!! History Commons Alert, Exciting News

Context of 'November 17, 2001: Laura Bush, State Department Decry Taliban Oppression of Women'

This is a scalable context timeline. It contains events related to the event November 17, 2001: Laura Bush, State Department Decry Taliban Oppression of Women. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Page 1 of 11 (1003 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 | next

After the failure of the US federal government under the Articles of Confederation, the men working to shape the new American government—later termed the “Founders”—determine that the new government must have a president with power equal to that of Congress and the Supreme Court. The federal government itself has far more power under the new Constitution than it had under the Articles, but many Founders worry that the government will have, or take upon itself, the power to constrain or even destroy individual rights and freedoms. The government, therefore, will have strict limitations on its functions, and will be divided into three co-equal branches. Debate over whether the new government should have a single president or an executive council rages, but eventually the Founders decide that a single president could best act decisively in times of crisis. However, Congress has the strength to curtail presidential power via legislation and oversight. One of the Founders’ most crucial decisions is to give Congress, not the president, the power to declare war and commit military troops to battle. Congress must also authorize any military actions that fall short of actual war, the creation and maintenance of armies, and exercise control over how the president can call on the armed forces in emergencies. Finally, the Founders, all too aware that until the English Revolution of 1688, the King of England could use his “prerogative powers” to dispense with a law that he felt unnecessary, move to ensure that the US president cannot use a similar usurpation of power to override Congressional legislation, writing in the Constitution that the president must “take care that the laws be faithfully executed.” In 2007, reporter Charlie Savage, drawing on James Madison’s Federalist Papers, will write: “Knowing that it was inevitable that from time to time foolish, corrupt, or shortsighted individuals would win positions of responsibility in the government, the Founders came up with a system that would limit anyone’s ability to become a tyrant or to otherwise wreck the country. And over the next century and a half, the system worked as the Founders had designed it to work.” [Savage, 2007, pp. 14-16]

Entity Tags: James Madison, Charlie Savage

Timeline Tags: Civil Liberties

James Madison, one of the founders of the American system of constitutional government (see 1787), writes of the importance of Congress, not the president, retaining the power to send the nation to war. “Those who are to conduct a war cannot, in the nature of things, be proper or safe judges,” he writes, “whether a war ought to be commenced, continued, or concluded. They are barred from the latter functions by a great principle in free government, analagous to that which separates the sword from the purse, or the power from executing from the power of enacting laws.” [Savage, 2007, pp. 19]

Entity Tags: James Madison

Timeline Tags: Civil Liberties

Senator Benjamin Tillman, an ardent segregationist who once said, ‘My Democracy means white supremacy.’ Senator Benjamin Tillman, an ardent segregationist who once said, ‘My Democracy means white supremacy.’ [Source: Black Americans in Congress]President Theodore “Teddy” Roosevelt signs the Tillman Act into law. The Act prohibits monetary contributions to national political campaigns by corporations and national banks. Roosevelt, dogged by allegations that he had accepted improper donations during his 1904 presidential campaign, has pushed for such restrictions since he took office (see August 23, 1902 and December 5, 1905). [Federal Elections Commission, 1998; Center for Responsive Politics, 2002 pdf file; Moneyocracy, 2/2012] Senator Benjamin Tillman (D-SC), later described by National Public Radio as a “populist and virulent racist,” sponsored the bill. [National Public Radio, 2012] In 1900, Tillman was quoted as saying about black voters: “We have done our level best. We have scratched our heads to find out how we could eliminate every last one of them. We stuffed ballot boxes. We shot them. We are not ashamed of it.” [Atlas, 2010, pp. 205] Unfortunately, the law is easily circumvented. Businesses and corporations give employees large “bonuses” with the understanding that the employee then gives the bonus to a candidate “endorsed” by the firm. Not only do the corporations find and exploit this loophole, they receive an additional tax deduction for “employee benefits.” The law will be amended to cover primary elections in 1911 (see 1911). [Campaign Finance Timeline, 1999]

Entity Tags: Benjamin Tillman, Theodore Roosevelt, Tillman Act

Timeline Tags: Civil Liberties

The German Reich Ministry of Justice issues a secret memo following a meeting of several Justice Ministry lawyers and public prosecutors with senior Gestapo officers. The participants discuss the fact that Germany has been on a war footing for years, and the leaders’ worry that the citizenry is riddled with sleeper cells of subversives. The solution: detaining and torturing subversives. It is unclear whether torture will be used to terrorize other subversives, to extract information, or produce confessions. German law enforcement officials are balky at applying “more rigorous interrogation” techniques. Though some judges seem unmoved by defendants appearing in court with obvious marks of torture upon their bodies, the law enforcement officers are bureaucrats in a system that has always respected the rule of law and the Hitler government was originally elected on a law-and-order platform. The memo is the product of the top officials in the Gestapo and Justice Ministry, and lays out detailed instructions as to when torture techniques can be applied, the specific equipment used in such interrogations, and how many times particular techniques could be used on certain categories of detainees. Perhaps most importantly, the memo promises immunity from prosecution to any German interrogator who follows the rules as laid down in the memo.
Specific Instructions - It reads in part: “At present, we thus have a situation which cannot continue: a deficient sense of what is right on the part of judicial officers; an undignified position for police officers, who try to help matters by foolish denials [that torture has taken place in court proceedings].… [I]nterrogations of this kind [torture] may be undertaken in cases where charges involve the immediate interests of the state.… chiefly treason and high treason. Representatives of the Gestapo expressed the opinion that a more rigorous interrogation could also be considered in cases of Jehovah’s Witnesses, explosives, and sabotage.… As a general principle, in more rigorous interrogations only blows with a club on the buttocks are permissible, up to 25 such blows. The number is to be determined in advance by the Gestapo.… Beginning with the tenth blow, a physician must be present. A standard club will be designated, to eliminate all irregularities.” Gestapo Headquarters in Berlin must give permission for more “rigorous interrogation[s],” the memo continues.
Drawing Parallels to Bush Administration Torture - The memo will be the subject of a 2009 article by Shayana Kadidal, the senior managing attorney of the Guantanamo project at the Center for Constitutional Rights. Kadidal will draw parallels between the Nazi torture authorization and similar legal justifications issued by the American government after the 9/11 attacks (see March 2, 2009 and April 21, 2009). Kadidal will write: “I realize that, as a matter of principle, there is a strong bias against making Nazi analogies to any events happening in our modern world.… But here we have: (1) a system set up to allow torture on certain specific individual detainees, (2) specifying standardized equipment for the torture (apparently down to the exact length of the club to be used), along with physician participation to ensure survival of the victim for the more several applications, (3) requiring prior approval of the use of torture from the central authorities in the justice department and intelligence agency in the capital, so as to ensure that (6) the local field officers actually carrying out the abuse are immune from prosecution.” [Huffington Post, 4/21/2009]

Entity Tags: Gestapo, Shayana Kadidal, German Reich Ministry of Justice

Timeline Tags: Torture of US Captives

President Roosevelt, using what he calls his inherent power as commander in chief, creates a military commission to try eight Nazi saboteurs captured inside the US in the case of Ex parte Quirin. The eight are quickly found guilty and sentenced to death. The Supreme Court later backs Roosevelt’s authority to have them tried by a commission. The Court’s decision is unusually hasty, and several of the justices who voted in Roosevelt’s favor later express regret for their approval. Roosevelt himself is unsure of the procedure’s legality, the Court’s decision and his own powers as president notwithstanding. When more Nazi saboteurs are captured later in the war, they are tried in criminal courts. [Savage, 2007, pp. 136]

Entity Tags: US Supreme Court, Franklin Delano Roosevelt

Timeline Tags: Civil Liberties

Sherwood F. Moran (right) interrogating a Japanese prisoner during the battle of Guadalcanal.Sherwood F. Moran (right) interrogating a Japanese prisoner during the battle of Guadalcanal. [Source: Associated Press]Marine interrogator Major Sherwood F. Moran writes an informal memo for use by other interrogators. Moran is a legendary figure among Marines, renowned for his ability to coax information from the most reluctant or resistant Japanese captive, even during the height of battle, and often using his knowledge of, and respect for, Japanese culture to his advantage. His memo will remain relatively unknown outside the Marine Corps until the summer of 2003, when it will be included in the archives of the Marine Corps Interrogator Translator Teams Association. The memo, titled “Suggestions for Japanese Interpreters Based on Work in the Field,” is remarkable for its insistence that treating prisoners with humanity and respect works far better than “harsh” interrogation methods. Author Ulrich Straus, an expert on Japanese POWs held in US captivity during World War II, will later write that Moran “was a particularly effective interrogator because he treated each prisoner as another human rather than as the enemy.” In 2005, after the Abu Ghraib scandals become media fodder, military historian Stephen Budiansky will write: “Six months before the abuses at Abu Ghraib prison broke into public view, a small and fairly obscure private association of United States Marine Corps members posted on its Web site a document on how to get enemy POWs to talk. The document described a situation very similar to the one the United States faces in the insurgencies in Iraq and Afghanistan: a fanatical and implacable enemy, intense pressure to achieve quick results, a brutal war in which the old rules no longer seem to apply.… Moran, the report’s author, noted that despite the complexities and difficulties of dealing with an enemy from such a hostile and alien culture, some American interrogators consistently managed to extract useful information from prisoners. The successful interrogators all had one thing in common in the way they approached their subjects. They were nice to them. Moran was writing in 1943, and he was describing his own, already legendary methods of interrogating Japanese prisoners of war. More than a half century later his report remains something of a cult classic for military interrogators.” [David R. Moran, 2005]
Human-to-Human Attitude - Moran writes that the best interrogators (whom he says should consider themselves “interviewers”) become “wooers” of their captives, coaxing information rather than attempting to force confessions. Most important, Moran writes, is the interrogator’s attitude towards his prisoner. “Many people, I suppose, would on first thought think ‘attitude’ had nothing to do with it; that all one needs is a knowledge of the language, then shoot out questions, and expect and demand a reply,” he writes. “Of course that is a very unthinking and naive point of view.” Just as important, Moran writes, is a sympathy and understanding of the captive’s culture. A superior or demeaning attitude breeds nothing but antagonism and resistance.
Speaking the Language of the Captive - Almost as important, Moran notes, is the interrogator’s ability to speak directly to the captive in his own language, without the need for translators. An interrogator should speak the language fluently and idiomatically, or, when that is not possible, to at least have some command over common phrases. “After all, the first and most important victory for the interviewer to try to achieve is to get into the mind and into the heart of the person being interviewed,” he writes.
Hidden System - Fellow feelings and warm sympathy towards the captive are necessary, but not the entire package. While the captive, or an outside observer, might believe that the interrogator is merely indulging in friendly chit-chat, the interrogator must have an agenda and a plan in place at all times. “[I]n the workings of your mind you must be a model of system,” Moran says. “You must know exactly what information you want, and come back to it repeatedly. Don’t let your warm human interest, your genuine interest in the prisoner, cause you to be sidetracked by him! You should be hard-boiled but not half-baked. Deep human sympathy can go with a business-like, systematic, and ruthlessly persistent approach.”
Short-Circuiting Patriotic Defensiveness - To emphasize that your side, your nation, or your culture is superior—in essence, the “conquerors” of the captive’s military or his nation—is counterproductive, Moran writes. “To emphasize that we are enemies, to emphasize that he is in the presence of his conqueror, etc., puts him psychologically in the position of being on the defensive, and that because he is talking to a most-patient enemy and conqueror he has no right and desire to tell anything,” he writes.
Breaking Recalcitrant Prisoners - Sometimes even the best interrogators come up against recalcitrant prisoners who flatly refuse, for patriotic reasons or what Moran calls “conscientious scruples,” to give any information. In these cases, Moran writes, harsh or physical techniques of intelligence extraction are counterproductive. Instead, he writes, with his Japanese captives he is often able to shame the prisoner into cooperating. Reminding the captive that he has been treated humanely, has been treated with kindness and courtesy, implies a quid pro quo—not the threat of having this treatment withdrawn if cooperation is not forthcoming, but a matter of the captive returning the interrogator’s courtesy with information. [Moran, 7/17/1943 pdf file]

Entity Tags: US Marine Corps, Ulrich Straus, Stephen Budiansky, Sherwood F. Moran, Marine Corps Interrogator Translator Teams Association

Timeline Tags: Torture of US Captives

The NSA, working with British intelligence, begins secretly intercepting and reading millions of telegraph messages between US citizens and international senders and recipients. The clandestine program, called Operation Shamrock and part of a larger global surveillance network collectively known as Echelon (see April 4, 2001 and Before September 11, 2001), begins shortly after the end of World War II, and continues through 1975, when it is exposed by the “Church Committee,” the Senate investigation of illegal activities by US intelligence organizations (see April, 1976). [Telepolis, 7/25/2000] The program actually predates the NSA, originating with the Armed Forces Security Agency (AFSA) then continuing when that turned into NSA (see 1952). [Pensito Review, 5/13/2006] The program operates in tandem with Project Minaret (see 1967-1975). Together, the two programs spy on both foreign sources and US citizens, especially those considered “unreliable,” such as civil rights leaders and antiwar protesters, and opposition figures such as politicians, diplomats, businessmen, trades union leaders, non-government organizations like Amnesty International, and senior officials of the Catholic Church. The NSA receives the cooperation of such telecommunications firms as Western Union, RCA, and ITT. [Telepolis, 7/25/2000] (Those companies are never required to reveal the extent of their involvement with Shamrock; on the recommendations of Defense Secretary Donald Rumsfeld and presidential chief of staff Dick Cheney, in 1975 President Ford extends executive privilege to those companies, precluding them from testifying before Congress.) [Pensito Review, 5/13/2006] In the 1960s, technological advances make it possible for computers to search for keywords in monitored messages instead of having human analysts read through all communications. In fact, the first global wide-area network, or WAN, is not the Internet, but the international network connecting signals intelligence stations and processing centers for US and British intelligence organizations, including the NSA, and making use of sophisticated satellite systems such as Milstar and Skynet. (The NSA also builds and maintains one of the world’s first e-mail networks, completely separate from public e-mail networks, and highly secret.) At the program’s height, it operates out of a front company in Lower Manhattan code-named LPMEDLEY, and intercepts 150,000 messages a month. In August 1975, NSA director Lieutenant General Lew Allen testifies to the House of Representatives’ investigation of US intelligence activities, the Pike Committee (see January 29, 1976), that “NSA systematically intercepts international communications, both voice and cable.” He also admits that “messages to and from American citizens have been picked up in the course of gathering foreign intelligence,” and acknowledges that the NSA uses “watch lists” of US citizens “to watch for foreign activity of reportable intelligence interest.” [Telepolis, 7/25/2000] The Church Committee’s final report will will call Shamrock “probably the largest government interception program affecting Americans ever undertaken.” [Church Committee, 4/23/1976] Shortly after the committee issues its report, the NSA terminates the program. Since 1978, the NSA and other US intelligence agencies have been restrained in their wiretapping and surveillance of US citizens by the Foreign Intelligence Surveillance Act (see 1978). Admiral Bobby Ray Inman, who will become the NSA’s director in 1977, and who testifies before the Church Committee as director of Naval Intelligence, will later say that he worked actively to help pass FISA: “I became convinced that for almost anything the country needed to do, you could get legislation to put it on a solid foundation. There was the comfort of going out and saying in speeches, ‘We don’t target US citizens, and what we do is authorized by a court.’” [Pensito Review, 5/13/2006] Shamrock is considered unconstitutional by many US lawmakers, and in 1976 the Justice Department investigates potential criminal offenses by the NSA surrounding Shamrock. Part of the report will be released in 1980; that report will confirm that the Shamrock data was used to further the illegal surveillance activities of US citizens as part of Minaret. [Telepolis, 7/25/2000]
bullet After 9/11, the NSA will once again escalate its warrantless surveillance of US citizens, this time monitoring and tracking citizens’ phone calls and e-mails (see After September 11, 2001). It will also begin compiling an enormous database of citizens’ phone activities, creating a “data mine” of information on US citizens, ostensibly for anti-terrorism purposes (see October 2001).

Entity Tags: Western Union, Pike Committee, National Security Agency, Bobby Ray Inman, Church Committee, International Telephone and Telegraph, Radio Corporation of America

Timeline Tags: Civil Liberties

1952: NSA Founded

The National Security Agency (NSA) is founded. It is the successor to the State Department’s “Black Chamber” and other military code-breaking and eavesdropping operations dating back to the earliest days of telegraph and telephone communications. It will eventually become the largest of all US intelligence agencies, with over 30,000 employees at its Fort Meade, Maryland, headquarters. It focuses on electronic surveillance, operating a large network of satellites and listening devices around the globe. More even than the CIA, the NSA is the most secretive of US intelligence organizations, [New York Times, 12/16/2005] The agency will remain little known by the general public until the release of the 1998 film Enemy of the State, which will portray the NSA as an evil “Big Brother” agency spying on Americans as a matter of course. [CNN, 3/31/2001] After it is disclosed during the 1970s that the NSA spied on political dissenters and civil rights protesters, the NSA will be restricted to operating strictly overseas, and will be prohibited from monitoring US citizens within US borders without special court orders. [New York Times, 12/16/2005]

Entity Tags: US Department of State, Central Intelligence Agency, George W. Bush, National Security Agency

Timeline Tags: Civil Liberties

The US Supreme Court rules that the federal government cannot seize the nation’s steel mills. In April, President Truman, fearing a nationwide strike that could impact the US war effort in Korea, ordered the seizure of all US steel mills; the lawsuit that resulted, Youngstown Sheet & Tube Co. v. Sawyer, quickly made its way to the Supreme Court.
Rejection of 'Inherent Powers' Claim - During oral arguments, the justices grilled Acting Attorney General Philip Perlman, demanding to know what statutes he had relied on for his arguments and asserting that the president had limitations both on his emergency wartime powers and on his ability to claim that he is the “sole judge” of the existence of, and remedies for, an emergency. The justices are not convinced by the government’s arguments for the president’s “inherent powers.” They are also troubled by repeated refusals of the government to provide facts and documentary backing for its legal arguments, and its reliance instead on claims of “national security.” The attorney for the steel industry, John Davis, quoted Thomas Jefferson in his argument: “In questions of power, let no more be said of confidence in man, but bind him down from mischief by the chains of the Constitution.” Justice William O. Douglas noted that if the government’s claims were valid, there would be “no more need for Congress.”
Court Rejects Argument - In a 6-3 vote, the Court rules that the president has no inherent power to seize the steel mills. Writing for the majority, Justice Hugo Black states: “In the framework of our Constitution, the president’s power to see that the laws are faithfully executed refutes the idea that he is to be a lawmaker.… The founders of this nation entrusted the lawmaking power to the Congress alone in both good and bad times.… This is a job for the nation’s lawmakers.” In a concurring opinion, Justice Robert Jackson writes, “No penance would ever expiate the sin against free government of holding that a president can escape control of executive powers by law through assuming his military role.” In his dissent, Chief Justice Fred Vinson (see March 1952) argues that “the gravity of the emergency” overrides the Constitutional arguments accepted by the majority of the Court. “Those who suggest that this is a case involving extraordinary powers should be mindful that these are extraordinary times. A world not yet recovered from the devastation of World War II has been forced to face the threat of another and more terrifying global conflict.” [Savage, 2007, pp. 123; Siegel, 2008, pp. 163-164] In 2007, reporter and author Charlie Savage will observe that the Youngstown decision “turned out to be only a pause in the movement toward an increasingly authoritarian presidency.” [Savage, 2007, pp. 19]

Entity Tags: William O. Douglas, John Davis, Hugo Black, Charlie Savage, Fred Vinson, Harry S. Truman, Philip Perlman, US Supreme Court

Timeline Tags: Civil Liberties

Chief Justice Fred Vinson.Chief Justice Fred Vinson. [Source: Kansas State Historical Society]The US Supreme Court upholds the power of the federal government’s executive branch to withhold documents from a civil suit on the basis of executive privilege and national security (see October 25, 1952). The case, US v Reynolds, overturns an appellate court decision that found against the government (see December 11, 1951). Originally split 5-4 on the decision, the Court goes to 6-3 when Justice William O. Douglas joins the majority. The three dissenters, Justices Hugo Black, Felix Frankfurter, and Robert Jackson, refuse to write a dissenting opinion, instead adopting the decision of the appellate court as their dissent.
'State Secrets' a Valid Reason for Keeping Documents out of Judicial, Public Eye - Chief Justice Fred Vinson writes the majority opinion. Vinson refuses to grant the executive branch the near-unlimited power to withhold documents from judicial review, as the government’s arguments before the court implied (see October 21, 1952), but instead finds what he calls a “narrower ground for defense” in the Tort Claims Act, which compels the production of documents before a court only if they are designated “not privileged.” The government’s claim of privilege in the Reynolds case was valid, Vinson writes. But the ruling goes farther; Vinson upholds the claim of “state secrets” as a reason for withholding documents from judicial review or public scrutiny. In 2008, author Barry Siegel will write: “In truth, only now was the Supreme Court formally recognizing the privilege, giving the government the precedent it sought, a precedent binding on all courts throughout the nation. Most important, the Court was also—for the first time—spelling out how the privilege should be applied.” Siegel will call the Reynolds ruling “an effort to weigh competing legitimate interests,” but the ruling does not allow judges to see the documents in order to make a decision about their applicability in a court case: “By instructing judges not to insist upon examining documents if the government can satisfy that ‘a reasonable danger’ to national security exists, Vinson was asking jurists to fly blind.” Siegel will mark the decision as “an act of faith. We must believe the government,” he will write, “when it claims [the accident] would reveal state secrets. We must trust that the government is telling the truth.”
Time of Heightened Tensions Drives Need for Secrecy - Vinson goes on to note, “[W]e cannot escape judicial notice that this is a time of vigorous preparation for the national defense.” Locked in the Cold War with the Soviet Union, and fighting a war in Korea, the US is, Vinson writes, in a time of crisis, and one where military secrets must be kept and even encouraged. [U. S. v. Reynolds, 3/9/1953; Siegel, 2008, pp. 171-176]
Future Ramifications - Reflecting on the decision in 2008, Siegel will write that while the case will not become as well known as many other Court decisions, it will wield significant influence. The ruling “formally recognized and established the framework for the government’s ‘state secrets’ privilege—a privilege that for decades had enabled federal agencies to conceal conduct, withhold documents, and block civil litigation, all in the name of national secrecy.… By encouraging judicial deference when the government claimed national security secrets, Reynolds had empowered the Executive Branch in myriad ways. Among other things, it had provided a fundamental legal argument for much of the Bush administration’s response to the 9/11 terrorist attacks. Enemy combatants such as Yaser Esam Hamdi (see December 2001) and Jose Padilla (see June 10, 2002), for many months confined without access to lawyers, had felt the breath of Reynolds. So had the accused terrorist Zacarias Moussaoui when federal prosecutors defied a court order allowing him access to other accused terrorists (see March 22, 2005). So had the Syrian-Canadian Maher Arar (see September 26, 2002), like dozens of others the subject of a CIA extraordinary rendition to a secret foreign prison (see After September 11, 2001). So had hundreds of detainees at the US Navy Base at Guantanamo Bay, held without charges or judicial review (see September 27, 2001). So had millions of American citizens, when President Bush, without judicial knowledge or approval, authorized domestic eavesdropping by the National Security Agency (see Early 2002). US v. Reynolds made all this possible. The bedrock of national security law, it had provided a way for the Executive Branch to formalize an unprecedented power and immunity, to pull a veil of secrecy over its actions.” [Siegel, 2008, pp. ix-x]

Entity Tags: William O. Douglas, Zacarias Moussaoui, US Supreme Court, Yaser Esam Hamdi, Robert Jackson, Jose Padilla, Felix Frankfurter, Bush administration (43), Fred Vinson, Barry Siegel, George W. Bush, Hugo Black, Maher Arar

Timeline Tags: Civil Liberties

In the case of United States v. Auto Workers, the Supreme Court reverses a lower court’s dismissal of an indictment against a labor union accused of violating federal laws prohibiting corporations and labor unions from making contributions or expenditures in federal elections (see June 23, 1947). Justice Felix Frankfurter writes the majority opinion; Chief Justice Earl Warren and Justices William O. Douglas and Hugo Black dissent. In a 5-3 decision, the Court finds the International Union United Automobile, Aircraft, and Agricultural Implement Workers of America liable for its practice of using union dues to sponsor television commercials relating to the 1954 Congressional elections. [UNITED STATES v. AUTO. WORKERS, 2011; Moneyocracy, 2/2012] Law professor Allison R. Hayward will later write that in her opinion the Court finding created “a fable of campaign finance reform… dictated by political opportunism. Politicians used reform to exploit public sentiment and reduce rivals’ access to financial resources.… [J]udges should closely examine campaign finance regulation and look for the improper use of legislation for political gain instead of simply deferring to Congress. Undue deference to the Auto Workers fable of reform could lead to punishment for the exercise of political rights. Correcting the history is thus essential to restoring proper checks on campaign finance legislation.” Hayward will argue that Frankfurter used a timeline of Congressional efforts to curb and reform campaign finance practices as an excuse to allow powerful political interests to exert restrictions on political opponents with less access to large election finance contributions. The case is used uncritically, and sometimes unfairly, to influence later campaign reform efforts, Hayward will argue. [Hayward, 6/17/2008 pdf file]

Entity Tags: US Supreme Court, Earl Warren, Allison R. Hayward, Felix Frankfurter, International Union United Automobile, Aircraft, and Agricultural Implement Workers of America, William O. Douglas, Hugo Black

Timeline Tags: Civil Liberties

US intelligence agencies, including the NSA, the CIA, and the FBI, run a clandestine and highly illegal surveillance operation called Project MINARET that uses “watch lists” to electronically and physically spy on “subversive” activities by civil rights and antiwar leaders such as Dr. Martin Luther King, Jr, Jane Fonda, Malcolm X, Dr. Benjamin Spock, and Joan Baez—all members of Richard Nixon’s infamous “enemies list.” [Patrick S. Poole, 8/15/2000; Pensito Review, 5/13/2006] MINARET operates in tandem with a much more extensive electronic surveillance operation, SHAMROCK, run by the NSA (see 1945-1975). Almost 6,000 foreigners and nearly 1,700 organizations and US citizens are monitored as part of MINARET. In August 1975, NSA director Lew Allen testifies before the Senate’s investigative commission on US intelligence activities, the Church Committee (see April, 1976), that the NSA has issued over 3,900 reports on the US citizens on MINARET’s watch lists, and the NSA’s Office of Security Services has maintained reports on at least 75,000 citizens between 1952 and 1975, reports that later became part of MINARET’s operations. MINARET, like SHAMROCK, will be terminated shortly after the Church Committee goes public with its information about the illegal surveillance program. [Bamford, 1983; Pensito Review, 5/13/2006]

Entity Tags: Malcolm Little, Central Intelligence Agency, Church Committee, Lew Allen, National Security Agency, Martin Luther King, Jr., Office of Security Services, Joan Baez

Timeline Tags: Civil Liberties

The NSA, following up on its successful pilot program of satellite-based intelligence gathering called “Canyon” (see 1968), develops a much more sophisticated satellite surveillance program called “Rhyolite.” Rhyolite, later renamed “Aquacade,” is a breakthrough in the world of signal intelligence (sigint). Most importantly, it can monitor microwave transmissions, used extensively by the Soviet Union for its most secure transmissions. Its possibilities, says one insider, are “mind-blowing.” Britain’s own security agency, GCHQ, is a full party to Rhyolite/Aquacade. Former Army sigint officer Owen Lewis recalls in 1997, “When Rhyolite came in, the take was so enormous that there was no way of handling it. Years of development and billions of dollars then went into developing systems capable of handling it.” The NSA will pass much of the information it gathers to the GCHQ for transcription and analysis. Subsequently, the NSA will deploy new and even more sophisticated surveillance systems, code-named “Chalet” and “Vortex.” In doing so, it constructs numerous listening stations on friendly foreign soil, including the Menwith Hill facility that will later become a linchpin of the satellite surveillance program known as Echelon (see February 27, 2000). The new programs will revitalize the lapsed sigint alliance between the US, Britain, Canada, Australia, and New Zealand (see July 11, 2001). [Federation of American Scientists, 7/17/1997]

Entity Tags: National Security Agency, Echelon, Rhyolite, Chalet, Government Communications Headquarters, Owen Lewis, Canyon

Timeline Tags: Civil Liberties

The US and the Soviet Union sign the Anti-Ballistic Missile Systems (ABM) Treaty. It will be ratified by the US Senate in August 1972, and will go into force in October 1972. Originally, the treaty agrees that each nation can have only two ABM deployment areas, located so that those areas cannot provide a nationwide ABM defense or become the basis for developing one. In essence, the ABM Treaty prevents either nation from developing a missile defense system (see March 23, 1983), and allows each country the likelihood of destroying the other with an all-out nuclear barrage. The treaty puts in place the doctrine of MAD, or Mutual Assured Destruction, which states that because both nations can obliterate the other in a nuclear exchange, neither one will trigger such a strike. In 1976, an addendum to the treaty further limits the number of ABM deployment areas from two to one; the Soviets will deploy a rudimentary ABM system around Moscow, but the US never does, and even deactivates its single ABM site near Grand Forks, North Dakota. In 2001, US President George W. Bush will unilaterally withdraw from the treaty (see December 13, 2001 and June 14, 2002). [Federation of American Scientists, 1/15/2008]

Entity Tags: Nixon administration, George W. Bush

Timeline Tags: US International Relations

The US Supreme Court, in what becomes informally known as the “Keith case,” upholds, 8-0, an appellate court ruling that strikes down warrantless surveillance of domestic groups for national security purposes. The Department of Justice had wiretapped, without court warrants, several defendants charged with destruction of government property; those wiretaps provided key evidence against the defendants. Attorney General John Mitchell refused to disclose the source of the evidence pursuant to the “national security” exception to the Omnibus Crime Control and Safe Streets Act of 1968. The courts disagreed, and the government appealed the decision to the Supreme Court, which upheld the lower courts’ rulings against the government in a unanimous verdict. The Court held that the wiretaps were an unconstitutional violation of the Fourth Amendment, establishing the judicial precedent that warrants must be obtained before the government can wiretap a US citizen. [US Supreme Court, 6/19/1972; Bernstein and Woodward, 1974, pp. 258-259] Critics of the Nixon administration have long argued that its so-called “Mitchell Doctrine” of warrantlessly wiretapping “subversives” has been misused to spy on anyone whom Nixon officials believe may be political enemies. [Bernstein and Woodward, 1974, pp. 258-259] As a result of the Supreme Court’s decision, Congress passes the Foreign Intelligence Surveillance Act. [John Conyers, 5/14/2003]
Opinion of Justice Powell - Writing for the Court, Justice Lewis Powell observes: “History abundantly documents the tendency of Government—however benevolent and benign its motives—to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the government attempts to act under so vague a concept as the power to protect ‘domestic security.’ Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent.” [US Supreme Court, 6/19/1972]
Justice Department Wiretapped Reporters, Government Officials - In February 1973, the media will report that, under the policy, the Justice Department had wiretapped both reporters and Nixon officials themselves who were suspected of leaking information to the press (see May 1969 and July 26-27, 1970), and that some of the information gleaned from those wiretaps was given to “Plumbers” E. Howard Hunt and G. Gordon Liddy for their own political espionage operations. [Bernstein and Woodward, 1974, pp. 258-259]
Conyers Hails Decision 30 Years Later - In 2003, Representative John Conyers (D-MI) will say on the floor of the House: “Prior to 1970, every modern president had claimed ‘inherent Executive power’ to conduct electronic surveillance in ‘national security’ cases without the judicial warrant required in criminal cases by the Fourth Amendment to the Constitution. Then Attorney General John Mitchell, on behalf of President Richard Nixon sought to wiretap several alleged ‘domestic’ terrorists without warrants, on the ground that it was a national security matter. Judge [Damon] Keith rejected this claim of the Sovereign’s inherent power to avoid the safeguard of the Fourth Amendment. He ordered the government to produce the wiretap transcripts. When the Attorney General appealed to the US Supreme Court, the Court unanimously affirmed Judge Keith. The Keith decision not only marked a watershed in civil liberties protection for Americans. It also led directly to the current statutory restriction on the government’s electronic snooping in national security cases.” [John Conyers, 5/14/2003]

Entity Tags: Lewis Powell, US Supreme Court, John Mitchell, E. Howard Hunt, US Department of Justice, G. Gordon Liddy, ’Plumbers’, Damon Keith, Richard M. Nixon

Timeline Tags: Civil Liberties, Nixon and Watergate

CIA Counterintelligence Director James Angleton.CIA Counterintelligence Director James Angleton. [Source: CI Centre.com]CIA Director James Schlesinger orders an internal review of CIA surveillance operations against US citizens. The review finds dozens of instances of illegal CIA surveillance operations against US citizens dating back to the 1950s, including break-ins, wiretaps, and the surreptitious opening of personal mail. The earlier surveillance operations were not directly targeted at US citizens, but against “suspected foreign intelligence agents operating in the United States.” Schlesinger is disturbed to find that the CIA is currently mounting illegal surveillance operations against antiwar protesters, civil rights organizations, and political “enemies” of the Nixon administration. In the 1960s and early 1970s, CIA agents photographed participants in antiwar rallies and other demonstrations. The CIA also created a network of informants who were tasked to penetrate antiwar and civil rights groups and report back on their findings. At least one antiwar Congressman was placed under surveillance, and other members of Congress were included in the agency’s dossier of “dissident Americans.” As yet, neither Schlesinger nor his successor, current CIA Director William Colby, will be able to learn whether or not Schlesinger’s predecessor, Richard Helms, was asked by Nixon officials to perform such illegal surveillance, though both Schlesinger and Colby disapproved of the operations once they learned of them. Colby will privately inform the heads of the House and Senate Intelligence Committees of the domestic spying engaged in by his agency. The domestic spying program was headed by James Angleton, who is still serving as the CIA’s head of counterintelligence operations, one of the most powerful and secretive bureaus inside the agency. It is Angleton’s job to maintain the CIA’s “sources and methods of intelligence,” including the prevention of foreign “moles” from penetrating the CIA. But to use counterintelligence as a justification for the domestic spying program is wrong, several sources with first-hand knowledge of the program will say in 1974. “Look, that’s how it started,” says one. “They were looking for evidence of foreign involvement in the antiwar movement. But that’s not how it ended up. This just grew and mushroomed internally.” The source continues, speaking hypothetically: “Maybe they began with a check on [Jane] Fonda. They began to check on her friends. They’d see her at an antiwar rally and take photographs. I think this was going on even before the Huston plan” (see July 26-27, 1970 and December 21, 1974). “This wasn’t a series of isolated events. It was highly coordinated. People were targeted, information was collected on them, and it was all put on [computer] tape, just like the agency does with information about KGB agents. Every one of these acts was blatantly illegal.” Schlesinger begins a round of reforms in the CIA, a program continued by Colby. [New York Times, 12/22/1974 pdf file]

Entity Tags: William Colby, Senate Intelligence Committee, Richard Helms, James Angleton, Jane Fonda, Nixon administration, Central Intelligence Agency, James R. Schlesinger, House Intelligence Committee

Timeline Tags: Civil Liberties

In the aftermath of the Watergate scandal (see August 8, 1974), amendments to the Federal Election Campaign Act (FECA—see February 7, 1972) provide the option for full public financing for presidential general elections, matching funds for presidential primaries, and public expenditures for presidential nominating conventions. The amendments also set spending limits on presidential primaries and general elections as well as for House and Senate primaries. The amendments give some enforcement provisions to previously enacted spending limits on House and Senate general elections. They set strict spending guidelines: for presidential campaigns, each candidate is limited to $10 million for primaries, $20 million for general elections, and $2 million for nominating conventions; Senatorial candidates are limited to $100,000 or eight cents per eligible voter, whichever is higher, for primaries, and higher limits of $150,000 or 12 cents per voter for general elections; House candidates are limited to $70,000 each for primaries and general elections. Loans are treated as contributions. The amendments create an individual contribution limit of $1,000 to a candidate per election and a PAC (political action committee) contribution limit of $5,000 to a candidate per election (this provision will trigger what the Center for Responsive Politics will call a “PAC boom” in the late 1970s). The total aggregate contributions from an individual are set at $25,000 per year. Candidates face further restrictions on how much personal wealth they can contribute to their own campaign. The 1940 ban on contributions from government employees and contract workers (see 1940) is repealed, as are the 1971 limitations on media spending. Perhaps most importantly, the amendments create the Federal Election Commission (FEC) to oversee and administer campaign law. (Before, enforcement and oversight responsibilities were spread among the Clerk of the House, the Secretary of the Senate, and the Comptroller General of the United States General Accounting Office (GAO), with the Justice Department responsible for prosecuting violators (see 1967).) The FEC is led by a board of six commissioners, with Congress appointing four of those commissioners and the president appointing two more. The Secretary of the Senate and the Clerk of the House are designated nonvoting, exofficio commissioners. [Federal Elections Commission, 1998; Campaign Finance Timeline, 1999; Center for Responsive Politics, 2002 pdf file] Part of the impetus behind the law is the public outrage over the revelations of how disgraced ex-President Nixon’s re-election campaign was funded, with millions of dollars in secret, illegal corporate contributions being funneled into the Nixon campaign. [Campaign Finance Timeline, 1999; Connecticut Network, 2006 pdf file]

Entity Tags: Center for Responsive Politics, Federal Election Campaign Act of 1972, Federal Election Commission, US Department of Justice

Timeline Tags: Civil Liberties

1974 New York Times headline.1974 New York Times headline. [Source: New York Times]The Central Intelligence Agency (CIA) has repeatedly, and illegally, spied on US citizens for years, reveals investigative journalist Seymour Hersh in a landmark report for the New York Times. Such operations are direct violations of the CIA’s charter and the law, both of which prohibit the CIA from operating inside the United States. Apparently operating under orders from Nixon officials, the CIA has conducted electronic and personal surveillance on over 10,000 US citizens, as part of an operation reporting directly to then-CIA Director Richard Helms. In an internal review in 1973, Helms’s successor, James Schlesinger, also found dozens of instances of illegal CIA surveillance operations against US citizens both past and present (see 1973). Many Washington insiders wonder if the revelation of the CIA surveillance operations tie in to the June 17, 1972 break-in of Democratic headquarters at Washington’s Watergate Hotel by five burglars with CIA ties. Those speculations were given credence by Helms’s protests during the Congressional Watergate hearings that the CIA had been “duped” into taking part in the Watergate break-in by White House officials.
Program Beginnings In Dispute - One official believes that the program, a successor to the routine domestic spying operations during the 1950s and 1960s, was sparked by what he calls “Nixon’s antiwar hysteria.” Helms himself indirectly confirmed the involvement of the Nixon White House, during his August 1973 testimony before the Senate Watergate investigative committee (see August 1973).
Special Operations Carried Out Surveillance - The domestic spying was carried out, sources say, by one of the most secretive units in CI, the special operations branch, whose employees carry out wiretaps, break-ins, and burglaries as authorized by their superiors. “That’s really the deep-snow section,” says one high-level intelligence expert. The liaison between the special operations unit and Helms was Richard Ober, a longtime CI official. “Ober had unique and very confidential access to Helms,” says a former CIA official. “I always assumed he was mucking about with Americans who were abroad and then would come back, people like the Black Panthers.” After the program was revealed in 1973 by Schlesinger, Ober was abruptly transferred to the National Security Council. He wasn’t fired because, says one source, he was “too embarrassing, too hot.” Angleton denies any wrongdoing.
Supposition That Civil Rights Movement 'Riddled' With Foreign Spies - Moscow, who relayed information about violent underground protesters during the height of the antiwar movement, says that black militants in the US were trained by North Koreans, and says that both Yasser Arafat, of the Palestinian Liberation Organization, and the KGB were involved to some extent in the antiwar movement, a characterization disputed by former FBI officials as based on worthless intelligence from overseas. For Angleton to make such rash accusations is, according to one member of Congress, “even a better story than the domestic spying.” A former CIA official involved in the 1969-70 studies by the agency on foreign involvement in the antiwar movement says that Angleton believes foreign agents are indeed involved in antiwar and civil rights organizations, “but he doesn’t know what he’s talking about.”
'Cesspool' of Illegality Distressed Schlesinger - According to one of Schlesinger’s former CIA associates, Schlesinger was distressed at the operations. “He found himself in a cesspool,” says the associate. “He was having a grenade blowing up in his face every time he turned around.” Schlesinger, who stayed at the helm of the CIA for only six months before becoming secretary of defense, informed the Department of Justice (DOJ) about the Watergate break-in, as well as another operation by the so-called “plumbers,” their burglary of Daniel Ellsberg’s psychiatrist’s office after Ellsberg released the “Pentagon Papers” to the press. Schlesinger began a round of reforms of the CIA, reforms that have been continued to a lesser degree by Colby. (Some reports suggest that CIA officials shredded potentially incriminating documents after Schlesinger began his reform efforts, but this is not known for sure.) Intelligence officials confirm that the spying did take place, but, as one official says, “Anything that we did was in the context of foreign counterintelligence and it was focused at foreign intelligence and foreign intelligence problems.”
'Huston Plan' - But the official also confirms that part of the illegal surveillance was carried out as part of the so-called “Huston plan,” an operation named for former White House aide Tom Charles Huston (see July 26-27, 1970) that used electronic and physical surveillance, along with break-ins and burglaries, to counter antiwar and civil rights protests, “fomented,” as Nixon believed, by so-called black extremists. Nixon and other White House officials have long denied that the Huston plan was ever implemented. “[O]bviously,” says one government intelligence official, the CIA’s decision to create and maintain dossiers on US citizens “got a push at that time.…The problem was that it was handled in a very spooky way. If you’re an agent in Paris and you’re asked to find out whether Jane Fonda is being manipulated by foreign intelligence services, you’ve got to ask yourself who is the real target. Is it the foreign intelligence services or Jane Fonda?” Huston himself denies that the program was ever intended to operate within the United States, and implies that the CIA was operating independently of the White House. Government officials try to justify the surveillance program by citing the “gray areas” in the law that allows US intelligence agencies to encroach on what, by law, is the FBI’s bailiwick—domestic surveillance of criminal activities—when a US citizen may have been approached by foreign intelligence agents. And at least one senior CIA official says that the CIA has the right to engage in such activities because of the need to protect intelligence sources and keep secrets from being revealed.
Surveillance Program Blatant Violation of Law - But many experts on national security law say the CIA program is a violation of the 1947 law prohibiting domestic surveillance by the CIA and other intelligence agencies. Vanderbilt University professor Henry Howe Ransom, a leading expert on the CIA, says the 1947 statute is a “clear prohibition against any internal security functions under any circumstances.” Ransom says that when Congress enacted the law, it intended to avoid any possibility of police-state tactics by US intelligence agencies; Ransom quotes one Congressman as saying, “We don’t want a Gestapo.” Interestingly, during his 1973 confirmation hearings, CIA Director Colby said he believed the same thing, that the CIA has no business conducting domestic surveillance for any purpose at any time: “I really see less of a gray area [than Helms] in that regard. I believe that there is really no authority under that act that can be used.” Even high-level government officials were not aware of the CIA’s domestic spying program until very recently. “Counterintelligence!” exclaimed one Justice Department official upon learning some details of the program. “They’re not supposed to have any counterintelligence in this country. Oh my God. Oh my God.” A former FBI counterterrorism official says he was angry upon learning of the program. “[The FBI] had an agreement with them that they weren’t to do anything unless they checked with us. They double-crossed me all along.” Many feel that the program stems, in some regards, from the long-standing mistrust between the CIA and the FBI. How many unsolved burglaries and other crimes can be laid at the feet of the CIA and its domestic spying operation is unclear. In 1974, Rolling Stone magazine listed a number of unsolved burglaries that its editors felt might be connected with the CIA. And Senator Howard Baker (R-TN), the vice chairman of the Senate Watergate investigative committee, has alluded to mysterious links between the CIA and the Nixon White House. On June 23, 1972, Nixon told his aide, H.R. Haldeman, “Well, we protected Helms from a hell of a lot of things.” [New York Times, 12/22/1974 pdf file]

Entity Tags: US Department of Justice, William Colby, Seymour Hersh, Rolling Stone, Richard Ober, Tom Charles Huston, Richard M. Nixon, Daniel Ellsberg, Federal Bureau of Investigation, Richard Helms, Central Intelligence Agency, Black Panthers, Howard Baker, James Angleton, New York Times, H.R. Haldeman, KGB, James R. Schlesinger, Jane Fonda, Henry Howe Ransom

Timeline Tags: Civil Liberties, Nixon and Watergate

Bella Abzug.Bella Abzug. [Source: Spartacus Educational]Staffers from the Church Committee (see April, 1976), slated with investigating illegal surveillance operations conducted by the US intelligence community, approach the NSA for information about Operation Shamrock (see 1945-1975). The NSA ostensibly closes Shamrock down the very same day the committee staffers ask about the program. Though the Church Committee focuses on a relatively narrow review of international cables, the Pike Committee in the House (see January 29, 1976) is much more far-ranging. The Pike Committee tries and fails to subpoena AT&T, which along with Western Union collaborated with the government in allowing the NSA to monitor international communications to and from the US. The government protects AT&T by declaring it “an agent of the United States acting under contract with the Executive Branch.” A corollary House subcommittee investigation led by Bella Abzug (D-NY)—who believes that Operation Shamrock continues under a different name—leads to further pressure on Congress to pass a legislative remedy. The Ford administration’s counterattack is given considerable assistance by a young lawyer at the Justice Department named Antonin Scalia. The head of the Office of Legal Counsel, Scalia’s arguments in favor of continued warrantless surveillance and the unrestricted rights and powers of the executive branch—opposed by, among others, Scalia’s boss, Attorney General Edward Levi—do not win out this time; Ford’s successor, Jimmy Carter, ultimately signs into law the Foreign Intelligence Surveillance Act (see 1978). But Scalia’s incisive arguments win the attention of powerful Ford officials, particularly Chief of Staff Donald Rumsfeld and Rumsfeld’s assistant, Dick Cheney. [Dubose and Bernstein, 2006, pp. 36-37] Scalia will become a Supreme Court Justice in 1986 (see September 26, 1986).

Entity Tags: Foreign Intelligence Surveillance Act, Church Committee, Bella Abzug, Antonin Scalia, AT&T, Donald Rumsfeld, Ford administration, National Security Agency, Western Union, James Earl “Jimmy” Carter, Jr., Edward Levi, Office of Legal Counsel (DOJ), Pike Committee, Richard (“Dick”) Cheney, US Department of Justice

Timeline Tags: Civil Liberties

Investigative journalist Seymour Hersh publishes an explosive story in the New York Times, revealing that US submarines are tapping into Soviet communications cables inside the USSR’s three-mile territorial limit. Hersh notes that his inside sources gave him the information in hopes that it would modify administration policy: they believe that using submarines in this manner violates the spirit of detente and is more risky than using satellites to garner similar information. The reaction inside both the Pentagon and the White House is predictably agitated. Chief of Staff Donald Rumsfeld, traveling in Europe with President Ford, delegates his deputy Dick Cheney to formulate the administration’s response. Cheney goes farther than most administration officials would have predicted. He calls a meeting with Attorney General Edward Levi and White House counsel Philip Buchan to discuss options. Cheney’s first thought is to either engineer a burglary of Hersh’s home to find classified documents, or to obtain search warrants and have Hersh’s home legally ransacked. He also considers having a grand jury indict Hersh and the Times over their publication of classified information. “Will we get hit with violating the 1st amendment to the constitution[?]” Cheney writes in his notes of the discussion. Levi manages to rein in Cheney; since the leak and the story do not endanger the spying operations, the White House ultimately decides to let the matter drop rather than draw further attention to it. Interestingly, Cheney has other strings to his bow; he writes in his notes: “Can we take advantage of [the leak] to bolster our position on the Church committee investigation (see April, 1976)? To point out the need for limits on the scope of the investigation?” [Dubose and Bernstein, 2006, pp. 34-35]

Entity Tags: Seymour Hersh, US Department of Defense, Ford administration, Edward Levi, Donald Rumsfeld, Church Committee, Richard (“Dick”) Cheney, Philip Buchan, New York Times, Gerald Rudolph Ford, Jr

Timeline Tags: Civil Liberties

Representative Otis Pike.Representative Otis Pike. [Source: Spartacus Educational]A House of Representatives committee, popularly known as the Pike Committee after its chairman, Otis Pike (D-NY), investigates questionable US intelligence activities. The committee operates in tandem with the Senate’s investigation of US intelligence activities, the Church Committee (see April, 1976). Pike, a decorated World War II veteran, runs a more aggressive—some say partisan—investigation than the more deliberate and politically balanced Church Committee, and receives even less cooperation from the White House than does the Church investigation. After a contentious year-long investigation marred by inflammatory accusations and charges from both sides, Pike refuses demands from the CIA to redact huge portions of the report, resulting in an accusation from CIA legal counsel Mitchell Rogovin that the report is an “unrelenting indictment couched in biased, pejorative and factually erroneous terms.” Rogovin also tells the committee’s staff director, Searle Field, “Pike will pay for this, you wait and see…. There will be a political retaliation…. We will destroy him for this.” (It is hard to know exactly what retaliation will be carried out against Pike, who will resign from Congress in 1978.)
Battle to Release Report - On January 23, 1976, the investigative committee voted along party lines to release the report unredacted, sparking a tremendous outcry among Republicans, who are joined by the White House and CIA Director William Colby in an effort to suppress the report altogether. On January 26, the committee’s ranking Republican, Robert McCory, makes a speech saying that the report, if released, would endanger national security. On January 29, the House votes 246 to 124 not to release the report until it “has been certified by the President as not containing information which would adversely affect the intelligence activities of the CIA.” A furious Pike retorts, “The House just voted not to release a document it had not read. Our committee voted to release a document it had read.” Pike threatens not to release the report at all because “a report on the CIA in which the CIA would do the final rewrite would be a lie.” The report will never be released, though large sections of it will be leaked within days to reporter Daniel Schorr of the Village Voice, and printed in that newspaper. Schorr himself will be suspended from his position with CBS News and investigated by the House Ethics Committee (Schorr will refuse to disclose his source, and the committee will eventually decide, on a 6-5 vote, not to bring contempt of Congress charges against him). [Spartacus Educational, 2/16/2006] The New York Times will follow suit and print large portions of the report as well. The committee was led by liberal Democrats such as Pike and Ron Dellums (D-CA), who said even before the committee first met, “I think this committee ought to come down hard and clear on the side of stopping any intelligence agency in this country from utilizing, corrupting, and prostituting the media, the church, and our educational system.” The entire investigation is marred by a lack of cooperation from the White House and the CIA. [Gerald K. Haines, 1/20/2003]
Final Draft Accuses White House, CIA of 'Stonewalling,' Deception - The final draft of the report says that the cooperation from both entities was “virtually nonexistent,” and accuses both of practicing “foot dragging, stonewalling, and deception” in their responses to committee requests for information. CIA archivist and historian Gerald Haines will later write that the committee was thoroughly deceived by Secretary of State Henry Kissinger, who officially cooperated with the committee but, according to Haines, actually “worked hard to undermine its investigations and to stonewall the release of documents to it.” [Spartacus Educational, 2/16/2006] The final report accuses White House officials of only releasing the information it wanted to provide and ignoring other requests entirely. One committee member says that trying to get information out of Colby and other CIA officials was like “pulling teeth.” For his part, Colby considers Pike a “jackass” and calls his staff “a ragtag, immature, and publicity-seeking group.” The committee is particularly unsuccessful in obtaining information about the CIA’s budget and expenditures, and in its final report, observes that oversight of the CIA budget is virtually nonexistent. Its report is harsh in its judgments of the CIA’s effectiveness in a number of foreign conflicts, including the 1973 Mideast war, the 1968 Tet offensive in Vietnam, the 1974 coups in Cyprus and Portugal, the 1974 testing of a nuclear device by India, and the 1968 invasion of Czechoslovakia by the Soviet Union, all of which the CIA either got wrong or failed to predict. The CIA absolutely refused to provide any real information to either committee about its involvement in, among other foreign escapades, its attempt to influence the 1972 elections in Italy, covert actions in Angola, and covert aid to Iraqi Kurds from 1972 through 1975. The committee found that covert actions “were irregularly approved, sloppily implemented, and, at times, had been forced on a reluctant CIA by the President and his national security advisers.” Indeed, the Pike Committee’s final report lays more blame on the White House than the CIA for its illegal actions, with Pike noting that “the CIA does not go galloping off conducting operations by itself…. The major things which are done are not done unilaterally by the CIA without approval from higher up the line.… We did find evidence, upon evidence, upon evidence where the CIA said: ‘No, don’t do it.’ The State Department or the White House said, ‘We’re going to do it.’ The CIA was much more professional and had a far deeper reading on the down-the-road implications of some immediately popular act than the executive branch or administration officials.… The CIA never did anything the White House didn’t want. Sometimes they didn’t want to do what they did.” [Gerald K. Haines, 1/20/2003]

Entity Tags: William Colby, Village Voice, Otis G. Pike, Robert McCory, Pike Committee, US Department of State, New York Times, Mitchell Rogovin, Ron Dellums, House Ethics Committee, Gerald Haines, Church Committee, Searle Field, Daniel Schorr, Henry A. Kissinger, Central Intelligence Agency, CBS News

Timeline Tags: Civil Liberties

The Supreme Court case Buckley v. Valeo, filed by Senator James L. Buckley (R-NY) and former Senator Eugene McCarthy (D-WI) against the Secretary of the Senate, Francis R. Valeo, challenges the constitutionality of the Federal Election Campaign Act (FECA—see February 7, 1972 and 1974) on free-speech grounds. The suit also named the Federal Election Commission (FEC) as a defendant. A federal appeals court validated almost all of FECA, and the plaintiffs sent the case to the Supreme Court. The Court upholds the contribution limits set by FECA because those limits help to safeguard the integrity of elections. However, the court overrules the limits set on campaign expenditures, ruling: “It is clear that a primary effect of these expenditure limitations is to restrict the quantity of campaign speech by individuals, groups, and candidates. The restrictions… limit political expression at the core of our electoral process and of First Amendment freedoms.” One of the most important aspects of the Supreme Court’s ruling is that financial contributions to political campaigns can be considered expressions of free speech, thereby allowing individuals to essentially make unrestricted donations. The Court implies that expenditure limits on publicly funded candidates are allowable under the Constitution, because presidential candidates may disregard the limits by rejecting public financing (the Court will affirm this stance in a challenge brought by the Republican National Committee in 1980).
Provisions of 'Buckley' - The Court finds the following provisions constitutional:
bullet Limitations on contributions to candidates for federal office;
bullet Disclosure and record-keeping provisions; and
bullet The public financing of presidential elections.
However, the Court finds these provisions unconstitutional:
bullet Limitations on expenditures by candidates and their committees, except for presidential candidates who accept public funding;
bullet The $1,000 limitation on independent expenditures;
bullet The limitations on expenditures by candidates from their personal funds; and
bullet The method of appointing members of the FEC, holding that as the method stands, it violates the principle of separation of powers.
In May 1976, following the Court’s ruling, the FEC will reconstitute its board with six presidential appointees after Senate confirmation. [Federal Elections Commission, 3/1997; Federal Elections Commission, 1998; Campaign Finance Timeline, 1999; Center for Responsive Politics, 2002 pdf file; Casebriefs, 2012]
No Clear Authors - The opinion is labeled per curiam, a term usually reserved for brief and minor Court decisions when authorship of an opinion is less relevant. It is unclear exactly which Justices write the opinion. Most Court observers believe Justice William Brennan writes the bulk of the opinion, but Brennan’s biographers will later note that sections of the opinion are authored by Chief Justice Warren Burger and Justices Potter Stewart, Lewis Powell, and William Rehnquist. The opinion is an amalgamation of multiple authors, reflecting the several compromises made in the resolution of the decision. [New Yorker, 5/21/2012]
Criticism of 'Buckley' - Critics claim that the ruling enshrines the principle of “money equals speech.” The ruling also says that television and radio advertisements that do not expressly attack an individual candidate can be paid for with “unregulated” funds. This leads organizations to begin airing “attack ads” that masquerade as “issue ads,” ostensibly promoting or opposing a particular social or political issue and avoiding such words as “elect” or “defeat.” [National Public Radio, 2012] In 1999, law professor Burt Neuborne will write: “Buckley is like a rotten tree. Give it a good, hard push and, like a rotten tree, Buckley will keel over. The only question is in which direction.” Neuborne will write that his preference goes towards reasonable federal regulations of spending and contributions, but “any change would be welcome” in lieu of this decision, and even a completely deregulated system would be preferable to Buckley’s legal and intellectual incoherence. [New York Times, 5/3/2010] In 2011, law professor Richard Hasen will note that while the Buckley decision codifies the idea that contributions are a form of free speech, it also sets strict limitations on those contributions. Calling the decision “Solomonic,” Hasen will write that the Court “split the baby, upholding the contribution limits but striking down the independent spending limit as a violation of the First Amendment protections of free speech and association.” Hasen will reflect: “Buckley set the main parameters for judging the constitutionality of campaign finance restrictions for a generation. Contribution limits imposed only a marginal restriction on speech, because the most important thing about a contribution is the symbolic act of contributing, not the amount. Further, contribution limits could advance the government’s interest in preventing corruption or the appearance of corruption. The Court upheld Congress’ new contribution limits. It was a different story with spending limits, which the Court said were a direct restriction on speech going to the core of the First Amendment. Finding no evidence in the record then that independent spending could corrupt candidates, the Court applied a tough ‘strict scrutiny’ standard of review and struck down the limits.” [Slate, 10/25/2011] In 2012, reporter and author Jeffrey Toobin will call it “one of the Supreme Court’s most complicated, contradictory, incomprehensible (and longest) opinions.” [New Yorker, 5/21/2012]

Entity Tags: Federal Election Campaign Act of 1972, Federal Election Commission, James Buckley, Jeffrey Toobin, US Supreme Court, Eugene McCarthy, Lewis Powell, Potter Stewart, Burt Neuborne, William Rehnquist, Warren Burger, Richard L. Hasen, William Brennan

Timeline Tags: Civil Liberties

Senator Frank Church.Senator Frank Church. [Source: Wally McNamee / Corbis]A Senate committee tasked to investigate the activities of US intelligence organizations finds a plethora of abuses and criminal behaviors, and recommends strict legal restraints and firm Congressional oversight. The “Church Committee,” chaired by Senator Frank Church (D-ID), a former Army intelligence officer with a strong understanding of the necessity for intelligence-gathering, notes in its final report that the CIA in particular had been overly cooperative with the Nixon administration in spying on US citizens for political purposes (see December 21, 1974); US intelligence agencies had also gone beyond the law in assassination attempts on foreign government officials in, among other places, Africa, Latin America, and Vietnam. Church himself accused the CIA of providing the White House with what, in essence, is a “private army,” outside of Congressional oversight and control, and called the CIA a “rogue elephant rampaging out of control.” The committee will reveal the existence of hitherto-unsuspected operations such as HT Lingual, which had CIA agents secretly opening and reading US citizens’ international mail, and other operations which included secret, unauthorized wiretaps, dossier compilations, and even medical experiments. For himself, Church, the former intelligence officer, concluded that the CIA should conduct covert operations only “in a national emergency or in cases where intervention is clearly in tune with our traditional principles,” and restrain the CIA from intervening in the affairs of third-world nations without oversight or consequence. CIA director William Colby is somewhat of an unlikely ally to Church; although he does not fully cooperate with either the Church or Pike commissions, he feels that the CIA’s image is badly in need of rehabilitation. Indeed, Colby later writes, “I believed that Congress was within its constitutional rights to undertake a long-overdue and thoroughgoing review of the agency and the intelligence community. I did not share the view that intelligence was solely a function of the Executive Branch and must be protected from Congressional prying. Quite the contrary.” Conservatives later blame the Church Commission for “betray[ing] CIA agents and operations,” in the words of American Spectator editor R. Emmett Tyrrell, Jr, referencing the 1975 assassination of CIA station chief Richard Welch in Greece. The chief counsel of the Church Committee accuses CIA defenders and other conservatives of “danc[ing] on the grave of Richard Welch in the most cynical way.” It is documented fact that the Church Commission exposed no agents and no operations, and compromised no sources; even Colby’s successor, George H.W. Bush, later admits that Welch’s death had nothing to do with the Church Committee. (In 1980, Church will lose re-election to the Senate in part because of accusations of his committee’s responsibility for Welch’s death by his Republican opponent, Jim McClure.) [American Prospect, 11/5/2001; History Matters Archive, 3/27/2002; Assassination Archives and Research Center, 11/23/2002]
Final Report Excoriates CIA - The Committee’s final report concludes, “Domestic intelligence activity has threatened and undermined the Constitutional rights of Americans to free speech, association and privacy. It has done so primarily because the Constitutional system for checking abuse of power has not been applied.” The report is particularly critical of the CIA’s successful, and clandestine, manipulation of the US media. It observes: “The CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.” The report identifies over 50 US journalists directly employed by the CIA, along with many others who were affiliated and paid by the CIA, and reveals the CIA’s policy to have “their” journalists and authors publish CIA-approved information, and disinformation, overseas in order to get that material disseminated in the United States. The report quotes the CIA’s Chief of the Covert Action Staff as writing, “Get books published or distributed abroad without revealing any US influence, by covertly subsidizing foreign publicans or booksellers.…Get books published for operational reasons, regardless of commercial viability.…The advantage of our direct contact with the author is that we can acquaint him in great detail with our intentions; that we can provide him with whatever material we want him to include and that we can check the manuscript at every stage…. [The agency] must make sure the actual manuscript will correspond with our operational and propagandistic intention.” The report finds that over 1,000 books were either published, subsidized, or sponsored by the CIA by the end of 1967; all of these books were published in the US either in their original form or excerpted in US magazines and newspapers. “In examining the CIA’s past and present use of the US media,” the report observes, “the Committee finds two reasons for concern. The first is the potential, inherent in covert media operations, for manipulating or incidentally misleading the American public. The second is the damage to the credibility and independence of a free press which may be caused by covert relationships with the US journalists and media organizations.”
CIA Withheld Info on Kennedy Assassination, Castro Plots, King Surveillance - The committee also finds that the CIA withheld critical information about the assassination of President John F. Kennedy from the Warren Commission, information about government assassination plots against Fidel Castro of Cuba (see, e.g., November 20, 1975, Early 1961-June 1965, March 1960-August 1960, and Early 1963); and that the FBI had conducted a counter-intelligence program (COINTELPRO) against Dr. Martin Luther King, Jr. and the Southern Christian Leadership Conference. Mafia boss Sam Giancana was slated to testify before the committee about his organization’s ties to the CIA, but before he could testify, he was murdered in his home—including having six bullet wounds in a circle around his mouth. Another committee witness, union leader Jimmy Hoffa, disappeared before he could testify. Hoffa’s body has never been found. Mafia hitman Johnny Roselli was murdered before he could testify before the committee: in September 1976, the Washington Post will print excerpts from Roselli’s last interview, with journalist Jack Anderson, before his death; Anderson will write, “When [Kennedy assassin Lee Harvey] Oswald was picked up, the underworld conspirators feared he would crack and disclose information that might lead to them. This almost certainly would have brought a massive US crackdown on the Mafia. So Jack Ruby was ordered to eliminate Oswald.” (Anderson’s contention has not been proven.) The murders of Giancana and Roselli, and the disappearance and apparent murder of Hoffa, will lead to an inconclusive investigation by the House of the assassinations of Kennedy and King. [Spartacus Educational, 12/18/2002]
Leads to FISA - The findings of the Church Committee will inspire the passage of the Foreign Intelligence Surveillance Act (FISA) (see 1978), and the standing committees on intelligence in the House and Senate. [Assassination Archives and Research Center, 11/23/2002]
Simultaneous Investigation in House - The Church Committee operates alongside another investigative body in the House of Representatives, the Pike Committee (see January 29, 1976).
Church Committee Smeared After 9/11 - After the 9/11 attacks, conservative critics will once again bash the Church Committee; former Secretary of State James Baker will say within hours of the attacks that the Church report had caused the US to “unilaterally disarm in terms of our intelligence capabilities,” a sentiment echoed by the editorial writers of the Wall Street Journal, who will observe that the opening of the Church hearings was “the moment that our nation moved from an intelligence to anti-intelligence footing.” Perhaps the harshest criticism will come from conservative novelist and military historian Tom Clancy, who will say, “The CIA was gutted by people on the political left who don’t like intelligence operations. And as a result of that, as an indirect result of that, we’ve lost 5,000 citizens last week.” [Gerald K. Haines, 1/20/2003]

Entity Tags: Washington Post, Tom Clancy, William Colby, Southern Christian Leadership Conference, R. Emmett Tyrrell, Richard M. Nixon, HT Lingual, George Herbert Walker Bush, Jack Anderson, Frank Church, Church Committee, Central Intelligence Agency, Federal Bureau of Investigation, Sam Giancana, Jack Ruby, James R. Hoffa, Pike Committee, Martin Luther King, Jr., James A. Baker, Lee Harvey Oswald, John F. Kennedy, Jim McClure, Johnny Roselli, Warren Commission

Timeline Tags: Civil Liberties

Amendments to the 1971 Federal Election Campaign Act (FECA—see February 7, 1972 and 1974) passed by Congress after the controversial Buckley ruling by the Supreme Court (see January 30, 1976) bring FECA into conformity with the Court’s decision. The amendments repeal expenditure limits except for presidential candidates who accept public funding, and revise the provisions governing the appointment of commissioners to the Federal Election Commission (FEC). The amendments also limit the scope of PAC fundraising by corporations and labor unions. The amendments limit individual contributions to national political parties to $20,000 per year, and individual contributions to a PAC to $5,000 per year. [Federal Elections Commission, 1998; Center for Responsive Politics, 2002 pdf file] However, the Constitution restricts what Congress can, or is willing, to do, and the amendments are relatively insignificant. [Campaign Finance Timeline, 1999]

Entity Tags: Federal Election Commission, Federal Election Campaign Act of 1972, US Supreme Court

Timeline Tags: Civil Liberties

Cato Institute logo.Cato Institute logo. [Source: Cato Institute]The billionaire Koch brothers, Charles and David, launch the libertarian Cato Institute, one of the first of many think tanks and advocacy organizations they will fund (see August 30, 2010). While records of the Koch funding of the institute are not fully available, the Center for Public Integrity learns that between 1986 and 1993 the Koch family gives $11 million to the institute. By 2010, Cato has over 100 full-time employees, and often succeeds in getting its experts and policy papers quoted by mainstream media figures. While the institute describes itself as nonpartisan, and is at times critical of both Republicans and Democrats, it consistently advocates for corporate tax cuts, reductions in social services, and laissez-faire environmental policies. One of its most successful advocacy projects is to oppose government initiatives to curb global warming. When asked why Cato opposes such federal and state initiatives, founder and president Ed Crane explains that “global warming theories give the government more control of the economy.” [New Yorker, 8/30/2010]

Entity Tags: Center for Public Integrity, Cato Institute, Ed Crane, Charles Koch, David Koch

Timeline Tags: Domestic Propaganda

Interviewer David Frost has a difficult time with his subject, former President Richard Nixon, in the day’s early questioning (see April 6, 1977). Frost attempts to recoup with a line of questioning suggested by his adviser James Reston, Jr., one used in the trial of former Nixon aide John Ehrlichman (see January 1, 1975). Were there no limits to what a president can do, even if the president wants to do something plainly illegal? he asks. Could he do anything despite the law? Burglary? Forgery? Even murder? “If the president does it, that means it’s not illegal,” Nixon retorts. “Never had his imperialism been so baldly stated,” Reston will later reflect. Frost asks if the dividing line between, for example, a police burglary and the murder of an antiwar protester is only the president’s judgment? Nixon agrees, and adds: “There’s nothing specific that the Constitution contemplates in that respect. I haven’t read every word, every jot and every tittle, but I do know this: That it has been, however, argued that as far as a president is concerned, that in war time, a president does have certain extraordinary powers which would make acts that would otherwise be unlawful, lawful if undertaken for the purpose of preserving the nation and the Constitution, which is essential for the rights we’re all talking about.” [Time, 5/30/1977; Reston, 2007, pp. 102-105; Landmark Cases, 8/28/2007]

Entity Tags: Richard M. Nixon, David Frost, James Reston, Jr, John Ehrlichman

Timeline Tags: Nixon and Watergate

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

The Supreme Court, in the case of First National Bank of Boston v. Bellotti, rules 5-4 that corporations have the First Amendment right to make contributions in order to influence political processes. Writing for the majority, Justice Lewis Powell finds that under the recent Buckley ruling (see January 30, 1976), corporate political donations are protected speech. Powell’s opinion finds that a Massachusetts criminal statute prohibiting corporations from spending money for the purpose of “influencing or affecting” voters’ opinions is not legitimate. The split among the justices is unusual, with Powell, a conservative, being joined by two more conservatives, Chief Justice Warren Burger and Potter Stewart, and liberals Harry Blackmun and John Paul Stevens. The four dissenters are liberals William Brennan and Thurgood Marshall, and conservatives Byron White and William Rehnquist. [FIRST NATIONAL BANK OF BOSTON v. BELLOTTI, 2012; Moneyocracy, 2/2012] Rehnquist’s standalone dissent advocates for far stricter controls on corporate spending in elections than most of the other justices’ dissents, with Rehnquist writing that such spending could “pose special dangers in the political sphere.” [Reclaim Democracy, 4/26/1978; FIRST NATIONAL BANK OF BOSTON v. BELLOTTI, 2012]

Entity Tags: Lewis Powell, Byron White, John Paul Stevens, William Rehnquist, Warren Burger, Harry Blackmun, William Brennan, US Supreme Court, Potter Stewart, Thurgood Marshall

Timeline Tags: Civil Liberties

Oil billionaire David Koch runs for vice president on the Libertarian Party ticket. David and his brother Charles are the primary backers of hard-right libertarian politics in the US (see August 30, 2010); Charles, the dominant brother, is determined to tear government “out at the root,” as he will later be characterized by libertarian Brian Doherty. The brothers have thrown their support behind Libertarian presidential candidate Ed Clark, who is running against Republican Ronald Reagan from the right of the political spectrum. The brothers are frustrated by the legal limits on campaign financing, and they persuade the party to place David on the ticket as vice president, thereby enabling him to spend as much of his personal fortune as he likes. The Libertarian’s presidential campaign slogan is, “The Libertarian Party has only one source of funds: You.” In reality, the Koch brothers’ expenditures of over $2 million is the campaign’s primary source of funding. Clark tells a reporter that the Libertarians are preparing to stage “a very big tea party” because people are “sick to death” of taxes. The Libertarian Party platform calls for the abolition of the FBI and the CIA, as well as of federal regulatory agencies, such as the Securities and Exchange Commission and the Department of Energy. The platform proposes the abolition of Social Security, minimum-wage laws, gun control, and all personal and corporate income taxes; in return, it proposes the legalization of prostitution, recreational drugs, and suicide. Government should be reduced to only one function, the party proclaims: the protection of individual rights. Conservative eminence William F. Buckley Jr. calls the movement “Anarcho-Totalitarianism.” The Clark-Koch ticket receives only one percent of the vote in the November 1980 elections, forcing the Koch brothers to realize that their brand of politics isn’t popular. In response, Charles Koch becomes openly scornful of conventional politics. “It tends to be a nasty, corrupting business,” he says. “I’m interested in advancing libertarian ideas.” Doherty will later write that both Kochs come to view elected politicians as merely “actors playing out a script.” Doherty will quote a longtime confidant of the Kochs as saying that after the 1980 elections, the brothers decide they will “supply the themes and words for the scripts.” In order to alter the direction of America, they had to “influence the areas where policy ideas percolate from: academia and think tanks.” [New Yorker, 8/30/2010]

Entity Tags: Libertarian Party, Brian Doherty, Charles Koch, Ronald Reagan, David Koch, William F. Buckley, Ed Clark

Timeline Tags: Domestic Propaganda

President Jimmy Carter issues Executive Order 12129, “Exercise of Certain Authority Respecting Electronic Surveillance,” which implements the executive branch details of the recently enacted Foreign Intelligence Surveillance Act of 1978 (FISA) (see 1978). [Jimmy Carter, 5/23/1979] The order is issued in response to the Iranian hostage crisis (see November 4, 1979-January 20, 1981). [Hawaii Free Press, 12/28/2005] While many conservatives will later misconstrue the order as allowing warrantless wiretapping of US citizens in light of the December 2005 revelation of George W. Bush’s secret wiretapping authorization (see Early 2002), [Think Progress, 12/20/2005] the order does not do this. Section 1-101 of the order reads, “Pursuant to Section 102(a)(1) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1802(a)), the Attorney General is authorized to approve electronic surveillance to acquire foreign intelligence information without a court order, but only if the Attorney General makes the certifications required by that Section.” The Attorney General must certify under the law that any such warrantless surveillance must not contain “the contents of any communication to which a United States person is a party.” The order does not authorize any warrantless wiretapping of a US citizen without a court warrant. [Jimmy Carter, 5/23/1979; 50 U.S.C. 1802(a); Think Progress, 12/20/2005] The order authorizes the Attorney General to approve warrantless electronic surveillance to obtain foreign intelligence, if the Attorney General certifies that, according to FISA, the communications are exclusively between or among foreign powers, or the objective is to collect technical intelligence from property or premises under what is called the “open and exclusive” control of a foreign power. There must not be a “substantial likelihood” that such surveillance will obtain the contents of any communications involving a US citizen or business entity. [Federal Register, 2/4/2006]

Entity Tags: Foreign Intelligence Surveillance Act, George W. Bush, James Earl “Jimmy” Carter, Jr.

Timeline Tags: Civil Liberties

Michael Barnes.Michael Barnes. [Source: Covington and Burling]Representative Michael Barnes (D-MD) is targeted by the NSA’s Echelon satellite surveillance program on orders from Reagan administration officials. Barnes, an outspoken opponent of Reagan’s Central American policies, had phone conversations with Nicaraguan officials intercepted and recorded, including one conversation between Barnes and the foreign minister of Nicaragua. Barnes learns of the surveillance after White House officials, apparently attempting to discredit Barnes, leaks transcripts of the taped conversations to reporters. CIA director William Casey shows Barnes a Nicaraguan embassy cable reporting a meeting between embassy staff and one of Barnes’s aides; Casey demands that Barnes fire the aide. Barnes refuses, noting that the aide had visited the embassy on legitimate business concerning international affairs. Barnes will say in 1995, “I was aware that NSA monitored international calls, that it was a standard part of intelligence gathering. But to use it for domestic political purposes is absolutely outrageous and probably illegal.” Former senator Dennis DeConcini (R-AZ) says he worries about the NSA spying on US citizens: “It has always worried me. What if that is used on American citizens? It is chilling. Are they listening to my private conversations on my telephone?” [Patrick S. Poole, 8/15/2000]

Entity Tags: Michael D. Barnes, Reagan administration, William Casey, National Security Agency, Dennis DeConcini, Echelon

Timeline Tags: Civil Liberties

The federal government passes even more amendments to the 1971 Federal Election Campaign Act (FECA—see February 7, 1972, 1974, and May 11, 1976). The new amendments simplify campaign finance reporting requirements, encourage political party activity at the state and local levels, and increase the public funding grants for presidential nominating conventions. The new amendments prohibit the Federal Election Commission (FEC) from conducting random campaign audits. They also allow state and local parties to spend unlimited amounts on federal campaign efforts, including the production and distribution of campaign materials such as signs and bumper stickers used in “get out the vote” (GOTV) efforts. [Federal Elections Commission, 1998; Center for Responsive Politics, 2002 pdf file] The amendment creates what later becomes known as “soft money,” or donations and contributions that are essentially unregulated as long as they ostensibly go for “party building” expenses. The amendments allow corporations, labor unions, and wealthy individuals to contribute vast sums to political parties and influence elections. By 1988, both the Republican and Democratic Parties will spend inordinate and controversial amounts of “soft money” in election efforts. [National Public Radio, 2012] While the amendments were envisioned as strengthening campaign finance law, many feel that in hindsight, the amendments actually weaken FECA and campaign finance regulation. Specifically, the amendments reverse much of the 1974 amendments, and allow money once prohibited from being spent on campaigns to flow again. [Campaign Finance Timeline, 1999]

Entity Tags: Federal Election Commission, Federal Election Campaign Act of 1972

Timeline Tags: Civil Liberties

KochPAC logo.KochPAC logo. [Source: KochPAC (.com)]After their stinging loss during the November 1980 presidential campaign, the billionaire Koch brothers, Charles and David, decide that they need to work to inculcate their brand of hard-right libertarianism into the electorate through indirect means (see 1979-1980). Therefore, they begin spending vast amounts of their personal fortunes on what purport to be independent think tanks and other political or ideological organizations. At the same time, the brothers become political recluses, rarely speaking in public and rarely acknowledging the breadth or the direction of their donations. It is hard to know exactly how much the Kochs spend and where they spend it, though public records give some of the picture. Between 1998 and 2008, Charles Koch’s foundation spends over $48 million on political funding. The Claude R. Lambe Charitable Foundation, controlled by Charles and his wife, spends over $28 million. David Koch’s foundation spends over $120 million. Koch Industries, controlled primarily by Charles, spends over $50 million on lobbying efforts. Their political action committee, KochPAC, donates around $8 million, almost all of it going to Republicans. In 2010, as in other years, Koch Industries leads all other energy companies in political donations. The brothers spend over $2 million of their personal fortunes on political donations, almost all of it going to Republicans. Ari Rabin-Havt of the progressive media watchdog organization Media Matters will say that the Kochs’ effort is unusual in its marshalling of corporate and personal funds: “Their role, in terms of financial commitments, is staggering.” Lee Fang, writing for the liberal blog ThinkProgress (an arm of the Center for American Progress), calls the Kochs “the billionaires behind the hate.” Some believe that the Kochs have either skirted, or outright broken, laws controlling tax-exempt giving. Charitable foundations must conduct exclusively nonpartisan activities that promote the public welfare. But in 2004, a report by the National Committee for Responsive Philanthropy, a watchdog group, describes the Kochs’ foundations as being self-serving, and concludes, “These foundations give money to nonprofit organizations that do research and advocacy on issues that impact the profit margin of Koch Industries.” The Kochs also use their charitable foundations to fund hard-right political organizations that, according to reporter Jane Mayer, “aim to push the country in a libertarian direction,” including: the Institute for Justice, which files lawsuits opposing state and federal regulations; the Institute for Humane Studies, which underwrites libertarian academics; and the Bill of Rights Institute, which promotes a conservative interpretation of the Constitution. David Koch acknowledges that the family exerts tight ideological control. “If we’re going to give a lot of money, we’ll make darn sure they spend it in a way that goes along with our intent,” he tells a reporter. “And if they make a wrong turn and start doing things we don’t agree with, we withdraw funding.” [New Yorker, 8/30/2010]

Entity Tags: Institute for Justice, Charles Koch, Bill of Rights Institute, Ari Rabin-Havt, Claude R. Lambe Charitable Foundation, Institute for Humane Studies, Koch Industries, National Committee for Responsive Philanthropy, Jane Mayer, David Koch, Lee Fang, KochPAC

Timeline Tags: Domestic Propaganda

President Ronald Reagan issues Executive Order 12333, which directs the US intelligence community to provide foreign intelligence data to the White House. The order reads in part, “[A]gencies are not authorized to use such techniques as electronic surveillance, unconsented physical searches, mail surveillance, physical surveillance, or monitoring devices unless they are in accordance with procedures established by the head of the agency concerned and approved by the Attorney General.” It establishes rules of conduct for the intelligence agencies, and mandates a certain level of Congressional oversight. [Executive Order 12333 -- United States intelligence activities, 4/5/2007] It also establishes the basis for what are later called “National Security Letters.” These NSLs, originally envisioned for use to compile information in hunts for foreign criminals and suspected terrorists, will later be used by the administration of George W. Bush to order US booksellers, librarians, employers, Internet providers, and others to turn over records and information they compile on US citizens, with strict adjuncts against allowing those targeted for surveillance to know about the NSLs and with virtually no government oversight (see October 25, 2005). [Washington Post, 11/6/2005] It does not, as some have later asserted, directly prohibit the assassination of targeted foreign subjects—i.e. terrorist suspects and even foreign leaders—though it does restrict the use of assassination by US government operatives to certain very restricted circumstances centered around critical aspects of national security. [Parks, 11/2/1989 pdf file]

Entity Tags: Ronald Reagan, George W. Bush, National Security Letters, Bush administration (43)

Timeline Tags: Civil Liberties

Margaret Thatcher.Margaret Thatcher. [Source: UK Parliament]British prime minister Margaret Thatcher, displeased with two of her ministers for challenging her on unidentified policy matters, requests that they be placed under electronic surveillance. Because it is illegal for British intelligence to monitor its own citizens, the operation is handed over to the CSE, Canada’s national security agency. [Daily Iowan, 1/19/2006; Janczewski and Colarik, 2007, pp. 454] According to former CSE spy Mike Frost, who will publicly discuss the matter in 2000, Thatcher “had two ministers that she said ‘…weren’t onside.’” Thatcher, says Frost, “wanted to find out, not what these ministers were saying, but what they were thinking. So my boss, as a matter of fact, went to McDonald House in London and did intercept traffic from these two ministers.” Why CSE and not British intelligence? Because for the British to monitor their own government members would be illegal—so instead, they farm out such activities to their allies. “The British Parliament now have total deniability,” Frost says. “They didn’t do anything. They know nothing about it. Of course they didn’t do anything; we did it for them.” Frost will say there is no way to pin any blame or criminal charges on anyone in the British government. “The British Parliament now has total deniability,” Frost says. “They didn’t do anything… we did it for them.” [ZDNet, 2/25/2000; CBS News, 2/27/2000]

Entity Tags: Communications Security Establishment, Mike Frost, Government Communications Headquarters, Margaret Thatcher

Timeline Tags: Civil Liberties

The October 1983 bombing of US Marine barracks in Beirut, Lebanon.The October 1983 bombing of US Marine barracks in Beirut, Lebanon. [Source: US Marine Corps.]In June 1982, Israel invaded Lebanon and US Marines were sent to Lebanon as a peacekeeping force in September 1982. On April 18, 1983, the US embassy in Beirut, Lebanon, is bombed by a suicide truck attack, killing 63 people. On October 23, 1983, a Marine barracks in Beirut is bombed by another suicide truck attack, killing 241 Marines. In February 1984, the US military will depart Lebanon. The radical militant group Islamic Jihad will take credit for both attacks (note that this is not the group led by Ayman al-Zawahiri). The group is believed to be linked to Hezbollah. Prior to this year, attacks of this type were rare. But the perceived success of these attacks in getting the US to leave Lebanon will usher in a new era of suicide attacks around the world. The next two years in particular will see a wave of such attacks in the Middle East, many of them committed by the radical militant group Hezbollah. [US Congress, 7/24/2003; US Congress, 7/24/2003 pdf file] The Beirut bombings will also inspire Osama bin Laden to believe that the US can be defeated by suicide attacks. For instance, he will say in a 1998 interview: “We have seen in the last decade the decline of the American government and the weakness of the American soldier who is ready to wage Cold Wars and unprepared to fight long wars. This was proven in Beirut when the Marines fled after two explosions.” [ABC News, 5/28/1998] In 1994, he will hold a meeting with a top Hezbollah leader (see Shortly After February 1994) and arrange for some of his operatives to be trained in the truck bombing techniques that were used in Beirut. [9/11 Commission, 7/24/2004, pp. 48]

Entity Tags: Hezbollah, Islamic Jihad Organization, Ayman al-Zawahiri, Osama bin Laden

Timeline Tags: Complete 911 Timeline

The Supreme Court rules in INS v. Chadha that Congress has no right to issue what it calls “legislative vetoes,” essentially provisions passed by Congress giving the executive branch specific powers but with Congress reserving the right to veto specific decisions by the executive branch if it does not approve of the decisions made by the executive. Congress had relied on such “legislative vetoes” for years to curb the expanding power of the president. The Court strikes down hundreds of these “legislative vetoes” throughout federal law. Congress quickly schedules hearings to decide how to respond to the Court’s ruling. White House attorney John Roberts (see September 29, 2005), a young, fast-rising conservative, is one of a team of lawyers assigned to review the administration’s upcoming testimony before Congress. Some of the lawyers want to push Congress to place independent agencies such as the Federal Trade Commission (FTC) and Food and Drug Administration (FDA) under White House control—part of the evolving “unitary executive” theory of presidential power (see April 30, 1986). Roberts writes: “With respect to independent agencies… the time may be ripe to reconsider the existence of such entities, and take action to bring them back within the executive branch.… I agree that the time is ripe to reconsider the Constitutional anomaly of independent agencies… More timid souls may, however, desire to see this deleted as provocative.” [Savage, 2007, pp. 256-257]

Entity Tags: Reagan administration, Food and Drug Administration, Federal Trade Commission, John G. Roberts, Jr, US Supreme Court

Timeline Tags: Civil Liberties

1984: Reagan Announces End to Aid for Contras

US President Ronald Reagan publicly claims to end aid to the contras in accordance with a congressional ban. However his administration continues the support, leading to the Iran-Contra scandal. [BBC, 6/5/2004; Columbia Encyclopedia. Sixth edition, 2005]

Entity Tags: Ronald Reagan

Timeline Tags: US-Nicaragua (1979-), Iran-Contra Affair

The Supreme Court, in the case of Federal Election Commission v. NCPAC, rules that political action committees (PACs) can spend more than the $1,000 mandated by federal law (see February 7, 1972, 1974, and May 11, 1976). The Democratic Party and the FEC argued that large expenditures by the National Conservative Political Action Committee (NCPAC) in 1975 violated the Federal Election Campaign Act (FECA), which caps spending by independent political action committees in support of a publicly funded presidential candidate at $1,000. The Court rules 7-2 in favor of NCPAC, finding that the relevant section of FECA encroaches on the organization’s right to free speech (see January 30, 1976). Justice William Rehnquist writes the majority opinion, joined by fellow conservatives Chief Justice Warren Burger, Sandra Day O’Connor, and Lewis Powell, and liberals Harry Blackmun, John Paul Stevens, and William Brennan. Justices Byron White and Thurgood Marshall dissent from the majority. [Oyez (.org), 2012; Moneyocracy, 2/2012]

Entity Tags: Federal Election Commission, William Brennan, William Rehnquist, Byron White, Federal Election Campaign Act of 1972, US Supreme Court, Warren Burger, Sandra Day O’Connor, Harry Blackmun, John Paul Stevens, Thurgood Marshall, National Conservative Political Action Committee, Democratic Party, Lewis Powell

Timeline Tags: Civil Liberties

The Reagan administration takes another step in attempting to “purge” the federal bureaucracy of those who disagree with its policies (see February 1981 and After). President Reagan issues an executive order requiring agencies to annually submit a cost-benefit analysis of their proposed new rules to the White House, giving administration officials the chance to object to, delay, and block regulations it opposes for ideological reasons. Reagan attorney Douglas Kmiec will later write that this scheme is a major part of the Reagan administration’s attempt to implement the “unitary executive” theory of executive power (see April 30, 1986). Kmiec will write that though White House objections have no legal weight because Congress has given the agencies the power to make rules by law, the White House often wins the argument anyway. [Savage, 2007, pp. 304-305]

Entity Tags: Douglas Kmiec, Reagan administration

Timeline Tags: Civil Liberties

Edwin Meese.Edwin Meese. [Source: GQ (.com)]Attorney General Edwin Meese receives a report, “Separation of Powers: Legislative-Executive Relations.” Meese had commissioned the report from the Justice Department’s Domestic Policy Committee, an internal “think tank” staffed with hardline conservative scholars and policy advisers.
Recommendations for Restoring, Expanding Executive Power - The Meese report approvingly notes that “the strong leadership of President Reagan seems clearly to have ended the congressional resurgence of the 1970s.” It lays out recommendations for restoring the power taken from the executive branch after Watergate and Vietnam, and adding new powers besides. It recommends that the White House refuse to enforce laws and statutes that “unconstitutionally encroach upon the executive branch,” and for Reagan to veto more legislation and to use “signing statements” to state the White House’s position on newly passed laws. It also assails the 1972 War Powers Resolution and other laws that limit presidential power.
Reinterpreting the Separation of Powers and the Concept of 'Checks and Balances' - Perhaps most importantly, the Meese report claims that for 200 years, courts and scholars alike have misunderstood and misinterpreted the Founders’ intentions in positing the “separation of powers” system (see 1787 and 1793). The belief that the Constitution mandates three separate, co-equal branches of government—executive, judicial, and legislative—who wield overlapping areas of authority and work to keep each of the other branches from usurping too much power—a concept taught in school as “checks and balances”—is wrong, the report asserts. Instead, each branch has separate and independent sets of powers, and none of the three branches may tread or encroach on the others’ area of responsibility and authority. “The only ‘sharing of power’ is the sharing of the sum of all national government power,” the report claims. “But that is not joint shared, it is explicitly divided among the three branches.” According to the report, the White House should exercise total and unchallenged control of the executive branch, which, as reporter and author Charlie Savage will later explain, “could be conceived of as a unitary being with the president as its brain.” The concept of “checks and balances” is nothing more than an unconstitutional attempt by Congress to encroach on the rightful power of the executive. This theory of presidential function will soon be dubbed the “unitary executive theory,” a title adapted from a passage by Alexander Hamilton in the Federalist Papers. [Savage, 2007, pp. 47-48] Charles Fried, Reagan’s solicitor general during the second term, will later write that though the unitary executive theory displays “perfect logic” and a “beautiful symmetry,” it is difficult to defend, because it “is not literally compelled by the words of the Constitution. Nor did the framers’ intent compel this view.” [Savage, 2007, pp. 50]

Entity Tags: Charles Fried, Reagan administration, Domestic Policy Committee, US Department of Justice, Ronald Reagan, Edwin Meese, Charlie Savage

Timeline Tags: Civil Liberties

Unaware of the White House machinations with Iran and the Nicaraguan Contras (see 1984, May 1984, October 10, 1984, November 19, 1985, December 6, 1985, Mid-1980s, April 4, 1986, May 29, 1986, and June 11, 1986), Congress approves a $100 million appropriation for military and non-arms aid to the Contras. [New York Times, 11/19/1987]

Entity Tags: Reagan administration, Contras

Timeline Tags: Iran-Contra Affair

The Supreme Court rules in Federal Election Commission v. Massachusetts Citizens for Life that an anti-abortion organization can print flyers promoting “pro-life” candidates in the weeks before an election, and that the portion of the Federal Election Campaign Act (FECA—see February 7, 1972, 1974, and May 11, 1976) that bars distribution of such materials to the general public restricts free speech. In September 1978, the Massachusetts Citizens For Life (MCFL) spent almost $10,000 printing flyers captioned “Everything You Need to Vote Pro-Life,” which included information about specific federal and state candidates’ positions on abortion rights, along with exhortations to “vote pro-life” and “No pro-life candidate can win in November without your vote in September.” The Federal Election Commission (FEC) ruled that MCFL’s expenditures violated FECA’s ban on corporate spending in connection with federal elections. A Massachusetts district court ruled against the FEC, finding that the flyer distribution “was uninvited by any candidate and uncoordinated with any campaign” and the flyers fell under the “newspaper exemption” of the law. Moreover, the court found, FECA’s restrictions infringed on MCFL’s freedom of speech (see January 30, 1976 and April 26, 1978). An appeals court reversed much of the district court’s decision, but agreed that the named provision of FECA violated MCFL’s free speech rights. The FEC appealed to the Supreme Court. By a 5-4 vote, the Court affirms that FECA’s prohibition on corporate expenditures is unconstitutional as applied to independent expenditures made by a narrowly defined type of nonprofit corporation such as MCFL. The Court writes that few organizations will be impacted by its decision. The majority opinion is written by Justice William Brennan, a Court liberal, and joined by liberal Thurgood Marshall and conservatives Lewis Powell, Antonin Scalia, and (in part) by Sandra Day O’Connor. Court conservatives William Rehnquist and Byron White, joined by liberals Harry Blackmun and John Paul Stevens, dissent with the majority, saying that the majority ruling gives “a vague and barely adumbrated exception [to the law] certain to result in confusion and costly litigation.” [Federal Election Commission, 2011; Moneyocracy, 2/2012]

Entity Tags: Federal Election Commission, William Rehnquist, Antonin Scalia, Federal Election Campaign Act of 1972, US Supreme Court, William Brennan, Sandra Day O’Connor, Harry Blackmun, John Paul Stevens, Thurgood Marshall, Massachusetts Citizens for Life, Byron White, Lewis Powell

Timeline Tags: Civil Liberties

A federal appeals court rules 2-1 in favor of Theodore Olson, the former head of the Justice Department’s Office of Legal Counsel, who has refused to comply with a subpoena issued as part of an independent counsel’s investigation into political interference at the Environmental Protection Agency (EPA). Olson’s position is that the independent counsel is illegal under the Constitution, as interpreted by the so-called “unitary executive theory” (see April 30, 1986). One of the appellate court judges, Carter appointee Ruth Bader Ginsberg, argues that the independent counsel law is perfectly constitutional, and fits with the Founding Fathers’ vision of a system of “checks and balances” among the three governmental branches. But Reagan appointees Laurence Silberman and Stephen Williams outvote Ginsberg. Silberman, who writes the majority opinion, is a longtime advocate of increased executive power, and calls the independent counsel law “inconsistent with the doctrine of a unitary executive.” The Supreme Court will strike down Silberman’s ruling (see June 1988), but the independent counsel will not bring charges against Olson. [Savage, 2007, pp. 46-49]

Entity Tags: Office of Legal Counsel (DOJ), Environmental Protection Agency, Laurence Silberman, Stephen Williams, Theodore (“Ted”) Olson, US Supreme Court, Ruth Bader Ginsberg

Timeline Tags: Civil Liberties

Strom Thurmond.Strom Thurmond. [Source: US Government]Former Lockheed software manager Margaret Newsham, who worked at the Menwith Hill facility of the NSA’s Echelon satellite surveillance operation in 1979, says she heard a real-time phone intercept of conversations involving senator Strom Thurmond (R-SC). She was shocked, she recalls, because she thought only foreign communications were being monitored. Newsham, who was fired from Lockheed after she filed a whistleblower lawsuit alleging fraud and waste, tells the chairman of the House Intelligence Committee, Louis Stokes (D-OH), of the overheard conversations. In July, Capital Hill staffers will leak the story to the Cleveland Plain Dealer. Thurmond says he doesn’t believe Newsham’s story, but his office admits that it has previously received reports that Thurmond had been a target of NSA surveillance. Thurmond will decline to press for an investigation, and the reason for the surveillance has never been revealed. [CBS News, 2/27/2000; Patrick S. Poole, 8/15/2000]

Entity Tags: Strom Thurmond, National Security Agency, House Intelligence Committee, Louis Stokes, Echelon, Cleveland Plain Dealer, Lockheed Martin Corporation, Margaret Newsham

Timeline Tags: Civil Liberties

Veteran diplomat Joseph Wilson arrives in Baghdad to assume the post of Deputy Chief of Mission (DCM) under US Ambassador April Glaspie. Wilson has extensive experience throughout sub-Saharan and Central Africa, as well as brief stints on the staffs of Senator Al Gore (D-TN) and Representative Tom Foley (D-WA). Wilson will later write that he and his colleagues share the belief that Iraq is ruled by “a shockingly brutal regime… an ugly totalitarian dictatorship” and its leader, Saddam Hussein, a “sociopath.” For the next three years, Wilson and his colleagues will send harsh reports of Hussein’s systematic violations of the human rights of his subjects to Washington.
Walking a Fine Line between Isolation and Appeasement - Still, most of the embassy staff, including Wilson and Glaspie, are not advocates of totally isolating Hussein with extreme economic and diplomatic sanctions. Wilson will write, “Isolating a regime often results in isolating ourselves, and we then lose any leverage we might have to influence outcomes. On the other hand, when dictators are treated like any other leaders, it’s often interpreted by them as a free pass to continue in their autocratic ways, while critics label it as appeasement.… The merits of ideologically driven diplomacy versus a more pragmatic approach have been a recurring theme of foreign policy debates throughout the history of international relations and America’s own domestic policies.”
'Tread Lightly' - Wilson will note that “Iraq’s Arab neighbors unanimously urged us to tread lightly. They argued that after almost a decade of a grinding war with Iran, Saddam had learned his lesson and that his natural radicalism would now be tempered by the harsh experience.… [I]t was better to tie him to relationships that would be hard for him to jettison than to leave him free to make trouble with no encumbrances. Engaging with him at least kept him in our sights.” Iraq had behaved monstrously during its war with Iran, and had offended the world with its chemical attacks on its own citizens (see August 25, 1988) and its Iranian enemies (see October 1988). But it had emerged from the war as a powerful regional player both militarily and economically. The Bush administration is torn between trying to moderate Hussein’s behavior and treating him as an incorrigible, irredeemable enemy of civilization. And Washington wants Iraq as a balancing force against Iran, which is awash in virulently anti-American sentiment (a sentiment returned in full by many American lawmakers and government officials). No other country in the Gulf region will tolerate the presence of US forces as a counterbalance to Iran. So, as Wilson will write, “All of Iraq’s neighbors continued to argue for a softer approach; and since they clearly had at least as much at stake as we did, the Bush administration was willing to follow their lead.” [Wilson, 2004, pp. 78-79, 451]

Entity Tags: Joseph C. Wilson, Saddam Hussein, April Glaspie

Timeline Tags: Events Leading to Iraq Invasion

One of the Calverton surveillance photographs introduced as evidence in court (note that some faces have been blurred out).One of the Calverton surveillance photographs introduced as evidence in court (note that some faces have been blurred out). [Source: National Geographic]FBI agents photograph Islamic radicals shooting weapons at the Calverton Shooting Range on Long Island, New York. The radicals are secretly monitored as they shoot AK-47 assault rifles, semiautomatic handguns, and revolvers for four successive weekends. The use of weapons such as AK-47’s is illegal in the US, but this shooting range is known to be unusually permissive. Ali Mohamed is apparently not at the range but has been training the five men there: El Sayyid Nosair, Mahmud Abouhalima, Mohammed Salameh, Nidal Ayyad, and Clement Rodney Hampton-El. Nosair will assassinate Rabbi Meir Kahane one year later (see November 5, 1990) and the others, except Hampton-El, will be convicted of the 1993 World Trade Center bombing (see February 26, 1993), while Hampton-El will be convicted for a role in the “Landmarks” bombing plot (see June 24, 1993). Some FBI agents have been assigned to watch some Middle Eastern men who are frequenting the Al-Kifah Refugee Center in Brooklyn. Each weekend, Mohamed’s trainees drive from Al-Kifah to the shooting range and a small FBI surveillance team follows them. The FBI has been given a tip that some Palestinians at Al-Kifah are planning violence targeting Atlantic City casinos. By August, the casino plot will have failed to materialize and the surveillance, including that at the shooting range, will have come to an end. Author Peter Lance will later comment that the reason why the FBI failed to follow up the shooting sessions is a “great unanswered question.” [Lance, 2003, pp. 29-33; New York Times, 10/5/2003]

Entity Tags: Mahmud Abouhalima, Peter Lance, Mohammed Salameh, Nidal Ayyad, Federal Bureau of Investigation, Clement Rodney Hampton-El, El Sayyid Nosair, Calverton Shooting Range, Ali Mohamed, Al-Kifah Refugee Center

Timeline Tags: Complete 911 Timeline

The newly appointed general counsels of each executive branch receive a memo from William Barr, the new head of the Justice Department’s Office of Legal Counsel (OLC). The memo, entitled “Common Legislative Encroachments on Executive Branch Authority,” details the top 10 ways in which, in Barr’s view, Congress tries to interfere with executive branch powers. The list includes:
bullet “4. Micromanagement of the Executive Branch”;
bullet “5. Attempts to Gain Access to Sensitive Executive Branch Information”;
bullet “9. Attempts to Restrict the President’s Foreign Affairs Powers.”
The memo unequivocally endorses the “unitary executive theory” of the presidency (see April 30, 1986), despite that theory’s complete rejection by the Supreme Court (see June 1988). Barr also reiterates the belief that the Constitution requires the executive branch to “speak with one voice”—the president’s—and tells the general counsels to watch for any legislation that would protect executive branch officials from being fired at will by the president, one of the powers that Barr and other unitary executive proponents believe has been illegally taken by Congress. “Only by consistently and forcefully resisting such congressional incursions can executive branch prerogatives be preserved,” Barr writes. Reflecting on Barr’s arguments, law professor Neil Kinkopf, who will later serve in the OLC under President Clinton, will later write: “Never before had the Office of Legal Counsel… publicly articulated a policy of resisting Congress. The Barr memo did so with belligerence, staking out an expansive view of presidential power while asserting positions that contradicted recent Supreme Court precedent. Rather than fade away as ill-conceived and legally dubious, however, the memo’s ideas persisted and evolved within the Republican Party and conservative legal circles like the Federalist Society.” [Savage, 2007, pp. 57-59]

Entity Tags: Federalist Society, Neil Kinkopf, US Department of Justice, William P. Barr, Office of Legal Counsel (DOJ), Republican Party

Timeline Tags: Civil Liberties

The Supreme Court, in the case of Austin v. Michigan Chamber of Commerce, rules that the Michigan Chamber of Commerce (MCC) cannot run newspaper advertisements in support of a candidate for the state legislature because the MCC is subject to the Michigan Campaign Finance Act, which prohibits corporations from using treasury money to support or oppose candidates running for state offices. The Court finds that corporations can use money only from funds specifically designated for political purposes. The MCC holds a political fund separate from its other monies, but wanted to use money from its general fund to buy political advertising, and sued for the right to do so. The case explored whether a Michigan law prohibiting such political expenditures is constitutional. The Court agrees 7-2 that it is constitutional. Justices Antonin Scalia and Anthony Kennedy dissent, arguing that the government should not require such “segregated” funds, but should allow corporations and other such entities to spend their money on political activities without such restraints. [Public Resource (.org), 1990; Casebriefs, 2012; Moneyocracy, 2/2012] The 2010 Citizens United ruling (see January 21, 2010) will overturn this decision, with Scalia and Kennedy voting in the majority, and Kennedy writing the majority opinion.

Entity Tags: Michigan Chamber of Commerce, Anthony Kennedy, Michigan Campaign Finance Act, US Supreme Court, Antonin Scalia

Timeline Tags: Civil Liberties

As tensions escalate between the US and Iraq, Iraqi officials circulate a note to all the embassies in Baghdad, directing them to register all of the civilians in their care with the authorities. Failure to comply can result in execution, the note implies. Such registration can only be done in person at Iraqi governmental offices; Deputy Chief of Mission Joseph Wilson, the ranking US diplomat in Baghdad, knows that bringing American citizens in for registration may well result in those Americans being taken hostage. He is housing some 60 Americans at the ambassador’s residence for their protection. He will later write: “It was clearly a way for the Iraqis to replenish their stock of hostages. The choice, theoretically, was either to turn over Americans or to defy the note and risk execution.” Instead of making the choice, Wilson uses the order to publicly defy the Iraqis. He schedules a press conference and has a Marine make him a hangman’s noose. Wearing the noose, he tells reporters that if Saddam Hussein “wants to execute me for keeping Americans from being taken hostage, I will bring my own f_cking rope.” The press conference, like all of the embassy press conferences, is off the record, but journalists release the story anyway. A garbled, erroneous version from a French news outlet has the Iraqis planning to hang Wilson by sundown. Iraqi Foreign Minister Tariq Aziz, angered and embarrassed by the press coverage, attempts to dress down Wilson that evening, but Wilson refuses to back down. Instead, the Iraqis withdraw the request. Soon after, President Bush sends Wilson a cable lauding his courage and his outspokeness (see November 29, 1990). [Wilson, 2004, pp. 153-154; Unger, 2007, pp. 311] Conservative columnist Robert Novak co-writes a piece about Wilson that says, “He shows the stuff of heroism.” Novak will later reveal the covert CIA status of Wilson’s wife, Valerie Plame Wilson, as an act of political retaliation (see July 14, 2003). [Wilson, 2004, pp. 153-154]

Entity Tags: Tariq Aziz, Joseph C. Wilson, Robert Novak, Saddam Hussein, George Herbert Walker Bush

Timeline Tags: Events Leading to Iraq Invasion, US-Iraq 1980s

In July 1990, the “Blind Sheikh,” Sheikh Omar Abdul-Rahman, was mysteriously able to enter the US and remain there despite being a well known public figure and being on a watch list for three years (see July 1990).
bullet In late October 1990, he travels to London, so he is out of the US when one of his followers assassinates the Zionist rabbi Meir Kahane on November 5, 1990 (see November 5, 1990). He returns to the US in mid-November under the name “Omar Ahmed Rahman” and again has no trouble getting back in despite still being on the watch list. [Washington Post, 7/13/1993]
bullet The State Department revokes his US visa on November 17 after the FBI informs it that he is in the US. [New York Times, 12/16/1990]
bullet In December 1990, Abdul-Rahman leaves the US again to attend an Islamic conference in Copenhagen, Denmark. He returns nine days later and again has no trouble reentering, despite not even having a US visa at this point. [Washington Post, 7/13/1993]
bullet On December 16, 1990, the New York Times publishes an article titled, “Islamic Leader on US Terrorist List Is in Brooklyn,” which makes his presence in the US publicly known. The Immigration and Nationalization Service (INS) is said to be investigating why he has not been deported already. [New York Times, 12/16/1990]
bullet Yet in April 1991, the INS approves his application for permanent residence.
bullet He then leaves the US again in June 1991 to go on the religious hajj to Mecca, Saudi Arabia, and returns on July 31, 1991. INS officials identify him coming in, but let him in anyway. [New York Times, 4/24/1993; Washington Post, 7/13/1993]
bullet In June 1992, his application for political asylum will be turned down and his permanent residence visa revoked. But INS hearings on his asylum bid are repeatedly delayed and still have not taken place when the WTC is bombed in February 1993 (see February 26, 1993). [Lance, 2003, pp. 105-106]
bullet Abdul-Rahman then goes to Canada around October 1992 and returns to the US yet again. The US and Canada claim to have no documentation on his travel there, but numerous witnesses in Canada see him pray and lecture there. Representative Charles Schumer (D-NY) says, “Here they spent all this time trying to get him out. He goes to Canada and gives them the perfect reason to exclude him and they don’t.”
bullet After the WTC bombing, the US could detain him pending his deportation hearing but chooses not to, saying it would be too costly to pay for his medical bills. [New York Times, 4/24/1993]
Abdul-Rahman will be involved in the follow up “Landmarks” plot (see June 24, 1993) before finally being arrested later in 1993. It will later be alleged that he was protected by the CIA. In 1995, the New York Times will comment that the link between Abdul-Rahman and the CIA “is a tie that remains muddy.” [New York Times, 10/2/1995]

Entity Tags: US Department of State, Meir Kahane, US Immigration and Naturalization Service, Omar Abdul-Rahman, Charles Schumer, Federal Bureau of Investigation, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

Counterterrorism expert Rohan Gunaratna will later write that Khalid Shaikh Mohammed (KSM) first “earned his spurs” in al-Qaeda by serving as one of Osama bin Laden’s first bodyguards. Then, in 1991, bin Laden sends KSM to the Philippines where he trains members of the militant groups Abu Sayyaf and the Moro Islamic Liberation Front (MILF) in bomb making and assassination. He works with bin Laden’s brother-in-law Mohammed Jamal Khalifa to establish an operational base there and also in Malaysia. Presumably he also works with his nephew Ramzi Yousef, who trains Abu Sayyaf militants the same year (see December 1991-May 1992). Gunaratna says that “After proving himself an outstanding organizer, [KSM] was given substantial operational authority and autonomy by bin Laden.” However, KSM’s work with the Abu Sayyaf and MILF is soon discovered and he “has been on the run since 1991.” KSM will return with Yousef to the Philippines in 1994 to exploit the network they built and develop the Bojinka plot (see January 6, 1995). [Gunaratna, 2003, pp. xxiv-xxix]

Entity Tags: Osama bin Laden, Abu Sayyaf, Mohammed Jamal Khalifa, Khalid Shaikh Mohammed, Ramzi Yousef, Moro Islamic Liberation Front

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Hambali, an important future al-Qaeda leader, moves to the village of Sungai Manggis, Malaysia, about an hour north of the capital of Kuala Lumpur. Hambali is from nearby Indonesia and fought in Afghanistan with Osama bin Laden in the late 1980s. He starts off poor, working at odd jobs, but soon is frequently traveling and has many overseas visitors. Intriguingly, Hambali’s landlord will later say of Hambali’s visitors, “Some looked Arab and others white.” Hambali plays a major role in the 1995 Bojinka plot in the Philippines (see January 6, 1995), and after that plot is foiled he continues to live in his simple Sungai Manggis house. [Time, 4/1/2002; Los Angeles Times, 9/1/2002] Living near Hambali in this village are other regional Islamist militant leaders such as Abdullah Sungkar, Imam Samudra (allegedly a key figure in the 2000 Christmas bombings (see December 24-30, 2000) and the 2002 Bali bombings (see October 12, 2002)), Abu Bakar Bashir, the spiritual leader of the al-Qaeda affiliate Jemaah Islamiyah, and Abu Jibril. So many militants live in this village that it becomes known as “Terror HQ” to intelligence agencies. Sungkar and Bashir are considered the two most well-known militant leaders in Southeast Asia at the time (Sungkar dies of old age in 1999). Hambali’s house is directly across from Bashir’s and they are considered friends. [Tempo, 10/29/2002; Ressa, 2003] Interestingly, Fauzi Hasbi, an Indonesian government mole posing as a militant leader, lives next door to Bashir as well. [SBS Dateline, 10/12/2005] Despite his role in the Bojinka plot, Hambali continues to live there very openly. Beginning in March 1995, just two months after the plot was foiled, Hambali throws his first feast for several hundred guests to mark a Muslim holiday. This becomes an annual party. He also sometimes travels to Indonesia. [Time, 4/1/2002] By May 1999, if not earlier, the FBI connects Hambali to the Bojinka plot (see May 23, 1999). In January 2000, he attends a key al-Qaeda summit in nearby Kuala Lumpur. The CIA gets pictures and video footage of him at the meeting and already has pictures of him from a computer linked to the Bojinka plot (see January 5-8, 2000 and January 5, 2000). However, there is no apparent effort to apprehend him, extradite him, or even put him on a public wanted list. He continues to live in Sungai Manggis until at least late 2000. [Conboy, 2003]

Entity Tags: Fauzi Hasbi, Abu Bakar Bashir, Hambali, Abdullah Sungkar, Jemaah Islamiyah, Abu Jibril, Imam Samudra

Timeline Tags: Complete 911 Timeline

In an unusually fiery speech, President George H. W. Bush tells an audience at Princeton University that he does not hold with Congressional attempts to limit presidential power. “The most common challenge to presidential powers comes from a predictable source,” he says, “the United States Congress.” Bush accuses lawmakers of trying to “micromanage” executive branch decisions, particularly in foreign policy (see July 27, 1989). He denounces Congress for attempting to, in his view, accumulate power at the expense of the executive branch by making excessive and unwarranted demands for information, and by “writing too-specific directions for carrying out a particular law.” Six of the 20 vetoes he has cast were to defend the presidency against such meddling, he asserts. And he criticizes Congress for passing bills containing indefensible earmarks and spending provisions; to curb such excesses, he demands a line-item veto. But he tempers his remarks: “The great joy and challenge of the office I occupy,” he concludes, “is that the president serves, not just as the unitary executive (see April 30, 1986), but hopefully as a unifying executive.” [Savage, 2007, pp. 59]

Entity Tags: George Herbert Walker Bush

Timeline Tags: Civil Liberties

Ramzi Yousef, the future bomber of the WTC in 1993, stays in the Philippines and trains militants there in bomb-making. According to Philippine intelligence documents, Yousef had developed expertise in bomb-making and worked at a training camp at Khost, Afghanistan, teaching bomb-making for militants connected to bin Laden. But bin Laden dispatches him to the Philippines, where he trains about 20 militants belonging to the Abu Sayyaf group. Abu Sayyaf is heavily penetrated by Philippine undercover operatives at this time, especially Edwin Angeles, an operative who is the second in command of the group. Angeles will later recall that Yousef is introduced to him at this time as an “emissary from bin Laden.” [Strategic Studies Institute of the US Army War College, 9/1/2005 pdf file] Angeles also claims Yousef decided to use the Philippines as a “launching pad” for terrorist acts around the world. [New York Times, 9/6/1996] One of Abu Sayyaf’s top leaders will later recall that Yousef also brings a significant amount of money to help fund the group. [Philippine Daily Inquirer, 1/22/2007; CNN, 1/31/2007] A flow chart of Yousef’s associates prepared in early 1995 by Angeles’ Philippines handler Rodolfo Mendoza shows a box connected to Abu Sayyaf labeled “20 trainees/recruits.” So presumably the Philippine government is aware of this information by then, but it is not known when they warned the US about it (see Spring 1995). Yousef will also later admit to planning the 1993 WTC bombing at an Abu Sayyaf base, which most likely takes place at this time (see Early 1992). The ties between Yousef and Abu Sayyaf will grow stronger, culminating in the 1995 Bojinka plot (see January 6, 1995), an early version of the 9/11 plot.

Entity Tags: Ramzi Yousef, Abu Sayyaf, Edwin Angeles, Rodolfo Mendoza

Timeline Tags: Complete 911 Timeline

Author Terry Eastland, the editor of Forbes Media Critic and a fellow with the Ethics and Public Policy Center, publishes Energy in the Executive: The Case for the Strong Presidency. The book makes an impassioned case for the “unitary executive” theory of the presidency (see April 30, 1986). In essence, Eastland’s argument is that a strong presidency, combined with a much diluted Congress and Supreme Court, is the best way for conservatives to achieve their aims. While traditional conservatives tend to reject this theory as unacceptably authoritarian, many others on the right—neoconservatives, social conservatives, the religious right, and other groups—have embraced the concept. Author and former Nixon White House counsel John Dean will call Eastland’s arguments “weak… deeply flawed as history and constitutional law, and closer to cheerleading for presidential hubris, excessive secrecy, and monarchical-like authority than a solid justification for a strong presidency.” [Dean, 2007, pp. 100-106]

Entity Tags: John Dean, Terry Eastland

Timeline Tags: Civil Liberties

Apparently the bin Laden guest house where Yousef lived.Apparently the bin Laden guest house where Yousef lived. [Source: National Geographic]According to Pakistani investigators, Ramzi Yousef spends most of this time at the Beit Ashuhada guesthouse (translated as House of Martyrs) in Peshawar, Pakistan, which is funded by Osama bin Laden. Pakistani investigators reveal this bin Laden-Yousef connection to US intelligence in March 1995. The CIA will publicly reveal this in 1996. [Central Intelligence Agency, 1996 pdf file; Tenet, 2007, pp. 100] While living there, Yousef receives help and financing from two unnamed senior al-Qaeda representatives. [Reeve, 1999, pp. 47] Yousef will be arrested at another nearby bin Laden safe house in February 1995 (see February 7, 1995) with bin Laden’s address found in his pocket. [London Times, 10/18/1997] During these years, Yousef takes long trips to the US in preparation of the WTC bombing (see February 26, 1993) and the Philippines, where several plots are developed (see January 6, 1995). He also uses an al-Qaeda influenced mosque in Milan, Italy, as a logistical base (see 1995-1997).

Entity Tags: Osama bin Laden, Al-Qaeda, Ramzi Yousef

Timeline Tags: Complete 911 Timeline

Clement Rodney Hampton-El, one of the 1993 “Landmarks” bombers (see June 24, 1993), is summoned to the Saudi Embassy in Washington and told that wealthy Saudis are sponsoring fighters in Bosnia. Hampton-El has longstanding links to the International Islamic Relief Organization (IIRO), which is closely tied to the Saudi government (see October 12, 2001). He is given $150,000 to recruit and train people in the US to fight in Bosnia. [Schindler, 2007, pp. 121-122] He starts a militant training camp in Pennsylvania that same month (see December 1992-Early February 1993) and gets $150,000 overseas from a bin Laden linked charity front (it is not known if this is the same $150,000 or additional money) (see Late 1992-Early 1993). The Saudi embassy also introduces him to a radical imam named Bilal Philips. Philips, a Canadian citizen and author on Islamic topics, has been employed by the Saudi government since early 1991 to proselytize among US soldiers stationed in Saudi Arabia (see March-September 1991). Philips gives Hampton-El a list of likely candidates who are ex-US soldiers that Philips recently helped convert to Islam. [Schindler, 2007, pp. 121-122] That same month, 14 ex-US soldiers go to Bosnia to fight and train there (see December 1992-June 1993). They are led by double agent Ali Mohamed, who, like Hampton-El, is closely tied to the Al-Kifah Refugee Center in New York.

Entity Tags: Bilal Philips, Clement Rodney Hampton-El, Saudi Embassy (US)

Timeline Tags: Complete 911 Timeline

Mohammed Abouhalima.Mohammed Abouhalima. [Source: Corbis]Siddig Siddig Ali, Abdo Mohammed Haggag, Abu Ubaidah Yahya, Mohammed Abouhalima, and others train at a militant training camp in New Bloomfield, Pennsylvania, with weapons and ammunition provided by Yahya and Clement Rodney Hampton-El (see February 21, 1995). Abouhalima will later be convicted for a role in the 1993 WTC bombing, as will his brother (see February 26, 1993) while the others mentioned will be convicted for roles in the related “Landmarks” plot (see June 24, 1993). [USA v. Omar Ahmad Ali Abdel-Rahman et al, 7/13/1995, pp. 9] Yahya is the chief instructor, as he is an ex-US Marine who served two tours in Vietnam and teaches at a martial arts academy. Siddig Ali will later say of Yahya, “[H]e’s decorated and has a lot of medals… [and he was] a great trainer…” The training even includes mock nighttime assaults on a nearby electric power substation. [Kohlmann, 2004, pp. 73] An FBI informant named Garrett Wilson helps lead the FBI to the camp, and the FBI monitors it for two days, January 16 and 17, but the monitoring team is mysteriously pulled away before the end of the second day (see January 16-17, 1993). In a wiretapped conversation with an FBI informant (most likely Wilson), Siddig Ali says regarding the camp, “Our goal is that these people get extensive and very, very, very good training, so that we can get started at anyplace where jihad (holy war) is needed… And after they receive their training, they go to Bosnia… And whoever survives, I mean, could come and [instruct] somewhere else, or Egypt, or any other place, etc…” [Kohlmann, 2004, pp. 73] Hampton-El makes trips to Europe to pick up money from the Third World Relief Agency (TWRA) charity front to fund the camp (see Late 1992-Early 1993). TWRA is funneling huge amounts of weapons into Bosnia in violation of a UN embargo but with the tacit approval of the US (see Mid-1991-1996).

Entity Tags: Siddig Siddig Ali, Mohammed Abouhalima, Clement Rodney Hampton-El, Garrett Wilson, Abdo Mohammed Haggag, Abu Ubaidah Yahya, Third World Relief Agency

Timeline Tags: Complete 911 Timeline

Clement Rodney Hampton-El.Clement Rodney Hampton-El. [Source: Jolie Stahl]FBI investigators begin monitoring Clement Rodney Hampton-El’s house in New York as they close in on the militants involved in the “Landmarks” plot (see June 24, 1993). They listen in on a call from Hampton-El’s right-hand man, Abu Ubaidah Yahya, as he is in Vienna, Austria, picking up money from the Third World Relief Agency (TWRA) for the militants in the US tied to the Landmarks plot. Over the next few months, Yahya is tracked as he makes several trips from the US to Vienna, picking up about $100,000. [Miller, Stone, and Mitchell, 2002, pp. 113] Hampton-El had also been in Vienna earlier in the year, picking up more money from TWRA for the plotters (see Late 1992-Early 1993). TWRA is funneling a huge amount of weapons to Muslim Bosnia in violation of a UN embargo but with the tacit approval of the US government (see Mid-1991-1996). It also has ties to radical militants like bin Laden and Sheikh Omar Abdul-Rahman. The Washington Post will later report that, “Intelligence agencies say they have tapes of telephone calls by Abdul-Rahman to [TWRA’s] office.” The “Landmarks” bombers are closely associated with Abdul-Rahman and will be convicted along with him. [Washington Post, 9/22/1996] A secret 1996 CIA report will state that “according to a foreign government service” Elfatih Hassanein, the head of TWRA, “supports US Muslim extremists in Bosnia.” [Central Intelligence Agency, 1/1996] But apparently the US does not go after TWRA for its ties to the “Landmarks” plotters and the connection will not be publicized for years.

Entity Tags: Federal Bureau of Investigation, Clement Rodney Hampton-El, Abu Ubaidah Yahya, Elfatih Hassanein, Third World Relief Agency

Timeline Tags: Complete 911 Timeline

In the wake of the 1993 WTC bombing (see February 26, 1993), Emad Salem is rehired as an FBI informant. Because Salem has the confidence of the group around the “Blind Sheikh” Omar Abdul-Rahman connected to the bombing, the FBI is so desperate to hire him back that they pay him over $1 million to return. It takes time for Salem to fully regain confidences, but on April 23, 1993, Siddig Siddig Ali approaches Salem and asks him to participate in a series of bombings that he is planning. Siddig Ali explains that he wants to simultaneously bomb four landmarks in New York City: the Lincoln and Holland tunnel, the United Nations headquarters, and the New York FBI office. This will later be known as the “Landmarks” plot. Siddig Ali later tells Salem that he has friends in the Sudanese Embassy who had approved the plan and are willing to help with diplomatic license plates and credentials. Wearing a wire, over the next weeks Salem meets and records others participating in the plot. Many of them, including Siddig Ali, attended a training camp the FBI briefly monitored back in January 1993 (see January 16-17, 1993). [Miller, Stone, and Mitchell, 2002, pp. 113-114] The FBI will expand its surveillance of the plotters and roll up the plot a couple of months later (see June 24, 1993). The US will later eject two Sudanese diplomats, Siraj Yousif and Ahmed Yousif Mohamed, for suspicions of involvement in the plot. Both are said to be intelligence agents posing as diplomats. Later in 1993, the US also places Sudan on a list of terrorist countries. [New York Times, 8/18/1993; New York Times, 4/11/1996]

Entity Tags: Ahmed Yousif Mohamed, Siraj Yousif, Federal Bureau of Investigation, Emad Salem, Siddig Siddig Ali

Timeline Tags: Complete 911 Timeline

Informant Emad Salem, pictured bent over in a green shirt, enables the FBI to take surveillance footage like this of the plotters making a bomb.Informant Emad Salem, pictured bent over in a green shirt, enables the FBI to take surveillance footage like this of the plotters making a bomb. [Source: National Geographic]Eight people are arrested, foiling a plot to bomb several New York City landmarks. The targets were the United Nations building, 26 Federal Plaza, and the Lincoln and Holland tunnels. This is known as the “Landmarks” or “Day of Terror” plot. The plotters are connected to Ramzi Yousef and the “Blind Sheikh,” Sheikh Omar Abdul-Rahman. If the bombing, planned for later in the year, had been successful, thousands would have died. An FBI informant named Emad Salem had infiltrated the group, gathering information that leads to arrests of the plotters (see April 23, 1993). [US Congress, 7/24/2003] Abdul-Rahman will eventually be sentenced to life in prison for a role in the plot. Nine others will be given long prison terms, including Ibrahim El-Gabrowny and Clement Rodney Hampton-El. [New York Times, 1/18/1996] Siddig Siddig Ali, who was possibly the main force behind the plot (see April 23, 1993), will eventually be sentenced to only 11 years in prison because he agreed to provide evidence on the other suspects [New York Times, 10/16/1999]

Entity Tags: Ramzi Yousef, Siddig Siddig Ali, Ibrahim El-Gabrowny, Clement Rodney Hampton-El, Emad Salem, Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline

The “Blind Sheikh,” Sheikh Omar Abdul-Rahman, is arrested in Brooklyn after a long stand off. The “Landmarks” plot was rolled up on June 24, 1993, and many of Abdul-Rahman’s close associates were arrested on that day (see June 24, 1993). But Abdul-Rahman moved to the Abu Bakr mosque and stayed there. His presence in a mosque and the many supporters that gathered to surround it makes his arrest difficult. But after long negotiations, on July 3, 1993, he is arrested on immigration charges and taken to prison. [New York Times, 7/3/1993] He will later be charged with a role in the “Landmarks” plot and eventually sentenced to life in prison. [New York Times, 1/18/1996]

Entity Tags: Abu Bakr Mosque, Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline

Khalid Shaikh Mohammed in a 1998 FBI wanted poster.Khalid Shaikh Mohammed in a 1998 FBI wanted poster. [Source: FBI]9/11 mastermind Khalid Shaikh Mohammed (KSM) lives in the Philippines for a year, planning Operation Bojinka until the plot is exposed in January 1995 and he has to flee (see January 6, 1995). Police later say he lives a very expensive and non-religious lifestyle. He goes to karaoke bars and go-go clubs, dates go-go dancers, stays in four-star hotels, and takes scuba diving lessons. Once he rents a helicopter just to fly it past the window of a girlfriend’s office in an attempt to impress her. This appears to be a pattern; for instance, he has a big drinking party in 1998. [Los Angeles Times, 6/24/2002] Officials believe his obvious access to large sums of money indicate that some larger network is backing him by this time. [Los Angeles Times, 6/6/2002] One of the participants in Bojinka is a Pakistani businessman with alleged ties to the ISI and the drug trade. This Pakistani is said to use counterfeit US currency to help fund the Bojinka plot (see September 18-November 14, 1994). It has been suggested that KSM, a Pakistani, is able “to operate as he please[s] in Pakistan” during the 1990s [Los Angeles Times, 6/24/2002] , and he is linked to the Pakistani ISI by 1993 (see Spring 1993). His hedonistic time in the Philippines resembles reports of hijackers Mohamed Atta and Marwan Alshehhi in the Philippines in 1998-2000 (see December 1999). KSM returns to the Philippines occasionally, and he is even spotted there after 9/11 (see September 1998-January 1999).

Entity Tags: Khalid Shaikh Mohammed, Operation Bojinka

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A young Indonesian nicknamed Hambali forms a front company that ties al-Qaeda figures to the Bojinka plot (see January 6, 1995), an early version of the 9/11 plot. Hambali had fought in Afghanistan in the late 1980’s, repeatedly met with bin Laden there, and allied himself to bin Laden’s cause. In 1994, Hambali, living in a village north of Kuala Lumpur, Malaysia, began frequently receiving visitors. According to his landlord, “Some looked Arab and others white.” There has been no explanation who these “white” visitors may have been. Hambali had been very poor prior to this time, but he is suddenly “flush with newfound cash” brought by the visitors. In June 1994, he founds a front company called Konsonjaya with Wali Khan Amin Shah, a key Bojinka plotter, and both their names are listed on the eight-person board of directors. Shah fought with bin Laden in Afghanistan, and bin Laden will even admit knowing him and praise him in an 1998 interview (see May 28, 1998). Philippine police phone taps show that frequent calls are made from the Konsonjaya offices in Malaysia to the Philippines offices of Mohammed Jamal Khalifa, bin Laden’s brother-in-law who is also believed to be part of the Bojinka plot (see 1994). [Time, 4/1/2002] A Malaysian official will later say that Hambali spends time in the Philippines with Shah and bomber Ramzi Yousef in 1994 as they plan the Bojinka plot. [Washington Post, 2/3/2002] Mohammed Amin al-Ghafari, another Konsonjaya director, makes frequent trips from Malaysia to the Philippines while planning for the Bojinka plot is under way, and he is later believed to play a key role in financing the plot. In early 1995, after the Bojinka plot is broken up, one of the arrested Bojinka plotters will confess to Konsonjaya’s role in the plot (see February-Early May 1995) and a Philippine investigator’s flow chart of the Bojinka plotters and their connections will prominently include Konsonjaya (see Spring 1995). However, neither the Philippine nor US government appears interested in capturing Hambali, al-Ghafari, or the others involved in Konsonjaya before 9/11. [Los Angeles Times, 6/24/2002; Contemporary Southeast Asia, 12/1/2002] Hambali will continue to live openly in Malaysia, even throwing a party every year for hundreds of people (see April 1991-Late 2000). He will go on to plan other al-Qaeda attacks and will attend a key planning meeting for the 9/11 plot in 2000 (see January 5-8, 2000). [Time, 4/1/2002] Al-Ghafari will finally be deported in 2002 after years of police protection (see October 8-November 8, 2002).

Entity Tags: Wali Khan Amin Shah, Ramzi Yousef, Mohammed Amin al-Ghafari, Konsonjaya, Hambali, Mohammed Jamal Khalifa, Operation Bojinka

Timeline Tags: Complete 911 Timeline

Bomber Ramzi Yousef trains with members of the Abu Sayyaf, a Philippine militant group. He sneaks into the Philippines by boat to the southern island of Basilan, where Abu Sayyaf influence is strong. He tries to teach about 20 Abu Sayyaf operatives about explosives, but is frustrated by their inability to learn. After a few weeks, he goes to Manila to make the bombs needed for the planned Bojinka plot (see January 6, 1995) himself. However, some Abu Sayyaf militants are involved in the Bojinka plot, though details of their exact roles are scarce (see Late 1994-January 1995). There will be additional training in December 1994, involving five Filipinos and more foreigners (see January 3, 1995). [Reeve, 1999, pp. 72; Ressa, 2003, pp. 25-28] Trusted al-Qaeda operative and fellow Bojinka plotter Wali Khan Amin Shah also trains the Abu Sayyaf. [Miller, Stone, and Mitchell, 2002, pp. 139]

Entity Tags: Wali Khan Amin Shah, Ramzi Yousef, Abu Sayyaf

Timeline Tags: Complete 911 Timeline

The US Senate ratifies the international Convention Against Torture, originally proposed by the United Nations in 1985. The treaty bans any officials from signatory nations from inflicting “torture and other cruel, inhuman, or degrading treatment or punishment” on prisoners in order to gain information. It also establishes the UN Committee against Torture (UNCAT). The ban is absolute and cannot be waived: “No exceptional circumstances whatsoever, whether a state of war or a threat of war, internal political instability, or any other public emergency, may be invoked as a justification of torture.” [United Nations High Commissioner for Human Rights, 12/10/1984; Savage, 2007, pp. 155] The treaty also forbids signatory nations from sending detainees to other countries if there is a reasonable expectation that they may be tortured. [United Nations High Commissioner for Human Rights, 12/10/1984; Human Rights Web, 1/25/1997]

Entity Tags: United Nations Committee against Torture, Convention Against Torture, United Nations

Timeline Tags: Civil Liberties

White separatist Terry Nichols (see March 24, 1988 - Late 1990, December 22 or 23, 1988, October 12, 1993 - January 1994, and February - July 1994) flees the scene of a robbery he has committed in Arkansas and goes to Council Grove, Kansas, where he has rented a storage locker (see November 7, 1994), and then to Las Vegas, to stash the proceeds of the robbery with his ex-wife, Lana Padilla (see November 5, 1994 and November 6, 1994). Nichols makes plans to leave for the Philippines to visit his family in Cebu City, and leaves a note to be opened only if he does not return (see Late 1992-Early 1993 and Late 1994) by January 28, 1995—days after the terrorist plot Operation Bojinka was to be executed (see January 6, 1995). Nichols leaves the US on November 11.
Opening the Note - Padilla, fearing her ex-husband has left her a suicide note, opens it after taking Nichols to the airport. The note, titled “Read and Do Immediately,” instructs Padilla to send all of Nichols’s cash and valuables, including the loot from the robbery, to his wife Marife Nichols in Cebu City (see July - December 1990). Some of the cash and valuables, he says, is in a Las Vegas storage unit, and some is hidden in Padilla’s kitchen, behind a wooden panel in the back of her kitchen utility drawer. “As of now, only Marife, you, and myself know what there is and where it is. I hope you will do as I have stated. Josh has just a few years before he’s capable of being on his own and Marife and Nicole [Nichols’s young daughter by Marife—see (September 30, 1994)] have many more years of support needed. There is no need to tell anyone about the items in storage and at home.” After reading the note, Padilla is convinced Nichols intends to kill himself. She follows the directions in the note, breaks through the wooden panel behind her utility drawer, and finds $20,000 in cash in a plastic baggie.
Note to Fellow Bombing Conspirator - The note also contains two letters to Nichols’s fellow conspirator in the Oklahoma City bombing plan, Timothy McVeigh (see September 13, 1994, October 20, 1994, and 8:35 a.m. - 9:02 a.m. April 19, 1995), both addressed to “Tim.” The first tells McVeigh how to access the Las Vegas storage locker and where his blue pickup truck will be parked for his use if he needs it. Padilla drives to the Las Vegas storage locker and finds a box of carved jade, camera equipment, precious stones, and a ski mask. Much of this material will later be connected to the Arkansas robbery. The second letter to McVeigh instructs him to “clear everything out of CG 37” and to “also liquidate 40,” apparently referring to two storage lockers Nichols has rented in Council Grove (see October 17, 1994, and November 7, 1994) under the alias “Ted Parker,” which contain, among other items, a store of explosive fertilizer and some of the guns stolen in the Arkansas robbery. If he chooses, Nichols writes, McVeigh can pay for further rentals on the lockers instead of clearing them out. He warns McVeigh about possible law enforcement attention, writing: “As far as heat—none that I know. This letter would be for the purpose of my death.” The letter concludes: “Your [sic] on your own. Go for it!” Based on the instructions regarding the fertilizer, federal authorities will come to believe that Nichols is instructing McVeigh to go ahead with plans to bomb a federal building in Oklahoma City (see 8:35 a.m. - 9:02 a.m. April 19, 1995).
Return to the US - Nichols will return to the US on January 16, 1995 and, after staying a few days at Padilla’s home in Las Vegas, settle in Herington, Kansas, a tiny town not far from the ranch where he recently worked (see (September 30, 1994)). [New York Times, 5/28/1995; PBS Frontline, 1/22/1996; New York Times, 11/20/1997; Washington Post, 12/24/1997; Serrano, 1998, pp. 112-114; Douglas O. Linder, 2001; Nicole Nichols, 2003]
Later Attempts to Explain Letter, Actions - In his statement to the FBI (see 3:15 p.m. and After, April 21-22, 1995), Nichols will claim to have returned to the US on November 17. The indictment against Nichols will allege that he rented a storage locker in Las Vegas on November 16, based in part on his FBI statement. These dates do not correspond with other evidence showing Nichols remains in the Philippines until January 16. A chronology of events compiled by McVeigh’s lawyers (see Early 2005) also has McVeigh staying in Arkansas and New Mexico motels with Nichols in mid-December 1994. These contradictions are never adequately explained. [PBS Frontline, 1/22/1996] Nichols will also tell authorities that the phrase “Go for it!” is nothing more than an innocent reference to an old sales pitch he and his ex-wife had used in the early days of their marriage. The government authorities will not believe Nichols’s explanation. [Serrano, 1998, pp. 114] After the bombing, Padilla will tell authorities that Nichols gave her a key to a storage locker at the AAAABCO storage facility in Las Vegas, as stated in his note. The locker, she will say, contained thousands of dollars in gold and silver bouillon, tubular pipe, ski masks, and other items (see May 9, 1995 and May 11, 1995), many of which will be linked to the Arkansas robbery. After the bombing, FBI investigators will find a key to a safe-deposit box from the robbery in Nichols’s Herington home (see (February 20, 1995)) along with other items from the robbery. [New York Times, 5/9/1995; New York Times, 5/12/1995; New York Times, 5/28/1995; New York Times, 11/20/1997]

Entity Tags: Terry Lynn Nichols, Timothy James McVeigh, Marife Torres Nichols, Roger E. (“Bob”) Moore, Lana Padilla

Timeline Tags: US Domestic Terrorism

Avelino “Sonny” Razon.Avelino “Sonny” Razon. [Source: Canadian Broadcasting Corp.]In December 1994, Philippine police reportedly begin monitoring a Pakistani businessman by the name of Tariq Javed Rana. According to Avelino Razon, a Philippine security official, the decision to put Rana under surveillance is prompted by a report that “Middle Eastern personalities” are planning to assassinate Pope John Paul II during his upcoming January 1995 visit to Manila. “[We] had one man in particular under surveillance—Tariq Javed Rana, a Pakistani suspected of supporting international terrorists with drug money. He was a close associate of Ramzi Yousef,” Razon later recalls. But it is possible that police began monitoring Rana before this date. In September, the Philippine press reported that he was a suspect in an illegal drug manufacturing ring, and the US embassy in Manila received a tip that Rana was linked to the ISI and was part of a plot to assassinate President Clinton during his November 1994 visit to Manila (see September 18-November 14, 1994). [CounterPunch, 3/9/2006] While under surveillance in December, Rana’s house burns down. Authorities determine that the fire was caused by nitroglycerin which can be used to improvise bombs. One month later, a fire caused by the same chemical is started in Ramzi Yousef’s Manila apartment (see January 6, 1995), leading to the exposure of the Bojinka plot to assassinate the Pope and crash a dozen airplanes. [Contemporary Southeast Asia, 12/1/2002; CounterPunch, 3/9/2006] Rana is arrested by Philippine police in early April 1995. It is announced in the press that he is connected to Yousef and that he will be charged with investment fraud. He is said to have supported the militant group Abu Sayyaf and to have helped Yousef escape the Philippines after the fire in Yousef’s apartment. A search of the Lexis Nexus database shows there have been no media reports about Rana since his arrest. Around the same time as his arrest, six other suspected Bojinka plotters are arrested, but then eventually let go (see April 1, 1995-Early 1996). [Associated Press, 4/2/1995]

Entity Tags: Tariq Javed Rana, Abu Sayyaf, Ramzi Yousef, Avelino Razon, Pakistan Directorate for Inter-Services Intelligence, John Paul II

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Mohammed Jamal Khalifa.Mohammed Jamal Khalifa. [Source: CBS News]Mohammed Jamal Khalifa, a brother-in-law to bin Laden, is arrested in the US. He is held for visa fraud, but he is believed to be a major terrorist. His arrest takes place at a Holiday Inn in Morgan Hill, California. [San Francisco Chronicle, 10/24/2001] That is only about 20 miles from Santa Clara, where double agent Ali Mohamed is running an al-Qaeda cell (see 1987-1998). Counterterrorism expert Steven Emerson will later say of Khalifa and Mohamed, “It seems to me that they were probably in contact. I’m basing that only intuitively on the fact that they were in the same area, they were close to bin Laden, and they would’ve had an incentive to stay together.” [Lance, 2006, pp. 167] According to one account, Khalifa is arrested on behalf of the government of Jordan, because he is on trial there. [San Francisco Chronicle, 10/24/2001] Another account claims that Philippine authorities “tipped off Federal authorities on Khalifa’s movements.” [Filipino Reporter, 4/27/1995] He is traveling on a Saudi passport. He’d flown into the US from London on December 1 and has papers indicating he would be heading back to the Philippines. [Lance, 2006, pp. 158-159] It has been claimed that the CIA helped him get his US visa (see December 1, 1994). There are many reasons for US authorities to suspect Khalifa is a major terrorist figure:
bullet He is arrested with Mohammed Loay Bayazid, one of the dozen or so original members of al-Qaeda. Bayazid had attempted to purchase nuclear material for bin Laden the year before (see December 16, 1994).
bullet Philippine investigators had recently completed a secret report on terrorist funding. The report focuses on Khalifa, and says his activities in the Philippines strongly link with Muslim extremist movements in Iraq, Jordan, Turkey, Russia, Malaysia, the United Arab Emirates, Romania, Lebanon, Syria, Pakistan, Albania, the Netherlands, and Morocco. It calls a charity which Khalifa runs a “pipeline through which funding for the local extremists is being coursed.” Perhaps not coincidentally, the report was released just one day before Khalifa’s arrest in the US (see December 15, 1994).
bullet His possessions, which are quickly examined and translated, include a handwritten manual in Arabic detailing how to set up a terrorist curriculum at a school in the Philippines, giving lessons in bomb-making and assassination. [San Francisco Chronicle, 10/24/2001]
bullet Khalifa’s business card was discovered in a search of the New York City residence of Sheikh Omar Abdul-Rahman in 1993 (see August 1993).
bullet He is an unindicted coconspirator in the “Landmarks” bombings plot, which would have killed thousands in New York City. The trial is getting underway at this time. Abdul-Rahman will be convicted and sentenced to over 300 years in prison (see June 24, 1993).
bullet A State Department cable from days after his arrest states Khalifa is a “known financier of terrorist operations and an officer of an Islamic NGO in the Philippines that is a known Hamas front.”
bullet An alias is found in his personal organizer that was also used in a bomb-making manual brought into the US by Ahmad Ajaj, Ramzi Yousef’s travel partner, when the two of them came to the US to implement the 1993 World Trade Center bombing (see September 1, 1992).
bullet Bojinka plotter Wali Khan Amin Shah’s phone number is found in Khalifa’s possessions. The Bojinka plot, if successful, also would have killed thousands (see January 6, 1995). [Lance, 2006, pp. 158-159]
bullet A number in Pakistan that Ramzi Yousef had used to call the Philippines is found as well. Author Peter Lance will later note that such numbers “should have led the FBI directly to Ramzi Yousef, the world’s most wanted man” at the time. [Lance, 2006, pp. 160]
However, despite this wealth of highly incriminating material, within weeks of his arrest the US will decide to deport him to Jordan (see January 5, 1995). Over the next four months, even more of his links to terrorist activity will be discovered (see Late December 1994-April 1995). But Khalifa will be deported anyway (see April 26-May 3, 1995), and then soon freed in Jordan (see July 19, 1995).

Entity Tags: Ramzi Yousef, Steven Emerson, US Department of State, Wali Khan Amin Shah, Philippines, Ahmad Ajaj, Peter Lance, Mohammed Loay Bayazid, Ali Mohamed, Osama bin Laden, Federal Bureau of Investigation, Mohammed Jamal Khalifa, Jordan, Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline

News reports will later reveal that a Philippine government undercover operative working with the Philippine militant group Abu Sayyaf was deeply involved in the Bojinka plot, an early version of the 9/11 plot. Edwin Angeles, an uncover operative so deeply imbedded in Abu Sayyaf that he was actually the group’s second in command, gave up his cover in February 1995 (see Early February 1995), weeks after the Bojinka plot was foiled (see January 6, 1995). In 1996, the New York Times will report that according to US investigators, “Angeles said he worked alongside [Ramzi] Yousef as he planned the details of the [Bojinka] plot.” [New York Times, 8/30/1996] The Advertiser, an Australian newspaper, reports that after giving up his cover, Angeles reveals that Abdurajak Janjalani, the leader of Abu Sayyaf, and Abu Sayyaf generally, had a “far greater role in the plot to assassinate the Pope and blow up the US airliners than foreign intelligence agencies had previously thought. He said he had met Yousef several times in the Manila flat…” Unlike the New York Times, which only reported that Angeles switched sides in February 1995, the Advertiser notes that “many people believe” Angeles “was a military-planted spy” all along. [Advertiser, 6/3/1995] This will be confirmed in later news reports, and in fact Angeles secretly had worked for Philippine intelligence since the formation of Abu Sayyaf in 1991 (see 1991-Early February 1995). It is not clear what Angeles may have told his government handlers while the Bojinka plot was in motion, if anything.

Entity Tags: Ramzi Yousef, Abdurajak Janjalani, Abu Sayyaf, Edwin Angeles

Timeline Tags: Complete 911 Timeline

The Communications Assistance for Law Enforcement Act (CALEA) takes effect. CALEA obliges telecommunications providers such as AT&T to give law enforcement agencies and US intelligence organizations the ability to wiretap any domestic or international telephone conversations carried over their networks. In more recent years, the law will be expanded to give law enforcement and intelligence agencies similar abilities to monitor Internet usage by US citizens. [Federal Communications Commission, 2/21/2007]

Entity Tags: Communications Assistance for Law Enforcement Act (CALEA), AT&T

Timeline Tags: Civil Liberties

Two businessmen inform Philippine police that they heard explosions and saw Middle Eastern men engaged in what appeared to be military-type training on a remote beach two hours from Manila. Police quickly investigate and discover a partially burned Bible and pamphlets preaching a radical version of Islam. As a result, police go on red alert and several days later will foil the Bojinka plot (see January 6, 1995). An investigation conducted the following month will conclude that there were 20 people taking part in military-styled training on the beach from the last week of December until January 2. Fifteen of them were foreign nationals, from Egypt, Palestine, and Pakistan. [Vitug and Gloria, 2000, pp. 222-223; Ressa, 2003, pp. 33] Ramzi Yousef is likely elsewhere at the time, but a beach house at this training location was rented by him. [Reeve, 1999, pp. 86] Despite the suggestion that large numbers of people are involved in the Bojinka plot, the US will apparently lose interest in the case after detaining just three of the plotters. Later in 1995, the Philippine government will arrest several dozen suspected foreign terrorists and then let them go (see April 1, 1995-Early 1996). [Vitug and Gloria, 2000, pp. 222-223; Ressa, 2003, pp. 33]

Entity Tags: Philippine National Police, Operation Bojinka, Ramzi Yousef

Timeline Tags: Complete 911 Timeline

One of Ramzi Yousef’s timers seized by Philippines police in January 1995.One of Ramzi Yousef’s timers seized by Philippines police in January 1995. [Source: Peter Lance]Responding to an apartment fire, Philippine investigators uncover an al-Qaeda plot to assassinate the Pope that is scheduled to take place when he visits the Philippines one week later. While investigating that scheme, they also uncover Operation Bojinka, planned by the same people: 1993 WTC bomber Ramzi Yousef and 9/11 mastermind Khalid Shaikh Mohammed (KSM). [Independent, 6/6/2002; Los Angeles Times, 6/24/2002; Los Angeles Times, 9/1/2002] Many initial reports after 9/11 will claim the fire was accidental and the police discovery of it was a lucky break, but in 2002 the Los Angeles Times will report that the police started the fire on purpose as an excuse to look around the apartment. In the course of investigating the fire, one of the main plotters, Abdul Hakim Murad, is arrested. [Los Angeles Times, 9/1/2002] The plot has two main components. On January 12, Pope John Paul II is scheduled to visit Manila and stay for five days. A series of bombs along his parade route would be detonated by remote control, killing thousands, including the Pope. Yousef’s apartment is only 500 feet from the residence where the Pope will be staying. [Reeve, 1999, pp. 78; Lance, 2006, pp. 138] Then, starting January 21, a series of bombs would be placed on airplanes. [Insight, 5/27/2002] Five men, Yousef, Wali Khan Amin Shah, Abdul Hakim Murad, Abd al-Karim Yousef (a.k.a., Adel Anon, Yousef’s twin brother), and Khalid Al-Shaikh (thought to be an alias for KSM) would depart to different Asian cities and place a timed bomb on board during the first leg of passenger planes traveling to Los Angeles, San Francisco, Honolulu, and New York. They would then transfer to another flight and place a second bomb on board that flight. In all, 11 to 12 planes would blow up in a two day period over the Pacific. If successful, some 4,000 people would have been killed. [Agence France-Presse, 12/8/2001; Insight, 5/27/2002; Contemporary Southeast Asia, 12/1/2002] According to another account, some of the bombs would be timed to go off weeks or even months later. Presumably worldwide air travel could be interrupted for months. [Lance, 2003, pp. 260-61] A second wave of attacks involving crashing airplanes into buildings in the US would go forward later, once the pilots are trained for it (see February-Early May 1995).

Entity Tags: Abd al-Karim Yousef, Khalid Shaikh Mohammed, Ramzi Yousef, Wali Khan Amin Shah, Operation Bojinka, Al-Qaeda, Abdul Hakim Murad

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Bomb making materials found in Yousef’s Manila apartment.Bomb making materials found in Yousef’s Manila apartment. [Source: CNN]After a late night raid of the Manila, Philippines, apartment central to the Bojinka plot (see January 6, 1995), investigators find what the Los Angeles Times will call “an intelligence gold mine.” [Los Angeles Times, 9/1/2002] Very quickly, a team of US intelligence agents joins Philippine investigators to sort through the evidence, which fills three police vans. Investigators are able to match fingerprints in the apartment with fingerprints on record for Ramzi Yousef, already believed to be the mastermind behind the 1993 World Trade Center bombing (see February 26, 1993). There are priests’ robes, pipe bombs, a dozen passports, chemicals, maps of the Pope’s planned route through Manila, and more. [Washington Post, 9/30/2001; Los Angeles Times, 9/1/2002] “The most damning information was gleaned from Yousef’s notebook computer, and four accompanying diskettes.” The data is encrypted and in Arabic, but technicians are quickly able to decipher and translate it. [Washington Post, 9/30/2001] Computer data includes “the names of dozens of associates, and photos of some; a record of five-star hotels; and dealings with a trading corporation in London, a meat market owner in Malaysia, and an Islamic center in Tucson, Ariz.… They describe how money moved through an Abu Dhabi banking firm.” [Washington Post, 9/23/2001] Photographs of all five operatives who would place bombs on airplanes are recovered from a deleted computer file. [Los Angeles Times, 5/28/1995] Wali Khan Amin Shah is identified from one of these five photos, plus a list of cell phone numbers found on the hard drive. He is traced to another Manila apartment and arrested on January 11. Under interrogation, Shah, who soon escapes from custody in unexplained circumstances (see January 13, 1995), confesses that most of the funds for the Bojinka plot were channeled to Yousef through a bank account belonging to Ahmad al-Hamwi, a Syrian working at the International Relations and Information Center (IRIC), a charity front run by Mohammed Jamal Khalifa, Osama bin Laden’s brother-in-law. [Washington Post, 9/30/2001] But despite these leads, Ramzi Yousef is the only other person successfully arrested based on all this data (and Yousef’s arrest will largely be due to an informant responding to an existing tip off program (see February 7, 1995)). The Philippine government will arrest other Bojinka plotters later in the year, including another one of the five operatives assigned to place bombs on the planes, but they will all be released (see April 1, 1995-Early 1996). Al-Hamwi is never arrested, while Khalifa is actually in US custody at the time of the Bojinka raid but is soon let go (see April 26-May 3, 1995). The IRIC will be closed down, but its operations are immediately taken over by another close associate of Khalifa (see 1995 and After).

Entity Tags: Ramzi Yousef, Operation Bojinka, Wali Khan Amin Shah, International Relations and Information Center, Abdul Hakim Murad, Mohammed Jamal Khalifa, Ahmad al-Hamwi

Timeline Tags: Complete 911 Timeline

As the Bojinka plot is foiled (see January 6, 1995), a document found on Ramzi Yousef’s computer spells out the Bojinka plotters’ broad objectives. “All people who support the US government are our targets in our future plans and that is because all those people are responsible for their government’s actions and they support the US foreign policy and are satisfied with it.… We will hit all US nuclear targets. If the US government keeps supporting Israel, then we will continue to carry out operations inside and outside the United States to include…” At this point, the document comes to a halt in mid-sentence. [Washington Post, 9/23/2001] Khalid Shaikh Mohammed, much more than Ramzi Yousef, is the mastermind of the Bojinka plot. He will continue to work on the plot until it eventually morphs into the 9/11 attack. [Associated Press, 6/25/2002] Philippine Gen. Renado De Villa will later state, “They didn’t give up the objective.” Captured Bojinka plotter Abdul Hakim Murad “clearly indicated it was a large-scale operation. They were targeting the US. And they had a worldwide network. It was very clear they continued to work on that plan until someone gave the signal to go.” [Washington Post, 9/23/2001]

Entity Tags: Ramzi Yousef, Abdul Hakim Murad, Khalid Shaikh Mohammed, Renado De Villa

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Wali Khan Amin Shah.Wali Khan Amin Shah. [Source: Associated Press]Bojinka plotter Wali Khan Amin Shah is arrested in the Philippines on January 11, 1995, and he quickly implicates Khalid Shaikh Mohammed (KSM) as a key member in the Bojinka plot. The Bojinka plot was exposed on January 6, and the plotters attempt to flee the Philippines, but Shah gets caught (see January 6, 1995). He is found with a detonating cord, mercury, a quartz timer, springs for a pistol, a firing pin, and other incriminating items. He tells interrogators that he was given these items by KSM. Shah escapes just two days after his arrest (see January 13, 1995). An interrogation report containing the above information will be made the same day. Shah refers to KSM by the aliases Adam Ali and Abu Khalid. (It is not clear when investigators realize these aliases refer to KSM.) [Fouda and Fielding, 2003, pp. 100, 103] In 1996, an al-Qaeda informant will reveal that Shah is a key al-Qaeda operative, so KSM could have been linked to al-Qaeda through Shah (see June 1996).

Entity Tags: Khalid Shaikh Mohammed, Wali Khan Amin Shah

Timeline Tags: Complete 911 Timeline

Wali Khan Amin Shah, a conspirator in the Bojinka plot that was recently broken up by Philippine police (see January 6, 1995), escapes from prison just two days after he was arrested (see January 11, 1995). The circumstances of the escape are not known in detail. Based on interviews with counterterrorism officials, the New York Times will only write that Shah “somehow escaped from jail.” [New York Times, 12/13/1995; Ressa, 2003, pp. 43] Shah was one of only two conspirators seized around this time (see January 7-11, 1995), and was being held illegally. At the Bojinka trial in New York in 1996, a Philippine police official will admit that Shah was detained without having been properly arrested, advised of his rights, or arraigned before a judge, all of which is required by Philippine law. The official, Alex Paul Monteagudo, will also admit that a search of Shah’s apartment was conducted without a warrant and the items seized there were not subjected to forensic analysis. [New York Times, 8/1/1996]

Entity Tags: Wali Khan Amin Shah, Alex Paul Monteagudo

Timeline Tags: Complete 911 Timeline

One of the Bojinka plotters, Abdul Hakim Murad, confesses the importance of Khalid Shaikh Mohammed (KSM) in a number of plots. Murad was arrested on January 6, 1995 (see January 6, 1995), and within days he begins freely confessing a wealth of valuable information to Philippine interrogator Colonel Rodolfo Mendoza. Murad does not know KSM’s real name, but uses an alias known to investigators. Mendoza will write in a January 1995 report given to US officials that KSM was one of the main Bojinka plotters attempting to blow up US-bound airliners over the Pacific Ocean. In addition, he says KSM worked with Ramzi Yousef to “plan the bombing of the World Trade Center in 1993” (see February 26, 1993). He also says that KSM “supervised the plan to assassinate Pope John Paul II with a pipe bomb during a visit to the Philippines,” which was part of the Bojinka plot. [Gunaratna, 2003, pp. xxvii] Over the next few months, Murad will give up more information about KSM in further interrogation, for instance revealing that KSM has been in the US and is planning to come back to the US for flight training (see April-May 1995). Yet despite all these revelations, US intelligence will remain curiously uninterested in KSM despite knowing that he is also Yousef’s uncle. Counterterrorism expert Rohan Gunaratna will later comment that Murad’s confessions about KSM “were not taken seriously” by US intelligence. [Gunaratna, 2003, pp. xxvii]

Entity Tags: Ramzi Yousef, Abdul Hakim Murad, Khalid Shaikh Mohammed, John Paul II, Rodolfo Mendoza, Rohan Gunaratna

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Sections of the unindicted co-consiprator list for the “Landmarks” plot trial. Osama bin Laden is 95 and Ali Mohamed is 109.Sections of the unindicted co-consiprator list for the “Landmarks” plot trial. Osama bin Laden is 95 and Ali Mohamed is 109. [Source: National Geographic]In February 1995, the US government files a confidential court document listing bin Laden and scores of other people as possible co-conspirators in the 1993 New York City “Landmarks” plot (see June 24, 1993). Ali Mohamed’s name is on the list, confirming that investigators are aware of his involvement in al-Qaeda operations. Yet he continues to live openly in California. Mohamed obtains the document, though it is not clear how he obtained it. [9/11 Commission, 6/16/2004; 9/11 Commission, 7/24/2004, pp. 472] US prosecutor Patrick Fitzgerald will later state that when Mohamed’s California residence is finally searched in 1998 (see August 24, 1998), investigators discover “a sensitive sealed document from the trial of Sheik Omar Abdul Rahman with notations indicating that [he sent it] to the head of the Kenyan al-Qaeda cell for delivery to bin Laden. I shudder to think of the people who may read this statement and where it may be found some day.” [9/11 Commission, 6/16/2004] A later government indictment will say that Mohamed sent the list to Wadih El-Hage in Kenya who was told to hand deliver it to bin Laden in Afghanistan. [Washington Post, 8/1/1999] If that is not enough to prove Mohamed’s duplicity, when El-Sayyid Nosair is defended in this trial, Nosair’s lawyers will expose more evidence about Mohamed. They argue that Nosair’s activities were part of a US-sponsored covert operation to train and arm the mujaheddin. They argue that Mohamed was the key link in this operation, and present evidence and witnesses showing how Mohamed trained the bomb plotters in 1989 (see July 1989). They mention the classified military manuals that Mohamed stole and gave the group (see November 5, 1990). Mohamed’s name and role in these activities come out publicly during the trial, and the Washington Post reports in 1998 that after hearing this testimony,“the FBI began to focus on Mohamed as a potential terrorism suspect.” Yet both US intelligence and al-Qaeda apparently continue to work with him. [New York Times, 10/30/1998; New York Times, 10/31/1998]

Entity Tags: Wadih El-Hage, Patrick J. Fitzgerald, Osama bin Laden, United States, Ali Mohamed, Omar Abdul-Rahman

Timeline Tags: Complete 911 Timeline

A Boston Globe article publicly exposes Ali Mohamed, calling him “a shadowy individual described by defense attorneys as a key figure in the largest terrorism trial in US history.” The trial is the prosecution of Sheikh Omar Abdul-Rahman and others for the 1993 “Landmarks” bombing plot (see June 24, 1993). The Globe article notes that Mohamed was in the US Special Forces and connects him to both Abdul-Rahman’s radical militant group and the CIA. A senior US official claims that Mohamed’s “presence in the country is the result of an action initiated by [the CIA].” The article further states, “Senior officials say Mohamed, who is of Egyptian origin, benefited from a little known visa-waiver program that allows the CIA and other security agencies to bring valuable agents into the country, bypassing the usual immigration formalities. Intelligence sources say that waivers are controlled by the CIA’s Department of Operations, the clandestine side of the agency, and have been used ‘sparingly’ in recent years. Waivers are generally used to bring into the country people who have served the agency in sensitive positions overseas. They come here, an intelligence officer said, because they fear for their lives, have been promised asylum in return for cooperation, or need to be debriefed after an operation.” According to the article, “Mohamed dropped out of sight several years ago, and his whereabouts remain unknown.” But in fact, the FBI interviewed him three months earlier and remains aware of his whereabouts (see December 9, 1994). Mohamed will continue to work with al-Qaeda despite this exposure. [Boston Globe, 2/3/1995]

Entity Tags: Central Intelligence Agency, Omar Abdul-Rahman, Ali Mohamed

Timeline Tags: Complete 911 Timeline

President Clinton issues Executive Order 12949, which marginally extends the powers of the Justice Department to conduct warrantless surveillance of designated targets, specifically suspected foreign terrorists. Perhaps the most controversial aspect of the order comes in the first section, which reads, “Pursuant to section 302(a)(1) of the [Foreign Intelligence Surveillance] Act [FISA], the Attorney General is authorized to approve physical searches, without a court order, to acquire foreign intelligence information for periods of up to one year, if the Attorney General makes the certifications required by that section.” [US President, 2/9/1995] As with then-president Jimmy Carter’s own May 1979 order extending the Justice Department’s surveillance capabilities (see May 23, 1979), after George W. Bush’s warrantless domestic wiretapping program will be revealed in December 2005 (see December 15, 2005), many of that program’s defenders will point to Clinton’s order as “proof” that Clinton, too, exercised unconstitutionally broad powers in authorizing wiretaps and other surveillance of Americans. These defenders will point to the “physical search” clause in Clinton’s order to support their contention that, if anything, Clinton’s order was even more egregrious than anything Bush will order. This contention is false. [50 U.S.C. 1802(a); Think Progress, 12/20/2005] Under FISA, the Attorney General must certify that any such physical search does not involve the premises, information, material, or property of a United States person.” That means US citizens or anyone inside the United States. Clinton’s order does not authorize warrantless surveillance or physical searches of US citizens. [US President, 2/9/1995; Think Progress, 12/20/2005]

Entity Tags: US Department of Justice, James Earl “Jimmy” Carter, Jr., William Jefferson (“Bill”) Clinton, George W. Bush, Foreign Intelligence Surveillance Act

Timeline Tags: Civil Liberties

Many of the Bojinka plotters are arrested in the Philippines and then let go. On April 1, the Philippines police arrest six foreigners, who are from Jordan, Syria, Lebanon, Oman, and the United Arab Emirates. They seize a cache of weapons and explosives in their apartments. It is announced the men have ties to Sheikh Omar Abdul-Rahman and Ramzi Yousef and that they are being charged with stockpiling illegal firearms. [New York Times, 4/3/1995; New York Times, 4/8/1995; South China Morning Post, 12/19/1995] On December 30, 15 more suspects are arrested. This group is made up of Iraqi, Sudanese, Saudi, and Pakistani nationals. They are found with guns and explosives. One of them is identified as Ramzi Yousef’s twin brother Abd al-Karim Yousef, who had been using the alias Adel Anon. [New York Times, 12/31/1995] Philippine authorities claim that not only were these men involved in the Bojinka plot (see January 6, 1995), but they were also planning to assassinate President Fidel Ramos and commanders of the Philippines army and national police. [CNN, 1/3/1996] Edwin Angeles had been an undercover operative posing as a top leader in the Abu Sayyaf militant group (see Late 1994-January 1995 and Early February 1995), and now he leads the investigation to capture these men based on what he knew about them when he was in Abu Sayyaf. However, he later claims that not all of them were guilty and that some of them were framed by the planting of weapons and other evidence. He goes public with this complaint in early 1996. All of the men are released on bail and then all of them jump bail. Some flee the Philippines while others stay and go into hiding. [Philippine Daily Inquirer, 7/10/2001; Contemporary Southeast Asia, 12/1/2002] It is not known what happens to most of these men after their release. But one of the men arrested in March 1995, Hadi Yousef Alghoul, will be arrested in the Philippines again in late 2001. He will be found with nearly 300 sticks of dynamite and accused of involvement in other plots as well (see December 26, 2001). In 2003, it will be reported that Abd al-Karim Yousef was recently traveling with Khalid Shaikh Mohammed (KSM), and in the wake of KSM’s 2003 arrest he is capable of taking over as al-Qaeda’s operational commander. [Washington Post, 3/4/2003; Time, 3/8/2003] It has not been explained why the Philippines did not turn him over to the US, since the US had put out an alert for him in March 1995, shortly after his brother Ramzi Yousef was arrested. [New York Times, 3/20/1995]

Entity Tags: Hadi Yousef Alghoul, Edwin Angeles, Omar Abdul-Rahman, Abd al-Karim Yousef, Ramzi Yousef

Timeline Tags: Complete 911 Timeline

Newsday reports, “Some crucial computer evidence against notorious terrorist suspect Ramzi Yousef has been destroyed, and the FBI has begun an investigation into whether the CIA is responsible…” After the Bojinka plot was foiled in the Philippines (see January 6, 1995), a computer hard drive and several floppy discs were discovered in Yousef’s Manila apartment and found to contain a great deal of useful evidence. Pictures and phone numbers recovered from the hard drive led to the arrest of another Bojinka plotter just days later (see January 7-11, 1995). The computer files were copied by Philippine authorities and then turned over to the CIA. The CIA then “provided the FBI with a summary of the files, indicating they contained detailed information about Yousef’s coconspirators in the United States and overseas, including their names, addresses and in some cases, even phone numbers.… But when the CIA turned over the actual computer and disks, Justice Department experts determined that at least three separate computer deletion programs had been used to erase some of the data, law-enforcement sources said.” One US law-enforcement official complains, “We had teams of investigators frothing at the mouth to get at Yousef’s network. And we get handed an empty computer. It’s as if we’d been tracking a serial killer and someone intentionally shredded the investigative file.” Officials believe it is not likely the files will ever be recovered. Newsday reports that “The FBI is investigating whether CIA agents or their operatives intentionally destroyed the evidence.” Since Philippine authorities made copies of the files, the FBI has tried to get copies directly from them, but without success. [Newsday, 4/16/1995] A search of the Lexis Nexus database shows no follow up to this story. But only three Bojinka plotters—Ramzi Yousef, Abdul Hakim Murad, and Wali Khan Amin Shah—are arrested in the years before 9/11, and the rest of the network goes free.

Entity Tags: Federal Bureau of Investigation, Philippines, Ramzi Yousef, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline

Abdul Hakim Murad is in a US prison awaiting trial for his alleged role in the Bojinka plot (see January 6, 1995). Told about the Oklahoma City bombing that took place earlier in the day (see 8:35 a.m. - 9:02 a.m. April 19, 1995), he immediately takes credit for the bombing on behalf of his associate Ramzi Yousef. However, Yousef, also in US custody at the time, makes no such claim (see 10:00 a.m. April 19, 1995 and After). An FBI report detailing Murad’s claim will be submitted to FBI headquarters the next day. [Lance, 2006, pp. 163-164] A Philippine undercover operative will later claim that Terry Nichols, who will be convicted for a major role in the Oklahoma City bombing, met with Murad, Yousef, and others in the Philippines in 1994, and discussed blowing up a building in Oklahoma and several other locations (see Late 1992-Early 1993 and Late 1994). Counterterrorism “tsar” Richard Clarke will later comment: “Could [Yousef] have been introduced to [Nichols]? We do not know, despite some FBI investigation. We do know that Nichols’s bombs did not work before his Philippine stay and were deadly when he returned.” [Clarke, 2004, pp. 127] Mike Johnston, a lawyer representing the Oklahoma City bombing victims’ families, will later comment: “Why should Murad be believed? For one thing, Murad made his ‘confession’ voluntarily and spontaneously. Most important, Murad tied Ramzi Yousef to the Oklahoma City bombing long before Terry Nichols was publicly identified as a suspect.” [Insight, 6/22/2002] Also on this day, Mohammed Jamal Khalifa, an associate of Yousef and Murad who is being held in the US, is moved from a low security prison to a maximum security prison. [Lance, 2006, pp. 164] But despite these potential links to Muslim militants, only five days after the Oklahoma City bombing the New York Times will report, “Federal officials said today that there was no evidence linking people of the Muslim faith or of Arab descent to the bombing here.” [New York Times, 4/24/1995] Murad’s claim apparently will not be reported in any newspaper until two years later [Rocky Mountain News, 6/17/1995] , when lawyers for Nichols’s bombing partner, Timothy McVeigh, tell reporters that their defense strategy will be to claim that the bombing was the work of “foreign terrorists” led by “a Middle Eastern bombing engineer.” The lawyers will claim that the bombing was “contracted out” through an Iraqi intelligence base in the Philippines, and it is “possible that those who carried out the bombing were unaware of the true sponsor.” The lawyers also say it is possible, though less likely, that the bombing was carried out by right-wing white supremacists, perhaps from the Elohim City compound (see 1973 and After, 1983, 1992 - 1995, October 12, 1993 - January 1994, August 1994 - March 1995, September 12, 1994 and After, November 1994, February 1995, and April 5, 1995). [New York Times, 3/26/1997] The claims of foreign involvement will be discredited (see 10:00 a.m. April 19, 1995 and After).

Entity Tags: Ramzi Yousef, Richard A. Clarke, Mohammed Jamal Khalifa, Elohim City, Federal Bureau of Investigation, Mike Johnston, Abdul Hakim Murad, Timothy James McVeigh, Terry Lynn Nichols

Timeline Tags: Complete 911 Timeline, US Domestic Terrorism

A Syrian suspected of involvement in the al-Qaeda Bojinka plot is granted asylum in Australia even though the Australian government is aware of some of his apparent terrorism ties. Ahmad al-Hamwi, a.k.a. Omar Abu Omar, was head of the International Relations and Information Center (IRIC) from 1993 to 1995, a charity front closely tied to the failed Bojinka plot (see January 6, 1995). In 1995, Philippine investigators determined that most of the funding for the plot went through a bank account controlled by al-Hamwi. [Institute of Defense and Strategic Studies, 3/7/2003 pdf file] At the same time, he was roommates with Mohammed Jamal Khalifa, bin Laden’s brother-in-law, and married the sister of one of Khalifa’s Philippine wives. He worked closely with Khalifa in the IRIC until Khalifa was forced to leave the country in late 1994 (see December 1, 1994). [Australian, 4/8/2006] Shortly after the Bojinka plot is foiled by Philippines authorities in early 1995, the IRIC is shut down and al-Hamwi is brought in for questioning. However, he is let go and travels to Australia in July 1995 then immediately applies for asylum there. The Australian asylum review board is aware of the following things:
bullet He was interrogated by Philippines intelligence and questioned about his ties to WTC bomber Ramzi Yousef and the Bojinka plot to kill the Pope.
bullet He tells the review board that he was interrogated by a senior officer with direct ties to the Philippine president
bullet He came into Australia using a fake Dutch passport and has two fake Syrian passports.
bullet He has ties to Khalifa, who had been convicted of funding a bombing in Jordan.
bullet He is a longtime member of the militant group the Muslim Brotherhood.
But incredibly, in June 1996 he is granted him asylum on the grounds that he could be persecuted in Syria due to his ties to the Brotherhood. [Refugee Review Tribunal, 6/26/1996; Australian, 4/8/2006] In 2006, it will be reported that he is still living openly in Australia. Further, Philippines intelligence alleges that he came to the Philippines after having been banned from Turkey for his suspected involvement in a 1986 bombing there. It is not clear how the Australian government missed information like this, or if they just ignored it. [Australian, 4/8/2006] In the wake of these 2006 reports, the Australian government will claim to be investigating his status. Yet there have been no reports that he has been arrested or had his residency revoked since then. [Australian, 4/10/2006; Age (Melbourne), 4/10/2006]

Entity Tags: Refugee Review Tribunal, Operation Bojinka, International Relations and Information Center, Ahmad al-Hamwi, Muslim Brotherhood, Mohammed Jamal Khalifa

Timeline Tags: Complete 911 Timeline

Defense counsel for El Sayyid Nosair, one of the militants accused in the “Landmarks” bomb plot (see June 24, 1993) along with the “Blind Sheikh,” Sheikh Omar Abdul Rahman, applies for a missing witness instruction for double agent Ali Mohamed. The counsel, Roger Stavis, believes that it would benefit his client to have Mohamed testify, because Mohamed worked for militants connected to Abdul-Rahman as well as the FBI (see 1990), CIA (see 1984), and US army (see 1986). Therefore, Stavis might be able to use Nosair’s connection with Mohamed to convince the jury that Nosair was acting on the instructions of an agent of the US government. Stavis has been attempting to contact Mohamed with no success for some time, although the prosecution is in contact with him where he lives in California (see December 1994-January 1995). Under federal law, a trial judge can give a missing witness instruction if one party at a trial wants a witness to testify but cannot find him, whereas the other party can find him but does not seem to want him to testify. Based on such an instruction, the jury can then decide that the party that could find him, but did not get him to testify, did so deliberately because it thought the testimony would be damaging to it. Author Peter Lance will later comment that, given the circumstances, “Stavis had every right to expect that jury charge,” but Judge Michael Mukasey merely responds, “I don’t think a missing witness charge on that gentleman is warranted and I am not going to give one.” Lance will comment that by failing to grant the missing witness instruction, Mukasey helps “bury the significance” of Mohamed, and conceal his role in Islamic militancy from the public. [Lance, 2006, pp. 208; Raw Story, 9/25/2007] President Bush will later appoint Mukasey to be the US attorney general (see November 8, 2007).

Entity Tags: Michael Mukasey, El Sayyid Nosair, Peter Lance, Roger Stavis, Ali Mohamed

Timeline Tags: Complete 911 Timeline

Melissa Boyle Mahle.Melissa Boyle Mahle. [Source: Publicity photo]According to a later account by CIA agent Melissa Boyle Mahle, “a tidbit received late in the year revealed the location” Khalid Shaikh Mohammed (KSM) in Qatar (see 1992-1996). [Mahle, 2005, pp. 247-248] This presumably is information the FBI learned in Sudan that KSM was traveling to Qatar (see Shortly Before October 1995). However, US intelligence should also have been aware that KSM’s nephew Ramzi Yousef attempted to call him in Qatar in February 1995 while Yousef was in US custody (see After February 7, 1995-January 1996). Mahle is assigned to verify KSM’s identity. She claims that at the time the CIA is aware of KSM’s involvement in the Bojinka plot in the Philippines (see January 6, 1995) and in the 1993 WTC bombing (see February 26, 1993) She is able to match his fingerprints with a set of fingerprints the CIA already has in their files. [Guardian, 3/31/2005] By October 1995, the FBI tracks KSM to a certain apartment building in Qatar. Then, using high-technology surveillance, his presence in the building is confirmed. [Miniter, 2003, pp. 85-86] Mahle argues that KSM should be rendered out of the country in secret. The US began rendering terrorist suspects in 1993 (see 1993), and a prominent Egyptian extremist is rendered by the CIA in September 1995 (see September 13, 1995). She argues her case to CIA headquarters and to the highest reaches of the NSA, but is overruled. [Guardian, 3/31/2005] Instead, the decision is made to wait until KSM can be indicted in a US court and ask Qatar to extradite him to the US. Despite the surveillance on KSM, he apparently is able to leave Qatar and travel to Brazil with bin Laden and then back to Qatar at the end of 1995 (see December 1995). KSM will be indicted in early 1996, but he will escape from Qatar a few months later (see January-May 1996).

Entity Tags: Ramzi Yousef, Khalid Shaikh Mohammed, Melissa Boyle Mahle, National Security Agency, Central Intelligence Agency

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

A suicide bombing destroys the police station in the town of Rijeka, Croatia, wounding 29 people. The Egyptian militant group Al-Gama’a al-Islamiyya takes credit for the bombing, saying it is revenge for the abduction of Al-Gama’a al-Islamiyya leader Talaat Fouad Qassem in Croatia the month before (see September 13, 1995). The Croatians will later determine that the mastermind, Hassan al-Sharif Mahmud Saad, and the suicide bomber were both tied to Al-Gama’a al-Islamiyya. They also were tied to the Islamic Cultural Institute in Milan, Italy, which in turn has ties to many militant attacks, some committed Ramzi Yousef (see 1995-1997). CIA soon discovers that the suicide bomber also worked for the Third World Refugee Center charity front (see January 1996). [Kohlmann, 2004, pp. 153-155] In 1999, the FBI’s Bojinka investigation will notice that Khalid Shaikh Mohammed (KSM) was believed to be in neighboring Bosnia at the time and that the timing device of the bomb (a modified Casio watch) closely resembled those used by KSM and his nephew Yousef in the Bojinka plot (see January 6, 1995). Presumably, this would have increased the importance of catching KSM. [9/11 Commission, 7/24/2004, pp. 489]

Entity Tags: Third World Relief Agency, Ramzi Yousef, Khalid Shaikh Mohammed, Al-Gama’a al-Islamiyya, Federal Bureau of Investigation, Hassan al-Sharif Mahmud Saad, Talaat Fouad Qassem, Islamic Cultural Institute

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Rescue workers removing bodies from the Egyptian embassy in Islamabad.Rescue workers removing bodies from the Egyptian embassy in Islamabad. [Source: Canadian Broadcasting Corporation]The Islamic Jihad blows up the Egyptian Embassy in Islamabad, Pakistan. Two cars filled with explosives crash through the embassy gates, killing the bombers and sixteen others. Ayman al-Zawahiri will later write in a book, “The bomb left the embassy’s ruined building as an eloquent and clear message.” Islamic Jihad is already closely tied to al-Qaeda by this time. [New Yorker, 9/9/2002] The Egyptian government had recently dispatched up to 100 government agents to London with the task of eliminating militants opposed to the Egyptian government. The Independent will later report, “Sources in Cairo said that several of the dead embassy officials were working under cover as diplomats to help the Pakistani authorities track down” militants. In the wake of the attack, plans to send more Egyptian government agents to Pakistan to hunt militants in that region are scuttled. [Independent, 12/6/1995] Some of the money for the bombing operation was apparently raised by al-Zawahiri on a fundraising trip to the US (see Late 1994 or 1995). One suspect, a Canadian citizen named Ahmed Said Khadr, will be arrested in Pakistan a short time after the bombings. He will soon be released at the request of the Canadian prime minister, but will later be revealed to be a founding member of al-Qaeda (see January 1996-September 10, 2001).

Entity Tags: Ayman al-Zawahiri, Ahmed Said Khadr, Islamic Jihad

Timeline Tags: Complete 911 Timeline

Abdallah bin Khalid al-Thani.Abdallah bin Khalid al-Thani. [Source: Fethi Belaid/ Agence France-Presse]Since Operation Bojinka was uncovered in the Philippines (see January 6, 1995), many of the plot’s major planners, including Ramzi Yousef, are found and arrested. One major exception is 9/11 mastermind Khalid Shaikh Mohammed (KSM). He flees to Qatar in the Persian Gulf, where he has been living openly using his real name, enjoying the patronage of Abdallah bin Khalid al-Thani, Qatar’s Interior Minister and a member of the royal family (see 1992-1996). [ABC News, 2/7/2003] He had accepted al-Thani’s invitation to live on his farm around 1992 (see 1992-1995). The CIA learned KSM was living in Qatar in 1995 after his nephew Ramzi Yousef attempted to call him there while in US custody (see After February 7, 1995-January 1996). The Sudanese government also tipped off the FBI that KSM was traveling to Qatar. Some CIA agents strongly urged action against KSM after his exact location in Qatar was determined, but no action was taken (see October 1995). In January 1996, KSM is indicted in the US for his role in the 1993 WTC bombing, and apparently this leads to an effort to apprehend him in Qatar that same month. FBI Director Louis Freeh sends a letter to the Qatari government asking for permission to send a team after him. [Los Angeles Times, 12/22/2002] One of Freeh’s diplomatic notes states that KSM was involved in a conspiracy to “bomb US airliners” and is believed to be “in the process of manufacturing an explosive device.” [New Yorker, 5/27/2002] Qatar confirms that KSM is there and is making explosives, but they delay handing him over. After waiting several months, a high-level meeting takes place in Washington to consider a commando raid to seize him. However, the raid is deemed too risky, and another letter is sent to the Qatari government instead. One person at the meeting later states, “If we had gone in and nabbed this guy, or just cut his head off, the Qatari government would not have complained a bit. Everyone around the table for their own reasons refused to go after someone who fundamentally threatened American interests….” [Los Angeles Times, 12/22/2002] Around May 1996, Mohammed’s patron al-Thani makes sure that Mohammed and four others are given blank passports and a chance to escape. A former Qatari police chief later says the other men include Ayman al-Zawahiri and Mohammed Atef, al-Qaeda’s number two and number three leaders, respectively (see Early 1998). [Los Angeles Times, 9/1/2002; ABC News, 2/7/2003] In 1999, the New York Times will report that “Although American officials said they had no conclusive proof, current and former officials said they believed that the Foreign Minister [Sheik Hamed bin Jasim al-Thani] was involved, directly or indirectly” in tipping off KSM. [New York Times, 7/8/1999] KSM will continue to occasionally use Qatar as a safe haven, even staying there for two weeks after 9/11 (see Late 2001).

Entity Tags: Ramzi Yousef, Mohammed Atef, Hamed bin Jasim al-Thani, Khalid Shaikh Mohammed, Abdallah bin Khalid al-Thani, Ayman al-Zawahiri, Louis J. Freeh, Osama bin Laden

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Ahmed Said Khadr in a hospital bed during his hunger strike, being visited by journalists.Ahmed Said Khadr in a hospital bed during his hunger strike, being visited by journalists. [Source: Canadian Broadcasting Corporation]In late 1995, Ahmed Said Khadr is arrested in Pakistan for a suspected role in the November 1995 bombing of the Egyptian embassy in that country (see November 19, 1995). Khadr was born an Egyptian and became a Canadian citizen, and is an employee of Human Concern International (HCI), a Canadian-based charity. [Burr and Collins, 2006, pp. 276-277]
Smuggling During the Afghan War - The Canadian government was already aware of Khadr’s militant ties before the bombing. In the late 1980s, a federal Canadian official was asked by a diplomat in Pakistan about Khadr. The official did not know who that was, so the diplomat explained that Khadr was involved in smuggling Saudi money into Afghanistan while using HCI as a cover. This person further said that, “For months, the Afghan scene in Islamabad buzzed with this and other information” about Khadr. This was passed on to other parts of the Canadian government, but no action was taken. [National Post, 9/6/2002]
Khadr Released Due to Hunger Strike - After his late 1995 arrest, Khadr begins a hunger strike from within a Pakistani prison. In January 1996, Canadian Prime Minister Jean Chretien visits Pakistan and, in response to popular pressure caused by the hunger strike, asks the Pakistani government to release him. Khadr is released several months later. He returns to Canada and stops working with HCI, but starts a new charity called Health and Education Project International. [Burr and Collins, 2006, pp. 276-277]
HCI Linked to Al-Qaeda - A January 1996 CIA report claims that the entire Peshawar, Pakistan, HCI branch that Khadr heads is staffed by Islamist militants and that its Swedish branch is smuggling weapons to Bosnia (see January 1996). In a June 1996 interview with an Egyptian weekly, Osama bin Laden surprisingly identifies HCI as a significant supporter of al-Qaeda. [Emerson, 2006, pp. 398, 423]
Monitoring Khadr's Associates - Also around 1996, the Canadian intelligence agency CSIS begins monitoring several suspected radical militants living in Canada. The CSIS will later call one of them, Mahmoud Jaballah, an “established contact” of Khadr. [Canadian Security Intelligence Service, 2/22/2008 pdf file] Another, Mohamed Zeki Mahjoub, will also be called a contact of Khadr. [Canadian Security Intelligence Service, 2/22/2008 pdf file] The CSIS has yet to reveal details of when such contacts are made, except in the case of Mohamed Harkat. It will be mentioned that in March 1997 Harkat is recorded saying that he is about to meet Khadr in Ottawa, Canada. [Canadian Security Intelligence Service, 2/22/2008 pdf file]
Wanted Again in Pakistan - On September 5, 1998, the Globe and Mail will report that Khadr is wanted in Pakistan again for his role in the Egyptian embassy bombing. A Pakistani official says that Khadr is living in Afghanistan, has contacts with Osama bin Laden, and is using his charity as a cover for smuggling and banking transactions. The executive director of HCI tells the newspaper that Khadr was last seen in Ottawa, Canada, about three months earlier, and, “We do learn once in a while that he was in Pakistan or Canada or moving back and forth.” [Globe and Mail, 9/5/1998]
Listed by UN - In January 2001, the United Nations places Khadr on a list of those who support terrorism associated with bin Laden. [Canadian Security Intelligence Service, 2/22/2008 pdf file]
But despite all this, there is no evidence the Canadian government attempts to arrest or even indict him before 9/11. (The Egyptian government does pressure the Pakistani ISI to capture him in the summer of 2001 (Summer 2001).) Khadr will be killed in Pakistan in October 2003. It will eventually emerge that he was a founding member of al-Qaeda and an important leader of that group (see October 2, 2003).

Entity Tags: Ahmed Said Khadr, Canadian Security Intelligence Service, Health and Education Project International, Jean Chretien, Al-Qaeda, Mohamed Zeki Mahjoub, Osama bin Laden, Mahmoud Jaballah, Human Concern International, Mohamed Harkat

Timeline Tags: Complete 911 Timeline

Law professor John Yoo writes a lengthy essay for the California Law Review entitled “The Continuation of Politics by Other Means: The Original Understanding of War Powers,” in which he argues that the Founding Fathers intended to empower presidents to launch wars without Congressional permission. Yoo has clerked for conservative judge Laurence Silberman and equally conservative Supreme Court Justice Clarence Thomas, and served for a year as counsel to then-Senate Judiciary Committee Chairman Orrin Hatch (R-UT). He has become a regular speaker at Federalist Society events, the informal but influential group of conservative lawyers, judges, and legal scholars who will come to have so much influence in the Bush administration. You argues that for generations, Constitutional scholars have misread the Constitution: the Founders actually supported, not repudiated, the British model of executive power that gave the king the sole power of declaring war and committing forces to battle. The Constitution’s granting of the legislature—Congress—the power to “declare war” is merely, Yoo writes, a reference to the ceremonial role of deciding whether to proclaim the existence of a conflict as a diplomatic detail. The Founders always intended the executive branch to actually declare and commence war, he writes. Most other Constitutional scholars will dismiss Yoo’s arguments, citing notes from the Constitutional Convention that show the Founders clearly intended Congress, not the president, to decide whether to commit the country to war. One of those Founders, James Madison, wrote in 1795 that giving a president the unilateral ability to declare war “would have struck, not only at the fabric of the Constitution, but at the foundation of all well organized and well checked governments. The separation of the power of declaring war from that of conducting it, is wisely contrived to exclude the danger of its being declared for the sake of its being conducted.” [Savage, 2007, pp. 80-81] Yoo will go on to join the Bush administration’s Office of Legal Counsel, and write numerous torture memos (see October 4, 2001, November 6-10, 2001, November 20, 2001, December 21, 2001, December 28, 2001, January 9, 2002, January 11, 2002, January 14, 2002, January 22, 2002, January 24-26, 2002, March 13, 2002, July 22, 2002, August 1, 2002, August 1, 2002, and March 14, 2003) and opinions expanding the power of the president (see September 21, 2001, September 25, 2001, September 25, 2001, October 23, 2001, October 23, 2001, and June 27, 2002).

Entity Tags: Federalist Society, John C. Yoo

Timeline Tags: Civil Liberties

According to counterterrorism expert Rohan Gunaratna, US intelligence monitoring al-Qaeda communications learn that al-Qaeda is canceling an attack on Western targets in Singapore. On April 18, 1996, 108 Lebanese civilians seeking refuge at a UN camp in Qana, Lebanon, are killed by mortars fired by Israeli forces. Bin Laden “was keen not to dissipate what he envisaged as widespread revulsion against Israel’s action and hence called off the strike in Southeast Asia. Al-Qaeda’s team in question was very determined to go ahead, having spent years preparing the attack, and according to the intercepts it proved difficult for Osama to convince it otherwise.” Gunaratna claims the US learned this through the NSA’s Echelon satellite network (see Before September 11, 2001) “and other technical monitoring of their communications traffic.” [Gunaratna, 2003, pp. 133-134] If true, this case supports other evidence that the US was successfully monitoring bin Laden’s communications from an early date (see Early 1990s) and that al-Qaeda’s Southeast Asia operations were penetrated years before an important al-Qaeda summit in Malaysia discussing the 9/11 plot (see January 5-8, 2000).

Entity Tags: Echelon, Al-Qaeda, Osama bin Laden, National Security Agency

Timeline Tags: Complete 911 Timeline

The Supreme Court rules in the case of Colorado Republican Federal Campaign Committee v. Federal Election Committee. The case originated with advertisements run by the Colorado Republican Party (CRP) in 1986 attacking the Colorado Democratic Party’s likely US Senate candidate. Neither party had yet selected its candidate for that position. The Federal Election Commission (FEC) sued the CRP’s Federal Campaign Committee, saying that its actions violated the “party expenditure provision” of the Federal Election Campaign Act (FECA—see February 7, 1972, 1974, and May 11, 1976) by spending more than the law allows. The CRP in turn claimed that FECA violated its freedom of speech, and filed a counterclaim. A Colorado court ruled in favor of the CRP, dismissing the counterclaim as moot, but an appeals court overturned the lower court’s decision. The Supreme Court rules 7-2 in favor of the FEC. The decision is unusual, lacking a clear majority, but being comprised of a “plurality” of concurrences. The majority opinion, such as it is, is authored by Justice Stephen Breyer, one of the Court liberals, and is joined by fellow liberal David Souter and conservative Sandra Day O’Connor. Conservatives Anthony Kennedy, William Rehnquist, and Antonin Scalia go farther than Breyer’s majority decision, writing that the provision violates the First Amendment when it restricts as a “contribution” a political party’s spending “in cooperation, consultation, or concert, with a candidate.” In yet another concurrence, conservative Clarence Thomas argues that the entire provision is flatly unconstitutional. Liberals John Paul Stevens and Ruth Bader Ginsburg dissent, agreeing with the appeals court. [Oyez (.org), 2011; Moneyocracy, 2/2012] In 2001, the Court will revisit the case and find its initial ruling generally sound, though the later decision will find that some spending restrictions are constitutional. In the revisiting, four of the Court’s five conservatives will dissent, with the liberals joined by O’Connor. [Oyez (.org), 2011; Moneyocracy, 2/2012]

Entity Tags: Colorado Republican Party, Colorado Democratic Party, Antonin Scalia, Anthony Kennedy, US Supreme Court, Stephen Breyer, William Rehnquist, Clarence Thomas, Federal Election Campaign Act of 1972, David Souter, Colorado Republican Party Federal Campaign Committee, Sandra Day O’Connor, Ruth Bader Ginsburg, Federal Election Commission, John Paul Stevens

Timeline Tags: Civil Liberties

August 21, 1996: War Crimes Act Becomes Law

The War Crimes Act (HR 3680) becomes Public Law No: 104-192. It prohibits Americans—top officials and soldiers alike—from committing “grave breaches” of the Geneva Conventions. It states: “Whoever, whether inside or outside the United States, commits a grave breach of the Geneva Conventions,” provided that the perpetrator or the victim is a member of the US military or a national of the US, “shall be fined under this title or imprisoned for life or any term of years, or both, and if death results to the victim, shall also be subject to the penalty of death.” [Newsweek, 11/5/2001]

Entity Tags: Geneva Conventions, War Crimes Act

Timeline Tags: Torture of US Captives, Civil Liberties

Ramzi Yousef and two other defendants, Abdul Hakim Murad and Wali Khan Amin Shah, are convicted of crimes relating to Operation Bojinka (see January 6, 1995). [CNN, 9/5/1996] In the nearly 6,000-page transcript of the three-month Bojinka trial, there is not a single mention of the “second wave” of Bojinka that closely paralleled the 9/11 plot. Interrogations by Philippine investigator Colonel Rodolfo Mendoza had exposed the details of this plot quite clearly (see January 20, 1995 and February-Early May 1995). However, not only does the FBI not call Mendoza to testify, but his name is not even mentioned in the trial, not even by his assistant, who does testify. “The FBI seemed to be going out of its way to avoid even a hint of the plot that was ultimately carried out on 9/11,” author Peter Lance will later note. [Lance, 2003, pp. 350-51] Murad was extensively tortured during his imprisonment in the Philippines (see After January 6, 1995), and some observers such as law professor Alan Dershowitz will assert that Murad’s case proves the reliability of torture, claiming that Murad’s torture prevented a major disaster. However, others disagree. Law professor Stephanie Athey, in her examination of the case, will write in 2007 that Murad’s torture actually produced little useful information. A computer found in Murad’s apartment held key details of the plot (see January 7-11, 1995 and Spring 1995). CIA agent Michael Scheuer will later say that the information collected from Murad’s apartment, not the information gleaned from Murad’s torture, provided actual useful intelligence. [Vanity Fair, 12/16/2008]

Entity Tags: Rodolfo Mendoza, Ramzi Yousef, Abdul Hakim Murad, Alan M. Dershowitz, Federal Bureau of Investigation, Michael Scheuer, Operation Bojinka, Stephanie Athey, Wali Khan Amin Shah

Timeline Tags: Complete 911 Timeline

Starting in 1997, the FBI constructs a sophisticated surveillance system that can perform near-instantaneous wiretaps on almost any telephone, cell phone, and Internet communications device, according to documents declassified in August 2007. The system is called the Digital Collection System Network, or DCSNet. It connects FBI wiretapping rooms to switches controlled by land-line operators, Internet-telephony companies, and cellular providers. The documents show that DCSNet is, in reporter Ryan Singel’s words, “far more intricately woven into the nation’s telecom infrastructure than observers suspected.” Steven Bellovin, a computer science professor and surveillance expert, calls DCSNet a “comprehensive wiretap system that intercepts wire-line phones, cellular phones, SMS [short message service, a protocol allowing mobile devices to exchange text messages], and push-to-talk systems.” The system is an entire suite of software that together collects, sifts, and stores phone numbers, phone calls, and text messages. The system directly connects FBI wiretapping offices around the country to a sprawling private communications network. DCSNet is composed of three main clients:
bullet The DCS-3000, also called “Red Hook,” handles pen-registers and trap-and-traces, a type of surveillance that collects signaling information but not communications content.
bullet The DCS-6000, or “Digital Storm,” captures and collects the content—the spoken or written communications—of phone calls and text messages.
bullet The most classified system of the three, the DCS-5000, is used for wiretaps targeting spies or terrorists.
Between the three, the system can allow FBI agents to monitor recorded phone calls and messages in real time, create master wiretap files, send digital recordings to translators, track the location of targets in real time using cell-tower information, and stream intercepts to mobile surveillance vans. The entire system is operated through a private, secure and self-contained backbone that is run for the government by Sprint. Singel gives the following example: “The network allows an FBI agent in New York, for example, to remotely set up a wiretap on a cell phone based in Sacramento, California, and immediately learn the phone’s location, then begin receiving conversations, text messages and voicemail pass codes in New York. With a few keystrokes, the agent can route the recordings to language specialists for translation.” Dialed numbers are subjected to data mining, including so-called “link analysis.” The precise number of US phones being monitored and recorded in this way is classified.
Genesis of DCSNet - The system was made possible by the 1994 Communications Assistance for Law Enforcement Act (CALEA) (see January 1, 1995), which mandated that telecom providers must build “backdoors” in US telephone switches to be used by government wiretappers. CALEA also ordered telecom firms to install only switching equipment that met detailed wiretapping standards. Before CALEA, the FBI would bring a wiretap warrant to a particular telecom, and that firm would itself create a tap. Now, the FBI logs in directly to the telecom networks and monitors a surveillance target itself through DCSNet. FBI special agent Anthony DiClemente, chief of the Data Acquisition and Intercept Section of the FBI’s Operational Technology Division, says the DCS was originally intended in 1997 to be a temporary solution, but has grown into a full-featured CALEA-collection software suite. “CALEA revolutionizes how law enforcement gets intercept information,” he says. “Before CALEA, it was a rudimentary system that mimicked Ma Bell.” Now, under CALEA, phone systems and Internet service providers have been forced to allow DCSNet to access almost all of its data (see 1997-August 2007 and After).
Security Breaches - The system is vulnerable to hacking and security breaches (see 2003). [Wired News, 8/29/2007]

Entity Tags: Steven Bellovin, Ryan Singel, Federal Bureau of Investigation, Anthony DiClemente, Operational Technology Division (FBI), Communications Assistance for Law Enforcement Act (CALEA), Digital Collection System, Data Acquisition and Intercept Section (FBI), Sprint/Nextel

Timeline Tags: Civil Liberties

Dietrich Snell.Dietrich Snell. [Source: Morris Mac Matzen/ Associated Press]Abdul Hakim Murad, a conspirator in the 1995 Bojinka plot with Ramzi Yousef, Khalid Shaikh Mohammed (KSM), and others, was convicted in 1996 of his role in the Bojinka plot (see January 6, 1995). He is about to be sentenced for that crime. He offers to cooperate with federal prosecutors in return for a reduction in his sentence, but prosecutors turn down his offer. Dietrich Snell, the prosecutor who convicted Murad, will say after 9/11 that he does not remember any such offer. But court papers and others familiar with the case later confirm that Murad does offer to cooperate at this time. Snell will claim he only remembers hearing that Murad had described an intention to hijack a plane and fly it into CIA headquarters. However, in 1995 Murad had confessed to Philippine investigators that this would have been only one part of a larger plot to crash a number of airplanes into prominent US buildings, including the World Trade Center and the Pentagon, a plot that KSM later will adjust and turn into the 9/11 plot (see January 20, 1995) (see February-Early May 1995). While Philippine investigators claim this information was passed on to US intelligence, it’s not clear just which US officials may have learned this information and what they did with it, if anything. [New York Daily News, 9/25/2001] Murad is sentenced in May 1998 and given life in prison plus 60 years. [Albany Times-Union, 9/22/2002] After 9/11, Snell will go on to become Senior Counsel and a team leader for the 9/11 Commission. Author Peter Lance later calls Snell “one of the fixers, hired early on to sanitize the Commission’s final report.” Lance says Snell ignored evidence presented to the Commission that shows direct ties between the Bojinka plot and 9/11, and in so doing covers up Snell’s own role in the failure to make more use of evidence learned from Murad and other Bojinka plotters. [FrontPage Magazine, 1/27/2005]

Entity Tags: Ramzi Yousef, World Trade Center, Dietrich Snell, Khalid Shaikh Mohammed, 9/11 Congressional Inquiry, Abdul Hakim Murad, Operation Bojinka, Pentagon

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

FBI reward notice for Khalid Shaikh Mohammed.FBI reward notice for Khalid Shaikh Mohammed. [Source: FBI]Islamic militant Ramzi Yousef is sentenced to 240 years for his role in the 1993 WTC bombing. At the same time, prosecutors unseal an indictment against Khalid Shaikh Mohammed (KSM) for participating with Yousef in the 1995 Operation Bojinka plot (see January 6, 1995). In unsealing this, US Attorney Mary Jo White calls KSM a “major player” and says he is believed to be a relative of Yousef. [Washington Post, 1/9/1998] The US announces a $2 million reward for his capture in 1998 and wanted posters with his picture are distributed. [New York Times, 6/5/2002] This contradicts the FBI’s claim after 9/11 that they did not realize he was a major terrorist before 9/11. [US Congress, 12/11/2002] For instance, a senior FBI official later says, “He was under everybody’s radar. We don’t know how he did it. We wish we knew.… He’s the guy nobody ever heard of.” [Los Angeles Times, 12/22/2002] However, another official says, “We have been after him for years, and to say that we weren’t is just wrong. We had identified him as a major al-Qaeda operative before September 11.” [New York Times, 9/22/2002] Yet strangely, despite knowing KSM is a major al-Qaeda operations planner and putting out a large reward for his capture at this time, there is no worldwide public manhunt for him as there successfully was for his nephew Ramzi Yousef. KSM’s name remains obscure and he isn’t even put on the FBI’s Most Wanted Terrorists list until one month after 9/11. [Lance, 2003, pp. 327-30]

Entity Tags: Ramzi Yousef, Khalid Shaikh Mohammed, Mary Jo White, Federal Bureau of Investigation

Timeline Tags: Complete 911 Timeline, 9/11 Timeline

Page 1 of 11 (1003 events)
previous | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 | next

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike