!! History Commons Alert, Exciting News
Profile: Eric Kleinsmith
Eric Kleinsmith was a participant or observer in the following events:
Gen. Pete Schoomaker. [Source: US Defense Department]A data mining program called Able Danger was set up by US Special Operations Command (SOCOM) in late 1998. It had been collecting data mostly on Bosnia and China (see Late December 1998). But at this time, it begins collecting data on al-Qaeda. [Government Security News, 9/2005] At least some of the data is collected on behalf of Maj. Gen. Geoffrey Lambert, the J3 at US Special Operations Command. [US Congress. Senate. Committee on Judiciary, 9/21/2005] Eleven intelligence employees are directly involved in Able Danger’s work. Six are with SOCOM’s Able Danger unit. Four more, including Dr. Eileen Preisser and Maj. Eric Kleinsmith, are with the US Army’s Land Information Warfare Activity (LIWA), which joins the effort in December 1999. LIWA had been conducing data mining already on a wide variety of topics, including international drug cartels, corruption in Russia and Serbia, terrorist linkages in the Far East, and the proliferation of sensitive military technology to China (see April 2000). [Norristown Times Herald, 6/19/2005; Government Security News, 8/2005; New York Times, 8/9/2005; St. Petersburg Times, 8/10/2005; Bergen Record, 8/14/2005; Government Security News, 9/2005; US Congress, 9/21/2005; US Congress. Senate. Committee on Judiciary, 9/21/2005] Lt. Col. Anthony Shaffer, running a military unit called Stratus Ivy in the Defense Intelligence Agency (DIA), will also take part in the effort. According to Shaffer, Stratus Ivy is tasked “to take on ‘out of the box’ ideas, and develop them into real intelligence operations.” So the goal is to use the information gathered by Able Danger to conduct real operations against al-Qaeda targets. [US Congress, 2/15/2006 ] Using computers, the unit collects huge amounts of data in a technique called “data mining.” They get information from such sources as al-Qaeda Internet chat rooms, news accounts, web sites, and financial records. Using sophisticated software, they compare this with government records such as visa applications by foreign tourists, to find any correlations and depict these visually. [Bergen Record, 8/14/2005; Government Security News, 9/2005] The program will be shut down early in 2001 (see January-March 2001).
Entity Tags: Geoffrey Lambert, Anthony Shaffer, Eric Kleinsmith, Russia, Special Operations Command, Hugh Shelton, Al-Qaeda, Curt Weldon, Peter J. Schoomaker, Bosnia, China, Able Danger, Eileen Preisser
Timeline Tags: Complete 911 Timeline, 9/11 Timeline
The new Able Danger team begins collecting data on al-Qaeda. The aim is to gain intelligence that will allow Special Operations forces to conduct strikes against al-Qaeda around the world. Erik Kleinsmith will later claim that he is visited by Special Operations officials and he gives them a demonstration of what the data mining techniques they’ve developed can do. He claims that within 90 minutes, his analysts finds evidence that al-Qaeda has a “worldwide footprint” including “a surprising presence in the US. That’s when we started losing sleep.” [National Journal, 12/3/2005] Using computers, the unit collects huge amounts of data in a technique called “data mining.” They get information from such sources as al-Qaeda Internet chat rooms, news accounts, web sites, and financial records. Using sophisticated software, they compare this with government records such as visa applications by foreign tourists, to find any correlations and depict these visually. [Bergen Record, 8/14/2005; Government Security News, 9/2005] The data harvest is far too huge to be useful, so the analysts try to pare it down by looking at links between known terrorists and finding who they associate with. By the spring of 2000, they are able to isolate about 20 people whom Special Operations wants further analysis. The Able Danger team creates massive charts, measuring up to 20 feet in length and covered in small type, to show all the links between suspects that have been discovered. [National Journal, 12/3/2005]
Erik Kleinsmith. [Source: C-SPAN]Maj. Eric Kleinsmith, chief of intelligence for the Land Information Warfare Activity (LIWA) unit, is ordered to destroy data and documents related to a military intelligence program set up to gather information about al-Qaeda. The program, called Able Danger, has identified Mohamed Atta and three other future hijackers as potential threats (see January-February 2000). According to Kleinsmith, by April 2000 it has collected “an immense amount of data for analysis that allowed us to map al-Qaeda as a worldwide threat with a surprisingly significant presence within the United States.”(see January-February 2000) [Fox News, 9/21/2005; New York Times, 9/22/2005] The data is being collected on behalf of Maj. Gen. Geoffrey Lambert, the J3 at US Special Operations Command, who is said to be extremely upset when he learns that the data had been destroyed without his knowledge or consent. [US Congress. Senate. Committee on Judiciary, 9/21/2005] Around this time, a separate LIWA effort showing links between prominent US citizens and the Chinese military has been causing controversy, and apparently this data faces destruction as well (see April 2000). The data and documents have to be destroyed in accordance with Army regulations prohibiting the retention of data about US persons for longer than 90 days, unless it falls under one of several restrictive categories. However, during a Senate Judiciary Committee public hearing in September 2005, a Defense Department representative admits that Mohamed Atta was not considered a US person. The representative also acknowledges that regulations would have probably allowed the Able Danger information to be shared with law enforcement agencies before its destruction. Asked why this was not done, he responds, “I can’t tell you.” [CNET News, 9/21/2005] The order to destroy the data and documents is given to Kleinsmith by Army Intelligence and Security Command General Counsel Tony Gentry, who jokingly tells him, “Remember to delete the data—or you’ll go to jail.” [Government Executive, 9/21/2005] The quantity of information destroyed is later described as “2.5 terabytes,” about as much as one-fourth of all the printed materials in the Library of Congress. [Associated Press, 9/16/2005] Other records associated with the unit are allegedly destroyed in March 2001 and spring 2004 (see Spring 2004). [Associated Press, 9/21/2005; US Congress, 9/21/2005; Fox News, 9/24/2005]
A second open Congressional hearing on Able Danger is held. Deputy Secretary of Defense for Intelligence Stephen Cambone testifies that an extensive review of Able Danger under his direction failed to locate the chart with Mohamed Atta’s picture and failed to find any other pre-9/11 references to Atta. Representative Curt Weldon (R-PA) repeatedly spars with Cambone, and says that since 9/11, “There’s been no investigation! There’s been no analysis [of Able Danger] by the 9/11 commission or anyone else.” Three members of the Able Danger team, Eric Kleinsmith, Anthony Shaffer, and James D. Smith, testify in public. All three of them say that the 9/11 attacks might have been prevented if law-enforcement agencies had acted on the information about al-Qaeda they discovered. The three of them had been prevented from testifying in the first public hearings on Able Danger in September 2005 (see September 21, 2005). [Sacramento Bee, 2/15/2006] Captain Scott Phillpott, the former head of Able Danger, apparently joins other former team members in closed testimony. [McClatchy News Service, 2/15/2006] The Congressional committee asked 9/11 Commission staff member Dietrich Snell to testify. But Snell’s boss, New York Attorney General Eliot Spitzer, said that Snell would not be available. Weldon has said he wants to ask Snell under oath why Snell did not inform any of the 9/11 Commissioners what he had learned about Able Danger. [US Congress, 2/15/2006]
Receive weekly email updates summarizing what contributors have added to the History Commons database
Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.