!! History Commons Alert, Exciting News

Context of 'August 20, 2001: Fort Meade Increases Base Security'

This is a scalable context timeline. It contains events related to the event August 20, 2001: Fort Meade Increases Base Security. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 9 (809 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9 | next

The German Reich Ministry of Justice issues a secret memo following a meeting of several Justice Ministry lawyers and public prosecutors with senior Gestapo officers. The participants discuss the fact that Germany has been on a war footing for years, and the leaders’ worry that the citizenry is riddled with sleeper cells of subversives. The solution: detaining and torturing subversives. It is unclear whether torture will be used to terrorize other subversives, to extract information, or produce confessions. German law enforcement officials are balky at applying “more rigorous interrogation” techniques. Though some judges seem unmoved by defendants appearing in court with obvious marks of torture upon their bodies, the law enforcement officers are bureaucrats in a system that has always respected the rule of law and the Hitler government was originally elected on a law-and-order platform. The memo is the product of the top officials in the Gestapo and Justice Ministry, and lays out detailed instructions as to when torture techniques can be applied, the specific equipment used in such interrogations, and how many times particular techniques could be used on certain categories of detainees. Perhaps most importantly, the memo promises immunity from prosecution to any German interrogator who follows the rules as laid down in the memo.
Specific Instructions - It reads in part: “At present, we thus have a situation which cannot continue: a deficient sense of what is right on the part of judicial officers; an undignified position for police officers, who try to help matters by foolish denials [that torture has taken place in court proceedings].… [I]nterrogations of this kind [torture] may be undertaken in cases where charges involve the immediate interests of the state.… chiefly treason and high treason. Representatives of the Gestapo expressed the opinion that a more rigorous interrogation could also be considered in cases of Jehovah’s Witnesses, explosives, and sabotage.… As a general principle, in more rigorous interrogations only blows with a club on the buttocks are permissible, up to 25 such blows. The number is to be determined in advance by the Gestapo.… Beginning with the tenth blow, a physician must be present. A standard club will be designated, to eliminate all irregularities.” Gestapo Headquarters in Berlin must give permission for more “rigorous interrogation[s],” the memo continues.
Drawing Parallels to Bush Administration Torture - The memo will be the subject of a 2009 article by Shayana Kadidal, the senior managing attorney of the Guantanamo project at the Center for Constitutional Rights. Kadidal will draw parallels between the Nazi torture authorization and similar legal justifications issued by the American government after the 9/11 attacks (see March 2, 2009 and April 21, 2009). Kadidal will write: “I realize that, as a matter of principle, there is a strong bias against making Nazi analogies to any events happening in our modern world.… But here we have: (1) a system set up to allow torture on certain specific individual detainees, (2) specifying standardized equipment for the torture (apparently down to the exact length of the club to be used), along with physician participation to ensure survival of the victim for the more several applications, (3) requiring prior approval of the use of torture from the central authorities in the justice department and intelligence agency in the capital, so as to ensure that (6) the local field officers actually carrying out the abuse are immune from prosecution.” [Huffington Post, 4/21/2009]

Entity Tags: Gestapo, Shayana Kadidal, German Reich Ministry of Justice

Timeline Tags: Torture of US Captives

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

A B-29 bomber similar to the one that crashed in Georgia.A B-29 bomber similar to the one that crashed in Georgia. [Source: Global Security (.org)]A test flight for the Air Force’s Project Banshee, located at Robins Air Force Base in Georgia, is set for 8:30 a.m. Banshee is an attempt begun in 1946 to develop and deploy a long-range missile ahead of both the Soviet Union and rival US military branches. The airplane used in the test flight crashes less than an hour into its flight, killing 9 of the 13 aboard.
Maintenance Problems - The plane assigned for the flight is a B-29 Stratofortress, a bomber made famous by its delivery of the atomic bombs to Hiroshima and Nagasaki at the end of World War II. B-29s are notoriously difficult to fly and maintain: their four wing-mounted engines almost routinely overheat and catch fire, causing engine shutdowns, sudden drops in altitude, and, often, crashes. The engines’ eighteen cylinders lack sufficient airflow to keep them cool, and the overheating often causes the crankcases, made of light but highly flammable magnesium, to burst into flames. Like so many of its brethren, the plane has suffered its share of maintenance issues, and is flying without numerous recommended maintenance and repair tasks being performed. Just five days before, it had been designated “red cross”—grounded and unfit for service. It was allowed to fly through an “exceptional release” signed by the squadron commander.
Crew Difficulties - The flight is moved back to the afternoon after some crew members fail to show up on time, and to allow last-minute repairs to be made. By takeoff, the flight crew is assembled: Captain Ralph Erwin; co-pilot Herbert W. Moore; flight engineer Earl Murrhee; First Lieutenant Lawrence Pence, Jr, the navigator; Sergeant Walter Peny, the left scanner; Sergeant Jack York, the right scanner; Sergeant Melvin Walker, the radio operator; and Sergeant Derwood Irvin, manning the bombsight and autopilot. The crew is joined by civilian engineers assigned to Banshee: Al Palya and Robert Reynolds from RCA, William Brauner and Eugene Mechler from the Franklin Institute, and Richard Cox from the Air Force’s Air Materiel Command. In violation of standard procedure, none of the crew or the civilians are briefed on emergency procedures, though Murrhee will later say that the crew were all familiar with the procedures; he is not so sure about the civilians, though he knows Palya and Reynolds have flown numerous test flights before. In another violation of Air Force regulations, none of the flight crew have worked together before. As author Barry Siegel will note in 2008, “The pilot, copilot, and engineer had never shared the same cockpit before.”
Engine Fire and Crash - Less than an hour into the flight, one engine catches fire and two others lose power, due to a combination of maintenance failures and pilot errors. The civilians have some difficulty getting into their parachutes as Erwin and Moore attempt to regain control of the aircraft. Four of the crew and civilians manage to parachute from the plane, but most remain on board as the airplane spirals into the ground on the edge of the Okefenokee Swamp, near Waycross, Georgia. Crew members Moore, Murrhee, and Peny survive, as does a single civilian, Mechler. Four others either jump at too low an altitude or die when their chutes foul the airplane; the other five never manage to leave the plane and die on impact.
Widows File Suit - Several of the civilians’ widows will file suit against the US Air Force, asserting that their husbands died because of Air Force negligence (see June 21, 1949). Their lawsuit will eventually become US v. Reynolds, a landmark Supreme Court case and the underpinning for the government’s claims of state secrets privilege (see March 9, 1953). [Siegel, 2008, pp. 3, 14-17, 33-49]

Entity Tags: Derwood Irvin, Barry Siegel, US Department of the Air Force, Walter Peny, William Brauner, Air Materiel Command, Richard Cox, Ralph Erwin, Robert Reynolds, Al Palya, Radio Corporation of America, Eugene Mechler, Earl Murrhee, Franklin Institute, Project Banshee, Melvin Walker, Lawrence Pence, Jr, Herbert W. Moore, Jr, Jack York

Timeline Tags: Civil Liberties

A three-judge federal appeals court unanimously rejects the government’s claim of unfettered executive privilege and secrecy in regards to classified documents (see October 19, 1951). In an opinion written by Judge Albert Maris, the court finds that the government’s claim that the judiciary can never compel the executive branch to turn over classified documents to be without legal merit. The plaintiffs in the case, three widows who lost their husbands in the crash of a B-29 bomber carrying classified materials (see June 21, 1949), had a compelling need for the documents in question, the downed B-29 accident reports, to further their case, Maris writes (see October 12, 1950).
No Legal Basis for Claim of Privilege - Maris goes further than the parameters of the single lawsuit, writing: “[W]e regard the recognition of such a sweeping privilege… as contrary to a sound public policy. The present cases themselves indicate the breadth of the claim of immunity from disclosure which one government department head has already made. It is but a small step to assert a privilege against any disclosure of records merely because they might prove embarrassing to government officials. Indeed, it requires no great flight of imagination to realize that if the government’s contentions in these cases were affirmed, the privilege against disclosure might gradually be enlarged… until as is the case in some nations today, it embraced the whole range of government activities.… We need to recall in this connection the words of [Revolution-era jurist] Edward Livingston: ‘No nation ever yet found any inconvenience from too close an inspection into the conduct of its officers, but many have been brought to ruin, and reduced to slavery, by suffering gradual imposition and abuses, which were imperceptible, only because the means of publicity had not been secured.’” He also quotes Revolutionary War figure Patrick Henry, who said, “[T]o cover with the veil of secrecy the common routine of business is an abomination in the eyes of every intelligent man and every friend to his country.”
Rejecting Claim of 'State Secrets' - Maris is even less respectful of the government’s claim of a “state secrets” privilege. He notes that the government did not make that claim until well into the lawsuit proceedings (see October 19, 1951), indicating that it was a “fallback” argument used after the original government arguments had failed. Maris is also troubled, as author Barry Siegel later writes, in the government’s “assertion of unilateral executive power, free from judicial review, to decide what qualified as secret.” The lower court judge’s ruling that he alone should be given the documents for review adequately protected the government’s security interests, Maris writes: “[But] the government contends that it is within the sole province of the secretary of the Air Force to determine whether any privileged material is contained in the documents and that his determination of this question must be accepted by the district court without any independent consideration.… We cannot accede to this proposition. On the contrary, we are satisfied that a claim of privilege against disclosing evidence… involves a justiciable question, traditionally within the competence of the courts.… To hold that the head of an executive department of the government in a [law]suit to which the United States is a party may conclusively determine the government’s claim of privilege is to abdicate the judicial function to infringe the independent province of the judiciary as laid down by the Constitution.”
Fundamental Principle of Checks and Balances - Maris continues: “The government of the United States is one of checks and balances. One of the principal checks is furnished by the independent judiciary which the Constitution established. Neither the executive nor the legislative branch of the government may constitutionally encroach upon the field which the Constitution has reserved for the judiciary.… Nor is there any danger to the public interest in submitting the question of privilege to the decision of the courts. The judges of the United States are public officers whose responsibilities under the Constitution is just as great as that of the heads of the executive departments.”
Government Appeal - The Justice Department will appeal the ruling to the US Supreme Court (see March 1952 and March 9, 1953). [Siegel, 2008, pp. 153-156]

Entity Tags: Albert Maris, US Department of Justice, Barry Siegel, US Supreme Court

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

Lawyers make their opening arguments before the Supreme Court in the case of US v Reynolds, the lawsuit that finds the government had no overarching right to unilaterally refuse to deliver classified documents in the course of a wrongful death lawsuit against the government (see December 11, 1951). The government has appealed the appellate court ruling to the Supreme Court (see March 1952). Because four of the nine justices had voted not to hear the case—in essence to let the appellate court ruling stand—the defense is cautiously optimistic about the Court’s decision.
Judiciary Has No Right to Interfere with Powers of the Executive, Government Argues - Acting Solicitor General Robert Stern tells the Court that the appellate judges’ decision, written by Judge Albert Maris, “is an unwarranted interference with the powers of the executive,” and that the decision forced the government to choose “whether to disclose public documents contrary to the public interest [or] to suffer the public treasury to be penalized” (a reference to the decision to award the plaintiffs monetary damages—see October 12, 1950). The judiciary “lack[s] power to compel disclosure by means of a direct demand [as well as] by the indirect method of an order against the United States, resulting in judgment when compliance is not forthcoming.”
Executive Has No Right to Unilaterally Withhold Information, Defense Counters - Stern’s arguments are countered by those of the plaintiffs’ lawyer, Charles Biddle, who writes, “We could rest our case with confidence on the clear opinion of Judge Maris,” but continues by arguing that if the government asserts a claim of executive privilege on the basis of national security, it must make the documents available to the Court for adjudication, or at least provide enough information for the Court to judge whether the documents present in fact a threat to national security if disclosed. This is particularly true, Biddle argues, “where there is no showing that the documents in question contain any military secret” (Biddle is unaware that the documents’ classification status had been reduced two years before—see September 14, 1950). “The basic question here is whether those in charge of the various departments of the government may refuse to produce documents properly demanded… in a case where the government is a party (see June 21, 1949), simply because the officials themselves think it would be better to keep them secret, and this without the Courts having any power to question the propriety of such decision.… In other words, say the officials, we will tell you only what we think it is in the public interest that you should know. And furthermore, we may withhold information not only about military or diplomatic secrets, but we may also suppress documents which concern merely the operation of the particular department if we believe it would be best, for purposes of efficiency or morale, that no one outside of the department, not even the Court, should see them.”
No Basis for Claims of Military Secrets - Biddle argues that because of responses he has received to his demands over the course of this lawsuit, he is relatively sure there are no military secrets contained within them. “[T]he proof is to the contrary,” he says, and goes on to say that had the Air Force disclosed from the outset that the plane crash, the fatal accident that sparked the original lawsuit (see October 6, 1948), was probably caused by pilot error and not by random chance, the plaintiffs may have never needed to ask for the disclosure of the documents in question, the accident reports on the crash (see October 18, 1948). “The secretary [of the Air Force]‘s formal claim of privilege said that the plane at the time was engaged in a secret mission and that it carried confidential equipment,” Biddle says, “but nowhere was it asserted that either had anything to do with the accident. The whole purpose of the demand by the respondents was for the purpose of finding out what caused the accident.… They were not in the least interested in the secret mission or equipment.” [Siegel, 2008, pp. 165-170]

Entity Tags: US Supreme Court, Albert Maris, Robert Stern, US Department of the Air Force, Charles Biddle

Timeline Tags: Civil Liberties

In their regular Saturday conference, the nine Supreme Court justices discuss the issues and arguments surrounding US v Reynolds (see October 21, 1952). According to the notes from the discussion, Chief Justice Fred Vinson, a strong advocate for expansive executive powers (see March 1952), says the case “boils down to Executive Branch determine privilege.” Other notes by Justice William O. Douglas suggest that Vinson isn’t convinced that the US must “be forced to pay for exercising its privilege” (see October 12, 1950). A straw vote taken at the end of the discussion shows five justices in favor of the government’s position to unilaterally withhold classified documents—overturning the appellate court decision (see December 11, 1951), and four in favor of allowing the decision to stand. [Siegel, 2008, pp. 171]

Entity Tags: Fred Vinson, US Supreme Court, William O. Douglas

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

The CIA’s Technical Services Division (TSD) considers plans to undermine Fidel Castro’s charismatic appeal by sabotaging his speeches. At one point, there is discussion of spraying Castro’s broadcasting studio with a hallucinogenic chemical. The plan is taken of the shelf because the chemical is deemed unreliable. During this period, the TSD laces a box of cigars with a chemical that would produce temporary disorientation, hoping that he will smoke one of the cigars before giving a speech. In another instance, the TSD comes up with a scheme to dust Castro’s shoes with thallium salts during a trip outside of Cuba. The salts would cause his beard to fall out. The plan is abandoned when Castro cancels the trip. [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, Technical Services Division (TSD)

Timeline Tags: US-Cuba (1959-2005)

The CIA works with a high-level Cuban official, codenamed “AM/LASH,” on a plan to assassinate Fidel Castro and overthrow his government. In June 1965, the CIA ends its contact with AM/LASH and his associates, citing security concerns. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Timeline Tags: US-Cuba (1959-2005)

The CIA’s Task Force W devises two plans to assassinate Fidel Castro. The first one, involving an exploding sea shell that would be placed where Castro regularly dives, is dismissed by the CIA’s Technical Services Division (TSD) as impractical. In the second plan, James Donovan (who has been negotiating with Castro for the release of prisoners taken during the Bay of Pigs operation) would present Castro with a contaminated diving suit. TSD decides to give the plan a try. It purchases a diving suit and laces its breathing apparatus with tubercule bacillus. The suit itself is dusted with a fungus that is known to cause a chronic skin disease. But the suit never leaves the laboratory. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Entity Tags: Technical Services Division (TSD), James Donovan, Fidel Castro

Timeline Tags: US-Cuba (1959-2005)

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]

Entity Tags: Malcolm Little, Central Intelligence Agency, Church Committee, Lew Allen, National Security Agency, Martin Luther King, Jr., Office of Security Services, Joan Baez

Timeline Tags: Civil Liberties

The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). [Federation of American Scientists, 7/17/1997]

Entity Tags: National Security Agency, Echelon, Rhyolite, Chalet, Government Communications Headquarters, Owen Lewis, Canyon

Timeline Tags: Civil Liberties

July 26-27, 1970: Nixon Rejects Huston Plan

After President Nixon approves of the so-called “Huston Plan” to implement a sweeping new domestic intelligence and internal security apparatus (see July 14, 1970), FBI director J. Edgar Hoover brings the plan’s author, White House aide Tom Charles Huston (see June 5, 1970), into his office and vents his disapproval. The “old ways” of unfettered wiretaps, political infiltration, and calculated break-ins and burglaries are “too dangerous,” he tells Huston. When, not if, the operations are revealed to the public, they will open up scrutiny of US law enforcement and intelligence agencies, and possibly reveal other, past illegal domestic surveillance operations that would embarrass the government. Hoover says he will not share FBI intelligence with other agencies, and will not authorize any illegal activities without President Nixon’s personal, written approval. The next day, Nixon orders all copies of the decision memo collected, and withdraws his support for the plan. [Reeves, 2001, pp. 236-237] W. Mark Felt, the deputy director of the FBI, later calls Huston “a kind of White House gauleiter over the intelligence community.” Washington Post reporter Bob Woodward will note that the definition of “gauleiter” is, according to Webster’s Dictionary, “the leader or chief officoal of a political district under Nazi control.” [Woodward, 2005, pp. 33-34]

Entity Tags: W. Mark Felt, Tom Charles Huston, J. Edgar Hoover, Federal Bureau of Investigation, Central Intelligence Agency, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

The US Supreme Court, in what becomes informally known as the “Keith case,” upholds, 8-0, an appellate court ruling that strikes down warrantless surveillance of domestic groups for national security purposes. The Department of Justice had wiretapped, without court warrants, several defendants charged with destruction of government property; those wiretaps provided key evidence against the defendants. Attorney General John Mitchell refused to disclose the source of the evidence pursuant to the “national security” exception to the Omnibus Crime Control and Safe Streets Act of 1968. The courts disagreed, and the government appealed the decision to the Supreme Court, which upheld the lower courts’ rulings against the government in a unanimous verdict. The Court held that the wiretaps were an unconstitutional violation of the Fourth Amendment, establishing the judicial precedent that warrants must be obtained before the government can wiretap a US citizen. [US Supreme Court, 6/19/1972; Bernstein and Woodward, 1974, pp. 258-259] Critics of the Nixon administration have long argued that its so-called “Mitchell Doctrine” of warrantlessly wiretapping “subversives” has been misused to spy on anyone whom Nixon officials believe may be political enemies. [Bernstein and Woodward, 1974, pp. 258-259] As a result of the Supreme Court’s decision, Congress passes the Foreign Intelligence Surveillance Act. [John Conyers, 5/14/2003]
Opinion of Justice Powell - Writing for the Court, Justice Lewis Powell observes: “History abundantly documents the tendency of Government—however benevolent and benign its motives—to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the government attempts to act under so vague a concept as the power to protect ‘domestic security.’ Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent.” [US Supreme Court, 6/19/1972]
Justice Department Wiretapped Reporters, Government Officials - In February 1973, the media will report that, under the policy, the Justice Department had wiretapped both reporters and Nixon officials themselves who were suspected of leaking information to the press (see May 1969 and July 26-27, 1970), and that some of the information gleaned from those wiretaps was given to “Plumbers” E. Howard Hunt and G. Gordon Liddy for their own political espionage operations. [Bernstein and Woodward, 1974, pp. 258-259]
Conyers Hails Decision 30 Years Later - In 2003, Representative John Conyers (D-MI) will say on the floor of the House: “Prior to 1970, every modern president had claimed ‘inherent Executive power’ to conduct electronic surveillance in ‘national security’ cases without the judicial warrant required in criminal cases by the Fourth Amendment to the Constitution. Then Attorney General John Mitchell, on behalf of President Richard Nixon sought to wiretap several alleged ‘domestic’ terrorists without warrants, on the ground that it was a national security matter. Judge [Damon] Keith rejected this claim of the Sovereign’s inherent power to avoid the safeguard of the Fourth Amendment. He ordered the government to produce the wiretap transcripts. When the Attorney General appealed to the US Supreme Court, the Court unanimously affirmed Judge Keith. The Keith decision not only marked a watershed in civil liberties protection for Americans. It also led directly to the current statutory restriction on the government’s electronic snooping in national security cases.” [John Conyers, 5/14/2003]

Entity Tags: Lewis Powell, US Supreme Court, John Mitchell, E. Howard Hunt, US Department of Justice, G. Gordon Liddy, ’Plumbers’, Damon Keith, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

CIA Counterintelligence Director James Angleton.CIA Counterintelligence Director James Angleton. [Source: CI Centre.com]CIA Director James Schlesinger orders an internal review of CIA surveillance operations against US citizens. The review finds dozens of instances of illegal CIA surveillance operations against US citizens dating back to the 1950s, including break-ins, wiretaps, and the surreptitious opening of personal mail. The earlier surveillance operations were not directly targeted at US citizens, but against “suspected foreign intelligence agents operating in the United States.” Schlesinger is disturbed to find that the CIA is currently mounting illegal surveillance operations against antiwar protesters, civil rights organizations, and political “enemies” of the Nixon administration. In the 1960s and early 1970s, CIA agents photographed participants in antiwar rallies and other demonstrations. The CIA also created a network of informants who were tasked to penetrate antiwar and civil rights groups and report back on their findings. At least one antiwar Congressman was placed under surveillance, and other members of Congress were included in the agency’s dossier of “dissident Americans.” As yet, neither Schlesinger nor his successor, current CIA Director William Colby, will be able to learn whether or not Schlesinger’s predecessor, Richard Helms, was asked by Nixon officials to perform such illegal surveillance, though both Schlesinger and Colby disapproved of the operations once they learned of them. Colby will privately inform the heads of the House and Senate Intelligence Committees of the domestic spying engaged in by his agency. The domestic spying program was headed by James Angleton, who is still serving as the CIA’s head of counterintelligence operations, one of the most powerful and secretive bureaus inside the agency. It is Angleton’s job to maintain the CIA’s “sources and methods of intelligence,” including the prevention of foreign “moles” from penetrating the CIA. But to use counterintelligence as a justification for the domestic spying program is wrong, several sources with first-hand knowledge of the program will say in 1974. “Look, that’s how it started,” says one. “They were looking for evidence of foreign involvement in the antiwar movement. But that’s not how it ended up. This just grew and mushroomed internally.” The source continues, speaking hypothetically: “Maybe they began with a check on [Jane] Fonda. They began to check on her friends. They’d see her at an antiwar rally and take photographs. I think this was going on even before the Huston plan” (see July 26-27, 1970 and December 21, 1974). “This wasn’t a series of isolated events. It was highly coordinated. People were targeted, information was collected on them, and it was all put on [computer] tape, just like the agency does with information about KGB agents. Every one of these acts was blatantly illegal.” Schlesinger begins a round of reforms in the CIA, a program continued by Colby. [New York Times, 12/22/1974 pdf file]

Entity Tags: William Colby, Senate Intelligence Committee, Richard Helms, James Angleton, Jane Fonda, Nixon administration, Central Intelligence Agency, James R. Schlesinger, House Intelligence Committee

Timeline Tags: Civil Liberties

Former CIA director Richard Helms.Former CIA director Richard Helms. [Source: Search.com]Former CIA director Richard Helms indirectly confirms the involvement of the Nixon administration in his agency’s illegal domestic surveillance operations during his testimony before the Senate Watergate investigative committee. Helms tells the committee that he was told by Nixon’s Foreign Intelligence Advisory Board that the CIA could “make a contribution” in domestic intelligence operations. “I pointed out to them very quickly that it could not, there was no way,” Helms testifies. “But this was a matter that kept coming up in the context of feelers: Isn’t there somebody else who can take on these things if the FBI isn’t doing them as well as they should, as there are no other facilities?” (FBI director J. Edgar Hoover’s opposition to the idea of spying on US citizens for Nixon’s political purposes is well documented.) CIA officials say that, despite Helms’s testimony, Helms began the domestic spying program as asked, in the beginning to investigate beliefs that the antiwar movement was permeated by foreign intelligence agents in 1969 and 1970. “It started as a foreign intelligence operation and it bureaucratically grew,” one source says in 1974. “That’s really the answer.” The CIA “simply began using the same techniques for foreigners against new targets here.” The source will say James Angleton, the CIA’s director of counterintelligence (see 1973), began recruiting double agents inside the antiwar and civil rights organizations, and sending in “ringers” to penetrate the groups and report back to the CIA. “It was like a little FBI operation.” Angleton reportedly believes that both the protest groups and the US media are riddled with Soviet intelligence agents, and acts accordingly to keep those groups and organizations under constant watch. One source will say Angleton has a “spook mentality.” Another source will say that Angleton’s counterintelligence bureau is “an independent power in the CIA. Even people in the agency aren’t allowed to deal directly with the CI [counterintelligence] people. Once you’re in it, you’re in it for life.” [New York Times, 12/22/1974 pdf file]

Entity Tags: Senate Watergate Investigative Committee, Richard Helms, J. Edgar Hoover, James Angleton, Issuetsdeah

Timeline Tags: Civil Liberties, Nixon and Watergate

Nelson Rockefeller is sworn in as vice president (see August 20, 1974). [Rockefeller Family Archives, 6/7/2007]
Bad Blood and Confirmation Difficulties - Rockefeller has trouble even before taking office. Branded as a liberal by many in the Republican Party, and winning as many enemies as friends with his outsized ego and gladhanding demeanor, Rockefeller garnered swift and obdurate resistance particularly from the right wing both outside the White House (see August 24, 1974) and in (see September 21, 1974 and After). During the Senate’s confirmation hearings, many Democrats and some Republicans relished forcing Rockefeller, one of the wealthiest men in the country, to open his finances to public scrutiny. Even President Ford privately expresses his astonishment. “Can you imagine?” he asked during the hearings. “Nelson lost $30 million in one year and it didn’t make any difference.” When it was revealed that Rockefeller had given huge personal contributions to lawmakers and government officials—including Secretary of State Henry Kissinger—in the form of “loans” that never needed repaying, the Senate hearings became even more inquisitorial. The hearings dragged on for months until Ford personally intervened, telling House and Senate leaders that it was “in the national interest that you confirm Rockefeller, and I’m asking you to move as soon as possible.” [US Senate, 7/7/2007]
Cheney Wanted Reagan - Deputy Chief of Staff Dick Cheney, far more conservative than either Ford or Rockefeller, opposes Rockefeller’s influence from the start, and works with his boss, Chief of Staff Donald Rumsfeld, to minimize Rockefeller’s influence. In 1986, Cheney will say that Ford “should have thought of Ronald Reagan as vice president in the summer of 1974, if you are talking strictly in political terms.” [Dubose and Bernstein, 2006, pp. 38]
Domestic Squabbles - Both Ford and Rockefeller want the new vice president to be what Ford calls “a full partner” in his administration, particularly on domestic issues. Ford appoints him to chair the Domestic Council, but behind the scenes, Rockefeller’s implacable enemy, Rumsfeld, who sees Rockefeller as a “New Deal” economic liberal, blocks his influence at every term, both from personal and ideological dislike and from a desire to keep power in the White House to himself and his small, close-knit aides. (Cheney, ever attentive to indirect manipulations, inflames Rumsfeld’s dislike of Rockefeller even further by suggesting to his nakedly ambitious boss that if Rockefeller was too successful in implementing domestic policy, he would be perceived as “the man responsible for drafting the agenda of 1976,” thus limiting Rumsfeld’s chances of being named vice president in Ford’s re-election campaign (see November 4, 1975 and After). When Rockefeller tries to implement Ford’s suggested policy that domestic policymakers report to Ford through Rockefeller, Rumsfeld interferes. When Rockefeller names one of his trusted assistants, James Cannon, to head the Domestic Council, Rumsfeld slashes the Council’s budget almost to zero. When Rockefeller proposes a $100 billion Energy Independence Authority, with the aim to reduce and perhaps even end the nation’s dependency on foreign energy sources, Rumsfeld joins Ford’s economic and environmental advisers to block its creation. When Rockefeller proposes an idea for the president to Rumsfeld, Rumsfeld hands it off to Cheney, who ensures that it dies a quiet, untraceable bureaucratic death.
Rockefeller Neutralized - Cheney later recalls that Rockefeller “came to a point where he was absolutely convinced that Don Rumsfeld and myself were out to scuttle whatever new initiatives he could come up with.” Rumsfeld and other Ford staffers ensure that Rockefeller is not involved in key policy meetings; when Ford proposes large cuts in federal taxes and spending, Rockefeller complains, “This is the most important move the president has made, and I wasn’t even consulted.” Asked what he is allowed to do as vice president, Rockefeller answers: “I go to funerals. I go to earthquakes.” He says, only half sardonically, that redesigning the vice-presidential seal is “the most important thing I’ve done.” [Dubose and Bernstein, 2006, pp. 38-39; US Senate, 7/7/2007]
Following in Rockefeller's Footsteps - Ironically, when Cheney becomes vice president in 2001, he uses what Rockefeller intended to do as a model for his own, extremely powerful vice presidency. James Cannon, who came into the Ford administration with Rockefeller, will marvel in 2006, “Cheney is now doing what he and Rumsfeld blocked Rockefeller from doing—influencing policy.” [Dubose and Bernstein, 2006, pp. 39-40]

Entity Tags: Ronald Reagan, Nelson Rockefeller, Richard (“Dick”) Cheney, Ford administration, Donald Rumsfeld, Gerald Rudolph Ford, Jr, Henry A. Kissinger, James Cannon

Timeline Tags: Nixon and Watergate

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Vice President Nelson Rockefeller (see December 19, 1974 and After) is instrumental in keeping Senate Democrats from finding out too much about the intelligence community’s excesses. When the New York Times reveals the existence of a decades-old illegal domestic surveillance program run by the CIA (see December 21, 1974), President Ford heads off calls from Democrats to investigate the program by appointing the “Rockefeller Commission” to investigate in the Democrats’ stead. Senate Democrats, unimpressed with the idea, create the Church Committee to investigate the intelligence community (see April, 1976). Rockefeller is adept at keeping critical documents out of the hands of the Church Committee and the press. When Senator Frank Church asks for materials from the White House, he is told that the Rockefeller Commission has them; when he asks Rockefeller for the papers, he is told that he cannot have them because only the president can authorize access. One Church aide later calls Rockefeller “absolutely brilliant” in denying them access in a friendly manner. “He winked and smiled and said, ‘Gee, I want to help you but, of course I can’t—not until we’ve finished our work and the president approves it,’” the aide recalls. Senator John Tower (R-TX), the vice chairman of the committee, will later reflect, “We were very skillfully finessed.” But even Rockefeller, who has his own history of involvement with the CIA, is taken aback at the excesses of the CIA, particularly its history of assassinating foreign leaders. Rockefeller will eventually turn that information over to the Church Committee, giving that body some of the most explosive evidence as yet made public against the agency. [US Senate, 7/7/2007]

Entity Tags: John Tower, Church Committee, Nelson Rockefeller, Central Intelligence Agency, Frank Church, Gerald Rudolph Ford, Jr, ’Rockefeller Commission’

Timeline Tags: Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” [Dubose and Bernstein, 2006, pp. 34-35]

Entity Tags: Seymour Hersh, US Department of Defense, Ford administration, Edward Levi, Donald Rumsfeld, Church Committee, Richard (“Dick”) Cheney, Philip Buchan, New York Times, Gerald Rudolph Ford, Jr

Timeline Tags: Civil Liberties

The Senate Select Committee to Study Governmental Operations releases its report, “Alleged Assassination Plots Involving Foreign Leaders,” which finds “concrete evidence of at least eight plots involving the CIA to assassinate Fidel Castro from 1960 to 1965.” [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, US Congress

Timeline Tags: US-Cuba (1959-2005)

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]

Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News

Timeline Tags: Civil Liberties

President Ford issues Executive Order 11905, which limits the power of the CIA, the NSA, and military intelligence to engage in surveillance of US citizens. Perhaps its most well-known provision is a total ban on “political assassinations” by US government personnel. [Gerald R. Ford, 2/18/1976; Roberts, 2008, pp. 38] The provision is sparked by the Church Commission’s finding (see April, 1976) that assassination is “unacceptable in our society,” and a political embarassment, especially botched attempts such as the CIA’s efforts to kill Cuba’s Fidel Castro. [Grant J. Lilly, 4/6/2006]

Entity Tags: Church Commission, Gerald Rudolph Ford, Jr, National Security Agency, Central Intelligence Agency

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Interviewer David Frost has a difficult time with his subject, former President Richard Nixon, in the day’s early questioning (see April 6, 1977). Frost attempts to recoup with a line of questioning suggested by his adviser James Reston, Jr., one used in the trial of former Nixon aide John Ehrlichman (see January 1, 1975). Were there no limits to what a president can do, even if the president wants to do something plainly illegal? he asks. Could he do anything despite the law? Burglary? Forgery? Even murder? “If the president does it, that means it’s not illegal,” Nixon retorts. “Never had his imperialism been so baldly stated,” Reston will later reflect. Frost asks if the dividing line between, for example, a police burglary and the murder of an antiwar protester is only the president’s judgment? Nixon agrees, and adds: “There’s nothing specific that the Constitution contemplates in that respect. I haven’t read every word, every jot and every tittle, but I do know this: That it has been, however, argued that as far as a president is concerned, that in war time, a president does have certain extraordinary powers which would make acts that would otherwise be unlawful, lawful if undertaken for the purpose of preserving the nation and the Constitution, which is essential for the rights we’re all talking about.” [Time, 5/30/1977; Reston, 2007, pp. 102-105; Landmark Cases, 8/28/2007]

Entity Tags: Richard M. Nixon, David Frost, James Reston, Jr, John Ehrlichman

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

About 500 Iranian students take over the American Embassy in Tehran and hold 52 Americans hostage for 444 days. The Mujahedeen-e Khalq (MEK) is one of the groups that supports the take-over. [US Department of State, 4/30/2003; PBS, 1/15/2006]

Entity Tags: People’s Mujahedin of Iran

Timeline Tags: US confrontation with Iran, Iran-Contra Affair

Michael Barnes.Michael Barnes. [Source: Covington and Burling]Representative Michael Barnes (D-MD) is targeted by the NSA’s Echelon satellite surveillance program on orders from Reagan administration officials. Barnes, an outspoken opponent of Reagan’s Central American policies, had phone conversations with Nicaraguan officials intercepted and recorded, including one conversation between Barnes and the foreign minister of Nicaragua. Barnes learns of the surveillance after White House officials, apparently attempting to discredit Barnes, leaks transcripts of the taped conversations to reporters. CIA director William Casey shows Barnes a Nicaraguan embassy cable reporting a meeting between embassy staff and one of Barnes’s aides; Casey demands that Barnes fire the aide. Barnes refuses, noting that the aide had visited the embassy on legitimate business concerning international affairs. Barnes will say in 1995, “I was aware that NSA monitored international calls, that it was a standard part of intelligence gathering. But to use it for domestic political purposes is absolutely outrageous and probably illegal.” Former senator Dennis DeConcini (R-AZ) says he worries about the NSA spying on US citizens: “It has always worried me. What if that is used on American citizens? It is chilling. Are they listening to my private conversations on my telephone?” [Patrick S. Poole, 8/15/2000]

Entity Tags: Michael D. Barnes, Reagan administration, William Casey, National Security Agency, Dennis DeConcini, Echelon

Timeline Tags: Civil Liberties

A federal court rules that because of the government’s “state secrets” privilege (see March 9, 1953), a civilian plaintiff suing the US Navy over a contractual agreement cannot even access “non-privileged,” or unclassified, information from the Navy because to do so might “threaten disclosure” of material that goes against “the overriding interest of the United States… preservation of its state secrets privilege precludes any further attempt to pursue litigation.” [Siegel, 2008, pp. 196-197]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

President Ronald Reagan issues Executive Order 12333, which directs the US intelligence community to provide foreign intelligence data to the White House. The order reads in part, “[A]gencies are not authorized to use such techniques as electronic surveillance, unconsented physical searches, mail surveillance, physical surveillance, or monitoring devices unless they are in accordance with procedures established by the head of the agency concerned and approved by the Attorney General.” It establishes rules of conduct for the intelligence agencies, and mandates a certain level of Congressional oversight. [Executive Order 12333 -- United States intelligence activities, 4/5/2007] It also establishes the basis for what are later called “National Security Letters.” These NSLs, originally envisioned for use to compile information in hunts for foreign criminals and suspected terrorists, will later be used by the administration of George W. Bush to order US booksellers, librarians, employers, Internet providers, and others to turn over records and information they compile on US citizens, with strict adjuncts against allowing those targeted for surveillance to know about the NSLs and with virtually no government oversight (see October 25, 2005). [Washington Post, 11/6/2005] It does not, as some have later asserted, directly prohibit the assassination of targeted foreign subjects—i.e. terrorist suspects and even foreign leaders—though it does restrict the use of assassination by US government operatives to certain very restricted circumstances centered around critical aspects of national security. [Parks, 11/2/1989 pdf file]

Entity Tags: Ronald Reagan, George W. Bush, National Security Letters, Bush administration (43)

Timeline Tags: Civil Liberties

In the second of two rulings in the case of Halkin v Helms, the judiciary comes down squarely on the side of the US government against charges of illegal surveillance and wiretapping leveled against American anti-war protesters. The district and appellate courts uphold the federal government’s “state secrets” claim as codified in US v Reynolds (see March 9, 1953), thereby denying the plaintiffs the right to see government information that they claim would prove their case. The DC Court of Appeals writes that the federal courts do not have any constitutional role as “continuing monitors of the wisdom and soundness of Executive action,” and instead the courts “should accord utmost deference to executive assertions of privilege on grounds of military or diplomatic secrets… courts need only be satisfied that there is a reasonable danger” that military secrets might be exposed. [Siegel, 2008, pp. 196-196]

Timeline Tags: Civil Liberties

Margaret Thatcher.Margaret Thatcher. [Source: UK Parliament]British prime minister Margaret Thatcher, displeased with two of her ministers for challenging her on unidentified policy matters, requests that they be placed under electronic surveillance. Because it is illegal for British intelligence to monitor its own citizens, the operation is handed over to the CSE, Canada’s national security agency. [Daily Iowan, 1/19/2006; Janczewski and Colarik, 2007, pp. 454] According to former CSE spy Mike Frost, who will publicly discuss the matter in 2000, Thatcher “had two ministers that she said ‘…weren’t onside.’” Thatcher, says Frost, “wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers.” Why CSE and not British intelligence? Because for the British to monitor their own government members would be illegal—so instead, they farm out such activities to their allies. “The British Parliament now have total deniability,” Frost says. “They didn’t do anything. They know nothing about it. Of course they didn’t do anything; we did it for them.” Frost will say there is no way to pin any blame or criminal charges on anyone in the British government. “The British Parliament now has total deniability,” Frost says. “They didn’t do anything… we did it for them.” [ZDNet, 2/25/2000; CBS News, 2/27/2000]

Entity Tags: Communications Security Establishment, Mike Frost, Government Communications Headquarters, Margaret Thatcher

Timeline Tags: Civil Liberties

The DC Court of Appeals rejects a claim by civilian plaintiffs to force the government to disclose classified information as part of a lawsuit, citing the “state secrets” privilege (see March 9, 1953). Furthermore, the court broadens the definition of “state secrets” to include “disclosure of intelligence-gathering methods or capabilities and disruption of diplomatic relations.” [Siegel, 2008, pp. 197]

Timeline Tags: Civil Liberties

According to former Reagan Justice Department official Terry Eastland, writing in his 1992 book Energy in the Executive, the process of selecting Antonin Scalia as a Supreme Court Justice begins now, well before anyone knows there will be a vacancy for him. Attorney General Edwin Meese asks his assistant attorney general, William Bradford Reynolds, to advise him in preparing a nominee, “just in case.” Reynolds assembles a team of Justice Department officials, who examine about twenty possible choices, mostly federal judges, focusing primarily on conservative judicial philosophy. Two individuals stand out: Robert Bork and Scalia. Eastland writes, “Neither was ranked over the other; both were regarded as the best available, most well-qualified exponents of Reagan’s judicial philosophy.” Both are seen as powerful and influential legal figures. When Chief Justice Warren Burger announces his decision to retire from the bench, Reynolds advises Meese to choose Justice William Rehnquist to replace Burger as Chief Justice (see September 26, 1986), and to choose either Bork or Scalia to replace Rehnquist. Reagan makes the final decision: Scalia. [Dean, 2007, pp. 133]

Entity Tags: Robert Bork, Edwin Meese, William Rehnquist, Antonin Scalia, Terry Eastland, US Department of Justice, William Bradford Reynolds

Timeline Tags: Civil Liberties

Soliman Biheiri.Soliman Biheiri. [Source: US Immigrations and Customs]BMI Inc., a real estate investment firm based in Secaucus, New Jersey, is formed in 1986. Former counterterrorism “tsar” Richard Clarke will state in 2003, “While BMI [has] held itself out publicly as a financial services provider for Muslims in the United States, its investor list suggests the possibility this facade was just a cover to conceal terrorist support. BMI’s investor list reads like a who’s who of designated terrorists and Islamic extremists.” Investors in BMI include: [US Congress, 10/22/2003]
bullet Soliman Biheiri. He is the head of BMI for the duration of the company’s existence. US prosecutors will later call him the US banker for the Muslim Brotherhood, a banned Egyptian militant group. Biheiri’s computer will eventually be searched and found to have contact information for Ghaleb Himmat and Youssef Nada, leaders of the Al Taqwa Bank, which is founded two years after BMI (see 1988). After 9/11, the US and UN will designate both Himmat and Nada and the Al Taqwa Bank as terrorist financiers, and the bank will be shut down (see November 7, 2001). US prosecutors say there are other ties between BMI and Al Taqwa, including financial transactions. Biheiri also has close ties with Yousuf Abdullah Al-Qaradawi. Qaradawi is said to be a high-ranking member of the Muslim Brotherhood, a shareholder in Al Taqwa, and has made statements supporting suicide bombings against Israel. In 2003, US investigators will accuse Biheiri of ties to terrorist financing. He will be convicted of immigration violations and lying to a federal agent (see June 15, 2003). [Wall Street Journal, 9/15/2003; Forward, 10/17/2003] Biheiri will be convicted of immigration fraud in 2003 and then convicted of lying to federal investigators in 2004 (see June 15, 2003).
bullet Abdullah Awad bin Laden, a nephew of Osama bin Laden. He invests about a half-million dollars in BMI real estate ventures, earning a profit of $70,000. For most of the 1990s he runs the US branch of a Saudi charity called World Assembly of Muslim Youth (WAMY). He is investigated by the FBI in 1996 (see February-September 11, 1996), and WAMY will be raided by US agents in 2004 (see June 1, 2004). The raid is apparently part of a larger investigation into terrorism financing. In 2001, at least two of the 9/11 hijackers will live three blocks away from the WAMY office (see March 2001 and After). [Wall Street Journal, 9/15/2003; Washington Post, 4/19/2004]
bullet Nur and Iman bin Laden, two female relatives of Osama bin Laden. Abdullah Awad bin Laden will invest some of their money in a BMI real estate project. While their bin Laden family ties are intriguing, neither have been accused of any knowing connections to terrorist financing. [Washington Post, 4/19/2004]
bullet Mousa Abu Marzouk. He has identified himself as a top leader of Hamas. The US declares him a terrorist in 1995 (see July 5, 1995-May 1997). BMI makes at least two transactions with Marzouk after he is declared a terrorist. [Wall Street Journal, 9/15/2003]
bullet Yassin al-Qadi, a Saudi multimillionaire. His lawyers will later claim he has no terrorism ties and had only a passing involvement with BMI and liquidated his investment in it in 1996. However, another company operating from the same office as BMI is called Kadi International Inc. and lists its president as al-Qadi. Al-Qadi is also a major investor in the suspect computer company Ptech (see 1994; 1999-After October 12, 2001). Al-Qadi and BMI head Biheiri have financial dealings with Yaqub Mirza, a Pakistani who manages a group of Islamic charities in Virginia known as the SAAR network (see July 29, 1983). These charities will be raided in March 2002 on suspicions of terrorism ties (see March 20, 2002). Shortly after 9/11, the US will officially declare al-Qadi a terrorist financier (see October 12, 2001). [Wall Street Journal, 9/15/2003]
bullet Saleh Kamel. BMI allegedly receives a $500,000 investment from the Dallah Al-Baraka banking conglomerate, which is headed by Kamel. For many years before 9/11, Omar al-Bayoumi, an associate of 9/11 hijackers Khalid Almihdhar and Nawaf Alhazmi, will receive a salary from Dallah, despite apparently doing no work. Some will accuse al-Bayoumi of involvement in funding the 9/11 plot, but that remains to been proven (see August 1994-July 2001). Kamel reportedly founded a Sudanese Islamic bank which housed accounts for senior al-Qaeda operatives. He is a multi-billionaire heavily involved in promoting Islam, and his name appears on the Golden Chain, a list of early al-Qaeda supporters (see 1988-1989). He denies supporting terrorism. [US Congress, 10/22/2003; Wall Street Journal, 6/21/2004]
bullet The Kuwait Finance House. According to Clarke, this organization is alleged to be a BMI investor and the “financial arm of the Muslim Brotherhood in Kuwait. Several al-Qaeda operatives have allegedly been associated with the Kuwaiti Muslim Brotherhood, including Khalid Shaikh Mohammed, Suliman abu Ghaith, Wadih El-Hage, and Ramzi Yousef.” In 2003, an apparent successor entity to the Kuwait Finance House will be designated as a terrorist entity by the US. A lawyer for the Kuwait Finance House will later say the bank has never let its accounts be used for terrorism. [Wall Street Journal, 9/15/2003; US Congress, 10/22/2003; Wall Street Journal, 4/20/2005]
bullet Tarek Swaidan. He is a Kuwaiti, an associate of al-Qadi, and a leading member of the Kuwaiti branch of the Muslim Brotherhood. It is unknown if he has made any denials about his alleged associations. [Wall Street Journal, 9/15/2003]
bullet Abdurahman Alamoudi. For many years he runs the American Muslim Council, a lobby group founded by a top Muslim Brotherhood figure. US prosecutors say he also is in the Brotherhood, and has alleged ties to Hamas. In 2004, the US will sentence him to 23 years in prison for illegal dealings with Libya (see October 15, 2004). [Wall Street Journal, 6/21/2004; Washington Post, 10/16/2004]
bullet The International Islamic Relief Organization (IIRO) and the Muslim World League, closely connected Saudi charities suspected of financing terrorism. They give BMI $3.7 million out of a $10 million endowment from unknown Saudi donors. The Financial Times will later note, “While it is not clear whether that money came from the Saudi government, [a 2003] affidavit quotes a CIA report that says the Muslim World League ‘is largely financed by the government of Saudi Arabia.’” Both organizations consistently deny any support of terrorism financing, but in early 2006 it will be reported that US officials continue to suspect them of such support (see January 15, 2006). [Financial Times, 8/21/2003] In 1992, a branch of the IIRO gives $2.1 million to BMI Inc. to invest in real estate. The money disappears from BMI’s books. In October 1999, BMI goes defunct after it is unable to repay this money to the IIRO branch. The IIRO branch gives BMI the rest of the $3.7 million between 1992 and 1998. BMI will use the money to buy real estate (see 1992). Eventually, some of this money will be given to Hamas operatives in the West Bank and spent on violent actions against Israel. This will eventually lead to legal action in the US and a seizure of some of the money. [Wall Street Journal, 11/26/2002; Washington Post, 8/20/2003; Washington Times, 3/26/2004; Washington Post, 4/19/2004] By 1992, BMI has projected revenues in excess of $25 million, based largely on their real estate investments in the US. [US Congress, 10/22/2003] In early 1999, months before BMI goes defunct, the FBI hears evidence potentially tying BMI to the 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998), but an investigation into this will not be pursued (see Early 1999). It should be noted that BMI had many investors, and presumably most BMI investors would have had no suspicions that their money might be used to fund terrorism or other types of violence.

Entity Tags: Iman bin Laden, International Islamic Relief Organization, Muslim World League, Kuwait Finance House, Nur bin Laden, Mousa Abu Marzouk, Abdurahman Alamoudi, Richard A. Clarke, Soliman Biheiri, Abdullah Awad bin Laden, Yousuf Abdullah Al-Qaradawi, Tarek Swaidan, Yassin al-Qadi, Saleh Abdullah Kamel

Timeline Tags: Complete 911 Timeline

Antonin Scalia.Antonin Scalia. [Source: Oyez.org]Appeals court judge Antonin Scalia is sworn in as an Associate Justice of the US Supreme Court. [Legal Information Institute, 7/30/2007] Although Scalia is an ardent social conservative, with strongly negative views on such issues as abortion and homosexual rights, Scalia and Reagan administration officials both have consistently refused to answer questions about his positions on these issues, as President Reagan did at his June announcement of Scalia’s nomination. [Ronald Reagan Presidential Library, 6/17/1986] Scalia’s nomination is, in the words of Justice Department official Terry Eastland, “no better example of how a president should work in an institutional sense in choosing a nominee….” Eastland advocates the practice of a president seeking a judiciary nominee who has the proper “judicial philosophy.” A president can “influence the direction of the courts through his appointments” because “the judiciary has become more significant in our politics,” meaning Republican politics. [Dean, 2007, pp. 132] Scalia is the product of a careful search by Attorney General Edwin Meese and a team of Justice Department officials who wanted to find the nominee who would most closely mirror Reagan’s judicial and political philosophy (see 1985-1986).

Entity Tags: Ronald Reagan, Edwin Meese, Antonin Scalia, Terry Eastland, US Department of Justice

Timeline Tags: Civil Liberties

Radical Muslim leader Sheikh Omar Abdul-Rahman obtains his first US visa via the CIA. A State Department official will later discover this was the first of six US visas given to him between 1986 and 1990. All are approved by CIA agents acting as consular officers at US embassies in Sudan and Egypt. “The CIA officers claimed they didn’t know the sheikh was one of the most notorious political figures in the Middle East and a militant on the State Department’s list of undesirables.” But one top New York investigator will later say, “Left with the choice between pleading stupidity or else admitting deceit, the CIA went with stupidity.” [Boston Globe, 2/3/1995; New York Magazine, 3/17/1995] Abdul-Rahman uses the visas to attend conferences of Islamic students in the US. Then he visits Pakistan, where he preaches at Peshawar, visits the Saudi embassy in Islamabad, and is “lionized at receptions heavily attended by Americans.” He plays a prominent role in recruiting mujaheddin fighters to fight against the Soviets in Afghanistan. [Kepel, 2002, pp. 300] In 1989, Abdul-Rahman is arrested in Egypt and held under very closely guarded house arrest, but he manages to escape one year later, possibly by being smuggled out of his house in a washing machine. The CIA gives him another US visa and he moves to the US (see July 1990). [New York Times, 1/8/1995] Journalist Simon Reeve will claim in his 1999 book The New Jackals that, “The CIA, it is now clear, arranged the visa[s] to try and befriend the Sheikh in advance of a possible armed fundamentalist revolution in Egypt.” According to a retired CIA official, the CIA recalled mistakes made with the Ayatollah Khomeini in Iran and were trying to win Abdul-Rahman’s trust. [Reeve, 1999, pp. 60]

Entity Tags: Central Intelligence Agency, Omar Abdul-Rahman, Simon Reeve

Timeline Tags: Complete 911 Timeline

Khaled Abu el-Dahab.Khaled Abu el-Dahab. [Source: Egyptian government]In the mid-1980’s, Khaled Abu el-Dahab, an Egyptian medical student, joins the militant group Islamic Jihad, and also meets Ali Mohamed. Mohamed convinces el-Dahab to move to the US and become a sleeper cell agent. El-Dahab does so in 1987, moving to Santa Clara, California, where Mohamed has a residence. El-Dahab marries an American woman, becomes a US citizen, and gets a job at a computer company. In 1987, a female acquaintance of el-Dahab enters his apartment unannounced and finds several men there cleaning rifles. She decides it is something she does not want to know about, and breaks off contact with him. In 1990, Mohamed and el-Dahab travel together to Afghanistan. They are financially supported by a network of US sympathizers, including two Egyptian-American doctors. Beginning in 1990, El-Dahab’s apartment becomes an important communications hub for al-Qaeda and Islamic Jihad cells all over the world. For much of the 1990’s, the Egyptian government cut direct phone links to countries like Sudan, Yemen, Afghanistan or Pakistan in an effort to disrupt communications between radical militants. So Dahab acts as a telephone operator for the Islamic Jihad network, using a three-way calling feature to connect operatives in far-flung countries. He communicates with bin Laden’s base in Sudan (where bin Laden lives until 1996). He receives phone calls from the likes of Islamic Jihad leader Ayman al-Zawahiri, who also visits California twice (see Spring 1993; Late 1994 or 1995). He distributes forged documents and makes money transfers. He is trained to make booby-trapped letters, enrolls in a US flight school to learn how to fly gliders and helicopters, and recruits additional US sleeper agents (see Mid-1990s). He helps translate US army manuals and topographical maps into Arabic for al-Qaeda and Islamic Jihad training. El-Dahab will move to Egypt in 1998 and get arrested in October of that year. He will confess his role in all of this in an Egyptian trial in 1999. The Egyptian government will sentence him to 15 years in prison (see 1999). [New York Times, 10/23/2001; London Times, 11/11/2001; San Francisco Chronicle, 11/21/2001; Chicago Tribune, 12/11/2001]

Entity Tags: Al-Qaeda, Ali Mohamed, Osama bin Laden, Khaled Abu el-Dahab, Ayman al-Zawahiri, Islamic Jihad

Timeline Tags: Complete 911 Timeline

Michael Springmann.Michael Springmann. [Source: Michael Springmann]Michael Springmann, head US consular official in Jeddah, Saudi Arabia, later claims that during this period he is “repeatedly ordered… to issue [more than 100] visas to unqualified applicants.” He turns them down, but is repeatedly overruled by superiors. [BBC, 11/6/2001; St. Petersburg Times, 11/25/2001] In one case, two Pakistanis apply for visas to attend a trade show in the US, but they are unable to name the trade show or city in which it will be held. When Springmann denies them a visa, he gets “an almost immediate call from a CIA case officer, hidden in the commercial section [of the consulate], that I should reverse myself and grant these guys a visa.” Springmann refuses, but the decision is reversed by the chief of the consular section. Springmann realizes that even the ambassador, Walter Cutler, is aware of the situation, which becomes “more brazen and blatant” as time goes on. On one occasion Springmann is even told, “If you want a job in the State Department in future, you will change your mind.” [CBC Radio One, 7/3/2002; Trento, 2005, pp. 344-6] Springmann loudly complains to numerous government offices, but no action is taken. He is fired and his files on these applicants are destroyed. He later learns that recruits from many countries fighting for bin Laden against Russia in Afghanistan were funneled through the Jeddah office to get visas to come to the US, where the recruits would travel to train for the Afghan war. According to Springmann, the Jeddah consulate was run by the CIA and staffed almost entirely by intelligence agents. This visa system may have continued at least through 9/11, and 11 of the 19 9/11 hijackers received their visas through Jeddah (see November 2, 1997-June 20, 2001), possibly as part of this program (see October 9, 2002 and October 21, 2002). [BBC, 11/6/2001; St. Petersburg Times, 11/25/2001; CBC Radio One, 7/3/2002; Associated Press, 7/17/2002 pdf file; Fox News, 7/18/2002]

Entity Tags: Central Intelligence Agency, US Consulate, Jeddah, Saudi Arabia Office, Michael Springmann

Timeline Tags: Complete 911 Timeline, War in Afghanistan

Strom Thurmond.Strom Thurmond. [Source: US Government]Former Lockheed software manager Margaret Newsham, who worked at the Menwith Hill facility of the NSA’s Echelon satellite surveillance operation in 1979, says she heard a real-time phone intercept of conversations involving senator Strom Thurmond (R-SC). She was shocked, she recalls, because she thought only foreign communications were being monitored. Newsham, who was fired from Lockheed after she filed a whistleblower lawsuit alleging fraud and waste, tells the chairman of the House Intelligence Committee, Louis Stokes (D-OH), of the overheard conversations. In July, Capital Hill staffers will leak the story to the Cleveland Plain Dealer. Thurmond says he doesn’t believe Newsham’s story, but his office admits that it has previously received reports that Thurmond had been a target of NSA surveillance. Thurmond will decline to press for an investigation, and the reason for the surveillance has never been revealed. [CBS News, 2/27/2000; Patrick S. Poole, 8/15/2000]

Entity Tags: Strom Thurmond, National Security Agency, House Intelligence Committee, Louis Stokes, Echelon, Cleveland Plain Dealer, Lockheed Martin Corporation, Margaret Newsham

Timeline Tags: Civil Liberties

Ali Mohamed’s US passport, issued in 1989.Ali Mohamed’s US passport, issued in 1989. [Source: US Justice Department] (click image to enlarge)Ali Mohamed is honorably discharged from the US Army with commendations in his file, including one for “patriotism, valor, fidelity, and professional excellence.” He remains in the Army Reserves for the next five years. [New York Times, 12/1/1998; Raleigh News and Observer, 10/21/2001] A US citizen by this time, he will spend much of his time after his discharge in Santa Clara, California, where his wife still resides. He will try but fail to get a job as an FBI interpreter, will work as a security guard, and will run a computer consulting firm out of his home. [San Francisco Chronicle, 9/21/2001]

Entity Tags: US Department of the Army, Ali Mohamed

Timeline Tags: Complete 911 Timeline

A lawsuit against the FBI’s investigation of a sixth-grade boy and his school project to create an “encyclopedia of the world” is stopped when an appeals court rules that the agency is shielded by the “state secrets” privilege (see March 9, 1953). Unable to secure information from the FBI as to why it investigated him, the child had therefore “failed to sustain his burden of proof [and] the cause of action was properly dismissed.” [Siegel, 2008, pp. 197]

Entity Tags: Federal Bureau of Investigation

Timeline Tags: Civil Liberties

Sheikh Omar Abdul-Rahman.Sheikh Omar Abdul-Rahman. [Source: FBI]Despite being on a US terrorist watch list for three years, radical Muslim leader Sheikh Omar Abdul-Rahman enters the US on a “much-disputed” tourist visa issued by an undercover CIA agent. [Village Voice, 3/30/1993; Atlantic Monthly, 5/1996; Lance, 2003, pp. 42] Abdul-Rahman was heavily involved with the CIA and Pakistani ISI efforts to defeat the Soviets in Afghanistan, and became famous traveling all over the world for five years recruiting new fighters for the Afghan war. The CIA gave him visas to come to the US starting in 1986 (see December 15, 1986-1989) . However, he never hid his prime goals to overthrow the governments of the US and Egypt. [Atlantic Monthly, 5/1996] FBI agent Tommy Corrigan will later say that prior to Abdul-Rahman’s arrival, “terrorism for all intents and purposes didn’t exist in the United States. But [his] arrival in 1990 really stoke the flames of terrorism in this country. This was a major-league ballplayer in what at the time was a minor-league ballpark. He was… looked up to worldwide. A mentor to bin Laden, he was involved with the MAK over in Pakistan.” The charity front Maktab al-Khidamat (MAK) is also known as Al-Kifah, and it has a branch in Brooklyn known as the Al-Kifah Refugee Center. The head of that branch, Mustafa Shalabi, picks up Abdul-Rahman at the airport when he first arrives and finds an apartment for him. Abdul-Rahman soon begins preaching at Al Farouq mosque, which is in the same building as the Al-Kifah office, plus two other locals mosques, Abu Bakr and Al Salaam. [Lance, 2006, pp. 53] He quickly turns Al-Kifah into his “de facto headquarters.” [Atlantic Monthly, 5/1996] He is “infamous throughout the Arab world for his alleged role in the assassination of Egyptian president Anwar Sadat.” Abdul-Rahman immediately begins setting up a militant Islamic network in the US. [Village Voice, 3/30/1993] He is believed to have befriended bin Laden while in Afghanistan, and bin Laden secretly pays Abdul-Rahman’s US living expenses. [Atlantic Monthly, 5/1996; ABC News, 8/16/2002] For the next two years, Abdul-Rahman will continue to exit and reenter the US without being stopped or deported, even though he is still on the watch list (see Late October 1990-October 1992).

Entity Tags: National Security Agency, Osama bin Laden, Meir Kahane, Omar Abdul-Rahman, Central Intelligence Agency, Al-Kifah Refugee Center, US Department of State, Abu Bakr Mosque, Al Farouq Mosque, Al Salaam Mosque, Anwar Sadat, World Trade Center

Timeline Tags: Complete 911 Timeline

Counterterrorism expert Rohan Gunaratna will later write that Khalid Shaikh Mohammed (KSM) first “earned his spurs” in al-Qaeda by serving as one of Osama bin Laden’s first bodyguards. Then, in 1991, bin Laden sends KSM to the Philippines where he trains members of the militant groups Abu Sayyaf and the Moro Islamic Liberation Front (MILF) in bomb making and assassination. He works with bin Laden’s brother-in-law Mohammed Jamal Khalifa to establish an operational base there and also in Malaysia. Presumably he also works with his nephew Ramzi Yousef, who trains Abu Sayyaf militants the same year (see December 1991-May 1992). Gunaratna says that “After proving himself an outstanding organizer, [KSM] was given substantial operational authority and autonomy by bin Laden.” However, KSM’s work with the Abu Sayyaf and MILF is soon discovered and he “has been on the run since 1991.” KSM will return with Yousef to the Philippines in 1994 to exploit the network they built and develop the Bojinka plot (see January 6, 1995). [Gunaratna, 2003, pp. xxiv-xxix]

Entity Tags: Osama bin Laden, Abu Sayyaf, Mohammed Jamal Khalifa, Khalid Shaikh Mohammed, Ramzi Yousef, Moro Islamic Liberation Front

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Hambali, an important future al-Qaeda leader, moves to the village of Sungai Manggis, Malaysia, about an hour north of the capital of Kuala Lumpur. Hambali is from nearby Indonesia and fought in Afghanistan with Osama bin Laden in the late 1980s. He starts off poor, working at odd jobs, but soon is frequently traveling and has many overseas visitors. Intriguingly, Hambali’s landlord will later say of Hambali’s visitors, “Some looked Arab and others white.” Hambali plays a major role in the 1995 Bojinka plot in the Philippines (see January 6, 1995), and after that plot is foiled he continues to live in his simple Sungai Manggis house. [Time, 4/1/2002; Los Angeles Times, 9/1/2002] Living near Hambali in this village are other regional Islamist militant leaders such as Abdullah Sungkar, Imam Samudra (allegedly a key figure in the 2000 Christmas bombings (see December 24-30, 2000) and the 2002 Bali bombings (see October 12, 2002)), Abu Bakar Bashir, the spiritual leader of the al-Qaeda affiliate Jemaah Islamiyah, and Abu Jibril. So many militants live in this village that it becomes known as “Terror HQ” to intelligence agencies. Sungkar and Bashir are considered the two most well-known militant leaders in Southeast Asia at the time (Sungkar dies of old age in 1999). Hambali’s house is directly across from Bashir’s and they are considered friends. [Tempo, 10/29/2002; Ressa, 2003] Interestingly, Fauzi Hasbi, an Indonesian government mole posing as a militant leader, lives next door to Bashir as well. [SBS Dateline, 10/12/2005] Despite his role in the Bojinka plot, Hambali continues to live there very openly. Beginning in March 1995, just two months after the plot was foiled, Hambali throws his first feast for several hundred guests to mark a Muslim holiday. This becomes an annual party. He also sometimes travels to Indonesia. [Time, 4/1/2002] By May 1999, if not earlier, the FBI connects Hambali to the Bojinka plot (see May 23, 1999). In January 2000, he attends a key al-Qaeda summit in nearby Kuala Lumpur. The CIA gets pictures and video footage of him at the meeting and already has pictures of him from a computer linked to the Bojinka plot (see January 5-8, 2000 and January 5, 2000). However, there is no apparent effort to apprehend him, extradite him, or even put him on a public wanted list. He continues to live in Sungai Manggis until at least late 2000. [Conboy, 2003]

Entity Tags: Fauzi Hasbi, Abu Bakar Bashir, Hambali, Abdullah Sungkar, Jemaah Islamiyah, Abu Jibril, Imam Samudra

Timeline Tags: Complete 911 Timeline

A US appellate court refuses to find a number of military contractors liable in the death of Earl Patton Ryals, who died with 36 of his fellow crewmen in the Iraqi attack on the USS Stark (see May 17, 1987 and After). Ryals’s estate claims that he and his fellows died in part because of negligence on the part of the contractors who designed, manufactured, tested, and marketed the weapons system on board the Stark, including the Phalanx anti-missile system. In turning down the estate’s claim, the court cites the government’s “state secrets” privilege (see March 9, 1953), saying that the facts of the issue could not be resolved without examining classified Navy documents. And even without this reason, the court rules, Ryals’s estate cannot see the documents because the case presents “a political question” about military decision-making that is not subject to judicial review. [Zuckerbraun v. General Dynamics Corp., 6/13/1991; Siegel, 2008, pp. 197-198] A year later, a similar case will be dismissed on the grounds that a trial might conceivably reveal “state secrets” (see September 16, 1992).

Entity Tags: Earl Patton Ryals, US Department of the Navy

Timeline Tags: Civil Liberties

When Supreme Court Justice Thurgood Marshall, the first and only African-American to serve on the Court, announces his retirement, the Bush administration is ready with a far more conservative replacement. President Bush himself is already under fire for previously naming a moderate, David Souter, to the Court, and Bush is determined to give his conservative base someone they can back. Although Bush had wanted to nominate an appropriately conservative Hispanic, his eventual nomination is Clarence Thomas, who is completing his first year as a judge on the DC Court of Appeals. Thomas has two qualifications that Bush officials want: like Marshall, he is African-American; unlike Marshall, he is as conservative a jurist as Antonin Scalia (see September 26, 1986) or Robert Bork (see July 1-October 23, 1987). Two of former President Reagan’s closest legal advisers, C. Boyden Gray and Lee Liberman (a co-founder of the conservative Federalist Society), privately call Thomas “the black Bork.” Bush calls Thomas “the most qualified man in the country” for the position. [New York Times, 7/2/1991; Dean, 2007, pp. 146-153] During the July 2 press conference to announce Thomas’s nomination, Bush says: “I don’t feel he’s a quota. I expressed my respect for the ground that Mr. Justice Marshall plowed, but I don’t feel there should be a black seat on the Court or an ethnic seat on the Court.” For his part, Thomas extols his upbringing as a desperately poor child in Georgia, crediting his grandmother and the nuns who taught him in Catholic schools as particular influences on his life and values. Republican senator Orrin Hatch says that opposing Thomas will be difficult: “Anybody who takes him on in the area of civil rights is taking on the grandson of a sharecropper.” [New York Times, 7/2/1991] However, the non-partisan American Bar Association’s recommendation panel splits on whether Thomas is qualified or not, the first time since 1969 the ABA has failed to unanimously recommend a nominee. Twelve panelists find Thomas “qualified,” two find him “not qualified,” and none find him “well qualified.” One senior Congressional aide calls the assessment of Thomas “the equivalent of middling.” [New York Times, 8/28/1991; Dean, 2007, pp. 146-153] In 2007, former Nixon White House counsel John Dean will write, “For the president to send a nominee to the Supreme Court with anything less than a uniformly well-qualified rating is irresponsible, but such decisions have become part of the politicization of the judiciary.” Thomas, himself a beneficiary of the nation’s affirmative action programs, opposes them, once calling them “social engineering;” he has no interest in civil rights legislation, instead insisting that the Constitution should be “color-blind” and the courts should stay out of such matters. Civil rights, women’s rights, and environmental groups are, in Dean’s words, “terrified” of Thomas’s nomination. To overcome these obstacles, the Bush administration decides on a strategy Dean calls “crude but effective… us[ing] Thomas’s color as a wedge with the civil rights community, because he would pick up some blacks’ support notwithstanding his dismal record in protecting their civil rights. [New York Times, 7/2/1991; Dean, 2007, pp. 146-153] The nomination of an African-American quells some of the planned resistance to a conservative nominee promised by a number of civil rights organizations. [New York Times, 7/2/1991] Three months later, Thomas will be named to the court after a bitterly contentious brace of confirmation hearings (see October 13, 1991).

Entity Tags: Orrin Hatch, US Supreme Court, Lee Liberman, Robert Bork, John Dean, Thurgood Marshall, David Souter, American Bar Association, Bush administration (41), Antonin Scalia, George Herbert Walker Bush, Clayland Boyden Gray, Clarence Thomas

Timeline Tags: Civil Liberties

Ramzi Yousef, the future bomber of the WTC in 1993, stays in the Philippines and trains militants there in bomb-making. According to Philippine intelligence documents, Yousef had developed expertise in bomb-making and worked at a training camp at Khost, Afghanistan, teaching bomb-making for militants connected to bin Laden. But bin Laden dispatches him to the Philippines, where he trains about 20 militants belonging to the Abu Sayyaf group. Abu Sayyaf is heavily penetrated by Philippine undercover operatives at this time, especially Edwin Angeles, an operative who is the second in command of the group. Angeles will later recall that Yousef is introduced to him at this time as an “emissary from bin Laden.” [Strategic Studies Institute of the US Army War College, 9/1/2005 pdf file] Angeles also claims Yousef decided to use the Philippines as a “launching pad” for terrorist acts around the world. [New York Times, 9/6/1996] One of Abu Sayyaf’s top leaders will later recall that Yousef also brings a significant amount of money to help fund the group. [Philippine Daily Inquirer, 1/22/2007; CNN, 1/31/2007] A flow chart of Yousef’s associates prepared in early 1995 by Angeles’ Philippines handler Rodolfo Mendoza shows a box connected to Abu Sayyaf labeled “20 trainees/recruits.” So presumably the Philippine government is aware of this information by then, but it is not known when they warned the US about it (see Spring 1995). Yousef will also later admit to planning the 1993 WTC bombing at an Abu Sayyaf base, which most likely takes place at this time (see Early 1992). The ties between Yousef and Abu Sayyaf will grow stronger, culminating in the 1995 Bojinka plot (see January 6, 1995), an early version of the 9/11 plot.

Entity Tags: Ramzi Yousef, Abu Sayyaf, Edwin Angeles, Rodolfo Mendoza

Timeline Tags: Complete 911 Timeline

The CIA produces the last edition of its Redbook before 9/11. The Redbook is a manual written by the CIA for immigration officials; it helps the officials identify terrorists using telltale signs in their passports through commonalities among forged passports, travel cachets, and visas used by terrorists. The 1992 edition claims that more than “200 people carrying forged passports provided by terrorist groups have been identified before they could engage in terrorist acts.”
Types of Fraud - It focuses on five types of travel document fraud committed by terrorists: forgeries of some 35 national passports and the travel cachets of at least 45 countries; forged documents terrorists purchase from commercial vendors; stolen blank passports, which terrorists can fill in with biographical data of their choosing; information on genuine altered passports that have been photo-substituted or given an extended validity date; and genuine, unaltered passports, most likely procured with the knowledge of the issuing country or through a corrupt government official.
Reason for Discontinuance - The 9/11 Commission will say that the Redbook stops being published in 1992 due to “a lack of new exemplars,” but then add that there was plenty of “raw data” and a “rich trove of information on the travel tactics of terrorists” after this time. Citing an interview with an unnamed source, the commission will say that the CIA claimed it had no new data to analyze, as the FBI did not share what it gathered from its law enforcement investigations. However, the CIA did certainly obtain some new exemplars between 1992 and 9/11. For instance, it found some visa stamps, blank Egyptian birth certificates, and a forged passport in a June 1998 raid on extremists in Albania.
Significance of Non-Publication - The commission will also note that the information contained in the Redbook is directly relevant to al-Qaeda’s travel tactics before 9/11: “From the 1993 bombing of the World Trade Center to the disruption of the millennium plot in December 1999, information suggested that al-Qaeda continued to employ all five methods of document fraud first noted in the Redbook years earlier, along with some new methods of their own.” The commission will also highlight how important the failure to take advantage of the information contained in the Redbook will be: “In practical terms, this meant the United States denied itself the ability to disrupt terrorist operations and prevent undetected terrorist entries by disrupting operatives’ ability to travel.” Several of the 9/11 hijackers will have anomalies in their passports (see November 2, 2007). [9/11 Commission, 8/21/2004, pp. 45-46, 61, 69, 102 pdf file] Islamist radicals linked to the WTC bombings and fighting in Bosnia will obtain a copy of the Redbook at some point in the next three years (see 1995 or Before).

Entity Tags: 9/11 Commission, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

Apparently the bin Laden guest house where Yousef lived.Apparently the bin Laden guest house where Yousef lived. [Source: National Geographic]According to Pakistani investigators, Ramzi Yousef spends most of this time at the Beit Ashuhada guesthouse (translated as House of Martyrs) in Peshawar, Pakistan, which is funded by Osama bin Laden. Pakistani investigators reveal this bin Laden-Yousef connection to US intelligence in March 1995. The CIA will publicly reveal this in 1996. [Central Intelligence Agency, 1996 pdf file; Tenet, 2007, pp. 100] While living there, Yousef receives help and financing from two unnamed senior al-Qaeda representatives. [Reeve, 1999, pp. 47] Yousef will be arrested at another nearby bin Laden safe house in February 1995 (see February 7, 1995) with bin Laden’s address found in his pocket. [London Times, 10/18/1997] During these years, Yousef takes long trips to the US in preparation of the WTC bombing (see February 26, 1993) and the Philippines, where several plots are developed (see January 6, 1995). He also uses an al-Qaeda influenced mosque in Milan, Italy, as a logistical base (see 1995-1997).

Entity Tags: Osama bin Laden, Al-Qaeda, Ramzi Yousef

Timeline Tags: Complete 911 Timeline

A federal appeals court upholds the dismissal of a lawsuit filed on behalf of 23 Navy sailors killed in the attack on the USS Stark (see May 17, 1987 and After) against a number of defense contractors. A similar lawsuit on behalf of one of the sailors killed in the attack was dismissed a year before (see June 13, 1991). This time the plaintiffs file over 2,500 pages of unclassified documentary evidence supporting their claims that the contractors were negligent in their design and implementation of the weapons systems aboard the Stark. The appeals court finds that regardless of the amount of evidence entered, to allow the trial would be to potentially infringe on the US government’s “state secrets” privilege (see March 9, 1953). “[N]o amount of effort could safeguard the privileged information,” the court rules. The court adds that “classified and unclassified information cannot always be separated, and therefore courts must restrict access not only to classified material, but to “those pieces of evidence” that “press so closely upon highly sensitive material that they create a hgh risk of inadvertent or indirect disclosures.” [Siegel, 2008, pp. 198]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

Terry Nichols.Terry Nichols. [Source: Oklahoma City Police Department]White separatist Terry Nichols (see March 24, 1988 - Late 1990, December 22 or 23, 1988, April 2, 1992 and After, and October 12, 1993 - January 1994) makes a number of trips to the Phillippines, apparently to meet with al-Qaeda bomber Ramzi Yousef and other radical Islamists. Nichols will later help plan and execute the Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995). Nichols’s wife is a mail-order bride from Cebu City; Nichols spends an extensive amount of time on the island of Mindanao, where many Islamist terror cells operate. This information comes from a Philippine undercover operative, Edwin Angeles, and one of his wives. Angeles is the second in command in the militant group Abu Sayyaf from 1991 to 1995 while secretly working for Philippine intelligence at the same time (see 1991-Early February 1995). After the Oklahoma City bombing, Angeles will claim in a videotaped interrogation that in late 1992 and early 1993 Nichols meets with Yousef and a second would-be American terrorist, John Lepney. In 1994, Nichols meets with Yousef, Lepney, and others. For about a week, Angeles, Yousef, Nichols, and Lepney are joined by Abdurajak Janjalani, the leader of Abu Sayyaf; two members of the Moro Islamic Liberation Front (MILF); Abdul Hakim Murad and Wali Khan Amin Shah, both of whom are working with Yousef on the Bojinka plot (see January 6, 1995); and a half-brother of Yousef known only by the alias Ahmad Hassim (this is a probable reference to Yousef’s brother Abd al-Karim Yousef, who is living in the Philippines at this time). Elmina Abdul, Angeles’s third wife, will add additional details about these 1994 meetings in a taped 2002 hospital confession to a Philippines reporter days before her death. She only remembers Nichols as “Terry” or “The Farmer,” and doesn’t remember the name of the other American. She says: “They talked about bombings. They mentioned bombing government buildings in San Francisco, St. Louis, and in Oklahoma. The Americans wanted instructions on how to make and to explode bombs. [Angeles] told me that Janjalani was very interested in paying them much money to explode the buildings. The money was coming from Yousef and the other Arab.” [Gulf News, 4/3/2002; Insight, 4/19/2002; Manila Times, 4/26/2002; Insight, 6/22/2002; Nicole Nichols, 2003] (“The other Arab” may be a reference to the Arab Mohammed Jamal Khalifa, Osama bin Laden’s brother-in-law, because Janjalani’s younger brother later claims Abu Sayyaf was funded in its early years by Yousef and Khalifa.) [CNN, 1/31/2007] Abdul claims Nichols and Lepney are sent to an unnamed place for more instructions on bomb-making to destroy a building in the US. She also says that Angeles and others in Abu Sayyaf believe Yousef works for the Iraqi government. [Insight, 6/22/2002] The Manila Times later reports that “Lepney did indeed reside and do business in Davao City [in the Southern Philippines] during 1990 to 1996.” One bar owner recalls that when Lepney got drunk he liked to brag about his adventures with local rebel groups. [Manila Times, 4/26/2002] In 2003, Nicole Nichols (no relation to Terry Nichols), the director of the watchdog organization Citizens against Hate, will explain why an American white supremacist would make common cause with Islamist terrorists. Two unifying factors exist, she writes: an overarching hatred of Jews and Israel, and a similarly deep-seated hatred of the US government. [Nicole Nichols, 2003] After Nichols takes part in the 1995 Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995), Wali Khan Amin Shah will attempt to take the credit for plotting the bombing for himself and Yousef, a claim federal authorities will not accept (see April 19, 1995 and 10:00 a.m. April 19, 1995 and After).

Entity Tags: Moro Islamic Liberation Front, Mohammed Jamal Khalifa, Ramzi Yousef, Wali Khan Amin Shah, Nicole Nichols, Elmina Abdul, Terry Lynn Nichols, Abu Sayyaf, Edwin Angeles, Abd al-Karim Yousef, John Lepney, Abdul Hakim Murad, Abdurajak Janjalani

Timeline Tags: Complete 911 Timeline, US Domestic Terrorism

Nawaf Alhazmi (left), and Khalid Almihdhar (right).Nawaf Alhazmi (left), and Khalid Almihdhar (right). [Source: FBI]Of all the 9/11 hijackers, Nawaf Alhazmi and Khalid Almihdhar have the longest records of involvement with al-Qaeda. CIA Director Tenet calls them al-Qaeda veterans. According to the CIA, Alhazmi first travels to Afghanistan in 1993 as a teenager, then fights in Bosnia with Alhazmi (see 1995). Almihdhar makes his first visit to Afghanistan training camps in 1996, and then fights in Chechnya in 1997. Both swear loyalty to bin Laden around 1998. Alhazmi fights in Afghanistan against the Northern Alliance with his brother, Salem Alhazmi. He fights in Chechnya, probably in 1998. [Observer, 9/23/2001; ABC News, 1/9/2002; US Congress, 6/18/2002; Los Angeles Times, 9/1/2002; US Congress, 7/24/2003, pp. 131 pdf file] He then returns to Saudi Arabia in early 1999 where he shares information about the 1998 US embassy bombings. However it is not clear what information he disclosed to whom or where he obtained this information. [US Congress, 7/24/2003, pp. 131 pdf file] It is possible that some or all of this information came from the NSA, which is intercepting some of Alhazmi’s phone calls at this time (see Early 1999).

Entity Tags: Al-Qaeda, Osama bin Laden, George J. Tenet, Nawaf Alhazmi, Khalid Almihdhar, Northern Alliance, Salem Alhazmi

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The 9/11 Commission, relying on a CIA report, will later say that three of the men involved in the 1993 World Trade Center bombing travel on Saudi passports containing an indicator of possible Islamist extremism. [9/11 Commission, 8/21/2004, pp. 46-47, 61 pdf file] Author James Bamford will say that it is a “secret coded indicator, placed there by the Saudi government, warning of a possible terrorist affiliation.” [Bamford, 2008, pp. 58-59] It is unclear what the indicator looks like precisely and who the men are. However, Ahmad Ajaj, an associate of lead bomber Ramzi Yousef, does have a Saudi passport. Some of the 9/11 hijackers will later use Saudi passports with the same indicator (see October 28, 2000, June 1, 2001, and June 13, 2001, and November 2, 2007). [9/11 Commission, 8/21/2004, pp. 46-47, 61 pdf file]

Entity Tags: Ahmad Ajaj

Timeline Tags: Complete 911 Timeline

Ali Mohamed helps Ayman al-Zawahiri enter the US for a fundraising tour and acts as his head of security during his stay. At the time, al-Zawahiri is known to have been the head of the militant group Islamic Jihad since the late 1980’s. He is also al-Qaeda’s de facto number two leader, though this is not widely known. This is apparently his second visit to the US; having previously paid a recruiting visit to the Al-Kifah Refugee Center in Brooklyn in 1989 (see 1986-1993). The exact timing of this second visit is disputed, but New Yorker magazine will report that “people at the FBI” assert “al-Zawahiri arrived in America shortly after the first bombing of the World Trade Center” in February 1993. Al-Zawahiri stays at Mohamed’s residence in Santa Clara, California, posing as a representative of a charity organization. It is said that not much money is raised. [New Yorker, 9/9/2002] Al-Zawahiri will make another apparently more successful fundraising trip to the US in either late 1994 or sometime in 1995 (see Late 1994 or 1995).

Entity Tags: Ayman al-Zawahiri, Federal Bureau of Investigation, Ali Mohamed

Timeline Tags: Complete 911 Timeline

Mohammmed Salameh.Mohammmed Salameh. [Source: Sygma / Corbis]An internal FBI report finds that Khalid Shaikh Mohammed (KSM) played a role in the bombing of the World Trade Center. According to the report, KSM wired $660 from Qatar to a bank account of Mohammed Salameh, one of the key bombers, on November 3, 1992. This is apparently the first time KSM has come to the attention of US law enforcement. Transaction records show the money was sent from “Khaled Shaykh” in Doha, Qatar, which is where KSM is living openly and without an alias at the time (see 1992-1995). [US Congress, 7/24/2003] KSM also frequently talked to his nephew Ramzi Yousef on the phone about the bombing and sent him a passport to escape the country, but apparently these details are not discovered until much later. [9/11 Commission, 7/24/2004, pp. 147, 488]

Entity Tags: Mohammed Salameh, Ramzi Yousef, Federal Bureau of Investigation, Khalid Shaikh Mohammed

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mahmud Abouhalima.Mahmud Abouhalima. [Source: Agence France-Presse]Mahmud Abouhalima is arrested for his role in the February 1993 WTC bombing. He meets with US investigators without his lawyer and provides a detailed account of the Al-Kifah Refugee Center, bin Laden’s main support base in the US in the early 1990s. He says that twice he turned to a Texas acquaintance named Wadih El-Hage to buy weapons for his associates. El-Hage, who turns out to be bin Laden’s personal secretary (see September 15, 1998), will later be caught and convicted of bombing the US embassies in Africa in 1998 (see 10:35-10:39 a.m., August 7, 1998). Abouhalima further recounts fighting in Afghanistan with the mujaheddin in the 1980s and tells of travelling to training camps with a Palestinian man named Mohammed Odeh. A Palestinian man with the name Mohammed Saddiq Odeh will later be convicted of a role in the 1998 embassy bombings as well. Abouhalima offers additional inside information about the bomb plot and his associates in exchange for a lighter sentence. But, as the New York Times will later note, prosecutors turn down the offer “for reasons that remain unclear.” Abouhalima is later found guilty and sentenced to life in prison. [New York Times, 10/22/1998]

Entity Tags: Mohammed Saddiq Odeh, Wadih El-Hage, Mahmud Abouhalima

Timeline Tags: Complete 911 Timeline

Essam Marzouk.Essam Marzouk. [Source: FBI]US-al-Qaeda double agent Ali Mohamed is detained by the Royal Canadian Mounted Police (RCMP) in Vancouver, British Columbia, after attempting to pick up a man named Essam Marzouk, who is carrying numerous false passports. The RCMP identifies Mohamed as a top al-Qaeda operative. Mohamed admits to it that he traveled to Vancouver to help Marzouk sneak into the US and admits working closely with Osama bin Laden. [San Francisco Chronicle, 11/4/2001; Globe and Mail, 11/22/2001; Wall Street Journal, 11/26/2001] After many hours of questioning, Mohamed tells the Canadian officials to call John Zent, his handler at the FBI. Zent confirms that Mohamed works for the FBI and asks them to release him. They do. [Lance, 2006, pp. 124] Mohamed is accompanied by fellow al-Qaeda operative Khaled Abu el-Dahab (see 1987-1998), who brings $3,000 sent by bin Laden to pay for Marzouk’s bail. Marzouk had run one of bin Laden’s training camps in Afghanistan and was an active member of the al-Qaeda allied group Islamic Jihad at the time. However, Canadian intelligence apparently is unaware of his past. Marzouk will spend almost a year in detention. But then, again with the help of another visit to Canada by Mohamed, Marzouk will be released and allowed to live in Canada (see June 16, 1993-February 1998). He later will help train the bombers who carry out the 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). [Globe and Mail, 11/22/2001; National Post, 11/26/2005] Jack Cloonan, an FBI agent who later investigates Mohamed, will say: “I don’t think you have to be an agent who has worked terrorism all your life to realize something is terribly amiss here. What was the follow up? It just sort of seems like [this incident] dies.” [Lance, 2006, pp. 125]

Entity Tags: Royal Canadian Mounted Police, John Zent, Osama bin Laden, Jack Cloonan, Khaled Abu el-Dahab, Essam Marzouk, Ali Mohamed, Federal Bureau of Investigation, Canadian Security Intelligence Service

Timeline Tags: Complete 911 Timeline

In late 1993, bin Laden asks Ali Mohamed to scout out possible US, British, French, and Israeli targets in Nairobi, Kenya. Mohamed will later confess that in December 1993, “I took pictures, drew diagrams and wrote a report.” Then he travels to Sudan, where bin Laden and his top advisers review Mohamed’s work. In 1994, Mohamed claims that “bin Laden look[s] at a picture of the American Embassy and point[s] to where a truck could go as a suicide bomber.” A truck will follow bin Laden’s directions and crash into the embassy in 1998. Mohamed seems to spend considerable time in Nairobi working with the cell he set up there and conducting more surveillance. He also is sent to the East African nation of Djibouti to scout targets there, and is asked to scout targets in the West African nation of Senegal. [Los Angeles Times, 10/21/2000; Chicago Tribune, 12/11/2001; LA Weekly, 5/24/2002; 9/11 Commission, 6/16/2004] Much of his work seems to be done together with Anas al-Liby, a top al-Qaeda leader with a mysterious link to Western intelligence agencies similar to Mohamed’s. In 1996, British intelligence will pay al-Liby to assassinate Libyan leader Colonel Mu’ammar al-Qadhafi (see 1996), and then will let him live openly in Britain until 2000 (see Late 1995-May 2000). Al-Liby is said to be a “computer wizard” known for “working closely” with Mohamed. [New York Times, 2/13/2001; New York Times, 4/5/2001] L’Houssaine Kherchtou, an al-Qaeda member who later turns witness for a US trial (see September 2000), was trained in surveillance techniques in Pakistan by Mohamed in 1992. Kherchtou will claim he later comes across Mohamed in 1994 in Nairobi. Mohamed, Anas al-Liby, and a relative of al-Liby’s use Kherchtou’s apartment for surveillance work. Kherchtou sees al-Liby with a camera about 500 meters from the US embassy. [Washington File, 2/22/2001] Mohamed returns to the US near the end of 1994 after an FBI agent phones him in Nairobi and asks to speak to him about an upcoming trial. [Washington File, 2/22/2001]

Entity Tags: Ali Mohamed, L’Houssaine Kherchtou, Anas al-Liby, Federal Bureau of Investigation, Osama bin Laden

Timeline Tags: Complete 911 Timeline

Khalid Shaikh Mohammed in a 1998 FBI wanted poster.Khalid Shaikh Mohammed in a 1998 FBI wanted poster. [Source: FBI]9/11 mastermind Khalid Shaikh Mohammed (KSM) lives in the Philippines for a year, planning Operation Bojinka until the plot is exposed in January 1995 and he has to flee (see January 6, 1995). Police later say he lives a very expensive and non-religious lifestyle. He goes to karaoke bars and go-go clubs, dates go-go dancers, stays in four-star hotels, and takes scuba diving lessons. Once he rents a helicopter just to fly it past the window of a girlfriend’s office in an attempt to impress her. This appears to be a pattern; for instance, he has a big drinking party in 1998. [Los Angeles Times, 6/24/2002] Officials believe his obvious access to large sums of money indicate that some larger network is backing him by this time. [Los Angeles Times, 6/6/2002] One of the participants in Bojinka is a Pakistani businessman with alleged ties to the ISI and the drug trade. This Pakistani is said to use counterfeit US currency to help fund the Bojinka plot (see September 18-November 14, 1994). It has been suggested that KSM, a Pakistani, is able “to operate as he please[s] in Pakistan” during the 1990s [Los Angeles Times, 6/24/2002] , and he is linked to the Pakistani ISI by 1993 (see Spring 1993). His hedonistic time in the Philippines resembles reports of hijackers Mohamed Atta and Marwan Alshehhi in the Philippines in 1998-2000 (see December 1999). KSM returns to the Philippines occasionally, and he is even spotted there after 9/11 (see September 1998-January 1999).

Entity Tags: Khalid Shaikh Mohammed, Operation Bojinka

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Abdussattar Shaikh.Abdussattar Shaikh. [Source: Fox News]Abdussattar Shaikh, a San Diego resident, is recruited by a local FBI special agent as an “asset,” or informant. [US Department of Justice, 11/2004, pp. 260 pdf file] Shaikh will later offer rooms in his house in Lemon Grove, California, to two of the future 9/11 hijackers, Nawaf Alhazmi and Khalid Almihdhar, but it will be unclear how much information he shares about them with his FBI handler, Steven Butler (see May 10-Mid-December 2000). Despite much scrutiny after 9/11, little information will emerge on Shaikh’s background or why he came to the FBI’s notice. Shaikh was born in India and came to the US in 1959. [New York Times, 10/24/2001] He became a US citizen in 1976. [9/11 Commission, 4/23/2004] Presumably, he is of interest to the FBI because he is a member of the local Muslim community. A report by the Justice Department’s inspector general will say: “The FBI had interviewed the asset in connection with a bombing investigation several years before.… Initially the asset was not paid. In July 2003, the asset was given a $100,000 payment and closed as an asset.” The report will provide little additional information as to Shaikh’s activities on behalf of the FBI. [US Department of Justice, 11/2004, pp. 260 pdf file] It is also not entirely clear how Shaikh makes a living. Press reports after 9/11, including a report in a local magazine to which he gave a rare interview, will describe him as as retired professor of English at San Diego State University. [San Diego Magazine, 2/2002] Another profile will not identify which institutions he is affiliated with, and describes him as primarily an English as a second language teacher to Saudi military officers and their families. [New York Times, 10/24/2001]

Entity Tags: Abdussattar Shaikh, Steven Butler, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline

The southern part of Yemen attempts to cede from the rest of the country, but loses the ensuing war and north Yemeni forces take the south’s capital, Aden, reuniting the country. Yemen first united in 1990, but tensions between the two former independent halves of the country resulted in the civil war. As the south is regarded as communist, the north is backed by both the US and Osama bin Laden. [Guardian, 5/6/1994; CounterPunch, 5/20/2002; Wall Street Journal, 12/20/2002; Terrorism Monitor, 4/8/2004] The New York Times will say that the north Yemeni president uses “large numbers of Arab Afghans formed into Islamic terrorist units as his shock troops.” [New York Times, 11/26/2000] CIA officer Michael Scheuer will comment, “In 1993 and 1994, bin Laden sent al-Qaeda fighters from Pakistan to Afghanistan—via Sudan—to fight the Yemeni Communists in the civil war that yielded a reunified Yemen.” [Scheuer, 2006, pp. 151] According to Western intelligence, before the war Ali Mohsen al-Ahmar, a brother of north Yemen’s President Ali Abdallah Saleh, received US$ 20 million from bin Laden to help settle Arab Afghan fighters in the country. When war breaks out, as military commander he deploys these fighters in the war’s final battle for the south’s capital of Aden. Despite its socialist tendencies, the south is backed by Saudi Arabia, as it thinks a divided Yemen is less of a threat to it. [CounterPunch, 5/20/2002; Wall Street Journal, 12/20/2002; Terrorism Monitor, 4/8/2004] Veteran Middle Eastern journalist Brian Whittaker will comment, “The Saudis invested hugely in the war on behalf of the South, and the outcome is a defeat for them as much as anyone.” [Middle East International, 7/22/1994] After the war, the government will allow the radical fighters to settle in Yemen and use it as a base (see After July 1994).

Entity Tags: Yemen, Osama bin Laden, Saudi Arabia, Ali Mohsen al-Ahmar, United States

Timeline Tags: Complete 911 Timeline

A young Indonesian nicknamed Hambali forms a front company that ties al-Qaeda figures to the Bojinka plot (see January 6, 1995), an early version of the 9/11 plot. Hambali had fought in Afghanistan in the late 1980’s, repeatedly met with bin Laden there, and allied himself to bin Laden’s cause. In 1994, Hambali, living in a village north of Kuala Lumpur, Malaysia, began frequently receiving visitors. According to his landlord, “Some looked Arab and others white.” There has been no explanation who these “white” visitors may have been. Hambali had been very poor prior to this time, but he is suddenly “flush with newfound cash” brought by the visitors. In June 1994, he founds a front company called Konsonjaya with Wali Khan Amin Shah, a key Bojinka plotter, and both their names are listed on the eight-person board of directors. Shah fought with bin Laden in Afghanistan, and bin Laden will even admit knowing him and praise him in an 1998 interview (see May 28, 1998). Philippine police phone taps show that frequent calls are made from the Konsonjaya offices in Malaysia to the Philippines offices of Mohammed Jamal Khalifa, bin Laden’s brother-in-law who is also believed to be part of the Bojinka plot (see 1994). [Time, 4/1/2002] A Malaysian official will later say that Hambali spends time in the Philippines with Shah and bomber Ramzi Yousef in 1994 as they plan the Bojinka plot. [Washington Post, 2/3/2002] Mohammed Amin al-Ghafari, another Konsonjaya director, makes frequent trips from Malaysia to the Philippines while planning for the Bojinka plot is under way, and he is later believed to play a key role in financing the plot. In early 1995, after the Bojinka plot is broken up, one of the arrested Bojinka plotters will confess to Konsonjaya’s role in the plot (see February-Early May 1995) and a Philippine investigator’s flow chart of the Bojinka plotters and their connections will prominently include Konsonjaya (see Spring 1995). However, neither the Philippine nor US government appears interested in capturing Hambali, al-Ghafari, or the others involved in Konsonjaya before 9/11. [Los Angeles Times, 6/24/2002; Contemporary Southeast Asia, 12/1/2002] Hambali will continue to live openly in Malaysia, even throwing a party every year for hundreds of people (see April 1991-Late 2000). He will go on to plan other al-Qaeda attacks and will attend a key planning meeting for the 9/11 plot in 2000 (see January 5-8, 2000). [Time, 4/1/2002] Al-Ghafari will finally be deported in 2002 after years of police protection (see October 8-November 8, 2002).

Entity Tags: Wali Khan Amin Shah, Ramzi Yousef, Mohammed Amin al-Ghafari, Konsonjaya, Hambali, Mohammed Jamal Khalifa, Operation Bojinka

Timeline Tags: Complete 911 Timeline

Al-Qaeda deputy head Ayman al-Zawahiri spends time in Yemen and holds meetings there. Yemen is favorably inclined towards militants, due to the help they provided to the winning side in the 1994 civil war (see May 21-July 7, 1994 and After July 1994). Al-Zawahiri holds Islamic Jihad meetings at the Youth House, a government-run hall in the capital of Sana’a, according to confessions presented at a 1999 Cairo trial (see 1999). A defector will later reveal where al-Zawahiri is staying in Yemen to the local authorities, but the authorities, who sympathize with radical Islam, tip off al-Zawahiri and he escapes to Afghanistan (see Spring-Summer 1998). [Wall Street Journal, 12/20/2002] Al-Zawahiri is also reported to be in Yemen in the summer of 2001 (see Late July-August 2001).

Entity Tags: Islamic Jihad, Ayman al-Zawahiri

Timeline Tags: Complete 911 Timeline

White separatist Terry Nichols (see March 24, 1988 - Late 1990, December 22 or 23, 1988, October 12, 1993 - January 1994, and February - July 1994) flees the scene of a robbery he has committed in Arkansas and goes to Council Grove, Kansas, where he has rented a storage locker (see November 7, 1994), and then to Las Vegas, to stash the proceeds of the robbery with his ex-wife, Lana Padilla (see November 5, 1994 and November 6, 1994). Nichols makes plans to leave for the Philippines to visit his family in Cebu City, and leaves a note to be opened only if he does not return (see Late 1992-Early 1993 and Late 1994) by January 28, 1995—days after the terrorist plot Operation Bojinka was to be executed (see January 6, 1995). Nichols leaves the US on November 11.
Opening the Note - Padilla, fearing her ex-husband has left her a suicide note, opens it after taking Nichols to the airport. The note, titled “Read and Do Immediately,” instructs Padilla to send all of Nichols’s cash and valuables, including the loot from the robbery, to his wife Marife Nichols in Cebu City (see July - December 1990). Some of the cash and valuables, he says, is in a Las Vegas storage unit, and some is hidden in Padilla’s kitchen, behind a wooden panel in the back of her kitchen utility drawer. “As of now, only Marife, you, and myself know what there is and where it is. I hope you will do as I have stated. Josh has just a few years before he’s capable of being on his own and Marife and Nicole [Nichols’s young daughter by Marife—see (September 30, 1994)] have many more years of support needed. There is no need to tell anyone about the items in storage and at home.” After reading the note, Padilla is convinced Nichols intends to kill himself. She follows the directions in the note, breaks through the wooden panel behind her utility drawer, and finds $20,000 in cash in a plastic baggie.
Note to Fellow Bombing Conspirator - The note also contains two letters to Nichols’s fellow conspirator in the Oklahoma City bombing plan, Timothy McVeigh (see September 13, 1994, October 20, 1994, and 8:35 a.m. - 9:02 a.m. April 19, 1995), both addressed to “Tim.” The first tells McVeigh how to access the Las Vegas storage locker and where his blue pickup truck will be parked for his use if he needs it. Padilla drives to the Las Vegas storage locker and finds a box of carved jade, camera equipment, precious stones, and a ski mask. Much of this material will later be connected to the Arkansas robbery. The second letter to McVeigh instructs him to “clear everything out of CG 37” and to “also liquidate 40,” apparently referring to two storage lockers Nichols has rented in Council Grove (see October 17, 1994, and November 7, 1994) under the alias “Ted Parker,” which contain, among other items, a store of explosive fertilizer and some of the guns stolen in the Arkansas robbery. If he chooses, Nichols writes, McVeigh can pay for further rentals on the lockers instead of clearing them out. He warns McVeigh about possible law enforcement attention, writing: “As far as heat—none that I know. This letter would be for the purpose of my death.” The letter concludes: “Your [sic] on your own. Go for it!” Based on the instructions regarding the fertilizer, federal authorities will come to believe that Nichols is instructing McVeigh to go ahead with plans to bomb a federal building in Oklahoma City (see 8:35 a.m. - 9:02 a.m. April 19, 1995).
Return to the US - Nichols will return to the US on January 16, 1995 and, after staying a few days at Padilla’s home in Las Vegas, settle in Herington, Kansas, a tiny town not far from the ranch where he recently worked (see (September 30, 1994)). [New York Times, 5/28/1995; PBS Frontline, 1/22/1996; New York Times, 11/20/1997; Washington Post, 12/24/1997; Serrano, 1998, pp. 112-114; Douglas O. Linder, 2001; Nicole Nichols, 2003]
Later Attempts to Explain Letter, Actions - In his statement to the FBI (see 3:15 p.m. and After, April 21-22, 1995), Nichols will claim to have returned to the US on November 17. The indictment against Nichols will allege that he rented a storage locker in Las Vegas on November 16, based in part on his FBI statement. These dates do not correspond with other evidence showing Nichols remains in the Philippines until January 16. A chronology of events compiled by McVeigh’s lawyers (see Early 2005) also has McVeigh staying in Arkansas and New Mexico motels with Nichols in mid-December 1994. These contradictions are never adequately explained. [PBS Frontline, 1/22/1996] Nichols will also tell authorities that the phrase “Go for it!” is nothing more than an innocent reference to an old sales pitch he and his ex-wife had used in the early days of their marriage. The government authorities will not believe Nichols’s explanation. [Serrano, 1998, pp. 114] After the bombing, Padilla will tell authorities that Nichols gave her a key to a storage locker at the AAAABCO storage facility in Las Vegas, as stated in his note. The locker, she will say, contained thousands of dollars in gold and silver bouillon, tubular pipe, ski masks, and other items (see May 9, 1995 and May 11, 1995), many of which will be linked to the Arkansas robbery. After the bombing, FBI investigators will find a key to a safe-deposit box from the robbery in Nichols’s Herington home (see (February 20, 1995)) along with other items from the robbery. [New York Times, 5/9/1995; New York Times, 5/12/1995; New York Times, 5/28/1995; New York Times, 11/20/1997]

Entity Tags: Terry Lynn Nichols, Timothy James McVeigh, Marife Torres Nichols, Roger E. (“Bob”) Moore, Lana Padilla

Timeline Tags: US Domestic Terrorism

A young Ayman al-Zawahiri dressed as a Westerner.A young Ayman al-Zawahiri dressed as a Westerner. [Source: Public domain via BBC]Ali Mohamed helps Ayman al-Zawahiri enter the US for another fundraising tour and acts as his head of security during his stay. At the time, al-Zawahiri is known to have been the head of the militant group Islamic Jihad since the late 1980’s. He is also al-Qaeda’s de facto number two leader, though this is not widely known. This is apparently his third visit to the US after recruiting and fundraising trips in 1989 and 1993 (see Spring 1993) . [New Yorker, 9/9/2002] Al-Zawahiri travels on a passport forged by Mohamed and uses a false name. He pretends to be a doctor for a charity raising money for refugees in Afghanistan, but in fact raises money for his Islamic Jihad group. Some donors know his true purpose, and others do not. According to one security expert, he is also in the US “to see whom he could recruit here, what could be done here—preparing the establishment of a base.” Mohamed and Khaled Abu el-Dahab (see 1987-1998), the two known members of a Santa Clara, California, based al-Qaeda sleeper cell, host al-Zawahiri in Santa Clara and escort him to nearby mosques in Santa Clara, Stockton, and Sacramento. [San Francisco Chronicle, 10/11/2001; Chicago Tribune, 12/11/2001] He spends weeks in the US, traveling to other states such as Texas and New York to raise money from mosques there as well. He raises as much as $500,000. El-Dahab is later told some of the money collected is used later in the year to fund bombing of Egyptian Embassy in Islamabad, Pakistan, killing 17 diplomats (see November 19, 1995). [San Francisco Chronicle, 10/11/2001] Accounts on the timing of the trip are vague, and differ as to whether it took place in late 1994 or some time in 1995. Perhaps coincidentally, Mohammed Jamal Khalifa, bin Laden’s brother-in-law, is arrested in mid-December 1994 in Morgan Hill, California, approximately 30 miles from Santa Clara. The FBI finds and quickly translates literature in Khalifa’s luggage advocating training in assassination, explosives, and weapons, bombing churches, and murdering Catholic priests, but seemingly inexplicably, they deport him a few months later (see December 16, 1994-May 1995). Two directors of President Clinton’s National Security Council’s counterterrorism team later will claim that they did not learn of al-Zawahiri’s trips until 1999, and even then they only learned about it by accident and were unable to get the FBI to reveal any more about the trips (see 1999).

Entity Tags: Khaled Abu el-Dahab, Islamic Jihad, Ali Mohamed, Federal Bureau of Investigation, Ayman al-Zawahiri

Timeline Tags: Complete 911 Timeline

Mohammed Jamal Khalifa.Mohammed Jamal Khalifa. [Source: CBS News]Mohammed Jamal Khalifa, a brother-in-law to bin Laden, is arrested in the US. He is held for visa fraud, but he is believed to be a major terrorist. His arrest takes place at a Holiday Inn in Morgan Hill, California. [San Francisco Chronicle, 10/24/2001] That is only about 20 miles from Santa Clara, where double agent Ali Mohamed is running an al-Qaeda cell (see 1987-1998). Counterterrorism expert Steven Emerson will later say of Khalifa and Mohamed, “It seems to me that they were probably in contact. I’m basing that only intuitively on the fact that they were in the same area, they were close to bin Laden, and they would’ve had an incentive to stay together.” [Lance, 2006, pp. 167] According to one account, Khalifa is arrested on behalf of the government of Jordan, because he is on trial there. [San Francisco Chronicle, 10/24/2001] Another account claims that Philippine authorities “tipped off Federal authorities on Khalifa’s movements.” [Filipino Reporter, 4/27/1995] He is traveling on a Saudi passport. He’d flown into the US from London on December 1 and has papers indicating he would be heading back to the Philippines. [Lance, 2006, pp. 158-159] It has been claimed that the CIA helped him get his US visa (see December 1, 1994). There are many reasons for US authorities to suspect Khalifa is a major terrorist figure:
bullet He is arrested with Mohammed Loay Bayazid, one of the dozen or so original members of al-Qaeda. Bayazid had attempted to purchase nuclear material for bin Laden the year before (see December 16, 1994).
bullet Philippine investigators had recently completed a secret report on terrorist funding. The report focuses on Khalifa, and says his activities in the Philippines strongly link with Muslim extremist movements in Iraq, Jordan, Turkey, Russia, Malaysia, the United Arab Emirates, Romania, Lebanon, Syria, Pakistan, Albania, the Netherlands, and Morocco. It calls a charity which Khalifa runs a “pipeline through which funding for the local extremists is being coursed.” Perhaps not coincidentally, the report was released just one day before Khalifa’s arrest in the US (see December 15, 1994).
bullet His possessions, which are quickly examined and translated, include a handwritten manual in Arabic detailing how to set up a terrorist curriculum at a school in the Philippines, giving lessons in bomb-making and assassination. [San Francisco Chronicle, 10/24/2001]
bullet Khalifa’s business card was discovered in a search of the New York City residence of Sheikh Omar Abdul-Rahman in 1993 (see August 1993).
bullet He is an unindicted coconspirator in the “Landmarks” bombings plot, which would have killed thousands in New York City. The trial is getting underway at this time. Abdul-Rahman will be convicted and sentenced to over 300 years in prison (see June 24, 1993).
bullet A State Department cable from days after his arrest states Khalifa is a “known financier of terrorist operations and an officer of an Islamic NGO in the Philippines that is a known Hamas front.”
bullet An alias is found in his personal organizer that was also used in a bomb-making manual brought into the US by Ahmad Ajaj, Ramzi Yousef’s travel partner, when the two of them came to the US to implement the 1993 World Trade Center bombing (see September 1, 1992).
bullet Bojinka plotter Wali Khan Amin Shah’s phone number is found in Khalifa’s possessions. The Bojinka plot, if successful, also would have killed thousands (see January 6, 1995). [Lance, 2006, pp. 158-159]
bullet A number in Pakistan that Ramzi Yousef had used to call the Philippines is found as well. Author Peter Lance will later note that such numbers “should have led the FBI directly to Ramzi Yousef, the world’s most wanted man” at the time. [Lance, 2006, pp. 160]
However, despite this wealth of highly incriminating material, within weeks of his arrest the US will decide to deport him to Jordan (see January 5, 1995). Over the next four months, even more of his links to terrorist activity will be discovered (see Late December 1994-April 1995). But Khalifa will be deported anyway (see April 26-May 3, 1995), and then soon freed in Jordan (see July 19, 1995).

Entity Tags: Ramzi Yousef, Steven Emerson, US Department of State, Wali Khan Amin Shah, Philippines, Ahmad Ajaj, Peter Lance, Mohammed Loay Bayazid, Ali Mohamed, Osama bin Laden, Federal Bureau of Investigation, Mohammed Jamal Khalifa, Jordan, Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline

News reports will later reveal that a Philippine government undercover operative working with the Philippine militant group Abu Sayyaf was deeply involved in the Bojinka plot, an early version of the 9/11 plot. Edwin Angeles, an uncover operative so deeply imbedded in Abu Sayyaf that he was actually the group’s second in command, gave up his cover in February 1995 (see Early February 1995), weeks after the Bojinka plot was foiled (see January 6, 1995). In 1996, the New York Times will report that according to US investigators, “Angeles said he worked alongside [Ramzi] Yousef as he planned the details of the [Bojinka] plot.” [New York Times, 8/30/1996] The Advertiser, an Australian newspaper, reports that after giving up his cover, Angeles reveals that Abdurajak Janjalani, the leader of Abu Sayyaf, and Abu Sayyaf generally, had a “far greater role in the plot to assassinate the Pope and blow up the US airliners than foreign intelligence agencies had previously thought. He said he had met Yousef several times in the Manila flat…” Unlike the New York Times, which only reported that Angeles switched sides in February 1995, the Advertiser notes that “many people believe” Angeles “was a military-planted spy” all along. [Advertiser, 6/3/1995] This will be confirmed in later news reports, and in fact Angeles secretly had worked for Philippine intelligence since the formation of Abu Sayyaf in 1991 (see 1991-Early February 1995). It is not clear what Angeles may have told his government handlers while the Bojinka plot was in motion, if anything.

Entity Tags: Ramzi Yousef, Abdurajak Janjalani, Abu Sayyaf, Edwin Angeles

Timeline Tags: Complete 911 Timeline

The Communications Assistance for Law Enforcement Act (CALEA) takes effect. CALEA obliges telecommunications providers such as AT&T to give law enforcement agencies and US intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks. In more recent years, the law will be expanded to give law enforcement and intelligence agencies similar abilities to monitor Internet usage by US citizens. [Federal Communications Commission, 2/21/2007]

Entity Tags: Communications Assistance for Law Enforcement Act (CALEA), AT&T

Timeline Tags: Civil Liberties

Two businessmen inform Philippine police that they heard explosions and saw Middle Eastern men engaged in what appeared to be military-type training on a remote beach two hours from Manila. Police quickly investigate and discover a partially burned Bible and pamphlets preaching a radical version of Islam. As a result, police go on red alert and several days later will foil the Bojinka plot (see January 6, 1995). An investigation conducted the following month will conclude that there were 20 people taking part in military-styled training on the beach from the last week of December until January 2. Fifteen of them were foreign nationals, from Egypt, Palestine, and Pakistan. [Vitug and Gloria, 2000, pp. 222-223; Ressa, 2003, pp. 33] Ramzi Yousef is likely elsewhere at the time, but a beach house at this training location was rented by him. [Reeve, 1999, pp. 86] Despite the suggestion that large numbers of people are involved in the Bojinka plot, the US will apparently lose interest in the case after detaining just three of the plotters. Later in 1995, the Philippine government will arrest several dozen suspected foreign terrorists and then let them go (see April 1, 1995-Early 1996). [Vitug and Gloria, 2000, pp. 222-223; Ressa, 2003, pp. 33]

Entity Tags: Philippine National Police, Operation Bojinka, Ramzi Yousef

Timeline Tags: Complete 911 Timeline

One of Ramzi Yousef’s timers seized by Philippines police in January 1995.One of Ramzi Yousef’s timers seized by Philippines police in January 1995. [Source: Peter Lance]Responding to an apartment fire, Philippine investigators uncover an al-Qaeda plot to assassinate the Pope that is scheduled to take place when he visits the Philippines one week later. While investigating that scheme, they also uncover Operation Bojinka, planned by the same people: 1993 WTC bomber Ramzi Yousef and 9/11 mastermind Khalid Shaikh Mohammed (KSM). [Independent, 6/6/2002; Los Angeles Times, 6/24/2002; Los Angeles Times, 9/1/2002] Many initial reports after 9/11 will claim the fire was accidental and the police discovery of it was a lucky break, but in 2002 the Los Angeles Times will report that the police started the fire on purpose as an excuse to look around the apartment. In the course of investigating the fire, one of the main plotters, Abdul Hakim Murad, is arrested. [Los Angeles Times, 9/1/2002] The plot has two main components. On January 12, Pope John Paul II is scheduled to visit Manila and stay for five days. A series of bombs along his parade route would be detonated by remote control, killing thousands, including the Pope. Yousef’s apartment is only 500 feet from the residence where the Pope will be staying. [Reeve, 1999, pp. 78; Lance, 2006, pp. 138] Then, starting January 21, a series of bombs would be placed on airplanes. [Insight, 5/27/2002] Five men, Yousef, Wali Khan Amin Shah, Abdul Hakim Murad, Abd al-Karim Yousef (a.k.a., Adel Anon, Yousef’s twin brother), and Khalid Al-Shaikh (thought to be an alias for KSM) would depart to different Asian cities and place a timed bomb on board during the first leg of passenger planes traveling to Los Angeles, San Francisco, Honolulu, and New York. They would then transfer to another flight and place a second bomb on board that flight. In all, 11 to 12 planes would blow up in a two day period over the Pacific. If successful, some 4,000 people would have been killed. [Agence France-Presse, 12/8/2001; Insight, 5/27/2002; Contemporary Southeast Asia, 12/1/2002] According to another account, some of the bombs would be timed to go off weeks or even months later. Presumably worldwide air travel could be interrupted for months. [Lance, 2003, pp. 260-61] A second wave of attacks involving crashing airplanes into buildings in the US would go forward later, once the pilots are trained for it (see February-Early May 1995).

Entity Tags: Abd al-Karim Yousef, Khalid Shaikh Mohammed, Ramzi Yousef, Wali Khan Amin Shah, Operation Bojinka, Al-Qaeda, Abdul Hakim Murad

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Bomb making materials found in Yousef’s Manila apartment.Bomb making materials found in Yousef’s Manila apartment. [Source: CNN]After a late night raid of the Manila, Philippines, apartment central to the Bojinka plot (see January 6, 1995), investigators find what the Los Angeles Times will call “an intelligence gold mine.” [Los Angeles Times, 9/1/2002] Very quickly, a team of US intelligence agents joins Philippine investigators to sort through the evidence, which fills three police vans. Investigators are able to match fingerprints in the apartment with fingerprints on record for Ramzi Yousef, already believed to be the mastermind behind the 1993 World Trade Center bombing (see February 26, 1993). There are priests’ robes, pipe bombs, a dozen passports, chemicals, maps of the Pope’s planned route through Manila, and more. [Washington Post, 9/30/2001; Los Angeles Times, 9/1/2002] “The most damning information was gleaned from Yousef’s notebook computer, and four accompanying diskettes.” The data is encrypted and in Arabic, but technicians are quickly able to decipher and translate it. [Washington Post, 9/30/2001] Computer data includes “the names of dozens of associates, and photos of some; a record of five-star hotels; and dealings with a trading corporation in London, a meat market owner in Malaysia, and an Islamic center in Tucson, Ariz.… They describe how money moved through an Abu Dhabi banking firm.” [Washington Post, 9/23/2001] Photographs of all five operatives who would place bombs on airplanes are recovered from a deleted computer file. [Los Angeles Times, 5/28/1995] Wali Khan Amin Shah is identified from one of these five photos, plus a list of cell phone numbers found on the hard drive. He is traced to another Manila apartment and arrested on January 11. Under interrogation, Shah, who soon escapes from custody in unexplained circumstances (see January 13, 1995), confesses that most of the funds for the Bojinka plot were channeled to Yousef through a bank account belonging to Ahmad al-Hamwi, a Syrian working at the International Relations and Information Center (IRIC), a charity front run by Mohammed Jamal Khalifa, Osama bin Laden’s brother-in-law. [Washington Post, 9/30/2001] But despite these leads, Ramzi Yousef is the only other person successfully arrested based on all this data (and Yousef’s arrest will largely be due to an informant responding to an existing tip off program (see February 7, 1995)). The Philippine government will arrest other Bojinka plotters later in the year, including another one of the five operatives assigned to place bombs on the planes, but they will all be released (see April 1, 1995-Early 1996). Al-Hamwi is never arrested, while Khalifa is actually in US custody at the time of the Bojinka raid but is soon let go (see April 26-May 3, 1995). The IRIC will be closed down, but its operations are immediately taken over by another close associate of Khalifa (see 1995 and After).

Entity Tags: Ramzi Yousef, Operation Bojinka, Wali Khan Amin Shah, International Relations and Information Center, Abdul Hakim Murad, Mohammed Jamal Khalifa, Ahmad al-Hamwi

Timeline Tags: Complete 911 Timeline

As the Bojinka plot is foiled (see January 6, 1995), a document found on Ramzi Yousef’s computer spells out the Bojinka plotters’ broad objectives. “All people who support the US government are our targets in our future plans and that is because all those people are responsible for their government’s actions and they support the US foreign policy and are satisfied with it.… We will hit all US nuclear targets. If the US government keeps supporting Israel, then we will continue to carry out operations inside and outside the United States to include…” At this point, the document comes to a halt in mid-sentence. [Washington Post, 9/23/2001] Khalid Shaikh Mohammed, much more than Ramzi Yousef, is the mastermind of the Bojinka plot. He will continue to work on the plot until it eventually morphs into the 9/11 attack. [Associated Press, 6/25/2002] Philippine Gen. Renado De Villa will later state, “They didn’t give up the objective.” Captured Bojinka plotter Abdul Hakim Murad “clearly indicated it was a large-scale operation. They were targeting the US. And they had a worldwide network. It was very clear they continued to work on that plan until someone gave the signal to go.” [Washington Post, 9/23/2001]

Entity Tags: Ramzi Yousef, Abdul Hakim Murad, Khalid Shaikh Mohammed, Renado De Villa

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Wali Khan Amin Shah.Wali Khan Amin Shah. [Source: Associated Press]Bojinka plotter Wali Khan Amin Shah is arrested in the Philippines on January 11, 1995, and he quickly implicates Khalid Shaikh Mohammed (KSM) as a key member in the Bojinka plot. The Bojinka plot was exposed on January 6, and the plotters attempt to flee the Philippines, but Shah gets caught (see January 6, 1995). He is found with a detonating cord, mercury, a quartz timer, springs for a pistol, a firing pin, and other incriminating items. He tells interrogators that he was given these items by KSM. Shah escapes just two days after his arrest (see January 13, 1995). An interrogation report containing the above information will be made the same day. Shah refers to KSM by the aliases Adam Ali and Abu Khalid. (It is not clear when investigators realize these aliases refer to KSM.) [Fouda and Fielding, 2003, pp. 100, 103] In 1996, an al-Qaeda informant will reveal that Shah is a key al-Qaeda operative, so KSM could have been linked to al-Qaeda through Shah (see June 1996).

Entity Tags: Khalid Shaikh Mohammed, Wali Khan Amin Shah

Timeline Tags: Complete 911 Timeline

Wali Khan Amin Shah, a conspirator in the Bojinka plot that was recently broken up by Philippine police (see January 6, 1995), escapes from prison just two days after he was arrested (see January 11, 1995). The circumstances of the escape are not known in detail. Based on interviews with counterterrorism officials, the New York Times will only write that Shah “somehow escaped from jail.” [New York Times, 12/13/1995; Ressa, 2003, pp. 43] Shah was one of only two conspirators seized around this time (see January 7-11, 1995), and was being held illegally. At the Bojinka trial in New York in 1996, a Philippine police official will admit that Shah was detained without having been properly arrested, advised of his rights, or arraigned before a judge, all of which is required by Philippine law. The official, Alex Paul Monteagudo, will also admit that a search of Shah’s apartment was conducted without a warrant and the items seized there were not subjected to forensic analysis. [New York Times, 8/1/1996]

Entity Tags: Wali Khan Amin Shah, Alex Paul Monteagudo

Timeline Tags: Complete 911 Timeline

One of the Bojinka plotters, Abdul Hakim Murad, confesses the importance of Khalid Shaikh Mohammed (KSM) in a number of plots. Murad was arrested on January 6, 1995 (see January 6, 1995), and within days he begins freely confessing a wealth of valuable information to Philippine interrogator Colonel Rodolfo Mendoza. Murad does not know KSM’s real name, but uses an alias known to investigators. Mendoza will write in a January 1995 report given to US officials that KSM was one of the main Bojinka plotters attempting to blow up US-bound airliners over the Pacific Ocean. In addition, he says KSM worked with Ramzi Yousef to “plan the bombing of the World Trade Center in 1993” (see February 26, 1993). He also says that KSM “supervised the plan to assassinate Pope John Paul II with a pipe bomb during a visit to the Philippines,” which was part of the Bojinka plot. [Gunaratna, 2003, pp. xxvii] Over the next few months, Murad will give up more information about KSM in further interrogation, for instance revealing that KSM has been in the US and is planning to come back to the US for flight training (see April-May 1995). Yet despite all these revelations, US intelligence will remain curiously uninterested in KSM despite knowing that he is also Yousef’s uncle. Counterterrorism expert Rohan Gunaratna will later comment that Murad’s confessions about KSM “were not taken seriously” by US intelligence. [Gunaratna, 2003, pp. xxvii]

Entity Tags: Ramzi Yousef, Abdul Hakim Murad, Khalid Shaikh Mohammed, John Paul II, Rodolfo Mendoza, Rohan Gunaratna

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Colonel Rodolfo Mendoza.Colonel Rodolfo Mendoza. [Source: Australian Broadcasting Corporation]As Colonel Mendoza, the Philippines investigator, continues to interrogate Operation Bojinka plotter Abdul Hakim Murad, details of a post-Bojinka “second wave” emerge. Author Peter Lance calls this phase “a virtual blueprint of the 9/11 attacks.” Murad reveals a plan to hijack commercial airliners at some point after the effect of Bojinka dies down. Murad himself had been training in the US for this plot. He names the ten or so buildings that would be targeted for attack:
bullet CIA headquarters.
bullet The Pentagon.
bullet An unidentified nuclear power plant.
bullet The Transamerica Tower in San Francisco.
bullet The Sears Tower in Chicago.
bullet The World Trade Center.
bullet John Hancock Tower in Boston.
bullet US Congress.
bullet The White House. [Washington Post, 12/30/2001; Lance, 2003, pp. 278-280; Playboy, 6/1/2005]
Murad continues to reveal more information about this plot until he is handed over to the FBI in April (see April-May 1995). He also mentions that ten suicide pilots have already been chosen and are training in the US (see February 1995-1996). Mendoza uses what he learns from Murad and other sources to make a flow chart connecting many key al-Qaeda figures together (see Spring 1995). Philippine authorities later claim that they provide all of this information to US authorities, but the US fails to follow up on any of it. [Lance, 2003, pp. 303-4] Sam Karmilowicz, a security official at the US embassy in Manila, Philippines during this time period, will later claim that just before Murad was deported to the US in early May, he picked up an envelope containing all that the Philippine government had learned from Murad. He then sent the envelope to a US Justice Department office in New York City. He believes Mike Garcia and Dietrich Snell, assistant US attorneys who will later prosecute Murad, almost certainly had access to this evidence (see Early 1998). [CounterPunch, 3/9/2006]

Entity Tags: Al-Qaeda, Ramzi Yousef, Rodolfo Mendoza, Hambali, Peter Lance, Dietrich Snell, Khalid Shaikh Mohammed, Mohammed Jamal Khalifa, Mike Garcia, Abdul Hakim Murad

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Shortly after bomber Ramzi Yousef is arrested (see February 7, 1995), investigators discover a computer file of a letter on his laptop that is signed by “Khalid Sheikh, and Bojinka.” An eyewitness account of the arrest is given to Time magazine by a “Khalid Sheikh,” who is also staying in the same building. [McDermott, 2005, pp. 154, 162] Investigators also discover that Khalid Shaikh Mohammed (KSM) had frequently visited Yousef’s apartment in Manila, Philippines, where the bombs for the Bojinka plot were being made. [PBS Frontline, 10/3/2002] They also find Yousef has multiple fax and phone numbers for a “Khalid Doha.” Doha is the capital of Qatar. KSM has been living there openly since 1992 (see 1992-1995). Shortly after being apprehended, US authorities notice that Yousef calls one of these numbers in Qatar and asks to speak to a “Khalid.” The US already connected KSM to the 1993 WTC bombing just weeks after that attack and knew that he was living in Doha, Qatar (see March 20, 1993). [US Congress, 7/24/2003] There is an entry in Yousef’s seized telephone directory for a Zahid Shaikh Mohammed, Yousef’s uncle and KSM’s brother. Not long after this discovery is made, Pakistani investigators raid Zahid’s offices in Peshawar, Pakistan, but Zahid has already fled (see 1988-Spring 1995). In 1993, US investigators already discovered the connections between Yousef, Zahid, and KSM, after raiding Zahid’s house in Pakistan and finding pictures of them (see Spring 1993). [McDermott, 2005, pp. 154, 162] The FBI successfully arranges for a photograph to be taken of KSM. He is positively identified from the photo in December 1995. This results in his indictment in January 1996 for his role in the 1993 WTC bombing. US intelligence labels him a “top priority,” according the 9/11 Congressional Inquiry. [Los Angeles Times, 12/22/2002; US Congress, 7/24/2003]

Entity Tags: Ramzi Yousef, Zahid Shaikh Mohammed, Federal Bureau of Investigation, Khalid Shaikh Mohammed

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Timeline Tags: Civil Liberties

Many of the Bojinka plotters are arrested in the Philippines and then let go. On April 1, the Philippines police arrest six foreigners, who are from Jordan, Syria, Lebanon, Oman, and the United Arab Emirates. They seize a cache of weapons and explosives in their apartments. It is announced the men have ties to Sheikh Omar Abdul-Rahman and Ramzi Yousef and that they are being charged with stockpiling illegal firearms. [New York Times, 4/3/1995; New York Times, 4/8/1995; South China Morning Post, 12/19/1995] On December 30, 15 more suspects are arrested. This group is made up of Iraqi, Sudanese, Saudi, and Pakistani nationals. They are found with guns and explosives. One of them is identified as Ramzi Yousef’s twin brother Abd al-Karim Yousef, who had been using the alias Adel Anon. [New York Times, 12/31/1995] Philippine authorities claim that not only were these men involved in the Bojinka plot (see January 6, 1995), but they were also planning to assassinate President Fidel Ramos and commanders of the Philippines army and national police. [CNN, 1/3/1996] Edwin Angeles had been an undercover operative posing as a top leader in the Abu Sayyaf militant group (see Late 1994-January 1995 and Early February 1995), and now he leads the investigation to capture these men based on what he knew about them when he was in Abu Sayyaf. However, he later claims that not all of them were guilty and that some of them were framed by the planting of weapons and other evidence. He goes public with this complaint in early 1996. All of the men are released on bail and then all of them jump bail. Some flee the Philippines while others stay and go into hiding. [Philippine Daily Inquirer, 7/10/2001; Contemporary Southeast Asia, 12/1/2002] It is not known what happens to most of these men after their release. But one of the men arrested in March 1995, Hadi Yousef Alghoul, will be arrested in the Philippines again in late 2001. He will be found with nearly 300 sticks of dynamite and accused of involvement in other plots as well (see December 26, 2001). In 2003, it will be reported that Abd al-Karim Yousef was recently traveling with Khalid Shaikh Mohammed (KSM), and in the wake of KSM’s 2003 arrest he is capable of taking over as al-Qaeda’s operational commander. [Washington Post, 3/4/2003; Time, 3/8/2003] It has not been explained why the Philippines did not turn him over to the US, since the US had put out an alert for him in March 1995, shortly after his brother Ramzi Yousef was arrested. [New York Times, 3/20/1995]

Entity Tags: Hadi Yousef Alghoul, Edwin Angeles, Omar Abdul-Rahman, Abd al-Karim Yousef, Ramzi Yousef

Timeline Tags: Complete 911 Timeline

Newsday reports, “Some crucial computer evidence against notorious terrorist suspect Ramzi Yousef has been destroyed, and the FBI has begun an investigation into whether the CIA is responsible…” After the Bojinka plot was foiled in the Philippines (see January 6, 1995), a computer hard drive and several floppy discs were discovered in Yousef’s Manila apartment and found to contain a great deal of useful evidence. Pictures and phone numbers recovered from the hard drive led to the arrest of another Bojinka plotter just days later (see January 7-11, 1995). The computer files were copied by Philippine authorities and then turned over to the CIA. The CIA then “provided the FBI with a summary of the files, indicating they contained detailed information about Yousef’s coconspirators in the United States and overseas, including their names, addresses and in some cases, even phone numbers.… But when the CIA turned over the actual computer and disks, Justice Department experts determined that at least three separate computer deletion programs had been used to erase some of the data, law-enforcement sources said.” One US law-enforcement official complains, “We had teams of investigators frothing at the mouth to get at Yousef’s network. And we get handed an empty computer. It’s as if we’d been tracking a serial killer and someone intentionally shredded the investigative file.” Officials believe it is not likely the files will ever be recovered. Newsday reports that “The FBI is investigating whether CIA agents or their operatives intentionally destroyed the evidence.” Since Philippine authorities made copies of the files, the FBI has tried to get copies directly from them, but without success. [Newsday, 4/16/1995] A search of the Lexis Nexus database shows no follow up to this story. But only three Bojinka plotters—Ramzi Yousef, Abdul Hakim Murad, and Wali Khan Amin Shah—are arrested in the years before 9/11, and the rest of the network goes free.

Entity Tags: Federal Bureau of Investigation, Philippines, Ramzi Yousef, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

Abdul Hakim Murad is in a US prison awaiting trial for his alleged role in the Bojinka plot (see January 6, 1995). Told about the Oklahoma City bombing that took place earlier in the day (see 8:35 a.m. - 9:02 a.m. April 19, 1995), he immediately takes credit for the bombing on behalf of his associate Ramzi Yousef. However, Yousef, also in US custody at the time, makes no such claim (see 10:00 a.m. April 19, 1995 and After). An FBI report detailing Murad’s claim will be submitted to FBI headquarters the next day. [Lance, 2006, pp. 163-164] A Philippine undercover operative will later claim that Terry Nichols, who will be convicted for a major role in the Oklahoma City bombing, met with Murad, Yousef, and others in the Philippines in 1994, and discussed blowing up a building in Oklahoma and several other locations (see Late 1992-Early 1993 and Late 1994). Counterterrorism “tsar” Richard Clarke will later comment: “Could [Yousef] have been introduced to [Nichols]? We do not know, despite some FBI investigation. We do know that Nichols’s bombs did not work before his Philippine stay and were deadly when he returned.” [Clarke, 2004, pp. 127] Mike Johnston, a lawyer representing the Oklahoma City bombing victims’ families, will later comment: “Why should Murad be believed? For one thing, Murad made his ‘confession’ voluntarily and spontaneously. Most important, Murad tied Ramzi Yousef to the Oklahoma City bombing long before Terry Nichols was publicly identified as a suspect.” [Insight, 6/22/2002] Also on this day, Mohammed Jamal Khalifa, an associate of Yousef and Murad who is being held in the US, is moved from a low security prison to a maximum security prison. [Lance, 2006, pp. 164] But despite these potential links to Muslim militants, only five days after the Oklahoma City bombing the New York Times will report, “Federal officials said today that there was no evidence linking people of the Muslim faith or of Arab descent to the bombing here.” [New York Times, 4/24/1995] Murad’s claim apparently will not be reported in any newspaper until two years later [Rocky Mountain News, 6/17/1995] , when lawyers for Nichols’s bombing partner, Timothy McVeigh, tell reporters that their defense strategy will be to claim that the bombing was the work of “foreign terrorists” led by “a Middle Eastern bombing engineer.” The lawyers will claim that the bombing was “contracted out” through an Iraqi intelligence base in the Philippines, and it is “possible that those who carried out the bombing were unaware of the true sponsor.” The lawyers also say it is possible, though less likely, that the bombing was carried out by right-wing white supremacists, perhaps from the Elohim City compound (see 1973 and After, 1983, 1992 - 1995, October 12, 1993 - January 1994, August 1994 - March 1995, September 12, 1994 and After, November 1994, February 1995, and April 5, 1995). [New York Times, 3/26/1997] The claims of foreign involvement will be discredited (see 10:00 a.m. April 19, 1995 and After).

Entity Tags: Ramzi Yousef, Richard A. Clarke, Mohammed Jamal Khalifa, Elohim City, Federal Bureau of Investigation, Mike Johnston, Abdul Hakim Murad, Timothy James McVeigh, Terry Lynn Nichols

Timeline Tags: Complete 911 Timeline, US Domestic Terrorism

The CIA begins a program to track Islamist militants in Europe. The program is operated by local stations in Europe and CIA manager Michael Scheuer, who will go on to found the agency’s bin Laden unit in early 1996 (see February 1996). The program is primarily focused on militants who oppose the Egyptian government. It traces the support network that supplies money and recruits to them and that organizes their propaganda. US Ambassador to Egypt Edward Walker will later say that the operation involves intercepting telephone calls and opening mail. Suspects are identified in Egypt and in European cities such as Milan (see 1993 and After), Oslo, and London (see (Late 1995)). [Grey, 2007, pp. 125] The intelligence gathered as a part of this operation will be used for the CIA’s nascent rendition program (see Summer 1995).

Entity Tags: Michael Scheuer, Edward Walker, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

The CIA proposes a policy of abducting Islamic Jihad militants and sending them to Egypt which will soon be approved by President Bill Clinton (see June 21, 1995). The Clinton administration began a policy of allowing abductions, known as “renditions,” in 1993 (see 1993). At first, renditions were rarely used because few countries wanted the suspects. Michael Scheuer, head of the CIA’s bin Laden unit, is one of the architects of a 1995 agreement with Egypt to send rendered militants there. He will later recall: “It was begun in desperation.… We were turning into voyeurs. We knew where these people were, but we couldn’t capture them because we had nowhere to take them,” due to legal and diplomatic complications. The CIA realized that “we had to come up with a third party.” Egypt was the obvious choice because the Islamic Jihad is the prime political enemy of the Egyptian government, and many Islamic Jihad militants also work for al-Qaeda, an enemy of the US.
Turning a Blind Eye - However, the Egyptian secret police force, the Mukhabarat, is notorious for its torture of prisoners. As part of the program, the US helps track, capture, and transport suspects to Egypt (see Before Summer 1995) and then turns a blind eye while the Egyptians torture them. Scheuer claims the US could give the Egyptian interrogators questions they wanted put to the detainees in the morning and get answers by the evening. Because torture is illegal in the US, US officials are never present when the torture is done. Further, the CIA only abducts suspects who have already been convicted in absentia. Talaat Fouad Qassem is the first known person the CIA renders to Egypt (see September 13, 1995). But the number of renditions greatly increases in 1998, when the CIA gets a list of Islamic Jihad operatives around the world (see Late August 1998). These renditions result in a big trial in Egypt in 1999 that effectively destroys Islamic Jihad as a major force in that country (see 1999). [New Yorker, 2/8/2005]
CIA, NSC, Justice Department Lawyers Consulted - Scheuer will say that lawyers inside and outside the CIA are intensively consulted about the program: “There is a large legal department within the Central Intelligence Agency, and there is a section of the Department of Justice that is involved in legal interpretations for intelligence work, and there is a team of lawyers at the National Security Council, and on all of these things those lawyers are involved in one way or another and have signed off on the procedure. The idea that somehow this is a rogue operation that someone has dreamed up is just absurd.” [Grey, 2007, pp. 140-141]
Leadership of Program - The rendition program does not focus solely on al-Qaeda-linked extremists, and other suspected terrorists are also abducted. Scheuer will later tell Congress, “I authored it and then ran and managed it against al-Qaeda leaders and other Sunni Islamists from August 1995, until June 1999.” [US Congress, 4/17/2007 pdf file] A dedicated Renditions Branch will be established at CIA headquarters in 1997 (see 1997), but the relationship between Scheuer and its manager is not known—it is unclear whether this manager is a subordinate, superior, or equal of Scheuer, or whether Scheuer takes on this responsibility as well. After Scheuer is fired as unit chief in May 1999 (see June 1999), his role in the rendition program will presumably be passed on to his successor, Richard Blee, who will go on to be involved in rendition after 9/11 (see Shortly After December 19, 2001). In a piece apparently about Blee, journalist Ken Silverstein will say that he “oversaw… the [Counterterrorist Center] branch that directed renditions.” [Harper's, 1/28/2007]

Entity Tags: Mukhabarat (Egypt), Richard Blee, Islamic Jihad, Alec Station, Central Intelligence Agency, Egypt, Michael Scheuer

Timeline Tags: Torture of US Captives, Complete 911 Timeline

President Bill Clinton signs Presidential Decision Directive 39 (PDD-39) approving a rendition program recently proposed by the CIA (see Summer 1995). This program is the development of an earlier idea also approved by Clinton (see 1993) and comes two months after the bombing of a government building in Oklahoma City (see 8:35 a.m. - 9:02 a.m. April 19, 1995). The rendition program as approved by Clinton explicitly covers renditions of fugitives to the US to face trial: “When terrorists wanted for violation of US law are at large overseas, their return for prosecution shall be a matter of the highest priority and shall be a continuing central issue in bilateral relations with any state that harbors or assists them.” The directive does not require the foreign government’s consent: “Return of suspects by force may be effected without the cooperation of the host government.”
Third Countries - The 9/11 Commission will later point out that this directive also expressly approves transferring suspects to other countries: “If extradition procedures were unavailable or put aside, the United States could seek the local country’s assistance in a rendition, secretly putting the fugitive in a plane back to America or some third country for trial.”
Implications - In 2007, journalist Stephen Grey will comment on the policy’s implications: “In essence, the US government chose to outsource its handling of terrorists because neither Clinton nor his Republican opponents were prepared to establish a proper legal framework for the US to capture, interrogate, and imprison terrorists itself; nor to take the more direct military or diplomatic action required to eliminate the leadership of al-Qaeda in Afghanistan; nor to confront countries like Saudi Arabia or Pakistan whose policies helped encourage the growth of terrorism; nor to strengthen adequately the CIA’s own key capabilities.” [Grey, 2007, pp. 121, 123]

Entity Tags: Stephen Grey, William Jefferson (“Bill”) Clinton

Timeline Tags: Torture of US Captives

A Syrian suspected of involvement in the al-Qaeda Bojinka plot is granted asylum in Australia even though the Australian government is aware of some of his apparent terrorism ties. Ahmad al-Hamwi, a.k.a. Omar Abu Omar, was head of the International Relations and Information Center (IRIC) from 1993 to 1995, a charity front closely tied to the failed Bojinka plot (see January 6, 1995). In 1995, Philippine investigators determined that most of the funding for the plot went through a bank account controlled by al-Hamwi. [Institute of Defense and Strategic Studies, 3/7/2003 pdf file] At the same time, he was roommates with Mohammed Jamal Khalifa, bin Laden’s brother-in-law, and married the sister of one of Khalifa’s Philippine wives. He worked closely with Khalifa in the IRIC until Khalifa was forced to leave the country in late 1994 (see December 1, 1994). [Australian, 4/8/2006] Shortly after the Bojinka plot is foiled by Philippines authorities in early 1995, the IRIC is shut down and al-Hamwi is brought in for questioning. However, he is let go and travels to Australia in July 1995 then immediately applies for asylum there. The Australian asylum review board is aware of the following things:
bullet He was interrogated by Philippines intelligence and questioned about his ties to WTC bomber Ramzi Yousef and the Bojinka plot to kill the Pope.
bullet He tells the review board that he was interrogated by a senior officer with direct ties to the Philippine president
bullet He came into Australia using a fake Dutch passport and has two fake Syrian passports.
bullet He has ties to Khalifa, who had been convicted of funding a bombing in Jordan.
bullet He is a longtime member of the militant group the Muslim Brotherhood.
But incredibly, in June 1996 he is granted him asylum on the grounds that he could be persecuted in Syria due to his ties to the Brotherhood. [Refugee Review Tribunal, 6/26/1996; Australian, 4/8/2006] In 2006, it will be reported that he is still living openly in Australia. Further, Philippines intelligence alleges that he came to the Philippines after having been banned from Turkey for his suspected involvement in a 1986 bombing there. It is not clear how the Australian government missed information like this, or if they just ignored it. [Australian, 4/8/2006] In the wake of these 2006 reports, the Australian government will claim to be investigating his status. Yet there have been no reports that he has been arrested or had his residency revoked since then. [Australian, 4/10/2006; Age (Melbourne), 4/10/2006]

Entity Tags: Refugee Review Tribunal, Operation Bojinka, International Relations and Information Center, Ahmad al-Hamwi, Muslim Brotherhood, Mohammed Jamal Khalifa

Timeline Tags: Complete 911 Timeline

Attorney General Janet Reno, who signed the 1995 Procedures memo.Attorney General Janet Reno, who signed the 1995 Procedures memo. [Source: US Department of Justice]The Justice Department issues the “wall” memo, a later heavily criticized memo that establishes procedures to regulate the flow of information from FBI intelligence investigations to criminal investigators and prosecutors. Such procedures already exist, but this “wall” is now formalized and extended. The memo is signed by Attorney General Janet Reno, but is based on a similar one recently issued by Deputy Attorney General Jamie Gorelick governing the 1993 WTC bombing cases (see March 4, 1995). The wall exists to prevent defendants from successfully arguing in court that information gathered under a warrant issued under the Foreign Intelligence Surveillance Act (FISA) should not be used in a criminal prosecution, as the standard for obtaining a FISA warrant is considered to be lower than that for obtaining a criminal search warrant (see Early 1980s). Such arguments are usually unsuccessful, according to the Justice Department’s Office of Legal Counsel, which believes that courts are showing “great deference” to the government when such challenges are made. The procedures, which now apply to all intelligence investigations regardless of whether or not a FISA warrant has been issued, state that the FBI must consult the Justice Department’s Criminal Division, not local United States Attorneys’ offices, about intelligence investigations when it is considering starting a parallel criminal investigation, and that it must do so when there is reasonable indication of a significant federal crime. This means that FBI headquarters has veto power over whether a field office can contact a local prosecutor about an intelligence investigation. However, Criminal Division prosecutors should only be consulted and cannot control an investigation. [Office of the Attorney General, 7/19/1995; US Department of Justice, 11/2004, pp. 25-30 pdf file] These procedures will be implemented in such a way that even greater restrictions are placed on information sharing (see (Late 1995-1997)), although a partial exception will be created for the Southern District of New York, which handles a lot of terrorism work (see August 29, 1997). The procedures will also be much criticized for the way they are implemented in the FBI (see July 1999). The increased barriers to information sharing often mean that the FBI monitors terrorists as before, but the information does not get passed to criminal investigators, so the cells carry on operating in the US and the FBI carries on monitoring them. For example, the FBI monitors a Florida-based cell that funds and recruits for jihad throughout the world for nearly a decade before it is rolled up (see (October 1993-November 2001)). Some money raised by terrorism financiers in the US goes to Bosnia, where the US has a policy of enabling covert support for the Muslim side in the civil war (see April 27, 1994). Prosecutor Andrew McCarthy will later call the wall a “rudimentary blunder,” and say that it “was not only a deliberate and unnecessary impediment to information sharing; it bred a culture of intelligence dysfunction.” [National Review, 4/13/2004] John Ashcroft, Attorney General in the Bush Administration (see April 13, 2004), will say that “Government buttressed this ‘wall’,” and will call it the “single greatest structural cause for September 11.” [9/11 Commission, 4/13/2004]

Entity Tags: US Department of Justice, John Ashcroft, Jamie Gorelick, Janet Reno, Federal Bureau of Investigation, Foreign Intelligence Surveillance Act, Andrew McCarthy

Timeline Tags: Complete 911 Timeline

Diplomats at the US embassy in Egypt are not informed of the CIA’s rendition program. At this time the program is primarily aimed at locating enemies of the Egyptian regime and bringing them back to Egypt, where they are tortured (see Summer 1995 and Before Summer 1995). The only exception to this is US ambassador to Egypt Edward Walker, who is read into the CIA program although he is actually a State Department employee. One of the diplomats’ jobs is to report on Egypt’s extremely poor human rights record, including its torture methods. Walker will later comment, “It wasn’t a question of mincing words… I think the human rights reports were correct.” He will add that there are Chinese walls at the embassy to keep the CIA program secret from the diplomats: “The walls were huge and they only come together at the ambassador level… [The diplomats working on human rights] might have been a little upset if they knew what was going on.” [Grey, 2007, pp. 126]

Entity Tags: Central Intelligence Agency, Edward Walker

Timeline Tags: Torture of US Captives

Talaat Fouad Qassem, 38, a known leader of the Al-Gama’a al-Islamiyya (the Islamic Group), an Egyptian extremist organization, is arrested and detained in Croatia as he travels to Bosnia from Denmark, where he has been been living after being granted political asylum. He is suspected of clandestine support of terrorist operations, including the 1993 World Trade Center bombing (see February 26, 1993). He also allegedly led mujaheddin efforts in Bosnia since 1990 (see 1990). In a joint operation, he is arrested by Croatian intelligence agents and handed over to the CIA. Qassem is then interrogated by US officials aboard a US ship off the Croatian coast in the Adriatic Sea and sent to Egypt, which has a rendition agreement with the US (see Summer 1995). An Egyptian military tribunal has already sentenced him to death in absentia, and he is executed soon after he arrives. [Associated Press, 10/31/1995; Washington Post, 3/11/2002, pp. A01; Mahle, 2005, pp. 204-205; New Yorker, 2/8/2005] According to the 1999 book Dollars for Terror, two weeks before his abduction, Qassem was in Switzerland negotiating against Muslim Brotherhood leaders. Some Muslim Brotherhood exiles were negotiating with the Egyptian government to be allowed to return to Egypt if they agreed not to use Muslim Brotherhood Swiss bank accounts to fund Egyptian militant groups like Al-Gama’a al-Islamiyya, but Qassem and other radicals oppose this deal. So the removal of Qassem helps the Muslim Brotherhood in their conflict with more militant groups. [Labeviere, 1999, pp. 70-71]

Entity Tags: Croatia, Egypt, Talaat Fouad Qassem, Al-Gama’a al-Islamiyya, Ayman al-Zawahiri, Muslim Brotherhood

Timeline Tags: Torture of US Captives, Complete 911 Timeline

Melissa Boyle Mahle.Melissa Boyle Mahle. [Source: Publicity photo]According to a later account by CIA agent Melissa Boyle Mahle, “a tidbit received late in the year revealed the location” Khalid Shaikh Mohammed (KSM) in Qatar (see 1992-1996). [Mahle, 2005, pp. 247-248] This presumably is information the FBI learned in Sudan that KSM was traveling to Qatar (see Shortly Before October 1995). However, US intelligence should also have been aware that KSM’s nephew Ramzi Yousef attempted to call him in Qatar in February 1995 while Yousef was in US custody (see After February 7, 1995-January 1996). Mahle is assigned to verify KSM’s identity. She claims that at the time the CIA is aware of KSM’s involvement in the Bojinka plot in the Philippines (see January 6, 1995) and in the 1993 WTC bombing (see February 26, 1993) She is able to match his fingerprints with a set of fingerprints the CIA already has in their files. [Guardian, 3/31/2005] By October 1995, the FBI tracks KSM to a certain apartment building in Qatar. Then, using high-technology surveillance, his presence in the building is confirmed. [Miniter, 2003, pp. 85-86] Mahle argues that KSM should be rendered out of the country in secret. The US began rendering terrorist suspects in 1993 (see 1993), and a prominent Egyptian extremist is rendered by the CIA in September 1995 (see September 13, 1995). She argues her case to CIA headquarters and to the highest reaches of the NSA, but is overruled. [Guardian, 3/31/2005] Instead, the decision is made to wait until KSM can be indicted in a US court and ask Qatar to extradite him to the US. Despite the surveillance on KSM, he apparently is able to leave Qatar and travel to Brazil with bin Laden and then back to Qatar at the end of 1995 (see December 1995). KSM will be indicted in early 1996, but he will escape from Qatar a few months later (see January-May 1996).

Entity Tags: Ramzi Yousef, Khalid Shaikh Mohammed, Melissa Boyle Mahle, National Security Agency, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A suicide bombing destroys the police station in the town of Rijeka, Croatia, wounding 29 people. The Egyptian militant group Al-Gama’a al-Islamiyya takes credit for the bombing, saying it is revenge for the abduction of Al-Gama’a al-Islamiyya leader Talaat Fouad Qassem in Croatia the month before (see September 13, 1995). The Croatians will later determine that the mastermind, Hassan al-Sharif Mahmud Saad, and the suicide bomber were both tied to Al-Gama’a al-Islamiyya. They also were tied to the Islamic Cultural Institute in Milan, Italy, which in turn has ties to many militant attacks, some committed Ramzi Yousef (see 1995-1997). CIA soon discovers that the suicide bomber also worked for the Third World Refugee Center charity front (see January 1996). [Kohlmann, 2004, pp. 153-155] In 1999, the FBI’s Bojinka investigation will notice that Khalid Shaikh Mohammed (KSM) was believed to be in neighboring Bosnia at the time and that the timing device of the bomb (a modified Casio watch) closely resembled those used by KSM and his nephew Yousef in the Bojinka plot (see January 6, 1995). Presumably, this would have increased the importance of catching KSM. [9/11 Commission, 7/24/2004, pp. 489]

Entity Tags: Third World Relief Agency, Ramzi Yousef, Khalid Shaikh Mohammed, Al-Gama’a al-Islamiyya, Federal Bureau of Investigation, Hassan al-Sharif Mahmud Saad, Talaat Fouad Qassem, Islamic Cultural Institute

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Following the issuance of the “wall” memo, which established procedures to regulate the flow of information from intelligence investigations by the FBI to local criminal prosecutors (see July 19, 1995), an additional information sharing “wall” is erected inside the FBI. After 9/11, the Justice Department’s Office of Inspector General will find, “Although it is unclear exactly when this ‘wall’ within the FBI began, [it was] sometime between 1995 and 1997.” This additional wall segregates FBI intelligence investigations from FBI criminal investigations and restricts the flow of information from agents on intelligence investigations to agents on criminal investigations, because of problems that may occur if the flow is not regulated (see Early 1980s). If an intelligence agent wants to “pass information over the wall” to a criminal agent, he should get approval from one of his superiors, either locally or at FBI headquarters. A description of wall procedures comes to be commonplace in all warrant requests filed under the Foreign Intelligence Surveillance Act (FISA). [US Department of Justice, 11/2004, pp. 30-32 pdf file] However, FBI agents often ignore these restrictions and over a hundred cases where information is shared without permission between intelligence and criminal FBI agents will later be uncovered (see Summer-October 2000 and March 2001).

Entity Tags: Federal Bureau of Investigation, Foreign Intelligence Surveillance Act, US Department of Justice

Timeline Tags: Complete 911 Timeline

Anas al-Liby.Anas al-Liby. [Source: FBI]Anas al-Liby, member of a Libyan al-Qaeda affiliate group called Al-Muqatila, lives in Britain during this time. He had stayed with bin Laden in Sudan (see May 18, 1996). In late 1995, he moves to Britain and applies for political asylum, claiming to be a political enemy of the Libyan government (see (Late 1995)). He is involved in an al-Qaeda plot (see Late 1993-Late 1994) that will result in the bombing of two US embassies in Africa in 1998 (see 10:35-10:39 a.m., August 7, 1998). The British government suspects he is a high-level al-Qaeda operative, and Egypt tells Britain that he is wanted for an assassination attempt of Egyptian President Hosni Mubarak (see (Late 1995)). In 1996, he is involved in a plot with the British intelligence agency to assassinate Libyan leader Colonel Mu’ammar al-Qadhafi (see 1996), and presumably his ability to live in Britain is connected to cooperation with that plot. [Observer, 11/10/2002; Times (London), 1/16/2003] After the failed assassination attempt in 1996, the British allegedly continues to support Al-Muqatila—for instance, the group openly publishes a newsletter from a London office. [Brisard and Dasquie, 2002, pp. 97-98] Whistleblower David Shayler, a British intelligence agent, gives British authorities details of this Libya plot in 1998 and again in 1999, and later will serve a short prison sentence for revealing this information to the public (see November 5, 2002). [Observer, 8/27/2000] In late 1998, al-Liby is monitored calling an al-Qaeda operative in the US and discussing their ties to one of the African embassy bombers, but this results in no action against al-Liby (see Shortly After August 12, 1998). He lives in Manchester until May of 2000. In 2002, it will be reported that he eluded a police raid on his house and fled abroad. [Observer, 11/10/2002] However, in a 2011 book, FBI agent Ali Soufan will claim that al-Liby actually was arrested and then let go (see May 2000). His asylum application will still be under review at the time of his arrest. [Times (London), 1/16/2003] An important al-Qaeda training manual is discovered in the raid on his Manchester residence (see May 2000). The US will later post a $25 million reward for al-Liby’s capture. [Federal Bureau of Investigation, 2002; Observer, 11/10/2002]

Entity Tags: United Kingdom, Mu’ammar al-Qadhafi, Federal Bureau of Investigation, Osama bin Laden, Anas al-Liby, Al-Muqatila, Al-Qaeda, David Shayler

Timeline Tags: Complete 911 Timeline

Jack Cloonan.Jack Cloonan. [Source: PBS]The Justice Department directs an existing unit called Squad I-49 to begin building a legal case against bin Laden. This unit is unusual because it combines prosecutors from the Southern District of New York, who have been working on bin Laden related cases, with the FBI’s New York office, which was the FBI branch office that dealt the most with bin Laden -related intelligence. Patrick Fitzgerald effectively directs I-49 as the lead prosecutor. FBI agent Dan Coleman becomes a key member while simultaneously representing the FBI at Alec Station, the CIA’s new bin Laden unit (February 1996) where he has access to the CIA’s vast informational database. [Lance, 2006, pp. 218-219] The other initial members of I-49 are: Louis Napoli, John Anticev, Mike Anticev, Richard Karniewicz, Jack Cloonan, Carl Summerlin, Kevin Cruise, Mary Deborah Doran, and supervisor Tom Lang. All are FBI agents except for Napoli and Summerlin, a New York police detective and a New York state trooper, respectively. The unit will end up working closely with FBI agent John O’Neill, who heads the New York FBI office. Unlike the CIA’s Alec Station, which is focused solely on bin Laden, I-49 has to work on other Middle East -related issues. For much of the next year or so, most members will work on the July 1996 crash of TWA Flight 800, because it crashed near New York and is suspected to have been carried out by Middle Eastern militants (July 17, 1996-September 1996). However, in years to come, I-49 will grow considerably and focus more on bin Laden. [Wright, 2006, pp. 240-241] After 9/11, the “wall” between intelligence collection and criminal prosecution will often be cited for the failure to stop the 9/11 attacks. But as author Peter Lance will later note, “Little more than ten months after the issuance of Jamie Gorelick’s ‘wall memo,’ Fitzgerald and company were apparently disregarding her mandate that criminal investigation should be segregated from intelligence threat prevention. Squad I-49… was actively working both jobs.” Thanks to Coleman’s involvement in both I-49 and the CIA’s Alec Station, I-49 effectively avoids the so-called “wall” problem. [Lance, 2006, pp. 220]

Entity Tags: Mike Anticev, Tom Lang, US Department of Justice, Patrick J. Fitzgerald, Kevin Cruise, Dan Coleman, Carl Summerlin, Alec Station, Louis Napoli, Mary Deborah Doran, John Anticev, Jack Cloonan, I-49, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline

The CIA’s Counter Terrorism Center creates a special unit focusing specifically on bin Laden. It is informally called Alec Station. About 10 to 15 individuals are assigned to the unit initially. This grows to about 35 to 40 by 9/11. [US Congress, 9/18/2002] The unit is set up “largely because of evidence linking [bin Laden] to the 1993 bombing of the WTC.” [Washington Post, 10/3/2001] Newsweek will comment after 9/11, “With the Cold War over, the Mafia in retreat, and the drug war unwinnable, the CIA and FBI were eager to have a new foe to fight.… Historical rivals, the spies and G-men were finally learning to work together. But they didn’t necessarily share secrets with the alphabet soup of other enforcement and intelligence agencies, like Customs and the Immigration and Naturalization Service, and they remained aloof from the Pentagon. And no amount of good will or money could bridge a fundamental divide between intelligence and law enforcement. Spies prefer to watch and wait; cops want to get their man.” [Newsweek, 10/1/2001] Michael Scheuer will lead the unit until 1999. He will later become a vocal critic of the US government’s efforts to combat terrorism. He later recalls that while bin Laden is mostly thought of merely as a terrorist financier at this time, “we had run across bin Laden in a lot of different places, not personally but in terms of his influence, either through rhetoric, through audiotapes, through passports, through money-he seemed to turn up everywhere. So when we [created the unit], the first responsibility was to find out if he was a threat.” [Vanity Fair, 11/2004] By the start of 1997, the unit will conclude bin Laden is a serious threat (see Early 1997).

Entity Tags: Osama bin Laden, Michael Scheuer, Alec Station, Al-Qaeda, Counterterrorist Center

Timeline Tags: Complete 911 Timeline

Law professor John Yoo writes a lengthy essay for the California Law Review entitled “The Continuation of Politics by Other Means: The Original Understanding of War Powers,” in which he argues that the Founding Fathers intended to empower presidents to launch wars without Congressional permission. Yoo has clerked for conservative judge Laurence Silberman and equally conservative Supreme Court Justice Clarence Thomas, and served for a year as counsel to then-Senate Judiciary Committee Chairman Orrin Hatch (R-UT). He has become a regular speaker at Federalist Society events, the informal but influential group of conservative lawyers, judges, and legal scholars who will come to have so much influence in the Bush administration. You argues that for generations, Constitutional scholars have misread the Constitution: the Founders actually supported, not repudiated, the British model of executive power that gave the king the sole power of declaring war and committing forces to battle. The Constitution’s granting of the legislature—Congress—the power to “declare war” is merely, Yoo writes, a reference to the ceremonial role of deciding whether to proclaim the existence of a conflict as a diplomatic detail. The Founders always intended the executive branch to actually declare and commence war, he writes. Most other Constitutional scholars will dismiss Yoo’s arguments, citing notes from the Constitutional Convention that show the Founders clearly intended Congress, not the president, to decide whether to commit the country to war. One of those Founders, James Madison, wrote in 1795 that giving a president the unilateral ability to declare war “would have struck, not only at the fabric of the Constitution, but at the foundation of all well organized and well checked governments. The separation of the power of declaring war from that of conducting it, is wisely contrived to exclude the danger of its being declared for the sake of its being conducted.” [Savage, 2007, pp. 80-81] Yoo will go on to join the Bush administration’s Office of Legal Counsel, and write numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002).

Entity Tags: Federalist Society, John C. Yoo

Timeline Tags: Civil Liberties

According to counterterrorism expert Rohan Gunaratna, US intelligence monitoring al-Qaeda communications learn that al-Qaeda is canceling an attack on Western targets in Singapore. On April 18, 1996, 108 Lebanese civilians seeking refuge at a UN camp in Qana, Lebanon, are killed by mortars fired by Israeli forces. Bin Laden “was keen not to dissipate what he envisaged as widespread revulsion against Israel’s action and hence called off the strike in Southeast Asia. Al-Qaeda’s team in question was very determined to go ahead, having spent years preparing the attack, and according to the intercepts it proved difficult for Osama to convince it otherwise.” Gunaratna claims the US learned this through the NSA’s Echelon satellite network (see Before September 11, 2001) “and other technical monitoring of their communications traffic.” [Gunaratna, 2003, pp. 133-134] If true, this case supports other evidence that the US was successfully monitoring bin Laden’s communications from an early date (see Early 1990s) and that al-Qaeda’s Southeast Asia operations were penetrated years before an important al-Qaeda summit in Malaysia discussing the 9/11 plot (see January 5-8, 2000).

Entity Tags: Echelon, Al-Qaeda, Osama bin Laden, National Security Agency

Timeline Tags: Complete 911 Timeline

Page 1 of 9 (809 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike