!! History Commons Alert, Exciting News

Context of 'May-June 2000: Army Officer Told to Destroy Able Danger Documents'

This is a scalable context timeline. It contains events related to the event May-June 2000: Army Officer Told to Destroy Able Danger Documents. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Gen. Pete Schoomaker.Gen. Pete Schoomaker. [Source: US Defense Department]A data mining program called Able Danger was set up by US Special Operations Command (SOCOM) in late 1998. It had been collecting data mostly on Bosnia and China (see Late December 1998). But at this time, it begins collecting data on al-Qaeda. [Government Security News, 9/2005] At least some of the data is collected on behalf of Maj. Gen. Geoffrey Lambert, the J3 at US Special Operations Command. [US Congress. Senate. Committee on Judiciary, 9/21/2005] Eleven intelligence employees are directly involved in Able Danger’s work. Six are with SOCOM’s Able Danger unit. Four more, including Dr. Eileen Preisser and Maj. Eric Kleinsmith, are with the US Army’s Land Information Warfare Activity (LIWA), which joins the effort in December 1999. LIWA had been conducing data mining already on a wide variety of topics, including international drug cartels, corruption in Russia and Serbia, terrorist linkages in the Far East, and the proliferation of sensitive military technology to China (see April 2000). [Norristown Times Herald, 6/19/2005; Government Security News, 8/2005; New York Times, 8/9/2005; St. Petersburg Times, 8/10/2005; Bergen Record, 8/14/2005; Government Security News, 9/2005; US Congress, 9/21/2005; US Congress. Senate. Committee on Judiciary, 9/21/2005] Lt. Col. Anthony Shaffer, running a military unit called Stratus Ivy in the Defense Intelligence Agency (DIA), will also take part in the effort. According to Shaffer, Stratus Ivy is tasked “to take on ‘out of the box’ ideas, and develop them into real intelligence operations.” So the goal is to use the information gathered by Able Danger to conduct real operations against al-Qaeda targets. [US Congress, 2/15/2006 pdf file] Using computers, the unit collects huge amounts of data in a technique called “data mining.” They get information from such sources as al-Qaeda Internet chat rooms, news accounts, web sites, and financial records. Using sophisticated software, they compare this with government records such as visa applications by foreign tourists, to find any correlations and depict these visually. [Bergen Record, 8/14/2005; Government Security News, 9/2005] The program will be shut down early in 2001 (see January-March 2001).

Entity Tags: Geoffrey Lambert, Anthony Shaffer, Eric Kleinsmith, Russia, Special Operations Command, Hugh Shelton, Al-Qaeda, Curt Weldon, Peter J. Schoomaker, Bosnia, China, Able Danger, Eileen Preisser

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Four analysts from the US Army’s Land Information Warfare Activity (LIWA) unit are forced to stop their work supporting the Able Danger program. At the same time, private contractors working for Able Danger are fired. This occurs around the time that it becomes known by some inside the military that LIWA had identified future National Security Adviser and Secretary of State Condoleezza Rice, former Defense Secretary William Perry, and other prominent Americans as potential security risks (see April 2000). It was apparently these LIWA analysts (such as Dr. Eileen Preisser) and contractors (such as James D. Smith) who conducted most of the data mining and analysis of al-Qaeda in the preceding months. One of the four LIWA analysts, Maj. Erik Kleinsmith, will later be ordered to destroy all the data collected (see May-June 2000). LIWA’s support for Able Danger will resume a few months later (see Late September 2000). [New York Post, 8/27/2005; US Congress, 9/21/2005; Washington Times, 9/22/2005]

Entity Tags: Condoleezza Rice, Able Danger, Eileen Preisser, James D. Smith, Land Information Warfare Activity, William Perry

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Erik Kleinsmith.Erik Kleinsmith. [Source: C-SPAN]Maj. Eric Kleinsmith, chief of intelligence for the Land Information Warfare Activity (LIWA) unit, is ordered to destroy data and documents related to a military intelligence program set up to gather information about al-Qaeda. The program, called Able Danger, has identified Mohamed Atta and three other future hijackers as potential threats (see January-February 2000). According to Kleinsmith, by April 2000 it has collected “an immense amount of data for analysis that allowed us to map al-Qaeda as a worldwide threat with a surprisingly significant presence within the United States.”(see January-February 2000) [Fox News, 9/21/2005; New York Times, 9/22/2005] The data is being collected on behalf of Maj. Gen. Geoffrey Lambert, the J3 at US Special Operations Command, who is said to be extremely upset when he learns that the data had been destroyed without his knowledge or consent. [US Congress. Senate. Committee on Judiciary, 9/21/2005] Around this time, a separate LIWA effort showing links between prominent US citizens and the Chinese military has been causing controversy, and apparently this data faces destruction as well (see April 2000). The data and documents have to be destroyed in accordance with Army regulations prohibiting the retention of data about US persons for longer than 90 days, unless it falls under one of several restrictive categories. However, during a Senate Judiciary Committee public hearing in September 2005, a Defense Department representative admits that Mohamed Atta was not considered a US person. The representative also acknowledges that regulations would have probably allowed the Able Danger information to be shared with law enforcement agencies before its destruction. Asked why this was not done, he responds, “I can’t tell you.” [CNET News, 9/21/2005] The order to destroy the data and documents is given to Kleinsmith by Army Intelligence and Security Command General Counsel Tony Gentry, who jokingly tells him, “Remember to delete the data—or you’ll go to jail.” [Government Executive, 9/21/2005] The quantity of information destroyed is later described as “2.5 terabytes,” about as much as one-fourth of all the printed materials in the Library of Congress. [Associated Press, 9/16/2005] Other records associated with the unit are allegedly destroyed in March 2001 and spring 2004 (see Spring 2004). [Associated Press, 9/21/2005; US Congress, 9/21/2005; Fox News, 9/24/2005]

Entity Tags: Able Danger, Eric Kleinsmith, Al-Qaeda, Land Information Warfare Activity, Mohamed Atta, Tony Gentry, Geoffrey Lambert

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The Able Danger data collection program—which lost the support of the US Army’s Land Information Warfare Activity (LIWA) unit last April (see April 2000)—is reconstituted and moved to a private intelligence research center run by Raytheon in Garland, Texas. While the program worked only with unclassified data under LIWA, the new Able Danger, referred to by some as “Able Danger II,” has permission to mine classified information as well. [US Congress, 9/21/2005; US Congress, 9/21/2005] SOCOM apparently believes that this new arrangement will allow Able Danger to do its work free of some of the political interference that had hobbled the earlier effort. Other data mining teams at LIWA work on non-al-Qaeda related projects while Able Danger continue to focus on al-Qaeda. [National Journal, 12/3/2005] Most accounts have the first version of Able Danger in early 2000 being the version that identified Mohamed Atta and three other 9/11 hijackers. However, according to Representative Curt Weldon (R-PA), a Raytheon employee named Bob Johnson will later claim that Atta is independently identified by this second version of Able Danger as well (see November 11, 2005).

Entity Tags: Land Information Warfare Activity, Able Danger

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike