!! History Commons Alert, Exciting News

Context of 'November-December 2000: Able Danger Stops Data Collection and Moves into Operational Phase'

This is a scalable context timeline. It contains events related to the event November-December 2000: Able Danger Stops Data Collection and Moves into Operational Phase. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

The Able Danger data collection program—which lost the support of the US Army’s Land Information Warfare Activity (LIWA) unit last April (see April 2000)—is reconstituted and moved to a private intelligence research center run by Raytheon in Garland, Texas. While the program worked only with unclassified data under LIWA, the new Able Danger, referred to by some as “Able Danger II,” has permission to mine classified information as well. [US Congress, 9/21/2005; US Congress, 9/21/2005] SOCOM apparently believes that this new arrangement will allow Able Danger to do its work free of some of the political interference that had hobbled the earlier effort. Other data mining teams at LIWA work on non-al-Qaeda related projects while Able Danger continue to focus on al-Qaeda. [National Journal, 12/3/2005] Most accounts have the first version of Able Danger in early 2000 being the version that identified Mohamed Atta and three other 9/11 hijackers. However, according to Representative Curt Weldon (R-PA), a Raytheon employee named Bob Johnson will later claim that Atta is independently identified by this second version of Able Danger as well (see November 11, 2005).

Entity Tags: Land Information Warfare Activity, Able Danger

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Special Assistant to the Secretary and Deputy Secretary of Defense Stephen Cambone will later state, “[T]he purpose of Able Danger was to develop a campaign plan. By November of 2000, the Garland effort was terminated—that is, the activity with Raytheon—and resources were shifted to the development of the actual draft of the campaign plan. That is, for a period of about five months or so, continuous effort was made to develop the tools. But by the time we come to the end of 2000, we need the plan. And so, SOCOM decides that it’s going to put its resources against developing the plan, terminate the activity at Garland, Texas, and begins to draft the plan. That plan, in the end, was rolled into a larger activity within the Joint Staff in the early 2001 timeframe, and that larger plan has within it components that are very much connected to the heritage of the Able Danger activity.… As best we can ascertain, US SOCOM had Raytheon, at the end of its effort in November of 2000, take most of the data that had been generated at Raytheon, and take it out of its system, essentially to purge it. A small percentage of information, roughly about one percent of that developed at Garland, was in turn transferred over to US Special Operations Command.” Cambone says the reason for this second massive data purge was, “[W]here we are by the end of the year 2000 is that, information that had been generated at LIWA [Land Information Warfare Activity] runs up against the concern about US persons information being stored improperly, as well as having the authority to do the operation for the Army.” [US Congress, 2/15/2006] Lt. Col. Anthony Shaffer will later blame the retirement of Gen. Pete Schoomaker in October 2000 and his replacement by Gen. Charles Holland as a major reason for the shut down of the data mining effort. He says, “Gen. Holland, in my judgment, did not understand the concept, and order[ed] the effort to terminate its activities in Garland, Texas, and for the personnel to return to Tampa [Florida, the location of SOCOM headquarters].” Over the next few months, Holland will direct Able Danger to change into the Special Operations Joint Integration Center (SOJIC). According to Shaffer, “the teeth and operational focus [are] removed and the capability to do the complex data mining and mission planning support (leadership support) is eliminated,” effectively ending Able Danger. [US Congress, 2/15/2006 pdf file]

Entity Tags: Land Information Warfare Activity, Able Danger, Charles Holland, Raytheon, Stephen A. Cambone, Anthony Shaffer

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

During a briefing on another classified program called Dorkawk Galley, Able Danger is again brought up. This briefing, given by Lt. Col. Anthony Shaffer, is attended by Vice Adm. Thomas Wilson, director of the Defense Intelligence Agency; Richard Schiffrin, an attorney at DOD; and Stephen Cambone, Special Assistant to the Secretary and Deputy Secretary of Defense. [Government Security News, 9/2005; Office of Congressman Curt Weldon, 9/17/2005 Sources: Curt Weldon] In mid-September 2005, Weldon will say, “I knew that the Clinton administration clearly knew about this.” Referring to this meeting and another meeting with the Joint Chiefs of Staff (see Early 2001), he will add, “Now I know of at least two briefings in the Bush administration.” He calls these two briefings “very troubling.” He wants to know what became of the information presented in these briefings, suggesting it shouldn’t have been destroyed as part of the other Able Danger data purges. [Delaware County Daily Times, 9/16/2005; Office of Congressman Curt Weldon, 9/17/2005]

Entity Tags: Stephen A. Cambone, Thomas Wilson, Richard Schiefren, Clinton administration, Able Danger, Anthony Shaffer, Bush administration (43), Henry Hugh Shelton

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Representative Curt Weldon (R-PA) claims in a press conference that Bob Johnson, an employee of the defense contractor Raytheon, claims to have independently identified Mohamed Atta prior to 9/11. The second version of Able Danger in late 2000 was associated with Raytheon while the first version was not, so presumably Johnson’s identification of Atta would have taken place then. If true, that would mean that both versions of Able Danger identified Atta independently of each other in early 2000 and late 2000, respectively. Weldon claims that this is the sixth person to corroborate the claim that Atta was identified prior to the 9/11 attacks. [Times Herald (Norristown), 11/11/2005]

Entity Tags: Curt Weldon, Bob Johnson, Able Danger, Mohamed Atta

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike