!! History Commons Alert, Exciting News

Context of 'May 1, 2009: Prosecutors Drop Charges against Lobbyists Accused of Passing Classified Information'

This is a scalable context timeline. It contains events related to the event May 1, 2009: Prosecutors Drop Charges against Lobbyists Accused of Passing Classified Information. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 4 (382 events)
previous | 1, 2, 3, 4 | next

The German Reich Ministry of Justice issues a secret memo following a meeting of several Justice Ministry lawyers and public prosecutors with senior Gestapo officers. The participants discuss the fact that Germany has been on a war footing for years, and the leaders’ worry that the citizenry is riddled with sleeper cells of subversives. The solution: detaining and torturing subversives. It is unclear whether torture will be used to terrorize other subversives, to extract information, or produce confessions. German law enforcement officials are balky at applying “more rigorous interrogation” techniques. Though some judges seem unmoved by defendants appearing in court with obvious marks of torture upon their bodies, the law enforcement officers are bureaucrats in a system that has always respected the rule of law and the Hitler government was originally elected on a law-and-order platform. The memo is the product of the top officials in the Gestapo and Justice Ministry, and lays out detailed instructions as to when torture techniques can be applied, the specific equipment used in such interrogations, and how many times particular techniques could be used on certain categories of detainees. Perhaps most importantly, the memo promises immunity from prosecution to any German interrogator who follows the rules as laid down in the memo.
Specific Instructions - It reads in part: “At present, we thus have a situation which cannot continue: a deficient sense of what is right on the part of judicial officers; an undignified position for police officers, who try to help matters by foolish denials [that torture has taken place in court proceedings].… [I]nterrogations of this kind [torture] may be undertaken in cases where charges involve the immediate interests of the state.… chiefly treason and high treason. Representatives of the Gestapo expressed the opinion that a more rigorous interrogation could also be considered in cases of Jehovah’s Witnesses, explosives, and sabotage.… As a general principle, in more rigorous interrogations only blows with a club on the buttocks are permissible, up to 25 such blows. The number is to be determined in advance by the Gestapo.… Beginning with the tenth blow, a physician must be present. A standard club will be designated, to eliminate all irregularities.” Gestapo Headquarters in Berlin must give permission for more “rigorous interrogation[s],” the memo continues.
Drawing Parallels to Bush Administration Torture - The memo will be the subject of a 2009 article by Shayana Kadidal, the senior managing attorney of the Guantanamo project at the Center for Constitutional Rights. Kadidal will draw parallels between the Nazi torture authorization and similar legal justifications issued by the American government after the 9/11 attacks (see March 2, 2009 and April 21, 2009). Kadidal will write: “I realize that, as a matter of principle, there is a strong bias against making Nazi analogies to any events happening in our modern world.… But here we have: (1) a system set up to allow torture on certain specific individual detainees, (2) specifying standardized equipment for the torture (apparently down to the exact length of the club to be used), along with physician participation to ensure survival of the victim for the more several applications, (3) requiring prior approval of the use of torture from the central authorities in the justice department and intelligence agency in the capital, so as to ensure that (6) the local field officers actually carrying out the abuse are immune from prosecution.” [Huffington Post, 4/21/2009]

Entity Tags: Gestapo, Shayana Kadidal, German Reich Ministry of Justice

Timeline Tags: Torture of US Captives

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

The CIA’s Technical Services Division (TSD) considers plans to undermine Fidel Castro’s charismatic appeal by sabotaging his speeches. At one point, there is discussion of spraying Castro’s broadcasting studio with a hallucinogenic chemical. The plan is taken of the shelf because the chemical is deemed unreliable. During this period, the TSD laces a box of cigars with a chemical that would produce temporary disorientation, hoping that he will smoke one of the cigars before giving a speech. In another instance, the TSD comes up with a scheme to dust Castro’s shoes with thallium salts during a trip outside of Cuba. The salts would cause his beard to fall out. The plan is abandoned when Castro cancels the trip. [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, Technical Services Division (TSD)

Timeline Tags: US-Cuba (1959-2005)

The CIA works with a high-level Cuban official, codenamed “AM/LASH,” on a plan to assassinate Fidel Castro and overthrow his government. In June 1965, the CIA ends its contact with AM/LASH and his associates, citing security concerns. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Timeline Tags: US-Cuba (1959-2005)

The CIA’s Task Force W devises two plans to assassinate Fidel Castro. The first one, involving an exploding sea shell that would be placed where Castro regularly dives, is dismissed by the CIA’s Technical Services Division (TSD) as impractical. In the second plan, James Donovan (who has been negotiating with Castro for the release of prisoners taken during the Bay of Pigs operation) would present Castro with a contaminated diving suit. TSD decides to give the plan a try. It purchases a diving suit and laces its breathing apparatus with tubercule bacillus. The suit itself is dusted with a fungus that is known to cause a chronic skin disease. But the suit never leaves the laboratory. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Entity Tags: Technical Services Division (TSD), James Donovan, Fidel Castro

Timeline Tags: US-Cuba (1959-2005)

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]

Entity Tags: Malcolm Little, Central Intelligence Agency, Church Committee, Lew Allen, National Security Agency, Martin Luther King, Jr., Office of Security Services, Joan Baez

Timeline Tags: Civil Liberties

Richard Perle, a young neoconservative just hired for the staff of Senator Henry “Scoop” Jackson (D-WA—see Early 1970s), is given a classified CIA report on alleged past Soviet treaty violations by CIA analyst David Sullivan. Apparently Sullivan leaks the report to pressure the US government to take a harder stance on the Soviet Union. Sullivan quits before an incensed CIA Director Stansfield Turner can fire him. Turner urges Jackson to fire Perle, but Jackson not only refuses, he also hires Sullivan for his staff. Sullivan and Perle establish an informal right-wing network called “the Madison Group” after their usual meeting place, the Madison Hotel Coffee Shop. [CounterPunch, 2/28/2004]

Entity Tags: Richard Perle, ’Madison Group’, David Sullivan, Central Intelligence Agency, Stansfield Turner, Henry (“Scoop”) Jackson

Timeline Tags: Neoconservative Influence

Henry ‘Scoop’ Jackson.Henry ‘Scoop’ Jackson. [Source: US Congress]The recently formed neoconservatives, bound together by magazine publisher Irving Kristol (see 1965), react with horror to the ascendancy of the “McGovern liberals” in the Democratic Party, and turn to conservative senator Henry “Scoop” Jackson (D-WA) for leadership. Jackson calls himself a “muscular Democrat”; others call him “the Senator from Boeing” for his strong support of the US defense industry. Jackson merges a strong support of labor and civil rights groups with a harsh Cold War opposition to the Soviet Union. Jackson assembles a staff of bright, young, ideologically homogeneous staffers who will later become some of the most influential and powerful neoconservatives of their generation, including Richard Perle, Douglas Feith, Elliott Abrams, Abram Shulsky, and Paul Wolfowitz. Jackson’s office—“the bunker,” to staffers—becomes a home for disaffected, ambitious young conservative ideologues with a missionary zeal for change. Jackson presides over the cadre in an almost fatherly fashion.
History of Two Dictators - Many of Jackson’s neoconservative disciples came of age either fighting two foreign dictators—Stalin and/or Hitler—or growing up with family members who fought against them. [Unger, 2007, pp. 35-41] Wolfowitz’s father’s family perished in the Holocaust; he will later say that what happened to European Jews during World War II “shaped a lot of my views.” [New York Times, 4/22/2002] Feith will tell the New Yorker in 2005, “[My] family got wiped out by Hitler, and… all this stuff about working things out—well, talking to Hitler to resolve the problem didn’t make any sense.” Most neoconservatives like Feith and Wolfowitz tend to look to military solutions as a first, not a last, resort. To them, compromise means appeasement, just as Britain’s Neville Chamberlain tried to appease Hitler. Stefan Halper, a White House and State Department official in the Nixon, Ford, and Reagan administrations, will say of the neoconservatives, “It is use force first and diplomacy down the line.”
Former Trotskyites - On the other hand, many neoconservatives come to the movement from the hardline, socialist left, often from organizations that supported Bolshevik revolutionary Leon Trotsky (see Late 1930s - 1950s). Trotskyites accused Stalin of betraying the purity of the Communist vision as declaimed by Karl Marx and Vladimir Lenin. “I can see psychologically why it would not be difficult for them to become [conservative] hard-liners,” says Harvard Sovietologist Richard Pipes, himself a hardliner whose son, Daniel Pipes, will become an influential neoconservative. “It was in reaction to the betrayal.” Many neoconservatives like Stephen Schwartz, a writer for the Weekly Standard, still consider themselves to be loyal disciples of Trotsky. Richard Perle is a Trotskyite socialist when he joins Jackson’s staff, and will always practice what author Craig Unger calls “an insistent, uncompromising, hard-line Bolshevik style” of policy and politics. Like Trotsky, Unger writes, the neoconservatives pride themselves on being skilled bureaucratic infighters, and on trusting no one except a small cadre of like-minded believers. Disagreement is betrayal, and political struggles are always a matter of life and death. [Unger, 2007, pp. 35-41]

Entity Tags: Stefan Halper, Stephen Schwartz, Richard Pipes, Richard Perle, Neville Chamberlain, Abram Shulsky, Douglas Feith, Daniel Pipes, Craig Unger, Paul Wolfowitz, Henry (“Scoop”) Jackson, Elliott Abrams, Leon Trotsky, Irving Kristol

Timeline Tags: Neoconservative Influence

An FBI wiretap at the Israeli Embassy in Washington picks up Richard Perle, an aide to Senator Henry “Scoop” Jackson (D-WA—see Early 1970s), discussing classified information with an Israeli official. This is the second time Perle has been involved in providing classified information to Israel (see Late 1969). This data was given to Perle by National Security Council staff member Helmut “Hal” Sonnenfeldt, who has been under investigation since 1967 for providing classified documents to the Israelis. [Atlantic Monthly, 5/1982; American Conservative, 3/24/2003; CounterPunch, 2/28/2004]

Entity Tags: Helmut Sonnenfeldt, Richard Perle, Henry (“Scoop”) Jackson

Timeline Tags: US International Relations, Neoconservative Influence

The US Supreme Court, in what becomes informally known as the “Keith case,” upholds, 8-0, an appellate court ruling that strikes down warrantless surveillance of domestic groups for national security purposes. The Department of Justice had wiretapped, without court warrants, several defendants charged with destruction of government property; those wiretaps provided key evidence against the defendants. Attorney General John Mitchell refused to disclose the source of the evidence pursuant to the “national security” exception to the Omnibus Crime Control and Safe Streets Act of 1968. The courts disagreed, and the government appealed the decision to the Supreme Court, which upheld the lower courts’ rulings against the government in a unanimous verdict. The Court held that the wiretaps were an unconstitutional violation of the Fourth Amendment, establishing the judicial precedent that warrants must be obtained before the government can wiretap a US citizen. [US Supreme Court, 6/19/1972; Bernstein and Woodward, 1974, pp. 258-259] Critics of the Nixon administration have long argued that its so-called “Mitchell Doctrine” of warrantlessly wiretapping “subversives” has been misused to spy on anyone whom Nixon officials believe may be political enemies. [Bernstein and Woodward, 1974, pp. 258-259] As a result of the Supreme Court’s decision, Congress passes the Foreign Intelligence Surveillance Act. [John Conyers, 5/14/2003]
Opinion of Justice Powell - Writing for the Court, Justice Lewis Powell observes: “History abundantly documents the tendency of Government—however benevolent and benign its motives—to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the government attempts to act under so vague a concept as the power to protect ‘domestic security.’ Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent.” [US Supreme Court, 6/19/1972]
Justice Department Wiretapped Reporters, Government Officials - In February 1973, the media will report that, under the policy, the Justice Department had wiretapped both reporters and Nixon officials themselves who were suspected of leaking information to the press (see May 1969 and July 26-27, 1970), and that some of the information gleaned from those wiretaps was given to “Plumbers” E. Howard Hunt and G. Gordon Liddy for their own political espionage operations. [Bernstein and Woodward, 1974, pp. 258-259]
Conyers Hails Decision 30 Years Later - In 2003, Representative John Conyers (D-MI) will say on the floor of the House: “Prior to 1970, every modern president had claimed ‘inherent Executive power’ to conduct electronic surveillance in ‘national security’ cases without the judicial warrant required in criminal cases by the Fourth Amendment to the Constitution. Then Attorney General John Mitchell, on behalf of President Richard Nixon sought to wiretap several alleged ‘domestic’ terrorists without warrants, on the ground that it was a national security matter. Judge [Damon] Keith rejected this claim of the Sovereign’s inherent power to avoid the safeguard of the Fourth Amendment. He ordered the government to produce the wiretap transcripts. When the Attorney General appealed to the US Supreme Court, the Court unanimously affirmed Judge Keith. The Keith decision not only marked a watershed in civil liberties protection for Americans. It also led directly to the current statutory restriction on the government’s electronic snooping in national security cases.” [John Conyers, 5/14/2003]

Entity Tags: Lewis Powell, US Supreme Court, John Mitchell, E. Howard Hunt, US Department of Justice, G. Gordon Liddy, ’Plumbers’, Damon Keith, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

Richard Perle, a senior staff member on the Senate Armed Services Committee and an aide to Senator Henry “Scoop” Jackson (see Early 1970s), uses his position to help fellow neoconservative Paul Wolfowitz gain a position with the Arms Control and Disarmament Agency (ACDA). Neoconservatives such as Perle and Wolfowitz do not believe in either arms control or disarmament (see 1965 and August 15, 1974). In 2004, author Stephen Green will write, “Wolfowitz also brought to ACDA a strong attachment to Israel’s security, and a certain confusion about his obligation to US national security” (see 1978). [CounterPunch, 2/28/2004]

Entity Tags: Stephen Green, Arms Control and Disarmament Agency, Paul Wolfowitz, Senate Armed Services Committee, Richard Perle

Timeline Tags: Neoconservative Influence

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Vice President Nelson Rockefeller (see December 19, 1974 and After) is instrumental in keeping Senate Democrats from finding out too much about the intelligence community’s excesses. When the New York Times reveals the existence of a decades-old illegal domestic surveillance program run by the CIA (see December 21, 1974), President Ford heads off calls from Democrats to investigate the program by appointing the “Rockefeller Commission” to investigate in the Democrats’ stead. Senate Democrats, unimpressed with the idea, create the Church Committee to investigate the intelligence community (see April, 1976). Rockefeller is adept at keeping critical documents out of the hands of the Church Committee and the press. When Senator Frank Church asks for materials from the White House, he is told that the Rockefeller Commission has them; when he asks Rockefeller for the papers, he is told that he cannot have them because only the president can authorize access. One Church aide later calls Rockefeller “absolutely brilliant” in denying them access in a friendly manner. “He winked and smiled and said, ‘Gee, I want to help you but, of course I can’t—not until we’ve finished our work and the president approves it,’” the aide recalls. Senator John Tower (R-TX), the vice chairman of the committee, will later reflect, “We were very skillfully finessed.” But even Rockefeller, who has his own history of involvement with the CIA, is taken aback at the excesses of the CIA, particularly its history of assassinating foreign leaders. Rockefeller will eventually turn that information over to the Church Committee, giving that body some of the most explosive evidence as yet made public against the agency. [US Senate, 7/7/2007]

Entity Tags: John Tower, Church Committee, Nelson Rockefeller, Central Intelligence Agency, Frank Church, Gerald Rudolph Ford, Jr, ’Rockefeller Commission’

Timeline Tags: Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” [Dubose and Bernstein, 2006, pp. 34-35]

Entity Tags: Seymour Hersh, US Department of Defense, Ford administration, Edward Levi, Donald Rumsfeld, Church Committee, Richard (“Dick”) Cheney, Philip Buchan, New York Times, Gerald Rudolph Ford, Jr

Timeline Tags: Civil Liberties

The Senate Select Committee to Study Governmental Operations releases its report, “Alleged Assassination Plots Involving Foreign Leaders,” which finds “concrete evidence of at least eight plots involving the CIA to assassinate Fidel Castro from 1960 to 1965.” [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, US Congress

Timeline Tags: US-Cuba (1959-2005)

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]

Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News

Timeline Tags: Civil Liberties

President Ford issues Executive Order 11905, which limits the power of the CIA, the NSA, and military intelligence to engage in surveillance of US citizens. Perhaps its most well-known provision is a total ban on “political assassinations” by US government personnel. [Gerald R. Ford, 2/18/1976; Roberts, 2008, pp. 38] The provision is sparked by the Church Commission’s finding (see April, 1976) that assassination is “unacceptable in our society,” and a political embarassment, especially botched attempts such as the CIA’s efforts to kill Cuba’s Fidel Castro. [Grant J. Lilly, 4/6/2006]

Entity Tags: Church Commission, Gerald Rudolph Ford, Jr, National Security Agency, Central Intelligence Agency

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Interviewer David Frost has a difficult time with his subject, former President Richard Nixon, in the day’s early questioning (see April 6, 1977). Frost attempts to recoup with a line of questioning suggested by his adviser James Reston, Jr., one used in the trial of former Nixon aide John Ehrlichman (see January 1, 1975). Were there no limits to what a president can do, even if the president wants to do something plainly illegal? he asks. Could he do anything despite the law? Burglary? Forgery? Even murder? “If the president does it, that means it’s not illegal,” Nixon retorts. “Never had his imperialism been so baldly stated,” Reston will later reflect. Frost asks if the dividing line between, for example, a police burglary and the murder of an antiwar protester is only the president’s judgment? Nixon agrees, and adds: “There’s nothing specific that the Constitution contemplates in that respect. I haven’t read every word, every jot and every tittle, but I do know this: That it has been, however, argued that as far as a president is concerned, that in war time, a president does have certain extraordinary powers which would make acts that would otherwise be unlawful, lawful if undertaken for the purpose of preserving the nation and the Constitution, which is essential for the rights we’re all talking about.” [Time, 5/30/1977; Reston, 2007, pp. 102-105; Landmark Cases, 8/28/2007]

Entity Tags: Richard M. Nixon, David Frost, James Reston, Jr, John Ehrlichman

Timeline Tags: Nixon and Watergate

Paul Wolfowitz, a young neoconservative with the Arms Control and Disarmament Agency (ACDA—see 1973), is investigated for giving classified documents on the proposed sale of US weapons to an Arab government to an Israeli government official, through the auspices of an official with the American Israel Public Affairs Committee (AIPAC). An inquiry is launched but later dropped, and Wolfowitz will continue with ACDA through 1980. [CounterPunch, 2/28/2004]

Entity Tags: Paul Wolfowitz, American Israel Public Affairs Committee, Arms Control and Disarmament Agency

Timeline Tags: US International Relations, Neoconservative Influence

During breakfast at Washington’s Madison Hotel, Stephen Bryen, a Senate Foreign Relations Committee staffer and a close associate of Richard Perle, is overheard offering to pass classified material to Zvi Rafiah, the Congressional liaison officer for the Israeli embassy and a suspected senior Mossad officer (see October 1973). [Washington Report on Middle East Affairs, 7/4/1986] “I have the Pentagon document on the bases, which you are welcome to see,” Bryen reportedly says. [Nation, 6/29/1985] The eavesdropper is Michael Saba, a businessman and former executive director of the National Association of Arab Americans. Saba, who recognizes Bryen as a staff member of the Senate Committee, promptly reports the incident to the Justice Department, which quickly launches an FBI investigation. The investigation will find that Bryen has illegally obtained classified documents of military and scientific importance and that he has been seeking material that “could prove to be a major embarrassment to the US government.” [Washington Report on Middle East Affairs, 7/4/1986] The investigation also learns that he has been meeting with Zvi Rafiah “two or three times a week.” [Washington Report on Middle East Affairs, 7/4/1986] The FBI ultimately assembles “a good circumstantial case” that Rafiah “routinely issued orders to Bryen” and will recommend that the case be brought before an investigative grand jury for espionage. Instead, the case will be closed (see April 1979). [Nation, 6/29/1985; Washington Report on Middle East Affairs, 7/4/1986]

Entity Tags: Michael Saba, Clifford Case, Henry (“Scoop”) Jackson, Zvi Rafiah, Stephen Bryen

Timeline Tags: US International Relations, Neoconservative Influence

Dr. Stephen Bryen, a neoconservative staff member of the Senate Foreign Relations Committee, is accused of espionage against the US. An affidavit written by Deputy Assistant Attorney General Robert Keuch recommends a grand jury convene to hear evidence that Bryen had offered classified information to an Israeli Embassy official, Zvi Rafiah, the Mossad station chief in Washington (see March 1978). Bryen made the offer in the presence of the director of the American Israel Public Affairs Committee (AIPAC). Bryen refused to take an FBI lie detector test, but the AIPAC director agreed, and passed the test. One of Bryen’s Senate committee colleagues also tells FBI investigators that she later saw Bryen offering a pile of documents to Rafiah from an open safe in Bryen’s Senate office. Bryen’s fingerprints were found on classified documents which he denied ever handling—the same documents he allegedly offered to Rafiah. The investigation is derailed when the Senate Foreign Relations Committee refuses to grant the FBI access to files key to the probe. Bryen will resign his position with the committee at the insistence of Philip Heymann, the assistant attorney general in charge of the Justice Department’s criminal division, and under strong pressure from senators Clifford Case (R-NJ), who is Bryen’s boss, and Henry “Scoop” Jackson (D-WA). Heymann happens to be a close personal friend and associate of Bryen’s attorney. Soon after his resignation, Bryen will take a post as the executive director of the Jewish Institute for National Security Affairs (JINSA). In 1981, neoconservative Richard Perle, an assistant secretary of defense and then-aide to Jackson, will secure Bryen top-secret security clearance. Bryen will become Perle’s deputy, and will continue to provide Israel with classified information and materials (see May 1988 and After). [Nation, 6/29/1985; Washington Report on Middle East Affairs, 7/4/1986; CounterPunch, 2/28/2004]

Entity Tags: Senate Foreign Relations Committee, Henry (“Scoop”) Jackson, Clifford Case, American Israel Public Affairs Committee, Jewish Institute for National Security Affairs, Robert Keuch, Philip Heymann, Zvi Rafiah, Richard Perle, Stephen Bryen

Timeline Tags: Neoconservative Influence

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

Richard Perle leaves his position as a Senate aide to become a consultant with the Abington Corporation. His first clients are Israeli arms dealers Shlomo Zabludowicz, and his son Chaim Zabludowicz, who would like to sell the US weapons produced by Soltam Ltd., an Israeli company that makes mortars, artillery, ammunition, and other civilian and military products. Shlomo Zabludowicz is the founder of the company and its principal shareholder. Soltam agrees to pay Abington $10,000 a month for a period of one year. Despite Perle’s resignation as a Senate aide, he inexplicably remains on the Senate rolls as a nonsalaried employee until May 31, 1981. During this period, Perle retains his Senate security clearance. William F. Hildebrand later tells the New York Times that Perle’s arrangement with the Senate was not normal. “[Y]ou can’t be employed” by the Senate “and not get paid,” he explains. [New York Times, 4/17/1983]

Entity Tags: Abington Corporation, Soltam Ltd., Shlomo Zabludowicz, Richard Perle, Chaim Zabludowicz

Timeline Tags: Neoconservative Influence

Incoming presidential chief of staff James Baker asks a former chief of staff, Dick Cheney (see November 4, 1975 and After), for advice on handling the job. Baker takes four pages of handwritten notes covering his conversation with Cheney. Most of the notes cover mundane topics such as personnel and managing the president’s schedule. But Cheney offers at least one piece of policy advice. According to Baker’s notes: “Pres. seriously weakened in recent yrs. Restore power & auth [authority] to Exec Branch—Need strong ldr’ship. Get rid of War Powers Act—restore independent rights.” Baker notes Cheney’s emphasis of this last idea by marking it with two double lines and six asterisks, and a note in the margin, “Central theme we ought to push.” [Savage, 2007, pp. 43]

Entity Tags: Richard (“Dick”) Cheney, James A. Baker

Timeline Tags: Civil Liberties

Neoconservative Paul Wolfowitz, the head of the State Department’s Policy Planning Staff, hires fellow neoconservative academic Michael Ledeen as a “special adviser.” [CounterPunch, 2/28/2004] Ledeen will soon fall under suspicion of spying for Israel after moving to the Defense Department (see 1983).

Entity Tags: Michael Ledeen, Paul Wolfowitz, US Department of State

Timeline Tags: Neoconservative Influence

Richard Perle, a former Senate aide (see Late 1969) and consultant with the Abington Corporation defense consultancy firm, has recently become an assistant secretary of defense. Two of his first clients with Abington were Israeli arms dealers Shlomo Zabludowicz, and his son Chaim Zabludowicz (see March 1980), who now want to sell the US weapons produced by Soltam Ltd, an Israeli company that makes mortars, artillery, ammunition, and other civilian and military products. Shlomo Zabludowicz is the founder of Soltam and its principal shareholder. Soltam agrees to pay Abington $10,000 a month for a period of one year. In return, Perle writes a letter to the secretary of the Army recommending the evaluation and purchase of 155 mm. shells manufactured by Soltam. [New York Times, 4/17/1983; CounterPunch, 2/28/2004] Perle will say in a later interview with the New York Times that the amount was paid to him for services he provided Soltam during the previous year, and not for services rendered while working in the Pentagon. In January 1982, he will also receive a portion of a $90,000 fee that Soltam pays to Abington (see January 1982) The payments made to Perle and Abington are both funneled though Tamares, a small London-based subsidiary of Salgad, another company founded by Shlomo Zabludowicze and based in Liechtenstein. [New York Times, 4/17/1983] When Perle leaves his Defense Department position in 1987, he will go to work for Soltam. [CounterPunch, 2/28/2004]

Entity Tags: Shlomo Zabludowicz, Salgad, Abington Corporation, Chaim Zabludowicz, Richard Perle, Soltam Ltd., Tamares

Timeline Tags: Neoconservative Influence

Richard Perle, an assistant secretary of defense, writes a memorandum to the secretary of the army recommending that mortars manufactured by the Israeli arms company, Soltam, be evaluated for cost competitiveness. Less than a year before, Perle received $50,000 from the company (see March 1978). Perle also complains in the memo that the company had not been given a fair shot at an earlier Pentagon contract. [New York Times, 4/17/1983]

Entity Tags: Richard Perle, Soltam Ltd.

Timeline Tags: Neoconservative Influence

Douglas Feith, a neoconservative (see Early 1970s) serving as a Middle East analyst for the National Security Council, is fired after becoming the focus of an FBI inquiry into his giving classified NSC information to an Israeli embassy official in Washington. [CounterPunch, 2/28/2004] (Feith has always been a hardline advocate for Israel; his father, Dalck Feith, was a hardline Republican who, in his youth, was active in the militant Zionist youth movement Betar, the predecessor of Israel’s Likud Party. Both Feith and his father will be honored by the hard-right, Likud-aligned Zionist Organization of America.) [Inter Press Service, 11/7/2003] In 1992, Feith will write of his belief that the US and Israel should freely share technology; author Stephen Green will write regarding Feith’s leak of classified information to Israel that “what [Feith] had neglected to say… was that he thought that individuals could decide on their own whether the sharing of classified information was ‘technical cooperation,’ an unauthorized disclosure, or a violation of US Code 794c, the ‘Espionage Act.’” Feith is almost immediately rehired by fellow neoconservative Richard Perle to serve as Perle’s “special counsel” (see Mid-1982); Feith will work for Perle until 1986, when he forms what Green will call “a small but influential law firm… based in Israel.” [CounterPunch, 2/28/2004]

Entity Tags: National Security Council, Dalck Feith, Betar, Douglas Feith, Likud, Richard Perle, Federal Bureau of Investigation, Stephen Green

Timeline Tags: Neoconservative Influence

Neoconservative Richard Perle, the assistant secretary of defense for international security policy, hires fellow neoconservative Douglas Feith as his special counsel. Perle soon promotes Feith to deputy assistant secretary for negotiations policy. Feith’s hire is the latest in a long tradition of neoconservatives such as Perle giving each other influential government positions (see 1973 and 1981). [CounterPunch, 2/28/2004]

Entity Tags: US Department of Defense, Richard Perle, Douglas Feith

Timeline Tags: Neoconservative Influence

Neoconservative academic Michael Ledeen is brought into the Defense Department as a consultant on terrorism, via the auspices of Assistant Secretary of Defense Richard Perle, a fellow neoconservative. Ledeen’s supervisor, Noel Koch, is troubled by Ledeen’s frequent visits to his office to read classified documents. When Koch and Ledeen journey to Italy on Pentagon business, Koch learns that Ledeen is considered an “agent of influence” for a foreign government: Israel. After returning from Italy, Ledeen asks Koch to help him obtain two highly classified CIA reports which he says are being held by the FBI. Ledeen gives Koch the reports’ “alpha numeric designators”—numbers as highly classified as the reports themselves. Koch is at a loss to understand how Ledeen obtained such information. Koch tells his executive assistant to stop allowing Ledeen to access the classified materials in his office. In return, Ledeen stops coming to work. [CounterPunch, 2/28/2004] Shortly thereafter, Ledeen will begin “consulting work” for the National Security Council (see Late 1984).

Entity Tags: Michael Ledeen, Central Intelligence Agency, US Department of Defense, Richard Perle, Noel Koch

Timeline Tags: Neoconservative Influence

The October 1983 bombing of US Marine barracks in Beirut, Lebanon.The October 1983 bombing of US Marine barracks in Beirut, Lebanon. [Source: US Marine Corps.]In June 1982, Israel invaded Lebanon and US Marines were sent to Lebanon as a peacekeeping force in September 1982. On April 18, 1983, the US embassy in Beirut, Lebanon, is bombed by a suicide truck attack, killing 63 people. On October 23, 1983, a Marine barracks in Beirut is bombed by another suicide truck attack, killing 241 Marines. In February 1984, the US military will depart Lebanon. The radical militant group Islamic Jihad will take credit for both attacks (note that this is not the group led by Ayman al-Zawahiri). The group is believed to be linked to Hezbollah. Prior to this year, attacks of this type were rare. But the perceived success of these attacks in getting the US to leave Lebanon will usher in a new era of suicide attacks around the world. The next two years in particular will see a wave of such attacks in the Middle East, many of them committed by the radical militant group Hezbollah. [US Congress, 7/24/2003; US Congress, 7/24/2003 pdf file] The Beirut bombings will also inspire Osama bin Laden to believe that the US can be defeated by suicide attacks. For instance, he will say in a 1998 interview: “We have seen in the last decade the decline of the American government and the weakness of the American soldier who is ready to wage Cold Wars and unprepared to fight long wars. This was proven in Beirut when the Marines fled after two explosions.” [ABC News, 5/28/1998] In 1994, he will hold a meeting with a top Hezbollah leader (see Shortly After February 1994) and arrange for some of his operatives to be trained in the truck bombing techniques that were used in Beirut. [9/11 Commission, 7/24/2004, pp. 48]

Entity Tags: Hezbollah, Islamic Jihad Organization, Ayman al-Zawahiri, Osama bin Laden

Timeline Tags: Complete 911 Timeline

Neoconservative academic Michael Ledeen, who left the Defense Department under suspicion of engaging in espionage on behalf of Israel (see 1983), gains a position at the National Security Council. His boss is Lieutenant Colonel Oliver North (see July 7-10, 1987 and May-June, 1989). According to Iran-Contra investigators, it is Ledeen who suggests to North “that Israeli contacts might be useful in obtaining release of the US hostages in Lebanon” (see November 4, 1979-January 20, 1981). Ledeen is granted high-level security clearance. [CounterPunch, 2/28/2004]

Entity Tags: Michael Ledeen, National Security Council

Timeline Tags: Iran-Contra Affair, Neoconservative Influence

Eminent academic, foreign policy analyst, and neoconservative Albert Wohlstetter (see 1965) introduces his proteges Richard Perle and Paul Wolfowitz to Iraqi exile Ahmed Chalabi (see 1992-1996), who is already plotting to overthrow Iraqi dictator Saddam Hussein. Wolfowitz and Perle will become key players in the run-up to the US’s 2003 invasion of Iraq (see Late December 2000 and Early January 2001). [Unger, 2007, pp. 44]

Entity Tags: Albert Wohlstetter, Ahmed Chalabi, Richard Perle, Paul Wolfowitz, Saddam Hussein

Timeline Tags: Neoconservative Influence

NSC Middle East analyst Donald Fortier writes to his boss, National Security Adviser Robert McFarlane, of his concerns that NSC consultant Michael Ledeen (see Late 1984) might be a risk for passing classified information to Israel (see 1983). According to Fortier, NSC staffers agree that Ledeen’s role in the secret hostage negotiations with Iran should be limited to ferrying messages to Israeli Prime Minister Shimon Peres regarding Israel’s role in the negotiations, and Ledeen should specifically not be entrusted to ask Peres for detailed operational information. [CounterPunch, 2/28/2004]

Entity Tags: Michael Ledeen, Robert C. McFarlane, National Security Council, Donald Fortier

Timeline Tags: Iran-Contra Affair, Neoconservative Influence

Secretary of State George Shultz writes to National Security Adviser Robert McFarlane that “Israel’s record of dealings with Iran since the fall of the Shah and during the hostage crisis [shows] that Israel’s agenda is not the same as ours.” Referring to the plan concocted by NSC staffer Oliver North and North’s consultant, neoconservative and likely Israeli spy Michael Ledeen (see 1983), to seek Israeli help in freeing the American hostages in Lebanon (see Late 1984 and April 9, 1985), Shultz writes, “Consequently doubt whether an intelligence relationship such as what Ledeen has in mind would be one which we could fully rely upon and it could seriously skew our own perception and analysis of the Iranian scene.” [CounterPunch, 2/28/2004]

Entity Tags: Robert C. McFarlane, George Shultz, Oliver North, Michael Ledeen

Timeline Tags: Iran-Contra Affair, Neoconservative Influence

Recovering from cancer surgery, President Reagan authorizes National Security Adviser Robert McFarlane’s plan to open a dialogue with Iran through the auspices of Iranian gunrunner Manucher Ghorbanifar. McFarlane believes the US can win influence with Iranian moderates by helping Iran in its war with Iraq. Reagan believes the thaw in relations may help win the release of US hostages being held in Lebanon by Iranian-backed terrorists. [PBS, 2000]

Entity Tags: Manucher Ghorbanifar, Robert C. McFarlane, Ronald Reagan

Timeline Tags: Iran-Contra Affair

Israeli representatives meet with Iranian arms merchant Manucher Ghorbanifar for the first time, to discuss brokering the secret US-Iranian arms deals authorized by President Reagan (see July 18, 1985). Israel will sell arms to Iran, and the US will replenish Israeli stockpiles. [PBS, 2000]

Entity Tags: Ronald Reagan, Manucher Ghorbanifar

Timeline Tags: Iran-Contra Affair

Outgoing National Security Adviser Robert McFarlane and National Security Council staffer Oliver North fly to London to meet with Manucher Ghorbanifar, an Iranian arms merchant. Also present at the meeting are David Kimche, of Israel’s Foreign Ministry, and Israeli arms dealer Yaacov Nimrodi. McFarlane tells Ghorbanifar that the US wants to end arms sales to Iran, though the US wants to continue pursuing diplomatic relations. [New York Times, 11/19/1987] The US will in actuality continue selling arms to Iran (see January 7, 1986 and January 17, 1986).

Entity Tags: Manucher Ghorbanifar, David Kimche, Oliver North, Yaacov Nimrodi, Robert C. McFarlane

Timeline Tags: Iran-Contra Affair

Defense Department official Noel Koch arranges to discuss a matter of potential espionage with the FBI. Koch is worried that his former aide, neoconservative Michael Ledeen, has access to highly classified information in his role as a National Security Council consultant (see Late 1984 and May 3, 1985). Koch feels that Ledeen had possibly given classified information to Israel during his tenure at the Defense Department (see 1983). Koch is debriefed for two hours by FBI investigators, who tell him that they are only worried about possible Soviet espionage. Koch wonders at this, considering that Naval intelligence analyst Jonathan Pollard had been arrested just months before and charged with espionage on behalf of Israel. A frustrated Koch writes up his knowledge of Ledeen’s actions at the Defense Department and sends the report to Senator Charles Grassley (R-IA), a member of the Senate Intelligence Committee. Nothing concrete comes from Koch’s attempts to alert the FBI and Congress to potential espionage by Ledeen. [CounterPunch, 2/28/2004]

Entity Tags: Jonathan Pollard, Charles Grassley, Federal Bureau of Investigation, US Department of Defense, Michael Ledeen, National Security Council, Noel Koch

Timeline Tags: Neoconservative Influence

Barbara Walters, in a 1988 photo.Barbara Walters, in a 1988 photo. [Source: Raul Vega / Corbis]ABC News reporter Barbara Walters covertly provides the White House with documents from Iranian arms merchant Manucher Ghorbanifar, according to a Wall Street Journal article published in March 1987. The documents, prepared by Walters and given to the White House at Ghorbanifar’s request, report that Ghorbanifar believed, correctly, that National Security Council staffer Oliver North diverted profits from the sale of arms to Iran to Nicaragua’s Contra insurgents (see April 4, 1986). Walters will provide the White House with further documents on the arms sales in January 1987. The documents are given to Walters either just before or just after her interviews with Ghorbanifar and Saudi businessman and arms dealer Adnan Khashoggi for the ABC News program 20/20. The documents will eventually be turned over to the Tower Commission (see February 26, 1987). The White House will claim that the documents contain little more than reiterations of Ghorbanifar’s comments to Walters in the interview. ABC News will say that Walters’s actions—essentially acting as an information peddler or middleman between the Arab arms merchants and the US government—are “in violation of a literal interpretation of news policy.… ABC policy expressly limits journalists cooperating with government agencies unless threats to human lives are involved.… Ms. Walters believed that to be the case.” ABC does not explain why Walters believes “threats to human lives” were involved; this assertion also contradicts ABC’s assertions that the documents contained little more that what was said in the interview. [New York Times, 3/17/1987; Nation, 3/28/1987]

Entity Tags: Barbara Walters, Contras, Manucher Ghorbanifar, Oliver North, Reagan administration, Adnan Khashoggi, ABC News

Timeline Tags: Iran-Contra Affair

Testimony in the Iran-Contra investigations turns to the possibility that NSC aide Michael Ledeen may have profited from the US sales of arms to Iran through Israel (see January 24, 1986). Ledeen’s former supervisor at the Department of Defense, Noel Koch, who has long suspected Ledeen of spying for Israel (see 1983 and 1986), says that he first became suspicious of Ledeen when he learned that the price Ledeen had negotiated for the sale to the Israeli government of basic TOW missiles was $2,500 each. Koch found that no TOW missile had ever been sold to any foreign government for less than $6,800 per unit. Under orders from his superiors in the department, Koch renegotiated the deal with an Israeli official, eventually raising the price to $4,500 per missile, almost twice what Ledeen had “negotiated” in Israel. Author Stephen Green, who will write two books on US-Israeli relations, will comment, “There are two possibilities here—one would be a kickback, as suspected by his NSC colleagues, and the other would be that Michael Ledeen was effectively negotiating for Israel, not the US.” [CounterPunch, 2/28/2004]

Entity Tags: US Department of Defense, Joint House-Senate Iran-Contra Committee, Michael Ledeen, Stephen Green, Noel Koch, National Security Council

Timeline Tags: Iran-Contra Affair, Neoconservative Influence

Dr. Stephen Bryen, a neoconservative serving in the Defense Department who dodged espionage charges a decade before (see March 1978 and April 1979), helps Israel obtain secret US weapons information. Israel is in the final stages of building its “Arrow” anti-ballistic missile. It does not have “klystrons,” small microwave amplifiers needed for the missile’s target acquisition system to function. Klystrons are among the most secret of American weapons research products. Bryen is the director of the Pentagon’s Defense Technology Security Administration (DTSA), which itself is contained within the Pentagon’s Office of International Security Policy, headed by fellow neoconservative Richard Perle. Bryen attempts to secure the authority to allow four klystrons to be exported to Israel via Varian Associates, a private defense manufacturing firm, without consulting with tech transfer officials from the Army, the Air Force, or other agencies. Navy tech transfer official Richard Levine refuses the request, and holds a meeting with officials from the above agencies. All the officials agree that the transfer should not be approved. Bryen responds by suggesting that he go back to the Israelis to ask why they needed the klystrons. After the Israelis provide what one Defense Department official later calls “a little bullsh_t answer,” Bryen tells the participants that he had received an acceptable response. Varien is granted a license, he says, and the klystrons will be sent to Israel. The license is withdrawn after Assistant Secretary of Defense for International Security Affairs, Richard Armitage, objects to Bryen’s maneuvering. Two senior Defense Department officials later say that the attempt to provide Israel with classified weapons materials is “standard operating procedure” for Bryen, who has often ignored Defense and State Department refusals to provide sensitive information and materials to Israel. Later in the year, Bryen will leave the government and work as a consultant for a number of defense technology firms. [CounterPunch, 2/28/2004]

Entity Tags: Richard Armitage, Defense Technology Security Administration, Office of International Security Policy, Varian Associates, Stephen Bryen, Richard Perle, Richard Levine, US Department of Defense

Timeline Tags: Neoconservative Influence

Representative Dick Cheney (R-WY) publishes an essay for the neoconservative American Enterprise Institute (AEI), apparently written either by his Iran-Contra commission colleague Michael Malbin or by Cheney and Malbin together, but printed under Cheney’s name. The essay is titled “Congressional Overreaching in Foreign Policy,” and covers what he terms “congressional aggrandizement” of presidential powers.
Congress Has No Place in Determining, Implementing US Foreign Policy - Cheney’s essay bluntly states his belief that Congress has no business interfering in the president’s power to determine and implement the nation’s foreign policy; in general, the essay indicates Cheney’s disdain for the legislative branch of which he has been a member. He writes, in part: “Broadly speaking, the Congress was intended to be a collective, deliberative body. When working at its best, it would slow down decisions, improve their substantive content, subject them to compromise, and help build a consensus behind general rules before they were to be applied to the citizenry. The presidency, in contrast, was designed as a one-person office to ensure that it would be ready for action. Its major characteristics… were to be ‘decision, activity, secrecy, and dispatch.‘… [T]he legislative branch is ill equipped to handle many of the foreign policy tasks it has been taking upon itself lately.” He writes that while Congress may take upon itself powers to launch military actions or respond to an attack, it is by nature so slow and deliberative, and its members so focused on getting reelected, that it cannot adequately wield those powers: “[T]he real world effect often turns out… not to be a transfer of power from the president to Congress, but a denial of power to the government as a whole.” The only power Congress should have in involving itself in foreign policy, Cheney argues, is whether or not to fund presidential initiatives. “[T]he nation should not be paralyzed by Congress’s indecision,” he writes. [PBS Frontline, 6/20/2006; Savage, 2007, pp. 59-61]
Cheney Selected as Secretary of Defense - Shortly after the essay is published, President George H.W. Bush names Cheney as his secretary of defense. Cheney was scheduled to give a talk based on the essay at AEI, but cancels it and goes to Washington to begin preparing for confirmation hearings in the Senate. Reporter Charlie Savage will note that the essay may have caused Cheney some difficulties in his confirmation hearings had it had a larger audience. [Savage, 2007, pp. 61]
Former White House Counsel: Cheney's Proposals Unconstitutional, Unwise - In 2007, former Nixon White House counsel John Dean will write of the essay: “Cheney seems to be oblivious to the fact that the type of government he advocates is not, in fact, the government our Constitution provides.… His argument also assumes that a more agile, energetic, and fast-acting chief executive is the better system, but history does not support that contention. Presidential leadership has consistently shown itself less wise and less prudent than the slower but more deliberative nature of the system that we have. It was Congress that forced presidents out of no-win wars like Vietnam. The reason the nation’s Founders empowered Congress was because they wisely realized that a president—like heads of governments throughout history—was prone to fighting wars for his own glory, without seeming able to easily bring those wars to an end.” [Dean, 2007, pp. 88-89]

Entity Tags: Joint House-Senate Iran-Contra Committee, John Dean, American Enterprise Institute, Michael Malbin, George Herbert Walker Bush, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties, Iran-Contra Affair

Bin Laden’s house in Khartoum, Sudan.Bin Laden’s house in Khartoum, Sudan. [Source: PBS]It has not been revealed when US intelligence begins monitoring bin Laden exactly, though the CIA was tailing him in Sudan by the end of 1991 (see February 1991- July 1992). But in late 1995 the FBI is given forty thick files on bin Laden from the CIA and NSA, mostly communications intercepts (see October 1995). The sheer amount of material suggests the surveillance had been going on for several years. Dan Coleman, an FBI agent working with the CIA’s bin Laden unit, will begin examining these files and finds that many of them are transcripts from wiretapped phones tied to bin Laden’s businesses in Khartoum, Sudan, where bin Laden lives from 1991 to 1996. [Miller, Stone, and Mitchell, 2002, pp. 148-149; Wright, 2006, pp. 242-244] CIA Director George Tenet will later comment, “The then-obscure name ‘Osama bin Laden’ kept cropping up in the intelligence traffic.… [The CIA] spotted bin Laden’s tracts in the early 1990s in connection with funding other terrorist movements. They didn’t know exactly what this Saudi exile living in Sudan was up to, but they knew it was not good.” [Tenet, 2007, pp. 100] The London Times will later report that in Sudan, “bin Laden used an $80,000 satellite phone and al-Qaeda members used radios to avoid being bugged…” [London Times, 10/7/2001] Bin Laden is mistaken in his belief that satellite phones cannot be monitored; a satellite phone he buys in 1996 will be monitored as well (see November 1996-Late August 1998).

Entity Tags: Wadih El-Hage, Osama bin Laden, Dan Coleman, Central Intelligence Agency, Alec Station, Federal Bureau of Investigation, National Security Agency

Timeline Tags: Complete 911 Timeline

David Addington, a personal aide to Defense Secretary Dick Cheney, is forced to take part in Senate confirmation hearings for his appointment as chief counsel for the Defense Department. Addington, a Cheney protege and a fierce advocate for the ever-widening power of the executive branch, has gained a reputation for effective, if arrogant, conflicts with the Pentagon’s uniformed leadership and for tightly controlling what information enters and leaves Cheney’s office. Colonel Lawrence Wilkerson, an aide to Joint Chiefs chairman General Colin Powell, will later characterize Addington as an intense bureaucratic infighter bent on concentrating power in Cheney’s office. “Addington was a nut,” Wilkerson will recall. “That was how everybody summed it up. A brilliant nut perhaps, but a nut nevertheless.” The Senate hearing becomes a platform for Democratic senators to attack Cheney’s anti-Congressional policies (see Early 1991 and March 1992). In his turn, Addington calmly denies that he or Cheney have ever exhibited any intention to defy Congress on any issue. “How many ways are there around evading the will of Congress?” storms Senator Carl Levin (D-MI). “How many different legal theories do you have?” Addington answers, “I do not have any, Senator.” Addington is only confirmed after promising that the Pentagon will restore the independence of military lawyers (see March 1992) and begin funding the V-22 Osprey (see Early 1991). [Savage, 2007, pp. 63]

Entity Tags: David S. Addington, Carl Levin, Lawrence Wilkerson, Colin Powell, US Department of Defense, Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

Al-Qaeda operatives train militants in Somalia to attack US soldiers who have recently been posted there. This training will culminate in a battle on October 3-4, 1993, in which 18 US soldiers are killed (see October 3-4, 1993). [Reeve, 1999, pp. 182; Piszkiewicz, 2003, pp. 100] In the months before this battle, various al-Qaeda operatives come and go, occasionally training Somalis. It is unknown if any operatives are directly involved in the battle. Operatives involved in the training include:
bullet Maulana Masood Azhar, who is a Pakistani militant leader connected with Osama bin Laden. He appears to serve as a key link between bin Laden and the Somali killers of US soldiers (see 1993). [Los Angeles Times, 2/25/2002]
bullet Ali Mohamed, the notorious double agent, apparently helps train the Somalis involved in the attack (see 1993).
bullet Abu Ubaidah al-Banshiri, al-Qaeda’s military commander, who is one of the leaders of the operation. [Gunaratna, 2003, pp. 77]
bullet Mohammed Atef, al-Qaeda’s deputy military commander. An informant will later testify in an early 2001 US trial that he flew Atef and four others from bin Laden’s base in Sudan to Nairobi, Kenya, to train Somalis (see Before October 1993). [New York Times, 6/3/2002]
bullet Mohammed Saddiq Odeh, who will later be convicted for a role in the 1998 US embassy bombings, will boast that he provided the rocket launchers and rifles that brought down the helicopters. [Washington Post, 11/23/1998; Lance, 2006, pp. 143] Odeh will later say that he is ordered to Somalia by Saif al Adel, acting for bin Laden. [Bergen, 2006, pp. 138-139]
bullet Fazul Abdullah Mohammed (a.k.a. Haroun Fazul), who will also be convicted for the embassy bombings, trains militants in Somalia with Odeh. [Washington Post, 11/23/1998]
bullet Abdullah Ahmed Abdullah, who will be connected to the embassy bombings and will still be at large in 2007, is linked to the helicopter incident as well. [Lance, 2006, pp. 143]
bullet Muhsin Musa Matwalli Atwah, who will also be connected to the embassy bombings, will be killed in Pakistan in 2006 (see April 12, 2006). [CNN, 10/24/2006]
bullet Saif al-Islam al-Masri, a member of al-Qaeda’s ruling council. He will be captured in the country of Georgia in 2002 (see Early October 2002).
bullet Abu Talha al-Sudani, an al-Qaeda leader who settles in Somalia and remains there. He will reportedly be killed in Somalia in 2007 (see December 24, 2006-January 2007). [Washington Post, 1/8/2007]
Bin Laden dispatches a total of five groups, some of them trained by Ali Mohamed. [Lance, 2006, pp. 142] Atef reaches an agreement with one of the warlords, General Mohamed Farah Aideed, that bin Laden’s men will help him against the US and UN forces. These trips to Somalia will later be confirmed by L’Houssaine Kherchtou, testifying at the East African embassy bombings trial in 2001. Kherchtou will say that he met “many people” going to Somalia and facilitated their travel there from Nairobi, Kenya. [Bergen, 2006, pp. 138-139, 141]

Entity Tags: Ali Mohamed, Fazul Abdullah Mohammed, Pakistan Directorate for Inter-Services Intelligence, Mohamed Farah Aideed, Maulana Masood Azhar, Abu Ubaidah al-Banshiri, Mushin Musa Matwalli Atwah, Abdullah Ahmed Abdullah, Abu Talha al-Sudani, Saif al-Islam al-Masri, Mohammed Atef, Mohammed Saddiq Odeh, Osama bin Laden

Timeline Tags: Complete 911 Timeline

Abdul Rahman Yasin.Abdul Rahman Yasin. [Source: CBS News]A week after the WTC bombing, an Iraqi-American is questioned by the FBI and then allowed to leave the country, despite evidence tying him to the bombing. Abdul Rahman Yasin is a US citizen but spent most of his life in Iraq until 1992, when he returned to the US. Two of the major WTC bomb plotters, Ramzi Yousef and Mohammed Salameh, lived in the apartment directly above Yasin’s. Several days after Salameh is arrested, the FBI searches Yasin’s apartment. They find traces of bomb explosives on a scale, a tool box, and a shirt. In the trash, they find jeans with an acid hole burned in them, and torn pieces of a map showing the route to Yousef’s other apartment. Yasin is taken to an FBI office and interrogated by Neil Herman, head of the FBI’s WTC bombing investigation, and others. Yasin gives information about Salameh, Yousef, and other participants in the bomb plot. Agents observe a chemical burn on his right thigh, making them suspect that he was involved in mixing the chemicals used in the bombing. The next day, he drives FBI agents to the apartment where the bomb was made. Yet Yasin will later be interviewed and claims that the FBI never asked him if he was involved in the bomb plot. Later that evening, he flies to Iraq. Herman will later say, “There was not enough information to hold him and detain him. And the decision was made, and he was allowed to leave.” [Los Angeles Times, 10/12/2001] In 2002, Iraqi Deputy Prime Minister Tariq Aziz will recall, “I have to tell you that we fear[ed] that sending Yasin back to Iraq… was a sting operation [for the US to] tell people later on, look, this man who participated in that event now is in Iraq, etc., and use it as they are doing now, using many false pretexts, you see, to hurt Iraq in their own way.” [60 Minutes, 6/2/2002] Yasin will be indicted in August 1993 for his role in the WTC bombing and the US later puts a $2 million bounty on his head. In October 2001, that will be increased to $25 million. In 2002, Yasin will be interviewed by CBS News in Iraq and will confess to involvement in the WTC bombing but says he was not an Iraqi government agent. Iraqi authorities will tell CBS that Yasin is still imprisoned without charge and has been in prison since 1994, but this has not been independently confirmed. Some continue to point to Yasin as evidence that Iraq was behind the WTC bombing. [Los Angeles Times, 10/12/2001; 60 Minutes, 6/2/2002]

Entity Tags: Tariq Aziz, Federal Bureau of Investigation, Ramzi Yousef, Mohammed Salameh, Neil Herman, Abdul Rahman Yasin

Timeline Tags: Complete 911 Timeline

A UN vehicle burning in Mogadishu, Somalia, on October 3, 1993.A UN vehicle burning in Mogadishu, Somalia, on October 3, 1993. [Source: CNN]Eighteen US soldiers are killed in Mogadishu, Somalia, in a spontaneous gun battle following an attempt by US Army Rangers and Delta Force to snatch two assistants of a local warlord; the event later becomes the subject of the movie Black Hawk Down. A 1998 US indictment will charge Osama bin Laden and his followers with training the attackers. [PBS Frontline, 10/3/2002]
Rocket Propelled Grenades - While rocket-propelled grenades (RPGs) are not usually effective against helicopters, the fuses on the RPGs fired by the Somalis against US helicopters are modified so that they explode in midair. During the Soviet-Afghan War, bin Laden associates had learned from the US and British that, although it is hard to score a direct hit on a helicopter’s weak point—its tail rotor—a grenade on an adjusted fuse exploding in midair can spray a tail rotor with shrapnel, causing a helicopter to crash. [Los Angeles Times, 2/25/2002]
Possibly Trained by Al-Qaeda - For months, many al-Qaeda operatives had been traveling to Somalia and training militants in an effort to oppose the presence of US soldiers there. Even high-ranking al-Qaeda leaders like Mohammed Atef were directly involved (see Late 1992-October 1993).
Comment by Bin Laden - In a March 1997 interview, bin Laden will say of the Somalia attack, “With Allah’s grace, Muslims over there cooperated with some Arab mujaheddin who were in Afghanistan… against the American occupation troops and killed large numbers of them.” [CNN, 4/20/2001]
Some Al-Qaeda Operatives Leave Somalia after Battle - Al-Qaeda operative L’Houssaine Kherchtou, who supports the organization’s operations in Somalia, will later say that he was told this event also led at least some al-Qaeda members to flee Somalia. “They told me that they were in a house in Mogadishu and one of the nights one of the helicopters were shot, they heard some shooting in the next house where they were living, and they were scared, and the next day they left because they were afraid that they will be caught by the Americans.” [Bergen, 2006, pp. 141]

Entity Tags: L’Houssaine Kherchtou, Mohammed Atef, Osama bin Laden, Pakistan Directorate for Inter-Services Intelligence

Timeline Tags: Complete 911 Timeline

One of Ramzi Yousef’s timers seized by Philippines police in January 1995.One of Ramzi Yousef’s timers seized by Philippines police in January 1995. [Source: Peter Lance]Responding to an apartment fire, Philippine investigators uncover an al-Qaeda plot to assassinate the Pope that is scheduled to take place when he visits the Philippines one week later. While investigating that scheme, they also uncover Operation Bojinka, planned by the same people: 1993 WTC bomber Ramzi Yousef and 9/11 mastermind Khalid Shaikh Mohammed (KSM). [Independent, 6/6/2002; Los Angeles Times, 6/24/2002; Los Angeles Times, 9/1/2002] Many initial reports after 9/11 will claim the fire was accidental and the police discovery of it was a lucky break, but in 2002 the Los Angeles Times will report that the police started the fire on purpose as an excuse to look around the apartment. In the course of investigating the fire, one of the main plotters, Abdul Hakim Murad, is arrested. [Los Angeles Times, 9/1/2002] The plot has two main components. On January 12, Pope John Paul II is scheduled to visit Manila and stay for five days. A series of bombs along his parade route would be detonated by remote control, killing thousands, including the Pope. Yousef’s apartment is only 500 feet from the residence where the Pope will be staying. [Reeve, 1999, pp. 78; Lance, 2006, pp. 138] Then, starting January 21, a series of bombs would be placed on airplanes. [Insight, 5/27/2002] Five men, Yousef, Wali Khan Amin Shah, Abdul Hakim Murad, Abd al-Karim Yousef (a.k.a., Adel Anon, Yousef’s twin brother), and Khalid Al-Shaikh (thought to be an alias for KSM) would depart to different Asian cities and place a timed bomb on board during the first leg of passenger planes traveling to Los Angeles, San Francisco, Honolulu, and New York. They would then transfer to another flight and place a second bomb on board that flight. In all, 11 to 12 planes would blow up in a two day period over the Pacific. If successful, some 4,000 people would have been killed. [Agence France-Presse, 12/8/2001; Insight, 5/27/2002; Contemporary Southeast Asia, 12/1/2002] According to another account, some of the bombs would be timed to go off weeks or even months later. Presumably worldwide air travel could be interrupted for months. [Lance, 2003, pp. 260-61] A second wave of attacks involving crashing airplanes into buildings in the US would go forward later, once the pilots are trained for it (see February-Early May 1995).

Entity Tags: Abd al-Karim Yousef, Khalid Shaikh Mohammed, Ramzi Yousef, Wali Khan Amin Shah, Operation Bojinka, Al-Qaeda, Abdul Hakim Murad

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Timeline Tags: Civil Liberties

The Alfred P. Murrah Building after being bombed.The Alfred P. Murrah Building after being bombed. [Source: CBS News]A truck bomb destroys the Alfred P. Murrah Federal Building in Oklahoma City, killing 168 people in America’s worst domestic terrorist attack. Timothy McVeigh, later convicted in the bombing, has ideological roots both in the Patriot world and among neo-Nazis like William Pierce, whose novel, The Turner Diaries (see 1978), served as a blueprint for the attack. [Washington Post, 4/20/1995; Southern Poverty Law Center, 6/2001; Clarke, 2004, pp. 127] Initially, many believe that no American set off the bomb, and suspect Islamist terrorists of actually carrying out the bombing (see 10:00 a.m. April 19, 1995 and After). Their suspicions prove groundless. Investigators will find that the bomb is constructed of some 5,000 pounds of ammonium nitrate and fuel oil, carried in 20 or so blue plastic 55-gallon barrels arranged inside a rented Ryder truck (see April 15, 1995). The bomb is detonated by a slow-burning safety fuse, most likely lit by hand. The fuse is attached to a much faster-burning detonation cord (“det cord”) which ignites the fertilizer and fuel-oil mixture. [New York Times, 4/27/1995] The Murrah Federal Building houses a number of federal agencies, including offices for the Bureau of Alcohol, Tobacco and Firearms (BATF); the Social Security Administration; the Housing and Urban Development (HUD), Veterans Affairs, and Agriculture departments; and the Secret Service. [Washington Post, 4/20/1995] It encompasses an entire city block, between 5th and 4th Streets and Harvey and Robinson Streets, and features a U-shaped, indented drive on 5th that allows for quick pickup and delivery parking. The entire building’s facade on this side is made of glass, allowing passersby to see into the offices in the building, as well as into the America’s Kids day care center on the second floor, which by this time is filling with children. It is in this driveway that McVeigh parks his truck. [Serrano, 1998, pp. 99-102]
Entering the City - McVeigh drives into Oklahoma City, entering around 8:30 a.m. from his overnight stop in Ponca City, Oklahoma; the details reported of his entrance into the city vary (see 7:00 a.m. - 8:35 a.m., April 19, 1995). At 8:55 a.m., a security camera captures the Ryder truck as it heads towards downtown Oklahoma City [Douglas O. Linder, 2006] , a sighting bolstered by three people leaving the building who later say they saw the truck parked in front of the Murrah Building around this time. At 8:57, a security camera captures an image of McVeigh’s Ryder truck being parked outside the Murrah Building in a handicapped zone. One survivor of the blast, Marine recruiter Michael Norfleet, later recalls seeing the Ryder truck parked just outside the building next to the little circle drive on 5th Street leading up to the main entrance of the building. Norfleet had parked his black Ford Ranger in front of the Ryder.
McVeigh Lights Fuses - McVeigh drives the Ryder truck west past the Murrah Building on NW Fourth Street, turns north on a one-way street, and turns right on Fifth Street. He pulls the truck over and parks near the Firestone store, next to a chain-link fence. He then lights the five-minute fuses from inside the cab (see 8:15 a.m. and After, April 18, 1995), sets the parking brake, drops the key behind the seat, opens the door, locks the truck, exits, and shuts the door behind him. A man later claims to have hit his brakes to avoid someone matching McVeigh’s description as he crossed Fifth Street around 9:00 a.m. McVeigh walks quickly toward a nearby YMCA building where he has hidden his getaway car, a battered yellow Mercury Marquis (see April 13, 1995), in the adjoining alleyway, crossing Robinson Street and crossing another street to get to the alleyway. He begins to jog as he approaches his car. He later says he remembers a woman looking at him as she is walking down the steps to enter the building; he will describe her as white, in her mid-30s, with dirty blonde hair. According to McVeigh’s own recollection, he is about 20 feet into the alley when the bomb goes off. [Stickney, 1996, pp. 184-185; PBS Frontline, 1/22/1996; Serrano, 1998, pp. 158; Douglas O. Linder, 2006; The Oklahoman, 4/2009]
Truck Explodes - At 9:02 a.m., the truck explodes, destroying most of the Murrah Building and seriously damaging many nearby buildings. Eventually, it will be determined that 168 people die in the blast, including 19 children. Over 500 are injured. The children are in the second-story day care center just above the parking space where McVeigh leaves the Ryder truck. McVeigh will later tell his biographers that he is lifted off his feet by the power of the blast.
Devastation and Death - When the bomb detonates, the day care center and the children plummet into the basement. The building, constructed with large glass windows, collapses, sending a wave of flying glass shards and debris into the building and the surrounding area. The oldest victim is 73-year-old Charles Hurlbert, who has come to the Social Security office on the first floor. Hurlbert’s wife Jean, 67, also dies in the blast. The youngest victim is four-month-old Gabeon Bruce, whose mother is also in the Social Security office. One victim, Rebecca Anderson, is a nurse who runs towards the building to render assistance. She never makes it to the building; she is struck in the head by a piece of falling debris and will die in a hospital four days after the blast. Her heart and kidneys will be transplanted into survivors of the bombing. [Denver Post, 6/3/1997; New York Times, 6/3/1997; Serrano, 1998, pp. 153-154; Oklahoma City Journal Record, 3/29/2001] Sherri Sparks, who has friends still unaccounted for in the building, tells a reporter in the hours after the blast, “Oh, I can’t stand the thought of… those innocent children, sitting there playing, thinking they’re safe, and then this happens.” The explosion leaves a 30-foot-wide, 8-foot-deep crater in the street that is covered by the wreckage of the building’s upper floors. The north face of the nine-story building collapses entirely. [Washington Post, 4/20/1995; Washington Post, 4/22/1995] Mary Heath, a psychologist who works about 20 blocks from the Murrah Building, says the blast “shook the daylights out of things—it scared us to death. We felt the windows shake before we heard the noise.” In a neighboring building, a Water Resources Board meeting is just commencing; the audiotape of the meeting captures the sound of the blast (see 9:02 a.m. and After, April 19, 1995). [Washington Post, 4/20/1995; The Oklahoman, 4/2009] Norfleet, trapped in the Marine Corps office, is thrown into a wall by the explosion. His skull is fractured, and a shard of glass punctures his right eye. Three separate arteries are pierced, and Norfleet begins bleeding heavily. Two supply sergeants in the office are far less injured; Norfleet asks one, “How bad am I hurt?” and one replies, “Sir, you look really bad.” One of the two begins giving Norfleet first aid; Norfleet later recalls: “He immediately went into combat mode and started taking care of me. He laid me on a table and he started looking for bandages to administer first aid. And while I was laying on that table, I just knew that I was losing strength and that if I stayed in the building, I would die.” Norfleet wraps a shirt around his head and face to slow the bleeding, and the two sergeants help him to the stairs, through the fallen rubble, and eventually out. Norfleet will later say that he follows “a blood trail of somebody that had gone down the steps before me” to get outside, where he is quickly put into an ambulance. He loses almost half his body’s blood supply and his right eye. He will never fly again, and will soon be discharged for medical incapacity. [Serrano, 1998, pp. 161-162] Eighteen-month-old Phillip Allen, called “P.J.” by his parents, miraculously survives the blast. The floor gives way beneath him and he plunges 18 feet to land on the stomach of an adult worker on the floor below, Calvin Johnson. Landing on Johnson’s stomach saves P.J.‘s life. Johnson is knocked unconscious by the blast and by the impact of the little boy falling on him, but when he awakes, he carries the toddler to safety. P.J.‘s grandfather calls the child “Oklahoma’s miracle kid,” and media reports use the label when retelling the story of the miraculous rescue. P.J. is one of six children in the day care center to survive the blast. [Stickney, 1996, pp. 275-277] Some people later report their belief that the Murrah Building was rocked by a second explosion just moments after the first one, the second coming from a secure area managed by the Bureau of Alcohol, Tobacco and Firearms (BATF) that illegally stored explosives. Law professor Douglas O. Linder will later write, “Both seismic evidence and witness testimony supports the ‘two blast theory.’” [Douglas O. Linder, 2006] That theory is later disputed (see After 9:02 a.m. April 19, 1995).
Explosion's Effects Felt Miles Away - Buildings near the Murrah are also damaged, seven severely, including the Journal Record newspaper building, the offices of Southwestern Bell, the Water Resources Board, an Athenian restaurant, the YMCA, a post office building, and the Regency Tower Hotel. Two Water Resources Board employees and a restaurant worker are killed in the blast. The Journal Record building loses its roof. Assistant Fire Chief Jon Hansen later recalls, “The entire block looked like something out of war-torn Bosnia.” Every building within four blocks of the Murrah suffers some effects. A United Parcel Service truck 10 miles away has its windows shattered by the blast. Cars in parking lots around the area catch fire and burn. Millions of sheets of paper, and an innumerable number of glass shards, shower down for hundreds of feet around the building. [Stickney, 1996, pp. 28-30]
Truck Axle Crushes Nearby Car - Richard Nichols (no relation to bomber Timothy McVeigh’s co-conspirator Terry Nichols), a maintenance worker standing with his wife a block and a half away from the Murrah Building, is spun around by the force of the blast. They throw open the back door of their car and begin taking their young nephew Chad Nichols out of the back seat, when Richard sees a large shaft of metal hurtling towards them. The “humongous object… spinning like a boomerang,” as Richard later describes it, hits the front of their Ford Festiva, smashing the windshield, crushing the front end, driving the rear end high into the air, and sending the entire car spinning backwards about 10 feet. Chad is not seriously injured. The metal shaft is the rear axle of the Ryder truck. Later, investigators determine that it weighs 250 pounds and was blown 575 feet from where the truck was parked. Governor Frank Keating (R-OK) points out the axle to reporters when he walks the scene a day or so later, causing some media outlets to incorrectly report that Keating “discovered” the axle. The scene will take investigators days to process for evidence. [Stickney, 1996, pp. 32; New York Times, 6/3/1997; Serrano, 1998, pp. 187-189]
First Responders Begin Arriving - Within minutes, survivors begin evacuating the building, and first responders appear on the scene (see 9:02 a.m. - 10:35 a.m. April 19, 1995).
McVeigh's Getaway - McVeigh flees the bomb site in his Mercury getaway car (see 9:02 a.m. and After, April 19, 1995), but is captured less than 90 minutes later (see 9:03 a.m. -- 10:17 a.m. April 19, 1995).

Rescue workers removing bodies from the Egyptian embassy in Islamabad.Rescue workers removing bodies from the Egyptian embassy in Islamabad. [Source: Canadian Broadcasting Corporation]The Islamic Jihad blows up the Egyptian Embassy in Islamabad, Pakistan. Two cars filled with explosives crash through the embassy gates, killing the bombers and sixteen others. Ayman al-Zawahiri will later write in a book, “The bomb left the embassy’s ruined building as an eloquent and clear message.” Islamic Jihad is already closely tied to al-Qaeda by this time. [New Yorker, 9/9/2002] The Egyptian government had recently dispatched up to 100 government agents to London with the task of eliminating militants opposed to the Egyptian government. The Independent will later report, “Sources in Cairo said that several of the dead embassy officials were working under cover as diplomats to help the Pakistani authorities track down” militants. In the wake of the attack, plans to send more Egyptian government agents to Pakistan to hunt militants in that region are scuttled. [Independent, 12/6/1995] Some of the money for the bombing operation was apparently raised by al-Zawahiri on a fundraising trip to the US (see Late 1994 or 1995). One suspect, a Canadian citizen named Ahmed Said Khadr, will be arrested in Pakistan a short time after the bombings. He will soon be released at the request of the Canadian prime minister, but will later be revealed to be a founding member of al-Qaeda (see January 1996-September 10, 2001).

Entity Tags: Ayman al-Zawahiri, Ahmed Said Khadr, Islamic Jihad

Timeline Tags: Complete 911 Timeline

A Pakistani-based proliferation network centered around nuclear scientist A. Q. Khan and the ISI intelligence agency begins to use Turkish fronts to acquire technology in the US. This move is made because it is thought Turks are less likely to attract suspicion than Pakistanis. At one point the operation is headed by ISI Director Lt. Gen. Mahmood Ahmed. According to FBI whistleblower Sibel Edmonds, intercepted communications show Mahmood and his colleagues stationed in Washington are in constant contact with attachés at the Turkish embassy. Edmonds will also say that venues such as the American Turkish Council (ATC), a Washington-based lobby group, are used for handovers, and packages containing nuclear secrets are then delivered by Turkish operatives, using their cover as members of the diplomatic and military community, to contacts at the Pakistani embassy in Washington. Edmonds will also allege: “Certain greedy Turkish operators would make copies of the material and look around for buyers. They had agents who would find potential buyers.” [Sunday Times (London), 1/6/2008]

Entity Tags: Pakistan Directorate for Inter-Services Intelligence, American-Turkish Council, Mahmood Ahmed, Sibel Edmonds

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network

Law professor John Yoo writes a lengthy essay for the California Law Review entitled “The Continuation of Politics by Other Means: The Original Understanding of War Powers,” in which he argues that the Founding Fathers intended to empower presidents to launch wars without Congressional permission. Yoo has clerked for conservative judge Laurence Silberman and equally conservative Supreme Court Justice Clarence Thomas, and served for a year as counsel to then-Senate Judiciary Committee Chairman Orrin Hatch (R-UT). He has become a regular speaker at Federalist Society events, the informal but influential group of conservative lawyers, judges, and legal scholars who will come to have so much influence in the Bush administration. You argues that for generations, Constitutional scholars have misread the Constitution: the Founders actually supported, not repudiated, the British model of executive power that gave the king the sole power of declaring war and committing forces to battle. The Constitution’s granting of the legislature—Congress—the power to “declare war” is merely, Yoo writes, a reference to the ceremonial role of deciding whether to proclaim the existence of a conflict as a diplomatic detail. The Founders always intended the executive branch to actually declare and commence war, he writes. Most other Constitutional scholars will dismiss Yoo’s arguments, citing notes from the Constitutional Convention that show the Founders clearly intended Congress, not the president, to decide whether to commit the country to war. One of those Founders, James Madison, wrote in 1795 that giving a president the unilateral ability to declare war “would have struck, not only at the fabric of the Constitution, but at the foundation of all well organized and well checked governments. The separation of the power of declaring war from that of conducting it, is wisely contrived to exclude the danger of its being declared for the sake of its being conducted.” [Savage, 2007, pp. 80-81] Yoo will go on to join the Bush administration’s Office of Legal Counsel, and write numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002).

Entity Tags: Federalist Society, John C. Yoo

Timeline Tags: Civil Liberties

After pressure from the US (see March-May 1996), the Sudanese government asks bin Laden to leave the country. He decides to go to Afghanistan. He departs along with many other al-Qaeda members, plus much money and resources. Bin Laden flies to Afghanistan in a C-130 transport plane with an entourage of about 150 men, women, and children, stopping in Doha, Qatar, to refuel, where governmental officials greet him warmly. [Los Angeles Times, 9/1/2002; Coll, 2004, pp. 325] The US knows in advance that bin Laden is going to Afghanistan, but does nothing to stop him. Sudan’s defense minister Elfatih Erwa later says in an interview, “We warned [the US]. In Sudan, bin Laden and his money were under our control. But we knew that if he went to Afghanistan no one could control him. The US didn’t care; they just didn’t want him in Somalia. It’s crazy.” [Washington Post, 10/3/2001; Village Voice, 10/31/2001] US-al-Qaeda double agent Ali Mohamed handles security during the move. [Raleigh News and Observer, 10/21/2001]

Entity Tags: Somalia, Osama bin Laden, Sudan, Elfatih Erwa, Al-Qaeda, Ali Mohamed

Timeline Tags: Complete 911 Timeline

Former Defense Secretary Dick Cheney, speaking at an awards ceremony for the Gerald R. Ford Foundation, tells listeners that he intends to do whatever he can to “restore” the power of the presidency. If he ever returns to Washington, he says he will roll back what he calls “unwise” limits on the presidency imposed after the Vietnam War and Watergate. “I clearly do believe, and have spoken directly about the importance of a strong president,” he says. “I think there have been times in the past, oftentimes in response to events such as Watergate or the war in Vietnam, where Congress has begun to encroach upon the powers and responsibilities of the president: that it was important to try to go back and restore that balance.” [Savage, 2007, pp. 9]

Entity Tags: Richard (“Dick”) Cheney

Timeline Tags: Civil Liberties

Destruction at the Khobar Towers, Dhahran, Saudi Arabia.Destruction at the Khobar Towers, Dhahran, Saudi Arabia. [Source: US Air Force]Explosions destroy the Khobar Towers in Dhahran, Saudi Arabia, killing 19 American soldiers and wounding 500. [CNN, 6/26/1996] Saudi officials will later interrogate the suspects, declare them guilty, and execute them—without letting the FBI talk to them. [PBS Frontline, 2001; Irish Times, 11/19/2001] Saudis will blame Hezbollah, the Iranian-influenced group, but US investigators will still believe Osama bin Laden was involved. [Seattle Times, 10/29/2001] US intelligence will be listening when al-Qaeda’s number two leader Ayman al-Zawahiri calls bin Laden two days after the bombing to congratulate him on the operation (see June 27, 1996). The New York Times will report that Mamoun Darkazanli, a suspected al-Qaeda financier with extensive ties to the al-Qaeda Hamburg cell, is involved in the attack. [New York Times, 9/25/2001; New York Times, 9/29/2001] Bin Laden will admit to instigating the attacks in a 1998 interview. [Miami Herald, 9/24/2001] Ironically, the bin Laden family’s construction company will be awarded the contract to rebuild the installation. [New Yorker, 11/5/2001] In 1997, Canada will catch one of the Khobar Towers attackers and extradite him to the US. However, in 1999, he will be shipped back to Saudi Arabia before he can reveal what he knows about al-Qaeda and the Saudis. One anonymous insider will call it “President Clinton’s parting kiss to the Saudis.” [Palast, 2002, pp. 102] In June 2001, a US grand jury will indict 13 Saudis for the bombing. According to the indictment, Iran and Hezbollah were also involved in the attack. [US Congress, 7/24/2003]

Entity Tags: Ayman al-Zawahiri, Federal Bureau of Investigation, Hezbollah, Osama bin Laden, William Jefferson (“Bill”) Clinton, Al-Qaeda, Mamoun Darkazanli

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In the wake of the Khobar Towers bombing in Saudi Arabia (see June 25, 1996), the Saudi government continues to stonewall about their knowledge of radical militants in the country. Official inquiries about bin Laden go unanswered and the Saudis give no help to a US probe about the bombing. But often the US does not even ask the Saudis questions for fear of upsetting the Saudi government. Former US officials will later claim that even after the bombing, the CIA instructed officials at its Saudi station not to collect information on Islamic extremists in Saudi Arabia. [US News and World Report, 12/15/2003] It is not known how long this policy will continue, but there is evidence it continues until 9/11. In August 2001, former CIA agent Robert Baer will attempt to give the CIA a list of hundreds of al-Qaeda operatives in Saudi Arabia and Yemen, but the CIA will show no interest in it (see August 2001). Fifteen of the nineteen 9/11 hijackers will reportedly come from Saudi Arabia.

Entity Tags: Saudi Arabia, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

In 1999, a retired CIA official will claim that two days after the Khobar Towers bombing in Saudi Arabia (see June 25, 1996), bin Laden is congratulated by colleagues about the bombing. Both Ayman al-Zawahiri, head of Islamic Jihad and al-Qaeda’s number two leader, and Ashra Hadi, head of the Palestinian Islamic Jihad, are monitored by the NSA as they call bin Laden. This helps confirm that bin Laden was being monitored while using his first satellite phone (see Early 1990s). It will be widely reported that he was monitored after he started using his second satellite phone later in 1996 (see November 1996-Late August 1998). Bin Laden does not exactly publicly take credit for the bombing, but later in the year he will say, “When I got the news about these blasts, I was very happy. This was a noble act. This was a great honor but, unfortunately, I did not conduct these explosions personally.” [Reeve, 1999, pp. 187; New Yorker, 9/9/2002]

Entity Tags: Ayman al-Zawahiri, National Security Agency, Osama bin Laden, Ashra Hadi

Timeline Tags: Complete 911 Timeline

An Inmarsat Compact M satellite phone, the type used by bin Laden.An Inmarsat Compact M satellite phone, the type used by bin Laden. [Source: Inmarsat]During this period, Osama bin Laden uses a satellite phone to direct al-Qaeda’s operations. The phone—a Compact M satellite phone, about the size of a laptop computer—was purchased by a student in Virginia named Ziyad Khaleel for $7,500 using the credit card of a British man named Saad al-Fagih. After purchasing the phone, Khaleel sent it to Khalid al-Fawwaz, al-Qaeda’s unofficial press secretary in London (see Early 1994-September 23, 1998). Al-Fawwaz then shipped it to bin Laden in Afghanistan. [CNN, 4/16/2001] It appears US intelligence actually tracks the purchase as it occurs (see November 1996-Late December 1999), probably because an older model satellite phone bin Laden has is already being monitored (see Early 1990s). Bin Laden’s phone (873682505331) is believed to be used by other top al-Qaeda leaders as well, including Ayman al-Zawahiri and Mohammad Atef. Al-Fawwaz also buys satellite phones for other top al-Qaeda leaders around the same time. Though the calls made on these phones are encrypted, the NSA is able to intercept and decrypt them. As one US official will put it in early 2001, “codes were broken.” [United Press International, 2/13/2001; Newsweek, 2/18/2002] The Los Angeles Times will report that the monitoring of these phones “produced tens of thousands of pages of transcripts over two years.” [Los Angeles Times, 10/14/2001] Bin Laden’s satellite phone replaces an older model he used in Sudan that apparently was also monitored by the NSA (see Early 1990s). Billing records for his new phone are eventually released to the media in early 2002. Newsweek will note, “A country-by-country analysis of the bills provided US authorities with a virtual road map to important al-Qaeda cells around the world.” [Sunday Times (London), 3/24/2002] The countries called are:
bullet Britain (238 or 260). Twenty-seven different phone numbers are called in Britain. Accounts differ on the exact number of calls. Khalid al-Fawwaz, who helps publish statements by bin Laden, receives 143 of the calls, including the very first one bin Laden makes with this phone. Apparently most of the remaining calls are made to pay phones near him or to his associates. He also frequently calls Ibrahim Eidarous, who works with al-Fawwaz and lives near him. [CNN, 4/16/2001; Newsweek, 2/18/2002; Sunday Times (London), 3/24/2002; O'Neill and McGrory, 2006, pp. 111]
bullet Yemen (221). Dozens of calls go to an al-Qaeda communications hub in Sana’a, Yemen, which is run by the father-in-law of 9/11 hijacker Khalid Almihdhar (see Late August 1998). [Newsweek, 2/18/2002; Los Angeles Times, 9/1/2002; Bamford, 2008, pp. 8]
bullet Sudan (131). Bin Laden lived in Sudan until 1996 (see May 18, 1996), and some important al-Qaeda operatives remained there after he left (see February 5, 1998). [Sunday Times (London), 3/24/2002]
bullet Iran (106). Newsweek will later report: “US officials had little explanation for the calls to Iran. A Bush administration official said that US intelligence has believed for years that hard-line anti-American factions inside Iran helped bin Laden’s organization operate an ‘underground railroad’ smuggling Islamic militants to al-Qaeda training camps in Afghanistan.” [Newsweek, 2/18/2002; Sunday Times (London), 3/24/2002]
bullet Azerbaijan (67). An important al-Qaeda operative appears to be based in Baku, Azerbaijan. [Washington Post, 5/2/2001] This is most likely Ahmad Salama Mabruk, who is very close to al-Qaeda number two Ayman al-Zawahiri and is said to be the head of the al-Qaeda cell there. He kidnapped by the CIA in Baku in late August 1998 (see Late August 1998).
bullet Kenya (at least 56). In the embassy bombings trial, prosecutors introduce evidence showing 16 calls are made on this phone to some of the embassy bombers in Kenya (see 10:35-10:39 a.m., August 7, 1998), apparently all before a raid in August 1997 (see August 21, 1997). The defense introduces evidence showing at least 40 more calls are made after that time (see Late 1996-August 1998). [CNN, 4/16/2001]
bullet Pakistan (59).
bullet Saudi Arabia (57).
bullet A ship in the Indian Ocean (13).
bullet The US (6).
bullet Italy (6).
bullet Malaysia (4).
bullet Senegal (2). [Sunday Times (London), 3/24/2002]
bullet Egypt (unknown). Newsweek reports that calls are made to Egypt but doesn’t say how many. [Newsweek, 2/18/2002]
bullet Iraq (0). Press reports note that the records indicate zero calls were made to Iraq. [Newsweek, 2/18/2002; Sunday Times (London), 3/24/2002] 1,100 total calls are made on this phone. Adding up the above numbers means that the destination of over 100 calls is still unaccounted for. [Newsweek, 2/18/2002] The use of this phone stops two months after the August 1998 embassy bombings in Africa. However, it appears bin Laden and other al-Qaeda leaders continue to use other satellite phones occasionally after this time. Shortly after 9/11, James Bamford, an expert authority on the agency, says “About a year or so ago the NSA lost all track of him.… He may still use [satellite phones] occasionally to talk about something mundane, but he discovered that the transmitters can be used for honing.” [CNN, 9/21/2001] According to a different account, bin Laden will attempt to use a different phone communication method, but US intelligence will soon discover it and continue monitoring his calls (see Late 1998 and After).

Entity Tags: Ziyad Khaleel, Saad al-Fagih, Osama bin Laden, Ibrahim Eidarous, Khalid al-Fawwaz, Mohammed Atef, Al-Qaeda, Ayman al-Zawahiri, Ahmad Salama Mabruk

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Abdel-Bari Atwan, editor in chief of the British-based pan-Arab daily al-Quds al-Arabi, travels to Afghanistan to interview Osama bin Laden in the mountains of Tora Bora.
Atwan's Journey to Afghanistan - The interview is arranged by Khalid al-Fawwaz, bin Laden’s representative in Europe. Atwan travels secretly to Peshawar, Pakistan, where he meets a representative of bin Laden. Then, dressed as an Afghan, he crosses the border with a series of guides and travels to Jalalabad in eastern Afghanistan, where he meets al-Qaeda manager Mohammed Atef. Atwan is then taken up into the mountains, to the Eagle’s Nest base, where he meets bin Laden. Atwan first meets him “sitting cross-legged on a carpet, a Kalashnikov in his lap,” and they chat informally and then have dinner. Atwan spends two days in bin Laden’s company, and is surprised that such a rich Saudi is staying in such a humble cave, measuring six meters by four, and eating such poor food.
Bin Laden Speaks to Atwan - Bin Laden makes a number of comments during the two days, saying he has no fear of death, he still controls significant sums of money, the US military presence in Saudi Arabia is wrong, and the Sudanese government treated him badly over his recent expulsion and their non-repayment of funds he invested in Sudan (see May 18, 1996). He also talks of his time in Sudan and Somalia, as well as attempts on his life and bribes offered to him to tow the line by Saudi intelligence services. In addition, he claims responsibility for the “Black Hawk Down” incident (see October 3-4, 1993) and the Khobar Towers bombing (see June 25, 1996), and says other operations are in preparation. Atwan also notes that one part of the Eagle’s Nest has computers and Internet access, although this is not common in 1996.
No Signs of Bin Laden's Poor Health - Before the trip, Atwan had heard that bin Laden suffered from some mild form of diabetes. However, he will later comment: “I didn’t notice him taking any medication or showing any signs of ill health at all. We walked for more than two hours in the snow-covered mountains, and he seemed fit and well.” Therefore, Atwan will describe later accounts that say bin Laden requires kidney dialysis as “fanciful.” [Atwan, 2006, pp. 15-37, 61-62]

Entity Tags: Mohammed Atef, Abdel-Bari Atwan, Khalid al-Fawwaz, al-Quds al-Arabi, Al-Qaeda, Osama bin Laden

Timeline Tags: Complete 911 Timeline

An unnamed high-ranking State Department official helps a nuclear smuggling ring connected to Pakistani nuclear scientist A. Q. Khan and Pakistan’s ISI to plant “moles” in US military and academic institutions that handle nuclear technology, according to FBI translator Sibel Edmonds. Edmonds will later leave the FBI, becoming a whistleblower, and say she knows this based on telephone conversations she translated shortly after 9/11. The moles, mostly Ph.D students, are planted by Turkish and Israeli elements in the network, which obtains nuclear technology for Pakistan’s nuclear weapons program and for re-sale by Khan. Edmonds will later say she thinks there are several transactions of nuclear material every month: “I heard at least three transactions like this over a period of 2½ years. There are almost certainly more.” She will also say that the network appears to obtain information “from every nuclear agency in the United States.” The State Department official apparently arranges security clearance for some of the moles, enabling them to work in sensitive nuclear research facilities, including the Los Alamos nuclear laboratory in New Mexico, which is responsible for the security of the US nuclear deterrent. [Sunday Times (London), 1/6/2008] The high-ranking State Department official who is not named by Britain’s Sunday Times is said to be Marc Grossman by both Larisa Alexandrovna of Raw Story and former CIA officer Philip Giraldi, writing in the American Conservative. [Raw Story, 1/20/2008; American Conservative, 1/28/2008; American Conservative, 11/1/2009]

Entity Tags: US Department of State, Sibel Edmonds, Philip Giraldi, Larisa Alexandrovna, Marc Grossman, Pakistan Directorate for Inter-Services Intelligence, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network

In 2004, it will be reported, “A former very senior CIA counterintelligence official told UPI that in 1998-99, the CIA discovered an Israeli couple, who were subcontracted to a US phone company, were working for Mossad, the Israeli intelligence service. ‘They did incredible damage—they got incredibly sensitive data, including key words identifying individuals or projects,’” this source said, adding he himself gave the case to the FBI. Additional details are not known. [United Press International, 12/9/2004] In 2005, a US criminal indictment will reveal that the FBI began monitoring some Israeli diplomatic officials in the US by April 1999 (see April 13, 1999-2004), but is it not known if there is any connection between that and this case.

Entity Tags: Israel Institute for Intelligence and Special Tasks (Mossad), Central Intelligence Agency, Federal Bureau of Investigation, United Press International

Timeline Tags: Complete 911 Timeline

A US grand jury issues a sealed indictment, charging bin Laden and other al-Qaeda leaders with conspiracy to attack the United States. [PBS Frontline, 10/3/2002] The grand jury began preparing the indictment in January 1998 (see January 1998). It is largely based on information from Jamal al-Fadl, a former al-Qaeda operative (see June 1996-April 1997). [PBS Frontline, 2001; New York Times, 9/30/2001; US Congress, 7/24/2003] This secret indictment will be superseded by a public one issued in November 1998 (see November 4, 1998). [PBS Frontline, 10/3/2002]

Entity Tags: Osama bin Laden, Al-Qaeda, Jamal al-Fadl

Timeline Tags: Complete 911 Timeline

Usama al-Kini, a.k.a. Fahid Muhammad Ally Msalam.Usama al-Kini, a.k.a. Fahid Muhammad Ally Msalam. [Source: FBI]Most of the al-Qaeda operatives involved in the African embassy bombings (see 10:35-10:39 a.m., August 7, 1998) leave the country the night before the bombings. Abdullah Ahmed Abdullah and Ahmed Khalfan Ghailani fly from Nairobi to Karachi, Pakistan, on one flight. Usama al-Kini (a.k.a. Fahid Muhammad Ally Msalam), Mohammed Saddiq Odeh, and five unnamed bombers fly from Nairobi to Karachi with a stopover in Dubai on another flight. Some use false passports, but others, such as Abdullah, travel in their real name. Two others, Sheikh Ahmed Salim Swedan and Mustafa Fadhil, flew to Pakistan on August 2. Odeh is arrested at 5:30 a.m., Kenya time, while going through customs in Karachi, but the others on his flight are not (see 5:30 a.m., August 7, 1998). Two suicide bombers are killed in the bombings. The only operatives who remain in East Africa after the bombings are Fazul Abdullah Mohammed (a.k.a. Haroun Fazul), who volunteered to clean up the evidence in Kenya, and Khalfan Khamis Mohamed, who volunteered to do the same in Tanzania, plus Mohamed al-Owhali, one of the suicide bombers in Kenya who unexpectedly ran away at the last minute and survived with only minor injuries. [United Press International, 1/2/2001; United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001] Given the extent to which US intelligence was monitoring the members of the Kenyan cell (see April 1996 and May 1998), and even reportedly had multiple informants in the cell (see Before August 7, 1998), it is unclear how the US missed the departure of nearly every suspect from Kenya.

Entity Tags: Sheikh Ahmed Salim Swedan, Usama al-Kini, Mustafa Fadhil, Mohamed al-Owhali, Abdullah Ahmed Abdullah, Mohammed Saddiq Odeh, Ahmed Khalfan Ghailani, Khalfan Khamis Mohamed, Fazul Abdullah Mohammed

Timeline Tags: Complete 911 Timeline

Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right).Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right). [Source: Associated Press]Two US embassies in Africa are bombed within minutes of each other. At 10:35 a.m., local time, a suicide car bomb attack in Nairobi, Kenya, kills 213 people, including 12 US nationals, and injures more than 4,500. Mohamed al-Owhali and someone known only as Azzam are the suicide bombers, but al-Owhali runs away at the last minute and survives. Four minutes later, a suicide car bomb attack in Dar es Salaam, Tanzania, kills 11 and injures 85. Hamden Khalif Allah Awad is the suicide bomber there. The attacks will be blamed on al-Qaeda. [PBS Frontline, 2001; United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001] The Tanzania death toll is low because, remarkably, the attack takes place on a national holiday so the US embassy there is closed. [Miller, Stone, and Mitchell, 2002, pp. 195] The attack shows al-Qaeda has a capability for simultaneous attacks. The Tanzania bombing appears to have been a late addition, as one of the arrested bombers will allegedly tell US agents that it was added to the plot only about 10 days in advance. [United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001] A third attack against the US embassy in Uganda does not take place due to a last-minute delay (see August 7, 1998). [Associated Press, 9/25/1998] August 7, 1998, is the eighth anniversary of the arrival of US troops in Saudi Arabia and some people will speculate that this is the reason for the date of the bombings. [Gunaratna, 2003, pp. 46] In the 2002 book The Cell, reporters John Miller, Michael Stone, and Chris Mitchell will write: “What has become clear with time is that facets of the East Africa plot had been known beforehand to the FBI, the CIA, the State Department, and to Israeli and Kenyan intelligence services.… [N]o one can seriously argue that the horrors of August 7, 1998, couldn’t have been prevented.” They will also comment, “Inexplicable as the intelligence failure was, more baffling still was that al-Qaeda correctly presumed that a major attack could be carried out by a cell that US agents had already uncovered.” [Miller, Stone, and Mitchell, 2002, pp. 195, 206] After 9/11, it will come to light that three of the alleged hijackers, Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi, had some involvement in the bombings (see October 4, 2001, Late 1999, and 1993-1999) and that the US intelligence community was aware of this involvement by late 1999 (see December 15-31, 1999), if not before.

Entity Tags: Salem Alhazmi, Nawaf Alhazmi, Mohamed al-Owhali, Hamden Khalif Allah Awad, Khalid Almihdhar, Al-Qaeda, Azzam

Timeline Tags: Complete 911 Timeline

Barakat Yarkas (a.k.a. Abu Dahdah).Barakat Yarkas (a.k.a. Abu Dahdah). [Source: Associated Press]A German newspaper will later note, “For much of the 1990s, the Spanish ran an impressive operation against a Madrid al-Qaeda cell, led by Barakat Yarkas, also known as Abu Dahdah. Wiretaps on Yarkas’s phone had revealed that he was in regular contact with [Mohammed Haydar] Zammar and [Mamoun] Darkazanli.” Spanish intelligence began monitoring Yarkas’ cell in 1997, if not earlier (see 1995 and After). It shares this information with the CIA, but not with German intelligence. The CIA also fails to share the information with Germany. A top German intelligence official will later complain, “We simply don’t understand why they didn’t give it to us.” [Stern, 8/13/2003] Spanish intelligence monitors dozens of telephone calls between Darkazanli in Hamburg and suspected al-Qaeda operatives in Spain starting at least by August 1998. On at least four occasions, Darkazanli is monitored as he travels to Spain and visits Yarkas and Mohammed Galeb Kalaje Zouaydi (who will be arrested in Spain in 2002 on charges of being a key al-Qaeda financier (see April 23, 2002)). [Chicago Tribune, 10/19/2003] For instance, at the end of January 2000, Darkazanli is monitored by Spanish intelligence as he meets with Yarkas and some other some suspected al-Qaeda figures. Because the CIA and Spanish intelligence fail to share any of this surveillance information with German intelligence, the Germans are unable to see clear links between Hamburg al-Qaeda operatives and the rest of the al-Qaeda network in Europe. [Chicago Tribune, 11/17/2002] The Spanish will continue to monitor Yarkas and those he communicates with until 9/11, and in fact, in late August 2001 one of his associates will apparently make an oblique reference to the 9/11 attacks (see August 27, 2001).

Entity Tags: Centro Nacional de Inteligencia, Mamoun Darkazanli, Germany, Mohammed Galeb Kalaje Zouaydi, Barakat Yarkas, Central Intelligence Agency, Mohammed Haydar Zammar

Timeline Tags: Complete 911 Timeline

Yellowcake.Yellowcake. [Source: CBC]Pakistani nuclear scientist A. Q. Khan takes a trip to West Africa. Ostensibly, he is going to oversee the construction of the Hendrina Khan Hotel in Timbuktu, Mali, which he bought the year before and is named after his wife, but it is believed that is just a cover for nuclear-related business. He spends several days in Khartoum, Sudan, where he is spotted touring the al-Shifa factory, bombed by the US the year before in response to al-Qaeda bombings in Africa (see August 20, 1998). In 2006, intelligence sources in India and Israel will claim that Khan actually partly owns the factory. Khan then travels to N’Djamena, the capital of Chad, Timbuktu in Mali, and Niamey, the capital of Niger. Niger has considerable uranium deposits and had been a major supplier of yellowcake uranium to Pakistan in the 1970s. Khan returns to Sudan, where he meets with the Sudanese president, and then returns to Pakistan. He is accompanied by his top nuclear aides and a number of Pakistani generals, and all expenses on the trip are paid for by the Pakistani government.
CIA Investigates Khan Trip - CIA undercover agent Valerie Plame Wilson learns about the trip, and the CIA is so concerned that it launches an investigation, especially to find out if Khan could be buying yellowcake from Niger. Plame Wilson’s husband Joseph Wilson, a former National Security Council official and US ambassador to the nearby country of Gabon who has close ties to important politicians in Niger, and who who has just set up a private consulting firm with a focus on advising clients who want to do business in Africa, is approached by officials from the CIA’s National Resources Division (NR) to visit Niger. The agency asks Wilson, who already has a business trip planned to West Africa, to find out what he can about Khan’s trip.
Illicit Uranium Sales Highly Unlikely - Wilson concludes that illicit uranium sales are very unlikely since the French government tightly controls Niger’s uranium mines and uranium sales. However, Khan’s trip does raise concern that he could be working with Osama bin Laden, because of his interest in the al-Shifa factory in Sudan, and because of intelligence that the hotel he owns in Timbuktu was paid for by bin Laden as part of a cooperative deal between them. The CIA writes and distributes a report on the trip. (In 2004, the Senate Intelligence Committee will erroneously conclude that the CIA did not distribute the Wilson-Niger report—see July 9, 2004.) Wilson will keep this trip secret, even refusing to mention it in his 2004 memoir The Politics of Truth, presumably because he signed a confidentiality agreement with the CIA. In 2002, he will return to Niger to investigate if Saddam Hussein could be buying uranium in Niger (see February 21, 2002-March 4, 2002). That will lead to the eventual outing of his wife Plame Wilson’s status as a CIA agent. [Levy and Scott-Clark, 2007, pp. 283-285, 516; Wilson, 2007, pp. 358-360]

Entity Tags: Valerie Plame Wilson, Abdul Qadeer Khan, Osama bin Laden, Joseph C. Wilson

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network, Niger Uranium and Plame Outing

A 2005 US indictment will reveal that two employees for a pro-Israeli lobbying group had somehow obtained classified US information about al-Qaeda and was passing it on to Israeli officials. The two employees are Steven Rosen and Keith Weissman; both work for AIPAC (American Israel Public Affairs Committee) until 2004. On April 13, 1999, Rosen gives Rafi Barak, the former deputy chief of mission at the Israeli embassy in Washington, what he calls a codeword-protected “extremely sensitive piece of intelligence” about terrorist activities in Central Asia. On June 11, 1999, Weissman tells Barak about a classified FBI report on the 1996 Khobar Towers bombing, which has been blamed on al-Qaeda and/or Iran (see June 25, 1996). In retrospect, FBI officials will determine that some, but not all, of this classified information comes from Larry Franklin, a Defense Department analyst on Iran known to be in favor of a tougher US policy regarding Iran (see 2000-2001). It is not known how or why US surveillance of Rosen and Weissman began. [National Public Radio, 8/4/2005; Eastern District of Virginia, 8/4/2005 pdf file; Jerusalem Post, 8/15/2005; Jerusalem Post, 8/17/2005]
Connection to Earlier Investigation? - However, there may be a connection to an earlier investigation. In 1997 and 1998, the FBI monitored Naor Gilon, an official at the Israeli embassy in Washington, as part of an investigation into whether a US intelligence official was illegally giving US spy plane film and other secret material to the Mossad. [Los Angeles Times, 9/3/2004]
Accusations Spark Further Investigation - The US will later accuse Rosen and Weissman of passing classified information given to them by Franklin to Gilon. In any case, the investigation will continue and grow. National Public Radio will later note that from 1999 to 2004, “Franklin, Rosen, and Weissman had regular discussions about the Middle East and about al-Qaeda with a variety of contacts,” sometimes illegally sharing highly classified information. Franklin will plead guilty to sharing classified information in 2005 (see October 5, 2005) while Rosen and Weissman are expected to be tried in 2007 or thereafter. [National Public Radio, 8/4/2005]

Entity Tags: Rafi Barak, Naor Gilon, Keith Weissman, Larry Franklin, American Israel Public Affairs Committee, Steven Rosen

Timeline Tags: Complete 911 Timeline

Former ambassador Joseph Wilson, who has spent much of his political career representing the US in West Africa, visits Niger at the behest of the CIA to investigate what a Senate investigation (see July 9, 2004) will later call “uranium-related matters.” Wilson is chosen in part because his wife, covert CIA official Valerie Plame Wilson, suggested that since he was going to Niger on business in the near future, he “might be willing to use his contacts in the region” to obtain information. The CIA is interested in a meeting between Niger’s former prime minister, Ibrahim Mayaki, and a delegation from Iraq to discuss “expanding commercial relations” between the two nations. Wilson will later say that the subject of uranium never comes up in a meeting he has with Mayaki (see May 2, 2004). However, CIA analysts will interpret Wilson’s information to mean that Mayaki “interpreted ‘expanding commercial relations’ to mean that the [Iraqi] delegation wanted to discuss uranium yellowcake sales.” The CIA will believe that Wilson’s report bolsters its own suspicions that Iraq is attempting to buy yellowcake uranium from Niger. An intelligence officer will later report that Mayaki indicated that the Iraqis had expressed an interest in buying uranium from Niger. [FactCheck (.org), 7/26/2004; FactCheck (.org), 7/22/2005]

Entity Tags: Ibrahim Mayaki, Central Intelligence Agency, Valerie Plame Wilson, Joseph C. Wilson

Timeline Tags: Niger Uranium and Plame Outing

Video footage of Said Bahaji’s wedding in October 1999. Clockwise from top left: Ramzi bin al-Shibh, Said Bahaji, Mamoun Darkazanli, Ziad Jarrah, and Marwan Alshehhi.Video footage of Said Bahaji’s wedding in October 1999. Clockwise from top left: Ramzi bin al-Shibh, Said Bahaji, Mamoun Darkazanli, Ziad Jarrah, and Marwan Alshehhi. [Source: Agence France-Presse]Mamoun Darkazanli, along with most of the Hamburg al-Qaeda cell, attends the wedding of Said Bahaji. Bahaji is one of future 9/11 hijacker Mohamed Atta’s roommates and is believed to be a core member of the cell. The wedding takes place at the Al-Quds mosque in Hamburg. A videotape of the wedding will be discovered by German investigators shortly after 9/11, and eventually more than 20 men will be identified from the video. Other attendees include: Ramzi bin al-Shibh, Marwan Alshehhi, Ziad Jarrah, Mounir El Motassadeq, Mohammed Haydar Zammar, and Abdelghani Mzoudi. [New York Times, 9/10/2002; CBS News, 5/7/2003; 9/11 Commission, 7/24/2004, pp. 345, 561; Vanity Fair, 11/2004] Zammar is Bahaji’s best man in the wedding. [New York Times, 6/20/2002]
Speeches and Songs Promise Martyrdom - The video first shows Bahaji’s nuptial ceremony, followed by a series of radical militant speeches. Bin al-Shibh gives a particularly fiery speech. He says: “It is now as if we were in school, in Arabic lessons. At the end, we have a test. Some will pass this test, [others] will not.” He quotes a poem, saying that when Israel flies its flag over Jerusalem, “how can you bear these humiliations?… When the tyrants attack you, you will then be a wave of fire and blood.” The group then sings songs in Arabic celebrating violent holy war and martyrdom. One song includes the lyrics: “Our squads have been revolutionized.… Against the heresy, like a volcano, like hurricane and fire, we follow the voice of your call.… We will be aglow with readiness for action. We will crush the throne of the oppressor.” Another song celebrates martyrdom and promises many virgins in paradise for martyrs. [Vanity Fair, 11/2004]
Video Shows the 9/11 Plot Is in Motion - The New York Times will later report, “The presence of all of these men at the wedding of Mr. Bahaji has led investigators to believe that the plan to attack the United States had essentially been formed by then.” [New York Times, 9/10/2002]

Entity Tags: Marwan Alshehhi, Mohammed Haydar Zammar, Abdelghani Mzoudi, Said Bahaji, Ziad Jarrah, Mounir El Motassadeq, Ramzi bin al-Shibh

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The US deports Hani El-Sayegh, a Saudi National who is a suspect in the 1996 Khobar Towers bombing (see June 25, 1996), back to Saudi Arabia. [Grey, 2007, pp. 247] The deportation is approved by a US judge. [Washington Post, 10/29/2000]
History - In 1996, el-Sayegh, who had been living in Iran, moved to Kuwait. He later went to Canada, where he cut a deal with American officials that called for him to plead guilty in an unrelated plot against Americans in Saudi Arabia that was never carried out. In 1997, Canada expelled el-Sayegh for suspected terrorist activity. Attorney General Janet Reno allowed him into the United States solely for prosecution under the pact. But after arriving, he said he had not understood the accord, knew nothing about the Khobar attack, and was out of Saudi Arabia when the bombing occurred. Despite this, the Saudis suspected him of being present at the bombing and his brother was held in connection with it, and allegedly tortured in a Saudi jail. [New York Times, 10/12/1999]
Agreement - The deportation follows an agreement between FBI Director Louis Freeh and Prince Naif, Saudi Arabia’s interior minister. Under the agreement, el-Sayagh is returned to Saudi Arabia, and, according to officials familiar with the arrangement, FBI agents will be allowed to watch his interrogation through a one-way mirror and submit questions to his Saudi inquisitors. Washington Post journalist David Vine will comment, “Such practices are sharply at odds with Freeh’s oft-stated message about the FBI’s need to respect human dignity and the tenets of democracy while fighting crime.” Although FBI officials will say a year later they have not seen any indication that el-Sayegh has been tortured, Vine will add, “But agents say privately that when entering a foreign culture to do police work they do not have control over how prisoners are treated and must tread lightly.” [Washington Post, 10/29/2000]
Khobar Towers Attack Could Have Been Prosecuted in US - The Khobar Towers attacks may have been in Saudi Arabia, but were against US nationals, so suspects can be prosecuted in the US. Tony Karon of Time magazine will express surprise at the deportation: “Run that one by again: The United States doesn’t want to try a man suspected of a bomb attack that killed Americans—and they’re sending him home?!” However, the Justice Department apparently thinks there is not enough evidence to try him in the US, and, according to Time correspondent William Dowell, “Clearly, there’s a lower standard of proof in Saudi courts,” so, “It may be easier for Washington if the Saudis handle the trial—and the execution, which would likely follow.”
Possible Geopolitical Motive - According to Karon, an alternative explanation is that geopolitics may be behind the decision: “Sending el-Sayegh… back to Saudi Arabia could solve another touchy problem for Washington.” This is because President Clinton said the US would retaliate against any government that was involved in the attacks, and an Iranian hand is suspected in the bombing. However, according to Time Middle East bureau chief Scott Macleod: “the attack occurred before the election of President Khatami, who has clearly demonstrated a commitment to end state terrorism and normalize Iran’s relations with the rest of the world. Given Washington’s desire to strengthen his reformist government against its hard-line opponents, the US would be unlikely to take military action against Iran unless there were fresh acts of terrorism.” [Time, 10/5/1999]

Entity Tags: Louis J. Freeh, Janet Reno, Hani El-Sayegh, Nayef bin Abdul-Aziz, Federal Bureau of Investigation, Tony Karon, Scott Macleod, William Dowell

Timeline Tags: Torture of US Captives, Complete 911 Timeline

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

A nuclear proliferation network operating in the US penetrates the Pentagon and related institutions, according to FBI whistleblower Sibel Edmonds. Edmonds will later leave the FBI and say she knows this based on telephone conversations she translated as a part of an FBI investigation. The network, which is run by Pakistani scientist A. Q. Khan, but also includes Turkish and Israeli elements, is allegedly helped by a number of senior officials in the Pentagon. Edmonds will later say: “The [senior officials] provided lists of potential moles from Pentagon-related institutions who had access to databases concerning this information. The handlers, who were part of the diplomatic community, would then try to recruit those people to become moles for the network. The lists contained all their ‘hooking points,’ which could be financial or sexual pressure points, their exact job in the Pentagon and what stuff they had access to.” One of the Pentagon figures that is a target of the FBI investigation is Larry Franklin, an analyst who will be jailed in 2006 for passing US defense information to lobbyists and sharing classified information with an Israeli diplomat. According to Edmonds, Franklin is “one of the top people providing information and packages during 2000 and 2001.” [Sunday Times (London), 1/6/2008]

Entity Tags: US Department of Defense, Larry Franklin, Abdul Qadeer Khan, Sibel Edmonds, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network

While the 9/11 hijackers are in the US, the NSA intercepts several calls between them and an al-Qaeda communications hub in Sana’a, Yemen, run by Ahmed al-Hada, who is hijacker Khalid Almihdhar’s father-in-law (see August 4-25, 1998).
Summary of Calls -
bullet The first calls are made by Almihdhar and are intercepted during the spring and summer of 2000 (see Spring-Summer 2000).
bullet More calls are made by hijacker Nawaf Alhazmi after the bombing of the USS Cole in October 2000 (see Mid-October 2000-Summer 2001).
bullet The final call from the US is intercepted just a few weeks before 9/11 (see (August 2001)).
The NSA intercepted the hijackers’ calls outside the US before this (see Early 1999 and December 29, 1999) and continues to do so in 2000 (see Summer 2000) after Almihdhar returns to Yemen (see June 10, 2000 and (Mid-June-Mid-July 2000)).
Calls' Content - Some of the calls may only contain non-operational information, as they are reportedly between Almihdhar and his wife. [9/11 Commission, 7/24/2004, pp. 222; Suskind, 2006, pp. 94; Wright, 2006, pp. 343] However, the calls are also used to relay messages to the 9/11 hijackers. [Embassy of Yemen (Washington), 2/13/2002; MSNBC, 2/14/2002; MSNBC, 5/2005]
Agencies' Roles - The CIA is the lead agency monitoring the communications hub. It has planted bugs inside it and is wiretapping all calls (see Late August 1998). Intercepts of calls to and from the hub are a major plank of the US intelligence community’s effort to fight al-Qaeda. Also involved is the FBI, which is using phone records to plot these calls on a map (see Late 1998-Early 2002). Some of the calls intercepted by US intelligence come from Osama bin Laden’s satellite phone in Afghanistan (see August 4-25, 1998 and Late August 1998). After 9/11, counterterrorism officials will say that the number was one of the hottest targets being monitored by the NSA and was an “intelligence bonanza.” [Los Angeles Times, 12/21/2005; Wright, 2006, pp. 343]
Importance of Failure - Also after 9/11, counterterrorism officials will agree that the failure to follow leads to the US from this number was a huge missed opportunity to stop the 9/11 plot. For instance, FBI agent Kenneth Maxwell will say: “Two al-Qaeda guys living in California—are you kidding me? We would have been on them like white on snow: physical surveillance, electronic surveillance, a special unit devoted entirely to them.” [MSNBC, 7/21/2004; New Yorker, 7/10/2006 pdf file]
Discussed after 9/11 - The failure to roll up the plot based on these communications intercepts will be discussed following 9/11 (see Summer 2002-Summer 2004 and March 15, 2004 and After).

Entity Tags: Federal Bureau of Investigation, Central Intelligence Agency, Khalid Almihdhar, Nawaf Alhazmi, National Security Agency, Hoda al-Hada, Ahmed al-Hada, Kenneth Maxwell

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

German investigators finally agree to the CIA’s request to recruit businessman Mamoun Darkazanli as an informant. An agent of the LfV, the Hamburg state intelligence agency, casually approaches Darkazanli and asks him whether he is interested in becoming a spy. Darkazanli replies that he is just a businessman who knows nothing about al-Qaeda or terrorism. The Germans inform the local CIA representative that the approach failed. The CIA agent persists, asking the German agent to continue to try. However, when German agents ask for more information to show Darkazanli they know of his terrorist ties, the CIA fails to give them any information. As it happens, at the end of January 2000, Darkazanli had just met with Barakat Yarkas in Madrid, Spain. [Chicago Tribune, 11/17/2002] Darkazanli is a longtime friend and business partner of Yarkas, the most prominent al-Qaeda agent in Spain. Yarkas has long been under surveillance by Spanish intelligence, and they have been sharing that intelligence with the CIA (see August 1998-September 11, 2001). [Los Angeles Times, 1/14/2003] The meeting included other suspected al-Qaeda figures, and it was monitored by Spanish police. If the CIA is aware of the Madrid meeting, they do not tell the Germans. [Chicago Tribune, 11/17/2002] A second LfV attempt to recruit Darkazanli also fails. The CIA then attempts to work with federal German intelligence officials in Berlin to “turn” Darkazanli. Results of that effort are not known. [Chicago Tribune, 11/17/2002]

Entity Tags: Landesamt fûr Varfassungsschutz, Mamoun Darkazanli, Ansaldo Energia, Barakat Yarkas, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A covert recording made by the FBI indicates that a Turkish agent is trying to sell nuclear information that he stole from an air force base in Alabama, according to FBI whistleblower Sibel Edmonds. Edmonds will later say that he meets two Saudi Arabian businessmen in Detroit to sell the information. When she listens to the recording, she hears the agent saying, “We have a package and we’re going to sell it for $250,000.” The agent is connected to a ring fronted by Turkish and Israeli elements that arranges the illicit transfer of nuclear information and technology to Pakistan via Turkey (see Mid-Late 1990s and (1997-2002)). [Sunday Times (London), 1/6/2008]

Entity Tags: Sibel Edmonds, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network

The 9/11 hijackers living in Florida receive money from abroad via wire and bank transfers. After 9/11 the FBI and the 9/11 Commission will focus on just two sets of wire transfers, one totaling approximately $10,000 from hijacker associate Ramzi bin al-Shibh (see June 13-September 25, 2000) and another totaling about $110,000 from a plot facilitator later identified as Ali Abdul Aziz Ali (see June 29, 2000-September 18, 2000). [9/11 Commission, 8/21/2004, pp. 134-5 pdf file] Some reports indicate that these are not the only wire transfers and that the hijackers receive extra money that is not subsequently mentioned by the 9/11 Commission (see (July-August 2000), May 2001, Early August-August 22, 2001, Summer 2001 and before, and Late August-Early September 2001). The hijackers also receive money by other means (see January 15, 2000-August 2001).

Entity Tags: Ramzi bin al-Shibh, Ali Abdul Aziz Ali

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

October 12, 2000: USS Cole Bombed by Al-Qaeda

Damage to the USS Cole.Damage to the USS Cole. [Source: Department of Defense]The USS Cole is bombed in the Aden, Yemen harbor by two al-Qaeda militants, Hassan al-Khamri and Ibrahim al-Thawar (a.k.a. Nibras). Seventeen US soldiers are killed and 30 are wounded. The CIA will later conclude that with just slightly more skilled execution, the attack would have killed 300 and sunk the ship. [ABC News, 10/13/2000; Coll, 2004, pp. 532; 9/11 Commission, 7/24/2004, pp. 191] The Islamic Army of Aden (IAA) immediately takes credit for the attack. This is a Yemen-based Muslim militant group widely believed to have close ties to al-Qaeda (see 1996-1997 and After). [Guardian, 10/14/2000] The IAA statement is released by its spokesman, Abu Hamza al-Masri (see Early 1997, (June 1998), and December 28, 1998 and After). Abu Hamza says that the attack was timed to mark the anniversary of the execution of the IAA’s former commander (see October 17, 1999). [O'Neill and McGrory, 2006, pp. 184] The prime minister of Yemen at the time of the bombing will say shortly after 9/11, “The Islamic Army was part of al-Qaeda.” [Guardian, 10/13/2001] The US soon learns the names of some al-Qaeda operatives involved in the attack, including Khalid Shaikh Mohammed, Tawfiq bin Attash and Fahad al-Quso (see Early December 2000), and Abd al-Rahim al-Nashiri (see November-December 2000). 9/11 hijackers Ramzi bin al-Shibh (see October 10-21, 2000) and Khalid Almihdhar (see Around October 12, 2000) may also have been involved. This is a repeat of a previously attempted attack, against the USS The Sullivans, which failed and was apparently undetected (see January 3, 2000). [Los Angeles Times, 12/22/2002] The 9/11 Commission will later say the Cole bombing “was a full-fledged al-Qaeda operation, supervised directly by bin Laden. He chose the target and location of the attack, selected the suicide operatives, and provided the money needed to purchase explosives and equipment.” [9/11 Commission, 7/24/2004, pp. 190]

Entity Tags: Khalid Shaikh Mohammed, Khallad bin Attash, Ramzi bin al-Shibh, Islamic Army of Aden, USS Cole, Osama bin Laden, Ibrahim al-Thawar, Khalid Almihdhar, Fahad al-Quso, Abd al-Rahim al-Nashiri, Hassan al-Khamri, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The NSA completes a report for the incoming Bush administration entitled “Transition 2000” that tells how the NSA is planning to improve its intelligence gathering. More importantly, it tells incoming White House officials that in the process of improving its intelligence gathering, some US citizens will inevitably be targeted for surveillance, though, according to a former NSA official, analysts were supposed to “delete the name of the” citizen being surveilled. Such inadvertent surveillance of US citizens took place even during the Clinton administration, says that former official, but the citizens’ names were always deleted from the transcripts of the communications intercepts. The law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents. (With the permission of the Foreign Intelligence Surveillance Court (FISC), the NSA can spy on diplomats and foreigners inside US borders.) An NSA official will tell the Boston Globe in October 2001, “If, in the course of surveillance, NSA analysts learn that it involves a US citizen or company, they are dumping that information right then and there.” However, once President Bush takes office in January 2001, that practice will undergo a radical change (see Spring 2001). [Truthout (.org), 1/17/2006] In the same transition report, agency officials say that the NSA must become a “powerful, permanent presence” on the commercial communications networks, a goal they admit will raise legal and privacy issues. [New York Times, 12/16/2007]

Entity Tags: Bush administration (43), National Security Agency

Timeline Tags: Civil Liberties

The Bush team moves into Washington. Neoconservative Zalmay Khalilzad heads the Pentagon transition team, and he ensures that plenty of his friends and colleagues move into the civilian offices of the Defense Department. Four of the most influential advocates for the US overthrow of Iraq’s Saddam Hussein—Elliott Abrams, Douglas Feith, Richard Perle, and Abram Shulsky—are waiting to learn where they will serve in the department. But Vice President Cheney is still concerned with ensuring the placement of his own colleagues and cronies who will help him build what many will call the “imperial presidency.” Secretary of State Colin Powell, Cheney’s ideological rival, is working to install his friend and colleague Richard Armitage as deputy secretary of defense. For Cheney, Armitage would be a calamity—although Armitage is sufficiently hardline and in line with conservative foreign policy aims, he is far too centrist for Cheney and the neoconservatives. The neoconservative magazine the Weekly Standard alerts the faithful to the potential problem with an article entitled “The Long Arm of Colin Powell: Will the Next Secretary of State Also Run the Pentagon?” Powell does not get his wish; Armitage eventually becomes deputy secretary of state. Abrams will join the National Security Council; Khalilzad, Feith, and Shulksy will join the Defense Department; and Perle will head the Defense Policy Board, an independent group that advises the Pentagon. [Weekly Standard, 12/25/2000 pdf file; Unger, 2007, pp. 115, 191-192, 204, 249]

Entity Tags: Elliott Abrams, Colin Powell, Bush administration (43), Abram Shulsky, Douglas Feith, Richard (“Dick”) Cheney, Richard Armitage, US Department of Defense, Richard Perle, Weekly Standard, Zalmay M. Khalilzad, Saddam Hussein

Timeline Tags: Neoconservative Influence

Sometime this year, the FBI discovers a new and “massive” Israeli spying operation inside the US. In 2004, UPI will report that, according to a former senior US government official, the FBI learned of a spy operation in the East Coast of the US, including New York and New Jersey. The FBI begins intensive surveillance on certain Israeli diplomats and other suspects. As part of this surveillance, in 2003 the FBI will be videotaping Naor Gilon, chief of political affairs at the Israeli Embassy in Washington, when they will discover Gilon is meeting with Larry Franklin, Defense Department analyst. In 2005, Franklin will plead guilty to passing classified secrets to Israeli officials (see October 5, 2005). It appears that the surveillance of some Israeli diplomatic officials in the US actually began by April 1999 (see April 13, 1999-2004), though details remain murky. [United Press International, 12/9/2004] It is not known if this discovered spy operation is connected to or the same as the Israeli art student and moving van spy rings, which appears to have been discovered in 2001 (see March 23, 2001 and June 2001), or something completely different. It is also not clear if the discovery came from an investigation of media leaks begun two days before 9/11 (see September 9, 2001), or if it predated that and the 9/11 attacks.

Entity Tags: Larry Franklin, Federal Bureau of Investigation, Israel Institute for Intelligence and Special Tasks (Mossad), Naor Gilon

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Although neoconservative Paul Wolfowitz has lost his chance of becoming director of the CIA due to his sexual entanglements with foreign nationals (see Late December 2000), he has not been entirely dismissed from consideration for high positions, and has the support of Vice President Cheney. President Bush, who has insisted that his administration’s officials comply with the highest moral standards, never learns about Wolfowitz’s infidelities. (A letter that Wolfowitz’s wife wrote to Bush about her husband’s affairs was intercepted by Cheney’s chief of staff, Lewis Libby. Wolfowitz himself unleashed a group of lawyers on his wife and forced her to sign a non-disclosure agreement to keep quiet about his affairs.) Incoming Defense Secretary Donald Rumsfeld chooses Wolfowitz to be his deputy, blocking incoming Secretary of State Colin Powell’s choice for the position, Richard Armitage, from taking the office (see Late December 2000 and Early January 2001). The Washington Post calls Wolfowitz’s selection “another victory for… Cheney over… Powell.” Rumsfeld knows about Wolfowitz’s sexual liaisons, as do most White House officials, and chooses to remain silent. “Rumsfeld told Wolfowitz to keep it zipped,” a State Department source later says. “He didn’t want any problems. He was basically to run the show and Wolfowitz could come on those terms.” [Unger, 2007, pp. 191-192]

Entity Tags: Donald Rumsfeld, Central Intelligence Agency, Clare Wolfowitz, Lewis (“Scooter”) Libby, Colin Powell, Richard (“Dick”) Cheney, Paul Wolfowitz, US Department of Defense

Timeline Tags: US Military

According to reporter and author Charlie Savage, the White House staff quickly coalesces into two camps: “Bush People[,] mostly personal friends of the new president who shared his inexperience in Washington,” which includes President Bush’s top legal counsels, Alberto Gonzales and Harriet Miers, both corporate lawyers in Texas before joining Bush in Washington. The second group is “Cheney People—allies from [Vice-President Dick] Cheney’s earlier stints in the federal government (see May 25, 1975, November 18, 1980, 1981-1992, 1989, and June 1996) who were deeply versed in Washington-level issues, a familiarity that would allow their views to dominate internal meetings. These included [Defense Secretary Donald] Rumsfeld and other cabinet secretaries, key deputies throughout the administration, and David Addington, Cheney’s longtime aide who would become a chief architect of the administration’s legal strategy in the war on terrorism” (see July 1, 1992 and (After 10:00 a.m.) September 11, 2001). Savage will observe, “Given the stark contrast in experience between Cheney and Bush, it was immediately clear to observers of all political stripes that Cheney would possess far more power than had any prior vice president.”
'Unprecedented' Influence - Cheney will certainly have “unprecedented” influence, according to neoconservative publisher William Kristol, who himself had served as former Vice President Dan Quayle’s chief of staff. “The question to ask about Cheney,” Kristol will write, is “will he be happy to be a very trusted executor of Bush’s policies—a confidant and counselor who suggests personnel and perhaps works on legislative strategy, but who really doesn’t try to change Bush’s mind about anything? Or will he actually, substantively try to shape administration policy in a few areas, in a way that it wouldn’t otherwise be going?”
Expanding the Power of the Presidency - Cheney will quickly answer that question, Savage will write, by attempting to “expand the power of the presidency.” Savage will continue: “He wanted to reduce the authority of Congress and the courts and to expand the ability of the commander in chief and his top advisers to govern with maximum flexibility and minimum oversight. He hoped to enlarge a zone of secrecy around the executive branch, to reduce the power of Congress to restrict presidential action, to undermine limits imposed by international treaties, to nominate judges who favored a stronger presidency, and to impose greater White House control over the permanent workings of government. And Cheney’s vision of expanded executive power was not limited to his and Bush’s own tenure in office. Rather, Cheney wanted to permanently alter the constitutional balance of American government, establishing powers that future presidents would be able to wield as well.” [Savage, 2007, pp. 7-9] Larry Wilkerson, the chief of staff for Secretary of State Colin Powell, will say after leaving the administration: “We used to say about both [Defense Secretary Donald Rumsfeld’s office] and the vice president’s office that they were going to win nine out of 10 battles, because they were ruthless, because they have a strategy, because they never, never deviate from that strategy. They make a decision, and they make it in secret, and they make it in a different way than the rest of the bureaucracy makes it, and then suddenly, foist it on the government—and the rest of the government is all confused.” [Unger, 2007, pp. 299]
Signing Statements to Reshape Legislation, Expand Presidential Power - To that end, Cheney ensures that all legislation is routed through his office for review before it reaches Bush’s desk. Addington goes through every bill for any new provisions that conceivably might infringe on the president’s power as Addington interprets it, and drafts signing statements for Bush to sign. In 2006, White House counsel Bradford Berenson will reflect: “Signing statements unite two of Addington’s passions. One is executive power. And the other is the inner alleyways of bureaucratic combat. It’s a way to advance executive power through those inner alleyways.… So he’s a vigorous advocate of signing statements and including important objections in signing statements. Most lawyers in the White House regard the bill review process as a tedious but necessary bureaucratic aspect of the job. Addington regarded it with relish. He would dive into a 200-page bill like it was a four-course meal.” It will not be long before White House and Justice Department lawyers begin vetting legislation themselves, with Addington’s views in mind. “You didn’t want to miss something,” says a then-lawyer in the White House. [Savage, 2007, pp. 236]

Entity Tags: David S. Addington, Bradford Berenson, Alberto R. Gonzales, Charlie Savage, William Kristol, Richard (“Dick”) Cheney, Donald Rumsfeld, Bush administration (43), Harriet E. Miers, George W. Bush, Lawrence Wilkerson

Timeline Tags: Civil Liberties

The Bush White House holds its first National Security Council meeting. The focus is on Iraq and the Israeli-Palestinian conflict. [Bamford, 2004, pp. 261] This meeting sets the tone for how President Bush intends to handle foreign affairs. Counterterrorism chief Richard Clarke wants to focus on the threat from al-Qaeda and Islamist terrorism, especially in light of the recent attack on the USS Cole (see October 12, 2000). But Bush isn’t interested in terrorism. [Unger, 2007, pp. 201]
Israeli-Palestinian Conflict to be 'Tilted Back Towards Israel' - Instead, Bush channels his neoconservative advisers, particularly incoming Deputy Defense Secretary Paul Wolfowitz (see February 18, 1992 and April-May 1999), in taking a new approach to Middle East affairs, particularly the Israeli-Palestinian conflict. Referring to President Clinton’s efforts to make peace between the Israelis and the Palestinians, Bush declares: “Clinton overreached, and it all fell apart. That’s why we’re in trouble. If the two sides don’t want peace, there’s no way we can force them. I don’t see much we can do over there at this point. I think it’s time to pull out of the situation.… We’re going to correct the imbalance of the previous administration on the Mideast conflict. We’re going to tilt it back towards Israel.” His view is that the Israeli government, currently headed by Ariel Sharon, should be left alone to deal as it sees fit with the Palestinians. “I’m not going to go by past reputations when it comes to Sharon. I’m going to take him at face value. We’ll work on a relationship based on how things go.” Justifying his position, he recalls a recent trip he took to Israel with the Republican Jewish Coalition. “We flew over the Palestinian camps. Looked real bad down there.… I don’t see much we can do over there at this point.” Secretary of State Colin Powell, surprised by Bush’s intended policy towards the 50-year old Israeli-Palestinian conflict, objects. According to Secretary of the Treasury Paul O’Neil, Powell “stresse[s] that a pullback by the United States would unleash Sharon and the Israeli army.” When Powell warns the president that the “consequences of that [policy] could be dire, especially for the Palestinians,” Bush shrugs. “Sometimes a show of strength by one side can really clarify things,” he suggests. [Bamford, 2004, pp. 265-266; Middle East Policy Council, 6/2004] In this and subsequent meetings, Bush’s National Security Adviser, Condoleezza Rice, “parrot[s]… the neocon line,” in author Craig Unger’s words, by discussing Iraq. “Iraq might be the key to reshaping the entire region,” she says, clearly alluding to regime change and overthrow in that nation (see March 8, 1992, Autumn 1992, July 8, 1996, Late Summer 1996, Late Summer 1996, 1997-1998, January 26, 1998, February 19, 1998, September 2000, Late December 2000 and Early January 2001, and Shortly after January 20, 2001). [Unger, 2007, pp. 201]
Possible WMD Sites in Iraq Spark Bush to Order Plans for Ground Assaults - The meeting then moves on to the subject of Iraq. Rice begins noting “that Iraq might be the key to reshaping the entire region.” She turns the meeting over to CIA Director George Tenet who summarizes current intelligence on Iraq. He mentions a factory that “might” be producing “either chemical or biological materials for weapons manufacture.” The evidence he provides is a picture of the factory with some truck activity, a water tower, and railroad tracks going into a building. He admits that there is “no confirming intelligence” on just what is going on at these sites. Bush orders Defense Secretary Donald Rumsfeld and Joint Chiefs of Staff Chairman General Hugh Shelton to begin preparing options for the use of US ground forces in Iraq’s northern and southern no-fly zones in support of a native-based insurgency against the Hussein regime. [Bamford, 2004, pp. 267; Middle East Policy Council, 6/2004] Author Ron Suskind later sums up the discussion: “Meeting adjourned. Ten days in, and it was about Iraq. Rumsfeld had said little, Cheney nothing at all, though both men clearly had long entertained the idea of overthrowing Saddam.” Defense Intelligence Agency official Patrick Lang later writes: “If this was a decision meeting, it was strange. It ended in a presidential order to prepare contingency plans for war in Iraq.” [Middle East Policy Council, 6/2004]
Regime Change Intended from the Outset - US Secretary of the Treasury Paul O’Neill, later recalls: “From the very beginning, there was a conviction, that Saddam Hussein was a bad person and that he needed to go.… From the very first instance, it was about Iraq. It was about what we can do to change this regime. Day one, these things were laid and sealed.” O’Neill will say officials never questioned the logic behind this policy. No one ever asked, “Why Saddam?” and “Why now?” Instead, the issue that needed to be resolved was how this could be accomplished. “It was all about finding a way to do it,” O’Neill will explain. “That was the tone of it. The president saying ‘Go find me a way to do this.’” [CBS News, 1/10/2004; New York Times, 1/12/2004; Guardian, 1/12/2004; Vanity Fair, 5/2004, pp. 234] Another official who attends the meeting will later say that the tone of the meeting implied a policy much more aggressive than that of the previous administration. “The president told his Pentagon officials to explore the military options, including use of ground forces,” the official will tell ABC News. “That went beyond the Clinton administration’s halfhearted attempts to overthrow Hussein without force.” [ABC News, 1/13/2004] Unger later writes, “These were the policies that even the Israeli right had not dared to implement.” One senior administration official says after the meeting, “The Likudniks are really in charge now.” [Unger, 2007, pp. 201]
Funding the Iraqi National Congress - The council does more than just discuss Iraq. It makes a decision to allow the Iraqi National Congress (INC), an Iraqi opposition group, to use $4 million to fund efforts inside Iraq to compile information relating to Baghdad’s war crimes, military operations, and other internal developments. The money had been authorized by Congress in late 2004. The US has not directly funded Iraqi opposition activities inside Iraq itself since 1996. [Guardian, 2/3/2005]
White House Downplays Significance - After Paul O’Neill first provides his account of this meeting in 2004, the White House will attempt to downplay its significance. “The stated policy of my administration toward Saddam Hussein was very clear,” Bush will tell reporters during a visit to Mexico In January 2004. “Like the previous administration, we were for regime change.… And in the initial stages of the administration, as you might remember, we were dealing with desert badger or fly-overs and fly-betweens and looks, and so we were fashioning policy along those lines.” [New York Times, 1/12/2004]

Entity Tags: Richard B. Myers, Hugh Shelton, Paul O’Neill, George W. Bush, Colin Powell, Donald Rumsfeld, George J. Tenet, Condoleezza Rice, Craig Unger, Iraqi National Congress

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion

The National Security Agency seeks the assistance of global telecommunications corporation AT&T to help it set up a domestic call monitoring site to eavesdrop on US citizens’ phone communications, according to court papers filed in June 2006 as part of a lawsuit against AT&T (see October 2001). The NSA is expressly forbidden from spying on US citizens within US borders unless authorized by the Foreign Surveillance Intelligence Court (FISC) (see 1978). When the NSA program, which wiretaps phone and email communications often without court warrants, becomes public knowledge well over four years later (see December 15, 2005), President Bush, NSA Director Michael Hayden, and other White House and government officials will assert that the program was set up in response to the September 11, 2001 terrorist attacks. If the claims made in the lawsuit are accurate, these assertions are provably false. “The Bush administration asserted this became necessary after 9/11,” lawyer Carl Mayer will claim in 2006. “This undermines that assertion.” Unbeknownst to most Americans, the NSA is operating a secret “data mining” operation that, by 2006, will have compiled phone records and contact information on millions of domestic phone and email communications. The NSA project is code-named “Project Groundbreaker,” and is ostensibly an above-board attempt announced in June 2000 to have AT&T and other firms help modernize its technological capabilities. The project originally seeks to have AT&T build a network operations center that duplicates AT&T’s facility in Bedminster, New Jersey; this plan will be altered when the NSA decides it will be better served by acquiring the monitoring technology itself. The agency is seeking bids for a project to “modernize and improve its information technology infrastructure,” including the privatization of its “non-mission related” systems support. [TechWeb, 6/13/2000; Bloomberg, 6/30/2006] Groundbreaker’s privatization project is expected to provide up to $5 billion in government contracts to various private firms such as AT&T, Computer Sciences Corporation, and OAO Corporation, [Computerworld, 12/4/2000; Government Executive, 9/1/2001] and up to 750 NSA employees will become private contractors. Hayden, who has aggressively instituted a corporate management protocol to enhance productivity and has brought in numerous senior managers and agency executives from private defense firms, is a strong proponent of privatizing and outsourcing much of the NSA’s technological operations, and in 2001 will say that he wants the agency to focus on its primary task of breaking codes and conducting surveillance. Hayden does not admit that Groundbreaker is part of a larger NSA domestic surveillance program, [Government Executive, 9/1/2001] and publicly, NSA officials say that the project is limited to administrative and logistics functions. [Computerworld, 12/4/2000] The covert data mining portion of the project is code-named “Pioneer.” A former, unnamed employee of the NSA, [Bloomberg, 6/30/2006] and a former AT&T technician, Mark Klein, will provide the key information about Groundbreaker (see Late 2002, July 7, 2009 and December 15-31, 2005). Klein will say in 2006 that he saw the NSA construct a clandestine area within its switching center in San Francisco, and saw NSA technicians shunt fiber optic cable carrying Internet traffic into that area, which contains a large data bank and secret data mining hardware (see April 6, 2006). Klein will say he knew that the NSA built other such facilities in other switching locations. He will go on to say that the NSA did not work with just AT&T traffic; when AT&T’s network connected with other networks, the agency acquired access to that traffic as well. [Democracy Now!, 5/12/2006] The information about AT&T and the NSA will become public knowledge after the 2006 filing of a lawsuit against AT&T and other telecommunications firms (see May 12, 2006 and June 26, 2006).

Entity Tags: Mark Klein, Michael Hayden, George W. Bush, Foreign Intelligence Surveillance Court, Bush administration (43), Carl Mayer, Computer Sciences Corporation, AT&T, National Security Agency, OAO Corporation

Timeline Tags: Civil Liberties

Joseph Nacchio.Joseph Nacchio. [Source: publicity photo via Business Week]Qwest CEO Joe Nacchio meets with NSA officials in Fort Meade, Maryland, to discuss two topics of mutual interest: a $100 million infrastructure upgrade that Qwest, one of the US’s largest telecommunications firms, can perform for the agency, and another topic that remains classified. (The meeting will be revealed in heavily redacted court documents released six years later—see October 12, 2007). Observers believe the discussion is about the NSA’s warrantless wiretapping program of US citizens, which the government will conceal for years (see December 15, 2005), and which the Bush administration will insist did not come about until after the 9/11 attacks (see December 17, 2005). Nacchio meets with NSA officials to discuss the agency’s “Groundbreaker” project (see February 2001), which the NSA will later claim is merely a modernization and upgrade of its technological infrastructure. A June 2006 lawsuit against AT&T over that firm’s cooperation with the NSA alleges that “Groundbreaker” is part of a secret domestic surveillance operation. According to the court documents, Nacchio and the NSA are unable to agree on an unrevealed topic of discussion; after that disagreement, the NSA will withdraw its “Groundbreaker” contract from consideration for Qwest. Nacchio, according to the documents, believes that the unrevealed topic of discussion involves illegal and inappropriate actions. He asks the agency officials whether “a warrant or other legal process had been secured.” The NSA officials, according to the documents, have a “disinclination on the part of the authorities to use any legal process,” leading Nacchio to conclude that “the requests violated the privacy requirements of the Telecommunications Act.” When Nacchio refuses to cooperate with the NSA, the agency withdraws its offer of the “Groundbreaker” contract. [Raw Story, 10/12/2007; Marketwatch, 10/13/2007] James F.X. Payne, the former chief of Qwest’s government business unit, will later tell investigators, “There was a feeling also that the NSA acted as agents for other government agencies.” [National Journal, 11/2/2007] In 2007, the New York Times will reveal that Qwest refuses to give the NSA access to its most localized communications switches, carrying largely domestic phone calls. The arrangement would have permitted neighborhood-by-neighborhood surveillance of phone traffic without a court order. [New York Times, 12/16/2007] The NSA has more success with other companies—and has enjoyed a long and fruitful relationship with Qwest as well (see February 2001).

Entity Tags: Qwest, New York Times, James F.X. Payne, Bush administration (43), AT&T, Joe Nacchio, National Security Agency

Timeline Tags: Civil Liberties

The National Security Agency (NSA) engages in apparently illegal surveillance of US citizens beginning shortly after the inauguration of George W. Bush as president. This will not be revealed to the public until media reports in January 2006, a month after the press revealed that the NSA had engaged in similar illegal wiretaps and surveillance of American citizens after the 9/11 attacks, using those attacks as justification for the surveillance (see December 15, 2005). The former NSA and counterterrorism officials who reveal the pre-9/11 spying will claim that the wiretaps, e-mail monitoring, and Internet surveillance were all “inadvertent,” as NSA computers “unintentionally” intercepted US citizens’ international phone calls and e-mails when the computers flagged keywords. NSA protocol demands that such “inadvertent” surveillance end as soon as NSA analysts realize they are spying on those citizens, and the names of the monitored citizens are supposed to be deleted from the NSA databases. Instead, the NSA is instructed to continue monitoring some citizens that are characterized as “of interest” to White House officials. Those officials include President Bush, Vice President Cheney, and Defense Secretary Donald Rumsfeld, say the former NSA and counterterrorism officials. In December 2000, the NSA told the incoming Bush administration that some US citizens are being inadvertently targeted for surveillance, but the names of the citizens are deleted because the law expressly prohibits the NSA from spying on US citizens, US corporations, or even permanent US residents (see December 2000). However, once Bush takes office in January 2001, that practice undergoes a radical change. In the first few months of the administration, President Bush assigns Vice President Cheney to make himself more of a presence at the various US intelligence agencies, particularly the CIA, NSA, and DIA. Cheney, along with other officials at the State and Defense Departments, begins making repeated requests to the NSA to reveal the identities of those Americans which had previously been deleted, so that administration officials can more fully understand the context and scope of the intelligence. Such requests are technically legal. But Cheney goes well beyond the law when he requests, as he frequently does, that the NSA continue monitoring specific Americans already caught up in the NSA’s wiretaps and electronic surveillance. A former White House counterterrorism official will later claim that Cheney advised Bush of what he was learning from the NSA. “What’s really disturbing is that some of those people the vice president was curious about were people who worked at the White House or the State Department,” says another former counterterrorism official. “There was a real feeling of paranoia that permeated from the vice president’s office and I don’t think it had anything to do with the threat of terrorism. I can’t say what was contained in those taps that piqued his interest. I just don’t know.” [Truthout (.org), 1/17/2006]

Entity Tags: Richard (“Dick”) Cheney, Central Intelligence Agency, Defense Intelligence Agency, George W. Bush, Donald Rumsfeld, US Department of Defense, National Security Agency, US Department of State

Timeline Tags: Civil Liberties

The cover of the DEA report, as depicted on television.The cover of the DEA report, as depicted on television. [Source: Fox News]The Office of National Drug Control Policy issues a National Security Alert describing “apparent attempts by Israeli nationals to learn about government personnel and office layouts.” This later becomes known through a leaked DEA document called “Suspicious Activities Involving Israeli Art Students at DEA Facilities.” A crackdown ensues and by June, around 120 Israelis are apprehended. More are apprehended later. [Drug Enforcement Agency, 6/2001]

Entity Tags: “Israeli art students”, Office of National Drug Control Policy

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The Lackawanna Six. Top row, from left: Faysal Galab, Mukhtar al-Bakri, and Sahim Alwan. Bottom row, from left: Yahya Goba, Shafel Mosed, and Yaseinn Taher.The Lackawanna Six. Top row, from left: Faysal Galab, Mukhtar al-Bakri, and Sahim Alwan. Bottom row, from left: Yahya Goba, Shafel Mosed, and Yaseinn Taher. [Source: Associated Press]A group of seven men in Lackawanna, near Buffalo, New York, are influenced by religious discussions with two al-Qaeda operatives, Kamal Derwish and Juma al-Dosari. The seven US citizens—Yaseinn Taher, Yahya Goba, Shafel Mosed, Mukhtar al-Bakri, Sahim Alwan, Faysal Galab, and Jaber Elbaneh—leave for jihad training in Afghanistan. They tell friends they are merely going to Pakistan for religious instruction. Escorted by Derwish, the men travel separately and attend a six-week long weapons course at the Al Farooq camp. Some of them meet Osama bin Laden in Kandahar and they all hear him give a speech (see (June 2001)). However, most of them apparently think they are in over their heads and find excuses to cut their basic training course short and return home. The six who return show little to no evidence of any al-Qaeda plotting in the following months. Jaber Elbaneh, however, becomes committed and stays overseas with al-Qaeda. The six who return will later be arrested and dubbed an al-Qaeda cell known as the “Lackawanna Six” (see September 13, 2002). [PBS Frontline, 10/16/2003]

Entity Tags: Yaseinn Taher, Al Farooq training camp, Shafel Mosed, Yahya Goba, Osama bin Laden, Faysal Galab, Jaber Elbaneh, Juma al-Dosari, Sahim Alwan, Mukhtar al-Bakri, Kamal Derwish

Timeline Tags: Complete 911 Timeline

One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing.One of the approximately 30 radomes at the Echelon station in Menwith Hill, England. A radome covers an antenna to protect it from the weather and disguise the direction it is pointing. [Source: Matt Crypto / Public domain]The BBC reports on advances in electronic surveillance. The US’s global surveillance program, Echelon, has become particularly effective in monitoring mobile phones, recording millions of calls simultaneously and checking them against a powerful search engine designed to pick out key words that might represent a security threat. Laser microphones can pick up conversations from up to a kilometer away by monitoring window vibrations. If a bug is attached to a computer keyboard, it is possible to monitor exactly what is being keyed in, because every key on a computer has a unique sound when depressed. [BBC, 4/4/2001] Furthermore, a BBC report on a European Union committee investigation into Echelon one month later notes that the surveillance network can sift through up to 90 percent of all Internet traffic, as well as monitor phone conversations, mobile phone calls, fax transmissions, net browsing history, satellite transmissions and so on. Even encryption may not help much. The BBC suggests that “it is likely that the intelligence agencies can crack open most commercially available encryption software.” [BBC, 5/29/2001]

Entity Tags: Echelon, British Broadcasting Corporation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

States the Israeli spy ring were known to have operated in, according to a June 2001 Drug Enforcement Administration report (this Fox news graphic was based on information from that report).States the Israeli spy ring were known to have operated in, according to a June 2001 Drug Enforcement Administration report (this Fox news graphic was based on information from that report). [Source: Fox News]The DEA’s Office of Security Programs prepares a 60-page internal memo on the Israeli “art student spy ring.” [Drug Enforcement Agency, 6/2001] The Memo is a compilation of dozens of field reports, and was meant only for the eyes of senior officials at the Justice Department (of which the DEA is adjunct), but it is leaked to the press around December 2001. The report connects the spies to efforts to foil investigations into Israeli organized crime activity involving the importation of the drug Ecstasy. The spies also appear to be snooping on top-secret military bases. For instance, on April 30, 2001, an Air Force alert was issued from Tinker Air Force Base in Oklahoma City concerning “possible intelligence collection being conducted by Israeli art students.” Tinker AFB houses AWACS surveillance craft and Stealth bombers. By the time of the report, the US has “apprehended or expelled close to 120 Israeli nationals” but many remain at large. [Le Monde (Paris), 3/5/2002; Salon, 5/7/2002] An additional 20 or so Israeli spies are apprehended between June and 9/11. [Fox News, 12/12/2001]

Entity Tags: US Department of Justice, “Israeli art students”, Office of Security Programs

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In July 2001, NSA director Michael Hayden tells a reporter that the NSA does not monitor any US citizens without court warrants from the Foreign Intelligence Surveillance Court (FISC). “We don’t do anything willy-nilly,” Hayden says. “We’re a foreign intelligence agency. We try to collect information that is of value to American decision-makers, to protect American values, America—and American lives. To suggest that we’re out there, on our own, renegade, pulling in random communications, is—is simply wrong. So everything we do is for a targeted foreign intelligence purpose. With regard to the—the question of industrial espionage, no. Period. Dot. We don’t do that.” When asked how Americans could verify that, Hayden says that they should simply trust the NSA to police and monitor itself, along with oversight from the White House and from Congress. However, it will later come to light that the NSA began illegally monitoring US citizens from the start of the Bush administration (see Spring 2001). A former NSA official will later dispute Hayden’s account. “What do you expect him to say?” the official says. “He’s got to deny it. I agree. We weren’t targeting specific people, which is what the President’s executive order does. However, we did keep tabs on some Americans we caught if there was an interest [by the White House.] That’s not legal. And I am very upset that I played a part in it.” [Truthout (.org), 1/17/2006] Hayden also denies persistent allegations from European government officials that the agency has engaged in economic espionage to help American companies against European competitors (see April 4, 2001). In March 2001, the American Civil Liberties Union’s Barry Steinhardt says that “since there is no real check on [the NSA], there is no way to know” if they are following the law. Steinhardt says that Congress is the only real check on possible NSA abuses, but it has consistently failed to exercise any sort of aggressive oversight on the agency. [CNN, 3/31/2001]

Entity Tags: National Security Agency, Barry Steinhardt, Michael Hayden, American Civil Liberties Union

Timeline Tags: Civil Liberties

Ratcheting up the anti-Iraq rhetoric in the press, neoconservative Reuel Marc Gerecht writes in the Weekly Standard that the US is a “cowering superpower” for not directly challenging Iraq, and demands that President Bush explain “how we will live with Saddam [Hussein] and his nuclear weapons.” [Unger, 2007, pp. 206]

Entity Tags: Saddam Hussein, George W. Bush, Reuel Marc Gerecht

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion, Neoconservative Influence

Former CIA agent Robert Baer is advising a prince in a Persian Gulf royal family, when a military associate of this prince passes information to him about a “spectacular terrorist operation” that will take place shortly. He is given a computer record of around 600 secret al-Qaeda operatives in Saudi Arabia and Yemen. The list includes ten names that will be placed on the FBI’s most wanted terrorists list after 9/11. He is also given evidence that a Saudi merchant family had funded the USS Cole bombing on October 12, 2000, and that the Yemeni government is covering up information related to that bombing. At the military officer’s request, he offers all this information to the Saudi Arabian government. However, an aide to the Saudi defense minister, Prince Sultan, refuses to look at the list or to pass the names on (Sultan is later sued for his complicity in the 9/11 plot in August 2002). Baer also passes the information on to a senior CIA official and the CIA’s Counter Terrorism Center, but there is no response or action. Portions of Baer’s book describing his experience wil be blacked out, having been censored by the CIA. [Baer, 2002, pp. 55-58; Financial Times, 1/12/2002]

Entity Tags: USS Cole, Sultan bin Abdul Aziz Al Saud, Central Intelligence Agency, Robert Baer, Saudi Arabia, Al-Qaeda, Federal Bureau of Investigation, Counterterrorist Center

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Crown Prince Abdullah, the effective leader of Saudi Arabia, is upset with US policy over Israel and Palestine and threatens to break the Saudi alliance with the US. He has Prince Bandar, Saudi ambassador to the US, personally deliver a message to President Bush on August 27. Bandar says, “This is the most difficult message I have had to convey to you that I have ever conveyed between the two governments since I started working here in Washington in 1982.” He brings up a number of issues, including the complaint that since Bush became president US policy has tilted towards Israel so much that the US has allowed Israeli Prime Minister Sharon to “determine everything in the Middle East.” The message concludes, “Therefore the Crown Prince will not communicate in any form, type or shape with you, and Saudi Arabia will take all its political, economic and security decisions based on how it sees its own interest in the region without taking into account American interests anymore because it is obvious that the United States has taken a strategic decision adopting Sharon’s policy.” Bush seems shocked and replies, “I want to assure you that the United States did not make any strategic decision.” Secretary of State Powell later confronts Bandar and says, “What the fuck are you doing? You’re putting the fear of God in everybody here. You scared the shit out of everybody.” Bandar reportedly replies, “I don’t give a damn what you feel. We are scared ourselves.” Two days later, Bush replies with a message designed to appease the Saudi concerns (see August 29-September 6, 2001). [Woodward, 2006, pp. 77-79]

Entity Tags: George W. Bush, Bandar bin Sultan, Colin Powell, Abdullah bin Abdulaziz al-Saud

Timeline Tags: Complete 911 Timeline

Page 1 of 4 (382 events)
previous | 1, 2, 3, 4 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike