!! History Commons Alert, Exciting News

Context of 'April 19, 2007: NSA Announces Plans to Build Huge Facility near Microsoft Data Center in Texas'

This is a scalable context timeline. It contains events related to the event April 19, 2007: NSA Announces Plans to Build Huge Facility near Microsoft Data Center in Texas. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 2 of 7 (638 events)
previous | 1, 2, 3, 4, 5, 6, 7 | next

According to counterterrorism expert Rohan Gunaratna, US intelligence monitoring al-Qaeda communications learn that al-Qaeda is canceling an attack on Western targets in Singapore. On April 18, 1996, 108 Lebanese civilians seeking refuge at a UN camp in Qana, Lebanon, are killed by mortars fired by Israeli forces. Bin Laden “was keen not to dissipate what he envisaged as widespread revulsion against Israel’s action and hence called off the strike in Southeast Asia. Al-Qaeda’s team in question was very determined to go ahead, having spent years preparing the attack, and according to the intercepts it proved difficult for Osama to convince it otherwise.” Gunaratna claims the US learned this through the NSA’s Echelon satellite network (see Before September 11, 2001) “and other technical monitoring of their communications traffic.” [Gunaratna, 2003, pp. 133-134] If true, this case supports other evidence that the US was successfully monitoring bin Laden’s communications from an early date (see Early 1990s) and that al-Qaeda’s Southeast Asia operations were penetrated years before an important al-Qaeda summit in Malaysia discussing the 9/11 plot (see January 5-8, 2000).

Entity Tags: Echelon, Al-Qaeda, Osama bin Laden, National Security Agency

Timeline Tags: Complete 911 Timeline

After fleeing Qatar, Khalid Shaikh Mohammed (KSM) travels the world and plans many al-Qaeda operations. He previously was involved in the 1993 World Trade Center bombing, and the Operation Bojinka plot. [Time, 1/20/2003] He is apparently involved in the 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998), the 2000 USS Cole bombing (see October 12, 2000), and other attacks. One US official later says, “There is a clear operational link between him and the execution of most, if not all, of the al-Qaeda plots over the past five years.” [Los Angeles Times, 12/22/2002] He lives in Prague, Czech Republic, through much of 1997. [Los Angeles Times, 9/1/2002] By 1999, he is living in Germany and visiting with the hijackers there. [New York Times, 6/8/2002; New York Times, 9/22/2002] Using 60 aliases and as many passports, he travels through Europe, Africa, the Persian Gulf, Southeast Asia and South America, personally setting up al-Qaeda cells. [Los Angeles Times, 12/22/2002; Time, 1/20/2003]

Entity Tags: USS Cole, Al-Qaeda, Khalid Shaikh Mohammed

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Omar Nasiri, who informs on al-Qaeda for the British intelligence service MI6 and the French service Direction Générale de la Sécurité Extérieure (DSGE), makes contact with al-Qaeda logistics manager Abu Zubaida using a telephone bugged by MI6. Nasiri met Abu Zubaida in Pakistan (see Mid 1995-Spring 1996). Usually, when Nasiri calls the number, he talks to one of Abu Zubaida’s associates, but sometimes he talks to Abu Zubaida himself. The phone is used to relay messages between Abu Zubaida in Pakistan and al-Qaeda representatives in London, in particular leading imam Abu Qatada. The French will apparently make great use of this information (see October 1998 and After). [Nasiri, 2006, pp. 270-1, 273, 281]

Entity Tags: Direction Générale de la Sécurité Extérieure, Abu Zubaida, UK Secret Intelligence Service (MI6), Abu Qatada, Omar Nasiri

Timeline Tags: Complete 911 Timeline

Based on a review of the Lexis-Nexus database, the term al-Qaeda is first mentioned in the mainstream media on this day. A United Press International article draws from a State Department fact sheet released today (see August 14, 1996) and states, “Earlier, during the Soviet invasion of Afghanistan, Usama Bin Ladin drew on his family’s wealth ‘plus donations received from sympathetic merchant families in the Gulf region’ to organize the Islamic Salvation Foundation, or al-Qaida. The group established recruitment centers in Egypt, Saudi Arabia, and Pakistan that enlisted and sheltered thousands of Arab recruits to fight the Soviets. ‘This network remains active,’ the State Department said.” (The spelling is the same as in the original.) [US Department of State, 8/14/1996; United Press International, 8/14/1996] The term was first used in an overseas article by the French wire service Agence France-Presse, in May 1993 (see May 30, 1993). The CIA has been aware of the term since at least the start of 1996 (see Shortly Before February 1996) and possibly by 1991, if not earlier (see February 1991- July 1992). However, the term will remain little used and little understood by the media for the next several years. For instance, the New York Times will first mention it two years later in quoting the courtroom testimony of one of the plotters of the 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). It is referred to as “al-Qaeda, an international terrorist group, led by Mr. bin Laden.” [New York Times, 8/28/1998]

Entity Tags: US Department of State, Al-Qaeda, Osama bin Laden

Timeline Tags: Complete 911 Timeline

An Inmarsat Compact M satellite phone, the type used by bin Laden.An Inmarsat Compact M satellite phone, the type used by bin Laden. [Source: Inmarsat]During this period, Osama bin Laden uses a satellite phone to direct al-Qaeda’s operations. The phone—a Compact M satellite phone, about the size of a laptop computer—was purchased by a student in Virginia named Ziyad Khaleel for $7,500 using the credit card of a British man named Saad al-Fagih. After purchasing the phone, Khaleel sent it to Khalid al-Fawwaz, al-Qaeda’s unofficial press secretary in London (see Early 1994-September 23, 1998). Al-Fawwaz then shipped it to bin Laden in Afghanistan. [CNN, 4/16/2001] It appears US intelligence actually tracks the purchase as it occurs (see November 1996-Late December 1999), probably because an older model satellite phone bin Laden has is already being monitored (see Early 1990s). Bin Laden’s phone (873682505331) is believed to be used by other top al-Qaeda leaders as well, including Ayman al-Zawahiri and Mohammad Atef. Al-Fawwaz also buys satellite phones for other top al-Qaeda leaders around the same time. Though the calls made on these phones are encrypted, the NSA is able to intercept and decrypt them. As one US official will put it in early 2001, “codes were broken.” [United Press International, 2/13/2001; Newsweek, 2/18/2002] The Los Angeles Times will report that the monitoring of these phones “produced tens of thousands of pages of transcripts over two years.” [Los Angeles Times, 10/14/2001] Bin Laden’s satellite phone replaces an older model he used in Sudan that apparently was also monitored by the NSA (see Early 1990s). Billing records for his new phone are eventually released to the media in early 2002. Newsweek will note, “A country-by-country analysis of the bills provided US authorities with a virtual road map to important al-Qaeda cells around the world.” [Sunday Times (London), 3/24/2002] The countries called are:
bullet Britain (238 or 260). Twenty-seven different phone numbers are called in Britain. Accounts differ on the exact number of calls. Khalid al-Fawwaz, who helps publish statements by bin Laden, receives 143 of the calls, including the very first one bin Laden makes with this phone. Apparently most of the remaining calls are made to pay phones near him or to his associates. He also frequently calls Ibrahim Eidarous, who works with al-Fawwaz and lives near him. [CNN, 4/16/2001; Newsweek, 2/18/2002; Sunday Times (London), 3/24/2002; O'Neill and McGrory, 2006, pp. 111]
bullet Yemen (221). Dozens of calls go to an al-Qaeda communications hub in Sana’a, Yemen, which is run by the father-in-law of 9/11 hijacker Khalid Almihdhar (see Late August 1998). [Newsweek, 2/18/2002; Los Angeles Times, 9/1/2002; Bamford, 2008, pp. 8]
bullet Sudan (131). Bin Laden lived in Sudan until 1996 (see May 18, 1996), and some important al-Qaeda operatives remained there after he left (see February 5, 1998). [Sunday Times (London), 3/24/2002]
bullet Iran (106). Newsweek will later report: “US officials had little explanation for the calls to Iran. A Bush administration official said that US intelligence has believed for years that hard-line anti-American factions inside Iran helped bin Laden’s organization operate an ‘underground railroad’ smuggling Islamic militants to al-Qaeda training camps in Afghanistan.” [Newsweek, 2/18/2002; Sunday Times (London), 3/24/2002]
bullet Azerbaijan (67). An important al-Qaeda operative appears to be based in Baku, Azerbaijan. [Washington Post, 5/2/2001] This is most likely Ahmad Salama Mabruk, who is very close to al-Qaeda number two Ayman al-Zawahiri and is said to be the head of the al-Qaeda cell there. He kidnapped by the CIA in Baku in late August 1998 (see Late August 1998).
bullet Kenya (at least 56). In the embassy bombings trial, prosecutors introduce evidence showing 16 calls are made on this phone to some of the embassy bombers in Kenya (see 10:35-10:39 a.m., August 7, 1998), apparently all before a raid in August 1997 (see August 21, 1997). The defense introduces evidence showing at least 40 more calls are made after that time (see Late 1996-August 1998). [CNN, 4/16/2001]
bullet Pakistan (59).
bullet Saudi Arabia (57).
bullet A ship in the Indian Ocean (13).
bullet The US (6).
bullet Italy (6).
bullet Malaysia (4).
bullet Senegal (2). [Sunday Times (London), 3/24/2002]
bullet Egypt (unknown). Newsweek reports that calls are made to Egypt but doesn’t say how many. [Newsweek, 2/18/2002]
bullet Iraq (0). Press reports note that the records indicate zero calls were made to Iraq. [Newsweek, 2/18/2002; Sunday Times (London), 3/24/2002] 1,100 total calls are made on this phone. Adding up the above numbers means that the destination of over 100 calls is still unaccounted for. [Newsweek, 2/18/2002] The use of this phone stops two months after the August 1998 embassy bombings in Africa. However, it appears bin Laden and other al-Qaeda leaders continue to use other satellite phones occasionally after this time. Shortly after 9/11, James Bamford, an expert authority on the agency, says “About a year or so ago the NSA lost all track of him.… He may still use [satellite phones] occasionally to talk about something mundane, but he discovered that the transmitters can be used for honing.” [CNN, 9/21/2001] According to a different account, bin Laden will attempt to use a different phone communication method, but US intelligence will soon discover it and continue monitoring his calls (see Late 1998 and After).

Entity Tags: Ziyad Khaleel, Saad al-Fagih, Osama bin Laden, Ibrahim Eidarous, Khalid al-Fawwaz, Mohammed Atef, Al-Qaeda, Ayman al-Zawahiri, Ahmad Salama Mabruk

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In 2001, four men will be convicted of participating in the 1998 embassy bombings (see 10:35-10:39 a.m., August 7, 1998). During their trial, it will come to light that the NSA was listening in on bin Laden’s satellite phone (see November 1996-Late August 1998). Additionally, during this time bin Laden calls some of the plotters of the bombing before the bombing takes place. The prosecution will show records revealing that bin Laden calls Kenya 16 times, apparently all before an August 1997 raid on the Nairobi, Kenya, house of Wadih El-Hage (see August 21, 1997), who is taking part in the embassy bombing plot and is bin Laden’s former personal secretary. The transcripts of two calls between El-Hage and al-Qaeda leader Mohammed Atef (using bin Laden’s phone) are even read to the jury in the trial. The defense however, shows that at least 40 additional calls are made from bin Laden’s phone to Kenya after El-Hage left Kenya in September 1997. Further, El-Hage makes some calls to Khalid al-Fawwaz, who essentially is serving as bin Laden’s press secretary in London and is being frequently called by bin Laden around the same time. The transcript of a February 1997 call between El-Hage and Mohamed Saddiq Odeh, one of the other embassy bombing plotters, is also read to the jury. The US had been wiretapping El-Hage’s phone and other phones connected to the al-Qaeda Kenya cell, since at least April 1996 (see April 1996). [CNN, 4/16/2001] In one call, El-Hage is overheard saying after returning from visiting bin Laden in Afghanistan that bin Laden has given the Kenya al-Qaeda cell a “new policy.” After the raid on El-Hage’s house, US investigators will discover that policy is “militarizing” the cell. But most details of what is said in these calls has not been made public. [Washington Post, 5/2/2001] In another call in July 1997, cell member Fazul Abdullah Mohammed (a.k.a. Haroun Fazul) specifies which mobile phone the cell needs to use when calling bin Laden. [New York Times, 1/13/2001] US intelligence also listens in during this time as bin Laden frequently calls the Kenya office of Mercy International, an office that is being monitored because of suspected al-Qaeda ties (see Late 1996-August 20, 1998). It has not been explained how the US failed to stop the August 1998 embassy bombings, given their surveillance of all these calls before the bombing took place.

Entity Tags: Fazul Abdullah Mohammed, Wadih El-Hage, Mohammed Atef, Osama bin Laden, Khalid al-Fawwaz, Mohammed Saddiq Odeh

Timeline Tags: Complete 911 Timeline

A lieutenant general meets with Qwest CEO Joe Nacchio and Dean Wandry, who heads Qwest’s government business unit. According to documents filed in 2006 by Nacchio concerning his trial on insider trading charges (see October 12, 2007), the general “told Mr. Wandry that he ran the largest telecom operation in the world, he had looked at Qwest’s network, and he wanted to use it for government purposes.” The general in question could be NSA Director Kenneth Minihan, who will be replaced in 1999 by another lieutenant general, Michael Hayden, but neither Minihan nor Hayden will comment on the allegation. Many former intelligence officials will say that it is likely Minihan who met with Nacchio and Wandry. Nacchio’s court documents indicate that he and Wandry agree to work with the general. Nacchio is not allowed to announce the contract publicly, but according to the court documents, he “understood at the time this was the beginning of a relationship which had enormous potential for future work. This proves increasingly true as time went on.” By 1999 Qwest is working extensively with the NSA. Minihan is particularly concerned about the potential of “cyberwarfare” by foreign governments, terrorist organizations, drug cartels, and organized crime, a prospect which he felt the NSA is unprepared. He particularly worries about Russia and China; in June 1998, he will testify are training personnel in potential cyber-attacks. “These opportunists, enabled by the explosion of technology and the availability of inexpensive, secure means of communication, pose a significant threat to the interests of the United States and its allies,” Minihan will state. In 2007, a former senior NSA official will say that the agency felt those groups knew US privacy laws all too well and were capable of using those laws against the NSA and other intelligence agencies. He will say, “There was such a nuanced understanding of how to tie us in knots and use American law against us, that there were certainly pockets of people saying, ‘We’ve got to be assertive; we’ve got to be more aggressive on this.’” Hayden, Minihan’s successor, will be particularly willing to push agency operations to the edge of legality. After 9/11, Hayden will say, “We’re pretty aggressive within the law. As a professional, I’m troubled if I’m not using the full authority allowed by law.” [National Journal, 11/2/2007] The NSA will approach Qwest will a similar offer in the months before 9/11 (see February 2001).

Entity Tags: Michael Hayden, Dean Wandry, Kenneth Minihan, National Security Agency, Joe Nacchio, Qwest

Timeline Tags: Civil Liberties

Al Haramain Islamic Foundation’s main office in Riyadh, Saudi Arabia.Al Haramain Islamic Foundation’s main office in Riyadh, Saudi Arabia. [Source: Bilal Qabalan / Agence France-Presse / Getty Images]Wadih El-Hage has been bin Laden’s personal secretary since the early 1990s. When US agents raid his house in Nairobi, Kenya, they seize his address book (see August 21, 1997), which contains the names and phone numbers for many other al-Qaeda operatives. [CNN, 5/25/2001] The names discovered in the book include:
bullet Ali Mohamed, the al-Qaeda double agent living in California. US investigators are already tapping his California phone and have been tapping calls between him and El-Hage since at least 1996 (see April 1996).
bullet Mamoun Darkazanli. He is a Syrian-born businessman living in Hamburg, Germany, who has contacts with Mohamed Atta’s al-Qaeda cell in the same city. Darkazanli’s name and phone number are listed, and El-Hage even has a business card listing El-Hage’s address in Texas and Darkazanli’s address in Hamburg (see Late 1998).
bullet Ghassan Dahduli. He works at two US non-profit organizations, the Islamic Association for Palestine and InfoCom. Both organizations will be shut down for supporting terrorist networks (see September 16, 1998-September 5, 2001).
bullet Salah al-Rajhi (see Shortly After August 21, 1997). He and his brother of Sulaiman Abdul Aziz al-Rajhi, are billionaires and jointly own the Al-Rajhi Banking & Investment Corp. Sulaiman started a network of organizations in Herndon, Virginia known as the SAAR network (named for the four initials in his name). This network will be raided by US officials in 2002 for suspected terrorist funding ties (see March 20, 2002). [Newsweek, 12/9/2002]
bullet Ihab Ali Nawawi, an al-Qaeda operative living in Florida. He is referred to as “Ihab Ali” and his location in Tampa, Florida, is mentioned. He will not be arrested until May 1999 (see May 18, 1999). [United States of America v. Usama Bin Laden, et al., Day 39, 5/3/2001]
bullet Essam Marzouk. He is linked to both al-Qaeda and Islamic Jihad and is living in Vancouver, Canada at the time. He will later train the 1998 embassy bombers. It is unclear if the link to Marzouk is shared with Canadian intelligence (see Shortly After August 21, 1997). [National Post, 3/19/2002]
bullet Essam al Ridi. He is a US citizen and a pilot who helped bin Laden buy an airplane in the US in the early 1990s (see Early 1993). He appears to have no militant ties after that. In late 1999, US prosecutors will contact al Ridi where he is living in Bahrain and convince him to testify against El-Hage and others involved in the 1998 embassy bombings (see 10:35-10:39 a.m., August 7, 1998). [CNN, 7/2/2002]
bullet Farid Adlouni. He is a civil engineer living in Lake Oswego, Oregon. In 1996 and 1997, El-Hage calls Adlouni in Oregon 72 times, sometimes just before or after meeting with bin Laden. Adlouni’s home phone and fax numbers are be found in two personal phone directories and one notebook kept by El-Hage (see Shortly After August 21, 1997). Earlier in 1997, El-Hage also sent him a fax written by al-Qaeda leader Mohammed Atef (see Febuary 25, 1997). Records show that El-Hage has extensive dealings with Adlouni, mostly by selling gems El-Hage bought in Africa for a better price in the US. The FBI interviews Adlouni twice in late 1997, but he is not arrested. As of 2002, it will be reported that he continues to live in Oregon and remains a “person of interest” and subject of investigation by the FBI. [Oregonian, 9/13/2002]
bullet Khalid al-Fawwaz. He is al-Qaeda’s de facto press secretary in London. El-Hage gives al-Fawwaz’s correct name, London phone number, and street address, but lists him as living in Texas. Presumably this is a slight attempt at subterfuge. [United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001]
bullet A business card in the name Mamdouh M. Salim is found. This is a reference to Mamdouh Mahmud Salim, a known al-Qaeda leader. [United States of America v. Usama Bin Laden, et al., Day 37, 5/1/2001]
bullet A business card belonging to Mansour al-Kadi is found. [New Yorker, 4/21/2008] Al-Kadi is the Deputy General of the Al Haramain Islamic Foundation, a suspect Saudi charity closely linked to the Saudi government. Al-Kadi will be fired in early 2004 and the entire foundation will be shut down several months later (see March 2002-September 2004). The Treasury Department will later say that Al Haramain has a role in the 1998 African embassy bombings (see Autumn 1997). [US Treasury Department, 9/9/2004]
bullet Several business cards relating to the International Islamic Relief Organization (IIRO). A 1996 CIA report connected the IIRO to terrorist funding, but the IIRO will not be prosecuted due to its close ties to the Saudi government (see January 1996 and October 12, 2001). [Newsweek, 12/9/2002]
bullet According to author Douglas Farah, the address book is “full of the names of diamond dealers and jewelers, often including the purchaser’s home phone number.” This suggests al-Qaeda could be profiting from the diamond trade in Africa. [Farah, 2004, pp. 64-65]
But Farah also will note in 2004 that many of the leads from El-Hage’s address book and other documents discovered around the same time are not fully explored. In fact, he says that “Most of El-Hage’s notebooks, written in Arabic, have still not been translated into English.” [Farah, 2004, pp. 64-65]

Entity Tags: Ihab Ali Nawawi, International Islamic Relief Organization, Mamdouh Mahmud Salim, Khalid al-Fawwaz, Mamoun Darkazanli, Ghassan Dahduli, Farid Adlouni, Ali Mohamed, Essam Marzouk, Essam al Ridi, Wadih El-Hage, Salah al-Rajhi, Mansour al-Kadi, Al Haramain Islamic Foundation

Timeline Tags: Complete 911 Timeline

Al Haramain Foundation’s Kenya office in 2004.Al Haramain Foundation’s Kenya office in 2004. [Source: Associated Press]An informant tells an intelligence agency allied to the US that the Nairobi, Kenya, branch of a Saudi charity named the Al Haramain Islamic Foundation is plotting to blow up the US embassy in Nairobi. The chief of the CIA station in Kenya passes on this informant’s warning to Ambassador Prudence Bushnell and others at the embassy. On October 31, 1997, the Kenyan government acts on the informants’ tip, arresting nine Arabs connected to the charity and seizing their files.
Charity Already Linked to Al-Qaeda Cell in Kenya - A 1996 secret CIA report shows the CIA has already linked Al Haramain to militants, smuggling, drug running, and prostitution (see January 1996). In August 1997, US intelligence raids the Kenya house of Wadih el-Hage because they correctly believe he is heading an al-Qaeda cell there (see August 21, 1997). The raid uncovers a business card belonging to Mansour al-Kadi, the Deputy General of Al Haramain’s worldwide operations (see Shortly After August 21, 1997).
CIA Fails to Take Warning Seriously - The CIA sends a special team to analyze the files and finds no evidence of a plot. This team wants to question the nine arrested Arabs, but the CIA station chief refuses to ask the Kenyan government for access to the suspects, saying he doesn’t want to bother them any more about the issue. The CIA drops the investigation and the nine Arabs are deported. Ambassador Bushnell is told that the threat has been eliminated. But some members of the CIA team are furious and feel that their investigation was short-circuited. Some intelligence officials believe at the time that members of the charity have ties to bin Laden. [New York Times, 1/9/1999]
Charity Later Linked to Kenya Bombings - The Nairobi embassy will be bombed in August 1998 (see 10:35-10:39 a.m., August 7, 1998). In 2004, it will be reported that according to US officials, “A wholesale fish business financed with Al Haramain funds… steered profits to the al-Qaeda cell behind the [embassy bombing].” One of the bombers confessed days after the bombing that this “business was for al-Qaeda.” [Associated Press, 6/7/2004] In 2004, the Treasury Department will say that two members of the Al Haramain branch in the nearby Comoros Islands helped some of the bombers escape from Kenya after the bombings. [US Treasury Department, 9/9/2004]
Charity Stays Open, Linked to Later Kenya Bombing - A month later after the bombing,s the Kenyan government will ban Al Haramain from the country, but its office nonetheless remains open. Some funds connected to it are believed to have helped support the al-Qaeda cell behind the 2002 bombings in Mombasa, Kenya (see November 28, 2002). Yet Al Haramain’s Kenya office still remains open until late 2004, when Al Haramain is shut down worldwide (see March 2002-September 2004). [Associated Press, 6/7/2004]

Entity Tags: Wadih El-Hage, Al-Qaeda, Prudence Bushnell, Central Intelligence Agency, Mansour al-Kadi, Al Haramain Islamic Foundation

Timeline Tags: Complete 911 Timeline

The Texas tire store where El-Hage worked in 1997.The Texas tire store where El-Hage worked in 1997. [Source: CNN]In August 1997, US intelligence raids the home of Wadih El-Hage, bin Laden’s former personal secretary and a US citizen (see August 21, 1997). With his cover blown, El-Hage decides to return to the US. Arriving at a New York City airport on September 23, he is served with a subpoena to testify before a grand jury the next day. He testifies for several hours and is questioned extensively. [United State of America v. Usama Bin Laden, et al., Day 36, 4/30/2001] US prosecutor Patrick Fitzgerald will later claim that “El-Hage chose to lie repeatedly to the grand jury, but even in his lies he provided some information of potential use to the intelligence community—including potential leads” to the location of his confederates and wanted missing files. [New York Times, 1/9/1999; US Congress, 10/21/2003] But after this, El-Hage is not arrested. He moves back to Texas, where he had lived in the early 1990s, and works in a tire store. [Arizona Republic, 9/28/2001] In October 1997, he is interviewed by agents in Texas [United State of America v. Usama Bin Laden, et al., Day 28, 4/12/2001] , and then left alone until August 1998 when he will be interrogated again shortly after the bombings in Kenya and Tanzania (see 10:35-10:39 a.m., August 7, 1998). He is ultimately arrested and found guilty for his role in those bombings.

Entity Tags: Wadih El-Hage, Patrick J. Fitzgerald

Timeline Tags: Complete 911 Timeline

Fazul Abdullah Mohammed.Fazul Abdullah Mohammed. [Source: Daily Nation]Shortly after the US raid on Wadih El-Hage’s house in Nairobi, Kenya (see August 21, 1997), US investigators discover a letter in the house that mentions a cache of incriminating files had been moved from the house and hidden elsewhere. Investigators suspect the files could contain evidence of a coming attack by El-Hage’s Nairobi cell. A law enforcement official later says US investigators begin a “somewhat frantic, concerted effort” to locate the missing files. “The concern was high enough about something being out there to go right away.” A search for the files is conducted at another location in Kenya in September 1997, but the files are not found. [New York Times, 1/9/1999] But despite this search, and even though other documents found in the raid refer to other unknown members of the cell and the imminent arrival of more operatives (see Shortly After August 21, 1997), the wiretaps on five phone numbers connected to El-Hage are discontinued in October 1997, one month after El-Hage moved to the US (see September 24, 1997). Fazul Abdullah Mohammed (a.k.a. Haroun Fazul), who had been living with El-Hage and using the same phones as him, takes over running the cell. US intelligence will resume monitoring the phones in May 1998 and continue to monitor them through August 1998 (see May 1998), when the cell will successfully attack US embassies in Kenya and Tanzania (see 10:35-10:39 a.m., August 7, 1998). It will be stated in the 2002 book The Cell, “The hardest thing to understand in retrospect is why US law enforcement did nothing else to disrupt the activities of the Nairobi cell” after the raid on El-Hage’s house. [New York Times, 1/13/2001; Miller, Stone, and Mitchell, 2002, pp. 203-205] The files will be found only after the African embassy bombings, when the offices of the charity Mercy International are searched on August 20, 1998. They will contain incriminating information, including numerous phone calls from bin Laden to Nairobi. [United States of America v. Usama Bin Laden, et al, 3/20/2001] It is not clear why the charity was not searched before the attacks, since two of the five phones monitored since 1996 were to Mercy’s Kenya offices (see Late 1996-August 20, 1998).

Entity Tags: Fazul Abdullah Mohammed, Mercy International, US intelligence, Wadih El-Hage

Timeline Tags: Complete 911 Timeline

November 1997: Ali Soufan Joins the FBI

Ali Soufan.Ali Soufan. [Source: CBS News]Ali Soufan joins the FBI. Soufan is a US citizen and recently graduated from a US university, but he is a Muslim who was born and raised in Lebanon and speaks fluent Arabic, making him particularly suited to understanding Islamist militant threats. Soufan is assigned to the FBI’s New York office, which happens to be the office taking the lead in cases involving Osama bin Laden. Initially, Soufan is assigned to Mafia cases. But he has had a long-standing interest in bin Laden, and after reading in an Arabic newspaper about bin Laden’s fatwa (religious edict) against the US in February 1998 (see February 22, 1998), he will write an FBI memo explaining the fatwa’s significance. This will get him increasingly involved in counterterrorism cases, and shortly after the East African embassy bombings in August 1998 (see 10:35-10:39 a.m., August 7, 1998), he will be assigned to the FBI’s Joint Terrorism Task Force (JTTF). He will begin working with FBI bin Laden expert John O’Neill and the counterterrorism I-49 squad, which is increasingly focusing on bin Laden. [Soufan, 2011, pp. 1-16]

Entity Tags: I-49, Ali Soufan, John O’Neill, Federal Bureau of Investigation, Osama bin Laden, Joint Terrorism Task Force

Timeline Tags: Complete 911 Timeline

Prudence Bushnell.
Prudence Bushnell. [Source: PBS]By December 1997, Prudence Bushnell, the US Ambassador to Kenya, is aware that her embassy could be in danger. She has been told of an August 1997 warning that proved there was an al-Qaeda cell in Nairobi (see Late 1994), a precise (and ultimately accurate) November 1997 warning detailing a plot to attack the embassy (see November 1997), and other recent warnings, including information indicating that she is an assassination target. She sends two cables to State Department headquarters in Washington, claiming that the embassy’s location makes it “extremely vulnerable to a terrorist attack,” and asks for security improvements to be made. The State Department turns down her requests and begins to see Bushnell as a nuisance. In early 1998, General Anthony Zinni, the commander of US forces in the region, visits the Nairobi embassy and decides it is vulnerable to terrorist attacks. He offers to send a security team to inspect the situation, but his offer is turned down. The State Department sends its own team instead and in March 1998 determines that about $500,000 worth of easily implemented improvements should make the embassy secure. But the money is not quickly allocated. Bushnell then sends “an emotional letter to Secretary of State Madeleine K. Albright begging for the Secretary’s personal help.” She says she has been fighting for months for a more secure embassy as threats increase, and that the State Department’s refusal to grant her requests for funding is “endangering the lives of embassy personnel.” Albright takes no action. The embassy will be bombed in August (see 10:35-10:39 a.m., August 7, 1998). [New York Times, 1/9/1999]

Entity Tags: Prudence Bushnell, US Department of State, Anthony Zinni, Madeleine Albright

Timeline Tags: Complete 911 Timeline

Ali Mohamed, the al-Qaeda double agent living in California, receives a letter from Ihab Ali Nawawi (an apparent al-Qaeda sleeper cell operative living in Orlando, Florida, at the time (see September 1999)). Nawawi tells Mohamed that Wadih El-Hage, a key member of the al-Qaeda cell in Kenya, has been interviewed by the FBI (see August 21, 1997). Mohamed is given a new contact number for El-Hage. Mohamed calls El-Hage and speaks to him about this, then calls other operatives who pass on the warning of the FBI’s interest in El-Hage to bin Laden. US intelligence is monitoring Mohamed’s phone calls at this time, so presumably they are aware of these connections. [New York Times, 10/24/2000; Raleigh News and Observer, 10/21/2001; Chicago Tribune, 12/11/2001] Yet, despite all of these monitored communications, neither Mohamed, nor Nawawi, nor El-Hage, are apprehended at this time, even though all three are living in the US. Their plot to blow up two US embassies in Africa succeeds in August 1998 (see 10:35-10:39 a.m., August 7, 1998).

Entity Tags: Wadih El-Hage, Ihab Ali Nawawi, Ali Mohamed

Timeline Tags: Complete 911 Timeline

“Just months before” the US embassy bombings (see 10:35-10:39 a.m., August 7, 1998), Kenyan intelligence warns the CIA about an imminent plot to attack the US embassy in Nairobi, Kenya. Paul Muite, a prominent lawyer and legislator in Kenya, later says he was told the CIA showed the Kenyan warning to the Mossad, who was dismissive about its reliability. The CIA then chose to ignore it. [Miller, Stone, and Mitchell, 2002, pp. 206]

Entity Tags: Central Intelligence Agency, Kenya, Paul Muite, Israel Institute for Intelligence and Special Tasks (Mossad)

Timeline Tags: Complete 911 Timeline

US intelligence resumes monitoring the al-Qaeda cell in Kenya, and continues to listen in all the way through the US embassy attacks that the cell implements in August 1998 (see 10:35-10:39 a.m., August 7, 1998). US intelligence had begun wiretapping five phones used by the cell by late 1996, including the phones of cell leader Wadih El-Hage and two phones belonging to Mercy International, a charity believed to have been used as a front by the Kenya cell. The monitoring stopped in October 1997, though it is not clear why. The New York Times will report that “after a break, [monitoring] began again in May 1998, just months before the bombing and precisely during the time the government now asserts the attack was being planned.” It is not known what caused the monitoring to resume nor has it been explained how the cell was able to succeed in the embassy attacks while being monitored. [New York Times, 1/13/2001]

Entity Tags: Mercy International, Al-Qaeda, Wadih El-Hage

Timeline Tags: Complete 911 Timeline

Mamdouh Mahmud Salim (a.k.a. Abu Hajer), a high-ranking al-Qaeda leader, visits Bosnia for unknown reasons and connects with a charity suspected of financing bin Laden’s organization. Salim was one of the founders of al-Qaeda and will be arrested in Germany later in the year (see September 16, 1998) and charged in connection with the 1998 embassy bombings (see 10:35-10:39 a.m., August 7, 1998). Records show that the Bosnia branch of the US-based Benevolence International Foundation (BIF) sponsored Salim’s visa, reserved him an apartment, and identified him as one of its directors. A BIF mole in Bosnian intelligence is able to tip off Salim that investigators are onto him, so he is not caught (see September 1996-June 2000). Intelligence officials will question BIF officers about Salim’s trip in early 2000, but the reason for the trip remains a mystery. [New York Times, 6/14/2002]

Entity Tags: Benevolence International Foundation, Mamdouh Mahmud Salim

Timeline Tags: Complete 911 Timeline

Top: Bin Laden, surrounded by security, walking to the press conference. Bottom: the three journalists attending the press conference sit next to bin Laden.Top: Bin Laden, surrounded by security, walking to the press conference. Bottom: the three journalists attending the press conference sit next to bin Laden. [Source: CNN]Bin Laden discusses “bringing the war home to America,” in a press conference from Khost, Afghanistan. [US Congress, 9/18/2002] Bin Laden holds his first and only press conference to help publicize the fatwa he published several months before. Referring to the group that signed the fatwa, he says, “By God’s grace, we have formed with many other Islamic groups and organizations in the Islamic world a front called the International Islamic Front to do jihad against the crusaders and Jews.” He adds later, “And by God’s grace, the men… are going to have a successful result in killing Americans and getting rid of them.” [CNN, 8/20/2002] He also indicates the results of his jihad will be “visible” within weeks. [US Congress, 7/24/2003] Two US embassies will be bombed in August (see 10:35-10:39 a.m., August 7, 1998). Bin Laden sits next to Ayman al-Zawahiri and Mohammed Atef during the press conference. Two Pakistani journalists and one Chinese journalist attends. But event never gets wide exposure because no independent videotaping is allowed (however, in 2002 CNN will obtain video footage of the press conference seized after the US conquered Afghanistan in late 2001). Pakistani journalist Ismail Khan attends and will later recall, “We were given a few instructions, you know, on how to photograph and only take a picture of Osama and the two leaders who were going to sit close by him. Nobody else.” Two sons of Sheikh Omar Abdul-Rahman attend and distribute what they claim is the will or fatwa of their father (see May 1998), who has been sentenced to life in prison in the US. Journalist Peter Bergen will later comment that the significance of the sons’ presence at the press conference “can’t be underestimated” because it allows bin Laden to benefit from Abdul-Rahman’s high reputation amongst radical militants. Bergen also later says the press conference is a pivotal moment for al-Qaeda. “They’re going public. They’re saying, ‘We’re having this war against the United States.’” [CNN, 8/20/2002] The specific comment by bin Laden about “bringing the war home to America” will be mentioned in the August 2001 memo given to President Bush entitled “Bin Laden Determined to Strike in US” (see August 6, 2001).

Entity Tags: Osama bin Laden, Ismail Khan, Ayman al-Zawahiri, Ahmad Abdul-Rahman, Mohammed Atef, Mohammed Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A joint surveillance operation conducted by the CIA and Albanian intelligence identifies an Islamic Jihad cell that is allegedly planning to bomb the US Embassy in Tirana, Albania’s capital. The cell was created in the early 1990s by Mohammed al-Zawahiri, brother of Islamic Jihad and al-Qaeda leader Ayman al-Zawahiri. The operation intercepts lengthy discussions between the cell and Ayman. [New Yorker, 2/8/2005; Wright, 2006, pp. 269] At the behest of the US government, Egypt, which is co-operating with the US over renditions (see Summer 1995), issues an arrest warrant for Shawki Salama Attiya, one of the militants in the cell. Albanian forces then arrest Attiya and four of the other suspected militants. A sixth suspect is killed, but two more escape. The men are taken to an abandoned airbase, where they are interrogated by the CIA, and then flown by a CIA-chartered plane to Cairo, Egypt, for further interrogation. The men are tortured after arriving in Egypt:
bullet Ahmed Saleh is suspended from the ceiling and given electric shocks; he is later hanged for a conviction resulting from a trial held in his absence;
bullet Mohamed Hassan Tita is hung from his wrists and given electric shocks to his feet and back;
bullet Attiya is given electric shocks to his genitals, suspended by his limbs and made to stand for hours in filthy water up to his knees;
bullet Ahmed al-Naggar is kept in a room for 35 days with water up to his knees, and has electric shocks to his nipples and penis; he is later hanged for an offence for which he was convicted in absentia;
bullet Essam Abdel-Tawwab will also describe more torture for which prosecutors later find “recovered wounds.”
On August 5, 1998, a letter by Ayman al-Zawahiri will be published that threatens retaliation for the Albanian abductions (see August 5, 1998). Two US embassies in Africa will be bombed two days later (see 10:35-10:39 a.m., August 7, 1998). [Washington Post, 3/11/2002, pp. A01; New Yorker, 2/8/2005; Grey, 2007, pp. 128] The US State Department will later speculate that the timing of the embassy bombings was in fact in retaliation for these arrests. [Ottawa Citizen, 12/15/2001]

Entity Tags: Mohamed Hassan Tita, Shawki Salama Attiya, Mohammed al-Zawahiri, Albania, Central Intelligence Agency, Ahmed Saleh, Ahmed al-Naggar, Ayman al-Zawahiri, Essam Abdel-Tawwab, Islamic Jihad

Timeline Tags: Torture of US Captives, Complete 911 Timeline, Kosovar Albanian Struggle

On May 26, 1998, Osama bin Laden said at a press conference that there would be “good news” in coming weeks (see May 26, 1998). On June 12, the State Department issues a public warning, stating, “We take those threats seriously and the United States is increasing security at many US government facilities in the Middle East and Asia.” Notably, the State Department does not mention increasing security in Africa. Two US embassies will be bombed there in August 1998 (see 10:35-10:39 a.m., August 7, 1998). There are no other public warnings given before the embassy bombings. [Bergen, 2001, pp. 110]

Entity Tags: Osama bin Laden, US Department of State

Timeline Tags: Complete 911 Timeline

The British intelligence service MI6 and Moroccan intelligence approach al-Qaeda operative L’Houssaine Kherchtou in an attempt to recruit him. Kherchtou is disillusioned with al-Qaeda and has been under surveillance by the Moroccans for some time. The results of the first meeting are not known, but after it Kherchtou returns to Nairobi, Kenya, where he had helped with a plot to bomb the US embassy and provided his apartment to other conspirators (see Late 1993-Late 1994), and makes contact with other cell members again in early August. He apparently does not know the precise details of the operation, but when the attack happens (see 10:35-10:39 a.m., August 7, 1998), he realizes who did it. MI6 is aware that he is in Kenya and he is detained at the airport by local authorities and turned over to them. MI6 debriefs him about the embassy bombings, but this information is not immediately shared with the FBI (see Shortly After August 7, 1998), which later takes him into custody (see Summer 2000). [American Prospect, 6/19/2005]

Entity Tags: UK Secret Intelligence Service (MI6), Direction de la Surveillance du Territoire (Morocco), L’Houssaine Kherchtou

Timeline Tags: Complete 911 Timeline

Khalid al-Fawwaz.Khalid al-Fawwaz. [Source: CNN]The NSA is monitoring phone calls between bin Laden in Afghanistan and Khalid al-Fawwaz in London, yet no action is taken after al-Fawwaz is given advanced notice of the African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). Al-Fawwaz, together with Ibrahim Eidarous and Adel Abdel Bary, are operating as bin Laden’s de facto international media office in London, and the NSA has listened in for two years as bin Laden called them over 200 times (see November 1996-Late August 1998). On July 29, 1998, al-Fawwaz is called from Afghanistan and told that more satellite minutes are needed because many calls are expected in the next few days. Al-Fawwaz calls a contact in the US and rush orders 400 more minutes for bin Laden’s phone. A flurry of calls on bin Laden’s phone ensues, though what is said has not been publicly revealed. [Knight Ridder, 9/20/2001] On August 7 at around 4:45 a.m., about three hours before the bombings take place, a fax taking credit for the bombings is sent to a shop near al-Fawwaz’s office. The fingerprints of his associates Eidarous and Abdel Bary are later found on the fax. They fax a copy of this to the media from a post office shortly after the bombings and their fingerprints are found on that fax as well. [Seattle Post-Intelligencer, 7/13/1999; Daily Telegraph, 9/19/2001] Canadian intelligence is monitoring an operative named Mahmoud Jaballah who is serving as a communication relay between operatives in Baku and London. He is monitored talking to people both in Baku and London just before the fax is sent from Baku to London (see August 5-7, 1998). The NSA has also been monitoring the operatives in Baku (see November 1996-Late August 1998). It is not clear why the Canadians or the NSA fail to warn about the bombings based on these monitored phone calls. Before 9/11, bin Laden’s phone calls were regularly translated and analyzed in less an hour or so. It has not been explained why this surge of phone calls before the embassy bombings did not result in any new attack warnings. The three men will be arrested shortly after the embassy bombings (see Early 1994-September 23, 1998).

Entity Tags: National Security Agency, Khalid al-Fawwaz, Osama bin Laden, Adel Abdel Bary, Ibrahim Eidarous, Mahmoud Jaballah

Timeline Tags: Complete 911 Timeline

US intelligence is reportedly monitoring a “very important source” in Khartoum, Sudan, during the time of the August 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998). An unnamed US official working in Sudan at the time will later tell this to journalist Jonathan Randal. This official will claim the US is intercepting telephone communications between this source and al-Qaeda at least during 1998. The name of the source has not been revealed, but this person is considered so important that after the embassy bombings the US will consider killing the source in retaliation. However, a different target is chosen because the source either knows nothing about the bombings or at least does not mention them in intercepted conversations. [Randal, 2005, pp. 152] It is not known when this surveillance ends or what happens to the source.

Entity Tags: US intelligence, Al-Qaeda

Timeline Tags: Complete 911 Timeline

Sayyid Iskandar Suliman. This picture is from a poor photocopy of his passport found in Sudanese intelligence files.Sayyid Iskandar Suliman. This picture is from a poor photocopy of his passport found in Sudanese intelligence files. [Source: Public domain via Richard Miniter]On August 4, 1998, Sudanese immigration suspects two men, Sayyid Nazir Abbass and Sayyid Iskandar Suliman, arriving in Sudan, apparently due to something in their Pakistani passports. They attempt to rent an apartment overlooking the US embassy. Three days later, US embassies are bombed in Kenya and Tanzania (see 10:35-10:39 a.m., August 7, 1998). Within hours, Sudanese officials arrest Abbass and Suliman. The two of them had just come from Kenya, and one of them quickly admits to staying in the same hotel in Kenya as some of the embassy bombers. Sudanese intelligence believes they are al-Qaeda operatives involved in the bombings. [Observer, 9/30/2001; Vanity Fair, 1/2002; Randal, 2005, pp. 132-135] The US embassy in Sudan has been shut down for several years. But around August 14, a Sudanese intelligence official contacts an intermediary and former White House employee named Janet McElligott and gives her a vague message that Sudan is holding important suspects and the FBI should send a team immediately to see if they want to take custody of them. [Randal, 2005, pp. 132-135] The FBI wants the two men, but on August 17, Secretary of State Madeleine Albright forbids their extradition. The US has decided to bomb a factory in Sudan in retaliation for the embassy bombings instead of cooperating with Sudan. But FBI agent John O’Neill is not yet aware of Albright’s decision, and word of the Sudanese offer reaches him on August 19. He wants immediate approval to arrest the two suspects and flies to Washington that evening to discuss the issue with counterterrorism “tsar” Richard Clarke. But Clarke tells O’Neill to speak to Attorney General Janet Reno. Later that night, O’Neill talks to Reno and she tells him that the decision to retaliate against Sudan instead has already been made. Mere hours later, the US attack a factory in Sudan with cruise missiles (see August 20, 1998). Within days, it becomes apparent that the factory had no link to al-Qaeda (see September 23, 1998), and no link between the bombings and the Sudanese government will emerge (although Sudan harbored bin Laden until 1996). [Randal, 2005, pp. 132-138] The Sudanese will continue to hold the two men in hopes to make a deal with the US. But the US is not interested, so after two weeks they are send to Pakistan and set free there (see August 20-September 2, 1998).

Entity Tags: US Department of State, Sayyid Nazir Abbass, Sayyid Iskandar Suliman, Sudan, Osama bin Laden, Janet Reno, John O’Neill, Madeleine Albright, Richard A. Clarke, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline

The Islamic Jihad, a militant group that has joined forces with al-Qaeda, issues a statement threatening to retaliate against the US for its involvement rounding up an Islamic Jihad cell in Albania (see Summer 1998). It is believed Ayman al-Zawahiri wrote the statement, which says, “We wish to inform the Americans… of preparations for a response which we hope they read with care, because we shall write it with the help of God in the language they understand.” The bombing of two US embassies in Africa follows two days later (see 10:35-10:39 a.m., August 7, 1998). [CNN, 1/2001; Wright, 2006, pp. 269]

Entity Tags: Islamic Jihad, Ayman al-Zawahiri

Timeline Tags: Complete 911 Timeline

Usama al-Kini, a.k.a. Fahid Muhammad Ally Msalam.Usama al-Kini, a.k.a. Fahid Muhammad Ally Msalam. [Source: FBI]Most of the al-Qaeda operatives involved in the African embassy bombings (see 10:35-10:39 a.m., August 7, 1998) leave the country the night before the bombings. Abdullah Ahmed Abdullah and Ahmed Khalfan Ghailani fly from Nairobi to Karachi, Pakistan, on one flight. Usama al-Kini (a.k.a. Fahid Muhammad Ally Msalam), Mohammed Saddiq Odeh, and five unnamed bombers fly from Nairobi to Karachi with a stopover in Dubai on another flight. Some use false passports, but others, such as Abdullah, travel in their real name. Two others, Sheikh Ahmed Salim Swedan and Mustafa Fadhil, flew to Pakistan on August 2. Odeh is arrested at 5:30 a.m., Kenya time, while going through customs in Karachi, but the others on his flight are not (see 5:30 a.m., August 7, 1998). Two suicide bombers are killed in the bombings. The only operatives who remain in East Africa after the bombings are Fazul Abdullah Mohammed (a.k.a. Haroun Fazul), who volunteered to clean up the evidence in Kenya, and Khalfan Khamis Mohamed, who volunteered to do the same in Tanzania, plus Mohamed al-Owhali, one of the suicide bombers in Kenya who unexpectedly ran away at the last minute and survived with only minor injuries. [United Press International, 1/2/2001; United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001] Given the extent to which US intelligence was monitoring the members of the Kenyan cell (see April 1996 and May 1998), and even reportedly had multiple informants in the cell (see Before August 7, 1998), it is unclear how the US missed the departure of nearly every suspect from Kenya.

Entity Tags: Sheikh Ahmed Salim Swedan, Usama al-Kini, Mustafa Fadhil, Mohamed al-Owhali, Abdullah Ahmed Abdullah, Mohammed Saddiq Odeh, Ahmed Khalfan Ghailani, Khalfan Khamis Mohamed, Fazul Abdullah Mohammed

Timeline Tags: Complete 911 Timeline

Al-Qaeda operatives plan to bomb the US embassy in Kampala, Uganda, at the same time the embassies in Kenya and Tanzania are bombed (see 10:35-10:39 a.m., August 7, 1998), but there is a delay at the last moment. Police arrest 18 people over the next two weeks before the attack can be carried out. A Ugandan official will later say, “The attacks were planned to be more serious and devastating” than the other two. It is unclear what becomes of these 18 suspects; none of them are tried in the US. [Associated Press, 9/25/1998; Reeve, 1999, pp. 200]

Entity Tags: Al-Qaeda

Timeline Tags: Complete 911 Timeline

At approximately 5:30 in the morning, Kenya time, Mohammed Saddiq Odeh is arrested at the airport in Karachi, Pakistan. Odeh is one of the bombers in the embassy bombings which take place four hours later in Kenya and Tanzania (see 10:35-10:39 a.m., August 7, 1998). [United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001]
Odeh Stopped Because of Alert Inspector or CIA? - He had flown out of Nairobi, Kenya, the night before, with his plane stopping in Dubai on the way to Pakistan (see August 6-7, 1998). According to some accounts, an inspector notices that Odeh’s passport picture has a beard, while Odeh does not have a beard and looks different. Furthermore, Odeh is unable to look the inspector in the eyes. But according to UPI, he is stopped because he had been identified by the CIA. In any case, over the next hours, he is handed over to intelligence officers and makes a full confession. He admits that he is a member of al-Qaeda, led by bin Laden, and that he is the head of the al-Qaeda cell in Kenya. He even gives the address of the villa where the bomb was built and the names of the other bombers. [Bergen, 2001, pp. 116; United Press International, 1/2/2001; Associated Press, 4/3/2001; Miller, Stone, and Mitchell, 2002, pp. 213]
False or Mistaken Account by CIA Officer - CIA officer Gary Berntsen heads the CIA’s emergency deployment team to Tanzania in the immediate wake of the bombings. He will improbably claim in a 2005 book that the US at first primarily suspects Hezbollah. According to him, it is only on August 15 when a CIA officer in Karachi happens to notice an article saying that an Arab traveling on a false passport was arrested in Karachi near the time of the bombings. This is discovered to be Odeh, who is transferred to US custody. Only then does al-Qaeda’s involvement become clear. Perhaps to support this timeline, Berntsen also falsely claims that another bomber, Mohamed al-Owhali, is arrested on August 15 when in fact he is arrested three days earlier. [United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001; Berntsen and Pezzullo, 2005]
Odeh's Confession and Other Al-Qaeda Evidence Kept Secret for Days - Publicly, the US does not link any evidence from the bombing to al-Qaeda until August 17, when Odeh’s confession is finally mentioned in front page news stories. Even then, the story is based on accounts from Pakistani officials and US officials say they cannot confirm it. [Washington Post, 8/17/1998] In fact, there is a wealth of information immediately tying al-Qaeda to the bombings that is kept secret, including wiretaps of many of the bombers (see April 1996 and May 1998), informants in the cell (see Before August 7, 1998), and even a statement of responsibility that was intercepted hours before the bombings had occurred (see August 5-7, 1998).

Entity Tags: Mohammed Saddiq Odeh, Mohamed al-Owhali, Central Intelligence Agency, Gary Berntsen, Al-Qaeda

Timeline Tags: Complete 911 Timeline

Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right).Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right). [Source: Associated Press]Two US embassies in Africa are bombed within minutes of each other. At 10:35 a.m., local time, a suicide car bomb attack in Nairobi, Kenya, kills 213 people, including 12 US nationals, and injures more than 4,500. Mohamed al-Owhali and someone known only as Azzam are the suicide bombers, but al-Owhali runs away at the last minute and survives. Four minutes later, a suicide car bomb attack in Dar es Salaam, Tanzania, kills 11 and injures 85. Hamden Khalif Allah Awad is the suicide bomber there. The attacks will be blamed on al-Qaeda. [PBS Frontline, 2001; United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001] The Tanzania death toll is low because, remarkably, the attack takes place on a national holiday so the US embassy there is closed. [Miller, Stone, and Mitchell, 2002, pp. 195] The attack shows al-Qaeda has a capability for simultaneous attacks. The Tanzania bombing appears to have been a late addition, as one of the arrested bombers will allegedly tell US agents that it was added to the plot only about 10 days in advance. [United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001] A third attack against the US embassy in Uganda does not take place due to a last-minute delay (see August 7, 1998). [Associated Press, 9/25/1998] August 7, 1998, is the eighth anniversary of the arrival of US troops in Saudi Arabia and some people will speculate that this is the reason for the date of the bombings. [Gunaratna, 2003, pp. 46] In the 2002 book The Cell, reporters John Miller, Michael Stone, and Chris Mitchell will write: “What has become clear with time is that facets of the East Africa plot had been known beforehand to the FBI, the CIA, the State Department, and to Israeli and Kenyan intelligence services.… [N]o one can seriously argue that the horrors of August 7, 1998, couldn’t have been prevented.” They will also comment, “Inexplicable as the intelligence failure was, more baffling still was that al-Qaeda correctly presumed that a major attack could be carried out by a cell that US agents had already uncovered.” [Miller, Stone, and Mitchell, 2002, pp. 195, 206] After 9/11, it will come to light that three of the alleged hijackers, Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi, had some involvement in the bombings (see October 4, 2001, Late 1999, and 1993-1999) and that the US intelligence community was aware of this involvement by late 1999 (see December 15-31, 1999), if not before.

Entity Tags: Salem Alhazmi, Nawaf Alhazmi, Mohamed al-Owhali, Hamden Khalif Allah Awad, Khalid Almihdhar, Al-Qaeda, Azzam

Timeline Tags: Complete 911 Timeline

In November 1997, an Egyptian named Mustafa Mahmoud Said Ahmed walked into the US embassy in Nairobi, Kenya, and told CIA officers of a group planning to blow up the embassy (see November 1997). His warning would turn out to be a startlingly accurate description of the 1998 US embassy bombing in Nairobi (see 10:35-10:39 a.m., August 7, 1998). Ahmed apparently is involved in the bombing of the US embassy in Dar es Salaam, Tanzania, that takes place the same day the Nairobi embassy is bombed. One day after the attacks, Ahmed contacts the British embassy and offers to help. He is overheard saying, “I told them everything I knew.” He also tells the British that it was “not the first time” he had cooperated with Western officials, and that he had been doing so “since last year.” [New York Times, 10/23/1998; New York Times, 1/9/1999] CIA officer Gary Berntsen will later reveal that he meets Ahmed as Ahmed is being kicked out of an allied government’s embassy. Berntsen then interviews Ahmed, and while the account of the interview is almost completely censored, Ahmed apparently gives information that leads to the arrest of one of the embassy bombers in Pakistan on August 15. This is the crucial break that allows the US to conclusively determine al-Qaeda’s role in the bombings and arrest some of the other bombers. [Berntsen and Pezzullo, 2005, pp. 22-25] The US does not ask for Ahmed’s extradition, and he is charged for the Tanzania bombing in that country. The New York Times will report, “Several non-American diplomats in the region [speculate] that the United States is allowing the Tanzanians to try Mr. Ahmed because they fear his trial in America might bring to light his dealings with American authorities and other Western intelligence services.” [New York Times, 10/23/1998; New York Times, 1/9/1999] In March 2000, Tanzania will announce that all charges against Ahmed have been dropped and he is being deported. No reason will be given. [New York Times, 3/20/2000]

Entity Tags: Gary Berntsen, Mustafa Mahmoud Said Ahmed, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

Two days after the US embassy bombings in Africa (see 10:35-10:39 a.m., August 7, 1998), the FBI interview double agent Ali Mohamed over the telephone. Mohamed is living openly in California. He says al-Qaeda is behind the bombings and that he knows who the perpetrators are, but he won’t give their names to the FBI. He also tries to downplay his involvement in the bombings, saying that he lived in Kenya in 1994 and ran front companies for bin Laden there, but when he was shown a file containing a plan to attack the US embassy in Kenya, he “discouraged” the cell members from carrying out the attack. A week later, prosecutors subpoena Mohamed to testify before a grand jury hearing in New York to be held in September. Author Peter Lance will later comment, “Considering that Mohamed had told [US Attorney Patrick] Fitzgerald at their dinner meeting in the fall of 1997 (see October 1997) that he had fake passports and the means to leave the country quickly, it’s mind-boggling how long it took the Feds to search his home…” They do not arrive at his house until August 24 (see August 24, 1998). On August 27, he again tells the FBI on the phone that he knows who the bombers are but again refuses to name names. He will not be arrested until September 10 (see September 10, 1998). [New York Times, 1/13/2001; Lance, 2006, pp. 296]

Entity Tags: Ali Mohamed, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline

Mohamed al-Owhali is arrested and immediately begins confessing to FBI investigators his role in the recent al-Qaeda bombing of the US embassy in Nairobi, Kenya (see 10:35-10:39 a.m., August 7, 1998). In addition to revealing the existence of an al-Qaeda network in the US planning an attack there (August 12-25, 1998) and also revealing the phone number of a key al-Qaeda communications hub in Yemen (see Late August 1998), it appears he also reveals al-Qaeda plans for an attack in Yemen. In October 2000, Al-Qaeda operatives bombed the USS Cole in a port in Yemen (see October 12, 2000). In January 2001, in coverage of al-Owhali’s trial for his role in the embassy bombings, a court document mentions that during his interrogation he mentioned “a possible attack in Yemen.” [CNN, 1/19/2001] However, one newspaper notes, “It could not be learned how the authorities followed up on the information or how detailed it was.” [New York Times, 1/18/2001] It will later be revealed that al-Owhali identified the two leaders of the Cole bombing as participants in the planning for the US embassy bombings. [CNN, 10/16/2001]

Entity Tags: Mohamed al-Owhali, Al-Qaeda

Timeline Tags: Complete 911 Timeline

In 1998, President Clinton faces a growing scandal about his sexual relationship with aide Monica Lewinsky, and even faces the possibility of impeachment over the matter. He is publicly interrogated about the scandal on August 17, 1998. Counterterrorism “tsar” Richard Clarke will later claim that he worries Clinton might let the timing of the scandal get in the way of acting on new intelligence to hit Osama bin Laden with a missile strike in retaliation for the recent African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). But Clarke is reassured when Clinton tells his advisers, “Do you all recommend that we strike on the 20th? Fine. Do not give me political advice or personal advice about the timing. That’s my problem. Let me worry about that.” [Clarke, 2004, pp. 185-186] Defense Secretary William Cohen also warns Clinton that he will be criticized for changing the subject from the Lewinsky scandal. [Benjamin and Simon, 2005, pp. 358]
Criticism from Politicians - Clinton gives the go-ahead for the missile strike on August 20th anyway (see August 20, 1998) and is immediately widely criticized for it. In late 1997, there was a popular movie called “Wag the Dog,” based on a fictional president who creates an artificial crisis in order to distract the public from a domestic scandal. Republicans are particularly critical and seize upon a comparison to the movie. House Speaker Newt Gingrich (R-GA) initially supports the missile strike, but later criticizes it as mere “pinpricks.” [9/11 Commission, 7/24/2004, pp. 117] Sen. Arlen Specter (R-PA) says, “The president was considering doing something presidential to try to focus attention away from his personal problems.” [Benjamin and Simon, 2005, pp. 358-359] Sen. Daniel Coats (R-IN) says, “I just hope and pray the decision that was made was made on the basis of sound judgment, and made for the right reasons, and not made because it was necessary to save the president’s job.” [New York Times, 8/4/2004]
Media Criticism - The media is also very critical, despite a lack of any evidence that Clinton deliberately timed the missile strike as a distraction. Television networks repeatedly show clips of the “Wag the Dog” movie after the missile strike. New Yorker journalist Seymour Hersh reports, “Some reporters questioned whether the president had used military force to distract the nation’s attention from the Lewinsky scandal.” [Benjamin and Simon, 2005, pp. 358-359]
9/11 Commission Commentary - The 9/11 Commission will later conclude, “The failure of the strikes, the ‘wag the dog’ slur, the intense partisanship of the period, and the [fact that one of the missile targets probably had no connection to bin Laden (see September 23, 1998)] likely had a cumulative effect on future decisions about the use of force against bin Laden.” [9/11 Commission, 7/24/2004, pp. 118]

Entity Tags: Richard A. Clarke, William S. Cohen, William Jefferson (“Bill”) Clinton, Osama bin Laden, Monica Lewinsky, Daniel Coats, Arlen Specter, Newt Gingrich

Timeline Tags: Complete 911 Timeline

Through its own monitoring of Osama bin Laden’s satellite phone, the CIA determines that he intends to travel to a training camp in Khost, in eastern Afghanistan. The CIA has to use its own equipment to do this because of a dispute with the NSA, which refused to provide it with full details of its intercepts of bin Laden’s calls (see December 1996). Although the CIA can only get half of what the NSA gets, shortly after the attacks on US embassies in East Africa (see 10:35-10:39 a.m., August 7, 1998), it determines that bin Laden will travel to Khost the next day. On that day, the US launches several missile strikes, one of which is against Khost (see August 20, 1998), but bin Laden does not travel there, evading the missiles. Some will later claim that bin Laden changes his mind on the way there for no particular reason, but there will also be allegations that the Pakistani ISI warned him of the upcoming attack (see July 1999). [Wright, 2006, pp. 283]

Entity Tags: National Security Agency, Al-Qaeda, Osama bin Laden, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

Around the time of a US missile strike against al-Qaeda leaders (see August 20, 1998), Ayman al-Zawahiri uses Osama bin Laden’s satellite phone to speak to Rahimullah Yusufzai, a leading Pakistani reporter for the BBC and the Karachi-based News. During the call, Al-Zawahiri denies al-Qaeda is responsible for attacks on two US embassies in East Africa, which killed over 200 people (see 10:35-10:39 a.m., August 7, 1998): “Mr. bin Laden has a message. He says, ‘I have not bombed the American embassies in Kenya and Tanzania. I have declared jihad, but I was not involved.’” Although bin Laden’s trial for the embassy bombings in Afghanistan, arranged by the Taliban, collapses when the US fails to provide sufficient evidence of his involvement (see (October 25-November 20, 1998)), bin Laden is generally thought to have known of and authorized the two attacks. [Wright, 2006, pp. 279, 283]

Entity Tags: Rahimullah Yusufzai, Ayman al-Zawahiri, Al-Qaeda, Osama bin Laden

Timeline Tags: Complete 911 Timeline

After he is arrested for the Nairobi embassy bombing (see 10:35-10:39 a.m., August 7, 1998), Mohamed al-Owhali is questioned by local Kenyan law enforcement and the FBI, and discloses important information (see August 4-25, 1998). When he is shown photographs of al-Qaeda operatives, one of the people he identifies is Abd al-Rahim al-Nashiri (a.k.a. Bilal), a cousin of another Nairobi bomber. Al-Nashiri is an al-Qaeda leader who helped al-Owhali obtain a false passport in Yemen when al-Owhali stayed at an al-Qaeda safe house in April-May 1998. It is unclear where the FBI obtained the photo of al-Nashiri, although US intelligence was previously informed of al-Nashiri’s involvement in a plot to smuggle anti-tank missiles into Saudi Arabia (see 1997). [Federal Bureau of Investigation, 9/9/1998, pp. 16 pdf file; United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001; Burke, 2004, pp. 174; 9/11 Commission, 7/24/2004, pp. 152-3]

Entity Tags: Abd al-Rahim al-Nashiri, Mohamed al-Owhali, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Two days after the US embassy bombings in Africa (see 10:35-10:39 a.m., August 7, 1998), double agent Ali Mohamed told the FBI over the telephone that he knows who the perpetrators are, but he won’t reveal their names (see August 9, 1998). Mohamed is living openly in Sacramento, California, but is not arrested. A week later, he received a subpoena ordering him to testify before a grand jury hearing in New York to be held in September. On August 24, a ten-person team of federal agents secretly search Mohamed’s apartment. They copy computer files and photograph documents. His computer has been bugged since October 1997, but agents nonetheless clone his hard drives. They also copy his CD-Roms and floppy disks and photocopy documents. Then they try to hide any trace that they have been in his apartment. They discover a false passport and a number of training documents. One file, created in May 1998, discusses security measures for terrorist cells and specifically mentions his links to al-Qaeda. They even find documents from the Nairobi al-Qaeda cell and training manuals. [San Francisco Chronicle, 9/21/2001; Raleigh News and Observer, 10/21/2001; Wall Street Journal, 11/26/2001; Lance, 2006, pp. 296] However, he will still not be arrested until September 10 (see September 10, 1998).

Entity Tags: Federal Bureau of Investigation, Ali Mohamed, Al-Qaeda

Timeline Tags: Complete 911 Timeline

Al-Qaeda’s communications hub in Sana’a, Yemen.Al-Qaeda’s communications hub in Sana’a, Yemen. [Source: PBS NOVA]The investigation of the East Africa embassy bombings (see 10:35-10:39 a.m., August 7, 1998) led to the discovery of the phone number of an al-Qaeda communications hub in Sana’a, Yemen (see August 4-25, 1998). The hub is run by an al-Qaeda veteran named Ahmed al-Hada, who is helped by his son Samir and is related to many other al-Qaeda operatives in Yemen and elsewhere. He is also the father in law of 9/11 hijacker Khalid Almihdhar, whose wife, Hoda al-Hada, lives at the hub with their children. [Newsweek, 6/2/2002; Die Zeit (Hamburg), 10/1/2002; MSNBC, 7/21/2004; Suskind, 2006, pp. 94; Wright, 2006, pp. 277, 309, 343, 378] Several of Ahmed al-Hada’s relatives die fighting for al-Qaeda before 9/11, a fact known to US intelligence. [Los Angeles Times, 12/21/2005; Guardian, 2/15/2006] The NSA may already be aware of the phone number, as they have been intercepting Osama bin Laden’s communications for some time (see November 1996-Late August 1998) and, according to Newsweek, “some” of bin Laden’s 221 calls to Yemen are to this phone number. [Newsweek, 2/18/2002; Sunday Times (London), 3/24/2002; Media Channel, 9/5/2006] The US intelligence community now begins a joint effort to monitor the number. The NSA and CIA jointly plant bugs inside the house, tap the phones, and monitor visitors with spy satellites. [Mirror, 6/9/2002; Wright, 2006, pp. 343; New Yorker, 7/10/2006 pdf file] US intelligence also learns that the communications hub is an al-Qaeda “logistics center,” used by agents around the world to communicate with each other and plan attacks. [Newsweek, 6/2/2002] The joint effort enables the FBI to map al-Qaeda’s global organization (see Late 1998-Early 2002) and at least three of the hijackers use the number, enabling the NSA to intercept their communications and find out about an important al-Qaeda meeting in Malaysia (see December 29, 1999 and January 5-8, 2000 and Early 2000-Summer 2001). It appears al-Qaeda continues to use this phone line until Samir al-Hada dies resisting arrest in early 2002 (see February 13, 2002).

Entity Tags: National Security Agency, Federal Bureau of Investigation, Samir al-Hada, Khalid Almihdhar, Central Intelligence Agency, Osama bin Laden, Hoda al-Hada, Ahmed al-Hada

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mohamed al-Owhali, one of the bombers of the US embassy in Nairobi, Kenya (see 10:35-10:39 a.m., August 7, 1998), is rendered from Kenya to the US. Al-Owhali was arrested in Nairobi after the bombing and gave up information to local authorities and the FBI about it (see August 4-25, 1998 and August 22-25 1998). He will be tried in the US and sentenced to life in prison (see October 21, 2001). [Grey, 2007, pp. 129, 246]

Entity Tags: Mohamed al-Owhali

Timeline Tags: Torture of US Captives, Complete 911 Timeline

Following the African embassy bombings (see 10:35-10:39 a.m., August 7, 1998), CIA managers ask Alec Station, the CIA’s bin Laden unit, what it most needs to improve the agency’s capabilities against al-Qaeda. Alec Station chief Michael Scheuer will later say that he raises “our dire need for verbatim reports derived from electronic collection.” This is a reference to his desire to get verbatim transcripts of calls to and from al-Qaeda’s operations hub in Yemen, in particular ones between it and Osama bin Laden in Afghanistan. The NSA has the transcripts, but is refusing to provide them to the CIA, and the two agencies have been at loggerheads over the issue for nearly two years. Alec Station needs the transcripts, not the summaries the NSA provides, because the operatives talk in code on the phone and this code cannot be cracked based on the summaries, only using the transcripts (see February 1996-May 1998, December 1996, After December 1996, and After December 1996). Other senior CIA officers have similar trouble getting transcripts from the NSA. Higher officials order the NSA to comply, and they do, but only for less than 12 requests. Then the system returns to the way it was, with NSA only sharing summaries. [Atlantic Monthly, 12/2004] The reason for the change back is unclear, although bin Laden stops using his satellite phone around this time (see Late August 1998).

Entity Tags: National Security Agency, Alec Station, Central Intelligence Agency, Al-Qaeda, Michael Scheuer

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The FBI asks the NSA to pass on all calls between an al-Qaeda communications hub in Yemen and the US. The hub, which is run by an operative named Ahmed al-Hada and was involved in the attacks on US embassies in East Africa (see Late August 1998), is a key al-Qaeda logistics center and intelligence gleaned from listening in on calls to and from it will help prevent some attacks (see August 4-25, 1998 and Late 1998-Early 2002). Dan Coleman, one of the FBI agents who places the request, will say, “anyone who called the Yemen number is white-hot, a top suspect.” However, the NSA will not inform the FBI of all calls between the hub and the US. [Suskind, 2006, pp. 94] In particular, two 9/11 hijackers will call the hub while they are in the US (see Early 2000-Summer 2001). However, the information will be withheld from the FBI and various explanations will be offered for this failure (see (Spring 2000), Summer 2002-Summer 2004, and March 15, 2004 and After).

Entity Tags: Federal Bureau of Investigation, National Security Agency, Dan Coleman

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Wadih El Hage.Wadih El Hage. [Source: FBI]On September 15, 1998, Wadih El-Hage is arrested in the US after appearing before a US grand jury. A US citizen, he had been bin Laden’s personal secretary. He will later be convicted for a role in the 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998). [New York Times, 9/18/1998]

Entity Tags: Wadih El-Hage

Timeline Tags: Complete 911 Timeline

Mamdouh Mahmud Salim.Mamdouh Mahmud Salim. [Source: FBI]Mamdouh Mahmud Salim (a.k.a. Abu Hajer), an al-Qaeda operative from the United Arab Emirates connected to the 1998 East African embassy bombings (see 10:35-10:39 a.m., August 7, 1998), is arrested at a used car dealership near Munich, Germany. He is arrested by a special commando unit of German police, with CIA agents directing them nearby. The German government has no idea who Salim is, and the US only notified Germany about the planned arrest five hours in advance. [PBS, 9/30/1998; Der Spiegel (Hamburg), 12/12/2005] The 9/11 Congressional Inquiry will later say that Salim was Osama bin Laden’s “right hand man,” and “head of bin Laden’s computer operations and weapons procurement.” He is also “the most senior-level bin Laden operative arrested” up until this time. [New York Times, 9/29/2001; US Congress, 7/24/2003, pp. 51 pdf file] Author Lawrence Wright will later note that bin Laden and Salim worked together in Afghanistan in the 1980s, “forging such powerful bonds that no one could get between them.” Salim was also one of the founding members of al-Qaeda (see August 11-20, 1988) and bin Laden’s personal imam (i.e., preacher). [Wright, 2006, pp. 131, 170] Starting in 1995, Salim had been making frequent visits to Germany. Mamoun Darkazanli, who lives in Hamburg and associates with Mohamed Atta’s al-Qaeda cell, had signing powers over Salim’s bank account. Both men attended Al-Quds mosque, the same Hamburg mosque as future 9/11 hijackers Atta and Marwan al-Shehhi attend. [Vanity Fair, 1/2002] The FBI learns much from Salim about al-Qaeda, and this information could be useful to the US embassy bombings investigation. However, the FBI is unwilling to brief its German counterparts on what it knows about Salim and al-Qaeda. [New York Times, 9/29/2001]

Entity Tags: Osama bin Laden, Mamdouh Mahmud Salim, Al-Qaeda

Timeline Tags: Complete 911 Timeline

Khalid al-Fawwaz, Osama bin Laden’s de facto press secretary, is arrested in London on September 23, 1998. He is arrested with six other suspects, presumably including Ibrahim Eidarous and Adel Abdel Bary. The three of them effectively run the Advice and Reformation Committee (ARC), a bin Laden front in London. Al-Fawwaz is arrested again on September 27 at the request of the US, which issues an extradition warrant for him the same day. On July 12, 1999, Eidarous and Bary are arrested again, as the US issues extradition warrants for them as well. All three are charged in the US for roles in the 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). Apparently, none of them are released before being arrested on the new charges (see July 12, 1999). Presumably, the other three who were originally arrested are released. [New York Times, 9/29/1998; New York Times, 7/13/1999] It is not clear why the three were not arrested earlier, or why they were not charged in Britain. They had been monitored in London for years. Bin Laden called them over 200 hundred times from 1996 to 1998, and they are alleged to have been involved in many plots (see Early 1994-September 23, 1998). For instance, the three received a fax from al-Qaeda operatives taking credit for the embassy bombings hours before the bombings actually took place and passed it on to media outlets (see July 29-August 7, 1998). In 1996, the US requested that Britain should arrest al-Fawwaz, Eidarous, and Bary, but the British decided there wasn’t enough evidence. [Soufan, 2011, pp. 98]

Entity Tags: Ibrahim Eidarous, Adel Abdel Bary, Advice and Reformation Committee, Khalid al-Fawwaz

Timeline Tags: Complete 911 Timeline


Mark Flessner.
Mark Flessner. Two months after the US embassy bombings in Africa (see 10:35-10:39 a.m., August 7, 1998), FBI agent Robert Wright and his Vulgar Betrayal investigation discover evidence they think ties Saudi multimillionaire Yassin al-Qadi to the bombings. Since 1997, Wright had been investigating a suspected terrorist cell in Chicago that was connected to fundraising for Hamas. They discovered what they considered to be clear proof that al-Qadi and other people they were already investigating had helped fund the embassy bombings. Wright asks FBI headquarters for permission to open an investigation into this money trail at this time, but the permission is not granted. Wright will later recall, “The supervisor who was there from headquarters was right straight across from me and started yelling at me: ‘You will not open criminal investigations. I forbid any of you. You will not open criminal investigations against any of these intelligence subjects.’” Instead, they are told to merely follow the suspects and file reports, but make no arrests. Federal prosecutor Mark Flessner, working with the Vulgar Betrayal investigation, later will claim that a strong criminal case was building against al-Qadi and his associates. “There were powers bigger than I was in the Justice Department and within the FBI that simply were not going to let [the building of a criminal case] happen. And it didn’t happen.… I think there were very serious mistakes made. And I think, it perhaps cost, it cost people their lives ultimately.” [ABC News, 12/19/2002] Flessner later will speculate that Saudi influence may have played a role. ABC News will report in 2002, “According to US officials, al-Qadi [has] close personal and business connections with the Saudi royal family.” [ABC News, 11/26/2002] Wright later will allege that FBI headquarters even attempted to shut down the Vulgar Betrayal investigation altogether at this time. He says, “They wanted to kill it.” [ABC News, 12/19/2002] However, he will claim, “Fortunately an assistant special agent in Chicago interceded to prevent FBI headquarters from closing Operation Vulgar Betrayal.” [Federal News Service, 6/2/2003] He claims that a new supervisor will write in late 1998, “Agent Wright has spearheaded this effort despite embarrassing lack of investigative resources available to the case, such as computers, financial analysis software, and a team of financial analysts. Although far from being concluded, the success of this investigation so far has been entirely due to the foresight and perseverance of Agent Wright.” [Federal News Service, 5/30/2002] When the story of this interference in the alleged al-Qadi-embassy bombings connection will be reported in late 2002, Wright will conclude, “September the 11th is a direct result of the incompetence of the FBI’s International Terrorism Unit. No doubt about that. Absolutely no doubt about that. You can’t know the things I know and not go public.” He will remain prohibited from telling all he knows, merely hinting, “There’s so much more. God, there’s so much more. A lot more.” [ABC News, 12/19/2002]

Entity Tags: Yassin al-Qadi, Hamas, US Department of Justice, International Terrorism Unit, Mark Flessner, Robert G. Wright, Jr., Al-Qaeda, Federal Bureau of Investigation, Vulgar Betrayal

Timeline Tags: Complete 911 Timeline

After the Taliban is warned that bin Laden has been accused of involvement in the recent 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998), it initiates judicial proceedings against him. But when the US fails to provide Afghanistan’s supreme court with sufficient evidence, bin Laden is acquitted. [Associated Press, 11/20/1998] The Taliban has already received some claims regarding bin Laden’s involvement in terrorism from the US (see August 23, 1998), but these are insufficient and more evidence is requested. Originally, there is no cut-off date for supplying evidence, but when the US does nothing, the Taliban leaders become frustrated and announce a time limit on the inquiry: “If anyone has any evidence of bin Laden’s involvement in cases of terrorism, subversion, sabotage, or any other acts, they should get it to the court before November 20. If by then there is nothing, we will close the case and in our eyes he will be acquitted.” In a November 10 cable the US embassy in Pakistan, which also handles Afghan affairs, comments: “The Taliban appear to many observers not to be totally unreasonable in their demand that the US provide them evidence on bin Laden.” [US Embassy (Islamabad), 11/10/1998 pdf file] The US then sends the Taliban a video of an interview bin Laden gave CNN in 1997, a transcript of his ABC 1998 interview, and a copy of his US indictment for the embassy bombings. [US Department of State, 11/11/1998 pdf file] The inquiry is headed by the country’s chief justice, Noor Mohamed Saqib. After the evidence is found not to be enough and bin Laden is set free, Saqib comments: “It is their shame that they have been silent. America is wrong about bin Laden… Anything that happens now anywhere in the world they blame Osama, but the reality is in the proof and they have not given us any. It’s over and America has not presented any evidence. Without any evidence, bin Laden is a man without sin… he is a free man.” [Associated Press, 11/20/1998] However, the State Department says that it did not “endorse, support, or request” the sharia court trial, but simply wanted bin Laden extradited. A White House spokesperson says, “Without commenting on the rigor of the Taliban judicial system, it is clear that Mr. bin Laden is a proven threat to US national interests.” [US Department of State, 11/11/1998 pdf file; Associated Press, 11/20/1998] The Taliban’s leadership is not satisfied with the outcome of the trial and will subsequently ask the US for help in getting rid of bin Laden (see November 28, 1998).

Entity Tags: US Embassy in Islamabad, US Department of State, Taliban, Noor Mohamed Saqib, Osama bin Laden, Supreme Court of Afghanistan

Timeline Tags: Complete 911 Timeline

Princess Diana at a mine field in Angola in 1997.Princess Diana at a mine field in Angola in 1997. [Source: Tim Graham / Corbis]The NSA admits that US intelligence agencies possess 1,056 pages of classified information regarding Britain’s Princess Diana. British tabloids portray the documents as rife with salacious information on Diana’s “most intimate love secrets” about her relationship with Egyptian billionaire Dodi al-Fayed, but the actual documentation may not be so lurid. The NSA recently denied a Freedom of Information request from the Internet news service APB Online about information it has collected on Diana, who died in a tragic car accident in 1997. (It is unclear whether US intelligence has any unreleased information about the circumstances of Diana’s death. [APB Online, 11/30/1998; Washington Post, 12/12/1998] The NSA has denied monitoring Diana on the night of her death, an allegation raised by The Observer in 2006.) [MSNBC, 12/11/2006] In the two-page letter denying the request, the NSA admits to possessing a “Diana file,” but refuses to divulge what is in that file. A US intelligence official says the information is made up of conversations between other people who mentioned Diana; the references to Diana in those intercepted conversations are “incidental.” The official says Diana was never a particular target of the NSA’s Echelon surveillance program. However, the NSA has classified 124 pages of the “Diana documents” as top secret “because their disclosure could reasonably be expected to cause exceptionally grave damage to the national security.” According to a recent report by the European Parliament, the NSA routinely monitors virtually “all e-mail, telephone and fax communications… within Europe” (see July 11, 2001). Intelligence expert Steven Aftergood of the Federation of American Scientists says “the US and our allies promiscuously collect electronic communications around the world. Whether the descriptions of Echelon are accurate or not, that much is definitely true.” Some believe that lurid snippets of information leaked to the British press regarding Diana’s affair with Fayed, and her ambivalent relationship with Prince Charles, may have come from Echelon wiretaps and surveillance. Another FAS scientist, John Pike, says the NSA and other US intelligence agencies may have been monitoring Diana to protect her from terrorist attacks. Pike says it is also possible she may have been monitored because of her involvement in banning land mines, a position opposed by the Pentagon. [APB Online, 11/30/1998; Washington Post, 12/12/1998] Former NSA official Wayne Madsen will say in 2000, “[W]hen NSA extends the big drift net out there, it’s possible that they’re picking up more than just her conversations concerning land mines. What they do with that intelligence, who knows?” [CBS News, 2/27/2000] In August 1999, the NSA will deny another Freedom of Information request about its “Diana file” from the British newspaper The Guardian. [Guardian, 8/6/1999]

Entity Tags: Steven Aftergood, Prince Charles, The Guardian, John Pike, Dodi al-Fayed, Echelon, Federation of American Scientists (FAS), National Security Agency, Princess Diana

Timeline Tags: Civil Liberties

William Wechsler.William Wechsler. [Source: CAP]Shortly after the US embassy bombings in 1998 (see 10:35-10:39 a.m., August 7, 1998), the US launches a new interagency effort to track bin Laden’s finances. There had been a previous interagency effort in 1995 but it had fizzled (see October 21, 1995). Counterterrorism “tsar” Richard Clarke sets up a task force. He orders it to find out how much money bin Laden has, where it comes from, how it is distributed, and to stop it. Clarke appoints William Wechsler, a National Security Council staff member, to head the task force. The task force begins an investigation of bin Laden’s finances (see Late 1998). Clarke later writes that he and Wechsler “quickly [come] to the conclusion that the [US government] departments [are] generally doing a lousy job of tracking and disrupting international criminals’ financial networks and had done little or nothing against terrorist financing.” [New York Times, 9/20/2001; Clarke, 2004, pp. 190-191] Clarke will later claim there was only limited effort from within the US government to fight bin Laden’s financial network. He will assert that within weeks of setting up the interagency effort, it was determined that only one person in the US government, a lowly Treasury Department official, appeared to have any expertise about the hawala system, an informal and paperless money transfer system used by al-Qaeda that is popular with Muslim populations worldwide (see 1993-September 11, 2001). Clarke will later write that the “CIA knew little about the [hawala] system, but set about learning. FBI knew even less, and set about doing nothing.” The FBI claims there are no hawalas in the US, but Wechsler finds several in New York City using a simple Internet search. Clarke will say, “Despite our repeated requests over the following years, nobody from the FBI ever could answer even our most basic questions about the number, location, and activities of major hawalas in the US—much less taken action.” The efforts of other departments are not much better. The one Treasury official with some expertise about hawalas is eventually let go before 9/11. [Clarke, 2004, pp. 192-193] Efforts to pressure governments overseas also meet with little success (see August 20, 1998-1999).

Entity Tags: William Wechsler, Richard A. Clarke, Federal Bureau of Investigation, Osama bin Laden, Al-Qaeda, Central Intelligence Agency, US Department of the Treasury

Timeline Tags: Complete 911 Timeline

In an interview for Time magazine held on this date, Osama bin Laden is asked whether he was responsible for the August 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). He replies, “If the instigation for jihad against the Jews and the Americans in order to liberate [Islamic shrines in Mecca and Medina] is considered a crime, then let history be a witness that I am a criminal. Our job is to instigate and, by the grace of God, we did that—and certain people responded to this instigation.… I am confident that Muslims will be able to end the legend of the so-called superpower that is America.” He admits knowing certain people accused of being behind the bombing, such as Wadih El-Hage and Mamdouh Mahmud Salim, but denies they had any connection to the bombings. [Time, 1/11/1999; Globe and Mail, 10/5/2001]

Entity Tags: Osama bin Laden, Wadih El-Hage, Mamdouh Mahmud Salim

Timeline Tags: Complete 911 Timeline

During the investigation of the August 7, 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998), FBI counterterrorism expert John O’Neill finds a memo by al-Qaeda leader Mohammed Atef on a computer. The memo shows that bin Laden’s group has a keen interest in and detailed knowledge of negotiations between the Taliban and the US over an oil and gas pipeline through Afghanistan. Atef’s analysis suggests that the Taliban are not sincere in wanting a pipeline, but are dragging out negotiations to keep Western powers at bay. [Salon, 6/5/2002]

Entity Tags: Mohammed Atef, United States, Taliban, John O’Neill, Al-Qaeda

Timeline Tags: Complete 911 Timeline

Richard Barlow, a former intelligence analyst who was repeatedly fired for correctly claiming that Pakistan had a nuclear weapons program (see 1981-1982, August 1987-1988 and August 4, 1989), is awarded a total of $1 million by President Bill Clinton in compensation for the treatment he received. However, Barlow does not receive the money, as the settlement has to be ratified by Congress. When it runs into procedural problems, it is moved to the Court of Federal Claims to be reviewed. After Clinton is replaced by George W. Bush, CIA Director George Tenet and NSA Director Michael Hayden assert the government’s “state secrets privilege” (see March 9, 1953) over Barlow’s entire legal claim, causing it to collapse due to lack of evidence. [Guardian, 10/13/2007]

Entity Tags: William Jefferson (“Bill”) Clinton, Richard Barlow, National Security Agency, Michael Hayden, Court of Federal Claims, Central Intelligence Agency, George J. Tenet

Timeline Tags: A. Q. Khan's Nuclear Network

Hashim Salamat.Hashim Salamat. [Source: BBC]Western intelligence monitors a series of phone calls in which bin Laden asks the leader of a Philippine militant group to set up more training camps that al-Qaeda can use. Bin Laden is said to call Hashim Salamat, the leader of Moro Islamic Liberation Front (MILF). There are reports that al-Qaeda started funding and using MILF training camps in 1995. But apparently bin Laden successfully asks for more camps because the movement of militants into Afghanistan has grown increasingly difficult since the African embassy bombings in 1998 (see 10:35-10:39 a.m., August 7, 1998). [CNS News, 9/19/2002; CNN, 10/28/2002; Asia Times, 10/30/2003] The same month, Salamat claims in a BBC interview that the MILF has received money from bin Laden, but says that it has only been for humanitarian purposes. [New York Times, 2/11/1999; Asia Times, 10/30/2003]

Entity Tags: Osama bin Laden, Hashim Salamat, Moro Islamic Liberation Front

Timeline Tags: Complete 911 Timeline

A 2005 US indictment will reveal that two employees for a pro-Israeli lobbying group had somehow obtained classified US information about al-Qaeda and was passing it on to Israeli officials. The two employees are Steven Rosen and Keith Weissman; both work for AIPAC (American Israel Public Affairs Committee) until 2004. On April 13, 1999, Rosen gives Rafi Barak, the former deputy chief of mission at the Israeli embassy in Washington, what he calls a codeword-protected “extremely sensitive piece of intelligence” about terrorist activities in Central Asia. On June 11, 1999, Weissman tells Barak about a classified FBI report on the 1996 Khobar Towers bombing, which has been blamed on al-Qaeda and/or Iran (see June 25, 1996). In retrospect, FBI officials will determine that some, but not all, of this classified information comes from Larry Franklin, a Defense Department analyst on Iran known to be in favor of a tougher US policy regarding Iran (see 2000-2001). It is not known how or why US surveillance of Rosen and Weissman began. [National Public Radio, 8/4/2005; Eastern District of Virginia, 8/4/2005 pdf file; Jerusalem Post, 8/15/2005; Jerusalem Post, 8/17/2005]
Connection to Earlier Investigation? - However, there may be a connection to an earlier investigation. In 1997 and 1998, the FBI monitored Naor Gilon, an official at the Israeli embassy in Washington, as part of an investigation into whether a US intelligence official was illegally giving US spy plane film and other secret material to the Mossad. [Los Angeles Times, 9/3/2004]
Accusations Spark Further Investigation - The US will later accuse Rosen and Weissman of passing classified information given to them by Franklin to Gilon. In any case, the investigation will continue and grow. National Public Radio will later note that from 1999 to 2004, “Franklin, Rosen, and Weissman had regular discussions about the Middle East and about al-Qaeda with a variety of contacts,” sometimes illegally sharing highly classified information. Franklin will plead guilty to sharing classified information in 2005 (see October 5, 2005) while Rosen and Weissman are expected to be tried in 2007 or thereafter. [National Public Radio, 8/4/2005]

Entity Tags: Rafi Barak, Naor Gilon, Keith Weissman, Larry Franklin, American Israel Public Affairs Committee, Steven Rosen

Timeline Tags: Complete 911 Timeline

A large group of Islamic Jihad operatives are sentenced in Cairo in what becomes known as the “Trial of the Albanian Returnees.” Various disclosures are made at the trial about the way Islamic Jihad operated and how it provided support to al-Qaeda by forging travel documents, transferring money, and arranging communications. One of the revelations is that al-Qaeda has a key communication hub in Yemen. Despite this revelation (see Late 1998-Early 2002), al-Qaeda will continue to use it through 2001 (see Early 2000-Summer 2001). The defendants were arrested not only in Egypt, but also in Albania, Bulgaria, Azerbaijan, and the United Arab Emirates. In 1995, the CIA arranged a deal with Egypt to capture Islamic Jihad operatives around the world and send them to Egypt to be tortured and prosecuted (see Summer 1995). Eighty-seven of the defendants are convicted and ten are sentenced to death, including al-Zawahiri, who is tried in absentia. [New York Times, 11/21/2001] One of the convicted is Khaled Abu el-Dahab, who was operating a sleeper cell in California with double agent Ali Mohamed throughout the 1990’s (see 1987-1998). El-Dahab is sentenced to fifteen years in prison (see September 10, 1998). There are credible reports that many of the defendants confessed after being tortured in Egypt and Albania. [New York Times, 11/21/2001; Wright, 2006, pp. 269] The trial nearly eradicates the remnants of Islamic Jihad in Egypt and, according to some of the defendants, leaves only about forty members outside of Egypt. Al-Zawahiri and the other remaining members end up allying even closer to al-Qaeda. The two organizations will formally merge in early 2001 (see June 2001). [Wright, 2006, pp. 336]

Entity Tags: Ayman al-Zawahiri, Khaled Abu el-Dahab, Islamic Jihad, Egypt, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The FBI is told that three arrested Islamist militants working for Osama bin Laden are about to be released from prison in the UK. But the FBI works quickly and prevents their release. Khalid al-Fawwaz, Ibrahim Eidarous, and Adel Abdel Bary had been arrested in London on September 23, 1998, not long after the US embassy bombings in Africa (see 10:35-10:39 a.m., August 7, 1998). Al-Fawwaz is an al-Qaeda operative while Eidarous and Bary are Islamic Jihad operatives, but all three of them ran the Advice and Reformation Committee (ARC), a bin Laden front in London (see September 23, 1998-July 12, 1999). The three of them had been arrested for a role in the embassy bombings, but in July 1999, a British judge says there is not enough evidence to keep them imprisoned. FBI agents Ali Soufan, Dan Coleman, Jack Cloonan, and US attorneys Patrick Fitzgerald and Ken Karas work quickly and put together a request to have the three men extradited to the US to stand trial there. (The US already had requested al-Fawwaz’s extradition shortly after his arrest in September (see September 23, 1998-July 12, 1999).) As a result, the three men are rearrested on July 12, 1999, apparently without ever being released, and a long battle to extradite them begins. [New York Times, 7/13/1999; Soufan, 2011, pp. 97-104]

Entity Tags: Ibrahim Eidarous, Advice and Reformation Committee, Adel Abdel Bary, Ali Soufan, Federal Bureau of Investigation, Ken Karas, Dan Coleman, Patrick J. Fitzgerald, Khalid al-Fawwaz, Jack Cloonan

Timeline Tags: Complete 911 Timeline

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

From left to right: Mokhtar Haouari, Abdelmajid Dahoumane, Abdel Ghani Meskini. The picture of Meskini is from an ATM camera.From left to right: Mokhtar Haouari, Abdelmajid Dahoumane, Abdel Ghani Meskini. The picture of Meskini is from an ATM camera. [Source: Public domain, public domain, and Seattle Times]In the wake of the arrest of Ahmed Ressam (see December 14, 1999), FBI investigators work frantically to uncover more millennium plots before the end of the year. US authorities also make a number of arrests.
bullet A telephone number found in Ressam’s pocket leads to Abdel Ghani Meskini, an Algerian living in New York City who had gone to Seattle to meet Ressam. Meskini is monitored and arrested in New York on December 30.
bullet One of Ressam’s credit cards leads to the arrest of Mokhtar Haouari, an Algerian living in Montreal, Canada. Meskini later cooperates with US investigators and is never charged, while Haouari will be sentenced to 24 years in prison. [Time, 2/7/2000; CNN, 1/16/2002; Wright, 2006, pp. 298]
bullet Another Algerian associate of Ressam’s, Abdelmajid Dahoumane, escapes to Afghanistan, but will eventually be caught by the Algerian government and convicted in Algeria. [PBS Frontline, 10/25/2001]
bullet Investigators believe that Mohamedou Ould Slahi, an al-Qaeda operative whose cousin is a top al-Qaeda leader, went to Canada to give the go-ahead for Ressam’s attack. Slahi is arrested several times overseas, but never charged (see January-April 2000). [CNN, 3/6/2002]
bullet Khalid Deek, a US citizen, is arrested around this time for masterminding another al-Qaeda millennnium plot (see December 11, 1999). But counterterrorism expert Rita Katz will later say Deek was a suspected mastermind of Ressam’s Los Angeles airport plot, too. [Orange County Register, 9/12/2005] Deek’s name and phone number is found in Ressam’s telephone book. Ressam knew Deek from bin Laden training camps in Afghanistan. Both of them, like most of Ressam’s group, have links to the GIA, an Algerian militant group associated with al-Qaeda. [Newsweek (International), 3/13/2000]
Others escape the US after hearing media reports of Ressam’s arrest. However, enough people are caught to stop additional millennium attacks. Counterterrorism “tsar” Richard Clarke later says, “I think a lot of the FBI leadership for the first time realized that… there probably were al-Qaeda people in the United States. They realized that only after they looked at the results of the investigation of the millennium bombing plot.” [PBS Frontline, 10/3/2002] Yet Clinton’s National Security Adviser Sandy Berger later claims that the FBI will still repeatedly assure the Clinton White House until Clinton leaves office that al-Qaeda lacks the ability to launch a domestic strike (see 2000).

Entity Tags: Mohamedou Ould Slahi, Sandy Berger, Khalil Deek, Mokhtar Haouari, Groupe Islamique Armé, Abdel Ghani Meskini, Al-Qaeda, Federal Bureau of Investigation, Richard A. Clarke, Ahmed Ressam

Timeline Tags: Complete 911 Timeline

The NSA, monitoring a telephone in an al-Qaeda communications hub in Yemen (see Late August 1998 and Late 1998-Early 2002), has listened in on phone calls revealing that hijackers Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi are to attend an important al-Qaeda summit in Malaysia in January 2000 (see Shortly Before December 29, 1999). Almihdhar’s full name was mentioned, as well as the first names of hijackers Nawaf Alhazmi and Salem Alhazmi. On this day, the NSA shares this information with the CIA’s Alec Station bin Laden unit. Other US intelligence agencies, including FBI headquarters and the FBI’s New York field office, are told as well. Although Khalid Almihdhar’s full name was mentioned in one call, the NSA only passes on his first name. Also, the NSA has already learned from monitoring the Yemen hub that Nawaf’s last name is Alhazmi and that he is long-time friends with Almihdhar (see Early 1999). However, they either don’t look this up in their records or don’t pass it on to any other agency. [9/11 Commission, 1/26/2004, pp. 6 pdf file; US Department of Justice, 11/2004, pp. 239 pdf file; Wright, 2006, pp. 310] An NSA analyst makes a comment that is shared between US intelligence agencies, “Salem may be Nawaf’s younger brother.” This turns out to be correct. [US Congress, 7/24/2003, pp. 135 pdf file; 9/11 Commission, 1/26/2004, pp. 6 pdf file] A CIA officer will later tell the 9/11 Congressional Inquiry that information from the Africa embassy bombings (see 10:35-10:39 a.m., August 7, 1998) was reviewed in late 1999 during a worldwide effort to disrupt millennium attack plots (see December 15-31, 1999) and “a kind of tuning fork… buzzed when two [of the hijackers] reportedly planning a trip to [Malaysia] were linked indirectly to what appeared to be a support element… involved with the Africa bombers.” [US Congress, 7/24/2003, pp. 135 pdf file] The fact that they are connected to the Yemen communication hub already indicates some importance within al-Qaeda. It is learned they are connected to the embassy bombings in some way (see October 4, 2001 and Late 1999). [US Congress, 7/24/2003, pp. 135 pdf file; 9/11 Commission, 1/26/2004, pp. 6 pdf file] The NSA report about them on this day is entitled, “Activities of Bin Laden Associates,” showing the clear knowledge of their ties to bin Laden. [9/11 Commission, 7/24/2004, pp. 502; Vanity Fair, 11/2004] The CIA will track Almihdhar and Nawaf Alhazmi to the Malaysia summit (see January 2-5, 2000 and January 5-8, 2000).

Entity Tags: Salem Alhazmi, Federal Bureau of Investigation, FBI New York Field Office, Khalid Almihdhar, FBI Headquarters, Al-Qaeda, Alec Station, Central Intelligence Agency, Ahmed al-Hada, National Security Agency, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A screenshot of Site Profiler.A screenshot of Site Profiler. [Source: Digital Sandbox, Inc.]A software system commissioned by the Department of Defense determines that the Pentagon is vulnerable to a terrorist attack. The software, called Site Profiler, is being developed by Digital Sandbox, a company based in Reston, Virginia. [Guardian, 3/20/2003; Devlin, 2008, pp. 150; Pourret, Naim, and Marcot, 2008, pp. 253] Work on it began in response to the bombings of the Khobar Towers in Saudi Arabia in June 1996 (see June 25, 1996), and the US embassies in Kenya and Tanzania in August 1998 (see 10:35-10:39 a.m., August 7, 1998). [Digital Sandbox, Inc., 2000 pdf file; Jha and Keele, 2012, pp. 40 pdf file] Site Profiler is designed to provide site commanders with tools to assess terrorism risks, so they can develop appropriate countermeasures. It works by combining different data sources so as to draw inferences about the risk of terrorism. At some unspecified time in 2000, its developers hold sessions for expert review of the software. In these sessions, various experts suggest hypothetical threat scenarios. These scenarios are analyzed and the results are then presented to the experts. Due to time constraints, the initial evaluation focuses on scenarios the experts consider exceptional. One scenario that is evaluated involves a terrorist attack on the Pentagon using a mortar shot from the Potomac River. This scenario, the software’s developers will later write, is “intended to represent an exceptional case to stretch the limits of the model, rather than as a realistic scenario that might reasonably be expected to occur.” All the same, the results of the evaluation indicate “that the Pentagon [is] vulnerable to terrorist attack.” “In other words,” popular science writer Keith Devlin will comment, “the Pentagon was a prime terrorist target.” Devlin will write: “As we learned to our horror just a few months later, the Pentagon was one of the sites hit in the September 11 attack on the United States. Unfortunately, though understandably, neither the military command nor the US government had taken seriously Site Profiler’s prediction that the Pentagon was in danger from a terrorist attack.” Site Profiler will be delivered to all US military installations around the world in May 2001. [Devlin, 2008, pp. 150-151; Pourret, Naim, and Marcot, 2008, pp. 253]

Entity Tags: Pentagon, Digital Sandbox, Inc.

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Attendees of the Malaysian summit. Top row, from left: Nawaf Alhazmi, Khalid Almihdhar, Khalid Shaikh Mohammed. Middle row, from left: Khallad bin Attash, Abd al-Rahim al-Nashiri, Hambali. Bottom row, from left: Yazid Sufaat, Ramzi bin al-Shibh, Abu Bara al-Taizi. Attendees of the Malaysian summit. Top row, from left: Nawaf Alhazmi, Khalid Almihdhar, Khalid Shaikh Mohammed. Middle row, from left: Khallad bin Attash, Abd al-Rahim al-Nashiri, Hambali. Bottom row, from left: Yazid Sufaat, Ramzi bin al-Shibh, Abu Bara al-Taizi. [Source: FBI]About a dozen of Osama bin Laden’s trusted followers hold a secret, “top-level al-Qaeda summit” in the city of Kuala Lumpur, Malaysia. [CNN, 8/30/2002; San Diego Union-Tribune, 9/27/2002] According to an unnamed senior CIA official, before the summit started, the CIA learned that “11 young guys” were going to attend, and “young guys” is slang for operatives traveling. [Bamford, 2008, pp. 18] Plans for the October 2000 bombing of the USS Cole (see October 12, 2000) and the 9/11 attacks are discussed. [USA Today, 2/12/2002; CNN, 8/30/2002] At the request of the CIA, the Malaysian Secret Service monitors the summit and then passes the information on to the US (see January 5-8, 2000 and Shortly After). Attendees of the summit are said to include:
Nawaf Alhazmi and Khalid Almihdhar - The CIA and FBI will later miss many opportunities to foil the 9/11 plot through Alhazmi and Almihdhar and the knowledge of their presence at this summit. The CIA already knows many details about these two by the time the summit begins (see January 2-4, 2000), and tracked Almihdhar as he traveled to it (see January 2-5, 2000).
Yazid Sufaat - Sufaat is a Malaysian who owns the condominium where the summit is held. He is also a trained biologist and is said to be a leading figure in al-Qaeda’s attempts to get a biological or chemical weapon. [New York Times, 1/31/2002; Newsweek, 6/2/2002] Malaysian officials also recognize Sufaat from summit surveillance photos, as he is a long-time Malaysian resident (see Shortly After January 8, 2000). [New Straits Times, 2/10/2002] A possibility to expose the 9/11 plot through Sufaat’s presence at this summit will later be missed in September 2000 (see September-October 2000). Sufaat will travel to Afghanistan in June 2001 and be arrested by Malaysian authorities when he returns to Malaysia in late 2001 (see December 19, 2001). [Australian, 12/24/2002] He will be released in 2008 (see December 4, 2008).
Hambali - An Indonesian militant known as Hambali, or Nurjaman Riduan Isamuddin [BBC, 8/15/2003] , was heavily involved in the Bojinka plot, an early version of the 9/11 plot (see January 6, 1995 and June 1994). [CNN, 3/14/2002; CNN, 8/30/2002] The FBI was aware of who he was and his connections to the Bojinka plot at least by 1999 and identified a photograph of him by that time (see May 23, 1999). He will be arrested by Thai authorities in August 2003 (see August 12, 2003). [CNN, 8/14/2003; CBS News, 8/15/2003] Malaysian officials recognize Hambali from summit surveillance photos, as he is a long-time Malaysian resident. But the US does not tell them of his Bojinka connections, so they will not know to arrest him after the summit is over (see Shortly After January 8, 2000). [New Straits Times, 2/10/2002]
Khalid Shaikh Mohammed - Mohammed is sometimes referred to as “KSM,” an al-Qaeda leader and the alleged “mastermind” of the 9/11 attacks. The US has known KSM is an Islamic militant since the exposure of Operation Bojinka in January 1995 (see January 6, 1995), and knows what he looks like. US officials will state that they only realized the summit was important in 2001, but the presence of KSM should have proved its importance. [Los Angeles Times, 2/2/2002] Although the possible presence of KSM at this summit will be disputed by US officials, one counterterrorism expert will testify before the 9/11 Commission in 2003 that he has access to transcripts of KSM’s interrogations since his capture, and that KSM has admitted leading this summit and telling the attendees about a planes-as-weapons plot targeting the US (see July 9, 2003). [Newsweek, 7/9/2003; New York Post, 7/10/2003] Many other media reports will identify him as being there. [Independent, 6/6/2002; CNN, 8/30/2002; CNN, 11/7/2002; Canadian Broadcasting Corporation, 10/29/2003] For instance, according to Newsweek: “Mohammed’s presence would make the intelligence failure of the CIA even greater. It would mean the agency literally watched as the 9/11 scheme was hatched—and had photographs of the attack’s mastermind… doing the plotting.” [Newsweek, 7/9/2003] In Hambali’s 2008 Guantanamo file, it will be mentioned that KSM stays a week at Sufaat’s condominium with Alhazmi and Almihdhar, which would seem to make clear that KSM is there for the entire duration of the summit (see Early January 2000). [US Department of Defense, 10/30/2008]
Khallad bin Attash - Khallad bin Attash, a “trusted member of bin Laden’s inner circle,” is in charge of bin Laden’s bodyguards, and serves as bin Laden’s personal intermediary at least for the USS Cole bombing. [Newsweek, 9/20/2001 pdf file] He is also thought to be a “mastermind” of that attack. Attash is reportedly planning to be one of the 9/11 hijackers, but will be unable to get a US visa. [9/11 Commission, 6/16/2004, pp. 8] US intelligence had been aware of his identity as early as 1995. [US Congress, 9/18/2002] A possibility to expose the 9/11 plot through bin Attash’s presence at this summit will be missed in January 2001 (see January 4, 2001). Bin Attash had been previously arrested in Yemen for suspected terror ties, but was let go (see Summer 1999). [Contemporary Southeast Asia, 12/1/2002] He will be captured in Pakistan by the US in April 2003 (see April 29, 2003). In 2008, Newsweek will report that bin Attash confessed during interrogation that, while staying at Sufaat’s condominium, he and Alhazmi talked “about the possibility of hijacking planes and crashing them or holding passengers as hostages.” [Newsweek, 12/16/2008]
Abd al-Rahim al-Nashiri - Al-Nashiri is one of al-Qaeda’s top field commanders and operates out of Malaysia while 9/11 is being prepared. [Los Angeles Times, 10/10/2001; Gunaratna, 2003, pp. 188; Graham and Nussbaum, 2004, pp. 59] He was involved in an arms smuggling plot (see 1997) and the East African embassy bombings (see August 22-25 1998), in which his cousin was martyred (see 10:35-10:39 a.m., August 7, 1998). He also organized the attack against the USS The Sullivans (see January 3, 2000), and will be involved in the attacks against the USS Cole (see October 12, 2000) and the Limburg (see October 6, 2002). He will be arrested in the United Arab Emirates in November 2002 (see Early October 2002). An al-Qaeda operative identified a photo of al-Nashiri for the FBI in late 1998 (see August 22-25 1998). [9/11 Commission, 7/24/2004, pp. 152-3] (Note: in the sources, al-Nashiri is referred to by two of his aliases: Muhammad Omar al-Harazi and Al Safani.) [CNN, 12/11/2000; Central Intelligence Agency, 9/6/2006]
Ramzi bin al-Shibh - Investigators believe he wants to be the 20th 9/11 hijacker. His presence at the summit may not be realized until after 9/11, despite the fact that US intelligence has a picture of him next to bin Attash, and has video footage of him. [Newsweek, 11/26/2001; Washington Post, 7/14/2002; Time, 9/15/2002; Die Zeit (Hamburg), 10/1/2002; CNN, 11/7/2002] German police will have credit card receipts indicating bin al-Shibh is in Malaysia at this time. [Los Angeles Times, 9/1/2002] Ulrich Kersten, director of Germany’s federal anticrime agency, the Bundeskriminalamt, will later say, “There are indications that Ramzi bin al-Shibh was in Kuala Lumpur for the meeting.” [New York Times, 8/24/2002] Another account noting he was photographed at the summit will further note that he enters and leaves Thailand three times in the first three weeks of January 2000. [Los Angeles Times, 10/17/2001] Anonymous Malaysian officials will later claim he is at the summit, but US officials will deny it. Two local militants who serve as drivers for the attendees will later be arrested in Malaysia. They will be shown photos of the attendees, and confirm that bin al-Shibh was at the summit. [Associated Press, 9/20/2002] One account will say he is recognized at the time of the summit, which makes it hard to understand why he is not tracked back to Germany and the Hamburg cell with Mohamed Atta and other 9/11 hijackers. [Der Spiegel (Hamburg), 10/1/2002] Another opportunity to expose the 9/11 plot through bin al-Shibh’s presence at this summit will be missed in June. It appears bin al-Shibh and Almihdhar are directly involved in the attack on the USS Cole in October 2000 (see October 10-21, 2000). [Guardian, 10/15/2001; Washington Post, 7/14/2002; Newsweek, 9/4/2002]
Salem Alhazmi - Alhazmi, a 9/11 hijacker and brother of Nawaf Alhazmi, is possibly at the summit, although very few accounts will mention it. [Australian, 12/24/2002] US intelligence intercepts from before the summit indicate that he at least had plans to attend. [US Congress, 7/24/2003, pp. 51 pdf file]
Abu Bara al-Taizi (a.k.a. Zohair Mohammed Said) - A Yemeni al-Qaeda operative, al-Taizi is reportedly meant to be one of the 9/11 hijackers, but will be unable to enter the US due to greater scrutiny for Yemenis. [9/11 Commission, 6/16/2004, pp. 8] Al-Taizi will be captured in Pakistan in February 2002, and then sent to the US prison in Guantanamo a few months later (see February 7, 2002). According to his 2008 Guantanamo file, he traveled from Afghanistan to Malaysia with bin Attash about two weeks before the summit. Bin Attash was missing a leg, and he had a prosthetic leg fitted and then stayed in the hospital to recover from the surgery. Bin Attash and al-Taizi stay at Sufaat’s house for the duration of the summit. Al-Taizi then flies to Yemen to visit his family there. [US Department of Defense, 10/25/2008]
Others - Unnamed members of the Egyptian-based Islamic Jihad are also said to be at the summit. [Cox News Service, 10/21/2001] Islamic Jihad merged with al-Qaeda in February 1998. [ABC News, 11/17/2001] However, according to the Wall Street Journal, bin Attash and Fahad al-Quso are suspected of being Islamic Jihad members at one point, so this may just be a reference to them. [Wall Street Journal, 10/8/2001] Note that there are a total of 10 names mentioned above, and it will be reported that the CIA learned that 11 operatives were to attend, so either not all of them make it, or some names of attendees will remain unknown.
Summit Associates - The following individuals are probably not at the summit meetings, but are in the region and assisting or linked with the attendees at this time:
Fahad Al-Quso - Al-Quso is a top al-Qaeda operative who is involved in the bombing of the USS Cole. Some sources will indicate al-Quso is present in Malaysia, and a person who looks like him will later be seen in a photograph of the meeting (see June 11, 2001). [Newsweek, 9/20/2001 pdf file] However, other sources will say al-Quso did not reach Kuala Lumpur, but met with bin Attash around this time in Bangkok, Thailand (see January 5-6, 2000 and January 8-15, 2000). [9/11 Commission, 7/24/2004, pp. 159; Wright, 2006, pp. 330] Although al-Quso apparently is not at the summit, there are a series of phone calls during the time of the summit between his hotel in Bangkok, a phone booth near the condominium where the summit is held, and his family home in Yemen (see (January 5-8, 2000)). Al-Quso will be arrested by Yemeni authorities in the fall of 2000 (see Late October-Late November 2000), but the FBI will not be given a chance to fully interrogate him before 9/11. He will escape from prison in 2003. [CNN, 5/15/2003]
Ahmad Sajuli Abdul Rahman - An operative of Jemaah Islamiyah, al-Qaeda’s Southeast Asian affiliate, Sajuli takes the visiting Arabs around Kuala Lumpur, but apparently does not attend the summit meetings. [US Congress, 10/17/2002] According to the later Guantanamo file of summit attendee al-Taizi, one of the attendees Sajuli escorts around town is future 9/11 hijacker Khalid Almihdhar. Sajuli also helps arrange al-Taizi’s transportation at the end of the summit. [US Department of Defense, 10/25/2008] Sajuli will be arrested in Malaysia in December 2001 (see December 29, 2001).
Ahmad Hikmat Shakir - A suspected al-Qaeda agent of Iraqi nationality, Shakir is a greeter at Kuala Lumpur airport. He meets Almihdhar there and travels with him to the apartment where the summit is held, but he probably does not attend the summit meetings. [Associated Press, 10/2/2002; Newsweek, 10/7/2002; Australian, 12/24/2002; Knight Ridder, 6/12/2004] After 9/11, he will be linked to the 1993 World Trade Center bombing and the 1995 Bojinka plot. Jordan will arrest him and let him go after the US says it doesn’t want to take custody of him (see September 17, 2001).
Dhiren Barot - Dhiren Barot (a.k.a. Abu Eissa al-Hindi) is a British citizen of Indian descent. According to a 2006 Observer article, Barot “is not believed to have been present” at the summit meetings. However, he does go to Kuala Lumpur during the time of the summit with summit attendee bin Attash. And shortly after the summit, Barot holds meetings with Hambali. It will later be reported that Barot is sent by KSM to New York City in early 2001 to case potential targets there, although whether this is part of the 9/11 plot or some other plot is unclear (see May 30, 2001). Barot will be arrested in 2004 in Britain for plotting attacks there, and sentenced to 30 years in prison (see August 3, 2004). [Observer, 12/12/2006]
Another Unnamed Local Militant - Malaysian officials will say that two local Jemaah Islamiyah act as drivers for the attendees. These drivers apparently have no idea who the attendees are or what they are doing; they are just tasked to drive them around. In a 2002 Associated Press article, officials will not name these drivers, but will say that they are among the dozens of alleged Jemaah Islamiyah militants arrested in December 2001 and January 2002. Since Sajuli mentioned above is arrested at that time, he presumably is one of these drivers. It is not known who the other driver is. (Sufaat will be arrested at that time as well, but the Associated Press article will make clear Sufaat is not one of the drivers.) [Associated Press, 9/20/2002]
Probably Not Involved: Mohamed al-Khatani - A Saudi, he allegedly will confess to attending the summit while being held in the US Guantanamo prison (see July 2002). He apparently will unsuccessfully attempt to enter the US in August 2001 to join the 9/11 plot (see August 4, 2001). However, al-Khatani will later recant his testimony and say he lied to avoid torture (see October 26, 2006). Furthermore, his 2008 Guantanamo file, leaked to the public in 2011, contains no hint of him even possibly attending the summit. The contents of the file must be treated with extreme caution, especially since he is repeatedly and brutally tortured (see August 8, 2002-January 15, 2003 and January 14, 2009). But according to the general narrative of the file, al-Khatani had no involvement with Islamist militancy in early 2000, only starts to get involved with militants in mid-2000, and first attends a militant training camp in Afghanistan in late 2000. [US Department of Defense, 10/30/2008]

Entity Tags: Hambali, Abu Bara al-Taizi, Dhiren Barot, Central Intelligence Agency, Ahmad Hikmat Shakir, Ahmad Sajuli Abdul Rahman, Al-Qaeda, Abd al-Rahim al-Nashiri, Islamic Jihad, Jemaah Islamiyah, Fahad al-Quso, Khalid Shaikh Mohammed, Ulrich Kersten, Yazid Sufaat, Khalid Almihdhar, Ramzi bin al-Shibh, Salem Alhazmi, Mohamed al-Khatani, Malaysian Secret Service, Khallad bin Attash, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Victims’ family members Lorie Van Auken (right) and Kristen Breitweiser (left) are shocked to learn Tom Wilshire blocked a cable to the FBI about Khalid Almihdhar’s visa. Victims’ family members Lorie Van Auken (right) and Kristen Breitweiser (left) are shocked to learn Tom Wilshire blocked a cable to the FBI about Khalid Almihdhar’s visa. [Source: Banded Artists]Doug Miller, an FBI agent assigned to Alec Station, the CIA’s bin Laden unit, reads CIA cables reporting that 9/11 hijacker Khalid Almihdhar has a US visa and drafts a cable to the FBI to inform it of this. The CIA obtained the information through a tap on Almihdhar’s phone in Yemen (see December 29, 1999) and by monitoring him as he passed through Dubai (see January 2-5, 2000) on his way to an al-Qaeda summit in Malaysia (see January 5-8, 2000).
Draft Cable - Miller writes that Almihdhar has a US visa (see April 3-7, 1999) and that the visa application states his destination is New York and he intends to stay for three months. The draft cable mentions the tap on Almihdhar’s phone, his planned travel to Malaysia, and the links between his phone and the 1998 East African embassy bombings (see 10:35-10:39 a.m., August 7, 1998 and October 4, 2001). It also says that the CIA has obtained photographs of Almihdhar and these will be sent separately. Miller asks the FBI for feedback resulting from an FBI investigation.
Blocked - Another CIA officer named Michael Anne Casey accesses Miller’s draft about an hour after he writes it. The cable is then blocked on the orders of the station’s deputy chief, Tom Wilshire, as a few hours after Miller drafts the cable Casey attaches a message to it saying, “pls hold off on [cable] for now per [Tom Wilshire].” [9/11 Commission, 7/24/2004, pp. 502; US Department of Justice, 11/2004, pp. 240 pdf file] Miller is also told, “This is not a matter for the FBI.” [Wright, 2006, pp. 311]
'No Reason to Kill the Message' - Author James Bamford will later comment: “A potential terrorist and member of al-Qaeda was heading for the US, the FBI’s jurisdiction—its turf—and he [Miller] was putting the FBI on notice so it could take action. There was no reason to kill the message.” [Bamford, 2008, pp. 19] Miller will later say he has no “rational answer” as to why the cable was blocked, but will speculate that Alec Station officers were annoyed he had encroached on their territory. [Congressional Quarterly, 10/1/2008] Casey drafts a cable falsely saying that the information about Almihdhar’s visa has been shared with the FBI (see Around 7:00 p.m. January 5, 2000) and there will be a discussion the next day about whether the cable should be sent (see January 6, 2000). The Justice Department’s Office of Inspector General will later call the failure to pass the information to the FBI a “significant failure” but will be unable to determine why the information was not passed on. [US Department of Justice, 11/2004, pp. 250 pdf file] The 9/11 Commission will know of the incident, but will relegate it to an endnote in its final report, omitting Wilshire’s role entirely. [9/11 Commission, 7/24/2004, pp. 502] The CIA inspector general will falsely claim that the cable is not sent, “[a]pparently because it was in the wrong format or needed editing.” [Central Intelligence Agency, 6/2005, pp. xv pdf file]

Entity Tags: Michael Anne Casey, Federal Bureau of Investigation, Khalid Almihdhar, Doug Miller, 9/11 Commission, Alec Station, Tom Wilshire, Central Intelligence Agency, Office of the Inspector General (CIA)

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

While the 9/11 hijackers are in the US, the NSA intercepts several calls between them and an al-Qaeda communications hub in Sana’a, Yemen, run by Ahmed al-Hada, who is hijacker Khalid Almihdhar’s father-in-law (see August 4-25, 1998).
Summary of Calls -
bullet The first calls are made by Almihdhar and are intercepted during the spring and summer of 2000 (see Spring-Summer 2000).
bullet More calls are made by hijacker Nawaf Alhazmi after the bombing of the USS Cole in October 2000 (see Mid-October 2000-Summer 2001).
bullet The final call from the US is intercepted just a few weeks before 9/11 (see (August 2001)).
The NSA intercepted the hijackers’ calls outside the US before this (see Early 1999 and December 29, 1999) and continues to do so in 2000 (see Summer 2000) after Almihdhar returns to Yemen (see June 10, 2000 and (Mid-June-Mid-July 2000)).
Calls' Content - Some of the calls may only contain non-operational information, as they are reportedly between Almihdhar and his wife. [9/11 Commission, 7/24/2004, pp. 222; Suskind, 2006, pp. 94; Wright, 2006, pp. 343] However, the calls are also used to relay messages to the 9/11 hijackers. [Embassy of Yemen (Washington), 2/13/2002; MSNBC, 2/14/2002; MSNBC, 5/2005]
Agencies' Roles - The CIA is the lead agency monitoring the communications hub. It has planted bugs inside it and is wiretapping all calls (see Late August 1998). Intercepts of calls to and from the hub are a major plank of the US intelligence community’s effort to fight al-Qaeda. Also involved is the FBI, which is using phone records to plot these calls on a map (see Late 1998-Early 2002). Some of the calls intercepted by US intelligence come from Osama bin Laden’s satellite phone in Afghanistan (see August 4-25, 1998 and Late August 1998). After 9/11, counterterrorism officials will say that the number was one of the hottest targets being monitored by the NSA and was an “intelligence bonanza.” [Los Angeles Times, 12/21/2005; Wright, 2006, pp. 343]
Importance of Failure - Also after 9/11, counterterrorism officials will agree that the failure to follow leads to the US from this number was a huge missed opportunity to stop the 9/11 plot. For instance, FBI agent Kenneth Maxwell will say: “Two al-Qaeda guys living in California—are you kidding me? We would have been on them like white on snow: physical surveillance, electronic surveillance, a special unit devoted entirely to them.” [MSNBC, 7/21/2004; New Yorker, 7/10/2006 pdf file]
Discussed after 9/11 - The failure to roll up the plot based on these communications intercepts will be discussed following 9/11 (see Summer 2002-Summer 2004 and March 15, 2004 and After).

Entity Tags: Federal Bureau of Investigation, Central Intelligence Agency, Khalid Almihdhar, Nawaf Alhazmi, National Security Agency, Hoda al-Hada, Ahmed al-Hada, Kenneth Maxwell

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Judy Palya Loether.Judy Palya Loether. [Source: SecrecyFilm (.com)]Judy Palya Loether, the daughter of a civilian engineer killed in a 1948 plane crash while on a secret government mission (see October 6, 1948), reads over the voluminous reports of the accident that claimed her father’s life. The reports, now declassified (see January 1996), had been at the heart of a landmark lawsuit that gave judicial recognition to the government’s “state secrets” privilege (see March 9, 1953). Loether is shocked to find that the reports contain nothing that could be construed as military or tactical secrets of any kind, though for decades the government has insisted that they could not be revealed, even to a judge (see October 18, 1948, July 26, 1950, August 7-8, 1950, September 21, 1950, and October 19, 1951). What they do contain is a compendium of witness statements and expert findings that indicate a number of mistakes and errors led to the crash. Loether begins contacting the families of the widows who had filed the original lawsuit against the government (seeJune 21, 1949) to share her findings. [Siegel, 2008, pp. 210-211] Loether is confused and angered over the contents of the reports, and the government’s response to the lawsuit. She cannot understand why the government pressed so hard to keep the reports classified, knowing that they contained no sensitive information about the secret missile program, and is particularly troubled by the fact that at least two senior government officials signed affidavits affirming the reports’ inclusion of such information while knowing that the reports contained nothing of the sort. She wonders if government officials had perhaps decided to lie about the reports in order to establish some sort of state secrets privilege. In September 2002, lawyers Wilson Brown and Jeff Almeida, retained by Loether and others who lost family members in the crash, come to the same conclusion. As Almeida will say to Brown: “I’ve read this report. There’s nothing in there.” [Siegel, 2008, pp. 219] As time goes on, Loether and her colleagues files a second lawsuit seeking to overturn the first Supreme Court verdict (see February 26, 2003).

Entity Tags: Wilson Brown, Jeff Almeida, Judy Palya Loether

Timeline Tags: Civil Liberties

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

The US routinely denies that its satellite surveillance program, Echelon, provides any information to corporations, noting that the law clearly prevents such transactions. But former CIA director James Woolsey confirms that the US does indeed conduct economic espionage against its European allies, though he does not specifically mention Echelon. Woolsey, a well-known neoconservative, justifies such actions by accusing European companies of using bribery to gain unfair advantages against US corporations. “We have spied on you because you bribe,” he writes in the Wall Street Journal. “[European] products are often more costly, less technically advanced or both, than [their] American competitors’. As a result [they] bribe a lot.” [BBC, 7/6/2000]

Entity Tags: Echelon, Wall Street Journal, James Woolsey

Timeline Tags: Civil Liberties

The front of the Manchester manual, deceptively covered with flowers.The front of the Manchester manual, deceptively covered with flowers. [Source: FBI]Al-Qaeda leader Anas al-Liby is arrested in Manchester, England, and then let go. According to Ali Soufan, an FBI agent from 1997 to 2005, the I-49 squad, a mix of FBI agents and US attorneys, uncovers evidence that al-Liby is living in Manchester. FBI agent John O’Neill assembles a team, including Soufan, to go there. Soufan will later say that they are met by local police, and he tells them: “Anas al-Liby is a senior al-Qaeda operative. He’s a computer expert and was part of the team that did surveillance on the embassy in Nairobi [that resulted in the 1998 bombing there (see 10:35-10:39 a.m., August 7, 1998)]. This is potentially a big win for us.” Al-Liby is caught in his residence and taken to a local police station. However, he denies any involvement in terrorism. According to Soufan, al-Liby is smart and careful, and no incriminating documents or computer files can be quickly found in his residence. O’Neill wants him held until his possessions can be searched more thoroughly, but he is immediately released. Al-Liby evades a team sent to follow him, and skips the country. Not long afterwards, Soufan, who speaks Arabic, discovers a terrorist training manual written in Arabic in al-Liby’s possessions (see May 2000). In a book he writes that is published in 2011, Soufan curiously will not mention the timing of this arrest, even though timing is given to most other events discussed in the book. But the arrest is placed between events that occur in late 1999 and early 2000. [Soufan, 2011, pp. 113-114] In April 2001, the New York Times will first report on the manual, and will mention that it was discovered in a raid in Manchester in May 2000. [New York Times, 4/5/2001] Shortly after 9/11, it will be revealed that the raid was of al-Liby’s residence. [Associated Press, 9/21/2001; Observer, 9/22/2001] In 2002, it will be reported that al-Liby was not at home during the raid, and then escaped the country. Furthermore, al-Liby has been living openly in Britain since 1995, apparently as part of a political deal after he had taken part in a plot with the British intelligence agency MI6 to assassinate Libyan leader Colonel Mu’ammar al-Qadhafi in 1996 (see Late 1995-May 2000 and 1996). [Observer, 11/10/2002] The embarrassing fact that al-Liby is actually arrested and then released will not be revealed until September 2011, in Soufan’s book. [Soufan, 2011, pp. 113-114] The US will later post a $25 million reward for al-Liby, and his death or arrest will never be confirmed. [Federal Bureau of Investigation, 2002]

Entity Tags: Federal Bureau of Investigation, John O’Neill, Anas al-Liby, I-49, United Kingdom, Ali Soufan

Timeline Tags: Complete 911 Timeline

The FBI extracts a full confession from L’Houssaine Kherchtou, also known as “Joe the Moroccan,” a member of the cell that bombed the US embassy in Nairobi, Kenya (see Late 1993-Late 1994 and 10:35-10:39 a.m., August 7, 1998). However, in contrast with methods used on al-Qaeda operatives after 9/11, he is not tortured and the FBI is at pains to treat him well.
Relaxing Surroundings, Respectful Treatment - FBI agent Jack Cloonan will later say of the initial interrogation, which took place in Morocco, “The setting was beautiful, it was this grand house with stables out back, gazelles bouncing in the background, palm trees, three-course meals.” Kherchtou had a relationship with the British intelligence service MI6 (see Mid-Summer 1998 and Shortly After August 7, 1998), but had broken off contact with it and has to be lured to Morocco, where his debriefing is headed by Patrick Fitzgerald. Cloonan will later describe the questioning: “We advised [Kherchtou] of his rights. We told him he could have a lawyer anytime, and that he could pray at any time he wanted. We were letting the Moroccans sit in on this, and they were dumbfounded.… The Moroccans said he’d never talk. He never shut up for 10 days.” Fitzgerald denies Kherchtou a plea bargaining agreement, and says he must plead guilty to conspiracy to murder, for which he may receive a life sentence, though Fitzgerald promises to ask the judge for leniency. However, Cloonan will later say, “His wife needed money for medical treatment in Khartoum, and al-Qaeda had failed to provide it.” It is Cloonan’s “in” with Kherchtou, who is also sure that the US will not torture him. When Kherchtou wavers, Cloonan steps in. As he recalls: “I said, ‘Joe, you understand English, so I’d like you to go out and pray on this with your two Moroccan brothers.’ I thought Fitzy was going to give birth. Joe went out and prayed and came back and said yes.” He provides the FBI with details of the plot and becoming a star witness at the trial (see September 2000). [American Prospect, 6/19/2005; Vanity Fair, 12/16/2008]
Invaluable Information - Kherchtou’s information, provided at a time when the US knows comparatively little about al-Qaeda, is, in Cloonan’s assessment, invaluable. “He told us about a lot of things,” Cloonan later says. “We learned how they recruited people, their front organizations, how they used NGOs [non-governmental organizations], false passports, what they thought about kidnapping, how they developed targets, did their surveillance, a day in the life of Osama bin Laden, what weapons they used, what vehicles they drove, who was the principal liaison with the Sudanese government, that there was a relationship between al-Qaeda and Hezbollah, how they did their training exercises, their finances, and their membership.” After the trial, he enters the witness protection program in the US. Four of his onetime associates will receive life sentences as a direct result of his information. [Vanity Fair, 12/16/2008]
FBI Use Kherchtou as Example of Successful Interrogation Tacticss - FBI officials will later compare this outcome favorably to procedures used by other US agencies after 9/11. For example, following the detainee abuse scandals after 9/11, FBI manager Tom Harrington will write that the FBI has “been successful for many years obtaining confessions via non-confrontational interviewing techniques.” Cloonan will later contrast Kherchtou’s treatment with that of al-Qaeda training manager Ibn al-Shaykh al-Libi in December 2001, when the US sent al-Libi to Egypt to be tortured and interrogated, but some of the information he provided there turned out to be false (see December 19, 2001 and January 2002 and After). [American Prospect, 6/19/2005]

Entity Tags: Patrick J. Fitzgerald, Jack Cloonan, Ibn al-Shaykh al-Libi, Federal Bureau of Investigation, Al-Qaeda, Thomas J. Harrington, L’Houssaine Kherchtou

Timeline Tags: Torture of US Captives, Complete 911 Timeline

The King Fahd Mosque in Culver City.The King Fahd Mosque in Culver City. [Source: Damian Dovarganes]Hijackers Khalid Almihdhar and Nawaf Alhazmi travel to Los Angeles with an associate, Mohdar Abdullah, before Almihdhar leaves the US the next day (see June 10, 2000). When they visit the King Fahd Mosque in Culver City, Abdullah is surprised that Alhazmi and Almihdhar already know several people at the mosque. Abdullah will later say, “I was surprised that anybody at the mosque knew them, because as far as I knew Alhazmi and Almihdhar hadn’t visited Los Angeles since they arrived in the US.” They meet one of the hijackers’ Los Angeles acquaintances, known as Khallam, again later that night at their motel. According to the 9/11 Commission, Khallam asks Abdullah to leave the motel room, so he can talk to Alhazmi and Almihdhar in private. However, Abdullah will later dispute this, saying he is not asked leave the room, but that Alhazmi leaves to make an international phone call from a pay phone. The identity of the person he calls is unknown, but it is possible that he talks to Ahmed al-Hada, an al-Qaeda operative whose safe house is monitored by the US and who Alhazmi sometimes calls from the US (see Early 2000-Summer 2001). Khallam will apparently never be found after 9/11. The FBI will consider the possibility that he is Khallad bin Attash, as there are some reports that bin Attash is in the US at this time and met the mosque’s imam, Fahad al Thumairy. However, this theory will never be confirmed. [Los Angeles Times, 7/24/2004; 9/11 Commission, 7/24/2004, pp. 216, 514] The next day, Alhazmi, Abdullah and an unknown man make a casing video at Los Angeles Airport (see June 10, 2000). It is possible that the third man is Khallam.

Entity Tags: Mohdar Abdullah, Nawaf Alhazmi, Khallam, Khalid Almihdhar, 9/11 Commission, Fahad al Thumairy, Khallad bin Attash, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Khalid Almihdhar.Khalid Almihdhar. [Source: FBI]9/11 hijacker Khalid Almihdhar flies from San Diego to Frankfurt, Germany. [US Congress, 9/20/2002] He is accompanied to the airport by another hijacker, Nawaf Alhazmi, and an unnamed associate (see June 10, 2000). Authorities later believe that Almihdhar visits his cousin-in-law Ramzi Bin al-Shibh and other al-Qaeda members in bin al-Shibh’s cell. Since the CIA fails to notify Germany about its suspicions of Almihdhar and bin al-Shibh, both of whom were seen attending the al-Qaeda summit in Malaysia in January, German police fail to monitor them and another chance to uncover the 9/11 plot is missed. [Die Zeit (Hamburg), 10/1/2002; US Congress, 7/24/2003, pp. 135 pdf file] FBI Director Mueller and the congressional inquiry into 9/11 will claim that Almihdhar does not return to the US for over a year [US Congress, 9/20/2002; US Congress, 9/26/2002] , although it is possible that Almihdhar does return before then. For instance, there are indications Almihdhar attends a flight school in Arizona in early 2001. [Arizona Republic, 9/28/2001]

Entity Tags: Ramzi bin al-Shibh, Khalid Almihdhar, Central Intelligence Agency, Robert S. Mueller III, 9/11 Congressional Inquiry, Federal Bureau of Investigation, Germany

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

When 9/11 hijacker Khalid Almihdhar leaves the US in June (see June 10, 2000), he flies to Frankfurt, Germany, and then to Oman in the Middle East. [US Congress, 7/24/2003, pp. 135 pdf file] From there he returns to his family’s home in Sana’a, Yemen. [9/11 Commission, 7/24/2004, pp. 237] His wife and children live at an al-Qaeda communications hub that is run by his father in law, Ahmed al-Hada. The hub is being monitored by the NSA and CIA. Phone calls to and from the hub, including ones made by Almihdhar and other hijackers, are intercepted, rooms in the building are bugged, and spy satellites record visitors (see Late August 1998, Late 1998-Early 2002, and Early 2000-Summer 2001). Based on information gained from monitoring this house, the CIA and local intelligence services mounted a major operation against Almihdhar, other hijackers, and several more al-Qaeda operatives in December 1999 and January 2000, when they were followed around the Middle East and South Asia and monitored during an al-Qaeda summit in Malaysia (see December 29, 1999, January 2-5, 2000, and January 5-8, 2000). So presumably US intelligence should have been aware of this visit to the hub and who Almihdhar was, but what exactly was known and who may have known it has not been made public. He will return to the hub in February 2001 and stay an unknown length of time (see February 2001).

Entity Tags: Central Intelligence Agency, Ahmed al-Hada, National Security Agency, Khalid Almihdhar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

After 9/11 hijacker Khalid Almihdhar returns to the Middle East (see June 10, 2000 and (Mid-June-Mid-July 2000)), the NSA continues to intercept his telephone calls to and from an al-Qaeda communications hub in Sana’a, Yemen, where his wife and children live. US intelligence understands that this is one of the most important al-Qaeda hot spots, and has been closely monitoring it since at least late 1998 (see August 4-25, 1998 and Late 1998-Early 2002). It also intercepts calls between hijacker Salem Alhazmi and the hub, as well as conversations between his brother, hijacker Nawaf Alhazmi, in the US and the hub (see Mid-October 2000-Summer 2001). [US Congress, 7/24/2003, pp. 157 pdf file; 9/11 Commission, 7/24/2004, pp. 222; Wright, 2006, pp. 343] The NSA had previously intercepted calls made by the hijackers to and from the communications hub, both when they were in the US and outside it (see Early 2000-Summer 2001).

Entity Tags: Salem Alhazmi, Khalid Almihdhar, Nawaf Alhazmi, National Security Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

John Yoo, an associate law professor at the University of California at Berkeley, makes a presentation at a Cato Institute seminar on executive power. Yoo, who will go on to become one of the Bush administration’s primary advocates of unchecked executive power (see March 1996), accuses the Clinton administration of upending the Constitution to give the executive branch unwarranted authority (see March 24 - Mid-June, 1999). “[T]he Clinton administration has undermined the balance of powers that exist in foreign affairs, and [they] have undermined principles of democratic accountability that executive branches have agreed upon well to the Nixon administration,” he says. Regarding the Clinton administration’s stretched interpretation of the Anti-Ballistic Missile Treaty (see June 2000), Yoo says that the Clinton “legal arguments are so outrageous, they’re so incredible, that they actually show, I think, a disrespect for the idea of law, by showing how utterly manipulatible it is.” [Savage, 2007, pp. 67]

Entity Tags: Bush administration (43), John C. Yoo, Nixon administration, Clinton administration

Timeline Tags: Civil Liberties

9/11 hijacker associate Ramzi bin al-Shibh spends four weeks in Yemen. The exact timing of his visit is unknown, except that he arrives in August 2000 and leaves in September. [Australian, 12/24/2002; US Department of Defense, 12/8/2006]
Planning Cole Bombing? - While in Yemen, it seems probable bin al-Shibh is involved in preparations for the USS Cole bombing. There are reports that he takes part in the bombing, and he flies back to Yemen to be there in time for the bombing in early October (see October 10-21, 2000).
Does He Visit Monitored Yemen Hub? - While there, it is also possible that he visits the highly monitored al-Qaeda Yemen communications hub, which is in Sana’a. It will not be confirmed or denied that he visits the hub at this time. However, bin al-Shibh is Yemeni, and he is a cousin of future 9/11 hijacker Khalid Almihdhar’s wife, and she lives at the house where the hub is located. [Washington Post, 6/12/2002; Washington Post, 9/11/2002] (Note that he also has other family in Sana’a, as this is where he grew up, so it seems probable he would spend at least some of his visit in Sana’a.) [McDermott, 2005, pp. 41] Furthermore, at some point before the Cole bombing, bin al-Shibh meets with al-Qaeda operatives Abd al-Rahim al-Nashiri and Ahmed al-Hada in Yemen. It is not known where the meeting takes place, but al-Hada runs the Yemen hub (and he is also related to bin al-Shibh) (see Before October 12, 2000). Also, al-Qaeda operatives use the hub to “put everything together” for the Cole bombing, and bin al-Shibh is probably involved in preparations for the bombing at this time. The bombers also call the hub as part of their preparations (see Mid-August 1998-October 2000).
Could Bin Al-Shibh Be Tracked? - If bin al-Shibh does visit (or even just call) the Yemen hub at this time, and/or during his later visit right at the time of the Cole bombing, he would be monitored by US intelligence. The US not only listens in on the hub’s phone, but it monitors the house through bugs planted inside and through spy satellites to monitor people leaving and entering it (see Early 2000-Summer 2001). Although it is uncertain, US intelligence may already be aware of bin al-Shibh through his attendance at an al-Qaeda summit in Malaysia in early 2000 (see January 5-8, 2000).

Entity Tags: Ramzi bin al-Shibh, Ahmed al-Hada, Khalid Almihdhar, Abd al-Rahim al-Nashiri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Damage to the USS Cole, shown in dry dock.Damage to the USS Cole, shown in dry dock. [Source: US Navy]9/11 hijacker Khalid Almihdhar is in Yemen when the USS Cole is attacked in Aden harbor there (see October 12, 2000), and is reported to have had a role in the bombing. Almihdhar leaves shortly after the attack, together with al-Qaeda operative Khallad bin Attash. [McDermott, 2005, pp. 209] Bin Attash is quickly identified as one of the masterminds of the operation (see Late October-Late November 2000). Almihdhar will subsequently be accused of participating in the operation by the prime ministers of Yemen and Britain (see Early October 2001 and October 4, 2001). The Yemeni militant group Islamic Army of Aden takes credit for the bombing, and a friend of Almihdhar in San Diego will later say that Almihdhar told him he was a member of that group (see Early 2000). The Cole attack was a repeat of a failed attempt to bomb the USS The Sullivans (see January 3, 2000), of which Almihdhar had foreknowledge (see Late 1999). Almihdhar, who trained with the Cole bombers (see Late 1999) and attended an apparent planning session for the operation (see January 5-8, 2000), may also be involved in a later ship-bombing operation in Singapore (see June 2001). Ramzi bin al-Shibh, a close associate of the hijackers, also leaves Yemen around this time and is also suspected of involvement in the bombing (see October 10-21, 2000).

Entity Tags: Islamic Army of Aden, Khalid Almihdhar, Khallad bin Attash

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Author Lawrence Wright will later write about the FBI’s investigation of the USS Cole bombing in Yemen (see October 12, 2000): “The FBI was convinced that the [Cole] bombers had been tipped off about the arrival of the Cole, and they wanted to expand the investigation to include a member of the president’s own family and a colonel in [the Yemeni equivalent of the FBI]. There was scant interest on the part of the Yemen authorities in pursuing such leads.” Wright will also point out: “Yemen was a particularly difficult place to start a terrorist investigation, as it was filled with active al-Qaeda cells and with sympathizers at very high levels of government. On television, Yemeni politicians called for jihad against America. Just getting permission from the Yemeni government to go to the crime scene—the wounded warship in the Aden harbor—required lengthy negotiations with hostile officials.” Cooperation from the Yemen government is erratic at best. For instance, the Yemenis eventually show the FBI a videotape taken by a harborside security camera, but it appears the moment of the explosion has been edited out. [Wright, 2006, pp. 325; New Yorker, 7/10/2006 pdf file] Later, when the FBI is finally allowed to interview Fahad al-Quso, who the FBI believes is one of the main Cole plotters, a Yemeni colonel enters the room and kisses Quso on both cheeks. This is a recognized signal to everyone that al-Quso is protected. [Wright, 2006, pp. 330] Between Yemeni obstructions, infighting between US officials (see October 14-Late November, 2000), and security concerns hindering movement, there will never be the same kind of investigation and trial as there was with the 1998 embassy bombings (see 10:35-10:39 a.m., August 7, 1998 and February-July 2001).

Entity Tags: Yemen, Fahad al-Quso, Federal Bureau of Investigation

Timeline Tags: Alleged Use of False Flag Attacks, Complete 911 Timeline

Rahim al-NashiriRahim al-Nashiri [Source: AP]After several weeks of investigation, US authorities learn that al-Qaeda leader Abd al-Rahim al-Nashiri was involved in the plot to attack the USS Cole. Investigators find a second safe house used by the bombing team, and learn it was registered to al-Nashiri under a name variant. Al-Nashiri’s name is dimly familiar to FBI agent Ali Soufan, who remembers that a source said al-Nashiri was planning a seaborne attack against a US vessel in Aden (see After August 7, 1998). The FBI then finds that al-Nashiri rented a car in Aden before the bombing. Author Lawrence Wright will comment, “It was another strong link between al-Qaeda and the Cole attack.” [New Yorker, 7/10/2006 pdf file] In addition, one of the bombers detained by Yemeni authorities, Jamal al-Badawi, identifies al-Nashiri as a person who gave instructions for the attack. Al-Badawi also says he thought al-Nashiri was working for bin Laden, but al-Nashiri did not tell al-Badawi this directly. [CNN, 12/13/2000] Although al-Nashiri was the operational manager, he was actually in Afghanistan for a meeting with Osama bin Laden when the opportunity to attack arose and was not physically present at the bombing. Investigators are aware that he is the cousin of one of the bombers of the US embassy in Nairobi, which he facilitated, and a captured embassy bomber identified a photo of him for the FBI two years earlier (see 10:35-10:39 a.m., August 7, 1998 and August 22-25 1998). Al-Nashiri has been known to various intelligence agencies since 1998, at least, and was monitored at the Malaysia summit of top al-Qaeda leaders at the start of the year (see January 5-8, 2000). [CNN, 12/11/2000; 9/11 Commission, 7/24/2004, pp. 152-3; Wright, 2006, pp. 318] US investigators also identify another leading suspect in the case, Khallad bin Attash, at around the same time (see January 4, 2001).

Entity Tags: Jamal al-Badawi, Abd al-Rahim al-Nashiri, Ali Soufan, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline

Jamal Badawi.Jamal Badawi. [Source: Rewards for Justice]Based on information from interviews of suspects detained during the USS Cole bombings (see Late October-Late November 2000), the FBI finds that one of the lead bombers was Khallad bin Attash, an operative also involved in the 1998 East African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). The detained men, Jamal al-Badawi and Fahad al-Quso, say that they recently traveled to Afghanistan and met bin Attash there. Al-Badawi also says bin Attash helped purchase a boat used in the Cole bombing. The head of the FBI’s investigation, Ali Soufan, is startled by this news, as an informer has already provided information on bin Attash, describing him as one of bin Laden’s top lieutenants. Although the FBI wants to interview the two detained men to obtain more information, the Yemeni authorities refuse at this point, saying they have both sworn on the Koran they were not involved in the attack, so they must be innocent. Limited access to al-Quso will be granted to the FBI later, but the Yemeni authorities will indicate to him that he is still under their protection (see Early December 2000). [Federal Bureau of Investigation, 9/9/1998 pdf file; 9/11 Commission, 7/24/2004, pp. 192; New Yorker, 7/10/2006 pdf file]

Entity Tags: Khallad bin Attash, Fahad al-Quso, Ali Soufan, Jamal al-Badawi

Timeline Tags: Complete 911 Timeline

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). [Truthout (.org), 1/17/2006] In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. [New York Times, 12/16/2007]

Entity Tags: Bush administration (43), National Security Agency

Timeline Tags: Civil Liberties

Atta’s immigration record for his arrival on January 10, 2001, after alteration in early May.Atta’s immigration record for his arrival on January 10, 2001, after alteration in early May. [Source: 9/11 Commission]The Miami Herald will report: “INS documents, matched against an FBI alert given to German police, show two men named Mohamed Atta [arrive] in Miami on January 10, each offering different destination addresses to INS agents, one in Nokomis, near Venice, the other at a Coral Springs condo. He (they?) is admitted, despite having overstayed his previous visa by a month. The double entry could be a paperwork error, or confusion over a visa extension. It could be Atta arrived in Miami, flew to another country like the Bahamas, and returned the same day. Or it could be that two men somehow cleared immigration with the same name using the same passport number.” [Miami Herald, 9/22/2001] Officials will later call this a bureaucratic snafu, and insist that only one Atta entered the US on this date. [Associated Press, 10/28/2001] In addition, while Atta arrives on a tourist visa, he tells immigration inspectors that he is taking flying lessons in the US, which requires an M-1 student visa. [Washington Post, 10/28/2001] The fact that he had overstayed his visa by over a month on a previous visit also does not cause a problem. [Los Angeles Times, 9/27/2001] The INS will later defend its decision, but “immigration experts outside the agency dispute the INS position vigorously.” For instance, Stephen Yale-Loehr, co-author of a 20-volume treatise on immigration law, will assert: “They just don’t want to tell you they blew it. They should just admit they made a mistake.” [Washington Post, 10/28/2001]

Entity Tags: Federal Bureau of Investigation, Mohamed Atta, Stephen Yale-Loehr

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Marwan Alshehhi.Marwan Alshehhi. [Source: FBI]Future 9/11 hijacker Marwan Alshehhi is able to reenter the US without trouble, after a brief, mysterious trip to Morocco (see January 11-18, 2001), despite having overstayed his previous visa by about five weeks. [Los Angeles Times, 9/27/2001; US Department of Justice, 5/20/2002]

Entity Tags: Marwan Alshehhi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

According to reporter and author Charlie Savage, the White House staff quickly coalesces into two camps: “Bush People[,] mostly personal friends of the new president who shared his inexperience in Washington,” which includes President Bush’s top legal counsels, Alberto Gonzales and Harriet Miers, both corporate lawyers in Texas before joining Bush in Washington. The second group is “Cheney People—allies from [Vice-President Dick] Cheney’s earlier stints in the federal government (see May 25, 1975, November 18, 1980, 1981-1992, 1989, and June 1996) who were deeply versed in Washington-level issues, a familiarity that would allow their views to dominate internal meetings. These included [Defense Secretary Donald] Rumsfeld and other cabinet secretaries, key deputies throughout the administration, and David Addington, Cheney’s longtime aide who would become a chief architect of the administration’s legal strategy in the war on terrorism” (see July 1, 1992 and (After 10:00 a.m.) September 11, 2001). Savage will observe, “Given the stark contrast in experience between Cheney and Bush, it was immediately clear to observers of all political stripes that Cheney would possess far more power than had any prior vice president.”
'Unprecedented' Influence - Cheney will certainly have “unprecedented” influence, according to neoconservative publisher William Kristol, who himself had served as former Vice President Dan Quayle’s chief of staff. “The question to ask about Cheney,” Kristol will write, is “will he be happy to be a very trusted executor of Bush’s policies—a confidant and counselor who suggests personnel and perhaps works on legislative strategy, but who really doesn’t try to change Bush’s mind about anything? Or will he actually, substantively try to shape administration policy in a few areas, in a way that it wouldn’t otherwise be going?”
Expanding the Power of the Presidency - Cheney will quickly answer that question, Savage will write, by attempting to “expand the power of the presidency.” Savage will continue: “He wanted to reduce the authority of Congress and the courts and to expand the ability of the commander in chief and his top advisers to govern with maximum flexibility and minimum oversight. He hoped to enlarge a zone of secrecy around the executive branch, to reduce the power of Congress to restrict presidential action, to undermine limits imposed by international treaties, to nominate judges who favored a stronger presidency, and to impose greater White House control over the permanent workings of government. And Cheney’s vision of expanded executive power was not limited to his and Bush’s own tenure in office. Rather, Cheney wanted to permanently alter the constitutional balance of American government, establishing powers that future presidents would be able to wield as well.” [Savage, 2007, pp. 7-9] Larry Wilkerson, the chief of staff for Secretary of State Colin Powell, will say after leaving the administration: “We used to say about both [Defense Secretary Donald Rumsfeld’s office] and the vice president’s office that they were going to win nine out of 10 battles, because they were ruthless, because they have a strategy, because they never, never deviate from that strategy. They make a decision, and they make it in secret, and they make it in a different way than the rest of the bureaucracy makes it, and then suddenly, foist it on the government—and the rest of the government is all confused.” [Unger, 2007, pp. 299]
Signing Statements to Reshape Legislation, Expand Presidential Power - To that end, Cheney ensures that all legislation is routed through his office for review before it reaches Bush’s desk. Addington goes through every bill for any new provisions that conceivably might infringe on the president’s power as Addington interprets it, and drafts signing statements for Bush to sign. In 2006, White House counsel Bradford Berenson will reflect: “Signing statements unite two of Addington’s passions. One is executive power. And the other is the inner alleyways of bureaucratic combat. It’s a way to advance executive power through those inner alleyways.… So he’s a vigorous advocate of signing statements and including important objections in signing statements. Most lawyers in the White House regard the bill review process as a tedious but necessary bureaucratic aspect of the job. Addington regarded it with relish. He would dive into a 200-page bill like it was a four-course meal.” It will not be long before White House and Justice Department lawyers begin vetting legislation themselves, with Addington’s views in mind. “You didn’t want to miss something,” says a then-lawyer in the White House. [Savage, 2007, pp. 236]

Entity Tags: David S. Addington, Bradford Berenson, Alberto R. Gonzales, Charlie Savage, William Kristol, Richard (“Dick”) Cheney, Donald Rumsfeld, Bush administration (43), Harriet E. Miers, George W. Bush, Lawrence Wilkerson

Timeline Tags: Civil Liberties

The National Security Agency seeks the assistance of global telecommunications corporation AT&T to help it set up a domestic call monitoring site to eavesdrop on US citizens’ phone communications, according to court papers filed in June 2006 as part of a lawsuit against AT&T (see October 2001). The NSA is expressly forbidden from spying on US citizens within US borders unless authorized by the Foreign Surveillance Intelligence Court (FISC) (see 1978). When the NSA program, which wiretaps phone and email communications often without court warrants, becomes public knowledge well over four years later (see December 15, 2005), President Bush, NSA Director Michael Hayden, and other White House and government officials will assert that the program was set up in response to the September 11, 2001 terrorist attacks. If the claims made in the lawsuit are accurate, these assertions are provably false. “The Bush administration asserted this became necessary after 9/11,” lawyer Carl Mayer will claim in 2006. “This undermines that assertion.” Unbeknownst to most Americans, the NSA is operating a secret “data mining” operation that, by 2006, will have compiled phone records and contact information on millions of domestic phone and email communications. The NSA project is code-named “Project Groundbreaker,” and is ostensibly an above-board attempt announced in June 2000 to have AT&T and other firms help modernize its technological capabilities. The project originally seeks to have AT&T build a network operations center that duplicates AT&T’s facility in Bedminster, New Jersey; this plan will be altered when the NSA decides it will be better served by acquiring the monitoring technology itself. The agency is seeking bids for a project to “modernize and improve its information technology infrastructure,” including the privatization of its “non-mission related” systems support. [TechWeb, 6/13/2000; Bloomberg, 6/30/2006] Groundbreaker’s privatization project is expected to provide up to $5 billion in government contracts to various private firms such as AT&T, Computer Sciences Corporation, and OAO Corporation, [Computerworld, 12/4/2000; Government Executive, 9/1/2001] and up to 750 NSA employees will become private contractors. Hayden, who has aggressively instituted a corporate management protocol to enhance productivity and has brought in numerous senior managers and agency executives from private defense firms, is a strong proponent of privatizing and outsourcing much of the NSA’s technological operations, and in 2001 will say that he wants the agency to focus on its primary task of breaking codes and conducting surveillance. Hayden does not admit that Groundbreaker is part of a larger NSA domestic surveillance program, [Government Executive, 9/1/2001] and publicly, NSA officials say that the project is limited to administrative and logistics functions. [Computerworld, 12/4/2000] The covert data mining portion of the project is code-named “Pioneer.” A former, unnamed employee of the NSA, [Bloomberg, 6/30/2006] and a former AT&T technician, Mark Klein, will provide the key information about Groundbreaker (see Late 2002, July 7, 2009 and December 15-31, 2005). Klein will say in 2006 that he saw the NSA construct a clandestine area within its switching center in San Francisco, and saw NSA technicians shunt fiber optic cable carrying Internet traffic into that area, which contains a large data bank and secret data mining hardware (see April 6, 2006). Klein will say he knew that the NSA built other such facilities in other switching locations. He will go on to say that the NSA did not work with just AT&T traffic; when AT&T’s network connected with other networks, the agency acquired access to that traffic as well. [Democracy Now!, 5/12/2006] The information about AT&T and the NSA will become public knowledge after the 2006 filing of a lawsuit against AT&T and other telecommunications firms (see May 12, 2006 and June 26, 2006).

Entity Tags: Mark Klein, Michael Hayden, George W. Bush, Foreign Intelligence Surveillance Court, Bush administration (43), Carl Mayer, Computer Sciences Corporation, AT&T, National Security Agency, OAO Corporation

Timeline Tags: Civil Liberties

During the trial of men accused of the 1998 East African embassy bombings, an FBI witness mentions that one of the defendants, Mohamed al-Owhali, told investigators that he had stayed in a Yemen-based al-Qaeda communications hub run by Ahmed al-Hada. He also revealed that he had called the hub before and after the Nairobi bombing. (Note: al-Hada’s surname is transliterated as “al-Hazza” during the trial.) The existence of the communications hub in Yemen is then reported by the US State Department, CNN, the Guardian, and UPI over the next few months. [United Press International, 2/13/2001; US Department of State, 3/7/2001; United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001; CNN, 5/2/2001; Observer, 8/5/2001] The hub was also previously mentioned at a big trial of Islamic Jihad operatives in Cairo (see 1999). The 9/11 hijackers have been calling the communications hub by phone since early 1999, at least (see, e.g., Early 1999). The calls are being intercepted by the NSA and some of them have originated from within the US (see Early 2000-Summer 2001). Perhaps unaware that the hub’s existence has been disclosed, they will make at least one more call to the hub (see (August 2001)).

Entity Tags: Salem Alhazmi, Nawaf Alhazmi, Khalid Almihdhar, Ahmed al-Hada, National Security Agency, Mohamed al-Owhali

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Timeline Tags: Civil Liberties

Nicky Hager.Nicky Hager. [Source: Rotorua District Council]New Zealand journalist Nicky Hager appears before a European Parliament investigative committee to testify about the US’s satellite surveillance program, Echelon (see July 11, 2001). Hager has discovered information about Echelon’s use by the New Zealand equivalent of the NSA, the Government Communication Security Bureau (GCSB). In researching Echelon’s use by the USA, Canada, Britain, Australia, and New Zealand, Hager learned of the extent of the system’s “capability to monitor the whole of governments, regional and international organizations, non-government organizations, companies and individuals throughout Europe.” Although Hager warns the committee not to focus exclusively on Echelon’s use for corporate benefits, he gives several examples of such uses in the South Pacific, including monitoring “deals to do with Japan… collecting intelligence on meat sales, which is very important for New Zealand… intelligence to do with oil prices… [and] a particularly large Japanese development project in the South Pacific where there was potential for New Zealand companies to win contracts. In other words, there were both macro-level and micro-level economic intelligence being collected.” Corporate executives routinely received such information, Hager testifies, and tells about “the fantastic amount of intelligence that was arriving, for example, monitoring international trade meetings.… From my sources, they said that whenever there was a GATT meeting or another major international meeting, there were hundreds of reports of the monitoring of the different delegations which were arriving in New Zealand and being shared between [British]/USA partners, and I have absolutely no doubt about that, because I have talked to people who saw it coming from the NSA.” [European Parliament, 4/24/2001]

Entity Tags: Government Communication Security Bureau, Echelon, National Security Agency, Nicky Hager, European Parliament

Timeline Tags: Civil Liberties

One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing.One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing. [Source: Matt Crypto / Public domain]The BBC reports on advances in electronic surveillance. The US’s global surveillance program, Echelon, has become particularly effective in monitoring mobile phones, recording millions of calls simultaneously and checking them against a powerful search engine designed to pick out key words that might represent a security threat. Laser microphones can pick up conversations from up to a kilometer away by monitoring window vibrations. If a bug is attached to a computer keyboard, it is possible to monitor exactly what is being keyed in, because every key on a computer has a unique sound when depressed. [BBC, 4/4/2001] Furthermore, a BBC report on a European Union committee investigation into Echelon one month later notes that the surveillance network can sift through up to 90 percent of all Internet traffic, as well as monitor phone conversations, mobile phone calls, fax transmissions, net browsing history, satellite transmissions and so on. Even encryption may not help much. The BBC suggests that “it is likely that the intelligence agencies can crack open most commercially available encryption software.” [BBC, 5/29/2001]

Entity Tags: Echelon, British Broadcasting Corporation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

Ahmed Shah Massoud speaking before European Parliament.Ahmed Shah Massoud speaking before European Parliament. [Source: Robert Sanchez/ Black Star]Ahmed Shah Massoud, leader of the Northern Alliance fighting the Taliban in Afghanistan, has been trying to get aid from the US but his people are only allowed to meet with low level US officials. In an attempt to get his message across, he addresses the European Parliament: “If President Bush doesn’t help us, these terrorists will damage the US and Europe very soon.” [Dawn (Karachi), 4/7/2001; Time, 8/12/2002] A classified US intelligence document states, “Massoud’s intelligence staff is aware that the attack against the US will be on a scale larger than the 1998 embassy bombings, which killed over two hundred people and injured thousands (see 10:35-10:39 a.m., August 7, 1998).” [Defense Intelligence Agency, 11/21/2001 pdf file] Massoud also meets privately with some CIA officials while in Europe (see Early April 2001). He tells them that his guerrilla war against the Taliban is faltering and unless the US gives a significant amount of aid, the Taliban will conquer all of Afghanistan. No more aid is forthcoming. [Washington Post, 2/23/2004]

Entity Tags: Taliban, Northern Alliance, Central Intelligence Agency, George W. Bush, Ahmed Shah Massoud

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Binyam Mohamed, a 23-year old Muslim of Ethiopian descent residing in London, flies to Pakistan to experience Islam in its “purest form” as practiced by the Taliban. Mohamed, who was abandoned by his family in London when he was 15, is a former heroin addict and desultory college student who turned to the local mosque as a way to avoid his drug-using friends. He will later claim, “I really had no idea what it was” that the Taliban espoused; he goes to Afghanistan on the advice of some in the mosque. After arriving in Pakistan, he sneaks into Afghanistan in the back of a truck. He will later say that he learns about the Muslim rebels in Chechnya from sympathizers in Jalalabad, and determines to aid the Muslim cause, but, he claims, as an aid worker, not a terrorist or Taliban fighter. Yet he agrees to undergo basic training in Afghanistan for fighters. He will later say: “I was told that the Russians don’t separate between aid workers and those doing the fighting, and that if I wanted to go to Chechnya, I needed basic training. I was so young, I didn’t question it. I didn’t expect to fire a gun except in training, let alone kill someone.… I would never have taken up arms against British or American soldiers, let alone attacked civilians. I wanted to protect civilians, not kill them.” He completes a 45-day “boot camp” course, where, he will later say, he learned nothing to do with terrorism, such as bomb-making techniques. But instead of traveling to Chechnya, he goes to Kabul, where he contracts malaria. He is in the hospital when he learns of the 9/11 attacks. He thinks Afghanistan will soon be under attack from Western forces, and, he will later say, decides to leave for London before the fighting can start (see September 2001 - April 9, 2002). “All I wanted to do was to get back to London, to the country that I thought of as home, to continue my education and find a job; to get back to my life, minus the drugs,” he will say. [Daily Mail, 3/8/2009]

Entity Tags: Binyam Mohamed

Timeline Tags: Torture of US Captives

9/11 hijacker Satam Al Suqami becomes an illegal overstay on this day. He entered the US on April 23 (see April 23-June 29, 2001) and was allowed to stay for 30 days, so, according to the 9/11 Commission, his permission to remain in the US expires on this day. He remains in illegal status until 9/11. [9/11 Commission, 8/21/2004, pp. 8, 21, 23 pdf file] Hijackers Mohamed Atta and Marwan Alshehhi also overstayed their visas at times (see January 10, 2001 and January 18, 2001). At least one more of the hijackers, Khalid Almihdhar, lied on his visa application form, meaning he was in the US illegally (see August 29, 2001).

Entity Tags: Satam Al Suqami

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Future 9/11 hijacker Khalid Almihdhar probably visits the closely monitored al-Qaeda communications hub in Yemen again. While it will not be reported that he is at the hub at this time, it is known that he flies from Sana’a, Yemen, to Saudi Arabia on May 26, 2001 (see May 26, 2001), and the Yemen hub is in Sana’a. [Bamford, 2008, pp. 64] Furthermore, Almihdhar’s wife, his recently born baby, and other family members live in the hub (which is run by his father-in-law Ahmed al-Hada). It would seem highly likely he would not pass through Sana’a without visiting his family. Almihdhar stayed at the hub for around a month in June 2000 (see (Mid-June-Mid-July 2000)) and then visited it again in February 2001 (see February 2001). Details of Almihdhar’s travels are unclear, but he may have traveled to Afghanistan via Iran later in February (see February 2001). He is in the United Arab Emirates and Malaysia in June 2001. [9/11 Commission, 7/24/2004, pp. 237] Each time Almihdhar visits the hub presents a great opportunity for the CIA and NSA, because they have been closely monitoring the hub for years. Phone calls to and from the hub, including ones made by Almihdhar and other 9/11 hijackers, are intercepted, rooms in the building are bugged, and spy satellites record visitors (see Late August 1998, Late 1998-Early 2002, and Early 2000-Summer 2001). Based on information gained from monitoring this house, the CIA and local intelligence services mounted a major operation against Almihdhar, other 9/11 hijackers, and several more al-Qaeda operatives in December 1999 and January 2000, when they were followed around the Middle East and South Asia and monitored during an al-Qaeda summit in Malaysia (see December 29, 1999, January 2-5, 2000, and January 5-8, 2000). So presumably US intelligence should be aware of this visit to the hub and who Almihdhar is, but what exactly is known and who may know it will not be made public.

Entity Tags: National Security Agency, Ahmed al-Hada, Central Intelligence Agency, Khalid Almihdhar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Steve Gaudin.Steve Gaudin. [Source: BBC]John O’Neill, special agent in charge of the FBI’s national security division in New York, tells FBI agent Steve Gaudin that more al-Qaeda attacks are going to occur. [Graff, 2011, pp. 259] Today, a jury convicts four men for their involvement in the bombings of the US embassies in Kenya and Tanzania in August 1998 (see 10:35-10:39 a.m., August 7, 1998 and February-July 2001). [CNN, 5/29/2001] O’Neill sat in on the closing arguments in the trial and after the verdict is given, he draws Gaudin aside. He puts his arm around the agent and tells him: “I’m sending you to a language school in Vermont. You’re gonna learn Arabic.” [Wright, 2006, pp. 339] “The case is over,” Gaudin protests, but O’Neill tells him, “No, there’s more coming.” [Graff, 2011, pp. 259] “You know this fight ain’t over,” O’Neill explains. Referring to Mohamed al-Owhali, one of the men convicted for his role in the embassy bombings, he continues: “What did al-Owhali tell you? He said, ‘We have to hit you outside so they won’t see us coming on the inside.’” [Wright, 2006, pp. 339] (Al-Owhali told Gaudin in 1998: “We have a plan to attack the US, but we’re not ready yet. We need to hit you outside the country in a couple of places so you won’t see what is going on inside. The big attack is coming. There’s nothing you can do to stop it.” [Wright, 2006, pp. 279] ) O’Neill is “the FBI’s top expert on al-Qaeda and Osama bin Laden,” according to New York magazine. [New York Magazine, 12/17/2001] According to journalist and author Murray Weiss, he has, since 1995, told any official in Washington, DC, who will listen that he is “sure bin Laden would attack on American soil.” [Weiss, 2003, pp. 360]

Entity Tags: Mohamed al-Owhali, John O’Neill, Steve Gaudin

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Steven Emerson.Steven Emerson. [Source: Publicity photo]Steven Emerson and Daniel Pipes, both experts on the Middle East and Islamist terrorism, write in the Wall Street Journal that al-Qaeda is “planning new attacks on the US.” Their article is written as a response to the recent guilty verdicts in a New York court against four men accused of planning the 1998 bombings of the US embassies in Kenya and Tanzania (see 10:35-10:39 a.m., August 7, 1998). “Unfortunately,” Emerson and Pipes write, “the trial does almost nothing to enhance the safety of Americans.… Indeed, recent information shows that al-Qaeda is not only planning new attacks on the US but is also expanding its operational range to countries such as Jordan and Israel.”
Al-Qaeda Is 'the Most Lethal Terrorist Organization Anywhere in the World' - Emerson and Pipes also write that tens of thousands of pages from the trial transcript “provide a full and revealing picture of al-Qaeda, showing it to be the most lethal terrorist organization anywhere in the world.” The transcript shows that “al-Qaeda sees the West in general, and the US in particular, as the ultimate enemy of Islam. Inspired by their victory over the Soviet Union in Afghanistan in the 1980s, the leaders of al-Qaeda aspire to a similar victory over America, hoping ultimately to bring Islamist rule here.”
Al-Qaeda Personnel Have Been Taught 'How to Destroy Large Buildings' - The article states that Osama bin Laden, the leader of al-Qaeda, has “set up a tightly organized system of cells in an array of American cities, including Brooklyn, NY; Orlando, Fla.; Dallas; Santa Clara, Calif.; Columbia, Mo.; and Herndon, Va.” Furthermore, according to Emerson and Pipes, court documents show that “[o]fficials of the Iranian government helped arrange advanced weapons and explosives training for al-Qaeda personnel in Lebanon, where they learned, for example, how to destroy large buildings.”
America Must Fight Al-Qaeda 'as We Would in a War' - Emerson and Pipes conclude that the recent trial “shows that trials alone are not enough” when dealing with al-Qaeda. They suggest that al-Qaeda operatives “are better thought of as soldiers, not criminals.” Therefore, they write, “To fight al-Qaeda and other terrorist groups… we must fight them as we would in a war.” This would mean that, “as in a conventional war, America’s armed forces, not its policemen and lawyers, are primarily deployed to protect Americans.” Furthermore, the two men opine: “If a perpetrator is not precisely known, then those who are known to harbor terrorists will be punished. This way, governments and organizations that support terrorism will pay the price, not just the individuals who carry it out.” [Wall Street Journal, 5/31/2001]
Writers Have Been Accused of Anti-Muslim Bias - Emerson and Pipes are controversial figures. Emerson, an award-winning investigative reporter, has been called “the nation’s foremost journalistic expert on terrorism” by the New York Post. [Harvard Crimson, 10/22/1999] And White House counterterrorism chief Richard Clarke called him “sort of the Paul Revere of terrorism.” But according to Brown University’s alumni magazine, he spent the 1990s “fighting to be taken seriously, and fending off charges of racism and anti-Muslim bias.” [Brown Alumni Magazine, 11/2002] Pipes, a foreign policy analyst, and commentator on terrorism and Islam, “appears regularly in the US media, where he is regarded as an authority on the Middle East,” The Guardian will report. Arab-Americans, however, “regard him as a Muslim basher and a staunch supporter of Israel.” According to The Nation, he “labored in comparative obscurity during the 1990s, writing a series of books and articles that advanced a hard line on Arab countries… and darkly warning that Muslim Americans posed a threat to the United States.” [Guardian, 9/10/2001; Nation, 4/22/2004]

Entity Tags: Al-Qaeda, Daniel Pipes, Steven Emerson

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Associates of the 9/11 hijackers call a number in Yemen also called by the radicals who bombed two US embassies in East Africa in 1998. The calls, which MSNBC says are made “in the weeks before the attacks,” are presumably to an al-Qaeda communications hub in Sana’a, Yemen, run by Ahmed al-Hada, an associate of Nairobi embassy bomber Mohamed al-Owhali (see August 4-25, 1998). The number is monitored by US intelligence at this time and is also called by the hijackers themselves (see Early 2000-Summer 2001), at least one of the calls being around this time (see (August 2001)). But it is not clear what intelligence the NSA and CIA gleaned from these calls or which associates of the hijackers make the calls. [MSNBC, 10/3/2001] However, it is thought that one of the hijackers’ associates, Ramzi bin al-Shibh, met with an associate of al-Hada’s in Yemen the year before (see Before October 12, 2000) and traveled to Yemen before the bombing of the USS Cole (see October 10-21, 2000).

Entity Tags: Ahmed al-Hada, Ramzi bin al-Shibh, National Security Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A warrant is issued for the arrest of Mohamed Atta in the state of Florida. On April 26, Atta had been stopped in a random inspection near Fort Lauderdale, Florida, and given a citation for having no driver’s license (see April 26, 2001). He failed to show up for his May 28 court hearing, resulting in the arrest warrant. After this, Atta will fly all over the US using his real name, and even flies to Spain and back in July (see July 8-19, 2001), but is never stopped or questioned. The police apparently never try to find him. [Wall Street Journal, 10/16/2001; Australian Broadcasting Corporation, 11/12/2001] Atta will be stopped for speeding in July, but apparently his arrest warrant will not have been added to the police database by then (see July 5, 2001). Three other future 9/11 hijackers are also stopped for speeding in the US (see April 1, 2001, August 1, 2001, and September 9, 2001). Curiously, on the day of 9/11, a woman claiming to be Atta’s wife will go to a Florida courthouse and attempt to clear this from Atta’s record, but Atta does not have a wife (see September 11, 2001).

Entity Tags: Mohamed Atta

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In July 2001, NSA director Michael Hayden tells a reporter that the NSA does not monitor any US citizens without court warrants from the Foreign Intelligence Surveillance Court (FISC). “We don’t do anything willy-nilly,” Hayden says. “We’re a foreign intelligence agency. We try to collect information that is of value to American decision-makers, to protect American values, America—and American lives. To suggest that we’re out there, on our own, renegade, pulling in random communications, is—is simply wrong. So everything we do is for a targeted foreign intelligence purpose. With regard to the—the question of industrial espionage, no. Period. Dot. We don’t do that.” When asked how Americans could verify that, Hayden says that they should simply trust the NSA to police and monitor itself, along with oversight from the White House and from Congress. However, it will later come to light that the NSA began illegally monitoring US citizens from the start of the Bush administration (see Spring 2001). A former NSA official will later dispute Hayden’s account. “What do you expect him to say?” the official says. “He’s got to deny it. I agree. We weren’t targeting specific people, which is what the President’s executive order does. However, we did keep tabs on some Americans we caught if there was an interest [by the White House.] That’s not legal. And I am very upset that I played a part in it.” [Truthout (.org), 1/17/2006] Hayden also denies persistent allegations from European government officials that the agency has engaged in economic espionage to help American companies against European competitors (see April 4, 2001). In March 2001, the American Civil Liberties Union’s Barry Steinhardt says that “since there is no real check on [the NSA], there is no way to know” if they are following the law. Steinhardt says that Congress is the only real check on possible NSA abuses, but it has consistently failed to exercise any sort of aggressive oversight on the agency. [CNN, 3/31/2001]

Entity Tags: National Security Agency, Barry Steinhardt, Michael Hayden, American Civil Liberties Union

Timeline Tags: Civil Liberties

The NSA monitors calls between an al-Qaeda communications hub in Yemen and one or more operatives involved in a plot to attack the US embassy in Paris. The communications hub in Yemen is run by Ahmed al-Hada, father-in-law of 9/11 hijacker Khalid Almihdhar, who is also involved in the US embassy bombings (see August 4-25, 1998), the USS Cole bombing (see Mid-August 1998-October 2000), and 9/11 (see Early 2000-Summer 2001). The Paris plot is apparently foiled based on this information, although the details are sketchy. [US News and World Report, 3/15/2004] The name of the operative or operatives who talk to the communications hub in Yemen is unknown. One candidate is Djamel Beghal, who will be arrested on July 28 (see July 24 or 28, 2001) based on a tip-off issued by the CIA to partner agencies on July 3 (see July 3, 2001). Another is Nizar Trabelsi, who will be arrested on September 13, although Trabelsi may be arrested based on information gleaned from Beghal. Both Beghal (see Spring 1998) and Trabelsi (see September 13, 2001) are connected to a plot to destroy an airliner with a shoe bomb, but this is not stopped (see December 22, 2001).

Entity Tags: Djamel Beghal, Al-Qaeda, Nizar Trabelsi, National Security Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Glyn Ford.Glyn Ford. [Source: British Labour Party]The European Parliament releases its final report on its findings about the secretive US surveillance program known as Echelon. The report, two years in the making, exhaustively details many of Echelon’s surveillance capabilities, and lists many of Echelon’s surveillance stations around the world. One of the more interesting sections of the report concerns its apparent use on behalf of US corporations. According to the report, Echelon—operated by the NSA as a highly classified surveillance program ostensibly for tracking terrorist threats and activities by nations hostile to the West—is also being used for corporate and industrial espionage, with information from the program being turned over to US corporations for their financial advantage. The report gives several instances of Echelon’s use by corporations. One is the use of Echelon to “lift… all the faxes and phone calls” between the European aircraft manufacturer Airbus and Saudi Arabian Airlines; that information was used by two American companies, Boeing and McDonnell Douglas, to outflank Airbus and win a $6 billion contract. The report also alleges that the French company Thomson-CSF lost a $1.3 billion satellite deal to Raytheon the same way. Glyn Ford, the MP who commissioned the report, says he doesn’t have a problem with Echelon itself, but in the way it is being used. “Now, you know, if we’re catching the bad guys, we’re completely in favor of that… What we’re concerned about is that some of the good guys in my constituency don’t have jobs because US corporations got an inside track on—on some global deal.” [Washington Post, 11/14/1999; CBS News, 2/27/2000; BBC, 7/6/2000; European Parliament, 7/11/2001] In 1977, the US government began providing Echelon-based intelligence to US corporations (see 1977). In April 2001, New Zealand journalist Nicky Hager testified about Echelon’s use by US allies for corporate and economic purposes (see April 2001), and former CIA director James Woolsey confirmed that US surveillance programs were used to benefit US corporations (see March 2000).

Entity Tags: US Department of Commerce, Thomson-CSF, Saudi Arabian Airlines, Glyn Ford, McDonnell Douglas, Central Intelligence Agency, Boeing Company, Echelon, Airbus, European Parliament, National Security Agency

Timeline Tags: Civil Liberties

Tom Wilshire, a CIA manager assigned to the FBI who expressed interest two months earlier in surveillance photos from the al-Qaeda Malaysia summit (see January 5-8, 2000), now finds a cable he had been looking for regarding that summit. The cable, from January 2001, discusses al-Qaeda leader Khallad bin Attash’s presence at the summit. Wilshire explains later that bin Attash’s presence there had been troubling him. He writes an e-mail to the CIA’s Counterterrorist Center (CTC), stating, “[Khallad] is a major league killer, who orchestrated the Cole attack (see October 12, 2000) and possibly the Africa bombings (see 10:35-10:39 a.m., August 7, 1998).” Yet Khallad is still not put on a terrorist watch list. Wilshire asks that the FBI be passed this information, but the FBI will not actually be given the information until August 30, a week after it learns future 9/11 hijacker Khalid Almihdhar is in the US. [US Congress, 7/24/2003, pp. 157 pdf file; US Department of Justice, 11/2004, pp. 298 pdf file] Although the CIA managers that receive this e-mail are not named, Richard Blee, in charge of the CIA’s bin Laden unit and Wilshire’s former boss, appears to be one of the recipients: On the same day Wilshire sends this e-mail, Blee writes his own e-mail entitled “Identification of Khallad,” which is sent to another CIA officer. [Central Intelligence Agency, 7/13/2001; 9/11 Commission, 7/24/2004, pp. 537] An FBI analyst assigned to the CTC is given the task of reviewing all other CIA cables about the Malaysian summit. It takes this analyst until August 21—over five weeks later—to put together that Khalid Almihdhar had a US visa and that Nawaf Alhazmi had traveled to the US. Yet other CIA agents are already well aware of these facts but are not sharing the information (see August 22, 2001). Working with immigration officials, this analyst then learns that Almihdhar entered and left the US in 2000, and entered again on July 4, 2001, and that Alhazmi appears to still be in the US. [US Congress, 7/24/2003, pp. 157 pdf file; US Department of Justice, 11/2004, pp. 298 pdf file]

Entity Tags: Tom Wilshire, Richard Blee, Nawaf Alhazmi, US Immigration and Naturalization Service, Khalid Almihdhar, Federal Bureau of Investigation, Alec Station, Khallad bin Attash, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

With the approaching third anniversary of the US embassy bombings in Africa (see 10:35-10:39 a.m., August 7, 1998), the FBI reissues a warning that overseas law enforcement agencies may be targets. It notes that although most reporting indicates a potential for attacks on US interests abroad, the possibility of an attack in the US cannot be discounted. [CNN, 3/2002; 9/11 Commission, 7/24/2004, pp. 260, 534]

Entity Tags: Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline

Page 2 of 7 (638 events)
previous | 1, 2, 3, 4, 5, 6, 7 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike