Three men hijack a commercial airliner and threaten to crash it into a nuclear plant, and authorities also fear they might crash it into President Richard Nixon’s winter home in Florida. [Graff, 2011, pp. 43-47] The hijacking occurs on Southern Airways Flight 49, a DC-9 bound from Memphis, Tennessee, to Miami, Florida, with scheduled stops in Birmingham, Alabama, Montgomery, Alabama, and Orlando, Florida. [Slate, 6/19/2013] The plane has 27 passengers and four crew members on board. The hijackers—three men with criminal records—are Lewis Moore, Henry Jackson, and Melvin Cale. The aim of the hijacking, Moore will later say, is to bring attention to the brutality and racism of the Detroit Police Department. The ordeal, which lasts 29 hours, is, at the current time, “the most chilling domestic hijacking in US history,” according to national security historian Timothy Naftali. [Naftali, 2005, pp. 61; Detroit Free Press, 6/6/2016]
Hijackers Demand a $10 Million Ransom – The hijackers manage to smuggle guns and grenades onto Flight 49 in a raincoat. [Slate, 6/19/2013] The plane takes off from Memphis at 5:05 p.m. on November 10. The hijackers seize control of it at 7:22 p.m., during the second leg of the flight. One of them enters the cockpit carrying a revolver and with an arm around the neck of a flight attendant. He tells the pilot, William Haas, “Head north, Captain, this is a hijacking.” [Detroit Free Press, 11/12/1972; Graff, 2011, pp. 43] The hijackers demand $10 million to release the plane. [Naftali, 2005, pp. 61] Haas transmits a hijack code to air traffic controllers who, in response, begin the well-known and widely used procedures for dealing with a hijacking. They notify the FBI in Washington, DC, and the Federal Aviation Administration’s special hijacking command post.
Airline Is Told of the Hijackers’ Ransom Demand – The plane lands in Jackson, Mississippi, at 8:10 p.m. to be refueled and then takes off at 8:36 p.m., heading for Detroit, Michigan, where the hijackers intend to settle their complaints with city officials. At around 10:30 p.m., while the plane is circling over Detroit, the FBI notifies the city’s mayor and Southern Airways of the hijackers’ ransom demand. At 12:05 a.m. on November 11, the plane leaves the Detroit area due to bad weather and heads for Cleveland, Ohio, where it lands and is refueled. It takes off from Cleveland at 1:38 a.m. and heads for Toronto, Canada.
Hijackers Threaten to Crash the Plane into a Nuclear Facility – While it is on the ground in Toronto, the hijackers learn that Southern Airways has only gathered $500,000 in ransom money. They refuse to take this and release the passengers. Consequently, after being refueled, the plane takes off at 6:15 a.m. and flies back to the US. It heads for Knoxville, Tennessee. As it is ascending, the hijackers tell controllers that unless their demands are met, they will crash Flight 49 into the Oak Ridge nuclear facility, near Knoxville. [Detroit Free Press, 11/12/1972; Graff, 2011, pp. 43-45] Jackson says: “We’re tired of all this bull. No more foolin’ around. We’re taking this f_cker to Oak Ridge and dive it into a nuclear reactor.” [Burleson, 2007, pp. 66] By this time, the White House, the Pentagon, and the Atomic Energy Commission are all involved in dealing with the crisis. [Graff, 2011, pp. 45] Meanwhile, key personnel at Oak Ridge discuss the possible outcomes of Flight 49 crashing into their facility. At the bare minimum, they all agree, the impact could rupture the protective shell and result in a massive release of radioactivity; the worst possibility is a core meltdown. [Burleson, 2007, pp. 66-67]
White House Official Talks to the Hijackers – The plane diverts to Lexington, Kentucky, to be refueled and, by 11:00 a.m., is again over Oak Ridge. The hijackers are then connected to the White House. John Ehrlichman, the president’s top domestic aide, comes on the radio and Jackson tells him, “I’m up over Oak Ridge, where I’ll either throw a grenade or I’ll put this plane down nose first.” He says he and the other hijackers want a letter signed by the president stating that their ransom money is a grant from the government and they won’t be prosecuted. Ehrlichman says it will take some time to fulfil their request.
Hijackers Receive the Ransom Money – The hijackers then direct the plane to Chattanooga, Tennessee, where it lands at 1:30 p.m. It is refueled and the hijackers are given the ransom money, along with food and other supplies. Southern Airways has only been able to put together $2 million, but the airline is assuming—correctly, as it turns out—that the hijackers will lack the time to count the money and realize it is much less than the amount they demanded. The plane leaves Chattanooga at 2:35 p.m. and heads to Cuba, where many hijackers fled during the 1960s and early 1970s.
Authorities Fear the Plane May Be Crashed into the President’s Winter Home – As Flight 49 is flying south over Florida, authorities become concerned that the hijackers might crash it into the president’s retreat in Key Biscayne, where Nixon is currently staying. Military officials contact Florida’s Homestead Air Reserve Base and fighter jets there are placed on alert as a precaution. Fortunately, no incident occurs and Flight 49 lands in Havana at 4:49 p.m. However, to the surprise of the hijackers, the Cubans are unhappy about the plane’s arrival and soldiers surround the aircraft after it touches down. José Abrantes, President Fidel Castro’s head of security, explains to the hijackers the nation’s discomfort about the situation. Therefore, after being refueled, Flight 49 leaves Havana and heads back to the US.
FBI Agents Shoot the Plane’s Tires – It lands at McCoy Air Force Base in Orlando at 9:17 p.m. By now, Robert Gebhardt, assistant director of the FBI’s investigative division, has given the order to disable the plane when it is next on the ground. Consequently, after it lands, FBI agents start shooting at its tires. The hijackers, realizing what is happening, order Haas to start the plane’s engines. In the panic that follows, Jackson threatens Harold Johnson, the co-pilot, and shoots him in the arm in front of the terrified passengers. The hijackers give the order to take off and, despite now having two flat tires, the plane is able to get off the ground. Jackson then orders Haas to fly to Cuba again. The damaged plane makes an emergency landing in Havana at 12:32 a.m. on November 12. [Detroit Free Press, 11/12/1972; Graff, 2011, pp. 45-52] Cuban soldiers then arrest the hijackers and seize the ransom money, so it can be returned to Southern Airways. [Slate, 6/19/2013]
New Security Measures Will Be Introduced in response to the Hijacking – The catastrophic incident will lead to increased security in the aviation industry. Within two months, mandatory screening of all passengers and carry-on luggage will be introduced. The Justice Department will sign an agreement with the Department of Defense, making military assistance available to the FBI in the event of a terrorist emergency. Other measures will be considered but not introduced, such as armoring cockpit doors, allowing pilots to carry weapons, and centralizing airport security nationwide under a single agency. [Naftali, 2005, pp. 66-67; Graff, 2011, pp. 53] “No one understands the impact that this flight and this 30-hour ordeal had on the nation, and transforming everyone, from the White House to the FBI, to the way that we board an airplane every day,” Brendan Koerner, author of a book about aircraft hijackings, will comment in 2016. [Detroit Free Press, 6/6/2016] As a result of the hijacking of Flight 49, “the American public for the first time began to take the question of terrorism seriously and began to accept trade-offs of civil liberties in exchange for greater security,” journalist and author Garrett Graff will write. [Graff, 2011, pp. 53-54]
1991-2000: Airport Later Used by Ten Hijackers Has Poor Security Record and Lacks Surveillance Cameras
Data compiled by the Federal Aviation Administration (FAA) shows that over this period Boston’s Logan Airport has one of the worst records for security among major US airports. Flight 11 and Flight 175 depart from Logan on 9/11. While it is only America’s eighteenth busiest airport, it has the fifth highest number of security violations. FAA agents testing its passenger screening are able to get 234 guns and inert hand grenades and bombs past its checkpoint guards or through its X-ray machines. Though it is possible that the high number of violations is because the FAA tests more frequently at Logan than elsewhere, an official later quoted by the Boston Globe says lax security is the only explanation, as all checkpoints at every major airport are meant to be tested monthly. In contrast, Newark Airport, from where Flight 93 departs on 9/11, has an above average security record. Washington’s Dulles Airport, from where Flight 77 takes off, is below average, though not as bad as Logan. Officials familiar with security at Logan will, after 9/11, point to various flaws. For example, the State Police office has no video surveillance of the airport’s security checkpoints, boarding gates, ramp areas, or perimeter entrances. [Boston Globe, 9/26/2001] Security cameras had been put into use at most US airports in the mid-1980s. When Virginia Buckingham takes over as executive director of Massachusetts Port Authority in 1999, she is surprised at the lack of cameras at Logan, and orders them that year. Yet by 9/11, they still will not have been installed. [Boston Herald, 9/29/2001; Boston Globe, 9/30/2001] In spite of Logan’s poor security record, after 9/11 the Boston Globe will report, “[A]viation specialists have said it is unlikely that more rigorous attention to existing rules would have thwarted the 10 hijackers who boarded two jets at Logan on Sept. 11.” [Boston Globe, 10/17/2001]
1992: Small Knives Used in Hijackings, FAA Memo Warns
A Federal Aviation Administration (FAA) internal memo warns that small knives have been used in hijackings. The memo states, “Small knives (blade length of four inches or less), the most frequently employed weapon to hijack aircraft (in the US), were used in three incidents.” Details of the memo will later be provided to the 9/11 Commission by Steve Elson, an FAA special agent for security. According to Elson, the memo is widely distributed to agency security officials. Elson will quit the FAA 1999 in frustration over lax security. [New York Magazine, 9/24/2001; Elson, 9/4/2003; Salon, 8/3/2004; Linda Ellman, 2005; Village Voice, 2/8/2005] By 9/11 it will still be legal to bring small knives onto planes (see July 8-August 30, 2001).
February 11, 1993: Hijacking Raises Concern of Plane Being Crashed into New York Building
A 20-year-old Ethiopian man hijacks a Lufthansa Airbus bound from Frankfurt to Addis Ababa, via Cairo. Wielding a gun (which is subsequently found to be just a starter pistol), he forces the pilot to divert the plane to New York. The 11-hour ordeal ends after the plane lands at JFK International Airport and the hijacker surrenders to the FBI. [CNN, 3/14/1996; Guardian, 2/8/2000; 9/11 Commission, 7/24/2004, pp. 457]
Fears of Plane Being Crashed – Journalist Eric Margolis, who is on the plane, will later say that he and the other passengers are “convinced the hijacker… intended to crash the plane into Manhattan.” [Eric Margolis (.com), 2/13/2000] While giving television commentary on the morning of 9/11, Larry Johnson—currently the deputy director of the State Department’s Office of Counter Terrorism—will say it was feared when the plane was flown to New York “that it might be crashed into something.” [NBC, 9/11/2001]
Air Force Responds – In response to the hijacking, F-15 fighter jets are scrambled from Otis Air National Guard Base in Cape Cod, Massachusetts, from where fighters will also be launched in response to the first hijacking on 9/11 (see 8:46 a.m. September 11, 2001). Later, F-16s are scrambled from Atlantic City, New Jersey. The fighters intercept the Lufthansa aircraft off the coast of eastern Canada, and initially trail it from a distance of about ten miles. As the plane approaches JFK Airport, the fighters move in to a distance of five miles. They do a low fly-by as the plane lands at JFK. They circle overhead for a while, until the hijacking situation is resolved, and then return to their bases. [Spencer, 2008, pp. 29]
Participants in Response Also Involved on 9/11 – This is the last hijacking to occur prior to 9/11 involving US air traffic controllers, FAA management, and military coordination. [9/11 Commission, 7/24/2004, pp. 14; Utica Observer-Dispatch, 8/5/2004] At least two of the military personnel who participate in the response to it will play key roles in responding to the 9/11 attacks. Robert Marr, who on 9/11 will be the battle commander at NORAD’s Northeast Air Defense Sector (NEADS), is currently the assistant deputy commander of operations at Griffiss Air Force Base in Rome, NY. [Post-Standard (Syracuse), 3/27/2005] On this occasion, he talks with his counterpart at the FAA and explains that the FAA needs to start a request up its chain of command, so the military can respond quickly if the hijacking—which takes place in Europe—comes to the United States. He then informs his own chain of command to be prepared for a request for military assistance from the FAA. Several hours later, Marr is notified that military assistance has been authorized, and the fighter jets are scrambled from Otis and Atlantic City. [Spencer, 2008, pp. 26-27] Timothy Duffy, who will be one of the F-15 pilots that launches from Otis Air Base in response to the first hijacking on 9/11, is also involved. His role on this occasion is unreported, though presumably he pilots one of the jets scrambled from Otis after the Lufthansa plane. [Spencer, 2008, pp. 29]
1995: FAA Runs Hijacking Exercise; NORAD Participates
The Federal Aviation Administration (FAA) holds a training exercise based on the scenario of an aircraft hijacking, which involves a real plane playing the part of the hijacked aircraft. The exercise will be described to the 9/11 Commission in 2004 by Major Paul Goddard, who is the chief of live exercises for the North American Aerospace Defense Command (NORAD) at the time of the 9/11 attacks. According to Goddard, the exercise, held in 1995, is called “Twin Star” and the FAA invites NORAD to participate in it, “since a real commercial airliner was to be shadowed by a fighter intercept.” Goddard will tell the 9/11 Commission his understanding is that the exercise involves the entire FAA system, and the National Military Command Center (NMCC) at the Pentagon also participates in it. [9/11 Commission, 3/4/2004] Colin Scoggins, the military operations specialist at the FAA’s Boston Center on 9/11, will describe what is apparently this exercise when he is interviewed by the 9/11 Commission in 2003. He will say he believes the exercise is “joint FAA/military” and is conducted “in 1995 or 1996.” According to Scoggins, the exercise involves “a military scramble to escort a hijacked aircraft,” but the fighter jets taking part are “unable to intercept” the mock hijacked plane. [9/11 Commission, 9/22/2003 ] Apparently describing the same exercise in a documentary film, Scoggins will say, “We had run a hijack test years before [9/11] and the fighters never got off on the appropriate heading, and it took them forever to catch up.” [Michael Bronner, 2006]
1996-1997: Ptech Begins to Get US Government Contracts
Ptech is a Boston computer company connected to a number of individuals suspected of ties to officially designated terrorist organizations (see 1994). These alleged ties will be of particular concern because of Ptech’s potential access to classified government secrets. Ptech specializes in what is called enterprise architecture. It is the design and layout for an organization’s computer networks. John Zachman, considered the father of enterprise architecture, later will say that Ptech could collect crucial information from the organizations and agencies with which it works. “You would know where the access points are, you’d know how to get in, you would know where the weaknesses are, you’d know how to destroy it.” Another computer expert will say, “The software they put on your system could be collecting every key stroke that you type while you are on the computer. It could be establishing a connection to the outside terrorist organization through all of your security measures.” [WBZ 4 (Boston), 12/9/2002] In late 1996, an article notes that Ptech is doing work for DARPA, a Defense Department agency responsible for developing new military technology. [Government Executive, 9/1/1996] In 1997, Ptech gains government approval to market its services to “all legislative, judicial, and executive branches of the federal government.” Beginning that year, Ptech will begin working for many government agencies, eventually including the White House, Congress, Army, Navy, Air Force, NATO, FAA, FBI, US Postal Service, Secret Service, the Naval Air Systems Command, IRS, and the nuclear-weapons program of the Department of Energy. For instance, Ptech will help build “the Military Information Architecture Framework, a software tool used by the Department of Defense to link data networks from various military computer systems and databases.” Ptech will be raided by US investigators in December 2002 (see December 5, 2002), but not shut down. [Wall Street Journal, 12/6/2002; CNN, 12/6/2002; Newsweek, 12/6/2002; Boston Globe, 12/7/2002] A former director of intelligence at the Department of Energy later will say he would not be surprised if an al-Qaeda front company managed to infiltrate the department’s nuclear programs. [Unlimited (Auckland), 12/9/2002] Ptech will continue to work with many of these agencies even after 9/11. After a Customs Department raid of Ptech’s offices in late 2002, their software will be declared safe of malicious code. But one article will note, “What no one knows at this point is how much sensitive government information Ptech gained access to while it worked in several government agencies.” [WBZ 4 (Boston), 12/9/2002]
1997-September 1999: FAA Finds Repeated Security Violations at Airport Later Used by Ten Hijackers
The Federal Aviation Administration (FAA) finds at least 136 security violations at Boston’s Logan Airport between 1997 and early 1999. Flights 11 and 175 will depart from Logan on 9/11. Massachusetts Port Authority, which operates the airport, is fined $178,000 for these breaches, which include failing to screen baggage properly and easy access to parked planes. In summer 1999, a teenager is able to climb over the airport’s security fence, walk two miles across the tarmac, board a 747, and fly on it to London. In September 1999, the Boston Globe finds that doors are often left open at the airport, making it possible for potentially anyone to gain access to planes on the ground. [Boston Globe, 9/12/2001; Washington Post, 9/12/2001] After 9/11, an analysis by the Boston Globe will conclude that Logan’s security record is “dismal” (see 1991-2000). [Boston Globe, 9/26/2001]
1998: Training Exercise Held at the White House, Based Around Militants Using a Plane as a Weapon
Counterterrorism “tsar” Richard Clarke chairs a tabletop exercise at the White House, involving a scenario where anti-American militants fill a Learjet with explosives, and then fly it on a suicide mission toward a target in Washington, DC. Officials from the Pentagon, Secret Service, and FAA attend, and are asked how they would stop such a threat. Pentagon officials say they could launch fighters from Langley Air Force Base, Virginia, but would need authorization from the president to shoot the plane down, and currently there is no system to do this. The 9/11 Commission later states: “There was no clear resolution of the problem at the exercise.”
[Slate, 7/22/2004; 9/11 Commission, 7/24/2004, pp. 345, 457-458]
1998: FAA Testing Reveals Frightening Airport Security Lapses; Little Done in Response Except Small Penalties
The FAA creates “Red Teams”
—small, secretive teams traveling to airports and attempting to foil their security systems—in response to the 1988 bombing of a Pan Am 747 over Scotland. According to later reports, the Red Teams conduct extensive testing of screening checkpoints at a large number of domestic airports in 1998. The results were frightening: “We were successful in getting major weapons—guns and bombs—through screening checkpoints with relative ease, at least 85 percent of the time in most cases. At one airport, we had a 97 percent success rate in breaching the screening checkpoint.… The individuals who occupied the highest seats of authority in the FAA were fully aware of this highly vulnerable state of aviation security and did nothing.”
[New York Times, 2/27/2002] In 1999, the New York Port Authority and major airlines at Boston’s Logan Airport will be “fined a total of $178,000 for at least 136 security violations [between 1999-2001]. In the majority of incidents, screeners hired by the airlines for checkpoints in terminals routinely [fail] to detect test items, such as pipe bombs and guns.”
[Associated Press, 9/12/2001]
Spring 1998: Experts Warn FAA of Potential Massive Kamikaze Attack
Three terrorism specialists present an analysis of security threats to FAA security officials. Their analysis describes two scenarios involving planes as weapons. In one, hijacked planes are flown into nuclear power plants along the East Coast. In the other, hijackers commandeer Federal Express cargo planes and simultaneously crash them into the World Trade Center, the Pentagon, the White House, the Capitol, the Sears Tower, and the Golden Gate Bridge. Stephen Gale, one of the specialists, later says the analysis is based in part upon attempts that had been made in 1994 to crash airplanes in the Eiffel Tower and the White House (see September 11, 1994)
(see December 24, 1994). Gale later recalls that one FAA official responds to the presentation by saying, “You can’t protect yourself from meteorites.”
[Washington Post, 5/19/2002]