!! History Commons Alert, Exciting News

Context of '(Around July 9, 2001): German Authorities Notify Spanish of Bin Al-Shibh’s Trip to Spain'

This is a scalable context timeline. It contains events related to the event (Around July 9, 2001): German Authorities Notify Spanish of Bin Al-Shibh’s Trip to Spain. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 19 (1834 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19 | next

Woodcut depicting waterboarding included in J. Damhoudere’s ‘Praxis Rerum Criminalium,’ Antwerp, 1556.Woodcut depicting waterboarding included in J. Damhoudere’s ‘Praxis Rerum Criminalium,’ Antwerp, 1556. [Source: NPR]With the advent of the “Enlightenment,” many countries ban the practice of waterboarding, with at least one calling it “morally repugnant.” Waterboarding has been around since the 14th century, known variously as “water torture,” the “water cure,” or tormenta de toca, a phrase that refers to the thin piece of cloth placed over the victim’s mouth. Officials for the Spanish Inquisition were among those who waterboarded prisoners; the Inquisition, recognizing the potentially lethal effect of the practice, required a doctor to be present when a prisoner was waterboarded. Historian Henry Charles Lea, in his book A History of the Inquisition of Spain, will describe waterboarding as follows: “The patient strangled and gasped and suffocated and, at intervals, the toca was withdrawn and he was adjured to tell the truth. The severity of the infliction was measured by the number of jars [of water] consumed, sometimes reaching to six or eight.” Waterboarding actually refers to two separate interrogation techniques: one involving water being pumped directly into the stomach, and another that features the steady streaming of water into the throat. The first, according to author Darius Rejali, “creates intense pain. It feels like your organs are on fire.” The second will be the method later preferred by US interrogators, who will use it on suspected terrorists. This method is a form of “slow motion drowning” perfected by Dutch traders in the 17th century, when they used it against their British rivals in the East Indies. In 2007, reporter Eric Weiner will write: “[W]aterboarding has changed very little in the past 500 years. It still relies on the innate fear of drowning and suffocating to coerce confessions.” [National Public Radio, 11/3/2007]

Entity Tags: Darius Rejali, Spanish Inquisition, Henry Charles Lea, Eric Weiner

Timeline Tags: Torture of US Captives

Sherwood F. Moran (right) interrogating a Japanese prisoner during the battle of Guadalcanal.Sherwood F. Moran (right) interrogating a Japanese prisoner during the battle of Guadalcanal. [Source: Associated Press]Marine interrogator Major Sherwood F. Moran writes an informal memo for use by other interrogators. Moran is a legendary figure among Marines, renowned for his ability to coax information from the most reluctant or resistant Japanese captive, even during the height of battle, and often using his knowledge of, and respect for, Japanese culture to his advantage. His memo will remain relatively unknown outside the Marine Corps until the summer of 2003, when it will be included in the archives of the Marine Corps Interrogator Translator Teams Association. The memo, titled “Suggestions for Japanese Interpreters Based on Work in the Field,” is remarkable for its insistence that treating prisoners with humanity and respect works far better than “harsh” interrogation methods. Author Ulrich Straus, an expert on Japanese POWs held in US captivity during World War II, will later write that Moran “was a particularly effective interrogator because he treated each prisoner as another human rather than as the enemy.” In 2005, after the Abu Ghraib scandals become media fodder, military historian Stephen Budiansky will write: “Six months before the abuses at Abu Ghraib prison broke into public view, a small and fairly obscure private association of United States Marine Corps members posted on its Web site a document on how to get enemy POWs to talk. The document described a situation very similar to the one the United States faces in the insurgencies in Iraq and Afghanistan: a fanatical and implacable enemy, intense pressure to achieve quick results, a brutal war in which the old rules no longer seem to apply.… Moran, the report’s author, noted that despite the complexities and difficulties of dealing with an enemy from such a hostile and alien culture, some American interrogators consistently managed to extract useful information from prisoners. The successful interrogators all had one thing in common in the way they approached their subjects. They were nice to them. Moran was writing in 1943, and he was describing his own, already legendary methods of interrogating Japanese prisoners of war. More than a half century later his report remains something of a cult classic for military interrogators.” [David R. Moran, 2005]
Human-to-Human Attitude - Moran writes that the best interrogators (whom he says should consider themselves “interviewers”) become “wooers” of their captives, coaxing information rather than attempting to force confessions. Most important, Moran writes, is the interrogator’s attitude towards his prisoner. “Many people, I suppose, would on first thought think ‘attitude’ had nothing to do with it; that all one needs is a knowledge of the language, then shoot out questions, and expect and demand a reply,” he writes. “Of course that is a very unthinking and naive point of view.” Just as important, Moran writes, is a sympathy and understanding of the captive’s culture. A superior or demeaning attitude breeds nothing but antagonism and resistance.
Speaking the Language of the Captive - Almost as important, Moran notes, is the interrogator’s ability to speak directly to the captive in his own language, without the need for translators. An interrogator should speak the language fluently and idiomatically, or, when that is not possible, to at least have some command over common phrases. “After all, the first and most important victory for the interviewer to try to achieve is to get into the mind and into the heart of the person being interviewed,” he writes.
Hidden System - Fellow feelings and warm sympathy towards the captive are necessary, but not the entire package. While the captive, or an outside observer, might believe that the interrogator is merely indulging in friendly chit-chat, the interrogator must have an agenda and a plan in place at all times. “[I]n the workings of your mind you must be a model of system,” Moran says. “You must know exactly what information you want, and come back to it repeatedly. Don’t let your warm human interest, your genuine interest in the prisoner, cause you to be sidetracked by him! You should be hard-boiled but not half-baked. Deep human sympathy can go with a business-like, systematic, and ruthlessly persistent approach.”
Short-Circuiting Patriotic Defensiveness - To emphasize that your side, your nation, or your culture is superior—in essence, the “conquerors” of the captive’s military or his nation—is counterproductive, Moran writes. “To emphasize that we are enemies, to emphasize that he is in the presence of his conqueror, etc., puts him psychologically in the position of being on the defensive, and that because he is talking to a most-patient enemy and conqueror he has no right and desire to tell anything,” he writes.
Breaking Recalcitrant Prisoners - Sometimes even the best interrogators come up against recalcitrant prisoners who flatly refuse, for patriotic reasons or what Moran calls “conscientious scruples,” to give any information. In these cases, Moran writes, harsh or physical techniques of intelligence extraction are counterproductive. Instead, he writes, with his Japanese captives he is often able to shame the prisoner into cooperating. Reminding the captive that he has been treated humanely, has been treated with kindness and courtesy, implies a quid pro quo—not the threat of having this treatment withdrawn if cooperation is not forthcoming, but a matter of the captive returning the interrogator’s courtesy with information. [Moran, 7/17/1943 pdf file]

Entity Tags: US Marine Corps, Ulrich Straus, Stephen Budiansky, Sherwood F. Moran, Marine Corps Interrogator Translator Teams Association

Timeline Tags: Torture of US Captives

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

In the aftermath of World War II, Japanese officer Yukio Asano is charged by a US war crimes tribunal for torturing a US civilian. Asano had used the technique of “waterboarding” on the prisoner (see 1800 and After). The civilian was strapped to a stretcher with his feet in the air and head towards the floor, and water was poured over his face, causing him to gasp for air until he agreed to talk. Asano is convicted and sentenced to 15 years of hard labor. Other Japanese officers and soldiers are also tried and convicted of war crimes that include waterboarding US prisoners. “All of these trials elicited compelling descriptions of water torture from its victims, and resulted in severe punishment for its perpetrators,” reporter Evan Wallach will later write. In 2006, Senator Edward Kennedy (D-MA), discussing allegations of US waterboarding of terror suspects, will say in regards to the Asano case, “We punished people with 15 years of hard labor when waterboarding was used against Americans in World War II.” [Washington Post, 10/5/2006; National Public Radio, 11/3/2007]

Entity Tags: Yukio Asano, Evan Wallach, Edward M. (“Ted”) Kennedy

Timeline Tags: Torture of US Captives

A B-29 bomber similar to the one that crashed in Georgia.A B-29 bomber similar to the one that crashed in Georgia. [Source: Global Security (.org)]A test flight for the Air Force’s Project Banshee, located at Robins Air Force Base in Georgia, is set for 8:30 a.m. Banshee is an attempt begun in 1946 to develop and deploy a long-range missile ahead of both the Soviet Union and rival US military branches. The airplane used in the test flight crashes less than an hour into its flight, killing 9 of the 13 aboard.
Maintenance Problems - The plane assigned for the flight is a B-29 Stratofortress, a bomber made famous by its delivery of the atomic bombs to Hiroshima and Nagasaki at the end of World War II. B-29s are notoriously difficult to fly and maintain: their four wing-mounted engines almost routinely overheat and catch fire, causing engine shutdowns, sudden drops in altitude, and, often, crashes. The engines’ eighteen cylinders lack sufficient airflow to keep them cool, and the overheating often causes the crankcases, made of light but highly flammable magnesium, to burst into flames. Like so many of its brethren, the plane has suffered its share of maintenance issues, and is flying without numerous recommended maintenance and repair tasks being performed. Just five days before, it had been designated “red cross”—grounded and unfit for service. It was allowed to fly through an “exceptional release” signed by the squadron commander.
Crew Difficulties - The flight is moved back to the afternoon after some crew members fail to show up on time, and to allow last-minute repairs to be made. By takeoff, the flight crew is assembled: Captain Ralph Erwin; co-pilot Herbert W. Moore; flight engineer Earl Murrhee; First Lieutenant Lawrence Pence, Jr, the navigator; Sergeant Walter Peny, the left scanner; Sergeant Jack York, the right scanner; Sergeant Melvin Walker, the radio operator; and Sergeant Derwood Irvin, manning the bombsight and autopilot. The crew is joined by civilian engineers assigned to Banshee: Al Palya and Robert Reynolds from RCA, William Brauner and Eugene Mechler from the Franklin Institute, and Richard Cox from the Air Force’s Air Materiel Command. In violation of standard procedure, none of the crew or the civilians are briefed on emergency procedures, though Murrhee will later say that the crew were all familiar with the procedures; he is not so sure about the civilians, though he knows Palya and Reynolds have flown numerous test flights before. In another violation of Air Force regulations, none of the flight crew have worked together before. As author Barry Siegel will note in 2008, “The pilot, copilot, and engineer had never shared the same cockpit before.”
Engine Fire and Crash - Less than an hour into the flight, one engine catches fire and two others lose power, due to a combination of maintenance failures and pilot errors. The civilians have some difficulty getting into their parachutes as Erwin and Moore attempt to regain control of the aircraft. Four of the crew and civilians manage to parachute from the plane, but most remain on board as the airplane spirals into the ground on the edge of the Okefenokee Swamp, near Waycross, Georgia. Crew members Moore, Murrhee, and Peny survive, as does a single civilian, Mechler. Four others either jump at too low an altitude or die when their chutes foul the airplane; the other five never manage to leave the plane and die on impact.
Widows File Suit - Several of the civilians’ widows will file suit against the US Air Force, asserting that their husbands died because of Air Force negligence (see June 21, 1949). Their lawsuit will eventually become US v. Reynolds, a landmark Supreme Court case and the underpinning for the government’s claims of state secrets privilege (see March 9, 1953). [Siegel, 2008, pp. 3, 14-17, 33-49]

Entity Tags: Derwood Irvin, Barry Siegel, US Department of the Air Force, Walter Peny, William Brauner, Air Materiel Command, Richard Cox, Ralph Erwin, Robert Reynolds, Al Palya, Radio Corporation of America, Eugene Mechler, Earl Murrhee, Franklin Institute, Project Banshee, Melvin Walker, Lawrence Pence, Jr, Herbert W. Moore, Jr, Jack York

Timeline Tags: Civil Liberties

A three-judge federal appeals court unanimously rejects the government’s claim of unfettered executive privilege and secrecy in regards to classified documents (see October 19, 1951). In an opinion written by Judge Albert Maris, the court finds that the government’s claim that the judiciary can never compel the executive branch to turn over classified documents to be without legal merit. The plaintiffs in the case, three widows who lost their husbands in the crash of a B-29 bomber carrying classified materials (see June 21, 1949), had a compelling need for the documents in question, the downed B-29 accident reports, to further their case, Maris writes (see October 12, 1950).
No Legal Basis for Claim of Privilege - Maris goes further than the parameters of the single lawsuit, writing: “[W]e regard the recognition of such a sweeping privilege… as contrary to a sound public policy. The present cases themselves indicate the breadth of the claim of immunity from disclosure which one government department head has already made. It is but a small step to assert a privilege against any disclosure of records merely because they might prove embarrassing to government officials. Indeed, it requires no great flight of imagination to realize that if the government’s contentions in these cases were affirmed, the privilege against disclosure might gradually be enlarged… until as is the case in some nations today, it embraced the whole range of government activities.… We need to recall in this connection the words of [Revolution-era jurist] Edward Livingston: ‘No nation ever yet found any inconvenience from too close an inspection into the conduct of its officers, but many have been brought to ruin, and reduced to slavery, by suffering gradual imposition and abuses, which were imperceptible, only because the means of publicity had not been secured.’” He also quotes Revolutionary War figure Patrick Henry, who said, “[T]o cover with the veil of secrecy the common routine of business is an abomination in the eyes of every intelligent man and every friend to his country.”
Rejecting Claim of 'State Secrets' - Maris is even less respectful of the government’s claim of a “state secrets” privilege. He notes that the government did not make that claim until well into the lawsuit proceedings (see October 19, 1951), indicating that it was a “fallback” argument used after the original government arguments had failed. Maris is also troubled, as author Barry Siegel later writes, in the government’s “assertion of unilateral executive power, free from judicial review, to decide what qualified as secret.” The lower court judge’s ruling that he alone should be given the documents for review adequately protected the government’s security interests, Maris writes: “[But] the government contends that it is within the sole province of the secretary of the Air Force to determine whether any privileged material is contained in the documents and that his determination of this question must be accepted by the district court without any independent consideration.… We cannot accede to this proposition. On the contrary, we are satisfied that a claim of privilege against disclosing evidence… involves a justiciable question, traditionally within the competence of the courts.… To hold that the head of an executive department of the government in a [law]suit to which the United States is a party may conclusively determine the government’s claim of privilege is to abdicate the judicial function to infringe the independent province of the judiciary as laid down by the Constitution.”
Fundamental Principle of Checks and Balances - Maris continues: “The government of the United States is one of checks and balances. One of the principal checks is furnished by the independent judiciary which the Constitution established. Neither the executive nor the legislative branch of the government may constitutionally encroach upon the field which the Constitution has reserved for the judiciary.… Nor is there any danger to the public interest in submitting the question of privilege to the decision of the courts. The judges of the United States are public officers whose responsibilities under the Constitution is just as great as that of the heads of the executive departments.”
Government Appeal - The Justice Department will appeal the ruling to the US Supreme Court (see March 1952 and March 9, 1953). [Siegel, 2008, pp. 153-156]

Entity Tags: Albert Maris, US Department of Justice, Barry Siegel, US Supreme Court

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Lawyers make their opening arguments before the Supreme Court in the case of US v Reynolds, the lawsuit that finds the government had no overarching right to unilaterally refuse to deliver classified documents in the course of a wrongful death lawsuit against the government (see December 11, 1951). The government has appealed the appellate court ruling to the Supreme Court (see March 1952). Because four of the nine justices had voted not to hear the case—in essence to let the appellate court ruling stand—the defense is cautiously optimistic about the Court’s decision.
Judiciary Has No Right to Interfere with Powers of the Executive, Government Argues - Acting Solicitor General Robert Stern tells the Court that the appellate judges’ decision, written by Judge Albert Maris, “is an unwarranted interference with the powers of the executive,” and that the decision forced the government to choose “whether to disclose public documents contrary to the public interest [or] to suffer the public treasury to be penalized” (a reference to the decision to award the plaintiffs monetary damages—see October 12, 1950). The judiciary “lack[s] power to compel disclosure by means of a direct demand [as well as] by the indirect method of an order against the United States, resulting in judgment when compliance is not forthcoming.”
Executive Has No Right to Unilaterally Withhold Information, Defense Counters - Stern’s arguments are countered by those of the plaintiffs’ lawyer, Charles Biddle, who writes, “We could rest our case with confidence on the clear opinion of Judge Maris,” but continues by arguing that if the government asserts a claim of executive privilege on the basis of national security, it must make the documents available to the Court for adjudication, or at least provide enough information for the Court to judge whether the documents present in fact a threat to national security if disclosed. This is particularly true, Biddle argues, “where there is no showing that the documents in question contain any military secret” (Biddle is unaware that the documents’ classification status had been reduced two years before—see September 14, 1950). “The basic question here is whether those in charge of the various departments of the government may refuse to produce documents properly demanded… in a case where the government is a party (see June 21, 1949), simply because the officials themselves think it would be better to keep them secret, and this without the Courts having any power to question the propriety of such decision.… In other words, say the officials, we will tell you only what we think it is in the public interest that you should know. And furthermore, we may withhold information not only about military or diplomatic secrets, but we may also suppress documents which concern merely the operation of the particular department if we believe it would be best, for purposes of efficiency or morale, that no one outside of the department, not even the Court, should see them.”
No Basis for Claims of Military Secrets - Biddle argues that because of responses he has received to his demands over the course of this lawsuit, he is relatively sure there are no military secrets contained within them. “[T]he proof is to the contrary,” he says, and goes on to say that had the Air Force disclosed from the outset that the plane crash, the fatal accident that sparked the original lawsuit (see October 6, 1948), was probably caused by pilot error and not by random chance, the plaintiffs may have never needed to ask for the disclosure of the documents in question, the accident reports on the crash (see October 18, 1948). “The secretary [of the Air Force]‘s formal claim of privilege said that the plane at the time was engaged in a secret mission and that it carried confidential equipment,” Biddle says, “but nowhere was it asserted that either had anything to do with the accident. The whole purpose of the demand by the respondents was for the purpose of finding out what caused the accident.… They were not in the least interested in the secret mission or equipment.” [Siegel, 2008, pp. 165-170]

Entity Tags: US Supreme Court, Albert Maris, Robert Stern, US Department of the Air Force, Charles Biddle

Timeline Tags: Civil Liberties

In their regular Saturday conference, the nine Supreme Court justices discuss the issues and arguments surrounding US v Reynolds (see October 21, 1952). According to the notes from the discussion, Chief Justice Fred Vinson, a strong advocate for expansive executive powers (see March 1952), says the case “boils down to Executive Branch determine privilege.” Other notes by Justice William O. Douglas suggest that Vinson isn’t convinced that the US must “be forced to pay for exercising its privilege” (see October 12, 1950). A straw vote taken at the end of the discussion shows five justices in favor of the government’s position to unilaterally withhold classified documents—overturning the appellate court decision (see December 11, 1951), and four in favor of allowing the decision to stand. [Siegel, 2008, pp. 171]

Entity Tags: Fred Vinson, US Supreme Court, William O. Douglas

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

The CIA’s Technical Services Division (TSD) considers plans to undermine Fidel Castro’s charismatic appeal by sabotaging his speeches. At one point, there is discussion of spraying Castro’s broadcasting studio with a hallucinogenic chemical. The plan is taken of the shelf because the chemical is deemed unreliable. During this period, the TSD laces a box of cigars with a chemical that would produce temporary disorientation, hoping that he will smoke one of the cigars before giving a speech. In another instance, the TSD comes up with a scheme to dust Castro’s shoes with thallium salts during a trip outside of Cuba. The salts would cause his beard to fall out. The plan is abandoned when Castro cancels the trip. [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, Technical Services Division (TSD)

Timeline Tags: US-Cuba (1959-2005)

The CIA works with a high-level Cuban official, codenamed “AM/LASH,” on a plan to assassinate Fidel Castro and overthrow his government. In June 1965, the CIA ends its contact with AM/LASH and his associates, citing security concerns. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Timeline Tags: US-Cuba (1959-2005)

The CIA’s Task Force W devises two plans to assassinate Fidel Castro. The first one, involving an exploding sea shell that would be placed where Castro regularly dives, is dismissed by the CIA’s Technical Services Division (TSD) as impractical. In the second plan, James Donovan (who has been negotiating with Castro for the release of prisoners taken during the Bay of Pigs operation) would present Castro with a contaminated diving suit. TSD decides to give the plan a try. It purchases a diving suit and laces its breathing apparatus with tubercule bacillus. The suit itself is dusted with a fungus that is known to cause a chronic skin disease. But the suit never leaves the laboratory. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Entity Tags: Technical Services Division (TSD), James Donovan, Fidel Castro

Timeline Tags: US-Cuba (1959-2005)

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]

Entity Tags: Malcolm Little, Central Intelligence Agency, Church Committee, Lew Allen, National Security Agency, Martin Luther King, Jr., Office of Security Services, Joan Baez

Timeline Tags: Civil Liberties

The Washington Post runs a front-page photo of a US soldier supervising the waterboarding of a captured North Vietnamese soldier. The caption says the technique induced “a flooding sense of suffocation and drowning, meant to make him talk.” Because of the photo, the US Army initiates an investigation, and the soldier is court-martialed and convicted of torturing a prisoner. [National Public Radio, 11/3/2007]

Entity Tags: Washington Post, US Department of the Army

Timeline Tags: Torture of US Captives

Dan Hill.Dan Hill. [Source: Amanda Gordon / Bloomberg]Dan Hill, a US Army Ranger who is undergoing officer training, comes up with a hypothetical plan by which the Soviet Union could start a nuclear war with the United States, which involves a suicide pilot crashing a military transport plane into the US Capitol building in Washington, DC.
Trainees Tasked with Imagining How to Start a World War - After his tour in Vietnam came to an end in mid-1969, Hill was chosen for the career officer training program at Fort Benning, Georgia. He is currently taking a course in nuclear weapons deployment. Toward the end of the semester, he is given the assignment of imagining he is a Soviet premier who wants to start World War III against the US. Hill and his fellow trainees are told to prepare a written plan, describing how they would initiate the war.
Plan Involves Crashing Plane into Capitol Building - Hill comes up with a plan, which he gives the code name “State of the Union.” It involves recruiting and training a suicide pilot, obtaining a C-47 transport plane, and filling it with explosives. Then, as journalist and author James B. Stewart will describe: “On the night of the State of the Union, the pilot would fly the plane straight into the Capitol building, through the rotunda, and into the House of Representatives, where the bombs on the plane would be set to explode. He’d take out the president, his cabinet, the members of the Supreme Court, the Joint Chiefs of Staff, and most senators and representatives. At that moment, the Soviet Union would unleash its nuclear missiles.” According to Hill, everyone in the US would be “watching TV, there’s no air defense around the Capitol; by the time anyone realized an aircraft was near, it would be too late.”
Commander Questions Hill about His Plan - On the Monday after Hill submits his plan, a lieutenant colonel in intelligence stops him on his way to class and says, “I’ve got some people who would like to talk to you.” Hill is taken to a room where Major General John Carley, the assistant commander of the infantry school, is waiting, along with six men in uniform and several other men who are dressed in dark suits, all of them looking serious. Carley is holding Hill’s paper and asks, “How did you come up with this?” Hill replies, “This is my area of expertise,” and explains that he has been trained in unconventional warfare, counterterrorism, the use of explosives, and demolition. He is then questioned for almost an hour about his plan. Finally, Carley says, “We’d prefer you forget you ever did this.” Hill agrees to do so and is then dismissed.
Hill Informs Friend about His Plan - Hill writes to his friend Rick Rescorla, who has also served in the Army, about the incident. In his reply, Rescorla writes: “You evil-minded b_stard! When you have these thoughts, don’t publicize them to anyone. The plan is tactically and technically proficient; it makes sense, but only to people like you and me. To the rest of the world, it looks like the workings of a deviant mind. This kind of thing terrifies people.” [Stewart, 2002, pp. 152-153] Rescorla will subsequently work as the head of security for a company at the World Trade Center. [New Yorker, 2/11/2002] While he is in that position, he will be drawing from Hill’s plan when, after the 1993 bombing, he determines that terrorists will likely target the WTC again by crashing a cargo plane into it (see Shortly After February 26, 1993). [Stewart, 2002, pp. 193-194] Hill will learn that, shortly after his meeting with Carley, enhanced air defenses were installed for Washington. He will therefore think that some good may have come from the meeting. [Stewart, 2002, pp. 153]

Entity Tags: Rick Rescorla, John Carley, Daniel J. Hill

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

July 26-27, 1970: Nixon Rejects Huston Plan

After President Nixon approves of the so-called “Huston Plan” to implement a sweeping new domestic intelligence and internal security apparatus (see July 14, 1970), FBI director J. Edgar Hoover brings the plan’s author, White House aide Tom Charles Huston (see June 5, 1970), into his office and vents his disapproval. The “old ways” of unfettered wiretaps, political infiltration, and calculated break-ins and burglaries are “too dangerous,” he tells Huston. When, not if, the operations are revealed to the public, they will open up scrutiny of US law enforcement and intelligence agencies, and possibly reveal other, past illegal domestic surveillance operations that would embarrass the government. Hoover says he will not share FBI intelligence with other agencies, and will not authorize any illegal activities without President Nixon’s personal, written approval. The next day, Nixon orders all copies of the decision memo collected, and withdraws his support for the plan. [Reeves, 2001, pp. 236-237] W. Mark Felt, the deputy director of the FBI, later calls Huston “a kind of White House gauleiter over the intelligence community.” Washington Post reporter Bob Woodward will note that the definition of “gauleiter” is, according to Webster’s Dictionary, “the leader or chief officoal of a political district under Nazi control.” [Woodward, 2005, pp. 33-34]

Entity Tags: W. Mark Felt, Tom Charles Huston, J. Edgar Hoover, Federal Bureau of Investigation, Central Intelligence Agency, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

The US Supreme Court, in what becomes informally known as the “Keith case,” upholds, 8-0, an appellate court ruling that strikes down warrantless surveillance of domestic groups for national security purposes. The Department of Justice had wiretapped, without court warrants, several defendants charged with destruction of government property; those wiretaps provided key evidence against the defendants. Attorney General John Mitchell refused to disclose the source of the evidence pursuant to the “national security” exception to the Omnibus Crime Control and Safe Streets Act of 1968. The courts disagreed, and the government appealed the decision to the Supreme Court, which upheld the lower courts’ rulings against the government in a unanimous verdict. The Court held that the wiretaps were an unconstitutional violation of the Fourth Amendment, establishing the judicial precedent that warrants must be obtained before the government can wiretap a US citizen. [US Supreme Court, 6/19/1972; Bernstein and Woodward, 1974, pp. 258-259] Critics of the Nixon administration have long argued that its so-called “Mitchell Doctrine” of warrantlessly wiretapping “subversives” has been misused to spy on anyone whom Nixon officials believe may be political enemies. [Bernstein and Woodward, 1974, pp. 258-259] As a result of the Supreme Court’s decision, Congress passes the Foreign Intelligence Surveillance Act. [John Conyers, 5/14/2003]
Opinion of Justice Powell - Writing for the Court, Justice Lewis Powell observes: “History abundantly documents the tendency of Government—however benevolent and benign its motives—to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the government attempts to act under so vague a concept as the power to protect ‘domestic security.’ Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent.” [US Supreme Court, 6/19/1972]
Justice Department Wiretapped Reporters, Government Officials - In February 1973, the media will report that, under the policy, the Justice Department had wiretapped both reporters and Nixon officials themselves who were suspected of leaking information to the press (see May 1969 and July 26-27, 1970), and that some of the information gleaned from those wiretaps was given to “Plumbers” E. Howard Hunt and G. Gordon Liddy for their own political espionage operations. [Bernstein and Woodward, 1974, pp. 258-259]
Conyers Hails Decision 30 Years Later - In 2003, Representative John Conyers (D-MI) will say on the floor of the House: “Prior to 1970, every modern president had claimed ‘inherent Executive power’ to conduct electronic surveillance in ‘national security’ cases without the judicial warrant required in criminal cases by the Fourth Amendment to the Constitution. Then Attorney General John Mitchell, on behalf of President Richard Nixon sought to wiretap several alleged ‘domestic’ terrorists without warrants, on the ground that it was a national security matter. Judge [Damon] Keith rejected this claim of the Sovereign’s inherent power to avoid the safeguard of the Fourth Amendment. He ordered the government to produce the wiretap transcripts. When the Attorney General appealed to the US Supreme Court, the Court unanimously affirmed Judge Keith. The Keith decision not only marked a watershed in civil liberties protection for Americans. It also led directly to the current statutory restriction on the government’s electronic snooping in national security cases.” [John Conyers, 5/14/2003]

Entity Tags: Lewis Powell, US Supreme Court, John Mitchell, E. Howard Hunt, US Department of Justice, G. Gordon Liddy, ’Plumbers’, Damon Keith, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

CIA Counterintelligence Director James Angleton.CIA Counterintelligence Director James Angleton. [Source: CI Centre.com]CIA Director James Schlesinger orders an internal review of CIA surveillance operations against US citizens. The review finds dozens of instances of illegal CIA surveillance operations against US citizens dating back to the 1950s, including break-ins, wiretaps, and the surreptitious opening of personal mail. The earlier surveillance operations were not directly targeted at US citizens, but against “suspected foreign intelligence agents operating in the United States.” Schlesinger is disturbed to find that the CIA is currently mounting illegal surveillance operations against antiwar protesters, civil rights organizations, and political “enemies” of the Nixon administration. In the 1960s and early 1970s, CIA agents photographed participants in antiwar rallies and other demonstrations. The CIA also created a network of informants who were tasked to penetrate antiwar and civil rights groups and report back on their findings. At least one antiwar Congressman was placed under surveillance, and other members of Congress were included in the agency’s dossier of “dissident Americans.” As yet, neither Schlesinger nor his successor, current CIA Director William Colby, will be able to learn whether or not Schlesinger’s predecessor, Richard Helms, was asked by Nixon officials to perform such illegal surveillance, though both Schlesinger and Colby disapproved of the operations once they learned of them. Colby will privately inform the heads of the House and Senate Intelligence Committees of the domestic spying engaged in by his agency. The domestic spying program was headed by James Angleton, who is still serving as the CIA’s head of counterintelligence operations, one of the most powerful and secretive bureaus inside the agency. It is Angleton’s job to maintain the CIA’s “sources and methods of intelligence,” including the prevention of foreign “moles” from penetrating the CIA. But to use counterintelligence as a justification for the domestic spying program is wrong, several sources with first-hand knowledge of the program will say in 1974. “Look, that’s how it started,” says one. “They were looking for evidence of foreign involvement in the antiwar movement. But that’s not how it ended up. This just grew and mushroomed internally.” The source continues, speaking hypothetically: “Maybe they began with a check on [Jane] Fonda. They began to check on her friends. They’d see her at an antiwar rally and take photographs. I think this was going on even before the Huston plan” (see July 26-27, 1970 and December 21, 1974). “This wasn’t a series of isolated events. It was highly coordinated. People were targeted, information was collected on them, and it was all put on [computer] tape, just like the agency does with information about KGB agents. Every one of these acts was blatantly illegal.” Schlesinger begins a round of reforms in the CIA, a program continued by Colby. [New York Times, 12/22/1974 pdf file]

Entity Tags: William Colby, Senate Intelligence Committee, Richard Helms, James Angleton, Jane Fonda, Nixon administration, Central Intelligence Agency, James R. Schlesinger, House Intelligence Committee

Timeline Tags: Civil Liberties

Former CIA director Richard Helms.Former CIA director Richard Helms. [Source: Search.com]Former CIA director Richard Helms indirectly confirms the involvement of the Nixon administration in his agency’s illegal domestic surveillance operations during his testimony before the Senate Watergate investigative committee. Helms tells the committee that he was told by Nixon’s Foreign Intelligence Advisory Board that the CIA could “make a contribution” in domestic intelligence operations. “I pointed out to them very quickly that it could not, there was no way,” Helms testifies. “But this was a matter that kept coming up in the context of feelers: Isn’t there somebody else who can take on these things if the FBI isn’t doing them as well as they should, as there are no other facilities?” (FBI director J. Edgar Hoover’s opposition to the idea of spying on US citizens for Nixon’s political purposes is well documented.) CIA officials say that, despite Helms’s testimony, Helms began the domestic spying program as asked, in the beginning to investigate beliefs that the antiwar movement was permeated by foreign intelligence agents in 1969 and 1970. “It started as a foreign intelligence operation and it bureaucratically grew,” one source says in 1974. “That’s really the answer.” The CIA “simply began using the same techniques for foreigners against new targets here.” The source will say James Angleton, the CIA’s director of counterintelligence (see 1973), began recruiting double agents inside the antiwar and civil rights organizations, and sending in “ringers” to penetrate the groups and report back to the CIA. “It was like a little FBI operation.” Angleton reportedly believes that both the protest groups and the US media are riddled with Soviet intelligence agents, and acts accordingly to keep those groups and organizations under constant watch. One source will say Angleton has a “spook mentality.” Another source will say that Angleton’s counterintelligence bureau is “an independent power in the CIA. Even people in the agency aren’t allowed to deal directly with the CI [counterintelligence] people. Once you’re in it, you’re in it for life.” [New York Times, 12/22/1974 pdf file]

Entity Tags: Senate Watergate Investigative Committee, Richard Helms, J. Edgar Hoover, James Angleton, Issuetsdeah

Timeline Tags: Civil Liberties, Nixon and Watergate

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Vice President Nelson Rockefeller (see December 19, 1974 and After) is instrumental in keeping Senate Democrats from finding out too much about the intelligence community’s excesses. When the New York Times reveals the existence of a decades-old illegal domestic surveillance program run by the CIA (see December 21, 1974), President Ford heads off calls from Democrats to investigate the program by appointing the “Rockefeller Commission” to investigate in the Democrats’ stead. Senate Democrats, unimpressed with the idea, create the Church Committee to investigate the intelligence community (see April, 1976). Rockefeller is adept at keeping critical documents out of the hands of the Church Committee and the press. When Senator Frank Church asks for materials from the White House, he is told that the Rockefeller Commission has them; when he asks Rockefeller for the papers, he is told that he cannot have them because only the president can authorize access. One Church aide later calls Rockefeller “absolutely brilliant” in denying them access in a friendly manner. “He winked and smiled and said, ‘Gee, I want to help you but, of course I can’t—not until we’ve finished our work and the president approves it,’” the aide recalls. Senator John Tower (R-TX), the vice chairman of the committee, will later reflect, “We were very skillfully finessed.” But even Rockefeller, who has his own history of involvement with the CIA, is taken aback at the excesses of the CIA, particularly its history of assassinating foreign leaders. Rockefeller will eventually turn that information over to the Church Committee, giving that body some of the most explosive evidence as yet made public against the agency. [US Senate, 7/7/2007]

Entity Tags: John Tower, Church Committee, Nelson Rockefeller, Central Intelligence Agency, Frank Church, Gerald Rudolph Ford, Jr, ’Rockefeller Commission’

Timeline Tags: Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” [Dubose and Bernstein, 2006, pp. 34-35]

Entity Tags: Seymour Hersh, US Department of Defense, Ford administration, Edward Levi, Donald Rumsfeld, Church Committee, Richard (“Dick”) Cheney, Philip Buchan, New York Times, Gerald Rudolph Ford, Jr

Timeline Tags: Civil Liberties

The Senate Select Committee to Study Governmental Operations releases its report, “Alleged Assassination Plots Involving Foreign Leaders,” which finds “concrete evidence of at least eight plots involving the CIA to assassinate Fidel Castro from 1960 to 1965.” [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, US Congress

Timeline Tags: US-Cuba (1959-2005)

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]

Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News

Timeline Tags: Civil Liberties

President Ford issues Executive Order 11905, which limits the power of the CIA, the NSA, and military intelligence to engage in surveillance of US citizens. Perhaps its most well-known provision is a total ban on “political assassinations” by US government personnel. [Gerald R. Ford, 2/18/1976; Roberts, 2008, pp. 38] The provision is sparked by the Church Commission’s finding (see April, 1976) that assassination is “unacceptable in our society,” and a political embarassment, especially botched attempts such as the CIA’s efforts to kill Cuba’s Fidel Castro. [Grant J. Lilly, 4/6/2006]

Entity Tags: Church Commission, Gerald Rudolph Ford, Jr, National Security Agency, Central Intelligence Agency

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Interviewer David Frost has a difficult time with his subject, former President Richard Nixon, in the day’s early questioning (see April 6, 1977). Frost attempts to recoup with a line of questioning suggested by his adviser James Reston, Jr., one used in the trial of former Nixon aide John Ehrlichman (see January 1, 1975). Were there no limits to what a president can do, even if the president wants to do something plainly illegal? he asks. Could he do anything despite the law? Burglary? Forgery? Even murder? “If the president does it, that means it’s not illegal,” Nixon retorts. “Never had his imperialism been so baldly stated,” Reston will later reflect. Frost asks if the dividing line between, for example, a police burglary and the murder of an antiwar protester is only the president’s judgment? Nixon agrees, and adds: “There’s nothing specific that the Constitution contemplates in that respect. I haven’t read every word, every jot and every tittle, but I do know this: That it has been, however, argued that as far as a president is concerned, that in war time, a president does have certain extraordinary powers which would make acts that would otherwise be unlawful, lawful if undertaken for the purpose of preserving the nation and the Constitution, which is essential for the rights we’re all talking about.” [Time, 5/30/1977; Reston, 2007, pp. 102-105; Landmark Cases, 8/28/2007]

Entity Tags: Richard M. Nixon, David Frost, James Reston, Jr, John Ehrlichman

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

A photograph of Theodore ‘Ted’ Kaczynski, taken in 1968 while Kaczynski was a young faculty member at the University of California at Berkeley.A photograph of Theodore ‘Ted’ Kaczynski, taken in 1968 while Kaczynski was a young faculty member at the University of California at Berkeley. [Source: George M. Bergman / Wikimedia]An unmailed package is found in a car park at the University of Illinois, Chicago, and brought to Northwestern University in Evanston, Illinois, because of its return address; the addressee now teaches at Rensselaer Polytechnic Institute in Troy, New York. Buckley Crist, the material sciences professor named in the return address on the package cannot identify it, and turns it over to campus security. When Northwestern police officer Terry Marker opens it, it explodes, injuring him slightly. The package contains a pipe bomb packed in a carved wooden box. [BBC, 11/12/1987; Washington Post, 4/14/1996; Washington Post, 1998] The bomb is made of a nine-inch pipe filled with explosive powders and triggered by a nail held by rubber bands that strikes and ignites match heads when the box is opened. [World of Forensic Science, 1/1/2005] The package contains 10 $1 commemorative Eugene O’Neill stamps on its outer wrapper. Authorities will later speculate that the bomber may have chosen the O’Neill stamps because the playwright was an ardent supporter of anarchists. [Knight Ridder, 5/28/1995] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). It is believed to be Kaczynski’s first bomb. [New York Times, 4/7/1996]

Entity Tags: Terry Marker, Northwestern University, Theodore J. (“Ted”) Kaczynski, Buckley Crist

Timeline Tags: US Domestic Terrorism

A young Fauzi Hasbi.A young Fauzi Hasbi. [Source: SBS Dateline]Fauzi Hasbi, the son of a separatist leader in the Indonesian province of Aceh, is captured by an Indonesian military special forces unit in 1979 and soon becomes a mole for the Indonesian government. Hasbi becomes a leader in the separatist Free Aceh Movement (GAM), and he also plays a long-time role in Jemaah Islamiyah, an al-Qaeda affiliate. For many years, he literally lives next door to Jemaah Islamiyah leaders Abu Bakar Bashir and Hambali (see April 1991-Late 2000). In 2005, the Australian television program SBS Dateline will present documents that it claims “prove beyond doubt that Fauzi Hasbi had a long association with the [Indonesian] military.” For instance, military documents dating from 1990 and 1995 give him specific spying tasks. [SBS Dateline, 10/12/2005] In February 2001, the Indonesian magazine Tempo documents some of Hasbi’s links to the Indonesian military, after he has been linked to a major role the Christmas bombings in Indonesia two months earlier (see December 24-30, 2000 and February 20, 2001). He admits to having some ties to certain high-ranking military figures and says he has had a falling out with GAM, but denies being a traitor to any militant group. [Tempo, 2/20/2001; Tempo, 2/27/2001] Yet even after this partial exposure, he continues to pose as an Islamist militant for the military. A 2002 document shows that he is even assigned the job of special agent for BIN, Indonesia’s intelligence agency. [SBS Dateline, 10/12/2005] A December 2002 report by a US think tank, the International Crisis Group, details his role as a government mole. He and two of his associates are abducted and killed in mysterious circumstances in the Indonesian city of Ambon on February 22, 2003. Seven suspects, including an Indonesian policeman, later admit to the killings but their motive for doing so remains murky. [Agence France-Presse, 5/22/2003]

Entity Tags: Tentara Nasional Indonesia, Jemaah Islamiyah, Free Aceh Movement, Badan Intelijen Negara, Fauzi Hasbi

Timeline Tags: Complete 911 Timeline

A graduate student at Northwestern University in Evanston, Illinois, John Harris, is injured when he opens a box left at the University’s Technological Institute. The box contains a bomb that explodes when opened. Harris suffers minor cuts and burns. [BBC, 11/12/1987; Washington Post, 1998] Authorities recognize fundamental similarities between this and a previous Northwestern University bombing (see May 25-26, 1978). This bomb is quite similar in construction to that one, though more sophisticated in construction and design. It consists of a cigar box and a pipe bomb, triggered by a battery-operated filament that ignites explosive powders. [World of Forensic Science, 1/1/2005] However, the package contains a number of small, finger-sized pieces of wood glued to its outer container. [Knight Ridder, 5/28/1995] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see May 25-26, 1978 and April 3, 1996).

Entity Tags: Theodore J. (“Ted”) Kaczynski, Northwestern University, John Harris

Timeline Tags: US Domestic Terrorism

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

About 500 Iranian students take over the American Embassy in Tehran and hold 52 Americans hostage for 444 days. The Mujahedeen-e Khalq (MEK) is one of the groups that supports the take-over. [US Department of State, 4/30/2003; PBS, 1/15/2006]

Entity Tags: People’s Mujahedin of Iran

Timeline Tags: US confrontation with Iran, Iran-Contra Affair

A parcel mailed from Chicago catches fire in a mailbag aboard American Airlines Flight 444 from Chicago to Washington, DC. The package contains a bomb which was apparently constructed to explode inside the cargo hold. Twelve passengers are treated for smoke inhalation; the flight conducts an emergency landing at Dulles Airport near Washington. [BBC, 11/12/1987; Washington Post, 1998] The bomb does not ignite because instead of explosive powder, it contains barium nitrate, a powder often used to create green smoke in fireworks. [World of Forensic Science, 1/1/2005] The bombing is later shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). After the airline bombing and the subsequent bombing of a United Airlines executive (see June 10, 1980), the FBI ties the previous bombings (see May 25-26, 1978 and May 9, 1979) to this one and code-names the file UNABOM, for “UNiversity and Airline BOMber.” The media will soon dub the unknown assailant the “Unabomber.” [Washington Post, 4/4/1996; World of Forensic Science, 1/1/2005] Kaczynski will later express regret for trying to bomb the plane (see April 24, 1995).

Entity Tags: Washington Dulles International Airport, Theodore J. (“Ted”) Kaczynski, Federal Bureau of Investigation

Timeline Tags: US Domestic Terrorism

Due to apparent problems with the use of intelligence information in criminal proceedings, a set of procedures that later becomes known as the “wall” begins to take shape. The FBI, which performs both criminal and counterintelligence functions, normally obtains two types of warrants: criminal warrants and warrants under the recently passed Foreign Intelligence Surveillance Act (FISA). FISA warrants are thought to be easier to obtain, as the FBI only has to show that there is probable cause to believe the subject is a foreign power or an agent of one. Sometimes a case begins as an intelligence investigation, but results in a criminal prosecution. In court the defense can then argue that the government has abused FISA and obtained evidence by improperly using the lower standard, so any evidence obtained under FISA should not be allowed in court. Although the government can use information it happens to obtain under a FISA warrant for a criminal prosecution, if the purpose of obtaining information under a FISA warrant is for a criminal prosecution, this is in violation of the Fourth Amendment’s prohibition against warrantless searches. To combat this apparent problem, the special FISA Court decides that for a warrant under FISA to be granted, collecting intelligence information must be the primary purpose, although such information can be used in a criminal investigation provided the criminal investigation does not become the primary purpose of the surveillance or search. As a result of these procedures, when the FBI is conducting an intelligence investigation and uncovers evidence of criminal activity, it no longer consults local United States Attorneys’ Offices, but prosecutors within the Justice Department’s Criminal Division. The prosecutors then decide when the local attorney’s office should become involved. [US Department of Justice, 11/2004, pp. 21-24 pdf file] The wall will be extended in the 1990s (see July 19, 1995) and will be much criticized before and after 9/11 (see July 1999 and April 13, 2004).

Entity Tags: Foreign Intelligence Surveillance Act, Federal Bureau of Investigation, US Department of Justice, Foreign Intelligence Surveillance Court

Timeline Tags: Complete 911 Timeline

In his Lake Forest, Illinois, home, United Airlines president Percy Wood opens a package that apparently contains a book. It contains both a book and a bomb in the book’s hollowed-out pages. It explodes, causing Wood to suffer cuts and bruises. The initials “FC” are found etched on, or punched into, a piece of pipe from the bomb. [BBC, 11/12/1987; Washington Post, 1998; World of Forensic Science, 1/1/2005] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). “FC” will later be found to stand for “Freedom Club.” [Washington Post, 1/23/1998; World of Forensic Science, 1/1/2005] Authorities will later speculate that Wood may have been targeted in part because of Kaczynski’s strange fascination with wood; he often uses wood in the construction of his bombs. The hollowed-out book, Ice Brothers, is published by Arbor House, whose symbol is a tree leaf. [Associated Press, 4/25/1995] The package contains a note asking Wood to read the enclosed book, and noting, “You will find it of great social significance.” The author of Ice Brothers, Sloan Wilson, also wrote The Man in the Gray Flannel Suit, which, according to a 1959 biography of Wilson, “was the definitive epithet for the commuting suburbanite, the status-hungry conformist from Madison Avenue.” Like an earlier bomb (see May 25-26, 1978), this bomb’s package is mailed using postage stamps commemorating the playwright Eugene O’Neill; authorities will speculate that Kaczynski may have chosen the stamps because of O’Neill’s ardent support of anarchists. [Knight Ridder, 5/28/1995]

Entity Tags: Percy Wood, Theodore J. (“Ted”) Kaczynski

Timeline Tags: US Domestic Terrorism

A federal court rules that because of the government’s “state secrets” privilege (see March 9, 1953), a civilian plaintiff suing the US Navy over a contractual agreement cannot even access “non-privileged,” or unclassified, information from the Navy because to do so might “threaten disclosure” of material that goes against “the overriding interest of the United States… preservation of its state secrets privilege precludes any further attempt to pursue litigation.” [Siegel, 2008, pp. 196-197]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

A maintenance worker at the University of Utah in Salt Lake City finds a bomb in a business classroom. The device is defused by the local bomb squad and no one is injured. [BBC, 11/12/1987; Washington Post, 1998] The bomb will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996).

Entity Tags: Theodore J. (“Ted”) Kaczynski, University of Utah

Timeline Tags: US Domestic Terrorism

The “Army of God” (AOG), an underground anti-abortion extremist group, forms, according to government documents. The Army of God advocates violence towards abortion providers and clinics, and will even recommend murder and assassination of abortion providers (see Early 1980s); later it will also advocate violence against homosexuals in order to end what it calls the “homosexual agenda.” Current and future leaders and prominent members will include Don Benny Anderson (see August 1982), Michael Bray (see September 1994), James Kopp (see October 23, 1998), Neal Horsley (see January 1997), and Eric Robert Rudolph (see January 29, 1998). It is unclear how large the group is. The group advocates “whatever means are necessary” to stop abortions, which it calls “baby-killing.” According to government documents, the AOG manual “explicitly states that this is a ‘real’ army, with the stated mission of choosing violent means both to permanently end the ability of medical personnel to perform abortions and to draw media attention to their opposition to women’s right to choose to have abortions.” The AOG advocates the use of glue, acid, firebombs, and explosives against clinics and clinic personnel, and later advocates shooting abortion providers and clinic staff. A government document says, “It is explicitly stated in the manual that violence is the preferred means to the desired end, and there are references to ‘execution’ of abortion clinic staff.” The manual states that the local members of the Army of God are not told of the identities of other members, in order to make certain that “the feds will never stop us.” AOG documents will also threaten the US government and the United Nations, calling the UN an “ungodly Communist regime” supported by its “legislative-bureaucratic lackeys in Washington.” A letter apparently written by AOG leader Donald Spitz will claim of the US government and the UN: “It is you who are responsible and preside over the murder of children and issue the policy of ungodly perversion that’s destroying our people.… Death to the New World Order.” The AOG will openly declare itself a terrorist organization in responses to media articles. It will maintain that a state of undeclared war has existed in the US since the 1973 Roe v. Wade Supreme Court decision legalizing abortion (see January 22, 1973), and it carries out terrorist attacks against abortion clinics and providers in order to “defend God’s children” against state-sponsored “slaughter.” The AOG will repeatedly state that it intends to continue its violent, deadly attacks against abortion clinics and providers until all laws legalizing abortion are repealed. After 2001, the AOG will begin rhetorically attacking homosexuals as well as abortion providers (see 2002). It will also proclaim its solidarity with Muslim extremist groups over such incidents as the September 11 attacks. AOG members will publicly profess their enthusiasm for mounting chemical and biological attacks. [Extremist Groups: Information for Students, 1/1/2006]

Entity Tags: Michael Bray, Army of God, Don Benny Anderson, Neal Horsley, Donald Spitz, James Kopp, Eric Robert Rudolph, United Nations

Timeline Tags: US Health Care, US Domestic Terrorism

A parcel addressed to the head of the Vanderbilt University computer science department, Patrick Fischer, explodes, injuring Fischer’s secretary, Janet Smith. The package was originally sent to Fischer at Pennsylvania State University but was later forwarded to Nashville, Tennessee, where Vanderbilt University is located and where Fischer now teaches. [BBC, 11/12/1987; Washington Post, 1998] Fischer will later describe Smith’s injuries as “nasty lacerations,” and will say, “She made a full recovery, but it was very traumatic for her.” The bomb itself consists of smokeless powder and a large number of match heads. The package has a false return address, stating it comes from LeRoy Bearnson, a professor of electrical engineering at Utah’s Brigham Young University. Bearnson will later say, “I suppose the guy didn’t care which way it went or who got blown up.” FBI agent Oliver “Buck” Revell, who takes part in early phases of the bomb investigation, will later say: “He might pick out an individual, but the person was still a symbolic target to him. I suspect that once he targeted the university research system, it didn’t matter that much who received it. I suspect he felt the country would pick up the symbolism.” The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). When Fischer, along with the rest of the country, learns of Kaczynski’s identity, he will try to find connections between himself and Kaczynski, and come up with only the most tenuous of relationships: Fischer studied at the Massachusetts Institute of Technology (MIT) while Kaczynski studied at nearby Harvard, and Fischer may have shared a Harvard math class with Kaczynski. He also spent time in Salt Lake City, a city with which Kaczynski is familiar. “The agents made it very clear that I was the target,” Fischer will later say. “I still have no idea why, except my feeling is that he chose names at random with certain associations.” [Washington Post, 4/14/1996]

Entity Tags: Theodore J. (“Ted”) Kaczynski, Janet Smith, LeRoy Bearnson, Patrick Fischer, Vanderbilt University, Oliver (“Buck”) Revell

Timeline Tags: US Domestic Terrorism

An electrical engineering and computer science professor with the University of California at Berkeley, Diogenes Angelakos, picks up what he believes is a turpentine can, left in a common room in the computer science building during construction work. The can, a green, gallon-sized container, has wires dangling from it and a clock-dial attached to the wires. The device is a pipe bomb. It explodes, temporarily blinding Angelakos and severely burning his right hand. [BBC, 11/12/1987; Washington Post, 11/27/1993; Washington Post, 4/14/1996; Washington Post, 1998] The injuries to his hand and arm prevent him from effectively caring for his wife Helen in her final days; she will die a month later of terminal cancer. “I went to her funeral with my arm in a sling,” Angelakos will later recall. [Washington Post, 11/27/1993] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski once worked as a professor at UC-Berkeley.

Entity Tags: Diogenes Angelakos, Theodore J. (“Ted”) Kaczynski, University of California at Berkeley, Helen Angelakos

Timeline Tags: US Domestic Terrorism

In the second of two rulings in the case of Halkin v Helms, the judiciary comes down squarely on the side of the US government against charges of illegal surveillance and wiretapping leveled against American anti-war protesters. The district and appellate courts uphold the federal government’s “state secrets” claim as codified in US v Reynolds (see March 9, 1953), thereby denying the plaintiffs the right to see government information that they claim would prove their case. The DC Court of Appeals writes that the federal courts do not have any constitutional role as “continuing monitors of the wisdom and soundness of Executive action,” and instead the courts “should accord utmost deference to executive assertions of privilege on grounds of military or diplomatic secrets… courts need only be satisfied that there is a reasonable danger” that military secrets might be exposed. [Siegel, 2008, pp. 196-196]

Timeline Tags: Civil Liberties

The Port Authority of New York and New Jersey holds a drill at the World Trade Center based on the scenario of a plane crashing into one of the Twin Towers. Numerous agencies participate in the drill, which is held on a Sunday. As well as the Port Authority, these include the New York City Fire Department, the New York City Police Department, and the Emergency Medical Services. Guy Tozzoli, the director of the Port Authority’s World Trade Department, will describe the drill during a legislative hearing in 1993 (see (March 29, 1993)). He will recall that the Port Authority simulates the “total disaster” of “the airplane hitting the building” and participants simulate “blood coming out of people.” He will add that the drill is “a real preparation for a disaster.” [Newsday, 11/12/2001; Dwyer and Flynn, 2005, pp. 58-59] (During the hearing, Tozzoli will mistakenly recall the drill being conducted in the late 1970s, but it is in fact held in November 1982. [Dwyer and Flynn, 2005, pp. 274] ) The drill follows an incident in 1981, when an Argentine aircraft came within 90 seconds of crashing into the WTC’s North Tower as a result of having problems communicating with air traffic controllers (see February 20, 1981). Asked about the drill shortly after 9/11, Tozzoli will say it was held “just to have people trained within the city for that particular scenario [of a plane hitting the WTC].” The 1982 exercise appears to be the last “joint drill involving all the emergency responders” held at the WTC prior to the 9/11 attacks, 19 years later, according to New York Times reporters Jim Dwyer and Kevin Flynn. [Newsday, 11/12/2001; Dwyer and Flynn, 2005, pp. 59]

Entity Tags: Guy Tozzoli, New York City Police Department, Port Authority of New York and New Jersey, New York City Fire Department

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Youssef Nada.Youssef Nada. [Source: Zuma Press/ NewsCom]In November 2001, Swiss investigators will search the home of Youssef Nada, the leader of Al Taqwa Bank, a Swiss bank that had just been shut down by the US and the UN for alleged ties to al-Qaeda, Hamas, and other radical militant groups (see November 7, 2001). Nada and other Al Taqwa directors are prominent members of the Muslim Brotherhood. Newsweek will say, “The Brotherhood, founded in Egypt in 1928 as a religious and quasi-political counterweight to the corrupt and increasingly decadent royalist and colonial governments dominating the Islamic world, always has had two faces: one a peaceful public, proselytizing and social-welfare oriented wing; the other a clandestine, paramilitary wing.… Intelligence and law-enforcement officials say that while some branches and elements of the Brotherhood, such as the offshoots now operating in Egypt and Syria, have pledged to work for their goal of a worldwide Islamic caliphate using peaceful means and electoral politics, the Brotherhood has also spun off many—if not most—of the more violent local and international groups devoted to the cause of Islamic holy war.” Such offshoots will include al-Qaeda and Hamas. [Newsweek, 12/24/2004] Swiss investigators discover a 14-page document from December 1982 entitled “The Project.” Nada claims not to know who wrote the document or how he came to have it, and he says he disagrees with most of the contents. The document details a strategic plan whose ultimate goal is “the establishment of the reign of God over the entire world.” The document begins, “This report presents a global vision of an international strategy of Islamic policy.” It recommends to “study of the centers of power locally and worldwide, and the possibilities of placing them under influence,” to contact and support new holy war movements anywhere in the world, to support holy war in Palestine, and “nurtur[e] the sentiment of rancor with regard to Jews.” Swiss investigators who analyze the document will later write that the strategy aims to achieve “a growing influence over the Muslim world. It is pointed out that the [Muslim Brotherhood] doesn’t have to act in the name of the Brotherhood, but can infiltrate existing entities. They can thus avoid being located and neutralized.” The document also advocates creating a network of religious, educational, and charitable institutions in Europe and the US to increase influence there. [Unknown, 12/1982; Le Temps (Geneva), 10/6/2005]

Entity Tags: Muslim Brotherhood

Timeline Tags: Complete 911 Timeline

CSA members outside their Arkansas compound. Some CSA members also belong to the Elohim City community.CSA members outside their Arkansas compound. Some CSA members also belong to the Elohim City community. [Source: GifS (.com)]Three white supremacists living in the Elohim City, Oklahoma, compound (see 1973 and After) visit Oklahoma City and make plans to blow up the Murrah Federal Building there. The three are: James Ellison, the leader of the Covenant, Sword, and Arm of the Lord (CSA) who will be arrested in 1985 after a four-day standoff with federal authorities; Kerry Noble; and Richard Wayne Snell, who will be executed for murdering a black police officer and a businessman he erroneously believed to be Jewish (see 9:00 p.m. April 19, 1995). All three men have close ties to the neo-Nazi Aryan Nations (see Early 1970s). The evidence of their plan is released during the investigation of the 1995 Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995), and is collated by former US prosecutor Steven N. Snyder, who once worked out of the Fort Smith, Arkansas District Attorney’s office. The plan involves parking a van or trailer in front of the building and exploding it with rockets detonated by a timer. Snyder will come across the information on the bombing plot while preparing for the trial of a sedition case against a 14-man group of white supremacists, 10 of whom are charged with planning to overthrow the government. (All 14 will be acquitted in a 1988 trial—see Late 1987 - April 8, 1998.) Snyder will get the information from Ellison, who provides information to him as part of his role as chief witness for the prosecution. The other defendants in the trial, many of whom are believed to have had some connection to the bombing plot, will be Richard Butler, the head of Aryan Nations; Robert E. Miles, a former Klansman who heads the Mountain Church of Jesus Christ the Saviour in Cohoctah, Michigan; and Louis R. Beam Jr., a former grand dragon of the Texas Ku Klux Klan and “ambassador at large” of the Aryan Nations. Ellison will tell Snyder that in July 1983, he attends a meeting of extremist groups in Hayden Lake, Idaho, the location of the Aryan Nations headquarters, where he informs them of the death of fellow white supremacist Gordon Kahl in a gun battle with law enforcement agents in Arkansas (see March 13 - June 3, 1983). Snyder’s notes of Ellison’s statement read, “Kahl was the catalyst that made everyone come forth and change the organizations from thinkers to doers.” According to Ellison, the leaders of the various supremacist groups discuss how to overthrow the federal government, using as a sourcebook the novel The Turner Diaries (see 1978), which tells of a successful move by white supremacists to overthrow the government and then commit genocide against Jews and blacks. Ellison will tell Snyder that he volunteers to assassinate federal officials in Arkansas as part of the plot. The leaders discuss blowing up the Murrah Building in Oklahoma City, other federal buildings, and the Dallas office of a Jewish organization. According to Ellison’s trial testimony, in October 1983 Snell and another participant, Steve Scott, “asked me to design a rocket launcher that could be used to destroy these buildings from a distance.” Of Snell, Ellison will testify: “On one of the trips when I was with Wayne, he took me to some of the buildings and asked me to go in the building and check the building out. This kind of thing.” Ellison will tell Snyder that at Snell’s request, he surveills the Murrah Building to assess what it would take to damage and destroy it. He makes preliminary sketches and drawings. According to the preliminary plans, rocket launchers are to be “placed in a trailer or a van so that it could be driven up to a given spot, parked there, and a timed detonating device could be triggered so that the driver could walk away and leave the vehicle set in position, and he would have time to clear the area before any of the rockets launched.… And I was asked to make it so it would fit in either a trailer or a van or a panel truck.” Synder will later say that Snell is embittered towards the government because of the IRS, which took him to court and seized property from him for failure to pay taxes. But, Snyder will add, “you can’t be sure about any of this, because a federal raid, to a lot of these people, is any time the postman brings the mail.” Ellison will be taken into custody after a four-day standoff with state and federal authorities in 1985, only convinced to surrender after white supremacist Robert Millar talks him into giving up (see 1973 and After). Ellison will be convicted of racketeering charges and sentenced to 20 years in prison. He will enter the federal witness protection program until completing his parole and leaving the program on April 21, 1995, two days after the Oklahoma City bombing. [New York Times, 5/20/1995; Anti-Defamation League, 8/9/2002; Nicole Nichols, 2003]

Entity Tags: Louis R. Beam, Jr, James Ellison, Gordon Kahl, Elohim City, Covenant, Sword, and Arm of the Lord, Aryan Nations, Kerry Noble, Murrah Federal Building, Richard Girnt Butler, Robert Millar, Steve Scott, Steven N. Snyder, Richard Wayne Snell, Robert E. Miles

Timeline Tags: US Domestic Terrorism

The October 1983 bombing of US Marine barracks in Beirut, Lebanon.The October 1983 bombing of US Marine barracks in Beirut, Lebanon. [Source: US Marine Corps.]In June 1982, Israel invaded Lebanon and US Marines were sent to Lebanon as a peacekeeping force in September 1982. On April 18, 1983, the US embassy in Beirut, Lebanon, is bombed by a suicide truck attack, killing 63 people. On October 23, 1983, a Marine barracks in Beirut is bombed by another suicide truck attack, killing 241 Marines. In February 1984, the US military will depart Lebanon. The radical militant group Islamic Jihad will take credit for both attacks (note that this is not the group led by Ayman al-Zawahiri). The group is believed to be linked to Hezbollah. Prior to this year, attacks of this type were rare. But the perceived success of these attacks in getting the US to leave Lebanon will usher in a new era of suicide attacks around the world. The next two years in particular will see a wave of such attacks in the Middle East, many of them committed by the radical militant group Hezbollah. [US Congress, 7/24/2003; US Congress, 7/24/2003 pdf file] The Beirut bombings will also inspire Osama bin Laden to believe that the US can be defeated by suicide attacks. For instance, he will say in a 1998 interview: “We have seen in the last decade the decline of the American government and the weakness of the American soldier who is ready to wage Cold Wars and unprepared to fight long wars. This was proven in Beirut when the Marines fled after two explosions.” [ABC News, 5/28/1998] In 1994, he will hold a meeting with a top Hezbollah leader (see Shortly After February 1994) and arrange for some of his operatives to be trained in the truck bombing techniques that were used in Beirut. [9/11 Commission, 7/24/2004, pp. 48]

Entity Tags: Hezbollah, Islamic Jihad Organization, Ayman al-Zawahiri, Osama bin Laden

Timeline Tags: Complete 911 Timeline

July 29, 1983: SAAR Network Is Founded

555 Grove Street, Herndon, Virginia. This is the location of the SAAR Foundation/Safa Group and many related businesses.555 Grove Street, Herndon, Virginia. This is the location of the SAAR Foundation/Safa Group and many related businesses. [Source: Paul Sperry]The SAAR Foundation is incorporated in Herndon, Virginia, just outside Washington. It will become an umbrella organization for a cluster of over 100 charities, think tanks, and businesses known as the SAAR network. In 2002, the US government will raid the SAAR network looking for ties to the Al Taqwa Bank and the Muslim Brotherhood (see March 20, 2002). [Farah, 2004, pp. 153]

Entity Tags: SAAR Foundation

Timeline Tags: Complete 911 Timeline

Bin Laden first works for Maktab al-Khidamat from this building in Peshawar, a former British government guesthouse.Bin Laden first works for Maktab al-Khidamat from this building in Peshawar, a former British government guesthouse. [Source: PBS]Bin Laden moves to Peshawar, a Pakistani town bordering Afghanistan, and helps run a front organization for the mujaheddin known as Maktab al-Khidamat (MAK), which funnels money, arms, and fighters from the outside world into the Afghan war. [New Yorker, 1/24/2000] “MAK [is] nurtured by Pakistan’s state security services, the Inter-Services Intelligence agency, or ISI, the CIA’s primary conduit for conducting the covert war against Moscow’s occupation.” [MSNBC, 8/24/1998] Bin Laden becomes closely tied to the warlord Gulbuddin Hekmatyar, and greatly strengthens Hekmatyar’s opium smuggling operations. [Le Monde (Paris), 9/14/2001] Hekmatyar, who also has ties with bin Laden, the CIA, and drug running, has been called “an ISI stooge and creation.” [Asia Times, 11/15/2001] MAK is also known as Al-Kifah and its branch in New York is called the Al-Kifah Refugee Center. This branch will play a pivotal role in the 1993 WTC bombing and also has CIA ties (see January 24, 1994).

Entity Tags: Osama bin Laden, Gulbuddin Hekmatyar, Central Intelligence Agency, Maktab al-Khidamat, Pakistan Directorate for Inter-Services Intelligence

Timeline Tags: Complete 911 Timeline, War in Afghanistan

Detective Sergeant Peter Caram, the head of the New York Port Authority’s Terrorist Intelligence Unit, has been directed by the assistant superintendent of the Port Authority Police Department to compile a report on the vulnerability of the WTC to a terrorist attack. Having previously worked at the WTC Command, Caram has exclusive knowledge of some of the center’s security weaknesses. On this day he issues his four-page report, titled “Terrorist Threat and Targeting Assessment: World Trade Center.” It looks at the reasoning behind why the WTC might be singled out for attack, and identifies three areas of particular vulnerability: the perimeter of the WTC complex, the truck dock entrance, and the subgrade area (the lower floors below ground level). Caram specifically mentions that terrorists could use a car bomb in the subgrade area—a situation similar to what occurs in the 1993 bombing (see February 26, 1993). [Caram, 2001, pp. 5, 84-85; New York County Supreme Court, 1/20/2004] This is the first of several reports during the 1980s, identifying the WTC as a potential terrorist target.

Entity Tags: World Trade Center, Peter Caram

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The DC Court of Appeals rejects a claim by civilian plaintiffs to force the government to disclose classified information as part of a lawsuit, citing the “state secrets” privilege (see March 9, 1953). Furthermore, the court broadens the definition of “state secrets” to include “disclosure of intelligence-gathering methods or capabilities and disruption of diplomatic relations.” [Siegel, 2008, pp. 197]

Timeline Tags: Civil Liberties

Sheikh Abdullah Azzam and his son-in-law Abdullah Anas in Afghanistan during the 1980s.Sheikh Abdullah Azzam and his son-in-law Abdullah Anas in Afghanistan during the 1980s. [Source: History Channel]Osama bin Laden, Sheikh Abdullah Azzam, bin Laden’s mentor, and Abdullah Anas, Azzam’s son-in-law, create an organization called Maktab al-Khidamat (MAK), known in English as the Services Office. It is also known as Al-Kifah. This organization will become a key node in the private funding network for the Afghan war. [Bergen, 2006, pp. 28-30] The US government will later call it the “precursor organization to al-Qaeda.” [9/11 Commission, 8/21/2004, pp. 89 pdf file] Initially, Azzam runs it while bin Laden funds it. They create a guesthouse in Peshawar, Pakistan, to help foreign volunteers connect with rebel forces in Afghanistan. Prior to this time, the number of such volunteers is very small, perhaps only several dozen. But the number begins to dramatically expand. [New York Times, 1/14/2001; Bergen, 2006, pp. 28-30] Donors will include the Saudi intelligence agency, the Saudi Red Crescent, the Muslim World League, and private donors, including Saudi princes. [Pittsburgh Post-Gazette, 9/23/2001] MAK/Al-Kifah begins fundraising in the US one year later (see 1985-1989).

Entity Tags: Maktab al-Khidamat, Abdullah Anas, Abdullah Azzam, Osama bin Laden

Timeline Tags: Complete 911 Timeline, War in Afghanistan

Makhtab al-Khidamat offices in the US in the late 1980s. Some of the offices in fact were represented by single individuals.Makhtab al-Khidamat offices in the US in the late 1980s. Some of the offices in fact were represented by single individuals. [Source: National Geographic] (click image to enlarge)Sheikh Abdullah Azzam, bin Laden’s mentor, makes repeated trips to the US and other countries, building up his Pakistan-based organization, Maktab al-Khidamat (MAK), or “Services Office” in English. It is also known as Al-Kifah, which means “struggle.” Azzam founded the Al-Kifah/MAK in 1984 (see Late 1984). Branches open in over 30 US cities, as Muslim-Americans donate millions of dollars to support the Afghan war against the Soviet Union. The most important branch, called the Al-Kifah Refugee Center, opens in Brooklyn, New York (see 1986-1993). Azzam is assassinated in a car bomb attack in late 1989 (see November 24, 1989). Bin Laden soon takes over the organization, which effectively morphs into al-Qaeda. His followers take over the US offices and they become financial conduits for al-Qaeda operations. [Lance, 2003, pp. 40-41]

Entity Tags: Osama bin Laden, Al-Kifah Refugee Center, Maktab al-Khidamat, Al-Qaeda, Abdullah Azzam

Timeline Tags: Complete 911 Timeline

A University of California, Berkeley graduate student, John E. Hauser, picks up a package in the university’s computer science lab. The package is a bomb made up of ammonium nitrate and aluminum powder. It explodes, costing Hauser four fingers from his right hand and severing arteries. [BBC, 11/12/1987; Washington Post, 4/14/1996; Washington Post, 1998] The bomb has apparently been in the lab for two or three days, left on top of a stack of three-ring binders. Hauser thought it was a file box for another student’s computer cards, and picked it up intending to identify its owner. Upon opening it, he hears an odd buzzing sound, then the bomb detonates. Ironically, the victim of a previous bombing, Professor Diogenes Angelakos (see July 2, 1982), hears the explosion, rushes to offer assistance, and ties a tourniquet around Hauser’s arm. Hauser will lose much of the use of his right arm, and will be forced to abandon his dreams of becoming an Air Force fighter pilot and perhaps an astronaut. He will later say, “There is not a day that goes by when I’m not reminded that I don’t have full use of my right hand… from trying to play racquetball to trying to pick up my daughter.” Of the bombing, Hauser will say, “This was as much a target of opportunity as anything else.” The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski once worked as a professor at UC-Berkeley. Both this bombing and the previous one are in Cory Hall, a building close to where Kaczynski once taught. Captain Bill Foley of the Berkeley campus police will later say: “He taught in Campbell Hall and had offices in one of our temporary buildings. If you did a triangle between Campbell and that temporary building you would hit Cory Hall at peak of the triangle.” Cory Hall also houses the engineering and computer science departments, known to be favorite targets of the Unabomber. [Washington Post, 11/27/1993; Washington Post, 4/14/1996] This bomb is more powerful than earlier Unabomber constructions, using a mix of ammonium nitrate and aluminum powder to cause the explosion. The bomb’s shrapnel consists of tacks, nails, and bits of lead. Stamped on the end seal of the bomb’s pipe are the initials “FC,” which will later be found to stand for “Freedom Club.” [World of Forensic Science, 1/1/2005]

Entity Tags: Theodore J. (“Ted”) Kaczynski, University of California at Berkeley, John E. Hauser, Diogenes Angelakos

Timeline Tags: US Domestic Terrorism

A suspicious package mailed to the Auburn, Washington, headquarters of the Boeing Aircraft Company is opened and safely disarmed by the local bomb squad. [BBC, 11/12/1987; Washington Post, 1998] The package containing a pipe bomb gets lost in Boeing’s internal mail system; the package is in the process of being returned to the apparent sender before it draws the attention of Boeing employees, who call the bomb squad. [Washington Post, 4/14/1996] The bomb will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski tried to destroy a Boeing aircraft with another bomb six years ago (see November 15, 1979). Like earlier bombs, this bomb contains the initials “FC” engraved on a metal component; authorities will later learn that “FC” stands for “Freedom Club.” [World of Forensic Science, 1/1/2005]

Entity Tags: Theodore J. (“Ted”) Kaczynski, Boeing Company

Timeline Tags: US Domestic Terrorism

Charles Schnabolk.Charles Schnabolk. [Source: Institute for Design Professionals]While the Office of Special Planning is still working on its report about the vulnerability of the World Trade Center to terrorist attack, the New York Port Authority hired security consultant Charles Schnabolk to also review the center’s security systems. [UExpress (.com), 10/12/2001; New York County Supreme Court, 1/20/2004] Schnabolk was involved in designing the original security system when the WTC complex was built. [Institue for Design Professionals, 2009; The Security Design Group, 2010] This month his secret report, titled “Terrorism Threat Perspective and Proposed Response for the World Trade Center” is released. It sets out four levels of possible terrorism against the center, and gives examples of each: ”(1) PREDICTABLE—Bomb threats; (2) PROBABLE—Bombing attempts, computer crime; (3) POSSIBLE—Hostage taking; (4) CATASTROPHIC—Aerial bombing, chemical agents in water supply or air conditioning (caused by agents of a foreign government or a programmed suicide).” Similar to other reports in the mid-1980s, it also warns that the WTC “is highly vulnerable through the parking lot.” [UExpress (.com), 10/12/2001; New York County Supreme Court, 1/20/2004]

Entity Tags: Charles Schnabolk, World Trade Center

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

After assessing the security of New York Port Authority facilities, the Office of Special Planning (OSP), the Port Authority’s own antiterrorist task force, releases a report called “Counter-Terrorism Perspectives: The World Trade Center.” For security purposes, only seven copies are made, being hand-delivered and signed for by its various recipients, including the executive director of the Port Authority, the superintendent of the Port Authority Police, and the director of the World Trade Department. [New York Court of Appeals, 2/16/1999; Village Voice, 1/5/2000] Because of the WTC’s visibility, symbolic value, and it being immediately recognizable to people from around the world, the report concludes that the center is a “most attractive terrorist target.” [New York County Supreme Court, 1/20/2004] The report, which is 120 pages long, lists various possible methods of attacking the center. [New York Court of Appeals, 2/16/1999; Caram, 2001, pp. 103; Barrett and Collins, 2006, pp. 87] One of these is that a “time bomb-laden vehicle could be driven into the WTC and parked in the public parking area.… At a predetermined time, the bomb could be exploded in the basement.” [Glanz and Lipton, 2004, pp. 227] As a Senate Committee Report will find in August 1993, “The specifics of the February 26, 1993 bombing at the World Trade Center garage were almost identical to those envisioned in the [OSP] report.” [New York Court of Appeals, 2/16/1999] Due to the Port Authority’s failure to adequately implement the OSP’s recommendations, the report will be crucial evidence in a successful civil trial against it in October 2005, charging negligence in failing to prevent the 1993 bombing. [Bloomberg, 10/26/2005; New York Times, 10/27/2005; New York Times, 2/18/2006] As of mid-2006, the other possible methods of attacking the WTC listed in the report remain undisclosed.

Entity Tags: Office of Special Planning, World Trade Center, World Trade Department, Port Authority of New York and New Jersey

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In Ann Arbor, Michigan, research assistant Nicklaus Suino of the University of Michigan suffers burns and shrapnel wounds when he opens a package bomb at the home of psychology professor James V. McConnell. [BBC, 11/12/1987; Washington Post, 1998] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). McConnell may be one of Kaczynski’s most personal targets. McConnell is a rich, flamboyant, and somewhat eccentric professor who espouses controversial theories about human behavior modification based on his research with flatworms. McConnell taught at the University of Michigan when Kaczynski was taking graduate courses in mathematics there. The package mailed to McConnell’s house comes with a one-page letter taped to the top, bearing a Salt Lake City postmark and reading in part: “I’d like you to read this book. Everybody in your position should read this book.” McConnell asks Suino to open it. The resulting explosion injures Suino; McConnell escapes with slight, temporary hearing loss but is profoundly shaken by the incident. [Washington Post, 4/14/1996]

Entity Tags: Theodore J. (“Ted”) Kaczynski, James V. McConnell, Nicklaus Suino, University of Michigan

Timeline Tags: US Domestic Terrorism

Hugh C. Scrutton.Hugh C. Scrutton. [Source: Washington Post]In Sacramento, California, Hugh C. Scrutton is killed when he tries to remove what looks to be a road hazard from the parking lot—a block of wood with nails protruding from it inside a paper bag—behind his computer rental shop. The “hazard” is actually a bomb [BBC, 11/12/1987; Knight Ridder, 5/28/1995; Washington Post, 1998; World of Forensic Science, 1/1/2005] consisting of three 10-inch pipes filled with a mixture of potassium sulfate, potassium chloride, ammonium nitrate, and aluminum powder. The bomb contains shrapnel consisting of sharp chunks of metal, nails, and splinters. It explodes with enormous force, killing Scrutton almost instantly. [World of Forensic Science, 1/1/2005] Like earlier bombs, this bomb contains the initials “FC” engraved on a metal component; authorities later learn that “FC” stands for “Freedom Club.” [World of Forensic Science, 1/1/2005] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). In 1967, Scrutton took a summer math course at the University of California at Berkeley while Kaczynski taught mathematics there; it is not known whether the two crossed paths during that time. [Washington Post, 4/14/1996]

Entity Tags: Hugh Scrutton, Theodore J. (“Ted”) Kaczynski, University of California at Berkeley

Timeline Tags: US Domestic Terrorism

Soliman Biheiri.Soliman Biheiri. [Source: US Immigrations and Customs]BMI Inc., a real estate investment firm based in Secaucus, New Jersey, is formed in 1986. Former counterterrorism “tsar” Richard Clarke will state in 2003, “While BMI [has] held itself out publicly as a financial services provider for Muslims in the United States, its investor list suggests the possibility this facade was just a cover to conceal terrorist support. BMI’s investor list reads like a who’s who of designated terrorists and Islamic extremists.” Investors in BMI include: [US Congress, 10/22/2003]
bullet Soliman Biheiri. He is the head of BMI for the duration of the company’s existence. US prosecutors will later call him the US banker for the Muslim Brotherhood, a banned Egyptian militant group. Biheiri’s computer will eventually be searched and found to have contact information for Ghaleb Himmat and Youssef Nada, leaders of the Al Taqwa Bank, which is founded two years after BMI (see 1988). After 9/11, the US and UN will designate both Himmat and Nada and the Al Taqwa Bank as terrorist financiers, and the bank will be shut down (see November 7, 2001). US prosecutors say there are other ties between BMI and Al Taqwa, including financial transactions. Biheiri also has close ties with Yousuf Abdullah Al-Qaradawi. Qaradawi is said to be a high-ranking member of the Muslim Brotherhood, a shareholder in Al Taqwa, and has made statements supporting suicide bombings against Israel. In 2003, US investigators will accuse Biheiri of ties to terrorist financing. He will be convicted of immigration violations and lying to a federal agent (see June 15, 2003). [Wall Street Journal, 9/15/2003; Forward, 10/17/2003] Biheiri will be convicted of immigration fraud in 2003 and then convicted of lying to federal investigators in 2004 (see June 15, 2003).
bullet Abdullah Awad bin Laden, a nephew of Osama bin Laden. He invests about a half-million dollars in BMI real estate ventures, earning a profit of $70,000. For most of the 1990s he runs the US branch of a Saudi charity called World Assembly of Muslim Youth (WAMY). He is investigated by the FBI in 1996 (see February-September 11, 1996), and WAMY will be raided by US agents in 2004 (see June 1, 2004). The raid is apparently part of a larger investigation into terrorism financing. In 2001, at least two of the 9/11 hijackers will live three blocks away from the WAMY office (see March 2001 and After). [Wall Street Journal, 9/15/2003; Washington Post, 4/19/2004]
bullet Nur and Iman bin Laden, two female relatives of Osama bin Laden. Abdullah Awad bin Laden will invest some of their money in a BMI real estate project. While their bin Laden family ties are intriguing, neither have been accused of any knowing connections to terrorist financing. [Washington Post, 4/19/2004]
bullet Mousa Abu Marzouk. He has identified himself as a top leader of Hamas. The US declares him a terrorist in 1995 (see July 5, 1995-May 1997). BMI makes at least two transactions with Marzouk after he is declared a terrorist. [Wall Street Journal, 9/15/2003]
bullet Yassin al-Qadi, a Saudi multimillionaire. His lawyers will later claim he has no terrorism ties and had only a passing involvement with BMI and liquidated his investment in it in 1996. However, another company operating from the same office as BMI is called Kadi International Inc. and lists its president as al-Qadi. Al-Qadi is also a major investor in the suspect computer company Ptech (see 1994; 1999-After October 12, 2001). Al-Qadi and BMI head Biheiri have financial dealings with Yaqub Mirza, a Pakistani who manages a group of Islamic charities in Virginia known as the SAAR network (see July 29, 1983). These charities will be raided in March 2002 on suspicions of terrorism ties (see March 20, 2002). Shortly after 9/11, the US will officially declare al-Qadi a terrorist financier (see October 12, 2001). [Wall Street Journal, 9/15/2003]
bullet Saleh Kamel. BMI allegedly receives a $500,000 investment from the Dallah Al-Baraka banking conglomerate, which is headed by Kamel. For many years before 9/11, Omar al-Bayoumi, an associate of 9/11 hijackers Khalid Almihdhar and Nawaf Alhazmi, will receive a salary from Dallah, despite apparently doing no work. Some will accuse al-Bayoumi of involvement in funding the 9/11 plot, but that remains to been proven (see August 1994-July 2001). Kamel reportedly founded a Sudanese Islamic bank which housed accounts for senior al-Qaeda operatives. He is a multi-billionaire heavily involved in promoting Islam, and his name appears on the Golden Chain, a list of early al-Qaeda supporters (see 1988-1989). He denies supporting terrorism. [US Congress, 10/22/2003; Wall Street Journal, 6/21/2004]
bullet The Kuwait Finance House. According to Clarke, this organization is alleged to be a BMI investor and the “financial arm of the Muslim Brotherhood in Kuwait. Several al-Qaeda operatives have allegedly been associated with the Kuwaiti Muslim Brotherhood, including Khalid Shaikh Mohammed, Suliman abu Ghaith, Wadih El-Hage, and Ramzi Yousef.” In 2003, an apparent successor entity to the Kuwait Finance House will be designated as a terrorist entity by the US. A lawyer for the Kuwait Finance House will later say the bank has never let its accounts be used for terrorism. [Wall Street Journal, 9/15/2003; US Congress, 10/22/2003; Wall Street Journal, 4/20/2005]
bullet Tarek Swaidan. He is a Kuwaiti, an associate of al-Qadi, and a leading member of the Kuwaiti branch of the Muslim Brotherhood. It is unknown if he has made any denials about his alleged associations. [Wall Street Journal, 9/15/2003]
bullet Abdurahman Alamoudi. For many years he runs the American Muslim Council, a lobby group founded by a top Muslim Brotherhood figure. US prosecutors say he also is in the Brotherhood, and has alleged ties to Hamas. In 2004, the US will sentence him to 23 years in prison for illegal dealings with Libya (see October 15, 2004). [Wall Street Journal, 6/21/2004; Washington Post, 10/16/2004]
bullet The International Islamic Relief Organization (IIRO) and the Muslim World League, closely connected Saudi charities suspected of financing terrorism. They give BMI $3.7 million out of a $10 million endowment from unknown Saudi donors. The Financial Times will later note, “While it is not clear whether that money came from the Saudi government, [a 2003] affidavit quotes a CIA report that says the Muslim World League ‘is largely financed by the government of Saudi Arabia.’” Both organizations consistently deny any support of terrorism financing, but in early 2006 it will be reported that US officials continue to suspect them of such support (see January 15, 2006). [Financial Times, 8/21/2003] In 1992, a branch of the IIRO gives $2.1 million to BMI Inc. to invest in real estate. The money disappears from BMI’s books. In October 1999, BMI goes defunct after it is unable to repay this money to the IIRO branch. The IIRO branch gives BMI the rest of the $3.7 million between 1992 and 1998. BMI will use the money to buy real estate (see 1992). Eventually, some of this money will be given to Hamas operatives in the West Bank and spent on violent actions against Israel. This will eventually lead to legal action in the US and a seizure of some of the money. [Wall Street Journal, 11/26/2002; Washington Post, 8/20/2003; Washington Times, 3/26/2004; Washington Post, 4/19/2004] By 1992, BMI has projected revenues in excess of $25 million, based largely on their real estate investments in the US. [US Congress, 10/22/2003] In early 1999, months before BMI goes defunct, the FBI hears evidence potentially tying BMI to the 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998), but an investigation into this will not be pursued (see Early 1999). It should be noted that BMI had many investors, and presumably most BMI investors would have had no suspicions that their money might be used to fund terrorism or other types of violence.

Entity Tags: Iman bin Laden, International Islamic Relief Organization, Muslim World League, Kuwait Finance House, Nur bin Laden, Mousa Abu Marzouk, Abdurahman Alamoudi, Richard A. Clarke, Soliman Biheiri, Abdullah Awad bin Laden, Yousuf Abdullah Al-Qaradawi, Tarek Swaidan, Yassin al-Qadi, Saleh Abdullah Kamel

Timeline Tags: Complete 911 Timeline

Following the release of the Office of Special Planning’s (OSP) report, which called the WTC a “most attractive terrorist target” (see November 1985), the New York Port Authority, which owns the center, seeks a second opinion on the OSP’s recommendations. At a cost of approximately $100,000, it hires the Science Applications International Corporation (SAIC) to review the general security of the WTC. SAIC states in its report that the attractiveness of the WTC’s public areas to terrorists is “very high.” Like the OSP, SAIC pays particular attention to the underground levels of the center and describes a possible attack scenario much like what occurs in the 1993 bombing. [Caram, 2001, pp. 105-106; New York County Supreme Court, 1/20/2004]

Entity Tags: World Trade Center, Science Applications International Corporation (SAIC), Port Authority of New York and New Jersey

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Antonin Scalia.Antonin Scalia. [Source: Oyez.org]Appeals court judge Antonin Scalia is sworn in as an Associate Justice of the US Supreme Court. [Legal Information Institute, 7/30/2007] Although Scalia is an ardent social conservative, with strongly negative views on such issues as abortion and homosexual rights, Scalia and Reagan administration officials both have consistently refused to answer questions about his positions on these issues, as President Reagan did at his June announcement of Scalia’s nomination. [Ronald Reagan Presidential Library, 6/17/1986] Scalia’s nomination is, in the words of Justice Department official Terry Eastland, “no better example of how a president should work in an institutional sense in choosing a nominee….” Eastland advocates the practice of a president seeking a judiciary nominee who has the proper “judicial philosophy.” A president can “influence the direction of the courts through his appointments” because “the judiciary has become more significant in our politics,” meaning Republican politics. [Dean, 2007, pp. 132] Scalia is the product of a careful search by Attorney General Edwin Meese and a team of Justice Department officials who wanted to find the nominee who would most closely mirror Reagan’s judicial and political philosophy (see 1985-1986).

Entity Tags: Ronald Reagan, Edwin Meese, Antonin Scalia, Terry Eastland, US Department of Justice

Timeline Tags: Civil Liberties

Edvard Shevardnadze.Edvard Shevardnadze. [Source: US Defense Department]The Politburo of the Soviet Communist Party decides that the Soviet-Afghan War should end “within one year or two.” This follows on from a tentative and secret agreement within the Politburo the previous year to eventually withdraw from Afghanistan. The withdrawal will be formalized in an agreement signed in Geneva in April 1988 (see April 1988) and the last troops with leave Afghanistan in February 1989 (see February 15, 1989). Soviet Foreign Minister Edvard Shevardnadze will inform US Secretary of State George Shultz of the decision the year after it is taken and the CIA will learn of it by November 1987. [Levy and Scott-Clark, 2007, pp. 132-3, 486]

Entity Tags: Central Intelligence Agency, George Shultz, Soviet Union, Edvard Shevardnadze

Timeline Tags: Complete 911 Timeline, War in Afghanistan

Radical Muslim leader Sheikh Omar Abdul-Rahman obtains his first US visa via the CIA. A State Department official will later discover this was the first of six US visas given to him between 1986 and 1990. All are approved by CIA agents acting as consular officers at US embassies in Sudan and Egypt. “The CIA officers claimed they didn’t know the sheikh was one of the most notorious political figures in the Middle East and a militant on the State Department’s list of undesirables.” But one top New York investigator will later say, “Left with the choice between pleading stupidity or else admitting deceit, the CIA went with stupidity.” [Boston Globe, 2/3/1995; New York Magazine, 3/17/1995] Abdul-Rahman uses the visas to attend conferences of Islamic students in the US. Then he visits Pakistan, where he preaches at Peshawar, visits the Saudi embassy in Islamabad, and is “lionized at receptions heavily attended by Americans.” He plays a prominent role in recruiting mujaheddin fighters to fight against the Soviets in Afghanistan. [Kepel, 2002, pp. 300] In 1989, Abdul-Rahman is arrested in Egypt and held under very closely guarded house arrest, but he manages to escape one year later, possibly by being smuggled out of his house in a washing machine. The CIA gives him another US visa and he moves to the US (see July 1990). [New York Times, 1/8/1995] Journalist Simon Reeve will claim in his 1999 book The New Jackals that, “The CIA, it is now clear, arranged the visa[s] to try and befriend the Sheikh in advance of a possible armed fundamentalist revolution in Egypt.” According to a retired CIA official, the CIA recalled mistakes made with the Ayatollah Khomeini in Iran and were trying to win Abdul-Rahman’s trust. [Reeve, 1999, pp. 60]

Entity Tags: Central Intelligence Agency, Omar Abdul-Rahman, Simon Reeve

Timeline Tags: Complete 911 Timeline

Dave Frasca, who will later go on to play a key role in the FBI’s failure to get a warrant to search Zacarias Moussaoui’s belongings before 9/11 (see August 21, 2001 and August 29, 2001), joins the FBI. Frasca initially works at the bureau’s Newark, New Jersey, field office. It is unclear what cases he works on in the first three years of his employment, but they are not related to counterterrorism. [US Department of Justice, 11/2004, pp. 123 pdf file]

Entity Tags: David Frasca, Federal Bureau of Investigation

Timeline Tags: 9/11 Timeline, Misc Entries

The FBI’s sketch of the as-yet-unidentified ‘Unabomber.’The FBI’s sketch of the as-yet-unidentified ‘Unabomber.’ [Source: FBI]Gary Wright, the owner of CAAMS Inc., a Salt Lake City, Utah, computer shop, is injured when he attempts to remove a “road hazard” at the rear entrance of his shop. The “hazard” is actually a bomb, similar to one that killed another computer shop owner in Sacramento, California, over a year ago (see December 11, 1985). A secretary saw a man wearing a hooded sweatshirt and sunglasses leave the bag containing the bomb; she becomes the first eyewitness in what will later become the “Unabomber” investigation (see April 3, 1996). [BBC, 11/12/1987; Washington Post, 1998] The “Unabomber” is improving his skills; this bomb contains a more sophisticated triggering device than earlier constructions. [World of Forensic Science, 1/1/2005] Almost six years ago, Theodore “Ted” Kaczynski, the so-called “Unabomber,” planted another bomb in Salt Lake City (see October 8, 1981). But for now, the FBI has no knowledge of Kaczynski’s identity. It has, however, found what it calls “an absolute link” between the Wright bombing and the “Unabom” serial bombings that have been going on since 1978 (see May 25-26, 1978). Federal bomb expert Ron Wolters says the bombs in the different cases display a high level of similarity. Police describe the as-yet-unidentified bomber as a disgruntled academician or computer worker. [Chicago Sun-Times, 2/24/1987]

Entity Tags: CAAMS Inc, Theodore J. (“Ted”) Kaczynski, Ron Wolters, Gary Wright

Timeline Tags: US Domestic Terrorism

Michael Springmann.Michael Springmann. [Source: Michael Springmann]Michael Springmann, head US consular official in Jeddah, Saudi Arabia, later claims that during this period he is “repeatedly ordered… to issue [more than 100] visas to unqualified applicants.” He turns them down, but is repeatedly overruled by superiors. [BBC, 11/6/2001; St. Petersburg Times, 11/25/2001] In one case, two Pakistanis apply for visas to attend a trade show in the US, but they are unable to name the trade show or city in which it will be held. When Springmann denies them a visa, he gets “an almost immediate call from a CIA case officer, hidden in the commercial section [of the consulate], that I should reverse myself and grant these guys a visa.” Springmann refuses, but the decision is reversed by the chief of the consular section. Springmann realizes that even the ambassador, Walter Cutler, is aware of the situation, which becomes “more brazen and blatant” as time goes on. On one occasion Springmann is even told, “If you want a job in the State Department in future, you will change your mind.” [CBC Radio One, 7/3/2002; Trento, 2005, pp. 344-6] Springmann loudly complains to numerous government offices, but no action is taken. He is fired and his files on these applicants are destroyed. He later learns that recruits from many countries fighting for bin Laden against Russia in Afghanistan were funneled through the Jeddah office to get visas to come to the US, where the recruits would travel to train for the Afghan war. According to Springmann, the Jeddah consulate was run by the CIA and staffed almost entirely by intelligence agents. This visa system may have continued at least through 9/11, and 11 of the 19 9/11 hijackers received their visas through Jeddah (see November 2, 1997-June 20, 2001), possibly as part of this program (see October 9, 2002 and October 21, 2002). [BBC, 11/6/2001; St. Petersburg Times, 11/25/2001; CBC Radio One, 7/3/2002; Associated Press, 7/17/2002 pdf file; Fox News, 7/18/2002]

Entity Tags: Central Intelligence Agency, US Consulate, Jeddah, Saudi Arabia Office, Michael Springmann

Timeline Tags: Complete 911 Timeline, War in Afghanistan

The Golden Chain list.The Golden Chain list. [Source: Public domain]In March 2002, authorities in Bosnia, Sarajevo, will raid the offices of the Benevolence International Foundation (BIF) due to suspected funding of al-Qaeda (see March 2002). The raid will uncover a handwritten list containing the name of twenty wealthy donors sympathetic to al-Qaeda. The list, referred to as “The Golden Chain,” contains both the names of the donors and the names of the recipients (but does not mention amounts given). Seven of the payments are made to Osama bin Laden. [United Press International, 2/11/2003] Most accounts will be vague on what year the Golden Chain document was written; some say 1988. [Wall Street Journal, 3/18/2003] But counterterrorism “tsar” Richard Clarke will say it dates from 1989. [US Congress, 10/22/2003] Al-Qaeda is formed in late 1988 (see August 11-20, 1988). The Wall Street Journal will later note, “The list doesn’t show any continuing support for al-Qaeda after the organization began targeting Americans, but a number of the Saudis on it have been under scrutiny by US officials as to whether they have supported terrorism in recent years.” [Wall Street Journal, 3/18/2003] The donors named include:
bullet The “Bin Laden brothers.” Their first names are not mentioned. They give money to Osama bin Laden. UPI will later point out that “the discovery of this document in Sarajevo calls into question whether al-Qaeda has received support from one of Osama’s scores of wealthy brothers.”
bullet Adel Batterjee, a wealthy Saudi businessman who is also the founder of both BIF and its predecessor, Lajnatt Al-Birr Al-Islamiah. He appears to be mentioned as a recipient three times. [United Press International, 2/11/2003] The US will declare him as a terrorist financier in 2004 (see December 21, 2004).
bullet Wael Hamza Julaidan, a Saudi millionaire and one of the founders of al-Qaeda. He is listed as a recipient. The US will declare him a terrorist financier in 2002 (see September 6, 2002).
bullet Saleh Kamel, a Saudi billionaire, and the majority shareholder of the Saudi conglomerate Dallah Albaraka. In 2003, Forbes will call him one of the richest people in the world. The list has him giving money to Batterjee.
bullet Sulaiman Abdul Aziz al-Rajhi, another Saudi billionaire. The SAAR network, which is named after him, will be raided by the FBI in 2002 (see March 20, 2002). [Emerson, 2006, pp. 400]
bullet Khalid bin Mahfouz, another Saudi billionaire. A lawyer for bin Mahfouz will later say bin Mahfouz did contribute a small amount to fund the mujaheddin in the late 1980s, but only at the behest of the US and Saudi Arabia. [Wall Street Journal, 3/18/2003]

Entity Tags: Sulaiman Abdul Aziz al-Rajhi, Saleh Abdullah Kamel, Benevolence International Foundation, Bosnia, Khalid bin Mahfouz, Adel Abdul Jalil Batterjee, Al-Qaeda, Wael Hamza Julaidan

Timeline Tags: Complete 911 Timeline

Entrance to Fort Riley, Kansas.Entrance to Fort Riley, Kansas. [Source: US Military (.com)]Terry Nichols, a 33-year-old Michigan farmer and house husband described as “aimless” by his wife Lana, joins the US Army in Detroit. He is the oldest recruit in his platoon and his fellow recruits call him “Grandpa.” During basic training at Fort Benning, Georgia, Nichols meets fellow recruits Timothy McVeigh (see 1987-1988), who joined the Army in Buffalo, New York, and Arizona native Michael Fortier. All three share an interest in survivalism, guns, and hating the government, particularly Nichols and McVeigh; unit member Robin Littleton later recalls, “Terry and Tim in boot camp went together like magnets.” For McVeigh, Nichols is like the older brother he never had; for Nichols, he enjoys taking McVeigh under his wing. Nichols also tells McVeigh about using ammonium nitrate to make explosives he and his family used to blow up tree stumps on the farm. The three are members of what the Army calls a “Cohort,” or Cohesion Operation Readiness and Training unit, which generally keeps soldiers together in the same unit from boot camp all the way through final deployment. It is in the Army that McVeigh and Nichols become enamored of the novel The Turner Diaries (see 1978), which depicts a United States racially “cleansed” of minorities and other “undesirables” (McVeigh is already familiar with the novel—see 1987-1988). All three are sent to the 11 Bravo Infantry division in Fort Riley, Kansas, where they are finally separated into different companies; McVeigh goes to tank school, where he learns to operate a Bradley fighting vehicle as well as becoming an outstanding marksman. [New York Times, 5/4/1995; New York Times, 5/28/1995; Stickney, 1996, pp. 91-95; PBS Frontline, 1/22/1996; Serrano, 1998, pp. 30; Nicole Nichols, 2003] McVeigh later says he joined the Army because he was disillusioned with the “I am better than you because I have more money” mindset some people have, and because he was taken with the Army’s advertisement that claimed, “We do more before 9 a.m. than most people do all day.” [PBS Frontline, 1/22/1996] Fellow unit member Specialist Ted Thorne will later recall: “Tim and I both considered ourselves career soldiers. We were going to stay in for the 20-plus years, hopefully make sergeant major. It was the big picture of retirement.” [Serrano, 1998, pp. 31]
Nichols Leaves Army, Tells of Plans to Form 'Own Military Organization' - In the spring of 1989, Nichols, who planned on making a career of military service, leaves the Army due to issues with an impending divorce and child care, but his friendship with McVeigh persists. Fellow soldier Glen Edwards will later say that he found Nichols’s choice to serve in the Army unusual, considering his virulent hatred of the US government: “He said the government made it impossible for him to make a living as a farmer. I thought it strange that a 32-year-old man would be complaining about the government, yet was now employed by the government. Nichols told me he signed up to pull his 20 years and get a retirement pension.” Before Nichols leaves, he tells Edwards that he has plans for the future, and Edwards is welcome to join in. Edwards will later recall, “He told me he would be coming back to Fort Riley to start his own military organization” with McVeigh and Fortier. “He said he could get any kind of weapon and any equipment he wanted. I can’t remember the name of his organization, but he seemed pretty serious about it.” [New York Times, 5/28/1995; Stickney, 1996, pp. 96, 101]
McVeigh Continues Army Career, Described as 'Strange,' 'Racist,' but 'Perfect Soldier' - McVeigh does not leave the Army so quickly. He achieves the rank of sergeant and becomes something of a “model soldier.” He plans on becoming an Army Ranger. However, few get to know him well; only his closest friends, such as Nichols, know of his passion for firearms, his deep-seated racism, or his hatred for the government. McVeigh does not see Nichols during the rest of his Army stint, but keeps in touch through letters and phone calls. Friends and fellow soldiers will describe McVeigh as a man who attempts to be the “perfect soldier,” but who becomes increasingly isolated during his Army career; the New York Times will describe him as “retreating into a spit-and-polish persona that did not admit nights away from the barracks or close friendships, even though he was in a ‘Cohort’ unit that kept nearly all the personnel together from basic training through discharge.” His friends and colleagues will recall him as being “strange and uncommunicative” and “coldly robotic,” and someone who often gives the least desirable assignments to African-American subordinates, calling them “inferior” and using racial slurs. An infantryman in McVeigh’s unit, Marion “Fritz” Curnutte, will later recall: “He played the military 24 hours a day, seven days a week. All of us thought it was silly. When they’d call for down time, we’d rest, and he’d throw on a ruck sack and walk around the post with it.” A fellow soldier, Todd Regier, will call McVeigh an exemplary soldier, saying: “As far as soldiering, he never did anything wrong. He was always on time. He never got into trouble. He was perfect. I thought he would stay in the Army all his life. He was always volunteering for stuff that the rest of us wouldn’t want to do, guard duties, classes on the weekend.” Sergeant Charles Johnson will later recall, “He was what we call high-speed and highly motivated.” McVeigh also subscribes to survivalist magazines and other right-wing publications, such as Guns & Ammo and his favorite, Soldier of Fortune (SoF), and keeps an arsenal of weapons in his home (see November 1991 - Summer 1992). Regier will later tell a reporter: “He was real different. Kind of cold. He wasn’t enemies with anyone. He was kind of almost like a robot. He never had a date when I knew him in the Army. I never saw him at a club. I never saw him drinking. He never had good friends. He was a robot. Everything was for a purpose.” [New York Times, 5/4/1995; Stickney, 1996, pp. 86; Serrano, 1998, pp. 30; Nicole Nichols, 2003] McVeigh is taken with the increasing number of anti-government articles and advertisements in SoF, particularly the ones warning about what it calls the impending government imposition of martial law and tyranny, and those telling readers how to build bombs and other items to use in “defending” themselves from government aggression. [Serrano, 1998, pp. 27-28] McVeigh is not entirely “by the book”; he knows his friend Michael Fortier is doing drugs, but does not report him to their superior officers. [PBS Frontline, 1/22/1996] McVeigh is promoted to sergeant faster than his colleagues; this is when he begins assigning the undesirable tasks to the four or five black specialists in the group, tasks that would normally be performed by privates. “It was well known, pretty much throughout the platoon, that he was making the black specialists do that work,” Regier will recall. “He was a racist. When he talked he’d mention those words, like n_gger. You pretty much knew he was a racist.” The black soldiers complain to a company commander, earning McVeigh a reprimand. Sergeant Anthony Thigpen will later confirm Regier’s account, adding that McVeigh generally refuses to socialize with African-Americans, and only reluctantly takes part in company functions that include non-whites. Captain Terry Guild will later say McVeigh’s entire company has problems with racial polarization, “[a]nd his platoon had some of the most serious race problems. It was pretty bad.” In April 1989, McVeigh is sent to Germany for two weeks for a military “change-up program.” While there, he is awarded the German equivalent of the expert infantryman’s badge. In November 1989, he goes home for Thanksgiving with Fortier, and meets Fortier’s mother Irene. In late 1990, McVeigh signs a four-year reenlistment agreement with the Army. [New York Times, 5/4/1995]
McVeigh Goes on to Serve in Persian Gulf War - McVeigh will serve two tours of duty in the Persian Gulf War, serving honorably and winning medals for his service (see January - March 1991 and After). Nichols and McVeigh will later be convicted of planning and executing the Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995).

Entity Tags: Ted Thorne, Terry Guild, Todd Regier, Terry Lynn Nichols, Robin Littleton, Michael Joseph Fortier, Charles Johnson, Glen Edwards, Marion (“Fritz”) Curnutte, Anthony Thigpen, Timothy James McVeigh, US Department of the Army

Timeline Tags: US Domestic Terrorism

In an agreement signed in Geneva, Switzerland, the Soviet Union pledges to withdraw all of its troops from Afghanistan by February 15, 1989. They will end up withdrawing the last of their soldiers on that exact date (see February 15, 1989). At the time, the Soviets have slightly over 100,000 soldiers in Afghanistan. [New York Times, 2/16/1989]

Entity Tags: Soviet Union

Timeline Tags: Complete 911 Timeline, War in Afghanistan

August 11-20, 1988: Bin Laden Forms Al-Qaeda

The notes from al-Qaeda’s formation meeting. The short lines on the right side are the list of attendees.The notes from al-Qaeda’s formation meeting. The short lines on the right side are the list of attendees. [Source: CNN]Osama bin Laden conducts two meetings to discuss “the establishment of a new military group,” according to notes that will be found later. Notes will reveal the group is initially called al-Qaeda al-Askariya, which roughly translates to “the military base.” But the name will soon shorten to just al-Qaeda, meaning “the base” or “the foundation.” [Associated Press, 2/19/2003; Wright, 2006, pp. 131-134] With the Soviets in the process of withdrawing from Afghanistan, it is proposed to create the new group to keep military jihad, or holy war, alive after the Soviets are gone. The notes don’t specify what the group will do exactly, but they conclude, “Initial estimate, within six months of al-Qaeda [founding], 314 brothers will be trained and ready.” In fact, al-Qaeda will remain smaller than this for years to come. Fifteen people attend these two initial meetings. [Wright, 2006, pp. 131-134] In addition to bin Laden, other attendees include:
bullet Ayman Al-Zawahiri, the head of the Egyptian militant group Islamic Jihad. [New Yorker, 9/9/2002]
bullet Mohammed Atef, a.k.a. Abu Hafs.
bullet Mamdouh Mahmud Salim, a.k.a. Abu Hajer.
bullet Jamal al-Fadl.
bullet Wael Hamza Julaidan.
bullet Mohammed Loay Bayazid, a US citizen, who is notetaker for the meetings. [Wright, 2006, pp. 131-134]
Al-Fadl will reveal details about the meetings to US investigators in 1996 (see June 1996-April 1997). Notes to the meeting will be found in Bosnia in early 2002. [New Yorker, 9/9/2002] It will take US intelligence years even to realize a group named al-Qaeda exists; the first known incidence of US intelligence being told the name will come in 1993 (see May 1993).

Entity Tags: Osama bin Laden, Mohammed Loay Bayazid, Mohammed Atef, Wael Hamza Julaidan, Jamal al-Fadl, Al-Qaeda, Mamdouh Mahmud Salim, Ayman al-Zawahiri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, War in Afghanistan

James Nichols, a Michigan farmer, anti-government white separatist, and the brother of Terry Nichols (see March 24, 1988 - Late 1990), formulates a plan to use a “megabomb” to destroy an Oklahoma City federal building; an unnamed FBI informant will later tell the FBI that James Nichols specifically indicates the Murrah Federal Building. Nichols, who says he is upset over the US’s “role” in the terrorist bombing of Pan Am Flight 103, shares the plan with the informant, who will swear to the information in 1995, after James’s brother Terry Nichols is arrested for helping destroy the Murrah Building (see 8:35 a.m. - 9:02 a.m. April 19, 1995). “[James] Nichols… made a specific reference to a federal building in Oklahoma City and began looking through the toolshed and workbench for a newspaper clipping depicting the Oklahoma City building,” the informant will say, according to an FBI affidavit. Nichols is unable to find the newspaper clipping, the informant will say, and instead draws a diagram remarkably similar to the Murrah Building. Nichols “later located a newspaper article containing a reference to the Federal Building in Oklahoma City and showed it” to the informer, the affidavit says. The informer is a regular visitor to the Nichols farm. [New York Times, 6/13/1995; Nicole Nichols, 2003] James Nichols routinely stamps US currency with red ink in a protest against the government, and calls his neighbors “sheeple” for obeying authority “like livestock.” A neighbor, Dan Stomber, will recall Nichols criticizing him and others for using drivers’ licences and Social Security cards, and for voting and paying taxes. “He said we were all puppets and sheeple,” Stomber will tell a reporter. “That was the first time I ever heard that word.” Stomber will not recall Nichols discussing any plans to bomb any federal buildings. [New York Times, 4/24/1995] After the Oklahoma City bombing, a friend of Nichols, an Indiana seed dealer named Dave Shafer, will tell authorities that Nichols showed him a diagram of a building remarkably similar to the Murrah Building, still under construction at the time, and said that building would be an excellent target. Shafer will say that he thought Nichols was joking. [Serrano, 1998, pp. 110] It is possible that Shafer and the unnamed FBI informant are the same person. Five years ago, a group of white supremacists had conceived of a plan to destroy the Murrah Building (see 1983).

Entity Tags: Terry Lynn Nichols, Murrah Federal Building, Federal Bureau of Investigation, Dave Shafer, James Nichols, Dan Stomber

Timeline Tags: US Domestic Terrorism

In the controversial film The Maltese Double Cross—Lockerbie by Allan Francovich, DEA agent Steve Donahue says that in 1989 a man named Mustafa Jafar provides him with information about a possible attack on the World Trade Center. After describing information that Jafar had given him about a possible drugs shipment being carried on Pan Am 103, which was downed over Lockerbie, Donahue says: “In the course of many calls and in direct contact with the FBI and a number of other people, the State Department, and every normal channel and authority, it became quite clear that [Jafar] had significant information, and in fact had predictive information, in terms of the attacks on the World Trade Center, which was one of several attacks which he said were staged, were going to be staged, at that time. This was well in advance of those attacks.” The World Trade Center will be bombed in 1993 (see February 26, 1993). Francovich’s film about Lockerbie is controversial because it blames Iran, Syria, Hezbollah, and their contacts with the US for the bombing, rather than Libya. [Allan Francovich, 1994]

Entity Tags: Allan Francovich, Steve Donahue, Mustafa Jafar

Timeline Tags: Complete 911 Timeline

A convoy of Soviet tanks leaving Afghanistan.A convoy of Soviet tanks leaving Afghanistan. [Source: National Geographic]Soviet forces withdraw from Afghanistan, in accordance with an agreement signed the previous year (see April 1988). However, Afghan communists retain control of Kabul, the capital, until April 1992. [Washington Post, 7/19/1992] It is estimated that more than a million Afghans (eight per cent of the country’s population) were killed in the Soviet-Afghan War, and hundreds of thousands had been maimed by an unprecedented number of land mines. Almost half of the survivors of the war are refugees. [New Yorker, 9/9/2002] Richard Clarke, a counterterrorism official during the Reagan and George H. W. Bush administrations and the counterterrorism “tsar” by 9/11, will later say that the huge amount of US aid provided to Afghanistan drops off drastically as soon as the Soviets withdraw, abandoning the country to civil war and chaos. The new powers in Afghanistan are tribal chiefs, the Pakistani ISI, and the Arab war veterans coalescing into al-Qaeda. [Clarke, 2004, pp. 52-53]

Entity Tags: Al-Qaeda, Pakistan Directorate for Inter-Services Intelligence, Richard A. Clarke

Timeline Tags: 9/11 Timeline, War in Afghanistan

Although the Soviets withdraw from Afghanistan in February 1989 (see February 15, 1989), the CIA continues to support the mujaheddin because the Soviet-allied Communist government stays in power in Kabul. Apparently, the CIA and the Saudi government continue to fund the mujaheddin at least until December 1990, although it could be longer because the Communist government remains in power in Kabul until 1992. The “Blind Sheikh,” Sheikh Omar Abdul-Rahman, reportedly has been working with the CIA in the 1980s to help unite the mujaheddin factions fighting each other (see Late 1980s). The Village Voice will later report that according to a “very high-ranking Egyptian official,” Abdul-Rahman continues to work with the CIA after moving to Brooklyn in July 1990 (see July 1990). He “work[s] closely with the CIA, helping to channel a steady flow of money, men, and guns to mujaheddin bases in Afghanistan and Pakistan.” But despite working with the CIA, Abdul-Rahman still considers the US the “Great Satan” and does not try to hide this. In one radio broadcast, he says that “Americans are descendants of apes and pigs who have been feeding from the dining tables of the Zionists, Communism, and colonialism.” Matti Steinberg, an expert on Islamic fundamentalism, says that Abdul-Rahman’s “long-term goal is to weaken US society and to show Arab rulers that the US is not an invulnerable superpower.” The Egyptian official will later complain, “We begged America not to coddle the sheikh.” [Village Voice, 3/30/1993]

Entity Tags: Central Intelligence Agency, Omar Abdul-Rahman, Matti Steinberg

Timeline Tags: Complete 911 Timeline, War in Afghanistan

President George Bush and Secretary of State James Baker decide that the US will cut off foreign aid to Pakistan because of its nuclear weapons program. Pakistan was a major recipient of foreign aid during the Soviet Afghan war, when the US channeled support to the mujaheddin through it, but Soviet forces began withdrawing from Afghanistan in February (see February 15, 1989). It is decided that aid will be provided for 1989, but not for 1990 (see October 1990). [New Yorker, 3/29/1993]

Entity Tags: George Herbert Walker Bush, Pakistan, James A. Baker

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network

Ali Mohamed, a spy for Osama bin Laden working in the US military, trains Muslim radicals. On this date, he travels with El Sayyid Nosair to the Al-Kifah Refugee Center in Brooklyn, a charity connected to bin Laden and the CIA, and shows training videos from the Fort Bragg military base where US Special Forces train. A former FBI agent will later comment: “You have an al-Qaeda spy who’s now a US citizen, on active duty in the US Army, and he brings along a video paid for by the US government to train Green Beret officers and he’s using it to help train Islamic terrorists so they can turn their guns on us.… By now the Afghan war is over.” [Lance, 2006, pp. 48] Nosair, who watches the videos, will assassinate a Jewish leader in New York one year later (see November 5, 1990).

Entity Tags: Al-Kifah Refugee Center, Ali Mohamed, El Sayyid Nosair

Timeline Tags: Complete 911 Timeline

One of the Calverton surveillance photographs introduced as evidence in court (note that some faces have been blurred out).One of the Calverton surveillance photographs introduced as evidence in court (note that some faces have been blurred out). [Source: National Geographic]FBI agents photograph Islamic radicals shooting weapons at the Calverton Shooting Range on Long Island, New York. The radicals are secretly monitored as they shoot AK-47 assault rifles, semiautomatic handguns, and revolvers for four successive weekends. The use of weapons such as AK-47’s is illegal in the US, but this shooting range is known to be unusually permissive. Ali Mohamed is apparently not at the range but has been training the five men there: El Sayyid Nosair, Mahmud Abouhalima, Mohammed Salameh, Nidal Ayyad, and Clement Rodney Hampton-El. Nosair will assassinate Rabbi Meir Kahane one year later (see November 5, 1990) and the others, except Hampton-El, will be convicted of the 1993 World Trade Center bombing (see February 26, 1993), while Hampton-El will be convicted for a role in the “Landmarks” bombing plot (see June 24, 1993). Some FBI agents have been assigned to watch some Middle Eastern men who are frequenting the Al-Kifah Refugee Center in Brooklyn. Each weekend, Mohamed’s trainees drive from Al-Kifah to the shooting range and a small FBI surveillance team follows them. The FBI has been given a tip that some Palestinians at Al-Kifah are planning violence targeting Atlantic City casinos. By August, the casino plot will have failed to materialize and the surveillance, including that at the shooting range, will have come to an end. Author Peter Lance will later comment that the reason why the FBI failed to follow up the shooting sessions is a “great unanswered question.” [Lance, 2003, pp. 29-33; New York Times, 10/5/2003]

Entity Tags: Mahmud Abouhalima, Peter Lance, Mohammed Salameh, Nidal Ayyad, Federal Bureau of Investigation, Clement Rodney Hampton-El, El Sayyid Nosair, Calverton Shooting Range, Ali Mohamed, Al-Kifah Refugee Center

Timeline Tags: Complete 911 Timeline

In a military journal, William S. Lind, a defense intellectual, and several officers warn that the US must transform its military to fight a new kind of war they call “fourth-generation warfare” or “4GW.” Unlike previous types of warfare relying on massive firepower and centralized command structures, 4GW will resemble terrorism and guerrilla warfare and could emerge from non-Western areas like the Islamic world. They write: “The fourth generation battlefield is likely to include the whole of the enemy’s society. Such dispersion, coupled with what seems likely to be increased importance for actions by very small groups of combatants, will require even the lowest level to operate flexibly on the basis of the commander’s intent. Second is decreasing dependence on centralized logistics. Dispersion, coupled with increased value placed on tempo, will require a high degree of ability to live off the land and the enemy. Third is more emphasis on maneuver. Mass, of men or fire power, will no longer be an overwhelming factor. In fact, mass may become a disadvantage as it will be easy to target. Small, highly maneuverable, agile forces will tend to dominate. Fourth is a goal of collapsing the enemy internally rather than physically destroying him. Targets will include such things as the population’s support for the war and the enemy’s culture. Correct identification of enemy strategic centers of gravity will be highly important. In broad terms, fourth-generation warfare seems likely to be widely dispersed and largely undefined; the distinction between war and peace will be blurred to the vanishing point.… A fourth generation may emerge from non-Western cultural traditions, such as Islamic or Asiatic traditions. The fact that some non-Western areas, such as the Islamic world, are not strong in technology may lead them to develop a fourth generation through ideas rather than technology.” [Marine Corps Gazette, 10/1989] After 9/11, this article and others developing similar ideas on the need for a smaller, more agile military, will be called remarkably prescient. New York Times columnist Bill Keller will comment: “The fourth-generation threat sounds, when you read this text today, uncannily like al-Qaeda. The authors suggested the threat would emerge from a non-Western culture like Islam, that it might be stateless, that, lacking modern means, its warriors would infiltrate our society and use our own technology against us, that they would regard our whole civilization as a battlefield. Fourth-generation warriors would ‘use a free society’s freedom and openness, its greatest strengths, against it.’” [CounterPunch, 9/29/2001; Hindu, 10/9/2001; Atlantic Monthly, 12/2001; New York Times Magazine, 3/10/2002] This article and others with a similar orientation will be praised in an article by “Abu ‘Ubeid Al-Qurashi,” reportedly the pseudonym of an Osama bin Laden aide and al-Qaeda theorist. He will say: “In 1989, some American military experts predicted a fundamental change in the future form of warfare.… [F]ourth-generation wars have already occurred and […] the superiority of the theoretically weaker party has already been proven; in many instances, nation-states have been defeated by stateless nations.… The time has come for the Islamic movements facing a general crusader offensive to internalize the rules of fourth-generation warfare.” [MEMRI Special Dispatch, 2/10/2002; Insight on the News, 12/24/2002; American Conservative, 4/7/2003]

Entity Tags: William Lind, Al-Qaeda, Bill Keller

Timeline Tags: US Military

Sheikh Abdullah Azzam.Sheikh Abdullah Azzam. [Source: CNN]Osama bin Laden’s mentor Sheikh Abdullah Azzam is killed by a car bomb in Afghanistan. The killing will never be solved. Azzam has no shortage of enemies. Suspects will include the Mossad, CIA, Afghan warlord Gulbuddin Hekmatyar, the ISI, and bin Laden. The reason bin Laden will be suspected is because he and Azzam were increasingly at odds over what approach to take since the Soviet Union had been driven from Afghanistan earlier in the year (see February 15, 1989). [Slate, 4/16/2002; Coll, 2004, pp. 204] In 1998, Mohammed Saddiq Odeh will be arrested and later convicted for a role in the 1998 African embassy bombings. He reportedly will tell US interrogators that bin Laden “personally ordered the killing of Azzam because he suspected his former mentor had ties with the CIA.” However, it is not known if Odeh was just passing on a rumor. [Gunaratna, 2003, pp. 32] Regardless, in the wake of Azzam’s death, bin Laden will take control of Azzam’s recruiting and support network, Maktab al-Khidamat (MAK)/Al-Kifah, and merge it with al-Qaeda, which was formed the year before (see August 11-20, 1988). [Slate, 4/16/2002; Coll, 2004, pp. 204]

Entity Tags: Mohammed Saddiq Odeh, Osama bin Laden, Al-Qaeda, Abdullah Azzam, Maktab al-Khidamat

Timeline Tags: Complete 911 Timeline, War in Afghanistan

Dave Frasca, who will later go on to play a key role in the FBI’s failure to get a warrant to search Zacarias Moussaoui’s belongings before 9/11 (see August 21, 2001 and August 29, 2001), starts to work on counterterrorism issues at the FBI’s Newark, New Jersey, field office. Frasca joined the FBI three years previously (see 1987), but has worked on other, unknown issues before this. [US Department of Justice, 11/2004, pp. 123 pdf file]

Entity Tags: David Frasca, Federal Bureau of Investigation

Timeline Tags: 9/11 Timeline, Misc Entries

In 2001, Jamal al-Fadl, a highly reliable al-Qaeda defector (see June 1996-April 1997), will claim that numerous al-Qaeda operatives went to Lebanon and received training from the militant group Hezbollah. Double agent Ali Mohamed sets up a meeting between Osama bin Laden and Hezbollah leader Imad Mugniyah in early 1994 (see Shortly After February 1994). After that meeting, al-Fadl will claim, the following al-Qaeda figures train with Hezbollah:
bullet Saif al-Islam al-Masri, a member of al-Qaeda’s military ruling council.
bullet Abu Talha al-Sudani, an al-Qaeda leader living in Somalia.
bullet Saif al Adel, al-Qaeda’s probable number three leader after the death of Mohammed Atef in 2001.
bullet Two others. One of them runs one of al-Qaeda’s training camps in Afghanistan.
Al-Fadl will add that some videotapes are brought back and he sees one of them. It teaches how to blow up “big buildings.” [United States of America v. Usama Bin Laden, et al., Day 2, 2/6/2001] Ali Mohamed will also claim in court that Hezbollah subsequently provides explosives training for al-Qaeda and Islamic Jihad. So will US prosecutor Patrick Fitzgerald, who states, “in the middle of the 1990s, al-Qaeda members received sophisticated explosives training from Hezbollah, despite the deep religious differences between the Sunni members of al-Qaeda and the Shiite members of Hezbollah.” [9/11 Commission, 6/16/2004] However, it seems the links between al-Qaeda and Hezbollah decline after this time.

Entity Tags: Jamal al-Fadl, Abu Talha al-Sudani, Ali Mohamed, Osama bin Laden, Imad Mugniyah, Saif al-Adel, Patrick J. Fitzgerald, Saif al-Islam al-Masri

Timeline Tags: Complete 911 Timeline

In July 1990, the “Blind Sheikh,” Sheikh Omar Abdul-Rahman, was mysteriously able to enter the US and remain there despite being a well known public figure and being on a watch list for three years (see July 1990).
bullet In late October 1990, he travels to London, so he is out of the US when one of his followers assassinates the Zionist rabbi Meir Kahane on November 5, 1990 (see November 5, 1990). He returns to the US in mid-November under the name “Omar Ahmed Rahman” and again has no trouble getting back in despite still being on the watch list. [Washington Post, 7/13/1993]
bullet The State Department revokes his US visa on November 17 after the FBI informs it that he is in the US. [New York Times, 12/16/1990]
bullet In December 1990, Abdul-Rahman leaves the US again to attend an Islamic conference in Copenhagen, Denmark. He returns nine days later and again has no trouble reentering, despite not even having a US visa at this point. [Washington Post, 7/13/1993]
bullet On December 16, 1990, the New York Times publishes an article titled, “Islamic Leader on US Terrorist List Is in Brooklyn,” which makes his presence in the US publicly known. The Immigration and Nationalization Service (INS) is said to be investigating why he has not been deported already. [New York Times, 12/16/1990]
bullet Yet in April 1991, the INS approves his application for permanent residence.
bullet He then leaves the US again in June 1991 to go on the religious hajj to Mecca, Saudi Arabia, and returns on July 31, 1991. INS officials identify him coming in, but let him in anyway. [New York Times, 4/24/1993; Washington Post, 7/13/1993]
bullet In June 1992, his application for political asylum will be turned down and his permanent residence visa revoked. But INS hearings on his asylum bid are repeatedly delayed and still have not taken place when the WTC is bombed in February 1993 (see February 26, 1993). [Lance, 2003, pp. 105-106]
bullet Abdul-Rahman then goes to Canada around October 1992 and returns to the US yet again. The US and Canada claim to have no documentation on his travel there, but numerous witnesses in Canada see him pray and lecture there. Representative Charles Schumer (D-NY) says, “Here they spent all this time trying to get him out. He goes to Canada and gives them the perfect reason to exclude him and they don’t.”
bullet After the WTC bombing, the US could detain him pending his deportation hearing but chooses not to, saying it would be too costly to pay for his medical bills. [New York Times, 4/24/1993]
Abdul-Rahman will be involved in the follow up “Landmarks” plot (see June 24, 1993) before finally being arrested later in 1993. It will later be alleged that he was protected by the CIA. In 1995, the New York Times will comment that the link between Abdul-Rahman and the CIA “is a tie that remains muddy.” [New York Times, 10/2/1995]

Entity Tags: US Department of State, Meir Kahane, US Immigration and Naturalization Service, Omar Abdul-Rahman, Charles Schumer, Federal Bureau of Investigation, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

Meir Kahane.Meir Kahane. [Source: Publicity photo]Egyptian-American El Sayyid Nosair assassinates controversial right-wing Zionist leader Rabbi Meir Kahane. Kahane’s organization, the Jewish Defense League, was linked to dozens of bombings and is ranked by the FBI as the most lethal domestic militant group in the US at the time. Nosair is captured after a police shoot-out. [Village Voice, 3/30/1993] Within hours, overwhelming evidence suggests that the assassination was a wide conspiracy but the US government will immediately declare that Nosair was a lone gunman and ignore the evidence suggesting otherwise (see November 5, 1990 and After). Nosair will later be acquitted of Kahane’s murder (though he will be convicted of lesser charges) as investigators continue to ignore most of the evidence in his case which links to a wider conspiracy (see December 7, 1991). Nosair is connected to al-Qaeda through his job at the Al-Kifah Refugee Center, an al-Qaeda front (see 1986-1993). A portion of Nosair’s defense fund will be paid for by bin Laden, although this will not be discovered until some time later. [ABC News, 8/16/2002; Lance, 2003, pp. 34-37]

Entity Tags: Meir Kahane, Al-Qaeda, Al-Kifah Refugee Center, El Sayyid Nosair

Timeline Tags: Complete 911 Timeline

Invesigators remove boxes of evidence from El Sayyid Nosair’s residence hours after the assassination.Invesigators remove boxes of evidence from El Sayyid Nosair’s residence hours after the assassination. [Source: National Geographic]US government agencies cover up evidence of a conspiracy in the wake of El Sayyid Nosair’s assassination of controversial right-wing Zionist leader Rabbi Meir Kahane (see November 5, 1990). Nosair is captured a few blocks from the murder site after a police shoot-out. An FBI informant says he saw Nosair meeting with Muslim leader Sheikh Omar Abdul-Rahman a few days before the attack, and evidence indicating a wider plot with additional targets is quickly found. [Village Voice, 3/30/1993] Later that night, police arrive at Nosair’s house and find a pair of Middle Eastern men named Mahmud Abouhalima and Mohammed Salameh there. They are taken in for questioning. Additionally, police collect a total of 47 boxes of evidence from Nosair’s house, including: [Lance, 2003, pp. 34-35]
bullet Thousands of rounds of ammunition.
bullet Maps and drawings of New York City landmarks, including the World Trade Center.
bullet Documents in Arabic containing bomb making formulas, details of an Islamic militant cell, and mentions of the term “al-Qaeda.”
bullet Recorded sermons by Sheikh Omar Abdul-Rahman in which he encourages his followers to “destroy the edifices of capitalism” and destroy “the enemies of Allah” by “destroying their… high world buildings.”
bullet Tape-recorded phone conversations of Nosair reporting to Abdul-Rahman about paramilitary training, and even discussing bomb-making manuals.
bullet Videotaped talks that Ali Mohamed delivered at the John F. Kennedy Special Warfare Center at Fort Bragg, North Carolina.
bullet Top secret manuals also from Fort Bragg. There are even classified documents belonging to the US Joint Chiefs of Staff and the Commander in Chief of the Army’s Central Command. These manuals and documents had clearly come from Mohamed, who completed military service at Fort Bragg the year before and frequently stayed in Nosair’s house.
bullet A detailed and top secret plan for Operation Bright Star, a special operations training exercise simulating an attack on Baluchistan, a part of Pakistan between Afghanistan and the Arabian Sea. [Raleigh News and Observer, 10/21/2001; Raleigh News and Observer, 11/13/2001; Wall Street Journal, 11/26/2001; ABC News, 8/16/2002; Lance, 2003, pp. 34-35]
bullet Also within hours, two investigators will connect Nosair with surveillance photographs of Mohamed giving weapons training to Nosair, Abouhalima, Salameh, and others at a shooting range the year before (see July 1989). [Lance, 2003, pp. 34-35] But, ignoring all of this evidence, still later that evening, Joseph Borelli, the New York police department’s chief detective, will publicly declare the assassination the work of a “lone deranged gunman.” He will further state, “I’m strongly convinced that he acted alone.… He didn’t seem to be part of a conspiracy or any terrorist organization.” The 9/11 Congressional Inquiry will later conclude, “The [New York Police Department] and the District Attorney’s office… reportedly wanted the appearance of speedy justice and a quick resolution to a volatile situation. By arresting Nosair, they felt they had accomplished both.” [Village Voice, 3/30/1993; Lance, 2003, pp. 34-36] Abouhalima and Salameh are released, only to be later convicted for participating in the 1993 bombing of the World Trade Center. Investigators will later find in Nosair’s possessions a formula for a bomb almost identical to one used in the WTC bombing. [New York Magazine, 3/17/1995] As one FBI agent will later put it, “The fact is that in 1990, myself and my detectives, we had in our office in handcuffs, the people who blew up the World Trade Center in ‘93. We were told to release them.” The 47 boxes of evidence collected at Nosair’s house that evening are stored away, inaccessible to prosecutors and investigators. The documents found will not be translated until after the World Trade Center bombing. Nosair will later be acquitted of Kahane’s murder (though he will be convicted of lesser charges), as investigators will continue to ignore all evidence that could suggest Nosair did not act alone (see December 7, 1991). [ABC News, 8/16/2002; Lance, 2003, pp. 34-37] District Attorney Robert Morgenthau, who prosecuted the case, will later speculate the CIA may have encouraged the FBI not to pursue any other leads. Nosair worked at the Al-Kifah Refugee Center which was closely tied to covert CIA operations in Afghanistan (see Late 1980s and After). [New York Magazine, 3/17/1995]

Entity Tags: Joseph Borelli, Mahmud Abouhalima, Meir Kahane, Federal Bureau of Investigation, El Sayyid Nosair, Al-Qaeda, Ali Mohamed, Central Intelligence Agency, Robert Morgenthau, Mohammed Salameh, Al-Kifah Refugee Center

Timeline Tags: Complete 911 Timeline

George H.W. Bush and Dick Cheney.George H.W. Bush and Dick Cheney. [Source: Representational Pictures]President Bush, reeling from the Republican defeat in the midterm elections two days before, announces the deployment of 200,000 more troops around the Persian Gulf to augment the 250,000 already in place. Bush announces the deployment without consulting or advising Congress, a brush-off that angers many legislators who feel that Bush kept this from Congress in order to make sure it did not become an election issue. Bush is also weighing the advice of Defense Secretary Dick Cheney, who argues that the president does not need the authorization of Congress to wage war. [Dean, 2007, pp. 90]

Entity Tags: George Herbert Walker Bush, Richard (“Dick”) Cheney

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion, US-Iraq 1980s

Abu Hamza al-Masri (left) riding in a car with Haroon Rashid Aswat in January 1999.Abu Hamza al-Masri (left) riding in a car with Haroon Rashid Aswat in January 1999. [Source: Sunday Times]Haroon Rashid Aswat is a radical Muslim of Indian descent but born and raised in Britain. Around 1995, when he was about 21 years old, he left Britain and attended militant training camps in Pakistan and Afghanistan. He is said to have later told investigators that he once served as a bodyguard for Osama bin Laden. In the late 1990s, he returns to Britain and becomes a “highly public aide” to radical London imam Abu Hamza al-Masri. Reda Hassaine, an informant for the French and British intelligence services (see After March 1997 and Late January 1999), will later recall regularly seeing Aswat at the Finsbury Park mosque where Abu Hamza preaches. Hassaine frequently sees Aswat recruiting young men to join al-Qaeda. “Inside the mosque he would sit with the new recruits telling them about life after death and the obligation of every Muslim to do the jihad against the unbelievers. All the talk was about killing in order to go to paradise and get the 72 virgins.” Aswat also shows potential recruits videos of the militants fighting in Bosnia and Chechnya. Hassaine will add: “He was always wearing Afghan or combat clothes. In the evening he offered some tea to the people who would sit with him to listen to the heroic action of the mujaheddin before joining the cleric for the finishing touch of brainwashing. The British didn’t seem to understand how dangerous these people were.” Hassaine presumably tells his British handlers about Aswat, as he is regularly reporting about activities as the mosque around this time, but the British take no action. [Sunday Times (London), 7/31/2005] It will later be reported that Aswat is the mastermind of the 7/7 London bombings (see Late June-July 7, 2005). Some of the 7/7 suicide bombers regularly attended the Finsbury Park mosque, and may have been recruited by al-Qaeda there or at another mosque in Britain. Counterterrorism expert John Loftus will later claim that Aswat in fact was working with British intelligence. He will say that in the late 1990s British intelligence was trying to get Islamist militants to fight in Kosovo against the Serbians and Aswat was part of this recruitment effort (see July 29, 2005). [Fox News, 7/29/2005]

Entity Tags: Reda Hassaine, Abu Hamza al-Masri, Al-Qaeda, John Loftus, Haroon Rashid Aswat

Timeline Tags: Complete 911 Timeline

Mohammed Haydar Zammar, who will later be the chief recruiter for and a key member of the al-Qaeda Hamburg cell, travels widely and joins al-Qaeda. Zammar was born in Syria but his family moved to Hamburg, Germany, in 1971. He became a German citizen and renounced his Syrian citizenship about a decade later. By his late teens, he developed a friendship with Mamoun Darkazanli, a fellow Syrian, and both of them joined the Muslim Brotherhood, a radical Muslim group banned in Egypt. Zammar worked as an auto mechanic until about 1991, when he decides to become a full time militant, and he mostly lives on government benefits after that.
Training and Fighting in Afghanistan - In 1991, Zammar goes to Afghanistan and trains at an elite camp linked to Afghan warlord Gulbuddin Hekmatyar. He fights with Hekmatyar’s forces against the Communist Afghan government before returning to Hamburg by the end of 1991.
Active in Many Countries - Over the next five years, he makes about 40 trips out of Germany, often to countries where Islamist militants are fighting. In 1995, he fights in Bosnia with other Arabs against the Serbians. In 1996, he goes to Afghanistan again and formally pledges allegiance to Osama bin Laden and al-Qaeda, according to an unnamed Arab intelligence agency.
His Travels Cause Attention - All of Zammar’s traveling brings him to the attention of Turkish intelligence, and it notifies German intelligence about his radical militant links in 1996 (see 1996). Knowing that his militant activity is not illegal in Germany as long as he is not involved in a plot targeting Germany, Zammar speaks openly about his travels and exploits, and he becomes very well known within the Islamist extremist community in Hamburg. He begins recruiting others to become active militants and attend Afghan training camps. [Washington Post, 9/11/2002; New York Times, 1/18/2003]

Entity Tags: Osama bin Laden, Al-Qaeda, Gulbuddin Hekmatyar, Mamoun Darkazanli, Mohammed Haydar Zammar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The CIA is aware of the term al-Qaeda at least by this time. Billy Waugh is a CIA contractor assigned to follow bin Laden and other suspected criminals in Sudan starting at this time (see February 1991- July 1992). He will later recall in a book that when he arrived in Sudan, the CIA station chief there said to him about bin Laden, “We don’t know what he’s up to, but we know he’s a wealthy financier and we think he’s harboring some of these outfits called al-Qaeda. See what you can find out.” Waugh will note, “I was familiar with bin Laden from [CIA] traffic, but this was the first time I had heard the term al-Qaeda.” [Waugh and Keown, 2004, pp. 121] According to most other media accounts, US intelligence does not learn about the existence of al-Qaeda until several years later, not long before the State Department publicly uses the term in 1996 (see August 14, 1996). For instance, US News and World Report will even assert in 2003, “So limited was the CIA’s knowledge that it began using al-Qaeda’s real name only [in 1998]—10 years after bin Laden founded the organization.” [US News and World Report, 12/15/2003]

Entity Tags: Central Intelligence Agency, Al-Qaeda, Billy Waugh, Osama bin Laden

Timeline Tags: Complete 911 Timeline

Wadih El-Hage’s US passport. His face is overly dark due to a poor photocopy.Wadih El-Hage’s US passport. His face is overly dark due to a poor photocopy. [Source: US Justice Department] (click image to enlarge)The FBI begins to investigate Wadih El-Hage, who will soon work as bin Laden’s personal secretary. The FBI is investigating the February 1991 murder of Mustafa Shalabi (see (February 28, 1991)), the head of the Al-Kifah Refugee Center, a charity with ties to both bin Laden and the CIA. El-Hage, a US citizen living in Texas, came to New York to briefly run Al-Kifah so Shalabi could take a trip overseas, and happened to arrive the same day that Shalabi was murdered. Investigators find a message from El-Hage on Shalabi’s answer machine. They learn El-Hage had been connected to the 1990 murder of a liberal imam in Tucson, Arizona (see January 1990). [Miller, Stone, and Mitchell, 2002, pp. 148-149; Lance, 2006, pp. 67-68] Further, he visited El Sayyid Nosair, who assassinated Meir Kahane the year before (see November 5, 1990), in prison, and left his name in the visitor’s log. [Lance, 2003, pp. 50-51] However, the FBI decides there is not enough evidence to charge El-Hage with any crime. They lose track of him in early 1992, when he moves to Sudan and begins working there as bin Laden’s primary personal secretary. He will help bin Laden run many of his businesses, and will frequently take international trips on bin Laden’s behalf. [PBS Frontline, 4/1999; New York Times, 1/22/2000]

Entity Tags: El Sayyid Nosair, Mustafa Shalabi, Al-Kifah Refugee Center, Wadih El-Hage

Timeline Tags: Complete 911 Timeline

Hambali, an important future al-Qaeda leader, moves to the village of Sungai Manggis, Malaysia, about an hour north of the capital of Kuala Lumpur. Hambali is from nearby Indonesia and fought in Afghanistan with Osama bin Laden in the late 1980s. He starts off poor, working at odd jobs, but soon is frequently traveling and has many overseas visitors. Intriguingly, Hambali’s landlord will later say of Hambali’s visitors, “Some looked Arab and others white.” Hambali plays a major role in the 1995 Bojinka plot in the Philippines (see January 6, 1995), and after that plot is foiled he continues to live in his simple Sungai Manggis house. [Time, 4/1/2002; Los Angeles Times, 9/1/2002] Living near Hambali in this village are other regional Islamist militant leaders such as Abdullah Sungkar, Imam Samudra (allegedly a key figure in the 2000 Christmas bombings (see December 24-30, 2000) and the 2002 Bali bombings (see October 12, 2002)), Abu Bakar Bashir, the spiritual leader of the al-Qaeda affiliate Jemaah Islamiyah, and Abu Jibril. So many militants live in this village that it becomes known as “Terror HQ” to intelligence agencies. Sungkar and Bashir are considered the two most well-known militant leaders in Southeast Asia at the time (Sungkar dies of old age in 1999). Hambali’s house is directly across from Bashir’s and they are considered friends. [Tempo, 10/29/2002; Ressa, 2003] Interestingly, Fauzi Hasbi, an Indonesian government mole posing as a militant leader, lives next door to Bashir as well. [SBS Dateline, 10/12/2005] Despite his role in the Bojinka plot, Hambali continues to live there very openly. Beginning in March 1995, just two months after the plot was foiled, Hambali throws his first feast for several hundred guests to mark a Muslim holiday. This becomes an annual party. He also sometimes travels to Indonesia. [Time, 4/1/2002] By May 1999, if not earlier, the FBI connects Hambali to the Bojinka plot (see May 23, 1999). In January 2000, he attends a key al-Qaeda summit in nearby Kuala Lumpur. The CIA gets pictures and video footage of him at the meeting and already has pictures of him from a computer linked to the Bojinka plot (see January 5-8, 2000 and January 5, 2000). However, there is no apparent effort to apprehend him, extradite him, or even put him on a public wanted list. He continues to live in Sungai Manggis until at least late 2000. [Conboy, 2003]

Entity Tags: Fauzi Hasbi, Abu Bakar Bashir, Hambali, Abdullah Sungkar, Jemaah Islamiyah, Abu Jibril, Imam Samudra

Timeline Tags: Complete 911 Timeline

A US appellate court refuses to find a number of military contractors liable in the death of Earl Patton Ryals, who died with 36 of his fellow crewmen in the Iraqi attack on the USS Stark (see May 17, 1987 and After). Ryals’s estate claims that he and his fellows died in part because of negligence on the part of the contractors who designed, manufactured, tested, and marketed the weapons system on board the Stark, including the Phalanx anti-missile system. In turning down the estate’s claim, the court cites the government’s “state secrets” privilege (see March 9, 1953), saying that the facts of the issue could not be resolved without examining classified Navy documents. And even without this reason, the court rules, Ryals’s estate cannot see the documents because the case presents “a political question” about military decision-making that is not subject to judicial review. [Zuckerbraun v. General Dynamics Corp., 6/13/1991; Siegel, 2008, pp. 197-198] A year later, a similar case will be dismissed on the grounds that a trial might conceivably reveal “state secrets” (see September 16, 1992).

Entity Tags: Earl Patton Ryals, US Department of the Navy

Timeline Tags: Civil Liberties

Elfatih Hassanein (center).Elfatih Hassanein (center). [Source: Magyar Iszlam]In 1987, a Sudanese man named Elfatih Hassanein found the Third World Relief Agency (TWRA). By mid-1991, Bosnian President Izetbegovic contacts Hassanein, who he has known since the 1970s. The two men agree to turn TWRA from an obscure charity into what the Washington Post will later call “the chief broker of black-market weapons deals by Bosnia’s Muslim-led government and the agent of money and influence in Bosnia for Islamic movements and governments around the world.” A banker in Vienna will later call Hassanein the “bagman” for Izetbegovic. “If the Bosnian government said we need flour, he ran after flour. If they said we need weapons, he ran after weapons.” [Washington Post, 9/22/1996; Schindler, 2007, pp. 148] The TWRA is controlled by a committee composed of Hassanein and:
bullet Hasan Cengic. He is in charge of arming a Bosnian militia run by the SDA party (see June 1991).
bullet Irfan Ljevakovic.
bullet Husein Zivalj.
bullet Dervis Djurdjevic.
All of them are important members of Izetbegovic’s SDA party, and all but Ljevakovic were codefendants with Izetbegovic in a 1983 trial. Most payments require the approval of three of the five, except for amounts greater than $500,000, in which case Izetbegovic has to give approval. The corruption from these higher-ups is said to be incredible, with up to half of all money passing through the TWRA going into their pockets. [Schindler, 2007, pp. 148-152] The TWRA is based in Vienna, Austria, and Izetbegovic personally guarantees Hassanein’s credentials with banks there. Soon, machine guns, missiles and other weapons are being shipped into Bosnia in containers marked as humanitarian aid. Hassanein is a member of Sudan’s government party and a follower of top Sudanese leader Hassan al-Turabi. Just like al-Turabi, he works with bin Laden and the “Blind Sheikh,” Sheikh Omar Abdul-Rahman. He becomes the main agent in Europe for marketing and selling video and audio tapes of Abdul-Rahman’s sermons. In March 1992, the Sudanese government gives him a diplomatic passport and he uses it to illegally transport large amounts of cash from Austria into Bosnia without being searched. [Burr and Collins, 2006, pp. 140-141] The Saudi Arabian government is the biggest contributor to TWRA, but many other governments give money to it too, such as Sudan, Iran, Pakistan, Brunei, Turkey, and Malaysia. Bin Laden is also a major contributor. [Washington Post, 9/22/1996] Author John Schindler will later note, “Relations between bin Laden and TWRA were close, not least because during the Bosnian war the al-Qaeda leadership was based in Khartoum, Sudan, under the protection of the Sudanese Islamist regime that was the ultimate backer of Hassanein and his firm.” TWRA also works closely with the International Islamic Relief Organization (IIRO) and most other charity fronts in Bosnia. [Schindler, 2007, pp. 151-152] A later study by the Bosnian government with help from Western intelligence agencies will determine that at least $2.5 billion passed through the TWRA to Bosnia between 1992 and 1995. The study will call the TWRA “a group of Bosnian Muslim wartime leaders who formed an illegal, isolated ruling oligarchy, comprising three to four hundred ‘reliable’ people in the military commands, the diplomatic service, and a number of religious dignitaries.… It was this organization, not the Government [of Bosnia], that controlled all aid that Islamic countries donated to the Bosnian Muslims throughout the war.” [Schindler, 2007, pp. 149-150]

Entity Tags: Omar Abdul-Rahman, Osama bin Laden, Dervis Djurdjevic, Alija Izetbegovic, Elfatih Hassanein, Hassan al-Turabi, Third World Relief Agency, Irfan Ljevakovic, Husein Zivalj, Hasan Cengic, International Islamic Relief Organization

Timeline Tags: Complete 911 Timeline

Ramzi Yousef, the future bomber of the WTC in 1993, stays in the Philippines and trains militants there in bomb-making. According to Philippine intelligence documents, Yousef had developed expertise in bomb-making and worked at a training camp at Khost, Afghanistan, teaching bomb-making for militants connected to bin Laden. But bin Laden dispatches him to the Philippines, where he trains about 20 militants belonging to the Abu Sayyaf group. Abu Sayyaf is heavily penetrated by Philippine undercover operatives at this time, especially Edwin Angeles, an operative who is the second in command of the group. Angeles will later recall that Yousef is introduced to him at this time as an “emissary from bin Laden.” [Strategic Studies Institute of the US Army War College, 9/1/2005 pdf file] Angeles also claims Yousef decided to use the Philippines as a “launching pad” for terrorist acts around the world. [New York Times, 9/6/1996] One of Abu Sayyaf’s top leaders will later recall that Yousef also brings a significant amount of money to help fund the group. [Philippine Daily Inquirer, 1/22/2007; CNN, 1/31/2007] A flow chart of Yousef’s associates prepared in early 1995 by Angeles’ Philippines handler Rodolfo Mendoza shows a box connected to Abu Sayyaf labeled “20 trainees/recruits.” So presumably the Philippine government is aware of this information by then, but it is not known when they warned the US about it (see Spring 1995). Yousef will also later admit to planning the 1993 WTC bombing at an Abu Sayyaf base, which most likely takes place at this time (see Early 1992). The ties between Yousef and Abu Sayyaf will grow stronger, culminating in the 1995 Bojinka plot (see January 6, 1995), an early version of the 9/11 plot.

Entity Tags: Ramzi Yousef, Abu Sayyaf, Edwin Angeles, Rodolfo Mendoza

Timeline Tags: Complete 911 Timeline

El Sayyid Nosair.El Sayyid Nosair. [Source: FBI]El-Sayyid Nosair is acquitted of killing Meir Kahane (see November 5, 1990), leader of the Jewish Defense League, but convicted of firearms offenses connected with his shooting of two witnesses during his attempt to flee. The judge will declare that the acquittal verdict “defie[s] reason” and sentence Nosair to 22 years by applying maximum sentences to his convictions on the other charges. [Village Voice, 3/30/1993; Independent, 11/1/1998; Lance, 2003, pp. 65] The prosecution of Nosair was hobbled by the US government’s absolute refusal to acknowledge the possibility that the murder was anything other than the work of a “lone deranged gunman” despite information gained during the course of the investigation provided by an FBI operative that he had “very close” ties to the radical imam Sheikh Omar Abdul-Rahman. Many boxes of evidence that could have sealed Nosair’s guilt on the murder charge and also shown evidence of a larger conspiracy were not allowed as evidence. [Village Voice, 3/30/1993; Miller, Stone, and Mitchell, 2002, pp. 44-46] A portion of Nosair’s defense fund is paid for by bin Laden, but this will not be discovered until some time later. [ABC News, 8/16/2002] District Attorney Robert Morgenthau, who prosecuted the case, will later speculate the CIA may have encouraged the FBI not to pursue any other leads. Nosair worked at the Al-Kifah Refugee Center which was closely tied to covert CIA operations in Afghanistan (see Late 1980s and After). [New York Magazine, 3/17/1995]

Entity Tags: El Sayyid Nosair, Osama bin Laden, Omar Abdul-Rahman, Meir Kahane, Robert Morgenthau

Timeline Tags: Complete 911 Timeline

GIA logo.GIA logo. [Source: Public domain]The Groupe Islamique Armé (GIA), established in 1991, allegedly is an Islamist militant group linked to al-Qaeda, but there are allegations it was manipulated by the Algerian government from its inception (see 1991). Militants launch their first attack in December 1991, shortly before an Algerian army coup (see January 11, 1992), striking a military base, killing conscripts there and seizing weapons. The GIA competes with an existing militant group, the Armed Islamic Movement (MIA), which changes its name to the Islamic Salvation Army (AIS) in 1993 and becomes the armed wing of the banned FIS party. After the army coup, the GIA and AIS stage many attacks in Algeria. The GIA is more active, targeting many government employees, intellectuals, and foreigners for assassination, and attacking factories, railroads, bridges, banks, military garrisons, and much more. They generally try to minimize civilian casualties, but hope to create a state of fear that will lead to paralysis and the collapse of the government. The group goes through four leaders during this time. But in October 1994 a new leader will take over, dramatically changing the direction of the group (see October 27, 1994-July 16, 1996). [Crotty, 2005, pp. 291]

Entity Tags: Islamic Salvation Army, Groupe Islamique Armé

Timeline Tags: Alleged Use of False Flag Attacks, Complete 911 Timeline

Fauzi Hasbi.Fauzi Hasbi. [Source: SBS Dateline]In 1992, the Southeast Asian Islamist militant group Jemaah Islamiyah (JI) is founded. It will eventually become known as al-Qaeda’s main affiliate in the region. Actually, many of its alleged founders, such as Abu Bakar Bashir, have been pressing Islamist militant causes for several decades, but with the creation of JI their efforts become more violent. Also in contrast to previous Islamist groups in the region, JI is deliberately set up as a military organization. One of the founding members of JI is Fauzi Hasbi, who has been an Indonesian government mole posing as a militant leader since the late 1970s (see 1979-February 22, 2003). Hasbi actually facilitates JI’s first major meeting, held in Bogor, Indonesia. For many years, he also lives in the same small Malaysian village as the top JI leaders, such as Bashir and Hambali (see April 1991-Late 2000). The Australian television program SBS Dateline will later comment: “The extraordinary story of Fauzi Hasbi raises many important questions about JI and the Indonesian authorities. Why didn’t they smash the terror group in its infancy?” Umar Abduh, an Indonesian Islamist convicted of terrorism and jailed for ten years, works with Hasbi. In 2005, he will claim that in retrospect he realizes that he and other militants were completely manipulated by the government. “[T]here is not a single Islamic group, either in the movement or the political groups that is not controlled by [Indonesian intelligence]. Everyone does what they say.” [New York Times, 8/27/2003; SBS Dateline, 10/12/2005]

Entity Tags: Jemaah Islamiyah, Fauzi Hasbi, Abu Bakar Bashir, Umar Abduh, Hambali

Timeline Tags: Alleged Use of False Flag Attacks, Complete 911 Timeline

Apparently the bin Laden guest house where Yousef lived.Apparently the bin Laden guest house where Yousef lived. [Source: National Geographic]According to Pakistani investigators, Ramzi Yousef spends most of this time at the Beit Ashuhada guesthouse (translated as House of Martyrs) in Peshawar, Pakistan, which is funded by Osama bin Laden. Pakistani investigators reveal this bin Laden-Yousef connection to US intelligence in March 1995. The CIA will publicly reveal this in 1996. [Central Intelligence Agency, 1996 pdf file; Tenet, 2007, pp. 100] While living there, Yousef receives help and financing from two unnamed senior al-Qaeda representatives. [Reeve, 1999, pp. 47] Yousef will be arrested at another nearby bin Laden safe house in February 1995 (see February 7, 1995) with bin Laden’s address found in his pocket. [London Times, 10/18/1997] During these years, Yousef takes long trips to the US in preparation of the WTC bombing (see February 26, 1993) and the Philippines, where several plots are developed (see January 6, 1995). He also uses an al-Qaeda influenced mosque in Milan, Italy, as a logistical base (see 1995-1997).

Entity Tags: Osama bin Laden, Al-Qaeda, Ramzi Yousef

Timeline Tags: Complete 911 Timeline

Terry Nichols, a white supremacist member of the so-called “Patriot Movement” (see March 24, 1988 - Late 1990 and February 1992), renounces his US citizenship via a “nonresident alien” declaration to the Evergreen, Michigan, Township Clerk. “[T]here is total corruption in the entire political system,” Nichols says; “the entire political system from the local government on up thru and including the President of the United States, George Bush.” He adds: “I no longer am a citizen of the corrupt political corporate state of Michigan and the United States of America.… I follow the common laws, not the Uniform Commercial Codes, Michigan Statutes, etc., that are all colorable laws.… I lawfully, squarely challenge the fraudulent usurping octopus of jurisdiction/authority that does not apply to me. It is therefore now mandatory for… the so-called IRS, for example, to prove its jurisdiction.” He calls himself “a nonresident alien, non-foreigner, stranger to the current state of the forum.” Many will later detect language similar to that used by the Posse Comitatus movement (see 1969). Nichols has already sent his bank a letter revoking his signature on a credit card application, in an attempt to avoid paying $14,000 in credit card debt (another source will say Nichols owes closer to $40,000), writing in part: “I came across some information and in researching it further I have found that your credit, money, and contracts are all based upon fraud, etc., as stated in my revocation document.” The bank wins a lawsuit to compel Nichols to pay his debt; Nichols attempts to pay the debt with a fraudulent “Certified Fractional Reserve Check,” a scheme somewhat similar to the fraudulent checks advocated by the Montana Freemen (see 1993-1994), which the bank refuses to accept. During the court proceedings, Nichols, ordinarily an unusually quiet and shy man, repeatedly defies judicial orders to, among other things, come to the front of the courtroom, and at one point tells the judge, “I’m… a layman, a natural person, a freedom of common-law citizen under threat and duress and to challenge the jurisdiction of this court.” Circuit Judge Donald A. Teeple will later recall: “He was hollering in a loud voice. I informed him that if he didn’t keep quiet, I’d send him to jail. Then he decided to come around the rail” and participate quietly in the hearing. [New York Times, 4/23/1995; New York Times, 5/28/1995; PBS Frontline, 1/22/1996; New York Times, 12/24/1997; Southern Poverty Law Center, 6/2001; Nicole Nichols, 2003; Nicole Nichols, 2003] Both Terry Nichols and his brother James (see December 22 or 23, 1988) routinely stamp their paper money with the words “Discharged Without Prejudice,” a phrase indicating they do not accept its validity. The money-stamping is popular among Posse Comitatus members (see 1969) as they claim money not backed by gold lacks credibility. They also refuse to buy license plates for their vehicles or register them. James Nichols will also renounce his citizenship sometime later [Nicole Nichols, 2003; Nicole Nichols, 2003] , telling local courthouse officials that he is “no longer one of your citizens or a resident of your de facto government.” In mid-1992, Nichols will spend several days in jail for refusing to recognize a court’s authority to make him pay child support; after those days in a cell, he will agree to the court’s mandate. [New York Times, 4/24/1995; Serrano, 1998, pp. 109] Nichols will later be convicted for his role in the Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995 and December 23, 1997).

Entity Tags: Montana Freemen, James Nichols, Posse Comitatus, Donald A. Teeple, Terry Lynn Nichols

Timeline Tags: US Domestic Terrorism

Page 1 of 19 (1834 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike