!! History Commons Alert, Exciting News

Context of '(1997): Perle Complains that Bosnia Defense Program Is Under Funded'

This is a scalable context timeline. It contains events related to the event (1997): Perle Complains that Bosnia Defense Program Is Under Funded. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 5 (422 events)
previous | 1, 2, 3, 4, 5 | next

The German Reich Ministry of Justice issues a secret memo following a meeting of several Justice Ministry lawyers and public prosecutors with senior Gestapo officers. The participants discuss the fact that Germany has been on a war footing for years, and the leaders’ worry that the citizenry is riddled with sleeper cells of subversives. The solution: detaining and torturing subversives. It is unclear whether torture will be used to terrorize other subversives, to extract information, or produce confessions. German law enforcement officials are balky at applying “more rigorous interrogation” techniques. Though some judges seem unmoved by defendants appearing in court with obvious marks of torture upon their bodies, the law enforcement officers are bureaucrats in a system that has always respected the rule of law and the Hitler government was originally elected on a law-and-order platform. The memo is the product of the top officials in the Gestapo and Justice Ministry, and lays out detailed instructions as to when torture techniques can be applied, the specific equipment used in such interrogations, and how many times particular techniques could be used on certain categories of detainees. Perhaps most importantly, the memo promises immunity from prosecution to any German interrogator who follows the rules as laid down in the memo.
Specific Instructions - It reads in part: “At present, we thus have a situation which cannot continue: a deficient sense of what is right on the part of judicial officers; an undignified position for police officers, who try to help matters by foolish denials [that torture has taken place in court proceedings].… [I]nterrogations of this kind [torture] may be undertaken in cases where charges involve the immediate interests of the state.… chiefly treason and high treason. Representatives of the Gestapo expressed the opinion that a more rigorous interrogation could also be considered in cases of Jehovah’s Witnesses, explosives, and sabotage.… As a general principle, in more rigorous interrogations only blows with a club on the buttocks are permissible, up to 25 such blows. The number is to be determined in advance by the Gestapo.… Beginning with the tenth blow, a physician must be present. A standard club will be designated, to eliminate all irregularities.” Gestapo Headquarters in Berlin must give permission for more “rigorous interrogation[s],” the memo continues.
Drawing Parallels to Bush Administration Torture - The memo will be the subject of a 2009 article by Shayana Kadidal, the senior managing attorney of the Guantanamo project at the Center for Constitutional Rights. Kadidal will draw parallels between the Nazi torture authorization and similar legal justifications issued by the American government after the 9/11 attacks (see March 2, 2009 and April 21, 2009). Kadidal will write: “I realize that, as a matter of principle, there is a strong bias against making Nazi analogies to any events happening in our modern world.… But here we have: (1) a system set up to allow torture on certain specific individual detainees, (2) specifying standardized equipment for the torture (apparently down to the exact length of the club to be used), along with physician participation to ensure survival of the victim for the more several applications, (3) requiring prior approval of the use of torture from the central authorities in the justice department and intelligence agency in the capital, so as to ensure that (6) the local field officers actually carrying out the abuse are immune from prosecution.” [Huffington Post, 4/21/2009]

Entity Tags: Gestapo, Shayana Kadidal, German Reich Ministry of Justice

Timeline Tags: Torture of US Captives

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

A B-29 bomber similar to the one that crashed in Georgia.A B-29 bomber similar to the one that crashed in Georgia. [Source: Global Security (.org)]A test flight for the Air Force’s Project Banshee, located at Robins Air Force Base in Georgia, is set for 8:30 a.m. Banshee is an attempt begun in 1946 to develop and deploy a long-range missile ahead of both the Soviet Union and rival US military branches. The airplane used in the test flight crashes less than an hour into its flight, killing 9 of the 13 aboard.
Maintenance Problems - The plane assigned for the flight is a B-29 Stratofortress, a bomber made famous by its delivery of the atomic bombs to Hiroshima and Nagasaki at the end of World War II. B-29s are notoriously difficult to fly and maintain: their four wing-mounted engines almost routinely overheat and catch fire, causing engine shutdowns, sudden drops in altitude, and, often, crashes. The engines’ eighteen cylinders lack sufficient airflow to keep them cool, and the overheating often causes the crankcases, made of light but highly flammable magnesium, to burst into flames. Like so many of its brethren, the plane has suffered its share of maintenance issues, and is flying without numerous recommended maintenance and repair tasks being performed. Just five days before, it had been designated “red cross”—grounded and unfit for service. It was allowed to fly through an “exceptional release” signed by the squadron commander.
Crew Difficulties - The flight is moved back to the afternoon after some crew members fail to show up on time, and to allow last-minute repairs to be made. By takeoff, the flight crew is assembled: Captain Ralph Erwin; co-pilot Herbert W. Moore; flight engineer Earl Murrhee; First Lieutenant Lawrence Pence, Jr, the navigator; Sergeant Walter Peny, the left scanner; Sergeant Jack York, the right scanner; Sergeant Melvin Walker, the radio operator; and Sergeant Derwood Irvin, manning the bombsight and autopilot. The crew is joined by civilian engineers assigned to Banshee: Al Palya and Robert Reynolds from RCA, William Brauner and Eugene Mechler from the Franklin Institute, and Richard Cox from the Air Force’s Air Materiel Command. In violation of standard procedure, none of the crew or the civilians are briefed on emergency procedures, though Murrhee will later say that the crew were all familiar with the procedures; he is not so sure about the civilians, though he knows Palya and Reynolds have flown numerous test flights before. In another violation of Air Force regulations, none of the flight crew have worked together before. As author Barry Siegel will note in 2008, “The pilot, copilot, and engineer had never shared the same cockpit before.”
Engine Fire and Crash - Less than an hour into the flight, one engine catches fire and two others lose power, due to a combination of maintenance failures and pilot errors. The civilians have some difficulty getting into their parachutes as Erwin and Moore attempt to regain control of the aircraft. Four of the crew and civilians manage to parachute from the plane, but most remain on board as the airplane spirals into the ground on the edge of the Okefenokee Swamp, near Waycross, Georgia. Crew members Moore, Murrhee, and Peny survive, as does a single civilian, Mechler. Four others either jump at too low an altitude or die when their chutes foul the airplane; the other five never manage to leave the plane and die on impact.
Widows File Suit - Several of the civilians’ widows will file suit against the US Air Force, asserting that their husbands died because of Air Force negligence (see June 21, 1949). Their lawsuit will eventually become US v. Reynolds, a landmark Supreme Court case and the underpinning for the government’s claims of state secrets privilege (see March 9, 1953). [Siegel, 2008, pp. 3, 14-17, 33-49]

Entity Tags: Derwood Irvin, Barry Siegel, US Department of the Air Force, Walter Peny, William Brauner, Air Materiel Command, Richard Cox, Ralph Erwin, Robert Reynolds, Al Palya, Radio Corporation of America, Eugene Mechler, Earl Murrhee, Franklin Institute, Project Banshee, Melvin Walker, Lawrence Pence, Jr, Herbert W. Moore, Jr, Jack York

Timeline Tags: Civil Liberties

A three-judge federal appeals court unanimously rejects the government’s claim of unfettered executive privilege and secrecy in regards to classified documents (see October 19, 1951). In an opinion written by Judge Albert Maris, the court finds that the government’s claim that the judiciary can never compel the executive branch to turn over classified documents to be without legal merit. The plaintiffs in the case, three widows who lost their husbands in the crash of a B-29 bomber carrying classified materials (see June 21, 1949), had a compelling need for the documents in question, the downed B-29 accident reports, to further their case, Maris writes (see October 12, 1950).
No Legal Basis for Claim of Privilege - Maris goes further than the parameters of the single lawsuit, writing: “[W]e regard the recognition of such a sweeping privilege… as contrary to a sound public policy. The present cases themselves indicate the breadth of the claim of immunity from disclosure which one government department head has already made. It is but a small step to assert a privilege against any disclosure of records merely because they might prove embarrassing to government officials. Indeed, it requires no great flight of imagination to realize that if the government’s contentions in these cases were affirmed, the privilege against disclosure might gradually be enlarged… until as is the case in some nations today, it embraced the whole range of government activities.… We need to recall in this connection the words of [Revolution-era jurist] Edward Livingston: ‘No nation ever yet found any inconvenience from too close an inspection into the conduct of its officers, but many have been brought to ruin, and reduced to slavery, by suffering gradual imposition and abuses, which were imperceptible, only because the means of publicity had not been secured.’” He also quotes Revolutionary War figure Patrick Henry, who said, “[T]o cover with the veil of secrecy the common routine of business is an abomination in the eyes of every intelligent man and every friend to his country.”
Rejecting Claim of 'State Secrets' - Maris is even less respectful of the government’s claim of a “state secrets” privilege. He notes that the government did not make that claim until well into the lawsuit proceedings (see October 19, 1951), indicating that it was a “fallback” argument used after the original government arguments had failed. Maris is also troubled, as author Barry Siegel later writes, in the government’s “assertion of unilateral executive power, free from judicial review, to decide what qualified as secret.” The lower court judge’s ruling that he alone should be given the documents for review adequately protected the government’s security interests, Maris writes: “[But] the government contends that it is within the sole province of the secretary of the Air Force to determine whether any privileged material is contained in the documents and that his determination of this question must be accepted by the district court without any independent consideration.… We cannot accede to this proposition. On the contrary, we are satisfied that a claim of privilege against disclosing evidence… involves a justiciable question, traditionally within the competence of the courts.… To hold that the head of an executive department of the government in a [law]suit to which the United States is a party may conclusively determine the government’s claim of privilege is to abdicate the judicial function to infringe the independent province of the judiciary as laid down by the Constitution.”
Fundamental Principle of Checks and Balances - Maris continues: “The government of the United States is one of checks and balances. One of the principal checks is furnished by the independent judiciary which the Constitution established. Neither the executive nor the legislative branch of the government may constitutionally encroach upon the field which the Constitution has reserved for the judiciary.… Nor is there any danger to the public interest in submitting the question of privilege to the decision of the courts. The judges of the United States are public officers whose responsibilities under the Constitution is just as great as that of the heads of the executive departments.”
Government Appeal - The Justice Department will appeal the ruling to the US Supreme Court (see March 1952 and March 9, 1953). [Siegel, 2008, pp. 153-156]

Entity Tags: Albert Maris, US Department of Justice, Barry Siegel, US Supreme Court

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Lawyers make their opening arguments before the Supreme Court in the case of US v Reynolds, the lawsuit that finds the government had no overarching right to unilaterally refuse to deliver classified documents in the course of a wrongful death lawsuit against the government (see December 11, 1951). The government has appealed the appellate court ruling to the Supreme Court (see March 1952). Because four of the nine justices had voted not to hear the case—in essence to let the appellate court ruling stand—the defense is cautiously optimistic about the Court’s decision.
Judiciary Has No Right to Interfere with Powers of the Executive, Government Argues - Acting Solicitor General Robert Stern tells the Court that the appellate judges’ decision, written by Judge Albert Maris, “is an unwarranted interference with the powers of the executive,” and that the decision forced the government to choose “whether to disclose public documents contrary to the public interest [or] to suffer the public treasury to be penalized” (a reference to the decision to award the plaintiffs monetary damages—see October 12, 1950). The judiciary “lack[s] power to compel disclosure by means of a direct demand [as well as] by the indirect method of an order against the United States, resulting in judgment when compliance is not forthcoming.”
Executive Has No Right to Unilaterally Withhold Information, Defense Counters - Stern’s arguments are countered by those of the plaintiffs’ lawyer, Charles Biddle, who writes, “We could rest our case with confidence on the clear opinion of Judge Maris,” but continues by arguing that if the government asserts a claim of executive privilege on the basis of national security, it must make the documents available to the Court for adjudication, or at least provide enough information for the Court to judge whether the documents present in fact a threat to national security if disclosed. This is particularly true, Biddle argues, “where there is no showing that the documents in question contain any military secret” (Biddle is unaware that the documents’ classification status had been reduced two years before—see September 14, 1950). “The basic question here is whether those in charge of the various departments of the government may refuse to produce documents properly demanded… in a case where the government is a party (see June 21, 1949), simply because the officials themselves think it would be better to keep them secret, and this without the Courts having any power to question the propriety of such decision.… In other words, say the officials, we will tell you only what we think it is in the public interest that you should know. And furthermore, we may withhold information not only about military or diplomatic secrets, but we may also suppress documents which concern merely the operation of the particular department if we believe it would be best, for purposes of efficiency or morale, that no one outside of the department, not even the Court, should see them.”
No Basis for Claims of Military Secrets - Biddle argues that because of responses he has received to his demands over the course of this lawsuit, he is relatively sure there are no military secrets contained within them. “[T]he proof is to the contrary,” he says, and goes on to say that had the Air Force disclosed from the outset that the plane crash, the fatal accident that sparked the original lawsuit (see October 6, 1948), was probably caused by pilot error and not by random chance, the plaintiffs may have never needed to ask for the disclosure of the documents in question, the accident reports on the crash (see October 18, 1948). “The secretary [of the Air Force]‘s formal claim of privilege said that the plane at the time was engaged in a secret mission and that it carried confidential equipment,” Biddle says, “but nowhere was it asserted that either had anything to do with the accident. The whole purpose of the demand by the respondents was for the purpose of finding out what caused the accident.… They were not in the least interested in the secret mission or equipment.” [Siegel, 2008, pp. 165-170]

Entity Tags: US Supreme Court, Albert Maris, Robert Stern, US Department of the Air Force, Charles Biddle

Timeline Tags: Civil Liberties

In their regular Saturday conference, the nine Supreme Court justices discuss the issues and arguments surrounding US v Reynolds (see October 21, 1952). According to the notes from the discussion, Chief Justice Fred Vinson, a strong advocate for expansive executive powers (see March 1952), says the case “boils down to Executive Branch determine privilege.” Other notes by Justice William O. Douglas suggest that Vinson isn’t convinced that the US must “be forced to pay for exercising its privilege” (see October 12, 1950). A straw vote taken at the end of the discussion shows five justices in favor of the government’s position to unilaterally withhold classified documents—overturning the appellate court decision (see December 11, 1951), and four in favor of allowing the decision to stand. [Siegel, 2008, pp. 171]

Entity Tags: Fred Vinson, US Supreme Court, William O. Douglas

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

The CIA’s Technical Services Division (TSD) considers plans to undermine Fidel Castro’s charismatic appeal by sabotaging his speeches. At one point, there is discussion of spraying Castro’s broadcasting studio with a hallucinogenic chemical. The plan is taken of the shelf because the chemical is deemed unreliable. During this period, the TSD laces a box of cigars with a chemical that would produce temporary disorientation, hoping that he will smoke one of the cigars before giving a speech. In another instance, the TSD comes up with a scheme to dust Castro’s shoes with thallium salts during a trip outside of Cuba. The salts would cause his beard to fall out. The plan is abandoned when Castro cancels the trip. [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, Technical Services Division (TSD)

Timeline Tags: US-Cuba (1959-2005)

The CIA works with a high-level Cuban official, codenamed “AM/LASH,” on a plan to assassinate Fidel Castro and overthrow his government. In June 1965, the CIA ends its contact with AM/LASH and his associates, citing security concerns. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Timeline Tags: US-Cuba (1959-2005)

The CIA’s Task Force W devises two plans to assassinate Fidel Castro. The first one, involving an exploding sea shell that would be placed where Castro regularly dives, is dismissed by the CIA’s Technical Services Division (TSD) as impractical. In the second plan, James Donovan (who has been negotiating with Castro for the release of prisoners taken during the Bay of Pigs operation) would present Castro with a contaminated diving suit. TSD decides to give the plan a try. It purchases a diving suit and laces its breathing apparatus with tubercule bacillus. The suit itself is dusted with a fungus that is known to cause a chronic skin disease. But the suit never leaves the laboratory. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Entity Tags: Technical Services Division (TSD), James Donovan, Fidel Castro

Timeline Tags: US-Cuba (1959-2005)

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]

Entity Tags: Malcolm Little, Central Intelligence Agency, Church Committee, Lew Allen, National Security Agency, Martin Luther King, Jr., Office of Security Services, Joan Baez

Timeline Tags: Civil Liberties

The NSA launches the first of seven satellites, code-named “Canyon,” that can pick up various types of voice and data traffic from Earth orbit. Canyon will lead to a more sophisticated satellite intelligence system, code-named “Rhyolite” (later “Aquacade”—see Early 1970s). [Federation of American Scientists, 7/17/1997]

Entity Tags: Rhyolite, National Security Agency, Canyon

Timeline Tags: Civil Liberties

The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). [Federation of American Scientists, 7/17/1997]

Entity Tags: National Security Agency, Echelon, Rhyolite, Chalet, Government Communications Headquarters, Owen Lewis, Canyon

Timeline Tags: Civil Liberties

July 26-27, 1970: Nixon Rejects Huston Plan

After President Nixon approves of the so-called “Huston Plan” to implement a sweeping new domestic intelligence and internal security apparatus (see July 14, 1970), FBI director J. Edgar Hoover brings the plan’s author, White House aide Tom Charles Huston (see June 5, 1970), into his office and vents his disapproval. The “old ways” of unfettered wiretaps, political infiltration, and calculated break-ins and burglaries are “too dangerous,” he tells Huston. When, not if, the operations are revealed to the public, they will open up scrutiny of US law enforcement and intelligence agencies, and possibly reveal other, past illegal domestic surveillance operations that would embarrass the government. Hoover says he will not share FBI intelligence with other agencies, and will not authorize any illegal activities without President Nixon’s personal, written approval. The next day, Nixon orders all copies of the decision memo collected, and withdraws his support for the plan. [Reeves, 2001, pp. 236-237] W. Mark Felt, the deputy director of the FBI, later calls Huston “a kind of White House gauleiter over the intelligence community.” Washington Post reporter Bob Woodward will note that the definition of “gauleiter” is, according to Webster’s Dictionary, “the leader or chief officoal of a political district under Nazi control.” [Woodward, 2005, pp. 33-34]

Entity Tags: W. Mark Felt, Tom Charles Huston, J. Edgar Hoover, Federal Bureau of Investigation, Central Intelligence Agency, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

The US Supreme Court, in what becomes informally known as the “Keith case,” upholds, 8-0, an appellate court ruling that strikes down warrantless surveillance of domestic groups for national security purposes. The Department of Justice had wiretapped, without court warrants, several defendants charged with destruction of government property; those wiretaps provided key evidence against the defendants. Attorney General John Mitchell refused to disclose the source of the evidence pursuant to the “national security” exception to the Omnibus Crime Control and Safe Streets Act of 1968. The courts disagreed, and the government appealed the decision to the Supreme Court, which upheld the lower courts’ rulings against the government in a unanimous verdict. The Court held that the wiretaps were an unconstitutional violation of the Fourth Amendment, establishing the judicial precedent that warrants must be obtained before the government can wiretap a US citizen. [US Supreme Court, 6/19/1972; Bernstein and Woodward, 1974, pp. 258-259] Critics of the Nixon administration have long argued that its so-called “Mitchell Doctrine” of warrantlessly wiretapping “subversives” has been misused to spy on anyone whom Nixon officials believe may be political enemies. [Bernstein and Woodward, 1974, pp. 258-259] As a result of the Supreme Court’s decision, Congress passes the Foreign Intelligence Surveillance Act. [John Conyers, 5/14/2003]
Opinion of Justice Powell - Writing for the Court, Justice Lewis Powell observes: “History abundantly documents the tendency of Government—however benevolent and benign its motives—to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the government attempts to act under so vague a concept as the power to protect ‘domestic security.’ Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent.” [US Supreme Court, 6/19/1972]
Justice Department Wiretapped Reporters, Government Officials - In February 1973, the media will report that, under the policy, the Justice Department had wiretapped both reporters and Nixon officials themselves who were suspected of leaking information to the press (see May 1969 and July 26-27, 1970), and that some of the information gleaned from those wiretaps was given to “Plumbers” E. Howard Hunt and G. Gordon Liddy for their own political espionage operations. [Bernstein and Woodward, 1974, pp. 258-259]
Conyers Hails Decision 30 Years Later - In 2003, Representative John Conyers (D-MI) will say on the floor of the House: “Prior to 1970, every modern president had claimed ‘inherent Executive power’ to conduct electronic surveillance in ‘national security’ cases without the judicial warrant required in criminal cases by the Fourth Amendment to the Constitution. Then Attorney General John Mitchell, on behalf of President Richard Nixon sought to wiretap several alleged ‘domestic’ terrorists without warrants, on the ground that it was a national security matter. Judge [Damon] Keith rejected this claim of the Sovereign’s inherent power to avoid the safeguard of the Fourth Amendment. He ordered the government to produce the wiretap transcripts. When the Attorney General appealed to the US Supreme Court, the Court unanimously affirmed Judge Keith. The Keith decision not only marked a watershed in civil liberties protection for Americans. It also led directly to the current statutory restriction on the government’s electronic snooping in national security cases.” [John Conyers, 5/14/2003]

Entity Tags: Lewis Powell, US Supreme Court, John Mitchell, E. Howard Hunt, US Department of Justice, G. Gordon Liddy, ’Plumbers’, Damon Keith, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

CIA Counterintelligence Director James Angleton.CIA Counterintelligence Director James Angleton. [Source: CI Centre.com]CIA Director James Schlesinger orders an internal review of CIA surveillance operations against US citizens. The review finds dozens of instances of illegal CIA surveillance operations against US citizens dating back to the 1950s, including break-ins, wiretaps, and the surreptitious opening of personal mail. The earlier surveillance operations were not directly targeted at US citizens, but against “suspected foreign intelligence agents operating in the United States.” Schlesinger is disturbed to find that the CIA is currently mounting illegal surveillance operations against antiwar protesters, civil rights organizations, and political “enemies” of the Nixon administration. In the 1960s and early 1970s, CIA agents photographed participants in antiwar rallies and other demonstrations. The CIA also created a network of informants who were tasked to penetrate antiwar and civil rights groups and report back on their findings. At least one antiwar Congressman was placed under surveillance, and other members of Congress were included in the agency’s dossier of “dissident Americans.” As yet, neither Schlesinger nor his successor, current CIA Director William Colby, will be able to learn whether or not Schlesinger’s predecessor, Richard Helms, was asked by Nixon officials to perform such illegal surveillance, though both Schlesinger and Colby disapproved of the operations once they learned of them. Colby will privately inform the heads of the House and Senate Intelligence Committees of the domestic spying engaged in by his agency. The domestic spying program was headed by James Angleton, who is still serving as the CIA’s head of counterintelligence operations, one of the most powerful and secretive bureaus inside the agency. It is Angleton’s job to maintain the CIA’s “sources and methods of intelligence,” including the prevention of foreign “moles” from penetrating the CIA. But to use counterintelligence as a justification for the domestic spying program is wrong, several sources with first-hand knowledge of the program will say in 1974. “Look, that’s how it started,” says one. “They were looking for evidence of foreign involvement in the antiwar movement. But that’s not how it ended up. This just grew and mushroomed internally.” The source continues, speaking hypothetically: “Maybe they began with a check on [Jane] Fonda. They began to check on her friends. They’d see her at an antiwar rally and take photographs. I think this was going on even before the Huston plan” (see July 26-27, 1970 and December 21, 1974). “This wasn’t a series of isolated events. It was highly coordinated. People were targeted, information was collected on them, and it was all put on [computer] tape, just like the agency does with information about KGB agents. Every one of these acts was blatantly illegal.” Schlesinger begins a round of reforms in the CIA, a program continued by Colby. [New York Times, 12/22/1974 pdf file]

Entity Tags: William Colby, Senate Intelligence Committee, Richard Helms, James Angleton, Jane Fonda, Nixon administration, Central Intelligence Agency, James R. Schlesinger, House Intelligence Committee

Timeline Tags: Civil Liberties

Former CIA director Richard Helms.Former CIA director Richard Helms. [Source: Search.com]Former CIA director Richard Helms indirectly confirms the involvement of the Nixon administration in his agency’s illegal domestic surveillance operations during his testimony before the Senate Watergate investigative committee. Helms tells the committee that he was told by Nixon’s Foreign Intelligence Advisory Board that the CIA could “make a contribution” in domestic intelligence operations. “I pointed out to them very quickly that it could not, there was no way,” Helms testifies. “But this was a matter that kept coming up in the context of feelers: Isn’t there somebody else who can take on these things if the FBI isn’t doing them as well as they should, as there are no other facilities?” (FBI director J. Edgar Hoover’s opposition to the idea of spying on US citizens for Nixon’s political purposes is well documented.) CIA officials say that, despite Helms’s testimony, Helms began the domestic spying program as asked, in the beginning to investigate beliefs that the antiwar movement was permeated by foreign intelligence agents in 1969 and 1970. “It started as a foreign intelligence operation and it bureaucratically grew,” one source says in 1974. “That’s really the answer.” The CIA “simply began using the same techniques for foreigners against new targets here.” The source will say James Angleton, the CIA’s director of counterintelligence (see 1973), began recruiting double agents inside the antiwar and civil rights organizations, and sending in “ringers” to penetrate the groups and report back to the CIA. “It was like a little FBI operation.” Angleton reportedly believes that both the protest groups and the US media are riddled with Soviet intelligence agents, and acts accordingly to keep those groups and organizations under constant watch. One source will say Angleton has a “spook mentality.” Another source will say that Angleton’s counterintelligence bureau is “an independent power in the CIA. Even people in the agency aren’t allowed to deal directly with the CI [counterintelligence] people. Once you’re in it, you’re in it for life.” [New York Times, 12/22/1974 pdf file]

Entity Tags: Senate Watergate Investigative Committee, Richard Helms, J. Edgar Hoover, James Angleton, Issuetsdeah

Timeline Tags: Civil Liberties, Nixon and Watergate

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Vice President Nelson Rockefeller (see December 19, 1974 and After) is instrumental in keeping Senate Democrats from finding out too much about the intelligence community’s excesses. When the New York Times reveals the existence of a decades-old illegal domestic surveillance program run by the CIA (see December 21, 1974), President Ford heads off calls from Democrats to investigate the program by appointing the “Rockefeller Commission” to investigate in the Democrats’ stead. Senate Democrats, unimpressed with the idea, create the Church Committee to investigate the intelligence community (see April, 1976). Rockefeller is adept at keeping critical documents out of the hands of the Church Committee and the press. When Senator Frank Church asks for materials from the White House, he is told that the Rockefeller Commission has them; when he asks Rockefeller for the papers, he is told that he cannot have them because only the president can authorize access. One Church aide later calls Rockefeller “absolutely brilliant” in denying them access in a friendly manner. “He winked and smiled and said, ‘Gee, I want to help you but, of course I can’t—not until we’ve finished our work and the president approves it,’” the aide recalls. Senator John Tower (R-TX), the vice chairman of the committee, will later reflect, “We were very skillfully finessed.” But even Rockefeller, who has his own history of involvement with the CIA, is taken aback at the excesses of the CIA, particularly its history of assassinating foreign leaders. Rockefeller will eventually turn that information over to the Church Committee, giving that body some of the most explosive evidence as yet made public against the agency. [US Senate, 7/7/2007]

Entity Tags: John Tower, Church Committee, Nelson Rockefeller, Central Intelligence Agency, Frank Church, Gerald Rudolph Ford, Jr, ’Rockefeller Commission’

Timeline Tags: Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” [Dubose and Bernstein, 2006, pp. 34-35]

Entity Tags: Seymour Hersh, US Department of Defense, Ford administration, Edward Levi, Donald Rumsfeld, Church Committee, Richard (“Dick”) Cheney, Philip Buchan, New York Times, Gerald Rudolph Ford, Jr

Timeline Tags: Civil Liberties

The Senate Select Committee to Study Governmental Operations releases its report, “Alleged Assassination Plots Involving Foreign Leaders,” which finds “concrete evidence of at least eight plots involving the CIA to assassinate Fidel Castro from 1960 to 1965.” [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, US Congress

Timeline Tags: US-Cuba (1959-2005)

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]

Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News

Timeline Tags: Civil Liberties

President Ford issues Executive Order 11905, which limits the power of the CIA, the NSA, and military intelligence to engage in surveillance of US citizens. Perhaps its most well-known provision is a total ban on “political assassinations” by US government personnel. [Gerald R. Ford, 2/18/1976; Roberts, 2008, pp. 38] The provision is sparked by the Church Commission’s finding (see April, 1976) that assassination is “unacceptable in our society,” and a political embarassment, especially botched attempts such as the CIA’s efforts to kill Cuba’s Fidel Castro. [Grant J. Lilly, 4/6/2006]

Entity Tags: Church Commission, Gerald Rudolph Ford, Jr, National Security Agency, Central Intelligence Agency

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

The US Foreign Intelligence Advisory Board recommended in 1970 that “economic intelligence be considered a function of national security” equal to that of other intelligence. In 1977, the NSA, CIA, and Department of Commerce forms a joint “Office of Intelligence Liaison” (later renamed the “Office of Executive Support”) specifically authorized to handle “foreign intelligence” of interest to the Commerce Department, much of it provided by the NSA. The other countries using Echelon, the NSA’s satellite surveillance program, which include Britain, Canada, Australia, and New Zealand, all operate similar programs. President Bill Clinton will extend this operation in 1993. In 1993, the European company Panavia will be specifically targeted over aircraft sales to the Middle East. In 1994, US companies will be given NSA and CIA intelligence intercepts that help them win contracts in Indonesia. Other information that will be provided by US intelligence to US and allied corporations include information about the emission standards for Japanese automobiles, 1995 trade negotiations over the US importing of Japanese luxury cars, France’s participation in the GATT trade negotiations of 1993, and the 1997 Asian-Pacific Economic Conference. [Science and Technology Assessments Office, 8/15/2000]

Entity Tags: William Jefferson (“Bill”) Clinton, Issuetsdeah, National Security Agency, Office of Executive Support, Panavia

Timeline Tags: Civil Liberties

Interviewer David Frost has a difficult time with his subject, former President Richard Nixon, in the day’s early questioning (see April 6, 1977). Frost attempts to recoup with a line of questioning suggested by his adviser James Reston, Jr., one used in the trial of former Nixon aide John Ehrlichman (see January 1, 1975). Were there no limits to what a president can do, even if the president wants to do something plainly illegal? he asks. Could he do anything despite the law? Burglary? Forgery? Even murder? “If the president does it, that means it’s not illegal,” Nixon retorts. “Never had his imperialism been so baldly stated,” Reston will later reflect. Frost asks if the dividing line between, for example, a police burglary and the murder of an antiwar protester is only the president’s judgment? Nixon agrees, and adds: “There’s nothing specific that the Constitution contemplates in that respect. I haven’t read every word, every jot and every tittle, but I do know this: That it has been, however, argued that as far as a president is concerned, that in war time, a president does have certain extraordinary powers which would make acts that would otherwise be unlawful, lawful if undertaken for the purpose of preserving the nation and the Constitution, which is essential for the rights we’re all talking about.” [Time, 5/30/1977; Reston, 2007, pp. 102-105; Landmark Cases, 8/28/2007]

Entity Tags: Richard M. Nixon, David Frost, James Reston, Jr, John Ehrlichman

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

About 500 Iranian students take over the American Embassy in Tehran and hold 52 Americans hostage for 444 days. The Mujahedeen-e Khalq (MEK) is one of the groups that supports the take-over. [US Department of State, 4/30/2003; PBS, 1/15/2006]

Entity Tags: People’s Mujahedin of Iran

Timeline Tags: US confrontation with Iran, Iran-Contra Affair

Michael Barnes.Michael Barnes. [Source: Covington and Burling]Representative Michael Barnes (D-MD) is targeted by the NSA’s Echelon satellite surveillance program on orders from Reagan administration officials. Barnes, an outspoken opponent of Reagan’s Central American policies, had phone conversations with Nicaraguan officials intercepted and recorded, including one conversation between Barnes and the foreign minister of Nicaragua. Barnes learns of the surveillance after White House officials, apparently attempting to discredit Barnes, leaks transcripts of the taped conversations to reporters. CIA director William Casey shows Barnes a Nicaraguan embassy cable reporting a meeting between embassy staff and one of Barnes’s aides; Casey demands that Barnes fire the aide. Barnes refuses, noting that the aide had visited the embassy on legitimate business concerning international affairs. Barnes will say in 1995, “I was aware that NSA monitored international calls, that it was a standard part of intelligence gathering. But to use it for domestic political purposes is absolutely outrageous and probably illegal.” Former senator Dennis DeConcini (R-AZ) says he worries about the NSA spying on US citizens: “It has always worried me. What if that is used on American citizens? It is chilling. Are they listening to my private conversations on my telephone?” [Patrick S. Poole, 8/15/2000]

Entity Tags: Michael D. Barnes, Reagan administration, William Casey, National Security Agency, Dennis DeConcini, Echelon

Timeline Tags: Civil Liberties

A federal court rules that because of the government’s “state secrets” privilege (see March 9, 1953), a civilian plaintiff suing the US Navy over a contractual agreement cannot even access “non-privileged,” or unclassified, information from the Navy because to do so might “threaten disclosure” of material that goes against “the overriding interest of the United States… preservation of its state secrets privilege precludes any further attempt to pursue litigation.” [Siegel, 2008, pp. 196-197]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

President Ronald Reagan issues Executive Order 12333, which directs the US intelligence community to provide foreign intelligence data to the White House. The order reads in part, “[A]gencies are not authorized to use such techniques as electronic surveillance, unconsented physical searches, mail surveillance, physical surveillance, or monitoring devices unless they are in accordance with procedures established by the head of the agency concerned and approved by the Attorney General.” It establishes rules of conduct for the intelligence agencies, and mandates a certain level of Congressional oversight. [Executive Order 12333 -- United States intelligence activities, 4/5/2007] It also establishes the basis for what are later called “National Security Letters.” These NSLs, originally envisioned for use to compile information in hunts for foreign criminals and suspected terrorists, will later be used by the administration of George W. Bush to order US booksellers, librarians, employers, Internet providers, and others to turn over records and information they compile on US citizens, with strict adjuncts against allowing those targeted for surveillance to know about the NSLs and with virtually no government oversight (see October 25, 2005). [Washington Post, 11/6/2005] It does not, as some have later asserted, directly prohibit the assassination of targeted foreign subjects—i.e. terrorist suspects and even foreign leaders—though it does restrict the use of assassination by US government operatives to certain very restricted circumstances centered around critical aspects of national security. [Parks, 11/2/1989 pdf file]

Entity Tags: Ronald Reagan, George W. Bush, National Security Letters, Bush administration (43)

Timeline Tags: Civil Liberties

In the second of two rulings in the case of Halkin v Helms, the judiciary comes down squarely on the side of the US government against charges of illegal surveillance and wiretapping leveled against American anti-war protesters. The district and appellate courts uphold the federal government’s “state secrets” claim as codified in US v Reynolds (see March 9, 1953), thereby denying the plaintiffs the right to see government information that they claim would prove their case. The DC Court of Appeals writes that the federal courts do not have any constitutional role as “continuing monitors of the wisdom and soundness of Executive action,” and instead the courts “should accord utmost deference to executive assertions of privilege on grounds of military or diplomatic secrets… courts need only be satisfied that there is a reasonable danger” that military secrets might be exposed. [Siegel, 2008, pp. 196-196]

Timeline Tags: Civil Liberties

Margaret Thatcher.Margaret Thatcher. [Source: UK Parliament]British prime minister Margaret Thatcher, displeased with two of her ministers for challenging her on unidentified policy matters, requests that they be placed under electronic surveillance. Because it is illegal for British intelligence to monitor its own citizens, the operation is handed over to the CSE, Canada’s national security agency. [Daily Iowan, 1/19/2006; Janczewski and Colarik, 2007, pp. 454] According to former CSE spy Mike Frost, who will publicly discuss the matter in 2000, Thatcher “had two ministers that she said ‘…weren’t onside.’” Thatcher, says Frost, “wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers.” Why CSE and not British intelligence? Because for the British to monitor their own government members would be illegal—so instead, they farm out such activities to their allies. “The British Parliament now have total deniability,” Frost says. “They didn’t do anything. They know nothing about it. Of course they didn’t do anything; we did it for them.” Frost will say there is no way to pin any blame or criminal charges on anyone in the British government. “The British Parliament now has total deniability,” Frost says. “They didn’t do anything… we did it for them.” [ZDNet, 2/25/2000; CBS News, 2/27/2000]

Entity Tags: Communications Security Establishment, Mike Frost, Government Communications Headquarters, Margaret Thatcher

Timeline Tags: Civil Liberties

The DC Court of Appeals rejects a claim by civilian plaintiffs to force the government to disclose classified information as part of a lawsuit, citing the “state secrets” privilege (see March 9, 1953). Furthermore, the court broadens the definition of “state secrets” to include “disclosure of intelligence-gathering methods or capabilities and disruption of diplomatic relations.” [Siegel, 2008, pp. 197]

Timeline Tags: Civil Liberties

Antonin Scalia.Antonin Scalia. [Source: Oyez.org]Appeals court judge Antonin Scalia is sworn in as an Associate Justice of the US Supreme Court. [Legal Information Institute, 7/30/2007] Although Scalia is an ardent social conservative, with strongly negative views on such issues as abortion and homosexual rights, Scalia and Reagan administration officials both have consistently refused to answer questions about his positions on these issues, as President Reagan did at his June announcement of Scalia’s nomination. [Ronald Reagan Presidential Library, 6/17/1986] Scalia’s nomination is, in the words of Justice Department official Terry Eastland, “no better example of how a president should work in an institutional sense in choosing a nominee….” Eastland advocates the practice of a president seeking a judiciary nominee who has the proper “judicial philosophy.” A president can “influence the direction of the courts through his appointments” because “the judiciary has become more significant in our politics,” meaning Republican politics. [Dean, 2007, pp. 132] Scalia is the product of a careful search by Attorney General Edwin Meese and a team of Justice Department officials who wanted to find the nominee who would most closely mirror Reagan’s judicial and political philosophy (see 1985-1986).

Entity Tags: Ronald Reagan, Edwin Meese, Antonin Scalia, Terry Eastland, US Department of Justice

Timeline Tags: Civil Liberties

Radical Muslim leader Sheikh Omar Abdul-Rahman obtains his first US visa via the CIA. A State Department official will later discover this was the first of six US visas given to him between 1986 and 1990. All are approved by CIA agents acting as consular officers at US embassies in Sudan and Egypt. “The CIA officers claimed they didn’t know the sheikh was one of the most notorious political figures in the Middle East and a militant on the State Department’s list of undesirables.” But one top New York investigator will later say, “Left with the choice between pleading stupidity or else admitting deceit, the CIA went with stupidity.” [Boston Globe, 2/3/1995; New York Magazine, 3/17/1995] Abdul-Rahman uses the visas to attend conferences of Islamic students in the US. Then he visits Pakistan, where he preaches at Peshawar, visits the Saudi embassy in Islamabad, and is “lionized at receptions heavily attended by Americans.” He plays a prominent role in recruiting mujaheddin fighters to fight against the Soviets in Afghanistan. [Kepel, 2002, pp. 300] In 1989, Abdul-Rahman is arrested in Egypt and held under very closely guarded house arrest, but he manages to escape one year later, possibly by being smuggled out of his house in a washing machine. The CIA gives him another US visa and he moves to the US (see July 1990). [New York Times, 1/8/1995] Journalist Simon Reeve will claim in his 1999 book The New Jackals that, “The CIA, it is now clear, arranged the visa[s] to try and befriend the Sheikh in advance of a possible armed fundamentalist revolution in Egypt.” According to a retired CIA official, the CIA recalled mistakes made with the Ayatollah Khomeini in Iran and were trying to win Abdul-Rahman’s trust. [Reeve, 1999, pp. 60]

Entity Tags: Central Intelligence Agency, Omar Abdul-Rahman, Simon Reeve

Timeline Tags: Complete 911 Timeline

Michael Springmann.Michael Springmann. [Source: Michael Springmann]Michael Springmann, head US consular official in Jeddah, Saudi Arabia, later claims that during this period he is “repeatedly ordered… to issue [more than 100] visas to unqualified applicants.” He turns them down, but is repeatedly overruled by superiors. [BBC, 11/6/2001; St. Petersburg Times, 11/25/2001] In one case, two Pakistanis apply for visas to attend a trade show in the US, but they are unable to name the trade show or city in which it will be held. When Springmann denies them a visa, he gets “an almost immediate call from a CIA case officer, hidden in the commercial section [of the consulate], that I should reverse myself and grant these guys a visa.” Springmann refuses, but the decision is reversed by the chief of the consular section. Springmann realizes that even the ambassador, Walter Cutler, is aware of the situation, which becomes “more brazen and blatant” as time goes on. On one occasion Springmann is even told, “If you want a job in the State Department in future, you will change your mind.” [CBC Radio One, 7/3/2002; Trento, 2005, pp. 344-6] Springmann loudly complains to numerous government offices, but no action is taken. He is fired and his files on these applicants are destroyed. He later learns that recruits from many countries fighting for bin Laden against Russia in Afghanistan were funneled through the Jeddah office to get visas to come to the US, where the recruits would travel to train for the Afghan war. According to Springmann, the Jeddah consulate was run by the CIA and staffed almost entirely by intelligence agents. This visa system may have continued at least through 9/11, and 11 of the 19 9/11 hijackers received their visas through Jeddah (see November 2, 1997-June 20, 2001), possibly as part of this program (see October 9, 2002 and October 21, 2002). [BBC, 11/6/2001; St. Petersburg Times, 11/25/2001; CBC Radio One, 7/3/2002; Associated Press, 7/17/2002 pdf file; Fox News, 7/18/2002]

Entity Tags: Central Intelligence Agency, US Consulate, Jeddah, Saudi Arabia Office, Michael Springmann

Timeline Tags: Complete 911 Timeline, War in Afghanistan

Strom Thurmond.Strom Thurmond. [Source: US Government]Former Lockheed software manager Margaret Newsham, who worked at the Menwith Hill facility of the NSA’s Echelon satellite surveillance operation in 1979, says she heard a real-time phone intercept of conversations involving senator Strom Thurmond (R-SC). She was shocked, she recalls, because she thought only foreign communications were being monitored. Newsham, who was fired from Lockheed after she filed a whistleblower lawsuit alleging fraud and waste, tells the chairman of the House Intelligence Committee, Louis Stokes (D-OH), of the overheard conversations. In July, Capital Hill staffers will leak the story to the Cleveland Plain Dealer. Thurmond says he doesn’t believe Newsham’s story, but his office admits that it has previously received reports that Thurmond had been a target of NSA surveillance. Thurmond will decline to press for an investigation, and the reason for the surveillance has never been revealed. [CBS News, 2/27/2000; Patrick S. Poole, 8/15/2000]

Entity Tags: Strom Thurmond, National Security Agency, House Intelligence Committee, Louis Stokes, Echelon, Cleveland Plain Dealer, Lockheed Martin Corporation, Margaret Newsham

Timeline Tags: Civil Liberties

A lawsuit against the FBI’s investigation of a sixth-grade boy and his school project to create an “encyclopedia of the world” is stopped when an appeals court rules that the agency is shielded by the “state secrets” privilege (see March 9, 1953). Unable to secure information from the FBI as to why it investigated him, the child had therefore “failed to sustain his burden of proof [and] the cause of action was properly dismissed.” [Siegel, 2008, pp. 197]

Entity Tags: Federal Bureau of Investigation

Timeline Tags: Civil Liberties

Sheikh Omar Abdul-Rahman.Sheikh Omar Abdul-Rahman. [Source: FBI]Despite being on a US terrorist watch list for three years, radical Muslim leader Sheikh Omar Abdul-Rahman enters the US on a “much-disputed” tourist visa issued by an undercover CIA agent. [Village Voice, 3/30/1993; Atlantic Monthly, 5/1996; Lance, 2003, pp. 42] Abdul-Rahman was heavily involved with the CIA and Pakistani ISI efforts to defeat the Soviets in Afghanistan, and became famous traveling all over the world for five years recruiting new fighters for the Afghan war. The CIA gave him visas to come to the US starting in 1986 (see December 15, 1986-1989) . However, he never hid his prime goals to overthrow the governments of the US and Egypt. [Atlantic Monthly, 5/1996] FBI agent Tommy Corrigan will later say that prior to Abdul-Rahman’s arrival, “terrorism for all intents and purposes didn’t exist in the United States. But [his] arrival in 1990 really stoke the flames of terrorism in this country. This was a major-league ballplayer in what at the time was a minor-league ballpark. He was… looked up to worldwide. A mentor to bin Laden, he was involved with the MAK over in Pakistan.” The charity front Maktab al-Khidamat (MAK) is also known as Al-Kifah, and it has a branch in Brooklyn known as the Al-Kifah Refugee Center. The head of that branch, Mustafa Shalabi, picks up Abdul-Rahman at the airport when he first arrives and finds an apartment for him. Abdul-Rahman soon begins preaching at Al Farouq mosque, which is in the same building as the Al-Kifah office, plus two other locals mosques, Abu Bakr and Al Salaam. [Lance, 2006, pp. 53] He quickly turns Al-Kifah into his “de facto headquarters.” [Atlantic Monthly, 5/1996] He is “infamous throughout the Arab world for his alleged role in the assassination of Egyptian president Anwar Sadat.” Abdul-Rahman immediately begins setting up a militant Islamic network in the US. [Village Voice, 3/30/1993] He is believed to have befriended bin Laden while in Afghanistan, and bin Laden secretly pays Abdul-Rahman’s US living expenses. [Atlantic Monthly, 5/1996; ABC News, 8/16/2002] For the next two years, Abdul-Rahman will continue to exit and reenter the US without being stopped or deported, even though he is still on the watch list (see Late October 1990-October 1992).

Entity Tags: National Security Agency, Osama bin Laden, Meir Kahane, Omar Abdul-Rahman, Central Intelligence Agency, Al-Kifah Refugee Center, US Department of State, Abu Bakr Mosque, Al Farouq Mosque, Al Salaam Mosque, Anwar Sadat, World Trade Center

Timeline Tags: Complete 911 Timeline

Virginia BuckinghamVirginia Buckingham [Source: Publicity photo]Data compiled by the Federal Aviation Administration (FAA) shows that over this period Boston’s Logan Airport has one of the worst records for security among major US airports. Flight 11 and Flight 175 depart from Logan on 9/11. While it is only America’s eighteenth busiest airport, it has the fifth highest number of security violations. FAA agents testing its passenger screening are able to get 234 guns and inert hand grenades and bombs past its checkpoint guards or through its X-ray machines. Though it is possible that the high number of violations is because the FAA tests more frequently at Logan than elsewhere, an official later quoted by the Boston Globe says lax security is the only explanation, as all checkpoints at every major airport are meant to be tested monthly. In contrast, Newark Airport, from where Flight 93 departs on 9/11, has an above average security record. Washington’s Dulles Airport, from where Flight 77 takes off, is below average, though not as bad as Logan. Officials familiar with security at Logan will, after 9/11, point to various flaws. For example, the State Police office has no video surveillance of the airport’s security checkpoints, boarding gates, ramp areas, or perimeter entrances. [Boston Globe, 9/26/2001] Security cameras had been put into use at most US airports in the mid-1980s. When Virginia Buckingham takes over as executive director of Massachusetts Port Authority in 1999, she is surprised at the lack of cameras at Logan, and orders them that year. Yet by 9/11, they still will not have been installed. [Boston Herald, 9/29/2001; Boston Globe, 9/30/2001] In spite of Logan’s poor security record, after 9/11 the Boston Globe will report, “[A]viation specialists have said it is unlikely that more rigorous attention to existing rules would have thwarted the 10 hijackers who boarded two jets at Logan on Sept. 11.” [Boston Globe, 10/17/2001]

Entity Tags: Newark International Airport, Washington Dulles International Airport, Virginia Buckingham, Federal Aviation Administration, Logan International Airport

Timeline Tags: Complete 911 Timeline

A US appellate court refuses to find a number of military contractors liable in the death of Earl Patton Ryals, who died with 36 of his fellow crewmen in the Iraqi attack on the USS Stark (see May 17, 1987 and After). Ryals’s estate claims that he and his fellows died in part because of negligence on the part of the contractors who designed, manufactured, tested, and marketed the weapons system on board the Stark, including the Phalanx anti-missile system. In turning down the estate’s claim, the court cites the government’s “state secrets” privilege (see March 9, 1953), saying that the facts of the issue could not be resolved without examining classified Navy documents. And even without this reason, the court rules, Ryals’s estate cannot see the documents because the case presents “a political question” about military decision-making that is not subject to judicial review. [Zuckerbraun v. General Dynamics Corp., 6/13/1991; Siegel, 2008, pp. 197-198] A year later, a similar case will be dismissed on the grounds that a trial might conceivably reveal “state secrets” (see September 16, 1992).

Entity Tags: Earl Patton Ryals, US Department of the Navy

Timeline Tags: Civil Liberties

A federal appeals court upholds the dismissal of a lawsuit filed on behalf of 23 Navy sailors killed in the attack on the USS Stark (see May 17, 1987 and After) against a number of defense contractors. A similar lawsuit on behalf of one of the sailors killed in the attack was dismissed a year before (see June 13, 1991). This time the plaintiffs file over 2,500 pages of unclassified documentary evidence supporting their claims that the contractors were negligent in their design and implementation of the weapons systems aboard the Stark. The appeals court finds that regardless of the amount of evidence entered, to allow the trial would be to potentially infringe on the US government’s “state secrets” privilege (see March 9, 1953). “[N]o amount of effort could safeguard the privileged information,” the court rules. The court adds that “classified and unclassified information cannot always be separated, and therefore courts must restrict access not only to classified material, but to “those pieces of evidence” that “press so closely upon highly sensitive material that they create a hgh risk of inadvertent or indirect disclosures.” [Siegel, 2008, pp. 198]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

The 9/11 Commission, relying on a CIA report, will later say that three of the men involved in the 1993 World Trade Center bombing travel on Saudi passports containing an indicator of possible Islamist extremism. [9/11 Commission, 8/21/2004, pp. 46-47, 61 pdf file] Author James Bamford will say that it is a “secret coded indicator, placed there by the Saudi government, warning of a possible terrorist affiliation.” [Bamford, 2008, pp. 58-59] It is unclear what the indicator looks like precisely and who the men are. However, Ahmad Ajaj, an associate of lead bomber Ramzi Yousef, does have a Saudi passport. Some of the 9/11 hijackers will later use Saudi passports with the same indicator (see October 28, 2000, June 1, 2001, and June 13, 2001, and November 2, 2007). [9/11 Commission, 8/21/2004, pp. 46-47, 61 pdf file]

Entity Tags: Ahmad Ajaj

Timeline Tags: Complete 911 Timeline

Combat engineering vehicles (CEVs) lined up outside the blazing Branch Davidian compound.Combat engineering vehicles (CEVs) lined up outside the blazing Branch Davidian compound. [Source: PBS]The FBI and local law enforcement officials begin their planned assault on the besieged Branch Davidian compound near Waco, Texas (see 5:00 A.M. - 9:30 A.M. February 28, 1993, March 1, 1993, and April 17-18, 1993), despite indications that the Davidians inside the compound will retaliate either by firing on the gathered law enforcement officials, by torching the main residential building, or perhaps both (see April 18, 1993). [PBS Frontline, 10/1995]
Warning - At 5:55 a.m., Richard Rogers, the commander of the FBI’s Hostage Rescue Team (HRT), orders two combat engineering vehicles (CEVs, unarmed modifications of Bradley fighting vehicles and the primary means for deplying CS “riot control agent” into the main building) deployed to the main building. One minute later, senior negotiator Byron Sage telephones the residence and speaks with Davidian Steve Schneider. At 5:59, Schneider comes to the phone. Sage tells him: “We are in the process of putting tear gas into the building. This is not an assault. We will not enter the building.” Schneider replies, “You are going to spray tear gas into the building?” Sage says, “In the building… no, we are not entering the building.” At the conclusion of the conversation, Schneider or another Davidian throws the telephone out of the building. [PBS Frontline, 10/1995; House Committee on Government Reform and Oversight, 8/2/1996; House Committee on Government Reform and Oversight, 8/2/1996] Minutes later, Schneider slips out, retrieves the phone, and ducks back inside. [Time, 5/3/1993]
Combat Vehicles Begin Deploying Gas, Davidians Open Fire - At 6:02 a.m., the two CEVs begin inserting CS gas into the compound, using spray nozzles attached to booms. The booms punch holes through the exterior walls of the building. The FBI uses unarmed Bradley Fighting Vehicles to deploy “ferret rounds,” military ammunition designed to release CS after penetrating a barricade such as a wall or window. As the CEVs and the Bradleys punch holes into the buildings for the deployment of the gas, Sage makes the following statement over the loudspeakers: “We are in the process of placing tear gas into the building. This is not an assault. We are not entering the building. This is not an assault. Do not fire your weapons. If you fire, fire will be returned. Do not shoot. This is not an assault. The gas you smell is a non-lethal tear gas. This gas will temporarily render the building uninhabitable. Exit the residence now and follow instructions. You are not to have anyone in the tower. The [guard] tower is off limits. No one is to be in the tower. Anyone observed to be in the tower will be considered to be an act of aggression [sic] and will be dealt with accordingly. If you come out now, you will not be harmed. Follow all instructions. Come out with your hands up. Carry nothing. Come out of the building and walk up the driveway toward the Double-E Ranch Road. Walk toward the large Red Cross flag. Follow all instructions of the FBI agents in the Bradleys. Follow all instructions. You are under arrest. This standoff is over. We do not want to hurt anyone. Follow all instructions. This is not an assault. Do not fire any weapons. We do not want anyone hurt. Gas will continue to be delivered until everyone is out of the building.” Two minutes later, Davidians begin firing on the vehicles from the windows. The gunfire from the Davidians prompts Rogers and FBI commander Jeffrey Jamar to decide to change tactics; at 6:07 a.m., the assault forces begin deploying all of the gas at once instead of dispersing it in a controlled manner over the course of 48-72 hours as originally envisioned. [Dean M. Kelley, 5/1995; PBS Frontline, 10/1995; House Committee on Government Reform and Oversight, 8/2/1996; House Committee on Government Reform and Oversight, 8/2/1996; USMC Weapons, 2002] (Jamar will later testify that before the assault even began, he was “99 percent certain” that the FBI would have to escalate its assault because the Davidians would open fire.) [House Committee on Government Reform and Oversight, 8/2/1996] As a CEV demolishes the back wall of the gymnasium area of the compound, negotiators broadcast: “David, we are facilitating you leaving the compound by enlarging the door.… Leave the building now.” [Cox News Service, 1/30/2000] Jamar will later explain that the Bradleys do not carry military weaponry. “Of course we had all the firepower removed,” he will say in a 1995 interview. “There were no cannons or anything on them. We used them for transportation. And they’re more than a personnel carrier—they’re a track vehicle. I mean it’s mud, just thick mud there the whole time. And the agents learned how to drive ‘em. But the idea was to protect them as best we could. And we didn’t know—they talked about blowing a 50—did they have rockets? Who knows? Did they have explosives buried in various vicinities? Are they prepared to run out with Molatov cocktails? What’s in their mind?” Jamar is referring to threats made by Koresh and other Davidians to blow up FBI vehicles. As for the CEVs, they are tanks modified for construction and engineering purposes, and are often used as bulldozers. Observers watching the events live on television or later on videotape will sometimes mistake the CEVs for actual tanks, though two M1A1 Abrams tanks are actually on site and take part in the assault. [PBS Frontline, 10/1995; PBS Frontline, 10/1995]
House Report: Davidians Would Certainly Consider FBI's Actions an Assault - A 1996 report by a House of Representatives investigative committee (see August 2, 1996) will note that it is almost impossible for the Davidians not to consider themselves under assault, with tank-like vehicles tearing holes in the building, CS being sprayed everywhere, grenade-like projectiles crashing through windows, men in body armor swarming around the compound, and the sounds of what seems like combat all around them. “Most people would consider this to be an attack on them—an ‘assault’ in the simplest terms,” the report will find. “If they then saw other military vehicles approaching, from which projectiles were fired through the windows of their home, most people are even more likely to believe that they were under an assault. If those vehicles then began to tear down their home there would be little doubt that they were being attacked. These events are what the Davidians inside the residence experienced on April 19, yet the FBI did not consider their actions an assault.” Moreover, the FBI did not consider the close-knit, home-centered community the Davidians have long since formed. “Their religious leader led them to believe that one day a group of outsiders, non-believers, most likely in the form of government agents, would come for them,” the report will state. “Indeed, they believed that this destiny had been predicted 2,000 years before in Biblical prophecy. Given this mindset, it can hardly be disputed that the Davidians thought they were under assault at 6 a.m. on April 19.” [House Committee on Government Reform and Oversight, 8/2/1996]
Monitoring from Washington - At 7:00 a.m., Attorney General Janet Reno and senior Justice Department and FBI officials go to the FBI situation room to monitor the assault. [PBS Frontline, 10/1995]
Buildings Breached - At 7:30 a.m., a CEV breaches the side of one of the main buildings and injects large amounts of tear gas into the interior of the compound. At 7:58 a.m., gas is fired into the second floor of the back-right corner of the building. The FBI asks for more ferret rounds, and by 9:30 a.m., 48 more ferret rounds arrive from Houston. The assault is hampered by the FBI’s dwindling supply of ferret rounds, a CEV with mechanical difficulties, and high winds dispersing the gas. Another CEV enlarges the opening in the center-front of the building, with the idea of providing an escape route for the trapped Davidians. A third CEV breaches the rear of the building, according to a later Justice Department report, “to create openings near the gymnasium.” [PBS Frontline, 10/1995]
Clinton Told Assault Progressing Well - At about 11 a.m., Reno briefs President Clinton, tells him that the assault seems to be going well, and leaves for a judicial conference in Baltimore. During this time, a CEV breaches the back side of the compound. At 11:40 a.m., the FBI fires the last of the ferret rounds into the building. At 11:45 a.m., one wall of the compound collapses. [PBS Frontline, 10/1995]
Transcriptionist Escapes - Ruth Riddle, the typist and transcriptionist sent inside the compound by the FBI to help Koresh finish his “Seven Seals” manuscript (see April 18, 1993), escapes the compound before the fire. She brings out a computer disk containing the unfinished manuscript. [Dean M. Kelley, 5/1995]
Davidians Set Fires throughout Compound - At 12:07 p.m., according to the Justice Department and House reports, the Davidians start “simultaneous fires at three or more different locations within the compound.” An FBI Hostage Rescue Team member reports seeing “a male starting a fire” in the front of the building. Later analyses show that the first fire begins in a second-floor bedroom, the second in the first floor dining room, and the third in the first floor chapel. Evidence also shows that the fires spread according to “accelerant trails,” such as a trail of flammable liquid being poured on the floor. Some of the Davidians’ clothing found in the rubble also shows traces of gasoline, kerosene, Coleman fuel (liquid petroleum, sometimes called “white gas”), and lighter fluid, further suggesting that the Davidians use accelerants to start and spread the fires. [PBS Frontline, 10/1995; House Committee on Government Reform and Oversight, 8/2/1996] Within eight minutes, the main building is engulfed in flames. One explosion, probably from a propane gas tank, is observed. Later investigation will find a propane tank with its top blown off in the debris. [House Committee on Government Reform and Oversight, 8/2/1996; House Committee on Government Reform and Oversight, 8/2/1996] After the compound burns to the ground, FBI agent Bob Ricks tells reporters, “David Koresh, we believe, gave the order to commit suicide and they all willingly followed.” [New York Times, 4/20/1993] Some of the Davidians who survive the conflagration later claim that the Davidians did not start the fires, but arson investigators with the Justice Department and the Texas Rangers, as well as an independent investigator, will conclude that Davidians did indeed start the fires in at least three different areas of the main building. [PBS Frontline, 10/1995] A 1993 Treasury Department report (see Late September - October 1993) will produce audiotapes of Davidians inside the compound and transcripts of conversations, secured via electronic surveillance, discussing the means of setting the fires. Voices on the tapes and in the transcripts say such things as: “The fuel has to go all around to get started.” “Got to put enough fuel in there.” “So, we only light ‘em as they come in,” or as a slightly different version has it, “So, we only light ‘em as soon as they tell me.” Once the fires begin, high winds and the breaches in the walls cause the flames to almost immediately begin consuming the compound. [Dean M. Kelley, 5/1995] In 1999, Colonel Rodney Rawlings, the senior military liaison to the HRT, will tell reporters that he heard Koresh give the orders to start the fires over FBI surveillance “bugs” (see October 8, 1999). Sage later describes the horror that goes through him and his fellow agents when they realize that the Davidians have torched the compound. He will recall “pleading” with the Davidians to leave the compound, and say: “I can’t express the emotions that goes through you. I had to physically turn around away from the monitor to keep my mind focused on what I was trying to broadcast to those people.” He will recall being horrified by the failure of people to flee the compound. “I fully anticipated those people would come pouring out of there,” he says. “I’d been through CS teargas on numerous occasions [in training exercises]. And I would move heaven and earth to get my kids out of that kind of an environment. And that’s frankly what we were banking on. That at least the parents would remove their children from that kind of situation.” Of Koresh, he will say: “By him intentionally lighting that place afire and consuming the lives of 78 people, including over 20 young children, was just inconceivable to me. In 25 years of law enforcement I’ve never been faced with someone that was capable of doing that.” [PBS Frontline, 10/1995] Six years later, the FBI will admit to releasing two pyrotechnic grenades into the compound, but insists the grenades did not start the fires (see August 25, 1999 and After).
Plea for Release - At 12:12 p.m., Sage calls on Koresh to lead the Davidians to safety. Nine Davidians flee the compound and are arrested [PBS Frontline, 10/1995] , including one woman who leaves, attempts to return to the burning building, and tries unsuccessfully to fight off a federal agent who comes to her aid. [New York Times, 4/20/1993] One of the nine runs out of the building at around 12:28 p.m., indicating that even 21 minutes after the fire, it is possible for some of the inhabitants to make their escape. However, most of the Davidians retreat to areas in the center of the building and do not attempt to get out. [House Committee on Government Reform and Oversight, 8/2/1996]
'Systematic Gunfire' - At 12:25 p.m., FBI agents hear “systematic gunfire” coming from inside of the building; some agents believe that the Davidians are either killing themselves or each other. The House committee investigation later finds that FBI agents hear rapid-fire gunshots coming from the compound; while many of the gunshots are probably caused by exploding ammunition, “other sounds were methodical and evenly-spaced, indicating the deliberate firing of weapons.”
Fire Department Responds; Search for Survivors - At 12:41 p.m., fire trucks and firefighters begin attempting to put out the flames. HRT agents enter tunnels to search for survivors, particularly children. [Dean M. Kelley, 5/1995; PBS Frontline, 10/1995; House Committee on Government Reform and Oversight, 8/2/1996] No fire trucks are at the scene when the assault begins, and it takes around 25 minutes for the first fire department vehicles to respond to emergency calls from their stations in Waco. Bob Sheehy, mayor of Waco, later says the city fire department “first got a call after the fire had already started.” Ricks explains that fire engines were not brought to the compound earlier for fear that firefighters might have been exposed to gunfire from the compound, and because FBI officials did not expect a fire. “We did not introduce fire to this compound, and it was not our intention that this compound be burned down. I can’t tell you the shock and the horror that all of us felt when we saw those flames coming out of there. It was, ‘Oh, my God, they’re killing themselves.’” [New York Times, 4/20/1993]
Death Toll - In all, 78 Branch Davidians, including over 20 children, two pregnant women, and Koresh himself, die in the fire. Nineteen of the dead are killed by close-range gunshot wounds. Almost all of the others either die from smoke inhalation, burns, or both. [PBS Frontline, 10/1995; House Committee on Government Reform and Oversight, 8/2/1996] The number is improperly reported in a number of media sources, and varies from 75 to 81. Even the House committee report does not cite a definitive total. [House Committee on Government Reform and Oversight, 8/2/1996] Some of the FBI negotiators involved in the siege later say that they feel continued negotiations might have saved many, perhaps all, of the lives of those inside the compound. In an interview later in the year, one negotiator tells a reporter, “I’ll always, in my own mind, feel like maybe we could have gotten some more people out.” [New Yorker, 5/15/1995] But HRT member Barry Higginbotham, one of the snipers who observes the Davidians throughout the siege, will later state that neither he nor anyone on his team believed the Davidians would ever willingly surrender. Higginbotham will say: “We just felt that if you make them suffer a little more, deny them perhaps a little more food, lighting, power, things like that inside, that would cause more pressure on their leadership inside. And perhaps their leadership would go to Koresh and pressure him to start negotiating in good faith. It was hard to believe that Koresh was ever negotiating in good faith.” [PBS Frontline, 10/1995] In the hours after the conflagration, Ricks tells reporters: “We had hoped the women would grab their children and flee. That did not occur and they bunkered down the children and allowed them to go up in flames with them.… It was truly an inferno of flames.” Ricks says that authorities receive reports, perhaps from some of the survivors, that the children had been injected with some kind of poison to ease their pain. This claim is never confirmed. [New York Times, 4/20/1993]
In the Bunker - FBI investigators combing the building after the conflagration find an enormous amount of guns and other weaponry inside. Dr. Rodney Crow, the FBI’s chief of identification services and one of the officials who examine the bodies of the Davidians, spends much of his time in the compound’s underground bunker, where many of the bodies are found. Crow later says: “There were weapons everywhere. I don’t remember moving a body that didn’t have a gun melted to it, intertwined with it, between the legs, under the arm, or in close proximity. And I’d say 18 inches to 20 inches would be close proximity.… The women were probably more immersed in the weapons than anyone else, because there was so much weaponry inside the bunker. It was like sea shells on a beach, but they were spent casings and spent bullets. If you had rubber gloves and tried to smooth it away, you’d tear your gloves away from the bullet points that are unexploded, or unspent ammunition. Then as you went through layer after layer, you came upon weapons that were totally burned. Until we got down to the floor, and it was mint condition ammunition there. Ammunition boxes not even singed.” The most powerful weapon Crow finds is a .50-caliber machine gun. Some of the bodies have gunshot wounds. Crow will say: “My theory is there was a lot of euthanasia and mercy killing. That group probably were just about as active as anywhere in the compound, mercifully putting each other out of misery in the last moments.” In total, 33 bodies are found inside the bunker; almost all the women and children found inside the compound are in the bunker. Many are found to have died from suffocation or smoke inhalation (two died from falling debris), but some died from gunshot wounds, and one woman was stabbed to death. [PBS Frontline, 10/1995; PBS Frontline, 10/1995] Local medical examiner Nizam Peerwani later says he does not believe the people in the bunker committed suicide, saying: “There has been a lot of speculation if this is a mass suicide or not. And—did they all go there to die? Ah, we don’t really think so. What I feel personally is that they tried to escape. A bunker was perhaps the safest area in the compound.” [PBS Frontline, 10/1995] Sage will say that he knew the children were dead sometime around 12:30 p.m. He recalls terminating the negotiations at that time, “because I didn’t want the loudspeaker bank to interfere with instructions being given on the ground. At that point in time, I walked over to the site in shock, basically. And, uh, the first thing I asked is, ‘Where are the kids?’” He is told, “Nowhere.” Sage will say: “They had not come out. They had been consumed.” [PBS Frontline, 10/1995]
Koresh's Fate - Koresh and Schneider are found in a small room the authorities call “the communication room.” Koresh is dead of a single gunshot wound to the forehead. Schneider is dead from a gunshot wound in the mouth. Peerwani later says: “Did David Koresh shoot himself and Schneider shoot himself? Or did Schneider shoot David Koresh and then turn around and shoot himself? Certainly both are possible. We cannot be certain as to what really transpired.” [PBS Frontline, 10/1995]
No Ill Effects from Gas - Peerwani and his colleagues examine the bodies for damage caused by the CS gas used in the assault, and find none. While many of the Davidians were exposed to the gas, according to tissue and blood studies, none inhaled enough of it to cause anything more than short-term discomfort. Concurrently, Peerwani and his colleagues find no damage from the propellant used in the ferret rounds. A fire report later written by Texas-based investigators will call the tear gas operation a failure at dispersing the Davidians. [PBS Frontline, 10/1995; PBS Frontline, 10/1995] Medical examinations show that some of the children may well have been overcome by the gas, and rendered unable to escape, but the compound had not been gassed for an hour before the fires began, and CS has a persistence factor of only 10 minutes—in other words, the effects should have worn off by the time the fires broke out. The gas proves ineffective against the adults, because the adult Davidians are equipped with gas masks. [PBS Frontline, 10/1995]
Wrongly Executed Plan - The plan as signed by Reno called on law enforcement forces to deploy tear gas into the compound at stated intervals, then have agents retreat to await evacuees before approaching again. This “passive,” “restrained” approach was to have been followed for up to 72 hours before using assault vehicles to force entry. Instead, the agents wait only 12 minutes before beginning a motorized vehicle assault. [New Yorker, 5/15/1995]
Taking Responsibility - One of the unlikely “heroes” of the debacle is Reno. She signed off on the attack (see April 17-18, 1993), and within hours of the attacks, she holds a televised press conference where she says: “I made the decision. I am accountable . The buck stops here” (see April 19, 1993). She repeats this statement over and over again on national television. [New Yorker, 5/15/1995]

Entity Tags: Bob Ricks, Bob Sheehy, Branch Davidians, David Koresh, FBI Hostage Rescue Team, Barry Higginbotham, Federal Bureau of Investigation, Janet Reno, Jeffrey Jamar, Byron Sage, US Department of Justice, Nizam Peerwani, William Jefferson (“Bill”) Clinton, Richard Rogers, Rodney Rawlings, Rodney Crow, Ruth Riddle, Texas Rangers, Steve Schneider

Timeline Tags: 1993 Branch Davidian Crisis

Kifah Wael Jayyousi.Kifah Wael Jayyousi. [Source: Robert A. Reeder]A Florida cell of Islamic radicals carries out fundraising, training, and recruitment to support the global jihad movement. The group is monitored by the FBI from the early 1990s, but no action is taken against it until after 9/11. The cell’s most prominent members are Adham Amin Hassoun, Mohammed Hesham Youssef, Kifah Wael Jayyousi, Kassem Daher, and Jose Padilla. Adnan Shukrijumah may also be involved (see (Spring 2001)).
bullet Both Hassoun and Jayyousi are associates of “Blind Sheikh” Omar Abdul-Rahman and the FBI monitors telephone conversations between them and Abdul-Rahman from January 1993 to 1995, at least. After Abdul-Rahman is taken into police custody in July 1993, according to an FBI agent, Jayyousi calls Abdul-Rahman in jail to “update the sheikh with jihad news, many times reading accounts and statements issued directly by terrorist organizations.” [St. Petersburg Times, 11/23/2003; Lance, 2006, pp. 126-8; Associated Press, 4/8/2006; International Herald Tribune, 1/4/2007]
bullet Funds are provided through bank accounts of Al-Gama’a al-Islamiyya (the Islamic Group), the Canadian Islamic Association, and Benevolence International Foundation (BIF), for which Hassoun files incorporation papers in Florida. The cell pays out thousands of dollars in checks, some of which are marked “Chechnya”, “Kosovo,” or “for tourism”.
bullet They try to talk in code, but the code is unsophisticated; for example “tourism” apparently means “terrorism”. In addition, they are not very careful and in one conversation overheard by the FBI, which records tens of thousands of their conversations from the early 1990s, one plotter asks another if he has enough “soccer equipment” to “launch an attack on the enemy.” In another, the conspirators discuss a $3,500 purchase of “zucchini” in Lebanon.
bullet Cell members are involved in jihad, through funding or direct participation, in Egypt, Somalia, Bosnia, Chechnya, Afghanistan, Lebanon, Libya, Kosovo, the former Soviet Republic of Georgia, and Azerbaijan.
bullet They are involved with both bin Laden and Chechen leader Ibn Khattab; for example, in one conversation Youssef tells Hassoun that he would be traveling “there at Osama’s and… Khattab’s company.” [Indictment. United States v. Jose Padilla, 11/17/2005 pdf file]
bullet They publish the Islam Report, a radical magazine about jihad. [Associated Press, 4/8/2006]
It is unclear why the FBI monitors the cell for almost a decade before doing anything. However, some of their activities are focused on Bosnia, where the US is turning a blind eye, or even actively assisting Islamic militants fighting on the Bosnian side (see 1992-1995 and April 27, 1994). The cell is broken up in the months after 9/11, and Hassoun, Jayyousi, and Padilla are sent for trial, which begins in 2007. [International Herald Tribune, 1/4/2007]

Entity Tags: Mohamed Hesham Youssef, Adnan Shukrijumah, Adham Amin Hassoun, Kifah Wael Jayyousi, Al-Gama’a al-Islamiyya, Omar Abdul-Rahman, Kassem Daher, Jose Padilla, Federal Bureau of Investigation, Canadian Islamic Association, Benevolence International Foundation

Timeline Tags: Complete 911 Timeline

The Communications Assistance for Law Enforcement Act (CALEA) takes effect. CALEA obliges telecommunications providers such as AT&T to give law enforcement agencies and US intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks. In more recent years, the law will be expanded to give law enforcement and intelligence agencies similar abilities to monitor Internet usage by US citizens. [Federal Communications Commission, 2/21/2007]

Entity Tags: Communications Assistance for Law Enforcement Act (CALEA), AT&T

Timeline Tags: Civil Liberties

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Timeline Tags: Civil Liberties

Attorney General Janet Reno, who signed the 1995 Procedures memo.Attorney General Janet Reno, who signed the 1995 Procedures memo. [Source: US Department of Justice]The Justice Department issues the “wall” memo, a later heavily criticized memo that establishes procedures to regulate the flow of information from FBI intelligence investigations to criminal investigators and prosecutors. Such procedures already exist, but this “wall” is now formalized and extended. The memo is signed by Attorney General Janet Reno, but is based on a similar one recently issued by Deputy Attorney General Jamie Gorelick governing the 1993 WTC bombing cases (see March 4, 1995). The wall exists to prevent defendants from successfully arguing in court that information gathered under a warrant issued under the Foreign Intelligence Surveillance Act (FISA) should not be used in a criminal prosecution, as the standard for obtaining a FISA warrant is considered to be lower than that for obtaining a criminal search warrant (see Early 1980s). Such arguments are usually unsuccessful, according to the Justice Department’s Office of Legal Counsel, which believes that courts are showing “great deference” to the government when such challenges are made. The procedures, which now apply to all intelligence investigations regardless of whether or not a FISA warrant has been issued, state that the FBI must consult the Justice Department’s Criminal Division, not local United States Attorneys’ offices, about intelligence investigations when it is considering starting a parallel criminal investigation, and that it must do so when there is reasonable indication of a significant federal crime. This means that FBI headquarters has veto power over whether a field office can contact a local prosecutor about an intelligence investigation. However, Criminal Division prosecutors should only be consulted and cannot control an investigation. [Office of the Attorney General, 7/19/1995; US Department of Justice, 11/2004, pp. 25-30 pdf file] These procedures will be implemented in such a way that even greater restrictions are placed on information sharing (see (Late 1995-1997)), although a partial exception will be created for the Southern District of New York, which handles a lot of terrorism work (see August 29, 1997). The procedures will also be much criticized for the way they are implemented in the FBI (see July 1999). The increased barriers to information sharing often mean that the FBI monitors terrorists as before, but the information does not get passed to criminal investigators, so the cells carry on operating in the US and the FBI carries on monitoring them. For example, the FBI monitors a Florida-based cell that funds and recruits for jihad throughout the world for nearly a decade before it is rolled up (see (October 1993-November 2001)). Some money raised by terrorism financiers in the US goes to Bosnia, where the US has a policy of enabling covert support for the Muslim side in the civil war (see April 27, 1994). Prosecutor Andrew McCarthy will later call the wall a “rudimentary blunder,” and say that it “was not only a deliberate and unnecessary impediment to information sharing; it bred a culture of intelligence dysfunction.” [National Review, 4/13/2004] John Ashcroft, Attorney General in the Bush Administration (see April 13, 2004), will say that “Government buttressed this ‘wall’,” and will call it the “single greatest structural cause for September 11.” [9/11 Commission, 4/13/2004]

Entity Tags: US Department of Justice, John Ashcroft, Jamie Gorelick, Janet Reno, Federal Bureau of Investigation, Foreign Intelligence Surveillance Act, Andrew McCarthy

Timeline Tags: Complete 911 Timeline

Following the issuance of the “wall” memo, which established procedures to regulate the flow of information from intelligence investigations by the FBI to local criminal prosecutors (see July 19, 1995), an additional information sharing “wall” is erected inside the FBI. After 9/11, the Justice Department’s Office of Inspector General will find, “Although it is unclear exactly when this ‘wall’ within the FBI began, [it was] sometime between 1995 and 1997.” This additional wall segregates FBI intelligence investigations from FBI criminal investigations and restricts the flow of information from agents on intelligence investigations to agents on criminal investigations, because of problems that may occur if the flow is not regulated (see Early 1980s). If an intelligence agent wants to “pass information over the wall” to a criminal agent, he should get approval from one of his superiors, either locally or at FBI headquarters. A description of wall procedures comes to be commonplace in all warrant requests filed under the Foreign Intelligence Surveillance Act (FISA). [US Department of Justice, 11/2004, pp. 30-32 pdf file] However, FBI agents often ignore these restrictions and over a hundred cases where information is shared without permission between intelligence and criminal FBI agents will later be uncovered (see Summer-October 2000 and March 2001).

Entity Tags: Federal Bureau of Investigation, Foreign Intelligence Surveillance Act, US Department of Justice

Timeline Tags: Complete 911 Timeline

Sheila E. Witnall, the secretary of the Air Force, declassifies all Air Force accident reports prior to January 25, 1956. The declassification includes the 1948 crash of the B-29 bomber that killed nine of 13 crew members during a secret “Project Banshee” mission (see October 6, 1948). The formerly classified reports had been at the heart of the case of US v Reynolds (see March 9, 1953) that sparked the so-called “state secrets” privilege. Four years after the declassification, the daughter of one of the slain civilians on board, Judy Palya Loether, finds the accident report on the Internet; the discovery spurs her to begin looking into the circumstances of her father’s death, and ultimately will result in a second lawsuit being filed on behalf of the families of the slain crewmen (see February 26, 2003). [Siegel, 2008, pp. 205-208]

Entity Tags: Project Banshee, Sheila E. Witnall, Judy Palya Loether, US Department of the Air Force

Timeline Tags: Civil Liberties

Law professor John Yoo writes a lengthy essay for the California Law Review entitled “The Continuation of Politics by Other Means: The Original Understanding of War Powers,” in which he argues that the Founding Fathers intended to empower presidents to launch wars without Congressional permission. Yoo has clerked for conservative judge Laurence Silberman and equally conservative Supreme Court Justice Clarence Thomas, and served for a year as counsel to then-Senate Judiciary Committee Chairman Orrin Hatch (R-UT). He has become a regular speaker at Federalist Society events, the informal but influential group of conservative lawyers, judges, and legal scholars who will come to have so much influence in the Bush administration. You argues that for generations, Constitutional scholars have misread the Constitution: the Founders actually supported, not repudiated, the British model of executive power that gave the king the sole power of declaring war and committing forces to battle. The Constitution’s granting of the legislature—Congress—the power to “declare war” is merely, Yoo writes, a reference to the ceremonial role of deciding whether to proclaim the existence of a conflict as a diplomatic detail. The Founders always intended the executive branch to actually declare and commence war, he writes. Most other Constitutional scholars will dismiss Yoo’s arguments, citing notes from the Constitutional Convention that show the Founders clearly intended Congress, not the president, to decide whether to commit the country to war. One of those Founders, James Madison, wrote in 1795 that giving a president the unilateral ability to declare war “would have struck, not only at the fabric of the Constitution, but at the foundation of all well organized and well checked governments. The separation of the power of declaring war from that of conducting it, is wisely contrived to exclude the danger of its being declared for the sake of its being conducted.” [Savage, 2007, pp. 80-81] Yoo will go on to join the Bush administration’s Office of Legal Counsel, and write numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002).

Entity Tags: Federalist Society, John C. Yoo

Timeline Tags: Civil Liberties

According to counterterrorism expert Rohan Gunaratna, US intelligence monitoring al-Qaeda communications learn that al-Qaeda is canceling an attack on Western targets in Singapore. On April 18, 1996, 108 Lebanese civilians seeking refuge at a UN camp in Qana, Lebanon, are killed by mortars fired by Israeli forces. Bin Laden “was keen not to dissipate what he envisaged as widespread revulsion against Israel’s action and hence called off the strike in Southeast Asia. Al-Qaeda’s team in question was very determined to go ahead, having spent years preparing the attack, and according to the intercepts it proved difficult for Osama to convince it otherwise.” Gunaratna claims the US learned this through the NSA’s Echelon satellite network (see Before September 11, 2001) “and other technical monitoring of their communications traffic.” [Gunaratna, 2003, pp. 133-134] If true, this case supports other evidence that the US was successfully monitoring bin Laden’s communications from an early date (see Early 1990s) and that al-Qaeda’s Southeast Asia operations were penetrated years before an important al-Qaeda summit in Malaysia discussing the 9/11 plot (see January 5-8, 2000).

Entity Tags: Echelon, Al-Qaeda, Osama bin Laden, National Security Agency

Timeline Tags: Complete 911 Timeline

Omar Nasiri, who informs on al-Qaeda for the British intelligence service MI6 and the French service Direction Générale de la Sécurité Extérieure (DSGE), makes contact with al-Qaeda logistics manager Abu Zubaida using a telephone bugged by MI6. Nasiri met Abu Zubaida in Pakistan (see Mid 1995-Spring 1996). Usually, when Nasiri calls the number, he talks to one of Abu Zubaida’s associates, but sometimes he talks to Abu Zubaida himself. The phone is used to relay messages between Abu Zubaida in Pakistan and al-Qaeda representatives in London, in particular leading imam Abu Qatada. The French will apparently make great use of this information (see October 1998 and After). [Nasiri, 2006, pp. 270-1, 273, 281]

Entity Tags: Direction Générale de la Sécurité Extérieure, Abu Zubaida, UK Secret Intelligence Service (MI6), Abu Qatada, Omar Nasiri

Timeline Tags: Complete 911 Timeline

Bosnia has so far raised only $200 million for its defense program budget. Half of that amount exists in the form of refurbished US military equipment given to the Bosnians. The other half has been donated by Muslim countries for training and additional weapons systems. Military Professional Resources Inc. (MPRI) of Alexandria, Va. is providing the first year’s training at a cost of $40 million. Richard Perle complains to the APF Reporter that the Clinton administration’s “equip-and-train” program in Bosnia is “too feeble an effort,” and questions the administration’s sincerity. In 1996, the Institute for Defense Analyses estimated that Bosnia would need about $700 million to meet the first stages of its defense program. [APF Reporter, 1997]

Entity Tags: Richard Perle

Timeline Tags: Neoconservative Influence

Fourteen nations, including the US, support a $400 million “Bosnian Defense Fund,” which reportedly collects cash and equipment contributions for a “train and equip” program that is operated by the US. [Arms Trade News, 10/1997] According to investigative journalist Wayne Madsen, a former Naval Officer who has worked with the NSA: “Via something called the Bosnia Defense Fund, these countries [Saudi Arabia, Iran, Malaysia, Brunei, Jordan, and Egypt] deposited millions of dollars into US coffers to buy weapons for the Bosnians…. According to Washington K Street sources, the law firm that established the Bosnia Defense Fund was none other than Feith and Zell, the firm of current Pentagon official and leading neo-con Douglas Feith. Feith’s operation at Feith and Zell was assisted by his one-time boss and current member of Rumsfeld’s Defense Policy Board, Richard Perle.” [CounterPunch, 9/18/2003]

Entity Tags: Richard Perle, Douglas Feith

Timeline Tags: Complete 911 Timeline

FBI agent Robert Wright, apparently frustrated that his Vulgar Betrayal investigation is not allowed to criminally charge Hamas operative Mohammad Salah and Saudi multimillionaire Yassin al-Qadi, gets a court order to seize $1.4 million in bank accounts and the Chicago house Salah owns. Wright says in the suit that the money is linked directly to al-Qadi and would be destined for terrorist activities. Wright uses a civil forfeiture law that had been frequently used to seize properties and funds of drug dealers or gangsters, but had never been used for accused terrorists. Salah had living in Chicago since his release from an Israeli prison in November 1997. A highly detailed affidavit tracks wire transfers from the US and Switzerland to specific Hamas attacks in Israel. Al-Qadi’s money was deposited in bank accounts controlled by Salah, who is called an important courier and financial agent for Hamas. Then Salah invested the money in BMI Inc., a real estate investment firm with ties to many suspected terrorism financiers (see 1986-October 1999). Some of the money is eventually withdrawn by Salah, brought to the West Bank, and given to Hamas operatives there (see 1989-January 1993). Salah denies the charges and says all the transfers were for charitable causes. Al-Qadi also claims innocence. [New York Times, 6/14/1998; United Press International, 5/30/2002; Wall Street Journal, 12/6/2002] However, a federal judge agrees to the defendants’ request for a stay order, and the suit is said to “languish” in a Chicago federal court. The funds remain frozen and Salah continues to live in his house. [Wall Street Journal, 9/25/2001] During the summer of 2001, the government will negotiate with Salah to settle the civil case, according to court records. [Chicago Tribune, 8/22/2004] The Justice Department will even move ahead with plans to return $1.4 million that Wright had seized from al-Qadi. But the transfer will be set for October 2001, “and the 9/11 attacks came first, prompting wiser minds at Justice to quash the move.” [New York Post, 7/14/2004] But also, in 2000, the parents of a US teenager said to have been killed by a Hamas attack in Israel will sue Salah and others for damaged based on this investigation, and they will win the suit in 2004 (see May 12, 2000-December 9, 2004). The US government will finally arrest Salah in 2004, and will charge him for many of the same offenses described in this 1998 case (see August 20, 2004). As of the end of 2005, al-Qadi has not been charged of any crime.

Entity Tags: BMI Inc., Vulgar Betrayal, US Department of Justice, Al-Qaeda, Mohammad Salah, Hamas, Robert G. Wright, Jr.

Timeline Tags: Complete 911 Timeline

Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right).Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right). [Source: Associated Press]Two US embassies in Africa are bombed within minutes of each other. At 10:35 a.m., local time, a suicide car bomb attack in Nairobi, Kenya, kills 213 people, including 12 US nationals, and injures more than 4,500. Mohamed al-Owhali and someone known only as Azzam are the suicide bombers, but al-Owhali runs away at the last minute and survives. Four minutes later, a suicide car bomb attack in Dar es Salaam, Tanzania, kills 11 and injures 85. Hamden Khalif Allah Awad is the suicide bomber there. The attacks will be blamed on al-Qaeda. [PBS Frontline, 2001; United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001] The Tanzania death toll is low because, remarkably, the attack takes place on a national holiday so the US embassy there is closed. [Miller, Stone, and Mitchell, 2002, pp. 195] The attack shows al-Qaeda has a capability for simultaneous attacks. The Tanzania bombing appears to have been a late addition, as one of the arrested bombers will allegedly tell US agents that it was added to the plot only about 10 days in advance. [United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001] A third attack against the US embassy in Uganda does not take place due to a last-minute delay (see August 7, 1998). [Associated Press, 9/25/1998] August 7, 1998, is the eighth anniversary of the arrival of US troops in Saudi Arabia and some people will speculate that this is the reason for the date of the bombings. [Gunaratna, 2003, pp. 46] In the 2002 book The Cell, reporters John Miller, Michael Stone, and Chris Mitchell will write: “What has become clear with time is that facets of the East Africa plot had been known beforehand to the FBI, the CIA, the State Department, and to Israeli and Kenyan intelligence services.… [N]o one can seriously argue that the horrors of August 7, 1998, couldn’t have been prevented.” They will also comment, “Inexplicable as the intelligence failure was, more baffling still was that al-Qaeda correctly presumed that a major attack could be carried out by a cell that US agents had already uncovered.” [Miller, Stone, and Mitchell, 2002, pp. 195, 206] After 9/11, it will come to light that three of the alleged hijackers, Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi, had some involvement in the bombings (see October 4, 2001, Late 1999, and 1993-1999) and that the US intelligence community was aware of this involvement by late 1999 (see December 15-31, 1999), if not before.

Entity Tags: Salem Alhazmi, Nawaf Alhazmi, Mohamed al-Owhali, Hamden Khalif Allah Awad, Khalid Almihdhar, Al-Qaeda, Azzam

Timeline Tags: Complete 911 Timeline

Counterterrorism expert Rohan Gunaratna will later write that after the US embassy bombings (see 10:35-10:39 a.m., August 7, 1998), surveillance of al-Qaeda is stepped up around the world. “One intelligence officer attached to the French embassy in Islamabad, [Pakistan], urged his counterparts in foreign missions in Pakistan to detail the recipients of phone calls made by… al-Qaeda leader Abu Zubaida, then living in Peshawar, to individuals in their various countries.” As a result, “several governments [launch] investigations of their own.” [Gunaratna, 2003, pp. 245] A close associate of Zubaida in Peshawar at this time is Khalil Deek, who is actually a mole for the Jordanian government (see 1998-December 11, 1999). One such investigation is launched by the Philippine government on October 16, 1998, after being asked by French intelligence to gather intelligence on people in the Philippines in contact with Zubaida. Code named CoPlan Pink Poppy, the investigation reveals connections between al-Qaeda and the Moro Islamic Liberation Front (MILF), a Philippine militant group. On December 16, 1999, Abdesselem Boulanouar and Zoheir Djalili, two French Algerians belonging to the Algerian al-Qaeda affiliate the Salafist Group for Call and Combat (GSPC), are arrested due to information learned from monitoring Zubaida’s calls to the Philippines. Boulanouar is arrested at an airport carrying a terrorist training manual he admitted writing for the MILF. Both men also are arrested carrying explosive devices. French intelligence says Boulanouar had ties to Ahmed Ressam (see December 14, 1999), and like Ressam, may have been planning to carry out attacks at the turn of the millennium. He will be deported to France and imprisoned on terrorism related charges. CoPlan Pink Poppy will be canceled in 2000 for lack of funds. [Gulf News, 3/14/2000; Ressa, 2003, pp. 132-133; Gunaratna, 2003, pp. 245] However, while details are murky, it appears other governments continue to monitor Zubaida’s calls. Around the same time as the Philippines arrests, one militant in Jordan is even arrested while still in the middle of a phone call to Zubaida (see November 30, 1999). US intelligence will remain intensely focused on Zubaida before 9/11 (see Late March-Early April 2001 and May 30, 2001), and just days before 9/11 the NSA will monitor calls Zubaida is making to the US (see Early September 2001). It appears his calls will continue to be monitored after 9/11 as well (see October 8, 2001).

Entity Tags: Khalil Deek, Zoheir Djalili, Moro Islamic Liberation Front, Direction Générale de la Sécurité Extérieure, Abdesselem Boulanouar, Philippines, Abu Zubaida, Al-Qaeda, Ahmed Ressam, Salafist Group for Preaching and Combat

Timeline Tags: Complete 911 Timeline

The Marienstrasse building.The Marienstrasse building. [Source: Associated Press]Future 9/11 hijacker Mohamed Atta, al-Qaeda operatives Said Bahaji and Ramzi Bin al-Shibh, and others in the al-Qaeda Hamburg cell move into a four bedroom apartment at 54 Marienstrasse, in Hamburg, Germany, and some of them stay there until February 2001. Investigators will later believe this move marks the formation of the Hamburg al-Qaeda cell. [Los Angeles Times, 1/27/2002; New York Times, 9/10/2002] Up to six men at a time live at the apartment, including, at times, 9/11 hijacker Marwan Alshehhi and cell member Zakariya Essabar. Alshehhi moves out after the first month; it is unclear why. [New York Times, 9/15/2001] During the 28 months Atta’s name is on the apartment lease, 29 Middle Eastern or North African men register the apartment as their home address.
Surveillance of Bahaji - From the very beginning, the apartment is under surveillance by German intelligence, because of investigations into businessman Mamoun Darkazanli that connect to Bahaji. [Washington Post, 10/23/2001] The Germans also suspect connections between Bahaji and al-Qaeda operative Mohammed Haydar Zammar. [Los Angeles Times, 9/1/2002] Bahaji is directly monitored for at least part of 1998, but German officials will not disclose when the probe began or ends. This investigation is dropped for lack of evidence (see (Late 1998)). [Associated Press, 6/22/2002; Los Angeles Times, 9/1/2002] Bahaji moves out in July 1999 and gets married a few months later (see October 9, 1999). [Der Spiegel (Hamburg), 8/29/2011]
Surveillance of El Motassadeq - German intelligence monitors the apartment off and on for months, and wiretaps Mounir El Motassadeq, an associate of the apartment-mates who will later be convicted for assisting the 9/11 plot, but apparently it does not find any indication of suspicious activity (see August 29, 1998). [Chicago Tribune, 9/5/2002]
Surveillance of Zammar - Zammar, a talkative man who has trouble keeping secrets, does not live at the apartment, but he is a frequent visitor to the many late night meetings there. [Miller, Stone, and Mitchell, 2002, pp. 259-60; Los Angeles Times, 9/1/2002; Chicago Tribune, 9/5/2002] He even lives in the apartment for a time in February 1999 (see February 1999). Zammar is the focus of an investigation that began in 1997 and continues until early 2000 (see March 1997-Early 2000). Interest in monitoring him increases in late 1998 (see October 2, 1998).
Surveillance of Atta - The CIA also allegedly starts monitoring Atta in early 2000 while he is living at the apartment, and does not tell Germany of the surveillance (see January-May 2000). Atta leaves Germany to live in the US in June 2000 (see June 3, 2000).
No Direct German Surveillance of the Apartment? - Yet, even though people like Zammar who frequently phone and visit the apartment are monitored, German officials will later claim that the apartment itself is never bugged. An unnamed senior German security official will later say that some surveillance of associated people gives “the impression that the people living there were fanatical believers. At the BfV [Germany’s domestic intelligence agency], we had to decide whether to ask permission to place a wiretap on the line at 54 Marienstrasse itself. We discussed this every day.” But he will claim that they ultimately decide they will not be able to get legal permission for a wiretap because there is no evidence that the apartment’s occupants are breaking any laws. [Vanity Fair, 11/2004] This claim that the apartment was not directly monitored seems contradicted by reports that Bahaji was the target of a surveillance investigation when he was living in the Marienstrasse apartment in late 1998 (see (Late 1998)).
What Would More Surveillance Have Uncovered? - It will later be clear that investigators could have found evidence if they looked more thoroughly. For instance, one visitor will recall Atta and others discussing attacking the US. [Knight Ridder, 9/9/2002] 9/11 mastermind Khalid Shaikh Mohammed is in Hamburg several times in 1999 and comes to the apartment. However, although there is a $2 million reward for Mohammed since 1998, the US apparently fails to tell Germany what it knows about him (see 1999). [Newsweek, 9/4/2002; New York Times, 11/4/2002] 9/11 Hijacker Waleed Alshehri also apparently stays at the apartment “at times.” [Washington Post, 9/14/2001; Washington Post, 9/16/2001] Remarkably, shortly after 9/11, the German government will claim it knew little about the Hamburg al-Qaeda cell before 9/11, and nothing directed it towards the Marienstrasse apartment. [Daily Telegraph, 11/24/2001]

Entity Tags: Mamoun Darkazanli, Khalid Shaikh Mohammed, Said Bahaji, Marwan Alshehhi, Central Intelligence Agency, Mohamed Atta, Mounir El Motassadeq, Al-Qaeda, Mohammed Haydar Zammar, Zakariya Essabar, Ramzi bin al-Shibh, Bundesamt fur Verfassungsschutz

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Princess Diana at a mine field in Angola in 1997.Princess Diana at a mine field in Angola in 1997. [Source: Tim Graham / Corbis]The NSA admits that US intelligence agencies possess 1,056 pages of classified information regarding Britain’s Princess Diana. British tabloids portray the documents as rife with salacious information on Diana’s “most intimate love secrets” about her relationship with Egyptian billionaire Dodi al-Fayed, but the actual documentation may not be so lurid. The NSA recently denied a Freedom of Information request from the Internet news service APB Online about information it has collected on Diana, who died in a tragic car accident in 1997. (It is unclear whether US intelligence has any unreleased information about the circumstances of Diana’s death. [APB Online, 11/30/1998; Washington Post, 12/12/1998] The NSA has denied monitoring Diana on the night of her death, an allegation raised by The Observer in 2006.) [MSNBC, 12/11/2006] In the two-page letter denying the request, the NSA admits to possessing a “Diana file,” but refuses to divulge what is in that file. A US intelligence official says the information is made up of conversations between other people who mentioned Diana; the references to Diana in those intercepted conversations are “incidental.” The official says Diana was never a particular target of the NSA’s Echelon surveillance program. However, the NSA has classified 124 pages of the “Diana documents” as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security.” According to a recent report by the European Parliament, the NSA routinely monitors virtually “all e-mail, telephone and fax communications… within Europe” (see July 11, 2001). Intelligence expert Steven Aftergood of the Federation of American Scientists says “the US and our allies promiscuously collect electronic communications around the world. Whether the descriptions of Echelon are accurate or not, that much is definitely true.” Some believe that lurid snippets of information leaked to the British press regarding Diana’s affair with Fayed, and her ambivalent relationship with Prince Charles, may have come from Echelon wiretaps and surveillance. Another FAS scientist, John Pike, says the NSA and other US intelligence agencies may have been monitoring Diana to protect her from terrorist attacks. Pike says it is also possible she may have been monitored because of her involvement in banning land mines, a position opposed by the Pentagon. [APB Online, 11/30/1998; Washington Post, 12/12/1998] Former NSA official Wayne Madsen will say in 2000, “[W]hen NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?” [CBS News, 2/27/2000] In August 1999, the NSA will deny another Freedom of Information request about its “Diana file” from the British newspaper The Guardian. [Guardian, 8/6/1999]

Entity Tags: Steven Aftergood, Prince Charles, The Guardian, John Pike, Dodi al-Fayed, Echelon, Federation of American Scientists (FAS), National Security Agency, Princess Diana

Timeline Tags: Civil Liberties

Dan ColemanDan Coleman [Source: CNN]Beginning in the autumn of 1998, the FBI uses the phone records of an al-Qaeda communications hub run by operative Ahmed al-Hada and his son Samir to build a map of al-Qaeda’s global organization. A map showing all the places in the world that have communicated with the hub is posted on the wall of the interagency counterterrorism I-49 squad in New York. The hub’s telephone number was uncovered during the East African embassy bombings investigation (see August 4-25, 1998 and Late August 1998). [Al Ahram, 2/21/2002; MSNBC, 7/21/2004; Wright, 2006, pp. 343; New Yorker, 7/10/2006 pdf file] According to FBI agent and I-49 squad member Dan Coleman, al-Hada is “uncle of half the violent jihadists we knew in the country.” [Suskind, 2006, pp. 94] Several of his sons and sons-in-law are al-Qaeda operatives and some die fighting and training with radical Islamists; this is known to US intelligence before 9/11. Hijacker Khalid Almihdhar is also a son-in-law of al-Hada. [MSNBC, 2/14/2002; Fox News, 2/14/2002; Los Angeles Times, 12/21/2005] The number is monitored by the NSA and over the next three years it mines intelligence that helps authorities foil a series of plots, including planned attacks on the US Embassy in Paris and the US Consulate in Istanbul, along with an attempted airline hijacking in Africa. However, the hub also serves as a planning center for the 2000 attack on the USS Cole in Yemen, which is successful (see October 12, 2000). [US News and World Report, 3/15/2004] The CIA, as the primary organization for gathering foreign intelligence, has jurisdiction over conversations on the al-Hada phone. Helped by the NSA, it stakes out the house—tapping the phone, planting bugs, and taking satellite photographs of its visitors. However, the CIA apparently does not provide the FBI with all the relevant information it is obtaining about al-Qaeda’s plans. [Mirror, 6/9/2002; New Yorker, 7/10/2006 pdf file] For example, the FBI is not informed that hijackers Khalid Almihdhar and Nawaf Alhazmi make calls to the communications hub from the US between spring 2000 and summer 2001 (see Spring-Summer 2000 and Mid-October 2000-Summer 2001). The FBI also asks the NSA to pass any calls between the communications hub and the US to the FBI, but the NSA does not do this either (see Late 1998). [Suskind, 2006, pp. 94]

Entity Tags: Federal Bureau of Investigation, I-49, National Security Agency, Samir al-Hada, Khalid Almihdhar, Nawaf Alhazmi, Dan Coleman, Ahmed al-Hada, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Chairman of the Joint Chiefs of Staff General Henry Shelton will later say, “Right after I left SOCOM [Special Operations Command], I asked my successor to put together a small team, if he could, to try to use the Internet and start trying to see if there was any way that we could track down Osama bin Laden or where he was getting his money from or anything of that nature.” A team of six intelligence officers will be given this task and Shelton will be periodically briefed on the progress of the program. But apparently the team, later to be called Able Danger, will focus on data mining tasks relating to Bosnia and China for most of 1999. [Sacramento Bee, 12/7/2005; US Congress, 2/15/2006] General Peter Schoomaker, the head of SOCOM, helped come up with the idea for Able Danger and helps to set it up. SOCOM, based in Tampa, Florida, is responsible for America’s secret commando units. [Government Security News, 9/2005] Mark Zaid, a lawyer for several Able Danger whistleblowers in 2005, will give this description of Able Danger: “In the most understandable and simplistic terms, Able Danger involved the searching out and compiling of open source or other publicly available information regarding specific targets or tasks that were connected through associational links. No classified information was used. No government database systems were used.… The search and compilation efforts were primarily handled by defense contractors, who did not necessarily know they were working for Able Danger, and that information was then to be utilized by the military members of Able Danger for whatever appropriate purposes.” [US Congress, 9/21/2005] Representative Curt Weldon (R-PA) will say in 2005 that the military’s purpose for the Able Danger program was to enable it to “manipulate, degrade, or destroy the global al-Qaeda infrastructure.” [Washington Post, 8/13/2005] Apparently, Able Danger does not begin to use real data to fight al-Qaeda until near the end of 1999.

Entity Tags: Curt Weldon, Special Operations Command, Peter J. Schoomaker, Able Danger, Henry Hugh Shelton, Mark Zaid

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Richard Barlow, a former intelligence analyst who was repeatedly fired for correctly claiming that Pakistan had a nuclear weapons program (see 1981-1982, August 1987-1988 and August 4, 1989), is awarded a total of $1 million by President Bill Clinton in compensation for the treatment he received. However, Barlow does not receive the money, as the settlement has to be ratified by Congress. When it runs into procedural problems, it is moved to the Court of Federal Claims to be reviewed. After Clinton is replaced by George W. Bush, CIA Director George Tenet and NSA Director Michael Hayden assert the government’s “state secrets privilege” (see March 9, 1953) over Barlow’s entire legal claim, causing it to collapse due to lack of evidence. [Guardian, 10/13/2007]

Entity Tags: William Jefferson (“Bill”) Clinton, Richard Barlow, National Security Agency, Michael Hayden, Court of Federal Claims, Central Intelligence Agency, George J. Tenet

Timeline Tags: A. Q. Khan's Nuclear Network

German intelligence gives the CIA the first name of 9/11 hijacker Marwan Alshehhi and his telephone number of a phone registered in the United Arab Emirates (UAE). The Germans learned the information from the surveillance of al-Qaeda Hamburg cell member Mohammed Haydar Zammar (see March 1997-Early 2000). They tell the CIA that Alshehhi, who is living in Bonn, Germany, at the time, may be connected to al-Qaeda. He is described as a UAE student who has spent some time studying in Germany. The conversation is short, but a known alias of Mamoun Darkazanli is mentioned. The CIA is very interested in Darkazanli and will try to recruit him as an informant later in the year (see Late 1998 and December 1999). [US Congress, 7/24/2003 pdf file; Deutsche Presse-Agentur (Hamburg), 8/13/2003; New York Times, 2/24/2004; McDermott, 2005, pp. 73, 278-279]
No Response from CIA - The Germans consider this information “particularly valuable” and ask the CIA to track Alshehhi, but the CIA never responds until after the 9/11 attacks. The CIA decides at the time that this “Marwan” is probably an associate of bin Laden but never track him down. It is not clear why the CIA fails to act, or if they learn his last name before 9/11. [New York Times, 2/24/2004] The Germans monitor other calls between Alshehhi and Zammar, but it isn’t clear if the CIA is also told of these or not (see September 21, 1999).
Could the Number Be Traced? - CIA Director George Tenet will later dismiss the importance of this information in a statement to the 9/11 Congressional Inquiry. He will say that all the CIA had to go on was a first name and an impossible to trace unlisted number. But author Terry McDermott will later comment, “At least a portion of that statement is preposterous. The UAE mobile telephone business was, until 2004, a state monopoly. The UAE number could have been traced in five minutes, according to senior security officials there. The United States never asked.” McDermott will add, “Further, the CIA told the [9/11 Congressional Inquiry] it had a long-standing interest in Zammar that pre-dated these recordings. In other words, the CIA appears to have been investigating the man who recruited the hijackers at the time he was recruiting them.” [McDermott, 2005, pp. 73, 278-279]

Entity Tags: Osama bin Laden, Terry McDermott, Mohammed Haydar Zammar, Germany, Mamoun Darkazanli, Marwan Alshehhi, Al-Qaeda, Central Intelligence Agency, George J. Tenet

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Nawaf Alhazmi and Khalid Almihdhar’s US visas.Nawaf Alhazmi and Khalid Almihdhar’s US visas. [Source: FBI] (click image to enlarge)9/11 hijackers Nawaf Alhazmi, Salem Alhazmi, and Khalid Almihdhar obtain US visas through the US Consulate in Jeddah, Saudi Arabia. [US Congress, 7/24/2003] Almihdhar and Nawaf Alhazmi are already “al-Qaeda veterans” and battle-hardened killers. Almihdhar’s visa is issued on April 7, and he can thereafter leave and return to the US multiple times until April 6, 2000. [Stern, 8/13/2003] Nawaf Alhazmi gets the same kind of visa; details about Salem are unknown. All three men have indicators in their passports marking them as Islamist radicals (see March 21, 1999, April 4, 1999, and April 6, 1999). These indicators are used to track them by the Saudi authorities, but are apparently not noticed by US officials. [9/11 Commission, 8/21/2004, pp. 9, 33 pdf file] The CIA claims the hijackers then travel to Afghanistan to participate in “special training” with at least one other suicide bomber on a different mission. The training is led by Khallad bin Attash, who applies for a US visa on April 3 from Yemen, but fails to get one (see April 3, 1999). The CIA will learn about Almihdhar’s visa in January 2000 (see January 2-5, 2000). The Jeddah Consulate records the fact that Nawaf and Salem Alhazmi obtain US visas a couple of days before Almihdhar, but apparently these records are never searched before 9/11. [US Congress, 7/24/2003, pp. 135 pdf file]

Entity Tags: US Consulate, Jeddah, Saudi Arabia Office, Khallad bin Attash, Khalid Almihdhar, Nawaf Alhazmi, Salem Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Anwar al-Awlaki.Anwar al-Awlaki. [Source: Public domain]The FBI conducts a counterterrorism inquiry into Anwar al-Awlaki, an imam who will later be suspected of involvement in the 9/11 plot. He serves as the “spiritual leader” to several of the hijackers (see March 2001 and After), and by 2008 US intelligence will determine he is linked to al-Qaeda (see February 27, 2008).
bullet The investigation is opened when it is learned he had probably been visited by a “procurement agent” for bin Laden, Ziyad Khaleel. Khaleel had helped buy a satellite phone for bin Laden; when he is arrested in December 1999 he reportedly tells the FBI crucial details about al-Qaeda operations in the US (see December 29, 1999).
bullet In early 2000 the FBI is aware when al-Awlaki is visited by an unnamed close associate of Sheikh Omar Abdul-Rahman. [US Congress, 7/24/2003, pp. 131 pdf file; Washington Post, 2/27/2008]
bullet He also serves as vice president of the Charitable Society for Social Welfare (CSSW), the US branch of a Yemeni charity founded by Sheikh Abdul Majeed al-Zindani, a Yemeni imam who the US will officially designate a terrorist in 2004. CSSW also has ties to the Islamic Cultural Institute in Milan, Italy, considered one of the centers of al-Qaeda activity in Europe. The FBI begins investigating CSSW in 1999 after a Yemeni politician visits the US to solicit donations for the charity, and then visits Mahmoud Es Sayed, a known al-Qaeda figure at the Islamic Cultural Institute, on the same trip. [Burr and Collins, 2006, pp. 243; Washington Post, 2/27/2008]
bullet The FBI learns that al-Awlaki knows individuals from the suspect Holy Land Foundation and others involved in raising money for Hamas. Sources allege that al-Awlaki has even more extremist connections.
But none of these links are considered strong enough for criminal charges, and the investigation is closed. [9/11 Commission, 7/24/2004, pp. 517] Al-Awlaki is beginning to associate with hijackers Nawaf Alhazmi and Khalid Almihdhar shortly before the investigation ends. For instance, on February 4, one month before the FBI investigation is closed, al-Awlaki talks on the telephone four times with hijacker associate Omar al-Bayoumi. The 9/11 Commission will later speculate that these calls are related to Alhazmi and Almihdhar, since al-Bayoumi is helping them that day, and that Alhazmi or Almihdhar may even have been using al-Bayoumi’s phone at the time (see February 4, 2000). Al-Bayoumi had also been the subject of an FBI counterterrorism investigation in 1999 (see September 1998-July 1999).

Entity Tags: Omar al-Bayoumi, Ziyad Khaleel, Nawaf Alhazmi, Osama bin Laden, Mahmoud Es Sayed, Omar Abdul-Rahman, Islamic Cultural Institute, Abdul Mejid al-Zindani, 9/11 Congressional Inquiry, Anwar al-Awlaki, Khalid Almihdhar, Federal Bureau of Investigation, Charitable Society for Social Welfare

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Hua Di.Hua Di. [Source: Stanford University]A report commissioned in mid-1999 by Rep. Curt Weldon (R-PA) looks into possible Chinese front companies in the US seeking technology for the Chinese military. Dr. Eileen Preisser and Michael Maloof are commissioned to make the report. Dr. Preisser, who runs the Information Dominance Center at the US Army’s Land Information Warfare Activity (LIWA) and will later become closely tied to Able Danger, uses LIWA’s data mining capabilities to search unclassified information. According to Maloof, their results show Chinese front companies in the US posing as US corporations that acquire technology from US defense contractors. When the study is completed in November 1999, the General Counsel’s office in the Office of the Defense Secretary orders the study destroyed. Weldon complains about this to Army Chief of Staff Eric Shinseki, and apparently delays the destruction of the report. Weldon also writes a letter to FBI Director Louis Freeh requesting an espionage investigation into these Chinese links, but Freeh never responds to this. [Washington Times, 10/9/2005] As part of this report, LIWA analysts had produced a chart of Chinese strategic and business connections in the US. But this data mining effort runs into controversy when the chart apparently shows connections between future National Security Adviser Condoleezza Rice, former Defense Secretary William Perry, and other prominent US figures, and business deals benefiting the Chinese military. [New York Post, 8/27/2005; Washington Times, 9/22/2005] The China chart was put together by private contractor James D. Smith, who will come forward in August 2005 to corroborate revelations about the Able Danger unit and its findings (see August 22-September 1, 2005). The New York Post later says there is “no suggestion that Rice or any of the others had done anything wrong.” [New York Post, 8/27/2005] However, articles first appear one month later and through 2001 in the conservative publications WorldNetDaily and NewsMax, which connect Perry and Rice to Hua Di, a Chinese missile scientist and possible spy, and question the nature of their relationship with him. [WorldNetDaily, 12/21/1999; WorldNetDaily, 4/5/2000; NewsMax, 1/24/2001] Di defected to the US in 1989 and worked most of the 1990s at Stanford University’s Center for International Security and Arms Control, which was co-directed by Perry. Di later returned to China and is subsequently sentenced to ten years in prison for writing influential articles said to reveal vital Chinese state secrets. [Stanford Report, 2/7/2001] However, other accounts claim that he was in fact passing on disinformation through these articles, successfully misleading the US military for a couple of years about the abilities of certain Chinese missile programs. [WorldNetDaily, 12/21/1999] Additionally, Hua Di teamed in 1994 with Stanford professor Dr. John Lewis and William Perry to buy an advanced AT&T fiber-optic communications system for “civilian” use inside China that instead is used by the Chinese army. The General Accounting Office later criticized the sale. In 1997, Stanford University investigated Dr. Lewis for his role in it, but Condoleezza Rice, serving as a Stanford provost at the time, apparently stopped the investigation. [WorldNetDaily, 4/5/2000; NewsMax, 1/24/2001] Able Danger and LIWA’s data mining efforts will be severely proscribed in April 2000 as part of the fallout from this China controversy (see April 2000), and the destruction of their collected data will follow shortly thereafter (see May-June 2000).

Entity Tags: F. Michael Maloof, William Perry, James D. Smith, Eric Shinseki, Hua Di, Eileen Preisser, Condoleezza Rice, Land Information Warfare Activity, Curt Weldon, Louis J. Freeh, China

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Gen. Pete Schoomaker.Gen. Pete Schoomaker. [Source: US Defense Department]A data mining program called Able Danger was set up by US Special Operations Command (SOCOM) in late 1998. It had been collecting data mostly on Bosnia and China (see Late December 1998). But at this time, it begins collecting data on al-Qaeda. [Government Security News, 9/2005] At least some of the data is collected on behalf of Maj. Gen. Geoffrey Lambert, the J3 at US Special Operations Command. [US Congress. Senate. Committee on Judiciary, 9/21/2005] Eleven intelligence employees are directly involved in Able Danger’s work. Six are with SOCOM’s Able Danger unit. Four more, including Dr. Eileen Preisser and Maj. Eric Kleinsmith, are with the US Army’s Land Information Warfare Activity (LIWA), which joins the effort in December 1999. LIWA had been conducing data mining already on a wide variety of topics, including international drug cartels, corruption in Russia and Serbia, terrorist linkages in the Far East, and the proliferation of sensitive military technology to China (see April 2000). [Norristown Times Herald, 6/19/2005; Government Security News, 8/2005; New York Times, 8/9/2005; St. Petersburg Times, 8/10/2005; Bergen Record, 8/14/2005; Government Security News, 9/2005; US Congress, 9/21/2005; US Congress. Senate. Committee on Judiciary, 9/21/2005] Lt. Col. Anthony Shaffer, running a military unit called Stratus Ivy in the Defense Intelligence Agency (DIA), will also take part in the effort. According to Shaffer, Stratus Ivy is tasked “to take on ‘out of the box’ ideas, and develop them into real intelligence operations.” So the goal is to use the information gathered by Able Danger to conduct real operations against al-Qaeda targets. [US Congress, 2/15/2006 pdf file] Using computers, the unit collects huge amounts of data in a technique called “data mining.” They get information from such sources as al-Qaeda Internet chat rooms, news accounts, web sites, and financial records. Using sophisticated software, they compare this with government records such as visa applications by foreign tourists, to find any correlations and depict these visually. [Bergen Record, 8/14/2005; Government Security News, 9/2005] The program will be shut down early in 2001 (see January-March 2001).

Entity Tags: Geoffrey Lambert, Anthony Shaffer, Eric Kleinsmith, Russia, Special Operations Command, Hugh Shelton, Al-Qaeda, Curt Weldon, Peter J. Schoomaker, Bosnia, China, Able Danger, Eileen Preisser

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

The NSA, monitoring a telephone in an al-Qaeda communications hub in Yemen (see Late August 1998 and Late 1998-Early 2002), has listened in on phone calls revealing that hijackers Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi are to attend an important al-Qaeda summit in Malaysia in January 2000 (see Shortly Before December 29, 1999). Almihdhar’s full name was mentioned, as well as the first names of hijackers Nawaf Alhazmi and Salem Alhazmi. On this day, the NSA shares this information with the CIA’s Alec Station bin Laden unit. Other US intelligence agencies, including FBI headquarters and the FBI’s New York field office, are told as well. Although Khalid Almihdhar’s full name was mentioned in one call, the NSA only passes on his first name. Also, the NSA has already learned from monitoring the Yemen hub that Nawaf’s last name is Alhazmi and that he is long-time friends with Almihdhar (see Early 1999). However, they either don’t look this up in their records or don’t pass it on to any other agency. [9/11 Commission, 1/26/2004, pp. 6 pdf file; US Department of Justice, 11/2004, pp. 239 pdf file; Wright, 2006, pp. 310] An NSA analyst makes a comment that is shared between US intelligence agencies, “Salem may be Nawaf’s younger brother.” This turns out to be correct. [US Congress, 7/24/2003, pp. 135 pdf file; 9/11 Commission, 1/26/2004, pp. 6 pdf file] A CIA officer will later tell the 9/11 Congressional Inquiry that information from the Africa embassy bombings (see 10:35-10:39 a.m., August 7, 1998) was reviewed in late 1999 during a worldwide effort to disrupt millennium attack plots (see December 15-31, 1999) and “a kind of tuning fork… buzzed when two [of the hijackers] reportedly planning a trip to [Malaysia] were linked indirectly to what appeared to be a support element… involved with the Africa bombers.” [US Congress, 7/24/2003, pp. 135 pdf file] The fact that they are connected to the Yemen communication hub already indicates some importance within al-Qaeda. It is learned they are connected to the embassy bombings in some way (see October 4, 2001 and Late 1999). [US Congress, 7/24/2003, pp. 135 pdf file; 9/11 Commission, 1/26/2004, pp. 6 pdf file] The NSA report about them on this day is entitled, “Activities of Bin Laden Associates,” showing the clear knowledge of their ties to bin Laden. [9/11 Commission, 7/24/2004, pp. 502; Vanity Fair, 11/2004] The CIA will track Almihdhar and Nawaf Alhazmi to the Malaysia summit (see January 2-5, 2000 and January 5-8, 2000).

Entity Tags: Salem Alhazmi, Federal Bureau of Investigation, FBI New York Field Office, Khalid Almihdhar, FBI Headquarters, Al-Qaeda, Alec Station, Central Intelligence Agency, Ahmed al-Hada, National Security Agency, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A blurry photograph of a 2005 reconstruction of the pre-9/11 Able Danger chart showing Mohamed Atta and others.A blurry photograph of a 2005 reconstruction of the pre-9/11 Able Danger chart showing Mohamed Atta and others. [Source: C-SPAN]A US Army intelligence program called Able Danger identifies five al-Qaeda terrorist cells; one of them has connections to Brooklyn, New York and will become informally known as the “Brooklyn” cell by the Able Danger team. This cell includes 9/11 hijacker leader Mohamed Atta, and three other 9/11 hijackers: Marwan Alshehhi, Khalid Almihdhar, and Nawaf Alhazmi. According to a former intelligence officer who claims he worked closely with Able Danger, the link to Brooklyn is not based upon any firm evidence, but computer analysis that established patterns in links between the four men. “[T]he software put them all together in Brooklyn.” [New York Times, 8/9/2005; Washington Times, 8/22/2005; Fox News, 8/23/2005; Government Security News, 9/2005] However, that does not necessarily imply them being physically present in Brooklyn. A lawyer later representing members of Able Danger states, “At no time did Able Danger identify Mohamed Atta as being physically present in the United States.” Furthermore, “No information obtained at the time would have led anyone to believe criminal activity had taken place or that any specific terrorist activities were being planned.” [CNN, 9/21/2005; US Congress, 9/21/2005] James D. Smith, a contractor working with the unit, discovers Mohamed Atta’s link to al-Qaeda. [WTOP Radio 103.5 (Washington), 9/1/2005] Smith has been using advanced computer software and analysing individuals who are going between mosques. He has made a link between Mohamed Atta and Sheikh Omar Abdul-Rahman, ringleader of the 1993 bombing of the World Trade Center. [Fox News, 8/28/2005; Government Security News, 9/2005] Atta is said to have some unspecified connection to the Al Farouq mosque in Brooklyn, a hotbed of anti-American sentiment once frequented by Abdul-Rahman, which also contained the notorious Al-Kifah Refugee Center. [Times Herald (Norristown), 9/22/2005] Smith obtained Atta’s name and photograph through a private researcher in California who was paid to gather the information from contacts in the Middle East. [New York Times, 8/22/2005] Lt. Col. Anthony Shaffer claims the photo is not the well-known menacing Florida driver’s license photo of Atta. “This is an older, more grainy photo we had of him. It was not the best picture in the world.” It is said to contain several names or aliases for Atta underneath it. [Jerry Doyle Show, 9/20/2005; Chicago Tribune, 9/28/2005] LIWA analysts supporting Able Danger make a chart, which Shaffer describes in a radio interview as, “A chart probably about a 2x3 which had essentially five clusters around the center point which was bin Laden and his leadership.” [Savage Nation, 9/16/2005] The 9/11 Commission later claims that Atta only enters the United States for the first time several months later, in June 2000 (see June 3, 2000). [9/11 Commission, 7/24/2004, pp. 224] However, investigations in the months after 9/11 find that Mohamed Atta and another of the hijackers rented rooms in Brooklyn around this time (see Spring 2000). Other newspaper accounts have the CIA monitoring Atta starting in January 2000, while he is living in Germany (see January-May 2000). Atta, Alshehhi, Almihdhar, Alhazmi and other hijackers have connections to associates of Sheikh Abdul-Rahman (see Early 2000-September 10, 2001).

Entity Tags: Al-Kifah Refugee Center, Al-Qaeda, El Farouq, Khalid Almihdhar, Mohamed Atta, Able Danger, Omar Abdul-Rahman, Nawaf Alhazmi, Marwan Alshehhi, Al Farouq Mosque

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A photocopy of Nawaf Alhazmi’s passport. No image of Khalid Almihdhar’s passport has been released, but it would have looked similar to this one.A photocopy of Nawaf Alhazmi’s passport. No image of Khalid Almihdhar’s passport has been released, but it would have looked similar to this one. [Source: FBI]The CIA is aware that hijacker Khalid Almihdhar is staying at a highly monitored al-Qaeda communication hub (see Late 1998-Early 2002) and is planning to travel to an al-Qaeda meeting in Malaysia. He is closely watched as leaves the hub and flies from Sana’a, Yemen, to Dubai, United Arab Emirates, on his way to Malaysia. Agents from eight CIA offices and six friendly foreign intelligence services are all asked to help track him, in the hopes he will lead them to bigger al-Qaeda figures. [Stern, 8/13/2003; 9/11 Commission, 1/26/2004, pp. 6 pdf file] The CIA and local authorities are running an operation to track militants transiting Dubai airport (see 1999), and United Arab Emirates officials secretly make copies of his passport as he is passing through it, immediately reporting this to the CIA. [Bamford, 2004, pp. 224] Another account suggests CIA agents break into Almihdhar’s Dubai hotel room and photocopy the passport there. Either way, the information is immediately faxed to Alec Station, the CIA’s bin Laden unit. [Wright, 2006, pp. 311] The CIA not only learns his full name, but also discovers the vital fact that he has a multiple entry visa to the US that is valid from April 1999 to April 2000. But even though the CIA now knows about this US visa which indicates he plans to go to New York City, they do not place him on a terror watch list and they fail to tell the FBI about the visa. [Bamford, 2004, pp. 224; 9/11 Commission, 1/26/2004, pp. 6 pdf file]

Entity Tags: United Arab Emirates, Nawaf Alhazmi, Alec Station, Central Intelligence Agency, Khalid Almihdhar, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A CIA officer known only as “James,” who knows that 9/11 hijacker Khalid Almihdhar has a US visa, twice briefs FBI officials about al-Qaeda’s Malaysia summit, but fails to mention the visa.
First Briefing - On the night of January 5, 2000, James, who has been assigned to the FBI’s Strategic Information Operations Center (SIOC) to deal with problems “in communicating between the CIA and the FBI,” briefs an FBI agent who works in the FBI’s bin Laden unit, which is part of the SIOC at that time, about a number of cables he has received regarding the al-Qaeda summit that is just starting in Malaysia and one of the people attending it, Almihdhar. The FBI agent will later say he does not know why James chooses to brief him, as he is not a designated contact point for the CIA.
Documented by E-mail - James will later write an e-mail to several other CIA officers and detail “exactly” what he briefed this person on. Although the CIA should inform the FBI of a terrorist like Almihdhar having a US visa, he does not mention discussing the visa with the FBI agent, even though he had just seen several CIA cables talking about it.
Second Briefing - Overnight, another CIA cable comes in to him providing new details about Almihdhar and the Malaysia summit. An FBI agent then asks another CIA officer detailed to the FBI for an update on Almihdhar. This second CIA officer asks James for the update, so he can pass it on. James’s response to this request is to brief a third FBI agent in the SIOC about the new information. Again, records will indicate he fails to mention anything about Almihdhar’s US visa. This FBI agent will also say he does not know why he was briefed on the matter, as he is not a designated contact point for the CIA. James then tells his CIA colleague he has already provided the FBI with an update, so this second officer does not have to do so.
Informing Other Agents - James also sends an e-mail to other CIA agents describing “exactly” what he told both of the FBI agents. One section of his e-mail reads: “Thus far, a lot of suspicious activity has been observed [in Malaysia] but nothing that would indicate evidence of an impending attack or criminal enterprise. [I told the first FBI agent] that as soon as something concrete is developed leading us to the criminal arena or to known FBI cases, we will immediately bring FBI into the loop. Like [the first FBI agent] yesterday, [the second FBI agent] stated that this was a fine approach and thanked me for keeping him in the loop.”
Refuses to Be Interviewed - After 9/11, James will refuse to talk to the Justice Department’s Office of Inspector General, but will tell the CIA’s inspector general that he has no recollection of these events. [US Congress, 7/24/2003, pp. 135 pdf file; US Department of Justice, 11/2004, pp. 241-247 pdf file; Tenet, 2007, pp. 195]

Entity Tags: Khalid Almihdhar, CIA officer known as “James”, Federal Bureau of Investigation, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Victims’ family members Lorie Van Auken (right) and Kristen Breitweiser (left) are shocked to learn Tom Wilshire blocked a cable to the FBI about Khalid Almihdhar’s visa. Victims’ family members Lorie Van Auken (right) and Kristen Breitweiser (left) are shocked to learn Tom Wilshire blocked a cable to the FBI about Khalid Almihdhar’s visa. [Source: Banded Artists]Doug Miller, an FBI agent assigned to Alec Station, the CIA’s bin Laden unit, reads CIA cables reporting that 9/11 hijacker Khalid Almihdhar has a US visa and drafts a cable to the FBI to inform it of this. The CIA obtained the information through a tap on Almihdhar’s phone in Yemen (see December 29, 1999) and by monitoring him as he passed through Dubai (see January 2-5, 2000) on his way to an al-Qaeda summit in Malaysia (see January 5-8, 2000).
Draft Cable - Miller writes that Almihdhar has a US visa (see April 3-7, 1999) and that the visa application states his destination is New York and he intends to stay for three months. The draft cable mentions the tap on Almihdhar’s phone, his planned travel to Malaysia, and the links between his phone and the 1998 East African embassy bombings (see 10:35-10:39 a.m., August 7, 1998 and October 4, 2001). It also says that the CIA has obtained photographs of Almihdhar and these will be sent separately. Miller asks the FBI for feedback resulting from an FBI investigation.
Blocked - Another CIA officer named Michael Anne Casey accesses Miller’s draft about an hour after he writes it. The cable is then blocked on the orders of the station’s deputy chief, Tom Wilshire, as a few hours after Miller drafts the cable Casey attaches a message to it saying, “pls hold off on [cable] for now per [Tom Wilshire].” [9/11 Commission, 7/24/2004, pp. 502; US Department of Justice, 11/2004, pp. 240 pdf file] Miller is also told, “This is not a matter for the FBI.” [Wright, 2006, pp. 311]
'No Reason to Kill the Message' - Author James Bamford will later comment: “A potential terrorist and member of al-Qaeda was heading for the US, the FBI’s jurisdiction—its turf—and he [Miller] was putting the FBI on notice so it could take action. There was no reason to kill the message.” [Bamford, 2008, pp. 19] Miller will later say he has no “rational answer” as to why the cable was blocked, but will speculate that Alec Station officers were annoyed he had encroached on their territory. [Congressional Quarterly, 10/1/2008] Casey drafts a cable falsely saying that the information about Almihdhar’s visa has been shared with the FBI (see Around 7:00 p.m. January 5, 2000) and there will be a discussion the next day about whether the cable should be sent (see January 6, 2000). The Justice Department’s Office of Inspector General will later call the failure to pass the information to the FBI a “significant failure” but will be unable to determine why the information was not passed on. [US Department of Justice, 11/2004, pp. 250 pdf file] The 9/11 Commission will know of the incident, but will relegate it to an endnote in its final report, omitting Wilshire’s role entirely. [9/11 Commission, 7/24/2004, pp. 502] The CIA inspector general will falsely claim that the cable is not sent, “[a]pparently because it was in the wrong format or needed editing.” [Central Intelligence Agency, 6/2005, pp. xv pdf file]

Entity Tags: Michael Anne Casey, Federal Bureau of Investigation, Khalid Almihdhar, Doug Miller, 9/11 Commission, Alec Station, Tom Wilshire, Central Intelligence Agency, Office of the Inspector General (CIA)

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The 9/11 hijackers have links to several people associated with “Blind Sheikh” Omar Abdul-Rahman, the spiritual head of the group that bombed the World Trade Center in 1993. Abdul-Rahman has been in prison since the mid-1990s.
bullet 9/11 hijackers Khalid Almihdhar and Nawaf Alhazmi attend a mosque in San Diego that is visited by an unnamed associate of Abdul-Rahman who is under investigation by the Los Angeles FBI (see June 1999-March 2000);
bullet The mosque is also attended by Osama Basnan, who threw a party for Abdul-Rahman in 1992 (see Spring 2000);
bullet 9/11 hijacker Mohamed Atta is seen with Adnan Shukrijumah, son of Abdul-Rahman’s former translator (see May 2, 2001) and Atta and hijacker Marwan Alshehhi may attend a mosque run by his father (see 2000-2001);
bullet Hijacker Mohand Alshehri is seen near the Minnesota clinic where Abdul-Rahman is being held (see August 2001);
bullet Some hijackers have the same mailing address as Abdul-Rahman and at least one of his associates (see Before September 11, 2001);
bullet Khalid Almihdhar and other hijackers obtain false ID cards from Mohamed el-Atriss, an associate of an unindicted co-conspirator at Abdul-Rahman’s trial (see (July-August 2001)); [Lance, 2006, pp. 373]
bullet In addition, people attending a Bronx mosque are warned to stay away from lower Manhattan on 9/11 (see Early September 2001).
In early 2000, the Able Danger data-mining program apparently identifies Atta, Alshehhi, Alhazmi, and Almihdhar as members of al-Qaeda through their associations with people linked to Abdul-Rahman (see January-February 2000).

Entity Tags: Mohamed el-Atriss, Adnan Shukrijumah, Omar Abdul-Rahman, Osama Basnan, Mohand Alshehri, Mohamed Atta, Nawaf Alhazmi, Marwan Alshehhi, Khalid Almihdhar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

While the 9/11 hijackers are in the US, the NSA intercepts several calls between them and an al-Qaeda communications hub in Sana’a, Yemen, run by Ahmed al-Hada, who is hijacker Khalid Almihdhar’s father-in-law (see August 4-25, 1998).
Summary of Calls -
bullet The first calls are made by Almihdhar and are intercepted during the spring and summer of 2000 (see Spring-Summer 2000).
bullet More calls are made by hijacker Nawaf Alhazmi after the bombing of the USS Cole in October 2000 (see Mid-October 2000-Summer 2001).
bullet The final call from the US is intercepted just a few weeks before 9/11 (see (August 2001)).
The NSA intercepted the hijackers’ calls outside the US before this (see Early 1999 and December 29, 1999) and continues to do so in 2000 (see Summer 2000) after Almihdhar returns to Yemen (see June 10, 2000 and (Mid-June-Mid-July 2000)).
Calls' Content - Some of the calls may only contain non-operational information, as they are reportedly between Almihdhar and his wife. [9/11 Commission, 7/24/2004, pp. 222; Suskind, 2006, pp. 94; Wright, 2006, pp. 343] However, the calls are also used to relay messages to the 9/11 hijackers. [Embassy of Yemen (Washington), 2/13/2002; MSNBC, 2/14/2002; MSNBC, 5/2005]
Agencies' Roles - The CIA is the lead agency monitoring the communications hub. It has planted bugs inside it and is wiretapping all calls (see Late August 1998). Intercepts of calls to and from the hub are a major plank of the US intelligence community’s effort to fight al-Qaeda. Also involved is the FBI, which is using phone records to plot these calls on a map (see Late 1998-Early 2002). Some of the calls intercepted by US intelligence come from Osama bin Laden’s satellite phone in Afghanistan (see August 4-25, 1998 and Late August 1998). After 9/11, counterterrorism officials will say that the number was one of the hottest targets being monitored by the NSA and was an “intelligence bonanza.” [Los Angeles Times, 12/21/2005; Wright, 2006, pp. 343]
Importance of Failure - Also after 9/11, counterterrorism officials will agree that the failure to follow leads to the US from this number was a huge missed opportunity to stop the 9/11 plot. For instance, FBI agent Kenneth Maxwell will say: “Two al-Qaeda guys living in California—are you kidding me? We would have been on them like white on snow: physical surveillance, electronic surveillance, a special unit devoted entirely to them.” [MSNBC, 7/21/2004; New Yorker, 7/10/2006 pdf file]
Discussed after 9/11 - The failure to roll up the plot based on these communications intercepts will be discussed following 9/11 (see Summer 2002-Summer 2004 and March 15, 2004 and After).

Entity Tags: Federal Bureau of Investigation, Central Intelligence Agency, Khalid Almihdhar, Nawaf Alhazmi, National Security Agency, Hoda al-Hada, Ahmed al-Hada, Kenneth Maxwell

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Future 9/11 hijacker pilot Ziad Jarrah is briefly detained and questioned at the Dubai airport (see January 30-31, 2000), and some reports will suggest this is because he is already on a US watch list. It is not known when he may have been put on a watch list or why. The only information about this will come from conflicting accounts as to why Jarrah is stopped and questioned by immigration officials for several hours in Dubai, United Arab Emirates (UAE) on January 30.
Did the US Tell the UAE to Stop Jarrah? - According to one version, UAE officials claim Jarrah is stopped based on a tip-off from the US. A UAE source will tell author Jane Corbin: “It was at the request of the Americans and it was specifically because of Jarrah’s links with Islamic extremists, his contacts with terrorist organizations. That was the extent of what we were told.” [Corbin, 2003] In 2002, CNN will also report that Jarrah is stopped because he is on a US watch list. It claims this is sourced not only from UAE sources, but from other governments in the Middle East and Europe. However, US officials will claim no such tip-off was ever given. [CNN, 8/1/2002]
Passport and Religious Material Version - Other versions of the story will claim that Jarrah first raises suspicion because of an overlay of the Koran in his passport and because he is carrying religious tapes and books. This is what the 9/11 Commission will claim. [9/11 Commission, 7/24/2004, pp. 496] Other accounts, such as one in Vanity Fair in late 2004, will support this version. [Vanity Fair, 11/2004]
UAE Has Existing Program to Track Militants for the CIA - There may be a middle version of sorts, that Jarrah may be stopped because the CIA wants people with a profile just like his to be stopped. According to CNN: “The questioning of Jarrah in Dubai fits the pattern of a CIA operation described to CNN by UAE and European sources. Those sources say that in 1999, the CIA began an operation to track suspected al-Qaeda operatives, as they transited there. One of those sources provided [a] drawing showing the airport layout and describes how people wanted for questioning were intercepted, most often at a transit desk. As was the case with Ziad Jarrah, CNN sources say UAE officials were, often, told in advance by American officials who was coming in and whom they wanted questioned.” [CNN, 8/1/2002] It will also be reported that in the summer of 1999, the CIA asked immigration officials all over the region to question anyone who may have been returning from training camps in Afghanistan, and Jarrah fits that profile (see Summer 1999). [Vanity Fair, 11/2004]

Entity Tags: Central Intelligence Agency, United Arab Emirates, 9/11 Commission, Ziad Jarrah

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Judy Palya Loether.Judy Palya Loether. [Source: SecrecyFilm (.com)]Judy Palya Loether, the daughter of a civilian engineer killed in a 1948 plane crash while on a secret government mission (see October 6, 1948), reads over the voluminous reports of the accident that claimed her father’s life. The reports, now declassified (see January 1996), had been at the heart of a landmark lawsuit that gave judicial recognition to the government’s “state secrets” privilege (see March 9, 1953). Loether is shocked to find that the reports contain nothing that could be construed as military or tactical secrets of any kind, though for decades the government has insisted that they could not be revealed, even to a judge (see October 18, 1948, July 26, 1950, August 7-8, 1950, September 21, 1950, and October 19, 1951). What they do contain is a compendium of witness statements and expert findings that indicate a number of mistakes and errors led to the crash. Loether begins contacting the families of the widows who had filed the original lawsuit against the government (seeJune 21, 1949) to share her findings. [Siegel, 2008, pp. 210-211] Loether is confused and angered over the contents of the reports, and the government’s response to the lawsuit. She cannot understand why the government pressed so hard to keep the reports classified, knowing that they contained no sensitive information about the secret missile program, and is particularly troubled by the fact that at least two senior government officials signed affidavits affirming the reports’ inclusion of such information while knowing that the reports contained nothing of the sort. She wonders if government officials had perhaps decided to lie about the reports in order to establish some sort of state secrets privilege. In September 2002, lawyers Wilson Brown and Jeff Almeida, retained by Loether and others who lost family members in the crash, come to the same conclusion. As Almeida will say to Brown: “I’ve read this report. There’s nothing in there.” [Siegel, 2008, pp. 219] As time goes on, Loether and her colleagues files a second lawsuit seeking to overturn the first Supreme Court verdict (see February 26, 2003).

Entity Tags: Wilson Brown, Jeff Almeida, Judy Palya Loether

Timeline Tags: Civil Liberties

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

Mohamed Atta and another of the 9/11 hijackers (presumably Marwan Alshehhi) rent rooms in New York City, according to a federal investigator. These rooms are in the Bronx and Brooklyn. Following 9/11, Atta is traced back to Brooklyn by a parking ticket issued to a rental car he was driving. However, immigration records have Mohamed Atta entering the US for the first time on June 3, 2000 (see June 3, 2000). The Associated Press article on this subject does not specify if Atta first stayed in New York before or after that date. [Associated Press, 12/8/2001] According to a brief mention in the 9/11 Commission’s final report, in the month of June, “As [Atta and Marwan Alshehhi] looked at flight schools on the East Coast, [they] stayed in a series of short-term rentals in New York City.” [9/11 Commission, 7/24/2004, pp. 224; Washington Post, 8/13/2005] Earlier in 2000, a US Army intelligence program called Able Danger identified an al-Qaeda terrorist cell based in Brooklyn, of which Atta is a member (see January-February 2000). Also, a number of eyewitnesses later report seeing Atta in Maine and Florida before this official arrival date (see April 2000; Late April-Mid-May 2000).

Entity Tags: Able Danger, Mohamed Atta, Marwan Alshehhi, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A 1999 study by the US Army’s Land Information Warfare Activity (LIWA) to look into possible Chinese front companies in the US seeking technology for the Chinese military created controversy and was ordered destroyed in November 1999 (see Mid-1999-November 1999). However, apparently Rep. Curt Weldon (R-PA) protests, and the issue finally comes to a head during this month. One result of this controversy will be what Major Erik Kleinsmith will later call “severely restricted” support for Able Danger, including a temporary end to LIWA support (see April 2000) In an April 14, 2000 memorandum from the legal counsel in the Office of the Joint Chiefs of Staff, Captain Michael Lohr writes that the concern over the LIWA data mining study raises privacy concerns: “Preliminary review of subject methodology raised the possibility that LIWA ‘data mining’ would potentially access both foreign intelligence (FI) information and domestic information relating to US citizens (i.e. law enforcement, tax, customs, immigration, etc.… I recognize that an argument can be made that LIWA is not ‘collecting’ in the strict sense (i.e. they are accessing public areas of the Internet and non-FI federal government databases of already lawfully collected information). This effort would, however, have the potential to pull together into a single database a wealth of privacy-protected US citizen information in a more sweeping and exhaustive manner than was previously contemplated.” Additionally, the content of the study is another reason why it caused what Weldon calls a “wave of controversy.” The study had connected future National Security Adviser and Secretary of State Condoleezza Rice, former Defense Secretary William Perry, and other prominent US citizens to business transactions with Chinese military officials.(see Mid-1999-November 1999). [New York Post, 8/27/2005; Office of Congressman Curt Weldon, 9/17/2005; US Congress, 9/21/2005; Washington Times, 9/22/2005; Washington Times, 10/9/2005] One article on the subject will comment, “Sources familiar with Able Danger say the project was shut down because it could have led to the exposure of a separate secret data mining project focusing on US citizens allegedly transferring super-sensitive US technology illegally to the Chinese government.” [WTOP Radio 103.5 (Washington), 9/1/2005] A massive destruction of data from Able Danger and LIWA’s data mining efforts will follow, one month later (see May-June 2000).

Entity Tags: Michael Lohr, Land Information Warfare Activity, Able Danger, Condoleezza Rice, William Perry, Curt Weldon

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Johnelle Bryant.Johnelle Bryant. [Source: ABC News]9/11 hijacker Mohamed Atta reportedly has a very strange meeting with Johnelle Bryant of the US Department of Agriculture. Incidentally, this meeting takes place one month before the official story claims he arrived in the US for the first time. According to Bryant, in the meeting Atta does all of the following:
bullet He initially refuses to speak with one who is “but a female.”
bullet He asks her for a loan of $650,000 to buy and modify a crop-dusting plane.
bullet He mentions that he wants to “build a chemical tank that would fit inside the aircraft and take up every available square inch of the aircraft except for where the pilot would be sitting.”
bullet He uses his real name even as she takes notes, and makes sure she spells it correctly.
bullet He says he has just arrived from Afghanistan.
bullet He tells about his travel plans to Spain and Germany.
bullet He expresses an interest in visiting New York.
bullet He asks her about security at the WTC and other US landmarks.
bullet He discusses al-Qaeda and its need for American membership.
bullet He tells her bin Laden “would someday be known as the world’s greatest leader.”
bullet He asks to buy the aerial photograph of Washington hanging on her Florida office wall, throwing increasingly large “wads of cash” at her when she refuses to sell it. [ABC News, 6/6/2002]
bullet After Bryant points out one of the buildings in the Washington photograph as her former place of employment, he asks her, “How would you like it if somebody flew an airplane into your friends’ building?”
bullet He asks her, “What would prevent [me] from going behind [your] desk and cutting [your] throat and making off with the millions of dollars” in the safe behind her.
bullet He asks, “How would America like it if another country destroyed [Washington] and some of the monuments in it like the cities in [my] country had been destroyed?”
bullet He gets “very agitated” when he isn’t given the money in cash on the spot.
bullet Atta later tries to get the loan again from the same woman, this time “slightly disguised” by wearing glasses. Three other terrorists also attempt to get the same loan from Bryant, but all of them fail. Bryant turns them down because they do not meet the loan requirements, and fails to notify anyone about these strange encounters until after 9/11. Government officials not only confirm the account and say that Bryant passed a lie detector test, but also elaborate that the account is consistent with other information they have received from interrogating prisoners. Supposedly, failing to get the loan, the terrorists switched plans from using crop dusters to hijacking aircraft. Other department employees also remember the encounter, again said to take place in April 2000. The 9/11 Commission has failed to mention any aspect of Johnelle Bryant’s account. [Washington Post, 9/25/2001; ABC News, 6/6/2002; London Times, 6/8/2002] Compare Atta’s meeting with FBI Director Mueller’s later testimony about the hijackers: “There were no slip-ups. Discipline never broke down. They gave no hint to those around them what they were about.” [CNN, 9/28/2002]

Entity Tags: Robert S. Mueller III, Mohamed Atta, Federal Bureau of Investigation, Al-Qaeda, US Department of Agriculture, 9/11 Commission, Johnelle Bryant

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Erik Kleinsmith.Erik Kleinsmith. [Source: C-SPAN]Maj. Eric Kleinsmith, chief of intelligence for the Land Information Warfare Activity (LIWA) unit, is ordered to destroy data and documents related to a military intelligence program set up to gather information about al-Qaeda. The program, called Able Danger, has identified Mohamed Atta and three other future hijackers as potential threats (see January-February 2000). According to Kleinsmith, by April 2000 it has collected “an immense amount of data for analysis that allowed us to map al-Qaeda as a worldwide threat with a surprisingly significant presence within the United States.”(see January-February 2000) [Fox News, 9/21/2005; New York Times, 9/22/2005] The data is being collected on behalf of Maj. Gen. Geoffrey Lambert, the J3 at US Special Operations Command, who is said to be extremely upset when he learns that the data had been destroyed without his knowledge or consent. [US Congress. Senate. Committee on Judiciary, 9/21/2005] Around this time, a separate LIWA effort showing links between prominent US citizens and the Chinese military has been causing controversy, and apparently this data faces destruction as well (see April 2000). The data and documents have to be destroyed in accordance with Army regulations prohibiting the retention of data about US persons for longer than 90 days, unless it falls under one of several restrictive categories. However, during a Senate Judiciary Committee public hearing in September 2005, a Defense Department representative admits that Mohamed Atta was not considered a US person. The representative also acknowledges that regulations would have probably allowed the Able Danger information to be shared with law enforcement agencies before its destruction. Asked why this was not done, he responds, “I can’t tell you.” [CNET News, 9/21/2005] The order to destroy the data and documents is given to Kleinsmith by Army Intelligence and Security Command General Counsel Tony Gentry, who jokingly tells him, “Remember to delete the data—or you’ll go to jail.” [Government Executive, 9/21/2005] The quantity of information destroyed is later described as “2.5 terabytes,” about as much as one-fourth of all the printed materials in the Library of Congress. [Associated Press, 9/16/2005] Other records associated with the unit are allegedly destroyed in March 2001 and spring 2004 (see Spring 2004). [Associated Press, 9/21/2005; US Congress, 9/21/2005; Fox News, 9/24/2005]

Entity Tags: Able Danger, Eric Kleinsmith, Al-Qaeda, Land Information Warfare Activity, Mohamed Atta, Tony Gentry, Geoffrey Lambert

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Kie Fallis, a Defense Intelligence Agency (DIA) terrorism intelligence analyst, has been gathering evidence of an upcoming al-Qaeda attack or attacks. In 2002, he will describe to the 9/11 Congressional Inquiry a research process similar to what Able Danger is using at the same time: “I began to notice there was a voluminous amount of information, as others have testified, regarding al-Qaeda. Most of it appeared to be unrelated to other pieces of information. It appeared to be almost chat. By using a piece of [commercial software called ‘Analyst’s Notebook’] I was able to put these small snippets of information into, and graphically represent them as well, I was able to, over a course of many months, to determine certain linkages between these items—linkages that would never be apparent without the use of this tool. It would be lost in the weeds. And there were a lot of weeds to look through.” [Washington Times, 8/26/2002; US Congress, 10/8/2002] In his research, he claims to find links between al-Qaeda and Iranian intelligence. By May 2000, he writes a classified report on his conclusion that “terrorists were planning two or three major attacks against the United States. The only gaps were where and when.” Apparently, he envisions at least one of these attacks will use a small boat to blow up a US warship. However, the DIA has already issued a report concluding that such a method of attack would be impossible to carry out successfully, and the agency sticks by this assessment. A video message put out by bin Laden in mid-September convinces Fallis that an al-Qaeda attack will happen in the next month or two.(see Mid-September 2000). Shortly after learning about this message, Fallis reaches “the ‘eureka point‘… in determining an impending terrorist attack.” This comes “from a still-classified intelligence report in September 2000, which he will not discuss.” [Washington Times, 8/26/2002] This may be a reference to a lead by the Able Danger team on increased al-Qaeda activity in Yemen at this time (see Late September 2000), and/or it may refer to other intelligence leads. Fallis goes to his supervisor and asks that at least a general warning of an attack in the Middle East be issued. He hopes such a warning will at least put US military forces in the region on a higher alert. His superior turns him down, and other superiors fail to even learn of his suggested warning. The USS Cole will be successfully attacked in the port of Aden, Yemen, by a small boat of terrorists on October 12, 2000 (see October 12, 2000) . [Washington Times, 8/26/2002] One day after the Cole attack, Fallis will resign in protest. According to Senator John Warner (R-VA),“What [Fallis] felt is that his assessment was not given that proper level of consideration by his superiors and, as such, was not incorporated in the final intelligence reports provided to military commanders in the [Middle East region].” [CNN, 10/25/2000]

Entity Tags: Al-Qaeda, Able Danger, Iran, Osama bin Laden, Kie Fallis, John W. Warner

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The Justice Department’s Office of Intelligence Policy and Review (OIPR), which helps obtain warrants under the Foreign Intelligence Surveillance Act (FISA), discovers errors in several al-Qaeda related FISA applications under a counterterrorist program called “Catcher’s Mitt.” The OIPR verbally notifies the FISA Court of the errors, which are mostly in affidavits submitted by supervisory special agents at field offices. Then, in September and October 2000, the OIPR submits two pleadings to the court regarding approximately 75-100 applications with errors starting in July 1997. Many of the errors concern misleading statements about the nature of collaboration between criminal and intelligence agents. Most of these applications stated that the FBI New York field office, where the I-49 squad focusing on al-Qaeda was based (see January 1996 and Late 1998-Early 2002), had separate teams of agents handling criminal and intelligence investigations. But in actual fact the I-49 agents intermingled with criminal agents working on intelligence cases and intelligence agents working on criminal cases. Therefore, contrary to what the FISA Court has been told, agents working on a criminal investigation have had unrestricted access to information from a parallel intelligence investigation—a violation of the so-called “wall,” the set of bureaucratic procedures designed to separate criminal and intelligence investigations (see July 19, 1995). [Newsweek, 5/27/2002; Newsweek, 3/29/2004; US Department of Justice, 11/2004, pp. 36-37 pdf file] The information about al-Qaeda in these cases is also shared with assistant US attorneys without FISA permission being sought or granted first. Other errors include the FBI director wrongly asserting that the target of a FISA application was not under criminal investigation, omissions of material facts about a prior relationship between the FBI and a target, and an interview of a target by an assistant US attorney. [Foreign Intelligence Surveillance Court, 5/17/2002] This leads the FISA Court to impose new requirements regarding the “wall” (see October 2000). Similar problems will be found in FISA applications for surveillance of Hamas operatives (see March 2001).

Entity Tags: Office of Intelligence Policy and Review, US Department of Justice, Foreign Intelligence Surveillance Court, I-49, Foreign Intelligence Surveillance Act, FBI New York Field Office, Federal Bureau of Investigation, Catcher’s Mitt

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijacker Mohamed Atta arrives in the early morning in Prague, Czech Republic, by bus from Cologne, Germany. He plays on slot machines at the Happy Day Casino, then disappears. It will never be discovered where he sleeps in Prague. He takes the midday flight to New York the next day (see June 3, 2000). [Czech Radio, 9/3/2004] After 9/11, this trip will fuel the controversy over whether Atta meets an Iraqi agent in Prague in 2001 (see April 8, 2001 and September 18, 2001-April 2007). It is not entirely clear why Atta chooses to fly to the US from the Czech Republic, although 9/11 mastermind Khalid Shaikh Mohammed will be reported to have lived in Prague in the late 1990s (see Mid-1996-September 11, 2001).

Entity Tags: Mohamed Atta

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion, 9/11 Timeline

A portion of Mohamed Atta’s US visa obtained in May 2000.
A portion of Mohamed Atta’s US visa obtained in May 2000. [Source: 9/11 Commission]9/11 hijacker Mohamed Atta supposedly arrives in the US for the first time, flying from Prague to Newark on a tourist visa issued May 18 in Berlin. [Miami Herald, 9/22/2001; Australian Broadcasting Corporation, 11/12/2001] Official investigations will late assume that this is the first time Atta was in the US. However, there are reports that he was in the US before this (see September 1999, April 2000, and Late April-Mid-May 2000).

Entity Tags: Mohamed Atta

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

After arriving in the US on May 29 and June 3, 2000, 9/11 hijackers Marwan Alshehhi and Mohamed Atta meet up and reportedly spend all of June in the New York area. The 9/11 Commission later reports them spending the month staying in a series of short-term rentals in New York City while searching for a flight school to attend, e-mailing a New Hampshire school on June 5 and inquiring with a New Jersey school on June 22. A day after arriving in the US, Atta receives a mobile phone he bought listing his address as an Oklahoma flight school he subsequently visits (see July 2-3, 2000). According to the FBI, Alshehhi enrolls at an English language school, and the pair remains in the area until July 2. [US Congress, 9/26/2002; 9/11 Commission, 7/24/2004, pp. 519] However, some accounts suggest they leave before this. According to the owner of the Venice, Florida flight school subsequently attended by Atta and Alshehhi, the pair first visits his school on July 1. [US Congress, 3/19/2002] And according to the later statement of a local sheriff, some of the hijackers, including Atta, may live and take flight training in Punta Gorda, Florida, prior to moving to Venice (see Before July 2000). After 9/11, a federal investigator will reveal that Atta and Alshehhi rented rooms in the Bronx and Brooklyn in spring 2000. Whether this included the period prior to when Atta officially first entered the US, in June, is unstated (see Spring 2000). [Associated Press, 12/8/2001]

Entity Tags: Marwan Alshehhi, Mohamed Atta

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

FISA court judge Royce Lamberth was angry with the FBI over misleading statements made in FISA wiretap applications.FISA court judge Royce Lamberth was angry with the FBI over misleading statements made in FISA wiretap applications. [Source: Public domain]While monitoring foreign terrorists in the US, the FBI listens to calls made by suspects as a part of an operation called Catcher’s Mitt, which is curtailed at this time due to misleading statements by FBI agents. It is never revealed who the targets of the FBI’s surveillance are under this operation, but below are some of the terrorism suspects under investigation in the US at the time:
bullet Imran Mandhai, Shuyeb Mossa Jokhan and Adnan El Shukrijumah in Florida. They are plotting a series of attacks there, but Mandhai and Jokhan are brought in for questioning by the FBI and surveillance of them stops in late spring (see November 2000-Spring 2002 and May 2, 2001);
bullet Another Florida cell connected to Blind Sheikh Omar Abdul-Rahman. The FBI has been investigating it since 1993 (see (October 1993-November 2001));
bullet Al-Qaeda operatives in Denver (see March 2000);
bullet A Boston-based al-Qaeda cell involving Nabil al-Marabh and Raed Hijazi. Cell members provide funding to terrorists, fight abroad, and are involved in document forging (see January 2001, Spring 2001, and Early September 2001);
bullet Fourteen of the hijackers’ associates the FBI investigates before 9/11. The FBI is still investigating four of these people while the hijackers associate with them; [US Congress, 7/24/2003, pp. 169 pdf file]
bullet Hamas operatives such as Mohammed Salah in Chicago. Salah invests money in the US and sends it to the occupied territories to fund attacks (see June 9, 1998).
When problems are found with the applications for the wiretap warrants, an investigation is launched (see Summer-October 2000), and new requirements for warrant applications are put in place (see October 2000). From this time well into 2001, the FBI is forced to shut down wiretaps of al-Qaeda-related suspects connected to the 1998 US embassy bombings and Hamas (see March 2001 and April 2001). One source familiar with the case says that about 10 to 20 al-Qaeda related wiretaps have to be shut down and it becomes more difficult to get permission for new FISA wiretaps. Newsweek notes, “The effect [is] to stymie terror surveillance at exactly the moment it was needed most: requests from both Phoenix [with the Ken Williams memo (see July 10, 2001)] and Minneapolis [with Zacarias Moussaoui’s arrest] for wiretaps [will be] turned down [by FBI superiors],” (see August 21, 2001 and August 28, 2001). [Newsweek, 5/27/2002] Robert Wright is an FBI agent who led the Vulgar Betrayal investigation looking into allegations that Saudi businessman Yassin al-Qadi helped finance the embassy bombings, and other matters. In late 2002, he will claim to discover evidence that some of the FBI intelligence agents who stalled and obstructed his investigation were the same FBI agents who misrepresented the FISA petitions. [Judicial Watch, 9/11/2002]

Entity Tags: Royce Lamberth, Shuyeb Mossa Jokhan, Catcher’s Mitt, Robert G. Wright, Jr., Zacarias Moussaoui, Raed Hijazi, Mohammad Salah, Federal Bureau of Investigation, Al-Qaeda, Adnan Shukrijumah, Central Intelligence Agency, Nabil al-Marabh, Ken Williams, Imran Mandhai, Foreign Intelligence Surveillance Act

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Jeddah consular officer Shayna Steinger (center) and eight of the 10 hijackers she issued visas to. Clockwise from top left: Wail Alshehri, Hani Hanjour, Ahmed Alnami, Salem Alhazmi, Ahmed Alhaznawi, Saeed Alghamdi, Ahmed Alghamdi, and Khalid Almihdhar.Jeddah consular officer Shayna Steinger (center) and eight of the 10 hijackers she issued visas to. Clockwise from top left: Wail Alshehri, Hani Hanjour, Ahmed Alnami, Salem Alhazmi, Ahmed Alhaznawi, Saeed Alghamdi, Ahmed Alghamdi, and Khalid Almihdhar. [Source: FBI / Facebook]Shayna Steinger, a consular official who issues the future 9/11 hijackers with 12 US visas, arrives at the US consulate in Jeddah to start her first Foreign Service assignment. [Office of the Inspector General (US Department of State), 1/30/2003] Steinger will issue visas to future 9/11 hijackers Ahmed Alghamdi (see September 3, 2000), Saeed Alghamdi (see September 4, 2000), Hani Hanjour (see September 10, 2000 and September 25, 2000), Wail and Waleed Alshehri (see October 24, 2000), Ahmed Alnami (see October 28, 2000), Ahmed Alhaznawi (see November 12, 2000), Alnami again (see April 23, 2001), Saeed Alghamdi again (see June 12, 2001), Abdulaziz Alomari (see June 18, 2001), Khalid Almihdhar (see June 13, 2001), and Salem Alhazmi (see June 20, 2001). [9/11 Commission, 12/30/2002, pp. 2] The 9/11 Commission will not refer to Steinger in its main report, but will say that a single official issued multiple visas to the hijackers in Jeddah in its Terrorist Travel monograph. The Commission gives the number of visas issued as 11. [9/11 Commission, 7/24/2004; 9/11 Commission, 8/21/2004, pp. 33 pdf file] However, a list found in the Commission’s records will give 12 visas as being issued by Steinger. [9/11 Commission, 12/30/2002, pp. 2] That list appears to be accurate as there is no information indicating one of these 12 visas was issued by another consular officer. The Commission makes another apparent error with the hijackers’ visas, claiming that Salem Alhazmi did not receive a US visa in April 1999, when other sources indicate he did (see April 3-7, 1999).

Entity Tags: Shayna Steinger, US Consulate, Jeddah, Saudi Arabia Office

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

On three occasions, military lawyers force members of Able Danger to cancel scheduled meetings with the FBI at the last minute. Able Danger officials want to share information about the Brooklyn al-Qaeda cell they believe they’ve discovered which includes Mohamed Atta and other hijackers (see January-February 2000). The exact timing of these meetings remains unclear, but they appear to happen around the time military lawyers tell Able Danger they are not allowed to pursue Mohamed Atta and other figures (see September 2000) . [Government Security News, 9/2005] In 2005, it will be reported that Lieutenant Colonel Anthony Shaffer contacted FBI agent Xanthig Magnum in attempts to set up these meetings. Magnum is willing to testify about her communications with Shaffer, but apparently she has not yet been able to do so. [Fox News, 8/28/2005] Shaffer will later elaborate that the meetings were set up around early summer. Col. Worthington, then head of Able Danger, is one of the Special Operations Command (SOCOM) officials scheduled to meet with FBI Counterterrorism agents. Shaffer ater claims the meetings were cancelled because “SOCOM lawyers would not permit the sharing of the US person information regarding terrorists located domestically due to ‘fear of potential blowback’ should the FBI do something with the information and something should go wrong. The lawyers were worried about another ‘Waco’ situation (see April 19, 1993). The critical counterterrorism information is never passed from SOCOM to the FBI before 9-11; this information did include the original data regarding Atta and the terrorist cells in New York and the DC area.” [US Congress, 2/15/2006 pdf file] Representative Curt Weldon (R-PA), who in 2005 helps bring to light the existence of the program, says, “Obviously, if we had taken out that cell, 9/11 would not have occurred and, certainly, taking out those three principal players in that cell would have severely crippled, if not totally stopped, the operation that killed 3,000 people in America.” [Government Security News, 8/2005]

Entity Tags: Xanthig Magnum, Mohamed Atta, Special Operations Command, Curt Weldon, Federal Bureau of Investigation, Able Danger, Anthony Shaffer

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Lieutenant Colonel Anthony Shaffer will later claim that Captain Scott Phillpott, leader of the Able Danger program, briefs General Peter Schoomaker, head of Special Operations Command (SOCOM), that Able Danger has uncovered information of increased al-Qaeda “activity” in Aden harbor, Yemen. Shaffer, plus two other officials familiar with Able Danger later tell the New York Post that this warning was gleaned through a search of bin Laden’s business ties. Shaffer later recalls, “Yemen was elevated by Able Danger to be one of the top three hot spots for al-Qaeda in the entire world.” This warning, plus another possibly connected warning from Defense Intelligence Agency (DIA) analyst Kie Fallis (see May 2000-Late September 2000), go unheeded and no official warning is issued. The USS Cole is attacked by al-Qaeda terrorists in Aden harbor in October 2000 (see October 12, 2000). Shaffer later claims that Phillpott tells the 9/11 Commission about this warning in 2004 to show that Able Danger could have had a significant impact, but the Commission’s findings fail to mention the warning, or in fact anything else about Able Danger (see July 12, 2004). [New York Post, 9/17/2005; Jerry Doyle Show, 9/20/2005] Representative Curt Weldon (R-PA) will similarly tell Fox News: “[T]wo weeks before the attack on the Cole, in fact, two days before the attack on the Cole, [Able Danger] saw an increase of activity that led them to say to the senior leadership in the Pentagon at that time, in the Clinton administration, there’s something going to happen in Yemen and we better be on high alert, but it was discounted. That story has yet to be told to the American people.” [Fox News, 10/8/2005]

Entity Tags: Scott Phillpott, Peter J. Schoomaker, Curt Weldon, Al-Qaeda, Able Danger, Clinton administration, Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The Foreign Intelligence Surveillance (FISA) Court implements new rules requiring any FBI employee who sees FISA-obtained materials or other FISA-derived intelligence to sign a certification acknowledging that the court’s approval is needed before the information is disseminated to criminal investigators. This comes after the FISA Court was informed that approximately 100 FISA applications submitted by the FBI had misrepresented how criminal and intelligence agents were working together in the Catcher’s Mitt program (see Summer 2000-September 11, 2001 and Summer-October 2000). The new rules also require that the CIA and NSA place a caveat on all FISA-derived intelligence sent to the bureau. In an effort to speed up inter-agency reporting, the NSA will reportedly go a step further, placing caveats on all information it sends to the FBI. The caveats warn that the information being sent might be FISA-derived and that an intelligence agent wishing to pass it to a criminal agent must first obtain assurance from the NSA that the intelligence is not FISA-derived. [US Department of Justice, 11/2004, pp. 37-38 pdf file]

Entity Tags: Foreign Intelligence Surveillance Court, National Security Agency, Federal Bureau of Investigation, Catcher’s Mitt, Foreign Intelligence Surveillance Act

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Global Objectives, a British banking compliance company, identifies fifteen of the 9/11 hijackers as high-risk people and establishes profiles for them. The hijackers are regarded as high-risk for loans because they are linked to Osama bin Laden, suspected terrorists, or associates of terrorists. The list of high-risk people maintained by Global Objectives is available to dozens of banks and the hijackers’ files contain their dates and places of birth, aliases, and associates. It is unclear which fifteen hijackers are considered high-risk. It is also unknown if any Western intelligence agencies access this database before 9/11. [Associated Press, 2/21/2002] According to the 9/11 Commission, US intelligence is only aware of three of the 9/11 hijackers, Nawaf Alhazmi, Salem Alhazmi, and Khalid Almihdhar, before the attacks. [9/11 Commission, 7/24/2004, pp. 181-2] However, media reports will suggest US intelligence agencies may have been aware of another six: Ziad Jarrah (see January 30, 2000); Marwan Alshehhi (see March 1999 and January-February 2000); Mohamed Atta (see January-May 2000 and January-February 2000); and Ahmed Alghamdi, Satam al Suqami, and Hamza Alghamdi (see September 2000 and Spring 2001).

Entity Tags: Saeed Alghamdi, Salem Alhazmi, Satam Al Suqami, Waleed Alshehri, Nawaf Alhazmi, Ziad Jarrah, Wail Alshehri, Mohand Alshehri, Ahmed Alnami, Marwan Alshehhi, Ahmed Alghamdi, Abdulaziz Alomari, Fayez Ahmed Banihammad, Hamza Alghamdi, Hani Hanjour, Mohamed Atta, Majed Moqed, Khalid Almihdhar, Ahmed Alhaznawi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

October 12, 2000: USS Cole Bombed by Al-Qaeda

Damage to the USS Cole.Damage to the USS Cole. [Source: Department of Defense]The USS Cole is bombed in the Aden, Yemen harbor by two al-Qaeda militants, Hassan al-Khamri and Ibrahim al-Thawar (a.k.a. Nibras). Seventeen US soldiers are killed and 30 are wounded. The CIA will later conclude that with just slightly more skilled execution, the attack would have killed 300 and sunk the ship. [ABC News, 10/13/2000; Coll, 2004, pp. 532; 9/11 Commission, 7/24/2004, pp. 191] The Islamic Army of Aden (IAA) immediately takes credit for the attack. This is a Yemen-based Muslim militant group widely believed to have close ties to al-Qaeda (see 1996-1997 and After). [Guardian, 10/14/2000] The IAA statement is released by its spokesman, Abu Hamza al-Masri (see Early 1997, (June 1998), and December 28, 1998 and After). Abu Hamza says that the attack was timed to mark the anniversary of the execution of the IAA’s former commander (see October 17, 1999). [O'Neill and McGrory, 2006, pp. 184] The prime minister of Yemen at the time of the bombing will say shortly after 9/11, “The Islamic Army was part of al-Qaeda.” [Guardian, 10/13/2001] The US soon learns the names of some al-Qaeda operatives involved in the attack, including Khalid Shaikh Mohammed, Tawfiq bin Attash and Fahad al-Quso (see Early December 2000), and Abd al-Rahim al-Nashiri (see November-December 2000). 9/11 hijackers Ramzi bin al-Shibh (see October 10-21, 2000) and Khalid Almihdhar (see Around October 12, 2000) may also have been involved. This is a repeat of a previously attempted attack, against the USS The Sullivans, which failed and was apparently undetected (see January 3, 2000). [Los Angeles Times, 12/22/2002] The 9/11 Commission will later say the Cole bombing “was a full-fledged al-Qaeda operation, supervised directly by bin Laden. He chose the target and location of the attack, selected the suicide operatives, and provided the money needed to purchase explosives and equipment.” [9/11 Commission, 7/24/2004, pp. 190]

Entity Tags: Khalid Shaikh Mohammed, Khallad bin Attash, Ramzi bin al-Shibh, Islamic Army of Aden, USS Cole, Osama bin Laden, Ibrahim al-Thawar, Khalid Almihdhar, Fahad al-Quso, Abd al-Rahim al-Nashiri, Hassan al-Khamri, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Imran Mandhai.Imran Mandhai. [Source: crimelibrary (.com)]The FBI in Florida investigates a group of Muslims it suspects of being terrorists, including an apparent associate of Mohamed Atta named Adnan Shukrijumah (see April-May 2001 and May 2, 2001). The investigation starts with the November 2000 Florida arrest of Turkish immigrant Hakki Aksoy, who is found to be in possession of instructions for making a car bomb. An FBI informer named Howard Gilbert enters the Darul Aloom mosque in Pembroke Pines (a town just north of Miami) to check out one of Aksoy’s associates, Imran Mandhai. Gilbert starts plotting with Mandhai and a friend of Mandai’s named Shuyeb Mossa Jokhan. [New Times Broward-Palm Beach, 8/1/2002; Miami New Times, 8/8/2002; USA Today, 6/15/2003] Gilbert is replaced by another FBI informant known as “Mohamed the bomb maker,” who agrees to wear a wire and testify in court. Mohamed and Mandhai drive around South Florida selecting local bomb targets including a National Guard armory, electrical substations, Jewish-owned businesses, the Israeli consulate in Miami, plus Mount Rushmore in the Midwest. Mandhai and Jokhan are unable to buy weapons themselves, but Gilbert, the first informant, had given Mandhai a copy of a bomb-making manual, and Mohamed, the second informant, shows Mandhai the range of guns and explosives he can provide. [Broward Herald, 5/29/2002; FrontPage Magazine, 10/27/2003; US Court of Appeals for the Eleventh Circuit: appeal, 7/2/2004 pdf file] The FBI interviews Mandhai and Jokhan in late spring 2001 and they acknowledge they are training for jihad. However, the FBI’s surveillance of them stops shortly after this. The FBI takes no action against them for a year, and then indicts them in May 2002. At the trial they are both found guilty; Mandhai receives twelve years and Jokhan five. It is unclear why the FBI acts in this way, although it is possibly related to a forced curtailment of electronic surveillance that is taking place at this time. In the summer of 2000, the bureau was ordered to shutdown certain wiretaps after an FBI official was found to have been misrepresenting petitions for taps on terror suspects (see Summer 2000-September 11, 2001). Coincidentally, after Gilbert and Mandhai develop a series of courses for potential recruits entitled “Skills Necessary for Jihad” in the spring of 2001, Mandhai prints them at the same Kinko’s copy shop in Hollywood that is used by Mohamed Atta and Hamza Alghamdi to buy their tickets for 9/11 (see August 25-September 5, 2001). [Broward Herald, 5/29/2002; Salon, 12/3/2002; USA Today, 6/15/2003]

Entity Tags: Imran Mandhai, Hakki Aksoy, Federal Bureau of Investigation, Adnan Shukrijumah, Shuyeb Mossa Jokhan, Howard Gilbert

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Page 1 of 5 (422 events)
previous | 1, 2, 3, 4, 5 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike