!! History Commons Alert, Exciting News

Context of 'August 20, 2001: Fort Meade Increases Base Security'

This is a scalable context timeline. It contains events related to the event August 20, 2001: Fort Meade Increases Base Security. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 3 (292 events)
previous | 1, 2, 3 | next

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

The CIA’s Technical Services Division (TSD) considers plans to undermine Fidel Castro’s charismatic appeal by sabotaging his speeches. At one point, there is discussion of spraying Castro’s broadcasting studio with a hallucinogenic chemical. The plan is taken of the shelf because the chemical is deemed unreliable. During this period, the TSD laces a box of cigars with a chemical that would produce temporary disorientation, hoping that he will smoke one of the cigars before giving a speech. In another instance, the TSD comes up with a scheme to dust Castro’s shoes with thallium salts during a trip outside of Cuba. The salts would cause his beard to fall out. The plan is abandoned when Castro cancels the trip. [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, Technical Services Division (TSD)

Timeline Tags: US-Cuba (1959-2005)

The CIA works with a high-level Cuban official, codenamed “AM/LASH,” on a plan to assassinate Fidel Castro and overthrow his government. In June 1965, the CIA ends its contact with AM/LASH and his associates, citing security concerns. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Timeline Tags: US-Cuba (1959-2005)

The CIA’s Task Force W devises two plans to assassinate Fidel Castro. The first one, involving an exploding sea shell that would be placed where Castro regularly dives, is dismissed by the CIA’s Technical Services Division (TSD) as impractical. In the second plan, James Donovan (who has been negotiating with Castro for the release of prisoners taken during the Bay of Pigs operation) would present Castro with a contaminated diving suit. TSD decides to give the plan a try. It purchases a diving suit and laces its breathing apparatus with tubercule bacillus. The suit itself is dusted with a fungus that is known to cause a chronic skin disease. But the suit never leaves the laboratory. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Entity Tags: Technical Services Division (TSD), James Donovan, Fidel Castro

Timeline Tags: US-Cuba (1959-2005)

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]

Entity Tags: Malcolm Little, Central Intelligence Agency, Church Committee, Lew Allen, National Security Agency, Martin Luther King, Jr., Office of Security Services, Joan Baez

Timeline Tags: Civil Liberties

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Vice President Nelson Rockefeller (see December 19, 1974 and After) is instrumental in keeping Senate Democrats from finding out too much about the intelligence community’s excesses. When the New York Times reveals the existence of a decades-old illegal domestic surveillance program run by the CIA (see December 21, 1974), President Ford heads off calls from Democrats to investigate the program by appointing the “Rockefeller Commission” to investigate in the Democrats’ stead. Senate Democrats, unimpressed with the idea, create the Church Committee to investigate the intelligence community (see April, 1976). Rockefeller is adept at keeping critical documents out of the hands of the Church Committee and the press. When Senator Frank Church asks for materials from the White House, he is told that the Rockefeller Commission has them; when he asks Rockefeller for the papers, he is told that he cannot have them because only the president can authorize access. One Church aide later calls Rockefeller “absolutely brilliant” in denying them access in a friendly manner. “He winked and smiled and said, ‘Gee, I want to help you but, of course I can’t—not until we’ve finished our work and the president approves it,’” the aide recalls. Senator John Tower (R-TX), the vice chairman of the committee, will later reflect, “We were very skillfully finessed.” But even Rockefeller, who has his own history of involvement with the CIA, is taken aback at the excesses of the CIA, particularly its history of assassinating foreign leaders. Rockefeller will eventually turn that information over to the Church Committee, giving that body some of the most explosive evidence as yet made public against the agency. [US Senate, 7/7/2007]

Entity Tags: John Tower, Church Committee, Nelson Rockefeller, Central Intelligence Agency, Frank Church, Gerald Rudolph Ford, Jr, ’Rockefeller Commission’

Timeline Tags: Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” [Dubose and Bernstein, 2006, pp. 34-35]

Entity Tags: Seymour Hersh, US Department of Defense, Ford administration, Edward Levi, Donald Rumsfeld, Church Committee, Richard (“Dick”) Cheney, Philip Buchan, New York Times, Gerald Rudolph Ford, Jr

Timeline Tags: Civil Liberties

The Senate Select Committee to Study Governmental Operations releases its report, “Alleged Assassination Plots Involving Foreign Leaders,” which finds “concrete evidence of at least eight plots involving the CIA to assassinate Fidel Castro from 1960 to 1965.” [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, US Congress

Timeline Tags: US-Cuba (1959-2005)

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]

Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News

Timeline Tags: Civil Liberties

President Ford issues Executive Order 11905, which limits the power of the CIA, the NSA, and military intelligence to engage in surveillance of US citizens. Perhaps its most well-known provision is a total ban on “political assassinations” by US government personnel. [Gerald R. Ford, 2/18/1976; Roberts, 2008, pp. 38] The provision is sparked by the Church Commission’s finding (see April, 1976) that assassination is “unacceptable in our society,” and a political embarassment, especially botched attempts such as the CIA’s efforts to kill Cuba’s Fidel Castro. [Grant J. Lilly, 4/6/2006]

Entity Tags: Church Commission, Gerald Rudolph Ford, Jr, National Security Agency, Central Intelligence Agency

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

President Ronald Reagan issues Executive Order 12333, which directs the US intelligence community to provide foreign intelligence data to the White House. The order reads in part, “[A]gencies are not authorized to use such techniques as electronic surveillance, unconsented physical searches, mail surveillance, physical surveillance, or monitoring devices unless they are in accordance with procedures established by the head of the agency concerned and approved by the Attorney General.” It establishes rules of conduct for the intelligence agencies, and mandates a certain level of Congressional oversight. [Executive Order 12333 -- United States intelligence activities, 4/5/2007] It also establishes the basis for what are later called “National Security Letters.” These NSLs, originally envisioned for use to compile information in hunts for foreign criminals and suspected terrorists, will later be used by the administration of George W. Bush to order US booksellers, librarians, employers, Internet providers, and others to turn over records and information they compile on US citizens, with strict adjuncts against allowing those targeted for surveillance to know about the NSLs and with virtually no government oversight (see October 25, 2005). [Washington Post, 11/6/2005] It does not, as some have later asserted, directly prohibit the assassination of targeted foreign subjects—i.e. terrorist suspects and even foreign leaders—though it does restrict the use of assassination by US government operatives to certain very restricted circumstances centered around critical aspects of national security. [Parks, 11/2/1989 pdf file]

Entity Tags: Ronald Reagan, George W. Bush, National Security Letters, Bush administration (43)

Timeline Tags: Civil Liberties

Antonin Scalia.Antonin Scalia. [Source: Oyez.org]Appeals court judge Antonin Scalia is sworn in as an Associate Justice of the US Supreme Court. [Legal Information Institute, 7/30/2007] Although Scalia is an ardent social conservative, with strongly negative views on such issues as abortion and homosexual rights, Scalia and Reagan administration officials both have consistently refused to answer questions about his positions on these issues, as President Reagan did at his June announcement of Scalia’s nomination. [Ronald Reagan Presidential Library, 6/17/1986] Scalia’s nomination is, in the words of Justice Department official Terry Eastland, “no better example of how a president should work in an institutional sense in choosing a nominee….” Eastland advocates the practice of a president seeking a judiciary nominee who has the proper “judicial philosophy.” A president can “influence the direction of the courts through his appointments” because “the judiciary has become more significant in our politics,” meaning Republican politics. [Dean, 2007, pp. 132] Scalia is the product of a careful search by Attorney General Edwin Meese and a team of Justice Department officials who wanted to find the nominee who would most closely mirror Reagan’s judicial and political philosophy (see 1985-1986).

Entity Tags: Ronald Reagan, Edwin Meese, Antonin Scalia, Terry Eastland, US Department of Justice

Timeline Tags: Civil Liberties

Khaled Abu el-Dahab.Khaled Abu el-Dahab. [Source: Egyptian government]In the mid-1980’s, Khaled Abu el-Dahab, an Egyptian medical student, joins the militant group Islamic Jihad, and also meets Ali Mohamed. Mohamed convinces el-Dahab to move to the US and become a sleeper cell agent. El-Dahab does so in 1987, moving to Santa Clara, California, where Mohamed has a residence. El-Dahab marries an American woman, becomes a US citizen, and gets a job at a computer company. In 1987, a female acquaintance of el-Dahab enters his apartment unannounced and finds several men there cleaning rifles. She decides it is something she does not want to know about, and breaks off contact with him. In 1990, Mohamed and el-Dahab travel together to Afghanistan. They are financially supported by a network of US sympathizers, including two Egyptian-American doctors. Beginning in 1990, El-Dahab’s apartment becomes an important communications hub for al-Qaeda and Islamic Jihad cells all over the world. For much of the 1990’s, the Egyptian government cut direct phone links to countries like Sudan, Yemen, Afghanistan or Pakistan in an effort to disrupt communications between radical militants. So Dahab acts as a telephone operator for the Islamic Jihad network, using a three-way calling feature to connect operatives in far-flung countries. He communicates with bin Laden’s base in Sudan (where bin Laden lives until 1996). He receives phone calls from the likes of Islamic Jihad leader Ayman al-Zawahiri, who also visits California twice (see Spring 1993; Late 1994 or 1995). He distributes forged documents and makes money transfers. He is trained to make booby-trapped letters, enrolls in a US flight school to learn how to fly gliders and helicopters, and recruits additional US sleeper agents (see Mid-1990s). He helps translate US army manuals and topographical maps into Arabic for al-Qaeda and Islamic Jihad training. El-Dahab will move to Egypt in 1998 and get arrested in October of that year. He will confess his role in all of this in an Egyptian trial in 1999. The Egyptian government will sentence him to 15 years in prison (see 1999). [New York Times, 10/23/2001; London Times, 11/11/2001; San Francisco Chronicle, 11/21/2001; Chicago Tribune, 12/11/2001]

Entity Tags: Al-Qaeda, Ali Mohamed, Osama bin Laden, Khaled Abu el-Dahab, Ayman al-Zawahiri, Islamic Jihad

Timeline Tags: Complete 911 Timeline

The CIA produces the last edition of its Redbook before 9/11. The Redbook is a manual written by the CIA for immigration officials; it helps the officials identify terrorists using telltale signs in their passports through commonalities among forged passports, travel cachets, and visas used by terrorists. The 1992 edition claims that more than “200 people carrying forged passports provided by terrorist groups have been identified before they could engage in terrorist acts.”
Types of Fraud - It focuses on five types of travel document fraud committed by terrorists: forgeries of some 35 national passports and the travel cachets of at least 45 countries; forged documents terrorists purchase from commercial vendors; stolen blank passports, which terrorists can fill in with biographical data of their choosing; information on genuine altered passports that have been photo-substituted or given an extended validity date; and genuine, unaltered passports, most likely procured with the knowledge of the issuing country or through a corrupt government official.
Reason for Discontinuance - The 9/11 Commission will say that the Redbook stops being published in 1992 due to “a lack of new exemplars,” but then add that there was plenty of “raw data” and a “rich trove of information on the travel tactics of terrorists” after this time. Citing an interview with an unnamed source, the commission will say that the CIA claimed it had no new data to analyze, as the FBI did not share what it gathered from its law enforcement investigations. However, the CIA did certainly obtain some new exemplars between 1992 and 9/11. For instance, it found some visa stamps, blank Egyptian birth certificates, and a forged passport in a June 1998 raid on extremists in Albania.
Significance of Non-Publication - The commission will also note that the information contained in the Redbook is directly relevant to al-Qaeda’s travel tactics before 9/11: “From the 1993 bombing of the World Trade Center to the disruption of the millennium plot in December 1999, information suggested that al-Qaeda continued to employ all five methods of document fraud first noted in the Redbook years earlier, along with some new methods of their own.” The commission will also highlight how important the failure to take advantage of the information contained in the Redbook will be: “In practical terms, this meant the United States denied itself the ability to disrupt terrorist operations and prevent undetected terrorist entries by disrupting operatives’ ability to travel.” Several of the 9/11 hijackers will have anomalies in their passports (see November 2, 2007). [9/11 Commission, 8/21/2004, pp. 45-46, 61, 69, 102 pdf file] Islamist radicals linked to the WTC bombings and fighting in Bosnia will obtain a copy of the Redbook at some point in the next three years (see 1995 or Before).

Entity Tags: 9/11 Commission, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

Nawaf Alhazmi (left), and Khalid Almihdhar (right).Nawaf Alhazmi (left), and Khalid Almihdhar (right). [Source: FBI]Of all the 9/11 hijackers, Nawaf Alhazmi and Khalid Almihdhar have the longest records of involvement with al-Qaeda. CIA Director Tenet calls them al-Qaeda veterans. According to the CIA, Alhazmi first travels to Afghanistan in 1993 as a teenager, then fights in Bosnia with Alhazmi (see 1995). Almihdhar makes his first visit to Afghanistan training camps in 1996, and then fights in Chechnya in 1997. Both swear loyalty to bin Laden around 1998. Alhazmi fights in Afghanistan against the Northern Alliance with his brother, Salem Alhazmi. He fights in Chechnya, probably in 1998. [Observer, 9/23/2001; ABC News, 1/9/2002; US Congress, 6/18/2002; Los Angeles Times, 9/1/2002; US Congress, 7/24/2003, pp. 131 pdf file] He then returns to Saudi Arabia in early 1999 where he shares information about the 1998 US embassy bombings. However it is not clear what information he disclosed to whom or where he obtained this information. [US Congress, 7/24/2003, pp. 131 pdf file] It is possible that some or all of this information came from the NSA, which is intercepting some of Alhazmi’s phone calls at this time (see Early 1999).

Entity Tags: Al-Qaeda, Osama bin Laden, George J. Tenet, Nawaf Alhazmi, Khalid Almihdhar, Northern Alliance, Salem Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The 9/11 Commission, relying on a CIA report, will later say that three of the men involved in the 1993 World Trade Center bombing travel on Saudi passports containing an indicator of possible Islamist extremism. [9/11 Commission, 8/21/2004, pp. 46-47, 61 pdf file] Author James Bamford will say that it is a “secret coded indicator, placed there by the Saudi government, warning of a possible terrorist affiliation.” [Bamford, 2008, pp. 58-59] It is unclear what the indicator looks like precisely and who the men are. However, Ahmad Ajaj, an associate of lead bomber Ramzi Yousef, does have a Saudi passport. Some of the 9/11 hijackers will later use Saudi passports with the same indicator (see October 28, 2000, June 1, 2001, and June 13, 2001, and November 2, 2007). [9/11 Commission, 8/21/2004, pp. 46-47, 61 pdf file]

Entity Tags: Ahmad Ajaj

Timeline Tags: Complete 911 Timeline

Al-Qaeda deputy head Ayman al-Zawahiri spends time in Yemen and holds meetings there. Yemen is favorably inclined towards militants, due to the help they provided to the winning side in the 1994 civil war (see May 21-July 7, 1994 and After July 1994). Al-Zawahiri holds Islamic Jihad meetings at the Youth House, a government-run hall in the capital of Sana’a, according to confessions presented at a 1999 Cairo trial (see 1999). A defector will later reveal where al-Zawahiri is staying in Yemen to the local authorities, but the authorities, who sympathize with radical Islam, tip off al-Zawahiri and he escapes to Afghanistan (see Spring-Summer 1998). [Wall Street Journal, 12/20/2002] Al-Zawahiri is also reported to be in Yemen in the summer of 2001 (see Late July-August 2001).

Entity Tags: Islamic Jihad, Ayman al-Zawahiri

Timeline Tags: Complete 911 Timeline

The Communications Assistance for Law Enforcement Act (CALEA) takes effect. CALEA obliges telecommunications providers such as AT&T to give law enforcement agencies and US intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks. In more recent years, the law will be expanded to give law enforcement and intelligence agencies similar abilities to monitor Internet usage by US citizens. [Federal Communications Commission, 2/21/2007]

Entity Tags: Communications Assistance for Law Enforcement Act (CALEA), AT&T

Timeline Tags: Civil Liberties

One of Ramzi Yousef’s timers seized by Philippines police in January 1995.One of Ramzi Yousef’s timers seized by Philippines police in January 1995. [Source: Peter Lance]Responding to an apartment fire, Philippine investigators uncover an al-Qaeda plot to assassinate the Pope that is scheduled to take place when he visits the Philippines one week later. While investigating that scheme, they also uncover Operation Bojinka, planned by the same people: 1993 WTC bomber Ramzi Yousef and 9/11 mastermind Khalid Shaikh Mohammed (KSM). [Independent, 6/6/2002; Los Angeles Times, 6/24/2002; Los Angeles Times, 9/1/2002] Many initial reports after 9/11 will claim the fire was accidental and the police discovery of it was a lucky break, but in 2002 the Los Angeles Times will report that the police started the fire on purpose as an excuse to look around the apartment. In the course of investigating the fire, one of the main plotters, Abdul Hakim Murad, is arrested. [Los Angeles Times, 9/1/2002] The plot has two main components. On January 12, Pope John Paul II is scheduled to visit Manila and stay for five days. A series of bombs along his parade route would be detonated by remote control, killing thousands, including the Pope. Yousef’s apartment is only 500 feet from the residence where the Pope will be staying. [Reeve, 1999, pp. 78; Lance, 2006, pp. 138] Then, starting January 21, a series of bombs would be placed on airplanes. [Insight, 5/27/2002] Five men, Yousef, Wali Khan Amin Shah, Abdul Hakim Murad, Abd al-Karim Yousef (a.k.a., Adel Anon, Yousef’s twin brother), and Khalid Al-Shaikh (thought to be an alias for KSM) would depart to different Asian cities and place a timed bomb on board during the first leg of passenger planes traveling to Los Angeles, San Francisco, Honolulu, and New York. They would then transfer to another flight and place a second bomb on board that flight. In all, 11 to 12 planes would blow up in a two day period over the Pacific. If successful, some 4,000 people would have been killed. [Agence France-Presse, 12/8/2001; Insight, 5/27/2002; Contemporary Southeast Asia, 12/1/2002] According to another account, some of the bombs would be timed to go off weeks or even months later. Presumably worldwide air travel could be interrupted for months. [Lance, 2003, pp. 260-61] A second wave of attacks involving crashing airplanes into buildings in the US would go forward later, once the pilots are trained for it (see February-Early May 1995).

Entity Tags: Abd al-Karim Yousef, Khalid Shaikh Mohammed, Ramzi Yousef, Wali Khan Amin Shah, Operation Bojinka, Al-Qaeda, Abdul Hakim Murad

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The CIA proposes a policy of abducting Islamic Jihad militants and sending them to Egypt which will soon be approved by President Bill Clinton (see June 21, 1995). The Clinton administration began a policy of allowing abductions, known as “renditions,” in 1993 (see 1993). At first, renditions were rarely used because few countries wanted the suspects. Michael Scheuer, head of the CIA’s bin Laden unit, is one of the architects of a 1995 agreement with Egypt to send rendered militants there. He will later recall: “It was begun in desperation.… We were turning into voyeurs. We knew where these people were, but we couldn’t capture them because we had nowhere to take them,” due to legal and diplomatic complications. The CIA realized that “we had to come up with a third party.” Egypt was the obvious choice because the Islamic Jihad is the prime political enemy of the Egyptian government, and many Islamic Jihad militants also work for al-Qaeda, an enemy of the US.
Turning a Blind Eye - However, the Egyptian secret police force, the Mukhabarat, is notorious for its torture of prisoners. As part of the program, the US helps track, capture, and transport suspects to Egypt (see Before Summer 1995) and then turns a blind eye while the Egyptians torture them. Scheuer claims the US could give the Egyptian interrogators questions they wanted put to the detainees in the morning and get answers by the evening. Because torture is illegal in the US, US officials are never present when the torture is done. Further, the CIA only abducts suspects who have already been convicted in absentia. Talaat Fouad Qassem is the first known person the CIA renders to Egypt (see September 13, 1995). But the number of renditions greatly increases in 1998, when the CIA gets a list of Islamic Jihad operatives around the world (see Late August 1998). These renditions result in a big trial in Egypt in 1999 that effectively destroys Islamic Jihad as a major force in that country (see 1999). [New Yorker, 2/8/2005]
CIA, NSC, Justice Department Lawyers Consulted - Scheuer will say that lawyers inside and outside the CIA are intensively consulted about the program: “There is a large legal department within the Central Intelligence Agency, and there is a section of the Department of Justice that is involved in legal interpretations for intelligence work, and there is a team of lawyers at the National Security Council, and on all of these things those lawyers are involved in one way or another and have signed off on the procedure. The idea that somehow this is a rogue operation that someone has dreamed up is just absurd.” [Grey, 2007, pp. 140-141]
Leadership of Program - The rendition program does not focus solely on al-Qaeda-linked extremists, and other suspected terrorists are also abducted. Scheuer will later tell Congress, “I authored it and then ran and managed it against al-Qaeda leaders and other Sunni Islamists from August 1995, until June 1999.” [US Congress, 4/17/2007 pdf file] A dedicated Renditions Branch will be established at CIA headquarters in 1997 (see 1997), but the relationship between Scheuer and its manager is not known—it is unclear whether this manager is a subordinate, superior, or equal of Scheuer, or whether Scheuer takes on this responsibility as well. After Scheuer is fired as unit chief in May 1999 (see June 1999), his role in the rendition program will presumably be passed on to his successor, Richard Blee, who will go on to be involved in rendition after 9/11 (see Shortly After December 19, 2001). In a piece apparently about Blee, journalist Ken Silverstein will say that he “oversaw… the [Counterterrorist Center] branch that directed renditions.” [Harper's, 1/28/2007]

Entity Tags: Mukhabarat (Egypt), Richard Blee, Islamic Jihad, Alec Station, Central Intelligence Agency, Egypt, Michael Scheuer

Timeline Tags: Torture of US Captives, Complete 911 Timeline

Jack Cloonan.Jack Cloonan. [Source: PBS]The Justice Department directs an existing unit called Squad I-49 to begin building a legal case against bin Laden. This unit is unusual because it combines prosecutors from the Southern District of New York, who have been working on bin Laden related cases, with the FBI’s New York office, which was the FBI branch office that dealt the most with bin Laden -related intelligence. Patrick Fitzgerald effectively directs I-49 as the lead prosecutor. FBI agent Dan Coleman becomes a key member while simultaneously representing the FBI at Alec Station, the CIA’s new bin Laden unit (February 1996) where he has access to the CIA’s vast informational database. [Lance, 2006, pp. 218-219] The other initial members of I-49 are: Louis Napoli, John Anticev, Mike Anticev, Richard Karniewicz, Jack Cloonan, Carl Summerlin, Kevin Cruise, Mary Deborah Doran, and supervisor Tom Lang. All are FBI agents except for Napoli and Summerlin, a New York police detective and a New York state trooper, respectively. The unit will end up working closely with FBI agent John O’Neill, who heads the New York FBI office. Unlike the CIA’s Alec Station, which is focused solely on bin Laden, I-49 has to work on other Middle East -related issues. For much of the next year or so, most members will work on the July 1996 crash of TWA Flight 800, because it crashed near New York and is suspected to have been carried out by Middle Eastern militants (July 17, 1996-September 1996). However, in years to come, I-49 will grow considerably and focus more on bin Laden. [Wright, 2006, pp. 240-241] After 9/11, the “wall” between intelligence collection and criminal prosecution will often be cited for the failure to stop the 9/11 attacks. But as author Peter Lance will later note, “Little more than ten months after the issuance of Jamie Gorelick’s ‘wall memo,’ Fitzgerald and company were apparently disregarding her mandate that criminal investigation should be segregated from intelligence threat prevention. Squad I-49… was actively working both jobs.” Thanks to Coleman’s involvement in both I-49 and the CIA’s Alec Station, I-49 effectively avoids the so-called “wall” problem. [Lance, 2006, pp. 220]

Entity Tags: Mike Anticev, Tom Lang, US Department of Justice, Patrick J. Fitzgerald, Kevin Cruise, Dan Coleman, Carl Summerlin, Alec Station, Louis Napoli, Mary Deborah Doran, John Anticev, Jack Cloonan, I-49, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline

Law professor John Yoo writes a lengthy essay for the California Law Review entitled “The Continuation of Politics by Other Means: The Original Understanding of War Powers,” in which he argues that the Founding Fathers intended to empower presidents to launch wars without Congressional permission. Yoo has clerked for conservative judge Laurence Silberman and equally conservative Supreme Court Justice Clarence Thomas, and served for a year as counsel to then-Senate Judiciary Committee Chairman Orrin Hatch (R-UT). He has become a regular speaker at Federalist Society events, the informal but influential group of conservative lawyers, judges, and legal scholars who will come to have so much influence in the Bush administration. You argues that for generations, Constitutional scholars have misread the Constitution: the Founders actually supported, not repudiated, the British model of executive power that gave the king the sole power of declaring war and committing forces to battle. The Constitution’s granting of the legislature—Congress—the power to “declare war” is merely, Yoo writes, a reference to the ceremonial role of deciding whether to proclaim the existence of a conflict as a diplomatic detail. The Founders always intended the executive branch to actually declare and commence war, he writes. Most other Constitutional scholars will dismiss Yoo’s arguments, citing notes from the Constitutional Convention that show the Founders clearly intended Congress, not the president, to decide whether to commit the country to war. One of those Founders, James Madison, wrote in 1795 that giving a president the unilateral ability to declare war “would have struck, not only at the fabric of the Constitution, but at the foundation of all well organized and well checked governments. The separation of the power of declaring war from that of conducting it, is wisely contrived to exclude the danger of its being declared for the sake of its being conducted.” [Savage, 2007, pp. 80-81] Yoo will go on to join the Bush administration’s Office of Legal Counsel, and write numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002).

Entity Tags: Federalist Society, John C. Yoo

Timeline Tags: Civil Liberties

According to counterterrorism expert Rohan Gunaratna, US intelligence monitoring al-Qaeda communications learn that al-Qaeda is canceling an attack on Western targets in Singapore. On April 18, 1996, 108 Lebanese civilians seeking refuge at a UN camp in Qana, Lebanon, are killed by mortars fired by Israeli forces. Bin Laden “was keen not to dissipate what he envisaged as widespread revulsion against Israel’s action and hence called off the strike in Southeast Asia. Al-Qaeda’s team in question was very determined to go ahead, having spent years preparing the attack, and according to the intercepts it proved difficult for Osama to convince it otherwise.” Gunaratna claims the US learned this through the NSA’s Echelon satellite network (see Before September 11, 2001) “and other technical monitoring of their communications traffic.” [Gunaratna, 2003, pp. 133-134] If true, this case supports other evidence that the US was successfully monitoring bin Laden’s communications from an early date (see Early 1990s) and that al-Qaeda’s Southeast Asia operations were penetrated years before an important al-Qaeda summit in Malaysia discussing the 9/11 plot (see January 5-8, 2000).

Entity Tags: Echelon, Al-Qaeda, Osama bin Laden, National Security Agency

Timeline Tags: Complete 911 Timeline

An Inmarsat Compact M satellite phone, the type used by bin Laden.An Inmarsat Compact M satellite phone, the type used by bin Laden. [Source: Inmarsat]During this period, Osama bin Laden uses a satellite phone to direct al-Qaeda’s operations. The phone—a Compact M satellite phone, about the size of a laptop computer—was purchased by a student in Virginia named Ziyad Khaleel for $7,500 using the credit card of a British man named Saad al-Fagih. After purchasing the phone, Khaleel sent it to Khalid al-Fawwaz, al-Qaeda’s unofficial press secretary in London (see Early 1994-September 23, 1998). Al-Fawwaz then shipped it to bin Laden in Afghanistan. [CNN, 4/16/2001] It appears US intelligence actually tracks the purchase as it occurs (see November 1996-Late December 1999), probably because an older model satellite phone bin Laden has is already being monitored (see Early 1990s). Bin Laden’s phone (873682505331) is believed to be used by other top al-Qaeda leaders as well, including Ayman al-Zawahiri and Mohammad Atef. Al-Fawwaz also buys satellite phones for other top al-Qaeda leaders around the same time. Though the calls made on these phones are encrypted, the NSA is able to intercept and decrypt them. As one US official will put it in early 2001, “codes were broken.” [United Press International, 2/13/2001; Newsweek, 2/18/2002] The Los Angeles Times will report that the monitoring of these phones “produced tens of thousands of pages of transcripts over two years.” [Los Angeles Times, 10/14/2001] Bin Laden’s satellite phone replaces an older model he used in Sudan that apparently was also monitored by the NSA (see Early 1990s). Billing records for his new phone are eventually released to the media in early 2002. Newsweek will note, “A country-by-country analysis of the bills provided US authorities with a virtual road map to important al-Qaeda cells around the world.” [Sunday Times (London), 3/24/2002] The countries called are:
bullet Britain (238 or 260). Twenty-seven different phone numbers are called in Britain. Accounts differ on the exact number of calls. Khalid al-Fawwaz, who helps publish statements by bin Laden, receives 143 of the calls, including the very first one bin Laden makes with this phone. Apparently most of the remaining calls are made to pay phones near him or to his associates. He also frequently calls Ibrahim Eidarous, who works with al-Fawwaz and lives near him. [CNN, 4/16/2001; Newsweek, 2/18/2002; Sunday Times (London), 3/24/2002; O'Neill and McGrory, 2006, pp. 111]
bullet Yemen (221). Dozens of calls go to an al-Qaeda communications hub in Sana’a, Yemen, which is run by the father-in-law of 9/11 hijacker Khalid Almihdhar (see Late August 1998). [Newsweek, 2/18/2002; Los Angeles Times, 9/1/2002; Bamford, 2008, pp. 8]
bullet Sudan (131). Bin Laden lived in Sudan until 1996 (see May 18, 1996), and some important al-Qaeda operatives remained there after he left (see February 5, 1998). [Sunday Times (London), 3/24/2002]
bullet Iran (106). Newsweek will later report: “US officials had little explanation for the calls to Iran. A Bush administration official said that US intelligence has believed for years that hard-line anti-American factions inside Iran helped bin Laden’s organization operate an ‘underground railroad’ smuggling Islamic militants to al-Qaeda training camps in Afghanistan.” [Newsweek, 2/18/2002; Sunday Times (London), 3/24/2002]
bullet Azerbaijan (67). An important al-Qaeda operative appears to be based in Baku, Azerbaijan. [Washington Post, 5/2/2001] This is most likely Ahmad Salama Mabruk, who is very close to al-Qaeda number two Ayman al-Zawahiri and is said to be the head of the al-Qaeda cell there. He kidnapped by the CIA in Baku in late August 1998 (see Late August 1998).
bullet Kenya (at least 56). In the embassy bombings trial, prosecutors introduce evidence showing 16 calls are made on this phone to some of the embassy bombers in Kenya (see 10:35-10:39 a.m., August 7, 1998), apparently all before a raid in August 1997 (see August 21, 1997). The defense introduces evidence showing at least 40 more calls are made after that time (see Late 1996-August 1998). [CNN, 4/16/2001]
bullet Pakistan (59).
bullet Saudi Arabia (57).
bullet A ship in the Indian Ocean (13).
bullet The US (6).
bullet Italy (6).
bullet Malaysia (4).
bullet Senegal (2). [Sunday Times (London), 3/24/2002]
bullet Egypt (unknown). Newsweek reports that calls are made to Egypt but doesn’t say how many. [Newsweek, 2/18/2002]
bullet Iraq (0). Press reports note that the records indicate zero calls were made to Iraq. [Newsweek, 2/18/2002; Sunday Times (London), 3/24/2002] 1,100 total calls are made on this phone. Adding up the above numbers means that the destination of over 100 calls is still unaccounted for. [Newsweek, 2/18/2002] The use of this phone stops two months after the August 1998 embassy bombings in Africa. However, it appears bin Laden and other al-Qaeda leaders continue to use other satellite phones occasionally after this time. Shortly after 9/11, James Bamford, an expert authority on the agency, says “About a year or so ago the NSA lost all track of him.… He may still use [satellite phones] occasionally to talk about something mundane, but he discovered that the transmitters can be used for honing.” [CNN, 9/21/2001] According to a different account, bin Laden will attempt to use a different phone communication method, but US intelligence will soon discover it and continue monitoring his calls (see Late 1998 and After).

Entity Tags: Ziyad Khaleel, Saad al-Fagih, Osama bin Laden, Ibrahim Eidarous, Khalid al-Fawwaz, Mohammed Atef, Al-Qaeda, Ayman al-Zawahiri, Ahmad Salama Mabruk

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Starting in 1997, the FBI constructs a sophisticated surveillance system that can perform near-instantaneous wiretaps on almost any telephone, cell phone, and Internet communications device, according to documents declassified in August 2007. The system is called the Digital Collection System Network, or DCSNet. It connects FBI wiretapping rooms to switches controlled by land-line operators, Internet-telephony companies, and cellular providers. The documents show that DCSNet is, in reporter Ryan Singel’s words, “far more intricately woven into the nation’s telecom infrastructure than observers suspected.” Steven Bellovin, a computer science professor and surveillance expert, calls DCSNet a “comprehensive wiretap system that intercepts wire-line phones, cellular phones, SMS [short message service, a protocol allowing mobile devices to exchange text messages], and push-to-talk systems.” The system is an entire suite of software that together collects, sifts, and stores phone numbers, phone calls, and text messages. The system directly connects FBI wiretapping offices around the country to a sprawling private communications network. DCSNet is composed of three main clients:
bullet The DCS-3000, also called “Red Hook,” handles pen-registers and trap-and-traces, a type of surveillance that collects signaling information but not communications content.
bullet The DCS-6000, or “Digital Storm,” captures and collects the content—the spoken or written communications—of phone calls and text messages.
bullet The most classified system of the three, the DCS-5000, is used for wiretaps targeting spies or terrorists.
Between the three, the system can allow FBI agents to monitor recorded phone calls and messages in real time, create master wiretap files, send digital recordings to translators, track the location of targets in real time using cell-tower information, and stream intercepts to mobile surveillance vans. The entire system is operated through a private, secure and self-contained backbone that is run for the government by Sprint. Singel gives the following example: “The network allows an FBI agent in New York, for example, to remotely set up a wiretap on a cell phone based in Sacramento, California, and immediately learn the phone’s location, then begin receiving conversations, text messages and voicemail pass codes in New York. With a few keystrokes, the agent can route the recordings to language specialists for translation.” Dialed numbers are subjected to data mining, including so-called “link analysis.” The precise number of US phones being monitored and recorded in this way is classified.
Genesis of DCSNet - The system was made possible by the 1994 Communications Assistance for Law Enforcement Act (CALEA) (see January 1, 1995), which mandated that telecom providers must build “backdoors” in US telephone switches to be used by government wiretappers. CALEA also ordered telecom firms to install only switching equipment that met detailed wiretapping standards. Before CALEA, the FBI would bring a wiretap warrant to a particular telecom, and that firm would itself create a tap. Now, the FBI logs in directly to the telecom networks and monitors a surveillance target itself through DCSNet. FBI special agent Anthony DiClemente, chief of the Data Acquisition and Intercept Section of the FBI’s Operational Technology Division, says the DCS was originally intended in 1997 to be a temporary solution, but has grown into a full-featured CALEA-collection software suite. “CALEA revolutionizes how law enforcement gets intercept information,” he says. “Before CALEA, it was a rudimentary system that mimicked Ma Bell.” Now, under CALEA, phone systems and Internet service providers have been forced to allow DCSNet to access almost all of its data (see 1997-August 2007 and After).
Security Breaches - The system is vulnerable to hacking and security breaches (see 2003). [Wired News, 8/29/2007]

Entity Tags: Steven Bellovin, Ryan Singel, Federal Bureau of Investigation, Anthony DiClemente, Operational Technology Division (FBI), Communications Assistance for Law Enforcement Act (CALEA), Digital Collection System, Data Acquisition and Intercept Section (FBI), Sprint/Nextel

Timeline Tags: Civil Liberties

Mary Jo White.Mary Jo White. [Source: CNN]Mary Jo White, US Attorney for the Southern District of New York, which handles a lot of terrorism investigations, complains about the “wall” procedures regulating the passage of intelligence information to US attorneys and criminal agents at the FBI. The rules were recently formalized (see July 19, 1995), but she says that the 1995 procedures are building “unnecessary and counterproductive walls that inhibit rather than promote our ultimate objectives [and that] we must face the reality that the way we are proceeding now is inherently and in actuality very dangerous.” Following her complaints, an exception is created for the Southern District of New York Attorneys’ Office. The office works with the FBI’s I-49 squad, which handles international terrorism matters (see January 1996 and Late 1998-Early 2002). The FBI can now notify this office of evidence of a crime directly, without consulting the Justice Department. Once this is done, the office would then contact two units in the Justice Department, the Criminal Division and the Office of Intelligence Policy and Review. [US Department of Justice, 11/2004, pp. 29 pdf file]

Entity Tags: I-49, Federal Bureau of Investigation, Mary Jo White, Foreign Intelligence Surveillance Act, US Department of Justice, Southern District of New York Attorneys’ Office

Timeline Tags: Complete 911 Timeline

After a renditions branch is established at the CIA in 1997, responsibility at the agency for dealing with Khalid Shaikh Mohammed (KSM) is transferred there. This is because he is wanted in connection with the Bojinka plot (see January 8, 1998). The 9/11 Commission will say that this both improves the CIA’s coverage of KSM—because it gives them a “man-to-man” focus—and also degrades it—as less analysis is performed related to rendition targets. [9/11 Commission, 7/24/2004, pp. 276-7] The CIA’s inspector general will say that at this time the agency’s Counterterrorist Center considers KSM a “high-priority target for apprehension and rendition,” but will fail to recognize the importance of reporting from “credible sources” before 9/11 that shows he is a top al-Qaeda leader and is sending other terrorists to the US to work for Osama bin Laden (see June 12, 2001 and August 28, 2001). The inspector general will recommend that an accountability board review the performance of at least four officers for these failures. [Central Intelligence Agency, 6/2005, pp. xii-xiii pdf file]

Entity Tags: Central Intelligence Agency, Khalid Shaikh Mohammed

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

FBI reward notice for Khalid Shaikh Mohammed.FBI reward notice for Khalid Shaikh Mohammed. [Source: FBI]Islamic militant Ramzi Yousef is sentenced to 240 years for his role in the 1993 WTC bombing. At the same time, prosecutors unseal an indictment against Khalid Shaikh Mohammed (KSM) for participating with Yousef in the 1995 Operation Bojinka plot (see January 6, 1995). In unsealing this, US Attorney Mary Jo White calls KSM a “major player” and says he is believed to be a relative of Yousef. [Washington Post, 1/9/1998] The US announces a $2 million reward for his capture in 1998 and wanted posters with his picture are distributed. [New York Times, 6/5/2002] This contradicts the FBI’s claim after 9/11 that they did not realize he was a major terrorist before 9/11. [US Congress, 12/11/2002] For instance, a senior FBI official later says, “He was under everybody’s radar. We don’t know how he did it. We wish we knew.… He’s the guy nobody ever heard of.” [Los Angeles Times, 12/22/2002] However, another official says, “We have been after him for years, and to say that we weren’t is just wrong. We had identified him as a major al-Qaeda operative before September 11.” [New York Times, 9/22/2002] Yet strangely, despite knowing KSM is a major al-Qaeda operations planner and putting out a large reward for his capture at this time, there is no worldwide public manhunt for him as there successfully was for his nephew Ramzi Yousef. KSM’s name remains obscure and he isn’t even put on the FBI’s Most Wanted Terrorists list until one month after 9/11. [Lance, 2003, pp. 327-30]

Entity Tags: Ramzi Yousef, Khalid Shaikh Mohammed, Mary Jo White, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

While at the radical Finsbury Park mosque in London, future shoe bomber Richard Reid, at this time an angry young Muslim, meets an Algerian named Djamel Beghal, known as a top militant Islamist. Beghal’s task at Finsbury Park, run by British intelligence informer Abu Hamza al-Masri (see Early 1997), is that of a “talent spotter”—he tells impressionable young men about jihad in places like Algeria and gets them to talk about their frustrations. If Beghal thinks a person has the potential to do more than just talk, he can arrange for the person to travel to a training camp in Afghanistan. Reid travels to Afghanistan after being selected by Beghal, although he will later fail to carry out his suicide mission (see December 22, 2001). [O'Neill and McGrory, 2006, pp. 225]

Entity Tags: Richard C. Reid, Finsbury Park Mosque, Djamel Beghal

Timeline Tags: Complete 911 Timeline

In June 2001, a CIA cable describing background information on bin Laden’s associates will mention that 9/11 mastermind Khalid Shaikh Mohammed (KSM) is regularly traveling to the US. The CIA’s Renditions Branch had been looking for KSM since at least 1997. In July 2001, the source of this information will positively identify KSM’s photo from a line up and clarify that the last known time KSM went to the US was in the summer of 1998 (see June 12, 2001). Presumably, KSM may have been more reluctant to travel to the US after the crackdown on al-Qaeda in the wake of the August 1998 embassy bombings (see 10:35-10:39 a.m., August 7, 1998). [9/11 Commission, 7/24/2004, pp. 277, 533] In May 1995, the FBI learned that KSM had been in the US, had a current and valid US visa, and was planning to come back to the US, possibly to take flying lessons (see April-May 1995). Additionally, KSM will receive a new US visa on July 23, 2001, though it isn’t known if he ever uses it (see July 23, 2001).

Entity Tags: Central Intelligence Agency, Khalid Shaikh Mohammed

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mohamed al-Owhali.Mohamed al-Owhali. [Source: CNN]Before and after the August 7, 1998 attack on the US embassy in Nairobi, Kenya (see 10:35-10:39 a.m., August 7, 1998), a bomber involved in that attack named Mohamed al-Owhali makes a series of calls to al-Qaeda associate Ahmed al-Hada, who runs an al-Qaeda communications hub in Sana’a, Yemen. Al-Owhali briefly stayed at the hub about three months before the bombings and made some calls from there. He then traveled to other locations, including Pakistan, and flew to Kenya on August 2. Beginning August 4, he makes a series of calls to al-Hada at the Yemen hub. The details of these calls have not been revealed, but they continue until about two hours before the embassy bombings take place. Al-Owhali is supposed to be martyred in the attack, but he runs away at the last minute and survives. Beginning on August 8, he repeatedly calls al-Hada, asking for help getting out of Kenya. He eventually receives $1,000 from him. Al-Hada is actually about to fly to Kenya to help al-Owhali get out when al-Owhali is arrested on August 12. Al-Hada also receives three calls from bin Laden’s satellite phone, which is being monitored by the NSA (see November 1996-Late August 1998). Following a raid by London police, the FBI allegedly trace a fax claiming responsibility for the attack through Baku, Azerbaijan, to bin Laden’s satellite phone, which leads them to the communications hub in Sana’a (however, it is likely that the NSA at least is already monitoring the hub phone number). Phone records for the hub direct them to al-Owhali in Nairobi. Al-Owhali has already been arrested based on a tip-off and, after the FBI interrogators realize he is lying to them, he confesses to calling the number. [United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001; United State of America v. Usama bin Laden, et al., Day 23, 3/27/2001; Observer, 8/5/2001] The translator during al-Owhali’s interviews is Mike Feghali, who will later be accused of serious improprieties after 9/11 by whistleblower Sibel Edmonds (see July-August 2001). [Federal Bureau of Investigation, 9/9/1998, pp. 1 pdf file] Author Lawrence Wright will say, “This Yemeni telephone number would prove to be one of the most important pieces of information the FBI would ever discover, allowing investigators to map the links of the al-Qaeda network all across the globe.” [Wright, 2006, pp. 275-8] The NSA may well already have been aware of the number since bin Laden’s monitored phone called it many times, but the US intelligence community now begins a joint effort to exploit it (see Late August 1998 and Late 1998-Early 2002). Other apparently inaccurate stories about how al-Owhali was captured have been reported in the press. [Reeve, 1999, pp. 48]

Entity Tags: Mohamed al-Owhali, Mike Feghali, Ahmed al-Hada, National Security Agency, Federal Bureau of Investigation, Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijacker Khalid Almihdhar makes a series of calls to an al-Qaeda communications hub run by his father-in-law, Ahmed al-Hada. A Yemeni police official will later tell Agence France-Presse that Almihdhar “made a number of overseas calls to Ahmed al-Hada, who was then in Sana’a, before, during, and after” the African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). Al-Hada is involved in the embassy bombings and the US intelligence community begins joint surveillance of his phone after the bombings (see Late August 1998), although the NSA may already have been monitoring it (see Before August 7, 1998). The calls made by Almihdhar are from overseas and the FBI learns of this, presumably during the investigation into the embassy bombings (see August 4-25, 1998) [Agence France Presse, 2/15/2002] Around this time Almihdhar is also in contact with al-Hada’s son, Samir, who is his brother-in-law, and the Yemen Times will later report that these contacts are monitored. However, it is not clear whether this is just by local authorities in Yemen, or also by US intelligence. [Yemen Times, 2/18/2002] British Prime Minister Tony Blair will later say that one of the 9/11 hijackers, presumably Almihdhar, played a key role in the attacks on the US embassies in East Africa (see October 4, 2001).

Entity Tags: Federal Bureau of Investigation, Ahmed al-Hada, Khalid Almihdhar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Calls are made using Osama bin Laden’s satellite telephone to an al-Qaeda communications hub in Sana’a, Yemen, which is involved in the embassy bombings (see 10:35-10:39 a.m., August 7, 1998). According to MSNBC, two of the calls from bin Laden’s phone are made “days before” the bombings. The NSA is intercepting calls from bin Laden’s satellite phone at this time (see November 1996-Late August 1998) and his phone is used to make dozens of calls to the Yemen communications hub from 1996 to 1998, but it is unclear what is done with the intercepts, as the NSA is sometimes unwilling to share information with other US intelligence agencies (see Between 1996 and August 1998, December 1996, Between 1996 and September 11, 2001, and Before September 11, 2001). [Los Angeles Times, 10/10/2001; MSNBC, 2/14/2002; Newsweek, 2/18/2002; Los Angeles Times, 9/1/2002] The communications hub is run by veteran mujaheddin Ahmed al-Hada, an associate of one of the embassy bombers, Mohamed al-Owhali. Al-Owhali stays at the hub in the months before the bombing and obtains a fake passport in Yemen (see August 4-25, 1998). [Federal Bureau of Investigation, 9/9/1998 pdf file] The NSA continues to intercept calls to and from the hub after the embassy bombings (see Late August 1998 and August 4-25, 1998).

Entity Tags: National Security Agency, Ahmed al-Hada

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right).Bombings of the Nairobi, Kenya, US embassy (left), and the Dar es Salaam, Tanzania, US embassy (right). [Source: Associated Press]Two US embassies in Africa are bombed within minutes of each other. At 10:35 a.m., local time, a suicide car bomb attack in Nairobi, Kenya, kills 213 people, including 12 US nationals, and injures more than 4,500. Mohamed al-Owhali and someone known only as Azzam are the suicide bombers, but al-Owhali runs away at the last minute and survives. Four minutes later, a suicide car bomb attack in Dar es Salaam, Tanzania, kills 11 and injures 85. Hamden Khalif Allah Awad is the suicide bomber there. The attacks will be blamed on al-Qaeda. [PBS Frontline, 2001; United States of America v. Usama Bin Laden, et al., Day 38, 5/2/2001] The Tanzania death toll is low because, remarkably, the attack takes place on a national holiday so the US embassy there is closed. [Miller, Stone, and Mitchell, 2002, pp. 195] The attack shows al-Qaeda has a capability for simultaneous attacks. The Tanzania bombing appears to have been a late addition, as one of the arrested bombers will allegedly tell US agents that it was added to the plot only about 10 days in advance. [United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001] A third attack against the US embassy in Uganda does not take place due to a last-minute delay (see August 7, 1998). [Associated Press, 9/25/1998] August 7, 1998, is the eighth anniversary of the arrival of US troops in Saudi Arabia and some people will speculate that this is the reason for the date of the bombings. [Gunaratna, 2003, pp. 46] In the 2002 book The Cell, reporters John Miller, Michael Stone, and Chris Mitchell will write: “What has become clear with time is that facets of the East Africa plot had been known beforehand to the FBI, the CIA, the State Department, and to Israeli and Kenyan intelligence services.… [N]o one can seriously argue that the horrors of August 7, 1998, couldn’t have been prevented.” They will also comment, “Inexplicable as the intelligence failure was, more baffling still was that al-Qaeda correctly presumed that a major attack could be carried out by a cell that US agents had already uncovered.” [Miller, Stone, and Mitchell, 2002, pp. 195, 206] After 9/11, it will come to light that three of the alleged hijackers, Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi, had some involvement in the bombings (see October 4, 2001, Late 1999, and 1993-1999) and that the US intelligence community was aware of this involvement by late 1999 (see December 15-31, 1999), if not before.

Entity Tags: Salem Alhazmi, Nawaf Alhazmi, Mohamed al-Owhali, Hamden Khalif Allah Awad, Khalid Almihdhar, Al-Qaeda, Azzam

Timeline Tags: Complete 911 Timeline

Samir al-Hada, who helped run an al-Qaeda communications hub in Yemen.Samir al-Hada, who helped run an al-Qaeda communications hub in Yemen. [Source: CNN]Yemeni al-Qaeda operative Samir al-Hada is questioned over the embassy bombings in East Africa. A communications hub run by him and his father, Ahmed al-Hada, facilitated the attacks (see Late August 1998) and will also apparently facilitate the attack on the USS Cole and 9/11 (see Before October 12, 2000 and Early 2000-Summer 2001). Details of the questioning, such as the agency that performs it and what results are passed to US intelligence, are not known, but the communications hub the al-Hada family runs will subsequently be monitored and US intelligence will derive much useful information from it (see Late 1998-Early 2002) [New York Daily News, 2/14/2002] Samir al-Hada will die in an explosion in February 2002 (see February 13, 2002).

Entity Tags: Samir al-Hada

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mohamed al-Owhali is arrested and immediately begins confessing his role in the recent al-Qaeda bombing of the US embassy in Nairobi, Kenya. He reveals to the FBI what an FBI agent will later call “blue-chip” information. [CNN, 1/19/2001] He reveals to prosecutor Patrick Fitzgerald and others that when he was told by a handler in Afghanistan that he would take part in an operation in Kenya, he insisted “I want to attack inside the US” instead. But his handler tells him that the Kenya attack is important because it will keep the US distracted while the real attack is being prepared. Al-Owhali futher explains to his interrogators, “We have a plan to attack the US, but we’re not ready yet. We need to hit you outside the country in a couple of places so you won’t see what is going on inside. The big attack is coming. There’s nothing you can do to stop it.” [USA Today, 8/29/2002; Wright, 2006, pp. 278-279] Presumably, al-Owhali is also the suspect at this time who “inform[s] the FBI that an extensive network of al-Qaeda ‘sleeper agents’ currently exists in the US.” It is known that counterterrorism “tsar” Richard Clarke passes on this information to Condoleezza Rice when she begins her position as National Security Adviser in January 2001 (see January 25, 2001), but other details about this warning are not known. [9/11 Commission, 7/24/2004, pp. 260] Al-Owhali also reveals the telephone number of a key al-Qaeda communications hub in Yemen (see Late August 1998) and warns that an al-Qaeda attack is Yemen is being planned (see Mid-August 1998). [CNN, 1/19/2001]

Entity Tags: Patrick J. Fitzgerald, Federal Bureau of Investigation, Condoleezza Rice, Mohamed al-Owhali, Richard A. Clarke

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Al-Qaeda operatives use a communications hub in Sana’a, Yemen, to “put everything together” before the bombing of the USS Cole. The communications hub is run by Ahmed al-Hada, who US officials will later describe as “a prominent al-Qaeda member who is believed to have been involved in the Cole bombing.” The hub is monitored by US intelligence from 1998, at least, (see Late August 1998) and information gleaned from it is used to thwart a number of plots (see Late 1998-Early 2002). The US monitors the house through bugs planted inside and through spy satellites to monitor people leaving and entering it. The hub was also used before the 1998 embassy bombings and will be used to communicate with the 9/11 hijackers before 9/11 (see Early 2000-Summer 2001). [MSNBC, 2/14/2002; Mirror, 6/9/2002; MSNBC, 5/2005] When the FBI arrives in Yemen to investigate the bombing, it finds that “telephone records show[…] that suspects in the Cole bombing had been in touch with suspects from the 1998 embassy bombings in Kenya.” [Miller, Stone, and Mitchell, 2002, pp. 238] Calls between the hub and an al-Qaeda cell in Ireland that seems to have a connection to the Cole bombing are also intercepted during part of this period (see Late December 1999-October 12, 2000). It is unclear why the information does not allow the NSA to thwart the plot. Despite the scope of the monitoring, NSA Director Michael Hayden will later say there were no intercepts the NSA could have exploited to stop the bombing: “When the Cole disaster took place I had brought to my desk in, in this office, every stitch of NSA reporting on the—that could in any way be related to this. And I went thought it report by report and I sent a letter out to our entire work force, which was essentially, you performed well. Keep up the good work.” [CBS News, 6/19/2002]

Entity Tags: National Security Agency, Ahmed al-Hada, Michael Hayden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

After he is arrested for the Nairobi embassy bombing (see 10:35-10:39 a.m., August 7, 1998), Mohamed al-Owhali is questioned by local Kenyan law enforcement and the FBI, and discloses important information (see August 4-25, 1998). When he is shown photographs of al-Qaeda operatives, one of the people he identifies is Abd al-Rahim al-Nashiri (a.k.a. Bilal), a cousin of another Nairobi bomber. Al-Nashiri is an al-Qaeda leader who helped al-Owhali obtain a false passport in Yemen when al-Owhali stayed at an al-Qaeda safe house in April-May 1998. It is unclear where the FBI obtained the photo of al-Nashiri, although US intelligence was previously informed of al-Nashiri’s involvement in a plot to smuggle anti-tank missiles into Saudi Arabia (see 1997). [Federal Bureau of Investigation, 9/9/1998, pp. 16 pdf file; United State of America v. Usama bin Laden, et al., Day 14, 3/7/2001; Burke, 2004, pp. 174; 9/11 Commission, 7/24/2004, pp. 152-3]

Entity Tags: Abd al-Rahim al-Nashiri, Mohamed al-Owhali, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Al-Qaeda’s communications hub in Sana’a, Yemen.Al-Qaeda’s communications hub in Sana’a, Yemen. [Source: PBS NOVA]The investigation of the East Africa embassy bombings (see 10:35-10:39 a.m., August 7, 1998) led to the discovery of the phone number of an al-Qaeda communications hub in Sana’a, Yemen (see August 4-25, 1998). The hub is run by an al-Qaeda veteran named Ahmed al-Hada, who is helped by his son Samir and is related to many other al-Qaeda operatives in Yemen and elsewhere. He is also the father in law of 9/11 hijacker Khalid Almihdhar, whose wife, Hoda al-Hada, lives at the hub with their children. [Newsweek, 6/2/2002; Die Zeit (Hamburg), 10/1/2002; MSNBC, 7/21/2004; Suskind, 2006, pp. 94; Wright, 2006, pp. 277, 309, 343, 378] Several of Ahmed al-Hada’s relatives die fighting for al-Qaeda before 9/11, a fact known to US intelligence. [Los Angeles Times, 12/21/2005; Guardian, 2/15/2006] The NSA may already be aware of the phone number, as they have been intercepting Osama bin Laden’s communications for some time (see November 1996-Late August 1998) and, according to Newsweek, “some” of bin Laden’s 221 calls to Yemen are to this phone number. [Newsweek, 2/18/2002; Sunday Times (London), 3/24/2002; Media Channel, 9/5/2006] The US intelligence community now begins a joint effort to monitor the number. The NSA and CIA jointly plant bugs inside the house, tap the phones, and monitor visitors with spy satellites. [Mirror, 6/9/2002; Wright, 2006, pp. 343; New Yorker, 7/10/2006 pdf file] US intelligence also learns that the communications hub is an al-Qaeda “logistics center,” used by agents around the world to communicate with each other and plan attacks. [Newsweek, 6/2/2002] The joint effort enables the FBI to map al-Qaeda’s global organization (see Late 1998-Early 2002) and at least three of the hijackers use the number, enabling the NSA to intercept their communications and find out about an important al-Qaeda meeting in Malaysia (see December 29, 1999 and January 5-8, 2000 and Early 2000-Summer 2001). It appears al-Qaeda continues to use this phone line until Samir al-Hada dies resisting arrest in early 2002 (see February 13, 2002).

Entity Tags: National Security Agency, Federal Bureau of Investigation, Samir al-Hada, Khalid Almihdhar, Central Intelligence Agency, Osama bin Laden, Hoda al-Hada, Ahmed al-Hada

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mohamed al-Owhali, one of the bombers of the US embassy in Nairobi, Kenya (see 10:35-10:39 a.m., August 7, 1998), is rendered from Kenya to the US. Al-Owhali was arrested in Nairobi after the bombing and gave up information to local authorities and the FBI about it (see August 4-25, 1998 and August 22-25 1998). He will be tried in the US and sentenced to life in prison (see October 21, 2001). [Grey, 2007, pp. 129, 246]

Entity Tags: Mohamed al-Owhali

Timeline Tags: Torture of US Captives, Complete 911 Timeline

The FBI asks the NSA to pass on all calls between an al-Qaeda communications hub in Yemen and the US. The hub, which is run by an operative named Ahmed al-Hada and was involved in the attacks on US embassies in East Africa (see Late August 1998), is a key al-Qaeda logistics center and intelligence gleaned from listening in on calls to and from it will help prevent some attacks (see August 4-25, 1998 and Late 1998-Early 2002). Dan Coleman, one of the FBI agents who places the request, will say, “anyone who called the Yemen number is white-hot, a top suspect.” However, the NSA will not inform the FBI of all calls between the hub and the US. [Suskind, 2006, pp. 94] In particular, two 9/11 hijackers will call the hub while they are in the US (see Early 2000-Summer 2001). However, the information will be withheld from the FBI and various explanations will be offered for this failure (see (Spring 2000), Summer 2002-Summer 2004, and March 15, 2004 and After).

Entity Tags: Federal Bureau of Investigation, National Security Agency, Dan Coleman

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Patrick FitzgeraldPatrick Fitzgerald [Source: Publicity photo]Ali Mohamed is finally arrested after testifying at a grand jury hearing. The arrest is officially kept secret, but the media will report it one month later. [New York Times, 10/30/1998] Patrick Fitzgerald is on the prosecutor team that subpoenaed Mohamed to appear, but apparently he and the other prosecutors know very little about Mohamed. Fitzgerald blames this on a legal “wall” between intelligence gathering and criminal prosecution. He later will relate what happened on the day Mohamed testified: “Ali Mohamed lied in that grand jury proceeding and left the courthouse to go to his hotel, followed by FBI agents, but not under arrest. He had imminent plans to fly to Egypt. It was believed [by the prosecutors] at the time that Mohamed lied and that he was involved with the al-Qaeda network but Mohamed had not by then been tied to the [embassy] bombings. The decision had to be made at that moment whether to charge Mohamed with false statements. If not, Mohamed would leave the country. That difficult decision had to be made without knowing or reviewing the intelligence information on the other side of the ‘wall.’ It was ultimately decided to arrest Mohamed that night in his hotel room [and he was arrested]. [The prosecution] team got lucky but we never should have had to rely on luck. The prosecution team later obtained access to the intelligence information, including documents obtained from an earlier search of Mohamed’s home by the intelligence team on the other side of ‘the wall.’ Those documents included direct written communications with al-Qaeda members and a library of al-Qaeda training materials that would have made the decision far less difficult. (We could only obtain that access after the arrest with the specific permission of the Attorney General of the United States, based upon the fact that we had obligations to provide the defendant with discovery materials and because the intelligence investigation of Mohamed had effectively ended.)… Mohamed [later] stated that had he not been arrested on that day in September 1998, he had intended to travel to Afghanistan to rejoin Osama bin Laden. Thus, while the right decision to arrest was made partly in the dark, the ‘wall’ could easily have caused a different decision that September evening that would have allowed a key player in the al-Qaeda network to escape justice for the embassy bombing in Kenya and rejoin Osama bin Laden in a cave in Afghanistan, instead of going to federal prison.” [US Congress, 10/21/2003] Mohamed’s associate Khaled Abu el-Dahab, now living in Egypt, wil hear of Mohamed’s arrest and attempt to leave the country, but will be arrested in October 1998. He will be put on trial there and sentenced to 15 years in prison (see 1999). [San Francisco Chronicle, 11/21/2001]

Entity Tags: Ali Mohamed, Federal Bureau of Investigation, Khaled Abu el-Dahab, Patrick J. Fitzgerald

Timeline Tags: Complete 911 Timeline

Dan ColemanDan Coleman [Source: CNN]Beginning in the autumn of 1998, the FBI uses the phone records of an al-Qaeda communications hub run by operative Ahmed al-Hada and his son Samir to build a map of al-Qaeda’s global organization. A map showing all the places in the world that have communicated with the hub is posted on the wall of the interagency counterterrorism I-49 squad in New York. The hub’s telephone number was uncovered during the East African embassy bombings investigation (see August 4-25, 1998 and Late August 1998). [Al Ahram, 2/21/2002; MSNBC, 7/21/2004; Wright, 2006, pp. 343; New Yorker, 7/10/2006 pdf file] According to FBI agent and I-49 squad member Dan Coleman, al-Hada is “uncle of half the violent jihadists we knew in the country.” [Suskind, 2006, pp. 94] Several of his sons and sons-in-law are al-Qaeda operatives and some die fighting and training with radical Islamists; this is known to US intelligence before 9/11. Hijacker Khalid Almihdhar is also a son-in-law of al-Hada. [MSNBC, 2/14/2002; Fox News, 2/14/2002; Los Angeles Times, 12/21/2005] The number is monitored by the NSA and over the next three years it mines intelligence that helps authorities foil a series of plots, including planned attacks on the US Embassy in Paris and the US Consulate in Istanbul, along with an attempted airline hijacking in Africa. However, the hub also serves as a planning center for the 2000 attack on the USS Cole in Yemen, which is successful (see October 12, 2000). [US News and World Report, 3/15/2004] The CIA, as the primary organization for gathering foreign intelligence, has jurisdiction over conversations on the al-Hada phone. Helped by the NSA, it stakes out the house—tapping the phone, planting bugs, and taking satellite photographs of its visitors. However, the CIA apparently does not provide the FBI with all the relevant information it is obtaining about al-Qaeda’s plans. [Mirror, 6/9/2002; New Yorker, 7/10/2006 pdf file] For example, the FBI is not informed that hijackers Khalid Almihdhar and Nawaf Alhazmi make calls to the communications hub from the US between spring 2000 and summer 2001 (see Spring-Summer 2000 and Mid-October 2000-Summer 2001). The FBI also asks the NSA to pass any calls between the communications hub and the US to the FBI, but the NSA does not do this either (see Late 1998). [Suskind, 2006, pp. 94]

Entity Tags: Federal Bureau of Investigation, I-49, National Security Agency, Samir al-Hada, Khalid Almihdhar, Nawaf Alhazmi, Dan Coleman, Ahmed al-Hada, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Salem Alhazmi.Salem Alhazmi. [Source: FBI]As the NSA continues to monitor an al-Qaeda communications hub in Yemen run by hijacker Khalid Almihdhar’s father-in-law (see Late August 1998), they find references to Almihdhar and the hijacker brothers, Salem and Nawaf Alhazmi. They also learn that Almihdhar and Nawaf Alhazmi are long time friends. [9/11 Commission, 1/26/2004, pp. 6 pdf file; 9/11 Commission, 1/26/2004] In early 1999, the NSA intercepts communications mentioning the full name “Nawaf Alhazmi.” However, this information is not disseminated to the intelligence community, as it apparently does not meet NSA reporting thresholds. The 9/11 Congressional Inquiry will say, “Those thresholds vary, depending on the judgement of the NSA analyst who is reviewing the intercept and the subject, location, and content of the intercept.” Another intelligence organisation intercepts the same or similar calls and reports this to the NSA. The Inquiry comments: “NSA’s practice was to review such reports and disseminate those responsive to US intelligence requirements. For an undetermined reason, NSA did not disseminate the […] report.” [Associated Press, 9/25/2002; US Congress, 10/17/2002; US Congress, 7/24/2003, pp. 135 pdf file] The NSA continues to intercept such calls and finds more information a few months later (see Summer 1999 and Late Summer 1999). Near the end of 1999, there will be additional intercepts that give Khalid Almihdhar’s full name and the first names of the other two (see Shortly Before December 29, 1999). But while the NSA will provide some information about these new intercepts to the CIA and other agencies, they will not go back to the earlier intercepts to figure out Nawaf’s full name and close connection to Almihdhar (see December 29, 1999).

Entity Tags: 9/11 Congressional Inquiry, Nawaf Alhazmi, National Security Agency, Salem Alhazmi, Federal Bureau of Investigation, Khalid Almihdhar, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 Hijacker Nawaf Alhazmi receives a new passport in Saudi Arabia. According to the 9/11 Commission, the passport contains an “indicator of extremism” that is “associated with al-Qaeda.” [9/11 Commission, 8/21/2004, pp. 9 pdf file] According to author James Bamford, this is a “secret coded indicator, placed there by the Saudi government, warning of a possible terrorist affiliation.” [Bamford, 2008] Presumably, this indicator is placed there because Alhazmi is on the Saudi government watch list at this point due to his radical ties (see Late 1999). The Saudi government will reportedly use this indicator to track Alhazmi and other Saudi hijackers before 9/11 “with precision” (see November 2, 2007).

Entity Tags: Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijackers Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi leave Saudi Arabia after obtaining new passports and US visas there (see March 21, 1999, April 4, 1999, April 6, 1999, and April 3-7, 1999). According to the 9/11 Commission, their passports contain an “indicator of extremism” that is “associated with al-Qaeda.” [9/11 Commission, 8/21/2004, pp. 9, 33 pdf file] According to author James Bamford, the indicator is a “secret coded indicator, placed there by the Saudi government, warning of a possible terrorist affiliation.” [Bamford, 2008, pp. 58-59] The Saudi government reportedly uses this indicator to track some of the Saudi hijackers before 9/11 “with precision” (see November 2, 2007). Almihdhar and Nawaf Alhazmi apparently return to Afghanistan to discuss an attack on the US. [9/11 Commission, 7/24/2004, pp. 155] Salem Alhazmi’s destination is unknown. He will be reported to be in Malaysia (see January 5-8, 2000) and Afghanistan (see Summer 2000) the next year. Almihdhar and Nawaf Alhazmi are placed on the Saudi terrorist watch list later this year (see Late 1999).

Entity Tags: Khalid Almihdhar, Salem Alhazmi, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijacker Khalid Almihdhar receives a new passport from Saudi Arabia. According to the 9/11 Commission, the passport contains an “indicator of extremism” that is “associated with al-Qaeda.” [9/11 Commission, 8/21/2004, pp. 9, 33 pdf file] According to author James Bamford, this is a “secret coded indicator, placed there by the Saudi government, warning of a possible terrorist affiliation.” [Bamford, 2008, pp. 58-59] Presumably, this indicator is placed there because Almihdhar is on the Saudi government watch list at this point due to his radical ties (see Late 1999). The Saudi government will reportedly use this indicator to track Almihdhar and other Saudi hijackers before 9/11 “with precision” (see November 2, 2007).

Entity Tags: Khalid Almihdhar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The NSA intercepts more calls (see Early 1999) involving Khalid Almihdhar, who is at an al-Qaeda communications hub in Sana’a, Yemen, with his family (see Late August 1998). The identity of the person he is talking to and the content of the intercepts is so sensitive that the whole passage regarding these communications is redacted in the 9/11 Congressional Inquiry’s report. After the redacted passage, the Inquiry comments, “At about the same time, the name [of al-Qaeda leader] Khallad [bin Attash] came to the attention of the NSA for the first time,” so the calls may involve bin Attash in some way. [US Congress, 7/24/2003, pp. 155-6 pdf file] Almihdhar is staying at the communications hub at this time and will stay there later as well (see (Mid-June-Mid-July 2000) and Late October 2000-July 4, 2001).

Entity Tags: Khalid Almihdhar, National Security Agency, Khallad bin Attash

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A large group of Islamic Jihad operatives are sentenced in Cairo in what becomes known as the “Trial of the Albanian Returnees.” Various disclosures are made at the trial about the way Islamic Jihad operated and how it provided support to al-Qaeda by forging travel documents, transferring money, and arranging communications. One of the revelations is that al-Qaeda has a key communication hub in Yemen. Despite this revelation (see Late 1998-Early 2002), al-Qaeda will continue to use it through 2001 (see Early 2000-Summer 2001). The defendants were arrested not only in Egypt, but also in Albania, Bulgaria, Azerbaijan, and the United Arab Emirates. In 1995, the CIA arranged a deal with Egypt to capture Islamic Jihad operatives around the world and send them to Egypt to be tortured and prosecuted (see Summer 1995). Eighty-seven of the defendants are convicted and ten are sentenced to death, including al-Zawahiri, who is tried in absentia. [New York Times, 11/21/2001] One of the convicted is Khaled Abu el-Dahab, who was operating a sleeper cell in California with double agent Ali Mohamed throughout the 1990’s (see 1987-1998). El-Dahab is sentenced to fifteen years in prison (see September 10, 1998). There are credible reports that many of the defendants confessed after being tortured in Egypt and Albania. [New York Times, 11/21/2001; Wright, 2006, pp. 269] The trial nearly eradicates the remnants of Islamic Jihad in Egypt and, according to some of the defendants, leaves only about forty members outside of Egypt. Al-Zawahiri and the other remaining members end up allying even closer to al-Qaeda. The two organizations will formally merge in early 2001 (see June 2001). [Wright, 2006, pp. 336]

Entity Tags: Ayman al-Zawahiri, Khaled Abu el-Dahab, Islamic Jihad, Egypt, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The NSA intercepts more calls involving an al-Qaeda communications hub in Sana’a, Yemen (see Early 1999 and Summer 1999). The names of Khaled, who turns out to be 9/11 hijacker Khalid Almihdhar, and others are mentioned in the calls. However, the NSA reportedly does not think the intelligence gleaned from the calls is important and does not disseminate it. [US Congress, 7/24/2003, pp. 156 pdf file] However, the FBI regarded the hub as a key element in al-Qaeda’s communications network and after 9/11 a senior US counterterrorism official will say, “The NSA was well aware of how hot the number was… and how it was a logistical hub for al-Qaeda.” Several plots are stopped based on information obtained from listening to calls to and from the hub (see Late 1998-Early 2002). [Los Angeles Times, 12/21/2005]

Entity Tags: National Security Agency, Khalid Almihdhar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Ahmed Alnami.Ahmed Alnami. [Source: US District Court for the Eastern District of Virginia, Alexandria Division]9/11 hijacker Ahmed Alnami receives a new passport in Saudi Arabia. [Federal Bureau of Investigation, 10/2001, pp. 43 pdf file] According to the 9/11 Commission, the passport may contain an “indicator of extremism” that is “associated with al-Qaeda.” However, although it is certain some of the other hijackers have such indicators in their passports, it is not certain that Alnami does. The commission will merely say that there “is reason to believe” his passport may contain such indicator and note that it was “issued in the same Saudi passport office” that issued passports with the indicator to some of the other hijackers. In addition, Alnami obtains two passports before 9/11 (see also April 21, 2001), and it is not clear whether the commission thinks both of the passports have the indicator, or just one of them. [9/11 Commission, 7/24/2004, pp. 564; 9/11 Commission, 8/21/2004, pp. 9, 33 pdf file] According to author James Bamford, the indicator is a “secret coded indicator, placed there by the Saudi government, warning of a possible terrorist affiliation.” [Bamford, 2008, pp. 58-59] The Saudi government reportedly uses this indicator to track some of the Saudi hijackers before 9/11 “with precision” (see November 2, 2007).

Entity Tags: Ahmed Alnami

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

NSA servers used to collect and sift data.NSA servers used to collect and sift data. [Source: FrancesFarmersRevenge.com]The National Security Agency (see 1952) begins building a massive data-mining system, code-named “Trailblazer,” that is intended to sift through reams of digital communications intercepts and find nuggets of information relevant to national security. The program’s task is huge—to sort through the 2 million bits of data the NSA collects every hour—and one made even more complex by the relatively new types of wireless, Internet, cell phone, and instant messaging communications now becoming ever more commonplace. Trailblazer is strongly embraced by General Michael Hayden, who became the NSA’s director in March 1999. Hayden recognizes from the outset that the NSA is years behind the technological curve, and casts Trailblazer as the future of the agency’s intelligence gathering and sorting. In November 1999, Hayden makes Trailblazer the centerpiece of his “100 Days of Change,” his plan to transform the agency into a leaner, more efficient organization, fast-tracking the program to vault it ahead of other initiatives. “It was going to structure us to handle the digital revolution,” a former intelligence official will recall. But from the outset the program has problems: a meeting between NSA and other government officials in December 1999 is unpromising, and, according to one government oversight official, the program “kicked off with not a real great definition of what it was trying to achieve.” Program managers fail to define standard data formats to allow for the proper sorting of information. After six years, $1.2 billion in expenditures, and endless man-hours of work, the utterly failed program will be recognized as the “biggest boondoggle… in the intelligence community” (see January 2006). [Baltimore Sun, 1/29/2006]

Entity Tags: Trailblazer, National Security Agency, Michael Hayden

Timeline Tags: Civil Liberties

The CIA’s Counterterrorism Center sends a cable reminding all its personnel about various reporting obligations. The cable clearly states that it is important to share information so suspected members of US-designated terrorist groups can be placed on watch lists. The US keeps a number of watch lists; the most important one, TIPOFF, contains about 61,000 names of suspected terrorists by 9/11. [Los Angeles Times, 9/22/2002; Knight Ridder, 1/27/2004] The list is checked whenever someone enters or leaves the US. “The threshold for adding a name to TIPOFF is low,” and even a “reasonable suspicion” that a person is connected with a US-designated terrorist group warrants being added to the database. [US Congress, 9/20/2002] Within a month, two future hijackers, Nawaf Alhazmi and Khalid Almihdhar, will be identified as al-Qaeda operatives (see December 29, 1999), but the cable’s instructions will not be followed for them. The CIA will initially tell the 9/11 Congressional Inquiry that no such guidelines existed, and CIA Director Tenet will fail to mention the cable in his testimony to the Inquiry. [New York Times, 5/15/2003; US Congress, 7/24/2003, pp. 157 pdf file]

Entity Tags: Central Intelligence Agency, Khalid Almihdhar, George J. Tenet, 9/11 Congressional Inquiry, Nawaf Alhazmi, Counterterrorist Center, TIPOFF

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

From left to right: Mokhtar Haouari, Abdelmajid Dahoumane, Abdel Ghani Meskini. The picture of Meskini is from an ATM camera.From left to right: Mokhtar Haouari, Abdelmajid Dahoumane, Abdel Ghani Meskini. The picture of Meskini is from an ATM camera. [Source: Public domain, public domain, and Seattle Times]In the wake of the arrest of Ahmed Ressam (see December 14, 1999), FBI investigators work frantically to uncover more millennium plots before the end of the year. US authorities also make a number of arrests.
bullet A telephone number found in Ressam’s pocket leads to Abdel Ghani Meskini, an Algerian living in New York City who had gone to Seattle to meet Ressam. Meskini is monitored and arrested in New York on December 30.
bullet One of Ressam’s credit cards leads to the arrest of Mokhtar Haouari, an Algerian living in Montreal, Canada. Meskini later cooperates with US investigators and is never charged, while Haouari will be sentenced to 24 years in prison. [Time, 2/7/2000; CNN, 1/16/2002; Wright, 2006, pp. 298]
bullet Another Algerian associate of Ressam’s, Abdelmajid Dahoumane, escapes to Afghanistan, but will eventually be caught by the Algerian government and convicted in Algeria. [PBS Frontline, 10/25/2001]
bullet Investigators believe that Mohamedou Ould Slahi, an al-Qaeda operative whose cousin is a top al-Qaeda leader, went to Canada to give the go-ahead for Ressam’s attack. Slahi is arrested several times overseas, but never charged (see January-April 2000). [CNN, 3/6/2002]
bullet Khalid Deek, a US citizen, is arrested around this time for masterminding another al-Qaeda millennnium plot (see December 11, 1999). But counterterrorism expert Rita Katz will later say Deek was a suspected mastermind of Ressam’s Los Angeles airport plot, too. [Orange County Register, 9/12/2005] Deek’s name and phone number is found in Ressam’s telephone book. Ressam knew Deek from bin Laden training camps in Afghanistan. Both of them, like most of Ressam’s group, have links to the GIA, an Algerian militant group associated with al-Qaeda. [Newsweek (International), 3/13/2000]
Others escape the US after hearing media reports of Ressam’s arrest. However, enough people are caught to stop additional millennium attacks. Counterterrorism “tsar” Richard Clarke later says, “I think a lot of the FBI leadership for the first time realized that… there probably were al-Qaeda people in the United States. They realized that only after they looked at the results of the investigation of the millennium bombing plot.” [PBS Frontline, 10/3/2002] Yet Clinton’s National Security Adviser Sandy Berger later claims that the FBI will still repeatedly assure the Clinton White House until Clinton leaves office that al-Qaeda lacks the ability to launch a domestic strike (see 2000).

Entity Tags: Mohamedou Ould Slahi, Sandy Berger, Khalil Deek, Mokhtar Haouari, Groupe Islamique Armé, Abdel Ghani Meskini, Al-Qaeda, Federal Bureau of Investigation, Richard A. Clarke, Ahmed Ressam

Timeline Tags: Complete 911 Timeline

The NSA, monitoring a telephone in an al-Qaeda communications hub in Yemen (see Late August 1998 and Late 1998-Early 2002), has listened in on phone calls revealing that hijackers Khalid Almihdhar, Nawaf Alhazmi, and Salem Alhazmi are to attend an important al-Qaeda summit in Malaysia in January 2000 (see Shortly Before December 29, 1999). Almihdhar’s full name was mentioned, as well as the first names of hijackers Nawaf Alhazmi and Salem Alhazmi. On this day, the NSA shares this information with the CIA’s Alec Station bin Laden unit. Other US intelligence agencies, including FBI headquarters and the FBI’s New York field office, are told as well. Although Khalid Almihdhar’s full name was mentioned in one call, the NSA only passes on his first name. Also, the NSA has already learned from monitoring the Yemen hub that Nawaf’s last name is Alhazmi and that he is long-time friends with Almihdhar (see Early 1999). However, they either don’t look this up in their records or don’t pass it on to any other agency. [9/11 Commission, 1/26/2004, pp. 6 pdf file; US Department of Justice, 11/2004, pp. 239 pdf file; Wright, 2006, pp. 310] An NSA analyst makes a comment that is shared between US intelligence agencies, “Salem may be Nawaf’s younger brother.” This turns out to be correct. [US Congress, 7/24/2003, pp. 135 pdf file; 9/11 Commission, 1/26/2004, pp. 6 pdf file] A CIA officer will later tell the 9/11 Congressional Inquiry that information from the Africa embassy bombings (see 10:35-10:39 a.m., August 7, 1998) was reviewed in late 1999 during a worldwide effort to disrupt millennium attack plots (see December 15-31, 1999) and “a kind of tuning fork… buzzed when two [of the hijackers] reportedly planning a trip to [Malaysia] were linked indirectly to what appeared to be a support element… involved with the Africa bombers.” [US Congress, 7/24/2003, pp. 135 pdf file] The fact that they are connected to the Yemen communication hub already indicates some importance within al-Qaeda. It is learned they are connected to the embassy bombings in some way (see October 4, 2001 and Late 1999). [US Congress, 7/24/2003, pp. 135 pdf file; 9/11 Commission, 1/26/2004, pp. 6 pdf file] The NSA report about them on this day is entitled, “Activities of Bin Laden Associates,” showing the clear knowledge of their ties to bin Laden. [9/11 Commission, 7/24/2004, pp. 502; Vanity Fair, 11/2004] The CIA will track Almihdhar and Nawaf Alhazmi to the Malaysia summit (see January 2-5, 2000 and January 5-8, 2000).

Entity Tags: Salem Alhazmi, Federal Bureau of Investigation, FBI New York Field Office, Khalid Almihdhar, FBI Headquarters, Al-Qaeda, Alec Station, Central Intelligence Agency, Ahmed al-Hada, National Security Agency, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Following a raid on suspected al-Qaeda operatives in Dublin, Ireland, on December 21, 1999 (see December 21, 1999), FBI investigators begin monitoring the al-Qaeda cell there. The cell is believed to specialize in providing travel and identity documents for others committing violent acts. It will later be reported that “further investigation led to the tracing of telephone calls between Dublin and the Yemen in the period before al-Qaeda launched” its attack on the USS Cole (see October 12, 2000). [Irish Times, 7/31/2002] Additional details such as what was said in these calls have not been reported. The calls to Yemen may well have been to a Yemeni al-Qaeda communications hub that was under US surveillance since at least 1998 (see Late August 1998).

Entity Tags: Federal Bureau of Investigation, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A phone bill of one of the 9/11 hijackers. More details are unknown.A phone bill of one of the 9/11 hijackers. More details are unknown. [Source: Canadian Broadcasting Corporation]While living in the US, the 9/11 hijackers make at least 206 international phone calls. In 2006, these calls will be mentioned in a German intelligence report based on telephone records obtained from the FBI. There are 66 calls to Syria, 32 calls to Saudi Arabia, and 29 calls to Germany. A majority of the call are made from a cell phone registered to hijacker Marwan Alshehhi. Additional details on who was called, who else made the calls, when the calls were made, what other countries were called, etc… have not been made public. The Chicago Tribune will later note that the calls to Germany are not surprising since Alshehhi and some others were living there, but “the hijackers’ connections to Saudi Arabia and Syria are far from fully explained.” [Chicago Tribune, 3/8/2006] It is unknown when these calls were discovered, but reports suggest at least some of the hijackers’ international calls were being monitored by US intelligence as they were made (see Summer 2001, September 10, 2001, and Early 2000-Summer 2001).

Entity Tags: Marwan Alshehhi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A photocopy of Nawaf Alhazmi’s passport. No image of Khalid Almihdhar’s passport has been released, but it would have looked similar to this one.A photocopy of Nawaf Alhazmi’s passport. No image of Khalid Almihdhar’s passport has been released, but it would have looked similar to this one. [Source: FBI]The CIA is aware that hijacker Khalid Almihdhar is staying at a highly monitored al-Qaeda communication hub (see Late 1998-Early 2002) and is planning to travel to an al-Qaeda meeting in Malaysia. He is closely watched as leaves the hub and flies from Sana’a, Yemen, to Dubai, United Arab Emirates, on his way to Malaysia. Agents from eight CIA offices and six friendly foreign intelligence services are all asked to help track him, in the hopes he will lead them to bigger al-Qaeda figures. [Stern, 8/13/2003; 9/11 Commission, 1/26/2004, pp. 6 pdf file] The CIA and local authorities are running an operation to track militants transiting Dubai airport (see 1999), and United Arab Emirates officials secretly make copies of his passport as he is passing through it, immediately reporting this to the CIA. [Bamford, 2004, pp. 224] Another account suggests CIA agents break into Almihdhar’s Dubai hotel room and photocopy the passport there. Either way, the information is immediately faxed to Alec Station, the CIA’s bin Laden unit. [Wright, 2006, pp. 311] The CIA not only learns his full name, but also discovers the vital fact that he has a multiple entry visa to the US that is valid from April 1999 to April 2000. But even though the CIA now knows about this US visa which indicates he plans to go to New York City, they do not place him on a terror watch list and they fail to tell the FBI about the visa. [Bamford, 2004, pp. 224; 9/11 Commission, 1/26/2004, pp. 6 pdf file]

Entity Tags: United Arab Emirates, Nawaf Alhazmi, Alec Station, Central Intelligence Agency, Khalid Almihdhar, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Attendees of the Malaysian summit. Top row, from left: Nawaf Alhazmi, Khalid Almihdhar, Khalid Shaikh Mohammed. Middle row, from left: Khallad bin Attash, Abd al-Rahim al-Nashiri, Hambali. Bottom row, from left: Yazid Sufaat, Ramzi bin al-Shibh, Abu Bara al-Taizi. Attendees of the Malaysian summit. Top row, from left: Nawaf Alhazmi, Khalid Almihdhar, Khalid Shaikh Mohammed. Middle row, from left: Khallad bin Attash, Abd al-Rahim al-Nashiri, Hambali. Bottom row, from left: Yazid Sufaat, Ramzi bin al-Shibh, Abu Bara al-Taizi. [Source: FBI]About a dozen of Osama bin Laden’s trusted followers hold a secret, “top-level al-Qaeda summit” in the city of Kuala Lumpur, Malaysia. [CNN, 8/30/2002; San Diego Union-Tribune, 9/27/2002] According to an unnamed senior CIA official, before the summit started, the CIA learned that “11 young guys” were going to attend, and “young guys” is slang for operatives traveling. [Bamford, 2008, pp. 18] Plans for the October 2000 bombing of the USS Cole (see October 12, 2000) and the 9/11 attacks are discussed. [USA Today, 2/12/2002; CNN, 8/30/2002] At the request of the CIA, the Malaysian Secret Service monitors the summit and then passes the information on to the US (see January 5-8, 2000 and Shortly After). Attendees of the summit are said to include:
Nawaf Alhazmi and Khalid Almihdhar - The CIA and FBI will later miss many opportunities to foil the 9/11 plot through Alhazmi and Almihdhar and the knowledge of their presence at this summit. The CIA already knows many details about these two by the time the summit begins (see January 2-4, 2000), and tracked Almihdhar as he traveled to it (see January 2-5, 2000).
Yazid Sufaat - Sufaat is a Malaysian who owns the condominium where the summit is held. He is also a trained biologist and is said to be a leading figure in al-Qaeda’s attempts to get a biological or chemical weapon. [New York Times, 1/31/2002; Newsweek, 6/2/2002] Malaysian officials also recognize Sufaat from summit surveillance photos, as he is a long-time Malaysian resident (see Shortly After January 8, 2000). [New Straits Times, 2/10/2002] A possibility to expose the 9/11 plot through Sufaat’s presence at this summit will later be missed in September 2000 (see September-October 2000). Sufaat will travel to Afghanistan in June 2001 and be arrested by Malaysian authorities when he returns to Malaysia in late 2001 (see December 19, 2001). [Australian, 12/24/2002] He will be released in 2008 (see December 4, 2008).
Hambali - An Indonesian militant known as Hambali, or Nurjaman Riduan Isamuddin [BBC, 8/15/2003] , was heavily involved in the Bojinka plot, an early version of the 9/11 plot (see January 6, 1995 and June 1994). [CNN, 3/14/2002; CNN, 8/30/2002] The FBI was aware of who he was and his connections to the Bojinka plot at least by 1999 and identified a photograph of him by that time (see May 23, 1999). He will be arrested by Thai authorities in August 2003 (see August 12, 2003). [CNN, 8/14/2003; CBS News, 8/15/2003] Malaysian officials recognize Hambali from summit surveillance photos, as he is a long-time Malaysian resident. But the US does not tell them of his Bojinka connections, so they will not know to arrest him after the summit is over (see Shortly After January 8, 2000). [New Straits Times, 2/10/2002]
Khalid Shaikh Mohammed - Mohammed is sometimes referred to as “KSM,” an al-Qaeda leader and the alleged “mastermind” of the 9/11 attacks. The US has known KSM is an Islamic militant since the exposure of Operation Bojinka in January 1995 (see January 6, 1995), and knows what he looks like. US officials will state that they only realized the summit was important in 2001, but the presence of KSM should have proved its importance. [Los Angeles Times, 2/2/2002] Although the possible presence of KSM at this summit will be disputed by US officials, one counterterrorism expert will testify before the 9/11 Commission in 2003 that he has access to transcripts of KSM’s interrogations since his capture, and that KSM has admitted leading this summit and telling the attendees about a planes-as-weapons plot targeting the US (see July 9, 2003). [Newsweek, 7/9/2003; New York Post, 7/10/2003] Many other media reports will identify him as being there. [Independent, 6/6/2002; CNN, 8/30/2002; CNN, 11/7/2002; Canadian Broadcasting Corporation, 10/29/2003] For instance, according to Newsweek: “Mohammed’s presence would make the intelligence failure of the CIA even greater. It would mean the agency literally watched as the 9/11 scheme was hatched—and had photographs of the attack’s mastermind… doing the plotting.” [Newsweek, 7/9/2003] In Hambali’s 2008 Guantanamo file, it will be mentioned that KSM stays a week at Sufaat’s condominium with Alhazmi and Almihdhar, which would seem to make clear that KSM is there for the entire duration of the summit (see Early January 2000). [US Department of Defense, 10/30/2008]
Khallad bin Attash - Khallad bin Attash, a “trusted member of bin Laden’s inner circle,” is in charge of bin Laden’s bodyguards, and serves as bin Laden’s personal intermediary at least for the USS Cole bombing. [Newsweek, 9/20/2001 pdf file] He is also thought to be a “mastermind” of that attack. Attash is reportedly planning to be one of the 9/11 hijackers, but will be unable to get a US visa. [9/11 Commission, 6/16/2004, pp. 8] US intelligence had been aware of his identity as early as 1995. [US Congress, 9/18/2002] A possibility to expose the 9/11 plot through bin Attash’s presence at this summit will be missed in January 2001 (see January 4, 2001). Bin Attash had been previously arrested in Yemen for suspected terror ties, but was let go (see Summer 1999). [Contemporary Southeast Asia, 12/1/2002] He will be captured in Pakistan by the US in April 2003 (see April 29, 2003). In 2008, Newsweek will report that bin Attash confessed during interrogation that, while staying at Sufaat’s condominium, he and Alhazmi talked “about the possibility of hijacking planes and crashing them or holding passengers as hostages.” [Newsweek, 12/16/2008]
Abd al-Rahim al-Nashiri - Al-Nashiri is one of al-Qaeda’s top field commanders and operates out of Malaysia while 9/11 is being prepared. [Los Angeles Times, 10/10/2001; Gunaratna, 2003, pp. 188; Graham and Nussbaum, 2004, pp. 59] He was involved in an arms smuggling plot (see 1997) and the East African embassy bombings (see August 22-25 1998), in which his cousin was martyred (see 10:35-10:39 a.m., August 7, 1998). He also organized the attack against the USS The Sullivans (see January 3, 2000), and will be involved in the attacks against the USS Cole (see October 12, 2000) and the Limburg (see October 6, 2002). He will be arrested in the United Arab Emirates in November 2002 (see Early October 2002). An al-Qaeda operative identified a photo of al-Nashiri for the FBI in late 1998 (see August 22-25 1998). [9/11 Commission, 7/24/2004, pp. 152-3] (Note: in the sources, al-Nashiri is referred to by two of his aliases: Muhammad Omar al-Harazi and Al Safani.) [CNN, 12/11/2000; Central Intelligence Agency, 9/6/2006]
Ramzi bin al-Shibh - Investigators believe he wants to be the 20th 9/11 hijacker. His presence at the summit may not be realized until after 9/11, despite the fact that US intelligence has a picture of him next to bin Attash, and has video footage of him. [Newsweek, 11/26/2001; Washington Post, 7/14/2002; Time, 9/15/2002; Die Zeit (Hamburg), 10/1/2002; CNN, 11/7/2002] German police will have credit card receipts indicating bin al-Shibh is in Malaysia at this time. [Los Angeles Times, 9/1/2002] Ulrich Kersten, director of Germany’s federal anticrime agency, the Bundeskriminalamt, will later say, “There are indications that Ramzi bin al-Shibh was in Kuala Lumpur for the meeting.” [New York Times, 8/24/2002] Another account noting he was photographed at the summit will further note that he enters and leaves Thailand three times in the first three weeks of January 2000. [Los Angeles Times, 10/17/2001] Anonymous Malaysian officials will later claim he is at the summit, but US officials will deny it. Two local militants who serve as drivers for the attendees will later be arrested in Malaysia. They will be shown photos of the attendees, and confirm that bin al-Shibh was at the summit. [Associated Press, 9/20/2002] One account will say he is recognized at the time of the summit, which makes it hard to understand why he is not tracked back to Germany and the Hamburg cell with Mohamed Atta and other 9/11 hijackers. [Der Spiegel (Hamburg), 10/1/2002] Another opportunity to expose the 9/11 plot through bin al-Shibh’s presence at this summit will be missed in June. It appears bin al-Shibh and Almihdhar are directly involved in the attack on the USS Cole in October 2000 (see October 10-21, 2000). [Guardian, 10/15/2001; Washington Post, 7/14/2002; Newsweek, 9/4/2002]
Salem Alhazmi - Alhazmi, a 9/11 hijacker and brother of Nawaf Alhazmi, is possibly at the summit, although very few accounts will mention it. [Australian, 12/24/2002] US intelligence intercepts from before the summit indicate that he at least had plans to attend. [US Congress, 7/24/2003, pp. 51 pdf file]
Abu Bara al-Taizi (a.k.a. Zohair Mohammed Said) - A Yemeni al-Qaeda operative, al-Taizi is reportedly meant to be one of the 9/11 hijackers, but will be unable to enter the US due to greater scrutiny for Yemenis. [9/11 Commission, 6/16/2004, pp. 8] Al-Taizi will be captured in Pakistan in February 2002, and then sent to the US prison in Guantanamo a few months later (see February 7, 2002). According to his 2008 Guantanamo file, he traveled from Afghanistan to Malaysia with bin Attash about two weeks before the summit. Bin Attash was missing a leg, and he had a prosthetic leg fitted and then stayed in the hospital to recover from the surgery. Bin Attash and al-Taizi stay at Sufaat’s house for the duration of the summit. Al-Taizi then flies to Yemen to visit his family there. [US Department of Defense, 10/25/2008]
Others - Unnamed members of the Egyptian-based Islamic Jihad are also said to be at the summit. [Cox News Service, 10/21/2001] Islamic Jihad merged with al-Qaeda in February 1998. [ABC News, 11/17/2001] However, according to the Wall Street Journal, bin Attash and Fahad al-Quso are suspected of being Islamic Jihad members at one point, so this may just be a reference to them. [Wall Street Journal, 10/8/2001] Note that there are a total of 10 names mentioned above, and it will be reported that the CIA learned that 11 operatives were to attend, so either not all of them make it, or some names of attendees will remain unknown.
Summit Associates - The following individuals are probably not at the summit meetings, but are in the region and assisting or linked with the attendees at this time:
Fahad Al-Quso - Al-Quso is a top al-Qaeda operative who is involved in the bombing of the USS Cole. Some sources will indicate al-Quso is present in Malaysia, and a person who looks like him will later be seen in a photograph of the meeting (see June 11, 2001). [Newsweek, 9/20/2001 pdf file] However, other sources will say al-Quso did not reach Kuala Lumpur, but met with bin Attash around this time in Bangkok, Thailand (see January 5-6, 2000 and January 8-15, 2000). [9/11 Commission, 7/24/2004, pp. 159; Wright, 2006, pp. 330] Although al-Quso apparently is not at the summit, there are a series of phone calls during the time of the summit between his hotel in Bangkok, a phone booth near the condominium where the summit is held, and his family home in Yemen (see (January 5-8, 2000)). Al-Quso will be arrested by Yemeni authorities in the fall of 2000 (see Late October-Late November 2000), but the FBI will not be given a chance to fully interrogate him before 9/11. He will escape from prison in 2003. [CNN, 5/15/2003]
Ahmad Sajuli Abdul Rahman - An operative of Jemaah Islamiyah, al-Qaeda’s Southeast Asian affiliate, Sajuli takes the visiting Arabs around Kuala Lumpur, but apparently does not attend the summit meetings. [US Congress, 10/17/2002] According to the later Guantanamo file of summit attendee al-Taizi, one of the attendees Sajuli escorts around town is future 9/11 hijacker Khalid Almihdhar. Sajuli also helps arrange al-Taizi’s transportation at the end of the summit. [US Department of Defense, 10/25/2008] Sajuli will be arrested in Malaysia in December 2001 (see December 29, 2001).
Ahmad Hikmat Shakir - A suspected al-Qaeda agent of Iraqi nationality, Shakir is a greeter at Kuala Lumpur airport. He meets Almihdhar there and travels with him to the apartment where the summit is held, but he probably does not attend the summit meetings. [Associated Press, 10/2/2002; Newsweek, 10/7/2002; Australian, 12/24/2002; Knight Ridder, 6/12/2004] After 9/11, he will be linked to the 1993 World Trade Center bombing and the 1995 Bojinka plot. Jordan will arrest him and let him go after the US says it doesn’t want to take custody of him (see September 17, 2001).
Dhiren Barot - Dhiren Barot (a.k.a. Abu Eissa al-Hindi) is a British citizen of Indian descent. According to a 2006 Observer article, Barot “is not believed to have been present” at the summit meetings. However, he does go to Kuala Lumpur during the time of the summit with summit attendee bin Attash. And shortly after the summit, Barot holds meetings with Hambali. It will later be reported that Barot is sent by KSM to New York City in early 2001 to case potential targets there, although whether this is part of the 9/11 plot or some other plot is unclear (see May 30, 2001). Barot will be arrested in 2004 in Britain for plotting attacks there, and sentenced to 30 years in prison (see August 3, 2004). [Observer, 12/12/2006]
Another Unnamed Local Militant - Malaysian officials will say that two local Jemaah Islamiyah act as drivers for the attendees. These drivers apparently have no idea who the attendees are or what they are doing; they are just tasked to drive them around. In a 2002 Associated Press article, officials will not name these drivers, but will say that they are among the dozens of alleged Jemaah Islamiyah militants arrested in December 2001 and January 2002. Since Sajuli mentioned above is arrested at that time, he presumably is one of these drivers. It is not known who the other driver is. (Sufaat will be arrested at that time as well, but the Associated Press article will make clear Sufaat is not one of the drivers.) [Associated Press, 9/20/2002]
Probably Not Involved: Mohamed al-Khatani - A Saudi, he allegedly will confess to attending the summit while being held in the US Guantanamo prison (see July 2002). He apparently will unsuccessfully attempt to enter the US in August 2001 to join the 9/11 plot (see August 4, 2001). However, al-Khatani will later recant his testimony and say he lied to avoid torture (see October 26, 2006). Furthermore, his 2008 Guantanamo file, leaked to the public in 2011, contains no hint of him even possibly attending the summit. The contents of the file must be treated with extreme caution, especially since he is repeatedly and brutally tortured (see August 8, 2002-January 15, 2003 and January 14, 2009). But according to the general narrative of the file, al-Khatani had no involvement with Islamist militancy in early 2000, only starts to get involved with militants in mid-2000, and first attends a militant training camp in Afghanistan in late 2000. [US Department of Defense, 10/30/2008]

Entity Tags: Hambali, Abu Bara al-Taizi, Dhiren Barot, Central Intelligence Agency, Ahmad Hikmat Shakir, Ahmad Sajuli Abdul Rahman, Al-Qaeda, Abd al-Rahim al-Nashiri, Islamic Jihad, Jemaah Islamiyah, Fahad al-Quso, Khalid Shaikh Mohammed, Ulrich Kersten, Yazid Sufaat, Khalid Almihdhar, Ramzi bin al-Shibh, Salem Alhazmi, Mohamed al-Khatani, Malaysian Secret Service, Khallad bin Attash, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Victims’ family members Lorie Van Auken (right) and Kristen Breitweiser (left) are shocked to learn Tom Wilshire blocked a cable to the FBI about Khalid Almihdhar’s visa. Victims’ family members Lorie Van Auken (right) and Kristen Breitweiser (left) are shocked to learn Tom Wilshire blocked a cable to the FBI about Khalid Almihdhar’s visa. [Source: Banded Artists]Doug Miller, an FBI agent assigned to Alec Station, the CIA’s bin Laden unit, reads CIA cables reporting that 9/11 hijacker Khalid Almihdhar has a US visa and drafts a cable to the FBI to inform it of this. The CIA obtained the information through a tap on Almihdhar’s phone in Yemen (see December 29, 1999) and by monitoring him as he passed through Dubai (see January 2-5, 2000) on his way to an al-Qaeda summit in Malaysia (see January 5-8, 2000).
Draft Cable - Miller writes that Almihdhar has a US visa (see April 3-7, 1999) and that the visa application states his destination is New York and he intends to stay for three months. The draft cable mentions the tap on Almihdhar’s phone, his planned travel to Malaysia, and the links between his phone and the 1998 East African embassy bombings (see 10:35-10:39 a.m., August 7, 1998 and October 4, 2001). It also says that the CIA has obtained photographs of Almihdhar and these will be sent separately. Miller asks the FBI for feedback resulting from an FBI investigation.
Blocked - Another CIA officer named Michael Anne Casey accesses Miller’s draft about an hour after he writes it. The cable is then blocked on the orders of the station’s deputy chief, Tom Wilshire, as a few hours after Miller drafts the cable Casey attaches a message to it saying, “pls hold off on [cable] for now per [Tom Wilshire].” [9/11 Commission, 7/24/2004, pp. 502; US Department of Justice, 11/2004, pp. 240 pdf file] Miller is also told, “This is not a matter for the FBI.” [Wright, 2006, pp. 311]
'No Reason to Kill the Message' - Author James Bamford will later comment: “A potential terrorist and member of al-Qaeda was heading for the US, the FBI’s jurisdiction—its turf—and he [Miller] was putting the FBI on notice so it could take action. There was no reason to kill the message.” [Bamford, 2008, pp. 19] Miller will later say he has no “rational answer” as to why the cable was blocked, but will speculate that Alec Station officers were annoyed he had encroached on their territory. [Congressional Quarterly, 10/1/2008] Casey drafts a cable falsely saying that the information about Almihdhar’s visa has been shared with the FBI (see Around 7:00 p.m. January 5, 2000) and there will be a discussion the next day about whether the cable should be sent (see January 6, 2000). The Justice Department’s Office of Inspector General will later call the failure to pass the information to the FBI a “significant failure” but will be unable to determine why the information was not passed on. [US Department of Justice, 11/2004, pp. 250 pdf file] The 9/11 Commission will know of the incident, but will relegate it to an endnote in its final report, omitting Wilshire’s role entirely. [9/11 Commission, 7/24/2004, pp. 502] The CIA inspector general will falsely claim that the cable is not sent, “[a]pparently because it was in the wrong format or needed editing.” [Central Intelligence Agency, 6/2005, pp. xv pdf file]

Entity Tags: Michael Anne Casey, Federal Bureau of Investigation, Khalid Almihdhar, Doug Miller, 9/11 Commission, Alec Station, Tom Wilshire, Central Intelligence Agency, Office of the Inspector General (CIA)

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The al-Qaeda summit in Malaysia (see January 5-8, 2000) ends and the participants leave. Hijackers Nawaf Alhazmi and Khalid Almihdhar fly to Bangkok, Thailand, with al-Qaeda leader Khallad bin Attash (see January 8, 2000). Other attendees depart to other locales. There have been no media reports that any of the others were followed by intelligence agents. [Associated Press, 9/20/2002; US Congress, 7/24/2003, pp. 131 pdf file] Before the summit started the CIA knew one attendee was named Khalid Almihdhar and that another had the first name Nawaf. At the end of the summit the CIA appears to have learned little more, and still does not know Nawaf’s last name is Alhazmi. Around this time, on January 7 and 10, the CIA searches for their names in their databases but get no hits. Yet they don’t ask for a search of the much larger NSA databases, which had vital information on them (see Early 1999). CIA headquarters asks the NSA to put Almihdhar on their watch list so they can pass on more information about him (see Mid-January 2000). However, neither Alhazmi nor Almihdhar are placed on the State Department’s watch list, which would actually prevent them from coming to the US. [9/11 Commission, 1/26/2004] The CIA still fails to tell the FBI that Almihdhar has a valid US visa, and in fact seems to go out of their way not to tell the FBI about it (see 9:30 a.m. - 4:00 p.m. January 5, 2000, January 6, 2000, Mid-July 2004, and January 5-6, 2000). [US Congress, 7/24/2003, pp. 131 pdf file; Stern, 8/13/2003]

Entity Tags: Central Intelligence Agency, Khalid Almihdhar, Al-Qaeda, Nawaf Alhazmi, Khallad bin Attash

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The CIA fails to ask the NSA for information about Nawaf Alhazmi. The CIA is monitoring a summit of al-Qaeda operatives in Kuala Lumpur, Malaysia, along with local authorities there (see January 5-8, 2000), and is aware that one of the attendees is sometimes referred to by the first name Nawaf, and one is sometimes referred to by the last name Alhazmi. However, it apparently fails to put these two names together (see January 8-9, 2000). If asked, the NSA, which has been monitoring Alhazmi’s calls for at least a year (see Early 1999), could easily have realized “Nawaf” and “Alhazmi” were the same person. The 9/11 Commission will comment, “NSA’s analysts would promptly have discovered who Nawaf was, that his full name might be Nawaf Alhazmi, and that he was an old friend of Khalid [Almihdhar].” [US Congress, 7/24/2003, pp. 145 pdf file; 9/11 Commission, 7/24/2004, pp. 353-4] The CIA does actually tell the NSA about Almihdhar and ask for information about him (see January 10, 2000 and Mid-January 2000), but, according to author James Bamford, “inexplicably” does not do this for Alhazmi. [US Congress, 7/24/2003, pp. 156 pdf file; Bamford, 2004, pp. 227] According to NSA director Michael Hayden, had the NSA been asked at this point, it may also have been able to identify Nawaf Alhazmi’s brother Salem, another of the hijackers. [US Congress, 7/24/2003, pp. 145 pdf file]

Entity Tags: National Security Agency, Central Intelligence Agency, Michael Hayden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The CIA sends the NSA some information about 9/11 hijacker Khalid Almihdhar, including information about al-Qaeda’s Malaysia summit (see January 5-8, 2000), which Almihdhar attended, as well as the name of a person who helped him in Kuala Lumpur, where the summit was held. The NSA is also told Almihdhar’s primary purpose for coming to Malaysia was to meet with other people. The CIA knows Almihdhar has a US visa (see January 2-5, 2000), but it is unclear whether the NSA is informed of this. [US Congress, 7/24/2003, pp. 156 pdf file] At this time, the NSA has some information about Almihdhar, whose calls it has been intercepting for at least a year (see Early 1999, Summer 1999, Late Summer 1999, and Shortly Before December 29, 1999), that has not been disseminated. In particular, the NSA seems to have overheard something in early 1999 that should have been disseminated, but was not. This new information from the CIA does not cause the NSA to re-examine its material on Almihdhar or disseminate any important information to other US agencies. However, Almihdhar is subsequently put on the NSA watchlist (see Mid-January 2000) and the NSA intercepts calls between his home in Yemen and him in the US (see Spring-Summer 2000), but fails to alert the FBI to his presence in the US (see (Spring 2000)).

Entity Tags: National Security Agency, Central Intelligence Agency, Counterterrorist Center, Khalid Almihdhar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The CIA station in Bangkok, Thailand, sends a cable to Alec Station, the CIA’s bin Laden unit, saying that it is unable to locate 9/11 hijacker Khalid Almihdhar and two companions, who turn out to be 9/11 hijacker Nawaf Alhazmi and al-Qaeda leader Khallad bin Attash, in Bangkok. The three had been under surveillance in Malaysia (see January 5-8, 2000), but the CIA’s Bangkok station had been unable to pick them up at the airport when they flew to Thailand on January 8 (see January 8, 2000 and January 8, 2000). According to an official, this was because “when they arrived we were unable to mobilize what we needed to mobilize.” Despite the high priority allocated to the search by CIA headquarters (see January 9, 2000) and the fact bin Attash was under surveillance in Malaysia when he called the hotel where the three are staying in Bangkok (see (January 5-8, 2000)), they cannot be found. The precise steps taken to locate them are unknown. [9/11 Commission, 1/26/2004 pdf file; 9/11 Commission, 7/24/2004, pp. 181, 502; US Department of Justice, 11/2004, pp. 247 pdf file]

Entity Tags: Nawaf Alhazmi, Central Intelligence Agency, Khalid Almihdhar, Alec Station, Khallad bin Attash, CIA Bangkok Station

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Following a request by the CIA, the NSA puts hijacker 9/11 Khalid Almihdhar on its watch list. This means that the NSA should pass details of any new monitored communications involving him to the CIA. [US Congress, 7/24/2003, pp. 157 pdf file; 9/11 Commission, 1/26/2004, pp. 6 pdf file] The CIA is looking for Almihdhar and knows he has a US visa (see January 13, 2000), but fails to add him to the State Department’s watch list until 19 months later (see August 23, 2001). The 9/11 Congressional Inquiry will later state: “In mid-January 2000, NSA queried its databases for information concerning Khaled [redacted]. These queries remained active until May 2000, but did not uncover any information.” In fact, the NSA intercepts eight of Almihdhar’s calls from San Diego to Yemen during this time and even gives some details about some of the calls to the FBI (see Spring-Summer 2000). However, they do not tell the CIA everything about them, despite the watch list requirement to provide the information. It is not clear why the NSA failed to share this with the CIA. It is also not known if or when Almihdhar was removed from the NSA watch list before 9/11. [US Congress, 7/24/2003, pp. 157 pdf file]

Entity Tags: Khalid Almihdhar, Central Intelligence Agency, 9/11 Congressional Inquiry, National Security Agency, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Omar al-Bayoumi.Omar al-Bayoumi. [Source: Fox News]Omar al-Bayoumi, a suspected Saudi spy, goes to great lengths to help future 9/11 hijackers Nawaf Alhazmi and Khalid Almihdhar settle in San Diego. Supposedly, al-Bayoumi meets them by chance in a Los Angeles restaurant and encourages them to move to San Diego, but the accounts of the meeting are highly doubtful (see February 1, 2000). The FBI’s “best source” in San Diego will later say that al-Bayoumi “must be an intelligence officer for Saudi Arabia or another foreign power.” A former top FBI official working on the al-Bayoumi investigation claims, “We firmly believed that he had knowledge [of the 9/11 plot], and that his meeting with them that day was more than coincidence.” [Newsweek, 7/28/2003]
bullet When Alhazmi and Almihdhar move into apartment 150 in the Parkwood Apartments in San Diego in early February, they indicate on their rental application that they have been staying at al-Bayoumi’s apartment in the same apartment complex since January 15, the day they arrived in the US (see January 15-February 2, 2000). (This would suggest the alleged accidental restaurant meeting never took place.) [Federal Bureau of Investigation, 10/3/2001 pdf file]
bullet He is the co-signer and guarantor for their rental application, because they do not have established credit. [Federal Bureau of Investigation, 10/3/2001 pdf file]
bullet He pays $1,500 cash for their first month’s rent and security deposit. Some FBI officials claim the hijackers immediately pay him back, others claim they do not. [Newsweek, 11/24/2002; US Congress, 7/24/2003 pdf file]
bullet The apartment manager will later claim al-Bayoumi occasionally paid rent for Alhazmi and Almihdhar on other occasions. [Federal Bureau of Investigation, 10/3/2001 pdf file]
bullet Shortly after they arrive in San Diego, al-Bayoumi throws a welcoming party to introduce them to the local Muslim community. [Washington Post, 12/29/2001] One attendee will later say an al-Bayoumi party “was a big deal… it meant that everyone accepted them without question.” [San Diego Union-Tribune, 10/25/2001]
bullet He also introduces hijacker Hani Hanjour to the community a short time later, and Hanjour is seen in his apartment later in the year (see Early 2000). [San Diego Union-Tribune, 9/14/2002]
bullet Cayson Bin Don, a friend of al-Bayoumi, will later say al-Bayoumi “spent a lot of time at Alhazmi and Almihdhar’s apartment.” [Federal Bureau of Investigation, 10/8/2001 pdf file]
bullet Al-Bayoumi apparently loans the hijackers his cell phone until they can get phone service in their own apartment. On February 15, 2000, someone trying to call al-Bayoumi on his phone has the call answered by Alhazmi instead. [9/11 Commission, 7/24/2004, pp. 516]
bullet He tasks an acquaintance, Mohdar Abdullah, to serve as their translator and help them get driver’s licenses, Social Security cards, information on flight schools, and more. [San Diego Union-Tribune, 9/14/2002; US Congress, 7/24/2003 pdf file]

Entity Tags: Hani Hanjour, Omar al-Bayoumi, Nawaf Alhazmi, Khalid Almihdhar, Federal Bureau of Investigation, Mohdar Abdullah, Cayson Bin Don

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

While the 9/11 hijackers are in the US, the NSA intercepts several calls between them and an al-Qaeda communications hub in Sana’a, Yemen, run by Ahmed al-Hada, who is hijacker Khalid Almihdhar’s father-in-law (see August 4-25, 1998).
Summary of Calls -
bullet The first calls are made by Almihdhar and are intercepted during the spring and summer of 2000 (see Spring-Summer 2000).
bullet More calls are made by hijacker Nawaf Alhazmi after the bombing of the USS Cole in October 2000 (see Mid-October 2000-Summer 2001).
bullet The final call from the US is intercepted just a few weeks before 9/11 (see (August 2001)).
The NSA intercepted the hijackers’ calls outside the US before this (see Early 1999 and December 29, 1999) and continues to do so in 2000 (see Summer 2000) after Almihdhar returns to Yemen (see June 10, 2000 and (Mid-June-Mid-July 2000)).
Calls' Content - Some of the calls may only contain non-operational information, as they are reportedly between Almihdhar and his wife. [9/11 Commission, 7/24/2004, pp. 222; Suskind, 2006, pp. 94; Wright, 2006, pp. 343] However, the calls are also used to relay messages to the 9/11 hijackers. [Embassy of Yemen (Washington), 2/13/2002; MSNBC, 2/14/2002; MSNBC, 5/2005]
Agencies' Roles - The CIA is the lead agency monitoring the communications hub. It has planted bugs inside it and is wiretapping all calls (see Late August 1998). Intercepts of calls to and from the hub are a major plank of the US intelligence community’s effort to fight al-Qaeda. Also involved is the FBI, which is using phone records to plot these calls on a map (see Late 1998-Early 2002). Some of the calls intercepted by US intelligence come from Osama bin Laden’s satellite phone in Afghanistan (see August 4-25, 1998 and Late August 1998). After 9/11, counterterrorism officials will say that the number was one of the hottest targets being monitored by the NSA and was an “intelligence bonanza.” [Los Angeles Times, 12/21/2005; Wright, 2006, pp. 343]
Importance of Failure - Also after 9/11, counterterrorism officials will agree that the failure to follow leads to the US from this number was a huge missed opportunity to stop the 9/11 plot. For instance, FBI agent Kenneth Maxwell will say: “Two al-Qaeda guys living in California—are you kidding me? We would have been on them like white on snow: physical surveillance, electronic surveillance, a special unit devoted entirely to them.” [MSNBC, 7/21/2004; New Yorker, 7/10/2006 pdf file]
Discussed after 9/11 - The failure to roll up the plot based on these communications intercepts will be discussed following 9/11 (see Summer 2002-Summer 2004 and March 15, 2004 and After).

Entity Tags: Federal Bureau of Investigation, Central Intelligence Agency, Khalid Almihdhar, Nawaf Alhazmi, National Security Agency, Hoda al-Hada, Ahmed al-Hada, Kenneth Maxwell

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijackers Nawaf Alhazmi and Khalid Almihdhar open an account at the Bank of America in San Diego with a $9,900 deposit. The 9/11 Commission will later report, “The $16,000 that [Khalid Shaikh Mohammed] said he gave Alhazmi to support his and Almihdhar’s travel and living expenses in the United States is the likely source of their funds.” [9/11 Commission, 8/21/2004, pp. 135-136 pdf file] The account is closed in early June when Almihdhar returns to the Middle East (see June 10, 2000). [9/11 Commission, 7/24/2004, pp. 222]

Entity Tags: Khalid Almihdhar, Nawaf Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mike Frost.Mike Frost. [Source: NineMSN]One of the few commercial media reports about Echelon, the NSA’s global surveillance network (see April 4, 2001), appears on CBS’s 60 Minutes. The report is disturbing in its portrayal of Echelon as a surveillance system capable of, in host Steve Kroft’s words, capturing “virtually every electronic conversation around the world.” Kroft continues, “[V]irtually every signal radiated across the electromagnetic spectrum is being collected and analyzed,” including land line and cell phone signals, ATM transactions, fax machines,public and private radio broadcasts, even baby monitors. Mike Frost, a former intelligence officer for the CSE, the Canadian equivalent of the National Security Agency which often works closely with the NSA, says, “The entire world, the whole planet” is being surveilled. “Echelon covers everything that’s radiated worldwide at any given instant.… Every square inch is covered.” Listening stations around the world transmit their data to the NSA’s headquarters at Fort Meade, Maryland, where, as Kroft says, “acres of supercomputers scan millions of transmissions word by word, looking for key phrases and, some say, specific voices that may be of major significance.” Frost adds, “Everything is looked at. The entire take is looked at. And the computer sorts out what it is told to sort out, be it, say, by key words such as ‘bomb’ or ‘terrorist’ or ‘blow up,’ to telephone numbers or—or a person’s name. And people are getting caught, and—and that’s great.” Echelon is so secret that even its successes are not publicly documented, though it is believed that, among other successes, it helped capture international terrorist “Carlos the Jackal,” and helped identify two Libyans accused of planting a bomb on PanAm Flight 103 [CBS News, 2/27/2000] which exploded over Lockerbie, Scotland in 1988, killing 270 people. [Washington Post, 12/22/1988] “I say, never over-exaggerate the capacity of a system such as Echelon,” Frost noted in a 1999 interview with the Australian press. “Never ever over-exaggerate the power that these organizations have to abuse a system such as Echelon. Don’t think it can’t happen in Australia. Don’t think it can’t happen in Canada, because it does.” [NineMSN, 5/23/1999]
Monitoring Legal Conversations - As successful as Echelon has been in capturing terrorists, international drug dealers, and various criminals, it has raised serious concerns for its capability of monitoring ordinary, innocent civilians. Frost says that such monitoring happens every day: “Not only possible, not only probable, but factual. While I was at CSE, a classic example: A lady had been to a school play the night before, and her son was in the school play and she thought he did a—a lousy job. Next morning, she was talking on the telephone to her friend, and she said to her friend something like this, ‘Oh, Danny really bombed last night,’ just like that. The computer spit that conversation out. The analyst that was looking at it was not too sure about what the conversation w—was referring to, so erring on the side of caution, he listed that lady and her phone number in the database as a possible terrorist.” Though the NSA has a long and checkered history of spying on American citizens, including extensive monitoring of antiwar and civil rights protesters during the 1970s, the agency refuses to provide any information about its activities—not to the public and not even to Congress. Congressman Bob Barr (R-GA) has for years pressed for more information about the program, which he recently said “engages in the interception of literally millions of communications involving United States citizens.” Even the chairman of the House Intelligence Committee, Porter Goss (R-FL) had trouble getting information when he requested it last year. At the time, Goss said, “[T]here was some information about procedures in how the NSA people would employ some safeguards, and I wanted to see all the correspondence on that to make sure that those safeguards were being completely honored. At that point, one of the counsels of the NSA said, ‘Well, we don’t think we need to share this information with the Oversight Committee.’ And we said, ‘Well, we’re sorry about that. We do have the oversight, and you will share the information with us,’ and they did.” Goss had to threaten to cut the NSA’s budget before the agency would share even limited information with him. When asked how he can be sure the NSA isn’t listening in on ordinary citizens’ communications, Goss merely says, “We do have methods for that, and I am relatively sure that those procedures are working very well.”
Princess Diana, Human Rights Organizations Monitored - Evidence presented in the broadcast also suggests the NSA was monitoring Princess Diana (see November 30, 1998), as well as Amnesty International, Greenpeace, and other groups (see February 27, 2000). [CBS News, 2/27/2000]
British Ministers Monitored - Frost cites an instance where then-Prime Minister Margaret Thatcher monitored two of her own ministers (see 1983).
Americans Monitored - Former NSA contractor Margaret Newsham recalls hearing a monitored conversation featuring then-Senator Strom Thurmond (see April, 1988). Frost is not surprised. “Oh, of course it goes on,” he says. “Been going on for years. Of course it goes on.” Kroft asks, “You mean the National Security Agency spying on politicians in… in the United States?” Frost replies, “Sounds ludicrous, doesn’t it? Sounds like the world of fiction. It’s not; not the world of fiction. That’s the way it works. I’ve been there. I was trained by you guys” (see 1980s). Goss seems less concerned. He says that it is “[c]ertainly possible that something like that could happen. The question is: What happened next?… It is certainly possible that somebody overheard me in a conversation. I have just been in Europe. I have been talking to people on a telephone and elsewhere. So it’s very possible somebody could have heard me. But the question is: What do they do about it? I mean, I cannot stop the dust in the ether; it’s there. But what I can make sure is that it’s not abused—the capability’s not abused, and that’s what we do.”
Used for Corporate Advantage - In 2001, the European Parliament released a report listing many of Echelon’s surveillance stations around the world and detailing their capabilities (see July 11, 2001). Kroft notes, “The report says Echelon is not just being used to track spies and terrorists. It claims the United States is using it for corporate and industrial espionage as well, gathering sensitive information on European corporations, then turning it over to American competitors so they can gain an economic advantage.”
Encryption Effective? - European governments and corporations are encrypting more and more of their phone, fax, and e-mail transmissions to keep Echelon from listening in. In response, the US government is pressuring the Europeans to give US law enforcement and intelligence agencies software keys so that they can unlock the code in matters of national security. Parliament member Glyn Ford is not opposed to the idea in principle: “[I]f we are not assured that that is n—not going to be abused, then I’m afraid we may well take the view, ‘Sorry, no.’ In [Britain], it’s traditional for people to leave a key under the doormat if they want the neighbors to come in and—and do something in their house. Well, we’re neighbors, and we’re not going to leave the electronic key under the doormat if you’re going to come in and steal the family silver.” The NSA, CSE, and even Echelon are necessary evils, Ford acknowledges, but, “My concern is no accountability and nothing—no safety net in place for the innocent people that fall through the cracks. That’s my concern.” [CBS News, 2/27/2000]

Entity Tags: Greenpeace, Wayne Madsen, Glyn Ford, Echelon, Communications Security Establishment, Central Intelligence Agency, Amnesty International, Strom Thurmond, Electronic Privacy Information Center, Steve Kroft, Princess Diana, Mike Frost, Margaret Thatcher, Margaret Newsham, National Security Agency, Robert “Bob” Barr, House Intelligence Committee, Porter J. Goss, Ilich Ramírez Sanchez

Timeline Tags: Civil Liberties

Around eight calls made by hijacker Khalid Almihdhar from San Diego to an al-Qaeda communications hub in Sana’a, Yemen, run by his father-in-law Ahmed al-Hada are intercepted by the NSA. [US Congress, 7/24/2003, pp. xii, 16-17, 157 pdf file; Los Angeles Times, 12/21/2005; Wright, 2006, pp. 343; New Yorker, 7/10/2006 pdf file] At least one of the calls is made from a phone registered to hijacker Nawaf Alhazmi in their San Diego apartment. [US Department of Justice, 11/2004, pp. 251 pdf file] Other calls are made from a mobile phone registered to Alhazmi. [McDermott, 2005, pp. 296] Calls may also be made from the communications hub to the US. [MSNBC, 7/21/2004]
Dates of Calls - One of the calls takes place days after they move into their San Diego apartment in February (see January 15-February 2000). [MSNBC, 7/21/2004] Another is on March 20, 2000 and lasts 16 minutes. [Federal Bureau of Investigation, 10/2001, pp. 57 pdf file; US Department of Justice, 11/2004, pp. 251 pdf file]
Intercepted by NSA - Although NSA analysts pick up Almihdhar’s first name, “Khalid,” they do not connect it to his second name, even though the NSA has been intercepting communications to and from the hub involving him throughout 1999 (see Early 1999 and December 29, 1999) and he is on the NSA watch list at this point (see Mid-January 2000). [US Congress, 7/24/2003, pp. xii, 16, 157 pdf file; US News and World Report, 3/15/2004] Some, or perhaps all, of these calls are between Almihdhar and his wife, who lives at the communications hub and reportedly gives birth to a daughter in early 2000 while Almihdhar is in the US. [9/11 Commission, 7/24/2004, pp. 222; Suskind, 2006, pp. 94; Wright, 2006, pp. 343; New Yorker, 7/10/2006 pdf file] However, the NSA analysts suspect that Khalid is part of an “operational cadre.” [US News and World Report, 3/15/2004]
Dissemination and Content - According to the 9/11 Congressional Inquiry, the NSA disseminates some of this information to the FBI, CIA, and other agencies, but not all of it, as it apparently does not meet reporting thresholds. It is unclear why it does not meet such thresholds, although some sources will suggest Almihdhar was just talking to his wife. [US Congress, 7/24/2003, pp. 157 pdf file; US News and World Report, 3/15/2004; 9/11 Commission, 7/24/2004, pp. 222; Suskind, 2006, pp. 94] Another source suggests operational information was passed on during the calls (see Early 2000-Summer 2001). However, two FBI agents who worked on al-Qaeda cases relating to Yemen, Dan Coleman and Ali Soufan, will later claim that they and other senior counterterrorism officials only learn about these calls after 9/11. [Los Angeles Times, 12/21/2005; Suskind, 2006, pp. 94; New Yorker, 7/10/2006 pdf file]
Significance - Author Lawrence Wright will comment: “You know, this is the key. The NSA is all over this phone. And everybody, you know, that has any connection with it is drawing links from that phone. Now imagine eight lines from Yemen to San Diego. How obvious would it be that al-Qaeda is in America[?]” [Federal News Service, 10/5/2006]
Other Calls - The NSA also intercepts various other communications between the hijackers and the communications hub (see Early 2000-Summer 2001).

Entity Tags: Ahmed al-Hada, Al-Qaeda, Salem Alhazmi, Khalid Almihdhar, Nawaf Alhazmi, National Security Agency, Osama bin Laden, Lawrence Wright, 9/11 Congressional Inquiry

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

After being prompted by CIA colleagues in Kuala Lumpur, Malaysia, to provide information about what happened to future 9/11 hijackers Nawaf Alhazmi and Khalid Almihdhar and al-Qaeda leader Khallad bin Attash after they flew from Malaysia to Thailand on January 8, 2000 (see January 8, 2000 and (February 25, 2000)), the CIA station in Bangkok, Thailand, sends out a cable saying that Alhazmi arrived in the US from Thailand with an apparently unnamed companion on January 15 (see January 15, 2000). This information was received from Thai intelligence, which watchlisted Almihdhar and Alhazmi after being asked to do so by the CIA (see January 13, 2000 and January 15, 2000). [New York Times, 10/17/2002; 9/11 Commission, 7/24/2004, pp. 181, 502]
Companion - The companion to whom the cable refers is presumably Almihdhar. According to later testimony of a senior FBI official, the CIA learns the companion is Almihdhar at this time: “In March 2000, the CIA received information concerning the entry of Almihdhar and Alhazmi into the United States.” [US Congress, 9/20/2002] The CIA disputes this, however. [US Congress, 7/24/2003, pp. 157 pdf file] If the companion the cable refers to is Almihdhar, then it is unclear why he would not be named, as the NSA has been intercepting his calls for at least a year (see Early 1999), he was under CIA surveillance earlier in January (see January 5-8, 2000), he is known to have a US visa (see January 2-5, 2000), he is associated with Alhazmi (see January 8-9, 2000), and this cable is prompted by another cable specifically asking where Almihdhar is (see February 11, 2000).
Missed Opportunity - Later, CIA officials, including CIA Director George Tenet and Counterterrorist Center Director Cofer Black, will admit that this was one of the missed opportunities to watchlist the hijackers. Black will say: “I think that month we watchlisted about 150 people. [The watchlisting] should have been done. It wasn’t.” Almihdhar and Alhazmi will not be added to the US watchlist until August 2001 (see August 23, 2001). [New York Times, 10/17/2002; US Congress, 7/24/2003, pp. 157 pdf file]
Unclear Who Reads Cable - Although Tenet will tell the 9/11 Congressional Inquiry that nobody at CIA headquarters reads this cable at this time (see October 17, 2002), the CIA’s inspector general will conclude that “numerous” officers access this cable and others about Almihdhar. [US District Court for the Eastern District of Virginia, Alexandria District, 3/28/2006 pdf file] These officers are not named, but Tom Wilshire, the CIA’s deputy unit chief in charge of monitoring the two men at this time, will access it in May 2001 at the same time as he accesses other cables about Almihdhar from early 2000 (see May 15, 2001). The 9/11 Commission will say that the cables are “reexamined” at this time, suggesting that Wilshire may have read them before. [9/11 Commission, 7/24/2004, pp. 267, 537] Wilshire certainly did access at least two of the cables in January 2000, indicating he may read the cable about the arrival of Alhazmi and the unnamed companion in the US in March 2000. [US Department of Justice, 11/2004, pp. 240, 282 pdf file]
FBI Not Informed - The knowledge that Alhazmi has entered the US will be disseminated throughout the CIA, but not to the FBI or other US intelligence agencies (see March 6, 2000 and After). When asked about the failure by the 9/11 Congressional Inquiry, Wilshire will be unable to explain it, saying: “It’s very difficult to understand what happened with that cable when it came in. I do not know exactly why it was missed. It would appear that it was missed completely.” [US Congress, 9/20/2002]

Entity Tags: Federal Bureau of Investigation, Central Intelligence Agency, Nawaf Alhazmi, CIA Bangkok Station, 9/11 Commission, 9/11 Congressional Inquiry, Alec Station, Tom Wilshire, Khalid Almihdhar, Malaysian Secret Service

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

According to the 2008 charge sheet at his military tribunal, 9/11 facilitator Ali Abdul Aziz Ali speaks on the telephone to 9/11 hijacker Nawaf Alhazmi, who is living in San Diego at this time. The call or calls are apparently made at the direction of alleged 9/11 mastermind Khalid Shaikh Mohammed and are about a wire transfer from Ali to Alhazmi made in mid-April (see April 16-18, 2000). The source of the claim that the calls are made contained in the charge sheet is not specified, so it is unclear whether it is only based on statements made by detainees under interrogation, which may be unreliable (see June 16, 2004), or whether it is corroborated by other evidence, such as phone company records. [US Department of Defense, 2/11/2008 pdf file] At least some calls between Alhazmi and his partner, hijacker Khalid Almihdhar, and an al-Qaeda communications hub in Yemen are being monitored by the NSA at this point (see Spring-Summer 2000). However, it is unclear whether the call or calls to Ali are picked up by the NSA, or a joint CIA-NSA program to support “black ops” in progress at this time (see After July 11, 1997).

Entity Tags: Ali Abdul Aziz Ali, Nawaf Alhazmi, Al-Qaeda, Khalid Shaikh Mohammed

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Abdussattar Shaikh.
Abdussattar Shaikh. [Source: courtesy Daniel Hopsicker]While future 9/11 hijackers Nawaf Alhazmi and Khalid Almihdhar live in the house of an FBI informant, Abdussattar Shaikh, the asset continues to have contact with his FBI handler. The handler, Steven Butler, later claims that during the summer, Shaikh mentions the names “Nawaf” and “Khalid” in passing and says that they are renting rooms from him. [Newsweek, 9/9/2002; US Congress, 7/24/2003, pp. 51 pdf file; Associated Press, 7/25/2003; 9/11 Commission, 4/23/2004; 9/11 Commission, 7/24/2004, pp. 220] In early media reports after 9/11, the two will be said to have moved in around September 2000, but the 9/11 Congressional Inquiry will imply that Shaikh lied about this, and they moved in much earlier. Alhazmi stays until December (see December 12, 2000-March 2001); Almihdhar appears to be mostly out of the US after June (see June 10, 2000). [San Diego Union-Tribune, 9/16/2001; Wall Street Journal, 9/17/2001; South Florida Sun-Sentinel, 9/28/2001; US Congress, 7/24/2003, pp. 157 pdf file] On one occasion, Shaikh tells Butler on the phone he cannot talk because Khalid is in the room. [Newsweek, 9/9/2002]
Shaikh Refuses to Reveal Hijackers' Last Names Despite Suspicious Contacts - Shaikh tells Butler Alhazmi and Almihdhar are good, religious Muslims who are legally in the US to visit and attend school. Butler asks Shaikh for their last names, but Shaikh refuses to provide them. Butler is not told that they are pursuing flight training. Shaikh tells Butler that they are apolitical and have done nothing to arouse suspicion. However, according to the 9/11 Congressional Inquiry, he later admits that Alhazmi has “contacts with at least four individuals [he] knew were of interest to the FBI and about whom [he] had previously reported to the FBI.” Three of these four people are being actively investigated at the time the hijackers are there. [US Congress, 7/24/2003, pp. 51 pdf file] The report will mention Osama Mustafa as one, and Shaikh will admit that suspected Saudi agent Omar al-Bayoumi was a friend. [US Congress, 7/24/2003, pp. 51 pdf file; Los Angeles Times, 7/25/2003] Alhazmi and Shaikh will remain in contact after Alhazmi leaves San Diego in December. Alhazmi will call Shaikh to tell him he intends to take flying lessons in Arizona and that Almihdhar has returned to Yemen. He also will e-mail Shaikh three times; one of the e-mails is signed “Smer,” an apparent attempt to conceal his identity, which Shaikh later says he finds strange. However, Alhazmi will not reply to e-mails Shaikh sends him in February and March of 2001. [9/11 Commission, 7/24/2004, pp. 223]
Best Chance to Stop the 9/11 Plot? - The FBI will later conclude that Shaikh is not involved in the 9/11 plot, but it has serious doubts about his credibility. After 9/11 he will give inaccurate information and has an “inconclusive” polygraph examination about his foreknowledge of the 9/11 attack. The FBI will believe he had contact with another of the 9/11 hijackers, Hani Hanjour, but claimed not to recognize him. There will be other “significant inconsistencies” in Shaikh’s statements about the hijackers, including when he first met them and his later meetings with them. The 9/11 Congressional Inquiry will conclude that had the asset’s contacts with the hijackers been capitalized upon, it “would have given the San Diego FBI field office perhaps the US intelligence community’s best chance to unravel the September 11 plot.” [US Congress, 7/24/2003, pp. 51 pdf file] The FBI will try to prevent Butler and Shaikh from testifying before the 9/11 Congressional Inquiry in October 2002. Butler will end up testifying (see October 9, 2002), but Shaikh will not (see October 5, 2002). [Washington Post, 10/11/2002]

Entity Tags: Hani Hanjour, Khalid Almihdhar, Omar al-Bayoumi, Osama (“Sam”) Mustafa, Nawaf Alhazmi, Federal Bureau of Investigation, Steven Butler, Abdussattar Shaikh

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The Justice Department’s Office of Intelligence Policy and Review (OIPR), which helps obtain warrants under the Foreign Intelligence Surveillance Act (FISA), discovers errors in several al-Qaeda related FISA applications under a counterterrorist program called “Catcher’s Mitt.” The OIPR verbally notifies the FISA Court of the errors, which are mostly in affidavits submitted by supervisory special agents at field offices. Then, in September and October 2000, the OIPR submits two pleadings to the court regarding approximately 75-100 applications with errors starting in July 1997. Many of the errors concern misleading statements about the nature of collaboration between criminal and intelligence agents. Most of these applications stated that the FBI New York field office, where the I-49 squad focusing on al-Qaeda was based (see January 1996 and Late 1998-Early 2002), had separate teams of agents handling criminal and intelligence investigations. But in actual fact the I-49 agents intermingled with criminal agents working on intelligence cases and intelligence agents working on criminal cases. Therefore, contrary to what the FISA Court has been told, agents working on a criminal investigation have had unrestricted access to information from a parallel intelligence investigation—a violation of the so-called “wall,” the set of bureaucratic procedures designed to separate criminal and intelligence investigations (see July 19, 1995). [Newsweek, 5/27/2002; Newsweek, 3/29/2004; US Department of Justice, 11/2004, pp. 36-37 pdf file] The information about al-Qaeda in these cases is also shared with assistant US attorneys without FISA permission being sought or granted first. Other errors include the FBI director wrongly asserting that the target of a FISA application was not under criminal investigation, omissions of material facts about a prior relationship between the FBI and a target, and an interview of a target by an assistant US attorney. [Foreign Intelligence Surveillance Court, 5/17/2002] This leads the FISA Court to impose new requirements regarding the “wall” (see October 2000). Similar problems will be found in FISA applications for surveillance of Hamas operatives (see March 2001).

Entity Tags: Office of Intelligence Policy and Review, US Department of Justice, Foreign Intelligence Surveillance Court, I-49, Foreign Intelligence Surveillance Act, FBI New York Field Office, Federal Bureau of Investigation, Catcher’s Mitt

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The King Fahd Mosque in Culver City.The King Fahd Mosque in Culver City. [Source: Damian Dovarganes]Hijackers Khalid Almihdhar and Nawaf Alhazmi travel to Los Angeles with an associate, Mohdar Abdullah, before Almihdhar leaves the US the next day (see June 10, 2000). When they visit the King Fahd Mosque in Culver City, Abdullah is surprised that Alhazmi and Almihdhar already know several people at the mosque. Abdullah will later say, “I was surprised that anybody at the mosque knew them, because as far as I knew Alhazmi and Almihdhar hadn’t visited Los Angeles since they arrived in the US.” They meet one of the hijackers’ Los Angeles acquaintances, known as Khallam, again later that night at their motel. According to the 9/11 Commission, Khallam asks Abdullah to leave the motel room, so he can talk to Alhazmi and Almihdhar in private. However, Abdullah will later dispute this, saying he is not asked leave the room, but that Alhazmi leaves to make an international phone call from a pay phone. The identity of the person he calls is unknown, but it is possible that he talks to Ahmed al-Hada, an al-Qaeda operative whose safe house is monitored by the US and who Alhazmi sometimes calls from the US (see Early 2000-Summer 2001). Khallam will apparently never be found after 9/11. The FBI will consider the possibility that he is Khallad bin Attash, as there are some reports that bin Attash is in the US at this time and met the mosque’s imam, Fahad al Thumairy. However, this theory will never be confirmed. [Los Angeles Times, 7/24/2004; 9/11 Commission, 7/24/2004, pp. 216, 514] The next day, Alhazmi, Abdullah and an unknown man make a casing video at Los Angeles Airport (see June 10, 2000). It is possible that the third man is Khallam.

Entity Tags: Mohdar Abdullah, Nawaf Alhazmi, Khallam, Khalid Almihdhar, 9/11 Commission, Fahad al Thumairy, Khallad bin Attash, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Khalid Almihdhar.Khalid Almihdhar. [Source: FBI]9/11 hijacker Khalid Almihdhar flies from San Diego to Frankfurt, Germany. [US Congress, 9/20/2002] He is accompanied to the airport by another hijacker, Nawaf Alhazmi, and an unnamed associate (see June 10, 2000). Authorities later believe that Almihdhar visits his cousin-in-law Ramzi Bin al-Shibh and other al-Qaeda members in bin al-Shibh’s cell. Since the CIA fails to notify Germany about its suspicions of Almihdhar and bin al-Shibh, both of whom were seen attending the al-Qaeda summit in Malaysia in January, German police fail to monitor them and another chance to uncover the 9/11 plot is missed. [Die Zeit (Hamburg), 10/1/2002; US Congress, 7/24/2003, pp. 135 pdf file] FBI Director Mueller and the congressional inquiry into 9/11 will claim that Almihdhar does not return to the US for over a year [US Congress, 9/20/2002; US Congress, 9/26/2002] , although it is possible that Almihdhar does return before then. For instance, there are indications Almihdhar attends a flight school in Arizona in early 2001. [Arizona Republic, 9/28/2001]

Entity Tags: Ramzi bin al-Shibh, Khalid Almihdhar, Central Intelligence Agency, Robert S. Mueller III, 9/11 Congressional Inquiry, Federal Bureau of Investigation, Germany

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

When 9/11 hijacker Khalid Almihdhar leaves the US in June (see June 10, 2000), he flies to Frankfurt, Germany, and then to Oman in the Middle East. [US Congress, 7/24/2003, pp. 135 pdf file] From there he returns to his family’s home in Sana’a, Yemen. [9/11 Commission, 7/24/2004, pp. 237] His wife and children live at an al-Qaeda communications hub that is run by his father in law, Ahmed al-Hada. The hub is being monitored by the NSA and CIA. Phone calls to and from the hub, including ones made by Almihdhar and other hijackers, are intercepted, rooms in the building are bugged, and spy satellites record visitors (see Late August 1998, Late 1998-Early 2002, and Early 2000-Summer 2001). Based on information gained from monitoring this house, the CIA and local intelligence services mounted a major operation against Almihdhar, other hijackers, and several more al-Qaeda operatives in December 1999 and January 2000, when they were followed around the Middle East and South Asia and monitored during an al-Qaeda summit in Malaysia (see December 29, 1999, January 2-5, 2000, and January 5-8, 2000). So presumably US intelligence should have been aware of this visit to the hub and who Almihdhar was, but what exactly was known and who may have known it has not been made public. He will return to the hub in February 2001 and stay an unknown length of time (see February 2001).

Entity Tags: Central Intelligence Agency, Ahmed al-Hada, National Security Agency, Khalid Almihdhar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

After 9/11 hijacker Khalid Almihdhar returns to the Middle East (see June 10, 2000 and (Mid-June-Mid-July 2000)), the NSA continues to intercept his telephone calls to and from an al-Qaeda communications hub in Sana’a, Yemen, where his wife and children live. US intelligence understands that this is one of the most important al-Qaeda hot spots, and has been closely monitoring it since at least late 1998 (see August 4-25, 1998 and Late 1998-Early 2002). It also intercepts calls between hijacker Salem Alhazmi and the hub, as well as conversations between his brother, hijacker Nawaf Alhazmi, in the US and the hub (see Mid-October 2000-Summer 2001). [US Congress, 7/24/2003, pp. 157 pdf file; 9/11 Commission, 7/24/2004, pp. 222; Wright, 2006, pp. 343] The NSA had previously intercepted calls made by the hijackers to and from the communications hub, both when they were in the US and outside it (see Early 2000-Summer 2001).

Entity Tags: Salem Alhazmi, Khalid Almihdhar, Nawaf Alhazmi, National Security Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

9/11 hijacker associate Ramzi bin al-Shibh spends four weeks in Yemen. The exact timing of his visit is unknown, except that he arrives in August 2000 and leaves in September. [Australian, 12/24/2002; US Department of Defense, 12/8/2006]
Planning Cole Bombing? - While in Yemen, it seems probable bin al-Shibh is involved in preparations for the USS Cole bombing. There are reports that he takes part in the bombing, and he flies back to Yemen to be there in time for the bombing in early October (see October 10-21, 2000).
Does He Visit Monitored Yemen Hub? - While there, it is also possible that he visits the highly monitored al-Qaeda Yemen communications hub, which is in Sana’a. It will not be confirmed or denied that he visits the hub at this time. However, bin al-Shibh is Yemeni, and he is a cousin of future 9/11 hijacker Khalid Almihdhar’s wife, and she lives at the house where the hub is located. [Washington Post, 6/12/2002; Washington Post, 9/11/2002] (Note that he also has other family in Sana’a, as this is where he grew up, so it seems probable he would spend at least some of his visit in Sana’a.) [McDermott, 2005, pp. 41] Furthermore, at some point before the Cole bombing, bin al-Shibh meets with al-Qaeda operatives Abd al-Rahim al-Nashiri and Ahmed al-Hada in Yemen. It is not known where the meeting takes place, but al-Hada runs the Yemen hub (and he is also related to bin al-Shibh) (see Before October 12, 2000). Also, al-Qaeda operatives use the hub to “put everything together” for the Cole bombing, and bin al-Shibh is probably involved in preparations for the bombing at this time. The bombers also call the hub as part of their preparations (see Mid-August 1998-October 2000).
Could Bin Al-Shibh Be Tracked? - If bin al-Shibh does visit (or even just call) the Yemen hub at this time, and/or during his later visit right at the time of the Cole bombing, he would be monitored by US intelligence. The US not only listens in on the hub’s phone, but it monitors the house through bugs planted inside and through spy satellites to monitor people leaving and entering it (see Early 2000-Summer 2001). Although it is uncertain, US intelligence may already be aware of bin al-Shibh through his attendance at an al-Qaeda summit in Malaysia in early 2000 (see January 5-8, 2000).

Entity Tags: Ramzi bin al-Shibh, Ahmed al-Hada, Khalid Almihdhar, Abd al-Rahim al-Nashiri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Yazeed al-Salmi lives with future 9/11 hijacker Nawaf Alhazmi for about a month in the San Diego house of an FBI informant. Alhazmi has lived in the house with Khalid Almihdhar and FBI informant Abdussattar Shaikh since May 2000 (see Mid-May-December 2000), but Almihdhar left to go overseas in June and did not return to San Diego (see June 10, 2000). Apparently there are no other new roommates for the rest of the time Alhazmi lives at the house until December 2000 except for al-Salmi. Al-Salmi moves in with Alhazmi and Shaikh just three days after arriving in the US on a student visa. Hijacker associate and suspected Saudi spy Omar al-Bayoumi, who nominally reports to al-Salmi’s uncle, Mohammed Ahmed al-Salmi of the Saudi Civil Aviation ministry, helped al-Salmi find the accommodation (see September 1998-July 1999). Curiously, al-Salmi was a childhood friend of 9/11 hijacker Hani Hanjour in Saudi Arabia. [KGTV 10 (San Diego), 10/11/2001; 9/11 Commission, 7/24/2004, pp. 222, 518; 9/11 Commission, 8/21/2004, pp. 139 pdf file] In early September, Alhazmi apparently helps al-Salmi cash some checks (see September 5, 2000). After al-Salmi moves out of the house, he moves into a nearby apartment with Modhar Abdullah and others. [9/11 Commission, 7/24/2004, pp. 222, 518] After 9/11, there will be reports that both al-Salmi and Abdullah may have had foreknowledge of the 9/11 attacks (see Late August-September 10, 2001).

Entity Tags: Abdussattar Shaikh, Mohammed Ahmed al-Salmi, Hani Hanjour, Yazeed al-Salmi, Omar al-Bayoumi, Khalid Almihdhar

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The FBI and other US intelligence agencies have been monitoring an al-Qaeda communications hub in Sana’a, Yemen, since the attacks on US embassies in East Africa, and have used it to map al-Qaeda’s global network (see Late August 1998 and Late 1998-Early 2002). In the run-up to the bombing of the USS Cole in Aden, Yemen, the FBI notices that there is increased telephone activity to and from the Sana’a hub. One of the messages says that bin Laden is planning a “Hiroshima-type event” (see (August 2000)). [PBS, 10/3/2002]

Entity Tags: Al-Qaeda, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Abdussattar Shaikh, an FBI informant who is also the landlord to two future 9/11 hijackers living in San Diego, California, learns that one of the hijackers is working illegally, but does not tell his FBI handler about it. Hijacker Nawaf Alhazmi lives in Shaikh’s house from May to December 2000 (see May 10-Mid-December 2000), and fellow hijacker Khalid Almihdhar lives there until June (see June 10, 2000). In the autumn of 2000, Alhazmi begins working at a local Texaco gas station (see Autumn 2000). In a 2004 interview with the 9/11 Commission, Shaikh will say that he becomes aware that a local man named Mohdar Abdullah helped Alhazmi get a job at the gas station. Shaikh will say he is disturbed about this because he knows Alhazmi doesn’t have a work permit. He is concerned that the Immigration and Naturalization Service (INS) will hear about this, and that it will reflect negatively upon himself. He warns Alhazmi that he could be deported. But Alhazmi says he is not worried because Abdullah has been working at the gas station for some time with other illegal workers. Shaikh never tells his FBI handler Steven Butler about this, and apparently even asks Alhazmi not to discuss his employment at the gas station with him. [9/11 Commission, 4/23/2004] It will later turn out that both the manager and the owner of the gas station have already been investigated by the FBI about Islamist militant links (see Autumn 2000), and some of the other employees at the gas station, including Abdullah, may have foreknowledge of the 9/11 attacks (see Early 2000 and Late August-September 10, 2001).

Entity Tags: Mohdar Abdullah, Abdussattar Shaikh, Khalid Almihdhar, Nawaf Alhazmi, US Immigration and Naturalization Service, Steven Butler

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Hamza Alghamdi.Hamza Alghamdi. [Source: US District Court for the Eastern District of Virginia, Alexandria Division]Future 9/11 hijacker Hamza Alghamdi flies from Iran to Kuwait on October 8, travels to Qatar the next day, and enters Saudi Arabia on October 13. [US District Court for the Eastern District of Virginia, Alexandria Division, 7/31/2006, pp. 32-33 pdf file] According to the 9/11 Commission, he is accompanied on the flight from Iran to Kuwait by fellow hijacker Mohand Alshehri. The 9/11 Commission will mention this flight in a section of its final report suggesting co-operation on travel between Iran, Hezbollah, and al-Qaeda—Iran may have helped al-Qaeda by allowing operatives to transit Iran on their way to and from Afghanistan without stamping their passports (see After October 12, 2000). According to a detainee who may have been tortured, Alghamdi was in Afghanistan in the summer of 2000 (see Summer 2000); according to militant leader Luai Sakra, he was in Turkey at around this time (see Late 1999-2000), so it is unclear where Alghamdi and Alshehri are coming from. In any case, there are no direct links between this flight and actions by Iranian operatives, although the commission will note in this context that a senior Hezbollah operative visited Saudi Arabia around this time, and planned to help people in Saudi Arabia travel to Iran. [9/11 Commission, 7/24/2004, pp. 240] The 9/11 Commission’s statement that the hijackers took this flight will be based on intelligence reports from the NSA, mostly drafted shortly after 9/11. Another source for the paragraph that mentions this flight will be “operative’s claimed identification of photos of two Sept. 11 hijackers,” dated August 2002, although it will not be clear if this applies to this trip by Alghamdi and Alshehri. [9/11 Commission, 7/24/2004, pp. 529; Shenon, 2008, pp. 370-3]

Entity Tags: Hamza Alghamdi, Mohand Alshehri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Before the bombing of the USS Cole in Aden, Yemen, Ramzi bin al-Shibh makes two trips to Yemen’s capital, Sana’a, and will later be said to play a role in the attack. Although bin al-Shibh is never named as a certain participant in the operation, he flies from Frankfurt, Germany, to Dubai, United Arab Emirates (UAE), on October 10, 2000. The next day, he flies from Dubai to Sana’a, putting him there one day before the bombing (see October 12, 2000). He flies from Sana’a to Dubai on October 21, and where he goes from there is not certain. [Los Angeles Times, 10/24/2001; Khan, 8/11/2002 pdf file; Australian, 12/24/2002; McDermott, 2005, pp. 209] Bin al-Shibh was also in Yemen for about four weeks up until a month before the bombing (see August-September 2000). Note also that the CIA is working with the Dubai airport to track all suspected militants passing through it, although it is not known if bin al-Shibh is suspected at this time (see 1999). He apparently attended an al-Qaeda summit with the other commanders of the ship-bombing operation in 2000 (see January 5-8, 2000) and some media reports indicate an application for a US visa he makes after the attack is rejected due to concerns about his involvement in the bombing. For example, the Los Angeles Times, based on conversations with law enforcement officials, will report that bin al-Shibh is “linked to the terrorist attack in Yemen on the US Navy destroyer Cole.[Los Angeles Times, 10/21/2001] Newsweek, the BBC, and Al Jazeera journalist Yosri Fouda will also report similar statements by law enforcement officials (see May 17, 2000-May 2001). [Newsweek, 11/26/2001; BBC, 9/14/2002; TBS Journal, 10/2002] One of the 9/11 hijackers, Khalid Almihdhar, may also be involved in the bombing (see Around October 12, 2000).

Entity Tags: Ramzi bin al-Shibh

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Abd al-Rahim al-Nashiri, an al-Qaeda leader involved in the attack on the USS Cole, is said to meet two associates, Ahmed al-Hada and al-Hada’s nephew Ramzi bin al-Shibh, in Yemen. [Die Zeit (Hamburg), 10/1/2002; Newsweek, 12/2/2002] Al-Hada, an operative who runs a communications hub for Osama bin Laden, has been under surveillance since 1998, at least (see August 4-25, 1998). The surveillance of al-Hada is reportedly so important that his house is monitored by spy satellites, to visually identify everyone coming and going (see Late August 1998), although it is unclear where the meeting with al-Nashiri takes place. The exact timing of this meeting and that with bin al-Shibh is not known, although bin al-Shibh stays in Yemen for about four weeks up until a month before the bombing (see August-September 2000), and then arrives in Yemen again one day before the bombing (see October 10-21, 2000). [Newsweek, 12/2/2002] Bin al-Shibh is repeatedly denied a US visa. Although the earlier applications are denied on the grounds he may stay in the US, it will later be suggested that his presumed role in the Cole bombing may have influenced one or more later denials (see May 17, 2000-May 2001).

Entity Tags: Ahmed al-Hada, Ramzi bin al-Shibh, Abd al-Rahim al-Nashiri

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

October 12, 2000: USS Cole Bombed by Al-Qaeda

Damage to the USS Cole.Damage to the USS Cole. [Source: Department of Defense]The USS Cole is bombed in the Aden, Yemen harbor by two al-Qaeda militants, Hassan al-Khamri and Ibrahim al-Thawar (a.k.a. Nibras). Seventeen US soldiers are killed and 30 are wounded. The CIA will later conclude that with just slightly more skilled execution, the attack would have killed 300 and sunk the ship. [ABC News, 10/13/2000; Coll, 2004, pp. 532; 9/11 Commission, 7/24/2004, pp. 191] The Islamic Army of Aden (IAA) immediately takes credit for the attack. This is a Yemen-based Muslim militant group widely believed to have close ties to al-Qaeda (see 1996-1997 and After). [Guardian, 10/14/2000] The IAA statement is released by its spokesman, Abu Hamza al-Masri (see Early 1997, (June 1998), and December 28, 1998 and After). Abu Hamza says that the attack was timed to mark the anniversary of the execution of the IAA’s former commander (see October 17, 1999). [O'Neill and McGrory, 2006, pp. 184] The prime minister of Yemen at the time of the bombing will say shortly after 9/11, “The Islamic Army was part of al-Qaeda.” [Guardian, 10/13/2001] The US soon learns the names of some al-Qaeda operatives involved in the attack, including Khalid Shaikh Mohammed, Tawfiq bin Attash and Fahad al-Quso (see Early December 2000), and Abd al-Rahim al-Nashiri (see November-December 2000). 9/11 hijackers Ramzi bin al-Shibh (see October 10-21, 2000) and Khalid Almihdhar (see Around October 12, 2000) may also have been involved. This is a repeat of a previously attempted attack, against the USS The Sullivans, which failed and was apparently undetected (see January 3, 2000). [Los Angeles Times, 12/22/2002] The 9/11 Commission will later say the Cole bombing “was a full-fledged al-Qaeda operation, supervised directly by bin Laden. He chose the target and location of the attack, selected the suicide operatives, and provided the money needed to purchase explosives and equipment.” [9/11 Commission, 7/24/2004, pp. 190]

Entity Tags: Khalid Shaikh Mohammed, Khallad bin Attash, Ramzi bin al-Shibh, Islamic Army of Aden, USS Cole, Osama bin Laden, Ibrahim al-Thawar, Khalid Almihdhar, Fahad al-Quso, Abd al-Rahim al-Nashiri, Hassan al-Khamri, Al-Qaeda

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Hours after the USS Cole bombing in Yemen (see October 12, 2000), President Clinton says regarding the bombing: “If, as it now appears, this was an act of terrorism, it was a despicable and cowardly act. We will find out who was responsible and hold them accountable.” [ABC News, 10/12/2000] But the US will not quickly retaliate against al-Qaeda, as it did with missile strikes after the 1998 US embassy bombings in East Africa (see August 20, 1998), despite convincing evidence that al-Qaeda was behind the Cole bombing (see Shortly After October 12, 2000, November 2000 or After, and November 7, 2000).

Entity Tags: William Jefferson (“Bill”) Clinton

Timeline Tags: Complete 911 Timeline

In the months after the USS Cole is bombed in autumn 2000 (see October 12, 2000), the NSA intercepts about half a dozen communications between hijacker Nawaf Alhazmi in the US and an al-Qaeda communications hub in Sana’a, Yemen, run by hijacker Khalid Almihdhar’s father in law, Ahmed al-Hada. [MSNBC, 7/21/2004; Los Angeles Times, 12/21/2005; US President, 12/26/2005 pdf file] The hub and people associated with it are thought to have played a support role in the Cole bombing (see also October 14-Late November, 2000 and October 4, 2001). [CNN, 2/14/2002; MSNBC, 7/21/2004] It was also involved in the bombing of US embassies in Tanzania and Kenya (see August 4-25, 1998). The NSA has been monitoring the number for at least two years (see Late August 1998) and the FBI has used it to map al-Qaeda’s global organisation (see Late 1998-Early 2002). The NSA had previously intercepted calls between hijacker Khalid Almihdhar in the US and the hub (see Spring-Summer 2000 and Early 2000-Summer 2001) and also intercepts a call between Alhazmi and the hub a few weeks before 9/11 (see (August 2001)).

Entity Tags: Nawaf Alhazmi, National Security Agency, Ahmed al-Hada

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Barbara Bodine at a press conference days after the bombing of the USS Cole.Barbara Bodine at a press conference days after the bombing of the USS Cole. [Source: Reuters]The first FBI agents enter Yemen two days after the bombing of the USS Cole in an attempt to discover who was responsible. However, the main part of the team initially gets stuck in Germany because they do not have permission to enter Yemen and they are then unable to accomplish much due to restrictions placed on them and tensions between lead investigator John O’Neill and US Ambassador to Yemen Barbara Bodine. All but about 50 investigators are forced to leave by the end of October. O’Neill’s boss Barry Mawn visits to assess the situation. [Miller, Stone, and Mitchell, 2002, pp. 237; New Yorker, 1/14/2002; Sunday Times (London), 2/3/2002; New Yorker, 7/10/2006 pdf file] Mawn will later comment, “It became clear [Bodine] simply hated his guts.” After a ten day investigation, he concludes O’Neill is doing a fine job, tells Bodine that she is O’Neill’s “only detractor,” and refuses her request to recall him. [Wright, 2006, pp. 32] But O’Neill and much of his team are pressured to leave by late November and Bodine will not give him permission to return any time after that. The investigation stalls without his personal relationships to top Yemeni officials. [Miller, Stone, and Mitchell, 2002, pp. 237; New Yorker, 1/14/2002; Sunday Times (London), 2/3/2002] Increased security threats force the reduced FBI team still in Yemen to withdraw altogether in June 2001. [PBS Frontline, 10/3/2002] The prime minister of Yemen at the time later claims (see Early October 2001) that hijacker “Khalid Almihdhar was one of the Cole perpetrators, involved in preparations. He was in Yemen at the time and stayed after the Cole bombing for a while, then he left.” The Sunday Times later notes, “The failure in Yemen may have blocked off lines of investigation that could have led directly to the terrorists preparing for September 11.” [Sunday Times (London), 2/3/2002]

Entity Tags: USS Cole, John O’Neill, Khalid Almihdhar, Barry Mawn, Federal Bureau of Investigation, Barbara Bodine

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Future 9/11 hijacker Ahmed Alnami and candidate hijacker Mushabib al-Hamlan obtain US visas from the American consulate in Jeddah, Saudi Arabia. [9/11 Commission, 8/21/2004, pp. 14-15 pdf file] Alnami’s visa is issued by Shayna Steinger, a consular official who apparently issues the 9/11 hijackers with 12 visas (see July 1, 2000) and will issue Alnami with a second visa next year (see April 23, 2001). [9/11 Commission, 12/30/2002, pp. 2; Office of the Inspector General (US Department of State), 1/30/2003] Alnami’s application is incomplete, as he lists his occupation as “student,” but does not provide a complete address for his school. He also gives his US address as “in Los Angeles” and writes that “my friend Moshibab” will be traveling with him. The 9/11 Commission will later suggest that Alnami’s passport may contain fraudulent travel stamps associated with al-Qaeda, although this is not certain and is apparently not noticed at this time. [9/11 Commission, 8/21/2004, pp. 14-15 pdf file] The 9/11 Commission will also suggest that one or more of Alnami’s passports may contain a suspicious indicator of Islamist extremism, but this is not certain (see November 6, 1999 and November 2, 2007). Some of the radicals who bombed the World Trade Center in 1993 also had Saudi passports with the same indicator (see Around February 1993). [9/11 Commission, 7/24/2004, pp. 563-4; 9/11 Commission, 8/21/2004, pp. 14-15 pdf file] Before obtaining the visa, Alnami and al-Hamlan followed instructions given them by al-Qaeda leaders Mohammed Atef and Khalid Shaikh Mohammed, and contacted future 9/11 hijacker Waleed Alshehri in Jeddah. They briefly share an apartment with Alshehri, who provides them with directions to the consulate and shows them how to fill out visa applications. Al-Hamlan will soon drop out of the plot after contacting his family. Alnami will later be said to fly to Beirut with the Alshehris (see Mid-November, 2000). [9/11 Commission, 7/24/2004, pp. 526]

Entity Tags: Shayna Steinger, Mushabib al-Hamlan, US Consulate, Jeddah, Saudi Arabia Office, 9/11 Commission, Waleed Alshehri, Ahmed Alnami

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

After leaving Yemen following the bombing of the USS Cole (see Around October 12, 2000), 9/11 hijacker Khalid Almihdhar travels to various countries in Asia.
bullet He is reportedly in Malaysia in October (see October 2000);
bullet From late 2000 to February 2001 he stays with his cousin in Mecca, Saudi Arabia (see Late 2000-February 2001);
bullet He then returns to Yemen, to stay with his family at an al-Qaeda communications hub monitored by US intelligence (see February 2001, Late August 1998, and (Mid-June-Mid-July 2000));
bullet Following this, he goes to Afghanistan;
bullet There are some reports he travels to the United Arab Emirates in June (see June 2001);
bullet He is also said to be in Malaysia again in June (see June 2001);
bullet Finally, he goes to stay with his cousin in Mecca, Saudi Arabia, for another month. Before flying to New York (see July 4, 2001), Almihdhar tells his cousin that Osama bin Laden is planning five attacks on the US and asks the cousin to watch over his family, because he has a job to do (see Between June 1 and July 4, 2001). [9/11 Commission, 7/24/2004, pp. 237; 9/11 Commission, 8/21/2004, pp. 137 pdf file]
After 9/11, there will be speculation that during this period Almihdhar is coordinating the arrival of the other muscle hijackers. According to FBI Director Robert Mueller, this would his explain his stay in Saudi Arabia and his return only after all the other hijackers had arrived. [US Congress, 9/26/2002] However, there is some evidence suggesting that Almihdhar may have visited the US in this time frame, perhaps using a passport in a false name (see June 10, 2000).

Entity Tags: Khalid Almihdhar, Robert S. Mueller III

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The FBI’s investigation of the USS Cole bombing in Aden, Yemen, connects the bombers to an al-Qaeda communications hub in Sana’a, the country’s capital, which has been monitored by the US for at least two years (see Late August 1998 and Mid-August 1998-October 2000). It was also used in the East African embassy bombings (see August 4-25, 1998) and will be used by the 9/11 hijackers (see Early 2000-Summer 2001). It is not known when this connection is made. No apparent action is taken against Ahmed al-Hada, the operative who runs the communications hub, before 9/11. However, this may be due to the importance of intelligence generated from his phone (see Late 1998-Early 2002). In early 2001, al-Hada will be publicly identified as an al-Qaeda operative at the embassy bombings trial, when his phone number is disclosed openly in court and reported in the media (see February 2001 and After). Yet he still is not publicly indicted for either the embassy bombings or the Cole bombing, even though a number of other fugitives are publicly indicted. In 2002, US officials will describe al-Hada as a “prominent al-Qaeda member who is believed to have been involved in the Cole bombing,” and say his phone was used by the bombers to relay messages and “put everything together” before the attack. [MSNBC, 2/14/2002; MSNBC, 5/2005]

Entity Tags: Federal Bureau of Investigation, Ahmed al-Hada

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Ahmed Alhaznawi in a video released in 2002.Ahmed Alhaznawi in a video released in 2002. [Source: Al Jazeera]9/11 Hijacker Ahmed Alhaznawi receives a new passport in Saudi Arabia. It is unknown exactly when Alhaznawi receives this passport, but he uses it to apply for a US visa on November 12, 2000 (see November 12, 2000), so it must be before that. According to the 9/11 Commission, the passport may contain an “indicator of extremism” that is “associated with al-Qaeda.” However, although it is certain some of the other hijackers have such indicator in their passports, it is not certain that Alhaznawi does. The commission will merely say that there “is reason to believe” his passport may contain such indicator and note that it was “issued in the same Saudi passport office” that issued passports with the indicator to some of the other hijackers. [9/11 Commission, 7/24/2004, pp. 564; 9/11 Commission, 8/21/2004, pp. 9, 15, 33 pdf file] According to author James Bamford, the indicator is a “secret coded indicator, placed there by the Saudi government, warning of a possible terrorist affiliation.” [Bamford, 2008, pp. 58-59] The Saudi government reportedly uses this indicator to track some of the Saudi hijackers before 9/11 “with precision” (see November 2, 2007).

Entity Tags: Ahmed Alhaznawi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Page 1 of 3 (292 events)
previous | 1, 2, 3 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike