!! History Commons Alert, Exciting News

Context of 'October 7-22, 2002: FBI Agent Involved in Pre-9/11 Failures Interrogates Canadian Minor, Who Confesses to Knowing Other Alleged Terrorist'

This is a scalable context timeline. It contains events related to the event October 7-22, 2002: FBI Agent Involved in Pre-9/11 Failures Interrogates Canadian Minor, Who Confesses to Knowing Other Alleged Terrorist. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 19 (1899 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19 | next

Woodcut depicting waterboarding included in J. Damhoudere’s ‘Praxis Rerum Criminalium,’ Antwerp, 1556.Woodcut depicting waterboarding included in J. Damhoudere’s ‘Praxis Rerum Criminalium,’ Antwerp, 1556. [Source: NPR]With the advent of the “Enlightenment,” many countries ban the practice of waterboarding, with at least one calling it “morally repugnant.” Waterboarding has been around since the 14th century, known variously as “water torture,” the “water cure,” or tormenta de toca, a phrase that refers to the thin piece of cloth placed over the victim’s mouth. Officials for the Spanish Inquisition were among those who waterboarded prisoners; the Inquisition, recognizing the potentially lethal effect of the practice, required a doctor to be present when a prisoner was waterboarded. Historian Henry Charles Lea, in his book A History of the Inquisition of Spain, will describe waterboarding as follows: “The patient strangled and gasped and suffocated and, at intervals, the toca was withdrawn and he was adjured to tell the truth. The severity of the infliction was measured by the number of jars [of water] consumed, sometimes reaching to six or eight.” Waterboarding actually refers to two separate interrogation techniques: one involving water being pumped directly into the stomach, and another that features the steady streaming of water into the throat. The first, according to author Darius Rejali, “creates intense pain. It feels like your organs are on fire.” The second will be the method later preferred by US interrogators, who will use it on suspected terrorists. This method is a form of “slow motion drowning” perfected by Dutch traders in the 17th century, when they used it against their British rivals in the East Indies. In 2007, reporter Eric Weiner will write: “[W]aterboarding has changed very little in the past 500 years. It still relies on the innate fear of drowning and suffocating to coerce confessions.” [National Public Radio, 11/3/2007]

Entity Tags: Darius Rejali, Spanish Inquisition, Henry Charles Lea, Eric Weiner

Timeline Tags: Torture of US Captives

The German Reich Ministry of Justice issues a secret memo following a meeting of several Justice Ministry lawyers and public prosecutors with senior Gestapo officers. The participants discuss the fact that Germany has been on a war footing for years, and the leaders’ worry that the citizenry is riddled with sleeper cells of subversives. The solution: detaining and torturing subversives. It is unclear whether torture will be used to terrorize other subversives, to extract information, or produce confessions. German law enforcement officials are balky at applying “more rigorous interrogation” techniques. Though some judges seem unmoved by defendants appearing in court with obvious marks of torture upon their bodies, the law enforcement officers are bureaucrats in a system that has always respected the rule of law and the Hitler government was originally elected on a law-and-order platform. The memo is the product of the top officials in the Gestapo and Justice Ministry, and lays out detailed instructions as to when torture techniques can be applied, the specific equipment used in such interrogations, and how many times particular techniques could be used on certain categories of detainees. Perhaps most importantly, the memo promises immunity from prosecution to any German interrogator who follows the rules as laid down in the memo.
Specific Instructions - It reads in part: “At present, we thus have a situation which cannot continue: a deficient sense of what is right on the part of judicial officers; an undignified position for police officers, who try to help matters by foolish denials [that torture has taken place in court proceedings].… [I]nterrogations of this kind [torture] may be undertaken in cases where charges involve the immediate interests of the state.… chiefly treason and high treason. Representatives of the Gestapo expressed the opinion that a more rigorous interrogation could also be considered in cases of Jehovah’s Witnesses, explosives, and sabotage.… As a general principle, in more rigorous interrogations only blows with a club on the buttocks are permissible, up to 25 such blows. The number is to be determined in advance by the Gestapo.… Beginning with the tenth blow, a physician must be present. A standard club will be designated, to eliminate all irregularities.” Gestapo Headquarters in Berlin must give permission for more “rigorous interrogation[s],” the memo continues.
Drawing Parallels to Bush Administration Torture - The memo will be the subject of a 2009 article by Shayana Kadidal, the senior managing attorney of the Guantanamo project at the Center for Constitutional Rights. Kadidal will draw parallels between the Nazi torture authorization and similar legal justifications issued by the American government after the 9/11 attacks (see March 2, 2009 and April 21, 2009). Kadidal will write: “I realize that, as a matter of principle, there is a strong bias against making Nazi analogies to any events happening in our modern world.… But here we have: (1) a system set up to allow torture on certain specific individual detainees, (2) specifying standardized equipment for the torture (apparently down to the exact length of the club to be used), along with physician participation to ensure survival of the victim for the more several applications, (3) requiring prior approval of the use of torture from the central authorities in the justice department and intelligence agency in the capital, so as to ensure that (6) the local field officers actually carrying out the abuse are immune from prosecution.” [Huffington Post, 4/21/2009]

Entity Tags: Gestapo, Shayana Kadidal, German Reich Ministry of Justice

Timeline Tags: Torture of US Captives

Sherwood F. Moran (right) interrogating a Japanese prisoner during the battle of Guadalcanal.Sherwood F. Moran (right) interrogating a Japanese prisoner during the battle of Guadalcanal. [Source: Associated Press]Marine interrogator Major Sherwood F. Moran writes an informal memo for use by other interrogators. Moran is a legendary figure among Marines, renowned for his ability to coax information from the most reluctant or resistant Japanese captive, even during the height of battle, and often using his knowledge of, and respect for, Japanese culture to his advantage. His memo will remain relatively unknown outside the Marine Corps until the summer of 2003, when it will be included in the archives of the Marine Corps Interrogator Translator Teams Association. The memo, titled “Suggestions for Japanese Interpreters Based on Work in the Field,” is remarkable for its insistence that treating prisoners with humanity and respect works far better than “harsh” interrogation methods. Author Ulrich Straus, an expert on Japanese POWs held in US captivity during World War II, will later write that Moran “was a particularly effective interrogator because he treated each prisoner as another human rather than as the enemy.” In 2005, after the Abu Ghraib scandals become media fodder, military historian Stephen Budiansky will write: “Six months before the abuses at Abu Ghraib prison broke into public view, a small and fairly obscure private association of United States Marine Corps members posted on its Web site a document on how to get enemy POWs to talk. The document described a situation very similar to the one the United States faces in the insurgencies in Iraq and Afghanistan: a fanatical and implacable enemy, intense pressure to achieve quick results, a brutal war in which the old rules no longer seem to apply.… Moran, the report’s author, noted that despite the complexities and difficulties of dealing with an enemy from such a hostile and alien culture, some American interrogators consistently managed to extract useful information from prisoners. The successful interrogators all had one thing in common in the way they approached their subjects. They were nice to them. Moran was writing in 1943, and he was describing his own, already legendary methods of interrogating Japanese prisoners of war. More than a half century later his report remains something of a cult classic for military interrogators.” [David R. Moran, 2005]
Human-to-Human Attitude - Moran writes that the best interrogators (whom he says should consider themselves “interviewers”) become “wooers” of their captives, coaxing information rather than attempting to force confessions. Most important, Moran writes, is the interrogator’s attitude towards his prisoner. “Many people, I suppose, would on first thought think ‘attitude’ had nothing to do with it; that all one needs is a knowledge of the language, then shoot out questions, and expect and demand a reply,” he writes. “Of course that is a very unthinking and naive point of view.” Just as important, Moran writes, is a sympathy and understanding of the captive’s culture. A superior or demeaning attitude breeds nothing but antagonism and resistance.
Speaking the Language of the Captive - Almost as important, Moran notes, is the interrogator’s ability to speak directly to the captive in his own language, without the need for translators. An interrogator should speak the language fluently and idiomatically, or, when that is not possible, to at least have some command over common phrases. “After all, the first and most important victory for the interviewer to try to achieve is to get into the mind and into the heart of the person being interviewed,” he writes.
Hidden System - Fellow feelings and warm sympathy towards the captive are necessary, but not the entire package. While the captive, or an outside observer, might believe that the interrogator is merely indulging in friendly chit-chat, the interrogator must have an agenda and a plan in place at all times. “[I]n the workings of your mind you must be a model of system,” Moran says. “You must know exactly what information you want, and come back to it repeatedly. Don’t let your warm human interest, your genuine interest in the prisoner, cause you to be sidetracked by him! You should be hard-boiled but not half-baked. Deep human sympathy can go with a business-like, systematic, and ruthlessly persistent approach.”
Short-Circuiting Patriotic Defensiveness - To emphasize that your side, your nation, or your culture is superior—in essence, the “conquerors” of the captive’s military or his nation—is counterproductive, Moran writes. “To emphasize that we are enemies, to emphasize that he is in the presence of his conqueror, etc., puts him psychologically in the position of being on the defensive, and that because he is talking to a most-patient enemy and conqueror he has no right and desire to tell anything,” he writes.
Breaking Recalcitrant Prisoners - Sometimes even the best interrogators come up against recalcitrant prisoners who flatly refuse, for patriotic reasons or what Moran calls “conscientious scruples,” to give any information. In these cases, Moran writes, harsh or physical techniques of intelligence extraction are counterproductive. Instead, he writes, with his Japanese captives he is often able to shame the prisoner into cooperating. Reminding the captive that he has been treated humanely, has been treated with kindness and courtesy, implies a quid pro quo—not the threat of having this treatment withdrawn if cooperation is not forthcoming, but a matter of the captive returning the interrogator’s courtesy with information. [Moran, 7/17/1943 pdf file]

Entity Tags: US Marine Corps, Ulrich Straus, Stephen Budiansky, Sherwood F. Moran, Marine Corps Interrogator Translator Teams Association

Timeline Tags: Torture of US Captives

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

In the aftermath of World War II, Japanese officer Yukio Asano is charged by a US war crimes tribunal for torturing a US civilian. Asano had used the technique of “waterboarding” on the prisoner (see 1800 and After). The civilian was strapped to a stretcher with his feet in the air and head towards the floor, and water was poured over his face, causing him to gasp for air until he agreed to talk. Asano is convicted and sentenced to 15 years of hard labor. Other Japanese officers and soldiers are also tried and convicted of war crimes that include waterboarding US prisoners. “All of these trials elicited compelling descriptions of water torture from its victims, and resulted in severe punishment for its perpetrators,” reporter Evan Wallach will later write. In 2006, Senator Edward Kennedy (D-MA), discussing allegations of US waterboarding of terror suspects, will say in regards to the Asano case, “We punished people with 15 years of hard labor when waterboarding was used against Americans in World War II.” [Washington Post, 10/5/2006; National Public Radio, 11/3/2007]

Entity Tags: Yukio Asano, Evan Wallach, Edward M. (“Ted”) Kennedy

Timeline Tags: Torture of US Captives

A B-29 bomber similar to the one that crashed in Georgia.A B-29 bomber similar to the one that crashed in Georgia. [Source: Global Security (.org)]A test flight for the Air Force’s Project Banshee, located at Robins Air Force Base in Georgia, is set for 8:30 a.m. Banshee is an attempt begun in 1946 to develop and deploy a long-range missile ahead of both the Soviet Union and rival US military branches. The airplane used in the test flight crashes less than an hour into its flight, killing 9 of the 13 aboard.
Maintenance Problems - The plane assigned for the flight is a B-29 Stratofortress, a bomber made famous by its delivery of the atomic bombs to Hiroshima and Nagasaki at the end of World War II. B-29s are notoriously difficult to fly and maintain: their four wing-mounted engines almost routinely overheat and catch fire, causing engine shutdowns, sudden drops in altitude, and, often, crashes. The engines’ eighteen cylinders lack sufficient airflow to keep them cool, and the overheating often causes the crankcases, made of light but highly flammable magnesium, to burst into flames. Like so many of its brethren, the plane has suffered its share of maintenance issues, and is flying without numerous recommended maintenance and repair tasks being performed. Just five days before, it had been designated “red cross”—grounded and unfit for service. It was allowed to fly through an “exceptional release” signed by the squadron commander.
Crew Difficulties - The flight is moved back to the afternoon after some crew members fail to show up on time, and to allow last-minute repairs to be made. By takeoff, the flight crew is assembled: Captain Ralph Erwin; co-pilot Herbert W. Moore; flight engineer Earl Murrhee; First Lieutenant Lawrence Pence, Jr, the navigator; Sergeant Walter Peny, the left scanner; Sergeant Jack York, the right scanner; Sergeant Melvin Walker, the radio operator; and Sergeant Derwood Irvin, manning the bombsight and autopilot. The crew is joined by civilian engineers assigned to Banshee: Al Palya and Robert Reynolds from RCA, William Brauner and Eugene Mechler from the Franklin Institute, and Richard Cox from the Air Force’s Air Materiel Command. In violation of standard procedure, none of the crew or the civilians are briefed on emergency procedures, though Murrhee will later say that the crew were all familiar with the procedures; he is not so sure about the civilians, though he knows Palya and Reynolds have flown numerous test flights before. In another violation of Air Force regulations, none of the flight crew have worked together before. As author Barry Siegel will note in 2008, “The pilot, copilot, and engineer had never shared the same cockpit before.”
Engine Fire and Crash - Less than an hour into the flight, one engine catches fire and two others lose power, due to a combination of maintenance failures and pilot errors. The civilians have some difficulty getting into their parachutes as Erwin and Moore attempt to regain control of the aircraft. Four of the crew and civilians manage to parachute from the plane, but most remain on board as the airplane spirals into the ground on the edge of the Okefenokee Swamp, near Waycross, Georgia. Crew members Moore, Murrhee, and Peny survive, as does a single civilian, Mechler. Four others either jump at too low an altitude or die when their chutes foul the airplane; the other five never manage to leave the plane and die on impact.
Widows File Suit - Several of the civilians’ widows will file suit against the US Air Force, asserting that their husbands died because of Air Force negligence (see June 21, 1949). Their lawsuit will eventually become US v. Reynolds, a landmark Supreme Court case and the underpinning for the government’s claims of state secrets privilege (see March 9, 1953). [Siegel, 2008, pp. 3, 14-17, 33-49]

Entity Tags: Derwood Irvin, Barry Siegel, US Department of the Air Force, Walter Peny, William Brauner, Air Materiel Command, Richard Cox, Ralph Erwin, Robert Reynolds, Al Palya, Radio Corporation of America, Eugene Mechler, Earl Murrhee, Franklin Institute, Project Banshee, Melvin Walker, Lawrence Pence, Jr, Herbert W. Moore, Jr, Jack York

Timeline Tags: Civil Liberties

Initial Associated Press reports of a crash in Georgia of a B-29 that had been on a test flight for the Air Force’s secret Project Banshee (see October 6, 1948) acknowledge that “the plane had been on a mission testing secret electronic equipment which RCA developed and built under an Air Force contract… Full details of the plane’s mission were not disclosed.… The Air Force would say only that the bomber was engaged in ‘electronic research on different types of radar…’” Local papers have a bit more detail, with survivor accounts hinting at confusion and some contradictions between their versions of events and that being given out by official Air Force spokesmen. Later reports from the Air Force will downplay the B-29’s involvement in Project Banshee. [Siegel, 2008, pp. 56-58]

Entity Tags: Associated Press, US Department of the Air Force, Radio Corporation of America, Project Banshee

Timeline Tags: Civil Liberties

The Army Air Force’s Air Materiel Command receives the initial report on an investigation of a B-29 crash in Georgia (see October 6, 1948). Perceptions of the crash are colored by the fact that the bomber was carrying equipment from Project Banshee, a secret Air Force missile development initiative. The initial report is meticulously factual, providing an almost minute-by-minute account of the events preceding the crash as told by the four survivors and intensive examination of the debris. The report concludes that it would benefit future B-29 pilots to have more training on flying the plane when it has lost both engines on one wing, and a general recommendation that the pilot and crew should give civilian passengers better instruction in emergency procedures. Though the report is circumspect in the extreme in finding fault with the pilot and military personnel for the crash, and gives only vague and generalized recommendations to help prevent future crashes, the Air Force will heatedly deny that the pilots or crew could have been in any way responsible for the crash. In 2008, reporter Barry Siegel will write, “Years later, this particular claim, in fact Air Materiel Command’s entire position, would cause various veteran aviators to hoot.” Pilot error causing the crash is obvious, they will conclude. [Siegel, 2008, pp. 62-65]

Entity Tags: US Department of the Air Force, Barry Siegel, Air Materiel Command, Project Banshee

Timeline Tags: Civil Liberties

Frank Folsom, the executive vice president of the Radio Corporation of America’s RCA Victor Division, writes a letter to General Hoyt Vandenberg, the commander of the US Air Force. Folsom is inquiring about the deaths of two RCA employees in a recent B-29 crash in Georgia (see October 6, 1948). The plane had been on a secret test mission for the Air Force’s Project Banshee, a missile development project in which RCA is heavily involved. Folsom believes that the Air Force is downplaying the likelihood that pilot error caused the crash (see October 18, 1948), and tells Vandenberg that “certain steps will [need to be taken] if we are to participate in the future in Air Force flight test programs.” Folsom wants more pay and compensation for RCA employees participating in Air Force test programs, as well as newer and safer airplanes to be used in the test flights and a higher caliber of test pilots and crew members. Perhaps the portion of the letter that causes the most consternation among Air Force officials is Folsom’s request to read over the official accident reports. “When a crash has occurred, a copy of the official report… must be made available promptly to us,” he writes. “Needless to say, the report will not be disclosed except to those who are directly concerned.” Folsom’s letter will spark a new round of Air Force investigations into the crash, in hopes of mollifying Folsom. However, the report from this investigation will be classified at the highest level of security and not provided to RCA. Additionally, though the second investigation will find a strong likelihood of pilot error causing the crash, the Air Force will not admit any such findings to RCA. [Siegel, 2008, pp. 65-80] These accident reports will play a key role in the lawsuit filed against the US government by three widows of killed crew members (see June 21, 1949 and August 7-8, 1950).

Entity Tags: Hoyt Vandenberg, Frank Folsom, Project Banshee, Radio Corporation of America, US Department of the Air Force

Timeline Tags: Civil Liberties

Phyllis Brauner and Elizabeth Palya, who both lost their husbands in the “Project Banshee” B-29 crash (see October 6, 1948), file a civil action lawsuit against the US government in regards to the crash. The lawsuit claims that the US Air Force, in the person of the pilot and military crew members of the B-29, caused the deaths of their civilian husbands by “the negligence and wrongful acts and omissions of the officers and employees” of the US. The widows’ lawyer, Charles Biddle, asks the government for $300,000 per family. A third widow, Patricia Reynolds, will join the lawsuit in September 1949. One of the biggest issues surrounding the case is the lawsuit’s request that Biddle and his lawyers be given access to the official accident reports, which the government will claim cannot be revealed because they may contain classified information (see October 18, 1948 and August 7-8, 1950). Biddle’s promise that no one else will see the reports makes no impression on the government’s lawyers. [Siegel, 2008, pp. 100-101]

Entity Tags: Elizabeth Palya, Charles Biddle, Patricia Reynolds, Phyllis Brauner, US Department of the Air Force, Project Banshee

Timeline Tags: Civil Liberties

A federal judge orders the Air Force to turn over copies of its classified accident reports about a B-29 crash (see October 6, 1948) as part of a lawsuit filed by three of the widows of crew members killed in the crash (see June 21, 1949). Claiming that the reports may contain classified information about a secret missile development project, Project Banshee, the Air Force not only refuses to turn over the accident reports to the widows’ lawyer, it refuses to allow even the attorney general to view the documents (see August 7-8, 1950). The lawyer for the widows, Charles Biddle, will continue to press for the release of the accident reports. [Siegel, 2008, pp. 120-123]

Entity Tags: Charles Biddle, Project Banshee, US Department of the Air Force

Timeline Tags: Civil Liberties

The Air Force refuses to meet the court-imposed deadline to turn over accident reports of a 1948 B-29 crash in Georgia (see October 6, 1948) to the plaintiffs in a lawsuit against the government (see July 26, 1950). Instead, the Justice Department argues before the court that because the accident reports might contain “state secrets” that might imperil “national security” if made available to anyone outside the Air Force, the reports cannot be made available. “[T]he aircraft in question, together with the personnel on board, were engaged in a highly secret mission of the Air Force,” the government lawyers argue. “The airplane likewise carried confidential equipment on board and any disclosure of its mission or information concerning its operation or performance would be prejudicial to this department and would not be in the public interest.” Such a claim—that the production of the reports would “seriously hamper national security”—renders the reports “beyond judicial authority,” the Justice Department lawyers claim. [Siegel, 2008, pp. 124-126]

Entity Tags: US Department of the Air Force, US Department of Justice

Timeline Tags: Civil Liberties

Weeks after the Justice Department refused to make accident reports of a 1948 B-29 crash (see October 6, 1948) available to the plaintiffs in an ongoing wrongful death lawsuit against the government (see July 26, 1950) because the reports are so highly classified that their disclosure might “seriously hamper national security” (see July 26, 1950 and August 7-8, 1950), the Air Force, in a routine review, drastically lowers the classification of the accident reports from top-level “Secret” to third-level “Restricted.” Whereas “Secret” documents supposedly contain information that “might endanger national security” if revealed, “Restricted” documents are “for official use only” and should not be disclosed “for reasons of administrative privacy.” The Air Force apparently no longer considers the documents a threat to national security. However, neither the plaintiffs’ lawyers, the judge hearing the lawsuit, or even the Justice Department lawyers are aware of the reports’ reduction in status. They continue to argue the merits of releasing the reports as if they are still highly classified. [Siegel, 2008, pp. 133]

Entity Tags: US Department of the Air Force, US Department of Justice

Timeline Tags: Civil Liberties

Federal judge William H. Kirkpatrick rules that the US government must turn over the disputed, and supposedly highly classified (see September 14, 1950), accident reports from a 1948 B-29 crash (see October 6, 1948)—not to the plaintiffs in the lawsuit over the crash (see July 26, 1950), but to Kirkpatrick himself. He wishes to review the reports to determine if they contain any information that might threaten national security, and, before turning the documents over to the plaintiffs’ lawyers, will personally remove that information. In mid-October, when the government again refuses to turn over the documents, Kirkpatrick will find in favor of the plaintiffs (see October 12, 1950). [Siegel, 2008, pp. 133-134]

Entity Tags: US Department of Justice, William H. Kirkpatrick

Timeline Tags: Civil Liberties

Federal judge William H. Kirkpatrick rules in favor of the plaintiffs in a wrongful death lawsuit against the US government (see October 6, 1948, June 21, 1949, and July 26, 1950), after the government refuses to turn over classified accident reports that have a direct bearing on the plaintiffs’ case (see September 21, 1950). Judge Kirkpatrick orders the government to pay the plaintiffs, three widows who lost their husbands in a 1948 plane crash, a total of $225,000. The plaintiffs’ lawyer, Charles Biddle, expects the government to balk at paying out the money, and to instead continue to challenge the court’s attempt to compel it to turn over the accident reports (see October 19, 1951). [Siegel, 2008, pp. 134-139]

Entity Tags: Charles Biddle, William H. Kirkpatrick

Timeline Tags: Civil Liberties

The government, represented by a team of Justice Department lawyers, appeals the recent ruling against it in the ‘Banshee’ B-29 plane crash lawsuit (see June 21, 1949). In the Third US Circuit Appeals Court, the government argues that the lower court had no business demanding that the Air Force turn over classified accident reports about the crash, because the reports may contain information that would potentially compromise national security (see October 12-18, 1948 and September 14, 1950). The government had twice defied court orders to produce the documents, and as a result had lost the lawsuit (see October 12, 1950). The Justice Department’s arguments come down to the assertion that the judiciary has no constitutional right to compel the executive branch to turn over documents it considers privileged. In 2008, author Barry Siegel will write, “For the first time in the B-29 litigation, the government directly argued that the judiciary could not review [the government’s] claim of privilege.” The lawyer for the plaintiffs, Charles Biddle, counters that the executive branch has no such sweeping claim of privilege, and that a judge should be allowed to review documents in dispute to determine both their bearing on a case and the possibility that releasing those documents could jeopardize national security (see September 21, 1950). Three weeks later, the appeals court will rule unanimously against the government (see December 11, 1951). [Siegel, 2008, pp. 149-153]

Entity Tags: US Department of Justice, Charles Biddle, Barry Siegel

Timeline Tags: Civil Liberties

A three-judge federal appeals court unanimously rejects the government’s claim of unfettered executive privilege and secrecy in regards to classified documents (see October 19, 1951). In an opinion written by Judge Albert Maris, the court finds that the government’s claim that the judiciary can never compel the executive branch to turn over classified documents to be without legal merit. The plaintiffs in the case, three widows who lost their husbands in the crash of a B-29 bomber carrying classified materials (see June 21, 1949), had a compelling need for the documents in question, the downed B-29 accident reports, to further their case, Maris writes (see October 12, 1950).
No Legal Basis for Claim of Privilege - Maris goes further than the parameters of the single lawsuit, writing: “[W]e regard the recognition of such a sweeping privilege… as contrary to a sound public policy. The present cases themselves indicate the breadth of the claim of immunity from disclosure which one government department head has already made. It is but a small step to assert a privilege against any disclosure of records merely because they might prove embarrassing to government officials. Indeed, it requires no great flight of imagination to realize that if the government’s contentions in these cases were affirmed, the privilege against disclosure might gradually be enlarged… until as is the case in some nations today, it embraced the whole range of government activities.… We need to recall in this connection the words of [Revolution-era jurist] Edward Livingston: ‘No nation ever yet found any inconvenience from too close an inspection into the conduct of its officers, but many have been brought to ruin, and reduced to slavery, by suffering gradual imposition and abuses, which were imperceptible, only because the means of publicity had not been secured.’” He also quotes Revolutionary War figure Patrick Henry, who said, “[T]o cover with the veil of secrecy the common routine of business is an abomination in the eyes of every intelligent man and every friend to his country.”
Rejecting Claim of 'State Secrets' - Maris is even less respectful of the government’s claim of a “state secrets” privilege. He notes that the government did not make that claim until well into the lawsuit proceedings (see October 19, 1951), indicating that it was a “fallback” argument used after the original government arguments had failed. Maris is also troubled, as author Barry Siegel later writes, in the government’s “assertion of unilateral executive power, free from judicial review, to decide what qualified as secret.” The lower court judge’s ruling that he alone should be given the documents for review adequately protected the government’s security interests, Maris writes: “[But] the government contends that it is within the sole province of the secretary of the Air Force to determine whether any privileged material is contained in the documents and that his determination of this question must be accepted by the district court without any independent consideration.… We cannot accede to this proposition. On the contrary, we are satisfied that a claim of privilege against disclosing evidence… involves a justiciable question, traditionally within the competence of the courts.… To hold that the head of an executive department of the government in a [law]suit to which the United States is a party may conclusively determine the government’s claim of privilege is to abdicate the judicial function to infringe the independent province of the judiciary as laid down by the Constitution.”
Fundamental Principle of Checks and Balances - Maris continues: “The government of the United States is one of checks and balances. One of the principal checks is furnished by the independent judiciary which the Constitution established. Neither the executive nor the legislative branch of the government may constitutionally encroach upon the field which the Constitution has reserved for the judiciary.… Nor is there any danger to the public interest in submitting the question of privilege to the decision of the courts. The judges of the United States are public officers whose responsibilities under the Constitution is just as great as that of the heads of the executive departments.”
Government Appeal - The Justice Department will appeal the ruling to the US Supreme Court (see March 1952 and March 9, 1953). [Siegel, 2008, pp. 153-156]

Entity Tags: Albert Maris, US Department of Justice, Barry Siegel, US Supreme Court

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

The Justice Department appeals the ruling of the US Appeals Court in the B-29 “Banshee” case (see December 11, 1951). The appellate judges found that the executive branch of government could not unilaterally refuse to hand over classified documents requested during the course of a trial, and justify its decision merely by its own say-so (see October 12, 1950). Solicitor General Philip Perlman argues that the appellate ruling erroneously interprets the law “so as to permit encroachments by the judiciary on an area committed by the Constitution to executive discretion.” The claim of “state secrets,” “executive privilege,” and, ultimately, “national security” must trump judicial concerns, Perlman argues, and he goes on to say that the judiciary should not be allowed to “substitute its judgment for the judgment of the executive.” The case will be labeled United States of America v. Patricia Reynolds, Phyllis Brauner, and Elizabeth Palya, and will usually be shortened to the more colloquial US v. Reynolds.
The Vinson Court - In 2008, author Barry Siegel, in his book Claim of Privilege, will note that the recent ascension of Fred Vinson as the Supreme Court’s Chief Justice does not bode well for the plaintiffs in the case. President Truman placed Vinson, whom Siegel calls Truman’s “poker and drinking buddy,” as Chief Justice to try to achieve consensus between the two contentious blocs of justices on the Court. Siegel notes that Vinson is widely considered an intellectual and legal lightweight, with a tendency to take the side of the government on issues in which he lacks a full understanding. Siegel will write that in many instances, Vinson functions “as part of the executive branch.”
'Dennis' Case Preview of Court's Tendency to Favor Executive Branch - Vinson had written the opinion in a 1951 ruling, Dennis et al v. United States, where the Court had upheld a lower court ruling that twelve acknowledged American Communists were sent to jail under the Smith Act—not for breaking the law, but for “teaching and advocating,” in the words of the original indictment. Siegel will call that ruling “the nadir of the Vinson Court.” According to Siegel, the Dennis ruling showed the Court’s predisposition to give the government, and particularly the executive branch, plenty of leeway in its findings in subsequent cases such as Reynolds. [Siegel, 2008, pp. 157-162]

Entity Tags: Fred Vinson, Elizabeth Palya, US Supreme Court, US Department of Justice, Barry Siegel, Harry S. Truman, Phyllis Brauner, Philip Perlman, Patricia Reynolds

Timeline Tags: Civil Liberties

The US Supreme Court rules that the federal government cannot seize the nation’s steel mills. In April, President Truman, fearing a nationwide strike that could impact the US war effort in Korea, ordered the seizure of all US steel mills; the lawsuit that resulted, Youngstown Sheet & Tube Co. v. Sawyer, quickly made its way to the Supreme Court.
Rejection of 'Inherent Powers' Claim - During oral arguments, the justices grilled Acting Attorney General Philip Perlman, demanding to know what statutes he had relied on for his arguments and asserting that the president had limitations both on his emergency wartime powers and on his ability to claim that he is the “sole judge” of the existence of, and remedies for, an emergency. The justices are not convinced by the government’s arguments for the president’s “inherent powers.” They are also troubled by repeated refusals of the government to provide facts and documentary backing for its legal arguments, and its reliance instead on claims of “national security.” The attorney for the steel industry, John Davis, quoted Thomas Jefferson in his argument: “In questions of power, let no more be said of confidence in man, but bind him down from mischief by the chains of the Constitution.” Justice William O. Douglas noted that if the government’s claims were valid, there would be “no more need for Congress.”
Court Rejects Argument - In a 6-3 vote, the Court rules that the president has no inherent power to seize the steel mills. Writing for the majority, Justice Hugo Black states: “In the framework of our Constitution, the president’s power to see that the laws are faithfully executed refutes the idea that he is to be a lawmaker.… The founders of this nation entrusted the lawmaking power to the Congress alone in both good and bad times.… This is a job for the nation’s lawmakers.” In a concurring opinion, Justice Robert Jackson writes, “No penance would ever expiate the sin against free government of holding that a president can escape control of executive powers by law through assuming his military role.” In his dissent, Chief Justice Fred Vinson (see March 1952) argues that “the gravity of the emergency” overrides the Constitutional arguments accepted by the majority of the Court. “Those who suggest that this is a case involving extraordinary powers should be mindful that these are extraordinary times. A world not yet recovered from the devastation of World War II has been forced to face the threat of another and more terrifying global conflict.” [Savage, 2007, pp. 123; Siegel, 2008, pp. 163-164] In 2007, reporter and author Charlie Savage will observe that the Youngstown decision “turned out to be only a pause in the movement toward an increasingly authoritarian presidency.” [Savage, 2007, pp. 19]

Entity Tags: William O. Douglas, John Davis, Hugo Black, Charlie Savage, Fred Vinson, Harry S. Truman, Philip Perlman, US Supreme Court

Timeline Tags: Civil Liberties

Lawyers make their opening arguments before the Supreme Court in the case of US v Reynolds, the lawsuit that finds the government had no overarching right to unilaterally refuse to deliver classified documents in the course of a wrongful death lawsuit against the government (see December 11, 1951). The government has appealed the appellate court ruling to the Supreme Court (see March 1952). Because four of the nine justices had voted not to hear the case—in essence to let the appellate court ruling stand—the defense is cautiously optimistic about the Court’s decision.
Judiciary Has No Right to Interfere with Powers of the Executive, Government Argues - Acting Solicitor General Robert Stern tells the Court that the appellate judges’ decision, written by Judge Albert Maris, “is an unwarranted interference with the powers of the executive,” and that the decision forced the government to choose “whether to disclose public documents contrary to the public interest [or] to suffer the public treasury to be penalized” (a reference to the decision to award the plaintiffs monetary damages—see October 12, 1950). The judiciary “lack[s] power to compel disclosure by means of a direct demand [as well as] by the indirect method of an order against the United States, resulting in judgment when compliance is not forthcoming.”
Executive Has No Right to Unilaterally Withhold Information, Defense Counters - Stern’s arguments are countered by those of the plaintiffs’ lawyer, Charles Biddle, who writes, “We could rest our case with confidence on the clear opinion of Judge Maris,” but continues by arguing that if the government asserts a claim of executive privilege on the basis of national security, it must make the documents available to the Court for adjudication, or at least provide enough information for the Court to judge whether the documents present in fact a threat to national security if disclosed. This is particularly true, Biddle argues, “where there is no showing that the documents in question contain any military secret” (Biddle is unaware that the documents’ classification status had been reduced two years before—see September 14, 1950). “The basic question here is whether those in charge of the various departments of the government may refuse to produce documents properly demanded… in a case where the government is a party (see June 21, 1949), simply because the officials themselves think it would be better to keep them secret, and this without the Courts having any power to question the propriety of such decision.… In other words, say the officials, we will tell you only what we think it is in the public interest that you should know. And furthermore, we may withhold information not only about military or diplomatic secrets, but we may also suppress documents which concern merely the operation of the particular department if we believe it would be best, for purposes of efficiency or morale, that no one outside of the department, not even the Court, should see them.”
No Basis for Claims of Military Secrets - Biddle argues that because of responses he has received to his demands over the course of this lawsuit, he is relatively sure there are no military secrets contained within them. “[T]he proof is to the contrary,” he says, and goes on to say that had the Air Force disclosed from the outset that the plane crash, the fatal accident that sparked the original lawsuit (see October 6, 1948), was probably caused by pilot error and not by random chance, the plaintiffs may have never needed to ask for the disclosure of the documents in question, the accident reports on the crash (see October 18, 1948). “The secretary [of the Air Force]‘s formal claim of privilege said that the plane at the time was engaged in a secret mission and that it carried confidential equipment,” Biddle says, “but nowhere was it asserted that either had anything to do with the accident. The whole purpose of the demand by the respondents was for the purpose of finding out what caused the accident.… They were not in the least interested in the secret mission or equipment.” [Siegel, 2008, pp. 165-170]

Entity Tags: US Supreme Court, Albert Maris, Robert Stern, US Department of the Air Force, Charles Biddle

Timeline Tags: Civil Liberties

In their regular Saturday conference, the nine Supreme Court justices discuss the issues and arguments surrounding US v Reynolds (see October 21, 1952). According to the notes from the discussion, Chief Justice Fred Vinson, a strong advocate for expansive executive powers (see March 1952), says the case “boils down to Executive Branch determine privilege.” Other notes by Justice William O. Douglas suggest that Vinson isn’t convinced that the US must “be forced to pay for exercising its privilege” (see October 12, 1950). A straw vote taken at the end of the discussion shows five justices in favor of the government’s position to unilaterally withhold classified documents—overturning the appellate court decision (see December 11, 1951), and four in favor of allowing the decision to stand. [Siegel, 2008, pp. 171]

Entity Tags: Fred Vinson, US Supreme Court, William O. Douglas

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

One of a number of semi-official ‘Christian Identity’ logos.One of a number of semi-official ‘Christian Identity’ logos. [Source: KingIdentity (.com)]The “Christian Identity” theology, formerly a fairly benign expression of what is known as “British-Israelism” or “Anglo-Israelism,” begins to spread throughout the US and Canada, particularly on the west coasts of these nations. This belief holds that white Americans and Canadians are the real descendants of the Biblical tribes of Israel. In 2003, author Nicole Nichols, an expert on far-right racist and religious groups in America, will define the concept of “Christian Identity” as practiced by many white supremacist and separatist groups. Christian Identity is not an organization, she will write, but an ideology that many organizations have adopted in some form or fashion. Christian Identity “elevates white supremacy and separatism to a Godly ideal,” she will write, calling it “the ideological fuel that fires much of the activity of the racist far right.” According to Christian Identity theology, Jews are neither the “true Israelites” nor the true “chosen people” of God; instead, Christian Identity proponents claim, Jews are descended from an Asiatic people known as the Khazars, who settled near the Black Sea during the Middle Ages. [Nicole Nichols, 2003; Anti-Defamation League, 2005; Ontario Consultants on Religious Tolerance, 5/30/2006] In 2005, the Ontario Consultants on Religious Tolerance will write, “Followers tend to be involved in political movements opposing gun control, equal rights to gays and lesbians, and militia movements,” and quote Michael Barkun, an expert on radical-right groups, as saying, “This virulent racist and anti-Semitic theology… is prevalent among many right-wing extremist groups and has been called the ‘glue’ of the racist right.” [Ontario Consultants on Religious Tolerance, 5/30/2006]
Beginnings; 'The Protocols of the Elders of Zion' - In the 1920s, William J. Cameron, editor of the Dearborn Independent weekly newspaper, popularized the anti-Semitic hoax manuscript called “The Protocols of the Elders of Zion,” which purported to detail the “secret teachings” of Judaism, including the planned takeover of the world’s governments, the subjugation of non-Semitic races, and the bizarre, cannibalistic rituals supposedly practiced by Jews. [Anti-Defamation League, 2005]
Wesley Swift and 'Mud People' - In the 1940s, a former Methodist minister, Wesley Swift, started his own church, later known as the Church of Jesus Christ Christian. Swift had deep ties to a number of radical right-wing groups including the Ku Klux Klan; Swift and his associates set the stage for the mutation of the Christian Identity into a loosely organized set of virulently anti-Semitic, racist belief systems that will come to be grouped together under the “Christian Identity” rubric. Swift himself taught that only the white race was created in the form of God, while Asian and African races were created from the “beasts of the fields,” and thusly are subhuman creations. In Swift’s version of Genesis, Eve, the wife of the first “true” man Adam, was seduced by The Serpent, who masqeueraded as a white man. Eve bore a son, Cain, who is the actual father of the Jewish people. This reinterpretation, sometimes called the “two-seed” or “seedliner” theory, supports the Christian Identity propensity to demonize Jews, whom Swift and others labeled the “spawn of Satan.” Today’s white Europeans and their American and Canadian descendants, Swift taught, are descended from the “true son” of Adam and Eve, Abel, and are the actual “chosen people” of God. Some Christian Identity adherents go even farther, claiming that subhuman “pre-Adamic” races existed and “spawned” the non-white races of the world, which they label “mud people.” [Nicole Nichols, 2003; Anti-Defamation League, 2005]
Permeates Racist, Far-Right Groups - By the 1960s, a new group of Christian Identity leaders emerges to spread the Identity theology through the radical, racist right in America and Canada, popularizing the once-obscure ideology. Most prominent among them are three disciples of Swift: James K. Warner, William Potter Gale, and Richard Butler. Warner, who will move to Louisiana and play a leading role in the fight against civil rights, founds the Christian Defense League and the New Christian Crusade Church. Gale, an early leader of the Christian Defense League and its paramilitary arm, the California Rangers, goes on to found the Posse Comitatus (see 1969), the group that will help bring about the sovereign citizen movement. Gale will later found the Committee of the States and serve as the “chief of staff” of its “unorganized militia.” Butler moves Swift’s Church of Jesus Christ Christian to Idaho and recasts it as the neo-Nazi group Aryan Nations (see Early 1970s). Under the leadership of Butler, Gale, Warner, and others, Christian Identity soon permeates most of the major far-right movements, including the Klan and a racist “skinhead” organization known as the Hammerskins. It also penetrates many extreme anti-government activist groups. The Anti-Defamation League will write, “The resurgence of right-wing extremism in the 1990s following the Ruby Ridge (see August 31, 1992) and Waco standoffs (see April 19, 1993) further spread Identity beliefs.” [Anti-Defamation League, 2005] Nichols will write: “Christian Identity enclaves provide a trail of safe havens for movement activists, stretching from Hayden Lake in northern Idaho (the Aryan Nations stronghold) to Elohim City on the Oklahoma/Arkansas border (see 1973 and After). Many white supremacists on the run from federal authorities have found shelter and support from Christian Identity followers.” Some organizations such as the Montana Militia are headed by Identity adherents, but do not as a group promote the theology. [Nicole Nichols, 2003; Anti-Defamation League, 2005]
Bringing Forth the Apocalypse - Many Christian Identity adherents believe that the Biblical Apocalypse—the end of the world as it is currently known and the final ascendancy of select Christians over all others—is coming soon. Unlike some Christians, Identity adherents do not generally believe in the “rapture,” or the ascendancy of “saved” Christians to Heaven before the Apocalypse ensues; instead, Identity followers believe Jesus Christ will return to Earth only after the time of the “Tribulation,” a great battle between good and evil, which will set the stage for the return of Christ and the final transformation of the world. Identity followers believe it is their duty to prepare for the Apocalypse, and some believe it is their duty to help bring it about. They tend to cast the Apocalypse in racial terms—whites vs. nonwhites. Identity adherents believe that worldly institutions will collapse during the “end times,” and therefore tend to distrust such institutions, making Identity theology appealing to anti-government ideologies of groups such as militia, “Patriot,” and sovereign citizens groups. [Anti-Defamation League, 2005]
21st Century Identity - In the 21st century, Christian Identity groups are strongest in the Pacific Northwest of America and Canada, and the US Midwest, though Identity churches can be found throughout the US and in other parts of Canada. Identity churches also exist in, among other nations, Ireland, Great Britain, Australia, and South Africa (see June 25, 2003). The Anti-Defamation League will write: “Yet while spread far it is also spread thin. Estimates of the total number of believers in North America vary from a low of 25,000 to a high of 50,000; the true number is probably closer to the low end of the scale. Given this relatively small following, its extensive penetration of the far right is all the more remarkable.” [Anti-Defamation League, 2005]
Identity Violence - Identity adherents commit a number of violent acts, often against government and/or financial institutions, in an outsized proportion to their small numbers. In 1983, Identity adherent Gordon Kahl kills two US Marshals who attempt to arrest him on a parole violation, and kills an Arkansas sheriff before finally being gunned down by authorities (see February 13, 1983 and After). The white supremacist terrorist group The Order (see Late September 1983) contains a number of Identity members, including David Tate, who kills a Missouri Highway Patrol officer while attempting to flee to an Identity survivalist compound (see April 15, 1985). During the 1980s, small Identity groups such as The New Order (or The Order II) and the Arizona Patriots commit bombings and armored car robberies. After the Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995), Identity minister Willie Ray Lampley attempts a number of bombings (see November 9, 1995). In 1996, the Montana Freeman, led by Identity members, “stands off” federal authorities for 81 days (see March 25, 1996). Between 1996 and 1998, Eric Robert Rudolph, who has connections to Identity ministers such as Nord Davis and Dan Gayman, bombs an Atlanta gay bar (see February 21, 1997), several abortion clinics (see October 14, 1998), and the Atlanta Summer Olympics (see July 27, 1996 and After). In 1999, Identity member and former Aryan Nations security guard Buford Furrow goes on a shooting spree at a Jewish community center in Los Angeles (see August 10, 1999). [Anti-Defamation League, 2005]

The CIA’s Technical Services Division (TSD) considers plans to undermine Fidel Castro’s charismatic appeal by sabotaging his speeches. At one point, there is discussion of spraying Castro’s broadcasting studio with a hallucinogenic chemical. The plan is taken of the shelf because the chemical is deemed unreliable. During this period, the TSD laces a box of cigars with a chemical that would produce temporary disorientation, hoping that he will smoke one of the cigars before giving a speech. In another instance, the TSD comes up with a scheme to dust Castro’s shoes with thallium salts during a trip outside of Cuba. The salts would cause his beard to fall out. The plan is abandoned when Castro cancels the trip. [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, Technical Services Division (TSD)

Timeline Tags: US-Cuba (1959-2005)

The CIA works with a high-level Cuban official, codenamed “AM/LASH,” on a plan to assassinate Fidel Castro and overthrow his government. In June 1965, the CIA ends its contact with AM/LASH and his associates, citing security concerns. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Timeline Tags: US-Cuba (1959-2005)

The CIA’s Task Force W devises two plans to assassinate Fidel Castro. The first one, involving an exploding sea shell that would be placed where Castro regularly dives, is dismissed by the CIA’s Technical Services Division (TSD) as impractical. In the second plan, James Donovan (who has been negotiating with Castro for the release of prisoners taken during the Bay of Pigs operation) would present Castro with a contaminated diving suit. TSD decides to give the plan a try. It purchases a diving suit and laces its breathing apparatus with tubercule bacillus. The suit itself is dusted with a fungus that is known to cause a chronic skin disease. But the suit never leaves the laboratory. [US Congress, 12/18/1975; Central Intelligence Agency Inspector General, 1/1996]

Entity Tags: Technical Services Division (TSD), James Donovan, Fidel Castro

Timeline Tags: US-Cuba (1959-2005)

The US and Britain secretly agree to make the British Indian Ocean Territory (BIOT) available “for the defense purposes of both Governments as they may arise” for a period of 50 years, and thereafter for 20 years during which time either government will have the right to terminate the agreement. [US Department of State, 12/30/1966; United Kingdom, 12/30/1966; Guardian, 9/1/2000; BBC, 1/10/2001; BBC, 11/11/2004]

Entity Tags: David Kirkpatrick Este Bruce, George T. Churchill

Timeline Tags: US-Britain-Diego Garcia (1770-2004)

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]

Entity Tags: Malcolm Little, Central Intelligence Agency, Church Committee, Lew Allen, National Security Agency, Martin Luther King, Jr., Office of Security Services, Joan Baez

Timeline Tags: Civil Liberties

The NSA launches the first of seven satellites, code-named “Canyon,” that can pick up various types of voice and data traffic from Earth orbit. Canyon will lead to a more sophisticated satellite intelligence system, code-named “Rhyolite” (later “Aquacade”—see Early 1970s). [Federation of American Scientists, 7/17/1997]

Entity Tags: Rhyolite, National Security Agency, Canyon

Timeline Tags: Civil Liberties

The Washington Post runs a front-page photo of a US soldier supervising the waterboarding of a captured North Vietnamese soldier. The caption says the technique induced “a flooding sense of suffocation and drowning, meant to make him talk.” Because of the photo, the US Army initiates an investigation, and the soldier is court-martialed and convicted of torturing a prisoner. [National Public Radio, 11/3/2007]

Entity Tags: Washington Post, US Department of the Army

Timeline Tags: Torture of US Captives

In a secret memo to British Prime Minister Harold Wilson, Foreign Secretary Michael Stewart proposes that Britain mislead the UN “by present(ing) any move as a change of employment for contract workers—rather than as a population resettlement.” [ZNet, 10/22/2004] Five days later, Wilson approves the recommendation (see April 26, 1969).

Entity Tags: Robert Maitland Michael Stewart, Harold Wilson, Chagossians

Timeline Tags: US-Britain-Diego Garcia (1770-2004)

The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). [Federation of American Scientists, 7/17/1997]

Entity Tags: National Security Agency, Echelon, Rhyolite, Chalet, Government Communications Headquarters, Owen Lewis, Canyon

Timeline Tags: Civil Liberties

July 26-27, 1970: Nixon Rejects Huston Plan

After President Nixon approves of the so-called “Huston Plan” to implement a sweeping new domestic intelligence and internal security apparatus (see July 14, 1970), FBI director J. Edgar Hoover brings the plan’s author, White House aide Tom Charles Huston (see June 5, 1970), into his office and vents his disapproval. The “old ways” of unfettered wiretaps, political infiltration, and calculated break-ins and burglaries are “too dangerous,” he tells Huston. When, not if, the operations are revealed to the public, they will open up scrutiny of US law enforcement and intelligence agencies, and possibly reveal other, past illegal domestic surveillance operations that would embarrass the government. Hoover says he will not share FBI intelligence with other agencies, and will not authorize any illegal activities without President Nixon’s personal, written approval. The next day, Nixon orders all copies of the decision memo collected, and withdraws his support for the plan. [Reeves, 2001, pp. 236-237] W. Mark Felt, the deputy director of the FBI, later calls Huston “a kind of White House gauleiter over the intelligence community.” Washington Post reporter Bob Woodward will note that the definition of “gauleiter” is, according to Webster’s Dictionary, “the leader or chief officoal of a political district under Nazi control.” [Woodward, 2005, pp. 33-34]

Entity Tags: W. Mark Felt, Tom Charles Huston, J. Edgar Hoover, Federal Bureau of Investigation, Central Intelligence Agency, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

Plantations at Diego Garcia cease their operations with the arrival of American Navy Seabees. [Sunday Times (London), 9/21/1975; US Congress, 11/4/1975; Diego Garcia, 1/5/2005; CBC News, 3/7/2005]

Timeline Tags: US-Britain-Diego Garcia (1770-2004)

With the arrival of the first Americans at Diego Garcia, the largest atoll of the Chagos Archipelago, the island’s remaining residents are told they must leave. [BBC, 11/3/2000; CBS News, 6/13/2003; CNN, 6/18/2003] Recalling the massive forced relocation, Marcel Moulinie, the manager of a coconut plantation on the island, tells CBS 60 minutes in 2003 that he was ordered to ship the people out. “Total evacuation. They wanted no indigenous people there,” Marcel Moulinie explains. “When the final time came and the ships were chartered, they weren’t allowed to take anything with them except a suitcase of their clothes. The ships were small and they could take nothing else, no furniture, nothing.” To make it clear to residents that there would be no compromise, Sir Bruce Greatbatch, governor of the Seychelles, orders the killing of the Chagossians’ pets, which are rounded up into a furnace and gassed with exhaust fumes from American military vehicles. [CBS News, 6/13/2003; CNN, 6/18/2003; ZNet, 10/22/2004] “They put the dogs in a furnace where the people worked,” Lisette Talatte, a Chagossian, will later tell investigative journalist John Pilger. “[W]hen their dogs were taken away in front of them our children screamed and cried.” [ZNet, 10/22/2004] Marie Therese Mein, another Chagossian, later says US officials threatened to bomb them if they did not leave. [Self-Determination News, 1/28/2002; ZNet, 10/22/2004] And the Washington Post interviews one man in 1975 who says he was told by an American official, “If you don’t leave you won’t be fed any longer.” [Washington Post, 9/9/1975] The Chagossians are first shipped to the nearby islands of Peros Banhos and Salomon and then 1,200 miles away to Mauritius and the Seychelles. [BBC, 11/3/2000; CBS News, 6/13/2003; CNN, 6/18/2003] Before the eviction, the Chagossians were employed, grew their own fruit and vegetables, raised poultry and ducks, and fished. [Sunday Times (London), 9/21/1975; Self-Determination News, 1/28/2002; British Royal Courts of Justice, 10/9/2003; Tribune (Bahamas), 11/17/2003] On the island of Diego Garcia, there was a church, a school as well as a few stores. [Sunday Times (London), 9/21/1975] But now, after being removed from their homes and dumped into foreign lands without compensation or resettlement assistance, they are forced to live in poverty. [CBS News, 6/13/2003; CNN, 6/18/2003] The uprooted Chagossians find shelter in abandoned slums, which have no water or electricity. [Sunday Times (London), 9/21/1975; Church Times, 1/7/2005] Many commit suicide during and after the eviction campaign. [ZNet, 10/22/2004] Lisette Taleti loses two of her children. [Guardian, 5/12/2006] Describing the plight of the Chagossians at this time, the British High Court writes in 2003: “The Ilois [Chagossians] were experienced in working on coconut plantations but lacked other employment experience. They were largely illiterate and spoke only Creole. Some had relatives with whom they could stay for a while; some had savings from their wages; some received social security, but extreme poverty routinely marked their lives. Mauritius already itself experienced high unemployment and considerable poverty. Jobs, including very low paid domestic service, were hard to find. The Ilois were marked by their poverty and background for insults and discrimination. Their diet, when they could eat, was very different from what they were used to. They were unused to having to fend for themselves in finding jobs and accommodation and they had little enough with which to do either. The contrast with the simple island life which they had left behind could scarcely have been more marked.”

Entity Tags: Sir Bruce Greatbatch, Chagossians, Marcel Moulinie, Marie Therese Mein, Lisette Talatte

Timeline Tags: US-Britain-Diego Garcia (1770-2004)

The US and the Soviet Union sign the Anti-Ballistic Missile Systems (ABM) Treaty. It will be ratified by the US Senate in August 1972, and will go into force in October 1972. Originally, the treaty agrees that each nation can have only two ABM deployment areas, located so that those areas cannot provide a nationwide ABM defense or become the basis for developing one. In essence, the ABM Treaty prevents either nation from developing a missile defense system (see March 23, 1983), and allows each country the likelihood of destroying the other with an all-out nuclear barrage. The treaty puts in place the doctrine of MAD, or Mutual Assured Destruction, which states that because both nations can obliterate the other in a nuclear exchange, neither one will trigger such a strike. In 1976, an addendum to the treaty further limits the number of ABM deployment areas from two to one; the Soviets will deploy a rudimentary ABM system around Moscow, but the US never does, and even deactivates its single ABM site near Grand Forks, North Dakota. In 2001, US President George W. Bush will unilaterally withdraw from the treaty (see December 13, 2001 and June 14, 2002). [Federation of American Scientists, 1/15/2008]

Entity Tags: Nixon administration, George W. Bush

Timeline Tags: US International Relations

Britain agrees to pay £650,000 (about $1.4 million) to the Mauritius government for costs associated with the resettlement of the Chagossians, who are being evicted from their homes in the Chagos Islands by the British (see July 27, 1971-May 26, 1973). It is paid in March 1973. No help is provided to Seychelles, which has also received displaced islanders. [Washington Post, 9/9/1975; British Royal Courts of Justice, 10/9/2003] Most of the money goes toward repaying debts the Chagossians have incurred. [Tribune (Bahamas), 11/17/2003]

Entity Tags: Chagossians

Timeline Tags: US-Britain-Diego Garcia (1770-2004)

CIA Counterintelligence Director James Angleton.CIA Counterintelligence Director James Angleton. [Source: CI Centre.com]CIA Director James Schlesinger orders an internal review of CIA surveillance operations against US citizens. The review finds dozens of instances of illegal CIA surveillance operations against US citizens dating back to the 1950s, including break-ins, wiretaps, and the surreptitious opening of personal mail. The earlier surveillance operations were not directly targeted at US citizens, but against “suspected foreign intelligence agents operating in the United States.” Schlesinger is disturbed to find that the CIA is currently mounting illegal surveillance operations against antiwar protesters, civil rights organizations, and political “enemies” of the Nixon administration. In the 1960s and early 1970s, CIA agents photographed participants in antiwar rallies and other demonstrations. The CIA also created a network of informants who were tasked to penetrate antiwar and civil rights groups and report back on their findings. At least one antiwar Congressman was placed under surveillance, and other members of Congress were included in the agency’s dossier of “dissident Americans.” As yet, neither Schlesinger nor his successor, current CIA Director William Colby, will be able to learn whether or not Schlesinger’s predecessor, Richard Helms, was asked by Nixon officials to perform such illegal surveillance, though both Schlesinger and Colby disapproved of the operations once they learned of them. Colby will privately inform the heads of the House and Senate Intelligence Committees of the domestic spying engaged in by his agency. The domestic spying program was headed by James Angleton, who is still serving as the CIA’s head of counterintelligence operations, one of the most powerful and secretive bureaus inside the agency. It is Angleton’s job to maintain the CIA’s “sources and methods of intelligence,” including the prevention of foreign “moles” from penetrating the CIA. But to use counterintelligence as a justification for the domestic spying program is wrong, several sources with first-hand knowledge of the program will say in 1974. “Look, that’s how it started,” says one. “They were looking for evidence of foreign involvement in the antiwar movement. But that’s not how it ended up. This just grew and mushroomed internally.” The source continues, speaking hypothetically: “Maybe they began with a check on [Jane] Fonda. They began to check on her friends. They’d see her at an antiwar rally and take photographs. I think this was going on even before the Huston plan” (see July 26-27, 1970 and December 21, 1974). “This wasn’t a series of isolated events. It was highly coordinated. People were targeted, information was collected on them, and it was all put on [computer] tape, just like the agency does with information about KGB agents. Every one of these acts was blatantly illegal.” Schlesinger begins a round of reforms in the CIA, a program continued by Colby. [New York Times, 12/22/1974 pdf file]

Entity Tags: William Colby, Senate Intelligence Committee, Richard Helms, James Angleton, Jane Fonda, Nixon administration, Central Intelligence Agency, James R. Schlesinger, House Intelligence Committee

Timeline Tags: Civil Liberties

Former CIA director Richard Helms.Former CIA director Richard Helms. [Source: Search.com]Former CIA director Richard Helms indirectly confirms the involvement of the Nixon administration in his agency’s illegal domestic surveillance operations during his testimony before the Senate Watergate investigative committee. Helms tells the committee that he was told by Nixon’s Foreign Intelligence Advisory Board that the CIA could “make a contribution” in domestic intelligence operations. “I pointed out to them very quickly that it could not, there was no way,” Helms testifies. “But this was a matter that kept coming up in the context of feelers: Isn’t there somebody else who can take on these things if the FBI isn’t doing them as well as they should, as there are no other facilities?” (FBI director J. Edgar Hoover’s opposition to the idea of spying on US citizens for Nixon’s political purposes is well documented.) CIA officials say that, despite Helms’s testimony, Helms began the domestic spying program as asked, in the beginning to investigate beliefs that the antiwar movement was permeated by foreign intelligence agents in 1969 and 1970. “It started as a foreign intelligence operation and it bureaucratically grew,” one source says in 1974. “That’s really the answer.” The CIA “simply began using the same techniques for foreigners against new targets here.” The source will say James Angleton, the CIA’s director of counterintelligence (see 1973), began recruiting double agents inside the antiwar and civil rights organizations, and sending in “ringers” to penetrate the groups and report back to the CIA. “It was like a little FBI operation.” Angleton reportedly believes that both the protest groups and the US media are riddled with Soviet intelligence agents, and acts accordingly to keep those groups and organizations under constant watch. One source will say Angleton has a “spook mentality.” Another source will say that Angleton’s counterintelligence bureau is “an independent power in the CIA. Even people in the agency aren’t allowed to deal directly with the CI [counterintelligence] people. Once you’re in it, you’re in it for life.” [New York Times, 12/22/1974 pdf file]

Entity Tags: Senate Watergate Investigative Committee, Richard Helms, J. Edgar Hoover, James Angleton, Issuetsdeah

Timeline Tags: Civil Liberties, Nixon and Watergate

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Vice President Nelson Rockefeller (see December 19, 1974 and After) is instrumental in keeping Senate Democrats from finding out too much about the intelligence community’s excesses. When the New York Times reveals the existence of a decades-old illegal domestic surveillance program run by the CIA (see December 21, 1974), President Ford heads off calls from Democrats to investigate the program by appointing the “Rockefeller Commission” to investigate in the Democrats’ stead. Senate Democrats, unimpressed with the idea, create the Church Committee to investigate the intelligence community (see April, 1976). Rockefeller is adept at keeping critical documents out of the hands of the Church Committee and the press. When Senator Frank Church asks for materials from the White House, he is told that the Rockefeller Commission has them; when he asks Rockefeller for the papers, he is told that he cannot have them because only the president can authorize access. One Church aide later calls Rockefeller “absolutely brilliant” in denying them access in a friendly manner. “He winked and smiled and said, ‘Gee, I want to help you but, of course I can’t—not until we’ve finished our work and the president approves it,’” the aide recalls. Senator John Tower (R-TX), the vice chairman of the committee, will later reflect, “We were very skillfully finessed.” But even Rockefeller, who has his own history of involvement with the CIA, is taken aback at the excesses of the CIA, particularly its history of assassinating foreign leaders. Rockefeller will eventually turn that information over to the Church Committee, giving that body some of the most explosive evidence as yet made public against the agency. [US Senate, 7/7/2007]

Entity Tags: John Tower, Church Committee, Nelson Rockefeller, Central Intelligence Agency, Frank Church, Gerald Rudolph Ford, Jr, ’Rockefeller Commission’

Timeline Tags: Nixon and Watergate

Former inhabitants of the Chagos Islands deliver a formal petition to the British embassy, asking Britain to see that the Mauritanian government provides them with plots of land, a house for each family, and jobs. The Chagossians, who were evicted from their homes by the British a few years before (see July 27, 1971-May 26, 1973), say that absent this help, they would prefer being allowed to return to the islands. Copies of the petition are delivered to the American embassy, Mauritian Prime Minister Seewoosagur Ramgoolam, and several opposition leaders of the Mauritian government. [Washington Post, 9/9/1975]

Entity Tags: Seewoosagur Ramgoolam, Chagossians

Timeline Tags: US-Britain-Diego Garcia (1770-2004)

A State Department official tells Congress, “[T]he nature of the island [of Diego Garcia] itself, which is a rather small piece of land, is also fortuitous in that it has no local population whatsoever so we have a minimal degree of the sort of political problems that are sometimes associated with establishing a facility of this sort.” [US Congress, 11/4/1975]

Entity Tags: US Congress

Timeline Tags: US-Britain-Diego Garcia (1770-2004)

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” [Dubose and Bernstein, 2006, pp. 34-35]

Entity Tags: Seymour Hersh, US Department of Defense, Ford administration, Edward Levi, Donald Rumsfeld, Church Committee, Richard (“Dick”) Cheney, Philip Buchan, New York Times, Gerald Rudolph Ford, Jr

Timeline Tags: Civil Liberties

US military officials tell Congress that the US needs to develop naval support facilities on the island of Diego Garcia. The Pentagon wants to lengthen the runway at Diego Garcia from 8,000 to 12,000 feet, increase the available petroleum, oils, and lubricants storage, and dredge its harbor. It would also like to build additional barracks, a pier to facilitate cargo handling, as well as additional utility and recreational facilities. The officials argue that expanding the base at Diego Garcia is needed to safeguard US oil interests in the Persian Gulf and to counter the Soviet Union’s presence in the region, which the military claims is increasing rapidly. They attempt to allay Congress’ concerns that expanding the base would provoke competition in that region with the Soviet Union. At one point during the hearing, George Vest, Director of the Bureau of Politico-Military Affairs of the Department of State, says the island is “uninhabited,” making no reference to the fact that it had been made so by the US and British only a few years before (see July 27, 1971-May 26, 1973). When further questioned on the subject, Vest repeats that there are “no inhabitants” at all on the island. [US Congress, 6/5/1975; Los Angeles Times, 11/4/2000]

Entity Tags: US Department of Defense, George Vest, US Congress

Timeline Tags: US-Britain-Diego Garcia (1770-2004)

The Washington Post is the first Western newspaper to report about the forced relocation of the inhabitants of the Chagos Islands. US officials had previously claimed that the island of Diego Garcia was “uninhabited,” (see June 5, 1975) and (see March 6, 1975) conveniently ignoring the fact that the island had been depopulated by Britain and the US (see July 27, 1971-May 26, 1973). [Washington Post, 9/9/1975; Washington Post, 9/11/1975]

Timeline Tags: US-Britain-Diego Garcia (1770-2004)

A congressional subcommittee of the Committee on International Relations holds a hearing on the circumstances surrounding the establishment of the US military facility at Diego Garcia island. The hearing focuses on the forced eviction of the archipelago’s inhabitants (see July 27, 1971-May 26, 1973).
Testimony of George T. Churchill - In his statement to Congress, George T. Churchill, director of International Security Operations at the Department of State, attempts to defend the State Department and Pentagon from accusations that they misled Congress about the inhabitants of Diego Garcia. He asserts that the island’s population had consisted mainly of “contract laborers and their families whose livelihood depended on the coconut plantations and whose ties to the island were tenuous.” Their settlements, he says, “appear to have been something more than work camps but considerably less than free indigenous communities.” Churchill argues that resettlement was necessary because the islanders would not have had work once the plantations were replaced by US military facilities. When it was time to go, he claims, the residents “went willingly.” He also contends that he could find no evidence in government files that there was a “lack of concern for the inhabitants of the Chagos Islands.” He admits that his report is based entirely on US and British sources and that no attempt was made to interview the former inhabitants or request information from the Mauritius government—despite his acknowledgment that on many issues, there “simply wasn’t enough data.” Churchill argues that it was Britain’s responsibility to see to the islanders’ welfare after resettlement and denies that the US has any obligation—moral or legal—to the islanders, even though their eviction had been a condition of the US’ 1966 agreement (see December 30, 1966) with Britain to use the island. [US Congress, 11/4/1975]
Testimony of Commander Gary Sick - Pentagon official Gary Sick addresses accusations that the military has misled Congress about Diego Garcia’s population. In his testimony he cites instances where passing references were made about the islands’ population, including a 1964 Washington Post article mentioning the possibility that an “indigenous population” might exist on the island; a 1969-1979 Pentagon spending proposal which referred to the islanders as “rotating contract personnel engaged in harvesting copra”; and a 1970 congressional hearing in which it was stated that the “British [had] gone a little farther about removing the population from there now.” [US Congress, 11/4/1975]

Entity Tags: Gary G. Sick, US Congress, George T. Churchill

Timeline Tags: US-Britain-Diego Garcia (1770-2004)

The Senate Select Committee to Study Governmental Operations releases its report, “Alleged Assassination Plots Involving Foreign Leaders,” which finds “concrete evidence of at least eight plots involving the CIA to assassinate Fidel Castro from 1960 to 1965.” [US Congress, 12/18/1975]

Entity Tags: Fidel Castro, US Congress

Timeline Tags: US-Cuba (1959-2005)

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]

Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News

Timeline Tags: Civil Liberties

President Ford issues Executive Order 11905, which limits the power of the CIA, the NSA, and military intelligence to engage in surveillance of US citizens. Perhaps its most well-known provision is a total ban on “political assassinations” by US government personnel. [Gerald R. Ford, 2/18/1976; Roberts, 2008, pp. 38] The provision is sparked by the Church Commission’s finding (see April, 1976) that assassination is “unacceptable in our society,” and a political embarassment, especially botched attempts such as the CIA’s efforts to kill Cuba’s Fidel Castro. [Grant J. Lilly, 4/6/2006]

Entity Tags: Church Commission, Gerald Rudolph Ford, Jr, National Security Agency, Central Intelligence Agency

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

The Mauritius government disperses the £650,000, received by the British in 1973 (see July 27, 1971-May 26, 1973), to 595 Chagossians families. Since 1973, inflation has significantly reduced the value of the resettlement sum. [British Royal Courts of Justice, 10/9/2003]

Entity Tags: Chagossians

Timeline Tags: US-Britain-Diego Garcia (1770-2004)

Interviewer David Frost has a difficult time with his subject, former President Richard Nixon, in the day’s early questioning (see April 6, 1977). Frost attempts to recoup with a line of questioning suggested by his adviser James Reston, Jr., one used in the trial of former Nixon aide John Ehrlichman (see January 1, 1975). Were there no limits to what a president can do, even if the president wants to do something plainly illegal? he asks. Could he do anything despite the law? Burglary? Forgery? Even murder? “If the president does it, that means it’s not illegal,” Nixon retorts. “Never had his imperialism been so baldly stated,” Reston will later reflect. Frost asks if the dividing line between, for example, a police burglary and the murder of an antiwar protester is only the president’s judgment? Nixon agrees, and adds: “There’s nothing specific that the Constitution contemplates in that respect. I haven’t read every word, every jot and every tittle, but I do know this: That it has been, however, argued that as far as a president is concerned, that in war time, a president does have certain extraordinary powers which would make acts that would otherwise be unlawful, lawful if undertaken for the purpose of preserving the nation and the Constitution, which is essential for the rights we’re all talking about.” [Time, 5/30/1977; Reston, 2007, pp. 102-105; Landmark Cases, 8/28/2007]

Entity Tags: Richard M. Nixon, David Frost, James Reston, Jr, John Ehrlichman

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

A photograph of Theodore ‘Ted’ Kaczynski, taken in 1968 while Kaczynski was a young faculty member at the University of California at Berkeley.A photograph of Theodore ‘Ted’ Kaczynski, taken in 1968 while Kaczynski was a young faculty member at the University of California at Berkeley. [Source: George M. Bergman / Wikimedia]An unmailed package is found in a car park at the University of Illinois, Chicago, and brought to Northwestern University in Evanston, Illinois, because of its return address; the addressee now teaches at Rensselaer Polytechnic Institute in Troy, New York. Buckley Crist, the material sciences professor named in the return address on the package cannot identify it, and turns it over to campus security. When Northwestern police officer Terry Marker opens it, it explodes, injuring him slightly. The package contains a pipe bomb packed in a carved wooden box. [BBC, 11/12/1987; Washington Post, 4/14/1996; Washington Post, 1998] The bomb is made of a nine-inch pipe filled with explosive powders and triggered by a nail held by rubber bands that strikes and ignites match heads when the box is opened. [World of Forensic Science, 1/1/2005] The package contains 10 $1 commemorative Eugene O’Neill stamps on its outer wrapper. Authorities will later speculate that the bomber may have chosen the O’Neill stamps because the playwright was an ardent supporter of anarchists. [Knight Ridder, 5/28/1995] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). It is believed to be Kaczynski’s first bomb. [New York Times, 4/7/1996]

Entity Tags: Terry Marker, Northwestern University, Theodore J. (“Ted”) Kaczynski, Buckley Crist

Timeline Tags: US Domestic Terrorism

A young Fauzi Hasbi.A young Fauzi Hasbi. [Source: SBS Dateline]Fauzi Hasbi, the son of a separatist leader in the Indonesian province of Aceh, is captured by an Indonesian military special forces unit in 1979 and soon becomes a mole for the Indonesian government. Hasbi becomes a leader in the separatist Free Aceh Movement (GAM), and he also plays a long-time role in Jemaah Islamiyah, an al-Qaeda affiliate. For many years, he literally lives next door to Jemaah Islamiyah leaders Abu Bakar Bashir and Hambali (see April 1991-Late 2000). In 2005, the Australian television program SBS Dateline will present documents that it claims “prove beyond doubt that Fauzi Hasbi had a long association with the [Indonesian] military.” For instance, military documents dating from 1990 and 1995 give him specific spying tasks. [SBS Dateline, 10/12/2005] In February 2001, the Indonesian magazine Tempo documents some of Hasbi’s links to the Indonesian military, after he has been linked to a major role the Christmas bombings in Indonesia two months earlier (see December 24-30, 2000 and February 20, 2001). He admits to having some ties to certain high-ranking military figures and says he has had a falling out with GAM, but denies being a traitor to any militant group. [Tempo, 2/20/2001; Tempo, 2/27/2001] Yet even after this partial exposure, he continues to pose as an Islamist militant for the military. A 2002 document shows that he is even assigned the job of special agent for BIN, Indonesia’s intelligence agency. [SBS Dateline, 10/12/2005] A December 2002 report by a US think tank, the International Crisis Group, details his role as a government mole. He and two of his associates are abducted and killed in mysterious circumstances in the Indonesian city of Ambon on February 22, 2003. Seven suspects, including an Indonesian policeman, later admit to the killings but their motive for doing so remains murky. [Agence France-Presse, 5/22/2003]

Entity Tags: Tentara Nasional Indonesia, Jemaah Islamiyah, Free Aceh Movement, Badan Intelijen Negara, Fauzi Hasbi

Timeline Tags: Complete 911 Timeline

A graduate student at Northwestern University in Evanston, Illinois, John Harris, is injured when he opens a box left at the University’s Technological Institute. The box contains a bomb that explodes when opened. Harris suffers minor cuts and burns. [BBC, 11/12/1987; Washington Post, 1998] Authorities recognize fundamental similarities between this and a previous Northwestern University bombing (see May 25-26, 1978). This bomb is quite similar in construction to that one, though more sophisticated in construction and design. It consists of a cigar box and a pipe bomb, triggered by a battery-operated filament that ignites explosive powders. [World of Forensic Science, 1/1/2005] However, the package contains a number of small, finger-sized pieces of wood glued to its outer container. [Knight Ridder, 5/28/1995] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see May 25-26, 1978 and April 3, 1996).

Entity Tags: Theodore J. (“Ted”) Kaczynski, Northwestern University, John Harris

Timeline Tags: US Domestic Terrorism

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

About 500 Iranian students take over the American Embassy in Tehran and hold 52 Americans hostage for 444 days. The Mujahedeen-e Khalq (MEK) is one of the groups that supports the take-over. [US Department of State, 4/30/2003; PBS, 1/15/2006]

Entity Tags: People’s Mujahedin of Iran

Timeline Tags: US confrontation with Iran, Iran-Contra Affair

Shortly after the seizure of the US embassy in Tehran (see November 4, 1979-January 20, 1981), President Jimmy Carter issues Executive Order 12170 freezing Iranian government assets held in the United States under the authority of the International Emergency Economic Powers Act (IEEPA). [US President, 11/14/1979] Iran has an estimated $12 billion in bank deposits, gold, and other properties, including $5.6 billion in deposits and securities held by overseas branches of US banks. [US Department of the Treasury. Office of Foreign Assets Control, 11/1979]

Entity Tags: James Earl “Jimmy” Carter, Jr.

Timeline Tags: US confrontation with Iran

A parcel mailed from Chicago catches fire in a mailbag aboard American Airlines Flight 444 from Chicago to Washington, DC. The package contains a bomb which was apparently constructed to explode inside the cargo hold. Twelve passengers are treated for smoke inhalation; the flight conducts an emergency landing at Dulles Airport near Washington. [BBC, 11/12/1987; Washington Post, 1998] The bomb does not ignite because instead of explosive powder, it contains barium nitrate, a powder often used to create green smoke in fireworks. [World of Forensic Science, 1/1/2005] The bombing is later shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). After the airline bombing and the subsequent bombing of a United Airlines executive (see June 10, 1980), the FBI ties the previous bombings (see May 25-26, 1978 and May 9, 1979) to this one and code-names the file UNABOM, for “UNiversity and Airline BOMber.” The media will soon dub the unknown assailant the “Unabomber.” [Washington Post, 4/4/1996; World of Forensic Science, 1/1/2005] Kaczynski will later express regret for trying to bomb the plane (see April 24, 1995).

Entity Tags: Washington Dulles International Airport, Theodore J. (“Ted”) Kaczynski, Federal Bureau of Investigation

Timeline Tags: US Domestic Terrorism

Due to apparent problems with the use of intelligence information in criminal proceedings, a set of procedures that later becomes known as the “wall” begins to take shape. The FBI, which performs both criminal and counterintelligence functions, normally obtains two types of warrants: criminal warrants and warrants under the recently passed Foreign Intelligence Surveillance Act (FISA). FISA warrants are thought to be easier to obtain, as the FBI only has to show that there is probable cause to believe the subject is a foreign power or an agent of one. Sometimes a case begins as an intelligence investigation, but results in a criminal prosecution. In court the defense can then argue that the government has abused FISA and obtained evidence by improperly using the lower standard, so any evidence obtained under FISA should not be allowed in court. Although the government can use information it happens to obtain under a FISA warrant for a criminal prosecution, if the purpose of obtaining information under a FISA warrant is for a criminal prosecution, this is in violation of the Fourth Amendment’s prohibition against warrantless searches. To combat this apparent problem, the special FISA Court decides that for a warrant under FISA to be granted, collecting intelligence information must be the primary purpose, although such information can be used in a criminal investigation provided the criminal investigation does not become the primary purpose of the surveillance or search. As a result of these procedures, when the FBI is conducting an intelligence investigation and uncovers evidence of criminal activity, it no longer consults local United States Attorneys’ Offices, but prosecutors within the Justice Department’s Criminal Division. The prosecutors then decide when the local attorney’s office should become involved. [US Department of Justice, 11/2004, pp. 21-24 pdf file] The wall will be extended in the 1990s (see July 19, 1995) and will be much criticized before and after 9/11 (see July 1999 and April 13, 2004).

Entity Tags: Foreign Intelligence Surveillance Act, Federal Bureau of Investigation, US Department of Justice, Foreign Intelligence Surveillance Court

Timeline Tags: Complete 911 Timeline

In his Lake Forest, Illinois, home, United Airlines president Percy Wood opens a package that apparently contains a book. It contains both a book and a bomb in the book’s hollowed-out pages. It explodes, causing Wood to suffer cuts and bruises. The initials “FC” are found etched on, or punched into, a piece of pipe from the bomb. [BBC, 11/12/1987; Washington Post, 1998; World of Forensic Science, 1/1/2005] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). “FC” will later be found to stand for “Freedom Club.” [Washington Post, 1/23/1998; World of Forensic Science, 1/1/2005] Authorities will later speculate that Wood may have been targeted in part because of Kaczynski’s strange fascination with wood; he often uses wood in the construction of his bombs. The hollowed-out book, Ice Brothers, is published by Arbor House, whose symbol is a tree leaf. [Associated Press, 4/25/1995] The package contains a note asking Wood to read the enclosed book, and noting, “You will find it of great social significance.” The author of Ice Brothers, Sloan Wilson, also wrote The Man in the Gray Flannel Suit, which, according to a 1959 biography of Wilson, “was the definitive epithet for the commuting suburbanite, the status-hungry conformist from Madison Avenue.” Like an earlier bomb (see May 25-26, 1978), this bomb’s package is mailed using postage stamps commemorating the playwright Eugene O’Neill; authorities will speculate that Kaczynski may have chosen the stamps because of O’Neill’s ardent support of anarchists. [Knight Ridder, 5/28/1995]

Entity Tags: Percy Wood, Theodore J. (“Ted”) Kaczynski

Timeline Tags: US Domestic Terrorism

A federal court rules that because of the government’s “state secrets” privilege (see March 9, 1953), a civilian plaintiff suing the US Navy over a contractual agreement cannot even access “non-privileged,” or unclassified, information from the Navy because to do so might “threaten disclosure” of material that goes against “the overriding interest of the United States… preservation of its state secrets privilege precludes any further attempt to pursue litigation.” [Siegel, 2008, pp. 196-197]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

State Department intern Richard Barlow.State Department intern Richard Barlow. [Source: Richard Barlow]Richard Barlow, an intern at the State Department’s Arms Control and Disarmament Agency (ACDA), finds that Pakistan has been attempting to build a nuclear bomb since the early 1970s, but his superiors do not follow up and he loses his job in a reorganization. Barlow, who has recently graduated from university after writing a thesis on counter-proliferation intelligence, is concerned about the burgeoning black markets in nuclear weapons technology. He will later comment, “Everywhere I looked I kept coming up against intelligence about Pakistan’s WMD program. I thought I was telling them what they needed to hear, but the White House seemed oblivious.” One reason the White House appears deaf is that Pakistan is now an important US ally, as it is a major supply point for the CIA-backed anti-Soviet Afghan mujaheddin. In addition, a group of “Republican hawks,” including Paul Wolfowitz, has convinced President Ronald Reagan that America needs a new strategy against potential nuclear threats, since long-term policies such as détente and containment are supposedly not working. When Reagan starts to build up US arms, the staff at ACDA is cut by a third and Barlow is one of the employees who loses his job. [Guardian, 10/13/2007]

Entity Tags: US Department of State, Ronald Reagan, Paul Wolfowitz, Richard Barlow, Arms Control and Disarmament Agency

Timeline Tags: A. Q. Khan's Nuclear Network

Ronald and Nancy Reagan celebrate winning the presidency.Ronald and Nancy Reagan celebrate winning the presidency. [Source: Medal of Freedom (.com)]After winning a sweeping election victory against President Jimmy Carter in November 1980, Ronald Reagan is sworn in as US president. The same day that Reagan is sworn in, Iran releases the remaining 52 hostages it has held captive at the US Embassy in Tehran for 444 days (see November 4, 1979-January 20, 1981). [PBS, 2000]

Entity Tags: Ronald Reagan, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Iran-Contra Affair, Elections Before 2000

A maintenance worker at the University of Utah in Salt Lake City finds a bomb in a business classroom. The device is defused by the local bomb squad and no one is injured. [BBC, 11/12/1987; Washington Post, 1998] The bomb will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996).

Entity Tags: Theodore J. (“Ted”) Kaczynski, University of Utah

Timeline Tags: US Domestic Terrorism

President Ronald Reagan issues Executive Order 12333, which directs the US intelligence community to provide foreign intelligence data to the White House. The order reads in part, “[A]gencies are not authorized to use such techniques as electronic surveillance, unconsented physical searches, mail surveillance, physical surveillance, or monitoring devices unless they are in accordance with procedures established by the head of the agency concerned and approved by the Attorney General.” It establishes rules of conduct for the intelligence agencies, and mandates a certain level of Congressional oversight. [Executive Order 12333 -- United States intelligence activities, 4/5/2007] It also establishes the basis for what are later called “National Security Letters.” These NSLs, originally envisioned for use to compile information in hunts for foreign criminals and suspected terrorists, will later be used by the administration of George W. Bush to order US booksellers, librarians, employers, Internet providers, and others to turn over records and information they compile on US citizens, with strict adjuncts against allowing those targeted for surveillance to know about the NSLs and with virtually no government oversight (see October 25, 2005). [Washington Post, 11/6/2005] It does not, as some have later asserted, directly prohibit the assassination of targeted foreign subjects—i.e. terrorist suspects and even foreign leaders—though it does restrict the use of assassination by US government operatives to certain very restricted circumstances centered around critical aspects of national security. [Parks, 11/2/1989 pdf file]

Entity Tags: Ronald Reagan, George W. Bush, National Security Letters, Bush administration (43)

Timeline Tags: Civil Liberties

A parcel addressed to the head of the Vanderbilt University computer science department, Patrick Fischer, explodes, injuring Fischer’s secretary, Janet Smith. The package was originally sent to Fischer at Pennsylvania State University but was later forwarded to Nashville, Tennessee, where Vanderbilt University is located and where Fischer now teaches. [BBC, 11/12/1987; Washington Post, 1998] Fischer will later describe Smith’s injuries as “nasty lacerations,” and will say, “She made a full recovery, but it was very traumatic for her.” The bomb itself consists of smokeless powder and a large number of match heads. The package has a false return address, stating it comes from LeRoy Bearnson, a professor of electrical engineering at Utah’s Brigham Young University. Bearnson will later say, “I suppose the guy didn’t care which way it went or who got blown up.” FBI agent Oliver “Buck” Revell, who takes part in early phases of the bomb investigation, will later say: “He might pick out an individual, but the person was still a symbolic target to him. I suspect that once he targeted the university research system, it didn’t matter that much who received it. I suspect he felt the country would pick up the symbolism.” The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). When Fischer, along with the rest of the country, learns of Kaczynski’s identity, he will try to find connections between himself and Kaczynski, and come up with only the most tenuous of relationships: Fischer studied at the Massachusetts Institute of Technology (MIT) while Kaczynski studied at nearby Harvard, and Fischer may have shared a Harvard math class with Kaczynski. He also spent time in Salt Lake City, a city with which Kaczynski is familiar. “The agents made it very clear that I was the target,” Fischer will later say. “I still have no idea why, except my feeling is that he chose names at random with certain associations.” [Washington Post, 4/14/1996]

Entity Tags: Theodore J. (“Ted”) Kaczynski, Janet Smith, LeRoy Bearnson, Patrick Fischer, Vanderbilt University, Oliver (“Buck”) Revell

Timeline Tags: US Domestic Terrorism

An electrical engineering and computer science professor with the University of California at Berkeley, Diogenes Angelakos, picks up what he believes is a turpentine can, left in a common room in the computer science building during construction work. The can, a green, gallon-sized container, has wires dangling from it and a clock-dial attached to the wires. The device is a pipe bomb. It explodes, temporarily blinding Angelakos and severely burning his right hand. [BBC, 11/12/1987; Washington Post, 11/27/1993; Washington Post, 4/14/1996; Washington Post, 1998] The injuries to his hand and arm prevent him from effectively caring for his wife Helen in her final days; she will die a month later of terminal cancer. “I went to her funeral with my arm in a sling,” Angelakos will later recall. [Washington Post, 11/27/1993] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski once worked as a professor at UC-Berkeley.

Entity Tags: Diogenes Angelakos, Theodore J. (“Ted”) Kaczynski, University of California at Berkeley, Helen Angelakos

Timeline Tags: US Domestic Terrorism

In the second of two rulings in the case of Halkin v Helms, the judiciary comes down squarely on the side of the US government against charges of illegal surveillance and wiretapping leveled against American anti-war protesters. The district and appellate courts uphold the federal government’s “state secrets” claim as codified in US v Reynolds (see March 9, 1953), thereby denying the plaintiffs the right to see government information that they claim would prove their case. The DC Court of Appeals writes that the federal courts do not have any constitutional role as “continuing monitors of the wisdom and soundness of Executive action,” and instead the courts “should accord utmost deference to executive assertions of privilege on grounds of military or diplomatic secrets… courts need only be satisfied that there is a reasonable danger” that military secrets might be exposed. [Siegel, 2008, pp. 196-196]

Timeline Tags: Civil Liberties

The British government pays roughly $6 million in compensation to the former inhabitants of the Chagos Islands who were forcibly removed from their homeland to make way for a US military base between 1971 and 1973 (see July 27, 1971-May 26, 1973). When Chagossians go to the Social Security Office to collect their compensation they are required to endorse, by signature or thumbprint, a renunciation form forfeiting their right to ever return home. Though Chagossians speak Creole, the forms are written in English and are not translated for them. [British Royal Courts of Justice, 10/9/2003; Tribune (Bahamas), 11/17/2003]

Entity Tags: Chagossians

Timeline Tags: US-Britain-Diego Garcia (1770-2004)

The October 1983 bombing of US Marine barracks in Beirut, Lebanon.The October 1983 bombing of US Marine barracks in Beirut, Lebanon. [Source: US Marine Corps.]In June 1982, Israel invaded Lebanon and US Marines were sent to Lebanon as a peacekeeping force in September 1982. On April 18, 1983, the US embassy in Beirut, Lebanon, is bombed by a suicide truck attack, killing 63 people. On October 23, 1983, a Marine barracks in Beirut is bombed by another suicide truck attack, killing 241 Marines. In February 1984, the US military will depart Lebanon. The radical militant group Islamic Jihad will take credit for both attacks (note that this is not the group led by Ayman al-Zawahiri). The group is believed to be linked to Hezbollah. Prior to this year, attacks of this type were rare. But the perceived success of these attacks in getting the US to leave Lebanon will usher in a new era of suicide attacks around the world. The next two years in particular will see a wave of such attacks in the Middle East, many of them committed by the radical militant group Hezbollah. [US Congress, 7/24/2003; US Congress, 7/24/2003 pdf file] The Beirut bombings will also inspire Osama bin Laden to believe that the US can be defeated by suicide attacks. For instance, he will say in a 1998 interview: “We have seen in the last decade the decline of the American government and the weakness of the American soldier who is ready to wage Cold Wars and unprepared to fight long wars. This was proven in Beirut when the Marines fled after two explosions.” [ABC News, 5/28/1998] In 1994, he will hold a meeting with a top Hezbollah leader (see Shortly After February 1994) and arrange for some of his operatives to be trained in the truck bombing techniques that were used in Beirut. [9/11 Commission, 7/24/2004, pp. 48]

Entity Tags: Hezbollah, Islamic Jihad Organization, Ayman al-Zawahiri, Osama bin Laden

Timeline Tags: Complete 911 Timeline

July 29, 1983: SAAR Network Is Founded

555 Grove Street, Herndon, Virginia. This is the location of the SAAR Foundation/Safa Group and many related businesses.555 Grove Street, Herndon, Virginia. This is the location of the SAAR Foundation/Safa Group and many related businesses. [Source: Paul Sperry]The SAAR Foundation is incorporated in Herndon, Virginia, just outside Washington. It will become an umbrella organization for a cluster of over 100 charities, think tanks, and businesses known as the SAAR network. In 2002, the US government will raid the SAAR network looking for ties to the Al Taqwa Bank and the Muslim Brotherhood (see March 20, 2002). [Farah, 2004, pp. 153]

Entity Tags: SAAR Foundation

Timeline Tags: Complete 911 Timeline


Egyptian militants open fire on Egyptian President Anwar Sadat.
Egyptian militants open fire on Egyptian President Anwar Sadat. [Source: Public domain]Ali Mohamed is a major in the Egyptian army. He is highly educated, speaking several languages and possessing two bachelor’s degrees and a master’s degree. In 1981 he was taking part in a special program for foreign officers at the US Army Special Forces school at Fort Bragg, North Carolina, while soldiers with radical Islamic beliefs from his Egyptian army unit assassinated Egyptian President Anwar Sadat. He is forced to quit in early 1984 on suspicions of becoming too religious. He approaches the CIA in Egypt and volunteers to be a spy. The CIA accepts, and he makes contact in Germany with a branch of Hezbollah, the Middle Eastern militant group. The CIA has claimed that Mohamed secretly tells Hezbollah members that he is working with the CIA, but the CIA quickly discovers this. The CIA supposedly suspects he wanted to help Hezbollah spy on the CIA and cuts off all further ties with him and tries to stop him from coming to the US. [New York Times, 12/1/1998; San Francisco Chronicle, 11/4/2001; Wall Street Journal, 11/26/2001] But there will be claims that Mohamed then will come to the US through a secret CIA program. If true, this would cast doubt on the CIA’s account of their interaction with Mohamed (see September 1985).

Entity Tags: Hezbollah, Ali Mohamed, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

Detective Sergeant Peter Caram, the head of the New York Port Authority’s Terrorist Intelligence Unit, has been directed by the assistant superintendent of the Port Authority Police Department to compile a report on the vulnerability of the WTC to a terrorist attack. Having previously worked at the WTC Command, Caram has exclusive knowledge of some of the center’s security weaknesses. On this day he issues his four-page report, titled “Terrorist Threat and Targeting Assessment: World Trade Center.” It looks at the reasoning behind why the WTC might be singled out for attack, and identifies three areas of particular vulnerability: the perimeter of the WTC complex, the truck dock entrance, and the subgrade area (the lower floors below ground level). Caram specifically mentions that terrorists could use a car bomb in the subgrade area—a situation similar to what occurs in the 1993 bombing (see February 26, 1993). [Caram, 2001, pp. 5, 84-85; New York County Supreme Court, 1/20/2004] This is the first of several reports during the 1980s, identifying the WTC as a potential terrorist target.

Entity Tags: World Trade Center, Peter Caram

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Alan Berg.Alan Berg. [Source: Denver Post]Alan Berg, a Jewish, progressive talk show host for Denver’s KOA 850 AM Radio, is gunned down in his driveway as he is stepping out of his car. The murder is carried out by members of the violent white-supremacist group The Order (see Late September 1983), a splinter group of the Aryan Nations white nationalist movement. Berg, who was described as often harsh and abrasive, regularly confronted right-wing and militia members on his show. Federal investigators learn that The Order’s “hit list” includes Berg, television producer Norman Lear, a Kansas federal judge, and Morris Dees, a civil rights lawyer and co-founder of the Southern Poverty Law Center (SPLC). Radio producer Anath White later says that some of Berg’s last shows were particularly rancorous, involving confrontational exchanges with anti-Semitic members of the Christian Identity movement (see 1960s and After). “That got him on the list and got him moved up the list to be assassinated,” White will say. [HistoryLink, 12/6/2006; Rocky Mountain News, 5/1/2007; Denver Post, 6/18/2009]
Preparing for the Murder - Order leader Robert Jay Mathews had already sent a colleague to Denver to determine if Berg was a viable target (see May 17, 1984). The four members of the assassination team—Mathews, Bruce Pierce, David Lane, and Richard Scutari—assemble at a local Motel 6 to review their plans. Pierce, the assassin, has brought a .45 caliber Ingram MAC-10 submachine gun for the job. All four men begin to surveill Berg’s townhouse.
Gunned Down - At 9:21 p.m., Berg drives his Volkswagen Beetle into his driveway. Lane, the driver, pulls up behind him. Mathews leaps out of the car and opens the rear door for Pierce, who jumps out and runs up the driveway. Berg exits his vehicle with a bag of groceries. Pierce immediately opens fire with his submachine gun, pumping either 12 or 13 bullets into Berg’s face and body before the gun jams. (Sources claim both figures of bullet wounds in Berg as accurate.) Pierce and Mathews get back into their car, rush back to the Motel 6, gather their belongings, and leave town. Three of the four members of the “hit squad” will soon be apprehended, charged, and convicted. Pierce is sentenced to 252 years in prison, including time for non-related robberies, and will die in prison in 2010; Lane is given 150 years, and will die in prison in 2007. Neither man is prosecuted for murder, as the evidence will be determined to be inconclusive; rather, they will be charged with violating Berg’s civil rights. Scutari, accused of serving as a lookout for Pierce, and Jean Craig, accused of collecting information on Berg for the murder, will both be acquitted of culpability in the case, but will be convicted of other unrelated crimes. Mathews will not be charged due to lack of evidence of his participation; months later, he will die in a confrontation with law enforcement officials (see December 8, 1984). [Rocky Mountain News, 5/1/2007; Denver Post, 6/18/2009; Denver Post, 8/17/2010] In sentencing Pierce to prison, Judge Richard Matsch will say of the murder, “The man [Berg] was killed for who he was, what he believed in, and what he said and did, and that crime strikes at the very core of the Constitution.” [Denver Post, 8/17/2010]
Re-Enacting a Fictional Murder? - Some will come to believe that the assassins may have attempted to re-enact the fictional murder of a Jewish talk-show host depicted in The Turner Diaries (see 1978). [Rocky Mountain News, 5/1/2007; The Moderate Voice, 11/30/2007]
'Opening Shot ... of a Truly Revolutionary Radical Right' - Mark Potok of the SPLC will characterize Berg’s murder as an early event leading to the 1995 Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995). “In a sense, it was one of the opening shots of a truly revolutionary radical right,” Potok will say, “perfectly willing to countenance the mass murder of American civilians for their cause.” [Denver Post, 6/18/2009] Berg’s ex-wife, Judith Berg, will travel around the country in the years after her ex-husband’s murder, speaking about what she calls the “disease and anatomy of hate,” a sickness that can infect people so strongly that they commit horrible crimes. In 2007, she will tell a reporter that Berg’s murder was a watershed event that inspired more hate-movement violence. “What happened to Alan in the grown-up world has reached into the youth culture,” she will say. “It opened the door to an acceptance of violence as a means of acting on hate.… While our backs are turned toward overseas, hate groups are having a heyday. People are very unhappy; they’re out of work and jobs are scarce. They’re ripe for joining extremist groups. We need to understand what happened to make sure it doesn’t happen again.” [Rocky Mountain News, 5/1/2007] White later says of Pierce, Lane, and their fellows: “It’s left me to wonder what makes somebody like this. I think these people didn’t have much opportunity in their lives and scapegoat. They blame others for not making it.” [Denver Post, 8/17/2010]

Entity Tags: Norman Lear, Robert Jay Mathews, Richard Scutari, Morris Dees, Richard P. Matsch, Mark Potok, Jean Margaret Craig, Judith Berg, Alan Berg, Anath White, Aryan Nations, Bruce Carroll Pierce, David Edan Lane, KOA 850 AM Radio, The Order

Timeline Tags: US Domestic Terrorism

The DC Court of Appeals rejects a claim by civilian plaintiffs to force the government to disclose classified information as part of a lawsuit, citing the “state secrets” privilege (see March 9, 1953). Furthermore, the court broadens the definition of “state secrets” to include “disclosure of intelligence-gathering methods or capabilities and disruption of diplomatic relations.” [Siegel, 2008, pp. 197]

Timeline Tags: Civil Liberties

Neoconservative academic Michael Ledeen, who left the Defense Department under suspicion of engaging in espionage on behalf of Israel (see 1983), gains a position at the National Security Council. His boss is Lieutenant Colonel Oliver North (see July 7-10, 1987 and May-June, 1989). According to Iran-Contra investigators, it is Ledeen who suggests to North “that Israeli contacts might be useful in obtaining release of the US hostages in Lebanon” (see November 4, 1979-January 20, 1981). Ledeen is granted high-level security clearance. [CounterPunch, 2/28/2004]

Entity Tags: Michael Ledeen, National Security Council

Timeline Tags: Iran-Contra Affair, Neoconservative Influence

A 2007 satellite image of the Khan Research Laboratories in Kahuta.A 2007 satellite image of the Khan Research Laboratories in Kahuta. [Source: GeoEye]Richard Barlow, an analyst working on Pakistan’s nuclear program who was released by the State Department in the early 1980s (see 1981-1982), is hired by the CIA’s Office of Scientific and Weapons Research (OSWR). Barlow re-analyzes the data and confirms his earlier conclusions—that Pakistan is pursuing a covert nuclear weapons program. Barlow learns about the trade in dual-use components—tools and equipment that can be used to make nuclear weapons, but also for other, non-nuclear purposes, meaning trade in them is hard to spot and regulate. One example of this is a California couple that exports dozens of high-speed cathode-ray oscilloscopes and special cameras to Hong Kong, where they are picked up by Pakistani agents. Barlow realizes that such a large number of oscilloscopes must be for nuclear weapons manufacturing, and also finds a link between the purchase and the Pakistan Atomic Energy Commission (PAEC). Barlow will later comment, “There was tons of it and most of it was ending up in [Pakistan]. Pakistan had a vast network of procurers, operating all over the world.” Barlow also finds that the material is going to a secret nuclear facility near Islamabad, the Khan Research Laboratories, where sensors pick up high levels of enriched uranium in the air and in dust on [trucks] leaving the laboratories. [New Yorker, 3/29/1993; Guardian, 10/13/2007] Despite this, in order to prevent Congress from cutting of aid to the anti-Soviet mujaheddin, which flows through Pakistan, US authorities will repeatedly insist Pakistan is not working on a nuclear program (see August 1985-October 1990).

Entity Tags: Richard Barlow, Office of Scientific and Weapons Research (CIA), Central Intelligence Agency, Pakistan Atomic Energy Commission, Kahuta Research Laboratories

Timeline Tags: A. Q. Khan's Nuclear Network

A University of California, Berkeley graduate student, John E. Hauser, picks up a package in the university’s computer science lab. The package is a bomb made up of ammonium nitrate and aluminum powder. It explodes, costing Hauser four fingers from his right hand and severing arteries. [BBC, 11/12/1987; Washington Post, 4/14/1996; Washington Post, 1998] The bomb has apparently been in the lab for two or three days, left on top of a stack of three-ring binders. Hauser thought it was a file box for another student’s computer cards, and picked it up intending to identify its owner. Upon opening it, he hears an odd buzzing sound, then the bomb detonates. Ironically, the victim of a previous bombing, Professor Diogenes Angelakos (see July 2, 1982), hears the explosion, rushes to offer assistance, and ties a tourniquet around Hauser’s arm. Hauser will lose much of the use of his right arm, and will be forced to abandon his dreams of becoming an Air Force fighter pilot and perhaps an astronaut. He will later say, “There is not a day that goes by when I’m not reminded that I don’t have full use of my right hand… from trying to play racquetball to trying to pick up my daughter.” Of the bombing, Hauser will say, “This was as much a target of opportunity as anything else.” The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski once worked as a professor at UC-Berkeley. Both this bombing and the previous one are in Cory Hall, a building close to where Kaczynski once taught. Captain Bill Foley of the Berkeley campus police will later say: “He taught in Campbell Hall and had offices in one of our temporary buildings. If you did a triangle between Campbell and that temporary building you would hit Cory Hall at peak of the triangle.” Cory Hall also houses the engineering and computer science departments, known to be favorite targets of the Unabomber. [Washington Post, 11/27/1993; Washington Post, 4/14/1996] This bomb is more powerful than earlier Unabomber constructions, using a mix of ammonium nitrate and aluminum powder to cause the explosion. The bomb’s shrapnel consists of tacks, nails, and bits of lead. Stamped on the end seal of the bomb’s pipe are the initials “FC,” which will later be found to stand for “Freedom Club.” [World of Forensic Science, 1/1/2005]

Entity Tags: Theodore J. (“Ted”) Kaczynski, University of California at Berkeley, John E. Hauser, Diogenes Angelakos

Timeline Tags: US Domestic Terrorism

A suspicious package mailed to the Auburn, Washington, headquarters of the Boeing Aircraft Company is opened and safely disarmed by the local bomb squad. [BBC, 11/12/1987; Washington Post, 1998] The package containing a pipe bomb gets lost in Boeing’s internal mail system; the package is in the process of being returned to the apparent sender before it draws the attention of Boeing employees, who call the bomb squad. [Washington Post, 4/14/1996] The bomb will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski tried to destroy a Boeing aircraft with another bomb six years ago (see November 15, 1979). Like earlier bombs, this bomb contains the initials “FC” engraved on a metal component; authorities will later learn that “FC” stands for “Freedom Club.” [World of Forensic Science, 1/1/2005]

Entity Tags: Theodore J. (“Ted”) Kaczynski, Boeing Company

Timeline Tags: US Domestic Terrorism

In 1985, US Congress passes legislation requiring US economic sanctions on Pakistan unless the White House can certify that Pakistan has not embarked on a nuclear weapons program (see August 1985 and August 1985). The White House certifies this every year until 1990 (see 1987-1989). However, it is known all the time that Pakistan does have a continuing nuclear program. For instance, in 1983 a State Department memo said Pakistan clearly has a nuclear weapons program that relies on stolen European technology. Pakistan successfully builds a nuclear bomb in 1987 but does not test it to keep it a secret (see 1987). With the Soviet-Afghan war ending in 1989, the US no longer relies on Pakistan to contain the Soviet Union. So in 1990 the Pakistani nuclear program is finally recognized and sweeping sanctions are applied (see June 1989). [Gannon, 2005] Journalist Seymour Hersh will comment, “The certification process became farcical in the last years of the Reagan Administration, whose yearly certification—despite explicit American intelligence about Pakistan’s nuclear-weapons program—was seen as little more than a payoff to the Pakistani leadership for its support in Afghanistan.” [New Yorker, 3/29/1993] The government of Pakistan will keep their nuclear program a secret until they successfully test a nuclear weapon in 1998 (see May 28, 1998).

Entity Tags: US Congress, White House, Pakistan

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network

Despite the passage of two amendments dealing with Pakistan’s nuclear program in August 1985 (see August 1985 and August 1985), the Reagan and Bush administrations will fail to keep Congress properly informed of incidents related to Pakistan’s acquisition of components for its nuclear program, even though such notification is required by law. Senator John Glenn (D-OH), chairman of the Governmental Affairs Committee, and Congressman Stephen Solarz (D-NY), Chairman of the House Asian and Pacific Affairs Subcommittee, will later say that they are not formally briefed about any significant Pakistani procurement, with the exception of one case (see July 1987 or Shortly After), during this period. For example, Glenn will later say he should have been briefed about a nuclear scare involving Pakistan and India in 1990 (see January-May 1990) [New Yorker, 3/29/1993]

Entity Tags: House Subcommittee on Asian and Pacific Affairs, Governmental Affairs Committee, Reagan administration, Stephen Solarz, John Glenn

Timeline Tags: A. Q. Khan's Nuclear Network

In Ann Arbor, Michigan, research assistant Nicklaus Suino of the University of Michigan suffers burns and shrapnel wounds when he opens a package bomb at the home of psychology professor James V. McConnell. [BBC, 11/12/1987; Washington Post, 1998] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). McConnell may be one of Kaczynski’s most personal targets. McConnell is a rich, flamboyant, and somewhat eccentric professor who espouses controversial theories about human behavior modification based on his research with flatworms. McConnell taught at the University of Michigan when Kaczynski was taking graduate courses in mathematics there. The package mailed to McConnell’s house comes with a one-page letter taped to the top, bearing a Salt Lake City postmark and reading in part: “I’d like you to read this book. Everybody in your position should read this book.” McConnell asks Suino to open it. The resulting explosion injures Suino; McConnell escapes with slight, temporary hearing loss but is profoundly shaken by the incident. [Washington Post, 4/14/1996]

Entity Tags: Theodore J. (“Ted”) Kaczynski, James V. McConnell, Nicklaus Suino, University of Michigan

Timeline Tags: US Domestic Terrorism

Hugh C. Scrutton.Hugh C. Scrutton. [Source: Washington Post]In Sacramento, California, Hugh C. Scrutton is killed when he tries to remove what looks to be a road hazard from the parking lot—a block of wood with nails protruding from it inside a paper bag—behind his computer rental shop. The “hazard” is actually a bomb [BBC, 11/12/1987; Knight Ridder, 5/28/1995; Washington Post, 1998; World of Forensic Science, 1/1/2005] consisting of three 10-inch pipes filled with a mixture of potassium sulfate, potassium chloride, ammonium nitrate, and aluminum powder. The bomb contains shrapnel consisting of sharp chunks of metal, nails, and splinters. It explodes with enormous force, killing Scrutton almost instantly. [World of Forensic Science, 1/1/2005] Like earlier bombs, this bomb contains the initials “FC” engraved on a metal component; authorities later learn that “FC” stands for “Freedom Club.” [World of Forensic Science, 1/1/2005] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). In 1967, Scrutton took a summer math course at the University of California at Berkeley while Kaczynski taught mathematics there; it is not known whether the two crossed paths during that time. [Washington Post, 4/14/1996]

Entity Tags: Hugh Scrutton, Theodore J. (“Ted”) Kaczynski, University of California at Berkeley

Timeline Tags: US Domestic Terrorism

Soliman Biheiri.Soliman Biheiri. [Source: US Immigrations and Customs]BMI Inc., a real estate investment firm based in Secaucus, New Jersey, is formed in 1986. Former counterterrorism “tsar” Richard Clarke will state in 2003, “While BMI [has] held itself out publicly as a financial services provider for Muslims in the United States, its investor list suggests the possibility this facade was just a cover to conceal terrorist support. BMI’s investor list reads like a who’s who of designated terrorists and Islamic extremists.” Investors in BMI include: [US Congress, 10/22/2003]
bullet Soliman Biheiri. He is the head of BMI for the duration of the company’s existence. US prosecutors will later call him the US banker for the Muslim Brotherhood, a banned Egyptian militant group. Biheiri’s computer will eventually be searched and found to have contact information for Ghaleb Himmat and Youssef Nada, leaders of the Al Taqwa Bank, which is founded two years after BMI (see 1988). After 9/11, the US and UN will designate both Himmat and Nada and the Al Taqwa Bank as terrorist financiers, and the bank will be shut down (see November 7, 2001). US prosecutors say there are other ties between BMI and Al Taqwa, including financial transactions. Biheiri also has close ties with Yousuf Abdullah Al-Qaradawi. Qaradawi is said to be a high-ranking member of the Muslim Brotherhood, a shareholder in Al Taqwa, and has made statements supporting suicide bombings against Israel. In 2003, US investigators will accuse Biheiri of ties to terrorist financing. He will be convicted of immigration violations and lying to a federal agent (see June 15, 2003). [Wall Street Journal, 9/15/2003; Forward, 10/17/2003] Biheiri will be convicted of immigration fraud in 2003 and then convicted of lying to federal investigators in 2004 (see June 15, 2003).
bullet Abdullah Awad bin Laden, a nephew of Osama bin Laden. He invests about a half-million dollars in BMI real estate ventures, earning a profit of $70,000. For most of the 1990s he runs the US branch of a Saudi charity called World Assembly of Muslim Youth (WAMY). He is investigated by the FBI in 1996 (see February-September 11, 1996), and WAMY will be raided by US agents in 2004 (see June 1, 2004). The raid is apparently part of a larger investigation into terrorism financing. In 2001, at least two of the 9/11 hijackers will live three blocks away from the WAMY office (see March 2001 and After). [Wall Street Journal, 9/15/2003; Washington Post, 4/19/2004]
bullet Nur and Iman bin Laden, two female relatives of Osama bin Laden. Abdullah Awad bin Laden will invest some of their money in a BMI real estate project. While their bin Laden family ties are intriguing, neither have been accused of any knowing connections to terrorist financing. [Washington Post, 4/19/2004]
bullet Mousa Abu Marzouk. He has identified himself as a top leader of Hamas. The US declares him a terrorist in 1995 (see July 5, 1995-May 1997). BMI makes at least two transactions with Marzouk after he is declared a terrorist. [Wall Street Journal, 9/15/2003]
bullet Yassin al-Qadi, a Saudi multimillionaire. His lawyers will later claim he has no terrorism ties and had only a passing involvement with BMI and liquidated his investment in it in 1996. However, another company operating from the same office as BMI is called Kadi International Inc. and lists its president as al-Qadi. Al-Qadi is also a major investor in the suspect computer company Ptech (see 1994; 1999-After October 12, 2001). Al-Qadi and BMI head Biheiri have financial dealings with Yaqub Mirza, a Pakistani who manages a group of Islamic charities in Virginia known as the SAAR network (see July 29, 1983). These charities will be raided in March 2002 on suspicions of terrorism ties (see March 20, 2002). Shortly after 9/11, the US will officially declare al-Qadi a terrorist financier (see October 12, 2001). [Wall Street Journal, 9/15/2003]
bullet Saleh Kamel. BMI allegedly receives a $500,000 investment from the Dallah Al-Baraka banking conglomerate, which is headed by Kamel. For many years before 9/11, Omar al-Bayoumi, an associate of 9/11 hijackers Khalid Almihdhar and Nawaf Alhazmi, will receive a salary from Dallah, despite apparently doing no work. Some will accuse al-Bayoumi of involvement in funding the 9/11 plot, but that remains to been proven (see August 1994-July 2001). Kamel reportedly founded a Sudanese Islamic bank which housed accounts for senior al-Qaeda operatives. He is a multi-billionaire heavily involved in promoting Islam, and his name appears on the Golden Chain, a list of early al-Qaeda supporters (see 1988-1989). He denies supporting terrorism. [US Congress, 10/22/2003; Wall Street Journal, 6/21/2004]
bullet The Kuwait Finance House. According to Clarke, this organization is alleged to be a BMI investor and the “financial arm of the Muslim Brotherhood in Kuwait. Several al-Qaeda operatives have allegedly been associated with the Kuwaiti Muslim Brotherhood, including Khalid Shaikh Mohammed, Suliman abu Ghaith, Wadih El-Hage, and Ramzi Yousef.” In 2003, an apparent successor entity to the Kuwait Finance House will be designated as a terrorist entity by the US. A lawyer for the Kuwait Finance House will later say the bank has never let its accounts be used for terrorism. [Wall Street Journal, 9/15/2003; US Congress, 10/22/2003; Wall Street Journal, 4/20/2005]
bullet Tarek Swaidan. He is a Kuwaiti, an associate of al-Qadi, and a leading member of the Kuwaiti branch of the Muslim Brotherhood. It is unknown if he has made any denials about his alleged associations. [Wall Street Journal, 9/15/2003]
bullet Abdurahman Alamoudi. For many years he runs the American Muslim Council, a lobby group founded by a top Muslim Brotherhood figure. US prosecutors say he also is in the Brotherhood, and has alleged ties to Hamas. In 2004, the US will sentence him to 23 years in prison for illegal dealings with Libya (see October 15, 2004). [Wall Street Journal, 6/21/2004; Washington Post, 10/16/2004]
bullet The International Islamic Relief Organization (IIRO) and the Muslim World League, closely connected Saudi charities suspected of financing terrorism. They give BMI $3.7 million out of a $10 million endowment from unknown Saudi donors. The Financial Times will later note, “While it is not clear whether that money came from the Saudi government, [a 2003] affidavit quotes a CIA report that says the Muslim World League ‘is largely financed by the government of Saudi Arabia.’” Both organizations consistently deny any support of terrorism financing, but in early 2006 it will be reported that US officials continue to suspect them of such support (see January 15, 2006). [Financial Times, 8/21/2003] In 1992, a branch of the IIRO gives $2.1 million to BMI Inc. to invest in real estate. The money disappears from BMI’s books. In October 1999, BMI goes defunct after it is unable to repay this money to the IIRO branch. The IIRO branch gives BMI the rest of the $3.7 million between 1992 and 1998. BMI will use the money to buy real estate (see 1992). Eventually, some of this money will be given to Hamas operatives in the West Bank and spent on violent actions against Israel. This will eventually lead to legal action in the US and a seizure of some of the money. [Wall Street Journal, 11/26/2002; Washington Post, 8/20/2003; Washington Times, 3/26/2004; Washington Post, 4/19/2004] By 1992, BMI has projected revenues in excess of $25 million, based largely on their real estate investments in the US. [US Congress, 10/22/2003] In early 1999, months before BMI goes defunct, the FBI hears evidence potentially tying BMI to the 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998), but an investigation into this will not be pursued (see Early 1999). It should be noted that BMI had many investors, and presumably most BMI investors would have had no suspicions that their money might be used to fund terrorism or other types of violence.

Entity Tags: Iman bin Laden, International Islamic Relief Organization, Muslim World League, Kuwait Finance House, Nur bin Laden, Mousa Abu Marzouk, Abdurahman Alamoudi, Richard A. Clarke, Soliman Biheiri, Abdullah Awad bin Laden, Yousuf Abdullah Al-Qaradawi, Tarek Swaidan, Yassin al-Qadi, Saleh Abdullah Kamel

Timeline Tags: Complete 911 Timeline

Antonin Scalia.Antonin Scalia. [Source: Oyez.org]Appeals court judge Antonin Scalia is sworn in as an Associate Justice of the US Supreme Court. [Legal Information Institute, 7/30/2007] Although Scalia is an ardent social conservative, with strongly negative views on such issues as abortion and homosexual rights, Scalia and Reagan administration officials both have consistently refused to answer questions about his positions on these issues, as President Reagan did at his June announcement of Scalia’s nomination. [Ronald Reagan Presidential Library, 6/17/1986] Scalia’s nomination is, in the words of Justice Department official Terry Eastland, “no better example of how a president should work in an institutional sense in choosing a nominee….” Eastland advocates the practice of a president seeking a judiciary nominee who has the proper “judicial philosophy.” A president can “influence the direction of the courts through his appointments” because “the judiciary has become more significant in our politics,” meaning Republican politics. [Dean, 2007, pp. 132] Scalia is the product of a careful search by Attorney General Edwin Meese and a team of Justice Department officials who wanted to find the nominee who would most closely mirror Reagan’s judicial and political philosophy (see 1985-1986).

Entity Tags: Ronald Reagan, Edwin Meese, Antonin Scalia, Terry Eastland, US Department of Justice

Timeline Tags: Civil Liberties

Radical Muslim leader Sheikh Omar Abdul-Rahman obtains his first US visa via the CIA. A State Department official will later discover this was the first of six US visas given to him between 1986 and 1990. All are approved by CIA agents acting as consular officers at US embassies in Sudan and Egypt. “The CIA officers claimed they didn’t know the sheikh was one of the most notorious political figures in the Middle East and a militant on the State Department’s list of undesirables.” But one top New York investigator will later say, “Left with the choice between pleading stupidity or else admitting deceit, the CIA went with stupidity.” [Boston Globe, 2/3/1995; New York Magazine, 3/17/1995] Abdul-Rahman uses the visas to attend conferences of Islamic students in the US. Then he visits Pakistan, where he preaches at Peshawar, visits the Saudi embassy in Islamabad, and is “lionized at receptions heavily attended by Americans.” He plays a prominent role in recruiting mujaheddin fighters to fight against the Soviets in Afghanistan. [Kepel, 2002, pp. 300] In 1989, Abdul-Rahman is arrested in Egypt and held under very closely guarded house arrest, but he manages to escape one year later, possibly by being smuggled out of his house in a washing machine. The CIA gives him another US visa and he moves to the US (see July 1990). [New York Times, 1/8/1995] Journalist Simon Reeve will claim in his 1999 book The New Jackals that, “The CIA, it is now clear, arranged the visa[s] to try and befriend the Sheikh in advance of a possible armed fundamentalist revolution in Egypt.” According to a retired CIA official, the CIA recalled mistakes made with the Ayatollah Khomeini in Iran and were trying to win Abdul-Rahman’s trust. [Reeve, 1999, pp. 60]

Entity Tags: Central Intelligence Agency, Omar Abdul-Rahman, Simon Reeve

Timeline Tags: Complete 911 Timeline

Khaled Abu el-Dahab.Khaled Abu el-Dahab. [Source: Egyptian government]In the mid-1980’s, Khaled Abu el-Dahab, an Egyptian medical student, joins the militant group Islamic Jihad, and also meets Ali Mohamed. Mohamed convinces el-Dahab to move to the US and become a sleeper cell agent. El-Dahab does so in 1987, moving to Santa Clara, California, where Mohamed has a residence. El-Dahab marries an American woman, becomes a US citizen, and gets a job at a computer company. In 1987, a female acquaintance of el-Dahab enters his apartment unannounced and finds several men there cleaning rifles. She decides it is something she does not want to know about, and breaks off contact with him. In 1990, Mohamed and el-Dahab travel together to Afghanistan. They are financially supported by a network of US sympathizers, including two Egyptian-American doctors. Beginning in 1990, El-Dahab’s apartment becomes an important communications hub for al-Qaeda and Islamic Jihad cells all over the world. For much of the 1990’s, the Egyptian government cut direct phone links to countries like Sudan, Yemen, Afghanistan or Pakistan in an effort to disrupt communications between radical militants. So Dahab acts as a telephone operator for the Islamic Jihad network, using a three-way calling feature to connect operatives in far-flung countries. He communicates with bin Laden’s base in Sudan (where bin Laden lives until 1996). He receives phone calls from the likes of Islamic Jihad leader Ayman al-Zawahiri, who also visits California twice (see Spring 1993; Late 1994 or 1995). He distributes forged documents and makes money transfers. He is trained to make booby-trapped letters, enrolls in a US flight school to learn how to fly gliders and helicopters, and recruits additional US sleeper agents (see Mid-1990s). He helps translate US army manuals and topographical maps into Arabic for al-Qaeda and Islamic Jihad training. El-Dahab will move to Egypt in 1998 and get arrested in October of that year. He will confess his role in all of this in an Egyptian trial in 1999. The Egyptian government will sentence him to 15 years in prison (see 1999). [New York Times, 10/23/2001; London Times, 11/11/2001; San Francisco Chronicle, 11/21/2001; Chicago Tribune, 12/11/2001]

Entity Tags: Al-Qaeda, Ali Mohamed, Osama bin Laden, Khaled Abu el-Dahab, Ayman al-Zawahiri, Islamic Jihad

Timeline Tags: Complete 911 Timeline

The FBI’s sketch of the as-yet-unidentified ‘Unabomber.’The FBI’s sketch of the as-yet-unidentified ‘Unabomber.’ [Source: FBI]Gary Wright, the owner of CAAMS Inc., a Salt Lake City, Utah, computer shop, is injured when he attempts to remove a “road hazard” at the rear entrance of his shop. The “hazard” is actually a bomb, similar to one that killed another computer shop owner in Sacramento, California, over a year ago (see December 11, 1985). A secretary saw a man wearing a hooded sweatshirt and sunglasses leave the bag containing the bomb; she becomes the first eyewitness in what will later become the “Unabomber” investigation (see April 3, 1996). [BBC, 11/12/1987; Washington Post, 1998] The “Unabomber” is improving his skills; this bomb contains a more sophisticated triggering device than earlier constructions. [World of Forensic Science, 1/1/2005] Almost six years ago, Theodore “Ted” Kaczynski, the so-called “Unabomber,” planted another bomb in Salt Lake City (see October 8, 1981). But for now, the FBI has no knowledge of Kaczynski’s identity. It has, however, found what it calls “an absolute link” between the Wright bombing and the “Unabom” serial bombings that have been going on since 1978 (see May 25-26, 1978). Federal bomb expert Ron Wolters says the bombs in the different cases display a high level of similarity. Police describe the as-yet-unidentified bomber as a disgruntled academician or computer worker. [Chicago Sun-Times, 2/24/1987]

Entity Tags: CAAMS Inc, Theodore J. (“Ted”) Kaczynski, Ron Wolters, Gary Wright

Timeline Tags: US Domestic Terrorism

A. Q. Khan.A. Q. Khan. [Source: CBC]A. Q. Khan, father of Pakistan’s nuclear weapons program, tells an Indian reporter that the program has been successful (see 1987). “What the CIA has been saying about our possessing the bomb is correct,” he says, adding, “They told us Pakistan could never produce the bomb and they doubted my capabilities, but they now know we have it.” He says that Pakistan does not want to use the bomb, but “if driven to the wall there will be no option left.” The comments are made during a major Indian army exercise known as Brass Tacks that Pakistanis consider a serious threat, as it is close to the Pakistani border. In fact, at one point the Indian commanding general is reported to consider actually attacking Pakistan—an attack that would be a sure success given India’s conventional superiority. According to reporter Seymour Hersh, the purpose of the interview is “to convey a not very subtle message to the Indians: any attempt to dismember Pakistan would be countered with the bomb.” This interview is an embarrassment to the US government, which aided Pakistan during the Soviet-Afghan War, but has repeatedly claimed Pakistan does not have nuclear weapons (see August 1985-October 1990). Khan retracts his remarks a few days later, saying he was tricked by the reporter. [New Yorker, 3/29/1993]

Entity Tags: Seymour Hersh, Abdul Qadeer Khan, Central Intelligence Agency

Timeline Tags: A. Q. Khan's Nuclear Network

USS ‘Stark’ after being struck by Iraqi missile.USS ‘Stark’ after being struck by Iraqi missile. [Source: US Department of Defense]Two missiles from an Iraqi F-1 Mirage warplane strike the USS Stark, killing 37 of the sailors aboard. The frigate is a member of a US naval task force sent to the Persian Gulf to keep the Gulf open for shipping during the Iran-Iraq War. The Iraqi fighter locks weapons on the Stark three minutes before firing; the commander of the ship refuses to issue the standard “back off” warning to the Iraqi pilot. The first missile bores deep into the ship but fails to explode; the second missile explodes, incinerating the crew’s quarters, the radar room, and the combat information center. The ship burns for two days. [PBS, 2000; Peniston, 2006, pp. 61-63]
Diverting Blame onto Iran - The Pentagon later claims that the Stark indeed warned the fighter pilot not to approach. Iraq quickly apologizes for the attack. The US continues to patrol the Gulf, and continues its program of re-registering Kuwaiti oil tankers under the American flag in order to protect them from Iranian attacks. A diplomat says that given the scale of casualties in the incident, the American public is going to start asking “what the hell is the US doing in the Gulf?” Iran calls the attack on the Stark a “divine blessing.” US officials quickly divert blame for the attack on Iran, accepting an Iraqi explanation that the fighter pilot must have mistaken the US warship for an Iranian vessel. [Guardian, 5/19/1987]
Excusing Iraq, Punishing 'Stark' Commander - “We’ve never considered them hostile at all,” says President Reagan in regards to Iraq’s military. “They’ve never been in any way hostile.… And the villain in the piece is Iran.” Senator John Warner (R-VA), a former secretary of the Navy, denounces Iran as “a belligerent that knows no rules, no morals.” Fellow senator John Glenn (D-OH) calls Iran “the sponsor of terrorism and the hijacker of airliners.” Iraq later determines that the Stark was in its so-called “forbidden zone,” and refuses to produce the pilot for any disciplinary action. The only punishment for the attack is suffered by the captain of the Stark, Glenn Brindel, who is relieved of his command, and his executive officer, who is punished for “dereliction of duty.” [TomDispatch (.com), 5/3/2007]
Lawsuits Dismissed - Two wrongful death lawsuits arising from the attacks will later be dismissed due to the “state secrets” privilege (see June 13, 1991 and September 16, 1992).

Entity Tags: US Department of Defense, US Department of the Navy, Glenn Brindel, John Glenn, John W. Warner, Ronald Reagan

Timeline Tags: US-Iraq 1980s

Following an incident where a Pakistani procurement agent was arrested in the US trying to buy components for a nuclear weapon (see Before July 1987), there is a serious row about it between a CIA manager and a CIA analyst at a Congressional hearing. The hearing is called by Stephen Solarz (D-NY), chairman of the House Subcommittee on Asian and Pacific Affairs, to vet intelligence concerning Pakistan’s nuclear weapons program. CIA manager General David Einsel says it is “not cut and dried” that the arrested Pakistani, Arshad Pervez, and his handler, Inam ul-Haq, are agents of the Pakistani government. Richard Barlow, a CIA analyst there to help Einsel, is surprised by the false answer, as it is a criminal offense to lie to Congress. He realizes, “Einsel’s testimony was highly evasive, and deliberately so.” He will also later comment: “These congressmen had no idea what was really going on in Pakistan and what had been coming across my desk about its WMD program. They did not know that Pakistan already had a bomb and was shopping for more with US help. All of it had been hushed up.” When Barlow is asked the same question, he says it is “clear” Pervez is working for Pakistan, at which point Einsel screams, “Barlow doesn’t know what he’s talking about.” Solarz then asks whether there are any more cases involving the Pakistan government. Einsel says there are not, but Barlow replies, “Yes, there have been scores of other cases.” Barlow is then hustled out of the room and returns to CIA headquarters. A senior government official not cleared to attend the briefing comes in and tries to repair the damage, saying that Barlow was referring to intelligence reports, but “not all intelligence reports are accurate.” The official will later indicate that he is not proud of what he does, saying, “I didn’t know what I was getting into.” [New Yorker, 3/29/1993; Guardian, 10/13/2007] Barlow will subsequently be forced out of the CIA because of this hearing (see August 1987-1988).

Entity Tags: Stephen Solarz, Richard Barlow, Inam ul-Haq, House Subcommittee on Asian and Pacific Affairs, Arshad Pervez, Office of Scientific and Weapons Research (CIA), David Einsel, Central Intelligence Agency

Timeline Tags: A. Q. Khan's Nuclear Network

Following a stormy Congressional subcommittee hearing where he contradicted CIA manager David Einsel about Pakistan’s nuclear program (see July 1987 or Shortly After), analyst Richard Barlow is forced out of the CIA. Barlow will later say that he leaves because Einsel makes his job impossible: “Einsel went crazy. I was told that my personal behavior at the hearing had been unprofessional. I was accused of being unpatriotic and almost scuttling the Afghanistan program. I was viewed as being disloyal.” [Guardian, 10/13/2007] He will also say: “These people were determined that nothing like this was ever going to happen ever again—no more arrests, no more truth to the Congress.… I was targeted by some in the Directorate of Operations; they made my life miserable.” [Raw Story, 4/30/2007] Commenting on his position during the Cold War, he will add: “We had to buddy-up to regimes we didn’t see eye-to-eye with, but I could not believe we would actually give Pakistan the bomb. How could any US administration set such short-term gains against the long-term safety of the world?” Barlow’s job description is re-written six weeks after the hearing, removing him from work on Pakistan’s nuclear weapons, and he leaves the CIA for the Customs Service a year later. [Guardian, 10/13/2007]

Entity Tags: Central Intelligence Agency, Richard Barlow, Office of Scientific and Weapons Research (CIA), David Einsel

Timeline Tags: A. Q. Khan's Nuclear Network

Michael Springmann.Michael Springmann. [Source: Michael Springmann]Michael Springmann, head US consular official in Jeddah, Saudi Arabia, later claims that during this period he is “repeatedly ordered… to issue [more than 100] visas to unqualified applicants.” He turns them down, but is repeatedly overruled by superiors. [BBC, 11/6/2001; St. Petersburg Times, 11/25/2001] In one case, two Pakistanis apply for visas to attend a trade show in the US, but they are unable to name the trade show or city in which it will be held. When Springmann denies them a visa, he gets “an almost immediate call from a CIA case officer, hidden in the commercial section [of the consulate], that I should reverse myself and grant these guys a visa.” Springmann refuses, but the decision is reversed by the chief of the consular section. Springmann realizes that even the ambassador, Walter Cutler, is aware of the situation, which becomes “more brazen and blatant” as time goes on. On one occasion Springmann is even told, “If you want a job in the State Department in future, you will change your mind.” [CBC Radio One, 7/3/2002; Trento, 2005, pp. 344-6] Springmann loudly complains to numerous government offices, but no action is taken. He is fired and his files on these applicants are destroyed. He later learns that recruits from many countries fighting for bin Laden against Russia in Afghanistan were funneled through the Jeddah office to get visas to come to the US, where the recruits would travel to train for the Afghan war. According to Springmann, the Jeddah consulate was run by the CIA and staffed almost entirely by intelligence agents. This visa system may have continued at least through 9/11, and 11 of the 19 9/11 hijackers received their visas through Jeddah (see November 2, 1997-June 20, 2001), possibly as part of this program (see October 9, 2002 and October 21, 2002). [BBC, 11/6/2001; St. Petersburg Times, 11/25/2001; CBC Radio One, 7/3/2002; Associated Press, 7/17/2002 pdf file; Fox News, 7/18/2002]

Entity Tags: Central Intelligence Agency, US Consulate, Jeddah, Saudi Arabia Office, Michael Springmann

Timeline Tags: Complete 911 Timeline, War in Afghanistan

The US Congress suspends aid to Pakistan for six weeks, due to arguments related to the arrest of a Pakistani agent attempting to buy material for its nuclear weapons program (see Before July 1987 and July 1987 or Shortly After). Congress suspects that Pakistan has a nuclear weapons program, but the administration denies this, as do the Pakistanis, even though they are both well aware that the program is a reality. The suspension is symbolic, as it only lasts six weeks and does not affect aid that has already been agreed upon, but not yet provided. [New York Times, 9/30/1987; New Yorker, 3/29/1993]

Timeline Tags: A. Q. Khan's Nuclear Network

Although the US is already aware that the Soviet Union intends to withdraw from Afghanistan (see November 1986-November 1987) and a formal agreement on the Soviet withdrawal will be signed in four months (see April 1988), the US Congress approves aid of $480 million for Pakistan, despite its nuclear weapons program. Legislation has been passed that automatically cuts off aid to countries with illicit nuclear weapons programs (see August 1985 and August 1985), but this legislation is not invoked. Despite apparently knowing of the Pakistani program, Congress decides that supporting the war in Afghanistan is more important (see July 1987 or Shortly After and Late 1980s). Some lawmakers and officials will later say that at this time “everybody in Congress” knows that Pakistan has a nuclear weapons program (see Late 1980s), and anti-proliferation Senator John Glenn (D-OH) will later say the threat of nuclear proliferation “is a far greater danger to the world than being afraid to cut off the flow of aid to Afghanistan,” adding, “It’s the short-term versus the long-term.” [New Yorker, 3/29/1993]

Entity Tags: John Glenn, Pakistan

Timeline Tags: Complete 911 Timeline, A. Q. Khan's Nuclear Network, War in Afghanistan

Page 1 of 19 (1899 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike