!! History Commons Alert, Exciting News

Context of 'October 4, 2001: Bush Authorizes NSA Domestic Spying'

This is a scalable context timeline. It contains events related to the event October 4, 2001: Bush Authorizes NSA Domestic Spying. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 2 of 7 (657 events)
previous | 1, 2, 3, 4, 5, 6, 7 | next

US intelligence resumes monitoring the al-Qaeda cell in Kenya, and continues to listen in all the way through the US embassy attacks that the cell implements in August 1998 (see 10:35-10:39 a.m., August 7, 1998). US intelligence had begun wiretapping five phones used by the cell by late 1996, including the phones of cell leader Wadih El-Hage and two phones belonging to Mercy International, a charity believed to have been used as a front by the Kenya cell. The monitoring stopped in October 1997, though it is not clear why. The New York Times will report that “after a break, [monitoring] began again in May 1998, just months before the bombing and precisely during the time the government now asserts the attack was being planned.” It is not known what caused the monitoring to resume nor has it been explained how the cell was able to succeed in the embassy attacks while being monitored. [New York Times, 1/13/2001]

Entity Tags: Mercy International, Al-Qaeda, Wadih El-Hage

Timeline Tags: Complete 911 Timeline

Mamdouh Mahmud Salim (a.k.a. Abu Hajer), a high-ranking al-Qaeda leader, visits Bosnia for unknown reasons and connects with a charity suspected of financing bin Laden’s organization. Salim was one of the founders of al-Qaeda and will be arrested in Germany later in the year (see September 16, 1998) and charged in connection with the 1998 embassy bombings (see 10:35-10:39 a.m., August 7, 1998). Records show that the Bosnia branch of the US-based Benevolence International Foundation (BIF) sponsored Salim’s visa, reserved him an apartment, and identified him as one of its directors. A BIF mole in Bosnian intelligence is able to tip off Salim that investigators are onto him, so he is not caught (see September 1996-June 2000). Intelligence officials will question BIF officers about Salim’s trip in early 2000, but the reason for the trip remains a mystery. [New York Times, 6/14/2002]

Entity Tags: Benevolence International Foundation, Mamdouh Mahmud Salim

Timeline Tags: Complete 911 Timeline

Top: Bin Laden, surrounded by security, walking to the press conference. Bottom: the three journalists attending the press conference sit next to bin Laden.Top: Bin Laden, surrounded by security, walking to the press conference. Bottom: the three journalists attending the press conference sit next to bin Laden. [Source: CNN]Bin Laden discusses “bringing the war home to America,” in a press conference from Khost, Afghanistan. [US Congress, 9/18/2002] Bin Laden holds his first and only press conference to help publicize the fatwa he published several months before. Referring to the group that signed the fatwa, he says, “By God’s grace, we have formed with many other Islamic groups and organizations in the Islamic world a front called the International Islamic Front to do jihad against the crusaders and Jews.” He adds later, “And by God’s grace, the men… are going to have a successful result in killing Americans and getting rid of them.” [CNN, 8/20/2002] He also indicates the results of his jihad will be “visible” within weeks. [US Congress, 7/24/2003] Two US embassies will be bombed in August (see 10:35-10:39 a.m., August 7, 1998). Bin Laden sits next to Ayman al-Zawahiri and Mohammed Atef during the press conference. Two Pakistani journalists and one Chinese journalist attends. But event never gets wide exposure because no independent videotaping is allowed (however, in 2002 CNN will obtain video footage of the press conference seized after the US conquered Afghanistan in late 2001). Pakistani journalist Ismail Khan attends and will later recall, “We were given a few instructions, you know, on how to photograph and only take a picture of Osama and the two leaders who were going to sit close by him. Nobody else.” Two sons of Sheikh Omar Abdul-Rahman attend and distribute what they claim is the will or fatwa of their father (see May 1998), who has been sentenced to life in prison in the US. Journalist Peter Bergen will later comment that the significance of the sons’ presence at the press conference “can’t be underestimated” because it allows bin Laden to benefit from Abdul-Rahman’s high reputation amongst radical militants. Bergen also later says the press conference is a pivotal moment for al-Qaeda. “They’re going public. They’re saying, ‘We’re having this war against the United States.’” [CNN, 8/20/2002] The specific comment by bin Laden about “bringing the war home to America” will be mentioned in the August 2001 memo given to President Bush entitled “Bin Laden Determined to Strike in US” (see August 6, 2001).

Entity Tags: Osama bin Laden, Ismail Khan, Ayman al-Zawahiri, Ahmad Abdul-Rahman, Mohammed Atef, Mohammed Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A joint surveillance operation conducted by the CIA and Albanian intelligence identifies an Islamic Jihad cell that is allegedly planning to bomb the US Embassy in Tirana, Albania’s capital. The cell was created in the early 1990s by Mohammed al-Zawahiri, brother of Islamic Jihad and al-Qaeda leader Ayman al-Zawahiri. The operation intercepts lengthy discussions between the cell and Ayman. [New Yorker, 2/8/2005; Wright, 2006, pp. 269] At the behest of the US government, Egypt, which is co-operating with the US over renditions (see Summer 1995), issues an arrest warrant for Shawki Salama Attiya, one of the militants in the cell. Albanian forces then arrest Attiya and four of the other suspected militants. A sixth suspect is killed, but two more escape. The men are taken to an abandoned airbase, where they are interrogated by the CIA, and then flown by a CIA-chartered plane to Cairo, Egypt, for further interrogation. The men are tortured after arriving in Egypt:
bullet Ahmed Saleh is suspended from the ceiling and given electric shocks; he is later hanged for a conviction resulting from a trial held in his absence;
bullet Mohamed Hassan Tita is hung from his wrists and given electric shocks to his feet and back;
bullet Attiya is given electric shocks to his genitals, suspended by his limbs and made to stand for hours in filthy water up to his knees;
bullet Ahmed al-Naggar is kept in a room for 35 days with water up to his knees, and has electric shocks to his nipples and penis; he is later hanged for an offence for which he was convicted in absentia;
bullet Essam Abdel-Tawwab will also describe more torture for which prosecutors later find “recovered wounds.”
On August 5, 1998, a letter by Ayman al-Zawahiri will be published that threatens retaliation for the Albanian abductions (see August 5, 1998). Two US embassies in Africa will be bombed two days later (see 10:35-10:39 a.m., August 7, 1998). [Washington Post, 3/11/2002, pp. A01; New Yorker, 2/8/2005; Grey, 2007, pp. 128] The US State Department will later speculate that the timing of the embassy bombings was in fact in retaliation for these arrests. [Ottawa Citizen, 12/15/2001]

Entity Tags: Mohamed Hassan Tita, Shawki Salama Attiya, Mohammed al-Zawahiri, Albania, Central Intelligence Agency, Ahmed Saleh, Ahmed al-Naggar, Ayman al-Zawahiri, Essam Abdel-Tawwab, Islamic Jihad

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Kosovar Albanian Struggle

On May 26, 1998, Osama bin Laden said at a press conference that there would be “good news” in coming weeks (see May 26, 1998). On June 12, the State Department issues a public warning, stating, “We take those threats seriously and the United States is increasing security at many US government facilities in the Middle East and Asia.” Notably, the State Department does not mention increasing security in Africa. Two US embassies will be bombed there in August 1998 (see 10:35-10:39 a.m., August 7, 1998). There are no other public warnings given before the embassy bombings. [Bergen, 2001, pp. 110]

Entity Tags: Osama bin Laden, US Department of State

Timeline Tags: Complete 911 Timeline

The British intelligence service MI6 and Moroccan intelligence approach al-Qaeda operative L’Houssaine Kherchtou in an attempt to recruit him. Kherchtou is disillusioned with al-Qaeda and has been under surveillance by the Moroccans for some time. The results of the first meeting are not known, but after it Kherchtou returns to Nairobi, Kenya, where he had helped with a plot to bomb the US embassy and provided his apartment to other conspirators (see Late 1993-Late 1994), and makes contact with other cell members again in early August. He apparently does not know the precise details of the operation, but when the attack happens (see 10:35-10:39 a.m., August 7, 1998), he realizes who did it. MI6 is aware that he is in Kenya and he is detained at the airport by local authorities and turned over to them. MI6 debriefs him about the embassy bombings, but this information is not immediately shared with the FBI (see Shortly After August 7, 1998), which later takes him into custody (see Summer 2000). [American Prospect, 6/19/2005]

Entity Tags: UK Secret Intelligence Service (MI6), Direction de la Surveillance du Territoire (Morocco), L’Houssaine Kherchtou

Timeline Tags: Complete 911 Timeline

Khalid al-Fawwaz.Khalid al-Fawwaz. [Source: CNN]The NSA is monitoring phone calls between bin Laden in Afghanistan and Khalid al-Fawwaz in London, yet no action is taken after al-Fawwaz is given advanced notice of the African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). Al-Fawwaz, together with Ibrahim Eidarous and Adel Abdel Bary, are operating as bin Laden’s de facto international media office in London, and the NSA has listened in for two years as bin Laden called them over 200 times (see November 1996-Late August 1998). On July 29, 1998, al-Fawwaz is called from Afghanistan and told that more satellite minutes are needed because many calls are expected in the next few days. Al-Fawwaz calls a contact in the US and rush orders 400 more minutes for bin Laden’s phone. A flurry of calls on bin Laden’s phone ensues, though what is said has not been publicly revealed. [Knight Ridder, 9/20/2001] On August 7 at around 4:45 a.m., about three hours before the bombings take place, a fax taking credit for the bombings is sent to a shop near al-Fawwaz’s office. The fingerprints of his associates Eidarous and Abdel Bary are later found on the fax. They fax a copy of this to the media from a post office shortly after the bombings and their fingerprints are found on that fax as well. [Seattle Post-Intelligencer, 7/13/1999; Daily Telegraph, 9/19/2001] Canadian intelligence is monitoring an operative named Mahmoud Jaballah who is serving as a communication relay between operatives in Baku and London. He is monitored talking to people both in Baku and London just before the fax is sent from Baku to London (see August 5-7, 1998). The NSA has also been monitoring the operatives in Baku (see November 1996-Late August 1998). It is not clear why the Canadians or the NSA fail to warn about the bombings based on these monitored phone calls. Before 9/11, bin Laden’s phone calls were regularly translated and analyzed in less an hour or so. It has not been explained why this surge of phone calls before the embassy bombings did not result in any new attack warnings. The three men will be arrested shortly after the embassy bombings (see Early 1994-September 23, 1998).

Entity Tags: National Security Agency, Khalid al-Fawwaz, Osama bin Laden, Adel Abdel Bary, Ibrahim Eidarous, Mahmoud Jaballah

Timeline Tags: Complete 911 Timeline

US intelligence is reportedly monitoring a “very important source” in Khartoum, Sudan, during the time of the August 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998). An unnamed US official working in Sudan at the time will later tell this to journalist Jonathan Randal. This official will claim the US is intercepting telephone communications between this source and al-Qaeda at least during 1998. The name of the source has not been revealed, but this person is considered so important that after the embassy bombings the US will consider killing the source in retaliation. However, a different target is chosen because the source either knows nothing about the bombings or at least does not mention them in intercepted conversations. [Randal, 2005, pp. 152] It is not known when this surveillance ends or what happens to the source.

Entity Tags: US intelligence, Al-Qaeda

Timeline Tags: Complete 911 Timeline

Sayyid Iskandar Suliman. This picture is from a poor photocopy of his passport found in Sudanese intelligence files.Sayyid Iskandar Suliman. This picture is from a poor photocopy of his passport found in Sudanese intelligence files. [Source: Public domain via Richard Miniter]On August 4, 1998, Sudanese immigration suspects two men, Sayyid Nazir Abbass and Sayyid Iskandar Suliman, arriving in Sudan, apparently due to something in their Pakistani passports. They attempt to rent an apartment overlooking the US embassy. Three days later, US embassies are bombed in Kenya and Tanzania (see 10:35-10:39 a.m., August 7, 1998). Within hours, Sudanese officials arrest Abbass and Suliman. The two of them had just come from Kenya, and one of them quickly admits to staying in the same hotel in Kenya as some of the embassy bombers. Sudanese intelligence believes they are al-Qaeda operatives involved in the bombings. [Observer, 9/30/2001; Vanity Fair, 1/2002; Randal, 2005, pp. 132-135] The US embassy in Sudan has been shut down for several years. But around August 14, a Sudanese intelligence official contacts an intermediary and former White House employee named Janet McElligott and gives her a vague message that Sudan is holding important suspects and the FBI should send a team immediately to see if they want to take custody of them. [Randal, 2005, pp. 132-135] The FBI wants the two men, but on August 17, Secretary of State Madeleine Albright forbids their extradition. The US has decided to bomb a factory in Sudan in retaliation for the embassy bombings instead of cooperating with Sudan. But FBI agent John O’Neill is not yet aware of Albright’s decision, and word of the Sudanese offer reaches him on August 19. He wants immediate approval to arrest the two suspects and flies to Washington that evening to discuss the issue with counterterrorism “tsar” Richard Clarke. But Clarke tells O’Neill to speak to Attorney General Janet Reno. Later that night, O’Neill talks to Reno and she tells him that the decision to retaliate against Sudan instead has already been made. Mere hours later, the US attack a factory in Sudan with cruise missiles (see August 20, 1998). Within days, it becomes apparent that the factory had no link to al-Qaeda (see September 23, 1998), and no link between the bombings and the Sudanese government will emerge (although Sudan harbored bin Laden until 1996). [Randal, 2005, pp. 132-138] The Sudanese will continue to hold the two men in hopes to make a deal with the US. But the US is not interested, so after two weeks they are send to Pakistan and set free there (see August 20-September 2, 1998).

Entity Tags: US Department of State, Sayyid Nazir Abbass, Sayyid Iskandar Suliman, Sudan, Osama bin Laden, Janet Reno, John O’Neill, Madeleine Albright, Richard A. Clarke, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline

The Islamic Jihad, a militant group that has joined forces with al-Qaeda, issues a statement threatening to retaliate against the US for its involvement rounding up an Islamic Jihad cell in Albania (see Summer 1998). It is believed Ayman al-Zawahiri wrote the statement, which says, “We wish to inform the Americans… of preparations for a response which we hope they read with care, because we shall write it with the help of God in the language they understand.” The bombing of two US embassies in Africa follows two days later (see 10:35-10:39 a.m., August 7, 1998). [CNN, 1/2001; Wright, 2006, pp. 269]

Entity Tags: Islamic Jihad, Ayman al-Zawahiri

Timeline Tags: Complete 911 Timeline

Usama al-Kini, a.k.a. Fahid Muhammad Ally Msalam.Usama al-Kini, a.k.a. Fahid Muhammad Ally Msalam. [Source: FBI]Most of the al-Qaeda operatives involved in the African embassy bombings (see 10:35-10:39 a.m., August 7, 1998) leave the country the night before the bombings. Abdullah Ahmed Abdullah and Ahmed Khalfan Ghailani fly from Nairobi to Karachi, Pakistan, on one flight. Usama al-Kini (a.k.a. Fahid Muhammad Ally Msalam), Mohammed Saddiq Odeh, and five unnamed bombers fly from Nairobi to Karachi with a stopover in Dubai on another flight. Some use false passports, but others, such as Abdullah, travel in their real name. Two others, Sheikh Ahmed Salim Swedan and Mustafa Fadhil, flew to Pakistan on August 2. Odeh is arrested at 5:30 a.m., Kenya time, while going through customs in Karachi, but the others on his flight are not (see 5:30 a.m., August 7, 1998). Two suicide bombers are killed in the bombings. The only operatives who remain in East Africa after the bombings are Fazul Abdullah Mohammed (a.k.a. Haroun Fazul), who volunteered to clean up the evidence in Kenya, and Khalfan Khamis Mohamed, who volunteered to do the same in Tanzania, plus Mohamed al-Owhali, one of the suicide bombers in Kenya who unexpectedly ran away at the last minute and survived with only minor injuries. [United Press International, 1/2/2001; United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001] Given the extent to which US intelligence was monitoring the members of the Kenyan cell (see April 1996 and May 1998), and even reportedly had multiple informants in the cell (see Before August 7, 1998), it is unclear how the US missed the departure of nearly every suspect from Kenya.

Entity Tags: Sheikh Ahmed Salim Swedan, Usama al-Kini, Mustafa Fadhil, Mohamed al-Owhali, Abdullah Ahmed Abdullah, Mohammed Saddiq Odeh, Ahmed Khalfan Ghailani, Khalfan Khamis Mohamed, Fazul Abdullah Mohammed

Timeline Tags: Complete 911 Timeline

Al-Qaeda operatives plan to bomb the US embassy in Kampala, Uganda, at the same time the embassies in Kenya and Tanzania are bombed (see 10:35-10:39 a.m., August 7, 1998), but there is a delay at the last moment. Police arrest 18 people over the next two weeks before the attack can be carried out. A Ugandan official will later say, “The attacks were planned to be more serious and devastating” than the other two. It is unclear what becomes of these 18 suspects; none of them are tried in the US. [Associated Press, 9/25/1998; Reeve, 1999, pp. 200]

Entity Tags: Al-Qaeda

Timeline Tags: Complete 911 Timeline

At approximately 5:30 in the morning, Kenya time, Mohammed Saddiq Odeh is arrested at the airport in Karachi, Pakistan. Odeh is one of the bombers in the embassy bombings which take place four hours later in Kenya and Tanzania (see 10:35-10:39 a.m., August 7, 1998). [United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001]
Odeh Stopped Because of Alert Inspector or CIA? - He had flown out of Nairobi, Kenya, the night before, with his plane stopping in Dubai on the way to Pakistan (see August 6-7, 1998). According to some accounts, an inspector notices that Odeh’s passport picture has a beard, while Odeh does not have a beard and looks different. Furthermore, Odeh is unable to look the inspector in the eyes. But according to UPI, he is stopped because he had been identified by the CIA. In any case, over the next hours, he is handed over to intelligence officers and makes a full confession. He admits that he is a member of al-Qaeda, led by bin Laden, and that he is the head of the al-Qaeda cell in Kenya. He even gives the address of the villa where the bomb was built and the names of the other bombers. [Bergen, 2001, pp. 116; United Press International, 1/2/2001; Associated Press, 4/3/2001; Miller, Stone, and Mitchell, 2002, pp. 213]
False or Mistaken Account by CIA Officer - CIA officer Gary Berntsen heads the CIA’s emergency deployment team to Tanzania in the immediate wake of the bombings. He will improbably claim in a 2005 book that the US at first primarily suspects Hezbollah. According to him, it is only on August 15 when a CIA officer in Karachi happens to notice an article saying that an Arab traveling on a false passport was arrested in Karachi near the time of the bombings. This is discovered to be Odeh, who is transferred to US custody. Only then does al-Qaeda’s involvement become clear. Perhaps to support this timeline, Berntsen also falsely claims that another bomber, Mohamed al-Owhali, is arrested on August 15 when in fact he is arrested three days earlier. [United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001; Berntsen and Pezzullo, 2005]
Odeh's Confession and Other Al-Qaeda Evidence Kept Secret for Days - Publicly, the US does not link any evidence from the bombing to al-Qaeda until August 17, when Odeh’s confession is finally mentioned in front page news stories. Even then, the story is based on accounts from Pakistani officials and US officials say they cannot confirm it. [Washington Post, 8/17/1998] In fact, there is a wealth of information immediately tying al-Qaeda to the bombings that is kept secret, including wiretaps of many of the bombers (see April 1996 and May 1998), informants in the cell (see Before August 7, 1998), and even a statement of responsibility that was intercepted hours before the bombings had occurred (see August 5-7, 1998).

Entity Tags: Mohammed Saddiq Odeh, Mohamed al-Owhali, Central Intelligence Agency, Gary Berntsen, Al-Qaeda

Timeline Tags: Complete 911 Timeline

Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right).Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right). [Source: Associated Press]Two US embassies in Africa are bombed within minutes of each other. At 10:35 a.m., local time, a suicide car bomb attack in Nairobi, Kenya, kills 213 people, including 12 US nationals, and injures more than 4,500. Mohamed al-Owhali and someone known only as Azzam are the suicide bombers, but al-Owhali runs away at the last minute and survives. Four minutes later, a suicide car bomb attack in Dar es Salaam, Tanzania, kills 11 and injures 85. Hamden Khalif Allah Awad is the suicide bomber there. The attacks will be blamed on al-Qaeda. [PBS Frontline, 2001; United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001] The Tanzania death toll is low because, remarkably, the attack takes place on a national holiday so the US embassy there is closed. [Miller, Stone, and Mitchell, 2002, pp. 195] The attack shows al-Qaeda has a capability for simultaneous attacks. The Tanzania bombing appears to have been a late addition, as one of the arrested bombers will allegedly tell US agents that it was added to the plot only about 10 days in advance. [United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001] A third attack against the US embassy in Uganda does not take place due to a last-minute delay (see August 7, 1998). [Associated Press, 9/25/1998] August 7, 1998, is the eighth anniversary of the arrival of US troops in Saudi Arabia and some people will speculate that this is the reason for the date of the bombings. [Gunaratna, 2003, pp. 46] In the 2002 book The Cell, reporters John Miller, Michael Stone, and Chris Mitchell will write: “What has become clear with time is that facets of the East Africa plot had been known beforehand to the FBI, the CIA, the State Department, and to Israeli and Kenyan intelligence services.… [N]o one can seriously argue that the horrors of August 7, 1998, couldn’t have been prevented.” They will also comment, “Inexplicable as the intelligence failure was, more baffling still was that al-Qaeda correctly presumed that a major attack could be carried out by a cell that US agents had already uncovered.” [Miller, Stone, and Mitchell, 2002, pp. 195, 206] After 9/11, it will come to light that three of the alleged hijackers, Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi, had some involvement in the bombings (see October 4, 2001, Late 1999, and 1993-1999) and that the US intelligence community was aware of this involvement by late 1999 (see December 15-31, 1999), if not before.

Entity Tags: Salem Alhazmi, Nawaf Alhazmi, Mohamed al-Owhali, Hamden Khalif Allah Awad, Khalid Almihdhar, Al-Qaeda, Azzam

Timeline Tags: Complete 911 Timeline

In November 1997, an Egyptian named Mustafa Mahmoud Said Ahmed walked into the US embassy in Nairobi, Kenya, and told CIA officers of a group planning to blow up the embassy (see November 1997). His warning would turn out to be a startlingly accurate description of the 1998 US embassy bombing in Nairobi (see 10:35-10:39 a.m., August 7, 1998). Ahmed apparently is involved in the bombing of the US embassy in Dar es Salaam, Tanzania, that takes place the same day the Nairobi embassy is bombed. One day after the attacks, Ahmed contacts the British embassy and offers to help. He is overheard saying, “I told them everything I knew.” He also tells the British that it was “not the first time” he had cooperated with Western officials, and that he had been doing so “since last year.” [New York Times, 10/23/1998; New York Times, 1/9/1999] CIA officer Gary Berntsen will later reveal that he meets Ahmed as Ahmed is being kicked out of an allied government’s embassy. Berntsen then interviews Ahmed, and while the account of the interview is almost completely censored, Ahmed apparently gives information that leads to the arrest of one of the embassy bombers in Pakistan on August 15. This is the crucial break that allows the US to conclusively determine al-Qaeda’s role in the bombings and arrest some of the other bombers. [Berntsen and Pezzullo, 2005, pp. 22-25] The US does not ask for Ahmed’s extradition, and he is charged for the Tanzania bombing in that country. The New York Times will report, “Several non-American diplomats in the region [speculate] that the United States is allowing the Tanzanians to try Mr. Ahmed because they fear his trial in America might bring to light his dealings with American authorities and other Western intelligence services.” [New York Times, 10/23/1998; New York Times, 1/9/1999] In March 2000, Tanzania will announce that all charges against Ahmed have been dropped and he is being deported. No reason will be given. [New York Times, 3/20/2000]

Entity Tags: Gary Berntsen, Mustafa Mahmoud Said Ahmed, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

Two days after the US embassy bombings in Africa (see 10:35-10:39 a.m., August 7, 1998), the FBI interview double agent Ali Mohamed over the telephone. Mohamed is living openly in California. He says al-Qaeda is behind the bombings and that he knows who the perpetrators are, but he won’t give their names to the FBI. He also tries to downplay his involvement in the bombings, saying that he lived in Kenya in 1994 and ran front companies for bin Laden there, but when he was shown a file containing a plan to attack the US embassy in Kenya, he “discouraged” the cell members from carrying out the attack. A week later, prosecutors subpoena Mohamed to testify before a grand jury hearing in New York to be held in September. Author Peter Lance will later comment, “Considering that Mohamed had told [US Attorney Patrick] Fitzgerald at their dinner meeting in the fall of 1997 (see October 1997) that he had fake passports and the means to leave the country quickly, it’s mind-boggling how long it took the Feds to search his home…” They do not arrive at his house until August 24 (see August 24, 1998). On August 27, he again tells the FBI on the phone that he knows who the bombers are but again refuses to name names. He will not be arrested until September 10 (see September 10, 1998). [New York Times, 1/13/2001; Lance, 2006, pp. 296]

Entity Tags: Ali Mohamed, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline

Mohamed al-Owhali is arrested and immediately begins confessing to FBI investigators his role in the recent al-Qaeda bombing of the US embassy in Nairobi, Kenya (see 10:35-10:39 a.m., August 7, 1998). In addition to revealing the existence of an al-Qaeda network in the US planning an attack there (August 12-25, 1998) and also revealing the phone number of a key al-Qaeda communications hub in Yemen (see Late August 1998), it appears he also reveals al-Qaeda plans for an attack in Yemen. In October 2000, Al-Qaeda operatives bombed the USS Cole in a port in Yemen (see October 12, 2000). In January 2001, in coverage of al-Owhali’s trial for his role in the embassy bombings, a court document mentions that during his interrogation he mentioned “a possible attack in Yemen.” [CNN, 1/19/2001] However, one newspaper notes, “It could not be learned how the authorities followed up on the information or how detailed it was.” [New York Times, 1/18/2001] It will later be revealed that al-Owhali identified the two leaders of the Cole bombing as participants in the planning for the US embassy bombings. [CNN, 10/16/2001]

Entity Tags: Mohamed al-Owhali, Al-Qaeda

Timeline Tags: Complete 911 Timeline

In 1998, President Clinton faces a growing scandal about his sexual relationship with aide Monica Lewinsky, and even faces the possibility of impeachment over the matter. He is publicly interrogated about the scandal on August 17, 1998. Counterterrorism “tsar” Richard Clarke will later claim that he worries Clinton might let the timing of the scandal get in the way of acting on new intelligence to hit Osama bin Laden with a missile strike in retaliation for the recent African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). But Clarke is reassured when Clinton tells his advisers, “Do you all recommend that we strike on the 20th? Fine. Do not give me political advice or personal advice about the timing. That’s my problem. Let me worry about that.” [Clarke, 2004, pp. 185-186] Defense Secretary William Cohen also warns Clinton that he will be criticized for changing the subject from the Lewinsky scandal. [Benjamin and Simon, 2005, pp. 358]
Criticism from Politicians - Clinton gives the go-ahead for the missile strike on August 20th anyway (see August 20, 1998) and is immediately widely criticized for it. In late 1997, there was a popular movie called “Wag the Dog,” based on a fictional president who creates an artificial crisis in order to distract the public from a domestic scandal. Republicans are particularly critical and seize upon a comparison to the movie. House Speaker Newt Gingrich (R-GA) initially supports the missile strike, but later criticizes it as mere “pinpricks.” [9/11 Commission, 7/24/2004, pp. 117] Sen. Arlen Specter (R-PA) says, “The president was considering doing something presidential to try to focus attention away from his personal problems.” [Benjamin and Simon, 2005, pp. 358-359] Sen. Daniel Coats (R-IN) says, “I just hope and pray the decision that was made was made on the basis of sound judgment, and made for the right reasons, and not made because it was necessary to save the president’s job.” [New York Times, 8/4/2004]
Media Criticism - The media is also very critical, despite a lack of any evidence that Clinton deliberately timed the missile strike as a distraction. Television networks repeatedly show clips of the “Wag the Dog” movie after the missile strike. New Yorker journalist Seymour Hersh reports, “Some reporters questioned whether the president had used military force to distract the nation’s attention from the Lewinsky scandal.” [Benjamin and Simon, 2005, pp. 358-359]
9/11 Commission Commentary - The 9/11 Commission will later conclude, “The failure of the strikes, the ‘wag the dog’ slur, the intense partisanship of the period, and the [fact that one of the missile targets probably had no connection to bin Laden (see September 23, 1998)] likely had a cumulative effect on future decisions about the use of force against bin Laden.” [9/11 Commission, 7/24/2004, pp. 118]

Entity Tags: Richard A. Clarke, William S. Cohen, William Jefferson (“Bill”) Clinton, Osama bin Laden, Monica Lewinsky, Daniel Coats, Arlen Specter, Newt Gingrich

Timeline Tags: Complete 911 Timeline

Through its own monitoring of Osama bin Laden’s satellite phone, the CIA determines that he intends to travel to a training camp in Khost, in eastern Afghanistan. The CIA has to use its own equipment to do this because of a dispute with the NSA, which refused to provide it with full details of its intercepts of bin Laden’s calls (see December 1996). Although the CIA can only get half of what the NSA gets, shortly after the attacks on US embassies in East Africa (see 10:35-10:39 a.m., August 7, 1998), it determines that bin Laden will travel to Khost the next day. On that day, the US launches several missile strikes, one of which is against Khost (see August 20, 1998), but bin Laden does not travel there, evading the missiles. Some will later claim that bin Laden changes his mind on the way there for no particular reason, but there will also be allegations that the Pakistani ISI warned him of the upcoming attack (see July 1999). [Wright, 2006, pp. 283]

Entity Tags: National Security Agency, Al-Qaeda, Osama bin Laden, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

Around the time of a US missile strike against al-Qaeda leaders (see August 20, 1998), Ayman al-Zawahiri uses Osama bin Laden’s satellite phone to speak to Rahimullah Yusufzai, a leading Pakistani reporter for the BBC and the Karachi-based News. During the call, Al-Zawahiri denies al-Qaeda is responsible for attacks on two US embassies in East Africa, which killed over 200 people (see 10:35-10:39 a.m., August 7, 1998): “Mr. bin Laden has a message. He says, ‘I have not bombed the American embassies in Kenya and Tanzania. I have declared jihad, but I was not involved.’” Although bin Laden’s trial for the embassy bombings in Afghanistan, arranged by the Taliban, collapses when the US fails to provide sufficient evidence of his involvement (see (October 25-November 20, 1998)), bin Laden is generally thought to have known of and authorized the two attacks. [Wright, 2006, pp. 279, 283]

Entity Tags: Rahimullah Yusufzai, Ayman al-Zawahiri, Al-Qaeda, Osama bin Laden

Timeline Tags: Complete 911 Timeline

After he is arrested for the Nairobi embassy bombing (see 10:35-10:39 a.m., August 7, 1998), Mohamed al-Owhali is questioned by local Kenyan law enforcement and the FBI, and discloses important information (see August 4-25, 1998). When he is shown photographs of al-Qaeda operatives, one of the people he identifies is Abd al-Rahim al-Nashiri (a.k.a. Bilal), a cousin of another Nairobi bomber. Al-Nashiri is an al-Qaeda leader who helped al-Owhali obtain a false passport in Yemen when al-Owhali stayed at an al-Qaeda safe house in April-May 1998. It is unclear where the FBI obtained the photo of al-Nashiri, although US intelligence was previously informed of al-Nashiri’s involvement in a plot to smuggle anti-tank missiles into Saudi Arabia (see 1997). [Federal Bureau of Investigation, 9/9/1998, pp. 16 pdf file; United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001; Burke, 2004, pp. 174; 9/11 Commission, 7/24/2004, pp. 152-3]

Entity Tags: Abd al-Rahim al-Nashiri, Mohamed al-Owhali, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Two days after the US embassy bombings in Africa (see 10:35-10:39 a.m., August 7, 1998), double agent Ali Mohamed told the FBI over the telephone that he knows who the perpetrators are, but he won’t reveal their names (see August 9, 1998). Mohamed is living openly in Sacramento, California, but is not arrested. A week later, he received a subpoena ordering him to testify before a grand jury hearing in New York to be held in September. On August 24, a ten-person team of federal agents secretly search Mohamed’s apartment. They copy computer files and photograph documents. His computer has been bugged since October 1997, but agents nonetheless clone his hard drives. They also copy his CD-Roms and floppy disks and photocopy documents. Then they try to hide any trace that they have been in his apartment. They discover a false passport and a number of training documents. One file, created in May 1998, discusses security measures for terrorist cells and specifically mentions his links to al-Qaeda. They even find documents from the Nairobi al-Qaeda cell and training manuals. [San Francisco Chronicle, 9/21/2001; Raleigh News and Observer, 10/21/2001; Wall Street Journal, 11/26/2001; Lance, 2006, pp. 296] However, he will still not be arrested until September 10 (see September 10, 1998).

Entity Tags: Federal Bureau of Investigation, Ali Mohamed, Al-Qaeda

Timeline Tags: Complete 911 Timeline

Al-Qaeda’s communications hub in Sana’a, Yemen.Al-Qaeda’s communications hub in Sana’a, Yemen. [Source: PBS NOVA]The investigation of the East Africa embassy bombings (see 10:35-10:39 a.m., August 7, 1998) led to the discovery of the phone number of an al-Qaeda communications hub in Sana’a, Yemen (see August 4-25, 1998). The hub is run by an al-Qaeda veteran named Ahmed al-Hada, who is helped by his son Samir and is related to many other al-Qaeda operatives in Yemen and elsewhere. He is also the father in law of 9/11 hijacker Khalid Almihdhar, whose wife, Hoda al-Hada, lives at the hub with their children. [Newsweek, 6/2/2002; Die Zeit (Hamburg), 10/1/2002; MSNBC, 7/21/2004; Suskind, 2006, pp. 94; Wright, 2006, pp. 277, 309, 343, 378] Several of Ahmed al-Hada’s relatives die fighting for al-Qaeda before 9/11, a fact known to US intelligence. [Los Angeles Times, 12/21/2005; Guardian, 2/15/2006] The NSA may already be aware of the phone number, as they have been intercepting Osama bin Laden’s communications for some time (see November 1996-Late August 1998) and, according to Newsweek, “some” of bin Laden’s 221 calls to Yemen are to this phone number. [Newsweek, 2/18/2002; Sunday Times (London), 3/24/2002; Media Channel, 9/5/2006] The US intelligence community now begins a joint effort to monitor the number. The NSA and CIA jointly plant bugs inside the house, tap the phones, and monitor visitors with spy satellites. [Mirror, 6/9/2002; Wright, 2006, pp. 343; New Yorker, 7/10/2006 pdf file] US intelligence also learns that the communications hub is an al-Qaeda “logistics center,” used by agents around the world to communicate with each other and plan attacks. [Newsweek, 6/2/2002] The joint effort enables the FBI to map al-Qaeda’s global organization (see Late 1998-Early 2002) and at least three of the hijackers use the number, enabling the NSA to intercept their communications and find out about an important al-Qaeda meeting in Malaysia (see December 29, 1999 and January 5-8, 2000 and Early 2000-Summer 2001). It appears al-Qaeda continues to use this phone line until Samir al-Hada dies resisting arrest in early 2002 (see February 13, 2002).

Entity Tags: National Security Agency, Federal Bureau of Investigation, Samir al-Hada, Khalid Almihdhar, Central Intelligence Agency, Osama bin Laden, Hoda al-Hada, Ahmed al-Hada

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mohamed al-Owhali, one of the bombers of the US embassy in Nairobi, Kenya (see 10:35-10:39 a.m., August 7, 1998), is rendered from Kenya to the US. Al-Owhali was arrested in Nairobi after the bombing and gave up information to local authorities and the FBI about it (see August 4-25, 1998 and August 22-25 1998). He will be tried in the US and sentenced to life in prison (see October 21, 2001). [Grey, 2007, pp. 129, 246]

Entity Tags: Mohamed al-Owhali

Timeline Tags: Torture of US Captives, Complete 911 Timeline

Following the African embassy bombings (see 10:35-10:39 a.m., August 7, 1998), CIA managers ask Alec Station, the CIA’s bin Laden unit, what it most needs to improve the agency’s capabilities against al-Qaeda. Alec Station chief Michael Scheuer will later say that he raises “our dire need for verbatim reports derived from electronic collection.” This is a reference to his desire to get verbatim transcripts of calls to and from al-Qaeda’s operations hub in Yemen, in particular ones between it and Osama bin Laden in Afghanistan. The NSA has the transcripts, but is refusing to provide them to the CIA, and the two agencies have been at loggerheads over the issue for nearly two years. Alec Station needs the transcripts, not the summaries the NSA provides, because the operatives talk in code on the phone and this code cannot be cracked based on the summaries, only using the transcripts (see February 1996-May 1998, December 1996, After December 1996, and After December 1996). Other senior CIA officers have similar trouble getting transcripts from the NSA. Higher officials order the NSA to comply, and they do, but only for less than 12 requests. Then the system returns to the way it was, with NSA only sharing summaries. [Atlantic Monthly, 12/2004] The reason for the change back is unclear, although bin Laden stops using his satellite phone around this time (see Late August 1998).

Entity Tags: National Security Agency, Alec Station, Central Intelligence Agency, Al-Qaeda, Michael Scheuer

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The FBI asks the NSA to pass on all calls between an al-Qaeda communications hub in Yemen and the US. The hub, which is run by an operative named Ahmed al-Hada and was involved in the attacks on US embassies in East Africa (see Late August 1998), is a key al-Qaeda logistics center and intelligence gleaned from listening in on calls to and from it will help prevent some attacks (see August 4-25, 1998 and Late 1998-Early 2002). Dan Coleman, one of the FBI agents who places the request, will say, “anyone who called the Yemen number is white-hot, a top suspect.” However, the NSA will not inform the FBI of all calls between the hub and the US. [Suskind, 2006, pp. 94] In particular, two 9/11 hijackers will call the hub while they are in the US (see Early 2000-Summer 2001). However, the information will be withheld from the FBI and various explanations will be offered for this failure (see (Spring 2000), Summer 2002-Summer 2004, and March 15, 2004 and After).

Entity Tags: Federal Bureau of Investigation, National Security Agency, Dan Coleman

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Wadih El Hage.Wadih El Hage. [Source: FBI]On September 15, 1998, Wadih El-Hage is arrested in the US after appearing before a US grand jury. A US citizen, he had been bin Laden’s personal secretary. He will later be convicted for a role in the 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998). [New York Times, 9/18/1998]

Entity Tags: Wadih El-Hage

Timeline Tags: Complete 911 Timeline

Mamdouh Mahmud Salim.Mamdouh Mahmud Salim. [Source: FBI]Mamdouh Mahmud Salim (a.k.a. Abu Hajer), an al-Qaeda operative from the United Arab Emirates connected to the 1998 East African embassy bombings (see 10:35-10:39 a.m., August 7, 1998), is arrested at a used car dealership near Munich, Germany. He is arrested by a special commando unit of German police, with CIA agents directing them nearby. The German government has no idea who Salim is, and the US only notified Germany about the planned arrest five hours in advance. [PBS, 9/30/1998; Der Spiegel (Hamburg), 12/12/2005] The 9/11 Congressional Inquiry will later say that Salim was Osama bin Laden’s “right hand man,” and “head of bin Laden’s computer operations and weapons procurement.” He is also “the most senior-level bin Laden operative arrested” up until this time. [New York Times, 9/29/2001; US Congress, 7/24/2003, pp. 51 pdf file] Author Lawrence Wright will later note that bin Laden and Salim worked together in Afghanistan in the 1980s, “forging such powerful bonds that no one could get between them.” Salim was also one of the founding members of al-Qaeda (see August 11-20, 1988) and bin Laden’s personal imam (i.e., preacher). [Wright, 2006, pp. 131, 170] Starting in 1995, Salim had been making frequent visits to Germany. Mamoun Darkazanli, who lives in Hamburg and associates with Mohamed Atta’s al-Qaeda cell, had signing powers over Salim’s bank account. Both men attended Al-Quds mosque, the same Hamburg mosque as future 9/11 hijackers Atta and Marwan al-Shehhi attend. [Vanity Fair, 1/2002] The FBI learns much from Salim about al-Qaeda, and this information could be useful to the US embassy bombings investigation. However, the FBI is unwilling to brief its German counterparts on what it knows about Salim and al-Qaeda. [New York Times, 9/29/2001]

Entity Tags: Osama bin Laden, Mamdouh Mahmud Salim, Al-Qaeda

Timeline Tags: Complete 911 Timeline

Khalid al-Fawwaz, Osama bin Laden’s de facto press secretary, is arrested in London on September 23, 1998. He is arrested with six other suspects, presumably including Ibrahim Eidarous and Adel Abdel Bary. The three of them effectively run the Advice and Reformation Committee (ARC), a bin Laden front in London. Al-Fawwaz is arrested again on September 27 at the request of the US, which issues an extradition warrant for him the same day. On July 12, 1999, Eidarous and Bary are arrested again, as the US issues extradition warrants for them as well. All three are charged in the US for roles in the 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). Apparently, none of them are released before being arrested on the new charges (see July 12, 1999). Presumably, the other three who were originally arrested are released. [New York Times, 9/29/1998; New York Times, 7/13/1999] It is not clear why the three were not arrested earlier, or why they were not charged in Britain. They had been monitored in London for years. Bin Laden called them over 200 hundred times from 1996 to 1998, and they are alleged to have been involved in many plots (see Early 1994-September 23, 1998). For instance, the three received a fax from al-Qaeda operatives taking credit for the embassy bombings hours before the bombings actually took place and passed it on to media outlets (see July 29-August 7, 1998). In 1996, the US requested that Britain should arrest al-Fawwaz, Eidarous, and Bary, but the British decided there wasn’t enough evidence. [Soufan, 2011, pp. 98]

Entity Tags: Ibrahim Eidarous, Adel Abdel Bary, Advice and Reformation Committee, Khalid al-Fawwaz

Timeline Tags: Complete 911 Timeline


Mark Flessner.
Mark Flessner. Two months after the US embassy bombings in Africa (see 10:35-10:39 a.m., August 7, 1998), FBI agent Robert Wright and his Vulgar Betrayal investigation discover evidence they think ties Saudi multimillionaire Yassin al-Qadi to the bombings. Since 1997, Wright had been investigating a suspected terrorist cell in Chicago that was connected to fundraising for Hamas. They discovered what they considered to be clear proof that al-Qadi and other people they were already investigating had helped fund the embassy bombings. Wright asks FBI headquarters for permission to open an investigation into this money trail at this time, but the permission is not granted. Wright will later recall, “The supervisor who was there from headquarters was right straight across from me and started yelling at me: ‘You will not open criminal investigations. I forbid any of you. You will not open criminal investigations against any of these intelligence subjects.’” Instead, they are told to merely follow the suspects and file reports, but make no arrests. Federal prosecutor Mark Flessner, working with the Vulgar Betrayal investigation, later will claim that a strong criminal case was building against al-Qadi and his associates. “There were powers bigger than I was in the Justice Department and within the FBI that simply were not going to let [the building of a criminal case] happen. And it didn’t happen.… I think there were very serious mistakes made. And I think, it perhaps cost, it cost people their lives ultimately.” [ABC News, 12/19/2002] Flessner later will speculate that Saudi influence may have played a role. ABC News will report in 2002, “According to US officials, al-Qadi [has] close personal and business connections with the Saudi royal family.” [ABC News, 11/26/2002] Wright later will allege that FBI headquarters even attempted to shut down the Vulgar Betrayal investigation altogether at this time. He says, “They wanted to kill it.” [ABC News, 12/19/2002] However, he will claim, “Fortunately an assistant special agent in Chicago interceded to prevent FBI headquarters from closing Operation Vulgar Betrayal.” [Federal News Service, 6/2/2003] He claims that a new supervisor will write in late 1998, “Agent Wright has spearheaded this effort despite embarrassing lack of investigative resources available to the case, such as computers, financial analysis software, and a team of financial analysts. Although far from being concluded, the success of this investigation so far has been entirely due to the foresight and perseverance of Agent Wright.” [Federal News Service, 5/30/2002] When the story of this interference in the alleged al-Qadi-embassy bombings connection will be reported in late 2002, Wright will conclude, “September the 11th is a direct result of the incompetence of the FBI’s International Terrorism Unit. No doubt about that. Absolutely no doubt about that. You can’t know the things I know and not go public.” He will remain prohibited from telling all he knows, merely hinting, “There’s so much more. God, there’s so much more. A lot more.” [ABC News, 12/19/2002]

Entity Tags: Yassin al-Qadi, Hamas, US Department of Justice, International Terrorism Unit, Mark Flessner, Robert G. Wright, Jr., Al-Qaeda, Federal Bureau of Investigation, Vulgar Betrayal

Timeline Tags: Complete 911 Timeline

After the Taliban is warned that bin Laden has been accused of involvement in the recent 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998), it initiates judicial proceedings against him. But when the US fails to provide Afghanistan’s supreme court with sufficient evidence, bin Laden is acquitted. [Associated Press, 11/20/1998] The Taliban has already received some claims regarding bin Laden’s involvement in terrorism from the US (see August 23, 1998), but these are insufficient and more evidence is requested. Originally, there is no cut-off date for supplying evidence, but when the US does nothing, the Taliban leaders become frustrated and announce a time limit on the inquiry: “If anyone has any evidence of bin Laden’s involvement in cases of terrorism, subversion, sabotage, or any other acts, they should get it to the court before November 20. If by then there is nothing, we will close the case and in our eyes he will be acquitted.” In a November 10 cable the US embassy in Pakistan, which also handles Afghan affairs, comments: “The Taliban appear to many observers not to be totally unreasonable in their demand that the US provide them evidence on bin Laden.” [US Embassy (Islamabad), 11/10/1998 pdf file] The US then sends the Taliban a video of an interview bin Laden gave CNN in 1997, a transcript of his ABC 1998 interview, and a copy of his US indictment for the embassy bombings. [US Department of State, 11/11/1998 pdf file] The inquiry is headed by the country’s chief justice, Noor Mohamed Saqib. After the evidence is found not to be enough and bin Laden is set free, Saqib comments: “It is their shame that they have been silent. America is wrong about bin Laden… Anything that happens now anywhere in the world they blame Osama, but the reality is in the proof and they have not given us any. It’s over and America has not presented any evidence. Without any evidence, bin Laden is a man without sin… he is a free man.” [Associated Press, 11/20/1998] However, the State Department says that it did not “endorse, support, or request” the sharia court trial, but simply wanted bin Laden extradited. A White House spokesperson says, “Without commenting on the rigor of the Taliban judicial system, it is clear that Mr. bin Laden is a proven threat to US national interests.” [US Department of State, 11/11/1998 pdf file; Associated Press, 11/20/1998] The Taliban’s leadership is not satisfied with the outcome of the trial and will subsequently ask the US for help in getting rid of bin Laden (see November 28, 1998).

Entity Tags: US Embassy in Islamabad, US Department of State, Taliban, Noor Mohamed Saqib, Osama bin Laden, Supreme Court of Afghanistan

Timeline Tags: Complete 911 Timeline

Princess Diana at a mine field in Angola in 1997.Princess Diana at a mine field in Angola in 1997. [Source: Tim Graham / Corbis]The NSA admits that US intelligence agencies possess 1,056 pages of classified information regarding Britain’s Princess Diana. British tabloids portray the documents as rife with salacious information on Diana’s “most intimate love secrets” about her relationship with Egyptian billionaire Dodi al-Fayed, but the actual documentation may not be so lurid. The NSA recently denied a Freedom of Information request from the Internet news service APB Online about information it has collected on Diana, who died in a tragic car accident in 1997. (It is unclear whether US intelligence has any unreleased information about the circumstances of Diana’s death. [APB Online, 11/30/1998; Washington Post, 12/12/1998] The NSA has denied monitoring Diana on the night of her death, an allegation raised by The Observer in 2006.) [MSNBC, 12/11/2006] In the two-page letter denying the request, the NSA admits to possessing a “Diana file,” but refuses to divulge what is in that file. A US intelligence official says the information is made up of conversations between other people who mentioned Diana; the references to Diana in those intercepted conversations are “incidental.” The official says Diana was never a particular target of the NSA’s Echelon surveillance program. However, the NSA has classified 124 pages of the “Diana documents” as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security.” According to a recent report by the European Parliament, the NSA routinely monitors virtually “all e-mail, telephone and fax communications… within Europe” (see July 11, 2001). Intelligence expert Steven Aftergood of the Federation of American Scientists says “the US and our allies promiscuously collect electronic communications around the world. Whether the descriptions of Echelon are accurate or not, that much is definitely true.” Some believe that lurid snippets of information leaked to the British press regarding Diana’s affair with Fayed, and her ambivalent relationship with Prince Charles, may have come from Echelon wiretaps and surveillance. Another FAS scientist, John Pike, says the NSA and other US intelligence agencies may have been monitoring Diana to protect her from terrorist attacks. Pike says it is also possible she may have been monitored because of her involvement in banning land mines, a position opposed by the Pentagon. [APB Online, 11/30/1998; Washington Post, 12/12/1998] Former NSA official Wayne Madsen will say in 2000, “[W]hen NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?” [CBS News, 2/27/2000] In August 1999, the NSA will deny another Freedom of Information request about its “Diana file” from the British newspaper The Guardian. [Guardian, 8/6/1999]

Entity Tags: Steven Aftergood, Prince Charles, The Guardian, John Pike, Dodi al-Fayed, Echelon, Federation of American Scientists (FAS), National Security Agency, Princess Diana

Timeline Tags: Civil Liberties

William Wechsler.William Wechsler. [Source: CAP]Shortly after the US embassy bombings in 1998 (see 10:35-10:39 a.m., August 7, 1998), the US launches a new interagency effort to track bin Laden’s finances. There had been a previous interagency effort in 1995 but it had fizzled (see October 21, 1995). Counterterrorism “tsar” Richard Clarke sets up a task force. He orders it to find out how much money bin Laden has, where it comes from, how it is distributed, and to stop it. Clarke appoints William Wechsler, a National Security Council staff member, to head the task force. The task force begins an investigation of bin Laden’s finances (see Late 1998). Clarke later writes that he and Wechsler “quickly [come] to the conclusion that the [US government] departments [are] generally doing a lousy job of tracking and disrupting international criminals’ financial networks and had done little or nothing against terrorist financing.” [New York Times, 9/20/2001; Clarke, 2004, pp. 190-191] Clarke will later claim there was only limited effort from within the US government to fight bin Laden’s financial network. He will assert that within weeks of setting up the interagency effort, it was determined that only one person in the US government, a lowly Treasury Department official, appeared to have any expertise about the hawala system, an informal and paperless money transfer system used by al-Qaeda that is popular with Muslim populations worldwide (see 1993-September 11, 2001). Clarke will later write that the “CIA knew little about the [hawala] system, but set about learning. FBI knew even less, and set about doing nothing.” The FBI claims there are no hawalas in the US, but Wechsler finds several in New York City using a simple Internet search. Clarke will say, “Despite our repeated requests over the following years, nobody from the FBI ever could answer even our most basic questions about the number, location, and activities of major hawalas in the US—much less taken action.” The efforts of other departments are not much better. The one Treasury official with some expertise about hawalas is eventually let go before 9/11. [Clarke, 2004, pp. 192-193] Efforts to pressure governments overseas also meet with little success (see August 20, 1998-1999).

Entity Tags: William Wechsler, Richard A. Clarke, Federal Bureau of Investigation, Osama bin Laden, Al-Qaeda, Central Intelligence Agency, US Department of the Treasury

Timeline Tags: Complete 911 Timeline

In an interview for Time magazine held on this date, Osama bin Laden is asked whether he was responsible for the August 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). He replies, “If the instigation for jihad against the Jews and the Americans in order to liberate [Islamic shrines in Mecca and Medina] is considered a crime, then let history be a witness that I am a criminal. Our job is to instigate and, by the grace of God, we did that—and certain people responded to this instigation.… I am confident that Muslims will be able to end the legend of the so-called superpower that is America.” He admits knowing certain people accused of being behind the bombing, such as Wadih El-Hage and Mamdouh Mahmud Salim, but denies they had any connection to the bombings. [Time, 1/11/1999; Globe and Mail, 10/5/2001]

Entity Tags: Osama bin Laden, Wadih El-Hage, Mamdouh Mahmud Salim

Timeline Tags: Complete 911 Timeline

During the investigation of the August 7, 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998), FBI counterterrorism expert John O’Neill finds a memo by al-Qaeda leader Mohammed Atef on a computer. The memo shows that bin Laden’s group has a keen interest in and detailed knowledge of negotiations between the Taliban and the US over an oil and gas pipeline through Afghanistan. Atef’s analysis suggests that the Taliban are not sincere in wanting a pipeline, but are dragging out negotiations to keep Western powers at bay. [Salon, 6/5/2002]

Entity Tags: Mohammed Atef, United States, Taliban, John O’Neill, Al-Qaeda

Timeline Tags: Complete 911 Timeline

Richard Barlow, a former intelligence analyst who was repeatedly fired for correctly claiming that Pakistan had a nuclear weapons program (see 1981-1982, August 1987-1988 and August 4, 1989), is awarded a total of $1 million by President Bill Clinton in compensation for the treatment he received. However, Barlow does not receive the money, as the settlement has to be ratified by Congress. When it runs into procedural problems, it is moved to the Court of Federal Claims to be reviewed. After Clinton is replaced by George W. Bush, CIA Director George Tenet and NSA Director Michael Hayden assert the government’s “state secrets privilege” (see March 9, 1953) over Barlow’s entire legal claim, causing it to collapse due to lack of evidence. [Guardian, 10/13/2007]

Entity Tags: William Jefferson (“Bill”) Clinton, Richard Barlow, National Security Agency, Michael Hayden, Court of Federal Claims, Central Intelligence Agency, George J. Tenet

Timeline Tags: A. Q. Khan's Nuclear Network

Hashim Salamat.Hashim Salamat. [Source: BBC]Western intelligence monitors a series of phone calls in which bin Laden asks the leader of a Philippine militant group to set up more training camps that al-Qaeda can use. Bin Laden is said to call Hashim Salamat, the leader of Moro Islamic Liberation Front (MILF). There are reports that al-Qaeda started funding and using MILF training camps in 1995. But apparently bin Laden successfully asks for more camps because the movement of militants into Afghanistan has grown increasingly difficult since the African embassy bombings in 1998 (see 10:35-10:39 a.m., August 7, 1998). [CNS News, 9/19/2002; CNN, 10/28/2002; Asia Times, 10/30/2003] The same month, Salamat claims in a BBC interview that the MILF has received money from bin Laden, but says that it has only been for humanitarian purposes. [New York Times, 2/11/1999; Asia Times, 10/30/2003]

Entity Tags: Osama bin Laden, Hashim Salamat, Moro Islamic Liberation Front

Timeline Tags: Complete 911 Timeline

President Clinton orders the US Air Force to participate in a NATO bombing campaign in Kosovo. The campaign lasts for 79 days, and constitutes the first time since the War Powers Resolution became law in 1974 that any president has deployed US forces into overseas combat for over 60 days without Congressional authorization. Clinton’s legal advisers argue that Clinton has all the authority he needs to continue the air war because on May 22 Congress passes an emergency spending bill to fund the Kosovo war, just days before the 60-day clock runs out. The War Powers Resolution explicitly forbids appropriations to count as authorization, so Clinton’s legal ground is shaky. In 2007, author and reporter Charlie Savage will note the unusual role reversal in Washington—Democrats, who had insisted that Republican presidents obey the War Powers Resolution, now stand by Clinton (or at least offer no overt criticism), and Republicans, who had argued that Congress had no right to challenge a president’s authority to conduct a war as he sees fit, now challenge Clinton’s authority under the selfsame War Powers Resolution they have previously criticized. The Congressional debate ends inconclusively when the air campaign ends. [Savage, 2007, pp. 65-66]

Entity Tags: William Jefferson (“Bill”) Clinton, Charlie Savage

Timeline Tags: Civil Liberties

A 2005 US indictment will reveal that two employees for a pro-Israeli lobbying group had somehow obtained classified US information about al-Qaeda and was passing it on to Israeli officials. The two employees are Steven Rosen and Keith Weissman; both work for AIPAC (American Israel Public Affairs Committee) until 2004. On April 13, 1999, Rosen gives Rafi Barak, the former deputy chief of mission at the Israeli embassy in Washington, what he calls a codeword-protected “extremely sensitive piece of intelligence” about terrorist activities in Central Asia. On June 11, 1999, Weissman tells Barak about a classified FBI report on the 1996 Khobar Towers bombing, which has been blamed on al-Qaeda and/or Iran (see June 25, 1996). In retrospect, FBI officials will determine that some, but not all, of this classified information comes from Larry Franklin, a Defense Department analyst on Iran known to be in favor of a tougher US policy regarding Iran (see 2000-2001). It is not known how or why US surveillance of Rosen and Weissman began. [National Public Radio, 8/4/2005; Eastern District of Virginia, 8/4/2005 pdf file; Jerusalem Post, 8/15/2005; Jerusalem Post, 8/17/2005]
Connection to Earlier Investigation? - However, there may be a connection to an earlier investigation. In 1997 and 1998, the FBI monitored Naor Gilon, an official at the Israeli embassy in Washington, as part of an investigation into whether a US intelligence official was illegally giving US spy plane film and other secret material to the Mossad. [Los Angeles Times, 9/3/2004]
Accusations Spark Further Investigation - The US will later accuse Rosen and Weissman of passing classified information given to them by Franklin to Gilon. In any case, the investigation will continue and grow. National Public Radio will later note that from 1999 to 2004, “Franklin, Rosen, and Weissman had regular discussions about the Middle East and about al-Qaeda with a variety of contacts,” sometimes illegally sharing highly classified information. Franklin will plead guilty to sharing classified information in 2005 (see October 5, 2005) while Rosen and Weissman are expected to be tried in 2007 or thereafter. [National Public Radio, 8/4/2005]

Entity Tags: Rafi Barak, Naor Gilon, Keith Weissman, Larry Franklin, American Israel Public Affairs Committee, Steven Rosen

Timeline Tags: Complete 911 Timeline

A large group of Islamic Jihad operatives are sentenced in Cairo in what becomes known as the “Trial of the Albanian Returnees.” Various disclosures are made at the trial about the way Islamic Jihad operated and how it provided support to al-Qaeda by forging travel documents, transferring money, and arranging communications. One of the revelations is that al-Qaeda has a key communication hub in Yemen. Despite this revelation (see Late 1998-Early 2002), al-Qaeda will continue to use it through 2001 (see Early 2000-Summer 2001). The defendants were arrested not only in Egypt, but also in Albania, Bulgaria, Azerbaijan, and the United Arab Emirates. In 1995, the CIA arranged a deal with Egypt to capture Islamic Jihad operatives around the world and send them to Egypt to be tortured and prosecuted (see Summer 1995). Eighty-seven of the defendants are convicted and ten are sentenced to death, including al-Zawahiri, who is tried in absentia. [New York Times, 11/21/2001] One of the convicted is Khaled Abu el-Dahab, who was operating a sleeper cell in California with double agent Ali Mohamed throughout the 1990’s (see 1987-1998). El-Dahab is sentenced to fifteen years in prison (see September 10, 1998). There are credible reports that many of the defendants confessed after being tortured in Egypt and Albania. [New York Times, 11/21/2001; Wright, 2006, pp. 269] The trial nearly eradicates the remnants of Islamic Jihad in Egypt and, according to some of the defendants, leaves only about forty members outside of Egypt. Al-Zawahiri and the other remaining members end up allying even closer to al-Qaeda. The two organizations will formally merge in early 2001 (see June 2001). [Wright, 2006, pp. 336]

Entity Tags: Ayman al-Zawahiri, Khaled Abu el-Dahab, Islamic Jihad, Egypt, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The FBI is told that three arrested Islamist militants working for Osama bin Laden are about to be released from prison in the UK. But the FBI works quickly and prevents their release. Khalid al-Fawwaz, Ibrahim Eidarous, and Adel Abdel Bary had been arrested in London on September 23, 1998, not long after the US embassy bombings in Africa (see 10:35-10:39 a.m., August 7, 1998). Al-Fawwaz is an al-Qaeda operative while Eidarous and Bary are Islamic Jihad operatives, but all three of them ran the Advice and Reformation Committee (ARC), a bin Laden front in London (see September 23, 1998-July 12, 1999). The three of them had been arrested for a role in the embassy bombings, but in July 1999, a British judge says there is not enough evidence to keep them imprisoned. FBI agents Ali Soufan, Dan Coleman, Jack Cloonan, and US attorneys Patrick Fitzgerald and Ken Karas work quickly and put together a request to have the three men extradited to the US to stand trial there. (The US already had requested al-Fawwaz’s extradition shortly after his arrest in September (see September 23, 1998-July 12, 1999).) As a result, the three men are rearrested on July 12, 1999, apparently without ever being released, and a long battle to extradite them begins. [New York Times, 7/13/1999; Soufan, 2011, pp. 97-104]

Entity Tags: Ibrahim Eidarous, Advice and Reformation Committee, Adel Abdel Bary, Ali Soufan, Federal Bureau of Investigation, Ken Karas, Dan Coleman, Patrick J. Fitzgerald, Khalid al-Fawwaz, Jack Cloonan

Timeline Tags: Complete 911 Timeline

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

From left to right: Mokhtar Haouari, Abdelmajid Dahoumane, Abdel Ghani Meskini. The picture of Meskini is from an ATM camera.From left to right: Mokhtar Haouari, Abdelmajid Dahoumane, Abdel Ghani Meskini. The picture of Meskini is from an ATM camera. [Source: Public domain, public domain, and Seattle Times]In the wake of the arrest of Ahmed Ressam (see December 14, 1999), FBI investigators work frantically to uncover more millennium plots before the end of the year. US authorities also make a number of arrests.
bullet A telephone number found in Ressam’s pocket leads to Abdel Ghani Meskini, an Algerian living in New York City who had gone to Seattle to meet Ressam. Meskini is monitored and arrested in New York on December 30.
bullet One of Ressam’s credit cards leads to the arrest of Mokhtar Haouari, an Algerian living in Montreal, Canada. Meskini later cooperates with US investigators and is never charged, while Haouari will be sentenced to 24 years in prison. [Time, 2/7/2000; CNN, 1/16/2002; Wright, 2006, pp. 298]
bullet Another Algerian associate of Ressam’s, Abdelmajid Dahoumane, escapes to Afghanistan, but will eventually be caught by the Algerian government and convicted in Algeria. [PBS Frontline, 10/25/2001]
bullet Investigators believe that Mohamedou Ould Slahi, an al-Qaeda operative whose cousin is a top al-Qaeda leader, went to Canada to give the go-ahead for Ressam’s attack. Slahi is arrested several times overseas, but never charged (see January-April 2000). [CNN, 3/6/2002]
bullet Khalid Deek, a US citizen, is arrested around this time for masterminding another al-Qaeda millennnium plot (see December 11, 1999). But counterterrorism expert Rita Katz will later say Deek was a suspected mastermind of Ressam’s Los Angeles airport plot, too. [Orange County Register, 9/12/2005] Deek’s name and phone number is found in Ressam’s telephone book. Ressam knew Deek from bin Laden training camps in Afghanistan. Both of them, like most of Ressam’s group, have links to the GIA, an Algerian militant group associated with al-Qaeda. [Newsweek (International), 3/13/2000]
Others escape the US after hearing media reports of Ressam’s arrest. However, enough people are caught to stop additional millennium attacks. Counterterrorism “tsar” Richard Clarke later says, “I think a lot of the FBI leadership for the first time realized that… there probably were al-Qaeda people in the United States. They realized that only after they looked at the results of the investigation of the millennium bombing plot.” [PBS Frontline, 10/3/2002] Yet Clinton’s National Security Adviser Sandy Berger later claims that the FBI will still repeatedly assure the Clinton White House until Clinton leaves office that al-Qaeda lacks the ability to launch a domestic strike (see 2000).

Entity Tags: Mohamedou Ould Slahi, Sandy Berger, Khalil Deek, Mokhtar Haouari, Groupe Islamique Armé, Abdel Ghani Meskini, Al-Qaeda, Federal Bureau of Investigation, Richard A. Clarke, Ahmed Ressam

Timeline Tags: Complete 911 Timeline

The NSA, monitoring a telephone in an al-Qaeda communications hub in Yemen (see Late August 1998 and Late 1998-Early 2002), has listened in on phone calls revealing that hijackers Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi are to attend an important al-Qaeda summit in Malaysia in January 2000 (see Shortly Before December 29, 1999). Almihdhar’s full name was mentioned, as well as the first names of hijackers Nawaf Alhazmi and Salem Alhazmi. On this day, the NSA shares this information with the CIA’s Alec Station bin Laden unit. Other US intelligence agencies, including FBI headquarters and the FBI’s New York field office, are told as well. Although Khalid Almihdhar’s full name was mentioned in one call, the NSA only passes on his first name. Also, the NSA has already learned from monitoring the Yemen hub that Nawaf’s last name is Alhazmi and that he is long-time friends with Almihdhar (see Early 1999). However, they either don’t look this up in their records or don’t pass it on to any other agency. [9/11 Commission, 1/26/2004, pp. 6 pdf file; US Department of Justice, 11/2004, pp. 239 pdf file; Wright, 2006, pp. 310] An NSA analyst makes a comment that is shared between US intelligence agencies, “Salem may be Nawaf’s younger brother.” This turns out to be correct. [US Congress, 7/24/2003, pp. 135 pdf file; 9/11 Commission, 1/26/2004, pp. 6 pdf file] A CIA officer will later tell the 9/11 Congressional Inquiry that information from the Africa embassy bombings (see 10:35-10:39 a.m., August 7, 1998) was reviewed in late 1999 during a worldwide effort to disrupt millennium attack plots (see December 15-31, 1999) and “a kind of tuning fork… buzzed when two [of the hijackers] reportedly planning a trip to [Malaysia] were linked indirectly to what appeared to be a support element… involved with the Africa bombers.” [US Congress, 7/24/2003, pp. 135 pdf file] The fact that they are connected to the Yemen communication hub already indicates some importance within al-Qaeda. It is learned they are connected to the embassy bombings in some way (see October 4, 2001 and Late 1999). [US Congress, 7/24/2003, pp. 135 pdf file; 9/11 Commission, 1/26/2004, pp. 6 pdf file] The NSA report about them on this day is entitled, “Activities of Bin Laden Associates,” showing the clear knowledge of their ties to bin Laden. [9/11 Commission, 7/24/2004, pp. 502; Vanity Fair, 11/2004] The CIA will track Almihdhar and Nawaf Alhazmi to the Malaysia summit (see January 2-5, 2000 and January 5-8, 2000).

Entity Tags: Salem Alhazmi, Federal Bureau of Investigation, FBI New York Field Office, Khalid Almihdhar, FBI Headquarters, Al-Qaeda, Alec Station, Central Intelligence Agency, Ahmed al-Hada, National Security Agency, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A screenshot of Site Profiler.A screenshot of Site Profiler. [Source: Digital Sandbox, Inc.]A software system commissioned by the Department of Defense determines that the Pentagon is vulnerable to a terrorist attack. The software, called Site Profiler, is being developed by Digital Sandbox, a company based in Reston, Virginia. [Guardian, 3/20/2003; Devlin, 2008, pp. 150; Pourret, Naim, and Marcot, 2008, pp. 253] Work on it began in response to the bombings of the Khobar Towers in Saudi Arabia in June 1996 (see June 25, 1996), and the US embassies in Kenya and Tanzania in August 1998 (see 10:35-10:39 a.m., August 7, 1998). [Digital Sandbox, Inc., 2000 pdf file; Jha and Keele, 2012, pp. 40 pdf file] Site Profiler is designed to provide site commanders with tools to assess terrorism risks, so they can develop appropriate countermeasures. It works by combining different data sources so as to draw inferences about the risk of terrorism. At some unspecified time in 2000, its developers hold sessions for expert review of the software. In these sessions, various experts suggest hypothetical threat scenarios. These scenarios are analyzed and the results are then presented to the experts. Due to time constraints, the initial evaluation focuses on scenarios the experts consider exceptional. One scenario that is evaluated involves a terrorist attack on the Pentagon using a mortar shot from the Potomac River. This scenario, the software’s developers will later write, is “intended to represent an exceptional case to stretch the limits of the model, rather than as a realistic scenario that might reasonably be expected to occur.” All the same, the results of the evaluation indicate “that the Pentagon [is] vulnerable to terrorist attack.” “In other words,” popular science writer Keith Devlin will comment, “the Pentagon was a prime terrorist target.” Devlin will write: “As we learned to our horror just a few months later, the Pentagon was one of the sites hit in the September 11 attack on the United States. Unfortunately, though understandably, neither the military command nor the US government had taken seriously Site Profiler’s prediction that the Pentagon was in danger from a terrorist attack.” Site Profiler will be delivered to all US military installations around the world in May 2001. [Devlin, 2008, pp. 150-151; Pourret, Naim, and Marcot, 2008, pp. 253]

Entity Tags: Pentagon, Digital Sandbox, Inc.

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Attendees of the Malaysian summit. Top row, from left: Nawaf Alhazmi, Khalid Almihdhar, Khalid Shaikh Mohammed. Middle row, from left: Khallad bin Attash, Abd al-Rahim al-Nashiri, Hambali. Bottom row, from left: Yazid Sufaat, Ramzi bin al-Shibh, Abu Bara al-Taizi. Attendees of the Malaysian summit. Top row, from left: Nawaf Alhazmi, Khalid Almihdhar, Khalid Shaikh Mohammed. Middle row, from left: Khallad bin Attash, Abd al-Rahim al-Nashiri, Hambali. Bottom row, from left: Yazid Sufaat, Ramzi bin al-Shibh, Abu Bara al-Taizi. [Source: FBI]About a dozen of Osama bin Laden’s trusted followers hold a secret, “top-level al-Qaeda summit” in the city of Kuala Lumpur, Malaysia. [CNN, 8/30/2002; San Diego Union-Tribune, 9/27/2002] According to an unnamed senior CIA official, before the summit started, the CIA learned that “11 young guys” were going to attend, and “young guys” is slang for operatives traveling. [Bamford, 2008, pp. 18] Plans for the October 2000 bombing of the USS Cole (see October 12, 2000) and the 9/11 attacks are discussed. [USA Today, 2/12/2002; CNN, 8/30/2002] At the request of the CIA, the Malaysian Secret Service monitors the summit and then passes the information on to the US (see January 5-8, 2000 and Shortly After). Attendees of the summit are said to include:
Nawaf Alhazmi and Khalid Almihdhar - The CIA and FBI will later miss many opportunities to foil the 9/11 plot through Alhazmi and Almihdhar and the knowledge of their presence at this summit. The CIA already knows many details about these two by the time the summit begins (see January 2-4, 2000), and tracked Almihdhar as he traveled to it (see January 2-5, 2000).
Yazid Sufaat - Sufaat is a Malaysian who owns the condominium where the summit is held. He is also a trained biologist and is said to be a leading figure in al-Qaeda’s attempts to get a biological or chemical weapon. [New York Times, 1/31/2002; Newsweek, 6/2/2002] Malaysian officials also recognize Sufaat from summit surveillance photos, as he is a long-time Malaysian resident (see Shortly After January 8, 2000). [New Straits Times, 2/10/2002] A possibility to expose the 9/11 plot through Sufaat’s presence at this summit will later be missed in September 2000 (see September-October 2000). Sufaat will travel to Afghanistan in June 2001 and be arrested by Malaysian authorities when he returns to Malaysia in late 2001 (see December 19, 2001). [Australian, 12/24/2002] He will be released in 2008 (see December 4, 2008).
Hambali - An Indonesian militant known as Hambali, or Nurjaman Riduan Isamuddin [BBC, 8/15/2003] , was heavily involved in the Bojinka plot, an early version of the 9/11 plot (see January 6, 1995 and June 1994). [CNN, 3/14/2002; CNN, 8/30/2002] The FBI was aware of who he was and his connections to the Bojinka plot at least by 1999 and identified a photograph of him by that time (see May 23, 1999). He will be arrested by Thai authorities in August 2003 (see August 12, 2003). [CNN, 8/14/2003; CBS News, 8/15/2003] Malaysian officials recognize Hambali from summit surveillance photos, as he is a long-time Malaysian resident. But the US does not tell them of his Bojinka connections, so they will not know to arrest him after the summit is over (see Shortly After January 8, 2000). [New Straits Times, 2/10/2002]
Khalid Shaikh Mohammed - Mohammed is sometimes referred to as “KSM,” an al-Qaeda leader and the alleged “mastermind” of the 9/11 attacks. The US has known KSM is an Islamic militant since the exposure of Operation Bojinka in January 1995 (see January 6, 1995), and knows what he looks like. US officials will state that they only realized the summit was important in 2001, but the presence of KSM should have proved its importance. [Los Angeles Times, 2/2/2002] Although the possible presence of KSM at this summit will be disputed by US officials, one counterterrorism expert will testify before the 9/11 Commission in 2003 that he has access to transcripts of KSM’s interrogations since his capture, and that KSM has admitted leading this summit and telling the attendees about a planes-as-weapons plot targeting the US (see July 9, 2003). [Newsweek, 7/9/2003; New York Post, 7/10/2003] Many other media reports will identify him as being there. [Independent, 6/6/2002; CNN, 8/30/2002; CNN, 11/7/2002; Canadian Broadcasting Corporation, 10/29/2003] For instance, according to Newsweek: “Mohammed’s presence would make the intelligence failure of the CIA even greater. It would mean the agency literally watched as the 9/11 scheme was hatched—and had photographs of the attack’s mastermind… doing the plotting.” [Newsweek, 7/9/2003] In Hambali’s 2008 Guantanamo file, it will be mentioned that KSM stays a week at Sufaat’s condominium with Alhazmi and Almihdhar, which would seem to make clear that KSM is there for the entire duration of the summit (see Early January 2000). [US Department of Defense, 10/30/2008]
Khallad bin Attash - Khallad bin Attash, a “trusted member of bin Laden’s inner circle,” is in charge of bin Laden’s bodyguards, and serves as bin Laden’s personal intermediary at least for the USS Cole bombing. [Newsweek, 9/20/2001 pdf file] He is also thought to be a “mastermind” of that attack. Attash is reportedly planning to be one of the 9/11 hijackers, but will be unable to get a US visa. [9/11 Commission, 6/16/2004, pp. 8] US intelligence had been aware of his identity as early as 1995. [US Congress, 9/18/2002] A possibility to expose the 9/11 plot through bin Attash’s presence at this summit will be missed in January 2001 (see January 4, 2001). Bin Attash had been previously arrested in Yemen for suspected terror ties, but was let go (see Summer 1999). [Contemporary Southeast Asia, 12/1/2002] He will be captured in Pakistan by the US in April 2003 (see April 29, 2003). In 2008, Newsweek will report that bin Attash confessed during interrogation that, while staying at Sufaat’s condominium, he and Alhazmi talked “about the possibility of hijacking planes and crashing them or holding passengers as hostages.” [Newsweek, 12/16/2008]
Abd al-Rahim al-Nashiri - Al-Nashiri is one of al-Qaeda’s top field commanders and operates out of Malaysia while 9/11 is being prepared. [Los Angeles Times, 10/10/2001; Gunaratna, 2003, pp. 188; Graham and Nussbaum, 2004, pp. 59] He was involved in an arms smuggling plot (see 1997) and the East African embassy bombings (see August 22-25 1998), in which his cousin was martyred (see 10:35-10:39 a.m., August 7, 1998). He also organized the attack against the USS The Sullivans (see January 3, 2000), and will be involved in the attacks against the USS Cole (see October 12, 2000) and the Limburg (see October 6, 2002). He will be arrested in the United Arab Emirates in November 2002 (see Early October 2002). An al-Qaeda operative identified a photo of al-Nashiri for the FBI in late 1998 (see August 22-25 1998). [9/11 Commission, 7/24/2004, pp. 152-3] (Note: in the sources, al-Nashiri is referred to by two of his aliases: Muhammad Omar al-Harazi and Al Safani.) [CNN, 12/11/2000; Central Intelligence Agency, 9/6/2006]
Ramzi bin al-Shibh - Investigators believe he wants to be the 20th 9/11 hijacker. His presence at the summit may not be realized until after 9/11, despite the fact that US intelligence has a picture of him next to bin Attash, and has video footage of him. [Newsweek, 11/26/2001; Washington Post, 7/14/2002; Time, 9/15/2002; Die Zeit (Hamburg), 10/1/2002; CNN, 11/7/2002] German police will have credit card receipts indicating bin al-Shibh is in Malaysia at this time. [Los Angeles Times, 9/1/2002] Ulrich Kersten, director of Germany’s federal anticrime agency, the Bundeskriminalamt, will later say, “There are indications that Ramzi bin al-Shibh was in Kuala Lumpur for the meeting.” [New York Times, 8/24/2002] Another account noting he was photographed at the summit will further note that he enters and leaves Thailand three times in the first three weeks of January 2000. [Los Angeles Times, 10/17/2001] Anonymous Malaysian officials will later claim he is at the summit, but US officials will deny it. Two local militants who serve as drivers for the attendees will later be arrested in Malaysia. They will be shown photos of the attendees, and confirm that bin al-Shibh was at the summit. [Associated Press, 9/20/2002] One account will say he is recognized at the time of the summit, which makes it hard to understand why he is not tracked back to Germany and the Hamburg cell with Mohamed Atta and other 9/11 hijackers. [Der Spiegel (Hamburg), 10/1/2002] Another opportunity to expose the 9/11 plot through bin al-Shibh’s presence at this summit will be missed in June. It appears bin al-Shibh and Almihdhar are directly involved in the attack on the USS Cole in October 2000 (see October 10-21, 2000). [Guardian, 10/15/2001; Washington Post, 7/14/2002; Newsweek, 9/4/2002]
Salem Alhazmi - Alhazmi, a 9/11 hijacker and brother of Nawaf Alhazmi, is possibly at the summit, although very few accounts will mention it. [Australian, 12/24/2002] US intelligence intercepts from before the summit indicate that he at least had plans to attend. [US Congress, 7/24/2003, pp. 51 pdf file]
Abu Bara al-Taizi (a.k.a. Zohair Mohammed Said) - A Yemeni al-Qaeda operative, al-Taizi is reportedly meant to be one of the 9/11 hijackers, but will be unable to enter the US due to greater scrutiny for Yemenis. [9/11 Commission, 6/16/2004, pp. 8] Al-Taizi will be captured in Pakistan in February 2002, and then sent to the US prison in Guantanamo a few months later (see February 7, 2002). According to his 2008 Guantanamo file, he traveled from Afghanistan to Malaysia with bin Attash about two weeks before the summit. Bin Attash was missing a leg, and he had a prosthetic leg fitted and then stayed in the hospital to recover from the surgery. Bin Attash and al-Taizi stay at Sufaat’s house for the duration of the summit. Al-Taizi then flies to Yemen to visit his family there. [US Department of Defense, 10/25/2008]
Others - Unnamed members of the Egyptian-based Islamic Jihad are also said to be at the summit. [Cox News Service, 10/21/2001] Islamic Jihad merged with al-Qaeda in February 1998. [ABC News, 11/17/2001] However, according to the Wall Street Journal, bin Attash and Fahad al-Quso are suspected of being Islamic Jihad members at one point, so this may just be a reference to them. [Wall Street Journal, 10/8/2001] Note that there are a total of 10 names mentioned above, and it will be reported that the CIA learned that 11 operatives were to attend, so either not all of them make it, or some names of attendees will remain unknown.
Summit Associates - The following individuals are probably not at the summit meetings, but are in the region and assisting or linked with the attendees at this time:
Fahad Al-Quso - Al-Quso is a top al-Qaeda operative who is involved in the bombing of the USS Cole. Some sources will indicate al-Quso is present in Malaysia, and a person who looks like him will later be seen in a photograph of the meeting (see June 11, 2001). [Newsweek, 9/20/2001 pdf file] However, other sources will say al-Quso did not reach Kuala Lumpur, but met with bin Attash around this time in Bangkok, Thailand (see January 5-6, 2000 and January 8-15, 2000). [9/11 Commission, 7/24/2004, pp. 159; Wright, 2006, pp. 330] Although al-Quso apparently is not at the summit, there are a series of phone calls during the time of the summit between his hotel in Bangkok, a phone booth near the condominium where the summit is held, and his family home in Yemen (see (January 5-8, 2000)). Al-Quso will be arrested by Yemeni authorities in the fall of 2000 (see Late October-Late November 2000), but the FBI will not be given a chance to fully interrogate him before 9/11. He will escape from prison in 2003. [CNN, 5/15/2003]
Ahmad Sajuli Abdul Rahman - An operative of Jemaah Islamiyah, al-Qaeda’s Southeast Asian affiliate, Sajuli takes the visiting Arabs around Kuala Lumpur, but apparently does not attend the summit meetings. [US Congress, 10/17/2002] According to the later Guantanamo file of summit attendee al-Taizi, one of the attendees Sajuli escorts around town is future 9/11 hijacker Khalid Almihdhar. Sajuli also helps arrange al-Taizi’s transportation at the end of the summit. [US Department of Defense, 10/25/2008] Sajuli will be arrested in Malaysia in December 2001 (see December 29, 2001).
Ahmad Hikmat Shakir - A suspected al-Qaeda agent of Iraqi nationality, Shakir is a greeter at Kuala Lumpur airport. He meets Almihdhar there and travels with him to the apartment where the summit is held, but he probably does not attend the summit meetings. [Associated Press, 10/2/2002; Newsweek, 10/7/2002; Australian, 12/24/2002; Knight Ridder, 6/12/2004] After 9/11, he will be linked to the 1993 World Trade Center bombing and the 1995 Bojinka plot. Jordan will arrest him and let him go after the US says it doesn’t want to take custody of him (see September 17, 2001).
Dhiren Barot - Dhiren Barot (a.k.a. Abu Eissa al-Hindi) is a British citizen of Indian descent. According to a 2006 Observer article, Barot “is not believed to have been present” at the summit meetings. However, he does go to Kuala Lumpur during the time of the summit with summit attendee bin Attash. And shortly after the summit, Barot holds meetings with Hambali. It will later be reported that Barot is sent by KSM to New York City in early 2001 to case potential targets there, although whether this is part of the 9/11 plot or some other plot is unclear (see May 30, 2001). Barot will be arrested in 2004 in Britain for plotting attacks there, and sentenced to 30 years in prison (see August 3, 2004). [Observer, 12/12/2006]
Another Unnamed Local Militant - Malaysian officials will say that two local Jemaah Islamiyah act as drivers for the attendees. These drivers apparently have no idea who the attendees are or what they are doing; they are just tasked to drive them around. In a 2002 Associated Press article, officials will not name these drivers, but will say that they are among the dozens of alleged Jemaah Islamiyah militants arrested in December 2001 and January 2002. Since Sajuli mentioned above is arrested at that time, he presumably is one of these drivers. It is not known who the other driver is. (Sufaat will be arrested at that time as well, but the Associated Press article will make clear Sufaat is not one of the drivers.) [Associated Press, 9/20/2002]
Probably Not Involved: Mohamed al-Khatani - A Saudi, he allegedly will confess to attending the summit while being held in the US Guantanamo prison (see July 2002). He apparently will unsuccessfully attempt to enter the US in August 2001 to join the 9/11 plot (see August 4, 2001). However, al-Khatani will later recant his testimony and say he lied to avoid torture (see October 26, 2006). Furthermore, his 2008 Guantanamo file, leaked to the public in 2011, contains no hint of him even possibly attending the summit. The contents of the file must be treated with extreme caution, especially since he is repeatedly and brutally tortured (see August 8, 2002-January 15, 2003 and January 14, 2009). But according to the general narrative of the file, al-Khatani had no involvement with Islamist militancy in early 2000, only starts to get involved with militants in mid-2000, and first attends a militant training camp in Afghanistan in late 2000. [US Department of Defense, 10/30/2008]

Entity Tags: Hambali, Abu Bara al-Taizi, Dhiren Barot, Central Intelligence Agency, Ahmad Hikmat Shakir, Ahmad Sajuli Abdul Rahman, Al-Qaeda, Abd al-Rahim al-Nashiri, Islamic Jihad, Jemaah Islamiyah, Fahad al-Quso, Khalid Shaikh Mohammed, Ulrich Kersten, Yazid Sufaat, Khalid Almihdhar, Ramzi bin al-Shibh, Salem Alhazmi, Mohamed al-Khatani, Malaysian Secret Service, Khallad bin Attash, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Victims’ family members Lorie Van Auken (right) and Kristen Breitweiser (left) are shocked to learn Tom Wilshire blocked a cable to the FBI about Khalid Almihdhar’s visa. Victims’ family members Lorie Van Auken (right) and Kristen Breitweiser (left) are shocked to learn Tom Wilshire blocked a cable to the FBI about Khalid Almihdhar’s visa. [Source: Banded Artists]Doug Miller, an FBI agent assigned to Alec Station, the CIA’s bin Laden unit, reads CIA cables reporting that 9/11 hijacker Khalid Almihdhar has a US visa and drafts a cable to the FBI to inform it of this. The CIA obtained the information through a tap on Almihdhar’s phone in Yemen (see December 29, 1999) and by monitoring him as he passed through Dubai (see January 2-5, 2000) on his way to an al-Qaeda summit in Malaysia (see January 5-8, 2000).
Draft Cable - Miller writes that Almihdhar has a US visa (see April 3-7, 1999) and that the visa application states his destination is New York and he intends to stay for three months. The draft cable mentions the tap on Almihdhar’s phone, his planned travel to Malaysia, and the links between his phone and the 1998 East African embassy bombings (see 10:35-10:39 a.m., August 7, 1998 and October 4, 2001). It also says that the CIA has obtained photographs of Almihdhar and these will be sent separately. Miller asks the FBI for feedback resulting from an FBI investigation.
Blocked - Another CIA officer named Michael Anne Casey accesses Miller’s draft about an hour after he writes it. The cable is then blocked on the orders of the station’s deputy chief, Tom Wilshire, as a few hours after Miller drafts the cable Casey attaches a message to it saying, “pls hold off on [cable] for now per [Tom Wilshire].” [9/11 Commission, 7/24/2004, pp. 502; US Department of Justice, 11/2004, pp. 240 pdf file] Miller is also told, “This is not a matter for the FBI.” [Wright, 2006, pp. 311]
'No Reason to Kill the Message' - Author James Bamford will later comment: “A potential terrorist and member of al-Qaeda was heading for the US, the FBI’s jurisdiction—its turf—and he [Miller] was putting the FBI on notice so it could take action. There was no reason to kill the message.” [Bamford, 2008, pp. 19] Miller will later say he has no “rational answer” as to why the cable was blocked, but will speculate that Alec Station officers were annoyed he had encroached on their territory. [Congressional Quarterly, 10/1/2008] Casey drafts a cable falsely saying that the information about Almihdhar’s visa has been shared with the FBI (see Around 7:00 p.m. January 5, 2000) and there will be a discussion the next day about whether the cable should be sent (see January 6, 2000). The Justice Department’s Office of Inspector General will later call the failure to pass the information to the FBI a “significant failure” but will be unable to determine why the information was not passed on. [US Department of Justice, 11/2004, pp. 250 pdf file] The 9/11 Commission will know of the incident, but will relegate it to an endnote in its final report, omitting Wilshire’s role entirely. [9/11 Commission, 7/24/2004, pp. 502] The CIA inspector general will falsely claim that the cable is not sent, “[a]pparently because it was in the wrong format or needed editing.” [Central Intelligence Agency, 6/2005, pp. xv pdf file]

Entity Tags: Michael Anne Casey, Federal Bureau of Investigation, Khalid Almihdhar, Doug Miller, 9/11 Commission, Alec Station, Tom Wilshire, Central Intelligence Agency, Office of the Inspector General (CIA)

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The CIA sends the NSA some information about 9/11 hijacker Khalid Almihdhar, including information about al-Qaeda’s Malaysia summit (see January 5-8, 2000), which Almihdhar attended, as well as the name of a person who helped him in Kuala Lumpur, where the summit was held. The NSA is also told Almihdhar’s primary purpose for coming to Malaysia was to meet with other people. The CIA knows Almihdhar has a US visa (see January 2-5, 2000), but it is unclear whether the NSA is informed of this. [US Congress, 7/24/2003, pp. 156 pdf file] At this time, the NSA has some information about Almihdhar, whose calls it has been intercepting for at least a year (see Early 1999, Summer 1999, Late Summer 1999, and Shortly Before December 29, 1999), that has not been disseminated. In particular, the NSA seems to have overheard something in early 1999 that should have been disseminated, but was not. This new information from the CIA does not cause the NSA to re-examine its material on Almihdhar or disseminate any important information to other US agencies. However, Almihdhar is subsequently put on the NSA watchlist (see Mid-January 2000) and the NSA intercepts calls between his home in Yemen and him in the US (see Spring-Summer 2000), but fails to alert the FBI to his presence in the US (see (Spring 2000)).

Entity Tags: National Security Agency, Central Intelligence Agency, Counterterrorist Center, Khalid Almihdhar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

While the 9/11 hijackers are in the US, the NSA intercepts several calls between them and an al-Qaeda communications hub in Sana’a, Yemen, run by Ahmed al-Hada, who is hijacker Khalid Almihdhar’s father-in-law (see August 4-25, 1998).
Summary of Calls -
bullet The first calls are made by Almihdhar and are intercepted during the spring and summer of 2000 (see Spring-Summer 2000).
bullet More calls are made by hijacker Nawaf Alhazmi after the bombing of the USS Cole in October 2000 (see Mid-October 2000-Summer 2001).
bullet The final call from the US is intercepted just a few weeks before 9/11 (see (August 2001)).
The NSA intercepted the hijackers’ calls outside the US before this (see Early 1999 and December 29, 1999) and continues to do so in 2000 (see Summer 2000) after Almihdhar returns to Yemen (see June 10, 2000 and (Mid-June-Mid-July 2000)).
Calls' Content - Some of the calls may only contain non-operational information, as they are reportedly between Almihdhar and his wife. [9/11 Commission, 7/24/2004, pp. 222; Suskind, 2006, pp. 94; Wright, 2006, pp. 343] However, the calls are also used to relay messages to the 9/11 hijackers. [Embassy of Yemen (Washington), 2/13/2002; MSNBC, 2/14/2002; MSNBC, 5/2005]
Agencies' Roles - The CIA is the lead agency monitoring the communications hub. It has planted bugs inside it and is wiretapping all calls (see Late August 1998). Intercepts of calls to and from the hub are a major plank of the US intelligence community’s effort to fight al-Qaeda. Also involved is the FBI, which is using phone records to plot these calls on a map (see Late 1998-Early 2002). Some of the calls intercepted by US intelligence come from Osama bin Laden’s satellite phone in Afghanistan (see August 4-25, 1998 and Late August 1998). After 9/11, counterterrorism officials will say that the number was one of the hottest targets being monitored by the NSA and was an “intelligence bonanza.” [Los Angeles Times, 12/21/2005; Wright, 2006, pp. 343]
Importance of Failure - Also after 9/11, counterterrorism officials will agree that the failure to follow leads to the US from this number was a huge missed opportunity to stop the 9/11 plot. For instance, FBI agent Kenneth Maxwell will say: “Two al-Qaeda guys living in California—are you kidding me? We would have been on them like white on snow: physical surveillance, electronic surveillance, a special unit devoted entirely to them.” [MSNBC, 7/21/2004; New Yorker, 7/10/2006 pdf file]
Discussed after 9/11 - The failure to roll up the plot based on these communications intercepts will be discussed following 9/11 (see Summer 2002-Summer 2004 and March 15, 2004 and After).

Entity Tags: Federal Bureau of Investigation, Central Intelligence Agency, Khalid Almihdhar, Nawaf Alhazmi, National Security Agency, Hoda al-Hada, Ahmed al-Hada, Kenneth Maxwell

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Judy Palya Loether.Judy Palya Loether. [Source: SecrecyFilm (.com)]Judy Palya Loether, the daughter of a civilian engineer killed in a 1948 plane crash while on a secret government mission (see October 6, 1948), reads over the voluminous reports of the accident that claimed her father’s life. The reports, now declassified (see January 1996), had been at the heart of a landmark lawsuit that gave judicial recognition to the government’s “state secrets” privilege (see March 9, 1953). Loether is shocked to find that the reports contain nothing that could be construed as military or tactical secrets of any kind, though for decades the government has insisted that they could not be revealed, even to a judge (see October 18, 1948, July 26, 1950, August 7-8, 1950, September 21, 1950, and October 19, 1951). What they do contain is a compendium of witness statements and expert findings that indicate a number of mistakes and errors led to the crash. Loether begins contacting the families of the widows who had filed the original lawsuit against the government (seeJune 21, 1949) to share her findings. [Siegel, 2008, pp. 210-211] Loether is confused and angered over the contents of the reports, and the government’s response to the lawsuit. She cannot understand why the government pressed so hard to keep the reports classified, knowing that they contained no sensitive information about the secret missile program, and is particularly troubled by the fact that at least two senior government officials signed affidavits affirming the reports’ inclusion of such information while knowing that the reports contained nothing of the sort. She wonders if government officials had perhaps decided to lie about the reports in order to establish some sort of state secrets privilege. In September 2002, lawyers Wilson Brown and Jeff Almeida, retained by Loether and others who lost family members in the crash, come to the same conclusion. As Almeida will say to Brown: “I’ve read this report. There’s nothing in there.” [Siegel, 2008, pp. 219] As time goes on, Loether and her colleagues files a second lawsuit seeking to overturn the first Supreme Court verdict (see February 26, 2003).

Entity Tags: Wilson Brown, Jeff Almeida, Judy Palya Loether

Timeline Tags: Civil Liberties

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

The National Security Agency (NSA) intercepts calls between 9/11 hijacker Khalid Almihdhar in the US and an al-Qaeda communications hub in Yemen, but does not notify the FBI that Almihdhar is in the US. However, the NSA disseminates reports about some of the calls, which are made from phones registered to Nawaf Alhazmi (see Spring-Summer 2000). The NSA will later say that it does not usually intercept calls between the US and other countries at this time, as it believes that this should be done by the FBI. Despite this, the NSA acquires information about such calls and provides the information to the FBI in regular reporting and in response to specific requests. The FBI, which has a standing request for such information about any calls between the communications hub in Yemen and the US (see Late 1998), then uses this information in its investigations based on warrants issued under the Foreign Intelligence Surveillance Act. The NSA will later tell the 9/11 Congressional Inquiry the reason the FBI is not notified about Almihdhar is because it does not realize that Almihdhar is in the US. However, no explanation is offered for why the NSA fails to realize this. [US Congress, 7/24/2003, pp. 36, 73-4 pdf file] This explanation will be contradicted by one offered in a 2004 article about the issue that reports the intercepts are not exploited precisely because the NSA knows one of the parties is in the US and therefore does not want to deal with his calls (see Summer 2002-Summer 2004 and March 15, 2004 and After). In addition, the FBI used information gained from intercepted calls to and from the hub in Yemen to make a world map of al-Qaeda’s organization, indicating that the locations talking to the hub could be determined by US intelligence (see Late 1998-Early 2002). [MSNBC, 7/21/2004]

Entity Tags: Federal Bureau of Investigation, National Security Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The front of the Manchester manual, deceptively covered with flowers.The front of the Manchester manual, deceptively covered with flowers. [Source: FBI]Al-Qaeda leader Anas al-Liby is arrested in Manchester, England, and then let go. According to Ali Soufan, an FBI agent from 1997 to 2005, the I-49 squad, a mix of FBI agents and US attorneys, uncovers evidence that al-Liby is living in Manchester. FBI agent John O’Neill assembles a team, including Soufan, to go there. Soufan will later say that they are met by local police, and he tells them: “Anas al-Liby is a senior al-Qaeda operative. He’s a computer expert and was part of the team that did surveillance on the embassy in Nairobi [that resulted in the 1998 bombing there (see 10:35-10:39 a.m., August 7, 1998)]. This is potentially a big win for us.” Al-Liby is caught in his residence and taken to a local police station. However, he denies any involvement in terrorism. According to Soufan, al-Liby is smart and careful, and no incriminating documents or computer files can be quickly found in his residence. O’Neill wants him held until his possessions can be searched more thoroughly, but he is immediately released. Al-Liby evades a team sent to follow him, and skips the country. Not long afterwards, Soufan, who speaks Arabic, discovers a terrorist training manual written in Arabic in al-Liby’s possessions (see May 2000). In a book he writes that is published in 2011, Soufan curiously will not mention the timing of this arrest, even though timing is given to most other events discussed in the book. But the arrest is placed between events that occur in late 1999 and early 2000. [Soufan, 2011, pp. 113-114] In April 2001, the New York Times will first report on the manual, and will mention that it was discovered in a raid in Manchester in May 2000. [New York Times, 4/5/2001] Shortly after 9/11, it will be revealed that the raid was of al-Liby’s residence. [Associated Press, 9/21/2001; Observer, 9/22/2001] In 2002, it will be reported that al-Liby was not at home during the raid, and then escaped the country. Furthermore, al-Liby has been living openly in Britain since 1995, apparently as part of a political deal after he had taken part in a plot with the British intelligence agency MI6 to assassinate Libyan leader Colonel Mu’ammar al-Qadhafi in 1996 (see Late 1995-May 2000 and 1996). [Observer, 11/10/2002] The embarrassing fact that al-Liby is actually arrested and then released will not be revealed until September 2011, in Soufan’s book. [Soufan, 2011, pp. 113-114] The US will later post a $25 million reward for al-Liby, and his death or arrest will never be confirmed. [Federal Bureau of Investigation, 2002]

Entity Tags: Federal Bureau of Investigation, John O’Neill, Anas al-Liby, I-49, United Kingdom, Ali Soufan

Timeline Tags: Complete 911 Timeline

The FBI extracts a full confession from L’Houssaine Kherchtou, also known as “Joe the Moroccan,” a member of the cell that bombed the US embassy in Nairobi, Kenya (see Late 1993-Late 1994 and 10:35-10:39 a.m., August 7, 1998). However, in contrast with methods used on al-Qaeda operatives after 9/11, he is not tortured and the FBI is at pains to treat him well.
Relaxing Surroundings, Respectful Treatment - FBI agent Jack Cloonan will later say of the initial interrogation, which took place in Morocco, “The setting was beautiful, it was this grand house with stables out back, gazelles bouncing in the background, palm trees, three-course meals.” Kherchtou had a relationship with the British intelligence service MI6 (see Mid-Summer 1998 and Shortly After August 7, 1998), but had broken off contact with it and has to be lured to Morocco, where his debriefing is headed by Patrick Fitzgerald. Cloonan will later describe the questioning: “We advised [Kherchtou] of his rights. We told him he could have a lawyer anytime, and that he could pray at any time he wanted. We were letting the Moroccans sit in on this, and they were dumbfounded.… The Moroccans said he’d never talk. He never shut up for 10 days.” Fitzgerald denies Kherchtou a plea bargaining agreement, and says he must plead guilty to conspiracy to murder, for which he may receive a life sentence, though Fitzgerald promises to ask the judge for leniency. However, Cloonan will later say, “His wife needed money for medical treatment in Khartoum, and al-Qaeda had failed to provide it.” It is Cloonan’s “in” with Kherchtou, who is also sure that the US will not torture him. When Kherchtou wavers, Cloonan steps in. As he recalls: “I said, ‘Joe, you understand English, so I’d like you to go out and pray on this with your two Moroccan brothers.’ I thought Fitzy was going to give birth. Joe went out and prayed and came back and said yes.” He provides the FBI with details of the plot and becoming a star witness at the trial (see September 2000). [American Prospect, 6/19/2005; Vanity Fair, 12/16/2008]
Invaluable Information - Kherchtou’s information, provided at a time when the US knows comparatively little about al-Qaeda, is, in Cloonan’s assessment, invaluable. “He told us about a lot of things,” Cloonan later says. “We learned how they recruited people, their front organizations, how they used NGOs [non-governmental organizations], false passports, what they thought about kidnapping, how they developed targets, did their surveillance, a day in the life of Osama bin Laden, what weapons they used, what vehicles they drove, who was the principal liaison with the Sudanese government, that there was a relationship between al-Qaeda and Hezbollah, how they did their training exercises, their finances, and their membership.” After the trial, he enters the witness protection program in the US. Four of his onetime associates will receive life sentences as a direct result of his information. [Vanity Fair, 12/16/2008]
FBI Use Kherchtou as Example of Successful Interrogation Tacticss - FBI officials will later compare this outcome favorably to procedures used by other US agencies after 9/11. For example, following the detainee abuse scandals after 9/11, FBI manager Tom Harrington will write that the FBI has “been successful for many years obtaining confessions via non-confrontational interviewing techniques.” Cloonan will later contrast Kherchtou’s treatment with that of al-Qaeda training manager Ibn al-Shaykh al-Libi in December 2001, when the US sent al-Libi to Egypt to be tortured and interrogated, but some of the information he provided there turned out to be false (see December 19, 2001 and January 2002 and After). [American Prospect, 6/19/2005]

Entity Tags: Patrick J. Fitzgerald, Jack Cloonan, Ibn al-Shaykh al-Libi, Federal Bureau of Investigation, Al-Qaeda, Thomas J. Harrington, L’Houssaine Kherchtou

Timeline Tags: Torture of US Captives, Complete 911 Timeline

The King Fahd Mosque in Culver City.The King Fahd Mosque in Culver City. [Source: Damian Dovarganes]Hijackers Khalid Almihdhar and Nawaf Alhazmi travel to Los Angeles with an associate, Mohdar Abdullah, before Almihdhar leaves the US the next day (see June 10, 2000). When they visit the King Fahd Mosque in Culver City, Abdullah is surprised that Alhazmi and Almihdhar already know several people at the mosque. Abdullah will later say, “I was surprised that anybody at the mosque knew them, because as far as I knew Alhazmi and Almihdhar hadn’t visited Los Angeles since they arrived in the US.” They meet one of the hijackers’ Los Angeles acquaintances, known as Khallam, again later that night at their motel. According to the 9/11 Commission, Khallam asks Abdullah to leave the motel room, so he can talk to Alhazmi and Almihdhar in private. However, Abdullah will later dispute this, saying he is not asked leave the room, but that Alhazmi leaves to make an international phone call from a pay phone. The identity of the person he calls is unknown, but it is possible that he talks to Ahmed al-Hada, an al-Qaeda operative whose safe house is monitored by the US and who Alhazmi sometimes calls from the US (see Early 2000-Summer 2001). Khallam will apparently never be found after 9/11. The FBI will consider the possibility that he is Khallad bin Attash, as there are some reports that bin Attash is in the US at this time and met the mosque’s imam, Fahad al Thumairy. However, this theory will never be confirmed. [Los Angeles Times, 7/24/2004; 9/11 Commission, 7/24/2004, pp. 216, 514] The next day, Alhazmi, Abdullah and an unknown man make a casing video at Los Angeles Airport (see June 10, 2000). It is possible that the third man is Khallam.

Entity Tags: Mohdar Abdullah, Nawaf Alhazmi, Khallam, Khalid Almihdhar, 9/11 Commission, Fahad al Thumairy, Khallad bin Attash, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Khalid Almihdhar.Khalid Almihdhar. [Source: FBI]9/11 hijacker Khalid Almihdhar flies from San Diego to Frankfurt, Germany. [US Congress, 9/20/2002] He is accompanied to the airport by another hijacker, Nawaf Alhazmi, and an unnamed associate (see June 10, 2000). Authorities later believe that Almihdhar visits his cousin-in-law Ramzi Bin al-Shibh and other al-Qaeda members in bin al-Shibh’s cell. Since the CIA fails to notify Germany about its suspicions of Almihdhar and bin al-Shibh, both of whom were seen attending the al-Qaeda summit in Malaysia in January, German police fail to monitor them and another chance to uncover the 9/11 plot is missed. [Die Zeit (Hamburg), 10/1/2002; US Congress, 7/24/2003, pp. 135 pdf file] FBI Director Mueller and the congressional inquiry into 9/11 will claim that Almihdhar does not return to the US for over a year [US Congress, 9/20/2002; US Congress, 9/26/2002] , although it is possible that Almihdhar does return before then. For instance, there are indications Almihdhar attends a flight school in Arizona in early 2001. [Arizona Republic, 9/28/2001]

Entity Tags: Ramzi bin al-Shibh, Khalid Almihdhar, Central Intelligence Agency, Robert S. Mueller III, 9/11 Congressional Inquiry, Federal Bureau of Investigation, Germany

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

When 9/11 hijacker Khalid Almihdhar leaves the US in June (see June 10, 2000), he flies to Frankfurt, Germany, and then to Oman in the Middle East. [US Congress, 7/24/2003, pp. 135 pdf file] From there he returns to his family’s home in Sana’a, Yemen. [9/11 Commission, 7/24/2004, pp. 237] His wife and children live at an al-Qaeda communications hub that is run by his father in law, Ahmed al-Hada. The hub is being monitored by the NSA and CIA. Phone calls to and from the hub, including ones made by Almihdhar and other hijackers, are intercepted, rooms in the building are bugged, and spy satellites record visitors (see Late August 1998, Late 1998-Early 2002, and Early 2000-Summer 2001). Based on information gained from monitoring this house, the CIA and local intelligence services mounted a major operation against Almihdhar, other hijackers, and several more al-Qaeda operatives in December 1999 and January 2000, when they were followed around the Middle East and South Asia and monitored during an al-Qaeda summit in Malaysia (see December 29, 1999, January 2-5, 2000, and January 5-8, 2000). So presumably US intelligence should have been aware of this visit to the hub and who Almihdhar was, but what exactly was known and who may have known it has not been made public. He will return to the hub in February 2001 and stay an unknown length of time (see February 2001).

Entity Tags: Central Intelligence Agency, Ahmed al-Hada, National Security Agency, Khalid Almihdhar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

After 9/11 hijacker Khalid Almihdhar returns to the Middle East (see June 10, 2000 and (Mid-June-Mid-July 2000)), the NSA continues to intercept his telephone calls to and from an al-Qaeda communications hub in Sana’a, Yemen, where his wife and children live. US intelligence understands that this is one of the most important al-Qaeda hot spots, and has been closely monitoring it since at least late 1998 (see August 4-25, 1998 and Late 1998-Early 2002). It also intercepts calls between hijacker Salem Alhazmi and the hub, as well as conversations between his brother, hijacker Nawaf Alhazmi, in the US and the hub (see Mid-October 2000-Summer 2001). [US Congress, 7/24/2003, pp. 157 pdf file; 9/11 Commission, 7/24/2004, pp. 222; Wright, 2006, pp. 343] The NSA had previously intercepted calls made by the hijackers to and from the communications hub, both when they were in the US and outside it (see Early 2000-Summer 2001).

Entity Tags: Salem Alhazmi, Khalid Almihdhar, Nawaf Alhazmi, National Security Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

John Yoo, an associate law professor at the University of California at Berkeley, makes a presentation at a Cato Institute seminar on executive power. Yoo, who will go on to become one of the Bush administration’s primary advocates of unchecked executive power (see March 1996), accuses the Clinton administration of upending the Constitution to give the executive branch unwarranted authority (see March 24 - Mid-June, 1999). “[T]he Clinton administration has undermined the balance of powers that exist in foreign affairs, and [they] have undermined principles of democratic accountability that executive branches have agreed upon well to the Nixon administration,” he says. Regarding the Clinton administration’s stretched interpretation of the Anti-Ballistic Missile Treaty (see June 2000), Yoo says that the Clinton “legal arguments are so outrageous, they’re so incredible, that they actually show, I think, a disrespect for the idea of law, by showing how utterly manipulatible it is.” [Savage, 2007, pp. 67]

Entity Tags: Bush administration (43), John C. Yoo, Nixon administration, Clinton administration

Timeline Tags: Civil Liberties

9/11 hijacker associate Ramzi bin al-Shibh spends four weeks in Yemen. The exact timing of his visit is unknown, except that he arrives in August 2000 and leaves in September. [Australian, 12/24/2002; US Department of Defense, 12/8/2006]
Planning Cole Bombing? - While in Yemen, it seems probable bin al-Shibh is involved in preparations for the USS Cole bombing. There are reports that he takes part in the bombing, and he flies back to Yemen to be there in time for the bombing in early October (see October 10-21, 2000).
Does He Visit Monitored Yemen Hub? - While there, it is also possible that he visits the highly monitored al-Qaeda Yemen communications hub, which is in Sana’a. It will not be confirmed or denied that he visits the hub at this time. However, bin al-Shibh is Yemeni, and he is a cousin of future 9/11 hijacker Khalid Almihdhar’s wife, and she lives at the house where the hub is located. [Washington Post, 6/12/2002; Washington Post, 9/11/2002] (Note that he also has other family in Sana’a, as this is where he grew up, so it seems probable he would spend at least some of his visit in Sana’a.) [McDermott, 2005, pp. 41] Furthermore, at some point before the Cole bombing, bin al-Shibh meets with al-Qaeda operatives Abd al-Rahim al-Nashiri and Ahmed al-Hada in Yemen. It is not known where the meeting takes place, but al-Hada runs the Yemen hub (and he is also related to bin al-Shibh) (see Before October 12, 2000). Also, al-Qaeda operatives use the hub to “put everything together” for the Cole bombing, and bin al-Shibh is probably involved in preparations for the bombing at this time. The bombers also call the hub as part of their preparations (see Mid-August 1998-October 2000).
Could Bin Al-Shibh Be Tracked? - If bin al-Shibh does visit (or even just call) the Yemen hub at this time, and/or during his later visit right at the time of the Cole bombing, he would be monitored by US intelligence. The US not only listens in on the hub’s phone, but it monitors the house through bugs planted inside and through spy satellites to monitor people leaving and entering it (see Early 2000-Summer 2001). Although it is uncertain, US intelligence may already be aware of bin al-Shibh through his attendance at an al-Qaeda summit in Malaysia in early 2000 (see January 5-8, 2000).

Entity Tags: Ramzi bin al-Shibh, Ahmed al-Hada, Khalid Almihdhar, Abd al-Rahim al-Nashiri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Author Lawrence Wright will later write about the FBI’s investigation of the USS Cole bombing in Yemen (see October 12, 2000): “The FBI was convinced that the [Cole] bombers had been tipped off about the arrival of the Cole, and they wanted to expand the investigation to include a member of the president’s own family and a colonel in [the Yemeni equivalent of the FBI]. There was scant interest on the part of the Yemen authorities in pursuing such leads.” Wright will also point out: “Yemen was a particularly difficult place to start a terrorist investigation, as it was filled with active al-Qaeda cells and with sympathizers at very high levels of government. On television, Yemeni politicians called for jihad against America. Just getting permission from the Yemeni government to go to the crime scene—the wounded warship in the Aden harbor—required lengthy negotiations with hostile officials.” Cooperation from the Yemen government is erratic at best. For instance, the Yemenis eventually show the FBI a videotape taken by a harborside security camera, but it appears the moment of the explosion has been edited out. [Wright, 2006, pp. 325; New Yorker, 7/10/2006 pdf file] Later, when the FBI is finally allowed to interview Fahad al-Quso, who the FBI believes is one of the main Cole plotters, a Yemeni colonel enters the room and kisses Quso on both cheeks. This is a recognized signal to everyone that al-Quso is protected. [Wright, 2006, pp. 330] Between Yemeni obstructions, infighting between US officials (see October 14-Late November, 2000), and security concerns hindering movement, there will never be the same kind of investigation and trial as there was with the 1998 embassy bombings (see 10:35-10:39 a.m., August 7, 1998 and February-July 2001).

Entity Tags: Yemen, Fahad al-Quso, Federal Bureau of Investigation

Timeline Tags: Alleged Use of False Flag Attacks, Complete 911 Timeline

Rahim al-NashiriRahim al-Nashiri [Source: AP]After several weeks of investigation, US authorities learn that al-Qaeda leader Abd al-Rahim al-Nashiri was involved in the plot to attack the USS Cole. Investigators find a second safe house used by the bombing team, and learn it was registered to al-Nashiri under a name variant. Al-Nashiri’s name is dimly familiar to FBI agent Ali Soufan, who remembers that a source said al-Nashiri was planning a seaborne attack against a US vessel in Aden (see After August 7, 1998). The FBI then finds that al-Nashiri rented a car in Aden before the bombing. Author Lawrence Wright will comment, “It was another strong link between al-Qaeda and the Cole attack.” [New Yorker, 7/10/2006 pdf file] In addition, one of the bombers detained by Yemeni authorities, Jamal al-Badawi, identifies al-Nashiri as a person who gave instructions for the attack. Al-Badawi also says he thought al-Nashiri was working for bin Laden, but al-Nashiri did not tell al-Badawi this directly. [CNN, 12/13/2000] Although al-Nashiri was the operational manager, he was actually in Afghanistan for a meeting with Osama bin Laden when the opportunity to attack arose and was not physically present at the bombing. Investigators are aware that he is the cousin of one of the bombers of the US embassy in Nairobi, which he facilitated, and a captured embassy bomber identified a photo of him for the FBI two years earlier (see 10:35-10:39 a.m., August 7, 1998 and August 22-25 1998). Al-Nashiri has been known to various intelligence agencies since 1998, at least, and was monitored at the Malaysia summit of top al-Qaeda leaders at the start of the year (see January 5-8, 2000). [CNN, 12/11/2000; 9/11 Commission, 7/24/2004, pp. 152-3; Wright, 2006, pp. 318] US investigators also identify another leading suspect in the case, Khallad bin Attash, at around the same time (see January 4, 2001).

Entity Tags: Jamal al-Badawi, Abd al-Rahim al-Nashiri, Ali Soufan, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline

Jamal Badawi.Jamal Badawi. [Source: Rewards for Justice]Based on information from interviews of suspects detained during the USS Cole bombings (see Late October-Late November 2000), the FBI finds that one of the lead bombers was Khallad bin Attash, an operative also involved in the 1998 East African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). The detained men, Jamal al-Badawi and Fahad al-Quso, say that they recently traveled to Afghanistan and met bin Attash there. Al-Badawi also says bin Attash helped purchase a boat used in the Cole bombing. The head of the FBI’s investigation, Ali Soufan, is startled by this news, as an informer has already provided information on bin Attash, describing him as one of bin Laden’s top lieutenants. Although the FBI wants to interview the two detained men to obtain more information, the Yemeni authorities refuse at this point, saying they have both sworn on the Koran they were not involved in the attack, so they must be innocent. Limited access to al-Quso will be granted to the FBI later, but the Yemeni authorities will indicate to him that he is still under their protection (see Early December 2000). [Federal Bureau of Investigation, 9/9/1998 pdf file; 9/11 Commission, 7/24/2004, pp. 192; New Yorker, 7/10/2006 pdf file]

Entity Tags: Khallad bin Attash, Fahad al-Quso, Ali Soufan, Jamal al-Badawi

Timeline Tags: Complete 911 Timeline

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). [Truthout (.org), 1/17/2006] In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. [New York Times, 12/16/2007]

Entity Tags: Bush administration (43), National Security Agency

Timeline Tags: Civil Liberties

According to reporter and author Charlie Savage, the White House staff quickly coalesces into two camps: “Bush People[,] mostly personal friends of the new president who shared his inexperience in Washington,” which includes President Bush’s top legal counsels, Alberto Gonzales and Harriet Miers, both corporate lawyers in Texas before joining Bush in Washington. The second group is “Cheney People—allies from [Vice-President Dick] Cheney’s earlier stints in the federal government (see May 25, 1975, November 18, 1980, 1981-1992, 1989, and June 1996) who were deeply versed in Washington-level issues, a familiarity that would allow their views to dominate internal meetings. These included [Defense Secretary Donald] Rumsfeld and other cabinet secretaries, key deputies throughout the administration, and David Addington, Cheney’s longtime aide who would become a chief architect of the administration’s legal strategy in the war on terrorism” (see July 1, 1992 and (After 10:00 a.m.) September 11, 2001). Savage will observe, “Given the stark contrast in experience between Cheney and Bush, it was immediately clear to observers of all political stripes that Cheney would possess far more power than had any prior vice president.”
'Unprecedented' Influence - Cheney will certainly have “unprecedented” influence, according to neoconservative publisher William Kristol, who himself had served as former Vice President Dan Quayle’s chief of staff. “The question to ask about Cheney,” Kristol will write, is “will he be happy to be a very trusted executor of Bush’s policies—a confidant and counselor who suggests personnel and perhaps works on legislative strategy, but who really doesn’t try to change Bush’s mind about anything? Or will he actually, substantively try to shape administration policy in a few areas, in a way that it wouldn’t otherwise be going?”
Expanding the Power of the Presidency - Cheney will quickly answer that question, Savage will write, by attempting to “expand the power of the presidency.” Savage will continue: “He wanted to reduce the authority of Congress and the courts and to expand the ability of the commander in chief and his top advisers to govern with maximum flexibility and minimum oversight. He hoped to enlarge a zone of secrecy around the executive branch, to reduce the power of Congress to restrict presidential action, to undermine limits imposed by international treaties, to nominate judges who favored a stronger presidency, and to impose greater White House control over the permanent workings of government. And Cheney’s vision of expanded executive power was not limited to his and Bush’s own tenure in office. Rather, Cheney wanted to permanently alter the constitutional balance of American government, establishing powers that future presidents would be able to wield as well.” [Savage, 2007, pp. 7-9] Larry Wilkerson, the chief of staff for Secretary of State Colin Powell, will say after leaving the administration: “We used to say about both [Defense Secretary Donald Rumsfeld’s office] and the vice president’s office that they were going to win nine out of 10 battles, because they were ruthless, because they have a strategy, because they never, never deviate from that strategy. They make a decision, and they make it in secret, and they make it in a different way than the rest of the bureaucracy makes it, and then suddenly, foist it on the government—and the rest of the government is all confused.” [Unger, 2007, pp. 299]
Signing Statements to Reshape Legislation, Expand Presidential Power - To that end, Cheney ensures that all legislation is routed through his office for review before it reaches Bush’s desk. Addington goes through every bill for any new provisions that conceivably might infringe on the president’s power as Addington interprets it, and drafts signing statements for Bush to sign. In 2006, White House counsel Bradford Berenson will reflect: “Signing statements unite two of Addington’s passions. One is executive power. And the other is the inner alleyways of bureaucratic combat. It’s a way to advance executive power through those inner alleyways.… So he’s a vigorous advocate of signing statements and including important objections in signing statements. Most lawyers in the White House regard the bill review process as a tedious but necessary bureaucratic aspect of the job. Addington regarded it with relish. He would dive into a 200-page bill like it was a four-course meal.” It will not be long before White House and Justice Department lawyers begin vetting legislation themselves, with Addington’s views in mind. “You didn’t want to miss something,” says a then-lawyer in the White House. [Savage, 2007, pp. 236]

Entity Tags: David S. Addington, Bradford Berenson, Alberto R. Gonzales, Charlie Savage, William Kristol, Richard (“Dick”) Cheney, Donald Rumsfeld, Bush administration (43), Harriet E. Miers, George W. Bush, Lawrence Wilkerson

Timeline Tags: Civil Liberties

The NSA asks Qwest, a major US telecommunications firm and a cutting-edge provider of high-tech wireless and Internet connectivity, to reveal information about its customers and their phone calls. Qwest’s CEO, Joe Nacchio, refuses after meeting with NSA officials and deciding that the program is illegal without court orders (see February 27, 2001). The NSA refuses to seek court authorization for its wiretaps and electronic surveillance. The NSA will renew its request from Qwest after the 9/11 attacks, and will also ask the firm to help it track suspected terrorists. Other telecommunications firms such as Verizon, AT&T, and BellSouth, will comply with the NSA’s requests (see February 2001 and Beyond).
Fears of a 'Digital Pearl Harbor' - According to a former White House official, the NSA’s primary purpose before 9/11 is to watch for computer hackers and foreign-government agents trying to hack into the government’s computer information systems, particularly those within the Defense Department. Government officials fear a “digital Pearl Harbor” if hackers were ever to seize control of those systems or other key US infrastructures. The former official will say in 2007 that the NSA’s proposal to Qwest is, “Can you build a private version of Echelon and tell us what you see?” Echelon is the NSA’s enormous signals intelligence (SIGINT) network used by the agency and its counterparts in Australia, Canada, New Zealand, and Britain. Qwest is constructing a high-speed network for phone and Internet traffic, and the NSA wants Qwest to keep records of its customers’ transactions for it. The NSA, another source will say, wants to analyze call, e-mail, and other transmissions’ traffic patters for signs of suspicious activity. The White House official will say that telecom firms such as Qwest “have an enormous amount of intelligence-gathering” capability. They don’t have to target individual customers to “look for wacky behavior,” or “groups communicating with each other in strange patterns.” Such information could augment intelligence that the NSA and other agencies were gathering from other sources, and enable the NSA to collect the information it wants without violating laws prohibiting it and other intelligence agencies from directly gathering data on US citizens.
Ill Will from NSA - Nacchio’s refusal to go along with the NSA’s request garners it some ill will among the US intelligence community, the former White House official will say. Nacchio will contend that because of his refusal, the NSA denied Qwest a lucrative government contract. A former high-level intelligence official will add that other telecom companies had little problem agreeing to the NSA’s requests. Nacchio believes that the NSA’s request is illegal under the Telecommunications Act without court orders; the former White House official will acknowledge that it might violate the 1986 Electronic Communications Privacy Act. After 9/11, that law will be amended by the USA Patriot Act to give the government more room to monitor US citizens.
Qwest, Other Telecom Firms Cooperative with Other Agencies - Qwest is apparently less reluctant to share other information with the Pentagon. Qwest began sharing its technology and information as far back as 1997 (see 1997). In May 2001, Commerce Secretary Don Evans will tell the Senate Appropriations Committee that his department helped persuade Qwest to “share proprietory information with the Defense Department to evaluate the vulnerability of its network.” Qwest, which serves the Rocky Mountain and West Coast regions of the country, covers the areas that house some of the military’s most important command-and-control facilities, including the US Strategic Command. In the 1990s, Qwest began actively pursuing contracts with the Defense Department to build more modern, private, secure networks for defense and intelligence agencies. [National Journal, 11/2/2007]
Meetings with Bush Officials - In court documents filed in 2006 to challenge his prosecution for insider trading and, in heavily redacted form, released to the public in 2007, Nacchio will indicate that telecom executives met frequently with Bush administration officials before 9/11, including Deputy Defense Secretary Paul Wolfowitz, National Security Adviser Condoleezza Rice, NSA Director Michael Hayden, and counterterrorism “tsar” Richard Clarke. Many telecom firms are working closely with the government to develop highly classified operations, including joint networks to which the government will have unfettered access. The future director of national intelligence, Mike McConnell, works with telecom firms to expand the cooperation between the telecom industry and the federal government. [Salon, 10/15/2007]

Entity Tags: Condoleezza Rice, US Department of Defense, Bush administration (43), Verizon Communications, AT&T, US Department of Commerce, Senate Appropriations Committee, US Strategic Command, BellSouth, Donald L. Evans, Echelon, Richard A. Clarke, Qwest, Mike McConnell, National Security Agency, Joe Nacchio, Paul Wolfowitz

Timeline Tags: Civil Liberties

During the trial of men accused of the 1998 East African embassy bombings, an FBI witness mentions that one of the defendants, Mohamed al-Owhali, told investigators that he had stayed in a Yemen-based al-Qaeda communications hub run by Ahmed al-Hada. He also revealed that he had called the hub before and after the Nairobi bombing. (Note: al-Hada’s surname is transliterated as “al-Hazza” during the trial.) The existence of the communications hub in Yemen is then reported by the US State Department, CNN, the Guardian, and UPI over the next few months. [United Press International, 2/13/2001; US Department of State, 3/7/2001; United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001; CNN, 5/2/2001; Observer, 8/5/2001] The hub was also previously mentioned at a big trial of Islamic Jihad operatives in Cairo (see 1999). The 9/11 hijackers have been calling the communications hub by phone since early 1999, at least (see, e.g., Early 1999). The calls are being intercepted by the NSA and some of them have originated from within the US (see Early 2000-Summer 2001). Perhaps unaware that the hub’s existence has been disclosed, they will make at least one more call to the hub (see (August 2001)).

Entity Tags: Salem Alhazmi, Nawaf Alhazmi, Khalid Almihdhar, Ahmed al-Hada, National Security Agency, Mohamed al-Owhali

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Timeline Tags: Civil Liberties

Nicky Hager.Nicky Hager. [Source: Rotorua District Council]New Zealand journalist Nicky Hager appears before a European Parliament investigative committee to testify about the US’s satellite surveillance program, Echelon (see July 11, 2001). Hager has discovered information about Echelon’s use by the New Zealand equivalent of the NSA, the Government Communication Security Bureau (GCSB). In researching Echelon’s use by the USA, Canada, Britain, Australia, and New Zealand, Hager learned of the extent of the system’s “capability to monitor the whole of governments, regional and international organizations, non-government organizations, companies and individuals throughout Europe.” Although Hager warns the committee not to focus exclusively on Echelon’s use for corporate benefits, he gives several examples of such uses in the South Pacific, including monitoring “deals to do with Japan… collecting intelligence on meat sales, which is very important for New Zealand… intelligence to do with oil prices… [and] a particularly large Japanese development project in the South Pacific where there was potential for New Zealand companies to win contracts. In other words, there were both macro-level and micro-level economic intelligence being collected.” Corporate executives routinely received such information, Hager testifies, and tells about “the fantastic amount of intelligence that was arriving, for example, monitoring international trade meetings.… From my sources, they said that whenever there was a GATT meeting or another major international meeting, there were hundreds of reports of the monitoring of the different delegations which were arriving in New Zealand and being shared between [British]/USA partners, and I have absolutely no doubt about that, because I have talked to people who saw it coming from the NSA.” [European Parliament, 4/24/2001]

Entity Tags: Government Communication Security Bureau, Echelon, National Security Agency, Nicky Hager, European Parliament

Timeline Tags: Civil Liberties

One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing.One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing. [Source: Matt Crypto / Public domain]The BBC reports on advances in electronic surveillance. The US’s global surveillance program, Echelon, has become particularly effective in monitoring mobile phones, recording millions of calls simultaneously and checking them against a powerful search engine designed to pick out key words that might represent a security threat. Laser microphones can pick up conversations from up to a kilometer away by monitoring window vibrations. If a bug is attached to a computer keyboard, it is possible to monitor exactly what is being keyed in, because every key on a computer has a unique sound when depressed. [BBC, 4/4/2001] Furthermore, a BBC report on a European Union committee investigation into Echelon one month later notes that the surveillance network can sift through up to 90 percent of all Internet traffic, as well as monitor phone conversations, mobile phone calls, fax transmissions, net browsing history, satellite transmissions and so on. Even encryption may not help much. The BBC suggests that “it is likely that the intelligence agencies can crack open most commercially available encryption software.” [BBC, 5/29/2001]

Entity Tags: Echelon, British Broadcasting Corporation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Ahmed Shah Massoud speaking before European Parliament.Ahmed Shah Massoud speaking before European Parliament. [Source: Robert Sanchez/ Black Star]Ahmed Shah Massoud, leader of the Northern Alliance fighting the Taliban in Afghanistan, has been trying to get aid from the US but his people are only allowed to meet with low level US officials. In an attempt to get his message across, he addresses the European Parliament: “If President Bush doesn’t help us, these terrorists will damage the US and Europe very soon.” [Dawn (Karachi), 4/7/2001; Time, 8/12/2002] A classified US intelligence document states, “Massoud’s intelligence staff is aware that the attack against the US will be on a scale larger than the 1998 embassy bombings, which killed over two hundred people and injured thousands (see 10:35-10:39 a.m., August 7, 1998).” [Defense Intelligence Agency, 11/21/2001 pdf file] Massoud also meets privately with some CIA officials while in Europe (see Early April 2001). He tells them that his guerrilla war against the Taliban is faltering and unless the US gives a significant amount of aid, the Taliban will conquer all of Afghanistan. No more aid is forthcoming. [Washington Post, 2/23/2004]

Entity Tags: Taliban, Northern Alliance, Central Intelligence Agency, George W. Bush, Ahmed Shah Massoud

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Future 9/11 hijacker Khalid Almihdhar probably visits the closely monitored al-Qaeda communications hub in Yemen again. While it will not be reported that he is at the hub at this time, it is known that he flies from Sana’a, Yemen, to Saudi Arabia on May 26, 2001 (see May 26, 2001), and the Yemen hub is in Sana’a. [Bamford, 2008, pp. 64] Furthermore, Almihdhar’s wife, his recently born baby, and other family members live in the hub (which is run by his father-in-law Ahmed al-Hada). It would seem highly likely he would not pass through Sana’a without visiting his family. Almihdhar stayed at the hub for around a month in June 2000 (see (Mid-June-Mid-July 2000)) and then visited it again in February 2001 (see February 2001). Details of Almihdhar’s travels are unclear, but he may have traveled to Afghanistan via Iran later in February (see February 2001). He is in the United Arab Emirates and Malaysia in June 2001. [9/11 Commission, 7/24/2004, pp. 237] Each time Almihdhar visits the hub presents a great opportunity for the CIA and NSA, because they have been closely monitoring the hub for years. Phone calls to and from the hub, including ones made by Almihdhar and other 9/11 hijackers, are intercepted, rooms in the building are bugged, and spy satellites record visitors (see Late August 1998, Late 1998-Early 2002, and Early 2000-Summer 2001). Based on information gained from monitoring this house, the CIA and local intelligence services mounted a major operation against Almihdhar, other 9/11 hijackers, and several more al-Qaeda operatives in December 1999 and January 2000, when they were followed around the Middle East and South Asia and monitored during an al-Qaeda summit in Malaysia (see December 29, 1999, January 2-5, 2000, and January 5-8, 2000). So presumably US intelligence should be aware of this visit to the hub and who Almihdhar is, but what exactly is known and who may know it will not be made public.

Entity Tags: National Security Agency, Ahmed al-Hada, Central Intelligence Agency, Khalid Almihdhar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Steve Gaudin.Steve Gaudin. [Source: BBC]John O’Neill, special agent in charge of the FBI’s national security division in New York, tells FBI agent Steve Gaudin that more al-Qaeda attacks are going to occur. [Graff, 2011, pp. 259] Today, a jury convicts four men for their involvement in the bombings of the US embassies in Kenya and Tanzania in August 1998 (see 10:35-10:39 a.m., August 7, 1998 and February-July 2001). [CNN, 5/29/2001] O’Neill sat in on the closing arguments in the trial and after the verdict is given, he draws Gaudin aside. He puts his arm around the agent and tells him: “I’m sending you to a language school in Vermont. You’re gonna learn Arabic.” [Wright, 2006, pp. 339] “The case is over,” Gaudin protests, but O’Neill tells him, “No, there’s more coming.” [Graff, 2011, pp. 259] “You know this fight ain’t over,” O’Neill explains. Referring to Mohamed al-Owhali, one of the men convicted for his role in the embassy bombings, he continues: “What did al-Owhali tell you? He said, ‘We have to hit you outside so they won’t see us coming on the inside.’” [Wright, 2006, pp. 339] (Al-Owhali told Gaudin in 1998: “We have a plan to attack the US, but we’re not ready yet. We need to hit you outside the country in a couple of places so you won’t see what is going on inside. The big attack is coming. There’s nothing you can do to stop it.” [Wright, 2006, pp. 279] ) O’Neill is “the FBI’s top expert on al-Qaeda and Osama bin Laden,” according to New York magazine. [New York Magazine, 12/17/2001] According to journalist and author Murray Weiss, he has, since 1995, told any official in Washington, DC, who will listen that he is “sure bin Laden would attack on American soil.” [Weiss, 2003, pp. 360]

Entity Tags: Mohamed al-Owhali, John O’Neill, Steve Gaudin

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Steven Emerson.Steven Emerson. [Source: Publicity photo]Steven Emerson and Daniel Pipes, both experts on the Middle East and Islamist terrorism, write in the Wall Street Journal that al-Qaeda is “planning new attacks on the US.” Their article is written as a response to the recent guilty verdicts in a New York court against four men accused of planning the 1998 bombings of the US embassies in Kenya and Tanzania (see 10:35-10:39 a.m., August 7, 1998). “Unfortunately,” Emerson and Pipes write, “the trial does almost nothing to enhance the safety of Americans.… Indeed, recent information shows that al-Qaeda is not only planning new attacks on the US but is also expanding its operational range to countries such as Jordan and Israel.”
Al-Qaeda Is 'the Most Lethal Terrorist Organization Anywhere in the World' - Emerson and Pipes also write that tens of thousands of pages from the trial transcript “provide a full and revealing picture of al-Qaeda, showing it to be the most lethal terrorist organization anywhere in the world.” The transcript shows that “al-Qaeda sees the West in general, and the US in particular, as the ultimate enemy of Islam. Inspired by their victory over the Soviet Union in Afghanistan in the 1980s, the leaders of al-Qaeda aspire to a similar victory over America, hoping ultimately to bring Islamist rule here.”
Al-Qaeda Personnel Have Been Taught 'How to Destroy Large Buildings' - The article states that Osama bin Laden, the leader of al-Qaeda, has “set up a tightly organized system of cells in an array of American cities, including Brooklyn, NY; Orlando, Fla.; Dallas; Santa Clara, Calif.; Columbia, Mo.; and Herndon, Va.” Furthermore, according to Emerson and Pipes, court documents show that “[o]fficials of the Iranian government helped arrange advanced weapons and explosives training for al-Qaeda personnel in Lebanon, where they learned, for example, how to destroy large buildings.”
America Must Fight Al-Qaeda 'as We Would in a War' - Emerson and Pipes conclude that the recent trial “shows that trials alone are not enough” when dealing with al-Qaeda. They suggest that al-Qaeda operatives “are better thought of as soldiers, not criminals.” Therefore, they write, “To fight al-Qaeda and other terrorist groups… we must fight them as we would in a war.” This would mean that, “as in a conventional war, America’s armed forces, not its policemen and lawyers, are primarily deployed to protect Americans.” Furthermore, the two men opine: “If a perpetrator is not precisely known, then those who are known to harbor terrorists will be punished. This way, governments and organizations that support terrorism will pay the price, not just the individuals who carry it out.” [Wall Street Journal, 5/31/2001]
Writers Have Been Accused of Anti-Muslim Bias - Emerson and Pipes are controversial figures. Emerson, an award-winning investigative reporter, has been called “the nation’s foremost journalistic expert on terrorism” by the New York Post. [Harvard Crimson, 10/22/1999] And White House counterterrorism chief Richard Clarke called him “sort of the Paul Revere of terrorism.” But according to Brown University’s alumni magazine, he spent the 1990s “fighting to be taken seriously, and fending off charges of racism and anti-Muslim bias.” [Brown Alumni Magazine, 11/2002] Pipes, a foreign policy analyst, and commentator on terrorism and Islam, “appears regularly in the US media, where he is regarded as an authority on the Middle East,” The Guardian will report. Arab-Americans, however, “regard him as a Muslim basher and a staunch supporter of Israel.” According to The Nation, he “labored in comparative obscurity during the 1990s, writing a series of books and articles that advanced a hard line on Arab countries… and darkly warning that Muslim Americans posed a threat to the United States.” [Guardian, 9/10/2001; Nation, 4/22/2004]

Entity Tags: Al-Qaeda, Daniel Pipes, Steven Emerson

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Associates of the 9/11 hijackers call a number in Yemen also called by the radicals who bombed two US embassies in East Africa in 1998. The calls, which MSNBC says are made “in the weeks before the attacks,” are presumably to an al-Qaeda communications hub in Sana’a, Yemen, run by Ahmed al-Hada, an associate of Nairobi embassy bomber Mohamed al-Owhali (see August 4-25, 1998). The number is monitored by US intelligence at this time and is also called by the hijackers themselves (see Early 2000-Summer 2001), at least one of the calls being around this time (see (August 2001)). But it is not clear what intelligence the NSA and CIA gleaned from these calls or which associates of the hijackers make the calls. [MSNBC, 10/3/2001] However, it is thought that one of the hijackers’ associates, Ramzi bin al-Shibh, met with an associate of al-Hada’s in Yemen the year before (see Before October 12, 2000) and traveled to Yemen before the bombing of the USS Cole (see October 10-21, 2000).

Entity Tags: Ahmed al-Hada, Ramzi bin al-Shibh, National Security Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In July 2001, NSA director Michael Hayden tells a reporter that the NSA does not monitor any US citizens without court warrants from the Foreign Intelligence Surveillance Court (FISC). “We don’t do anything willy-nilly,” Hayden says. “We’re a foreign intelligence agency. We try to collect information that is of value to American decision-makers, to protect American values, America—and American lives. To suggest that we’re out there, on our own, renegade, pulling in random communications, is—is simply wrong. So everything we do is for a targeted foreign intelligence purpose. With regard to the—the question of industrial espionage, no. Period. Dot. We don’t do that.” When asked how Americans could verify that, Hayden says that they should simply trust the NSA to police and monitor itself, along with oversight from the White House and from Congress. However, it will later come to light that the NSA began illegally monitoring US citizens from the start of the Bush administration (see Spring 2001). A former NSA official will later dispute Hayden’s account. “What do you expect him to say?” the official says. “He’s got to deny it. I agree. We weren’t targeting specific people, which is what the President’s executive order does. However, we did keep tabs on some Americans we caught if there was an interest [by the White House.] That’s not legal. And I am very upset that I played a part in it.” [Truthout (.org), 1/17/2006] Hayden also denies persistent allegations from European government officials that the agency has engaged in economic espionage to help American companies against European competitors (see April 4, 2001). In March 2001, the American Civil Liberties Union’s Barry Steinhardt says that “since there is no real check on [the NSA], there is no way to know” if they are following the law. Steinhardt says that Congress is the only real check on possible NSA abuses, but it has consistently failed to exercise any sort of aggressive oversight on the agency. [CNN, 3/31/2001]

Entity Tags: National Security Agency, Barry Steinhardt, Michael Hayden, American Civil Liberties Union

Timeline Tags: Civil Liberties

The NSA monitors calls between an al-Qaeda communications hub in Yemen and one or more operatives involved in a plot to attack the US embassy in Paris. The communications hub in Yemen is run by Ahmed al-Hada, father-in-law of 9/11 hijacker Khalid Almihdhar, who is also involved in the US embassy bombings (see August 4-25, 1998), the USS Cole bombing (see Mid-August 1998-October 2000), and 9/11 (see Early 2000-Summer 2001). The Paris plot is apparently foiled based on this information, although the details are sketchy. [US News and World Report, 3/15/2004] The name of the operative or operatives who talk to the communications hub in Yemen is unknown. One candidate is Djamel Beghal, who will be arrested on July 28 (see July 24 or 28, 2001) based on a tip-off issued by the CIA to partner agencies on July 3 (see July 3, 2001). Another is Nizar Trabelsi, who will be arrested on September 13, although Trabelsi may be arrested based on information gleaned from Beghal. Both Beghal (see Spring 1998) and Trabelsi (see September 13, 2001) are connected to a plot to destroy an airliner with a shoe bomb, but this is not stopped (see December 22, 2001).

Entity Tags: Djamel Beghal, Al-Qaeda, Nizar Trabelsi, National Security Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Glyn Ford.Glyn Ford. [Source: British Labour Party]The European Parliament releases its final report on its findings about the secretive US surveillance program known as Echelon. The report, two years in the making, exhaustively details many of Echelon’s surveillance capabilities, and lists many of Echelon’s surveillance stations around the world. One of the more interesting sections of the report concerns its apparent use on behalf of US corporations. According to the report, Echelon—operated by the NSA as a highly classified surveillance program ostensibly for tracking terrorist threats and activities by nations hostile to the West—is also being used for corporate and industrial espionage, with information from the program being turned over to US corporations for their financial advantage. The report gives several instances of Echelon’s use by corporations. One is the use of Echelon to “lift… all the faxes and phone calls” between the European aircraft manufacturer Airbus and Saudi Arabian Airlines; that information was used by two American companies, Boeing and McDonnell Douglas, to outflank Airbus and win a $6 billion contract. The report also alleges that the French company Thomson-CSF lost a $1.3 billion satellite deal to Raytheon the same way. Glyn Ford, the MP who commissioned the report, says he doesn’t have a problem with Echelon itself, but in the way it is being used. “Now, you know, if we’re catching the bad guys, we’re completely in favor of that… What we’re concerned about is that some of the good guys in my constituency don’t have jobs because US corporations got an inside track on—on some global deal.” [Washington Post, 11/14/1999; CBS News, 2/27/2000; BBC, 7/6/2000; European Parliament, 7/11/2001] In 1977, the US government began providing Echelon-based intelligence to US corporations (see 1977). In April 2001, New Zealand journalist Nicky Hager testified about Echelon’s use by US allies for corporate and economic purposes (see April 2001), and former CIA director James Woolsey confirmed that US surveillance programs were used to benefit US corporations (see March 2000).

Entity Tags: US Department of Commerce, Thomson-CSF, Saudi Arabian Airlines, Glyn Ford, McDonnell Douglas, Central Intelligence Agency, Boeing Company, Echelon, Airbus, European Parliament, National Security Agency

Timeline Tags: Civil Liberties

Tom Wilshire, a CIA manager assigned to the FBI who expressed interest two months earlier in surveillance photos from the al-Qaeda Malaysia summit (see January 5-8, 2000), now finds a cable he had been looking for regarding that summit. The cable, from January 2001, discusses al-Qaeda leader Khallad bin Attash’s presence at the summit. Wilshire explains later that bin Attash’s presence there had been troubling him. He writes an e-mail to the CIA’s Counterterrorist Center (CTC), stating, “[Khallad] is a major league killer, who orchestrated the Cole attack (see October 12, 2000) and possibly the Africa bombings (see 10:35-10:39 a.m., August 7, 1998).” Yet Khallad is still not put on a terrorist watch list. Wilshire asks that the FBI be passed this information, but the FBI will not actually be given the information until August 30, a week after it learns future 9/11 hijacker Khalid Almihdhar is in the US. [US Congress, 7/24/2003, pp. 157 pdf file; US Department of Justice, 11/2004, pp. 298 pdf file] Although the CIA managers that receive this e-mail are not named, Richard Blee, in charge of the CIA’s bin Laden unit and Wilshire’s former boss, appears to be one of the recipients: On the same day Wilshire sends this e-mail, Blee writes his own e-mail entitled “Identification of Khallad,” which is sent to another CIA officer. [Central Intelligence Agency, 7/13/2001; 9/11 Commission, 7/24/2004, pp. 537] An FBI analyst assigned to the CTC is given the task of reviewing all other CIA cables about the Malaysian summit. It takes this analyst until August 21—over five weeks later—to put together that Khalid Almihdhar had a US visa and that Nawaf Alhazmi had traveled to the US. Yet other CIA agents are already well aware of these facts but are not sharing the information (see August 22, 2001). Working with immigration officials, this analyst then learns that Almihdhar entered and left the US in 2000, and entered again on July 4, 2001, and that Alhazmi appears to still be in the US. [US Congress, 7/24/2003, pp. 157 pdf file; US Department of Justice, 11/2004, pp. 298 pdf file]

Entity Tags: Tom Wilshire, Richard Blee, Nawaf Alhazmi, US Immigration and Naturalization Service, Khalid Almihdhar, Federal Bureau of Investigation, Alec Station, Khallad bin Attash, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

With the approaching third anniversary of the US embassy bombings in Africa (see 10:35-10:39 a.m., August 7, 1998), the FBI reissues a warning that overseas law enforcement agencies may be targets. It notes that although most reporting indicates a potential for attacks on US interests abroad, the possibility of an attack in the US cannot be discounted. [CNN, 3/2002; 9/11 Commission, 7/24/2004, pp. 260, 534]

Entity Tags: Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline

President Bush at his Crawford, Texas, ranch on August 6, 2001. Advisors wait with classified briefings.President Bush at his Crawford, Texas, ranch on August 6, 2001. Advisors wait with classified briefings. [Source: White House]President Bush receives a classified presidential daily briefing (PDB) at his Crawford, Texas ranch indicating that Osama bin Laden might be planning to hijack commercial airliners. The PDB provided to him is entitled, “Bin Laden Determined to Strike in US.” The entire briefing focuses on the possibility of terrorist attacks inside the US. [New York Times, 5/15/2002; Newsweek, 5/27/2002] The analysts who drafted the briefing will say that they drafted it on the CIA’s initiative (see July 13, 2004), whereas in 2004 Bush will state that he requested a briefing on the topic due to threats relating to a conference in Genoa, Italy, in July 2001, where Western intelligence agencies believed Osama bin Laden was involved in a plot to crash an airplane into a building to kill Bush and other leaders (see April 13, 2004). The analysts will later explain that they saw it as an opportunity to convey that the threat of an al-Qaeda attack in the US was both current and serious. [9/11 Commission, 7/24/2004, pp. 260] The existence of this briefing is kept secret, until it is leaked in May 2002, causing a storm of controversy (see May 15, 2002). While National Security Adviser Condoleezza Rice will claim the memo is only one and a half pages long, other accounts state it is 11 1/2 pages instead of the usual two or three. [New York Times, 5/15/2002; Newsweek, 5/27/2002; Die Zeit (Hamburg), 10/1/2002] A page and a half of the contents will be released on April 10, 2004; this reportedly is the full content of the briefing. [Washington Post, 4/10/2004] The briefing, as released, states as follows (note that the spelling of certain words are corrected and links have been added):
bullet Clandestine, foreign government, and media reports indicate bin Laden since 1997 has wanted to conduct terrorist attacks in the US (see December 1, 1998). Bin Laden implied in US television interviews in 1997 and 1998 that his followers would follow the example of World Trade Center bomber Ramzi Yousef and “bring the fighting to America” (see May 26, 1998).
bullet After US missile strikes on his base in Afghanistan in 1998, bin Laden told followers he wanted to retaliate in Washington, according to a -REDACTED-service (see December 21, 1998).
bullet An Egyptian Islamic Jihad (EIJ) operative told -REDACTED- service at the same time that bin Laden was planning to exploit the operative’s access to the US to mount a terrorist strike.
bullet The millennium plotting in Canada in 1999 may have been part of bin Laden’s first serious attempt to implement a terrorist strike in the US. Convicted plotter Ahmed Ressam has told the FBI that he conceived the idea to attack Los Angeles International Airport himself (see December 14, 1999), but that bin Laden lieutenant Abu Zubaida encouraged him and helped facilitate the operation. Ressam also said that in 1998 Abu Zubaida was planning his own US attack (see Late March-Early April 2001 and May 30, 2001).
bullet Ressam says bin Laden was aware of the Los Angeles operation.
bullet Although bin Laden has not succeeded, his attacks against the US Embassies in Kenya and Tanzania in 1998 (see 10:35-10:39 a.m., August 7, 1998) demonstrate that he prepares operations years in advance and is not deterred by setbacks. Bin Laden associates surveyed our embassies in Nairobi and Dar es Salaam as early as 1993 (see Late 1993-Late 1994), and some members of the Nairobi cell planning the bombings were arrested and deported in 1997.
bullet Al-Qaeda members—including some who are US citizens—have resided in or traveled to the US for years, and the group apparently maintains a support structure that could aid attacks (see January 25, 2001). Two al-Qaeda members found guilty in the conspiracy to bomb our embassies in East Africa were US citizens (see September 15, 1998), and a senior EIJ member lived in California in the mid-1990s (see November 1989 and September 10, 1998).
bullet A clandestine source said in 1998 that a bin Laden cell in New York was recruiting Muslim-American youth for attacks (see October-November 1998).
bullet “We have not been able to corroborate some of the more sensational threat reporting, such as that from a [REDACTED] service in 1998 saying that bin Laden wanted to hijack a US aircraft to gain the release of ‘Blind Sheikh’ Omar Abdul-Rahman and other US-held extremists” (see 1998, December 4, 1998, and May 23, 2001). [9/11 Commission, 7/24/2004, pp. 223] According to the Washington Post, this information came from a British service. [Washington Post, 5/18/2002]
bullet Nevertheless, FBI information since that time indicates patterns of suspicious activity in this country consistent with preparations for hijackings or other types of attacks, including recent surveillance of federal buildings in New York (see May 30, 2001).
bullet The FBI is conducting approximately 70 full-field investigations throughout the US that it considers bin Laden-related (see August 6, 2001). CIA and the FBI are investigating a call to our embassy in the UAE in May saying that a group or bin Laden supporters was in the US planning attacks with explosives (see May 16-17, 2001). [9/11 Commission, 7/24/2004, pp. 223]
In retrospect, the briefing is remarkable for the many warnings that apparently are not included (see for instance, from the summer of 2001 prior to August alone: May 2001, June 2001, June 12, 2001, June 19, 2001, Late Summer 2001, July 2001, July 16, 2001, Late July 2001, Late July 2001, Summer 2001, June 30-July 1, 2001, July 10, 2001, and Early August 2001). According to one account, after the PDB has been given to him, Bush tells the CIA briefer, “You’ve covered your ass now” (see August 6, 2001). Incredibly, the New York Times later reports that after being given the briefing, Bush “[breaks] off from work early and [spends] most of the day fishing.” [New York Times, 5/25/2002] In 2002 and again in 2004, National Security Adviser Rice will incorrectly claim under oath that the briefing only contained historical information from 1998 and before (see May 16, 2002 and April 8, 2004).

Entity Tags: George W. Bush, Islamic Jihad, Omar Abdul-Rahman, Federal Bureau of Investigation, Los Angeles International Airport, Condoleezza Rice, Abu Zubaida, Al-Qaeda, World Trade Center, Central Intelligence Agency, 9/11 Commission, Ahmed Ressam, Ramzi Yousef, Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

John O’Neill.
John O’Neill. [Source: FBI]An article in the New York Times reveals that the FBI has launched an internal investigation of John O’Neill, one of its most senior counterterrorism officials, for losing a briefcase that contained highly classified information. [New York Times, 8/19/2001] O’Neill, special agent in charge of the FBI’s national security division in New York, had his briefcase, which contained his division’s annual field office report, stolen when he left it unattended during a conference in Orlando, Florida, in July 2000 (see July 2000). The briefcase was found a few hours later with the report still in it. [Wright, 2006, pp. 317; Graff, 2011, pp. 260] However, the FBI’s Office of Professional Responsibility immediately launched an investigation to determine whether any criminal charges should be brought against O’Neill. [Weiss, 2003, pp. 281] That investigation recently ended with a decision not to prosecute, but the FBI’s internal affairs unit subsequently began an investigation to determine whether O’Neill had violated FBI rules. According to the Times: “FBI officials were alarmed, in part, because of the sensitivity of the documents involved, including details about the bureau’s counterterrorism and counterintelligence operations. One document contained highly sensitive information about an FBI source.” [New York Times, 8/19/2001]
Story Appears Timed to Stop O'Neill Getting a Job on the NSC - The New Yorker will later comment that the leaking of the details of the FBI investigation to the Times “seemed to be timed to destroy O’Neill’s chance of being confirmed for [a National Security Council] job.” The leak was “somebody being pretty vicious to John,” Thomas Pickard, acting FBI director, will say. [New Yorker, 1/14/2002]
Several Officials Will Be Suspected of Being the Article's Source - A number of people will be suspected of leaking the details of the investigation to the Times. [Weiss, 2003, pp. 347] O’Neill will suspect Pickard. The acting director “was out to get John for a long time and John never really knew why,” Valerie James, O’Neill’s longtime girlfriend, will say. Pickard will deny being the leaker, though, when O’Neill confronts him about the issue. [PBS, 10/3/2002] Other possible sources of the leak, according to journalist and author Murray Weiss, include Dale Watson, assistant director of the FBI’s counterterrorism division; Barbara Bodine, the US ambassador to Yemen; and Richard Clarke, the White House counterterrorism chief. [Weiss, 2003, pp. 347]
O'Neill Has Overseen Major Terrorism Investigations - O’Neill’s job is among the most powerful in the FBI, and O’Neill has overseen cases such as the bombings of the US embassies in Kenya and Tanzania in August 1998 (see 10:35-10:39 a.m., August 7, 1998), and the attack on the USS Cole in Yemen in October 2000 (see October 12, 2000). [New York Times, 8/19/2001] He is the FBI’s “most committed tracker of Osama bin Laden and his al-Qaeda network of terrorists,” according to the New Yorker. But he will retire from the FBI on August 22 and take up a new job as head of security at the World Trade Center a day later (see August 22, 2001 and August 23, 2001). [New Yorker, 1/14/2002; Weiss, 2003, pp. 349-350]

Entity Tags: Valerie James, John O’Neill, Federal Bureau of Investigation, Office of Professional Responsibility, Barbara Bodine, Dale Watson, Thomas Pickard, Richard A. Clarke

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

FBI headquarters agent Dina Corsi asks the FBI’s New York field office to open an intelligence investigation into future 9/11 hijacker Khalid Almihdhar and locate him in the US. Corsi’s written request mentions Almihdhar’s arrival in the US in July 2001 (see July 4, 2001), his previous travel to the US in January 2000 with Nawaf Alhazmi (see January 15, 2000), his attendance at al-Qaeda’s Malaysia summit (see January 5-8, 2000), his association with an al-Qaeda communications hub in Yemen (see Early 2000-Summer 2001), and similarities between his travel and that of Fahad al-Quso, Ibrahim al-Thawar (a.k.a. Nibras), and Khallad bin Attash (see January 13, 2000), operatives involved in the bombing of the USS Cole. Corsi does not mention that the CIA knows bin Attash also attended the Malaysia summit, as this information has not officially been passed to the FBI yet. [US Department of Justice, 11/2004, pp. 304 pdf file]

Entity Tags: Usama bin Laden Unit (FBI), Khallad bin Attash, Ibrahim al-Thawar, FBI Headquarters, Khalid Almihdhar, Dina Corsi, Fahad al-Quso

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Patrick Philbin.Patrick Philbin. [Source: Daylife (.com)]Patrick Philbin joins the Justice Department’s Office of Legal Counsel (OLC). Philbin is an old friend and colleague of the OLC’s John Yoo; both graduated from Yale and both clerked for Judge Laurence Silberman and Supreme Court Justice Clarence Thomas. Philbin has no experience in the legalities surrounding national security issues; he spent the 1990s working for a corporate law firm helping telecommunications companies sue the Federal Communications Commission. Philbin joins the OLC with the expectation of working solely with administrative law. But after the 9/11 attacks, he will be asked to help Yoo handle the unexpected raft of national security issues. His first real work in the area of national security will be his finding (see November 6, 2001) that the president has untrammeled power to order the establishment of military commissions (see Late October 2001 and November 13, 2001). [Savage, 2007, pp. 136]

Entity Tags: John C. Yoo, US Department of Justice, Patrick F. Philbin, Office of Legal Counsel (DOJ)

Timeline Tags: Civil Liberties

An Echelon station in Menwith Hill, Britain.An Echelon station in Menwith Hill, Britain. [Source: BBC]By the 1980s, a high-tech global electronic surveillance network shared between the US, Britain, Canada, Australia, and New Zealand is gathering intelligence all over the world. The BBC describes Echelon’s power as “astounding,” and elaborates: “Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. They are looking for evidence of international crime, like terrorism.” [BBC, 11/3/1999] One major focus for Echelon before 9/11 is al-Qaeda. For instance, one account mentions Echelon intercepting al-Qaeda communications in Southeast Asia in 1996 (see Before September 11, 2001). A staff member of the National Security Council who regularly attends briefings on bin Laden states, “We are probably tapped into every hotel room in Pakistan. We can listen in to just about every phone call in Afghanistan.” However, he and other critics will claim one reason why US intelligence failed to stop terrorism before 9/11 was because there was too much of a focus on electronic intelligence gathering and not enough focus on human interpretation of that vast data collection. [Toronto Star, 2/2/2002]

Entity Tags: United Kingdom, United States, Osama bin Laden, Echelon, National Security Council, Canada, Australia, Al-Qaeda, New Zealand

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Abdulaziz Alomari (a passport stamp overlaps part of his face).Abdulaziz Alomari (a passport stamp overlaps part of his face). [Source: FBI]Having spent the previous night at the Comfort Inn in Portland, Maine (see September 10, 2001), hijackers Mohamed Atta and Abdulaziz Alomari check out at 5:33 a.m. and drive their rented Nissan to the nearby Portland International Jetport Airport, entering its parking lot at 5:40 a.m. The FBI will later seize their car there. [Observer, 9/16/2001; Portland Press Herald, 10/5/2001; Federal Bureau of Investigation, 10/5/2001; Newsday, 4/17/2006] Their flight is due to take off for Boston at 6:00 a.m. (see (6:00 a.m.) September 11, 2001). The Boston Globe points out, “Any significant delay would foil [Atta’s] big plans for the day.” [Boston Globe, 9/16/2001] The 9/11 Commission later concludes: “The Portland detour almost prevented Atta and Omari from making Flight 11 out of Boston.” [9/11 Commission, 6/16/2004]

Entity Tags: Abdulaziz Alomari, Portland International Jetport, Mohamed Atta

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Michael Tuohey.Michael Tuohey. [Source: CNN]9/11 hijackers Mohamed Atta and Abdulaziz Alomari check in at the US Airways counter at Portland International Jetport. [Portland Press Herald, 10/5/2001; Federal Bureau of Investigation, 10/5/2001] They are wearing ties and jackets. Atta checks in two bags, Alomari none. Atta is randomly selected for additional security scrutiny by the FAA’s Computer Assisted Passenger Prescreening System (CAPPS) (see (6:20 a.m.-7:48 a.m.) September 11, 2001). However, the only consequence is that his checked bags will be held off the plane until it is confirmed that he has boarded. [9/11 Commission, 7/24/2004, pp. 1; 9/11 Commission, 8/26/2004, pp. 2; CNN, 3/3/2006] Noting that their flight is soon due to leave, the ticket agent who checks them in, Michael Tuohey, says, “You’re cutting it close.” [Portland Press Herald, 3/6/2005] Tuohey thinks the pair seems unusual. He notices they both have $2,500 first-class, one-way tickets. He later comments, “You don’t see many of those.” Atta looks “like a walking corpse. He looked so angry.” In contrast, Tuohey will say, Alomari can barely speak English and has “a goofy smile, I can’t believe he knew he was going to die that day.” Tuohey will later recount, “I thought they looked like two Arab terrorists but then I berated myself for the stereotype and did nothing.” [Philadelphia Daily News, 2/24/2005; Mirror, 9/11/2005; CNN, 3/3/2006] Atta becomes angry when Tuohey informs him he will have to check in again in Boston. He complains that he was assured he would have a “one-step check-in.” [9/11 Commission, 8/26/2004, pp. 2; Associated Press, 3/7/2005] Tuohey will be recalled to work later in the day to speak to an FBI agent about his encounter with Atta and Alomari. He is shown video footage of them passing through the airport’s security checkpoint upstairs (see (Between 5:45 a.m. and 5:53 a.m.) September 11, 2001). Although recognizing the two men, he notices that in the video they are no longer wearing the jackets and ties they’d had on when checking in just minutes before. He assumes they must have taken these off and tucked them into their carry-on baggage. He is also informed that the security camera behind his own desk, which should have captured the two hijackers, has in fact been out of order for some time. [Portland Press Herald, 3/6/2005; CNN, 3/3/2006]

Entity Tags: Federal Aviation Administration, Computer Assisted Passenger Prescreening System, Mohamed Atta, Portland International Jetport, Abdulaziz Alomari, Michael Tuohey

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

All the alleged 9/11 hijackers reportedly check in at the airports from where they board Flights 11, 175, 77, and 93. [9/11 Commission, 7/24/2004, pp. 1-4; 9/11 Commission, 8/26/2004, pp. 27, 89, 93] Since 1998, the FAA has required air carriers to implement a program called the Computer Assisted Passenger Prescreening System (CAPPS). This identifies those passengers who might be a security risk, based upon suspicious behavior such as buying one-way tickets or paying with cash. CAPPS also randomly assigns some passengers to receive additional security scrutiny. If a particular passenger has been designated as a “selectee,” this information is transmitted to the airport’s check-in counter, where a code is printed on their boarding pass. At the airport’s security checkpoints, selectees are subjected to additional security measures. [US News and World Report, 4/1/2002; 9/11 Commission, 1/27/2004; US Congress, 3/17/2004; 9/11 Commission, 8/26/2004, pp. 2, 85] Their baggage is to be screened for explosives or held off the plane until they have boarded. Supposedly, the thinking behind this is that someone smuggling a bomb onto a plane won’t get onto that same flight. According to the 9/11 Commission, nine of the 19 hijackers are flagged by the CAPPS system before boarding Flights 11, 175, 77, and 93. [Washington Post, 1/28/2004; 9/11 Commission, 7/24/2004, pp. 84; United States of America v. Zacarias Moussaoui, a/k/a Shaqil, a/k/a Abu Khalid al Sahrawi, Defendant, 3/6/2006] In addition, Mohamed Atta was selected when he checked in at the airport in Portland, for his earlier connecting flight to Boston (see 5:33 a.m.-5:40 a.m. September 11, 2001). All of the hijackers subsequently pass through security checkpoints before boarding their flights. [9/11 Commission, 7/24/2004, pp. 1-4]

Entity Tags: Federal Aviation Administration, Computer Assisted Passenger Prescreening System

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

During this period, all five Flight 11 hijackers check in at Boston’s Logan Airport and board their plane, bound for Los Angeles. The FAA has a program in place called the Computer Assisted Passenger Prescreening System (CAPPS), which is designed to identify those passengers most likely requiring additional scrutiny by airport security (see (6:20 a.m.-7:48 a.m.) September 11, 2001). Ticket records will show that CAPPS selects three of the Flight 11 hijackers at Logan: Since Waleed Alshehri checks no bags his selection has no consequences; Wail Alshehri and Satam Al Suqami have their bags scanned for explosives, but are not stopped. All five hijackers would need to pass through a security checkpoint to reach the departure gate for their flight. Each would have been screened as they walked through a metal detector calibrated to detect items with at least the metal content of a small-caliber handgun. If they’d set this off, they would have been screened with a handheld metal detector. An X-ray machine would have screened their carry-on luggage. However, Logan Airport has no video surveillance of its security checkpoints (see 1991-2000), so there is no documentary evidence of exactly when they pass through them, or if alarms are triggered. According to the 9/11 Commission, none of the checkpoint supervisors later recall seeing any of the Flights 11 hijackers, or report anything suspicious having occurred. [9/11 Commission, 1/27/2004; 9/11 Commission, 7/24/2004, pp. 1-2; 9/11 Commission, 8/26/2004, pp. 5-6] However, a WorldNetDaily article will claim that some Logan staff members recall seeing Mohamed Atta (see (6:50 a.m.-7:40 a.m.) September 11, 2001). [WorldNetDaily, 9/21/2001] The Boston Globe will later comment, “aviation specialists have said it is unlikely that more rigorous attention to existing rules would have thwarted the 10 hijackers who boarded two jets at Logan on Sept. 11. At the time, the knives and box-cutters they were carrying were permitted.” [Boston Globe, 10/17/2001]

Entity Tags: Satam Al Suqami, Computer Assisted Passenger Prescreening System, Wail Alshehri, Federal Aviation Administration, Logan International Airport, Waleed Alshehri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

According to the 9/11 Commission, between 7:03 a.m. and 7:39 a.m. the four alleged Flight 93 hijackers check in at the United Airlines ticket counter at Newark (New Jersey) Liberty International Airport. Only Ahmad Alhaznawi is selected for additional scrutiny by airport security under the FAA’s CAPPS program (see (6:20 a.m.-7:48 a.m.) September 11, 2001). The only consequence is that his checked bag is screened for explosives, and not loaded onto the plane until it is confirmed that he has boarded. [9/11 Commission, 1/27/2004; 9/11 Commission, 7/24/2004, pp. 4; 9/11 Commission, 8/26/2004, pp. 35] On their way to boarding the plane, all four would pass through a security checkpoint, which has three walk-through metal detectors, two X-ray machines, and explosive trace detection equipment. [9/11 Commission, 8/26/2004, pp. 97] The 9/11 Commission later claims Newark Airport has no video cameras monitoring its security checkpoints, so there is no documentary evidence showing when the hijackers passed through the checkpoint or what alarms may have been triggered. [9/11 Commission, 7/24/2004, pp. 4; 9/11 Commission, 8/26/2004, pp. 35] However, Michael Taylor, the president of a security company, who has done consulting work for the New York Port Authority (which operates the airport), claims that Newark does use security cameras at the time of 9/11. [Boston Herald, 9/29/2001] All of the screeners on duty at the checkpoint are subsequently interviewed, and none report anything unusual or suspicious having occurred. [9/11 Commission, 7/24/2004, pp. 4; 9/11 Commission, 8/26/2004, pp. 35] The 9/11 Commission later concludes that the passports of Ahmad Alhaznawi and fellow Flight 93 hijacker Ahmed Alnami have suspicious indicators and could have been linked to al-Qaeda, but it does not elaborate on this. [Baltimore Sun, 1/27/2004]

Entity Tags: Ahmed Alnami, Al-Qaeda, Newark International Airport, Federal Aviation Administration, Ahmed Alhaznawi, United Airlines, Computer Assisted Passenger Prescreening System

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Within the headquarters of the National Security Agency (NSA) in Fort Meade, Maryland is a little-known unit called the Defense Special Missile and Astronautics Center (DEFSMAC). According to author James Bamford, who is an expert on the NSA, the center’s purpose is “to serve as the nation’s chief warning bell for a planned attack on America. It serves as the focal point for ‘all-source’ intelligence—listening posts, early-warning satellites, human agents, and seismic detectors.” According to one former NSA official, DEFSMAC “has all the inputs from all the assets, and is a warning activity. They probably have a better feel for any worldwide threat to this country from missiles, aircraft, or overt military activities, better and more timely, at instant fingertip availability, than any group in the United States.” If they received indications that an attack was imminent, DEFSMAC officials could “immediately send out near-real-time and in-depth, all-source intelligence alerts to almost 200 ‘customers,’ including the White House Situation Room, the National Military Command Center at the Pentagon, the [Defense Intelligence Agency] Alert Center, and listening posts around the world.” Its analysts could be “closely monitoring all intercepts flooding in; examining the latest overhead photography; and analyzing data from early-warning satellites 22,300 miles above the equator. DEFSMAC would then flash the intelligence to the US Strategic Command at Offutt Air Force Base in Nebraska, NORAD at Cheyenne Mountain in Colorado, and other emergency command centers.” But on this morning, as Bamford will conclude, “DEFSMAC learned of the massive airborne attacks after the fact—not from America’s multibillion-dollar spy satellites or its worldwide network of advanced listening posts, or its army of human spies, but from a dusty, off-the-shelf TV set.” [Bamford, 2004, pp. 33-35] The NSA had in fact intercepted numerous calls between some of the hijackers in the US and an al-Qaeda communications hub in Yemen, beginning in early 2000 and ending just weeks before 9/11 (see Early 2000-Summer 2001). [MSNBC, 7/21/2004] It also intercepted two messages in Arabic on September 10, stating, “The match is about to begin,” and “Tomorrow is zero hour,” but these are supposedly not translated until September 12 (see September 10, 2001). [Washington Post, 6/20/2002] The NSA even intercepted a series of communications between 9/11 mastermind Khalid Shaikh Mohammed (KSM) and lead 9/11 hijacker Mohamed Atta beginning in the summer of 2001 (see Summer 2001), continuing to a message where KSM gives Atta the final go-ahead for the attacks on September 10, 2001 (see September 10, 2001). Michael Hayden, the director of the NSA, will later claim that the “NSA had no [indications] that al-Qaeda was specifically targeting New York and Washington… or even that it was planning an attack on US soil” (see October 17, 2002). [National Journal, 6/19/2006]

Entity Tags: National Security Agency, Michael Hayden, Defense Special Missile and Astronautics Center, James Bamford

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Counterterrorism “tsar” Richard Clarke, who is in the White House Situation Room, instructs that US embassies overseas be closed and that US military bases raise their alert level. According to his own recollection, just after he has spoken to the acting Chairman of the Joint Chiefs of Staff Richard Myers (see 9:28 a.m. September 11, 2001), Clarke is thinking about the simultaneous attacks on the US embassies in Kenya and Tanzania in 1998 (see 10:35-10:39 a.m., August 7, 1998). As he describes, “There was the possibility now of multiple simultaneous attacks in several countries.” He therefore issues instructions to the State Department and the Department of Defense: “We have to assume there will be simultaneous attacks on us overseas. We need to close the embassies. Move [Department of Defense] bases to combat Threatcon.” [Clarke, 2004, pp. 5-6] (“Threatcon” is short for “terrorist threat condition.” [Slate, 9/12/2001] ) According to CNN, all US military forces will be ordered to the highest alert level at 10:10 a.m. (see (Between 10:10 a.m. and 10:35 a.m.) September 11, 2001). [CNN, 9/4/2002] But the 9/11 Commission Report will state that Secretary of Defense Donald Rumsfeld only orders the US armed forces to Defcon 3, an increased state of readiness, at 10:43 a.m. (see (10:43 a.m.-10:52 a.m.) September 11, 2001). [9/11 Commission, 7/24/2004, pp. 326 and 554] The State Department will tell US embassies to make the decision whether to close based on their own local security requirements. Around 50 US embassies or consulates around the world will therefore close, though at what time they do so is unstated. [US Department of State, 9/12/2001]

Entity Tags: Richard A. Clarke

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

When a housekeeper at the Park Inn in Boston, where 9/11 hijackers Wail and Waleed Alshehri stayed before the attacks, attempts to clean their room, a “male of foreign descent” tells her she should not clean it yet and should return in the early afternoon, as someone is still asleep there. The hijackers are thought to have left the hotel and checked in for their flights several hours previously (see (6:20 a.m.-7:48 a.m.) September 11, 2001). The male’s identity is unknown and the housekeeper’s story appears to confuse the FBI, as an entry about it in an FBI timeline drafted after the attacks ends with five question marks. [Federal Bureau of Investigation, 10/2001, pp. 292 pdf file]

Entity Tags: Wail Alshehri, Waleed Alshehri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

David Addington.David Addington. [Source: David Bohrer / White House]According to an in-depth examination by the Washington Post, within hours of the 9/11 attacks, Vice President Dick Cheney begins working to secure additional powers for the White House. Cheney had plans in place to begin acquiring these powers for the executive branch before the attacks, but had not begun to execute them.
Gathering the Team - David Addington, Cheney’s general counsel and legal adviser, had been walking home after having to leave the now-evacuated Eisenhower Executive Office Building. He receives a message from the White House telling him to turn around, because the vice president needs him. After Addington joins Cheney in the Presidential Emergency Operations Center (PEOC) below the East Wing of the White House, the pair reportedly begin “contemplating the founding question of the legal revolution to come: What extraordinary powers will the president need for his response?” Later in the day, Addington connects by secure video with Timothy Flanigan, the deputy White House counsel, who is in the White House Situation Room. John Yoo, the deputy chief of the Office of Legal Counsel, is also patched in from the Justice Department’s command center. White House counsel Alberto Gonzales joins them later. This forms the core legal team that Cheney will oversee after the terrorist attacks. Associate White House counsel Bradford Berenson will later recall: “Addington, Flanigan and Gonzales were really a triumvirate. [Yoo] was a supporting player.” Addington dominates the group. Gonzales is there primarily because of his relationship with President Bush. He is not, Yoo will later recall, “a law-of-war expert and [doesn’t] have very developed views.” Along with these allies, Cheney will provide what the Washington Post calls “the rationale and political muscle to drive far-reaching legal changes through the White House, the Justice Department, and the Pentagon,” which will free the president to fight the war on terror, “as he saw fit.”
Drafting the AUMF - The team begins drafting the document that will become the Authorization to Use Military Force (AUMF—see October 10, 2002) passed by Congress for the assault on Afghanistan. In the words of the group, the president is authorized “to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States.”
Extraordinarily Broad Language - The language is extraordinarily broad; Yoo will later explain that they chose such sweeping language because “this war was so different, you can’t predict what might come up.” The AUMF draft is the first of numerous attempts to secure broad powers for the presidency, most justified by the 9/11 attacks. The Washington Post will later report, “In fact, the triumvirate knew very well what would come next: the interception—without a warrant—of communications to and from the United States” (see September 25, 2001). [CNN, 9/11/2001; CNN, 9/12/2001; Unger, 2007, pp. 220-221; Washington Post, 6/24/2007]

Entity Tags: Richard (“Dick”) Cheney, John C. Yoo, Timothy E. Flanigan, Craig Unger, Bradford Berenson, David S. Addington, Alberto R. Gonzales

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

President Bush asks Mike Morell, his CIA briefer, who is responsible for today’s attacks on the US and Morell says he is sure al-Qaeda is to blame. About 15 minutes after Air Force One left Barksdale Air Force Base (see 1:37 p.m. September 11, 2001), White House chief of staff Andrew Card enters the staff section of the plane, where Morell is seated, and tells Morell that the president wants to see him. Morell goes to Bush’s office, where he then sits alone with the president and Card.
CIA Briefer Says He'd Bet Al-Qaeda Was behind the Attacks - Bush wants to know who Morell thinks is responsible for today’s attacks. “Michael, who did this?” he asks. Morell explains that he doesn’t have any intelligence indicating who is to blame, so he will simply provide his personal opinion. “I said that there were two countries capable of carrying out an attack like this, Iran and Iraq, but I believed both would have everything to lose and nothing to gain from the attack,” he will later recall. The culprit was almost certainly a non-state actor, he says, adding that he has no doubt that the trail of evidence will lead to the doorstep of Osama bin Laden and al-Qaeda. “I’d bet my children’s future on that,” he says.
Briefer Is Unsure How Long It Will Take to Determine Who Is Responsible - “When will we know?” Bush asks. Morell replies, “I can’t say for sure,” and then goes over some recent terrorist attacks and says how long it took the CIA to determine, with any certainty, who was responsible. He says that in the case of the 1998 bombings of the US embassies in Kenya and Tanzania (see 10:35-10:39 a.m., August 7, 1998), it took a couple of days; with the bombing of the USS Cole in Yemen in 2000 (see October 12, 2000), it took a couple of months; but with the 1996 bombing of the Khobar Towers in Saudi Arabia (see June 25, 1996), it had taken over a year. He says the CIA may know soon who is to blame for today’s attacks, but then again it might take some time. Bush says nothing in response once Morell has finished giving his views on who is responsible for today’s attacks and the men sit in silence for a while. Finally, Morell asks, “Is there anything else, Mr. President?” and Bush replies, “No, Michael, thank you.” Morell then returns to his seat in the staff section of the plane. [Studies in Intelligence, 9/2006 pdf file; Morell and Harlow, 2015, pp. 55-56; Politico Magazine, 9/9/2016] Bush will learn that the CIA has linked al-Qaeda to today’s attacks later this afternoon, after Air Force One lands at Offutt Air Force Base in Nebraska (see 2:50 p.m. September 11, 2001). During a video teleconference, CIA Director George Tenet will tell him that early signs indicate the terrorist group is behind the attacks (see (3:15 p.m.) September 11, 2001). [9/11 Commission, 7/24/2004, pp. 326; Bowden, 2012, pp. 17-18]

Entity Tags: Michael J. Morell, George W. Bush, Andrew Card

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Logo of the International Islamic Relief Organization.Logo of the International Islamic Relief Organization. [Source: International Islamic Relief Organization]A man is questioned by the police after being noticed behaving suspiciously near the Capitol building in Washington, DC, and found to belong to an organization with links to terrorism. Suspicions are raised about the man after he is observed following members of the press around the Capitol building and trying to listen in on their conversations. The man is subsequently held by the Capitol Police and questioned. His name is found to be “Shaykh M. Zacharias,” according to an FAA log. He is a member of the International Islamic Relief Organization (IIRO), is employed by a non-governmental organization in Nairobi, Kenya, and is “somehow connected” to the bombing of the US embassy in Nairobi in August 1998 (see 10:35-10:39 a.m., August 7, 1998). The police have permission to search his hotel room, according to the FAA log. Further details of what, if anything, inquiries into the man discover are unstated. [Federal Aviation Administration, 9/11/2001] The IIRO, of which he is a member, is a charity funded by the Saudi Arabian government and private Saudi individuals. [Emerson, 2002, pp. 157] Police believe it is a front for financing terrorism. [Los Angeles Times, 6/24/2002]

Entity Tags: US Capitol Police

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Shortly after the 9/11 attacks, the NSA expands surveillance operations, relying on its own authorities; some sources indicate this includes a massive domestic data mining and call tracking program, and some contend that it is illegal. In a 2006 public briefing, NSA Director Michael Hayden will say, “In the days after 9/11, NSA was using its authorities and its judgment to appropriately respond to the most catastrophic attack on the homeland in the history of the nation.” Following an October 1 briefing by Hayden to the House Intelligence Committee, Representative Nancy Pelosi (D-CA) will write to Hayden on October 11, saying, “[Y]ou indicated that you had been operating since the September 11 attacks with an expansive view of your authorities with respect to the conduct of electronic surveillance” (see October 11, 2001). Some evidence indicates NSA domestic surveillance began even before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001). [Nancy Pelosi, 1/6/2006; Michael Hayden, 1/23/2006]
No Connection to Bush-Authorized Warrantless Domestic Call Monitoring - In his 2006 remarks, Hayden will clearly distinguish between the expansion he initiates under his own authorities, and the warrantless monitoring of calls with one end outside the US authorized later by President Bush (see October 4, 2001), saying, “[E]xcept that they involved NSA, these [Hayden-authorized] programs were not related… to the authorization that the president has recently spoken about.” [Michael Hayden, 1/23/2006]
'Stellar Wind' Is Name of Hayden-Authorized Program - In 2012 interviews, former NSA official William Binney will indicate that “Stellar Wind” is the name of the surveillance program initiated by Hayden. [Wired News, 2/15/2012; Democracy Now!, 4/20/2012] Some sources will refer to the Bush-authorized eavesdropping as being part of the Stellar Wind program. [Newsweek, 12/22/2008]
Differing Views on Authority for Surveillance - In his 2006 briefing, Hayden will say the Fourth Amendment only protects Americans against “unreasonable search and seizure,” and that 9/11 changed what was to be considered “reasonable.” Specifically, if communications are believed to have “[i]nherent foreign intelligence value,” interception of these communications is reasonable. In addition to referring to Hayden’s “view of [his] authorities” as “expansive,” Pelosi’s letter will give another indication that the NSA’s new standard is significantly broader than it was previously, stating, “You indicated that you were treating as a matter of first impression, [redacted] being of foreign intelligence interest.” Hayden will publicly clarify in 2006 that the authority for the NSA’s operational expansion exists under an Executive Order issued by President Reagan, saying, “These decisions were easily within my authorities as the director of NSA under and [sic] executive order; known as Executive Order 12333.” And, he will say, “I briefed the entire House Intelligence Committee on the 1st of October on what we had done under our previously existing authorities” (see October 1, 2001). In her October 11 letter, Pelosi will also write of having concerns about the program that haven’t been resolved due to restrictions on information-sharing with Congress imposed by Bush (see October 11, 2001). Binney, who pioneered the development of certain NSA data mining and surveillance technologies, will come to believe that what the NSA is doing is unconstitutional; he will first take his concerns to Congress (see Before October 31, 2001) and then resign on October 31 (see October 31, 2001). [Nancy Pelosi, 1/6/2006; Michael Hayden, 1/23/2006]
Surveillance Involves Domestic Communications - In his 2006 remarks, Hayden will not say the NSA is only targeting foreign communications under his post-9/11 authorization. Rather, the context of his remarks will indicate he is referring to domestic communications. More specifically, Hayden will state: “If the US person information isn’t relevant, the data is suppressed. It’s a technical term we use; we call it ‘minimized.’ The individual is not even mentioned. Or if he or she is, he or she is referred to as ‘US Person Number One’ or ‘US Person Number Two.’ Now, inherent intelligence value. If the US person is actually the named terrorist, well, that could be a different matter.” Hayden will also reveal that information is being passed to the FBI, an investigative agency with a primarily domestic jurisdiction, saying, “[A]s another part of our adjustment, we also turned on the spigot of NSA reporting to FBI in, frankly, an unprecedented way.” [Michael Hayden, 1/23/2006] One of Pelosi’s statements in her letter to Hayden may indicate an aspect of the domestic component: “You indicated that you were treating as a matter of first impression, [redacted] being of foreign intelligence interest,” she will write. [Nancy Pelosi, 1/6/2006] In a 2011 interview with Jane Mayer published in the New Yorker, Binney will say the NSA was obtaining “billing records on US citizens” and “putting pen registers [call logs] on everyone in the country.” [New Yorker, 5/23/2011] And in a 2012 Wired article, NSA expert James Bamford will write that Binney “explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore. If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law. Instead it chose to put the wiretapping rooms at key junction points throughout the country—large, windowless buildings known as switches—thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US.” Binney’s account is supported by other sources (see October 2001). [Wired News, 2/15/2012]
Surveillance Program Is Massive - Bamford, citing Binney, will write: “Stellar Wind… included not just eavesdropping on domestic phone calls but the inspection of domestic email. At the outset the program recorded 320 million calls a day, he says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts.” It is unclear exactly when this level of surveillance began. According to whistleblower AT&T employee Mark Klein, construction of secret rooms splitting communications traffic does not begin until Fall 2002 (see Fall 2002). Bamford will write that Binney says, “[T]he taps in the secret rooms dotting the country are actually powered by highly sophisticated software programs that conduct ‘deep packet inspection,’ examining Internet traffic as it passes through the 10-gigabit-per-second cables at the speed of light.” [Wired News, 2/15/2012] Also, Binney’s remark to Jane Mayer that the NSA was “putting pen registers on everyone in the country” indicates the broad scope of the program. [New Yorker, 5/23/2011]

Entity Tags: Religious Society of Friends (Quakers), US Department of Justice, National Security Agency, George W. Bush, Michael Hayden, Al-Qaeda, Foreign Intelligence Surveillance Court, House Intelligence Committee, Nancy Pelosi, Ronald Reagan

Timeline Tags: Civil Liberties

NSA director Michael Hayden addresses the NSA in a global videoconference, saying that the NSA, like other government agencies, will have to do more to protect the country from further terrorist attacks. The challenge, he says, is to balance Americans’ security with civil liberties, “to keep America free by making Americans feel safe again.” Hayden will say in a 2006 speech reflecting on that videoconference (see January 23, 2006) that US citizens operate under misconceptions about the NSA’s capabilities—that while citizens believe the NSA has a global electronic surveillance network that can, and does, spy on citizens willy-nilly, in reality the NSA is understaffed and unprepared to handle the technological advances of the last decade. Hayden will say that with more extensive domestic surveillance of US citizens and foreign visitors, the NSA could have caught some of the 9/11 hijackers before they were able to put their plan into motion. The standards by which US citizens and foreign visitors are monitored must change, Hayden believes.
Expansion of NSA Surveillance Powers - Using Ronald Reagan’s 1981 executive order 12333 (see December 4, 1981), Hayden expands the NSA’s domestic surveillance practices to eavesdrop, sometimes without court approval, on selected international calls made by US citizens. Though Hayden’s expansion of NSA surveillance is not directly authorized by President Bush, and is not the same program as authorized by Bush’s secret executive order of 2002 (see Early 2002), Hayden will later say that this expansion is based on the intelligence community’s assessment “of a serious and continuing threat to the homeland.” Hayden’s program is reviewed and approved by lawyers at the NSA, the Justice Department, and the White House, as well as Attorney General John Ashcroft. [Michael Hayden, 1/23/2006]
Domestic Surveillance Began Before 9/11? - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, US Department of Justice, National Security Agency, John Ashcroft, George W. Bush, Bush administration (43), Ronald Reagan, Michael Hayden

Timeline Tags: Civil Liberties

The US Congress adopts a joint resolution, the Authorization for Use of Military Force (AUMF), that determines that “the president is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons.” Congress also states that the “grave acts of violence” committed on the US “continue to pose an unusual and extraordinary threat to [its] national security and foreign policy.” [US Congress, 9/14/2001] President Bush signs the resolution into law on September 18. [White House, 9/18/2001] The passage of the AUMF served another purpose: to extend presidential power. While the Defense Department and the Joint Chiefs of Staff intended the AUMF to define the conflict in narrow terms, and authorize the US to move militarily against al-Qaeda and its confederates, and the Taliban, Vice President Dick Cheney and his chief of staff, David Addington, had a larger goal. Attorney Scott Horton, who has written two major studies on interrogation of terrorism suspects for the New York City Bar Association, says in 2005 that Cheney and Addington “really wanted [the AUMF defined more broadly], because it provided the trigger for this radical redefinition of presidential power.” Addington helped draft a Justice Department opinion in late 2001, written by lawyer John Yoo (see Late September 2001), that asserted Congress cannot “place any limits on the president’s determinations as to any terrorist threat, the amount of military force to be used in response, or the method, timing, and nature of the response.” [US News and World Report, 5/21/2006]

Entity Tags: US Department of Defense, Taliban, Scott Horton, Joint Chiefs of Staff, Richard (“Dick”) Cheney, David S. Addington, George W. Bush, John C. Yoo, Al-Qaeda, Authorization to Use Military Force (AUMF)

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Civil Liberties

Page 2 of 7 (657 events)
previous | 1, 2, 3, 4, 5, 6, 7 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike