!! History Commons Alert, Exciting News

Context of 'October 11, 2002 and After: Republican Senate Candidate Attacks Opponent with Ads Equating Opponent with Hussein, Bin Laden'

This is a scalable context timeline. It contains events related to the event October 11, 2002 and After: Republican Senate Candidate Attacks Opponent with Ads Equating Opponent with Hussein, Bin Laden. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 9 (868 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9 | next

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

In the aftermath of World War II, Japanese officer Yukio Asano is charged by a US war crimes tribunal for torturing a US civilian. Asano had used the technique of “waterboarding” on the prisoner (see 1800 and After). The civilian was strapped to a stretcher with his feet in the air and head towards the floor, and water was poured over his face, causing him to gasp for air until he agreed to talk. Asano is convicted and sentenced to 15 years of hard labor. Other Japanese officers and soldiers are also tried and convicted of war crimes that include waterboarding US prisoners. “All of these trials elicited compelling descriptions of water torture from its victims, and resulted in severe punishment for its perpetrators,” reporter Evan Wallach will later write. In 2006, Senator Edward Kennedy (D-MA), discussing allegations of US waterboarding of terror suspects, will say in regards to the Asano case, “We punished people with 15 years of hard labor when waterboarding was used against Americans in World War II.” [Washington Post, 10/5/2006; National Public Radio, 11/3/2007]

Entity Tags: Yukio Asano, Evan Wallach, Edward M. (“Ted”) Kennedy

Timeline Tags: Torture of US Captives

A B-29 bomber similar to the one that crashed in Georgia.A B-29 bomber similar to the one that crashed in Georgia. [Source: Global Security (.org)]A test flight for the Air Force’s Project Banshee, located at Robins Air Force Base in Georgia, is set for 8:30 a.m. Banshee is an attempt begun in 1946 to develop and deploy a long-range missile ahead of both the Soviet Union and rival US military branches. The airplane used in the test flight crashes less than an hour into its flight, killing 9 of the 13 aboard.
Maintenance Problems - The plane assigned for the flight is a B-29 Stratofortress, a bomber made famous by its delivery of the atomic bombs to Hiroshima and Nagasaki at the end of World War II. B-29s are notoriously difficult to fly and maintain: their four wing-mounted engines almost routinely overheat and catch fire, causing engine shutdowns, sudden drops in altitude, and, often, crashes. The engines’ eighteen cylinders lack sufficient airflow to keep them cool, and the overheating often causes the crankcases, made of light but highly flammable magnesium, to burst into flames. Like so many of its brethren, the plane has suffered its share of maintenance issues, and is flying without numerous recommended maintenance and repair tasks being performed. Just five days before, it had been designated “red cross”—grounded and unfit for service. It was allowed to fly through an “exceptional release” signed by the squadron commander.
Crew Difficulties - The flight is moved back to the afternoon after some crew members fail to show up on time, and to allow last-minute repairs to be made. By takeoff, the flight crew is assembled: Captain Ralph Erwin; co-pilot Herbert W. Moore; flight engineer Earl Murrhee; First Lieutenant Lawrence Pence, Jr, the navigator; Sergeant Walter Peny, the left scanner; Sergeant Jack York, the right scanner; Sergeant Melvin Walker, the radio operator; and Sergeant Derwood Irvin, manning the bombsight and autopilot. The crew is joined by civilian engineers assigned to Banshee: Al Palya and Robert Reynolds from RCA, William Brauner and Eugene Mechler from the Franklin Institute, and Richard Cox from the Air Force’s Air Materiel Command. In violation of standard procedure, none of the crew or the civilians are briefed on emergency procedures, though Murrhee will later say that the crew were all familiar with the procedures; he is not so sure about the civilians, though he knows Palya and Reynolds have flown numerous test flights before. In another violation of Air Force regulations, none of the flight crew have worked together before. As author Barry Siegel will note in 2008, “The pilot, copilot, and engineer had never shared the same cockpit before.”
Engine Fire and Crash - Less than an hour into the flight, one engine catches fire and two others lose power, due to a combination of maintenance failures and pilot errors. The civilians have some difficulty getting into their parachutes as Erwin and Moore attempt to regain control of the aircraft. Four of the crew and civilians manage to parachute from the plane, but most remain on board as the airplane spirals into the ground on the edge of the Okefenokee Swamp, near Waycross, Georgia. Crew members Moore, Murrhee, and Peny survive, as does a single civilian, Mechler. Four others either jump at too low an altitude or die when their chutes foul the airplane; the other five never manage to leave the plane and die on impact.
Widows File Suit - Several of the civilians’ widows will file suit against the US Air Force, asserting that their husbands died because of Air Force negligence (see June 21, 1949). Their lawsuit will eventually become US v. Reynolds, a landmark Supreme Court case and the underpinning for the government’s claims of state secrets privilege (see March 9, 1953). [Siegel, 2008, pp. 3, 14-17, 33-49]

Entity Tags: Derwood Irvin, Barry Siegel, US Department of the Air Force, Walter Peny, William Brauner, Air Materiel Command, Richard Cox, Ralph Erwin, Robert Reynolds, Al Palya, Radio Corporation of America, Eugene Mechler, Earl Murrhee, Franklin Institute, Project Banshee, Melvin Walker, Lawrence Pence, Jr, Herbert W. Moore, Jr, Jack York

Timeline Tags: Civil Liberties

Initial Associated Press reports of a crash in Georgia of a B-29 that had been on a test flight for the Air Force’s secret Project Banshee (see October 6, 1948) acknowledge that “the plane had been on a mission testing secret electronic equipment which RCA developed and built under an Air Force contract… Full details of the plane’s mission were not disclosed.… The Air Force would say only that the bomber was engaged in ‘electronic research on different types of radar…’” Local papers have a bit more detail, with survivor accounts hinting at confusion and some contradictions between their versions of events and that being given out by official Air Force spokesmen. Later reports from the Air Force will downplay the B-29’s involvement in Project Banshee. [Siegel, 2008, pp. 56-58]

Entity Tags: Associated Press, US Department of the Air Force, Radio Corporation of America, Project Banshee

Timeline Tags: Civil Liberties

The Army Air Force’s Air Materiel Command receives the initial report on an investigation of a B-29 crash in Georgia (see October 6, 1948). Perceptions of the crash are colored by the fact that the bomber was carrying equipment from Project Banshee, a secret Air Force missile development initiative. The initial report is meticulously factual, providing an almost minute-by-minute account of the events preceding the crash as told by the four survivors and intensive examination of the debris. The report concludes that it would benefit future B-29 pilots to have more training on flying the plane when it has lost both engines on one wing, and a general recommendation that the pilot and crew should give civilian passengers better instruction in emergency procedures. Though the report is circumspect in the extreme in finding fault with the pilot and military personnel for the crash, and gives only vague and generalized recommendations to help prevent future crashes, the Air Force will heatedly deny that the pilots or crew could have been in any way responsible for the crash. In 2008, reporter Barry Siegel will write, “Years later, this particular claim, in fact Air Materiel Command’s entire position, would cause various veteran aviators to hoot.” Pilot error causing the crash is obvious, they will conclude. [Siegel, 2008, pp. 62-65]

Entity Tags: US Department of the Air Force, Barry Siegel, Air Materiel Command, Project Banshee

Timeline Tags: Civil Liberties

Frank Folsom, the executive vice president of the Radio Corporation of America’s RCA Victor Division, writes a letter to General Hoyt Vandenberg, the commander of the US Air Force. Folsom is inquiring about the deaths of two RCA employees in a recent B-29 crash in Georgia (see October 6, 1948). The plane had been on a secret test mission for the Air Force’s Project Banshee, a missile development project in which RCA is heavily involved. Folsom believes that the Air Force is downplaying the likelihood that pilot error caused the crash (see October 18, 1948), and tells Vandenberg that “certain steps will [need to be taken] if we are to participate in the future in Air Force flight test programs.” Folsom wants more pay and compensation for RCA employees participating in Air Force test programs, as well as newer and safer airplanes to be used in the test flights and a higher caliber of test pilots and crew members. Perhaps the portion of the letter that causes the most consternation among Air Force officials is Folsom’s request to read over the official accident reports. “When a crash has occurred, a copy of the official report… must be made available promptly to us,” he writes. “Needless to say, the report will not be disclosed except to those who are directly concerned.” Folsom’s letter will spark a new round of Air Force investigations into the crash, in hopes of mollifying Folsom. However, the report from this investigation will be classified at the highest level of security and not provided to RCA. Additionally, though the second investigation will find a strong likelihood of pilot error causing the crash, the Air Force will not admit any such findings to RCA. [Siegel, 2008, pp. 65-80] These accident reports will play a key role in the lawsuit filed against the US government by three widows of killed crew members (see June 21, 1949 and August 7-8, 1950).

Entity Tags: Hoyt Vandenberg, Frank Folsom, Project Banshee, Radio Corporation of America, US Department of the Air Force

Timeline Tags: Civil Liberties

Phyllis Brauner and Elizabeth Palya, who both lost their husbands in the “Project Banshee” B-29 crash (see October 6, 1948), file a civil action lawsuit against the US government in regards to the crash. The lawsuit claims that the US Air Force, in the person of the pilot and military crew members of the B-29, caused the deaths of their civilian husbands by “the negligence and wrongful acts and omissions of the officers and employees” of the US. The widows’ lawyer, Charles Biddle, asks the government for $300,000 per family. A third widow, Patricia Reynolds, will join the lawsuit in September 1949. One of the biggest issues surrounding the case is the lawsuit’s request that Biddle and his lawyers be given access to the official accident reports, which the government will claim cannot be revealed because they may contain classified information (see October 18, 1948 and August 7-8, 1950). Biddle’s promise that no one else will see the reports makes no impression on the government’s lawyers. [Siegel, 2008, pp. 100-101]

Entity Tags: Elizabeth Palya, Charles Biddle, Patricia Reynolds, Phyllis Brauner, US Department of the Air Force, Project Banshee

Timeline Tags: Civil Liberties

A federal judge orders the Air Force to turn over copies of its classified accident reports about a B-29 crash (see October 6, 1948) as part of a lawsuit filed by three of the widows of crew members killed in the crash (see June 21, 1949). Claiming that the reports may contain classified information about a secret missile development project, Project Banshee, the Air Force not only refuses to turn over the accident reports to the widows’ lawyer, it refuses to allow even the attorney general to view the documents (see August 7-8, 1950). The lawyer for the widows, Charles Biddle, will continue to press for the release of the accident reports. [Siegel, 2008, pp. 120-123]

Entity Tags: Charles Biddle, Project Banshee, US Department of the Air Force

Timeline Tags: Civil Liberties

The Air Force refuses to meet the court-imposed deadline to turn over accident reports of a 1948 B-29 crash in Georgia (see October 6, 1948) to the plaintiffs in a lawsuit against the government (see July 26, 1950). Instead, the Justice Department argues before the court that because the accident reports might contain “state secrets” that might imperil “national security” if made available to anyone outside the Air Force, the reports cannot be made available. “[T]he aircraft in question, together with the personnel on board, were engaged in a highly secret mission of the Air Force,” the government lawyers argue. “The airplane likewise carried confidential equipment on board and any disclosure of its mission or information concerning its operation or performance would be prejudicial to this department and would not be in the public interest.” Such a claim—that the production of the reports would “seriously hamper national security”—renders the reports “beyond judicial authority,” the Justice Department lawyers claim. [Siegel, 2008, pp. 124-126]

Entity Tags: US Department of the Air Force, US Department of Justice

Timeline Tags: Civil Liberties

Weeks after the Justice Department refused to make accident reports of a 1948 B-29 crash (see October 6, 1948) available to the plaintiffs in an ongoing wrongful death lawsuit against the government (see July 26, 1950) because the reports are so highly classified that their disclosure might “seriously hamper national security” (see July 26, 1950 and August 7-8, 1950), the Air Force, in a routine review, drastically lowers the classification of the accident reports from top-level “Secret” to third-level “Restricted.” Whereas “Secret” documents supposedly contain information that “might endanger national security” if revealed, “Restricted” documents are “for official use only” and should not be disclosed “for reasons of administrative privacy.” The Air Force apparently no longer considers the documents a threat to national security. However, neither the plaintiffs’ lawyers, the judge hearing the lawsuit, or even the Justice Department lawyers are aware of the reports’ reduction in status. They continue to argue the merits of releasing the reports as if they are still highly classified. [Siegel, 2008, pp. 133]

Entity Tags: US Department of the Air Force, US Department of Justice

Timeline Tags: Civil Liberties

Federal judge William H. Kirkpatrick rules that the US government must turn over the disputed, and supposedly highly classified (see September 14, 1950), accident reports from a 1948 B-29 crash (see October 6, 1948)—not to the plaintiffs in the lawsuit over the crash (see July 26, 1950), but to Kirkpatrick himself. He wishes to review the reports to determine if they contain any information that might threaten national security, and, before turning the documents over to the plaintiffs’ lawyers, will personally remove that information. In mid-October, when the government again refuses to turn over the documents, Kirkpatrick will find in favor of the plaintiffs (see October 12, 1950). [Siegel, 2008, pp. 133-134]

Entity Tags: US Department of Justice, William H. Kirkpatrick

Timeline Tags: Civil Liberties

Federal judge William H. Kirkpatrick rules in favor of the plaintiffs in a wrongful death lawsuit against the US government (see October 6, 1948, June 21, 1949, and July 26, 1950), after the government refuses to turn over classified accident reports that have a direct bearing on the plaintiffs’ case (see September 21, 1950). Judge Kirkpatrick orders the government to pay the plaintiffs, three widows who lost their husbands in a 1948 plane crash, a total of $225,000. The plaintiffs’ lawyer, Charles Biddle, expects the government to balk at paying out the money, and to instead continue to challenge the court’s attempt to compel it to turn over the accident reports (see October 19, 1951). [Siegel, 2008, pp. 134-139]

Entity Tags: Charles Biddle, William H. Kirkpatrick

Timeline Tags: Civil Liberties

The government, represented by a team of Justice Department lawyers, appeals the recent ruling against it in the ‘Banshee’ B-29 plane crash lawsuit (see June 21, 1949). In the Third US Circuit Appeals Court, the government argues that the lower court had no business demanding that the Air Force turn over classified accident reports about the crash, because the reports may contain information that would potentially compromise national security (see October 12-18, 1948 and September 14, 1950). The government had twice defied court orders to produce the documents, and as a result had lost the lawsuit (see October 12, 1950). The Justice Department’s arguments come down to the assertion that the judiciary has no constitutional right to compel the executive branch to turn over documents it considers privileged. In 2008, author Barry Siegel will write, “For the first time in the B-29 litigation, the government directly argued that the judiciary could not review [the government’s] claim of privilege.” The lawyer for the plaintiffs, Charles Biddle, counters that the executive branch has no such sweeping claim of privilege, and that a judge should be allowed to review documents in dispute to determine both their bearing on a case and the possibility that releasing those documents could jeopardize national security (see September 21, 1950). Three weeks later, the appeals court will rule unanimously against the government (see December 11, 1951). [Siegel, 2008, pp. 149-153]

Entity Tags: US Department of Justice, Charles Biddle, Barry Siegel

Timeline Tags: Civil Liberties

A three-judge federal appeals court unanimously rejects the government’s claim of unfettered executive privilege and secrecy in regards to classified documents (see October 19, 1951). In an opinion written by Judge Albert Maris, the court finds that the government’s claim that the judiciary can never compel the executive branch to turn over classified documents to be without legal merit. The plaintiffs in the case, three widows who lost their husbands in the crash of a B-29 bomber carrying classified materials (see June 21, 1949), had a compelling need for the documents in question, the downed B-29 accident reports, to further their case, Maris writes (see October 12, 1950).
No Legal Basis for Claim of Privilege - Maris goes further than the parameters of the single lawsuit, writing: “[W]e regard the recognition of such a sweeping privilege… as contrary to a sound public policy. The present cases themselves indicate the breadth of the claim of immunity from disclosure which one government department head has already made. It is but a small step to assert a privilege against any disclosure of records merely because they might prove embarrassing to government officials. Indeed, it requires no great flight of imagination to realize that if the government’s contentions in these cases were affirmed, the privilege against disclosure might gradually be enlarged… until as is the case in some nations today, it embraced the whole range of government activities.… We need to recall in this connection the words of [Revolution-era jurist] Edward Livingston: ‘No nation ever yet found any inconvenience from too close an inspection into the conduct of its officers, but many have been brought to ruin, and reduced to slavery, by suffering gradual imposition and abuses, which were imperceptible, only because the means of publicity had not been secured.’” He also quotes Revolutionary War figure Patrick Henry, who said, “[T]o cover with the veil of secrecy the common routine of business is an abomination in the eyes of every intelligent man and every friend to his country.”
Rejecting Claim of 'State Secrets' - Maris is even less respectful of the government’s claim of a “state secrets” privilege. He notes that the government did not make that claim until well into the lawsuit proceedings (see October 19, 1951), indicating that it was a “fallback” argument used after the original government arguments had failed. Maris is also troubled, as author Barry Siegel later writes, in the government’s “assertion of unilateral executive power, free from judicial review, to decide what qualified as secret.” The lower court judge’s ruling that he alone should be given the documents for review adequately protected the government’s security interests, Maris writes: “[But] the government contends that it is within the sole province of the secretary of the Air Force to determine whether any privileged material is contained in the documents and that his determination of this question must be accepted by the district court without any independent consideration.… We cannot accede to this proposition. On the contrary, we are satisfied that a claim of privilege against disclosing evidence… involves a justiciable question, traditionally within the competence of the courts.… To hold that the head of an executive department of the government in a [law]suit to which the United States is a party may conclusively determine the government’s claim of privilege is to abdicate the judicial function to infringe the independent province of the judiciary as laid down by the Constitution.”
Fundamental Principle of Checks and Balances - Maris continues: “The government of the United States is one of checks and balances. One of the principal checks is furnished by the independent judiciary which the Constitution established. Neither the executive nor the legislative branch of the government may constitutionally encroach upon the field which the Constitution has reserved for the judiciary.… Nor is there any danger to the public interest in submitting the question of privilege to the decision of the courts. The judges of the United States are public officers whose responsibilities under the Constitution is just as great as that of the heads of the executive departments.”
Government Appeal - The Justice Department will appeal the ruling to the US Supreme Court (see March 1952 and March 9, 1953). [Siegel, 2008, pp. 153-156]

Entity Tags: Albert Maris, US Department of Justice, Barry Siegel, US Supreme Court

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

The Justice Department appeals the ruling of the US Appeals Court in the B-29 “Banshee” case (see December 11, 1951). The appellate judges found that the executive branch of government could not unilaterally refuse to hand over classified documents requested during the course of a trial, and justify its decision merely by its own say-so (see October 12, 1950). Solicitor General Philip Perlman argues that the appellate ruling erroneously interprets the law “so as to permit encroachments by the judiciary on an area committed by the Constitution to executive discretion.” The claim of “state secrets,” “executive privilege,” and, ultimately, “national security” must trump judicial concerns, Perlman argues, and he goes on to say that the judiciary should not be allowed to “substitute its judgment for the judgment of the executive.” The case will be labeled United States of America v. Patricia Reynolds, Phyllis Brauner, and Elizabeth Palya, and will usually be shortened to the more colloquial US v. Reynolds.
The Vinson Court - In 2008, author Barry Siegel, in his book Claim of Privilege, will note that the recent ascension of Fred Vinson as the Supreme Court’s Chief Justice does not bode well for the plaintiffs in the case. President Truman placed Vinson, whom Siegel calls Truman’s “poker and drinking buddy,” as Chief Justice to try to achieve consensus between the two contentious blocs of justices on the Court. Siegel notes that Vinson is widely considered an intellectual and legal lightweight, with a tendency to take the side of the government on issues in which he lacks a full understanding. Siegel will write that in many instances, Vinson functions “as part of the executive branch.”
'Dennis' Case Preview of Court's Tendency to Favor Executive Branch - Vinson had written the opinion in a 1951 ruling, Dennis et al v. United States, where the Court had upheld a lower court ruling that twelve acknowledged American Communists were sent to jail under the Smith Act—not for breaking the law, but for “teaching and advocating,” in the words of the original indictment. Siegel will call that ruling “the nadir of the Vinson Court.” According to Siegel, the Dennis ruling showed the Court’s predisposition to give the government, and particularly the executive branch, plenty of leeway in its findings in subsequent cases such as Reynolds. [Siegel, 2008, pp. 157-162]

Entity Tags: Fred Vinson, Elizabeth Palya, US Supreme Court, US Department of Justice, Barry Siegel, Harry S. Truman, Phyllis Brauner, Philip Perlman, Patricia Reynolds

Timeline Tags: Civil Liberties

Lawyers make their opening arguments before the Supreme Court in the case of US v Reynolds, the lawsuit that finds the government had no overarching right to unilaterally refuse to deliver classified documents in the course of a wrongful death lawsuit against the government (see December 11, 1951). The government has appealed the appellate court ruling to the Supreme Court (see March 1952). Because four of the nine justices had voted not to hear the case—in essence to let the appellate court ruling stand—the defense is cautiously optimistic about the Court’s decision.
Judiciary Has No Right to Interfere with Powers of the Executive, Government Argues - Acting Solicitor General Robert Stern tells the Court that the appellate judges’ decision, written by Judge Albert Maris, “is an unwarranted interference with the powers of the executive,” and that the decision forced the government to choose “whether to disclose public documents contrary to the public interest [or] to suffer the public treasury to be penalized” (a reference to the decision to award the plaintiffs monetary damages—see October 12, 1950). The judiciary “lack[s] power to compel disclosure by means of a direct demand [as well as] by the indirect method of an order against the United States, resulting in judgment when compliance is not forthcoming.”
Executive Has No Right to Unilaterally Withhold Information, Defense Counters - Stern’s arguments are countered by those of the plaintiffs’ lawyer, Charles Biddle, who writes, “We could rest our case with confidence on the clear opinion of Judge Maris,” but continues by arguing that if the government asserts a claim of executive privilege on the basis of national security, it must make the documents available to the Court for adjudication, or at least provide enough information for the Court to judge whether the documents present in fact a threat to national security if disclosed. This is particularly true, Biddle argues, “where there is no showing that the documents in question contain any military secret” (Biddle is unaware that the documents’ classification status had been reduced two years before—see September 14, 1950). “The basic question here is whether those in charge of the various departments of the government may refuse to produce documents properly demanded… in a case where the government is a party (see June 21, 1949), simply because the officials themselves think it would be better to keep them secret, and this without the Courts having any power to question the propriety of such decision.… In other words, say the officials, we will tell you only what we think it is in the public interest that you should know. And furthermore, we may withhold information not only about military or diplomatic secrets, but we may also suppress documents which concern merely the operation of the particular department if we believe it would be best, for purposes of efficiency or morale, that no one outside of the department, not even the Court, should see them.”
No Basis for Claims of Military Secrets - Biddle argues that because of responses he has received to his demands over the course of this lawsuit, he is relatively sure there are no military secrets contained within them. “[T]he proof is to the contrary,” he says, and goes on to say that had the Air Force disclosed from the outset that the plane crash, the fatal accident that sparked the original lawsuit (see October 6, 1948), was probably caused by pilot error and not by random chance, the plaintiffs may have never needed to ask for the disclosure of the documents in question, the accident reports on the crash (see October 18, 1948). “The secretary [of the Air Force]‘s formal claim of privilege said that the plane at the time was engaged in a secret mission and that it carried confidential equipment,” Biddle says, “but nowhere was it asserted that either had anything to do with the accident. The whole purpose of the demand by the respondents was for the purpose of finding out what caused the accident.… They were not in the least interested in the secret mission or equipment.” [Siegel, 2008, pp. 165-170]

Entity Tags: US Supreme Court, Albert Maris, Robert Stern, US Department of the Air Force, Charles Biddle

Timeline Tags: Civil Liberties

In their regular Saturday conference, the nine Supreme Court justices discuss the issues and arguments surrounding US v Reynolds (see October 21, 1952). According to the notes from the discussion, Chief Justice Fred Vinson, a strong advocate for expansive executive powers (see March 1952), says the case “boils down to Executive Branch determine privilege.” Other notes by Justice William O. Douglas suggest that Vinson isn’t convinced that the US must “be forced to pay for exercising its privilege” (see October 12, 1950). A straw vote taken at the end of the discussion shows five justices in favor of the government’s position to unilaterally withhold classified documents—overturning the appellate court decision (see December 11, 1951), and four in favor of allowing the decision to stand. [Siegel, 2008, pp. 171]

Entity Tags: Fred Vinson, US Supreme Court, William O. Douglas

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

CIA coup planner Kermit Roosevelt.CIA coup planner Kermit Roosevelt. [Source: Find a Grave (,com)]The government of Iran is overthrown by Iranian rebels and the CIA in a coup codenamed Operation Ajax. The coup was planned by CIA operative Kermit Roosevelt after receiving the blessings of the US and British governments. Muhammad Mosaddeq is deposed and the CIA promptly reinstates Shah Mohammad Reza Pahlavi on the throne. The Shah’s secret police, SAVAK, trained by the CIA and Israel’s Mossad, are widely perceived as being as brutal and terrifying as the Nazi Gestapo in World War II. British oil interests in Iran, partially nationalized under previous governments, are returned to British control. American oil interests are retained by 8 private oil companies, who are awarded 40% of the Iranian oil industry. US General Norman Schwarzkopf, Sr. (father of the general with the same name in the 1991 Gulf War) helps the Shah develop the fearsome SAVAK secret police. [ZNet, 12/12/2001; Global Policy Forum, 2/28/2002] Author Stephen Kinzer will say in 2003, "The result of that coup was that the Shah was placed back on his throne. He ruled for 25 years in an increasingly brutal and repressive fashion. His tyranny resulted in an explosion of revolution in 1979 the event that we call the Islamic revolution. That brought to power a group of fanatically anti-Western clerics who turned Iran into a center for anti-Americanism and, in particular, anti-American terrorism. The Islamic regime in Iran also inspired religious fanatics in many other countries, including those who went on to form the Taliban in Afghanistan and give refuge to terrorists who went on to attack the United States. The anger against the United States that flooded out of Iran following the 1979 revolution has its roots in the American role in crushing Iranian democracy in 1953. Therefore, I think it’s not an exaggeration to say that you can draw a line from the American sponsorship of the 1953 coup in Iran, through the Shah’s repressive regime, to the Islamic revolution of 1979 and the spread of militant religious fundamentalism that produced waves of anti-Western terrorism." [Stephen Kinzer, 7/29/2003]

Entity Tags: Organization for Intelligence and National Security (Iran), Norman Schwarzkopf Sr., Central Intelligence Agency, Kermit Roosevelt, Muhammad Mosaddeq, Shah Mohammad Reza Pahlavi, Stephen Kinzer

Timeline Tags: US confrontation with Iran, US-Iran (1952-1953)

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]

Entity Tags: Malcolm Little, Central Intelligence Agency, Church Committee, Lew Allen, National Security Agency, Martin Luther King, Jr., Office of Security Services, Joan Baez

Timeline Tags: Civil Liberties

The Washington Post runs a front-page photo of a US soldier supervising the waterboarding of a captured North Vietnamese soldier. The caption says the technique induced “a flooding sense of suffocation and drowning, meant to make him talk.” Because of the photo, the US Army initiates an investigation, and the soldier is court-martialed and convicted of torturing a prisoner. [National Public Radio, 11/3/2007]

Entity Tags: Washington Post, US Department of the Army

Timeline Tags: Torture of US Captives

The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). [Federation of American Scientists, 7/17/1997]

Entity Tags: National Security Agency, Echelon, Rhyolite, Chalet, Government Communications Headquarters, Owen Lewis, Canyon

Timeline Tags: Civil Liberties

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]

Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Interviewer David Frost has a difficult time with his subject, former President Richard Nixon, in the day’s early questioning (see April 6, 1977). Frost attempts to recoup with a line of questioning suggested by his adviser James Reston, Jr., one used in the trial of former Nixon aide John Ehrlichman (see January 1, 1975). Were there no limits to what a president can do, even if the president wants to do something plainly illegal? he asks. Could he do anything despite the law? Burglary? Forgery? Even murder? “If the president does it, that means it’s not illegal,” Nixon retorts. “Never had his imperialism been so baldly stated,” Reston will later reflect. Frost asks if the dividing line between, for example, a police burglary and the murder of an antiwar protester is only the president’s judgment? Nixon agrees, and adds: “There’s nothing specific that the Constitution contemplates in that respect. I haven’t read every word, every jot and every tittle, but I do know this: That it has been, however, argued that as far as a president is concerned, that in war time, a president does have certain extraordinary powers which would make acts that would otherwise be unlawful, lawful if undertaken for the purpose of preserving the nation and the Constitution, which is essential for the rights we’re all talking about.” [Time, 5/30/1977; Reston, 2007, pp. 102-105; Landmark Cases, 8/28/2007]

Entity Tags: Richard M. Nixon, David Frost, James Reston, Jr, John Ehrlichman

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

A photograph of Theodore ‘Ted’ Kaczynski, taken in 1968 while Kaczynski was a young faculty member at the University of California at Berkeley.A photograph of Theodore ‘Ted’ Kaczynski, taken in 1968 while Kaczynski was a young faculty member at the University of California at Berkeley. [Source: George M. Bergman / Wikimedia]An unmailed package is found in a car park at the University of Illinois, Chicago, and brought to Northwestern University in Evanston, Illinois, because of its return address; the addressee now teaches at Rensselaer Polytechnic Institute in Troy, New York. Buckley Crist, the material sciences professor named in the return address on the package cannot identify it, and turns it over to campus security. When Northwestern police officer Terry Marker opens it, it explodes, injuring him slightly. The package contains a pipe bomb packed in a carved wooden box. [BBC, 11/12/1987; Washington Post, 4/14/1996; Washington Post, 1998] The bomb is made of a nine-inch pipe filled with explosive powders and triggered by a nail held by rubber bands that strikes and ignites match heads when the box is opened. [World of Forensic Science, 1/1/2005] The package contains 10 $1 commemorative Eugene O’Neill stamps on its outer wrapper. Authorities will later speculate that the bomber may have chosen the O’Neill stamps because the playwright was an ardent supporter of anarchists. [Knight Ridder, 5/28/1995] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). It is believed to be Kaczynski’s first bomb. [New York Times, 4/7/1996]

Entity Tags: Terry Marker, Northwestern University, Theodore J. (“Ted”) Kaczynski, Buckley Crist

Timeline Tags: US Domestic Terrorism

A graduate student at Northwestern University in Evanston, Illinois, John Harris, is injured when he opens a box left at the University’s Technological Institute. The box contains a bomb that explodes when opened. Harris suffers minor cuts and burns. [BBC, 11/12/1987; Washington Post, 1998] Authorities recognize fundamental similarities between this and a previous Northwestern University bombing (see May 25-26, 1978). This bomb is quite similar in construction to that one, though more sophisticated in construction and design. It consists of a cigar box and a pipe bomb, triggered by a battery-operated filament that ignites explosive powders. [World of Forensic Science, 1/1/2005] However, the package contains a number of small, finger-sized pieces of wood glued to its outer container. [Knight Ridder, 5/28/1995] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see May 25-26, 1978 and April 3, 1996).

Entity Tags: Theodore J. (“Ted”) Kaczynski, Northwestern University, John Harris

Timeline Tags: US Domestic Terrorism

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

A parcel mailed from Chicago catches fire in a mailbag aboard American Airlines Flight 444 from Chicago to Washington, DC. The package contains a bomb which was apparently constructed to explode inside the cargo hold. Twelve passengers are treated for smoke inhalation; the flight conducts an emergency landing at Dulles Airport near Washington. [BBC, 11/12/1987; Washington Post, 1998] The bomb does not ignite because instead of explosive powder, it contains barium nitrate, a powder often used to create green smoke in fireworks. [World of Forensic Science, 1/1/2005] The bombing is later shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). After the airline bombing and the subsequent bombing of a United Airlines executive (see June 10, 1980), the FBI ties the previous bombings (see May 25-26, 1978 and May 9, 1979) to this one and code-names the file UNABOM, for “UNiversity and Airline BOMber.” The media will soon dub the unknown assailant the “Unabomber.” [Washington Post, 4/4/1996; World of Forensic Science, 1/1/2005] Kaczynski will later express regret for trying to bomb the plane (see April 24, 1995).

Entity Tags: Washington Dulles International Airport, Theodore J. (“Ted”) Kaczynski, Federal Bureau of Investigation

Timeline Tags: US Domestic Terrorism

Bruce Ivins teaching a child how to juggle in 1983.Bruce Ivins teaching a child how to juggle in 1983. [Source: Sam Yu / Frederick News-Post]Future anthrax attacks suspect Bruce Ivins begins working at USAMRIID, the US Army’s top bioweapons laboratory. He will continue working there until a few weeks before his suicide in July 2008 (see July 29, 2008). He has master’s and doctoral degrees in microbiology. His work at USAMRIID will generally focus on developing anthrax vaccines. He frequent conducts experiments on animals to test vaccines for various types of anthrax exposure. His experiments use only wet anthrax, not the dry powdered anthrax that will be used in the 2001 anthrax attacks. Ivins has a stable decades-long marriage, several children, and is popular with colleagues and friends. One coworker will later say: “a lot of people cared about him.… He is not Timothy McVeigh (see 8:35 a.m. - 9:02 a.m. April 19, 1995). He’s not the Unabomber” (see April 3, 1996). [Los Angeles Times, 8/1/2008; Washington Post, 8/2/2008]

Entity Tags: Bruce Ivins

Timeline Tags: 2001 Anthrax Attacks

In his Lake Forest, Illinois, home, United Airlines president Percy Wood opens a package that apparently contains a book. It contains both a book and a bomb in the book’s hollowed-out pages. It explodes, causing Wood to suffer cuts and bruises. The initials “FC” are found etched on, or punched into, a piece of pipe from the bomb. [BBC, 11/12/1987; Washington Post, 1998; World of Forensic Science, 1/1/2005] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). “FC” will later be found to stand for “Freedom Club.” [Washington Post, 1/23/1998; World of Forensic Science, 1/1/2005] Authorities will later speculate that Wood may have been targeted in part because of Kaczynski’s strange fascination with wood; he often uses wood in the construction of his bombs. The hollowed-out book, Ice Brothers, is published by Arbor House, whose symbol is a tree leaf. [Associated Press, 4/25/1995] The package contains a note asking Wood to read the enclosed book, and noting, “You will find it of great social significance.” The author of Ice Brothers, Sloan Wilson, also wrote The Man in the Gray Flannel Suit, which, according to a 1959 biography of Wilson, “was the definitive epithet for the commuting suburbanite, the status-hungry conformist from Madison Avenue.” Like an earlier bomb (see May 25-26, 1978), this bomb’s package is mailed using postage stamps commemorating the playwright Eugene O’Neill; authorities will speculate that Kaczynski may have chosen the stamps because of O’Neill’s ardent support of anarchists. [Knight Ridder, 5/28/1995]

Entity Tags: Percy Wood, Theodore J. (“Ted”) Kaczynski

Timeline Tags: US Domestic Terrorism

A federal court rules that because of the government’s “state secrets” privilege (see March 9, 1953), a civilian plaintiff suing the US Navy over a contractual agreement cannot even access “non-privileged,” or unclassified, information from the Navy because to do so might “threaten disclosure” of material that goes against “the overriding interest of the United States… preservation of its state secrets privilege precludes any further attempt to pursue litigation.” [Siegel, 2008, pp. 196-197]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

Donald Rumsfeld and Dick Cheney, along with then-President Gerald Ford, April 28, 1975.Donald Rumsfeld and Dick Cheney, along with then-President Gerald Ford, April 28, 1975. [Source: David Hume Kennerly / Gerald R. Ford Library] (click image to enlarge)Throughout the 1980s, Dick Cheney and Donald Rumsfeld are key players in one of the most highly classified programs of the Reagan administration. Presently, Cheney is working as a Republican congressman, while Rumsfeld is head of the pharmaceutical company G. D. Searle. At least once per year, they both leave their day jobs for periods of three or four days. They head to Andrews Air Force Base, near Washington, DC, and along with 40 to 60 federal officials and one member of the Reagan Cabinet are taken to a remote location within the US, such as an underground bunker. While they are gone, none of their work colleagues, or even their wives, knows where they are. They are participating in detailed planning exercises for keeping government running during and after a nuclear war with the Soviet Union.
Unconstitutional 'Continuity of Government' - This highly secret “Continuity of Government” (COG) program is known as Project 908. The idea is that if the US were under a nuclear attack, three teams would be sent from Washington to separate locations around the US to prepare to take leadership of the country. If somehow one team was located and hit with a nuclear weapon, the second or third team could take its place. Each of the three teams includes representatives from the State Department, Defense Department, CIA, and various domestic-policy agencies. The program is run by a new government agency called the National Program Office. Based in the Washington area, it has a budget of hundreds of million dollars a year, which grows to $1 billion per year by the end of Reagan’s first term in office. Within the National Security Council, the “action officer” involved in the COG program is Oliver North, who is a key figure in the mid-1980s Iran-Contra scandal. Reagan’s Vice President, George H. W. Bush, also supervises some of the program’s efforts. As well as Cheney and Rumsfeld, other known figures involved in the COG exercises include Kenneth Duberstein, who serves for a time as President Reagan’s chief of staff, and future CIA Director James Woolsey. Another regular participant is Richard Clarke, who on 9/11 will be the White House chief of counterterrorism (see (1984-2004)). The program, though, is extraconstitutional, as it establishes a process for designating a new US president that is nowhere authorized in the US Constitution or federal law. After George H. W. Bush is elected president in 1988 and the effective end of the Soviet Union in 1989, the exercises continue. They will go on after Bill Clinton is elected president, but will then be based around the threat posed by terrorists, rather than the Soviet Union (see 1992-2000). According to journalist James Mann, the participation of Rumsfeld and Cheney in these exercises demonstrates a broader truth about them: “Over three decades, from the Ford administration onward, even when they were out of the executive branch of government, they were never too far away; they stayed in touch with its defense, military, and intelligence officials and were regularly called upon by those officials. Cheney and Rumsfeld were, in a sense, a part of the permanent, though hidden, national security apparatus of the United States.” [Mann, 2004, pp. 138-145; Atlantic Monthly, 3/2004; Washington Post, 4/7/2004; Cockburn, 2007, pp. 85]
No Role for Congress - According to one participant, “One of the awkward questions we faced was whether to reconstitute Congress after a nuclear attack. It was decided that no, it would be easier to operate without them.” Thus the decision is made to abandon the Constitutional framework of the nation’s government if this plan is ever activated. [Dubose and Bernstein, 2006, pp. 198]
Reactivated after 9/11 - The plan they rehearse for in the COG exercises will be activated, supposedly for the first time, in the hours during and after the 9/11 attacks (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). [Washington Post, 3/1/2002] Mann subsequently comments, “The program is of particular interest today because it helps to explain the thinking and behavior of the second Bush Administration in the hours, days, and months after the terrorist attacks on September 11, 2001.” [Atlantic Monthly, 3/2004]

Entity Tags: Richard A. Clarke, Richard (“Dick”) Cheney, Oliver North, National Program Office, James Woolsey, Kenneth Duberstein, Donald Rumsfeld, George Herbert Walker Bush

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

A maintenance worker at the University of Utah in Salt Lake City finds a bomb in a business classroom. The device is defused by the local bomb squad and no one is injured. [BBC, 11/12/1987; Washington Post, 1998] The bomb will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996).

Entity Tags: Theodore J. (“Ted”) Kaczynski, University of Utah

Timeline Tags: US Domestic Terrorism

An E-4B Airborne Command Post.An E-4B Airborne Command Post. [Source: US Air Force] (click image to enlarge)During the 1980s, top-secret exercises are regularly held, testing a program called Continuity of Government (COG) that would keep the federal government functioning during and after a nuclear war (see 1981-1992). The program includes a special plane called the National Emergency Airborne Command Post (NEACP). This is a modified Boeing 747, based at Andrews Air Force Base, near Washington, DC that has its own conference room and special communications gear. Nicknamed the “Doomsday” plane, it could act as an airborne command post from where a president could run the country during a nuclear war. One of the COG exercises run by the Reagan administration involves a team of officials actually staying aloft in the NEACP for three days straight. The team cruises across the US, and up and down the coasts, periodically being refueled in mid-air. [Schwartz, 1998; Mann, 2004, pp. 144] Dick Cheney and Donald Rumsfeld participate in the COG exercises, though whether they are aboard the NEACP in this particular one is unknown. [Atlantic Monthly, 3/2004] The plan that is being rehearsed for in the exercises will be activated in response to the 9/11 attacks (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). Also on 9/11, three Doomsday planes (then known as “National Airborne Operations Center” planes) will be in the air, due to an exercise taking place that morning called Global Guardian (see Before 9:00 a.m. September 11, 2001). [Schwartz, 1998; Omaha World-Herald, 2/27/2002]

Entity Tags: Donald Rumsfeld, Richard (“Dick”) Cheney

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

A parcel addressed to the head of the Vanderbilt University computer science department, Patrick Fischer, explodes, injuring Fischer’s secretary, Janet Smith. The package was originally sent to Fischer at Pennsylvania State University but was later forwarded to Nashville, Tennessee, where Vanderbilt University is located and where Fischer now teaches. [BBC, 11/12/1987; Washington Post, 1998] Fischer will later describe Smith’s injuries as “nasty lacerations,” and will say, “She made a full recovery, but it was very traumatic for her.” The bomb itself consists of smokeless powder and a large number of match heads. The package has a false return address, stating it comes from LeRoy Bearnson, a professor of electrical engineering at Utah’s Brigham Young University. Bearnson will later say, “I suppose the guy didn’t care which way it went or who got blown up.” FBI agent Oliver “Buck” Revell, who takes part in early phases of the bomb investigation, will later say: “He might pick out an individual, but the person was still a symbolic target to him. I suspect that once he targeted the university research system, it didn’t matter that much who received it. I suspect he felt the country would pick up the symbolism.” The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). When Fischer, along with the rest of the country, learns of Kaczynski’s identity, he will try to find connections between himself and Kaczynski, and come up with only the most tenuous of relationships: Fischer studied at the Massachusetts Institute of Technology (MIT) while Kaczynski studied at nearby Harvard, and Fischer may have shared a Harvard math class with Kaczynski. He also spent time in Salt Lake City, a city with which Kaczynski is familiar. “The agents made it very clear that I was the target,” Fischer will later say. “I still have no idea why, except my feeling is that he chose names at random with certain associations.” [Washington Post, 4/14/1996]

Entity Tags: Theodore J. (“Ted”) Kaczynski, Janet Smith, LeRoy Bearnson, Patrick Fischer, Vanderbilt University, Oliver (“Buck”) Revell

Timeline Tags: US Domestic Terrorism

An electrical engineering and computer science professor with the University of California at Berkeley, Diogenes Angelakos, picks up what he believes is a turpentine can, left in a common room in the computer science building during construction work. The can, a green, gallon-sized container, has wires dangling from it and a clock-dial attached to the wires. The device is a pipe bomb. It explodes, temporarily blinding Angelakos and severely burning his right hand. [BBC, 11/12/1987; Washington Post, 11/27/1993; Washington Post, 4/14/1996; Washington Post, 1998] The injuries to his hand and arm prevent him from effectively caring for his wife Helen in her final days; she will die a month later of terminal cancer. “I went to her funeral with my arm in a sling,” Angelakos will later recall. [Washington Post, 11/27/1993] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski once worked as a professor at UC-Berkeley.

Entity Tags: Diogenes Angelakos, Theodore J. (“Ted”) Kaczynski, University of California at Berkeley, Helen Angelakos

Timeline Tags: US Domestic Terrorism

In the second of two rulings in the case of Halkin v Helms, the judiciary comes down squarely on the side of the US government against charges of illegal surveillance and wiretapping leveled against American anti-war protesters. The district and appellate courts uphold the federal government’s “state secrets” claim as codified in US v Reynolds (see March 9, 1953), thereby denying the plaintiffs the right to see government information that they claim would prove their case. The DC Court of Appeals writes that the federal courts do not have any constitutional role as “continuing monitors of the wisdom and soundness of Executive action,” and instead the courts “should accord utmost deference to executive assertions of privilege on grounds of military or diplomatic secrets… courts need only be satisfied that there is a reasonable danger” that military secrets might be exposed. [Siegel, 2008, pp. 196-196]

Timeline Tags: Civil Liberties

Youssef Nada.Youssef Nada. [Source: Zuma Press/ NewsCom]In November 2001, Swiss investigators will search the home of Youssef Nada, the leader of Al Taqwa Bank, a Swiss bank that had just been shut down by the US and the UN for alleged ties to al-Qaeda, Hamas, and other radical militant groups (see November 7, 2001). Nada and other Al Taqwa directors are prominent members of the Muslim Brotherhood. Newsweek will say, “The Brotherhood, founded in Egypt in 1928 as a religious and quasi-political counterweight to the corrupt and increasingly decadent royalist and colonial governments dominating the Islamic world, always has had two faces: one a peaceful public, proselytizing and social-welfare oriented wing; the other a clandestine, paramilitary wing.… Intelligence and law-enforcement officials say that while some branches and elements of the Brotherhood, such as the offshoots now operating in Egypt and Syria, have pledged to work for their goal of a worldwide Islamic caliphate using peaceful means and electoral politics, the Brotherhood has also spun off many—if not most—of the more violent local and international groups devoted to the cause of Islamic holy war.” Such offshoots will include al-Qaeda and Hamas. [Newsweek, 12/24/2004] Swiss investigators discover a 14-page document from December 1982 entitled “The Project.” Nada claims not to know who wrote the document or how he came to have it, and he says he disagrees with most of the contents. The document details a strategic plan whose ultimate goal is “the establishment of the reign of God over the entire world.” The document begins, “This report presents a global vision of an international strategy of Islamic policy.” It recommends to “study of the centers of power locally and worldwide, and the possibilities of placing them under influence,” to contact and support new holy war movements anywhere in the world, to support holy war in Palestine, and “nurtur[e] the sentiment of rancor with regard to Jews.” Swiss investigators who analyze the document will later write that the strategy aims to achieve “a growing influence over the Muslim world. It is pointed out that the [Muslim Brotherhood] doesn’t have to act in the name of the Brotherhood, but can infiltrate existing entities. They can thus avoid being located and neutralized.” The document also advocates creating a network of religious, educational, and charitable institutions in Europe and the US to increase influence there. [Unknown, 12/1982; Le Temps (Geneva), 10/6/2005]

Entity Tags: Muslim Brotherhood

Timeline Tags: Complete 911 Timeline

Margaret Thatcher.Margaret Thatcher. [Source: UK Parliament]British prime minister Margaret Thatcher, displeased with two of her ministers for challenging her on unidentified policy matters, requests that they be placed under electronic surveillance. Because it is illegal for British intelligence to monitor its own citizens, the operation is handed over to the CSE, Canada’s national security agency. [Daily Iowan, 1/19/2006; Janczewski and Colarik, 2007, pp. 454] According to former CSE spy Mike Frost, who will publicly discuss the matter in 2000, Thatcher “had two ministers that she said ‘…weren’t onside.’” Thatcher, says Frost, “wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers.” Why CSE and not British intelligence? Because for the British to monitor their own government members would be illegal—so instead, they farm out such activities to their allies. “The British Parliament now have total deniability,” Frost says. “They didn’t do anything. They know nothing about it. Of course they didn’t do anything; we did it for them.” Frost will say there is no way to pin any blame or criminal charges on anyone in the British government. “The British Parliament now has total deniability,” Frost says. “They didn’t do anything… we did it for them.” [ZDNet, 2/25/2000; CBS News, 2/27/2000]

Entity Tags: Communications Security Establishment, Mike Frost, Government Communications Headquarters, Margaret Thatcher

Timeline Tags: Civil Liberties

July 29, 1983: SAAR Network Is Founded

555 Grove Street, Herndon, Virginia. This is the location of the SAAR Foundation/Safa Group and many related businesses.555 Grove Street, Herndon, Virginia. This is the location of the SAAR Foundation/Safa Group and many related businesses. [Source: Paul Sperry]The SAAR Foundation is incorporated in Herndon, Virginia, just outside Washington. It will become an umbrella organization for a cluster of over 100 charities, think tanks, and businesses known as the SAAR network. In 2002, the US government will raid the SAAR network looking for ties to the Al Taqwa Bank and the Muslim Brotherhood (see March 20, 2002). [Farah, 2004, pp. 153]

Entity Tags: SAAR Foundation

Timeline Tags: Complete 911 Timeline

Richard Clarke, who will be the counterterrorism “tsar” on 9/11, regularly participates in a series of highly secret “Continuity of Government” (COG) exercises. [Washington Post, 4/7/2004] Throughout the 1980s, the COG exercises rehearse how to keep the federal government running during and after a nuclear war with the Soviet Union (see 1981-1992). After the fall of the Soviet Union, the exercises continue, but based instead around a possible terrorist attack on the United States (see 1992-2000). [Atlantic Monthly, 3/2004] In 2004, Clarke will reveal that he has participated regularly in these exercises over the previous 20 years. He recalls that he had “gone off into caves in mountains in remote locations and spent days on end in miserable conditions, pretending that the rest of the world had blown up, and going through the questions, going through the drill.” He adds: “Everyone there play acts that it’s really happened. You can’t go outside because of the radioactivity. You can’t use the phones because they’re not connected to anything.” He also describes the COG plan requiring coded communications, saying: “There’s an elaborate system for the people in this network, first of all, to verify each other’s identity. That person on the other end has a certain password and information that they have to pass for us to believe that they’re who they say they are.” [Washington Post, 4/7/2004; ABC News, 4/25/2004] Clarke was a senior analyst at the State Department since 1979, and rises to prominence during the Reagan administration when he becomes deputy assistant secretary of state for intelligence. [Washington Post, 3/13/2003; BBC, 3/22/2004] After being a member of the National Security Council since 1992, in 1998 he is appointed as counterterrorism “tsar” (see May 22, 1998). [9/11 Commission, 3/24/2004 pdf file; New York Review of Books, 5/13/2004; Independent, 6/14/2004] According to journalist James Mann, the COG program is of particular interest because it helps explain the thinking and behavior of the Bush administration “in the hours, days, and months after the terrorist attacks on September 11, 2001.” [Atlantic Monthly, 3/2004] On the morning of 9/11, Clarke is in fact responsible for activating the COG plan, the first time it is ever implemented (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). [Clarke, 2004, pp. 8; ABC News, 4/25/2004] Also participating in the COG exercises, at least throughout at 1980s, are Dick Cheney and Donald Rumsfeld, who on 9/11 are the vice president and secretary of defense, respectively. [Atlantic Monthly, 3/2004]

Entity Tags: Richard A. Clarke

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

The DC Court of Appeals rejects a claim by civilian plaintiffs to force the government to disclose classified information as part of a lawsuit, citing the “state secrets” privilege (see March 9, 1953). Furthermore, the court broadens the definition of “state secrets” to include “disclosure of intelligence-gathering methods or capabilities and disruption of diplomatic relations.” [Siegel, 2008, pp. 197]

Timeline Tags: Civil Liberties

Sheikh Abdullah Azzam and his son-in-law Abdullah Anas in Afghanistan during the 1980s.Sheikh Abdullah Azzam and his son-in-law Abdullah Anas in Afghanistan during the 1980s. [Source: History Channel]Osama bin Laden, Sheikh Abdullah Azzam, bin Laden’s mentor, and Abdullah Anas, Azzam’s son-in-law, create an organization called Maktab al-Khidamat (MAK), known in English as the Services Office. It is also known as Al-Kifah. This organization will become a key node in the private funding network for the Afghan war. [Bergen, 2006, pp. 28-30] The US government will later call it the “precursor organization to al-Qaeda.” [9/11 Commission, 8/21/2004, pp. 89 pdf file] Initially, Azzam runs it while bin Laden funds it. They create a guesthouse in Peshawar, Pakistan, to help foreign volunteers connect with rebel forces in Afghanistan. Prior to this time, the number of such volunteers is very small, perhaps only several dozen. But the number begins to dramatically expand. [New York Times, 1/14/2001; Bergen, 2006, pp. 28-30] Donors will include the Saudi intelligence agency, the Saudi Red Crescent, the Muslim World League, and private donors, including Saudi princes. [Pittsburgh Post-Gazette, 9/23/2001] MAK/Al-Kifah begins fundraising in the US one year later (see 1985-1989).

Entity Tags: Maktab al-Khidamat, Abdullah Anas, Abdullah Azzam, Osama bin Laden

Timeline Tags: Complete 911 Timeline, War in Afghanistan

Makhtab al-Khidamat offices in the US in the late 1980s. Some of the offices in fact were represented by single individuals.Makhtab al-Khidamat offices in the US in the late 1980s. Some of the offices in fact were represented by single individuals. [Source: National Geographic] (click image to enlarge)Sheikh Abdullah Azzam, bin Laden’s mentor, makes repeated trips to the US and other countries, building up his Pakistan-based organization, Maktab al-Khidamat (MAK), or “Services Office” in English. It is also known as Al-Kifah, which means “struggle.” Azzam founded the Al-Kifah/MAK in 1984 (see Late 1984). Branches open in over 30 US cities, as Muslim-Americans donate millions of dollars to support the Afghan war against the Soviet Union. The most important branch, called the Al-Kifah Refugee Center, opens in Brooklyn, New York (see 1986-1993). Azzam is assassinated in a car bomb attack in late 1989 (see November 24, 1989). Bin Laden soon takes over the organization, which effectively morphs into al-Qaeda. His followers take over the US offices and they become financial conduits for al-Qaeda operations. [Lance, 2003, pp. 40-41]

Entity Tags: Osama bin Laden, Al-Kifah Refugee Center, Maktab al-Khidamat, Al-Qaeda, Abdullah Azzam

Timeline Tags: Complete 911 Timeline

A University of California, Berkeley graduate student, John E. Hauser, picks up a package in the university’s computer science lab. The package is a bomb made up of ammonium nitrate and aluminum powder. It explodes, costing Hauser four fingers from his right hand and severing arteries. [BBC, 11/12/1987; Washington Post, 4/14/1996; Washington Post, 1998] The bomb has apparently been in the lab for two or three days, left on top of a stack of three-ring binders. Hauser thought it was a file box for another student’s computer cards, and picked it up intending to identify its owner. Upon opening it, he hears an odd buzzing sound, then the bomb detonates. Ironically, the victim of a previous bombing, Professor Diogenes Angelakos (see July 2, 1982), hears the explosion, rushes to offer assistance, and ties a tourniquet around Hauser’s arm. Hauser will lose much of the use of his right arm, and will be forced to abandon his dreams of becoming an Air Force fighter pilot and perhaps an astronaut. He will later say, “There is not a day that goes by when I’m not reminded that I don’t have full use of my right hand… from trying to play racquetball to trying to pick up my daughter.” Of the bombing, Hauser will say, “This was as much a target of opportunity as anything else.” The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski once worked as a professor at UC-Berkeley. Both this bombing and the previous one are in Cory Hall, a building close to where Kaczynski once taught. Captain Bill Foley of the Berkeley campus police will later say: “He taught in Campbell Hall and had offices in one of our temporary buildings. If you did a triangle between Campbell and that temporary building you would hit Cory Hall at peak of the triangle.” Cory Hall also houses the engineering and computer science departments, known to be favorite targets of the Unabomber. [Washington Post, 11/27/1993; Washington Post, 4/14/1996] This bomb is more powerful than earlier Unabomber constructions, using a mix of ammonium nitrate and aluminum powder to cause the explosion. The bomb’s shrapnel consists of tacks, nails, and bits of lead. Stamped on the end seal of the bomb’s pipe are the initials “FC,” which will later be found to stand for “Freedom Club.” [World of Forensic Science, 1/1/2005]

Entity Tags: Theodore J. (“Ted”) Kaczynski, University of California at Berkeley, John E. Hauser, Diogenes Angelakos

Timeline Tags: US Domestic Terrorism

A suspicious package mailed to the Auburn, Washington, headquarters of the Boeing Aircraft Company is opened and safely disarmed by the local bomb squad. [BBC, 11/12/1987; Washington Post, 1998] The package containing a pipe bomb gets lost in Boeing’s internal mail system; the package is in the process of being returned to the apparent sender before it draws the attention of Boeing employees, who call the bomb squad. [Washington Post, 4/14/1996] The bomb will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski tried to destroy a Boeing aircraft with another bomb six years ago (see November 15, 1979). Like earlier bombs, this bomb contains the initials “FC” engraved on a metal component; authorities will later learn that “FC” stands for “Freedom Club.” [World of Forensic Science, 1/1/2005]

Entity Tags: Theodore J. (“Ted”) Kaczynski, Boeing Company

Timeline Tags: US Domestic Terrorism

President Ronald Reagan signs a directive that contributes to the modern era of “continuity planning,” which will ensure the maintenance of a functioning government in the event of a catastrophic attack on Washington, DC. This Continuity of Government (COG) plan will be activated for the first time on 9/11, in response to the terrorist attacks that day (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). [Washington Post, 3/1/2002; ABC News, 4/25/2004] National Security Decision Directive 188 (NSDD 188), “Government Coordination for National Security Emergency Preparedness,” states that it is the policy of the United States to have capabilities at all levels of government to respond to a range of national security emergencies, “from major natural calamities to hostile attacks on the nation.” The US policy “includes an emergency mobilization preparedness program which provides an effective capability to meet defense and essential civilian needs during those emergencies.” The National Security Council (NSC) is assigned as the “principal forum” where the national security emergency preparedness policy will be considered, and the Federal Emergency Management Agency (FEMA) is to “assist in the implementation of this policy through a coordinating role with the other federal agencies.” NSDD 188 also assigns responsibility for continuity planning to an interagency panel that includes the Office of Management and Budget, and the Defense, Treasury, and Justice Departments. [US President, 9/16/1985; Washington Post, 3/1/2002] A subsequent executive order in 1988 will apply the COG plan to “any national security emergency situation that might confront the nation” (see November 18, 1988), and a presidential directive in 1998 will update it to specifically deal with the emerging threat posed by terrorists (see Early 1998 and October 21, 1998). [US President, 11/18/1988; Clarke, 2004, pp. 166-167 and 170; Washington Post, 6/4/2006]

Entity Tags: Ronald Reagan

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

In Ann Arbor, Michigan, research assistant Nicklaus Suino of the University of Michigan suffers burns and shrapnel wounds when he opens a package bomb at the home of psychology professor James V. McConnell. [BBC, 11/12/1987; Washington Post, 1998] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). McConnell may be one of Kaczynski’s most personal targets. McConnell is a rich, flamboyant, and somewhat eccentric professor who espouses controversial theories about human behavior modification based on his research with flatworms. McConnell taught at the University of Michigan when Kaczynski was taking graduate courses in mathematics there. The package mailed to McConnell’s house comes with a one-page letter taped to the top, bearing a Salt Lake City postmark and reading in part: “I’d like you to read this book. Everybody in your position should read this book.” McConnell asks Suino to open it. The resulting explosion injures Suino; McConnell escapes with slight, temporary hearing loss but is profoundly shaken by the incident. [Washington Post, 4/14/1996]

Entity Tags: Theodore J. (“Ted”) Kaczynski, James V. McConnell, Nicklaus Suino, University of Michigan

Timeline Tags: US Domestic Terrorism

Hugh C. Scrutton.Hugh C. Scrutton. [Source: Washington Post]In Sacramento, California, Hugh C. Scrutton is killed when he tries to remove what looks to be a road hazard from the parking lot—a block of wood with nails protruding from it inside a paper bag—behind his computer rental shop. The “hazard” is actually a bomb [BBC, 11/12/1987; Knight Ridder, 5/28/1995; Washington Post, 1998; World of Forensic Science, 1/1/2005] consisting of three 10-inch pipes filled with a mixture of potassium sulfate, potassium chloride, ammonium nitrate, and aluminum powder. The bomb contains shrapnel consisting of sharp chunks of metal, nails, and splinters. It explodes with enormous force, killing Scrutton almost instantly. [World of Forensic Science, 1/1/2005] Like earlier bombs, this bomb contains the initials “FC” engraved on a metal component; authorities later learn that “FC” stands for “Freedom Club.” [World of Forensic Science, 1/1/2005] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). In 1967, Scrutton took a summer math course at the University of California at Berkeley while Kaczynski taught mathematics there; it is not known whether the two crossed paths during that time. [Washington Post, 4/14/1996]

Entity Tags: Hugh Scrutton, Theodore J. (“Ted”) Kaczynski, University of California at Berkeley

Timeline Tags: US Domestic Terrorism

Soliman Biheiri.Soliman Biheiri. [Source: US Immigrations and Customs]BMI Inc., a real estate investment firm based in Secaucus, New Jersey, is formed in 1986. Former counterterrorism “tsar” Richard Clarke will state in 2003, “While BMI [has] held itself out publicly as a financial services provider for Muslims in the United States, its investor list suggests the possibility this facade was just a cover to conceal terrorist support. BMI’s investor list reads like a who’s who of designated terrorists and Islamic extremists.” Investors in BMI include: [US Congress, 10/22/2003]
bullet Soliman Biheiri. He is the head of BMI for the duration of the company’s existence. US prosecutors will later call him the US banker for the Muslim Brotherhood, a banned Egyptian militant group. Biheiri’s computer will eventually be searched and found to have contact information for Ghaleb Himmat and Youssef Nada, leaders of the Al Taqwa Bank, which is founded two years after BMI (see 1988). After 9/11, the US and UN will designate both Himmat and Nada and the Al Taqwa Bank as terrorist financiers, and the bank will be shut down (see November 7, 2001). US prosecutors say there are other ties between BMI and Al Taqwa, including financial transactions. Biheiri also has close ties with Yousuf Abdullah Al-Qaradawi. Qaradawi is said to be a high-ranking member of the Muslim Brotherhood, a shareholder in Al Taqwa, and has made statements supporting suicide bombings against Israel. In 2003, US investigators will accuse Biheiri of ties to terrorist financing. He will be convicted of immigration violations and lying to a federal agent (see June 15, 2003). [Wall Street Journal, 9/15/2003; Forward, 10/17/2003] Biheiri will be convicted of immigration fraud in 2003 and then convicted of lying to federal investigators in 2004 (see June 15, 2003).
bullet Abdullah Awad bin Laden, a nephew of Osama bin Laden. He invests about a half-million dollars in BMI real estate ventures, earning a profit of $70,000. For most of the 1990s he runs the US branch of a Saudi charity called World Assembly of Muslim Youth (WAMY). He is investigated by the FBI in 1996 (see February-September 11, 1996), and WAMY will be raided by US agents in 2004 (see June 1, 2004). The raid is apparently part of a larger investigation into terrorism financing. In 2001, at least two of the 9/11 hijackers will live three blocks away from the WAMY office (see March 2001 and After). [Wall Street Journal, 9/15/2003; Washington Post, 4/19/2004]
bullet Nur and Iman bin Laden, two female relatives of Osama bin Laden. Abdullah Awad bin Laden will invest some of their money in a BMI real estate project. While their bin Laden family ties are intriguing, neither have been accused of any knowing connections to terrorist financing. [Washington Post, 4/19/2004]
bullet Mousa Abu Marzouk. He has identified himself as a top leader of Hamas. The US declares him a terrorist in 1995 (see July 5, 1995-May 1997). BMI makes at least two transactions with Marzouk after he is declared a terrorist. [Wall Street Journal, 9/15/2003]
bullet Yassin al-Qadi, a Saudi multimillionaire. His lawyers will later claim he has no terrorism ties and had only a passing involvement with BMI and liquidated his investment in it in 1996. However, another company operating from the same office as BMI is called Kadi International Inc. and lists its president as al-Qadi. Al-Qadi is also a major investor in the suspect computer company Ptech (see 1994; 1999-After October 12, 2001). Al-Qadi and BMI head Biheiri have financial dealings with Yaqub Mirza, a Pakistani who manages a group of Islamic charities in Virginia known as the SAAR network (see July 29, 1983). These charities will be raided in March 2002 on suspicions of terrorism ties (see March 20, 2002). Shortly after 9/11, the US will officially declare al-Qadi a terrorist financier (see October 12, 2001). [Wall Street Journal, 9/15/2003]
bullet Saleh Kamel. BMI allegedly receives a $500,000 investment from the Dallah Al-Baraka banking conglomerate, which is headed by Kamel. For many years before 9/11, Omar al-Bayoumi, an associate of 9/11 hijackers Khalid Almihdhar and Nawaf Alhazmi, will receive a salary from Dallah, despite apparently doing no work. Some will accuse al-Bayoumi of involvement in funding the 9/11 plot, but that remains to been proven (see August 1994-July 2001). Kamel reportedly founded a Sudanese Islamic bank which housed accounts for senior al-Qaeda operatives. He is a multi-billionaire heavily involved in promoting Islam, and his name appears on the Golden Chain, a list of early al-Qaeda supporters (see 1988-1989). He denies supporting terrorism. [US Congress, 10/22/2003; Wall Street Journal, 6/21/2004]
bullet The Kuwait Finance House. According to Clarke, this organization is alleged to be a BMI investor and the “financial arm of the Muslim Brotherhood in Kuwait. Several al-Qaeda operatives have allegedly been associated with the Kuwaiti Muslim Brotherhood, including Khalid Shaikh Mohammed, Suliman abu Ghaith, Wadih El-Hage, and Ramzi Yousef.” In 2003, an apparent successor entity to the Kuwait Finance House will be designated as a terrorist entity by the US. A lawyer for the Kuwait Finance House will later say the bank has never let its accounts be used for terrorism. [Wall Street Journal, 9/15/2003; US Congress, 10/22/2003; Wall Street Journal, 4/20/2005]
bullet Tarek Swaidan. He is a Kuwaiti, an associate of al-Qadi, and a leading member of the Kuwaiti branch of the Muslim Brotherhood. It is unknown if he has made any denials about his alleged associations. [Wall Street Journal, 9/15/2003]
bullet Abdurahman Alamoudi. For many years he runs the American Muslim Council, a lobby group founded by a top Muslim Brotherhood figure. US prosecutors say he also is in the Brotherhood, and has alleged ties to Hamas. In 2004, the US will sentence him to 23 years in prison for illegal dealings with Libya (see October 15, 2004). [Wall Street Journal, 6/21/2004; Washington Post, 10/16/2004]
bullet The International Islamic Relief Organization (IIRO) and the Muslim World League, closely connected Saudi charities suspected of financing terrorism. They give BMI $3.7 million out of a $10 million endowment from unknown Saudi donors. The Financial Times will later note, “While it is not clear whether that money came from the Saudi government, [a 2003] affidavit quotes a CIA report that says the Muslim World League ‘is largely financed by the government of Saudi Arabia.’” Both organizations consistently deny any support of terrorism financing, but in early 2006 it will be reported that US officials continue to suspect them of such support (see January 15, 2006). [Financial Times, 8/21/2003] In 1992, a branch of the IIRO gives $2.1 million to BMI Inc. to invest in real estate. The money disappears from BMI’s books. In October 1999, BMI goes defunct after it is unable to repay this money to the IIRO branch. The IIRO branch gives BMI the rest of the $3.7 million between 1992 and 1998. BMI will use the money to buy real estate (see 1992). Eventually, some of this money will be given to Hamas operatives in the West Bank and spent on violent actions against Israel. This will eventually lead to legal action in the US and a seizure of some of the money. [Wall Street Journal, 11/26/2002; Washington Post, 8/20/2003; Washington Times, 3/26/2004; Washington Post, 4/19/2004] By 1992, BMI has projected revenues in excess of $25 million, based largely on their real estate investments in the US. [US Congress, 10/22/2003] In early 1999, months before BMI goes defunct, the FBI hears evidence potentially tying BMI to the 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998), but an investigation into this will not be pursued (see Early 1999). It should be noted that BMI had many investors, and presumably most BMI investors would have had no suspicions that their money might be used to fund terrorism or other types of violence.

Entity Tags: Iman bin Laden, International Islamic Relief Organization, Muslim World League, Kuwait Finance House, Nur bin Laden, Mousa Abu Marzouk, Abdurahman Alamoudi, Richard A. Clarke, Soliman Biheiri, Abdullah Awad bin Laden, Yousuf Abdullah Al-Qaradawi, Tarek Swaidan, Yassin al-Qadi, Saleh Abdullah Kamel

Timeline Tags: Complete 911 Timeline

The FBI’s sketch of the as-yet-unidentified ‘Unabomber.’The FBI’s sketch of the as-yet-unidentified ‘Unabomber.’ [Source: FBI]Gary Wright, the owner of CAAMS Inc., a Salt Lake City, Utah, computer shop, is injured when he attempts to remove a “road hazard” at the rear entrance of his shop. The “hazard” is actually a bomb, similar to one that killed another computer shop owner in Sacramento, California, over a year ago (see December 11, 1985). A secretary saw a man wearing a hooded sweatshirt and sunglasses leave the bag containing the bomb; she becomes the first eyewitness in what will later become the “Unabomber” investigation (see April 3, 1996). [BBC, 11/12/1987; Washington Post, 1998] The “Unabomber” is improving his skills; this bomb contains a more sophisticated triggering device than earlier constructions. [World of Forensic Science, 1/1/2005] Almost six years ago, Theodore “Ted” Kaczynski, the so-called “Unabomber,” planted another bomb in Salt Lake City (see October 8, 1981). But for now, the FBI has no knowledge of Kaczynski’s identity. It has, however, found what it calls “an absolute link” between the Wright bombing and the “Unabom” serial bombings that have been going on since 1978 (see May 25-26, 1978). Federal bomb expert Ron Wolters says the bombs in the different cases display a high level of similarity. Police describe the as-yet-unidentified bomber as a disgruntled academician or computer worker. [Chicago Sun-Times, 2/24/1987]

Entity Tags: CAAMS Inc, Theodore J. (“Ted”) Kaczynski, Ron Wolters, Gary Wright

Timeline Tags: US Domestic Terrorism

USS ‘Stark’ after being struck by Iraqi missile.USS ‘Stark’ after being struck by Iraqi missile. [Source: US Department of Defense]Two missiles from an Iraqi F-1 Mirage warplane strike the USS Stark, killing 37 of the sailors aboard. The frigate is a member of a US naval task force sent to the Persian Gulf to keep the Gulf open for shipping during the Iran-Iraq War. The Iraqi fighter locks weapons on the Stark three minutes before firing; the commander of the ship refuses to issue the standard “back off” warning to the Iraqi pilot. The first missile bores deep into the ship but fails to explode; the second missile explodes, incinerating the crew’s quarters, the radar room, and the combat information center. The ship burns for two days. [PBS, 2000; Peniston, 2006, pp. 61-63]
Diverting Blame onto Iran - The Pentagon later claims that the Stark indeed warned the fighter pilot not to approach. Iraq quickly apologizes for the attack. The US continues to patrol the Gulf, and continues its program of re-registering Kuwaiti oil tankers under the American flag in order to protect them from Iranian attacks. A diplomat says that given the scale of casualties in the incident, the American public is going to start asking “what the hell is the US doing in the Gulf?” Iran calls the attack on the Stark a “divine blessing.” US officials quickly divert blame for the attack on Iran, accepting an Iraqi explanation that the fighter pilot must have mistaken the US warship for an Iranian vessel. [Guardian, 5/19/1987]
Excusing Iraq, Punishing 'Stark' Commander - “We’ve never considered them hostile at all,” says President Reagan in regards to Iraq’s military. “They’ve never been in any way hostile.… And the villain in the piece is Iran.” Senator John Warner (R-VA), a former secretary of the Navy, denounces Iran as “a belligerent that knows no rules, no morals.” Fellow senator John Glenn (D-OH) calls Iran “the sponsor of terrorism and the hijacker of airliners.” Iraq later determines that the Stark was in its so-called “forbidden zone,” and refuses to produce the pilot for any disciplinary action. The only punishment for the attack is suffered by the captain of the Stark, Glenn Brindel, who is relieved of his command, and his executive officer, who is punished for “dereliction of duty.” [TomDispatch (.com), 5/3/2007]
Lawsuits Dismissed - Two wrongful death lawsuits arising from the attacks will later be dismissed due to the “state secrets” privilege (see June 13, 1991 and September 16, 1992).

Entity Tags: US Department of Defense, US Department of the Navy, Glenn Brindel, John Glenn, John W. Warner, Ronald Reagan

Timeline Tags: US-Iraq 1980s

Francois Genoud (left) and Ahmad Huber, a.k.a. Albert Huber (right).Francois Genoud (left) and Ahmad Huber, a.k.a. Albert Huber (right). [Source: Seuil, AIJAC]Leaders of the Muslim Brotherhood found the Al Taqwa Bank. This bank will later be accused of being the largest financial supporter of al-Qaeda, Hamas, the GIA in Algeria, and other organizations officially designated by the US as groups that sponsor terrorism. For instance, the Treasury Department will later claim that $60 million in funding for Hamas will pass through Al Taqwa in 1997. The bank is mostly based on both sides of the border between Swizterland and Italy, but important branches are established in Liechtenstein and the Bahamas as offshore tax havens. [US Department of the Treasury, 8/29/2002] Newsweek will explain, “Al Taqwa, which means ‘Fear of God,’ was launched… by leaders of the Muslim Brotherhood, a secret society devoted to the creation of a worldwide Islamic government. The Brotherhood wanted to create a financial institution in which devout Muslims could invest their money. It would operate under strict Islamic law, which prohibits banks from charging interest. But investigators believe the convoluted structure of Al Taqwa made it easy to use as a money-laundering mechanism.… The [central] operation consisted of four men working at computers in a small apartment in Lugano, Switzerland. Lugano, which sits near the Italian border, is a kind of Alpine Tijuana, well known as a haven for tax evaders and money launderers.” [Newsweek, 3/18/2002] Reportedly, in 1995, Italian investigators will tell a Swiss prosecutor that Al Taqwa and related entities comprise “the most important financial structure of the Muslim Brotherhood and Islamic terrorist organizations.” [Salon, 3/15/2002] Six members of the bin Laden family are among the original contributors to the Bahamas branch. [Wall Street Journal, 12/17/2001] A number of the bank’s leaders have ties to Nazism or fascism. For instance, when board chairman Youssef Nada was a young man, he allegedly worked with both the armed branch of the Muslim Brotherhood and Nazi Germany military intelligence. Ahmad Huber, a Swiss convert to Islam previously known as Albert Huber, is both a director of the bank and an open neo-Nazi. He proudly displays portraits of Adolf Hitler and Osama bin Laden next to each other in his house. [Washington Post, 4/29/2002; Asia Times, 11/8/2002] According to a reporter who will interview him in 1995, Huber’s office is adorned with portraits of Hitler, Nazi leader Heinrich Himmler, and Islamic militants. [Boston Herald, 11/8/2001] Huber will spend decades attempting to forge links between the neo-Nazi movement and the radical Muslim movement, speaking to and networking with both groups. He will be quoted around 2001 saying that the al-Qaeda leaders he met in January 2001 are “very discreet, well-educated, and very intelligent people.”(see Late January 2001). [Financial Times, 11/8/2001; Playboy, 2/1/2002] The founder of Al Taqwa appears to be Francois Genoud, who will die in 1996. Genoud is a Swiss lawyer who funded the Nazis and served as a Nazi agent during World War II. After the war, he funded the secret Odessa organization, which enabled many notorious Nazi fugitives to escape to safe havens in South America and elsewhere. Authorities believe that Genoud uses Al Taqwa to fund international militants like Carlos the Jackal and bin Laden. He also paid for the legal expenses of ex-Nazis such as Klaus Barbie and Adolf Eichmann. Many Muslim radicals and neo-Nazis share a strong hatred for Jews and the United States. [San Francisco Chronicle, 3/12/2002] Al Taqwa will be shut down shortly after 9/11 for its support of al-Qaeda, Hamas, and other groups officially designated as terrorist organizations (see November 7, 2001).

Entity Tags: Al Taqwa Bank, Muslim Brotherhood

Timeline Tags: Complete 911 Timeline

Entrance to Fort Riley, Kansas.Entrance to Fort Riley, Kansas. [Source: US Military (.com)]Terry Nichols, a 33-year-old Michigan farmer and house husband described as “aimless” by his wife Lana, joins the US Army in Detroit. He is the oldest recruit in his platoon and his fellow recruits call him “Grandpa.” During basic training at Fort Benning, Georgia, Nichols meets fellow recruits Timothy McVeigh (see 1987-1988), who joined the Army in Buffalo, New York, and Arizona native Michael Fortier. All three share an interest in survivalism, guns, and hating the government, particularly Nichols and McVeigh; unit member Robin Littleton later recalls, “Terry and Tim in boot camp went together like magnets.” For McVeigh, Nichols is like the older brother he never had; for Nichols, he enjoys taking McVeigh under his wing. Nichols also tells McVeigh about using ammonium nitrate to make explosives he and his family used to blow up tree stumps on the farm. The three are members of what the Army calls a “Cohort,” or Cohesion Operation Readiness and Training unit, which generally keeps soldiers together in the same unit from boot camp all the way through final deployment. It is in the Army that McVeigh and Nichols become enamored of the novel The Turner Diaries (see 1978), which depicts a United States racially “cleansed” of minorities and other “undesirables” (McVeigh is already familiar with the novel—see 1987-1988). All three are sent to the 11 Bravo Infantry division in Fort Riley, Kansas, where they are finally separated into different companies; McVeigh goes to tank school, where he learns to operate a Bradley fighting vehicle as well as becoming an outstanding marksman. [New York Times, 5/4/1995; New York Times, 5/28/1995; Stickney, 1996, pp. 91-95; PBS Frontline, 1/22/1996; Serrano, 1998, pp. 30; Nicole Nichols, 2003] McVeigh later says he joined the Army because he was disillusioned with the “I am better than you because I have more money” mindset some people have, and because he was taken with the Army’s advertisement that claimed, “We do more before 9 a.m. than most people do all day.” [PBS Frontline, 1/22/1996] Fellow unit member Specialist Ted Thorne will later recall: “Tim and I both considered ourselves career soldiers. We were going to stay in for the 20-plus years, hopefully make sergeant major. It was the big picture of retirement.” [Serrano, 1998, pp. 31]
Nichols Leaves Army, Tells of Plans to Form 'Own Military Organization' - In the spring of 1989, Nichols, who planned on making a career of military service, leaves the Army due to issues with an impending divorce and child care, but his friendship with McVeigh persists. Fellow soldier Glen Edwards will later say that he found Nichols’s choice to serve in the Army unusual, considering his virulent hatred of the US government: “He said the government made it impossible for him to make a living as a farmer. I thought it strange that a 32-year-old man would be complaining about the government, yet was now employed by the government. Nichols told me he signed up to pull his 20 years and get a retirement pension.” Before Nichols leaves, he tells Edwards that he has plans for the future, and Edwards is welcome to join in. Edwards will later recall, “He told me he would be coming back to Fort Riley to start his own military organization” with McVeigh and Fortier. “He said he could get any kind of weapon and any equipment he wanted. I can’t remember the name of his organization, but he seemed pretty serious about it.” [New York Times, 5/28/1995; Stickney, 1996, pp. 96, 101]
McVeigh Continues Army Career, Described as 'Strange,' 'Racist,' but 'Perfect Soldier' - McVeigh does not leave the Army so quickly. He achieves the rank of sergeant and becomes something of a “model soldier.” He plans on becoming an Army Ranger. However, few get to know him well; only his closest friends, such as Nichols, know of his passion for firearms, his deep-seated racism, or his hatred for the government. McVeigh does not see Nichols during the rest of his Army stint, but keeps in touch through letters and phone calls. Friends and fellow soldiers will describe McVeigh as a man who attempts to be the “perfect soldier,” but who becomes increasingly isolated during his Army career; the New York Times will describe him as “retreating into a spit-and-polish persona that did not admit nights away from the barracks or close friendships, even though he was in a ‘Cohort’ unit that kept nearly all the personnel together from basic training through discharge.” His friends and colleagues will recall him as being “strange and uncommunicative” and “coldly robotic,” and someone who often gives the least desirable assignments to African-American subordinates, calling them “inferior” and using racial slurs. An infantryman in McVeigh’s unit, Marion “Fritz” Curnutte, will later recall: “He played the military 24 hours a day, seven days a week. All of us thought it was silly. When they’d call for down time, we’d rest, and he’d throw on a ruck sack and walk around the post with it.” A fellow soldier, Todd Regier, will call McVeigh an exemplary soldier, saying: “As far as soldiering, he never did anything wrong. He was always on time. He never got into trouble. He was perfect. I thought he would stay in the Army all his life. He was always volunteering for stuff that the rest of us wouldn’t want to do, guard duties, classes on the weekend.” Sergeant Charles Johnson will later recall, “He was what we call high-speed and highly motivated.” McVeigh also subscribes to survivalist magazines and other right-wing publications, such as Guns & Ammo and his favorite, Soldier of Fortune (SoF), and keeps an arsenal of weapons in his home (see November 1991 - Summer 1992). Regier will later tell a reporter: “He was real different. Kind of cold. He wasn’t enemies with anyone. He was kind of almost like a robot. He never had a date when I knew him in the Army. I never saw him at a club. I never saw him drinking. He never had good friends. He was a robot. Everything was for a purpose.” [New York Times, 5/4/1995; Stickney, 1996, pp. 86; Serrano, 1998, pp. 30; Nicole Nichols, 2003] McVeigh is taken with the increasing number of anti-government articles and advertisements in SoF, particularly the ones warning about what it calls the impending government imposition of martial law and tyranny, and those telling readers how to build bombs and other items to use in “defending” themselves from government aggression. [Serrano, 1998, pp. 27-28] McVeigh is not entirely “by the book”; he knows his friend Michael Fortier is doing drugs, but does not report him to their superior officers. [PBS Frontline, 1/22/1996] McVeigh is promoted to sergeant faster than his colleagues; this is when he begins assigning the undesirable tasks to the four or five black specialists in the group, tasks that would normally be performed by privates. “It was well known, pretty much throughout the platoon, that he was making the black specialists do that work,” Regier will recall. “He was a racist. When he talked he’d mention those words, like n_gger. You pretty much knew he was a racist.” The black soldiers complain to a company commander, earning McVeigh a reprimand. Sergeant Anthony Thigpen will later confirm Regier’s account, adding that McVeigh generally refuses to socialize with African-Americans, and only reluctantly takes part in company functions that include non-whites. Captain Terry Guild will later say McVeigh’s entire company has problems with racial polarization, “[a]nd his platoon had some of the most serious race problems. It was pretty bad.” In April 1989, McVeigh is sent to Germany for two weeks for a military “change-up program.” While there, he is awarded the German equivalent of the expert infantryman’s badge. In November 1989, he goes home for Thanksgiving with Fortier, and meets Fortier’s mother Irene. In late 1990, McVeigh signs a four-year reenlistment agreement with the Army. [New York Times, 5/4/1995]
McVeigh Goes on to Serve in Persian Gulf War - McVeigh will serve two tours of duty in the Persian Gulf War, serving honorably and winning medals for his service (see January - March 1991 and After). Nichols and McVeigh will later be convicted of planning and executing the Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995).

Entity Tags: Ted Thorne, Terry Guild, Todd Regier, Terry Lynn Nichols, Robin Littleton, Michael Joseph Fortier, Charles Johnson, Glen Edwards, Marion (“Fritz”) Curnutte, Anthony Thigpen, Timothy James McVeigh, US Department of the Army

Timeline Tags: US Domestic Terrorism

Strom Thurmond.Strom Thurmond. [Source: US Government]Former Lockheed software manager Margaret Newsham, who worked at the Menwith Hill facility of the NSA’s Echelon satellite surveillance operation in 1979, says she heard a real-time phone intercept of conversations involving senator Strom Thurmond (R-SC). She was shocked, she recalls, because she thought only foreign communications were being monitored. Newsham, who was fired from Lockheed after she filed a whistleblower lawsuit alleging fraud and waste, tells the chairman of the House Intelligence Committee, Louis Stokes (D-OH), of the overheard conversations. In July, Capital Hill staffers will leak the story to the Cleveland Plain Dealer. Thurmond says he doesn’t believe Newsham’s story, but his office admits that it has previously received reports that Thurmond had been a target of NSA surveillance. Thurmond will decline to press for an investigation, and the reason for the surveillance has never been revealed. [CBS News, 2/27/2000; Patrick S. Poole, 8/15/2000]

Entity Tags: Strom Thurmond, National Security Agency, House Intelligence Committee, Louis Stokes, Echelon, Cleveland Plain Dealer, Lockheed Martin Corporation, Margaret Newsham

Timeline Tags: Civil Liberties

President Ronald Reagan signs a directive that details the US government’s plan for dealing with national emergencies, including a nuclear attack against the country. Executive Order 12656, “Assignment of Emergency Preparedness Responsibilities,” sets out the specific responsibilities of federal departments and agencies in national security emergencies. [US President, 11/18/1988] It deals with the nation’s Continuity of Government (COG) plan, which would ensure the federal government continued to function should such an emergency occur. [Washington Post, 3/1/2002; Atlantic Monthly, 3/2004] The order states, “The policy of the United States is to have sufficient capabilities at all levels of government to meet essential defense and civilian needs during any national security emergency.” It defines a “national security emergency” as “any occurrence, including natural disaster, military attack, technological emergency, or other emergency, that seriously degrades or seriously threatens the national security of the United States.” The order directs the head of every federal department and agency to “ensure the continuity of essential functions” during such an emergency by, among other things, “providing for succession to office and emergency delegation of authority.” According to Executive Order 12656, the National Security Council is “the principal forum for consideration of national security emergency preparedness policy,” and the director of the Federal Emergency Management Agency (FEMA) is to “assist in the implementation of national security emergency preparedness policy by coordinating with the other federal departments and agencies and with State and local governments.” [US President, 11/18/1988] The COG plan this directive deals with will be activated for the first time on 9/11, in response to the terrorist attacks that day (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). [Washington Post, 3/1/2002; ABC News, 4/25/2004] Author Peter Dale Scott will later comment that, by applying the COG plan to “any national security emergency,” Executive Order 12656 means that the attacks of 9/11 will meet the requirements for the plan to be put into action. [Scott, 2007, pp. 185-186] In fact, a presidential directive in 1998 will update the COG plan specifically to deal with the threat posed by terrorists (see Early 1998 and October 21, 1998). [Clarke, 2004, pp. 166-167 and 170; Washington Post, 6/4/2006]

Entity Tags: Ronald Reagan

Timeline Tags: Complete 911 Timeline, 9/11 Timeline, Civil Liberties

James Nichols, a Michigan farmer, anti-government white separatist, and the brother of Terry Nichols (see March 24, 1988 - Late 1990), formulates a plan to use a “megabomb” to destroy an Oklahoma City federal building; an unnamed FBI informant will later tell the FBI that James Nichols specifically indicates the Murrah Federal Building. Nichols, who says he is upset over the US’s “role” in the terrorist bombing of Pan Am Flight 103, shares the plan with the informant, who will swear to the information in 1995, after James’s brother Terry Nichols is arrested for helping destroy the Murrah Building (see 8:35 a.m. - 9:02 a.m. April 19, 1995). “[James] Nichols… made a specific reference to a federal building in Oklahoma City and began looking through the toolshed and workbench for a newspaper clipping depicting the Oklahoma City building,” the informant will say, according to an FBI affidavit. Nichols is unable to find the newspaper clipping, the informant will say, and instead draws a diagram remarkably similar to the Murrah Building. Nichols “later located a newspaper article containing a reference to the Federal Building in Oklahoma City and showed it” to the informer, the affidavit says. The informer is a regular visitor to the Nichols farm. [New York Times, 6/13/1995; Nicole Nichols, 2003] James Nichols routinely stamps US currency with red ink in a protest against the government, and calls his neighbors “sheeple” for obeying authority “like livestock.” A neighbor, Dan Stomber, will recall Nichols criticizing him and others for using drivers’ licences and Social Security cards, and for voting and paying taxes. “He said we were all puppets and sheeple,” Stomber will tell a reporter. “That was the first time I ever heard that word.” Stomber will not recall Nichols discussing any plans to bomb any federal buildings. [New York Times, 4/24/1995] After the Oklahoma City bombing, a friend of Nichols, an Indiana seed dealer named Dave Shafer, will tell authorities that Nichols showed him a diagram of a building remarkably similar to the Murrah Building, still under construction at the time, and said that building would be an excellent target. Shafer will say that he thought Nichols was joking. [Serrano, 1998, pp. 110] It is possible that Shafer and the unnamed FBI informant are the same person. Five years ago, a group of white supremacists had conceived of a plan to destroy the Murrah Building (see 1983).

Entity Tags: Terry Lynn Nichols, Murrah Federal Building, Federal Bureau of Investigation, Dave Shafer, James Nichols, Dan Stomber

Timeline Tags: US Domestic Terrorism

Robert Morgenthau.Robert Morgenthau. [Source: Robert Maass / Corbis]In the late 1980s, Osama bin Laden and his mentor Abdullah Azzam are running a charity front called Maktab al-Khidamat (MAK)/Al-Kifah in Peshawar, Pakistan, and it has an important branch in Brooklyn, New York, called the Al-Kifah Refugee Center that is sending money and recruits to fight in Afghanistan. The CIA apparently helps the Al-Kifah Brooklyn office send up to 200 people from the US to fight in Afghanistan (see 1986-1993). Many of them are US citizens. Zalmay Khalilzad, a State Department Afghan specialist who will go on to become a prominent neoconservative, will later deny knowing of any Arab-Americans fighting with the mujaheddin. But one anonymous Congressional aide will recall occasional mentions of Al-Kifah Refugee Center or its head Mustafa Shalabi by some of the most radical mujaheddin. He will say: “Among that cabal, the extreme militant fringes, Shalabi was known.… [T]hey were asking to talk to him so he could organize some particular assistance.” The Neutrality Act prevents US citizens from fighting against countries not at war with the US, but the New York Times will note, “Yet there is no sign that a criminal investigation ever took place even though federal agents had come across broad hints about the center’s activities when they investigated the [Meir] Kahane assassination [in 1990] (see November 5, 1990) and the slaying of Mr. Shalabi [in 1991]” (see (February 28, 1991)). Kahane’s assassin, El Sayyid Nosair, was one of Shalabi’s assistants. [New York Times, 4/11/1993] Apparently the CIA’s ties to the Al-Kifah Refugee Center prevent other US agencies from investigating it, even after the 1993 World Trade Center bombing, when all of the bombers are found to have been tied to the center. While Al-Kifah closes itself down shortly after the WTC bombing, it immediately reopens in Boston under a different name and continues to publish the same newsletter and post from the same website (see April 1993-Mid-2003). Robert I. Friedman, writing for New York magazine, will comment, “[W]hen the fanatical fervor [the CIA] whipped up leads to unintended consequences—the assassination of a Jewish militant leader in Manhattan, the bombing of the World Trade Center, a terror conspiracy to blow up the Holland and Lincoln Tunnels and other Manhattan landmarks—[the CIA tried] to discourage local law enforcement agencies and the FBI from looking into the matter too deeply.” After Nosair assassinates Kahane, the FBI tells District Attorney Robert Morgenthau that Nosair was a lone gunman, not part of a broader conspiracy. However, the FBI had truckloads of evidence connecting to Al-Kifah strongly suggesting otherwise that it does not closely investigate. The FBI also blocks him from tying Sheikh Omar Abdul-Rahman to the WTC bombing (see After February 26, 1993). Morgenthau will later speculate the CIA may have encouraged the FBI not to pursue any other leads. “The FBI lied to me,” he will say. “They’re supposed to untangle terrorist connections, but they can’t be trusted to do the job.” [New York Magazine, 3/17/1995] Counterterrorism expert Steven Emerson will call Al-Kifah “al-Qaeda’s operational headquarters in the United States.” [Emerson, 2006, pp. 436] In 1994, a secret internal CIA report will conclude that the agency is “partially culpable” for the WTC bombing because of its support for radicals connected to Al-Kifah. One CIA source will say, “By giving these people the funding that we did, a situation was created in which it could be safely argued that we bombed the World Trade Center” (see January 24, 1994). But even after 1994 there is little evidence that the links from Al-Kifah were carefully explored by any US government agency. For instance, the government will not freeze Al-Kifah’s funds until shortly after 9/11, long after it ceased to exist (see September 24, 2001).

Entity Tags: Zalmay M. Khalilzad, Federal Bureau of Investigation, Maktab al-Khidamat, Al-Kifah Refugee Center, Central Intelligence Agency, El Sayyid Nosair, Mustafa Shalabi, Robert Morgenthau

Timeline Tags: Complete 911 Timeline

Colin Powell.
Colin Powell. [Source: US State Department]The Berlin Wall begins to fall in East Germany, signifying the end of the Soviet Union as a superpower. Just six days later, Joint Chiefs of Staff Chairman Colin Powell will present a new strategy document to President George H. W. Bush, proposing that the US shift its strategic focus from countering Soviet attempts at world dominance to ensuring US world dominance. Bush will accept this plan in a public speech, with slight modifications, on August 2, 1990: the same day Iraq invades Kuwait. In early 1992 (see March 8, 1992), Powell, counter to his usual public dove persona, will tell members of Congress that the US requires “sufficient power” to “deter any challenger from ever dreaming of challenging us on the world stage.” He will say, “I want to be the bully on the block.” Powell’s early ideas of global hegemony will be formalized by others in a 1992 policy document and finally realized as policy when George W. Bush becomes president in 2001. [Harper's, 10/2002]

Entity Tags: Soviet Union, Colin Powell, George Herbert Walker Bush

Timeline Tags: Complete 911 Timeline

Sheikh Abdullah Azzam.Sheikh Abdullah Azzam. [Source: CNN]Osama bin Laden’s mentor Sheikh Abdullah Azzam is killed by a car bomb in Afghanistan. The killing will never be solved. Azzam has no shortage of enemies. Suspects will include the Mossad, CIA, Afghan warlord Gulbuddin Hekmatyar, the ISI, and bin Laden. The reason bin Laden will be suspected is because he and Azzam were increasingly at odds over what approach to take since the Soviet Union had been driven from Afghanistan earlier in the year (see February 15, 1989). [Slate, 4/16/2002; Coll, 2004, pp. 204] In 1998, Mohammed Saddiq Odeh will be arrested and later convicted for a role in the 1998 African embassy bombings. He reportedly will tell US interrogators that bin Laden “personally ordered the killing of Azzam because he suspected his former mentor had ties with the CIA.” However, it is not known if Odeh was just passing on a rumor. [Gunaratna, 2003, pp. 32] Regardless, in the wake of Azzam’s death, bin Laden will take control of Azzam’s recruiting and support network, Maktab al-Khidamat (MAK)/Al-Kifah, and merge it with al-Qaeda, which was formed the year before (see August 11-20, 1988). [Slate, 4/16/2002; Coll, 2004, pp. 204]

Entity Tags: Mohammed Saddiq Odeh, Osama bin Laden, Al-Qaeda, Abdullah Azzam, Maktab al-Khidamat

Timeline Tags: Complete 911 Timeline, War in Afghanistan

A lawsuit against the FBI’s investigation of a sixth-grade boy and his school project to create an “encyclopedia of the world” is stopped when an appeals court rules that the agency is shielded by the “state secrets” privilege (see March 9, 1953). Unable to secure information from the FBI as to why it investigated him, the child had therefore “failed to sustain his burden of proof [and] the cause of action was properly dismissed.” [Siegel, 2008, pp. 197]

Entity Tags: Federal Bureau of Investigation

Timeline Tags: Civil Liberties

Saudi multimillionaire Yassin al-Qadi will say in an interview shortly after 9/11, “I have also met with US Vice President and former Secretary of Defense Dick Cheney in Jeddah [Saudi Arabia] when he came for a lecture organized by the Dallah Group. I spoke to him for a long time and we still have cordial relations.” The US had named al-Qadi a supporter of terrorism and frozen his assets two days before (see October 12, 2001). Oussama Ziade, CEO of Ptech, a US computer company that al-Qadi had invested in (see 1994) and that will be raided for suspected terrorism ties (see December 5, 2002), later will claim that al-Qadi “talked very highly of his relationship” with Cheney. Ziade will claim he only knew al-Qadi for a few years starting around 1994, so presumably the contact between al-Qadi and Cheney happens during the mid-1990s. A newspaper will report later that when a Cheney spokeswoman is asked about his possible ties to al-Qadi, she replies that “she had no reason to believe the vice president had met with al-Qadi”. Al-Qadi claims to be a respected businessman who met other important leaders such as ex-President Jimmy Carter. [Arab News, 10/14/2001; Associated Press, 1/3/2003; Computerworld, 1/17/2003] The US will declare al-Qadi a terrorism financier shortly after 9/11 (see October 12, 2001), and the Dallah Group will be accused of funding al-Qaeda (see November 22, 2002).

Entity Tags: Yassin al-Qadi, Dallah Al-Baraka, Richard (“Dick”) Cheney

Timeline Tags: Complete 911 Timeline

In 1991, there is a surge in the number of US soldiers adhering to Islam, due to a conversion program sponsored by the Saudi government (see March-September 1991). Islamic activist Abdurahman Alamoudi approaches the US military and suggests they create a program for Muslim chaplains, similar to a longstanding program for Christian chaplains. His proposal is accepted and in 1991 he creates the American Muslim Armed Forces and Veterans Affairs Council (AMAFVAC) with the stated purpose to “certify Muslim chaplains hired by the military.” In 1993, the Defense Department certifies it as one of two organizations to select and endorse Muslim chaplains. The other is the Graduate School of Islamic and Social Sciences (GSISS). [US Congress, Senate, Committee on the Judiciary, 10/14/2003; Wall Street Journal, 12/3/2003] That group is run by prominent Islamic scholar Taha Jabir Al-Alwani. Most of the roughly one dozen Muslim chaplains in the US military are educated there. In 2002, the US government searches the school and Al-Alwani’s home as part of a raid on the SAAR network (see March 20, 2002). He appears to also be named as an unindicted coconspirator in the Sami al-Arian trial. Counterterrorism expert Rita Katz says Al-Alwani is a “person who supports and funnels money to terrorist organizations,” but Al-Alwani denies all terrorism ties and has not been charged with any crime. [St. Petersburg Times, 3/27/2003] Most Muslim chaplains trained at GSISS then receive an official endorsement from Alamoudi’s AMAFVAC organization. US intelligence will learn in early 1994 that Alamoudi has ties to bin Laden (see Shortly After March 1994). [US Congress, Senate, Committee on the Judiciary, 10/14/2003] In 1996, counterterrorism expert Steven Emerson will warn in a Wall Street Journal editorial that Alamoudi openly supports Hamas, even after the US government officially designated it a terrorist organization (see March 13, 1996). [Wall Street Journal, 3/13/1996] But Alamoudi will work for the Defense Department until 1998 on an unpaid basis to nominate and to vet Muslim chaplain candidates. After that, he will give the task to others in his AMAFVAC organization. [US Congress, Senate, Committee on the Judiciary, 10/14/2003] Furthermore, Senator Charles Schumer (D-NY) will later allege the US the military allowed Muslim chaplains to travel to the Middle East on funds provided by the Muslim World League, which has been linked to al-Qaeda (see October 12, 2001). Senator Jon Kyl (R-AZ) will later comment, “It is remarkable that people who have known connections to terrorism are the only people to approve these chaplains.” [US News and World Report, 10/27/2003] In late 2003, Alamoudi will be arrested and later sentenced to 23 years in prison for terrorism-related crimes. The US military will announce around the same time that it is reviewing and overhauling its Muslim chaplain program. [US News and World Report, 10/27/2003]

Entity Tags: Taha Jabir Al-Alwani, Steven Emerson, US Department of Defense, Muslim World League, Graduate School of Islamic and Social Sciences, American Muslim Armed Forces and Veterans Affairs Council, Abdurahman Alamoudi, Rita Katz, Charles Schumer, Jon Kyl

Timeline Tags: Complete 911 Timeline

Bilal Philips.Bilal Philips. [Source: Lightuponlight.com]Shortly after the end of fighting in the US-led Persian Gulf war against Iraq, the US allows the Saudi government to conduct a massive program to convert US soldiers still stationed in Saudi Arabia (see March 1991) to Islam. Huge tents are erected near the barracks of US troops and Saudi imams lecture the soldiers about Islam and attempt to convert them. Within months, about 1,000 soldiers, and perhaps as many as 3,000, convert to Islam. Some US officials express concern about the aggressive conversion effort and the long term implications it may have, but the program is not stopped. Radical imam Bilal Philips helps lead the conversion effort. He will later explain that a special team of fluent English speakers, some trained in psychology, was amply paid by the Saudi government to convert the soldiers. Converts had their pilgrimages to Islamic holy cities paid for and Muslim imams were assigned to follow up with them when they returned to the US. Philips is openly hostile to the US, saying such things as, “Western culture led by the United States is an enemy of Islam.” He will later note that some of his converts went to fight in Bosnia and others were the subject of terrorism probes in the US. [US Congress, Senate, Committee on the Judiciary, 10/14/2003; Washington Post, 11/2/2003] Philips will work with the Saudi government and one of the “Landmarks” bombers to send 14 Muslim ex-US soldiers to fight in Bosnia in 1992 (see December 1992). Listed as an unindicted coconspirator in the 1993 WTC bombing, he will be deported from the US in 2004. [Australian Associated Press, 4/4/2007]

Entity Tags: Saudi Arabia, Bilal Philips, US Department of the Army

Timeline Tags: Complete 911 Timeline

A US appellate court refuses to find a number of military contractors liable in the death of Earl Patton Ryals, who died with 36 of his fellow crewmen in the Iraqi attack on the USS Stark (see May 17, 1987 and After). Ryals’s estate claims that he and his fellows died in part because of negligence on the part of the contractors who designed, manufactured, tested, and marketed the weapons system on board the Stark, including the Phalanx anti-missile system. In turning down the estate’s claim, the court cites the government’s “state secrets” privilege (see March 9, 1953), saying that the facts of the issue could not be resolved without examining classified Navy documents. And even without this reason, the court rules, Ryals’s estate cannot see the documents because the case presents “a political question” about military decision-making that is not subject to judicial review. [Zuckerbraun v. General Dynamics Corp., 6/13/1991; Siegel, 2008, pp. 197-198] A year later, a similar case will be dismissed on the grounds that a trial might conceivably reveal “state secrets” (see September 16, 1992).

Entity Tags: Earl Patton Ryals, US Department of the Navy

Timeline Tags: Civil Liberties

July 5, 1991: Criminal BCCI Bank Is Shut Down

A Time magazine cover story on BCCI.A Time magazine cover story on BCCI. [Source: Time Magazine]The Bank of England shuts down Bank of Credit and Commerce International (BCCI), the largest Islamic bank in the world. Based in Pakistan, this bank financed numerous militant organizations and laundered money generated by illicit drug trafficking and other illegal activities, including arms trafficking. Bin Laden and many other militants had accounts there (see July 1991). [Detroit News, 9/30/2001] One money-laundering expert later claims, “BCCI did dirty work for every major terrorist service in the world.” [Los Angeles Times, 1/20/2002] Regulators shut down BCCI offices in dozens of countries and seize about $2 billion of the bank’s $20 billion in assets. BCCI is the seventh largest bank in the world. Sheikh Zayed bin Sultan Al Nahyan, the President of the United Arab Emirates (UAE), owns 77% of the bank at the time of its closing. He and the UAE government will end up losing about $8 billion. About 1.4 million people had deposits in the bank and will end up losing most of their money. [Levy and Scott-Clark, 2007, pp. 98-99] American and British governments were aware of its activities yet allowed the bank to operate for years. The Pakistani ISI had major connections to the bank. [Detroit News, 9/30/2001] The Bank of England is forced to close BCCI largely because of outside pressure. Beginning in February 1991, the mainstream media began reporting on BCCI’s criminal activities as more and more whistleblowers came forward. [Levy and Scott-Clark, 2007, pp. 95] However, as later State Department reports indicate, Pakistan remains a major drug trafficking and money-laundering center despite the bank’s closing. [Detroit News, 9/30/2001] Most of the bank’s top officials will escape prosecution, and remnants of the bank will continue operating in some countries under new names (see August 1991). A French intelligence report in 2001 will suggest the that Osama bin Laden will later build his financial network on the ruins of the BCCI network, oftentimes using former BCCI officials (see October 10, 2001). [Washington Post, 2/17/2002]

Entity Tags: Central Intelligence Agency, Osama bin Laden, Pakistan Directorate for Inter-Services Intelligence, Bank of Credit and Commerce International, Bank of England, Zayed bin Sultan Al Nahyan

Timeline Tags: Complete 911 Timeline

The Barnaby Knolls housing development, another Washington, DC, suburb funded by BMI Inc.The Barnaby Knolls housing development, another Washington, DC, suburb funded by BMI Inc. [Source: Susan Biddle/ Washington Post]BMI Inc., is a New Jersey-based Muslim investment firm. Some of the lead investors have been suspected of supporting terrorism and other types of violence in the Middle East (see 1986-October 1999). In 1992, a branch of the International Islamic Relief Organization (IIRO), a Saudi charity gives $2.1 million to BMI to invest in real estate. The money disappears from BMI’s books. By 1996, the CIA will secretly report that the IIRO supports terrorism financing in many locations around the world (see January 1996). In October 1999, BMI will go defunct after it is unable to repay this money to the IIRO branch. Additionally, the IIRO branch will give BMI over a million dollars between 1992 and 1998. BMI uses some money from the IIRO and other investors to build houses in Oxon Hill, a Washington, D.C., suburb. Many well to do Muslims invest in the housing development because BMI advertises itself as investing according to Islamic principles. Most of the small investors as well as the middle class Americans who buy the Oxon Hill houses do not realize that the profits from the property sales go to Mousa Abu Marzouk, a known leader of Hamas. Marzouk is said to make $250,000 in profits from BMI real estate deals in the early 1990s. In 2004, an Immigration and Customs Enforcement court declaration will assert that significant amounts of cash obtained from BMI by Marzouk is eventually used “in furtherance of Hamas terrorist operations.” [Wall Street Journal, 11/26/2002; Washington Post, 8/20/2003; Washington Times, 3/26/2004; Washington Post, 4/19/2004] By the end of 1992, BMI will have projected revenues in excess of $25 million based largely on their real estate investments in the US. [US Congress, 10/22/2003]

Entity Tags: Mousa Abu Marzouk, International Islamic Relief Organization, BMI Inc., Hamas

Timeline Tags: Complete 911 Timeline

Paul Wolfowitz.Paul Wolfowitz. [Source: Boston Globe]A draft of the Defense Department’s new post-Cold War strategy, the Defense Planning Guidance (DPG), causes a split among senior department officials and is criticized by the White House. The draft, prepared by defense officials Zalmay Khalilzad and Lewis “Scooter” Libby under the supervision of Undersecretary of Defense Paul Wolfowitz, says that the US must become the world’s single superpower and must take aggressive action to prevent competing nations—even allies such as Germany and Japan—from challenging US economic and military supremacy. [New York Times, 5/23/1992; Rupert and Solomon, 2005, pp. 122; Scoblic, 2008, pp. 165] The views in the document will become known informally as the “Wolfowitz Doctrine.” Neoconservative Ben Wattenberg will say that its core thesis is “to guard against the emergence of hostile regional superpowers, for example, Iraq or China.” He will add: “America is No. 1. We stand for something decent and important. That’s good for us and good for the world. That’s the way we want to keep it.” [AntiWar (.com), 8/24/2001] The document hails what it calls the “less visible” victory at the end of the Cold War, which it defines as “the integration of Germany and Japan into a US-led system of collective security and the creation of a democratic ‘zone of peace.’” It also asserts the importance of US nuclear weapons: “Our nuclear forces also provide an important deterrent hedge against the possibility of a revitalized or unforeseen global threat, while at the same time helping to deter third party use of weapons of mass destruction through the threat of retaliation.” [New York Times, 3/8/1992] The document states, “We must maintain the mechanism for deterring potential competitors from even aspiring to a larger regional or global role.” [New York Times, 3/8/1992] In 2007, author Craig Unger will write that deterring “potential competitors” from aspiring to a larger role means “punishing them before they can act.” [Unger, 2007, pp. 116]
US Not Interested in Long-Term Alliances - The document, which says the US cannot act as the world’s policeman, sees alliances among European nations such as Germany and France (see May 22, 1992) as a potential threat to US supremacy, and says that any future military alliances will be “ad hoc” affairs that will not last “beyond the crisis being confronted, and in many cases carrying only general agreement over the objectives to be accomplished.… [T]he sense that the world order is ultimately backed by the US will be an important stabilizing factor.” [New York Times, 5/23/1992] Conspicuously absent is any reference to the United Nations, what is most important is “the sense that the world order is ultimately backed by the US… the United States should be postured to act independently when collective action cannot be orchestrated” or in a crisis that demands quick response. [New York Times, 3/8/1992] Unger will write of Wolfowitz’s “ad hoc assemblies:” “Translation: in the future, the United States, if it liked, would go it alone.” [Unger, 2007, pp. 116]
Preventing the Rise of Any Global Power - “[W]e endeavor to prevent any hostile power from dominating a region whose resources would, under consolidated control, be sufficient to generate global power. These regions include Western Europe, East Asia, the territory of the former Soviet Union and Southwest Asia.” The document advocates “a unilateral US defense guarantee” to Eastern Europe, “preferably in cooperation with other NATO states,” and foresees use of American military power to preempt or punish use of nuclear, biological or chemical weapons, “even in conflicts that otherwise do not directly engage US interests.” [Washington Post, 3/11/1992]
Containing Post-Soviet Threats - The document says that the US’s primary goal is “to prevent the re-emergence of a new rival, either on the territory of the former Soviet Union or elsewhere, that poses a threat on the order of that posed formerly by the Soviet Union.” It adds, “This is a dominant consideration underlying the new regional defense strategy and requires that we endeavor to prevent any hostile power from dominating a region whose resources would, under consolidated control, be sufficient to general global power.” In the Middle East and Southwest Asia, “our overall objective is to remain the predominant outside power in the region and preserve US and Western access to the region’s oil.” The document also asserts that the US will act to restrain what it calls India’s “hegemonic aspirations” in South Asia [New York Times, 5/23/1992] , and warns of potential conflicts, perhaps requiring military intervention, arising in Cuba and China. “The US may be faced with the question of whether to take military steps to prevent the development or use of weapons of mass destruction,” it states, and notes that these steps may include pre-empting an impending attack with nuclear, chemical or biological weapons, “or punishing the attackers or threatening punishment of aggressors through a variety of means,” including attacks on the plants that manufacture such weapons. It advocates the construction of a new missile defense system to counter future threats from nuclear-armed nations. [New York Times, 3/8/1992]
Reflective of Cheney, Wolfowitz's Views - Senior Pentagon officials say that while the draft has not yet been approved by either Dick Cheney or Wolfowitz, both played substantial roles in its creation and endorse its views. “This is not the piano player in the whorehouse,” one official says.
Democrats Condemn Policy Proposal - Senator Robert Byrd (D-WV), an advocate of a reduction in military spending, calls the document “myopic, shallow and disappointing,” adding: “The basic thrust of the document seems to be this: We love being the sole remaining superpower in the world.” Senator Joseph Biden (D-DE) attacks what he sees as the document’s emphasis on unilateral military action, and ridicules it as “literally a Pax Americana.” Pentagon officials will dispute characterizations that the policy flatly rejects any idea of multilateral military alliances. One defense official says, “What is just dead wrong is this notion of a sole superpower dominating the rest of the world.” [New York Times, 3/8/1992; Washington Post, 3/11/1992]
Abandoned, Later Resurrected - Wolfowitz’s draft will be heavily revised and much of its language dropped in a later revision (see May 22, 1992) after being leaked to the media (see March 8, 1992). Cheney and Wolfowitz’s proposals will receive much more favorable treatment from the administration of George W. Bush (see August 21, 2001).

Entity Tags: Richard (“Dick”) Cheney, Paul Wolfowitz, Ben Wattenberg, Craig Unger, Robert C. Byrd, North Atlantic Treaty Organization, Bush administration (41), United Nations, Lewis (“Scooter”) Libby, Zalmay M. Khalilzad, US Department of Defense, Joseph Biden

Timeline Tags: US International Relations

The New York Times headline on March 8, 1992.The New York Times headline on March 8, 1992. [Source: Public domain]The Defense Planning Guidance, “a blueprint for the department’s spending priorities in the aftermath of the first Gulf War and the collapse of the Soviet Union,” is leaked to the New York Times. [New York Times, 3/8/1992; Newsday, 3/16/2003] The document will cause controversy, because it hasn’t yet been “scrubbed” to replace candid language with euphemisms. [New York Times, 3/10/1992; New York Times, 3/11/1992; Observer, 4/7/2002] The document argues that the US dominates the world as sole superpower, and to maintain that role, it “must maintain the mechanisms for deterring potential competitors from even aspiring to a larger regional or global role.” [New York Times, 3/8/1992; New York Times, 3/8/1992] As the Observer summarizes it: “America’s friends are potential enemies. They must be in a state of dependence and seek solutions to their problems in Washington.” [Observer, 4/7/2002] The document is mainly written by Paul Wolfowitz and I. Lewis “Scooter” Libby, who hold relatively low posts at this time, but become deputy defense secretary and Vice President Dick Cheney’s chief of staff, respectively, under President George W. Bush. [Newsday, 3/16/2003] The authors conspicuously avoid mention of collective security arrangements through the United Nations, instead suggesting the US “should expect future coalitions to be ad hoc assemblies, often not lasting beyond the crisis being confronted.” [New York Times, 3/8/1992] They call for “punishing” or “threatening punishment” against regional aggressors before they act. [Harper's, 10/2002] Interests to be defended preemptively include “access to vital raw materials, primarily Persian Gulf oil, proliferation of weapons of mass destruction and ballistic missiles, [and] threats to US citizens from terrorism.” The section describing US interests in the Middle East states that the “overall objective is to remain the predominant outside power in the region and preserve US and Western access to the region’s oil… deter further aggression in the region, foster regional stability, protect US nationals and property, and safeguard… access to international air and seaways.” [New York Times, 3/8/1992] Senator Lincoln Chafee (R-RI) will later say, “It is my opinion that [George W. Bush’s] plan for preemptive strikes was formed back at the end of the first Bush administration with that 1992 report.” [Newsday, 3/16/2003] In response to the controversy, the US will release an updated version of the document in May 1992, which stresses that the US will work with the United Nations and its allies. [Washington Post, 5/24/1992; Harper's, 10/2002]

Entity Tags: Lewis (“Scooter”) Libby, Lincoln Chafee, United States, Soviet Union, Paul Wolfowitz

Timeline Tags: Complete 911 Timeline, Events Leading to Iraq Invasion, US International Relations, Neoconservative Influence

Terry Nichols, a white supremacist member of the so-called “Patriot Movement” (see March 24, 1988 - Late 1990 and February 1992), renounces his US citizenship via a “nonresident alien” declaration to the Evergreen, Michigan, Township Clerk. “[T]here is total corruption in the entire political system,” Nichols says; “the entire political system from the local government on up thru and including the President of the United States, George Bush.” He adds: “I no longer am a citizen of the corrupt political corporate state of Michigan and the United States of America.… I follow the common laws, not the Uniform Commercial Codes, Michigan Statutes, etc., that are all colorable laws.… I lawfully, squarely challenge the fraudulent usurping octopus of jurisdiction/authority that does not apply to me. It is therefore now mandatory for… the so-called IRS, for example, to prove its jurisdiction.” He calls himself “a nonresident alien, non-foreigner, stranger to the current state of the forum.” Many will later detect language similar to that used by the Posse Comitatus movement (see 1969). Nichols has already sent his bank a letter revoking his signature on a credit card application, in an attempt to avoid paying $14,000 in credit card debt (another source will say Nichols owes closer to $40,000), writing in part: “I came across some information and in researching it further I have found that your credit, money, and contracts are all based upon fraud, etc., as stated in my revocation document.” The bank wins a lawsuit to compel Nichols to pay his debt; Nichols attempts to pay the debt with a fraudulent “Certified Fractional Reserve Check,” a scheme somewhat similar to the fraudulent checks advocated by the Montana Freemen (see 1993-1994), which the bank refuses to accept. During the court proceedings, Nichols, ordinarily an unusually quiet and shy man, repeatedly defies judicial orders to, among other things, come to the front of the courtroom, and at one point tells the judge, “I’m… a layman, a natural person, a freedom of common-law citizen under threat and duress and to challenge the jurisdiction of this court.” Circuit Judge Donald A. Teeple will later recall: “He was hollering in a loud voice. I informed him that if he didn’t keep quiet, I’d send him to jail. Then he decided to come around the rail” and participate quietly in the hearing. [New York Times, 4/23/1995; New York Times, 5/28/1995; PBS Frontline, 1/22/1996; New York Times, 12/24/1997; Southern Poverty Law Center, 6/2001; Nicole Nichols, 2003; Nicole Nichols, 2003] Both Terry Nichols and his brother James (see December 22 or 23, 1988) routinely stamp their paper money with the words “Discharged Without Prejudice,” a phrase indicating they do not accept its validity. The money-stamping is popular among Posse Comitatus members (see 1969) as they claim money not backed by gold lacks credibility. They also refuse to buy license plates for their vehicles or register them. James Nichols will also renounce his citizenship sometime later [Nicole Nichols, 2003; Nicole Nichols, 2003] , telling local courthouse officials that he is “no longer one of your citizens or a resident of your de facto government.” In mid-1992, Nichols will spend several days in jail for refusing to recognize a court’s authority to make him pay child support; after those days in a cell, he will agree to the court’s mandate. [New York Times, 4/24/1995; Serrano, 1998, pp. 109] Nichols will later be convicted for his role in the Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995 and December 23, 1997).

Entity Tags: Montana Freemen, James Nichols, Posse Comitatus, Donald A. Teeple, Terry Lynn Nichols

Timeline Tags: US Domestic Terrorism

Dick Cheney and Colin Powell.Dick Cheney and Colin Powell. [Source: Representational Pictures]The Defense Department issues a revised draft of its post-Cold War strategy, a “Defense Planning Guidance” (DPG) for the fiscal years 1994-1996, which abandons confrontational language from an earlier draft. The earlier draft said the US, as the world’s lone superpower, should prevent any other nation from challenging its dominance in Western Europe and East Asia (see February 18, 1992), and caused a public uproar when leaked to the press (see March 8, 1992). The revision is authorized by Defense Secretary Dick Cheney and Joint Chiefs chairman General Colin Powell, and written by the original version’s co-author, Lewis “Scooter” Libby. The revision focuses on building alliances and using collective, internationalist military actions coordinated by the United Nations as “key feature[s]” of US strategy, elements not found in the earlier draft.
Less Focus on Allies as Potential Threats - Many Pentagon officials were critical of the earlier draft’s assertion that the US should work to contain German and Japanese aspirations for regional leadership. The new draft does not see the ascension of foreign allies as a threat, though it does advocate the US retaining a leadership role in strategic deterrence and leading regional alliances; together, the two policies will deter hostile and non-democratic nations from seeking to dominate individual regions.
More Focus on Economic Stability and Security Cooperation - The draft is the first document of its kind to note that while a strong defense is important, it is also important to level off military spending and increase economic and security cooperation for greater world stability. The new proposal emphasizes the importance of increased international military cooperation, and emphasizes cooperation with Russia, Ukraine, and other nations of the former Soviet Union in order to provide “security at lower costs with lower risks for all.” It retains the right of the US to act unilaterally if necessary. Support for Israel and Taiwan are considered key to US interests in the Middle East and East Asia, and a continued heavy US military presence in Europe will continue. The DPG continues to advocate a “base force” military of 1.6 million uniformed troops, and rejects Congressional calls for a greater “peace dividend” funded by deeper military cuts. The entire document is not made public, and parts of it are classified. [New York Times, 5/23/1992]
'Sleight of Hand' - In 2008, author J. Peter Scoblic will write that Libby engaged in what he calls “a bit of rhetorical sleight of hand, making the document’s language more diplomatic while actually strengthening its substance, further emphasizing the role that military dominance would play in dissuading potential rivals.” According to Scoblic, “Those who read it closely would discover that Libby had emphasized American freedom of action, proposing that the United States act preemptively to shape ‘the future security environment’ and do so unilaterally if ‘international reaction proves sluggish or inadequate.” Cheney is so happy with the document that he asks for it to be released under his name, and tells the co-author of the original document, Zalmay Khalilzad, “You’ve discovered a new rationale for our role in the world.” [Scoblic, 2008, pp. 165-166]

Entity Tags: Colin Powell, Richard (“Dick”) Cheney, US Department of Defense, Lewis (“Scooter”) Libby, J. Peter Scoblic, Zalmay M. Khalilzad

Timeline Tags: US International Relations

A federal appeals court upholds the dismissal of a lawsuit filed on behalf of 23 Navy sailors killed in the attack on the USS Stark (see May 17, 1987 and After) against a number of defense contractors. A similar lawsuit on behalf of one of the sailors killed in the attack was dismissed a year before (see June 13, 1991). This time the plaintiffs file over 2,500 pages of unclassified documentary evidence supporting their claims that the contractors were negligent in their design and implementation of the weapons systems aboard the Stark. The appeals court finds that regardless of the amount of evidence entered, to allow the trial would be to potentially infringe on the US government’s “state secrets” privilege (see March 9, 1953). “[N]o amount of effort could safeguard the privileged information,” the court rules. The court adds that “classified and unclassified information cannot always be separated, and therefore courts must restrict access not only to classified material, but to “those pieces of evidence” that “press so closely upon highly sensitive material that they create a hgh risk of inadvertent or indirect disclosures.” [Siegel, 2008, pp. 198]

Entity Tags: US Department of the Navy

Timeline Tags: Civil Liberties

Terry Nichols.Terry Nichols. [Source: Oklahoma City Police Department]White separatist Terry Nichols (see March 24, 1988 - Late 1990, December 22 or 23, 1988, April 2, 1992 and After, and October 12, 1993 - January 1994) makes a number of trips to the Phillippines, apparently to meet with al-Qaeda bomber Ramzi Yousef and other radical Islamists. Nichols will later help plan and execute the Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995). Nichols’s wife is a mail-order bride from Cebu City; Nichols spends an extensive amount of time on the island of Mindanao, where many Islamist terror cells operate. This information comes from a Philippine undercover operative, Edwin Angeles, and one of his wives. Angeles is the second in command in the militant group Abu Sayyaf from 1991 to 1995 while secretly working for Philippine intelligence at the same time (see 1991-Early February 1995). After the Oklahoma City bombing, Angeles will claim in a videotaped interrogation that in late 1992 and early 1993 Nichols meets with Yousef and a second would-be American terrorist, John Lepney. In 1994, Nichols meets with Yousef, Lepney, and others. For about a week, Angeles, Yousef, Nichols, and Lepney are joined by Abdurajak Janjalani, the leader of Abu Sayyaf; two members of the Moro Islamic Liberation Front (MILF); Abdul Hakim Murad and Wali Khan Amin Shah, both of whom are working with Yousef on the Bojinka plot (see January 6, 1995); and a half-brother of Yousef known only by the alias Ahmad Hassim (this is a probable reference to Yousef’s brother Abd al-Karim Yousef, who is living in the Philippines at this time). Elmina Abdul, Angeles’s third wife, will add additional details about these 1994 meetings in a taped 2002 hospital confession to a Philippines reporter days before her death. She only remembers Nichols as “Terry” or “The Farmer,” and doesn’t remember the name of the other American. She says: “They talked about bombings. They mentioned bombing government buildings in San Francisco, St. Louis, and in Oklahoma. The Americans wanted instructions on how to make and to explode bombs. [Angeles] told me that Janjalani was very interested in paying them much money to explode the buildings. The money was coming from Yousef and the other Arab.” [Gulf News, 4/3/2002; Insight, 4/19/2002; Manila Times, 4/26/2002; Insight, 6/22/2002; Nicole Nichols, 2003] (“The other Arab” may be a reference to the Arab Mohammed Jamal Khalifa, Osama bin Laden’s brother-in-law, because Janjalani’s younger brother later claims Abu Sayyaf was funded in its early years by Yousef and Khalifa.) [CNN, 1/31/2007] Abdul claims Nichols and Lepney are sent to an unnamed place for more instructions on bomb-making to destroy a building in the US. She also says that Angeles and others in Abu Sayyaf believe Yousef works for the Iraqi government. [Insight, 6/22/2002] The Manila Times later reports that “Lepney did indeed reside and do business in Davao City [in the Southern Philippines] during 1990 to 1996.” One bar owner recalls that when Lepney got drunk he liked to brag about his adventures with local rebel groups. [Manila Times, 4/26/2002] In 2003, Nicole Nichols (no relation to Terry Nichols), the director of the watchdog organization Citizens against Hate, will explain why an American white supremacist would make common cause with Islamist terrorists. Two unifying factors exist, she writes: an overarching hatred of Jews and Israel, and a similarly deep-seated hatred of the US government. [Nicole Nichols, 2003] After Nichols takes part in the 1995 Oklahoma City bombing (see 8:35 a.m. - 9:02 a.m. April 19, 1995), Wali Khan Amin Shah will attempt to take the credit for plotting the bombing for himself and Yousef, a claim federal authorities will not accept (see April 19, 1995 and 10:00 a.m. April 19, 1995 and After).

Entity Tags: Moro Islamic Liberation Front, Mohammed Jamal Khalifa, Ramzi Yousef, Wali Khan Amin Shah, Nicole Nichols, Elmina Abdul, Terry Lynn Nichols, Abu Sayyaf, Edwin Angeles, Abd al-Karim Yousef, John Lepney, Abdul Hakim Murad, Abdurajak Janjalani

Timeline Tags: Complete 911 Timeline, US Domestic Terrorism

Adham Amin Hassoun.Adham Amin Hassoun. [Source: CBS News]The FBI interviews Adham Amin Hassoun, a Muslim community activist living in Florida. The year before, Hassoun had filed Florida incorporation papers for the first American chapter of the Islamic charity Benevolence International (BIF), listing wealthy Saudi businessman Adel Batterjee as the president. The FBI shows him photographs of suspects in the World Trade Center bombing and asks him if he could recognize the people. At this interview or a later one, he is also asked about Enaam Arnaout, who will take control of Benevolence International after it moved its headquarters to Chicago in 1994. After 9/11, Hassoun will be questioned again for alleged ties with so-called “dirty bomber” Jose Padilla. Hassoun and Padilla were acquaintances in Florida since the early 1990s. [South Florida Sun-Sentinel, 7/13/2002] The FBI begins monitoring Hassoun and some of his associates, including Padilla, in October 1993 (see (October 1993-November 2001)). Benevolence International will later be connected to al-Qaeda and shut down, but only after 9/11.

Entity Tags: Enaam Arnaout, Benevolence International Foundation, Adel Abdul Jalil Batterjee, Adham Amin Hassoun, Jose Padilla

Timeline Tags: Complete 911 Timeline

Bomb damage in underground levels of the WTC in 1993.Bomb damage in underground levels of the WTC in 1993. [Source: Najlah Feanny/ Corbis]An attempt to topple the World Trade Center in New York City fails, but six people are killed and over 1,000 injured in the misfired blast. The explosion is caused by the detonation of a truck bomb in the underground parking garage. An FBI explosives expert will later state, “If they had found the exact architectural Achilles’ heel or if the bomb had been a little bit bigger, not much more, 500 pounds more, I think it would have brought her down.” Ramzi Yousef, who has close ties to Osama bin Laden, organizes the attempt. [Village Voice, 3/30/1993; US Congress, 2/24/1998] The New York Times will report on Emad Salem, an undercover agent who will be the key government witness in the trial against Yousef. Salem will testify that the FBI knew about the attack beforehand and told him it would thwart the attack by substituting a harmless powder for the explosives. However, an FBI supervisor called off this plan and the bombing was not stopped. [New York Times, 10/28/1993] Other suspects were ineptly investigated before the bombing as early as 1990. Several of the bombers were trained by the CIA to fight in the Afghan war and the CIA will conclude, in internal documents, that it was “partly culpable” for this bombing (see January 24, 1994). [Independent, 11/1/1998] 9/11 mastermind Khalid Shaikh Mohammed is an uncle of Yousef and also has a role in the bombing (see March 20, 1993). [Independent, 6/6/2002; Los Angeles Times, 9/1/2002] One of the bombers even leaves a message, which will be found by investigators, stating, “Next time, it will be very precise.” [Associated Press, 9/30/2001]

Entity Tags: Khalid Shaikh Mohammed, Federal Bureau of Investigation, Ramzi Yousef, Osama bin Laden, World Trade Center, Emad Salem, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Neil Herman.Neil Herman. [Source: Paul Schneck Photography]The Al-Kifah Refugee Center is bin Laden’s largest fundraising group in the US and has offices in many cities (see 1986-1993 and 1985-1989). Counterterrorism expert Steven Emerson will later call it “al-Qaeda’s operational headquarters in the United States.” [Emerson, 2006, pp. 436] Nearly every figure involved in the 1993 WTC bombing has a connection to the Al-Kifah branch in Brooklyn, New York. [Newsweek, 3/29/1993] Bob Blitzer, a former FBI terrorism chief who heads the FBI’s first Islamic terrorism squad, is stunned to discover the number of militants connected to Al-Kifah who have left the US to fight for Muslim causes overseas. He will later remember thinking, “What the hell’s going on?” Neil Herman, head of the FBI’s WTC bombing investigation, will comment, “It was like a modern underground railroad.” But no effort is made to keep track of who has gone overseas to fight, even though many of the WTC bombers had gone overseas to fight then came back to use their training to plan an attack in the US. Furthermore, the Al-Kifah office in Brooklyn shuts itself down, but all the other branch offices remain open. US News and World Report will later note that the offices “were left largely intact [and] helped form the nucleus of bin Laden’s al-Qaeda network.” Herman will say, “They certainly continued on, but were somewhat fragmented.” Over time, the other branches generally go underground. Soon their functions are largely replaced by a network of Islamic charities. For instance, the functions of the Brooklyn branch, including its newsletter and website, are directly taken over by a new Boston-based charity called Care International (see April 1993-Mid-2003). Another charity is the Benevolence International Foundation (BIF), run by Enaam Arnaout, who is a veteran of the Al-Kifah Brooklyn office. [US News and World Report, 6/2/2002] The US will not freeze the assets of Al-Kifah until shortly after 9/11, long after all the US branches have dissolved (see September 24, 2001). There is evidence to suggest that the CIA had ties to Al-Kifah and blocked FBI investigations of it (see Late 1980s and After).

Entity Tags: Enaam Arnaout, Al-Kifah Refugee Center, Benevolence International Foundation, Care International (Boston), Neil Herman, Bob Blitzer, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline

Aafia Siddiqui.Aafia Siddiqui. [Source: Public domain]The Al-Kifah Refugee Center is bin Laden’s largest fundraising group in the US and has offices in many cities (see 1986-1993 and 1985-1989). Counterterrorism expert Steven Emerson will later call it “al-Qaeda’s operational headquarters in the United States.” [Emerson, 2006, pp. 436] In late March 1993, Newsweek will report that “virtually every principal figure implicated in the World Trade Center bombing” that took place the month before (see February 26, 1993) has a connection to the Al-Kifah branch in Brooklyn, New York. [Newsweek, 3/29/1993] The Brooklyn branch quietly shuts itself down. But other branches stay open (see Shortly After February 26, 1993-1994) and the Boston branch appears to take over for the Brooklyn branch. In April 1993, it reincorporates under the new name Care International (which is not connected with a large US charity based in Atlanta with the same name). Emerson will later comment, “The continuity between the two organizations was obvious to anyone who scratched the surface.” For instance, Care takes over the publication of Al-Kifah’s pro-jihad newsletter, Al Hussam. [Emerson, 2006, pp. 437] It also shares the same website and street address as the Al-Kifah Boston branch it took over. [Wall Street Journal, 11/21/2001] By the time of the WTC bombing, Al-Kifah is doing most of its fund raising for the mujaheddin fighting in Bosnia. For instance, one month after the bombing, a member of Al-Kifah/Care in Boston named Aafia Siddiqui sends Muslims newsgroups an e-mail pledge form asking for support for Bosnian widows and orphans. Siddiqui, a university student in Boston for most of the 1990s, is well known to Boston’s Muslim community as a dedicated Islamic activist. One imam will later recall, “She attended many conferences. Whenever there was an event, she would come.” But it appears Siddiqui is also a prominent al-Qaeda operative, working as a “fixer” for Khalid Shaikh Mohammed. Despite considerable suspicious evidence against her discovered shortly after 9/11, she will disappear in Pakistan in 2003 (see Late September 2001-March 2003). [Vanity Fair, 3/2005] Two long-time Care employees are also be long-time employees of Ptech, a Boston-based computer firm formed in 1994 that will be raided in 2002 by the FBI for suspected radical militant ties. One of them writes many articles advocating Islamic jihad (see 1994). Emerson and his Investigative Project on Terrorism research team begins researching Care International in 1993, targeting it and several employees for suspected radical militant ties. The team discovers some checks made out to Care have notations on the back such as, “For jihad only.” [Telegram and Gazette, 9/11/2006] Presumably Emerson’s team shares what they learn with US intelligence, as his research on other matters lead to US government investigations around the same time (see for instance October 1994-2001). Al-Kifah branches in the US are connected to the charity Maktab al-Khidamat (MAK) overseas, which is also sometimes called Al-Kifah. In 1996, a secret CIA report will assert that the main MAK office in Pakistan funds at least nine militant training camps in Afghanistan and has ties to bin Laden and other militant groups and leaders. Furthermore, it connects this office to the Al-Kifah office in Brooklyn and the 1993 WTC bomber Ramzi Yousef (see January 1996). But the FBI takes no action against any of the remaining Al-Kifah branches in the US before 9/11. The US will officially declare Al-Kifah and/or Maktab al-Khidamat a terrorist financier shortly after 9/11, but by then all the US branches have closed or changed their names (see September 24, 2001). One day after the declaration, a Boston Globe article will make the connection between Care and Al-Kifah, pointing out that Care and the old Al-Kifah branch in Boston share the exact same address. [Boston Globe, 9/26/2001] But the FBI will wait until 2003 before raiding the Care offices and shutting it down. The FBI will later state that Care raised about $1.7 million from 1993 to 2003. [Telegram and Gazette, 9/11/2006] Al-Kifah has had a murky connection with the CIA, at least in its early days. Shortly after 9/11, Newsweek will comment that Al-Kifah’s Brooklyn office “doubled as a recruiting post for the CIA seeking to steer fresh troops to the mujahedin.” [Newsweek, 10/1/2001]

Entity Tags: Federal Bureau of Investigation, Steven Emerson, Central Intelligence Agency, Aafia Siddiqui, Al-Kifah Refugee Center, Care International (Boston), Maktab al-Khidamat

Timeline Tags: Complete 911 Timeline

Television news footage of the Branch Davidian conflagration of April 19, 1993.Television news footage of the Branch Davidian conflagration of April 19, 1993. [Source: Anu News (.com)]Many white separatists and right-wing militia members are aghast, appalled, and infuriated by the violent end to the Branch Davidian siege in Waco, Texas (see April 19, 1993). Two of those are future Oklahoma City bombers Terry Nichols and Timothy McVeigh (see 8:35 a.m. - 9:02 a.m. April 19, 1995); when McVeigh watches the flames devour the Davidian compound, he stands in Nichols’s living room and weeps. McVeigh has already visited the compound during the siege (see March 1993); in the following weeks, he revisits the scene, collecting pamphlets from the Davidians, taking photographs, and even taking samples of the charred wood left behind. McVeigh begins wearing, and selling at gun shows, caps that depict the BATF (Bureau of Alcohol, Tobacco and Firearms) logo with bullet holes in them (see August 26 - September 15, 1994). He sells flares that can be used as missiles. Moreover, he and Nichols soon begin practicing with explosives and agitating for violent assaults on government officials with local militia members (see October 12, 1993 - January 1994). McVeigh later tells interviewers: “I didn’t define the rules of engagement in this conflict. The rules, if not written down, are defined by the aggressor. It was brutal, no holds barred. Women and children were killed at Waco and Ruby Ridge (see August 31, 1992). You put back in [the government’s] faces exactly what they’re giving out.” McVeigh’s favorite magazine, Soldier of Fortune, later publishes articles calling the FBI and BATF “the Gestapo” and accusing the government of funneling illegal drugs into the country through the auspices of the DEA; McVeigh will read these articles, and other more overt anti-government publications that directly accuse the government of plotting to enact “new Wacos” throughout the country, with a new fervor. Another favorite is a videotape, “Waco: The Big Lie,” promoted by militia leader Linda Thompson (see April 3, 1993 and September 19, 1994), who accuses the government of deliberately plotting the deaths of everyone inside the Davidian compound and setting the compound afire by shooting flames at the building through a tank. McVeigh will later claim to have learned the “real truth” about the siege after meeting a former Davidian, Paul Fatta, on the gun show circuit (see Late 1992-Early 1993 and Late 1994). Nichols’s neighbor Phil Morawski will later recall of McVeigh: “He said he witnessed part of the siege at Waco and was very upset about it; the government overstepped its bounds. Waco is kind of like the battle cry for Tim and many others.” McVeigh’s friend Michael Fortier (see March 24, 1988 - Late 1990) will later recall discussing the Davidian debacle with McVeigh, saying, “We both concluded that the federal government had intentionally attacked those people and may not have intentionally started the fire, but they were certainly the cause of the fire and potentially murdered those people in Waco.” Fortier’s wife Lori will recall McVeigh’s position differently: according to her recollection, McVeigh believes that “the government murdered those people.” After the bombing, Dennis Mahon, the head of the Oklahoma cell of the White Aryan Resistance, will tell federal officials about McVeigh, whom he claims to have known under an alias: “I met Tim Tuttle, but I didn’t know he was alias Tim McVeigh. I met him at gun shows (see January 23, 1993 - Early 1994). He sold military stuff, knives, gun parts, camouflage uniforms.… And we talked about Waco. And I said: ‘What comes around goes around. If they keep doing this terrorism on our people, terrorism’s going to happen to them…’ He said: ‘Probably. Probably so.‘… Timothy McVeigh is my hero. Wish we had a thousand more like him. He took action.” Mahon will later be identified by one witness as the person driving the Ryder truck for McVeigh on the day of the Oklahoma City bombing (see April 15, 1995), though the identification is in doubt, and Mahon will not be charged for playing a part in the bombing. [Stickney, 1996, pp. 155, 159; PBS Frontline, 1/22/1996; Serrano, 1998, pp. 76-78; Nicole Nichols, 2003; CNN, 12/17/2007] McVeigh will send videotapes about the Davidian tragedy, such as “Waco: The Big Lie,” to his friends, including his former coworker Carl Lebron (see November 1991 - Summer 1992), his former Army comrade Albert Warnement (see January - March 1991 and After), and his neighbors Richard and Lynn Drzyzga (see October 1990). Lebron considers the videotapes “nonsense,” and the Drzyzgas become concerned that McVeigh may actually believe the “nutty” “paranoia” of the information in them. McVeigh will also write a letter to his childhood friend Steve Hodge, breaking off their friendship because Hodge is not sufficiently enraged by the Davidian tragedy (see July 14, 1994). [Serrano, 1998, pp. 78] McVeigh is not the only one preaching active retribution for Waco. James Nichols, Terry’s older brother (see December 22 or 23, 1988), says they are planning to kill law enforcement officials. Paul Izydorek, a family friend, will later tell a CNN reporter: “Evidently, James had told [Izydorek’s son] one or two times about how they were going to kill cops and judges and, you know, really clean house on all the local government. I didn’t take it serious but I guess maybe that’s what the heck they was really talking about, maybe they was a lot more serious, you know, than I realized.” [Stickney, 1996, pp. 156]

Entity Tags: Philip Morawski, Richard Drzyzga, US Bureau of Alcohol, Tobacco, Firearms and Explosives, Timothy James McVeigh, Paul Gordon Fatta, Terry Lynn Nichols, Michael Joseph Fortier, Steve Hodge, Lori Fortier, Branch Davidians, Lynn Drzyzga, Albert Warnement, Carl Edward Lebron Jr, Paul Izydorek, Dennis Mahon, James Nichols, Linda Thompson, Federal Bureau of Investigation

Timeline Tags: US Domestic Terrorism, 1993 Branch Davidian Crisis

Mahmud Abouhalima.Mahmud Abouhalima. [Source: Agence France-Presse]Mahmud Abouhalima is arrested for his role in the February 1993 WTC bombing. He meets with US investigators without his lawyer and provides a detailed account of the Al-Kifah Refugee Center, bin Laden’s main support base in the US in the early 1990s. He says that twice he turned to a Texas acquaintance named Wadih El-Hage to buy weapons for his associates. El-Hage, who turns out to be bin Laden’s personal secretary (see September 15, 1998), will later be caught and convicted of bombing the US embassies in Africa in 1998 (see 10:35-10:39 a.m., August 7, 1998). Abouhalima further recounts fighting in Afghanistan with the mujaheddin in the 1980s and tells of travelling to training camps with a Palestinian man named Mohammed Odeh. A Palestinian man with the name Mohammed Saddiq Odeh will later be convicted of a role in the 1998 embassy bombings as well. Abouhalima offers additional inside information about the bomb plot and his associates in exchange for a lighter sentence. But, as the New York Times will later note, prosecutors turn down the offer “for reasons that remain unclear.” Abouhalima is later found guilty and sentenced to life in prison. [New York Times, 10/22/1998]

Entity Tags: Mohammed Saddiq Odeh, Wadih El-Hage, Mahmud Abouhalima

Timeline Tags: Complete 911 Timeline

Essam Marzouk.Essam Marzouk. [Source: FBI]US-al-Qaeda double agent Ali Mohamed is detained by the Royal Canadian Mounted Police (RCMP) in Vancouver, British Columbia, after attempting to pick up a man named Essam Marzouk, who is carrying numerous false passports. The RCMP identifies Mohamed as a top al-Qaeda operative. Mohamed admits to it that he traveled to Vancouver to help Marzouk sneak into the US and admits working closely with Osama bin Laden. [San Francisco Chronicle, 11/4/2001; Globe and Mail, 11/22/2001; Wall Street Journal, 11/26/2001] After many hours of questioning, Mohamed tells the Canadian officials to call John Zent, his handler at the FBI. Zent confirms that Mohamed works for the FBI and asks them to release him. They do. [Lance, 2006, pp. 124] Mohamed is accompanied by fellow al-Qaeda operative Khaled Abu el-Dahab (see 1987-1998), who brings $3,000 sent by bin Laden to pay for Marzouk’s bail. Marzouk had run one of bin Laden’s training camps in Afghanistan and was an active member of the al-Qaeda allied group Islamic Jihad at the time. However, Canadian intelligence apparently is unaware of his past. Marzouk will spend almost a year in detention. But then, again with the help of another visit to Canada by Mohamed, Marzouk will be released and allowed to live in Canada (see June 16, 1993-February 1998). He later will help train the bombers who carry out the 1998 African embassy bombings (see 10:35-10:39 a.m., August 7, 1998). [Globe and Mail, 11/22/2001; National Post, 11/26/2005] Jack Cloonan, an FBI agent who later investigates Mohamed, will say: “I don’t think you have to be an agent who has worked terrorism all your life to realize something is terribly amiss here. What was the follow up? It just sort of seems like [this incident] dies.” [Lance, 2006, pp. 125]

Entity Tags: Royal Canadian Mounted Police, John Zent, Osama bin Laden, Jack Cloonan, Khaled Abu el-Dahab, Essam Marzouk, Ali Mohamed, Federal Bureau of Investigation, Canadian Security Intelligence Service

Timeline Tags: Complete 911 Timeline

In Tiburon, California, Dr. Charles Epstein, a geneticist at the University of California, opens a package mailed to his home and brought inside by his daughter Joanna. The package contains a wooden box, which itself contains a bomb. The resulting explosion blows off several of Epstein’s fingers, breaks his arm, and causes a number of abdominal injuries. Epstein is known as a researcher who has helped identify a gene that may contribute to Down’s Syndrome. [BBC, 11/12/1987; Washington Post, 6/25/1993; Washington Post, 1998; World of Forensic Science, 1/1/2005] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996). Kaczynski once worked as a professor at UC-Berkeley. This is the first bomb known to have been detonated by Kaczynski in over six years (see February 20, 1987). Another device mailed by Kaczynski will detonate two days later (see June 24, 1993).

Entity Tags: University of California at Berkeley, Charles Epstein, Joanna Epstein, Theodore J. (“Ted”) Kaczynski

Timeline Tags: US Domestic Terrorism

An FBI recreation of one of the Unabomber’s explosive devices, on display at the Newseum in Washington, DC.An FBI recreation of one of the Unabomber’s explosive devices, on display at the Newseum in Washington, DC. [Source: Newseum / Wikimedia]Computer scientist David Gelernter of Yale University opens a package mailed to his office. The package contains a bomb. It explodes in Gelernter’s hands, severely injuring and ultimately disfiguring him. [BBC, 11/12/1987; Washington Post, 1998] The school’s sprinkler system douses a small blaze started by the bomb. Gelernter is in shock from his injuries; he races down five flights of stairs to the infirmary, dripping blood and fending off bystanders with cries of “Leave me alone!” He suffers extensive injuries to his abdomen, chest, face, and hands. Within a day, the Gelernter bombing is added to the “UNABOM” list of serial bombings, along with the University of California bombing from two days earlier (see June 22, 1993). Federal authorities are dismayed that the “Unabomber” bombings have restarted after more than six years of inactivity (see February 20, 1987). Gelernter may have been targeted because of his invention of a computer language that allows desktop computers to process information in a much more powerful fashion. FBI Director William Sessions says: “The FBI will go back and look at all the bombings of a similar character. It’s the logical thing to be done, and it will be done.” [Washington Post, 6/25/1993] The bombing will later be shown to be the work of Theodore “Ted” Kaczynski, the so-called “Unabomber” (see April 3, 1996).

Entity Tags: William S. Sessions, David Gelernter, Theodore J. (“Ted”) Kaczynski, Yale University

Timeline Tags: US Domestic Terrorism

Kifah Wael Jayyousi.Kifah Wael Jayyousi. [Source: Robert A. Reeder]A Florida cell of Islamic radicals carries out fundraising, training, and recruitment to support the global jihad movement. The group is monitored by the FBI from the early 1990s, but no action is taken against it until after 9/11. The cell’s most prominent members are Adham Amin Hassoun, Mohammed Hesham Youssef, Kifah Wael Jayyousi, Kassem Daher, and Jose Padilla. Adnan Shukrijumah may also be involved (see (Spring 2001)).
bullet Both Hassoun and Jayyousi are associates of “Blind Sheikh” Omar Abdul-Rahman and the FBI monitors telephone conversations between them and Abdul-Rahman from January 1993 to 1995, at least. After Abdul-Rahman is taken into police custody in July 1993, according to an FBI agent, Jayyousi calls Abdul-Rahman in jail to “update the sheikh with jihad news, many times reading accounts and statements issued directly by terrorist organizations.” [St. Petersburg Times, 11/23/2003; Lance, 2006, pp. 126-8; Associated Press, 4/8/2006; International Herald Tribune, 1/4/2007]
bullet Funds are provided through bank accounts of Al-Gama’a al-Islamiyya (the Islamic Group), the Canadian Islamic Association, and Benevolence International Foundation (BIF), for which Hassoun files incorporation papers in Florida. The cell pays out thousands of dollars in checks, some of which are marked “Chechnya”, “Kosovo,” or “for tourism”.
bullet They try to talk in code, but the code is unsophisticated; for example “tourism” apparently means “terrorism”. In addition, they are not very careful and in one conversation overheard by the FBI, which records tens of thousands of their conversations from the early 1990s, one plotter asks another if he has enough “soccer equipment” to “launch an attack on the enemy.” In another, the conspirators discuss a $3,500 purchase of “zucchini” in Lebanon.
bullet Cell members are involved in jihad, through funding or direct participation, in Egypt, Somalia, Bosnia, Chechnya, Afghanistan, Lebanon, Libya, Kosovo, the former Soviet Republic of Georgia, and Azerbaijan.
bullet They are involved with both bin Laden and Chechen leader Ibn Khattab; for example, in one conversation Youssef tells Hassoun that he would be traveling “there at Osama’s and… Khattab’s company.” [Indictment. United States v. Jose Padilla, 11/17/2005 pdf file]
bullet They publish the Islam Report, a radical magazine about jihad. [Associated Press, 4/8/2006]
It is unclear why the FBI monitors the cell for almost a decade before doing anything. However, some of their activities are focused on Bosnia, where the US is turning a blind eye, or even actively assisting Islamic militants fighting on the Bosnian side (see 1992-1995 and April 27, 1994). The cell is broken up in the months after 9/11, and Hassoun, Jayyousi, and Padilla are sent for trial, which begins in 2007. [International Herald Tribune, 1/4/2007]

Entity Tags: Mohamed Hesham Youssef, Adnan Shukrijumah, Adham Amin Hassoun, Kifah Wael Jayyousi, Al-Gama’a al-Islamiyya, Omar Abdul-Rahman, Kassem Daher, Jose Padilla, Federal Bureau of Investigation, Canadian Islamic Association, Benevolence International Foundation

Timeline Tags: Complete 911 Timeline

Future Oklahoma City bomber Timothy McVeigh (see November 1991 - Summer 1992, May-September 1993 and 8:35 a.m. - 9:02 a.m. April 19, 1995) again goes to Michigan to join his Army buddy and future co-conspirator Terry Nichols (see March 24, 1988 - Late 1990, December 22 or 23, 1988, and April 2, 1992 and After). He stays with Nichols for several months, living on a farm in Decker, Michigan, owned by Nichols’s brother James Nichols (see December 22 or 23, 1988) and helping with the harvest. The two also drive around the country, buying and selling items at gun shows. Enraged by the debacle in Waco (see April 19, 1993), McVeigh and Nichols begin experimenting with explosives on James Nichols’s farm, meeting with members of the nascent Michigan Militia (see April 1994), and proposing to launch violent attacks on judges, lawyers, and police officers (see April 19, 1993 and After). McVeigh and Nichols find the militiamen too inactive for their taste. (Michigan Militia spokesmen will later claim that they ejected Nichols and his brother James from their group for their “hyperbolic language”; after the bombing, militia leader Norm Olson will say, “These people were told to leave because of that type of talk of destruction and harm and terrorism.”) Inspired by the novel The Turner Diaries (see 1978), McVeigh and Nichols form their own small “cell” (see February 1992), calling themselves the “Patriots.” (Some neighbors will later say that McVeigh and Nichols were not necessarily building “practice bombs” for later use, but merely amusing themselves—“mixtures of mainly household chemicals”—to relieve the boredom of farm work.) In October, they drive to Elohim City, a white supremacist compound in eastern Oklahoma (see 1973 and After), where they meet with at least one member of the Aryan Republican Army (see 1992 - 1995). A speeding ticket from December 1993 shows McVeigh makes multiple visits to the compound. During this time, Nichols and McVeigh go to a gun show in Arkansas, and briefly consider buying a house there, but instead they return to Michigan. Neighbors later recall that McVeigh and Nichols go to several meetings of the Michigan Militia (see January 1995). McVeigh begins using the alias “Tim Tuttle,” and begins buying nitromethane, a key ingredient in explosives, at hobby shops (see December 1993). [New York Times, 4/24/1995; New York Times, 5/4/1995; New York Times, 5/28/1995; Stickney, 1996, pp. 159; Douglas O. Linder, 2001; Nicole Nichols, 2003] During this time, McVeigh acquires a Michigan driver’s license. [New York Times, 4/23/1995] After the bombing, Elohim City leader Robert Millar will deny having any knowledge of McVeigh (see April 1993 and May 24, 1995).

Entity Tags: Robert Millar, Elohim City, Aryan Republican Army, James Nichols, Norman (“Norm”) Olson, Timothy James McVeigh, Terry Lynn Nichols, Michigan Militia

Timeline Tags: US Domestic Terrorism

President Clinton signs into law the Brady Handgun Violence Prevention Act, sometimes called the “Brady Bill,” which imposes a waiting period for handgun purchases. Many gun enthusiasts are infuriated by the new law. The Southern Poverty Law Center will later observe that the “Brady Bill” and a 1994 ban on some assault weapons (see September 13, 1994) help spark the nascent militia movement. [Southern Poverty Law Center, 6/2001; US Government Info, 2010]

Entity Tags: Brady Handgun Violence Prevention Act, William Jefferson (“Bill”) Clinton, Southern Poverty Law Center

Timeline Tags: Civil Liberties, US Domestic Terrorism

Oussama Ziade.Oussama Ziade. [Source: Beta Consulting]Ptech is founded in 1994 by Oussama Ziade, Hussein Ibrahim, and James Cerrato. Ziade came from Lebanon to study at Harvard University. As the Associated Press will describe it, Ptech’s “idea was to help complicated organizations like the military and large companies create a picture of how their assets—people and technology—work together. Then the software could show how little changes, like combining two departments, might affect the whole.” They raise $20 million to start the company. A number of Ptech employees and investors will later be suspected of having ties to groups that have been designated by the US as terrorist organizations: [CNN, 12/6/2002; Wall Street Journal, 12/6/2002; Associated Press, 1/3/2003]
bullet Yassin al-Qadi, a Saudi multimillionaire. He will invest $5 million of Ptech’s start-up money. The US will declare him an al-Qaeda financier shortly after 9/11 (see October 12, 2001). In 1998, al-Qadi will come under investigation by FBI agent Robert Wright (see October 1998) for potential ties to the 1998 US embassy bombings (see 10:35-10:39 a.m., August 7, 1998). Al-Qadi is also a major investor in BMI Inc., an investment firm with connections to a remarkable number of suspected terrorist financiers (see 1986-October 1999). Al-Qadi later will claims that he sold his investment in Ptech in 1999, but there will be evidence he may continue to hold a financial stake after that year, and even after the US will officially declare him a terrorism financier (see 1999-After October 12, 2001). [Wall Street Journal, 12/6/2002; Washington Post, 12/7/2002; Associated Press, 1/3/2003]
bullet Gamel Ahmed, Ptech’s comptroller in the mid-1990s. One al-Qadi loan Wright will investigate also involves Ahmed. [Associated Press, 1/3/2003]
bullet Hussein Ibrahim, Ptech vice president and chief scientist. He also serves as vice president and then president of BMI from 1989 until 1995. He has no known direct terrorism finance connections, but it has been reported that al-Qadi brought Ibrahim into Ptech as his representative. [Wall Street Journal, 12/6/2002; WBZ 4 (Boston), 12/9/2002; Associated Press, 1/3/2003]
bullet Soliman Biheiri. He is the head of BMI and a member of Ptech’s board. US prosecutors will later call him the US banker for the Muslim Brotherhood, a banned Egyptian militant group. He will later be convicted for lying and immigration fraud (see June 15, 2003). [FrontPage Magazine, 6/17/2005]
bullet Abdurahman Alamoudi. He is one of Ptech’s founders, as well as an investor in BMI. In 2004, the US will sentence him to 23 years in prison for illegal dealings with Libya (see October 15, 2004). [Washington Post, 10/16/2004; FrontPage Magazine, 6/17/2005]
bullet Muhammed Mubayyid and Suheil Laheir. Neither have any known direct ties to terrorism financing. However, both are longtime Ptech employees whom formerly worked for Care International, a Boston-based suspect Islamic charity (not to be confused with a large international charity having the same name). [Wall Street Journal, 12/6/2002] In 2005, Mubayyid will be charged with conspiring to defraud the US and making false statements to the FBI. Care International had previously been the Boston branch of the Al-Kifah Refugee Center (see [a0493kifahboston]]) and a recruitment office for Mektab al Khidmat (MAK), the precursor organization to al-Qaeda (see 1985-1989). Laheir, Ptech’s chief architect, wrote many articles in support of Islamic holy war. He frequently quoted Abdullah Azzam, bin Laden’s mentor. [Associated Press, 5/13/2005; FrontPage Magazine, 6/17/2005]
bullet Yaqub Mirza. He is a Ptech investor and on a Ptech advisory board. He directs SAAR, a multi-million dollar network of companies and charities in Herndon, Virginia (see July 29, 1983). In March 2002, US investigators will raid the SAAR network for suspected terrorism ties (see March 20, 2002). In late 2002, the Wall Street Journal will report, “US officials privately say Mr. Mirza and his associates also have connections to al-Qaeda and to other entities officially listed by the US as sponsors of terrorism.” [Wall Street Journal, 12/6/2002; WBZ 4 (Boston), 12/9/2002; Associated Press, 1/3/2003]
bullet BMI itself directly invests in Ptech. It also gives Ptech a founding loan, and leases Ptech much of its office and computer equipment. [Wall Street Journal, 12/6/2002; Associated Press, 1/3/2003] Ptech president Ziade and other Ptech employees will claim that all of their ties to suspected terrorist financiers are coincidental. By 2002, Ptech will have annual revenues of up to $10 million. [Wall Street Journal, 12/6/2002] Ptech’s potential ties to suspected terrorist financiers will be of particular concern because of its potential access to classified government information (see 1996-1997). [Wall Street Journal, 12/6/2002; Boston Globe, 12/7/2002] Joe Bergantino, a CBS journalist who will be the first to report on Ptech, will say of Ptech in 2002, “The worst-case scenario is that this is a situation where this was planned for a very long time to establish a company in this country and in the computer software business that would target federal agencies and gain access to key government data to essentially help terrorists launch another attack.” [National Public Radio, 12/8/2002]

Entity Tags: Oussama Ziade, Hussein Ibrahim, James Cerrato, Muhammed Mubayyid, Gamel Ahmed, Care International (Boston), Yassin al-Qadi, Al-Qaeda, Yacub Mirza, BMI Inc., Suheil Laheir, Abdurahman Alamoudi, Soliman Biheiri, Ptech Inc.

Timeline Tags: Complete 911 Timeline

Alamoudi, center, with Vice President Gore, left, and President Clinton, right. This picture is from a 1997 American Muslim Council newsletter and was presumably taken around that time.Alamoudi, center, with Vice President Gore, left, and President Clinton, right. This picture is from a 1997 American Muslim Council newsletter and was presumably taken around that time. [Source: CAIR]Abdo Mohammed Haggag, speechwriter for the “Blind Sheikh,” Sheikh Omar Abdul-Rahman, makes a deal and agrees to testify against Abdul-Rahman in an upcoming US trial. [New York Times, 6/26/1994] He soon reveals that bin Laden has been paying for Abdul-Rahman’s living expenses since Abdul-Rahman moved to the US in 1990 (see July 1990). This is one of the first things that causes US intelligence to become interested in bin Laden. [Miller, Stone, and Mitchell, 2002, pp. 147-148] Further, Haggag reveals that the money was funneled through Abdurahman Alamoudi and his organization, the American Muslim Council. “Investigators tried to prove Alamoudi was a terror middleman but could not find ‘smoking gun’ evidence. That allowed Alamoudi to became a politically connected Muslim activist and co-founder of the American Muslim Armed Forces and Veteran Affairs Council, which helps the US military select Muslim chaplains.” [New York Post, 10/1/2003] This same year, Alamoudi will be one of the founders of Ptech, a US computer company with suspected terrorism ties (see 1994). It will later be alleged that he was able to operate with impunity for years due to his close ties to Grover Norquist, a powerful Republican lobbyist (see March 20, 2002). In 2004, the US will sentence him to 23 years in prison for illegal dealings with Libya (see October 15, 2004).

Entity Tags: Osama bin Laden, American Muslim Council, Abdo Mohammed Haggag, Abdurahman Alamoudi, Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline

Government officials say the highly classified “doomsday” project, also known as the Continuity of Government (COG) program, is being shut down. The secretive program was first designed during the cold war to keep the government functioning in the event of a nuclear conflict with the Soviet Union. “The nuclear tensions of that era having subsided, the project has less than six months to live,” the New York Times reports, citing Pentagon officials. [New York Times, 4/18/1994] Despite the claims, the classified plans will not be discontinued. The Clinton administration will actually update the protocols and place a new emphasis on weapons of mass destruction and counterterrorism (see June 21, 1995, October 21, 1998 and Early 1998). The COG program will be officially activated for the first time during the 9/11 attacks and later extended indefinitely (see (Between 9:45 a.m. and 9:56 a.m.) September 11, 2001). [Washington Post, 3/1/2002]

Entity Tags: Clinton administration

Timeline Tags: Civil Liberties

Peter Galbraith.Peter Galbraith. [Source: CBC]US President Bill Clinton and National Security Adviser Anthony Lake decide that they will give the Bosnians a “green light” for the arms supply pipeline from Iran to Croatia. The CIA is not consulted. Lake passes the word on to US ambassador to Croatia Peter Galbraith by “cleverly” telling him that they have “no instructions” for him with regard to the Iranian arms shipments. [Wiebes, 2003, pp. 167- 168] Two days later, Galbraith passes the “no instructions” message on to Croatian President Franjo Tudjman, making it clear that the US government is giving him a green light for Croatia to conduct arms deals with Iran. [APF Reporter, 1997]

Entity Tags: Anthony Lake, Franjo Tudjman, Military Professional Resources Inc., William Jefferson (“Bill”) Clinton, Peter Galbraith

Timeline Tags: Complete 911 Timeline

A young Indonesian nicknamed Hambali forms a front company that ties al-Qaeda figures to the Bojinka plot (see January 6, 1995), an early version of the 9/11 plot. Hambali had fought in Afghanistan in the late 1980’s, repeatedly met with bin Laden there, and allied himself to bin Laden’s cause. In 1994, Hambali, living in a village north of Kuala Lumpur, Malaysia, began frequently receiving visitors. According to his landlord, “Some looked Arab and others white.” There has been no explanation who these “white” visitors may have been. Hambali had been very poor prior to this time, but he is suddenly “flush with newfound cash” brought by the visitors. In June 1994, he founds a front company called Konsonjaya with Wali Khan Amin Shah, a key Bojinka plotter, and both their names are listed on the eight-person board of directors. Shah fought with bin Laden in Afghanistan, and bin Laden will even admit knowing him and praise him in an 1998 interview (see May 28, 1998). Philippine police phone taps show that frequent calls are made from the Konsonjaya offices in Malaysia to the Philippines offices of Mohammed Jamal Khalifa, bin Laden’s brother-in-law who is also believed to be part of the Bojinka plot (see 1994). [Time, 4/1/2002] A Malaysian official will later say that Hambali spends time in the Philippines with Shah and bomber Ramzi Yousef in 1994 as they plan the Bojinka plot. [Washington Post, 2/3/2002] Mohammed Amin al-Ghafari, another Konsonjaya director, makes frequent trips from Malaysia to the Philippines while planning for the Bojinka plot is under way, and he is later believed to play a key role in financing the plot. In early 1995, after the Bojinka plot is broken up, one of the arrested Bojinka plotters will confess to Konsonjaya’s role in the plot (see February-Early May 1995) and a Philippine investigator’s flow chart of the Bojinka plotters and their connections will prominently include Konsonjaya (see Spring 1995). However, neither the Philippine nor US government appears interested in capturing Hambali, al-Ghafari, or the others involved in Konsonjaya before 9/11. [Los Angeles Times, 6/24/2002; Contemporary Southeast Asia, 12/1/2002] Hambali will continue to live openly in Malaysia, even throwing a party every year for hundreds of people (see April 1991-Late 2000). He will go on to plan other al-Qaeda attacks and will attend a key planning meeting for the 9/11 plot in 2000 (see January 5-8, 2000). [Time, 4/1/2002] Al-Ghafari will finally be deported in 2002 after years of police protection (see October 8-November 8, 2002).

Entity Tags: Wali Khan Amin Shah, Ramzi Yousef, Mohammed Amin al-Ghafari, Konsonjaya, Hambali, Mohammed Jamal Khalifa, Operation Bojinka

Timeline Tags: Complete 911 Timeline

Dallah Avco logo.
Dallah Avco logo. [Source: Dallah Avco]A Saudi named Omar al-Bayoumi arrives in San Diego, California. He will later become well known for his suspicious connections to both some 9/11 hijackers and the Saudi government, although the 9/11 Commission will say that it received no evidence that he was involved in terrorism or the 9/11 attacks. [9/11 Commission, 6/16/2004]
Saudi Government Spy - Acquaintances in San Diego long suspect al-Bayoumi is a Saudi government spy reporting on the activities of Saudi-born college students. [San Diego Union-Tribune, 9/14/2002; Newsweek, 11/22/2002; San Diego Magazine, 9/2003] Says one witness, “He was always watching [young Saudi college students], always checking up on them, literally following them around and then apparently reporting their activities back to Saudi Arabia.” [Newsweek, 11/24/2002] Chairman of the 9/11 Congressional Inquiry Senator Bob Graham (D-FL) and his investigators will, in author Philip Shenon’s words, “find it obvious that the amiable al-Bayoumi was a low-ranking Saudi intelligence agent,” and “someone who had been put on the ground in San Diego by his government to keep an eye on the activities of the relatively large Saudi community in Southern California.” [Shenon, 2008, pp. 52]
'Ghost Employee' - Just prior to moving to the US, al-Bayoumi worked for the Saudi Ministry of Defense and Aviation, headed by Prince Sultan. His salary in this job was approved by Hamid al-Rashid, a Saudi government official whose son, Saud al-Rashid, is strongly suspected of al-Qaeda ties (see May 16, 2002). [US Congress, 7/24/2003 pdf file] Once in San Diego, al-Bayoumi tells people that he is a student or a pilot, and even claims to be receiving monthly payments from “family in India” (despite being Saudi). However, he is none of those things. [Sunday Mercury (Birmingham, UK), 10/21/2001; Wall Street Journal, 8/11/2003] In fact, as he tells some people, he receives a monthly stipend from Dallah Avco, a Saudi aviation company that has extensive ties to the same Saudi Ministry of Defense and Aviation. [Los Angeles Times, 9/1/2002; Newsweek, 11/24/2002] From early 1995 until 2002, al-Bayoumi is paid about $3,000 a month for a project in Saudi Arabia even though he is living in the US. According to the New York Times, Congressional officials believe he is a “ghost employee” doing no actual work. The classified section of the 9/11 Congressional Inquiry report will note that his payments increase significantly just after he comes into contact with two hijackers in early 2000. [New York Times, 8/2/2003] The FBI investigates possible ties between Dallah Avco and al-Qaeda. [Newsweek, 10/29/2001] The firm’s owner, Saudi billionaire Saleh Abdullah Kamel, will deny the accusation. [Newsweek, 7/28/2003]

Entity Tags: Daniel Robert (“Bob”) Graham, Al-Qaeda, 9/11 Commission, Dallah Avco, Federal Bureau of Investigation, Hamid al-Rashid, Omar al-Bayoumi, 9/11 Congressional Inquiry, Sultan bin Abdul Aziz Al Saud, Saleh Abdullah Kamel, Abdullah, Saud al-Rashid

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mohammed Jamal Khalifa, bin Laden’s brother-in-law, is in the Netherlands at this time. He meets with representatives of:
bullet The Muwafaq Foundation, a Saudi funded charity operating from the town of Breda, Netherlands.
bullet The Egyptian militant group Al-Gama’a al-Islamiyya (the Islamic Group), led by Sheikh Omar Abdul-Rahman.
bullet The Islamic Salvation Front (FIS), an outlawed Islamist political party in Algeria.
What happens in Khalifa’s meetings is unknown, but the next month he opens a branch of the Muwafaq Foundation in the Philippines. [Gunaratna, 2003, pp. 168, 194, 342] Saudi multimillionaire Yassin al-Qadi is believed to be the chief funder of Muwafaq; the US will pronounce him a terrorist financier shortly after 9/11 (see October 12, 2001). The US will later claim Muwafaq funded the Abu Sayyaf militant group in the Philippines (see 1995-1998). A secret 1996 CIA report will claim that Muwafaq has ties to Al-Gama’a al-Islamiyya and helps fund mujaheddin fighting in Bosnia (see 1991-1995) and at least one training camp in Afghanistan (see January 1996).

Entity Tags: Mohammed Jamal Khalifa, Al-Gama’a al-Islamiyya, Islamic Salvation Front, Muwafaq Foundation, Yassin al-Qadi

Timeline Tags: Complete 911 Timeline

Steve McGonigle.Steve McGonigle. [Source: University of Texas at Austin]In October 1994, CBS News shows a documentary made by counterterrorism expert Steven Emerson called Jihad in America that alleges the Islamic Association for Palestine (IAP) and Holy Land Foundation have given critical financial support to Hamas. The story is largely based on confessions that Hamas operative Mohammad Salah and another man gave to Israeli officials in 1993 (see January 1993). It claims that these two Texas-based organizations are sending more than a million dollars to Hamas, much of it to buy ammunition. The US officially declares Hamas a terrorist organization in 1995 (see January 1995), and a new law passed in 1996 confirms a 1995 executive order that giving any support to groups like Hamas a crime (see April 25, 1996). [Dallas Morning News, 10/5/1994; Dallas Morning News, 4/8/1996] In March 1996, the Israeli government closes the Jerusalem office of the Holy Land Foundation because of alleged ties to Hamas. This prompts Steve McGonigle, a reporter at the Dallas Morning News, to begin investigating Holy Land, since their headquarters are near Dallas. Beginning in April 1996, McGonigle begins reporting on Holy Land and their ties to Hamas. He notices by looking at public records that Mousa Abu Marzouk, the political leader of Hamas being detained in New York (see July 5, 1995-May 1997), has provided hundreds of thousands of dollars in funding to Holy Land beginning in 1992, the same information that FBI agents like Robert Wright are already aware of. In 1997, the Associated Press will note that Marzouk gave Holy Land its single biggest contribution in the first five years of Holy Land’s existence. Members of Congress such as US Representative Nita Lowey (D-NY) ask the IRS to revoke the Holy Land Foundation’s tax-exempt status because of its support for a US-designated terrorist group. McGonigle also publishes that Marzouk’s wife invested $250,000 in 1993 in InfoCom, the computer company located next to Holy Land that will also be accused of Hamas ties (see September 16, 1998-September 5, 2001). McGonigle will continue to write more stories about Holy Land and Hamas, causing Holy Land to sue his newspaper for defamation in April 2000 (the suit will be dropped after 9/11). [Dallas Morning News, 4/8/1996; Associated Press, 5/26/1997; Columbia Journalism Review, 1/2002] Yet despite all of this media coverage, InfoCom will not be raided until one week before 9/11 (see September 5-8, 2001), and the Holy Land Foundation will not be raided until after 9/11.

Entity Tags: Steve McGonigle, Mousa Abu Marzouk, Mohammad Salah, Steven Emerson, InfoCom Corp., Hamas, Islamic Association for Palestine, Nita Lowey, Holy Land Foundation for Relief and Development

Timeline Tags: Complete 911 Timeline

The US Senate ratifies the international Convention Against Torture, originally proposed by the United Nations in 1985. The treaty bans any officials from signatory nations from inflicting “torture and other cruel, inhuman, or degrading treatment or punishment” on prisoners in order to gain information. It also establishes the UN Committee against Torture (UNCAT). The ban is absolute and cannot be waived: “No exceptional circumstances whatsoever, whether a state of war or a threat of war, internal political instability, or any other public emergency, may be invoked as a justification of torture.” [United Nations High Commissioner for Human Rights, 12/10/1984; Savage, 2007, pp. 155] The treaty also forbids signatory nations from sending detainees to other countries if there is a reasonable expectation that they may be tortured. [United Nations High Commissioner for Human Rights, 12/10/1984; Human Rights Web, 1/25/1997]

Entity Tags: United Nations Committee against Torture, Convention Against Torture, United Nations

Timeline Tags: Civil Liberties

White separatist Terry Nichols (see March 24, 1988 - Late 1990, December 22 or 23, 1988, October 12, 1993 - January 1994, and February - July 1994) flees the scene of a robbery he has committed in Arkansas and goes to Council Grove, Kansas, where he has rented a storage locker (see November 7, 1994), and then to Las Vegas, to stash the proceeds of the robbery with his ex-wife, Lana Padilla (see November 5, 1994 and November 6, 1994). Nichols makes plans to leave for the Philippines to visit his family in Cebu City, and leaves a note to be opened only if he does not return (see Late 1992-Early 1993 and Late 1994) by January 28, 1995—days after the terrorist plot Operation Bojinka was to be executed (see January 6, 1995). Nichols leaves the US on November 11.
Opening the Note - Padilla, fearing her ex-husband has left her a suicide note, opens it after taking Nichols to the airport. The note, titled “Read and Do Immediately,” instructs Padilla to send all of Nichols’s cash and valuables, including the loot from the robbery, to his wife Marife Nichols in Cebu City (see July - December 1990). Some of the cash and valuables, he says, is in a Las Vegas storage unit, and some is hidden in Padilla’s kitchen, behind a wooden panel in the back of her kitchen utility drawer. “As of now, only Marife, you, and myself know what there is and where it is. I hope you will do as I have stated. Josh has just a few years before he’s capable of being on his own and Marife and Nicole [Nichols’s young daughter by Marife—see (September 30, 1994)] have many more years of support needed. There is no need to tell anyone about the items in storage and at home.” After reading the note, Padilla is convinced Nichols intends to kill himself. She follows the directions in the note, breaks through the wooden panel behind her utility drawer, and finds $20,000 in cash in a plastic baggie.
Note to Fellow Bombing Conspirator - The note also contains two letters to Nichols’s fellow conspirator in the Oklahoma City bombing plan, Timothy McVeigh (see September 13, 1994, October 20, 1994, and 8:35 a.m. - 9:02 a.m. April 19, 1995), both addressed to “Tim.” The first tells McVeigh how to access the Las Vegas storage locker and where his blue pickup truck will be parked for his use if he needs it. Padilla drives to the Las Vegas storage locker and finds a box of carved jade, camera equipment, precious stones, and a ski mask. Much of this material will later be connected to the Arkansas robbery. The second letter to McVeigh instructs him to “clear everything out of CG 37” and to “also liquidate 40,” apparently referring to two storage lockers Nichols has rented in Council Grove (see October 17, 1994, and November 7, 1994) under the alias “Ted Parker,” which contain, among other items, a store of explosive fertilizer and some of the guns stolen in the Arkansas robbery. If he chooses, Nichols writes, McVeigh can pay for further rentals on the lockers instead of clearing them out. He warns McVeigh about possible law enforcement attention, writing: “As far as heat—none that I know. This letter would be for the purpose of my death.” The letter concludes: “Your [sic] on your own. Go for it!” Based on the instructions regarding the fertilizer, federal authorities will come to believe that Nichols is instructing McVeigh to go ahead with plans to bomb a federal building in Oklahoma City (see 8:35 a.m. - 9:02 a.m. April 19, 1995).
Return to the US - Nichols will return to the US on January 16, 1995 and, after staying a few days at Padilla’s home in Las Vegas, settle in Herington, Kansas, a tiny town not far from the ranch where he recently worked (see (September 30, 1994)). [New York Times, 5/28/1995; PBS Frontline, 1/22/1996; New York Times, 11/20/1997; Washington Post, 12/24/1997; Serrano, 1998, pp. 112-114; Douglas O. Linder, 2001; Nicole Nichols, 2003]
Later Attempts to Explain Letter, Actions - In his statement to the FBI (see 3:15 p.m. and After, April 21-22, 1995), Nichols will claim to have returned to the US on November 17. The indictment against Nichols will allege that he rented a storage locker in Las Vegas on November 16, based in part on his FBI statement. These dates do not correspond with other evidence showing Nichols remains in the Philippines until January 16. A chronology of events compiled by McVeigh’s lawyers (see Early 2005) also has McVeigh staying in Arkansas and New Mexico motels with Nichols in mid-December 1994. These contradictions are never adequately explained. [PBS Frontline, 1/22/1996] Nichols will also tell authorities that the phrase “Go for it!” is nothing more than an innocent reference to an old sales pitch he and his ex-wife had used in the early days of their marriage. The government authorities will not believe Nichols’s explanation. [Serrano, 1998, pp. 114] After the bombing, Padilla will tell authorities that Nichols gave her a key to a storage locker at the AAAABCO storage facility in Las Vegas, as stated in his note. The locker, she will say, contained thousands of dollars in gold and silver bouillon, tubular pipe, ski masks, and other items (see May 9, 1995 and May 11, 1995), many of which will be linked to the Arkansas robbery. After the bombing, FBI investigators will find a key to a safe-deposit box from the robbery in Nichols’s Herington home (see (February 20, 1995)) along with other items from the robbery. [New York Times, 5/9/1995; New York Times, 5/12/1995; New York Times, 5/28/1995; New York Times, 11/20/1997]

Entity Tags: Terry Lynn Nichols, Timothy James McVeigh, Marife Torres Nichols, Roger E. (“Bob”) Moore, Lana Padilla

Timeline Tags: US Domestic Terrorism

Page 1 of 9 (868 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike