Chairman of the Joint Chiefs of Staff General Henry Shelton will later say, “Right after I left SOCOM [Special Operations Command], I asked my successor to put together a small team, if he could, to try to use the Internet and start trying to see if there was any way that we could track down Osama bin Laden or where he was getting his money from or anything of that nature.” A team of six intelligence officers will be given this task and Shelton will be periodically briefed on the progress of the program. But apparently the team, later to be called Able Danger, will focus on data mining tasks relating to Bosnia and China for most of 1999. [Sacramento Bee, 12/7/2005; US Congress, 2/15/2006] General Peter Schoomaker, the head of SOCOM, helped come up with the idea for Able Danger and helps to set it up. SOCOM, based in Tampa, Florida, is responsible for America’s secret commando units. [Government Security News, 9/2005] Mark Zaid, a lawyer for several Able Danger whistleblowers in 2005, will give this description of Able Danger: “In the most understandable and simplistic terms, Able Danger involved the searching out and compiling of open source or other publicly available information regarding specific targets or tasks that were connected through associational links. No classified information was used. No government database systems were used.… The search and compilation efforts were primarily handled by defense contractors, who did not necessarily know they were working for Able Danger, and that information was then to be utilized by the military members of Able Danger for whatever appropriate purposes.” [US Congress, 9/21/2005] Representative Curt Weldon (R-PA) will say in 2005 that the military’s purpose for the Able Danger program was to enable it to “manipulate, degrade, or destroy the global al-Qaeda infrastructure.” [Washington Post, 8/13/2005] Apparently, Able Danger does not begin to use real data to fight al-Qaeda until near the end of 1999.
Mid-1999-November 1999: Data Mining Study Causes Controversy by Connecting Prominent US Figures to Chinese Military Weapons Purchases
A report commissioned in mid-1999 by Rep. Curt Weldon (R-PA) looks into possible Chinese front companies in the US seeking technology for the Chinese military. Dr. Eileen Preisser and Michael Maloof are commissioned to make the report. Dr. Preisser, who runs the Information Dominance Center at the US Army’s Land Information Warfare Activity (LIWA) and will later become closely tied to Able Danger, uses LIWA’s data mining capabilities to search unclassified information. According to Maloof, their results show Chinese front companies in the US posing as US corporations that acquire technology from US defense contractors. When the study is completed in November 1999, the General Counsel’s office in the Office of the Defense Secretary orders the study destroyed. Weldon complains about this to Army Chief of Staff Eric Shinseki, and apparently delays the destruction of the report. Weldon also writes a letter to FBI Director Louis Freeh requesting an espionage investigation into these Chinese links, but Freeh never responds to this. [Washington Times, 10/9/2005] As part of this report, LIWA analysts had produced a chart of Chinese strategic and business connections in the US. But this data mining effort runs into controversy when the chart apparently shows connections between future National Security Adviser Condoleezza Rice, former Defense Secretary William Perry, and other prominent US figures, and business deals benefiting the Chinese military. [New York Post, 8/27/2005; Washington Times, 9/22/2005] The China chart was put together by private contractor James D. Smith, who will come forward in August 2005 to corroborate revelations about the Able Danger unit and its findings (see August 22-September 1, 2005). The New York Post later says there is “no suggestion that Rice or any of the others had done anything wrong.” [New York Post, 8/27/2005] However, articles first appear one month later and through 2001 in the conservative publications WorldNetDaily and NewsMax, which connect Perry and Rice to Hua Di, a Chinese missile scientist and possible spy, and question the nature of their relationship with him. [WorldNetDaily, 12/21/1999; WorldNetDaily, 4/5/2000; NewsMax, 1/24/2001] Di defected to the US in 1989 and worked most of the 1990s at Stanford University’s Center for International Security and Arms Control, which was co-directed by Perry. Di later returned to China and is subsequently sentenced to ten years in prison for writing influential articles said to reveal vital Chinese state secrets. [Stanford Report, 2/7/2001] However, other accounts claim that he was in fact passing on disinformation through these articles, successfully misleading the US military for a couple of years about the abilities of certain Chinese missile programs. [WorldNetDaily, 12/21/1999] Additionally, Hua Di teamed in 1994 with Stanford professor Dr. John Lewis and William Perry to buy an advanced AT&T fiber-optic communications system for “civilian” use inside China that instead is used by the Chinese army. The General Accounting Office later criticized the sale. In 1997, Stanford University investigated Dr. Lewis for his role in it, but Condoleezza Rice, serving as a Stanford provost at the time, apparently stopped the investigation. [WorldNetDaily, 4/5/2000; NewsMax, 1/24/2001] Able Danger and LIWA’s data mining efforts will be severely proscribed in April 2000 as part of the fallout from this China controversy (see April 2000), and the destruction of their collected data will follow shortly thereafter (see May-June 2000).
Fall 1999: Army Intelligence Program Begins Gathering Information on Al-Qaeda
A data mining program called Able Danger was set up by US Special Operations Command (SOCOM) in late 1998. It had been collecting data mostly on Bosnia and China (see Late December 1998). But at this time, it begins collecting data on al-Qaeda. [Government Security News, 9/2005] At least some of the data is collected on behalf of Maj. Gen. Geoffrey Lambert, the J3 at US Special Operations Command. [US Congress. Senate. Committee on Judiciary, 9/21/2005] Eleven intelligence employees are directly involved in Able Danger’s work. Six are with SOCOM’s Able Danger unit. Four more, including Dr. Eileen Preisser and Maj. Eric Kleinsmith, are with the US Army’s Land Information Warfare Activity (LIWA), which joins the effort in December 1999. LIWA had been conducing data mining already on a wide variety of topics, including international drug cartels, corruption in Russia and Serbia, terrorist linkages in the Far East, and the proliferation of sensitive military technology to China (see April 2000). [Norristown Times Herald, 6/19/2005; Government Security News, 8/2005; New York Times, 8/9/2005; St. Petersburg Times, 8/10/2005; Bergen Record, 8/14/2005; Government Security News, 9/2005; US Congress, 9/21/2005; US Congress. Senate. Committee on Judiciary, 9/21/2005] Lt. Col. Anthony Shaffer, running a military unit called Stratus Ivy in the Defense Intelligence Agency (DIA), will also take part in the effort. According to Shaffer, Stratus Ivy is tasked “to take on ‘out of the box’ ideas, and develop them into real intelligence operations.” So the goal is to use the information gathered by Able Danger to conduct real operations against al-Qaeda targets. [US Congress, 2/15/2006 ] Using computers, the unit collects huge amounts of data in a technique called “data mining.” They get information from such sources as al-Qaeda Internet chat rooms, news accounts, web sites, and financial records. Using sophisticated software, they compare this with government records such as visa applications by foreign tourists, to find any correlations and depict these visually. [Bergen Record, 8/14/2005; Government Security News, 9/2005] The program will be shut down early in 2001 (see January-March 2001).
October 1999: CIA Does Not Share Information with Able Danger Program
Capt. Scott Phillpott, head of the Able Danger program, asks Lt. Col. Anthony Shaffer to talk to a representative of CIA Director George Tenet and attempt to convince him that the new Able Danger program is not competing with the CIA. Shaffer later recalls the CIA representative replying, “I clearly understand the difference. I clearly understand. We’re going after the leadership. You guys are going after the body. But, it doesn’t matter. The bottom line is, CIA will never give you the best information from ‘Alex Base’ [the CIA’s covert action element targeting bin Laden] or anywhere else. CIA will never provide that to you because if you were successful in your effort to target al-Qaeda, you will steal our thunder. Therefore, we will not support this.” Shaffer claims that for the duration of Able Danger’s existence, “To my knowledge, and my other colleagues’ knowledge, there was no information ever released to us because CIA chose not to participate in Able Danger.” [Government Security News, 9/2005]
November 4, 1999: CIA Rejects Proposal for Center to Share Data on Terrorist Threats
Rep. Curt Weldon later claims that while he never learns about Able Danger prior to 9/11, he does become aware of the Land Information Warfare Activity’s (LIWA) similar data mining efforts in 1999 and is very impressed. He says that on this day, he is part of a meeting with the deputy directors of the FBI and the CIA and others. Using LIWA as a model, Weldon proposes a national collaborative center that would use open source data as well as classified information from 33 government agencies “to basically assess emerging transnational terrorists threats. The CIA, two years before 9/11, said, we don’t need that. We’ve put language in three successive defense bills, in spite of that, calling for a national collaborative capability. Prior to 9/11, we didn’t have that capability, and we were hit.” [US Congress, 2/15/2006]
December 1999: Able Danger Immediately Determines Al-Qaeda Has ‘Surprising Presence in US’
The new Able Danger team begins collecting data on al-Qaeda. The aim is to gain intelligence that will allow Special Operations forces to conduct strikes against al-Qaeda around the world. Erik Kleinsmith will later claim that he is visited by Special Operations officials and he gives them a demonstration of what the data mining techniques they’ve developed can do. He claims that within 90 minutes, his analysts finds evidence that al-Qaeda has a “worldwide footprint” including “a surprising presence in the US. That’s when we started losing sleep.” [National Journal, 12/3/2005] Using computers, the unit collects huge amounts of data in a technique called “data mining.” They get information from such sources as al-Qaeda Internet chat rooms, news accounts, web sites, and financial records. Using sophisticated software, they compare this with government records such as visa applications by foreign tourists, to find any correlations and depict these visually. [Bergen Record, 8/14/2005; Government Security News, 9/2005] The data harvest is far too huge to be useful, so the analysts try to pare it down by looking at links between known terrorists and finding who they associate with. By the spring of 2000, they are able to isolate about 20 people whom Special Operations wants further analysis. The Able Danger team creates massive charts, measuring up to 20 feet in length and covered in small type, to show all the links between suspects that have been discovered. [National Journal, 12/3/2005]
2000-2001: 9/11 Hijackers Atta and Alshehhi Attend Florida Mosque
The Congressional Joint Inquiry will later find that several of the hijackers, including Mohamed Atta and Marwan Alshehhi, attend mosques in the US and that at least one of the mosques is in Florida. [US Congress, 7/24/2003, pp. 169 ] The Florida mosque attended by Atta and Alshehhi is the Al Hijrah mosque run by Gulshair Shukrijumah in Miramar, Broward County, Florida. Mohamed Atta and several other hijackers live near the mosque (see April 11, 2001) and train at nearby Opa-Locka airport (see December 29-31, 2000). After 9/11, the FBI will visit the mosque and ask Shukrijumah and his wife if they recognize the hijackers and if their son, Adnan, knew Atta or had mentioned trips to Pakistan and Afghanistan. [Miami New Times, 4/3/2003; Los Angeles Times, 9/3/2006] Atta is seen with Adnan Shukrijumah, a suspected al-Qaeda operative, in 2001 (see May 2, 2001). His father previously served as an imam at the Al Farouq mosque in Brooklyn. In addition to working as a translator for Sheikh Abdul-Rahman, he also testified as a character witness at the WTC bombing trial for one of the defendants, Clement Rodney Hampton-El, who attended Al Farouq. [FrontPage Magazine, 10/27/2003; Los Angeles Times, 9/3/2006] Gulshair Shukrijumah is receiving money from the Saudi embassy in Washington at this time. [Newsweek, 4/7/2003] In 2009, an FBI informant will claim that he tried to get close to both Atta and Adnan Shukrijumah at the Al Hijrah mosque in early 2001, but the FBI had him work on easier cases instead, because both of them were secretive and wary (see Early 2001). [ABC News, 9/10/2009] The army’s Able Danger data mining program identifies Atta as a member of an al-Qaeda cell centered on Brooklyn. Exactly how it does this is never disclosed, although Atta’s apparent association with Gulshair and Adnan Shukrijumah is one possibile explanation (see January-February 2000).
January-February 2000: Secret Military Unit Identifies Al-Qaeda ‘Brooklyn’ Cell; Four 9/11 Hijackers Are Named, Including Mohamed Atta
A US Army intelligence program called Able Danger identifies five al-Qaeda terrorist cells; one of them has connections to Brooklyn, New York and will become informally known as the “Brooklyn” cell by the Able Danger team. This cell includes 9/11 hijacker leader Mohamed Atta, and three other 9/11 hijackers: Marwan Alshehhi, Khalid Almihdhar, and Nawaf Alhazmi. According to a former intelligence officer who claims he worked closely with Able Danger, the link to Brooklyn is not based upon any firm evidence, but computer analysis that established patterns in links between the four men. “[T]he software put them all together in Brooklyn.” [New York Times, 8/9/2005; Washington Times, 8/22/2005; Fox News, 8/23/2005; Government Security News, 9/2005] However, that does not necessarily imply them being physically present in Brooklyn. A lawyer later representing members of Able Danger states, “At no time did Able Danger identify Mohamed Atta as being physically present in the United States.” Furthermore, “No information obtained at the time would have led anyone to believe criminal activity had taken place or that any specific terrorist activities were being planned.” [CNN, 9/21/2005; US Congress, 9/21/2005] James D. Smith, a contractor working with the unit, discovers Mohamed Atta’s link to al-Qaeda. [WTOP Radio 103.5 (Washington), 9/1/2005] Smith has been using advanced computer software and analysing individuals who are going between mosques. He has made a link between Mohamed Atta and Sheikh Omar Abdul-Rahman, ringleader of the 1993 bombing of the World Trade Center. [Fox News, 8/28/2005; Government Security News, 9/2005] Atta is said to have some unspecified connection to the Al Farouq mosque in Brooklyn, a hotbed of anti-American sentiment once frequented by Abdul-Rahman, which also contained the notorious Al-Kifah Refugee Center. [Times Herald (Norristown), 9/22/2005] Smith obtained Atta’s name and photograph through a private researcher in California who was paid to gather the information from contacts in the Middle East. [New York Times, 8/22/2005] Lt. Col. Anthony Shaffer claims the photo is not the well-known menacing Florida driver’s license photo of Atta. “This is an older, more grainy photo we had of him. It was not the best picture in the world.” It is said to contain several names or aliases for Atta underneath it. [Jerry Doyle Show, 9/20/2005; Chicago Tribune, 9/28/2005] LIWA analysts supporting Able Danger make a chart, which Shaffer describes in a radio interview as, “A chart probably about a 2×3 which had essentially five clusters around the center point which was bin Laden and his leadership.” [Savage Nation, 9/16/2005] The 9/11 Commission later claims that Atta only enters the United States for the first time several months later, in June 2000 (see June 3, 2000). [9/11 Commission, 7/24/2004, pp. 224] However, investigations in the months after 9/11 find that Mohamed Atta and another of the hijackers rented rooms in Brooklyn around this time (see Spring 2000). Other newspaper accounts have the CIA monitoring Atta starting in January 2000, while he is living in Germany (see January-May 2000). Atta, Alshehhi, Almihdhar, Alhazmi and other hijackers have connections to associates of Sheikh Abdul-Rahman (see Early 2000-September 10, 2001).
January-May 2000: CIA Possibly Has 9/11 Hijacker Atta Under Surveillance in Germany
According to some reports, 9/11 hijacker Mohamed Atta is put under surveillance by the CIA while living in Germany during this time. [Agence France-Presse, 9/22/2001; Focus (Munchen), 9/24/2001; Berliner Zeitung (Berlin), 9/24/2001] He is “reportedly observed buying large quantities of chemicals in Frankfurt, apparently for the production of explosives [and/or] for biological warfare.” “The US agents reported to have trailed Atta are said to have failed to inform the German authorities about their investigation,” even as the Germans are investigating many of his associates. “The disclosure that Atta was being trailed by police long before 11 September raises the question why the attacks could not have been prevented with the man’s arrest.” [Observer, 9/30/2001] A German newspaper adds that Atta is able to get a visa into the US on May 18. According to some reports, the surveillance stops when he leaves for the US at the start of June. However, “experts believe that the suspect [remains] under surveillance in the United States.” [Berliner Zeitung (Berlin), 9/24/2001] A German intelligence official also states, “We can no longer exclude the possibility that the Americans wanted to keep an eye on Atta after his entry in the US.” [Focus (Munchen), 9/24/2001] This correlates with a Newsweek claim that US officials knew Atta was a “known [associate] of Islamic terrorists well before [9/11].” [Newsweek, 9/20/2001 ] However, a congressional inquiry later reports that the US “intelligence community possessed no intelligence or law enforcement information linking 16 of the 19 hijackers [including Atta] to terrorism or terrorist groups.” [US Congress, 9/20/2002] In 2005, after accounts of the Able Danger program learning Atta’s name become news, newspaper accounts will neglect to mention this prior report about Atta being known by US intelligence. For instance, the New York Times will report, “The account [about Able Danger] is the first assertion that Mr. Atta, an Egyptian who became the lead hijacker in the plot, was identified by any American government agency as a potential threat before the Sept. 11 attacks”(see August 9, 2005) . [New York Times, 8/9/2005]
Spring 2000: 9/11 Hijackers Atta and Alshehhi Rent Rooms in Brooklyn and the Bronx
Mohamed Atta and another of the 9/11 hijackers (presumably Marwan Alshehhi) rent rooms in New York City, according to a federal investigator. These rooms are in the Bronx and Brooklyn. Following 9/11, Atta is traced back to Brooklyn by a parking ticket issued to a rental car he was driving. However, immigration records have Mohamed Atta entering the US for the first time on June 3, 2000 (see June 3, 2000). The Associated Press article on this subject does not specify if Atta first stayed in New York before or after that date. [Associated Press, 12/8/2001] According to a brief mention in the 9/11 Commission’s final report, in the month of June, “As [Atta and Marwan Alshehhi] looked at flight schools on the East Coast, [they] stayed in a series of short-term rentals in New York City.” [9/11 Commission, 7/24/2004, pp. 224; Washington Post, 8/13/2005] Earlier in 2000, a US Army intelligence program called Able Danger identified an al-Qaeda terrorist cell based in Brooklyn, of which Atta is a member (see January-February 2000). Also, a number of eyewitnesses later report seeing Atta in Maine and Florida before this official arrival date (see April 2000; Late April-Mid-May 2000).