fonda, Nixon administration, Central Intelligence Agency, James R. Schlesinger, House Intelligence Committee

Timeline Tags: Civil Liberties

Former CIA director Richard Helms.Former CIA director Richard Helms. [Source: Search.com]Former CIA director Richard Helms indirectly confirms the involvement of the Nixon administration in his agency’s illegal domestic surveillance operations during his testimony before the Senate Watergate investigative committee. Helms tells the committee that he was told by Nixon’s Foreign Intelligence Advisory Board that the CIA could “make a contribution” in domestic intelligence operations. “I pointed out to them very quickly that it could not, there was no way,” Helms testifies. “But this was a matter that kept coming up in the context of feelers: Isn’t there somebody else who can take on these things if the FBI isn’t doing them as well as they should, as there are no other facilities?” (FBI director J. Edgar Hoover’s opposition to the idea of spying on US citizens for Nixon’s political purposes is well documented.) CIA officials say that, despite Helms’s testimony, Helms began the domestic spying program as asked, in the beginning to investigate beliefs that the antiwar movement was permeated by foreign intelligence agents in 1969 and 1970. “It started as a foreign intelligence operation and it bureaucratically grew,” one source says in 1974. “That’s really the answer.” The CIA “simply began using the same techniques for foreigners against new targets here.” The source will say James Angleton, the CIA’s director of counterintelligence (see 1973), began recruiting double agents inside the antiwar and civil rights organizations, and sending in “ringers” to penetrate the groups and report back to the CIA. “It was like a little FBI operation.” Angleton reportedly believes that both the protest groups and the US media are riddled with Soviet intelligence agents, and acts accordingly to keep those groups and organizations under constant watch. One source will say Angleton has a “spook mentality.” Another source will say that Angleton’s counterintelligence bureau is “an independent power in the CIA. Even people in the agency aren’t allowed to deal directly with the CI [counterintelligence] people. Once you’re in it, you’re in it for life.” [New York Times, 12/22/1974 pdf file]

Entity Tags: Senate Watergate Investigative Committee, Richard Helms, J. Edgar Hoover, James Angleton, Issuetsdeah

Timeline Tags: Civil Liberties, Nixon and Watergate

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Vice President Nelson Rockefeller (see December 19, 1974 and After) is instrumental in keeping Senate Democrats from finding out too much about the intelligence community’s excesses. When the New York Times reveals the existence of a decades-old illegal domestic surveillance program run by the CIA (see December 21, 1974), President Ford heads off calls from Democrats to investigate the program by appointing the “Rockefeller Commission” to investigate in the Democrats’ stead. Senate Democrats, unimpressed with the idea, create the Church Committee to investigate the intelligence community (see April, 1976). Rockefeller is adept at keeping critical documents out of the hands of the Church Committee and the press. When Senator Frank Church asks for materials from the White House, he is told that the Rockefeller Commission has them; when he asks Rockefeller for the papers, he is told that he cannot have them because only the president can authorize access. One Church aide later calls Rockefeller “absolutely brilliant” in denying them access in a friendly manner. “He winked and smiled and said, ‘Gee, I want to help you but, of course I can’t—not until we’ve finished our work and the president approves it,’” the aide recalls. Senator John Tower (R-TX), the vice chairman of the committee, will later reflect, “We were very skillfully finessed.” But even Rockefeller, who has his own history of involvement with the CIA, is taken aback at the excesses of the CIA, particularly its history of assassinating foreign leaders. Rockefeller will eventually turn that information over to the Church Committee, giving that body some of the most explosive evidence as yet made public against the agency. [US Senate, 7/7/2007]

Entity Tags: John Tower, Church Committee, Nelson Rockefeller, Central Intelligence Agency, Frank Church, Gerald Rudolph Ford, Jr, ’Rockefeller Commission’

Timeline Tags: Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” [Dubose and Bernstein, 2006, pp. 34-35]

Entity Tags: Seymour Hersh, US Department of Defense, Ford administration, Edward Levi, Donald Rumsfeld, Church Committee, Richard (“Dick”) Cheney, Philip Buchan, New York Times, Gerald Rudolph Ford, Jr

Timeline Tags: Civil Liberties

The Senate Select Committee to Study Governmental Operations releases its report, “Alleged Assassination Plots Involving Foreign Leaders,” which finds “concrete evidence of at least eight plots involving the CIA to assassinate Fidel Castro from 1960 to 1965.” [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, US Congress

Timeline Tags: US-Cuba (1959-2005)

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]

Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News

Timeline Tags: Civil Liberties

President Ford issues Executive Order 11905, which limits the power of the CIA, the NSA, and military intelligence to engage in surveillance of US citizens. Perhaps its most well-known provision is a total ban on “political assassinations” by US government personnel. [Gerald R. Ford, 2/18/1976; Roberts, 2008, pp. 38] The provision is sparked by the Church Commission’s finding (see April, 1976) that assassination is “unacceptable in our society,” and a political embarassment, especially botched attempts such as the CIA’s efforts to kill Cuba’s Fidel Castro. [Grant J. Lilly, 4/6/2006]

Entity Tags: Church Commission, Gerald Rudolph Ford, Jr, National Security Agency, Central Intelligence Agency

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

The US Foreign Intelligence Advisory Board recommended in 1970 that “economic intelligence be considered a function of national security” equal to that of other intelligence. In 1977, the NSA, CIA, and Department of Commerce forms a joint “Office of Intelligence Liaison” (later renamed the “Office of Executive Support”) specifically authorized to handle “foreign intelligence” of interest to the Commerce Department, much of it provided by the NSA. The other countries using Echelon, the NSA’s satellite surveillance program, which include Britain, Canada, Australia, and New Zealand, all operate similar programs. President Bill Clinton will extend this operation in 1993. In 1993, the European company Panavia will be specifically targeted over aircraft sales to the Middle East. In 1994, US companies will be given NSA and CIA intelligence intercepts that help them win contracts in Indonesia. Other information that will be provided by US intelligence to US and allied corporations include information about the emission standards for Japanese automobiles, 1995 trade negotiations over the US importing of Japanese luxury cars, France’s participation in the GATT trade negotiations of 1993, and the 1997 Asian-Pacific Economic Conference. [Science and Technology Assessments Office, 8/15/2000]

Entity Tags: William Jefferson (“Bill”) Clinton, Issuetsdeah, National Security Agency, Office of Executive Support, Panavia

Timeline Tags: Civil Liberties

Interviewer David Frost has a difficult time with his subject, former President Richard Nixon, in the day’s early questioning (see April 6, 1977). Frost attempts to recoup with a line of questioning suggested by his adviser James Reston, Jr., one used in the trial of former Nixon aide John Ehrlichman (see January 1, 1975). Were there no limits to what a president can do, even if the president wants to do something plainly illegal? he asks. Could he do anything despite the law? Burglary? Forgery? Even murder? “If the president does it, that means it’s not illegal,” Nixon retorts. “Never had his imperialism been so baldly stated,” Reston will later reflect. Frost asks if the dividing line between, for example, a police burglary and the murder of an antiwar protester is only the president’s judgment? Nixon agrees, and adds: “There’s nothing specific that the Constitution contemplates in that respect. I haven’t read every word, every jot and every tittle, but I do know this: That it has been, however, argued that as far as a president is concerned, that in war time, a president does have certain extraordinary powers which would make acts that would otherwise be unlawful, lawful if undertaken for the purpose of preserving the nation and the Constitution, which is essential for the rights we’re all talking about.” [Time, 5/30/1977; Reston, 2007, pp. 102-105; Landmark Cases, 8/28/2007]

Entity Tags: Richard M. Nixon, David Frost, James Reston, Jr, John Ehrlichman

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

A photograph of Theodore ‘Ted’ Kaczynski, taken in 1968 while Kaczynski was a young faculty member at the University of California at Berkeley.A photograph of Theodore ‘Ted’ Kaczynski, taken in 1968 while Kaczynski was a young faculty member at the University of California at Berkeley. [Source: George M. Bergman / Wikimedia]An unmailed package is found in a car park at the University of Illinois, Chicago, and brought to Northwestern University in Evanston, Illinois, because of its return address; the addressee now teaches at Rensselaer Polytechnic Institute in Troy, New York. Buckley Crist, the material sciences professor named in the return address on the package cannot identify it, and turns it over to campus security. When Northwestern police officer Terry Marker opens it, it explodes, injuring him slightly. The package contains a pipe bomb packed in a carved wooden box. [BBC, 11/12/1987; Washington Post, 4/14/1996; Washington Post, 1998] The bomb is made of a nine-inch pipe filled with explosive powders and triggered by a nail held by rubber bands that strikes and ignites match heads when the box is opened. [World of Forensic Science, 1/1/2005] The package contains 10 $1 commemorative Eugene O’Neill stamps on its outer wrapper. Authorities will later speculate that the bomber may have chosen the O’Neill stamps because the playwright was an ardent supporter of anarchists. [Knight Ridder, 5/28/1995] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). It is believed to be Kaczynski’s first bomb. [New York Times, 4/7/1996]

Entity Tags: Terry Marker, Northwestern University, Theodore J. (“Ted”) Kaczynski, Buckley Crist

Timeline Tags: US Domestic Terrorism

A young Fauzi Hasbi.A young Fauzi Hasbi. [Source: SBS Dateline]Fauzi Hasbi, the son of a separatist leader in the Indonesian province of Aceh, is captured by an Indonesian military special forces unit in 1979 and soon becomes a mole for the Indonesian government. Hasbi becomes a leader in the separatist Free Aceh Movement (GAM), and he also plays a long-time role in Jemaah Islamiyah, an al-Qaeda affiliate. For many years, he literally lives next door to Jemaah Islamiyah leaders Abu Bakar Bashir and Hambali (see April 1991-Late 2000). In 2005, the Australian television program SBS Dateline will present documents that it claims “prove beyond doubt that Fauzi Hasbi had a long association with the [Indonesian] military.” For instance, military documents dating from 1990 and 1995 give him specific spying tasks. [SBS Dateline, 10/12/2005] In February 2001, the Indonesian magazine Tempo documents some of Hasbi’s links to the Indonesian military, after he has been linked to a major role the Christmas bombings in Indonesia two months earlier (see December 24-30, 2000 and February 20, 2001). He admits to having some ties to certain high-ranking military figures and says he has had a falling out with GAM, but denies being a traitor to any militant group. [Tempo, 2/20/2001; Tempo, 2/27/2001] Yet even after this partial exposure, he continues to pose as an Islamist militant for the military. A 2002 document shows that he is even assigned the job of special agent for BIN, Indonesia’s intelligence agency. [SBS Dateline, 10/12/2005] A December 2002 report by a US think tank, the International Crisis Group, details his role as a government mole. He and two of his associates are abducted and killed in mysterious circumstances in the Indonesian city of Ambon on February 22, 2003. Seven suspects, including an Indonesian policeman, later admit to the killings but their motive for doing so remains murky. [Agence France-Presse, 5/22/2003]

Entity Tags: Tentara Nasional Indonesia, Jemaah Islamiyah, Free Aceh Movement, Badan Intelijen Negara, Fauzi Hasbi

Timeline Tags: Complete 911 Timeline

A graduate student at Northwestern University in Evanston, Illinois, John Harris, is injured when he opens a box left at the University’s Technological Institute. The box contains a bomb that explodes when opened. Harris suffers minor cuts and burns. [BBC, 11/12/1987; Washington Post, 1998] Authorities recognize fundamental similarities between this and a previous Northwestern University bombing (see May 25-26, 1978). This bomb is quite similar in construction to that one, though more sophisticated in construction and design. It consists of a cigar box and a pipe bomb, triggered by a battery-operated filament that ignites explosive powders. [World of Forensic Science, 1/1/2005] However, the package contains a number of small, finger-sized pieces of wood glued to its outer container. [Knight Ridder, 5/28/1995] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see May 25-26, 1978 and April 3, 1996).

Entity Tags: Theodore J. (“Ted”) Kaczynski, Northwestern University, John Harris

Timeline Tags: US Domestic Terrorism

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

About 500 Iranian students take over the American Embassy in Tehran and hold 52 Americans hostage for 444 days. The Mujahedeen-e Khalq (MEK) is one of the groups that supports the take-over. [US Department of State, 4/30/2003; PBS, 1/15/2006]

Entity Tags: People’s Mujahedin of Iran

Timeline Tags: US confrontation with Iran, Iran-Contra Affair

Shortly after the seizure of the US embassy in Tehran (see November 4, 1979-January 20, 1981), President Jimmy Carter issues Executive Order 12170 freezing Iranian government assets held in the United States under the authority of the International Emergency Economic Powers Act (IEEPA). [US President, 11/14/1979] Iran has an estimated $12 billion in bank deposits, gold, and other properties, including $5.6 billion in deposits and securities held by overseas branches of US banks. [US Department of the Treasury. Office of Foreign Assets Control, 11/1979]

Entity Tags: James Earl “Jimmy” Carter, Jr.

Timeline Tags: US confrontation with Iran

A parcel mailed from Chicago catches fire in a mailbag aboard American Airlines Flight 444 from Chicago to Washington, DC. The package contains a bomb which was apparently constructed to explode inside the cargo hold. Twelve passengers are treated for smoke inhalation; the flight conducts an emergency landing at Dulles Airport near Washington. [BBC, 11/12/1987; Washington Post, 1998] The bomb does not ignite because instead of explosive powder, it contains barium nitrate, a powder often used to create green smoke in fireworks. [World of Forensic Science, 1/1/2005] The bombing is later shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). After the airline bombing and the subsequent bombing of a United Airlines executive (see June 10, 1980), the FBI ties the previous bombings (see May 25-26, 1978 and May 9, 1979) to this one and code-names the file UNABOM, for “UNiversity and Airline BOMber.” The media will soon dub the unknown assailant the “Unabomber.” [Washington Post, 4/4/1996; World of Forensic Science, 1/1/2005] Kaczynski will later express regret for trying to bomb the plane (see April 24, 1995).

Entity Tags: Washington Dulles International Airport, Theodore J. (“Ted”) Kaczynski, Federal Bureau of Investigation

Timeline Tags: US Domestic Terrorism

1980: Afghan Fighters Begin Training in US

Some fighters opposing the Soviets in Afghanistan begin training in the US. According to journalist John Cooley, the training is done by Navy Seals and Green Beret officers who have taken draconian secrecy oaths. Key Pakistani officers are trained, as well as some senior Afghan mujaheddin. Much of the training takes place in Camp Peary, near Williamsburg, Virginia, which is said to be the CIA’s main location for training spies and assets. Other training takes place at Fort Bragg, North Carolina, Harvey Point, North Carolina, and Fort A. P. Hill, Virginia. Subjects are trained in how to detect explosives, surveillance, how to recruit new agents, how to run paramilitary operations, and more. They are taught to use many different weapons as well, including remote-controlled mines and bombs, and sophisticated timers and explosives. Cooley claims that “apparently [no] Arab or other foreign volunteers” are trained in the US. [Cooley, 2002, pp. 70-72] However, in the late 1980s, US consular official Michael Springmann will notice fighters from many Middle Eastern nations are getting US visas, apparently to train in the US for the Afghan war (see September 1987-March 1989). Additionally, more training takes place in other countries. For instance, Cooley will note, “By the end of 1980, US military trainers were sent to Egypt to impart the skills of the US Special Forces to those Egyptians who would, in turn, pass on the training to the Egyptian volunteers flying to the aid of the mujaheddin in Afghanistan.” Cooley will further note, “Time and time again, these same techniques reappear among the Islamist insurgents in Upper Egypt and Algeria, since the ‘Afghani’ Arab veterans began returning there in the late 1980s and early 1990s.” [Cooley, 2002, pp. 70-72] It is not known how long these training programs continue.

Entity Tags: Green Berets, Central Intelligence Agency, Michael Springmann, Navy Seals

Timeline Tags: Complete 911 Timeline, War in Afghanistan

In his Lake Forest, Illinois, home, United Airlines president Percy Wood opens a package that apparently contains a book. It contains both a book and a bomb in the book’s hollowed-out pages. It explodes, causing Wood to suffer cuts and bruises. The initials “FC” are found etched on, or punched into, a piece of pipe from the bomb. [BBC, 11/12/1987; Washington Post, 1998; World of Forensic Science, 1/1/2005] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). “FC” will later be found to stand for “Freedom Club.” [Washington Post, 1/23/1998; World of Forensic Science, 1/1/2005] Authorities will later speculate that Wood may have been targeted in part because of Kaczynski’s strange fascination with wood; he often uses wood in the construction of his bombs. The hollowed-out book, Ice Brothers, is published by Arbor House, whose symbol is a tree leaf. [Associated Press, 4/25/1995] The package contains a note asking Wood to read the enclosed book, and noting, “You will find it of great social significance.” The author of Ice Brothers, Sloan Wilson, also wrote The Man in the Gray Flannel Suit, which, according to a 1959 biography of Wilson, “was the definitive epithet for the commuting suburbanite, the status-hungry conformist from Madison Avenue.” Like an earlier bomb (see May 25-26, 1978), this bomb’s package is mailed using postage stamps commemorating the playwright Eugene O’Neill; authorities will speculate that Kaczynski may have chosen the stamps because of O’Neill’s ardent support of anarchists. [Knight Ridder, 5/28/1995]

Entity Tags: Percy Wood, Theodore J. (“Ted”) Kaczynski

Timeline Tags: US Domestic Terrorism

A federal court rules that because of the government’s “state secrets” privilege (see March 9, 1953), a civilian plaintiff suing the US Navy over a contractual agreement cannot even access “non-privileged,” or unclassified, information from the Navy because to do so might “threaten disclosure” of material that goes against “the overriding interest of the United States… preservation of its state secrets privilege precludes any further attempt to pursue litigation.” [Siegel, 2008, pp. 196-197]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

State Department intern Richard Barlow.State Department intern Richard Barlow. [Source: Richard Barlow]Richard Barlow, an intern at the State Department’s Arms Control and Disarmament Agency (ACDA), finds that Pakistan has been attempting to build a nuclear bomb since the early 1970s, but his superiors do not follow up and he loses his job in a reorganization. Barlow, who has recently graduated from university after writing a thesis on counter-proliferation intelligence, is concerned about the burgeoning black markets in nuclear weapons technology. He will later comment, “Everywhere I looked I kept coming up against intelligence about Pakistan’s WMD program. I thought I was telling them what they needed to hear, but the White House seemed oblivious.” One reason the White House appears deaf is that Pakistan is now an important US ally, as it is a major supply point for the CIA-backed anti-Soviet Afghan mujaheddin. In addition, a group of “Republican hawks,” including Paul Wolfowitz, has convinced President Ronald Reagan that America needs a new strategy against potential nuclear threats, since long-term policies such as détente and containment are supposedly not working. When Reagan starts to build up US arms, the staff at ACDA is cut by a third and Barlow is one of the employees who loses his job. [Guardian, 10/13/2007]

Entity Tags: US Department of State, Ronald Reagan, Paul Wolfowitz, Richard Barlow, Arms Control and Disarmament Agency

Timeline Tags: A. Q. Khan's Nuclear Network

Ronald and Nancy Reagan celebrate winning the presidency.Ronald and Nancy Reagan celebrate winning the presidency. [Source: Medal of Freedom (.com)]After winning a sweeping election victory against President Jimmy Carter in November 1980, Ronald Reagan is sworn in as US president. The same day that Reagan is sworn in, Iran releases the remaining 52 hostages it has held captive at the US Embassy in Tehran for 444 days (see November 4, 1979-January 20, 1981). [PBS, 2000]

Entity Tags: Ronald Reagan, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Iran-Contra Affair, Elections Before 2000

A maintenance worker at the University of Utah in Salt Lake City finds a bomb in a business classroom. The device is defused by the local bomb squad and no one is injured. [BBC, 11/12/1987; Washington Post, 1998] The bomb will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996).

Entity Tags: Theodore J. (“Ted”) Kaczynski, University of Utah

Timeline Tags: US Domestic Terrorism

President Ronald Reagan issues Executive Order 12333, which directs the US intelligence community to provide foreign intelligence data to the White House. The order reads in part, “[A]gencies are not authorized to use such techniques as electronic surveillance, unconsented physical searches, mail surveillance, physical surveillance, or monitoring devices unless they are in accordance with procedures established by the head of the agency concerned and approved by the Attorney General.” It establishes rules of conduct for the intelligence agencies, and mandates a certain level of Congressional oversight. [Executive Order 12333 -- United States intelligence activities, 4/5/2007] It also establishes the basis for what are later called “National Security Letters.” These NSLs, originally envisioned for use to compile information in hunts for foreign criminals and suspected terrorists, will later be used by the administration of George W. Bush to order US booksellers, librarians, employers, Internet providers, and others to turn over records and information they compile on US citizens, with strict adjuncts against allowing those targeted for surveillance to know about the NSLs and with virtually no government oversight (see October 25, 2005). [Washington Post, 11/6/2005] It does not, as some have later asserted, directly prohibit the assassination of targeted foreign subjects—i.e. terrorist suspects and even foreign leaders—though it does restrict the use of assassination by US government operatives to certain very restricted circumstances centered around critical aspects of national security. [Parks, 11/2/1989 pdf file]

Entity Tags: Ronald Reagan, George W. Bush, National Security Letters, Bush administration (43)

Timeline Tags: Civil Liberties

A parcel addressed to the head of the Vanderbilt University computer science department, Patrick Fischer, explodes, injuring Fischer’s secretary, Janet Smith. The package was originally sent to Fischer at Pennsylvania State University but was later forwarded to Nashville, Tennessee, where Vanderbilt University is located and where Fischer now teaches. [BBC, 11/12/1987; Washington Post, 1998] Fischer will later describe Smith’s injuries as “nasty lacerations,” and will say, “She made a full recovery, but it was very traumatic for her.” The bomb itself consists of smokeless powder and a large number of match heads. The package has a false return address, stating it comes from LeRoy Bearnson, a professor of electrical engineering at Utah’s Brigham Young University. Bearnson will later say, “I suppose the guy didn’t care which way it went or who got blown up.” FBI agent Oliver “Buck” Revell, who takes part in early phases of the bomb investigation, will later say: “He might pick out an individual, but the person was still a symbolic target to him. I suspect that once he targeted the university research system, it didn’t matter that much who received it. I suspect he felt the country would pick up the symbolism.” The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). When Fischer, along with the rest of the country, learns of Kaczynski’s identity, he will try to find connections between himself and Kaczynski, and come up with only the most tenuous of relationships: Fischer studied at the Massachusetts Institute of Technology (MIT) while Kaczynski studied at nearby Harvard, and Fischer may have shared a Harvard math class with Kaczynski. He also spent time in Salt Lake City, a city with which Kaczynski is familiar. “The agents made it very clear that I was the target,” Fischer will later say. “I still have no idea why, except my feeling is that he chose names at random with certain associations.” [Washington Post, 4/14/1996]

Entity Tags: Theodore J. (“Ted”) Kaczynski, Janet Smith, LeRoy Bearnson, Patrick Fischer, Vanderbilt University, Oliver (“Buck”) Revell

Timeline Tags: US Domestic Terrorism

An electrical engineering and computer science professor with the University of California at Berkeley, Diogenes Angelakos, picks up what he believes is a turpentine can, left in a common room in the computer science building during construction work. The can, a green, gallon-sized container, has wires dangling from it and a clock-dial attached to the wires. The device is a pipe bomb. It explodes, temporarily blinding Angelakos and severely burning his right hand. [BBC, 11/12/1987; Washington Post, 11/27/1993; Washington Post, 4/14/1996; Washington Post, 1998] The injuries to his hand and arm prevent him from effectively caring for his wife Helen in her final days; she will die a month later of terminal cancer. “I went to her funeral with my arm in a sling,” Angelakos will later recall. [Washington Post, 11/27/1993] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski once worked as a professor at UC-Berkeley.

Entity Tags: Diogenes Angelakos, Theodore J. (“Ted”) Kaczynski, University of California at Berkeley, Helen Angelakos

Timeline Tags: US Domestic Terrorism

In the second of two rulings in the case of Halkin v Helms, the judiciary comes down squarely on the side of the US government against charges of illegal surveillance and wiretapping leveled against American anti-war protesters. The district and appellate courts uphold the federal government’s “state secrets” claim as codified in US v Reynolds (see March 9, 1953), thereby denying the plaintiffs the right to see government information that they claim would prove their case. The DC Court of Appeals writes that the federal courts do not have any constitutional role as “continuing monitors of the wisdom and soundness of Executive action,” and instead the courts “should accord utmost deference to executive assertions of privilege on grounds of military or diplomatic secrets… courts need only be satisfied that there is a reasonable danger” that military secrets might be exposed. [Siegel, 2008, pp. 196-196]

Timeline Tags: Civil Liberties

Youssef Nada.Youssef Nada. [Source: Zuma Press/ NewsCom]In November 2001, Swiss investigators will search the home of Youssef Nada, the leader of Al Taqwa Bank, a Swiss bank that had just been shut down by the US and the UN for alleged ties to al-Qaeda, Hamas, and other radical militant groups (see November 7, 2001). Nada and other Al Taqwa directors are prominent members of the Muslim Brotherhood. Newsweek will say, “The Brotherhood, founded in Egypt in 1928 as a religious and quasi-political counterweight to the corrupt and increasingly decadent royalist and colonial governments dominating the Islamic world, always has had two faces: one a peaceful public, proselytizing and social-welfare oriented wing; the other a clandestine, paramilitary wing.… Intelligence and law-enforcement officials say that while some branches and elements of the Brotherhood, such as the offshoots now operating in Egypt and Syria, have pledged to work for their goal of a worldwide Islamic caliphate using peaceful means and electoral politics, the Brotherhood has also spun off many—if not most—of the more violent local and international groups devoted to the cause of Islamic holy war.” Such offshoots will include al-Qaeda and Hamas. [Newsweek, 12/24/2004] Swiss investigators discover a 14-page document from December 1982 entitled “The Project.” Nada claims not to know who wrote the document or how he came to have it, and he says he disagrees with most of the contents. The document details a strategic plan whose ultimate goal is “the establishment of the reign of God over the entire world.” The document begins, “This report presents a global vision of an international strategy of Islamic policy.” It recommends to “study of the centers of power locally and worldwide, and the possibilities of placing them under influence,” to contact and support new holy war movements anywhere in the world, to support holy war in Palestine, and “nurtur[e] the sentiment of rancor with regard to Jews.” Swiss investigators who analyze the document will later write that the strategy aims to achieve “a growing influence over the Muslim world. It is pointed out that the [Muslim Brotherhood] doesn’t have to act in the name of the Brotherhood, but can infiltrate existing entities. They can thus avoid being located and neutralized.” The document also advocates creating a network of religious, educational, and charitable institutions in Europe and the US to increase influence there. [Unknown, 12/1982; Le Temps (Geneva), 10/6/2005]

Entity Tags: Muslim Brotherhood

Timeline Tags: Complete 911 Timeline

Margaret Thatcher.Margaret Thatcher. [Source: UK Parliament]British prime minister Margaret Thatcher, displeased with two of her ministers for challenging her on unidentified policy matters, requests that they be placed under electronic surveillance. Because it is illegal for British intelligence to monitor its own citizens, the operation is handed over to the CSE, Canada’s national security agency. [Daily Iowan, 1/19/2006; Janczewski and Colarik, 2007, pp. 454] According to former CSE spy Mike Frost, who will publicly discuss the matter in 2000, Thatcher “had two ministers that she said ‘…weren’t onside.’” Thatcher, says Frost, “wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers.” Why CSE and not British intelligence? Because for the British to monitor their own government members would be illegal—so instead, they farm out such activities to their allies. “The British Parliament now have total deniability,” Frost says. “They didn’t do anything. They know nothing about it. Of course they didn’t do anything; we did it for them.” Frost will say there is no way to pin any blame or criminal charges on anyone in the British government. “The British Parliament now has total deniability,” Frost says. “They didn’t do anything… we did it for them.” [ZDNet, 2/25/2000; CBS News, 2/27/2000]

Entity Tags: Communications Security Establishment, Mike Frost, Government Communications Headquarters, Margaret Thatcher

Timeline Tags: Civil Liberties

The October 1983 bombing of US Marine barracks in Beirut, Lebanon.The October 1983 bombing of US Marine barracks in Beirut, Lebanon. [Source: US Marine Corps.]In June 1982, Israel invaded Lebanon and US Marines were sent to Lebanon as a peacekeeping force in September 1982. On April 18, 1983, the US embassy in Beirut, Lebanon, is bombed by a suicide truck attack, killing 63 people. On October 23, 1983, a Marine barracks in Beirut is bombed by another suicide truck attack, killing 241 Marines. In February 1984, the US military will depart Lebanon. The radical militant group Islamic Jihad will take credit for both attacks (note that this is not the group led by Ayman al-Zawahiri). The group is believed to be linked to Hezbollah. Prior to this year, attacks of this type were rare. But the perceived success of these attacks in getting the US to leave Lebanon will usher in a new era of suicide attacks around the world. The next two years in particular will see a wave of such attacks in the Middle East, many of them committed by the radical militant group Hezbollah. [US Congress, 7/24/2003; US Congress, 7/24/2003 pdf file] The Beirut bombings will also inspire Osama bin Laden to believe that the US can be defeated by suicide attacks. For instance, he will say in a 1998 interview: “We have seen in the last decade the decline of the American government and the weakness of the American soldier who is ready to wage Cold Wars and unprepared to fight long wars. This was proven in Beirut when the Marines fled after two explosions.” [ABC News, 5/28/1998] In 1994, he will hold a meeting with a top Hezbollah leader (see Shortly After February 1994) and arrange for some of his operatives to be trained in the truck bombing techniques that were used in Beirut. [9/11 Commission, 7/24/2004, pp. 48]

Entity Tags: Hezbollah, Islamic Jihad Organization, Ayman al-Zawahiri, Osama bin Laden

Timeline Tags: Complete 911 Timeline

July 29, 1983: SAAR Network Is Founded

555 Grove Street, Herndon, Virginia. This is the location of the SAAR Foundation/Safa Group and many related businesses.555 Grove Street, Herndon, Virginia. This is the location of the SAAR Foundation/Safa Group and many related businesses. [Source: Paul Sperry]The SAAR Foundation is incorporated in Herndon, Virginia, just outside Washington. It will become an umbrella organization for a cluster of over 100 charities, think tanks, and businesses known as the SAAR network. In 2002, the US government will raid the SAAR network looking for ties to the Al Taqwa Bank and the Muslim Brotherhood (see March 20, 2002). [Farah, 2004, pp. 153]

Entity Tags: SAAR Foundation

Timeline Tags: Complete 911 Timeline

Detective Sergeant Peter Caram, the head of the New York Port Authority’s Terrorist Intelligence Unit, has been directed by the assistant superintendent of the Port Authority Police Department to compile a report on the vulnerability of the WTC to a terrorist attack. Having previously worked at the WTC Command, Caram has exclusive knowledge of some of the center’s security weaknesses. On this day he issues his four-page report, titled “Terrorist Threat and Targeting Assessment: World Trade Center.” It looks at the reasoning behind why the WTC might be singled out for attack, and identifies three areas of particular vulnerability: the perimeter of the WTC complex, the truck dock entrance, and the subgrade area (the lower floors below ground level). Caram specifically mentions that terrorists could use a car bomb in the subgrade area—a situation similar to what occurs in the 1993 bombing (see February 26, 1993). [Caram, 2001, pp. 5, 84-85; New York County Supreme Court, 1/20/2004] This is the first of several reports during the 1980s, identifying the WTC as a potential terrorist target.

Entity Tags: World Trade Center, Peter Caram

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Alan Berg.Alan Berg. [Source: Denver Post]Alan Berg, a Jewish, progressive talk show host for Denver’s KOA 850 AM Radio, is gunned down in his driveway as he is stepping out of his car. The murder is carried out by members of the violent white-supremacist group The Order (see Late September 1983), a splinter group of the Aryan Nations white nationalist movement. Berg, who was described as often harsh and abrasive, regularly confronted right-wing and militia members on his show. Federal investigators learn that The Order’s “hit list” includes Berg, television producer Norman Lear, a Kansas federal judge, and Morris Dees, a civil rights lawyer and co-founder of the Southern Poverty Law Center (SPLC). Radio producer Anath White later says that some of Berg’s last shows were particularly rancorous, involving confrontational exchanges with anti-Semitic members of the Christian Identity movement (see 1960s and After). “That got him on the list and got him moved up the list to be assassinated,” White will say. [HistoryLink, 12/6/2006; Rocky Mountain News, 5/1/2007; Denver Post, 6/18/2009]
Preparing for the Murder - Order leader Robert Jay Mathews had already sent a colleague to Denver to determine if Berg was a viable target (see May 17, 1984). The four members of the assassination team—Mathews, Bruce Pierce, David Lane, and Richard Scutari—assemble at a local Motel 6 to review their plans. Pierce, the assassin, has brought a .45 caliber Ingram MAC-10 submachine gun for the job. All four men begin to surveill Berg’s townhouse.
Gunned Down - At 9:21 p.m., Berg drives his Volkswagen Beetle into his driveway. Lane, the driver, pulls up behind him. Mathews leaps out of the car and opens the rear door for Pierce, who jumps out and runs up the driveway. Berg exits his vehicle with a bag of groceries. Pierce immediately opens fire with his submachine gun, pumping either 12 or 13 bullets into Berg’s face and body before the gun jams. (Sources claim both figures of bullet wounds in Berg as accurate.) Pierce and Mathews get back into their car, rush back to the Motel 6, gather their belongings, and leave town. Three of the four members of the “hit squad” will soon be apprehended, charged, and convicted. Pierce is sentenced to 252 years in prison, including time for non-related robberies, and will die in prison in 2010; Lane is given 150 years, and will die in prison in 2007. Neither man is prosecuted for murder, as the evidence will be determined to be inconclusive; rather, they will be charged with violating Berg’s civil rights. Scutari, accused of serving as a lookout for Pierce, and Jean Craig, accused of collecting information on Berg for the murder, will both be acquitted of culpability in the case, but will be convicted of other unrelated crimes. Mathews will not be charged due to lack of evidence of his participation; months later, he will die in a confrontation with law enforcement officials (see December 8, 1984). [Rocky Mountain News, 5/1/2007; Denver Post, 6/18/2009; Denver Post, 8/17/2010] In sentencing Pierce to prison, Judge Richard Matsch will say of the murder, “The man [Berg] was killed for who he was, what he believed in, and what he said and did, and that crime strikes at the very core of the Constitution.” [Denver Post, 8/17/2010]
Re-Enacting a Fictional Murder? - Some will come to believe that the assassins may have attempted to re-enact the fictional murder of a Jewish talk-show host depicted in The Turner Diaries (see 1978). [Rocky Mountain News, 5/1/2007; The Moderate Voice, 11/30/2007]
'Opening Shot ... of a Truly Revolutionary Radical Right' - Mark Potok of the SPLC will characterize Berg’s murder as an early event leading to the 1995 Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995). “In a sense, it was one of the opening shots of a truly revolutionary radical right,” Potok will say, “perfectly willing to countenance the mass murder of American civilians for their cause.” [Denver Post, 6/18/2009] Berg’s ex-wife, Judith Berg, will travel around the country in the years after her ex-husband’s murder, speaking about what she calls the “disease and anatomy of hate,” a sickness that can infect people so strongly that they commit horrible crimes. In 2007, she will tell a reporter that Berg’s murder was a watershed event that inspired more hate-movement violence. “What happened to Alan in the grown-up world has reached into the youth culture,” she will say. “It opened the door to an acceptance of violence as a means of acting on hate.… While our backs are turned toward overseas, hate groups are having a heyday. People are very unhappy; they’re out of work and jobs are scarce. They’re ripe for joining extremist groups. We need to understand what happened to make sure it doesn’t happen again.” [Rocky Mountain News, 5/1/2007] White later says of Pierce, Lane, and their fellows: “It’s left me to wonder what makes somebody like this. I think these people didn’t have much opportunity in their lives and scapegoat. They blame others for not making it.” [Denver Post, 8/17/2010]

Entity Tags: Norman Lear, Robert Jay Mathews, Richard Scutari, Morris Dees, Richard P. Matsch, Mark Potok, Jean Margaret Craig, Judith Berg, Alan Berg, Anath White, Aryan Nations, Bruce Carroll Pierce, David Edan Lane, KOA 850 AM Radio, The Order

Timeline Tags: US Domestic Terrorism

The DC Court of Appeals rejects a claim by civilian plaintiffs to force the government to disclose classified information as part of a lawsuit, citing the “state secrets” privilege (see March 9, 1953). Furthermore, the court broadens the definition of “state secrets” to include “disclosure of intelligence-gathering methods or capabilities and disruption of diplomatic relations.” [Siegel, 2008, pp. 197]

Timeline Tags: Civil Liberties

Neoconservative academic Michael Ledeen, who left the Defense Department under suspicion of engaging in espionage on behalf of Israel (see 1983), gains a position at the National Security Council. His boss is Lieutenant Colonel Oliver North (see July 7-10, 1987 and May-June, 1989). According to Iran-Contra investigators, it is Ledeen who suggests to North “that Israeli contacts might be useful in obtaining release of the US hostages in Lebanon” (see November 4, 1979-January 20, 1981). Ledeen is granted high-level security clearance. [CounterPunch, 2/28/2004]

Entity Tags: Michael Ledeen, National Security Council

Timeline Tags: Iran-Contra Affair, Neoconservative Influence

A 2007 satellite image of the Khan Research Laboratories in Kahuta.A 2007 satellite image of the Khan Research Laboratories in Kahuta. [Source: GeoEye]Richard Barlow, an analyst working on Pakistan’s nuclear program who was released by the State Department in the early 1980s (see 1981-1982), is hired by the CIA’s Office of Scientific and Weapons Research (OSWR). Barlow re-analyzes the data and confirms his earlier conclusions—that Pakistan is pursuing a covert nuclear weapons program. Barlow learns about the trade in dual-use components—tools and equipment that can be used to make nuclear weapons, but also for other, non-nuclear purposes, meaning trade in them is hard to spot and regulate. One example of this is a California couple that exports dozens of high-speed cathode-ray oscilloscopes and special cameras to Hong Kong, where they are picked up by Pakistani agents. Barlow realizes that such a large number of oscilloscopes must be for nuclear weapons manufacturing, and also finds a link between the purchase and the Pakistan Atomic Energy Commission (PAEC). Barlow will later comment, “There was tons of it and most of it was ending up in [Pakistan]. Pakistan had a vast network of procurers, operating all over the world.” Barlow also finds that the material is going to a secret nuclear facility near Islamabad, the Khan Research Laboratories, where sensors pick up high levels of enriched uranium in the air and in dust on [trucks] leaving the laboratories. [New Yorker, 3/29/1993; Guardian, 10/13/2007] Despite this, in order to prevent Congress from cutting of aid to the anti-Soviet mujaheddin, which flows through Pakistan, US authorities will repeatedly insist Pakistan is not working on a nuclear program (see August 1985-October 1990).

Entity Tags: Richard Barlow, Office of Scientific and Weapons Research (CIA), Central Intelligence Agency, Pakistan Atomic Energy Commission, Kahuta Research Laboratories

Timeline Tags: A. Q. Khan's Nuclear Network

A University of California, Berkeley graduate student, John E. Hauser, picks up a package in the university’s computer science lab. The package is a bomb made up of ammonium nitrate and aluminum powder. It explodes, costing Hauser four fingers from his right hand and severing arteries. [BBC, 11/12/1987; Washington Post, 4/14/1996; Washington Post, 1998] The bomb has apparently been in the lab for two or three days, left on top of a stack of three-ring binders. Hauser thought it was a file box for another student’s computer cards, and picked it up intending to identify its owner. Upon opening it, he hears an odd buzzing sound, then the bomb detonates. Ironically, the victim of a previous bombing, Professor Diogenes Angelakos (see July 2, 1982), hears the explosion, rushes to offer assistance, and ties a tourniquet around Hauser’s arm. Hauser will lose much of the use of his right arm, and will be forced to abandon his dreams of becoming an Air Force fighter pilot and perhaps an astronaut. He will later say, “There is not a day that goes by when I’m not reminded that I don’t have full use of my right hand… from trying to play racquetball to trying to pick up my daughter.” Of the bombing, Hauser will say, “This was as much a target of opportunity as anything else.” The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski once worked as a professor at UC-Berkeley. Both this bombing and the previous one are in Cory Hall, a building close to where Kaczynski once taught. Captain Bill Foley of the Berkeley campus police will later say: “He taught in Campbell Hall and had offices in one of our temporary buildings. If you did a triangle between Campbell and that temporary building you would hit Cory Hall at peak of the triangle.” Cory Hall also houses the engineering and computer science departments, known to be favorite targets of the Unabomber. [Washington Post, 11/27/1993; Washington Post, 4/14/1996] This bomb is more powerful than earlier Unabomber constructions, using a mix of ammonium nitrate and aluminum powder to cause the explosion. The bomb’s shrapnel consists of tacks, nails, and bits of lead. Stamped on the end seal of the bomb’s pipe are the initials “FC,” which will later be found to stand for “Freedom Club.” [World of Forensic Science, 1/1/2005]

Entity Tags: Theodore J. (“Ted”) Kaczynski, University of California at Berkeley, John E. Hauser, Diogenes Angelakos

Timeline Tags: US Domestic Terrorism

A suspicious package mailed to the Auburn, Washington, headquarters of the Boeing Aircraft Company is opened and safely disarmed by the local bomb squad. [BBC, 11/12/1987; Washington Post, 1998] The package containing a pipe bomb gets lost in Boeing’s internal mail system; the package is in the process of being returned to the apparent sender before it draws the attention of Boeing employees, who call the bomb squad. [Washington Post, 4/14/1996] The bomb will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski tried to destroy a Boeing aircraft with another bomb six years ago (see November 15, 1979). Like earlier bombs, this bomb contains the initials “FC” engraved on a metal component; authorities will later learn that “FC” stands for “Freedom Club.” [World of Forensic Science, 1/1/2005]

Entity Tags: Theodore J. (“Ted”) Kaczynski, Boeing Company

Timeline Tags: US Domestic Terrorism

In 1985, US Congress passes legislation requiring US economic sanctions on Pakistan unless the White House can certify that Pakistan has not embarked on a nuclear weapons program (see August 1985 and August 1985). The White House certifies this every year until 1990 (see 1987-1989). However, it is known all the time that Pakistan does have a continuing nuclear program. For instance, in 1983 a State Department memo said Pakistan clearly has a nuclear weapons program that relies on stolen European technology. Pakistan successfully builds a nuclear bomb in 1987 but does not test it to keep it a secret (see 1987). With the Soviet-Afghan war ending in 1989, the US no longer relies on Pakistan to contain the Soviet Union. So in 1990 the Pakistani nuclear program is finally recognized and sweeping sanctions are applied (see June 1989). [Gannon, 2005] Journalist Seymour Hersh will comment, “The certification process became farcical in the last years of the Reagan Administration, whose yearly certification—despite explicit American intelligence about Pakistan’s nuclear-weapons program—was seen as little more than a payoff to the Pakistani leadership for its support in Afghanistan.” [New Yorker, 3/29/1993] The government of Pakistan will keep their nuclear program a secret until they successfully test a nuclear weapon in 1998 (see May 28, 1998).

Entity Tags: US Congress, White House, Pakistan

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network

Despite the passage of two amendments dealing with Pakistan’s nuclear program in August 1985 (see August 1985 and August 1985), the Reagan and Bush administrations will fail to keep Congress properly informed of incidents related to Pakistan’s acquisition of components for its nuclear program, even though such notification is required by law. Senator John Glenn (D-OH), chairman of the Governmental Affairs Committee, and Congressman Stephen Solarz (D-NY), Chairman of the House Asian and Pacific Affairs Subcommittee, will later say that they are not formally briefed about any significant Pakistani procurement, with the exception of one case (see July 1987 or Shortly After), during this period. For example, Glenn will later say he should have been briefed about a nuclear scare involving Pakistan and India in 1990 (see January-May 1990) [New Yorker, 3/29/1993]

Entity Tags: House Subcommittee on Asian and Pacific Affairs, Governmental Affairs Committee, Reagan administration, Stephen Solarz, John Glenn

Timeline Tags: A. Q. Khan's Nuclear Network

In Ann Arbor, Michigan, research assistant Nicklaus Suino of the University of Michigan suffers burns and shrapnel wounds when he opens a package bomb at the home of psychology professor James V. McConnell. [BBC, 11/12/1987; Washington Post, 1998] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). McConnell may be one of Kaczynski’s most personal targets. McConnell is a rich, flamboyant, and somewhat eccentric professor who espouses controversial theories about human behavior modification based on his research with flatworms. McConnell taught at the University of Michigan when Kaczynski was taking graduate courses in mathematics there. The package mailed to McConnell’s house comes with a one-page letter taped to the top, bearing a Salt Lake City postmark and reading in part: “I’d like you to read this book. Everybody in your position should read this book.” McConnell asks Suino to open it. The resulting explosion injures Suino; McConnell escapes with slight, temporary hearing loss but is profoundly shaken by the incident. [Washington Post, 4/14/1996]

Entity Tags: Theodore J. (“Ted”) Kaczynski, James V. McConnell, Nicklaus Suino, University of Michigan

Timeline Tags: US Domestic Terrorism

Hugh C. Scrutton.Hugh C. Scrutton. [Source: Washington Post]In Sacramento, California, Hugh C. Scrutton is killed when he tries to remove what looks to be a road hazard from the parking lot—a block of wood with nails protruding from it inside a paper bag—behind his computer rental shop. The “hazard” is actually a bomb [BBC, 11/12/1987; Knight Ridder, 5/28/1995; Washington Post, 1998; World of Forensic Science, 1/1/2005] consisting of three 10-inch pipes filled with a mixture of potassium sulfate, potassium chloride, ammonium nitrate, and aluminum powder. The bomb contains shrapnel consisting of sharp chunks of metal, nails, and splinters. It explodes with enormous force, killing Scrutton almost instantly. [World of Forensic Science, 1/1/2005] Like earlier bombs, this bomb contains the initials “FC” engraved on a metal component; authorities later learn that “FC” stands for “Freedom Club.” [World of Forensic Science, 1/1/2005] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). In 1967, Scrutton took a summer math course at the University of California at Berkeley while Kaczynski taught mathematics there; it is not known whether the two crossed paths during that time. [Washington Post, 4/14/1996]

Entity Tags: Hugh Scrutton, Theodore J. (“Ted”) Kaczynski, University of California at Berkeley

Timeline Tags: US Domestic Terrorism

Soliman Biheiri.Soliman Biheiri. [Source: US Immigrations and Customs]BMI Inc., a real estate investment firm based in Secaucus, New Jersey, is formed in 1986. Former counterterrorism “tsar” Richard Clarke will state in 2003, “While BMI [has] held itself out publicly as a financial services provider for Muslims in the United States, its investor list suggests the possibility this facade was just a cover to conceal terrorist support. BMI’s investor list reads like a who’s who of designated terrorists and Islamic extremists.” Investors in BMI include: [US Congress, 10/22/2003]
bullet Soliman Biheiri. He is the head of BMI for the duration of the company’s existence. US prosecutors will later call him the US banker for the Muslim Brotherhood, a banned Egyptian militant group. Biheiri’s computer will eventually be searched and found to have contact information for Ghaleb Himmat and Youssef Nada, leaders of the Al Taqwa Bank, which is founded two years after BMI (see 1988). After 9/11, the US and UN will designate both Himmat and Nada and the Al Taqwa Bank as terrorist financiers, and the bank will be shut down (see November 7, 2001). US prosecutors say there are other ties between BMI and Al Taqwa, including financial transactions. Biheiri also has close ties with Yousuf Abdullah Al-Qaradawi. Qaradawi is said to be a high-ranking member of the Muslim Brotherhood, a shareholder in Al Taqwa, and has made statements supporting suicide bombings against Israel. In 2003, US investigators will accuse Biheiri of ties to terrorist financing. He will be convicted of immigration violations and lying to a federal agent (see June 15, 2003). [Wall Street Journal, 9/15/2003; Forward, 10/17/2003] Biheiri will be convicted of immigration fraud in 2003 and then convicted of lying to federal investigators in 2004 (see June 15, 2003).
bullet Abdullah Awad bin Laden, a nephew of Osama bin Laden. He invests about a half-million dollars in BMI real estate ventures, earning a profit of $70,000. For most of the 1990s he runs the US branch of a Saudi charity called World Assembly of Muslim Youth (WAMY). He is investigated by the FBI in 1996 (see February-September 11, 1996), and WAMY will be raided by US agents in 2004 (see June 1, 2004). The raid is apparently part of a larger investigation into terrorism financing. In 2001, at least two of the 9/11 hijackers will live three blocks away from the WAMY office (see March 2001 and After). [Wall Street Journal, 9/15/2003; Washington Post, 4/19/2004]
bullet Nur and Iman bin Laden, two female relatives of Osama bin Laden. Abdullah Awad bin Laden will invest some of their money in a BMI real estate project. While their bin Laden family ties are intriguing, neither have been accused of any knowing connections to terrorist financing. [Washington Post, 4/19/2004]
bullet Mousa Abu Marzouk. He has identified himself as a top leader of Hamas. The US declares him a terrorist in 1995 (see July 5, 1995-May 1997). BMI makes at least two transactions with Marzouk after he is declared a terrorist. [Wall Street Journal, 9/15/2003]
bullet Yassin al-Qadi, a Saudi multimillionaire. His lawyers will later claim he has no terrorism ties and had only a passing involvement with BMI and liquidated his investment in it in 1996. However, another company operating from the same office as BMI is called Kadi International Inc. and lists its president as al-Qadi. Al-Qadi is also a major investor in the suspect computer company Ptech (see 1994; 1999-After October 12, 2001). Al-Qadi and BMI head Biheiri have financial dealings with Yaqub Mirza, a Pakistani who manages a group of Islamic charities in Virginia known as the SAAR network (see July 29, 1983). These charities will be raided in March 2002 on suspicions of terrorism ties (see March 20, 2002). Shortly after 9/11, the US will officially declare al-Qadi a terrorist financier (see October 12, 2001). [Wall Street Journal, 9/15/2003]
bullet Saleh Kamel. BMI allegedly receives a $500,000 investment from the Dallah Al-Baraka banking conglomerate, which is headed by Kamel. For many years before 9/11, Omar al-Bayoumi, an associate of 9/11 hijackers Khalid Almihdhar and Nawaf Alhazmi, will receive a salary from Dallah, despite apparently doing no work. Some will accuse al-Bayoumi of involvement in funding the 9/11 plot, but that remains to been proven (see August 1994-July 2001). Kamel reportedly founded a Sudanese Islamic bank which housed accounts for senior al-Qaeda operatives. He is a multi-billionaire heavily involved in promoting Islam, and his name appears on the Golden Chain, a list of early al-Qaeda supporters (see 1988-1989). He denies supporting terrorism. [US Congress, 10/22/2003; Wall Street Journal, 6/21/2004]
bullet The Kuwait Finance House. According to Clarke, this organization is alleged to be a BMI investor and the “financial arm of the Muslim Brotherhood in Kuwait. Several al-Qaeda operatives have allegedly been associated with the Kuwaiti Muslim Brotherhood, including Khalid Shaikh Mohammed, Suliman abu Ghaith, Wadih El-Hage, and Ramzi Yousef.” In 2003, an apparent successor entity to the Kuwait Finance House will be designated as a terrorist entity by the US. A lawyer for the Kuwait Finance House will later say the bank has never let its accounts be used for terrorism. [Wall Street Journal, 9/15/2003; US Congress, 10/22/2003; Wall Street Journal, 4/20/2005]
bullet Tarek Swaidan. He is a Kuwaiti, an associate of al-Qadi, and a leading member of the Kuwaiti branch of the Muslim Brotherhood. It is unknown if he has made any denials about his alleged associations. [Wall Street Journal, 9/15/2003]
bullet Abdurahman Alamoudi. For many years he runs the American Muslim Council, a lobby group founded by a top Muslim Brotherhood figure. US prosecutors say he also is in the Brotherhood, and has alleged ties to Hamas. In 2004, the US will sentence him to 23 years in prison for illegal dealings with Libya (see October 15, 2004). [Wall Street Journal, 6/21/2004; Washington Post, 10/16/2004]
bullet The International Islamic Relief Organization (IIRO) and the Muslim World League, closely connected Saudi charities suspected of financing terrorism. They give BMI $3.7 million out of a $10 million endowment from unknown Saudi donors. The Financial Times will later note, “While it is not clear whether that money came from the Saudi government, [a 2003] affidavit quotes a CIA report that says the Muslim World League ‘is largely financed by the government of Saudi Arabia.’” Both organizations consistently deny any support of terrorism financing, but in early 2006 it will be reported that US officials continue to suspect them of such support (see January 15, 2006). [Financial Times, 8/21/2003] In 1992, a branch of the IIRO gives $2.1 million to BMI Inc. to invest in real estate. The money disappears from BMI’s books. In October 1999, BMI goes defunct after it is unable to repay this money to the IIRO branch. The IIRO branch gives BMI the rest of the $3.7 million between 1992 and 1998. BMI will use the money to buy real estate (see 1992). Eventually, some of this money will be given to Hamas operatives in the West Bank and spent on violent actions against Israel. This will eventually lead to legal action in the US and a seizure of some of the money. [Wall Street Journal, 11/26/2002; Washington Post, 8/20/2003; Washington Times, 3/26/2004; Washington Post, 4/19/2004] By 1992, BMI has projected revenues in excess of $25 million, based largely on their real estate investments in the US. [US Congress, 10/22/2003] In early 1999, months before BMI goes defunct, the FBI hears evidence potentially tying BMI to the 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998), but an investigation into this will not be pursued (see Early 1999). It should be noted that BMI had many investors, and presumably most BMI investors would have had no suspicions that their money might be used to fund terrorism or other types of violence.

Entity Tags: Iman bin Laden, International Islamic Relief Organization, Muslim World League, Kuwait Finance House, Nur bin Laden, Mousa Abu Marzouk, Abdurahman Alamoudi, Richard A. Clarke, Soliman Biheiri, Abdullah Awad bin Laden, Yousuf Abdullah Al-Qaradawi, Tarek Swaidan, Yassin al-Qadi, Saleh Abdullah Kamel

Timeline Tags: Complete 911 Timeline

Antonin Scalia.Antonin Scalia. [Source: Oyez.org]Appeals court judge Antonin Scalia is sworn in as an Associate Justice of the US Supreme Court. [Legal Information Institute, 7/30/2007] Although Scalia is an ardent social conservative, with strongly negative views on such issues as abortion and homosexual rights, Scalia and Reagan administration officials both have consistently refused to answer questions about his positions on these issues, as President Reagan did at his June announcement of Scalia’s nomination. [Ronald Reagan Presidential Library, 6/17/1986] Scalia’s nomination is, in the words of Justice Department official Terry Eastland, “no better example of how a president should work in an institutional sense in choosing a nominee….” Eastland advocates the practice of a president seeking a judiciary nominee who has the proper “judicial philosophy.” A president can “influence the direction of the courts through his appointments” because “the judiciary has become more significant in our politics,” meaning Republican politics. [Dean, 2007, pp. 132] Scalia is the product of a careful search by Attorney General Edwin Meese and a team of Justice Department officials who wanted to find the nominee who would most closely mirror Reagan’s judicial and political philosophy (see 1985-1986).

Entity Tags: Ronald Reagan, Edwin Meese, Antonin Scalia, Terry Eastland, US Department of Justice

Timeline Tags: Civil Liberties

Radical Muslim leader Sheikh Omar Abdul-Rahman obtains his first US visa via the CIA. A State Department official will later discover this was the first of six US visas given to him between 1986 and 1990. All are approved by CIA agents acting as consular officers at US embassies in Sudan and Egypt. “The CIA officers claimed they didn’t know the sheikh was one of the most notorious political figures in the Middle East and a militant on the State Department’s list of undesirables.” But one top New York investigator will later say, “Left with the choice between pleading stupidity or else admitting deceit, the CIA went with stupidity.” [Boston Globe, 2/3/1995; New York Magazine, 3/17/1995] Abdul-Rahman uses the visas to attend conferences of Islamic students in the US. Then he visits Pakistan, where he preaches at Peshawar, visits the Saudi embassy in Islamabad, and is “lionized at receptions heavily attended by Americans.” He plays a prominent role in recruiting mujaheddin fighters to fight against the Soviets in Afghanistan. [Kepel, 2002, pp. 300] In 1989, Abdul-Rahman is arrested in Egypt and held under very closely guarded house arrest, but he manages to escape one year later, possibly by being smuggled out of his house in a washing machine. The CIA gives him another US visa and he moves to the US (see July 1990). [New York Times, 1/8/1995] Journalist Simon Reeve will claim in his 1999 book The New Jackals that, “The CIA, it is now clear, arranged the visa[s] to try and befriend the Sheikh in advance of a possible armed fundamentalist revolution in Egypt.” According to a retired CIA official, the CIA recalled mistakes made with the Ayatollah Khomeini in Iran and were trying to win Abdul-Rahman’s trust. [Reeve, 1999, pp. 60]

Entity Tags: Central Intelligence Agency, Omar Abdul-Rahman, Simon Reeve

Timeline Tags: Complete 911 Timeline

Khaled Abu el-Dahab.Khaled Abu el-Dahab. [Source: Egyptian government]In the mid-1980’s, Khaled Abu el-Dahab, an Egyptian medical student, joins the militant group Islamic Jihad, and also meets Ali Mohamed. Mohamed convinces el-Dahab to move to the US and become a sleeper cell agent. El-Dahab does so in 1987, moving to Santa Clara, California, where Mohamed has a residence. El-Dahab marries an American woman, becomes a US citizen, and gets a job at a computer company. In 1987, a female acquaintance of el-Dahab enters his apartment unannounced and finds several men there cleaning rifles. She decides it is something she does not want to know about, and breaks off contact with him. In 1990, Mohamed and el-Dahab travel together to Afghanistan. They are financially supported by a network of US sympathizers, including two Egyptian-American doctors. Beginning in 1990, El-Dahab’s apartment becomes an important communications hub for al-Qaeda and Islamic Jihad cells all over the world. For much of the 1990’s, the Egyptian government cut direct phone links to countries like Sudan, Yemen, Afghanistan or Pakistan in an effort to disrupt communications between radical militants. So Dahab acts as a telephone operator for the Islamic Jihad network, using a three-way calling feature to connect operatives in far-flung countries. He communicates with bin Laden’s base in Sudan (where bin Laden lives until 1996). He receives phone calls from the likes of Islamic Jihad leader Ayman al-Zawahiri, who also visits California twice (see Spring 1993; Late 1994 or 1995). He distributes forged documents and makes money transfers. He is trained to make booby-trapped letters, enrolls in a US flight school to learn how to fly gliders and helicopters, and recruits additional US sleeper agents (see Mid-1990s). He helps translate US army manuals and topographical maps into Arabic for al-Qaeda and Islamic Jihad training. El-Dahab will move to Egypt in 1998 and get arrested in October of that year. He will confess his role in all of this in an Egyptian trial in 1999. The Egyptian government will sentence him to 15 years in prison (see 1999). [New York Times, 10/23/2001; London Times, 11/11/2001; San Francisco Chronicle, 11/21/2001; Chicago Tribune, 12/11/2001]

Entity Tags: Al-Qaeda, Ali Mohamed, Osama bin Laden, Khaled Abu el-Dahab, Ayman al-Zawahiri, Islamic Jihad

Timeline Tags: Complete 911 Timeline

The FBI’s sketch of the as-yet-unidentified ‘Unabomber.’The FBI’s sketch of the as-yet-unidentified ‘Unabomber.’ [Source: FBI]Gary Wright, the owner of CAAMS Inc., a Salt Lake City, Utah, computer shop, is injured when he attempts to remove a “road hazard” at the rear entrance of his shop. The “hazard” is actually a bomb, similar to one that killed another computer shop owner in Sacramento, California, over a year ago (see December 11, 1985). A secretary saw a man wearing a hooded sweatshirt and sunglasses leave the bag containing the bomb; she becomes the first eyewitness in what will later become the “Unabomber” investigation (see April 3, 1996). [BBC, 11/12/1987; Washington Post, 1998] The “Unabomber” is improving his skills; this bomb contains a more sophisticated triggering device than earlier constructions. [World of Forensic Science, 1/1/2005] Almost six years ago, Theodore “Ted” Kaczynski, the so-called “Unabomber,” planted another bomb in Salt Lake City (see October 8, 1981). But for now, the FBI has no knowledge of Kaczynski’s identity. It has, however, found what it calls “an absolute link” between the Wright bombing and the “Unabom” serial bombings that have been going on since 1978 (see May 25-26, 1978). Federal bomb expert Ron Wolters says the bombs in the different cases display a high level of similarity. Police describe the as-yet-unidentified bomber as a disgruntled academician or computer worker. [Chicago Sun-Times, 2/24/1987]

Entity Tags: CAAMS Inc, Theodore J. (“Ted”) Kaczynski, Ron Wolters, Gary Wright

Timeline Tags: US Domestic Terrorism

A. Q. Khan.A. Q. Khan. [Source: CBC]A. Q. Khan, father of Pakistan’s nuclear weapons program, tells an Indian reporter that the program has been successful (see 1987). “What the CIA has been saying about our possessing the bomb is correct,” he says, adding, “They told us Pakistan could never produce the bomb and they doubted my capabilities, but they now know we have it.” He says that Pakistan does not want to use the bomb, but “if driven to the wall there will be no option left.” The comments are made during a major Indian army exercise known as Brass Tacks that Pakistanis consider a serious threat, as it is close to the Pakistani border. In fact, at one point the Indian commanding general is reported to consider actually attacking Pakistan—an attack that would be a sure success given India’s conventional superiority. According to reporter Seymour Hersh, the purpose of the interview is “to convey a not very subtle message to the Indians: any attempt to dismember Pakistan would be countered with the bomb.” This interview is an embarrassment to the US government, which aided Pakistan during the Soviet-Afghan War, but has repeatedly claimed Pakistan does not have nuclear weapons (see August 1985-October 1990). Khan retracts his remarks a few days later, saying he was tricked by the reporter. [New Yorker, 3/29/1993]

Entity Tags: Seymour Hersh, Abdul Qadeer Khan, Central Intelligence Agency

Timeline Tags: A. Q. Khan's Nuclear Network

April 1987: Hamid Gul Becomes Head of ISI

Hamid Gul serving as a Pakistani military officer in the 1980’s.Hamid Gul serving as a Pakistani military officer in the 1980’s. [Source: PBS / Nova]Gen. Hamid Gul is made head of Pakistan’s ISI. [Yousaf and Adkin, 1992, pp. 91-92] General Gul is a favorite of CIA Station Chief Milt Bearden and US ambassador to Pakistan Arnie Raphel, who view him as an ally and a potential national leader of Pakistan. [Bearden and Risen, 2003, pp. 301] According to Bearden, however, he will later (sometime after 1990) turn against the US. [Bearden and Risen, 2003, pp. 358, 523-524] Evidence will later appear that in the late 1990s Gul is somehow able to give the Taliban advanced warning of US attempts to assassinate bin Laden with missile strikes (see July 1999). In 2004, allegations will appear in the US media that Gul was a key participant in the 9/11 plot and “bin Laden’s master planner” (see July 22, 2004).

Entity Tags: Milt Bearden, Pakistan Directorate for Inter-Services Intelligence, Mark Adkin, Arnie Raphel, Hamid Gul

Timeline Tags: Complete 911 Timeline

USS ‘Stark’ after being struck by Iraqi missile.USS ‘Stark’ after being struck by Iraqi missile. [Source: US Department of Defense]Two missiles from an Iraqi F-1 Mirage warplane strike the USS Stark, killing 37 of the sailors aboard. The frigate is a member of a US naval task force sent to the Persian Gulf to keep the Gulf open for shipping during the Iran-Iraq War. The Iraqi fighter locks weapons on the Stark three minutes before firing; the commander of the ship refuses to issue the standard “back off” warning to the Iraqi pilot. The first missile bores deep into the ship but fails to explode; the second missile explodes, incinerating the crew’s quarters, the radar room, and the combat information center. The ship burns for two days. [PBS, 2000; Peniston, 2006, pp. 61-63]
Diverting Blame onto Iran - The Pentagon later claims that the Stark indeed warned the fighter pilot not to approach. Iraq quickly apologizes for the attack. The US continues to patrol the Gulf, and continues its program of re-registering Kuwaiti oil tankers under the American flag in order to protect them from Iranian attacks. A diplomat says that given the scale of casualties in the incident, the American public is going to start asking “what the hell is the US doing in the Gulf?” Iran calls the attack on the Stark a “divine blessing.” US officials quickly divert blame for the attack on Iran, accepting an Iraqi explanation that the fighter pilot must have mistaken the US warship for an Iranian vessel. [Guardian, 5/19/1987]
Excusing Iraq, Punishing 'Stark' Commander - “We’ve never considered them hostile at all,” says President Reagan in regards to Iraq’s military. “They’ve never been in any way hostile.… And the villain in the piece is Iran.” Senator John Warner (R-VA), a former secretary of the Navy, denounces Iran as “a belligerent that knows no rules, no morals.” Fellow senator John Glenn (D-OH) calls Iran “the sponsor of terrorism and the hijacker of airliners.” Iraq later determines that the Stark was in its so-called “forbidden zone,” and refuses to produce the pilot for any disciplinary action. The only punishment for the attack is suffered by the captain of the Stark, Glenn Brindel, who is relieved of his command, and his executive officer, who is punished for “dereliction of duty.” [TomDispatch (.com), 5/3/2007]
Lawsuits Dismissed - Two wrongful death lawsuits arising from the attacks will later be dismissed due to the “state secrets” privilege (see June 13, 1991 and September 16, 1992).

Entity Tags: US Department of Defense, US Department of the Navy, Glenn Brindel, John Glenn, John W. Warner, Ronald Reagan

Timeline Tags: US-Iraq 1980s

Following an incident where a Pakistani procurement agent was arrested in the US trying to buy components for a nuclear weapon (see Before July 1987), there is a serious row about it between a CIA manager and a CIA analyst at a Congressional hearing. The hearing is called by Stephen Solarz (D-NY), chairman of the House Subcommittee on Asian and Pacific Affairs, to vet intelligence concerning Pakistan’s nuclear weapons program. CIA manager General David Einsel says it is “not cut and dried” that the arrested Pakistani, Arshad Pervez, and his handler, Inam ul-Haq, are agents of the Pakistani government. Richard Barlow, a CIA analyst there to help Einsel, is surprised by the false answer, as it is a criminal offense to lie to Congress. He realizes, “Einsel’s testimony was highly evasive, and deliberately so.” He will also later comment: “These congressmen had no idea what was really going on in Pakistan and what had been coming across my desk about its WMD program. They did not know that Pakistan already had a bomb and was shopping for more with US help. All of it had been hushed up.” When Barlow is asked the same question, he says it is “clear” Pervez is working for Pakistan, at which point Einsel screams, “Barlow doesn’t know what he’s talking about.” Solarz then asks whether there are any more cases involving the Pakistan government. Einsel says there are not, but Barlow replies, “Yes, there have been scores of other cases.” Barlow is then hustled out of the room and returns to CIA headquarters. A senior government official not cleared to attend the briefing comes in and tries to repair the damage, saying that Barlow was referring to intelligence reports, but “not all intelligence reports are accurate.” The official will later indicate that he is not proud of what he does, saying, “I didn’t know what I was getting into.” [New Yorker, 3/29/1993; Guardian, 10/13/2007] Barlow will subsequently be forced out of the CIA because of this hearing (see August 1987-1988).

Entity Tags: Stephen Solarz, Richard Barlow, Inam ul-Haq, House Subcommittee on Asian and Pacific Affairs, Arshad Pervez, Office of Scientific and Weapons Research (CIA), David Einsel, Central Intelligence Agency

Timeline Tags: A. Q. Khan's Nuclear Network

Following a stormy Congressional subcommittee hearing where he contradicted CIA manager David Einsel about Pakistan’s nuclear program (see July 1987 or Shortly After), analyst Richard Barlow is forced out of the CIA. Barlow will later say that he leaves because Einsel makes his job impossible: “Einsel went crazy. I was told that my personal behavior at the hearing had been unprofessional. I was accused of being unpatriotic and almost scuttling the Afghanistan program. I was viewed as being disloyal.” [Guardian, 10/13/2007] He will also say: “These people were determined that nothing like this was ever going to happen ever again—no more arrests, no more truth to the Congress.… I was targeted by some in the Directorate of Operations; they made my life miserable.” [Raw Story, 4/30/2007] Commenting on his position during the Cold War, he will add: “We had to buddy-up to regimes we didn’t see eye-to-eye with, but I could not believe we would actually give Pakistan the bomb. How could any US administration set such short-term gains against the long-term safety of the world?” Barlow’s job description is re-written six weeks after the hearing, removing him from work on Pakistan’s nuclear weapons, and he leaves the CIA for the Customs Service a year later. [Guardian, 10/13/2007]

Entity Tags: Central Intelligence Agency, Richard Barlow, Office of Scientific and Weapons Research (CIA), David Einsel

Timeline Tags: A. Q. Khan's Nuclear Network

Michael Springmann.Michael Springmann. [Source: Michael Springmann]Michael Springmann, head US consular official in Jeddah, Saudi Arabia, later claims that during this period he is “repeatedly ordered… to issue [more than 100] visas to unqualified applicants.” He turns them down, but is repeatedly overruled by superiors. [BBC, 11/6/2001; St. Petersburg Times, 11/25/2001] In one case, two Pakistanis apply for visas to attend a trade show in the US, but they are unable to name the trade show or city in which it will be held. When Springmann denies them a visa, he gets “an almost immediate call from a CIA case officer, hidden in the commercial section [of the consulate], that I should reverse myself and grant these guys a visa.” Springmann refuses, but the decision is reversed by the chief of the consular section. Springmann realizes that even the ambassador, Walter Cutler, is aware of the situation, which becomes “more brazen and blatant” as time goes on. On one occasion Springmann is even told, “If you want a job in the State Department in future, you will change your mind.” [CBC Radio One, 7/3/2002; Trento, 2005, pp. 344-6] Springmann loudly complains to numerous government offices, but no action is taken. He is fired and his files on these applicants are destroyed. He later learns that recruits from many countries fighting for bin Laden against Russia in Afghanistan were funneled through the Jeddah office to get visas to come to the US, where the recruits would travel to train for the Afghan war. According to Springmann, the Jeddah consulate was run by the CIA and staffed almost entirely by intelligence agents. This visa system may have continued at least through 9/11, and 11 of the 19 9/11 hijackers received their visas through Jeddah (see November 2, 1997-June 20, 2001), possibly as part of this program (see October 9, 2002 and October 21, 2002). [BBC, 11/6/2001; St. Petersburg Times, 11/25/2001; CBC Radio One, 7/3/2002; Associated Press, 7/17/2002 pdf file; Fox News, 7/18/2002]

Entity Tags: Central Intelligence Agency, US Consulate, Jeddah, Saudi Arabia Office, Michael Springmann

Timeline Tags: Complete 911 Timeline, War in Afghanistan

The US Congress suspends aid to Pakistan for six weeks, due to arguments related to the arrest of a Pakistani agent attempting to buy material for its nuclear weapons program (see Before July 1987 and July 1987 or Shortly After). Congress suspects that Pakistan has a nuclear weapons program, but the administration denies this, as do the Pakistanis, even though they are both well aware that the program is a reality. The suspension is symbolic, as it only lasts six weeks and does not affect aid that has already been agreed upon, but not yet provided. [New York Times, 9/30/1987; New Yorker, 3/29/1993]

Timeline Tags: A. Q. Khan's Nuclear Network

Although the US is already aware that the Soviet Union intends to withdraw from Afghanistan (see November 1986-November 1987) and a formal agreement on the Soviet withdrawal will be signed in four months (see April 1988), the US Congress approves aid of $480 million for Pakistan, despite its nuclear weapons program. Legislation has been passed that automatically cuts off aid to countries with illicit nuclear weapons programs (see August 1985 and August 1985), but this legislation is not invoked. Despite apparently knowing of the Pakistani program, Congress decides that supporting the war in Afghanistan is more important (see July 1987 or Shortly After and Late 1980s). Some lawmakers and officials will later say that at this time “everybody in Congress” knows that Pakistan has a nuclear weapons program (see Late 1980s), and anti-proliferation Senator John Glenn (D-OH) will later say the threat of nuclear proliferation “is a far greater danger to the world than being afraid to cut off the flow of aid to Afghanistan,” adding, “It’s the short-term versus the long-term.” [New Yorker, 3/29/1993]

Entity Tags: John Glenn, Pakistan

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network, War in Afghanistan

Francois Genoud (left) and Ahmad Huber, a.k.a. Albert Huber (right).Francois Genoud (left) and Ahmad Huber, a.k.a. Albert Huber (right). [Source: Seuil, AIJAC]Leaders of the Muslim Brotherhood found the Al Taqwa Bank. This bank will later be accused of being the largest financial supporter of al-Qaeda, Hamas, the GIA in Algeria, and other organizations officially designated by the US as groups that sponsor terrorism. For instance, the Treasury Department will later claim that $60 million in funding for Hamas will pass through Al Taqwa in 1997. The bank is mostly based on both sides of the border between Swizterland and Italy, but important branches are established in Liechtenstein and the Bahamas as offshore tax havens. [US Department of the Treasury, 8/29/2002] Newsweek will explain, “Al Taqwa, which means ‘Fear of God,’ was launched… by leaders of the Muslim Brotherhood, a secret society devoted to the creation of a worldwide Islamic government. The Brotherhood wanted to create a financial institution in which devout Muslims could invest their money. It would operate under strict Islamic law, which prohibits banks from charging interest. But investigators believe the convoluted structure of Al Taqwa made it easy to use as a money-laundering mechanism.… The [central] operation consisted of four men working at computers in a small apartment in Lugano, Switzerland. Lugano, which sits near the Italian border, is a kind of Alpine Tijuana, well known as a haven for tax evaders and money launderers.” [Newsweek, 3/18/2002] Reportedly, in 1995, Italian investigators will tell a Swiss prosecutor that Al Taqwa and related entities comprise “the most important financial structure of the Muslim Brotherhood and Islamic terrorist organizations.” [Salon, 3/15/2002] Six members of the bin Laden family are among the original contributors to the Bahamas branch. [Wall Street Journal, 12/17/2001] A number of the bank’s leaders have ties to Nazism or fascism. For instance, when board chairman Youssef Nada was a young man, he allegedly worked with both the armed branch of the Muslim Brotherhood and Nazi Germany military intelligence. Ahmad Huber, a Swiss convert to Islam previously known as Albert Huber, is both a director of the bank and an open neo-Nazi. He proudly displays portraits of Adolf Hitler and Osama bin Laden next to each other in his house. [Washington Post, 4/29/2002; Asia Times, 11/8/2002] According to a reporter who will interview him in 1995, Huber’s office is adorned with portraits of Hitler, Nazi leader Heinrich Himmler, and Islamic militants. [Boston Herald, 11/8/2001] Huber will spend decades attempting to forge links between the neo-Nazi movement and the radical Muslim movement, speaking to and networking with both groups. He will be quoted around 2001 saying that the al-Qaeda leaders he met in January 2001 are “very discreet, well-educated, and very intelligent people.”(see Late January 2001). [Financial Times, 11/8/2001; Playboy, 2/1/2002] The founder of Al Taqwa appears to be Francois Genoud, who will die in 1996. Genoud is a Swiss lawyer who funded the Nazis and served as a Nazi agent during World War II. After the war, he funded the secret Odessa organization, which enabled many notorious Nazi fugitives to escape to safe havens in South America and elsewhere. Authorities believe that Genoud uses Al Taqwa to fund international militants like Carlos the Jackal and bin Laden. He also paid for the legal expenses of ex-Nazis such as Klaus Barbie and Adolf Eichmann. Many Muslim radicals and neo-Nazis share a strong hatred for Jews and the United States. [San Francisco Chronicle, 3/12/2002] Al Taqwa will be shut down shortly after 9/11 for its support of al-Qaeda, Hamas, and other groups officially designated as terrorist organizations (see November 7, 2001).

Entity Tags: Al Taqwa Bank, Muslim Brotherhood

Timeline Tags: Complete 911 Timeline

Entrance to Fort Riley, Kansas.Entrance to Fort Riley, Kansas. [Source: US Military (.com)]Terry Nichols, a 33-year-old Michigan farmer and house husband described as “aimless” by his wife Lana, joins the US Army in Detroit. He is the oldest recruit in his platoon and his fellow recruits call him “Grandpa.” During basic training at Fort Benning, Georgia, Nichols meets fellow recruits Timothy McVeigh (see 1987-1988), who joined the Army in Buffalo, New York, and Arizona native Michael Fortier. All three share an interest in survivalism, guns, and hating the government, particularly Nichols and McVeigh; unit member Robin Littleton later recalls, “Terry and Tim in boot camp went together like magnets.” For McVeigh, Nichols is like the older brother he never had; for Nichols, he enjoys taking McVeigh under his wing. Nichols also tells McVeigh about using ammonium nitrate to make explosives he and his family used to blow up tree stumps on the farm. The three are members of what the Army calls a “Cohort,” or Cohesion Operation Readiness and Training unit, which generally keeps soldiers together in the same unit from boot camp all the way through final deployment. It is in the Army that McVeigh and Nichols become enamored of the novel The Turner Diaries (see 1978), which depicts a United States racially “cleansed” of minorities and other “undesirables” (McVeigh is already familiar with the novel—see 1987-1988). All three are sent to the 11 Bravo Infantry division in Fort Riley, Kansas, where they are finally separated into different companies; McVeigh goes to tank school, where he learns to operate a Bradley fighting vehicle as well as becoming an outstanding marksman. [New York Times, 5/4/1995; New York Times, 5/28/1995; Stickney, 1996, pp. 91-95; PBS Frontline, 1/22/1996; Serrano, 1998, pp. 30; Nicole Nichols, 2003] McVeigh later says he joined the Army because he was disillusioned with the “I am better than you because I have more money” mindset some people have, and because he was taken with the Army’s advertisement that claimed, “We do more before 9 a.m. than most people do all day.” [PBS Frontline, 1/22/1996] Fellow unit member Specialist Ted Thorne will later recall: “Tim and I both considered ourselves career soldiers. We were going to stay in for the 20-plus years, hopefully make sergeant major. It was the big picture of retirement.” [Serrano, 1998, pp. 31]
Nichols Leaves Army, Tells of Plans to Form 'Own Military Organization' - In the spring of 1989, Nichols, who planned on making a career of military service, leaves the Army due to issues with an impending divorce and child care, but his friendship with McVeigh persists. Fellow soldier Glen Edwards will later say that he found Nichols’s choice to serve in the Army unusual, considering his virulent hatred of the US government: “He said the government made it impossible for him to make a living as a farmer. I thought it strange that a 32-year-old man would be complaining about the government, yet was now employed by the government. Nichols told me he signed up to pull his 20 years and get a retirement pension.” Before Nichols leaves, he tells Edwards that he has plans for the future, and Edwards is welcome to join in. Edwards will later recall, “He told me he would be coming back to Fort Riley to start his own military organization” with McVeigh and Fortier. “He said he could get any kind of weapon and any equipment he wanted. I can’t remember the name of his organization, but he seemed pretty serious about it.” [New York Times, 5/28/1995; Stickney, 1996, pp. 96, 101]
McVeigh Continues Army Career, Described as 'Strange,' 'Racist,' but 'Perfect Soldier' - McVeigh does not leave the Army so quickly. He achieves the rank of sergeant and becomes something of a “model soldier.” He plans on becoming an Army Ranger. However, few get to know him well; only his closest friends, such as Nichols, know of his passion for firearms, his deep-seated racism, or his hatred for the government. McVeigh does not see Nichols during the rest of his Army stint, but keeps in touch through letters and phone calls. Friends and fellow soldiers will describe McVeigh as a man who attempts to be the “perfect soldier,” but who becomes increasingly isolated during his Army career; the New York Times will describe him as “retreating into a spit-and-polish persona that did not admit nights away from the barracks or close friendships, even though he was in a ‘Cohort’ unit that kept nearly all the personnel together from basic training through discharge.” His friends and colleagues will recall him as being “strange and uncommunicative” and “coldly robotic,” and someone who often gives the least desirable assignments to African-American subordinates, calling them “inferior” and using racial slurs. An infantryman in McVeigh’s unit, Marion “Fritz” Curnutte, will later recall: “He played the military 24 hours a day, seven days a week. All of us thought it was silly. When they’d call for down time, we’d rest, and he’d throw on a ruck sack and walk around the post with it.” A fellow soldier, Todd Regier, will call McVeigh an exemplary soldier, saying: “As far as soldiering, he never did anything wrong. He was always on time. He never got into trouble. He was perfect. I thought he would stay in the Army all his life. He was always volunteering for stuff that the rest of us wouldn’t want to do, guard duties, classes on the weekend.” Sergeant Charles Johnson will later recall, “He was what we call high-speed and highly motivated.” McVeigh also subscribes to survivalist magazines and other right-wing publications, such as Guns & Ammo and his favorite, Soldier of Fortune (SoF), and keeps an arsenal of weapons in his home (see November 1991 - Summer 1992). Regier will later tell a reporter: “He was real different. Kind of cold. He wasn’t enemies with anyone. He was kind of almost like a robot. He never had a date when I knew him in the Army. I never saw him at a club. I never saw him drinking. He never had good friends. He was a robot. Everything was for a purpose.” [New York Times, 5/4/1995; Stickney, 1996, pp. 86; Serrano, 1998, pp. 30; Nicole Nichols, 2003] McVeigh is taken with the increasing number of anti-government articles and advertisements in SoF, particularly the ones warning about what it calls the impending government imposition of martial law and tyranny, and those telling readers how to build bombs and other items to use in “defending” themselves from government aggression. [Serrano, 1998, pp. 27-28] McVeigh is not entirely “by the book”; he knows his friend Michael Fortier is doing drugs, but does not report him to their superior officers. [PBS Frontline, 1/22/1996] McVeigh is promoted to sergeant faster than his colleagues; this is when he begins assigning the undesirable tasks to the four or five black specialists in the group, tasks that would normally be performed by privates. “It was well known, pretty much throughout the platoon, that he was making the black specialists do that work,” Regier will recall. “He was a racist. When he talked he’d mention those words, like n_gger. You pretty much knew he was a racist.” The black soldiers complain to a company commander, earning McVeigh a reprimand. Sergeant Anthony Thigpen will later confirm Regier’s account, adding that McVeigh generally refuses to socialize with African-Americans, and only reluctantly takes part in company functions that include non-whites. Captain Terry Guild will later say McVeigh’s entire company has problems with racial polarization, “[a]nd his platoon had some of the most serious race problems. It was pretty bad.” In April 1989, McVeigh is sent to Germany for two weeks for a military “change-up program.” While there, he is awarded the German equivalent of the expert infantryman’s badge. In November 1989, he goes home for Thanksgiving with Fortier, and meets Fortier’s mother Irene. In late 1990, McVeigh signs a four-year reenlistment agreement with the Army. [New York Times, 5/4/1995]
McVeigh Goes on to Serve in Persian Gulf War - McVeigh will serve two tours of duty in the Persian Gulf War, serving honorably and winning medals for his service (see January - March 1991 and After). Nichols and McVeigh will later be convicted of planning and executing the Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995).

Entity Tags: Ted Thorne, Terry Guild, Todd Regier, Terry Lynn Nichols, Robin Littleton, Michael Joseph Fortier, Charles Johnson, Glen Edwards, Marion (“Fritz”) Curnutte, Anthony Thigpen, Timothy James McVeigh, US Department of the Army

Timeline Tags: US Domestic Terrorism

Strom Thurmond.Strom Thurmond. [Source: US Government]Former Lockheed software manager Margaret Newsham, who worked at the Menwith Hill facility of the NSA’s Echelon satellite surveillance operation in 1979, says she heard a real-time phone intercept of conversations involving senator Strom Thurmond (R-SC). She was shocked, she recalls, because she thought only foreign communications were being monitored. Newsham, who was fired from Lockheed after she filed a whistleblower lawsuit alleging fraud and waste, tells the chairman of the House Intelligence Committee, Louis Stokes (D-OH), of the overheard conversations. In July, Capital Hill staffers will leak the story to the Cleveland Plain Dealer. Thurmond says he doesn’t believe Newsham’s story, but his office admits that it has previously received reports that Thurmond had been a target of NSA surveillance. Thurmond will decline to press for an investigation, and the reason for the surveillance has never been revealed. [CBS News, 2/27/2000; Patrick S. Poole, 8/15/2000]

Entity Tags: Strom Thurmond, National Security Agency, House Intelligence Committee, Louis Stokes, Echelon, Cleveland Plain Dealer, Lockheed Martin Corporation, Margaret Newsham

Timeline Tags: Civil Liberties

Crew members monitor radar screens in the combat information center aboard the <i>Vincennes.</i> This photo was taken by a crew member in January 1988.Crew members monitor radar screens in the combat information center aboard the Vincennes. This photo was taken by a crew member in January 1988. [Source: Public domain]The USS Vincennes, a state-of-the-art Aegis guided missile cruiser patrolling the Strait of Hormuz in an effort to keep oil tankers safe from Iranian and Iraqi depredations, detects an Iranian aircraft apparently closing in on its position. The captain and crew of the Vincennes are aware of previous attacks on US ships and Kuwaiti oil tankers by Iranian gunboats, and know of the attack a year before on the USS Stark by an Iraqi fighter (see May 17, 1987 and After). Just a half-hour before, the Vincennes itself had fired on Iranian gunboats. Captain Will Rogers III has seven minutes to decide what to do about the aircraft, which he and his radar operators believe is most likely an Iranian F-14. Although the first transmission from the Iranian aircraft identifies itself as “commair”—commercial aircraft—the radio operator forgets to reset his receiver, and subsequently receives transmissions from Iranian military aircraft which he mistakenly attributes to the incoming aircraft. When the aircraft is nine miles away, Rogers fires two SM-2 surface-to-air missiles at the aircraft. At least one missile hits the plane, which is not a military fighter, but Iran Air Flight 655, a civilian Boeing 747 carrying 290 passengers. The missile slices the airliner in half; all 290 passengers, including 66 children, die. Though the international community is outraged, the White House and the Pentagon defend the Vincennes’s action. The UN Security Council will not condemn the attack, and President Reagan volunteers to pay compensation to the families. The Navy is embarrassed that in the first real military action from one of its new Aegis cruisers, it had shot down an unarmed civilian aircraft. An investigation proves that the aircraft had been well within a commercially designated flight path, and was not descending in a threatening manner, as was initially claimed by both Vincennes personnel and Pentagon officials. No disciplinary actions against Rogers or any of his crew are ever taken. During the 1988 presidential campaign, Vice President George H. W. Bush will frequently say of the incident: “I will never apologize for the United States of America. I don’t care what the facts are.” [New York Times, 11/9/1988; TomDispatch (.com), 5/3/2007; History (.com), 2008]

Entity Tags: US Department of the Navy, Will Rogers III, United Nations Security Council, George Herbert Walker Bush

Timeline Tags: US confrontation with Iran

August 11-20, 1988: Bin Laden Forms Al-Qaeda

The notes from al-Qaeda’s formation meeting. The short lines on the right side are the list of attendees.The notes from al-Qaeda’s formation meeting. The short lines on the right side are the list of attendees. [Source: CNN]Osama bin Laden conducts two meetings to discuss “the establishment of a new military group,” according to notes that will be found later. Notes will reveal the group is initially called al-Qaeda al-Askariya, which roughly translates to “the military base.” But the name will soon shorten to just al-Qaeda, meaning “the base” or “the foundation.” [Associated Press, 2/19/2003; Wright, 2006, pp. 131-134] With the Soviets in the process of withdrawing from Afghanistan, it is proposed to create the new group to keep military jihad, or holy war, alive after the Soviets are gone. The notes don’t specify what the group will do exactly, but they conclude, “Initial estimate, within six months of al-Qaeda [founding], 314 brothers will be trained and ready.” In fact, al-Qaeda will remain smaller than this for years to come. Fifteen people attend these two initial meetings. [Wright, 2006, pp. 131-134] In addition to bin Laden, other attendees include:
bullet Ayman Al-Zawahiri, the head of the Egyptian militant group Islamic Jihad. [New Yorker, 9/9/2002]
bullet Mohammed Atef, a.k.a. Abu Hafs.
bullet Mamdouh Mahmud Salim, a.k.a. Abu Hajer.
bullet Jamal al-Fadl.
bullet Wael Hamza Julaidan.
bullet Mohammed Loay Bayazid, a US citizen, who is notetaker for the meetings. [Wright, 2006, pp. 131-134]
Al-Fadl will reveal details about the meetings to US investigators in 1996 (see June 1996-April 1997). Notes to the meeting will be found in Bosnia in early 2002. [New Yorker, 9/9/2002] It will take US intelligence years even to realize a group named al-Qaeda exists; the first known incidence of US intelligence being told the name will come in 1993 (see May 1993).

Entity Tags: Osama bin Laden, Mohammed Loay Bayazid, Mohammed Atef, Wael Hamza Julaidan, Jamal al-Fadl, Al-Qaeda, Mamdouh Mahmud Salim, Ayman al-Zawahiri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, War in Afghanistan

James Nichols, a Michigan farmer, anti-government white separatist, and the brother of Terry Nichols (see March 24, 1988 - Late 1990), formulates a plan to use a “megabomb” to destroy an Oklahoma City federal building; an unnamed FBI informant will later tell the FBI that James Nichols specifically indicates the Murrah Federal Building. Nichols, who says he is upset over the US’s “role” in the terrorist bombing of Pan Am Flight 103, shares the plan with the informant, who will swear to the information in 1995, after James’s brother Terry Nichols is arrested for helping destroy the Murrah Building (see 8:35 a.m. - 9:02 a.m. April 19, 1995). “[James] Nichols… made a specific reference to a federal building in Oklahoma City and began looking through the toolshed and workbench for a newspaper clipping depicting the Oklahoma City building,” the informant will say, according to an FBI affidavit. Nichols is unable to find the newspaper clipping, the informant will say, and instead draws a diagram remarkably similar to the Murrah Building. Nichols “later located a newspaper article containing a reference to the Federal Building in Oklahoma City and showed it” to the informer, the affidavit says. The informer is a regular visitor to the Nichols farm. [New York Times, 6/13/1995; Nicole Nichols, 2003] James Nichols routinely stamps US currency with red ink in a protest against the government, and calls his neighbors “sheeple” for obeying authority “like livestock.” A neighbor, Dan Stomber, will recall Nichols criticizing him and others for using drivers’ licences and Social Security cards, and for voting and paying taxes. “He said we were all puppets and sheeple,” Stomber will tell a reporter. “That was the first time I ever heard that word.” Stomber will not recall Nichols discussing any plans to bomb any federal buildings. [New York Times, 4/24/1995] After the Oklahoma City bombing, a friend of Nichols, an Indiana seed dealer named Dave Shafer, will tell authorities that Nichols showed him a diagram of a building remarkably similar to the Murrah Building, still under construction at the time, and said that building would be an excellent target. Shafer will say that he thought Nichols was joking. [Serrano, 1998, pp. 110] It is possible that Shafer and the unnamed FBI informant are the same person. Five years ago, a group of white supremacists had conceived of a plan to destroy the Murrah Building (see 1983).

Entity Tags: Terry Lynn Nichols, Murrah Federal Building, Federal Bureau of Investigation, Dave Shafer, James Nichols, Dan Stomber

Timeline Tags: US Domestic Terrorism

Richard Barlow, an analyst previously forced out of the State Department and CIA for coming to the politically unacceptable conclusion that Pakistan has a nuclear weapons program (see 1981-1982 and August 1987-1988), is hired by the Office of the Secretary of Defense at the Pentagon to become its first weapons of mass destruction intelligence analyst. Shortly after arriving, Barlow again builds up “a stack of evidence” about Pakistan’s WMD program, including intelligence that the Pakistan army was experimenting with a delivery system for its nuclear bomb, using US-provided technology. Barlow concludes, “Our side was at it again.” [Guardian, 10/13/2007] In the summer of 1989, Barlow is involved in investigating four criminal cases involving senior officers of the Pakistani Army who had attempted to make illegal purchases in the US or abroad of American-made nuclear-related materials, including highly enriched uranium. One of the cases involves evidence showing that Pakistan is attempting to obtain dual-use items for its nuclear program by claiming that the materials are to be used for its F-16 fleet. [New Yorker, 3/29/1993]

Entity Tags: Richard Barlow, US Department of Defense

Timeline Tags: A. Q. Khan's Nuclear Network

A convoy of Soviet tanks leaving Afghanistan.A convoy of Soviet tanks leaving Afghanistan. [Source: National Geographic]Soviet forces withdraw from Afghanistan, in accordance with an agreement signed the previous year (see April 1988). However, Afghan communists retain control of Kabul, the capital, until April 1992. [Washington Post, 7/19/1992] It is estimated that more than a million Afghans (eight per cent of the country’s population) were killed in the Soviet-Afghan War, and hundreds of thousands had been maimed by an unprecedented number of land mines. Almost half of the survivors of the war are refugees. [New Yorker, 9/9/2002] Richard Clarke, a counterterrorism official during the Reagan and George H. W. Bush administrations and the counterterrorism “tsar” by 9/11, will later say that the huge amount of US aid provided to Afghanistan drops off drastically as soon as the Soviets withdraw, abandoning the country to civil war and chaos. The new powers in Afghanistan are tribal chiefs, the Pakistani ISI, and the Arab war veterans coalescing into al-Qaeda. [Clarke, 2004, pp. 52-53]

Entity Tags: Al-Qaeda, Pakistan Directorate for Inter-Services Intelligence, Richard A. Clarke

Timeline Tags: 9/11 Timeline, War in Afghanistan

Although the Soviets withdraw from Afghanistan in February 1989 (see February 15, 1989), the CIA continues to support the mujaheddin because the Soviet-allied Communist government stays in power in Kabul. Apparently, the CIA and the Saudi government continue to fund the mujaheddin at least until December 1990, although it could be longer because the Communist government remains in power in Kabul until 1992. The “Blind Sheikh,” Sheikh Omar Abdul-Rahman, reportedly has been working with the CIA in the 1980s to help unite the mujaheddin factions fighting each other (see Late 1980s). The Village Voice will later report that according to a “very high-ranking Egyptian official,” Abdul-Rahman continues to work with the CIA after moving to Brooklyn in July 1990 (see July 1990). He “work[s] closely with the CIA, helping to channel a steady flow of money, men, and guns to mujaheddin bases in Afghanistan and Pakistan.” But despite working with the CIA, Abdul-Rahman still considers the US the “Great Satan” and does not try to hide this. In one radio broadcast, he says that “Americans are descendants of apes and pigs who have been feeding from the dining tables of the Zionists, Communism, and colonialism.” Matti Steinberg, an expert on Islamic fundamentalism, says that Abdul-Rahman’s “long-term goal is to weaken US society and to show Arab rulers that the US is not an invulnerable superpower.” The Egyptian official will later complain, “We begged America not to coddle the sheikh.” [Village Voice, 3/30/1993]

Entity Tags: Central Intelligence Agency, Omar Abdul-Rahman, Matti Steinberg

Timeline Tags: Complete 911 Timeline, War in Afghanistan

Dick Cheney’s official photo as Secretary of Defense.Dick Cheney’s official photo as Secretary of Defense. [Source: US Department of Defense]Former Representative Dick Cheney (R-WY) becomes secretary of defense under President George H. W. Bush. [US Department of Defense, 11/24/2005] Cheney is the second choice; Bush’s first consideration, former Texas senator John Tower, lost key Senate support when details of his licentious lifestyle and possible alcoholism became known. Cheney was the choice of, among others, Vice President Dan Quayle and National Security Adviser Brent Scowcroft, who both feel that Bush needs someone in the position fast, and the best way to have someone move through the confirmation process is to have someone from Congress. Although Cheney never served in the military, and managed to dodge service during the Vietnam War with five student deferments, he has no skeletons in his closet like Tower’s, and he has the support of Congressional hawks. His confirmation hearings are little more than a formality.
Cheney Leaves the House, Gingrich Steps In - Cheney’s House colleague, Republican Mickey Edwards, later reflects, “The whole world we live in would be totally different if Dick Cheney had not been plucked from the House to take the place of John Tower.” Cheney was “in line to become the [GOP’s] leader in the House and ultimately the majority leader and speaker,” Edwards will say. “If that [had] happened, the whole Gingrich era wouldn’t have happened.” Edwards is referring to Newt Gingrich (R-GA), the future speaker of the House who, in authors Lou Dubose and Jake Bernstein’s own reflections, “ushered in fifteen years of rancorous, polarized politics.” While Cheney is as partisan as Gingrich, he is not the kind of confrontational, scorched-earth politician Gingrich is. According to Edwards, no one can envision Cheney moving down the same road as Gingrich will.
Successful Tenure - As the Pentagon’s civilian chief, many will reflect on Cheney’s tenure as perhaps his finest hour as a public servant. “I saw him for four years as [defense secretary]. He was one of the best executives the Department of Defense had ever seen,” later says Larry Wilkerson, who will serve in the Bush-Cheney administration as chief of staff to Secretary of State Colin Powell. “He made decisions. Contrast that with the other one I saw [Clinton Secretary of Defense Lester Aspin], who couldn’t make a decision if it slapped him in the face.” Cheney will preside over a gradual reduction in forces stationed abroad—a reduction skillfully managed by the Chairman of the Joint Chiefs of Staff, Colin Powell.
Bringing Aboard the Neoconservatives - Cheney asks one of Tower’s putative hires, Paul Wolfowitz, to stay; Wolfowitz, with fellow Pentagon neoconservatives Lewis “Scooter” Libby and Zalmay Khalilzad, will draft the Pentagon’s 1992 Defense Planning Guide (DPG) (see February 18, 1992), a harshly neoconservative proposal that envisions the US as the world’s strongman, dominating every other country and locking down the Middle East oil reserves for its own use. Though the DPG is denounced by President Bush, Cheney supports it wholeheartedly, even issuing it under his own name. “He took ownership in it,” Khalilzad recalls. Cheney also brings in his aide from the Iran-Contra hearings, David Addington (see Mid-March through Early April, 1987), another neoconservative who shares Cheney’s view of almost unlimited executive power at the expense of the judicial and legislative branches. [Dubose and Bernstein, 2006, pp. 87-95]

Entity Tags: Lester Aspin, George Herbert Walker Bush, David S. Addington, Dan Quayle, Colin Powell, Brent Scowcroft, Jake Bernstein, Lawrence Wilkerson, Richard (“Dick”) Cheney, John Tower, Newt Gingrich, Zalmay M. Khalilzad, Mickey Edwards, Lewis (“Scooter”) Libby, Lou Dubose, Paul Wolfowitz

Timeline Tags: US Military

Members of Egyptian militant group Al-Gama’a al-Islamiyya, whose spiritual head is the ‘Blind Sheikh,’ Sheikh Omar Abdul-Rahman, hold a series of secret meetings with US officials at the American embassy in Cairo. The meetings are initiated by Al-Gama’a al-Islamiyya, which wants to co-operate with the US, because it thinks the US is co-operating with and supporting the Muslim Brotherhood in Egypt. At the meetings, representatives of the group tell the US:
bullet Al-Gama’a al-Islamiyya has between 150,000 and 200,000 members;
bullet One of the representatives at the meetings sat on Al-Gama’a al-Islamiyya’s shura, or leadership council, between 1981 and 1988. The 11 members of the group’s shura are named at the meetings, as is its operational commander;
bullet Al-Gama’a al-Islamiyya thinks highly of Saudi Arabian King Fahd, but believes he should take a stronger line against Iran. However, Abdul-Rahman met an Iranian delegation in Pakistan in autumn 1988;
bullet The group will not attack US diplomats;
bullet Abdul-Rahman travels to the US yearly, and also travels to Britain;
bullet The group is not as secret and violent as represented by the Egyptian government and has undergone a “change in thinking,” becoming concerned about its radical and violent image.
Embassy officials are skeptical about some of the claims, as the group’s representatives reveal more than the officials think is prudent. One year after the meetings, Abdul-Rahman will be issued a US visa by a CIA officer and move to the US (see July 1990). [US Embassy in Cairo, 4/25/1989 pdf file; US Embassy in Cairo, 5/3/1989 pdf file]

Entity Tags: Al-Gama’a al-Islamiyya, United States, Omar Abdul-Rahman, US Embassy in Cairo

Timeline Tags: Complete 911 Timeline

US Ambassador to Indonesia Paul Wolfowitz leaves his position after a three-year tenure. At a farewell speech in the Indonesian capital of Jakarta, Wolfowitz says, “If greater openness is a key to economic success, I believe there is increasingly a need for openness in the political sphere as well.” The Washington Post will comment that this remark is “in line with the US envoy’s quiet pursuit of political and economic reforms in Indonesia,” but “stunned some members of [Indonesian President] Suharto’s inner circle,” as it “could have landed domestic critics in prison.” [Washington Post, 3/28/2005]

Entity Tags: Paul Wolfowitz

Timeline Tags: US International Relations, Misc Entries, Neoconservative Influence

President George Bush and Secretary of State James Baker decide that the US will cut off foreign aid to Pakistan because of its nuclear weapons program. Pakistan was a major recipient of foreign aid during the Soviet Afghan war, when the US channeled support to the mujaheddin through it, but Soviet forces began withdrawing from Afghanistan in February (see February 15, 1989). It is decided that aid will be provided for 1989, but not for 1990 (see October 1990). [New Yorker, 3/29/1993]

Entity Tags: George Herbert Walker Bush, Pakistan, James A. Baker

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network

Page 1 of 19 (1868 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike