Chairman of the Joint Chiefs of Staff General Henry Shelton will later say, “Right after I left SOCOM [Special Operations Command], I asked my successor to put together a small team, if he could, to try to use the Internet and start trying to see if there was any way that we could track down Osama bin Laden or where he was getting his money from or anything of that nature.” A team of six intelligence officers will be given this task and Shelton will be periodically briefed on the progress of the program. But apparently the team, later to be called Able Danger, will focus on data mining tasks relating to Bosnia and China for most of 1999. [Sacramento Bee, 12/7/2005; US Congress, 2/15/2006] General Peter Schoomaker, the head of SOCOM, helped come up with the idea for Able Danger and helps to set it up. SOCOM, based in Tampa, Florida, is responsible for America’s secret commando units. [Government Security News, 9/2005] Mark Zaid, a lawyer for several Able Danger whistleblowers in 2005, will give this description of Able Danger: “In the most understandable and simplistic terms, Able Danger involved the searching out and compiling of open source or other publicly available information regarding specific targets or tasks that were connected through associational links. No classified information was used. No government database systems were used.… The search and compilation efforts were primarily handled by defense contractors, who did not necessarily know they were working for Able Danger, and that information was then to be utilized by the military members of Able Danger for whatever appropriate purposes.” [US Congress, 9/21/2005] Representative Curt Weldon (R-PA) will say in 2005 that the military’s purpose for the Able Danger program was to enable it to “manipulate, degrade, or destroy the global al-Qaeda infrastructure.” [Washington Post, 8/13/2005] Apparently, Able Danger does not begin to use real data to fight al-Qaeda until near the end of 1999.
Fall 1999: Army Intelligence Program Begins Gathering Information on Al-Qaeda
A data mining program called Able Danger was set up by US Special Operations Command (SOCOM) in late 1998. It had been collecting data mostly on Bosnia and China (see Late December 1998). But at this time, it begins collecting data on al-Qaeda. [Government Security News, 9/2005] At least some of the data is collected on behalf of Maj. Gen. Geoffrey Lambert, the J3 at US Special Operations Command. [US Congress. Senate. Committee on Judiciary, 9/21/2005] Eleven intelligence employees are directly involved in Able Danger’s work. Six are with SOCOM’s Able Danger unit. Four more, including Dr. Eileen Preisser and Maj. Eric Kleinsmith, are with the US Army’s Land Information Warfare Activity (LIWA), which joins the effort in December 1999. LIWA had been conducing data mining already on a wide variety of topics, including international drug cartels, corruption in Russia and Serbia, terrorist linkages in the Far East, and the proliferation of sensitive military technology to China (see April 2000). [Norristown Times Herald, 6/19/2005; Government Security News, 8/2005; New York Times, 8/9/2005; St. Petersburg Times, 8/10/2005; Bergen Record, 8/14/2005; Government Security News, 9/2005; US Congress, 9/21/2005; US Congress. Senate. Committee on Judiciary, 9/21/2005] Lt. Col. Anthony Shaffer, running a military unit called Stratus Ivy in the Defense Intelligence Agency (DIA), will also take part in the effort. According to Shaffer, Stratus Ivy is tasked “to take on ‘out of the box’ ideas, and develop them into real intelligence operations.” So the goal is to use the information gathered by Able Danger to conduct real operations against al-Qaeda targets. [US Congress, 2/15/2006 ] Using computers, the unit collects huge amounts of data in a technique called “data mining.” They get information from such sources as al-Qaeda Internet chat rooms, news accounts, web sites, and financial records. Using sophisticated software, they compare this with government records such as visa applications by foreign tourists, to find any correlations and depict these visually. [Bergen Record, 8/14/2005; Government Security News, 9/2005] The program will be shut down early in 2001 (see January-March 2001).
October 1999: CIA Does Not Share Information with Able Danger Program
Capt. Scott Phillpott, head of the Able Danger program, asks Lt. Col. Anthony Shaffer to talk to a representative of CIA Director George Tenet and attempt to convince him that the new Able Danger program is not competing with the CIA. Shaffer later recalls the CIA representative replying, “I clearly understand the difference. I clearly understand. We’re going after the leadership. You guys are going after the body. But, it doesn’t matter. The bottom line is, CIA will never give you the best information from ‘Alex Base’ [the CIA’s covert action element targeting bin Laden] or anywhere else. CIA will never provide that to you because if you were successful in your effort to target al-Qaeda, you will steal our thunder. Therefore, we will not support this.” Shaffer claims that for the duration of Able Danger’s existence, “To my knowledge, and my other colleagues’ knowledge, there was no information ever released to us because CIA chose not to participate in Able Danger.” [Government Security News, 9/2005]
December 1999: Able Danger Immediately Determines Al-Qaeda Has ‘Surprising Presence in US’
The new Able Danger team begins collecting data on al-Qaeda. The aim is to gain intelligence that will allow Special Operations forces to conduct strikes against al-Qaeda around the world. Erik Kleinsmith will later claim that he is visited by Special Operations officials and he gives them a demonstration of what the data mining techniques they’ve developed can do. He claims that within 90 minutes, his analysts finds evidence that al-Qaeda has a “worldwide footprint” including “a surprising presence in the US. That’s when we started losing sleep.” [National Journal, 12/3/2005] Using computers, the unit collects huge amounts of data in a technique called “data mining.” They get information from such sources as al-Qaeda Internet chat rooms, news accounts, web sites, and financial records. Using sophisticated software, they compare this with government records such as visa applications by foreign tourists, to find any correlations and depict these visually. [Bergen Record, 8/14/2005; Government Security News, 9/2005] The data harvest is far too huge to be useful, so the analysts try to pare it down by looking at links between known terrorists and finding who they associate with. By the spring of 2000, they are able to isolate about 20 people whom Special Operations wants further analysis. The Able Danger team creates massive charts, measuring up to 20 feet in length and covered in small type, to show all the links between suspects that have been discovered. [National Journal, 12/3/2005]
January-February 2000: Secret Military Unit Identifies Al-Qaeda ‘Brooklyn’ Cell; Four 9/11 Hijackers Are Named, Including Mohamed Atta
A US Army intelligence program called Able Danger identifies five al-Qaeda terrorist cells; one of them has connections to Brooklyn, New York and will become informally known as the “Brooklyn” cell by the Able Danger team. This cell includes 9/11 hijacker leader Mohamed Atta, and three other 9/11 hijackers: Marwan Alshehhi, Khalid Almihdhar, and Nawaf Alhazmi. According to a former intelligence officer who claims he worked closely with Able Danger, the link to Brooklyn is not based upon any firm evidence, but computer analysis that established patterns in links between the four men. “[T]he software put them all together in Brooklyn.” [New York Times, 8/9/2005; Washington Times, 8/22/2005; Fox News, 8/23/2005; Government Security News, 9/2005] However, that does not necessarily imply them being physically present in Brooklyn. A lawyer later representing members of Able Danger states, “At no time did Able Danger identify Mohamed Atta as being physically present in the United States.” Furthermore, “No information obtained at the time would have led anyone to believe criminal activity had taken place or that any specific terrorist activities were being planned.” [CNN, 9/21/2005; US Congress, 9/21/2005] James D. Smith, a contractor working with the unit, discovers Mohamed Atta’s link to al-Qaeda. [WTOP Radio 103.5 (Washington), 9/1/2005] Smith has been using advanced computer software and analysing individuals who are going between mosques. He has made a link between Mohamed Atta and Sheikh Omar Abdul-Rahman, ringleader of the 1993 bombing of the World Trade Center. [Fox News, 8/28/2005; Government Security News, 9/2005] Atta is said to have some unspecified connection to the Al Farouq mosque in Brooklyn, a hotbed of anti-American sentiment once frequented by Abdul-Rahman, which also contained the notorious Al-Kifah Refugee Center. [Times Herald (Norristown), 9/22/2005] Smith obtained Atta’s name and photograph through a private researcher in California who was paid to gather the information from contacts in the Middle East. [New York Times, 8/22/2005] Lt. Col. Anthony Shaffer claims the photo is not the well-known menacing Florida driver’s license photo of Atta. “This is an older, more grainy photo we had of him. It was not the best picture in the world.” It is said to contain several names or aliases for Atta underneath it. [Jerry Doyle Show, 9/20/2005; Chicago Tribune, 9/28/2005] LIWA analysts supporting Able Danger make a chart, which Shaffer describes in a radio interview as, “A chart probably about a 2×3 which had essentially five clusters around the center point which was bin Laden and his leadership.” [Savage Nation, 9/16/2005] The 9/11 Commission later claims that Atta only enters the United States for the first time several months later, in June 2000 (see June 3, 2000). [9/11 Commission, 7/24/2004, pp. 224] However, investigations in the months after 9/11 find that Mohamed Atta and another of the hijackers rented rooms in Brooklyn around this time (see Spring 2000). Other newspaper accounts have the CIA monitoring Atta starting in January 2000, while he is living in Germany (see January-May 2000). Atta, Alshehhi, Almihdhar, Alhazmi and other hijackers have connections to associates of Sheikh Abdul-Rahman (see Early 2000-September 10, 2001).
Spring 2000: 9/11 Hijackers Atta and Alshehhi Rent Rooms in Brooklyn and the Bronx
Mohamed Atta and another of the 9/11 hijackers (presumably Marwan Alshehhi) rent rooms in New York City, according to a federal investigator. These rooms are in the Bronx and Brooklyn. Following 9/11, Atta is traced back to Brooklyn by a parking ticket issued to a rental car he was driving. However, immigration records have Mohamed Atta entering the US for the first time on June 3, 2000 (see June 3, 2000). The Associated Press article on this subject does not specify if Atta first stayed in New York before or after that date. [Associated Press, 12/8/2001] According to a brief mention in the 9/11 Commission’s final report, in the month of June, “As [Atta and Marwan Alshehhi] looked at flight schools on the East Coast, [they] stayed in a series of short-term rentals in New York City.” [9/11 Commission, 7/24/2004, pp. 224; Washington Post, 8/13/2005] Earlier in 2000, a US Army intelligence program called Able Danger identified an al-Qaeda terrorist cell based in Brooklyn, of which Atta is a member (see January-February 2000). Also, a number of eyewitnesses later report seeing Atta in Maine and Florida before this official arrival date (see April 2000; Late April-Mid-May 2000).
March-April 2000: Able Danger Data Confiscated by Federal Agents
James D. Smith is working for the private company Orion Scientific Systems on a contract that assists the Able Danger project. Smith will later claim that around March or April 2000, armed federal agents come into Orion and confiscate much of the data that Orion had compiled for Able Danger. Orion’s contract stops at this time and Smith has no further involvement with Able Danger. However, Smith happens to have some unclassified charts made for Able Danger in the trunk of his car when the agents raid his office. The chart with Mohamed Atta’s picture on it will thus survive and be remembered well by Smith, though it will be destroyed in the summer of 2004 (see August 22-September 1, 2005). Smith will later state, “All information that we have ever produced, which was all unclassified, was confiscated and to this day we don’t know who by.” [US Congress, 9/21/2005; US Congress, 2/15/2006]
April 2000: LIWA and Able Danger Face Trouble After LIWA Connects Prominent US Figures to Chinese Military
A 1999 study by the US Army’s Land Information Warfare Activity (LIWA) to look into possible Chinese front companies in the US seeking technology for the Chinese military created controversy and was ordered destroyed in November 1999 (see Mid-1999-November 1999). However, apparently Rep. Curt Weldon (R-PA) protests, and the issue finally comes to a head during this month. One result of this controversy will be what Major Erik Kleinsmith will later call “severely restricted” support for Able Danger, including a temporary end to LIWA support (see April 2000) In an April 14, 2000 memorandum from the legal counsel in the Office of the Joint Chiefs of Staff, Captain Michael Lohr writes that the concern over the LIWA data mining study raises privacy concerns: “Preliminary review of subject methodology raised the possibility that LIWA ‘data mining’ would potentially access both foreign intelligence (FI) information and domestic information relating to US citizens (i.e. law enforcement, tax, customs, immigration, etc.… I recognize that an argument can be made that LIWA is not ‘collecting’ in the strict sense (i.e. they are accessing public areas of the Internet and non-FI federal government databases of already lawfully collected information). This effort would, however, have the potential to pull together into a single database a wealth of privacy-protected US citizen information in a more sweeping and exhaustive manner than was previously contemplated.” Additionally, the content of the study is another reason why it caused what Weldon calls a “wave of controversy.” The study had connected future National Security Adviser and Secretary of State Condoleezza Rice, former Defense Secretary William Perry, and other prominent US citizens to business transactions with Chinese military officials.(see Mid-1999-November 1999). [New York Post, 8/27/2005; Office of Congressman Curt Weldon, 9/17/2005; US Congress, 9/21/2005; Washington Times, 9/22/2005; Washington Times, 10/9/2005] One article on the subject will comment, “Sources familiar with Able Danger say the project was shut down because it could have led to the exposure of a separate secret data mining project focusing on US citizens allegedly transferring super-sensitive US technology illegally to the Chinese government.” [WTOP Radio 103.5 (Washington), 9/1/2005] A massive destruction of data from Able Danger and LIWA’s data mining efforts will follow, one month later (see May-June 2000).
April 2000: LIWA Support For Able Danger Program Ends; It Later Restarts
Four analysts from the US Army’s Land Information Warfare Activity (LIWA) unit are forced to stop their work supporting the Able Danger program. At the same time, private contractors working for Able Danger are fired. This occurs around the time that it becomes known by some inside the military that LIWA had identified future National Security Adviser and Secretary of State Condoleezza Rice, former Defense Secretary William Perry, and other prominent Americans as potential security risks (see April 2000). It was apparently these LIWA analysts (such as Dr. Eileen Preisser) and contractors (such as James D. Smith) who conducted most of the data mining and analysis of al-Qaeda in the preceding months. One of the four LIWA analysts, Maj. Erik Kleinsmith, will later be ordered to destroy all the data collected (see May-June 2000). LIWA’s support for Able Danger will resume a few months later (see Late September 2000). [New York Post, 8/27/2005; US Congress, 9/21/2005; Washington Times, 9/22/2005]
May-June 2000: Army Officer Told to Destroy Able Danger Documents
Maj. Eric Kleinsmith, chief of intelligence for the Land Information Warfare Activity (LIWA) unit, is ordered to destroy data and documents related to a military intelligence program set up to gather information about al-Qaeda. The program, called Able Danger, has identified Mohamed Atta and three other future hijackers as potential threats (see January-February 2000). According to Kleinsmith, by April 2000 it has collected “an immense amount of data for analysis that allowed us to map al-Qaeda as a worldwide threat with a surprisingly significant presence within the United States.”(see January-February 2000) [Fox News, 9/21/2005; New York Times, 9/22/2005] The data is being collected on behalf of Maj. Gen. Geoffrey Lambert, the J3 at US Special Operations Command, who is said to be extremely upset when he learns that the data had been destroyed without his knowledge or consent. [US Congress. Senate. Committee on Judiciary, 9/21/2005] Around this time, a separate LIWA effort showing links between prominent US citizens and the Chinese military has been causing controversy, and apparently this data faces destruction as well (see April 2000). The data and documents have to be destroyed in accordance with Army regulations prohibiting the retention of data about US persons for longer than 90 days, unless it falls under one of several restrictive categories. However, during a Senate Judiciary Committee public hearing in September 2005, a Defense Department representative admits that Mohamed Atta was not considered a US person. The representative also acknowledges that regulations would have probably allowed the Able Danger information to be shared with law enforcement agencies before its destruction. Asked why this was not done, he responds, “I can’t tell you.” [CNET News, 9/21/2005] The order to destroy the data and documents is given to Kleinsmith by Army Intelligence and Security Command General Counsel Tony Gentry, who jokingly tells him, “Remember to delete the data—or you’ll go to jail.” [Government Executive, 9/21/2005] The quantity of information destroyed is later described as “2.5 terabytes,” about as much as one-fourth of all the printed materials in the Library of Congress. [Associated Press, 9/16/2005] Other records associated with the unit are allegedly destroyed in March 2001 and spring 2004 (see Spring 2004). [Associated Press, 9/21/2005; US Congress, 9/21/2005; Fox News, 9/24/2005]